paper_id
stringlengths 9
16
| version
stringclasses 26
values | yymm
stringclasses 311
values | created
timestamp[s] | title
stringlengths 6
335
| secondary_subfield
sequencelengths 1
8
| abstract
stringlengths 25
3.93k
| primary_subfield
stringclasses 124
values | field
stringclasses 20
values | fulltext
stringlengths 0
2.84M
|
---|---|---|---|---|---|---|---|---|---|
1612.02878 | 1 | 1612 | 2016-12-09T00:55:52 | Deformations and generalized derivations of Lie conformal superalgebras | [
"math.RA"
] | The purpose of this paper is to extend the cohomology and conformal derivation theories of the classical Lie conformal algebras to Lie conformal superalgebras. Firstly, we construct the semidirect product of a Lie conformal superalgebra and its conformal module, and study derivations of this semidirect product. Secondly, we develop cohomology theory of Lie conformal superalgebras and discuss some applications to the study of deformations of Lie conformal superalgebras. Finally, we introduce generalized derivations of Lie conformal superalgebras and study their properties. | math.RA | math | Deformations and generalized derivations of
Lie conformal superalgebras
6
1
0
2
c
e
D
9
Jun Zhao1, Liangyun Chen1∗, Lamei Yuan2
1School of Mathematics and Statistics, Northeast Normal University,
Changchun 130024, China
2Academy of Fundamental and Interdisciplinary Sciences,
Harbin Institute of Technology, Harbin 150080, China
]
.
A
R
h
t
a
m
[
1
v
8
7
8
2
0
.
2
1
6
1
:
v
i
X
r
a
Abstract
The purpose of this paper is to extend the cohomology and conformal deriva-
tion theories of the classical Lie conformal algebras to Lie conformal superalgebras.
Firstly, we construct the semidirect product of a Lie conformal superalgebra and
its conformal module, and study derivations of this semidirect product. Secondly,
we develop cohomology theory of Lie conformal superalgebras and discuss some
applications to the study of deformations of Lie conformal superalgebras. Finally,
we introduce generalized derivations of Lie conformal superalgebras and study their
properties.
Key words: Lie conformal superalgebras, semidirect product, cohomology, deforma-
tions, generalized derivations
Mathematics Subject Classification(2010): 16S70, 17A42, 17B10, 17B56, 17B70
1
Introduction
Lie conformal superalgebras encode the singular part of the operator product expansion
of chiral fields in two-dimensional quantum field theory. On the other hand, they are
closely connected to the notion of a formal distribution Lie superalgebra (g, F ), that is
a Lie superalgebra g spanned by the coefficients of a family F of mutually local formal
distributions. Conversely, to a Lie conformal superalgebra R one can associate a formal
distribution Lie superalgebra (LieR, R) which establishes an equivalence between the
category of Lie conformal superalgebras and the category of equivalence classes of formal
Corresponding author(L. Chen): [email protected].
Supported by NNSF of China (Nos. 11171055, 11471090 and 11301109).
1
distribution Lie superalgebras obtained as quotients of Lie R by irregular ideals. See
[2, 3, 5] in details.
The notion of a Lie conformal superalgebra was introduced in [5], which gave deriva-
tions and representations of Lie conformal superalgebras. The cohomology theory of Lie
conformal algebras was developed in [1]. Lately, the generalized derivation theory of Lie
conformal algebras were studied in [6], extending the generalized derivation theory of Lie
algebras given in [8]. [7] study conformal derivations of the semidirect product. [9] study
Hom-Nijienhuis operators and T *-extensions of hom-Lie superalgebras.
In the present
paper, we aim to do same in [7] for Lie conformal superalgebras, extend the cohomology
theory and study the generalized derivations of Lie conformal algebras to the super case.
Furthermore, by a 2-cocycle Nijienhuis operator generate a deformation.
The paper is organized as follows. In Section 2, we recall notions of derivations and
modules of a Lie conformal superalgebra. Moreover, we construct the semidirect product
of a Lie conformal superalgebra and its conformal module, and study derivations of this
semidirect product.
In Section 3, we define cohomology and Nijienhuis operators of Lie conformal super-
algebras, and show that the deformation generated by a 2-cocycle Nijienhuis operator is
trivial.
In Section 4, we introduce different kinds of generalized derivations of Lie confor-
mal superalgebras, and study their properties and connections, extending some results
obtained in [8].
Throughout this paper, all vector spaces, linear maps, and tensor products are over
the complex field C. In addition to the standard notations Z and R, we use Z+ to denote
the set of nonnegative integers. R is a Z2-graded C[∂]-module, x ∈ R means x is a
homogeneous element, a ∈ Z2 is the degree of a.
2 Conformal derivations of semidirect products of
Lie conformal superalgebras and their conformal
modules
First we present the definition of Lie conformal superalgebras given in [2, Definition 2.1].
Definition 2.1. A Lie conformal superalgebra R is a left Z2-graded C[∂]-module, and
for any n ∈ Z≥0 there is a family of C-bilinear n-products from R ⊗ R to R satisfying
the following conditions:
(C0) For any a, b ∈ R, there is an N such that a(n)b = 0 for n ≫ N,
(C1) For any a, b ∈ R and n ∈ Z≥0, (∂a)(n)b = −na(n)b,
2
(C2) For any a, b ∈ R and n ∈ Z≥0,
a(n)b = −(−1)ab
∞
Xj=0
(−1)j+n 1
j!
∂j(b(n+j)a),
(C3) For any a, b, c ∈ R and m, n ∈ Z≥0,
a(m)(b(n)c) =
m
Xj=0
j )(a(j)b)(m+n−j)c + (−1)abb(n)(a(m)c).
(m
Note that if we define λ-bracket [−λ−]:
[aλb] =
∞
Xn=0
λn
n!
a(n)b, a, b ∈ R.
(2.1)
That is, R is a Lie conformal superalgebra if and only if [−λ−] satisfies the following
axioms:
(C1)λ Conformal sesquilinearity :
(C2)λ
(C3)λ
Skew − symmetry :
Jacobi identity :
[(∂a)λb] = −λ[aλb];
[aλb] = −(−1)ab[b−∂−λa];
[aλ[bµc]] = [[aλb]λ+µc] + (−1)ab[bµ[aλc]].
Example 2.2. Let R = C[∂]L ⊕ C[∂]E be a free Z2-graded C[∂]-module. Define
[LλL] = (∂ + 2λ)L, [LλE] = (∂ +
3
2
λ)E, [EλL] = (
1
2
∂ +
3
2
λ)E, [EλE] = 0,
where R¯0 = C[∂]L and R¯1 = C[∂]E. Then R is a Lie conformal superalgebra.
Example 2.3. (Neveu-Schwarz Lie conformal superalgebra) Let NS = C[∂]L ⊕ C[∂]G be
a free Z2-graded C[∂]-module. Define
[LλL] = (∂ + 2λ)L, [LλG] = (∂ +
3
2
λ)G, [GλL] = (
1
2
∂ +
3
2
λ)G, [GλG] = L,
where NS¯0 = C[∂]L and NS¯1 = C[∂]G. Then NS is a Lie conformal superalgebra. We call
it Neveu-Schwarz Lie conformal superalgebra.
Proposition 2.4. Let R = C[∂]x ⊕ C[∂]y be a Lie conformal superalgebra that is a free
Z2-graded C[∂]-module, where R¯0 = C[∂]x and R¯1 = C[∂]y. Then R is isomorphic to one
of the following Lie conformal superalgebras:
(1) R1 : [xλx] = 0, [xλy] = 0, [yλy] = p(∂)x, ∀ p(∂) ∈ C[∂];
(2) R2 : [xλx] = 0, [yλy] = 0, [xλy] = q(λ)y, ∀ q(λ) ∈ C[λ];
(3) R3 : [xλx] = (∂ + 2λ)x, [xλy] = 0, [yλy] = 0;
3
(4) R4 : [xλx] = (∂ + 2λ)x, [xλy] = (∂ + βλ)y, [yλy] = 0, ∀ β ∈ C;
(5) R5 : [xλx] = (∂ + 2λ)x, [xλy] = (∂ + 3
2 λ)y, [yλy] = αx, ∀ α ∈ C.
Proof. Let us set [xλx] = a(∂, λ)x, [xλy] = b(∂, λ)y, and [yλy] = d(∂)x (because of
i=0 bi(λ)∂i, and d(∂, λ) =
i=0 di∂i, with an(λ) 6= 0, bm(λ) 6= 0, and dq 6= 0. Consider the Jacobi identity [xλ[xµx]] =
i=0 ai(λ)∂i, b(∂, λ) = Pm
[yλy] = [y−∂−λy]), where a(∂, λ) = Pn
Pq
[[xλx]λ+µx] + [xµ[xλx]], this is equivalent to saying that
a(∂ + λ, µ)a(∂, λ)x = a(−λ − µ, λ)a(∂, λ + µ)x + a(∂ + µ, λ)a(∂, µ)x.
(2.2)
Equating terms of degree 2n−1 in ∂ in both sides, we get, if n > 1 : n(λ−µ)an(λ)an(µ) =
0, which shows that an(λ) = 0. So a(∂, λ) = a0(λ) + a1(λ)∂. If we put λ = µ in Eq.(2.2),
we get a(∂, 2λ)a(−2λ, λ) = 0, hence a0(λ) = 2λa1(λ), therefore a(∂, λ) = a1(λ)(∂ + 2λ).
Plugging this into [xλx] = −[x−∂−λx], we get that a1(λ) is a constant C. So [xλx] =
C(∂ + 2λ)x.
Case 1
If C = 0, Consider the Jacobi identity [xλ[xµy]] = [[xλx]λ+µy] + [xµ[xλy]], this is
equivalent to saying that
b(∂ + λ, µ)b(∂, λ)y = b(∂ + µ, λ)b(∂, µ)y.
Equating terms of degree 2m−1 in ∂ in both sides, we get, if m ≥ 1 : m(λ−µ)bm(λ)bm(µ) =
0, which shows that bm(λ) = 0. So b(∂, λ) = b0(λ). So [xλy] = b0(λ)y.
(1) If b0(λ) = 0, then [xλy] = [yλx] = 0. In this situation, R is isomorphic to R1.
(2) If b0(λ) 6= 0, consider the Jacobi identity [xλ[yµy]] = [[xλy]λ+µy] + [yµ[xλy]], this
is equivalent to saying that
0 = b0(λ)d(∂)x + b0(λ)d(∂)x.
So d(∂) = 0, thus [yλy] = 0. Then R is isomorphic to R2.
Case 2
If C 6= 0, we can let C = 1(otherwise, change x by a complex multiple). Then
[xλx] = (∂ + 2λ)x. Consider the Jacobi identity [xλ[xµy]] = [[xλx]λ+µy] + [xµ[xλy]], this is
equivalent to saying that
b(∂ + λ, µ)b(∂, λ)y = (λ − µ)b(∂, λ + µ)y + b(∂ + µ, λ)b(∂, µ)y.
(2.3)
Equating terms of degree 2m−1 in ∂ in both sides, we get, if m > 1 : m(λ−µ)bm(λ)bm(µ) =
0, which shows that bm(λ) = 0. So b(∂, λ) = b0(λ) + b1(λ)∂. Substituting into Eq.(2.3),
we get
b1(λ)b1(µ) = b1(λ + µ)
(2.4)
4
and
λb0(λ)b1(µ) = (λ − µ)b0(λ + µ) + µb1(λ)b0(µ).
(2.5)
By Eq.(2.4), we have b1(λ) = 0 or 1.
(1) If b1(λ) = 0, then (λ − µ)b0(λ + µ) = 0, so b0(λ) = 0, that is [xλy] = 0. Consider
the Jacobi identity [xλ[yµy]] = [[xλy]λ+µy] + [yµ[xλy]], this is equivalent to saying that
d(∂ + λ)(∂ + 2λ) = 0, i.e. [yλy] = 0. Then R is isomorphic to R3.
(2) If b1(λ) = 1, Substituting into Eq.(2.5), we get λb0(λ) − µb0(µ) = (λ − µ)b0(λ +
µ). So b0(λ) = βλ, and [xλy] = (∂ + βλ)y. Consider the Jacobi identity [xλ[yµy]] =
[[xλy]λ+µy] + [yµ[xλy]], this is equivalent to saying that
(∂ + 2λ)d(∂ + λ)x = (∂ − λ + 2βλ)d(∂)x.
(2.6)
Equating terms of the most degree in λ in both sides, we get d(∂) = C1.
(i) If C1 = 0, then [yλy] = 0. Then R is isomorphic to R4.
(ii) If C1 6= 0, Substituting into Eq.(2.6), we get β = 3
2. Then R is isomorphic to R5.
Definition 2.5. A linear map ρ : R → R′ is a homomorphism of Lie conformal superal-
gebras if ρ satisfies ρ∂ = ∂ρ and ρ([aλb]) = [ρ(a)λρ(b)], ∀a, b ∈ R.
Example 2.6. [5] Let g = g¯0 ⊕ g¯1 be a complex Lie superalgebra with Lie bracket [−, −].
Let (Curg)θ := C[∂] ⊗ gθ be the free C[∂]-module. Then Curg = (Curg)¯0 ⊕ (Curg)¯1 is
a Lie conformal superalgebra, called current Lie conformal superalgebra, with λ-bracket
given by:
[(f (∂) ⊗ a)λ(g(∂) ⊗ b)] := f (−λ)g(∂ + λ) ⊗ [a, b], a, b ∈ R.
(2.7)
Definition 2.7. [5] Let M and N be Z2-graded C[∂]-modules. A conformal linear map
of degree θ from M to N is a sequence f = {f(n)}n∈Z≥0 of f(n) ∈ HomC(M, N) satisfying
that
∂N f(n) − f(n)∂M = −nf(n−1), n ∈ Z≥0
and f(n)(Mµ) ⊆ Nµ+θ, µ, θ ∈ Z2.
Set fλ = P∞
only if
n=0
λn
n! f(n). Then f = {f(n)}n∈Z≥0 is a conformal linear map of degree θ if and
fλ∂M = (∂N + λ)fλ
and fλ(Mµ) ⊆ Nµ+θ[λ], µ, θ ∈ Z2.
Definition 2.8. An associative conformal superalgebra R is a left Z2-graded C[∂]-module
endowed with a λ-product from R ⊗ R to C[λ] ⊗ R, for any a, b, c ∈ R, satisfying the
following conditions:
(1) (∂a)λb = −λaλb, aλ(∂b) = (∂ + λ)(aλb),
(2) aλ(bµc) = (aλb)λ+µc.
5
Let Chom(M, N)θ denote the set of conformal linear maps of degree θ from M to N.
Then Chom(M, N) = Chom(M, N)¯0 ⊕ Chom(M, N)¯1 is a Z2-graded C[∂]-module via:
∂f(n) = −nf(n−1), equivalently, ∂fλ = −λfλ.
The composition fλg : L → N ⊗C[λ] of conformal linear maps f : M → N and g : L → M
is given by
(fλg)λ+µ = fλgµ,
∀ f, g ∈ Chom(M, N).
If M is a finitely generated Z2-graded C[∂]-module, then Cend(M) := Chom(M, M)
is an associative conformal superalgebra with respect to the above composition. Thus,
Cend(M) becomes a Lie conformal superalgebra, denoted as gc(M), with respect to the
following λ-bracket(see [5, Example1.1]):
[fλg]µ = fλgµ−λ − (−1)f ggµ−λfλ.
(2.8)
Hereafter all Z2-graded C[∂]-modules are supposed to be finitely generated.
Definition 2.9. [2, Definition 2.2] A Z2-graded C[∂]-module M is a conformal module of
a Lie conformal superalgebra R if there is a homomorphism of Lie conformal superalgebras
ρ : R → Cend(M).
Furthermore, we call (ρ, M) is a representation of the Lie conformal superalgebra R.
If (ρ, M) is a representation of a Lie conformal superalgebra R, it is obvious that we have
the following relations;
m
Xj=0
j )ρ(a(j)b)(m+n−j) + (−1)abρ(b)(n)ρ(a)(m), ρ(∂(a))(n) = −nρ(a)(n);
(m
ρ(a)(m)ρ(b)(n) =
equivalently,
ρ(a)λρ(b)µ − (−1)abρ(b)µρ(a)λ = [ρ(a)λρ(b)]λ+µ = ρ([aλb])λ+µ, ρ(∂(a))λ = −λρ(a)λ.
Example 2.10. Let g = g¯0 ⊕ g¯1 be a finite dimensional complex Lie superalgebra, π :
g → End(M) a finite dimensional representation of g. Then the free Z2-graded C[∂]-
module C[∂] ⊗ M is a conformal module of Curg, with module structure ρ : Curg →
Cend(C[∂] ⊗ M) given by:
ρ(f (∂) ⊗ a)λ(g(∂) ⊗ m) = f (−λ)g(∂ + λ) ⊗ π(a)(m), ∀ f (∂), g(∂) ∈ C[∂], a ∈ g, m ∈ M.
Definition 2.11. [5] Let R be a Lie conformal superalgebra. d ∈ Cend(R) is a conformal
derivation if for any a, b ∈ R it holds that
d(m)(a(n)b) =
m
Xj=0
j )(d(j)a)(m+n−j)b + (−1)ada(n)(d(m)(b));
(m
equivalently,
dλ([aµb]) = [(dλ(a))λ+µb] + (−1)ad[aµ(dλ(b))].
(2.9)
6
For any r ∈ R, dr
λ is called an inner conformal derivation of R if dr
λ(r′) = [rλr′],
∀r′ ∈ R.
Example 2.12. Let R = C[∂]L ⊕ Curg be a free Z2-graded C[∂]-module, where Curg
is current Lie conformal superalgebra. Define dL : Curg → Curg by dL
λ g = (∂ + λ)g for
every g ∈ g ⊂ Curg. Then dL is a conformal derivation degree 0 of Curg. Furthermore, if
we define
[LλL] = (∂ + 2λ)L, [Lλg] = dL
λ g, [gλh] = [g, h],
where R¯0 = C[∂]L ⊕ Curg¯0 and R¯1 = Curg¯1. Then R is a Lie conformal superalgebra.
Example 2.13. Every conformal derivation of Neveu-Schwarz Lie conformal superalgebra
is an inner conformal derivation.
Proof. Case 1
Suppose that d = 0, and dλL = p(∂, λ)L, dλG = g(∂, λ)G, where p(∂, λ) =
i=0 di(λ)∂i. If d is a conformal derivation, it needs to satisfy
dλ[LµL] = [(dλL)λ+µL] + [Lµ(dλL)], this is equivalent to saying that
i=0 ai(λ)∂i, g(∂, λ) = Pq
Pn
(∂ + λ + 2µ)p(∂, λ)L = p(−λ − µ, λ)(∂ + 2λ + 2µ)L + p(∂ + µ, λ)(∂ + 2µ)L.
(2.10)
Equating terms of degree n in ∂ in both sides, we get, if n > 1 : (λ − nµ)an(λ) = 0, which
shows that an(λ) = 0. So p(∂, λ) = a0(λ) + a1(λ)∂, substituting into Eq.(2.10), we get
a0(λ) = 2λa1(λ), hence dλL = a1(λ)(∂ + 2λ)L.
Similarly, dλ[GµG] = [(dλG)λ+µG] + [Gµ(dλG)], it is equivalent to
p(∂, λ)L = g(−λ − µ, λ)L + g(∂ + µ, λ)L.
(2.11)
The degree of ∂ in p(∂, λ) is at most one, so g(∂, λ) = d0(λ) + d1(λ)∂, substituting into
Eq.(2.11), we get d0(λ) = 3
2 λa1(λ), hence dλG = a1(λ)(∂ + 3
2 λd1(λ) = 3
2 λ)G.
So dλ = a1(λ)adLλ.
Case 2
Suppose that d = 1, and dλL = q(∂, λ)G, dλG = f (∂, λ)L, where q(∂, λ) =
i=0 ci(λ)∂i. If d is a conformal derivation, it needs to satisfy
dλ[LµL] = [(dλL)λ+µL] + [Lµ(dλL)], this is equivalent to saying that
i=0 bi(λ)∂i, f (∂, λ) = Pp
Pm
(∂ + λ + 2µ)q(∂, λ)G = q(−λ − µ, λ)(
1
2
∂ +
3
2
λ +
3
2
µ)G + q(∂ + µ, λ)(∂ +
3
2
µ)G. (2.12)
Equating terms of degree m in ∂ in both sides, we get, if m > 1 : (λ + 1
2 µ − mµ)bm(λ) = 0,
which shows that bm(λ) = 0. So q(∂, λ) = b0(λ) + b1(λ)∂, substituting into Eq.(2.12), we
get b0(λ) = 3λb1(λ), hence dλL = b1(λ)(∂ + 3λ)G.
Similarly, dλ[GµG] = [(dλG)λ+µG] − [Gµ(dλG)], it is equivalent to
q(∂, λ)G = f (−λ − µ, λ)(∂ +
µ)G − f (∂ + µ, λ)(
1
2
∂ +
3
2
µ)G.
(2.13)
3
2
λ +
3
2
7
The degree of ∂ in q(∂, λ) is at most one, so f (∂, λ) = c0(λ), substituting into Eq.(2.13),
we get c0(λ) = 2b1(λ), hence dλG = 2b1(λ)L.
So dλ = 2b1(λ)adGλ. Then every conformal derivation of Neveu-Schwarz Lie confor-
mal superalgebra is an inner conformal derivation.
Definition 2.14. Let R be a Lie conformal superalgebra with λ-bracket [−λ−], M a
conformal module of R and ρ : R → C[λ] ⊗ Cend(M) : r 7→ ρ(r)λ the corresponding
representation. A conformal linear map d ∈ Chom(R, M) is a conformal derivation from
R to M if
dλ([rµr′]) = (−1)rdρ(r)µ(dλ(r′)) − (−1)(r+d)r′ρ(r′)−∂−λ−µ(dλ(r)).
(2.14)
Note that if ρ is the adjoint representation (that is ρ(a)λb = [aλb]) of R, then Eq.(2.14)
is Eq.(2.9). We have the following:
Lemma 2.15. Let R be a Lie conformal superalgebra with λ-bracket [−λ−], M a confor-
mal module of R and ρ : R → C[λ] ⊗ Cend(M) : r 7→ ρ(r)λ the corresponding represen-
tation. For any m ∈ M, define a C-linear map
dm : R → C[λ] ⊗ M : dm
λ (r) = −(−1)rmρ(r)−∂−λ(m), r ∈ R.
(2.15)
Then dm is a conformal derivation from R to M.
Proof. For any r ∈ R, m ∈ Mθ, according to Definition 2.9 and Eq.(2.15), we have
λ (∂r) = −(−1)rmρ(∂r)−∂−λ(m) = −(−1)rm(∂ + λ)ρ(r)−∂−λ(m) = (∂ + λ)dm
dm
λ (r),
and dm(Rη) ⊆ Mη+θ, which means that dm ∈ Cend(R, M)θ. For any r′ ∈ R,
− dm
λ ([rµr′]) = −Xs≥0
µs
s!
λ (r(s)r′)
dm
= (−1)(r+r′)mXs≥0
= (−1)(r+r′)m Xs,t≥0
µs
s!
ρ(r(s)r′)−∂−λ(m)
µs
s!
(−∂ − λ)t
t!
ρ(r(s)r′)(t)(m).
(2.16)
Since ρ(r) ∈ Cend(M)r is a conformal linear map, it follows from
ρ(r)µ((−∂ − λ)tm′) = (−∂ − λ − µ)tρ(r)µ(m′), m′ ∈ M,
and hence,
−(−1)rmρ(r)µ(dm
λ (r′))
= (−1)rm(−1)r′mρ(r)µ(ρ(r′)−∂−λ(m))
8
= (−1)(r+r′)mρ(r)µ(Xt≥0
= (−1)(r+r′)m Xs,t≥0
µs
s!
(−∂ − λ)t
t!
ρ(r′)(t)(m))
(−∂ − λ − µ)t
t!
ρ(r)(s)(ρ(r′)(t)(m)).
(2.17)
Similarly, ρ(r′) ∈ Cend(M)r′ is a conformal linear map, it follows from
ρ(r′)−∂−λ−µ((−∂ − λ)tm′) = µtρ(r′)−∂−λ−µ(m′),
and hence,
−(−1)r′(r+m)ρ(r′)−∂−λ−µ(dm
λ (r))
= (−1)r′(r+m)+mrρ(r′)−∂−λ−µ(ρ(r)−∂−λ(m))
= (−1)r′(r+m)+mr Xs,t≥0
µs
s!
(−∂ − λ − µ)t
t!
ρ(r′)(t)(ρ(r)(s)(m)).
(2.18)
Since ρ is a representation, by Definition 2.9, Eqs.(2.16), (2.17) and (2.18), dm is a
conformal derivation from R to M.
Definition 2.16. Let R be a Lie conformal superalgebra with λ-bracket [−λ−], M a
conformal module of R and ρ : R → C[λ] ⊗ Cend(M) : r 7→ ρ(r)λ the corresponding
representation. dm given by Eq.(2.15) is called an inner conformal derivation from R to
M.
Remark 2.17. If ρ is the adjoint representation of R, then an inner conformal derivation
from R to R is nothing rather than an inner conformal derivation of R. In fact, for any
r, r′ ∈ R, by Definition 2.1 (C2)λ it follows from
λ(r′) = −(−1)rr′ρ(r′)−∂−λ(r) = −(−1)rr′[r′
dr
−∂−λr] = [rλr′].
(2.19)
Lemma 2.18. If f, g ∈ Cend(M), then for any m ∈ M,
(1) fλ(g−∂−µm) = (fλg)−∂−µm,
(2) f−∂−λ(gµm) = (f−∂−µg)−∂−λ+µm,
(3) f−∂−λ(g−∂−µm) = (f−∂+µ−λg)−∂−µm.
Lemma 2.19. Let R be a Lie conformal superalgebra with λ-bracket [−λ−], M a confor-
mal module of R and ρ : R → C[λ] ⊗ Cend(M) : r 7→ ρ(r)λ the corresponding represen-
tation. Define a λ-bracket [−λ−]M on R ⊕ M = (R ⊕ M)¯0 ⊕ (R ⊕ M)¯1 by
[(r + m)λ(r′ + m′)]M = [rλr′] + ρ(r)λm′ − (−1)r′mρ(r′)−∂−λm,
(2.20)
∀ r + m, r′ + m′ ∈ R ⊕ M, where (R ⊕ M)θ = Rθ ⊕ Mθ, θ ∈ Z2. Then R ⊕ M is a Lie
conformal superalgebra, called the semidirect product of R and M, and denote by R ⋉ M.
9
Proof. ∀ r + m, r′ + m′, r′′ + m′′ ∈ R ⊕ M, note that R ⊕ M is equipped with a
C[∂]-module structure via
∂(r + m) = ∂(r) + ∂(m).
A direct computation shows that
[∂(r + m)λ(r′ + m′)]M = [(∂r + ∂m)λ(r′ + m′)]M
= [(∂r)λr′] + ρ(∂r)λ(m′) − (−1)r′mρ(r′)−∂−λ(∂m)
= −λ[rλr′] − λρ(r)λ(m′) − (−1)r′m(∂ − λ − ∂)ρ(r′)−∂−λ(m)
= −λ([rλr′] + ρ(r)λ(m′) − (−1)r′mρ(r′)−∂−λ(m))
= −λ[(r + m)λ(r′ + m′)]M .
Thus (C1)λ holds. (C2)λ follows from
[(r′ + m′)−∂−λ(r + m)]M = [r′
−∂−λr] + ρ(r′)−∂−λ(m) − (−1)r′mρ(r)λ(m′)
= −(−1)r′m([rλr′] + ρ(r)λ(m′) − (−1)r′mρ(r′)−∂−λ(m))
= −(−1)r′m[(r + m)λ(r′ + m′)]M .
To check the Jacobi identity, we compute
[(r + m)λ[(r′ + m′)µ(r′′ + m′′)]M ]M
= [(r + m)λ([r′
= [rλ[r′
µr′′] + ρ(r′)µ(m′′) − (−1)r′′m′ρ(r′′)−∂−µ(m′)]M
µr′′]] + ρ(r)λ(ρ(r′)µ(m′′)) − (−1)r′′m′ρ(r)λ(ρ(r′′)−∂−µ(m′))
−(−1)(r′′+r′)mρ([r′
µr′′])−∂−λ(m),
(−1)rr′[(r′ + m′)µ[(r + m)λ(r′′ + m′′)]M ]M
= (−1)rr′[r′
µ[rλr′′]] + (−1)rr′ρ(r′)µ(ρ(r)λ(m′′))
(2.21)
−(−1)rr′+r′′mρ(r′)µ(ρ(r′′)−∂−λ(m)) − (−1)r′′m′ρ([rλr′′])−∂−µ(m′) (2.22)
and
[[(r + m)λ(r′ + m′)]M (λ+µ)(r′′ + m′′)]M
= [([rλr′] + ρ(r)λ(m′) − (−1)r′mρ(r′)−∂−λ(m))λ+µ(r′′ + m′′)]M
= [[rλr′]λ+µr′′] + ρ([rλr′])λ+µ(m′′) − (−1)r′′(r+m′)ρ(r′′)−∂−λ−µ(ρ(r)λm′)
+(−1)r′′(r′+m)+r′mρ(r′′)−∂−λ−µ(ρ(r′)−∂−λm).
(2.23)
By Eqs.(2.21)–(2.23), we only need to show that
ρ(r)λ(ρ(r′)−∂−µ′ m′′) − (−1)rr′ρ(r′)−∂−µ′ −λ(ρ(r)−∂−µ′ m′′) = ρ([rλr′])−∂−µ′ (m′′). (2.24)
Since (ρ, M) is a representation of R,
ρ(r)λ(ρ(r′)µm′′) − (−1)rr′ρ(r′)µ(ρ(r)λm′′) = ρ([rλr′])λ+µ(m′′).
(2.25)
10
Replacing µ by −λ − µ
′ − ∂ in Eq.(2.25) and using (C1)λ, we obtain
ρ(r)λ(ρ(r′)−∂−µ′m′′) − (−1)rr′ρ(r′)−∂−µ′−λ(ρ(r)λm′′) = ρ([rλr′])−∂−µ′(m′′).
(2.26)
By (C1)λ again, Eq.(2.26) is equivalent to Eq.(2.24). This implies
[(r + m)λ[(r′ + m′)µ(r′′ + m′′)]M ]M
= (−1)rr′[(r′ + m′)µ[(r + m)λ(r′′ + m′′)]M ]M + [[(r + m)λ(r′ + m′)]M (λ+µ)(r′′ + m′′)]M .
Then R ⊕ M is a Lie conformal superalgebra.
Let g be a complex Lie superalgebra and M a finite dimensional g-module. Then we
have the Current Lie conformal superalgebra Cur(g ⋉ M) (see Example 2.6). By Example
2.10, C[∂] ⊗ M is a conformal module of Curg. Thus, by the above lemma we have the
Lie conformal superalgebra Curg ⋉ (C[∂] ⊗ M).
Corollary 2.20. Cur(g ⋉ M) is a proper Lie conformal subalgebra of Curg ⋉ (C[∂] ⊗ M).
Proof. Let ρ : g → C[λ] ⊗ EndC(M) be the corresponding representation. For any
f (∂) ⊗ (r + m), g(∂) ⊗ (r′ + m′) ∈ Cur(g ⋉ M), where r, r′ ∈ g, m, m′ ∈ M. By the
λ-bracket on Cur(g ⋉ M)(Example 2.6) it follows from
[(f (∂) ⊗ (r + m))λ(g(∂) ⊗ (r′ + m′))]
= f (−λ)g(∂ + λ) ⊗ [r + m, r′ + m′]
= f (−λ)g(∂ + λ) ⊗ ([r, r′] + ρ(r)(m′) − (−1)r′mρ(r′)(m)).
(2.27)
By the module structure on C[∂] ⊗ M(see Example 2.10) it follows from
ρ(g(∂) ⊗ r′)−∂−λ(f (∂) ⊗ m) = g(∂ + λ)f (−λ) ⊗ ρ(r′)(m) = f (−λ)g(∂ + λ) ⊗ ρ(r′)(m).
So, by the λ-bracket on Curg ⋉ (C[∂] ⊗ M), we have
[(f (∂) ⊗ (r + m))λ(g(∂) ⊗ (r′ + m′))]
= [(f (∂) ⊗ r + f (∂) ⊗ m))λ(g(∂) ⊗ r′ + g(∂) ⊗ m′)]
= [(f (∂) ⊗ r)λ(g(∂) ⊗ r′)] + ρ(f (∂) ⊗ r)λ(g(∂) ⊗ m′))
−(−1)r′mρ(g(∂) ⊗ r′)−∂−λ(f (∂) ⊗ m))
= f (−λ)g(∂ + λ) ⊗ [r, r′] + f (−λ)g(∂ + λ) ⊗ ρ(r)(m′)
−(−1)r′mf (−λ)g(∂ + λ) ⊗ ρ(r′)(m)
= f (−λ)g(∂ + λ) ⊗ ([r, r′] + ρ(r)(m′) − (−1)r′mρ(r′)(m)).
(2.28)
By Eqs.(2.27) and (2.28), the λ-bracket on Cur(g ⋉ M) is induced by that on Curg ⋉
(C[∂] ⊗ M).
Lemma 2.21. Let R be a Lie conformal superalgebra with λ-bracket [−λ−], M a C[∂]-
module, ρ ∈ Chom(R, Cend(M)), and f ∈ Chom(M, R). Then for any r ∈ R and m ∈ M,
the following two equations are equivalent:
11
(1) fλ(ρ(r)µ(m)) = (−1)rf [rµ(fλ(m))].
(2) fλ(ρ(r)−∂−µ(m)) = −(−1)rm[(fλ(m))λ+µr].
Proof.
If fλ(ρ(r)µ(m)) = (−1)rf [rµ(fλ(m))], replacing µ by −λ − µ
′ − ∂ and using
(C1)λ, we obtain
fλ(ρ(r)−∂−µ′(m)) = −(−1)rm[(fλ(m))λ+µ′r],
that is (2) holds. The reverse conclusion follows similarly.
Lemma 2.22. Let R be a Lie conformal superalgebra with λ-bracket [−λ−], M a C[∂]-
module, ρ ∈ Chom(R, Cend(M)), f ∈ Cend(M)θ and g ∈ Cend(R)θ. Then for any r ∈ R
and m ∈ M, the following two equations are equivalent:
(1) fλ(ρ(r)µ(m)) = ρ(gλ(r))λ+µ(m) + (−1)θrρ(r)µ(fλ(m)).
(2) fλ(ρ(r)−∂−µ(m)) = ρ(gλ(r))−∂−µ(m) + (−1)θrρ(r)−∂−λ−µ(fλ(m)).
Proof.
Its proof is similar to Lemma 2.21.
Let R be a Lie conformal superalgebra, and M a conformal module of R. Hereafter
we denote C-linear maps from the C[∂]-module R ⊕ M to C[λ] ⊗ (R ⊕ M) in the following
form of matrices:
(∗)
dλ = (cid:18) d11 d12
d22 (cid:19)λ
d21
: R ⊕ M → C[λ] ⊗ (R ⊕ M), where
d11λ : R → C[λ] ⊗ R, d12λ : M → C[λ] ⊗ R,
d21λ : R → C[λ] ⊗ M, d22λ : M → C[λ] ⊗ M.
Lemma 2.23. Let R be a Lie conformal superalgebra, and M a conformal module of R.
Then d is given by (∗) is a conformal linear map of degree θ if and only if all d11, d12, d21
and d22 are conformal linear maps of degree θ.
Proof.
It is straightforward by Definition 2.7.
Theorem 2.24. Let R be a Lie conformal superalgebra with λ-bracket[−λ−], M a con-
formal module of R, and ρ : R → C[λ] ⊗ Cend(M) : r → ρ(r)λ the corresponding
representation. Then a conformal linear map dλ given by (∗) is a conformal derivation of
degree θ of R ⋉ M if and only if dλ satisfies the following conditions:
(1) d11 is a conformal derivation of degree θ of R.
(2) For any r ∈ R and m, m′ ∈ M, d12λ(ρ(r)µm) = (−1)θr[rµ(d12λm)],
ρ(d12λm)λ+µ(m′) = (−1)mm′ρ(d12λm′)−∂−µ(m).
12
(3) d21 is a conformal derivation of degree θ from R to M.
(4) For any r ∈ R and m ∈ M,
d22λ(ρ(r)µm) = ρ(d11λr)λ+µ(m) + (−1)θrρ(r)µ(d22λm).
Proof. For any r + m, r′ + m′ ∈ R ⋉ M, by Eq.(2.20), we have
dλ([(r + m)µ(r′ + m′)])
= d11λ([rµr′]) + d12λ(ρ(r)µm′) − (−1)r′md12λ(ρ(r′)−∂−µm)
+d21λ([rµr′]) + d22λ(ρ(r)µm′) − (−1)r′md22λ(ρ(r′)−∂−µm),
[(dλ(r + m))λ+µ(r′ + m′)]
= [(d11λ(r) + d12λ(m) + d21λ(r) + d22λ(m))λ+µ(r′ + m′)]
= [(d11λ(r))λ+µr′] + [(d12λ(m))λ+µr′] + ρ(d11λ(r))λ+µ(m′) + ρ(d12λ(m))λ+µ(m′)
−(−1)r′(r+θ)ρ(r′)−∂−λ−µ(d21λ(r)) − (−1)r′(m+θ)ρ(r′)−∂−λ−µ(d22λ(m))
and
(−1)θr[(r + m)µ(dλ(r′ + m′))]
= (−1)θr[(r + m)µ(d11λ(r′) + d12λ(m′) + d21λ(r′) + d22λ(m′))]
= (−1)θr[rµ(d11λ(r′))] + (−1)θr[rµ(d12λ(m′))] + (−1)θrρ(r)µ(d21λ(r′))
+(−1)θrρ(r)µ(d22λ(m′)) − (−1)rr′ρ(d11λ(r′))−∂−µ(m)
−(−1)mm′ρ(d12λ(m′))−∂−µ(m).
Suppose that dλ is a conformal derivation of degree θ of R ⋉ M. By Eq.(2.9) and
taking m = m′ = 0 in the above identities, we get
d11λ[rµr′] = [(d11λ(r))λ+µr′] + (−1)θr[rµ(d11λ(r′))],
(2.29)
d21λ[rµr′] = (−1)θrρ(r)µ(d21λ(r′)) − (−1)r′(r+θ)ρ(r′)−∂−λ−µ(d21λ(r)); (2.30)
Taking r = r′ = 0,
ρ(d12λ(m))λ+µ(m′) − (−1)mm′ρ(d12λ(m′))−∂−µ(m) = 0;
(2.31)
Taking m = 0, r′ = 0,
d12λ(ρ(r)µ(m′)) = (−1)θr[rµ(d12λ(m′))],
d22λ(ρ(r)µ(m′)) = ρ(d11λ(r))λ+µ(m′) + (−1)θrρ(r)µ(d22λ(m′));
(2.32)
(2.33)
Taking m′ = 0, r = 0,
−(−1)r′md12λ(ρ(r′)−∂−µm) = [(d12λ(m))λ+µr′],
(2.34)
d22λ(ρ(r′)−∂−µm) = ρ(d11λ(r′))−∂−µ(m) + (−1)θr′ρ(r′)−∂−λ−µ(d22λ(m)). (2.35)
By Lemmas 2.21 and 2.22, Eq.(2.32) is equivalent to Eq.(2.34), and Eq.(2.33) is equivalent
to Eq.(2.35). By Definition 2.14, Lemmas 2.21, 2.22 and 2.23, dλ is a conformal derivation
of degree θ of R ⋉ M if and only if Eqs.(2.29)-(2.35) are satisfied. Eqs.(2.29)-(2.35) are
equivalent to conditions (1) − (4) of Theorem 2.24.
13
3 Deformations of Lie conformal superalgebras
In the following we aim to develop cohomology theory of Lie conformal superalgebras. To
do this, we need the following concept.
Definition 3.1. An n-cochain (n ∈ Z+) of a Lie conformal superalgebra R with coeffi-
cients in a module M is a C-linear map of degree θ
γ : Rn → M[λ1, · · · , λn],
(a1, · · · , an)
7→ γλ1,··· ,λn(a1, · · · , an),
where M[λ1, · · · , λn] denotes the space of polynomials with coefficients in M, satisfying
the following conditions:
Conformal antilinearity:
γλ1,··· ,λn(a1, · · · , ∂ai, · · · , an) = −λiγλ1,··· ,λn(a1, · · · , ai, · · · , an);
Skew-symmetry:
γλ1,··· ,λi,··· ,λj ,··· ,λn(a1, · · · , ai, · · · , aj, · · · , an)
= −(−1)aiajγλ1,··· ,λj ,··· ,λi,··· ,λn(a1, · · · , aj, · · · , ai, · · · , an).
Let R⊗0 = C as usual, so that a 0-cochain γ is an element of M. Define a differential
d of a cochain γ by
(dγ)λ1,··· ,λn+1(a1, · · · , an+1)
n+1
=
+
Pi=1
(−1)i+1(−1)(γ+a1+···+ai−1)aiρ(ai)λiγλ1,··· , λi,··· ,λn+1(a1, · · · , ai, · · · , an+1)
P1≤i<j
(−1)i+j(−1)(a1+···+ai−1)ai+(a1+···+aj−1)aj+aiaj
n+1
γλi+λj ,λ1,··· , λi,··· ,λj ,··· ,λn+1
([aiλiaj], a1, · · · , ai, · · · , aj, · · · , an+1),
where ρ is the corresponding representation of M, and γ is extended linearly over the
polynomials in λi. In particular, if γ is a 0-cochain, then (dγ)λa = aλγ.
Remark 3.2. Conformal antilinearity implies the following relation for an n-cochain γ:
γλ+µ,λ1,···([aλb], a1, · · · ) = γλ+µ,λ1,···([a−∂−µb], a1, · · · ).
Proposition 3.3. dγ is a cochain and d2 = 0.
Proof. Let γ be an n-cochain. As discussed in the proof of [1, Lemma 2.1], dγ
satisfies conformal antilinearity and skew-symmetry. Thus dγ is an (n + 1)-cochain.
A straightforward computation shows that
(d2γ)λ1,··· ,λn+2(a1, · · · , an+2)
14
=
=
n+2
+
n+2
n+2
(−1)i+1+γai+Aiρ(ai)λi(dγ)λ1,··· ,λi,··· ,λn+2(a1, · · · , ai, · · · , an+2)
Xi=1
X1≤i<j
X1≤j<i
(−1)i+j+γ(ai+aj)+Ai+Aj ρ(ai)λi(ρ(aj)λj γλ1,··· ,λj,i,··· ,λn+2(a1, · · · , aj,i, · · · , an+2))
(−1)i+j+Ai+Aj+aiaj(dγ)λi+λj ,λ1,··· ,λi,j ,··· ,λn+2([aiλiaj], a1, · · · , ai,j, · · · , an+2)
+
n+2
X1≤i<j
(−1)i+j+1+γ(ai+aj)+Ai+(Aj−ai)
ρ(ai)λi(ρ(aj)λj γλ1,··· ,λi,j ,··· ,λn+2(a1, · · · , ai,j, · · · , an+2))
+
n+2
X1≤j<k<i
(−1)i+j+k+1+γai+Ai+Aj +Ak+ajak
ρ(ai)λiγλj+λk,λ1,··· ,λj,k,i,··· ,λn+2([aj λj
ak], a1, · · · , aj,k,i, · · · , an+2)
+
n+2
X1≤j<i<k
(−1)i+j+k+γai+Ai+Aj +(Ak−ai)+aj ak
ρ(ai)λiγλj+λk,λ1,··· ,λj,i,k,··· ,λn+2([aj λj
ak], a1, · · · , aj,i,k, · · · , an+2)
+
n+2
X1≤i<j<k
(−1)i+j+k+1+γai+Ai+(Aj −ai)+(Ak−ai)+aj ak
ρ(ai)λiγλj+λk,λ1,··· ,λi,j,k,··· ,λn+2([aj λj
ak], a1, · · · , ai,j,k, · · · , an+2)
+
n+2
X1≤k<i<j
(−1)i+j+k+Ai+Aj+Ak+aiaj +(γ+ai+aj)ak
ρ(ak)λkγλi+λj ,λ1,··· ,λk,i,j ,··· ,λn+2([aiλiaj], a1, · · · , ak,i,j, · · · , an+2)
+
n+2
X1≤i<k<j
(−1)i+j+k+1+Ai+Aj+Ak+aiaj +(γ+aj)ak
ρ(ak)λkγλi+λj ,λ1,··· ,λi,k,j ,··· ,λn+2
([aiλiaj], a1, · · · , ai,k,j, · · · , an+2)
+
n+2
X1≤i<j<k
(−1)i+j+k+Ai+Aj+Ak+aiaj +γak
ρ(ak)λkγλi+λj ,λ1,··· ,λi,j,k,··· ,λn+2
([aiλiaj], a1, · · · , ai,j,k, · · · , an+2)
+
n+2
X1≤i<j
(−1)i+j+Ai+Aj+aiaj+γ(ai+aj)
ρ([aiλiaj])λi+λj γλ1,··· ,λj ,··· ,λi,··· ,λn+2(a1, · · · , aj, · · · , ai, · · · , an+2)
15
(3.1)
(3.2)
(3.3)
(3.4)
(3.5)
(3.6)
(3.7)
(3.8)
(3.9)
n+2
+
Xdistinct i,j,k,l,i<j,k<l
(−1)i+j+k+lsign{i, j, k, l}(−1)Ai+Aj +aiaj+(ai+aj)(ak+al)
(−1)(Ak−ai−aj)+(Al−ai−aj)+akal
γλk+λl,λi+λj ,λ1,··· ,λi,j,k,l,··· ,λn+2([ak λkal], [aiλiaj], a1, · · · , ai,j,k,l, · · · , an+2)
(3.10)
+
n+2
Xi,j,k=1,i<j,k6=i,j
(−1)i+j+k+1sign{i, j, k}(−1)Ai+Aj+aiaj+(Ak−ai−aj)
γλi+λj +λk,λ1,··· ,λi,j,k,··· ,λn+2([[aiλiaj]λi+λj ak], a1, · · · , ai,j,k, · · · , an+2),
(3.11)
where Ai = (a1 + · · · + ai−1)ai, Aj − ai = (a1 + · · · + ai + · · · + aj−1)aj and
sign{i1, · · · , ip} is the sign of the permutation putting the indices in increasing order and
ai,j,··· means that ai, aj, · · · are omitted.
It is obvious that Eqs.(3.3) and (3.8) summations cancel each other. The same is
true for Eqs.(3.4) and (3.7), (3.5) and (3.6). The Jacobi identity implies Eq.(3.11) = 0,
whereas skew-symmetry of γ gives Eq.(3.10) = 0. As M is an R-module,
−ρ(ai)λi(ρ(aj)λj m) + (−1)aiajρ(aj)λj (ρ(ai)λim) + ρ([aiλiaj])λi+λj (m) = 0.
Eqs.(3.1), (3.2) and (3.9) summations cancel. This proves d2γ = 0.
Thus the cochains of a Lie conformal superalgebra R with coefficients in a module
M form a comlex, which is denoted by
C• = C•(R, M) = Mn∈Z+
Cn(R, M).
Where Cn(R, M) = Cn(R, M)¯0 ⊕Cn(R, M)¯1, C n(R, M)θ is the set of n-cochain of degree θ
(θ ∈ Z2). The cohomology H•(R, M) of a Lie conformal superalgebra R with coefficients
in a module M is the cohomology of complex C•.
Let R be a Lie conformal superalgebra. Define
ρ(a)λb = [aλb], ∀ a, b ∈ R.
(3.12)
Proposition 3.4. (ρ, R) is a representation with the λ-action given in Eq.(3.12).
Proof.
It only consists of checking the axioms from Definition 2.9.
Let γ ∈ C n(R, R). Define an operator d : C n(R, R) → C n+1(R, R) by
(dγ)λ1,··· ,λn+1(a1, · · · , an+1)
n+1
=
Xi=1
(−1)i+1(−1)(γ+a1+···+ai−1)ai[aiλiγλ1,··· , λi,··· ,λn+1
(a1, · · · , ai, · · · , an+1)]
16
+
n+1
X1≤i<j
(−1)i+j(−1)(a1+···+ai−1)ai+(a1+···+aj−1)aj +aiaj
γλi+λj ,λ1,··· , λi,··· ,λj ,··· ,λn+1([aiλiaj], a1, · · · , ai, · · · , aj, · · · , an+1).
Obviously, the operator d is induced from the differential d. Thus d preserves the space
of cochains and satisfies d2 = 0. In the following the complex C •(R, R) is assumed to be
associated with the differential d.
For ψ ∈ C 2(R, R)¯0, we consider a t-parameterized family of bilinear operations on R
[aλb]t = [aλb] + tψλ,−∂−λ(a, b), ∀ a, b ∈ R.
(3.13)
If [·λ·]t endows (R, [·λ·]t, α) with a Lie conformal superalgebra structure, we say that ψ
generates a deformation of the Lie conformal superalgebra R. It is easy to see that [·λ·]t
satisfies (C1)λ and (C2)λ. If it is true for (C3)λ, expanding the Jacobi identity for [·λ·]t
gives
[aλ[bµc]] + t([aλ(ψµ,−∂−µ(b, c))] + ψλ,−∂−λ(a, [bµc]))
+t2ψλ,−∂−λ(a, ψµ,−∂−µ(b, c))
= (−1)ab[bµ[aλc]] + (−1)abt([bµ(ψλ,−∂−λ(a, c))] + ψµ,−∂−µ(b, [aλc]))
+(−1)abt2ψµ,−∂−µ(b, ψλ,−∂−λ(a, c))
+[[aλb]λ+µc] + t([(ψλ,−∂−λ(a, b))λ+µc] + ψλ+µ,−∂−λ−µ([aλb], c))
+t2ψλ+µ,−∂−λ−µ(ψλ,−∂−λ(a, b), c).
This is equivalent to the following relations
[aλ(ψµ,−∂−µ(b, c))] + ψλ,−∂−λ(a, [bµc])
= (−1)ab[bµ(ψλ,−∂−λ(a, c))] + (−1)abψµ,−∂−µ(b, [aλc])
+[(ψλ,−∂−λ(a, b))λ+µc] + ψλ+µ,−∂−λ−µ([aλb], c)
(3.14)
and
ψλ,−∂−λ(a, ψµ,−∂−µ(b, c))
= (−1)abψµ,−∂−µ(b, ψλ,−∂−λ(a, c)) + ψλ+µ,−∂−λ−µ(ψλ,−∂−λ(a, b), c).
(3.15)
By conformal antilinearity of ψ, we have
[(ψλ,−∂−λ(a, b))λ+µc] = [ψλ,µ(a, b)λ+µc].
(3.16)
On the other hand, let ψ be a cocycle, i.e., dψ = 0. Explicitly,
0 = (dψ)λ,µ,γ(a, b, c)
= [aλ(ψµ,γ(b, c))] − (−1)ab[bµ(ψλ,γ(a, c))] + (−1)(a+b)c[cγ(ψλ,µ(a, b))]
−ψλ+µ,γ([aλb], c) + (−1)bcψλ+γ,µ([aλc], b) − (−1)ab+acψµ+γ,λ([bµc], a)
17
= [aλ(ψµ,γ(b, c))] − (−1)ab[bµ(ψλ,γ(a, c))] − [(ψλ,µ(a, b))−∂−γc]
+ψλ,µ+γ(a, [bµc]) − (−1)abψµ,λ+γ(b, [aλc]) − ψλ+µ,γ([aλb], c).
(3.17)
By (C1)λ, Eq.(3.16) and replacing γ by −λ − µ − ∂ in Eq.(3.17), we obtain
0 = [aλ(ψµ,−∂−µ(b, c))] − (−1)ab[bµ(ψλ,−∂−λ(a, c))] − [(ψλ,µ(a, b))λ+µc]
+ψλ,−∂−λ(a, [bµc]) − (−1)abψµ,−∂−µ(b, [aλc]) − ψλ+µ,−∂−λ−µ([aλb], c),
which is exactly Eq.(3.14). Thus, when ψ is a 2-cocycle satisfying Eq.(3.15), (R, [·λ·]t, α)
forms a Lie conformal superalgebra. In this case, ψ generates a deformation of the Lie
conformal superalgebra R.
A deformation is said to be trivial if there is a linear operator f ∈ C 1(R, R)¯0 such
that for Ttλ = id + tfλ, there holds
Tt−∂([aλb]t) = [(Ttλ(a))λTt−∂(b)], ∀ a, b ∈ R.
Definition 3.5. A linear operator f ∈ C 1(R, R)¯0 is called a Nijienhuis operator if
[(fλ(a))λ(fµ(b))] = fλ+µ([aλb]N ), ∀ a, b ∈ R,
where the bracket [·λ·]N is defined by
(3.18)
(3.19)
[aλb]N = [(fλ(a))λb] + [aλ(f−∂(b))] − f−∂([aλb]) ∀ a, b ∈ R.
(3.20)
Remark 3.6. In particular, by (C1)λ and setting µ = −∂ − λ in Eq.(3.19), we obtain
[(fλ(a))λf−∂(b)] = f−∂([aλb]N ), ∀ a, b ∈ R.
(3.21)
Theorem 3.7. Let R be a Lie conformal superalgebra, and f ∈ C 1(R, R)¯0 a Nijienhuis
operator. Then a deformation of R can be obtained by putting
ψλ,−∂−λ(a, b) := (df )λ,−∂−λ(a, b) = [aλb]N , ∀ a, b ∈ R.
(3.22)
Furthermore, this deformation is trivial.
Proof. Since ψ = df , dψ = 0 is valid. To see that ψ generates a deformation of R,
we need to check Eq.(3.15) for ψ. By Eqs.(3.20) and (3.22), we compute and get
ψλ,−∂−λ(a, ψµ,−∂−µ(b, c)) = [aλ[bµc]N ]N
= [(fλ(a))λ([bµc]N )] + [aλ(f−∂([bµc]N ))] − f−∂([aλ[bµc]N ])
= [(fλ(a))λ[(fµ(b))µc]] + [(fλ(a))λ[bµ(f−∂(c))]] − [(fλ(a))λ(f−∂([bµc]))] + [aλ(f−∂([bµc]N ))]
−f−∂([aλ[(fµ(b))µc]]) − f−∂([aλ[bµ(f−∂(c))]]) + f−∂([aλ(f−∂([bµc]))])
= [(fλ(a))λ[(fµ(b))µc]]
+ [(fλ(a))λ[bµ(f−∂(c))]]
−[(fλ(a))λ(f−∂([bµc]))] + [aλ[(fµ(b))µ(f−∂(c))]]
−f−∂([aλ[(fµ(b))µc]])
−f−∂([aλ[bµ(f−∂(c))]])
+f−∂([aλ(f−∂([bµc]))]).
(3)
{z
}
(1)
{z
{z
(4)
}
}
(2)
{z
{z
(5)
}
}
18
In the same way, we have
(−1)abψµ,−∂−µ(b, ψλ,−∂−λ(a, c))
= (−1)ab[(fµ(b))µ[(fλ(a))λc]]
+ (−1)ab[(fµ(b))µ[aλ(f−∂(c))]]
−(−1)ab[(fµ(b))µ(f−∂([aλc]))] + (−1)ab[bµ[(fλ(a))λ(f−∂(c))]]
−(−1)abf−∂([bµ[(fλ(a))λc]])
−(−1)abf−∂([bµ[aλ(f−∂(c))]])
}
}
(3)′
{z
(2)′
{z
}
}
(5)′
{z
}
+(−1)abf−∂([bµ(f−∂([aλc]))])
and
ψλ+µ,−∂−λ−µ(ψλ,−∂−λ(a, b), c)
= [(fλ+µ([aλb]N ))λ+µc] + [([aλb]N )λ+µ(f−∂(c))] − f−∂([([aλb]N )λ+µ)c])
= [[(fλ(a))λ(fµ(b))]λ+µc]
(1)′′
{z
(2)′′
{z
+ [[(fλ(a))λb]λ+µ(f−∂(c))]
+ [[aλ(f−∂(b))]λ+µ(f−∂(c))]
−[(f−∂([aλb]))λ+µ(f−∂(c))]
−f−∂([(fλ(a))λb]λ+µc])
−f−∂([[aλ(f−∂(b))]λ+µ
c]) + f−∂([(f−∂([aλb]))λ+µc]).
}
(3)′′
{z
}
(1)′
{z
(6)′
{z
}
(6)′′
{z
}
(4)′′
{z
}
Since f is a Nijienhuis operator and by Eq.(3.21), we get
−[(fλ(a))λ(f−∂([bµc]))] + f−∂([aλ(f−∂([bµc]))])
= −f−∂([(fλ(a))λ[bµc]])
+ f 2
−∂([aλ[bµc]])
,
(6)
{z
}
(7)
{z
}
−(−1)ab[(fµ(b))µ(f−∂([aλc]))] + (−1)abf−∂([bµ(f−∂([aλc]))])
= −(−1)abf−∂([(fµ(b))µ[aλc]])
+ (−1)abf 2
−∂([bµ[aλc]])
.
(4)′
{z
}
(7)′
{z
}
By (C1)λ and Eq.(3.21),
−[(f−∂([aλb]))λ+µ(f−∂(c))] + f−∂([(f−∂([aλb]))λ+µc])
= −[(fλ+µ([aλb]))λ+µ(f−∂(c))] + f−∂([(fλ+µ([aλb]))λ+µc])
= −f−∂([[aλb]λ+µ(f−∂(c))])
−∂([[aλb]λ+µc])
+ f 2
.
(5)′′
{z
}
(7)′′
{z
}
Note that according to the Jacobi identity and (C1)λ for a, b, c ∈ R,
[aλ[(fµ(b))µ(f−∂(c))]] = [[aλfµ(b)]λ+µ(f−∂(c))] + (−1)ab[(fµ(b))µ[aλ(f−∂(c))]]
19
is equivalent to
[aλ[(fµ(b))µ(f−∂(c))]] = [[aλf−∂(b)]λ+µ(f−∂(c))] + (−1)ab[(fµ(b))µ[aλ(f−∂(c))]].
Thus (i) + (i)′ + (i)′′ = 0, for i = 1, · · · , 7. This proves that ψ generates a deformation of
the Lie conformal superalgebra R.
Let Ttλ = id + tfλ. By Eqs.(3.13) and (3.22),
Tt−∂([aλb]t) = (id + tf−∂)([aλb] + tψλ,−∂−λ(a, b))
= (id + tf−∂)([aλb] + t[aλb]N )
= [aλb] + t([aλb]N + f−∂([aλb])) + t2f−∂([aλb]N ).
(3.23)
Furthermore,
[(Ttλ(a))λTt−∂(b)] = [(a + tfλ(a))λ(b + tf−∂(b))]
= [aλb] + t([(fλ(a))λb] + [aλ(f−∂(b))]) + t2[(fλ(a))λf−∂(b)].(3.24)
Combining Eqs.(3.23) with (3.24) gives Tt−∂([aλb]t) = [(Ttλ(a))λTt−∂(b)]. Therefore the
deformation is trivial.
4 Generalized derivations of Lie conformal superal-
gebras
Let R be a Lie conformal superalgebra. Define Der(R)θ is the set of all derivations of
degree θ, then it is obvious that Der(R) = Der(R)¯0 ⊕Der(R)¯1 is a subalgebra of Cend(R).
Definition 4.1. An element f in Cend(R)θ is called
• a generalized derivation of degree θ of R, if there exist f
′
, f
′′ ∈ Cend(R)θ such that
[(fλ(a))λ+µb] + (−1)θa[aµ(f
′
λ(b))] = f
λ ([aµb]), ∀ a, b ∈ R.
• an quasiderivation of degree θ of R, if there is f
′ ∈ Cend(R)θ such that
[(fλ(a))λ+µb] + (−1)θa[aµ(fλ(b))] = f
λ([aµb]), ∀ a, b ∈ R.
• an centroid of degree θ of R, if it satisfies
[(fλ(a))λ+µb] = (−1)θa[aµ(fλ(b))] = fλ([aµb]), ∀ a, b ∈ R.
(4.3)
• an quasicentroid of degree θ of R, if it satisfies
[(fλ(a))λ+µb] = (−1)θa[aµ(fλ(b))], ∀ a, b ∈ R.
(4.4)
20
′′
′
(4.1)
(4.2)
• an central derivation of degree θ of R, if it satisfies
[(fλ(a))λ+µb] = fλ([aµb]) = 0, ∀ a, b ∈ R.
(4.5)
Denote by GDer(R)θ, QDer(R)θ, C(R)θ, QC(R)θ and ZDer(R)θ the sets of all gen-
eralized derivations, quasiderivations, centroids, quasicentroids and central derivations of
degree θ of R. It is easy to see that
ZDer(R) ⊆ Der(R) ⊆ QDer(R) ⊆ GDer(R) ⊆ Cend(R), C(R) ⊆ QC(R) ⊆ GDer(R).
(4.6)
Proposition 4.2. Let R be a Lie conformal superalgebra. Then
(1) GDer(R), QDer(R) and C(R) are subalgebras of Cend(R).
(2) ZDer(R) is an ideal of Der(R).
Proof.
(1) We only prove that GDer(R) is a subalgebra of Cend(R). The proof for
the other two cases is exactly analogous.
For f ∈ GDer(R)σ, g ∈ GDer(R)ϑ, a, b ∈ R, there exist f
′′ ∈ GDer(R)ϑ ) such that Eq.(4.1) holds for f (resp. g). We only need to show
, f
′′ ∈ GDer(R)σ (resp.
′
′
g
, g
′′
[f
′′
λ g
]θ([aµb]) = [([fλg]θ(a))µ+θb] + (−1)(σ+ϑ)a[aµ([f
′
λg
′
]θ(b))].
(4.7)
By Eq.(2.8), we have
[([fλg]θ(a))µ+θb] = [(fλ(gθ−λ(a)))µ+θb] − (−1)σϑ[(gθ−λ(fλ(a)))µ+θb].
(4.8)
By Eq.(4.1), we obtain
= f
= f
= g
= g
′
′′
′′
′′
′′
′′
λ ([aµ(g
θ−λ(b))])
θ−λ([aµb])) − (−1)ϑaf
[(fλ(gθ−λ(a)))µ+θb]
λ ([(gθ−λ(a))µ+θ−λb]) − (−1)σ(ϑ+a)[(gθ−λ(a))µ+θ−λ(f
λ (g
−(−1)σ(ϑ+a)g
[(gθ−λ(fλ(a)))µ+θb]
θ−λ([(fλ(a))λ+µb]) − (−1)ϑ(σ+a)[fλ(a)λ+µ(g
θ−λ(f
−(−1)ϑ(σ+a)f
λ(b))]) + (−1)σ(ϑ+a)+ϑa[aµ(g
θ−λ(b))]) + (−1)ϑ(σ+a)+σa[aµ(f
λ ([aµb])) − (−1)σag
θ−λ([aµ(f
λ(b))])
θ−λ([aµ(f
θ−λ(b))]
λ ([aµ(g
′′
′′
′′
′′
′′
′
′
′
′
′
λ(b))]
′
′
θ−λ(f
λ(b)))],
(4.9)
′
λ(g
′
θ−λ(b))).
(4.10)
Substituting Eqs.(4.9) and (4.10) into Eq.(4.8) gives Eq.(4.7). Hence [fλg] ∈ GDer(R)[λ],
and GDer(R) is a subalgebra of Cend(R).
(2) For f ∈ ZDer(R), g ∈ Der(R), and a, b ∈ R, by Eq.(4.5), we have
[fλg]θ([aµb]) = fλ(gθ−λ([aµb])) − (−1)f ggθ−λ(fλ([aµb])) = fλ(gθ−λ([aµb]))
21
= fλ([(gθ−λ(a))µ+θ−λb] + (−1)ag[aµ(gθ−λ(b))]) = 0,
[[fλg]θ(a)µ+θb] = [(fλ(gθ−λ(a)) − (−1)f ggθ−λ(fλ(a)))µ+θb]
= [−(−1)f g(gθ−λ(fλa)))µ+θb]
= −(−1)f ggθ−λ([fλ(a)λ+µb]) + (−1)ga[fλ(a)λ+µgθ−λ(b)]
= 0.
This shows that [fλg] ∈ ZDer(R)[λ]. Thus ZDer(R) is an ideal of Der(R).
Lemma 4.3. Let R be a Lie conformal superalgebra. Then
(1) [Der(R)λC(R)] ⊆ C(R)[λ],
(2) [QDer(R)λQC(R)] ⊆ QC(R)[λ],
(3) [QC(R)λQC(R)] ⊆ QDer(R)[λ].
Proof.
It is straightforward.
Theorem 4.4. Let R be a Lie conformal superalgebra. Then
GDer(R) = QDer(R) + QC(R).
Proof. For f ∈ GDer(R)θ, there exist f
′
, f
′′ ∈ Cend(R)θ such that
[(fλ(a))λ+µb] + (−1)θa[aµ(f
′
λ(b))] = f
λ ([aµb]), ∀ a, b ∈ R.
′′
By (C2)λ and Eq.(4.11), we get
(−1)θb[b−∂−λ−µ(fλ(a))] + [(f
′
λ(b))−∂−µa] = f
λ ([b−∂−µa]).
′′
By (C1)λ and setting µ = −∂ − λ − µ′ in Eq.(4.12), we obtain
(−1)θb[bµ′(fλ(a))] + [(f
λ(b))λ+µ′a] = f
λ ([bµ′ a]).
Then, changing the place of a, b and replacing µ′ by µ in Eq.(4.13) give
′
′
′′
′′
(−1)θa[aµ(fλ(b))] + [(f
λ(a)))λ+µb] = f
λ ([aµb]).
(4.11)
(4.12)
(4.13)
(4.14)
Combining Eqs.(4.11) and (4.14) gives
[(
[(
′
fλ + f
λ
2
′
fλ − f
λ
2
(a))λ+µb] + (−1)θa[aµ(
(a))λ+µb] − (−1)θa[aµ(
′
fλ + f
λ
2
′
fλ − f
λ
2
(b))] = f
λ ([aµb]),
′′
(b))] = 0.
It follows that fλ+f
2 ∈ QDer(R) and fλ−f
2 ∈ QC(R). Hence
′
λ
′
λ
fλ =
′
fλ + f
λ
2
+
′
fλ − f
λ
2
∈ QDer(R) + QC(R),
proving that GDer(R) ⊆ QDer(R) + QC(R). The reverse inclusion relation follows from
Eq.(4.6) and Lemma 4.3.
22
Theorem 4.5. Let R be a Lie conformal superalgebra and Z(R) the center of R. Then
[C(R)λQC(R)] ⊆ Chom(R, Z(R))[λ]. Moreover, if Z(R) = 0, then [C(R)λQC(R)] = 0.
Proof. For f ∈ C(R), g ∈ QC(R), and a, b ∈ R, by Eqs.(4.3)and (4.4), we have
[([fλg]θ(a))µ+θb] = [(fλ(gθ−λ(a)))µ+θb] − (−1)f g[(gθ−λ(fλ(a)))µ+θb]
= fλ([(gθ−λ(a))µ+θ−λb]) − (−1)f g+g(f +a)[(fλ(a))λ+µ(gθ−λ(b))]
= fλ([(gθ−λ(a))µ+θ−λb]) − (−1)gafλ([aµ(gθ−λ(b))])
= fλ([(gθ−λ(a))µ+θ−λb] − (−1)ga[aµ(gθ−λ(b))])
= 0.
Hence [fλg](a) ∈ Z(R)[λ], and then [fλg] ∈ Chom(R, Z(R))[λ].
[fλg](a) = 0, ∀ a ∈ hg(R). Thus [C(R)λQC(R)] = 0.
If Z(R) = 0, then
Lemma 4.6. Let R be a Lie conformal superalgebra. If f ∈ QC(R)θ ∩ QDer(R)θ and
f, f ′ satisfy Eq.(4.2), then we have
[aλ(fγ([bµc]))] = [aλ[(fγ(b))µ+γc]] = (−1)θb[aλ[bµ(fγ(c))]].
Proof. Let f ′ = 2ϕ. Since f ∈ QC(R)θ ∩ QDer(R)θ and f, f ′ satisfy Eq.(4.2), we
get
[(fγ(a))λ+γb] = (−1)θa[aλ(fγ(b))],
ϕγ([aλb]) =
1
2
f ′
γ([aλb]) =
1
2
([(fγ(a))λ+γb] + (−1)θa[aλ(fγ(b))])
= [(fγ(a))λ+γb] = (−1)θa[aλ(fγ(b))].
(4.15)
By Eq.(4.15), we have
[(ϕγ([aλb]))λ+µ+γc] = [[(fγ(a))λ+γb]λ+µ+γc]
= [(fγ(a))λ+γ[bµc]] − (−1)(θ+a)b[bµ[(fγ(a))λ+γc]]
= [(fγ(a))λ+γ[bµc]] + (−1)bc[[(fγ(a))λ+γc]−∂−µb]
= ϕγ([aλ[bµc]]) + (−1)bc[(ϕγ([aλc])−∂−µb]
= ϕγ([aλ[bµc]]) − (−1)(a+b)c[(ϕγ([c−∂−λa])−∂−µb],
(4.16)
it is equivalent to
(−1)ac[(ϕγ([aλb]))λ+µ+γc] + (−1)bc[(ϕγ([c−∂−λa])−∂−µb] = (−1)acϕγ([aλ[bµc]]).(4.17)
On the one hand, by (C1)λ and setting µ = −∂ − λ − γ − µ′ in Eq.(4.17), we obtain
(−1)ac[(ϕγ([aλb]))−∂−µ′c] + (−1)bc[ϕγ([c−∂−λa])λ+γ+µ′ b] = (−1)acϕγ([aλ[b−∂−µ′ c]]),
it is equivalent to
(−1)ac[ϕγ([aλb])−∂−µ′ c] + (−1)bc[ϕγ([cµ′a])λ+γ+µ′b] = (−1)acϕγ([aλ[b−∂−µ′ c]]).(4.18)
23
By (C1)λ and setting λ = −∂ − λ′ − γ − µ′ in Eq.(4.18), we get
(−1)ac[ϕγ([a−∂−λ′b])−∂−µ′ c] + (−1)bc[ϕγ([cµ′a])−∂−λ′b]
= (−1)acϕγ([a−∂−λ′−µ′[b−∂−µ′c]]).
(4.19)
On the other hand, replacing µ, λ by λ, µ in Eq.(4.17) give
(−1)ac[(ϕγ([aµb]))λ+µ+γc] + (−1)bc[(ϕγ([c−∂−µa])−∂−λb] = (−1)acϕγ([aµ[bλc]]).(4.20)
By (C1)λ and setting λ = −∂ − λ′ − γ − µ in Eq.(4.20), we get
(−1)ac[(ϕγ([aµb]))−∂−λ′c] + (−1)bc[(ϕγ([c−∂−µa])λ′+γ+µb] = (−1)acϕγ([aµ[b−∂−λ′c]]),
it is equivalent to
(−1)ac[(ϕγ([aµb]))−∂−λ′c] + (−1)bc[(ϕγ([cλ′a])λ′+γ+µb] = (−1)acϕγ([aµ[b−∂−λ′c]]).(4.21)
By Eqs.(4.17), (4.19) and (4.21), we have
2((−1)ac[(ϕγ([aλb]))λ+µ+γc] + (−1)bc[(ϕγ([c−∂−λa])−∂−µb]
+(−1)ab[(ϕγ([bµc]))−∂−λa])
= (−1)ac[(ϕγ([aλb]))λ+µ+γc] + (−1)bc[(ϕγ([c−∂−λa])−∂−µb]
+(−1)bc[(ϕγ([c−∂−λa])−∂−µb] + (−1)ab[(ϕγ([bµc]))−∂−λa]
+(−1)ab[(ϕγ([bµc]))−∂−λa] + (−1)ac[(ϕγ([aλb]))λ+µ+γc]
= (−1)acϕγ([aλ[bµc]]) + (−1)bcϕγ([c−∂−λ−µ[a−∂−µb]]) + (−1)abϕγ([bµ[c−∂−λa]])
= (−1)acϕγ([aλ[bµc]]) + (−1)bcϕγ([c−∂−λ−µ[aλb]]) + (−1)abϕγ([bµ[c−∂−λa]])
= 0,
so
(−1)ac[(ϕγ([aλb]))λ+µ+γc] + (−1)bc[(ϕγ([c−∂−λa])−∂−µb]
+(−1)ab[(ϕγ([bµc]))−∂−λa] = 0.
(4.22)
Combining Eqs.(4.17) with (4.22), we get
(−1)acϕγ([aλ[bµc]]) = −(−1)ab[(ϕγ([bµc]))−∂−λa] = (−1)ac+θa[aλ(ϕγ([bµc]))],
that is
ϕγ([aλ[bµc]]) = (−1)θa[aλ(ϕγ([bµc]))].
(4.23)
By Eqs.(4.23) and (4.15), we obtain
[aλ(fγ([bµc]))] = (−1)θaϕγ([aλ[bµc]] = [aλ(ϕγ([bµc]))]
= [aλ[(fγ(b))µ+γc]] = (−1)θb[aλ[bµ(fγ(c))]].
This shows the lemma.
24
Lemma 4.7. Let R be a Lie conformal superalgebra. If f ∈ QC(R)θ ∩ QDer(R)θ and
Z(R) = 0, then f ∈ C(R)θ.
Proof.
It is straightforward by Lemma 4.6.
Theorem 4.8. Let R be a Lie conformal superalgebra.
QDer(R) = C(R).
If Z(R) = 0, then QC(R) ∩
Proof. C(R) ⊆ QC(R) ∩ QDer(R) is obvious. By Lemma 4.7, if Z(R) = 0, we have
QC(R)θ ∩ QDer(R)θ ⊆ C(R)θ. So QC(R) ∩ QDer(R) = C(R).
Proposition 4.9. Let R be a Lie conformal superalgebra. If Z(R) = 0, then QC(R) is a
Lie conformal superalgebra if and only if [QC(R)λQC(R)] = 0.
Proof.
(⇒) Suppose that QC(R) is a Lie conformal superalgebra. For f ∈ QC(R)θ, g ∈
QC(R)ϑ, [fλg] ∈ QC(R)θ+ϑ[λ]. For a, b ∈ R, by Eq.(4.4), we have
[([fλg]θ(a))µ+θb] = (−1)(θ+ϑ)a[aµ([fλg]θ(b))].
(4.24)
By Eqs.(2.8) and (4.4), we obtain
[([fλg]θ(a))µ+θb]
= [(fλ(gθ−λ(a)))µ+θb] − (−1)θϑ[(gθ−λ(fλ(a)))µ+θb]
= (−1)θ(ϑ+a)[(gθ−λ(a))µ+θ−λ(fλ(b))] − (−1)θϑ+ϑ(θ+a)[(fλ(a))λ+µ(gθ−λ(b))]
= (−1)θ(ϑ+a)+ϑa[aµ(gθ−λ(fλ(b)))] − (−1)θϑ+ϑ(θ+a)+θa[aλ(fλ(gθ−λ(b)))]
= −(−1)(ϑ+θ)a[aµ([fλg]θ(b))].
(4.25)
Combining Eqs.(4.24) and (4.25) gives
[([fλg]θ(a))µ+θb] = 0,
and thus [fλg]θ(a) ∈ Z(R)[λ] = 0(Z(R) = 0). Therefore, [fλg] = 0.
(⇐) It is clear.
References
[1] B. Bakalov, V. Kac, A. Voronov, Cohomology of conformal algebras, Comm. Math.
Phys. 200 (1999), no. 3, 561-598.
[2] C. Boyallian, V. Kac, J. Liberati, A. Rudakov, Representations of simple finite Lie
conformal superalgebras of type W and S. J. Math. Phys. 47 (2006), no. 4, 043513,
25 pp.
[3] Z. Chang, Automorphisms and twisted forms of differential lie conformal superalge-
bras. Thesis (Ph.D.)-University of Alberta (Canada). 2013. 117 pp.
25
[4] A. D'Andrea, V. Kac, Structure theory of finite conformal algebras, Selecta Math.
(N.S.) 4 (1998), no. 3, 377-418.
[5] D. Fattori, V. Kac, A. Retakh, Structure theory of finite Lie conformal superalgebras.
Lie theory and its applications in physics V, 27-63, World Sci. Publ., River Edge, NJ,
2004.
[6] G. Fan, Y. Hong, Y. Su, Generalized conformal derivations of Lie conformal algebras,
arXiv:1602.01159 (2016).
[7] J. Guo, Y. Tan, Conformal derivations of semidirect products of Lie conformal al-
gebras and their conformal modules. Proc. Amer. Math. Soc. 142 (2014), no. 5,
1471C1483.
[8] G. Leger, E. Luks, Generalized derivations of Lie algebras, J. Algebra, 228 (2000)
165-203.
[9] Y. Liu, L. Chen, Y. Ma, Hom-Nijienhuis operators and T *-extensions of hom-Lie
superalgebras, Linear Algebra Appl. 439 (2013), no. 7, 2131-2144.
26
|
1004.1125 | 1 | 1004 | 2010-04-07T16:29:21 | Special Freudenthal-Kantor triple systems and Lie algebras with dicyclic symmetry | [
"math.RA"
] | Lie algebras endowed with an action by automorphisms of the dicyclic group of degree 3 are considered. The close connections of these algebras with Lie algebras graded over the nonreduced root system BC1, with J-ternary algebras and with Freudenthal-Kantor triple systems are explored. | math.RA | math |
SPECIAL FREUDENTHAL-KANTOR TRIPLE SYSTEMS
AND LIE ALGEBRAS WITH DICYCLIC SYMMETRY
ALBERTO ELDUQUE⋆ AND SUSUMU OKUBO⋆⋆
Abstract. Lie algebras endowed with an action by automorphisms of
the dicyclic group of degree 3 are considered. The close connections of
these algebras with Lie algebras graded over the nonreduced root sys-
tem BC1, with J-ternary algebras and with Freudenthal-Kantor triple
systems are explored.
1. Introduction
Gradings of Lie algebras by abelian groups constitute a classical subject
(see [Koc09] for a survey of results). In characteristic 0, any grading by a
finitely generated abelian group is given by an action by automorphisms of
an abelian group (the group of characters) on the Lie algebra.
Recently the authors have considered actions of some small nonabelian
groups by automorphisms on a Lie algebra. More precisely, and motivated
by the Principle of Triality that appears related to the classical Lie algebra
of type D4, Lie algebras with an action of the symmetric groups S3 and
S4 by automorphisms were considered in [EO07], [Eld07], [EO08], [EO09].
It turns out that Lie algebras with an action of S4 by automorphisms are
coordinatized by some nonassociative algebras [EO07]. The unital algebras
in this class are precisely the structurable algebras of Allison [All78]. The
Lie algebras with an action of S3 by automorphisms are coordinatized by
a class of algebras which generalize the Malcev algebras [EO09]. These are
some binary-ternary algebras termed generalized Malcev algebras. Jordan
triple systems are instances of these generalized Malcev algebras.
As proved in [EO08, Section 7], the Lie algebras graded by the nonreduced
root system BC1 of type B1 are naturally among the Lie algebras with S4-
symmetry (that is, with an action of S4 by automorphisms).
The Lie algebras graded by the nonreduced root system BC1 but of type
C1 present another type of symmetry given by the dicyclic group
Dic3 = hθ, φ : θ4 = 1 = φ3, φθφ = θi.
Our aim in this paper is to study those Lie algebras with such a symmetry.
It will be shown that Lie algebras with Dic3-symmetry are strongly related
to the BC1-graded Lie algebras of type C1, to the class of J-ternary algebras
introduced in [All76], and to the Freudenthal-Kantor triple systems defined
Date: April 7, 2010.
⋆ Supported by the Spanish Ministerio de Educaci´on y Ciencia and FEDER (MTM
2007-67884-C04-02) and by the Diputaci´on General de Arag´on (Grupo de Investigaci´on
de ´Algebra).
⋆⋆ Supported in part by U.S. Department of Energy Grant No. DE-FG02-91 ER40685.
1
2
ALBERTO ELDUQUE AND SUSUMU OKUBO
in [YO84]. Moreover, these Lie algebras are coordinatized by elements in
a class of nonassociative algebraic systems consisting of binary-ternary al-
gebras endowed with an involutive automorphism which will be introduced
here and named dicyclic ternary algebras.
In Section 2 the Lie algebras graded over the nonreduced root system
BC1 of type C1 will be reviewed, as well as their connections with J-ternary
algebras. These J-ternary algebras are closely connected with a subclass of
the Freudenthal-Kantor triple systems introduced by Yamaguti and Ono in
[YO84]. This subclass will be defined in Section 3 and has its own indepen-
dent interest.
Most of the arguments can be superized and a class of strictly BC1-graded
Lie superalgebras of type C1 will be considered in Section 4, as well as the
associated J-ternary (−1)-algebras and (−1, −1) Freudenthal-Kantor triple
systems.
Section 5 will introduce the dicyclic ternary algebras, which coordina-
tize the Lie algebras with dicyclic symmetry. The dicyclic ternary algebras
attached to J-ternary algebras will be the object of study of Section 6. Fi-
nally, Section 7 will be devoted to show that the 5-graded Lie algebra (or
superalgebra) attached to any (ǫ, δ) Freudenthal-Kantor triple system (not
necessarily special) is always endowed with an action of Dic3 by automor-
phisms. For δ = −ǫ this action reduces to an action of the symmetric group
S3. For ǫ = δ = 1 we get Lie algebras with Dic3-symmetry whose attached
dicyclic ternary algebra is computed.
Throughout the paper all the algebraic systems considered will be defined
over a ground field F whose characteristic will always be assumed to be
6= 2, 3.
2. BC1-graded Lie algebras of type C1
and J -ternary algebras
The purpose of this section is to review the relationship between Lie
algebras graded over the non reduced root system BC1 of type C1, and a
class of nonassociative algebraic systems named J-ternary algebras. This
goes back to [All76] (see [Hei75] and [Kan73] for closely related work). It
must be mentioned that the Lie algebras graded by the root system BC1 (of
any type) are characterized in [BS03], which completes the work in [ABG],
The proof given here is different from the one in [All76].
Let g be a Lie algebra over F containing a subalgebra isomorphic to sl(V ),
for a two-dimensional vector space V over F (that is, a subalgebra isomorphic
to sl2(F)), and such that, as a module for sl(V ), the Lie algebra g is a direct
sum of modules which are either trivial, or isomorphic to V , or to the adjoint
module sl(V ). These are precisely the required conditions for g to be a BC1-
graded Lie algebra of type C1.
Then, as a module for sl(V ), we may write:
where d s the sum of the trivial modules (this is the centralizer in g of the
subalgebra sl(V ) = sl(V ) ⊗ 1, and hence it is a subalgebra), and J and T
g =(cid:0)sl(V ) ⊗ J(cid:1) ⊕(cid:0)V ⊗ T(cid:1) ⊕ d,
(2.1)
SPECIAL FREUDENTHAL-KANTOR TRIPLE SYSTEMS
3
are vector spaces, with J containing a distinguished element 1, such that
sl(V ) ⊗ 1 is the subalgebra sl(V ) we have started with.
In the following lemma we collect some well-known results. Unadorned
tensor products are always considered over the ground field F.
Lemma 2.1. Let V be a two-dimensional vector space.
(i) The skew symmetric map sl(V ) ⊗ sl(V ) → sl(V ), f ⊗ g 7→ [f, g] =
f g − gf , spans the space of sl(V )-invariant maps Homsl(V )(sl(V ) ⊗
sl(V ), sl(V )).
(ii) The symmetric map sl(V ) ⊗ sl(V ) → F, f ⊗ g 7→ trace(f g), spans
the space of sl(V )-invariant maps Homsl(V )(sl(V ) ⊗ sl(V ), F).
(iii) For any f, g, h ∈ sl(V ), one has
[[f, g], h] = 2(cid:0)trace(gh)f − trace(f h)g(cid:1).
(2.2)
(iv) The map sl(V ) ⊗ V → V , f ⊗ u 7→ f (u), spans the space of sl(V )-
invariant maps Homsl(V )(sl(V ) ⊗ V, V ).
(v) The space Homsl(V )(V ⊗ V, F) of sl(V )-invariant maps from V ⊗
V into the trivial module F is one-dimensional and spanned by a
nonzero skew symmetric bilinear map (cid:0)uv(cid:1).
(vi) The symmetric map V ⊗ V → sl(V ), u ⊗ v 7→ γu,v = (cid:0)u.(cid:1)v +
(cid:0)v.(cid:1)u ((..) as in (v)), spans the space of sl(V )-invariant maps
Homsl(V )(V ⊗ V, sl(V )).
(vii) There are no nontrivial sl(V )-invariant maps sl(V )⊗sl(V ) → V and
V ⊗V → V . That is, Homsl(V )(sl(V )⊗sl(V ), V ) = 0 = Homsl(V )(V ⊗
V, V ).
(cid:3)
Note that for any f ∈ sl(V ), f 2 = 1
2 trace(f 2)1, and hence f g + gf =
trace(f g)1 for any f, g ∈ sl(V ). This gives f gf = trace(f g)f − 1
2 trace(f 2)g,
so f gh + hgf = trace(f g)h + trace(gh)f − trace(f h)g, and finally [[f, g], h] =
(f gh+hgf )−(gf h+hf g) = 2(cid:0)trace(gh)f −trace(f h)g(cid:1) for any f, g ∈ sl(V ),
thus getting (2.2).
From now on, we will fix a nonzero skew symmetric bilinear form (..) on
our two-dimensional vector space V .
The sl(V )-invariance of the Lie bracket in our Lie algebra g in (2.1) gives,
for any f, g ∈ sl(V ), u, v ∈ V and ϕ ∈ d, the following conditions:
[f ⊗ a, g ⊗ b] = [f, g] ⊗ a · b + 2 trace(f g)Da,b,
[f ⊗ a, u ⊗ x] = f (u) ⊗ a • x,
[u ⊗ x, v ⊗ y] = γu,v ⊗ hxyi +(cid:0)uv(cid:1)dx,y,
[ϕ, f ⊗ a] = f ⊗ ϕ(a),
[ϕ, u ⊗ x] = u ⊗ ϕ(x),
(2.3)
4
ALBERTO ELDUQUE AND SUSUMU OKUBO
for suitable bilinear maps
J × J → J,
(a, b) 7→ a · b,
(symmetric),
J × J → d,
J × T → T,
(a, b) 7→ Da,b,
(a, x) 7→ a • x,
(skew symmetric),
T × T → J,
(x, y) 7→ hxyi
(skew symmetric),
(2.4)
T × T → d,
d ×J → J,
(x, y) 7→ dx,y
(ϕ, a) 7→ ϕ(a),
d ×T → T,
(ϕ, x) 7→ ϕ(x),
(symmetric),
such that 1 · a = a, D1,a = 0 and 1 • x = x for any a ∈ J and x ∈ T .
The Jacobi identity on g shows that all these maps are invariant under
the action of the Lie subalgebra d. It also gives some other conditions to be
satisfied by these maps:
• For any f, g, h ∈ sl(V ) and a, b, c ∈ J we have,
[[f ⊗ a, g ⊗ b], h ⊗ c] = [[f, g], h] ⊗ (a · b) · c
+ 2 trace(f g)h ⊗ Da,b(c) + 2 trace([f, g]h)Da·b,c
For linearly independent f, g, h (generic case), equation (2.2) implies
that Pcyclic[[f ⊗ a, g ⊗ b], h ⊗ c] equals 0 if and only if the following
two conditions hold:
Da·b,c + Db.c,a + Dc·a,b = 0,
Da,b(c) = a · (b · c) − b · (a · c),
(2.5)
for any a, b, c ∈ J. Since the characteristic is 6= 3, the first equation
in (2.5) is equivalent to Da·a,a = 0, which in view of the second
equation is equivalent to:
(a · a) · (b · a) = ((a · a) · b) · a
for any a, b ∈ J. That is, J is a Jordan algebra.
This goes back to [Tits62], where the case in which T = 0 is
considered and the well-known Tits-Kantor-Koecher construction of
Lie algebras out of Jordan algebras appeared for the first time (see
also [Jac67]).
Therefore the Jacobi identity for elements in sl(V )⊗J is equivalent
to (J, ·) being a Jordan algebra and to the condition Da,b(c) = a ·
(b · c) − b · (a · c) for any a, b, c ∈ J (that is, Da,b acts as the natural
inner derivation of J attached to the elements a, b ∈ J [Jac67]).
• For any f, g ∈ sl(V ), a, b ∈ J, w ∈ V and x ∈ T we get:
[[f ⊗ a, g ⊗ b], w ⊗ x] = [[f, g] ⊗ a · b + 2 trace(f g)Da,b, w ⊗ x]
= [f, g](w) ⊗ (a · b) • x + 2 trace(f g)w ⊗ Da,b(x),
[[f ⊗ a, w ⊗ x], g ⊗ b] = [f (w) ⊗ a • x, g ⊗ b] = −g(f (w)) ⊗ b • (a • x),
[f ⊗ a, [g ⊗ b, w ⊗ x]] = [f ⊗ a, g(w) ⊗ b • x] = f (g(w)) ⊗ a • (b • x).
2 trace(f 2)1, Jacobi identity gives:
With f = g, and since f 2 = 1
4Da,b(x) = a • (b • x) − b • (a • x).
(2.6)
SPECIAL FREUDENTHAL-KANTOR TRIPLE SYSTEMS
5
Now, using this fact and since f g+gf = trace(f g)1, with f, g ∈ sl(V )
and w ∈ W such that f (g(w)) and g(f (w)) are linearly independent
(generic case), we get
(a · b) • x =
1
2(cid:16)a • (b • x) + b • (a • x)(cid:17).
(2.7)
That is, the map J → EndF(T ), a 7→ λa, with λa(x) = a • x,
is a homomorphism of Jordan algebra, where EndF(T ) is a Jordan
algebra under the product α◦β = 1
algebra is denoted by EndF(T )+. In other words, T is a special unital
Jordan module for J.
2(cid:0)αβ +βα). This (special) Jordan
Conversely, equations (2.6) and (2.7) imply the Jacobi identity for
the elements above.
• For any f ∈ sl(V ), a ∈ J, u, v ∈ V , and x, y ∈ T , we get:
[f ⊗ a, [u ⊗ x, v ⊗ y]] = [f ⊗ a, γu,v ⊗ hxyi + (uv)dx,y]
= [f, γu,v] ⊗ a · hxyi − (uv)f ⊗ dx,y(a)
+ 2 trace(f γu,v)Da,hxyi,
[[f ⊗ a, u ⊗ x], v ⊗ y] = [f (u) ⊗ a • x, v ⊗ y]
[u ⊗ x, [f ⊗ a, v ⊗ y]] = [u ⊗ x, f (v) ⊗ a • y]
= γf (u),v ⊗ ha • xyi + (f (u)v)da•x,y,
= γu,f (v) ⊗ hxa • yi + (uf (v))dx,a•y.
But trace(f γu,v) = trace(cid:0)f(cid:0)(u.)v + (v.)u(cid:1)(cid:1) = (uf (v)) + (vf (u)) =
−2(cid:0)f (u)v) = 2(uf (v)), so the component in d of the above equa-
tions give:
4Da,hxyi = −da•x,y + dx,a•y,
(2.8)
for any a ∈ J and x, y ∈ T .
Also [f, γu,v] = γf (u),v + γu,f (v). Hence with u = v, [f, γu,u] =
2γf (u),u = 2γu,f (u), and we get
2a · hxyi = ha • xyi + hxa • yi,
(2.9)
for any a ∈ J and x, y ∈ T .
Since the dimension of V is 2, the skew symmetry forces
(w1w2)w3 = 0.
Xcyclic
Hence it follows that for any u, v, w ∈ V , (uv)f (w) + (f (w)u)v +
(vf (w))u = 0, or
(uv)f = −(f (u).)v + (f (v).)u,
(2.10)
for any u, v ∈ V and f ∈ sl(V ). Now, take u and v linearly indepen-
dent in V , and take f = γu,v. Then [f, γu,v] = 0, γf (u),v = −(uv)f =
−γu,f (v), so we obtain:
dx,y(a) = ha • xyi − hxa • yi.
(2.11)
Conversely, equations (2.8), (2.9) and (2.11) imply the Jacobi
identity for the elements above.
6
ALBERTO ELDUQUE AND SUSUMU OKUBO
• Finally, for u, v, w ∈ V and x, y, z ∈ T ,
[[u ⊗ x, v ⊗ y], w ⊗ z] = [γu,v ⊗ hxyi + (uv)dx,y, w ⊗ z]
= γu,v(w) ⊗ hxyi • z + (uv)w ⊗ dx,y(z).
With u and v such that (uv) = 1 and w = u, γu,v(u) = −u = γv,u(u),
γu,u(v) = 2v and the Jacobi identity gives:
dx,y(z) − dz,y(x) = hxyi • z − hzyi • x + 2hxzi • y
(2.12)
for any x, y, z ∈ T . And conversely, this equation is sufficient to
obtain the validity of the Jacobi identity for elements in V ⊗ T .
Let us collect the information obtained so far in the following result:
Theorem 2.2. Let g be a Lie algebra. Then g is BC1-graded of type C1 if
and only if there is a two-dimensional vector space V such that that g is, up
to isomorphism, the Lie algebra in (2.1), with Lie bracket given in (2.3), for
a unital Jordan algebra (J, ·), a special unital Jordan module T for J (with
action denoted by a • x for a ∈ J and x ∈ T ), and a Lie subalgebra d of g,
endowed with d-invariant bilinear maps:
(a, b) 7→ Da,b
(x, y) 7→ hxyi
(skew symmetric),
(skew symmetric),
J × J → d,
T × T → J,
T × T → d,
d ×J → J,
(x, y) 7→ dx,y
(d, a) 7→ d(a),
d ×T → T,
(d, x) 7→ d(x),
(symmetric),
satisfying equations (2.5), (2.6), (2.8), (2.9), (2.11), and (2.12), and such
that for any d ∈ d, the map J ⊕ T → J ⊕ T , a + x 7→ d(a) + d(x) is a
derivation of the algebra J ⊕ T , with the product given by the formula:
(a + x) ⋄ (b + y) =(cid:0)a · b + hxyi(cid:1) +(cid:0)a • y + b • x(cid:1). (cid:3)
Note that (2.13) above is a consequence of the bilinear maps involved
being invariant under the action of d, this being forced by the Jacobi identity
on g.
(2.13)
All this is strongly related to the J-ternary algebras considered by Allison
[All76]:
Definition 2.3. (see [ABG, (3.12)]) Let J be a unital Jordan algebra with
multiplication a · b. Let T be a unital special Jordan module for J with
action a • x for a ∈ J and x ∈ T . Assume h..i : T × T → J is a skew
symmetric bilinear map and (., ., .) : T × T × T → T is a trilinear product on
T . Then the pair (J, T ) is called a J-ternary algebra if the following axioms
hold for any a ∈ J and x, y, z, w, v ∈ T :
(JT1): a · hxyi =
1
2(cid:16)ha • xyi + hxa • yi(cid:17),
(JT2): a • (x, y, z) = (a • x, y, z) − (x, a • y, z) + (x, y, a • z),
(JT3): (x, y, z) = (z, y, x) − hxzi • y,
(JT4): (x, y, z) = (y, x, z) + hxyi • z,
(JT5): h(x, y, z)wi + hz(x, y, w)i = hxhzwi • yi,
(JT6): (x, y, (z, w, v)) = ((x, y, z), w, v)+(z, (y, x, w), v)+(z, w, (x, y, w)).
SPECIAL FREUDENTHAL-KANTOR TRIPLE SYSTEMS
7
Theorem 2.4. Let (J, ·) be a unital Jordan algebra, let (T, •) be a special
unital Jordan module for (J, ·), and let d be a Lie algebra acting on both
vector spaces J and T (that is, both J and T are modules for d). Assume
D.,. : J × J → d, (a, b) 7→ Da,b, and h..i : T × T → J, (x, y) 7→ hxyi, are two
skew symmetric d-invariant bilinear maps, d.,. : T × T → d, (x, y) 7→ dx,y is
a symmetric d-invariant map, and the action of d on the direct sum J ⊕ T
is an action by derivations of the algebra (J ⊕ T, ⋄) in (2.13). Then if (2.5),
(2.6), (2.8), (2.9), (2.11) and (2.12) are satisfied, the pair (J, T ) becomes a
J-ternary algebra with the triple product (., ., .) : T × T × T → T given by
(x, y, z) =
1
2(cid:16)−dx,y(z) + hxyi • z(cid:17).
(2.14)
Conversely, if (J, T ) is a J-ternary algebra, then the image of the bilinear
maps
where
D.,. : J × J → EndF(J ⊕ T ), (a, b) 7→ Da,b,
Da,b(c) = a · (b · c) − b · (a · c),
Da,b(x) =
for a, b, c ∈ J and x ∈ T , and
1
4(cid:16)a • (b • x) − b • (a • x)(cid:17),
d.,. : T × T → EndF(J ⊕ T ), (x, y) 7→ dx,y,
where
dx,y(a) = ha • xyi − hxa • yi,
dx,y(z) = hxyi • z − 2(x, y, z),
(2.15)
(2.16)
for a ∈ J and x, y, z ∈ T , is contained in the Lie algebra of derivations of
the algebra (J ⊕ T, ⋄) defined in (2.13), and the equations (2.5), (2.8), (2.9)
and (2.12) are satisfied.
Proof. Assume first that (J, ·), (T, •), h., .i, D.,. and d.,. satisfy the conditions
in the theorem, then use (2.14) to define the trilinear product (., ., .) : T ×
T × T → T . Then condition (JT1) is equivalent to (2.9), while condition
(JT3) is equivalent to (2.12). Also (JT4) is a consequence of the symmetry
of d.,. and the skew symmetry of h..i.
For a ∈ J and x, y, z ∈ T we get:
a•(x, y, z) − (x, y, a • z)
=
=
=
1
1
1
2(cid:16)dx,y(a • z) − a • dx,y(z) + a •(cid:0)hxyi • z(cid:1) − hxyi • (a • z)(cid:17)
2(cid:16)dx,y(a) • z + 4Da,hxyi(z)(cid:17)
2(cid:16)ha • xyi • z − hxa • yi • z − da•x,y(z) + dx,a•y(z)(cid:17)
(using (2.6) and the fact that dx,y is a derivation)
(because of (2.8) and (2.11))
= (a • x, y, z) − (x, a • y, z),
8
ALBERTO ELDUQUE AND SUSUMU OKUBO
thus obtaining the validity of (JT2). Now, for x, y, z, w ∈ T we have:
h(x, y, z)wi + hz(x, y, w)i
1
1
=
=
=
2(cid:16)−hdx,y(z)wi − hzdx,y(w)i + hhxyi • zwi + hzhxyi • wi(cid:17)
2(cid:16)−dx,y(cid:0)hzwi(cid:1) + 2hxyi · hzwi(cid:17)
2(cid:16)−hhzwi • xyi + hxhzwi • yi
(using (2.9) and the fact that dx,y is a derivation)
+ hhzwi • xyi + hxhzwi • yi(cid:17) (using (2.11) and (2.9))
1
= hxhzwi • yi,
thus getting (JT5). Now the symmetry of d.,. and the fact that (., ., .) is a
d-invariant map show that (JT6) is a consequence of (JT2) and the skew
symmetry of h..i.
Conversely, let (J, T ) be a J-ternary algebra, and consider d = der(J ⊕
T, ⋄) and D.,. and d.,. defined by equations (2.15) and (2.16). Then both D.,.
and d.,. are d-invariant maps. Let us check that Da,b and dx,y belong to d
for any a, b ∈ J and x, y ∈ T .
Actually, Da,b acts as a derivation of (J, ·) since this is a Jordan algebra.
Besides, the equation Da,b(c • x) = Da,b(c) • x + c • Da,b(x) holds for any
a, b, c ∈ J and x ∈ T since T is a special module for J, and the condition
Da,b(hxyi) = hDa,b(x)yi + hxDa,b(y)i, for a, b ∈ J and x, y ∈ T , is a
consequence of (JT1). Therefore Da,b ∈ der(J ⊕ T, ⋄) for any a, b ∈ J.
Also, for x, y ∈ T , dx,y acts as a derivation of (J, ·) because of (JT1) and
(2.16). For x, y, z, w ∈ T , (JT5) is equivalent to the equation
hdx,y(z)wi + hzdx,y(w)i −(cid:16)hhxyi • zwi + hzhxyi • wi(cid:17)
= −2hxhzwi • yi,
and the expression in parenthesis above is, due to (JT1), 2hxyi · hzwi =
2hzwihxyi, which equals (again by (JT1)) hhzwi • xyi + hxhzwi • yi.
Hence (JT5) becomes, due to (JT1), the equation
hdx,y(z)wi + hzdx,y(w)i = hhzwi • xyi − hxhzwi • yi = dx,y(cid:0)hzwi(cid:1).
Finally, (JT4) shows that dx,y(z) = −(cid:16)(x, y, z) + (y, x, z)(cid:17), which is sym-
metric on x, y. For a ∈ J and x, y, z ∈ T we get:
dx,y(a • z) − dx,y(a) • z − a • dx,y(z)
= −(x, y, a • z) − (y, x, a • z) − ha • xyi • z + hxa • yi • z
+ a • (x, y, z) + a • (y, x, z)
=(cid:16)(a • x, y, z) − (y, a • x, z) − ha • xyi • z(cid:17)
+(cid:16)(a • y, x, z) − (x, a • y, z) − ha • yxi • z(cid:17) (thanks to (JT2))
= 0 (because of (JT4) and using the skew symmetry of h..i).
SPECIAL FREUDENTHAL-KANTOR TRIPLE SYSTEMS
9
Therefore, the images of the maps D.,. and d.,. are contained in the Lie
algebra of derivations of (J ⊕ T, ⋄).
Now, (2.5) is a consequence of J being a Jordan algebra, (2.9) is equivalent
to (JT1), (2.12) is equivalent to (JT3). And as for the validity of (2.8):
4Da,hxyi = −da•x,y + dx,a•y for any a ∈ J and x, y ∈ T , this is valid on J as
a consequence of (JT1), while for z ∈ T :
4Da,hxyi(z) + da•x,y(z) − dx,a•y(z)
= a •(cid:0)hxyi • z(cid:1) − hxyi • (a • z)
−(cid:16)(a • x, y, z) + (y, a • x, z)(cid:17) +(cid:16)(x, a • y, z) + (a • y, x, z)(cid:17)
= a •(cid:16)(x, y, z) − (y, x, z)(cid:17) −(cid:16)(x, y, a • z) − (y, x, a • z)(cid:17)
−(cid:16)(a • x, y, z) + (y, a • x, z)(cid:17) +(cid:16)(x, a • y, z) + (a • y, x, z)(cid:17)
(where we have used (JT4))
= 0
(because of (JT2)). (cid:3)
Corollary 2.5. Let (J, T ) be a J-ternary algebra and let V be a two-
dimensional vector space endowed with a nonzero skew symmetric bilinear
map (..). Then the vector space
g(J, T ) =(cid:0)sl(V ) ⊗ J) ⊕(cid:0)V ⊗ T(cid:1) ⊕ d,
where d is the linear span of the operators Da,b and dx,y in EndF(J ⊕ T )
defined in (2.15) and (2.16), for a, b ∈ J and x, y ∈ T , and with bracket
given in (2.3), is a BC1-graded Lie algebra of type C1.
(cid:3)
(2.17)
3. J -ternary algebras and special Freudenthal-Kantor triple
systems
In [YO84], Yamaguti and Ono considered a wide class of triple sys-
tems: the (ǫ, δ) Freudenthal-Kantor triple systems, which extend the clas-
sical Freudenthal triple systems and are useful tools in the construction of
Lie algebras and superalgebras.
An (ǫ, δ) Freudental-Kantor triple system (ǫ, δ are either 1 or −1) over
a ground field F is a triple system (U, xyz) such that, if L(x, y), K(x, y) ∈
EndF(U ) are defined by
( L(x, y)z = xyz
K(x, y)z = xzy − δyzx,
then
[L(u, v), L(x, y)] = L(cid:0)L(u, v)x, y(cid:1) + ǫL(cid:0)x, L(v, u)y(cid:1),
K(cid:0)K(u, v)x, y(cid:1) = L(y, x)K(u, v) − ǫK(u, v)L(x, y),
hold for any x, y, u, v ∈ U .
(3.1)
(3.2a)
(3.2b)
For ǫ = −1 and δ = 1, these are the so called Kantor triple systems (or
generalized Jordan triple systems of second order [Kan73]).
10
ALBERTO ELDUQUE AND SUSUMU OKUBO
The aim of this section is to show the close relationship between the
J-ternary algebras and some particular (1, 1) Freudenthal-Kantor triple sys-
tems.
Lemma 3.1. Let (U, xyz) be a triple system satisfying equation (3.2a), with
ǫ ∈ {±1}, and define the endomorphisms S(x, y) and T (x, y) ∈ EndF(U ) by
S(x, y) = L(x, y) + ǫL(y, x)
T (x, y) = L(y, x) − ǫL(x, y).
(3.3)
Then for any u, v ∈ U , S(u, v) is a derivation of the triple system (U, xyz),
while T (u, v) satisfies
for any x, y, z ∈ U . As a consequence, the following equations hold:
T (u, v)(cid:0)xyz(cid:1) =(cid:0)T (u, v)x(cid:1)yz − x(cid:0)T (u, v)y(cid:1)z + xy(cid:0)T (u, v)z(cid:1)
[S(u, v), L(x, y)] = L(cid:0)S(u, v)x, y(cid:1) + L(cid:0)x, S(u, v)y(cid:1)
[T (u, v), L(x, y)] = L(cid:0)T (u, v)x, y(cid:1) − L(cid:0)x, T (u, v)y(cid:1)
[S(u, v), T (x, y)] = T(cid:0)S(u, v)x, y(cid:1) + T(cid:0)x, S(u, v)y(cid:1)
[T (u, v), S(x, y)] = −ǫT(cid:0)T (u, v)x, y(cid:1) + ǫT(cid:0)x, T (u, v)y(cid:1)
[T (u, v), T (x, y)] = −ǫS(cid:0)T (u, v)x, y(cid:1) + ǫS(cid:0)x, T (u, v)y(cid:1)
(3.4a)
(3.4b)
(3.4c)
(3.4d)
(3.4e)
Proof. The fact that S(u, v) is a derivation and that T (u, v) satisfies the
equation above when applied to a product xyz follow at once from (3.2a).
These conditions are equivalent to equations (3.4a) and (3.4b). The other
equations are obtained from these.
(cid:3)
Remark 3.2. Let (U, xyz) be a triple system satisfying equation (3.2a),
with ǫ ∈ {±1}, and denote by L (respectively S, T ) the linear span of the
operators L(x, y) (respectively S(x, y), T (x, y)) for x, y ∈ U . Lemma 3.1
shows that S is a subalgebra of L, and that the conditions L = S + T ,
[S, T ] ⊆ T and [T , T ] ⊆ S hold. In particular, this shows that S ∩ T is an
ideal of L, and modulo this ideal we get a Z2-graded Lie algebra.
Definition 3.3. Let U be an (ǫ, δ) Freudenthal-Kantor triple system. Then
U is said to be special in case
K(x, y) = ǫδL(y, x) − ǫL(x, y)
(3.5)
holds for any x, y ∈ U .
Moreover, U is said to be unitary in case the identity map belongs to
K(U, U ) (the linear span of the endomorphisms K(x, y)).
Especially, any balanced system (that is, K(x, y) = b(x, y)1 for some
nonzero bilinear form b(x, y)) is unitary.
Therefore, an (ǫ, ǫ) Freudenthal-Kantor triple system is special if the op-
erators K(x, y) coincide with our previous T (x, y) considered in Lemma 3.1.
Proposition 3.4. Let U 6= 0 be a unitary (ǫ, δ) Freudenthal-Kantor triple
system. Then ǫ = δ and U is special.
SPECIAL FREUDENTHAL-KANTOR TRIPLE SYSTEMS
11
Proof. If U is unitary, then 1 =Pm
i=1 K(ui, vi) for some ui, vi ∈ U . Replace
u and v by ui and vi in (3.2b) and sum over i to get K(x, y) = L(y, x) −
ǫL(x, y). For ǫ = δ we get (3.5), while for ǫ = −δ this shows K(x, y) =
−ǫK(y, x), and (3.1) shows that K(x, y) = −δK(y, x), so that K(x, y) = 0
for any x, y ∈ U , a contradiction to U being unitary.
(cid:3)
Proposition 3.5.
(i) Let U be a special (ǫ, ǫ) Freudenthal-Kantor triple system. Then we
have
K(u, v)K(x, y) + K(x, y)K(u, v)
for any u, v, x, y ∈ U .
= K(cid:0)K(u, v)x, y(cid:1) + K(cid:0)x, K(u, v)y(cid:1),
(3.6)
Conversely, if the triple product on U satisfies equations (3.2a),
(3.5) and (3.6), then it defines a special (ǫ, ǫ) Freudenthal-Kantor
triple system.
(ii) Let U be a special (ǫ, −ǫ) Freudenthal-Kantor triple system. Then
K(x, y) is a derivation of U for any x, y ∈ U , and we have
xyz + ǫxzy = 0,
(3.7a)
K(u, v)T (x, y) + T (x, y)K(u, v) = K(cid:0)K(u, v)x, y(cid:1) − K(cid:0)x, K(u, v)y(cid:1),
(3.7b)
for any u, v, x, y ∈ U .
Conversely, if ǫ = −δ and the triple product on U satisfies (3.2a),
(3.7a) and (3.7b), then it defines a special (ǫ, −ǫ) Freudenthal-Kantor
triple system.
Proof. For (i), using (3.2b) we compute:
K(cid:0)K(u, v)x, y(cid:1) + K(cid:0)x, K(u, v)y(cid:1) = K(cid:0)K(u, v)x, y(cid:1) − ǫK(cid:0)K(u, v)y, x(cid:1)
=(cid:16)L(y, x) − ǫL(x, y)(cid:17)K(u, v) + K(u, v)(cid:16)−ǫL(x, y) + L(y, x)(cid:17)
= K(x, y)K(u, v) + K(u, v)K(x, y),
which proves (3.6).
For the converse statement, we must check the validity of (3.2b). Note
that L(x, y) = 1
(3.5). Hence we compute:
2(cid:0)S(x, y) − ǫK(x, y)(cid:1), and K(x, y) is our previous T (x, y) by
L(y,x)K(u, v) − ǫK(u, v)L(x, y)
2(cid:16)S(y, x) − ǫK(y, x)(cid:17)K(u, v) −
1
ǫ[S(x, y), K(u, v)] +
ǫ[K(u, v), S(x, y)] +
=
=
1
1
2
= −
1
2
1
2
ǫK(u, v)(cid:16)S(x, y) − ǫK(x, y)(cid:17)
2(cid:16)K(x, y)K(u, v) + K(u, v)K(x, y)(cid:17)
2(cid:16)K(x, y)K(u, v) + K(u, v)K(x, y)(cid:17)
1
= K(cid:0)K(u, v)x, y(cid:1) because of (3.4d) and (3.6).
12
ALBERTO ELDUQUE AND SUSUMU OKUBO
Now for (ii), assume U is a special (ǫ, −ǫ) Freudenthal-Kantor triple sys-
tem. Then K(x, y) = −ǫS(x, y) for any x, y and hence K(x, y) is a derivation
of U (Lemma 3.1). Then using (3.2b) with δ = −ǫ we get:
K(cid:0)K(u, v)x, y(cid:1) − K(cid:0)x, K(u, v)y(cid:1)
= K(cid:0)K(u, v)x, y(cid:1) − ǫK(cid:0)K(u, v)y, x(cid:1)
=(cid:16)L(y, x)K(u, v) − ǫK(u, v)L(x, y)(cid:17)
− ǫ(cid:16)L(x, y)K(u, v) − ǫK(u, v)L(y, x)(cid:17)
= T (x, y)K(u, v) + K(u, v)T (x, y)
for any u, v, x, y ∈ U . Consider too the trilinear map Λ(x, y, z) = xyz+ǫxzy.
Equations (3.1) and (3.5) give:
xzy − δyzx = ǫδyxz − ǫxyz,
which shows Λ(x, y, z) = δΛ(y, x, z) for any x, y, z ∈ U . But by its own
definition Λ(x, y, z) = ǫΛ(x, z, y). Hence with ǫ = −δ this gives Λ(x, z, y) =
−Λ(y, x, z), and hence
Λ(x, z, y) = −Λ(y, x, z) = Λ(z, y, x) = −Λ(x, z, y),
and we get Λ(x, y, z) = 0 for any x, y, z ∈ U . (Note that the argument above
shows that for special (ǫ, ǫ) Freudenthal-Kantor triple systems, Λ(x, y, z) is
symmetric on its arguments for ǫ = 1 and alternating for ǫ = −1.)
Conversely, with ǫ = −δ, by (3.7a) K(x, y) = −L(y, x) − ǫL(x, y) =
−ǫS(x, y) is a derivation of U , and T (x, y) = L(y, x) − ǫL(x, y), so L(x, y) =
−ǫ
2 (cid:0)T (x, y) + K(x, y)(cid:1) and L(y, x) = 1
that K(u, v) is a derivation of U and (3.7b) we obtain
2(cid:0)T (x, y) − K(x, y)(cid:1). Therefore, using
L(y, x)K(u, v) − ǫK(u, v)L(x, y)
1
2
K(u, v)(cid:0)T (x, y) + K(x, y)(cid:1)
[K(u, v), K(x, y)]
1
1
1
=
=
=
1
2
2(cid:0)T (x, y) − K(x, y)(cid:1)K(u, v) +
2(cid:0)K(u, v)T (x, y) + T (x, y)K(u, v)(cid:1) +
2(cid:16)K(cid:0)K(u, v)x, y(cid:1) − K(cid:0)x, K(u, v)y(cid:1)(cid:17)
= K(cid:0)K(u, v)x, y(cid:1)
2(cid:16)K(cid:0)K(u, v)x, y(cid:1) + K(cid:0)x, K(u, v)y(cid:1)(cid:17)
+
1
for any u, v, x, y ∈ U , thus getting (3.2b).
(cid:3)
Remark 3.6. Given an (ǫ, ǫ) Freudenthal-Kantor triple system, equation
(3.6) shows that the linear subspace F1 + span {K(x, y) : x, y ∈ U } is a
Jordan subalgebra of the special Jordan algebra EndF(U )+ (with product
f · g = 1
2 (f g + gf )).
Theorem 3.7. Let (J, T ) be a J-ternary algebra. Then T , endowed with its
triple product (x, y, z), is a special (1, 1) Freudenthal-Kantor triple system.
SPECIAL FREUDENTHAL-KANTOR TRIPLE SYSTEMS
13
Conversely, let (U, xyz) be a special (1, 1) Freudenthal-Kantor triple sys-
tem. Let J be the F subspace of EndF(U ) spanned by the identity map
and by the operators K(x, y) for x, y ∈ U : J = F1 + K(U, U ). Then J
is a subalgebra of the special Jordan algebra EndF(U )+ (with multiplication
f · g = 1
2 (f g + gf ), and the pair (J, U ), endowed with the natural action of
J on U : a • x = a(x), and the multilinear maps:
(., ., .) : U × U × U → U,
(x, y, z) = xyz,
h..i : U × U → J,
hxyi = −K(x, y),
is a J-ternary algebra.
Proof. Assume first that (J, T ) is a J-ternary algebra and consider the space
T endowed with the triple product xyz = (x, y, z). Take ǫ = δ = 1. Then
(3.2a) is equivalent to (JT6), while K(x, y)z = (x, z, y)−(y, z, x) = −hxyi•
z by (JT3). Then (JT4) shows that K(x, y)z = −hxyi • z = (y, x, z) −
(x, y, z) = (cid:0)L(y, x) − L(x, y)(cid:1)z, which gives the speciality condition (3.5).
Finally, (JT5) gives
−K(cid:0)L(x, y)z, w(cid:1) − K(cid:0)z, L(x, y)w(cid:1) = K(cid:0)x, K(z, w)y(cid:1),
K(cid:0)K(z, w)y, x(cid:1) = K(cid:0)L(x, y)z, w(cid:1) + K(cid:0)z, L(x, y)w(cid:1).
But (3.2a) gives, for any x, y, z, w, u:
By skew symmetry we get
(3.8)
L(x, y)K(z, w)u = L(x, y)(cid:0)zuw − wuz)
so that
= K(cid:0)L(x, y)z, w(cid:1)u + K(cid:0)z, L(x, y)w(cid:1)u + K(z, w)L(y, x)u,
K(cid:0)L(x, y)z, w(cid:1) + K(cid:0)z, L(x, y)w(cid:1) = L(x, y)K(z, w) − K(z, w)L(y, x),
and (3.8) becomes (3.2b).
Conversely, let (U, xyz) be a special (1, 1) Freudenthal-Kantor triple sys-
tem, and let J = F1 + K(U, U ). Then (3.6) shows that J is a Jordan sub-
algebra of EndF(U )+, and hence U becomes a unital special Jordan module
for J. Now consider the trilinear product (x, y, z) = xyz and the skew
symmetric bilinear map h..i : U × U → J given by hxyi = −K(x, y).
Then equation (3.6) is equivalent to the condition (JT1), equation (3.2a)
and (3.5) give (JT2), equation (JT3) is a consequence of the definition
of the operator K(x, y) in (3.1), while (JT4) is equivalent to (3.5). Now
(JT5) follows from (3.2b) and the skew symmetry of K(., .), and (JT6) is
equivalent to (3.2a). Therefore, (J, U ) is a J-ternary algebra.
(cid:3)
Corollary 3.8. Let g be a BC1-graded Lie algebra of type C1 as in (2.1).
Then the vector space T , endowed with the triple product
(x, y, z) =
1
2(cid:0)−dx,y(z) + hxyi • z(cid:1)
in (2.14), is a special (1, 1) Freudenthal-Kantor triple system.
Conversely, given a special (1, 1) Freudenthal-Kantor triple system (U, xyz),
let d be the linear span of the derivations S(x, y) = L(x, y) + L(y, x) in (3.3)
(which is a subalgebra of the Lie algebra of derivations of der U by Lemma
14
ALBERTO ELDUQUE AND SUSUMU OKUBO
3.1) and let J be the Jordan subalgebra F1 + K(U, U ) of EndF(U )+. Then
the vector space
g =(cid:0)sl(V ) ⊗ J(cid:1) ⊕(cid:0)V ⊗ U(cid:1) ⊕ d,
with Lie bracket given by the bracket in d and, for any f, g ∈ sl(V ), u, v ∈ V ,
a, b ∈ J, x, y ∈ U and ϕ ∈ d, by the formulae:
2 (ab + ba) + 1
2 trace(f g)[a, b],
• [f ⊗ a, g ⊗ b] = [f, g] ⊗ 1
• [f ⊗ a, u ⊗ x] = f (u) ⊗ a(x),
• [u ⊗ x, v ⊗ y] = −γu,v ⊗ K(x, y) − (uv)(cid:0)L(x, y) + L(y, x)(cid:1),
• [ϕ, f ⊗ a] = f ⊗ ϕ(a),
• [ϕ, u ⊗ x] = u ⊗ ϕ(x),
is a BC1-graded Lie algebra of type C1.
Proof. It is enough to note that if (U, xyz) is a special (1, 1) Freudenthal-
Kantor triple system and (J, U ) is the associated J-ternary algebra, with
J = F1 + K(U, U ), then for x, y, z ∈ U , and a, b, c ∈ J:
dx,y(z) = hxyi • z − 2(x, y, z)
dx,y(a) = ha • xyi − hxa • yi
=(cid:0)−K(x, y) − 2L(x, y)(cid:1)(z)
= −(cid:0)L(x, y) + L(y, x)(cid:1)(z)
= −K(cid:0)a(x), y(cid:1) − K(cid:0)a(y), x(cid:1)
4(cid:0)a(b(x)) − b(a(x))(cid:1) =
= −[L(x, y) + L(y, x), a]
1
4
1
1
4
(because of (3.4d))
Da,b(x) =
[a, b](x),
Da,b(c) = a · (b · c) − b · (a · c) =
[[a, b], c].
(Note that we have 4(cid:16)a · (b · c) − b · (a · c)(cid:17) = a(bc + cb) + (bc + cb)a − b(ac +
ca) − (ac + ca)b = (ab − ba)c − c(ab − ba) = [[a, b], c].)
(cid:3)
Remark 3.9. One may change the skew symmetric bilinear form on V to
its negative and hence change the Lie bracket accordingly. In this way one
has [u ⊗ x, v ⊗ y] = γu,v ⊗ K(x, y) + (uv)(cid:0)L(x, y) + L(y, x)(cid:1), which is nicer
than the bracket above.
Remark 3.10. Let (U, xyz) be a special (1, 1) Freudenthal-Kantor triple
system and let g be the attached Lie algebra as in Corollary 3.8. Then the
subspace(cid:0)sl(V )⊗K(U, U )(cid:1)⊕(cid:0)V ⊗U(cid:1)⊕d is an ideal of g. Hence if g is simple
we get J = K(U, U ), so that (U, xyz) is unitary. Moreover, if dim J = 1,
then (U, xyz) is balanced.
4. Superalgebras
Any BC1-graded Lie algebra of type C1 (as in (2.1)) is Z2-graded, with
(4.1)
g¯1 = V ⊗ T.
In a similar vein we may consider Lie superalgebras g = g¯0 ⊕ g¯1 such that
g¯0 contains a subalgebra isomorphic to sl(V ) so that g¯0 is a direct sum of
g¯0 =(cid:0)sl(V ) ⊗ J(cid:1) ⊕ d,
SPECIAL FREUDENTHAL-KANTOR TRIPLE SYSTEMS
15
copies of the adjoint module for sl(V ) and copies of the trivial module, and
g¯1 is a direct sum of copies of the two-dimensional module V . These will be
called strictly BC1-graded Lie superalgebras of type C1.
The arguments in the two previous sections apply here. The bracket on
the superalgebra g is given by (2.3) for suitable bilinear maps as in (2.4) with
the difference that h..i : T × T → J is symmetric here, while d.,. : T × T → d
is skew symmetric.
Theorem 2.2 has the following counterpart (whose proof is obtained by
superizing the arguments there):
Theorem 4.1. Let g be a Lie superalgebra. Then g is strictly BC1-graded
of type C1 if and only if there is a two-dimensional vector space V such
that that g is, up to isomorphism, the Lie superalgebra in (2.1), with g¯0 =
(cid:0)sl(V ) ⊗ J(cid:1) ⊕ d and g¯1 = V ⊗ T , and Lie bracket as in (2.3), for a unital
Jordan algebra (J, ·), a special unital Jordan module T for J (with action
denoted by a • x for a ∈ J and x ∈ T ), and a Lie subalgebra d of g, endowed
with d-invariant bilinear maps:
J × J → d,
T × T → J,
T × T → d,
d ×J → J,
(a, b) 7→ Da,b
(x, y) 7→ hxyi
(x, y) 7→ dx,y
(d, a) 7→ d(a),
d ×T → T,
(d, x) 7→ d(x),
(skew symmetric),
(symmetric),
(skew symmetric),
satisfying the following equations for any a, b, c ∈ J and x, y, z ∈ T :
Da·b,c + Db·c,a + Dc·a,b = 0, Da,b(c) = a · (b · c) − b · (a · c),
4Da,b(x) = a • (b • x) − b • (a • x),
4Da,hxyi = −da•x,y + dx,a•y,
2a · hxyi = ha • xyi + hxa • yi,
dx,y(a) = ha • xyi − hxa • yi,
dx,y(z) − dy,z(x) = hxyi • z + hyzi • x − 2hzxi • y,
(4.2)
(4.3)
(4.4)
(4.5)
(4.6)
(4.7)
and such that for any d ∈ d, the map J ⊕ T → J ⊕ T , a + x 7→ d(a) + d(x)
is a derivation of the algebra J ⊕ T , with the product given by the formula
(2.13).
The definition of a J-ternary algebra is changed to:
Definition 4.2. Let J be a unital Jordan algebra with multiplication a · b.
Let T be a unital special Jordan module for J with action a • x for a ∈ J
and x ∈ T . Assume h..i : T × T → J is a symmetric bilinear map and
(., ., .) : T × T × T → T is a trilinear product on T . Then the pair (J, T ) is
called a J-ternary (−1)-algebra if the following axioms hold for any a ∈ J
and x, y, z, w, v ∈ T :
1
2(cid:16)ha • xyi + hxa • yi(cid:17),
(-JT1): a · hxyi =
(-JT2): a • (x, y, z) = (a • x, y, z) − (x, a • y, z) + (x, y, a • z),
(-JT3): (x, y, z) + (z, y, x) = hxzi • y,
(-JT4): (x, y, z) + (y, x, z) = hxyi • z,
16
ALBERTO ELDUQUE AND SUSUMU OKUBO
(-JT5): h(x, y, z)wi + hz(x, y, w)i = hxhzwi • yi,
(-JT6): (x, y, (z, w, v)) = ((x, y, z), w, v)−(z, (y, x, w), v)+(z, w, (x, y, w)).
Now Theorem 2.4 has the following counterpart:
Theorem 4.3. Let (J, ·) be a unital Jordan algebra, let (T, •) be a special
unital Jordan module for (J, ·), and let d be a Lie algebra acting on both
vector spaces J and T (that is, both J and T are modules for d). Assume
D.,. : J × J → d, (a, b) 7→ Da,b, and d.,. : T × T → d, (x, y) 7→ dx,y, are two
skew symmetric d-invariant bilinear maps, h..i : T × T → J, (x, y) 7→ hxyi,
is a symmetric d-invariant bilinear map, and the action of d on the direct
sum J ⊕ T is an action by derivations of the algebra (J ⊕ T, ⋄) in (2.13).
Then if (4.2), (4.3), (4.4), (4.5), (4.6) and (4.7) are satisfied, the pair (J, T )
becomes a J-ternary (−1)-algebra with the triple product (., ., .) : T ×T ×T →
T given by (2.14):
(x, y, z) =
1
2(cid:16)−dx,y(z) + hxyi • z(cid:17).
Conversely, if (J, T ) is a J-ternary (−1)-algebra, then the image of the
bilinear maps
D.,. : J × J → EndF(J ⊕ T ), (a, b) 7→ Da,b,
where, as in (2.15):
Da,b(c) = a · (b · c) − b · (a · c),
Da,b(x) =
for a, b, c ∈ J and x ∈ T , and
1
4(cid:16)a • (b • x) − b • (a • x)(cid:17),
d.,. : T × T → EndF(J ⊕ T ), (x, y) 7→ dx,y,
where, as in (2.16)
dx,y(a) = ha • xyi − hxa • yi,
dx,y(z) = hxyi • z − 2(x, y, z),
for a ∈ J and x, y, z ∈ T , is contained in the Lie algebra of derivations of
the algebra (J ⊕ T, ⋄) defined in (2.13), and the equations (4.2), (4.4), (4.5)
and (4.7) are satisfied.
Finally, Theorem 3.7 becomes:
Theorem 4.4. Let (J, T ) be a J-ternary (−1)-algebra. Then T , endowed
with its triple product (x, y, z), is a special (−1, −1) Freudenthal-Kantor
triple system.
Conversely, let (U, xyz) be a special (−1, −1) Freudenthal-Kantor triple
system. Let J be the F subspace of EndF(U ) spanned by the identity map
and by the operators K(x, y) for x, y ∈ U . Then J is a subalgebra of the
special Jordan algebra EndF(U )+ (with multiplication f · g = 1
2 (f g + gf )),
and the pair (J, U ), endowed with the natural action of J on U : a•x = a(x),
and the multilinear maps:
(., ., .) : U × U × U → U,
(x, y, z) = xyz,
h..i : U × U → J,
hxyi = K(x, y),
SPECIAL FREUDENTHAL-KANTOR TRIPLE SYSTEMS
17
is a J-ternary (−1)-algebra.
Remark 4.5. Note that K(x, y) = −hxyi in the (1, 1)-setting, but K(x, y) =
hxyi in the (−1, −1)-setting.
triple system.
Corollary 4.6. Let g be a strictly BC1-graded Lie superalgebra of type C1 as
in (2.1). Then the vector space T , endowed with the triple product (x, y, z) =
1
2(cid:0)−dx,y(z) + hxyi • z(cid:1) in (2.14), is a special (−1, −1) Freudenthal-Kantor
Conversely, given a special (−1, −1) Freudenthal-Kantor triple system T ,
let d be the linear span of the derivations S(x, y) = L(x, y) − L(y, x) and
let J be the Jordan subalgebra F1 + K(T, T ) of EndF(T )+. Then the vector
space
g =(cid:0)sl(V ) ⊗ J(cid:1) ⊕(cid:0)V ⊗ T(cid:1) ⊕ d,
with Lie bracket given by the bracket in d and, for any f, g ∈ sl(V ), u, v ∈ V ,
a, b ∈ J, x, y ∈ T and ϕ ∈ d, by the formulae:
2 (ab + ba) + 1
2 trace(f g)[a, b],
• [f ⊗ a, g ⊗ b] = [f, g] ⊗ 1
• [f ⊗ a, u ⊗ x] = f (u) ⊗ a • x,
• [u ⊗ x, v ⊗ y] = γu,v ⊗ K(x, y) − (uv)(cid:0)L(x, y) − L(y, x)(cid:1),
• [ϕ, f ⊗ a] = f ⊗ ϕ(a),
• [ϕ, u ⊗ x] = u ⊗ ϕ(x),
is a strictly BC1-graded Lie superalgebra of type C1, with g¯0 =(cid:0)sl(V )⊗J(cid:1)⊕d
and g¯1 = V ⊗ T .
5. Dicyclic symmetry
Let V be a two-dimensional vector space endowed with a nonzero (and
hence nondegenerate) skew symmetric bilinear form (..). Let {u, v} be a
symplectic basis of V (that is, (uv) = 1). Assume that the ground field
contains the primitive cubic roots ω and ω2 of 1. Then the correspond-
ing symplectic group Sp(V ) = SL(V ) contains the elements θ, φ, whose
coordinate matrices on the basis above are:
1
θ ↔(cid:18) 0
φ ↔(cid:18)ω
−1 0(cid:19) ,
0 ω2(cid:19) .
(so θ(u) = −v, θ(v) = u),
0
These elements satisfy
θ4 = 1 = φ3, φθφ = θ,
(5.1)
(5.2)
and hence the group they generate is the dicyclic group Dic3 (semidirect
product of C3 by C4).
It turns out that conjugation by elements of Dic3 gives an action of this
group by automorphisms on sl(V ) (σ(f ) = σf σ−1 for any σ ∈ Dic3 and
f ∈ sl(V )), and hence that any BC1 graded Lie algebra of type C1 (as in
(2.1)) is endowed with an action of Dic3 by automorphisms.
The aim of this section is the study of those Lie algebras endowed with
an action of Dic3 by automorphisms.
18
ALBERTO ELDUQUE AND SUSUMU OKUBO
Let g be a Lie algebra endowed with such an action. Then φ induces a
grading over Z3:
(5.3)
where g1 = {x ∈ g : φ(x) = x}, gω = {x ∈ g : φ(x) = ωx} and gω2 = {x ∈
g : φ(x) = ω2x}.
g = g1 ⊕ gω ⊕ gω2,
Since φθφ = θ, the following conditions hold:
θ(g1) = g1,
θ(gω) = gω2,
θ(gω2) = gω.
This allows us to define a unary, binary and ternary operations on gω as
follows:
¯x = θ2(x),
x ∗ y = θ−1(cid:0)[x, y](cid:1),
{x, y, z} = [[x, θ(y)], z],
(5.4a)
(5.4b)
(5.4c)
for x, y, z ∈ gω. It is easy to check that these are indeed well defined. For
instance, for x, y, z ∈ gω, θ(y) belongs to gω2, and hence we have [x, θ(y)] ∈
[gω, gω2 ] ⊆ g1 and {x, y, z} = [[x, θ(y)], z] ∈ [g1, gω] ⊆ gω.
Theorem 5.1. Let g be a Lie algebra over a field F containing the primitive
cubic roots of 1, endowed with an action by automorphisms of the dicyclic
group Dic3. Let ¯x, x ∗ y and {x, y, z} be defined as in (5.4) on gω = {x ∈
g : φ(x) = ωx}. Then the binary product x ∗ y is anticommutative and
the map x 7→ ¯x is an order 2 automorphism of both the binary and the
ternary products: x ∗ y = ¯x ∗ ¯y, {x, y, z} = {¯x, ¯y, ¯z}. Moreover, the following
identities hold for any u, v, , w, x, y, z ∈ gω:
(D1): {x, z, y} − {y, z, x} = (¯x ∗ ¯y) ∗ ¯z,
(D2): {u, ¯v, x ∗ y} + {v, u, x} ∗ y + x ∗ {v, u, y} = 0,
(D3): {x, y ∗ z, w} + {y, z ∗ x, w} + {z, x ∗ y, w} = 0,
(D4): {¯x ∗ ¯y, z, w} + {¯y ∗ ¯z, x, w} + {¯z ∗ ¯x, y, w} = 0,
(D5): {u, v, {x, y, z}} = {{u, v, x}, y, z} − {x, {v, ¯u, y}, z} + {x, y, {u, v, z}}.
Proof. The anticommutativity of x ∗ y is clear. Also, since θ2 generates the
center of the dicyclic group Dic3, it follows easily that x 7→ ¯x = θ2(x) is an
order 2 automorphism of both the binary and ternary products.
Now for x, y, z ∈ gω:
{x, z, y} − {y, z, x} = [[x, θ(z)], y] − [[y, θ(z)], x]
= [[x, y], θ(z)] = θ(cid:0)[θ−1([x, y]), z](cid:1)
= θ(cid:0)[x ∗ y, z]) = θ2(cid:0)θ−1([x ∗ y, z])(cid:1)
= (x ∗ y) ∗ z = (¯x ∗ ¯y) ∗ ¯z,
which gives (D1).
For any d ∈ g1 we have
[d, x ∗ y] = [d, θ−1([x, y])] = θ−1(cid:0)[θ(d), [x, y]](cid:1)
= θ−1(cid:0)[[θ(d), x], y] + [x, [θ(d), y]](cid:1)
= [θ(d), x] ∗ y + x ∗ [θ(d), y],
SPECIAL FREUDENTHAL-KANTOR TRIPLE SYSTEMS
19
and thus
{u, ¯v, x ∗ y} = [[u, θ(¯v)], x ∗ y]
= [θ([u, θ(¯v)]), x] ∗ y + x ∗ [θ([u, θ(¯v)]), y]
= −[[v, θ(u)], x] ∗ y − x ∗ [[v, θ(u)], y]
= −{v, u, x} ∗ y − x ∗ {v, u, y},
which gives (D2).
Equation (D3) is a direct consequence of the Jacobi identity, since {x, y ∗
z, w} = [[x, θ(y ∗ z)], w] = [[x, [y, z]], w]. The same happens for (D4), as {¯x ∗
¯y, z, w} = [[¯x ∗ ¯y, θ(z)], w] = [[x ∗ y, θ(z)], w] = [[θ2(cid:0)θ−1([x, y])(cid:1), θ(z)], w] =
[[[θ(x), θ(y)], θ(z)], w].
Finally,
{u, v, {x, y, z}}
= [[u, θ(v)], [[x, θ(y)], z]]
= [[[[u, θ(v)], x], θ(y)], z] + [[x, [[u, θ(v)], θ(y)]], z] + [[x, θ(y)], [[u, θ(v)], z]]
= {{u, v, x}, y, z} − [[x, θ(cid:0)[[v, θ−1(u)], y](cid:1)], z] + {x, y, {u, v, z}}
= {{u, v, x}, y, z} − {x, {v, ¯u, y}, z} + {x, y, {u, v, z}},
thus obtaining (D5).
(cid:3)
Definition 5.2. Let (A,¯, ∗, {...}) be a vector space endowed with a linear
endomorphism x 7→ ¯x, a binary product x ∗ y and a triple product {x, y, z}.
Then (A,¯, ∗, {...}) is said to be a dicyclic ternary algebra (or simply a D-
ternary algebra) if the linear map ¯ is an order 2 automorphism of both the
binary and the triple products, the binary product is anticommutative, and
conditions (D1) -- (D5) are satisfied.
Theorem 5.1 has a natural converse:
Theorem 5.3. Let (A,¯, ∗, {...}) be a dicyclic algebra. Let ι1(A) and ι2(A)
denote two copies of A, and for any u, v ∈ A denote by τ (u, v) ∈ EndF(A) the
linear map x 7→ {u, v, x}, and by τ (A, A) the linear span of these operators.
Then the vector space direct sum
g(A) = τ (A, A) ⊕ ι1(A) ⊕ ι2(A)
is a Lie algebra under the bracket:
[τ (u, v), τ (x, y)] = τ(cid:0){u, v, x}, y(cid:1) − τ(cid:0)x, {v, ¯u, y}(cid:1),
[τ (u, v), ι1(x)] = ι1(cid:0){u, v, x}(cid:1),
[τ (u, v), ι2(x)] = −ι2(cid:0){v, ¯u, x}(cid:1),
[ι1(x), ι1(y)] = ι2(x ∗ y),
[ι2(x), ι2(y)] = ι1(x ∗ y),
[ι1(x), ι2(y)] = τ (x, y),
for any u, v, x, y ∈ A.
20
ALBERTO ELDUQUE AND SUSUMU OKUBO
Moreover, if the ground field F contains the primitive cubic roots ω and
ω2 of 1, then g is endowed with an action by automorphisms of the dicyclic
group Dic3 as follows:
φ(cid:0)τ (x, y)(cid:1) = τ (x, y)
θ(cid:0)τ (x, y)(cid:1) = −τ (¯y, x)
for any x, y ∈ A.
φ(cid:0)ι1(x)(cid:1) = ωι1(x)
θ(cid:0)ι1(x)(cid:1) = ι2(x)
φ(cid:0)ι2(x)(cid:1) = ω2ι2(x)
θ(cid:0)ι2(x)(cid:1) = ι1(¯x)
(cid:3)
The proof consists of straightforward computations using (D1) -- (D5).
Note that the bracket [τ (u, v), τ (x, y)] is just, due to (D5), the bracket of
these operators in EndF(A).
In ending this section, we simply note that the generalized Malcev algebra
based upon the S3 symmetry considered in [EO09] is a special case of the
D-ternary algebra in which we have ¯x = x for any x ∈ U .
6. Dicyclic and J -ternary algebras
Let (J, T ) be a J-ternary algebra and consider the attached Lie algebra
in (2.17):
g(J, T ) =(cid:0)sl(V ) ⊗ J) ⊕(cid:0)V ⊗ T(cid:1) ⊕ d .
Then, if the ground field F contains the primitive cubic roots ω, ω2 of 1, the
dicyclic group Dic3 (which is a subgroup of the symplectic group Sp(V ) =
SL(V )) acts on g(J, T ) by automorphisms. Recall that the action of Dic3
on sl(V ) is by conjugation. The action on d is trivial.
Let {u, v} be a symplectic basis of V : (uv) = 1, and consider the standard
basis {H, E, F } of sl(V ), with coordinate matrices in this basis:
0
H ↔(cid:18)1
which satisfy
0 −1(cid:19) , E ↔(cid:18)0 1
0 0(cid:19) , F ↔(cid:18)0 0
1 0(cid:19) ,
(6.1)
[H, E] = 2E,
[H, F ] = −2F,
[E, F ] = H.
Let γw1,w2 = (w1.)w2 + (w2.)w1 be as in Lemma 2.1. Then, relative to our
symplectic basis we have:
γu,v = −H,
γu,u = 2E,
γv,v = −2F.
(6.2)
The action of the elements θ, φ ∈ Dic3 in (5.1) induces the action by conju-
gation on sl(V ), which satisfies:
φHφ−1 = H,
θHθ−1 = −H,
φEφ−1 = ω2E,
θEθ−1 = −F,
φF φ−1 = ωF,
θF θ−1 = −E.
(Note that σγw1,w2σ−1 = γσ(w1),σ(w2) for any σ ∈ Sp(V ) and w1, w2 ∈ V .)
Then the Lie algebra g = g(J, T ) decomposes under the action of φ as in
(5.3) with
g1 =(cid:0)H ⊗ J(cid:1) ⊕ d,
gω =(cid:0)F ⊗ J(cid:1) ⊕(cid:0)u ⊗ T(cid:1),
gω2 =(cid:0)E ⊗ J(cid:1) ⊕(cid:0)v ⊗ T(cid:1).
SPECIAL FREUDENTHAL-KANTOR TRIPLE SYSTEMS
21
Therefore gω =(cid:0)F ⊗ J(cid:1) ⊕(cid:0)u ⊗ T(cid:1) becomes a dicyclic ternary algebra with
order 2 automorphism given by
F ⊗ a = F ⊗ a,
u ⊗ x = −u ⊗ x,
for any a ∈ J and x ∈ T (recall from (5.4) that ¯ is the restriction to gω of
θ2), with binary and triple products given by the following formulas (where
we use (2.3)):
(F ⊗ a) ∗ (F ⊗ b) = θ−1(cid:0)[F ⊗ a, F ⊗ b](cid:1) = 0,
(F ⊗ a) ∗ (u ⊗ x) = θ−1(cid:0)[F ⊗ a, u ⊗ x](cid:1)
= θ−1(cid:0)v ⊗ a • x(cid:1)
= −u ⊗ a • x
(u ⊗ x) ∗ (u ⊗ y) = θ−1(cid:0)[u ⊗ x, u ⊗ y](cid:1)
= θ−1(cid:0)2E ⊗ hxyi(cid:1)
= −2F ⊗ hxyi,
and with triple product given by:
{F ⊗ a, u ⊗ x, X} = [[F ⊗ a, θ(u ⊗ x)], X]
= −[[F ⊗ a, v ⊗ x], X] = 0,
{u ⊗ x, F ⊗ a, X} = [[u ⊗ x, θ(F ⊗ a)], X]
= −[[u ⊗ x, E ⊗ a], X] = 0,
for any a ∈ J, x ∈ T , and by:
{F ⊗ a, F ⊗ b, F ⊗ c} = [[F ⊗ a, θ(F ⊗ b)], F ⊗ c]
= −[[F ⊗ a, E ⊗ b], F ⊗ c]
= [H ⊗ a · b − 2Da,b, F ⊗ c]
(as trace(F E) = 1)
{F ⊗ a, F ⊗ b, u ⊗ x} = [H ⊗ a · b − 2Da,b, u ⊗ x]
= −2F ⊗(cid:0)(a · b) · c + Da,b(c)(cid:1)
= −2F ⊗(cid:0)(a · b) · c + a · (b · c) − (a · c) · b(cid:1),
= u ⊗(cid:0)(a · b) • x − 2Da,b(x)(cid:1)
= u ⊗ (b • (a • x)),
(using (2.6) and (2.7))
{u ⊗ x, u ⊗ y, F ⊗ a} = [[u ⊗ x, θ(u ⊗ y)], F ⊗ a]
= −[[u ⊗ x, v ⊗ y], F ⊗ a]
= [H ⊗ hxyi − dx,y, F ⊗ a]
= F ⊗(cid:0)−2hxyi · a − dx,y(a)(cid:1)
= −2F ⊗ ha • xyi,
(using (2.9) and (2.11))
{u ⊗ x, u ⊗ y, u ⊗ z} = [H ⊗ hxyi − dx,y, u ⊗ z]
= u ⊗(cid:0)hxyi • z − dx,y(z)(cid:1)
= 2u ⊗ (x, y, z),
(using (2.14))
for any a, b ∈ J, x, y, z ∈ T and X ∈ gω.
22
ALBERTO ELDUQUE AND SUSUMU OKUBO
We may identify gω = (cid:0)F ⊗ J(cid:1) ⊕(cid:0)u ⊗ T(cid:1) with A = J ⊕ T , by means of
(F ⊗ a) + (u ⊗ x) ↔ a + x ∈ J ⊕ T .
The above computations are summarized in the next result.
Proposition 6.1. Let (J, T ) be a J-ternary algebra over a field F containing
the primitive cubic roots ω, ω2 of 1, and let g = g(J, T ) be the attached BC1-
graded Lie algebra of type C1 with the above action of the dicyclic group Dic3
by automorphisms. Then the dicyclic ternary algebra defined on gω by means
of (5.4) is isomorphic to the dicyclic ternary algebra (A = J ⊕ T,¯, ∗, {...})
with ¯a = a, ¯x = −x, for any a ∈ J and x ∈ T , and with
a ∗ b = 0,
a ∗ x = −x ∗ a = −a • x,
x ∗ y = −2hxyi,
{a, x, w} = 0 = {x, a, w},
{a, b, c} = −2(cid:0)(a · b) · c + a · (b · c) − (a · c) · b(cid:1),
{a, b, x} = b • (a • x),
{x, y, a} = −2ha • xyi,
{x, y, z} = 2(x, y, z),
(6.3)
for any a, b, c ∈ J, x, y, z ∈ T and w ∈ J ⊕ T .
(cid:3)
Let (J, T ) be a J-ternary algebra, and let A = J ⊕ T be the associated
dicyclic ternary algebra as in Proposition 6.1. Due to (6.3), the unity 1 of
the Jordan algebra J verifies the following conditions:
{1, 1, a} = −2a = {a, 1, 1},
{1, 1, x} = x,
{x, 1, 1} = 0,
{a, 1, b} = −2a · b,
1 ∗ a = 0,
1 ∗ x = −x,
(6.4)
for any a ∈ J and x ∈ T .
Our next purpose is to show that the existence of an element with these
properties characterizes the dicyclic ternary algebras coming from a J-
ternary algebra. Actually a stronger result (Corollary 6.7) will be proved.
Given a dicyclic ternary algebra (A,¯, ∗, {...}), the automorphism x 7→ ¯x
induces a Z2-grading: A = A0 ⊕ A1, where A0 = {x ∈ A : ¯x = x} and
A1 = {x ∈ A : ¯x = −x}. Usually the elements of A0 will be denoted by
a, b, ..., while the elements of A1 by x, y, ... in what follows.
Lemma 6.2. Let (A,¯, ∗, {...}) be a dicyclic ternary algebra which contains
an element e ∈ A0 such that {e, e, e} = −2e and τ (e, e) (= {e, e, .}) acts as a
scalar on both A0 and A1. Then {e, e, a} = −2a for any a ∈ A0, A0 ∗ A0 = 0
and either A ∗ A = 0 or {e, e, x} = x for any x ∈ A1.
Proof. As {e, e, e} = −2e, our hypotheses imply {e, e, a} = −2a for any
a ∈ A0. Let α ∈ F such that {e, e, x} = αx for any x ∈ A1. Now equation
(D2) implies {e, e, s ∗ t} + {e, e, s} ∗ t + s ∗ {e, e, t} = 0 for any s, t ∈ A.
For s = a ∈ A0 and t = b ∈ A0 we get −6a ∗ b = 0, so that A0 ∗ A0 = 0.
For s = a ∈ A0 and t = x ∈ A1 we get (2α − 2)a ∗ x = 0, so either α = 1
or A0 ∗ A1 = 0. Finally, for s = x ∈ A1 and t = y ∈ A1, we obtain
SPECIAL FREUDENTHAL-KANTOR TRIPLE SYSTEMS
23
(2 − 2α)x ∗ y = 0, so either α = 1 or A1 ∗ A1 = 0. Therefore either α = 1 or
A ∗ A = 0 as required.
(cid:3)
Lemma 6.3. Let (A,¯, ∗, {...}) be a dicyclic ternary algebra which contains
an element e ∈ A0 such that {e, e, a} = −2a for any a ∈ A0, and {e, e, x} =
x and {x, e, e} = 0 for any x ∈ A1. Then {A0, A1, A} = 0 = {A1, A0, A}.
Proof. Note first that for x ∈ A1,
{e, x, e} = {e, e, {e, x, e}}
= {{e, e, e}, x, e} − {e, {e, e, x}, e} + {e, x, {e, e, e}} using (D5)
= −2{e, x, e} − {e, x, e} − 2{e, x, e} = −5{e, x, e},
so we get {e, A1, e} = 0.
For a ∈ A0 and x ∈ A1, (D3) gives {e, a∗x, e}+{a, x∗e, e}+{x, e∗a, e} =
0, but e ∗ a = 0 (Lemma 6.2), and {e, a ∗ x, e} ∈ {e, A1, e} = 0. We conclude
that {A0, A1 ∗ e, e} = 0 holds. But (D1) gives x = {e, e, x} − {x, e, e} =
−(e ∗ x) ∗ e = (x ∗ e) ∗ e. Hence A1 ∗ e = A1 and {A0, A1, e} = 0.
Now (D4) gives {a∗x, e, e}−{x∗e, a, e}+{e∗a, x, e} = 0, but {a∗x, e, e} ∈
{A1, e, e} = 0 and e ∗ A0 ∈ A0 ∗ A0 = 0, so we conclude {A1, A0, e} = 0.
Therefore, {A0, A1, e} = {A1, A0, e} = 0. Finally, (D5) gives
[τ (e, e), τ (a, x)] = τ(cid:0){e, e, a}, x(cid:1) − τ(cid:0)a, {e, e, x}(cid:1) = −3τ (a, x),
but also
[τ (e, e), τ (a, x)] = −[τ (a, x), τ (e, e)] = −τ(cid:0){a, x, e}, e(cid:1) − τ(cid:0)e, {x, a, e}(cid:1) = 0.
Thus τ (a, x) = 0, and in the same vein we get τ (x, a) = 0, as required. (cid:3)
Under the conditions of the previous Lemma, the Lie algebra g(A) =
τ (A, A)⊕ι1(A)⊕ι2(A) in Theorem 5.3 satisfies that its subalgebra τ (A, A) =
τ (A0, A0) + τ (A1, A1) contains the elements
H = τ (e, e), E = −ι2(e), F = ι1(e),
which satisfy [E, F ] = H, [H, E] = 2E, and [H, F ] = −2F , and hence span
a subalgebra isomorphic to sl2(F). Moreover, the following conditions hold:
[E, ι1(A1)] = −τ (A1, e) = 0,
[F, ι1(x)] = ι2(e ∗ x),
[H, ι1(x)] = ι1(x),
[F, ι2(A1)] = τ (e, A1) = 0,
[E, ι2(x)] = ι1(e ∗ x),
[H, ι2(x)] = −ι2(x),
for any x ∈ A1.
Hence for any 0 6= x ∈ A1, the vector space Fι1(x) + Fι2(e ∗ x) is a two-
dimensional irreducible module for our copy of sl2(F), since e ∗ (e ∗ x) = x.
Also, we have [E, ι2(A0)] = 0 = [F, ι1(A0)] as e ∗ A0 = 0, and there-
fore, for any 0 6= a ∈ A0, the vector space Fι1(a) + Fτ (a, e) + Fι2({e, a, e})
is isomorphic to the adjoint module for sl2(F) under the map F 7→ ι1(a),
H 7→ τ (a, e) and E 7→ 1
2 ι2({e, a, e}), because [E, ι1(a)] = −[ι2(e), ι1(a)] =
τ (a, e), and [E, τ (a, e)] = [τ (a, e), ι2(e)] = −ι2({e, a, e} (while [E, H] =
−2E). Note that for any a ∈ A0, (D5) gives 4a = {a, e, {e, e, e}} =
{{a, e, e}, e, e} − {e, {e, a, e, }, e} + {e, e, {a, e, e}} = 8a − {e, {e, a, e}, e}, so
that {e, {e, a, e}, e} = 4a, and in particular {e, a, e} 6= 0 if a 6= 0.
We summarize these arguments in the following result:
24
ALBERTO ELDUQUE AND SUSUMU OKUBO
Lemma 6.4. Let (A,¯, ∗, {...}) be a dicyclic ternary algebra which contains
an element e ∈ A0 such that {e, e, a} = −2a for any a ∈ A0, and {e, e, x} =
x and {x, e, e} = 0 for any x ∈ A1. Then
• For any 0 6= a ∈ A0, the vector space Fι1(a)+ Fτ (a, e)+ Fι2({e, a, e})
is isomorphic to the adjoint module for sl2(F) under the map F 7→
ι1(a), H 7→ τ (a, e) and E 7→ 1
2 ι2({e, a, e})
• For any 0 6= x ∈ A1, the vector space Fι1(x) + Fι2(e ∗ x) is a two-
(cid:3)
dimensional irreducible module for sl2(F).
An extra previous result is still needed:
Lemma 6.5. Let (A,¯, ∗, {...}) be a dicyclic ternary algebra which con-
tains an element e ∈ A0 such that {e, e, a} = −2a for any a ∈ A0, and
{e, e, x} = x and {x, e, e} = 0 for any x ∈ A1. Then τ (A, A) = τ (A0, e) ⊕
Centg(A)(cid:0)sl2(F)(cid:1) (where Centg(A)(cid:0)sl2(F)(cid:1) denotes the centralizer in g(A) of
our subalgebra sl2(F) = FH ⊕ FE ⊕ FF ).
Proof. The element H = τ (e, e) acts diagonally with eigenvalues −2 on
ι1(A0), 2 on ι2(A0), 1 on ι1(A1), −1 on ι2(A1) and 0 on τ (A, A) = τ (A0, A0)+
τ (A1, A1) (see Theorem 5.3 for the bracket on the Lie algebra g(A)). In par-
ticular we have
Centg(A)(cid:0)sl2(F)(cid:1) ⊆ {X ∈ g(A) : [H, X] = 0} = τ (A, A).
Also note that for 0 6= a ∈ A0 and 0 6= x ∈ A1, [F, τ (a, e)] = −[τ (a, e), ι1(e)] =
−ι1({a, e, e}) = 2ι1(a) 6= 0, so we get
Now, for x, y ∈ A1, (D4) gives
τ (A0, e) ∩ Centg(A)(cid:0)sl2(F)(cid:1) = 0.
−τ (x ∗ e, y) − τ (e ∗ y, x) + τ (y ∗ x, e) = 0,
which we rewrite as
τ (x ∗ y, e) = τ (e ∗ x, y) − τ (e ∗ y, x).
Hence we get
τ (x ∗ y, e) +
1
1
2
and
τ (e ∗ x, y) =
2(cid:0)τ (e ∗ x, y) + τ (e ∗ y, x)(cid:1),
[τ (e ∗ x, y) + τ (e ∗ y, x), ι1(e)] = ι1(cid:0){e ∗ x, y, e} + {e ∗ y, x, e}(cid:1)
[τ (e ∗ x, y) + τ (e ∗ y, x), ι2(e)] = ι2(cid:0){y, e ∗ x, e} + {x, e ∗ y, e}(cid:1).
But τ (A0, A1) = 0 (Lemma 6.3) and (D1) gives:
(6.5)
(6.6)
(6.7)
{e ∗ x, y, e} = ((e ∗ x) ∗ e) ∗ y = −{x, e, e} ∗ y = −x ∗ y,
so
{e ∗ x, y, e} + {e ∗ y, x, e} = −(x ∗ y + y ∗ x) = 0.
In a similar way we get {x, e ∗ y, e} = (x ∗ e) ∗ (e ∗ y), so
{x, e ∗ y, e} + {y, e ∗ x, e} = −(cid:0)(e ∗ x) ∗ (e ∗ y) + (e ∗ y) ∗ (e ∗ x)(cid:1) = 0.
It follows now from (6.7) that
[τ (e ∗ x, y) + τ (e ∗ y, x), E] = 0 = [τ (e ∗ x, y) + τ (e ∗ y, x), F ],
SPECIAL FREUDENTHAL-KANTOR TRIPLE SYSTEMS
25
so that the element τ (e ∗ x, y) + τ (e ∗ y, x) is in Centrg(A)(cid:0)sl2(F)(cid:1), and hence
(6.6) shows that
τ (A1, A1) = τ (e ∗ A1, A1) ⊆ τ (A0, e) + Centrg(A)(cid:0)sl2(F)(cid:1).
Finally, for any a, b ∈ A0 we have:
(6.8)
[τ (a, e), τ (b, e)] = τ ({a, e, b}, e) − τ (b, {e, a, e}),
[τ (a, e), τ (b, e)] = −[τ (b, e), τ (a, e)] = −τ ({b, e, a}, e) + τ (a, {e, b, e}).
Hence, as {a, e, b} = {b, e, a} by (D1) (as A0 ∗ A0 = 0 by Lemma 6.2), we
get
2τ ({a, e, b}, e) = τ (a, {e, b, e}) + τ (b, {e, a, e}),
and
τ (a, {e, b, e}) = τ ({a, e, b}, e) +
Also,
−2{a, e, b} = {a, e, {b, e, e}}
1
2(cid:0)τ (a, {e, b, e} − τ (b, {e, a, e}(cid:1).
(6.9)
= {{a, e, b}, e, e} − {b, {e, a, e}, e} + {b, e, {a, e, e}}
= −2{a, e, b} − {b, {e, a, e}, e} − 2{b, e, a}.
Hence {b, {e, a, e}, e} = 2{b, e, a}, which is symmetric on a, b by (D1).
Therefore,
[τ (a, {e, b, e}) − τ (b, {e, a, e}), F ] = [τ (a, {e, b, e}) − τ (b, {e, a, e}), ι1(e)]
And because of (D1) and (D5) we have:
= ι1(cid:0){a, {e, b, e}, e} − {b, {e, a, e}, e}(cid:1) = 0.
{{e, a, e}, b, e} = {e, b, {e, a, e}}
= {{e, b, e}, a, e} − {e, {b, e, a}, e} + {e, a, {e, b, e}}
= 2{{e, b, e}, a, e} − {e, {b, e, a}, e}.
Thus 2{{e, b, e}, a, e} − {{e, a, e}, b, e} = {e, {b, e, a}, e} is symmetric on a, b.
Adding the symmetric element {{e, b, e}, a, e} + {{e, a, e}, b, e} we obtain
that {{e, b, e}, a, e} is symmetric on a, b. Then we get:
[τ (a, {e, b, e}) − τ (b, {e, a, e}), E] = −[τ (a, {e, b, e}) − τ (b, {e, a, e}), ι2(e)]
= ι2(cid:0){{e, b, e}, a, e} − {{e, a, e}, b, e}(cid:1) = 0.
Therefore τ (a, {e, b, e}) − τ (b, {e, a, e}) belongs to Centrg(A)(cid:0)sl2(F)(cid:1), and
equation (6.9) gives:
τ (A0, A0) = τ (A0, {e, A0, e}) ⊆ τ (A0, e) + Centrg(A)(cid:0)sl2(F)(cid:1).
Equations (6.5), (6.8) and (6.10) give the desired result.
(6.10)
(cid:3)
Theorem 6.6. Let (A,¯, ∗, {...}) be a dicyclic ternary algebra which contains
an element e ∈ A0 such that {e, e, a} = −2a for any a ∈ A0, and {e, e, x} =
x and {x, e, e} = 0 for any x ∈ A1. Then the attached Lie algebra g(A) in
Theorem 5.3 is a BC1-graded Lie algebra of type C1.
26
ALBERTO ELDUQUE AND SUSUMU OKUBO
Proof. The two previous lemmas show that we have a decomposition:
g(A) =(cid:16)τ (A0, e)⊕ ι1(A0)⊕ ι2(A0)(cid:17)⊕(cid:16)ι1(A1)⊕ ι2(A1)(cid:17) ⊕ Centrg(A)(cid:0)sl2(F)(cid:1),
where
• τ (A0, e) ⊕ ι1(A0) ⊕ ι2(A0) is a direct sum of copies of the adjoint
module for sl2(F) = FH + FE + FF ,
• ι1(A1) ⊕ ι2(A1) is a direct sum of copies of the two-dimensional
irreducible module for sl2(F),
• Centrg(A)(cid:0)sl2(F)(cid:1) is a trivial module for sl2(F),
and this proves the Theorem.
(cid:3)
Therefore, under the hypotheses of this Theorem, the Lie algebra g(A)
can be identified to
where we fix a symplectic basis {u, v} of V , take H, E, F the endomorphisms
of V with coordinate matrices given in (6.1), and identify elements as follows:
(cid:0)sl(V ) ⊗ A0(cid:1) ⊕(cid:0)V ⊗ A1(cid:1) ⊕ d,
H ⊗ a ↔ τ (a, e)
E ⊗ a ↔
1
2
ι2({e, a, e})
F ⊗ a ↔ ι1(a)
u ⊗ x ↔ ι1(x)
v ⊗ x ↔ ι2(e ∗ x)
for any a ∈ A0 and x ∈ A1. Also we take the subalgebra d = Centrg(A)(cid:0)sl2(F)(cid:1) =
Centrτ (A,A)(cid:0)sl2(F)(cid:1).
The Lie bracket in g(A) then induces some operations as in (2.3) and (2.4)
on A0 and A1, which we determine now. We take a, b ∈ A0 and x, y, z ∈ A1.
• [H ⊗ a, F ⊗ b] = −2F ⊗ a · b, but [τ (a, e), ι1(b)] = ι1({a, e, b}). Hence,
a · b = −
1
2
{a, e, b}.
• [H ⊗ a, u ⊗ x] = u ⊗ a • x, and [τ (a, e), ι1(x)] = ι1({a, e, x}), so
a • x = {a, e, x}.
• [u ⊗ x, v ⊗ y] = −H ⊗ hxyi + dx,y, and [ι1(x), ι2(e ∗ y)] = τ (x, e ∗ y).
Since (x ∗ e) ∗ e = −{x, e, e} + {e, e, x} = x (see (D1)), equation
(6.6) gives
τ (x, e ∗ y) = τ (e ∗ (e ∗ x), e ∗ y)
=
1
2
so we get:
τ ((e ∗ x) ∗ (e ∗ y), e) +
1
2(cid:0)τ (x, e ∗ y) + τ (y, e ∗ x)(cid:1),
hxyi = −
1
2
(e ∗ x) ∗ (e ∗ y),
dx,y =
1
2(cid:0)τ (x, e ∗ y) + τ (y, e ∗ x)(cid:1),
SPECIAL FREUDENTHAL-KANTOR TRIPLE SYSTEMS
27
and, because of (2.14),
(x, y, z) =
1
= −
= −
1
1
4(cid:0)−{x, e ∗ y, z} − {y, e ∗ x, z} − {(e ∗ x) ∗ (e ∗ y), e, z}(cid:1)
4(cid:0){x, e ∗ y, z} + {y, e ∗ x, z}
+ {(e ∗ y) ∗ e, e ∗ x, z} + {e ∗ (e ∗ x), e ∗ y, z}(cid:1)
4(cid:0)2{x, e ∗ y, z}(cid:1) = −
{x, e ∗ y, z},
1
2
where (D1) and (D4) have been used.
This proves the following result:
Corollary 6.7. Let (A,¯, ∗, {...}) be a dicyclic ternary algebra which con-
tains an element e ∈ A0 such that {e, e, a} = −2a for any a ∈ A0, and
{e, e, x} = x and {x, e, e} = 0 for any x ∈ A1. Then the pair (A0, A1) is a
J-ternary algebra with operations:
a · b = −
1
2
{a, e, b},
a • x = {a, e, x},
hxyi = −
(x, y, z) = −
1
2
1
2
(e ∗ x) ∗ (e ∗ y),
{x, e ∗ y, z},
for any a, b ∈ A0 and x, y, z ∈ A1.
(cid:3)
Remark 6.8. Had we started with the dicyclic ternary algebra A = J ⊕ T
attached to a J-ternary algebra, with e = 1 ∈ J as in Proposition 6.1, then
the element e would satisfy, besides the conditions {e, e, a} = −2a for any
a ∈ A0 = J and {e, e, x} = x, {x, e, e} = 0 for any x ∈ A1 = T , the extra
condition e ∗ x = −1 • x = −x for any x ∈ T in (6.4), and hence we would
have obtained
a · b = −
1
2
{a, e, b},
a • x = {a, e, x} = −(a ∗ x) ∗ e = −a ∗ x (using (D1)),
hxyi = −
1
2
x ∗ y,
(x, y, z) =
1
2
{x, y, z},
for a, b ∈ J and x, y, z ∈ T , which recover the original operations in J and
T (see (6.3)).
7. (ǫ, δ) Freudenthal-Kantor triple systems and dicyclic
algebras
The results in Section 6 show that for a J-ternary algebra (J, T ), the
Lie algebra g(J, T ) is a Lie algebra with dicyclic symmetry, because the
dicyclic group is contained in the symplectic group Sp(V ) which acts by
In particular (see Section 3) given a special
automorphisms on g(J, T ).
28
ALBERTO ELDUQUE AND SUSUMU OKUBO
(1, 1) Freudenthal-Kantor triple system (U, xyz), the pair (J, U ) is endowed
with a structure of J-ternary algebra (Theorem 3.7), where J is the special
Jordan algebra F1 + K(U, U ), and hence we get that the corresponding Lie
algebra g(J, U ) is a Lie algebra with dicyclic symmetry (that is, there is an
action of the dicyclic group Dic3 by automorphisms on g(J, U )).
In this section, given an arbitrary (ǫ, δ) Freudenthal-Kantor triple system
(U, xyz), a 5-graded Lie algebra, for δ = 1, or Lie superalgebra, for δ = −1,
with dicyclic symmetry will be defined. For a special (1, 1) Freudenthal-
Kantor triple system this algebra is quite close to our previous g(J, U ).
The construction of g(U ) is based on the pioneering work of Yamaguti
and Ono [YO84].
Thus, let (U, xyz) be a (ǫ, δ) Freudenthal-Kantor triple system, then the
space of 2 × 1 matrices over U :
T =(cid:26)(cid:18)x
y(cid:19) : x, y ∈ U(cid:27)
becomes a Lie triple system for δ = 1 and an anti-Lie triple system for
δ = −1 (see [YO84, Section 3]) by means of the triple product:
b2(cid:19)(cid:18)a3
b3(cid:19)(cid:21)
(cid:20)(cid:18)a1
b1(cid:19)(cid:18)a2
=(cid:18)L(a1, b2) − δL(a2, b1)
−ǫK(b1, b2)
and, therefore, the vector space
δK(a1, a2)
ǫL(b2, a1) − ǫδL(b1, a2)(cid:19)(cid:18)a3
b3(cid:19)
L = span(cid:26)(cid:18) L(a, b) K(c, d)
ǫL(b, a)(cid:19) : a, b, c, d, e, f ∈ U(cid:27)
K(e, f )
(7.1)
(7.2)
is a Lie subalgebra of Mat2(cid:0)EndF(U )(cid:1)−. (Given an associative algebra A,
A− denotes the Lie algebra defined on A with product given by the usual
Lie bracket [x, y] = xy − yx.)
Hence we get either a Z2-graded Lie algebra (for δ = 1) or a superalgebra
(for δ = −1)
g(U ) = L ⊕ T
(7.3)
where L is the even part and T the odd part. The bracket in g(U ) is given
by:
• the given bracket in L as a subalgebra of Mat2(cid:0)EndF(U )(cid:1)−,
• [M, X] = M (X) for any M ∈ L and X ∈ T (note that Mat2(cid:0)EndF(U )(cid:1) ≃
EndF(T )),
• for any a1, a2, b1, b2 ∈ U :
(cid:20)(cid:18)a1
b1(cid:19) ,(cid:18)a2
b2(cid:19)(cid:21) =(cid:18)L(a1, b2) − δL(a2, b1)
−ǫK(b1, b2)
δK(a1, a2)
ǫL(b2, a1) − ǫδL(b1, a2)(cid:19) .
SPECIAL FREUDENTHAL-KANTOR TRIPLE SYSTEMS
29
This (super)algebra g(U ) is consistently Z-graded as follows:
0
ǫL(b, a)(cid:19) : a, b ∈ U(cid:27) ,
0
g(U )(0) = span(cid:26)(cid:18)L(a, b)
g(U )(1) =(cid:18)U
0(cid:19) ,
g(U )(−1) =(cid:18) 0
U(cid:19) ,
g(U )(2) = span(cid:26)(cid:18)0 K(a, b)
g(U )(−2) = span(cid:26)(cid:18) 0
0
0 (cid:19) : a, b ∈ U(cid:27) ,
K(a, b) 0(cid:19) : a, b ∈ U(cid:27) ,
0
so that g(U ) is 5-graded and
L = g(U )(−2) ⊕ g(U )(0) ⊕ g(U )(2),
T = g(U )(−1) ⊕ g(U )(1).
On the other hand, if U is a special (ǫ, ǫ) Freudenthal-Kantor triple sys-
tem, Corollaries 3.8 and 4.6 give another construction of a Lie (super)algebra
g(J, U ) attached to U (Lie algebra for ǫ = 1 and superalgebra for ǫ = −1),
where J = F1 + K(U, U ):
with d = S(U, U ) (the linear span of the operators S(x, y) defined in (3.3)).
g(J, U ) =(cid:0)sl(V ) ⊗ J(cid:1) ⊕(cid:0)V ⊗ U(cid:1) ⊕ d,
Proposition 7.1. Let (U, xyz) be a special (ǫ, ǫ) Freudenthal-Kantor triple
system, and let {u, v} be a fixed symplectic basis of the two-dimensional
vector space V (so that (uv) = 1 for a fixed nonzero skew symmetric bilinear
map (..)). Then the linear map g(U ) → g(J, U ) given by:
(cid:18)L(a, b)
0
0
(cid:18)a
b(cid:19) ∈ T 7→ u ⊗ a + v ⊗ b ∈ V ⊗ U,
ǫL(b, a)(cid:19) 7→ −ǫγu,v ⊗ K(a, b) − S(a, b) ∈(cid:0)sl(V ) ⊗ J(cid:1) ⊕ d,
(cid:18)0 K(a, b)
0 (cid:19) 7→ −γu,u ⊗ K(a, b) ∈ sl(V ) ⊗ J,
(cid:18) 0
K(a, b) 0(cid:19) 7→ γv,v ⊗ K(a, b) ∈ sl(V ) ⊗ J,
0
0
for any a, b ∈ U , is a one-to-one Lie (super)algebra homomorphism.
Proof. This is done by straightforward computations.
(cid:3)
Under this homomorphism g(U )(1) (respectively g(U )(−1)) is identified to
u ⊗ U (respectively v ⊗ U ).
In particular, for a special (ǫ, ǫ) Freudenthal-Kantor triple system, the Lie
(super)algebra g(U ) inherits the dicyclic symmetry from g(J, U ) considered
in Section 3 (assuming the primitive cubic roots ω and ω2 of 1 are contained
in the ground field F).
Our next purpose is to check that for any arbitrary (ǫ, δ) Freudenthal-
Kantor triple system (U, xyz) the Lie (super)algebra g(U ) presents dicyclic
30
ALBERTO ELDUQUE AND SUSUMU OKUBO
symmetry (assuming ω ∈ F), which restricts to the previous one for the
special (ǫ, ǫ) Freudenthal-Kantor triple systems.
First, the fact that g(U ) is Z-graded gives a group homomorphism:
F× −→ Aut(cid:0)g(U )(cid:1)
µ 7→ φµ : X 7→ µiX, for X ∈ g(U )(i), −2 ≤ i ≤ 2.
Also, the map
θ : T −→ T
(cid:18)a
b(cid:19) 7→ (cid:18)−ǫb
δa (cid:19) for a, b ∈ U ,
is an automorphism of the (anti)Lie triple system T , and hence extends
naturally to an automorphism, also denoted by θ, of g(U ) = L ⊕ T , with
θ(M ) = θM θ−1 for any M ∈ L ⊆ EndF(T ).
Note that θ2 = 1 for ǫ = −δ, while θ4 = 1 6= θ2 for ǫ = δ. For ǫ = δ, θ2 is
−1 on T and 1 on L, so it coincides with the Z2-grading automorphism of
g(U ). A few computations give precise formulas for the action of θ:
θ(cid:18)L(a, b)
0
0
0
θ(cid:18)0 K(a, b)
ǫL(b, a)(cid:19) =(cid:20)θ(cid:18)a
0(cid:19) , θ(cid:18)0
b(cid:19)(cid:21)
0(cid:19)(cid:21) =(cid:18)ǫL(b, a)
a(cid:19) ,(cid:18)b
= −ǫδ(cid:20)(cid:18)0
0 (cid:19) = δ(cid:20)θ(cid:18)a
0(cid:19) , θ(cid:18)b
0(cid:19)(cid:21)
= δ(cid:20)(cid:18)0
a(cid:19) ,(cid:18)0
b(cid:19)(cid:21) = −ǫδ(cid:18) 0
b(cid:19)(cid:21)
a(cid:19) , θ(cid:18)0
K(a, b) 0(cid:19) = −ǫ(cid:20)θ(cid:18)0
θ(cid:18) 0
= −ǫ(cid:20)(cid:18)a
0(cid:19) ,(cid:18)b
0(cid:19)(cid:21) = −ǫδ(cid:18)0 K(a, b)
0 (cid:19) .
K(a, b) 0(cid:19) ,
0
0
0
0
L(a, b)(cid:19) ,
0
Assuming ω ∈ F, the automorphisms φ = φω and θ satisfy (5.2). The
action of φ induces a Z3-grading: g(U ) = g(U )1 ⊕ g(U )ω ⊕ g(U )ω2, with
g(U )1 = g(U )(0), g(U )ω = g(U )(−2) ⊕ g(U )(1) ≃ K(U, U ) ⊕ U , and g(U )ω2 =
g(U )(2) ⊕ g(U )(−1) ≃ K(U, U ) ⊕ U
Remark 7.2. Actually, for δ = −ǫ we get θ2 = 1, and hence φ and θ
generate a subgroup of automorphisms of g(U ) isomorphic to the symmetric
group S3.
In particular, for δ = −ǫ = 1, g(U ) is a Lie algebra with S3-
symmetry, and this defines a structure of generalized Malcev algebra (see
[EO09]) on gω ≃ K(U, U ) ⊕ U . This extends [EO09, Proposition 4.1].
For ǫ = δ = 1, g(U ) becomes a Lie algebra with dicyclic symmetry, and
this shows that A = g(U )ω ≃ K(U, U ) ⊕ U becomes a dicyclic ternary
algebra (see Section 5), with A0 = g(U )(−2) ≃ K(U, U ) (fixed by θ2) and
A1 = g(U )(1) ≃ U . Identify U with A1 = g(U )(1) and K(U, U ) with A0 =
SPECIAL FREUDENTHAL-KANTOR TRIPLE SYSTEMS
31
g(U )(−2) in the natural way:
u ↔(cid:18)u
0(cid:19) ,
K(a, b) ↔(cid:18) 0
K(a, b) 0(cid:19) .
0
After these identifications, we can compute the binary and ternary prod-
ucts in (5.4).
First note that A0∗A0 = 0 as [g(U )(−2), g(U )(−2)] = 0. Also, for a, b, x, y ∈
U we have:
0
θ−1(cid:18)(cid:20)(cid:18) 0
θ−1(cid:18)(cid:20)(cid:18)x
K(a, b) 0(cid:19) ,(cid:18)0
0(cid:19) ,(cid:18)y
x(cid:19)(cid:21)(cid:19) = θ−1(cid:18)
0(cid:19)(cid:21)(cid:19) = θ−1(cid:18)0 K(x, y)
K(a, b)x(cid:19) =(cid:18)K(a, b)x
(cid:19) ,
0 (cid:19) = −(cid:18) 0
K(x, y) 0(cid:19) .
0
0
0
0
Therefore, the binary product in A = K(U, U ) ⊕ U is given by:
M1 ∗ M2 = 0,
M ∗ x = M x,
x1 ∗ x2 = −K(x1, x2),
(7.4)
for any M, M1, M2 ∈ K(U, U ) and x, x1, x2 ∈ U .
On the other hand we have:
[g(U )(1), θ(cid:0)g(U )(−2)(cid:1)] = [g(U )(1), g(U )(2)] = 0 = [g(U )(−2), θ(cid:0)g(U )(1)(cid:1)],
so we get the following instances of the triple product:
{A0, A1, A} = 0 = {A1, A0, A}.
Now, for any a1, a2, b1, b2 ∈ U , we get
(cid:20)(cid:18)
0
0
0
0
K(a2, b2) 0(cid:19)(cid:21)
K(a1, b1) 0(cid:19) ,(cid:18)0 K(a2, b2)
K(a1, b1) 0(cid:19) , θ(cid:18)
= −(cid:20)(cid:18)
=(cid:18)K(a2, b2)K(a1, b1)
0
0
0
0
0
(cid:19)(cid:21)
0
−K(a1, b1)K(a2, b2)(cid:19) .
The fact that this last matrix belongs to g(U )(0) is a consequence of the next
result (see [YO84, (2.9) and (2.10)]).
Lemma 7.3. Let (U, xyz) be an (ǫ, δ) Freudenthal-Kantor triple system,
then for any a, b, c, d ∈ U the following identities hold:
ǫK(a, b)K(c, d) + L(cid:0)K(a, b)c, d(cid:1) − δL(cid:0)K(a, b)d, c(cid:1) = 0,
K(c, d)K(a, b) + δL(cid:0)c, K(a, b)d(cid:1) − L(cid:0)d, K(a, b)c(cid:1) = 0.
Proof. Equation (3.2b) gives
(7.5a)
(7.5b)
K(cid:0)K(u, v)x, y(cid:1)z − δK(cid:0)K(u, v)z, y(cid:1)x
But (3.1) gives K(cid:0)K(u, v)x, y(cid:1)z + δL(y, z)K(u, v)x = L(cid:0)K(u, v)x, z)y and
a similar relation holds interchanging x and z, whence (7.5a).
= L(y, x)K(u, v)z − δL(y, z)K(u, v)x − ǫK(u, v)K(x, z)y,
32
ALBERTO ELDUQUE AND SUSUMU OKUBO
On the other hand, equation (3.2a) gives:
[L(u, v), L(x, y)] − δ[L(u, y), L(x, v)]
= L(cid:0)L(u, v)x, y(cid:1) − δL(cid:0)L(u, y)x, v(cid:1) + ǫL(cid:0)x, K(v, y)u(cid:1).
Interchange u and x to get
[L(x, v), L(u, y)] − δ[L(x, y), L(u, v)]
= L(cid:0)L(x, v)u, y(cid:1) − δL(cid:0)L(x, y)u, v(cid:1) + ǫL(cid:0)u, K(v, y)x(cid:1),
and this gives
δL(cid:0)L(u, v)x, y(cid:1) − L(cid:0)L(u, y)x, v(cid:1) + ǫδL(cid:0)x, K(v, y)u(cid:1)
= L(cid:0)L(x, v)u, y(cid:1) − δL(cid:0)L(x, y)u, v(cid:1) + ǫL(cid:0)u, K(v, y)x(cid:1),
or
δL(cid:0)x, K(v, y)u(cid:1) − L(cid:0)u, K(v, y)x(cid:1) = ǫL(cid:0)K(x, u)v, y(cid:1) + ǫL(cid:0)K(u, x)y, v(cid:1),
whose right hand side equals −K(x, u)K(v, y), due to (7.5a), thus getting
(7.5b).
(cid:3)
Coming back to the case ǫ = δ = 1, for a1, a2, a3, b1, b2, b3, x ∈ U we have
0
0
K(a2, b2) 0(cid:19)(cid:21) ,(cid:18)
0
0
K(a3, b3) 0(cid:19)(cid:21)
0
−K(a1, b1)K(a2, b2)K(a3, b3) − K(a3, b3)K(a2, b2)K(a1, b1)
0
0
K(a1, b1) 0(cid:19) , θ(cid:18)
(cid:20)(cid:20)(cid:18)
=(cid:18)
(cid:20)(cid:20)(cid:18)
K(a1, b1) 0(cid:19) , θ(cid:18)
0
0
0
0 (cid:19) ,
(cid:19) .
0
0
K(a2, b2) 0(cid:19)(cid:21) ,(cid:18)x
0(cid:19)(cid:21) =(cid:18)K(a2, b2)K(a1, b1)x
0
Therefore, we get the following instances of the triple product on A =
K(U, U ) ⊕ U :
{M1, M2, M3} = −(cid:0)M1M2M3 + M3M2M1(cid:1),
{M1, M2, x} = M2M1x,
for any M1, M2, M3 ∈ K(U, U ) and x ∈ U . (Note that the triple product
{M1, M2, M3} is, up to the sign, the usual Jordan triple product in the
associative algebra EndF(U ).)
Finally, for any x1, x2 ∈ U :
(cid:20)(cid:18)x1
0(cid:19) , θ(cid:18)x2
0(cid:19)(cid:21) =(cid:20)(cid:18)x1
0(cid:19) ,(cid:18) 0
x2(cid:19)(cid:21) =(cid:18)L(x1, x2)
0
0
ǫL(x2, x1)(cid:19) ,
SPECIAL FREUDENTHAL-KANTOR TRIPLE SYSTEMS
33
so that we obtain, for any x1, x2, x3, a, b ∈ U :
0
0
0(cid:19)(cid:21) ,(cid:18) 0
K(a, b) 0(cid:19)(cid:21)
=(cid:18)
L(x2, x1)K(a, b) − K(a, b)L(x1, x2) 0(cid:19)
=(cid:18)
K(cid:0)K(a, b)x1, x2(cid:1) 0(cid:19) (see (3.2b))
0(cid:19)(cid:21) ,(cid:18)x3
0(cid:19)(cid:21) =(cid:18)L(x1, x2)x3
(cid:19) =(cid:18)x1x2x3
0 (cid:19) .
0
0
0
0
(cid:20)(cid:20)(cid:18)x1
0(cid:19) , θ(cid:18)x2
(cid:20)(cid:20)(cid:18)x1
0(cid:19) , θ(cid:18)x2
Hence we get the following instances of the triple product on A = K(U, U )⊕
U :
{x1, x2, M } = K(cid:0)M x1, x2(cid:1),
{x1, x2, x3} = x1x2x3,
for any x1, x2, x3 ∈ U and M ∈ K(U, U ).
Let us summarize the previous arguments in our last result, which at-
taches a dicyclic ternary algebra to an arbitrary (1, 1) Freudenthal-Kantor
triple system:
Theorem 7.4. Let (U, xyz) be a (1, 1) Freudenthal-Kantor triple system.
Then (cid:0)K(U, U ) ⊕ U,¯, ∗, {., ., .}(cid:1) is a dicyclic ternary algebra, where
¯M = M,
¯x = −x,
M1 ∗ M2 = 0, M ∗ x = M x,
x1 ∗ x2 = −K(x1, x2),
{M1, x1, M2} = {M1, x1, x2} = {x1, M1, M2} = {x1, M1, x2} = 0,
{M1, M2, M3} = −(cid:0)M1M2M3 + M3M2M1(cid:1),
{x1, x2, M } = K(cid:0)M x1, x2(cid:1),
for any x, x1, x2, x3 ∈ U and M, M1, M2, M3 ∈ K(U, U ).
{x1, x2, x3} = x1x2x3,
{M1, M2, x} = M2M1x,
(cid:3)
References
[All76]
[All78]
[ABG]
[BS03]
[Eld07]
[EO07]
[EO08]
[EO09]
B.N. Allison, A construction of Lie algebras from J -ternary algebras, Amer.
J. Math. 98 (1976), no. 2, 285 -- 294.
A class of nonassociative algebras with involution containing the class
of Jordan algebras, Math. Ann. 237 (1978), no. 2, 133-156.
B.N. Allison, G. Benkart, and Y. Gao, Lie Algebras Graded by the Root System
BCr, r ≥ 2, Mem. Amer. Math. Soc. 158 (2002), no. 751, x+158 pp.
G. Benkart and O. Smirnov, Lie Algebras Graded by the Root System BC1, J.
Lie Theory 13 (2003), no. 1, 91 -- 132.
A. Elduque, The S4-action on the tetrahedron algebra, Proc. Royal Soc. Edin-
burgh 137A (2007), no. 6, 1227 -- 1248.
A. Elduque and S. Okubo, Lie algebras with S4-action and structurable alge-
bras, J. Algebra 307 (2007), no. 2, 864 -- 890.
S4-symmetry on the Tits construction of exceptional Lie algebras and
superalgebras, Publ. Mat. 52 (2008), no. 2, 315 -- 346.
Lie algebras with S3 or S4-action and generalized Malcev algebras, Proc.
Royal Soc. Edinburgh 139A (2009), no. 2, 321 -- 354.
34
[Hei75]
[Jac67]
[Kan73]
[Koc09]
[Tits62]
[YO84]
ALBERTO ELDUQUE AND SUSUMU OKUBO
W. Hein, A construction of Lie algebras by triple systems, Trans. Amer. Math.
Soc. 205 (1975), 79 -- 95.
N. Jacobson Structure and representations of Jordan algebras, American Math-
ematical Society Colloquium Publications, Vol. XXXIX, American Mathemat-
ical Society, Providence, R.I. 1968 x+453 pp.
I.L. Kantor, Models of exceptional simple Lie algebras, Dokl. Akad. Nauk SSSR
208 (1973), 1276 -- 1279.
M. Kochetov, Gradings on finite-dimensional simple Lie algebras, Acta Appl.
Math. 108 (2009), no. 1, 101 -- 127.
J. Tits, Une classe d'alg`ebres de Lie en relation avec les alg`ebres de Jordan,
Nederl. Akad. Wetensch. Proc. Ser. A 65 = Indag. Math. 24 (1962), 530 -- 535.
K. Yamaguti and A. Ono, On representations of Freudenthal-Kantor triple
systems U (ǫ, δ), Bull. Fac. School Ed. Hiroshima Univ., Part II, 7 (1984),
43 -- 51.
Departamento de Matem´aticas e Instituto Universitario de Matem´aticas y
Aplicaciones, Universidad de Zaragoza, 50009 Zaragoza, Spain
E-mail address: [email protected]
Department of Physics and Astronomy, University of Rochester, Rochester,
NY 14627, USA
E-mail address: [email protected]
|
1703.00718 | 2 | 1703 | 2017-05-02T08:36:09 | The automorphisms of Petit's algebras | [
"math.RA"
] | Let $\sigma$ be an automorphism of a field $K$ with fixed field $F$. We study the automorphisms of nonassociative unital algebras which are canonical generalizations of the associative quotient algebras $K[t;\sigma]/fK[t;\sigma]$ obtained when the twisted polynomial $f\in K[t;\sigma]$ is invariant, and were first defined by Petit. We compute all their automorphisms if $\sigma$ commutes with all automorphisms in ${\rm Aut}_F(K)$ and $n\geq m-1$, where $n$ is the order of $\sigma$ and $m$ the degree of $f$,and obtain partial results for $n<m-1$. In the case where $K/F$ is a finite Galois field extension, we obtain more detailed information on the structure of the automorphism groups of these nonassociative unital algebras over $F$. We also briefly investigate when two such algebras are isomorphic. | math.RA | math |
THE AUTOMORPHISMS OF PETIT'S ALGEBRAS
C. BROWN AND S. PUMPL UN
Abstract. Let σ be an automorphism of a field K with fixed field F . We study the
automorphisms of nonassociative unital algebras which are canonical generalizations of
the associative quotient algebras K[t; σ]/f K[t; σ] obtained when the twisted polynomial
f ∈ K[t; σ] is invariant, and were first defined by Petit. We compute all their automor-
phisms if σ commutes with all automorphisms in AutF (K) and n ≥ m − 1, where n is
the order of σ and m the degree of f , and obtain partial results for n < m − 1. In the
case where K/F is a finite Galois field extension, we obtain more detailed information
on the structure of the automorphism groups of these nonassociative unital algebras over
F . We also briefly investigate when two such algebras are isomorphic.
Introduction
Let D be a division algebra, σ an injective endomorphism of D, δ a left σ-derivation and
R = D[t; σ, δ] a skew polynomial ring (for instance, c.f. [16, § 3.4]). For an invariant skew
polynomial f ∈ R, i.e. when the ideal Rf is a two-sided principal ideal, the quotient alge-
bra R/Rf appears in classical constructions of associative central simple algebras, usually
employing an irreducible f ∈ R to get examples of division algebras, e.g. see [15].
In 1967, Petit [22, 23] introduced a class of unital nonassociative algebras Sf , which
canonically generalize the quotient algebras R/Rf obtained when factoring out an invariant
f ∈ R of degree m. The algebra Sf = D[t; σ, δ]/D[t; σ, δ]f is defined on the additive subgroup
{h ∈ R deg(h) < m} of R by using right division by f to define the algebra multiplication
g ◦ h = gh modrf . The properties of the algebras Sf were studied in detail in [22, 23], and
for D a finite base field (hence w.l.o.g. δ = 0) in [20].
Even earlier, the algebra Sf with f (t) = t2 − i ∈ C[t;
appeared in [8] as the first example of a nonassociative division algebra.
],
the complex conjugation,
Although the algebras themselves have received little attention so far, the right nucleus
of Sf (the eigenspace of f ∈ R) already appeared implicitly in classical constructions by
Amitsur [2, 3, 4], but also in results on computational aspects of operator algebras; they
are for instance used in algorithms factoring skew polynomials over Fq(t) or finite fields, cf.
[11, 12, 13, 14]. The role of classical algebraic constructions in coding theory is well known
(cf. [16, Chapter 9], [17, 1, 7]).
Moreover, recently space-time block codes, coset codes and wire-tap codes were obtained
[9, 10, 21, 24, 27, 28, 29], and they also
employing the algebras Sf over number fields, cf.
appear useful for linear cyclic codes [25, 26].
2010 Mathematics Subject Classification. Primary: 17A35; Secondary: 17A60, 17A36, 16S36.
Key words and phrases. Skew polynomial ring, skew polynomials, Ore polynomials, automorphisms,
nonassociative algebras.
1
2
C. BROWN AND S. PUMPL UN
If K is a finite field, F the fixed field of σ, K/F a finite Galois field extension and
f ∈ K[t; σ] = K[t; σ, 0] irreducible and invariant, the Sf are Jha-Johnson semifields (also
called cyclic semifields) [20, Theorem 15], and were studied for instance by Wene [35] and
more recently by Lavrauw and Sheekey [20]. The main motivation for our paper comes from
the question how the automorphism groups of Jha-Johnson semifields look like. The results
presented here are applied to some Jha-Johnson semifields in [6].
The structure of this paper is as follows: In Section 1, we introduce the terminology and
define the algebras Sf . We limit our observations to the algebras which are not associative.
Given a field extension K, σ ∈ Aut(K) of order n with fixed field F , such that σ com-
mutes with all τ ∈ AutF (K), and f ∈ K[t; σ] of degree m not invariant, we compute the
automorphisms of Sf in Section 2. We obtain all automorphisms for n ≥ m − 1 and some
partial results for n < m − 1 (Theorems 4 and 5). For n ≥ m − 1, the automorphisms in
AutF (Sf ) are canonically induced by the F -automorphism G of R = K[t; σ] which satisfy
G(f (t)) = af (t) for some a ∈ K ×, and on K restrict to an automorphism that commutes
with τ .
The automorphisms groups of Sf where f (t) = tm − a ∈ K[t; σ], a ∈ K \ F , play a special
i=0 biti ∈ K[t; σ] and b0 = a, AutF (Sg)
role, as for all nonassociative Sg with g(t) = tm −Pm−1
is a subgroup of AutF (Sf ) when n ≥ m − 1.
We then focus on the situation that K/F is a finite Galois field extension such that σ
commutes with all τ ∈ Gal(K/F ). In many cases, either AutF (Sf ) ∼= Gal(K/F ) or is trivial
(Theorem 10). Necessary conditions for extending Galois automorphisms τ ∈ Gal(K/F )
to Sf are studied in Sections 3 and 4. The existence of cyclic subgroups of AutF (Sf ) is
investigated in Section 5.
For f (t) = tm − a ∈ K[t; σ] and K/F a cyclic field extension of degree m, the algebra
Sf is also called a nonassociative cyclic algebra and denoted by (K/F, σ, a). These algebras
are canonical generalizations of associative cyclic algebras, but also generalizations of the
algebras in [3, 15]. The automorphisms of nonassociative cyclic algebras are investigated
in Section 6. All the automorphisms of A = (K/F, σ, a) extending idK are inner and
form a cyclic subgroup of AutF (A) isomorphic to ker(NK/F ).
In some cases, this is the
whole automorphism group, e.g.
In these cases, every
automorphism of A leaves K fixed and is inner. We explain when the automorphism group
of a nonassociative quaternion algebra A (where m = 2) contains a dicyclic group and when
it contains a subgroup isomorphic to the semidirect product of two cyclic groups.
if F has no mth root of unity.
In Section 7 we briefly investigate isomorphisms between two algebras Sf and Sg.
This work is part of the first author's PhD thesis [5] written under the supervision of
the second author. For results on the automorphisms of the more general algebras defined
using f ∈ D[t; σ], or a more detailed study and the (less relevant) cases left out in this
paper the reader is referred to [5]. For examples of applications of the associated classical
constructions the readers are referred to [1, 7, 16, 17].
1. Preliminaries
THE AUTOMORPHISMS OF PETIT'S ALGEBRAS
3
1.1. Nonassociative algebras. Let F be a field and let A be an F -vector space. A is an
algebra over F if there exists an F -bilinear map A × A → A, (x, y) 7→ x · y, denoted simply
by juxtaposition xy, the multiplication of A. An algebra A is called unital if there is an
element in A, denoted by 1, such that 1x = x1 = x for all x ∈ A. We will only consider
unital algebras from now on without explicitly saying so.
Associativity in A is measured by the associator [x, y, z] = (xy)z − x(yz). The left
nucleus of A is defined as Nucl(A) = {x ∈ A [x, A, A] = 0}, the middle nucleus of A is
Nucm(A) = {x ∈ A [A, x, A] = 0} and the right nucleus of A is defined as Nucr(A) = {x ∈
A [A, A, x] = 0}. Nucl(A), Nucm(A), and Nucr(A) are associative subalgebras of A. Their
intersection Nuc(A) = {x ∈ A [x, A, A] = [A, x, A] = [A, A, x] = 0} is the nucleus of A.
Nuc(A) is an associative subalgebra of A containing F 1 and x(yz) = (xy)z whenever one of
the elements x, y, z lies in Nuc(A). The center of A is C(A) = {x ∈ A x ∈ Nuc(A) and xy =
yx for all y ∈ A}.
An F -algebra A 6= 0 is called a division algebra if for any a ∈ A, a 6= 0, the left
multiplication with a, La(x) = ax, and the right multiplication with a, Ra(x) = xa, are
bijective. If A has finite dimension over F , then A is a division algebra if and only if A
has no zero divisors [31, pp. 15, 16]. An element 0 6= a ∈ A has a left inverse al ∈ A, if
Ra(al) = ala = 1, and a right inverse ar ∈ A, if La(ar) = aar = 1.
An automorphism G ∈ AutF (A) is an inner automorphism if there is an element m ∈ A
with left inverse ml such that G(x) = (mlx)m for all x ∈ A. Given an inner automorphism
Gm ∈ AutF (A) and some H ∈ AutF (A), then clearly H −1 ◦ Gm ◦ H ∈ AutF (A) is an inner
automorphism. [34, Lemma 2, Theorem 3, 4] generalize to any nonassociative algebra:
Proposition 1. Let A be an algebra over F .
(i) For all invertible n ∈ Nuc(A), Gn(x) = (n−1x)n is an inner automorphism of A.
(ii) If Gm is an inner automorphism of A, then so is Gnm(x) = ((mln−1)x)(nm) for all
invertible n ∈ Nuc(A).
(iii) If Gm is an inner automorphism of A, and a, b ∈ Nuc(A) are invertible, then Gam =
Gbm if and only if ab−1 ∈ C(A).
(iv) For invertible n, m ∈ Nuc(A), Gm = Gn if and only if n−1m ∈ C(A).
The set {Gm m ∈ Nuc(A) invertible} is a subgroup of AutF (A). For each invertible
m ∈ Nuc(A) \ C(A), Gm generates a cyclic subgroup which has finite order s if ms ∈ C(A),
so in particular if m has order s.
Note that if the nucleus is commutative, then for all invertible n ∈ Nuc(A), Gn(x) =
(n−1x)n is an inner automorphism of A such that GnNuc(A) = idNuc(A).
1.2. Twisted polynomial rings. Let K be a field and σ an automorphism of K. The
twisted polynomial ring K[t; σ] is the set of polynomials a0 + a1t + ··· + antn with ai ∈ K,
where addition is defined term-wise and multiplication by ta = σ(a)t for all a ∈ K. For
f = a0 + a1t + ··· + antn with an 6= 0 define deg(f ) = n and put deg(0) = −∞. Then
deg(f g) = deg(f ) + deg(g). An element f ∈ R is irreducible in R if it is not a unit and it
has no proper factors, i.e. if there do not exist g, h ∈ R with deg(g), deg(h) < deg(f ) such
that f = gh.
4
C. BROWN AND S. PUMPL UN
R = K[t; σ] is a left and right principal ideal domain and there is a right division algorithm
in R: for all g, f ∈ R, g 6= 0, there exist unique r, q ∈ R with deg(r) < deg(f ), such that
g = qf + r. There is also a left division algorithm in R [15, p. 3 and Prop. 1.1.14]. (Our
terminology is the one used by Petit [22] and Lavrauw and Sheekey [20]; it is different from
Jacobson's, who calls what we call right a left division algorithm and vice versa.) Define
F = Fix(σ).
1.3. Nonassociative algebras obtained from skew polynomial rings. Let K be a
field, σ an automorphism of K with F = Fix(σ), and f ∈ R = K[t; σ] of degree m. Let
modrf denote the remainder of right division by f . Then then additive abelian group
Rm = {g ∈ K[t; σ] deg(g) < m} together with the multiplication g ◦ h = gh modrf is a
unital nonassociative algebra Sf = (Rm,◦) over F0 = {a ∈ K ah = ha for all h ∈ Sf}. F0
is a subfield of K [22, (7)] and it is straightforward to see that if f (t) = tm −Pm−1
i=0 aiti and
a0 6= 0 then F0 = F [25, Remark 9]. The algebra Sf is also denoted by R/Rf [22, 23] if we
want to make clear which ring R is involved in the construction. In the following, we call
the algebras Sf Petit algebras and denote their multiplication simply by juxtaposition.
Using left division by f and the remainder modlf of left division by f instead, we can
analogously define the multiplication for another unital nonassociative algebra on Rm over
F0, called f S. We will only consider the Petit algebras Sf , since every algebra f S is the
opposite algebra of some Petit algebra [22, (1)].
Theorem 2. (cf. [22, (2), (5), (9)]) Let f (t) ∈ R = K[t; σ].
(i) If Sf is not associative then Nucl(Sf ) = Nucm(Sf ) = K and Nucr(Sf ) = {g ∈ R f g ∈
Rf}.
(ii) The powers of t are associative if and only if tmt = ttm if and only if t ∈ Nucr(Sf ) if
and only if f t ∈ Rf.
(iii) Let f ∈ R be irreducible and Sf a finite-dimensional F -vector space or free of finite
rank as a right Nucr(Sf )-module. Then Sf is a division algebra.
Conversely, if Sf is a division algebra then f is irreducible.
(iv) Sf is associative if and only if f is invariant. In that case, Sf is the usual quotient
algebra.
(v) Let f (t) = tm − Pm−1
aiσi(z) for all z ∈ K, i ∈ {0, . . . , m − 1} and ai ∈ F for all i ∈ {0, . . . , m − 1}.
i=0 aiti ∈ R = K[t; σ]. Then f is invariant if and only if σm(z)ai =
Note that if f is not invariant, then the nucleus of any Sf = K[t; σ]/K[t; σ]f is a subfield
of K = Nucl(Sf ). If Nuc(Sf ) is larger than F , then {Gm 0 6= m ∈ Nuc(A)} is a non-trivial
subgroup of AutF (Sf ) and each inner automorphism Gm in this subgroup extends idNuc(A)
by Proposition 1.
Proposition 3. Let f (t) ∈ F [t] = F [t; σ] ⊂ K[t; σ].
(i) F [t]/(f (t)) is a commutative subring of Sf and F [t]/(f (t)) ∼= F ⊕ F t ⊕ ··· ⊕ F tm−1 ⊂
Nucr(Sf ). In particular, then f t ∈ Rf which is equivalent to the powers of t being associative,
which again is equivalent to tmt = ttm.
(ii) If f (t) is irreducible in F [t], F [t]/(f (t)) is an algebraic subfield of degree m contained
in the right nucleus.
THE AUTOMORPHISMS OF PETIT'S ALGEBRAS
5
Proof. Sf contains the commutative subring F [t]/(f (t)). If f (t) is irreducible in F [t], this
is an algebraic field extension of F . This subring is isomorphic to the ring consisting of the
i=0 aiti with ai ∈ F .
elements Pm−1
Clearly F ⊂ Nucr(Sf ). For all a, b, c ∈ K, i, j ∈ {0, . . . , m − 1} we have [ati, btj, t] =
(aσi(b)ti+j )t − (ati)(btj+1) = aσi(b)ti+j+1 − aσi(bc)ti+j = 0. Thus t ∈ Nucr(Sf ) which
implies that F ⊕ F t⊕···⊕ F tm−1 ⊂ Nucr(Sf ), hence the assertion. The rest is obvious. (cid:3)
We will assume throughout the paper that deg(f ) = m ≥ 2 (since if f is constant then
Sf ∼= K) and that σ 6= id. Without loss of generality, we only consider monic polynomials
f , since Sf = Saf for all non-zero a ∈ K.
2. Automorphisms of Sf
2.1. Let K be a field, σ an automorphism of K of order n (which may be infinite), F =
Fix(σ), and f (t) = tm − Pm−1
i=0 aiti ∈ K[t; σ] a twisted polynomial which is not invariant.
Theorem 4. Suppose σ commutes with all τ ∈ AutF (K). Let n ≥ m − 1. Then H is an
automorphism of Sf if and only if H = Hτ,k with
m−1
Hτ,k(
X
i=0
xiti) = τ (x0) + τ (x1)kt + τ (x2)kσ(k)t2 + ··· + τ (xm−1)kσ(k)··· σm−2(k)tm−1,
where τ ∈ AutF (K) and k ∈ K × is such that
τ (ai) = (cid:16)
(1)
m−1
Y
l=i
σl(k)(cid:17)ai
for all i ∈ {0, . . . , m − 1}.
Proof. Let H : Sf → Sf be an automorphism. Since Sf is not associative, Nucl(Sf ) = K
by Theorem 2 (i). Since any automorphism preserves the left nucleus, H(K) = K and so
HK = τ for some τ ∈ AutF (K). Suppose H(t) = Pm−1
i=0 kiti for some ki ∈ K. Then we
have
(2)
and
(3)
H(tz) = H(t)H(z) = (
kiti)τ (z) =
X
i=0
m−1
m−1
X
i=0
kiσi(τ (z))ti
H(tz) = H(σ(z)t) =
m−1
X
i=0
τ (σ(z))kiti
for all z ∈ K. Comparing the coefficients of ti in (2) and (3) we obtain
kiσi(τ (z)) = kiτ (σi(z)) = τ (σ(z))ki = kiτ (σ(z))
(4)
for all i ∈ {0, . . . , m − 1} and all z ∈ K. This implies ki(τ(cid:0)σi(z) − σ(z)(cid:1)) = 0 for all
i ∈ {0, . . . , m − 1} and all z ∈ K since σ and τ commute, i.e.
(5)
ki = 0 or σi(z) = σ(z)
for all i ∈ {0, . . . , m − 1} and all z ∈ K.
6
C. BROWN AND S. PUMPL UN
Since σ has order n ≥ m − 1, which means σi 6= σ for all i ∈ {0, . . . , m − 1}, i 6= 1, (5)
implies ki = 0 for all i ∈ {0, . . . , m − 1}, i 6= 1. Therefore H(t) = kt for some k ∈ K ×.
Furthermore, we have H(zti) = H(z)H(t)i = τ (z)(kt)i = τ (z)(cid:16)Qi−1
l=0 σl(k)(cid:17)ti for all i ∈
{1, . . . , m − 1} and z ∈ K. Thus H has the form
xiti) = τ (x0) +
σl(k)ti,
Hτ,k(
τ (xi)
(6)
m−1
m−1
X
i=0
X
i=1
i−1
Y
l=0
for some k ∈ K ×. Moreover, with tm = ttm−1, also
(7)
H(tm) = H(cid:16)
aiti(cid:17) =
m−1
X
i=0
m−1
H(ai)H(t)i = τ (a0) +
X
i=0
m−1
X
i=1
τ (ai)(cid:0)
i−1
Y
l=0
σl(k)(cid:1)ti
and H(ttm−1) = H(t)H(tm−1) = H(t)H(t)m−1, i.e.
(8)
H(t)m = H(t)H(t)m−1 = kσ(k)··· σm−1(k)tm = kσ(k)··· σm−1(k)
m−1
X
i=0
aiti.
q=i σq(k)(cid:17)ai for all i ∈ {0, . . . , m− 1}. Thus H is
Comparing (7) and (8) gives τ (ai) = (cid:16)Qm−1
as in (6) where k ∈ K × is such that (1) holds for all i ∈ {0, . . . , m − 1}.
The Hτ,k are indeed automorphisms of Sf : Let G be an automorphism of R = K[t; σ].
i=0 biti ∈ K[t; σ] we have G(h(t)) = τ (b0) + Pm−1
Then for h(t) = Pr
l=0 σl(k)ti for
some τ ∈ Aut(K) such that σ ◦ τ = τ ◦ σ and some k ∈ K × (the proof of [20, Lemma 1]
works for any R = K[t; σ], or cf. [18, p. 75]). It is straightforward to see that Sf ∼= SG(f )
[20, Theorem 7], the proof works for any R = K[t; σ]). In particular, this means that
(cf.
if k ∈ K × satisfies (1) then G(f (t)) = (cid:0)Qm−1
l=0 σl(k)(cid:1)f (t) = af (t) with a ∈ K × being
the product of the σl(k), and so G induces an isomorphism of Sf with Saf = Sf , i.e. an
automorphism of Sf . The automorphisms of AutF (Sf ) are therefore all canonically induced
by the F -automorphisms G of R = K[t; σ] which satisfy (1).
(cid:3)
i=i τ (bi)Qi−1
The assumption that n ≥ m − 1 is needed in (4) to conclude that ki = 0 for i =
0, 2, 3, . . . , m − 1 and so H(t) = kt. If n < m − 1 we still obtain:
Theorem 5. Suppose σ commutes with all τ ∈ AutF (K). Let n < m − 1.
(i) For all k ∈ K × satisfying (1) for all i ∈ {0, . . . , m − 1}, the maps Hτ,k from Theorem 4
are automorphisms of Sf and form a subgroup of AutF (Sf ).
(ii) Let H ∈ AutF (Sf ) and N = Nucr(Sf ). Then HK = τ for some τ ∈ AutF (K),
HN ∈ AutF (N ) and H(t) = g(t) with g(t) = k1t + k1+nt1+n + k1+2nt1+2n + . . .+ k1+snt1+sn
for some k1+ln ∈ K, 0 ≤ l ≤ s. Moreover, g(t)i is well defined for all i ≤ m − 1, i.e., all
powers of g(t) are associative for all i ≤ m − 1, and g(t)g(t)m−1 = Pm−1
i=0 τ (ai)g(t)i. Thus
m−1
m−1
H(
X
i=0
xiti) =
X
i=0
τ (xi)g(t)i.
Proof. (i) is straightforward, using the relevant parts of the proof of Theorem 4. Note that
the inverse of Hτ,k is Hτ −1,τ −1(k−1) and Hτ,k ◦ Hρ,b = Hτ ρ,τ (b)k.
(ii) Let H : Sf → Sf be an automorphism. As in Theorem 4, HK = τ for some τ ∈
AutF (K), and HN ∈ AutF (N ). Suppose H(t) = Pm−1
i=0 kiti for some ki ∈ K. Comparing
THE AUTOMORPHISMS OF PETIT'S ALGEBRAS
7
the coefficients of t in H(tz) = H(t)H(z) = H(σ(z)t) we obtain (5) for all i ∈ {0, . . . , m− 1}
and all z ∈ K. Since σ has order n < m − 1, here, (5) only implies ki = 0 for i ∈ {0, . . . , n},
i 6= 1. Therefore H(t) = k1t+Pm−1
i=n+1 kiti for some ki ∈ K. However, σi(z) = σ(z) for all z ∈
K if and only if i = nl+1 for some l ∈ Z since σ has order n. Therefore (5) implies ki = 0 for
every i 6= 1+nl, l ∈ N0, i ∈ {0, . . . , m − 1}. Thus H(t) = k1t+k1+ntn+1+. . .+k1+snt1+sn for
some s, sn < m− 1. Furthermore, H(tm) = H(Pm−1
i=0 τ (ai)(k1t + k1+nt1+n +
. . . + k1+snt1+sn)i and H(tm) = (k1t + k1+nt1+n + . . . + k1+snt1+sn)m. Similarly, H(t)i =
(k1t + k1+nt1+n + . . . + k1+snt1+sn)i. Together these imply the assertion.
(cid:3)
i=0 aiti) = Pm−1
A closer look at the proof of Theorems 4 and 5 reveals that in fact the following holds
without requiring σ to commute with all τ ∈ AutF (K):
Proposition 6. (i) For every k ∈ K × satisfying (1) for all i ∈ {0, . . . , m − 1} for τ = id,
Hid,k is an automorphism of Sf and generates a subgroup of AutF (Sf ).
(ii) If any H ∈ AutF (Sf ) restricts to some τ ∈ AutF (K) such that τ ◦ σ = σ ◦ τ then
H = Hτ,k with k ∈ K × as in Theorem 4. Moreover, {Hτ,k τ ∈ AutF (Sf ), τ ◦ σ = σ ◦ τ, k ∈
K × with τ (ai) = (Qm−1
(iii) If m = 2, H ∈ Aut(Sf ) if and only if H = Hτ,k with τ ◦ σ = σ ◦ τ , τ (a0) = kσ(k)a0,
and τ (a1) = σ(k)a1.
l=i σl(k))ai for all i ∈ {0, . . . , m − 1}} is a subgroup of AutF (Sf ).
2.2. The automorphisms groups of Sf for f (t) = tm − a ∈ K[t; σ], a ∈ K \ F , are crucial in
the understanding of the automorphism groups of all the algebras Sg, as for all nonassociative
Sg with g(t) = tm − Pm−1
i=0 biti ∈ K[t; σ] such that b0 = a, AutF (Sg) is a subgroup of
AutF (Sf ):
i=0 biti ∈ K[t; σ] not be invariant.
i=0 aiti ∈ K[t; σ] not be invariant and assume bi ∈ {0, ai} for all
Theorem 7. Suppose σ commutes with all τ ∈ Gal(K/F ). Let n ≥ m − 1 and g(t) =
tm − Pm−1
(i) If f (t) = tm − b0 ∈ K[t; σ], b0 ∈ K \ F , then AutF (Sg) ⊂ AutF (Sf ) is a subgroup.
(ii) Let f (t) = tm − Pm−1
i ∈ {0, . . . , m − 1}. Then AutF (Sg) ⊂ AutF (Sf ) is a subgroup.
Proof. (i) Let H ∈ AutF (Sg). By Theorem 4, H has the form H(Pm−1
Pm−1
for all i = 0, . . . , m − 1.
automorphism of Sf , again by Theorem 4.
(ii) The proof is analogous to (i).
i=0 xiti) = τ (x0) +
j=i σj(k)(cid:17)bi
In particular, τ (b0) = kσ(k)··· σm−1(k)b0 and so H is also an
i=1 τ (xi)Qi−1
l=0 σl(k)ti, where τ ∈ AutF (K) and k ∈ K × satisfy τ (bi) = (cid:16)Qm−1
(cid:3)
Similarily, for n < m − 1 employing Theorem 5 we obtain:
i=0 biti ∈ K[t; σ] not be invariant.
Theorem 8. Suppose σ commutes with all τ ∈ AutF (K). Let n < m − 1 and g(t) =
tm − Pm−1
(i) If f (t) = tm − b0 ∈ K[t; σ], b0 ∈ K \ F , then {H ∈ AutF (Sg) H = Hτ,k} is a subgroup
of {H ∈ AutF (Sf ) H = Hτ,k}.
(ii) Let f (t) = tm − Pm−1
i=0 aiti ∈ K[t; σ] not be invariant such that bi ∈ {0, ai} for all
i ∈ {0, . . . , m− 1} Then {H ∈ AutF (Sg) H = Hτ,k} is a subgroup of {H ∈ AutF (Sf ) H =
Hτ,k}.
8
C. BROWN AND S. PUMPL UN
The automorphism groups of Sf with f (t) = tm − a ∈ K[t; σ] are therefore particularly
relevant.
3. Necessary conditions for extending Galois automorphisms to Sf
From now on we restrict ourselves to the situation that R = K[t; σ] and F = Fix(σ),
where K/F is a finite Galois field extension and σ of order n.
We take a closer look at Equality (1), which gives necessary conditions on how to choose
the elements k ∈ K × used to extend τ ∈ Gal(K/F ) to AutF (Sf ). These become more
restrictive for the choice of the elements k, the more coefficients in f (t) are non-zero. Let
NK/F : K → F be the norm of K/F . All monic polynomials f considered in the following
are assumed to not be invariant and of degree m.
Proposition 9. Suppose that σ and τ commute. Let f (t) = tm − Pm−1
k ∈ K × such that
m−1
i=0 aiti ∈ K[t; σ] and
(1)
τ (ai) = (cid:16)
σl(k)(cid:17)ai
Y
l=i
for all i ∈ {0, . . . , m − 1}. Then:
(i) For all i ∈ {0, . . . , m − 1} with ai 6= 0, NK/F (k) is an (m − i)th root of unity.
In particular, if a0 6= 0 (e.g., if f (t) is irreducible) then NK/F (k) is an mth root of unity,
and if am−1 6= 0 then NK/F (k) = 1.
If am−1 ∈ Fix(τ )× then k = 1.
(ii) If τ 6= id and there is some i such that ai is not contained in Fix(τ ), then k 6= 1.
(iii) Suppose that there is some ai 6= 0 and F does not contain any non-trivial (m − i)th
roots of unity. Then NK/F (k) = 1.
(iv) If there is an i ∈ {0, . . . , m − 1} such that ai ∈ Fix(τ )×, then 1 = Qm−1
particular, if n = m, σ generates Gal(K/F ), and a0 ∈ Fix(τ )× then k ∈ ker(NK/F ).
(v) Suppose τ = idK. Then for all i ∈ {0, . . . , m − 1} with ai 6= 0, 1 = Qm−1
l=i σl(k). In
particular, if n = m, σ generates Gal(K/F ) and a0 6= 0 then k ∈ ker(NK/F ). In this case,
the automorphisms extending idK are in one-one correspondence with those k ∈ ker(NK/F )
satisfying (1).
l=i σl(k). In
Proof. (i) Equality (1) states that τ (ai) = (cid:16)Qm−1
l=i σl(k)(cid:17)ai for all i ∈ {0, . . . , m− 1}. Thus
NK/F (ai) = Qm−1
l=i NK/F (σl(k))NK/F (ai) (apply NK/F to both sides of (1)), and there-
fore NK/F (ai) = NK/F (k)m−iNK/F (ai) for all i ∈ {0, . . . , m − 1} is a necessary condition
on k. For all ai 6= 0, this yields 1 = NK/F (k)m−i therefore NK/F (k) ∈ F × must be an
(m − i)th root of unity, for all i ∈ {0, . . . , m − 1}, with ai 6= 0. Hence if am−1 6= 0 then
τ (am−1) = σm−1(k)am−1, thus NK/F (am−1) = NK/F (k)NK/F (am−1), i.e. NK/F (k) = 1. If
even am−1 ∈ Fix(τ )× then am−1 = σm−1(k)am−1 means σm−1(k) = 1, i.e. k = 1.
(ii) k = 1 implies τ (ai) = ai, i.e. ai ∈ Fix(τ ) for all i ∈ {0, . . . , m − 1}.
(iii) By (i), NK/F (k) ∈ F × is an (m − i)th root of unity, for all i ∈ {0, . . . , m − 1} with
ai 6= 0. If F does not contain any non-trivial (m − i)th roots of unity, then NK/F (k) = 1.
(iv) If there is an i ∈ {0, . . . , m − 1} such that ai ∈ Fix(τ )×, then (1) becomes 1 =
Qm−1
l=i σl(k).
In particular, if a0 ∈ Fix(τ )×, m = n and σ generates Gal(K/F ), then
THE AUTOMORPHISMS OF PETIT'S ALGEBRAS
9
NK/F (k) = 1 is a necessary condition on k.
(v) Here, (1) becomes 1 = Qm−1
l=i σl(k) for all i ∈ {0, . . . , m − 1} with ai 6= 0. In particular,
if n = m, σ generates Gal(K/F ) and a0 6= 0 (which happens if f (t) is irreducible) then
NK/F (k) = 1 is a necessary condition on k.
(cid:3)
For instance, Proposition 9 (i) yields that k = 1 if am−1 ∈ Fix(τ )× and so Theorems 4
and 5 become:
i=0 aiti ∈
Theorem 10. Suppose σ commutes with all τ ∈ Gal(K/F ) and f (t) = tm − Pm−1
K[t; σ] is not invariant with am−1 ∈ F ×.
(i) Let n ≥ m − 1. If ai 6∈ Fix(τ ) for all τ 6= id and all non-zero ai, i 6= m − 1, then
AutF (Sf ) = {id}.
If f (t) ∈ F [t; σ], any automorphism H of Sf has the form Hτ,1 where τ ∈ Gal(K/F ), and
AutF (Sf ) ∼= Gal(K/F ).
(ii) Let n < m − 1. If f (t) ∈ F [t; σ] is not invariant, the maps Hτ,1 are automorphisms of
Sf for all τ ∈ Gal(K/F ) and Gal(K/F ) is isomorphic to a subgroup of AutF (Sf ).
Proof. (i) H is an automorphism of Sf if and only if H has the form Hτ,k, where τ ∈
Gal(K/F ) and k ∈ K × is such that τ (ai) = (cid:16)Qm−1
l=i σl(k)(cid:17)ai for all i ∈ {0, . . . , m − 1}.
Since am−1 ∈ F × we have am−1 ∈ Fix(τ )× for all τ which forces k = 1 as the only possibility
for any τ ∈ Gal(K/F ) by Proposition 9 (i). This in turn means that any extension Hτ,k has
the form Hτ,1. In particular, the existence of an extension Hτ,k, τ 6= id, implies τ (ai) = ai
for all non-zero ai, i 6= m − 1, that is ai ∈ Fix(τ ) for all non-zero ai.
that extends to an automorphism of Sf and AutF (Sf ) = {Hid,1} = {id}.
Thus if ai 6∈ Fix(τ ) for all τ 6= id and all i ∈ {0, . . . , m − 2} then there is no non-trivial τ
If f (t) ∈ F [t; σ] then AutF (Sf ) = {Hτ,1} ∼= Gal(K/F ).
(ii) follows from (i) and Theorem 8.
(cid:3)
Note that indeed Condition (1) heavily restricts the choice of available k to k = 1 in most
cases.
Corollary 11. Suppose σ commutes with all τ ∈ Gal(K/F ). Let n ≥ m − 1 and f (t) =
tm − a0 ∈ K[t; σ], a0 ∈ K \ F .
(i) H ∈ AutF (Sf ) if and only if H = Hτ,k where k ∈ K × is such that τ (a0) = (cid:16)Qm−1
In particular, here NK/F (k) is an mth root of unity.
(ii) For all g(t) = tm − Pm−1
AutF (Sf ).
i=0 aiti ∈ K[t; σ] with a0 ∈ K \ F , AutF (Sg) is a subgroup of
l=0 σl(k)(cid:17)a0.
Proof. (i) follows from Theorem 4 and Proposition 9.
(ii) follows from Theorem 7.
(cid:3)
For f (t) = tm − a0 ∈ K[t; σ], a0 ∈ K \ F , the automorphisms Hid,k extending idK thus
are in one-to-one correspondence with those k satisfying Qm−1
l=0 σl(k) = 1 (in particular, we
have NK/F (k)m = 1). Analogously, we still obtain for n < m − 1 employing Theorem 5 and
Theorem 8:
10
C. BROWN AND S. PUMPL UN
Corollary 12. Suppose σ commutes with all τ ∈ Gal(K/F ). Let n < m − 1 and f (t) =
tm − a0 ∈ K[t; σ], a0 ∈ K \ F .
(i) For all k ∈ K × with NK/F (k) an mth root of unity and τ (a0) = (cid:16)Qm−1
l=0 σl(k)(cid:17)a0, the
maps Hτ,k are automorphisms of Sf .
(ii) For all g(t) = tm − Pm−1
is a subgroup of {H ∈ AutF (Sf ) H = Hτ,k}.
i=0 aiti ∈ K[t; σ] with a0 ∈ K \ F , {H ∈ AutF (Sg) H = Hτ,k}
For m = n and K/F a cyclic field extension, the algebras considered in Corollary 11 are
called nonassociative cyclic algebras of degree m, as they can be seen as canonical general-
izations of associative cyclic algebras. These algebras are treated in Section 6.
4. Automorphisms extending idK when K/F is a cyclic field extension
Let f (t) = tm −Pm−1
i=0 aiti ∈ K[t; σ] not be invariant. In general, we know that if Sf has
nucleus K then every inner automorphism Gc with c ∈ K ×, extends idK. Conversely, an
extension Hid,k of idK is inner for the right choice of k:
Lemma 13. Let k = c−1σ(c) with c ∈ K ×, then Hid,k ∈ AutF (Sf ) is an inner automor-
phism.
i=0 xiti(cid:17) = (cid:16)c−1 Pm−1
Proof. A simple calculation shows that Gc(cid:16)Pm−1
i=1 xic−1σi(c)ti = Hid,k(cid:16)Pm−1
Pm−1
Let now K/F be a cyclic Galois field extension of degree n with Gal(K/F ) = hσi and
norm NK/F : K → F, NK/F (k) = kσ(k)σ2(k)··· σn−1(k). By Hilbert's Theorem 90,
ker(NK/F ) = ∆σ(1), where ∆σ(l) = {σ(c)lc−1 c ∈ K ×} is the σ-conjugacy class of l ∈ K ×
[19].
i=0 xiti(cid:17).
i=0 xiti(cid:17)c = x0 +
(cid:3)
Theorem 14. (i) Every automorphism Hid,k ∈ AutF (Sf ) such that NK/F (k) = 1 is an
inner automorphism.
(ii) If n ≥ m − 1 and am−1 6= 0, or if n = m, ai = 0 for all i 6= 0 and a0 ∈ K \ F , then
these are all the automorphisms extending idK.
Proof. (i) Suppose there is Hid,k ∈ AutF (Sf ) with NK/F (k) = 1, then by Hilbert 90, there
exists c ∈ K × such that k = c−1σ(c). Thus Hid,k = Hid,c−1σ(c) for c ∈ K × and so Gc = Hid,k
by Lemma 13.
(ii) By Theorem 4 and Proposition 9 (i), these are all the automorphisms extending idK
when n ≥ m − 1 if am−1 6= 0. The remaining assertion is proved analogoulsy.
(cid:3)
5. Cyclic subgroups of AutF (Sf )
For any Galois field extension K/F and σ ∈ Gal(K/F ) of order n, we now give some
conditions for AutF (Sf ) to have cyclic subgroups.
Theorem 15. Suppose F contains an sth root of unity ω. Suppose that either f (t) = ts−a ∈
K[t; σ] where a ∈ K \ F , or f (t) = tsl −Pl−1
i=0 aistis ∈ K[t; σ] such that Sf is not associative.
Then hHid,ωi is a cyclic subgroup of AutF (Sf ) of order at most s and of order s, if ω is a
primitive root of unity.
THE AUTOMORPHISMS OF PETIT'S ALGEBRAS
11
i=0 aistis. Then we have Qls−1
q=is σq(ωj) = ωj(ls−is) = 1 for all i =
q=is σq(ωj)(cid:17)ais for all i = 0, . . . , l− 1 and so Hid,ωj ∈ AutF (Sf )
Proof. (i) Let f (t) = ts−a. Then ωjσ(ωj)··· σs−1(ωj) = ωjs = 1 and so Hid,ωj ∈ AutF (Sf )
for all 0 ≤ j ≤ s − 1 by Proposition 6.
(ii) Let f (t) = tsl − Pl−1
0, . . . , l− 1. Hence ais = (cid:16)Qls−1
for all 0 ≤ j ≤ s − 1 by Proposition 6.
In both (i) and (ii), hHid,ωi is a cyclic subgroup of Aut(Sf ) of order less or equal to s, since
Hid,ωj ◦ Hid,ωr = Hid,ωj+r for all 0 ≤ j, r ≤ sl − 1.
Lemma 16. Let F have characteristic not two, m be even and f (t) = tm−P(m−2)/2
K[t; σ] not invariant. Then {Hid,1, Hid,−1} is a subgroup of Sf of order 2.
Proof. The maps Hid,1 and Hid,−1 are automorphisms of Sf by Proposition 6, and Hid,−1 ◦
Hid,−1 = Hid,1.
a2it2i ∈
(cid:3)
(cid:3)
i=0
If f ∈ F [t] ⊂ K[t; σ], we obtain:
Theorem 17. Suppose σ commutes with all τ ∈ Gal(K/F ), and f (t) = tm − Pm−1
F [t; σ] ⊂ K[t; σ] is not invariant.
(i) hHσ,1i ∼= Z/nZ is a cyclic subgroup of AutF (Sf ).
(ii) Suppose Gal(K/F ) = hσi, n = m is prime, a0 6= 0 and not all of a1, . . . , am−1 are zero.
Then AutF (Sf ) = hHσ,1i ∼= Z/mZ.
Proof. Let j ∈ {0, . . . , n − 1}. Since τ (ai) = ai for all i, here (1) becomes
i=0 aiti ∈
(9)
ai = (cid:16)
m−1
Y
q=i
σq(k)(cid:17)ai
for all i ∈ {0, . . . , m − 1}.
(i) Clearly, (9) is satisfied for k = 1 and all i ∈ {0, . . . , m − 1}, therefore the maps
Hτ,1 are automorphisms of Sf for all τ ∈ Gal(K/F ) by Theorems 4 and 5. We have
Hσj ,1 ◦ Hσl,1 = Hσj+l,1 and Hσn,1 = Hid,1. Hence hHσ,1i = (cid:8)Hid,1, Hσ,1, . . . , Hσm−1,1(cid:9) is a
cyclic subgroup of order n.
(ii) By Theorem 4, the automorphisms of Sf are exactly the maps Hσj ,k where j ∈ {0, . . . , n − 1}
and k ∈ K × satisfies (9) for all i ∈ {0, . . . , m − 1}. The maps Hσj ,1 are therefore automor-
phisms of Sf for all j ∈ {0, . . . , n − 1}. We prove that these are the only automorphisms of
Sf : a0 6= 0 and so NK/F (k) = 1 by (9). Therefore, by Hilbert 90, there exists α ∈ K such
that k = σ(α)/α. Let l ∈ {1, . . . , m − 1} be such that al 6= 0. Then by (9),
1 =
m−1
Y
q=l
σq(k) =
m−1
Y
q=l
σq(cid:0)
σ(α)
α (cid:1) = Qm
q=l+1 σq(α)
Qm−1
q=l σq(α)
=
α
σl(α)
.
Thus α ∈ Fix(σj) = F since m is prime. Therefore k = σ(α)/α = α/α = 1 as required. (cid:3)
This complements our results from Theorem 10, which in case Gal(K/F ) is cyclic of
degree n mean the following:
Corollary 18. Suppose Gal(K/F ) is cyclic of degree n and f (t) = tm−Pm−1
not invariant with am−1 ∈ F ×.
i=0 aiti ∈ F [t; σ]
12
C. BROWN AND S. PUMPL UN
(i) Let n ≥ m − 1 then for all τ ∈ Gal(K/F ) the maps Hτ,1 are exactly the automorphisms
of Sf and AutF (Sf ) ∼= Gal(K/F ) ∼= Z/nZ.
(ii) Let n < m − 1 then for all τ ∈ Gal(K/F ) the maps Hτ,1 are automorphisms of Sf and
Gal(K/F ) ∼= Z/nZ is isomorphic to a subgroup of AutF (Sf ).
6. Nonassociative cyclic algebras
6.1. Let K/F be a cyclic Galois extension of degree m with Gal(K/F ) = hσi and f (t) =
tm − a ∈ K[t; σ]. Then (K/F, σ, a) = K[t; σ]/K[t; σ](tm − a) is called a nonassociative cyclic
algebra of degree m over F . It is not associative for all a ∈ K \ F and a cyclic associative
central simple algebra over F for a ∈ F ×. We will only consider the case that a ∈ K \ F . If
1, a, a2, . . . , am−1 are linearly independent over F then (K/F, σ, a) is a division algebra (cf.
[32], [30] for finite F ). In particular, if K/F is of prime degree then (K/F, σ, a) is a division
algebra for every a ∈ K \ F .
Theorem 19. Let A = (K/F, σ, a) be a nonassociative cyclic algebra of degree m.
(i) All the automorphisms of A which extend idK are inner automorphisms and of the form
Hid,l for all l ∈ K × such that NK/F (l) = 1.
The subgroup they generate in AutF (A) is isomorphic to ker(NK/F ).
(ii) An automorphism σj 6= id can be extended to H ∈ AutF (A), if and only if there is
some l ∈ K such that σj (a) = NK/F (l)a. In that case, H = Hσj ,l and if m is prime then
NK/F (l) = ω for an mth root of unity 1 6= ω ∈ F .
(iii) Let c ∈ K \ F and suppose there exists r ∈ N such that cr ∈ F ×. Let r be minimal.
Then hGci is a cyclic subgroup of AutF (Sf ) of order r.
Proof. Theorem 4, Theorem 14 (ii), and Proposition 9 imply (i) and (ii).
(iii) Let c ∈ K \ F . Then Gc is an automorphism, because K is the nucleus of A. Since
Gc ◦ Gc = Gc2 , Gc ◦ Gc ◦ Gc = Gc3 and so on, we have Gcr = id if and only if cr ∈ F . If
r ∈ N is smallest possible then hGci is a cyclic subgroup of AutF (Sf ) of order r.
(cid:3)
Note that different roots of unity yield different l in Theorem 19 (ii). This yields:
Theorem 20. Let A = (K/F, σ, a) be a nonassociative cyclic algebra of degree m. Suppose
F contains a non-trivial mth root of unity ω.
(i) hHid,ωi is a cyclic subgroup of AutF (A) of order at most m. If ω is a primitive mth root
of unity, then hHid,ωi has order m.
(ii) If there is an element l ∈ K, such that NK/F (l) = ω for ω a primitive mth root of unity
and σ(d) = ωd, then the subgroup generated by Hσ,l has order m2.
Proof. (i) follows from Theorem 15.
(ii) Suppose σ can be extended to an F -automorphism H of A. Then by Theorem 19, there
is an element l ∈ K, such that NK/F (l) = ω, ω 6= 1 and σ(d) = ωd, and H = Hσ,l. (If
1 = NK/F (l), then σ(d) = d, contradiction.)
The subgroup generated by H = Hσ,l has order greater than m, since Hσ,l ◦ ··· ◦ Hσ,l
(m-times) becomes Hσm,b = Hid,ω with ω = NK/F (l). Hid,ω has order m, so the subgroup
generated by H = Hσ,l has order m2.
(cid:3)
THE AUTOMORPHISMS OF PETIT'S ALGEBRAS
13
6.2. The case that m is prime. Let us now assume that the cyclic field extension K/F
has prime degree m = deg(f ). Suppose that F contains a primitive mth root of unity, where
m is prime to the characteristic of F . Then K = F (d), where d is a root of an irreducible
polynomial tm − c ∈ F [t].
Lemma 21. (cf. [33, Lemma 6.2.7]) The eigenvalues of σj ∈ Gal(K/F ) are precisely the
mth roots of unity. Moreover, the only possible eigenvectors are of the form edi for some i,
0 ≤ i ≤ m − 1 and some e ∈ F .
Let f (t) = tm − a ∈ K[t; σ],
a 6∈ F. Then we get the following strong restriction for
automorphisms of Sf :
Theorem 22. H is an automorphism of Sf extending σj 6= id if and only if H = Hσj ,k for
some k ∈ K ×, where NK/F (k) is an mth root of unity and a = eds for some e ∈ F × and
some ds.
Proof. H is an automorphism of Sf if and only if H = Hσj ,k where j ∈ {0, . . . , m − 1} and
k ∈ K × is such that σj(a) = (cid:16)Qm−1
l=0 σl(k)(cid:17)a = NK/F (k)a. For all σj 6= id, by Lemma 21
this condition is equivalent to NK/F (k) being an mth root of unity and a = eds for some ds
and e ∈ F ×, for all k ∈ K ×.
(cid:3)
Applying Theorem 7, our results for the automorphisms of a nonassociative cyclic algebra
A = (K/F, σ, a) of degree m yield the following observations for more general algebras Sg:
Corollary 23. Suppose Gal(K/F ) = hσi is cyclic of degree m and g(t) = tm−Pm−1
K[t; σ] is not invariant with a0 ∈ K \ F . Suppose one of the following holds:
i=0 aiti ∈
• F has no mth root of unity.
• m is prime and F contains a primitive mth root of unity, where m is prime to the
characteristic of F . Let K = F (d) as in Section 6.2 and a0 6= edi, e ∈ F ×.
Then every F -automorphism of Sg leaves K fixed, is inner and AutF (Sg) is a subgroup of
ker(NK/F ), thus cyclic. In particular, if ker(NK/F ) has prime order, then either AutF (Sg)
is trivial or AutF (Sg) ∼= ker(NK/F ).
6.3. The automorphism groups of nonassociative quaternion algebras. Recall the
dicyclic group
(10)
Dicl = hx, y y2l = 1, x2 = yl, x−1yx = y−1i
of order 4l. The semidirect product Z/sZ ⋊l Z/nZ between the cyclic groups Z/sZ and
Z/nZ corresponds to a choice of an integer l such that ln ≡ 1 mod s. It can be described
by the presentation Z/sZ ⋊l Z/nZ = hx, y xs = 1, yn = 1, yxy−1 = xli.
We obtain the following result for the automorphism groups of nonassociative quaternion
algebras (where m = 2):
Theorem 24. Suppose K = F (√b) is a quadratic field extension of F , char(F ) 6= 2,
and consider the nonassociative quaternion algebra A = (K/F, σ, λ√b) for some λ ∈ F ×.
Suppose there exists k ∈ K × such that kσ(k) = −1.
14
C. BROWN AND S. PUMPL UN
For every c ∈ K \ F for which there is a positive integer j such that cj ∈ F ×, pick the
smallest such j.
(i) If j is even then AutF (Sf ) contains the dicyclic group of order 2j.
(ii) If j is odd then AutF (Sf ) contains a subgroup isomorphic to the semidirect product
Z/jZ ⋊j−1 Z/4Z. In particular, AutF (A) always contains a subgroup isomorphic to Z/4Z.
Proof. Since σ(√b) = −√b and kσ(k) = −1, Hσ,k ∈ AutF (Sf ) by Theorem 19. A simple
calculation shows that hHσ,ki = {Hσ,k, Hid,−1, Hσ,−k, Hid,1}. hGci is a cyclic subgroup of
AutF (Sf ) of order j by Theorem 19 (iii).
(i) Suppose j is even and write j = 2l. We prove first that Gcl = Hid,−1. Write cl =
µ0 + µ1√b for some µ0, µ1 ∈ F . Then cj = c2l = µ2
1b + 2µ0µ1√b ∈ F which implies
2µ0µ1 = 0. Hence µ0 = 0 or µ1 = 0. Since j is minimal, cl /∈ F so µ0 = 0 and cl = µ1√b.
0 + µ2
We obtain
Gcl(x0 + x1t) = x0 + x1(µ1√b)−1σ(µ1√b)t
1 b−1√b(−µ1√b)t
= x0 + x1µ−1
= x0 − x1t = Hid,−1(x0 + x1t)
which implies Gcl = Hid,−1. Next we prove (Hσ,k)−1GcHσ,k = G−1
show (Hσ,k)−1 = Hσ,−k and G−1
c = Gσ(c). We have
c
. Simple calculations
Hσ,−k(cid:0)Gc(cid:0)Hσ,k(cid:0)x0 + x1t(cid:1)(cid:1)(cid:1) = Hσ,−k(cid:0)Gc(cid:0)σ(x0) + σ(x1)kt(cid:1)(cid:1)
= Hσ,−k(cid:0)σ(x0) + σ(x1)kc−1σ(c)t(cid:1)
= x0 − x1σ(k)σ(c−1)ckt
= x0 + x1σ(c−1)ct = Gσ(c)(cid:0)x0 + x1t(cid:1)
and so (Hσ,k)−1GcHσ,k = G−1
c
.
Thus H 2
σ,k = Hid,−1 = Gcl = Gl
c, G2l
c = id and (Hσ,k)−1GcHσ,k = G−1
c
. Hence hHσ,k, Gci
has the presentation (10) as required.
(ii) Suppose j is odd. Then hGci does not contain Hid,−1 as Hid,−1 has order 2 which implies
hHσ,ki ∩ hGci = {id}. Furthermore (Hσ,k)−1GcHσ,k = G−1
c = Gcj−1 can be shown
similarly as in (i). Note that (j − 1)4 = j4 − 4j3 + 6j2 − 4j + 1 ≡ 1 mod (j). Thus AutF (Sf )
contains the subgroup hGci ⋊j−1 hHσ,ki ∼= Z/jZ ⋊j−1 Z/4Z as required.
In particular, choose c = √b in (i), so that j = 2. This implies AutF (A) contains the dicyclic
group of order 4, which is the cyclic group of order 4.
c = Gj−1
(cid:3)
Example 25. (i) Let F = Q(i), K = F (√−3), σ(√−3) = −√−3 and A = (K/F, σ, λ√−3)
be a nonassociative quaternion algebra with some λ ∈ F ×. Note that for k = i we have
iσ(i) = −1. Let c = 1 +√−3. Then c2 = −2 + 2√−3 and c3 = −8 which implies j = 3 here.
Therefore AutF (Sf ) contains a subgroup isomorphic to the semidirect product Z/3Z⋊2Z/4Z
by Theorem 24.
(ii) Let F = Q(i), K = F (p−1/12), σ(p−1/12) = −p−1/12 and A = (K/F, σ, λp−1/12)
be a nonassociative quaternion algebra for some λ ∈ F ×. Again for k = i we have iσ(i) = −1.
Let c = 1 + 2p−1/12. Then c2 = 2/3 + 2i/√3, c3 = 8i/3√3, c4 = −8/9 + 8i/3√3,
THE AUTOMORPHISMS OF PETIT'S ALGEBRAS
15
c5 = −16/9 + 16i/9√3 and c6 = −64/27. Hence c, c2, c3, c4, c5 ∈ K \ F and c6 ∈ F .
Therefore AutF (A) contains the dicyclic group of order 12 by Theorem 24.
7. Isomorphisms between Sf and Sg
The proofs of the previous sections can be adapted to check when two Petit algebras are
isomorphic and when not. This is not the main focus of this paper so we just point out how
some of the results can be transferred.
If K and L are fields, and Sf = K[t; σ]/K[t; σ]f (t) ∼= L[t; σ′]/L[t; σ′]g(t) = Sg, then
K ∼= L, N ucr(Sf ) ∼= N ucr(Sg), deg(f ) = deg(g), and Fix(σ) ∼= Fix(σ′), since isomorphic
algebras have the same dimensions, and isomorphic nuclei and center.
If G is an automorphism of R = K[t; σ] which restricts to an automorphism τ on K which
commutes with σ, f ∈ R is irreducible and g(t) = G(f (t)), then G induces an isomorphism
Sf ∼= SG(g) [20, Theorem 7] (the proof works for any base field).
Pm−1
From now on let F be the fixed field of σ, σ have order n, and both f (t) = tm −
i=0 aiti and g(t) = tm − Pm−1
i=0 biti ∈ K[t; σ] be not invariant. Then the following is
proved analogously to Theorem 4, Theorem 5 and Proposition 6:
Theorem 26. Suppose σ commutes with all τ ∈ AutF (K) and n ≥ m − 1. Then Sf ∼= Sg
if and only if there exists τ ∈ AutF (K) and k ∈ K × such that
(11)
τ (ai) = (cid:16)
σl(k)(cid:17)bi
m−1
Y
l=i
for all i ∈ {0, . . . , m − 1}. Every such τ and k yield a unique isomorphism Gτ,k : Sf → Sg,
m−1
Gτ,k(
X
i=0
xiti) = τ (x0) +
m−1
X
i=1
τ (xi)
i−1
Y
l=0
σl(k)ti.
If n < m − 1 we still get a partial result:
Theorem 27. Suppose there exists τ ∈ AutF (K) and k ∈ K × such that τ ◦ σ = σ ◦ τ and
such that (11) holds for all i ∈ {0, . . . , m− 1}. Then Sf ∼= Sg with an isomorphism given by
m−1
Gτ,k(
X
i=0
xiti) = τ (x0) +
m−1
X
i=1
τ (xi)
i−1
Y
l=0
σl(k)ti
as in Theorem 26.
Corollary 28. For every k ∈ K × such that ai = (cid:16)Qm−1
Gid,k : Sf → Sg is an isomorphism.
l=i σl(k)(cid:17)bi for all i ∈ {0, . . . , m− 1},
As a direct consequence of Theorem 26 we obtain:
Theorem 29. Suppose σ commutes with all τ ∈ AutF (K) and n ≥ m− 1. If Sf ∼= Sg, then
ai = 0 if and only if bi = 0, for all i ∈ {0, . . . , m − 1}.
Proof. If Sf ∼= Sg then by Theorem 26, there exists j ∈ {0, . . . , n − 1} and k ∈ K × such
that τ (ai) = (cid:16)Qm−1
l=i σl(k)(cid:17)bi for all i ∈ {0, . . . , m − 1}. This implies ai = 0 if and only if
bi = 0, for all i ∈ {0, . . . , m − 1}.
(cid:3)
16
C. BROWN AND S. PUMPL UN
From now on we restrict ourselves to the situation that R = K[t; σ] and F = Fix(σ),
where K/F is a finite Galois field extension and σ of order n. We take a closer look at the
consequences of Equality (11):
l=i σl(k)(cid:17)bi for all i ∈ {0, . . . , m− 1}.
Proposition 30. Let k ∈ K × such that τ (ai) = (cid:16)Qm−1
Then ai = 0 if and only if bi = 0 and:
(i) For all i ∈ {0, . . . , m − 1} with ai 6= 0, NK/F (ai) = NK/F (k)m−iNK/F (bi).
(ii) If there is some i ∈ {0, . . . , m − 1} such that ai ∈ Fix(τ )×, then ai/bi = Qm−1
l=i σl(k).
In particular, if am−1 ∈ F × and bm−1 ∈ F ×, then k ∈ F × and ai = km−ibi for all
i ∈ {0, . . . , m − 1}.
(iii) If a0 ∈ Fix(τ )×, m = n and Gal(K/F ) = hσi then a0 = NK/F (k)b0.
Proof. (i) Equality (11) implies that NK/F (ai) = Qm−1
l=i NK/F (σl(k))NK/F (bi) (simply
apply NK/F to both sides of (11)), therefore NK/F (ai) = NK/F (k)m−iNK/F (bi) for all
i ∈ {0, . . . , m − 1} is a necessary condition on k.
(ii) If there is an i ∈ {0, . . . , m − 1} such that ai ∈ Fix(τ )×, then (11) implies that
ai = (cid:16)Qm−1
l=i σl(k)(cid:17)bi, so that we obtain ai/bi = Qm−1
l=i σl(k).
Alternatively, if am−1 ∈ F × and bm−1 ∈ F ×, then am−1 = σm−1(k)bm−1 imply k ∈ F ×,
hence ai = km−1−ibi for all i ∈ {0, . . . , m − 1}.
(iii) In particular, if a0 ∈ Fix(τ )×, m = n and σ generates Gal(K/F ), then a0/b0 =
Qm−1
l=0 σl(k) = NK/F (k) is a necessary condition on k.
Corollary 31. Suppose σ commutes with all τ ∈ Gal(K/F ) and n ≥ m − 1. Assume that
one of the following holds:
(i) There exists i ∈ {0, . . . , m − 1} such that bi 6= 0 and NK/F (aib−1
(ii) m = n, a0 ∈ F × and b0 ∈ K \ F .
Then Sf ≇ Sg.
Corollary 32. Suppose Gal(K/F ) = hσi and n = m. Let f (t) = tm − a, g(t) = tm − b ∈
K[t; σ] where a, b ∈ K \ F .
(i) Sf ∼= Sg if and only if there exists τ ∈ Gal(K/F ) and k ∈ K × such that τ (a) = NK/F (k)b.
(ii) If σj(a) 6= NK/F (k)b for all k ∈ K ×, j = 0, . . . , m − 1, then Sf 6∼= Sg.
) 6∈ NK/F (K ×)m−i;
(cid:3)
i
These follow from Proposition 30. Note that Corollary 32 canonically generalizes well-
known criteria for associative cyclic algebras.
References
[1] R. Alfaro, A. V. Kelarev, Recent results on ring constructions for error-correcting codes. Algebraic
Structures and their Representations, XV Coloquio Latinoamericano de Algebra (Cocoyoc, Morelos,
Mexico, July 20-26, 2003), Contemporary Math. 376 (2005), 1-12.
[2] A. S. Amitsur, Differential polynomials and division algebras. Annals of Mathematics, Vol. 59 (2) (1954)
245-278.
[3] A. S. Amitsur, Non-commutative cyclic fields. Duke Math. J. 21 (1954), 87-105.
[4] A. S. Amitsur, Generic splitting fields of central simple algebras. Ann. of Math. 62 (2) (1955), 8-43.
[5] C. Brown, PhD Thesis University of Nottingham, in preparation.
[6] C. Brown, S. Pumplun, A. Steele, Automorphisms and isomorphisms of Jha-Johnson semifields obtained
from skew polynomial rings. Online at arXiv:1703.02356 [math.RA]
THE AUTOMORPHISMS OF PETIT'S ALGEBRAS
17
[7] J. Cazaran, A. V. Kelarev, S. J. Quinn, D. Vertigan, An algorithm for computing the minimum distances
of extensions of BCH codes embedded in semigroup rings. Semigroup Forum 73 (2006), 317-329.
[8] L. E. Dickson, Linear algebras in which division is always uniquely possible. Trans. Amer. Math. Soc. 7
(3) (1906), 370-390.
[9] J. Ducoat, F. Oggier, Lattice encoding of cyclic codes from skew polynomial rings. Proc. of the 4th
International Castle Meeting on Coding Theory and Applications, Palmela, 2014.
[10] J. Ducoat, F. Oggier, On skew polynomial codes and lattices from quotients of cyclic division algebras.
Adv. Math. Commun. 10 (1) (2016), 79-94.
[11] M. Giesbrecht, Factoring in skew-polynomial rings over finite fields. J. Symbolic Comput. 26 (4) (1998),
463-486.
[12] M. Giesbrecht, Y. Zhang, Factoring and decomposing Ore polynomials over Fq(t). Proceedings of the
2003 International Symposium on Symbolic and Algebraic Computation, 127134, ACM, New York, 2003.
[13] J. G`omez-Torrecillas, F. J. Lobillo, G. Navarro, Factoring Ore polynomials over Fq(t) is difficult. Online
at arXiv:1505.07252[math.RA]
[14] J. G`omez-Torrecillas, Basic module theory over non-commutative rings with computational aspects of
operator algebras. With an appendix by V. Levandovskyy. Lecture Notes in Comput. Sci. 8372, Algebraic
and algorithmic aspects of differential and integral operators, Springer, Heidelberg (2014) 23-82.
[15] N. Jacobson, "Finite-dimensional division algebras over fields." Springer Verlag, Berlin-Heidelberg-New
York, 1996.
[16] A. V. Kelarev, "Ring Constructions and Applications", World Scientific, River Edge, New Jork, 2002.
[17] A. V. Kelarev, P. Sole, Error-correcting codes as ideals in group rings. Contemporary Mathematics 273
(2001), 11-18.
[18] K. Kishimoto, On cyclic extensions of simple rings. J. Fac. Sci. Hokkaido Univ. Ser. I 19 (1966), 74-85.
[19] T. Y. Lam, A. Leroy, Hilbert 90 theorems over division rings. Trans. Amer. Math. Soc. 345 (2) (1994),
595-622.
[20] M. Lavrauw, J. Sheekey, Semifields from skew-polynomial rings. Adv. Geom. 13 (4) (2013), 583-604.
[21] F. Oggier, B. A. Sethuraman, Quotients of orders in cyclic algebras and space-time codes. Adv. Math.
Commun. 7 (4) (2013), 441-461.
[22] J.-C. Petit, Sur certains quasi-corps g´en´eralisant un type d'anneau-quotient. S´eminaire Dubriel. Alg`ebre
et th´eorie des nombres 20 (1966 - 67), 1-18.
[23] J.-C. Petit, Sur les quasi-corps distributifes `a base momog`ene. C. R. Acad. Sc. Paris 266 (1968), S´erie
A, 402-404.
[24] S. Pumplun, Quotients of orders in algebras obtained from skew polynomials and possible applications.
Online at arXiv:1609.04201 [math.RA]
[25] S. Pumplun, Finite nonassociative algebras obtained from skew polynomials and possible appli-
cations to (f, σ, δ)-codes. To appear in Advances in Mathematics of Communications. Online at
arXiv:1507.01491[cs.IT]
[26] S. Pumplun, How to obtain lattices from (f, σ, δ)-codes via a generalization of Construction A. Online
at arXiv:1607.03787 [cs.IT]
[27] S. Pumplun, A. Steele, The nonassociative algebras used to build fast-decodable space-time block codes.
Advances in Mathematics of Communications 9 (4) 2015, 449-469.
[28] S. Pumplun, A. Steele, Fast-decodable MIDO codes from nonassociative algebras. Int. J. of Information
and Coding Theory (IJICOT) 3 (1) 2015, 15-38.
[29] A. Steele, S. Pumplun, F. Oggier, MIDO space-time codes from associative and non-associative cyclic
algebras. Information Theory Workshop (ITW) 2012 IEEE (2012), 192-196.
[30] R. Sandler, Autotopism groups of some finite non-associative algebras. Amer. J. Math. 84 (1962), 239-
264.
[31] R. D. Schafer, "An Introduction to Nonassociative Algebras." Dover Publ., Inc., New York, 1995.
[32] A. Steele, Nonassociative cyclic algebras. Israel Journal of Mathematics 200 (1) (2014), 361-387.
[33] A. Steele, Some new classes of division algebras and potential applications to space-time block coding.
PhD Thesis, University of Nottingham 2013, online at eprints.nottingham.ac.uk/13934/
18
C. BROWN AND S. PUMPL UN
[34] G. P. Wene, Inner automorphisms of semifields. Note Mat. 29 (2009), suppl. 1, 231-242.
[35] G. P. Wene, Finite semifields three-dimensional over the left nuclei. Nonassociative algebra and its
applications (Sao Paulo, 1998), Lecture Notes in Pure and Appl. Math., 211, Dekker, New York, 2000,
447-456.
E-mail address: [email protected]; [email protected]
School of Mathematical Sciences, University of Nottingham, University Park, Nottingham
NG7 2RD, United Kingdom
|
1208.5298 | 1 | 1208 | 2012-08-27T06:39:19 | Submaximal Integral Domains | [
"math.RA"
] | It is proved that if $D$ is a $UFD$ and $R$ is a $D$-algebra, such that $U(R)\cap D\neq U(D)$, then $R$ has a maximal subring. In particular, if $R$ is a ring which either contains a unit $x$ which is not algebraic over the prime subring of $R$, or $R$ has zero characteristic and there exists a natural number $n>1$ such that $\frac{1}{n}\in R$, then $R$ has a maximal subring. It is shown that if $R$ is a reduced ring with $|R|>2^{2^{\aleph_0}}$ or $J(R)\neq 0$, then any $R$-algebra has a maximal subring. Residually finite rings without maximal subrings are fully characterized. It is observed that every uncountable $UFD$ has a maximal subring. The existence of maximal subrings in a noetherian integral domain $R$, in relation to either the cardinality of the set of divisors of some of its elements or the height of its maximal ideals, is also investigated. | math.RA | math |
SUBMAXIMAL INTEGRAL DOMAINS
A. AZARANG
Department of Mathematics, Chamran University, Ahvaz, Iran
a−[email protected]
Abstract. It is proved that if D is a U F D and R is a D-algebra, such that
U (R) ∩ D 6= U (D), then R has a maximal subring. In particular, if R is a ring
which either contains a unit x which is not algebraic over the prime subring of
R, or R has zero characteristic and there exists a natural number n > 1 such
that 1
n ∈ R, then R has a maximal subring. It is shown that if R is a reduced
ℵ0 or J(R) 6= 0, then any R-algebra has a maximal subring.
ring with R > 22
Residually finite rings without maximal subrings are fully characterized. It is
observed that every uncountable U F D has a maximal subring. The existence
of maximal subrings in a noetherian integral domain R, in relation to either
the cardinality of the set of divisors of some of its elements or the height of its
maximal ideals, is also investigated.
Introduction
All rings in this article are commutative with 1 6= 0; all modules are unital. If S
is a subring of a ring R, then 1R ∈ S. In this paper the characteristic of a ring R
is denoted by Char(R), and the set of all maximal ideals of a ring R is denoted by
M ax(R). For any ring R, let Z = Z · 1R = {n · 1R n ∈ Z}, be the prime subring of
R. Rings with maximal subrings are called submaximal rings in [4] and [7]. Some
important rings such as uncountable artinian rings, zero-dimensional rings which
are either not integral over Z or with zero characteristic, noetherian rings R with
R > 2ℵ0 and infinite direct product of rings are submaximal, see [4-7]. We should
remind the reader that all finite rings except Zn (up to isomorphism), where n is
a natural number, are submaximal. It is also interesting to note that whenever S
is a finite maximal subring of a ring R, then R must be finite, see [8, Theorem 8],
[19], [17] and [20]. The latter interesting fact is also an easy consequence of [5, the
proof of Theorem 2.9 ] or [6, Theorem 3.8]. Recently S.S. Korobkov determined
which finite rings have exactly two maximal subrings, see [18].
We remind the reader that whenever S is a maximal subring of a ring R, then
R is called minimal ring extension of S. Recently, D.E. Dobbs and J. Shapiro have
extended the results in [15], to integral domains and certain commutative rings,
see [13] and [14], respectively. Also see [23], [11] and [21]. T.G. Lucas, in [21],
characterized minimal ring extensions of certain commutative rings especially in
the case of minimal integral extension. It is interesting to know that every com-
mutative ring R has a minimal ring extension, for if M is a simple R-module then
the idealization R(+)M is a minimal ring extension of R (note, for any R-module
2000 Mathematics Subject Classification. 13B02, 13G05, 13E05.
Key words and phrases. Maximal Subring, Integral Domains, Noetherian, UFD.
1
2
A. AZARANG
M , every R-subalgebra of R(+)M has the form R(+)N , where N is a submodule
of M , see [12]). For a generalization of minimal ring extensions, see also [10].
Unlike maximal ideals (resp. minimal ring extension) whose existence is guar-
anteed either by Zorn Lemma or noetherianity of rings (resp. by idealization or
other techniques, see [12]), maximal subrings need not always exist, see [7] for such
examples and in particular, for example of rings of any infinite cardinality, which
are not submaximal. In fact by the above comment about the idealization, one can
easily see that if K is any field with zero characteristic, then the ring Z(+)K is not
submaximal, see [7, Example 3.19]. Also, in the latter reference and in [4] a good
motivations for the study of maximal subrings related to algebraic geometry and
elliptic curves are given.
In this paper, we are merely interested in finding submaximal integral domains,
especially atomic and noetherian integral domains. A brief outline of this paper is
as follow. Section 1, contains some preliminaries and also some generalizations of
results which are to be appeared in [7]. It is observed that whenever D is a U F D
and R is a D-algebra in which a non-unit of D is invertible, then R is submaximal.
In particular, if R is a Z-algebra such that Q ∩ R 6= Z, then R is submaximal.
Moreover, if D is a P ID and D ⊆ R is an integral domain such that D is integrally
closed in R and U (R) 6= U (D), then R is submaximal. Consequently it is proved
that, if R is a Z-algebra, then either R is submaximal or for any prime number p,
there exists a maximal ideal M of R such that Char( R
M ) = p. It is observed that
every ring either is submaximal or is Hilbert. In particular, if R is a reduced ring
with R > 22ℵ0 or J(R) 6= 0, then any R-algebra is submaximal. Consequently, it
is shown that if R is a reduced non-submaximal ring with zero characteristic, then
Tp∈P Rp = 0. It is proved that if R is a residue finite non-submaximal ring, then
R is a countable principal ideal ring which is either an integral domain with zero
characteristic or it is an artinian ring with nonzero characteristic. Finally in Section
1, the existence of maximal subring in semi-local rings and localization of rings are
investigated. In particular, it is proved that if R is a ring and S is a multiplicatively
closed set in R such that RS is semi-local, then either RS is submaximal or every
prime ideal of RS has the form PS, for some P ∈ M ax(R) ∩ M in(R). Moreover,
in the latter case, if RS is submaximal, then R is submaximal too. Section 2, is
devoted to the existence of maximal subrings in unique factorization domains, noe-
therian integral domains and certain atomic domains. It is observed that, every
uncountable U F D is submaximal. We also generalized the latter result to certain
uncountable atomic domains. In particular, it is proved that if R is an uncountable
noetherian Z-algebra, in which every natural number has at most countably many
(irreducible) divisors, then R is submaximal. It is shown that, if R is a noetherian
integral domain with zero characteristic and tr.degZR = n ≥ 1 (resp. with nonzero
characteristic and tr.degZ R = n ≥ 2) such that the height of every maximal ideal
of R is greater or equal to n + 1 (resp. greater or equal to n) and Z[X] ⊆ R is
a residually algebraic extension, where X is a transcendental basis for R over Z,
then R is submaximal. Finally, we show that every uncountable Dedekind domain
D with M ax(D) ≤ ℵ0, is submaximal.
SUBMAXIMAL INTEGRAL DOMAINS
3
local) if M ax(R) is finite (resp.
Next, let us recall some standard definitions and notations in commutative rings,
see [16], which are used in the sequel. An integral domain D is called G-domain if
the quotient field of D is finitely generated as a ring over D. A prime ideal P of
a ring R is called G-ideal if R
P is a G-domain. A ring R is called Hilbert if every
G-ideal of R is maximal. We also call a ring R, not necessarily noetherian, semi-
M ax(R) = 1). An integral domain
local (resp.
D is called atomic, if every nonzero non-unit of D is a finite product of irreducible
elements, not necessarily unique. An integral domain D is called idf -domain if
every nonzero non-unit element of D has at most finitely many irreducible divisors,
see [1]. In this paper the set of minimal prime ideals and prime ideals of a ring R
are denoted by M in(R) and Spec(R), respectively. As usual, let U (R) denote the
set of all units of a ring R. The Jacobson and the nil radical ideals of a ring R are
also denoted by J(R) and N (R), respectively. If P is a prime ideal of a ring R, then
the height of P is denoted by ht(P ). If D is an integral domain, then we denote the
set of all non-associate irreducible elements of D by Ir(D). We recall that if D ⊆ R
is an extension of integral domains, then as for the existence a transcendental basis
for field extensions, one can easily see that there exists a subset X of R which is
algebraically independent over D and R is algebraic over D[X] (hence every integral
domain is algebraic over a U F D). Moreover, in the latter case X = tr.degF (E),
where E and F are the quotient fields of R and D, respectively. Hence, similar to
the field extensions, we can define the transcendental degree of R over D which is
denoted by tr.degD(R). Finally, we denote the set of all natural prime numbers by
P.
1. Preliminaries and Generalizations
We begin this section with the following useful fact about the existence of max-
imal subrings in subrings of a submaximal ring, which is the converse of [6, Propo-
sition 2.1]. We remind the reader that a ring R is submaximal if and only if there
exist a proper subring S of R and an element x ∈ R \ S such that S[x] = R, see [3,
Theorem 2.5]. Now the following is in order, and although its proof is in [7], but
we present it for the sake of the reader.
Proposition 1.1. [7, Theorem 2.19]. Let R ⊆ T be rings. If there exists a maximal
subring V for T such that V is integrally closed in T and U (R) * V , then R is
submaximal.
Proof. First, we claim that whenever x ∈ U (R) \ V , then x−1 ∈ V . To see this,
we observe that x−1 ∈ R ⊆ T = V [x] (note, V is a maximal subring of T ).
Consequently, x−1 = a0 + a1x + · · · + anxn, where a0, a1, . . . , an ∈ V . Now by
multiplying the latter equality by x−n, we infer that x−1 is integral over V , hence
x−1 ∈ V . But U (R) * V implies that V ∩ R is a proper subring of R and there
exists x ∈ U (R) \ V with T = V [x]. Finally, we claim that R = (V ∩ R)[x], which
by the preceding comment, it implies that R is submaximal. To this end, let y ∈ R,
hence y ∈ V [x] and therefore y = b0 + b1x + · · · + bmxm, where b0, b1, . . . , bm ∈ V ,
implies that yx−m ∈ V ∩ R (note, x−1 ∈ V ), i.e., y ∈ (R ∩ V )[x] and we are
done.
(cid:3)
Next, we have the following fact which is needed in the sequel.
4
A. AZARANG
Theorem 1.2. Let R be a ring and D be a subring of R which is a U F D. If there
exists an irreducible element p ∈ D such that 1
p ∈ R, then R is submaximal. In
particular, if U (R) ∩ D 6= U (D), then R is submaximal.
Proof. We first prove the theorem by the assumption that R is algebraic over D.
We also may assume that R is an integral domain (note, if not, then there exists
a prime ideal Q of R such that D ∩ Q = 0 and therefore R
Q contains a copy of
D). Now suppose that K and E are the quotient fields of D and R, respectively.
Thus K/E is an algebraic extension, since R is algebraic over D. Now, note that
K has a maximal subring V such that 1
p /∈ V (for example V = D(p)). Hence E
has a maximal subring W such that W ∩ K = V , by [6, Proposition 2.1]. Therefore
1
p /∈ W . Thus we have U (R) * W which implies that R is submaximal by the
above proposition. Finally, assume that R is not algebraic over D, but by the
preceding comment we may suppose that R is an integral domain too. Let X be a
transcendental basis for R over D. Thus R is algebraic over D[X]. Now note that
D[X] is a U F D and p is an irreducible element in it. Hence we are done by the
first part of the proof. The final part is evident.
(cid:3)
The following fact also justifies the two cases proofs of [4, Proposition 2.10].
Remark 1.3. Let R be a ring satisfying the conditions of the above theorem, then
there exists a maximal subring of R which dose not contain 1
p . In particular, if
K is a field with zero characteristic, then for any prime number p, there exists a
maximal subring Vp of K such that 1
p /∈ Vp. Hence if M is the unique nonzero
prime ideal of Vp, we infer that Char( Vp
M ) = p.
The next three interesting facts are now immediate.
Corollary 1.4. Let R be a U F D and S be a multiplicatively closed subset of R
which contains a non-unit of R, then RS is submaximal.
Corollary 1.5. Let R be a ring with zero characteristic. If there exists a natural
number n > 1 such that 1
n ∈ R, then R is submaximal.
Corollary 1.6. Let D be an integral domain with zero characteristic and X be a
set of independent indeterminates over it. Then for any x ∈ X and every natural
number n > 1, the ring
(nx−1)D[X] is submaximal.
D[X]
Corollary 1.7. If R is a ring with 0 = Char(R) 6= Char( R
T is submaximal.
J(R) ), then any R-algebra
Proof. Assume that Char( R
1 − kn ∈ U (R) ⊆ U (T ) and therefore we are done by Corollary 1.5.
J(R) ) = n, thus n ∈ J(R). Hence for any k ∈ Z, we have
(cid:3)
Corollary 1.8. Let R be a ring with zero characteristic which is not submaximal.
Then {Char( R
M ) M ∈ M ax(R) } = P and therefore M ax(R) is infinite.
Proof. Since R is not submaximal, we infer that Char( R
M ) 6= 0 for each maximal
ideal M of R, by Corollary 1.5. Hence {Char( R
M ) M ∈ M ax(R) } ⊆ P. Now
for each prime number q we claim that there exists a maximal ideal M of R with
Char( R
M ) = q which proves the lemma. To see this, we note that qR 6= R, by
Corollary 1.5. Consequently, there exists a maximal ideal M of R with qR ⊆ M ,
i.e., Char( R
(cid:3)
M ) = q.
SUBMAXIMAL INTEGRAL DOMAINS
5
For more observations we need the following lemma.
Lemma 1.9. Let R be a ring and x ∈ R is not algebraic over the prime subring of
R. Then at least one of the following conditions holds.
(1) If Char(R) = 0, then there exists a prime ideal Q of R such that R/Q
contains a copy of Z[x].
(2) If Char(R) = n > 0, then for any prime divisor p of n, there exists a prime
ideal Q of R such that R/Q contains a copy of Zp[x].
Proof. If R has zero (or prime) characteristic, we are done since Z[x] \ {0} is a
multiplicatively closed set in R. Now, suppose that R has nonzero characteristic,
say n, which is also not a prime number. Assume that p is a prime divisor of n.
Since dim Zn[x] = 1 and P = pZ
nZ [x] is a non-maximal prime ideal of Zn[x], hence
we infer that P is a minimal prime ideal of Zn[x]. Thus, there exists a minimal
prime ideal Q of R such that Q ∩ Zn[x] = P . Now we have Zp[x] ∼=
Q∩Zn[x] ⊆ R
and therefore we are done.
Zn[x]
Q
(cid:3)
Remark 1.10. In fact in Corollary 1.8, we see that if R is not submaximal and
Z ⊆ R, then M ax(R) ≥ P. We can generalize the previous fact to any non-
submaximal ring which contains a U F D as follow. First, we recall the reader that
if R is a ring with M ax(R) > 2ℵ0, then R is submaximal, see [4, Proposition 2.6
]. Now assume that D is a U F D and let Ir′(D) be a subset of Ir(D) such that for
any p 6= q in Ir′(D), we have pD + qD = D. Now, if R is a ring which contains
D, then either R is submaximal or Ir′(D) ≤ M ax(R) ≤ 2ℵ0. To see this assume
that R is not submaximal, then for any q ∈ Ir′(D) we have qR 6= R, by Theorem
1.2 and hence there exists a maximal ideal Mq of R, such that qR ⊆ Mq.
It is
clear that whenever p 6= q in Ir′(D), then we have Mq 6= Mp, and therefore we are
done. In particular, if R is a non-submaximal ring with nonzero characteristic, say
n, which is not algebraic over Zn, then M ax(R) is infinite. To see this note that
by part (2) of the above lemma, for any prime divisor p of n there exists a prime
ideal Q of R such that R/Q contains a copy of Zp[x]. Hence we are done by the
first part of the proof.
The following proof greatly simplifies the proof of [7, Theorem 2.1 and Theorem
2.4].
Corollary 1.11. [7, Theorem 2.4]. Let R be a ring with a unit element x ∈ R
which is not algebraic over Z. Then R is submaximal (in fact every R-algebra is
submaximal).
Proof. In view of Theorem 1.2 and Lemma 1.9 we are done.
(cid:3)
Corollary 1.12. Let R be a ring. Then either R is submaximal or J(R) is algebraic
over Z.
We need the following immediate corollary in the next section.
Corollary 1.13. Let R be a ring which is not algebraic over Z. Then either R
is submaximal or for any non-algebraic element x ∈ R over Z and every natural
number n > 1, we have Z ∩ (nx − 1)R 6= 0.
Proof. If (nx − 1)R = R, then we are done by Corollary 1.11, and if not, then by
using Corollary 1.5, we are done.
(cid:3)
6
A. AZARANG
Corollary 1.14. Let D be a P ID and R ⊇ D be an integral domain.
integrally closed in R and U (R) 6= U (D), then R is submaximal.
If D is
Proof. Let x ∈ U (R) \ U (D). If x is not algebraic over D, then we are done, by
Corollary 1.11. Hence assume that x is algebraic over D, thus there exists b ∈ D
such that bx is integral over D and since D is integrally closed in R, we must have
bx = a ∈ D. Therefore x = a
b . Now, since x /∈ U (D), we infer that either x /∈ D or
x−1 /∈ D. Therefore, in any case, there must exist r, s ∈ D such that (r, s) = 1 and
z = r
s ∈ R. Thus we are done,
by Theorem 1.2.
(cid:3)
s ∈ U (R) \ D. Now since D is a P ID, we infer that 1
Lemma 1.15. Let R be a ring with nonzero characteristic n which is square free
(in particular, if R is reduced ring with nonzero characteristic). Then either R is
submaximal or U (R) is a torsion group.
Proof. Without lose of generality we may assume that Char(R) = p, where p is
a prime number. Now suppose that R is not submaximal, then U (R) must be
algebraic over Zp, by Corollary 1.11. Assume that x ∈ U (R), thus we infer that
Zp[x] ∼=
Zp[t]
I where I is a nonzero ideal of the polynomial ring Zp[t]. Hence we
infer that Zp[x] is a finite ring, and therefore x is a torsion element. Thus U (R) is
a torsion group.
(cid:3)
We recall the reader that zero dimensional rings (in particular von Neumann
regular rings) with zero characteristic are submaximal, see [6, Corollary 3.11]. We
also have the following.
Proposition 1.16. Let R be a von Neumann regular ring. Then either R is sub-
maximal or R is a periodic ring.
Proof. If R is not submaximal then by the above comment R has nonzero charac-
teristic. Hence by the above lemma U (R) is torsion. But it is well-known that von
Neumann regular rings are unit regular, that is to say, for any x ∈ R, there exists
u ∈ U (R) such that x = x2u. Hence by the above lemma, if un = 1, then we have
xn = x2n and thus we are done.
(cid:3)
In fact the above result holds for any zero-dimensional ring R. For proof note
that if R is not submaximal then R has nonzero characteristic, say n, and R is
integral over Zn, by [6, Corollary 3.14]. Now note that for any x ∈ R, the ring
Zn[x] is finite and hence we are done. The next remark shows in some rings R, the
group U (R) may not be torsion.
Remark 1.17. Let R be a ring. If R is von Neumann regular with zero characteristic
then clearly U (R) is not torsion, by the proof of the above proposition, since R is
not periodic. Also, if R is a ring with J(R) 6= 0, then U (R) is not torsion. To see
this note that if U (R) is torsion, then for any 0 6= x ∈ J(R), there exists a natural
number n such that (1 + x)n = 1. Hence we infer that x = 0, which is absurd.
By Corollary 1.12, if R is a ring then either R is submaximal or every element
of J(R) is algebraic over Z. Now we also have the following result.
Proposition 1.18. Let R be a ring with zero characteristic and J(R) 6= 0. Then
either R is submaximal or for any x ∈ J(R) and f (t) ∈ Z[t], if f (x) = 0, then
f (0) = 0. In particular J(R) consists of zero divisors.
SUBMAXIMAL INTEGRAL DOMAINS
7
Proof. Assume that R is not submaximal and x ∈ J(R), f (t) ∈ Z[t], and f (x) = 0.
Now since x ∈ J(R), we infer that if u is one of the elements 1 + f (0) or 1 − f (0),
then u ∈ U (R) ∩ Z. Thus by Corollary 1.5, we have u = 1 or u = −1. This implies
that either f (0) = 0, and therefore we are done, or f (0) ∈ {2, −2}. But in the
latter case, we have 2 ∈ J(R) and therefore 1 − 2n ∈ U (R), for each n ∈ Z, which
is impossible by Corollary 1.5.
(cid:3)
The following is a generalization of [7, Corollary 2.24].
Corollary 1.19. Let R be an integral domain with J(R) 6= 0. Then any R-algebra
T is submaximal. In particular, any algebra over a non-field G-domain is submax-
imal.
Proof. If R has nonzero characteristic or Char(R) = Char( R
J(R) ) = 0, then one
can easily see that J(R) is not algebraic over Z (note, if 0 6= x ∈ J(R) and
anxn + · · · + a1x + a0 = 0, where n ∈ N, ai ∈ Z and a0 6= 0, then we infer that
a0 ∈ J(R) which is absurd). Therefore U (R) is not algebraic over Z. Thus U (T )
is not algebraic over Z and therefore T is submaximal, by Corollary 1.11. Hence
we may assume that 0 = Char(R) 6= Char( R
J(R) ) and hence T is submaximal by
Corollary 1.7. The last part is now evident.
(cid:3)
Remark 1.20. One can prove the above corollary by using the proof of Proposition
1.18, Lemma 1.15 and Remark 1.17.
Proposition 1.21. Let R ⊆ T be an extension of commutative rings with lying-
over property and R is not Hilbert. Then T is submaximal.
Proof. Let P be a prime ideal in R such that P is not an intersection of a family
of maximal ideals in R. Now assume Q is a prime ideal in T lying over P . Thus
R/P ⊆ T /Q and since J(R/P ) 6= 0, we infer that T /Q is submaximal by Corollary
1.19.
(cid:3)
We recall the reader that if R is a ring with M ax(R) > 2ℵ0 , then R is submax-
imal, see [4, Proposition 2.6 ].
Corollary 1.22. Let R be a ring. Then either R is submaximal or it is a Hilbert
ring with Spec(R) ≤ 22ℵ0 .
Proof. If R is not submaximal, then for any prime ideal P of R, the integral domain
R/P is not submaximal too. Hence we infer that J(R/P ) = 0, by Corollary 1.19,
i.e., R is Hilbert and therefore P is an intersection of a set of maximal ideals of R.
Thus by the above comment we infer that Spec(R) ≤ 22ℵ0 .
(cid:3)
Remark 1.23. In fact if R is not submaximal, then for any prime ideal P and
subring S of R, the prime ideal P ∩ S is an intersection of a family of maximal
ideals of S. To see this note that R/P contains a copy of S/(P ∩ S), and since R
is not submaximal, we infer that J(S/(P ∩ S)) = 0, by Corollary 1.19. Hence we
are done.
Lemma 1.24. Let R be a ring. Then at least one of the following conditions holds,
(1) There exists a maximal ideal M of R, such that R/M is not an algebraic
extension of a finite field (i.e., R/M is not absolutely algebraic field). In
particular, R/M and therefore R are submaximal.
(2) For any subring S of R, we have J(S) ⊆ J(R).
8
A. AZARANG
Proof. If (1) does not hold, then for any maximal ideal M of R, the field R/M is
algebraic over a finite field. Hence we infer that every subring of R/M is a field.
Now note that if S is a subring of R, then (S + M )/M is a subring of R/M and
therefore (S + M )/M is a field. Thus S ∩ M is a maximal ideal of S, for any
maximal ideal M of R. This shows that J(S) ⊆ J(R). For the final part in (1),
note that by [4, Theorem 1.8 ], if R/M is not algebraic over a finite field, then R/M
and therefore R are submaximal.
(cid:3)
In [4, Proposition 2.9] it is proved that if R is a ring with R/J(R) > 22ℵ0 , then
R is submaximal.
Corollary 1.25. Let R be a reduced ring. If either J(R) 6= 0 or R > 22ℵ0 , then
R is submaximal. Moreover, every R-algebra T , is submaximal too.
Proof. If R is not submaximal, then by Corollary 1.22, R is Hilbert ring and there-
fore J(R) = N (R). Hence we infer that J(R) = 0 and by the above comment also
we have R ≤ 22ℵ0 which are absurd. For the final part note that T /N (T ) contains
a copy of R, hence by our assumptions, either by the above lemma J(T /N (T )) 6= 0,
or T /N (T ) > 22ℵ0 . Thus by the first part, T /N (T ) and therefore T are submaxi-
mal.
(cid:3)
Hence by the above corollary if T is a non-submaximal ring, then for any reduced
subring R of T we have J(R) = 0. More generally, for any subring R of T we have
N (R) = J(R). To see this, note that R + N (T ) is a subring of T . Now since
T /N (T ) contains a copy of R/N (R), we infer that J(R/N (R)) = 0, hence we are
done. The following is also interesting.
Corollary 1.26. Let R be a reduced ring with zero characteristic, then either R is
submaximal or Tp∈P Rp = 0.
Proof. If R is not submaximal then by Corollary 1.8, we infer that Tp∈P Rp ⊆ J(R).
But by the above corollary we also have J(R) = 0. Hence we are done.
(cid:3)
For a ring R, let CoHt1(R) be the set of all prime ideal P of R, such that if
P ( Q, where Q ∈ Spec(R), then Q ∈ M ax(R).
Proposition 1.27. Let R be a noetherian Hilbert ring, then any P ∈ CoHt1(R)
is an intersection of infinite countably many maximal ideals. Consequently, if R
is one dimensional noetherian (Hilbert) domain, then for any infinite family A of
maximal ideals of R, we have T A = 0. In particular,
(1) For any noetherian ring R, either R is submaximal or CoHt1(R) ≤ 2ℵ0.
(2) If R is noetherian domain and dim(R) = 2, then either R is submaximal
or Spec(R) ≤ 2ℵ0.
Proof. Let {Mi}i∈I be a family of maximal ideals of R such that P = Ti∈I Mi. We
first show that for any infinite countable subfamily {Mn}n∈N of {Mi}i∈I we have
P = Tn∈N Mn. Assume A = Tn∈N Mn, hence we infer that P ⊆ A ⊆ Mn, for all
n ∈ N. Hence, if P 6= A, then M in(R/A) is infinite which is a contradiction, thus
P = A and we are done. Now, if furthermore R is one dimensional domain, then
any infinite intersection of maximal ideals is zero, by the previous proof. To see
(1), assume that R is not submaximal, hence M ax(R) ≤ 2ℵ0, by the comment
preceding Corollary 1.22, and since any P ∈ CoHt1(R) is a countable intersection
of maximal ideals, we infer that CoHt1(R) ≤ 2ℵ0. Part (2) is now evident.
(cid:3)
SUBMAXIMAL INTEGRAL DOMAINS
9
We recall that each zero dimensional ring with nonzero characteristic which is
not integral over its prime subring, is submaximal, see [6, Corollary 3.14]. The
following is a generalization of the existence of maximal subrings in artinian rings,
see [5].
Corollary 1.28. Let R be a semi-local ring. Then either R is submaximal or
R has nonzero characteristic, say n, which is integral over Zn (thus R is zero-
dimensional). In particular, every semi-local ring with zero characteristic is sub-
maximal. Consequently,
(1) Non-submaximal semi-local integral domains are exactly non-submaximal
fields.
(2) Every non-submaximal noetherian semi-local ring, is countable artinian.
Proof. If Char(R) = 0, then we are done by Corollary 1.8. Hence assume that R
has nonzero characteristic. If R is not submaximal, then R is a Hilbert ring by
Corollary 1.22. Therefore every non-maximal prime ideal of R is an intersection of
infinitely many maximal ideals. Hence we infer that R is zero dimensional, since
M ax(R) < ℵ0. Now by the above comment we infer that R must be integral
over its prime subring. For part (1), we note that the prime subring of an integral
domain with nonzero characteristic is a field; and for (2) note that R is a zero-
dimensional ring. Hence R is artinian. Thus by [5, Proposition 2.4], R must be
countable too.
(cid:3)
Proposition 1.29. Let R1 ⊆ R2 be extension of rings. Assume that R1 is semi-
local. Then either R2 is submaximal or R1 is zero-dimensional. In other words,
every algebra over a semi-local ring which is not zero dimensional, is submaximal.
Proof. First note that, if P is a prime ideal of R2, then the ring R2/P contains a
copy of S = R1/(R1 ∩ P ). Hence if J(S) 6= 0, then R2/P and therefore R2 are
submaximal by Corollary 1.19. If not, then we infer that P ∩ R1 is a maximal ideal
of R1, since R1 is semi-local. Hence, we may assume that for any prime ideal P of
R2, R1 ∩ P is a maximal ideal in R1. Now, if Q is a prime ideal in R1, then there
exists a prime ideal P of R2 such that P ∩ R1 ⊆ Q (note, there exists a prime ideal
P of R2 with P ∩ (R1 \ Q) = ∅). Hence we infer that Q = P ∩ R1 and therefore Q
is maximal in R1. Hence R1 is a zero dimensional ring.
(cid:3)
We recall the reader that a ring R is called residue finite if R/I is a finite ring
for every nonzero ideal I of R. It is clear that if R is a residue finite ring, then
dim(R) ≤ 1 and in fact dim(R) = 1 if and only if R is a non-field integral domain.
In the next theorem we give the structure of non-submaximal residue finite rings.
Theorem 1.30. Let R be a residue finite ring which is not submaximal. Then R
is a countable principal ideal ring. Moreover, exactly one of the following holds:
(1) If dim(R) = 1, then R = U (R)Z and R is algebraic over Z.
(2) If dim(R) = 0, then R is an artinian ring with nonzero characteristic, say
n, which is also integral over Zn. Moreover, R has only finitely many ideals.
In particular, if R is reduced then R is finite.
Proof. First note that since R is not submaximal then for any nonzero ideal I of R
we infer that R/I ∼= Zm for some natural number m (note, it is clear that all finite
rings except Zn, up to isomorphism, where n is a natural number, are submaximal).
This shows that I = Rm and therefore R is a principal ideal ring. Now by the above
10
A. AZARANG
comment we have two cases, either dim(R) = 1 or dim(R) = 0. First assume that
dim(R) = 1 and therefore R is a non-field integral domain. Hence we have two
cases.
(1) If R has nonzero characteristic, say p (where p ∈ P), then we infer that
for any nonzero ideal I of R we have R/I ∼= Zp, which is absurd, by the
preceding comment (note, in this case R ∼= Zp which is impossible).
(2) If R has zero characteristic. Then R is a P ID with Ir(R) = P, by the
first part of the proof. Hence we infer that R = U (R)Z. Also note that by
Corollary 1.11, U (R) is algebraic over Z. Therefore U (R) is countable and
hence R is countable too. Thus we are done.
Now assume that R is zero-dimensional ring. Thus R is artinian, since R is
noetherian (note, every ideal of R is principal). Thus by [5, Proposition 2.4], R is
countable and has a nonzero characteristic, say n, which is also integral over Zn, by
[5, Corollary 2.5]. Moreover, by the first part of the proof since every nonzero ideal
of R has the form I = Rm where mn, we infer that R has only finitely many ideals.
Also note that if R is reduced, then by Corollary 1.25, we infer that J(R) = 0 and
therefore R ∼= Zn (where n is square free) and hence we are done.
(cid:3)
Proposition 1.31. Let D be an integral domain and S be a multiplicatively closed
set in it such that S * U (D). If DS is not submaximal then the following conditions
hold.
(1) D has zero characteristic. S is algebraic over Z and therefore S ≤ ℵ0. In
particular Z is not integrally closed in DS.
(2) There exists an infinite subset M of M ax(D) such that M ax(DS) = {QS Q ∈
M}. In particular, T M = 0.
(3) For any non-maximal prime ideal PS of DS, either Char( D
P ) = 0 or DS
PS
∼=
D
P .
∼= ( D
P ) ¯S = F rac( D
Proof. Since DS is not submaximal then by Corollary 1.11, we infer that S is
algebraic over Z. Hence if Char(D) 6= 0, then S ⊆ U (D) which is absurd. Thus
D has zero characteristic. Hence by Corollary 1.14, Z is not integrally closed in
DS. Now assume PS is a maximal ideal in DS and P ∈ Spec(D) \ M ax(D). Thus
we have DS
P ) is
PS
the quotient field of D
P ) is
submaximal by Corollary 1.11, and therefore DS is submaximal which is absurd.
Hence P ∈ M ax(D). Also, note that by Corollary 1.28, M ax(DS) is infinite since
DS is not submaximal; and by Corollary 1.19 we have J(DS) = 0 and therefore
T M = 0. Finally, for part (3), assume that Char( D
P ) = q > 0, then by part (1),
either ¯S ⊆ U ( D
P and we are done; or ¯S * U ( D
P ) and therefore DS
P )
and therefore ( D
P ) ¯S is submaximal. Thus DS is submaximal which is absurd. (cid:3)
P ), where ¯S = {s + P s ∈ S} and F rac( D
P , and since P is not maximal we infer that F rac( D
P ) ¯S = D
∼= ( D
PS
∼= D
Note that in the above proposition clearly for any maximal ideal QS of DS we
also have DS
Q . More generally, if R is a ring and S be a multiplicatively
QS
closed set in R, then the non-submaximality of RS implies that every maximal
ideal of RS has the form PS for some maximal ideal P of R, by the preceding proof.
In particular, if R has nonzero characteristic then one can easily see that, by a
similar proof, for every prime ideal PS of RS we have RS
P . The following is a
PS
generalization of [7, Theorem 3.2 ].
∼= R
SUBMAXIMAL INTEGRAL DOMAINS
11
Theorem 1.32. Let R be a ring and S be a multiplicatively closed set in R, such
that RS is semi-local. Then at least one of the following holds.
(1) RS is submaximal.
(2) Spec(RS) = M ax(RS) = {PS P ∈ M}, where M is a finite subset of
M in(R) ∩ M ax(R).
In particular if (2) holds and RS is submaximal, then R is submaximal too.
Proof. Assume that RS is not submaximal, then by the above comment M ax(RS) =
{PS P ∈ M}, where M is a finite subset of M ax(R). But since RS is a semi-local
non-submaximal ring, then we infer that RS is zero-dimensional, by Corollary 1.28.
Hence M ⊆ M in(R). Now assume that (2) holds and RS is submaximal. Thus by
[7, Theorem 2.26], at least one of the following holds (note RS is zero-dimensional).
(1) There exists a maximal ideal PS of RS, such that RS/PS is submaximal.
But, since RS/PS ∼= R/P , we infer that R/P and therefore R are submax-
imal.
(2) There exist distinct maximal ideals PS and QS of RS such that RS/PS ∼=
RS/QS. Hence similar to (1), we infer that R/P ∼= R/Q and therefore R
is submaximal, by [3, Theorem 2.2].
(3) There exist an ideal IS and a maximal ideal PS of RS, such that (PS)2 ⊆
IS ⊆ PS and RS/IS ∼= K[x]/(x2), for some field K. Hence we infer that
I is a P -primary ideal in R. Therefore R/I is a local ring with unique
prime ideal P/I. Thus RS/IS ∼= (R/I) ¯S
∼= (R/I)P/I = R/I, where ¯S =
{s + I s ∈ S}, see [16, P. 24, Ex. 7]. Hence R/I and therefore R are
submaximal.
(cid:3)
The following remark which is a generalization of [4, Corollary 1.15] is interesting.
Remark 1.33. Let F be the set of all fields, up to isomorphism, which are not
submaximal and let D be the class of all integral domains (or reduced rings), up to
isomorphism, which are not submaximal. Now for any D ∈ D we have the following
facts:
(1) For any M ∈ M ax(D), we have D/M ∈ F .
(2) For any M, N ∈ M ax(D), with M 6= N we have D/M ≇ D/N (For
otherwise, by [3, Theorem 2.2], D is submaximal). In other words there
exists an injection ΦD from M ax(D) into F , sending M into D/M .
(3) M ax(D) ≤ F, by [4, Proposition 2.6] or (2).
(4) J(D) = 0, by Corollary 1.19 or 1.25.
(5) Hence we have the natural rings embedding D ֒→ QM∈Max(D) D/M ֒→
QE∈F E (i.e., every non-submaximal integral domain (or reduced ring)
can be embedded in QE∈F E).
Now, for any D ∈ D, let RdM ax(D) = Im(ΦD). Two non submaximal integral
domains D1 and D2 are called RdM ax-equivalent, if RdM ax(D1) = RdM ax(D2).
Now, let D′ be the set of equivalent classes of this relation. We claim that D′ ≤
2F = 22ℵ0 and F ⊆ D′. To show this, it is clear that F ⊆ D′. Also note that
for any [D] ∈ D′, the function that send [D] into RdM ax(D) is well-defined and
one-one from D′ into P (F ), the set of all subsets of F . Hence we are done, since
F = 2ℵ0 , by [4, Corollary 1.15].
12
A. AZARANG
2. Submaximal Integral Domains
In [5, Corollary 1.3], it is proved that uncountable fields, are submaximal. The
following interesting result is a generalization of this fact.
Theorem 2.1. Let R be an uncountable U F D, then R is submaximal.
Proof. If U (R) is uncountable, then we are done by Corollary 1.11. Hence we may
assume that U (R) is countable. Thus Ir(R) = R. Now, note that there exists
a p ∈ Ir(R) such that 1 − p /∈ U (R). Hence let p be an element in Ir(R), such
that 1 − p /∈ U (R) and q0 ∈ Ir(R) such that q01 − p. Thus q0 ∈ A = {q ∈
Ir(R) pR + qR = R }. Now we show that A must be an uncountable set. Let us
assume that A is countable and put B = {pq + 1 q ∈ Ir(R) \ A}. It is clear that B
is an uncountable set and therefore there exists a non-unit element x ∈ B such that
x has an irreducible divisor q′ ∈ Ir(R) \ A (note, U (R) and A are countable, thus
the set of all elements which are of the form uq1 · · · qn, where u ∈ U (R) and qi ∈ A,
n ∈ N ∪ {0} must be a countable set). Hence q′R + pR = R and q′ /∈ A, which
is a contradiction. Thus A must be uncountable. Now for any q ∈ A, p + (q) is a
unit in the ring R/(q), hence if there exists q ∈ A such that p + (q) is not algebraic
over the prime subring of R/(q), then by Corollary 1.11, R/(q) and therefore R are
submaximal. Consequently, we may assume that for any q ∈ A, p + (q) is algebraic
over the prime subring of R/(q). Thus for any q ∈ A, Z[p] ∩ (q) 6= 0, where Z is the
prime subring of R. But Z[p] is a countable set and the set {(q)}q∈A is uncountable,
thus there exists a nonzero element f ∈ Z[p] which belongs to an infinite (in fact
uncountable) number of (q), where q ∈ A, which is a contradiction. This proves
the theorem.
(cid:3)
Corollary 2.2. Let R be a non-submaximal non-field P ID, then R is countable
and Ir(R) = R.
Proof. By the above theorem, R and Ir(R) are countable. Now note that if Ir(R)
is finite then R is a G-domain and therefore R is submaximal by Corollary 1.19,
hence we are done.
(cid:3)
Corollary 2.3. Every localization of an uncountable U F D is submaximal.
Proposition 2.4. Let D be an uncountable atomic (or noetherian) domain. As-
sume that there exists an irreducible element p of D such that 1 − p /∈ U (D) and
every element of Z[p] has at most countably many (irreducible) divisors. Then D is
submaximal. In particular, if D is an uncountable atomic (or noetherian) domain
such that every element of it has at most countably many (irreducible) divisors,
then D is submaximal. Consequently, every uncountable noetherian idf -domain is
submaximal.
Proof. Note that any noetherian integral domain is an atomic domain, and by
using the proof of the previous theorem word-for-word, one can easily complete the
proof.
(cid:3)
Theorem 2.5. Let R be an uncountable atomic (or noetherian) integral domain
with zero characteristic. If every n ∈ N has at most countably many (irreducible)
divisors, then R is submaximal.
Proof. We may assume that U (R) is algebraic over Z and therefore it is count-
able, by Corollary 1.11. Hence we infer that Ir(R) = R and therefore Ir(R) is
SUBMAXIMAL INTEGRAL DOMAINS
13
uncountable. Let X be a transcendental basis for R over Z. Now, if there exist a
natural number n > 1 and x ∈ X such that Z∩(nx−1)R = 0, then R is submaximal
by Corollary 1.13. Hence we may assume that Z ∩ (nx − 1)R 6= 0 for any natural
number n > 1 and x ∈ X. Since X is uncountable and the number of ideals of Z is
countable, we infer that there exists an uncountable subset Y of X such that for any
y ∈ Y we have Z ∩ (ny − 1)R = mZ for some fixed natural numbers n > 1 and m.
Hence for any y ∈ Y we have ny −1m. Now we show that m has uncountably many
irreducible divisors. Assume that P = {q ∈ Ir(R) : qny − 1, for some y ∈ Y }. If
P is countable, then we infer that {ny − 1 : y ∈ Y } is countable too (note U (R)
is countable) which is a contradiction. Hence P is uncountable. Now note that
any q ∈ P is an irreducible divisor of m, i.e., m has uncountable many irreducible
divisors, which is a contradiction. Hence, for any natural number n > 1, the set
{x ∈ X Z ∩ (nx − 1)R 6= 0} is countable, and therefore R is submaximal, by
Corollary 1.13.
(cid:3)
For more observations we need the following definition, see [2].
Definition 2.6. An extension R ⊆ T of rings is called residually algebraic exten-
sion, if for any prime ideal Q of T , the ring T /Q is algebraic over R/(Q ∩ R).
One can easily see that if R ⊆ T is a residually algebraic extension then T
must be algebraic over R. Also see [2] for more interesting results about residually
algebraic extensions. In particular, see [2, Section 4, b-Maximal subrings] which
contains interesting results related to the subject of this paper. The following
lemma is needed for the next theorem.
Lemma 2.7. Let R ⊆ T be a residually algebraic extension of rings and R has
finite dimension. Then T has finite dimension too and we have dim(T ) ≤ dim(R).
Proof. Assume that n = dim(R). First suppose that T is an integral domain, and
we prove the lemma by induction on n. If n = 0, then R is a field and therefore
T is a field too, hence we are done. Thus assume that n ≥ 1 and the lemma
holds for any residually algebraic extension (of integral domains) R ⊆ T with
dim(R) < n. Now assume that R ⊆ T is a residually algebraic extension of integral
domains with dim(R) = n. Hence for any nonzero prime ideal Q of T , the extension
R/(Q ∩ R) ⊆ T /Q is also a residually algebraic extension of integral domains and
dim(R/(Q ∩ R)) < n (note that T is algebraic over R and Q 6= 0, hence Q ∩ R 6= 0).
Hence we infer that dim(T /Q) < n. This immediately implies that dim(T ) ≤ n
and therefore we are done. Now assume that R ⊆ T be any residually algebraic
extension, dim(R) = n and Q be a prime ideal of T . Hence R/(Q ∩ R) ⊆ T /Q
is a residually algebraic extension of integral domains and dim(R/(Q ∩ R)) ≤ n.
Thus by the first part of the proof we infer that dim(T /Q) ≤ n and since the latter
inequality holds for any prime ideal Q of T , we must have dim(T ) ≤ n. Therefore
we are done.
(cid:3)
The following is now in order.
Theorem 2.8. Let R be a noetherian integral domain with tr.degZ (R) = n < ℵ0
and assume that X is a transcendental basis for R over Z. Moreover let Z[X] ⊆ R
be a residually algebraic extension and at least one of the following holds.
(1) If Char(R) = 0 and n ≥ 1, then for any maximal ideal M of R we have
ht(M ) ≥ n + 1.
14
A. AZARANG
(2) If Char(R) = p > 0 and n ≥ 2, then for any maximal ideal M of R we
have ht(M ) ≥ n.
Then R is submaximal.
Proof. (1) Let x ∈ X, if R(2x − 1) = R, then we are done, by Corollary 1.11.
Hence assume that R(2x − 1) 6= R and P be a prime ideal of R which is min-
imal over R(2x − 1). Thus by the Krull's principal ideal theorem we infer that
ht(P ) = 1 and therefore by our assumption P is not a maximal ideal in R.
Hence (0) ( (2x − 1)Z[X] ⊆ P ∩ Z[X]. Thus we have two cases. First,
if
(2x − 1)Z[X] = P ∩ Z[X], then
P ), hence we
are done, by Corollary 1.5. Thus we may assume that Q = P ∩Z[X] 6= (2x−1)Z[X].
Therefore ht(Q) ≥ 2 and since dim(Z[X]) = n + 1, we infer that dim( Z[X]
Q ) ≤ n − 1.
But Z[X]
P is a residually algebraic extension, hence by the above lemma con-
clude that dim( R
P ) ≤ n − 1. Now since ht(P ) = 1, the latter inequality immediately
implies that ht(M ) ≤ n, for any maximal ideal M ⊇ P , which is absurd. Thus we
are done.
P and therefore 1
(2x−1)Z[X] ⊆ R
Q ⊆ R
Z[X]
2 ∈ U ( R
Zp[X]
(xy−1)Zp[X] ⊆ R
(2) Let x, y ∈ X and x 6= y. If R(1 − xy) = R, then we are done by Corollary
1.11. Hence assume that R(1 − xy) 6= R and P be a prime ideal of R which is
minimal over R(xy − 1). Thus by the Krull's principal ideal theorem we infer that
ht(P ) = 1 and therefore by our assumption P is not a maximal ideal in R. Hence
(0) ( (xy −1)Zp[X] ⊆ P ∩Zp[X]. Thus we have two cases. First, if (xy −1)Zp[X] =
P ∩ Zp[X], then
P ), hence
we are done by Corollary 1.11 (note, x + (xy − 1)Zp[X] is not algebraic over Zp,
since Zp[X] is a U F D). Thus assume that Q = P ∩ Zp[X] 6= (xy − 1)Zp[X].
Therefore ht(Q) ≥ 2 and since dim(Zp[X]) = n we infer that dim( Zp[X]
Q ) ≤ n − 2.
But Zp[X]
Q ⊆ R
P is a residually algebraic extension, hence by the above lemma we
infer that dim( R
P ) ≤ n − 2. Now since ht(P ) = 1, the latter inequality immediately
implies that ht(M ) ≤ n − 1, for any maximal ideal M ⊇ P , which is absurd. Thus
we are done.
(cid:3)
P and therefore x + (xy − 1)Zp[X] ∈ U ( R
Proposition 2.9. Let a non-singleton X 6= ∅ be a set of independence indeter-
minates in a noetherian ring R over Z, where Z is the prime subring of R. If
Char(R) ∈ P ∪ {0} and R is integral over Z[X], then R is submaximal.
Proof. Let x, y ∈ X and x 6= y. If R(1 − xy) = R, then we are done. Hence assume
that P is a minimal prime ideal of R(1 − xy). Hence ht(P ) ≤ 1, by the Krull's
principal ideal theorem. Thus ht(P ∩ Z[X]) ≤ 1. But (1 − xy)Z[X] is a prime ideal
in Z[X], which is contained in P ∩ Z[X]. So we infer that (1 − xy)Z[X] = P ∩ Z[X]
and therefore T = Z[X]/(1 − xy)Z[X] ⊆ R/P . Now ¯x and ¯y are units in T , which
are not algebraic over the prime subring of T (note, Z[X] is a U F D). Hence R/P
has unit elements which are not algebraic over its prime subring and therefore we
are done, by Corollary 1.11.
(cid:3)
We conclude this article with the following fact about Dedekind domains.
Proposition 2.10. Let D be an uncountable Dedekind domain with countable set
of maximal ideals. Then U (D) is uncountable. In particular, D is submaximal.
SUBMAXIMAL INTEGRAL DOMAINS
15
Proof. Let U (D) be countable and seek a contradiction. It is now clear that Ir(D)
is uncountable. Hence we infer that the set of principal ideals of D is uncountable.
But since D is a Dedekind domain, every nonzero ideal of D is a finite product of
prime ideals. Since the set of prime ideals of D is countable, we infer that the set
of ideals D is countable too, which is a contradiction. Thus U (D) is uncountable
and therefore we are done, by Corollary 1.11.
(cid:3)
References
[1] D.D. Anderson and Bernadette Mullins, Finite factorization domains, Proc. A.M.S. 124 (2)
(2008) 389-396.
[2] A. Ayache and A. Jaballah, Residually algebraic pairs of rings, Math Z. 225 (1997) 49-65.
[3] A. Azarang, On maximal subrings, Far East J. Math. Sci (FJMS) 32 (1) (2009) 107-118.
[4] A. Azarang, O.A.S. Karamzadeh, Which fields have no maximal subrings?, Rend. Sem.
Mat. Univ. Padova, 126 (2011) 213-228.
[5] A. Azarang, O.A.S. Karamzadeh, On the existence of maximal subrings in commutative
artinian rings, J. Algebra Appl. 9 (5) (2010) 771-778.
[6] A. Azarang, O.A.S. Karamzadeh, On Maximal Subrings of Commutative Rings, to appear
in Algebra Colloquium.
[7] A. Azarang, O.A.S. Karamzadeh, Most Commutative Rings Have Maximal Subrings, to
appear in Algebra Colloquium.
[8] H.E. Bell and F. Guerriero, Some condition for finiteness and commutativity of rings, J.
Math. Math. Sci. 13 (3) (1990) 535-544.
[9] H.E. Bell and A.A. Klein, On finiteness of rings with finite maximal subrings, J. Math.
Math. Sci. 16 (2) (1993) 351-354.
[10] P.J. Cahen, D.E. Dobbs and T.J. Lucas, Valuative domains, J. Algebra Appl. 9 (1) (2010)
43-72.
[11] P.J. Cahen, D.E. Dobbs and T.J. Lucas, Characterizing minimal ring extensions, Rocky
Mountain Journal of Math 41 (4) (2011) 1081-1125.
[12] David E. Dobbs, Every commutative ring has a minimal ring extension, Comm. Algebra 34
(2006) 3875-3881.
[13] D.E. Dobbs and J. Shapiro, A classification of the minimal ring extensions of an integral
domain, J. Algebra, 305 (2006), 185-193.
[14] D.E. Dobbs and J. Shapiro, A classification of the minimal ring extensions of certain com-
mutative rings, J. Algebra, 308 (2007), 800-821.
[15] D. Ferrand, J.-P. Olivier, Homomorphismes minimaux danneaux, J. Algebra 16 (1970)
461-471.
[16] I. Kaplansky, Commutative Rings, Revised edn. (University of Chicago Press, Chicago
1974).
[17] Abraham A. Klein, The finiteness of a ring with a finite maximal subrings, Comm. Algebra
21 (4) (1993) 1389-1392.
[18] S.S. Korobkov, Finite Rings with Exactly Two Maximal Subrings, Russian Mathematics
(Iz. VUZ), 55 (6) (2011) 4652.
[19] Thomas J. Laffey, A finiteness theorem for rings, Proc. R. Ir. Acad. 92 (2) (1992) 285-288.
[20] T. Kwen Lee, K. Shan Liu. Algebra with a finite-dimensional maximal subalgebra, Comm.
Algebra 33 (1) (2005) 339-342.
[21] T.G. Lucas, Minimal integral ring extensions, Journal of Comm Alg. 3 (1) (2011) 47-81.
[22] M. L. Modica, Maximal Subrings, Ph.D. Dissertation, (University of Chicago, 1975).
[23] Gabriel Picavet and Martine Picavet-L'Hermitte, About minimal morphisms, in: Multiplica-
tive ideal theory in commutative algebra, Springer-Verlag, New York, (2006) pp. 369-386.
|
1705.01562 | 2 | 1705 | 2018-04-07T16:15:52 | Hermitian and skew hermitian forms over local rings | [
"math.RA"
] | We study the classification problem of possibly degenerate hermitian and skew hermitian bilinear forms over local rings where 2 is a unit. | math.RA | math |
HERMITIAN AND SKEW HERMITIAN FORMS OVER LOCAL RINGS
JAMES CRUICKSHANK, RACHEL QUINLAN, AND FERNANDO SZECHTMAN
Abstract. We investigate the structure of possibly degenerate ε-hermitian forms over
local rings. We prove classification theorems in the cases where the ring is complete and
either the form is nondegenerate or the ring is a discrete valuation ring. In the latter case
we describe a complete set of invariants for such forms based on a generalisation of the
classical notion of the radical of the form.
1. Introduction
We are concerned with the classification problem of possibly degenerate hermitian or
skew hermitian bilinear forms over a local ring in which 2 is a unit. Symmetric and skew
symmetric forms are included as a special case, as we allow the underlying involution to
be trivial.
In foundational papers of Durfee ([7]) and O'Meara ([14]) the integral theory of quadratic
forms over local fields is developed. This is equivalent to the theory of symmetric bilinear
forms over a complete local principal ideal domain with finite residue field. Jacobowitz
([8]) extended this integral theory to the case of hermitian forms over local fields equipped
with an involution.
More recently, Levchuk and Starikova ([12]) have proved the existence and uniqueness
of normal forms for symmetric matrices over local principal ideal domains under certain
assumptions on the unit group of the ring.
In a wider setting Bayer-Fluckiger and Fainsilber ([1]) have considered the general prob-
lem of equivalence of hermitian or skew hermitian forms over arbitrary rings and are able to
prove some quite general reduction theorems for this problem. A broad study of sesquilin-
ear forms and their connection to hermitian forms was carried out by Bayer-Fluckiger,
First and Modovan ([2]) as well as by Bayer-Fluckiger and Moldovan ([3]).
For general information on quadratic and hermitian forms over rings we refer the reader
to the textbook of Knus ([9]).
1.1. Outline of the paper. Given the extensive existing literature on this topic and the
fact that we aim to provide a unified and self contained exposition, some overlap with
previously known results is inevitable.
In this section we summarise the results of the
paper, emphasising the contributions that we have made.
Throughout, A is a commutative local ring with maximal ideal r and ∗ is an involution of
A, that is to say an automorphism of order at most two. Clearly, ∗ induces an involution
2010 Mathematics Subject Classification. 11E08, 11E39, 15A63.
Key words and phrases. local ring, discrete valuation ring, hermitian, skew hermitian.
1
2
JAMES CRUICKSHANK, RACHEL QUINLAN, AND FERNANDO SZECHTMAN
on the residue field A/r. If this induced involution is trivial, we say that ∗ is ramified,
otherwise it is unramified - this distinction will play a decisive role in the sequel. Thus
broadly speaking there are four types of forms to consider, ramified hermitian, ramified
skew hermitian, unramified hermitian and unramified skew hermitian. However, the last
two can be merged into one case since they differ only up to multiplication by a unit.
In Section 2 we present some elementary results on nondegenerate forms of rank one or
two in various cases. These essentially form the building blocks for our later classification
theorems. In light of this we include all the details so as to make the paper self contained.
In Section 3 we introduce completeness and use it to derive the existence of basis vectors
with certain specified properties. A key new result here is Lemma 5 which guarantees the
existence of a symplectic pair under appropriate conditions. We also give an example to
show that this lemma can fail in the absence of completeness.
In Section 4 we use the results of the previous sections to analyse nondegenerate forms
of any rank over arbitrary local rings. In this case there is an associated vector space and
form over the residue field and in the case that the ring is also complete we show that
equivalence of forms over the local ring reduces to equivalence of these associated forms
over the residue field. In particular we demonstrate the existence of a symplectic basis for
a nondegenerate skew hermitian form over a complete local ring with ramified involution
- see Proposition 1.
The remaining sections of the paper deal with possibly degenerate forms. In this case it
is not true without further assumptions that such forms have a nice - in a sense precisely
defined in Section 5 - decomposition. However in the case of a discrete valuation ring, that
is to say a local principal ideal domain, we are able to prove that any form has such a nice
decomposition - this is the content of Theorem 3.
Following this we introduce a generalisation of the classical notion of the radical of a
form. In our case we have one generalised radical module for each nonnegative integer.
Using these generalised radicals we are able to show that the equivalence problem for a
pair of forms over a complete discrete valuation ring can be reduced to the equivalence of
a series of pairs of nondegenerate forms over the associated residue field - see Theorem 4.
This is a broad generalisation of Theorem D of [4] which dealt only with the special case
of symmetric matrices.
Under some additional hypotheses, these spaces essentially turn out to give rise to a
complete set of invariants for hermitian and skew hermitian forms over a complete discrete
valuation ring. This can be found in Theorem 6.
Also under these hypotheses, we are able to prove, in Theorems 7 and 9, the existence and
uniqueness of normal forms in all possible cases. As a consequence of these normal forms
we also prove that the congruence class of a hermitian or skew hermitian matrix, over a
complete local principal ideal domain satisfying the aforementioned additional hypotheses,
depends only on the invariant factors of the matrix - this is stated in Theorem 8. Results
analogous to this last theorem have been obtained elsewhere, for polynomial rings over
algebraically closed fields see Theorem 4.5 of [6], and for skew symmetric matrices over
principal ideal domains see Exercise 4 of Chapter XIV of [11].
HERMITIAN AND SKEW HERMITIAN FORMS OVER LOCAL RINGS
3
1.2. Terminology and notation. We shall (sometimes) use the shorthand a for the
residue class a + r. Moreover, we extend this shorthand to matrices in the obvious way.
We write U(A) for the multiplicative group of units of A and recall the fundamental fact
that, since A is local, r = A − U(A).
Let R be the subring of A consisting of elements fixed by ∗. Observe that R is also a
local ring, with maximal ideal m = R ∩ r. Let S = {a ∈ A : a∗ = −a}. Since 2 is assumed
to be a unit of A we have A = R ⊕ S. If S ⊂ r we say that ∗ is ramified. Otherwise we
say that it is unramified. Since r is ∗-invariant, ∗ induces an involution on the residue field
A/r, which we also denote by ∗. As indicated in the introduction, ∗ is ramified if and only
if the induced involution on the residue field is trivial.
We write Mm(A) for the set of m × m matrices over A. The group of invertible m × m
Let V be a free A-module of rank m > 0 and let h : V × V → A be an ε-hermitian
form, where ε = ±1. That is to say h is bi-additive, A-linear in the second variable and
h(v, u) = εh(u, v)∗ for all u, v ∈ V .
The Gram matrix of a list of vectors v1,· · · , vk with respect to a form h is the k × k
matrix whose (i, j)-entry is h(vi, vj). The form h is said to be nondegenerate if the Gram
matrix of any basis of V belongs to GLm(A).
matrices is denoted by GLm(A).
A matrix C ∈ Mm(A) is said to be ε-hermitian if C ′∗ = εC where C ′ denotes the
transpose of A. Of course h is ε-hermitian if and only if G is ε-hermitian, where G is the
Gram matrix of any basis. On the other hand, given an ε-hermitian C ∈ Mm(A), we can
construct an ε-hermitian form hC on V = Am, by hC(u, v) = u′∗Cv.
Matrices C, D ∈ Mm(A) are said to be ∗-congruent if there exists X ∈ GLm(A) such
that D = X ′∗CX. Given an ε-hermitian form h, then the Gram matrices of any two bases
are ∗-congruent. On the other hand we say that forms h1 on V1, respectively h2 on V2 are
equivalent if there is an A-isomorphisn ϕ : V1 → V2 such that h1(u, v) = h2(ϕ(u), ϕ(v)).
Now, hC and hD as above are equivalent if and only C and D are ∗-congruent.
2. Small nondegenerate submodules
In contrast to the field case, a linearly independent set is not necessarily a subset of a
basis - this is apparent even in the rank one case. In the presence of the form h, however,
we have some sufficient conditions.
Given an A-submodule W of V , let W ⊥ = {v ∈ V : h(w, v) = 0}. Then W ⊥ is an
A-submodule of V .
Lemma 1. Let u ∈ V and suppose that h(u, u) ∈ U(A). Then V = Au ⊕ Au⊥. Moreover,
both Au and Au⊥ are free A-modules.
Proof. Let v1,· · · , vm be a basis of V . So u = P civi. Now h(u, u) = P cih(u, vi) ∈ U(A).
Since A is local this implies that cj ∈ U(A) for some j. Without loss of generality assume
that c1 ∈ U(A). Therefore u, v2, . . . , vm is a basis of V . Now, for i = 2,· · · m, let wi =
vi − h(u, vi)h(u, u)−1u. Clearly u, w2,· · · , wm is a basis of V and w2,· · · , wm is a basis of
Au⊥.
(cid:3)
4
JAMES CRUICKSHANK, RACHEL QUINLAN, AND FERNANDO SZECHTMAN
In the case that ∗ is ramified and h is skew hermitian, it is immediate that h(u, u) ∈ r
for all u ∈ V . So we cannot have any nondegenerate rank one submodules in that case.
However we have the following lemma concerning rank two submodules.
Lemma 2. Suppose that ∗ is ramified and that h is skew hermitian. If u, v ∈ V satisfy
h(u, v) ∈ U(A), then V = (Au + Av) ⊕ (Au + Av)⊥. Moreover both summands in this
decomposition are free A-modules.
Proof. Let v1,· · · , vm be a basis of V . So u = Pi aivi. Suppose that ai ∈ r for all i.
Then clearly h(u, v) ∈ r, contradicting our assumption. So without loss of generality
we may assume that a1 ∈ U(A).
It follows that u, v2,· · · , vn is a basis of V . Write
v = b1u+Pm
j=2 bjvj. If b2,· · · , bn ∈ r, then since h(u, u) ∈ r it would follow that h(u, v) ∈ r,
contradicting our hypothesis. Without loss of generality we may assume that b2 ∈ U(A)
and it follows that u, v, v3,· · · , vm is a basis of V . Since the Gram matrix of u, v is
invertible in this case it follows that, for i = 3,· · · , m, there exist (unique) ai, bi ∈ A such
that h(u, aiu + biv) = h(u, vi) and h(v, aiu + biv) = h(v, vi). Let wi = vi− (aiu + biv). Then
u, v, w3,· · · , wm is a basis of V and w2,· · · , w3 is a basis of (Au + Av)⊥ as required.
(cid:3)
Now we show, excepting the ramified skew hermitian case, that if h has any unit value,
then there is some element w ∈ V such that h(w, w) is a unit.
Lemma 3. Let u, v ∈ V . Suppose that h(u, v) ∈ U(A) and that either h is hermitian or
that ∗ is unramified. Then there is some w ∈ V such that h(w, w) ∈ U(A).
Proof. Replacing v by h(u, v)−1v if necessary, we can assume without loss of generality
that h(u, v) = 1. Now suppose that h is hermitian. Then
2 = h(u, v) + h(v, u) = h(u + v, u + v) − h(u, u) − h(v, v).
Now since 2 ∈ U(A) and A is local, we conclude that at least one of h(u, u), h(v, v) or
h(u + v, u + v) belongs to U(A). Finally in the case where h is skew hermitian and ∗ is
unramified, choose b ∈ U(A) ∩ S. Now observe that bh is hermitian and that bh(u, v) ∈
U(A) if and only if h(u, v) ∈ U(A).
(cid:3)
In summary the results of this section show that if h has any unit value then it is possible
to break off a nondegenerate submodule of rank one except in the ramified skew hermitian
case. In the latter case, no nondegenerate rank one submodules can possibly exist, but it
is possible to break off a nondegenerate submodule of rank two.
3. Complete local rings
Having given conditions sufficient to ensure the existence of nondegenerate rank one and
two submodules, in this section we introduce some natural conditions on the ring that
will guarantee the existence of unit length basis vectors, or in the ramified skew hermitian
case, the existence of a symplectic pair. Recall that a symplectic pair is an ordered pair
of vectors (u, v) ∈ V 2 satisfying h(u, u) = h(v, v) = 0 and h(u, v) = −h(v, u) = 1. We also
recall that a symplectic basis is a basis v1, w1, v2, w2,· · · , vl, wl such that each pair (vi, wi)
HERMITIAN AND SKEW HERMITIAN FORMS OVER LOCAL RINGS
5
i=1
is a symplectic pair and such that h(vi, vj) = h(wi, wj) = h(vi, wj) = h(wj, vi) = 0 for
i 6= j.
Observe that h(au, au) = a∗ah(u, u), so it is natural to investigate the image of the
so-called norm map, N : a 7→ a∗a. To this end, we follow Cohen ([5]) and say that A is
complete if T∞
ri = 0 and A is metrically complete with respect to its r-adic metric. We
observe that in the present context, where we seek solutions to certain quadratic equations,
it is natural to restrict our attention to complete rings.
Lemma 4. Suppose that A is complete. Suppose that b ∈ U(R) and that a∗a ≡ b mod r
for some a ∈ A. Then there is some c ∈ A such that c∗c = b.
Proof. First we observe that since A is complete, R is also complete. Since 2 ∈ R, it follows
from Hensel's Lemma (see [5], Theorem 4) that the squaring map from 1 + m to 1 + m is
a surjection. Now a ∈ U(A) since b ∈ U(A), therefore b(a∗a)−1 ∈ 1 + m. Hence there is
some δ ∈ m such that b(a∗a)−1 = (1 + δ)2. So b = (a(1 + δ))∗a(1 + δ).
Corollary 1. Suppose that A is complete and that u ∈ V , b ∈ U(A) and b∗ = εb. If
h(u, u) ≡ b mod r then there is some w ∈ Au such that h(w, w) = b.
Proof. Note that h(u, u)−1b ∈ 1 + m. By Lemma 4 there is some c ∈ A such that c∗c =
h(u, u)−1b. Let w = cu.
(cid:3)
(cid:3)
Now we turn to the nondegenerate two dimensional submodules in the case where ∗ is
ramified and h is skew hermitian.
Lemma 5. Suppose that A is complete and that ∗ is ramified. Suppose also that h is skew
hermitian and that h(u, v) ∈ U(A). Then there is some symplectic pair (u′, v′) ∈ V 2 such
that Au′ + Av′ = Au + Av.
Proof. By replacing v by h(u, v)−1v we can assume that h(u, v) = 1. Now observe that for
b ∈ A, h(u + bv, u + bv) = 0 if and only if
(1)
b∗bh(v, v) + (b − b∗) + h(u, u) = 0
Since both h(v, v) and h(u, u) belong to S we can apply Lemma 6 (below) to conclude that
Equation (1) has a solution in r. So assume that b ∈ r satisfies (1) and let u′ = u + bv.
Clearly, Au + Av = Au′ + Av. Moreover, h(u′, v) = 1 + b∗h(v, v) ∈ U(A). Now, let v′ =
h(u′, v)−1(v + 1
2h(v, v)(h(u′, v)∗)−1u′). A straightforward calculation, using h(u′, u′) = 0,
demonstrates that (u′, v′) is a symplectic pair. Moreover, since h(u′, v) is a unit, it is clear
that Au′ + Av′ = Au′ + Av = Au + Av.
(cid:3)
To complete the proof of Lemma 5 we need the following.
Lemma 6. Suppose that A is complete and that ∗ is ramified. Given α, β, γ ∈ A satisfying
α, γ ∈ S and β ∈ U(A), there is some t ∈ Aγ such that
αt∗t + βt − t∗β ∗ + γ = 0.
6
JAMES CRUICKSHANK, RACHEL QUINLAN, AND FERNANDO SZECHTMAN
Proof. We define sequences (βi) and (γi) as follows. Let γ1 = γ and β1 = β. Given βi and
γi, let
γi+1 = −
βi+1 = βi +
,
αγ2
i
4β ∗
i βi
αγi
2β ∗
i
.
Observe that βi+1 is a unit since βi+1 ≡ βi mod r. Also γi+1 is skew hermitian, since
α and γi (inductively) are both skew hermitian. Now we check that − 1
i=1 γi/βi is the
required solution. Define fi(t) = αt∗t + βit − t∗β ∗
i + γi. Using the fact that γi is skew
hermitian, an easy calculation shows that fi(t − γi/2βi) = fi+1(t). Therefore fk+1(0) =
fk(−γk/2βk) = fk−1(−γk/2βk−γk−1/2βk−1) = · · · = f1(− 1
i=1 γi/βi). Now fk+1(0) = γk.
Since γ1 ∈ r, it is clear that γk ∈ rk for all k. Therefore f1(− 1
i=1 γi/βi) ∈ rk as
required.
2 P∞
2 Pk
(cid:3)
2 Pk
The following example shows that if A is not complete it may be possible to find a
nondegenerate rank two skew hermitian submodule that does not have a symplectic basis.
Example 1. Fix an odd prime p such that p + 1 is not the sum of two squares (e.g.
p = 5) and let A be the extension of R = Z(p) obtained by adjoining a square root of p.
So A = R ⊕ R√p is a local principal ideal domain with maximal ideal A√p. Let ∗
be the involution of A that fixes elements of R and maps √p to −√p and consider the
nondegenerate skew hermitian form hM where M = (cid:18)√p
−1 √p(cid:19). We claim that there is
no isotropic basis vector of A2 . Suppose that (cid:18)
a + b√p(cid:19) was such an vector (a similar
argument applies to the case (cid:18)a + b√p
(cid:19)). A straightforward calculation shows that we
must have pb2 − 2b− 1 = a2. Writing b = c
d for integers c and d, we see that pc2 − 2cd − d2
must be the square of an integer. But pc2 − 2cd − d2 = (p + 1)c2 − (d + c)2, so (p + 1)c2 is
the sum of two squares. By assumption, p + 1 is not the sum of two squares, so neither is
(p + 1)c2 for any integer c.
1
1
1
4. Nondegenerate forms
We set V (−1) = 0 and
V (i) = {v ∈ V : h(V, v) ⊂ r
i},
i ≥ 0.
Observe that V (i) is an A-submodule of V , V (i + 1) ⊂ V (i) and rV (i − 1) ⊂ V (i) for all
ri = 0 then Ti≥0 V (i) = {v ∈ V h(v, V ) = 0} is
i ≥ 0. We note in passing that, if Ti≥0
the radical of h. Now, since rV (i) ⊂ V (i + 1), we see that
inherits a A/r-vector space structure. The form h induces a map
W (i) = V (i)/(rV (i − 1) + V (i + 1))
hi : W (i) × W (i) → r
i/r
i+1.
HERMITIAN AND SKEW HERMITIAN FORMS OVER LOCAL RINGS
7
In the special case i = 0, we see that h0 is an ε-hermitian form V /V (1) × V /V (1) → A/r.
Observe that h is nondegenerate if and only if h0 is nondegenerate.
Lemma 7. Suppose that h is nondegenerate. Then V (i) = riV for all i ≥ 0.
Proof. The inclusion riV ⊂ V (i) is clear. For the reverse inclusion, let v ∈ V (i) and let
{v1, . . . , vm} be a basis of V , so that v = a1v1 + · · · + amvm for some ai ∈ A. Since h is
nondegenerate, given any 1 ≤ j ≤ m, there is u ∈ V such that h(u, vj) = 1 and h(u, vk) = 0
for all k 6= j. It follows that h(u, v) = aj, whence aj ∈ ri and a fortiori v ∈ riV .
Theorem 1. Suppose that h is nondegenerate.
(cid:3)
diagonal.
(1) If ∗ is unramified or if h is hermitian then V has a basis whose Gram matrix is
(2) If ∗ is ramified and h is skew hermitian then V has a basis whose Gram matrix is
the direct sum of m/2 matrices, each of which is an invertible 2× 2 skew hermitian
matrix.
Proof. Since h is nondegenerate the Gram matrix of a basis is invertible. Since A is local
some entry of this Gram matrix must be a unit. Therefore there exist vectors u, v such
that h(u, v) ∈ U(A). The results of Section 2 show that in the ramified skew hermitian
case there is a nondegenerate rank two submodule of V and that in all other cases there is
a nondegenerate rank one submodule. Moreover, if U is this rank one or two submodule
then by Lemma 1 or Lemma 2, V = U ⊕ U ⊥ and U ⊥ is a free submodule of V . Now, it
is clear that hU ⊥ is also nondegenerate. The required conclusions follow by induction on
the rank of V .
(cid:3)
Theorem 2. Suppose that A is complete and let h and h′ be nondegenerate ε-hermitian
forms on V . Then h and h′ are equivalent if and only if h0 and h′
0 are equivalent. In
particular, if ∗ is ramified and h and h′ are skew hermitian, then h and h′ are equivalent.
Theorem 2 (Matrix version). Suppose that A is complete and let C, D ∈ GLm(A). Then
C and D are ∗-congruent if and only C and D are ∗-congruent over A/r. In particular, if
∗ is ramified and C and D are skew hermitian, then C and D are ∗-congruent.
Proof. The only if direction is obvious. For the other direction suppose that C and D
are ∗-congruent. So there is some matrix X ∈ Mm(A) such that X ∈ GLm(A/r) and
X ′∗CX ≡ D mod r. Since A is local, X ∈ GLm(A) and C is ∗-congruent to X ′∗CX. So
replacing C by X ′∗CX we can, without loss of generality, reduce to the case that C ≡ D
mod r. Equivalently, we may assume without loss of generality that h(u, v) ≡ h′(u, v)
mod r for all u, v ∈ V .
Now we deal with the case where ∗ is ramified and h is skew hermitian. In this case,
Lemma 5 implies that V has symplectic bases relative to h and h′, whence they are equiv-
alent.
In all other cases, Lemmas 1 and 3 ensure the existence of a basis v1,· · · , vm of V
whose corresponding Gram matrix relative to h, say M, is diagonal with only units on
the diagonal. By Corollary 1 there is some w1 ∈ Av1 such that h′(w1, w1) = h(v1, v1).
8
JAMES CRUICKSHANK, RACHEL QUINLAN, AND FERNANDO SZECHTMAN
Moreover, it is clear that, for j ≥ 2, h′(w1, vj) ≡ h′(v1, vj) ≡ h(v1, vj) ≡ 0 mod r. For
j ≥ 2, let wj = vj − h′(w1, vj)h′(w1, w1)−1w1. Now w1,· · · , wm is a basis of V whose Gram
matrix with respect to h′ is of the form
(cid:18)M11
Moreover N ≡ diag(M22,· · · , Mmm) mod r.
Inductively, we may assume that there is
some X ∈ GLm−1(A) such that X ′∗NX = diag(M22,· · · , Mmm). It follows that there is
a basis of V whose Gram matrix with respect to h′ is equal to M. Note that Corollary 1
provides the base case of the induction.
(cid:3)
0 N(cid:19) .
0
We list some noteworthy corollaries and special cases of Theorem 2.
Proposition 1. If A is complete, ∗ is ramified and h is skew hermitian and nondegenerate,
then V has a symplectic basis.
(cid:3)
We have a canonical imbedding R/m ֒→ A/r and we will view R/m as a subfield of A/r by
means of this imbedding. If ∗ is ramified then R/m = A/r. Suppose ∗ is unramified. Then
R/m is the fixed field of an automorphism of A/r of order 2. If A/r is quadratically closed
(in the sense that it has no extensions of degree 2), then by the Diller-Dress theorem (see
[10], p. 235), R/m is a Euclidean field (this is an ordered field wherein every nonnegative
element is a square).
Proposition 2. Suppose that A is complete and that A/r is quadratically closed. If ∗ is
unramified and h is a nondegenerate hermitian form then V has a basis whose Gram matrix
is diagonal and such that all the diagonal entries are ±1. Moreover, given any two such
bases, the signatures of the corresponding Gram matrices are the same.
Proof. By Theorem 2 it suffices to prove this result in the case that A is a field (i.e. r = 0).
By our above remarks, A is the quadratic extension of a Euclidean field. The result in this
case goes exactly as in a classical case when A = C.
(cid:3)
Similarly we have
Proposition 3. Suppose that A is complete and that A/r is quadratically closed. If ∗ is
unramified and h is a nondegenerate skew hermitian form then, given b ∈ U(A) ∩ S, V
has a basis whose Gram matrix is diagonal and such that all the diagonal entries are ±b.
Moreover, given any two such bases, the number of occurrences of b are the same in each
of the corresponding Gram matrices.
Proof. Apply the previous proposition to the hermitian form b−1h.
Proposition 4. Suppose that A is complete and that A/r is quadratically closed. If ∗ is
ramified and h is a nondegenerate hermitian form then V has an orthonormal basis.
(cid:3)
Proof. This follows by combining Theorem 2 with the classical result that every nonde-
generate symmetric form over a quadratically closed field of characteristic not 2 has an
orthonormal basis.
(cid:3)
HERMITIAN AND SKEW HERMITIAN FORMS OVER LOCAL RINGS
9
For the remainder of the paper A will be a discrete valuation ring, that is, a local
5. Discrete Valuation Rings
principal ideal domain. A uniformiser of A is a generator of the maximal ideal.
Lemma 8. If ∗ is a nontrivial involution of A then A has a uniformiser y such that
y∗ = −y.
Proof. Suppose that r = Az. Now z = 1
2 (z − z∗) and since A is local, at least
one of 1
2(z − z∗) must lie in r − r2. So we can certainly choose some w such
that w∗ = ±w and r = Aw. Suppose that w∗ = w. Since ∗ is nontrivial there is some
nonzero u ∈ A such that u∗ = −u. Now u = bwk for some b ∈ U(A) and since w∗ = w, we
conclude that b∗ = −b. Now y = bw is the required generator of r.
2(z + z∗) or 1
2(z + z∗) + 1
(cid:3)
Following the previous lemma we fix y so that Ay = r and so that y∗ = −y in the case
Following O'Meara [14] we say that an ε-hermitian matrix M ∈ Mm(A) has an O'Meara
that ∗ is a nontrivial involution. We agree that y∞ = 0.
decomposition if
M =
s
Mi=0
aiMi,
where each ai ∈ A and every Mi is an invertible hermitian or skew hermitian matrix.
Our next result is an extension of Theorem 1 to arbitrary forms, possibly degenerate,
and establishes the existence of an O'Meara decomposition for the Gram matrices of such
forms.
Theorem 3.
(1) If ∗ is unramified then V has a basis whose Gram matrix is diagonal.
(2) If ∗ is ramified then V has a basis whose Gram matrix is the direct sum of a diagonal
matrix (possibly of size zero) and a number (possibly zero) of 2 × 2 blocks each of
the form ydB where B is an invertible skew hermitian 2 × 2 matrix.
Proof. We prove this by induction on the rank of V . If h is identically zero then the theorem
is true. Now suppose that h is not identically zero. Let d = min{j : h(V, V ) ⊂ rj}. Since A
is a domain there is a unique form h′ on V such that h = ydh′. Clearly h′ is ε-hermitian if
y∗ = y and is (−1)dε-hermitian if y∗ = −y. Moreover, by construction, there exist u, v ∈ V
such that h′(u, v) ∈ U(A).
If h′ is skew hermitian and ∗ is ramified then, by Lemma 2 there is some nondegenerate
rank two submodule U such that V = U ⊥ U ⊥. If h′ is hermitian or if ∗ is unramified
then, by Lemma 1 and Lemma 3 there is some nondegenerate rank one submodule U such
that V = U ⊥ U ⊥.
In either case U has an O'Meara decomposition of the required form with respect to h′
and by induction U ⊥ has an O'Meara decomposition of the required form with respect to
h′. Together these yield the required decomposition for h.
(cid:3)
Next we consider the structure of the space W (i) in more detail. By Theorem 3 we have
(2)
V = U0 ⊥ U1 ⊥ U2 ⊥ · · ·· · · ⊥ U∞
10
JAMES CRUICKSHANK, RACHEL QUINLAN, AND FERNANDO SZECHTMAN
where Ui = 0 for all but finitely many i and, for Ui 6= 0, the Gram matrix of a basis, say Bi,
of Ui is equal to yiMi with Mi invertible. Thus, if B is the union of all Bi then B is a basis
of V with Gram matrix
(3)
M = M0 ⊕ y1M1 ⊕ y2M2 ⊕ · · ·· · · ⊕ y∞M∞,
where almost all summands have size 0.
Lemma 9. For every nonnegative integer i, we have
V (i) = r
iU0 ⊥ r
i−1U1 ⊥ r
i−2U2 ⊥ · · · ⊥ Ui ⊥ Ui+1 ⊥ Ui+2 ⊥ · · · ⊥ U∞.
Proof. The operation of passing from V to V (i) is compatible with orthogonal decomposi-
tions, so the result follows immediately from Lemma 7 and the decomposition (2).
(cid:3)
Corollary 2. For every nonnegative integer i, we have dimA/r W (i) = rankA Ui.
Making use of the uniformiser y for A, we may alter the above map W (i)×W (i) → ri/ri+1
and define an A/r-valued form hi : W (i) × W (i) → A/r by
hi(u + rV (i − 1) + V (i + 1), v + rV (i − 1) + V (i + 1)) = y−ih(u, v) + r,
u, v ∈ V (i).
Note that hi is ε-hermitian if ∗ is trivial and is ε(−1)i-hermitian if ∗ is nontrivial.
Corollary 3. For every nonnegative integer i, the form hi is nondegenerate. In fact, the
Gram matrix of the basis Bi of W (i) relative to hi is Mi, which is invertible or has size 0.
It is clear that if h and h′ are equivalent forms on V , then hi and h′
i are equivalent over
A/r for i ≥ 0. The converse is, of course, not necessarily true (see Example 1).
Theorem 4. Suppose that A is complete and that h and h′ are ε-hermitian forms on V .
If, for each nonnegative integer i, the forms hi and h′
i are equivalent over A/r then h and
h′ are equivalent.
Proof. This is an immediate consequence of Theorem 2 (in its matrix version), Corollary 3
and the decomposition (3).
(cid:3)
We next obtain the following classification theorem for ∗-congruence classes of ε-hermitian
matrices
Theorem 5. Assume that A is complete.
(1) Suppose that M ∈ Mm(A) is ε-hermitian. Then M is ∗-congruent to a matrix of
i=0 yiMi, where for each Mi is either of size zero or is an invertible
the form L∞
matrix. Moreover, for 0 ≤ i < ∞,
(a) if ∗ is unramified then Mi is a diagonal matrix.
(b) if ∗ is ramified and (yi)∗ = εyi then Mi is diagonal. Whereas if ∗ is ramified
and (yi)∗ = −εyi then Mi is a direct sum of copies of (cid:18) 0
i=0 yiMi and N = L∞
(2) Given ε-hermitian matrices M = L∞
that each Mi (resp. Ni) is either of size zero or is an invertible matrix, then
1
−1 0(cid:19).
i=0 yiNi in Mm(A) such
HERMITIAN AND SKEW HERMITIAN FORMS OVER LOCAL RINGS
11
(a) if ∗ is unramified, M and N are ∗-congruent over A if and only if for each
0 ≤ i < ∞, Mi is ∗-congruent to Ni over A/r.
(b) if ∗ is ramified, M and N are ∗-congruent over A if and only if for each
0 ≤ i < ∞ such that (yi)∗ = εyi, Mi is ∗-congruent to Ni over A/r, and for
each 0 ≤ i < ∞ such that (yi)∗ = −εyi, the size of Mi is equal to the size
of Ni.
Proof. This follows immediately from Theorem 2, Theorem 3 and Lemma 5.
(cid:3)
Thus, for matrices over a complete discrete valuation ring with residue field of charac-
teristic not 2, the ∗-congruence problem essentially reduces to the ∗-congruence problem
over its residue field.
Example 2. (cf. Example 1.1 of [12]) Given any field F , consider the complete, local,
nonprincipal domain A = F [[X, Y ]] and the ∗-hermitian (with trivial ∗) matrix
M = (cid:18) 0 X
X Y (cid:19) .
We claim that M has no O'Meara decomposition. Suppose, to the contrary, that it does.
Since M is not invertible, then M must be ∗-congruent to a diagonal matrix D = diag(a, b).
Thus D = T ′MT for some T ∈ GL2(A). Taking determinants yields ab = −t2X 2, where
t ∈ U(A). Since (X) is a prime ideal, it follows that a ∈ (X) or b ∈ (X). Suppose, without
loss of generality, that a = cX for some c ∈ A. Cancelling, we obtain cb = −t2X.
If
b /∈ (X) then a repetition of the preceding argument yields that b ∈ U(A), against the fact
that the hermitian form h = hM takes no unit values. We are thus forced to conclude that
b = dX for some d ∈ A, which implies that c, d ∈ U(A). Now, since M is congruent to D,
there is u ∈ V = A2 such that h(u, u) = cX. Let e1, e2 be the canonical basis of V . Then
u = f e1 + ge2 for some f, g ∈ A, whence 2f gX + g2Y = cX, that is, g2Y = (c − 2f g)X.
We infer that g ∈ (X) and a fortiori c − 2f g ∈ U(A). Thus (c − 2f g)X ∈ (Y ) but neither
(c − 2f g) nor X are in (Y ), which contradicts the fact that (Y ) is a prime ideal.
The following proposition is not needed for the sequel. However, we include it to shed
light on the structure of the rings under consideration.
Proposition 5. Suppose ∗ is a nontrivial involution of A. Then R is a discrete valuation
ring and A = R[z] = R ⊕ Rz, where z∗ = −z and z2 = x ∈ R. Moreover, x ∈ U(R) if ∗ is
unramified and x ∈ m otherwise. In either case, x is not a square in R.
Proof. By Lemma 8 we can choose y ∈ S ∩ (r − r2).
Suppose first that S ⊂ r. Since m = r ∩ R, we know that if b ∈ m then b = cy for some
c ∈ A. Clearly, since b ∈ R and y ∈ S, we must have c ∈ S ⊂ r. Therefore c ∈ Ay and
we conclude that b ∈ Ry2. So in this case m = Ry2. Since 2 ∈ U(A), we have A = R ⊕ S.
If s ∈ S then sy ∈ r ∩ R = m, whence sy = ry2 for some r ∈ R, so s = ry and a fortiori
S = Ry. Moreover, in this case, let x = y2 and observe that x cannot be a square of any
element of R.
12
JAMES CRUICKSHANK, RACHEL QUINLAN, AND FERNANDO SZECHTMAN
On the other hand, if S 6⊂ r then we may choose w ∈ U(A) such that w∗ = −w. Then
z = wy ∈ R ∩ (r − r2) and it is clear that m = Rz in this case. If t ∈ S then tw−1 ∈ R,
so t ∈ Rw, which gives S = Rw. Now let x = w2 ∈ R and once again, one readily checks
that x is not a square in R.
In both cases R is a local domain with principal maximal ideal, so every ideal is principal.
(cid:3)
6. Invariants and normal forms
We are finally in a position to show that, after imposing additional hypotheses, the
sequence di = dimA/r W (i), i ≥ 0, is a complete set of invariants for equivalence classes of
ε-hermitian forms.
Let B stand for the fixed field of the involution that ∗ induces on A/r. Then B = A/r if
∗ is ramified and B = R/m (viewed as a subfield of A/r) if ∗ is unramified. In either case,
we have a norm map N : A/r → B given by a + r → aa∗ + r. One of the aforementioned
hypotheses is that N be surjective.
Theorem 6. Suppose that A is complete and N is surjective. Let V and V ′ be free A-
modules, both of rank m, and let h : V × V → A and h : V ′ × V ′ → A be ε-hermitian
forms. Then h and h′ are equivalent if and only if di = d′
Proof. This follows from Corollary 3 and Theorem 4 using the fact that N is surjective. (cid:3)
i for all i ≥ 0.
We may use Theorem 6 to obtain normal forms for ε-hermitian matrices.
Theorem 7. Suppose that A is complete and N is surjective.
∗-congruent to one and only one matrix of the form L∞
size > 0 is equal to the direct sum of copies of (cid:18) 0
1
matrix).
1
and equal to the identity matrix if i is odd (resp. even).
is ∗-congruent to one and only one matrix of the form L∞
of size > 0 is equal to the direct sum of copies of (cid:18) 0
(1) If ∗ is nontrivial, let M ∈ Mm(A) be skew hermitian (resp. hermitian). Then M
i=0 yiMi, where every Mi
−1 0(cid:19) if i is even (resp. odd)
(2) If ∗ is trivial, let M ∈ Mm(A) be skew symmetric (resp. symmetric). Then M is
i=0 yiMi, where every Mi of
−1 0(cid:19) (resp. equal to the identity
Recall that two matrices M, N ∈ Mm(A) are said to be equivalent if P MQ = N for
some P, Q ∈ GLm(A). Assuming that A is complete and N is surjective, we may use
Corollary 3 and Theorem 4 to see that the problem of ∗-congruence of matrices reduces to
the problem of equivalence of matrices, whose answer is well-known. Since every invertible
matrix is equivalent to the identity matrix, we have
Theorem 8. Suppose A is complete and N is surjective. Then two ε-hermitian matrices
M, N ∈ Mm(A) are ∗-congruent if and only if they have the same invariant factors.
HERMITIAN AND SKEW HERMITIAN FORMS OVER LOCAL RINGS
13
What are the possible invariant factors of an ε-hermitian matrix? By above this amounts
to asking what are the sequences that arise as (di)i≥0 for some ε-hermitian form. Let us
call such sequences ε-realisable. The answer is an immediate consequence of Theorem 7.
Proposition 6. Suppose that A is complete and N is surjective. Let (di) be a sequence of
nonnegative integers.
(1) If ∗ is trivial and ε = 1 then (di) is ε-realisable.
(2) If ∗ is trivial and ε = −1 then (di) is ε-realisable if and only if di is even for all i.
(3) If ∗ nontrivial, then (di) is ε-realisable if and only if di is even for i such that
(−1)i = −ε.
The analogue of Theorem 7 in the case when ∗ is unramified and A/r is assumed to be
quadratically closed is an immediate consequence of Proposition 2 and Theorem 5.
Theorem 9. Suppose that A is complete with quadratically closed residue field. Assume
that ∗ is unramified and fix b ∈ S ∩ U(A). Let M ∈ Mm(A) be hermitian (resp. skew
hermitian). Then M is ∗-congruent to one and only one matrix of the form L∞
i=0 yiMi,
where every Mi of size > 0 is equal to a diagonal matrix diag(1, . . . , 1,−1, . . . ,−1) (resp.
diag(b, . . . , b,−b, . . . ,−b)).
References
[1] Eva Bayer-Fluckiger and Laura Fainsilber, Non-unimodular Hermitian forms, Invent. Math. 123
(1996), no. 2, 233–240, DOI 10.1007/s002220050024. MR1374198
[2] Eva Bayer-Fluckiger, Uriya A. First, and Daniel A. Moldovan, Hermitian categories, extension
of scalars and systems of sesquilinear forms, Pacific J. Math. 270 (2014), no. 1, 1–26, DOI
10.2140/pjm.2014.270.1. MR3245846
[3] Eva Bayer-Fluckiger and Daniel Arnold Moldovan, Sesquilinear forms over rings with involution, J.
Pure Appl. Algebra 218 (2014), no. 3, 417–423, DOI 10.1016/j.jpaa.2013.06.012. MR3124208
[4] Yonglin Cao and Fernando Szechtman, Congruence of symmetric matrices over local rings, Linear
Algebra Appl. 431 (2009), no. 9, 1687–1690, DOI 10.1016/j.laa.2009.06.003. MR2555069
[5] I.S. Cohen, On the structure and ideal theory of complete local rings, Transactions of the American
Mathematical Society 59 (1946), no. 1, 54-106.
[6] Dragomir Z. ¯Dokovi´c and Fernando Szechtman, Solution of the congruence problem for arbitrary
Hermitian and skew-Hermitian matrices over polynomial rings, Math. Res. Lett. 10 (2003), no. 1,
1–10, DOI 10.4310/MRL.2003.v10.n1.a1. MR1960118
[7] William H. Durfee, Congruence of quadratic forms over valuation rings, Duke Math. J. 11 (1944),
687–697. MR0011073
[8] Ronald Jacobowitz, Hermitian forms over local fields, Amer. J. Math. 84 (1962), 441–465, DOI
10.2307/2372982. MR0150128
[9] Max-Albert Knus, Quadratic and Hermitian forms over rings, Grundlehren der Mathematischen Wis-
senschaften [Fundamental Principles of Mathematical Sciences], vol. 294, Springer-Verlag, Berlin,
1991. With a foreword by I. Bertuccioni. MR1096299
[10] T.Y. Lam, Introduction to Quadratic Forms over Fields, Graduate Studies in Mathematics, vol. 67,
American Mathematical Society, Providence, RI, 2005.
[11] Serge Lang, Algebra, 2nd ed., Addison-Wesley Publishing Company, Advanced Book Program, Read-
ing, MA, 1984. MR783636
[12] V. Levchuk and O. Starikova, Quadratic forms of projective spaces over rings, Sb. Math. 197 (2006),
887-899.
14
JAMES CRUICKSHANK, RACHEL QUINLAN, AND FERNANDO SZECHTMAN
[13] V. Levchuk and Starikova O., A normal form and schemes of quadratic forms, J. Math. Sci. 152
(2008), 558-570.
[14] O. T. O'Meara, Quadratic forms over local fields, Amer. J. Math. 77 (1955), 87–116, DOI
10.2307/2372423. MR0067163
School of Mathematics, Statistics and Applied Mathematics, National University of
Ireland Galway, Ireland
E-mail address: [email protected]
School of Mathematics, Statistics and Applied Mathematics, National University of
Ireland Galway, Ireland
E-mail address: [email protected]
Department of Mathematics and Statistics, University of Regina, Canada
E-mail address: [email protected]
|
1109.5062 | 1 | 1109 | 2011-09-23T13:01:30 | Invertible unital bimodules over rings with local units, and related exact sequences of groups II | [
"math.RA",
"math.CT"
] | Let $R$ be a ring with a set of local units, and a homomorphism of groups $\underline{\Theta} : \G \to \Picar{R}$ to the Picard group of $R$. We study under which conditions $\underline{\Theta}$ is determined by a factor map, and, henceforth, it defines a generalized crossed product with a same set of local units. Given a ring extension $R \subseteq S$ with the same set of local units and assuming that $\underline{\Theta}$ is induced by a homomorphism of groups $\G \to \Inv{R}{S}$ to the group of all invertible $R$-sub-bimodules of $S$, then we construct an analogue of the Chase-Harrison-Rosenberg seven terms exact sequence of groups attached to the triple $(R \subseteq S, \underline{\Theta})$, which involves the first, the second and the third cohomology groups of $\G$ with coefficients in the group of all $R$-bilinear automorphisms of $R$. Our approach generalizes the works by Kanzaki and Miyashita in the unital case. | math.RA | math |
Invertible unital bimodules over rings with local units, and
related exact sequences of groups, II ∗
L. El Kaoutit
Departamento de Álgebra
Facultad de Educación y Humanidades
Universidad de Granada
El Greco N0 10, E-51002 Ceuta, España
e-mail:[email protected]
J. Gómez-Torrecillas
Departamento de Álgebra
Facultad de Ciencias
Universidad de Granada
E18071 Granada, España
e-mail: [email protected]
Abstract
Let R be a ring with a set of local units, and a homomorphism of groups Θ : G →
Pic(R) to the Picard group of R. We study under which conditions Θ is determined
by a factor map, and, henceforth, it defines a generalized crossed product with a same
set of local units. Given a ring extension R ⊆ S with the same set of local units and
assuming that Θ is induced by a homomorphism of groups G → InvR(S) to the group of
all invertible R-sub-bimodules of S, then we construct an analogue of the Chase-Harrison-
Rosenberg seven terms exact sequence of groups attached to the triple (R ⊆ S, Θ), which
involves the first, the second and the third cohomology groups of G with coefficients in
the group of all R-bilinear automorphisms of R. Our approach generalizes the works by
Kanzaki and Miyashita in the unital case.
Introduction
For a Galois extension R/k of commutative rings with identity and finite Galois group G,
Chase, Harrison and Rosenberg, gave in [5, Corollary 5.5] (see also [6]) the following seven
terms exact sequence of groups
1 → H 1(G, U (R)) → Pick(k) → PicR(R)G → H 2(G, U (R)) → B(R/k)
→ H 1(G, PicR(R)) → H 3(G, U (R)),
where for a ring A with identity, PicA(A) = {[P ] ∈ Pic(A) ap = pa, ∀ a ∈ A, p ∈ P } is a
subgroup of the Picard group Pic(A), and U (A) the group of units. The group B(R/k) is the
Brauer group of Azumaya k-algebras split by R, and the other terms are the usual cohomology
groups of G with coefficients in abelian groups. As one can realize, the case of finite Galois
extension of fields reduces to fundamental theorems in Galois cohomology of fields extensions,
namely, the Hilbert's 90 Theorem, and the isomorphism of the Brauer group of a field with
the second cohomology group.
∗Research supported by the grant MTM2010-20940-C02-01 from the Ministerio de Ciencia e Innovación
and from FEDER
1
The construction of this sequence of groups, as was given in [5, 6], is ultimately based
on the consideration of a certain spectral sequence already introduced by Grothendieck, and
the generalized Amitsur cohomology. The same sequence was also constructed after that by
Kanzaki [13, Theorem, p.187], using only elementary methods that employ the novel notion of
generalized crossed products. This notion has been the key success which allowed Miyashita
to extend in [15, Theorem 2.12] the above framework to the context of a noncommutative
unital ring extension R ⊆ S with a homomorphism of groups to the group of all invertible
sub-R-bimodules of S. In this setting the seven terms exact sequence takes of course a slightly
different form, although the first, the fourth and the last terms remain the cohomology groups
of the acting group with coefficients in the group of units of the base ring. The commutative
Galois case is then recovered by first considering a tower k ⊆ R ⊆ S, where k ⊆ R is a finite
Galois extension and S is a fixed crossed product constructed from the Galois group; secondly
by considering the homomorphism of groups which sends any element in the Galois group to
it corresponding homogeneous component of S (components which belong to the group of all
invertible sub-R-bimodules of S).
In this paper we construct an analogue of the above seven terms exact sequence in the
context of rings with local units (see the definition below). The most common class of examples
are the rings with enough orthogonal idempotents or Gabriel's rings which are defined from
small additive categories. It is noteworthy that up to our knowledge there is no satisfactory
notion in the literature of morphism of rings with local units that could be, for instance,
extracted from a given additive functor between additive small categories. Here we restrict
ourselves to the naive case of extensions of the form R ⊆ S which have the same set of local
units. This at least includes the situation where two small additive categories have the same
set of objects and differ only in the size of the sets of morphisms, as it frequently happens in
the theory of localization in abelian categories. Our methods are inspired from Miyashita's
work [15] and use the results of our earlier work [9]. The present paper is in fact a continuation
of [9]. It is worth noticing that, although the steps for constructing the seven terms sequence
in our context are slightly parallel to [15], this construction is not an easy task since it has its
own challenges and difficulties.
The paper is organized as follows.
In Section 1 we give some preliminary results on
similar and invertible unital bimodules. Most of results on similar unital bimodules are in
fact the non unital version of [11, 12], except perhaps the construction of the twisting natural
transformations and its weak associativity (Proposition 1.3 and Lemma 1.4). The generalized
crossed product is introduced in Section 2, where we also give useful constructions on the
normalized 2 and 3-cocycles with coefficient in the unit group of the base ring. Section 3 is
devoted to the construction of an abelian group whose elements consist of isomorphic classes
of generalized crossed products. We show that it contains a subgroup which is isomorphic
to the 2-cohomology group (Proposition 3.2). Our main results is contained in Section 4,
which contains a number of exact sequences of groups that culminate in the seven terms exact
sequence that generalizes Chase-Harrison-Rosenberg's one (Theorem 4.12 ).
Notations and basic notions:
In this paper ring means an associative and not necessarily unital ring. We denote by Z(R)
(resp. Z(G)) the center of a ring R (resp. of a group G), and if R is unital we will denote by
U (R) the unit group of R, that is, the set of all invertible elements of R.
Let R be a ring and E ⊂ R a set of idempotent elements; R is said to be a ring with set of
local units E, provided that for every finite subset {r1, · · · , rn} ⊂ R, there exists e ∈ E such
2
that
e ri = ri e = ri,
for every i = 1, · · · , n,
In this way, given a finite set {r1, · · · , rn} of elements in R, we denote
U nit{r1, · · · , rn} = ne ∈ E eri = rie = ri,
for every i = 1, 2, · · · , no .
Observe that our definition differs from that in [1, Definition 1.1], since we do not assume
that the idempotents of E commute. In fact, our rings generalize those of [1] since, when the
idempotents are commuting, it is enough to require that for each element r ∈ R there exists
e ∈ E such that er = re = r (see [1, Lemma 1.2]). The Rees matrix rings considered in [2],
are for instance, rings with a set of local units with noncommuting idempotents.
Let R be a ring with a set of local units E. A right R-module X is said to be unital
provided one of the following equivalent conditions holds
(i) X ⊗R R ∼= X via the right R-action of X,
(ii) XR := {Pf inite xiri ri ∈ R, xi ∈ X} = X,
(iii) for every element x ∈ X, there exists an element e ∈ E such that xe = x.
Left unital R-modules are analogously defined. Obviously any right R-module X contains
XR as the largest right unital R-submodule.
Let R and S be rings with a fixed set of local units, respectively, E and E′. In the sequel,
an extension of rings φ : (R, E) → (S, E′) with the same set of local units, stand for an additive
and multiplicative map φ which satisfies φ(E) = E′. Note that since R and S have the same
set of local units, any right (resp. left) unital S-module can be considered as right (resp. left)
unital R-module by restricting scalars. Furthermore, for any right S-module X, we have the
equality XR = XS.
1 Similar and invertible unital bimodules.
Let R be a ring with a set of local units E. In the first part of this section we give some prelim-
inary results on unital R-bimodules, which we will use frequently in the sequel. Most of them
were already formulated by K. Hirata in [11] and [12] when R is unital. For the convenience
of the reader we will give in our case complete proofs. The second part provides a relation
between the automorphism group of an invertible unital R -- bimodule and the automorphisms
of the base ring R. This result will be also used in the forthcoming sections.
A unital R-bimodule is an R-bimodule which is left and right unital. In the sequel, the
expression R-bilinear map means homomorphism of R-bimodules. Note that if M is a unital
R-bimodule, then for every element m ∈ M, there exists a two sided unit e for m. That is,
there exists e ∈ E such that m = me = em, see [7, p. 733].
If several R-bimodules are
handled, say M, N, P with a finite number of elements {mi, ni, pi}i, mi ∈ M, ni ∈ N, pi ∈ P ,
then we denote by U nit{mi, ni, pi} the set of common two sided units of the mi's, ni's and
the pi's. This means, that e ∈ U nit{mi, ni, pi} ⊆ E if and only if
emi = mi = mie, eni = ni = nie, epi = pi = pie,
for every i = 1, · · · , n.
3
Given a unital R-bimodule M, we denote its invariant sub-bimodule, that is, the set of all
R-bilinear maps from R to M, by
M R := HomR−R(R, M ).
It is canonically a module over the commutative ring of all R-bimodule endomorphisms Z :=
EndR−R(R). The Z-action is given as follows: for every z ∈ Z and f ∈ M R, we have
z.f : RRR → RMR,(cid:16)r 7→ f (z(r)) = z(e)f (r) = f (r)z(e), where e ∈ U nit{r}(cid:17) .
Lemma 1.1. Let R be a ring with local units and M a unital R-bimodule such that M
that is, M is isomorphic as an R-bimodule to a direct summand of direct sum of n copies of
R. Then
/ R(n) ,
⊕
(i) M R is a finitely generated and projective Z-module;
(ii) there is an isomorphism of R-bimodules
M ∼= R ⊗Z M R,
where the R-bimodule structure of the right hand term is induced by that of R. That is,
r(s ⊗Z f )t = (rst) ⊗Z f,
(s ⊗Z f ∈ R ⊗Z M R, r, t ∈ R).
Proof. Let us consider the following canonical R-bimodule homomorphisms:
ϕi : M
ι
/ R(n)
πi
/ R,
ψi : R
ιi
/ R(n)
π /
/ M,
i = 1, · · · , n,
where πi and ιi are the canonical projections and injections.
(i) It is clear that {(ψi, ψ∗
i is defined by the right composition with ϕi, that is, ψ∗
i )}i ∈ M R × HomZ (M R, Z) is a finite dual Z-basis for M R,
i (f ) = ϕi ◦ f , for every
where each ψ∗
f ∈ M R.
(ii) We know that there is a well defined R-bilinear map
R ⊗Z M R
r ⊗Z f
η
/ M
/ f (r).
We can easily show that
η−1
M
m
is actually the inverse map of η.
/ R ⊗Z M R
i ϕi(m) ⊗Z ψi,
/ Pn
We will follow Miyashita's notation concerning this class of R-bimodules. That is, if we
have an R-bimodule M which is a direct summand as a bimodule of finitely many copies of
another R-bimodule N, we shall denote this situation by M N. It is clear that this relation
is reflexive and transitive. Furthermore, it is compatible with the tensor product over R, in
the sense that we have M ⊗R QN ⊗R Q and Q ⊗R M Q ⊗R N, for every unital R-bimodule
Q, whenever M N. In this way, we set
M ∼ N,
if and only if, M N and N M,
(1)
and call M is similar to N. This in fact defines an equivalence relation which is, in the above
sense, compatible with the tensor product over R.
4
/
/
/
/
/
/
/
/
/
Lemma 1.2. Let R be a ring with local units and M , N are unital R-bimodules such that
M R and N R as bimodules. Then
(i) for every finitely generated and projective Z-module P , we have an isomorphism of Z-
modules
(R ⊗Z P )R ∼= P ;
(ii) there is a natural (on both components) Z-linear isomorphism
(M ⊗R N )R ∼= M R ⊗Z N R.
Proof. (i) Let {(pi, p∗
define a finite family of elements in Z:
i )}1≤i≤n be a dual Z-basis for P . Given an element f ∈ (R ⊗Z P )R, we
zf, i
:= (R ⊗Z p∗
i ) ◦ f : R → R ⊗Z P → R ⊗Z Z ∼= R.
Now, an easy computation shows that the following maps are mutually inverse
P
p
/ (R ⊗Z P )R
/ hr 7−→ r ⊗Z pi ,
(R ⊗Z P )R
f
/ P
i zf, i pi,
/ Pn
which gives the stated isomorphism.
(ii) By Lemma 1.1(ii) we know that
Therefore, we have
M ∼= R ⊗Z M R and N ∼= R ⊗Z N R.
M ⊗R N ∼= R ⊗Z (cid:16)M R ⊗Z N R(cid:17) .
Since by Lemma 1.1(i), M R ⊗Z N R is a finitely generated and projective Z-module, we obtain
the desired isomorphism by applying item (i) just proved above.
Keep the notations of the first paragraph in the proof of Lemma 1.1.
Proposition 1.3. Let R be a ring with local units and M , N are unital R-bimodules such
that M R and N R as bimodules. Then there is a natural R-bilinear isomorphism M ⊗R N ∼=
N ⊗R M given explicitly by
TM,N : M ⊗R N
x ⊗R y
∼=
where e ∈ U nit{x, y}.
/ N ⊗R M
i ϕi(x) y ⊗R ψi(e),
/ Pn
Proof. By Lemmata 1.1 and 1.2, we have the following chain of R-bilinear isomorphisms
M ⊗R N
∼= /
/ R ⊗Z M R ⊗Z N R
∼= /
/ R ⊗Z N R ⊗Z M R
∼= /
/ N ⊗R (R ⊗Z M R)
∼= /
/ N ⊗R M.
Writing down explicitly the composition of these isomorphisms, we obtain the stated one.
5
/
/
/
/
/
/
The natural transformation T−,− is associative in the following sense.
Lemma 1.4. Let R be ring with a local units. Consider X, Y, P, Q, U, V unital R-bimodules
which satisfy QR, (Y ⊗R V )R, (X ⊗R U )R and (P ⊗R Y )R, all as bimodules. Then the
following diagram is commutative:
X ⊗R U ⊗R P ⊗R Y ⊗R V ⊗R Q
X⊗U ⊗P ⊗TY ⊗V, Q
X ⊗R U ⊗R P ⊗R Q ⊗R Y ⊗R V
TX⊗U, P ⊗Y ⊗V ⊗Q
TX⊗U, P ⊗Q⊗Y ⊗V
P ⊗R Y ⊗R X ⊗R U ⊗R V ⊗R Q
P ⊗TY ⊗X⊗U ⊗V, Q
/ P ⊗R Q ⊗R Y ⊗R X ⊗R U ⊗R V.
Proof. Straightforward.
Recall form [9, p. 227] that a unital R-bimodule X is said to be invertible if there exists
another unital R-bimodule Y with two R-bilinear isomorphisms
X ⊗R Y
l
∼=
/ R
r
∼=
Y ⊗R X.
As was shown in [9], one can choose the isomorphisms l, r such that
X ⊗R r = l ⊗R X,
Y ⊗R l = r ⊗R Y.
In others words, such that (l, r−1) is a Morita context from R to R.
In this way, Y is
isomorphic as an R-bimodule to the right unital part X ∗R of the right dual R-module
X ∗ = Hom−R(X, R) of X. This isomorphism is explicitly given by
∼=−→ X ∗R, (cid:16)y 7−→ [x 7→ r(y ⊗ x)](cid:17) .
Y
It is worth mentioning that X is not necessarily finitely generated as right unital R-module;
but a direct limit of finitely generated and projective right unital R-modules.
Given e ∈ E consider its decomposition with respect to the invertible unital R-bimodule
X, that is,
e = X
(e)
xeye,
(i.e. e = X
(e)
l(xe ⊗R ye)).
It is clear that the xe's and the ye's can be chosen such that
exe = xe, and ye = yee,
which means that e is a right unit for the ye's and left unit for the xe's.
Remark 1.5. It is noteworthy that a two sided unit of the set of elements {xe, ye} do not
need in general to coincide with e. However, any two sided unit e1 ∈ U nit{xe, ye} is also a
unit for e. In other words, the elements e and P(e) xe e ye belong to the same unital ring eRe,
but they are not necessarily equal. This makes a difference in technical difficulties compared
with the case of unital rings.
The following lemma gives explicitly the relation between the automorphisms group of uni-
tal invertible R-bimodule and the unit group of the commutative unital ring Z = EndR−R(R).
6
/
/
/
/
o
o
Lemma 1.6. Let R be a ring with local units and X an invertible unital R-bimodule. Then
there is an isomorphism of groups, from the group of R-bilinear automorphisms of X, AutR−R(X)
to the unit group of Z, defined by
AutR−R(X)
σ
g(−)
/ AutR−R(R) = U (Z)
(2)
/ eσ
where for each r ∈ R with unit e ∈ U nit{r}, we have
eσ(r) = X
(e)
σ(xe)yer = X
(e)
rσ(xe)ye.
In particular, for every element t ∈ X and σ ∈ AutR−R(X), we have
Proof. Follows directly from [4, Lemma 2.1].
σ(t) = eσ(e)t, whenever e ∈ U nit{t}.
The Picard group of R is denoted by Pic(R). It consists of all isomorphisms classes of
invertible unital R-bimodules, with multiplication induced by the tensor product. As in the
unital case [10, Theorem 2.(i)], there is a canonical homomorphism of groups α : Pic(R) →
Aut(U (Z)). This homomorphism is explicitly given as follows. Given [X] ∈ Pic(R) and
u ∈ U (Z), we consider the R-bilinear automorphism of X defined by
σu : X −→ X,
(cid:16)t 7−→ t u(e), t ∈ X, and e ∈ U nit{t}(cid:17) .
We clearly have σuv = σu ◦ σv, and so gσuv = fσu ◦fσv, for u, v ∈ U (Z) It follows from Lemma
1.6 that
This equation implies that the element fσu ∈ U (Z) is independent from the choice of the
representative X of the class [X] ∈ Pic(R). We have thus a well defined map
σu(rt) = fσu(r)t, for every t ∈ X, r ∈ R.
(3)
α : Pic(R) → Aut(U (Z)),
[X] 7→ α[X](u) = fσu
which is a homomorphism of groups by (3). This is exactly the homomorphism induced by
the map α of [4, p. 135]. We have the formula:
α[X](u)(r) = fσu(r) = X
(e)
rxeu(e1)ye,
(i.e.X
(e)
rl(xe ⊗R u(e1)ye)),
(4)
where e ∈ U nit{r}, e1 ∈ U nit{xe, ye}, and as before e = P(e) xeye.
2 Generalized crossed products with local units.
Let G be any group with neutral element 1. Consider a ring R with a set of local units E,
and a group homomorphism Θ : G → Pic(R). This is equivalent to give sets of invertible
R-bimodules and isomorphisms of bimodules
{Θx : x ∈ G},
{F Θ
x,y : Θx ⊗R Θy
∼=−→ Θxy, x, y ∈ G},
7
/
/
where Θ(x) = [Θx] for every x ∈ G. Consider the product on the direct sum Lx∈G Θx
determined by the maps F Θ
x,y. There is no reason to expect that this product, after the choice
of the representatives Θx, will be associative. In fact, it becomes an associative multiplication
if and only if the diagram
Θx ⊗R Θy ⊗R Θz
F Θ
xy ⊗Θz
Θxy ⊗R Θz
(5)
Θx⊗F Θ
yz
Θx ⊗R Θyz
F Θ
x,yz
F Θ
xy,z
/ Θxyz
commutes for every x, y, z ∈ G. Even in this case, it is not clear wether this multiplication has
a set of local units. On the other hand, we know that there is an isomorphism of R-bimodules
ι : R → Θ1, so a natural candidate for such a set should be E′ = ι(E). In fact, this is a set of
local units if and only if, for every x ∈ G, the following diagrams are commutative
Θx ⊗R R
≃
Θx
,
R ⊗R Θx
≃
Θx
(6)
'NNNNNNNNNNN
ι⊗Θx
9tttttttttt
F Θ
1,x
Θ1 ⊗R Θx
'NNNNNNNNNNN
Θx⊗ι
9tttttttttt
F Θ
x,1
Θx ⊗R Θ1
The previous discussion suggest then the following definition.
Definition 2.1. A factor map for the morphism Θ : G → Pic(R) consists of sets of invertible
R-bimodules and isomorphisms of bimodules
{Θx : x ∈ G},
{F Θ
x,y : Θx ⊗R Θy
∼=−→ Θxy, x, y ∈ G},
where Θ(x) = [Θx] for every x ∈ G, and one isomorphism of R -- bimodules ι : R → Θ1 such
that the diagrams (5) and (6) are commutative.
Now we come back to our initial homomorphism of groups Θ : G → Pic(R) and its
associated family of isomorphisms {F Θ
x,y}x,y,∈ G. Our next aim is to find conditions under
which we can extract from these data a factor map for R and G. First of all we should assume
that the diagrams of (6) are commutative. We can define using the homomorphism of groups
α : Pic(R) → Aut(U (Z)) given by equation (4), a left G-action on the group of units U (Z),
where Z = EndR−R(R). Written down explicitly the composition α ◦ Θ : G → Pic(R) →
Aut(U (Z)) the outcome action is described as follows. Given a unit e ∈ E, its decomposition
with respect to the invertible R-bimodule Θx is written as e = P(e) xexe ∈ ι−1(Θ1) = R.
Using formula (4), the left G-action on U (Z) is then defined by
G × U (Z)
(x, u)
/ U (Z)
/ xu = hr 7→ P(e) rxeu(e1)xei ,
(7)
where e ∈ U nit{r} and e1 ∈ U nit{xe, xe}. Recall that in this case e1 ∈ U nit{e}, and so
e1 ∈ U nit{r}.
The abelian group of all n-cocycles with respect to this action is denoted by Z n
Θ(G, U (Z));
Θ(G, U (Z)) we denote the n-coboundary subgroup. The n-cohomology group, is
while by Bn
then denoted by H n
Θ(G, U (Z)).
8
/
/
/
/
/
'
9
/
/
'
9
/
/
Remark 2.2. To each homomorphism of groups Θ : G → Pic(R), it corresponds as before
a G-group structure on U (Z), and so it leads to the cohomology groups H ∗
Θ(G, U (Z)). The
nature of this correspondence stills, up to our knowledge, unexplored, even in the case of unital
rings. However, as we will see, it is in fact the starting key point of any theory of generalized
crossed products. Following the commutative and unital case, see Remark 2.13 below, here we
will also extract our results from one fixed G-action, this is to say fixed cohomology groups. For
instance, one could start with the cohomology which corresponds to the trivial homomorphism
of groups, that is, I : G → Pic(R) sending x 7→ [R], of course here the cohomology is not at
all trivial.
Here is a non trivial example.
Example 2.3. ([4]) Let R be a ring with E as a set of local units. Assume that there is
a homomorphism of groups Φ : G → Aut(R) to the group of ring automorphisms of R (we
assume that Φ(x)(E) = E, for every x ∈ G). Composing with the canonical homomorphism
Aut(R) → Pic(R) which sends x 7→ [Rx] (i.e.
the R-bimodule whose underlying left R-
module is RR and its right module structure is r.s = rx(s)), we obtain a homomorphism
Θ : G → Pic(R). The corresponding family of maps {F Θ
x,y}x, y∈G is given by
F Θ
x,y : Rx ⊗R Ry −→ Rxy, (r ⊗R s 7−→ rx(s)) .
Here of course the associativity and unitary properties of the multiplication of R, both imply
that {F Θ
x,y}x, y∈G is actually a factor map for R and G. A routine computation shows now that
the cohomology H ∗
Θ(G, U (Z)) which corresponds to this Θ is exactly the one considerd in [4,
p. 135], since the G-action (7) coincides for this case with that given in [4].
Lemma 2.4. Keep the above G-action on U (Z). Fix an element x ∈ G.
(1) For every t ∈ Θx and u ∈ U (Z), we have
t u(e) = xu(e) t,
where e ∈ U nit{t}.
(2) Given similar bimodules M ∼ Θx; for every m ∈ M and u ∈ U (Z), we have
m u(e) = xu(e) m,
with e ∈ U nit{m}.
(8)
(9)
Proof. (1) This is equation (3).
(2) The identity (8) clearly lifts to finite direct sums Θ(n)
Θ(n)
x .
x , and, hence, for subbimodules M of
Proposition 2.5. Let R be a ring with a set of local units E and G any group. Assume that
there is a homomorphism of groups Θ : G → Pic(R) whose family of maps {F Θ
x,y}x,y ∈G satisfy
the commutativity of diagrams (6). Denote by αx,y,z : Θxyz → Θxyz the isomorphisms that
satisfy
y,z(cid:17) = F Θ
Then ^αx,y,z defines a normalized element of Z 3
Θ(G, U (Z)), where ^αx,y,z is the image of αx,y,z
under the isomorphism of groups stated in Lemma 1.6. Furthermore, if ^α−,−,− is cohomolog-
ically trivial, that is, there is a normalized map σ−,− : G × G → U (Z) such that
x,yz ◦(cid:16)Θx ⊗R F Θ
xy,z ◦(cid:16)F Θ
x,y ⊗R Θz(cid:17) .
αx,y,z ◦ F Θ
(10)
^αx,y,z = σx,yz
xσy,z σ−1
x,y σ−1
xy,z,
9
for every x, y, z ∈ G, then there is a factor map {F
Θ
x,y}x.y ∈G for Θ, defined by
F
Θ
x,y : Θx ⊗R Θy
ux ⊗R uy
/ Θxy
/ σx,y(e)F Θ
x,y(ux ⊗R uy),
where e ∈ U nit{ux, uy}.
Proof. Consider x, y, z, t ∈ G, and ux ∈ Θx, uy ∈ Θy, uz ∈ Θz and ut ∈ Θt, denote by uxuy the
image of ux ⊗R uy under F Θ
x,y. There are several isomorphisms from Θx ⊗R Θy ⊗R Θz ⊗R Θt to
Θxyzt which are defined by the family F Θ
−,−. So it will be convenient to adopt some notations.
In order to do this, we rewrite the stated equation (10) satisfied by the α−,−,−'s, as follows
αx,y,z(cid:16)ux(uyuz)(cid:17) = (cid:16)(uxuy)uz(cid:17) .
Using Lemma 1.6, this is equivalent to
βx,y,z(e)(cid:16)ux(uyuz)(cid:17) = (cid:16)(uxuy)uz(cid:17) ,
where e ∈ U nit{ux, uy, uz} and β−,−,− := ^α−,−,− is the image of αx,y,z under the homomor-
phism of groups defined in Lemma 1.6. In this way, if we fix a unit e ∈ U nit{ux, uy, uz, ut},
then we have
(cid:16)(uxuy)uz(cid:17) ut = βx,y,z(e)(cid:16)ux(uyuz)(cid:17) ut
= βx,y,z(e)βx,yz,t(e)(cid:16)ux(cid:16)(uyuz)ut(cid:17)(cid:17)
= βx,y,z(e)βx,yz,t(e)(cid:16)ux(cid:16)βy,z,t(e)(cid:16)uy(uzut)(cid:17)(cid:17)(cid:17)
= βx,y,z(e)βx,yz,t(e)(cid:16)uxβy,z,t(e)(cid:16)uy(uz ut)(cid:17)(cid:17)
= βx,y,z(e)βx,yz,t(e)(cid:16)xβy,z,t(e)ux(cid:16)uy(uzut)(cid:17)(cid:17)
= βx,y,z(e)βx,yz,t(e) xβy,z,t(e)(cid:16)ux(cid:16)uy(uz ut)(cid:17)(cid:17)
(8)
= βx,y,z(e)βx,yz,t(e) xβy,z,t(e)β−1
= βx,y,z(e)βx,yz,t(e) xβy,z,t(e)β−1
x,y,zt(e)(cid:16)(uxuy)(uz ut)(cid:17)
x,y,zt(e)β−1
xy,z,t(e)(cid:16)(uxuy)uz(cid:17) ut.
Given h ∈ E, using the above notations, we can consider the following units
(h)
h = X
h1 = X
h2 = X
h3 = X
(h1)
(h2)
yh1yh1,
zh2zh2,
th3th3,
(h3)
xhxh,
h1 ∈ U nit{xh, xh};
h2 ∈ U nit{yh1, yh1};
h3 ∈ U nit{zh2, zh2};
h4 ∈ U nit{th3, th3}.
10
/
/
It is clear that h4 is a unit for all the handled elements, in particular h4 ∈ U nit{xh, yh1, zh2 , th3}.
According to the equality showed previously, for every set {xh, yh1, zh2, th3}, we have
(cid:16)(xhyh1)zh2(cid:17) th3 = βx,y,z(h4)βx,yz,t(h4) xβy,z,t(h4)β−1
x,y,zt(h4)β−1
xy,z,t(h4)(cid:16)(xhyh1)zh2(cid:17) th3.
Using the map F Θ
t,t−1, and summing up, we get
(cid:16)(xhyh1)zh2(cid:17) th3th3 = βx,y,z(h4)βx,yz,t(h4) xβy,z,t(h4)β−1
x,y,zt(h4)β−1
xy,z,t(h4)(cid:16)(xhyh1)zh2(cid:17) th3th3,
X
(h3)
which means that
(xhyh1)zh2 = βx,y,z(h4)βx,yz,t(h4) xβy,z,t(h4)β−1
x,y,zt(h4)β−1
xy,z,t(h4)(xhyh1)zh2, equality in Θxyz.
Repeating thrice the same process, we end up with
h = βx,y,z(h4)βx,yz,t(h4) xβy,z,t(h4)β−1
x,y,zt(h4)β−1
xy,z,t(h4)h
= βx,y,z(h)βx,yz,t(h) xβy,z,t(h)β−1
x,y,zt(h)β−1
xy,z,t(h),
since h4h = hh4 = h and the involved maps are R-bilinear. Therefore, for any unit h ∈ E, we
have
βxy,z,t ◦ βx,y,zt(h) = xβy,z,t ◦ βx,yz,t ◦ βx,y,z(h).
Since the β−,−,−'s are R-bilinear, this equality implies the 3-cocycle condition, that is,
βxy,z,t ◦ βx,y,zt = xβy,z,t ◦ βx,yz,t ◦ βx,y,z,
for every x, y, z, t ∈ G.
A routine computation, using equation (8), shows the last statement.
Corollary 2.6. Let R be a ring with local units and G any group, and fix a factor map
{Θx}x ∈G for R and G with its associated cohomology groups. Assume that there is a family of
invertible unital R-bimodules {Ωx}x ∈ G such that Ωx ∼ Θx (they are similar), for every x ∈ G,
with a family of R-bilinear isomorphisms
Fx,y : Ωx ⊗R Ωy −→ Ωxy.
For x, y, z ∈ G, we denote by αx,y,z : Ωxyz → Ωxyz the resulting isomorphisms which satisfy
αx,y,z ◦ Fx,yz ◦(cid:16)Ωx ⊗R Fy,z(cid:17) = Fxy,z ◦(cid:16)Fx,y ⊗R Ωz(cid:17) .
(11)
Then ^αx,y,z defines an element of Z 3
isomorphism of groups stated in Lemma 1.6.
Θ(G, U (Z)), where ^αx,y,z is the image of αx,y,z under the
Proof. This is a direct consequence of Proposition 2.5 and Lemma 2.4(2).
We need to clarify the situation when two different classes of representatives are chosen.
11
Proposition 2.7. Let R be a ring with a set of local units E and G any group. Consider
two factor maps {F Θ
x,y}x,y ∈G such that, for every x ∈ G, there exists an R-
∼=→ Θx. Denote by τx,y, where x, y ∈ G, the following R-bilinear
x,y}x,y ∈G and {F Γ
bilinear isomorphism ax : Γx
isomorphism
τx,y : Θxy
F Θ
x,y
−1
/ Θx ⊗R Θy
∼=
/ Γx ⊗R Γy
F Γ
x,y
/ Γxy
∼=
/ Θxy,
That is,
τx,y ◦ F Θ
x,y ◦ (ax ⊗R ay) = axy ◦ F Γ
x,y.
Then gτx,y defines a normalized element of Z 2
the isomorphism of groups stated in Lemma 1.6.
Θ(G, U (Z)), where gτx,y is the image of τx,y under
Proof. Fix a set of elements x, y, z ∈ G. Assume that we have
x gτx,yz(h) gτx,yz(h) = gτx,y(h)gτxy,z(h),
So taking any element r ∈ R with unit f ∈ U nit{r}, we obtain
for every unit h ∈ E.
(12)
gτx,yz ◦ x gτx,yz(r) = gτx,yz ◦ x gτx,yz(f r)
= x gτx,yz(f )gτx,yz(r)
= x gτx,yz(f )gτx,yz(f )r
= gτx,y(f )gτxy,z(f )r
= gτxy,z(cid:16)gτx,y(f )r(cid:17)
= gτxy,z ◦ gτx,y(r),
(12)
which shows that gτ−,− is a 2-cocycle. In fact gτ−,− is by definition a normalized 2-cocycle.
Equation (12) is fulfilled by following analogue steps as in the proof of Proposition 2.5.
Proposition 2.8. The hypothesis are that of Corollary 2.6. Assume further that there are
two families of invertible unital R-bimodules {Ωx}x ∈ G and {Γx}x ∈ G as in Corollary 2.6 (i.e.
Γx ∼ Θx ∼ Ωx), together with families of R-bilinear isomorphisms
F Ω
x,y : Ωx ⊗R Ωy −→ Ωxy, F Γ
x,y : Γx ⊗R Γy −→ Γxy.
Assume also that there are R-bilinear isomorphisms ax : Ωx → Γx, x ∈ G. Consider the
associated 3-cocycles βΩ
Θ(G, U (Z)) given by Proposition 2.5. Then,
−,−,−, βΓ
−,−,− ∈ Z 3
−,−,− ◦(cid:16)βΓ
βΩ
−,−,−(cid:17)−1
−,−,−] = [βΓ
∈ B2
Θ(G, U (Z)).
That is, they are cohomologous, or [βΩ
−,−,−] in H 3
Θ(G, U (Z)).
Proof. Let us denote by αΩ
−,−,− the R-bilinear isomorphisms satisfying equation
(11), respectively, for {Ωx}x ∈ G and {Γx}x ∈G. For any pair x, y ∈ G, we consider the R-bilinear
isomorphism bxy : Ωxy → Ωxy defined by the following equation
−,−,− and αΓ
axy ◦ bxy ◦ F Ω
x,y = F Γ
x,y ◦(cid:16)ax ⊗R ay(cid:17) .
(13)
12
/
/
/
/
We denote by γx,y, x, y ∈ G, the image of bxy under the homomorphism of groups defined in
Lemma 1.6.
Fix x, y, z ∈ G, and consider (tx, ty, tz) ∈ Ωx × Ωy × Ωz and (ux, uy, uz) ∈ Γx × Γy × Γz with
a common unit e ∈ U nit{tx, ty, tz, ux, uy, uz}. Using the notation of the proof of Proposition
2.5, we can write
βΩ
x,y,z(e) tx(tytz) = (txty)tz.
βΓ
x,y,z(e) ux(uyuz) = (uxuy)uz.
γx,y(e) axy(txty) = ax(tx)ay(ty).
(14)
(15)
(16)
A routine computation as in the proof of Proposition 2.5 using equation (14), (15) and (16),
show that, for every unit h ∈ E, we have
(cid:16)βΩ
x,y,z(h)(cid:17)−1
x,y,z(h) = (cid:16)γx,yz(h)(cid:17)−1(cid:16)xγy,z(h)(cid:17)−1
βΓ
γx,y(h)γxy,z(h).
This implies that
x,y,z ◦(cid:16)βΩ
x,y,z(cid:17)−1
βΓ
= γxy,z ◦ γx,y ◦(cid:16)xγy,z(cid:17)−1
◦(cid:16)γx,yz(cid:17)−1
, in U (Z),
which finishes the proof.
Now we are able to give the right definition of generalized crossed product. We hope it
will result cleaner than the one considered in [13, 15] for rings with identity. In the sequel, R
denotes a ring with a set of local units E.
Definition 2.9. Given a factor map as in Definition 2.1
{F Θ
x,y : Θx ⊗R Θy
∼=−→ Θxy, x, y ∈ G},
with an isomorphism of R-bimodules ι : R → Θ1, we define its associated generalized crossed
product ∆(Θ) = Lx∈G Θx with multiplication
θxθy = F Θ
x,y(θx ⊗ θy), for θx ∈ Θx, θy ∈ Θy.
It follows that Θ1 is a subring of ∆(Θ) and the map ι : R → Θ1 is a ring isomorphism.
Therefore, ι(E) is a set of local units for Θ1 that serves as well as a set of local units for ∆(Θ).
Normally, we will identify R with Θ1, and, thus, E will be a set of local units for the generalised
crossed product ∆(Θ). Obviously, ∆(Θ) is a G -- graded ring such that ΘxΘy = Θxy for every
x, y ∈ G (thus, it could be referred to as a strongly graded ring after [16]). For instance, if we
take Θ as in Example 2.3, then ∆(Θ) is the skew group ring R ∗ G, see [4].
Lx∈G Γx with ring isomorphism ι : R → Γ1 and multiplication given by γxγy = F Γ
Remark 2.10. A factor map as in Definition 2.1 determines a generalized crossed product Γ =
x,y(γx ⊗R γy)
for γx ∈ Γx, γy ∈ Γy. In other words, generalized crossed products and factor maps are just
two ways to define the same mathematical object. A generalized crossed product Γ gives
clearly a group homomorphism
Γ : G
/ Pic(R) ,
(x 7→ [Γx]).
Whether a general group homomorphism G → Pic(R) gives some generalized crossed product
is not so clear. However, as we have seen in Proposition 2.5, this is possible, if the underlying
maps satisfy the commutativity of diagrams (6) and the associated 3-cocycle is trivial or at
least cohomologically trivial.
13
/
Definition 2.11. A morphism of generalized crossed products (∆(Θ), ν), (∆(Γ), ι) is a graded
ring homomorphism f : ∆(Θ) → ∆(Γ) such that f ◦ ν = ι. Equivalently, it consists of a set of
homomorphisms of R -- bimodules
such that all the diagrams
{fx : Θx → Γx : x ∈ G}
Θx ⊗R Θy
fx⊗fy
Γx ⊗R Γy
F Θ
x,y
F Γ
x,y
/ Θxy
fxy
/ Γxy
commute, and f1 ◦ ν = ι.
Let R ⊆ S be an extension of rings with the same set of local units E. We denote as in
[9] by InvR(S) the group of all invertible unital R-sub-bimodules of S. An R-sub-bimodule
X ⊆ S belongs to the group InvR(S) if and only if there exists an R-sub-bimodule Y ⊆ S
such that
XY = R = Y X,
where the first and last terms are obviously defined by the multiplication of S. Clearly, there
is a homomorphism of groups µ : InvR(S) → Pic(R).
Remark 2.12. A generalized crossed product Γ of R with G gives in particular the ring
extension ι : (R, E) → (Γ, E′) with local untis. In this way, Γx is a unital R-subbimodule of
Γ for every x ∈ G, and the isomorphism ι : R → Γ1 becomes R -- bilinear. We will identify
Γ1 with R and E with E′. Let us denote by F Γ : Γ ⊗R Γ → Γ the multiplication map of the
ring Γ. It follows from [9, Lemma 1.1] that its restriction to Γx ⊗R Γy gives an R-bilinear
isomorphism
F Γ
xy : Γx ⊗R Γy
≃ /
/ ΓxΓy = Γxy
for every x, y ∈ G, since, obviously, Γx ∈ InvR(Γ) for every x ∈ G. Clearly, our generalized
crossed product determines a factor map in the sense of Definition 2.1. On the other hand,
the associated homomorphisms of groups Γ : G → Pic(R) actually factors throughout the
morphism µ. That is, we have a commutative diagram of groups
Γ
Pic(R)
(17)
G
D
D
D
Γ
D
D
:uuuuuuuuuuu
µ
!D
InvR(Γ).
As we have seen in Remark 2.12, one can start with a fixed ring extension R ⊆ S with the
same set of local units E, and then work with the Γ's defined this time by Γ : G → InvR(S)
instead of the Γ's. In this case the situation becomes much more manageable, in the sense
that each morphism Γ induces automatically a factor map and vice versa.
14
/
/
/
/
!
:
Remark 2.13. As was shown in [13, Remarks 1., 2. and 3.], the above notion generalizes
the classical notion of crossed product in the commutative Galois setting. Specifically, given a
commutative Galois extension k ⊆ R with a finite Galois group G, and consider the canonical
homomorphism of groups Φ0 : G → Pick(R), where Pick(R) = {[P ] ∈ Pic(R) kp = pk, ∀ k ∈
k, p ∈ P }, which sends x → [Rx] to the class of the R-bimodules Rx whose underlying left
R-module is RR and its right R-module structure was twisted by the automorphism x, see
Example 2.3. In this case, the over ring is chosen to be S = ⊕x∈GΦ0(x) defined as the usual
crossed product attached to Φ0, which is not necessary trivial, that is, defined using any 2-
cocycle. Thus, in the Galois theory of commutative rings, the homomorphism of groups which
leads to the study of intermediate crossed products rings, is the obvious homomorphism of
groups Θ which satisfies Φ0 = µ ◦ Θ, where µ is as in diagram (17).
3 An abelian group of generalized crossed products.
From now on, we fix a ring extension R ⊆ S with the same set of local units E. Let G be any
group and assume given a morphism of groups
Θ : G −→ InvR(S), (cid:16)x 7−→ Θx(cid:17) ,
where we have used the notation of Remark 2.12. The multiplication of S induces then a
factor map
{F Θ
x,y : Θx ⊗R Θy −→ Θxy, : x, y ∈ G}.
Clearly R = Θ1, whence E is a set of local units for ∆(Θ). We introduce in this section
an abelian group C(Θ/R) whose elements are the isomorphism classes of generalized crossed
products whose homogeneous components are similar as R-bimodules to that of ∆(Θ), see
Section 2 for definition. Our definition is inspired from that of Miyashita [15, §2.], however
the proofs presented here are slightly different. This group will be crucial for the construction
of the seven terms exact sequence of groups in the next section.
Let us consider thus the set C(Θ/R) of isomorphism classes of generalized crossed products
[∆(Γ)] such that, for each x ∈ G, we have Γx ∼ Θx, that is they are similar as R-bimodules,
see Section 1.
Proposition 3.1. Consider the set of isomorphisms classes of generalized crossed products
C(Θ/R) defined above. Then C(Θ/R) has the structure of an abelian group. Moreover the
subset C0(Θ/R) consisting of classes [∆(Λ)] such that for every x ∈ G, Λx ∼= Θx as R-
bimodules, is a sub-group of C(Θ/R).
Proof. Given two classes [∆(Ω)], [∆(Γ)] ∈ C(Θ/R), their multiplication is defined by
[∆(Ω)] [∆(Γ)] = [ ⊕
x∈G
Ωx ⊗R Θx−1 ⊗R Γx].
The factor maps of its representative generalized crossed product are given by the following
15
composition
Ωx ⊗R Θx−1 ⊗R Γx ⊗R Ωy ⊗R Θy−1 ⊗R Γy
UUUUUUUUUUUUUUU
Ωx⊗TΘ
!
"
#
%
&
(
*
,
/
2
5
9
=
F ΩΓ
x,y
B
G
K
x−1 ⊗ Γx, Ωy ⊗RΘ
y−1 ⊗Γy
*UUUUUUUUUUUUUUU
Ωx ⊗R Ωy ⊗R Θy−1 ⊗R Θx−1 ⊗R Γx ⊗R Γy
F Ω
x,y ⊗F Θ
y−1,x−1 ⊗F Γ
x,y
N Q T W Y [ ] _ a b d e
Ωxy ⊗R Θ(xy)−1 ⊗R Γxy,
where TΘx−1 ⊗Γx, Ωy⊗RΘy−1 is the twist R-bilinear map defined in Proposition 1.3. The asso-
ciativity of the F ΩΓ
−,−'s is easily deduced using Lemma 1.4. This multiplication is commutative
since for any two classes [∆(Ω)], [∆(Γ)] ∈ C(Θ/R), we have a family of R-bilinear isomorphisms
Γx ⊗R Θx−1 ⊗R Ωx
∼=
Γx ⊗R Θx−1 ⊗R Ωx ⊗R Θx−1 ⊗R Θx
,
/
2
6
;
T⊗Θx
Ωx ⊗R Θx−1 ⊗R Γx ⊗R Θx−1 ⊗R Θx
A
∼=
G
L
Q
∼=
T X [
^
Ωx ⊗R Θx−1 ⊗R Γx,
which is easily shown to be compatible with both factors maps of Γ and Ω. Thus, it induces
an isomorphism at the level of generalized crossed products.
It is clear that the class of [∆(Θ)] is the unit of this multiplication. The inverse of any
class [∆(Ω)] is given by
[∆(Ω)]−1 = [ ⊕
x∈G
Θx ⊗R Ωx−1 ⊗R Θx].
Lastly, the fact that C0(Θ/R) is a sub-group of C(Θ/R), can be immediately deduced from
definitions.
Proposition 3.2. Consider the abelian group C0(Θ/R) of Proposition 3.1. Then there is an
isomorphism of groups
C0(Θ/R) ∼= H 2
Θ(G, U (Z)).
Proof. The stated isomorphism is given by the following map:
ζ : C0(Θ/R) −→ H 2
Θ(G, U (Z)), (cid:16)[∆(Λ)] 7−→ [eτ−,−](cid:17) ,
16
*
2
2
/
/
/
/
where eτ−,− is the normalized 2-cocycle defined in Proposition 2.7 and [eτ−,−] denotes its
equivalence class in H 2
Θ(G, U (Z)). First we need to show that this map is in fact well de-
∼=→ ∆(Σ)
fined. To do so, we take two isomorphic generalized crossed products χ : ∆(Λ)
which represent the same element in the subgroup C0(Θ/R), with R-bilinear isomorphisms
ax : Λx → Θx ← Σx : bx, for all x ∈ G. Then we check that the associated 2-cocycles are
cohomologous. So let us denote these cocycles by eτ−,− and eγ−,− associated, respectively, to
∆(Λ) and ∆(Σ). We need to show that [eτ−,−] = [eγ−,−]. Recall from Proposition 2.7 that we
have
τx,y ◦ F Θ
x,y ◦(cid:16)ax ⊗R ay(cid:17) = axy ◦ F Λ
x,y,
γx,y ◦ F Θ
x,y ◦(cid:16)bx ⊗R by(cid:17) = bxy ◦ F Σ
x,y,
for every x, y ∈ G, where F Λ
Σ. For each x ∈ G, we set the following R-bilinear isomorphism
−,− and F Σ
−,− are, respectively, the factor maps relative to Λ and
βx : Θx
a−1
x
/ Λx
χx /
/ Σx
bx /
/ Θx ,
where χx is the x-homogeneous component of the isomorphism χ. Then it is easily seen, using
the fact that χ is morphism of generalized crossed products, that, for each pair of elements
x, y ∈ G, we have
βxy ◦ τx,y ◦ F Θ
x,y = γx,y ◦ F Θ
x,y ◦(cid:16)βx ⊗R βy(cid:17) .
(18)
(20)
We claim that
So let e ∈ E, and consider its decomposition e = P(e) xexe with respect to Θx, for a given
x ∈ G. Let e1 ∈ U nit{xe, xe}. Using equation (18), we get the following equality in S
eτx,y(e)eβxy(e) = eγx,y(e)eβx(e)xeβy(e),
for all e ∈ E.
(19)
X
(e), (e1)
βxy ◦ τx,y(xeye1)ye1xe = X
(e), (e1)
Routine computations show that,
γx,y(cid:16)βx(xe)βy(ye1)(cid:17) ye1xe.
(e), (e1)
X
γxy(cid:16)βx(xe)βy(ye1)(cid:17) ye1xe
X
(e), (e1)
βxyτx,y(xeye1)ye1xe = eτx,y(e1)eβxy(e1)e = eτx,y(e)eβxy(e), and
(8)
= eγx,y(e1)eβx(e1)xeβy(e1)e = eγx,y(e)eβx(e)xeβy(e),
which by (20) imply that
which is the claimed equality. On the other hand we define
eτx,y(e)eβxy(e) = eγx,y(e)eβx(e)xeβy(e),
h : G
x
/ U (Z) = AutR−R(R)
/ (cid:16)hx : r 7−→ P(e) rβx(xe)xe(cid:17)
where e ∈ U nit{r}, and e = P(e) xexe is the decomposition of e in R = ΘxΘx−1. It is clear
form definitions that eβx = hx, for ever x ∈ G. Taking an arbitrary element r ∈ R, we can
show using equation (19) that
eτx,y ◦ hxy(r) = eγx,y ◦ xhy ◦ hx(r).
17
/
/
/
Therefore, eτx,y ◦ hxy = eγx,y ◦ xhy ◦ hx, which means that eτ−,− and eγ−,− are cohomologous.
By the same way, we show that, if eτ−,− and eγ−,− are cohomologous, then ∆(Λ/R) and
∆(Σ/R) are isomorphic as generalized crossed products, which means that the stated map ζ
is injective. To show that this map is surjective, we start with a given normalized 2-cocycle
σ−,− : G2 → U (Z), and consider the following R-bilinear automorphisms: for every x ∈ G
ϑx : Θx −→ Θx, (cid:16)u 7−→ σx,x(e)u(cid:17) ,
where e ∈ U nit{u}. Now set Σx = Θx as an R-bimodule with the R-bilinear isomorphism
ϑx : Σx → Θx previously defined. We define new factor maps relative to those Σx's, by
x,y : Σx ⊗R Σy → Σxy, (cid:16)ux ⊗R uy 7−→ σx,y(e)F Θ
x,y(ux ⊗R uy)(cid:17) ,
F Σ
where e ∈ U nit{ux, uy}. The 2-cocycle condition on σ−,− gives the associativity of F Σ
−,−, while
the normalized condition gives the unitary property. Thus, ∆(Σ/R) is a generalized crossed
product whose isomorphic class belongs by definition to the sub-group C0(Θ/R).
Lastly, by a routine computation, using the definition of the twist natural map given in
Proposition 1.3, we show that the map ζ is a homomorphism of groups.
4 The Chase-Harrison-Rosenberg seven terms exact sequence.
In this section we show the analogue of Chase-Harrison-Rosenberg's [5] seven terms exact
sequence, generalizing by this the case of commutative Galois extensions with finite Galois
group due of T. Kanzaki [13, Theorem p.187] and the noncommutative unital case treated by
Y. Miyashita in [15, Theorem 2.12].
From now on we fix a ring extension R ⊆ S with a same set of local units E, together
with a morphism of groups Θ : G → InvR(S) and the associated generalized crossed product
∆(Θ/R) having F Θ
−,− as a factor map relative to Θ.
We denote by Pic(R) and Pic(S), respectively, the Picard group of R and S. There is a
canonical left G-action on Pic(R) induced by the obvious homomorphism of groups InvR(S) →
Pic(R) given explicitly by
x[P ] = [Θx ⊗R P ⊗R Θx−1],
for every x ∈ G, and [P ] ∈ Pic(R).
The corresponding G-invariant sub-group is denoted by Pic(R)G. We will consider the sub-
group PicZ (R) whose elements are represented by Z-invariant R-bimodules, in the sense that
[P ] ∈ PicZ (R), if and only if
[P ] ∈ Pic(R), and z(e)pe′ = epz(e′), ∀p ∈ P,
for every pair of units e, e′ ∈ E, and every element z ∈ Z. In this way, we set
PicZ (R)G := PicZ (R) ∩ Pic(R)G.
Recall from [9, Sect. 3] the group P(S/R):
P(S/R) = n [P ]
[φ]
3 [X] [P ] ∈ Pic(R), [X] ∈ Pic(S), and a map φ : RPR → RXRo
18
+
where at least one of the maps φl : P ⊗R S → X, or φr : S ⊗R P → X, canonically attached
to φ, is an isomorphisms of bimodules. For more details on the structure group of this set we
refer to [9, Section 3.]. Obviously there is a homomorphism of groups
Ol : P(S/R) −→ Pic(R),(cid:16)( [P ]
[φ]
3 [X] ) 7−→ [P ](cid:17) .
(21)
This group also inherits the above G-action. That is, there is a canonical left G-action on this
group which is induced by Θ and given as follows:
x(cid:16) [P ]
[φ]
3 [X] (cid:17) = (cid:16) [Θx ⊗R P ⊗R Θx−1]
[ψ]
3 [X] (cid:17) ,
where ψ := Θx⊗Rφ⊗RΘx−1 (composed with the multiplication of S). The subgroup P(S/R)G
of G-invariant elements of P(S/R) has a sightly simpler description:
Lemma 4.1. Keeping the above notations, we have
P(S/R)G = n [P ]
[φ]
3 [X] ∈ P(S/R) φ(P )Θx = Θxφ(P ), for every x ∈ Go ,
where φ(P )Θx and Θxφ(P ) stand for the obvious subsets of the S-bimodule X, e.g.
φ(P ) Θx =
X
f inite
φ(pi)ui
x pi ∈ P, ui
x ∈ Θx
.
Proof. Is based up on two main facts. The first one is that the R-bilinear map φ : P → X
3 [X] ∈ P(S/R), is always injective, see [9, Lemma 3.1].
defining the given element [P ]
The second fact consists on the following equivalence: For a fixed x ∈ G, saying that φ(P )Θx =
Θxφ(P ) in SXS is equivalent to say that there is an isomorphism fx : P ∼= Θx ⊗R P ⊗R Θx−1
which completes the commutativity of the following diagram
[φ]
P
fx
φ
Θx ⊗R P ⊗R Θx−1
/ Θx ⊗R X ⊗R Θx−1
Θx⊗φ⊗Θx−1
Y Y Z Z [ [ \ \ ] ] ^ ^ _ _ _ ` ` a a b b c c d d e e f f
/ S ⊗R X ⊗R S
ψ
X
/ X.
The later means, by the definition of P(S/R), that
(cid:16) [P ]
[φ]
3 [X] (cid:17) = (cid:16) [Θx ⊗ P ⊗ Θx−1]
[ψ]
3 [X] (cid:17) .
4.1 The first exact sequence.
Now we set
PZ (S/R) = n [P ]
[φ]
3 [X] ∈ P(S/R) [P ] ∈ PicZ (R)o ,
19
+
+
+
+
+
/
/
3
3
/
/
+
+
+
and
PZ (S/R)G = PZ (S/R) ∩ P(S/R)G.
On the other hand, we consider the group AutR−ring(S) of all R-ring automorphisms of
S (with same set of local units). It has the following subgroup
AutR−ring(S)(G) = nf ∈ AutR−ring(S) f (Θx) = Θx, for all x ∈ Go .
There are two interesting maps which will be used in the sequel: The first one is given by
E : AutR−ring(S) −→ P(S/R),(cid:16)f 7−→ ( [R]
[ιf ]
3 [Sf ] )(cid:17) ,
where ιf is the inclusion R ⊂ Sf , and Sf is the S-bimodule induced from the automorphism
f , that is, the left S-action is that of SS, while the right one has been altered by f , that is,
we have a new left S-action
s.s′ = s f (s′), for all s, s′ ∈ S.
The second connects the group U (Z) with AutR−ring(S), and it is defined by
F : U (Z) = AutR−R(R) −→ AutR−ring(S),(cid:16)σ 7−→ hF(σ) : s 7→ σ−1(e) s σ(e)i(cid:17) ,
(22)
where e ∈ U nit{s}, s ∈ S.
Proposition 4.2. Keeping the previous notations, there is a commutative diagram whose rows
are exact sequences of groups
U (Z) = AutR−R(R)
F
/ AutR−ring(S)
E
/ P(S/R)
Ol
/ Pic(R)
U (Z) = AutR−R(R)
/ AutR−ring(S)(G)
PZ (S/R)G
PicZ (R)G .
Proof. The exactness of the first row was proved in [9, Proposition 5.1]. The commutativity as
well as the exactness of the second row, using routine computations, are immediately deduced
from the definition of the involved maps.
The conditions under assumption, that is, the existence of Θ : G → InvR(S) a homo-
morphism of groups with a given extension of rings R ⊆ S with the same set of local units
E, are satisfied for the extension R ⊆ ∆(Θ). Precisely, the map Θ factors thought out a
′
homomorphism of groups Θ
rings with the same set of local units E. Thus, applying Proposition 4.2 to this extension, we
obtain the first statement of the following corollary.
: G → InvR(∆(Θ)),(cid:16)x 7→ Θx(cid:17), as R ⊆ ∆(Θ) is an extension of
Corollary 4.3. Consider the generalized crossed product ∆ := ∆(Θ) of S with G. Then there
is an exact sequence of groups
1
/ U (Z)
/ AutR−ring(∆)(G)
/ PZ (∆/R)G
/ PicZ (R)G.
In particular, we have the following exact sequence of groups
1
/ H 1
Θ(G, U (Z))
S1
/ PZ (∆/R)G
S2
/ PicZ (R)G.
20
+
/
/
/
/
/
/
?
O
/
/
?
O
?
O
/
/
/
/
/
/
/
Proof. We only need to check the particular statement. So let f ∈ AutR−ring(∆)(G), this
gives a family of R-bilinear isomorphisms fx : Θx → Θx, x ∈ G, which by Lemma 1.6 they
lead to a map
σ : G −→ U (Z), (cid:16)x 7−→ efx(cid:17) ,
as Θx ∈ InvR(S). An easy verification, using (8), shows that, for every unit e ∈ E, we have
Therefore,
efxy(e) = efx(e)xefy(e).
σxy = σx ◦ xσy,
for every x, y ∈ G.
(23)
That is, σ is a normalized 1-cocycle, i.e. σ ∈ Z 1
Θ(G, U (Z)).
Conversely, given a normalized 1-cocycle γ ∈ Z 1
Θ(G, U (Z)), we consider the R-bilinear
isomorphisms
gx : Θx −→ Θx, (cid:16)u 7−→ γx(e)u(cid:17) , where e ∈ U nit{u}, u ∈ Θx.
Clearly, the direct sum g := ⊕x∈Ggx defines an automorphism of generalized crossed product.
Hence, g ∈ AutR−ring(∆)(G).
In conclusion we have constructed a mutually inverse maps which in fact establishes an
isomorphism of groups
AutR−ring(∆)(G) ∼= Z 1
Θ(G, U (Z)).
(24)
Now let us consider en element u ∈ U (Z) = AutR−R(R), and its image F(u) under the map
F defined in equation (22) using the extension R ⊆ ∆. Then, for every element a ∈ Θx, we
have
F(u)(a) = u−1(e) a u(e),
e ∈ U nit{a}
(8)
= u−1(e) xu(e) a.
Therefore, u defines, under the isomorphism of (24), a 1-coboundary,
G −→ U (Z), (cid:16)x 7−→ xu ◦ u−1(cid:17) .
We have then constructed an isomorphism of groups
AutR−ring(∆)(G)/AutR−R(R) ∼= H 1
Θ(G, U (Z)).
The exactness follows now from the first statement which is a particular case of Proposition
4.2.
4.2 The second exact sequence.
For any element [P ] ∈ Pic(R), we will denote by [P −1] its inverse element. Let us consider
the following groups
PicZ (R)(G)
:= n[P ] ∈ PicZ (R) P ⊗R Θx ⊗R P −1 ∼ Θx,
for all x ∈ Go .
21
A routine computation shows that this is a subgroup of PicZ (R) which contains the sub-
group of all G-invariant elements. That is, there is a homomorphism of groups PicZ (R)G →
PicZ (R)(G).
Given an element [P ] ∈ PicZ (R)(G) and set Ωx := P ⊗R Θx ⊗R P −1, for every x ∈ G.
Consider now the family of R-bilinear isomorphisms
F Ω
x,y : Ωx ⊗R Ωy → Ωxy
x,y and the isomorphism P ⊗RP −1 ∼= R. This is clearly
which is defined using the factor maps F Θ
a factor map relative to the homomorphism of groups Ω : G → InvR(S) sending x 7→ Ωx.
This gives us a generalized crossed product ∆(Ω), and in fact establishes a homomorphism of
groups
L : PicZ (R)(G) → C(Θ/R),
where the right hand group was defined in Section 3. The proof of the following lemma is left
to the reader.
Lemma 4.4. Keep the above notations. There is a commutative diagram of groups
PicZ (R)G
PicZ (R)(G)
L
L
/ C0(Θ/R)
/ C(Θ/R).
Now we can show our second exact sequence.
Proposition 4.5. Let ∆(Θ) be a generalized crossed product of S with G. Then there is an
exact sequence of groups
PZ (∆(Θ)/R)G
S2
/ PicZ (R)G
S3
/ C0(Θ/R),
where S2 and S3 are, respectively, the restrictions of the map Ol given in equation (21) attached
to the extension R ⊆ ∆(Θ), and of the map defined in Lemma 4.4.
Proof. Let [P ] ∈ PicZ (R)G such that S3([P ]) = [∆(Ω)] = [∆(Θ)], where for every x ∈ G,
Ωx = P ⊗RΘx⊗RP −1. This means that we have an isomorphism ∆(Ω) ∼= ∆(Θ) of generalized
crossed products, and so a family of R-bilinear isomorphisms ιx : Θx ⊗R P ∼= P ⊗R Θx, x ∈ G.
We then obtain an R-bilinear isomorphism
ι = ⊕
x∈ G
ιx : ∆(Θ) ⊗R P −→ P ⊗R ∆(Θ),
which in fact satisfies the conditions stated in [8, Eq. (5.1) and (5.2), p. 161]. This implies
that ∆(Θ) ⊗R P admits a structure of ∆(Θ)-bimodule whose underlying left structure is given
by that of ∆(Θ)∆(Θ). In this way, the previous map ι becomes an isomorphism of (∆(Θ), R)-
bimodules, and so we have
(∆(Θ) ⊗R P ) ⊗∆(Θ) (P −1 ⊗R ∆(Θ)) ∼= (∆(Θ) ⊗R P ) ⊗∆(Θ) (∆(Θ) ⊗R P −1)
∼= ∆(Θ) ⊗R P ⊗R P −1
22
_
/
_
/
/
/
∼= ∆(Θ),
an isomorphism of ∆(Θ)-bimodules. Whence the isomorphic class of ∆(Θ) ⊗R P belongs
to Pic(∆(Θ)). We have then construct an element [P ]
3 [∆(Θ) ⊗R P ] of the group
P(∆(Θ)/R), where φ is the obvious map
[φ]
φ : P −→ ∆(Θ) ⊗R P, (cid:16)p 7−→ e ⊗R p(cid:17) ,
where e ∈ U nit{p}. It is clear that, for every x ∈ G, the equality φ(P )Θx = Θxφ(P ) holds
true in ∆(Θ) ⊗R P . Thus,
3 [∆(Θ) ⊗R P ] ∈ PZ (∆(Θ)/R)(G) and
[P ]
[φ]
S2(cid:16) [P ]
[φ]
3 [∆(Θ) ⊗R P ] (cid:17) = [P ].
This shows the inclusion Ker(S3) ⊆ Im(S2).
Conversely, let [Q] ∈ Im(S2), that is, there exists an element [Q]
[ψ]
3 [Y ] ∈ PZ (∆(Θ)/R)G.
We need to compute the image S3([Q]). From the choice of [Q] we know that [Q] ∈ PicZ (R)
and that, for every x ∈ G, ψ(Q)Θx = Θxψ(Q) in the ∆(Θ)-bimodule Y . As in the proof of
Lemma 4.1, the later means that, there are R-bilinear isomorphisms:
∼=−→ Θx ⊗R Q, for every x ∈ G,
fx : Q ⊗R Θx
which convert commutative the following diagrams
Q ⊗R Θx ⊗R Θy
Q⊗F Θ
x,y
Q ⊗R Θxy
'NNNNNNNNNNNN
7pppppppppppp
Y
fx⊗Θy
fxy
Θx ⊗R Q ⊗R Θy
Θxy ⊗R Q
*TTTTTTTTTTTTTTTT
Θx⊗fy
5kkkkkkkkkkkkkk
x,y⊗Q
F Θ
Θx ⊗R Θy ⊗R Q
Coming back to the image S3([Q]) := [∆(Γ)], we know that for every x ∈ G, we have Γx =
Q ⊗R Θx ⊗R Q−1 ∼= Θx, via the fx's. The above commutative diagram shows that these
x,y. Therefore, ∆(Θ) ∼= ∆(Γ)
isomorphisms are compatible with the factor maps F Γ
as generalized crossed products, and so S3([Q]) = [∆(Θ)] the neutral element of the group
C0(Θ/R).
x,y and F Θ
4.3 Comparison with a previous alternative exact sequence.
σ
→ Aut(R) → Pic(R), as in Example 2.3. We consider
Let us assume here that Θ : G
the extension R ⊂ RG, where S := RG = ∆(Θ) is the skew group ring of R by G. Thus
Θ : G → InvR(S) factors though out µ as in diagram (17).
In what follows, we want to
explain the relation between the five terms exact sequence given in [4, Theorem 2.8], and the
resulting one by combining Proposition 4.5 and Corollary 4.3, that is the sequence
1
/ H 1
Θ(G, U (Z))
S1
/ PZ (∆(Θ)/R)G
/ PicZ (R)G
S3
/ H 2
Θ(G, U (Z)) ∼= C0(Θ/R).
S2
23
+
+
+
+
/
/
t
*
*
5
/
/
/
/
As we argued in Example 2.3, the cohomology H ∗
[4]. Thus, following the notation of [4], the result [4, Theorem 2.8] says that
Θ(G, U (Z)) coincides with that considered in
1
/ H 1
Θ(G, U (Z))
ϕσ /
/ G-Pic(R)
Fσ /
/ Pic(R)G Φσ /
/ H 2
Θ(G, U (Z))
It is not difficult to see that the restriction of Φσ
is an exact sequence (of pointed sets).
to PicZ (R)G gives exactly S3. On the other hand, for any element
3 [X] ∈
PZ (∆(Θ)/R)G, we will define an object (P, τ ) where τ : G → AutZ(P ) (to the group of
additive automorphisms of P ) is a G-homomorphism [4, Definition 2.3]. As in the proof of
Lemma 4.1, we know that there is a family of R-bilinear isomorphisms jx : Rx⊗RP → P ⊗RRx,
x ∈ G, so we define τ by the following composition
[P ]
[φ]
τx : x−1P
∼= /
/ Rx ⊗R P
jx
/ P ⊗R Rx
∼= /
/ P x,
here P y denotes the R-bimodule constructed from P by twisting its right module structure
using the automorphism y, and the same construction is used on the left. To check that τ is
a homomorphism of groups, one uses the equality
jxy ◦ (F Θ
x,y ⊗R P ) = (P ⊗R F Θ
x,y) ◦ (jx ⊗R Ry) ◦ (Rx ⊗R jy),
for all x, y ∈ G.
Now, if we take another representative, that is, if we assume that
[P ]
[φ]
3 [X] = [P ′]
[φ′]
3 [X ′] ∈ PZ (∆(Θ)/R)G ,
then, by the definition of the group P(∆(Θ)/R), see [9, Section 3], there are bilinear isomor-
phisms f : P → P ′ and g : X → X ′ such that
P
f
P ′
φ
X
g
/ X ′
φ′
commutes. In this way we have also the following commutative diagram
Rx ⊗R P
Rx⊗f
Rx ⊗R P ′
jx
j′
x
P ⊗R Rx
f ⊗Rx
/ P ′ ⊗R Rx,
x ◦ f = f ◦ τx. This implies that [P, τ ] = [P ′, τ ′] in the group G-Pic(R).
which says that τ ′
We then have constructed a monomorphism of groups PZ (∆(Θ)/R)G → G-Pic(R) such that
the restriction of the map Fσ to PZ (∆(Θ)/R)G is exactly S2. We leave to the reader to check
that we furthermore obtain a commutative diagram
1
1
/ H 1
Θ(G, U (Z))
S1
/ PZ (∆(Θ)/R)G
S2
/ PicZ (R)G
S3
/ H 2
Θ(G, U (Z))
/ H 1
Θ(G, U (Z))
ϕσ
/ G-Pic(R)
Fσ
/ Pic(R)G
Φσ
/ H 2
Θ(G, U (Z)).
24
/
+
/
+
+
/
/
/
/
/
/
/
/
_
/
_
/
/
/
/
/
4.4 The third exact sequence.
We define the group B(Θ/R) as the quotient group
PicZ (R)(G)
L
/ C(Θ/R)
/ B(Θ/R)
/ 1,
(25)
where L is the map defined in Lemma 4.4.
The third exact sequence of groups is stated in the following
Proposition 4.6. Let ∆(Θ) be a generalized crossed product of S with G. Then there is an
exact sequence of groups
PicZ (R)G
S3
/ C0(Θ/R)
S4
/ B(Θ/R),
where S3 and S4 are constructed from the sequence (25) and the commutativity of the diagram
stated in Lemma 4.4.
Proof. The inclusion Im(S3) ⊆ Ker(S4) is by construction trivial. Now, let [∆(Γ)] ∈ C0(Θ/R)
such that S4([∆(Γ)]) = 1. By the definition of the group B(Θ/R), there exists [P ] ∈
PicZ (R)(G) such that L([P ]) = [∆(Γ)]. Therefore, we obtain a chain of R-bilinear iso-
morphisms:
Θx ∼= Γx ∼= P ⊗R Θx ⊗R P −1, for all x ∈ G,
which means that [P ] ∈ PicZ (R)G, and so [∆(Γ)] = S3([P ]) which completes the proof.
Remark 4.7. In the case of a unital commutative Galois extension k ⊆ R with a finite Galois
group, see for instance [3, p. 396], and taking the extension R ⊆ S and Θ as in Remark
2.13. The homomorphism S4 coincides, up to the isomorphism of Proposition 3.2, with the
homomorphism of groups defined in [3, Theorem A 12, p. 406] and where the group B(Θ/R)
coincides with the Brauer group of the k-Azumaya algebras split by R.
4.5 The fourth exact sequence.
Consider the following subgroup of the Picard group Pic(R):
Pic0(R) = n[P ] ∈ Pic(R) P ∼ R, as bimoduleso .
As we have seen in Proposition 1.3, this is an abelian group. Clearly it inherits the G-module
structure of Pic(R): The action is given by
x[P ] = [Θx ⊗R P ⊗R Θx−1], for every x ∈ G.
Lemma 4.8. Keep the above notations. Then the map
C(Θ/R)
[∆(Γ)]
ζ
/ Z 1(G, Pic0(R))
/ hx 7−→ [Γx][Θx−1]i
defines a homomorphism of groups. Furthermore, there is an exact sequence of groups
1
/ C0(Θ/R)
/ C(Θ/R)
ζ
/ Z 1(G, Pic0(R)).
25
/
/
/
/
/
/
/
/
/
/
Proof. The first claim is immediate from the definitions, as well as the inclusion C0(Θ/R) ⊆
Ker(ζ). Conversely, given an element [∆(Γ)] ∈ C(Θ/R) such that ζ([∆(Γ)]) = 1. This
implies that for every x ∈ G, there is an isomorphism of R-bimodule Γx ⊗R Θx−1 ∼= R. Hence,
Γx ∼= Θx, for every x ∈ G, which means that [∆(Γ)] ∈ C0(Θ/R).
We define another abelian group, which in the commutative Galois case [13], coincides with
the first cohomology group of G with coefficients in Pic0(R). It is defined by the following
commutative diagram
PicZ (R)(G)
/__________
Z 1(G, Pic0(R))
1
/ H
(G, Pic0(R))
/ 1
&MMMMMMMMMMM
L
7oooooooooooo
ζ
C(Θ/R)
whose row is an exact sequence. Our fourth exact sequence is given by the following.
Proposition 4.9. Let ∆(Θ) be a generalized crossed product of S with G. Then there is an
exact sequence of groups
C0(Θ/R)
S4
/ B(Θ/R)
S5
1
/ H
(G, Pic0(R)).
Proof. First we need to define S5. We construct it as the map which completes the commuta-
tivity of the diagram
C0(Θ/R)
S4
)RRRRRRRRRRRRRR
Lc
PicZ (R)(G)
L
/ C(Θ/R)
ζ
B(Θ/R)
S5
Z 1(G, Pic0(R))
1
/ H
(G, Pic0(R))
/ 1
/ 1,
whose first row is exact.
The fact that Im(S4) ⊆ Ker(S5) is easily deduced from the previous diagram and Lemma
4.8. Conversely, let Ξ = Lc([∆(Γ)]), for some [∆(Γ)] ∈ C(Θ/R), be an element in B(Θ/R)
(here f c denotes the cokernel map of f ), such that S5(Ξ) = S5 ◦ Lc([∆(Γ)]) = 1. Then
(ζ L)c ◦ ζ([∆(Γ)]) = 1, which implies that ζ([∆(Γ)]) ∈ ζ(cid:16)L(PicZ (R)(G))(cid:17). Therefore, there
exists an element [P ] ∈ PicZ (R)(G) such that [∆(Γ)]L([P ])−1 ∈ Ker(ζ) = C0(Θ/R) by
Lemma 4.8. Now, we have
S4(cid:16)[∆(Γ)]L([P ])−1(cid:17) = S4(cid:16)[∆(Γ)]L([P −1])(cid:17)
= Lc([∆(Γ)])LcL([P −1])
= Lc([∆(Γ)]) = Ξ,
and this shows that Ξ ∈ Im(S4).
26
/
&
/
/
7
/
/
_
)
/
/
/
/
/
/
4.6 The fifth exact sequence and the main Theorem.
Keep from Subsection 4.5 the definition of the group Pic0(R) with its structure of G-module.
Before stating the fifth sequence, we will need first to give a homomorphism of group from
the group H
(G, Pic0(R)) to the third cohomology group H 3
Θ(G, U (Z)).
Given a normalized 1-cocycle g ∈ Z 1(G, Pic0(R)) and put gx = [∇x]. Then, for every
1
pair of elements x, y ∈ G, one can easily shows that
xgy [Θx] = [Θx] gy.
(26)
Now, for every x ∈ G, we set
By the cocycle condition, we obtain
[Ux]
:= gx[Θx], in Pic(R).
[Uxy] = gxy[Θxy]
xgy[Θx][Θy]
= gx
(26)
= gx[Θx] gy[Θy]
= [Ux][Uy].
This means that there are R-bilinear isomorphisms
F g
x,y : Ux ⊗R Uy −→ Uxy,
(27)
1,x = id = F g
with F g
x,1 for every x ∈ G. By Proposition 2.5, we have a 3-cocycle in
Θ(G, U (Z)) attached to these maps F g
Z 3
If there is an-
other class [Vx] ∈ Pic(R) such that [Vx] = gx[Θx], for every x ∈ G. Then the families
of invertible R-bimodules {Vx}x ∈G and {Ux}x ∈G satisfy the conditions of Proposition 2.8.
Therefore, the associated 3-cocycles are cohomologous. This means that the correspondence
g 7→ [αg
Θ(G, U (Z)) is a well defined map. Henceforth, we have a well defined
homomorphism of groups
−,−, which we denote by αg
−,−,−] ∈ H 3
−,−,−.
Z 1(G, Pic0(R))
S13
g
/ H 3
Θ(G, U (Z))
/ [αg
−,−,−].
(28)
The proof of the fact that S13 is a multiplicative map uses Lemma 1.1(ii) and the twisted
natural transformation of Proposition 1.3. Completes and detailed steps of this proof are
omitted.
Proposition 4.10. Let R ⊆ S be an extension of rings with the same set of local units, and
∆(Θ) a generalized crossed product of S with G. Then the homomorphism of equation (28)
satisfies S13 ◦ ζ = [1], where ζ is the homomorphism of Lemma 4.8. Furthermore, there is a
commutative diagram of groups
PicZ (R)(G)
(ζ◦L)
/ Z 1(G, Pic0(R))
1
/ H
(G, Pic0(R))
/ 1
S13
vl l l l l l l l l l
S6
H 3
Θ(G, U (Z))
with exact row.
27
/
/
/
/
v
/
Proof. We need to check that S13 ◦ ζ([∆(Γ)]) = [1], for any element [∆(Γ)] ∈ C(Θ/R). Set
f = ζ([∆(Γ)]), so we have fx[Θx] = [Γx], for every x ∈ G. Thus, the corresponding maps
F f
−,− of ∆(Γ) relative to Γ. They
define an associative multiplication on ∆(Γ), and so induce a trivial 3-cocycle, which means
that S13(f ) = [1]. The last statement is now clear.
−.− of equation (27), are exactly given by the factors maps F Γ
At this level we are ending up with the following commutative diagram
PicZ (R)G
1
/ PicZ (R)(G)
S3
L
/ C0(Θ/R)
/ C(Θ/R)
ζ
S4
*UUUUUUUUUUUUUUUU
Lc
/ B(Θ/R)
S5
PicZ (R)(G)
(ζ◦L)
/ Z 1(G, Pic0(R))
(ζ◦L)c
1
/ H
(G, Pic0(R))
1
/ 1
S13
tjjjjjjjjjjjjj
S6
H 3
Θ(G, U (Z))
Proposition 4.11. Let ∆(Θ) be a generalized crossed product of S with G. Then there is an
exact sequence of groups
B(Θ/R)
S5
1
/ H
(G, Pic0(R))
S6
/ H 3
Θ(G, U (Z)).
Proof. It is clear from the above diagram that Im(S5) ⊆ Ker(S6) since by Proposition 4.10
(G, Pic0(R)) such that S6([h]) = 1,
S13 ◦ ζ = [1]. Conversely, let us consider a class [h] ∈ H
for some element h ∈ Z 1(G, Pic0(R)). By the same diagram, we also have that the class
S13(h) = [1] ∈ H 3
Θ(G, U (Z)), and so
there exists σ−,− : G × G → U (Z) such that
Θ(G, U (Z)). This says that S13(h) = [β], for some β ∈ B2
1
βx,y,z = σx,yz
xσy,z σ−1
x,y σ−1
xy,z,
for every x, y, , z ∈ G. Now, for each x ∈ G, we put hx[Θx] = [Ωx], and consider F h
associated family of maps as in equation (27), F h
definition the β−,−,−'s satisfy
−,− the
x,y : Ωx ⊗R Ωy → Ωxy, where x, y ∈ G. By
βx,y,z ◦ F h
x,yz ◦(cid:16)F h
x,y ⊗R Ωz(cid:17) = F h
xy,z ◦(cid:16)Ωx ⊗R F h
y,z(cid:17) ,
for every x, y, , z ∈ G. In this way, there are factor maps F Ω
−,− relative to Ω, defined by
F Ω
x,y : Ωx ⊗R Ωy
ωx ⊗R ωy
/ Ωxy
/ σx,y(e)F h
x,y(ωx ⊗R ωy),
where e ∈ U nit{ωx, ωy}. A routine computation shows that ∆(Ω) is actually a generalized
crossed product of S with G with factor maps F Ω
−,− relative to Ω.
On the other hand, since for each x ∈ G, hx ∈ Pic0(R), we have Ωx ∼ Θx. Thus
[∆(Ω)] ∈ C(Θ/R) with ζ([∆(Ω)]) = h. Whence
(ζ L)c(h) = [h] = (ζ L)c ◦ ζ([∆(Ω)]) = S5(Lc([∆(Ω)])),
which implies that [h] ∈ Im(S5), and this completes the proof.
28
_
/
_
*
/
/
/
/
/
/
/
t
/
/
/
/
/
The following diagram summarizes the information we have show so far.
H 1
Θ(G, U (Z))
S1
/ PZ (∆/R)
S2
/ PicZ (R)G
S3
/ H 2
Θ(G, U (Z))
PicZ (R)(G)
L
/ C(Θ/R)
/ B(Θ/R)
S4
)TTTTTTTTTTTTT
Lc
PicZ (R)(G)
(ζ◦L)
/ Z 1(G, Pic0(R))
(ζ◦L)c
1
/ H
(G, Pic0(R))
ζ
S5
S13
ujjjjjjjjjjjj
S6
H 3
Θ(G, U (Z))
We are now in position to announce our main result.
Theorem 4.12. Let R ⊆ S be an extension of rings with the same set of local units, and
∆(Θ) a generalized crossed product of S with a group G. Then there is an exact sequence of
groups
1
/ H 1
Θ(G, U(Z))
S1
/ PZ (∆/R)G
S2
/ PicZ (R)G
S3
/ H 2
Θ(G, U(Z))
S4
/ B(Θ/R)
S5
1
/ H
(G, Pic0(R))
S6
/ H 3
Θ(G, U(Z)).
Proof. This is a direct consequence of Corollary 4.3 and Propositions 4.5, 4.6, 4.9, and 4.11.
References
[1] G. D. Abrams, Morita equivalence for rings with local units, Commun. Algebra 11 (1983),
no. 8, 801 -- 837.
[2] P.N. Ánh and L. Márki, Rees matrix rings, J. Algebra 81 (1983), 340 -- 369.
[3] M. Auslander and O. Goldman, The Brauer group of a commutative ring, Trans. Amer.
Math. Soc. 97 (1960), 367 -- 409.
[4] M. Beattie and A. Del Río, Graded equivalences and Picard groups, J. Pure Appl. Algebra,
141 (1999), 131 -- 152.
[5] S.U. Chase, D.K. Harrison and A. Rosenberg, Galois Theory and Galois homology of
commutative rings, Mem. Amer. Math. Soc. 58 (1965), 15 -- 33.
[6] S.U. Chase and D.K. A. Rosenberg, Amitsur cohomology and the Brauer groups, Mem.
Amer. Math. Soc. 58 (1965), 34 -- 79.
[7] L. El Kaoutit, Corings over rings with local units, Math. Nachr. 282, N. 5, 726 -- 747,
(2009).
29
/
/
_
/
_
)
/
/
/
/
u
/
/
/
/
/
/
/
[8] L. El Kaoutit, Extended distributive law. Cowreath over corings., J. Algebra Appl. 9
(2010), 135 -- 171.
[9] L. El Kaoutit and J. Gómez-Torrecillas, Invertible unital bimodules over rings with local
units, and related exact sequences of groups. J. Algebra 323 (2010), 224 -- 240.
[10] A. Fröhlich, The Picard group of noncommutative rings, in particular of orders, Trans.
Amer. Math. Soc. 180 (1973), 1 -- 45.
[11] K. Hirata, Some types of separable extensions of rings, Nagoya Math. J. 33 (1968), 108 --
115.
[12] K. Hirata, Separable extensions and centralizers of rings, Nagoya Math. J. 35 (1969),
31 -- 45.
[13] T. Kanzaki, On generalized crossed product and Brauer group, Osaka J. Math. 5 (1968),
175 -- 188.
[14] Y. Miyashita, On Galois extensions and crossed product, J. Fac. Sci. Hokkaido Univ., Ser.
I, 21 (1970), 97 -- 121.
[15] Y. Miyashita, An exact sequence associated with generalized crossed product, Nagoya
Math. J. 49 (1973), 21 -- 51.
[16] C. Năstăsescu and F. Van Oystaeyen, Graded Ring Theory. North-Holland Mathematical
Library, Vol. 28, 1982.
30
|
1111.6625 | 4 | 1111 | 2012-05-08T09:44:24 | An elementary proof of the vanishing of the second cohomology of the Witt and Virasoro algebra with values in the adjoint module | [
"math.RA",
"math-ph",
"math-ph",
"math.QA",
"math.RT"
] | By elementary and direct calculations the vanishing of the (algebraic) second Lie algebra cohomology of the Witt and the Virasoro algebra with values in the adjoint module is shown. This yields infinitesimal and formal rigidity or these algebras. The first (and up to now only) proof of this important result was given 1989 by Fialowski in an unpublished note. It is based on cumbersome calculations. Compared to the original proof the presented one is quite elegant and considerably simpler. | math.RA | math |
AN ELEMENTARY PROOF OF THE VANISHING OF THE SECOND
COHOMOLOGY OF THE WITT AND VIRASORO ALGEBRA WITH
VALUES IN THE ADJOINT MODULE
MARTIN SCHLICHENMAIER
Abstract. By elementary and direct calculations the vanishing of the (algebraic) second
Lie algebra cohomology of the Witt and the Virasoro algebra with values in the adjoint
module is shown. This yields infinitesimal and formal rigidity or these algebras. The
first (and up to now only) proof of this important result was given 1989 by Fialowski in
an unpublished note. It is based on cumbersome calculations. Compared to the original
proof the presented one is quite elegant and considerably simpler.
1. Introduction
The simplest nontrivial infinite dimensional Lie algebras are the Witt algebra and its
central extension the Virasoro algebra. The Witt algebra is related to the Lie algebra of
the group of diffeomorphisms of the unit circle. The central extension comes into play as
one is typically forced to consider projective actions if one wants to quantize a classical
system or wants to regularize a field theory. There is a huge amount of literature about
the application of these algebras. Here it is not the place to give even a modest overview
about these applications.
The Witt algebra W is the graded Lie algebra generated as vector space by the elements
{en n ∈ Z} with Lie structure
[en, em] = (m − n)en+m, n, m ∈ Z.
(1.1)
The Virasoro algebra V is the universal one-dimensional central extension. Detailed def-
initions and descriptions are given in Section 2. The goal of this article is to give an
elementary proof that the second Lie algebra cohomology of both algebras with values in
the adjoint modules will vanish. The result will be stated in Theorem 3.1 below. These
cohomology spaces are related to deformations of the algebras. In particular, if they vanish
the algebras will be infinitesimal and formally rigid, see Corollary 3.2. Note that this does
Date: 28.11.2011, rev. 27.1.2012, reference update after publication 8.5.2012.
1991 Mathematics Subject Classification. Primary: 17B56; Secondary: 17B68, 17B65, 17B66, 14D15,
81R10, 81T40.
Key words and phrases. Witt algebra; Virasoro algebra; Lie algebra cohomology; Deformations of alge-
bras; rigidity; conformal field theory.
This work was finalized during a visit to the Institut Mittag-Leffler (Djursholm, Sweden) in the frame
of the program "Complex Analysis and Integrable Systems", Fall 2011. Partial support by the ESF
networking programme HCAA, and the Internal Research Project GEOMQ08, University of Luxembourg,
is acknowledged.
1
2
MARTIN SCHLICHENMAIER
not mean that the algebras are analytically or geometrically rigid. Indeed, together with
Alice Fialowski we showed in [5] that there exist natural, geometrically defined, nontrivial
families of Lie algebras given by Krichever-Novikov type algebras associated to elliptic
curves. These families appeared in [13].
In these families the special fiber is the Witt
(resp. Virasoro) algebra but all other fibers are non-isomorphic to it. Similar results for
the current, resp. affine Lie algebras can be found in [6], [7].
The result on the vanishing of the second Lie algebra cohomology of the Witt algebra
should clearly be attributed to Fialowski. There exists an unpublished manuscript [1] by
her, dating from 1989, where she does explicit calculations 1. These calculations were
quite cumbersome not really appealing for journal publication.
In 1990 Fialowski gave
the statement of the rigidity of the Witt and Virasoro algebra in [3] without proof. Later,
in the above-mentioned joint paper of the author with her [5] a sketch of its proof was
presented. It is based on the calculations of the cohomology of the Lie algebra V ect(S1)
of vector fields on S1 with values in the adjoint module. Hence, this proof is not purely
algebraic. Based on results of Tsujishita [14], Reshetnikov [12], and Goncharova [10] we
showed that
H∗(V ect(S1), V ect(S1)) = {0}.
(1.2)
See also the book of Guieu and Roger [11]. We argued that by density arguments the
vanishing of the cohomology of the Witt algebra will follow. This is indeed true if one
considers continuous cohomology. But here we are dealing with arbitrary cohomology. In
a recent attempt to fill the details how to extend the arguments to this setting, we run
into troubles. We would have been forced to make considerable cohomological changes
to obtain finally certain boundedness properties to guarantee convergence with respect to
the topology coming from the Lie algebra of vector fields. Hence, there was an incentive
to return to a direct algebraic and elementary proof. Indeed, I found a very elementary,
computational, but nevertheless reasonable short and elegant proof which is simpler than
Fialowski's original calculations [1].
As the Witt and Virasoro algebra are of fundamental importance inside of mathematics
and in the applications, and up to now there is no complete published proof, the pre-
sented proof is for sure worth-while to publish. The proof avoids the heavy machinery of
Tsujishita, Reshetnikov, and Goncharova.2
Furthermore the presented proof has the advantage that by its algebraic nature it will
be valid for every field K of characteristic zero. Moreover, this is one of the rare occasions
where algebraic cohomology is calculated. From the very beginning it was desirable to
have a purely algebraic proof of the vanishing of the algebraic cohomology.
In Section 2 we give the definition of both the Witt and Viraosoro algebra and make
some remarks on their graded structure. The graded structure will play an important role
in the article.
In Section 3 after recalling the definition of general Lie algebra cohomology the 2-
cohomology of a Lie algebra with values in the adjoint module is considered in more
1Note added after publication of the current article: The content of the mentioned note of Fialowski is
in the meantime accessible on the archive and will appear in Jour. Math. Phys. See [1] for details.
2As Fuks writes in his book [8, p.119] "Theorem 2.3.1 [Goncharova's theorem] still remains one of the
most difficult theorems in the cohomology theory of infinite-dimensional Lie algebras."
VANISHING OF THE SECOND COHOMOLOGY OF THE VIRASORO ALGEBRA
3
detail. Some facts about its relation to deformations of the algebra are quoted to allow
to judge the importance of this cohomology [7]. The main result about the vanishing of
the second cohomology and the rigidity for the Witt and Virasoro algebra is formulated
in Theorem 3.1 and Corollary 3.2. The cohomology considered in this article is algebraic
cohomology without any restriction on the cocycles.
In Section 4 we use the graded structure of the algebras to decompose their cohomology
into graded pieces. It is quite easy then to show that for degree d 6= 0, the degree d parts
will vanish. Hence, everything is reduced to degree zero. This is due to the fact that the
grading is induced by the action of a special element. Here it is the element e0.
The vanishing of the degree zero part is more involved. It will be presented for the Witt
algebra in Section 5. It is the computational core of the article, but the computations are
elementary.
In Section 6 we extend this to the Virasoro algebra V. We show that the vanishing of
the cohomology for W implies the same for its central extension V.
As the core of the proof is elementary, I want to keep this spirit throughout the article.
Hence, it will be rather self-contained and elementary. We will not use things like long
exact cohomology sequences, etc. The proofs are purely algebraic and the vanishing and
rigidity theorems are true over every field K of characteristic zero.
2. The algebras
The Witt algebra W is the Lie algebra generated as vector space over a field K by the
elements {en n ∈ Z} with Lie structure
[en, em] = (m − n)en+m, n, m ∈ Z.
(2.1)
As in the cohomology computations we have to divide by arbitrary integers we assume for
the whole article that char(K) = 0.
Remark 2.1. In conformal field theory K will be C and the Witt algebra can be realized
as complexification of the Lie algebra of polynomial vector fields V ectpol(S1) on the circle
S1, which is a subalgebra of V ect(S1), die Lie algebra of all C ∞ vector fields on the circle.
In this realization en = exp(i n ϕ) d
dϕ . The Lie product is the usual bracket of vector fields.
An alternative realization is given as the algebra of meromorphic vector fields on the
Riemann sphere P1(C) which are holomorphic outside {0} and {∞}. In this realization
en = zn+1 d
dz .
A very important fact is that the Witt algebra is a Z-graded Lie algebra. We define
the degree by setting deg(en) := n, then the Lie product between elements of degree n
and of degree m is of degree n + m (if nonzero). The homogeneous spaces Wn of degree n
are one-dimensional with basis en. Crucial for the following is the additional fact that the
eigenspace decomposition of the element e0, acting via the adjoint action on W coincides
with the decomposition into homogeneous subspaces. This follows from
[e0, en] = n en = deg(en) en.
(2.2)
4
MARTIN SCHLICHENMAIER
Another property, which will play a role, is that [W, W] = W. That means that W is a
perfect Lie algebra. In fact,
en =
1
n
[eo, en], n 6= 0,
e0 =
1
2
[e−1, e1].
(2.3)
The Virasoro algebra V is the universal one-dimensional central extension of W. As
If we set for x ∈ W, x := (0, x), and
vector space it is the direct sum V = K ⊕ W.
t := (1, 0) then its basis elements are en, n ∈ Z and t with the Lie product
[en, em] = (m − n)en+m −
1
12
(n3 − n)δ−m
n
t,
[en, t] = [t, t] = 0,
(2.4)
for all n, m ∈ Z. Here δl
k is the Kronecker delta which is equal to 1 if k = l, otherwise
zero. If we set deg(en) := deg(en) = n and deg(t) := 0 then V becomes a graded algebra.
Let ν be the Lie homomorphism mapping the central element t to 0 and x to x inducing
the following short exact sequence of Lie algebras
0 −−−−→ K −−−−→ V
ν−−−−→ W −−−−→ 0 .
(2.5)
This sequence does not split, i.e. it is a non-trivial central extension.
The expression 1
n
In some abuse of notation we identify the element x ∈ V with x ∈ W and after identifi-
cation we have Vn = Wn for n 6= 0 and V0 = he0, tiK. Note that the relation (2.2) inducing
the eigenspace decomposition for the grading element e0 = e0 remains true.
12 (n3−n)δ−m
is the defining cocycle for the central extension. This form
is given in a standard normalisation -- others are possible. It is a Lie algebra two-cocycle
of W with values in the trivial module. The equivalence classes of central extensions are
in 1:1 correspondence to the cohomology classes H2(W, K), see the next section for more
details. It is well-known that dim H2(W, K) = 1, and that the class of the above cocycle
is a generator.
3. Cohomology and Deformations
Let us recall for completeness and further reference the definition of the Lie algebra
cohomology of a Lie algebra W with values in a Lie module M over W . We denote the
Lie module structure by W × M → M, (x, m) 7→ x . m. A k-cochain is an alternating
k-multilinear map W × W × · · · × W → M (k copies of W ). The vector space of k-cochains
is denoted by C k(W ; M ). Here we will deal exclusively with algebraic cohomology.
Next we have the family of coboundary operators
δk : C k(W ; M ) → C k+1(W ; M ),
k ∈ N, with δk+1 ◦ δk = 0.
(3.1)
Here we will only consider the second cohomology
δ2ψ(x, y, z) := ψ([x, y], z) + ψ([y, z], x) + ψ([z, x], y)
− x . ψ(y, z) + y . ψ(x, z) − z . ψ(x, y),
(3.2)
(δ1φ)(x, y) := φ([x, y]) − x . φ(y) + y . φ(x).
A k-cochain ψ is called a k-cocycle if it lies in the kernel of the k-coboundary operator δk.
It is called a k-coboundary if it lies in the image of the (k − 1)-coboundary operator.
By δk ◦ δk−1 = 0 the vector space quotient of cocycles modulo coboundaries is well-
defined. It is called the vector space of k-Lie algebra cohomology of W with values in the
VANISHING OF THE SECOND COHOMOLOGY OF THE VIRASORO ALGEBRA
5
module M . It is denoted by Hk(W ; M ). Two cocycles which are in the same cohomology
class are called cohomologous.
The trivial module is K with the Lie action x . m = 0, for all x ∈ W and m ∈ K. The
second cohomology with values in the trivial module classifies equivalence classes of central
extensions of W . It is well-known that for the Witt algebra W we have dim H2(W; K) = 1
and that the class of the cocycle defining V gives a basis.
The second cohomology of W with values in the adjoint module, H2(W ; W ), i.e. with
module structure x . y := [x, y], is the cohomology to be studied here. As we will need the
formula for explicit calculations later let me specialize the 2-cocycle condition (3.2)
δ2ψ(x, y, z) := 0 = ψ([x, y], z) + ψ([y, z], x) + ψ([z, x], y)
− [x, ψ(y, z)] + [y, ψ(x, z)] − [z, ψ(x, y)].
(3.3)
A 2-cocycle will be a coboundary if it lies in the image of the (1-)coboundary operator,
i.e. there exists a linear map φ : W → W such that
ψ(x, y) = (δ1φ)(x, y) := φ([x, y]) − [φ(x), y] − [x, φ(y)].
(3.4)
The second cohomology H2(W, W ) is related to the deformations of the Lie algebra W .
(1) H2(W, W ) classifies infinitesimal deformations of W up to equivalence (Gersten-
haber [9]).
(2) If dim H2(W, W ) < ∞ then there exists a versal formal family for the formal
deformations of W whose base is formally embedded into H2(W, W ). This is due
to Fialowski [2], and Fialowski and Fuks [4].
A Lie algebra W is called rigid if every deformation is locally equivalent to the trivial
family. Hence, if H2(W, W ) = 0 then W is infinitesimally and formally rigid. See [7] for
more information on the connection between cohomology and deformations.
After having recalled the general definitions, I formulate the main result of this article.
Theorem 3.1. Both the second cohomology of the Witt algebra W and of the Virasoro
algebra V (over a field K with char(K) = 0) with values in the adjoint module vanishes,
i.e.
H2(W; W) = {0},
H2(V; V) = {0}.
(3.5)
Corollary 3.2. Both W and V are formally and infinitesimally rigid.
I refer to Section 1, the Introduction, for the history of this theorem. Here I only like to
repeat that the first proof (at least in the Witt case) was given by Alice Fialowski by very
cumbersome unpublished calculations [1] 3. The proof which I present in the following is
elementary, but much more accessible and elegant as the original proof.
3Note added after publication of the current article: In the meantime they are published, see [1] for
details
6
MARTIN SCHLICHENMAIER
4. The degree decomposition of the cohomology
Let W be an arbitrary Z-graded Lie algebra, i.e.
W = Mn∈Z
Wn.
(4.1)
Recall that we consider algebraic cohomology, i.e. our 2-cochains ψ ∈ C 2(W ; W ) are
arbitrary alternating bilinear maps in the usual sense, i.e.
for all v, w ∈ W the cochain
ψ(v, w) will be a finite linear combination (depending on v and w) of basis elements in
W . We call a k-cochain ψ homogeneous of degree d if there exists a d ∈ Z such that for
all i1, i2, . . . , ik ∈ Z and homogeneous elements xil ∈ W , of deg(xil) = il, for l = 1, . . . , k
we have that
ψ(xi1, xi2, . . . , xik ) ∈ Wn, with n =
k
Xl=1
il + d.
(4.2)
The corresponding subspace of degree d homogeneous k-cochains is denoted by C k
Every k-cochain can be written as a formal infinite sum
(d)(W ; W ).
ψ = Xd∈Z
ψ(d).
(4.3)
Note that evaluated for a fixed k-tuple of elements only a finite number of the summands
will produce values different from zero.
An inspection of the coboundary operators (3.3) and (3.4) for homogeneous elements
x, y, z shows
Proposition 4.1. The coboundary operators δk are operators of degree zero, i.e. applied
to a k-cocycle of degree d they will produce a (k + 1)-cocycle also of degree d.
In the following we will concentrate on k = 2 or k = 1. If ψ = Pd ψ(d) is a 2-cocycle
then δ2ψ = Pd δ2ψ(d) = 0. By Proposition 4.1 δ2ψ(d) is either zero or of degree d. As we
sum over different degrees and the terms cannot cancel if different from zero we obtain
that ψ is cocycle if and only if all degree d components ψ(d) will be individually 2-cocycles.
Moreover, if ψ(d) is 2-coboundary, i.e. ψ(d) = δ1φ with a 1-cochain φ, then we can find
another 1-cochain φ′ of degree d such that ψ(d) = δ1φ′.
We summarize as follows. Every cohomology class α ∈ H2(W ; W ) can be decomposed
as formal sum
α = Xd∈Z
α(d),
α(d) ∈ H2
(d)(W ; W ),
(4.4)
where the latter space consists of classes of cocycles of degree d modulo coboundaries of
degree d.
For the rest of this section let W be either W or V and d 6= 0. We will show that for
these algebras the cohomology spaces of degree d 6= 0 will vanish. The degree zero case
needs a more involved treatment and will be done in the next sections. We start with a
cocycle of degree d 6= 0 and make first a cohomological change ψ′ = ψ − δ1φ with
φ : W → W,
x 7→ φ(x) =
ψ(x, e0)
d
.
(4.5)
VANISHING OF THE SECOND COHOMOLOGY OF THE VIRASORO ALGEBRA
7
Recall e0 is the element of either W or V which gives the degree decomposition. This
implies (note that by definition φ(e0) = 0)
ψ′(x, e0) = ψ(x, e0) − (δ1φ)(x, e0) = ψ(x, e0) − φ([x, e0]) + [φ(x), e0]
= d φ(x) + deg(x)φ(x) − (deg(x) + d)φ(x) = 0.
(4.6)
We evaluate (3.3) for the cocycle ψ′ on the triple (x, y, e0) and leave out the cocycle values
which vanish due to (4.6):
0 = ψ′([y, e0], x) + ψ′([e0, x], y) − [e0, ψ′(x, y)]
= (deg(y) + deg(x) − (deg(x) + deg(y) + d))ψ′(x, y) = −dψ′(x, y).
(4.7)
As d 6= 0 we obtain ψ′(x, y) = 0 for all x, y ∈ W . We conclude
Proposition 4.2. The following hold:
(a)
(b)
H2
(d)(W; W) = H2
H2(W; W) = H2
(d)(V; V) = {0},
(0)(W; W),
for d 6= 0.
H2(V; V) = H2
(0)(V; V).
Remark 4.3. In fact the arguments also work for every Z-graded Lie algebra W for which
there exists an element e0 such that the homogeneous spaces Wn are just the eigenspaces
of e0 under the adjoint action to the eigenvalue n. Such Lie algebras are called internally
graded. See also Theorem 1.5.2 in [8].
5. Degree zero for the Witt algebra
It remains the degree zero part.
In this section we consider only the Witt algebra.
Recall that the homogeneous subspaces of degree n are one-dimensional and generated
by en. Hence, a degree zero cocycle can be written as ψ(ei, ej) = ψi,jei+j and if it
is a coboundary then it can be given as a coboundary of a linear form of degree zero:
φ(ei) = φiei. The systems of ψi,j and φi for i, j ∈ Z fix ψ and φ completely. If we evaluate
(3.3) for the triple (ei, ej, ek) we get for the coefficients
0 =(j − i)ψi+j,k − (k − i)ψi+k,j + (k − j)ψj+k,i
− (j + k − i)ψj,k + (i + k − j)ψi,k − (i + j − k)ψi,j.
For the coboundary we obtain
(δφ)i,j = (j − i)(φi+j − φj − φi).
(5.1)
(5.2)
Hence, ψ is a coboundary if and only if there exists a system of φk ∈ K, k ∈ Z such that
ψi,j = (j − i)(φi+j − φj − φi),
∀i, j ∈ Z.
(5.3)
A degree zero 1-cochain φ will be a 1-cocycle (i.e. δ1φ = 0) if and only if
(5.4)
This has the solution φi = i φ1, ∀i ∈ Z. Hence, given a φ we can always find a φ′ with
(φ′)1 = 0 and δ1φ = δ1φ′.
In the following we will always choose such a φ′ for our
2-coboundaries.
φi+j − φj − φi = 0.
Step 1: We make a cohomological change
8
MARTIN SCHLICHENMAIER
We start with a 2-cocycle ψ given by the system of ψi,j and will modify it by adding a
coboundary δ1φ with suitable φ to obtain ψ′ = ψ − δ1φ. We will determine φ inspired by
the intended relation (5.3)
ψi,1 = (1 − i)(φi+1 − φ1 − φi) = (1 − i)(φi+1 − φi).
(5.5)
Note that we could put φ1 = 0 by our normalization.
(a) Starting from φ0 := −ψ0,1 we set in descending order for i ≤ −1
1 − i
(b) φ2 cannot be fixed by (5.5), instead we use (5.3)
φi := φi+1 −
ψi,1.
1
ψ−1,2 = 3(−φ2 − φ−1),
yielding φ2 := −φ−1 −
1
3
ψ−1,2.
Then we have ψ′
(c) We use again (5.5) to calculate recursively in ascending order φi, i ≥ 3 by
−1,2 = 0.
φi+1 := φi +
1
1 − i
ψi,1.
For the cohomologous cocycle ψ′ we obtain by construction
−1,2 = ψ′
and ψ′
∀i ∈ Z,
ψ′
i,1 = 0,
2,−1 = 0.
(5.6)
(5.7)
(5.8)
(5.9)
Step2: Show that ψ′ is identical zero.
To avoid cumbersome notation we will denote the cohomologous cocycle by ψ.
Lemma 5.1. Let ψ be a 2-cocycle of degree zero such that ψi,1 = 0, ∀i ∈ Z and ψ−1,2 = 0,
then ψ will be identical zero.
Before we proof the lemma we use it to show
Proof. (Witt part of Theorem 3.1.) By Proposition 4.2 it is enough to consider degree
zero cohomology. By the cohomological change done in Step 1 every degree zero cocycle
ψ is cohomologous to a cocycle fulfilling the conditions of Lemma 5.1. But such a cocycle
vanishes by the lemma. Hence, the original cocycle ψ is cohomological trivial.
(cid:3)
Proof. (Lemma 5.1.) First, we note two special cases of (5.1) which will be useful in the
following. For the index triple (i, −1, k) we obtain
0 = − (i + 1)ψi−1,k − (k − i)ψi+k,−1 + (k + 1)ψk−1,i
− (−1 + k − i)ψ−1,k + (i + k + 1)ψi,k − (i − 1 − k)ψi,−1.
(5.10)
For the triple (i, 1, k), and ignoring terms of the type ψi,1 which are zero by assumption,
we obtain
0 = (1 − i)ψi+1,k + (k − 1)ψk+1,i + (i + k − 1)ψi,k.
(5.11)
We will consider ψi,m for certain values of m ≤ 2 and finally make ascending and de-
scending induction on m. We will call the coefficient ψi,m coefficients of level m (and of
level i by antisymmetry). By assumption the cocycle values of level 1 are all zero.
m = 0
VANISHING OF THE SECOND COHOMOLOGY OF THE VIRASORO ALGEBRA
9
By the antisymmetry we have ψ1,i = −ψi,1 = 0. In (5.11) we consider k = 0 this gives
0 = (1 − i) (ψi+1,0 − ψi,0) .
(5.12)
Starting from ψ1,0 = 0 this implies for i ≤ 0 that ψi,0 = 0 and for i ≥ 3 that ψi,0 = ψ2,0.
Next we consider (5.10) for k = 2, i = 0 and obtain
0 = −ψ−1,2 − 2ψ2,−1 + 3ψ1,0 − ψ−1,2 + 3ψ0,2 + 3ψ0,−1.
(5.13)
The ψ−1,2 terms cancel and we know already ψ1,0 = ψ−1,0 = 0, hence ψ2,0 = 0. This
implies
m = −1
In (5.11) we set k = −1 and obtain (with ψ0,i = 0)
ψi,0 = 0 ∀i ∈ Z.
− (i − 1) ψi+1,−1 + (i − 2) ψi,−1 = 0.
(5.14)
(5.15)
Hence,
ψi,−1 =
i − 1
i − 2
ψi+1,−1,
for i 6= 2,
ψi+1,−1 =
i − 2
i − 1
ψi,−1,
for i 6= 1.
(5.16)
The first formula implies starting from ψ1,−1 = −ψ−1,1 = 0 that ψi,−1 = 0, for all i ≤ 1.
The second formula for i = 2 implies ψ3,−1 = 0 and hence ψi,−1 = 0 for i ≥ 3. But by
assumption ψ2,−1 = ψ−1,2 = 0. Hence,
ψi,−1 = 0 ∀i ∈ Z.
(5.17)
m = −2
We plug the value k = −2 into (5.11) and get for the terms not yet identified as zero
(1 − i)ψi+1,−2 + (i − 3)ψi,−2 = 0.
(5.18)
This yields
ψi+1,−2 =
i − 3
i − 1
ψi,−2,
for i 6= 1,
ψi,−2 =
i − 1
i − 3
ψi+1,−2,
for i 6= 3.
(5.19)
From the first formula we get ψ3,−2 = −ψ2,−2, ψ4,−2 = 0 · ψ3,−2, and hence ψi,−2 = 0, for
all i ≥ 4.
From the second formula we get starting from ψ1,−2 = 0 that ψi,−2 = 0 for i ≤ 1.
Altogether, ψi,−2 = 0 for i 6= 2, 3. The value of ψ2,−2 = −ψ3,−2 stays undetermined for
the moment.
m = 2
We start from (5.10) for k = 2 and recall that terms of levels 0, 1, -1 are zero. This gives
− (i + 1) ψi−1,2 + (i + 3) ψi,2 = 0.
(5.20)
Hence,
ψi,2 =
i + 1
i + 3
ψi−1,2,
for i 6= −3,
ψi−1,2 =
i + 3
i + 1
ψi,2,
for i 6= −1.
(5.21)
From the first formula we start from ψ−1,2 = 0 and get ψi,2 = 0, ∀i ≥ −1. From the second
we get ψ−3,2 = −ψ−2,2, then ψ−4,2 = 0 and then altogether ψi,2 = 0 for all i 6= −2, −3.
The value ψ−3,2 = −ψ−2,2 stays undetermined for the moment.
10
MARTIN SCHLICHENMAIER
To find it we consider the index triple (2, −2, 4) in (5.1) and obtain after leaving out
terms which are obviously zero
0 = −2 ψ6,−2 − 8 ψ4,2 + 4 ψ2,−2.
(5.22)
From the level m = 2 discussion we get ψ4,2 = 0, from m = −2 we get ψ6,−2 = 0. This
shows that ψ2,−2 = ψ3,−2 = ψ−3,2 = 0 and we can conclude
ψi,−2 = ψi,2 = 0,
∀i ∈ Z.
(5.23)
m < −2
We make induction assuming it is true for m = 2, 1, 0, −1, −2. We start from (5.10) for k
and put the k − 1 level element on the l.h.s. By this
(k + 1)ψi,k−1 = terms of level k and −1.
(5.24)
By induction the terms on the r.h.s. are zero. Note that in this region k < −1, hence
k + 1 6= 0, and ψi,k−1 = 0, too.
m > 2
Again we make induction. Starting from (5.11) we get
(k − 1) ψi,k+1 = (1 − i) ψi+1,k + (i + k − 1) ψi,k.
(5.25)
As k ≥ 2 the value of 1 − k 6= 0 and we get by induction trivially the statement for k + 1.
(cid:3)
Altogether we obtain ψi,k = 0, ∀i, k ∈ Z.
The presented calculation is completely different and much simpler as in [1]
6. Extension to the Virasoro algebra
Here we show in an elementary way that also for the Virasoro algebra
H2(V, V) = 0.
(6.1)
Hence V is also infinitesimally and formally rigid. This shows the Virasoro part of Theo-
rem 3.1. It is our intention not to use any higher techniques, but see Remark 6.4 at the
end of this section.
First recall that by Proposition 4.2 it is enough to consider degree zero cocycles. We
start with a degree zero 2-cocycle ψ : V × V → V of the Virasoro algebra. If we apply the
Lie homomorphism ν we get the bilinear map ν ◦ ψ which we restrict to W × W
ψ′ = ν ◦ ψ : W × W → W.
(6.2)
Unfortunately, in general ψ′ will not be a 2-cocycle for the Witt algebra. We have to be
careful as the Lie product for V differs from that of W by multiples of the central element.
But we are allowed to make cohomologous changes.
Proposition 6.1. Given a cocycle ψ ∈ C 2(V, V) there exists a cohomologous one ψ ∈
C 2(V, V) such that the bilinear map ψ′ = ν ◦ ψ ∈ C 2(W, W).
VANISHING OF THE SECOND COHOMOLOGY OF THE VIRASORO ALGEBRA
11
Proof. Let x, y, z ∈ W. We have [x, y]V = [x, y]W + α(x, y) · t. We consider (3.3) with the
bracket [., .]V and rewrite it in terms of [., .]W (but drop the index) and α. For the second
group of terms we use that ν is a Lie homomorphism and they will not see the central
elements. Only in the first group they will play a role. We get
0 = ψ′([x, y], z) + ψ′([y, z], x) + ψ′([z, x], y)
+ α([x, y], z) ν ◦ ψ(t, z) + α([y, z], x) ν ◦ ψ(t, x) + α([z, x], y) ν ◦ ψ(t, y)
− [x, ψ′(y, z)] + [y, ψ′(x, z)] − [z, ψ′(x, y)].
(6.3)
We will make a cohomological change for the cocycle ψ in V such that ψ(t, z) will have
only central terms, i.e. ν ◦ ψ(t, z) will vanish. Restricting it to W × W and projecting it
by ν will define a 2-cocycle for W.
As ψ is a degree zero cocycle, we have ψ(e1, t) = a e1. We set φ(t) := a e0, and φ(en) := 0
for all n ∈ Z. Let ψ := ψ − δ1φ. We calculate
ψ(e1, t) = ψ(e1, t) − (δ1φ)(e1, t) = a e1 − φ([e1, t]) + [e1, φ(t)] + [φ(e1), t]
= a e1 − 0 − a e1 + 0 = 0.
The coefficients an (and b, but it will not play any role) are given by
ψ(e0, t) = a0en + b · t.
ψ(en, t) = anen, n 6= 0,
(6.4)
(6.5)
Note that a1 = 0. If we evaluate (3.3) for the triple (en, em, t) and leave out terms which
are zero due to the fact, that t is central we get
0 = ψ([en, em]V , t) − [en, ψ(em, t)]V + [em, ψ(t, en)]V .
This implies (by evaluating the coefficients at the element em+n)
(m − n)(an+m − am − an) = 0.
(6.6)
(6.7)
If we plug in m = 1 and use a1 = 0 we get an = 0 for all n ≤ 1 and an = a2 for all n ≥ 2.
Now plugging in m = 2, n = −2 we obtain a2 = −a−2 = 0. Hence altogether an = 0 for
all n, and ν ◦ ψ(w, t) = 0, ∀w ∈ V.
(cid:3)
Hence, after a cohomologous change we may assume that our restricted and projected
ψ′ will be a 2-cocycle for the algebra W with values in the adjoint module W. In the last
section we showed that it is cohomologically trivial, i.e. there exists a φ′ : W → W such
that δW
1 φ′ = ψ′ = ν ◦ ψ. We denote for a moment the corresponding coboundary operators
of the two Lie algebras by δW and δV . By setting φ(t) := 0 we extend φ′ to a linear map
φ : V → V. In particular, ν ◦ φ = φ′ if restricted to W.
The 2-cocycle ψ = ψ − δV
1 φ will be a cohomologous cocycle for V. If we apply ν then
ν ψ = νψ − νδV
1 φ = ψ′ − δW
1 φ′ = 0.
(6.8)
Hence, ψ takes values in the kernel of ν, i.e.
ψ : V × V → K · t,
(6.9)
with t the central element.
12
MARTIN SCHLICHENMAIER
This implies that it is enough to show that every class ψ : V → V with values in the
central ideal K · t will be a coboundary to show the vanishing of H2(V, V). In the following
let ψ be of this kind.
As ψ(x, y) = ψx,yt will be central the 2-cocycle condition (3.3) will reduce to
(δ2ψ)(x, y, z) = ψ([x, y], z) + ψ([y, z], x) + ψ([z, x], y) = 0.
(6.10)
The coboundary condition for φ : V → K · t reduces to
We can reformulate this as that the component function ψx,y : V × V → K is a Lie algebra
2-cocycle for V with values in the trivial module.
(δ1φ)(x, y) = φ([x, y]).
(6.11)
Lemma 6.2. We have
ψ(x, t) = 0,
∀x ∈ V.
(6.12)
Proof. We evaluate (6.10) for (ei, ej, t). As t is central [ej, t] = [t, ei] = 0, hence only the
first term in (6.10) will survive and we get (j − i)ψ(ei+j , t) = 0. Choosing j = 0 we obtain
ψ(ei, t) = 0 for i 6= 0, choosing i = −1, j = +1 we obtain also ψ(e0, t) = 0. As ψ(t, t) = 0
is automatic and {en, n ∈ Z, t} is a basis of V this shows the result.
(cid:3)
Next let φ : V → K·t be a linear map. We write for the component functions φ(ei) = φit
and φ(t) = c · t. If we evaluate the 1-coboundary operator (6.11) for pairs of basis elements
we get
δ1φ(ei, ej ) = φ([ei, ej ]) = (cid:18)(j − i)φi+j −
1
12
(i3 − i)δ−j
i c(cid:19) t,
i, j ∈ Z,
(6.13)
and by Lemma 6.2 we get δ1φ(ei, t) = 0, for all i ∈ Z.
With respect to (6.13) we choose φ such that the cohomologous cocycle ψ′ = ψ − δ1φ
fulfills
ψ′(ei, e0) = 0, ∀i ∈ Z,
and ψ′(e1, e−1) = ψ′(e2, e−2) = 0.
(6.14)
This is obtained by putting
φi := −
1
i
ψei,e0, i ∈ Z, i 6= 0, φ0 := −(1/2)ψe1,e−1,
c := (−2 ψe2,e−2 − 8φ0).
(6.15)
Lemma 6.3. The cocycle ψ′ is identically zero.
Proof. First we consider the 2-cocycle condition (6.10) for the triple (ei, ej, e0) and obtain
using ψ′(ei, t) = 0 that
0 = 0 + (−j)ψ′(ej, ei) + i ψ′(ei, ej) = (i + j)ψ′(ei, ej).
(6.16)
This yields that
(6.17)
Next we show by induction that ψ′(ei, e−i) = 0 for all i ≥ 0 (and by antisymmetry also
for i ≤ 0). Note that this is true for i = 0, 1 and 2, see (6.14). Consider (6.10) for the
triple (en, e−(n−1), e−1), n > 2. After evaluation of the Lie products we get
for j 6= −i.
ψ′(ei, ej ) = 0
0 = (−2n + 1)ψ′(e1, e−1) + (n − 2)ψ′(e−n, en) + (−n + 1)ψ′(en−1, e−(n−1)).
(6.18)
VANISHING OF THE SECOND COHOMOLOGY OF THE VIRASORO ALGEBRA
13
The first and last term vanishes by induction. As n > 2 this implies
As we have always ψ′(x, t) = 0 this shows the lemma.
ψ′(en, e−n) = 0.
(6.19)
(cid:3)
Finally we obtain that the ψ we started with was a coboundary. This implies indeed
H2(V; V) = {0}.
Remark 6.4. What has been done in this section can also be interpreted in the framework
of long exact cohomology sequences in Lie algebra cohomology. The exact sequence (2.5)
of Lie algebras is also a exact sequence of Lie modules over V. For such sequences we have
a long exact sequence in cohomology. If we consider only level two we get
· · · −−−−→ H2(V; K) −−−−→ H2(V; V)
ν∗−−−−→ H2(V; W) −−−−→ · · · .
(6.20)
Proposition 6.1 also shows that naturally H2(V; W) ∼= H2(W; W) (which is not a conse-
quence from the existence of the long exact sequence). The calculations of Lemma 6.2 and
Lemma 6.3 showed H2(V; K) = {0}. From Section 5 we know H2(W; W) = {0}. Hence,
also H2(V; V) = {0}.
References
[1] Fialowski, A.: Unpublished Note, 1989, in the meantime published as arXiv:1202.3132, to appear in
Jour. Math. Phys. 2012
[2] Fialowski, A.: An example of formal deformations of Lie algebras. In: Proceedings of NATO Con-
ference on Deformation Theory of Algebras and Applications, Il Ciocco, Italy, 1986, pp. 375 -- 401,
Kluwer, Dordrecht, 1988.
[3] Fialowski, A.: Deformations of some infinite-dimensional Lie algebras. J. Math. Phys. 31(6) 1340 -- 1343
(1990)
[4] Fialowski, A., and Fuks, D.: Construction of miniversal deformations of Lie algebras. J. Funct. Anal.
161, 76-110 (1999).
[5] Fialowski, A., and Schlichenmaier, M.: Global deformations of the Witt algebra of Krichever Novikov
type. Comm. Contemp. Math. 5, 921 -- 945 (2003).
[6] Fialowski, A., and Schlichenmaier, M.: Global Geometric Deformations of Current Algebras as
Krichever -- Novikov Type Algebras. Comm. Math. Phys. (2005), DOI 10.1007/s00220-005-1423-5.
[7] Fialowski, A., and Schlichenmaier, M.: Global Geometric Deformations of the Virasoro algebra, cur-
rent and affine algebras by Krichever-Novikov type algebras, International Journal of Theoretical
Physics. Vol. 46, No. 11 (2007) pp.2708 - 2724
[8] Fuks, D.: Cohomology of Infinite-dimensional Lie Algebras, Consultants Bureau, N.Y., London, 1986.
[9] Gerstenhaber, M.: On the deformation of rings and algebras I,II,III Ann. Math. 79, 59-10 (1964),
84, 1-19 (1966), 88, 1-34 (1968).
[10] Goncharova, I.V.: Cohomology of Lie algebras of formal vector fields on the line. Funct. Anal. Appl.
7, No.2, 6-14 (1973)
[11] Guieu, L., Roger, C.: L'alg`ebre et le groupe de Virasoro. Les publications CRM, Montreal 2007.
[12] Reshetnikov, V.N.: On the cohomology of the Lie algebra of vector fields on a circle. Usp. Mat. Nauk
26, 231-232 (1971)
[13] Schlichenmaier, M.: Degenerations of generalized Krichever-Novikov algebras on tori, Jour. Math.
Phys. 34, 3809-3824 (1993).
[14] Tsujishita, T.: On the continuous cohomology of the Lie algebra of vector fields. Proc. Japan Acad.
53, Sec. A, 134-138 (1977)
14
MARTIN SCHLICHENMAIER
University of Luxembourg, Mathematics Research Unit, FSTC, Campus Kirchberg, 6, rue
Coudenhove-Kalergi, L-1359 Luxembourg-Kirchberg, Luxembourg
E-mail address: [email protected]
|
1711.11322 | 2 | 1711 | 2019-02-12T08:39:21 | On the Prime Graph Question for Integral Group Rings of Conway simple groups | [
"math.RA",
"math.GR",
"math.RT"
] | The Prime Graph Question for integral group rings asks if it is true that if the normalized unit group of the integral group ring of a finite group $G$ contains an element of order $pq$, for some primes $p$ and $q$, also $G$ contains an element of that order. We answer this question for the three Conway sporadic simple groups after reducing it to a combinatorial question about Young tableaus and Littlewood-Richardson coefficients. This finishes work of V. Bovdi, A. Konovalov and S. Linton. | math.RA | math |
ON THE PRIME GRAPH QUESTION FOR INTEGRAL GROUP RINGS OF
CONWAY SIMPLE GROUPS
LEO MARGOLIS
Abstract. The Prime Graph Question for integral group rings asks if it is true that if the
normalized unit group of the integral group ring of a finite group G contains an element of order
pq, for some primes p and q, also G contains an element of that order. We answer this question
for the three Conway sporadic simple groups after reducing it to a combinatorial question about
Young tableaux and Littlewood-Richardson coefficients. This finishes work of V. Bovdi, A.
Konovalov and S. Linton.
1. Introduction
The unit group of the integral group ring ZG of a finite group G has given rise to many inter-
esting research questions and results, as recorded e.g. in the monographs [Seh93, JdR16]. Many
of these questions concern the connection between finite subgroups of units of ZG and the group
base G, e.g. the Isomorphism Problem which was open for over 50 years until answered by Her-
tweck [Her01] or the recently answered Zassenhaus Conjecture [EM18] which was open for over
40 years. For both questions there turned out to be counterexamples. In this light the weaker
versions of the former Zassenhaus Conjecture, which are still open, become more important. One
of these versions, the so-called Prime Graph Question, gained attention after being introduced by
Kimmerle in [Kim06]. To formulate it denote by V(ZG) the group of the so-called normalized
units in ZG, i.e. the units whose coefficients sum up to 1.
Prime Graph Question: Let G be a finite group and p and q some primes. If V(ZG) contains
an element of order pq, does G contain an element of order pq?
The prime graph Γ(G) of a group G is a graph whose vertices are the primes appearing as orders
of elements in G and two vertices p and q are connected if and only if G contains an element of
order pq. Hence the Prime Graph Question can also be formulated as: For G a finite group, does
Γ(G) = Γ(V(ZG)) hold?
The Prime Graph Question seems particularly approachable, since, in contrast to other ques-
tions on the finite subgroups in V(ZG), a reduction result is available here: The Prime Graph
Question holds for a group G, if it holds for all almost simple images of G [KK17, Theorem
2.1]. Recall that a group A is called almost simple if it is isomorphic to a subgroup of the auto-
morphism group of a non-abelian simple group S containing the inner automorphisms of S, i.e.
S ∼= Inn(S) ≤ A ≤ Aut(S). In this case S is called the socle of A.
It is known that the Prime Graph Question has a positive answer for almost simple groups
with socle isomorphic to a projective special linear group PSL(2, p) or PSL(2, p2) for p a prime
[BM17b, Theorem A] or an alternating group of degree up to 17 [BC17]. The question also has
a positive answer for groups whose order is divisible by exactly three pairwise different primes
[KK17, BM17c] and many almost simple groups whose order is divisible by four pairwise different
primes [BM18b].
This research was partially supported by the European Commission individual Marie Curie-Skłodowska Fellow-
ship in the H2020 program under Grant 705112-ZC and the FWO (Research Foundation Flanders).
2010 Mathematics Subject Classification. Primary 16U60, 16S34. Secondary 20C05, 20C20, 05E10.
Key words and phrases. Unit Group, Group Ring, Prime Graph Question, Sporadic simple groups.
1
2
LEO MARGOLIS
Employing a computer implementation of a method introduced by Luthar and Passi [LP89] and
Hertweck [Her07], nowadays known as the HeLP method, in a series of papers between 2007 and
2012 Bovdi, Konovalov and different collaborators of them studied the Prime Graph Question for
sporadic simple groups [BKS07, BK07a, BK07b, BKL08, BKM08, BK08, BGK09, BK09, BK10,
BJK11, BKL11, BK12]. Overall they studied 17 sporadic simple groups and were able to prove
the Prime Graph Question for 13 of these groups, an overview of their results can be found in
[KK15, Section 5]. Also in [KK15, Corollary 5.4] it was recorded that the Prime Graph Question
holds for almost simple groups with a socle isomorphic to one of the 13 sporadic simple groups
for which Bovdi, Konovalov et al. proved the Prime Graph Question. The four groups studied by
Bovdi, Konovalov et al. for which they were not able to prove the Prime Graph Question were the
O'Nan simple group [BGK09] and the three Conway simple groups [BKL11]. Developing further
the combinatorial side of a method introduced in [BM17c] in this note we obtain a positive answer
for the Prime Graph Question for the latter groups. This is the first contribution to the Prime
Graph Question for sporadic simple groups since the papers of Bovdi, Konovalov et al.
Theorem 1.1. The Prime Graph Question has a positive answer for the sporadic Conway simple
groups Co3, Co2 and Co1.
Note that the outer automorphism group of each Conway simple group is trivial, so Theorem 1.1
proves the Prime Graph Question also for every almost simple group whose socle is isomorphic to
a Conway simple group.
To describe our main tool let us first introduce some notation. Let G be a finite group, u ∈
V(ZG) a unit of order n and χ an ordinary character of G with corresponding representation D.
Then we can extend D linearly to ZG and afterwards restrict it to V(ZG), obtaining an extension
of D and χ. In particular D(u) is then a matrix of finite order dividing n. Let ξ be an n-th root
of unity. Then we denote by µ(ξ, u, χ) the multiplicity of ξ as an eigenvalue of D(u). Moreover
for an integer k we will denote by ζk a primitive k-th root of unity. Then the results given above
will follow from an application of the following theorem.
Theorem 1.2. Let G be a finite group, p an odd prime and m a positive integer not divisible by
p. Assume that some p-block of G is a Brauer Tree Algebra with ordinary characters χ1, ...,χp
and with the Brauer tree being a line of the form
χ1
χ2
χ3
χp−2
χp−1
χp
.
Moreover assume that in the rings of values of χ1, ...,χp the prime p is unramified.
Let u ∈ V(ZG) be a unit of order pm and let ξ be some m-th root of unity. Then the inequality
µ(ξ · ζp, u, χp−1) − µ(ξ · ζp, u, χp) ≤ µ(ξ, u, χ1) −
p−2
X
(−1)iµ(ξ · ζp, u, χi)
holds.
i=1
This theorem might be regarded as a generalization of [BM18b, Proposition 3.2]. The condition
on the unit can also be formulated in terms of character values which makes the inequality easier
to check by hand, although it becomes much longer then, cf. Lemma 2.3.
Theorem 1.2 will be achieved using the so-called lattice method introduced in [BM17c] and
developed further in [BM18b]. It is typical for the study of group rings that different fields of
mathematics, such as group theory, ring theory, representation theory and number theory are
combined to achieve results. In the present paper the main tool is combinatorics, more precisely
calculations with Young tableaus and Littlewood-Richardson coefficients, cf. the proof of Theo-
rem 1.2. It is quite plausible that Theorem 1.2, which is the main tool to prove Theorem 1.1, can
be applied also to study the Prime Graph Question or related questions for many other groups.
Also the methods presented here could be used to prove variations of Theorem 1.2, in particular
for other forms of Brauer trees.
We will also need to use the HeLP method to obtain enough restrictions on torsion units which
allow the application of Theorem 1.2. We will start by recalling the needed methods in Section 2,
ON THE PRIME GRAPH QUESTION FOR INTEGRAL GROUP RINGS OF CONWAY SIMPLE GROUPS
3
develop the necessary combinatorics in Section 3, continue to prove Theorem 1.2 and finally show
how this can be applied to prove Theorem 1.1 in Section 4.
2. Preliminaries and methods
A fundamental notion when studying torsion units of integral group rings are so-called partial
augmentations. Let u ∈ ZG be an element of the form Pg∈G zgg and denote by xG the conjugacy
class of an element x in G. Then εxG(u) = Pg∈xG zg is called the partial augmentation of u at
x. A fundamental theorem of Hertweck [Her07, Theorem 2.3] states that if u ∈ V(ZG) is a unit
of order n then εxG(u) 6= 0 implies that the order of x divides n. This implies in particular that
the exponents of G and V(ZG) coincide, a result due originally to Cohn and Livingstone [CL65].
Moreover ε1(u) = 0 unless u = 1 by the Berman-Higman Theorem [JdR16, Proposition 1.5.1].
2.1. The HeLP method. Partial augmentations are class functions and as such can be investi-
gated using representation theory. Note that if χ is an ordinary character of G and u ∈ V(ZG)
a torsion unit of order n then χ(u) = PxG εxG(u)χ(g), where the sum runs over the conjugacy
classes of G. It was shown by Hertweck [Her07, Theorem 3.2] that this also holds for p-Brauer
characters, if p is not a divisor of n and the sum is understood to run on p-regular conjugacy
classes of G. On the other hand if we are given the partial augmentations of u and its powers
we can compute the eigenvalues, including multiplicities, of u under any ordinary or p-modular
representation of G, again assuming p is not dividing n. These multiplicities can be expressed in
explicit formulas, depending on the partial augmentations of u and its powers, and that the results
of these formulas are non-negative integers is the basic idea of the HeLP method, cf.
[BM17b,
Section 2] for a detailed explanation and [Her07] for the proofs.
Hence there is an algorithmic method which allows to obtain restrictions on the possible partial
augmentations of torsion units in V(ZG), provided we have some knowledge on the characters of
G. If we apply the HeLP method to the whole character table of G then, for any fixed n, we will
obtain a finite number of possibilities for the partial augmentations of units of order n in V(ZG).
If it happens that we obtain no possibility for units of some given order n, then we know that
there exist no units at all in V(ZG) of order n. This is the basic idea in the application of the
HeLP method for the study of the Prime Graph Question and in this way Bovdi, Konovalov et
al. gave their proofs for 13 sporadic groups. We will also rely on the HeLP method to produce
a finite number of possibilities for the partial augmentations of units of certain orders and then
Theorem 1.2 will do the rest. We will apply here a computer implementation of the HeLP method
as a package [BM17a] in the computer algebra system GAP [GAP17]. This package can also be
used to reproduce the results of Bovdi, Konovalov et al.
2.2. The lattice method. The lattice method is an other method which makes use of the mul-
tiplicities of eigenvalues of a torsion unit u ∈ V(ZG) of order n under ordinary representations of
G. This method was introduced in [BM17c] and the basic idea consists in obtaining restrictions
on the simple kG-modules when viewed as khui-modules, where k is a field of characteristic p
for a divisor p of n. These simple kG-modules are the p-modular composition factors of ordinary
representations of G and studying different ordinary representations with common composition
factors can finally produce a contradiction to the existence of u.
We will only recall those parts of the lattice method necessary for our means in this article.
We will cite the articles [BM17c, BM18b] where this method is explained, but many facts can be
found in text books on representation theory. First of all let C = hci be a cyclic group of order
pm where p is a prime and m an integer not divisible by p. Let k be a field of characteristic
p containing a primitive m-th root of unity ξ. Then there are, up to isomorphism, exactly pm
indecomposable kC-modules determined by a pair (i, j) where 1 ≤ i ≤ p, 1 ≤ j ≤ m such that a
module M corresponding to (i, j) is i-dimensional as a k-vector space and cp acts as ξj on M . We
denote this module by I j
i and if the action of cp is clear from the context or if m = 1 we simply
write Ii. The module I j
i is simple if and only if i = 1 and each I j
i is uniserial [BM17c, Proposition
2.2].
4
LEO MARGOLIS
Now assume that M is a kC-module, d-dimensional as k-vector space, such that cp acts as ξj
on M for some fixed j. Then by the above we know that M ∼= apIp ⊕ ap−1Ip−1 ⊕ · · · ⊕ a1I1 for
certain non-negative integers a1, ..., ap. Moreover app + ap−1(p − 1) + ... + a1 = d and hence
λ = (p, ..., p
{z }
ap
, p − 1, ..., p − 1
}
{z
ap−1
, . . . , 1, ..., 1
)
{z }a1
is a partition of d. We call λ the partition corresponding to M .
A common framework to work with partitions using combinatorics is provided by considering
Young tableaux and several notions connected with these tableaux. We recall here quickly those
of them we will need in this paper. They all can be found in several textbooks on algebraic
combinatoric as e.g. [Ful97]. A Young diagram corresponding to a partition λ = (λ1, ..., λr) is
a diagram consisting of boxes ordered in rows and columns such that the first row contains λ1
boxes, the second row λ2 boxes etc. A skew diagram is obtained by removing a smaller Young
diagram from a larger one that contains it. I.e. if µ = (µ1, ..., µr) ≤ λ = (λ1, ..., λr), meaning
that µi ≤ λi for all i, then the skew diagram corresponding to λ/µ is obtained by erasing from
the Young diagram corresponding to λ, always from left to right, µ1 boxes in the first row, µ2
boxes in the second row etc. If we fill a skew diagram with entries from an alphabet (in our case
the alphabet always will be the positive integers) a skew diagram becomes a skew tableau T . By
"filling" we mean writing a letter in every box. T is called semistandard if reading a row from left
to right the entries do not decrease and reading a column from top to bottom the entries strictly
increase.
For a box b in a skew tableau T we denote by w(b) the word which we obtain reading T from
top to bottom and from right to left until b, including the entry in b. We denote by w(T ) the
word which we obtain reading all boxes of T in this way, i.e.
if b is the lowest box in the first
(i.e. most left) column of T then w(b) = w(T ). We say that T satisfies the lattice property if for
every box b in T the word w(b) contains the letter 1 at least as many times as the letter 2, the
letter 2 at least as many times as 3 etc. If the maximal letter of w(T ) is s and w(T ) contains
ν1 times the letter 1, ν2 times the letter 2 etc. then ν = (ν1, ..., νs) is called the content of T .
Note that if T is a skew tableau satisfying the lattice property then the content ν = (ν1, ..., νs)
of T is a partition of ν1 + ... + νs as then ν1 ≥ ν2 ≥ ... ≥ νs. If now ν is some partition then the
Littlewood-Richardson coefficient cλ
µ,ν is the number of semistandard skew tableaux corresponding
to λ/µ which satisfy the lattice property and have content ν. A fact of fundamental importance
to us is that the Littlewood-Richardson coefficient cλ
µ,ν is symmetric in µ and ν.
These combinatorial objects play a role in the study of torsion units of group rings via the
following observation [BM18b, Theorem 2.8].
Theorem 2.1. Let C = hci be a cyclic group of order p, for p a prime, and k a field of charac-
teristic p. Let M, U and Q be kC-modules with corresponding partitions λ, µ and ν respectively.
Then M contains a submodule U isomorphic to U such that M/ U ∼= Q if and only if cλ
µ,ν 6= 0.
To pass from multiplicities of eigenvalues under ordinary representations to modules over mod-
ular group algebras we will employ the following [BM17c, Propositions 2.3, 2.4].
Proposition 2.2. Let C = hci be a cyclic group of order pm such that p does not divide m. Let
R be a complete local ring of characteristic 0 containing a primitive m-th root of unity ξ such that
p is contained in the maximal ideal of R and not ramified in R. Denote by k the residue class field
of R and adopt the bar-notation for reduction modulo the maximal ideal of R.
Let D be a representation of C such that the eigenvalues of D(u) in the algebraic closure of the
quotient field of R, with multiplicities, are ξA1, ξ2A2, . . . , ξmAm for certain multisets Ai consisting
of p-th roots of unity. Here also Ai = ∅ is possible. Let ζ be a non-trivial p-th root of unity. Note
that since the sum of the eigenvalues of D(u) is an element in R we know for every i that if Ai
contains ζ exactly r times then Ai contains also ζ2, ...,ζ p−1 exactly r times.
Let M be an RC-lattice affording the representation D. Then
M ∼= M1 ⊕ M2 ⊕ ... ⊕ Mm
ON THE PRIME GRAPH QUESTION FOR INTEGRAL GROUP RINGS OF CONWAY SIMPLE GROUPS
5
such that for every i we have: If Ai contains ζ exactly r times and 1 exactly s times then
Mi ∼= aI i
p ⊕ (r − a)I i
p−1 ⊕ (s − a)I i
1
for some non-negative integer a ≤ min{r, s}.
For u ∈ V(ZG) a unit of order pm for which we know the partial augmentations, including
those of its powers, these facts allow to derive information on the isomorphism type of simple
kG-modules, for k a big enough field of characteristic p, from the eigenvalues of u under ordinary
representations of G, see the proof of Theorem 1.2, or [BM17c] for a more detailed sketch of the
method.
2.3. A reformulation using character values. The multiplicities in Theorem 1.2 can be com-
puted from the partial augmentations of u and its proper powers. This can be done by hand or using
the GAP-package HeLP [BM18a], more precisely the command HeLP_MultiplicitiesOfEigenvalues.
The theorem can however also be translated in a condition on character values, so that the condi-
tion of Theorem 1.2 can be more easily checked without using GAP (or just to look up the character
values). This is particularly handy if the characters in question only have integral values and the
following lemma provides a way to do this.
Lemma 2.3. Let G be a finite group and u ∈ V(ZG) a unit of order pq where p and q are different
primes. Let χ be a character of G which takes only integral values. Set χ(1) = d, χ(up) = x,
χ(uq) = y and χ(u) = z. Then the following formulas hold.
pq · µ(1, u, χ) = d + (q − 1)x + (p − 1)y + (p − 1)(q − 1)z,
pq · µ(ζp, u, χ) = d + (q − 1)x − y − (q − 1)z,
pq · µ(ζq, u, χ) = d − x + (p − 1)y − (p − 1)z,
pq · µ(ζpq, u, χ) = d − x − y + z.
p, u, χ), for i not divisible by q we have µ(ζq, u, χ) = µ(ζ i
Proof. Recall that the sum over all primitive p-th or q-th roots of unity is −1 while the sum over
all primitive pq-th roots of unity is 1. Note that for i not divisible by p we have µ(ζp, u, χ) =
µ(ζ i
q, u, χ) and for i not divisible by
pq also µ(ζpq, u, χ) = µ(ζ i
pq, u, χ). Denote by D a representation corresponding to χ. So if e.g.
µ(ζp, u, χ) = k, i.e. ζp appears k times as an eigenvalue of D(u), then also each other primitive
p-th root of unity appears k times and together they contribute −k to χ(u) = tr(D(u)). Moreover
thinking of D(u) as a diagonalized matrix and taking the p-th power in D(up) each of these
eigenvalues becomes 1 and so they contribute (p − 1) · k to χ(up).
Arguing in the same manner for primitive pq-th roots of unity we obtain that they contribute
µ(ζpq, u, χ) to χ(u), while contributing e.g. (q − 1)µ(ζpq, u, χ) to χ(uq) as they become primitive
primitive p-roots of unity as eigenvalues of D(uq).
Employing the same arguments for all roots of unity involved in D(u) we obtain:
χ(1) = µ(1, u, χ) + (p − 1)µ(ζp, u, χ) + (q − 1)µ(ζq, u, χ) + (p − 1)(q − 1)µ(ζpq, u, χ),
χ(uq) = µ(1, u, χ) − µ(ζp, u, χ) + (q − 1)µ(ζq, u, χ) − (q − 1)µ(ζpq, u, χ),
χ(up) = µ(1, u, χ) + (p − 1)µ(ζp, u, χ) − µ(ζq, u, χ) − (p − 1)µ(ζpq, u, χ),
χ(u) = µ(1, u, χ) − µ(ζp, u, χ) − µ(ζq, u, χ) + µ(ζpq, u, χ).
The lemma now follows by linear transformations.
(cid:3)
3. Combinatorics
The main result of this section, which is the main ingredient in the proof of Theorem 1.2,
is Proposition 3.5.
It provides bounds on the possible entries in a semistandard skew tableau
satisfying the lattice property for a special form of skew tableaux which are typical for our intended
application.
6
LEO MARGOLIS
Definition 3.1. We call a skew diagram of form A if it consists of p columns such that the second
to (p − 1)-th column all end at the same row, say the m-th row. This is equivalent to saying that
there is a number m such that for a box b in the first to (p − 2)-th column and in the k-th row,
for k ≤ m, there is always a box to the right of b and moreover the second column contains no
box in the (m + 1)-th row. Furthermore we also allow the p-th column to be empty.
We call the boxes in the first to (p − 1)-th column which lie in the m-th row and above the body
of the skew diagram. The boxes of the first column lying below the m-th row are called the tail
and the p-th column the head of the tableau.
For a semistandard skew tableau T satisfying the lattice property we denote by γi(T ) the
number of letters which appear at least i times in w(T ).
Example 3.2. In Figure 1 the upper skew diagram is of form A while the lower one is not. In the
first skew diagram the boxes in the head are marked with h, the boxes of the body with b and the
boxes of the tail with t.
h
b h
b
b
b
b
b
b
b
b
b
b
t
t
Figure 1. A skew diagram of form A and not of form A
Remark: We clarify our way of speaking about the location of a box in a skew tableau relative
to another box, so that the following proofs become more readable. Let b be a box in a skew
tableau T . If we speak about the box lying right from b we mean the unique box neighbouring b
on the right. This box will be denoted by br then. If we speak about a box lying right from b this
can be any box lying in a column of T which lies to the right of the column containing b. We will
also use a different notation for these kind of boxes.
We speak the same way of boxes lying to the left, above or below b.
Lemma 3.3. Let T be a semistandard skew tableau of form A with p columns satisfying the lattice
property. Let b be a box in the k-th column lying in the body of T with entry e where 1 ≤ k ≤ p − 1.
Then w(b) contains e at least (p − k) times.
Proof. We will argue by decreasing induction. For k = p − 1 the claim is clear, since being the
entry in b the letter e appears in w(b) at least once. So let k < p − 1 and let er be the entry in
the box br right from b. Note that br exists by the assumption that T is of form A and b a box
in the body of T . Then by induction the letter er appears at least p − k − 1 times in w(br). As
e ≤ er, since T is semistandard, and w(br) satisfies the lattice property also e must appear at least
p − k − 1 times in w(br). Hence e appears at least p − k times in w(b).
(cid:3)
ON THE PRIME GRAPH QUESTION FOR INTEGRAL GROUP RINGS OF CONWAY SIMPLE GROUPS
7
Lemma 3.4. Let T be a semistandard skew tableau of form A with p columns satisfying the lattice
property. Let 1 ≤ k ≤ p − 2 and let b be a box in the k-th column of T inside the body of T with
entry e. Assume that the box right from b is the h-th box in the (k + 1)-th column of T . Then
e ≤ h.
Proof. Assume that reading from top to bottom and right to left b is the first box contradicting
the claim. In particular, e > h. Let br be the box right from b with entry er. We will show that
the (k + 1)-th column contains every letter 1, 2, ...,e − 1. As T is semistandrad the entries in the
(k + 1)-th column of T are strictly increasing when read from top to bottom. So assuming that
the column contains all entries between 1 and e − 1 the entry in the first box of the column must
in fact be 1, the entry in the second box 2, ..., the entry in the (e − 1)-th box must be e − 1. In
particular, as e > h, the h-th box will contain h, meaning h = er < e, contradicting that T is a
semistandard tableau. So once we show that the (k + 1)-th column contains every letter 1, 2, ...,
e − 1 the lemma will follow by contradiction.
We will show also that when bk+1 is a box in the (k + 1)-th column containing an entry es
smaller than e then this entry appears exactly p − k times in w(bk+1) and if the box left from bk+1
exists then the entry of this box is strictly smaller than es.
We will argue by decreasing induction. So we will first show that the (k + 1)-th column contains
the letter e − 1, that if bk+1 denotes the box in the (k + 1)-th column containing e − 1, then e − 1
appears in w(bk+1) exactly p − k times and if the box left from bk+1 exists its entry is strictly
smaller than e − 1. By Lemma 3.3 the word w(b) contains the letter e at least p − k times and
so w(b) also contains every letter smaller than e at least p − k times, as w(b) satisfies the lattice
property. By assumption b is the first box violating the lemma when going through the tableau
top to bottom and right to left. So if the box ba above b exists and has entry ea then the box right
from ba is the (h − 1)-th box in the (k + 1)-th column. So ea ≤ h − 1 and e − ea > h − (h − 1) = 1.
In any case, if ba exists or not, we have that the k-th column does not contain the entry e − 1, as
the entries in the k-th column must strictly increase and there are no boxes between the entries
ea and e. Note that then also e − 1 is not the entry in a box lying above b and to the left of b,
since this would be a box contradicting the fact that T is semistandard. Since w(b) contains e − 1
at least p − k times and w(b) does not take into account boxes lying below b as well as boxes lying
left from b and not above b, we conclude that every column right from b must contain e − 1. In
particular, the (k + 1)-th column. Moreover if bk+1 is the box in the (k + 1)-th column containing
e − 1 then e − 1 appears exactly p − k times in w(bk+1), as the boxes between bk+1 and b (counted
right to left and top to bottom) do not contain the letter e − 1. Furthermore bk+1 is a box above
br, since otherwise er ≤ e − 1 < e, which would contradict the fact that T is semistandard. Since
the k-th column does not contain e − 1 the box lying left from bk+1, if it exists, must contain an
entry smaller than e − 1, since T is semistandard. This proofs the base case of our induction.
The arguments for the induction step are very similar to the arguments for the base case. So
assume that es ≤ e − 1 is an entry contained in the box bk+1 which lies in the (k + 1)-th column,
that es appears exactly p − k times in w(bk+1) and that the box left from bk+1, if existent, contains
an entry smaller than es. Denote the box left from bk+1, if existent, by (bk+1)l. Then (bk+1)l
contains an entry strictly smaller than es by induction. So the the box above (bk+1)l, if existent,
has maximal entry es − 2, as T is semistandard. In particular es − 1 is not an entry in a box lying
above and to the left of bk+1. But, by Lemma 3.3, the word w(bk+1) contains es at least p − k
times, so it contains es − 1 at least p − k times and we get that es − 1 must be an entry in the
(k + 1)-th column. So it must lie in the box (bk+1)a above bk+1. Then es − 1 appears exactly p − k
times in w((bk+1)a), as it does not appear in a box above and to the left of (bk+1)a. Also, the box
left from (bk+1)a, if existent, contains an entry smaller than es − 1. This finishes the induction
step and thus the lemma is proved.
(cid:3)
Proposition 3.5. Let T be a semistandard skew tableau of form A with p columns satisfying the
lattice property. Let 1 ≤ k ≤ p − 1 and let h be the height of the k-th column inside the body of
T , i.e. the number of boxes in the k-th column of T which lie in the body (so if k = 1 we do not
count the boxes in the tail).
Then γp−k(T ) ≥ h and if k ≥ 2 then γp−k+2(T ) ≤ h.
8
LEO MARGOLIS
Proof. Let b be the lowest box in the k-th column and assume the entry of b is e.
Then just for the reason that the entries in a column are strictly increasing we have h ≤ e. By
Lemma 3.3 the entry e appears in w(b) at least p − k times, so each letter 1, 2 ..., h appears at
least p − k times in w(T ) and hence γp−k(T ) ≥ h.
So assume k ≥ 2 and assume s = γp−k+2(T ) > h. By Lemma 3.4 the maximal possible entry
in the box left from b, if this box exists, is h. So also an entry in a box to the left from b which
lies in the body is at most h (note that there is no box below b anywhere in the body, as b is the
lowest box in its column and T of form A). So inside the body an entry bigger than h does not
appear in the 1st to (k − 1)-th column. Hence each letter h + 1, ..., s must appear in the tail and
in the k-th column and every column right from the k-th column, as otherwise it can not appear
p − k + 2 or more times in total. We will show that the k-th column then contains every letter
1,..., s, which will yield the final contradiction, since clearly the k-th column can not contain more
than h entries. The proof is similar to the proof of Lemma 3.4.
Let b be the box in the k-th column containing s. Note that also s can not appear in a box
lying below and to the right of b, as T is semistandard. Then s appears in w(b) exactly p − k + 1
times, since it appears at least overall p − k + 2 times in w(T ) and it does not appear in the 1st
to (k − 1)-th column inside the body. The box left from b, if existent, contains an entry smaller
than h, so also smaller than s, by Lemma 3.4. We will show by decreasing induction that the
k-th column contains every entry e between 1 and s such that if be is the box containing e then e
appears exactly p − k + 1 times in w(be) and the box left from be, if existent, contains an entry
smaller than e. By the above this holds for e = s, providing the base case of the induction.
So assume that this holds for a certain e + 1 and let be+1 be the box in the k-th column
containing e + 1. Denote by (be+1)a, if it exists, the box above be+1 and by (be+1)l, if it exists,
the box to the left of be+1. If (be+1)l exists its entry is at most e, by induction. So if the box
above (be+1)l exists its entry is at most e − 1. This implies that any entry lying to the left and
not below (be+1)a is smaller than e. Since by induction e + 1 appears exactly p − k + 1 times in
w(be+1), also e appears at least p + k − 1 times in w(be+1). Combining this with the conclusion
before, we see that (be+1)a must exist and its entry must be e. Moreover the letter e appears
exactly p − k + 1 times in w((be+1)a) and the box to the left of (be+1)a contains an entry smaller
than e. This finishes the induction step and hence the proof.
(cid:3)
4. Proofs of main results
We proceed to prove Theorem 1.2. For the basic facts about Brauer trees we refer to [HL89].
Here we will only need that if (K, R, k) is a p-modular system such that the characters labelling
the vertices of the Brauer tree are afforded by RG-modules then each edge of the Brauer tree
corresponds to a simple kG-module, each vertex of the Brauer tree corresponds to a simple RG-
module with the given character and after reducing such a simple RG-module modulo the maximal
ideal of R the composition factors of this module are those corresponding to the adjacent edges,
each with multiplicity 1.
Proof of Theorem 1.2: Let R be a complete discrete valuation ring containing a primitive m-th
root of unity such that R is an algebraic extension of Zp, representations affording the characters
..., χp can be realized over R and p is unramified in R. Such a ring R exists by a result
χ1,
of Fong [BM18b, Remark 2.5]. Let k be the residue class field of R. We use the bar-notation
to denote reduction modulo the maximal ideal of R also with respect to modules. Let M be a
khui-module. Adapting the notation from skew tableaus we denote by γi(M ) the number of direct
indecomposable summands of M of dimension at least i.
Let M ′
1, ..., M ′
1, ..., S ′
p be RG-modules corresponding to the characters χ1, ..., χp and let, as explained
p respectively on which up acts
in Proposition 2.2, M1, ..., Mp be the direct summands of M ′
as ξp. Let S ′
p−1 be the simple kG-modules corresponding to the edges of the Brauer tree
in the natural order, i.e. S ′
i corresponds to the edge with vertices χi and χi+1. Let S1, ..., Sp−1
p−1 respectively on which up acts as ξp. We will view Mi
be the direct summand of S ′
1,
and Si as khui-modules, unless explicitly stated otherwise. Let λi be the partition corresponding
to Mi and µi be the partition corresponding to Si, in the sense of Section 2.2. Note that by
1, ..., M ′
..., S ′
ON THE PRIME GRAPH QUESTION FOR INTEGRAL GROUP RINGS OF CONWAY SIMPLE GROUPS
9
Proposition 2.2 if Sj is a submodule of Mi then the skew diagram corresponding to λi/µj is of
form A with p columns, since the indecomposable summands of Mi are all of dimension 1, p − 1
or p, i.e. the possible length of rows in a Young diagram corresponding to λi are 1, p − 1 and p.
We will use the following fact several times.
Claim: If we want to compute the possible isomorphism types of Si for some 1 < i < p − 1
using Theorem 2.1 we can consider a semistandard skew tableau satisfying the lattice property of
form λi/µi−1 or λi+1/µi+1.
Proof of the claim: The composition factors of M ′
properties of Brauer trees. If S ′
i−1 is a submodule of M ′
Si corresponds to a skew tableau of form λi/µi−1 and cλi
submodule of M ′
µi,µi−1 6= 0. As the Littlewood-Richardson coefficient is symmetric this also implies cλi
cλi
So it suffices to consider λi/µi−1, or rather the question if cλi
i as kG-module are S ′
i by the
i as kG-module then Si ∼= Mi/Si−1. So
µi−1,µi 6= 0. If on the other hand S ′
i is a
i as kG-module then Si−1 corresponds to a skew tableau of the form λi/µi and
µi−1,µi 6= 0.
i−1 and S ′
µi−1,µi 6= 0.
If S ′
i is a submodule of M ′
On the other hand we can consider M ′
i+1 as kG-module which has composition factors S ′
S ′
i+1.
a skew tableau of form λi+1/µi and cλi+1
corresponds to a skew tableau of the form λi+1/µi+1 and cλi+1
Littlewood-Richardson coefficient implies that it suffices to consider if cλi+1
the proof of the claim.
i and
i as kG-module then Si+1 ∼= Mi+1/Si. So Si corresponds to
µi,µi+1 6= 0. On the other hand, as in the case before, Si
6= 0. The symmetry of the
µi+1,µi 6= 0. This finishes
µi+1,µi
We will next show that
(1)
and also
(2)
γp−2(Sp−2) ≥ µ(ξ · ζp, u, χp−1) − µ(ξ · ζp, u, χp)
γp−2(Sp−2) ≤ µ(ξ, u, χ1) −
p−2
X
(−1)iµ(ξ · ζp, u, χi)
i=1
which will imply the theorem. First by the claim above the isomorphism type of Sp−2 can be
described by a semistandard skew tableau T satisfying the lattice property of shape λp−1/µp−1.
Note that µp−1 = λp since Mp ∼= Sp−1, as Mp corresponds to a vertex of the Brauer tree which
has only one neighbour. By Proposition 3.5 we know that γp−2(T ) = γp−2(Sp−2) is at least as big
as the height of the second column of T . Now by Proposition 2.2 the number of indecomposable
direct summands of dimension at least 2 in Mp−1, i.e. the number of rows of length at least 2 in a
Young diagram corresponding to λp−1, is µ(ξ · ζp, u, χp−1) and the analogues statement holds for
λp. So the height of the second column of T is µ(ξ · ζp, u, χp−1) − µ(ξ · ζp, u, χp), proving (1).
To prove (2) we will prove by induction on r that if r is odd then
and if r is even then
γr(Sr) ≤ µ(ξ, u, χ1) −
r
X
i=1
(−1)iµ(ξ · ζp, u, χi)
γp+1−r(Sr) ≥ −µ(ξ, u, χ1) +
r
X
i=1
(−1)iµ(ξ · ζp, u, χi).
Once this induction reaches r = p − 2, which is an odd number, the first inequality will be
exactly (2) and so the proof of the theorem will be finished.
For the base case consider r = 1. Then γ1(S1) is the number of indecomposable direct summands
of S1 ∼= M1 which by Proposition 2.2 is at most µ(ξ, u, χ1) + µ(ξ · ζp, u, χ1).
For the induction step assume that the statement holds for all numbers smaller than r. First
assume that r is even. Now Sr corresponds to a semistandard skew tableau T satisfying the lattice
property of form λr/µr−1. So by Proposition 3.5 the number γp+1−r(Sr) = γp+1−r(T ) is at least
as big as the height of the (r − 1)-th column in the body of T . Since r ≤ p this numbers equals
the difference of the number of direct indecomposable summands of Mr which is at least (r − 1)-
dimensional, but not 1-dimensional, and the number of indecomposable direct summands of Sr−1
10
LEO MARGOLIS
of dimension at least r−1, i.e. γr−1(Sr−1). The number of indecomposable direct summands of Mr
which are at least (r − 1)-dimensional, but not 1-dimensional, is µ(ξ · ζp, u, χr) by Proposition 2.2.
Since by induction γr−1(Sr−1) ≤ µ(ξ, u, χ1) − Pr−1
i=1 (−1)iµ(ξ · ζp, u, χi) we obtain that the height
of the (r − 1)-th column in the body of T is at least
µ(ξ · ζp, u, χr) − (µ(ξ, u, χ1) −
r−1
X
i=1
(−1)iµ(ξ · ζp, u, χi)) = −µ(ξ, u, χ1) +
r
X
i=1
(−1)iµ(ξ · ζp, u, χi).
Now assume that r is odd, bigger than 2 and smaller than p−1. Also in this case Sr corresponds
to a semistandard skew tableau T satisfying the lattice property of form λr/µr−1. So the number
γr(Sr) = γr(T ) is at most as big as the height of the (p + 2 − r)-th column in the body of T
by Proposition 3.5. This is the difference of the number of indecomposable direct summands of
dimension at least p + 2 − r in Mr, i.e. γp+2−r(Mr), and the number of indecomposable direct
summands of Sr−1 of dimension at least p + 2 − r, i.e. γp+2−r(Sr−1) = γp+1−(r−1)(Sr−1). By
Proposition 2.2 we know γp+2−r(Mr) = µ(ξ · ζp, u, χr) and by induction γp+1−(r−1)(Sr−1) is at
least −µ(ξ, u, χ1) + Pr−1
i=1 (−1)iµ(ξ · ζp, u, χi). So the height of the (p + 2 − r)-th column of T is
at most
µ(ξ · ζp, u, χr) − (−µ(ξ, u, χ1) +
r−1
X
i=1
(−1)iµ(ξ · ζp, u, χi)) = µ(ξ, u, χ1) −
r
X
i=1
(−1)iµ(ξ · ζp, u, χi).
This finishes the proof of the induction claim and hence the proof of the theorem.
(cid:3)
The proof of the Prime Graph Question for the Conway simple groups now boils down to the
application of Theorem 1.2 for various cases described in [BKL11]. The information contained in
[BKL11] is not completely sufficient for our purposes, since to compute multiplicities of eigenvalues
we do not only need to know the partial augmentations of a unit u ∈ V(ZG), but also the partial
augmentations of its proper powers. These can be computed using the GAP-package HeLP [BM17a]
and we will indicate in all cases we need to consider which characters are sufficient to obtain these
possible partial augmentations using the command HeLP_WithGivenOrder. Also in the case of the
first Conway group we will use stronger results obtainable by the HeLP method than those given
in [BKL11].
We will denote by χi the i-th irreducible complex character of a group G as given in the GAP
character table library [Bre12]. We will also use names for conjugacy classes as in [Bre12]. The
statements we will need about the p-blocks of various groups, their defect and their corresponding
Brauer trees can all be derived from GAP, but they are also given in [HL89].
Proof of Theorem 1.1: We will study the three cases of interest separately.
Case G = Co3: The information on the orders of elements in G is contained in [CCN+85].
Using this information and [BKL11, Theorem 1(i)] we only have to consider units of order 35 in
V(ZG). Using χ2 to compute partial augmentations for units of order 5 and χ2, χ3 to compute
the partial augmentations of units of order 35 we are left with the following possibilities:
(ε5a(u7), ε5b(u7), ε5a(u), ε5b(u), ε7a(u)) ∈ {(−4, 5, 3, 12, −14), (−3, 4, 4, 11, −14)}.
Note that there is only one class of elements of order 7 in G, so we do not need to consider
the partial augmentations of u5, since the only class in which a partial augmentation at u5 is
non-vanishing is 7a.
G possesses a 5-block of defect 1 whose Brauer tree is a line of form
χ5
χ29
χ39
χ35
χ12
.
All irreducible ordinary characters in this block have only integral values and 5 is of course not
ramified in Z. So we can apply Theorem 1.2. We provide the multiplicities of the needed eigen-
values of u, for the two critical distributions of partial augmentations, in Table 1. Here the first
entry in each column contains the possible values of (ε5a(u7), ε5b(u7), ε5a(u), ε5b(u), ε7a(u)).
ON THE PRIME GRAPH QUESTION FOR INTEGRAL GROUP RINGS OF CONWAY SIMPLE GROUPS 11
(−4, 5, 3, 12, −14)
(−3, 4, 4, 11, −14)
µ(1, u, χ) µ(ζ5, u, χ) µ(1, u, χ) µ(ζ5, u, χ)
33
29
2
2119
7029
5071
104
3
2118
7030
5070
105
χ
χ5
χ29
χ39
χ35
χ12
χ
χ5
χ29
χ39
χ35
χ12
Table 1. Multiplicities of eigenvalues for G = Co3 for units of order 35.
So using Theorem 1.2 with ξ = 1 we would have, e.g.
if the partial augmentations are
(ε5a(u7), ε5b(u7), ε5a(u), ε5b(u), ε7a(u)) = (−4, 5, 3, 12, −14) that
µ(ζ5, u, χ35) − µ(ζ5, u, χ12) = 4967 ≤ µ(1, u, χ5) + µ(ζ5, u, χ5) − µ(ζ5, u, χ29) + µ(ζ5, u, χ39) = 4945,
a contradiction. The same argument applies to the other possibility of distributions of partial
augmentations of u, in which case we get 4965 ≤ 4944.
Case G = Co2: The information on the orders of elements in G is contained in [CCN+85].
Using this information and [BKL11, Theorem 2(i)] we only have to consider units of order 35 in
ZG. Using χ2 to compute partial augmentations of units of order 5 and χ2, χ3 for order 35 we get
(ε5a(u7), ε5b(u7), ε5a(u), ε5b(u), ε7a(u)) ∈ {(−4, 5, 3, 12, −14), (−3, 4, 4, 11, −14)}.
Again there is only one class of elements of order 7, so we do not need to consider u5.
Also in this case G possesses a 5-block of defect 1 with Brauer tree of the form
χ4
χ24
χ43
χ38
χ20
.
All ordinary characters in this block only have integral values. The necessary multiplicities are
provided in Table 2
(−4, 5, 3, 12, −14)
(−3, 4, 4, 11, −14)
µ(1, u, χ) µ(ζ5, u, χ) µ(1, u, χ) µ(ζ5, u, χ)
33
29
2
3269
13354
11396
1254
3
3268
13355
11395
1255
Table 2. Multiplicities of eigenvalues for G = Co2 for units of order 35.
In the first case using Theorem 1.2 with ξ = 1 we get 10142 ≤ 10120 and in the second case
10140 ≤ 10119.
Case G = Co1: The information on the orders of elements in G is contained in [CCN+85].
Using this information and [BKL11, Theorem 3(i)] we only have to consider units of order 55 and
65 in ZG. We will first apply the HeLP method here to obtain stronger results than in [BKL11].
The 2-, 3- and 5-modular Brauer tables are not available in GAP, but the online version of the
Atlas, also implemented as a GAP-package [WPN+11], contains several representations in these
characteristics and we will use a character ψ coming from a 24-dimensional representation of G
over F2. The values of ψ on classes of interest can be found in Table 3.
1a
5a
ψ 24 −6
5b
5c
4 −1
11a 13a
−2
2
Table 3. A 2-modular Brauer character for Co1.
12
LEO MARGOLIS
The results we obtain using the HeLP method are stronger than those in [BKL11], since we
include ψ. Using χ2, χ3 and ψ we obtain 98 possibilities for the partial augmentations of units of
order 5. Then using χ2, χ4, χ5 and ψ we can exclude the existence of units of order 65 in ZG.
For units of order 55 we apply the characters χ2, χ3, χ4 and ψ. Note that there is only one class
of elements of order 11 in G.
We get that (ε5a(u11), ε5b(u11), ε5c(u11), ε5a(u), ε5b(u), ε5c(u), ε11a(u)) is one of the four possi-
bilities
(1, 5, −5, 1, −6, −5, 11), (1, 6, −6, 1, −5, −6, 11), (2, 6, −7, 2, −5, −7, 11), (2, 7, −8, 2, −4, −8, 11).
The principal 11-block of G has a Brauer tree of the form
χ1
χ12
χ34
χ41
χ64
χ79
χ85
χ73
χ60
χ38
χ14
.
Also in this block all ordinary characters only have integral values. The necessary multiplicities
are provided in Table 4.
(1, 5, −5, 1, −6, −5, 11)
(1, 5, −5, 1, −6, −5, 11)
(1, 5, −5, 1, −6, −5, 11)
(1, 5, −5, 1, −6, −5, 11)
µ(1, u, χ) µ(ζ11, u, χ) µ(1, u, χ) µ(ζ11, u, χ) µ(1, u, χ) µ(ζ11, u, χ) µ(1, u, χ) µ(ζ11, u, χ)
1
1
1
1
0
5670
138600
391385
1929870
4495195
5326495
3734505
1522180
297285
6875
0
5638
138520
391350
1929856
4495195
5326570
3734540
1522180
297303
6880
χ
χ1
χ12
χ34
χ41
χ64
χ79
χ85
χ73
χ60
χ38
χ14
0
5668
138600
391385
1929876
4495195
5326485
3734505
1522180
297293
6885
0
5640
138520
391350
1929850
4495195
5326580
3734540
1522180
297295
6870
Table 4. Multiplicities of eigenvalues for G = Co1 for units of order 55.
From the four possibilities we obtain by Theorem 1.2 the inequalities 290408 ≤ 290389, 290410 ≤
(cid:3)
290391, 290423 ≤ 290304 and 290425 ≤ 290306, all of which do not hold.
Remark 4.1. In the proof of Theorem 1.1 to handle the first Conway group Co1 we used Theo-
rem 1.2 with p = 11 instead of p = 5 for two reasons. One is to show that Theorem 1.2 can also be
applied with other primes than 5. The other, more importantly, is that the 11-Brauer trees can be
computed using GAP which can not be done as easily with 5-Brauer trees, since the 5-Brauer table
is not available in GAP. The 5-Brauer trees are given in [HL89], but the calculations with p = 11
are easier to verify for a reader who does not have [HL89] available. Using the first Brauer tree
given in [HL89, Section 6.22] and Theorem 1.2 with p = 5 and ξ = 1 one can also get the same
result.
Remark 4.2. Of the 17 sporadic groups studied by Bovdi, Konovalov et al. the only group for
which they could not prove the Prime Graph Question, apart from the Conway groups, was the
O'Nan simple group [BGK09]. Here it remains to exclude the existence of units of order 33 and
57. Theorem 1.2 can be applied here with p = 11 to handle units of order 33, but not for order
57. This is not possible since for p ∈ {3, 19} every p-block of G which is a Brauer Tree Algebra
contains characters such that p is ramified in the ring of values of these characters.
Acknowledgements
The setting handled in this paper was discussed at various stages with Alexander Konovalov,
Andreas Bächle, Alexander Thumm and Eugenio Giannelli. I am thankful to them all for their
input.
I would also like to thank the referee whose comments helped to improve the readability, par-
ticularly of the combinatorial proofs, significantly.
ON THE PRIME GRAPH QUESTION FOR INTEGRAL GROUP RINGS OF CONWAY SIMPLE GROUPS 13
References
[BC17]
A. Bächle and M. Caicedo, On the prime graph question for almost simple groups with an alternating
socle, Internat. J. Algebra Comput. 27 (2017), no. 3, 333 -- 347.
[BGK09] V. Bovdi, A. Grishkov, and A. Konovalov, Kimmerle conjecture for the Held and O'Nan sporadic simple
[BJK11]
[BK07a]
groups, Sci. Math. Jpn. 69 (2009), no. 3, 353 -- 361.
V. Bovdi, E. Jespers, and A. Konovalov, Torsion units in integral group rings of Janko simple groups,
Math. Comp. 80 (2011), no. 273, 593 -- 615.
V. Bovdi and A. Konovalov, Integral group ring of the first Mathieu simple group, Groups St. Andrews
2005. Vol. 1, London Math. Soc. Lecture Note Ser., vol. 339, Cambridge Univ. Press, Cambridge, 2007,
pp. 237 -- 245.
[BK07b]
, Integral group ring of the McLaughlin simple group, Algebra Discrete Math. (2007), no. 2,
[BK08]
[BK09]
[BK10]
[BK12]
[BKL08]
[BKL11]
43 -- 53.
2680.
, Integral group ring of the Mathieu simple group M23, Comm. Algebra 36 (2008), no. 7, 2670 --
, Integral group ring of Rudvalis simple group, Ukraïn. Mat. Zh. 61 (2009), no. 1, 3 -- 13.
, Torsion units in integral group ring of Higman-Sims simple group, Studia Sci. Math. Hungar.
47 (2010), no. 1, 1 -- 11.
, Integral group ring of the Mathieu simple group M24, J. Algebra Appl. 11 (2012), no. 1,
1250016, 10.
V. Bovdi, A. Konovalov, and S. Linton, Torsion units in integral group ring of the Mathieu simple
group M22, LMS J. Comput. Math. 11 (2008), 28 -- 39.
, Torsion units in integral group rings of Conway simple groups, Internat. J. Algebra Comput.
21 (2011), no. 4, 615 -- 634.
[BKM08] V. Bovdi, A. Konovalov, and E. Marcos, Integral group ring of the Suzuki sporadic simple group, Publ.
[BKS07]
[BM17a]
Math. Debrecen 72 (2008), no. 3-4, 487 -- 503.
V. Bovdi, A. Konovalov, and S. Siciliano, Integral group ring of the Mathieu simple group M12, Rend.
Circ. Mat. Palermo (2) 56 (2007), no. 1, 125 -- 136.
A. Bächle and L. Margolis, HeLP -- Hertweck-Luthar-Passi method, GAP package, Version 3.1,
http://homepages.vub.ac.be/abachle/help/, 2017.
[BM17b]
, On the prime graph question for integral group rings of 4-primary groups I, Internat. J. Algebra
Comput. 27 (2017), no. 6, 731 -- 767.
[BM17c]
[BM18a]
, Rational Conjugacy of Torsion Units in Integral Group Rings of Non-Solvable Groups, Proc.
Edinb. Math. Soc. (2) 60 (2017), no. 4, 813 -- 830.
, HeLP: a GAP package for torsion units in integral group rings, J. Softw. Algebra Geom. 8
(2018), 1 -- 9.
[BM18b]
, On the Prime Graph Question for Integral Group Rings of 4-primary groups II, Algebr.
[Bre12]
Represent. Theory (2018), 1 -- 21, in press, doi: 10.1007/s10468-018-9776-6.
T.
http://www.math.rwth-aachen.de/~Thomas.Breuer/ctbllib, May 2012, GAP package.
Character
Breuer,
Library,
Table
The
GAP
Version
1.2.1,
[CL65]
[EM18]
[CCN+85] J. H. Conway, R. T. Curtis, S. P. Norton, R. A. Parker, and R. A. Wilson, Atlas of finite groups, Oxford
University Press, Eynsham, 1985, Maximal subgroups and ordinary characters for simple groups, With
computational assistance from J. G. Thackray.
J. A. Cohn and D. Livingstone, On the structure of group algebras. I, Canad. J. Math. 17 (1965),
583 -- 593.
F. Eisele and L. Margolis, A counterexample to the first Zassenhaus conjecture, Adv. Math. 339 (2018),
599 -- 641.
W. Fulton, Young tableaux, London Mathematical Society Student Texts, vol. 35, Cambridge University
Press, Cambridge, 1997, With applications to representation theory and geometry.
The GAP Group, GAP -- Groups, Algorithms,
http://www.gap-system.org.
M. Hertweck, A counterexample to the isomorphism problem for integral group rings, Ann. of Math.
(2) 154 (2001), no. 1, 115 -- 138.
and Programming, Version 4.8.8,
[GAP17]
[Her01]
[Ful97]
2017,
[Her07]
[HL89]
[JdR16]
, Partial augmentations and Brauer character values of
torsion units in group rings,
arXiv:0612429v2 [math.RA], 2004 - 2007.
G. Hiss and K. Lux, Brauer trees of sporadic groups, Oxford Science Publications, The Clarendon
Press, Oxford University Press, New York, 1989.
E. Jespers and Á. del Río, Group ring groups. Vol. 1. Orders and generic constructions of units, De
Gruyter Graduate, De Gruyter, Berlin, 2016.
[Kim06] W. Kimmerle, On the prime graph of the unit group of integral group rings of finite groups, Groups,
[KK15]
rings and algebras, Contemp. Math., vol. 420, Amer. Math. Soc., Providence, RI, 2006, pp. 215 -- 228.
W. Kimmerle and A. Konovalov, Recent advances on torsion subgroups of integral group rings, Groups
St Andrews 2013, London Math. Soc. Lecture Note Ser., vol. 422, Cambridge Univ. Press, Cambridge,
2015, pp. 331 -- 347.
14
[KK17]
[LP89]
[Seh93]
LEO MARGOLIS
, On the Gruenberg -- Kegel graph of integral group rings of finite groups, Internat. J. Algebra
Comput. 27 (2017), no. 6, 619 -- 631.
I. S. Luthar and I. B. S. Passi, Zassenhaus conjecture for A5, Proc. Indian Acad. Sci. Math. Sci. 99
(1989), no. 1, 1 -- 5.
S. K. Sehgal, Units in integral group rings, Pitman Monographs and Surveys in Pure and Applied
Mathematics, vol. 69, Longman Scientific & Technical, Harlow, 1993.
J.N. Bray,
and T. Breuer,
R.A.
A GAP
Rep,
http://www.math.rwth-aachen.de/~Thomas.Breuer/atlasrep, July 2011, Refereed GAP package.
of Group Representations,
Interface
Version
[WPN+11] R.A. Wilson,
Parker,
to
S. Nickerson,
the Atlas
Atlas-
1.5,
Vrije Universiteit Brussel, Faculty of Sciences, Department of Mathematics, Pleinlaan 2, B-1050
Brussels, Belgium
E-mail address: [email protected]
|
1304.5767 | 1 | 1304 | 2013-04-21T17:01:06 | Cohomology of n-ary-Nambu-Lie superalgebras and super_1 3-algebra | [
"math.RA"
] | The purpose of this paper is define the representation and the cohomology of n-ary-Nambu-Lie superalgebras. Morever we study extensions and provide the computation of the derivations and second cohomology group of super w_1 3-algebra | math.RA | math |
Cohomology of n-ary-Nambu-Lie superalgebras and
super w∞ 3-algebra
Faouzi AMMAR
Universit´e de Sfax
Facult´e des Sciences,
Nejib Saadaoui
Universit´e de Gab`es
Facult´e des Sciences,
B.P. 1171, Sfax 3000, Tunisie,
Campus Universitaire, Gab`es 6072, Tunisie,
[email protected]
[email protected]
October 16, 2018
Abstract
The purpose of this paper is define the representation and the cohomology of n-ary-Nambu-
Lie superalgebras. Morever we study central extensions and provide as application the compu-
tations of the derivations and second cohomology group of super w∞ 3-algebra.
Introduction
The first instances of n-ary algebras in Physics appeared with a generalization of the Hamiltonian
mechanics proposed in 1973 by Nambu [5]. More recent motivation comes from string theory and
M-branes involving naturally an algebra with ternary operation called Bagger-Lambert algebra
which gives impulse to a significant development. It was used in [6] as one of the main ingredients
in the construction of a new type of supersymmetric gauge theory that is consistent with all the
symmetries expected of a multiple M2-brane theory: 16 supersymmetries, conformal invariance,
and an SO(8) R-symmetry that acts on the eight transverse scalars. On the other hand in the
study of supergravity solutions describing M2-branes ending on M5-branes, the Lie algebra ap-
pearing in the original Nahm equations has to be replaced with a generalization involving ternary
bracket in the lifted Nahm equations, see [7]. For other applications in Physics see [8, 9, 10].
The algebraic formulation of Nambu mechanics is due to Takhtajan [11, 19] while the abstract
definition of n-ary Nambu algebras or n-ary Nambu-Lie algebras (when the bracket is skew sym-
metric) was given by Filippov in 1985 see [13]. The Leibniz n-ary algebras were introduced and
studied in [14]. For deformation theory and cohomologies of n-ary algebras of Lie type, we refer to
[15, 16, 17, 18, 19].
The paper is organized as follows.
In the first section we give the definitions and some key
constructions of n-ary-Nambu-Lie superalgebras.
In Section 2 we define a derivation of n-ary-
Nambu-Lie superalgebra. Section 3 is dedicated to the representation theory n-ary-Nambu-Lie
superalgebras including adjoint representation. In Section 3 we construct family of cohomologies
1
of n-ary-Nambu-Lie superalgebras. In Section 4, we discuss extensions of n-ary-Nambu-Lie super-
algebras and their connection to cohomology. In the last section we compute the derivations and
cohomology group of the super w∞ 3-algebra.
1 The n-ary-Nambu-Lie superalgebra
Let N be a linear superspace over a field K that is a Z2-graded linear space with a direct sum
N = N0 ⊕ N1.
The elements of Nj, j ∈ Z2, are said to be homogenous of parity j. The parity of a homogeneous
element x is denoted by x.
Let x1, · · · , xn be n homogenous elements of N , we denote by (x1, · · · , xn) = x1 + · · · + xn the
parity of an element (x1, · · · , xn) in N n.
The space End(N ) is Z2 graded with a direct sum End(N ) = (End(N ))0 ⊕ (End(N ))1 where
(End(N ))j = {f ∈ End(N )/f (Ni) ⊂ Ni+j}. The elements of (End(N ))j are said to be homogenous
of parity j.
Definition 1.1. [2] An n-ary-Nambu superalgebra is a pair (N , [., · · · , .]) constiting of a vector
superspace N and even n-linear map [., . . . , .] : N n → N , satisfying
hy2, . . . , yn, [x1, . . . , xn]i =
nXi=1
(−1)(y2+···+yn)(x1+···+xi−1)hx1, . . . , [y2, . . . , yn, xi], . . . , xni
(1.1)
for all (x1, · · · , xn) ∈ N n, (y2, · · · , yn) ∈ N n−1.
The identity (1.1) is called Nambu identity.
Definition 1.2. An n-ary-Nambu superalgebra (N , [., · · · , .]) is called n-ary-Nambu-Lie superal-
gebra if the bracket is skew-symmetric that is
[x1, . . . , xi−1, xi, . . . , xn] = −(−1)xi−1xi[x1, . . . , xi, xi−1, . . . , xn].
(1.2)
Definition 1.3. Let (N , [., . . . , .]) and (N ′, [., . . . , .]′) be two n-ary-Nambu-Lie superalgebra. An
homomorphism f : N → N ′ is said to be morphism of n-ary-Nambu-Lie superalgebra if
[f (x1), . . . , f (xn)]′ = f ([x1, . . . , xn]) ∀x1, . . . , xn ∈ N .
(1.3)
Proposition 1.4. Let f be an even endomorphism of n-ary-Nambu-Lie superalgebra (N , [., · · · , .]).
We can define the new n-ary-Nambu-Lie superalgebra (N , [., · · · , .]′) , where [x1, . . . , xn]′ = f ([x1, · · · , xn]).
2 Derivation of n-ary-Nambu-Lie superalgebra
Definition 2.1. [2] We call D ∈ Endi(N ), where i is in Z2, a derivation of the n-ary-Nambu-Lie
superalgebra (N , [., · · · , .]) if
D([x1, · · · , xn]) =
nXk=1
(−1)D(x1+···+xk−1)[x1, · · · , D(xk), · · · , xn], f or all homogeneous x1, · · · , xn ∈ N .
2
We denote by Der(N ) = Der0(N ) ⊕ Der1(N ) the set of derivation of the n-ary-Nambu-Lie
superalgebra N .
The subspace Der(N ) ⊂ End(N ) is easily seen to be closed under the bracket
[D1, D2] = D1 ◦ D2 − (−1)D1D2D2 ◦ D1
(2.1)
(known as the supercommutator) and it is called the superalgebra of derivations of N .
With above notation, Der(N ) is a Lie superalgebra, in wich the Lie bracket is given by (2.1).
Fix n−1 homogeneous elements x1, · · · , xn−1 ∈ N , and define the transformations ad(x1, · · · , xn−1) ∈
End(N ) by the rule
ad(x1, · · · , xn−1)(x) = [x1, · · · , xn−1, x].
(2.2)
Then ad(x1, · · · , xn−1) is a derivation of N , wich we call inner derivation of N .
Indeed we have
ad(y2, · · · , yn)(cid:16)[x1, · · · , xn](cid:17) = hy2, · · · , yn, [x1, · · · , xn]i
=
=
(−1)(y2+···+yn)(x1+···+xi−1)hx1, · · · , ad(y)(xi), · · · , xni
nXi=1
(−1)ad(y)(x1+···+xi−1)hx1, · · · , ad(y)(xi), · · · , xni.
nXi=1
3 Representations of n-ary-Nambu-Lie superalgebra
We provide in the following a graded version of the study of representations of n-ary-Nambu-Lie
algebra stated in [3].
Let (N , [., · · · , .]) be a n-ary-Nambu-Lie superalgebra and V = V0 ⊕ V1 an arbitrary vector
, Vj]V ⊂ Vi+j where
superspace. Let [., .]V : N n−1 × V −→ V be a bilinear map satisfying [N n−1
i, j ∈ Z2.
i
Definition 3.1. The pair (V, [., .]V ) is called a module on the n-ary-Nambu-Lie superalgebra N =
N0 ⊕ N1 or N -module V if the even multilinear mapping [., . . . , .]V satisfies
=
had(x)(xn), y2, . . . , yn−1, viV
(−1)n−i+xi(xi+1+···+xn)hx1, . . . ,bxi . . . , xn,(cid:2)xi, y2, . . . , yn−1, v(cid:3)ViV
nXi=1
(−1)y(x1+···+xi−1)hx1, . . . , ad(y)(xi), . . . , xn−1, viV
n−1Xi=1
,
(3.1)
=hy, [x, v]V(cid:3)V − (−1)yx(cid:2)x, [y, v]ViV
(3.2)
for all homogeneous x, y in N n−1 and v in V . It will also say that (V, [., . . . , .]V ) is a representation
of N .
3
Example 3.2. Let (N , [., . . . , .]) be a n-ary-Nambu-Lie superalgebra and the map ad defined in
(2.2). Then (N , ad) is a representation of N .
Remark 3.3. When [., .]V is the zero map, we say that the module V is trivial.
4 Cohomology of n-ary-Nambu-Lie superalgebra induced by co-
homology of Leibniz algebras
In this section, we aim to extend to n-ary Nambu superalgebra type of process introduced by
Takhtajan to construct a complex of n-ary Nambu superalgebra starting from a complex of binary
algebras (see [20]).
Definition 4.1. A Leibniz superalgebra is a pair (L, [., .]) consisting of a vector superspace L and
bilinear map [., .] : L × L → L satisfying
hx, [y, z]i =h[x, y], z(cid:3) + (−1)xy(cid:2)y, [x, z]i.
(4.1)
Let (L, [., .]) be a Leibniz superalgebra and W be an arbitrary vector superspace. Let [., .]W :
L × W −→ W be a even bilinear map satisfiying
h[x, y], w(cid:3)W =hx, [y, w]WiW
The pair (W, [., .]W is called an L-module.
− (−1)xy(cid:2)y, [x, v]wiW
.
Let (N , [., . . . , .]) be a n-ary-Nambu-Lie superalgebra and (V, [., . . . , .]V ) be a N -module.
We denote by L(N ) the space ∧n−1N and we call it the fundamental set.
We define a bilinear map [., .]L : L(N ) × L(N ) → L(N ) and ad : N × V −→ V respectivly by
[x, y]L =
and
(−1)x(y1+···+yi−1)y1 ∧ · · · ∧ ad(x)(yi) ∧ · · · ∧ yn−1
n−1Xi=1
for all x = x1 ∧ · · · ∧ xn−1, y = y1 ∧ · · · ∧ yn−1 ∈ L(N ), v ∈ V.
ad(x, v) = [x, v]V
(4.2)
(4.3)
Lemma 4.2. Let (N , [., . . . , .]) be a n-ary-Nambu-Lie superalgebra and be V be a N -module. The
map ad satisfies
ad([x, y]L)(v) = ad(x)(ad(y)(v)) − (−1)xyad(y)(ad(x)(v))
(4.4)
for all x, y ∈ L(N ), v ∈ V .
4
Proof. By (4.3) and (3.2) we have
ad([x, y]L)(v) = (cid:2)[x, y]L, v(cid:3)V
=
(−1)x(y1+···+yi−1)[y1 ∧ · · · ∧ ad(x)(yi) ∧ · · · ∧ yn−1, v]V .
n−1Xi=1
= (cid:2)x1, . . . , xn−1, [y1, . . . , yn−1, v](cid:3)V − (−1)x(y1+···+yn−1)(cid:2)y1, . . . , yn−1, [x1, . . . , xn−1, v](cid:3)V
= ad(x)(ad(y)(v)) − (−1)xyad(y)(ad(x)(v)).
Proposition 4.3. The pair (L(N ), [., .]L) is a Leibniz superalgebra.
Let (V, [., . . . , .]V ) be a N -module. We denote
W = L(N , V ) = {x1 ∧ · · · ∧ xn−2 ∧ v, xi ∈ N , v ∈ V }.
Note that
u1 ∧ . . . uj−1 ∧ uj ∧ · · · ∧ un−1 = −(−1)uj−1uju1 ∧ . . . ui ∧ ui−1 ∧ · · · ∧ un−1,
(4.5)
for all homogenous element u = u1 ∧ · · · ∧ un−1 of W .
Define a bilinear map [., .]W : L(N ) −→ W by
[x, y1 ∧ · · · ∧ y1 ∧ v]W =
(−1)x(y1+···+yi−1)y1 ∧ · · · ∧ ad(x)(yi) ∧ · · · ∧ yn−1 ∧ v
n−1Xi=1
+(−1)x(y1+···+yn−1)y1 ∧ · · · ∧ yn−1 ∧ ad(x)(v).
Proposition 4.4. The pair (W, [., .]W ) is a L-module.
In the following, the expression [x, y] means:
• [x, y]L if x, y ∈ L(N ).
• [x1, . . . , xn−1, y] if x = x1 ∧ · · · ∧ xn−1 ∈ L(N ), y ∈ N .
Definition 4.5. We call k-cochain of a n-ary super-algebra N with values in V a multilinear map
Denote C k(N , V ) the set of k-cochains on N with values in V .
ϕ : L(N )k × N −→ V.
Theorem 4.6. Let (N , [., · · · , .]) be a n-ary-Nambu-Lie superalgebra and C k(L(N ), V ) the set of
k-cochain.
5
We define a coboundary operator dk : C k(L(N ), W ) → C k+1(L(N ), W ) by df (x) = −[x, f ] when
f ∈ C 0(L(N ), V ) = V and for k ≥ 1,
dk(f )(x0, . . . , xk) = − X0≤s<t≤k
(−1)s+xs(xs+1+···+xt−1)f (x0, . . . , bxs, . . . , xt−1, [xs, xt], xt+1, . . . , xk, z)
(−1)s+xs(f +x0+···+xs−1)hxs, f (x0, . . . , bxs, . . . , xk)iW
k−1Xs=0
+(−1)khf (x0, . . . , xk−1), xki′
+
W
,
where
hx1 ∧ · · · ∧ xn−2 ∧ v, y1 ∧ · · · ∧ yn−1i′
n−1Xi=1
W
= −
(−1)(x1+···+xn−2+v)(y1+···+yi−1)+vyiy1 ∧ · · · ∧ ad(x1 ∧ · · · ∧ xn−2 ∧ yi)(v) ∧ . . . yn−1
Let ∆k : C k−1(N , V ) → C k(L(N ), W ) be the linear map defined for k = 0 by
∆(f )(x0) =
and for k > 0 by
∆k(f )(x0, . . . , xk)
(−1)f (x1
0+···+xi−1
0
n−1Xi=1
)x1
0 ∧ · · · ∧ f (xi
0) ∧ · · · ∧ xn−1
0
=
(−1)(f +x0+···+xk−1)(x1
k+···+xi−1
k
)x1
k ∧ · · · ∧ f (x0, . . . , xk−1, xi
k) ∧ xi+1
k ∧ . . . xn−1
k
n−1Xi=1
where we set xj = x1
n-ary-Nambu-Lie superalgebra such that
j ∧ · · · ∧ xn−1
j
. Then there exists a cohomology complex (C k(N , N ), δ) for
The cobondary map δk+1 : Ck(N , V ) → Ck+1(N , V ) is defined by
dk ◦ ∆k−1 = ∆k−1 ◦ δk−1
δk+1(f )(x0, . . . , xk, z)
−
= − X0≤s<t≤k
(−1)s+xs(xs+1+···+xt−1)f (x0, . . . ,bxs, . . . , xt−1, [xs, xt], xt+1, . . . , xk, z)
(−1)s+xs(xs+1+···+xk)f(cid:16)x0, . . . , xs−1, xs+1, . . . , xk, ad(xs)(z)(cid:17)
kXs=0
(−1)s+xs(f +x0+···+xs−1)hxs, f (x0, . . . , bxs, . . . , xk, z)iV
kXs=0
n−1Xi=1
"z ∧ x1
k(cid:17)#V
, f(cid:16)x0, . . . , xk−1, xi
(−1)k−i+(f +x0+···+xk−1+xi+1
k ∧ · · · ∧ xn−1
+···+xn−1
)(xi
+
+
k
.
.
k
k
k ∧ . . .cxi
k+xk)+z(f +x0+···+xk)+xk(xi+1
k
+···+xn−1
k
)
6
Proof. For anyf ∈ C k−2(N , V ), by calculation we obtain dk+1 ◦ dk(f )(x0, . . . , xk) = 0 and
dk ◦ ∆k−1(f )(x0, . . . , xk) = ∆k−1 ◦ δk−1(f )(x0, . . . , xk).
One has ∆k+1◦δk = dk◦∆k, then ∆k+1◦δk◦δk−1 = dk◦dk−1◦∆k−1 = 0, because dk◦dk−1 = 0
Definition 4.7.
• The k-cocycles space is defined as Z k(N , V ) = ker δk. The even (resp. odd)
k-cocycles space is defined as Z k(N , V )0 = Z k(N , V ) ∩ (C k(N , V ))0 (resp. Z k(N , V )1 =
Z k(N , V ) ∩ (C k(N , V ))1).
• The k-coboundaries space is defined as Bk(N , V ) = Im δk−1. The even (resp. odd) k-
1 (N , V ) = Bk(N , V ) ∩
0 (N , V ) = Bk(N , V ) ∩ (C k(N , V ))0 (resp. Bk
coboundaries space is Bk
(C k(N , V ))0).
• The kth cohomology space is the quotient H k(N , V ) = Z k(N , V )/Bk(N , V ). It decomposes
as well as even and odd kth cohomology spaces.
Finally, we denote by H k(N , V ) = H k
0 (N , V ) ⊕ H k
1 (N , V ) the kth cohomology space and by
⊕k≥0H k(N , V ) the r-cohomology group of the Hom-Lie superalgebra N with values in V .
Remark 4.8. The subspace Z 1(N , N ) is the set of derivation of N .
5 Extensions of n-ary-Nambu-Lie superalgebra
An extension theory of Hom-Lie superalgebras was stated in [4].
An extension of a n-ary-Nambu-Lie superalgebra (N , [., . . . , .]) by N -module (V, [., . . . , .]V ) is
an exact sequence
0 −→ (V, [., . . . , .]V )
i−→ (eN , ^[., . . . , .])
We say that the extension is central if [L(eN ), i(V )] eN = 0.
Two extensions
π−→ (N , [., . . . , .]) −→ 0.
0 −→ (V, [., . . . , .]V )
πk−→ (N , [., . . . , .]) −→ 0 (k = 1, 2)
ik−→ (fNk, ^[., . . . , .])
are equivalent if there is an isomorpism ϕ : (N1, [., . . . , .]1) −→ (N2, [., . . . , .]2) such that ϕo i1 = i2
and π2 o ϕ = π1.
Proposition 5.1. Let (N , [., · · · , .]) be a n-ary-Nambu-Lie superalgebra and V be a N -module. The
second cohomology space H 2(N , V ) = Z 2(N , V )/B2(G, V ) is in one-to-one correspondence with the
set of the equivalence classes of central extensions of (N , [., . . . , .]) by (V, [., . . . , .]V ).
be a central extension of n-ary-Nambu-Lie superalgebra (N , [., . . . , .]) by (V, [., . . . , .]V ), so there is
i−→ (eN , ^[., . . . , .])
π−→ (N , [., . . . , .]) −→ 0.
Proof. Let
0 −→ (V, [., . . . , .]V )
a space H such that eN = H ⊕ i(V ).
7
The map π/H : H → N (resp k : V → i(V )) defined by π/H(x) = π(x) (resp. k(v) = i(v)) is
so [s(x), s(z)] eN − s([x, z]) ∈ i(V ).
We set [s(x), s(z)] − s([x, z]) = G(x, z) ∈ i(V ) then F (x, z) = l ◦ G(x, z) ∈ V, it easy to see that
s(x) + i(v), it is easy to verify that ϕ is a bijective.
For all x = x1 ∧ . . . xn−1 ∈ L(N ) (resp. v = v1 ∧ . . . vn−1 ∈ L(V )) we denote s(x1) ∧ . . . s(xn−1)
(resp. i(v1) ∧ · · · ∧ i(vn−1)) by s(x). (resp. i(v)).
bijective, its inverse s (resp. l) note. Considering the map ϕ : N × V → eN defined by ϕ(x, v) =
Since π is homomorphism of n-ary-Nambu-Lie superalgebra then π(cid:16)[s(x), s(z)] eN − s([x, z])(cid:17) = 0
F ∈ C 2(N , V ) is a 2-cochain that defines a bracket on eN . In fact, we can identify as a superspace
N × V and eN by ϕ : (x, v) → s(x) + i(v) where the bracket is
Viewed as elements of N × V we have h(x, v), (z, w)i = (cid:16)[x, z], F (x, z)(cid:17) and the homogeneous
elements (x, v) of N × V are such that x = v and we have in this case (x, v) = x.
We deduce that for every central extension
[s(x) + i(v), s(z) + i(w)] eN = [s(x), s(z)] eN = s([x, z]) + F (x, z).
0 −→ (V, [., . . . , .]V )
π−→ (N , [., . . . , .]) −→ 0.
One may associate a two cocycle F ∈ Z 2(N , V ). Indeed, for x ∈ L(N ), z ∈ N , if we set
i−→ (eN , ^[., . . . , .])
F (x, z) = l(cid:16)[s(x), s(z)] − s([x, z])(cid:17) ∈ V,
then, we have F (x, z) ∈ V and F satisfies the 2-cocycle conditions.
Conversely, for each f ∈ Z 2(N , V ), one can define a central extension
0 −→ (V, [., . . . , .]V ) −→ (Nf , [., . . . , .]f ) −→ (N , [., . . . , .]) −→ 0,
by
h(x, v), (y, w)if
=(cid:16)[x, y], f (x, y)(cid:17),
where x ∈ L(N ), z ∈ N and v ∈ L(V ), w ∈ V.
Let f and g be two elements of Z 2(N , V ) such that f − g ∈ B2(G, V ) i.e. (f − g)(x, z) = h([x, z]),
where h : N → V is a linear map . Now we prove that the extensions defined by f and g are
equivalent. Let us define Φ : Nf × V → Ng × V by
Φ(x, v) = (x, v − h(x)).
It is clear that Φ is bijective. Let us check that Φ is a homomorphism of n-ary-Nambu-Lie super-
algebra . We have
hΦ((x, v)), Φ((z, w))ig
= h(x, v − h(x)), (z, w − h(z))ig
= (cid:16)[x, z], g(x, z)(cid:17)
= (cid:16)[x, z], f (x, z) − h([x, z])(cid:17)
= Φ(cid:16)([x, z], f (x, z))(cid:17)
= Φ(cid:16)[(x, v), (z, w)]f(cid:17).
8
Next, we show that for f, g ∈ Z 2(N , V ) such that the central extensions
0 → (V, [., . . . , .]V ) → (Nf , ^[., . . . , .]f ) → (N , [., . . . , .]) → 0, and
0 → (V, [., . . . , .]V ) → (Ng, ^[., . . . , .]g) → (N , [., . . . , .]) → 0, are equivalent, we have f − g ∈
B2(N , V ). Let Φ be a homomorphism of n-ary-Nambu-Lie superalgebra . such that
0
0
/ (V, [., . . . , .]V )
i1
/ (Nf , ^[., . . . , .])
π1
/ (N , [., . . . , .])
0
idV
Φ
idN
/ (V, [., . . . , .]V )
i2
/ (Ng, ^[., . . . , .])
π2
/ (N , [., . . . , .])
/ 0
commutes. We can express Φ(x, v) = (x, v − h(x)) for some linear map h : N → V. Then we have
Φ([(x, v), (z, w)]f ) = Φ(([x, z], f (x, z)))
= ([x, z], f (x, z) − h([x, z])),
[Φ((x, v)), Φ((z, w))]g = [(x, v − h(x)), (z, w − h(y))]g
= ([x, z], g(x, z)),
and thus (f − g)(x, y) = h([x, z]) (i.e. f − g ∈ B2(N , V )), so we have completed the proof.
5.1 Deformation of n-ary-Nambu-Lie superalgebra.
Definition 5.2. Let (N , [., .]) be a n-ary-Nambu-Lie superalgebra. A one -parameter formal Lie
super deformation of N is given by the K[[t]]-multilinear map [., . . . , .]t : N n−1[[t]]×N [[t]] −→ N [[t]]
of the form
[., . . . , .]t =Xi≥0
ti[., . . . , .]i,
where each [., . . . , .]i is a even multiilinear map [., . . . , .]i
K[[t]]-multilinear), [., . . . , .] = [., . . . , .]0 and satisfying the following conditions
: N n−1 × N −→ N (extended to be
[x1, . . . , xi, . . . , xj, . . . , xn]t = (−1)j−i+xi(xi+1+···+xj−1)[x1, . . . , xj, . . . , xi, . . . , xn]t, (5.1)
[x, [y, z]t]t − [[x, y]L, z]t − (−1)yx[y, [x, z]t]t = 0
(5.2)
for all homogeneous elements x, y ∈ N n−1 and z ∈ N . The super deformation is said to be of
order k if [., . . . , .]t =
ti[., . . . , .]i.
kXi=0
t =Xi≥0
Given two deformation Nt = (N , [., . . . , .]t) and N ′
t = (N ′, [., . . . , .]′
ti[., . . . , .]i and [., . . . , .]′
ti[., . . . , .]′
i with [., . . . , .]0 = [., .]′
Xi≥0
N ′
t are equivalent if there exists a formal automorphism Φt =
Φ0 = idN , such that
Φt([x, z]t) = [Φt(x), Φt(z)]′
t.
9
t) of N where [., . . . , .]t =
0 = [., . . . , .]. We say that Nt and
Φiti where Φi ∈ End(N ) and
kXi=0
/
/
/
/
/
/
/
/
/
A deformation Nt is said to be trivial if and only if Nt is equivalent to N ( viewd as superalgebra
on N [[t]].)
The identity (5.2) is called a deformation equation and it is equivalent to
i.e
or
Xi≥0,j≥0(cid:18)[x, [y, z]i]j − [[x, y]L, z]t − (−1)yx[y, [x, z]i]j(cid:19)ti+j = 0;
Xi≥0,s≥0(cid:18)[x, [y, z]i]s−i − [[x, y]L, z]s−i − (−1)yx[y, [x, z]i]s−i(cid:19)ts = 0,
tsXi≥0(cid:18)[x, [y, z]i]s−i − [[x, y]L, z]s−i − (−1)yx[y, [x, z]i]s−i(cid:19) = 0.
Xs≥0
sXi=0(cid:18)[x, [y, z]i]s−i − [[x, y]L, z]s−i − (−1)yx[y, [x, z]i]s−i(cid:19) = 0.
The deformation equation is equivalent to the follwing infinite system
(5.3)
In particular, for s = 0 we have [x, [y, z]0]0 − [[x, y]L, z]0 − (−1)yx[y, [x, z]0]0 wich is the super
Jacobie identity of N .
The equation for s = 1, is equivalent to δ2
For s ≥ 2, the identities (5.3) are equivalent to:
0([., . . . , .]1) = 0. Then [., . . . , .]1 is a 2-cocycle.
δ2([., . . . , .]s)(x, y, z) = −
One may also prove
s−1Xi=1(cid:18)[x, [y, z]i]s−i − [[x, y]L, z]s−i − (−1)yx, [y, [x, z]i]s−i(cid:19).
Theorem 5.3. Let (N , [., . . . , .]) be a n-ary-Nambu-Lie superalgebra and Nt = (N , [., . . . , .]t) be
ti[., . . . , .]i. Then there ex-
a one-parameter formal deformation of N , where [., . . . , .]t = Xi≥0
ists an equivalent deformation N ′
t = (N , [., . . . , .]′
t) where [., . . . , .]′
ti[., . . . , .]′
i such that
t = Xi≥0
[., . . . , .]′
i ∈ Z 2(N , N ) and doesn't belong to B2(N , N ).
Hence, if H 2(N , N ) = 0 then every formal deformation is equivalent to a trivial deformation.
The n-ary-Nambu-Lie superalgebra is called rigid.
6 Cohomology of the super w∞ 3-algebra
The generators of CHOVW algebra are given by
m = (−1)iλi− 1
Li
L
i
m = (−1)iλi+ 3
α+ 1
h
2
r
α+ 1
h
2
r
= (−1)α+1λα+ 1
= (−1)α+1λα+ 1
10
2 zn+iθ
2 zn+i ∂i
∂zi ,
∂i
∂
∂zi ,
∂θ
∂α
2 zr+α ∂
∂zα ,
∂θ
∂α
∂zα .
2 zr+αθ
The commutation relation is defined by
[a, b] = ab − (−1)abba.
Let us define a super 3-bracket as follows:
[a, b, c] = [a, b]c + (−1)a(b+c)[b, c]a + (−1)c(b+c).
(6.1)
(6.2)
Using (6.1), (6.2) and taking the scaling limit λ → 0, then we obtain the following super w∞-algebra.
n, Lh
h
n, L
[Li
[Li
[Li
m, Lj
m, Lj
m, Lj
m, Lj
[Li
[Li
n, h
α+ 1
m, h
2
p
α+ 1
n, h
2
p
m+n+k ,
i+j+h−1
m+n+k ,
k] =(cid:0)h(n − m) + j(m − k) + i(k − n)(cid:1)Li+j+h−1
k] =(cid:0)h(n − m) + j(m − k) + i(k − n)(cid:1)L
] =(cid:0)α(n − m) + j(m − p) + i(p − n)(cid:1)h
] =(cid:0)α(n − m) + j(m − r) + i(r − n)(cid:1)h
] =(cid:0)i(p − r) + α(r − m) + β(m − p)(cid:1)L
β+ 1
2
r
α+ 1
2
r
, h
i+j+α−1+ 1
2
m+n+p
i+j+α−1+ 1
2
m+n+r
,
,
i+α+β−1
m+r+p
.
The other brakets are obtained by supersymmetry or equals 0.
This algebra is Z2 graded with
w∞ = (w∞)0 ⊕ (w∞)1 where (w∞)0 = Mn∈Z,i∈N
< Li
n, L
i
n > and (w∞)1 = Mn∈Z,i∈N
i+ 1
< h
2
n
, h
i+ 1
n > .
2
In the following, we describe a super w∞ 3-algebra obtained in [1] and we compute its derivations
and second cohomology group.
6.1 Derivations of the super w∞ 3-algebra.
An even derivation D (resp. odd) is said of degree (s, t) if there exists (s, t) ∈ Z × N such that,
i+ 1
2
i+ 1
m > ⊕ < h
2
for all (m, i) ∈ Z × N, we have D(cid:0) < Li
m >(cid:1) ⊂(cid:0) < h
D(cid:0) < h
(cid:0) < h
m+s >(cid:1) and D(cid:0) < h
It easy to check that Der(w∞) = M(s,t)∈Z×N(cid:0)Der(w∞)(s,t)
m > ⊕ < L
i+t+ 1
m+s > ⊕ < h
2
m > (cid:1) ⊂ (cid:0) < Li+t
m+s >(cid:1) (resp. D(cid:0) < Li
m >(cid:1) ⊂(cid:0) < Li+t
(cid:1).
0 ⊕ Der(w∞)(s,t)
i+t+ 1
m+s > ⊕ < h
2
i+ 1
m > ⊕ < h
2
i+t+ 1
2
i+t+ 1
2
i+ 1
2
Let f be a homogeneous derivation
1
i
m+s > ⊕ < L
m > ⊕ < L
m+s > ⊕ < L
i
i+t
m+s > (cid:1) and
m >(cid:1) ⊂
m+s >(cid:1)).
i+t
f ([x1, x2, x3]) = [f (x1), x2, x3] + (−1)f x1[x1, f (x2), x3] + (−1)f (x1+x2)[x1, f (x2), f (x3)].
We deduce that
(cid:16)h(n − m) + j(m − k) + i(k − n)(cid:17)f (Li+j+h−1
m+n+k ) = hf (Li
ki +hLi
m), Lj
n, Lh
m, f (Lj
n), Lh
m, Lj
n, f (Lh
ki +hLi
k)i,
(6.3)
11
m), Lj
n, L
h
ki +hLi
m, f (Lj
n), L
h
ki +hLi
m, Lj
n, f (L
h
k)i
(6.4)
(cid:16)h(n − m) + j(m − k) + i(k − n)(cid:17)f (L
(cid:16)α(n − m) + j(m − r) + i(r − n)(cid:17)f (h
(cid:16)α(n − m) + j(m − r) + i(r − n)(cid:17)f (h
(cid:16)α(m − n) + j(r − m) + i(n − r)(cid:17)f (L
i+j+h−1
i+j+α−1+ 1
2
m+n+r
m+n+k ) = hf (Li
) = hf (Li
+hLi
) = hf (Li
+hLi
m+n+r ) = hf (Li
i+j+α−1+ 1
2
m+n+r
i+j+α−1
m), Lj
α+ 1
n, h
2
r
m, Lj
α+ 1
n, f (h
2
r
m), Lj
α+ 1
n, h
2
r
m, Lj
α+ 1
n, f (h
2
r
i +hLi
)i
i +hLi
)i
i +hLi
α+ 1
2
r
m, f (Lj
α+ 1
n), h
2
r
m, f (Lj
α+ 1
n), h
2
r
i
i
(6.5)
(6.6)
i
(6.7)
j+ 1
m), h
2
n
, h
α+ 1
2
r
j+ 1
m, f (h
2
n
), h
α+ 1
2
r
+(−1)f hLi
j+ 1
m, h
2
n
, f (h
)i
6.1.1
Even derivations of the super w∞ 3-algebra
Let f be an even derivation of degree (s, t),
f (Li,t
m,s) = ai,t
m,sLi+t
m+s + bi,t
m,sL
i+t
m+s,
i
m) = ci,t
f (L
m,sLi+t
m+s + di,t
m,sL
i+t
m+s,
α+ 1
f (h
2
r
) = eα,t
r,s h
α+t+ 1
r+s + f α,t
r,s h
2
α+ 1
2
r
and
By (6.3) we have
β+ 1
f (h
2
r
) = xβ,t
r,s h
β+t+ 1
r+s + yβ,t
r,s h
2
β+t+ 1
2
r+s
.
and
= ai,t
+aj,t
+ah,t
ai+j+h−1,t
m+n+k,s (cid:16)h(n − m) + j(m − k) + i(k − n)(cid:17)
m,s(cid:16)h(n − m) + j(m − k) + i(k − n) − hs + js + t(k − n)(cid:17)
n,s(cid:16)h(n − m) + (j)(m − k) + i(k − n) + hs + t(m − k) − is(cid:17)
k,s(cid:16)h(n − m) + j(m − k) + i(k − n) + t(n − m) − js + is(cid:17),
m+n+k,s(cid:16)h(n − m) + j(m − k) + i(k − n)(cid:17)
m,s(cid:16)h(n − m) + j(m − k) + i(k − n) + t(k − n) − hs + js(cid:17)
n,s(cid:16)h(n − m) + j(m − k) + i(k − n) + t(m − k) + hs − is(cid:17)
k,s(cid:16)h(n − m) + j(m − k) + i(k − n) + t(n − m) − js + is(cid:17).
bi+j+h,t
+bh,t
+bj,t
= bi,t
12
(6.8)
(6.9)
By (6.4), we have
(cid:16)h(n − m) + j(m − k) + i(k − n)(cid:17)ci+j+h−1,t
m+n+k,s = (cid:16)h(n − m) + j(m − k) + i(k − n) + t(n − m) − js + is(cid:17)ch,t
k,s
(6.10)
and
m+n+k,s
(cid:16)h(n − m) + j(m − k) + i(k − n)(cid:17)di+j+h−1,t
= (cid:16)h(n − m) + j(m − k) + i(k − n) − hs + js + t(k − n)(cid:17)ai,t
+(cid:16)h(n − m) + j(m − k) + i(k − n) + hs + t(m − k) − is(cid:17)aj,t
+(cid:16)h(n − m) + j(m − k) + i(k − n) + t(n − m) − js + is(cid:17)dh,t
m,s
n,s
k,s.
By (6.5) and (6.6), we obtain, exactly, the same equation as (6.11).
By (6.7), we obtain
m+n+r,s
(cid:16)α(m − n) + j(r − m) + i(n − r)(cid:17)di+j+h−1,t
= (cid:16)α(m − n) + j(r − m) + i(n − r) − js + αs + t(n − r)(cid:17)ai,t
+(cid:16)α(m − n) + j(r − m) + i(n − r) − αs + t(r − m) + is(cid:17)ej,t
+(cid:16)α(m − n) + j(r − m) + i(n − r) + t(m − n) + js − is(cid:17)yα,t
(cid:16)α(m − n) + j(r − m) + i(n − r)(cid:17)ci+j+α−1,t
m+n+r,s = 0.
m,s
n,s
r,s ,
and
(6.11)
(6.12)
(6.13)
Taking m = n = i = 0, j = 1 (resp. m = 1, n = −1, r = 0, i = 1, j = 0), we obtain
cα,t
r,s = 0, ∀(r, s) ∈ Z × N.
Proposition 6.1.
• If s + 2t 6= 0 we have
Der(w∞)(s,t)
0
= < ad(Lt
1+s, L1
−1) > ⊕ < ad(L0
1, L1+t
−1+s) > ⊕ < ad(L
• If s + 2t = 0 and t 6= 0 we have
Der(w∞)(s,t)
0
= < ad(L1+t
1+s, L0
−1) > ⊕ < ad(L1
1, Lt
−1+s) > ⊕ < ad(L
• If s + 2t = 0 and t = 0 we have
t
1+s, L1
−1) > ⊕ < ad(L0
1, L
1+t
1+s, L0
−1) > ⊕ < ad(L1
1, L
1+t
−1+s) >,
t
−1+s) > .
= < ad(L1
−1, L0
1) > ⊕ < ad(L1
0, L0
1+ 1
0) > ⊕ < ad(h
2
0
, h
1
2
0+ 1
0 ) > ⊕ < ad(h
2
1
, h
1+ 1
−1 ) >
2
⊕ < ϕ1 > ⊕ < ϕ2 >,
Der(w∞)(0,0)
0
where
ϕ1(Lh
ϕ2(Lh
h+ 1
k) = ϕ1(h
2
k
α+ 1
2
k
k) = ϕ2(h
) = 0, ϕ1(L
) = 0, ϕ2(L
h
k) = L
h
k) = L
α+ 1
h
k, ϕ1(h
2
k
α+ 1
h
k, ϕ2(h
2
k
α+ 1
) = h
2
k
α+ 1
) = h
2
k
.
.
13
Proof. Taking m = 1, n = −1, i = 0, j = 1 in (6.3) we obtain
(−2h + 1 − k)f (Lh
k) = a0,t
1+s, L1
k) + b0,t
t
−1)(Lh
1+s, L1
1,sad(Lt
k )
1+t
k ) + b1,t
+a1,t
−1+s)(Lh
−1,sad(L0
k)
1, L
+(−2h − 2t + 1 − k − s)f (Lh
k),
−1)(Lh
−1+s)(Lh
−1,sad(L0
1, L1+t
1,sad(L
which gives ( if s + 2t 6= 0)
f (X h
k ) =
ad(Lt
1+s, L1
−1)(X h
k ) +
ad(X
t
1+s, L1
−1)(X h
k )
ad(L0
1, L1+t
−1+s)(X h
k ) +
ad(L0
1, L
1+t
−1+s)(X h
k ) for any X h
k ∈ w∞
a0,t
1,s
s + 2t
a1,t
−1,s
s + 2t
+
b0,t
1,s
s + 2t
b1,t
−1,s
s + 2t
Taking m = 1, n = −1, i = 1, j = 0 in (6.3) we obtain
(−2h + 1 + k)f (X h
k ) = a1,t
k ) + b1,t
1+s, L0
1, Lt
1+t
1,sad(L1+t
−1)(X h
1+s, L0
k )
k ) + b0,t
+a0,t
−1,sad(L1
−1,sad(L1
1, L
+(−2h − 2t + 1 + k + s)f (X h
k ),
−1)(X h
−1+s)(X h
1,sad(L
t
−1+s)(X h
k )
which gives
f (X h
k ) =
a1,t
1,s
4t
a0,t
−1,s
4t
+
ad(L1+t
1+s, L0
−1)(X h
k ) +
b0,t
1,s
4t
ad(L
1+t
1+s, L0
−1)(X h
k )
ad(L1
1, Lt
−1+s)(X h
k ) +
b1,t
−1,s
4t
ad(L1
1, L
t
−1+s)(X h
k ) if s + 2t = 0 and t 6= 0.
Taking s = 0, t = 0, m = 0, n = 0, i = 2, j = 0 in (6.8), we obtain
ah,0
k,0 = ha2,0
0,0 + ha0,0
0,0 + a0,0
k,0, ∀k ∈ Z∗.
(6.14)
Taking s = 0, t = 0, h = 0, m = 1, i = 0, n = 0, j = 1 in (6.8), we obtain
(1 − k)a0,0
k+1,0 = (1 − k)a0,0
1,0 + (1 − k)a1,0
0,0 + (1 − k)a0,0
k,0.
We deduce that
a0,0
k,0 = (k − 1)a0,0
1,0 + (k − 1)a1,0
0,0 + a0,0
1,0 ∀k ∈ Z∗.
Then ah,0
k,0 = ha2,0
0,0 + ha0,0
0,0 + (k − 1)a0,0
1,0 + (k − 1)a1,0
0,0 + a0,0
1,0. So,
a2,0
1,0 = 2a2,0
0,0 + 2a0,0
0,0 + a0,0
1,0 = 2a2,0
0,0 − 2a1,0
0,0 + a0,0
1,0
Taking m = 1, n = 0, k = 0, i = 0, j = 1, h = 2 in (6.8), we obtain
a2,0
1,0 = a1,0
0,0 + a0,0
1,0 + a2,0
0,0
14
So
We deduce that
Then
0,0 = 3a1,0
a2,0
0,0.
ah,0
k,0 = (2h + k − 1)a1,0
0,0 + ka0,0
1,0.
(6.15)
bh,0
k,0 = (2h + k − 1)b1,0
0,0 + kb0,0
1,0.
Taking s = 0, t = 0, m = 1, n = −1, i = j = 1 in (6.12), we obtain
dh,0
k,0 = (h − 2)(a1,0
1,0 + a1,0
−1,0) + d2,0
k,0
1,0 + a1,0
Since a1,0
Taking s = 0, t = 0, m = 1, n = −0, i = 0, j = 1, h = 2 in (6.12) we obtain
1,0 we deduce that dh,0
k,0 = 2(h − 2)a1,0
−1,0 = a0,0
0,0 + d2,0
k,0.
−(k + 1)d2,0
k+1,0 = −(k + 1)a0,0
1,0 − (k + 1)a1,0
0,0 − (k + 1)d3,0
k,0.
One can deduce that
Then,
and
dh,0
k,0 = (2h + k − 1)a1,0
0,0 + ka0,0
1,0 + d2,0
0,0 − 3a1,0
0,0, ∀k ∈ Z \ {−1}.
eh,0
k,0 = (2h + k − 1)a1,0
0,0 + ka0,0
1,0 + e2,0
0,0 − 3a1,0
0,0, ∀k ∈ Z \ {−1},
r,0 = (2α + r − 1)a1,0
yα,0
0,0 + ra0,0
1,0 + y2,0
0,0 − 3a1,0
0,0, ∀r ∈ Z \ {−1}.
(6.16)
(6.17)
(6.18)
Taking m = 1, n = −1, i = j = 1 in (6.5), we obtain xα,0
So, f α,0
Using (6.15), (6.16), (6.17) and (6.18) in (6.12), we obtain d2,0
r = 0, ∀α ∈ N∗ \ {1}.
r,0 = f 2
r,0 = x2
k = 0, ∀h ∈ N∗ \ {1}.
0,0 = −3a1,0
0,0 + e2,0
0,0 + y2,0
0,0.
Therefore,
f = a1,0
0,0ad(L1
−1, L0
1) + a0,0
1,0ad(L1
0, L0
0) + b1,0
0,0ad(h0
1, h
1
−1) − b0,0
1,0ad(h1
0, h
0
0) + (d2,0
0,0 − 3a1,0
0,0)ϕ1 + (e2,0
0,0 − 3a1,0
0,0)ϕ2,
where,
ϕ1(Lh
ϕ2(Lh
h+ 1
k ) = ϕ1(h
2
k
α+ 1
k ) = ϕ2(h
2
k
) = 0, ϕ1(L
) = 0, ϕ2(L
α+ 1
h
h
k) = L
k, ϕ1(h
2
k
α+ 1
h
h
k) = L
k, ϕ2(h
2
k
α+ 1
) = h
2
k
α+ 1
) = h
2
k
,
.
15
6.2 Odd derivation
Let f be an odd derivation of degree (s, t),
f (Li,t
m,s) = ai,t
i
m) = ci,t
f (L
) = eα,t
α+ 1
f (h
2
r
β+ 1
f (h
2
r
) = xβ,t
i+t 1
m+s + bi,t
2
m+s + di,t
r+s + f α,t
r+s + yβ,t
m,sh
m,shi+t
r,s lα+t
r,s lβ+t
r,s L
r,s L
m,sh
m,sh
α+t
r+s
β+t
r+s
i+t+ 1
m+s ,
2
i+t
m+s,
(6.19)
Proposition 6.2.
• If s + 2t 6= 0, then we have
.
Der(w∞)(s,t)
1
t+ 1
1+s , L1
2
= < ad(h
−1) > ⊕ < ad(h
• If s + 2t = 0 and t 6= 0 we have
t+ 1
1+s , L1
2
−1) > ⊕ < ad(L0
1, h
1+t+ 1
−1+s ) > ⊕ < ad(L0
2
1, h
1+t+ 1
−1+s ) > .
2
Der(w∞)(s,t)
1+t+ 1
2
1+s
1
= < ad(h
, L0
−1) > ⊕ < ad(h
1+t+ 1
2
1+s
, L0
−1) > ⊕ < ad(L1
1, h
t+ 1
−1+s) > ⊕ < ad(L1
2
1, h
t+ 1
−1+s) > .
2
• If s + 2t = 0 and t = 0
Der(w∞)(0,0)
1
= < ad(L0
1, h
1+ 1
−1 ) > ⊕ < ad(L0
2
1, h
1+ 1
−1 ) > ⊕ < ad(L0
2
1+ 1
0, h
2
0
) > ⊕ < ad(L0
0, h
1+ 1
2
0
) >
Proof. Setting m = 1, n = −1, i = 0, j = 1 in (6.3), one has
(−2h + 1 − k)f (Lh
k) = a0,t
k ) + b0,t
t+ 1
1+s , L1
2
1,sad(h
+a1,t
+(−2h − 2t + 1 − k − s)f (Lh
−1)(Lh
1+t+ 1
−1+s )(Lh
2
t+ 1
1+s , L1
1,sad(h
2
k ) + b1,t
−1,sad(L0
k),
−1,sad(L0
1, h
−1)(Lh
k)
1+t+ 1
−1+s )(Lh
k)
2
1, h
which gives
f (Lh
k) =
a1,t
−1,s
s + 2t
+
a0,t
1,s
s + 2t
ad(h
t+ 1
1+s , L1
2
ad(L0
1, h
1+t+ 1
−1+s )(Lh
2
−1)(Lh
k) +
b1,t
−1,s
s + 2t
k ) +
b0,t
1,s
s + 2t
ad(h
t+ 1
1+s , L1
2
−1)(Lh
k )
ad(L0
1, h
1+t+ 1
−1+s )(Lh
2
k) if s + 2t 6= 0.
Furthermore , taking m = 1, n = −1, i = 1, j = 0 in (6.3), one has
f (Lh
k) =
ad(h
1+t+ 1
2
1+s
, L0
−1)(Lh
k) +
ad(h
1+t+ 1
2
1+s
, L0
−1)(Lh
k )
ad(L1
1, h
t+ 1
−1+s)(Lh
2
k ) if t 6= 0.
a1,t
1,s
4t
a0,t
−1,s
4t
+
b0,t
1,s
4t
b1,t
−1,s
4t
ad(L1
1, h
t+ 1
−1+s)(Lh
2
k ) +
16
By (6.3) and (6.19) we obtain, exactly, the same equation as (6.8) and (6.9).
By (6.4) and (6.19) we obtain, exactly, the same equation as ( 6.10) and (6.11).
By (6.5) and (6.19) we obtain (6.11) and (6.10).
By (6.6) and (6.19) we obtain (6.11) and (6.10).
Therefore,
ah,0
k,0 = (2h + k − 1)a1,0
0,0 + ka0,0
1,0
bh,0
k,0 = (2h + k − 1)b1,0
0,0 + kb0,0
1,0.
dh,0
k,0 = (2h + k − 1)a1,0
0,0 + ka0,0
1,0 + d2,0
0,0 − 3a1,0
0,0, ∀k ∈ Z \ {−1}.
We deduce that
f = a1,0
0,0ad(L0
1, h
1+ 1
−1 ) + a0,0
2
1,0ad(L0
1, h
1+ 1
−1 ) + b1,0
2
0,0ad(L0
1+ 1
0, h
2
0
) + b0,0
1,0ad(L0
0, h
1+ 1
2
0
)
6.3 Cohomology space H 2
0 (w∞, C) of w∞
In the following we describe the cohomology space H 2
class of an element f .
0 (w∞, C) . We denote by [f ] the cohomology
Theorem 6.3. The second cohomology of the super w∞ 3-algebra with values in the trivial module
vanishes, i.e
H 2
0 (w∞, C) = {0}.
Proof. For all f ∈ Z 1
0 (w∞, C) (resp. f ∈ Z 2
0 (w∞, C)) we have, respectively,
δ1(f )(x0, z) = f ([x1, x2, x3]) = 0,
(6.20)
δ2(f )(x0, x1, z) = −f(cid:16)[x0, x1], z(cid:17) − (−1)x0x1f(cid:16)x1, ad(x0)(z)(cid:17) + f(cid:16)x0, ad(x1)(z)(cid:17) = 0.
(6.21)
n, Lh
k), (Li
m, Lj
n, L
h
k), (Li
m, Lj
α+ 1
n, h
2
r
), (Li
m, Lj
n, h
α+ 1
2
r
α+ 1
), (h
2
r
, Li
m, h
β+ 1
2
s
)(cid:27).
k )(cid:17) = 0.
m, Lj
k ) ∈(cid:26)(Li
k(cid:17) − f(cid:16)X v
q], X h
Case 1 (X v
p , X l
q, X h
Using (6.21), we have
−f(cid:16)[Li
Since [x, y]l =
then
n−1Xi=1
m ∧ Lj
n, X v
p ∧ X l
p ∧ X l
q, ad(Li
m ∧ Lj
n)(X h
m ∧ Lj
n, ad(X v
p ∧ X l
q)(X h
k )(cid:17) + f(cid:16)Li
(−1)x(y1+···+yi−1)y1 ∧ · · · ∧ ad(x)(yi) ∧ · · · ∧ yn−1, and ad(a ∧ b)(z) = [a, b, z]
−f(cid:16)[Li
−f(cid:16)X v
m ∧ Lj
n, X v
p ] ∧ X l
q, X h
p , [Li
m ∧ Lj
n, X l
q], X h
p ∧ X l
q, [Li
m ∧ Lj
n, X h
m ∧ Lj
n, [X v
p ∧ X l
q, X h
k(cid:17) − f(cid:16)X v
k ](cid:17) + f(cid:16)Li
17
k(cid:17)
k ](cid:17) = 0.
So,
m+n+p ∧ X l
−(cid:18)v(n − m) + j(m − p) + i(p − n)(cid:19)f(cid:16)X i+j+v−1
−(cid:18)l(n − m) + j(m − q) + i(q − n)(cid:19)f(cid:16)X v
−(cid:18)h(n − m) + j(m − k) + i(k − n)(cid:19)f(cid:16)X v
+(cid:18)h(q − p) + l(p − k) + i(k − q)(cid:19)f(cid:16)Li
m ∧ Lj
p ∧ X l
q, X h
k(cid:17)
k(cid:17)
m+n+k (cid:17)
p+q+k (cid:17) = 0,
q, X i+j+h−1
p ∧ X i+j+l−1
m+n+q , X h
n, X v+l+h−1
where p is the integer part of p.
Setting m = 0, n = 0, i = 1, j = 0, in (6.22), we obtain
(6.22)
f (X v
p ∧ X l
q, X h
k(cid:17)) =
h(q − p) + l(p − k) + (k − q)
p + q + k
f (L1
0 ∧ L0
0, X v+t+h−1
p+q+k
) (p + q + k 6= 0).
Setting m = 1, n = −1, i = 1, j = 0, k = −p − q (6.22), we obtain
f (X v
p ∧ X l
q, X h
−p−q) = −
h(q − p) + l(2p − q) + (−p − 2q)
2l + 2v + 2h − 3
f (L1
1 ∧ L0
−1, X v+l+h−1
0
).
Setting m = 1, j = 0, i = 1, p = 1, q = −1, v = 1, l = 0, k = 0 (6.22), we obtain
(−2h − 1)f(cid:16)L1
1 ∧ L0
−1, X h
0(cid:17) = 0.
Then f (L1
1 ∧ L0
We deduce that
−1, X h
0 ) = 0.
We define an endomorphism g of w∞ by g(X h
By (6.20) we obtain
k f (L1
1 ∧ L0
−1, X h
k ) and g(X h
0 ) = 0.
f (X v
p ∧ X l
−p−q) = 0.
q, X h
k ) = − 1
δ1(g)(X v
p ∧ X l
q, X h
k ) = −g(ad(X v
p ∧ X l
q)(X h
k )) = f (Li
m ∧ Lj
n, X h
k ).
Case 2 (X v
p , X l
q, X h
Using (6.21), we have
), (Li
m, Lj
n, h
n, L
n, Lh
m, Lj
m, Lj
m, Lj
k), (Li
h
k), (Li
α+ 1
n, h
2
r
k ) /∈(cid:26)(Li
−(cid:16)v(n − m) + j(m − p) + i(p − n)(cid:17)f(cid:16)X i+j+v−1
−(cid:16)l(n − m) + j(m − q) + i(q − n)(cid:17)f(cid:16)X v
−(cid:16)h(n − m) + j(m − k) + i(k − n)(cid:17)f(cid:16)X v
+f(cid:16)Li
n, 0(cid:17) = 0.
m ∧ Lj
p ∧ X l
m+n+p ∧ X l
p ∧ X i+j+l−1
q, X h
k(cid:17)
k(cid:17)
m+n+k (cid:17)
m+n+q , X h
q, X i+j+h−1
α+ 1
2
r
α+ 1
), (h
2
r
, Li
β+ 1
m, h
2
s
)(cid:27).
(6.23)
Setting m = 0, n = 0, i = 1, j = 0, in (6.23), we obtain f (X v
Setting m = 1, n = −1, i = 1, j = 0, in (6.23), we obtain f (X v
p ∧ X l
q, X h
k ) = 0 (p + q + k 6= 0).
p ∧ X l
q, X h
k ) = 0 .
18
6.4 Second cohomology H 2(w∞, w∞).
In this section, we aim compute the second cohomology group of w∞ with values in itself.
Theorem 6.4. The second cohomology of the 3-ary-Nambu-Lie superalgebra w∞) with values in
the adjoint module vaniches, i.e.
H 2(w∞, w∞) = {0}.
Then, every formal deformation is equivalent to trivial deformation.
Proof. For all g ∈ Z 1
0 (w∞) (resp. f ∈ Z 2
0,s(w∞)) we have respectively
p ∧ Ll
p ∧ Ll
q, X h
k )
q, X h
δ1(g)(Lv
= −g(cid:16)(cid:2)Lv
k(cid:3)(cid:17) +hLv
p ∧ Ll
q, g(X h
k ∧ Ll
q, g(Lv
k ∧ Lv
p, g(Ll
k )i −hX h
p)i +hX h
q)i = 0.
m ∧ Lj
n, [X v
p ∧ X l
q, X h
m ∧ Lj
n, f (X v
p ∧ X l
q, X h
p ∧ X l
q, f (Li
m ∧ Lj
n, X h
p , [Li
m ∧ Lj
n, X l
q], X h
p ∧ X l
q, [Li
m ∧ Lj
n, X h
m ∧ Lj
m ∧ Lj
n, X v
n, X v
p ∧ X l
p ] ∧ X l
q, X h
k )
q, X h
δ2(f )(Li
= −f(cid:16)[Li
+f(cid:16)Li
+hX h
Case 1: s 6= 0.
k(cid:17) − f(cid:16)X v
k ](cid:17) +hLi
p )i −hX h
k ∧ X l
q, f (Li
m ∧ Lj
n, X v
k ∧ X v
p , f (Li
m ∧ Lj
n, X l
k(cid:17) − f(cid:16)X v
k )i −hX v
q)i = 0.
k ](cid:17)
k )i
Setting m = 0, n = 0, i = 0, j = 1, in (6.22), we obtain
q, X h
p ∧ X l
(cid:0)p + q + k(cid:1)f(cid:0)X v
k(cid:1)
+(cid:0)h(q − p) + l(p − k) + v(k − q)(cid:1)f(cid:0)L0
k )(cid:3) +(cid:2)X h
−(cid:2)X v
q, f (L0
p ∧ X l
0 ∧ L1
0, X h
0 ∧ L1
0, X v+l+h−1
0, X v
p+q+k
0 ∧ L1
k ∧ X l
q, f (L0
0 ∧ L1
0, f (X v
p ∧ X l
q, X h
k ∧ X v
p , f (L0
0 ∧ L1
0, X l
(cid:1) +(cid:2)L0
p )(cid:3) −(cid:2)X h
s f (L0
0 ∧ L1
0, X h
k ).
k )(cid:3)
q)(cid:3) = 0.
We denote by g the linear map defined on w∞ by g(X h
It easy to verify that δ1(g)(X v
p ∧ X l
Case 2: s = 0.
k ) = f (X v
p ∧ X l
q, X h
k ) = − 1
q, X h
k ).
Setting m = 1, n = −1, i = 1, j = 0 in (6.22), we obtain
p ∧ X l
q, X h
q, f (L1
k(cid:1) +(cid:0)h(q − p) + l(p − k) + v(k − q)(cid:1)f(cid:0)L1
q, f (L1
−1, X h
−1, X v
k ∧ X l
1 ∧ L0
1 ∧ L0
p ∧ X l
−2f(cid:0)X v
−(cid:2)X v
k )(cid:3) +(cid:2)X h
1 ∧ L0
−1, X v+l+h−1
p+q+k
k ∧ X v
p )(cid:3) −(cid:2)X h
(cid:1)
p , f (L1
1 ∧ L0
−1, X l
q)(cid:3) = 0
We denote by g the linear map defined on w∞ by g(X h
q, X h
It easy to verify that δ1(g)(X v
k ) = f (X v
p ∧ X l
p ∧ X l
q, X h
2 f (L1
k ) = − 1
−1, X h
k ), that ends the proof.
1 ∧ L0
k ).
19
References
[1] Min-Rue Chen,Ke Wua and Wei-Zhong Zhao:
Super w1 3-algebra, Sissa-Springer 090, no.
10, 1007 (2011).
[2] P. D. Beites and A. P. Pozhidaev: ON SIMPLE FILIPPOV SUPERALGEBRAS OF TYPE
A(m, n), arxiv.: 1008.0715v1, , 1007 (2010).
[3] Ruipu Bai and Ying Li: T ∗
θ . -Extensions of n-Lie Algebras, International Scholarly Research
Network ISRN Algebra: 10.5402,381875 , (2011).
[4] Faouzi Ammar, Abdenacer Makhlouf, Nejib Saadoui: Cohomology of Hom-Lie superalgebras
and q-deformed Witt superalgebra, arXiv: 1204.6244, (2012).
[5] Nambu Y: Generalized Hamiltonian mechanics, Phys. Rev. D7: 17405-2412, (1973).
[6] Bagger J. and Lambert N.: Gauge Symmetry and Supersymmetry of multiple M2Branes,
arXiv:0711.0955v2[hep-th] (2007) Phys. Rev. D77: 065008, (2008).
[7] Basu A. and Harvey J.A.: The M2-M5 brane system and a generalised nahm equation Nucl,
Phys. B713: (2005).
[8] Kerner R. : Ternary algebraic structures and their application in physics, in the "Proc.
BTLP 23rd international Colloqium on Group Theoretical Methods in Physics" arXiv math-
ph:0011023,(2000)
[9] R. Kerner, Z3-graded algebras and non-commutative gauge theories, dans le livre, in: Z.
Oziewicz, B. Jancewicz, A. Borowiec (Eds.), Spinors, Twistors, Clifford Algebras and Quantum
Deformations, Kluwer Academic Publishers, 1993, pp. 349357.
[10] -- -- -- -- :The cubic chessboard : Geometry and physics, Classical Quantum Gravity 14, A203-
A225 (1997).
[11] Daletskii Y.L. and Takhtajan L.A.: Leibniz and Lie Structures for Nambu algebra, Letters in
Mathematical Physics 39, (1997) 127141.
[12] Takhtajan L. :TOn foundation of the generalized Nambu mechanics, Comm. Math. Phys.
160(1994), 295-315.
[13] Filippov V., n-Lie algebras, Sibirsk. Mat. Zh. 26, 126-140 (1985) (English transl.: Siberian
Math. J. 26, 879-891 (1985)).
[14] Cassas J.M., Loday J.-L. and Pirashvili Leibniz n-algebras, Forum Math. 14 (2002), 189207.
[15] Ataguema H., Makhlouf A. Deformations of ternary algebras, Journal of Generalized Lie The-
ory and Applications, vol. 1, (2007), 4145.
[16] -- -- -- Notes on cohomologies of ternary algebras of associative type, Journal of Generalized
Lie Theory and Applica- tions 3 no. 3, (2009), 157174
20
[17] Gautheron P.: Some Remarks Concerning Nambu Mechanics, Letters in Mathematical Physics
37 (1996) 103116.
[18] J.A. De Azcarraga, J.M. Izquierdo, Cohomology of Filippov algebras and an analogue of
Whiteheads lemma, J. Phys. Conf. Ser. 175 (2009) 012001
[19] Takhtajan L., :On foundation of the generalized Nambu mechanics, Comm. Math. Phys. 160
(1994), 295-315.
[20] L. Takhtajan. A higher order analog of Chevally-Eilenberg complex and deformation theory of
n-algebras, St. Petersburg Math. J., 6 (1995), 429-438.
21
|
1809.05711 | 1 | 1809 | 2018-09-15T12:56:48 | Zinbiel algebras and bialgebras: main properties and related algebraic structures | [
"math.RA"
] | This work provides a characterization of left and right Zinbiel algebras.Basic identities are established and discussed, showing that Zinbiel algebras are center-symmetric, and therefore Lie-admissible algebras. Their bimodules are given, and used to build a Zinbiel algebra structure on the direct sum of the underlying vector space and a finite-dimensional vector space. In addition, their matched pair is built, and related to the matched pair of their sub-adjacent Lie algebras. Besides, Zinbiel coalgebras are introduced, and linked to their underlying Lie coalgebras and coassociative coalgebras. Moreover, the related Manin triple is defined, and used to characterize Zinbiel bialgebras, and their equivalence to the associated matched pair. | math.RA | math |
Zinbiel algebras and bialgebras: main properties
and related algebraic structures
Mahouton Norbert Hounkonnou
University of Abomey-Calavi, International Chair in Mathematical Physics and
Applications, ICMPA-UNESCO Chair, 072 BP 50, Cotonou, Rep. of Benin
E-mail: [email protected], with copy to [email protected]
Mafoya Landry Dassoundo
University of Abomey-Calavi, International Chair in Mathematical Physics and
Applications, ICMPA-UNESCO Chair, 072 BP 50, Cotonou, Rep. of Benin
E-mail: [email protected]
Abstract. This work provides a characterization of left and right Zinbiel algebras.
Basic identities are established and discussed, showing that Zinbiel algebras are center-
symmetric, and therefore Lie-admissible algebras. Their bimodules are given, and used
to build a Zinbiel algebra structure on the direct sum of the underlying vector space and
a finite-dimensional vector space. In addition, their matched pair is built, and related
to the matched pair of their sub-adjacent Lie algebras. Besides, Zinbiel coalgebras are
introduced, and linked to their underlying Lie coalgebras and coassociative coalgebras.
Moreover, the related Manin triple is defined, and used to characterize Zinbiel bialgebras,
and their equivalence to the associated matched pair.
1. Introduction
One of the important subclasses of nonassociative algebras is that of Lie algebras. Their
properties lead to some generalizations of associative algebras such as Lie-admissible
algebras [1], left-symmetric algebras [2], flexible algebras, alternative algebras, Malcev
algebras, Leibniz algebras, etc.
Leibniz algebra is an algebra (A, [, ]) such that the following identity is satisfied:
[x, [y, z]] = [[x, y], z] − [[x, z], y], ∀x, y, z ∈ A.
(1.0.1)
The category of Zinbiel algebras is Koszul dual to the category of Leibniz algebras in the
sense of J-L. Loday [3], where Zinbiel algebras were called Leibniz algebras. They appear
in various domains in mathematics and physics, e.g. , in the theory of nonlinear geometric
control [4] characterized by the following system:
x1 = u1,
x2 = u2,
x3 =
x1u2 − u2x1.
u1 6 1
u2 6 1
(1.0.2)
This system is completely controllable,
every point can be reached from every
other point, since the distribution spanned by the vector fields f1 = ∂x1 − x2∂x3 and
f2 = ∂x1 − x3∂x3 is nonintegrable due to the nonvanishing commutator [f1, f2] = 2∂x3.
Performing the global coordinate change y1 = x1, y2 = x2, y3 = 1
2 (x3 + x1x2) transforms
the initial system into a less symmetric but simpler form:
i.e.
Now setting
y1 = u1,
y2 = u2,
y3 = y1u2.
u1 6 1
u2 6 1
u3(t) = (u1 ⋆ u2)(t) :=(cid:18)Z t
0
u1(s)ds(cid:19) u2(t)
(1.0.3)
(1.0.4)
yields the Zinbiel identity
(u1 ⋆ (u2 ⋆ u3))(t) = ((u1 ⋆ u2 + u2 ⋆ u1) ⋆ u3)(t).
(1.0.5)
Besides, Zinbiel algebras under q-commutator given by x ◦q y = x ◦ y + qy ◦ x, where
q ∈ C, were investigated in [5].
In this work, we provide a characterization of left and right Zinbiel algebras. We
establish and discussed their basic identities, showing that Zinbiel algebras are center-
symmetric, and, therefore, Lie-admissible algebras. Furthermore, the bimodules are
defined and used to build a Zinbiel algebra structure on the direct sum of the underlying
vector space and a finite-dimensional vector space.
In addition, their matched pair is
constructed and related to the matched pair of their sub-adjacent Lie algebras. Besides,
Zinbiel coalgebras are introduced, and linked to their underlying Lie coalgebras and
coassociative algebras. Moreover, the related Manin triple is defined and used to
characterize Zinbiel bialgebras, and their equivalence to the associated matched pair.
2. Zinbiel algebras: basic properties and consequences
2.1. Zinbiel algebras
Definition 2.1 A left (resp. right) Zinbiel algebra is a vector space A endowed with a
bilinear product ∗ satisfying, for all x, y, z ∈ A,
(x ∗ y) ∗ z = x ∗ (y ∗ z) + x ∗ (z ∗ y),
(2.1.1)
(
resp.
x ∗ (y ∗ z) = (x ∗ y) ∗ z + (y ∗ x) ∗ z
),
(2.1.2)
or, equivalently,
(x, y, z) = x ∗ (z ∗ y)
(
resp.
(x, y, z) = −(y ∗ x) ∗ z)
),
(2.1.3)
(2.1.4)
where, ∀x, y, z ∈ A, (x, y, x) = (x ∗ y) ∗ z − x ∗ (y ∗ z) is the associator associated to ∗.
Proposition 2.2 Let A be a vector space, µ : A × A → A, (x, y) 7→ µ(x, y) = x ∗ y, a
bilinear product, τ an exchange map defined on A ⊗ A, and id the identity map defined
on A. Then, if (A, ∗) is a left Zinbiel algebra, the relation
x ∗ (y ∗ z) = y ∗ (x ∗ z),
∀x, y, z ∈ A,
equivalent to the two equations:
µ ◦ (id ⊗µ) = µ ◦ (id ⊗µ) ◦ (τ ⊗ id),
and
holds.
µ ◦ (id ⊗µ) = (µ ◦ τ ) ◦ (µ ⊗ id) ◦ (id ⊗τ ),
Similarly, if (A, ∗) is a right Zinbiel algebra, the relation
(x ∗ y) ∗ z = (x ∗ z) ∗ y,
∀x, y, z ∈ A,
equivalent to the two identities:
µ ◦ (µ ⊗ id) = µ ◦ (µ ⊗ id) ◦ (id ⊗τ ),
(2.1.5)
(2.1.6)
(2.1.7)
(2.1.8)
(2.1.9)
and
is satisfied.
µ ◦ (µ ⊗ id) = (µ ◦ τ ) ◦ (id ⊗µ) ◦ (τ ⊗ id).
(2.1.10)
2.2. Basic properties
Definition 2.3 The opposite algebra of the algebra (A, ∗) is the algebra denoted by
Aopp = (A, ∗opp) whose product is given by x ∗opp y = y ∗ x, for all x, y ∈ A.
Remark 2.4 (i) If (A, ∗) is a commutative algebra, then Aopp = (A, ∗). Conversely, if
Aopp = (A, ∗), then (A, ∗) is a commutative algebra.
(ii) The opposite algebra of the left (resp. right) Zinbiel algebra is a right (resp.
left)
Zinbiel algebra under the same underlying vector space.
In the sequel, both the left and right Zinbiel algebras are simply called Zinbiel algebras.
Proposition 2.5 [6] Let (A, ∗) be a Zinbiel algebra. Then (A, {, }∗), such that, for all
x, y ∈ A, {x, y}∗ = x ∗ y + y ∗ x, is a commutative associative algebra.
Proposition 2.6 Consider a Zinbiel algebra (A, µ), µ : A × A → A, (x, y) 7→ µ(x, y) =
x ∗ y, and the bilinear map τ : A ⊗ A → A ⊗ A given by τ (x ⊗ y) = y ⊗ x for all x, y ∈ A.
Then, the following identities hold:
µ ◦ (id ⊗(µ ◦ τ )) = µ ◦ (µ ⊗ id) ◦ (id ⊗τ ) + (µ ◦ τ ) ◦ (id ⊗(µ ◦ τ )) ◦ (τ ⊗ id)
(2.2.1)
(µ ◦ τ ) ◦ (µ ⊗ id) = µ ◦ (µ ⊗ id) ◦ (id ⊗τ ) + (µ ◦ τ ) ◦ (id ⊗(µ ◦ τ )) ◦ (τ ⊗ id)
(2.2.2)
(µ ◦ τ ) ◦ ((µ ◦ τ ) ⊗ id) = (µ ◦ τ ) ◦ (id ⊗µ) + (µ ◦ τ ) ◦ (id ⊗(µ ◦ τ ))
(2.2.3)
µ ◦ (id ⊗µ) = µ ◦ (id ⊗µ) ◦ (τ ⊗ id)
(2.2.4)
Theorem 2.7 Let (A, ∗) be a Zinbiel algebra. Then (A, [, ]∗) is a Lie algebra, where, for
all x, y ∈ A, [x, y]∗ = x ∗ y − y ∗ x.
Proof.
Consider a Zinbiel algebra (A, µ), where for all x, y ∈ A, µ(x, y) = x ∗ y. By its
definition, the commutator of a bilinear product is bilinear and skew symmetric. Thus,
proving that (A, [, ] := µ−µ◦τ ) is a Lie algebra, it only remains to prove that [, ] := µ−µ◦τ
satisfies the Jacobi identity. Indeed, we have, for all x, y, z ∈ A,
[x, [y, z]] + [y, [z, x]] + [z, [x, y]] = [x, y ∗ z − z ∗ y] + [y, z ∗ x − x ∗ z] + [z, x ∗ y − x ∗ y]
= {x ∗ (y ∗ z) − y ∗ (x ∗ z)} + {y ∗ (z ∗ x) − z ∗ (y ∗ x)}
+ {z ∗ (x ∗ y) − x ∗ (z ∗ y)} + {(y ∗ x) ∗ z − (y ∗ z) ∗ x}
+ {(z ∗ y) ∗ x − (z ∗ x) ∗ y} + {(x ∗ z) ∗ y − (x ∗ y) ∗ z}
= {µ ◦ (id ⊗µ) − µ ◦ (id ⊗µ) ◦ (τ ⊗ id)}(x, y, z)
+ {µ ◦ (id ⊗µ) − µ ◦ (id ⊗µ) ◦ (τ ⊗ id)}(y, z, x)
+ {µ ◦ (id ⊗µ) − µ ◦ (id ⊗µ) ◦ (τ ⊗ id)}(z, x, y)
+ {(µ ◦ τ ) ◦ (id ⊗(µ ◦ τ ))
− µ ◦ ((µ ◦ τ ) ⊗ id) ◦ (id ⊗τ )}(z, x, y)
+ {(µ ◦ τ ) ◦ (id ⊗(µ ◦ τ ))
− µ ◦ ((µ ◦ τ ) ⊗ id) ◦ (id ⊗τ )}(x, y, z)
+ {(µ ◦ τ ) ◦ (id ⊗(µ ◦ τ ))
− µ ◦ ((µ ◦ τ ) ⊗ id) ◦ (id ⊗τ )}(y, z, x).
Using the relations (2.1.6), (2.1.7), (2.1.10) and (2.1.9), the right hand side of the last
equality of this equation vanishes. Therefore, for all x, y, z ∈ A,
[x, [y, z]∗]∗ + [y, [z, x]∗]∗ + [z, [x, y]∗]∗ = 0,
i.e. the Jacobi identity associated to the bilinear product [, ]∗ holds. Hence, (A, [, ]∗) is a
Lie algebra.
(cid:3)
From the definition of a center-symmetric algebra given in [7] by, for all x, y, z ∈ A,
(x, y, z)◦ := (z, y, x)◦, where (x, y, z)◦ := (x ◦ y) ◦ z − x ◦ (y ◦ z) is the associator of the
bilinear product ◦, we have:
Proposition 2.8 Any Zinbiel algebra is a center-symmetric algebra.
Example 2.9 Consider a vector space A given by A = C[X] :=(a =Xk∈N
On A, we define the bilinear products given by, for all a, b ∈ A,
akX k, ak ∈ C).
a ∗ b := bZ X
0
a(t)dt
and
a ◦ b :=Z X
0
b(t)∂t(a(t))dt,
(2.2.5)
where ∂t := d
dt
. Then, the associators of these products are given, for any a, b, c ∈ A, by
(a, b, c)∗ = −(b ∗ a) ∗ c,
(a, b, c)◦ = a ◦ (c ◦ b).
(2.2.6)
(2.2.7)
Therefore, (C[X], ∗) and (C[X], ◦) are right and left Zinbiel algebras, respectively.
2.3. Bimodule
Definition 2.10 A bimodule of a Zinbiel algebra is a triple (l, r, A), where A is a vector
space endowed with a Zinbiel algebra structure, V is a vector space, and l, r : A → gl(V )
are two linear maps satisfying the following relations, for all x, y ∈ A,
lxly = lx·y + ly·x,
lxry = rx·y = ryrx + rylx.
(2.3.1)
(2.3.2)
Proposition 2.11 Let (A, ·) be a Zinbiel algebra. Consider a vector space V over a field
K and two linear maps l, r : A → gl(V ). The triple (l, r, V ) is a bimodule of A if and only
if there is a Zinbiel algebra structure on the vector space A ⊕ V given by, ∀x, y ∈ A and
all u, v ∈ V,
(x + u) ∗ (y + v) = x · y + (lxv + ryu).
(2.3.3)
Proposition 2.12 Let (l, r, V ) be a bimodule of a Zinbiel algebra (A, ·), where V is a
vector space and l, r : A → gl(V ) are two linear maps. Then,
(i) the following conditions are satisfied, for all x, y ∈ A,
lxy = rylx,
rxry = ryrx.
(2.3.4)
(2.3.5)
(ii) the linear map l − r : A → gl(V ), x 7→ lx − rx is a representation of the sub-adjacent
Lie algebra G(A) := (A, [, ]·) associated to (A, ·).
2.4. Matched pair
Definition 2.13 [8] Let (G, ·) and (H, ◦) be two commutative associative algebras, and
ρ : H → gl(G) and µ : G → gl(H) be two K-linear maps which are representations of H
and G, respectively, satisfying the following relations: for all x, y ∈ G and all a, b ∈ H,
µ(x)(a ◦ b) = (µ(x)a) ◦ b + µ(ρ(a)x)b,
ρ(a)(x · y) = (ρ(a)x) · b + ρ(µ(x)a)y.
(2.4.1)
(2.4.2)
Then, (G, H, ρ, µ) is called a matched pair of the commutative associative algebras G and
H, denoted by G ⊲⊳µ
ρ H.
In this case, (G ⊕ H, ∗) defines a commutative associative algebra with respect to the
product ∗, given, for all x, y ∈ G and all a, b ∈ H, by
(x + a) ∗ (y + b) = x · y + µ(a)y + µ(b)x + a ◦ b + ρ(x)b + ρ(y)a.
Definition 2.14 [9] Let (G, [, ]G ) and (H, [, ]H ) be two Lie algebras and let µ : H → gl(G)
and ρ : G → gl(H) be two Lie algebra representations satisfying the following relations, for
all x, y ∈ G and all a, b ∈ H,
ρ(x) [a, b]
H
− [ρ(x)a, b]
H
− [a, ρ(x)b]
H
+ ρ(µ(a)x)b − ρ(µ(b)x)a = 0,
(2.4.3)
µ(a) [x, y]
G
− [µ(a)x, y]
− [x, µ(a)y]
G
G
+ µ(ρ(x)a)y − µ(ρ(y)a)x = 0.
(2.4.4)
Then, (G, H, ρ, µ) is called a matched pair of the Lie algebras G and H, denoted by H ⊲⊳ρ
µ G.
In this case, (G ⊕ H, [, ]G⊕H ) is a Lie algebra with respect to the product [, ]G⊕H defined on
the direct sum vector space G ⊕ H by, ∀x, y ∈ G and all a, b ∈ H,
[(x + a), (y + b)]G⊕H = [x, y]G + µ(a)y − µ(b)x + [a, b]H + ρ(x)b − ρ(y)a.
(2.4.5)
Theorem 2.15 Let (A, ·) and (B, ◦) be two Zinbiel algebras. Consider the four linear
maps defined as lA, rA : A → gl(B) and lB, rB : B → gl(A). Suppose that (lA, rA, B) and
(lB, rB, A) are bimodules of A and B, respectively, obeying the relations, for all x, y ∈ A
and all a, b ∈ B,
rB(a)(x · y + y · x) − x · (rB(a)y) − rB(lA(y)a)x = 0,
rA(x)(a ◦ b + b ◦ a) − a ◦ (rA(x)b) − rA(lB(b)x)a = 0,
lB(a)(x · y) = ((lB + rB)(a)x) · y + lB((lA + rA)(x)a)y
= x · (lB(a)y) + rB(rA(y)a)x,
(2.4.6)
(2.4.7)
(2.4.8)
lA(x)(a ◦ b) = lA((lB + rB)(a)x)b + ((lA + rA)(x)a) ◦ b
(2.4.9)
= a ◦ (lA(x)b) + rA(rB(b)x)a.
Then, there is a Zinbiel algebra structure on A ⊕ B given by:
(x + a) ∗ (y + b) = (x · y + lB(a)y + rB(b)x) + (a ◦ b + lA(x)b + rA(y)a).
(2.4.10)
Proof.
Suppose x, y, z ∈ A and a, b, c ∈ B. Then, using the bilinear product ∗ defined on A⊕B
by (x + a) ∗ (y + b) = {x · y + lB(x)y + rB(b)x} + {a ◦ b + lA(x)b + rA(y)a}, we have:
{(x + a) ∗ (y + b)} ∗ (z + c) = (x · y) · z + ((lB(a)y) · z + lB(rA(y)az)) + lB(a ◦ b)z
+rB(c)(x · y) + ((rB(b)x) · z + lB(lA(x)b)z) + rB(c)(lB(a)y) + rB(c)(rB(b)x)
+(a ◦ b) ◦ c + ((lA(x)b) ◦ c + lA(rB(b)x)c) + lA(x · y)c + rA(z)(a ◦ b)
+rA(z)(lA(x)b) + ((rA(y)a) ◦ c + lA(lB(a)y)c) + rA(z)(rA(y)a),
(2.4.11)
{(y + b) ∗ (x + a)} ∗ (z + c) = (y · x) · z + ((lB(b)x) · z + lB(rA(x)bz)) + lB(b ◦ a)z
+rB(c)(y · x) + ((rB(a)y) · z + lB(lA(y)a)z) + rB(c)(lB(b)x) + rB(c)(rB(a)y)
+(b ◦ a) ◦ c + ((lA(y)a) ◦ c + lA(rB(a)y)c) + lA(y · x)c + rA(z)(b ◦ a)
+((rA(x)b) ◦ c + lA(lB(b)x)c) + rA(z)(lA(y)a) + rA(z)(rA(x)b),
(2.4.12)
(x + a) ∗ {(y + b) ∗ (z + c)} = x · (y · z) + (x · (lB(b)z) + rB(rA(z)b)x) + lB(a)(y · z)
+lB(a)(lB(b)z) + lB(a)(rB(c)y) + rB(b ◦ c)x + (x · (rB(c)y) + rB(lA(y)c)x)
+a ◦ (b ◦ c) + (a ◦ (lA(y)c) + rA(rB(c)y)a) + (a ◦ (rA(z)b) + rA(lB(b)z)a)
+lA(x)(b ◦ c) + lA(x)(lA(y)c) + lA(x)(rA(z)b) + rA(y · z)a.
(2.4.13)
Summing (2.4.11) and (2.4.12) gives (2.4.13), what is equivalent to say that (lA, rA, B)
and (lB, rB, A) are bimodules of the Zinbiel algebras (A, ·) and (B, ◦), respectively, and
the four linear maps lA, rA, lB, and rB satisfy the equations (2.4.6), (2.4.7), (2.4.8), and
(2.4.9).
(cid:3)
Corollary 2.16 Let (A, B, lA, rA, lB, rB) be a matched pair of the Zinbiel algebras (A, ·)
and (B, ◦). Then,
(i) (Gass(A), Gass(B), lA + rA, lB + rB) is a matched pair of the commutative associative
algebras Gass(A) := (A, {, }· ) and Gass(B) := (B, {, }∗ ).
(ii) (G(A), G(B), lA − rA, lB − rB) is a matched pair of the Lie algebras G(A) := (A, [, ]· )
and G(B) := (B, [, ]◦ ).
3. Zinbiel coalgebras, Manin triple and bialgebra
The structures of nonassociative coalgebras and their basic properties are investigated
and discussed in [10] and references therein. This section is devoted to the construction
of Zinbiel bialgebra using their associated coalgebras and Manin triple.
3.1. Zinbiel coalgebras
Definition 3.1 Let A be a vector space equipped with the linear map ∆ : A → A ⊗ A.
The couple (A, ∆) is a right Zinbiel coalgebra if ∆ satisfies the following identity
(id ⊗∆) ◦ ∆ = (∆ ⊗ id) ◦ ∆ + ((τ ◦ ∆) ⊗ id) ◦ ∆,
(3.1.1)
illustrated by the following commutative diagram:
∆
A
∆
A ⊗ A
id ⊗∆
A ⊗ A
(∆+(τ ◦∆))⊗id
/ A ⊗ A ⊗ A
(3.1.2)
where id is the identity map on A, and τ is the exchange map defined on A ⊗ A.
Definition 3.2 Let A be a vector space endowed with the linear map ∆ : A → A ⊗ A.
The couple (A, ∆) is a left Zinbiel coalgebra if ∆ satisfies the following identity:
(∆ ⊗ id) ◦ ∆ = (id ⊗∆) ◦ ∆ + (id ⊗(τ ◦ ∆)) ◦ ∆,
(3.1.3)
illustrated by the following commutative diagram:
∆
A
∆
A ⊗ A
∆⊗id
A ⊗ A
id ⊗(∆+(τ ◦∆))
/ A ⊗ A ⊗ A
(3.1.4)
where id is the identity map on A, and τ is the exchange map defined on A ⊗ A.
Proposition 3.3 Let A be a vector space equipped with a linear map ∆ : A → A ⊗ A, τ
be the exchange map defined on A ⊗ A, and id be the identity map defined on A.
(i) If (A, ∆) is a right Zinbiel coalgebra, then the relation
(id ⊗∆) ◦ ∆ = (τ ⊗ id) ◦ (id ⊗∆) ◦ ∆ = (τ ⊗ id) ◦ (∆ ⊗ id) ◦ (τ ◦ ∆)
(3.1.5)
is satisfied.
(ii) If (A, ∆) is a left Zinbiel coalgebra, then the relation
(∆ ⊗ id) ◦ ∆ = (id ⊗τ ) ◦ (∆ ⊗ id) ◦ ∆ = (id ⊗τ ) ◦ (id ⊗∆) ◦ (τ ◦ ∆)
(3.1.6)
holds.
Definition 3.4 A commutative infinitesimal bialgebra (A, ·, ∆) is an infinitesimal
bialgebra (A, ·, ∆) such that (A, ·) is a commutative algebra and (A, ∆) is a cocommutative
coalgebra.
/
/
/
/
/
/
Definition 3.5 The opposite coalgebra of the coalgebra (A, ∆) is a coalgebra (A, τ ◦ ∆),
where the coproduct τ ◦ ∆ is defined by: τ ◦ ∆ : A −→ A ⊗ A.
Proposition 3.6 The opposite coalgebra of a right Zinbiel coalgebra is a left Zinbiel
coalgebra. Conversely, the opposite coalgebra of a left Zinbiel coalgebra is a right Zinbiel
coalgebra.
Proposition 3.7 Consider a right Zinbiel coalgebra (A, ∆), and τ the exchange map
given by τ : A ⊗ A → A ⊗ A, for all x, y ∈ A, τ (x ⊗ y) = y ⊗ x. Then, the following
equations hold:
(id ⊗(τ ◦ ∆)) ◦ ∆ = (id ⊗τ ) ◦ (∆ ⊗ id) ◦ ∆ + (τ ⊗ id) ◦ (id ⊗(τ ◦ ∆)) ◦ (τ ◦ ∆), (3.1.7)
(∆ ⊗ id) ◦ (τ ◦ ∆) = (id ⊗τ ) ◦ (∆ ⊗ id) ◦ ∆ + (τ ⊗ id) ◦ (id ⊗(τ ◦ ∆) ◦ (τ ◦ ∆), (3.1.8)
((τ ◦ ∆) ⊗ id) ◦ (τ ◦ ∆) = (id ⊗∆) ◦ (τ ◦ ∆) + (id ⊗(τ ◦ ∆)) ◦ (τ ◦ ∆).
(3.1.9)
Proof.
Consider a right Zinbiel coalgebra (A, ∆) and the exchange map τ on A ⊗ A. We have:
(id ⊗(τ ◦ ∆)) ◦ ∆ = (id ⊗τ ) ◦ (id ⊗∆) ◦ ∆
= (id ⊗τ ) ◦ ((∆ ⊗ id) ◦ ∆) + (id ⊗∆) ◦ ((τ ⊗ ∆) ⊗ id) ◦ ∆
= (id ⊗∆) ◦ (∆ ⊗ id) ◦ ∆ + (id ⊗τ ) ◦ (id ⊗(τ ◦ ∆)) ◦ (τ ◦ ∆)
= (id ⊗τ ) ◦ (∆ ⊗ id) ◦ ∆ + (id ⊗∆) ◦ (τ ◦ ∆)
= (id ⊗τ ) ◦ (∆ ⊗ id) ◦ ∆ + (∆ ⊗ id) ◦ ∆
= (id ⊗τ ) ◦ (∆ ⊗ id) ◦ ∆ + (τ ⊗ id) ◦ ((τ ◦ ∆) ⊗ id) ◦ ∆
(id ⊗(τ ◦ ∆)) ◦ ∆ = (id ⊗τ ) ◦ (∆ ⊗ id) ◦ ∆ + (τ ⊗ id) ◦ (id ⊗(τ ◦ ∆)) ◦ (τ ◦ ∆).
Hence, the relation (3.1.7) holds.
Besides,
(id ⊗(τ ◦ ∆)) ◦ ∆ = ((τ ◦ ∆) ⊗ id) ◦ (τ ◦ ∆) = (τ ⊗) ◦ (∆ ⊗ id) ◦ (τ ◦ ∆)
= (id ⊗∆) ◦ ∆ = (∆ ⊗ id) ◦ (τ ◦ ∆),
which is the relation (3.1.8).
Using the following identities,
((τ ◦ ∆) ⊗ id) ◦ (τ ◦ ∆) = (id ⊗(τ ◦ ∆)) ◦ ∆,
(id ⊗∆) ◦ (τ ◦ ∆) = (∆ ⊗ id) ◦ ∆ = (τ ⊗ id) ◦ ((τ ◦ ∆) ⊗ id) ◦ ∆
(id ⊗∆) ◦ (τ ◦ ∆) = (τ ⊗ id) ◦ (id ⊗(τ ◦ ∆)) ◦ (τ ◦ ∆),
and
(id ⊗(τ ◦ ∆)) ◦ (τ ◦ ∆ = (id ⊗τ ) ◦ (id ⊗∆) ◦ (τ ◦ ∆) = (id ⊗τ ) ◦ (∆ ⊗ id) ◦ ∆,
we obtain that the relations (3.1.7) and (3.1.9) are equivalent.
(cid:3)
Definition 3.8 A cocommutative coassociative coalgebra is the couple (A, ∆), where A
is a vector space and ∆ : A → A ⊗ A a linear map such that the following relations hold:
∆ = τ ◦ ∆,
(∆ ⊗ id) ◦ ∆ = (id ⊗∆) ◦ ∆.
(3.1.10)
(3.1.11)
Proposition 3.9 Consider a vector
space A and ∆ a linear map given by
∆ : A → A ⊗ A. The couple (A, ∆) is a Zinbiel coalgebra if (A, ∆{,}) is a cocommutative
coassociative coalgebra, where ∆{,} : A → A ⊗ A is given by ∆{,} := ∆ + τ ◦ ∆, and τ is
the exchange map defined on A ⊗ A.
Definition 3.10 Let A be a vector space equipped with the linear map ∆ : A → A ⊗ A.
Then, the couple (A, ∆) is a Lie coalgebra if the following relations are satisfied:
∆ = −τ ◦ ∆,
(id ⊗∆) ◦ ∆ + (id ⊗τ ) ◦ (∆ ⊗ id) ◦ ∆ − (∆ ⊗ id) ◦ ∆ = 0.
(3.1.12)
(3.1.13)
Proposition 3.11 Consider a vector space A equipped with a linear map ∆ : A → A ⊗ A.
Then, the couple (A, ∆) is a Zinbiel coalgebra if the linear map ∆[,] : A → A ⊗ A given
by ∆[,] := ∆ − τ ◦ ∆ satisfies the relations (3.1.12) and (3.1.13).
Proof.
Let (A, µ) be a Zinbiel algebra and (A, ∆) be a Zinbiel coalgebra. From the definition
of the exchange map, we have:
∆[,] = id ◦∆[,] = τ ◦ (τ ◦ ∆[,]) = τ ◦ (τ ◦ (∆ − τ ◦ ∆))
= τ ◦ (τ ◦ ∆ − ∆) = −τ ◦ (∆ − τ ◦ ∆),
and, hence, ∆[,] = −τ ◦ ∆[,] which is the relation (3.1.12).
Besides,
(id ⊗∆[,]) ◦ ∆[,] = (id ⊗(∆ − τ ◦ ∆)) ◦ (∆ − τ ◦ ∆)
= (id ⊗∆) ◦ ∆ − (id ⊗∆) ◦ (τ ◦ ∆) − (id ⊗(τ ◦ ∆)) ◦ ∆
+ (id ⊗(τ ◦ ∆)) ◦ (τ ◦ ∆).
Then, the relation
(id ⊗∆[,]) ◦ ∆[,] = (id ⊗∆) ◦ ∆ − (id ⊗∆) ◦ (τ ◦ ∆) − (id ⊗(τ ◦ ∆)) ◦ ∆
+ (id ⊗(τ ◦ ∆)) ◦ (τ ◦ ∆)
(3.1.14)
holds. In addition,
(∆[,] ⊗ id) ◦ ∆[,] = ((∆ − τ ◦ ∆) ⊗ id) ◦ (∆ − τ ◦ ∆)
= (∆ ⊗ id) ◦ (∆ − τ ◦ ∆)) − ((τ ◦ ∆) ⊗ id) ◦ (∆ − (τ ◦ ∆))
= (∆ ⊗ id) ◦ ∆ − (∆ ⊗ id) ◦ (τ ◦ ∆) − ((τ ◦ ∆) ⊗ id) ◦ ∆
+ ((τ ◦ ∆) ⊗ id) ◦ (τ ◦ ∆,
and the relation
(∆[,] ⊗ id) ◦ ∆[,] = (∆ ⊗ id) ◦ ∆ − (∆ ⊗ id) ◦ (τ ◦ ∆) − ((τ ◦ ∆) ⊗ id) ◦ ∆
+ ((τ ◦ ∆) ⊗ id) ◦ (τ ◦ ∆)
(3.1.15)
is satisfied.
Furthermore, we have
(id ⊗τ ) ◦ (∆[,] ⊗ id) ◦ ∆[,] = (id ⊗τ ) ◦ ((τ ◦ ∆) ⊗ id) ◦ (τ ◦ ∆)
− (id ⊗τ ) ◦ (∆ ⊗ id) ◦ (τ ◦ ∆)
− (id ⊗τ ) ◦ ((τ ◦ ∆) ⊗ id) ◦ ∆
+ (id ⊗τ ) ◦ (∆ ⊗ id) ◦ ∆.
(3.1.16)
In addition, by considering the right hand side of the relations (3.1.14), (3.1.15),
and (3.1.16), and using the relations (3.1.7), (3.1.8), and (3.1.9), we obtain the identity
(3.1.13).
(cid:3)
3.2. Manin triple and Zinbiel bialgebras
Definition 3.12 Consider a nonassociative algebra (A, ·) and B a bilinear form on A.
• B is symmetric if B(x, y) = B(y, x), ∀x, y ∈ A.
• B is invariant if B(x · y, z) = B(x, y · z), ∀x, y, z ∈ A.
• B is nondegenerate if the set {x ∈ A, B(x, y) = 0, ∀y ∈ A} is reduce to {0}.
Definition 3.13 A Manin triple of Zinbiel algebras is a triple (A, A+, A−) endowed with
a nondegenerate symmetric bilinear form B ( ; ), invariant on A, and satisfying:
(i) A = A+ ⊕ A− as K-vector space;
(ii) A+ and A− are Zinbiel subalgebras of A;
(iii) A+ and A− are isotropic with respect to B(; ), i.e., B(A+; A+) = 0 = B(A−; A−).
Theorem 3.14 Let (A, ·) and (A∗, ◦) be two Zinbiel algebras.
the six-
tuple (A, A∗, R∗
if
and only if
is a Manin triple endowed with the bilinear form
B(x + a∗, y + b∗) =< x, b∗ > + < y, a∗ >, ∀x, y ∈ A and ∀a∗, b∗ ∈ A∗, where <, > is the
natural pairing between A and A∗.
◦) is a matched pair of Zinbiel algebras A and A∗
· , L∗
(A ⊕ A∗, A, A∗)
· ; R∗
◦, L∗
Then,
Proposition 3.15 Let (A, ·) be a Zinbiel algebra and (A∗, ◦) be a Zinbiel algebra on its
dual space A∗. Then the following conditions are equivalent:
(i) (A ⊕ A∗, A, A∗) is the standard Manin triple of considered Zinbiel algebra;
(ii) (G(A), G(A∗), −ad∗
◦) is a matched pair of sub-adjacent Lie algebras;
(iii) (A, A∗, R∗
(iv) (A, A∗) is a Zinbiel bialgebra.
◦) is a matched pair of Zinbiel algebras;
· , −ad∗
· , R∗
· , L∗
◦, L∗
Acknowledgments
This work is supported by TWAS Research Grant RGA No.17-542 RG/ MATHS/AF/AC g-fr3240300147.
The ICMPA-UNESCO Chair is in partnership with the Association pour la Promotion Sci-
entifique de l'Afrique (APSA), France, and Daniel Iagolnitzer Foundation (DIF), France,
supporting the development of mathematical physics in Africa.
References
[1] Santilli R M 1968 Nuovo Cim. Suppl. 6 1225-1249
[2] Bai C 2008 Commun. Contemp. Math., 10 No.2 221-260
[3] Loday J-L 1995 Math. Scand. 77 189-196
[4] Kawski M 2001 J. Math. Sci. 103 No.6 725-744
[5] Dzhumadil'daev A S 2007 J. Math. Sci., 144 No.2 3909-3925
[6] Aguiar M 2000 Lett. Math. Phys. 54 263-277
[7] Hounkonnou M.N. and Dassoundo M.L. 2015 Trends Math. 261-273
[8] Ni X and Bai C 2013 J. Math. Phys. 54 023515
[9] Majid S 1990 Pacific J. Math. 141 No.2 311-332
[10] Anquela J A, Cort´es T and Montaner F 1994 22 No12 4693-4716
|
1011.5411 | 2 | 1011 | 2010-12-13T15:40:51 | (Quasi-)Poisson enveloping algebras | [
"math.RA",
"math.CT"
] | We introduce the quasi-Poisson enveloping algebra and Poisson enveloping algebra for a non-commutative Poisson algebra. We prove that for a non-commutative Poisson algebra, the category of quasi-Poisson modules is equivalent to the category of left modules over its quasi-Poisson enveloping algebra, and the category of Poisson modules is equivalent to the category of left modules over its Poisson enveloping algebra. | math.RA | math |
(QUASI-)POISSON ENVELOPING ALGEBRAS
YAN-HONG YANG, YUAN YAO, AND YU YE∗
Abstract. We introduce the quasi-Poisson enveloping algebra and Poisson en-
veloping algebra for a non-commutative Poisson algebra. We prove that for a
non-commutative Poisson algebra, the category of quasi-Poisson modules is equiv-
alent to the category of left modules over its quasi-Poisson enveloping algebra, and
the category of Poisson modules is equivalent to the category of left modules over
its Poisson enveloping algebra.
0. Introduction
Poisson algebras appear naturally in Hamiltonian mechanics, and play a central
role in the study of Poisson geometry and quantum groups. Poisson manifolds are
known as smooth manifolds equipped with a Poisson algebra structure. One can
consult [14] for topics in Poisson geometry.
With the development of non-commutative geometry in the past decades, versions
of non-commutative Poisson-like structures were introduced and studied by many
authors from different perspectives [8, 10, 16, 5, 12, 2, 15, 6, 3, 17]. Non-commutative
Poisson algebra (NCPA) is one of them. The notion of NCPA is first suggested by P.
Xu [16], which is especially suitable for geometric situation, and developed by Flato,
Gerstenhaber and Voronov to a more general case [5].
An important and practical idea to understand an algebraic object is to study
the representations, or equivalently, the modules over it. So is for Poisson algebra.
Poisson modules over an NCPA are defined in a natural way [5], see also in [9, Section
0]. Note that when restricted to a usual Poisson algebra, this notion of Poisson module
is different from the usual one studied in [11, Definition 1] and [4]; see Remark 1.8.
Key words and phrases. Non-commutative Poisson algebra, Poisson module, Poisson enveloping
algebra.
2000 Mathematics Subject Classification. 16S40, 17B63.
∗ The corresponding author.
1
2
YAN-HONG YANG, YUAN YAO, AND YU YE∗
In this paper, we introduce quasi-Poisson enveloping algebra and Poisson envelop-
ing algebra for a given NCPA. It turns out that the category of quasi-Poisson modules
is equivalent to the category of left modules over its quasi-Poisson enveloping algebra,
and the category of Poisson modules is equivalent to the category of left modules over
its Poisson enveloping algebra.
As a consequence, we give an affirmative answer to a question raised in [5, Sec-
tion 2]: does there exist enough injectives or projectives in the category of Poisson
modules? This will enable us to construct certain cohomology theory for NCPA in
a standard way by using projective and injective resolutions [1]. A possible applica-
tion for algebraist is that cohomology theory of the standard Poisson algebras (see
Example 1.3) may give some brand new invariants of associative algebras.
Note that another version of Poisson enveloping algebra for a commutative Poisson
algebra was introduced in [11, Definition 3]. We would like to emphasize that Poisson
enveloping algebra in our sense, when restricted to a commutative Poisson algebra,
is different from that one; see Remark 2.6.
The paper is organized as follows.
In section 1, we recall some definitions and
notations. A characterization of Poisson-simple algebras is also given. Section 2 deals
with the construction of quasi-Poisson enveloping algebra and Poisson enveloping
algebra for a given NCPA. In Section 3, we give our main result: the category of
quasi-Poisson modules is equivalent to the category of left modules over the quasi-
Poisson enveloping algebra; the category of Poisson modules is equivalent to the
category of left modules over the Poisson enveloping algebra.
1. Poisson algebras and modules
Throughout K will be a fixed field of characteristic 0 and algebras considered are
over K. All unadorned ⊗ will mean ⊗K. Without loss of generality, we assume that
associative algebras considered here have an identity.
Definition 1.1. A non-commutative Poisson algebra (NCPA) over K is a triple
A = (A, •, {−, −}), where A is a K-space, (A, •) is an associative algebra and (A, {−, −})
is a Lie algebra, such that the Leibniz rule {ab, c} = a{b, c} + {a, c}b holds for all
a, b, c ∈ A, here we write a•b as ab for brevity. The operator • is called the multipli-
cation and {−, −} the Poisson bracket of A.
(QUASI-)POISSON ENVELOPING ALGEBRAS
3
Remark 1.2. Note that a usual Poisson algebra is by definition an NCPA with
commutative multiplication. In this paper, when we use the term Poisson algebra we
always mean a commutative one, otherwise we use the notion NCPA.
Example 1.3. Any associative algebra A is also a Lie algebra with the Lie bracket
given by the commutator [−, −], say [a, b] = ab − ba for any a, b ∈ A. One shows
easily that (A, •, [−, −]) is an NCPA, which we called the standard NCPA of A.
Definition 1.4. Let A be an NCPA. A quasi-Poisson A-module M is a an A-A-
bimodule M together with a K-bilinear map {−, −}∗ : A × M −→ M, which satisfies
(1.1)
(1.2)
(1.3)
{a, b · m}∗ = {a, b} · m + b · {a, m}∗,
{a, m · b}∗ = m · {a, b} + {a, m}∗ · b,
{{a, b}, m}∗ = {a, {b, m}∗}∗ − {b, {a, m}∗}∗
for all a, b ∈ A and m ∈ M , and a · m and m · a denote the left and right A-action
on M respectively. Note that the last condition is just equivalent to say that M is a
Lie module over A. If moreover,
(1.4)
{ab, m}∗ = a · {b, m}∗ + {a, m}∗ · b
holds for all a, b ∈ A and m ∈ M , then M is called a Poisson A-module. A
homomorphism of quasi-Poisson A-modules (resp. Poisson modules) is a K-linear
map f : M → N such that
(1.5)
(1.6)
f (a · m) = a · f (m), f (m · a) = f (m) · a,
f ({a, m}∗) = {a, f (m)}∗
hold for all a ∈ A and m ∈ M . We denote the category of quasi-Poisson A-modules
(resp. Poisson modules) by Q(A) (resp. P(A)).
Remark 1.5. The definition of Poisson A-module is suggested in [5], see also [9,
Section 0]. One of its immediate merits is that A itself can be naturally viewed as a
Poisson A-module with the regular A-A-bimodule structure and the action {−, −}∗
given by the Poisson bracket, i.e., {a, b}∗ = {a, b} for all a, b ∈ A.
Example 1.6. Let A be an NCPA. Then A ⊗ A admits a quasi-Poisson module
structure with the actions given by a · (b ⊗ c) = ab ⊗ c, (a ⊗ b) · c = a ⊗ bc and
{a, b ⊗ c}∗ = {a, b} ⊗ c + b ⊗ {a, c} for all a, b, c ∈ A. Note that this does not give to
a Poisson module in general.
4
YAN-HONG YANG, YUAN YAO, AND YU YE∗
Example 1.7. Let A be an NCPA with trivial Poisson bracket, say {−, −} = 0. Then
any A-bimodule M is a Poisson module under trivial Lie action, i.e. {−, −}∗ = 0.
Note that this is not true if the Poisson bracket is non-trivial.
Remark 1.8. The usual Poisson modules over commutative Poisson algebras ([11,
Definition 1]) are just the Poisson modules defined here with coincide left and right
associative actions.
Concerning the relations between Hochschild cohomology and deformation theory,
Poisson modules in our sense by using bimodules seems to be more suitable for
deformation theory, even for commutative Poisson algebras.
Recall that a Poisson derivation is a linear endomorphism of A which is both
an associative algebra derivation and a Lie algebra derivation. We have the following
observation, generalizing [4, Example 7].
Proposition 1.9. Let A be an NCPA and C(A) the center of A in the associative
sense. If a K-bilinear form {−, −}∗ : A × A → A makes the regular A-A-bimodule A
a Poisson A-module, then the induced map
ψ : A → A, ψ(a) = {a, 1A}∗, ∀a ∈ A
is a Poisson derivation satisfying ψ(A) ⊆ C(A) and
(1.7)
ψ(a)[b, c] = 0, ∀ a, b, c ∈ A,
here [b, c] = bc − cb denotes the commutator. Conversely, a Poisson derivation
ψ : A → A satisfying ψ(A) ⊆ C(A) and (1.7) makes the regular bimodule A a Poisson
A-module with {−, −}∗ given by
{a, b}∗ = {a, b} + ψ(a)b, ∀a, b ∈ A.
Moreover, if dimK C(A) = 1, then there is a unique Poisson A-module structure
(A, {−, −}∗) on the regular bimodule A, which is given by {a, b}∗ = {a, b}.
Proof. Suppose A is a Poisson A-module. Set ψ(a) = {a, 1A}∗. We will show that ψ
is a Poisson derivation with ψ(A) ⊆ C(A). For any a, b ∈ A,
{a, b}∗ = {a, b} + b{a, 1A}∗
= {a, b} + {a, 1A}∗b,
where the equalities follow from b = b1A = 1Ab and (1.1) and (1.2). Hence ψ(a) ∈
C(A) for all a ∈ A.
(QUASI-)POISSON ENVELOPING ALGEBRAS
5
Next, we have ψ(ab) = {ab, 1A}∗ = {a, 1A}∗b + a{b, 1A}∗ = ψ(a)b + aψ(b) by (1.4),
which implies that ψ is an associative derivation.
Moreover, the following equalities implies that ψ is also a Lie algebra derivation.
ψ({a, b}) = {{a, b}, 1A}∗ = {a, {b, 1A}∗}∗ − {b, {a, 1A}∗}∗
= {a, {b, 1A}∗} + {b, 1A}∗{a, 1A}∗ − {b, {a, 1A}∗} − {a, 1A}∗{b, 1A}∗
= {a, ψ(b)} + {ψ(a), b}
At last, ∀ a, b, c ∈ A we have
{ab, c}∗ = {ab, c} + ψ(ab)c = a{b, c} + {a, c}b + aψ(b)c + ψ(a)bc,
a{b, c}∗ + {a, c}∗b = a{b, c} + aψ(b)c + {a, c}b + ψ(a)cb.
Combined with (1.4), we get the equality (1.7).
The proof of the converse part is easy and left to the reader.
Now suppose that dimK C(A) = 1. It suffices to consider the case dimK A ≥ 3.
Take a basis {e1, e2, e3 · · · } of A with e1 = 1A. Thus C(A) = Ke1. Suppose that
(A, {−, −}∗) is a Poisson A-module and ψ the induced derivation. Then
ψ(eiej) = ψ(ei)ej + eiψ(ej), ∀i 6= j ≥ 2.
Note that ψ(eiej) ∈ Ke1, ψ(ei)ej ∈ Kej and eiψ(ej ) ∈ Kei. By assumption e1, ei, ej
are linearly independent and it forces ψ(ei) = ψ(ej ) = 0, ∀i, j ≥ 2. Since ψ(1A) = 0
for any Poisson derivation ψ, we obtain that ψ(a) = 0, ∀a ∈ A, and hence {a, b}∗ =
(cid:3)
{a, b} + ψ(a)b = {a, b}, ∀a, b ∈ A.
Remark 1.10. For an NCPA, it is still not known whether the above correspondence
between the set of Poisson module structures on the regular A-bimodule and the set
of Poisson derivations is bijective. This is just equivalent to ask whether any Poisson
derivation for an NCPA has the property (1.7).
In the rest of this section, we will characterize the simplicity of an NCPA A by
studying its Poisson modules. Recall that a left (resp. right, two-sided) Poisson
ideal of A is defined to be an ideal in the Lie algebra sense and a left (resp. right,
two-sided) ideal in the associative algebra sense. When I is a two-sided Poisson ideal
of A, it is easy to check that A/I is a Poisson A-module with the weak Poisson action
given by {a, b + I}∗ , {a, b} + I for any a, b ∈ A. Moreover, A/I is an NCPA with
the obvious bracket {a + I, b + I} , {a, b} + I.
6
YAN-HONG YANG, YUAN YAO, AND YU YE∗
An NCPA A is left (resp. right) Poisson-simple provided that any left (resp.
right) Poisson ideal of A is either 0 or A. A is said to be Poisson-simple if any two-
sided Poisson ideal of A is either 0 or A itself. Clearly if A is simple as an associative
algebra, then A is Poisson-simple.
Let M be a quasi-Poisson A-module. The annihilator AnnA(M ) of M in A is
defined as AnnA(M ) , {a ∈ A a · m = m · a = 0, ∀m ∈ M }. Clearly AnnA(M ) is a
two-sided ideal of A in the associative sense. Moreover, AnnA(M ) is also a Lie ideal
and hence a Poisson ideal, just as shown in the following lemma.
Lemma 1.11. Let A be an NCPA and M a quasi-Poisson A-module. Then AnnA(M )
is a two-sided Poisson ideal of A.
Proof. Let a ∈ AnnA(M ) and b ∈ A. Then we have (ba)m = b(am) = 0 and
m(ba) = (mb)a = 0, hence ba ∈ AnnA(M ). Similarly we have ab ∈ AnnA(M ).
Therefore AnnA(M ) is a two-sided ideal in the associative sense.
Since M is a quasi-Poisson module by assumption, (1.1) and (1.2) implies that
{b, a}m = {b, am}∗ − a{b, m}∗ = 0 and m{b, a} = {b, ma}∗ − {b, m}∗a = 0, thus
(cid:3)
{b, a} ∈ AnnA(M ). It concludes that Ann(M ) is a two-sided Poisson ideal.
Proposition 1.12. Let A be an NCPA. The following statements are equivalent:
(i) A is Poisson-simple;
(ii) For every nonzero quasi-Poisson A-module M , AnnA(M ) = 0;
(iii) For every nonzero Poisson A-module M , AnnA(M ) = 0.
Proof. (i)=⇒(ii). Assume that A is Poisson simple and M is a quasi-Poisson A-
module. AnnA(M ) is a two-sided Poisson ideal of A by Lemma 1.11. M 6= 0 implies
that AnnA(M ) 6= A, for 1A /∈ AnnA(M ) in this case. Now the simplicity of A forces
AnnA(M ) = 0.
(ii)=⇒(iii) is obvious, for a Poisson module is always a quasi-Poisson module.
(iii)=⇒(i). Suppose that for any Poisson A-module M 6= 0, AnnA(M ) = 0. As-
sume that A is not Poisson-simple and let I 6= 0 be a proper two-sided Poisson
ideal, then A/I is a Poisson A-module such that AnnA(A/I) = I, which leads to a
(cid:3)
contradiction. Thus A must be Poisson-simple.
(QUASI-)POISSON ENVELOPING ALGEBRAS
7
2. Poisson enveloping algebras
The main purpose of this section is to introduce the notion of Quasi-Poisson en-
veloping algebra and Poisson enveloping algebra for an NCPA. For this we need some
preparation.
Recall that the opposite algebra Aop of an associative algebra A has the same
underlying vector space as A and the multiplication is given in a reversed order, i.e.
a ·Aop b = b ·A a. The associative algebra A ⊗ Aop is called the enveloping algebra
of A and denoted by Ae. We denote a ·A b by a•b and a ·Aop b by a◦b to simplify
the notation. Note that if A is an NCPA , then Aop is also an NCPA with the same
Poisson bracket as defined on A.
Let H be a Hopf algebra and A an H-module algebra, i.e. A is an associative
algebra and a left H-module, such that h(1A) = ǫ(h)1A, h(ab) = P(h1a)(h2b) for all
h ∈ H and a ∈ A, here we use the Sweedler's notation ∆(h) = P h1 ⊗ h2. Then we
may define a multiplication ⋆ on the vector space A ⊗ H by setting
(a ⊗ h) ⋆ (a′ ⊗ h′) = X ah1(a′) ⊗ h2h′
for all a, a′ ∈ A and h, h′ ∈ H. It is not hard to show that (A ⊗ H, ⋆) is an associative
algebra with identity 1A ⊗ 1H, which we call the smash product of A and H and
denote by A#H. Elements in A#H are usually written as a#h rather than a ⊗ h.
We refer to [13] for more details about Hopf algebras, module algebras over a Hopf
algebra and their smash product.
Remark 2.1. Let H be a cocommutative Hopf algebra. Recall that H is cocommu-
tative if ∆(h) = P h1 ⊗ h2 = P h2 ⊗ h1 for any h ∈ H. Then for any H-module
algebra A, the opposite algebra Aop is also a H-module algebra with the same H-
action as the one on A. Moreover, if A and B are both H-module algebra, then
so is A ⊗ B, here the H-action on A ⊗ B is given by the usual tensor product, say
h · (a ⊗ b) = P h1 ·A a ⊗ h2 ·B b for any h ∈ H, a ∈ A and b ∈ B. In particular, the
enveloping algebra Ae of an H-module algebra A is also an H-module algebra.
Let A be a K-vector space and T (A) the tensor algebra. By definition there is a
decomposition of vector spaces T (A) = L∞
i=0 T i(A), making T (A) a positively graded
algebra, here T i(A) = A⊗i. Any a ∈ T i(A) is said to be a homogeneous element of
degree i, denoted by deg(a) = i, particularly deg(1T (A)) = 0. We may also identify
A with a subspace of T (A), say T 1(A), in an obvious way.
The following notations will be handy later on:
8
YAN-HONG YANG, YUAN YAO, AND YU YE∗
(i) Let {vi}i∈S be a fixed K−basis of A, here S is an index set. Let α =
(i(1), i(2), · · · , i(r)) ∈ Sr be a sequence in S. r is called the degree of α and denoted
by r = deg(α). We denote the element vi(1)vi(2) · · · vi(r) = vi(1) ⊗ vi(2) ⊗ · · · ⊗ vi(r) by
−→
−→α and also denote 1T (A) by
∅ for consistency, where ∅ is the empty sequence. Thus
{−→α α ∈ Sr, r > 0} ∪ {1T (A)} form a basis of T (A). For given α = (i(1), · · · , i(r))
and β = (j(1), · · · , j(s)), we define α ∨ β , (i(1), · · · , i(r), j(1), · · · , j(s)), hence
−→α
−−−→
α ∨ β.
−→
β =
(ii) Let α = (i(1), · · · , i(r)) and X ⊔Y be an ordered bipartition of r = {1, · · · , r},
here "ordered" means that X ⊔ Y and Y ⊔ X give different bipartitions, which differs
from the usual one. We would like to emphasize that X and Y are allowed to
be empty here. Suppose X = {X1, X2, · · · , Xr1 } and Y = {Y1, Y2, · · · , Yr2} with
X1 < X2 < · · · < Xr1 and Y1 < Y2 < · · · < Yr2 , where r1 = X, r2 = Y . Set
αX = (i(X1), i(X2), · · · , i(Xr1 )) and αY = (i(Y1), i(Y2), · · · , i(Yr2)). By definition
α = αX ⊔ αY is called an ordered bipartition of α with respect to the ordered
bipartition r = X ⊔ Y . Similarly, one defines ordered n-partitions α = α1 ⊔
α2 · · · ⊔ αn for any n ≥ 2.
Remark 2.2. Note that by definition, different partitions r = X ⊔ Y and r = X ′ ⊔ Y ′
give rise to different partitions α = αX ⊔ αY and α = αX ′ ⊔ αY ′, even if αX = αX ′
and αY = αY ′ as sequences in S.
For example, let i ∈ S and α = (i, i). Then there are exactly 4 ordered bipartitions
of α:
{1, 2} = ∅ ⊔ {1, 2},
{1, 2} = {1} ⊔ {2},
{1, 2} = {2} ⊔ {1},
{1, 2} = {1, 2} ⊔ ∅,
α = ∅ ⊔ (i, i);
α = (i) ⊔ (i);
α = (i) ⊔ (i);
α = (i, i) ⊔ ∅.
By the expression Pα=α1 ⊔α2, we mean to take the sum over each possible ordered
bipartition of {1, · · · , deg(−→α )}. Similarly, Pα=α1⊔α2⊔α3 means the sum is taken over
all possible ordered tripartitions of {1, · · · , deg(−→α )}, and so on.
One shows that T (A) admits a Hopf algebra structure. The counit ǫ is given by
ǫ(1T (A)) = 1 and ǫ(−→α ) = 0 for all α ∈ Sr with r > 0. The coproduct ∆ is given by
∆(−→α ) = X
−→α1 ⊗ −→α2
α=α1⊔α2
(QUASI-)POISSON ENVELOPING ALGEBRAS
9
for all α ∈ Sr with r ≥ 0.
In particular, ∆(1T (A)) = 1T (A) ⊗ 1T (A) and ∆(a) =
1T (A) ⊗ a + a ⊗ 1T (A) for any a ∈ A. The coproduct ∆ is known as the "shuffle
coproduct". By definition ∆ is cocommutative, and hence T (A) is a cocommutative
Hopf algebra.
Assume further that A is a Lie algebra and consider the universal enveloping
algebra U (A) of A. By definition U (A) = T (A)/I, where I is the two-sided ideal
of T (A) generated by {x ⊗ y − y ⊗ x − {x, y} x, y ∈ A}. We denote the canonical
projection by π : T (A) ։ U (A). Moreover, I is easily shown to be a Hopf ideal of
T (A) and hence U (A) inherits a cocommutative Hopf algebra structure.
Let {vi}i∈S be a fixed K−basis of A with S an index set. We may assume that S
is totally ordered. According to the Poincare-Birkhoff-Witt theorem, the elements
{−→α α = (i(1), i(2), · · · , i(r)) ∈ Sr, i(1) ≤ i(2) ≤ · · · ≤ i(r), r ≥ 1},
along with 1U (A), form a basis of U (A), here we also denote the element π(−→α ) in U (A)
by −→α by abuse of notation. Clearly we may identify A with π(T 1(A)), a subspace of
U (A).
Recall that for a Lie algebra A, one of the advantages of U (A) is that the cat-
egory of Lie modules over A is equivalent to the category of left modules over
U (A). Particularly, the Lie bracket makes A a Lie module and hence a U (A)-
module with the action given by −→α · a = {vi(1), {vi(2), {, · · · , {vi(r), a} · · · }}} for all
α = (i(1), i(2), · · · , i(r)) ∈ Sr and a ∈ A. We denote the action −→α · a by −→α (a). Note
that Aop has the same underlying space as A and hence the same U (A)-action. Since
U (A) is a Hopf algebra, Ae = A ⊗ Aop is a tensor product of U (A)-modules and hence
−→α1(a) ⊗ −→α2(b) for all α ∈ Sr with
a U (A)-module. Explicitly, −→α (a ⊗ b) = Pα=α1 ⊔α2
r ≥ 0, a, b ∈ A.
Proposition 2.3. Let A = (A, •, {−, −}) be an NCPA. Then A, Aop and Ae are all
U (A)-module algebras with the above U (A)-module structure.
Proof. We begin with the algebra A. Clearly 1A is a center element of the Lie algebra
A, hence x(1A) = ǫ(x)1A for any x ∈ U (A). Next we prove that
(2.1)
x(a•b) = X(x1(a))•(x2(b))
10
YAN-HONG YANG, YUAN YAO, AND YU YE∗
for all x ∈ U (A) and a, b ∈ A. We need only to check it for a set of generators. In
fact, if x, y ∈ U (A) are both satisfying (2.1), then
(xy)(a•b) = x(y(a•b)) = x(X y1(a)•y2(b))
= X(x1(y1(a)))•(x2(y2(b)))
= X((x1y1)(a))•((x2y2)(b))
= X((xy)1(a))•((xy)2(b)),
which implies that xy also satisfies (2.1).
Note that for any v ∈ A, ∆(v) = 1U (A) ⊗ v + v ⊗ 1U (A). By (1.4) we have
v(a•b) = {v, a•b} = a•{v, b} + {v, a}•b = X(v1(a))•(v2(b))
for all a, b ∈ A. Since A generates U (A), it follows that that A is a U (A)-module
algebra. By Remark 2.1, Aop and Ae are both U (A)-module algebras.
(cid:3)
With the above preparation we give our main definition as follows.
Definition 2.4. Let A = (A, •, {−, −}) be an NCPA. The smash product Ae#U (A)
is called the quasi-Poisson enveloping algebra of A and denoted by Q(A). The
Poisson enveloping algebra of A, denoted by P(A), is defined to be the quotient
algebra Q(A)/J, here J is the ideal of Q(A) generated by
{1A ⊗ 1Aop#(a•b) − a ⊗ 1Aop#b − 1A ⊗ b#a a, b ∈ A}.
Remark 2.5. By definition, Q(A) = A ⊗ Aop ⊗ U (A) as a vector space. Thus Q(A)
has a PBW-type basis given by
{vi ⊗ vj#−→α i, j ∈ S, α = (i(1), i(2), · · · , i(r)) ∈ Sr, i(1) ≤ · · · ≤ i(r), r ≥ 0}.
The identity in Q(A) is given by 1A ⊗ 1Aop#1U (A), and the multiplication in Q(A)
can be written down explicitly as
( vi1 ⊗ vj1#−→α )(vi2 ⊗ vj2#
−→
β ) = X
(vi1
α=α1 ⊔α2⊔α3
−→α1(vi2)) ⊗ (vj1
•
−→α2(vj2))#(−→α3
◦
−→
β ),
here • and ◦ denote the multiplications in A and Aop respectively.
Remark 2.6. Recall that for a usual Poisson algebra A, another version of Poisson
enveloping algebra, denoted by P ′(A) as distinguished from P(A), has already been
developed; see [11, Definition 3], for example. This notion differs from ours, the
reason is that the Poisson modules concerned are different, just as mentioned in
Remark 1.8. In fact, P ′(A) = P(A)/h(a ⊗ 1Aop − 1A ⊗ a)#1U (A), a ∈ Ai.
(QUASI-)POISSON ENVELOPING ALGEBRAS
11
Remark 2.7. We have natural morphisms of associative algebras:
i : A ֒→ Q(A), a 7→ a ⊗ 1Aop#1U (A);
k : Aop ֒→ Q(A), a 7→ 1A ⊗ a#1U (A);
i′ : A ֒→ Q(A) ։ P(A);
k′ : Aop ֒→ Q(A) ։ P(A);
and morphisms of Lie algebras:
j : A ֒→ Q(A), a 7→ 1A ⊗ 1Aop#a;
j′ : A ֒→ Q(A) ։ P(A).
By construction of smash product we know that i, j, k are all injective maps. Let
f : P(A) → A be the linear map given by f (a ⊗ b#−→α ) = ǫ(−→α )ab. Clearly f ◦ i′ =
f ◦ k′ = IdA, which implies that i′ and k′ are both injective maps. Note that j′ is not
an injective map, for 0 6= 1A ∈ Ker(j′).
Clearly i(A), j(A) and k(A) generate Q(A) and hence P(A). Moreover, the gen-
erating relations can be written down explicitly.
Proposition 2.8. Let A be an NCPA. Then Q(A) is generated by the generators
i(a), j(a), k(a), a ∈ A subject to relations:
i(a)i(b) = i(a•b), k(a)k(b) = k(a◦b), i(a)k(b) = k(b)i(a);
j(a)j(b) − j(b)j(a) = j({a, b});
j(a)i(b) = i(b)j(a) + i({a, b}), j(a)k(b) = k(b)j(a) + k({a, b}), ∀a, b ∈ A.
The proof is given by routine check and we omit it here.
Example 2.9. In case A is an NCPA with trivial Poisson bracket, it is plain to see
that Q(A) = A ⊗ Aop ⊗ S(A) as an associative algebra, here S(A) is the polynomial
ring of A.
Example 2.10. Let A = K × K as an associative algebra. Then there exists a unique
Lie bracket, say the commutative one, making A an NCPA. We claim that in this
case, P(A) ∼= K × K × K[x] × K[x].
In fact, 1A = e1 + e2 is an orthogonal decomposition of identity, here e1 = (1, 0)
and e2 = (0, 1). Set est = i′(es)k′(et) for all 1 ≤ s, t ≤ 2, α12 = i′(e1)j′(e1)k′(e2) and
α21 = i′(e2)j′(e2)k′(e1). For any subset S ⊆ P(A), we denote by K⌈S⌉ the subalgebra
of P(A) generated by S, note that we do not require that 1P(A) ∈ K⌈S⌉ here.
Consider subalgebras A11 = K⌈e11⌉, A22 = K⌈e22⌉, A12 = K⌈e12, α12⌉ and A21 =
K⌈e21, α21⌉. Clearly A11 ∼= K ∼= A22 and A12 ∼= K[x] ∼= A21 as algebras. Moreover,
P(A) = A11 × A22 × A12 × A21 and the assertion follows.
12
YAN-HONG YANG, YUAN YAO, AND YU YE∗
Example 2.11. Let A = Khx1, x2, · · · , xni/J 2 be a 2-truncated algebra, where J =
hx1, x2, · · · , xni is the graded Jacobson radical. Let {−, −} be a Lie bracket on A.
Then (A, •, {−, −}) is an NCPA if and only if 1A is a center element in the Lie
algebra A.
Set αi = i′(xi), βi = k′(xi) and γi = j′(xi) for any 1 ≤ i ≤ n, here i′, j′, k′ be given
as in Remark 2.7. Then P(A) has a basis consisting of
αi, βj , αiβj, 1 ≤ i, j ≤ n,
γa1
1 γa2
2 · · · γan
n , ai ≥ 0, i = 1, 2, · · · , n,
αiγa1
1 γa2
2 · · · γan
n , ai ≥ 0, i = 1, 2, · · · , n,
n
X
i=1
ai > 0.
Remark 2.12. To calculate the Poisson enveloping algebras of an NCPA could be
very difficult in general. An open question is to ask whether there exist PBW-like
bases for Poisson enveloping algebras.
3. Poisson modules are modules
We are in a position to exhibit the equivalence between the category of (quasi)-
Poisson modules over an NCPA and the category of modules over its (quasi)-Poisson
enveloping algebras.
Let A be an NCPA and M ∈ Q(A) a quasi-Poisson module. To avoid confusion we
fix some notations. The left, right and Lie action of A on M are denoted by ·L, ·R and
{−, −}∗ respectively. The induced action of U (A) on M is denoted by x(m) for any
x ∈ U (A) and m ∈ M , to be precise, −→α (m) = {vi(1), {vi(2), {, · · · , {vi(r), a}∗ · · · }∗}∗}∗
for any α = (i1, · · · , ir) ∈ Sr and m ∈ M . By the similar argument used in the
proof of Proposition 2.3, we show that x(a ·L m) = P x1(a) ·L x2(m) and x(m · b) =
P x1(m) ·R x2(b) for any x ∈ U (A), a, b ∈ A and m ∈ M , again we use the Sweedler's
notation here. The action of Q(A) is always denoted by ·. The multiplications in A
and Aop are denoted by • and ◦, respectively.
Now we define F : Q(A) −→ Mod(Q(A)) as follows. Let M ∈ Q(A)). We define
an action of Q(A) on the underlying space M by setting
(vi ⊗ vj#−→α ) · m , vi ·L (−→α (m)) ·R vj
(QUASI-)POISSON ENVELOPING ALGEBRAS
13
for any i, j ∈ S, α ∈ Sr and m ∈ M . We claim that this action makes M a Q(A)-
module. For this it suffices to show that the associativity
(3.1)
(vi1 ⊗ vj1#−→α )((vi2 ⊗ vj2#
−→
β )(m)) = ((vi1 ⊗ vj1#−→α )(vi2 ⊗ vj2#
−→
β ))(m)
holds for any m ∈ M , i1, i2, j1, j2 ∈ S, α and β. One uses Proposition 2.8 to give a
proof; or one can give a direct argument as follows. In fact, the left hand side
LHS = (vi1 ⊗ vj1#−→α )(vi2 ·L (
−→
β (m)) ·R vj2)
−→
β (m) ·R vj2) ·R vj1
−→
vi1 ·L (−→α1(vi2 ) ·L (−→α3
β )(m) ·R
−→α2(vj2)) ·R vj1
(vi1
−→α1(vi2)) ·L (−→α3
•
−→
β )(m) ·R (vj1
−→α2(vj2))
◦
(vi1
−→α1(vi2) ⊗ vj1
•
−→α2(vj2)#(−→α3
◦
−→
β ))(m)
= vi1 ·L
−→α (vi2 ·L
= X
α=α1 ⊔α2⊔α3
= X
α=α1 ⊔α2⊔α3
= X
α=α1 ⊔α2⊔α3
= RHS,
the right hand side. We denote by F M the U (A)-module with underlying space M
and the above action.
Next we define G : Mod(Q(A)) −→ Q(A). Given M ∈ Mod(Q(A)), we may endow
the underlying space M a quasi-Poisson A-module structure by setting
(3.2)
(3.3)
a ·L m , i(a) · m, m ·R a , k(a) · m, ∀a ∈ A, m ∈ M ;
{a, m}∗ , j(a) · m, ∀a ∈ A, m ∈ M.
Clearly M is an A-bimodule as well as a Lie module with the above actions, since i, k
are homomorphisms of associative algebras and j is a homomorphism of Lie algebras.
We claim that M is a quasi-Poisson module with the above actions. For this it suffices
to show that (1.1) and (1.2), which can be translated to
j(a) · (i(b) · m) = i({a, b}) · m + i(b) · (j(a) · m),
j(a) · (k(b) · m) = k({a, b}) · m + k(b) · (j(a) · m),
hold for any a, b ∈ A and m ∈ M . This is obvious since in Q(A),
j(a)i(b) = i({a, b}) + i(b)j(a),
j(a)k(b) = k({a, b}) + k(b)j(a).
We denote by GM the quasi-Poisson A-module with the underlying space M and the
above actions.
14
YAN-HONG YANG, YUAN YAO, AND YU YE∗
Recall that there is a forgetful functor, denoted by F
Q(A) from Q(A) to Mod(K),
the category of K-vector spaces. Similarly we have forgetful functors FMod(Q(A)),
F
P(A) and F
Mod(P(A)).
Lemma 3.1. Let F : Q(A) → Mod(Q(A)) and G : Mod(Q(A)) → Q(A) be given
as above. Then F and G give rise to functors respecting the forgetful functors to
Mod(K), i.e. FQ(A) = FMod(Q(A)) ◦ F and FMod(Q(A)) = FQ(A) ◦ G.
Proof. We consider F first. Note that for each M ∈ Q(A), we have defined an object
F M ∈ Mod(Q(A)) with F M sharing the same underlying space with M . To extend
F to a functor, we need to define a map
F : HomQ(A)(M, N ) −→ HomQ(A)(F M, F N )
for each pair of M, N ∈ Q(A), such that certain compatible conditions are satisfied.
Now the requirement to respect the forgetful functor means that for each M ∈ Q(A),
M and F M have the same underlying vector space, and for each f ∈ HomQ(A)(M, N ),
F f = f as morphisms of vector spaces.
To complete the proof we need only to show that if f : M −→ N is a morphism
of quasi-Poisson modules, then f is a morphism of Q(A)-modules. This is easy to
show. In fact, we have f (vi ·L
−→α (f (m)) ·R vj and hence
−→α (m) ·R vj) = vi ·L
f ((vi ⊗ vj#−→α ) · m) = (vi ⊗ vj#−→α ) · f (m)
for all m ∈ M, i, j ∈ S and α.
Similar argument works for G and the lemma follows.
(cid:3)
Recall that the Poisson enveloping algebra P(A) of A is by definition the quotient
algebra Q(A)/J, where J is the ideal of Q(A) generated by
{1A ⊗ 1Aop#(a•b) − a ⊗ 1Aop#b − 1A ⊗ b#a a, b ∈ A}.
Thus Mod(P(A)) is a full subcategory of Mod(Q(A)), and a Q(A)-module M is a
P(A)-module if and only if J annihilates M .
Now consider the restriction of the functor F to P(A), the full subcategory con-
sisting of Poisson modules. Let M ∈ P(A). One checks easily that in F M ,
(1A ⊗ 1Aop#(a•b) − a ⊗ 1Aop#b − 1A ⊗ b#a) · m
={a•b, m}∗ − a ·L {b, m}∗ − {a, m}∗ ·R b = 0.
(QUASI-)POISSON ENVELOPING ALGEBRAS
15
The first equality follows from the construction of F M and the latter one from the
definition of Poisson modules. Thus J annihilates F M and hence F M is a P(A)-
module. Therefore F P(A) gives a functor F ′ : P(A) −→ Mod(P(A)).
Conversely, the above equalities also implies that for each P(A)-module M , GM
satisfies (1.4), and hence is a Poisson A-module. Thus GMod(P(A)) gives a functor
G′ : Mod(P(A)) −→ P(A).
Now our main result is stated as follows.
Theorem 3.2. Let A be an NCPA. Then there are isomorphisms of categories
Q(A) ∼= Mod(Q(A)) and P(A) ∼= Mod(P(A)). In fact, we have
(3.4)
(3.5)
F ◦ G = IdMod(Q(A)), G ◦ F = IdQ(A),
F ′ ◦ G′ = IdMod(P(A)), G′ ◦ F ′ = IdP(A),
here F, G, F ′, G′ are functors given as above.
Proof. First we show that G ◦ F (M ) = M . Since G ◦ F (M ) is defined to have the
same underlying vector space as M , it is only left to prove that they have the same
actions of A. By definitions of F and G, we have
a ·G◦F (M ) (m) = i(a) ·F (M ) (m) = a ·M (m),
m ·G◦F (M ) a = k(a) ·F (M ) (m) = m ·M a,
{a, m}∗G◦F (M ) = j(a) ·F (M ) (m) = {a, m}∗M
for all a ∈ A and m ∈ M , where ·G◦F (M ), {−, −}∗G◦F (M ), ·M and {−, −}∗M denote
the actions of A on the modules G ◦ F (M ) and M respectively. Thus we have shown
that G ◦ F (M ) = M as quasi-Poisson A-modules.
Next we show that F ◦ G(M ) = M for all M ∈ Mod(Q(A)), again it suffices to
show that
(vi ⊗ vj#−→α ) ·F ◦G(M ) m = (vi ⊗ vj#−→α ) ·M m
holds for any vi ⊗ vj#−→α ∈ Q(A) and m ∈ M . This is true since by definition
(vi ⊗ vj#−→α ) ·F ◦G(M ) m
=vi ·G(M ) (−→α G(M )(m)) ·G1(M ) vj
=((1A ⊗ vj#1U (A))(vi ⊗ 1Aop#1U (A))(1A ⊗ 1Aop#−→α )) ·M m
=(vi ⊗ vj#−→α ) ·M m.
16
YAN-HONG YANG, YUAN YAO, AND YU YE∗
Recall that F and G are both functors respecting the forgetful functor, which
It follows that
means G ◦ F (f ) = f for each morphism f in the category Q(A).
G ◦ F = IdQ(A) as functors.
Similarly, we obtain that F ◦ G = IdMod(Q(A)). Since F ′ is a restriction of F and
G′ is a restriction of G, we know that F ′ ◦ G′ is a restriction of F ◦ G, and hence we
deduce easily that F ′ ◦ G′ = IdMod(P(A)). Similarly we have G′ ◦ F ′ = IdP(A). The
(cid:3)
proof is completed.
Remark 3.3. An easy consequence of the theorem is that the categories Q(A) and
P(A) are both abelian categories with enough projectives and injectives, which an-
swers a question raised in [5, Section 2]. The quasi-Poisson and Poisson enveloping
algebras also enable us to apply the ring theoretic methods to the study of NCPA,
especially to the study of cohomology theory of NCPA.
Remark 3.4. An NCPA A itself can be viewed as a P(A)-module via the functor
F ′ and a Poisson ideal of A is just a P(A)-submodule of A. Now A is Poisson simple
if and only if A is simple as a P(A)-module.
Example 3.5. Let A be an associative algebra and consider the standard NCPA of
A. It is direct to check that any A-bimodule M is a Poisson A-module under the
Lie action given by {a, m}∗ = a · m − m · a. This gives a functor from the category
Mod(A ⊗ Aop) to the category P(A), and hence to Mod(P(A)). In fact, this functor
is induced from an isomorphism of associative algebras ψ : A ⊗ Aop ∼= P(A)/I, where
I = hj(a) − i(a) + k(a), a ∈ Ai is a two-sided ideal of P(A).
−→ P(A)
The isomorphism ψ is given by the composition map A ⊗ Aop f
π−→ P(A)/I,
here f is defined by f (a ⊗ b) = i′(a)k′(b) for any a, b ∈ A and π is the canonical map.
Obviously ψ is an epimorphism, hence to show that ψ is an isomorphism it suffices to
show that it is also injective. For this, one uses the fact that the A-bimodule A ⊗ Aop
is a Poisson module under the Lie action given by {c, a ⊗ b}∗ = ca ⊗ b − a ⊗ bc for
all a, b, c ∈ A. Thus A ⊗ Aop is a P(A)-module. Moreover, the ideal I annihilates
A ⊗ Aop and hence A ⊗ Aop is a P(A)/I-module. By definition of the functor F ,
ψ(x) · (1A ⊗ 1Aop) = x for any x ∈ A ⊗ Aop.
It follows that ψ(x) 6= 0 for any
0 6= x ∈ A ⊗ Aop, which implies that ψ is injective.
Acknowledgements: This work is supported by National Natural Science Founda-
tion of China (No. 10971206). The authors would like to thank Dr. Yan-Hong Bao
and Dr. Xiao-Wu Chen for helpful suggestions.
(QUASI-)POISSON ENVELOPING ALGEBRAS
17
References
[1] Y.H. Bao and Y. Ye, On quasi-Poisson cohomology, in preparation.
[2] W. Crawley-Boevey, P. Etingof and V. Ginzburg, Noncommutative geometry and quiver alge-
bras. Adv. Math. 209 (2007) 274-336.
[3] J.M. Casas and T. Pirashvili, Algebras with bracket. Manuscripta Math. 119 (2006) 1-15.
[4] D. Farkas, Modules for Poisson Algebras. Comm. in Algebra 28 (7) (2000) 3293-3306.
[5] M. Flato, M. Gerstenhaber and A.A. Voronov, Cohomology and deformation of Leibniz pairs.
Lett. Math. Phys. 34 (1995), 77-90.
[6] D. Farkas and G. Letzter, Ring Theory from Symplectic Geometry. Journal of Pure and Applied
Algebra 225(1998) 255-290.
[7] V. Ginzburg and M. Kapranov, Koszul duality for operads. Duke Math. J. 76 (1) (1994) 203-272.
[8] M. Kontsevich, Formal (non)commutative symplectic geometry. The Gelfand Math. Seminars,
1990-1992, Birkhauser, Boston, MA, 173-187.
[9] F. Kubo, Finite-dimensional Simple Leibniz Pairs and Simple Poisson Modules. Lett. Math.Phys.
43 (1) (1998) 21-29.
[10] F. Loose, Symplectic algebras and Poisson algebras. Commun. Algebras 21 (7) (1993) 2395-2416.
[11] Sei-Qwon Oh, Poisson Enveloping Algebras. Comm. Algebra 27 (5) (1999) 2181-2186.
[12] N. Reshetikhin, A. A. Voronov and A. Weinstein, Semiquantum geometry. J. Math. Sci. 82 (1)
(1996) 3255 -- 3267.
[13] M.E. Sweedler, Hopf algebras, W. A. Benjamin, Inc., New York, 1969.
[14] I. Vaisman, Lectures on the geometry of Poisson manifolds, Progress in Math., Vol. 118,
Birkhauser, Basel, 1994.
[15] M. Van den Bergh, Double Poisson Algebras. Trans. Amer. Math. Soc. 360 (11) (2008) 5711 --
5769.
[16] P. Xu, Noncommutative Poisson algebras. Amer. J. Math. 116 (1) (1994) 101-125.
[17] Y. Yao, Y.Ye and P.Zhang, Quiver Poisson Algebras. J. Algebra 312 (2) (2007), 570 -- 589.
Department of Mathematics, Columbia University, New York, New York 10027, USA;
E-mail address: [email protected]
Department of Mathematics, The University of Texas, 1 University Station C1200,
Austin, TX 78712, USA;
E-mail address: [email protected]
Yu Ye, Department of Mathematics, University of Science and Technology of China,
Hefei 230026, Anhui, PR China.
E-mail address: [email protected]
|
1806.04211 | 1 | 1806 | 2018-06-08T10:33:55 | A parallel algorithm for Gaussian elimination over finite fields | [
"math.RA",
"cs.DC",
"math.NA",
"math.GR"
] | In this paper we describe a parallel Gaussian elimination algorithm for matrices with entries in a finite field. Unlike previous approaches, our algorithm subdivides a very large input matrix into smaller submatrices by subdividing both rows and columns into roughly square blocks sized so that computing with individual blocks on individual processors provides adequate concurrency. The algorithm also returns the transformation matrix, which encodes the row operations used. We go to some lengths to avoid storing any unnecessary data as we keep track of the row operations, such as block columns of the transformation matrix known to be zero. The algorithm is accompanied by a concurrency analysis which shows that the improvement in concurrency is of the same order of magnitude as the number of blocks. An implementation of the algorithm has been tested on matrices as large as $1 000 000\times 1 000 000$ over small finite fields. | math.RA | math |
A parallel algorithm for Gaussian elimination over
finite fields
Stephen Linton, Gabriele Nebe, Alice Niemeyer, Richard Parker, Jon Thackray
June 13, 2018
School of Computer Science, University of St. Andrews, St. Andrews,
Fife KY169SX, Scotland E-mail address: [email protected]
Lehrstuhl D für Mathematik, RWTH Aachen University, 52056 Aachen,
Germany E-mail address: [email protected]
Lehrstuhl B für Mathematik, RWTH Aachen University, 52056 Aachen,
Germany E-mail address: [email protected]
70 York St. Cambridge CB1 2PY, UK
E-mail address: [email protected]
E-mail address: [email protected]
Abstract
In this paper we describe a parallel Gaussian elimination algorithm for matrices
with entries in a finite field. Unlike previous approaches, our algorithm subdivides
a very large input matrix into smaller submatrices by subdividing both rows and
columns into roughly square blocks sized so that computing with individual blocks
on individual processors provides adequate concurrency. The algorithm also returns
the transformation matrix, which encodes the row operations used. We go to
some lengths to avoid storing any unnecessary data as we keep track of the row
operations, such as block columns of the transformation matrix known to be zero.
The algorithm is accompanied by a concurrency analysis which shows that the
improvement in concurrency is of the same order of magnitude as the number of
blocks. An implementation of the algorithm has been tested on matrices as large
as 1000000 × 1000000 over small finite fields.
Keywords: Gaussian elimination, parallel algorithm, finite fields
MSC 2010:15A06, 68W10, 68W05
1
1 Introduction
Already employed for solving equations by hand in China over 2000 years ago [9], the
Gaussian elimination method has become an invaluable tool in many areas of science.
When computing machines became available, this algorithm was one of the first to be
implemented on a computer. In general the algorithm takes as input a matrix with entries
in a field (or a division ring) and transforms this matrix to a matrix in row echelon form.
It can be employed for several different purposes, and computer implementations can be
tailored to suit the intended application. Different variants of the Gaussian elimination
algorithm can be envisaged, for example computing the rank of a matrix, computing a
row echelon form or a reduced row echelon form of a matrix, or computing one of these
echelon forms together with the transformation matrix. Often one of these versions
of the Gaussian elimination algorithm lies at the heart of other algorithms for solving
problems in a broad range of areas and their overall performance is often dictated by the
performance of the underlying Gaussian elimination algorithm. Thus an implementation
of a Gaussian elimination algorithm is required to display exceptional performance.
Since their invention, computers have become faster and more powerful every year.
Yet, for over a decade this increase in computing power is no longer primarily due to
faster CPUs but rather to the number of different processors an individual computer has,
paired with the increasingly sophisticated memory hierarchy. It is therefore paramount
that modern algorithms are tailored to modern computers.
In particular this means
that they need to be able to perform computations in parallel and store the data for the
current computations readily in cache.
With the advance of parallel computers comes the need to design a parallel algo-
rithm to perform Gaussian elimination on a matrix. Such a parallel algorithm would
immediately result in immense speedups of higher level algorithms calling the Gaus-
sian elimination without having to introduce parallelism to these algorithms themselves.
When designing a parallel Gaussian elimination algorithm it is important to keep the ap-
plications of the algorithms in mind. Several versions of a parallel Gaussian elimination
algorithm have been described when working over the field of real or complex numbers,
see [6] for a survey and PLASMA [11] for implementations. In this paper we describe a
parallel version of the Gaussian elimination algorithm which, given a matrix with entries
in a finite field, computes a reduced row echelon form together with the transformation
matrix. We note that when working with dense matrices over finite fields we are not
concerned with sparsity, the selection of suitable pivot elements nor numerical accuracy.
In particular, we can always choose the first non-zero element of a given row as our pivot
element, ensuring that all entries to the left of a pivot are known to be zero. Moreover,
we need not be concerned with producing elements in a field which require more and
more memory to store them. Avoiding producing very large field elements would again
complicate pivot selection. Thus our main concern is to design a parallel algorithm which
makes optimal use of modern parallel computers.
We assume an underlying shared memory computational model in which we have
access to k different processors, each of which can run a job independently from any
2
other. The processors communicate with each other through the shared memory system.
Our design must take account of the limited total memory bandwidth of the system. The
aim of our parallel algorithm is to achieve adequate concurrency by dividing the necessary
computational work into smaller jobs and scheduling these to run simultaneously on the
k processors. This in turn calls for a very careful organization of the jobs so that different
jobs do not interfere with each other. We will address these issues in Section 2.1.
It is well known, see for example [5, Theorems 28.7, 28.8], that the asymptotic com-
plexities of matrix inversion and matrix multiplication are equal. An algorithm that
shows this reduces inversion of a 2n × 2n matrix to 6 multiplications of n × n matrices
together with two inversions, also of n× n matrices. Applying this approach recursively,
almost all of the run-time of inversion is spent in multiplications of various sizes. It is
not difficult to see that this extends to our somewhat more general computation of a
reduced row echelon form, with transformation matrix.
We envisage that we are given a very large matrix over a finite field for which we
need to compute a reduced row echelon form together with a transformation matrix.
Several approaches to achieving this already exist for finite fields. One approach takes
advantage of the reduction to multiplication mentioned above, and delegates the problem
of parallelising the computation primarily to the much easier problem of parallelising the
larger multiplications. Another approach represents finite field elements as floating point
real numbers of various sizes in such a way that (with care) the exact result over the
finite field can still be recovered. The problem can then be delegated to any of a number
of highly efficient parallel floating point linear algebra systems [7]. Another approach by
Albrecht et al. works over small finite fields of characteristic 2 (see [2] and [3]). A fourth
approach in unpublished work by Lübeck repeatedly divides the matrix horizontally,
echelonising each block of rows in parallel and then sorting the rows of the matrix, so
that rows with similar length initial sequences of zeros come together.
Large modern computers typically have a large number of cores but may well have
an order of magnitude less real memory bandwidth per core than a typical laptop or
desktop computer. On such a large modern computer, at the lowest level, a core can
only be fully occupied if essentially all its data is in the smallest, fastest level of cache
memory (L1). At the next level out, this work can only be started if essentially all its
data is in the next level of cache (L2). A similar statement is true for L3 cache. To use a
modern computer effectively for matrix operations, it is therefore necessary to repeatedly
subdivide matrices in both directions producing matrices that are roughly square at a
scale commensurate with the size of the cache at each level.
It is not too hard to design an algorithm for matrix multiplication with these prop-
erties. An approach along these lines to Gaussian elimination for these roughly square
submatrices is described in Section 2.3.2.
For the whole matrix, we also need to subdivide to achieve concurrency.
Unlike previous approaches, we subdivide our very large input matrix into smaller
submatrices, called blocks, by subdividing both rows and columns into roughly square
blocks sized so that computing with individual blocks on individual processors provides
adequate concurrency. We will show that we gain a concurrency improvement in the
3
same order of magnitude as the number of blocks, see Proposition 5.3 and Theorem 5.4.
As well as computing the reduced row echelon form of the input matrix, we compute
the transformation matrix, which encodes the row operations used. We go to some
lengths to avoid storing any unnecessary data as we keep track of the row operations, such
as block columns of the transformation matrix known to be zero. Our experiments show
that the memory usage during the execution of the algorithm remains fairly stable, and is
similar to storing the input matrix. The runtime is broadly comparable to multiplication
of matrices to the same size as the input matrix. This gives evidence that we have
succeeded in keeping the cost of computing the transformation matrix as small as possible
and is in accordance with the theoretical analysis of Bürgisser et al.
in particular [4,
Theorem 16.12].
The parallel Gauss algorithm is designed with three distinct environments in view,
although we have only implemented the first so far.
The first (and original) target is to use a single machine with multiple cores with the
matrix in shared memory. Here the objective is to subdivide the overall task into many
subtasks that can run concurrently.
The second target is to use a single machine where the matrix does not fit in memory,
but does fit on disk. Here the objective is to subdivide the matrix so that each piece fits
into memory.
The third target is where several computers (probably each with multiple cores) are
to work on a single problem simultaneously. Here the objective is again to subdivide the
overall task into many subtasks that can run concurrently on different computers with
access to the same central disk.
2 Preliminaries
2.1 Computational Model
Our general approach to parallel computing is to decompose the work to be done into
relatively small units with explicit dependencies. Units all of whose dependencies are
met are called "runnable" and a fixed pool of worker threads carry out the runnable units,
thereby discharging the dependencies of other units and making them in turn runnable.
A module, called the scheduler, is charged with keeping track of the dependencies and
scheduling the execution of the individual units. Data describing the units of work and
their input and output data reside in a shared data store, but we take considerable care
to ensure that the speed of this store is not critical to overall performance. It can thus
be the large amount of shared DRAM on a multicore server, or disk storage local to a
single server (for the case where we only have one server, but data too large for its RAM)
or shared disk provided sufficiently strong consistency can be guaranteed.
In our implementations, we have used two variations of this model. In one, the task-
model, the units of work are tasks and are relatively coarse-grained. A task represents,
roughly speaking, all the work that needs to be done in a particular part of the matrix at
a particular stage of the algorithm. Dependencies are between tasks, so one task cannot
4
execute until certain others have completed and it will find the data it needs where
those previous tasks have stored it. To simplify understanding, we collect different data
into data packages, the input and output of the tasks. For example a typical output of
the task ClearDown is the data package A = (A, M, K, ρ(cid:48), E, λ) with six components
which we refer to as A.A, A.M, etc.
In the other model, the job-model, the units of work are the jobs and are significantly
more fine-grained and represent a single elementary computation such as a submatrix
multiplication. More importantly, the dependencies are between the jobs and the data
they produce and consume. Each job requires zero or more input data objects and
produces one or more output objects. A job is runnable when all of its input data has
been produced. This finer grain approach allows more concurrency. Further gain in
efficiency can be achieved by giving the scheduler guidance as to which jobs or tasks
are urgent and which are less so. This aspect is mainly ignored in this paper. The
implementation of Meataxe64 [10] uses the job-model and identifies the urgent jobs. An
implementation in HPC-GAP by Jendrik Brachter and Sergio Siccha is based on the
task-model.
The parallel Gaussian elimination algorithm is described in Section 3 as a program
called the Chief charged with defining the tasks and the data packages they work on.
The Chief is described as a sequential program but the reader should be warned that
the tasks are executed in an unpredictable order which may bear little resemblance to
the order in which the tasks are submitted by the Chief. The result of running the
Chief is a plan consisting of a list of tasks, respectively jobs, together with their inputs
and outputs whose collective execution performs the Gaussian elimination.
Below we specify The Chief in terms of tasks, specified in turn by jobs, for which
the reader will find a more or less specific description in Section 4.
2.2 Gaussian elimination
This subsection describes the Gaussian elimination process in a way we hope is familiar
to the reader, but in our notation. Given a matrix H with entries in a field F the output
of the Gauss algorithm consists of matrices M, K and R and permutation matrices Pρ
and Pγ such that
PρHPγ =
.
(1)
(cid:18)M 0
(cid:19)
K 1
(cid:18)−1 R
(cid:19)
0
0
The matrices Pρ and Pγ perform row, respectively column, permutations on the input
matrix H such that the top left-hand part of the resulting matrix PρHPγ is invertible
(with inverse −M) with the same rank as H. It should be noticed that the permutation
matrices Pρ and Pγ in Equation (1) are not uniquely defined. All that matters is that
they put the pivotal rows and columns into the top left-hand corner of the matrix. We
therefore choose to only specify the sets of row and column numbers containing pivotal
elements. As we are chopping our matrix into blocks, we use the word selected to specify
a row or column in which a pivot has been already been found. Hence we have to apply
a permutation to the rows during the course of the algorithm to ensure that our pivots
5
remain located in columns with increasing indices. We formalize how we store these
permutation matrices in the Definition 2.1.
Definition 2.1. When we enumerate elements of a set, we always implicitly assume that
these are in order. To a subset ρ = {ρ1, . . . , ρρ} ⊆ {1, . . . , α} associate a 0/1 matrix
(cid:40)
ρ ∈ Fρ×α with ρi,j =
1
0
j = ρi
else.
We call ρ the row-select matrix and ρ the row-nonselect matrix associated to the set
ρ and its complement ρ = {1, . . . , α} \ ρ.
Remark 2.2. Note that the matrix
(cid:18) ρ
ρ
(cid:19)
∈ Fα×α
Pρ =
is a permutation matrix associated to the permutation pρ with pρ(i) = ρi for i ≤ ρ and
pρ(i) = ρi−ρ for i > ρ. Note that pρ = 1 if and only if ρ = {1, . . . , i} for some 0 ≤ i ≤ α
but for the other subsets ρ we may recover ρ from pρ as the image {pρ(1), . . . , pρ(i)}
if pρ(i + 1) < pρ(i).
In this sense we keep switching between permutations, subsets,
and bitstrings in {0, 1}α which represent the characteristic function of the subset. In
particular, this means that a subset of cardinality 2α − α of special permutations of all
the α! permutations of {1, . . . , α} is sufficient for all our purposes.
We also note that for a matrix H ∈ Fα×β and ρ ⊆ {1, . . . , α} and γ ⊆ {1, . . . , β} the
matrix ρ × H ∈ Fρ×β consists of those rows of H whose indices lie in ρ (retaining the
ordering) and the matrix H × γtr ∈ Fα×γ consists of those columns of H whose indices
lie in γ. Therefore we also call γtr the column-select matrix and γtr the column-nonselect
matrix associated to γ.
Remark 2.3. Let H ∈ Fα×β be of rank r. Then the echelonisation algorithm will
produce sets ρ ⊆ {1, . . . , α} and γ ⊆ {1, . . . , β} of cardinality γ = ρ = r and matrices
M ∈ Fr×r, K ∈ F(α−r)×r, R ∈ Fr×(β−r) such that
(cid:18) M 0
(cid:19)(cid:18) ρ
(cid:19)
H(cid:0) γtr γtr (cid:1) =
(cid:18) −1 R
(cid:19)
0
0
K 1
ρ
We will refer to these matrices as
(M, K, R, ρ, γ) := ECH(H).
Strictly speaking, the job ECH computes the negative row reduced echelon form of
the input matrix H. However we will simply call this the echelon form of H.
We assume we have an implementation of ECH suitable for use on a single core. The
goal of this paper is to show how to scale it up.
6
Example
We now present an example to highlight some of the structure of the algorithm. Consider
the matrix C ∈ F6×6
and divided into four blocks as shown. Our first step is to echelonise the top left block.
This yields
3
given by
P{1,3}
0 2 0
1 0 0
P{1,3} =
0 0 1
0 1 0
0 2 2 0 1 0
0 2 2 1 2 2
1 0 1 0 2 1
2 0 1 0 2 2
0 1 1 2 1 1
1 2 2 2 0 0
0 2 2
P{1,2} =
2 0 2
and P{1,2} =
1 0 0
,
(cid:19)
(cid:18)0 2
, K =(cid:0)2 0(cid:1), and R =
0 2 2
0 0 0
0 1 0
0 0 1
0 2 2
1 0 1
(cid:18)2
(cid:19)
1 0 0
2 0 1
matching Equation 1. Here
where the bars separate selected from non-selected rows or columns. So the outputs
from this step are the multiplier M =
as well as the
row-select set ρ, selecting the first and third row and the column-select set γ, selecting
the first two columns.
1 0
2
0 2 0
Mathematically, we need to left multiply the top right block by
We take advantage of the known structure of this matrix to speed up this computation
as follows. We divide the top right block into the selected rows, as described by ρ:
After this, two further steps are available, our parallel implementation will do both
concurrently. We mimic the row transformations, applied to the top left block, on the
top right block. We also use the echelonised top left block to clean out some columns in
the block beneath it. We explain them in that order.
P{1,3}.
(cid:18)0 1 0
(cid:19)
and the rest(cid:0)1 2 2(cid:1). We add the product of K and the selected rows to
the non-selected rows, giving(cid:0)1 1 2(cid:1), and then multiply the selected rows by M giving
(cid:18)0 1 2
(cid:19)
(cid:18) 2 0 2
The other step requires us to add multiples of the pivot rows from the echelonised top
to the bottom left block, so as to clear the pivotal columns. We
1 0 0
2 0 1
left block
0 1 0
0 2 1
(cid:19)
.
0 2 2
7
again take advantage of the known structure of this matrix to speed up this computation
as follows. We divide the bottom left block into the selected columns, as described by γ:
1
. Now we add the product of the selected
and the non-selected columns
2 0
0 1
1 2
columns and R to these non-selected columns and obtain
0
2
1
2
2
.
2 0
and
0 1 0
.
.
2 2 1
2 0 2
0 1
1 2
2 0 2 0 1 2
0 2 2 0 1 0
0 0 0 1 1 2
0 0 2 0 1 0
0 0 0 2 2 1
0 0 2 2 0 2
We must now mimic the row transformations used to clear the pivotal columns of
the bottom left block by adding multiples of rows from the top right hand block to the
bottom right hand block, i.e. we add the product of
to the
(cid:18)0 1 2
(cid:19)
0 1 0
bottom right hand block, which becomes
After all these steps, the overall matrix is
At this stage we have dealt with all the consequences of the pivots found in the top
left block. What remains to be done is to echelonise the top-right and bottom-left
submatrices in the picture above and deal with the consequences of any pivots found.
Finally part of the bottom right hand block will need to be echelonised. This example,
chopped 2 × 2 does not demonstrate pivotal row merging as described in Section 2.3.1
2.3 Some guiding points
2.3.1 Subdividing a huge matrix
Our parallel version of the Gaussian elimination algorithm takes as input a huge matrix
and subdivides it, both horizontally and vertically, into blocks. We do this partly to
obtain concurrency and partly to reduce the row length for cache reasons. Once the top-
left block has been echelonised, the same row operations can be applied simultaneously
to all the blocks along the top row. Putting the rest of the left-most block column into
echelon form requires addressing the blocks sequentially from the top down. However,
in the common case where the co-rank of the top-left block is small, it is not a great
deal of computation. Once the top block row and left-most block column are in echelon
form, we can update each of the blocks in the other rows and columns concurrently.
8
It should be remarked that nothing else can happen until this first block is echelonised,
suggesting that we should make this block smaller than the rest. A similar comment
applies to the last (bottom-right) block.
Proceeding down the left-most block column sequentially enables us to merge into a
single row of blocks all those rows whose pivots lie there. This merging is done to reduce
the amount of data access. Usually, the work of doing this merging is not great, so that
soon after the first block echelonisation is complete, a large block multiply-and-add can
be done to every block of the matrix. Without the merging, this multiply-and-add would
be done piecemeal, requiring multiple passes through the block.
2.3.2 Echelonisation of a single block
The performance of the echelonisation of a single block (as defined in Remark 2.3) can
have a considerable impact on the concurrency, as many later jobs may depend on each
echelonisation.
The sequential algorithm used to echelonise individual blocks is recursive, combin-
ing elements of the recursive inversion algorithm already mentioned, with the greater
generality of the technique described in this paper. A block is divided into two, either
horizontally or vertically, and the top (resp. left) part is echelonised. Using a simplified
version of ClearDown (resp. UpdateRow), see Sections 4.2.1 and 4.2.2, the remain-
der of the matrix and the transformation matrix are updated, producing a second block
which must also be echelonised. The results of the two echelonisations can be combined
to compute the data package consisting of M, K, R, Pρ and Pγ. Using this technique
recursively for all matrices bigger than a threshold size (about 300 dimensions) and a
simple direct Gaussian elimination algorithm below this size, echelonisation of a block
takes essentially the same time as a block multiply.
2.3.3 Blocks change size and shape
In our description of the algorithm, especially in Equations (3) and (4), we imagine that
rows are permuted so that those containing pivots (in blocks to the left) are moved to
the top, and the rest are moved to the bottom.
In the program, however, these two
sets of rows are held in different matrices, but it seemed better to try to include all the
information in one matrix, attempting to clarify the relationships between the parts.
As a consequence of moving rows about, the sizes and shapes of the blocks change
during the course of the algorithm. We use a superscript to indicate the "stage" of a
ik is the matrix block at the (i, k)-position in
particular block, so that, for example, Cj
In some ways the original input matrix C (see Equation (2) below) is
its j'th stage.
gradually converted into the matrix R. An intermediate matrix B collects the pivotal
rows from C which are subsequently deleted from C.
9
2.3.4 Riffles
Our subset-stored permutations are used both to pull matrices apart and to merge them
together. We call the pulling apart an 'extract' where one matrix is separated into two
matrices with the selected rows (or columns) going to one, and the remaining rows to the
other. We call the merging a 'riffle' where one matrix is assembled from two inputs with
the subset-stored permutation directing from which input each row (or column) comes.
2.3.5 Transformation matrix abbreviation
To compute the transformation matrix, we could apply the same row operations we
performed on the input matrix to the identity matrix. In practice this would be wasteful,
both of memory and computational effort, since initially the identity matrix contains no
information at all, and the early row operations would mainly be adding zeros to other
zeros. Considerable effort has been expended in this paper to avoid storing any parts
of matrices whose values are known a priori, thereby saving both memory, and work
manipulating them. The graphs shown in Section 6 suggest that this has been successful.
The details of this optimisation are the subject of Section 4.2.3, which may be skipped
on first reading.
Note that although the output matrix M in Equation 2 below is square, the number
of blocks in each row may differ from the number of blocks in each column, since the
block rows are indexed by the block column in which the pivot was found and vice versa.
3 A parallel Gauss algorithm
3.1 The structure of the algorithm
We now describe a parallel version of the Gaussian elimination algorithm which takes as
input a huge matrix and subdivides it, both horizontally and vertically, into blocks.
To distinguish between the huge matrix and its blocks we use different fonts.
Let F be a finite field and C ∈ Fm×n a huge matrix of rank r. We describe a
parallel version of the well-known Gauss algorithm, which computes matrices R, a
transformation matrix T =
and subsets ⊆ {1, . . . m} and Υ ⊆
{1, . . . , n}, both of cardinality r, such that
K 1(m−r)×(m−r)
(cid:19)
(cid:18)M 0r×(m−r)
(cid:19)
C(cid:16)
(cid:19)(cid:18)
(cid:18)M 0r×(m−r)
K 1(m−r)×(m−r)
tr(cid:17)
(cid:18)−1r×r R
(cid:19)
0
0
Υtr Υ
=
(2)
is in (negative row reduced) echelon form.
Comparing to Remark 2.3, we see that our task is to chop our huge input matrix
into smaller blocks and then, using ECH and other jobs on the blocks, to effect the
same operation on the huge matrix as ECH does on a single block. We therefore choose
10
positive integers ai, bj such that
a(cid:88)
ai = m,
b(cid:88)
bj = n
i=1
j=1
and our algorithm copies the block-submatrices of the input matrix C into data packages
Cij ∈ Fai×bj, called blocks, and performs tasks (as described in Section 4) on these smaller
blocks.
We call the a matrices C1j, . . . , Caj the j-th block column and the b matrices Ci1, . . . , Cib
the i-th block row of C. Echelonising the overall matrix C is achieved by performing an
echelonisation algorithm on individual blocks and using the resulting data to modify
others.
The result of the Gaussian elimination as well as the intermediate matrices are par-
titioned into blocks: When the Gauss algorithm has completed, the matrix R, which
occurs in Equation (2), consists of blocks and has the form
R(cid:48)
R1 R(cid:48)
. . .
R(cid:48)
0 R2 R(cid:48)
...
...
...
0 Rb−1 R(cid:48)
0
b−1,b
0
Rb
. . .
j=1 rj is the rank of C and for
j=1 rj is the rank of the submatrix of C consisting of the first k
block columns.
The time-consuming parts of the Gaussian elimination algorithm consist of Step 1
and Step 3, whereas the intermediate Step 2 is not. After the first step the matrix C has
been transformed into an upper triangular matrix and prior to permuting columns the
matrix (−1r×rR) ∈ Fr×n has the shape
jk ∈ Frj×(bk−rk). Here r =(cid:80)b
with Rj ∈ Frj×(bj−rj ) and R(cid:48)
k = 1, . . . , b the sum(cid:80)k
...
. . .
. . .
R =
. . .
. . .
...
0
(3)
1b
2b
12
23
R =
−1 R2 X23 R23
−1 R1 X12 R12
0 0
...
0 0
0 0
...
. . .
. . .
. . .
...
0 0
. . .
. . .
. . .
...
0 0
,
X1b R1b
X2b R2b
...
−1 Rb
−1 Rb−1 Xb−1,b Rb−1,b
(4)
where Rjk ∈ Frj×(bk−rk) and Xjk ∈ Frj×rk. To simplify notation in the algorithms
below we define the data packages Bjk = (XjkRjk) ∈ Frj×bk for 1 ≤ j < k ≤ b and
Dj = (Dj.R, Dj.γ), where Dj.R = Rj and Dj.γ ⊆ {1, . . . , bj} is the set of indices of
pivotal columns in the block column j.
3.1.1 Computing the transformation matrix
During the course of the algorithm we also compute the transformation matrix T ∈
GLm(F) as given in Equation (2). Of course this could be achieved by simply performing
11
the same row operations on an identity matrix that were performed on C. This involves
considerable work on blocks known to be either zero or identity matrices. For example,
if C is invertible, the work required to compute its inverse is needlessly increased by
50%. To avoid such extra work, we only store the relevant parts of the blocks of the
transformation matrix.
During the computation, the data packages Mji (j = 1, . . . , b; i = 1, . . . , a) and Kih
(i, h = 1, . . . , a) record the matching status of the transformation matrix. If Cik denotes
the i, k-block of the original input matrix C, then initially Cik = Cik and Bjk has no
rows. Likewise, initially Kih is the identity matrix if i = h and the zero matrix otherwise
and the matrix Mji has no rows and no columns. When storing the data packages K
and M, we omit the columns and rows in the blocks that are zero or still unchanged
from the identity matrix.
To obtain the row select matrix we maintain further data packages Eij = (Eij.ρ, Eij.δ)
(1 ≤ i ≤ a, 1 ≤ j ≤ b) with Eij.ρ ⊆ {1, . . . , ai} is the set of indices of pivotal rows in
block row i with pivot in some block column 1, . . . , j and Eij.δ ∈ {0, 1}Eij .ρ records
which indices already occurred up to block column j − 1.
During the algorithm, having handled block row i in Step 1, we have
a(cid:88)
a(cid:88)
h=1
Mjh × Ehi.ρ × Chk = Bjk
K(cid:96)h × Ehi.ρ × Chk = C(cid:96)k.
and
The final column select matrix is the block diagonal matrix
h=1
Υ = diag(Da
1.γ, . . . , Da
b .γ).
and the row select matrix is
= diag(E1b.ρ, . . . , Eab.ρ).
3.2 Step 1
Step 1 loops over the block rows. For the j-th column of the i-th block row, the algorithm
calls Task ClearDown with the two data packages Cij and Di−1
as input. Task
ClearDown amalgamates the pivots in Di−1
.γ with the pivots in the matrix Cij to
j.R of the (negative) echelon
produce the enlarged set Di
form (−1 Di
j.R) followed by 0 rows (up to column permutations which are remembered
j.γ). Moreover, the task ClearDown records in its output data package Aij the
in Di
row operations performed. With the help of these data packages, the first step then
propagates the same elementary row operations to the remaining blocks in block row i
as well as to block row i of the transition matrix using Task UpdateRow.
j.γ as well as a new matrix Di
j
j
12
Hence Step 1 assembles in the block row(cid:0)0 . . . 0 −1Dj.R Bj,j+1
and the number of rows of C is m −(cid:80)j
rows of the original input matrix whose pivotal entries lie in block column j for j ≤ b.
These rows are then deleted from the data package C. Thus having treated the j-th
block column the matrix C contains no rows whose pivots lie in block columns 1, . . . , j
(cid:1) the
. . . Bjb
k=1 rk.
In particular, during the course of the entire algorithm the block rows Ci,− con-
tain fewer and fewer rows, whereas the number of rows of the block row Bj,− increases
accordingly. After completing the block column j the matrices Bjk remain stable.
Similarly for the transformation matrix, the matrix M gains rows whereas K loses
rows. However, things here are slightly more complicated due to the fact that we do
not store the full transformation matrix. As we only store columns of Kih that are not
known a priori to be zero or columns of an identity matrix, we have to ensure that all
the needed columns are present when calling UpdateRowTrafo. The columns that
are not yet present are precisely the columns that correspond to the positions of the
pivot rows and are stored in Ehj.δ. If i = h this means we need to insert into the correct
positions columns of an identity matrix and if i (cid:54)= h then columns of a zero matrix. To
achieve this, and also to efficiently deal with the cases where the matrices Kih or Mjh
are to be initialized we adapted the task UpdateRow to obtain UpdateRowTrafo.
3.3 Step 2
This intermediate step becomes necessary as we do only store the relevant parts of the
transformation matrices Mji. Before the upwards cleaning in Step 3 we need to riffle in
zero columns in Mji so that the number of columns in Mji is equal to the number of
columns in Mbi for all j.
3.4 Step 3
Then back cleaning only performs upwards row operations on the matrix from Equation
(4) to eliminate the Xjk. The matrices Rjk from Equation (4) are stored in the data
packages Rjk in the Chief. Having cleaned block columns b, . . . , k − 1 the algorithm
adds the Xjk multiple of block row k to block row j for all j ≤ k−1 to clear block column
k. The same row operations are performed on the relevant part M of the transformation
matrix.
13
Algorithm 1: The Chief
Input : C =: (C1
Output: R = (Rk−j
ik)i=1,...,a,k=1,...,b, where C1
jk )j≤k=1,...,b, M = (M2a
ik ∈ Fai×bk
jh)j=1,...,b,h=1,...,a, K = (Ka
select matrix ⊆ {1, . . . , m}, the concatenation of the
Eib.ρ ⊆ {1, . . . , ai} (i = 1, . . . , a), and a column select matrix
Υ ⊆ {1, . . . , n}, the concatenation of the Da
j .γ ⊆ {1, . . . , bj}
(j = 1, . . . , b), such that
(cid:19)(cid:18)
(cid:18)M 0K 1
(cid:19)
C(cid:0)Υ Υ(cid:1) =
(cid:18)−1 R
(cid:19)
0
0
ih)i,h=1,...,a, a row
Step 1:
for i from 1 to a do
for j from 1 to b do
j; Aij) := ClearDown(Cj
(Di
Eij :=Extend(Aij, Ei,j−1, j);
for k from j + 1 to b do
ij, Di−1
j
, i);
(Cj+1
ik , Bi
jk) := UpdateRow(Aij, Cj
ik, Bi−1
jk , i);
for h from 1 to i do
(Kj+1
ih , Mi
jh) :=UpdateRowTrafo(Aij, Kj
ih, Mi−1
jh , Ehj, i, h, j);
Step 2:
for j from 1 to b do
for h from 1 to a do
Ma+1
jh
:=RowLengthen(Ma
jh, Ehj, Ehb);
Step 3:
for k from 1 to b do
kk :=Copy(Da
k);
R0
for k from b downto 1 do
for j from 1 to k − 1 do
jk) := PreClearUp(Ba
(Xjk, R0
for (cid:96) from k to b do
R(cid:96)−k+1
j(cid:96)
:= ClearUp(R(cid:96)−k
j(cid:96)
k);
jk, Da
, Xjk, R(cid:96)−k
k(cid:96) );
for h from 1 to a do
Ma+h
jh
:= ClearUp(Ma+h−1
jh
, Xjk, Ma+h−1
kh
);
14
4 Jobs and Tasks
4.1 The jobs
In this section we describe the jobs. These are fundamental steps that are later used to
define the tasks. Many of the jobs take as input one or more matrices. While the input
and output matrices of the jobs within the global context of the parallel Gauss algorithm
are blocks computed from a huge input matrix, the jobs described in this section work
locally only on these matrices. In current implementations, each job can be performed
by a single threaded computation, entirely in RAM and in a reasonable amount of time.
cpy This task simply copies the input matrix to the output.
mul This job performs a matrix multiplication. It takes as input two matrices A ∈ Fα×β
and B ∈ Fβ×δ and returns as output the matrix A × B ∈ Fα×δ.
mad This job performs a matrix multiplication followed by a matrix addition. It takes
as input matrices A ∈ Fα×δ and B ∈ Fα×β and C ∈ Fβ×δ and returns the matrix
A + B × C ∈ Fα×δ.
ech This job performs an echelonisation as described in Remark 2.3. We will refer to
the job as
(M, K, R, ρ, γ) := ECH(H).
cex This job performs two column extracts. It takes as input a matrix H ∈ Fα×β and
a subset γ ⊆ {1, . . . , β} and returns the matrices H × γtr and H × γtr, consisting
of all those columns of H whose indices lie in γ, respectively do not lie in γ, as
described in Definition 2.1.
rex This job performs two row extracts. It takes as input a matrix H ∈ Fα×β and a
subset ρ ⊆ {1, . . . , α} and returns the matrices ρ × H and ρ × H, consisting of all
those rows of H whose indices lie in ρ, respectively do not lie in ρ, as described in
Definition 2.1.
unh This job performs a union plus history. It takes as input a subset ρ1 ⊆ {1, . . . , α}
and, for α0 = α−ρ1, a subset ρ2 ⊆ {1, . . . , α0} and returns a subset ρ ⊆ {1, . . . , α}
defined as follows. Write {1, . . . , α} \ ρ1 = {x1, . . . , xα0}. Define
ρ = ρ1 ∪ {xi i ∈ ρ2} =: {y1, . . . , yr}
as an ordered set. Then u ∈ {0, 1}r with u(cid:96) = 0 if y(cid:96) ∈ ρ1 and u(cid:96) = 1 otherwise.
We refer to this job as
(ρ, u) := UNH(ρ1, ρ2).
un0 This job does the same as unh except that the first input set of unh is omitted
and assumed empty.
15
mkr It takes two sets ρ1 ⊆ ρ2 and produces a bitstring λ ⊆ {0, 1}ρ2 with 1s corre-
sponding to the elements in ρ1 and 0s corresponding to the elements in ρ2\ρ1.
rrf This job performs a row riffle. The input consists of a bit string u ∈ {0, 1}r and
two matrices B ∈ Fα×β and C ∈ Fγ×β with α + γ = r, where the number of 0s in
u is α and the number of 1s in u is γ. The job returns the new matrix A ∈ Fr×b
whose rows are the rows of B and C combined according to u. In some sense this
is the inverse of row extract.
crz Similarly to row riffles we also need column riffles, but we only need to riffle in zero
columns.
adi It takes as input a matrix K ∈ Fα×β and a bitstring δ ∈ {0, 1}β and puts Ki,ji := 1
if ji is the position of the ith 0 in δ. Note that combining crz with adi allows us
to riffle in columns of the identity matrix.
4.2 The tasks
We now describe the tasks on which our Gaussian elimination algorithm depends. As
mentioned above, a task receives data packages as input, which in turn may consist of
several components, and returns data packages as output.
Definition 4.1. A data package is a record of one or several components. A data package
is called ready (for a given scheduler) if the task that produces it as output has finished,
regardless whether this task has computed all its components. If there is no task having
this data package as an output, then we also consider it ready.
Example: Task UpdateRow.
If called with the parameter i = 1 the task UpdateRow can start, even though the com-
ponent A.A of the data package A has not been computed, after the task ClearDown
for i = 1 has completed. Note that for i = 1, no job in the task UpdateRow takes the
jk is an input to UpdateRow
component A.A as an input. Also the data package B0
but not computed by any task in the Chief. So therefore it is also considered ready.
Task 1: Extend
Input : A = (A, M, K, ρ(cid:48), E, λ), E = (ρ, δ) with ρ ⊂ {1, . . . , α}, δ a riffle, j
Output: E.
j = 1
j (cid:54)= 1
(E.ρ, E.δ) := UN0(A.ρ(cid:48));
(E.ρ, E.δ) := UNH(E.ρ, A.ρ(cid:48));
(UN0):
(UNH):
16
Task 2: RowLengthen
Input : M ∈ Fα×g1, E1.ρ ⊆ E2.ρ ⊆ {1, . . . , α} of sizes g1, g2 with g1 ≤ g2.
Output: M ∈ Fα×g2.
(MKR): λ := MKR(E1.ρ, E2.ρ);
(CRZ): M := CRZ(M, λ);
Task 3: ClearUp
Input : R ∈ Fα×β, X ∈ Fα×γ, M ∈ Fγ×β.
Output: R ∈ Fα×β.
(MAD): R := R + X × M;
Task 4: PreClearUp
Input : B ∈ Fα×β, D, with D.γ ⊆ {1, . . . , β} of cardinality g.
Output: X ∈ Fα×g, R ∈ Fα×(β−g).
(CEX): X := B × D.γtr; R := B × D.γ
tr;
Task 5: Copy
Input : D, with D.R ∈ Fα×β.
Output: R ∈ Fα×β.
(CPY): R := D.R;
4.2.1 Task ClearDown
Task ClearDown works on block columns. Suppose that j ∈ {1, . . . , b} and ClearDown
works on block column j which contains bj columns. Task ClearDown assumes that
block column j truncated after row i − 1 is in row echelon form and the aim of task
ClearDown is to replace the block column j truncated after row i by its row echelon
form.
Task ClearDown takes two data packages C and D as input. The first data package
C is the block Cij which is the block in the i-th block row of block column j. The second
data set D contains two data elements. The data element D.R is a matrix such that
block column j truncated after block row i−1 is in row echelon form (−1 D.R) followed
by 0 rows. The data element D.γ ⊆ {1, . . . , bj} contains indices of the pivots assembled
in block column j truncated after block row i − 1.
The task produces two data packages A and D as outputs. The data elements stored
in the data package A are required to propagate row operations performed during the
17
call to Task UpdateRow to other blocks in block row i. The data elements stored in
the data package D are required for a subsequent call to ClearDown for the block
Ci+1,j in block column j.
We begin by partitioning the input block C according to D.γ into pivotal and non
pivotal columns C = (A.A A(cid:48)). Using the rows of the matrix (−1 D.R) we can reduce
C to (0 H(cid:48)) where H(cid:48) = A(cid:48) +A.A×D.R. The next step is to call job ECH to echelonise
H(cid:48) and obtain
(A.M, A.K, R, A.ρ(cid:48), γ(cid:48)) := ECH(H(cid:48)),
where A.ρ(cid:48) is the set of pivotal rows of H(cid:48) and γ(cid:48) the set of pivotal columns.
As block column j truncated after block row i−1 is in row echelon form (−1r×r D.R)
followed by 0 rows, we now wish to determine a new remnant matrix R (which will become
the new D.R) such that block column j truncated after block row i is in row echelon
form (−1(r+r(cid:48))×(r+r(cid:48)) R) followed by 0 rows. To achieve this, the we have to add the r(cid:48)
pivots of H(cid:48) to −1r×r and reduce D.R according to (−1r(cid:48)×r(cid:48) R). This amounts to first
separating the columns of D.R into those containing pivot entries of H(cid:48) and those that
do not, i.e. writing D.R = (A.E R(cid:48)) with the help of the row select and row non-select
matrices γ(cid:48) and γ(cid:48). We then use the rows of the matrix (−1r(cid:48)×r(cid:48) R) to reduce D.R to
(0 R(cid:48) +A.E×D.R). The new set D.γ of all pivotal columns of block column j truncated
after block row i is now obtained by combining the old set D.γ and γ(cid:48). We record in
A.λ the information which of these indices came from the r(cid:48) pivots of H(cid:48). Finally, the
new remnant R is obtained by interleaving the rows of R(cid:48) + A.E× R with the rows of R
according to A.λ and storing the resulting matrix as the new D.R.
The following pseudo code details Task ClearDown:
Task 6: ClearDown
Input : C ∈ Fα×β, D.γ ⊆ {1, . . . , β} of cardinality r, D.R ∈ Fr×(β−r), i;
Output: D.R ∈ F(r+r(cid:48))×(β−r−r(cid:48)), D.γ ⊆ {1, . . . , β} of cardinality r + r(cid:48) and
A = (A, M, K, ρ(cid:48), E, λ) where A ∈ Fα×r, M ∈ Fr(cid:48)×r(cid:48), E ∈ Fr×r(cid:48),
K ∈ F(α−r(cid:48))×r(cid:48), ρ(cid:48) ⊆ {1, . . . , α − r} of cardinality r(cid:48), λ ∈ {0, 1}r+r(cid:48).
if i = 1 then
else
(ECH):
(A.M, A.K, D.R, A.ρ(cid:48), D.γ) := ECH(C);
tr;
(CEX): A.A := C × D.γtr; A(cid:48) := C × D.γ
(MAD): H := A(cid:48) + A.A × D.R;
(A.M, A.K, R, A.ρ(cid:48), γ(cid:48)) := ECH(H);
(ECH):
(CEX): A.E := D.R × (γ(cid:48))tr, R(cid:48) := D.R × (γ(cid:48))tr;
(MAD): R(cid:48) := R(cid:48) + A.E × R;
(UNH):
(RRF): D.R := RRF(A.λ, R(cid:48), R);
(D.γ, A.λ) := UNH(D.γ, γ(cid:48));
end
18
4.2.2 Task UpdateRow
Given i ∈ {1, . . . , a}, the Task UpdateRow works on block C = Cik in block row i and
block column k. It takes as input data packages A, C and B, where the data package
A encodes the necessary information computed by ClearDown when transforming an
earlier block in the same block row i into echelon form.
The same row operations that were performed on this earlier block now need to be
performed on C. This subroutine also assembles in the matrix B the rows in block
column k whose pivotal entry lies in block column j for j + 1 ≤ k ≤ b. The new
data package C returned by Tasks UpdateRow then is equal to the transformed input
matrix C with these rows deleted.
The following pseudo code details Task UpdateRow:
Task 7: UpdateRow
Input : A = (A, M, K, ρ(cid:48), E, λ), C ∈ Fα×β, B ∈ Fr×β, i.
Output: C ∈ F(α−r(cid:48))×β, B ∈ F(r+r(cid:48))×β.
(1)
i (cid:54)= 1
i = 1
always
always
i (cid:54)= 1
i (cid:54)= 1
i = 1
always
(MAD): Z := C + A.A × B;
(CPY): Z := C;
(REX): V := A.ρ(cid:48) × Z; and W := A.ρ(cid:48) × Z;
(MUL): X := A.M × V ;
(MAD): S := B + A.E × X;
(RRF): B := RRF(A.λ, S, X);
(CPY): B := X;
(MAD): C := W + A.K × V ;
(2)
(3)
(4)
(5)
(6)
Remark 4.2. In the case i = 1 in Task UpdateRow we work with the first block row.
Therefore we do not need to perform the upwards cleaning on the data package C and
the data package B is initialized accordingly. Note that for i = 1 the task ClearDown
did not compute the components A.A, A.E and A.λ and also the input data package B
of UpdateRow is not present.
4.2.3 Task UpdateRowTrafo
If one is not too concerned about performance, then it would be possible to generate
an identity matrix K and apply the UpdateRow task replacing C by K and B by M
to mimic the relevant row operations performed to obtain the transformation matrix M
and the cleaner matrix K. This would result in a lot of needless work performed on zero
or identity matrices. The main difference is that we never store any columns known to
belong to an identity or a zero matrix. Instead we insert these columns just before they
are needed. Moreover, we never add a matrix known to be zero or multiply by a matrix
known to be the identity.
As a result, we require a separate procedure, UpdateRowTrafo, to mimic the
row operations on the transformation matrix. UpdateRowTrafo still performs the
19
same steps as UpdateRow, identified by the same numbers, however it requires some
additional steps, indicated by the symbol + in the first column and which insert some
unstored columns into the matrix K. The various instances of a given step are due to
the fact that we can often avoid unnecessary work. In particular, UpdateRowTrafo
takes as an additional input the integers i, j, h, with h ≤ i. The integer i indicates the
current block row and h the current block column, on which to mimic the row operations
performed during UpdateRow on block row i. If j > 1 then we already computed some
input K into which we need to riffle in zero (if i (cid:54)= h) or the relevant columns of the
identity matrix (if i = h). It turns out that it is easier to always riffle in zero (the first
line marked with +) and mimic the special case i = h by adding the correct 0/1 matrix
to V later in the other line marked with +. If j = 1 then we should initialise K with
zero (if i (cid:54)= h) or the relevant columns of the identity matrix (if i = h). As we only need
the input K to define V and W in line (2), we mimic this by remembering that W = 0
in this case and V is either 0 (if i (cid:54)= h) or the identity matrix if i = h. So for j = 1 and
h = i we omit the multiplication by the identity in lines (3) and (6).
that h ≤ i, this only happens if h = i = 1.
If i = 1 again Remark 4.2 applies accordingly to line (4). Note that due to the fact
In the following pseudo code describing Task UpdateRowTrafo we indicate in the
last column which unstored matrices are implicitly known to be 0 or the identity 1.
20
Task 8: UpdateRowTrafo
Input : A = (A, M, K, ρ(cid:48), E, λ), K ∈ Fα×β, M ∈ Fr×β(cid:48), E = (ρ, δ), i, h, j.
Output: K ∈ F(α−r(cid:48))×(β+δ), M ∈ F(r+r(cid:48))×β(cid:48).
command
−
remark
K is 0
job
(CRZ): K := CRZ(K, E.δ);
(MAD): Z := K + A.A × M;
(MUL): Z := A.A × M;
(CPY): Z := K;
−
(REX): V := A.ρ(cid:48) × Z;
W := A.ρ(cid:48) × Z;
−
V := ADI(V, E.δ);
−
(ADI):
(MUL): X := A.M × V ;
(CPY): X := A.M
(MAD): S := M + A.E × X;
(MUL): S := A.E × X;
−
case
+ j (cid:54)= 1
j = 1
(1) h (cid:54)= i, j (cid:54)= 1
h (cid:54)= i, j = 1
h = i, j (cid:54)= 1
h = i, j = 1
(2) ¬(j = 1 ∧ h = i)
j = 1 ∧ h = i
+ j (cid:54)= 1 ∧ h = i
j = 1 ∧ h = i
(3) ¬(j = 1 ∧ h = i)
j = 1 ∧ h = i
(4) h (cid:54)= i
h = i (cid:54)= 1
h = i = 1
(5) ¬(h = i = 1)
(6) ¬(j = 1 ∧ h = i)
h = i = 1
j = 1 ∧ h = i
K is 0
M is 0
Z is 0
V , W are 0
V is 1
V is 1
M is 0
S no rows
S no rows
V is 1, W is 0
(RRF): M := RRF(A.λ, S, X);
(CPY): M := X;
(MAD): K := W + A.K × V ;
(CPY): K := A.K;
5 Concurrency analysis
To measure the degree of concurrency of our algorithm we assign costs to each of the
tasks. We perform a relative analysis, comparing the cost of a parallel Gauss algorithm
with the cost of a sequential algorithm. Therefore, to simplify our analysis, we assume
that the cost of a matrix multiplication of (α× β)· (β × γ) possibly followed by addition
is αβγ and the cost of echelonising an α × β matrix of rank r is αβr. It seems plausible
that when assuming that these costs are homogeneous functions of some degree, bounded
below by ω (see [4, Chapter 16]), then in the results of Proposition 5.3 and Theorem 5.4
the degree of concurrency can be replaced by some constant times aω−1. We also assume
that all blocks are square matrices of size α × α, where α is not too small and
α =
=
n
a
m
b
.
Then the tasks Extend, RowLengthen, PreClearUp, and Copy do not perform
any time consuming operations (compared to ClearDown and UpdateRow), so we
assign cost 0 to these tasks.
21
↓(i, j-1)
→(i, j-1, j)
↓(i-1, j)
→(i-1, j, k)
→(i, j-1, k)
↓(i, j)
→(i, j, k)
Figure 1: Extract of task dependency graph
Lemma 5.1. The cost of ClearDown is bounded above by α3 and the cost of Up-
dateRow is bounded above by 1.25α3.
Proof. We start analysing the task ClearDown: For i = 1 only one job ECH is
performed contributing cost α3. Otherwise the first call of MAD multiplies a matrix
A.A of size α× r with a matrix D.R of size r× (α− r), contributing cost αr(α− r). The
echelonisation is done on an α×(α−r) matrix of rank r(cid:48) and the second MAD multiplies
an r × r(cid:48) matrix by an r(cid:48) × (α − r − r(cid:48)) matrix. So in total the cost of ClearDown is
αr(α − r) + α(α − r)r(cid:48) + rr(cid:48)(α − r − r(cid:48)) = α2(r + r(cid:48)) − rr(cid:48)(α + r + r(cid:48)) ≤ α3
as r + r(cid:48) ≤ α.
For the task UpdateRow we similarly obtain the cost αrα for the MAD in row (1),
r(cid:48)r(cid:48)α for the MUL in row (3), rr(cid:48)α for the MAD in row (4), and (α− r(cid:48))r(cid:48)α for the MAD
in row (6). Summing up we obtain
α2(r + r(cid:48)) + αrr(cid:48) ≤ 1.25α3
again since r + r(cid:48) ≤ α.
Ignoring all tasks of cost 0 Step 1 only involves the tasks ClearDown and Up-
dateRow. The graph of task dependencies decomposes naturally into layers accord-
ij, Di−1
ing to the value of i + j. We abbreviate the call ClearDown(Cj
, i) with data
packages depending on i, j by ↓(i, j) and similarly UpdateRow(Aij, Cj
ik, Bi−1
jk , i) by
→(i, j, k).Then Figure 1 displays the local task dependencies in Step 1 for layers i + j − 1
and i + j, where k = j + 1, . . . , b.
j
Recall that a critical path in a task dependency graph is the longest directed path
between any pair of start node and finish node. Its length is weighted by the cost of the
nodes along the path.
22
Proposition 5.2.
1. The weighted length of a critical path in the task dependency
graph of Step 1 is 2.25α3(a + b − 1).
2. The weighted length of a critical path in Step 3 is max((b − 1)α3, aα3).
Proof. 1.) The task dependency graph splits naturally into a + b − 1 layers according
to the value of i + j ∈ {2, . . . , a + b}. Within each layer, the critical paths involve
ClearDown and UpdateRow exactly once. So in total the length of a critical path
is (a + b − 1)(α3 + 1.25α3).
2.) Step 3 only involves the task ClearUp of non-zero cost α3. The data package
Rjh is only changed by the data packages below in the same column so h − j times.
The maximum of h − j is achieved at R1b contributing the cost α3(b − 1). For the
transformation matrix, which can be done independently, each of the Mjh is touched a
times contributing aα3.
To determine the average degree of concurrency we divide the cost of the sequential
Gaussalgorithm (with transformation matrix) applied to the m×n-matrix ClearDown
by the weighted length of a critical path. For simplicity we assume that m = n, a = b
and that all blocks are of the same size α × β with α = β.
Proposition 5.3. Under the assumptions above and using Lemma 5.1 the average degree
of concurrency of the Chief is 1
Proof. By our assumptions n = m and the cost of the sequential Gaussalgorithm (with
transformation matrix) applied to the huge matrix ClearDown is n3 = a3α3. By
Proposition 5.2 the weighted length of a critical path in the complete algorithm the
Chief is (2.25(2a − 1) + a)α3 = (5.5a − 2.25)α3 ∼ 5.5aα3.
5.5a2.
In practical examples the gain of performance is much better. This is partly due
to the fact that we split our matrix into blocks that fit into the computer's memory;
an echelonisation of the huge matrix, however, would require to permanently read and
write data to the hard disk. The other reason is that in random examples the length
of a critical path is much shorter. To make this precise we assume, in addition to the
assumptions above of starting with a square matrix partitioned into square blocks of
equal size α, that our input matrix is well-conditioned, by which we mean that the a
top-left square submatrices of the input matrix of size jα (j = 1, . . . , a) have full rank.
Then, properly implemented, the cost of ClearDown is α3, if it is called for i = j
and 0 otherwise. Also in Update Row r(cid:48) = 0 and so the cost of Update Row is α3
(this can be shown without using the assumptions in Lemma 5.1). In particular in the
dependency graph above, the weighted length of a critical path in any odd layer is α3
and in an even layer, this length is 2α3 (resp. α3 for the last layer). In total this shows
the following
Theorem 5.4. For a well-conditioned square matrix, the length of a critical path in
the dependency graph is α3(3a − 2) and hence the average degree of concurrency of the
Chief is 1
3a2.
23
Remark 5.5. The concurrency analysis above is not sufficient to ensure the effective
use of all processors throughout the entire run that we see in the experimental results
below.
Although the steps are estimated at their worst case in practice many tasks early in the
task dependency graph execute a lot faster. Provided there are sufficiently many blocks,
enough work is available for execution considerably earlier than the task dependency graph
might suggest. Assigning a priority i + j to a task pertaining to the i-th row and j-th
column directs an appropriate scheduling.
6 Experimental results
We give timings for the two implementations mentioned in Section 2.1.
The Meataxe
In order to demonstrate the power of this algorithm the following tests were done on a
machine with 64-piledriver cores with 512 GB of memory running at 2.7 gigaherz.
We chose as our first example a random 1, 000, 000 × 1, 000, 000-matrix with entries
in the field of order 2. To put this matrix into reduced echelon form with transformation
matrix we chose to chop the matrix into blocks of size 50, 000 × 50, 000. This run took
520min.
The following graph shows the progress of the calculation. The red shows that over
60 cores were used for the vast majority of the time. The blue shows that during Steps 1
and 2 the memory footprint was fairly constant but at the transition to Step 3 about
30% more memory was needed, due mainly to the expansion of the matrix M.
For a second example, on the same machine, we echelonised with transformation
matrix a random 600, 000 × 600, 000-matrix with entries in the field of order 3 in 460
min, using a block size of 30, 000. We do not give a graph for this run, as it is almost
indistinguishable from the one given above.
24
0 10 20 30 40 50 60 70 0 100 200 300 400 500 600 0 50 100 150 200 250CPUsGBElapsed Time(min)CPU usagememory usage (GB)The above examples were done with a carefully chosen block size. The following two
examples highlight the effect of too large a block size. We echelonised the same random
300, 000 × 300, 000-matrix with entries in the field of order 3 using block sizes of 30, 000
and 15, 000, respectively. In the first graph we see that 15, 000 is again a good choice of
block size. Almost all cores are used for most of the time. In the second graph we see
that 30, 000 is too large a block size, so that the 64 available cores are seldomly utilised
at once, leading to a run time which is about 50% longer.
Note that in general terms the necessary block size agrees with the concurrency
analysis.
Our final three examples are intended to demonstrate that our methods are not
restricted to tiny fields, nor to prime fields. A random 200, 000 × 200, 000-matrix with
entries in the field with 193 took 445 mins, a random 200, 000 × 200, 000-matrix with
entries in the field with 1331 = 113 took 615 mins, and a random 100, 000 × 100, 000-
matrix with entries in the field 50653 = 373 elements took 200 mins.
7 Acknowledgements
We thank Martin Albrecht for discussions in the early stages of the algorithm design.
The first full implementation of this algorithm was developed by Jendrik Brachter in
GAP [8] which was essential to getting the details of the algorithm right. A parallel
version of this implementation, using HPC-GAP, was produced by Jendrik Brachter and
Sergio Siccha.
The second and third author acknowledge the support of the SFB-TR 195.
References
[1] Martin R. Albrecht The M4RIE library for dense linear algebra over small fields with
even characteristic. ISSAC 2012-Proceedings of the 37th International Symposium
on Symbolic and Algebraic Computation, 28–34, ACM, New York, 2012.
25
0 10 20 30 40 50 60 70 0 10 20 30 40 50 60 70 5 10 15 20 25 30 35 40CPUsGBElapsed Time(min)CPU usagememory usage (GB) 0 10 20 30 40 50 60 70 0 10 20 30 40 50 60 70 80 90 100 5 10 15 20 25 30 35 40 45 50 55 60CPUsGBElapsed Time(min)CPU usagememory usage (GB)[2] Martin Albrecht and Gregory Bard and William Hart. Algorithm 898: Efficient
multiplication of dense matrices over GF (2) ACM Transactions on Mathematical
Software (TOMS) 37 (1), Article 9, 2010.
[3] Martin Albrecht et al.,Linear Algebra over F2 (and F2e)
https://malb.bitbucket.io/m4ri-e-website-2008-2015/further.html
[4] Peter Bürgisser and Michael Clausen and M. Amin Shokrollahi, Algebraic complexity
theory. With the collaboration of Thomas Lickteig. Grundlehren der Mathematis-
chen Wissenschaften 315. Springer-Verlag, Berlin, 1997.
[5] T.H. Cormen, C.E. Leiserson, R.L. Rivest, C. Stein, Introduction to Algorithms.
(Second ed.), The MIT Press, Cambridge, Massachusetts, London McGraw-Hill
Book Company, Boston Burr Ridge, IL Dubuque, IA Madison, WI New York San
Francisco St. Louis Montreal Toronto, (2001).
[6] Simplice Donfack and Jack Dongarra and Mathieu Faverge and Mark Gates and
Jakub Kurzak and Piotr Luszczek and Ichitaro Yamazaki, A survey of recent de-
velopments in parallel implementations of Gaussian elimination. Concurrency and
Computat.: Pract. Exper. (2014). DOI: 10.1002/cpe.3306
[7] Jean-Guillaume Dumas, Pascal Giorgi and Clément Pernet, Dense Linear Algebra
over Word-Size Prime Fields: the FFLAS and FFPACK Packages. ACM Trans. on
Mathematical Software (TOMS) 35(3), ACM Press, NY, USA, (2008), 1–42. DOI:
10.1145/1391989.1391992
[8] The GAP Group, GAP – Groups, Algorithms, and Programming, Version 4.9.1;
2018. (https://www.gap-system.org)
[9] Joseph F. Grcar, Mathematicians of Gaussian elimination. Notices Amer. Math.
Soc. 58 (6), (2011), 782–792.
[10] Richard Parker, Meataxe64 Blog, https://meataxe64.wordpress.com
[11] PLASMA software package for
http://icl.cs.utk.edu/plasma/
solving problems
in dense linear algebra.
26
|
1604.01391 | 2 | 1604 | 2017-02-24T07:44:55 | Poisson Centralizer of the Trace | [
"math.RA",
"math.QA"
] | The Poisson centralizer of the trace element is determined in the coordinate ring of SL_n endowed with the Poisson structure obtained as the semiclassical limit of its quantized coordinate ring. It turns out that this maximal Poisson-commutative subalgebra coincides with the subalgebra of invariants with respect to the adjoint action. | math.RA | math |
POISSON CENTRALIZER OF THE TRACE
SZABOLCS MÉSZÁROS
Abstract. The Poisson centralizer of the trace element Pi
xi,i is determined
in the coordinate ring of SLn endowed with the Poisson structure obtained
as the semiclassical limit of its quantized coordinate ring. It turns out that
this maximal Poisson-commutative subalgebra coincides with the subalgebra
of invariants with respect to the adjoint action.
1. Introduction
The semiclassical limit Poisson structure on O(SLn) received considerable atten-
tion recently because of the connection between the primitive ideals of the quantized
coordinate ring Oq(SLn) and the symplectic leaves of the Poisson manifold SLn
(see for example [HL2],[G],[Y]). In this paper, we present another relation between
O(SLn) endowed with the semiclassical limit Poisson structure and Oq(SLn).
the trace element σ1 = Pi xi,i in Oq(SLn) (resp.
In [M] it was shown that if q ∈ C× is not a root of unity then the centralizer of
in Oq(Mn) and Oq(GLn)) is a
maximal commutative subalgebra, generated by certain sums of principal quantum
minors. By Theorem 2.4 and 5.1 in [DL2], this subalgebra coincides with the
subalgebra of cocommutative elements in Oq(SLn) and also with the subalgebra of
invariants of the adjoint coaction. (This result is generalized in [AZ] for arbitrary
characteristic and q being a root of unity.)
On the Poisson algebra side, the corresponding Poisson-subalgebra of O(SLn)
is generated by the coefficients of the characteristic polynomial c1, . . . , cn−1. We
prove the following:
Theorem 1.1. For n ≥ 1 the subalgebra C[c1, . . . , cn−1] (resp. C[c1, . . . , cn] and
C[c1, . . . , cn, c−1
n ]) is maximal Poisson-commutative in O(SLn) (resp. O(Mn) and
O(GLn)) with respect to the semiclassical limit Poisson structure.
It is easy to deduce from [DL1] or [DL2] that {ci, cj} = 0 (1 ≤ i, j ≤ n) in O(Mn)
(see Proposition 5.1 below). Therefore, Theorem 1.1 is a direct consequence of the
following statement:
Theorem 1.2. For n ≥ 1 the Poisson-centralizer of c1 in O(SLn) (resp. c1 ∈
O(Mn) and O(GLn)) equipped with the semiclassical limit Poisson bracket is gen-
erated as a subalgebra by
• c1, . . . cn−1 in the case of O(SLn),
• c1, . . . , cn in the case of O(Mn), and
• c1, . . . , cn, c−1
n in the case of O(GLn).
2010 Mathematics Subject Classification. 16T20, 17B63 (primary), 16W70, 20G42 (secondary).
Keywords. Quantized coordinate ring, semiclassical limit, Poisson algebra, complete involutive
system, maximal Poisson-commutative subalgebra.
1
Poisson Centralizer of the Trace
Szabolcs Mészáros
The proof is based on modifying the Poisson bracket of the algebras that makes
an induction possible. A similar idea is used in the proof of the analogous result in
the quantum setup (see [M]).
It is well known that the coefficient functions c1, . . . , cn ∈ O(Mn) of the char-
acteristic polynomial generate the subalgebra O(Mn)GLn of GLn-invariants with
respect to the adjoint action. This implies that the subalgebra coincides with the
Poisson center of the coordinate ring O(Mn) endowed with the Kirillov-Kostant-
Souriau (KKS) Poisson bracket. Hence, Theorem 1.1 for O(Mn) can be interpreted
as an interesting interplay between the KKS and the semiclassical limit Poisson
structure. Namely, while the subalgebra O(Mn)GLn is contained in every maxi-
mal Poisson-commutative subalgebra with respect to the former Poisson bracket,
it is contained in only one maximal Poisson-commutative subalgebra (itself) with
respect to the latter Poisson bracket.
A Poisson-commutative subalgebra is also called an involutive (or Hamiltonian)
system, while a maximal one is called a complete involutive system (see Section 2
or [V]). Such a system is integrable if the (Krull) dimension of the generated sub-
algebra is sufficiently large. In our case, the subalgebra generated by the elements
c1, . . . , cn−1 is not integrable, as its dimension is n − 1 (resp. n for GLn) instead
The article is organized as follows: First, we introduce the required notions, and
in Section 3 we prove that the three statements in Theorem 1.2 are equivalent.
In Section 3.1, we prove Theorem 1.2 for n = 2 as a starting case of an induction
presented in Section 5 that completes the proof of the theorem. In the article, every
algebra is understood over the field C.
of the required (cid:0)n+1
2 (cid:1) − 1 (resp. (cid:0)n+1
2 (cid:1) for GLn), see Remark 5.3.
2. Preliminaries
2.1. Poisson algebras. First, we collect the basic notions about Poisson algebras
we use in the article. For further details about Poisson algebras, see [V].
A commutative Poisson algebra (cid:0)A, {., .}(cid:1) is a unital commutative associative
algebra A together with a bilinear operation {., .} : A × A → A called the Poisson
bracket such that it is antisymmetric, satisfies the Jacobi identity, and for any
a ∈ A, {a, .} : A → A is a derivation. For commutative Poisson algebras A and
B, the map ϕ : A → B is a morphism of Poisson algebras if it is both an algebra
homomorphism and a Lie-homomorphism.
There is a natural notion of Poisson subalgebra (i.e. a subalgebra that is also
a Lie-subalgebra), Poisson ideal (i.e an ideal that is also a Lie-ideal) and quotient
Poisson algebra (as the quotient Lie-algebra inherits the bracket). The Poisson
centralizer C(a) of an element a ∈ A is defined as {b ∈ A {a, b} = 0}. Clearly, it is
a Poisson subalgebra. Analogously, a ∈ A is called Poisson-central if C(a) = A. One
says that a subalgebra C ≤ A is Poisson-commutative (or involutive) if {c, d} = 0
for all c, d ∈ C and it is maximal Poisson-commutative (or maximal involutive) if
there is no Poisson-commutative subalgebra in A that strictly contains C.
The Poisson center (or Casimir subalgebra) of A is Z(A) := {a ∈ A C(a) =
A}. Let A be a reduced, finitely generated commutative Poisson algebra. The
rank Rk{., .} of the Poisson structure {., .} is defined by the rank of the matrix
(cid:0){gi, gj})i,j ∈ AN ×N for a generating system g1, . . . , gN ∈ A. (One can prove that it
is independent of the chosen generating system.) A maximal Poisson-commutative
2
Poisson Centralizer of the Trace
Szabolcs Mészáros
subalgebra C is called integrable if
dim C = dim A −
1
2
Rk{., .}
The inequality ≤ holds for any Poisson-commutative subalgebra (Proposition II.3.4
in [V]), hence integrability is a maximality condition on the size of C that does not
necessarily hold for every maximal involutive system.
2.2. Filtered Poisson algebras.
Definition 2.1. A filtered Poisson algebra is a Poisson algebra together with an
ascending chain of subspaces {F d}d∈N in A such that
• A = ∪d∈NF d,
• F d · F e ⊆ F d+e for all d, e ∈ N, and
• {F d, F e} ⊆ F d+e for all d, e ∈ N.
Together with the filtration preserving morphisms of Poisson algebras, they form a
category.
For a filtered Poisson algebra A, we may define its associated graded Poisson
algebra grA as
gr(A) :=Md∈N
F d/F d−1
where we used the simplifying notation F −1 = {0}. The multiplication of gr(A) is
defined the usual way:
F d/F d−1 × F e/F e−1 → F d+e/F d+e−1
(cid:0)x + F d−1, y + F e−1(cid:1) 7→ xy + F d+e−1
Analogously, the Poisson structure of gr(A) is defined by (cid:0)x + F d−1, y + F e−1(cid:1) 7→
{x, y} + F d+e−1. One can check that this way gr(A) is a Poisson algebra.
Let (S, +) be an abelian monoid. (We will only use this definition for S = N and
S = Z/nZ for some n ∈ N.) An S-graded Poisson algebra R is a Poisson algebra
together with a fixed grading
R = ⊕d∈SRd
such that R is both a graded algebra (i.e. Rd · Re ⊆ Rd+e for all d, e ∈ S) and a
graded Lie algebra (i.e. {Rd, Re} ⊆ Rd+e for all d, e ∈ S) with respect to the given
grading.
The above construction A 7→ gr(A) yields an N-graded Poisson algebra. In fact,
for a morphism of filtered Poisson algebras
gr(.) can be turned into a functor:
f :(cid:0)A, {F d}d∈N(cid:1) →(cid:0)B, {Gd}d∈N(cid:1) we define
gr(f ) : gr(A) → gr(B)
One can check that it is indeed well defined and preserves composition.
(cid:0)xd + F d−1(cid:1)d∈N 7→(cid:0)f (xd) + Gd−1(cid:1)d∈N
Remark 2.2. Given an N-graded Poisson algebra R = ⊕d∈NRd, one has a natural
way to associate a filtered Poisson algebra to it. Namely, let F d := ⊕k≤dRk. In
this case, the associated graded Poisson algebra grR of(cid:0)R, {F d}d∈N(cid:1) is isomorphic
to R.
3
Poisson Centralizer of the Trace
Szabolcs Mészáros
2.3. The Kirillov-Kostant-Souriau bracket. A classical example of a Poisson
algebra is given by the Kirillov-Kostant-Souriau (KKS) bracket on O(g∗), the coor-
dinate ring of the dual of a finite-dimensional (real or complex) Lie algebra(cid:0)g, [., .](cid:1)
(see [ChP] Example 1.1.3, or [W] Section 3).
It is defined as follows: a function f ∈ O(g∗) at a point v ∈ g∗ has a differential
0 g∗ ∼= g∗∗ ∼= g.
v g∗ where we can canonically identify the spaces T ∗
dfv ∈ T ∗
Hence, we may define the Poisson bracket on O(g∗) as
v g∗ ∼= T ∗
{f, g}(v) := [dfv, dgv](v)
for all f, g ∈ O(g∗) and v ∈ g∗. It is clear that it is a Lie-bracket but it can be
checked that the Leibniz-identity is also satisfied. For g = gln, it gives a Poisson
bracket on O(Mn).
Alternatively, one can define this Poisson structure via semiclassical limits.
2.4. Semiclassical limits. Let A = ∪d∈ZAd be a Z-filtered algebra such that its
associated graded algebra gr(A) := ⊕d∈ZAd/Ad−1 is commutative. The Rees ring
of A is defined as
Rees(A) :=Md∈Z
Adhd ⊆ A[h, h−1]
Using the obvious multiplication, it is a Z-graded algebra. The semiclassical limit
of A is the Poisson algebra Rees(A)/hRees(A) together with the bracket
{a + hAm, b + hAn} :=
1
h
[a, b] + An+m−2 ∈ An+m−1/An+m−2
for all homogeneous elements a + hAm ∈ Am+1/hAm, b + hAn ∈ An+1/hAn. The
definition is valid as the underlying algebra of Rees(A)/hRees(A) is gr(A) that is
assumed to be commutative, hence [a, b] ∈ hAm+n−1.
The Poisson algebra O(g∗) with the KKS bracket can be obtained as the semi-
classical limit of U g, see [G], Example 2.6.
2.5. Quantized coordinate rings. Assume that n ∈ N+ and define Ot(Mn) as
the unital C-algebra generated by the n2 generators xi,j for 1 ≤ i, j ≤ n over
C[t, t−1] that are subject to the following relations:
xi,j xk,l =
xk,lxi,j + (t − t−1)xi,lxk,j
txk,lxi,j
xk,lxi,j
if i < k and j < l
if (i = k and j < l) or (j = l and i < k)
if (i > k and j < l) or (j > l and i < k)
It turns out to be a finitely generated C[t, t−1]-algebra
for all 1 ≤ i, j, k, l ≤ n.
that is a Noetherian domain. (For a detailed exposition, see [BG].) Furthermore, it
can be endowed with a coalgebra structure by setting ε(xi,j) = δi,j and ∆(xi,j ) =
k=1 xi,k ⊗ xk,j . It turns Ot(Mn) into a bialgebra.
For q ∈ C×, the quantized coordinate ring of n × n matrices with parameter q is
Pn
defined as the C-algebra
Oq(Mn) := Ot(Mn)/(t − q)
In this article, we only deal with the case when q is not a root of unity, then the
algebra is called the generic quantized coordinate ring of Mn.
Similarly, one can define the non-commutative deformations of the coordinate
rings of GLn and SLn using the quantum determinant
4
Poisson Centralizer of the Trace
Szabolcs Mészáros
detq := Xs∈Sn
(−q)ℓ(s)x1,s(1)x2,s(2) . . . xn,s(n)
where ℓ(σ) stands for the length of σ in the Coxeter group Sn. Then -- analogously
to the classical case -- one defines
Oq(SLn) := Oq(Mn)/(detq − 1)
by localizing at the central element detq.
Oq(GLn) := Oq(Mn)(cid:2)det−1
q (cid:3)
2.6. Semiclassical limits of quantized coordinate rings. The semiclassical
limits of Oq(SLn) can be obtained via the slight modification of process of Section
2.4 (see [G], Example 2.2). The algebra R := Ot(Mn) can be endowed with a Z-
filtration by defining F n to be the span of monomials that are the product of at most
n variables. However, instead of defining a Poisson structure on Rees(R)/hRees(R)
with respect to this filtration, consider the algebra R/(t − 1)R that is isomorphic
to O(Mn) as an algebra. The semiclassical limit Poisson bracket is defined as
{¯a, ¯b} :=
1
t − 1
(ab − ba) + (t − 1)R ∈ R/(t − 1)R
for any two representing elements a, b ∈ R for ¯a, ¯b ∈ R/(t − 1)R. One can check
that it is a well-defined Poisson bracket.
This Poisson structure of O(Mn) can be given explicitly by the following rela-
tions:
{xi,j, xk,l} =
2xi,lxk,j
xi,j xk,l
0
if i < k and j < l
if (i = k and j < l) or (j = l and i < k)
otherwise
extended according to the Leibniz-rule (see [G]). It is a quadratic Poisson structure
in the sense of [V], Definition II.2.6. The semiclassical limit for GLn and SLn
is defined analogously using Oq(GLn) and Oq(SLn) or by localization (resp. by
taking quotient) at the Poisson central element det (resp. det − 1) in O(Mn).
2.7. Coefficients of the characteristic polynomial. Consider the characteristic
polynomial function Mn → C[x], A 7→ det(A − xI). Let us define the elements
c0, c1, . . . , cn ∈ O(Mn) as
n
det(A − xI) =
(−1)icixn−i
Xi=0
In particular, c0 = 1, c1 = tr and cn = det. Their images in O(SLn) ∼= O(Mn)/(det−
1) are denoted by c1, . . . , cn−1. If ambiguity may arise, we will write ci(A) for the
element corresponding to ci for an algebra A with a fixed isomorphism A ∼= O(Mk)
for some k.
The coefficient functions c1, . . . , cn can also be expressed via matrix minors as
follows: For I, J ⊆ {1, . . . , n}, I = (i1, . . . , ik) and J = (j1, . . . , jk) define
[I J] := Xs∈Sk
sgn(s)xi1 ,js(1) . . . xik ,js(k)
i.e. it is the determinant of the subalgebra generated by {xi,j}i∈I,j∈J that can be
identified with O(Mk). Then
5
Poisson Centralizer of the Trace
Szabolcs Mészáros
[I I] ∈ O(Mn)
ci = XI=i
for all 1 ≤ i ≤ n. It is well.known that c1, . . . , cn generate the same subalgebra of
O(Mn) as the trace functions A 7→ Tr(Ak), namely, the subalgebra O(Mn)GLn of
GLn-invariants with respect to the adjoint action.
3. Equivalence of the statements
Consider O(Mn) endowed with the semiclassical limits Poisson bracket. As it is
discussed in the Introduction, Theorem 1.1 follows directly from Theorem 1.2 and
Proposition 5.1.
The following proposition shows that it is enough to prove Theorem 1.2 for the
case of O(Mn).
Proposition 3.1. For any n ∈ N+ the following are equivalent:
(1) The Poisson-centralizer of c1 ∈ O(Mn) is generated by c1, . . . , cn.
(2) The Poisson-centralizer of c1 ∈ O(GLn) is generated by c1, . . . , cn, c−1
n .
(3) The Poisson-centralizer of c1 ∈ O(SLn) is generated by c1, . . . , cn−1.
Proof. The first and second statements are equivalent as det is a Poisson-central
element, so we have {c1, h · detk} = {c1, h} · detk for any h ∈ O(GLn) and k ∈ Z.
Hence,
proving 1) ⇐⇒ 2).
O(GLn) ⊇ C(c1) =(cid:0)O(Mn) ∩ C(c1)(cid:1)[det−1]
1) ⇐⇒ 3): First, assume 1) and let h ∈ O(SLn) such that {c1, h} = 0.
Since O(SLn) is Z/nZ-graded (inherited from the N-grading of O(Mn)) and c1 is
homogeneous with respect to this grading, its Poisson-centralizer is generated by
Z/nZ-homogeneous elements, so we may assume that h is Z/nZ-homogeneous.
Let k = deg(h) ∈ Z/nZ. Let h ∈ O(Mn) be a lift of h ∈ O(SLn) and consider the
j=0 hjn+k of h, where hjn+k is homogeneous
N-homogeneous decomposition h =Pd
of degree jn + k for all j ∈ N. Define
d
hjn+kdetd−j ∈ O(Mn)dn+k
h′ :=
Xj=0
that is a homogeneous element of degree dn + k representing h ∈ O(SLn) in
O(Mn). Then {c1, h′} ∈ (det −1) ∩ O(Mn)dn+k+1 since {c1, h′} = {c1, h} =
0, c1 is homogeneous of degree 1 and the Poisson-structure is graded. Clearly,
(det −1)∩O(Mn)dn+k+1 = 0 hence {c1, h′} = 0. Applying 1) gives h′ ∈ C[c1, . . . , cn]
so h ∈ C[c1, . . . , cn−1] as we claimed.
Conversely, assume 3) and let h ∈ O(Mn) such that {c1, h} = 0. Since c1 is
N-homogeneous, we may assume that h is also N-homogeneous and so the image
h ∈ O(SLn) of h is Z/nZ-homogeneous. By the assumption, h = p(c1, . . . , cn−1) for
some p ∈ C[t1, . . . , tn−1]. Endow C[t1, . . . , tn] with the N-grading deg(ti) = i. As h
is Z/nZ-homogeneous, we may choose p ∈ C[t1, . . . , tn−1] so that its homogeneous
components are all of degree dn + deg(h) ∈ N with respect to the above grading for
some d ∈ N.
By h − p(c1, . . . , cn−1) ∈ (det −1) and the assumptions on degrees, we may
choose a polynomial q ∈ C[t1, . . . , tn] that is homogeneous with respect to the above
6
Poisson Centralizer of the Trace
Szabolcs Mészáros
grading and q(t1, . . . , tn−1, 1) = p. Let h′ := h·detr where r := 1
so deg(h′) = deg(q) ∈ N. Then
n (deg q −deg h) ∈ Z
h′ − q(c1, . . . , cn) ∈ (det −1) ∩ O(Mn)degq = 0
hence h′ ∈ C[c1, . . . , cn] and h ∈ C[c1, . . . , cn, c−1
O(Mn) = C[c1, . . . , cn] by the definitions.
n ]. This is enough as C[c1, . . . , cn, c−1
n ]∩
(cid:3)
4. Case of O(SL2)
In this section, we prove Theorem 1.2 for O(SL2) that is the first step of the
induction in the proof of the general case.
We denote by a, b, c, d the generators x1,1, x1,2, x2,1, x2,2 ∈ O(SL2) and tr :=
c1 = a + d.
Proposition 4.1. The centralizer of tr ∈ O(SL2) is C[tr].
By ad − bc = 1 we have a monomial basis of O(SL2) consisting of
aibkcl, bkcldj, bkcl
(i, j ∈ N+, k, l ∈ N)
The Poisson bracket on the generators is the following:
{a, b} = ab
{a, c} = ac
{a, d} = 2bc
{b, c} = 0
{b, d} = bd
{c, d} = cd
The action of {tr, .} on the basis elements can be written as
= (k + l)ai+1bkcl − 2iai−1bk+1cl+1 − (k + l)aibkcld
(cid:8)(a + d), aibkcl(cid:9) =
= (k + l)ai+1bkcl − (2i + k + l)ai−1bk+1cl+1 − (k + l)ai−1bkcl
By the same computation on bkcl and bkcldj one obtains
(cid:8)(a + d), bkcl(cid:9) = (k + l)abkcl − (k + l)bkcld
(cid:8)(a + d), bkcldj(cid:9) = (k + l + 2j)bk+1cl+1dj−1 + (k + l)bkcldj−1 − (k + l)bkcldj+1
Hence, for a polynomial p ∈ C[t1, t2] and i ≥ 1:
(4.1)
(cid:8)(a + d), aip(b, c)(cid:9) = ai+1Xm
m · pm(b, c)
where pm is the m-th homogeneous component of p. The analogous computations
for p(b, c)dj (j ≥ 1) and p(b, c) give
−ai−1Xm (cid:0)(2i + m)bc + m(cid:1)pm(b, c)
(4.2)
(4.3)
(cid:8)(a + d), p(b, c)dj(cid:9) = −dj+1Xm
m · pm(b, c)
+dj−1Xm (cid:0)(m + 2j)bc + m(cid:1)pm(b, c)
(cid:8)(a + d), p(b, c)(cid:9) = (a − d)Xm
7
m · pm(b, c)
Poisson Centralizer of the Trace
Szabolcs Mészáros
Proof of Proposition 4.1. Assume that 0 6= g ∈ C(tr) and write it as
g =
α
Xi=1
airi +
β
Xj=1
sjdj + u
where ri, sj and u are elements of C[b, c], and α and β are the highest powers of a
and d appearing in the decomposition.
We prove that rα ∈ C · 1. If α = 0 then rα = u so the aibkcl terms (i > 0)
in {a + d, g} are the same as the aibkcl terms in {a + d, u} by Eq. 4.1, 4.2 and
4.3. However, by 4.3, these terms are nonzero if u /∈ C and that is a contradiction.
Assume that α ≥ 1 and for a fixed k ∈ N define the subspace
alC[b, c, d] ⊆ O(SL2)
Ak :=Xl≤k
By (cid:8)tr, Aα−1(cid:9) ⊆ Aα we have
Aα = {tr, g} + Aα =(cid:8)tr, aαrα + Aα−1(cid:9) + Aα =
= aα{tr, rα} + αaα−1bcrα + Aα = aα{tr, rα} + Aα
By Eq. 4.3 it is possible only if {tr, rα} = 0 so rα ∈ C[b, c] ∩ C(tr) = C · 1.
If α > 0 we may simplify g by subtracting polynomials of tr from it. Indeed,
by rα ∈ C× we have g − rαtrα ∈ Aα−1 ∩ C(tr) so we can replace g by g − rαtrα.
Hence, we may assume that α = 0. Then, again, rα = u ∈ C · 1 ⊆ C(tr) so we may
also assume that u = 0.
If g is nonzero after the simplification, we get a contradiction.
Indeed, let
p(b, c)dγ be the summand of g with the smallest γ ∈ N. By the above simplifi-
cations, γ ≥ 1. Then the coefficient of dγ−1 in {tr, g} is the same as the coefficient
of dγ−1 in
{tr, p(b, c)dγ} = {tr, p(b, c)}dγ + 2γbcp(b, c)dγ−1
so it is 2γbcp(b, c)dγ−1 that is nonzero if p(b, c) 6= 0 and γ ≥ 1. That is a contra-
diction.
(cid:3)
5. Proof of the main result
Let n ≥ 2 and let us denote An := O(Mn).
Proposition 5.1. C[σ1, . . . , σn] ≤ An is a Poisson-commutative subalgebra.
Proof. Consider the principal quantum minor sums
σi = XI=iXs∈Si
t−ℓ(s)xi1,is(1) . . . xit ,is(t) ∈ Ot(Mn)
When An is viewed as the semiclassical limit R/(t − 1)R where R = Ot(Mn) (see
Subsection 2.5), one can see that σi represents ci ∈ R/(t − 1)R ∼= O(Mn). In [DL1],
it is proved that σiσj = σj σi in Oq(Mn) if q is not a root of unity, in particular, if
q is transcendental.
Since the algebra Oq(Mn) is defined over Z[q, q−1], the elements σ1, . . . , σn (that
are defined over Z[q, q−1]) commute in Oq(cid:0)Mn(Z)(cid:1) ≤ Oq(cid:0)Mn(C)(cid:1) as well. Hence,
σ1, . . . , σn also commute after extension of scalars, i.e. in the ring Oq(cid:0)Mn(Z)(cid:1) ⊗Z
C ∼= Ot(cid:0)Mn(C)(cid:1). Consequently, in An ∼= R/(t − 1)R the subalgebra C[c1, . . . , cn]
is a Poisson-commutative subalgebra, by the definition of semiclassical limit.
(cid:3)
8
Poisson Centralizer of the Trace
Szabolcs Mészáros
By Proposition 5.1, C[c1, . . . , cn] is in the Poisson-centralizer C(c1). To prove
the converse, Theorem 1.2, we need further notations. Consider the Poisson ideal
I := (x1,j, xi,1 2 ≤ i, j ≤ n) ⊳ An
We will denote its quotient Poisson algebra by B2,n := An/I and the natural
surjection by ϕ : An → B2,n. Note that B2,n ∼= An−1[t] as Poisson algebras by
xi,j + I 7→ xi−1,j−1 (2 ≤ i, j ≤ n) and x1,1 7→ t where the bracket of An−1[t] is the
trivial extension of the bracket of An−1 by {t, a} = 0 for all a ∈ An−1[t].
Furthermore, Dn will stand for C[t1, . . . , tn] endowed with the zero Poisson
bracket. Define the map δ : B2,n → Dn as xi,j + I 7→ δi,jti that is morphism
of Poisson algebras by {xi,i, xj,j} ∈ I. Note that (δ ◦ ϕ)(ci) = si, the elementary
symmetric polynomial in t1, . . . , tn. In particular, δ ◦ ϕ restricted to C[c1, . . . , cn] is
an isomorphism onto the symmetric polynomials in t1, . . . , tn by the fundamental
theorem of symmetric polynomials. In the proof of Theorem 1.2 we verify the same
property for C(σ1).
Although the algebras An, B2,n and Dn are N-graded Poisson algebras (see
Section 2) using the total degree of An and the induced gradings on the quotients,
we will instead consider them as filtered Poisson algebras where the filtration is not
the one that corresponds to this grading. For each d ∈ N, let us define
Ad = {a ∈ An degx1,1 (a) ≤ d}
This is indeed a filtration on An. Note, that the grading degx1,1 is incompatible
with the bracket by {x1,1, x2,2} = x1,2x2,1. The algebras B2,n, Dn and C(c1) inherit
a filtered Poisson algebra structure as they are Poisson sub- and quotient algebras
of An so we may take Bd := ϕ(Ad), Dd := (δ ◦ ϕ)(Ad) and Cd = Ad ∩ C(c1). This
way, the natural surjections ϕ and δ and the embedding C(c1) ֒→ An are maps of
filtered Poisson algebras.
In the proof of Theorem 1.2 we use the associated graded Poisson algebras of
B2,n, Dn and C(c1) (see Section 2). First, we describe the structure of these. The
filtrations on B2,n and Dn are induced by the x1,1- and t1-degrees, hence we have
grB2,n ∼= B2,n and grDn ∼= Dn as graded Poisson algebras (and grδ = δ), so we
identify them in the following.
The underlying graded algebra of grAn is isomorphic to An using the x1,1-degree
but the Poisson bracket is different: it is the same on the generators xi,j and xk,l
for (i, j) 6= (1, 1) 6= (k, l) but
{x1,1, xi,j }gr = 0
{x1,1, x1,j}gr = x1,1x1,j
{x1,1, xi,1}gr = x1,1xi,1
(2 ≤ i, j ≤ n)
(2 ≤ j ≤ n)
(2 ≤ i ≤ n)
where {., .}gr stands for the Poisson bracket of grAn. Consequently, as maps we
have grϕ = ϕ, we still have {ci, cj}gr = 0 for all i, j, and the underlying algebra of
grC(c1) can be identified with C(c1).
Note, that C(c1) is defined by the original Poisson structure {., .} of An and not
by {., .}gr, even if it will be considered as a Poisson subalgebra of grAn. The reason
of this slightly ambiguous notation is that we will also introduce Cgr(x1,1) ⊆ grAn
as the centralizer of x1,1 with respect to {., .}gr.
Our associated graded setup can be summarized as follows:
C(c1) ⊆
grAn
/ B2,n
δ
/ Dn
ϕ
9
/
/
/
/
/
/
Poisson Centralizer of the Trace
Szabolcs Mészáros
Proof of Theorem 1.2. We prove the statement by induction on n. The statement
is verified for O(SL2) in Section 4 so, by Proposition 3.1 the case n = 2 is proved.
Assume that n ≥ 3. We shall prove that
• (δ ◦ ϕ)C(c1) : C(c1) → Dn is injective, and
• the image (δ ◦ ϕ)(cid:0)C(c1)(cid:1) is in DSn
n .
These imply that the restriction of δ ◦ ϕ to C(c1) is an isomorphism onto DSn
n since
C(c1) ∋ ci for i = 1, . . . , n (see Section 2) and δ ◦ ϕ restricted to C[c1, . . . , cn] is
surjective onto DSn
n . The statement of the theorem follows.
To prove that δ ◦ ϕ is injective on C(c1) it is enough to prove that δ is injective
on C(cid:0)ϕ(c1)(cid:1) and that ϕ is injective on C(c1). Indeed, as ϕ is a Poisson map we
have ϕ(cid:0)C(c1)(cid:1) ⊆ C(cid:0)ϕ(c1)(cid:1).
First, we prove δ is injective on C(cid:0)ϕ(c1)(cid:1). By B2,n ∼= An−1[t] where t is Poisson-
B2,n ⊇ C(cid:0)ϕ(c1)(cid:1) ∼= CAn−1[t](cid:0)t + c1(An−1)(cid:1) = CAn−1(cid:0)c1(An−1)(cid:1)[t] ⊆ An−1[t]
By the induction hypothesis
central, we have
CAn−1(cid:0)c1(An−1)(cid:1) = C(cid:2)c1(An−1), . . . , cn−1(An−1)(cid:3)
where si is the symmetric polynomial in the variables t2, . . . , tn. In particular, δ is
Therefore, δ restricted to C(cid:0)ϕ(c1)(cid:1) is an isomorphism onto C[s1, . . . , sn−1][t1] ⊆ Dn
injective on C(cid:0)ϕ(c1)(cid:1).
To verify the injectivity of ϕ on C(c1), define
Cgr(x1,1) := {a ∈ grAn {x1,1, a}gr = 0}
The subalgebra C(c1) is contained in Cgr(x1,1) since for a homogeneous element a
of degree d, we have
Ad+1/Ad ∋ {x1,1, a}gr + Ad = {x1,1 + A0, a + Ad−1} + Ad = {c1, a} + Ad
hence {c1, a} = 0 implies {x1,1, a}gr = 0 ∈ grAn. Our setup can be visualized on
the following diagram:
gr(An)
ϕ
/ B2,n
δ
/ Dn
S
S
;✈
✈
✈
✈
✈
✈
✈
✈
✈
Cgr(x1,1)
C(cid:0)ϕ(c1)(cid:1)
8r
r
r
r
r
r
S
C(c1)
r
r
r
r
Now, it is enough to prove that ϕ restricted to Cgr(x1,1) is injective.
We can give an explicit description of Cgr(x1,1) in the following form:
Cgr(x1,1) = C[x1,1, xi,j 2 ≤ i, j ≤ n] ≤ grAn
Indeed,
{x1,1, xi,j}gr =(x1,1xi,j
0
if j 6= i = 1 or i 6= j = 1
otherwise
Therefore, the map adgrx1,1 : a 7→ {x1,1, a}gr acts on a monomial m ∈ grAn as
{x1,1, m}gr = c(m) · x1,1m where c(m) is the sum of the exponents of the x1,j 's
10
/
/
/
/
/
/
,
;
8
Poisson Centralizer of the Trace
Szabolcs Mészáros
and xi,1's (2 ≤ i, j ≤ n) in m. Hence, adgrx1,1 maps the monomial basis of grAn
injectively into itself. In particular,
Cgr(x1,1) = Ker(cid:0)adgrx1,1(cid:1) = {a ∈ grAn c(m) = 0} ∼= An−1[t]
using the isomorphism x1,1 7→ t and xi,j 7→ xi−1,j−1.
The injectivity part of the theorem follows: ϕ is injective on Cgr(x1,1) (in fact it
injective.
is an isomorphism onto B2,n), and ϕ maps C(c1) into C(cid:0)ϕ(c1)(cid:1) on which δ is also
To prove (δ ◦ ϕ)(cid:0)C(c1)(cid:1) ⊆ DSn
n , first note that in the above we have proved that
(δ ◦ ϕ)(cid:0)C(c1)(cid:1) ⊆ δ(cid:0)C(cid:0)ϕ(c1)(cid:1)(cid:1) ⊆ DSn−1
n
where Sn−1 acts on Dn by permuting t2, . . . , tn. Consider the automorphism γ
of An given by the reflection to the off-diagonal: γ(xi,j ) = xn+1−i,n+1−j .
It is
not a Poisson map but a Poisson antimap (using the terminology of [ChP]), i.e.
γ({a, b}) = −{γ(a), γ(b)}. It maps c1 into itself and consequently C(c1) into itself.
For the analogous involution γ : Dn → Dn, ti 7→ tn+1−i (i = 1, . . . , n) we have
(δ ◦ ϕ) ◦ γ = γ ◦ (δ ◦ ϕ). Hence,
(δ ◦ ϕ)(cid:0)C(c1)(cid:1) = (δ ◦ ϕ ◦ γ)(cid:0)C(c1)(cid:1) = (γ ◦ δ ◦ ϕ)(cid:0)C(c1)(cid:1) ⊆ γ(cid:0)DSn−1
proving the symmetry of (δ ◦ ϕ)(cid:0)C(c1)(cid:1) in t1, . . . , tn−1, so it is symmetric in all the
variables by n ≥ 3.
(cid:1)
(cid:3)
n
Remark 5.2. In contrast with Theorem 1.1, in the case of the KKS Poisson struc-
ture, every Poisson-commutative subalgebra contains the Poisson center C[c1, . . . , cn],
see [W]. For a maximal commutative subalgebra with respect to the KKS bracket,
see [KW].
Remark 5.3. We prove that C[c1, . . . cn−1] is not an integrable complete involutive
system (see Section 2). First, observe that the rank of the semiclassical Poisson
bracket of O(SLn) is n(n − 1).
Indeed, by Section 2, the rank is the maximal dimension of the symplectic leaves
in SLn. The symplectic leaves in SLn are classified in [HL1], Theorem A.2.1, based
on the work of Lu, Weinstein and Semenov-Tian-Shansky [LW], [S]. The dimension
of a symplectic leaf is determined by an associated element of W ×W where W = Sn
is the Weyl group of SLn. According to Proposition A.2.2, if (w+, w−) ∈ W × W
then the dimension of the corresponding leaves is
(5.1)
ℓ(w+) + ℓ(w−) + min{m ∈ N w+w−1
− = r1 · · · · · rm ri is a transposition for all i}
where ℓ(.) is the length function of the Weyl group that -- in the case of SLn --
is the number of inversions in a permutation. By the definition of inversion using
elementary transpositions, the above quantity is bounded by
ℓ(w+) + ℓ(w−) + ℓ(w+w−1
− )
The maximum of the latter is n(n−1) since ℓ(w+) =(cid:0)n
stands for the longest element of Sn. Therefore,
ℓ(w+)+ℓ(w−)+ℓ(w+w−1
because ℓ(gh) ≤ ℓ(g) + ℓ(h) = ℓ(g) + ℓ(h−1) for all g, h ∈ Sn. This maximum is
attained on w+ = w− = t, even for the original quantity in Equation 5.1. Hence,
2(cid:1)−ℓ(w+t) where t = (n . . . 1)
− ) = n(n−1)−ℓ(w+t)−ℓ(w−t)+ℓ(cid:0)(w+t)(w−t)−1(cid:1) ≤ n(n−1)
11
Poisson Centralizer of the Trace
Szabolcs Mészáros
Rk{., .} = n(n − 1) for SLn and Rk{., .} = n(n − 1) + 1 for Mn and GLn. However,
a complete integrable system should have dimension
dim SLn −
1
2
Rk{., .} = n2 − 1 −(cid:18)n
2(cid:19) =(cid:18)n + 1
2 (cid:19) − 1
So it does not equal to dim C[c1, . . . cn−1] = n − 1 if n > 1. Similarly, the system is
non-integrable for Mn and GLn.
References
[AZ] V. V. Antonov, A. N. Zubkov, Coinvariants for a coadjoint action of quantum matrices,
Algebra and Logic, 48 (2009), no 4, 239.
[BG] K. A. Brown, K. R. Goodearl, Lectures on Algebraic Quantum Groups, Birkhauser, 2002.
[ChP] V. Chari, A. N. Pressley, A Guide to Quantum Groups, Cambridge Univ. Press, 1995.
[DL1] M. Domokos, T. H. Lenagan, Conjugation coinvariants of quantum matrices, Bull. London
Math. Soc. 35 (2003) 117-127.
[DL2] M. Domokos, T. H. Lenagan, Representation rings of quantum groups, J. Algebra 282
[G]
(2004), 103-128.
K. R. Goodearl, Semiclassical Limits of Quantized Coordinate Rings, Advances in Ring
Theory (2010), Part of the series Trends in Mathematics, 165-204.
[HL1] T. J. Hodges, T. Levasseur, Primitive Ideals of Cq[SL(3)], Commun. Math. Phys. 156,
(1993) 581-605.
[HL2] T. J. Hodges, T. Levasseur, Primitive ideals of Cq[SL(n)], J. Algebra 168 (1994), 455-468.
[KW] B. Kostant, N. Wallach, Gelfand-Zeitlin theory from the perspective of classical mechanics.
I, Progr. Math. 243, Birkhauser, Boston, 2006, Studies in Lie theory, 319 -- 364.
[LW] J.-H. Lu, A. Weinstein, Poisson Lie groups, dressing transformations and Bruhat decom-
[M]
[S]
positions, J. Differential Geometry 31, (1990) 501-526 .
Sz. Mészáros, Cocommutative Elements Form a Maximal Commutative Subalgebra in
Quantum Matrices (submitted), arxiv:1512.04353
M.A. Semenov-Tian-Shansky, Dressing transformations and Poisson group actions, Publ.
RIMS, Kyoto Univ., 21, (1985) 1237-1260.
P. Vanhaecke, Integrable Systems in the Realm of Algebraic Geometry, Springer (1996).
[V]
[W] A. Weinstein, The local structure of Poisson manifolds, J. Differential Geometry 18 (1983),
523-557.
[Y] M. Yakimov, On the spectra of quantum groups, Memoirs Amer. Math. Soc. 229 (2014),
no. 1078.
Department of Mathematics, Central European University, Budapest, 1051
E-mail address: [email protected]
12
|
1609.05594 | 1 | 1609 | 2016-09-19T04:05:08 | Geometric classification of nilpotent Jordan algebras of dimension five | [
"math.RA"
] | The variety $JorN_{5}$ of five-dimensional nilpotent Jordan algebras structures over an algebraically closed field is investigated. We show that $JorN_{5}$ is the union of five irreducible components, four of them correspond to the Zariski closure of the $GL_5$-orbits of four rigid algebras and the other one is the Zariski closure of an union of orbits of infinite family of algebras, none of them being rigid. | math.RA | math | Geometric classification of nilpotent Jordan algebras of dimension
five
Iryna Kashubaa,1,∗, María Eugenia Martina,2
aInstituto de Matemática e Estatística, Universidade de São Paulo, R. do Matão 1010, 05508-090, São Paulo,
Brazil.
Abstract
The variety JorN5 of five-dimensional nilpotent Jordan algebras structures over an alge-
braically closed field is investigated. We show that JorN5 is the union of five irreducible
components, four of them correspond to the Zariski closure of the GL5-orbits of four rigid
algebras and the other one is the Zariski closure of an union of orbits of infinite family of
algebras, none of them being rigid.
Keywords: Jordan algebra, deformation of algebras, rigidity
2010 MSC: 14J10, 17C55, 17C10.
6
1
0
2
p
e
S
9
1
]
.
A
R
h
t
a
m
[
1
v
4
9
5
5
0
.
9
0
6
1
:
v
i
X
r
a
1 Introduction
In this paper we study the geometry of nilpotent Jordan algebras over algebraically
closed fields k of characteristic (cid:54)= 2, 3. Namely, let V be an n-dimensional k-vector space,
the bilinear maps V × V → V form an n3-dimensional algebraic variety Homk(V ⊗ V, V ).
Moreover, Jordan algebra structures satisfy polynomial equations (originating from both
commutativity and Jordan identity) and therefore determine a Zariski-closed subset, which
we will call the variety of Jordan algebras of dimension n. As any affine variety, Jorn
admits decomposition in a finite number of irreducible components. Furthermore, nilpo-
tency conditions are also of polynomial type and thus the set of nilpotent Jordan algebras
in dimension n, which will be denoted by JorNn, possess a structure of algebraic variety
embedded in Jorn. The general linear group G = GL(V) acts on both Jorn and JorNn
via "change of basis", decomposing them into G-orbits which correspond to the classes of
isomorphic Jordan algebras. We study the geometry of JorN(n): dimension, decomposition
into irreducible components and their description. The crucial tool for it is the notion of
deformation of algebras: we say that J1 is a deformation of J2 if the G-orbit of J2 belongs
to Zariski closure of the G-orbit of J1. Algebra J whose orbit is an open subset in Jorn is
of particular interest, since it does not admit non-trivial deformations and its closure rises
to irreducible component. We will call such algebras rigid.
Analogously to JorNn one defines the varieties of nilpotent Lie and associative algebras.
We will denote them LieNn and AssocNn, respectively. The geometry of these two varieties
is rather different.
∗Corresponding author
Email addresses: [email protected] (Iryna Kashuba), [email protected] (María Eugenia Martin)
1The author was supported by CNPq (309742/2013-7).
2The author was supported by the CAPES scholarship for postdoc program of Mathematics, IME-USP.
1
In 1968, F. Flanigan posed a question whether every irreducible component is the closure
of a G-orbit of some rigid algebra J . In [1] he proved that every component of Assocn has
to carry an open subset of non-singular points which is either the orbit of a single rigid
algebra or an infinite union of orbits of algebras which differ only in the multiplication of
the radical. Flanigan has discovered that the second alternative does in fact occur: there is
a component of Assoc3 which consists entirely of the orbits of an infinite family of three-
dimensional nilpotent algebras.
In [2], G. Mazzola has proved that the subvariety of commutative algebras inside AssocNn
is irreducible for n ≤ 6 and it admits at least two irreducible components in dimension 7.
For the non-commutative case the description is known only for n ≤ 5. A. MakhLouf showed
that AssocN2 is irreducible, while the number of irreducible components of AssocNn when
n is equal to 3, 4 and 5 is two, four and thirteen, respectively. Further, the author estimated
a lower bound of the number of irreducible components in any dimension, see [3].
For the variety of nilpotent Lie algebras LieNn the geometric classification is known for
n ≤ 8. In 1988, F. Grunewald and J. O'Halloran in [4] established that LieNn is irreducible
when n ≤ 5. Two years later, S. Craig proved that this is the case for dimension 6 as well,
see [5]. The first reducible variety of nilpotent Lie algebras appears in dimension 7, see [6].
It was shown by M. Goze and J. M. Ancochea-Bermudez. that LieN7 decomposes into two
algebraic components each corresponding to infinite family of algebras. Finally, in [7] the
authors described all eight components of the variety of nilpotent Lie algebras of dimension
8.
As for the variety of Jordan algebras the references are rather recent. In [8, 2005], [9,
2014] it was shown that in Jorn for n ≤ 4 any irreducible component is determined by a
rigid algebra. In [10, 2011], the authors establish that the subvariety of nilpotent algebras
JorNn is irreducible for n ≤ 3 and admits two irreducible components if n = 4.
In this paper, we will show that JorN5 is the union of five irreducible components, there
are four rigid algebras and the closure of the union of G-orbits of a certain infinite family
gives rise to the fifth component.
The paper is organized as follows. Section 2 begins with some preliminaries on Jor-
dan algebras, further we establish the list of non-isomorphic nilpotent Jordan algebras of
dimension 5. Among the non-isomorphic nilpotent Jordan algebras there are four infinite
families depending on one or two parameters from k. In Section 3, we define the variety
of Jordan algebras JorNn, determine useful invariants of deformation and show how to
construct deformation between algebras or how to ensure that such deformation does not
exist. In Section 4 we give several examples for the deformation both of and into the infinite
families, while in Section 5, we prove the main result of this paper describing deformations
between the algebras in JorN5 and characterizing its the irreducible components.
2 Jordan algebras: definition and basic concepts, list of nilpotent
algebras up to dimension five
In this section we present the basic concepts, notations for Jordan algebras and the
algebraic classification of nilpotent Jordan algebras of small dimensions.
Definition 1. A Jordan k-algebra is a commutative k-algebra J satisfying the Jordan
identity, namely
((x · x) · y) · x = (x · x) · (y · x),
x, y ∈ J .
(1)
2
In a Jordan algebra J we define inductively a series of subsets by setting
J 1 = J ,
J n = J n−1 · J + J n−2 · J 2 + ··· + J · J n−1.
The subset J n is called the n-th power of the algebra J .
Definition 2. A Jordan algebra J is said to be nilpotent if there exists an integer n ∈ N
such that J n = 0. The least such number is called the index of nilpotency of the algebra
J , nilindex(J ).
Further in this section we establish a list of all non-isomorphic nilpotent algebras of
dimension five. For convenience we first describe all indecomposable nilpotent algebras
of dimension up to four, using the notations from [11]. Also we drop · and denote a
multiplication in J simply as xy. Products that we do not specify are understood to be 0 or
determined by commutativity.
Example 3 (Indecomposable nilpotent Jordan algebras of dimension one, and two three). All
nilpotent Jordan algebras of dimension less than four are associative. There is only one
nilpotent indecomposable algebra in one and two: kn, with n2 = 0 and B3 generated by n1,
with n3
1 = 0, respectively. There are two indecomposable nilpotent algebras in dimension
three, T3 generated by n1, such that n4
1 = 0 and T4 = (cid:104)n1, n2 n2
2(cid:105).
1 = n2
In [11] all Jordan algebras of dimension four over an algebraically closed field of char-
acteristic not 2 were described. In the Table 1 we list eight non-isomorphic indecomposable
nilpotent Jordan algebras.
Table 1: Indecomposable four-dimensional nilpotent Jordan
algebras.
F
F61
F62
F63
F64
F65
F66
F69
F70
1 = n2 n2
n2
Multiplication Table
2 = n4 n1n2 = n3 n1n3 = n4
4 = n2 n1n2 = n3
n2
1 = n2 n2
1 = n2 n2
n2
4 = −n2 − n3 n1n2 = n3 n2n4 = n3
n2
1 = n2 n2
n2
1 = n2 n1n2 = n3 n2n4 = n3
n2
1 = n2 n2
4 = n3 n1n2 = n3
4 = −n2 n1n2 = n3 n2n4 = n3
n2
1 = n2 n1n3 = n4
n2
1 = n2 n3n4 = n2
2.1. Nilpotent Jordan algebras of dimension five
In [2], G. Mazzola has classified nilpotent commutative associative (and thus Jordan)
five-dimensional algebras. Keeping the notations from the paper we list the 25 non-isomorphic
such algebras in Table 2. For each algebra we calculate the dimension of its automorphism
group Aut(J ), of its annihilator Ann(J ) = {a ∈ J aJ = 0}, of its second power J 2 and
the index of nilpotency nilindex(J ).
3
Table 2: Five-dimensional nilpotent associative Jordan alge-
bras.
Multiplication Table
dim
Aut
dim
Ann
dim
2
nil-
index
n2
1 = n2 n2
2 = n1n3 = n4
n1n2 = n3 n1n4 = n2n3 = n5
n2
1 = n2 n2
2 = n1n3 = n4
n1n2 = n3
n2
1 = n2 n2
4 = n5
n1n2 = n4n5 = n3
n2
1 = n3 n1n2 = n4
n1n4 = n2n3 = n5
F61 ⊕ kn5
T3 ⊕ B3
n1n3 = n4 n2n3 = n5
n1n2 = n4 − n5
n2
1 = n3 n2
2 = n1n3 = n4
n1n2 = n5
n1n3 = n5
n1n2 = n4 n2n3 = −n5
n2
1 = n3 n1n3 = n4 n1n2 = n5
n2
1 = n2n3 = n4 n1n3 = n5
n1n2 = n4 n1n3 = n5
n2
3 = n4 n1n2 = n3n4 = n5
F66 ⊕ kn5
T4 ⊕ B3
2 = n5 n1n2 = n4
3 = n1n2 = n5
1 = n3 n2
n2
n2
1 = n4 n2
T3 ⊕ kn4 ⊕ kn5
B3 ⊕ B3 ⊕ kn5
n2n3 = n1n4 = n5
F69 ⊕ kn5
F70 ⊕ kn5
T4 ⊕ kn4 ⊕ kn5
B3 ⊕ kn3 ⊕ kn4 ⊕ kn5
kn1 ⊕ kn2 ⊕ kn3 ⊕ kn4 ⊕ kn5
5
6
6
7
7
7
7
8
8
9
9
11
8
9
9
10
10
11
11
12
11
12
14
17
25
1
1
1
1
2
2
2
2
2
2
2
2
1
2
2
3
2
3
3
3
1
2
3
4
5
4
3
3
3
3
3
2
3
2
3
2
2
2
2
2
3
2
2
2
2
1
1
1
1
0
6
5
4
4
5
4
3
4
3
4
3
3
4
4
3
3
3
4
3
3
3
3
3
3
2
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Recently, in [12] a method to construct nilpotent Jordan algebras using central exten-
sion of lower dimension algebras was presented. The authors showed that any nilpotent
algebra can be obtained via this methods and provided a list of 35 single non-associative
Jordan algebras together with 6 families of algebras depending on parameters in k. The list
of these algebras is given in Table 3 (using the notations [12]) together with the dimen-
sions of Aut(J ), Ann(J ), J 2 and of the associative center Z(J ) = {a ∈ J (a,J ,J ) =
(J , a,J ) = (J ,J , a) = 0}.
4
Table 3: Five-dimensional nilpotent non-associative Jordan
algebras.
15
J
J1
J2
J3
J4
J5
J6
J7
J8
J9
J10
J11
J12
J13
J14
J α
J16
J17
J18
J19
J20
J21
J22
J β
J γ
J 0
J − 1
J25
J δ
23
24
24
24
26
2
Multiplication Table
dim
Aut
dim
Ann
8
9
8
7
6
7
6
5
4
5
7
6
6
7
6
6
5
4
5
4
3
4
6
7
7
8
7
6
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
2
1
1
1
F65 ⊕ kn5
F64 ⊕ kn5
F63 ⊕ kn5
F62 ⊕ kn5
n2
1 = n2 n2
4 = n2n3 = n5
n2
1 = n2 n1n4 = n2n3 = n5
n1n2 = n3 n3n4 = n5
n1n2 = n3 n3n4 = n2
1 = n5
n3n4 = n2
n1n2 = n3
1 = n2
n1n2 = n3
2 = n5
n1n3 = n2
4 = n2n3 = n5
n1n2 = n3 n1n3 = n2
4 = n5
n1n3 = n2
n1n2 = n3
4 = n2
n1n2 = n3
2 = n5
n1n4 = n1n3 = n2n3 = n5
n1n2 = n3 n1n3 = n2n4 = n5
1 = n2 n1n2 = n3 n2
n2
4 = αn5
n2
2 = n1n3 = n2n4 = n5, α∈k
n1n2 = n2
3 = n4 n1n4 = n5
n1n2 = n2
3 = n4
n1n4 = n2n3 = n5
n1n2 = n2
3 = n4
n1n4 = n2
2 = n5
n1n2 = n2
3 = n4 n3n4 = n5
n1n2 = n2
3 = n4 n3n4 = n2
n1n2 = n2
3 = n4
1 = n5
1 = n2
n3n4 = n2
1 = n2 n1n2 = n2
n2
n2
2 = n1n4 = n5
2 = n5
3 = n4
n2
1 = n3 n1n3 = n2n4 = n5
n1n2 = n4 n2n3 = βn5, β∈k
n2
1 = n3 n1n2 = n4 n2n3 = n5
n1n4 = γn5, γ∈k∗−{1,− 1
2}
n2
1 = n3 n1n2 = n4 n2n3 = n5
n2
1 = n3 n1n2 = n4 n2n3 = n5
n1n4 = − 1
n2
1 = n3 n1n2 = n4
2 n5
n1n3 = n1n4 = n5 n2n3 = −2n5
n2
1 = n3 n2
2 = n4 n2n4 = δn5
n1n3 = n1n4 = n5, δ∈k∗
5
dim
J 2
2
2
2
2
2
2
2
2
dim
Z
3
3
3
3
3
3
2
2
2
2
2
2
2
2
3
2
2
2
2
2
2
3
3
3
3
3
3
3
2
3
3
3
3
3
3
2
2
2
2
2
2
3
3
3
3
3
3
3
Table 3: Five-dimensional nilpotent non-associative Jordan
algebras.
J
J 0
26
J ε,φ
27
27
27
J ε,ε−1
J −1,−1
J28
J29
J30
J31
J32
J33
J34
J35
J36
J37
J38
J39
J40
J λ
41
n2
1 = n2 n2n3 = n4 n1n2 = n5
n2
1 = n2 n2n3 = n4
n1n3 = n2
3 = n5
n2
1 = n2 n2n3 = n4
n1n2 = n1n3 = n5
n2
1 = n2 n2n3 = n4
n1n2 = n2
3 = n5
Multiplication Table
n2
1 = n3 n2
2 = n4
n1n3 = n1n4 = n5
n2
1 = n3 n2n3 = n1n4 = n5
n2
2 = n4 n2n4 = εn5
n1n3 = φn5 ε,φ∈k, εφ(cid:54)=1
n2
1 = n3 n2n3 = n1n4 = n5
n2
2 = n4 n2n4 = εn5
n1n3 = ε−1n5
ε∈k∗−{−1}
n2
1 = n3 n2n3 = n1n4 = n5
n2
2 = n4 n2n4 = n1n3 = −n5
n2
1 = n2 n2n3 = n4 n2
3 = n5
n2
1 = n2 n2n3 = n4 n1n3 = n5
n1n2 = n3 n1n3 = n4 n2
n1n2 = n3 n1n3 = n4 n2
n1n2 = n3 n1n3 = n4
1 = n5
2 = n5
1 = n2
n2
n2n3 = n5
2 = n5 n1n2 = n3
n1n3 = n4
n1n2 = n3 n1n3 = n4
n2
1 = n2n3 = n5
n1n2 = n3 n2
1 = n5
n2
2 = n1n3 = n4
n1n2 = n3 n2
2 = n1n3 = n4
n2
1 = n2n3 = n5
n2
1 = n5 n1n2 = n3 n2
2 = λn5
n1n3 = n2n3 = n4, λ∈k
dim
Aut
dim
Ann
6
6
6
6
7
7
6
7
6
5
8
7
6
6
5
7
4
6
2
1
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
dim
J 2
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
dim
Z
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
Theorem 4. In Tables 2 and 3 all algebras are one-to-one non-isomorphic except for
1. J α1
2. J β1
3. J α1,β1
4. J λ1
5. J 1
27
15 (cid:39) J α2
23 (cid:39) J β2
24 (cid:39) J α2
26 (cid:39) J β2
24 if and only if α1 = α2;
26 if and only if β1 = ±β2;
15 , J α1
23 , J β1
(cid:39) J α2,β2
41 if and only if λ1 = λ2 or λ1 = λ−1
2 ;
27
41 (cid:39) J λ2
24 is in fact associative and corresponds to 4 from Table 2;
if and only if (α1, β1) = (α2, β2) or (α1, β1) = (β2, α2);
6
6. J29 (cid:39) J 0
24;
7. J37 (cid:39) J −1,−1
8. The family J λ
27
isomorphic to J 0
.
41 is isomorphic to J ε,ε−1
26. Remaining only J 0
27
for λ (cid:54)= 0, 1 and ε = − (−1+√λ)2
41, which will be denoted simply as J41.
(1+√λ)2 , while J 1
41 is
Proof. Firstly, in [12] the authors showed the isomorphism from items 1-4. The isomor-
phism 5 follows immediately from the multiplication tables of the corresponding algebras.
To see 6-8 consider the change of basis
27
J29 (cid:39) J 0
e1 = n1
e2 = n3
e3 = n2
e4 = n5
e5 = n4
24 J37 (cid:39) J −1,−1
e1 = n1 − n2
e2 = −n1 − n2
e3 = −2(n3 − n5)
e4 = 2(n3 + n5)
e5 = 2n4
26
J 1
41 (cid:39) J 0
e1 = n1 + n2
e2 = in1 − in2
e3 = 2(n3 + n5)
e4 = 2(n3 − n5)
e5 = 4n4
then the transformation
(cid:33)
n2
−1 + √λ
1 + √λ
2(−1 + √λ)2λ
(1 + √λ)2
n5
n3 +
n4
and for any λ (cid:54)= 0, 1 consider ε = − (−1+√λ)2
(1+√λ)2
(cid:32)
(cid:33)
e1 = √λn1 + n2
1 + √λ
n1 +
e2 =
e3 = 2√λn3 + 2λn5
(cid:32)√λ − λ
2(−1 + √λ)2√λ
2(−1 + √λ)2√λ
(1 + √λ)2
e4 = −
1 + √λ
e5 = −
41 (cid:39) J ε,ε−1
27
.
gives the isomorphism J λ
Further the dimension of the automorphism group, the annihilator, any power of alge-
bra, the associative center, index of nilpotency together with associative and non-associative
conditions, are invariants of class of isomorphic algebras. Therefore any two algebras whose
last four columns in Table 2 or Table 3 are not equal are non-isomorphic, and one has to ver-
ify that the algebras are non-isomorphic in the following cases:
1. J9 − J18 − J20: the four-dimensional non-associative nilpotent Jordan algebra F64 is
a subalgebra of J20 but it is not a subalgebra nor of J9 neither of J18. Analogously,
F70 is a subalgebra of J9 and is not of J18.
2. J8−J17−J19: the dimension of the second cohomology group of J19 with coefficients
in J19, H 2(J19,J19), is 6 while dim H 2(J8,J8) = dim H 2(J17,J17) = 5. For the
definition of the cohomology group for Jordan algebras we refer to [9]. On the other
hand, the four-dimensional algebra F63 is a subalgebra of J8 but is not of J17.
3. J33 (cid:54)(cid:39) J38: the three-dimensional nilpotent Jordan algebra T4 is a subalgebra of J38
but is not of J33.
7
4. J5−J12−J13: dim H 2(J12,J12) = dim H 2(J13,J13) = 13 while dim H 2(J5,J5) = 12
But the dimension of Jacobi space of J12, i.e.
Jac(J ) = {a ∈ J a(xy) = (ax)y + x(ay), ∀x, y ∈ J } ,
is 4 whereas dim Jac(J13) = 3.
5. J7 (cid:54)(cid:39) J16: the four-dimensional algebra F71 = T4 ⊕ kn4 is a subalgebra of J7 but is
not of J16.
6. J6 − J11 − J14: F63 ⊆ J14 while F63 (cid:54)⊆ J6, adding dim H 2(J11,J11) = 15 while
dim H 2(J6,J6) = dim H 2(J14,J14) = 14 we obtain the result.
24 (cid:54)(cid:39) J25: for any γ (cid:54)= 0, algebra F69 is a subalgebra of J γ
of J25. Since dim Ann(J 0
24) = 2, J25 (cid:54)(cid:39) J 0
24.
7. J γ
24 but is not a subalgebra
24) = 12 , while dim Jac(J28) =
9. J α
8. J28 − J 0
24,J 0
24 − J31 − J35 − J39: one compares the dimensions of both second co-
homology group and Jacobi space, dim H 2(J35,J35) = 10, dim H 2(J31,J31) = 8,
dim H 2(J28,J28) = dim H 2(J39,J39) = 11, and dim H 2(J 0
3 and dim Jac(J39) = 4.
26 − J ε,φ
15 − J β
algebras. Analogously, dim H 2(J β
26) = dim H 2(J ε,φ
dim H 2(J δ
Next, suppose that J ε,φ
is given by a matrix A = (aij)5
following conditions: aij = ai1ai2 = ak5 = 0 for i = 1, 2, j = 3, 4, 5, and a3k = a2
a4k = a2
for k = 3, 4. Moreover,
27 : the nilindex(J α
23,J β
27 ,J ε,φ
26 for some δ, ε, φ ∈ k and suppose that this isomorphism
i,j=1. Then the coefficients aij have to satisfy the
1(k−2),
2(k−2), a5k = +2a2(k−2)(a3(k−2) + a4(k−2)ε) + 2a1(k−2)(a4(k−2) + a3(k−2)φ) = 0,
15) = 5 for any α ∈ k while it is 4 for the other
23) = 9, while
23) = 8 if β (cid:54)= 0 and dim H 2(J 0
27 ) = 7 if δ (cid:54)= 0 and εφ (cid:54)= 1.
23 − J δ
26,J δ
27 (cid:39) J δ
23,J 0
10. J 0
a21a32 + a11a42 + a21a42ε + a41(a12 + a22ε) + a11a32φ + a31(a22 + a12φ) = 0
11φ = 0
12φ) = 0
11(a22 + a12φ) = 0
12φ = 0.
a11a21(a11 + a21) − a55 + a3
22ε) + a11(a2
a2
21(a12 + a22ε) + a2
−a55 + a21(a2
21ε + a3
22 + a2
12 + a2
22ε + a3
27 − J30 − J32 − J36 − J −1,−1
a12a22(a12 + a22) − a55δ + a3
But the system allows only trivial solutions ai5 = 0 for 1 ≤ i ≤ 5.
26 − J ε,ε−1
− J41: the nilpotency type of J32 and J36
is (2, 1, 2) while for all other algebras it is (2, 2, 1) (for definition of nilpotency type
of Jordan algebra we refer to [11]). Suppose that J36 (cid:39) J32 and the isomorphism is
given by the matrix A = (aij)5
i,j=1. Then aij's have to satisfy the following conditions:
aij = a3k = 2ai3a33 = 0 for i = 1, 2, j = 2, 4, 5, k = 4, 5, an2 = 2a11a(n−1)1, for
n = 3, 4, and a52 = 2a31a21, 2a13a23 = 0, 2a11a21a23 = a54, 2a11a21a13 = a44, a31a23 +
11a21, a21a13 + a11a23 = 0. This
a21a33 = a55 = 2a11a2
implies that ai4 = 0 for 1 ≤ i ≤ 5.
Comparing the dimensions of the cohomologies we rule out some cases:
21, a31a13 + a11a33 = a45 = 2a2
27
dim H 2(J −1,−1
dim H 2(J ε,ε−1
27
27
27
,J −1,−1
,J ε,ε−1
dim H 2(J 0
) = dim H 2(J41,J41) = 8,
) = dim H 2(J30,J30) = 7
26,J 0
26) = 10.
27
8
27
27
27
On the other hand, dim Jac(J −1,−1
check that J ε,ε−1
from J30 to J ε,ε−1
11 = a23, 2a21a31 = a43, 2a11a31 + a2
a2
a11a32 + a31(a12 + a32) = 0, a32a24ε−1 = a31a23ε = a45 = a31a24 = a32a23, a2
2a22a32 = a44 and 2a12a32 + a2
a contradiction.
) = 4 whereas dim Jac(J41) = 3. It remains to
i,j=1 which gives an isomorphism
(cid:54)(cid:39) J30. Suppose that A = (aij)5
, then aij = ak5 = 0 for i = 1, 3, j = 3, 4, 5 and k = 2, 5. Moreover,
31 = a53, a11a12 = 0, a31a22 + a21a32 = 0,
12 = a24,
32 = a54. All the solutions lead to ai5 = 0 for 1 ≤ i ≤ 5,
3 Deformation, variety of Jordan algebras, constructing defor-
mations
k=1 ck
namely, ei · ej =(cid:80)n
Let V be a n-dimensional k-vector space with a fixed basis {e1, e2,··· , en}. To endow V
with a Jordan k-algebra structure, (J ,·), it suffices to specify n3 structure constants ck
ij ∈ k,
ij) ∈ kn3 defines Jordan algebra
its coordinates satisfy certain polynomial equations which follow from commutativity and
Jordan identity. These equations cut out an algebraic variety Jorn in kn3. The points
ij) ∈ Jorn are in one-to-one correspondence with n-dimensional k-algebras along with
(ck
a particular choice of basis. A change of basis in J is given by the general linear group
G = GL(V) action on Jorn, namely:
ijek, i, j ∈ {1, 2, . . . , n}. If a point (ck
g(J ,·) (cid:55)→ (J ,·g),
x ·g y = g(g−1x · g−1y),
(2)
for any J ∈ Jorn, g ∈ G and x, y ∈ V. The G-orbit of a Jordan algebra J , that is, the set of
all images of J under the action of G, is denoted by J G. The set of different G-orbits of this
action is in one-to-one correspondence with the set of isomorphism classes of n-dimensional
Jordan algebras. The Zariski topology of the affine space provides the following relation of
orbits, namely, we say that J1 is a deformation of J2 or that J1 dominates J2, if the orbit
1 . We denote it by J1 → J2. A Jordan
2 is contained in the Zariski closure of the orbit J G
J G
algebra J is called rigid if its G-orbit is a Zariski-open set in Jorn. Rigid algebra J does
1 ∩ J G (cid:54)= ∅ and therefore
not admit non-trivial deformations, indeed if J1 → J then J G
J1 (cid:39) J .
As we have already mentioned in the introduction the rigid algebras are of particular
interest. Recall that any affine variety could be decomposed into its irreducible components.
When J ∈ Jorn is rigid, there exists an irreducible component C such that J G ∩C is a non-
empty open subspace in C, and therefore the closure of J G coincides with C. The converse
is not true: in the sections 5 we will show that there exists an irreducible component which
does not contain a single open G-orbit but rather an open subset which consists of infinite
union of orbits of algebras.
Any (ck
ij) ∈ Jorn which corresponds to a nilpotent Jordan algebra has to satisfy polyno-
mial equation, thus the set of nilpotent Jordan algebras in dimension n possess a structure
of algebraic variety embedded in JorNn ⊆ Jorn. Further in this section we collect the prop-
erties of deformation which will be used to describe JorN5. The first fact is straightforward
but very useful.
Lemma 5. [9] Let Ji and J (cid:48)i be in Jorni, for i = 1, 2. If Ji → J (cid:48)i , then J1 ⊕ J2 → J (cid:48)1 ⊕ J (cid:48)2.
Example 6. From the description of JorN4 in [10] it follows that F62 → F63 → F64 and
F62 → F65, consequently J4 → J3 → J2 and J4 → J1.
9
The other way to deform one algebra into another is to build a curve as specified in
Lemma 7.
Lemma 7. [2]Suppose that there exists a curve γ in Jorn which generically lies in a subvariety
Example 8. Let γ(t) =(cid:8)et
U and which cuts J G in special point then J ∈ U.
1 = √2t2n1 −
1,et
√2t2n2 + 2t2n3 − t2n4, et
2 = 2√2t4n2 + 4t4n4, et
4 = 4t6(n4 + n5) and
5 = 8t8n5. Thus γ defines a curve in JorN5 which for any t (cid:54)= 0 belongs to J G
21 (observe
et
4 and for t → 0 we get the multiplication table
that det γ(t) = −28t23). However, et
2et
of J18. Thus, from Lemma 7, it follows that J18 ∈ J G
(cid:9) be a change of basis of J21 given by: et
3 = √2t3(n1 + n2), et
21, i.e., J21 → J18.
3 = tet
2,et
3,et
4,et
5
The non-existence of deformation for a given pair of algebras J1,J2 ∈ Jorn will follow
from the violation of one of the conditions below.
Theorem 9. If J1 → J2 then:
1. dim Aut(J1) < dim Aut(J2);
2. dim Ann(J1) ≤ dim Ann(J2);
3. dim(J m
4. dim Z(J1) ≤ dim Z(J2).
1 ) ≥ dim(J m
2 ), for any positive integer m;
basis for J ∈ Jorn and a =(cid:80)n
Proof. For the proof of (1) to (3) we refer to [9]. To see (4), it suffices to prove that the sets
{J ∈ Jorn dim Z(J ) ≥ s} are Zariski-closed in Jorn for any s ∈ N. Let e1, e2, . . . , en be a
i=1 αiei ∈ Z(J ). Substituting a in each of the 3n2 equations
(a, ei, ej) = 0, (ei, a, ej) = 0 and (ei, ej, a) = 0 for i, j = 1, . . . , n, we obtain a system with
3n3 equations having αi as unknowns. Then dim Z(J ) = n − rank(P3n3,n), where P3n3,n
is the matrix of the system, thus the condition dim Z(J ) ≥ s is equivalent to the fact that
all (n − s + 1)-minors of P3n3,n vanish, which is defined by a finite number of polynomial
identities in the structure constants.
As direct consequences of (3) and (4), respectively, we have:
Corollary 10.
1. If J1 and J2 are nilpotent Jordan algebras such as J1 → J2 then nilindex(J1) ≥
nilindex(J2).
2. Any deformation of a non-associative algebra is a non-associative algebra.
4 Deformations of infinite families of algebras
Whenever the class of algebras consists of only finitely many non-isomorphic algebras,
the irreducible components are completely determined by rigid algebras, see Jorn, n ≤ 4.
When we have infinite number of non-isomorphic algebras it is not necessarily that any
irreducible component contains an open orbit. In [1], Flanigan showed that there exists an
infinite family of nilpotent algebras of dimension three such that the closure of a union of
their orbits is an irreducible component in AssocN3, while it carries no open orbit. In the
next section, we will show that such irreducible component exists in JorN5. In general,
the behaviour of infinite families under deformation is of particular interest and in what
10
follows we will look into examples of deformations in JorN5 which involve families. First,
to establish the notation denote by
(cid:91)
α∈T
N #
i =
i )G ,
(J α
the union of the orbits of algebras in the family J α
4.1. Infinite family is dominated by a single algebra
i , α ∈ T where T is some subset of k.
3 )t2n4 + α2
(cid:1)2 = t4et
Since(cid:0)et
The infinite family J α
15, α ∈ k, is dominated by algebra J22. To see that, for any
α ∈ k consider a change of basis of J22 parametrized by γα(t): et
3 n2 + tn3,
3 n4 and
2 = t4n2 + (1 − 2α
et
5 = t8n5. Observe that det(γα) = t25 thus, for any t (cid:54)= 0, the curve γα(t) belongs to J G
22.
et
15. Therefore
4
N #
22.
15 ⊂ J G
4.2. Infinite family is a deformation of a single algebra
5 it follows that γα(0) gives the multiplication table of J α
3 = t6n4 − (−1 + α)t4n5, et
4 = t4n2 − t5n3 + αt2
1 = t2n1 − α
9 n5, et
3 +αet
23, meaning that, for any t (cid:54)= 0, γ(t) ⊂ N #
23 and cuts J G
23, β ∈ k to J41 is quite remarkable, since no single
Indeed dim Aut(J41) = dim Aut(J β
23) for all β ∈ k.
2 n2,
5 = t2n3 − tn4. So the curve γ(t) lies transversely
41 in t = 0. Thus
1 = tn1 − 1
, where β(t) = 1
t , namely: et
23
The deformation from the family J β
4 = t
2 n3, et
4 n5 and et
member of J β
23 can dominate J41.
Consider the "variable" change of basis of J β(t)
2 n2, et
3 = − t
2 = − 1
et
to the orbits of J β
J41 ∈ N #
as a deformation of N #
defines the multiplication in J α0
(cid:0)
this case J 1
2 = n2 + (−1 + t)n4, et
et
J 1
(cid:1)G and cuts J G
k . We use the basis of J α
15
23. We will abuse the notation and will denote this fact by J β
Observe that in the same way we obtain that any algebra J α
23 → J41.
k of a family can be viewed
k from Table 3, then for any fixed α0 γ(α)
k while for all other values of α algebra belongs to N #
k .
In a rather different way, we obtain the dominance of J39 by the family J α
15 (a single member of J α
15, α ∈ k) dominates J39. Consider the curve: et
4 = t2n5 and et
(cid:0)
39 in t = 0 and G
5 in t = 1, respectively. Then we have
15, α ∈ k. In
1 = tn1,
5 = t2n2. For any t (cid:54)= 0, 1, the curve lies in
(cid:0)
3 = tn3, et
(cid:91)
(cid:1)G ⊆
α∈k
(cid:1)G ⊆ N #
15
J α
15
J39 ∈
J 1
15
and, therefore, J α
4.3. Deformations between families
15 → J39.
The family J ε,φ
27 since dim Aut(J δ
26 deforms into any single member of J ε,φ
27 , ε, φ ∈ k and εφ (cid:54)= 1, dominates the family J δ
26, δ ∈ k∗. Again no single
26) = dim Aut(J ε,φ
27 ),
member of J δ
for all δ, ε, φ ∈ k. For any fixed δ ∈ k∗, we construct a curve γδ(t) which lie trans-
versely to the orbits of J ε,φ
, where
27
3 = t2δ2n3, et
4 = δ2n4 and
1 = tδn1, et
(ε(t), φ(t)) = (tδ, 1
5 = tδ3n5. For any t (cid:54)= 0, the curve lies in N #
et
t = 0. Thus J δ
Differently, we obtain the dominance of the family J γ
J β
23, β ∈ k.
where β0 = (1−2γ0)i
27 . Consider the "variable" change of basis of J ε(t),φ(t)
J δ
26 ∈ N #
In this case, fixing γ0 ∈ k∗ − {1,− 1
1 = − i√γ0
√γ0
2} by the family
24 deforms into J β0
23 ,
n4,
3 = − 1
2}, the algebra J γ0
n1 + n2, et
2 = tn2, et
2 = δn2, et
27 and, since et
5, cuts (cid:0)
24, γ ∈ k∗ − {1,− 1
27, for any δ ∈ k∗.
t2 ), defined as: et
. Define the curve: et
(cid:1)G in
n3 − 2i√γ0
3 = tet
2et
γ0
26
11
n5. For any t (cid:54)= 0, the curve lies in the G-orbit of J β0
23 and,
n4 and et
4 = − it√γ0
et
since et
2et
4 = tγ0et
5, cuts(cid:0)
5 = − it√γ3
J γ0
24
0
(cid:1)G in t = 0. Therefore
(cid:17)G
(cid:16)
J γ0
24 ∈
J β0
24, for all γ ∈ k∗ − {1,− 1
2}.
23
⊆ N #
23
23 → J γ
consequently J β
5 The algebraic variety JorN5
In this section, we will describe the algebraic variety of five-dimensional Jordan algebras
JorN5. First we show that any structure can be deformed either into one of the given four
algebras or into the algebras in family J ε,φ
27 . The main tool of the proof is Lemma 7, to
define a curve γ(t) we use notations and basis of Table 3.
40 or N #
Lemma 11. Every structure J ∈ JorN5 belongs to G
27.
Proof. All associative structures, namely i for i = 1, . . . , 25, belong to G
1 . In fact, G. Maz-
zola in [2] showed that the subvariety of associative algebras is an irreducible subvariety in
JorN5 and that the orbit G
1 is open, thus its closure contains all associative structure. From
Corollary 10 it follows that there is no non-associative structure which deforms into 1.
22, J G
21, J G
1 , J G
All algebras Ji for i = 1, . . . , 20 except for the family J α
15, are dominated by J21. Exam-
ple 8 gives J21 → J18. For the deformation J18 → J17, consider a family of algebras with
the following basis
8t2 n4,
1 = −t2n1 + 1
2 n2 − tn3 + 1
et
2 = −t8n2 − 3t6
et
2 n4,
3 = t4n2 − t5n3 + t2
et
et
4 = t10n4 + t8n5,
et
5 = −t12n5.
2 n4,
(3)
algebras isomorphic to J18, while for t = 0 one obtains J17 (indeed, (cid:0)et
Here {n1, . . . , n5} is the basis of J18 given in Table 3, t ∈ k and therefore this family can
be viewed as a curve γ(t) ∈ JorN5. For any fixed t (cid:54)= 0 the change of basis (3) determines
5).
Analogously, the change of basis et
5 = t2n5 of
J17 does the trick for J17 → J16. Applying Lemma 7 to given transformations we obtain
the following deformations:
(cid:1)2 = −t4et
4 = t2n4 and et
2 = t2n2, et
3 = tn3, et
1 = n1, et
2
2 n2 + n3
t3 n1
t n2
t2 n3
t4 n4
t6 n5
J19 → J12
1 = n1 − 1
et
et
2 = tn3 + n4
et
3 = tn4 + n5
et
4 = it(n2 − n3)
J21 → J20 J20 → J19
1 = 1
1 = t2n1
et
et
2 = 1
et
et
2 = n2
3 = 1
et
et
3 = tn3
4 = 1
et
4 = t2n4
et
5 = 1
et
et
5 = t3n5
J12 → J11
et
1 = n1
et
2 = t2n2
et
3 = t2n3
et
4 = tn4
5 = t2n5
et
To obtain J21 → J9 consider the following change of basis et
5 = 1
(cid:1) n4 and et
n2 − n3 +(cid:0) 1
n1 + 1√2
2t2 n4, et
et
5 = tn5
4t
n2,
1 = − 1√2t
2t2 n5 of J21. Deformations
4 = − 1√2
3 = − 1
et
J4 → J3 → J2 and J4 → J1 follow from Example 6. Suppose {n1, . . . , n5} is the basis of
J9, then et
1 = tn1 − 1
2 n3 + t3n4
5 = t4n5 for any t (cid:54)= 0 defines algebras which are isomorphic to J9. Meanwhile
and et
5 thus, when t tends to zero, we get the structure constants of algebra J10. The
4 = tet
et
3et
2 − 1
2 n3 + t2n4, et
3 = t2(n3 − n5), et
2 = tn2 − 1
2 n3 + t2n4, et
2 = 1√2t
4 = t
n1, et
J20 → J8
et
1 = tn1
et
2 = n2
et
3 = tn4
4 = tn3 + t2n4
et
et
5 = t2n5
12
1 = n1− t2n2 +√2tn4, et
n4
5 = −t6n5 of J10 does the trick for J10 → J13. To complete the description of orbits
21 use Lemma 7 for the following cases:
2 = −t2n1 + n3−√2tn4, et
3 = t4n3− 4t2n5, et
2 n3− t5
2√2
4 = t4
basis et
and et
inside J G
1 = it√2
et
(n1 − n2)
J13 → J14
et
1 = n2
et
3 = n3
et
4 = n5
et
5 = tn1
et
2 = t(−n1 + n2)
J7 → J4
et
1 = n1 + n4
et
2 = n2 + n4
J8 → J7
et
1 = n2
et
2 = tn1
et
3 = tn3
et
4 = n4
et
5 = tn5
J10 → J5
et
2 = t2n3
3 = t2
et
2 (n1 + n2)
et
4 = t2n4
5 = t4n5
et
15, α ∈ k deforms into algebra
15 → J39 follow from Sections 4.1 and 4.2. To show that
3 = tn3,
5 = n5 of J39. The deformation J22 → J33 is given by the change of basis
2 = t4n2 + n4, et
5 = t6n4 + t2n5 of J22. The
J22. Deformations J22 → J α
J39 → J34 we use again Lemma 7 applying it to the curve γ(t) : et
4 = tn4 and et
et
4 = t5n5 and et
1 = t2n1 + n3, et
et
curve γ(t) :
Any algebra J28, J30 -J34, J39 as well as the family J α
J5 → J6
et
1 = n1 + n4
et
2 = n2 + n5
et
3 = tn3
et
4 = tn4
et
5 = tn5
et
3 = −tn3
et
4 = n4
et
5 = −tn5
2 = tn2, et
1 = n1, et
3 = tn2 − t3n3, et
et
1 = t2n1 + n2 + tn3,
et
2 = t4n2 + 2tn4 + 3t2n5,
3 = t4
et
4 = 2t9
et
et
5 = t5n4 + t6n5
3 n2 + 2t5
3 n4,
3 n3,
27 n4 + t2
2 n3, et
4 = t5
1 = n1, et
2 = n2, et
2 n4 and et
3 = 1
3 = 1
12 n2 + t
2 n2 + n3, et
4 = −tn4 and et
belongs to J G
basis et
3 = t(n2 − n3), et
(cid:1)2 = 2tet
defines algebra isomorphic to J32. Observe that (cid:0)et
33 for any t (cid:54)= 0 and intersects J32 when t = 0, thus J33 → J32. The new
5 = n5 of J32 for any t (cid:54)= 0
4, thus we get the structure
3 n3,
4 n5 of J33 and
5 = n4 + n5 of J30 give J33 → J30
t2 n1,
1 = 1
3 = tn3,
J31 when t tends to zero, i.e. J32 → J31. The changes of basis et
3 n5, et
2 = t4n2 + 2t
5 = t
et
2 = t2n2, et
1 = t(n1 + n2), et
et
and J30 → J28, respectively.
4 = 1
2 = 1
et
4 = tn5 and et
et
Next, J40 → J38 → J36. Indeed, we apply Lemma 7 to the change of basis et
2 = tn1, et
t4 n5 of J40 and et
5 = 1
5 = t2n4, of J38, respectively.
Finally, the orbits of remaining structures, i.e. families J β
J25, J35, J41, belong to the closure of N #
23 → J γ
J β
24 follow from Sections 4.2 and 4.3.
Further, we show that J ε,φ
J ε(t),φ(t)
:
23, J γ
27. The deformations J ε,φ
26 as well as algebras
23 → J41 and
23 for any fix β0 ∈ k. Consider the change of basis of
1 = t2n1 + 1
12 n4 + t2
24, J δ
27 → J δ
4 = t2n4 and et
27 → J β0
t5 n4 and et
1 = n2, et
t n2, et
3 = 1
t3 n3, et
26, J β
9 n2 + t
27
3
(cid:18)
et
1 = (−1 − tβ0)n1 − n2,
et
2 = tn2,
et
3 = (1 + tβ0)2n3 + n4,
et
4 = −tn4,
et
5 = t2(1 + tβ0)n5,
(ε(t), φ(t)) =
(cid:19)
.
−1 − tβ0, −1 − t2 − tβ0
(1 + tβ0)2
Note that ε(t)φ(t) = 1 + t2
for t = 0 it gives J β0
23 .
and et
1+tβ0
Applying Lemma 7 to the basis transformation et
5 = −2t2n3 + t2n5 of J41 we obtain J41 → J35.
then, while for any t (cid:54)= 0 this basis defines structure in N #
27,
1 = n2, et
2 = tn1−tn2, et
3 = tn3, et
4 = tn4
13
24
27
(cid:17)2
27
2 = −2tn2, et
, γ(t) = t−1
24. For any t (cid:54)= 0, φ(t) ⊂ N #
27 is not contained in the Zariski closure of the orbits of any
To show that J γ
1 = n1 + n2, et
5 = tn5, where {n1, . . . , n5} is a basis of J γ(t)
24 → J25, define a curve φ(t) ⊂ JorN5, as been the set of structure
3 = n3 + 2n4, et
4 = −2tn4
2 . Analogously to Section
24, while φ(0)
constants of algebras with the basis et
and et
4.2, the curve lies transversely to the orbits of J γ
corresponds to the structure constants of J25.
Lemma 12. The infinite union N #
algebra in JorN5.
(cid:16)
Proof. By Corollary 10 the non-associative algebra J ε,φ
can not be deformed into the
associative algebra 1 for any ε, φ ∈ k. Observe that for any ε, φ ∈ k with εφ (cid:54)= 1,
27 ) = 1. Applying Theorem 9 item 3 and item 2 we
dim
obtain that J21 (cid:57) J ε,φ
27 , first observe that J22 does not deform into the other three
algebras from Lemma 11. Indeed, comparing the dimensions of the automorphism group
we deduce that 1 (cid:57) J22 and J40 (cid:57) J22, while the dimensions of the second power provide
that J G
22 is a irreducible
component of JorN5. Since N #
27 is contained in the irreducible component C and both has
the same dimension dimN #
27 is a dense subset of C and
22 is open in C then there exists J ∈ N #
22, i.e., J (cid:39) J22, a contradiction
J G
by Theorem 4.
J ε,φ
To see that J22 (cid:57) J ε,φ
= 3 and dim Ann(J ε,φ
27 and J40 (cid:57) J ε,φ
22 then J22 is rigid and C = J G
27 , when εφ (cid:54)= 1, respectively.
27 = 21 = dimC, N #
21. Suppose that N #
27 such as J ∈ J G
27 = C. So, N #
(cid:42) J G
22
27 ⊆ J G
27
(cid:16)
(cid:17)G
27 belong
and
In particular, we proved
27 is a product of two irreducible varieties
27 determines a component of the variety JorN5.
Corollary 13. N #
that a finite-dimensional Jordan algebras not necessarily deforms into rigid one.
Proof. From Lemma 12 it follows that we only have to show that all algebras in N #
to the same component. In fact N #
J ε,φ
k2 = {(ε, φ) ε, φ ∈ k} and is therefore irreducible.
Lemma 14. Algebras 1, J21, J22 and J40 are rigid.
Proof. By a similar argument as in proof of Lemma 12 we can show that J G
27 and
therefore J22 is rigid. To show that the other three algebras are rigid it is sufficient to prove
that there are no deformations between them and that none of these algebras is dominated
by the family J ε,φ
27 .
Using the dimension argument for the second power of an algebra we have J21 (cid:57) 1,
J22 (cid:57) 1 and J21 (cid:57) J40, while comparing the dimension of the annihilator we obtain
J40 (cid:57) 1. Thus we have shown that 1 is a rigid algebra in JorN5 too. The associative al-
gebra 1 can not dominate non-associative algebras, thus 1 (cid:57) J21 and 1 (cid:57) J40. Also, due
to the dimension argument for the automorphism group we get J22 (cid:57) J40 and comparing
the dimension of the associative center we have J22 (cid:57) J21 and J40 (cid:57) J21. On the other
(cid:42) N #
hand dimJ G
27 and therefore J21 is a rigid
algebra. Finally suppose that J40 belongs to the component N #
27. Note that the dimensions
40 and N #
of J G
27 are both equal to 21, therefore
21 = 22 while dimN #
27 = 21 leading to J G
22 (cid:54)⊆ N #
21
Which is impossible since dim Ann(J40) = 2, while dim Ann(J ε,φ
εφ (cid:54)= 1. Consequently J40 is a rigid algebra.
27 ) = 1 for ε, φ ∈ k with
40 = N #
J G
27.
14
Finally, note that the change of basis given by identity matrix I5 multiplied by t guar-
antees J → 25 for any J ∈ JorN5. Consequently, JorN5 is a connected affine variety.
Therefore we have proved the following theorem.
Theorem 15. The algebraic variety JorN5 of five-dimensional nilpotent Jordan algebras is
a connected affine variety with an infinite number of orbits under the action of the group G.
Furthermore, it has four irreducible components given by Zariski closures of the orbits of the
rigid algebras 1, J21, J22 and J40 and one more component that is the Zariski closure of the
infinite union N #
27.
The diagram of JorN5 was represented in Figure 1.
15
Figure 1: The irreducible components of JorN5
16
222120191817160all associative algebrasdimCJ1J2J3J4J5J6J7J8J9J10J11J12J13J14Jα15J16J17J18J19J20J21J22Jβ23Jγ24J024J−1224J25Jδ26J026Jε,φ27Jε,ε−127J−1,−127J28J30J31J32J33J34J35J36J38J39J40J41ǫ1ǫ256 References
[1] F. Flanigan, Algebraic Geography: Varieties of Structure Constants, Pacific Journal of Mathematics 27 (1)
(1968) 71–79.
[2] G. Mazzola, Generic Finite Schemes and Hochschild Cocycles, Commentarii Mathematici Helvetici 55
(1980) 267–293.
[3] A. Makhlouf, The irreducible components of the nilpotent associative algebras, Revista Matemática Com-
plutense 6 (1) (1993) 27.
[4] F. Grunewald, J. O'Halloran, Varieties of nilpotent Lie algebras of dimension less than six, Journal of
Algebra 112 (2) (1988) 315–325.
[5] S. Craig, Degenerations of 6-dimensional nilpotent lie algebras over C, Communications in Algebra
18 (10) (1990) 3493–3505.
[6] M. Goze, J. A. Bermudez, On the varieties of nilpotent lie algebras of dimension 7 and 8, Journal of pure
and applied algebra 77 (2) (1992) 131–140.
[7] J. M. Ancochea-Bermudez, J. R. Gómez-Martin, G. Valeiras, M. Goze, Sur les composantes irréductibles
de la varieté des lois d'algèbres de lie nilpotentes, Journal of Pure and Applied Algebra 106 (1) (1996)
11 – 22.
[8] I. Kashuba, I. Shestakov, Jordan Algebras of Dimension Three: Geometric Classification and Represen-
tation Type, Actas del XVI Coloquio Latinoamericano de Álgebra (Colonia del Sacramento, Uruguay).
Biblioteca de la Revista Matemática Iberoamericana 1 (2005) 295–315.
[9] I. Kashuba, M. E. Martin, Deformations of Jordan Algebras of Dimension Four, Journal of Algebra 399
(2014) 277–289.
[10] J. M. Ancochea Bermúdez, J. Fresán, J. M. Bentabol, Contractions of Low-Dimensional Nilpotent Jordan
Algebras, Communications in Algebra 39 (3) (2011) 1139–1151.
[11] M. E. Martin, Four Dimensional Jordan Algebras, International Journal of Mathematics, Game Theory
and Algebra 20 (4) (2013) 41–59.
[12] A. Hegazi, H. Abdelwahab, Classification of five dimensional nilpotent jordan algebras, arXiv preprint
arXiv:1401.3992.
17
|
0901.4888 | 3 | 0901 | 2012-02-17T14:18:48 | Polynomial functions over bounded distributive lattices | [
"math.RA",
"math.CO"
] | Let L be a bounded distributive lattice. We give several characterizations of those L^n --> L mappings that are polynomial functions, i.e., functions which can be obtained from projections and constant functions using binary joins and meets. Moreover, we discuss the disjunctive normal form representations of these polynomial functions. | math.RA | math |
POLYNOMIAL FUNCTIONS OVER BOUNDED
DISTRIBUTIVE LATTICES
MIGUEL COUCEIRO AND JEAN-LUC MARICHAL
Abstract. Let L be a bounded distributive lattice. We give several
characterizations of those Ln
→ L mappings that are polynomial func-
tions, i.e., functions which can be obtained from projections and con-
stant functions using binary joins and meets. Moreover, we discuss the
disjunctive normal form representations of these polynomial functions.
Keywords: Distributive lattice; polynomial function; normal form; func-
tional equation.
1. Introduction
Let (L; ∧, ∨) be a lattice. With no danger of ambiguity, we denote lattices
by their universes. By a (lattice) polynomial function we simply mean a map
f : Ln → L which can be obtained by composition of the binary operations ∧
and ∨, the projections, and the constant functions; see, e.g., page 93 in [2]. If
constant functions are not used, then these polynomial functions are usually
referred to as term functions. For general background, see [2, 5, 6, 10]
For a finite lattice L, the set of all polynomial functions on L is well
understood.
Indeed, Kindermann [11] reduces the problem of describing
polynomial functions to tolerances, and reasonable descriptions for the latter
have been provided in Czedli and Klukovits [4] and Chajda [3].
The goal of the current paper is to present a more direct approach to
polynomial functions and provide alternative descriptions, different in nature
and flavor, in the case when L is distributive, with 0 and 1 as bottom and
top elements. Notably enough, instead of finiteness it suffices to assume that
L is a bounded distributive lattice. So, throughout the paper, we assume
that L is a bounded distributive lattice. Also, functions that are not order-
preserving cannot be polynomial functions. Thus, our main result focuses
on order-preserving functions.
We shall make use of the following notation. The ternary median term
(x∨y)∧(x∨z)∧(y∨z) will be denoted by med(x, y, z). For c ∈ L, the constant
tuple (c, . . . , c) in Ln will be denoted by c. For k ∈ [n] = {1, . . . , n}, a ∈ L,
k be the tuple in Ln whose ith component is
and x = (x1, . . . , xn) ∈ Ln, let xa
a, if i = k, and xi, otherwise. Let [x]c (resp. [x]c) denote the n-tuple whose
ith component is 0 (resp. 1), if xi 6 c (resp. xi > c), and xi, otherwise.
Date: December 2, 2009.
1
2
MIGUEL COUCEIRO AND JEAN-LUC MARICHAL
k).
−k(x) = f (ax
The range of a function f : Ln → L is defined by R(f ) = {f (x) : x ∈ Ln}.
For k ∈ [n] and a = (a1, . . . , an) ∈ Ln, we also define the unary function
−k : L → L as f a
f a
Note that if f : Ln → L is a polynomial function, then every unary func-
tion g obtained from f by substituting constants for n−m of its variables and
identifying the remaining m variables is also a polynomial function. In fact,
it is not difficult to see that such a function g is of the form med(a, x, b),
for some a, b ∈ L, and thus every such function g preserves ∧ and ∨. In
particular, we have the following fact.
Fact 1. Every polynomial function f : Ln → L satisfies condition (1) and
its dual, where
(1)
f (xa∧b
k
) = f (xa
k) ∧ f (xb
k)
for all x ∈ Ln, a, b ∈ L, and k ∈ [n].
Moreover, every function f : Ln → L satisfying (1) or its dual is order-
preserving.
The following result reassembles the various characterizations of polyno-
mial functions provided in this paper, and its proof is given in Section 2.
Main Theorem. Let L be a bounded distributive lattice and f : Ln → L,
n > 1, be an order-preserving function. The following conditions are equiv-
alent:
(i) f is a polynomial function;
(ii) for every x ∈ Ln and k ∈ [n],
(2)
f (x) = med(cid:0)f (x0
k), xk, f (x1
k)(cid:1);
(iii) f satisfies (1) and its dual, the sets R(f ) and R(f a
−k), for every
a ∈ Ln and k ∈ [n], are convex, and for every x ∈ Ln and k ∈ [n],
(3)
f (x)
f (x
k
) = f (x);
(iv) f satisfies condition (4) and its dual, where
(4)
(5)
f (x ∧ c) = f (x) ∧ c
for all c ∈ [f (0), f (1)];
(v) f satisfies the dual of (1), and (4), and
f (x) = f (x ∧ c) ∨ f ([x]c)
for all c ∈ [f (0), f (1)];
(vi) f satisfies (1) and its dual, (5) and its dual, and
(6)
f (c) = c
for all c ∈ [f (0), f (1)].
Even though not evident at the first sight, note that from the Main Theo-
rem it follows that (v) is equivalent to its dual. Note also that every function
satisfying (2) is order-preserving. The equivalence between (i) and (ii) was
first established in [14, Theorem 17]. Moreover, by Fact 1, it follows that
the order-preservation condition is redundant for all except assertion (iv).
POLYNOMIAL FUNCTIONS OVER BOUNDED DISTRIBUTIVE LATTICES
3
Let 2[n] denote the set of all subsets of [n]. If α : 2[n] → L is a mapping,
then
(7)
_
I⊆[n]
(cid:0)α(I) ∧ ^
i∈I
xi(cid:1)
is called a disjunctive normal form over L. For a function f : Ln → L,
let DNF(f ) denote the set of those maps α : 2[n] → L for which (7), as an
Ln → L mapping, coincides with f . Observe that DNF(f ) = ∅ if f is not
a polynomial function. For I ⊆ [n], let eI be the characteristic vector of
I, i.e., the tuple in Ln whose ith component is 1 if i ∈ I, and 0 otherwise.
Define αf : 2[n] → L, I 7→ f (eI ).
Lemma 2 (Goodstein [8]). If L is a bounded distributive lattice and f : Ln →
L a polynomial function, then αf ∈ DNF(f ). In particular, each polynomial
function has a disjunctive normal form representation.
By Lemma 2, for each polynomial function f : Ln → L, we have that
(8)
f is uniquely determined by its restriction to {0, 1}n.
It is noteworthy that, by (8), term functions are exactly those polynomial
functions f : Ln → L for which {0}, {1}, and {0, 1} constitute subalgebras
of (L, f ). In addition to the Main Theorem, we prove the following result
strengthening Lemma 2.
Proposition 3. Let L be a bounded distributive lattice, f : Ln → L a poly-
nomial function, and α : 2[n] → L a mapping. Then α ∈ DNF(f ) if and only
if WJ⊆I α(J) = αf (I) for all I ⊆ [n].
Using Proposition 3, it is straightforward to construct examples of lattices
L and polynomial functions f : Ln → L for which DNF(f ) > 1, and to
provide some technical conditions characterizing those polynomial functions
f for which DNF(f ) = 1. The trivial details are left to the reader.
2. Technicalities and proofs
In this section we provide the proofs of the Main Theorem and Proposition
3. First, we prove the latter.
Proof of Proposition 3. Let L be a bounded distributive lattice, f : Ln →
L a polynomial function, and α : 2[n] → L a mapping.
Suppose first that α ∈ DNF(f ). Then, for every I ⊆ [n], αf (I) = f (eI) =
WJ⊆I α(J). Now suppose that WJ⊆I α(J) = αf (I), for all I ⊆ [n], and let
g : Ln → L be the polynomial function such that α ∈ DNF(g). Clearly, for
every I ⊆ [n], we have g(eI ) = WJ⊆I α(J) = αf (I) = f (eI ). From (8) it
follows that g = f and hence, α ∈ DNF(f ).
(cid:3)
To prove the Main Theorem we will need some auxiliary results. We
proceed by focusing first on the conditions given in (iv), (v), and (vi).
Lemma 4. Every polynomial function f : Ln → L satisfies (4) and its dual.
4
MIGUEL COUCEIRO AND JEAN-LUC MARICHAL
Proof. Let f : Ln → L be a polynomial function. For any c ∈ [f (0), f (1)],
we have
f (x ∧ c) = _
(xi ∧ c)(cid:17) = f (0) ∨ _
(cid:16)αf (I) ∧ ^
(cid:16)αf (I) ∧ ^
(xi ∧ c)(cid:17)
I⊆[n]
i∈I
I⊆[n]
I6=∅
i∈I
= (cid:16)f (0) ∨ _
I⊆[n]
I6=∅
(cid:0)αf (I) ∧ ^
i∈I
xi(cid:1)(cid:17) ∧ c = f (x) ∧ c.
Similarly, it follows that f satisfies the dual of (4).
Lemma 5. Let f : Ln → L be an order-preserving function. If f satisfies
(4) or its dual, then it satisfies (6).
In particular, R(f ) coincides with
[f (0), f (1)] and thus is convex.
(cid:3)
Proof. If f satisfies (4), then for any c ∈ [f (0), f (1)], we have f (c) = f (1 ∧
c) = f (1) ∧ c = c and thus f satisfies (6). The dual statement follows
similarly. The last claim follows immediately from (6).
(cid:3)
Lemma 6. Let f : L → L be an order-preserving function. If f satisfies (4)
and its dual, then it preserves ∧ and ∨.
Proof. If f : L → L satisfies (4) and its dual, by Lemma 5, it satisfies (6).
Then, for every x ∈ L, we have
f (x) = med(f (0), f (x), f (1)) = f (med(f (0), x, f (1)))
= med(f (0), x, f (1)).
It is then immediate to see that f preserves ∧ and ∨.
Lemma 7. Let f : Ln → L be an order-preserving function. If f satisfies
(4) and its dual, then it satisfies (5) and its dual. Moreover, f satisfies (1)
and its dual.
Proof. Suppose that f satisfies (4) and its dual. For any x ∈ Ln and any
c ∈ [f (0), f (1)], we have
(cid:3)
f (x ∧ c) ∨ f ([x]c) = (cid:0)f (x) ∧ c(cid:1) ∨ f ([x]c)
= (cid:0)f (x) ∨ f ([x]c)(cid:1) ∧ (cid:0)c ∨ f ([x]c)(cid:1)
= f (x) ∧ f (c ∨ [x]c) = f (x)
and hence, f satisfies (5). The dual statement follows similarly.
Claim 1. For every k ∈ [n] and a ∈ Ln, the unary function f a
and its dual.
Proof of Claim 1. Let k ∈ [n], a ∈ Ln, and consider c ∈ [f a
(5), (4), and the dual of (4), for x ∈ L, we have
−k ([x ∨ c]c) = (cid:0)f a
−k (x ∨ c)
−k(x ∨ c) = f a∧c
f a
= c ∨ f
−k ([x ∨ c]c) = f a∨c
−k(1) ∧ c(cid:1) ∨ f
−k (c) ∨ f
[a]c
[a]c
−k satisfies (4)
−k(0), f a
−k(1)]. By
[a]c
−k ([x ∨ c]c)
= f a
−k(x) ∨ c.
POLYNOMIAL FUNCTIONS OVER BOUNDED DISTRIBUTIVE LATTICES
5
Therefore f a
satisfies (4).
−k satisfies the dual of (4). Similarly, we can prove that it also
(cid:3)
By Claim 1, each function f a
preserves ∧ and ∨.
−k satisfies (4) and its dual. By Lemma 6, it
(cid:3)
As mentioned, the equivalence between (i) and (ii) in the Main Theorem
was shown in [14, Theorem 17]. For the sake of self-containment, we provide
a simpler proof here.
Proposition 8 ([14]). A function f : Ln → L is a polynomial function if
and only if it satisfies (2) for every x ∈ Ln and k ∈ [n].
Proof. On the one hand, if f : Ln → L is a polynomial function, then, for
every x ∈ Ln and k ∈ [n], we have
f (x0
k) = _
I⊆[n]
I6∋k
(cid:16)αf (I) ∧ ^
i∈I
xi(cid:17)
and
f (x1
k) = _
I⊆[n]
I6∋k
(cid:16)αf (I) ∧ ^
i∈I
xi(cid:17) ∨ _
I⊆[n]
I∋k
(cid:16)αf (I) ∧ ^
i∈I\{k}
xi(cid:17)
= f (x0
k) ∨ _
I⊆[n]
I∋k
(cid:16)αf (I) ∧ ^
i∈I\{k}
xi(cid:17)
and hence
med(cid:0)f (x0
k), xk, f (x1
k)(cid:1) = f (x0
k) ∨ (cid:0)xk ∧ f (x1
k)(cid:1) = f (x),
which shows that f satisfies (2) for every x ∈ Ln and k ∈ [n].
On the other hand, any function obtained from a function in this class by
substituting constants for variables, is also in the class. Thus, if a function
f : Ln → L satisfies (2) for every x ∈ Ln and k ∈ [n], then by repeated
applications of (2), we can easily verify that f can be obtained by compo-
sition of the binary operations ∨ and ∧, the projections, and the constant
functions. That is, f is a polynomial function.
(cid:3)
Now we focus on the conditions given in (iii), (v), and (vi) of the Main
Theorem. We shall make use of the following general result.
Lemma 9. Let C be a class of functions f : Ln → L (n > 1) such that
(i) the unary members of C are polynomial functions;
(ii) for n > 1, any unary function obtained from an n-ary function f in
C by substituting constants for n − 1 variables of f is also in C.
Then C is a class of polynomial functions.
6
MIGUEL COUCEIRO AND JEAN-LUC MARICHAL
Proof. Let C be a class of functions satisfying the conditions of the lemma.
We show that each f : Ln → L in C is a polynomial function. By condition
(i), the claim holds for n = 1. So suppose that n > 1. By Proposition 8, it
is enough to show that f satisfies (2) for every x ∈ Ln and k ∈ [n]. So let
a ∈ Ln and k ∈ [n]. By condition (ii), we have that f a
−k ∈ C, and hence f a
−k
−k satisfies (ii) of the Main
is a polynomial function. By Proposition 8, f a
Theorem, and hence,
f (a) = f a
−k(ak) = med(cid:0)f a
−k(0), ak, f a
−k(1)(cid:1) = med(cid:0)f (a0
k), ak, f (a1
k)(cid:1).
Since the above holds for every a ∈ Ln and k ∈ [n], it follows that f satisfies
(ii) of the Main Theorem, and thus it is a polynomial function.
(cid:3)
Note that, for n = 1, (3) reduces to the well-known idempotency equation
f ◦ f = f ; see for instance Kuczma et al. [12, §11.9E].
Proposition 10. A unary function f : L → L is a polynomial function if
and only if R(f ) is convex and f is a solution of the idempotency equation
that preserves ∧ and ∨.
Proof. By Proposition 8, every unary polynomial function f : L → L is of
the form f (x) = med(f (0), x, f (1)) and thus satisfies the conditions stated
in the proposition.
Conversely, let f : L → L be a solution of the idempotency equation
that preserves ∧ and ∨ and such that R(f ) is convex, and let x ∈ L. If
x ∈ [f (0), f (1)] = R(f ), then there is z ∈ L such that x = f (z) and hence
f (x) = f (f (z)) = f (z) = x = med(f (0), x, f (1)).
Otherwise, let z = med(f (0), x, f (1)) ∈ [f (0), f (1)]. Then, since f preserves
∧ and ∨, it is order-preserving, and we have
f (x) = med(cid:0)f (0), f (x), f (1)(cid:1) = med(cid:0)f (f (0)), f (x), f (f (1))(cid:1)
= f(cid:0) med(f (0), x, f (1))(cid:1) = f (z) = z = med(f (0), x, f (1)),
which shows that f is a polynomial function.
(cid:3)
Proposition 11. An order-preserving function f : Ln → L is a polynomial
function if and only if f satisfies (1), its dual, (3), and the sets R(f ) and
R(f a
−k), for every a ∈ Ln and k ∈ [n], are convex.
Proof. By Fact 1 and Lemmas 4 and 5, if f is a polynomial function, then f
satisfies (1), its dual, and R(f ) is convex. By Proposition 8, every polyno-
−k), for a ∈ Ln
mial function f satisfies (2) (and hence (3)) and each set R(f a
and k ∈ [n], is convex.
To prove the converse claim, consider the class C of order-preserving
functions f : Ln → L (n > 1) satisfying the conditions of the proposition.
Clearly, C satisfies condition (ii) of Lemma 9. By Proposition 10, C sat-
isfies also condition (i) of Lemma 9, and hence, C is a class of polynomial
functions.
(cid:3)
POLYNOMIAL FUNCTIONS OVER BOUNDED DISTRIBUTIVE LATTICES
7
Proposition 12. Let f : L → L be a function. The following conditions are
equivalent:
(i) f is a polynomial function;
(ii) f satisfies (4) and preserves ∨;
(iii) f satisfies (6) and preserves ∧ and ∨.
Proof. The implication (i) ⇒ (iii) follows from Lemmas 4, 5, and 6. The
implication (iii) ⇒ (ii) follows from the fact that if f satisfies (6) and
preserves ∧ then it satisfies (4). Finally, to see that the implication (ii) ⇒ (i)
holds, observe first that (4) implies (6) by Lemma 5. Since f preserves ∨, we
have that f satisfies the dual of (4). Moreover, f is clearly order-preserving,
and we have
f (x) = med(cid:0)f (0), f (x), f (1)(cid:1) = f (0) ∨ (cid:0)f (x) ∧ f (1)(cid:1)
= f(cid:0)f (0) ∨ (x ∧ f (1))(cid:1) = f(cid:0) med(f (0), x, f (1))(cid:1)
= med(f (0), x, f (1)),
which shows that f is a polynomial function.
(cid:3)
Proposition 13. An order-preserving function f : Ln → L is a polynomial
function if and only if f satisfies the dual of (1), and (4), and (5).
Proof. By Lemmas 4 and 7 it follows that the conditions are necessary.
To prove the converse claim, we make use of Lemma 9. Let C be the class
of order-preserving functions f : Ln → L (n > 1) satisfying the conditions
of the proposition. By Proposition 12, C satisfies condition (i) of Lemma 9.
To complete the proof, it is enough to show that (4) and (5) are preserved
under substituting constants for n − 1 variables, since then condition (ii) of
Lemma 9 will be also fulfilled. Thus, take f : Ln → L satisfying (4) and (5).
−k satisfies (4), just note that if
Let k ∈ [n] and a ∈ Ln. To see that f a
x ∈ L and c ∈ [f a
−k(0), f a
−k(1)] then,
−k(x ∧ c) = f a∧c
f a
= (f a
−k (x ∧ c) ∨ f
−k(x) ∧ c) ∨ f
−k(x) ∧ c.
= f a
[a]c
−k (0)
[a]c
−k (0)
(by (5))
(by (4))
To see that f a
have f (ax
−k satisfies (5), let x ∈ L and c ∈ [f a
k ∧ c) 6 f a
−k(x) = f (ax
f a
−k(x ∧ c) and f ([ax
k ∧ c) ∨ f ([ax
k]c) 6 f a
k]c) 6 f a
−k(x ∧ c) ∨ f a
−k(0), f a
−k(1)]. We clearly
−k([x]c). Hence, by (5), we get
−k([x]c) 6 f a
−k(x).
−k satisfies (5).
(cid:3)
Since the above holds for every x ∈ L, we have that f a
Proposition 14. An order-preserving function f : Ln → L is a polynomial
function if and only if f satisfies (1) and its dual, (5) and its dual, and (6).
Proof. By Lemmas 4, 5, and 7, it follows that the conditions are necessary.
To prove the converse claim, we make use of Lemma 9. Let C be the class
of order-preserving functions f : Ln → L (n > 1) satisfying the conditions
8
MIGUEL COUCEIRO AND JEAN-LUC MARICHAL
of the proposition. By Proposition 12, C satisfies condition (i) of Lemma 9.
To complete the proof, it is enough to show that (5), its dual, and (6)
are preserved under substituting constants for n − 1 variables, since then
condition (ii) of Lemma 9 will be also fulfilled. Thus, take f : Ln → L
satisfying (5), its dual, and (6).
Let k ∈ [n] and a ∈ Ln. To see that f a
−k satisfies (6), just note that if
c ∈ [f a
−k(0), f a
−k(1)] then, by (5) and its dual,
−k (0) 6 c 6 f a∨c
−k (c) ∨ f
[a]c
−k(c) = f a∧c
f a
−k (c) ∧ f
[a]c
−k (1) = f a
−k(c).
The proof that f a
of Proposition 13. The dual claim follows similarly.
−k satisfies (5) follows exactly the same steps as in the proof
(cid:3)
We can now provide a proof of the Main Theorem.
Proof of the Main Theorem. The equivalences (i) ⇔ (ii) ⇔ (iii) are
given by Propositions 8 and 11. The equivalence (i) ⇔ (iv) follows from
Lemmas 4 and 7, and Proposition 13. The equivalences (i) ⇔ (v) and
(i) ⇔ (vi) follow from Propositions 13 and 14, respectively.
(cid:3)
3. Concluding remarks
By the equivalence (i) ⇔ (iii), polynomial functions f : Ln → L with
f (0) = 0 and f (1) = 1 coincide exactly with those for which R(f ) = L.
These are referred to as discrete Sugeno integrals and were studied in [13]
where equivalence (i) ⇔ (iv) of the Main Theorem was established for this
particular case when L is an interval of the real line. Also, the implica-
tion (i) ⇒ (v) of the Main Theorem reduces to that established by Ben-
venuti, Mesiar, and Vivona [1] when L is an interval of the real line, since
in this case the dual of (1) becomes redundant. Condition (4) and its dual,
when strengthened to all c ∈ L, are referred to as ∧-homogeneity and ∨-
homogeneity, respectively; see [9]. These were used by Fodor and Roubens [7]
to axiomatize certain classes of aggregation functions over the reals.
Recall that the property of being order-preserving is a consequence of
all except assertion (iv) of the Main Theorem. Also, given the nature of
statements (iii) -- (vi), it is natural to ask whether the equivalences between
these and (i) continue to hold over non-distributive lattices. The reader can
easily verify that (already for unary polynomial functions) this is not the
case.
References
[1] P. Benvenuti, R. Mesiar, and D. Vivona. Monotone set functions-based integrals. In
Handbook of measure theory, Vol. I, II, pages 1329 -- 1379. North-Holland, Amsterdam,
2002.
[2] S. Burris and H. P. Sankappanavar. A Course in Universal Algebra, volume 78 of
Graduate Texts in Mathematics. Springer-Verlag, New York, 1981.
[3] I. Chajda. Albebraic Theory of Tolerance Relations. ISBN 80-7067-042-8, Olomouc,
1991.
POLYNOMIAL FUNCTIONS OVER BOUNDED DISTRIBUTIVE LATTICES
9
[4] G. Cz´edli and L. Klukovits. A note on tolerances of idempotent algebras. Glasnik
Matematicki, 18(38):35 -- 38, 1983.
[5] K. Denecke and S.L. Wismath. Hyperidentities and clones, volume 14 of Algebra,
Logic and Applications. Gordon and Breach Science Publishers, Amsterdam, 2000.
[6] K. Denecke and S.L. Wismath. Universal algebra and coalgebra. World Scientific Pub-
lishing, Hackensack, NJ, 2009.
[7] J. C. Fodor and M. Roubens. Characterization of weighted maximum and some re-
lated operations. Inform. Sci., 84(3-4):173 -- 180, 1995.
[8] R. L. Goodstein. The solution of equations in a lattice. Proc. Roy. Soc. Edinburgh
Sect. A, 67:231 -- 242, 1965/1967.
[9] M. Grabisch, J.-L. Marichal, R. Mesiar, and E. Pap. Aggregation functions. Encyclo-
pedia of Mathematics and its Applications. Cambridge University Press, Cambridge,
UK, 2009.
[10] G. Gratzer. General Lattice Theory. Birkhauser Verlag, Berlin, 2003. Second edition.
[11] M. Kindermann. Uber die Aquivalenz von Ordnungspolynomvollstandigkeit und Tol-
eranzeinfachheit endlicher Verbande. Contributions to General Algebra (Proceedings
of the Klagenfurt conference 1978), 145 -- 149, 1979.
[12] M. Kuczma, B. Choczewski, and R. Ger. Iterative Functional Equations. Cambridge
University Press, Cambridge, UK, 1990.
[13] J.-L. Marichal. On Sugeno integral as an aggregation function. Fuzzy Sets and Sys-
tems, 114(3):347 -- 365, 2000.
[14] J.-L. Marichal. Weighted lattice polynomials. Discrete Mathematics, 309(4):814 -- 820,
2009.
Mathematics Research Unit, FSTC, University of Luxembourg, 6, rue Coudenhove-
Kalergi, L-1359 Luxembourg-Kirchberg, Luxembourg.
E-mail address: miguel.couceiro[at]uni.lu
Mathematics Research Unit, FSTC, University of Luxembourg, 6, rue Coudenhove-
Kalergi, L-1359 Luxembourg-Kirchberg, Luxembourg.
E-mail address: jean-luc.marichal[at]uni.lu
|
0901.1395 | 3 | 0901 | 2018-05-01T10:58:54 | Invariants of Lie algebras extended over commutative algebras without unit | [
"math.RA",
"math.KT"
] | We establish results about the second cohomology with coefficients in the trivial module, symmetric invariant bilinear forms and derivations of a Lie algebra extended over a commutative associative algebra without unit. These results provide a simple unified approach to a number of questions treated earlier in completely separated ways: periodization of semisimple Lie algebras (Anna Larsson), derivation algebras, with prescribed semisimple part, of nilpotent Lie algebras (Benoist), and presentations of affine Kac-Moody algebras. | math.RA | math |
INVARIANTS OF LIE ALGEBRAS EXTENDED OVER COMMUTATIVE ALGEBRAS
WITHOUT UNIT
PASHA ZUSMANOVICH
ABSTRACT. We establish results about the second cohomology with coefficients in the trivial module,
symmetric invariant bilinear forms, and derivations of a Lie algebra extended over a commutative associa-
tive algebra without unit. These results provide a simple unified approach to a number of questions treated
earlier in completely separated ways: periodization of semisimple Lie algebras (Anna Larsson), derivation
algebras, with prescribed semisimple part, of nilpotent Lie algebras (Benoist), and presentations of affine
Kac-Moody algebras.
INTRODUCTION
In this paper we consider current Lie algebras, i.e., Lie algebras of the form L ⊗ A, where L is a Lie
algebra, A is a commutative associative algebra, and the multiplication in L ⊗ A being defined by the
formula
[x ⊗ a, y ⊗ b] = [x, y] ⊗ ab
for any x, y ∈ L, a, b ∈ A. Note that A can be considered as the algebra of functions on the spectrum of A,
and L ⊗ A can therefore be interpreted as the algebra of "currents", as physicists say, on this spectrum.
Berezin and Karpelevich [BK] were among the first to study certain class of representations of current
algebras over local finite dimensional commutative algebras A. In that, somewhat obscure, paper they
showed that cohomology of such algebras can be reduced to cohomology of L. In what follows we will
consider other types of commutative algebras A and the description of cohomology in our case is more
involved and interesting. We are primarily interested in the second cohomology of L ⊗ A with trivial
coefficients, the space of symmetric invariant bilinear forms on L ⊗ A, and the algebras of derivations of
L ⊗ A.
These invariants were determined for numerous particular cases of current Lie algebras (see, for ex-
ample, [S]), the general formulae for the second homology with trivial coefficients in terms of invariants
of L and A were obtained in [Ha], [Z1] and [NW], and similar formulae for the space of symmetric
invariant bilinear forms and derivation algebras were obtained in [Z1] and [Z2], respectively.
So why return to these settled questions? In all considerations until now, the algebra A was supposed
to have a unit. However, there are many interesting examples of current algebras where A is not unital.
For example, in [La1], the so-called periodization of semisimple Lie algebras g was considered, which
is nothing but g ⊗ t C[t]. It is known that the second homology of any nilpotent Lie algebra with trivial
coefficients has interpretation in terms of presentation of the algebra, so allowing A to be nilpotent
allows us to obtain presentation of L ⊗ A irrespective of the properties of L.
It turns out that elementary arguments similar to those in [Z2] allow us to extend the above mentioned
results to the case of non-unital A. In particular, concerning the second cohomology and symmetric
invariant bilinear forms, we provide another proof, considerably shorter than all the previous ones even
in the case of unital A.
The contents of this paper are as follows. In §§1 -- 3 we establish the general formulae for 2-cocycles,
symmetric invariant bilinear forms, and get partial results about derivations of the current Lie algebras,
Date: last revised December 26, 2017.
2000 Mathematics Subject Classification. 17B20, 17B40, 17B55, 17B56, 17B67.
Key words and phrases. Current Lie algebra; Kac-Moody algebras; second cohomology;
invariant bilinear form;
derivation.
arXiv:0901.1395; J. Nonlin. Math. Phys. 17 (2010), Suppl. 1 (special issue in memory of F.A. Berezin), 87 -- 102.
1
LIE ALGEBRAS EXTENDED OVER COMMUTATIVE ALGEBRAS WITHOUT UNIT
2
respectively. This is followed by applications: in §4 we reprove the result from [La1] about presentations
of periodizations of the semisimple Lie algebras. In passing, we also mention how to derive from our
results the theorem from [Be] about semisimple components of the derivation algebras of certain current
Lie algebras, and the Serre defining relations between Chevalley generators of the non-twisted affine
Kac-Moody algebra.
In all these cases, the absence of unit in A is essential. All these proofs are significantly shorter than
the original ones, and reveal various almost trivial, but so far unnoticed or unpublished, links between
different concepts and results. These links are, perhaps, the main virtue of this paper.
It seems that most if not everything considered here can be extended in a straightforward way to
twisted, Leibniz and super settings, but we will not venture into this, at least for now.
NOTATION AND CONVENTIONS
All algebras and vector spaces are defined over an arbitrary field K of characteristic different from 2
and 3, unless stated otherwise (some of the results are valid in characteristic 3, but we will not go into
this).
In what follows, L denotes a Lie algebra, A is an associative commutative algebra.
Given an L-module M, let Bn(L, M), Zn(L, M), Cn(L, M) and H n(L, M) denote the space of nth degree
coboundaries, cocycles, cochains, and cohomology of L with coefficients in M, respectively (we will
be mainly interested in the particular cases of degree 2 and the trivial module K, or degree 1 and the
adjoint module or its dual). Note that C2(L, K) is the space of all skew-symmetric bilinear forms on L.
The space of all symmetric bilinear forms on L will be denoted as S2(L, K).
Let Z(L), [L, L] and Der(L) denote the center, the commutant (the derived algebra), and the Lie
algebra of derivations of L, respectively. Similarly, let Ann(A) = {a ∈ A Aa = 0} and AA denote the
annulator and the square of A, respectively, and let HC∗(A) denotes its cyclic cohomology.
A bilinear form ϕ : L × L → K is said to be cyclic if
ϕ([x, y], z) = ϕ([z, x], y)
for any x, y, z ∈ L. Note that if ϕ is symmetric, this condition is equivalent to the invariance of the form
ϕ:
ϕ([x, y], z) + ϕ(y, [x, z]) = 0,
while if ϕ is skew-symmetric, the notions of cyclic and invariant forms differ. Let B(L) denote the space
of all symmetric bilinear invariant (=cyclic) forms on L.
Similarly, a bilinear form α : A × A → K is said to be cyclic if
and invariant if
α(ab, c) = α(ca, b),
α(ab, c) = α(a, bc)
for any a, b, c ∈ A. If the form α is symmetric, it is cyclic if and only if it is invariant.
1. THE SECOND COHOMOLOGY
Theorem 1. Let L be a Lie algebra, A an associative commutative algebra, and at least one of L and A
be finite-dimensional. Then each cocycle in Z2(L⊗A, K) can be represented as the sum of decomposable
cocycles ϕ⊗ α, where ϕ : L × L → K and α : A × A → K are of one of the following 8 types:
(i) ϕ([x, y], z) + ϕ([z, x], y) + ϕ([y, z], x) = 0 and α is cyclic,
(ii) ϕ is cyclic and α(ab, c) + α(ca, b) + α(bc, a) = 0,
(iii) ϕ([L, L], L) = 0,
(iv) α(AA, A) = 0,
where each of these 4 types splits into two subtypes: with ϕ skew-symmetric and α symmetric, and with
ϕ symmetric and α skew-symmetric.
LIE ALGEBRAS EXTENDED OVER COMMUTATIVE ALGEBRAS WITHOUT UNIT
3
Proof. Each cocycle Φ ∈ Z2(L ⊗ A, K), being an element of
End(L ⊗ A ⊗ L ⊗ A, K) ≃ End(L ⊗ L, K) ⊗ End(A ⊗ A, K),
can be written in the form Φ = ∑
i∈I
ϕi ⊗ αi, where ϕi : L × L → K and αi : A × A → K are bilinear maps,
and I is a finite set of indices (this is the place where the assumption of finite-dimensionality is needed).
Using this representation, write the cocycle equation for an arbitrary triple x ⊗ a, y ⊗ b, z ⊗ c, where
x, y, z ∈ L, a, b, c ∈ A:
(1)
∑
i∈I
ϕi([x, y], z) ⊗ αi(ab, c) + ϕi([z, x], y) ⊗ αi(ca, b) + ϕi([y, z], x) ⊗ αi(bc, a) = 0.
Symmetrizing this equality with respect to x, y, we get:
∑
i∈I(cid:16)ϕi([x, z], y) + ϕi([y, z], x)(cid:17) ⊗(cid:16)αi(bc, a) − αi(ca, b)(cid:17) = 0.
On the other hand, cyclically permuting x, y, z in (1) and summing up the 3 equalities obtained, we get:
∑
i∈I(cid:16)ϕi([x, y], z) + ϕi([z, x], y) + ϕi([y, z], x)(cid:17) ⊗(cid:16)αi(ab, c) + αi(bc, a) + αi(ca, b)(cid:17) = 0.
Applying Lemma 1.1 from [Z2] to the last two equalities, we get a partition of the index set I = I1 ∪ I2 ∪
I3 ∪ I4 such that
ϕi([x, z], y) + ϕi([y, z], x) = 0, ϕi([x, y], z) + ϕi([z, x], y) + ϕi([y, z], x) = 0
ϕi([x, z], y) + ϕi([y, z], x) = 0, αi(ab, c) + αi(bc, a) + αi(ca, b) = 0
ϕi([x, y], z) + ϕi([z, x], y) + ϕi([y, z], x) = 0, αi(bc, a) − αi(ca, b) = 0
αi(bc, a) − αi(ca, b) = 0, αi(ab, c) + αi(bc, a) + αi(ca, b) = 0
for i ∈ I1
for i ∈ I2
for i ∈ I3
for i ∈ I4.
It is obvious that if the characteristic of K is different from 3, then ϕi([L, L], L) = 0 for i ∈ I1, and
αi(AA, A) = 0 for i ∈ I4.
It is obvious also that ϕi ⊗ αi satisfies the cocycle equation (1) for each
i ∈ I1, I2, I3, I4.
Now write the condition of skew-symmetry of Φ:
(2)
ϕi(x, y) ⊗ αi(a, b) + ϕi(y, x) ⊗ αi(b, a) = 0
∑
i∈I
and symmetrize it with respect to x, y:
(ϕi(x, y) − ϕi(y, x)) ⊗ (αi(a, b) − αi(b, a)) = 0
(ϕi(x, y) + ϕi(y, x)) ⊗ (αi(a, b) + αi(b, a)) = 0.
∑
i∈I
∑
i∈I
From the last two equalities, using again Lemma 1.1 from [Z2], we see that each set I1, I2, I3, I4 can be
split further into two subsets, one having skew-symmetric ϕi and symmetric αi, and the other one having
symmetric ϕi and skew-symmetric αi.
(cid:3)
Remark 1. As all our bilinear maps are K-valued, the cocycles of the form ϕ ⊗ α are, of course, just
products of bilinear maps ϕα. However, we have retained the symbol ⊗, to make it easier to track
dependence on the more general situation of [Z2].
(3)
Remark 2. The second subdivision in the statement of Theorem 1, which follows from equality (2), is
merely a manifestation of the vector space isomorphism
C2(L ⊗ A, K) ≃(cid:0)S2(L, K) ⊗C2(A, K)(cid:1) ⊕(cid:0)C2(L, K) ⊗ S2(A, K)(cid:1) .
Let dΩ be the 2-coboundary defined by a given linear map Ω : L ⊗ A → K. The latter can be written in
the form Ω = ∑
i∈I
ωi ⊗ βi for some linear maps ωi : L → K and βi : A → K. Then
dΩ(x ⊗ a, y ⊗ b) = ∑
i∈I
ωi([x, y]) ⊗ βi(ab),
LIE ALGEBRAS EXTENDED OVER COMMUTATIVE ALGEBRAS WITHOUT UNIT
4
i.e., coboundaries always lie in the direct summand C2(L, K) ⊗ S2(A, K). Consequently, nonzero cocy-
cles from different direct summands in (3) can never be cohomologically dependent, and the cocycles
from the direct summand S2(L, K) ⊗ C2(A, K) are cohomologically independent if and only if they are
linearly independent.
One may try to formulate Theorem 1 as a statement about H 2(L ⊗ A, K), but in full generality this will
lead only to cumbersome complications. In each case of interest, one can easily obtain an information
about the cohomology. For example, assuming A contains a unit, one immediately sees that cocycles of
type (i) necessarily have ϕ skew-symmetric and α symmetric, cocycles of type (ii) necessarily have ϕ
symmetric and α skew-symmetric, and cocycles of type (iv) vanish. This leads to a known formula for
H 2(L ⊗ A, K), where the cocycles of type (i) contribute to the term H 2(L, K) ⊗ A∗, the cocycles of type
(ii) contribute to the term B(L)⊗HC1(A), and the cocycles of type (iii) are non-essential (in terminology
of [Z1]).
Another, more concrete, application is given in §4.
2. SYMMETRIC INVARIANT BILINEAR FORMS
Theorem 2. Let L be a Lie algebra, A an associative commutative algebra, and at least one of L and
A be finite-dimensional. Then each symmetric invariant bilinear form on L ⊗ A can be represented as a
sum of decomposable forms ϕ⊗ α, ϕ : L × L → K, α : A × A → K of one of the following 6 types:
(i) both ϕ and α are cyclic,
(ii) ϕ([L, L], L) = 0,
(iii) α(AA, A) = 0,
where each of these 3 types splits into two subtypes: with both ϕ and α symmetric, and with both ϕ and
α skew-symmetric.
Proof. The proof is absolutely similar to that of Theorem 1. As in the proof of Theorem 1, we may write
a symmetric invariant bilinear form Φ on L ⊗ A as ∑
ϕi ⊗ αi for suitable bilinear maps ϕi : L × L → K
i∈I
and αi : A × A → K. The invariance condition, written for a given triple x ⊗ a, y ⊗ b, z ⊗ c, reads:
(4)
∑
i∈I
ϕi([x, y], z) ⊗ αi(ab, c) + ϕi([x, z], y) ⊗ αi(ca, b) = 0.
Symmetrizing this with respect to x, y, we get:
∑
i∈I(cid:16)ϕi([x, z], y) + ϕi([y, z], x)(cid:17) ⊗ αi(ca, b) = 0.
Hence the index set can be partitioned I = I1 ∪ I2 in such a way that
ϕi([x, z], y) + ϕi([y, z], x) = 0
for any i ∈ I1, and αi(AA, A) = 0 for any i ∈ I2. Then (4) can be rewritten as
∑
i∈I1
ϕi([x, y], z) ⊗(cid:16)αi(ab, c) − αi(ca, b)(cid:17) = 0.
Hence there is a partition I1 = I11 ∪ I12 such that ϕi([L, L], L) = 0 for any i ∈ I11, and αi(ab, c) = αi(ac, b)
for any i ∈ I12.
The condition of symmetry of Φ:
ϕi(x, y) ⊗ αi(a, b) − ϕi(y, x) ⊗ αi(b, a) = 0,
∑
i∈I
being symmetrized with respect to x, y, allows us to partition further each of the sets I11, I12, I2 into
two subsets, one having both ϕi and αi symmetric, and the other one having both ϕi and αi skew-
symmetric.
(cid:3)
This generalizes [Z1, Theorem 4.1], where a similar statement is proved for A unital.
LIE ALGEBRAS EXTENDED OVER COMMUTATIVE ALGEBRAS WITHOUT UNIT
5
3. DERIVATIONS
Naturally, one may try to apply the same approach to description of the derivations of a given current
algebra L ⊗ A (for unital A, see [Z2, Corollary 2.2]). Indeed, each derivation D of L ⊗ A, being an
element of
End(L ⊗ A, L ⊗ A) ≃ End(L, L) ⊗ End(A, A),
can be expressed in the form D = ∑
i∈I
ϕi ⊗ αi, where ϕi : L → L and αi : A → A are linear maps. The
condition that D is a derivation, written for an arbitrary pair x ⊗ a and y ⊗ b, where x, y ∈ L and a, b ∈ A,
reads:
ϕi([x, y]) ⊗ αi(ab) − [ϕi(x), y] ⊗ αi(a)b − [x,ϕi(y)] ⊗ aαi(b) = 0.
∑
i∈I
Symmetrizing this equality with respect to a, b (this is equivalent to symmetrization with respect to x,
y):
∑
i∈I(cid:16)[ϕi(x), y] − [x,ϕi(y)](cid:17) ⊗(cid:16)aαi(b) − bαi(a)(cid:17) = 0,
we get a partition of the index set I into two subsets with conditions [ϕi(x), y] = [x,ϕi(y)] and aαi(b) =
bαi(a), respectively. But as there are only two variables in each of L and A, no other symmetrization is
possible, so the last equality is all what we can get in this way.
The failure of this method can be also explained by looking at the simple example of the Lie algebra
sl(2) ⊗ tK[t]. In sl(2), fix a basis {e−, h, e+} with multiplication
(5)
[h, e−] = −e−,
[h, e+] = e+,
[e−, e+] = h.
It is easy to check that the map defined, for any f (t) ∈ tK[t], by the formulae
e− ⊗ f (t) 7→ e− ⊗ t(cid:16) d f (t)
e+ ⊗ f (t) 7→ e+ ⊗ t(cid:16) d f (t)
dt
d f (t)
dt
h ⊗ f (t) 7→ h ⊗ t
dt
− f (t)(cid:17)
+ f (t)(cid:17)
is a derivation of sl(2) ⊗ tK[t]. It is obvious that this map is not a decomposable one, i.e., of the form
ϕ ⊗ α for some ϕ : sl(2) → sl(2) and α : tK[t] → tK[t]. But for this approach to succeed, all the maps
in question should be representable in such a way in the end.
However, under additional assumption on L ⊗ A, we can derive information about Der(L ⊗ A) from
the results of the preceding sections, using the relationship between H 1(L, L∗), H 2(L, K), and B(L). In
the literature, this relationship was noted many times in a slightly different form, and goes back to the
classical works of Koszul and Hochschild -- Serre [HS]. Namely, there is an exact sequence
(6)
0 → H 2(L, K) u→ H 1(L, L∗) v→ B(L) w→ H 3(L, K)
where for the representative ϕ ∈ Z2(L, K) of a given cohomology class, we have to take the class of
u(ϕ), the latter being given by
(u(ϕ)(x))(y) = ϕ(x, y)
for any x, y ∈ L, v is sending the class of a given cocycle D ∈ Z1(L, L∗) to the bilinear form v(D) :
L × L → K defined by the formula
v(D)(x, y) = D(x)(y) + D(y)(x),
and w is sending a given symmetric bilinear invariant form ψ : L × L → K to the class of the cocycle
ω ∈ Z3(L, K) defined by
ω(x, y, z) = ψ([x, y], z)
LIE ALGEBRAS EXTENDED OVER COMMUTATIVE ALGEBRAS WITHOUT UNIT
6
(see, for example, [D1], where a certain long exact sequence is obtained, of which this one is the
beginning, and references therein for many earlier particular versions; this exact sequence was also
established in [NW, Proposition 7.2] with two additional terms on the right).
In the case where L ≃ L∗ as L-modules, the sequence (6) provides a way to evaluate H 1(L, L) given
H 2(L, K) and B(L). The L-module isomorphism L ≃ L∗ implies the existence of a symmetric invariant
non-degenerate form h·, ·i on L. In terms of this form, u is sending the class of a given cocycle ϕ ∈
Z2(L, K) to the class of the cocycle u(ϕ) ∈ Z1(L, L) defined by
h(u(ϕ))(x), yi = ϕ(x, y),
and v is sending the class of a given cocycle D ∈ Z1(L, L) to the bilinear form v(D) : L × L → K defined
by the formula
v(D)(x, y) = hD(x), yi + hx, D(y)i.
Turning to current Lie algebras, we will make even stronger assumption: that L ≃ L∗ and A ≃ A∗.
Then, utilizing the results of preceding sections about H 2(L ⊗ A, K) and B(L ⊗ A), we will derive results
about Der(L ⊗ A).
In the literature, given H 1(L, L∗), the space H 2(L, K) was computed for various Lie algebras L (see,
for example, [S], [D1] and references therein). Here we utilize this connection in the other direction.
Theorem 3. Let L be a nonabelian Lie algebra, A an associative commutative algebra, both L and A
finite-dimensional and with symmetric invariant non-degenerate bilinear form. Then each derivation of
L ⊗ A can be represented as the sum of decomposable linear maps d ⊗β, where d : L → L and β : A → A
are of one of the following types:
(i) d([x, y]) = λ([d(x), y] + [x, d(y)]), β(ab) = µβ(a)b for certain λ, µ ∈ K such that λµ = 1,
(ii) d([x, y]) = λ[d(x), y], β(ab) = µ(β(a)b + aβ(b)) for certain λ, µ ∈ K such that λµ = 1,
(iii) [d(x), y] + [x, d(y)] = 0, β(AA) = 0, β(a)b = aβ(b),
(iv) d([L, L]) = 0, [d(x), y] + [x, d(y)] = 0, β(a)b = aβ(b),
(v) d([L, L]) = 0, [d(x), x] = 0, β(a)b + aβ(b) = 0,
(vi) [d(x), x] = 0, β(AA) = 0, β(a)b + aβ(b) = 0,
(vii) d([L, L]) = 0, d(L) ⊆ Z(L),
(viii) d([L, L]) = 0, β(A) ⊆ Ann(A),
(ix) d(L) ⊆ Z(L), β(AA) = 0,
(x) β(AA) = 0, β(A) ⊆ Ann(A).
Proof. By abuse of notation, let h· , ·i denote a symmetric invariant non-degenerate bilinear form both
on L and A. Obviously, the tensor product of these forms defines a symmetric invariant non-degenerate
bilinear form on L ⊗ A, for which by even bigger abuse of notation we will use the same symbol:
hx ⊗ a, y ⊗ bi = hx, yiha, bi.
We have L∗ ≃ L as L-modules, A∗ ≃ A as A-modules, and (L ⊗ A)∗ ≃ L ⊗ A as L ⊗ A-modules.
As a vector space, H 1(L ⊗ A, L ⊗ A) can be represented as the direct sum of Ker v and Im v, and the
exact sequence (6) tells that Ker v = Im u and Im v = Ker w.
By Theorem 1, H 2(L ⊗ A, K) is spanned by cohomology classes which can be represented by decom-
posable cocycles ϕ⊗ α for appropriate ϕ : L × L → L and α : A × A → K. For each such pair ϕ and α,
there are unique linear maps d : L → L and β : A → A such that
(7)
for any x, y ∈ L, and
(8)
hd(x), yi = ϕ(x, y)
hβ(a), bi = α(a, b)
for any a, b ∈ A. Hence the decomposable linear map d ⊗ β : L ⊗ A → L ⊗ A satisfies
h(d ⊗ β)(x ⊗ a), y ⊗ bi = (ϕ⊗ α)(x ⊗ a, y ⊗ b),
LIE ALGEBRAS EXTENDED OVER COMMUTATIVE ALGEBRAS WITHOUT UNIT
7
i.e., coincides with u(ϕ ⊗ α). Thus, Im u is spanned by cohomology classes whose representatives are
decomposable derivations.
Similarly, by the proof of Theorem 2, B(L ⊗ A) is spanned by decomposable elements ϕ ⊗ α, and
Ker w is spanned by such elements of types (ii) and (iii), i.e., either ϕ([L, L], L) = 0 or α(AA, A) = 0.
Again, for each such element we can find d : L → L and β : A → A satisfying (7) and (8) respectively.
Furthermore, we may assume that for each such ϕ⊗α, the maps ϕ and α are either both symmetric, or
both skew-symmetric, and hence both d and β are either self-adjoint or skew-self-adjoint, respectively,
with respect to h·, ·i. In both cases we have:
(9)
h(d ⊗ β)(x ⊗ a), y ⊗ bi + hx ⊗ a, (d ⊗ β)(y ⊗ b)i
= hd(x), yihβ(a), bi + hx, d(y)iha,β(b)i = 2hd(x), yihβ(a), bi
= 2ϕ(x, y) ⊗ α(a, b)
for any x, y ∈ L and a, b ∈ A.
The condition ϕ([L, L], L) = 0 ensures that d([L, L]) = 0, and an equivalent condition ϕ(L, [L, L]) = 0
ensures that
h[d(x), z], yi = −hd(x), [y, z]i = 0,
implying d(L) ⊆ Z(L), and hence d ⊗ β is a derivation of L ⊗ A. Quite analogously, the condition
α(AA, A) = α(A, AA) = 0 implies also that d ⊗β is a derivation of L ⊗ A. The equality (9) ensures that v
maps the cohomology class of this derivation to 2ϕ⊗α. Thus Im v is spanned by images of cohomology
classes whose representatives are decomposable derivations.
Putting all this together, we see that H 1(L ⊗ A, L ⊗ A) is spanned by the cohomology classes whose
representatives are decomposable derivations. As inner derivations of L ⊗ A are, obviously, also spanned
by decomposable inner derivations ad (x ⊗ a) = ad x ⊗ Ra, where Ra is the multiplication on a ∈ A, any
derivation of L ⊗ A is representable as the sum of decomposable derivations.
The rest is easy. The condition that d ⊗ β is a derivation, reads:
(10)
d([x, y]) ⊗ β(ab) − [d(x), y] ⊗ β(a)b − [x, d(y)] ⊗ aβ(b) = 0
for any x, y ∈ L, a, b ∈ A. Symmetrizing (10) as in the beginning of this section, we see that either
[d(x), y] = [x, d(y)] for any x, y ∈ L, or β(a)b = aβ(b) for any a, b ∈ A. The equation (10) is equivalent
to
d([x, y]) ⊗ β(ab) − [d(x), y] ⊗ (β(a)b + aβ(b)) = 0
in the first case, and to
d([x, y]) ⊗ β(ab) − ([d(x), y] + [x, d(y)]) ⊗ β(a)b = 0.
in the second case. Now trivial case-by-case considerations involving vanishing and linear dependence
of the linear operators occurring as tensor product factors in these two equalities, produce the final list
of derivations.
(cid:3)
Theorem 3 can be applied, for example, to the Lie algebra g ⊗ tK[t]/(t n), n > 2, where g is a se-
misimple finite-dimensional Lie algebra over any field of characteristic 0, to obtain a very short proof
of the result of Benoist [Be] about realization of any semisimple Lie algebra as semisimple part of
the Lie algebra of derivations of a nilpotent Lie algebra (another short proof with direct calculation of
Der(g ⊗ tK[t]/(t 3)) follows from [LL, Proposition 3.5]). Indeed, as noted, for example, in [BB, Lemma
2.2], tK[t]/(t n) possesses a symmetric nondegenerate invariant bilinear form B, hence g ⊗ tK[t]/(t n)
possesses such a form (being the product of the Killing form on g and B), so Theorem 3 is applicable.
As g is perfect and centerless, the derivations of types (iv), (v), (vii), (viii), (ix) vanish. The remaining
types can be handled, for example, by appealing to results of [Ho], [F] or [LL], which imply that in
the case g 6≃ sl(2), the corresponding mappings d vanish also for types (ii) and (iii), and for the rest of
the types are either inner derivations of g, or multiplications by scalar. Then, performing elementary
LIE ALGEBRAS EXTENDED OVER COMMUTATIVE ALGEBRAS WITHOUT UNIT
8
calculations with conditions imposed on β's in the remaining types, and rearranging the obtained spaces
of derivations, we get the following isomorphism of vector spaces:
Der(g ⊗ tK[t]/(t n)) ≃ (g ⊗ K[t]/(t n)) ⊕ (End(g)/g) ⊕ K.
(11)
Elements of the first summand are assembled from types (i) and (x), and act on g ⊗ tK[t]/(t n) as the
Lie multiplication by an element of g and the associative commutative multiplication by an element of
K[t]/(t n). Elements of the second summand are assembled from types (i), (vi) and (x), and act by the
rule
7→ F(x) ⊗ t n−1
x ⊗ t
x ⊗ t k 7→ 0
if k ≥ 2,
where x ∈ g, F ∈ End(g), and elements of g are assumed to be embedded into End(g) as inner deriva-
tions. Elements of the third, one-dimensional, summand are assembled from types (i) and (vi), and are
proportional to the following derivation:
7→ x ⊗ t n−2
x ⊗ t
x ⊗ t 2 7→ 2x ⊗ t n−1
x ⊗ t k 7→ 0
if k ≥ 3,
where x ∈ g.
All this implies that, as a Lie algebra, Der(g ⊗ tK[t]/(t n)) splits into the semidirect sum of the semi-
simple part isomorphic to g (identified with the part g⊗ 1 of the first summand in (11)), and the nilpotent
radical consisting of g ⊗ tK[t]/(t n) from the first summand, and the whole second and third summands.
The case g = sl(2) can be treated separately and easily.
4. PERIODIZATION OF SEMISIMPLE LIE ALGEBRAS
For a given Lie algebra L, its periodization is an N-graded Lie algebra, with component in each degree
isomorphic to L. In other words, the periodization of L is L ⊗ tK[t].
In [La1], Anna Larsson studied periodization of semisimple finite-dimensional Lie algebras g over
any field K of characteristic 0. She proved that, unless g contains direct summands isomorphic to sl(2),
its periodization possesses a presentation with only quadratic relations. Since generators and relations
of (generalized graded) nilpotent Lie algebras can be interpreted as the first and second homology,
Larsson's statement can be formulated in homological terms.
Note that in [La2] this result was generalized to some classes of Lie superalgebras. We do not touch
upon superalgebras here, and it seems to be an interesting task to tackle the results and questions from
[La2] from this paper's viewpoint. Interest in periodizations of Lie superalgebras, and whether they
admit generators subject to quadratic relations, arose from an earlier work of Lofwall and Roos [LR]
about some amazing Hopf algebras (for further details, see [La1] and [La2]).
As noted in [La1], the whole space H∗(g⊗t C[t], C) was studied by much more sophisticated methods
in the celebrated paper by Garland and Lepowsky [GL] (actually, a particular case interesting for us
here was already sketched in [G]; the case of g = sl(2) was also treated in [FF, p. 233]). Garland
and Lepowsky determined the eigenvectors of the Laplacian on the corresponding Chevalley-Eilenberg
(co)chain complex. However, to extract from [GL] exact results about (co)homology of interest requires
nontrivial combinatorics with the Weyl group, as demonstrated in [HW], and case-by-case analysis for
each series of the simple Lie algebras. Here we derive results for the second cohomology in a uniform
way from the results of §1 using elementary methods providing an alternative short proof of Larsson's
result. Also, our approach clearly shows why the case of sl(2) is exceptional.
Theorem 4 (Larsson). Let g be a finite-dimensional semisimple Lie algebra over an algebraically closed
field K of characteristic 0. Then
H 2(g ⊗ tK[t], K) ≃ C2(g, K)/B2(g, K)M(cid:16)M Sα(cid:17) ,
(12)
(13)
Φ(x ⊗ t i, y ⊗ t j) =(ϕ(x, y)
Ψ(x ⊗ t i, y ⊗ t j) =
ψ(x, y)
−ψ(x, y)
0
if i = j = 1,
otherwise,
0
if i = 1, j = 2,
if i = 2, j = 1,
otherwise,
LIE ALGEBRAS EXTENDED OVER COMMUTATIVE ALGEBRAS WITHOUT UNIT
9
where the second direct sum is taken over all simple direct summands of g isomorphic to sl(2), and each
Sα is a certain 5-dimensional space of symmetric bilinear forms on the corresponding direct summand.
The basic cocycles can be chosen among cocycles of the form
where x, y ∈ g and ϕ is a skew-symmetric bilinear form on g, and the cocycles Ψ whose only non-
vanishing values on all pairs of the simple direct summands of g are determined by the formula
where x, y belong to the corresponding sl(2)-direct summand, and ψ is a symmetric bilinear form on
this direct summand satisfying
(14)
in the standard sl(2)-basis (5).
ψ(e−, e+) =
1
2
ψ(h, h)
Proof. Consider the cocycles appearing in Theorem 1 for L = g and A = tK[t] case-by-case.
Cocycles of type (i). Writing the cyclicity condition of α for the triple t i−1, t j, t, we get
(15)
for any i ≥ 2, j ≥ 1.
α(t i+ j−1, t) = α(t i, t j)
(ia). ϕ is skew-symmetric, thus ϕ ∈ Z2(g, K), and α is symmetric. Since H 2(g, K) = 0, it follows that
ϕ = dω for some linear map ω : g → K. Define a linear map Ω : g ⊗ tK[t] → K by setting, for any x ∈ g,
Ω(x ⊗ t i) =(0
ω(x)α(t i−1, t)
if i = 1,
if i ≥ 2.
Then, taking (15) into account, we get ϕ⊗ α = dΩ, i.e., cocycles of this type are trivial.
(ib). ϕ is symmetric, α is skew-symmetric.
If g = sl(2), direct calculation shows that the space of corresponding ϕ's coincides with the space
of all symmetric bilinear forms on sl(2) satisfying the condition (14), and hence is 5-dimensional (an
equivalent calculation is contained in [D2, Theorem 6.5]). This case is exceptional, as shows the fol-
lowing
Lemma 1 (Dzhumadil'daev -- Bakirova). Let g 6≃ sl(2) be simple. Then any symmetric bilinear form ϕ
on g satisfying
(16)
ϕ([x, y], z) + ϕ([z, x], y) + ϕ([y, z], x) = 0
for any x, y, z ∈ g vanishes.
This Lemma is proved in [DB] by considering the Chevalley basis of g and performing computations
with the corresponding root system. In [D2] and [DB], symmetric bilinear forms satisfying the condition
(16) are called commutative 2-cocycles and arise naturally in connection with classification of algebras
satisfying skew-symmetric identities. We will give a different proof which stresses the connection with
yet other notions and results.
Proof. Consider a map from the space of bilinear forms on a Lie algebra L to the space of linear maps
from L to L∗, by sending a bilinear form ϕ to the linear map D : L → L∗ such that D(x)(y) = ϕ(x, y). It
is easy to see that a symmetric bilinear form ϕ satisfying (16) maps to a linear map D satisfying
D([x, y]) = −y • D(x) + x • D(y),
LIE ALGEBRAS EXTENDED OVER COMMUTATIVE ALGEBRAS WITHOUT UNIT
10
where • denotes the standard L-action on the dual module L∗ (this is completely analogous to the em-
bedding of H 2(L, K) into H 1(L, L∗) mentioned in §3).
For any finite dimensional simple Lie algebra, there is an isomorphism of g-modules g ≃ g∗, and we
have an embedding of the space of bilinear forms in question into the space of linear maps D : g → g
satisfying the condition
D([x, y]) = −[D(x), y] − [x, D(y)].
Such maps are called antiderivations and were studied in several papers. In particular, in [Ho, Theorem
5.1] it is proved that central simple classical Lie algebras of dimension > 3 do not have nonzero an-
tiderivations (generalizations of this result in different directions obtained further in the series of papers
by Filippov, of which [F] is the latest, and in [LL]). Hence, these Lie algebras do not have nonzero
symmetric bilinear forms satisfying (16) either.
(cid:3)
Coupled with the well-known fact that H 2(g, K) = 0, Lemma 1 implies that any (symmetric, skew-
symmetric or mixed) bilinear form ϕ on g 6≃ sl(2) satisfying the cocycle equation (16), is a 2-coboundary†.
This can be also compared with the fact that Leibniz cohomology (and, in particular, the second Leibniz
cohomology with trivial coefficients) of g vanishes (for homological version, see [P, Proposition 2.1] or
[N]). The condition for a bilinear form ϕ to be a Leibniz 2-cocycle can be expressed as
ϕ([x, y], z) + ϕ([z, x], y) − ϕ(x, [y, z]) = 0.
In the general case, where g is a direct sum of simple ideals g1 ⊕ · · · ⊕ gn, it is easy to see that
ϕ(gi, g j) = 0 for i 6= j, and hence the space of symmetric bilinear forms on g satisfying (16) decomposes
into the direct sum of appropriate spaces on each of gi. The latter are determined by (14) if gi ≃ sl(2)
and vanishes otherwise.
Now, turning to α's, and permuting i and j in (15), we get α(t i, t j) = 0 for all i, j ≥ 2 and α(t k, t) = 0
for all k ≥ 3. Conversely, it is easy to see that a skew-symmetric map α satisfying these conditions is
cyclic. Hence, the space of skew-symmetric cyclic maps on tK[t] is 1-dimensional and each cocycle of
this type can be written in the form (13).
Cocycles of type (ii).
(iia). ϕ is skew-symmetric, α is symmetric.
Lemma 2. Any skew-symmetric cyclic bilinear form on g vanishes.
Proof. The proof is almost identical to the proof of the well-known fact that any skew-symmetric in-
variant bilinear form on g vanishes (see, for example, [Bo, Chapter 1, §6, Exercises 7(b) and 18(a,b)]).
Namely, let ϕ be a skew-symmetric cyclic form on g. First, let g be simple. There is a linear map
σ : g → g such that ϕ(x, y) = hσ(x), yi, where h·, ·i is the Killing form on g. Then, for any x, y, z ∈ g:
hσ([x, y]), zi = ϕ([x, y], z) = −ϕ(y, [z, x]) = −hσ(y), [z, x]i = −h[x,σ(y)], zi.
Hence σ anticommutes with each ad x and, in particular, [σ(x), x] = 0 for any x ∈ g. But then by [Be,
Lemme 2] (or by more general results from [LL]), σ belongs to the centroid of g. Hence σ is a scalar
and necessarily vanishes.
In the general case where g is the direct sum of simple ideals g1 ⊕ · · · ⊕ gn, it is easy to see that
ϕ(gi, g j) = 0 for any i 6= j. But by just proved ϕ vanishes also on each gi, and hence vanishes on the
whole of g.
(cid:3)
(iib). ϕ is symmetric and α is skew-symmetric, so α ∈ HC1(tK[t]). There is an isomorphism of
graded algebras
HC∗(K[t]) ≃ HC∗(K) ⊕ HC∗(tK[t])
† Added December 26, 2017: The statement is true, but it does not follow, at least in a straightforward way, from Lemma
1 and the fact that H 2(g, K) = 0. For a correct proof, see a forthcoming text (with A. Makhlouf) "Hom-Lie algebra structures
on Kac-Moody algebras".
LIE ALGEBRAS EXTENDED OVER COMMUTATIVE ALGEBRAS WITHOUT UNIT
11
(for a general relationship between cyclic homology of augmented algebra and its augmentation ideal,
see [LQ, §4]; the cohomological version can be obtained in exactly the same way). On the other hand,
HC∗(K[t]) ≃ HC∗(K) ⊕ (terms concentrated in degree 0)
(see, for example, [Lo, §3.1.7]). Hence HC1(tK[t]) = 0. Of course, the vanishing of HC1(tK[t]) can be
established also by direct easy calculations.
Cocycles of type (iii) vanish.
Cocycles of type (iv). Obviously, α(t i, t j) = 0 for (i, j) 6= (1, 1). Hence α is symmetric, and each
cocycle of this type has the form (12).
To summarize: cocycles of type (ia), (ii) and (iii) either are trivial or vanish, and cocycles of type (ib)
are given by formula (13) and vanish if g does not contain direct summands isomorphic to sl(2). So in
the latter case, all nontrivial cocycles are of type (iv) and given by formula (12). Considering the natural
grading in g ⊗ tK[t] by degrees of t, observing that the second cohomology is finite-dimensional and
hence is dual to the second homology, and turning to interpretation of the 2-cycles as relations between
generators, we get the assertion proved in [La1]: that g ⊗ tK[t] admits a presentation with quadratic
relations, provided g does not contain direct summands isomorphic to sl(2).
Let us decide now when cocycles given by (12) and (13) are cohomologically independent. According
to Remark 2 in §1, any cohomological dependency beyond linear dependency can occur for cocycles of
type (12) only. Writing, as in Remark 2, Φ = dΩ for Ω = ∑
ωi ⊗ βi, where ωi : g → g and βi : tK[t] →
i∈I
tK[t] are some linear maps, we get:
and
ωi([x, y])βi(t 2) = ϕ(x, y)
∑
i∈I
ωi([x, y])βi(t k) = 0
∑
i∈I
for k ≥ 3. Hence it is clear that cocycles of type (12) are cohomologically independent if and only if the
corresponding skew-symmetric bilinear forms are independent modulo 2-coboundaries.
(cid:3)
In [La1], the author speculates about the possibility to derive Theorem 4 from the standard presenta-
tion of the affine Kac-Moody algebra. Let us indicate briefly how one can do the opposite: namely, how
Theorem 4 allows us to recover the Serre relations between Chevalley generators of non-twisted affine
Kac-Moody algebras.
Let g be a finite-dimensional simple Lie algebra over an algebraically closed field K of characteristic
0, andbL = g ⊗ K[t, t−1] be a loop algebra, aka "centerless, derivation-free" part of an affine non-twisted
Kac-Moody algebra.
rearrangements of terms, can be written in the form
It is well-known that it admits a triangular decomposition which, with slight
bL =(cid:16)(g ⊗ t−1K[t−1]) ⊕ (n− ⊗ 1)(cid:17) ⊕(cid:16)h ⊗ 1(cid:17) ⊕(cid:16)(g ⊗ tK[t]) ⊕ (n+ ⊗ 1)(cid:17),
where g = n− ⊕ h ⊕ n+ is the triangular decomposition of the simple Lie algebra g ([K, §7.6]; all direct
sums are direct sums of vector spaces).
Consider the Hochschild -- Serre spectral sequence abutting to H∗((g ⊗ tK[t]) ⊕ (n+ ⊗ 1), K) with re-
spect to the ideal g ⊗ tK[t]. The general result implicitly contained in [HS] and explicitly, for example,
in [R, Lemma 1], tells that this spectral sequence degenerates at the E2 term. For the sake of simplicity,
let us exclude the case where g = sl(2). Then the E2 terms affecting the second cohomology in question
are:
E 02
∞ = E 02
E 11
∞ = E 11
E 20
∞ = E 20
2 = H 2(n+, H 0(g ⊗ tK[t], K)) ≃ H 2(n+, K),
2 = H 1(n+, H 1(g ⊗ tK[t], K)) ≃ H 1(n+, g),
2 = H 0(n+, H 2(g ⊗ tK[t], K)) ≃ (C2(g, K)/B2(g, K))n+.
LIE ALGEBRAS EXTENDED OVER COMMUTATIVE ALGEBRAS WITHOUT UNIT
12
The first and second isomorphisms here are obvious, the third one follows from Theorem 4. Here the first
term corresponds to relations between elements of n+ ⊗ 1, which are (classical) Serre relations for the
finite-dimensional Lie algebra g, the second term corresponds to relations between elements of g ⊗tK[t]
and n+ ⊗ 1, and the third one corresponds to relations between elements of g ⊗ tK[t]. Expressing these
elements by means of Chevalley generators in terms of the corresponding Cartan matrix, we get the
corresponding part of the Serre relations.
Repeating similar reasonings for the "minus" part, and completing relations in an obvious manner
between the "plus" and "minus" parts and the "Cartan subalgebra" h ⊗ 1, we get the complete set of
well-known construction which adds central extension and derivation, and its presentation readily fol-
defining relations forbL. The whole affine non-twisted Kac-Moody algebra is obtained frombL by the
lows from the presentation ofbL.
This approach is by no means new. For example, we find in [LP, Remark in §2]: "Similar calculations
by induction on the rank for simple finite-dimensional and loop algebras give the shortest known to us
proof of completeness of the Serre defining relations". "Induction on the rank" means induction with
repetitive application of the Hochschild -- Serre spectral sequence relative to a Kac-Moody algebra build
upon the simple finite-dimensional subalgebra of g. Here we use the Hochschild-Serre spectral sequence
in a different way, and only once, thus getting even shorter proof.
It is mentioned in [K, §9.16] that "a simple cohomological proof" of the completeness of the Serre
defining relations "was found by O. Mathieu (unpublished)". We presume that the approach outlined
here is similar to that unpublished proof.
ACKNOWLEDGEMENTS
Thanks are due to Semyon Konstein, Dimitry Leites, and Irina Shchepochkina for a careful reading
of preliminary versions of the manuscript and many suggestions which improved the presentation, to
Askar Dzhumadil'daev for drawing attention to papers [D2] and [DB] which provide an interesting
connection between the topic of this paper and classification of skew-symmetric identities of algebras,
to Clas Lofwall for drawing attention to the thesis [La2], to Anna Tihinen (Larsson) for supplying it,
and to Rutwig Campoamor-Stursberg for supplying some other needed literature.
REFERENCES
I. Bajo and S. Benayadi, Lie algebras admitting a unique quadratic structure, Comm. Algebra 25 (1997), 2795 -- 2805.
[BB]
[Be] Y. Benoist, La partie semi-simple de l'alg`ebre des d´erivations d'une alg`ebre de Lie nilpotente, Comptes Rendus
Acad. Sci. Paris 307 (1988), 901 -- 904.
[BK] F. Berezin and F.I. Karpelevich, Lie algebras with supplementary structure, Math. USSR Sbornik 6 (1968), 185 -- 203.
[Bo] N. Bourbaki, Lie Groups and Lie Algebras, Chapters 1 -- 3, Springer, 1989.
[D1] A.S. Dzhumadil'daev, Symmetric (co)homologies of Lie algebras, Comptes Rendus Acad. Sci. Paris 324 (1997),
497 -- 502.
[D2]
[DB]
[FF] B.L. Feigin and D.B. Fuchs, Cohomology of some nilpotent subalgebras of the Virasoro and Kac-Moody algebras, J.
, Algebras with skew-symmetric identity of degree 3, J. Math. Sci. 161 (2009), 11 -- 30.
and A.B. Bakirova, Simple two-sided anti-Lie-admissible algebras, J. Math. Sci. 161 (2009), 31 -- 36.
Geom. Phys. 5 (1988), 209 -- 235.
V.T. Filippov, δ-derivations of prime Lie algebras, Siber. Math. J. 40 (1999), 174 -- 184.
[F]
[G] H. Garland, Dedekind's η-function and the cohomology of infinite dimensional Lie algebras, Proc. Nat. Acad. Sci.
USA 72 (1975), 2493 -- 2495.
and J. Lepowsky, Lie algebra homology and the Macdonald-Kac formulas, Invent. Math. 34 (1976), 37 -- 76.
[GL]
[Ha] A. Haddi, Homologie des alg`ebres de Lie ´etendues `a une alg`ebre commutative, Comm. Algebra 20 (1992), 1145 --
1166.
[HW] P. Hanlon and D.B. Wales, On the homology of sln(tC[t]) and a theorem of Stembridge, J. Algebra 269 (2003), 1 -- 17.
[HS] G. Hochschild and J.-P. Serre, Cohomology of Lie algebras, Ann. Math. 57 (1953), 591 -- 603.
[Ho] N.C. Hopkins, Generalized derivations of nonassociative algebras, Nova J. Math. Game Theory Algebra 5 (1996),
215 -- 224.
[K] V. Kac, Infinite Dimensional Lie Algebras, 3rd ed., Cambridge Univ. Press, 1995.
[La1] A. Larsson, A periodisation of semisimple Lie algebras, Homology, Homotopy and Appl. 4 (2002), 337 -- 355.
LIE ALGEBRAS EXTENDED OVER COMMUTATIVE ALGEBRAS WITHOUT UNIT
13
[La2]
, Periodisations of Contragredient Lie Superalgebras and Their Presentations, PhD thesis, Stockholm Uni-
versity, 2003.
[LL] G.F. Leger and E.M. Luks, Generalized derivations of Lie algebras, J. Algebra 228 (2000), 165 -- 203.
[LP] D. Leites and E. Poletaeva, Defining relations for classical Lie algebras of polynomial vector fields, Math. Scand. 81
(1997), 5 -- 19; arXiv:math/0510019.
J.-L. Loday, Cyclic Homology, 2nd ed., Springer, 1998.
and D. Quillen, Cyclic homology and the Lie algebra homology of matrices, Comment. Math. Helv. 59
[Lo]
[LQ]
(1984), 565 -- 591.
[LR] C. Lofwall and J.-E. Roos, A nonnilpotent 1-2-presented graded Hopf algebra whose Hilbert series converges in the
unit circle, Adv. Math. 130 (1997), 161 -- 200.
[NW] K.-H. Neeb and F. Wagemann, The second cohomology of current algebras of general Lie algebras, Canad. J. Math.
[N]
[P]
[R]
[S]
60 (2008), 892 -- 922; arXiv:math/0511260.
P. Ntolo, Homologie de Leibniz d'alg`ebres de Lie semi-simples, Comptes Rendus Acad. Sci. Paris 318 (1994), 707 --
710.
T. Pirashvili, On Leibniz homology, Ann. Inst. Fourier 44 (1994), 401 -- 411.
B.I. Rozenfeld, Cohomology of the algebra of formal universal differential operators, Funct. Anal. Appl. 9 (1975),
126 -- 130.
L.J. Santharoubane, The second cohomology group for Kac-Moody Lie algebras and Kahler differentials, J. Algebra
125 (1989), 13 -- 26.
[Z1] P. Zusmanovich, The second homology group of current Lie algebras, Ast´erisque 226 (1994), 435 -- 452;
arXiv:0808.0217.
[Z2]
, Low-dimensional cohomology of current Lie algebras and analogs of the Riemann tensor for loop manifolds,
Lin. Algebra Appl. 407 (2005), 71 -- 104; arXiv:math/0302334.
E-mail address: [email protected]
|
1710.04190 | 4 | 1710 | 2018-07-05T19:31:32 | Hom-associative Ore extensions and weak unitalizations | [
"math.RA"
] | We introduce hom-associative Ore extensions as non-unital, non-associative Ore extensions with a hom-associative multiplication, and give some necessary and sufficient conditions when such exist. Within this framework, we construct families of hom-associative quantum planes, universal enveloping algebras of a Lie algebra, and Weyl algebras, all being hom-associative generalizations of their classical counterparts, as well as prove that the latter are simple. We also provide a way of embedding any multiplicative hom-associative algebra into a multiplicative, weakly unital hom-associative algebra, which we call a weak unitalization. | math.RA | math |
HOM-ASSOCIATIVE ORE EXTENSIONS AND WEAK
UNITALIZATIONS
PER B ACK, JOHAN RICHTER, AND SERGEI SILVESTROV
Abstract. We introduce hom-associative Ore extensions as non-unital, non-
associative Ore extensions with a hom-associative multiplication, and give
some necessary and sufficient conditions when such exist. Within this frame-
work, we construct families of hom-associative quantum planes, universal en-
veloping algebras of a Lie algebra, and Weyl algebras, all being hom-associative
generalizations of their classical counterparts, as well as prove that the latter
are simple. We also provide a way of embedding any multiplicative hom-
associative algebra into a multiplicative, weakly unital hom-associative alge-
bra, which we call a weak unitalization.
1. Introduction
Hom-Lie algebras and related hom-algebra structures have recently become a
subject of growing interest and extensive investigations, in part due to the prospect
of providing a general framework in which one can produce many types of natural
deformations of (Lie) algebras, in particular q-deformations which are of interest
both in mathematics and in physics. One of the main initial motivations for this
development came from mathematical physics works on q-deformations of infinite-
dimensional algebras, primarily the q-deformed Heisenberg algebras (q-deformed
Weyl algebras), oscillator algebras, and the Virasoro algebra [1 -- 8, 11, 12, 16 -- 18].
Quasi-Lie algebras, subclasses of quasi-hom-Lie algebras, and hom-Lie algebras
as well as their general colored (graded) counterparts were introduced between 2003
and 2005 in [10,13 -- 15,25]. Further on, between 2006 and 2008, Makhlouf and Silve-
strov introduced the notions of hom-associative algebras, hom-(co, bi)algebras and
hom-Hopf algebras, and also studied their properties [19 -- 21]. A hom-associative al-
gebra, being a generalization of an associative algebra with the associativity axiom
extended by a linear twisting map, is always hom-Lie admissible, meaning that the
commutator multiplication in any hom-associative algebra yields a hom-Lie alge-
bra [19]. Whereas associativity is replaced by hom-associativity in hom-associative
algebras, hom-coassociativity for hom-coalgebras can be considered in a similar
way.
One of the main tools in these important developments and in many construc-
tions of examples and classes of hom-algebra structures in physics and in math-
ematics are based on twisted derivations, or σ-derivations, which are generalized
derivations twisting the Leibniz rule by means of a linear map. These types of
twisted derivation maps are central for the associative Ore extension algebras, or
2010 Mathematics Subject Classification. 17A30, 17A01.
Key words and phrases. hom-associative Ore extensions, hom-associative Weyl algebras, hom-
associative algebras.
1
2
PER B ACK, JOHAN RICHTER, AND SERGEI SILVESTROV
rings, introduced in algebra in the 1930s, generalizing crossed product (semidirect
product) algebras, or rings, incorporating both actions and twisted derivations.
Non-associative Ore extensions on the other hand were first introduced in 2015
and in the unital case, by Nystedt, Oinert, and Richter [23] (see also [24] for
an extension to monoid Ore extensions).
In the present article, we generalize
this construction to the non-unital case, as well as investigate when these non-
unital, non-associative Ore extensions are hom-associative. Finding necessary and
sufficient conditions for such to exist, we are also able to construct families of
hom-associative quantum planes (Example 5.9), universal enveloping algebras of
a Lie algebra (Example 5.10), and Weyl algebras (Example 5.11), all being hom-
associative generalizations of their classical counterparts. We do not make use of
any previous results about non-associative Ore extensions, but our construction of
hom-associative Weyl algebras has some similarities to the non-associative Weyl
algebras in [23]; for instance they both are simple. At last, in Section 6, we prove
constructively that any multiplicative hom-associative algebra can be embedded in
a multiplicative, weakly unital hom-associative algebra.
2. Preliminaries
In this section, we present some definitions and review some results from the
theory of hom-associative algebras and that of non-associative Ore extensions.
2.1. Hom-associative algebras. Here we define what we mean for an algebraic
structure to be hom-associative, and review a couple of results concerning the con-
struction of them. First, throughout this paper, by non-associative algebras we
mean algebras which are not necessarily associative, which includes in particular
associative algebras by definition. We also follow the convention of calling a non-
associative algebra A unital
if there exist an element 1 ∈ A such that for any
element a ∈ A, a · 1 = 1 · a = a. By non-unital algebras, we mean algebras which
are not necessarily unital, which includes also unital algebras as a subclass.
Definition 2.1 (Hom-associative algebra). A hom-associative algebra over an as-
sociative, commutative, and unital ring R, is a triple (M, ·, α) consisting of an
R-module M , a binary operation · : M × M → M linear over R in both arguments,
and an R-linear map α : M → M satisfying, for all a, b, c ∈ M ,
(1)
α(a) · (b · c) = (a · b) · α(c).
Since α twists the associativity, we will refer to it as the twisting map, and unless
otherwise stated, it is understood that α without any further reference will always
denote the twisting map of a hom-associative algebra.
Remark 2.2. A hom-associative algebra over R is in particular a non-unital, non-
associative R-algebra, and in case α is the identity map, a non-unital, associative
R-algebra.
Furthermore, if the twisting map α is also multiplicative, i.e.
if α(a · b) =
α(a) · α(b) for all elements a and b in the algebra, then we say that the hom-
associative algebra is multiplicative.
Definition 2.3 (Morphism of hom-associative algebras). A morphism between two
hom-associative algebras A and A′ with twisting maps α and α′ respectively, is an
algebra homomorphism f : A → A′ such that f ◦ α = α′ ◦ f . If f is also bijective,
the two are isomorphic, written A ∼= A′.
HOM-ASSOCIATIVE ORE EXTENSIONS AND WEAK UNITALIZATIONS
3
Definition 2.4 (Hom-associative subalgebra). Let A be a hom-associative algebra
with twisting map α. A hom-associative subalgebra B of A is a subalgebra of A
that is also a hom-associative algebra with twisting map given by the restriction of
α to B.
Definition 2.5 (Hom-ideal). A hom-ideal of a hom-associative algebra is an alge-
bra ideal I such that α(I) ⊆ I.
In the classical setting, an ideal is in particular a subalgebra. With the above
definition, the analogue is also true for a hom-associative algebra, in that a hom-
ideal is a hom-associative subalgebra.
Definition 2.6 (Hom-simplicity). We say that a hom-associative algebra A is hom-
simple provided its only hom-ideals are 0 and A.
In particular, we see that any simple hom-associative algebra is also hom-simple,
while the converse need not be true; there may exist ideals that are not invariant
under α.
Definition 2.7 (Hom-associative ring). A hom-associative ring can be seen as a
hom-associative algebra over the ring of integers.
Definition 2.8 (Weakly unital hom-associative algebra). Let A be a hom-associ-
ative algebra. If for all a ∈ A, e · a = a · e = α(a) for some e ∈ A, we say that A is
weakly unital with weak unit e.
Remark 2.9. Any unital, hom-associative algebra with twisting map α is weakly
unital with weak unit α(1), since by hom-associativity
α(1) · a = α(1) · (1 · a) = (1 · 1) · α(a) = α(a) = α(a) · (1 · 1) = (a · 1) · α(1) = a · α(1).
Any non-unital, associative algebra can be extended to a non-trivial hom-associ-
ative algebra, which the following proposition demonstrates:
Proposition 2.10 ([26]). Let A be a non-unital, associative algebra, α an algebra
endomorphism on A and define ∗ : A × A → A by a ∗ b := α(a · b) for all a, b ∈ A.
Then (A, ∗, α) is a hom-associative algebra.
Proof. Linearity follows immediately, while for all a, b, c ∈ A, we have
α(a) ∗ (b ∗ c) = α(a) ∗ (α(b · c)) = α(α(a) · α(b · c)) = α(α(a · b · c)),
(a ∗ b) ∗ α(c) = α(a · b) ∗ α(c) = α(α(a · b) · α(c)) = α(α(a · b · c)),
which proves that (A, ∗, α) is hom-associative.
(cid:3)
Note that we are abusing the notation in Definition 2.1 a bit here; A in (A, ∗, α)
does really denote the algebra and not only its module structure. From now on, we
will always refer to this construction when writing ∗.
Corollary 2.11 ([9]). If A is a unital, associative algebra, then (A, ∗, α) is weakly
unital with weak unit 1.
Proof. 1 ∗ x = α(1 · x) = α(x) = α(x · 1) = x ∗ 1.
(cid:3)
4
PER B ACK, JOHAN RICHTER, AND SERGEI SILVESTROV
2.2. Non-unital, non-associative Ore extensions. In this section, we define
non-unital, non-associative Ore extensions, together with some new terminology.
Definition 2.12 (Left R-additivity). If R is a non-unital, non-associative ring, we
say that a map β : R → R is left R-additive if for all r, s, t ∈ R, r · β(s + t) =
r · (β(s) + β(t)).
In what follows, N will always denote the set of non-negative integers, and N>0
the set of positive integers. Now, given a non-unital, non-associative ring R with
left R-additive maps δ : R → R and σ : R → R, by a non-unital, non-associative
Ore extension of R, R[X; σ, δ], we mean the set of formal sumsPi∈N aiX i, ai ∈ R,
called polynomials, with finitely many ai nonzero, endowed with the addition
Xi∈N
aiX i +Xi∈N
biX i =Xi∈N
(ai + bi)X i,
ai, bi ∈ R,
where two polynomials are equal if and only if their corresponding coefficients are
equal, and for all a, b ∈ R and m, n ∈ N, a multiplication
(2)
aX m · bX n =Xi∈N
(a · πm
i (b)) X i+n.
i denotes the sum of all (cid:0)m
i(cid:1) possible compositions of i copies of σ and
Here πm
m − i copies of δ in arbitrary order. Then, for example π0
1 =
σ ◦ δ ◦ δ + δ ◦ σ ◦ δ + δ ◦ δ ◦ σ. We also extend the definition of πm
i by setting
πm
i ≡ 0 whenever i < 0, or i > m. Imposing distributivity of the multiplication
over addition makes R[X; σ, δ] a ring. In the special case when σ = idR, we say
that R[X; idR, δ] is a non-unital, non-associative differential polynomial ring, and
when δ ≡ 0, R[X; σ, 0] is said to be a non-unital, non-associative skew polynomial
ring.
0 = idR and π3
Note that when m = n = 0, aX 0 · bX 0 = Pi∈N(cid:0)a · π0
R ∼= RX 0 by the isomorphism r 7→ rX 0 for any r ∈ R. Since RX 0 is a subring of
R[X; σ, δ], we can view R as a subring of R[X; σ, δ], making sense of expressions
like a · bX 0.
i (b)(cid:1) X i = (a · b)X 0, so
Remark 2.13. If R contains a unit, we write X for the formal sum Pi∈N aiX i
with a1 = 1 and ai = 0 when i 6= 1. It does not necessarily make sense to think of
X as an element of the non-associative Ore extension if R is not unital.
The left-distributivity of the multiplication over addition forces δ and σ to be
left R-additive: for any r, s, t ∈ R, rX · (s + t) = rX · s + rX · t, and by expanding
the left- and right-hand side,
rX · (s + t) = r · σ(s + t)X + r · δ(s + t),
rX · s + rX · t = r · σ(s)X + r · δ(s) + r · σ(t)X + r · δ(t),
so by comparing coefficients, we arrive at the desired conclusion.
Definition 2.14 (σ-derivation). Let R be a non-unital, non-associative ring where
σ is an endomorphism and δ an additive map on R. Then δ is called a σ-derivation
if δ(a · b) = σ(a) · δ(b) + δ(a) · b holds for all a, b ∈ R. If σ = idR, δ is a derivation.
Remark 2.15. If R and σ are unital and δ a σ-derivation, then δ(1) = δ(1 · 1) =
2 · δ(1), so that δ(1) = 0. Furthermore, if R is also associative, then it is both a
necessary and sufficient condition that σ be an endomorphism and δ a σ-derivation
on R for the unital, associative Ore extension R[X; σ, δ] to exist.
HOM-ASSOCIATIVE ORE EXTENSIONS AND WEAK UNITALIZATIONS
5
Definition 2.16 (Homogeneous map). Let R[X; σ, δ] be a non-unital non-associ-
ative Ore extension of a non-unital, non-associative ring R. Then we say that a map
β : R[X; σ, δ] → R[X; σ, δ] is homogeneous if for all a ∈ R and m ∈ N, β(aX m) =
β(a)X m. If γ : R → R is any (additive) map, we may extend it homogeneously to
R[X; σ, δ] by defining γ(aX m) := γ(a)X m (imposing additivity).
3. Non-associative Ore extensions of non-associative rings
We use this small section to present a couple of results that hold true for any
non-unital, non-associative Ore extension of a non-unital, non-associative ring.
Lemma 3.1 (Homogeneously extended ring endomorphism). Let R[X; σ, δ] be a
non-unital, non-associative Ore extension of a non-unital, non-associative ring R.
If γ is an endomorphism on R, then the homogeneously extended map is an endo-
morphism on R[X; σ, δ] if and only if
(3)
γ(a) · πm
i (γ(b)) = γ(a) · γ(πm
i (b)),
for all i, m ∈ N and a, b ∈ R.
Proof. Additivity follows from the definition, while for any monomials aX m and
bX n,
γ(aX m · bX n) = γ Xi∈N
γ(aX m) · γ(bX n) = γ(a)X m · γ(b)X n =Xi∈N
i (b)X i+n! =Xi∈N
a · πm
γ(a) · γ(cid:0)πm
i (b)(cid:1)X i+n,
γ(a) · πm
i (γ(b))X i+n.
Comparing coefficients between the two completes the proof.
(cid:3)
Corollary 3.2 (Homogeneously extended unital ring endomorphism). Let R[X; σ, δ]
be a unital, non-associative Ore extension of a unital, non-associative ring R. If
α is an endomorphism on R and there exists an a ∈ R such that α(a) = 1, then
the homogeneously extended map on R[X; σ, δ] is an endomorphism if and only if
α commutes with δ and σ.
Proof. This follows from Lemma 3.1 by choosing a so that α(a) = 1: if α commutes
with δ and σ, then πm
i (α(b)) =
α(πm
0(b)) =
α(δ(b)). If choosing m = 1 and i = 1, π1
1 (b)) = α(σ(b)). (cid:3)
i (b)), then by choosing m = 1 and i = 0, π1
i (b)). On the other hand, if πm
0(α(b)) = δ(α(b)), and α(π1
1(α(b)) = σ(α(b)), α(π1
i (α(b)) = α(πm
4. Hom-associative Ore extensions of non-associative rings
The following section is devoted to the question what non-unital, non-associative
Ore extensions of non-unital, non-associative rings R are hom-associative?
Proposition 4.1 (Hom-associative Ore extension). Let R[X; σ, δ] be a non-unital,
non-associative Ore extension of a non-unital, non-associative ring R. Furthermore,
let αi,j (a) ∈ R be dependent on a ∈ R and i, j ∈ N>0, and put for an additive map
α : R[X; σ, δ] → R[X; σ, δ],
(4)
α (aX m) =Xi∈N
αi+1,m+1(a)X i,
∀a ∈ R, ∀m ∈ N.
6
PER B ACK, JOHAN RICHTER, AND SERGEI SILVESTROV
Then R[X; σ, δ] is hom-associative with the twisting map α if and only if for all
a, b, c ∈ R and k, m, n, p ∈ N,
(5)
Xj∈NXi∈N
αi+1,m+1(a) · πi
k−j(cid:0)b · πn
j−p(c)(cid:1) =Xj∈NXi∈N
Proof. For any a, b, c ∈ R and m, n, p ∈ N,
(a · πm
i (b)) · πi+n
k−j (αj+1,p+1(c)) .
α (aX m) · (bX n · cX p) = α (aX m) ·
Xq∈N(cid:0)b · πn
α (aX m) ·(cid:0)(cid:0)b · πn
q (c)(cid:1) X q+p
q (c)(cid:1) X q+p(cid:1)
αi+1,m+1(a)X i ·(cid:0)(cid:0)b · πn
l(cid:0)b · πn
l(cid:0)b · πn
k−j(cid:0)b · πn
i (b)) X i+n! · α (cX p)
=Xq∈N
=Xq∈NXi∈N
=Xq∈NXi∈NXl∈N
=Xl∈NXj∈NXi∈N
=Xk∈NXj∈NXi∈N
αi+1,m+1(a) · πi
αi+1,m+1(a) · πi
αi+1,m+1(a) · πi
(a · πm
q (c)(cid:1) X q+p(cid:1)
q (c)(cid:1) X l+q+p
j−p(c)(cid:1) X l+j
j−p(c)(cid:1) X k,
i (b)) X i+n · α (cX p)
i (b)) X i+n ·Xj∈N
αj+1,p+1(c)X j
(a · πm
i (b)) X i+n · αj+1,p+1(c)X j
(a · πm
i (b)) · πi+n
l
(αj+1,p+1(c)) X l+j
(a · πm
i (b)) · πi+n
k−j (αj+1,p+1(c)) X k.
(a · πm
(aX m · bX n) · α (cX p) = Xi∈N
=Xi∈N
=Xi∈N
=Xi∈NXj∈N
=Xi∈NXj∈NXl∈N
=Xk∈NXj∈NXi∈N
(a · πm
Comparing coefficients completes the proof.
(cid:3)
Corollary 4.2. Let R[X; σ, δ] be a non-unital, hom-associative Ore extension of
a non-unital, non-associative ring R, with twisting map defined by (4). Then the
following assertions hold for all a, b, c ∈ R and k, p ∈ N:
I0,a
αi+1,1(a) · πi
k−p(b · c) =(a · b) · αk+1,p+1(c),
(6)
I0,a
Xi=k−p−1
Xi=k−p
αi+1,1(a) ·(cid:0)πi
k−p−1(b · σ(c))(cid:1)
HOM-ASSOCIATIVE ORE EXTENSIONS AND WEAK UNITALIZATIONS
7
+
I0,a
Xi=k−p
ai+1,1(cid:0)πi
k−p(b · δ(c))(cid:1) =(a · b) · (δ(αk+1,p+1(c)) + σ(αk,p+1(c)))
=(a · b) · (αk+1,p+1(δ(c)) + αk,p+1(σ(c))),
I1,a
Xi=k−p
αi+1,2(a) · πi
k−p(b · c) = (a · σ(b)) · (δ(αk+1,p+1(c)) + σ(αk,p+1(c)))
+ (a · δ(b)) · αk+1,p+1(c),
(7)
(8)
where α0,p+1(·) := 0, and Ip,a is the smallest natural number, depending on p and
a, such that αi+1,p(a) = 0 for all i > Ip,a.
Proof. We get (6), the first equality in (7), and (8) immediatly from the cases
m = n = 0, m = 0, n = 1, and m = 1, n = 0 in (5), respectively. The second
equality in (7) follows from comparison with (6).
(cid:3)
Remark 4.3. In case k < p, or k > I0,a in (6), (a · b) · αk+1,p+1(c) = 0. The
statement is analogous for (7) and (8).
Corollary 4.4. Let R[X; σ, δ] be a non-unital, hom-associative Ore extension of
a non-unital, non-associative ring R, with twisting map defined by (4). Then the
following assertions hold for all a, b, c ∈ R and j, p ∈ N:
(9)
(a · b) · σ(αI+1,p+1(c)) = (a · b) · αI+1,p+1(σ(c)),
(10)
I = max(Ip,c, Ip,δ(c)),
(a · b) · δ(α1,p+1(c)) = (a · b) · α1,p+1(δ(c)) =((a · b) · αj+1,j+1(δ(c))
0
if p = 0,
if p 6= 0.
Proof. Put k = max(Ip,c, Ip,δ(c)) and k = 0 in (7), respectively.
(cid:3)
5. Hom-associative Ore extensions of hom-associative rings
In this section, we will continue our previous investigation, but narrowed down
to hom-associative Ore extensions of hom-associative rings.
Corollary 5.1. Let R[X; σ, δ] be a non-unital, non-associative Ore extension of
a non-unital, hom-associative ring R, and extend the twisting map α : R → R
homogeneously to R[X; σ, δ]. Then R[X; σ, δ] is hom-associative if and only if for
all a, b, c ∈ R and l, m, n ∈ N,
(11)
Xi∈N
α(a) · πm
i (cid:0)b · πn
l−i(c)(cid:1) =Xi∈N
(a · πm
i (b)) · πi+n
l
(α(c)) .
Proof. A homogeneous α corresponds to αi+1,m+1(a) = α(a)·δi,m and αj+1,p+1(c) =
α(c) · δj,p in Proposition 4.1, where δi,m is the Kronecker delta. Then the left-hand
8
PER B ACK, JOHAN RICHTER, AND SERGEI SILVESTROV
side reads
Xj∈NXi∈N
αi+1,m+1(a) · πi
k−j(cid:0)b · πn
j−p(c)(cid:1) =Xj∈NXi∈N
j−p(c)(cid:1)
α(a) · δi,m · πi
k−j(cid:0)b · πn
j−p(c)(cid:1)
k−p−i(c)(cid:1)
l−i(c)(cid:1) ,
k−j(cid:0)b · πn
i (cid:0)b · πn
i (cid:0)b · πn
α(a) · πm
α(a) · πm
α(a) · πm
=Xj∈N
=Xi∈N
=Xi∈N
and the right-hand side
Xj∈NXi∈N
(a · πm
i (b)) · πi+n
k−j (αj+1,p+1(c)) =Xj∈NXi∈N
(a · πm
i (b)) · πi+n
k−j (α(c) · δj,p)
(a · πm
i (b)) · πi+n
k−p (α(c))
(a · πm
i (b)) · πi+n
l
(α(c)) ,
=Xi∈N
=Xi∈N
which completes the proof.
(cid:3)
Corollary 5.2. Let R[X; σ, δ] be a non-unital, hom-associative Ore extension of
a non-unital, hom-associative ring R, with the twisting map α : R → R extended
homogeneously to R[X; σ, δ]. Then, for all a, b, c ∈ R,
(12)
(13)
(14)
(15)
(a · b) · δ(α(c)) = (a · b) · α(δ(c)),
(a · b) · σ(α(c)) = (a · b) · α(σ(c)),
α(a) · δ(b · c) = α(a) · (δ(b) · c + σ(b) · δ(c)),
α(a) · σ(b · c) = α(a) · (σ(b) · σ(c)) .
Proof. Using the same technique as in the proof of Corollary 5.1, this follows from
Corollary 4.2 with a homogeneous α.
(cid:3)
For the two last equations, it is worth noting the resemblance to the unital and
associative case (see the latter part of Remark 2.15).
Corollary 5.3. Assume α : R → R is the twisting map of a non-unital, hom-
associative ring R, and extend the map homogeneously to R[X; σ, δ]. Assume fur-
ther that α commutes with δ and σ. Then R[X; σ, δ] is hom-associative if and only
if for all a, b, c ∈ R and l, m, n ∈ N,
(16)
α(a) ·Xi∈N
πm
i (cid:0)b · πn
l−i(c)(cid:1) = α(a) ·Xi∈N(cid:0)πm
i (b) · πi+n
l
(c)(cid:1) .
Proof. Using Corollary 5.1, we know that R[X; σ, δ] is hom-associative if and only
if for all a, b, c ∈ R and l, m, n ∈ N,
Xi∈N
α(a) · πm
i (cid:0)b · πn
l−i(c)(cid:1) =Xi∈N
(a · πm
i (b)) · πi+n
l
(α(c)) .
HOM-ASSOCIATIVE ORE EXTENSIONS AND WEAK UNITALIZATIONS
9
However, since α commutes with both δ and σ, and R is hom-associative, the
right-hand side can be rewritten as
(a · πm
i (b)) · πi+n
l
Xi∈N
(α(c)) =Xi∈N
=Xi∈N
(a · πm
i (b)) · α(cid:0)πi+n
l
i (b) · πi+n
l
α(a) ·(cid:0)πm
(c)(cid:1)
(c)(cid:1) .
As a last step, we use left-distributivity to pull out α(a) from the sums.
(cid:3)
Proposition 5.4. Assume α : R → R is the twisting map of a non-unital, hom-
associative ring R, and extend the map homogeneously to R[X; σ, δ]. Assume fur-
ther that α commutes with δ and σ, and that σ is an endomorphism and δ a
σ-derivation. Then R[X; σ, δ] is hom-associative.
Proof. We refer the reader to the proof in [22], where it is seen that neither asso-
ciativity, nor unitality is used to prove that for all b, c ∈ R and l, m, n ∈ N,
(17)
Xi∈N
πm
i (cid:0)b · πn
l−i(c)(cid:1) =Xi∈N
i (b) · πi+n
πm
l
(c) ,
and therefore also (16) holds.
(cid:3)
One may further ask oneself whether it is possible to construct non-trivial hom-
associative Ore extensions, starting from associative rings? The answer is affirma-
tive, and the remaining part of this section will be devoted to show that.
Proposition 5.5. Let R[X; σ, δ] be a non-unital, associative Ore extension of a
non-unital, associative ring R, and α : R → R a ring endomorphism that commutes
with δ and σ. Then (R[X; σ, δ], ∗, α) is a multiplicative, non-unital, hom-associative
Ore extension with α extended homogeneously to R[X; σ, δ].
Proof. Since α is an endomorphism on R that commutes with δ and σ, (3) holds,
so by Lemma 3.1, the homogeneously extended map α on R[X; σ, δ] is an endomor-
phism. Referring to Proposition 2.10, (R[X; σ, δ], ∗, α) is thus a hom-associative
ring. Furthermore, we see that ∗ is the multiplication (2) of a non-unital, non-
associative Ore extension, since for all a, b ∈ R and m, n ∈ N,
aX m ∗ bX n = α Xi∈N
=Xi∈N
(a · πm
i (b)) X i+n! =Xi∈N
(a ∗ πm
i (b)) X i+n.
α (a · πm
i (b)) X i+n
(cid:3)
Remark 5.6. Note in particular that if R[X; σ, δ] is unital, then (R[X; σ, δ], ∗, α)
is weakly unital with weak unit 1 due to Corollary 2.11.
Proposition 5.7 (Hom-associative σ-derivation). Let A be an associative algebra,
α and σ algebra endomorphisms, and δ a σ-derivation on A. Assume α commutes
with δ and σ. Then σ is an algebra endomorphism and δ a σ-derivation on (A, ∗, α).
10
PER B ACK, JOHAN RICHTER, AND SERGEI SILVESTROV
Proof. Linearity follows immediately, while for any a, b ∈ A,
σ(a ∗ b) = σ(α(a · b)) = α(σ(a · b)) = α(σ(a) · σ(b)) = σ(a) ∗ σ(b),
δ(a ∗ b) = δ(α(a · b)) = α(δ(a · b)) = α(σ(a) · δ(b) + δ(a) · b)
= α(σ(a) · δ(b)) + α(δ(a) · b) = σ(a) ∗ δ(b) + δ(a) ∗ b,
which completes the proof.
(cid:3)
Remark 5.8. For a non-unital, associative skew polynomial ring R[X; σ, 0], one can
always achieve a deformation into a non-unital, hom-associative skew polynomial
ring using Proposition 5.5 by defining the twisting map α as σ, due to the fact that
σ always commutes with itself and the zero map.
Example 5.9 (Hom-associative quantum planes). The quantum plane can be de-
fined as the unital, associative skew polynomial ring K[Y ][X; σ, 0] =: A where K
is a field of characteristic zero and σ the unital K-algebra automorphism of K[Y ]
such that σ(Y ) = qY and q ∈ K ×, K × being the multiplicative group of nonzero
elements in K. From Remark 5.8, we know that at least one nontrivial deformation
of K[Y ][X; σ, 0] into a hom-associative skew polynomial ring exist, so let us try to
see if there are others as well. Putting α(Y ) = amY m + . . . + a1Y + a0 for some
constants am, . . . , a0 ∈ K and m ∈ N and then comparing σ(α(Y )) = amqmY m +
. . . + a1qY + a0 and α(σ(Y )) = α(qY ) = qα(Y ) = amqY m + . . . + a1qY + a0q
gives α(Y ) = a1Y since q ∈ K × is arbitrary. By the same kind of argument,
α(σ(1)) = σ(α(1)) if and only if α(1) = 1. For such α and any monomial bnY n
where bn ∈ K and n ∈ N>0,
α(σ(bnY n)) =bnα(σ(Y n)) = bnα(σn(Y )) = bnαn(σ(Y )) = bnσn(α(Y ))
=bnσ(αn(Y )) = bnσ(α(Y n)) = σ(α(bnY n)).
By linearity, α commutes with σ on any polynomial in K[Y ][X; σ, 0], and by ex-
cluding the possibility α ≡ 0, we put the twisting map to be αk(Y ) = kY for
some element k ∈ K ×, the index k making evident that the map depends on the
parameter k. This K-algebra endomorphism gives us a family of hom-associative
quantum planes (A, ∗, αk), each value of k giving a weakly unital hom-associative
skew polynomial ring, the member for which k = 1 corresponding to the unital,
associative quantum plane.
If k 6= 1, we get nontrivial deformations, since for
instance X ∗ (Y ∗ Y ) = k4q2Y 2X, while (X ∗ Y ) ∗ Y = k3q2Y 2X. Now that
Proposition 5.7 guarantees that σ is a K-algebra endomorphism on any member of
(A, ∗, αk) as well, we call these members hom-associative quantum planes, satisfying
the commutation relation X ∗ Y = kqY ∗ X.
Example 5.10 (Hom-associative universal enveloping algebras). The two-dimen-
sional Lie algebra L with basis {X, Y } over the field K of characteristic zero is
defined by the Lie bracket [X, Y ]L = Y . Its universal enveloping algebra, U (L), can
be written as the unital, associative differential polynomial ring K[Y ][X; idK[Y ], δ]
where δ = Y d
dY . Put for the K-algebra endomorphism α(Y ) = anY n+. . .+a1Y +a0
where an, . . . , a0 ∈ K and n ∈ N. Then α(δ(Y )) = α(Y ) = anY n + . . . + a1Y + a0
and δ(α(Y )) = nanY n + . . . + a1Y , so by comparing coefficients, a1 is the only
nonzero such. Using the same kind of argument, α(δ(1)) = δ(α(1)) if and only if
α(1) = 1. Let bn ∈ K be arbitrary and m ∈ N>0. Then α(δ(bnY n)) = nbnα(Y n) =
nbnαn(Y ) = nbnan
1 Y n.
Since it is sufficient to check commutativity of α and δ on an arbitrary monomial, we
1 Y n, and δ(α(bnY n)) = δ(bnαn(Y )) = δ(bnan
1 Y n) = nbnan
HOM-ASSOCIATIVE ORE EXTENSIONS AND WEAK UNITALIZATIONS
11
define the twisting map as αk(Y ) = kY, k ∈ K ×, giving a family of hom-associative
universal enveloping algebras of L, (U (L), ∗, αk), where the commutation relation
X · Y − Y · X = Y is deformed to X ∗ Y − Y ∗ X = kY .
Example 5.11 (Hom-associative Weyl algebras). Consider the first Weyl algebra
exhibited as a unital, associative differential polynomial ring, K[Y ][X; idK[Y ], δ] =:
A, where K is a field of characteristic zero and δ = d
dY . Clearly any alge-
bra endomorphism α on K[Y ] commutes with idK[Y ], but what about δ? Since
α(δ(Y )) = α(1) = 1, we need to have δ(α(Y )) = 1 which implies α(Y ) = Y + k,
for some k ∈ K. On the other hand, if α is an algebra endomorphism such that
α(Y ) = Y + k for any k ∈ K, then for any monomial aY m where m ∈ N>0,
α(δ(aY m)) = amα(Y m−1) = amαm−1(Y ) = am(Y + k)m−1,
δ(α(aY m)) = aδ(αm(Y )) = aδ((Y + k)m) = am(Y + k)m−1.
Hence any algebra endomorphism α on K[Y ] that satisfies α(Y ) = Y + k for any
k ∈ K will commute with δ (and any algebra endomorphism that commutes with δ
will be on this form). Since α commutes with δ and σ, we know from Corollary 3.2
that α extends to a ring endomorphism on A as well by α(aX m) = α(a)X m.
Linearity over K follows from the definition, so in fact α extends to an algebra
endomorphism on A. Appealing to Proposition 5.5 and Remark 5.6, we thus have
a family of hom-associative, weakly-unital differential polynomial rings (A, ∗, αk)
with weak unit 1, where k ∈ K and αk is the K-algebra endomorphism defined by
αk (p(Y )X m) = p(Y + k)X m for all polynomials p(Y ) ∈ K[Y ] and m ∈ N. Since
Proposition 5.7 assures δ to be a K-linear σ-derivation on any member (A, ∗, αk)
as well, we call these hom-associative Weyl algebras, including the associative Weyl
algebra in the member corresponding to k = 0. One can note that the hom-
associative Weyl algebras all satisfy the commutation relation X ∗ Y − Y ∗ X = 1,
where 1 is a weak unit.
Lemma 5.12. Let R be a non-unital, non-associative ring. Then in R[X; idR, δ],
(18)
aX n · b =
n
Xi=0(cid:18)(cid:18)n
i(cid:19) · a · δn−i(b)(cid:19) X i,
for any a, b ∈ R and n ∈ N.
Proof. This follows from (2) with σ = idR.
(cid:3)
Lemma 5.13. Let R be a weakly unital, hom-associative ring with weak unit e and
twisting map α commuting with the derivation δ on R, and extend α homogeneously
to R[X; idR, δ]. Then the following hold:
(i) a · δn(e) = δn(e) · a = 0 for any a ∈ R and n ∈ N>0,
(ii) e is a weak unit in R[X; idR, δ],
(iii) eX · q − q · eX =Pn
Proof. First, note that
i=0 α(δ(qi))X i for any q =Pn
i=0 qiX i ∈ R[X; idR, δ].
δ(a · e) =a · δ(e) + δ(a) · e = a · δ(e) + e · δ(a),
δ(a · e) =δ(e · a) = e · δ(a) + δ(e) · a,
and hence δ(e) · a = a · δ(e). Moreover, δ(a · e) = δ(α(a)) = α(δ(a)) = e · δ(a), so
δ(e) · a = 0. Assume δn(e) · a = a · δn(e) = 0 for all n ∈ N>0. Then, since a is
12
PER B ACK, JOHAN RICHTER, AND SERGEI SILVESTROV
arbitrary, δn(e) · δ(a) = δ(a) · δn(e) = 0 as well, and hence
0 =δ(0) = δ (a · δn(e)) = a · δn+1(e) + δ(a) · δn(e) = a · δn+1(e),
0 =δ(0) = δ (δn(e) · a) = δn(e) · δ(a) + δn+1(e) · a = δn+1(e) · a,
so the first assertion holds by induction. The second assertion follows from the first
and Lemma 5.12 with b = e, since for any m ∈ N,
aX m · e = (a · e)X m = α(a)X m = α (aX m) = (e · a)X m = e · (aX m) ,
and by distributivity of the multiplication, e·q = q·e = α(q) for any q ∈ R[X; idR; δ].
The last assertion follows from a direct computation using the first assertion and
Lemma 5.12.
(cid:3)
A well-known fact about the associative Weyl algebras are that they are simple.
This fact is also true in the case of the non-associative Weyl algebras introduced in
[23], and it turns out that the hom-associative Weyl algebras have this property as
well.
Proposition 5.14. The hom-associative Weyl algebras are simple.
Proof. The main part of the proof follows the same line of reasoning that can be
applied to the unital and associative case; let (A, ∗, αk) be any hom-associative
Weyl algebra, and I any nonzero ideal of it. Let p = Pi∈N pi(Y )X i ∈ I be an
arbitrary nonzero polynomial with pi(Y ) ∈ K[Y ], and put m := maxi(deg(pi(Y ))).
Then, since 1 ∈ A is a weak unit in (A, ∗, αk), we may use Lemma 5.13 and the
commutator [·, ·] to compute
[X, p] =Xi∈N
αk(cid:0)p′
i(Y )X i(cid:1) =Xi∈N
i(Y + k)X i.
p′
Since maxi(deg(p′
i(Y + k)) = m − 1, by applying the commutator to the resulting
polynomial with X m times, we get a polynomial Pj∈N ajX j of degree n, where
an ∈ K is nonzero. Then
Xj∈N
Y ∗Xj∈N
ajX j ∗ Y =Xj∈NXi∈N
ajX j = αk
Y Xj∈N
=Xj∈N
aj ∗ Y X j.
aj ∗ πj
i (Y )X i =Xj∈N(cid:0)aj ∗ X j−1 + aj ∗ Y X j(cid:1) ,
= αk
ajX j
Xj∈N
=Xj∈N
ajY X j
αk(cid:0)ajY X j(cid:1)
Therefore deg(cid:16)hPj∈N ajX j, Yi(cid:17) = n − 1, where deg(·) now denotes the degree of
a polynomial in X. By applying the commutator to the resulting polynomial with
Y n times, we get an ∗ 1 ∈ I;
an ∗ 1 = αk(an) = an ∈ I =⇒ a−1
n ∗ (an ∗ 1) = a−1
n ∗ an = αk(1) = 1 ∈ I.
Take any polynomial q =Pi∈N qi(Y )X i in (A, ∗, αk). Then
qi(Y )X i = q ∈ I, and therefore I = (A, ∗, αk).
1 ∗Xi∈N
qi(Y − k)X i =Xi∈N
(cid:3)
HOM-ASSOCIATIVE ORE EXTENSIONS AND WEAK UNITALIZATIONS
13
6. Weak unitalizations of hom-associative algebras
For a non-unital, associative R-algebra A consisting of an R-module M endowed
with a multiplication, one can always find an embedding of the algebra into a unital,
associative algebra by taking the direct sum M ⊕ R and defining multiplication by
(m1, r1)·(m2, r2) := (m1 ·m2 +r1 ·m2+r2 ·m1, r1 ·r2), m1, m2 ∈ M and r1, r2 ∈ R.
A can then be embedded by the injection map M → M ⊕ 0, being an isomorphism
into the unital, associative algebra M ⊕ R with the unit given by (0, 1).
In [9], Fr´egier and Gohr showed that not all hom-associative algebras can be em-
bedded into even a weakly unital hom-associative algebra. In this section, we prove
that any multiplicative hom-associative algebra can be embedded into a multiplica-
tive, weakly unital hom-associative algebra by twisting the above unitalization of
a non-unital, associative algebra with α. We call this a weak unitalization.
Proposition 6.1. Let M be a non-unital, non-associative R-algebra and α a linear
map on M . Endow M ⊕ R with the following multiplication:
(19)
(m1, r1) • (m2, r2) :=(m1 · m2 + r1 · α(m2) + r2 · α(m1), r1 · r2),
for any m1, m2 ∈ M and r1, r2 ∈ R. Then M ⊕ R is a non-unital, non-associative
R-algebra.
Proof. R can be seen as a module over itself, and since any direct sum of modules
over R is again a module over R, M ⊕ R is a module over R. For any m1, m2 ∈ M
and λ, r1, r2 ∈ R,
λ · ((m1, r1) • (m2, r2)) = λ · (m1 · m2 + r1 · α(m2) + r2 · α(m1), r1 · r2)
= (λ · m1 · m2 + λ · r1 · α(m2) + λ · r2 · α(m1), λ · r1 · r2)
= (λ · m1 · m2 + λ · r1 · α(m2) + r2 · α(λ · m1), λ · r1 · r2)
= (λ · m1, λ · r1) • (m2, r2) = (λ · (m1, r1)) • (m2, r2),
((m1, r1) + (m2, r2)) • (m3, r3) =(m1 + m2, r1 + r2) • (m3, r3)
= ((m1 + m2) · m3 + (r1 + r2) · α(m3)
+r3 · α(m1 + m2), (r1 + r2) · r3))
= (m1 · m3 + r1 · α(m3) + r3 · α(m1), r1 · r3)
+ (m2 · m3 + m2 · α(m3) + r3 · α(m2), r2 · r3)
=(m1, r1) • (m3, r3) + (m2, r2) • (m3, r3),
so the binary operation • is linear in the first argument, and by symmetry, also
linear in the second argument.
(cid:3)
Proposition 6.2 (Weak unitalization). If (M, ·, α) is a multiplicative hom-associ-
ative algebra over an associative, commutative, and unital ring R, then (M ⊕
R, •, βα) is a multiplicative, weakly unital hom-associative algebra over R with
weak unit (0, 1). Here, • is given by (19) and βα : M ⊕ R → M ⊕ R by
(20)
βα((m1, r1)) :=(α(m1), r1),
for any m1 ∈ M and r1 ∈ R.
We call (M ⊕ R, •, βα) a weak unitalization of (M, ·, α).
14
PER B ACK, JOHAN RICHTER, AND SERGEI SILVESTROV
Proof. We proved in Proposition 6.1 that the multiplication • made M ⊕ R a non-
unital, non-associative algebra, and due to the fact that α is linear, it follows that
βα is also linear. Multiplicativity of βα also follows from that of α, since for any
m1, m2, m3 ∈ M and r1, r2, r3 ∈ R,
βα ((m1, r1)) • βα ((m2, r2)) =(α(m1), r1) • (α(m2), r2)
= (α(m1) · α(m2) + r1 · α(α(r2)) + r2 · α(α(r1)), r1 · r2)
= (α(m1 · m2) + r1 · α(α(r2)) + r2 · α(α(r1)), r1 · r2)
= (α (m1 · m2 + r1 · α(r2) + r2 · α(r1)) , r1 · r2)
=βα ((m1, r1) • (m2, r2)) ,
while hom-associativity can be proved by the following calculation:
βα ((m1, r1)) • ((m2, r2) • (m3, r3)) =(α(m1), r1) • (m2 · m3 + r2 · α(m3)
+ r3 · α(m2), r2 · r3)
= (α(m1) · (m2 · m3) + r2 · α(m1) · α(m3)
+ r3 · α(m1) · α(m2)
+ r1 · α(m2 · m3 + r2 · α(m3) + r3 · α(m2))
+r2 · r3 · α(α(m1)), r1 · r2 · r3)
= ((m1 · m2) · α(m3) + r2 · α(m1) · α(m3)
+ r3 · α(m1) · α(m2)
+ r1 · α(m2 · m3 + r2 · α(m3) + r3 · α(m2))
+r2 · r3 · α(α(m1)), r1 · r2 · r3)
= ((m1 · m2 + r1 · α(m2) + r2 · α(m1)) · α(m3)
+ r1 · r2 · α(α(m3)) + r3 · α(m1 · m2)
+ r3 · α(r1 · α(m2) + r2 · α(m1)), r1 · r2 · r3)
= ((m1, r1) • (m2, r2)) • βα((m3, r3)).
At last, (m1, r1) • (0, 1) = (0, 1) • (m1, r1) = (1 · α(m1), 1 · r1) = βα((m1, r1)). (cid:3)
Remark 6.3. In case α is the identity map, so that the algebra is associative, the
weak unitalization is the unitalization described in the beginning of this section,
thus giving a unital algebra.
Corollary 6.4. (M, ·, α) ∼= (M ⊕ 0, •, βα).
Proof. The projection map π : M ⊕ 0 → M is a bijective algebra homomorphism.
For any m ∈ M , π(βα(m, 0)) = π(α(m), 0) = α(m) and α(π(m, 0)) = α(m),
therefore α ◦ π = π ◦ βα, so by Definition 2.3, (M ⊕ 0, •, βα) ∼= (M, ·, α).
(cid:3)
Using Corollary 6.4, we identify (M, ·, α) with its image in (M ⊕ R, •, βα), seeing
the former as embedded in the latter.
Lemma 6.5. All ideals in a weakly unital hom-associative algebra are hom-ideals.
Proof. Let I be an ideal, a ∈ I and e a weak unit in a hom-associative algebra.
Then α(a) = e · a ∈ I, so α(I) ⊆ I.
(cid:3)
HOM-ASSOCIATIVE ORE EXTENSIONS AND WEAK UNITALIZATIONS
15
A simple hom-associative algebra is always hom-simple, the hom-associative
Weyl algebras in Example 5.11 being examples thereof. The converse is also true if
the algebra has a weak unit, due to Lemma 6.5.
Corollary 6.6. (M, ·, α) is a hom-ideal in (M ⊕ R, •, βα).
Proof. For any m1, m2 and r1 ∈ R, (m1, r1)•(m2, 0) = (m1 ·m2+r1 ·α(m2), 0) ∈ M ,
and (m2, 0) • (m1, r1) = (m2 · m1 + r1 · α(m2), 0) ∈ M , so (M, ·, α) is an ideal in
a weakly unital hom-associative algebra, and by Lemma 6.5 therefore also a hom-
ideal.
(cid:3)
Recall that for a ring R, if there is a positive integer n such that n · a = 0 for all
a ∈ R, then the smallest such n is the characteristic of the ring R, char(R). If no
such positive integer exists, then one defines char(R) = 0.
Proposition 6.7. Let R be a weakly unital hom-associative ring with weak unit
e and injective or surjective twisting map α.
If n · e 6= 0 for all n ∈ Z>0, then
char(R) = 0.
If n · e = 0 for some n ∈ Z>0, then the smallest such n is the
characteristic of R.
Proof. If n·e 6= 0 for all n ∈ Z>0, then clearly we cannot have n·a = 0 for all a ∈ R,
and hence char(R) = 0. Now assume n is a positive integer such that n · e = 0. If
α is injective, then for all a ∈ R,
α(n · a) = n · α(a) = n · (e · a) = (n · e) · a = 0 · a = 0 ⇐⇒ n · a = 0.
On the other hand, if α is surjective, then for all a ∈ R, a = α(b) for some b ∈ R,
and hence n · a = n · α(b) = n · (e · b) = (n · e) · b = 0 · b = 0.
(cid:3)
Proposition 6.8. Let R := (M, ·, α) be a hom-associative ring, and define
S :=((M ⊕ Z, •, βα),
(M ⊕ Zn, •, βα),
if char(R) = 0,
if char(R) = n.
Then the weak unitalization S of R has the same characteristic as R.
Proof. This follows immediately by using the definition of the characteristic.
(cid:3)
The main conclusion to draw from this section is that any multiplicative hom-
associative algebra can be seen as a multiplicative, weakly unital hom-associative
algebra by its weak unitalization. The converse, that any weakly unital hom-
associative algebra is necessarily multiplicative if also α(e) = e, where e is a weak
unit, should be known. However, since we have not been able to find this statement
elsewhere, we provide a short proof of it here for the convenience of the reader.
Proposition 6.9. If e is a weak unit in a weakly unital hom-associative algebra
A, and α(e) = e, then A is multiplicative.
Proof. For any a, b ∈ A, α(e)·(a · b) = e ·(a · b) = α (a · b). Using hom-associativity,
α(e) · (a · b) = (e · a) · α(b) = α(a) · α(b).
(cid:3)
Acknowledgment. We would like to thank Lars Hellstrom for discussions leading
to some of the results presented in the article.
16
PER B ACK, JOHAN RICHTER, AND SERGEI SILVESTROV
References
[1] N. Aizawa and H. Sato, q-deformation of the Virasoro algebra with central extension, Phys.
Lett. B, 256(2) (1991), 185 -- 90 (Preprint Hiroshima University HUPD-9012 (1990)).
[2] M. Chaichian, D. Ellinas, and Z. Popowicz, Quantum conformal algebra with central exten-
sion, Phys. Lett. B, 248 (1990), 95 -- 99.
[3] M. Chaichian, A. P. Isaev, J. Lukierski, Z. Popowic, and P. Presnajder, q-deformations of
Virasoro algebra and conformal dimensions, Phys. Lett. B, 262(1) (1991), 32 -- 38.
[4] M. Chaichian, P. Kulish, and J. Lukierski, q-deformed Jacobi identity, q-oscillators and q-
deformed infinite-dimensional algebras, Phys. Lett. B, 237(3 -- 4) (1990), 401 -- 406.
[5] M. Chaichian, Z. Popowicz, and P. Presnajder, q-Virasoro algebra and its relation to the
q-deformed KdV system Phys. Lett. B, 249(1) (1990), 63 -- 65.
[6] T. L. Curtright and C. K. Zachos, Deforming maps for quantum algebras, Phys. Lett. B,
243(3) (1990), 237 -- 244.
[7] T. L. Curtright, D. B. Fairlie, and C. K. Zachos, Ternary Virasoro-Witt algebra, Phys. Lett.
B, 666(4) (2008), 386 -- 390.
[8] C. Daskaloyannis, Generalized deformed Virasoro algebras, Modern Phys. Lett. A, 7(9)
(1992), 809 -- 816.
[9] Y. Fregier and A. Gohr, On unitality conditions
for Hom-associative algebras,
arXiv:0904.4874 (2009).
[10] J. T. Hartwig, D. Larsson, and S. D. Silvestrov, Deformations of Lie algebras using σ-
derivations, J. of Algebra, 295(2) (2006), 314 -- 361 (Preprint Lund University LUTFMA-
5036-2003 (2003)).
[11] N. Hu, q-Witt algebras, q-Lie algebras, q-holomorph structure and representations, Algebra
Colloq., 6(1) (1999), 51 -- 70.
[12] C. Kassel, Cyclic homology of differential operators, the Virasoro algebra and a q-analogue,
Comm. Math. Phys., 146(2) (1992), 343 -- 356.
[13] D. Larsson and S. D. Silvestrov, Quasi-Hom-Lie algebras, central extensions and 2-cocycle-
like identities, J. Algebra, 288(2) (2005), 321 -- 344 (Preprint Lund University LUTFMA-5038-
2004 (2004)).
[14] D. Larsson and S. D. Silvestrov, Quasi-Lie Algebras, in "Noncommutative geometry and
representation theory in mathematical physics", eds. J. Fuchs, J. Mickelsson, G. Rozenblioum,
A. Stolin, A. Westerberg, Amer. Math. Soc., Providence, RI, Contemp. Math., vol. 391,
(2005), 241-248. (Preprint Lund University LUTFMA-5049-2004 (2004)).
[15] D. Larsson and S. D. Silvestrov, Graded quasi-Lie algebras, Czechoslovak J. Phys., 55(11)
(2005), 1473 -- 1478.
[16] K. Q. Liu, Quantum central extensions, C. R. Math. Rep. Acad. Sci. Canada. 13 (1991),
135 -- 140.
[17] K. Q. Liu, Characterizations of the quantum Witt algebra, Lett. Math. Phys., 24(4) (1992),
257 -- 265.
[18] K. Q. Liu, The Quantum Witt Algebra and Quantization of Some Modules over Witt Algebra,
PhD thesis, University of Alberta, 1992.
[19] A. Makhlouf and S. D. Silvestrov, Hom-algebra structures, J. Gen. Lie Theory Appl., 2(2)
(2008), 51 -- 64 (Preprint Lund University LUTFMA-5074-2006 (2006)).
[20] A. Makhlouf and S. D. Silvestrov, Hom-algebras and hom-coalgebras, J. Algebra Appl., 9(4)
(2010), 553 -- 589 (Preprint Lund University LUTFMA-5103-2008 (2008) and arXiv:0811.0400
(2008)).
[21] A. Makhlouf A and S. D. Silvestrov, Hom-Lie admissible hom-coalgebras and hom-Hopf
algebras, in Generalized Lie Theory in Mathematics, Physics and Beyond, S. Silvestrov, E.
Paal et al eds., Springer, Berlin, 2009, chapter 17 pp 189 -- 206 (Preprint Lund University
LUTFMA-5091-2007 (2007) and arXiv:0709.2413 (2007)).
[22] P. Nystedt, A combinatorial proof of associativity of Ore extensions, Discrete Math., 313(23)
(2013), 2748 -- 2750.
[23] P. Nystedt, J. Oinert, and J. Richter, Non-associative Ore extensions, Isr. J. Math., 224(1)
(2018), 263 -- 292, arXiv:1509.01436 (2015).
[24] P. Nystedt, J. Oinert, and J. Richter, Monoid Ore extensions, arXiv:1705.02778 (2017).
[25] G. Sigurdsson and S. Silvestrov, Graded quasi-Lie algebras of Witt type, Czech J Phys.,
56(10 -- 11) (2006), 1287 -- 1291.
HOM-ASSOCIATIVE ORE EXTENSIONS AND WEAK UNITALIZATIONS
17
[26] D. Yau, Hom-algebras and homology, J. Lie Theory, 19 (2009), 409 -- 421.
Division of Applied Mathematics, The School of Education, Culture and Communi-
cation, Malardalen University, Box 883, SE-721 23 Vasteras, Sweden
E-mail addresses: [email protected], [email protected], and [email protected]
|
1410.8306 | 2 | 1410 | 2017-10-23T16:08:45 | Algebraic entropy of amenable group actions | [
"math.RA",
"math.GR",
"math.RT"
] | Let $R$ be a ring, let $G$ be an amenable group and let $R\ast G$ be a crossed product. The goal of this paper is to construct, starting with a suitable additive function $L$ on the category of left modules over $R$, an additive function on a subcategory of the category of left modules over $R\ast G$, which coincides with the whole category if $L({}_RR) <\infty$. This construction can be performed using a dynamical invariant associated with the original function $L$, called algebraic $L$-entropy. We apply our results to two classical problems on group rings: the Stable Finiteness and the Zero-Divisors Conjectures. | math.RA | math |
Algebraic entropy of amenable group actions
Simone Virili∗
August 24, 2018
Abstract
Let R be a ring, let G be an amenable group and let RG be a crossed product. The goal of this
paper is to construct, starting with a suitable additive function L on the category of left modules over
R, an additive function on a subcategory of the category of left modules over RG, which coincides
with the whole category if LpRRq ă 8. This construction can be performed using a dynamical invariant
associated with the original function L, called algebraic L-entropy. We apply our results to two classical
problems on group rings: the Stable Finiteness and the Zero-Divisors Conjectures.
-- -- -- -- -- -- -- -- -- -- --
2010 Mathematics Subject Classification. 16S35, 43A07, 16D10, 18E35.
Key words and phrases. Length functions, Gabriel dimension, algebraic entropy, amenable groups,
zero divisors, stable finiteness.
Contents
1 Introduction
2 Length functions and torsion theories
2.1 Length functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.2 Gabriel localization and Gabriel dimension . . . . . . . . . . . . . . . . . . . . . . . . . .
2.3 Length functions compatible with self-equivalences . . . . . . . . . . . . . . . . . . . . . .
2.4 Examples of length functions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2
5
5
7
9
9
3 Amenable groups and crossed products
10
3.1 Amenable groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.2 Non-negative real functions on finite subsets of an amenable group . . . . . . . . . . . . . 11
3.3 Crossed products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4 The algebraic L-entropy
13
4.1 Definition and basic properties
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
4.2 The algebraic entropy is upper continuous . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
4.3 The algebraic entropy is additive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
4.4 Values on (sub)shifts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
5 Applications
18
5.1 Stable finiteness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
5.2 Zero-Divisors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
∗The author was partially supported by DGI MINECO MTM2011-28992-C02-01, MINECO MTM2014-53644-P, by the
Comissionat per Universitats i Recerca de la Generalitat de Catalunya and by the Fondazione Cassa di Risparmio di Padova
e Rovigo (Progetto di Eccellenza "Algebraic structures and their applications")
1
1
Introduction
Let V be a finite dimensional vector space over a given field K, and consider a surjective endomorphism
φ : V Ñ V . Then φ has to be injective, and one way to show this is to compute dimensions:
dimKpV q " dimKpφpV qq ` dimKpKerpφqq " dimKpV q ` dimKpKerpφqq
so that
dimKpKerpφqq " 0 ,
hence Kerpφq " 0. A left module M over a ring R is said to be Hopfian if any of its surjective
endomorphisms is an automorphism. Thus, the above argument shows that finite dimensional vector
spaces are Hopfian modules. Repeating these computations, but with composition length ℓp´q of modules
used instead of dimension, one can show that modules of finite length over any ring are Hopfian.
Let us try to abstract the above idea: fix a ring R and consider a function L : R-Mod Ñ Rě0 Y t8u,
that associates to any left R-module M the value LpM q P Rě0 Y t8u. We say that L is
-- additive if, given a short exact sequence 0 Ñ A Ñ B Ñ C Ñ 0 in R-Mod, LpBq " LpAq ` LpCq;
-- faithful provided LpM q " 0 if and only if M " 0.
If we have a faithful additive function on R-Mod, then we can conclude in the exact same way that all
the modules in the class FinpLq :" tM P R-Mod : LpM q ă 8u are Hopfian.
A rich source of Hopfian modules is the class of Noetherian modules. The usual proof that a Noethe-
rian module M is Hopfian is as follows: any surjective endomorphism φ : M Ñ M induces isomorphisms
Kerpφq -- Ð Kerpφ2q{Kerpφq -- Ð Kerpφ3q{Kerpφ2q -- Ð . . .
By the ascending chain condition, the chain Kerpφq Ď Kerpφ2q Ď Kerpφ3q Ď . . . stabilizes, so there exists
n P N such that 0 -- Kerpφn`1q{Kerpφnq -- Kerpφq. There is another way to show that Noetherian
modules are Hopfian: using additive functions. In fact, in this generality, it is not possible to use just
one faithful additive function, but we need to introduce an entire family of (not always faithful) additive
functions that, when used together, allow us to conclude:
The first step is to notice that, given a hereditary torsion class T Ď R-Mod, there is an additive
function
ℓT : R-Mod Ñ Rě0 Y t8u ,
defined as
ℓT pM q " sup
ℓT pσq ,
σ
where σ ranges in all the finite sequences of the form σ : 0 " M0 Ď M1 Ď . . . Ď Mn " M and
ℓT pσq :" #ti P t1, . . . , nu : Mi{Mi´1 R T u. In other words, ℓT pM q is the composition length of M in
the Gabriel quotient R-Mod{T (see Section 2). Notice that ℓT pM q " 0 if and only if M P T .
Now that we have a procedure that takes as an input a hereditary torsion class and produces an
additive function, we need a source for torsion classes. Thus, our second step is to recall that the Gabriel
filtration of R-Mod is a transfinite sequence of hereditary torsion classes Cα Ď R-Mod such that:
-- C0 is the class containing just the 0-modules;
-- if Cα is given, Cα`1 is the smallest hereditary torsion class containing Cα and all the modules M
such that, given N ď M , exactly one between N and M {N is in Cα (these are those M that become
simple in the Gabriel quotient R-Mod{Cα);
-- if λ is a limit ordinal, Cλ is the smallest hereditary torsion class containing all the Cα, for α ă λ.
For any ordinal α, we denote by ℓα : R-Mod Ñ Rě0 Y t8u the additive function induced by Cα with the
above procedure.
At this point, we can conclude with few observations: given a Noetherian left R-module M and
a surjective endomorphism φ : M Ñ M suppose, looking for a contradiction, that Kerpφq ‰ 0. Using
that Kerpφq is Noetherian, we can find an ordinal α such that Kerpφq P Cα`1zCα. Considering the
α ` 1-torsion part of M , Tα`1M :" tx P M : Rx P Cα`1u, we obtain the following short exact sequence:
0 Ñ Kerpφq Ñ Tα`1M Ñ Tα`1M Ñ 0 .
Furthermore, ℓαpKerpφqq ď ℓαpTα`1M q ă 8 (where the finiteness of these quantities is a consequence
of Noetherianity, see Lemma 2.15. A simple way to see this is that any object in the quotient category
Cα`1{Cα is semi-Artinian and objects that are both Noetherian and semi-Artinian do have finite length).
Thus, by the additivity of ℓα, ℓαpKerpφqq " 0, that is, Kerpαq P Cα, which is a contradiction. Thus
Kerpφq " 0 and φ is an automorphism as desired.
2
To summarize, the above strategy consists in: finding a suitable filtration of R-Mod by hereditary
torsion classes, associate to any of these torsion classes an additive function, and finally select a suitable
length function in our family to prove the injectivity of the given map. One of the main observation of
this paper is that this same strategy can be adapted to find a partial solution of the following famous
conjecture:
Stable Finiteness Conjecture (Kaplansky, 1972). Let K be a field and let G be a group. Then, the
group ring KrGs is stably finite.
The above conjecture was verified by Kaplansky [Kap95] in case K " C, and similar arguments allow
to solve the conjecture in the positive for any field of zero characteristic. Furthermore, it was proved by
Ara, O'Meara and Perera [AOP02] that KrGs is stably finite whenever G is residually amenable and K
is an arbitrary division ring. Soon after, this last result was extended by Elek and Szab´o [ES04], who
proved that the group ring KrGs is stably finite for K any division ring and G a sofic group. Let us also
remark that Ara et al. proved that any crossed product KG (not just the group ring KrGs, see Section
3.3) is stably finite, provided K is a division ring and G is an amenable group (see Section 3.1).
The relation between the above conjecture and Hopficity is clear: the stable finiteness of the group
ring KrGs means exactly that all the free KrGs-modules of finite rank KrGsn are Hopfian. In this paper
we extend, and provide a new proof for, the known positive solution of the above conjecture in case G
is an amenable group. Our main result in this direction will be the following:
Theorem A. Let R be a left Noetherian ring, let G be a finitely generated amenable group and let RG
be a fixed crossed product. Then, for any finitely generated left R-module RK P R-Mod, any RG-
submodule of RG bR K is Hopfian.
In particular, EndRGpM q is stably finite for any submodule RGM ď RG bR K.
Notice that the above theorem is an extremely strong version of the Stable Finiteness Conjecture
that cannot be extended to sofic groups. In fact, the above statement fails for free non-Abelian groups
(see Example 5.6 and Problem 5.7). On the other hand, recently Li and Liang [LL15] were able to adapt
our strategy to show that RrGs is stably finite whenever R is left Noetherian and G is sofic. It is still
an open question if the same is true for more general crossed products.
Let us briefly describe our strategy to prove Theorem A. The idea is very close to the one we sketched
above in proving the Hopficity of Noetherian modules using additive functions. Fix a crossed product
RG, with G finitely generated amenable and R Noetherian. With a little abuse of notation, for any
ordinal α we denote by Cα the hereditary torsion class of those RG-modules RGM whose underlying
R-module RM is in Cα (the α-th layer of the Gabriel filtration of R-Mod, as described above). Now
we need suitable additive functions of RG-Mod, one for each α. To do this, we need to "extend" the
additive functions ℓα : R-Mod Ñ Rě0 Y t8u from R-Mod to RG-Mod. This problem of extension of a
given additive function is an interesting matter of dynamical nature, that deserves a brief discussion in its
own (see Theorem B below). For the moment, it is enough for us to know that this is the point where we
use the amenability of G to produce, for any ordinal α, an additive function Lα : RG-Mod Ñ Rě0 Yt8u
such that:
-- "Lα extends ℓα", that is, LαpRG bR Kq " ℓαpKq for any left R-module K such that ℓαpKq ă 8;
-- "Lα is as faithful as it can be", that is, LαpRGN q " 0 if and only if ℓαpRN q " 0, for any
RG-submodule N ď RG bR K, with K as above.
let K be a finitely generated left R-module, consider an RG-submodule
Now it is easy to conclude:
M ď RGbRK, and let φ : M Ñ M be a surjective endomorphism. Suppose, looking for a contradiction,
that Kerpφq ‰ 0. Using the Noetherianity of K, it is possible to find an ordinal α such that RKerpφq P
Cα`1zCα. Then, there is a short exact sequence of RG-modules
Furthermore, since Tα`1pRG bR Kq -- RG bR Tα`1K,
0 Ñ Kerpφq Ñ Tα`1M Ñ Tα`1M Ñ 0 .
LαpKerpφqq ď LαpTα`1M q ď LαpRG bR Tα`1Kq " ℓαpTα`1Kq ă 8
where the equality uses the first property of Lα listed above. By the additivity of Lα, we obtain that
LαpKerpφqq " 0 and so, by the second property listed above, ℓαpRKerpφqq " 0, so Kerpφq P Cα, which is
a contradiction, so Kerpφq " 0 and φ is an automorphism as desired.
As we explained above, in order to apply the machinery of torsion classes and additive functions to
Kaplansky's Stable Finiteness Conjecture we need to answer (at least partially), the following question:
3
Let R be a ring, let G be an amenable group and fix a crossed product RG. Is it possible to
find a map
tadditive functions on R-Modu ÝÑ tadditive functions on RG-Modu
L ÞÝÑ LRG
such that LRGpN q " 0 implies LpN q " 0 for any N ď RG bR K, and LRGpRG bR Kq "
LpKq, for any K P FinpLq?
In fact we will restrict our attention to a particular class of additive functions called length functions,
where an additive function L : R-Mod Ñ Rě0 Y t8u is a length function provided
LpM q " suptLpF q : F ď M finitely generatedu .
The composition length ℓ, and more generally all the additive functions of the form ℓα arising from the
Gabriel filtration, are in fact length functions. Let us also remark that, even when R is a field and L
is the dimension of vector spaces, Elek [Ele99] showed that it is not always possible to extend L to a
length function of RrGs-Mod if G is not an amenable group, so it is essential to include amenability
in our hypotheses. In fact, Elek [Ele03] showed that (again for R a field and L the dimension) this is
always possible when G is finitely generated amenable.
Given a ring R (no hypothesis is needed on the ring) and a finitely generated amenable group G, fix
a crossed product RG and a length function L : R-Mod Ñ Rě0 Y t8u which is compatible with RG
(see Definition 3.6). In particular, all the functions ℓα arising from some layer in the Gabriel filtration
satisfy these hypotheses.
Given a left RG-module RGM , let FinLpM q :" tRK ď M : LpKq ă 8u. If FinLpM q contains all the
finitely generated R-submodules of M we say that M is locally L-finite and we denote by lFinLpRGq
the class of such modules. For example, lFinLpRGq contains all the left RG-modules RGM such that
LpM q ă 8. Furthermore, given a left R-module RK such that LpKq ă 8, then the left RG-module
RG bR K is in lFinLpRGq. In Section 4 we define the algebraic L-entropy as a function
entL : lFinLpRGq Ñ Rě0 Y t8u .
The main result of Section 4 is the following theorem, showing that the algebraic entropy provides a
partial answer to above extension problem:
Theorem B. In the above hypotheses and notation, the invariant entL : lFinLpRGq Ñ Rě0 Y t8u
satisfies the following properties:
(1) entL is a length function;
(2) entLpRG bR Kq " LpKq for any L-finite left R-module K;
(3) entLpRGN q " 0 if and only if LpRN q " 0, for any RG-submodule N ď RG bR K.
The proof of the above theorem will take almost all Section 4, in particular, part (1) of the theorem
will be proved in Sections 4.2 and 4.3, while parts (2) and (3) in Section 4.4.
The final Section 5 is devoted to two applications of the algebraic entropy: the already mentioned
Stable Finiteness Conjecture, and the Zero Divisors Conjecture, which states that, for a torsion-free
group G and a field K, the group ring KrGs is a domain. Using the algebraic entropy we will give a new
proof of the fact, known for group rings, that, provided G is amenable, a given crossed product K G is
a domain if and only if it is an Ore domain. Furthermore, using an approach similar to that of Chung
and Thom [CT13], we will show that the Zero Divisors Conjecture is equivalent to a statement about
the possible range of the algebraic entropy, extending their results from finite fields to arbitrary skew
fields, and from group rings to crossed products (see Theorem 5.9).
It is a pleasure for me to thank Peter V´amos for giving me a copy of his
Acknowledgements.
Ph.D. thesis and for useful discussions started in Padova in 2010. I am also sincerely grateful to my
Ph.D. advisor Dolors Herbera for her encouragement and trust: she gave me time, freedom and several
suggestions that helped me to work independently on this project. Finally, I would like to thank Pere
Ara, Ferran Ced´o, Hanfeng Li, Bingbing Liang and Nhan-Phu Chung for some useful discussions on
preliminary versions of this paper.
4
2 Length functions and torsion theories
All along this section, unless otherwise stated, C denotes a Grothendieck category, that is, a cocomplete
Abelian category, with exact directed colimits (i.e., C satisfies Grothendieck's axiom (Ab.5)) and with a
generator. For unexplained terms and notations we refer to [Ste71].
Remember that any Grothendieck category is well-powered (see [Ste71, Proposition 6, p.94]) and
that the set of all subobjects of a given object M is a bounded and bicomplete lattice, which we denote
by LpM q; the minimum of LpM q is the 0-object and the maximum is M itself. For every family
tNi : i P Iu of subobjects of M we denote by řI Ni (resp., ŞI Ni) the join (resp., meet) of the Ni in
LpM q. If tNi : i P Iu is a directed system of subobjects, řI Ni is called the direct union of the Ni
and it is sometimes denoted also by ŤI Ni. With this notation we can state the equivalent form of
Grothendieck's axiom Ab.5 stating that, given an object M in C, a subobject K of M and a directed
system tNi : i P Iu of subobjects of M ,
ÿI
Ni¸ X K "ÿI
pNi X Kq .
Let us recall the following fundamental properties of Grothendieck categories:
Fact 2.1.
[Ste71, Corollaries 4.3 and 4.4, pp.222 -- 223] Let C be a Grothendieck category, then
(1) C is complete;
(2) C has enough injective objects.
Given a family tMi : i P Iu of objects of C, we denote by śI Mi and ÀI Mi the product and the
coproduct respectively. Given an object M of C, we denote by EpM q the injective envelope of M . Given
an endomorphism φ : M Ñ M , a subobject N of M is φ-invariant if φpN q ď N . Any subobject of a
quotient (or, equivalently, a quotient of a subobject) of an object M is generically called a segment of
M . A series of M is a finite chain of subobjects
σ : 0 " N0 ď N1 ď ď Nn " M .
(2.1)
The factors of σ are the segments of M of the form Ni`1{Ni for some i ă n. Two series of M are
equivalent if they have the isomorphic factors up to reordering. If all the factors of σ are simple objects,
then we say that σ is a composition series for M . If σ1 0 " N 1
m " M is another
series of M , we say that σ1 is a refinement of σ if tN0, . . . , Nnu Ď tN 1
mu. The following fact is
well-known.
1 ď ď N 1
0 ď N 1
0, . . . , N 1
Fact 2.2 (Artin-Schreier's Refinement Theorem). Let C be a Grothendieck category and let M be an
object of C. If σ1 and σ2 are two series of M , then they admit equivalent refinements.
2.1 Length functions
In any category C it is possible to define (real-valued) invariants to measure various finiteness properties
of the objects. In general, we call invariant of C, any map i : C Ñ Rě0 Y t8u such that ipXq " ipX 1q
whenever X and X 1 are isomorphic objects in C.
If we make some stronger assumption on the structure of the category C, we can refine our definition
of invariant in order to obtain a more treatable notion. Indeed, suppose that C is an Abelian category
(or, more generally, an exact category). The information that one usually wants to encode is about
homological properties. In this setting it seems natural to ask that, given a short exact sequence
0 Ñ X1 Ñ X2 Ñ X3 Ñ 0
(2.2)
in C, we have ipX2q " ipX1q ` ipX3q. In this case, we say that i is additive on the sequence (2.2). If i is
additive on all the short exact sequences of C and ip0q " 0, then we say that i is an additive invariant
(or additive function).
In the following lemma we collect some useful properties of additive functions.
Lemma 2.3. Let C be an Abelian category and let i : C Ñ Rě0 Y t8u be an additive function. Then
(1) ipXq ě ipY q for every segment Y of X P C;
(2) ipX1 ` X2q ` ipX1 X X2q " ipX1q ` ipX2q for every pair of subobjects X1, X2 of X P C;
5
A natural assumption in the context of Grothendieck categories is the upper continuity of invariants,
(3) řjodd ipXj q "řjeven ipXjq for every exact sequence 0 Ñ X1 Ñ X2 Ñ Ñ Xn Ñ 0 in C.
given an object X P C and a directed set S " tXα : α P Λu of subobjects of X such that řΛ Xα " X,
we say that i is continuous on S if
ipXq " suptipXαq : α P Λu .
(2.3)
If i is continuous on all the direct unions as above, we say that i is upper continuous. Upper continuity
can be defined in arbitrary Abelian categories even if it seems more meaningful when direct limits exist
and are exact.
Definition 2.4 ( [NR65]). Let C be an Abelian category. An additive and upper continuous invariant
i : C Ñ Rě0 Y t8u is said to be a length function.
In what follows we generally denote length functions by the symbol L. We remark that the usual
definition of length function is given in module categories, which are in particular locally finitely gener-
ated Grothendieck categories. In this special setting, the usual definition of upper continuity is different
(see part (3) of the following proposition). We now show that we are not defining a new notion of upper
continuity but just generalizing this concept to arbitrary Grothendieck categories (similar observations,
with analogous proofs, were already present in [V´am68] for module categories).
Recall that, given an object M of a Grothendieck category C and an ordinal κ, a set tMα : α ă κu
of subobjectsis of M is a continuous chain if
(1) Mα ď Mβ, provided α, β ă κ and α ď β;
(2) Ťαăλ Mα " Mλ for any limit ordinal λ ă κ.
Proposition 2.5. Let C be a Grothendieck category and L : C Ñ Rě0 Y t8u be an additive function.
Consider the following statements:
(1) L is a length function;
(2) given an object M P C, an ordinal κ and a continuous chain tMα : α ă κu of subobjects of M such
that M "Ťαăκ Mα, we have that LpM q " suptLpMαq : α ă κu;
(3) for every object M P C we have that LpM q " suptLpF q : F finitely generated subobject of M u.
Then (1)ô(2) and (2)ð(3). If C is locally finitely generated, then the above statements are all equivalent.
In the last part of this subsection we show that, under suitable conditions, to prove the additivity of
an invariant it is enough to show that it is additive on short exact sequences of finitely generated objects
(see Proposition 2.7). This will be extremely useful in proving that the algebraic entropy is additive.
Lemma 2.6. Let I be a set, let tai : i P Iu and tbi : i P Iu be bounded subsets of Rě0, and let a :" supi ai
and b :" inf i bi. If ai ď a, b ď bi and ai ` bi " c for all i P I, then a ` b " c.
Proof. For any ε ą 0 there exists i P I such that a ´ ai ă ε and b ´ bi ă ε. Thus,
c ´ ε " ai ` pbi ´ εq ă a ` b ă pai ` εq ` bi " c ` ε .
Proposition 2.7. Let R be a ring and let C Ď R-Mod be a subclass closed under subobjects and quotients.
An upper continuous invariant L : C Ñ Rě0 Y t8u such that LpF q ă 8 for any finitely generated F P C
is additive if and only if the following properties hold true:
(1) LpK2q " LpK1q ` LpK3q for any short exact sequence 0 Ñ K1 Ñ K2 Ñ K3 Ñ 0 of finitely
generated modules in C;
(2) given a finitely generated K P C and a directed system of submodules tHiui, LpK{Hq " inf i LpK{Hiq,
where H :"Ťi Hi.
Proof. Consider a short exact sequence 0 Ñ N Ñ M Ñ M {N Ñ 0 in C. Then, LpM q " supF LpF q,
with F ranging in the finitely generated submodules of M . Furthermore, for any such F we have that
LpN X F q " supG LpGq, LpF {pN X F qq " inf G LpF {Gq and LpGq ` LpF {Gq " LpF q, for any G ď
N X F finitely generated (where for these three equalities we used upper continuity, hypothesis (2) and
6
hypothesis (1), respectively). By the above lemma, this implies that LpF q " LpN X F q ` LpF {pN X F qq.
Thus,
LpM q " sup
LpF q
F ďM f.g.
" sup
LpN X F q ` LpF {pN X F qq
F ďM f.g.
" sup
LpN X F q ` sup
LppF ` N q{N q
F ďM f.g.
F ďM f.g.
" LpN q ` LpM {N q
On the other hand, if L is additive, then (1) is clear. Furthermore, given a finitely generated K P C and
a directed system of submodules tHiui, then
LpK{Hq " LpKq ´ LpHq " LpKq ´ sup
i
LpHiq " inf
i
pLpKq ´ LpHiqq " inf
i
LpK{Hiq .
2.2 Gabriel localization and Gabriel dimension
Let C be a Grothendieck category and let A Ď C be a subclass. Recall that A is a semi-closed if, given
a short exact sequence
0 Ñ A Ñ B Ñ C Ñ 0 ,
B P A implies that both A and C belong to A. A Serre class is a semi-closed class that is closed under
extensions. Furthermore, A is a hereditary torsion class (or localizing class) if it is Serre and it is closed
under taking arbitrary direct sums. On the other hand, A is a hereditary torsion free class provided it
is closed under taking sub-objects, extensions, products and injective envelopes.
Definition 2.8. A hereditary torsion theory τ in C is a pair of classes pT , Fq such that
-- the class T of τ -torsion objects is a hereditary torsion class;
-- the class F of τ -torsion free objects is a hereditary torsion free class;
-- pT qK " F and KpFq " T .
In this paper the symbols τ , T and F are always used to denote a torsion theory, a torsion class and
a torsion free class respectively. Since all the torsion theories in the sequel are hereditary, we just
say "torsion theory", "torsion class" and "torsion free class" to mean respectively "hereditary torsion
theory", "hereditary torsion class" and "hereditary torsion free class".
Given a torsion theory τ " pT , Fq, the inclusion T Ñ C has a right adjoint Tτ : C Ñ T , which is
a subfunctor of the identity, called the torsion functor. For any object X P C there is a short exact
sequence of the form
0 Ñ Tτ X Ñ X Ñ X{Tτ X Ñ 0
such that Tτ X P T and X{Tτ X P F.
Let us also recall the close relation between torsion theories and localization of Abelian categories.
We start with the following definition:
Definition 2.9. A localization of C is a pair of adjoint functors Q : C Õ D : S, where D is an Abelian
category, S is fully faithful, and Q is exact and essentially surjective. In this situation, D is called a
quotient category, Q is a quotient functor and S is a section functor. The composition L " SQ : C Ñ C
is called the localization functor.
One can encounter slightly different definitions of localization in other contexts, see for example
[Ran06]. We can now explain the connection between localizations and torsion theories. Indeed, starting
with a localization Q : C Õ D : S and letting L " S Q,
KerpLq " tX P C : LpXq " 0u " tX P C : QpXq " 0u " KerpQq
is a torsion class (use the exactness of Q and the fact that it is a left adjoint). Hence, the localization
pQ, Sq induces a torsion theory pKerpQq, KerpQqKq. On the other hand, one can construct a localization
out of a torsion theory.
Definition 2.10. Let C be a Grothendieck category and τ " pT , Fq a torsion theory. An object X P C
is τ -local if X P F and EpXq{X P F. The full subcategory of C of all the τ -local objects is denoted by
C{T .
7
The definition of the localization induced by a torsion theory depends on the following lemma.
[Gab62] Let C be a Grothendieck category and let τ " pT , Fq be a torsion theory. Then,
Lemma 2.11.
the canonical inclusion C{T Ñ C has a left adjoint functor which is exact.
Definition 2.12. Let C be a Grothendieck category and let τ " pT , Fq be a torsion theory. The inclusion
Sτ : C{T Ñ C is called τ -section functor, while its left adjoint functor Qτ : C Ñ C{T is called τ -quotient
functor. The composition Lτ " Sτ Qτ is called τ -localization functor.
Let us now recall that the Gabriel filtration of C is a transfinite chain t0u " C´1 Ď C0 Ď Ď Cα Ď . . .
of torsion classes defined as follows:
-- C´1 " t0u;
-- suppose that α is an ordinal for which Cα has already been defined. An object C P C is said to
be α-cocritical if C is τα-torsion free and every proper quotient of C is τα-torsion, where τα is the
unique torsion theory whose torsion class is Cα. In the sequel, we will just say α-torsion (resp.,
torsion free) instead of τα-torsion (resp., torsion free). We let Cα`1 be the smallest hereditary
torsion class containing Cα and all the α-cocritical objects;
-- if λ is a limit ordinal, we let Cλ be the smallest hereditary torsion class containing Ťαăλ
For any ordinal α, we let Tα : C Ñ Cα and Qα : C Ñ C{Cα be respectively the torsion and the quotient
functors. Abusing notation, we use the same symbols for the functors Tα : Cα`1 Ñ Cα and Qα : Cα`1 Ñ
Cα`1{Cα, induced by restriction.
Remark 2.13. By definition, a Grothendieck category C has a generator G. Furthermore, G has just
a set (as opposed to a proper class) of subobject, equivalently, it has just a set of quotients. One
can show that Cα`1 is the smallest torsion class containing Cα and the α-cocritical quotients of G.
As a consequences we obtain that there is an ordinal κ such that Cα " Cκ for all α ě κ (just take
κ " suptα : there are α-cocritical quotients of Gu).
Cα.
Consider the union ¯C "Ťα
Cα of the Gabriel filtration (this makes sense by the above remark). An
object belonging to ¯C is said to be an object with Gabriel dimension. The Gabriel dimension of M is
the minimal ordinal δ such that M P Cδ, in symbols G.dimpM q " δ. In general, it may happen that
C ‰ ¯C; if C " ¯C, we say that C is a Gabriel category with Gabriel dimension G.dimpCq " κ, where κ is
the smallest ordinal such that Cκ " C.
In the following example we specialize some of the above notions to categories of modules. Even
if the example is stated for modules, part (1) holds for any Grothendieck category, taking a generator
in place of RR. Part (2) can be generalized to any Grothendieck category with a set of Noetherian
generators.
Example 2.14. Let R be a ring and let C " R-Mod be the category of left R-modules.
(1) If C has Gabriel dimension G.dimpCq " κ, then G.dimpRRq " κ. In fact, the inequality G.dimpCq ě
G.dimpRRq is trivial. For the converse, just notice that if α is an ordinal for which RR P Cα, then
Cα " C. This is because Cα is closed under arbitrary direct sums and quotients, so it contains any
quotient of a free module, that is, any module.
(2) If R is left Noetherian then C is a Gabriel category.
In fact, given an ordinal α, Cα " Cα`1
implies that RR P Cα. To show this notice that, if α is an ordinal for which RR R Cα, the set
I " tRI ď R : RpR{Iq R Cαu is non-empty and, by Noetherianity, I has a maximal element ¯I.
Then, RpR{ ¯Iq R Cα but any of its proper quotients is in Cα. So, RpR{ ¯Iq is α-cocritic and it belongs
to Cα`1, which therefore properly contains Cα.
In what follows we collect some well-known properties of Gabriel dimension (for a proof see [GR74]).
Recall that a Grothendieck category C is said to be semi-Artinian if G.dimpCq " 0.
Lemma 2.15. Given a Gabriel category C, the following statements hold true:
(1) G.dimpCq " suptG. dimpM q : M P Cu;
(2) if N ď M P C, then G.dimpM q " maxtG.dimpN q, G.dimpM {N qu;
(3) let α be an ordinal ă G.dimpCq and M P C, then M P Cα`1 if and only if there exists an ordinal σ
and a continuous chain 0 " N0 ď N1 ď ď Nσ " M , such that Ni`1{Ni is either α-cocritical or
α-torsion for every i ă σ;
(4) let λ be a limit ordinal ď G.dimpCq and M P C, then M P Cλ if and only if M "Ťαăλ TαpM q;
(5) Cα`1{Cα is semi-Artinian for all α ă G.dimpCq;
(6) let N P C be a Noetherian object, then G.dimpN q is a successor ordinal. Furthermore, there exists
a finite series 0 " N0 ď N1 ď ď Nk " N such that Ni{Ni´1 is cocritical for all i " 1, . . . , k.
8
2.3 Length functions compatible with self-equivalences
All along this section, let C be a Grothendieck category, let L : C Ñ Rě0 Y t8u be a length function and
let F : C Ñ C be a self-equivalence, that is,
(Eq. 1) F is essentially surjective, i.e., for all X P C, there exists Y P C such that F pXq -- Y ;
(Eq. 2) F is fully faithful, i.e., for all X, Y P C, the natural morphism HomCpX, Y q Ñ HomCpF pXq, F pY qq
is an isomorphism.
A consequence of the definition is that F preserves any structure defined by universal properties, in par-
ticular, F commutes with direct and inverse limits and it preserves exactness of sequences. Furthermore,
F commutes with injective envelopes and it preserves lattices of subobjects. It is easily seen that
LF : C Ñ Rě0 Y t8u
such that LF pM q " LpF pM qq ,
(2.4)
for all M P C is a length function. In what follows we are going to study to what extent LF can differ
from L. The following example shows that L and LF may be very different.
Example 2.16. Consider a field K and consider the category K K-Mod -- K-Mod K-Mod. This
category is semi-Artinian and it has a self-equivalence F : K K-Mod Ñ K K-Mod such that pM, N q ÞÑ
pN, M q and pφ, ψq ÞÑ pψ, φq. If we take L to be the length function such that LppM, N qq " dimK pM q,
then clearly LF ppM, 0qq " 0 ‰ dimKpM q " LppM, 0qq, provided M ‰ 0.
Definition 2.17. Given a Grothendieck category C and a self-equivalence F : C Ñ C, we say that a
length function L : C Ñ Rě0 Y t8u is compatible with F provided LF pM q " LpF pM qq " LpM q for all
M P C.
Our motivation for studying compatibility of length functions with self-equivalences is the following:
given a ring R and a ring automorphism φ : R Ñ R, we define a self-equivalence
Fφ : R-Mod Ñ R-Mod ,
(2.5)
which is the scalar restriction along φ, that is: given a left R-module RM such that R acts on M via a
ring homomorphism λ : R Ñ EndZpM q, FφpM q is isomorphic to M as an Abelian group, while R acts
on FφpM q via the ring homomorphism λ φ : R Ñ EndZpFφpM qq. We are interested in finding length
functions L such that LpFφpM qq " LpM q.
2.4 Examples of length functions
Example 2.18. Let D be a left Ore domain, let Σ " Dzt0u and let Q " Σ´1D be the ring of left
fractions of D. For any M P D-Mod, the torsion free rank rkpM q is defined to be the dimension of the
left module Σ´1M " Q bD M over the skew field Q. The torsion free rank rk : D-Mod Ñ Rě0 Y t8u,
where rkpM q " 8 whenever the rank of M is not finite, is a length function. In particular, the dimension
of vector spaces over a field is a length function.
Example 2.19. The logarithm of the cardinality log ´ : Z-Mod Ñ Rě0 Y t8u, where log G " 8
whenever G is not finite, is a length function.
In what follows we define the length of a lattice. This can be applied to the lattice of subobjects
of a given object in a Grothendieck category obtaining the so-called composition length, which is the
invariant inspiring the abstract notion of length function.
Definition 2.20. Let pL, ď, 0, 1q be a bounded lattice. A sequence of elements σ : 0 " x0 ň x1 ň ň
xn " 1 is said to be a series of L. Furthermore, the number of strict inequalities in a series σ, is called
the length of σ, in particular the above series has length n; we write it ℓpσq " n. The length of L is
ℓpLq " suptℓpσq : σ a series of Lu .
Example 2.21. Let C be a Grothendieck category. Notice that a series of LpM q is just a series of M .
We can define a function ℓ : C Ñ Rě0 Y t8u, ℓpM q " ℓpLpM qq. Clearly, ℓpM q " 0 if and only if M " 0,
ℓpM q " 1 if and only if M is a simple object and ℓpM q ă 8 if and only if M is both Noetherian and
Artinian. It is a standard result that ℓ is a length function (see for example [Fac98] for a proof in module
categories).
In the following proposition we introduce a family of length functions that will be extremely useful
for our applications of algebraic entropy:
9
Proposition 2.22. Let C be a Grothendieck category, let α be an ordinal, and let Cα be the α-th layer
in the Gabriel filtration of C. Define an invariant
ℓα : C Ñ Rě0 Y t8u
such that
ℓαpM q :" ℓpLpQαM qq
is the length of the lattice of subobjects of QαM in C{Cα. Then, ℓα is a length function, Kerpℓαq " Cα,
and ℓα is compatible with any self-equivalence of C.
Proof. The fact that ℓα is a length function follows since Qα is an exact left adjoint (so it commutes with
direct limits and it sends short exact sequences to short exact sequences). The fact that Kerpℓαq " Cα
follows since QαpXq " 0 if and only if X P Cα, and the unique object in C{Cα whose composition length
is zero is the 0-object. The fact that ℓα is compatible with any self-equivalence of C follows directly
from the observation that, given X P C, the value ℓαpXq just depends on the lattice of subobjects LpXq,
and any self-equivalence preserves lattices of subobjects. To show this one needs just to use the lattice
theoretic description of Gabriel dimension (for this see [Nv87]), and the lattice theoretic description of
composition length given in Definition 2.20.
3 Amenable groups and crossed products
3.1 Amenable groups
Amenable groups were defined by John von Neumann in 1929 as groups admitting a left-invariant mean.
We adopt here an equivalent definition of amenability given by Følner [Fø55].
Indeed, consider two
subsets A, C Ď G, then
-- the C-interior of A is InCpAq " tx P G : xC Ď Au;
-- the C-exterior of A is OutC pAq " tx P G : xC X A ‰ Hu;
-- the C-boundary of A is BCpAq " OutC pAqzInCpAq.
If e P C, one can imagine the above notions as in the following picture
G
G
G
A
x.
A
x.
A x.
e. C
e. C
e. C
BCpAq
InC pAq
OutC pAq
Definition 3.1. A group G is amenable if and only if there exists a directed set pI, ďq and a net
tFi : i P Iu of finite subsets of G such that, for any finite subset C of G,
lim
I
BCpFiq
Fi
" 0 .
(3.1)
Any such net is called a Følner net.
If G is countable, then one can take I " N and just speak about Følner sequences. Furthermore, given
a countable group G and a Følner sequence s " tFn : n P Nu, we say that s is a Følner exhaustion if
(1) e P F0 and Fn Ď Fn`1 for all n P N;
(2) ŤnPN Fn " G.
It can be proved that a finitely generated group is amenable if and only if it admits a Følner exhaustion
(see for example [Pet13, Lemma 5.3]).
Example 3.2.
(1) Any finite group and any finitely generated Abelian group is amenable;
10
(2) it is known that the class of amenable groups is closed under the operations of taking subgroups,
taking factors over normal subgroups, taking extensions and taking increasing unions. We obtain
that a group G is amenable if and only if all its finitely generated subgroups are amenable, in
particular, arbitrary Abelian groups and locally finite groups are amenable;
(3) consider a finitely generated group G and let S " S´1 be a finite set of generators containing the
unit of G. For all n P N`, let BnpSq " ts1 . . . sn : si P Su and define a function:
fS : N` Ñ N` such that fSpnq " BnpSq .
The group G is said to be of sub-exponential growth if the growth of fS is sub-exponential (it can
be shown that this notion does not depend on the choice of the generating set S). If G is of sub-
exponential growth, then tBnpSq : n P N`u is a Følner exhaustion for G (see for example [CSC10,
Section 6.11]);
(4) non-commutative free groups are not amenable. So, any group which contains a free subgroup of
rank 2 is not amenable. There exist amenable groups with exponential growth.
3.2 Non-negative real functions on finite subsets of an amenable group
In their seminal paper [OW87], Ornstein and Weiss introduced a notion of entropy for actions of amenable
groups on metric spaces. Using the theory of quasi-tiles, they were able to prove that the lim sup defining
their entropy is a true limit. In what follows, we recall some of these deep results as they can be applied
with just minor changes to our algebraic setting. The following terminology and results are due to
Ornstein and Weiss [OW87] (see also [HYZ11] and [WZ92]).
Denote by FpGq the family of all finite subsets of G. Let A1, . . . , Ak P FpGq and ε P p0, 1q. The
family tA1, . . . , Aku is ε-disjoint if there are A1
(1) A1
(2) A1
i Ď Ai and A1
i X A1
j " H if 1 ď i ‰ j ď k.
i{Ai ą 1 ´ ε for i " 1, . . . , k;
1, . . . , A1
k P FpGq such that
Given α P p0, 1s and A P FpGq, tA1, . . . , Aku is an α-cover of A if
Finally, tA1, . . . , Aku ε-quasi-tiles A if there exist C1, . . . , Ck P FpGq such that
A X pŤk
i"1 Aiq
A
ě α .
(1) CiAi Ď A, for all i " 1, . . . , k, and tcAi : c P Ciu forms an ε-disjoint family;
(2) CiAi X Cj Aj " H, if 1 ď i ‰ j ď k;
(3) tCiAi : i " 1, . . . , ku forms a (1 ´ ε)-cover of A.
The subsets C1, . . . , Ck are called tiling centers. It is a deep result, due to Ornstein and Weiss, that
whenever G is an amenable group and tFnunPN is a Følner exhaustion, for any (small enough) ε ą 0, one
can find a nice family of subsets of G that ε-quasi-tiles Fn for all (big enough) n P N. More precisely:
[OW87] Let G be a finitely generated amenable group and let tFnunPN be a Følner
Theorem 3.3.
exhaustion of G. Then, for all ε P p0, 1{4q and ¯n P N, there exist positive integers n1, . . . , nk such that
¯n ď n1 ď ď nk and tFn1 , . . . , Fnk u ε-quasi-tiles Fm, for any big enough m.
In the rest of the subsection we recall some results and terminology about non-negative invariants
for the finite subsets of G, that is, functions f : FpGq Ñ Rě0. In particular, we say that f is
(1) monotone if f pAq ď f pA1q, for all A Ď A1 P FpGq;
(2) sub-additive if f pA Y A1q ď f pAq ` f pA1q, for all A, A1 P FpGq;
(3) (left) G-equivariant if f pgAq " f pAq, for all A P FpGq and g P G.
A consequence of (3) above is that f ptguq " f pteuq, for all g P G. Thus by (2), f pAq ď řgPA f ptguq "
Af peq, for all A P FpGq.
The following result, generally known as "Ornstein-Weiss Lemma", is proved in [OW87] for a suitable
class of locally compact amenable groups (a direct proof, along the same lines, in the discrete case can
be found in [WZ92], while a nice alternative argument, based on ideas of Gromov, is given in [Kri07]).
11
Lemma 3.4. Let G be a finitely generated amenable group and consider a monotone, sub-additive
and G-equivariant function f : FpGq Ñ Rě0. Then, for any Følner sequence tFnunPN, the sequence
pf pFnq{FnqnPN converges and the value of the limit limnPN f pFnq{Fn is the same for any choice of the
Følner sequence.
We conclude this paragraph with the following consequence of Theorem 3.3. The proof is essentially
given in [HYZ11], we give it here for completeness sake, as our statement is slightly different.
Corollary 3.5. Let G be a finitely generated amenable group and tFnunPN be a Følner exhaustion of G.
Then, for any ε P p0, 1{4q and ¯n P N there exist integers n1, . . . , nk such that ¯n ď n1 ď ď nk and, for
any sub-additive and G-equivariant f : FpGq Ñ R we have
lim sup
nÑ8
f pFnq
Fn
ď M ε `
1
1 ´ ε
max
1ďiďk
f pFni q
Fni
,
where M " f pteuq.
It is important to underline that the choice of the n1, . . . , nk does not depend on the function f , but
we can really find a family tn1, . . . , nku, which works for all f at the same time.
Proof. Let ε P p0, 1{4q and ¯n P N. By Theorem 3.3, there exist positive integers n1, . . . , nk such that
¯n ď n1 ď ď nk and tFn1 , . . . , Fnk u ε-quasi-tiles Fn, for all n ě ¯n. We let C 1
k be the tiling
centers for Fn. Thus, when n ě ¯n, we have
1 , . . . , C n
Fn Ě
k
ďi"1
C n
i Fni
and
ě max#p1 ´ εqFn , p1 ´ εq
C n
i Fni + .
k
ÿi"1
Now, let f : FpGq Ñ Rě0 be a sub-additive and G-equivariant function, we obtain that
f pFnq
Fn
ď
`
C n
k
ďi"1
i"1 C n
Fn
i Fni
i Fni¯
f´FnzŤk
i Fni
ď M
FnzŤk
i Fni¯
f´Ťk
i Fni
Ťk
řk
p1 ´ εqřk
i"1 C n
i"1 C n
i"1 C n
Fn
i"1 C n
ď M ε `
ď M ε `
f´Ťk
f´Ťk
Ťk
i"1 C n
Fn
i"1 C n
i"1 C n
i Fni¯
i Fni¯
i Fni
`
i f pFni q
i"1 C n
i Fni
ď M ε `
1
1 ´ ε
max
1ďiďk
f pFni q
Fni
.
3.3 Crossed products
Given a group G and a ring R, a crossed product RG of R with G is a ring constructed as follows: as
a set, RG is the collection of all the formal sums of the form
rgg ,
ÿgPG
with rg P R and rg " 0 for all but finite g P G, and where the g are symbols uniquely assigned to each
g P G. Sum in RG is as expected, that is, it is defined component-wise exploiting the addition in R:
ÿgPG
rgg¸ `ÿgPG
sgg¸ " ÿgPG
prg ` sgqg .
In order to define a product in RG, we need to take two maps
σ : G Ñ AutringpRq and ρ : G G Ñ U pRq ,
where AutringpRq denotes the group of automorphisms of R in the category of (unitary) rings, while
U pRq is the group of units of R. Given g P G and r P R we denote the image of r via the automorphism
σpgq by rσpgq. We suppose also that σ and ρ satisfy the following conditions for all r P R and g1, g2 and
g3 P G:
12
(Cross.1) ρpg1, g2qρpg1g2, g3q " ρpg2, g3qσpg1qρpg1, g2g3q;
(Cross.2) rσpg2qσpg1q " ρpg1, g2qrσpg1g2qρpg1, g2q´1;
(Cross.3) ρpg, eq " ρpe, gq " 1 (for all g P G) and σpeq " 1.
The product in RG is defined by the rule prgqpshq " rsσpgqρpg, hqgh, together with bilinearity, that is
ÿgPG
rgg¸ÿgPG
sgg¸ " ÿgPG ÿh1h2"g
rh1 sσph1q
h2
ρph1, h2q¸ g .
By (Cross.1) and (Cross.2) above, RG is an associative and unitary ring, while by (Cross.3) 1RG " e.
For more details on this kind of construction we refer to [Pas89].
Notice that there is a canonical injective ring homomorphism R Ñ RG such that r ÞÑ re; for this
we identify R with a subring of RG. This allows one to consider a forgetful functor from RG-Mod Ñ
R-Mod. On the other hand, in general there is no natural map G Ñ RG which is compatible with
the operations, anyway the obvious assignment g ÞÑ g respects the operations modulo some units of R.
Thus, given a left RG-module M , there is a canonical map
λ : G Ñ AutZpM q ,
g ÞÑ λg ,
λgpmq " gm ,
(3.2)
which is not in general a homomorphism of groups. Given an R-submodule RK ď M and an element
g P G, λgpKq is again an R-submodule of M but it is not in general isomorphic to RK. As described in
(2.5), there is a self-equivalence of the category R-Mod, induced by the ring automorphism σpgq
Fσpgq : R-Mod Ñ R-Mod .
It follows by the definitions that λgpKq " gK -- FσpgqK.
In particular, if L is a length function
compatible with the equivalence Fσpgq, then LpλgpKqq " LpKq. This useful fact motivates the following
Definition 3.6. Let RG be a crossed product and let L : R-Mod Ñ Rě0 Y t8u be a length function.
Then, L is said to be compatible with RG provided L is compatible with Fσpgq, for all g P G.
4 The algebraic L-entropy
We fix all along this section a ring R, an infinite finitely generated amenable group G, a crossed product
RG and a length function L : R-Mod Ñ Rě0 Y t8u compatible with RG.
Let us remark that, if R is a (skew) field, L " dimR is compatible with any crossed product RG;
more generally, this happens for all the functions ℓα described in Subsection 2.3. On the other hand, if
RG " RrGs, then any length function is trivially compatible with RG.
4.1 Definition and basic properties
In this subsection we define the algebraic entropy as an invariant for left RG-modules. It turns out
that this notion is not well-behaved on all the RG-modules but just on a subclass of RG-Mod of all
the RG-modules M for which the family of submodules FinLpM q :" tRK ď M : LpKq ă 8u is big
enough. More precisely:
Definition 4.1. A left R-module M is said to be locally L-finite if FinLpM q contains all the finitely
generated submodules of M . We denote by lFinpLq the class of all the locally L-finite left R-modules
while we let lFinLpRGq be the class of all the left RG-modules RGM such that RM P lFinpLq, that is
lFinLpRGq :" tM P RG-Mod : LpKq ă 8 for any f.g. RK ď M u .
Notice that lFinpLq is closed under taking direct limits, quotients and submodules but not in general
under taking extensions (see [SVV13]).
Let M P lFinLpRGq. Then, given K P FinLpM q and F P FpGq we let
TF pKq :" ÿgPF
gK .
By the additivity of L and the compatibility of L with RG, LpTF pKqq ďřgPF LpgKq " F LpKq ă 8.
In particular, for any L-finite submodule K of M we obtain a function
fK : FpGq Ñ Rě0
fK pF q :" LpTF pKqq .
We now verify that the above function satisfies the hypotheses of the Ornstein-Weiss Lemma:
13
Lemma 4.2. In the above notation, fK is monotone, sub-additive and G-equivariant.
Proof. Let F, F 1 P FpGq. The proof follows by the properties of L, in fact, TF pKq` TF 1pKq " TF YF 1pKq
and so fK pF q ` fK pF 1q ě fK pF Y F 1q, proving sub-additivity. Furthermore, if F Ď F 1 then TF pKq ď
TF 1 pKq and so fK pF q ď fK pF 1q, proving monotonicity. Finally, for any g P G,
TgF pKq " ÿf PF
gf K " ÿf PF
g f pρpg, f qσpghqq´1K " g ÿf PF
f K " gTF pKq ,
since pρpg, f qσpghqq´1 is a unit of R and so pρpg, f qσpghqq´1K " K. Thus, by the compatibility of L with
RG, LpTgF pKqq " LpgTF pKqq " LpTF pKqq, proving that fK is G-equivariant.
Thus, by the Ornstein-Weiss Lemma, the limit in the following definition exists and it does not
depend on the choice of the Følner sequence.
Definition 4.3. Let M P lFinLpRGq, let tFnunPN be a Følner sequence for G and let RK P FinLpM q.
The L-entropy of RGM with respect to K is
entLpRGM, Kq :" lim
nÑ8
LpTFnpKqq
Fn
.
The L-entropy of the RG-module RGM is entLpRGM q :" suptentLpM, Kq : K P FinLpM qu.
Remark 4.4. We defined the L-entropy for left RG-modules in case G is finitely generated. Anyway,
the exact same procedure allows one to define this invariant when G is just countable (but not necessarily
finitely generated). Furthermore, standard variations of the above arguments using Følner nets allow
one to define a similar invariant in case G is not countable.
Example 4.5. Given RGM P lFinLpRGq such that LpRM q ă 8, entLpRGM q " 0. Indeed, given
K P FinLpM q, entLpM, Kq ď limnÑ8 LpM q{Fn ď limnÑ8 LpM q{n " 0 (use the fact that, as G is
infinite, we can take a Følner sequence such that Fn ň Fn`1 for all n P N, thus Fn ě n).
Given a locally L-finite RG-module RGM and an RG-submodule N ď M , there is an inclusion
FinLpN q Ď FinLpM q, this easily implies the following lemma:
Lemma 4.6. Let RGM P lFinLpRGq and RGN ď M . Then, entLpRGM q ě entLpRGN q.
In fact, entropy is also monotone under taking quotients, but we need some more work before showing
that (see Corollary 4.11). Let us conclude this subsection with the following consequence of Corollary
3.5:
Corollary 4.7. Let tFnunPN be a Følner exhaustion of G. Then, for any ε P p0, 1{4q and n P N there
exist n1, . . . , nk P N with n ď n1 ď ď nk such that, given an L-finite submodule K ď M ,
entLpM, Kq ď ε LpKq `
1
1 ´ ε
max
1ďiďk
LpTFni pKqq
Fni
.
Proof. This is a straightforward application of Corollary 3.5. In fact, the function fK : FpGq Ñ Rě0
such that fK pF q " LpTF pKqq satisfies the hypotheses of such corollary for any L-finite R-submodule K
of M , by Lemma 4.2. Furthermore, limnÑ8 fK pFnq{Fn " entLpM, Kq by the definition of entropy.
4.2 The algebraic entropy is upper continuous
The following result allows us to redefine the algebraic entropy in terms of finitely generated submodules.
Proposition 4.8. Let RGM P lFinLpRGq and let H ď K P FinLpM q.
(1) if LpK{Hq ă ε, then entLpM, Kq ´ entLpM, Hq ă ε;
(2) entLpRGM q " suptentLpM, Kq : RK finitely generatedu.
Proof. For any g P G, gK{gH -- FσpgqpK{Hq so, since L is compatible with Fσpgq, LpgK{gHq ă ε.
Thus, by the additivity of L,
LpTFn pKq{TFnpHqq ď ÿgPFn
LppgK ` TFn pHqq{TFnpHqq ă Fnε ,
for all n P N, where tFnunPN is a Følner sequence. Therefore, entLpM, Kq ´ entLpM, Hq ă ε. We can
now verify part (2). Indeed, the inequality "ď" comes directly from the definition of entropy. On the
other hand, given K P FinLpM q and ε ą 0, by the upper continuity of L there exists H ď K finitely
generated such that LpKq ´ LpHq ă ε. By part (1), entLpM, Kq ă entLpM, Hq ` ε, which easily yields
the claim.
14
The following corollary deals with the case when M is generated (as RG-module) by an L-finite
In such situation one does not need to take a supremum to
R-submodule K, that is, M " TGpKq.
compute entropy.
Corollary 4.9. Let M be a left RG-module such that M " TGpKq for some K P FinLpM q, then
Proof. Given a finitely generated R-submodule H of M , we can find a finite subset e P F Ď G such that
H Ď TF pKq. This shows that entLpM, Hq ď entLpM, TF pKqq. By the Følner condition,
entLpM q " entLpM, Kq .
lim
nÑ8
FnF
Fn
ď lim
nÑ8
Fn YŤf PF BF pFnqf
Fn
ď 1 ` lim
nÑ8 ÿf PF
BF pFnqf
Fn
" 1 .
On the other hand, FnF {Fn ě 1 so limnÑ8 FnF {Fn " 1. We obtain that
entLpM, TF pKqq " lim
nÑ8
TFn pTF pKqq
Fn
" lim
nÑ8
TFnF pKq
Fn
Fn
FnF
" entLpM, Kq ,
where the last equality comes from the fact that tFnF unPN is a Følner sequence (use the fact that, for any
C Ď FpGq and n P N, one has the inclusion BCpFnF q Ď BCF ´1 pFnq and apply the Følner condition for
tFnunPN) and the definition of entL does not depend on the choice of a particular Følner sequence. Thus,
entLpM, Hq ď entLpM, Kq for any finitely generated H ď M ; one concludes by Proposition 4.8.
The upper continuity of entL can now be verified easily using the above lemma and Proposition 4.8:
Corollary 4.10. The invariant entL : lFinLpRGq Ñ Rě0 Y t8u is upper continuous.
Proof. The fact that entL is an invariant can be derived by the definition and the fact that L is an
invariant. Now, let M P lFinLpRGq, then by Proposition 4.8 and Corollary 4.9 we get
entLpRGM q " suptentLpM, Kq : K finitely generated R-submodule of M u
" suptentLpRGpTGpKqq : K finitely generated R-submodule of M u
" suptentLpRGN q : N finitely generated RG-submodule of M u .
Another consequence of Proposition 4.8 is the monotonicity of entropy under taking quotients:
Corollary 4.11. Let RGM P lFinLpRGq and RGN ď M . Then, entLpRGM q ě entLpRGpM {N qq.
Proof. Given a finitely generated submodule ¯K ď M {N , there exists a finitely generated (thus L-finite)
submodule K ď M such that pK ` N q{N -- ¯K. Given a Følner sequence tFnunPN,
TFnp ¯Kq " pTFn pKq ` N q{N and so LpTFn p ¯Kqq ď LpTFnpKqq for all n P N .
Dividing by Fn and passing to the limit we get entLpM {N, ¯Kq ď entLpM, Kq ď entLpRGM q.
We conclude this subsection with the following property that will be extremely useful in proving the
additivity of entropy.
Proposition 4.12. Let M P lFinLpRGq be finitely generated and let tNi : i P Iu be a directed system
of RG-submodules. Letting N :"Ťi Ni, entLpM {N q " inf i entLpM {Niq.
Proof. The inequality "ď" follows by Corollary 4.11. On the other hand, let K P FinLpM q be a finitely
generated R-submodule such that TGpKq " M ; let also ¯K :" pK ` N q{N and ¯Ki :" pK ` Niq{Ni for
all i P I. By Lemma 4.9, entLpM {N q " entLpM {N, ¯Kq and entLpM {Niq " entLpM {Ni, ¯Kiq, for all i.
Now fix (arbitrarily) a constant ε P p0, 1{4q and notice that:
(a) there exists m P N such that
LpTFnp ¯Kqq
Fn
ď entLpM {N q ` ε for all n ě m;
(b) there exist m ď m1 ď ď mk P N such that entLpM {Niq ď εLp ¯Kiq`
for all i P I, by Corollary 4.7;
1
1 ´ ε
max
1ďtďk
LpTFmt p ¯Kiqq
Fmt
,
(c) for any t P t1, . . . , ku there exists jt P I such that LpTFmt p ¯Kjqq ď inf
LpTFmt p ¯Kiqq ` ε "
LpTFmt p ¯Kqq ` ε, whenever Nj ě Njt , where for the equality we use Proposition 2.7.
i
15
Since tNi : i P Iu is directed, there exists ¯j P I such that řk
inf
i
entLpM {Niq ď entLpM {N¯jq
t"1 Njt ď N¯j . Thus,
pbq
ď ε Lp ¯K¯jq `
1
1 ´ ε
pcq
ď ε Lp ¯K¯jq `
1
1 ´ ε
LpTFmt p ¯K¯jqq
max
1ďtďk
Fmt
LpTFmt p ¯Kqq ` ε
Fmt
paq
ď ε Lp ¯K¯jq `
1
1 ´ ε
pentLpM {N q ` 2εq .
As this holds for any small enough ε ą 0, the conclusion follows.
4.3 The algebraic entropy is additive
In this subsection we complete the proof of the fact that
entL : lFinLpRGq Ñ Rě0 Y t8u
is a length function. In fact we have already seen that entL is an upper continuous invariant. To verify
the additivity of entL, by Propositions 2.7 and 4.12, it is enough to check that entL is additive on short
exact sequences of finitely generated modules.
The computations in the following proposition are freely inspired to the proof of the Abramov-Rokhlin
Formula given in [WZ92]. The context (and even the statements) in that paper is quite different but
the ideas contained there can be perfectly adapted to our needs.
Proposition 4.13. Let 0 Ñ N Ñ M Ñ M {N Ñ 0 be a short exact sequence of finitely generated left
RG-modules, then entL pRGM q " entL pRGN q ` entL pRGpM {N qq.
Proof. Fix a Følner exhaustion tFnunPN of G and finitely generated R-submodules K ď M and K1 ď
K XN such that TGpK1q " N and TGpKq " M . If we let ¯K :" pK `N q{N ď M {N , then TGp ¯Kq " M {N .
By Lemma 4.9, entLpM q " entLpM, Kq, entLpN q " entLpN, K1q and entLpM {N q " entLpM {N, ¯Kq.
Let ε P p0, 1{4q, by the existence of the limits defining L-entropy, we can find ¯n P N such that
LpTFn pKqq
Fn
´ entLpM q
ă ε ,
LpTFn pK1qq
Fn
ă ε ,
LpTFnp ¯Kqq
Fn
´ entLpN q
for all n ě ¯n. Moreover, LpTFm pKqq " LpTFm pK1qq`LpTFmpKq{TFm pK1qq ě LpTFm pK1qq`LpTFmp ¯Kqq,
for all m P N, and so, for all m ě ¯n,
ă ε ,
´ entLpM {N q
entLpM q ě
LpTFm pKqq
Fm
´ ε ě
LpTFmpK1qq
Fm
`
LpTFm p ¯Kqq
Fm
´ ε ě entLpN q ` entLpM {N q ´ 3ε ,
yielding the inequality entLpM q ě entLpN q ` entLpM {N q. For the converse inequality, notice that
entLpM q ď
LpTFm pKqq
Fm
` ε "
LpTFmpK1qq
Fm
`
LpTFm pKq{TmpK1qq
Fm
` ε
ď entLpN q `
LpTFm pKq{TmpK1qq
Fm
` 2ε .
To conclude we should verify that pLpTFm pKq{TmpK1qqq{Fm is close enough to entLpM {N q.
Since tFnu is a Følner exhaustion, N "ŤnPN TFnpK1q and so, for any L-finite submodule H ď M , LpH X
N q " limnÑ8 LpH X TFnpK1qq, by upper continuity. Using additivity, LppH ` N q{N q " limnÑ8 LppH `
TFnpK1qq{TFn pK1qq, so that LppH ` N q{N q ´ LppH ` TFnpK1qq{TFnpK1qq ă ε, for any big enough
n P N. By Theorem 3.3, there exist ¯n ă n1 ă ă nk P N and ¯n1 such that tFn1 , . . . , Fnk u ε-quasi-tiles
Fm for all m ě ¯n1. Applying the above argument with H " TFni pKq (for all i " 1, . . . , k), we can find
n ě maxt¯n1, nku such that
for all n ě n and all i " 1, . . . , k. From now on we fix m ě ¯¯n such that BF ´1
pFmq. Thus,
that, given i P t1, . . . , ku, Fni Ď F¯¯n, and so BF ¯¯npFmqFni Ď BF ´1
¯¯n F ¯¯n
¯¯n F ¯¯n
pFmq{Fm ď ε. Notice
¸ ´ LpTFni p ¯Kqq
ă ε
(4.1)
L TFni pKq ` TFnpK1q
TFnpK1q
BF ¯¯npFmqFni {Fm ă ε ,
for all i " 1, . . . , k.
16
We choose tiling centers C1, . . . , Ck for Fm, so that
Consider the following estimate:
k
ďi"1
CiFni
Fm ě
L TFmzŤi CiFni pKq ` TFm pK1q
TFm pK1q
1
Fm
ě max#p1 ´ εqFm , p1 ´ εq
CiFni + ,
k
ÿi"1
¸ ď
ď
Fm
LpTFmzŤi CiFni pKqq
FmzŤi CiFni
Fm
LpKq ď εLpKq ,
Given i P t1, . . . , ku, using that CiFni Ď pCizBFnpFmqqFni Y BFnpFmqFni , we get:
1
Fm
L TCiFni
pKq ` TFm pK 1q
TFm pK 1q
¸ ď
L TcFni
L TFni
pFmq
pFmq
pKq ` TFn
pK 1q
TFn
p ¯Kqq ` Ciε
n
ÿcPCizBF
ÿcPCizBF
L TFni
n
ď
1
Fm
ď
1
Fm
Ci
Fm
ď
ď
CiLpTFni
Fm
pKq ` TFm pK 1q
TFm pK 1q
TBF
n
pFmqFni
pKq ` TFm pK 1q
TFm pK 1q
1
Fm
L
¸ `
¸ `
pKq ` T
c´1Fm pK 1q
BFn
pFmqFni LpKq
c´1Fm pK 1q
T
Fm
pK 1q
¸ ` εLpKq
` εLpKq ď
CiFni
Fm
entLpM {N q ` ε CiFni
Fm
`
Ci
Fm
` LpKq
(4.4)
where the second inequality follows by the compatibility of L with RG, the third one is true since
Fn Ď c´1Fm for all c P CizBFnpFmq, and the fourth one follows by (4.1).
Let us assemble together the above computations:
LpTFm pKq{TFm pK 1qq
Fm
ď
1
Fm
pKq ` TFm pK 1q
¸ `
1
Fm
L TFmzŤi Ci Fni
TFm pK 1q
pKq ` TFm pK 1q
¸
(4.2)
(4.3)
‚
TFm pK 1q
L TŤi Ci Fni
ÿi"1
L TCi Fni
k
1
Fm
pKq ` TFm pK 1q
TFm pK 1q
¸ ` εLpKq
k
ÿi"1 CiFni
Fm
entLpM {N q
entLpM {N q ` ε CiFni
` pk ` 1qLpKq .
1 ´ ε
Fm
` ε 2
1 ´ ε
(4.3)
ď
(4.4)
ď
ď
`
Ci
Fm
` LpKq ` εLpKq
Hence, we have obtained that
entLpM q ď entLpN q `
entLpM {N q
1 ´ ε
` ε 2
1 ´ ε
` pk ` 1qLpKq ,
holds for any ε P p0, 1{4q, and so entLpM q ď entLpN q ` entLpM {N q, concluding the proof.
4.4 Values on (sub)shifts
This subsection is devoted to compute the values of the entropy on the left RG-modules of the form
M " RG bR K, for some left R-module K, and their RG-submodules. This will conclude the proof
of Theorem B.
Definition 4.14. A left RG-module of the form M " RG bR K is said to be a Bernoulli shift while
any of its RG-submodules is a subshift.
Notice that, given a Bernoulli shift M " RG bR K, there is a direct sum decomposition, as a left
R-module, RM -- ÀgPG gK. Thus, for any F P FpGq,
TF pgKq " àhPF
In the following example we compute the algebraic entropy of Bernoulli shifts.
hgK and
TGpgKq " M .
(4.5)
17
Example 4.15. In the above notation, suppose LpKq ă 8. By Lemma 4.9 and (4.5), we obtain that
entLpRGM q " entLpM, Kq. Furthermore, again by (4.5), LpTF pKqq{F " LpKq, for all F P FpGq.
Therefore, entLpM q " LpKq.
The computation in the above example shows that the entropy of M " RG bR K is 0 if and only
if LpKq " 0, if and only if LpM q " 0. Our next goal is to show that, if RGN is a subshift of M , then
entLpRGN q " 0 if and only if LpRN q " 0. This will be proved in Proposition 4.18 but first we need to
recall some useful terminology and results from [CSC06].
Definition 4.16. Let E and F be subsets of G. A subset N Ď G is an pE, F q-net if it satisfies the
following conditions:
(1) the subsets pgEqgPN are pairwise disjoint, that is, gE X g1E " H for all g ‰ g1 P N ;
(2) G "ŤgPN gF .
The following lemma is a variation of [CSC06, Lemmas 2.2 and 4.3].
Lemma 4.17. Let tFnunPN be a Følner sequence, E Ď F Ď G be finite subsets with e P F and N an
pE, F q-net. Then,
(1) there exists an pE, EE´1q-net;
(2) there exist α P p0, 1s and n0 P N such that Fn X N ě α Fn, for all n ą n0.
Proof. Part (1) is proved in [CSC06, Lemma 2.2], so let us concentrate on part (2). For each n P N, let
F `F
n zpFn X N q Ď BF pFnq. Furthermore, since Fn is covered by
the sets gF , g P F `F
n " OutF pFnq X N and notice that F `F
n , we have Fn ď F F `F
n . Let now α1 " 1{F , thus
α1Fn ´ Fn X N ď F `F
n ´ Fn X N ď F `F
n zpFn X N q ď BF pFnq .
Let α2 P p0, α1q. By the Følner condition, there exists n0 P N such that BF pFnq{Fn ď α2 for all
n ą n0. Thus, letting α " α1 ´ α2 P p0, 1s, we get Fn X N ě α1Fn ´ BF pFnq ě αFn, for all
n ą n0.
Proposition 4.18. Let K be an L-finite left R-module and RGN a subshift of M " RG bR K. Then,
entLpRGN q " 0
if and only if LpRN q " 0 .
Proof. Suppose LpRN q ‰ 0, then there exists x P N such that LpRxq ‰ 0. Let E be the set of all
elements h P G such that, writing x " řgPG gxg, the component xh is not 0. We fix an pE, EE´1q-net
N . Notice that, given f1 ‰ f2 P N , then βf1 pRxq X βf2 pRxq " 0. Thus, by Lemma 4.17, we can find
n0 P N and α P p0, 1q such that
LpTFn pRxqq ě LpTFnXN pRxqq " Fn X N LpRxq ě αFnLpRxq
for all n ą n0. In particular, entLpRGN q ě entLpN, Rxq ě αLpRxq ‰ 0.
5 Applications
5.1 Stable finiteness
Let R be a ring. Recall from the introduction that a left R-module M is said to be hopfian if any of
its surjective endomorphisms is bijective. Recall also that a ring R is directly finite if xy " 1 implies
yx " 1 for all x, y P R. Furthermore, R is stably finite if the ring MatkpRq of k k square matrices with
coefficients in R, is directly finite for all k P N`.
The following lemma gives a natural connection between stable finiteness and Hopficity:
Lemma 5.1. Given a ring R and a positive integer k, the following are equivalent:
(1) Rk
R is hopfian (as a right R-module);
(2) RRk is hopfian (as a left R-module);
(3) MatkpRq is directly finite.
18
As we said, our interest in Hopficity is motivated by the Stable Finiteness Conjecture, stating that
for any field K and any group G, the group ring KrGs is stably finite. In fact, a fairly general case of
this conjecture was recently verified by Elek and Szab´o [ES04] that proved that KrGs is stably finite
for any division ring K and any sofic group G. A straightforward consequence is that, under these
hypotheses, MatnpKrGsq is stably finite. Now, by the Artin-Wedderburn Theorem, given a semisimple
Artinian ring R, there exist positive integers k, n1, . . . , nk P N` and division rings K1, . . . , Kk such that
R -- Matn1 pK1q Matnk pKkq. This implies that, RrGs -- Matn1 pK1rGsq Matnk pKkrGsq,
thus a consequence of the above theorem is that RrGs is stably finite whenever R is semisimple Artinian
and G sofic. This result can be further generalized as follows:
Remark 5.2. [Ferran Ced´o, private communication (2012)] If R is a ring with left Krull dimension
(for example see [MR01]) and G is sofic, then RrGs is stably finite. First of all, notice that, if I is a
nilpotent ideal of R, then IrGs " RrGsI is a nilpotent ideal of RrGs and so one can reduce the problem
modulo nilpotent ideals. Now, by [MR01, Corollary 6.3.8], the prime radical N of R is nilpotent and
N " P1 X XPm, where P1, . . . , Pm are minimal prime ideals. Thus, by [MR01, Proposition 6.3.5], R{N
is a semiprime Goldie ring and so, by [MR01, Theorem 2.3.6] R{N has a classical semisimple Artinian
ring of quotients S. In particular, pR{N qrGs embeds in SrGs and it is therefore stably finite.
Both the proof of the residually amenable case due to Ara, O'Meara and Perera, and the proof of
the sofic case due to Elek and Szab´o, consist in finding a suitable embedding of KrGs in a ring which is
known to be stably finite. Such methods are really effective but, as far as we know, cannot be used to
obtain information on the modules over KrGs. It seems natural to ask the following
Question 5.3. Let G be a group, R a ring and let RG be a fixed crossed product. Given a finitely
generated left RG-module RGM , when is RGM an hopfian module?
Using the theory of algebraic entropy we can now prove that a large class of left RG-modules is
hereditarily Hopfian (i.e., any submodule is Hopfian), in case R is left Noetherian and G amenable
(see the statement of Theorem A). We remark that this is a very strong version of Kaplasky's Stable
Finiteness Conjecture in the amenable case, which can be re-obtained as a corollary. The proof of
Theorem A makes use of the full force of the localization techniques introduced in Section 2. Such heavy
machinery hides in some sense the idea behind the proof; this is the reason for which we prefer to give
first the proof of the following more elementary statement, whose proof is far more transparent:
Lemma 5.4. Let K be a division ring, let G be a finitely generated amenable group and fix a crossed
product KG. For all n P N`, pKGqn " KG b Kn is a hereditarily hopfian left KG-module.
Proof. Let n P N` and choose KG-submodules N ď M ď pKGqn such that there exists a short exact
sequence
0 Ñ N Ñ M Ñ M Ñ 0 ,
we have to show that N " 0. The length function dim : K-Mod Ñ Rě0 Y t8u is compatible with any
crossed product, so we can consider the dim-entropy of left KG-modules. In particular,
entdimpM q " entdimpM q ` entdimpN q
and
0 ď entdimpN q ď entdimpM q ď entdimpKG b Knq " n .
Thus, entdimpN q " 0. By Proposition 4.18, this implies that dimpN q " 0, that is, N " 0.
The same argument of the above proof can be used to prove Theorem A, modulo the fundamental
tool of Gabriel dimension:
Proof of Theorem A. Consider a left RG-submodule M ď RG bR K and a short exact sequence of
left RG-modules
φ
0 Ñ Kerpφq Ñ M
ÝÑ M Ñ 0 .
In order to go further with the proof we need to show that, as a left R-module, the Gabriel dimension
of Kerpφq is a successor ordinal whenever it is not ´1 (i.e., whenever Kerpφq ‰ 0). This follows by the
following
Lemma 5.5. In the hypotheses of Theorem A, G.dimpRN q is a successor ordinal for any non-trivial
R-submodule N ď RG bR K.
19
Proof. A consequence of Lemma 2.15 (6) is that Tα`1pKq{TαpKq ‰ 0 for just finitely many
ordinals α. Notice that TαpRG bR Kq -- RG bR TαpKq, as left R-modules, for any ordinal
α. Thus, Tα`1pRG bR Kq{TαpRG bR Kq ‰ 0 for finitely many ordinals. Notice also that
TαpN q " TαpRG bR Kq X N for all α, thus,
Tα`1pN q
TαpN q
"
Tα`1pRG bR Kq X N
TαpRG bR Kq X N
--
--
pTα`1pRG bR Kq X N q ` TαpRG bR Kq
TαpRG bR Kq
ď
Tα`1pRG bR Kq
TαpRG bR Kq
is different from zero for finitely many ordinals α. Thus,
G.dimpN q " suptα ` 1 : Tα`1pN q{TαpN q ‰ 0u " maxtα ` 1 : Tα`1pN q{TαpN q ‰ 0u
is clearly a successor ordinal.
Now, suppose that Kerpφq ‰ 0 and let G.dimpKerpφqq " α ` 1. We want to show that
φaeTα`1pM q : Tα`1pM q Ñ Tα`1pM q
is surjective. Indeed, if there is x P Tα`1pM qzφpTα`1pM qq, it means that there exists y P M zTα`1pM q
such that φpyq " x (by the surjectivity of φ). This is to say that there is a short exact sequence
0 Ñ Kerpφq X RGy Ñ RGy Ñ RGx Ñ 0 ,
with G.dimpRpRGyqq ŋ α ` 1 ě maxtG.dimpRpKerpφq X RGyqq, G.dimpRpRGxqqu, which contradicts
Lemma 2.15(4). Thus, we have a short exact sequence of left RG-modules
0 Ñ Kerpφq Ñ Tα`1pM q Ñ Tα`1pM q Ñ 0 .
Consider the length function ℓα : R-Mod Ñ Rě0 Y t8u described in Subsection 2.3 and recall that
Kerpℓαq is exactly the class of all left R-modules with Gabriel dimension ď α. Furthermore, Tα`1pKq
is a Noetherian module, thus, QαpTα`1pKqq is a Noetherian object in a semi-Artinian category, that is,
an object with finite composition length, for this reason ℓαpTα`1pKqq " ℓpQαpTα`1pKqqq ă 8. Using
the computations of Example 4.15 and the Addition Theorem, we get
entℓα pTα`1pRGbKqqq " ℓαpTα`1pKqq ă 8 and entℓα pTα`1pM qq " entℓα pTα`1pM qq`entℓα pKerpφqq .
Hence, entℓα pKerpφqq " 0 which, by Proposition 4.18, is equivalent to say that ℓαpKerpφqq " 0, contra-
dicting the fact that G.dimpKerpφqq " α ` 1.
In the above proof we made use of the Addition Theorem for the algebraic entropy, which is quite
a deep result. We want to underline that if one is only interested in the second part of the statement,
that is, stable finiteness of endomorphism rings, then it is sufficient to use the weaker additivity of the
algebraic entropy on direct sums, which can be independently verified as an exercise.
Example 5.6. Let G be a free group of rank ě 2 and let K be a field. It is well-known that KrGs is
not left (nor right) Noetherian so we can find a left ideal KrGsI ď KrGs which is not finitely generated.
Furthermore, by [Coh06, Corollary 7.11.8], KrGs is a free ideal ring, so I is free. This means that I is
isomorphic to a coproduct of the form KrGspNq which is obviously not hopfian.
Let us conclude this subsection with the following problem:
Problem 5.7. Study the class of finitely generated groups G such that the group algebra KrGs is heredi-
tarily Hopfian for any skew field K. Is it true that this property characterizes the class of finitely generated
amenable groups?
One could also state an analogous problem including all the possible crossed products KG, instead
of just the group algebras KrGs.
20
5.2 Zero-Divisors
In this last section of the paper we discuss another classical conjecture due to Kaplansky about group
rings connecting it to the theory of algebraic entropy:
Conjecture 5.8 (Kaplansky). Let K be a field and G be a torsion-free group. Then KrGs is a domain.
Some cases of the above conjecture are known to be true but the conjecture is fairly open in general
(for a classical reference on this conjecture see for example [Pas85]). In most of the known cases, the
strategy for the proof is to find an immersion of KrGs in some division ring. This is clearly sufficient
but, in principle, it is a stronger property. To the best of the author's knowledge, the following question
remains open: Is it true that KrGs is a domain if and only if KrGs is a subring of a division ring?
The above question is known to have positive answer if G is amenable (see [Luc02, Example 8.16]). In
this section we provide an alternative argument to answer the above question for amenable groups (in
the more general setting of crossed group rings) and we translate the amenable case of Conjecture 5.8
into an equivalent statement about algebraic entropy. This approach is inspired to the work of Nhan-Phu
Chung and Andreas Thom [CT13]. Indeed, we can prove the following
Theorem 5.9. Let K be a division ring and let G be a finitely generated amenable group. For any fixed
crossed product KG, the following are equivalent:
(1) KG is a left (and right) Ore domain;
(2) KG is a domain;
(3) entdimpKGM q " 0, for every proper quotient M of KG;
(4) Impentdimq " N Y t8u.
Before proving the above theorem we recall some useful properties about Ore domains. We start
recalling that a domain D is left Ore if Dx X Dy ‰ t0u for all x, y P Dzt0u. It can be shown that this is
equivalent to say that D is a left flat subring of a division ring.
Proposition 5.10. A domain D is left Ore if and only if there is a length function L : D-Mod Ñ
Rě0 Y t8u such that LpDq " 1.
Proof. If D is left Ore, then D is a flat subring of a division ring K. Then there is an exact functor
K bD ´ : D-Mod Ñ K-Mod which commutes with direct limits. Thus, we can define the desired length
function L simply letting LpDM q :" dimKpK bD M q.
On the other hand, suppose that there is a length function L : D-Mod Ñ Rě0 Y t8u such that LpDq " 1
and choose x, y P Dzt0u. Since D is a domain, both Dx and Dy contain (and are contained in) a copy
of D, thus LpDxq " LpDyq " 1. If, looking for a contradiction Dx X Dy " t0u, then
1 " LpDq ě LpDx ` Dyq " LpDx ' Dyq " LpDxq ` LpDyq " 2,
which is a contradiction.
It is a classical result that any left Noetherian domain is left Ore (see for example [MR01, Theorem
1.15 in Chapter 2.1]). By the above proposition we can generalize this result as follows:
Corollary 5.11. A domain with left Gabriel dimension is necessarily left Ore.
Proof. Let D be a domain with left Gabriel dimension. First of all we verify that G.dimpDDq is not a
limit ordinal. Indeed, if G.dimpDDq " λ is a limit ordinal, then D " Ťαăλ TαpDq. This means that,
for any non-zero x P D, there exists α ă λ such that Dx P TαpDq. Choose a non-zero x P D, as D
is a domain, there is a copy of D inside Dx. Thus, G.dimpDq ď G.dimpDxq ď α for some α ă λ, a
contradiction.
If G.dimpDDq " α ` 1 for some ordinal α, then we can consider the length function
ℓα : D-Mod Ñ Rě0 Y t8u ,
ℓαpM q " ℓpQαpM qq .
To conclude one has to show that ℓαpDq " 1, that is, QαpDq is a simple object. Since Cα`1{Cα is semi-
Artinian, there is a simple subobject S of QαpDq. Then SαpSq is a sub-module of SαQαpDq. Identify
SαpSq, SαQαpDq and D with submodules of EpDq, since D is essential in EpDq, there is 0 ‰ x such
that x P SαpSq X D, but then SαpSq contains an isomorphic copy of D. Thus QαSαpSq " S contains
an isomorphic copy of QαpDq, which is therefore simple.
We can finally prove our result:
21
Proof of Theorem 5.9. (1)ñ(2) is trivial while (2)ñ(1) follows by Proposition 5.10 and the fact that
the algebraic dim-entropy is a length function on KG-Mod such that entdimpKGKGq " 1.
(2)ñ(3). Consider a short exact sequence 0 Ñ KGI Ñ KGKG Ñ KGM Ñ 0, with I ‰ 0. Choose
0 ‰ x P I, then KGx -- KG, and so entdimpKGM q " entdimpKGKGq ´ entdimpKGIq ď 1 ´ 1 " 0.
(3)ñ(4). Let us show first that for any finitely generate left KG-module KGF , entdimpKGF q P N. In
fact, choose a finite set of generators x1, . . . , xn for F and, letting F0 " 0 and Fi " KGx1 ` ` KGxi
for all i " 1, . . . , n, consider the filtration 0 Ď F1 Ď F2 Ď Ď Fn " F . By additivity,
entdimpF q "
n
ÿi"1
entdimpFi{Fi´1q .
All the modules F1{F0, . . . , Fn{Fn´1 are cyclics (i.e. quotients of KG), thus entdimpFi{Fi´1q P t0, 1u
by hypothesis. Hence, entdimpF q P N. To conclude one argues by upper continuity that the algebraic
dim-entropy of an arbitrary left KG-module is the supremum of a subset of N, thus it belongs to
N Y t8u.
(4)ñ(2). Let x P KG and consider the short exact sequence
0 Ñ I Ñ KG Ñ KGx Ñ 0
where I " ty P KG : yx " 0u. Suppose that x is a zero-divisor, that is, I ‰ 0 or, equivalently,
dimpKIq ‰ 0. By Proposition 4.18, entdimpIq ą 0 and, by our assumption, entLpIq ě 1. Hence, using
additivity, entdimpKGxq " 0. Again by Proposition 4.18, this implies dimpKGxq " 0 and consequently
KGx " 0, that is, x " 0. Thus, the unique zero-divisor in KG is 0.
References
[AOP02] Pere Ara, Kevin C. O'Meara, and Francesc Perera. Stable finiteness of group rings in arbitrary
characteristic. Adv. Math., 170(2):224 -- 238, 2002.
[Coh06] P. M. Cohn. Free ideal rings and localization in general rings, volume 3 of New Mathematical
Monographs. Cambridge University Press, Cambridge, 2006.
[CSC06] Tullio Ceccherini-Silberstein and Michel Coornaert. The Garden of Eden theorem for linear
cellular automata. Ergodic Theory Dynam. Systems, 26(1):53 -- 68, 2006.
[CSC10] Tullio Ceccherini-Silberstein and Michel Coornaert. Cellular automata and groups. Springer
Monographs in Mathematics. Springer-Verlag, Berlin, 2010.
[CT13] Nhan-Phu Chung and Andreas Thom. Some remarks on the entropy for algebraic actions of
amenable groups. http://arxiv.org/abs/1302.5813, 2013.
[Ele99] G´abor Elek. The Euler characteristic of discrete groups and Yuzvinskii's entropy addition
formula. Bull. London Math. Soc., 31(6):661 -- 664, 1999.
[Ele03] G´abor Elek. The rank of finitely generated modules over group algebras. Proc. Amer. Math.
Soc., 131(11):3477 -- 3485 (electronic), 2003.
[ES04] G´abor Elek and Endre Szab´o. Sofic groups and direct finiteness. J. Algebra, 280(2):426 -- 434,
2004.
[Fac98] Alberto Facchini. Module theory. Modern Birkhauser Classics. Birkhauser/Springer Basel AG,
Basel, 1998. Endomorphism rings and direct sum decompositions in some classes of modules,
[2012 reprint of the 1998 original] [MR1634015].
[Fø55] Erling Følner. On groups with full Banach mean value. Math. Scand., 3:243 -- 254, 1955.
[Gab62] Pierre Gabriel. Des cat´egories ab´eliennes. Bull. Soc. Math. France, 90:323 -- 448, 1962.
[GR74] Robert Gordon and J. Chris Robson. The Gabriel dimension of a module. J. Algebra, 29:459 --
473, 1974.
[HYZ11] Wen Huang, Xiangdong Ye, and Guohua Zhang. Local entropy theory for a countable discrete
amenable group action. J. Funct. Anal., 261(4):1028 -- 1082, 2011.
[Kap95] Irving Kaplansky. Fields and rings. Chicago Lectures in Mathematics. University of Chicago
Press, Chicago, IL, 1995. Reprint of the second (1972) edition.
22
[Kri07] Fabrice Krieger. Le lemme d'Ornstein-Weiss d'apr`es Gromov.
In Dynamics, ergodic theory,
and geometry, volume 54 of Math. Sci. Res. Inst. Publ., pages 99 -- 111. Cambridge Univ. Press,
Cambridge, 2007.
[LL15] Hanfeng
Li
and
Bingbing
Liang.
Sofic
mean
length.
arXiv:
https: // arxiv. org/ abs/ 1510. 07655 , 2015.
[Luc02] Wolfgang Luck. L2-invariants: theory and applications to geometry and K-theory, volume 44
of Ergebnisse der Mathematik und ihrer Grenzgebiete. 3. Folge. A Series of Modern Surveys in
Mathematics [Results in Mathematics and Related Areas. 3rd Series. A Series of Modern Surveys
in Mathematics]. Springer-Verlag, Berlin, 2002.
[MR01] J. C. McConnell and J. C. Robson. Noncommutative Noetherian rings, volume 30 of Graduate
Studies in Mathematics. American Mathematical Society, Providence, RI, revised edition, 2001.
With the cooperation of L. W. Small.
[NR65] D. G. Northcott and M. Reufel. A generalization of the concept of length. Quart. J. Math.
Oxford Ser. (2), 16:297 -- 321, 1965.
[Nv87] Constantin Nastasescu and Freddy van Oystaeyen. Dimensions of ring theory. Mathematics and
its Applications, 36. Dordrecht etc.: D. Reidel Publishing Company, a member of the Kluwer
Academic Publishers Group. XI, 360 p.;(1987)., 1987.
[OW87] Donald S. Ornstein and Benjamin Weiss. Entropy and isomorphism theorems for actions of
amenable groups. J. Analyse Math., 48:1 -- 141, 1987.
[Pas85] Donald S. Passman. The algebraic structure of group rings. Robert E. Krieger Publishing Co.
Inc., Melbourne, FL, 1985. Reprint of the 1977 original.
[Pas89] Donald S. Passman. Infinite crossed products, volume 135 of Pure and Applied Mathematics.
Academic Press Inc., Boston, MA, 1989.
[Pet13] G´abor Pete. Probability and geometry on groups. http://www.math.bme.hu/gabor/PGG.pdf,
May 2013.
[Ran06] Andrew Ranicki, editor. Non-commutative localization in algebra and topology, volume 330
of London Mathematical Society Lecture Note Series, Cambridge, 2006. Cambridge University
Press.
[Ste71] Bo Stenstrom. Rings and modules of quotients. Lecture Notes in Mathematics, Vol. 237. Springer-
Verlag, Berlin, 1971.
[SVV13] Luigi Salce, Peter V´amos, and Simone Virili. Length functions, multiplicities and algebraic
entropy. Forum Math., 25:255 -- 282, 2013.
[V´am68] Peter V´amos. Length Functions on Modules. PhD thesis, University of Sheffield, 1968.
[WZ92] Thomas Ward and Qing Zhang. The Abramov-Rokhlin entropy addition formula for amenable
group actions. Monatsh. Math., 114(3-4):317 -- 329, 1992.
Address of the author:
Simone Virili - [email protected]
Facultad de matem´aticas, Universidad de Murcia, Campus Espinardo, 30100 Murcia, Spain.
23
|
1505.07123 | 1 | 1505 | 2015-05-26T20:14:19 | Inverse semigroups associated with labelled spaces and their tight spectra | [
"math.RA",
"math.OA"
] | The notion of a labelled space was introduced by Bates and Pask in generalizing certain classes of C*-algebras. Motivated by Exel's work on inverse semigroups and combinatorial C*-algebras, we associate each weakly left resolving labelled space with an inverse semigroup, and characterize the tight spectrum of the latter in a way that is reminiscent of the description of the boundary path space of a directed graph. | math.RA | math |
Inverse semigroups associated with
labelled spaces and their tight spectra
Giuliano Boava, Gilles G. de Castro, and Fernando de L. Mortari
Abstract. The notion of a labelled space was introduced by
Bates and Pask in generalizing certain classes of C*-algebras. Mo-
tivated by Exel's work on inverse semigroups and combinatorial
C*-algebras, we associate each weakly left resolving labelled space
with an inverse semigroup, and characterize the tight spectrum of
the latter in a way that is reminiscent of the description of the
boundary path space of a directed graph.
1. Introduction
When studying C*-algebras, it is often useful do describe them as
C*-algebras associated with groupoids [11]. For certain classes of C*-
algebras, such descriptions have been achieved with the assistance of
inverse semigroups, most notably with the work of Paterson on graph
C*-algebras [10] and of others inspired by his approach [7, 8, 9]. The
desired groupoid appears there as the groupoid of germs for an action
of an inverse semigroup (defined from the original object considered,
e.g. a directed graph in [10]) on a certain topological space. A natural
candidate for a topological space for the inverse semigroup to act on
is the set of characters defined on the idempotents of the semigroup;
however, the C*-algebra constructed from the groupoid of germs that
comes from this action is not usually isomorphic to the original C*-
algebra.
What was done in the examples studied to somehow fix this is
to restrict the space of characters using information from the original
object; one of the main goals of Exel in [7] is to investigate whether this
restriction can be done using only information contained in the inverse
2010 Mathematics Subject Classification. Primary: 20M18, Secondary: 05C20,
05C78.
Key words and phrases. Inverse semigroup, tight spectrum, labelled space.
1
2
G. BOAVA, G. DE CASTRO, AND F. MORTARI
semigroup, without returning to the original object. He showed that it
is possible to do so, by considering only those characters that are tight,
that is, using the tight spectrum of the idempotent semilattice.
Many of the C*-algebras studied in the above-mentioned work can
be realized as C*-algebras associated with labelled graphs (or more
precisely, labelled spaces), as defined by Bates and Pask [2] and further
studied with collaborators [1, 3, 4]. Examples include C*-algebras
associated with ultragraphs and the Matsumoto algebras of (two-sided)
subshifts [2], as well as the Carlsen-Matsumoto algebra of a one-sided
shift [1].
The main goal of this paper is taking the first step in bringing
inverse semigroup theory to the study of labelled spaces in general.
Motivated by the inverse semigroup treatment given to graph, ultra-
graph and higher rank graph C*-algebras in [7, 8, 9, 10], we construct
an inverse semigroup from a labelled space that is weakly left resolving,
and proceed to give a description of the tight spectrum for this inverse
semigroup. This is achieved through a study and complete characteri-
zation of filters in the idempotent semilattice of this inverse semigroup.
The resulting description resembles the characterization of the bound-
ary path space of a directed graph as the set consisting of all infinite
paths on the graph, and of all finite paths that end in a singular ver-
tex [13]; indeed we show that, for certain classes of labelled spaces,
we arrive exactly at the boundary path space of the graph, but that
this may not always be the case. Although motivated by the theory of
C*-algebras, we work strictly in the realm of inverse semigroup theory.
This paper is organized as follows: Section 2 is a review of some of
the necessary terminology and results on labelled spaces and filters and
characters in semilattices. Section 3 deals with the construction of an
inverse semigroup associated with a labelled space. Sections 4, 5 and 6
give a description of the filters, ultrafilters and tight filters, respectively,
on the semilattice of idempotents of the inverse semigroup defined in
Section 3, and examples are studied.
2. Preliminaries
2.1. Labelled graphs.
Definition 2.1. A (directed) graph E = (E0, E1, r, s) consists of
nonempty countable sets E0, E1 and functions r, s : E1 → E0; an el-
ement of E0 is called a vertex of the graph, and an element of E1 is
called an edge. For an edge e, we say that r(e) is the range of e and
s(e) is the source of e.
INVERSE SEMIGROUPS AND LABELLED SPACES
3
Definition 2.2. A vertex v in a graph E is called a source if
r−1(v) = ∅, a sink if s−1(v) = ∅, and an infinite emitter if s−1(v)
is an infinite set. The vertex v is singular if it is either a sink or an
infinite emitter, and regular otherwise.
Definition 2.3. A path of length n in a graph E is a sequence
λ = λ1λ2 . . . λn of edges such that r(λi) = s(λi+1) for all i = 1, . . . , n−1.
We write λ = n for the length of λ and regard vertices as paths
of length 0. We denote by En the set of all paths of length n and
E∗ = ∪n≥0En. We extend the range and source maps to E∗ by defining
s(λ) = s(λ1) and r(λ) = r(λn) if n ≥ 2 and s(v) = v = r(v) for n = 0.
Similarly, we define a path of infinite length (or an infinite path) as an
infinite sequence λ = λ1λ2 . . . of edges such that r(λi) = s(λi+1) for all
i ≥ 1. The set of all infinite paths will be denoted by E∞.
Definition 2.4. Given a nonempty set A, called an alphabet, and
whose elements are referred to as letters, a labelled graph (E, L) over the
alphabet A consists of a graph E = (E0, E1, r, s) and a map L : E1 → A,
called the labelling map.
Without loss of generality, we may assume that L is onto.
Let A∗ be the set of all finite words over A, including the empty
word ω, and extend the map L to a map L : En → A∗ defined by
L(λ) = L(λ1) . . . L(λn). Similarly, one can define the map L : E∞ →
A∞, where A∞ is the set of infinite countable words over A.
Given A ⊆ P(E0) (where P(E0) is the power set of E0) define
(2.1)
L(AE1) = {L(e) e ∈ E1 and s(e) ∈ A}.
Definition 2.5. The elements of Ln := L(En) are called labelled
paths of length n and the elements of L∞ := L(E∞) are called labelled
paths of infinite length. If α is a labelled path, a path on the graph
λ such that L(λ) = α is called a representative of α. Since any two
representatives of α have the same length, one can define the length of
α, denoted by α, as the length of any one of its representatives. We
also consider ω as a labelled path, with ω = 0. If 1 ≤ i ≤ j ≤ α,
let αi,j = αiαi+1 . . . αj if j < ∞ and αi,j = αiαi+1 . . . if j = ∞.
If
j < i set αi,j = ω. The set L≥1 = ∪n≥1Ln is the set of all labelled
paths of positive finite length. We also define L∗ = {ω} ∪ L≥1, and
L≤∞ = L∗ ∪ L∞.
Since labelled paths are words over an alphabet, we can concatenate
two labelled paths α and β to obtain a new word αβ. However, it is
not always true that αβ is also a labelled path, for there may not be a
path on the graph whose label is αβ.
4
G. BOAVA, G. DE CASTRO, AND F. MORTARI
Definition 2.6. Given two labelled paths α, β, we say that α is a
beginning of β if β = αβ′ for some labelled path β′. We say that α and
β are comparable if α is a a beginning of β or β is a beginning of α.
Definition 2.7. For α ∈ L∗ and A ∈ P(E0), the relative range of
α with respect to A, denoted by r(A, α), is the set
r(A, α) = {r(λ) λ ∈ E∗, L(λ) = α, s(λ) ∈ A}
if α ∈ L≥1 and r(A, ω) = A if α = ω. The range of α, denoted by r(α),
is the set
r(α) = r(E0, α).
For α ∈ L≥1 we also define the source of α as the set
s(α) = {s(λ) ∈ E0 L(λ) = α}.
Observe that, in particular, r(ω) = E0, and if α ∈ L≥1 then r(α) =
{r(λ) ∈ E0 L(λ) = α}. The definitions above give maps s, r : L≥1 →
P(E0). Also, if α, β ∈ L∗ are such that αβ ∈ L∗ then r(r(A, α), β) =
r(A, αβ). Finally, for A, B ∈ P(E0) and α ∈ L∗, it holds that r(A ∪
B, α) = r(A, α) ∪ r(B, α).
The following notions were introduced by Bates and Pask in [2].
Definition 2.8. Let (E, L) be a labelled graph and B ⊆ P(E0).
We say that B is closed under relative ranges if r(A, α) ∈ B for all
A ∈ B and all α ∈ L∗. If additionally B is closed under finite inter-
sections and unions and contains all r(α) for α ∈ L≥1, we say that B
is accommodating for (E, L) and in this case we say that (E, L, B) is a
labelled space.
Definition 2.9. We say that a labelled space (E, L, B) is weakly
left resolving if for all A, B ∈ B and all α ∈ L≥1 we have r(A ∩ B, α) =
r(A, α) ∩ r(B, α).
Observe that in a weakly left resolving labelled space, if A, B ∈ B
are disjoint then for all α ∈ L∗, r(A, α) and r(B, α) are disjoint.
Definition 2.10. For a given α ∈ L∗, let Bα := B ∩ P(r(α)).
Note that Bω = B. These sets are fundamental to the analysis that
follows.
Remark 2.11. Throughout most of the paper, we assume that the
accommodating family for the labelled space (E, L, B) is also closed
under relative complements; in this case the set Bα is a Boolean algebra
for each α ∈ L≥1, and Bω = B is a generalized Boolean algebra as in
[12]. By the duality given by Stone's representation theorem there is
a topological space associated with each Bα with α ∈ L∗, which we
INVERSE SEMIGROUPS AND LABELLED SPACES
5
denote by Xα, consisting of the set of ultrafilters in Bα (for details, see
[6] for instance).
Lemma 2.12. Let (E, L, B) be a weakly left resolving labelled space
such that B is closed under relative complements. If A, B ∈ B and
α ∈ L∗ then r(A \ B, α) = r(A, α) \ r(B, α).
Proof. Let A, B ∈ B. Clearly,
r(A \ B, ω) = A \ B = r(A, ω) \ r(B, ω).
For α ∈ L≥1, since A = (A \ B) ⊔ (A ∩ B) (where ⊔ stands for the
union of disjoint sets) and the labelled space is weakly left resolving,
r(A, α) = r((A \ B) ⊔ (A ∩ B), α) = r(A \ B, α) ⊔ r(A ∩ B, α)
so that
r(A \ B, α) = r(A, α) \ (r(A ∩ B, α))
= r(A, α) \ (r(A, α) ∩ r(B, α))
= r(A, α) \ r(B, α).
(cid:3)
2.2. Filters and characters. Following [7], we recall some basic
definitions and properties about filters and characters.
Definition 2.13. Let P be a partially ordered set with least ele-
ment 0. A filter in P is a nonempty subset ξ ⊆ P such that
(i) 0 /∈ ξ;
(ii) if x ∈ ξ and x ≤ y, then y ∈ ξ;
(iii) if x, y ∈ ξ, there exists z ∈ ξ such that z ≤ x and z ≤ y.
An ultrafilter is a filter which is not properly contained in any filter.
Remark 2.14. When P is a (meet) semilattice, condition (iii) may
be replaced by x ∧ y ∈ ξ if x, y ∈ ξ.
Let P be a partially ordered set with least element 0 and x ∈ P .
We denote the principal filter generated by x by ↑x, that is,
↑x = {y ∈ P x ≤ y}.
Similarly, the principal ideal generated by x is
↓x = {y ∈ P y ≤ x}.
When X and Y are subsets of P , we use
↑X = [x∈X
↑x = {y ∈ P x ≤ y for some x ∈ X},
6
G. BOAVA, G. DE CASTRO, AND F. MORTARI
and ↑Y X = Y ∩ ↑X; the sets ↑Y x, ↓Y x, ↓X and ↓Y X are defined
analogously. We remark that ↑X and ↑Y X are not filters, in general.
The next proposition characterizes the subsets X of P for which ↑X is
a filter.
Proposition 2.15. Let P be a partially ordered set with least ele-
ment 0 and X be a nonempty subset of P . Then ↑X is a filter if and
only if 0 /∈ X and for every x, y ∈ X, there exists z ∈ X such that
z ≤ x and z ≤ y. In particular, if P is a semilattice then ↑X is a filter
if and only if 0 /∈ X and for every x, y ∈ X one has x ∧ y ∈ X.
Proof. Trivial.
(cid:3)
Proposition 2.16 ([7], Lemma 12.3). Let E be a semilattice with
0. A filter ξ in E is an ultrafilter if and only if
{y ∈ E y ∧ x 6= 0 ∀ x ∈ ξ} ⊆ ξ.
When E is a Boolean algebra, we have another characterization of
ultrafilters.
Proposition 2.17 ([5], Theorem IV.3.12). Let E be a Boolean
algebra. A filter ξ in E is an ultrafilter if and only if for every x ∈ E,
exactly one of x and ¬x is in ξ.
Definition 2.18. Let E be a semilattice with 0. A character of E
is a nonzero function φ from E to the Boolean algebra {0, 1} such that
(a) φ(0) = 0;
(b) φ(x ∧ y) = φ(x) ∧ φ(y), for all x, y ∈ E.
The set of all characters of E is denoted by E0 and we endow E0 with
the topology of pointwise convergence.
The next definitions are adaptations of [7].
Definition 2.19. Let E be a semilattice with 0 and x ∈ E. A set
Z ⊆ ↓x is said to be a cover for x if for all nonzero y ∈ ↓x, there exists
z ∈ Z such that z ∧ x 6= 0.
Definition 2.20. Let E be a semilattice with 0. A character φ of
E is tight if for every x ∈ E and every finite cover Z for x, we have
φ(z) = φ(x).
_z∈Z
The set of all tight characters of E is denoted by Etight, and called the
tight spectrum of E.
INVERSE SEMIGROUPS AND LABELLED SPACES
7
We can associate each filter ξ in a semilattice E with a character
φξ of E given by
φξ(x) = (cid:26) 1,
0,
if x ∈ E,
otherwise.
Conversely, when φ is a character, ξφ = {x ∈ E φ(x) = 1} is a filter
in E. Clearly, these maps give a bijection between E0 and the set of
filters in E. We denote by E∞ the set of all characters φ of E such
that ξφ is an ultrafilter, and a filter ξ in E is said to be tight if φξ is a
tight character.
Proposition 2.21 ([7], Proposition 12.7). Every ultrafilter is tight,
that is, E∞ ⊆ Etight.
Definition 2.20 can be rephrased to characterize tight filters, as in
the following result.
Proposition 2.22. A filter ξ in E is tight if and only if for every
x ∈ ξ and every finite cover Z for x, one has Z ∩ ξ 6= ∅.
When E is a Boolean algebra, tight filters are easily described:
Proposition 2.23 ([7], Proposition 11.9). Let E be a Boolean al-
gebra and ξ a filter in E. The following are equivalent:
(i) ξ is tight;
(ii) ξ is an ultrafilter;
(iii) φξ is a morphism of Boolean algebras.
The next theorem is the main result relating ultrafilters and tight
characters.
Theorem 2.24 ([7], Theorem 12.9). Let E be a semilattice with 0.
Then Etight is the closure of E∞ in E0.
The convergence of characters in E0 can be translated to the context
of filters; thus, a net {ξλ}λ∈Λ of filters in E converges to a filter ξ if for
each x ∈ E, there exists λ0 ∈ Λ such that for all λ ≥ λ0, x ∈ ξλ if and
only if x ∈ ξ.
3. Definition of the inverse semigroup
For this section let us fix a labelled space (E, L, B), and consider
the set T of all triples (α, A, β) ∈ L∗ × B × L∗ for which A ∈ Bα ∩ Bβ,
together with an extra element, say z. A binary operation on T is
8
G. BOAVA, G. DE CASTRO, AND F. MORTARI
defined as follows: for all t ∈ T define zt = tz = z, and for elements
(α, A, β), (γ, B, δ) in L∗ × B × L∗ put
(α, A, β)(γ, B, δ) =
(αγ′, r(A, γ′) ∩ B, δ),
(α, A ∩ r(B, β′), δβ′),
z,
if γ = βγ′,
if β = γβ′,
otherwise.
Thus, nontrivial products occur only if β and γ are comparable. This
product is indeed well-defined, for one can see for instance in the first
case that A ∈ Bα implies r(A, γ′) ∈ Bαγ′, which gives r(A, γ′) ∩ B ∈
Bαγ′. Similarly, B ∈ Bδ implies r(A, γ′) ∩ B ∈ Bδ, establishing the
condition r(A, γ′) ∩ B ∈ Bαγ′ ∩ Bδ.
Remark 3.1. Note that if β = γ then γ′ = β′ = ω and, therefore,
r(A, γ′) = A, r(B, β′) = B, whence
(α, A, β)(β, B, δ) = (α, A ∩ B, δ).
Proposition 3.2. Suppose that the labelled space (E, L, B) is weakly
left resolving; then, the set T together with the operation above is a
semigroup with zero element given by z.
Proof. It must be shown that the operation is associative. Let
s, t, u ∈ T be given. Clearly associativity holds if any of these equals
z, so suppose they are all in L∗ × B × L∗, say
s = (α, A, β), t = (γ, B, δ), u = (µ, C, ν).
Begin by considering the case st = z and tu 6= z, observing that st = z
implies β and γ are not comparable, while tu 6= z says the first entry in
tu is either γ (if δ = µδ′) or γµ′ (if µ = δµ′); but β is not comparable
with any of these, so s(tu) = z = zu = (st)u.
Evidently the case st 6= z and tu = z follows similarly, and the
case st = tu = z is immediate, so it remains to consider st 6= z and
tu 6= z. There are four cases to investigate, according to how the labels
β, γ, δ, µ compare.
If γ = βγ′ and µ = δµ′, note that γµ′ = βγ′µ′ and
(st)u = (αγ′, r(A, γ′) ∩ B, δ)(µ, C, ν)
= (αγ′µ′, r(r(A, γ′) ∩ B, µ′) ∩ C, ν)
= (αγ′µ′, [r(r(A, γ′), µ′) ∩ r(B, µ′)] ∩ C, ν)
= (αγ′µ′, r(A, γ′µ′) ∩ [r(B, µ′) ∩ C], ν)
= (α, A, β)(γµ′, r(B, µ′) ∩ C, ν)
= s(tu),
INVERSE SEMIGROUPS AND LABELLED SPACES
9
where in the third equality the weakly left resolving hypothesis was
used.
The case β = γβ′ and δ = µδ′ is analogous, and the case γ = βγ′
and δ = µδ′ follows directly from the definition, by comparing the two
sides.
Finally, if β = γβ′ and µ = δµ′, one has st = (α, A ∩ r(B, β′), δβ′)
and tu = (γµ′, r(B, µ′) ∩ C, ν). To evaluate (st)u, compare δβ′ with µ.
Suppose µ begins with δβ′, say µ = δβ′µ′′; since µ = δµ′, this is the
same as µ′ = β′µ′′ and, in particular, γµ′ = γ(β′µ′′) = (γβ′)µ′′ = βµ′′,
so that
(st)u = (α, A ∩ r(B, β′), δβ′)(µ, C, ν)
= (αµ′′, r(A ∩ r(B, β′), µ′′) ∩ C, ν)
= (αµ′′, [r(A, µ′′) ∩ r(r(B, β′), µ′′)] ∩ C, ν)
= (αµ′′, [r(A, µ′′) ∩ r(B, β′µ′′)] ∩ C, ν)
= (αµ′′, r(A, µ′′) ∩ [r(B, µ′) ∩ C], ν)
= (α, A, β)(γµ′, r(B, µ′) ∩ C, ν)
= s(tu).
The case where δβ′ begins with µ = δµ′ is analogous, and the case
in which they are not comparable is trivial, since then both (st)u and
s(tu) equal z.
(cid:3)
The next step is to obtain a set S by identifying with z all elements
in T of the form (α, ∅, β), collapsing them all to a single element, rep-
resented by 0, and leaving the other elements in T as they are. The
operation on the semigroup T passes to this quotient S, turning it into
a semigroup with zero element 0.
In fact, to show the operation is well defined it is enough to see it is
well behaved when operating with the zero class, which is easily done:
if s = (α, ∅, β) and t = (γ, B, δ), note that
• if β and γ are not comparable, then st = z;
• if γ = βγ′, then
st = (αγ′, r(∅, γ′) ∩ B, δ) = (αγ′, ∅ ∩ B, δ) = (αγ′, ∅, δ);
• if β = γβ′ then st = (α, ∅, δβ′).
Thus, in all three cases the class of st in the quotient equals 0, and the
same can be said for the class of ts.
Remark 3.3. Given s = (α, A, β) and t = (γ, B, δ) in S, their
product st may be equal to 0 even when β and γ are comparable, for it
10
G. BOAVA, G. DE CASTRO, AND F. MORTARI
may be the case that r(A, γ′)∩B = ∅ (when γ = βγ′) or A∩r(B, β′) = ∅
(when β = γβ′).
Proposition 3.4. Suppose the labelled space (E, L, B) is weakly
left resolving. Then S is an inverse semigroup with zero element 0.
Proof. Let a nonzero s = (α, A, β) ∈ S be given. Then the ele-
ment s∗ defined by (β, A, α) is such that s∗s = (β, A, β) (see Remark
3.1), giving
ss∗s = s(s∗s) = (α, A, β)(β, A, β) = (α, A, α) = s,
and also s∗ss∗ = s∗.
To prove uniqueness of the inverse, suppose t ∈ S is such that
sts = s and tst = t, noting that the first of these identities implies
t 6= 0. Writing t = (γ, B, δ), from st 6= 0 it follows that β and γ are
comparable, and from ts 6= 0 one sees δ and α are comparable.
Let us show that β = γ.
Indeed, if γ = βγ′ with γ′
6= ω, by
definition one has
s = (st)s = (cid:26) (αγ′α′, r(r(A, γ′) ∩ B, α′) ∩ A, β),
(αγ′, [r(A, γ′) ∩ B] ∩ r(A, δ′), βδ′),
if α = δα′,
if δ = αδ′,
a contradiction since both first entries, αγ′α′ and αγ′, are not equal
to α. The case β = γβ′ with β′
6= ω reaches a similar contradiction,
using t = t(st) and looking at the resulting third entries instead. An
analogous argument establishes that α = δ, and so it can be concluded
that t = (β, B, α).
Finally, s = (st)s and t = (ts)t now give A∩B = A and B ∩A = B,
(cid:3)
whence A = B, that is, t = s∗.
In what follows we describe the filters, ultrafilters and tight filters
in E(S).
4. Filters in E(S)
Recall that if T is an inverse semigroup then its set of idempotents
E(T ) is a semilattice; the meet between two idempotents p and q is
p ∧ q = pq = qp (idempotents in an inverse semigroup commute), and
the induced order is given by p ≤ q when pq = p.
Let (E, L, B) be a labelled space which is weakly left resolving and
consider the inverse semigroup S as in the previous section. In this case,
the set E(S) of idempotents is a semilattice with 0. In this section, we
describe the elements, order and filters in E(S).
Let p = (α, A, β) be a nonzero element in S. If p is an idempotent,
then either β is a beginning of α or α is a beginning of β. In first case,
INVERSE SEMIGROUPS AND LABELLED SPACES
11
writing α = βα′,
p2 = (α, A, β)(α, A, β) = (αα′, r(A, α′) ∩ A, β).
Since p2 = p, we must have α′ = ω, hence α = β. Analogously, when α
is a beginning of β, we also conclude that α = β. On the other hand,
every element in S of the form (α, A, α) is an idempotent. Thus,
E(S) = {(α, A, α) α ∈ L∗ and A ∈ Bα} ∪ {0}.
Proposition 4.1. Let p = (α, A, α) and q = (β, B, β) be nonzero
elements in E(S). Then p ≤ q if and only if α = βα′ and A ⊆ r(B, α′).
Proof. Suppose p ≤ q; by definition this occurs if and only if
(α, A, α)(β, B, β) = (α, A, α), which gives α = βα′. The multiplication
results in (α, A ∩ r(B, α′), βα′) from where it can be deduced that
A ⊆ r(B, α′).
For the converse, it is clear that if α = βα′ and A ⊆ r(B, α′), then
(cid:3)
pq = p.
Remark 4.2. The preceding proposition says that "bigger" ele-
ments in E(S) have "shorter" words and "bigger" sets (when compared
in the same Boolean Algebra). Furthermore, for a fixed α ∈ L∗ the
restricted order in the subset of E(S) given by {(α, A, α) A ∈ Bα}
coincides with the natural inclusion order in Bα.
Let ξ be a filter in E(S) and p = (α, A, α) and q = (β, B, β) in ξ.
Since ξ is a filter, then pq 6= 0; hence, α and β are comparable. This
says the words of any two elements in a filter are comparable.
Proposition 4.3. Let α ∈ L∗ and F be a filter in Bα. Then
ξ = [A∈F
↑(α, A, α)
= {(α1,i, A, α1,i) ∈ E(S) 0 ≤ i ≤ α and r(A, αi+1,α) ∈ F }
is a filter in E(S).
Proof. First we show that the sets in the statement are equal: let
A ∈ F and p = (β, B, β) ∈ ↑(α, A, α). From the order in E(S) and
Proposition 4.1, we obtain α = βα′ and A ⊆ r(B, α′) so that β = α1,i
for some i and r(B, αi+1,α) = r(B, α′) ∈ F , since A ∈ F and F is a
filter.
Conversely, let p = (α1,i, A, α1,i) be such that r(A, αi+1,α) ∈ F.
Together with (α, r(A, αi+1,α), α) ≤ (α1,i, A, α1,i), this shows that p ∈
SA∈F ↑(α, A, α).
Now we show that ξ is a filter: clearly ξ is nonempty, 0 /∈ ξ and if
p ∈ ξ and p ≥ q then q ∈ ξ. Let p, q ∈ ξ and choose A and B in F
12
G. BOAVA, G. DE CASTRO, AND F. MORTARI
such that p ≥ (α, A, α) and q ≥ (α, B, α). We have that A ∩ B ∈ F,
given that F is a filter, whence r = (α, A ∩ B, α) ∈ ξ. Since r ≤ p and
r ≤ q, the proof is complete.
(cid:3)
Proposition 4.4. Let ξ be a filter in E(S) and suppose there exists
a word α ∈ L∗ such that (α, A, α) ∈ ξ for some A ∈ Bα and α has the
largest length among all β such that (β, B, β) ∈ ξ for some B ∈ Bβ.
Define
F = {A ∈ B (α, A, α) ∈ ξ}.
Then F is a filter in Bα and
ξ = [A∈F
↑(α, A, α).
Proof. When we restrict the order of E(S) to elements with the
same word α, the order coincides with the order in Bα, hence F is a
filter. It is easy to see that SA∈F ↑(α, A, α) ⊆ ξ. On the other hand,
let p = (β, B, β) ∈ ξ and choose A ∈ Bα such that q = (α, A, α) ∈ ξ.
Since ξ is a filter, then p ∧ q = pq ∈ ξ and pq 6= 0. Therefore, β must be
a beginning of α (because α has the largest length), say α = βα′, and
pq = (α, A ∩ r(B, α′), α). From this we conclude that A ∩ r(B, α′) ∈ F,
(cid:3)
whence p ∈ ↑(α, A ∩ r(B, α′), α) ⊆ SA∈F ↑(α, A, α).
In Proposition 4.3, we construct a filter with a largest word in E(S)
from a (finite) word α and a filter in Bα, whereas with Proposition 4.4,
we go in the opposite direction. It is easy to see that these constructions
are each other's inverses, and therefore there is a bijective correspon-
dence between filters in E(S) with largest word and pairs (α, F), where
α is a finite word and F is a filter in Bα.
Our next goal is to obtain a characterization of the filters in E(S)
which do not admit a word with largest length.
Definition 4.5. Let α ∈ L∞ and {F n}n≥0 be a family such that
F n is a filter in Bα1,n for every n > 0 and F 0 is a filter in B or F 0 = ∅.
The family {F n}n≥0 is said to be admissible for α if
F n ⊆ {A ∈ Bα1,n r(A, αn+1) ∈ F n+1}
for all n ≥ 0, and is said to be complete for α if
F n = {A ∈ Bα1,n r(A, αn+1) ∈ F n+1}
for all n ≥ 0.
Lemma 4.6. Let α ∈ L∞ and {F n}n≥0 be a family such that F n
is a filter in Bα1,n for every n > 0 and F 0 is a filter in B or F 0 = ∅.
INVERSE SEMIGROUPS AND LABELLED SPACES
13
Then {F n}n≥0 is complete if and only if
F n = {A ∈ Bα1,n r(A, αn+1,m) ∈ F m}
for all n ≥ 0 and all m > n.
Proof. The "if" part is clear and the "only if" part follows easily
by induction using that r(r(A, β), γ) = r(A, βγ) if β, γ ∈ L∗ are such
that βγ ∈ L∗.
(cid:3)
Proposition 4.7. Let α ∈ L∞, {F n}n≥0 be an admissible family
for α and define
ξ =
∞
[n=0 [A∈F n
↑(α1,n, A, α1,n).
Then ξ is a filter in E(S).
Proof. We already know that, for each n ≥ 0,
ξn = [A∈F n
↑(α1,n, A, α1,n)
is a filter in E(S) (except if F 0 = ∅, which would then give ξ0 = ∅).
We claim that ξn is contained in ξn+1 for every n ≥ 0.
Indeed, let
p ∈ ξn and choose q = (α1,n, A, α1,n) ∈ ξn such that q ≤ p. Since the
family is admissible, we conclude that r(A, αn+1) ∈ F n+1 and, hence,
r = (α1,n+1, r(A, αn+1), α1,n+1) ∈ ξn+1. Given that ξn+1 is a filter and
r ≤ q ≤ p, then p ∈ ξn+1. This claim says the filters ξn are nested,
from where we deduce that their union is a filter.
(cid:3)
Proposition 4.8. Let ξ be a filter in E(S) and suppose there is
no word in γ ∈ L∗ such that (γ, C, γ) ∈ ξ for some C ∈ Bγ and γ
possesses largest length among all β such that (β, B, β) ∈ ξ for some
B ∈ Bβ. Then there exists α ∈ L∞ such that every p ∈ ξ can be written
as p = (α1,n, A, α1,n) for some n ≥ 0 and some A ∈ Bα1,n. Moreover,
if we define for each n ≥ 0,
F n = {A ∈ B (α1,n, A, α1,n) ∈ ξ},
then {F n}n≥0 is a complete family for α.
Proof. For each n > 0, choose p = (β, B, β) ∈ ξ such that β ≥ n
and define αn = βn. Since any two elements in ξ have comparable
words, then αn is well defined. Hence, we have a word α = α1α2 . . . ∈
L∞. Let F n as in the statement. We claim that F n is nonempty
for all n > 0. Indeed, fix n > 0 e choose m ≥ n such that there is
p = (α1,m, A, α1,m) ∈ ξ. Observe that q = (α1,n, r(α1,n), α1,n) ≥ p and,
because ξ is a filter, q ∈ ξ. This shows that r(α1,n) ∈ F n.
14
G. BOAVA, G. DE CASTRO, AND F. MORTARI
Again, since the order in E(S) is the same as the order in Bα1,n
when we consider only elements with the word α1,n, we conclude that
F n is a filter in Bα1,n for all n ≥ 0 (except for n = 0 where F 0 may be
the empty set).
It remains to show that the family is complete. Fix n ≥ 0 and
denote by G the set {A ∈ Bα1,n r(A, αn+1) ∈ F n+1}. Let A ∈ F n.
Since F n+1 is nonempty, we can choose B ∈ F n+1. Because ξ is a filter
and both p = (α1,n, A, α1,n) and q = (α1,n+1, B, α1,n+1) belong to ξ,
it follows that p ∧ q = (α1,n+1, r(A, αn+1) ∩ B, α1,n+1) ∈ ξ. This says
r(A, αn+1) ∩ B is nonempty and belongs to F n+1. Since F n+1 is a filter
in Bα1,n+1 and r(A, αn+1) ∈ Bα1,n+1, we have that r(A, αn+1) ∈ F n+1
and, therefore, A ∈ G. On the other hand, let A ∈ G and observe that
p = (α1,n+1, r(A, αn+1), α1,n+1) ∈ ξ. Clearly, p ≤ q = (α1,n, A, α1,n).
Again using that ξ is a filter, we obtain q ∈ ξ, which says A ∈ F n. (cid:3)
Proposition 4.9. There is a bijective correspondence between fil-
ters in E(S) without largest word and pairs (α, {F n}n≥0), where α ∈
L∞ and {F n}n≥0 is a complete family for α. These correspondences
are given by Propositions 4.7 and 4.8.
Proof. Let ξ be a filter in E(S) without a largest word, consider
(α, {F n}n≥0) as in Proposition 4.8 and let η be the filter given by
Proposition 4.7 from (α, {F n}n≥0); we will show that ξ = η: clearly
ξ ⊆ η from the definition of η. Let p ∈ η and choose n ≥ 0 and
A ∈ F n such that (α1,n, A, α1,n) ≤ p. By the definition of F n we have
(α1,n, A, α1,n) ∈ ξ and, since ξ is a filter, it follows that p ∈ ξ and the
equality is established.
Conversely, let α ∈ L∞ and {F n}n≥0 be a complete family for α,
consider the filter ξ constructed from them as in Proposition 4.7 and
let (β, {Gn}n≥0) be given from ξ by Proposition 4.8. We need to show
that (α, {F n}n≥0) = (β, {Gn}n≥0). By construction, we see that α = β.
Fix m ≥ 0 and let A ∈ F m. Then (α1,m, A, α1,m) ∈ ξ, hence A ∈ Gm.
On the other hand, given B ∈ G m the definition of Gm ensures that
(α1,m, B, α1,m) ∈ ξ; therefore, there exists k ≥ m and C ∈ F k such
that (α1,k, C, α1,k) ≤ (α1,m, B, α1,m). This says that C ⊆ r(B, αm+1,k)
and, since F k is a filter in Bα1,k , it follows that r(B, αm+1,k) ∈ F k.
Completeness of {F n}n≥0 and Lemma 4.6 now give B ∈ F m. Thus,
(α, {F n}n≥0) = (β, {Gn}n≥0) and the proof is complete.
(cid:3)
The previous results classify the filters in E(S) in two types: the
ones as in Propositions 4.3 and 4.4, which we call filters of finite type;
and the filters as in Propositions 4.7, 4.8 and 4.9, called filters of infinite
type.
INVERSE SEMIGROUPS AND LABELLED SPACES
15
Next, we present some properties about filters in E(S) that will be
useful later; furthermore, we introduce a new notation for the filters.
Proposition 4.10. Let α, β ∈ L∗ be such that αβ ∈ L∗, F be a
filter in Bα and G be a filter in Bαβ. The following are equivalent:
(i) {r(A, β) A ∈ F} ⊆ G;
(ii) F ⊆ {A ∈ Bα r(A, β) ∈ G};
(iii) [A∈F
↑(α, A, α) ⊆ [B∈G
↑(αβ, B, αβ).
Proof. The equivalence between (i) and (ii) is obvious. Suppose
(iii) is valid and let A ∈ F; by (iii), there exists B ∈ G such that
(αβ, B, αβ) ≤ (α, A, α), hence B ⊆ r(A, β). Since G is a filter in Bαβ
and r(A, β) ∈ Bαβ, therefore r(A, β) ∈ G, proving (ii).
that (α, A, α) ≤ p. We have (αβ, r(A, β), αβ) ≤ (α, A, α) ≤ p and, by
Now assume (ii), let p ∈ SA∈F ↑(α, A, α) and choose A ∈ F such
(ii), r(A, β) ∈ G, so that p ∈ SB∈G ↑(αβ, B, αβ) which gives (iii). (cid:3)
Proposition 4.11. Let α ∈ L∗ and {F n}n≥0 be an admissible fam-
ily for α. For each n ≥ 0, define
F n = {A ∈ Bα1,n r(A, αn+1,m) ∈ F m for some m ≥ n}.
Then:
(i) F n ⊆ F n, for all n ≥ 0;
(ii) {F n}n≥0 is a complete family for α;
(iii) (α, {F n}n≥0) and (α, {F n}n≥0) generate the same filter in E(S)
(see Proposition 4.7).
(iv) If ξ is the filter associated with (α, {F n}n≥0), then the pair asso-
ciated with ξ (by Proposition 4.8) is (α, {F n}n≥0).
Proof. Item (i) is immediate from the definition of F n. We claim
F n is a filter in Bα1,n (or possibly the empty set when n = 0): clearly,
∅ /∈ F n. Let A1 and A2 be in F n and choose m1, m2 ≥ n such
that r(A1, αn+1,m1) ∈ F m1 and r(A2, αn+1,m2) ∈ F m2. Define m =
max{m1, m2} and note that r(A1, αn+1,m) and r(A2, αn+1,m) both be-
long to F m, given that {F n}n≥0 is admissible. Because F m is a filter
in Bα1,m and the labelled space is weakly left resolving, we have that
r(A1 ∩ A2, αn+1,m) = r(A1, αn+1,m) ∩ r(A2, αn+1,m) ∈ F m
and therefore A1 ∩ A2 ∈ F n. Now, let A ∈ F n and B ∈ Bα1,n be such
that B ⊇ A. Choose m ≥ n such that r(A, αn+1,m) ∈ F m and observe
that r(B, αn+1,m) ⊇ r(A, αn+1,m). Since F m is a filter, we have that
r(B, αn+1,m) ∈ F m, which says B ∈ F n. This completes the proof of
our claim.
16
G. BOAVA, G. DE CASTRO, AND F. MORTARI
Next we show that {F n}n≥0 is complete: Let
Gn = {A ∈ Bα1,n r(A, αn+1) ∈ F n+1}.
We need to show that F n = Gn. To see this, let A ∈ F n and choose
m ≥ n such that r(A, αn+1,m) ∈ F m. If m = n then A ∈ F n and, since
{F n}n≥0 is admissible, we have r(A, αn+1) ∈ F n+1 ⊆ F n+1, which says
A ∈ Gn. If m > n, then r(r(A, αn+1), αn+2,m) = r(A, αn+1,m) ∈ F m
and therefore r(A, αn+1) ∈ F n+1, whence A ∈ Gn. On the other hand,
let B ∈ Gn. Then r(B, αn+1) ∈ F n+1 and we can take m ≥ n + 1
such that r(B, αn+1,m) = r(r(B, αn+1), αn+2,m) ∈ F m. It follows that
B ∈ F n and the proof of (ii) is complete.
In order to show (iii), denote by ξ and ¯ξ the filters associated
with (α, {F n}n≥0) and (α, {F n}n≥0), respectively. Clearly, ξ ⊆ ¯ξ; let
p ∈ ¯ξ and choose n ≥ 0 and A ∈ F n such that (α1,n, A, α1,n) ≤ p.
Take m ≥ n such that r(A, αn+1,m) ∈ F m and observe that q =
(α1,m, r(A, αn+1,m), α1,m) ∈ ξ and q ≤ p. ξ is a filter, therefore p ∈ ξ,
which shows (iii).
Item (iv) is consequence from (iii) and Proposition 4.9.
(cid:3)
Proposition 4.12. Let ξ be a filter in E(S) of finite type and
(α, F) be its associated pair. For each n ∈ {0, 1, . . . , α}, define
F n = {A ∈ B (α1,n, A, α1,n) ∈ ξ}.
Then:
(i) F n is a filter in Bα1,n for every n ∈ {1, . . . , α} and F 0 is either
empty or a filter in B;
(ii) F n = {A ∈ Bα1,n r(A, αn+1,m) ∈ F m}, for all 0 ≤ n < m ≤ α.
Proof. These results are proved exactly in the same way as Propo-
(cid:3)
sition 4.8 and Lemma 4.6.
We summarize the results obtained until now. There are two kinds
of filters in E(S): of infinite and finite type. The former is characterized
by an infinite word α and a complete family {F n}n≥0 for α. Clearly,
for n ≤ m, F n is completely determined from F m. When we need to
create a filter of infinite type, we need only an infinite word α and an
admissible family for α. Indeed, an admissible family can be completed
to a complete family by using Proposition 4.11. Sometimes, we use
Proposition 4.10 to obtain equivalent formulations for the admissibility
condition in Definition 4.5.
The filters of finite type are determined by a finite word α and a
filter F in Bα. Aiming to obtain a standard way to work with all filters,
INVERSE SEMIGROUPS AND LABELLED SPACES
17
we now describe filters of finite type in a slightly different form: analo-
gous to Definition 4.5, to each finite word α we can define admissible or
complete families {F n}0≤n≤α for α (when α is the empty word ω, we
do not allow F 0 = ∅). Due to Proposition 4.11, admissible families can
be completed and, since the filter F α determines the family (Proposi-
tion 4.12), then it is clear that there is a correspondence between filters
of finite type and pairs (α, {F n}0≤n≤α), where α is a finite word and
{F n}0≤n≤α is a complete family for α.
Combining the results obtained in this section, we obtain the fol-
lowing description for the filters in E(S).
Theorem 4.13. Let (E, L, B) be a labelled space which is weakly
left resolving, and let S be its associated inverse semigroup. Then
there is a bijective correspondence between filters in E(S) and pairs
(α, {F n}0≤n≤α), where α ∈ L≤∞ and {F n}0≤n≤α is a complete fam-
ily for α (understanding that 0 ≤ n ≤ α means 0 ≤ n < ∞ when
α ∈ L∞).
In view of this, we will use the following notation: when a filter ξ
in E(S) with associated word α ∈ L≤∞ is given, we write ξ = ξα to
stress the word α. Furthermore, we denote by ξα
n (or ξn when there is
no ambiguity) the filter F n in Bα1,n of the complete family associated
with ξα (obviously, n ≤ α). To be specific:
and the family {ξα
ξα
n = {A ∈ B (α1,n, A, α1,n) ∈ ξα}
n }0≤n≤α satisfies
ξα
n = {A ∈ Bα1,n r(A, αn+1,m) ∈ ξα
m}
for all 0 ≤ n < m ≤ α.
Finally we remark that, in order to create a filter of finite type, we
need only a word α ∈ L∗ and a filter in Bα, whereas to create a filter
of infinite type, it is enough to have a word α ∈ L∞ and an admissible
family for α.
For future reference, we denote by F the set of all filters in E(S)
and by Fα the subset of F of those filters whose associated word is
α ∈ L≤∞.
5. Ultrafilters in E(S)
Next we describe the ultrafilters in E(S). Since the notion of ultra-
filter is associated with inclusion among filters, we enunciate an easy,
but useful, proposition which characterizes the order (given by inclu-
sion) in F.
18
G. BOAVA, G. DE CASTRO, AND F. MORTARI
Proposition 5.1. Let ξα, ηβ ∈ F. Then ξα ⊆ ηβ if and only if α
is a beginning of (or equal to) β and ξn ⊆ ηn for all 0 ≤ n ≤ α.
Proof. Trivial.
(cid:3)
Remark 5.2. The proposition above can be simplified in the case
α is a finite word: the statement would then be ξα ⊆ ηβ if and only if
α is a beginning of (or equal to) β and ξα ⊆ ηα.
Proposition 5.3. Let ξα ∈ F be a filter of infinite type, that is, α ∈
L∞. Then ξα is an ultrafilter if and only if {ξn}n≥0 is maximal among
all complete families for α, where maximal means that if {F n}n≥0 is
complete family for α such that ξn ⊆ F n for all n ≥ 0, then ξn = F n
for all n ≥ 0.
Proof. First suppose ξα is an ultrafilter and let {F n}n≥0 be a
complete family for α such that ξn ⊆ F n for all n ≥ 0.
If η is the
filter associated with (α, {F n}n≥0) then ξα ⊆ η, by the previous result.
Since ξα is an ultrafilter, therefore ξα = η, hence ξn = F n for all n ≥ 0,
that is, {ξn}n≥0 is maximal.
On the other hand, suppose {ξn}n≥0 is maximal and let ηβ ∈ F be
such that ξα ⊆ ηβ. By the previous result we must have β = α and
ξn ⊆ ηn for all n ≥ 0; since {ξn}n≥0 is maximal, we have that ξn = ηn
for all n and therefore ξα = ηβ, showing that ξα is an ultrafilter.
(cid:3)
Proposition 5.4. Let ξα ∈ F be a filter of finite type, that is,
α ∈ L∗. Then ξα is an ultrafilter if and only if ξα is an ultrafilter in
Bα and for each letter b ∈ A, there exists A ∈ ξα such that r(A, b) = ∅.
Proof. (⇒) Suppose ξα is an ultrafilter, and let F be a filter in
Bα such that ξα ⊆ F . The filter η associated with (α, F) contains ξα,
therefore η = ξα and so F = ξα, whence ξα is an ultrafilter.
Now, suppose by contradiction there exists b ∈ A such that r(A, b) 6=
∅ for all A ∈ ξα. Consider the subset of Bαb given by
Y = {r(A, b) A ∈ ξα}.
Given that ξα is a filter and the labelled space is weakly left resolv-
ing, we have that Y is closed under intersections and, by hypothesis,
∅ /∈ Y ; it follows from Proposition 2.15 that ↑B
αb Y is a filter in Bαb.
Consider then the filter η associated with the pair (αb, ↑B
αb Y ). Since
ηα = {A ∈ Bα r(A, b) ∈ ↑Bαb Y } ⊇ ξα, we would then have ξα $ η
by Remark 5.2, contradicting the fact that ξα is an ultrafilter.
(⇐) Suppose ξα is not an ultrafilter, so that there is a ηβ ∈ F such
that ξα $ ηβ, noting that α is a beginning of β, by Proposition 5.1. If
β = α then ξα $ ηα (by Remark 5.2), hence ξα is not an ultrafilter in
INVERSE SEMIGROUPS AND LABELLED SPACES
19
Bα. If β 6= α, then β = αγ with γ 6= ω. Let b be the first letter of γ and
observe that ξα ⊆ ηα = {A ∈ Bα r(A, b) ∈ ηα+1}; it follows from
Proposition 4.10 that {r(A, b) A ∈ ξα} ⊆ ηα+1 and, because ηα+1
is a filter, we have r(A, b) 6= ∅ for all A ∈ ξα, a contradiction.
(cid:3)
Remark 5.5. The condition "for each letter b ∈ A, there exists A ∈
ξα such that r(A, b) = ∅" in the previous result has other variations;
indeed, if ξα ∈ F is a filter of finite type, it is then easy to see that the
following conditions are equivalent:
(i) For each letter b ∈ A, there exists A ∈ ξα such that r(A, b) = ∅;
(ii) For each letter b ∈ A such that αb ∈ L∗, there exists A ∈ ξα such
that r(A, b) = ∅;
(iii) For each word β ∈ L∗, there exists A ∈ ξα such that r(A, β) = ∅;
(iv) For each word β ∈ L∗ such that αβ ∈ L∗, there exists A ∈ ξα
such that r(A, β) = ∅.
The previous two results characterize the ultrafilters in E(S), but
natural questions related to Propositions 5.3 and 5.4 can be raised; for
instance, if α ∈ L∞ and ξα is a filter, it is clear that if ξn is ultrafilter
for every n ≥ 0, then ξα is an ultrafilter. The converse, however, is not
true in general, as the next example illustrates.
Example 5.6. Consider the labelled graph (E, L) given by
a1
v1
a1
v2
v4
a2
a2
a2
v3
v5
a3
v6
a4
v7
· · ·
a5
and define B as the family of all subsets A ⊆ E0 such that v2 ∈ A
whenever v4 ∈ A and v3 ∈ A whenever v5 ∈ A.
It is not difficult
to check that B is a weakly left resolving accommodating family for
(E, L).
Consider the labelled path α = a1a2a3 · · · . We claim there ex-
ists a unique complete family {F n}n≥0 for α (which is therefore max-
imal), given by F 0 = {{v1}}, F 1 = {{v2, v4}}, F 2 = {{v3, v5}} and
F n = {{vn+3}} for n ≥ 3: to prove this, first observe that Bα1,1 =
{∅, {v2}, {v2, v4}}, Bα1,2 = {∅, {v3}, {v3, v5}} and Bα1,n = {∅, {vn+3}}
for n ≥ 3. It is easily checked that the given family is complete for α,
and we see that for n ≥ 3 the only possible filter in Bα1,n is {{vn+3}}.
Since in a complete family each filter determines uniquely the ones that
come before it, this establishes the desired uniqueness (for instance,
20
G. BOAVA, G. DE CASTRO, AND F. MORTARI
F 2 = {A ∈ Bα1,2 : r(A, a3) ∈ F 3} and, since r({v3}, a3) = ∅, then
F 2 = {{v3, v5}}. Similarly, the only possibility for F 1 is {{v2, v4}}).
By Proposition 5.3, we obtain an ultrafilter ξα on E(S) such that
ξn = F n for all n; however, ξ2 = {{v3, v5}} is not an ultrafilter on Bα1,2
because it is contained in the filter {{v3}, {v3, v5}}.
On the other hand, if we assume that the family B is closed under
relative complements, that is, for every A, B ∈ B one has A \ B ∈ B,
then the situation described in the previous example does not occur
and,
in view of this, we assume from now on that the accommo-
dating family B of the labelled space (E, L, B) is closed under rela-
tive complements; this ensures in particular that B = Bω is a gen-
eralized Boolean algebra, Bα is a Boolean algebra for α ∈ L≥1 and
r(A\ B, β) = r(A, β)\ r(B, β) for β ∈ L∗, see Remark 2.11 and Lemma
2.12. We recall this hypothesis was already used by Bates, Pask and
Willis in [4], and Bates, Carlsen and Pask in [1].
Proposition 5.7. Suppose the accommodating family B is closed
under relative complements and let ξα be a filter in E(S). If ξn is an
ultrafilter for n with 0 < n ≤ α, then ξm is an ultrafilter for every
0 < m < n. If furthermore ξ0 is nonempty, then ξ0 is also an ultrafilter.
Proof. Fix 0 < m < n and consider the relative range func-
tion, r( · , αm+1,n) : Bα1,m −→ Bα1,n. The fact that Bα1,m and Bα1,n
are Boolean algebras and r( · , αm+1,n) is a morphism of Boolean al-
gebras ensures that the inverse image of an ultrafilter in Bα1,n under
r( · , αm+1,n) is an ultrafilter in Bα1,m. By the definition of ξm and ξn,
we see that ξm is the inverse image of ξn; thus, if ξn is an ultrafilter,
then ξm is an ultrafilter.
Now, suppose that ξn is an ultrafilter and ξ0 6= ∅. We will show
that ξ0 satisfies Proposition 2.16 and will use Proposition 2.17 to char-
acterize ξn. Let C ∈ B be such that C ∩ B 6= ∅ for all B ∈ ξ0 and
fix any A ∈ ξ0. By the condition of C, A \ C does not belong to ξ0.
This says that r(A, α1,n) ∈ ξn and r(A \ C, α1,n) /∈ ξn. Thus, using the
notation Dc = r(α1,n) \ D,
r(A \ C, α1,n) /∈ ξn ⇒ r(A, α1,n) \ r(C, α1,n) /∈ ξn
⇒ r(A, α1,n) ∩ r(C, α1,n)c /∈ ξn
⇒ r(A, α1,n)c ∪ r(C, α1,n) ∈ ξn
⇒ r(A, α1,n) ∩ (r(A, α1,n)c ∪ r(C, α1,n)) ∈ ξn
⇒ r(A, α1,n) ∩ r(C, α1,n) ∈ ξn
⇒ r(C, α1,n) ∈ ξn
⇒ C ∈ ξ0.
(by 2.17)
This shows that ξ0 is an ultrafilter.
(cid:3)
INVERSE SEMIGROUPS AND LABELLED SPACES
21
Remark 5.8. Let ξα be an ultrafilter as in Proposition 5.4. If the
accommodating family B is closed under relative complements, then
the previous proposition applies and therefore ξn is an ultrafilter for all
0 ≤ n ≤ α (except, possibly, for n = 0).
Proposition 5.9. Suppose the accommodating family B is closed
under relative complements and let ξα be a filter of infinite type. Then
ξα is an ultrafilter if and on if ξn is an ultrafilter for every n > 0 and
ξ0 is either an ultrafilter or the empty set.
Proof. The "if" part is obvious, so assume ξα is an ultrafilter and
fix n > 0. Let A ∈ Bα1,n be such that Ac = r(α1,n) \ A does not
belong to ξn. By using the characterization given by Proposition 2.17
for ultrafilters in Boolean algebras, it suffices to verify that A ∈ ξn to
show that ξn is an ultrafilter.
Since p = (α1,n, Ac, α1,n) /∈ ξα and ξα is an ultrafilter, it follows from
Proposition 2.16 that there exists q = (α1,m, B, α1,m) ∈ ξα such that
pq = 0. There are three cases to consider: if m = n, then B ∩ Ac = ∅,
which would give B ⊆ A and thus A ∈ ξn, since ξn is a filter. The
case m < n is analogous using q = (α1,n, r(B, αm+1,n), α1,n) instead of
q, and the case m > n follows by using p = (α1,m, r(Ac, αn+1,m), α1,m)
instead of p to obtain that r(A, αn+1,m) ∈ ξm, and therefore A ∈ ξn.
This shows that ξn is an ultrafilter for n > 0.
The case n = 0 follows from Proposition 5.7.
(cid:3)
The results of this section therefore give the following description
of the ultrafilters in E(S).
Theorem 5.10. Let (E, L, B) be a labelled space which is weakly
left resolving, and let S be its associated inverse semigroup. Then the
ultrafilters in E(S) are:
(i) The filters of finite type ξα such that ξα is an ultrafilter in Bα
and for each b ∈ A there exists A ∈ ξα such that r(A, b) = ∅.
(ii) The filters of infinite type ξα such that the family {ξn}n≥0 is max-
imal among all complete families for α.
Suppose in addition that the accommodating family B is closed under
relative complements. Then (ii) can be replaced with
(ii)' The filters of infinite type ξα such that ξn is an ultrafilter for
every n > 0 and ξ0 is either an ultrafilter or the empty set.
Remark 5.11. When the accommodating family B is closed under
relative complements, we can use Proposition 5.7 to conclude that a
filter ξα of infinite type is an ultrafilter if and only for every n ∈ N
there exists m ≥ n such that ξm is an ultrafilter.
22
G. BOAVA, G. DE CASTRO, AND F. MORTARI
6. Tight Filters in E(S)
Let Ftight be the set of all tight filters in E(S).
If we give to it
the topology induced from the topology of pointwise convergence of
characters, via the bijection between tight characters and tight filters
given after Definition 2.20, it follows that Ftight is (homeomorphic to)
the tight spectrum of E(S).
Now we characterize the tight filters in E(S), a goal that is accom-
plished with Theorem 6.7. From now on the accommodating family
B is required to be closed under relative complements, as above. We
begin with some auxiliary results.
Proposition 6.1. Suppose the accommodating family B is closed
under relative complements and let ξα be a tight filter in E(S). Then,
for every 0 ≤ n ≤ α, ξn is an ultrafilter in Bα1,n (ξ0 may also be the
empty set).
Proof. Fix n > 0 and suppose ξn is not an ultrafilter. There exists
then A ∈ Bα1,n such that A and Ac = r(α1,n) \ A does not belong to
ξn.
Let p = (α1,n, r(α1,n), α1,n), Z = {(α1,n, A, α1,n), (α1,n, Ac, α1,n)}
and note that p ∈ ξα and Z is a cover for p; indeed, for every q ≤ p, we
must have q = (α1,nβ, B, α1,nβ) for some β ∈ L∗ and some B ∈ Bα1,nβ.
Since B ⊆ r(α1,nβ) = r(A, β) ∪ r(Ac, β), then B ∩ r(A, β) 6= ∅ or B ∩
r(Ac, β) 6= ∅ and, therefore, q · (α1,n, A, α1,n) 6= 0 or q · (α1,n, Ac, α1,n) 6=
0. This shows Z is a cover for p. Since Z ∩ ξα = ∅, we see that ξα is
not tight (see Proposition 2.22), a contradiction.
Now suppose ξ0 is nonempty and not an ultrafilter. By Proposition
2.16, there is A ∈ B such that A /∈ ξ0 and A ∩ B 6= ∅ for all B ∈ ξ0.
Fix any B ∈ ξ0 and define p = (ω, B, ω) and
Z = {(ω, B ∩ A, ω), (ω, B \ A, ω)}.
An argument similar to the one used above shows that Z is a cover
for p. Since p ∈ ξα and Z ∩ ξα = ∅ (because B ∩ A ⊆ A /∈ ξ0 and
A ∩ (B \ A) = ∅), it follows that ξα is not tight, again a contradiction
and the result is proved.
(cid:3)
Corollary 6.2. Suppose the accommodating family B is closed
under relative complements and let ξ be a filter of infinite type. Then
ξ is tight if and only if ξ is an ultrafilter.
Proof. This follows from Propositions 6.1, 2.21 and Theorem 5.10.
(cid:3)
INVERSE SEMIGROUPS AND LABELLED SPACES
23
Corollary 6.3. Suppose the accommodating family B is closed
under relative complements and let ξα be a filter of finite type. If ξα
is not an ultrafilter, then ξα is not tight.
Proof. Obvious from Proposition 6.1.
Before stating our main theorem, for each α ∈ L∗ recall from Re-
(cid:3)
mark 2.11 that
Xα = {F ⊆ Bα F is an ultrafilter in Bα}
and also define
X sink
α = {F ∈ Xα ∀ b ∈ A, ∃ A ∈ F such that r(A, b) = ∅}.
Observe that X sink
Remark 5.5.
α
can be defined in many equivalent ways, using
Suppose the accommodating family B to be closed under relative
complements. In this case, for every α, β ∈ L≥1 such that αβ ∈ L≥1,
the map r( · , β) : Bα −→ Bαβ is a morphism of Boolean algebras and,
: Xαβ −→ Xα given by
therefore, we have its dual morphism fα[β]
fα[β](F ) = {A ∈ Bα r(A, β) ∈ F} (this is just the inverse image of
F under r( · , β)), as in the proof of Proposition 5.7. When α = ω, if
F ∈ Bβ then {A ∈ B r(A, β) ∈ F} is either an ultrafilter in B = Bω or
the empty set, and we can therefore consider fω[β] : Xβ −→ Xω ∪ {∅}.
Employing this new notation, if ξα is a filter in E(S) and 0 ≤ m <
n ≤ α, then ξm = fα1,m[αm+1,n](ξn).
If we endow the sets Xα with the topology given by the convergence
of filters stated at the end of Section 2.2 (this is the pointwise conver-
gence of characters), it is clear that the functions fα[β] are continuous.
Furthermore, it is easy to see that fα[βγ] = fα[β] ◦ fαβ[γ].
Corollary 6.2 says there are no tight filters other than the ultrafilters
among the filters of infinite type. The next result classifies the tight
filters of finite type.
Proposition 6.4. Suppose the accommodating family B to be closed
under relative complements and let ξα be a filter of finite type. Then
ξα is a tight filter if and only if ξα is an ultrafilter and at least one of
the following conditions hold:
(a) There is a net {F λ}λ∈Λ ⊆ X sink
(b) There is a net {(tλ, F λ)}λ∈Λ, where tλ is a letter in A and F λ ∈
Xαtλ for each λ ∈ Λ, such that {fα[tλ](F λ)}λ∈Λ converges to ξα
and for every b ∈ A there is λb ∈ Λ such that tλ 6= b for all λ ≥ λb.
converging to ξα.
α
Proof. We show the "if" part first. Suppose that ξα is an ultrafil-
ter and that (a) holds. For each λ ∈ Λ, consider the filter ηλ associated
24
G. BOAVA, G. DE CASTRO, AND F. MORTARI
with the pair (α, F λ) (see Proposition 4.3). By Theorem 5.10, {ηλ}λ∈Λ
is a net of ultrafilters in F. Furthermore, since {ηλ
α}λ∈Λ converges to
ξα in Xα and the functions fα1,m[αm+1,α] are continuous, then {ηλ
m}λ∈Λ
converges to ξm for every 0 ≤ m ≤ α. From this, it is easy to see that
{ηλ}λ∈Λ converges to ξα, whence ξα is tight, by Theorem 2.24.
Now, suppose that ξα is an ultrafilter and that (b) holds. For
each λ ∈ Λ, consider an ultrafilter ηλ containing the filter associated
with the pair (αtλ, F λ) and observe that ηλ
α+1 = F λ. We claim that
{ηλ}λ∈Λ converges to ξα. To see this, take (β, B, β) ∈ E(S). We divide
the proof in three cases.
Case 1: Suppose β is a beginning of (or equal to) α. In this case, β =
α1,m for some m ≤ α. Since {ηλ
α+1)}λ∈Λ converges
to ξα and fα1,m[αm+1,α] is continuous, then {ηλ
m}λ∈Λ converges to ξm.
From this, it is easy to see there is λ0 ∈ Λ such that for every λ ≥ λ0,
(β, B, β) ∈ ηλ if and only if (β, B, β) ∈ ξα.
Case 2: Suppose β and α are not comparable. In this case, (β, B, β) /∈
ξα and (β, B, β) /∈ ηλ for all λ ∈ Λ.
Case 3: Suppose α is a beginning of (and not equal to) β. Write β = αγ
and denote by b the first letter of γ. By (b), we can choose λb ∈ Λ
such that tλ 6= b for all λ ≥ λb. This says that (β, B, β) /∈ ηλ if λ ≥ λb.
Since (β, B, β) /∈ ξα, we are done.
α}λ∈Λ = {fα[tλ](ηλ
Now, for "only if" side: suppose ξα is a tight filter. By Corollary
6.3, ξα is an ultrafilter in Bα. By Theorem 2.24, we can choose a net
{ηλ}λ∈Λ of ultrafilters in E(S) which converges to ξα. Consider the
following disjoint subsets of Λ:
Λ1 = {λ ∈ Λ the word of ηλ is a beginning of (and not equal to) α},
Λ2 = {λ ∈ Λ the word of ηλ is equal to α},
Λ3 = {λ ∈ Λ α is a beginning of (and not equal to) the word of ηλ},
Λ4 = {λ ∈ Λ the word of ηλ is not comparable with α}.
α}λ∈Λ2 is a net in X sink
α
Because {ηλ}λ∈Λ converges to ξα, Λ1 and Λ4 cannot be cofinal subsets of
Λ. Since Λ = Λ1 ∪Λ2 ∪Λ3 ∪Λ4, then Λ2 or Λ3 are cofinal. If Λ2 is cofinal
then, by Theorem 5.10, {ηλ
. Furthermore, it is
clear that {ηλ
α}λ∈Λ2 converges to ξα, establishing (a). If Λ3 is cofinal,
denote by tλ the first letter after α in the word of ηλ, for each λ ∈ Λ3.
Thus, {(tλ, ηλ
α+1 ∈ Xαtλ. Since {ηλ}λ∈Λ3
converges to ξα, then {fα[tλ](ηλ
α}λ∈Λ3 converges to ξα.
This establishes the first part of (b).
α+1)}λ∈Λ3 is a net such that ηλ
α+1)}λ∈Λ3 = {ηλ
Finally, let b ∈ A be given. If αb is not a labelled path, then tλ 6= b
for every λ ∈ Λ3. If αb is a labelled path, then (αb, r(αb), αb) ∈ E(S) is
INVERSE SEMIGROUPS AND LABELLED SPACES
25
such that (αb, r(αb), αb) /∈ ξα. By the definition of convergence, there
exists λb ∈ Λ3 such that (αb, r(αb), αb) /∈ ηλ for all λ ≥ λb, which is
equivalent to tλ 6= b for all λ ≥ λb. This completes (b).
(cid:3)
Remark 6.5. The following conditions are easily seen to be equiv-
alent (and therefore condition (b) in the above result can be replaced
with its equivalent formulation below):
(i) There is a net {(tλ, F λ)}λ∈Λ, where tλ is a letter in A and F λ ∈
Xαtλ for each λ ∈ Λ, such that {fα[tλ](F λ)}λ∈Λ converges to ξα
and for every b ∈ A there is λb ∈ Λ such that tλ 6= b for all λ ≥ λb.
(ii) There is a net {(βλ, F λ)}λ∈Λ, where βλ is a word in L≥1 and
F λ ∈ Xαβλ for each λ ∈ Λ, such that {fα[βλ](F λ)}λ∈Λ converges
to ξα and for every γ ∈ L≥1 there is λγ ∈ Λ such that βλ and γ
are not comparable for all λ ≥ λb.
Furthermore, if we give A the discrete topology, the condition "for
every b ∈ A there is λb ∈ Λ such that tλ 6= b for all λ ≥ λb" is the same
as saying the net {tλ}λ∈Λ ⊆ A converges to infinity.
The next result gives a more algebraic description for the tight
filters of finite type in E(S).
Proposition 6.6. Suppose the accommodating family B is closed
under relative complements and let ξα be a filter of finite type. Then ξα
is a tight filter if and only if ξα is an ultrafilter and for each A ∈ ξα
at least one of the following conditions hold:
(a) L(AE1) given by (2.1) is infinite.
(b) There exists B ∈ Bα such that ∅ 6= B ⊆ A ∩ E0
sink.
α
α
sink.
Proof. Let ξα be a tight filter as in part (a) of Proposition 6.4
and A ∈ ξα be given. If L(AE1) is infinite there is nothing to prove.
Suppose then that L(AE1) is finite. Since A ∈ ξα there exists λ such
, for each b ∈ L(AE1)
that A ∈ F λ ∈ X sink
there exists Cb ∈ F λ such that r(Cb, b) = ∅. Since L(AE1) is finite,
if C is the intersection of all such Cb then C ∈ F λ.
It follows that
r(A ∩ C, b) = ∅ for all b ∈ A and hence A ∩ C ⊆ E0
sink. Defining
B = A ∩ C, we have that B ∈ F λ so that B ∈ Bα and clearly ∅ 6= B ⊆
A ∩ E0
. By the definition of X sink
Now let ξα be a tight filter as in part (b) of Proposition 6.4 and
A ∈ ξα be given. There exists λ0 such that A ∈ fα[tλ](F λ) for all
λ ≥ λ0. That means that r(A, tλ) 6= ∅ for all λ ≥ λ0. Observe that
there are infinitely many different letters in the set of all tλ for λ ≥ λ0.
It follows that L(AE1) is infinite.
26
G. BOAVA, G. DE CASTRO, AND F. MORTARI
For the converse, we use Proposition 2.22, and observe it is enough
to consider x ∈ ξα of the form x = (α, A, α): indeed, if x = (α′, A, α′) ∈
ξα and Z is a finite cover for x observe that α = α′α′′; if we define
x′ = (α, r(A, α′′), α) and Z ′ = {zx′ z ∈ Z} \ {0} (which is a finite
cover for x′), it is easy to see that if Z ′ ∩ ξα 6= ∅ then Z ∩ ξα 6= ∅.
Consider therefore x = (α, A, α) ∈ ξα and le Z be a finite cover for
x. We claim that there exists ∅ 6= D ∈ Bα such that (α, D, α) ∈ Z.
Indeed, if L(AE1) is infinite then there are infinitely many elements of
the form yi = (αbi, r(A, bi), αbi) with distinct bi's in ↓x. For each yi
there exists z = (αβ, C, αβ) ∈ Z such that yiz 6= 0. Since Z is finite
and αβ and αbi are comparable, there must exist (α, D, α) ∈ Z for
some ∅ 6= D ∈ Bα. If there exists B ∈ Bα such that ∅ 6= B ⊆ A ∩ E0
sink
then y = (α, B, α) ∈ ↓x. Since B ⊆ E0
sink, for an element of Z to
intersect y it has to be of the form (α, D, α) ∈ Z for some ∅ 6= D ∈ Bα.
Now let D1, . . . , Dn be all the sets in Bα such that (α, Di, α) ∈ Z.
As we have seen above, n ≥ 1. Observe that D1 ∪ · · · ∪ Dn ∈ ξα.
If not, since ξα is an ultrafilter there would exist C ∈ ξα such that
C ∩ (D1 ∪ · · · ∪ Dn ∈ ξα) = ∅. Now A ∩ C ∈ ξα so that it satisfies (a)
or (b). Arguing as above it can be shown that there exists D such that
(α, D, α) is in Z and intersects (α, A ∩ C, α) which is a contradiction.
Since ξα is an ultrafilter, it is a prime filter so that Di ∈ ξα for some
i = 1, . . . , n. It follows that ξα ∩ Z 6= ∅.
(cid:3)
Note that, in using the proposition above, it is enough to verify
condition (b) only in the case L(AE1) is finite.
Joining Corollary 6.2 and the previous proposition, we get the main
result of this section.
Theorem 6.7. Let (E, L, B) be a labelled space which is weakly left
resolving and whose accommodating family B is closed under relative
complements, and let S be its associated inverse semigroup. Then the
tight filters in E(S) are:
(i) The ultrafilters of infinite type.
(ii) The filters of finite type ξα such that ξα is an ultrafilter in Bα
and for each A ∈ ξα at least one of the following conditions hold:
(a) L(AE1) is infinite.
(b) There exists B ∈ Bα such that ∅ 6= B ⊆ A ∩ E0
sink.
Example 6.8. Let E = (E0, E1, r, s) be any graph and define a la-
belled graph by setting A = E1 and L : A → E1 the identity map.
Let B be the sets of all finite subsets of E0, then B is an accommo-
dating family for (E, L) that is closed under relative complements. We
INVERSE SEMIGROUPS AND LABELLED SPACES
27
prove that for the labelled space (E, L, B), Ftight is homeomorphic to
the boundary path space of the graph ∂E as in [13].
Recall that ∂E = E∞ ∪ {λ ∈ E∗ r(λ) is singular}. On E∗ ∪ E∞ we
give the initial topology induced by the map θ : E∗ ∪ E∞ → {0, 1}E∗
defined by θ(λ)(µ) = 1 if µ is a beginning of λ and 0 otherwise. We
then give the subspace topology on ∂E.
Now, observe that for α ∈ L≥1, Bα = {∅, r(α)} so that it admits
only one ultrafilter, which is {r(α)}. And in Bω = B the ultrafilters
are exactly the principal filters ↑B{v} where v ∈ E0. It follows that for
each α ∈ L≥1 ∪ L∞ there is only one filter ξ in E with word α. For the
empty word the filters ξω such that ξ0 is an ultrafilter are in a bijective
correspondence with vertices v ∈ E0.
By Theorem 6.7 we see that the tight filters are those associated
with an infinite word α ∈ L∞, those associated with α ∈ L≥1 such
that r(α) is singular or ξω where ξ0 is the principal filter generated
by a singular vertex. It follows that there is a bijection between Ftight
and ∂E which is a homeomorphism since both topologies are essentially
given by pointwise convergence.
Proposition 6.9. Let (E, L) be a left resolving labelled graph such
that E0 is a finite set and let B = P(E0). Then the tight spectrum Ftight
of the labelled space (E, L, B) is homeomorphic to the boundary path
space ∂E of the graph E.
n = ↑Bα1,n
Proof. Let λ = λ1λ2 · · · λm be a finite path in ∂E, set α = L(λ)
and, for each 0 ≤ n ≤ m, let ξα
{r(λn)} (which for the given
accomodating family means simply the set of all subsets of r(α1,n)
that contain the element r(λn)). When n = 0, we set λ0 = s(λ).
Similarly, if λ = λ1λ2 · · · is an infinite path in ∂E, set α = L(λ) and
let ξα
n = ↑Bα1,n {r(λn)} for n ≥ 0. In both cases, we can consider the
pair (α, {ξα
n }n≥0) associated with λ.
We claim that {ξα
(with n < λ if λ is finite) and let A ∈ ξα
r(λn+1) ∈ r(A, αn+1), hence
n }n≥0 is a complete family for α. Indeed, fix n ≥ 0
n . Since r(λn) ∈ A, then
ξα
n ⊆ {A ∈ Bα1,n r(A, αn+1) ∈ ξα
n+1}.
On the other hand, let A ∈ Bα1,n be such that r(A, αn+1) ∈ ξα
n+1.
Therefore there exists v ∈ A and e ∈ E1 such that s(e) = v, r(v) =
r(λn+1) and L(e) = αn+1. The labelled graph is left resolving, so we
must have e = λn+1. This says r(λn) = s(λn+1) = v ∈ A, showing that
{A ∈ Bα1,n r(A, αn+1) ∈ ξα
n+1} ⊆ ξα
n
28
G. BOAVA, G. DE CASTRO, AND F. MORTARI
and that the family {ξα
that ξα
n is an ultrafilter in Bα1,n for all n.
n }n≥0 is complete for α, as claimed. Also, observe
n }n≥0).
Let ξα be the filter in E(S) associated with the pair (α, {ξα
We show next that ξα is tight. There are three cases to consider.
Case 1: λ is an infinite path. In this case, ξα is a filter of infinite type
and it is clear that it is an ultrafilter. It follows from Theorem 6.7 that
ξα is tight.
Case 2: λ is a finite path and s−1(r(λ)) is an infinite set. In this case,
ξα is a filter of finite type. Let A ∈ ξα
α. Using that r(λ) ∈ A, that
the labelled graph is left resolving and that E0 is finite, we see that
L(AE1) = ∞. It follows that ξα is tight, by Theorem 6.7.
Case 3: λ is a finite path and r(λ) ∈ E0
finite type. For every A ∈ ξα
and ∅ 6= B ⊆ A ∩ E0
sink. In this case, ξα is a filter of
α, letting B = {r(λ)} we have that B ∈ B
sink. Again Theorem 6.7 ensures ξα is tight.
We can thus define
Φ : ∂E −→ Ftight
λ 7−→ ξα
.
By construction, Φ is clearly injective. Let us show surjectivity:
let
ξα ∈ Ftight. For each n ≥ 0 (with n ≤ α if ξα is of finite type)
the set r(α1,n) is finite, and thus all ultrafilters in Bα1,n = P(r(α1,n))
are principal; in particular, there exists vn ∈ r(α1,n) such that ξα
n =
↑Bα1,n
{vn}.
Observe that for each n ≥ 1, there exists a unique λn ∈ E1 such that
s(λ) = vn−1, r(λn) = vn and L(λ) = αn. Indeed, using that {ξα
n }n≥0
is a complete family, we must have r({vn−1}, αn) ∈ ξα
n . Hence, there
is λn ∈ E1 such that s(λ) = vn−1, r(λn) = vn and L(λ) = αn. The
uniqueness of λn follows from the fact that the labelled graph is left
resolving.
Thus, we have constructed a path λ = λ1λ2 · · · such that L(λ) = α.
Let us see that λ ∈ ∂E: if α = ∞, there is nothing to do. Suppose
If L(AE1) = ∞, then
α < ∞ and consider A = {r(λ)} = {vα}.
If L(AE1) < ∞, then
s−1(r(λ)) is clearly infinite, whence λ ∈ ∂E.
there is B ∈ B such that ∅ 6= B ⊆ A ∩ E0
sink. Since A is unitary, that
means B = A = {r(λ)} and r(λ) ∈ E0
sink, which shows that λ ∈ ∂E.
By construction, we have Φ(λ) = ξα, establishing that Φ is a bijection.
To see that Φ is a homeomorphism, observe that under the condi-
tions stated above, a net {ξ(j)}j∈J converges to ξ in Ftight if and only if
for all (β, {v}, β) ∈ E(S), there exists j0 ∈ J such that for all j ≥ j0,
(β, {v}, β) ∈ ξ(j) ⇐⇒ (β, {v}, β) ∈ ξ.
INVERSE SEMIGROUPS AND LABELLED SPACES
29
Also observe that a net {λ(j)}j∈J in ∂E converges to λ ∈ ∂E if and
only if for all µ ∈ E∗ there exists j0 ∈ J such that for all j ≥ j0, λi
begins with µ if and only if λ begins with µ (see example 6.8 above).
In the same way as was done above, the map between E∗ and
the set {(β, A, β) ∈ E(S) A = {v} is singleton} given by λ 7→
(L(λ), {r(λ)}, L(λ)) is a bijection. From these observations, it is not
hard to see that Φ is a homeomorphism.
(cid:3)
Example 6.10. This example shows that, under the hypotheses
of the previous result, if we consider an accommodating family other
than P(E0) then the boundary path space of the graph may no longer
be identified with the tight spectrum as was done in the proof above.
For instance, consider the labelled graph below:
2
a
a
1
a
a
3
4
It is readily verified that
B = {∅, {1}, {3}, {1, 3}, {2, 4}, {1, 2, 4}, {2, 3, 4}, {1, 2, 3, 4}}
is an accommodating family for the given labelled graph, that is closed
under relative complements, and that the resulting labelled space is
weakly left resolving (indeed, the labelled graph is left resolving, even).
We can see that for each n ≥ 0, the boundary path space of the
underlying graph has two elements of length n. Let us show that, for
the only labelled path of length n, there is a single tight filter associated
with it.
Note that the only ultrafilters in B are G1 = ↑B{1}, G2 = ↑B{2, 4}
and G3 = ↑B{3}. Also, r(α) = E0 and therefore Bα = B for all α ∈ L∗.
Finally, for n ≥ 0 observe that
fan[a](G1) = G2, fan[a](G2) = G1, fan[a](G3) = G1.
From this and using Theorem 6.7, we see that the tight filters for
this labelled space are classified as follows:
There are two ultrafilters of infinite type. The first is associated
with the complete family {F n}n where F n equals G1 if n is odd and
G2 if n is even. The second ultrafilter is the opposite: F n equals G1 if
n is even and G2 if n is odd.
There is a single tight filter for each α ∈ L∗. This happens for
two reasons: first, condition (ii)(a) of Theorem 6.7 does not occur here
30
G. BOAVA, G. DE CASTRO, AND F. MORTARI
since the alphabet A consists of a single letter; second, G3 is the only
ultrafilter in B that satisfies condition (ii)(b).
Thus, a filter ξα in E(S) is tight if and only if ξα = G 3. Addition-
ally, if α = n + 1 (that is, α = an+1) with n ≥ 0 then for each k ≤ n
we have that
ξk = (cid:26) G1,
G2,
if n and k have different parities,
if n and k have the same parity.
The forced relations between the ultrafilters that produce the com-
plete families can be seen with the following directed graph, (where the
arrows indicate maps of type far[a], r ≥ 0):
G2
G1
G3
Example 6.11. In this example, we show that the tight spectrum
of a labelled space does not depend only on its labelled paths. Consider
the two labelled graphs (E1, L1) and (E2, L2) given respectively by
1
v1
0
0
v2
and
1
0
0
v2
v1
1
v3
0
It is easy to see that both labelled graphs produce the same la-
belled paths. As accommodating families for each, choose B1 = P(E0
1)
and B2 = P(E0
2), respectively. Proposition 6.9 says the tight spec-
tra of (E1, L1, B1) and (E2, L2, B2) are homeomorphic to ∂E1 and ∂E2,
respectively.
However, ∂E1 has no isolated points, as can be readily verified,
whereas the infinite path determined by the loop at vertex v3 is an
isolated point for ∂E2; therefore, they are not homeomorphic.
References
[1] T. Bates, T. Meier Carlsen, and D. Pask. C ∗-algebras of labelled graphs III -
K-theory computations. ArXiv e-prints, Mar. 2012.
[2] T. Bates and D. Pask. C ∗-algebras of labelled graphs. J. Operator Theory,
57(1):207 -- 226, 2007.
INVERSE SEMIGROUPS AND LABELLED SPACES
31
[3] T. Bates and D. Pask. C ∗-algebras of labelled graphs. II. Simplicity results.
Math. Scand., 104(2):249 -- 274, 2009.
[4] T. Bates, D. Pask, and P. Willis. Group actions on labeled graphs and their
C*-algebras. ArXiv e-prints, June 2011.
[5] S. Burris and H. P. Sankappanavar. A course in universal algebra, volume 78
of Graduate Texts in Mathematics. Springer-Verlag, New York-Berlin, 1981.
[6] H. P. Doctor. The categories of Boolean lattices, Boolean rings and Boolean
spaces. Canad. Math. Bull., 7:245 -- 252, 1964.
[7] R. Exel. Inverse semigroups and combinatorial C ∗-algebras. Bull. Braz. Math.
Soc. (N.S.), 39(2):191 -- 313, 2008.
[8] C. Farthing, P. S. Muhly, and T. Yeend. Higher-rank graph C ∗-algebras: an
inverse semigroup and groupoid approach. Semigroup Forum, 71(2):159 -- 187,
2005.
[9] A. E. Marrero and P. S. Muhly. Groupoid and inverse semigroup presentations
of ultragraph C ∗-algebras. Semigroup Forum, 77(3):399 -- 422, 2008.
[10] A. L. T. Paterson. Graph inverse semigroups, groupoids and their C ∗-algebras.
J. Operator Theory, 48(3, suppl.):645 -- 662, 2002.
[11] J. Renault. A groupoid approach to C ∗-algebras, volume 793 of Lecture Notes
in Mathematics. Springer, Berlin, 1980.
[12] M. H. Stone. Postulates for Boolean Algebras and Generalized Boolean Alge-
bras. Amer. J. Math., 57(4):703 -- 732, 1935.
[13] S. B. G. Webster. The path space of a directed graph. Proc. Amer. Math. Soc.,
142(1):213 -- 225, 2014.
Departamento de Matem´atica, Universidade Federal de Santa Cata-
rina, 88040-970 Florian´opolis SC, Brazil.
E-mail address: [email protected], [email protected],
[email protected]
|
1002.2752 | 2 | 1002 | 2010-06-16T19:55:31 | An octonion algebra originating in combinatorics | [
"math.RA",
"math.CO"
] | C.H. Yang discovered a polynomial version of the classical Lagrange identity expressing the product of two sums of four squares as another sum of four squares. He used it to give short proofs of some important theorems on composition of delta-codes (now known as T-sequences). We investigate the possible new versions of his polynomial Lagrange identity. Our main result shows that all such identities are equivalent to each other. | math.RA | math |
AN OCTONION ALGEBRA ORIGINATING IN
COMBINATORICS
DRAGOMIR Z. D -- OKOVI ´C AND KAIMING ZHAO
Abstract. C.H. Yang discovered a polynomial version of the clas-
sical Lagrange identity expressing the product of two sums of four
squares as another sum of four squares. He used it to give short
proofs of some important theorems on composition of δ-codes (now
known as T -sequences). We investigate the possible new versions
of his polynomial Lagrange identity. Our main result shows that
all such identities are equivalent to each other.
2000 Mathematics Subject Classification 17A75, 05B30
1. Introduction
C.H. Yang [8, 9, 10] discovered a polynomial version (see below)
of the classical Lagrange identity on the product of two sums of four
squares. He used his identity to give short and elegant proofs of some
important theorems [10] in combinatorics of binary and ternary se-
quences. These results provide new methods for the construction of
several classes of combinatorial objects such as T -sequences, orthogo-
nal designs, and Hadamard matrices [6, 10]. Our motivation and the
main goal was to investigate the possible new versions of the polyno-
mial Lagrange identity. However, our main result shows that all such
identities are equivalent to each other (for the precise statement see
Theorem 4.1).
Let A = Z[z, z−1] be the Laurent polynomial ring over the integers
Z. For any f = f (z) = Pk akzk ∈ A, ak ∈ Z, we define its conjugate
as f ∗ = f (z−1). We also say that a0 is the constant term of f and write
CT(f ) = a0. Note that CT(f f ∗) = Pk a2
k. Let A0 be the fixed subring
of A under the conjugation, i.e., A0 = {f ∈ A f = f ∗}. It is easy to
see that A0 = Z[z + z−1]. We embed the polynomial ring Z[t] into A by
sending t → z + z−1 and view A as a Z[t]-algebra. It is easy to check
that A = A0 ⊕ A0z. Thus A is a free Z[t]-module of rank 2.
Key words and phrases. Laurent polynomial ring, polynomial Lagrange identity,
octonion algebra, composition algebra.
The first author was supported by an NSERC Discovery Grant, and the second
by the NSERC and the NSF of China (Grant 10871192).
1
2
D.Z. D -- OKOVI ´C AND K. ZHAO
We are mainly interested in the free A-module E = A4. When
viewed as a Z[t]-module it is again free but now its rank is 8. For any
x = (x0, x1, x2, x3) ∈ E we define its norm as N(x) = Pk xkx∗
k. Thus
N : E → A0 is a quadratic form on the A0-module E.
Now we state the Lagrange identity for Laurent polynomials (mod-
ified Theorem 1 in [10]). Let x = (xk), y = (yk) ∈ E and define
(p, q, r, s) ∈ E by Yang's formulae:
p = x0y0 − x1y∗
q = x0y1 + x1y∗
1y∗
r = x0y2 − x∗
s = x0y3 + x∗
1y∗
1 − x2y∗
2y∗
0 + x∗
3 + x2y∗
2 − x∗
2y∗
2 − x3y∗
3,
3y∗
3 − x∗
2,
3y∗
0 + x∗
1,
1 + x3y∗
0.
We can use these formulae to define an A0-bilinear multiplication "◦"
on E by x ◦ y = (p, q, r, s).
It is straightforward to verify that the
Lagrange identity N(x ◦ y) = N(x)N(y) is indeed valid.
We shall see in the next section that (E, ◦) is in fact an octonion
algebra over Z[t]. In Section 3 we give an explicit description of the
orthogonal group O(N) of the pair (E, N), see Theorem 3.4. In Section
4, we show that all A0-bilinear multiplications on E satisfying the La-
grange identity are equivalent, in the sense defined there, to the above
multiplication "◦".
Our main result can probably be generalized by replacing Z with a
more general commutative ring. We decided not to pursue this here in
order to preserve the essentially combinatorial flavour of the original
problem.
We are grateful to the referee for correcting a couple of errors in the
original proof of Lemma 4.3, for giving the stronger result in Theorem
4.3, and for his other detailed comments and suggestions.
2. Yang formulae define an octonion algebra
We make A = Z[z, z−1] into a Z[t]-algebra via the homomorphism
Z[t] → A sending t → z + z−1. We shall often identify Z[t] with its
image A0 under this homomorphism. According to the definition in
[1, Chapter III, §2], A is a quadratic Z[t]-algebra. By using the basis
{1, z}, we see that its type is (−1, t). Indeed we have z2 = −1 + tz.
Moreover, (A, ∗) is an example of a Cayley algebra (see loc. cit.).
Let H = A × A, a free A-module of rank 2. We shall also view it
as a free Z[t]-module of rank 4 with basis (1, 0), (z, 0), (0, 1), (0, z).
We make H into an associative noncommutative algebra by using the
Cayley -- Dickson process, i.e., we define the multiplication in H by
(a, b)(c, d) = (ac − d∗b, bc∗ + da),
a, b, c, d ∈ A.
AN OCTONION ALGEBRA
3
The involution "∗" on A extends to an involutory anti-automorphism
of H by setting
(a, b)∗ = (a∗, −b),
a, b ∈ A.
Thus H is an example of a quaternion algebra over Z[t], see loc. cit.
No. 5, Example 2. As such, it has type (−1, t, −1).
Let E = H × H, a free A-module of rank 4. We shall also view it as
a free Z[t]-module of rank 8 with basis
e0 = (1, 0, 0, 0),
e1 = (0, 1, 0, 0),
e2 = (0, 0, 1, 0),
e3 = (0, 0, 0, 1),
e′
0 = ze0 = (z, 0, 0, 0),
e′
1 = ze1 = (0, z, 0, 0),
e′
2 = ze2 = (0, 0, z, 0),
e′
3 = ze3 = (0, 0, 0, z).
We make E into a nonassociative algebra by using the Cayley -- Dickson
process once more. Thus, we define the multiplication in E by
(u, v)(x, y) = (ux − y∗v, vx∗ + yu),
u, v, x, y ∈ H.
The involution "∗" on H extends to one on E by setting
(u, v)∗ = (u∗, −v),
u, v ∈ H.
Thus E is an example of an octonion algebra over Z[t], see [1, Chapter
III, Appendix]. By using the above basis, we find that the type of this
octonion algebra is (−1, t, −1, −1).
Let us write the above octonion multiplication in terms of the A-
basis {e0, e1, e2, e3}. For x = (x0, x1, x2, x3) and y = (y0, y1, y2, y3), we
find that
1 − x2y∗
0 + x∗
xy = (x0y0 − x1y∗
3y3,
2y3 − x3y∗
x0y1 + x1y∗
2,
0 + x3y∗
x0y2 − x∗
1,
x∗
0y3 + x1y2 − x2y1 + x3y0).
2 − x∗
1y3 + x2y∗
Hence, the map sending (x0, x1, x2, x3) → (x0, x1, x2, x∗
3) is an isomor-
phism of this octonion algebra with the algebra (E, ◦) defined by the
Yang formulae.
3. Orthogonal group
It is obvious that U1 = {x ∈ A xx∗ = 1} is the group of invertible
elements of A. It consists of the elements ±zk, k ∈ Z. In our proofs
below we shall often use the following obvious fact: The subset U1
generates A as an additive group.
4
D.Z. D -- OKOVI ´C AND K. ZHAO
The ring homomorphisms ϕ : A → C are parametrized by nonzero
complex numbers w: By definition, the homomorphism ϕw correspond-
ing to w sends the indeterminate z to w. The homomorphism ϕw is
compatible with the involutions (conjugation on A and complex conju-
gation on C), i.e, ϕw(x∗) = ϕw(x) for all x ∈ A, if and only if w = 1.
The following lemma will be used in the next section.
Lemma 3.1. If m ∈ Z is not a square, then the equation xx∗ = m has
no solution in A.
Proof. Assume that f f ∗ = m for some f ∈ A. By applying the homo-
morphism ϕ1 we obtain f (1)f ∗(1) = m. As f ∗(1) = f (1) ∈ Z, we have
a contradiction.
(cid:3)
We also remark that, for x ∈ A, CT(xx∗) = 0 implies x = 0, and
CT(xx∗) = 1 implies xx∗ = 1.
Denote the general linear group of the A0-module E by GL(A0, E).
We introduce the orthogonal groups
O(N) = {ϕ ∈ GL(A0, E) N(ϕ(u)) = N(u), ∀u ∈ E},
O4(Z) = {ϕ ∈ GL4(Z) N(ϕ(u)) = N(u), ∀u ∈ Z4},
where Z4 is considered as an additive subgroup of E = A4.
Let Q : E × E → A0 be the polar form of N, i.e.,
Q(x, y) = N(x + y) − N(x) − N(y)
=
3
X
k=0
(x∗
kyk + xky∗
k) .
Note that Q is a symmetric A0-bilinear O(N)-invariant form, and that
Q is nondegenerate, i.e., its kernel is 0.
Let us begin with a useful remark.
Remark 3.2. An A0-linear map ϕ : E → E preserving N is automati-
cally bijective, and so ϕ ∈ O(N). Indeed, as Q is nondegenerate, the
injectivity is obvious.
If S is the matrix of Q with respect to some
A0-basis of E, then det(ϕ)2 det(S) = det(S) 6= 0, forcing det(ϕ) = ±1,
and ϕ is bijective.
The following result is crucial to this paper.
Theorem 3.3. (a) The group O4(Z) consists of entry permutations on
Z4 with arbitrary sign changes.
(b) The set U ′
(c) The unit sphere U4 = {x ∈ E N(x) = 1} is equal to ∪3
(d) The sphere U ′
1 = {x ∈ A xx∗ = −(z−z−1)2} is equal to (z−z−1)U1.
k=0U1ek.
4 = {x ∈ E N(x) = −(z − z−1)2} is equal to
(z − z−1)U4.
AN OCTONION ALGEBRA
5
Proof. (a) Fix α ∈ O4(Z). Let α(ei) = Pj aijej where aij ∈ Z. From
1 = N(α(ei)) = Pj a2
ij we see that, for each i, exactly one of aij is ±1
and the other ones vanish. The rest follows easily.
(b) By applying the homomorphisms ϕ±1 to xx∗ = −(z − z−1)2,
we conclude that x is divisible by z − 1 and z + 1, and so we have
x = (z − z−1)y for some y ∈ A. As xx∗ = −(z − z−1)2yy∗, we deduce
that yy∗ = 1, i.e., y ∈ U1.
(c) Suppose x = (x0, x1, x2, x3) ∈ U4. Then P3
k = 1. By
comparing the constant terms, we conclude that exactly one of the xk
belongs to U1 while the other vanish.
k=0 xkx∗
(d) Suppose x = (xk) ∈ U ′
k = 2 − z2 − z−2. Hence
Pk CT(xkx∗
k) = 2, which by the above remark implies that exactly one
of the xks is nonzero. This nonzero component belongs to (z − z−1)U1
by (b).
(cid:3)
4. Then Pk xkx∗
Note that O4(Z) = E16Σ4 is the semidirect product of the elementary
abelian group E16 of order 16 which acts on Z4 by multiplying the
coordinates with ±1 and the symmetric group Σ4 of degree 4 which
permutes the coordinates.
For u = (u0, u1, u2, u3) ∈ U 4
1 we define σu ∈ O(N) by σu(x) = (ukxk),
where x = (xk) ∈ E. Then
(3.1)
T = {σu u ∈ U 4
1 }
is an abelian subgroup of O(N).
Any α ∈ O4(Z) extends uniquely to an A-linear element of O(N),
still denoted by α. Thus we consider O4(Z) as a subgroup of O(N).
Define τ0 ∈ O(N) by τ0(x0, x1, x2, x3) = (x∗
0, x1, x2, x3), and define
similarly τk for k = 1, 2, 3. Let Γ denote the group of order 16 generated
by the τks. The group O(N) admits the following factorization.
Theorem 3.4. O(N) = T Σ4Γ.
Proof. Let ϕ ∈ O(N). Since ϕ(U4) = U4, for any index i there exist
ui ∈ U1 and an index i′ such that ϕ(ei) = uiei′. Since the form Q is
ϕ-invariant, the map i → i′ must be a permutation of {0, 1, 2, 3}.
For any a ∈ A we have a + a∗ ∈ A0 and so
ϕ((a + a∗)ei) = (a + a∗)uiei′.
Now let a ∈ U1, a 6= ±1. Then each of the terms ϕ(aei), ϕ(a∗ei), auiei′
and a∗uiei′ belongs to U4, and the sum of the first two terms is not 0.
It follows that ϕ(aei) is equal to auiei′ or a∗uiei′.
Assume that there exist a, b ∈ U1 different from ±1 such that ϕ(aei)
= auiei′ while ϕ(bei) = b∗uiei′. Then ϕ((a + b)ei) = (a + b∗)uiei′, and
by taking the norms we obtain the contradiction (a − a∗)(b − b∗) = 0.
6
D.Z. D -- OKOVI ´C AND K. ZHAO
Consequently, one of the following two identities: ϕ(aei) = auiei′ or
ϕ(aei) = a∗uiei′ must hold for all a ∈ A. Equivalently, there exists
εi ∈ {0, 1} such that ϕτ εi
i (aei) = auiei′ for all a ∈ A. Let
u = (ui) ∈ U 4
1
and τ =
3
Y
i=0
τ εi
i ∈ Γ.
The composite β = σ−1
u ϕτ is A-linear and we have σ−1
all i. Hence, ϕ = σuβτ with σu ∈ T , β ∈ Σ4 and τ ∈ Γ.
u ϕτ (ei) = ei′ for
(cid:3)
4. Composition algebra structures on E
In this section we determine all A0-bilinear multiplications "·" on E
which satisfy the (polynomial) Lagrange identity
(4.1)
N(x · y) = N(x)N(y).
Since E is a free A0-module of rank 8 and the form Q is nondegenerate,
such algebra (E, ·) will be a composition algebra in the sense of the
definition in [4, p. 305] provided that it has an identity element.
We say that two A0-bilinear multiplications ⋆ and ⋄ are equivalent if
there exist σ1, σ2, τ ∈ O(N) such that x ⋄ y = τ (σ1(x) ⋆ σ2(y)) for all
x, y ∈ E.
The following theorem is our main result.
Theorem 4.1. Any A0-bilinear multiplication "·" on E satisfying the
Lagrange identity (4.1) is equivalent to the multiplication "◦" defined
by Yang's formulae.
Proof. We shall reduce the proof to the special case where e0 is the
identity element of the A0-algebra (E, ·). Then the assertion of the
theorem follows from the next theorem.
Define A0-linear maps L, R : E → E by L(u) = e0 · u and R(u) =
u · e0. The Lagrange identity implies that L and R preserve N. By the
remark 3.2, L, R ∈ O(N).
Next we use a well known argument due to, at least, Kaplansky
[3]. We have N(R−1(x) · L−1(y)) = N(x)N(y) for x, y ∈ E. With
x ⋆ y = R−1(x) · L−1(y), we have
(e0 · e0) ⋆ x = R−1(e0 · e0) · L−1(x) = e0 · L−1(x) = x,
x ⋆ (e0 · e0) = R−1(x) · L−1(e0 · e0) = R−1(x) · e0 = x.
Thus e0 · e0 is the identity element of the algebra (E, ⋆). As e0 · e0 ∈ U4,
we have e0 · e0 = aei for some a ∈ U1 and some index i. Hence, there
exists σ ∈ O(N) such that σ(e0) = e0 · e0. If x ⋄ y = σ−1(σ(x) ⋆ σ(y)),
then e0 is the identity element of the algebra (A, ⋄).
(cid:3)
AN OCTONION ALGEBRA
7
We assume now that e0 is the identity element of (E, ·). Conse-
quently, this is a composition algebra and the alternative laws
(4.2)
x · (x · y) = (x · x) · y,
(x · y) · y = x · (y · y)
are valid [4, p. 306]. The reader should consult this book for additional
properties of composition algebras. We state only a few properties that
we need.
Define the A0-linear map trace T : E → A0 by T (x) = Q(e0, x).
Then for any x ∈ E we have
(4.3)
x · x − T (x)x + N(x)e0 = 0.
Linearizing gives
(4.4)
x · y + y · x = T (x)y + T (y)x − Q(x, y)e0, ∀ x, y ∈ E.
Clearly Ae0 ⊥ A3 with respect to Q, where A3 = Ae1 + Ae2 + Ae3.
Recall that we have extended the conjugation ∗ from A to E in
Section 2. Moreover, note that
(ae0 + v)∗ = a∗e0 − v,
a ∈ A, v ∈ A3.
It is easy to verify that
(4.5)
Q(x, z · y∗) = Q(x · y, z) = Q(y, x∗ · z), ∀x, y, z ∈ E.
The fact that in the next theorem one can assert that the two alge-
bras are actually isomorphic is due to the referee.
Theorem 4.2. Every A0-algebra (E, ·) satisfying the Lagrange identity
(4.1) and having e0 as the identity element is isomorphic to the Yang
algebra (E, ◦).
We shall break the proof into several lemmas. 1
Lemma 4.3. By replacing "·" with an isomorphic multiplication, we
may also assume that
(4.6)
(ae0) · y = ay
for all a ∈ A and y ∈ E.
Proof. Let us fix an index i and b ∈ U1. Then the right multiplication
by bei belongs to O(N), and Theorem 3.4 yields an index j as well as
uj ∈ U1 such that (ae0) · (bei) = ujaej for all a ∈ A or (ae0) · (bei) =
uja∗ej for all a ∈ A. Specializing a to 1 implies that j = i and uj = b,
hence (ae0) · (bei) = abei for all a ∈ A or (ae0) · (bei) = a∗bei for all
a ∈ A.
1For a simpler proof see Section 5.
8
D.Z. D -- OKOVI ´C AND K. ZHAO
Assume that (ae0) · (b1ei) = ab1ei holds for all a ∈ U1 and (ae0) ·
(b2ei) = a∗b2ei holds for all a ∈ U1, for some units b1, b2 different from
±1. Then (ae0) · ((b1 + b2)ei) = (ab1 + a∗b2)ei holds for all a ∈ U1. By
taking norms on both sides, we obtain that
(1 − a2)b1b∗
2 + (1 − (a∗)2)b∗
1b2 = 0
for all a ∈ U1. This is clearly a contradiction.
Since U1 generates A as an abelian group, we conclude that either
(ae0) · (bei) = abei for all a, b ∈ A or (ae0) · (bei) = a∗bei for all a, b ∈ A.
In particular, (ae0) · (bei) is A-linear in b.
If (ae0) · (be0) = a∗be0 for all a, b ∈ A, then setting b = 1 gives the
contradiction: ae0 = a∗e0 for all a ∈ A. Thus we have (ae0) · (be0) =
abe0 for all a, b ∈ A. For i 6= 0, there is an εi ∈ {0, 1} such that
i (τ εi
τ εi
If τ is the product of the τ εi
i with i 6= 0, then τ 2 = 1 and the
multiplication "⋆" defined by x ⋆ y = τ (τ (x) · τ (y)) satisfies all the
requirements.
i (bei)) = abei for all a, b ∈ A.
i (ae0) · τ εi
Moreover, the map τ : (E, ⋆) → (E, ·) is an isomorphism of unital
(cid:3)
A0-algebras.
We assume from now on that the identity (4.6) holds. This property
will be shared by the modified multiplication which will be introduced
in Lemma 4.6.
Lemma 4.4. For a ∈ A and x ∈ Ae1 + Ae2 + Ae3 we have x · (ae0) =
a∗x.
Proof. Recall that Ae1 + Ae2 + Ae3 is the kernel of the trace T and is
perpendicular to Ae0 relative to Q. By using (4.4), we obtain that
x · (ae0) = x · (ae0) + (ae0) · x − (ae0) · x
= T (ae0)x + T (x)ae0 − Q(x, ae0)e0 − ax
= (a + a∗ − a)x = a∗x.
(cid:3)
Lemma 4.5. For a, b ∈ A and i 6= 0 we have (aei) · (bei) = −ab∗e0.
Proof. Since N is anisotropic, it suffices to show that N((aei) · (bei) +
ab∗e0) = 0. By expanding the LHS and applying (4.5) gives
N((aei) · (bei) + ab∗e0) = 2N(a)N(b) + Q((aei) · (bei), ab∗e0)
= 2N(a)N(b) + Q(aei, (ab∗e0) · (bei)∗)
= 2N(a)N(b) − Q(aei, (ab∗e0) · (bei))
= 2N(a)N(b) − N(b)Q(aei, aei)
= 2N(a)N(b) − 2N(a)N(b) = 0.
AN OCTONION ALGEBRA
9
(cid:3)
Lemma 4.6. By replacing "·" with an isomorphic multiplication, we
may assume that
(4.7)
ei · ej = ek = −ej · ei
for any cyclic permutation (i, j, k) of (1, 2, 3).
Proof. Let (i, j, k) be a cyclic permutation of (1, 2, 3). Since (e0 + ei) ·
(e0 + ej) = e0 + ei + ej + ei · ej and N(e0 + ej) = N(e0 + ej) = 2, we
have N(e0 + ei + ej + ei · ej) = 4. As ei · ej ∈ U4, Lemma 3.1 implies
that ei · ej ∈ U1ek. A similar argument shows that ej · ei ∈ U1ek.
In particular we have e1 · e2 = ue3 for some u ∈ U1. The multiplica-
tion "⋆" defined by x ⋆ y = σ−1
a (σa(x) · σa(y)), where a = (1, 1, 1, u), has
the previously stated property and sends (e1, e2) → e3. By replacing
"·" with this new multiplication, we may assume that e1 · e2 = e3.
Since (ei + ej) · (ei + ej) = ei · ej + ej · ei − 2e0, we have N(ei · ej +
ej · ei − 2e0) = 4. Since ei · ej + ej · ei ∈ Aek, it follows that this sum is
0, i.e., ej · ei = −ei · ej. In particular, we have e2 · e1 = −e3. Thus the
assertion of the lemma is valid if (i, j, k) = (1, 2, 3).
The remaining equalities (4.7) follow easily by using the alternative
laws (4.2). For instance, we have e1 · e3 = e1 · (e1 · e2) = (e1 · e1) · e2 =
(−e0) · e2 = −e2.
To finish the proof, we point out that the map σa : (E, ⋆) → (E, ·)
(cid:3)
is an isomorphism of unital A0-algebras.
In view of the last lemma, we may assume now (and we do) that the
identities (4.7) are valid for any cyclic permutation (i, j, k) of (1, 2, 3).
Lemma 4.7. For any cyclic permutation (i, j, k) of (1, 2, 3) we have
(4.8)
(aei) · (bej) = a∗b∗ek = −(bej) · (aei)
for all a, b ∈ A. Consequently, the multiplications "·" and "◦" coincide.
Proof. In view of (4.4), it suffices to prove the first equality. We first
treat the case a = 1. By applying the linearized left alternative law,
we find that
ei · (bej) = ei · ((be0) · ej)
= (ei · (be0) + (be0) · ei) · ej − (be0) · (ei · ej)
= (b + b∗)ek − bek = b∗ek.
10
D.Z. D -- OKOVI ´C AND K. ZHAO
For arbitrary a, by using this special case, the linearized right alterna-
tive law and Lemma 4.4, we obtain that
(aei) · (bej) = (ei · (a∗e0)) · (bej)
= ei · ((a∗e0) · (bej) + (bej) · (a∗e0)) − (ei · (bej)) · (a∗e0)
= ei · ((a + a∗)bej) − (b∗ek) · (a∗e0)
= ((a + a∗)b∗ − ab∗)ek = a∗b∗ek.
(cid:3)
This concludes the proof of Theorem 4.2, and also of Theorem 4.1.
The referee supplied an alternative proof of Theorem 4.2. His proof
proceeds first by changing scalars from the base ring Z[t] to its quo-
tient field Q(t), and then applying a theorem of Thakur [7] (see also
[5, Chapter VIII, Exercise 6]) which establishes a connection between
octonion algebras and ternary hermitian forms. In the case of Yang
algebra, let us write E = Ae0 ⊕ A3, where A3 is the column A-space.
Extending the conjugation of A componentwise to A3, we have a her-
mitian form h : A3 × A3 → A given by h(v, w) = vtw∗. With this
notation, the Yang multiplication is given by
(ae0 ⊕ v) ◦ (be0 ⊕ w) = (ab − h(v, w))e0 ⊕ (aw + b∗v + v∗ × w∗)
where a, b ∈ A and v, w ∈ A3. The sign × stands for the ordinary cross
product in 3-space.
5. Addendum
Alberto Elduque [2] has found a simpler proof of Theorem 4.2. Here
we present his simplification. We point out that the involution "∗"
coincides with the the involution "−" in [4, p. 305] and so it is an
involution of the algebra (E, ·).
The first paragraph of the proof of Lemma 4.3 implies that Ae0 · ei =
Aei for each i. By applying the involution "∗" we obtain that also
ei · Ae0 = Aei for each i. By (4.3) we have (ze0) · (ze0) = −e0 + tze0 =
z2e0. It follows that (xe0) · (ye0) = xye0 for all x, y ∈ A. By (4.3), we
also have e1 · e1 = −e0. By applying [4, Lemma (7.1.7)], with B = Ae0
and v = e1, we conclude that P = Ae0 + Ae1 is a subalgebra of (E, ·).
From the proof of that lemma it also follows that the multiplications
"·" and "◦" coincide on P .
From (4.4) we deduce that e2 · P ⊆ P ⊥ = Ae2 + Ae3. Since x → e2 · x
is an orthogonal transformation on E, we have Ae2 = e2 ·Ae0 ⊥ e2 ·Ae1.
It follows that e2 · Ae1 ⊆ Ae3. Similarly, e2 · Ae3 ⊆ Ae1. Thus we must
have e2 · Ae1 = Ae3 and e2 · Ae3 = Ae1, and so E = P ⊕ e2 · P . We
now apply [4, Lemma (7.1.7)] for the second time by taking B = P
AN OCTONION ALGEBRA
11
and v = e2. We conclude that the multiplications "·" and "◦" coincide
on E.
Note that this proof does not use any of the lemmas 4.4-7, and uses
only the first paragraph of the proof of Lemma 4.3.
References
[1] N. Bourbaki, Alg`ebre, Chapitres 1 `a 3, Hermann, Paris, 1970.
[2] A. Elduque, Private communication, March 2, 2010.
[3] I. Kaplansky, Infinite-dimensional quadratic forms admitting composition,
Proc. Amer. Math. Soc. 4 (1953), 956 -- 960.
[4] M.-A. Knus, Quadratic and Hermitian Forms over Rings, Grundlehren der
mathematischen Wissenschaften 294, Springer-Verlag, 1991.
[5] M.-A. Knus, A. Merkurjev, M. Rost and J.-P. Tignol, The Book of Involutions,
Amer. Math. Soc. Colloq. Publ. 44, Amer. Math. Soc., Providence, RI, 1998.
[6] J. Seberry and M. Yamada, Hadamard matrices, sequences and block designs,
in Contemporary Design Theory: A Collection of Surveys, Eds. J.H. Dinitz
and D.R. Stinson, J. Wiley, New York, 1992, pp. 431 -- 560.
[7] M. L. Thakur, Cayley algebra bundles on A2
K revisited, Comm. Algebra 23
(1995), no. 13, 5119 -- 5130.
[8] C. H. Yang, Lagrange identity for polynomials and δ-codes of lengths 7t and
13t, Proc. Amer. Math. Soc. 88 (1983), 746 -- 750.
[9] C. H. Yang, A composition theorem for δ-codes, Proc. Amer. Math. Soc. 89
(1983), 375 -- 378.
[10] C. H. Yang, On composition of four-symbol δ-codes and Hadamard matrices,
Proc. Amer. Math. Soc. 107 (1989), 763 -- 776.
Department of Pure Mathematics, University of Waterloo, Water-
loo, Ontario, N2L 3G1, Canada
Department of Mathematics, Wilfrid Laurier University, Water-
loo, Ontario, N2L 3C5, Canada and Institute of Mathematics, Acad-
emy of Mathematics and System Sciences, Chinese Academy of Sci-
ences, Beijing 100190, P.R. China
E-mail address: [email protected]
E-mail address: [email protected]
|
1412.5776 | 2 | 1412 | 2018-07-10T15:43:04 | A relational description of higher commutators in Mal'cev varieties | [
"math.RA"
] | We give a relational description of higher commutator operators, which were introduced by Bulatov, in varieties with a Mal'cev term. Furthermore, we use this result to prove that for every algebra with a Mal'cev term there exists a largest clone on the same underlying set containing the Mal'cev operation and having the same congruence lattice and the same higher commutator operators as the original algebra. A local variant of this theorem is given. | math.RA | math | A RELATIONAL DESCRIPTION OF HIGHER COMMUTATORS
IN MAL'CEV VARIETIES
JAKUB OPRSAL
Abstract. We give a relational description of higher commutator operators,
which were introduced by Bulatov, in varieties with a Mal'cev term. Further-
more, we use this result to prove that for every algebra with a Mal'cev term
there exists a largest clone containing the Mal'cev operation and having the
same congruence lattice and the same higher commutator operators as the
original algebra. We also give a local variant of this theorem.
8
1
0
2
l
u
J
0
1
]
.
A
R
h
t
a
m
[
2
v
6
7
7
5
.
2
1
4
1
:
v
i
X
r
a
1. Introduction
Two algebras are called polynomially equivalent if they have the same under-
lying set and the same clone of all polynomial operations. One of the invariants
to distinguish polynomially inequivalent algebras is the congruence lattice of the
corresponding algebra, and the binary commutator operation [·, ·] on this lattice
(the theory describing this commutator have been developed in the 80's, and is de-
scribed in the book by Freese and McKenzie [8]). In fact, from the results of Idziak
[10] and Bulatov [6], one can see that on the three-element set, every Mal'cev al-
gebra is up to polynomial equivalence described by its congruence lattice, and the
binary commutator operation. This is no longer true for sets with at least four
elements. But one can generalize the binary commutator operator to higher arities.
These higher arity commutators have been introduced by Bulatov [5]. From the
description of polynomial clones with a Mal'cev operation on the four-element set
[7], one can obtain that every four-element Mal'cev algebra is determined up to
polynomial equivalence by its unary polynomials, congruence lattice, and higher
commutator operators on this lattice. The higher commutators are defined by the
following 'term-condition'.
Definition 1.1 (Bulatov's higher commutator operators). Let α0, . . . , αn−1, and
γ be congruences of some algebra A. We say that α0, . . . , αn−2 centralize αn−1
modulo γ if for all tuples ai, bi, i = 0, . . . , n − 1, and all terms t of A such that
(1) ai 6= bi, but the corresponding entries are congruent modulo αi for all
i ∈ {0, . . . , n − 1}, and
(2) t(x0, . . . , xn−2, an−1) ≡γ t(x0, . . . , xn−2, bn−1) for all (x0, . . . , xn−2) ∈ ({a0, b0}×
· · · × {an−2, bn−2}) \ {(b0, . . . , bn−2)},
Date: July 11, 2018.
2010 Mathematics Subject Classification. 08A40.
Key words and phrases. commutator theory, Mal'cev algebras, clone.
Supported by Austrian Science Fund (FWF), P24077: Algebraic approaches to the description
of Mal'cev clones; Czech Science Foundation, GA CR 13-01832S; and Charles University in Prague,
project SVV-2014-260107.
1
2
we have
J. OPRSAL
t(b0, . . . , bn−2, an−1) ≡γ t(b0, . . . , bn−2, bn−1).
The n-ary commutator [α0, . . . , αn−1] is then defined as the smallest congruence γ
such that α0, . . . , αn−2 centralize αn−1 modulo γ. We define the nulary commutator
to be trivially the full congruence on A, and for the unary commutator of α we put
[α] = α.
One of important notions that came from higher commutators is a notion of su-
pernilpotence: an algebra is k-supernilpotent if it satisfies the commutator identity
[1, 1, . . . , 1
] = 0.
}
k+1
{z
If an algebra is k-supernilpotent for some k we say that is it supernilpotent. For
general algebras supernilpotence is a strictly stronger notion then nilpotence; i.e.,
there is a nilpotent algebra which is not supernilpotent. However, this is not the
case in the variety of groups where both notions coincide. Therefore supernilpotent
algebras can be viewed as natural generalization of nilpotent groups. They also
share several properties with nilpotent groups, in particular a Mal'cev algebra of
finite type is supernilpotent if and only if it is a product of prime power order
supernilpotent algebras [2]. It has been shown in [3] that there are two expansions
of the same group that are both 2-supernilpotent, but the clone given as the join of
their clones is not. In this paper we establish additional properties to ensure that the
join of two k-supernilpotent clones sharing a Mal'cev operation is k-supernilpotent.
To achieve that goal we give a description of higher commutators using a certain
2n-ary relation denoted ∆(α0, . . . , αn−1) (see Definition 3.1). A similar relation
have been also defined in [13]. The relation ∆(α0, . . . , αn−1) encodes the value
of [α0, . . . , αn−1] as its forks at the last coordinate -- by a fork of a relation R at
a coordinate i we mean a pair (a, b) such that there exists c, d ∈ R with ci = a,
di = b, and cj = dj for all j 6= i; and we denote ψi(R), the set of all forks of R at
i. A similar notion has been used to investigate some properties of algebras with
a cube term [4, 1]. The description of higher commutators is then given by the
following theorem.
Theorem 1.2. If A is an algebra with a Mal'cev term, and α0, . . . , αn−1 are con-
gruences of A then
[α0, . . . , αn−1] = ψ2n−1(∆(α0, . . . , αn−1)).
Further we show that ∆(α0, . . . , αn−1) encodes not only the commutator [α0, . . . , αn−1]
but also all smaller-arity commutators that can be obtained by omitting one or more
of the congruences αi. We show that if we take the clone of all polymorphisms of
the relation ∆(α0, . . . , αn−1) we get exactly the clone C(α0, . . . , αn−1) with the
properties described in the following theorem, and consequently one can construct
a largest clone with the same commutator operators as the original Mal'cev algebra.
Theorem 1.3. Let A be an algebra with Mal'cev term q, and let α0, . . . , αn−1 be
congruences of A. Then there exists a largest clone C(α0, . . . , αn−1) on A contain-
ing q such that it preserves congruences α0, . . . , αn−1, and all commutators of the
form [αi0 , . . . , αik−1 ] (where k ≤ n and 0 ≤ i0 < · · · < ik−1 < n) agree in A and
(A, C(α0, . . . , αn−1)).
RELATIONAL DESCRIPTION OF HIGHER COMMUTATORS
3
Corollary 1.4. Let A be an algebra with a Mal'cev term q, then there exists
a largest clone on A containing q such that the algebra corresponding to this clone
has the same congruence lattice as A and the same higher commutator operators
as A.
Proof of Corollary 1.4 given Theorem 1.3. The largest such clone is the intersec-
tion of all clones C(α1, . . . , αn) from Theorem 1.3 for all n and all tuples α1, . . . , αn
of congruences of A.
(cid:3)
Although our main motivation of developing this theory lies in the application
to Mal'cev algebras on a finite domain, the same results are valid even for algebras
with infinite domains. Moreover, since the largest clone in the previous theorem is
described as a polymorphism clone, we know that such clone is closed in the natural
topology given by pointwise convergence by a result of Romov [12]. More on clones
on infinite sets can be found in [9].
The theory developed to prove Theorem 1.3 is strong enough to give relatively
short proofs of several basic properties of higher commutators (usually referred as
(HC1) -- (HC8)) that have been established in [5], their proofs have been published
in [2]. Our alternative proofs of some of these properties are given in the last section
of this paper.
2. Preliminaries and notation
Algebras are denoted by bold letters, the underlying set of an algebra is denoted
by the same letter in italic, Con A denotes the set of all congruences of an algebra
A, Clo A the set (clone) of all term operations of A, Cg X denotes the congruence
generated by X, Sg Y denotes a subalgebra generated by Y , and if α is a congruence
then we use the symbol a ≡α b to denote (a, b) ∈ α. Furthermore, if R is a relation,
we use symbol Pol R to denote the clone of all polymorphisms of R. The symbol 2
will denote both the natural number 2 and the two-element set {0, 1}.
We denote tuples by bold letters. The i-th coordinate of tuple a is denoted by
either ai, or a(i). So, a = (a0, . . . , an−1) and (a0, . . . , an−1)(i) = ai. Tuples will
be usually numbered by an increasing sequence of consecutive integers starting at
0. So every n-ary relation is a subset of A{0,...,n−1} = An. The only exception will
be elements of the relation ∆(α0, . . . , αn−1). In the theory of binary commutator
described in [8], it is usual to denote the elements of 4-ary relation ∆α,β (we will
denote the same relation ∆(α, β)) as 2×2 matrices. Similarly, when generalizing this
concept to ∆(α0, . . . , αn−1) one should write elements of this relation as 2 × · · · × 2
n-dimensional matrices. We will denote those elements by tuples whose coordinates
will be labeled by the set 2n = {0, 1}n, we will write these coordinates as binary
sequences omitting brackets and commas, and if needed we will view them as reverse
binary expansions of natural numbers 0, . . . , 2n − 1; i.e., the tuple k = k0 . . . kn−1
represents the number P ki2i. This gives us a natural linear ordering of the set
2n that we will use to write the elements of A2n
as linear 2n-tuples. So, the tuple
a ∈ A2n
will be written as (a00...0, a10...0, a010...0, a110...0, . . . , a11...1). For d ∈ {0, 1}
we will use symbol d for the negation of d, i.e., 0 = 1 and 1 = 0. We will also
refer to forks of these relations at some coordinate k the same way as if all the
coordinates would be integer.
The last piece of notation has a close connection to a simple lemma about forks
of a relation. For any map e : J → I and a ∈ AI the symbol ae denotes the J-tuple
4
J. OPRSAL
defined by ae(j) = ae(j). Similarly, for a relation R ≤ AI , Re denotes the relation
{ae a ∈ R}.
Lemma 2.1. Let A be an algebra, R ≤ AI , S ≤ AJ , e : J → I, and Re ⊆ S.
If i ∈ I and there is a unique j ∈ J such that e(j) = i then ψi(R) ⊆ ψj(S). In
particular,
(i) if R ⊆ S then ψi(R) ⊆ ψi(S) for every i ∈ I;
(ii) if e : I → I is bijective then ψe(i)(R) = ψi(Re) for every i ∈ I.
Proof. Suppose that (a, b) ∈ ψi(R); i.e., there are tuples a, b ∈ R such that ai = a,
bi = b, and ak = bk for all k 6= i. Then from Re ⊆ S we know that ae, be ∈ S.
These tuples witness that (a, b) ∈ ψj(S), because ae(j) = ai = a, be(j) = bi = b,
and ae(k) = be(k) for k 6= j.
The statement (i) is a special case of the former for I = J, and e being the
identity mapping. To prove (ii), suppose that e is a bijection on the set I. Then
from the statement for S = Re we get that ψe(i)(R) ⊆ ψi(Re). For the other
inclusion substitute e with e−1, R with Re, and i with e(i).
(cid:3)
We recall two simple well-known lemmata for Mal'cev algebras.
Lemma 2.2. Let A be a Mal'cev algebra. Then any binary reflexive compatible
relation on A is a congruence.
(cid:3)
Lemma 2.3. Let A be a Mal'cev algebra, and let R be n-ary compatible relation
on A. If (a, b) ∈ ψi(R), and (c0, . . . , ci−1, a, ci+1, . . . , cn−1) ∈ R then
(c0, . . . , ci−1, b, ci+1, . . . , cn−1) ∈ R.
Proof. Without loss of generality suppose that i = 0. Let q be a Mal'cev term of
A, and let (a, u1, . . . , un−1) and (b, u1, . . . , un−1) be witnesses for (a, b) ∈ ψ0(R).
Then
b
c1
...
cn−1
=
a
c1
...
cn−1
since we know that R is compatible with q.
un−1 un−1
q
b
u1
...
a
u1
∈ R,
(cid:3)
3. Description of higher commutators
Definition 3.1. Let A be an algebra, and α0, . . . , αn−1 ∈ Con A. First, for each
congruence αi choose one dimension in the n-dimensional space. We define the
relation ∆A(α0, . . . , αn−1) as the 2n-ary relation indexed by the set 2n generated
by tuples that are constant on two opposing (n − 1)-dimensional hyperfaces of the
hypercube orthogonal to the dimension corresponding to αi and these constants
are αi congruent.
We will use faced
i (a) to denote the (d + 1)-th hyperface orthogonal to dimen-
i (a) = afi,d where fi,d(k) = k0 . . . ki−1dki . . . kn−2. The generating
i (a, b). By defini-
i (a, b) = (b, . . . , b); or equiva-
i (a, b) = (a, b)di where di : 2n → 2 is defined by k 7→ k(i). Finally,
sion i, i.e., faced
tuples of the relation ∆A(α0, . . . , αn−1) will be denoted cuben
tion, face0
lently, cuben
∆A(α0, . . . , αn−1) is defined as
i (a, b) = (a, . . . , a), and face1
i cuben
i cuben
∆A(α0, . . . , αn−1) := Sg(cid:8) cuben
i (a, b) i < n, a ≡αi b(cid:9) = _i<n
cuben
i (αi).
RELATIONAL DESCRIPTION OF HIGHER COMMUTATORS
5
For the trivial case when n = 0, we put ∆A() := A. If the algebra is clear from the
context, we will write just ∆(α0, . . . , αn−1) instead of ∆A(α0, . . . , αn−1), and if C is
a clone on the set A, we will write ∆C(α0, . . . , αn−1) instead of ∆(A,C)(α0, . . . , αn−1).
Example. We will describe generators of ∆(α0, α1, α2) for three congruences α0,
α1, α2 of an algebra A. The elements of ∆(α0, α1, α2) are indexed by vertices
of a three-dimensional hypercube. The generators are tuples of one of the fol-
lowing forms (a, b, a, b, a, b, a, b), where a ≡α0 b, (a, a, b, b, a, a, b, b) where a ≡α1 b,
and (a, a, a, a, b, b, b, b) where a ≡α2 b. Their graphical representation is given in
Figure 1.
a
a
b
b
a
a
α0
b
b
b
a
b
a
b
a
α1
b
a
a
a
α2
a
a
b
b
b
b
Figure 1. Generators of ∆(α0, α1, α2)
Before we get to the proof of Theorem 1.2, we will describe some basic proper-
ties of the relation ∆(α0, . . . , αn−1). The first lemma gives a term description of
∆(α0, . . . , αn−1). This description gives a clear connection of ∆(α0, . . . , αn−1) and
the term condition.
Lemma 3.2. For every algebra A, and congruences αi ∈ Con A, i < n,
∆(α0, . . . , αn−1)
=(cid:8)(cid:0)t(a0, . . . , an−1), t(b0, a1 . . . , an−1), . . . , t(b0, b1 . . . , bn−1)(cid:1)
∀i < n : mi ∈ N0, ai, bi ∈ Ami , ai ≡αi bi; t ∈ CloP mi A(cid:9)
where the elements of the 2n-tuple include the term t applied to all the combinations
of corresponding ai's and bi's.
Proof. The relation ∆(α0, . . . , αn−1) is generated by tuples cuben
So, ∆(α0, . . . , αn−1) is the set of all tuples of the form
i (a, b) for a ≡αi b.
t(cuben
i0 (a0, b0), . . . , cuben
ik−1 (ak−1, bk−1))
where t ∈ Clok A, and for all j < k we have ij < n, aj ≡ bj modulo αij . The de-
scription in the statement of the lemma can be obtained from this by grouping
together cuben
ij (aj, bj)'s with the same index ij, and applying the term t coordi-
natewise.
(cid:3)
Example. In the ternary commutator case, the lemma tells that
∆(α0, . . . , αn−1) =(cid:8)(cid:0)t(a0, a1, a2), t(b0, a1, a2), t(a0, b1, a2), t(b0, b1, a2),
t(a0, a1, b2), t(b0, a1, b2), t(a0, b1, b2), t(b0, b1, b2)(cid:1)
m0, m1, m2 ∈ N0, t ∈ Clom0+m1+m2 A, ∀i < 3 : ai, bi ∈ Ami , ai ≡αi bi(cid:9).
The graphical representation of a typical element of this relation is given in Figure 2.
6
J. OPRSAL
t(a0, b1, a2)
t(a0, b1, b2)
t(b0, b1, a2)
t(b0, b1, b2)
t(a0, a1, a2)
t(a0, a1, b2)
t(b0, a1, a2)
t(b0, a1, b2)
Figure 2.
Lemma 3.3. Let A be an algebra, and α0, . . . , αn−1, γ ∈ Con A. Then α0, . . . , αn−2
centralize αn−1 modulo γ if for every tuple
(a0...0, . . . , a1...1, b0...0, . . . , b1...1) ∈ ∆(α0, . . . , αn−1)
such that ak ≡γ bk for all k ∈ 2n−1 \ {1 . . . 1} we have also a1...1 ≡γ b1...1.
(cid:3)
Lemma 3.4. Let A be an algebra with congruences α0, . . . , αn, i < n, and si : k 7→
k(0) . . . k(i−1)k(i)k(i+1) . . . k(n−1). Then
(i) if d ∈ {0, 1} and a ∈ ∆(α0, . . . , αn−1) then
faced
i a ∈ ∆(α0, . . . , αi−1, αi+1, . . . , αn−1);
(ii) if a ∈ A2n−1
face0
such that
i a = face1
i a ∈ ∆(α0, . . . , αi−1, αi+1, . . . , αn−1),
then a ∈ ∆(α0, . . . , αn−1);
(iii) ∆(α0, . . . , αn−1)si = ∆(α0, . . . , αn−1).
Furthermore, if A is a Mal'cev algebra then the binary relation
is a congruence on ∆(α0, . . . , αi−1, αi+1, . . . , αn).
δ =(cid:8)(cid:0)face0
i a, face1
i a(cid:1) a ∈ ∆(α0, . . . , αn−1)(cid:9)
Proof. Since all the considered relations are compatible, we can check the validity
of particular inclusions on the generators of the relations, i.e., tuples cubei,n(a, b).
In detail, to prove (i) one has to observe that
faced
i cuben
j (a, b) =
and consequently
(a, b)
j
cuben−1
(c, . . . , c)
cuben−1
j−1 (a, b)
if j < i,
where c ∈ {a, b} if j = i,
if j > i,
faced
i {cuben
j (a, b) j < n, a ≡αj b}
= {cuben−1
j
(a, b) j < i, a ≡αj b} ∪ {cuben−1
j−1 (a, b) i < j < n, a ≡αj b}.
Hence the relation generated by the left hand side is the same as the relation
generated by the right hand side which gives the desired equality.
For (ii), first observe that
{a face0
i a = face1
i a ∈ ∆(α0, . . . , αi−1, αi+1, . . . , αn−1)}
RELATIONAL DESCRIPTION OF HIGHER COMMUTATORS
7
is the 2n-ary relation generated by tuples a such that face0
a ≡ b modulo αj, or αj+1 when j < i, or j ≥ i respectively. Second, if a is such
a tuple then a = cuben
In either
case, a ∈ ∆(α0, . . . , αn−1) for a, b that are congruent modulo the corresponding
congruence.
j (a, b) if j < i, or a = cuben
j+1(a, b) if j ≥ i.
i a = face1
i a = cubej,n−1(a, b),
The item (iii) is a consequence of the fact that
(cuben
j (a, b))si =(cuben
cuben
j (b, a)
if j = i, or
j (a, b) otherwise.
Hence (cuben
nition of ∆(α0, . . . , αn−1), we get that
j αj)si = cuben
j αj from the symmetry of congruences. From the defi-
∆(α0, . . . , αn−1)si = ∆(α0, . . . , αn−1).
From items (i) -- (iii) we already know that the binary relation δ is a reflexive
symmetric binary relation on ∆(α0, . . . , αi−1, αi+1, . . . , αn−1). The rest follows
from Lemma 2.2.
(cid:3)
Lemma 3.5. Let A be a Mal'cev algebra with congruences α0, . . . , αn−1. Then
ψj(∆(α0, . . . , αn−1)) = ψk(∆(α0, . . . , αn−1)) for all j, k ∈ 2n.
Proof. For simplicity, let ψk = ψk(∆(α0, . . . , αn−1)). If si is the permutation on 2n
defined by si(k) = k0 . . . ki−1kiki+1 . . . kn−1 then from Lemma 3.4(iii), we know that
∆(α0, . . . , αn−1) = ∆(α0, . . . , αn−1)si . This gives, by Lemma 2.1, that ψk = ψsi(k)
for all i < n. But, if i0, . . . , im−1 are exactly those indices i such that ki 6= ji then
j = si0 ◦ · · · ◦ sim−1 (k), and consequently ψk = ψj for all j, k.
(cid:3)
Instead of proving Theorem 1.2 directly, we will prove the following refinement.
The theorem is then given by equivalence of (1) and (4).
Proposition 3.6. If A is a Mal'cev algebra, α0, . . . , αn−1 ∈ Con A, and a, b ∈ A;
then the following is equivalent
(1) (a, b) ∈ ψ1...1(∆(α0, . . . , αn−1));
(2) (a, . . . , a, b) ∈ ∆(α0, . . . , αn−1);
(3) there exists c0, . . . , c2n−1−2 such that
(c0, . . . , c2n−1−2, a, c0, . . . , c2n−1−2, b) ∈ ∆(α0, . . . , αn−1).
(4) a ≡[α0,...,αn−1] b;
Proof. The implication (1) → (2) is direct corollary of Lemma 2.3, given that
∆(α0, . . . , αn−1) contains all constant tuples, in particular (a, . . . , a). (2) → (3)
is trivial. For (3) → (4) suppose that (3) is satisfied for a pair (a, b) then since
ci ≡ ci mod [α0, . . . , αn−1] for all i < 2n−1 − 1 and α0, . . . , αn−2 centralize αn−1
modulo [α0, . . . , αn−1], we have a ≡ b mod [α0, . . . , αn−1] from Lemma 3.3.
The last to prove is (4) → (1), in other words that
(3.1)
[α0, . . . , αn−1] ≤ ψ1...1(∆(α0, . . . , αn−1)).
Let ψ = ψ1...1(∆(α0, . . . , αn−1)); from Lemma 3.5 we know that
ψ = ψ1...1(∆(α0, . . . , αn−1)) = ψk(∆(α0, . . . , αn−1))
for all k ∈ 2n, so we do not have to distinguish between forks at different coordi-
nates. To prove (3.1) by the definition of the commutator, it is enough to prove that
8
J. OPRSAL
α0, . . . , αn−2 centralize αn−1 modulo ψ. For that we will use Lemma 3.3. Suppose
that
(a0...0, . . . , a1...1, b0...0, . . . , b1...1) ∈ ∆(α0, . . . , αn−1),
and ai ≡ψ bi for all i ∈ 2n−1 \ {1 . . . 1}. By repeated use of Lemma 2.3 we can
replace b00...0, . . . , b01...1 by the respective ai's. Hence,
(a00...0, . . . , a01...1, a11...1, a00...0, . . . , a01...1, b11...1) ∈ ∆(α0, . . . , αn−1).
In addition, we know from Lemma 3.4(i) and 3.4(ii) that
(a00...0, . . . , a01...1, a11...1, a00...0, . . . , a01...1, a11...1) ∈ ∆(α0, . . . , αn−1).
So, a11...1 ≡ψ b11...1 which concludes the proof that α0, . . . , αn−2 centralize αn−1
modulo ψ.
(cid:3)
In the last proposition some parts have been already known. The proposition (in
the case of Mal'cev algebras) generalize Theorem 4.9 of [8] which gives equivalence
of (2), (3), and (4) for binary commutators in congruence modular varieties. The
omitted equivalence of (1) and (3) in the binary case can be easily derived from the
known fact that ∆(α0, α1) is a congruence on rows. Furthermore, for the higher
commutators, the implication (3) → (4) for the variety of groups has appeared in
[13]; and if all αi's are principal congruences, the equivalence of (2) and (4) is given
by [2, Lemma 6.13] (via an easy translation similar to Lemma 3.2).
4. Strong cube terms, and clones of operations preserving
commutators
We will use terms that generalize Mal'cev terms. These terms will play similar
role as a difference term in the case of binary commutator. A (2n − 1)-ary term qn
is a strong n-cube term if it satisfies
qn(x00...0, x10...0, . . . , x01...1) ≈ x11...1
. This
whenever there is i < n such that for all k we have xk = xk0...ki−1kiki+1...kn−1
gives a set of n identities, each with 2n−1 variables. The two identities for strong
2-cube term are
q2(x, y, x) ≈ y
and q2(x, x, y) ≈ y.
So, the term q2(y, x, z) is a Mal'cev term, and if q is a Mal'cev term then q(y, x, z)
is a strong 2-cube term. The three identities for strong 3-cube term are
q3(x, y, z, w, x, y, z) ≈ w
q3(x, y, x, y, z, w, z) ≈ w
q3(x, x, y, y, z, z, w) ≈ w.
Strong cube terms are stricter version of cube terms introduced in [4]; a (2n − 1)-
ary term is an n-cube term if it satisfies
qn(x00...0, x10...0, . . . , x01...1) ≈ x11...1
whenever there is i < n such that xk = xl for all k, l such that ki = li. This gives
n two-variable identities compared to the 2n−1 variables used in the identities for
strong cube terms. One can see that for n ≥ 2 every strong n-cube term satisfies
the identities of an n-cube term; the i-th identity of a cube term is implied by
almost any identity for a strong cube term except for the i-th one.
Lemma 4.1. The following is equivalent for any algebra A.
RELATIONAL DESCRIPTION OF HIGHER COMMUTATORS
9
(1) A has a strong n-cube term for all n ≥ 2,
(2) A has a strong n-cube term for some n ≥ 2,
(3) A has a Mal'cev term.
Proof. From the observation in the above paragraphs, we know that the condition
(3) is equivalent to
(3') A has a strong 2-cube term.
We will prove equivalence of (1), (2), and (3'). The implication (1) → (2) is
trivial. For (2) → (3′) observe that if qn is a strong n-cube term then q2(x, y, z) =
qn(x, . . . , x, x, y, z) is a strong 2-cube term. For the last implication (3′) → (1) we
can construct strong cube terms by the recursion:
qn+1(x0, . . . , x2n+1−1) = q2(qn(x0, . . . , x2n−2), x2n−1, qn(x2n , . . . , x2n+1−2))
It is easy to check that if qn is a strong n-cube term and q2 is a strong 2-cube term
then qn+1 is a strong (n + 1)-cube term.
(cid:3)
The following lemma is the key for proving Theorem 1.3 and a lot of properties
of higher commutators in Mal'cev varieties.
Lemma 4.2. Let A be an algebra with a strong n-cube term qn, α1, . . . , αn ∈
Con A. Then a ∈ ∆(α1, . . . , αn) if and only if
face0
i a ∈ ∆(α0, . . . , αi−1, αi+1, . . . , αn−1)
for each i and qn(a00...0, a10...0, . . . , a01...1) ≡[α0,...,αn−1] a11...1.
Proof. We will prove the lemma in two steps.
Claim 1. If face0
a10...0, . . . , a01...1) = a11...1 then a ∈ ∆(α1, . . . , αn−1);
i a ∈ ∆(α0, . . . , αi−1, αi+1, . . . , αn−1) for each i < n, and qn(a00...0,
For k ∈ 2n and b ∈ A2n
let ak denotes the 2n-tuple
ak = (a00...0, ak00...0, a0k1...0, . . . , ak0k1...kn−1).
i ak = face1
Note that if ki = 0 then face0
i ak0...ki−11ki+1...kn−1 . Sup-
pose that the tuple a satisfies the premise of the claim. The fact that ak ∈
∆(α0, . . . , αn−1) for all k 6= 11 . . . 1 follows from induction on the number of 0's in
k -- the base step is given by Lemma 3.4(ii) and the assumption; the induction step
is given by Lemma 3.4(i) and (ii) and the above observation. Next we claim that
i ak = face0
(4.1)
qA2n
n
(a00...0, . . . , a01...1) = (a00...0, . . . , a01...1, qA
n (a00...0, . . . , a01...1));
i.e., we have to show that
qn(a00...0, aj00...0, . . . , a0j1...jn−1 ) = aj
for every coordinate j 6= 11 . . . 1. The above is trivial for the coordinate j = 11 . . . 1;
for j with ji = 0 the identity follows from the i-th identity for a strong cube term.
Finally, since the relation ∆(α0, . . . , αn−1) is compatible with qn we know that the
right hand side of (4.1) is in ∆(α0, . . . , αn−1).
Claim 2. If a ∈ ∆(α0, . . . , αn−1) then qn(a00...0, . . . , a01...1) ≡[α0,...,αn−1] a11...1.
10
J. OPRSAL
If (a00...0, . . . , a11...1) ∈ ∆(α0, . . . , αn−1) then from Lemma 3.4(i) we know that
the tuple (a00...0, . . . , a01...1, qn(a00...0, . . . , a01...1)) satisfies the prerequisites of the
first claim. Hence, we know that
(a00...0, . . . , a01...1, qn(a00...0, . . . , a01...1)) ∈ ∆(α0, . . . , αn−1)
which shows that
(a11...1, qn(a00...0, . . . , a01...1)) ∈ ψ11...1(∆(α0, . . . , αn−1)) = [α0, . . . , αn−1].
Finally, we get to the statement of this lemma. The 'only if' part is Claim 2
together with Lemma 3.4(i). For the 'if' part, if
face0
i a ∈ ∆(α0, . . . , αi−1, αi+1, . . . , αn−1)
for all i < n, we know from Claim 1 that
(a00...0, . . . , a01...1, qn(a00...0, . . . , a01...1)) ∈ ∆(α0, . . . , αn−1).
From the last condition and Theorem 1.2, we know that qn(a00...0, . . . , a01...1) and
a11...1 are congruent modulo ψ11...1(∆(α0, . . . , αn−1)). Therefore, a ∈ ∆(α0, . . . , αn−1)
from Lemma 2.3.
(cid:3)
In the rest of this chapter we use symbol [α0, . . . , αn−1]X to denote the commu-
tator [α0, . . . , αn−1] computed in the algebra X.
Corollary 4.3. Let A, B are algebras that share a universe, a Mal'cev operation,
and congruences α0, . . . , αn−1. Then
[αi0 , . . . , αik−1 ]A = [αi0 , . . . , αik−1 ]B
for all k ≤ n and 0 ≤ i0 < · · · < ik−1 < n if and only if ∆A(α0, . . . , αn−1) =
∆B(α0, . . . , αn−1).
Proof. We will prove the corollary by induction on n. The case n = 1 is trivial; for
the induction step suppose that for all congruences β0, . . . , βn−1 ∈ Con A ∩ Con B
such that the commutators [βi0 , . . . , βik−1 ] agree in A and B for all k < n and
i0, . . . , ik−1 pairwise distinct elements from {0, . . . , n−1}, we have ∆A(βi0 , . . . , βik−1 ) =
∆B(βi0 , . . . , βik−1 ).
In particular, we have ∆A(α0, . . . , αi−1, αi+1, . . . , αn−1) =
∆B(α0, . . . , αi−1, αi+1, . . . , αn−1) for all i < n. Let qn be a common strong n-
cube operation of A and B (it can be derived from the common Mal'cev oper-
ation). From Lemma 4.2 we know that whenever X is a Mal'cev algebra then
a ∈ ∆X(α0, . . . , αn−1) if and only if
(4.2)
face0
j a ∈ ∆X(α0, . . . , αi−1, αi+1, . . . , αn−1) for all j < n, and
a2n−1 ≡[α0,...,αn−1]X qn(a0, . . . , a2n−2).
Now, suppose that a ∈ ∆A(α0, . . . , αn−1) hence (4.2) is valid for X = A. But since
the operation qn, the commutators [α0, . . . , αn−1], and the relations ∆(α0, . . . , αi−1,
αi+1, . . . , αn−1) agree in A and B, we get that (4.2) is also true for X = B, hence
a ∈ ∆B(α0, . . . , αn−1). This shows that ∆A(α0, . . . , αn−1) ⊆ ∆B(α0, . . . , αn−1).
The other inclusion is analogous.
For the 'only if' part, suppose that ∆A(α0, . . . , αn−1) = ∆B(α0, . . . , αn−1).
From Lemma 3.4(i) it follows that ∆A(αi0 , . . . , αik−1 ) = ∆B(αi0 , . . . , αik−1 ) for
all {i0, . . . , ik−1} ⊆ {0, . . . , n − 1} with i's pairwise distinct; and consequently from
Theorem 1.2, [αi0 , . . . , αik−1 ]A = [αi0 , . . . , αik−1 ]B.
(cid:3)
RELATIONAL DESCRIPTION OF HIGHER COMMUTATORS
11
Finally, we get to the proof of the Theorem 1.3. We restate the theorem once
again.
Theorem 1.3. Let A be an algebra with Mal'cev term q, and α0, . . . , αn−1 be
congruences of A. Then there exists a largest clone C on A containing q such that it
preserves congruences α0, . . . , αn−1, and all commutators of the form [αi0 , . . . , αik ]
where 0 ≤ i0 < · · · < ik−1 < n agree in A and (A, C).
Proof. We will show that the largest clone satisfying the required properties is
the clone C of all polymorphisms of the relation ∆A(α0, . . . , αn−1). Obviously
C ⊇ Clo A which implies that q ∈ C and ∆C(α0, . . . , αn−1) ⊇ ∆A(α0, . . . , αn−1).
But since the relation ∆A(α0, . . . , αn−1) is compatible with C, and the relation
∆C(α0, . . . , αn−1) is the smallest compatible relation containing cuben
i (a, b) for all
a ≡αi b and i < n, we have ∆C(α0, . . . , αn−1) = ∆A(α0, . . . , αn−1).
From Corollary 4.3, we know that C satisfies the specified property. The rest is to
prove that C is the largest such clone. Let B be another clone satisfying the property.
Then from the same corollary we get ∆A(α0, . . . , αn−1) = ∆B(α0, . . . , αn−1), and
consequently B ⊆ Pol(∆A(α0, . . . , αn−1)) = C.
(cid:3)
5. Proofs of basic properties of higher commutators
In this chapter we will present alternative proofs of basic properties of higher
commutators formulated in [5, 2]. For an arbitrary algebra A and its congruences
α0, . . . , αn−1, β0, . . . , βn−1, γ, and η the following is satisfied
(HC1) [α0, . . . , αn−1] ≤ α0 ∧ · · · ∧ αn−1;
(HC2) if αi ≤ βi for all i then [α0, . . . , αn−1] ≤ [β0, . . . , βn−1];
(HC3) [α0, . . . , αn−1] ≤ [α1, . . . , αn−1].
Furthermore, if A is a Mal'cev algebra then
(HC4) if σ is a permutation on the set {0, . . . , n − 1} then
[α0, . . . , αn−1] = [ασ(0), . . . , ασ(n−1)];
(HC5) congruences α0, . . . , αn−2 centralize αn−1 modulo γ if and only if
(HC6) if η ≤ α0, . . . , αn−1 then
[α0, . . . , αn−1] ≤ γ;
[α0/η, . . . , αn−1/η]A/η = ([α0, . . . , αn−1]A ∨ η)/η;
(HC7) if I is a non-empty set, and ρi are congruences of A for all i ∈ I then
_i∈I
[α0, . . . , αn−2, ρi] = [α0, . . . , αn−2,_i∈I
ρi];
(HC8) if i = 1, . . . , n − 1 then [[α0, . . . , αi−1], αi, . . . , αn−1] ≤ [α0, . . . , αn−1].
Although properties (HC1 -- 3) can be derived directly from Theorem 1.2 and the
definition of ∆(α0, . . . , αn−1), we will omit these proofs because methods would
work only for Mal'cev algebras; the general case have been proved in [11, Propo-
sition 1.3]. We will prove properties (HC4), (HC5), (HC7), and (HC8) -- the last
property (HC6) is a corollary of (HC5).
Proposition 5.1 (HC4, [2, Proposition 6.1]). Let A be a Mal'cev algebra and
let α0, . . . , αn−1 ∈ Con A. Then [α0, . . . , αn−1] = [ασ(0), . . . , ασ(n−1)] for each
permutation σ of {0, . . . , n − 1}.
12
J. OPRSAL
Proof. We claim that the relations ∆(ασ(0), . . . , ασ(n−1)) and ∆(α0, . . . , αn−1) are
identical up to permuting coordinates; precisely
∆(ασ(0), . . . , ασ(n−1)) = ∆(α0, . . . , αn−1)σ′
where σ′ is defined by σ′(k) = kσ−1(0) . . . kσ−1(n−1). One can check this fact by
observing that σ′(k)(σ(i)) = ki, and consequently
∆(ασ(0), . . . , ασ(n−1)) = _i<n
cuben
σ(i)(ασ(i))(cid:17)σ′
i (ασ(i)) = _i<n(cid:16)cuben
=(cid:0)_i<n
cubei,n(αi)(cid:1)σ′
= ∆(α0, . . . , αn−1)σ′
.
Finally, σ′(11 . . . 1) = 11 . . . 1, so the statement is true from Theorem 1.2 and
Lemma 2.1(ii).
(cid:3)
Proposition 5.2 (HC5, [2, Lemma 6.2]). Let A be a Mal'cev algebra and α0, . . . , αn−1,
γ be congruences of A. Then α0, . . . , αn−2 centralizes αn−1 modulo γ if and only
if γ ≥ [α0, . . . , αn−1].
Proof. The 'only if' part is given by the definition of the commutator, to prove the
'if' part suppose that a ∈ ∆(α0, . . . , αn−1) such that ak0...kn−20 ≡γ ak0...kn−21 for
all k ∈ 2n−1 \ {1 . . . 1}. We want to prove that a11...10 ≡γ a11...1. By Lemma 4.2
we know that
a11...1 ≡[α0,...,αn−1] qn(a00...0, . . . , a01...1)
but the right hand side is modulo γ congruent to
qn(a00...0, . . . , a01...10, a1...10, a00...0, . . . , a01...10) = a1...10.
So, we know that a1...11 ≡ a1...10 modulo γ since γ ≥ [α0, . . . , αn−1]. And finally,
α0, . . . , αn−2 centralizes αn−1 modulo γ from Lemma 3.3.
(cid:3)
The condition (HC6) is a direct corollary of condition (HC5); for a proof see [2,
Corollary 6.3]. The following two lemmata prepare for the proof of (HC7).
Lemma 5.3. Let A be an algebra, I a non-empty set, ρi ∈ Con A for all i ∈ I,
and α0, . . . , αn−2 ∈ Con A. Then
∆(α0, . . . , αn−2,_i∈I
ρi) = _i∈I
∆(α0, . . . , αn−2, ρi).
Proof. The statement can be derived directly from the definition of the relation
∆(α0, . . . , αn−1) by a simple calculation:
∆(α0, . . . , αn−2,_i∈I
ρi) =(cid:16)cuben
= _i∈I(cid:0)cuben
= _i∈I
0 α0 ∨ · · · ∨ cuben
n−2 αn−2 ∨ cuben
0 α0 ∨ · · · ∨ cuben
n−2 αn−2 ∨ cuben
ρi(cid:17)
n−1_i∈I
n−1 ρi(cid:1)
∆(α0, . . . , αn−2, ρi).
(cid:3)
The following lemma was in fact proved during the proof of [2, Lemma 6.4].
RELATIONAL DESCRIPTION OF HIGHER COMMUTATORS
13
Lemma 5.4. Let A be an algebra, I a non-empty set, ρi ∈ Con A for all i ∈ I,
and α0, . . . , αn−2 ∈ Con A. Then
[α0, . . . , αn−2,_i∈I
ρi] =
_{i0,...,ik−1}⊆I,
k<∞
[α0, . . . , αn−2, _i∈{i0,...,ik−1}
ρi].
k<∞
ρi].
η =
Proof. Throughout the proof we will extensively use compactness of subuniverses
of some fixed algebra that is if Ai for i ∈ J are subalgebras of some algebra A,
and a ∈ Wi∈J Ai then there exists a finite set K ⊆ J such that a ∈ Wi∈K Ai. To
shorten the notation let η denotes the right hand side of the statement. Hence
_{i0,...,ik−1}⊆I,
[α0, . . . , αn−2, _i∈{i0,...,ik−1}
First, we prove that α0, . . . , αn−2 centralizeWi∈I ρi modulo η.
Claim 1. If a ∈ ∆(α0, . . . , αn−2,Wi∈I ρi) then there is a finite set S ⊆ I such that
a ∈ ∆(α0, . . . , αn−2,Wi∈S ρi).
modulo [α0, . . . , αn−2,Wi∈T ρi].
j=0 [α0, . . . , αn−2,Wi∈Tj
Wk−1
Claim 2. If a ≡η b then there is a finite set T ⊆ I such that a and b are congruent
Again, there are finite sets T0, . . . , Tk−1 such that a and b are congruent modulo
The claim follows from Lemma 5.3 and the note at the beginning of this proof.
ρi]. And,
k−1
_j=0
[α0, . . . , αn−2, _i∈Tj
ρi] ≤ [α0, . . . , αn−2, _ρ∈T
ρ]
j=0 Tj. Which completes the proof of the second claim.
k ∈ 2n−1 \ {1 . . . 1}. Let S be a finite set from Claim 1, and let Tk be finite sets
where T =Sk−1
Suppose that a ∈ ∆(α0, . . . , αn−2,Wi∈I ρi) and ak0...kn−20 ≡η ak0...kn−21 for all
such that ak0...kn−20 and ak0...kn−21 are congruent modulo [α0, . . . , αn−2,Wρ∈Tk ρ];
set) and η′ =Wi∈U ρi. Then
(1) a ∈ ∆(α0, . . . , αn−2, η′), and
(2) ak0...kn−20 ≡[α0,...,αn−1,η′] ak0...kn−21 for all k ∈ 2n−1 \ {1 . . . 1}.
such sets exist by Claim 2. Let U = S ∪ T0...0 ∪ · · · ∪ T1...10 (note that U is a finite
So, from the Lemma 3.3 we know that a1...10 ≡[α0,...,αn−1,η′] a1...11. Finally, [α0, . . . , αn−1, η′] ≤
[α0, . . . , αn−1, η] because η′ ≤ η. Hence α0, . . . , αn−2 centralize Wi∈I ρi modulo η,
and consequently [α0, . . . , αn−2,Wi∈I ρi] ≤ η.
The other inclusion is obvious from the fact that
[α0, . . . , αn−2,_i∈I
ρi] ≥ [α0, . . . , αn−2,_i∈J
ρi]
for every finite set J ⊆ I.
(cid:3)
Lemma 5.5 ([2, Corollary 6.6]). Let A be a Mal'cev algebra and α1, . . . , αn−1,
ρ1, . . . , ρk congruences of A. Then
k
k
[α0, . . . , αn−2,
ρi] =
[α0, . . . , αn−2, ρi].
_i=1
_i=1
14
J. OPRSAL
Proof. It suffices to prove the statement just for k = 2. We will write
(a0, . . . , a2n−1−1) ≡∆(α0,...,αn−2,ρi) (b0, . . . , b2n−1−1)
if (a0, . . . , a2n−1−1, b0, . . . , b2n−1−1) ∈ ∆(α0, . . . , αn−2, ρi). Note that from Lemma
3.4, we know that the binary relation {(a, b) : a ≡∆(α0,...,αn−2,ρi) b} is a congruence
on ∆(α0, . . . , αn−2). From Lemma 5.3, we know that
∆(α0, . . . , αn−2, ρ1 ∨ ρ2) = ∆(α0, . . . , αn−2, ρ1) ∨ ∆(α0, . . . , αn−2, ρ2).
Since in Mal'cev algebras α ◦ β = Sg(α ∪ β) for any pair of congruences α, β, we
have that for all a, b ∈ ∆(α0, . . . , αn−2), a ≡∆(α0,...,αn−2,ρ1∨ρ2) b if and only if
there exists c such that a ≡∆(α0,...,αn−2,ρ1) c and b ≡∆(α0,...,αn−2,ρ2) c.
Now, we prove that
(5.1)
[α0, . . . , αn−2, ρ1 ∨ ρ2] ≤ [α0, . . . , αn−2, ρ1] ∨ [α0, . . . , αn−2, ρ2].
Suppose that a and b are congruent modulo [α0, . . . , αn−2, ρ1 ∨ ρ2], hence from
Proposition 3.6 there are e0, . . . , e2n−1−2 such that
(e0, . . . , e2n−1−2, a) ≡∆(α0,...,αn−2,ρ1∨ρ2) (e0, . . . , e2n−1−2, b).
From the above observation, we know that there is a tuple c ∈ ∆(α0, . . . , αn−2)
such that
(5.2)
and
(5.3)
c ≡∆(α0,...,αn−2,ρ1) (e0, . . . , e2n−1−2, a)
c ≡∆(α0,...,αn−2,ρ2) (e0, . . . , e2n−1−2, b)
If we use Lemma 4.2 for (5.2), we get that
a ≡[α0,...,αn−2,ρ1] qn(c0, . . . , c2n−1−1, e0, . . . , e2n−1−2);
similarly for (5.3), we get that
b ≡[α0,...,αn−2,ρ2] qn(c0, . . . , c2n−1−1, e0, . . . , e2n−1−2).
Altogether, a and b are congruent modulo [α0, . . . , αn−2, ρ1] ∨ [α0, . . . , αn−2, ρ2].
Which completes the proof of (5.1). The other inclusion is given by (HC2).
(cid:3)
Proposition 5.6 (HC7, [2, Lemma 6.7]). Let A be a Mal'cev algebra with congru-
ences α0, . . . , αn−2, and ρi, i ∈ I for I non-empty set. Then
[α0, . . . , αn−2,_i∈I
ρi] = _i∈I
[α0, . . . , αn−2, ρi].
Proof. If I is a finite set then the proposition is given by Lemma 5.5. If I is infinite,
we can first use Lemma 5.4 to get
ρi] =
_{i0,...,ik−1}⊆I
[α0, . . . , αn−2, _i∈{i0,...,ik−1}
ρi].
Then by using the finite case, the right hand side is equal to
[α0, . . . , αn−2,_i∈I
_{i0,...,ik−1}⊆I,
i∈{i0,...,ik−1}
[α0, . . . , αn−2, ρi] = _i∈I
[α0, . . . , αn−2, ρi].
(cid:3)
Proposition 5.7 (HC8, [2, Proposition 6.14]). Let A be a Mal'cev algebra with
congruences α0, . . . , αn−1, and i ∈ {1, . . . , n − 1}. Then
[[α0, . . . , αi−1], αi, . . . , αn−1] ≤ [α0, . . . , αn−1].
RELATIONAL DESCRIPTION OF HIGHER COMMUTATORS
15
Proof. For m ≥ i, define the map em : 2m → 2m−i+1 by k 7→ k′ki . . . km−1 where
k′ = k0 · k1 · . . . · ki−1. We claim that
∆([α0, . . . , αi−1], αi, . . . , αm−1)em ≤ ∆(α0, . . . , αm−1).
(5.4)
Because ∆([α0, . . . , αi−1], αi, . . . , αm−1)em is clearly a subuniverse of A2m
by the set
generated
(cubem−i+1
0
[α0, . . . , αi−1])em ∪ [j<m−i
(cubem−i+1
j+1
αi+j )em ,
it suffices to prove that this is a subset of ∆(α0, . . . , αm−1). The inclusions
(cubem−i+1
j+1
αi+j )em ⊆ ∆(α0, . . . , αn−1)
are consequences of the fact that em(k)(j + 1) = kj+i for all j < m − i. The
other inclusion, (cubem−i+1
[α0, . . . , αi−1])em ⊆ ∆(α0, . . . , αm−1), can be proved by
induction on m. If m = i then
0
(cube1
0[α0, . . . , αi−1])em = {(a, . . . , a, b) a ≡[α0,...,αi−1] b},
and all the elements of this set are in ∆(α0, . . . , αi−1) from Proposition 3.6. For
the induction step, observe that
face0
m(cid:0)(cube(m+1)−i+1
0
(a, b))em+1(cid:1) = face1
m(cid:0)(cube(m+1)−i+1
0
(a, b))em+1(cid:1)
=(cid:0)cubem−i+1
0
(a, b)(cid:1)em .
So the inclusion follows from Lemma 3.4(ii). Finally, from (5.4) for m = n, the fact
that en(k) = 1 . . . 1 if and only if k = 1 . . . 1, and Lemma 2.1 we get
ψ1...1(∆([α0, . . . , αi−1], αi, . . . , αn−1)) ≤ ψ1...1(∆(α0, . . . , αn−1)).
The rest is Theorem 1.2.
(cid:3)
Acknowledgements. The author would like to thank Erhard Aichinger for many
hours of fruitful discussions and many helpful comments on the manuscript.
References
[1] Erhard Aichinger, Peter Mayr, and Ralph McKenzie. On the number of finite algebraic struc-
tures. J. Eur. Math. Soc. (JEMS), 16(8):1673 -- 1686, 2014.
[2] Erhard Aichinger and Nebojsa Mudrinski. Some applications of higher commutators in
Mal'cev algebras. Algebra Universalis, 63(4):367 -- 403, 2010.
[3] Erhard Aichinger and Nebojsa Mudrinski. On various concepts of nilpotence for expansions
of groups. Publ. Math. Debrecen, 83(4):583 -- 604, 2013.
[4] Joel Berman, Pawe l Idziak, Petar Markovi´c, Ralph McKenzie, Matthew Valeriote, and Ross
Willard. Varieties with few subalgebras of powers. Trans. Amer. Math. Soc., 362(3):1445 --
1473, 2010.
[5] Andrei Bulatov. On the number of finite Mal'tsev algebras. In Contributions to general alge-
bra, 13 (Velk´e Karlovice, 1999/Dresden, 2000), pages 41 -- 54. Heyn, Klagenfurt, 2001.
[6] Andrei A. Bulatov. Three-element Mal'tsev algebras. Acta Sci. Math. (Szeged), 71(3-4):469 --
500, 2005.
[7] Andrei A. Bulatov and Pawe l M. Idziak. Counting Mal'tsev clones on small sets. Discrete
Math., 268(1 -- 3):59 -- 80, 2003.
[8] Ralph Freese and Ralph McKenzie. Commutator theory for congruence modular varieties,
volume 125 of London Mathematical Society Lecture Note Series. Cambridge University Press,
Cambridge, 1987.
[9] Martin Goldstern and Michael Pinsker. A survey of clones on infinite sets. Algebra Universalis,
59(3-4):365 -- 403, 2008.
16
J. OPRSAL
[10] Pawe l M. Idziak. Clones containing Mal'tsev operations. Internat. J. Algebra Comput.,
9(2):213 -- 226, 1999.
[11] Nebojsa Mudrinski. On Polynomials in Mal'cev Algebras. PhD thesis, University of Novi Sad,
2009.
[12] B.A. Romov. Galois correspondence between iterative post algebras and relations on an infi-
nite set. Cybernetics, 13(3):377 -- 379, 1977.
[13] Jason Shaw. Commutator relations and the clones of finite groups. Algebra Universalis,
72(1):29 -- 52, 2014.
Department of Algebra, Faculty of Mathematics and Physics, Charles University
in Prague, Sokolovsk´a 83, 186 75 Praha, Czech Republic
Institute for Algebra, Johannes Kepler University, 4040 Linz, Austria
E-mail address: [email protected]
|
1702.02257 | 3 | 1702 | 2017-11-17T13:22:42 | Closure operators, frames, and neatest representations | [
"math.RA"
] | Given a poset $P$ and a standard closure operator $\Gamma:\wp(P)\to\wp(P)$ we give a necessary and sufficient condition for the lattice of $\Gamma$-closed sets of $\wp(P)$ to be a frame in terms of the recursive construction of the $\Gamma$-closure of sets. We use this condition to show that given a set $\mathcal{U}$ of distinguished joins from $P$, the lattice of $\mathcal{U}$-ideals of $P$ fails to be a frame if and only if it fails to be $\sigma$-distributive, with $\sigma$ depending on the cardinalities of sets in $\mathcal{U}$. From this we deduce that if a poset has the property that whenever $a\wedge(b\vee c)$ is defined for $a,b,c\in P$ it is necessarily equal to $(a\wedge b)\vee (a\wedge c)$, then it has an $(\omega,3)$-representation. This answers a question from the literature. | math.RA | math |
Closure operators, frames, and neatest
representations
Rob Egrot
Abstract
Given a poset P and a standard closure operator Γ : ℘(P ) → ℘(P ) we
give a necessary and sufficient condition for the lattice of Γ-closed sets of
℘(P ) to be a frame in terms of the recursive construction of the Γ-closure
of sets. We use this condition to show that given a set U of distinguished
joins from P , the lattice of U-ideals of P fails to be a frame if and only if
it fails to be σ-distributive, with σ depending on the cardinalities of sets
in U. From this we deduce that if a poset has the property that whenever
a ∧ (b ∨ c) is defined for a, b, c ∈ P it is necessarily equal to (a ∧ b) ∨ (a ∧ c),
then it has an (ω, 3)-representation. This answers a question from the
literature.
1 Introduction
Schein [15] defines a meet-semilattice S to be distributive if it satisfies the first
order definable condition that whenever a ∧ (b ∨ c) is defined, (a ∧ b) ∨ (a ∧ c)
is also defined and the two are equal. A dual definition can, of course, be
made for join-semilattices. Here for simplicity all semilattices are considered
to be meet-semilattices, and the order duals to our results are left unstated.
Note that Schein's version of distributivity is strictly weaker than the notion
of distributivity introduced by Gratzer and Schmidt [10] (see for example [20]),
though they coincide for lattices. Schein's distributivity (hereafter referred to
as 3-distributivity, for reasons that will become clear later) is equivalent to
the property of being embeddable into a powerset algebra via a semilattice
homomorphism preserving all existing binary joins [2].
Schein's 3-distributivity can be generalized to the concept of α-distributivity
for cardinals α (see definition 3.1). This notion has been studied when α = n <
ω [11], when α = ω [20, 4], and when α is any regular cardinal [12]. Note that if
m, n ≤ ω with m < n then n-distributivity trivially implies m-distributivity, but
the converse is not true [13]. A recurring theme in these investigations is that
a semilattice S is α-distributive if and only if the complete lattice of downsets
of S that are closed under existing α-small joins is a frame (i.e. it satisfies the
complete distributivity condition that x ∧ W Y = WY (x ∧ y) for all elements x
and subsets Y ).
1
Notions relating to distributivity have also been studied in the more general
setting of partially ordered sets (posets) [18, 12]. Note that the concepts in [18]
and [12] are not equivalent, even for semilattices (that of [18] is a straightforward
generalization of the distributivity of Gratzer and Schmidt [10], while that of
[12] is more closely related to that of Schein [15]).
As the transition from lattices to semilattices causes previously equivalent
formulations of distributivity to diverge, so too does the transition from semi-
lattices to posets. The following example is of particular interest to us. For
a semilattice, being an ω-distributive poset as defined in [12] is equivalent to
being an ω-distributive semilattice in the sense used here [12, proposition 2.3],
which is in turn equivalent to being embeddable into a powerset algebra via a
map preserving all existing finite meets and joins [2]. However, this is not true
for arbitrary posets, as the ω-distributivity of [12] is strictly stronger than the
powerset algebra embedding property [12, example 4.2 and theorem 4.8].
The property of being embeddable into a powerset algebra via an embedding
preserving meets and joins of certain cardinalities has been studied using the
terminology representable [3, 14, 7] (see definition 4.1). A notable departure
from the semilattice case is that the first order theory of representable posets is
considerably more complex. For example, while the class of (m, n)-representable
posets is elementary for all m, n with 2 < m, n ≤ ω [7], explicit first order axioms
are not known, and the class cannot be finitely axiomatized [6]. This contrasts
with the semilattice case where intuitive first order axioms are known, and only
a finite number are required to ensure (ω, n)-representability for finite n [2].
In [3] a condition for posets, which we will refer to as MD, generalizing the
distributive property for semilattices is defined (see definition 4.2). The authors
conjecture ([3, section 3]) that this condition is sufficient to ensure a poset has a
representation preserving existing binary joins and all existing finite meets (they
call this a neatest representation). It is easily seen that this is not a necessary
condition for such a representation, e.g. [7, example 1.5]).
In the original phrasing of [3, definition 1] it is unclear whether a neatest
representation must preserve arbitrary existing meets or only finite ones. From
context we assume the latter, as the with the former definition the conjecture is
false. To see this note that every Boolean algebra satisfies MD, and indeed the
stronger condition that if x ∧ W Y is defined then WY (x ∧ y) is also defined and
the two are equal (a Boolean algebra also satisfies the dual to this condition,
so a complete Boolean algebra is structurally both a frame and a co-frame).
However, it is well known that a Boolean algebra has a representation preserving
arbitrary meets and/or joins if and only if it atomic [1, corollary 1].
However, if we only demand that finite meets are preserved then the con-
jecture is indeed correct, which we prove in this note. The main step in our
proof is a result classifying the standard closure operators on ℘(P ) whose lat-
tices of closed sets are frames as being precisely those that can be constructed
using a certain recursive procedure (theorem 3.5). This can be viewed as a
generalization of [12, theorem 2.7]. The proof of the conjecture about neatest
representations is then an easy corollary.
We note that the argument in the solution of this conjecture boils down to a
2
straightforward extension of the forward direction of the argument for semilat-
tices in [11, theorem 2] to the poset setting. The result however is nevertheless
perhaps surprising given that the class of posets with this kind of representation
cannot be finitely axiomatized (see section 5 for a discussion of this).
We proceed as follows. In section 2 we define introduce join-specifications
and the concept of the radius of a standard closure operator, and assorted sup-
porting terminology. In section 3 we use this to prove the central theorem (the-
orem 3.5), and in the fourth section we prove a general version of the conjecture
on neatest representations (corollary 4.6). The final section is devoted to a short
discussion of the implications of this for the theory of poset representations, and
some indirectly related questions in complexity theory.
2 Join-specifications and standard closure oper-
ators
We begin with a brief introduction to closure operators and their relationship
with poset completions. This topic has been studied in detail, and a recent sur-
vey can be found in [8]. Nevertheless it will be useful to present some well known
results with a consistent terminology, and to make explicit some facts that are
only implicit elsewhere. We will give specific references when appropriate.
Definition 2.1 (closure operator). Given a set X a closure operator on X is a
map from ℘(X) to itself that is extensive, monotone and idempotent. I.e. such
that for all S, T ⊆ X we have:
1. S ⊆ Γ(S),
2. S ⊆ T =⇒ Γ(S) ⊆ Γ(T ), and
3. Γ(Γ(S)) = Γ(S).
Given a set S ⊆ P we denote {p ∈ P : p ≤ s for some s ∈ S} by S↓, and
p↓ is used a shorthand for {p}↓. Given a poset P we are interested in closure
operators on P . In particular we are interested in standard closure operators,
that is, closure operators such that Γ({p}) = p↓ for all p ∈ P .
Definition 2.2 (join-completion). Given a poset P a join-completion of P is
a complete lattice L and an order embedding e : P → L such that e[P ] (the
image of P under e) is join-dense in L.
Given a standard closure operator Γ : ℘(P ) → ℘(P ), the Γ-closed sets form a
complete lattice when ordered by inclusion (which we denote with Γ[℘(P )]), and
the map φΓ : P → Γ[℘(P )] defined by φΓ(p) = p↓ is a join-completion of P (we
usually omit the subscript and just write φ). If I is an indexing set and Ci is a
Γ-closed set for all i ∈ I then VI Ci = TI Ci and WI Ci = Γ(SI Ci) (see e.g. [8,
section 2.1]). Conversely, given a join-completion e : P → L the sets e−1[x↓] for
x ∈ L define the closed sets of a standard closure operator Γe : ℘(P ) → ℘(P ).
This well known connection can be expressed as the following proposition.
3
Proposition 2.3. There is a dual isomorphism between the complete lattice
of standard closure operators on P (ordered by pointwise inclusion) and the
complete lattice of (e[P ] preserving isomorphism classes of ) join-completions of
P (ordered by defining (e1 : P → L1) ≤ (e2 : P → L2) if and only if there is an
order embedding ψ : L1 → L2 such that ψ ◦ e1 = e2. If ψ exists it will necessarily
preserve all existing meets).
Proof. A direct argument is straightforward. See for example [8, propositions
2.1 and 2.19], or the introduction to [18], for equivalent results.
We are interested in join-completions e : P → L where the embedding e
preserves certain existing joins from P . Often this is done by making some
uniform selection, such the joins of all sets smaller than some fixed cardinal
(when they exist, see e.g. [17]). We intend to be more general, and to that end
we make the following definition.
Definition 2.4 (join-specification). Let P be a poset. Let U be a subset of
℘(P ). Then U is a join-specification (of P ) if it satisfies the following conditions:
1. W S exists in P for all S ∈ U,
2. {p} ∈ U for all p ∈ P , and
3. ∅ /∈ U.
Definition 2.4 is similar to that of a subset selection (see e.g. [8, section 2]).
The difference is that we demand that the selection contains the singletons and
that every selected set has a defined join. This serves to tidy up some of the
later definitions.
Definition 2.5 (radius of U). Given a join-specification U we define the radius
of U to be the smallest cardinal σ such that σ > S for all S ∈ U.
Definition 2.6 (ΓU ). Given a join-specification U with radius σ and S ⊆ P we
define the following subsets of P using transfinite recursion.
• Γ0(S) = S↓.
• If α + 1 is a successor ordinal then Γα+1(S) = {W T : T ∈ U and T ⊆
Γα(S)}↓.
• If λ is a limit ordinal Γλ(S) = Sβ<λ Γβ(S).
We define ΓU : ℘(P ) → ℘(P ) by ΓU (S) = Γχ(S) for all S ∈ ℘(P ), where χ is
the smallest regular cardinal with σ ≤ χ.
Definition 2.7 (U-ideal). Given a join-specification U we define a U-ideal of
P to be a down-set closed under joins from U. We define the empty set to be a
U-ideal.
The following is a generalization of [12, proposition 1.2].
4
Proposition 2.8. If U is a join-specification then ΓU is the standard closure
operator taking S ⊆ P to the smallest U-ideal containing S.
Proof. Let S ∈ ℘(P ) \ {∅}, and let I be the smallest U-ideal containing S. Then
we must have ΓU (S) ⊆ I by the closure requirements of I.
It is easy to see
that ΓU (S) is a down-set, so it remains only to show that ΓU (S) is closed under
joins from U. So let X ∈ U and suppose X ⊆ ΓU (S). Then by definition of
ΓU we have X ⊆ Sβ<χ Γβ(S), so for each x ∈ X there is some βx < χ with
x ∈ Γβx(S). Since χ is regular there must be β′ with βx ≤ β′ < χ for all x ∈ X,
and so W X ∈ Γβ ′+1(S) ⊆ Γχ(S) = ΓU (S) as required. It is straightforward to
show that the function taking sets to the smallest U-ideal containing them is a
standard closure operator.
Proposition 2.9. Given a join-specification U, the canonical map φ : P →
ΓU [℘(P )] preserves arbitrary existing meets and the joins of all sets from U.
Proof. This is well known, but we give a short proof for the sake of completeness.
First recall that arbitrary intersections of Γ-closed sets are also Γ-closed. So if
V S = t in P , then V φ[S] = TS s↓ = t↓ = φ(t) as required. Preservation of
joins from U follows from lemma 2.11 and corollary 2.13(2) below.
Note that φ may also preserve joins of sets that are not in U. Given a join-
specification U there will generally be more than one join-completion preserving
the specified joins. We are interested in ΓU [℘(P )], which is in fact the largest
such join-completion ([16] attributes this result to [5]). This is easily seen by
noting that if e : P → L is a join-completion such that e(W S) = W e[S] for some
S ⊆ P , then whenever x ∈ L and S ⊆ e−1[x↓] we must have W S ∈ e−1[x↓] as
otherwise W e[S] 6= e(W S). So in particular if e : P → L preserves joins from U
then e−1[x↓] is a U-ideal for all x ∈ L. Since L is isomorphic to {e−1[x↓] : x ∈ L}
considered as a lattice ordered by inclusion the result follows as we can think of
L as being a subset of the set of all U-ideals.
Definition 2.10 (UΓ). Any standard closure operator Γ : ℘(P ) → ℘(P ) defines
a join-specification UΓ by
S ∈ UΓ ⇐⇒ _ S exists and for all Γ-closed sets C we have S ⊆ C =⇒ _ S ∈ C
Lemma 2.11. For UΓ as in definition 2.10 and the canonical φ : P → Γ[℘(P )]
we have
S ∈ UΓ ⇐⇒ _ S exists and φ(_ S) = _ φ[S]
Proof. Let S ∈ UΓ. Then W φ[S] is the smallest Γ-closed set containing S, so
must therefore contain W S, and is indeed equal to (W S)↓ = φ(W S). Conversely,
if W S exists and W φ[S] = φ(W S) then every Γ-closed set containing S must
contain W S, and so S ∈ UΓ by definition.
The join-specifications of a poset P are a subset of ℘(℘(P )), and as this
subset is closed under taking arbitrary unions and intersections they form a
complete lattice when ordered by inclusion. This leads us to the following
result.
5
Proposition 2.12. Let J be the lattice of join-specifications of P , and let C be
the lattice of standard closure operators on P . Define f : J → C and g : C → J
by f (U) = ΓU and g(Γ) = UΓ. Then f and g form a Galois connection between
C and J .
for all Γ ∈ C and U ∈ J we have ΓU (T ) ≤ Γ(T ) for all
T ∈ ℘(P ) ⇐⇒ U ⊆ UΓ.
I.e.
Proof. Let Γ ∈ C and let U ∈ J . Suppose ΓU ≤ Γ. Since J is ordered by
inclusion we let S ∈ U, and we aim to show that S ∈ UΓ. Now, ΓU (S) is the
smallest U-ideal containing S, so W S ∈ ΓU (S), and since ΓU (S) ≤ Γ(S) this
means any Γ-closed set containing S must contain W S. But then by definition
S ∈ UΓ so we are done.
For the converse suppose U ⊆ UΓ and let T ∈ ℘(P ). We aim to show that
ΓU (T ) ⊆ Γ(T ). Since ΓU (T ) is the smallest U-ideal containing T it is sufficient
to show that Γ(T ) is also a U-ideal. But since U ⊆ UΓ this follows directly from
the definition of UΓ.
Corollary 2.13.
(1) For all standard closure operators Γ : ℘(P ) → ℘(P ) we have ΓUΓ ≤ Γ, but
we do not necessarily have Γ = ΓUΓ.
(2) For all join-specifications U of P we have U ⊆ UΓU , but we do not neces-
sarily have U = UΓU .
(3) If U ′ = UΓU then ΓU = ΓU ′.
(4) If Γ′ = ΓUΓ then UΓ = UΓ′.
Proof. This all follows from the fact that f and g from proposition 2.12 form a
Galois connection, with examples 2.14 and 2.15 witnessing lack of equality for
parts (1) and (2) respectively.
Example 2.14. Let P be the three element antichain {a, b, c}, and let the
Γ-closed sets be ∅, {a}, {b}, {c}, and {a, b, c}. Then UΓ = {{a}, {b}, {c}} (so
Γ[℘(P )] is the MacNeille completion of P ), and the set of UΓ-ideals of P is just
℘(P ) (so ΓUΓ [℘(P )] is the Alexandroff completion composed of all down-sets of P
in this case). Then, for example, Γ({a, b}) = {a, b, c}, but ΓUΓ({a, b}) = {a, b}.
Example 2.14 also demonstrates that not every standard closure operator
arises from a join-specification. This is because the only join-specification on
P is {{a}, {b}, {c}}, and as we saw in the example the induced closure opera-
tor produces the Alexandroff completion, and not, for example, the MacNeille
completion. This issue is also discussed in [16, section 2].
Example 2.15. Let P be a poset containing elements x, x′, y, y′, and z. Let the
non-trivial orderings be x < x′ < z, and y < y′ < z, so x ∨ y = x′ ∨ y′ = z. Let
U = {{x}, {x′}, {y}, {y′}, {z}, {x, y}} be a join-specification. Then {x′, y′} ∈
UΓU \ U.
6
It follows from corollary 2.13 that different join-specifications can define
the same closure operator. Given a standard closure operator Γ arising from
a join-specification, while there is not necessarily a minimal generating join-
specification, definition 2.5 allows us to define a class of join-specifications gen-
erating Γ whose sets have the smallest possible maximum size. This puts an
upper bound on the number of iterations required in a recursive construction of Γ
(though we can't expect to do better than ω, even if all the sets in the generating
join-specification have bounded finite size). These minimal join-specifications
(definition 2.17 below) are also relevant when discussing the distributivity of
the lattice of Γ-closed sets (see corollary 3.6).
Definition 2.16 (radius of Γ). Given a standard closure operator Γ such that
Γ = ΓU for some join-specification U, we define the radius of Γ to be the
minimum of {χ : χ is the radius of a join-specification U ′ of P with ΓU ′ = Γ}.
Definition 2.17 (minimal join-specification). A join-specification U of P is
minimal if the radius of U is equal to the radius of ΓU .
The following technical lemma will be used in the next section.
Lemma 2.18. Let U be a join-specification. Then the following hold for all
S ∈ ℘(P ):
(1) If ΓU (S) = p↓ then p = W S.
(2) If p = W S and p ∈ ΓU (S) then S ∈ UΓU .
Proof. For the first part note that p must be an upper bound for S, so if p 6= W S
then S has another upper bound q with p 6≤ q. But ΓU (S) ⊆ p↓ ∩ q↓ by
proposition 2.8, and thus p /∈ ΓU (S), which would be a contradiction. For the
second part note that since W S = p, by definition 2.10 we have S ∈ UΓU ⇐⇒
for all ΓU -closed sets C we have S ⊆ C =⇒ p ∈ C. Since ΓU (S) is the smallest
ΓU -ideal containing S, if p ∈ ΓU (S) then every ΓU -ideal containing S must also
contain p and we are done.
3 When is a lattice of U -ideals a frame?
As mentioned in the introduction, definitions of distributivity in semilattices
modeled on that of Schein [15] give rise to results that can be stated in our
terminology as a semilattice S is α-distributive if and only if the lattice of Uα-
ideals of S is α-distributive, where Uα contains all sets smaller than α whose joins
are defined (where α is some finite or regular cardinal [11, 4, 12]). Moreover,
it turns out that if this lattice of Uα-ideals is α-distributive then it will be a
frame (see definition 3.1 below). We can extend this to posets and arbitrary
join-specifications, in the sense that if the lattice of U-ideals of P fails to be
a frame then it must be because distributivity fails for the embedded images
of some element of P and some set in U (see corollary 3.7). The key result is
theorem 3.5, which can be seen as a partial generalization of [12, theorem 2.7]
to arbitrary join-specifications.
7
Definition 3.1 (α-distributive). Given a cardinal α we say a lattice (or a
semilattice) L is α-distributive if given {x} ∪ Y ⊆ L such that Y < α, if
x ∧W Y exists then WY (x ∧ y) also exists and the two are equal. Note that when
3 ≤ n ≤ ω, in the lattice case n-distributivity is just distributivity. When L is
a complete lattice and L is α-distributive for all α we say L is a frame.
From now on we fix a minimal join-specification V and we define Φ = ΓV .
Let σ be the radius of V and let χ be the smallest regular cardinal with σ ≤ χ.
Similarly let σ′ be the radius of UΦ (recall definition 2.10), and let χ′ be the
smallest regular cardinal with σ′ ≤ χ′.
Definition 3.2 (Υ). Given S ⊆ P we define the following subsets of P using
transfinite recursion.
• Υ0(S) = S↓.
• If α + 1 is a successor ordinal then Υα+1(S) = {W T : T ∈ UΦ and
T ⊆ Υα(S)}.
• If λ is a limit ordinal Υλ(S) = Sβ<λ Υβ(S).
We define Υ : ℘(P ) → ℘(P ) by Υ(S) = Υχ′ (S) for all S ∈ ℘(P ).
This definition differs from definition 2.6 in that we do not close downwards
during the successor steps. Also note the use of χ′ in place of χ. This is
important in the proof of corollary 3.6. Note that Υ will not necessarily be a
closure operator as it may not be idempotent.
Lemma 3.3. Υ(S) ⊆ Φ(S) for all S ∈ ℘(P ).
Proof. We have Φ = ΓV = ΓUΦ by proposition 2.13(3), and by definition of Υ
we have Υ(S) ⊆ ΓUΦ(S) for all S ∈ ℘(P ).
Lemma 3.4. Let J be an indexing set, and let I, Kj ∈ Φ[℘(P )] for all j ∈ J.
Then I ∩ Υ(SJ Kj) ⊆ Φ(SJ (I ∩ Kj)).
Proof. We note that Υ(SJ Kj) = Sα<χ′ Υα(SJ Kj). We proceed by showing
that I ∩ Υα(SJ Kj) ⊆ Φ(SJ (I ∩ Kj)) for all α using transfinite induction on
α.
If α = 0 the result is trivial so consider the successor ordinal α + 1 and
assume the appropriate inductive hypothesis. Let p ∈ I ∩ Υα+1(SJ Kj). Then
p = W T for some T ∈ UΦ with T ⊆ Υα(SJ Kj), and so since p ∈ I we have
T ⊆ I ∩Υα(SJ Kj). By the inductive hypothesis this means T ⊆ Φ(SJ (I ∩Kj)),
and thus by definition of UΦ we have p ∈ Φ(SJ (I ∩ Kj)) as required. The limit
case is trivial.
Theorem 3.5. The following are equivalent:
1. Φ(S) = Υ(S) for all S ∈ ℘(S).
2. Φ[℘(P )] is a frame when considered to be a lattice ordered by inclusion.
8
Proof. (1 =⇒ 2). Let J be an indexing set and let I, Kj ∈ Φ[℘(P )] for all
j ∈ J. We must show that I ∩ Φ(SJ Kj) = Φ(SJ (I ∩ Kj)). Since we are
assuming Φ = Υ and the right side is always included in the left it remains only
to show that I ∩ Υ(SJ Kj) ⊆ Φ(SJ (I ∩ Kj)), and this is lemma 3.4.
(2 =⇒ 1). We note that Φ0(S) = Υ0(S) for all S ∈ ℘(P ) by definition,
and we proceed by using transfinite induction to show that Φα(S) ⊆ Υα(S) for
all cardinals α and for all S ∈ ℘(P ). As Υ(S) ⊆ Φ(S) by lemma 3.3 the result
then follows.
Let S ∈ ℘(P ) and suppose Φα(S) ⊆ Υα(S) for some cardinal α. Let T ⊆
Φα(S) and suppose T ∈ U. Let p ≤ W T . Then in Φ[℘(P )] we have p↓ ∩WT t↓ =
p↓ ∩ (W T )↓ = p↓ by proposition 2.9. Since Φ[℘(P )] is a frame we also have
WT (p↓ ∩ t↓) = p↓, and thus WT (p↓ ∩ t↓) = Φ(ST (p↓ ∩ t↓)) = Φ(T ↓ ∩ p↓) = p↓.
So by lemma 2.18(1) we have p = W(T ↓ ∩ p↓), and thus by lemma 2.18(2) we
have T ↓ ∩ p↓ ∈ UΦ. But T ↓ ⊆ Φα(S) ⊆ Υα(S), and thus T ↓ ∩ p↓ ⊆ Υα(S), and
so p ∈ Υα+1(S) as required. The limit case is trivial and so we are done.
Corollary 3.6. If Φ[℘(P )] is not a frame then there is T ∈ V and p ∈ P such
that
1. p ≤ W T , and
2. φ(p) ∧ W φ[T ] 6= WT (φ(p) ∧ φ(t)) in Φ[℘(P )].
Here φ is the canonical map from P into Φ[℘(P )] taking p to p↓.
Proof. By theorem 3.5 if Φ[℘(P )] is not a frame then there is S ∈ ℘(P ) with
Φ(S) 6= Υ(S). Let α be the smallest cardinal such that Φα(S) 6⊆ Υ(S). This
exists by lemma 3.3 and the assumption that Φ(S) 6= Υ(S). Moreover, α cannot
be 0 or a limit cardinal so α = β + 1 for some β. Choose any p ∈ Φα(S) \ Υ(S).
Then by minimality of α we must have p /∈ Φβ(S), and p ≤ W T for some
In Φ[℘(P )] we have p↓ ∩ WT t↓ = p↓. However, if
T ∈ V with T ⊆ Φβ(S).
p↓ = WT (p↓ ∩ t↓) = Φ(T ↓ ∩ p↓), then p = W(T ↓ ∩ p↓) and T ↓ ∩ p↓ ∈ UΦ by
lemma 2.18. Since T ↓ ∩ p↓ ⊆ Φβ(S), by choice of α we have T ↓ ∩ p↓ ⊆ Υ(S).
Since Υ(S) is closed under joins from UΦ (by an argument similar to that in the
proof of proposition 2.8), and p /∈ Υ(S) by choice of p, we must therefore have
p↓ 6= WT (p↓ ∩ t↓) to avoid contradiction.
Here the minimality of V is relevant as it gives a smaller upper bound on the
possible size of a cardinal α for which α-distributivity can fail. Two immediate
consequences of corollary 3.6 are the following.
Corollary 3.7. If Φ[℘(P )] is not a frame then Φ[℘(P )] must fail to be σ-
distributive (recall that σ is the radius of V).
Proof. If Φ[℘(P )] is not a frame then distributivity fails for φ(p) ∧ W φ[T ] for
some T ∈ V, and T < σ by definition.
Corollary 3.8. Given a poset P the lattice of all down-sets of P closed under
existing finite joins is a frame if and only if it is distributive.
9
Proof. This lattice is produced by the closure operator arising from the join-
specification containing all non-empty finite sets with defined joins. The radius
of this join-specification is ω, and the result then follows from corollary 3.7.
In the case where κ is a regular cardinal and V = Uκ = {S ∈ ℘(P ) \ {∅} :
S < κ and W S exists} theorem 3.5 and its corollaries are superseded by [12,
theorem 2.7].
Indeed, in this case the mentioned theorem shows, using our
notation, that Φ[℘(P )] is a frame if and only if Φ(S) = {W T : T ∈ V and
T ⊆ S↓} for all S ∈ ℘(P ).
Various distributivity properties for join-completions of posets (and qua-
siorders) are investigated in [9]. See in particular [9, theorem 2.1] for a summary
of other properties equivalent to the join-completion corresponding to a given
standard closure operator being a frame.
4 Sentences guaranteeing representability
Definition 4.1 ((α, β)-representable). For cardinals α and β a poset P is (α, β)-
representable if there is an embedding h : P → F , where F is a powerset algebra,
such that h preserves meets of sets with cardinalities strictly less than α, and
joins of sets with cardinalities strictly less than β. When α = β we just write
α-representable.
The following definition appears under a slightly different name as [3, defi-
nition 2].
Definition 4.2 (MD). A poset P is MD (meet distributive) if for all a, b, c ∈ P ,
if a ∧ (b ∨ c) is defined then (a ∧ b) ∨ (a ∧ c) is also defined and the two are equal.
Given a cardinal α ≥ 3 we can generalize this to the following.
Definition 4.3 (MDα). P is MDα if whenever {a} ∪ X ⊆ P , X < α and
a ∧ W X is defined in P , we have WX (a ∧ x) is also defined in P and the two are
equal.
Note that for semilattices MDα is equivalent to α-distributivity. We use our
terminology to avoid confusion with the distributivity for posets defined in [12].
Given a cardinal γ suppose V = Uγ is the set of all sets S ⊆ P such that S < γ
and W S exists in P , and define Φ and Υ for this V as in section 3. Note that in
section 3 we say V is minimal, but minimality is not essential in the definitions
of Φ and Υ, or the theory developed therein. So the fact that Uγ may not be
minimal is not a problem here. We have the following theorem.
Theorem 4.4. Let γ be any cardinal strictly greater than 2. If P is MDγ then
Φ[℘(P )] is a frame.
Proof. By corollary 3.6 if Φ[℘(P )] fails to be a frame there must be T ∈ V and
p ∈ P such that p ≤ W T and φ(p) ∧ W φ[T ] 6= WT (φ(p) ∧ φ(t)) in Φ[℘(P )].
But by definition of V we must have T < γ, and so by proposition 2.9 and the
assumption that P is MDγ we have φ(p)∧W φ[T ] = φ(p∧W T ) = φ(WT (p∧t)) =
WT (φ(p) ∧ φ(t)), so Φ[℘(P )] must be a frame after all.
10
Corollary 4.5. Every MD poset has an (ω, 3)-representation.
Proof. Let V = U3 and let Φ be defined as in section 3. Then as Φ[℘(P )] is dis-
tributive it embeds into a powerset algebra F via a map preserving finite meets
and joins. Since φ : P → Φ[℘(P )] preserves binary joins and arbitrary meets
we obtain an (ω, 3)-representation for P by composing φ with the embedding of
Φ[℘(P )] into F .
By setting the value of γ appropriately we also obtain the following result.
Corollary 4.6. If 3 ≤ n ≤ ω then every MDn poset has an (ω, n)-representation.
When α > ω we do not obtain a result corresponding to corollary 4.6 because
a frame is not necessarily (ω, α)-representable in this case. We know this because
for every α > ω, every non-atomic countable Boolean satisfies MDα but is not
(ω, α)-representable, as discussed in the introduction.
Note that it follows from theorem 4.4 and [12, theorem 2.7] that if κ is a
regular cardinal we have MDκ =⇒ κ-distributive in the sense of [12] (which
for convenience we shall dub HMκ). Also by [12, theorem 2.7], being HMκ is
equivalent to having Φ(S) = {W T : T ∈ Uκ and T ⊆ S↓} for all S ∈ ℘(P ) (as
mentioned in the passage following corollary 3.8). Using this we can show that
6=⇒ MDκ for all regular κ, as example 4.7 below provides a poset that
HMκ
is HMκ, but fails to be MDκ, for all regular κ.
Example 4.7. Let P be the poset in the diagram below and let κ be any
regular cardinal. Given S ∈ ℘(P ) define Φ′(S) = {W T : T ∈ Uκ and T ⊆ S↓}.
Then a ∧ (b ∨ c) = c, but a ∧ b does not exist. So P fails to be MD3, and thus
fails to be MDκ. However, the only non-trivial non-principal downsets of P are
{b, c} and {a, b, c}, and Φ({b, c}) = (b ∨ c)↓ = Φ′({b, c}), and Φ({a, b, c}) = P =
Φ′({a, b, c}), and so P is HMκ for all regular κ.
•
•a
⑤
⑤
⑤
⑤
⑤
⑤
⑤
⑤
⑤
⑤
⑤
⑤
⑤
⑤
⑤
⑤
•b
•c
Combining the preceding discussion with [12, example 4.2 and theorem 4.8]
we obtain the following chain of strictly one way implications.
MDω =⇒ HMω =⇒ ω-representable
5 Obstructions to representability
Another way to view these results is to think about obstructions to a poset
being, for example, 3-representable. For the sake of this discussion we say P
has a triple (a, b, c) if there are a, b, c ∈ P such that a ∧ (b ∨ c) is defined. If
(a, b, c) is a triple of P and (a ∧ b) ∨ (a ∧ c) is defined but not equal to a ∧ (b ∨ c)
11
we call (a, b, c) a split triple, and we say a triple (a, b, c) is an indeterminate
triple if (a ∧ b) ∨ (a ∧ c) is not defined.
It's easy to see that having a split triple is a sufficient condition for a poset
P to fail to be 3-representable. Moreover, existence of a split triple can be
defined in first order logic, so if having a split triple were also a necessary con-
dition for a poset to fail to be 3-representable it would follow that the class
of 3-representable posets is finitely axiomatizable. This is not the case [6], so
there must be other, less obvious obstructions to 3-representability. This is not
surprising, as even in the simpler semilattice case the existence of a split triple
is not necessary for failure of 3-representability. However, the semilattices that
fail to be (ω, 3)-representable can be characterized as those that contain either
a split triple or an indeterminate triple (this is [2, theorem 2.2] phrased in the
terminology of triples), which is also a first order property. Since the class of
(m, n)-representable posets is elementary for all m and n with 2 < m, n ≤ ω, it
follows that the class of posets that fail to be 3-representable cannot be axiom-
atized in first order logic at all (otherwise it would be finitely axiomatizable, in
contradiction with [6]). This contrasts starkly with the intuitive finite axioma-
tization of the semilattice case.
Putting this another way, let S be the class of posets containing a split
triple, let I be the class of posets containing an indeterminate triple but no split
triple, let L be the class of MD-posets, and let R be the class of 3-representable
posets. Then S, I, and L are all basic elementary and partition the class of all
posets. Moreover, L ⊂ R, and S ⊂ ¯R. However, I ∩ R is elementary but not
finitely axiomatizable, and I ∩ ¯R is not even elementary. This contrasts with
the semilattice case where L and R coincide.
On the other hand, one reason we might expect these obstructions to repre-
sentability to defy simple characterization comes from computational complexity
theory. It was shown in [19] that the problem of deciding whether a finite poset
has an (m, n)-representation is NP-complete for countable m, n with at least
one greater than 3. So if there were a simple characterization of the finite posets
that fail to be (m, n)-representable, such as exists in the semilattice case, we
could potentially use this to prove that this decision problem is also in coNP,
which would imply the unexpected coincidence NP = coNP. More precisely,
by Fagin's theorem we have NP = coNP if and only if the finite posets that
fail to be (m, n)-representable (for suitable m and n) have an existential second
order characterization.
References
[1] A. Abian.
'Boolean rings with isomorphisms preserving suprema and in-
fima'. J. Lond. Math. Soc. (2) 3 (1971), 618–620.
[2] R. Balbes. 'A representation theory for prime and implicative semilattices'.
Trans. Amer. Math. Soc. 136 (1969), 261–267.
12
[3] Y. Cheng and P. Kemp. 'Representation of posets'. Zeitschr. f. math. Logik
und Grundlagen d. Math 38 (1992), 269–276.
[4] W. Cornish and R. Hickman.
'Weakly distributive semilattices'. Acta.
Math. Acad. Sci. Hungar. 32 (1978), 5–16.
[5] H. P. Doctor. Extensions of a partially ordered set (1967). Thesis (Ph.D.)–
McMaster University (Canada).
[6] R. Egrot. 'No finite axiomatizations for posets embeddable into distributive
lattices'. preprint ArXiv:1610.00858.
[7] R. Egrot. 'Representable posets'. J. Appl. Log. 16 (2016), 60–71.
[8] M. Ern´e.
'Closure'.
In Beyond topology, Contemp. Math., Volume 486
(Amer. Math. Soc., Providence, RI, 2009), 163–238.
[9] M. Ern´e and G. Wilke. 'Standard completions for quasiordered sets'. Semi-
group Forum 27 (1-4) (1983), 351–376.
[10] G. Gratzer and E.T. Schmidt.
'On congruence lattices of lattices'. Acta
Math. Acad. Sci. Hungar. 13 (1962), 179–185.
[11] R. Hickman. 'Distributivity in semilattices'. Acta Math. Acad. Sci. Hungar.
32 (1978), 35–45.
[12] R.C. Hickman and G.P. Monro. 'Distributive partially ordered sets'. Fund.
Math. 120 (1984), 151–166.
[13] K. Kearnes. 'The class of prime semilattices is not finitely axiomatizable'.
Semigroup Forum 55 (1997), 133–134.
[14] P. Kemp.
'Representation of partially ordered sets'. Algebra Universalis
30 (1993), 348–351.
[15] B. Schein. 'On the definition of distributive semilattices'. Algebra Univer-
salis 2 (1972), 1–2.
[16] J. Schmidt. 'Each join-completion of a partially ordered set is the solution
of a universal problem'. J. Austral. Math. Soc. 17 (1974), 406–413.
[17] J. Schmidt.
'Universal and internal properties of some completions of k-
join-semilattices and k-join-distributive partially ordered sets'. J. Reine
Angew. Math. 255 (1972), 8–22.
[18] J. Schmidt.
'Universal and internal properties of some extensions of par-
tially ordered sets'. J. Reine Angew. Math. 253 (1972), 28–42.
[19] C. Van Alten. 'Embedding Ordered Sets into Distributive Lattices'. Order
33 (2016), 419–427.
[20] J.C. Varlet.
'On separation properties in semilattices'. Semigroup Forum
10 (1975), 220–228.
13
|
1106.6191 | 3 | 1106 | 2011-12-21T09:00:09 | Splitting full matrix algebras over algebraic number fields | [
"math.RA",
"cs.SC",
"math.NT"
] | Let K be an algebraic number field of degree d and discriminant D over Q. Let A be an associative algebra over K given by structure constants such that A is isomorphic to the algebra M_n(K) of n by n matrices over K for some positive integer n. Suppose that d, n and D are bounded. Then an isomorphism of A with M_n(K) can be constructed by a polynomial time ff-algorithm. (An ff-algorithm is a deterministic procedure which is allowed to call oracles for factoring integers and factoring univariate polynomials over finite fields.)
As a consequence, we obtain a polynomial time ff-algorithm to compute isomorphisms of central simple algebras of bounded degree over K. | math.RA | math | Splitting full matrix algebras over algebraic number fields
G´abor Ivanyos
Computer
Automation
Research Institute, Hungarian
Acad. Sci;
and
[email protected]
1
1
0
2
c
e
D
1
2
Josef Schicho
Johann Radon Institute of Com-
putational and Applied Mathe-
matics;
Austrian Academy of Sciences
[email protected]
Lajos R´onyai
Computer
Automation
and
Research Institute, Hungarian
Acad. Sci.
Dept.
Univ.
nomics
of Algebra, Budapest
of Technology and Eco-
[email protected]
September 26, 2018
Abstract
]
.
A
R
h
t
a
m
[
3
v
1
9
1
6
.
6
0
1
1
:
v
i
X
r
a
Let K be an algebraic number field of degree d and discriminant ∆ over Q. Let A be
an associative algebra over K given by structure constants such that A ∼= Mn(K) holds for
some positive integer n. Suppose that d, n and ∆ are bounded. Then an isomorphism
A → Mn(K) can be constructed by a polynomial time ff-algorithm. An ff-algorithm is a
deterministic procedure which is allowed to call oracles for factoring integers and factoring
univariate polynomials over finite fields.
As a consequence, we obtain a polynomial time ff-algorithm to compute ismorphisms
of central simple algebras of bounded degree over K.
1
Introduction
In this paper we consider the following algorithmic problem, which we call explicit isomorphism
problem: let K be an algebraic number field, A an associative algebra over K. Suppose that A is
isomorphic to the full matrix algebra Mn(K). Construct explicitly an isomorphism A → Mn(K).
Or, equivalently, give an irreducible A module.
Recall that for an algebra A over a field K and a K-basis a1, . . . , am of A over K the products
aiaj can be expressed as linear combinations of the ai
aiaj = γij1a1 + γij2a2 + · · · + γijmam.
The elements γijk ∈ K are called structure constants. In this paper an algebra is considered to
be given as a collection of structure constants. The usual representation of a number field K
0 Key words and phrases: Central simple algebra, splitting, splitting element, Minkowski's theorem on
convex bodies, maximal order, real and complex embedding, lattice basis reduction, parametrization, Severi-
Brauer surfaces, n-descent on elliptic curves.
The work of Ivanyos and R´onyai was supported in part by OTKA grants NK 72845, K77476, and K77778.
1
over Q with the minimal polynomial f ∈ Z[x] of an algebraic integer α ∈ K with K = Q(α)
can also be considered this way.
For basic definitions and facts from the theory of finite dimensional associative algebras the
reader is referred to [37] and [39]. Let A be a finite dimensional associative algebra over K, which
is either a finite field or an algebraic number field. In [19] and [41] polynomial time algorithms
were proposed for the computation of the radical Rad(A), and for the computation of the
Wedderburn decomposition (the minimal two-sided ideals) of the semisimple part A/Rad(A).
The algorithm for the Wedderburn decomposition is probabilistic (Las Vegas) in the finite case,
the others are deterministic. Alternative methods, improvements and related results have been
obtained in [12], [13], [7], [15], [16], [17], [20], [23], [24],[1]. A recent survey is [3].
To obtain a decomposition of A into minimal left ideals, one has to be able to solve the
explicit isomorphism problem for simple algebras over K. In [41] this was shown to be possible
in randomized polynomial time when K is finite. This method was derandomized recently in [25]
in the case when the dimension of A over K is bounded. In [40] and [47] evidence (randomized
reduction) is presented, that over algebraic number fields the explicit isomorphism problem
problem is at least as difficult as the task of factoring integers, a problem not known to be
amenable to polynomial time algorithms. For simple algebras over a number field K polynomial
time Las Vegas algorithms were given in [12] and [2] to find a number field L ⊇ K such that
A ⊗K L ∼= Mn(L) for a suitable n, together an explicit representation of the isomorphism. In
[14] a real version was established: if K ⊂ R, and A splits over R, then it can be achieved that
L ⊂ R. These results were derandomized in part in [43], and completely in [20].
Following [42] we recall the notion of an ff-algorithm. It is an algorithm which is allowed to
call an oracle for two types of subproblems. These are the problem of factoring integers, and
the problem of factoring polynomials over finite fields. We have no deterministic polynomial
time algorithms for these problems (but the latter one admits polynomial time randomized
algorithms). In both cases the cost of the oracle call is the length of the input to the call.
In [42] the problem of deciding if A ∼= Mn(K) holds for an algebra A over a number field
K was shown to be in NP ∩ coNP . The proof relies on properties of maximal orders Λ ≤ A
for central simple algebras A over K. Maximal orders are in many ways analogous to the full
ring of algebraic integers in K. The principal result of [26] is a polynomial time ff-algorithm to
construct maximal orders in simple algebras over Q. A very similar algorithm is presented in
[35]. In [47] a more direct method is given for quaternion algebras.
Several of the algorithms mentioned here have implementations in the computer algebra
system Magma, see for example [33].
We mention also a somewhat surprising application of the algorithms for orders: they have
been applied in the construction and analysis of high performance space time block codes for
wireless communication, see [22], [45]. In fact, in addition to an application of the algorithm of
[26], in [22] an improvement is suggested for the orders relevant there.
The main result of this paper is a polynomial time ff-algorithm for the case when A is a
central simple algebra of bounded dimension over a small extension field K of Q. This was
known before only in the smallest nontrivial case dimQ A = 4, see [27] and the more recent
papers [11], [46], [47]. More precisely we have the following.
Theorem 1. Let K be an algebraic number field of degree d and discriminant ∆ over Q. Let
A be an associative algebra over K given by structure constants such that A ∼= Mn(K) holds
for some positive integer n. Suppose that d, n and ∆ are bounded. Then an isomorphism
A → Mn(K) can be constructed by a polynomial time ff-algorithm.
2
We remark, that the algorithm of Theorem 1 gives an explicit isomorphism even if we do not
assume that log ∆, n, and d are bounded. However, the running time then may be exponential
in these parameters. This holds also for the algorithmic applications given in the last section
of the paper.
In addition to computational representation theory where the problem naturally originates
from, the explicit isomorphism problem arises also in connection with computational problems
of arithmetic geometry:
in a series of seminal papers [8], [9], and [10] the n-Selmer group of
an elliptic curve E over a number field K is studied. A method is developed to represent the
elements of the Selmer group as genus one normal curves of degree n. One of the key ingredients
of their method is to solve the explicit isomorphism problem for Mn(K). In [10] an algorithm
is outlined for the explicit isomorphism problem over K = Q, and is detailed for the cases
n = 3, 5. Our approach is based on similar ideas.
An algorithm for explicit isomorphisms is useful also for computing parametrizations in
algebraic geometry:
[11] considers parametrizations of conics, and [21] gives algorithms for
rational parametrization of Severi-Brauer surfaces. In fact, in [21] an algorithm is given which
solves the explicit isomorphism problem when A ∼= M3(Q). This, however, uses a procedure for
solving norm equations whose complexity was not clear so far. For example it was not known
if they can be solved in ff-polynomial time. The case A ∼= M4(Q) is treated similarly in [38].
The organization of the paper is as follows. First, in Section 2 we prove Theorem 1 in
the simpler case K = Q. This combines the approach of Fisher [18] (that is used in [10] as
well), which considers a real embedding of A, with an application of Minkowski's theorem on
convex bodies, and with approximate lattice basis reduction. In the next section the argument
is extended to number fields. An important role is played here by the traditional map in
algebraic number theory which maps K into Rd, see Section 13, Chapter I. in [29].
In the last section two applications are presented. One of these is a polynomial time ff-
algorithm to compute ismorphisms of central simple algebras of bounded degree over K.
Acknowledgement. We are grateful to G´eza K´os and S´andor Z. Kiss for discussions on the
subject. We thank Jacques-Arthur Weil for calling our attention to [18].
2 Full matrix algebras over Q
Here we consider the case K = Q of Theorem 1. We prove first a statement on the existence of
small and highly singular elements in maximal orders.
Theorem 2. Let A be a Q-subalgebra of Mn(R) isomorphic to Mn(Q) and let Λ be a maximal
Z-order in A. Then there exists an element C ∈ Λ which has rank 1 as a matrix, and whose
Frobenius norm kCk is less than n.
Remark 3. When we apply the above theorem, the Frobenius norm k · k will be inherited from
Mn(R), with respect to an arbitrary embedding of A into Mn(R). Recall that for a matrix
X ∈ Mn(R) we have kXk =pT r(X T X).
Proof. The isomorphism A ∼= Mn(Q) extends to an automorphism of Mn(R). Therefore, by the
Noether-Skolem Theorem, there exists a matrix P ∈ Mn(R) such that A = P Mn(Q)P −1. Let Λ′
denote the standard maximal order Mn(Z) in Mn(Q). The theory of maximal orders in central
3
simple algebras over Q implies that there exists an invertible rational matrix P ′ ∈ Mn(Q)
such that it gives us P −1ΛP from Λ′: P −1ΛP = P ′Λ′P ′−1, whence Λ = P P ′Λ′P ′−1P −1. Set
Q = P P ′/( det P det P ′)1/n. Clearly Q ∈ Mn(R), det Q is ±1 and
Λ = QΛ′Q−1.
Let ρ denote the left ideal of Λ′ consisting of all integer matrices which have 0 everywhere
except in the first column. Clearly ρ is a lattice of determinant 1 in the linear space S of
all real matrices having nonzeros only in the first column. Now the lattice L = Qρ will be a
sublattice of S, with determinant 1 (see Subsection 2.2 from [34] for basic facts on lattices in
real Euclidean spaces).
We can apply Minkowski's theorem on lattice points in convex bodies to L in S, and to the
ball of radius √n in S centered at the zero matrix (we refer here to the Euclidean distance,
that is, the Frobenius norm on Mn(R)). The volume (calculated in S) of the ball is more than
2n, as it contains 2n internally disjoint copies of the n-dimensional unit cube, and more. We
infer that there exists an element B ∈ ρ such that QB is a nonzero matrix whose length is less
than √n. Clearly B and hence QB is a rank 1 matrix.
Next consider the "transpose" of this argument with Q−1 in the place of Q: there exists a
nonzero integer matrix B′, which is zero everywhere except in the first row, such that B′Q−1
is nonzero, and has Euclidean length less than √n.
Now
C = QBB′Q−1
meets the requirements of the statement.
length less than n because the Frobenius norm is submultiplicative:
Indeed, it is in Λ because BB′ ∈ Mn(Z).
It has
kCk = k(QB)(B′Q−1)k ≤ kQBk · kB′Q−1k < (√n)2 = n.
Obviously, C has rank at most 1, as B and B′ are of rank 1. Finally, from the shape of B and
B′ we see, that BB′ 6= 0, hence rank BB′ = rank C = 1. This finishes the proof.
Remark. Essentially the above reasoning shows the existence of a rank one C ∈ Λ such that
kCk ≤ γn, where γn is Hermite's constant (see Chapter IX, [5]). This bound is achieved if we
select B and B′ whose norm is at most most √γn. This gives a better bound for large values
of n.
small are necessarily zero divisors.
The following two lemmas point out that elements X form an order Λ ⊂ Mn(Q) with kXk
Lemma 4. Let X ∈ Mn(C) be a matrix such that det X is an integer, and kXk < √n. Then
X is a singular matrix.
Proof. The argument is essentially from [18]. Let X = QR be the QR decomposition of X,
with Q unitary and R an upper triangular matrix whose diagonal entries are r1, r2, . . . , rn. We
have
1
nkXk2 < 1.
det X2/n = (r12r22 · · ·rn2)1/n ≤
Here we used the fact that kXk =pT r(X ∗X) = pT r(R∗R) because Q∗Q = I. We conclude
(r12 + r22 + · · ·rn2) ≤
1
nkRk2 =
that det X = 0.
1
n
4
The next statement has a similar flavour. It was pointed out to us by our colleague G´eza
K´os.
Lemma 5. Let X ∈ Mn(Q) be a matrix whose characteristic polynomial has integral coeffi-
cients, and kXk < 1. Then X is a nilpotent matrix.
Proof. The eigenvalues of X are algebraic integers, hence the eigenvalues of X t are algebraic
integers as well, for any positive integer t. We infer that the characteristic polynomial of X t
has integral coefficients. Also, the norm condition implies that X t tends to the zero matrix O
as t → ∞, hence X t = O for a sufficiently large t.
The following argument is from H. W. Lenstra, see p. 546 in [32]. Informally, it states that
the coefficients with respect to a reduced basis of a vector v with small length v from a lattice
Γ are relatively small.
Lemma 6. Let Γ be a full lattice in Rm. Suppose that we have a basis b1, . . . , bm of Γ over Z
such that
holds for a real number cm > 0. Suppose that
b1 · b2 · · ·bm ≤ cm · det(Γ)
(1)
v =
m
Xi=1
γibi ∈ Γ,
γi ∈ Z.
Then we have γi ≤ cm
Proof. From Cramer's rule we obtain
v
bi for i = 1, . . . , m.
.
γi = det(b1, b2, . . . , bi−1, v, bi+1, . . . , bm)
= v
bi · b1 · · ·bi−1 · bi · bi+1 · · ·bm
det(Γ)
det(Γ)
det(Γ)
≤ b1 · · ·bi−1 · v · bi+1 . . .bm
≤ v
bi · cm ·
= cm · v
bi
det(Γ)
det(Γ)
.
=
We remark that the LLL algorithm gives a basis with cm = 2m(m−1)/4 in formula (1), see
[31]. We shall have a lattice of vectors with nonrational coordinates, and thus invoke the
approximate version of the LLL algorithm developed by Buchmann, see Corollary 4 of [4]. This
will provide a reduced basis with
cm := (γm)
m(m−1)
2
.
2
(2)
m
2(cid:19)m
2 (cid:18)3
Here γm is Hermite's constant. It is known that γm ≤ m for all integers m ≥ 1, and γm
1
πe + o(1) for m large.
m ≤
We can describe now the algorithm of Theorem 1 for the case K = Q. Suppose that, as
input, we have an algebra A over Q, given to us by structure constants. Suppose also that
A is isomorphic to the full matrix algebra Mn(Q). Our objective is to give this isomorphism
explicitly. More specifically the algorithm outputs an element C ∈ A which has rank 1 in
Mn(Q). Then the left action of A on AC provides an A → Mn(Q) isomorphism. The major
steps of the algorithm are the following.
5
1. Use the Ivanyos-R´onyai algorithm [26] to construct a maximal order Λ in A. This is a
polynomial time ff-algorithm1.
2. Compute an embedding of A into Mn(R). One uses here the the deterministic polynomial
time algorithm obtained via the derandomization by de Graaf and Ivanyos [20] of the Las
Vegas algorithm of Eberly [14]. This way we have a Frobenius norm on A. For X ∈ A we
can set kXk = pT r(X T X). Also, via this embedding Λ can be viewed as a full lattice
in Rm, where m = n2. The length v of a lattice vector v is just the Frobenius norm of
v as a matrix.
3. Compute a rational approximation A of our basis B of Λ with precision q0(B, 1
2 )
(see Section 2 in [4] for the definition of the precision parameter q0). One can use here
the Algorithm of Schonhage2 [44].
2, 2
m−1
4. Compute a reduced basis b1, . . . , bm of the lattice Λ ⊂ Rm by applying the LLL algorithm
to A. For cm we have the value from (2).
5. If some of the basis elements bi is a zero divisor in A, then there are two cases.
If
rank bi = 1, then we are done and stop with the output C := bi. Otherwise, if 1 <
rank bi < n, then we compute the the right identity element e of the left ideal Abi by
solving the straightforward system of linear equations, set A := eAe and go back to Step
1.
6. At this point we know that bi ≥ √n holds for every i. Generate all integral linear
bi ≤ cm√n until a C
combinations C ′ = Pm
i=1 γibi, where the γi are integers, γi ≤ cm
is found with rank C = 1. Output this C.
n
Proof of theorem 1 for K = Q. As for the correctness of the algorithm, let b1, . . . , bm the basis
of Λ obtained at Step 4 with kb1k ≤ · · · ≤ kbmk. Then by Corollary 4 from [4] we have
kbik ≤
3
2 · 2
m−1
2 λi
for i = 1, . . . , m,
where λi is the i-th successive minimum of Λ. From this we infer
2(cid:19)m
kb1kkb2k · · ·kbmk ≤(cid:18)3
m(m−1)
2
2
λ1 · · · λm ≤ (γm)
m
2(cid:19)m
2 (cid:18)3
m(m−1)
2
2
det(Λ),
as claimed. At the last inequality we used Minkowski's inequality on successive minima (see
Chapter VIII in [5]).
We remark also that, if at Step 5 we have rank e = k, then it is easy to see that eAe ∼= Mk(Q).
Moreover, a rank one element of eAe will have rank one in A as well. At Step 6 the bi are
nonsingular matrices, hence kbik ≥ √n holds by Lemma 4. Finally, Theorem 2 and Lemma 6
(this is applied for v := C and v ≤ n) show that an element C with rank one exists among
the linear combinations enumerated.
1It performs well if the integers to be factored are not very big. The method has been implemented in
Magma by de Graaf.
2For a more recent method see [36].
6
Considering the timing of the algorithm, Step 1 runs in polynomial time as an ff-algorithm.
Steps 2, 4 and 5 can be done in deterministic polynomial time. At Step 3 the precision paramater
q0 is polynomial in the input size, hence Schonhage's approximation algorithm (see also Section
3 of [30]) runs in polynomial time.
The number of jumps back to Step 1 is also bounded, hence each Step is carried out in a
bounded number of times. Finally, the number of elements C ′ enumerated at Step 6 is at most
(2cm√n + 1)m, this is also bounded by our assumption.
Remarks. 1.
In Step 4 of the preceding algorithm one may also consider the idempotent
f = I − e, where I is the identity element of A. If rankf = 1, then we can stop with C := f .
Otherwise, if rankf < ranke, then we may work with fAf instead of eAe.
2. We could avoid jumps back to Step 1 if we had a good lower bound on the quantities kbik.
Unfortunately, we do not have such a bound in general. The difficulty here may come from
the fact, that the closure of the similarity-orbit of nilpotent matrices contains the zero matrix.
This is illustrated by the matrices
X =(cid:18) t 0
0 1
t (cid:19) , E =(cid:18) 0 1
0 0 (cid:19) .
We have XEX −1 = t2E, hence kXEX −1k gets arbitrarily small as t → 0.
3. We could have used Lemma 5 instead of Lemma 4. In this case we test in Step 4 if there is
a nilpotent element among the bi. Also, then in Step 5 we have to enumerate integral linear
combinations Pm
i=1 γibi with γi ≤ cm · n.
3 The general case
Let K be a number field of degree d over Q, the maximal order of K is denoted by R and the
positive discriminant of R is ∆. Let A be a central simple algebra over K such that A ∼= Mn(K),
and let Λ be a maximal order in A.
It is known (see Reiner [39], Corollary 27.6) that there is an isomorphism ψ : A → Mn(K)
such that the image of Λ is
Λ′ := ψ(Λ) =
. . .
R · · · R J −1
...
...
R · · · R J −1
J · · · J R
,
where J is a fractional ideal of R in K. (The notation with a matrix having sets as entries refers
to all matrices (xij)n
i,j=1 whose elements belong to the designated sets, for example, x11 ∈ R,
xn1 ∈ J, etc.) Let σ1, . . . , σr be the embeddings of K into R and σr+1, σr+1, . . . , σr+s, σr+s be
the non-real embeddings of K into C; here we have d = r + 2s.
For each 1 ≤ i ≤ r + s let us consider an embedding φi of A into Mn(C), which extends
σi (for i ≤ r we require φi(A) ≤ Mn(R)). We remark that such embeddings can actually be
computed efficiently by the methods of [14] and [20]. For x ∈ A the matrices φi(x) are in
Mn(C), hence we may speak about the absolute value of their entries. Set
b = (cid:18) 2
π(cid:19)2sn
∆n!
1
nd
2s
d
1
d .
∆
=(cid:18) 2
π(cid:19)
7
Theorem 7. There exists a rank one element x ∈ Λ such that the entries of the matrices φi(x)
for i = 1, . . . , s + r all have absolute value at most b.
Proof. Let ψi : A → Mn(C) be the composition of ψ with the natural extension of σi to Mn(C).
These maps are shown at the diagram below. The vertical map is the extension of σi from K
to Mn(K). The triangle is commutative.
Mn(C)
φi←− A
ψ
ψi
−→ Mn(K)
ց ↓σi
Mn(C)
Then the C-linear extensions of the composite maps φiψ−1
from ψi(A) to Mn(C) are C-
algebra automorphisms of Mn(C) (whose restrictions, for i = 1, . . . , r, to the real matrices
are automorphisms of Mn(R)). As these automorphisms must be inner, there exist matri-
ces A1, . . . , Ar ∈ GLn(R) with determinant ±1 and Ar+1, . . . , Ar+s ∈ SLn(C) such that for
i = 1, . . . , r + s we have
i
φi(Λ) = A−1
i Λ′Ai = A−1
i
σi(R)
...
· · · σi(R) σi(J −1)
. . .
...
σi(R)
σi(J)
· · · σi(R) σi(J −1)
σi(R)
· · · σi(J)
Ai.
i := (A−1
i )T . We show that there exist nonzero vectors u ∈ (R, . . . , R, J) ⊂ Kn and
Put A′
v ∈ (R, . . . , R, J −1) ⊂ Kn such that for every index i = 1, . . . , r, all the coordinates of σi(u)A′
i
and σi(v)Ai are of "small" absolute values. Then all the entries of the matrix φiψ−1(uT v) will
be small, demonstrating that there exist a rank one element of Λ, namely ψ−1(uT v), which is
small in all the embeddings φi.
To this end, we consider the set M of row vectors of length nd of the form
(σ1(u), . . . , σr(u), σr+1(u), σr+1(u), . . . , σr+s(u), σr+s(u)),
(3)
where u ∈ (R, . . . , R, J). M is a lattice in the linear space Cdn whose rank is nd because of
the linear independence of field automorphisms, see Theorem I.3 in [28]. The determinant of
lattice M is
∆n/2N(J),
where N(J) is the norm of the fractional ideal J (see Proposition 13.4, Chapter I. in [29]). Next
we consider the set M′ of vectors of the form
(σ1(u)A′
1, . . . , σr(u)A′
r, σr+1(u)A′
r+1, σr+1(u)A′
r+1, . . . , σr+s(u)A′
r+1, σr+s(u)A′
r+s).
This set is obtained by multiplying vectors from M by the block diagonal matrix
1, . . . , A′
r, A′
r+1, A′
r+1, . . . , A′
r+1, A′
diag(cid:0)A′
r+s(cid:1) .
Here each block has determinant ±1, therefore the determinant of M′ remains ∆n/2N(J).
Finally we apply the block diagonal matrix
diag(cid:18)I, . . . , I,(cid:18) 1
2I −ι
2 I
ι
1
2I
2I (cid:19) , . . . ,(cid:18) 1
2 I −ι
2 I
ι
1
2 I
2I (cid:19)(cid:19) ,
8
where I stands for the n by n identity matrix, and we have r blocks of I. The determinant of
this matrix is (ι/2)ns. From M′ we obtain the lattice L of rank nd in Rnd ⊂ Cnd consisting of
the vectors
(σ1(u)A′
1, . . . , σr(u)A′
r,ℜ(σr+1(u)A′
r+1),ℑ(σr+1(u)A′
r+1),
(4)
where u runs over (R, . . . , R, J) ⊂ Kn. The determinant of L is 2−sn∆n/2N(J). We apply now
Minkowski's theorem on convex bodies to the lattice L and to the product of rn one-dimensional
balls and sn two-dimensional balls of radius
r+1), . . . ,ℜ(σr+s(u)A′
r+1),ℑ(σr+s(u)A′
r(J) =(cid:18)(cid:18) 2
π(cid:19)sn
N(J)∆n/2(cid:19)
1
nd
.
This is a closed convex centrally symmetric (with respect to the origin) body of volume
(2r(J))rn(cid:0)πr(J)2(cid:1)sn
.
This volume is 2nd det L. The theorem tells us that there exists a nonzero u ∈ (R, . . . , R, J)
such that for every 1 ≤ i ≤ r + s, all the coordinates of σi(u)A′
i have absolute value at most
r(J).
Similarly, there exists a nonzero vector v ∈ (R, . . . , R, J −1) such that for every 1 ≤ i ≤ r +s,
all the coordinates of σi(v)Ai have absolute value at most r(J −1) where
r(J −1) =(cid:18)(cid:18) 2
π(cid:19)sn
N(J)−1∆n/2(cid:19)
1
nd
.
Then x = ψ−1(uT v) is a rank one element of Λ such that for every i, all the entries of the
matrix φi(x) have absolute value at most
r(J)r(J −1) = (cid:18) 2
π(cid:19)2sn
∆n!
1
nd
2s
d
=(cid:18) 2
π(cid:19)
1
d = b.
∆
We point out two interesting consequences:
1. If K = Q, R = Z, then ∆ = 1, s = 0, hence b = 1. We have an element x of our maximal
order Λ which has rank 1 as a matrix from Mn(Q), and with respect to our selected embedding
of A into Mn(R) has elements of absolute value at most 1. This is essentially Theorem 2.
If D is a positive squarefree integer, K = Q(√D), then ∆ = D, if D is congruent to 1
2.
modulo 4, and ∆ = 4D, if D is congruent to 3 modulo 4. Then s = 0, d = 2, hence b ≤ 2√D.
Lemma 8. Let y ∈ Λ be an element such that kφi(y)k < √n holds for i = 1, . . . , r + s. Then
y is a zero divisor in A.
Proof. As in Lemma 4 we obtain that
To our algorithm we shall need a more general variant of Lemma 4.
det φi(y) < 1 for i = 1, . . . , r + s.
(5)
9
Note that det φi(y) = σi(n(y)), where n(y) is the reduced norm of y (see Section 9 in [39]).
Inequality (5) implies that
σ1(n(y)) · · · σr(n(y))σr+1(n(y))σr+1(n(y))· · · σr+s(n(y))σr+s(n(y)) < 1.
Moreover, by Theorem 10.1 from [39] n(y) ∈ R, therefore the number on the left is a rational
integer, giving that det φi(y) = 0 for at least one (and hence for all) i. This implies that y is a
zero divisor in A.
To be able to use lattice basis reduction techniques, we use a transformation which turns a
maximal order in A into a full lattice in a suitable real linear space. To this end for y ∈ Λ we
form the vectors
Φ(y) := (φ1(y), . . . , φr(y),ℜ(φr+1(y)),ℑ(φr+1(y)), . . . ,ℜ(φr+s(y)),ℑ(φr+s(y))).
As with (3) and (4), we infer that Γ := Φ(Λ) is a full lattice in the real linear space in Rm, with
m = n2d.
We give now the algorithm of Theorem 1 for the general case: as input, we have an algebra
A over K, given to us by structure constants. Suppose further, that A ∼= Mn(K). Our algorithm
outputs an element x ∈ A which has rank 1 in Mn(K).
1. Use the Ivanyos-R´onyai algorithm [26] to construct a maximal order Λ in A.
2. Compute the embeddings φi of A into Mn(C) for i = 1, . . . , r + s (they are embeddings
into Mn(R) for i ≤ r) by the deterministic variant [20] of Eberly's algorithm [14].
3. Form a basis of the full rank lattice Γ ⊂ Rm with m = n2d. Note that for the Euclidean
length in Γ we have
Φ(y)2 =
r+s
Xi=1
kφi(y)k2.
4. Compute a reduced basis b1, . . . , bm of the lattice Γ ⊂ Rm by using Buchmann's approx-
imate version the LLL algorithm to achieve the value in (2) for the reducedness factor
cm.
5. If an element y = Φ−1(bi) is a zero divisor in A, then there are two cases. If rank y = 1,
then we are done and stop with the output x := y. Otherwise, if 1 < rank y < n, then we
compute the the right identity element e of the left ideal Ay, set A := eAe and go back
to Step 1.
6. At this point we know that bi ≥ √n holds for every i. Generate all linear combinations
w =Pm
i=1 γibi, where the γi are rational integers with
2s
d
γi ≤ cm
bn√r + s
bi
π(cid:19)
≤ cmbpn(r + s) = cm(cid:18) 2
∆
1
dpn(r + s)
until a w is found such that rank x = 1 holds for the x ∈ Λ with Φ(x) = w. Output this
x.
10
Proof of Theorem 1. The proof is essentially the same as in the simpler case K = Q. At Step 6
Φ−1(bi) is necessarily a nonsingular element of Λ for i = 1, . . . , r + s. By Lemma 8 there must
be a j such that kφj(Φ−1(bi))k ≥ √n, giving that bi ≥ √n. Theorem 7 and Lemma 6, the
latter is applied with v ≤ bn√r + s, show that an element w with rank Φ−1(w) = 1 exists
among the linear combinations enumerated.
Here also each Step is carried out in a bounded number of times. The number of elements
w enumerated at Step 6 is at most (2cmbpn(r + s) + 1)m. This is also bounded by our
assumptions.
4 Two consequences
From the elementary theory of the Brauer group (see for example Section 12.5 from [37]) we
know that for two central simple algebras A and B of the same dimension n2 over a field K we
have A ∼= B if and only if
(6)
A ⊗K Bop ∼= Mn2(K).
We outline next that, over an infinite K, how one can efficiently recover from an isomorphism
(6) an isomorphism σ : A → B.
Having isomorphism (6) explicitly implies that we have in our hands a left A⊗KBop- module
V of dimension n2 over K. Then V , as a left A-module, is isomorphic to the regular left A-
module because they have the same dimension over K. There exists an element v ∈ V such
that the map φv : a 7→ av is a left A-module isomorphism from A to V . The elements v of V
which do not generate V as a left A-module are zeros of a certain polynomial on V of degree n2
(the determinant of the linear map a 7→ av). Similarly, the elements v of V for which the map
ψv : b 7→ vb is not a right Bop-module isomorphism between Bop and V are zeros of a polynomial
on V of degree n2. Therefore, by the Schwartz-Zippel Lemma there exists an element v ∈ V
for which the maps φv and ψv are simultaneously left and right isomorphisms, respectively.
The methods of [2] or [6] for finding large cyclic submodules can be used to obtain first a
left A-module generator V and then essentially the same method can be applied to gradually
transform v to a generator of V as a right Bop-module while preserving the property that v is a
left A-module generator for V . For example, the the method of Lemma 8 from [6] can be used
here. We recall the statement of the lemma for the reader's convenience.
Lemma 9. Let V be an r-dimensional module over the semisimple K-algebra A and v1, . . . , vr
be a K-basis of V . Assume that v ∈ V is an element of non-maximal rank. Let Ω be a subset
of K∗ consisting of at least rk v + 1 elements. Then there exists a scalar ω ∈ Ω and a basis
element u ∈ {v1, . . . , vr} such that rk(v + ωu) > rk v. (Here the rank rk v of v is defined as the
dimension of the A-submodule of V generated by v.)
We claim that if v ∈ V is an element such that φv and ψv are simultaneously isomorphisms
of the respective modules, then σ = ψ−1
v φv is an algebra isomorphism between A and B. It is
obvious that σ is a K-linear isomorphism between A and B. Note that for a ∈ A, σa is the
unique element b ∈ B with the property av = vb. Therefore σ(a1a2) is the unique element of B
with a1a2v = vb. But a1a2v = a1v(σa2) = v(σa1)(σa2), whence σ(a1a2) = (σa1)(σa2).
Combining this argument with the algorithm of Theorem 1 for constructing a suitable
module V , we obtain the following:
11
Corollary 10. Let K be an algebraic number field of degree d and discriminant ∆ over Q. Let
A,B be central simple algebras over K of the same dimension n2 given by structure constants.
Suppose that d, n and ∆ are bounded.
If A and B are isomorphic, then an isomorphism
A → B can be constructed by a polynomial time ff-algorithm.
The next statement is quite modest. It formulates a very plausible claim, but, to the best
of our knowledge, it was not proven before.
Corollary 11. Let K be an algebraic number field and A be an associative algebra over K given
by structure constants such that A ∼= Mn(K) holds for some integer n > 1. Then there exists
a zero divisor x ∈ A which admits polynomially bounded coordinates with respect to the input
basis of A. Moreover, such a zero divisor x can be obtained by a polynomial space bounded
computation.
Proof. A slight modification of the algorithm of Therorem 1 will provide a reasonably small
zero divisor: at Step 5 we stop if y is a zero divisor. Note that y has polynomial size as Steps
1-5 constitute a polynomial time ff-alghorithm.
If no zero divisor is found at Step 5, then
we proceed directly to Step 6. The integral linear combinations considered there have size
polynomial in the input length, and their enumeration can be carried out using polynomial
space only.
Remark. A more direct, but perhaps algorithmically less efficient proof of Corollary 11 is
possible. Let c1, . . . , cn2 be the basis of Λ given by the Ivanyos R´onyai algorithm. Express the
element x of Theorem 7 in this basis:
x = α1c1 + α2c2 + · · · + αn2cn2,
with αi ∈ Z. Using that kxk ≤ bn, and that the vectors ci have polynomial size, Cramer's rule
implies a polynomial bound on the size of the coefficients αi.
By the well known connection between split cyclic algebras and relative norm equations (see
Theorem 30.4 in Reiner [39]), our results imply that for a number field K and a cyclic extension
L of K if a norm equation NL/K(x) = a is solvable, then there is a solution whose standard
representation has polynomial size (in terms of the size of the standard representation of a and
a basis of L). Furthermore, for fixed K and fixed degree L : K, a solution can be found by a
polynomial time ff-algorithm.
We have given here a polynomial time ff-algorithm for the explicit isomorphism problem for
central simple algebras A of fixed dimension over a fixed number field K. Potential directions
to extend this result may be allowing the dimension of the algebra over K to grow or allowing K
to vary (even if its degree over Q remains fixed), or both. Existence of ff-algorithms for finding
an explict isomorphism of a non-split central simple algebra with the algebra of matrices over a
skewfield is also left open (even in the case of fixed base field, or fixed dimension). It would be
interesting also to develop practical variants and programs for the algorithms presented here.
References
[1] V. Acciaro, Solvability of norm equations over cyclic number fields of prime degree, Math.
Comp. 65(1996), 1663-1674.
12
[2] L. Babai, L. R´onyai, Computing irreducible representations of finite groups; Mathematics
of Computation, 192(1990), 705-722.
[3] M. R. Bremner, How to compute the Wedderburn decomposition of a finite-dimensional
associative algebra, manuscript, 2010, http://arxiv.org/pdf/1008.2006
[4] J. Buchmann, Reducing lattice bases by means of approximations, in: Algorithmic num-
ber theory, LNCS 877, Springer-Verlag, 1994, 160 -- 168.
[5] J. W. S. Cassels, An introduction to the geometry of numbers, Springer-Verlag, 1971.
[6] A. Chistov, G. Ivanyos, and M. Karpinski, Polynomial time algorithms for modules
over finite dimensional algebras, in Proceedings of the 1997 International Symposium on
Symbolic and Algebraic Comput, ACM, New York, 1997, pp. 68 -- 74.
[7] A. M. Cohen, G. Ivanyos and D. B. Wales, Finding the radical of an algebra of linear
transformations, J. Pure Appl. Algebra, 117/118(1997) 177-193.
[8] J. Cremona, T. Fisher, C. O'Neil, D. Simon, M. Stoll, Explicit n-descent on elliptic curves
I. Algebra, Journal fur die reine und angewandte Mathematik, 615(2008), 121 -- 155.
[9] J. Cremona, T. Fisher, C. O'Neil, D. Simon, M. Stoll, Explicit n-descent on elliptic curves
II. Geometry, Journal fur die reine und angewandte Mathematik, 632(2009), 63 -- 84.
[10] J. Cremona, T. Fisher, C. O'Neil, D. Simon, M. Stoll, Explicit n-descent on elliptic
curves III. Algorithms, ArXiv 1107.3516.
[11] J. E. Cremona, D. Rusin, Efficient solution of rational conics, Math. Comp. 72(2003),
1417-1441.
[12] W. M. Eberly, Computations for algebras and group representations, Ph. D. Thesis,
Dept. of Computer Science, University of Toronto, 1989.
[13] W. M. Eberly, Decomposition of algebras over finite fields and number fields; Compu-
tational Complexity, 1(1991), 179-206.
[14] W. M. Eberly, Decompositions of algebras over R and C; Computational Complexity,
1(1991), 207-230.
[15] W. Eberly, M. Giesbrecht, Efficient decomposition of associative algebras, Proceedings,
1996 International Symposium on Symbolic and Algebraic Computation, Zurich, Switzer-
land, pp. 170-178.
[16] W. Eberly, M. Giesbrecht, Efficient decomposition of associative algebras over finite
fields, J. Symbolic. Comput. 29(2000), 441-488.
[17] W. Eberly, M. Giesbrecht, Efficient decomposition of separable algebras. J. Symbolic
Comput. 37(2004), 35-81.
[18] T. Fisher, How to trivialise an algebra, Abstracts, Rational points on curves and higher
theory and explicit methods, Workshop at Jacobs University,
dimensional varieties:
Bremen, July 2007.
http://www.faculty.jacobs-university.de/mstoll/workshop2007/fisher2.pdf
13
[19] K. Friedl, L. R´onyai, Polynomial time solutions of some problems in computational
algebra; Proc. 17th ACM STOC, Providence, Rhode Island, 1985, 153-162.
[20] W. A. de Graaf, G. Ivanyos, Finding maximal tori and splitting elements in matrix
algebras, In: F. van Oystaeyen, M. Saorin (eds.), Interactions Between Ring Theory and
Representations of Algebras, (Proc. Euroconference in Murcia, 1998), Lecture Notes in
Pure and Applied Mathematics 210, Marcel Dekker 2000, 95-105.
[21] W. A. de Graaf, M. Harrison, J. P´ılnikov´a, J. Schicho, A Lie algebra method for rational
parametrization of Severi-Brauer surfaces, Journal of Algebra, 303(2006), 514 -- 529.
[22] C. Hollanti, J. Lahtnonen, K. Ranto, R. Vehkalahti, On densest MIMO lattices from
cyclic division algebras, IEEE Trans. Inform. Theory, 55(2009), 3751-3780.
[23] G. Ivanyos, Finding the radical of matrix algebras using Fitting decompositions, Journal
of Pure and Applied Algebra, 139(1999), 159-182.
[24] G. Ivanyos, Fast randomized algorithms for the structure of matrix algebras over finite
fields (extended abstract), Proc. 2000 Int. Symp. Symbolic Algebraic Computation (St.
Andrews), (ACM, New York, 2000), pp. 175-183
[25] G. Ivanyos, M. Karpinski, L. R´onyai, N. Saxena, Trading GRH for algebra: algorithms for
factoring polynomials and related structures, Mathematics of Computation, to appear.
[26] G. Ivanyos, L. R´onyai, Finding maximal orders in semisimple algebras over Q, Comput.
complexity, 3(1993), 245 -- 261.
[27] G. Ivanyos, ´A. Sz´ant´o, Lattice basis reduction for indefinite forms and an application,
Discrete Math. 153(1996), 177 -- 188.
[28] N. Jacobson, Lectures in abstract algebra III, Theory of fields and Galois theory, Springer-
Verlag, 1964.
[29] G.J. Janusz, Algebraic number fields, American Math. Soc., 1996.
[30] R. Kannan, A. K. Lenstra and L. Lov´asz, Polynomial factorization and nonrandomness
of bits of algebraic and some transcendental numbers, Mathematics of Computation,
50(1988), 235 -- 250.
[31] A. K. Lenstra, H. W. Lenstra, L. Lov´asz, Factoring polynomials with rational coefficients,
Math. Ann. 261(1982), 515 -- 534.
[32] H. W. Lenstra, Jr., Integer programming with a fixed number of variables, Mathematics
of Operations Research, 8(1983), 538 -- 548.
[33] http://magma.maths.usyd.edu.au/magma/handbook/text/840
[34] J. Matousek, Lectures on discrete geometry, GTM 212, Springer-Verlag, 2002.
[35] G. Nebe, A. Steel, Recognition of division algebras, Journal of Algebra, 322(2009), 903 --
909.
14
[36] V. Pan, Univariate polynomials: nearly optimal algorithms for numerical factorization
and root finding, Journal of Symbolic Computation, 33(2002), 701 -- 733.
[37] R. S. Pierce, Associative algebras, Springer-Verlag, 1982.
[38] J. P´ılnikov´a, Trivializing a central simple algebra of degree 4 over the rational numbers,
J. Symbolic Comput. 42(2007), 579 -- 586.
[39] I. Reiner, Maximal orders, Academic Press, 1975.
[40] L. R´onyai, Zero divisors in quaternion algebras, Journal of Algorithms, 9(1988) 494 -- 506.
[41] L. R´onyai, Computing the structure of finite algebras, Journal of Symbolic Computation,
9(1990) 355 -- 373.
[42] L. R´onyai, Algorithmic properties of maximal orders in simple algebras over Q, Comput.
Complexity, 2(1992), 225 -- 243.
[43] L. R´onyai, A deterministic method for computing splitting elements in semisimple alge-
bras over Q, Journal of Algorithms, 6(1994), 24 -- 32.
[44] A. Schonhage, The fundamental theorem of algebra in terms of computational complex-
ity, Preliminary report, Universitat Tubingen, 1982.
[45] B. A. Sethuraman, Division algebras and wireless communication, Notices Amer. Math.
Soc. 57(2010), 1432 -- 1439.
[46] D. Simon, Solving quadratic equations using reduced unimodular quadratic equations,
Math. Comp. 74(2005), 1531 -- 1543.
[47] J. Voight, Identifying the matrix ring: algorithms for quaternion algebras and quadratic
forms, manuscript, 2010.
15
|
1711.08381 | 1 | 1711 | 2017-11-19T14:59:15 | Symplectic, product and complex structures on 3-Lie algebras | [
"math.RA",
"math-ph",
"math.DG",
"math-ph"
] | In this paper, first we introduce the notion of a phase space of a 3-Lie algebra and show that a 3-Lie algebra has a phase space if and only if it is sub-adjacent to a 3-pre-Lie algebra. Then we introduce the notion of a product structure on a 3-Lie algebra using the Nijenhuis condition as the integrability condition. A 3-Lie algebra enjoys a product structure if and only if it is the direct sum (as vector spaces) of two subalgebras. We find that there are four types special integrability conditions, and each of them gives rise to a special decomposition of the original 3-Lie algebra. They are also related to $\huaO$-operators, Rota-Baxter operators and matched pairs of 3-Lie algebras. Parallelly, we introduce the notion of a complex structure on a 3-Lie algebra and there are also four types special integrability conditions. Finally, we add compatibility conditions between a complex structure and a product structure, between a symplectic structure and a paracomplex structure, between a symplectic structure and a complex structure, to introduce the notions of a complex product structure, a para-K\"{a}hler structure and a pseudo-K\"{a}hler structure on a 3-Lie algebra. We use 3-pre-Lie algebras to construct these structures. Furthermore, a Levi-Civita product is introduced associated to a pseudo-Riemannian 3-Lie algebra and deeply studied. | math.RA | math | Symplectic, product and complex structures on 3-Lie algebras
7
1
0
2
Yunhe Sheng and Rong Tang
Abstract
v
o
N
9
1
]
.
A
R
h
t
a
m
[
1
v
1
8
3
8
0
.
1
1
7
1
:
v
i
X
r
a
In this paper, first we introduce the notion of a phase space of a 3-Lie algebra and show
that a 3-Lie algebra has a phase space if and only if it is sub-adjacent to a 3-pre-Lie algebra.
Then we introduce the notion of a product structure on a 3-Lie algebra using the Nijenhuis
condition as the integrability condition. A 3-Lie algebra enjoys a product structure if and
only if it is the direct sum (as vector spaces) of two subalgebras. We find that there are four
types special integrability conditions, and each of them gives rise to a special decomposition
of the original 3-Lie algebra. They are also related to O-operators, Rota-Baxter operators and
matched pairs of 3-Lie algebras. Parallelly, we introduce the notion of a complex structure
on a 3-Lie algebra and there are also four types special integrability conditions. Finally, we
add compatibility conditions between a complex structure and a product structure, between
a symplectic structure and a paracomplex structure, between a symplectic structure and a
complex structure, to introduce the notions of a complex product structure, a para-Kähler
structure and a pseudo-Kähler structure on a 3-Lie algebra. We use 3-pre-Lie algebras to
construct these structures. Furthermore, a Levi-Civita product is introduced associated to a
pseudo-Riemannian 3-Lie algebra and deeply studied.
Contents
1 Introduction
2 Preliminaries
3 Representations of 3-pre-Lie algebras
4 Symplectic structures and phase spaces of 3-Lie algebras
5 Product structures on 3-Lie algebras
6 Complex structures on 3-Lie algebras
7 Complex product structures on 3-Lie algebras
8 Para-Kähler structures on 3-Lie algebras
9 Pseudo-Kähler structures on 3-Lie algebras
2
4
6
8
13
18
25
29
33
0Keyword: 3-Lie algebra, symplectic structure, complex structure, product structure, complex product structure,
para-Kähler structure, Kähler structure
1
1
Introduction
A symplectic structure on a Lie algebra g is a nondegenerate 2-cocycle ω ∈ ∧2g∗. The underlying
structure of a symplectic Lie algebra is a quadratic pre-Lie algebra [17]. An almost product
structure on a Lie algebra g is a linear map E satisfying E2 = Id. If in addition, E also satisfies
the following integrability condition
[Ex, Ey] = E([Ex, y] + [x, Ey] − E[x, y]),
∀x, y ∈ g,
then E is called a product structure. The above integrability condition is called the Nijenhuis
condition. An equivalent characterization of a product structure is that g is the direct sum (as
vector spaces) of two subalgebras. An almost complex structure on a Lie algebra g is a linear
map J satisfying J 2 = −Id. A complex structure on a Lie algebra is an almost complex struc-
ture that satisfies the Nijenhuis condition. Adding compatibility conditions between a complex
structure and a product structure, between a symplectic structure and a paracomplex structure,
between a symplectic structure and a complex structure, one obtains a complex product struc-
ture, a paraKähler structure and a pseudo-Kähler structure respectively. These structures play
important roles in algebra, geometry and mathematical physics, and are widely studied. See
[1, 2, 3, 4, 5, 8, 9, 12, 14, 15, 16, 18, 19, 29, 35] for more details.
Generalizations of Lie algebras to higher arities, including 3-Lie algebras and more generally, n-
Lie algebras [24, 28, 37], have attracted attention from several fields of mathematics and physics. It
is the algebraic structure corresponding to Nambu mechanics [25, 32, 36]. In particular, the study
of 3-Lie algebras plays an important role in string theory. In [13], Basu and Harvey suggested to
replace the Lie algebra appearing in the Nahm equation by a 3-Lie algebra for the lifted Nahm
equations. Furthermore, in the context of Bagger-Lambert-Gustavsson model of multiple M2-
branes, Bagger-Lambert managed to construct, using a ternary bracket, an N = 2 supersymmetric
version of the worldvolume theory of the M-theory membrane, see [6]. An extensive literatures are
related to this pioneering work, see [7, 26, 27, 33]. See the review article [20] for more details. In
particular, metric 3-algebras were deeply studied in the seminal works [21, 22, 23]. In [31], the
authors introduced the notion a Nijenhuis operator on an n-Lie algebra, which generates a trivial
deformation.
The purpose of this paper is to study symplectic structures, product structure and complex
structures on 3-Lie algebras and these combined structures.
In the case of Lie algebras, pre-
Lie algebras play important roles in these studies. It is believable that 3-pre-Lie algebras will play
important roles in the corresponding studies. Thus, first we introduce the notion of a representation
of a 3-pre-Lie algebra and construct the associated semidirect product 3-pre-Lie algebra. Several
important properties of representations of 3-pre-Lie algebras are studied.
Note that the notion of a symplectic structure on a 3-Lie algebra was introduced in [11] and
it is shown that the underlying structure of a symplectic 3-Lie algebra is a quadratic 3-pre-Lie
algebra. We introduce the notion of a phase space of a 3-Lie algebra g, which is a symplectic 3-Lie
algebra g ⊕ g∗ satisfying some conditions, and show that a 3-Lie algebra has a phase space if and
only if it is sub-adjacent to a 3-pre-Lie algebra. We also introduce the notion of a Manin triple
of 3-pre-Lie algebras and show that there is a one-to-one correspondence between Manin triples of
3-pre-Lie algebras and phase spaces of 3-Lie algebras.
An almost product structure on a 3-Lie algebra g is defined to be a linear map E : g −→ g satis-
fying E2 = Id. It is challengeable to add an integrability condition on an almost product structure
to obtain a product structure on a 3-Lie algebra. We note that the Nijenhuis condition (see (5))
given in [31] is the correct integrability condition. Let us explain this issue. Denote by g± the
2
eigenspaces corresponding to eigenvalues ±1 of an almost product structure E. Then it is obvious
that g = g+ ⊕ g− as vector spaces. The Nijenhuis condition ensures that both g+ and g− are sub-
algebras. This is what "integrability" means. Moreover, we find that there are four types special
integrability conditions, which are called strict product structure, abelian product structure, strong
abelian product structure and perfect product structure respectively, each of them gives rise to a
special decomposition of the original 3-Lie algebra. See the following table for a precise description:
product
structure
E[x, y, z]g = [Ex, y, z]g + [x, Ey, z]g + [x, y, Ez]g
−E([Ex, Ey, z]g + [Ex, y, Ez]g + [x, Ey, Ez]g)
strict product
structure
+[Ex, Ey, Ez]g
E[x, y, z]g = [Ex, y, z]g
abelian product
[x, y, z]g = −[x, Ey, Ez]g − [Ex, y, Ez]g − [Ex, Ey, z]g
structure
strong abelian
product structure
perfect product
structure
[x, y, z]g = E[Ex, y, z]g + E[x, Ey, z]g + E[x, y, Ez]g
O-operators
Rota-Baxter operators
E[x, y, z]g = [Ex, Ey, Ez]g
involutive automorphisms
g = g+ ⊕ g−
[g+, g+, g+]g ⊂ g+
[g−, g−, g−]g ⊂ g−
[g+, g+, g−]g = 0
[g−, g−, g+]g = 0
[g+, g+, g+]g = 0
[g−, g−, g−]g = 0
[g+, g+, g+]g = 0
[g−, g−, g−]g = 0
[g+, g+, g−]g ⊂ g+
[g−, g−, g+]g ⊂ g−
[g+, g+, g−]g ⊂ g−
[g−, g−, g+]g ⊂ g+
It is surprised that a strong abelian product structure is also an O-operator on a 3-Lie algebra
associated to the adjoint representation. Since an O-operator on a 3-Lie algebra associated to
the adjoint representation is also a Rota-Baxter operator [10, 34], it turns out that involutive
Rota-Baxter operator can also serve as an integrability condition. This is totally different from the
case of Lie algebras. Furthermore, by the definition of a perfect product structure, an involutive
automorphism of a 3-Lie algebra can also serve as an integrability condition. This is also a new
phenomenon. Note that the decomposition that a perfect product structure gives is exactly the
condition required in the definition of a matched pair of 3-Lie algebras [11]. Thus, this kind of
product structure will be frequently used in our studies.
An almost complex structure on a 3-Lie algebra g is defined to be a linear map J : g −→ g
satisfying J 2 = −Id. With the above motivation, we define a complex structure on a 3-Lie algebra
g to be an almost complex structure satisfying the Nijenhuis condition. Then gi and g−i, which are
eigenspaces of eigenvalues ±i of a complex linear map JC (the complexification of J) are subalgebras
of the 3-Lie algebra gC, the complexification of g. Parallel to the case of product structures, there
are also four types special integrability conditions, and each of them gives rise to a special decompo-
complex
structure
J[x, y, z]g = [J x, y, z]g + [x, J y, z]g + [x, y, J z]g
+J([J x, J y, z]g + [J x, y, J z]g + [x, J y, J z]g)
strict complex
structure
−[J x, J y, J z]g
J[x, y, z]g = [J x, y, z]g
abelian complex
[x, y, z]g = [x, J y, J z]g + [J x, y, J z]g + [J x, J y, z]g
sition of gC:
structure
gC = gi ⊕ g−i
[gi, gi, gi]gC ⊂ gi
[g−i, g−i, g−i]gC ⊂ g−i
[gi, gi, g−i]gC = 0
[g−i, g−i, gi]gC = 0
[gi, gi, gi]gC = 0
[g−i, g−i, g−i]gC = 0
[x, y, z]g = −J([J x, y, z]g + [x, J y, z]g + [x, y, J z]g)
[gi, gi, gi]gC = 0
strong abelian
complex structure
perfect complex
structure
O-operators
Rota-Baxter operators
J[x, y, z]g = −[J x, J y, J z]g
anti-involutive automorphisms
3
[g−i, g−i, g−i]gC = 0
[gi, gi, g−i]gC ⊂ gi
[g−i, g−i, gi]gC ⊂ g−i
[gi, gi, g−i]gC ⊂ g−i
[g−i, g−i, gi]gC ⊂ gi
Then we add a compatibility condition between a complex structure and a product structure
on a 3-Lie algebra to define a complex product structure on a 3-Lie algebra. We give an equivalent
characterization of a complex product structure on a 3-Lie algebra g using the decomposition of g.
We add a compatibility condition between a symplectic structure and a paracomplex structure on a
3-Lie algebra to define a paraKähler structure on a 3-Lie algebra. An equivalent characterization of
a paraKähler structure on a 3-Lie algebra g is also given using the decomposition of g. Associated
to a paraKähler structure on a 3-Lie algebra, there is also a pseudo-Riemannian structure. We
introduce the notion of a Livi-Civita product associated to a pseudo-Riemannian 3-Lie algebra, and
give its precise formulas. Finally, we add a compatibility condition between a symplectic structure
and a complex structure on a 3-Lie algebra to define a pseudo-Kähler structure on a 3-Lie algebra.
The relation between a paraKähler structure and a pseudo-Kähler structure on a 3-Lie algebra
is investigated. We construct complex product structures, paraKähler structures and pseudo-
Kähler structures in terms of 3-pre-Lie algebras. We also give examples of symplectic structures,
product structures, complex structures, complex product structure, paraKähler structures and
pseudo-Kähler structures on the 4-dimensional Euclidean 3-Lie algebra A4 given in [6].
The paper is organized as follows. In Section 2, we recall Nijenhuis operators on 3-Lie algebras
and 3-pre-Lie algebras. In Section 3, we study representations of 3-pre-Lie algebras. In Section 4,
we introduce the notion of a phase space of a 3-Lie algebra and show that a 3-Lie algebra has a
phase space if and only if it is sub-adjacent to a 3-pre-Lie algebra. We also introduce the notion of
a Manin triple of 3-pre-Lie algebras and study its relation with phase spaces of 3-Lie algebras. In
Section 5, we introduce the notion of a product structure on a 3-Lie algebra and give four special
integrability conditions. In Section 6, we introduce the notion of a complex structure on a 3-Lie
algebra and give four special integrability conditions. In Section 7, we introduce the notion of a
complex product structure on a 3-Lie algebra and give its equivalent characterization. In Section
8, we introduce the notion of a paraKähler structure on a 3-Lie algebra and give its equivalent
characterization. Moreover, we give a detailed study on the associated Levi-Civita product. In
Section 9, we introduce the notion of a pseudo-Kähler structure on a 3-Lie algebra and study the
relation with a paraKähler structure.
In this paper, we work over the real field R and the complex field C and all the vector spaces
are finite-dimensional.
Acknowledgement: We give our warmest thanks to Chengming Bai for very useful comments
and discussions. This research is supported by NSFC (11471139) and NSF of Jilin Province
(20170101050JC).
2 Preliminaries
In this section, first we recall the notion of a Nijenhuis operator on a 3-Lie algebra, which will
be frequently used as the integrability condition in our later studies. Then we recall the notion
of a 3-pre-Lie algebra, which is the main tool to construct examples of symplectic, product and
complex structures on 3-Lie algebras.
Definition 2.1. A 3-Lie algebra is a vector space g together with a trilinear skew-symmetric
bracket [·, ·, ·]g : ∧3g −→ g such that the following fundamental identity holds:
[x, y, [z, w, v]g]g = [[x, y, z]g, w, v]g + [z, [x, y, w]g, v]g + [z, w, [x, y, v]g]g,
∀x, y, z, w, v ∈ g.
(1)
For x, y ∈ g, define ad : ∧2g −→ gl(g) by
adx,yz = [x, y, z]g,
∀z ∈ g.
4
Then (1) is equivalent to that adx,y is a derivation, i.e.
adx,y[z, w, v]g = [adx,yz, w, v]g + [z, adx,yw, v]g + [z, w, adx,yv]g,
∀x, y ∈ g.
Let (g, [·, ·, ·]g) be a 3-Lie algebra, and N : g −→ g a linear map. Define a 3-ary bracket
[·, ·, ·]1
N : ∧3g −→ g by
[x, y, z]1
N = [N x, y, z]g + [x, N y, z]g + [x, y, N z]g − N [x, y, z]g.
Then we define 3-ary bracket [·, ·, ·]2
N : ∧3g −→ g by
[x, y, z]2
N = [N x, N y, z]g + [x, N y, N z]g + [N x, y, N z]g − N [x, y, z]1
N .
(2)
(3)
Definition 2.2. ([31]) Let (g, [·, ·, ·]g) be a 3-Lie algebra. A linear map N : g −→ g is called a
Nijenhuis operator if the following Nijenhuis condition is satisfied:
[N x, N y, N z]g = N [x, y, z]2
N ,
∀x, y, z ∈ g.
(4)
More precisely, a linear map N : g −→ g of a 3-Lie algebra (g, [·, ·, ·]g) is a Nijenhuis operator
if and only if
[N x, N y, N z]g = N [N x, N y, z]g + N [x, N y, N z]g + N [N x, y, N z]g
−N 2[N x, y, z]g − N 2[x, N y, z]g − N 2[x, y, N z]g
+N 3[x, y, z]g.
(5)
Definition 2.3. ([28]) A representation of a 3-Lie algebra (g, [·, ·, ·]g) on a vector space V is a
linear map ρ : ∧2g −→ gl(V ), such that for all x1, x2, x3, x4 ∈ g, there holds:
ρ([x1, x2, x3]g, x4) + ρ(x3, [x1, x2, x4]g) = [ρ(x1, x2), ρ(x3, x4)];
ρ([x1, x2, x3]g, x4) = ρ(x1, x2) ◦ ρ(x3, x4) + ρ(x2, x3) ◦ ρ(x1, x4) + ρ(x3, x1) ◦ ρ(x2, x4).
Example 2.4. Let (g, [·, ·, ·]g) be a 3-Lie algebra. The linear map ad : ∧2g −→ gl(g) defines a
representation of the 3-Lie algebra g on itself, which we call the adjoint representation of g.
Let A be a vector space. For a linear map φ : A ⊗ A → gl(V ), we define a linear map
φ∗ : A ⊗ A → gl(V ∗) by
hφ∗(x, y)α, vi = −hα, φ(x, y)vi, ∀α ∈ V ∗, x, y ∈ g, v ∈ V.
Lemma 2.5. ([11]) Let (V, ρ) be a representation of a 3-Lie algebra (g, [·, ·, ·]g). Then (V ∗, ρ∗) is
a representation of the 3-Lie algebra (g, [·, ·, ·]g), which is called the dual representation.
Lemma 2.6. Let g be a 3-Lie algebra, V a vector space and ρ : ∧2g → gl(V ) a skew-symmetric
linear map. Then (V ; ρ) is a representation of g if and only if there is a 3-Lie algebra structure
(called the semidirect product) on the direct sum of vector spaces g ⊕ V , defined by
[x1 + v1, x2 + v2, x3 + v3]ρ = [x1, x2, x3]g + ρ(x1, x2)v3 + ρ(x2, x3)v1 + ρ(x3, x1)v2,
(6)
for all xi ∈ g, vi ∈ V, 1 ≤ i ≤ 3. We denote this semidirect product 3-Lie algebra by g ⋉ρ V.
5
Definition 2.7. Let A be a vector space with a linear map {·, ·, ·} : ⊗3A → A. The pair (A, {·, ·, ·})
is called a 3-pre-Lie algebra if the following identities hold:
{x, y, z} = −{y, x, z}
{x1, x2, {x3, x4, x5}} = {[x1, x2, x3]C , x4, x5} + {x3, [x1, x2, x4]C , x5}
{[x1, x2, x3]C , x4, x5} = {x1, x2, {x3, x4, x5}} + {x2, x3, {x1, x4, x5}}
+{x3, x4, {x1, x2, x5}}
+{x3, x1, {x2, x4, x5}},
where x, y, z, xi ∈ A, 1 ≤ i ≤ 5 and [·, ·, ·]C is defined by
[x, y, z]C , {x, y, z} + {y, z, x} + {z, x, y}, ∀x, y, z ∈ A.
(7)
(8)
(9)
(10)
Proposition 2.8. ([11, Proposition 3.21]) Let (A, {·, ·, ·}) be a 3-pre-Lie algebra. Then (A, [·, ·, ·]C )
is a 3-Lie algebra, which is called the sub-adjacent 3-Lie algebra of A, and denoted by Ac. (A, {·, ·, ·})
is called the compatible 3-pre-Lie algebra structure on the 3-Lie algebra Ac.
Define the left multiplication L : ∧2A −→ gl(A) by L(x, y)z = {x, y, z} for all x, y, z ∈ A. Then
(A, L) is a representation of the 3-Lie algebra Ac. Moreover, we define the right multiplication
R : ⊗2A → gl(A) by R(x, y)z = {z, x, y}. If there is a 3-pre-Lie algebra structure on its dual
space A∗, we denote the left multiplication and right multiplication by L and R respectively.
Definition 2.9. ([11, Definition 3.16]) Let (g, [·, ·, ·]g) be a 3-Lie algebra and (V, ρ) a representation.
A linear operator T : V → g is called an O-operator associated to (V, ρ) if T satisfies:
[T u, T v, T w]g = T (ρ(T u, T v)w + ρ(T v, T w)u + ρ(T w, T u)v), ∀u, v, w ∈ V.
(11)
Proposition 2.10. ([11, Proposition 3.27]) Let (g, [·, ·, ·]g) be a 3-Lie algebra. Then there is
a compatible 3-pre-Lie algebra if and only if there exists an invertible O-operator T : V → g
associated to a representation (V, ρ). Furthermore, the compatible 3-pre-Lie structure on g is given
by
{x, y, z} = T ρ(x, y)T −1(z), ∀x, y, z ∈ g.
(12)
3 Representations of 3-pre-Lie algebras
In this section, we introduce the notion of a representation of a 3-pre-Lie algebra, construct the
corresponding semidirect product 3-pre-Lie algebra and give the dual representation.
Definition 3.1. A representation of a 3-pre-Lie algebra (A, {·, ·, ·}) on a vector space V consists
of a pair (ρ, µ), where ρ : ∧2A → gl(V ) is a representation of the 3-Lie algebra Ac on V and
6
µ : ⊗2A → gl(V ) is a linear map such that for all x1, x2, x3, x4 ∈ A, the following equalities hold:
ρ(x1, x2)µ(x3, x4) = µ(x3, x4)ρ(x1, x2) − µ(x3, x4)µ(x2, x1)
µ([x1, x2, x3]C , x4) = ρ(x1, x2)µ(x3, x4) + ρ(x2, x3)µ(x1, x4) + ρ(x3, x1)µ(x2, x4),
µ(x1, {x2, x3, x4}) = µ(x3, x4)µ(x1, x2) + µ(x3, x4)ρ(x1, x2)
+µ(x3, x4)µ(x1, x2) + µ([x1, x2, x3]C , x4) + µ(x3, {x1, x2, x4}), (13)
(14)
−µ(x3, x4)µ(x2, x1) − µ(x2, x4)µ(x1, x3)
−µ(x2, x4)ρ(x1, x3) + µ(x2, x4)µ(x3, x1) + ρ(x2, x3)µ(x1, x4),
(15)
µ(x3, x4)ρ(x1, x2) = µ(x3, x4)µ(x2, x1) − µ(x3, x4)µ(x1, x2)
+ρ(x1, x2)µ(x3, x4) − µ(x2, {x1, x3, x4}) + µ(x1, {x2, x3, x4}).
(16)
Let (A, {·, ·, ·}) be a 3-pre-Lie algebra and ρ a representation of the sub-adjacent 3-Lie alge-
bra (Ac, [·, ·, ·]C ) on the vector space V . Then (ρ, 0) is a representation of the 3-pre-Lie algebra
(A, {·, ·, ·}) on the vector space V . It is obvious that (L, R) is a representation of a 3-pre-Lie algebra
on itself, which is called the regular representation.
Let (V, ρ, µ) be a representation of a 3-pre-Lie algebra (A, {·, ·, ·}). Define a trilinear bracket
operation {·, ·, ·}ρ,µ : ⊗3(A ⊕ V ) → A ⊕ V by
{x1 + v1, x2 + v2, x3 + v3}ρ,µ , {x1, x2, x3} + ρ(x1, x2)v3 + µ(x2, x3)v1 − µ(x1, x3)v2.
(17)
By straightforward computations, we have
Theorem 3.2. With the above notation, (A ⊕ V, {·, ·, ·}ρ,µ) is a 3-pre-Lie algebra.
This 3-pre-Lie algebra is called the semidirect product of the 3-pre-Lie algebra (A, {·, ·, ·})
and (V, ρ, µ), and denoted by A ⋉ρ,µ V .
Let V be a vector space. Define the switching operator τ : ⊗2V −→ ⊗2V by
τ (T ) = x2 ⊗ x1,
∀T = x1 ⊗ x2 ∈ ⊗2V.
Proposition 3.3. Let (ρ, µ) be a representation of a 3-pre-Lie algebra (A, {·, ·, ·}) on a vector
space V . Then ρ − µτ + µ is a representation of the sub-adjacent 3-Lie algebra (Ac, [·, ·, ·]C ) on the
vector space V .
Proof. By Theorem 3.2, we have the semidirect product 3-pre-Lie algebra A ⋉ρ,µ V . Consider its
sub-adjacent 3-Lie algebra structure [·, ·, ·]C , we have
[x1 + v1, x2 + v2, x3 + v3]C = {x1 + v1, x2 + v2, x3 + v3}ρ,µ + {x2 + v2, x3 + v3, x1 + v1}ρ,µ
{x3 + v3, x1 + v1, x2 + v2}ρ,µ
= {x1, x2, x3} + ρ(x1, x2)v3 + µ(x2, x3)v1 − µ(x1, x3)v2
+{x2, x3, x1} + ρ(x2, x3)v1 + µ(x3, x1)v2 − µ(x2, x1)v3
+{x3, x1, x2} + ρ(x3, x1)v2 + µ(x1, x2)v3 − µ(x3, x2)v1
= [x1, x2, x3]C + ((ρ − µτ + µ)(x1, x2))v3
+((ρ − µτ + µ)(x2, x3))v1 + ((ρ − µτ + µ)(x3, x1))v2.
(18)
By Lemma 2.6, ρ − µτ + µ is a representation of the sub-adjacent 3-Lie algebra (Ac, [·, ·, ·]C ) on
the vector space V . The proof is finished.
If (ρ, µ) = (L, R) is the regular representation of a 3-pre-Lie algebra (A, {·, ·, ·}), then ρ − µτ +
µ = ad is the adjoint representation of the sub-adjacent 3-Lie algebra (Ac, [·, ·, ·]C ).
7
Corollary 3.4. Let (ρ, µ) be a representation of a 3-pre-Lie algebra (A, {·, ·, ·}) on a vector space
V . Then the semidirect product 3-pre-Lie algebras A ⋉ρ,µ V and A ⋉ρ−µτ +µ,0 V given by the
representations (ρ, µ) and (ρ − µτ + µ, 0) respectively have the same sub-adjacent 3-Lie algebra
Ac ⋉ρ−µτ +µ V given by (18), which is the semidirect product of the 3-Lie algebra (Ac, [·, ·, ·]C ) and
its representation (V, ρ − µτ + µ).
Proposition 3.5. Let (ρ, µ) be a representation of a 3-pre-Lie algebra (A, {·, ·, ·}) on a vector
space V . Then (ρ∗ − µ∗τ + µ∗, −µ∗) is a representation of the 3-pre-Lie algebra (A, {·, ·, ·}) on the
vector space V ∗, which is called the dual representation of the representation (V, ρ, µ).
Proof. By Proposition 3.3, ρ − µτ + µ is a representation of the sub-adjacent 3-Lie algebra
(Ac, [·, ·, ·]C ) on the vector space V . By Lemma 2.5, ρ∗ − µ∗τ + µ∗ is a representation of the
sub-adjacent 3-Lie algebra (Ac, [·, ·, ·]C ) on the dual vector space V ∗.
It is straightforward to
deduce that other conditions in Definition 3.1 also hold. We leave details to readers.
Corollary 3.6. Let (V, ρ, µ) be a representation of a 3-pre-Lie algebra (A, {·, ·, ·}). Then the
semidirect product 3-pre-Lie algebras A ⋉ρ∗,0 V ∗ and A ⋉ρ∗−µ∗τ +µ∗,−µ∗ V ∗ given by the repre-
sentations (ρ∗, 0) and (ρ∗ − µ∗τ + µ∗, −µ∗) respectively have the same sub-adjacent 3-Lie algebra
Ac ⋉ρ∗ V ∗, which is the semidirect product of the 3-Lie algebra (Ac, [·, ·, ·]C ) and its representation
(V ∗, ρ∗).
If (ρ, µ) = (L, R) is the regular representation of a 3-pre-Lie algebra (A, {·, ·, ·}), then (ρ∗ −
µ∗τ + µ∗, −µ∗) = (ad∗, −R∗) and the corresponding semidirect product 3-Lie algebra is Ac ⋉L∗ A∗,
which is the key object when we construct phase spaces of 3-Lie algebras in the next section.
4 Symplectic structures and phase spaces of 3-Lie algebras
In this section, we introduce the notion of a phase space of a 3-Lie algebra and show that a 3-
Lie algebra has a phase space if and only if it is sub-adjacent to a 3-pre-Lie algebra. Moreover,
we introduce the notion of a Manin triple of 3-pre-Lie algebras and show that there is a one-to-
one correspondence between Manin triples of 3-pre-Lie algebras and perfect phase spaces of 3-Lie
algebras.
Definition 4.1. ([11]) A symplectic structure on a 3-Lie algebra (g, [·, ·, ·]g) is a nondegenerate
skew-symmetric bilinear form ω ∈ ∧2g∗ satisfying the following equality:
ω([x, y, z]g, w) − ω([y, z, w]g, x) + ω([z, w, x]g, y) − ω([w, x, y]g, z) = 0,
∀x, y, z, w ∈ g.
(19)
Example 4.2. Consider the 4-dimensional Euclidean 3-Lie algebra A4 given in [6]. The underlying
vector space is R4. Relative to an orthogonal basis {e1, e2, e3, e4}, the 3-Lie bracket is given by
[e1, e2, e3] = e4,
[e2, e3, e4] = e1,
[e1, e3, e4] = e2,
[e1, e2, e4] = e3.
Then it is straightforward to see that any nondegenerate skew-symmetric bilinear form is a sym-
plectic structure on A4. In particular,
ω1 = e∗
ω4 = e∗
3 ∧ e∗
1 ∧ e∗
1 + e∗
2 + e∗
4 ∧ e∗
4 ∧ e∗
2, ω2 = e∗
3, ω5 = e∗
2 ∧ e∗
1 ∧ e∗
1 + e∗
2 + e∗
4 ∧ e∗
3 ∧ e∗
3, ω3 = e∗
4, ω6 = e∗
2 ∧ e∗
1 ∧ e∗
1 + e∗
3 + e∗
3 ∧ e∗
4,
2 ∧ e∗
4
are symplectic structures on A4, where {e∗
4} are the dual basis.
1, e∗
2, e∗
3, e∗
8
Proposition 4.3. ([11]) Let (g, [·, ·, ·]g, ω) be a symplectic 3-Lie algebra. Then there exists a
compatible 3-pre-Lie algebra structure {·, ·, ·} on g given by
ω({x, y, z}, w) = −ω(z, [x, y, w]g),
∀x, y, z, w ∈ g.
(20)
A quadratic 3-pre-Lie algebra is a 3-pre-Lie algebra (A, {·, ·, ·}) equipped with a nondegen-
erate skew-symmetric bilinear form ω ∈ ∧2A∗ such that the following invariant condition holds:
ω({x, y, z}, w) = −ω(z, [x, y, w]C),
∀x, y, z, w ∈ A.
(21)
Proposition 4.3 tells us that quadratic 3-pre-Lie algebras are the underlying structures of symplectic
3-Lie algebras.
Let V be a vector space and V ∗ = Hom(V, R) its dual space. Then there is a natural nonde-
generate skew-symmetric bilinear form ω on T ∗V = V ⊕ V ∗ given by:
ω(x + α, y + β) = hα, yi − hβ, xi, ∀x, y ∈ V, α, β ∈ V ∗.
(22)
Definition 4.4. Let (h, [·, ·, ·]h) be a 3-Lie algebra and h∗ its dual space.
• If there is a 3-Lie algebra structure [·, ·, ·] on the direct sum vector space T ∗h = h ⊕ h∗ such
that (h ⊕ h∗, [·, ·, ·], ω) is a symplectic 3-Lie algebra, where ω given by (22), and (h, [·, ·, ·]h)
and (h∗, [·, ·, ·]h∗ ) are 3-Lie subalgebras of (h ⊕ h∗, [·, ·, ·]), then the symplectic 3-Lie algebra
(h ⊕ h∗, [·, ·, ·], ω) is called a phase space of the 3-Lie algebra (h, [·, ·, ·]h).
• A phase space (h ⊕ h∗, [·, ·, ·], ω) is called perfect if the following conditions are satisfied:
[x, y, α] ∈ h∗,
[α, β, x] ∈ h,
∀x, y ∈ h, α, β ∈ h∗.
(23)
3-pre-Lie algebras play important role in the study of phase spaces of 3-Lie algebras.
Theorem 4.5. A 3-Lie algebra has a phase space if and only if it is sub-adjacent to a 3-pre-Lie
algebra.
Proof. Let (A, {·, ·, ·}) be a 3-pre-Lie algebra. By Proposition 2.8, the left multiplication L is a
representation of the sub-adjacent 3-Lie algebra Ac on A. By Lemma 2.5, L∗ is a representation
of the sub-adjacent 3-Lie algebra Ac on A∗. Thus, we have the semidirect product 3-Lie algebra
Ac ⋉L∗ A∗ = (Ac ⊕ A∗, [·, ·, ·]L∗ ). Then (Ac ⋉L∗ A∗, ω) is a symplectic 3-Lie algebra, which is a
phase space of the sub-adjacent 3-Lie algebra (Ac, [·, ·, ·]C ). In fact, for all x1, x2, x3, x4 ∈ A and
α1, α2, α3, α4 ∈ A∗, we have
ω([x1 + α1, x2 + α2, x3 + α3]L∗ , x4 + α4)
= ω([x1, x2, x3]C + L∗(x1, x2)α3 + L∗(x2, x3)α1 + L∗(x3, x1)α2, x4 + α4)
= hL∗(x1, x2)α3 + L∗(x2, x3)α1 + L∗(x3, x1)α2, x4i − hα4, [x1, x2, x3]Ci
= −hα3, {x1, x2, x4}i − hα1, {x2, x3, x4}i − hα2, {x3, x1, x4}i
−hα4, {x1, x2, x3}i − hα4, {x2, x3, x1}i − hα4, {x3, x1, x2}i.
9
Similarly, we have
ω([x2 + α2, x3 + α3, x4 + α4]L∗ , x1 + α1)
= −hα4, {x2, x3, x1}i − hα2, {x3, x4, x1}i − hα3, {x4, x2, x1}i
−hα1, {x2, x3, x4}i − hα1, {x3, x4, x2}i − hα1, {x4, x2, x3}i,
ω([x3 + α3, x4 + α4, x1 + α1]L∗ , x2 + α2)
= −hα1, {x3, x4, x2}i − hα3, {x4, x1, x2}i − hα4, {x1, x3, x2}i
−hα2, {x3, x4, x1}i − hα2, {x4, x1, x3}i − hα2, {x1, x3, x4}i,
ω([x4 + α4, x1 + α1, x2 + α2]L∗ , x3 + α3)
= −hα2, {x4, x1, x3}i − hα4, {x1, x2, x3}i − hα1, {x2, x4, x3}i
−hα3, {x4, x1, x2}i − hα3, {x1, x2, x4}i − hα3, {x2, x4, x1}i.
Since {x1, x2, x3} = −{x2, x1, x3}, we deduce that ω is a symplectic structure on the semidirect
product 3-Lie algebra Ac ⋉L∗ A∗. Moreover, (Ac, [·, ·, ·]C ) is a subalgebra of Ac ⋉L∗ A∗ and A∗ is
an abelian subalgebra of Ac ⋉L∗ A∗. Thus, the symplectic 3-Lie algebra (Ac ⋉L∗ A∗, ω) is a phase
space of the sub-adjacent 3-Lie algebra (Ac, [·, ·, ·]C ).
Conversely, let (T ∗h = h ⊕ h∗, [·, ·, ·], ω) be a phase space of a 3-Lie algebra (h, [·, ·, ·]h). By
Proposition 4.3, there exists a compatible 3-pre-Lie algebra structure {·, ·, ·} on T ∗h given by (20).
Since (h, [·, ·, ·]h) is a subalgebra of (h ⊕ h∗, [·, ·, ·]), we have
ω({x, y, z}, w) = −ω(z, [x, y, w]) = −ω(z, [x, y, w]h) = 0,
∀x, y, z, w ∈ h.
Thus, {x, y, z} ∈ h, which implies that (h, {·, ·, ·}h) is a subalgebra of the 3-pre-Lie algebra
Its sub-adjacent 3-Lie algebra (hc, [·, ·, ·]C ) is exactly the original 3-Lie algebra
(T ∗h, {·, ·, ·}).
(h, [·, ·, ·]h).
Corollary 4.6. Let (T ∗h = h ⊕ h∗, [·, ·, ·], ω) be a phase space of a 3-Lie algebra (h, [·, ·, ·]h) and
(h ⊕ h∗, {·, ·, ·}) the associated 3-pre-Lie algebra. Then both (h, {·, ·, ·}h) and (h∗, {·, ·, ·}h∗) are
subalgebras of the 3-pre-Lie algebra (h ⊕ h∗, {·, ·, ·}).
Corollary 4.7. If (h ⊕ h∗, [·, ·, ·], ω) is a phase space of a 3-Lie algebra (h, [·, ·, ·]h) such that the 3-
Lie algebra (h ⊕ h∗, [·, ·, ·]) is a semidirect product h ⋉ρ∗ h∗, where ρ is a representation of (h, [·, ·, ·]h)
on h and ρ∗ is its dual representation, then
{x, y, z} , ρ(x, y)z,
∀x, y, z ∈ h,
defines a 3-pre-Lie algebra structure on h.
Proof. For all x, y, z ∈ h and α ∈ h∗, we have
hα, {x, y, z}i = −ω({x, y, z}, α) = ω(z, [x, y, α]g⊕g∗ ) = ω(z, ρ∗(x, y)α) = −hρ∗(x, y)α, zi
= hα, ρ(x, y)zi.
Therefore, {x, y, z} = ρ(x, y)z.
Example 4.8. Let (A, {·, ·, ·}A) be a 3-pre-Lie algebra. Since there is a semidirect product 3-pre-
Lie algebra structure (A ⋉L∗,0 A∗, {·, ·, ·}L∗,0) on the phase space T ∗Ac = Ac ⋉L∗ A∗, one can
10
construct a new phase space T ∗Ac ⋉L∗ (T ∗Ac)∗. This process can be continued indefinitely. Hence,
there exist a series of phase spaces {A(n)}n≥2 :
A(1) = Ac, A(2) = T ∗A(1) = Ac ⋉L∗ A∗, · · · , A(n) = T ∗A(n−1), · · · .
A(n) (n ≥ 2) is called the symplectic double of A(n−1).
At the end of this section, we introduce the notion of a Manin triple of 3-pre-Lie algebras.
Definition 4.9. A Manin triple of 3-pre-Lie algebras is a triple (A; A, A′), where
• (A, {·, ·, ·}, ω) is a quadratic 3-pre-Lie algebra;
• both A and A′ are isotropic subalgebras of (A, {·, ·, ·});
• A = A ⊕ A′ as vector spaces;
• for all x, y ∈ A and α, β ∈ A′, there holds:
{x, y, α} ∈ A′,
{α, x, y} ∈ A′,
{α, β, x} ∈ A,
{x, α, β} ∈ A.
(24)
In a Manin triple of 3-pre-Lie algebras, since the skewsymmetric bilinear form ω is nondegen-
erate, A′ can be identified with A∗ via
hα, xi , ω(α, x),
∀x ∈ A, α ∈ A′.
Thus, A is isomorphic to A ⊕ A∗ naturally and the bilinear form ω is exactly given by (22). By
the invariant condition (21), we can obtain the precise form of the 3-pre-Lie structure {·, ·, ·} on
A ⊕ A∗.
Proposition 4.10. Let (A ⊕ A∗; A, A∗) be a Manin triple of 3-pre-Lie algebras, where the non-
degenerate skewsymmetric bilinear form ω on the 3-pre-Lie algebra is given by (22). Then we
have
{x, y, α} = (L∗ − R∗τ + R∗)(x, y)α,
{α, x, y} = −R∗(x, y)α,
{α, β, x} = (L∗ − R∗τ + R∗)(α, β)x,
{x, α, β} = −R∗(α, β)x.
(25)
(26)
(27)
(28)
Proof. For all x, y, z ∈ A, α ∈ A∗, we have
h{x, y, α}, zi = ω({x, y, α}, z) = −ω(α, [x, y, z]C )
= −ω(α, {x, y, z} + {y, z, x} + {z, x, y})
= −ω(α, L(x, y)z − R(y, x)z + R(x, y)z)
= −hα, L(x, y)z − R(y, x)z + R(x, y)zi
= h(L∗ − R∗τ + R∗)(x, y)α, zi,
which implies that (25) holds. We have
h{α, x, y}, zi = ω({α, x, y}, z) = −ω(y, [α, x, z]C ) = ω(y, [z, x, α]C ) = −ω({z, x, y}, α)
= hα, R(x, y)zi = −hR∗(x, y)α, zi,
which implies that (26) holds. Similarly, we can deduce that (27) and (28) hold.
11
Theorem 4.11. There is a one-to-one correspondence between Manin triples of 3-pre-Lie algebras
and perfect phase spaces of 3-Lie algebras. More precisely, if (A ⊕ A∗; A, A∗) is a Manin triple
of 3-pre-Lie algebras, then (A ⊕ A∗, [·, ·, ·]C , ω) is a symplectic 3-Lie algebra, where ω is given by
(22). Conversely, if (h ⊕ h∗, [·, ·, ·], ω) is a perfect phase space of a 3-Lie algebra (h, [·, ·, ·]h), then
(h⊕h∗; h, h∗) is a Manin triple of 3-pre-Lie algebras, where the 3-pre-Lie algebra structure on h⊕h∗
is given by (20).
Proof. Let (A⊕A∗; A, A∗) be a Manin triple of 3-pre-Lie algebras. Denote by {·, ·, ·}A and {·, ·, ·}A∗
the 3-pre-Lie algebra structure on A and A∗ respectively, and denote by [·, ·, ·]A and [·, ·, ·]A∗ the
corresponding sub-adjacent 3-Lie algebra structure on A and A∗ respectively. By Proposition 4.10,
it is straightforward to deduce that the corresponding 3-Lie algebra structure [·, ·, ·]C on A ⊕ A∗ is
given by
[x + α, y + β, z + γ]C = [x, y, z]A + L∗(α, β)z + L∗(β, γ)x + L∗(γ, α)y
+[α, β, γ]A∗ + L∗(x, y)γ + L∗(y, z)α + L∗(z, x)β.
(29)
For all x1, x2, x3, x4 ∈ A and α1, α2, α3, α4 ∈ A∗, we have
ω([x1 + α1, x2 + α2, x3 + α3]C , x4 + α4)
= ω([x1, x2, x3]A + L∗(α1, α2)x3 + L∗(α2, α3)x1 + L∗(α3, α1)x2
+[α1, α2, α3]A∗ + L∗(x1, x2)α3 + L∗(x2, x3)α1 + L∗(x3, x1)α2, x4 + α4)
= h[α1, α2, α3]A∗ + L∗(x1, x2)α3 + L∗(x2, x3)α1 + L∗(x3, x1)α2, x4i
−hα4, [x1, x2, x3]A + L∗(α1, α2)x3 + L∗(α2, α3)x1 + L∗(α3, α1)x2i
= h[α1, α2, α3]A∗ , x4i − hα3, {x1, x2, x4}Ai − hα1, {x2, x3, x4}Ai − hα2, {x3, x1, x4}Ai
−hα4, [x1, x2, x3]Ai + h{α1, α2, α4}A∗, x3i + h{α2, α3, α4}A∗, x1i + h{α3, α1, α4}A∗, x2i.
Similarly, we have
ω([x2 + α2, x3 + α3, x4 + α4], x1 + α1)
= h[α2, α3, α4]C , x1i − hα4, {x2, x3, x1}Ai − hα2, {x3, x4, x1}Ai − hα3, {x4, x2, x1}Ai
−hα1, [x2, x3, x4]C i + h{α2, α3, α1}A∗, x4i + h{α3, α4, α1}A∗, x2i + h{α4, α2, α1}A∗, x3i,
ω([x3 + α3, x4 + α4, x1 + α1], x2 + α2)
= h[α3, α4, α1]C , x2i − hα1, {x3, x4, x2}Ai − hα3, {x4, x1, x2}Ai − hα4, {x1, x3, x2}Ai
−hα2, [x3, x4, x1]C i + h{α3, α4, α2}A∗, x1i + h{α4, α1, α2}A∗, x3i + h{α1, α3, α2}A∗, x4i,
ω([x4 + α4, x1 + α1, x2 + α2], x3 + α3)
= h[α4, α1, α2]C , x3i − hα2, {x4, x1, x3}Ai − hα4, {x1, x2, x3}Ai − hα1, {x2, x4, x3}Ai
−hα3, [x4, x1, x2]C i + h{α4, α1, α3}A∗, x2i + h{α1, α2, α3}A∗, x4i + h{α2, α4, α3}A∗, x1i.
By {x1, x2, x3}A = −{x2, x1, x3}A and {α1, α2, α3}A∗ = −{α2, α1, α3}A∗ , we deduce that ω is a
symplectic structure on the 3-Lie algebra (A ⊕ A∗, [·, ·, ·]C ). Therefore, it is a phase space.
Conversely, let (h⊕h∗, [·, ·, ·], ω) be a phase space of the 3-Lie algebra (h, [·, ·, ·]h). By Proposition
4.3, there exists a 3-pre-Lie algebra structure {·, ·, ·} on h ⊕ h∗ given by (20) such that (h ⊕
h∗, {·, ·, ·}, ω) is a quadratic 3-pre-Lie algebra. By Corollary 4.6, (h, {·, ·, ·}h) and (h∗, {·, ·, ·}h∗)
are 3-pre-Lie subalgebras of (h ⊕ h∗, {·, ·, ·}). It is obvious that both h and h∗ are isotropic. Thus,
we only need to show that (24) holds. By (23), for all x1, x2 ∈ h and α1, α2 ∈ h∗, we have
ω({x1, x2, α1}, α2) = −ω(α1, [x1, x2, α2]C ) = 0,
12
which implies that {x1, x2, α1} ∈ h∗. Similarly, we can show that the other conditions in (24) also
hold. The proof is finished.
Remark 4.12. The notions of a matched pair of 3-Lie algebras and a Manin triple of 3-Lie
algebras were introduced in [11]. By (29), we obtain that (Ac, A∗c; L∗, L∗) is a matched pair of
3-Lie algebras and the phase space is exactly the double of this matched pair. However, one should
note that a Manin triple of 3-pre-Lie algebras does not give rise to a Manin triple of 3-Lie algebras.
Remark 4.13. For pre-Lie algebras, there are equivalent description between Manin triples of pre-
Lie algebras, matched pairs of pre-Lie algebras associated to the dual representations of the regular
representations and pre-Lie bialgebras [8]. Here we only study Manin triples of 3-pre-Lie algebras,
which are closely related to phase spaces of 3-Lie algebras and para-Kähler 3-Lie algebras that
studied in Section 8. We postpone the study of matched pairs of 3-pre-Lie algebras and 3-pre-Lie
bialgebras in the future.
5 Product structures on 3-Lie algebras
In this section, we introduce the notion of a product structure on a 3-Lie algebra using the Nijenhuis
condition as the integrability condition. We find four special integrability conditions, each of them
gives a special decomposition of the original 3-Lie algebra. At the end of this section, we introduce
the notion of a (perfect) paracomplex structure on a 3-Lie algebra and give examples.
Definition 5.1. Let (g, [·, ·, ·]g) be a 3-Lie algebra. An almost product structure on the 3-Lie
algebra (g, [·, ·, ·]g) is a linear endomorphism E : g → g satisfying E2 = Id (E 6= ±Id). An almost
product structure is called a product structure if the following integrability condition is satisfied:
E[x, y, z]g = [Ex, Ey, Ez]g + [Ex, y, z]g + [x, Ey, z]g + [x, y, Ez]g
−E[Ex, Ey, z]g − E[x, Ey, Ez]g − E[Ex, y, Ez]g.
(30)
Remark 5.2. One can understand a product structure on a 3-Lie algebra as a Nijenhuis operator
E on a 3-Lie algebra satisfying E2 = Id.
Theorem 5.3. Let (g, [·, ·, ·]g) be a 3-Lie algebra. Then (g, [·, ·, ·]g) has a product structure if and
only if g admits a decomposition:
g = g+ ⊕ g−,
(31)
where g+ and g− are subalgebras of g.
Proof. Let E be a product structure on g. By E2 = Id , we have g = g+ ⊕ g−, where g+ and g−
are the eigenspaces of g associated to the eigenvalues ±1. For all x1, x2, x3 ∈ g+, we have
E[x1, x2, x3]g = [Ex1, Ex2, Ex3]g + [Ex1, x2, x3]g + [x1, Ex2, x3]g + [x1, x2, Ex3]g
−E[Ex1, Ex2, x3]g − E[x1, Ex2, Ex3]g − E[Ex1, x2, Ex3]g
= 4[x1, x2, x3]g − 3E[x1, x2, x3]g.
Thus, we have [x1, x2, x3]g ∈ g+, which implies that g+ is a subalgebra. Similarly, we can show
that g− is a subalgebra.
13
Conversely, we define a linear endomorphism E : g → g by
E(x + α) = x − α, ∀x ∈ g+, α ∈ g−.
(32)
Obviously we have E2 = Id. Since g+ is a subalgebra of g, for all x1, x2, x3 ∈ g+, we have
[Ex1, Ex2, Ex3]g + [Ex1, x2, x3]g + [x1, Ex2, x3]g + [x1, x2, Ex3]g
−E[Ex1, Ex2, x3]g − E[x1, Ex2, Ex3]g − E[Ex1, x2, Ex3]g
= 4[x1, x2, x3]g − 3E[x1, x2, x3]g = [x1, x2, x3]g
= E[x1, x2, x3]g,
which implies that (30) holds for all x1, x2, x3 ∈ g+. Similarly, we can show that (30) holds for all
x, y, z ∈ g. Therefore, E is a product structure on g.
Lemma 5.4. Let E be an almost product structure on a 3-Lie algebra (g, [·, ·, ·]g). If E satisfies
the following equation
E[x, y, z]g = [Ex, y, z]g,
(33)
then E is a product structure on g such that [g+, g+, g−]g = 0 and [g−, g−, g+]g = 0, i.e. g is the
3-Lie algebra direct sum of g+ and g−.
Proof. By (33) and E2 = Id, we have
[Ex, Ey, Ez]g + [Ex, y, z]g + [x, Ey, z]g + [x, y, Ez]g
−E[Ex, Ey, z]g − E[x, Ey, Ez]g − E[Ex, y, Ez]g
= [Ex, Ey, Ez]g + E[x, y, z]g + [x, Ey, z]g + [x, y, Ez]g
−[E2x, Ey, z]g − [Ex, Ey, Ez]g − [E2x, y, Ez]g
= E[x, y, z]g.
Thus, E is a product structure on g. For all x1, x2 ∈ g+, α1 ∈ g−, on one hand we have
E[α1, x1, x2]g = [Eα1, x1, x2]g = −[α1, x1, x2]g.
On the other hand, we have
E[α1, x1, x2]g = E[x1, x2, α1]g = [Ex1, x2, α1]g = [x1, x2, α1]g.
Thus, we obtain [g+, g+, g−]g = 0. Similarly, we have [g−, g−, g+]g = 0. The proof is finished.
Definition 5.5. (Integrability condition I) An almost product structure E on a 3-Lie algebra
(g, [·, ·, ·]g) is called a strict product structure if (33) holds.
Corollary 5.6. Let (g, [·, ·, ·]g) be a 3-Lie algebra. Then (g, [·, ·, ·]g) has a strict product structure
if and only if g admits a decomposition:
where g+ and g− are subalgebras of g such that [g+, g+, g−]g = 0 and [g−, g−, g+]g = 0.
Proof. We leave the details to readers.
g = g+ ⊕ g−,
14
Lemma 5.7. Let E be an almost product structure on a 3-Lie algebra (g, [·, ·, ·]g). If E satisfies
the following equation
[x, y, z]g = −[x, Ey, Ez]g − [Ex, y, Ez]g − [Ex, Ey, z]g,
(34)
then E is a product structure on g.
Proof. By (34) and E2 = Id, we have
[Ex, Ey, Ez]g + [Ex, y, z]g + [x, Ey, z]g + [x, y, Ez]g
−E[Ex, Ey, z]g − E[x, Ey, Ez]g − E[Ex, y, Ez]g
= −[Ex, E2y, E2z]g − [E2x, Ey, E2z]g − [E2x, E2y, Ez]g
+[Ex, y, z]g + [x, Ey, z]g + [x, y, Ez]g + E[x, y, z]g
= E[x, y, z]g.
Thus, E is a product structure on g.
Definition 5.8. (Integrability condition II) An almost product structure E on a 3-Lie algebra
(g, [·, ·, ·]g) is called an abelian product structure if (34) holds.
Corollary 5.9. Let (g, [·, ·, ·]g) be a 3-Lie algebra. Then (g, [·, ·, ·]g) has an abelian product structure
if and only if g admits a decomposition:
g = g+ ⊕ g−,
where g+ and g− are abelian subalgebras of g.
Proof. Let E be an abelian product structure on g. For all x1, x2, x3 ∈ g+, we have
[x1, x2, x3]g = −[Ex1, Ex2, x3]g − [x1, Ex2, Ex3]g − [Ex1, x2, Ex3]g
= −3[x1, x2, x3]g,
which implies that [x1, x2, x3]g = 0. Similarly, for all α1, α2, α3 ∈ g−, we also have [α1, α2, α3]g = 0.
Thus, both g+ and g− are abelian subalgebras.
Conversely, define a linear endomorphism E : g → g by (32). Then it is straightforward to
deduce that E is an abelian product structure on g.
Lemma 5.10. Let E be an almost product structure on a 3-Lie algebra (g, [·, ·, ·]g). If E satisfies
the following equation
[x, y, z]g = E[Ex, y, z]g + E[x, Ey, z]g + E[x, y, Ez]g,
(35)
then E is an abelian product structure on g such that [g+, g+, g−]g ⊂ g+ and [g−, g−, g+]g ⊂ g−.
Proof. By (35) and E2 = Id, we have
[Ex, Ey, Ez]g + [Ex, y, z]g + [x, Ey, z]g + [x, y, Ez]g
−E[Ex, Ey, z]g − E[x, Ey, Ez]g − E[Ex, y, Ez]g
= E[x, Ey, Ez]g + E[Ex, y, Ez]g + E[Ex, Ey, z]g + E[x, y, z]g
−E[Ex, Ey, z]g − E[x, Ey, Ez]g − E[Ex, y, Ez]g
= E[x, y, z]g.
15
Thus, we obtain that E is a product structure on g. For all x1, x2, x3 ∈ g+, by (35), we have
[x1, x2, x3]g = E[Ex1, x2, x3]g + E[x1, Ex2, x3]g + E[x1, x2, Ex3]g
= 3E[x1, x2, x3]g = 3[x1, x2, x3]g.
Thus, we obtain [g+, g+, g+]g = 0. Similarly, we have [g−, g−, g−]g = 0. By Corollary 5.9, E is an
abelian product structure on g. Moreover, for all x1, x2 ∈ g+, α1 ∈ g−, we have
[x1, x2, α1]g = E[Ex1, x2, α1]g + E[x1, Ex2, α1]g + E[x1, x2, Eα1]g
= E[x1, x2, α1]g,
which implies that [g+, g+, g−]g ⊂ g+. Similarly, we have [g−, g−, g+]g ⊂ g−.
Definition 5.11. (Integrability condition III) An almost product structure E on a 3-Lie
algebra (g, [·, ·, ·]g) is called a strong abelian product structure if (35) holds.
Corollary 5.12. Let (g, [·, ·, ·]g) be a 3-Lie algebra. Then (g, [·, ·, ·]g) has a strong abelian product
structure if and only if g admits a decomposition:
g = g+ ⊕ g−,
where g+ and g− are abelian subalgebras of g such that [g+, g+, g−]g ⊂ g+ and [g−, g−, g+]g ⊂ g−.
Remark 5.13. Let E be a strong abelian product structure on a 3-Lie algebra (g, [·, ·, ·]g). Then
we can define ν+ : g+ −→ Hom(∧2g−, g−) and ν− : g− −→ Hom(∧2g+, g+) by
ν+(x)(α, β) = [α, β, x]g,
ν−(α)(x, y) = [x, y, α]g,
∀x, y ∈ g+, α, β ∈ g−.
It turns out ν+ and ν− are generalized representations of abelian 3-Lie algebras g+ and g− on g−
and g+ respectively. See [30] for more details about generalized representations of 3-Lie algebras.
More surprisingly, a strong abelian product structure is an O-operator as well as a Rota-Baxter
operator [10, 34]. Thus, some O-operators and Rota-Baxter operators on 3-Lie algebras can serve
as integrability conditions.
Proposition 5.14. Let E be an almost product structure on a 3-Lie algebra (g, [·, ·, ·]g). Then
E is a strong abelian structure on g if and only if E is an O-operator associated to the adjoint
representation (g, ad). Furthermore, there exists a compatible 3-pre-Lie algebra (g, {·, ·, ·}) on the
3-Lie algebra (g, [·, ·, ·]g), here the 3-pre-Lie algebra structure on g is given by
{x, y, z} = E[x, y, Ez]g, ∀x, y, z ∈ g.
(36)
Proof. By (35), for all x, y, z ∈ g we have
[Ex, Ey, Ez]g = E[E2x, Ey, Ez]g + E[Ex, E2y, Ez]g + E[Ex, Ey, E2z]g
= E(adEx,Eyz + adEy,Ezx + adEz,Exy).
Thus, E is an O-operator associated to the adjoint representation (g, ad).
Conversely, if for all x, y, z ∈ g, we have
[Ex, Ey, Ez]g = E(adEx,Eyz + adEy,Ezx + adEz,Exy)
= E([Ex, Ey, z]g + [x, Ey, Ez]g + [Ex, y, Ez]g),
16
then [x, y, z]g = E[x, y, Ez]g + E[Ex, y, z]g + E[x, Ey, z]g by E−1 = E. Thus, E is a strong abelian
structure on g.
Furthermore, by E−1 = E and Proposition 2.10, there exists a compatible 3-pre-Lie algebra on
g given by {x, y, z} = Eadx,yE−1(z) = E[x, y, Ez]g. The proof is finished.
There is a new phenomenon that an involutive automorphism of a 3-Lie algebra also serves as
an integrability condition.
Lemma 5.15. Let E be an almost product structure on a 3-Lie algebra (g, [·, ·, ·]g). If E satisfies
the following equation
then E is a product structure on g such that
E[x, y, z]g = [Ex, Ey, Ez]g,
Proof. By (37) and E2 = Id, we have
[g+, g+, g−]g ⊂ g−,
[g−, g−, g+]g ⊂ g+.
(37)
(38)
[Ex, Ey, Ez]g + [Ex, y, z]g + [x, Ey, z]g + [x, y, Ez]g
−E[Ex, Ey, z]g − E[x, Ey, Ez]g − E[Ex, y, Ez]g
= E[x, y, z]g + [Ex, y, z]g + [x, Ey, z]g + [x, y, Ez]g
−[E2x, E2y, Ez]g − [Ex, E2y, E2z]g − [E2x, Ey, E2z]g
= E[x, y, z]g.
Thus, E is a product structure on g. Moreover, for all x1, x2 ∈ g+, α1 ∈ g−, we have
E[x1, x2, α1]g = [Ex1, Ex2, Eα1]g = −[x1, x2, α1]g,
which implies that [g+, g+, g−]g ⊂ g−. Similarly, we have [g−, g−, g+]g ⊂ g+.
Definition 5.16. (Integrability condition IV) An almost product structure E on a 3-Lie alge-
bra (g, [·, ·, ·]g) is called a perfect product structure if (37) holds.
Corollary 5.17. Let (g, [·, ·, ·]g) be a 3-Lie algebra. Then (g, [·, ·, ·]g) has a perfect product structure
if and only if g admits a decomposition:
g = g+ ⊕ g−,
where g+ and g− are subalgebras of g such that [g+, g+, g−]g ⊂ g− and [g−, g−, g+]g ⊂ g+.
Proof. We leave the details to readers.
Corollary 5.18. A strict product structure on a 3-Lie algebra is a perfect product structure.
Remark 5.19. Let E be a product structure on a 3-Lie algebra (g, [·, ·, ·]g). By Theorem 5.3, g+
and g− are subalgebras. However, the brackets of mixed terms are very complicated. But a perfect
product structure E on (g, [·, ·, ·]g) ensures [g+, g+, g−]g ⊂ g− and [g−, g−, g+]g ⊂ g+. Note that
this is exactly the condition required in the definition of a matched pair of 3-Lie algebras [11]. Thus,
E is a perfect product structure if and only if (g+, g−) is a matched pair of 3-Lie algebras. This
type of product structures are very important in our later studies.
17
Definition 5.20.
(i) A paracomplex structure on a 3-Lie algebra (g, [·, ·, ·]g) is a product
structure E on g such that the eigenspaces of g associated to the eigenvalues ±1 have the
same dimension, i.e. dim(g+) = dim(g−).
(i) A perfect paracomplex structure on a 3-Lie algebra (g, [·, ·, ·]g) is a perfect product struc-
ture E on g such that the eigenspaces of g associated to the eigenvalues ±1 have the same
dimension, i.e. dim(g+) = dim(g−).
Proposition 5.21. Let (A, {·, ·, ·}) be a 3-pre-Lie algebra. Then, on the semidirect product 3-Lie
algebra Ac ⋉L∗ A∗, there is a perfect paracomplex structure E : Ac ⋉L∗ A∗ → Ac ⋉L∗ A∗ given by
E(x + α) = x − α, ∀x ∈ Ac, α ∈ A∗.
(39)
Proof. It is obvious that E2 = Id. Moreover, we have (Ac ⋉L∗ A∗)+ = A, (Ac ⋉L∗ A∗)− = A∗ and
they are two subalgebras of the semidirect product 3-Lie algebra Ac ⋉L∗ A∗. By Theorem 5.3, E is
a product structure on Ac ⋉L∗ A∗. Since A and A∗ have the same dimension, E is a paracomplex
structure on Ac ⋉L∗ A∗. It is obvious that E is perfect.
At the end of this section, we give some examples of product structures.
Example 5.22. There is a unique non-trivial 3-dimensional 3-Lie algebra. It has a basis {e1, e2, e3}
with respect to which the non-zero product is given by
[e1, e2, e3] = e1.
1
0
0
Then E =
−1 0
1
0
0
0
E =
0
0
1
0
1
0
0 −1 0
0
1
and E =
0
0
1
0
0 −1
is a perfect product structure.
0
are strong abelian product structures and
Example 5.23. Consider the 4-dimensional Euclidean 3-Lie algebra A4 given in Example 4.2.
Then
E1 =
E4 =
0
1 0
0 1
0
0 0 −1
0 0
−1 0
1
0
0
0
0
0
0
0
0
0 −1
, E2 =
0
0
0
0
0
1
0 −1
, E5 =
, E3 =
0
0
0
0
1
0
0
0 −1 0
0
0
1
0
0 −1
0
−1 0
1
0
0
0 −1 0
0
1
0
0
0
0
0
, E6 =
1
0
0 −1
0
0
0
0
0
0
0 −1 0
1
0
0
0
−1
0 0
0 −1 0 0
0
1 0
0 1
0
0
0
,
are perfect and abelian product structures.
6 Complex structures on 3-Lie algebras
In this section, we introduce the notion of a complex structure on a real 3-Lie algebra using the
Nijenhuis condition as the integrability condition. Parallel to the case of product structures, we
also find four special integrability conditions.
18
Definition 6.1. Let (g, [·, ·, ·]g) be a real 3-Lie algebra. An almost complex structure on g is
a linear endomorphism J : g → g satisfying J 2 = −Id. An almost complex structure is called a
complex structure if the following integrability condition is satisfied:
J[x, y, z]g = −[J x, J y, J z]g + [J x, y, z]g + [x, J y, z]g + [x, y, J z]g
+J[J x, J y, z]g + J[x, J y, J z]g + J[J x, y, J z]g.
(40)
Remark 6.2. One can understand a complex structure on a 3-Lie algebra as a Nijenhuis operator
J on a 3-Lie algebra satisfying J 2 = −Id.
Remark 6.3. One can also use definition 6.1 to define the notion of a complex structure on a
complex 3-Lie algebra, considering J to be C-linear. However, this is not very interesting since
for a complex 3-Lie algebra, there is a one-to-one correspondence between such C-linear complex
structures and product structures (see Proposition 7.1).
Consider gC = g ⊗R C ∼= {x + iyx, y ∈ g}, the complexification of the real Lie algebra g, which
turns out to be a complex 3-Lie algebra by extending the 3-Lie bracket on g complex trilinearly,
and we denote it by (gC, [·, ·, ·]gC ). We have an equivalent description of the integrability condition
given in Definition 6.1. We denote by σ the conjugation in gC with respect to the real form g, that
is, σ(x + iy) = x − iy, x, y ∈ g. Then, σ is a complex antilinear, involutive automorphism of the
complex vector space gC.
Theorem 6.4. Let (g, [·, ·, ·]g) be a real 3-Lie algebra. Then g has a complex structure if and only
if gC admits a decomposition:
gC = q ⊕ p,
(41)
where q and p = σ(q) are complex subalgebras of gC.
Proof. We extend the complex structure J complex linearly, which is denoted by JC, i.e. JC :
gC −→ gC is defined by
JC(x + iy) = J x + iJ y,
∀x, y ∈ g.
(42)
Then JC is a complex linear endomorphism on gC satisfying J 2
C = −Id and the integrability condi-
tion (40) on gC. Denote by g±i the corresponding eigenspaces of gC associated to the eigenvalues
±i and there holds:
gC = gi ⊕ g−i.
It is straightforward to see that gi = {x − iJ xx ∈ g} and g−i = {x + iJ xx ∈ g}. Therefore, we
have g−i = σ(gi).
For all X, Y, Z ∈ gi, we have
JC[X, Y, Z]gC = −[JCX, JCY, JCZ]gC + [JCX, Y, Z]gC + [X, JCY, Z]gC + [X, Y, JCZ]gC
+JC[JCX, JCY, Z]gC + JC[X, JCY, JCZ]gC + JC[JCX, Y, JCZ]gC
= 4i[X, Y, Z]gC − 3JC[X, Y, Z]gC .
Thus, we have [X, Y, Z]gC ∈ gi, which implies that gi is a subalgebra. Similarly, we can show that
g−i is also a subalgebra.
Conversely, we define a complex linear endomorphism JC : gC → gC by
JC(X + σ(Y )) = iX − iσ(Y ), ∀X, Y ∈ q.
(43)
19
Since σ is a complex antilinear, involutive automorphism of gC, we have
J 2
C(X + σ(Y )) = JC(iX − iσ(Y )) = JC(iX + σ(iY )) = i(iX) − iσ(iY ) = −X − σ(Y ),
i.e. J 2
C = −Id. Since q is a subalgebra of gC, for all X, Y, Z ∈ q, we have
−[JCX, JCY, JCZ]gC + [JCX, Y, Z]gC + [X, JCY, Z]gC + [X, Y, JCZ]gC
+JC[JCX, JCY, Z]gC + JC[X, JCY, JCZ]gC + JC[JCX, Y, JCZ]gC
= 4i[X, Y, Z]gC − 3JC[X, Y, Z]gC = i[X, Y, Z]gC
= JC[X, Y, Z]gC,
which implies that JC satisfies (40) for all X, Y, Z ∈ q. Similarly, we can show that JC satisfies (40)
for all X , Y, Z ∈ gC. Since gC = q ⊕ p, we can write X ∈ gC as X = X + σ(Y ), for some X, Y ∈ q.
Since σ is a complex antilinear, involutive automorphism of gC, we have
(JC ◦ σ)(X + σ(Y )) = JC(Y + σ(X)) = iY − iσ(X) = σ(iX − iσ(Y )) = (σ ◦ JC)(X + σ(Y )),
which implies that JC ◦ σ = σ ◦ JC. Moreover, since σ(X ) = X is equivalent to X ∈ g, we deduce
that the set of fixed points of σ is the real vector space g. By JC ◦ σ = σ ◦ JC, there is a well-defined
J ∈ gl(g) given by
J , JCg.
Follows from that JC satisfies (40) and J 2
C = −Id on gC, J is a complex structure on g.
Lemma 6.5. Let J be an almost complex structure on a real 3-Lie algebra (g, [·, ·, ·]g). If J satisfies
J[x, y, z]g = [J x, y, z]g, ∀x, y, z ∈ g,
(44)
then J is a complex structure on (g, [·, ·, ·]g).
Proof. By (44) and J 2 = −Id, we have
−[J x, J y, J z]g + [J x, y, z]g + [x, J y, z]g + [x, y, J z]g
+J[J x, J y, z]g + J[x, J y, J z]g + J[J x, y, J z]g
= −[J x, J y, J z]g + J[x, y, z]g + [x, J y, z]g + [x, y, J z]g
+[J 2x, J y, z]g + [J x, J y, J z]g + [J 2x, y, J z]g
= J[x, y, z]g.
Thus, we obtain that J is a complex structure on g.
Definition 6.6. (Integrability condition I) An almost complex structure J on a real 3-Lie
algebra (g, [·, ·, ·]g) is called a strict complex structure if (44) holds.
Corollary 6.7. Let (g, [·, ·, ·]g) be a real 3-Lie algebra. Then there is a strict complex structure on
(g, [·, ·, ·]g) if and only if gC admits a decomposition:
gC = q ⊕ p,
(45)
where q and p = σ(q) are complex subalgebras of gC such that [q, q, p]gC = 0 and [p, p, q]gC = 0, i.e.
gC is a 3-Lie algebra direct sum of q and p.
20
Proof. Let J be a strict complex structure on a real 3-Lie algebra (g, [·, ·, ·]g). Then, JC is a strict
complex structure on the complex 3-Lie algebra (gC, [·, ·, ·]gC). For all X, Y ∈ gi and σ(Z) ∈ g−i,
on one hand we have
JC[X, Y, σ(Z)]gC = [JCX, Y, σ(Z)]gC = i[X, Y, σ(Z)]gC .
On the other hand, we have
JC[X, Y, σ(Z)]gC = JC[σ(Z), X, Y ]gC = [JCσ(Z), X, Y ]gC = −i[σ(Z), X, Y ]gC .
Thus, we obtain [gi, gi, g−i]gC = 0. Similarly, we can show [g−i, g−i, gi]gC = 0.
Conversely, define a complex linear endomorphism JC : gC → gC by (43). Then it is straight-
forward to deduce that J 2
C = −Id. Since q is a subalgebra of gC, for all X, Y, Z ∈ q, we have
JC[X, Y, Z]gC = i[X, Y, Z]gC = [JCX, Y, Z]gC,
which implies that JC satisfies (44) for all X, Y, Z ∈ q. Similarly, we can show that JC satisfies (44)
for all X , Y, Z ∈ gC. By the proof of Theorem 6.4, we obtain that J , JCg is a strict complex
structure on the real 3-Lie algebra (g, [·, ·, ·]g). The proof is finished.
Let J be an almost complex structure on a real 3-Lie algebra (g, [·, ·, ·]g). We can define a
complex vector space structure on the real vector space g by
(a + bi)x , ax + bJ x, ∀a, b ∈ R, x ∈ g.
(46)
Define two maps ϕ : g → gi and ψ : g → g−i as following:
ϕ(x) =
ψ(x) =
1
2
1
2
(x − iJ x),
(x + iJ x).
It is straightforward to deduce that ϕ is complex linear isomorphism and ψ = σ ◦ ϕ is a complex
antilinear isomorphism between complex vector spaces.
Let J be a strict complex structure on a real 3-Lie algebra (g, [·, ·, ·]g). Then with the complex
vector space structure defined above, (g, [·, ·, ·]g) is a complex 3-Lie algebra. In fact, the fact that
the 3-Lie bracket is complex trilinear follows from
[(a + bi)x, y, z]g = [ax + bJ x, y, z]g = a[x, y, z]g + b[J x, y, z]g
= a[x, y, z]g + bJ[x, y, z]g = (a + bi)[x, y, z]g
using (44) and (46).
Let J be a complex structure on g. Define a new bracket [·, ·, ·]J : ∧3g → g by
[x, y, z]J , 1
4
([x, y, z]g − [x, J y, J z]g − [J x, y, J z]g − [J x, J y, z]g), ∀x, y, z ∈ g.
(47)
Proposition 6.8. Let J be a complex structure on a real 3-Lie algebra (g, [·, ·, ·]g). Then (g, [·, ·, ·]J )
is a real 3-Lie algebra. Moreover, J is a strict complex structure on (g, [·, ·, ·]J ) and the correspond-
ing complex 3-Lie algebra (g, [·, ·, ·]J ) is isomorphic to the complex 3-Lie algebra gi.
21
Proof. One can show that (g, [·, ·, ·]J ) is a real 3-Lie algebra directly. Here we use a different
approach to prove this result. By (40), for all x, y, z ∈ g, we have
[ϕ(x), ϕ(y), ϕ(z)]gC =
=
=
1
8
1
8
[x − iJ x, y − iJ y, z − iJ z]gC
([x, y, z]g − [x, J y, J z]g − [J x, y, J z]g − [J x, J y, z]g)
−
1
8
i([x, y, J z]g + [x, J y, z]g + [J x, y, z]g − [J x, J y, J z]g)
1
8
([x, y, z]g − [x, J y, J z]g − [J x, y, J z]g − [J x, J y, z]g)
−
1
8
iJ([x, y, z]g − [x, J y, J z]g − [J x, y, J z]g − [J x, J y, z]g)
= ϕ[x, y, z]J .
(48)
Thus, we have [x, y, z]J = ϕ−1[ϕ(x), ϕ(y), ϕ(z)]gC . Since J is a complex structure, gi is a 3-Lie
subalgebra. Therefore, (g, [·, ·, ·]J ) is a real 3-Lie algebra.
By (40), for all x, y, z ∈ g, we have
J[x, y, z]J =
=
1
4
1
4
J([x, y, z]g − [x, J y, J z]g − [J x, y, J z]g − [J x, J y, z]g)
(−[J x, J y, J z]g + [J x, y, z]g + [x, J y, z]g + [x, y, J z]g)
= [J x, y, z]J ,
which implies that J is a strict complex structure on (g, [·, ·, ·]J ). By (48), ϕ is a complex 3-Lie
algebra isomorphism. The proof is finished.
Proposition 6.9. Let J be a complex structure on a real 3-Lie algebra (g, [·, ·, ·]g). Then J is a
strict complex structure on (g, [·, ·, ·]g) if and only if [·, ·, ·]J = [·, ·, ·]g.
Proof. If J is a strict complex structure on (g, [·, ·, ·]g), by J[x, y, z]g = [J x, y, z]g, we have
[x, y, z]J =
1
4
([x, y, z]g − [x, J y, J z]g − [J x, y, J z]g − [J x, J y, z]g) = [x, y, z]g.
Conversely, if [·, ·, ·]J = [·, ·, ·]g, we have
−3[x, y, z]g = [x, J y, J z]g + [J x, y, J z]g + [J x, J y, z]g.
Then by the integrability condition of J, we obtain
4J[x, y, z]J = −[J x, J y, J z]g + [J x, y, z]g + [x, J y, z]g + [x, y, J z]g
= 3[J x, y, z]g + [J x, y, z]g
= 4[J x, y, z]g,
which implies that J[x, y, z]g = [J x, y, z]g. The proof is finished.
Lemma 6.10. Let J be an almost complex structure on a real 3-Lie algebra (g, [·, ·, ·]g).
satisfies the following equation
If J
[x, y, z]g = [x, J y, J z]g + [J x, y, J z]g + [J x, J y, z]g,
(49)
Then, J is a complex structure on g.
22
Proof. By (49) and J 2 = −Id, we have
−[J x, J y, J z]g + [J x, y, z]g + [x, J y, z]g + [x, y, J z]g
+J[J x, J y, z]g + J[x, J y, J z]g + J[J x, y, J z]g
= −[J x, J 2y, J 2z]g − [J 2x, J y, J 2z]g − [J 2x, J 2y, J z]g
+[J x, y, z]g + [x, J y, z]g + [x, y, J z]g + J[x, y, z]g
= J[x, y, z]g.
Thus, we obtain that J is a complex structure on g.
Definition 6.11. (Integrability condition II) An almost complex structure J on a real 3-Lie
algebra (g, [·, ·, ·]g) is called an abelian complex structure if (49) holds.
Remark 6.12. Let J be an abelian complex structure on a real 3-Lie algebra (g, [·, ·, ·]g). Then
(g, [·, ·, ·]J ) is an abelian 3-Lie algebra.
Corollary 6.13. Let (g, [·, ·, ·]g) be a real 3-Lie algebra. Then g has an abelian complex structure
if and only if gC admits a decomposition:
where q and p = σ(q) are complex abelian subalgebras of gC.
gC = q ⊕ p,
Proof. Let J be an abelian complex structure on g. By Proposition 6.8, we obtain that ϕ is a
complex 3-Lie algebra isomorphism from (g, [·, ·, ·]J ) to (gi, [·, ·, ·]gC ). Since J is abelian, (g, [·, ·, ·]J )
is an abelian 3-Lie algebra. Therefore, q = gi is an abelian subalgebra of gC. Since p = g−i = σ(gi),
for all x1 + iy1, x2 + iy2, x3 + iy3 ∈ gi, we have
[σ(x1 + iy1), σ(x2 + iy2), σ(x3 + iy3)]gC
= [x1 − iy1, x2 − iy2, x3 − iy3]gC
= ([x1, x2, x3]g − [x1, y2, y3]g − [y1, x2, y3]g − [y1, y2, x3]g)
−i([x1, x2, y3]g + [x1, y2, x3]g + [y1, x2, x3]g − [y1, y2, y3]g)
= σ[x1 + iy1, x2 + iy2, x3 + iy3]gC
= 0.
Thus, p is an abelian subalgebra of gC.
Conversely, by Theorem 6.4, there is a complex structure J on g. Moreover, by Proposition 6.8,
we have a complex 3-Lie algebra isomorphism ϕ from (g, [·, ·, ·]J ) to (q, [·, ·, ·]gC). Thus, (g, [·, ·, ·]J )
is an abelian 3-Lie algebra. By the definition of [·, ·, ·]J , we obtain that J is an abelian complex
structure on g. The proof is finished.
Lemma 6.14. Let J be an almost complex structure on a real 3-Lie algebra (g, [·, ·, ·]g).
satisfies the following equation
If J
[x, y, z]g = −J[J x, y, z]g − J[x, J y, z]g − J[x, y, J z]g,
(50)
then J is a complex structure on g.
23
Proof. By (50) and J 2 = −Id, we have
−[J x, J y, J z]g + [J x, y, z]g + [x, J y, z]g + [x, y, J z]g
+J[J x, J y, z]g + J[x, J y, J z]g + J[J x, y, J z]g
= J[J 2x, J y, J z]g + J[J x, J 2y, J z]g + J[J x, J y, J 2z]g + J[x, y, z]g
+J[J x, J y, z]g + J[x, J y, J z]g + J[J x, y, J z]g
= J[x, y, z]g.
Thus, J is a complex structure on g.
Definition 6.15. (Integrability condition III) An almost complex structure J on a real 3-Lie
algebra (g, [·, ·, ·]g) is called a strong abelian complex structure if (50) holds.
Corollary 6.16. Let (g, [·, ·, ·]g) be a real 3-Lie algebra. Then g has a strong abelian complex
structure if and only if gC admits a decomposition:
gC = q ⊕ p,
where q and p = σ(q) are abelian complex subalgebras of gC such that [q, q, p]gC ⊂ q and [p, p, q]gC ⊂
p.
Parallel to the case of strong abelian product structures on a 3-Lie algebra, strong abelian
complex structures on a 3-Lie algebra are also O-operators associated to the adjoint representation.
Proposition 6.17. Let J be an almost complex structure on a real 3-Lie algebra (g, [·, ·, ·]g). Then
J is a strong abelian complex structure on a 3-Lie algebra (g, [·, ·, ·]g) if and only if −J is an O-
operator on (g, [·, ·, ·]g) associated to the adjoint representation (g, ad). Furthermore, there exists a
compatible 3-pre-Lie algebra (g, {·, ·, ·}) on the 3-Lie algebra (g, [·, ·, ·]g), here the 3-pre-Lie algebra
structure on g is given by
{x, y, z} = −J[x, y, J z]g, ∀x, y, z ∈ g.
(51)
Proof. By (50), for all x, y, z ∈ g we have
[−J x, −J y, −J z]g = J[J 2x, J y, J z]g + J[J x, J 2y, J z]g + J[J x, J y, J 2z]g
= −J(ad−Jx,−Jyz + ad−Jy,−Jzx + ad−Jz,−Jxy).
Thus, −J is an O-operator associated to the adjoint representation (g, ad).
Conversely, if for all x, y, z ∈ g, we have
[−J x, −J y, −J z]g = −J(ad−Jx,−Jyz + ad−Jy,−Jzx + ad−Jz,−Jxy)
= −J([−J x, −J y, z]g + [x, −J y, −J z]g + [−J x, y, −J z]g),
then we obtain [x, y, z]g = −J[x, y, J z]g − J[J x, y, z]g − J[x, J y, z]g by (−J)−1 = J.
Furthermore, by (−J)−1 = J and Proposition 2.10, there exists a compatible 3-pre-Lie algebra
on g given by {x, y, z} = −Jadx,y(−J −1(z)) = −J[x, y, J z]g. The proof is finished.
Lemma 6.18. Let J be an almost complex structure on a real 3-Lie algebra (g, [·, ·, ·]g).
satisfies the following equation
If J
J[x, y, z]g = −[J x, J y, J z]g,
(52)
then J is a complex structure on g.
24
Proof. By (52) and J 2 = Id, we have
−[J x, J y, J z]g + [J x, y, z]g + [x, J y, z]g + [x, y, J z]g
+J[J x, J y, z]g + J[x, J y, J z]g + J[J x, y, J z]g
= J[x, y, z]g + [J x, y, z]g + [x, J y, z]g + [x, y, J z]g
−[J 2x, J 2y, J z]g − [J x, J 2y, J 2z]g − [J 2x, J y, J 2z]g
= J[x, y, z]g.
Thus, J is a complex structure on g.
Definition 6.19. (Integrability condition IV) An almost complex structure J on a real 3-Lie
algebra (g, [·, ·, ·]g) is called a perfect complex structure if (52) holds.
Corollary 6.20. Let (g, [·, ·, ·]g) be a real 3-Lie algebra. Then g has a perfect complex structure if
and only if gC admits a decomposition:
gC = q ⊕ p,
where q and p = σ(q) are complex subalgebras of gC such that [q, q, p]gC ⊂ p and [p, p, q]gC ⊂ q.
Corollary 6.21. Let J be a strict complex structure on a real 3-Lie algebra (g, [·, ·, ·]g). Then J
is a perfect complex structure on g.
Example 6.22. Consider the 4-dimensional Euclidean 3-Lie algebra A4 given in Example 4.2.
Then
J1 =
J4 =
0
0
1
0
0 −1
0
0
1
0
0 −1
0
0
0
0
, J2 =
1 0
0
−1 0 0
0
0
0
0
0 0 −1
0 1
0
, J5 =
0
0
0
0
0 −1 0
0
1
0
0 −1
0
0
1
0
0
1
0
0
−1 0
0
0
1
0 −1 0
0
0
0
0
, J3 =
, J6 =
,
0
0
0
0
0 −1
0
0
1
0
0
1
0
0 −1 0
1 0
0
0 1
0
−1
0 0
0 −1 0 0
0
0
0
are abelian complex structures. Moreover, J1, J6 are strong abelian complex structures and
J2, J3, J4, J5 are perfect complex structures.
7 Complex product structures on 3-Lie algebras
In this section, we add a compatibility condition between a complex structure and a product
structure on a 3-Lie algebra to introduce the notion of a complex product structure. We construct
complex product structures using 3-pre-Lie algebras. First we illustrate the relation between a
complex structure and a product structure on a complex 3-Lie algebra.
Proposition 7.1. Let (g, [·, ·, ·]g) be a complex 3-Lie algebra. Then E is a product structure on g
if and only if J = iE is a complex structure on g.
25
Proof. Let E be a product structure on g. We have J 2 = i2E2 = −Id. Thus, J is an almost
complex structure on g. Since E satisfies the integrability condition (30), we have
J[x, y, z]g = iE[x, y, z]g
= −[iEx, iEy, iEz]g + [iEx, y, z]g + [x, iEy, z]g + [x, y, iEz]g
+iE[iEx, iEy, z]g + iE[x, iEy, iEz]g + iE[iEx, y, iEz]g.
Thus, J is a complex structure on the complex 3-Lie algebra g.
The converse part can be proved similarly and we omit details.
Corollary 7.2. Let J be a complex structure on a real 3-Lie algebra (g, [·, ·, ·]g). Then, −iJC is a
paracomplex structure on the complex 3-Lie algebra (gC, [·, ·, ·]gC ), where JC is defined by (42).
Proof. By Theorem 6.4, gC = gi ⊕ g−i and g−i = σ(gi), where gi and g−i are subalgebras of gC.
It is obvious that dim(gi) = dim(g−i). By Proposition 5.3, there is a paracomplex structure on gC.
On the other hand, it is obvious that JC is a complex structure on gC. By Proposition 7.1, −iJC
a product structure on the complex 3-Lie algebra (gC, [·, ·, ·]gC ). It is straightforward to see that
gi and g−i are eigenspaces of −iJC corresponding to +1 and −1. Thus, −iJC is a paracomplex
structure.
Definition 7.3. Let (g, [·, ·, ·]g) be a real 3-Lie algebra. A complex product structure on the
3-Lie algebra g is a pair {J, E} of a complex structure J and a product structure E satisfying
J ◦ E = −E ◦ J.
(53)
If E is perfect, we call {J, E} a perfect complex product structure on g.
Remark 7.4. Let {J, E} be a complex product structure on a real 3-Lie algebra (g, [·, ·, ·]g). For
all x ∈ g+, by (53), we have E(J x) = −J x, which implies that J(g+) ⊂ g−. Analogously, we
obtain J(g−) ⊂ g+. Thus, we get J(g−) = g+ and J(g+) = g−. Therefore, dim(g+) = dim(g−)
and E is a paracomplex structure on g.
Theorem 7.5. Let (g, [·, ·, ·]g) be a real 3-Lie algebra (g, [·, ·, ·]g). Then the following statements
are equivalent:
(i) g has a complex product structure;
(ii) g has a complex structure J and can be decomposed as g = g+ ⊕ g−, where g+, g− are 3-Lie
subalgebras of g and g− = J g+.
Proof. Let {J, E} be a complex product structure and let g± denote the eigenspaces corresponding
to the eigenvalues ±1 of E. By Theorem 5.3, both g+ and g− are 3-Lie subalgebras of g and
J ◦ E = −E ◦ J implies g− = J g+.
Conversely, we can define a linear map E : g → g by
E(x + α) = x − α, ∀x ∈ g+, α ∈ g−.
By Theorem 5.3, E is a product structure on g. By g− = J g+ and J 2 = −Id, we have
E(J(x + α)) = E(J(x) + J(α)) = −J(x) + J(α) = −J(E(x + α)).
Thus, {J, E} is a complex product structure on g. The proof is finished.
26
Example 7.6. Consider the product structures and the complex structures on the 4-dimensional
Euclidean 3-Lie algebra A4 given in Example 5.23 and Example 6.22 respectively. Then {Ji, Ei}
for i = 1, 2, 3, 4, 5, 6 are complex product structures on A4.
We give a characterization of a perfect complex product structure on a 3-Lie algebra.
Proposition 7.7. Let E be a perfect paracomplex structure on a real 3-Lie algebra (g, [·, ·, ·]g).
Then there is a perfect complex product structure {J, E} on g if and only if there exists a linear
isomorphism φ : g+ → g− satisfying the following equation
φ[x, y, z]g = −[φ(x), φ(y), φ(z)]g + [φ(x), y, z]g + [x, φ(y), z]g + [x, y, φ(z)]g
+φ[φ(x), φ(y), z]g + φ[x, φ(y), φ(z)]g + φ[φ(x), y, φ(z)]g,
∀x, y, z ∈ g+. (54)
Proof. Let {J, E} be a perfect complex product structure on g. Define a linear isomorphism
φ : g+ → g− by φ , Jg+ : g+ → g−. By the compatibility condition (40) that the complex
structure J satisfies and the coherence condition (38) that a perfect product structure E satisfies,
we deduce that (54) holds.
Conversely, we define an endomorphism J of g by
J(x + α) = −φ−1(α) + φ(x), ∀x ∈ g+, α ∈ g−.
(55)
It is obvious that J is an almost complex structure on g and J ◦ E = −E ◦ J. For all α, β, γ ∈ g−,
let x, y, z ∈ g+ such that φ(x) = α, φ(y) = β and φ(z) = γ. By (54) and (38), we have
−[J α, J β, J γ]g + [J α, β, γ]g + [α, J β, γ]g + [α, β, J γ]g
+J[J α, J β, γ]g + J[α, J β, J γ]g + J[J α, β, J γ]g
= [x, y, z]g − [x, φ(y), φ(z)]g − [φ(x), y, φ(z)]g − [φ(x), φ(y), z]g
−φ−1[x, y, φ(z)]g − φ−1[φ(x), y, z]g − φ−1[x, φ(y), z]g
= −φ−1[φ(x), φ(y), φ(z)]g
= J[α, β, γ]g,
which implies that (40) holds for all α, β, γ ∈ g−. Similarly, we can deduce that (40) holds for all
the other cases. Thus, J is a complex structure and {J, E} is a perfect complex product structure
on the 3-Lie algebra g.
At the end of this section, we construct perfect complex product structure using 3-pre-Lie
algebras.
A nondegenerate symmetric bilinear form B ∈ A∗ ⊗ A∗ on a real 3-pre-Lie algebra (A, {·, ·, ·})
is called invariant if
B({x, y, z}, w) = −B(z, {x, y, w}), ∀x, y, z, w ∈ A.
Then B induces a linear isomorphism B♯ : A → A∗ by
hB♯(x), yi = B(x, y), ∀x, y ∈ A.
(56)
(57)
Proposition 7.8. Let (A, {·, ·, ·}) be a real 3-pre-Lie algebra with a nondegenerate symmetric
bilinear from B. Then there is a perfect complex product structure {J, E} on the semidirect product
3-Lie algebra Ac ⋉L∗ A∗, where E is given by (39) and the complex structure J is given as follows:
J(x + α) = −B♯−1
(α) + B♯(x), ∀x ∈ A, α ∈ A∗.
(58)
27
Proof. By Proposition 5.21, E is a perfect product structure on Ac ⋉L∗ A∗. For all x, y, z ∈ Ac,
we have
−[B♯(x), B♯(y), B♯(z)]L∗ + [B♯(x), y, z]L∗ + [x, B♯(y), z]L∗ + [x, y, B♯(z)]L∗
+B♯[B♯(x), B♯(y), z]L∗ + B♯[x, B♯(y), B♯(z)]L∗ + B♯[B♯(x), y, B♯(z)]L∗
= [B♯(x), y, z]L∗ + [x, B♯(y), z]L∗ + [x, y, B♯(z)]L∗
= L∗(x, y)B♯(z) + L∗(y, z)B♯(x) + L∗(z, x)B♯(y).
By (56), we have
hB♯[x, y, z]C , wi = hB♯{x, y, z}, wi + hB♯{y, z, x}, wi + hB♯{z, x, y}, wi
= B({x, y, z}, w) + B({y, z, x}, w) + B({z, x, y}, w)
= −B(z, {x, y, w}) − B(x, {y, z, w}) − B(y, {z, x, w})
= −hB♯(z), {x, y, w}i − hB♯(x), {y, z, w}i − hB♯(y), {z, x, w}i
= hL∗(x, y)B♯(z), wi + hL∗(y, z)B♯(x), wi + hL∗(z, x)B♯(y), wi,
which implies that
Thus, we have
B♯[x, y, z]C = L∗(x, y)B♯(z) + L∗(y, z)B♯(x) + L∗(z, x)B♯(y).
B♯[x, y, z]C = −[B♯(x), B♯(y), B♯(z)]L∗ + [B♯(x), y, z]L∗ + [x, B♯(y), z]L∗ + [x, y, B♯(z)]L∗
+B♯[B♯(x), B♯(y), z]L∗ + B♯[x, B♯(y), B♯(z)]L∗ + B♯[B♯(x), y, B♯(z)]L∗.
By Proposition 7.7, we obtain that {J, E} is a perfect complex product structure on Ac ⋉L∗ A∗.
Let (A, {·, ·, ·}) be a real 3-pre-Lie algebra. On the real 3-Lie algebra aff(A) = Ac ⋉L A, we
consider two endomorphisms J and E given by
J(x, y) = (−y, x), E(x, y) = (x, −y), ∀x, y ∈ A.
(59)
Proposition 7.9. With the above notations, {J, E} is a perfect complex product structure on the
3-Lie algebra aff(A).
Proof. It is obvious that E is a perfect product structure on aff(A). Moreover, we have J 2 = −Id
and J ◦ E = −E ◦ J. Obviously aff(A)+ = {(x, 0)x ∈ A}, aff(A)− = {(0, y)y ∈ A}. Define
φ : aff(A)+ → aff(A)− by φ , Jaff(A)+ : aff(A)+ → aff(A)−. More precisely, φ(x, 0) = (0, x).
Then for all (x, 0), (y, 0), (z, 0) ∈ aff(A)+, we have
−[φ(x, 0), φ(y, 0), φ(z, 0)]L + [φ(x, 0), (y, 0), (z, 0)]L + [(x, 0), φ(y, 0), (z, 0)]L
+[(x, 0), (y, 0), φ(z, 0)]L + φ[φ(x, 0), φ(y, 0), (z, 0)]L + φ[(x, 0), φ(y, 0), φ(z, 0)]L
+φ[φ(x, 0), (y, 0), φ(z, 0)]L
= [φ(x, 0), (y, 0), (z, 0)]L + [(x, 0), φ(y, 0), (z, 0)]L + [(x, 0), (y, 0), φ(z, 0)]L
= (0, {y, z, x}) + (0, {z, x, y}) + (0, {x, y, z})
= φ[(x, 0), (y, 0), (z, 0)]L.
By Proposition 7.7, {J, E} is a perfect complex product structure on the 3-Lie algebra aff(A).
28
8 Para-Kähler structures on 3-Lie algebras
In this section, we add a compatibility condition between a symplectic structure and a paracomplex
structure on a 3-Lie algebra to introduce the notion of a para-Kähler structure on a 3-Lie algebra.
A para-Kähler structure gives rise to a pseudo-Riemannian structure. We introduce the notion of a
Livi-Civita product associated to a pseudo-Riemannian 3-Lie algebra and give its precise formulas
using the decomposition of the original 3-Lie algebra.
Definition 8.1. Let ω be a symplectic structure and E a paracomplex structure on a 3-Lie algebra
(g, [·, ·, ·]g). The triple (g, ω, E) is called a para-Kähler 3-Lie algebra if the following equality
holds:
ω(Ex, Ey) = −ω(x, y),
∀x, y ∈ g.
(60)
If E is perfect, we call (g, ω, E) a perfect para-Kähler 3-Lie algebra.
Proposition 8.2. Let (A, {·, ·, ·}) be a 3-pre-Lie algebra. Then (Ac ⋉L∗ A∗, ω, E) is a perfect
para-Kähler 3-Lie algebra, where ω is given by (22) and E is defined by (39).
Proof. By Theorem 4.5, (Ac ⋉L∗ A∗, ω) is a symplectic 3-Lie algebra. By Proposition 5.21, E is a
perfect paracomplex structure on the phase space T ∗Ac. For all x1, x2 ∈ A, α1, α2 ∈ A∗, we have
ω(E(x1 + α1), E(x2 + α2)) = ω(x1 − α1, x2 − α2) = h−α1, x2i − h−α2, x1i
= −ω(x1 + α1, x2 + α2).
Therefore, (T ∗Ac = Ac ⋉L∗ A∗, ω, E) is a perfect paraKähler 3-Lie algebra.
Similar as the case of para-Kähler Lie algebras, we have the following equivalent description of
a para-Kähler 3-Lie algebra.
Theorem 8.3. Let (g, ω) be a symplectic 3-Lie algebra. Then there exists a paracomplex structure
E on the 3-Lie algebra (g, [·, ·, ·]g) such that (g, ω, E) is a para-Kähler 3-Lie algebra if and only if
there exist two isotropic 3-Lie subalgebras g+ and g− such that g = g+ ⊕ g− as the direct sum of
vector spaces.
Proof. Let (g, ω, E) be a para-Kähler 3-Lie algebra. Since E is a paracomplex structure on g, we
have g = g+ ⊕ g−, where g+ and g− are 3-Lie subalgebras of g. For all x1, x2 ∈ g+, by (60), we
have
ω(Ex1, Ex2) = ω(x1, x2) = −ω(x1, x2),
which implies that ω(g+, g+) = 0. Thus, g+ is isotropic. Similarly, g− is also isotropic.
Conversely, since g+ and g− are subalgebras, g = g+ ⊕ g− as vector spaces, there is a product
structure E on g defined by (32). Moreover, since g = g+ ⊕ g− as vector spaces and both g+ and
g− are isotropic, we obtain that dim g+=dim g−. Thus, E is a paracomplex structure on g. For
all x1, x2 ∈ g+, α1, α2 ∈ g−, since g+ and g− are isotropic, we have
ω(E(x1 + α1), E(x2 + α2)) = ω(x1 − α1, x2 − α2) = −ω(x1, α2) − ω(α1, x2)
= −ω(x1 + α1, x2 + α2).
Thus, (g, ω, E) is a para-Kähler 3-Lie algebra. The proof is finished.
29
Example 8.4. Consider the symplectic structures and the perfect paracomplex structures on the
4-dimensional Euclidean 3-Lie algebra A4 given in Example 4.2 and Example 5.23 respectively.
Then {ωi, Ei} for i = 1, 2, 3, 4, 5, 6 are perfect para-Kähler structures on A4.
Example 8.5. Let (h, [·, ·, ·]h be a 3-Lie algebra and (h ⊕ h∗, ω) its (perfect) phase space, where ω
is given by (22). Then E : h ⊕ h∗ −→ h ⊕ h∗ defined by
E(x + α) = x − α,
∀x ∈ h, α ∈ h∗,
(61)
is a (perfect) paracomplex structure and (h ⊕ h∗, ω, E) is a (perfect) para-Kähler 3-Lie algebra.
Let (g, ω, E) be a para-Kähler 3-Lie algebra. Then it is obvious that g− is isomorphic to g∗
+
via the symplectic structure ω. Moreover, it is straightforward to deduce that
Proposition 8.6. Any para-Kähler 3-Lie algebra is isomorphic to the para-Kähler 3-Lie algebra
associated to a phase space of a 3-Lie algebra.
In the sequel, we study the Levi-Civita product associated to a perfect para-Kähler 3-Lie
algebra.
Definition 8.7. A pseudo-Riemannian 3-Lie algebra is a 3-Lie algebra (g, [·, ·, ·]g) endowed
with a nondegenerate symmetric bilinear form S. The associated Levi-Civita product is the product
on g, ∇ : ⊗3g −→ g with (x, y, z) 7−→ ∇x,yz, given by the following formula:
3S(∇x,yz, w) = S([x, y, z]g, w) − 2S([x, y, w]g, z) + S([y, z, w]g, x) + S([z, x, w]g, y).
(62)
Proposition 8.8. Let (g, S) be a pseudo-Riemannian 3-Lie algebra. Then the Levi-Civita product
{·, ·, ·} satisfies the following equations:
∇x,yz = −∇y,xz,
∇x,yz + ∇y,zx + ∇z,xy = [x, y, z]g.
(63)
(64)
Proof. For all w ∈ g, it is obvious that
3S(∇y,xz, w) = S([y, x, z]g, w) − 2S([y, x, w]g, z) + S([x, z, w]g, y) + S([z, y, w]g, x)
= −3S(∇x,yz, w).
By the nondegeneracy of S, we obtain ∇x,yz = −∇y,xz.
For all x, y, z, w ∈ g, we have
3S(∇x,yz, w) = S([x, y, z]g, w) − 2S([x, y, w]g, z) + S([y, z, w]g, x) + S([z, x, w]g, y),
3S(∇y,zx, w) = S([y, z, x]g, w) − 2S([y, z, w]g, x) + S([z, x, w]g, y) + S([x, y, w]g, z),
3S(∇z,xy, w) = S([z, x, y]g, w) − 2S([z, x, w]g, y) + S([x, y, w]g, z) + S([y, z, w]g, x).
Add up the three equations, we have
3S(∇x,yz + ∇y,zx + ∇z,xy, w) = 3S([x, y, z]g, w),
which implies that ∇x,yz + ∇y,zx + ∇z,xy = [x, y, z]g. The proof is finished.
Let (g, ω, E) be a perfect para-Kähler 3-Lie algebra. Define a bilinear form S on g by
S(x, y) , ω(x, Ey), ∀x, y ∈ g.
(65)
30
Proposition 8.9. With the above notations, (g, S) is a pseudo-Riemannian 3-Lie algebra. More-
over, the associated Levi-Civita product ∇ and the perfect paracomplex structure E satisfy the
following compatibility condition:
E∇x,yz = ∇Ex,EyEz.
(66)
Proof. Since ω is skewsymmetric and ω(Ex, Ey) = −ω(x, y), we have
S(y, x) = ω(y, Ex) = −ω(Ey, E2x) = −ω(Ey, x) = ω(x, Ey) = S(x, y),
which implies that S is symmetric. Moreover, since ω is nondegenerate and E2 = Id, it is obvious
that S is nondegenerate. Thus, S is a pseudo-Riemannian metric on the 3-Lie algebra g. Moreover,
we have
3S(∇Ex,EyEz, w)
= S([Ex, Ey, Ez]g, w) − 2S([Ex, Ey, w]g, Ez) + S([Ey, Ez, w]g, Ex) + S([Ez, Ex, w]g, Ey)
= S(E[x, y, z]g, w) − 2S(E[x, y, Ew]g, Ez) + S(E[y, z, Ew]g, Ex) + S(E[z, x, Ew]g, Ey)
= −(S([x, y, z]g, Ew) − 2S([x, y, Ew]g, z) + S([y, z, Ew]g, x) + S([z, x, Ew]g, y))
= −3S(∇x,yz, Ew)
= 3S(E∇x,yz, w).
Thus, we have E∇x,yz = ∇Ex,EyEz.
The following two propositions clarifies the relationship between the Levi-Civita product and
the 3-pre-Lie multiplication on a para-Kähler 3-Lie algebra.
Proposition 8.10. Let (g, ω, E) be a para-Kähler 3-Lie algebra and ∇ the associated Levi-Civita
product. Then for all x1, x2, x3 ∈ g+ and α1, α2, α3 ∈ g−, we have
∇x1,x2x3 = {x1, x2, x3}, ∇α1,α2α3 = {α1, α2, α3}.
Proof. Since (g, ω, E) is a para-Kähler 3-Lie algebra, 3-Lie subalgebras g+ and g− are isotropic
and g = g+ ⊕ g− as vector spaces. For all x1, x2, x3, x4 ∈ g+, we have
3ω(∇x1,x2x3, x4)
= 3S(∇x1,x2x3, Ex4) = 3S(∇x1,x2x3, x4)
= S([x1, x2, x3]g, x4) − 2S([x1, x2, x4]g, x3) + S([x2, x3, x4]g, x1) + S([x3, x1, x4]g, x2)
= ω([x1, x2, x3]g, x4) − 2ω([x1, x2, x4]g, x3) + ω([x2, x3, x4]g, x1) + ω([x3, x1, x4]g, x2)
= 0.
By (g+)⊥ = g+, we obtain ∇x1,x2x3 ∈ g+. Similarly, for all α1, α2, α3 ∈ g−, ∇α1,α2 α3 ∈ g−.
Furthermore, for all x1, x2, x3 ∈ g+, and α ∈ g−, we have
3ω(∇x1,x2x3, α)
= 3S(∇x1,x2x3, Eα) = −3S(∇x1,x2x3, α)
= −S([x1, x2, x3]g, α) + 2S([x1, x2, α]g, x3) − S([x2, x3, α]g, x1) − S([x3, x1, α]g, x2)
= ω([x1, x2, x3]g, α) + 2ω([x1, x2, α]g, x3) − ω([x2, x3, α]g, x1) − ω([x3, x1, α]g, x2)
= ω([α, x1, x2]g, x3) + 2ω([x1, x2, α]g, x3)
= −3ω(x3, [x1, x2, α]g)
= 3ω({x1, x2, x3}, α).
31
Thus, ∇x1,x2x3 = {x1, x2, x3}. Similarly, we have ∇α1,α2α3 = {α1, α2, α3}. The proof is finished.
Proposition 8.11. Let (g, ω, E) be a perfect para-Kähler 3-Lie algebra and ∇ the associated Levi-
Civita product. Then for all x1, x2 ∈ g+ and α1, α2 ∈ g−, we have
∇x1,x2α1 = {x1, x2, α1} +
2
3
({x2, α1, x1} + {α1, x1, x2}),
∇α1,x1x2 = −
1
3
{α1, x1, x2} +
2
3
{x2, α1, x1},
∇α1,α2 x1 = {α1, α2, x1} +
2
3
({α2, x1, α1} + {x1, α1, α2}),
∇x1,α1α2 = −
1
3
{x1, α1, α2} +
2
3
{α2, x1, α1}.
(67)
(68)
(69)
(70)
Proof. Since (g, ω, E) is a perfect para-Kähler 3-Lie algebra, 3-Lie subalgebras g+ and g− are
isotropic and g = g+ ⊕ g− as vector spaces. Thus, we have S(g+, g+) = S(g−, g−) = 0. For all
x1, x2 ∈ g+ and α1, α2 ∈ g−, we have
3S(∇x1,x2α1, α2)
= S([x1, x2, α1]g, α2) − 2S([x1, x2, α2]g, α1) + S([x2, α1, α2]g, x1) + S([α1, x1, α2]g, x2) = 0.
Since S is nondegenerate, we have ∇x1,x2α1 ∈ g−. Moreover, For all x1, x2, x3 ∈ g+ and α1 ∈ g−,
we have
3ω(∇x1,x2α1, x3)
= 3S(∇x1,x2α1, Ex3) = 3S(∇x1,x2α1, x3)
= S([x1, x2, α1]g, x3) − 2S([x1, x2, x3]g, α1) + S([x2, α1, x3]g, x1) + S([α1, x1, x3]g, x2)
= ω([x1, x2, α1]g, Ex3) − 2ω([x1, x2, x3]g, Eα1) + ω([x2, α1, x3]g, Ex1) + ω([α1, x1, x3]g, Ex2)
= ω([x1, x2, α1]g, x3) + 2ω([x1, x2, x3]g, α1) + ω([x2, α1, x3]g, x1) + ω([α1, x1, x3]g, x2)
= ω([x1, x2, α1]g, x3) + 2ω({x1, x2, α1}, x3) + ω({x2, α1, x1}, x3) + ω({α1, x1, x2}, x3).
Thus, we obtain
∇x1,x2α1 = {x1, x2, α1} +
2
3
({x2, α1, x1} + {α1, x1, x2}),
which implies that (67) holds.
For all x1, x2 ∈ g+ and α1, α2 ∈ g−, we have
3S(∇α1,x1x2, α2)
= S([α1, x1, x2]g, α2) − 2S([α1, x1, α2]g, x2) + S([x1, x2, α2]g, α1) + S([x2, α1, α2]g, x1) = 0.
Since S is nondegenerate, we have ∇α1,x1x2 ∈ g−. Moreover, For all x1, x2, x3 ∈ g+ and α1 ∈ g−,
we have
3ω(∇α1,x1x2, x3)
= 3S(∇α1,x1x2, Ex3) = 3S(∇α1,x1x2, x3)
= S([α1, x1, x2]g, x3) − 2S([α1, x1, x3]g, x2) + S([x1, x2, x3]g, α1) + S([x2, α1, x3]g, x1)
= ω([α1, x1, x2]g, x3) − 2ω([α1, x1, x3]g, x2) − ω([x1, x2, x3]g, α1) + ω([x2, α1, x3]g, x1)
= ω([α1, x1, x2]g, x3) − 2ω({α1, x1, x2}, x3) − ω({x1, x2, α1}, x3) + ω({x2, α1, x1}, x3).
32
Thus, we obtain
∇α1,x1x2 = −
1
3
{α1, x1, x2} +
2
3
{x2, α1, x1},
which implies that (68) holds.
(69) and (70) can be proved similarly. We omit details. The proof is finished.
Under the isomorphism given in Proposition 8.6 and the correspondence given in Theorem 4.11,
using the formulas provided in Proposition 4.10, we get
Corollary 8.12. For the perfect para-Kähler 3-Lie algebra (h ⊕ h∗, ω, E) given in Example 8.5,
for all x1, x2 ∈ h and α1, α2 ∈ h∗, we have
∇x1,x2α1 = (L∗(x1, x2) −
∇α1,x1x2 = (
1
3
∇α1,α2 x1 = (L∗(α1, α2) −
1
3
R∗(x1, x2) +
1
3
R∗(α1, α2) +
R∗(x2, x1) +
1
3
R∗(x1, x2))α1,
R∗(x2, x1))α1,
2
3
R∗(α2, α1) +
1
3
R∗(α1, α2))x1,
2
3
R∗(α2, α1))x1.
∇x1,α1α2 = (
1
3
(71)
(72)
(73)
(74)
9 Pseudo-Kähler structures on 3-Lie algebras
In this section, we add a compatibility condition between a symplectic structure and a complex
structure on a 3-Lie algebra to introduce the notion of a pseudo-Kähler structure on a 3-Lie algebra.
The relation between para-Kähler structures and pseudo-Kähler structures on a 3-Lie algebra is
investigated.
Definition 9.1. Let ω be a symplectic structure and J a complex structure on a real 3-Lie algebra
(g, [·, ·, ·]g). The triple (g, ω, J) is called a real pseudo-Kähler 3-Lie algebra if
ω(J x, J y) = ω(x, y),
∀x, y ∈ g.
(75)
Example 9.2. Consider the symplectic structures and the complex structures on the 4-dimensional
Euclidean 3-Lie algebra A4 given in Example 4.2 and Example 6.22 respectively. Then {ωi, Ji} for
i = 1, 2, 3, 4, 5, 6 are pseudo-Kähler structures on A4.
Proposition 9.3. Let (g, ω, J) be a real pseudo-Kähler 3-Lie algebra. Define a bilinear form S on
g by
S(x, y) , ω(x, J y), ∀x, y ∈ g.
(76)
Then (g, S) is a pseudo-Riemannian 3-Lie algebra.
Proof. By (75), we have
S(y, x) = ω(y, J x) = ω(J y, J 2x) = −ω(J y, x) = ω(x, J y) = S(x, y),
which implies that S is symmetric. Moreover, since ω is nondegenerate and J 2 = −Id, it is obvious
that S is nondegenerate. Thus, S is a pseudo-Riemannian metric on the 3-Lie algebra g.
33
Definition 9.4. Let (g, ω, J) be a real pseudo-Kähler 3-Lie algebra.
Riemannian metric is positive definite, we call (g, ω, J) a real Kähler 3-Lie algebra.
If the associated pseudo-
Theorem 9.5. Let (g, ω, E) be a complex para-Kähler 3-Lie algebra. Then (gR, ωR, J) is a real
pseudo-Kähler 3-Lie algebra, where gR is the underlying real 3-Lie algebra, J = iE and ωR = Re(ω)
is the real part of ω.
Proof. By Proposition 7.1, J = iE is a complex structure on the complex 3-Lie algebra g. Thus,
J is also a complex structure on the real 3-Lie algebra gR. It is obvious that ωR is skew-symmetric.
If for all x ∈ g, ωR(x, y) = 0. Then we have
ω(x, y) = ωR(x, y) + iωR(−ix, y) = 0.
By the nondegeneracy of ω, we obtain y = 0. Thus, ωR is nondegenerate. Therefore, ωR is a
symplectic structure on the real 3-Lie algebra gR. By ω(Ex, Ey) = −ω(x, y), we have
ωR(J x, J y) = Re(ω(iEx, iEy)) = Re(−ω(Ex, Ey)) = Re(ω(x, y)) = ωR(x, y).
Thus, (gR, iE, ωR) is a real pseudo-Kähler 3-Lie algebra.
Conversely, we have
Theorem 9.6. Let (g, ω, J) be a real pseudo-Kähler 3-Lie algebra. Then (gC, ωC, E) is a complex
para-Kähler 3-Lie algebra, where gC = g ⊗R C is the complexification of g, E = −iJC and ωC is the
complexification of ω, more precisely,
ωC(x1 + iy1, x2 + iy2) = ω(x1, x2) − ω(y1, y2) + iω(x1, y2) + iω(y1, x2),
∀x1, x2, y1, y2 ∈ g. (77)
Proof. By Corollary 7.2, E = −iJC is a paracomplex structure on the complex 3-Lie algebra gC.
It is obvious that ωC is skew-symmetric and nondegenerate. Moreover, since ω is a symplectic
structure on g, we deduce that ωC is a symplectic structure on gC. Finally, by ω(J x, J y) = ω(x, y),
we have
ωC(E(x1 + iy1), E(x2 + iy2)) = ωC(J y1 − iJ x1, J y2 − iJ x2)
= ω(J y1, J y2) − ω(J x1, J x2) − iω(J x1, J y2) − iω(J y1, J x2)
= ω(y1, y2) − ω(x1, x2) − iω(x1, y2) − iω(y1, x2)
= −ωC(x1 + iy1, x2 + iy2).
Therefore, (gC, ωC, −iJC) is a complex para-Kähler 3-Lie algebra.
At the end of this section, we construct a Kähler 3-Lie algebra using a 3-pre-Lie algebra with
a symmetric and positive definite invariant bilinear form.
Proposition 9.7. Let (A, {·, ·, ·}) be a real 3-pre-Lie algebra with a symmetric and positive definite
invariant bilinear form B. Then (Ac ⋉L∗ A∗, ω, −J) is a real Kähler 3-Lie algebra, where J is given
by (58) and ω is given by (22).
Proof. By Theorem 4.5 and Proposition 7.8, ω is a symplectic structure and J is a perfect complex
structure on the semidirect product 3-Lie algebra (Ac ⋉L∗ A∗, [·, ·, ·]L∗ ). Obviously, −J is also a
perfect complex structure on Ac ⋉L∗ A∗. Let {e1, · · · , en} be a basis of A such that B(ei, ej) = δij
and e∗
n be the dual basis of A∗. Then for all i, j, k, l, we have
1, · · · , e∗
ω(ei + e∗
j , ek + e∗
j ), −J(ek + e∗
l ) = δjk − δli,
l )) = ω(ej − e∗
ω(−J(ei + e∗
i , el − e∗
k) = −δil + δkj ,
34
which implies that ω(−J(x + α), −J(y + β)) = ω(x + α, y + β) for all x, y ∈ A and α, β ∈ A∗.
Therefore, (Ac ⋉L∗ A∗, ω, −J) is a pseudo-Kähler 3-Lie algebra. Finally, Let x = Pn
i=1 λiei ∈
A, α = Pn
i ∈ A∗ such that x + α 6= 0. We have
i=1 µie∗
S(x + α, x + α) = ω(x + α, −J(x + α))
= ω(cid:0)
n
X
i=1
λiei +
n
X
i=1
µie∗
i ,
n
X
i=1
µiei −
n
X
i=1
λie∗
i )(cid:1)
=
n
X
i=1
µ2
i +
n
X
i=1
λ2
i > 0.
Thus, S is positive definite. Therefore, {Ac ⋉L∗ A∗, ω, −J} is a real Kähler 3-Lie algebra.
References
[1] D. V. Alekseevsky and A. M. Perelomov, Poisson and symplectic structures on Lie algebras.
I. J. Geom. Phys. 22 (1997), no. 3, 191-211.
[2] A. Andrada, Complex product structures on 6-dimensional nilpotent Lie algebras. Forum
Math. 20 (2008), no. 2, 285–315.
[3] A. Andrada, M. L. Barberis and I. Dotti, Classification of abelian complex structures on
6-dimensional Lie algebras. J. Lond. Math. Soc. (2) 83 (2011), no. 1, 232-255.
[4] A. Andrada, M. L. Barberis and I. Dotti and G. P. Ovando, Product structures on four
dimensional solvable Lie algebras. Homology Homotopy Appl. 7 (2005), no. 1, 9–37.
[5] A. Andrada and S. Salamon, Complex product structures on Lie algebras. Forum Math. 17
(2005), no. 2, 261–295.
[6] J. Bagger and N. Lambert, Gauge symmetry and supersymmetry of multiple M2-branes
gauge theories. Phys. Rev. D 77 (2008), 065008.
[7] J. Bagger and N. Lambert, Three-algebras and N=6 Chern-Simons gauge theories. Phys.
Rev. D 79 (2009), no. 2, 025002, 8 pp.
[8] C. Bai, Left-symmetric bialgebras and an analogue of the classical Yang-Baxter equation.
Commun. Contemp. Math. 10 (2008), no. 2, 221-260.
[9] C. Bai, A further study on non-abelian phase spaces: left-symmetric algebraic approach and
related geometry. Rev. Math. Phys. 18 (2006), no. 5, 545–564.
[10] R. Bai, L. Guo, J. Li and Y. Wu, Rota-Baxter 3-Lie algebras. J. Math. Phys. 54 (2013),
063504.
[11] C. Bai, L. Guo and Y. Sheng, Bialgebras, the classical Yang-Baxter equation and Manin
triples for 3-Lie algebras. arXiv:1604.05996.
[12] I. Bajo and S. Benayadi, Abelian para-Kähler structures on Lie algebras. Differential Geom.
Appl. 29 (2011), no. 2, 160–173.
35
[13] A. Basu and J. A. Harvey, The M2-M5 brane system and a generalized Nahm's equation.
Nucl. Phys. B 713, 136 (2005), 136–150.
[14] S. Benayadi and M. Boucetta, On para-Kähler and hyper-para-Kähler Lie algebras. J. Algebra
436 (2015), 61–101.
[15] G. Calvaruso, A complete classification of four-dimensional paraKähler Lie algebras. Complex
Manifolds 2 (2015), 1–10.
[16] G. Calvaruso, Four-dimensional paraKähler Lie algebras: classification and geometry. Hous-
ton J. Math. 41 (2015), no. 3, 733–748.
[17] B. Y. Chu, Symplectic homogeneous spaces. Trans. Amer. Math. Soc. 197 (1974), 145-159.
[18] R. Cleyton, J. Lauret and Y. Poon, Weak mirror symmetry of Lie algebras. J. Symplectic
Geom. 8 (2010), no. 1, 37–55.
[19] R. Cleyton, Y. Poon and G. P. Ovando, Weak mirror symmetry of complex symplectic Lie
algebras. J. Geom. Phys. 61 (2011), no. 8, 1553-1563.
[20] J. A. de Azc´arraga and J. M. Izquierdo, n-ary algebras: a review with applications, J. Phys.
A: Math. Theor. 43 (2010), 293001.
[21] P. de Medeiros, J. Figueroa-O'Farrill and E. Méndez-Escobar, Metric Lie 3-algebras in
Bagger-Lambert theory. J. High Energy Phys. 2008, no. 8, 045, 41 pp.
[22] P. de Medeiros, J. Figueroa-O'Farrill, E. Méndez-Escobar and P. Ritter, On the Lie-algebraic
origin of metric 3-algebras. Comm. Math. Phys. 290 (2009), no. 3, 871-902.
[23] P. de Medeiros, J. Figueroa-O'Farrill, E. Méndez-Escobar and P. Ritter, Metric 3-Lie algebras
for unitary Bagger-Lambert theories. J. High Energy Phys. 2009, no. 4, 037, 44 pp.
[24] V. T. Filippov, n-Lie algebras. Sib. Mat. Zh. 26 (1985) 126–140.
[25] P. Gautheron, Some remarks concerning Nambu mechanics. Lett. Math. Phys. 37 (1996)
103–116.
[26] J. Gomis, D. Rodríguez-Gómez, M. Van Raamsdonk and H. Verlinde, Supersymmetric Yang-
Mills theory from Lorentzian three-algebras. J. High Energy Phys. no. 8, 094, 18 pp (2008).
[27] P. Ho, R. Hou and Y. Matsuo, Lie 3-algebra and multiple M2-branes. J. High Energy Phys.
no. 6, 020, 30 pp (2008).
[28] Sh. M. Kasymov, On a theory of n-Lie algebras. (Russian) Algebra i Logika 26, no. 3 (1987)
277-297.
[29] T. Li and A. Tomassini, Almost Kähler structures on four dimensional unimodular Lie alge-
bras. J. Geom. Phys. 62 (2012), no. 7, 1714–1731.
[30] J. Liu, A. Makhlouf and Y. Sheng, A new approach to representations of 3-Lie algebras and
abelian extensions. Algebr Represent Theor. (2017), doi:10.1007/s10468-017-9693-0.
[31] J. Liu, Y. Sheng, Y. Zhou and C. Bai, Nijenhuis operators on n-Lie algebras. Commun.
Theor. Phys. (Beijing) 65 (2016), no. 6, 659–670.
36
[32] Y. Nambu, Generalized Hamiltonian dynamics. Phys. Rev. D 7 (1973) 2405-2412.
[33] G. Papadopoulos, M2-branes, 3-Lie algebras and Plucker relations. J. High Energy Phys.
(2008), no. 5, 054, 9 pp.
[34] J. Pei, C. Bai and L. Guo, Splitting of operads and Rota-Baxter operators on operads. Appl.
Categ. Structures 25 (2017), no. 4, 505–538.
[35] S. M. Salamon, Complex structures on nilpotent Lie algebras. J. Pure Appl. Algebra 157
(2001), no. 2-3, 311-333.
[36] L. Takhtajan, On foundation of the generalized Nambu mechanics. Comm. Math. Phys. 160
(1994) 295–315.
[37] L. Takhtajan, A higher order analog of Chevalley-Eilenberg complex and deformation theory
of n-algebras. St. Petersburg Math. J. 6 (1995) 429–438.
Department of Mathematics, Jilin University, Changchun 130012, China
Email: [email protected], [email protected]
37
|
1301.4238 | 1 | 1301 | 2013-01-17T21:14:02 | Equalities and inequalities for Hermitian solutions and Hermitian definite solutions of the two matrix equations $AX = B$ and $AXA^* = B$ | [
"math.RA",
"math.OA"
] | This paper studies algebraic properties of Hermitian solutions and Hermitian definite solutions of the two types of matrix equation $AX = B$ and $AXA^* = B$. We first establish a variety of rank and inertia formulas for calculating the maximal and minimal ranks and inertias of Hermitian solutions and Hermitian definite solutions of the matrix equations $AX = B$ and $AXA^* = B$, and then use them to characterize many qualities and inequalities for Hermitian solutions and Hermitian definite solutions of the two matrix equations and their variations. | math.RA | math |
Equalities and inequalities for Hermitian solutions and Her-
mitian definite solutions of the two matrix equations AX = B
and AX A∗
= B
YONGGE TIAN
Abstract. This paper studies algebraic properties of Hermitian solutions and Hermitian definite
solutions of the two types of matrix equation AX = B and AXA∗ = B. We first establish a variety
of rank and inertia formulas for calculating the maximal and minimal ranks and inertias of Hermi-
tian solutions and Hermitian definite solutions of the matrix equations AX = B and AXA∗ = B,
and then use them to characterize many qualities and inequalities for Hermitian solutions and
Hermitian definite solutions of the two matrix equations and their variations.
Mathematics Subject Classifications. 15A03, 15A09, 15A24, 15B57.
Keywords. Matrix equation, Hermitian solution, Hermitian definite solution, generalized inverse,
rank, inertia, matrix equality, matrix inequality, Lowner partial ordering.
1
Introduction
Consider the following two well-known linear matrix equations
and
AX = B
AXA∗ = B,
(1.1)
(1.2)
both of which are simplest cases of various types of linear matrix equation (with symmetric pat-
terns), and are the starting point of many advanced study on complicated matrix equations. A
huge amount of results about the two equations and applications were given in the literature. In
particular, many problems on algebraic properties of solutions of the two matrix equations were ex-
plicitly characterized by using formulas for ranks and inertias of matrices. In this paper, the author
focuses on Hermitian solutions or Hermitian definite solutions of (1.1) and (1.2), and studies the
following optimization problems on the ranks and inertias of Hermitian solutions and Hermitian
definite solutions of (1.1) and (1.2):
Problem 1.1 Let A, B ∈ Cm×n be given, and assume that (1.1) has a Hermitian solution or
Hermitian definite solution X ∈ Cn×n. In this case, establish formulas for calculating the extremal
ranks and inertias of
X − P,
(1.3)
where P ∈ Cn×n is a given Hermitian matrix, and use the formulas to characterize behaviors
of these Hermitian solution and definite solution, in particular, to give necessary and sufficient
conditions for the four inequalities
X ≻ P, X < P, X ≺ P, X 4 P
(1.4)
in the Lowner partial ordering to hold, respectively.
Problem 1.2 Let A, B, C, D ∈ Cm×n be given, X, Y ∈ Cn×n be two unknown matrices, and
assume that the two linear matrix equations
AX = B, CY = D
(1.5)
have Hermitian solutions, respectively. In this case, establish formulas for calculating the extremal
ranks and inertias of the difference
X − Y
(1.6)
This work was supported partially by National Natural Science Foundation of China (Grant No. 11271384).
1
of the Hermitian solutions, and use the formulas to derive necessary and sufficient conditions for
X ≻ Y, X < Y, X ≺ Y, X 4 Y
(1.7)
to hold in the Lowner partial ordering, respectively.
Problem 1.3 Let A ∈ Cm×n and B ∈ Cm
H be given, and assume that (1.2) has a Hermitian
solution. Pre- and post-multiplying a matrix T ∈ Cp×n and its conjugate transpose T ∗ on both
sides of (1.2) yields a transformed equation as follows
Further define
T AXA∗T ∗ = T BT ∗.
S = { X ∈ Cn
T = { Y ∈ Cn
H AXA∗ = B },
H T AY A∗T ∗ = T BT ∗ }.
(1.8)
(1.9)
(1.10)
In this case, give necessary and sufficient conditions for S = T to hold, as well as necessary and
sufficient conditions for X ≻ Y, X < Y, X ≺ Y and X 4 Y to hold for X ∈ S and Y ∈ T ,
respectively.
Problem 1.4 Assume that (1.2) has a Hermitian solution, and define
S = { X ∈ Cn
T = { (X1 + X2)/2 T1AX1A∗T ∗
H AXA∗ = B} ,
(1.11)
(1.12)
H } .
1 = T1BT ∗
1 , T2AX2A∗T ∗
2 = T2BT ∗
2 , X1, X2 ∈ Cn
In this case, give necessary and sufficient conditions for S = T to hold.
Problem 1.5 Denote the sets of all least-squares solutions and least-rank Hermitian solutions of
(1.2) as
S = { X ∈ Cn
T = { Y ∈ Cn
H k B − AXA∗ kF = min } ,
H r( B − AY A∗ ) = min } .
(1.13)
(1.14)
In this case, establish necessary and sufficient conditions for X ≻ Y, X < Y, X ≺ Y and X 4 Y
to hold for X ∈ S and Y ∈ T , respectively.
Matrix equations have been a prominent concerns in matrix theory and applications. As is
known to all, two key tasks in solving a matrix equation is to give identifying condition for the
existence of a solution of the equation, and to give general solution of the equation. Once general
solution is given, the subsequent work is to describe behaviors of solutions of the matrix equation,
such as, the uniqueness of solutions; the norms of solutions; the ranks and ranges of solutions, the
definiteness of solutions, equalities and inequalities of solutions, etc. Problems 1.1 and 1.2 describe
the inequalities for solutions of (1.1), as well as relations between solutions of two linear matrix
equations.
Throughout this paper, Cm×n and Cm
H stand for the sets of all m × n complex matrices and all
m × m complex Hermitian matrices, respectively; the symbols A∗, r(A) and R(A) stand for the
transpose, conjugate transpose, rank and range (column space) of a matrix A ∈ Cm×n, respectively;
Im denotes the identity matrix of order m; [ A, B ] denotes a row block matrix consisting of A and
B. The Moore -- Penrose inverse of a matrix A ∈ Cm×n, denoted by A†, is defined to be the unique
matrix X ∈ Cn×m satisfying the following four matrix equations
(i) AXA = A,
(ii) XAX = X,
(iii) (AX)∗ = AX,
(iv) (XA)∗ = XA.
Further, let EA = Im − AA† and FA = In − A†A, which ranks are given by r(EA) = m − r(A)
and r(FA) = n − r(A). A well-known property of the Moore -- Penrose inverse is (A†)∗ = (A∗)†. In
particular, both (A†)∗ = A† and AA† = A†A hold if A is Hermitian, i.e., A = A∗. A < 0 (A ≻ 0)
means that A is Hermitian positive semi-definite (Hermitian positive definite). Two A, B ∈ Cm
H are
said to satisfy the inequality A < B (A ≻ B) in the Lowner partial ordering if A − B is Hermitian
2
positive semi-definite (Hermitian positive definite). i±(A) denotes the numbers of the positive and
negative eigenvalues of a Hermitian matrix A counted with multiplicities, respectively.
The results on ranks and inertias of matrices in Lemmas 1.6 and 1.7 below are obvious or
well-known (see also [10, 11] for their references), while the closed-form formulas for matrix ranks
and inertias in Lemmas 1.9 and 1.12 -- 1.15 were established by the present author, which we shall
use in the latter part of this paper to derive analytical solutions to Problems 1.1 -- 1.5.
Lemma 1.6 Let S, S1 and S2 be three sets consisting of (square) matrices over Cm×n, and let H
be a set consisting of Hermitian matrices over Cm
H . Then, the following hold.
(a) Under m = n, S has a nonsingular matrix if and only if maxX∈S r(X) = m.
(b) Under m = n, all X ∈ S are nonsingular if and only if minX∈S r(X) = m.
(c) 0 ∈ S if and only if minX∈S r(X) = 0.
(d) S = {0} if and only if maxX∈S r(X) = 0.
(e) H has a matrix X ≻ 0 (X ≺ 0) if and only if maxX∈H i+(X) = m (maxX∈H i−(X) = m).
(f) All X ∈ H satisfy X ≻ 0 (X ≺ 0) if and only if minX∈H i+(X) = m (minX∈H i−(X) = m ).
(g) H has a matrix X < 0 (X 4 0) if and only if minX∈H i−(X) = 0 (minX∈H i+(X) = 0 ).
(h) All X ∈ H satisfy X < 0 (X 4 0) if and only if maxX∈H i−(X) = 0 (maxX∈H i+( X) = 0 ).
(i) The following hold
S1 ∩ S2 6= ∅ ⇔
min
X1∈S1, X2∈S2
r( X1 − X2 ) = 0,
S1 ⊆ S2 ⇔ max
X1∈S1
min
X2∈S2
r( X1 − X2 ) = 0,
S1 ⊇ S2 ⇔ max
X2∈S2
min
X1∈S1
r( X1 − X2 ) = 0,
(1.15)
(1.16)
(1.17)
there exist X1 ∈ S1 and X2 ∈ S2 such that X1 ≻ X2 ⇔ max
i+( X1 − X2 ) = m,
X1∈S1, X2∈S2
(1.18)
there exist X1 ∈ S1 and X2 ∈ S2 such that X1 < X2 ⇔ min
i−( X1 − X2 ) = 0.
X1∈S1, X2∈S2
Lemma 1.7 Let A ∈ Cm
H , B ∈ Cn
H, Q ∈ Cm×n, and assume that P ∈ Cm×m is nonsingular. Then,
(1.19)
i±(P AP ∗) = i±(A),
i∓(A)
if λ > 0
if λ < 0
,
i±(λA) =(cid:26) i±(A)
i±(cid:20) A 0
i+(cid:20) 0 Q
0 B (cid:21) = i±(A) + i±(B),
0 (cid:21) = i−(cid:20) 0 Q
Q∗
Q∗
0 (cid:21) = r(Q).
Lemma 1.8 ([7]) Let A ∈ Cm×n, B ∈ Cm×k, C ∈ Cl×n and D ∈ Cl×k. Then,
r[ A, B ] = r(A) + r(EAB) = r(B) + r(EB A),
r(cid:20) A
C(cid:21) = r(A) + r(CFA) = r(C) + r(AFC ),
r(cid:20) A B
C 0 (cid:21) = r(B) + r(C) + r(EBAFC ).
3
(1.20)
(1.21)
(1.22)
(1.23)
(1.24)
(1.25)
(1.26)
Lemma 1.9 ([10]) Let A ∈ Cm
H , B ∈ Cm×n, D ∈ Cn
H, and let
M1 =(cid:20) A B
0 (cid:21), M2 =(cid:20) A B
B∗ D(cid:21).
B∗
Then, the following expansion formulas hold
i±(M1) = r(B) + i±(EBAEB),
EAB
i±(M2) = i±(A) + i±(cid:20)
0
B∗EA D − B∗A†B(cid:21), r(M2) = r(A) + r(cid:20)
0
EAB
B∗EA D − B∗A†B(cid:21).
r(M1) = 2r(B) + r(EBAEB),
(1.27)
(1.28)
(1.29)
Under the condition A < 0,
i+(M1) = r[ A, B ],
i−(M1) = r(B),
r(M1) = r[ A, B ] + r(B).
(1.30)
Under the condition R(B) ⊆ R(A),
i±(M2) = i±(A) + i±( D − B∗A†B ), r(M2) = r(A) + r( D − B∗A†B ).
(1.31)
Some general rank and inertia expansion formulas derived from (1.24) -- (1.29) are given below
C
B
BFQ
EP C
− r(Q),
A B
C 0
A B 0
C 0 P
r(cid:20) A
EP C 0 (cid:21) = r(cid:20) A B 0
C 0 P (cid:21) − r(P ),
0 Q
r(cid:20) A BFQ
0 Q 0
r(cid:20) A
i±(cid:20) A
i±(cid:20) EQAEQ EQB
0 (cid:21) = r
0 (cid:21) = r
0 (cid:21) = i±
D (cid:21) = i±
A B 0
0 P ∗
B∗
0
P
A B Q
B∗ D 0
Q∗
0
0
B∗EQ
BFP
FP B∗
(1.32)
(1.33)
(1.34)
(1.35)
(1.36)
− r(P ) − r(Q),
− r(P ),
− r(Q).
0
We shall use them to simplify ranks and inertias of block matrices involving Moore -- Penrose inverses
of matrices.
Lemma 1.10 ([2]) Let A, B ∈ Cm×n be given. Then, the following hold.
(a) Eq. (1.1) has a solution X ∈ Cn
H if and only if R(B) ⊆ R(A) and AB∗ = BA∗. In this case,
the general Hermitian solution of (1.1) can be written as
X = A†B + (A†B)∗ − A†BA†A + FAU FA,
(1.37)
where U ∈ Cn
H is arbitrary.
(b) The matrix equation in (1.1) has a solution 0 4 X ∈ Cn
H if and only if R(B) ⊆ R(A),
H of
AB∗ < 0 and R(AB∗) = R(BA∗) = R(B). In this case, the general solution 0 4 X ∈ Cn
(1.1) can be written as
X = B∗(AB∗)†B + FAU FA,
(1.38)
where 0 4 U ∈ Cn
H is arbitrary.
Lemma 1.11 Eq. (1.2) has a solution X ∈ Cn
AA†B = B. In this case, the general Hermitian solution of AXA∗ = B can be written as
H if and only if R(B) ⊆ R(A), or equivalently,
X = A†B(A†)∗ + FAU + U ∗FA,
(1.39)
where U ∈ Cn×n is arbitrary.
4
Lemma 1.12 ([11]) Let Aj ∈ Cmj ×n and Bj ∈ C
mj
H be given, j = 1, 2, and assume that
A1X1A∗
1 = B1 and A2X2A∗
2 = B2
are solvable for X1, X2 ∈ Cn
H. Also define
Sj =(cid:8) Xj ∈ Cn
H AjXjA∗
j = Bj(cid:9) ,
j = 1, 2, M =
0
A1
B1
0 −B2 A2
A∗
1 A∗
2
.
0
Then,
max
X1∈S1,X2∈S2
min
X1∈S1,X2∈S2
r( X1 − X2 ) = min { n, r(M ) + 2n − 2r(A1) − 2r(A2) } ,
r( X1 − X2 ) = r(M ) − 2r[ A∗
1, A∗
2 ],
max
X1∈S1,X2∈S2
min
X1∈S1,X2∈S2
i±( X1 − X2 ) = i±(M ) + n − r(A1) − r(A2),
i±( X1 − X2 ) = i±(M ) − r[ A∗
1, A∗
2 ].
(1.40)
(1.41)
(1.42)
(1.43)
(1.44)
(1.45)
Consequently, the following hold.
(a) There exist X1 ∈ S1 and X2 ∈ S2 such that X1 − X2 is nonsingular if and only if r(M ) >
2r(A1) + 2r(A2) − n.
(b) X1 − X2 is nonsingular for all X1 ∈ S1 and X2 ∈ S2 if and only if r(M ) = 2r[ A∗
1, A∗
2 ] + n.
(c) There exist X1 ∈ S1 and X2 ∈ S2 such that X1 = X2 if and only if R(Bj) ⊆ R(Aj) and
r(M ) = 2r[ A∗
1, A∗
2 ], j = 1, 2.
(d) The rank of X1 − X2 is invariant for all X1 ∈ S1 and X2 ∈ S2 if and only if r(M ) =
2r[ A∗
1, A∗
2 ] − n or r(A1) = r(A2) = n.
(e) There exist X1 ∈ S1 and X2 ∈ S2 such that X1 ≻ X2 (X1 ≺ X2) if and only if i+(M ) =
r(A1) + r(A2) ( i−(M ) = r(A1) + r(A2) ) .
(f) X1 ≻ X2 (X1 ≺ X2) for all X1 ∈ S1 and X2 ∈ S2 if and only if i+(M ) = r[ A∗
1, A∗
2 ] + n
( i−(M ) = r[ A∗
1, A∗
2 ] + n ) .
(g) There exist X1 ∈ S1 and X2 ∈ S2 such that X1 < X2 (X1 4 X2) if and only if i−(M ) =
r[ A∗
1, A∗
2 ] ( i+(M ) = r[ A∗
1, A∗
2 ] ) .
(h) X1 < X2 (X1 4 X2) for all X1 ∈ S1 and X2 ∈ S2 if and only if i−(M ) = r(A1) + r(A2) − n
( i+(M ) = r(A1) + r(A2) − n ) .
(i) i+( X1 − X2 ) is invariant for all X1 ∈ S1 and X2 ∈ S2 ⇔ i−( X1 − X2 ) is invariant for all
X1 ∈ S1 and X2 ∈ S2 ⇔ r(A1) = r(A2) = n.
Lemma 1.13 Let A ∈ Cm
following hold.
H and B ∈ Cm×n be given, and denote M = (cid:20) A B
0 (cid:21). Then, the
B∗
(a) [10, 21] The extremal ranks and inertias of A − BXB∗ subject to X ∈ Cn
H are given by
max
X∈Cn
H
min
X∈Cn
H
r( A − BXB∗ ) = r[ A, B ],
r( A − BXB∗ ) = 2r[ A, B ] − r(M ),
max
X∈Cn
H
min
X∈Cn
H
i±( A − BXB∗ ) = i±(M ),
i±( A − BXB∗ ) = r[ A, B ] − i∓(M ).
5
(1.46)
(1.47)
(1.48)
(1.49)
(b) [15] The extremal ranks and inertias of A ± BXB∗ subject to 0 4 X ∈ Cn
H are given by
max
r( A + BXB∗ ) = r[ A, B ], min
r( A + BXB∗ ) = i+(A) + r[ A, B ] − i+(M ), (1.50)
max
i+( A + BXB∗ ) = i+(M ), min
i+( A + BXB∗ ) = i+(A),
04X∈Cn
H
04X∈Cn
H
H
i−( A + BXB∗ ) = i−(A), min
04X∈Cn
r( A − BXB∗ ) = r[ A, B ], min
H
04X∈Cn
H
H
i+( A − BXB∗ ) = i+(A), min
04X∈Cn
i−( A − BXB∗ ) = i−(M ), min
H
04X∈Cn
H
i−( A + BXB∗ ) = r[ A, B ] − i+(M ),
r( A − BXB∗ ) = i−(A) + r[ A, B ] − i−(M ), (1.53)
i+( A − BXB∗ ) = r[ A, B ] − i−(M ),
i−( A − BXB∗ ) = i−(A).
04X∈Cn
H
04X∈Cn
H
max
04X∈Cn
max
04X∈Cn
H
max
04X∈Cn
max
04X∈Cn
H
Lemma 1.14 ([4, 10]) Let A ∈ Cm
H , B ∈ Cm×n and C ∈ Cm×k be given. Then,
max
H, Y ∈Ck
H
X∈Cn
r( A − BXB∗ − CY C ∗ ) = r[ A, B, C ],
min
H, Y ∈Ck
H
X∈Cn
r( A − BXB∗ − CY C ∗ ) = 2r[ A, B, C ] + r(cid:20) A B
0 (cid:21) − r(cid:20) A B C
0 (cid:21)
B∗
C ∗
0
0
C ∗
− r(cid:20) A B C
0 (cid:21),
i±( A − BXB∗ − CY C ∗ ) = i±
0
i±( A − BXB∗ − CY C ∗ ) = r[ A, B, C ] − i∓
A B C
B∗
0
C ∗
0
0
,
max
H, Y ∈Ck
H
X∈Cn
min
H, Y ∈Ck
H
X∈Cn
A B C
B∗
0
C ∗
0
0
.
0
Lemma 1.15 ([5, 11]) Let A ∈ Cm
R(B) ⊆ R(C ∗). Then,
H , B ∈ Cm×n and C ∈ Cp×m be given and assume that
(1.51)
(1.52)
(1.54)
(1.55)
(1.56)
(1.57)
(1.58)
(1.59)
(1.60)
(1.61)
(1.62)
(1.63)
(1.64)
(1.65)
(1.66)
(1.67)
max
X∈Cn×p
min
X∈Cn×p
0 (cid:21)(cid:27),
B∗
r[ A − BXC − (BXC)∗ ] = min(cid:26)r[ A, C ∗ ], r(cid:20) A B
r[ A − BXC − (BXC)∗ ] = 2r[ A, C ∗ ] + r(cid:20) A B
i±[ A − BXC − (BXC)∗ ] = i±(cid:20) A B
0 (cid:21),
i±[ A − BXC − (BXC)∗ ] = r[ A, C ∗ ] + i±(cid:20) A B
B∗
B∗
B∗
0 (cid:21) − 2r(cid:20) A B
C 0 (cid:21),
max
X∈Cn×p
min
X∈Cn×p
and
0 (cid:21) − r(cid:20) A B
C 0 (cid:21),
0 (cid:21)(cid:27),
max
X∈Cn×m
min
X∈Cn×m
max
X∈Cn×m
min
X∈Cn×m
B∗
r[ A − BX − (BX)∗ ] = min(cid:26)m, r(cid:20) A B
r[ A − BX − (BX)∗ ] = r(cid:20) A B
0 (cid:21) − 2r(B),
i±[ A − BX − (BX)∗ ] = i±(cid:20) A B
0 (cid:21),
i±[ A − BX − (BX)∗ ] = i±(cid:20) A B
0 (cid:21) − r(B).
B∗
B∗
B∗
2 Properties of Hermitian solutions and Hermitian definite
solutions of AX = B
Some formulas for calculating the ranks and inertias of Hermitian solutions and Hermitian definite
solutions of the matrix equation in (1.1) were established in [11]. In this section, we reconsider the
6
ranks and inertias of these solutions and give a group of complete results.
Theorem 2.1 Assume that (1.1) has a Hermitian solution, and let P ∈ Cn
H. Also, define
S = { X ∈ Cn
H AX = B }.
Then,
r( X − P ) = r( B − AP ) − r(A) + n,
r( X − P ) = 2r( B − AP ) − r( BA∗ − AP A∗ ),
max
X∈S
min
X∈S
max
X∈S
min
X∈S
i±( X − P ) = i±( BA∗ − AP A∗ ) − r(A) + n,
i±( X − P ) = r( B − AP ) − i∓( BA∗ − AP A∗ ).
(2.1)
(2.2)
(2.3)
(2.4)
(2.5)
In consequence, the following hold.
(a) There exists an X ∈ S such that X − P is nonsingular if and only if R( AP − B ) = R(A).
(b) X − P is nonsingular for all X ∈ S if and only if 2r( B − AP ) = r( BA∗ − AP A∗ ) + n.
(c) There exists an X ∈ S such that X ≻ P (X ≺ P ) if and only if
R( BA∗ − AP A∗ ) = R(A) and BA∗ < AP A∗
( R( BA∗ − AP A∗ ) = R(A) and BA∗ 4 AP A∗ ) .
(d) X ≻ P (X ≺ P ) holds for all X ∈ S if and only if
r( B − AP ) = n and BA∗ < AP A∗
( r( B − AP ) = n and AB∗ 4 AP A∗ ) .
(e) There exists an X ∈ S such that X < P (X 4 P ) if and only if
R( B − AP ) = R( BA∗ − AP A∗ ) and BA∗ < AP A∗
( R( B − AP ) = R( BA∗ − AP A∗ ) and BA∗ 4 AP A∗ ).
(f) X < P (X 4 P ) holds for all X ∈ S if and only if
BA∗ < AP A∗ and r(A) = n ( BA∗ 4 AP A∗ and r(A) = n ) .
In particular, the following hold.
(g) There exists an X ∈ S such that X is nonsingular if and only if R(B) = R(A).
(h) X is nonsingular for all X ∈ S if and only if r( B ) = n.
(i) There exists an X ∈ S such that X ≻ 0 (X ≺ 0) if and only if
R(B) = R(A) and BA∗ < 0 ( R(B) = R(A) and BA∗ 4 0 ) .
(j) X ≻ 0 (X ≺ 0) holds for all X ∈ S if and only if
r(B) = n and BA∗ < 0 ( r(B) = n and AB∗ 4 0 ) .
(k) There exists an X ∈ S such that X < 0 (X 4 0) if and only if
R(B) = R(BA∗) and BA∗ < 0 ( R(B) = R(BA∗) and BA∗ 4 0 ).
(l) X < 0 (X 4 0) holds for all X ∈ S if and only if
BA∗ < 0 and r(A) = n ( BA∗ 4 0 and r(A) = n ) .
7
Proof By Lemma 1.10(a), X − P can be written as
X − P = X0 − P + FAU FA,
(2.6)
where X0 = A†B + (A†B)∗ − A†BA†A and U ∈ Cn
gives
H is arbitrary. Applying Lemma 1.13(a) to (2.6)
max
X∈S
r( X − P ) = max
U ∈Cn
H
r( X0 − P + FAU FA) = r[ X0 − P, FA ],
min
X∈S
r( X − P ) = min
U ∈Cn
H
max
X∈S
i±( X − P ) = min
U ∈Cn
H
min
X∈S
i±( X − P ) = min
U ∈Cn
H
r( X0 − P + FAU FA) = 2r[ X0 − P, FA ] − r(cid:20) X0 − P FA
0 (cid:21),
0 (cid:21),
i±( X0 − P + FAU FA) = i±(cid:20) X0 − P FA
0 (cid:21).
i±( X0 − P + FAU FA) = r[ X0 − P, FA ] − i∓(cid:20) X0 − P FA
FA
FA
FA
(2.7)
(2.8)
(2.9)
(2.10)
Applying (1.24) and (1.28) to the block matrices in (2.7) -- (2.10) and simplifying by (1.20) and
elementary block matrix operations, we obtain
r[ X0 − P, FA ] = r( A†AX0 − A†AP ) + r(FA) = r( B − AP ) + n − r(A),
FA
i±(cid:20) X0 − P FA
r(cid:20) X0 − P FA
0 (cid:21) = r(FA) + i±[ A†A( X0 − P )A†A ] = n − r(A) + i±( BA∗ − AP A∗ ),
0 (cid:21) = 2r(FA) + r[ A†A( X0 − P )A†A ] = 2n − 2r(A) + r( BA∗ − AP A∗ ).
FA
(2.11)
(2.12)
(2.13)
Substituting (2.11) -- (2.13) into (2.7) -- (2.10) and simplifying leads to (2.2) -- (2.5). Results (a) -- (l)
follow from applying Lemma 1.6 to (2.2) -- (2.5).
(cid:3)
Theorem 2.2 Assume that (1.1) has a Hermitian solution X < 0, and let 0 4 P ∈ Cn
define
H. Also,
S = { 0 4 X ∈ Cn
H AX = B }, M =(cid:20) AB∗ B
P (cid:21).
B∗
Then,
(2.14)
(2.15)
(2.16)
(2.17)
(2.18)
(2.19)
(2.20)
max
X∈S
min
X∈S
max
X∈S
min
X∈S
max
X∈S
min
X∈S
r( X − P ) = r( B − AP ) − r(A) + n,
r( X − P ) = i−(M ) + r( B − AP ) − i+( BA∗ − AP A∗ ),
i+( X − P ) = i+( BA∗ − AP A∗ ) − r(A) + n,
i+( X − P ) = i−(M ),
i−( X − P ) = i+(M ) − r(B),
i−( X − P ) = r( B − AP ) − i+( BA∗ − AP A∗ ).
Consequently, the following hold.
(a) There exists an X ∈ S such that X − P is nonsingular if and only if R( B − AP ) = R(A).
(b) X −P is nonsingular for all X ∈ S if and only if i−(M )+r( B−AP ) = i+( BA∗−AP A∗ )+n.
(c) There exists an X ∈ S such that X ≻ P if and only if R( BA∗ − AP A∗ ) = R(A) and
BA∗ < AP A∗.
(d) X ≻ P holds for all X ∈ S if and only if i−(M ) = n.
(e) There exists an X ∈ S such that X ≺ P if and only if i+(M ) = r(B) + n.
8
(f) X ≺ P holds for all X ∈ S if and only if r( B − AP ) = n and BA∗ 4 AP A∗.
(g) There exists an X ∈ S such that X < P if and only if R( B − AP ) = R( BA∗ − AP A∗ ) and
BA∗ < AP A∗.
(h) X < P holds for all X ∈ S if and only if i+(M ) = r(B).
(i) There exists an X ∈ S such that X 4 P if and only if M < 0.
(j) X 4 P holds for all X ∈ S if and only if i+( BA∗ − AP A∗ ) = n − r(A).
In particular, the following hold.
(k) There exists an X ∈ S such that X − In is nonsingular if and only if R( B − A ) = R(A).
(l) X − In is nonsingular for all X ∈ S if and only if i−( BA∗ − BB∗ ) + r( B − A ) = i+( BA∗ −
AA∗ ) + n.
(m) There exists an X ∈ S such that X ≻ In if and only if R( BA∗ − AA∗ ) = R(A) and
BA∗ < AA∗.
(n) X ≻ In holds for all X ∈ S if and only if BA∗ ≺ BB∗.
(o) There exists an X ∈ S such that X ≺ In if and only if R( BA∗ − BB∗ ) = R(B) and
BA∗ < BB∗.
(p) X ≺ In holds for all X ∈ S if and only if r( B − A ) = n and BA∗ 4 AA∗.
(q) There exists an X ∈ S such that X < In if and only if R( B − A ) = R( BA∗ − AA∗ ) and
BA∗ < AA∗.
(r) X < In holds for all X ∈ S if and only if r(B) = n and BA∗ 4 BB∗.
(s) There exists an X ∈ S such that X 4 In if and only if BA∗ < BB∗.
(t) X 4 In holds for all X ∈ S if and only if i+( BA∗ − AA∗ ) = n − r(A).
Proof By Lemma 1.10(b), X − P can be written as
where X0 = B∗(AB∗)†B and 0 4 U ∈ Cn
H is arbitrary. Applying Lemma 1.13(b) to (2.21) gives
X − P = X0 − P + FAU FA,
(2.21)
max
X∈S
min
X∈S
r( X − P ) = max
04U ∈Cn
H
r( X − P ) = min
04U ∈Cn
H
r( X0 − P + FAU FA) = r[ X0 − P, FA ],
r( X0 − P + FAU FA) = i+( X0 − P ) + r[ X0 − P, FA ]
(2.22)
(2.23)
(2.24)
(2.25)
(2.26)
0 (cid:21),
− i+(cid:20) X0 − P FA
FA
i+( X0 − P + FAU FA) = i+(cid:20) X0 − P FA
0 (cid:21),
FA
i+( X0 − P + FAU FA) = i+( X0 − P ),
i−( X0 − P + FAU FA) = i−( X0 − P ),
i+( X − P ) = min
04U ∈Cn
H
i+( X − P ) = min
04U ∈Cn
H
i−( X − P ) = min
04U ∈Cn
H
max
X∈S
min
X∈S
max
X∈S
min
X∈S
i−( X − P ) = min
04U ∈Cn
H
i±( X0 − P + FAU FA) = r[ X0 − P, FA ] − i+(cid:20) X0 − P FA
0 (cid:21). (2.27)
FA
Applying (1.21) and (1.31) to X0 − P gives
i±( X0 − P ) = i∓[ P − B∗(AB∗)†B∗ ] = i∓(cid:20) AB∗ B∗
P (cid:21) − i∓(AB∗) = i∓(M ) − i∓(AB∗),
B
9
so that
i+( X0 − P ) = i−(M ),
i+( X0 − P ) = i+(M ) − r(B).
(2.28)
Substituting (2.11) -- (2.13) and (2.28) into (2.22) -- (2.27) and simplifying leads to (2.15) -- (2.20).
Results (a) -- (t) follow from applying Lemma 1.6 to (2.15) -- (2.20).
(cid:3)
A general problem related to Hermitian solutions and Hermitian definite solutions of AX = B
is to establish formulas for calculating the extremal ranks and inertias of P − QXQ∗ subject to
the Hermitian solutions and Hermitian definite solutions of AX = B. The results obtained can be
used to solve optimization problems of P − QXQ∗ subject to AX = B.
3 Relations between Hermitian solutions of AX = B and
C Y = D
In order to compare Hermitian solutions of matrix equations, we first establish some fundamental
formulas for calculating the extremal ranks and inertias of difference of Hermitian solutions of
the two matrix equations AX = B and CY = D, and then use them to characterize relationship
between the Hermitian solutions.
Theorem 3.1 Assume that each of the matrix equations in (1.5) has a Hermitian solution, and
let
S = { X ∈ Cn
H AX = B }, T = { Y ∈ Cn
H CY = D }.
AB∗
0
A∗
M =
0
A
−CD∗ C
C ∗
0
, N =(cid:20) A B
C D(cid:21).
r( X − Y ) = n + r(N ) − r(A) − r(C),
Also denote
Then,
max
X∈S, Y ∈T
min
X∈S, Y ∈T
max
X∈S, Y ∈T
min
X∈S, Y ∈T
(3.1)
(3.2)
(3.3)
(3.4)
(3.5)
r( X − Y ) = 2r(N ) + r( AD∗ − BC ∗ ) − r(cid:20) A BA∗
C DA∗(cid:21) − r(cid:20) A BC ∗
C DC ∗(cid:21),
i±( X − Y ) = n + i±(M ) − r(A) − r(C),
i±( X − Y ) = r(N ) − i∓(M ).
In consequence, the following hold.
(a) There exist X ∈ S and Y ∈ T such that X − Y is nonsingular if and only if r(N ) =
r(A) + r(C).
(b) X − Y is nonsingular for all X ∈ S and Y ∈ T if and only if
2r(N ) + r( AD∗ − BC ∗ ) = r(cid:20) A BA∗
C DA∗(cid:21) + r(cid:20) A BC ∗
C(cid:21)[ B∗, D∗ ] =(cid:20) B
C DC ∗(cid:21) + n.
D(cid:21) [ A∗, C ∗ ].
(c) S ∩ T 6= ∅ if and only if R(cid:20) B
D(cid:21) ⊆ R(cid:20) A
C(cid:21), (cid:20) A
(d) There exist X ∈ S and Y ∈ T such that X ≻ Y (X ≺ Y ) if and only if i+(M ) = r(A) + r(C)
( i−(M ) = r(A) + r(C) ) .
(e) X ≻ Y (X ≺ Y ) holds for all X ∈ S and Y ∈ T if and only if i−(M ) = r(N ) − n
( i+(M ) = r(N ) − n ).
(f) There exist X ∈ S and Y ∈ T such that X < Y (X 4 Y ) holds if and only if i+(M ) = r(N )
( i−(M ) = r(N ) ).
10
(g) X < Y (X 4 Y ) holds for all X ∈ S and Y ∈ T if and only if i−(M ) = r(A) + r(C) − n
( i+(M ) = r(A) + r(C) − n ) .
Proof By Lemma 1.10(a), X − Y can be written as
X − Y = X0 − Y0 + FAU FA − FC V FC ,
(3.6)
where X0 = A†B + (A†B)∗ − A†BA†A and Y0 = C †D + (C †D)∗ − C †DC †C, and U, V ∈ Cn
arbitrary. Applying Lemma 1.14 to (3.6) gives
H are
max
X∈S, Y ∈T
r( X − Y ) = max
U, V
r( X0 − Y0 + FAU FA − FC V FC ) = r[ X0 − Y0, FA, FC ],
(3.7)
min
X∈S, Y ∈T
r( X − Y ) = min
U, V
r( X0 − Y0 + FAU FA − FC V FC )
= 2r[ X0 − Y0, FA, FC ] + r(cid:20) X0 − Y0 FA
0 (cid:21),
− r(cid:20) X0 − Y0 FA FC
FC
FC
0
i±( X0 − Y0 + FAU FA − FC V FC )
i±( X − Y ) = max
U, V
0 (cid:21) − r(cid:20) X0 − Y0 FA FC
0 (cid:21)
FA
0
(3.8)
(3.9)
(3.10)
max
X∈S, Y ∈T
min
X∈S, Y ∈T
i±( X − Y ) = min
U, V
i±( X0 − Y0 + FAU FA − FC V FC )
0
0
FA
FC
= i±
X0 − Y0 FA FC
0
0
,
= r[ X0 − Y0, FA, FC ] − i∓
X0 − Y0 FA FC
0
FA
FC
0
0
.
0
Applying (1.32) -- (1.34) to the block matrices in (3.7) -- (3.10) and simplifying by Lemma 1.7, (1.20)
and elementary block matrix operations, we obtain
X0 − Y0
0
0
In
In
A 0
0 C
0
0
0
In
In
In
−B A 0
−B 0 −A
D 0
D 0 C
C
A 0
0
In D∗
0 C ∗
In
0
0 C ∗
0
In
−B A
X0 − Y0
In
0
r[ X0 − Y0, FA, FC ] = r
= r
= r
0 (cid:21) = r
= r
= r
r(cid:20) X0 − Y0 FA
FC
= n + r(N ) − r(A) − r(C),
− r(A) − r(C)
− r(A) − r(C)
− r(A) − r(C)
− r(A) − r(C)
− r(A) − r(C)
0
In
0
In
0
0
0
0 BC ∗ − AD∗
= 2n + r( BC ∗ − AD∗ ) − r(A) − r(C),
− r(A) − r(C)
11
(3.11)
(3.12)
In
0
A 0
0 C
In
0
0 A∗
0
0
− 2r(A) − r(C)
− 2r(A) − r(C)
− 2r(A) − r(C)
In
0
0 A∗
0
0
0
0
0
0
In
0
0 −A BA∗
C −DA∗
0
0
FA
In
0
In
0
0
X0 − Y0
0
In
−B A 0
D 0 C
r(cid:20) X0 − Y0 FA FC
0 (cid:21) = r
= r
= r
= 2n + r(cid:20) A BA∗
0 (cid:21) = 2n + r(cid:20) A BC ∗
r(cid:20) X0 − Y0 FA FC
i±
0
= i±
X0 − Y0 FA FC
0
In
In
0
0
0
In
0
0
X0 − Y0
FA
FC
FC
0
0
0
(3.13)
(3.14)
C DA∗(cid:21) − 2r(A) − r(C),
C DC ∗(cid:21) − r(A) − 2r(C),
In
0
In
0 A∗
0
0
0
A 0
0 C
0
0
0 C ∗
0
0
0
0
In
0
0
0
In
In
In −B∗/2 D∗/2
0
0
−B/2 A 0
D/2
0 C
0
C ∗
0
0
A∗
0
0
0
− r(A) − r(C)
− r(A) − r(C)
= i±
= n + i±
= n + i±
0
In
0
0
0
= i±
0
0
C ∗
−AD∗/2
0
− r(A) − r(C)
− r(A) − r(C)
C ∗
−AD∗/2
0
0
0
−A∗
AB∗
0
0
0
In
0
0
0 −A
0
0
C −DA∗/2
−A∗
AB∗
−A
C −DA∗/2
C ∗
0
A∗
0
A AB∗
C
0
−CD∗
= n + i±(M ) − r(A) − r(C).
− r(A) − r(C)
(3.15)
Substituting (3.11) -- (3.15) into (3.7) -- (3.10) and simplifying leads to (3.2) -- (3.5). Results (a) -- (g)
follow from applying Lemma 1.6 to (3.2) -- (3.5).
(cid:3)
A direct consequence for AX = B and its perturbation equation ( A + δA )Y = ( B + δB ) is
given below.
Corollary 3.2 Assume that both AX = B and its perturbation equation ( A + δA )Y = ( B + δB )
have Hermitian solutions, and let
S = { X ∈ Cn
H AX = B }, T = { Y ∈ Cn
H ( A + δA )Y = ( B + δB ) }.
Also denote
AB∗
0
A∗
0
A
−( A + δA )( B + δB )∗
( A + δA )
( A + δA )∗
0
M =
Then, the following hold.
, N =(cid:20) A B
δA δB(cid:21).
12
(a) There exist X ∈ S and Y ∈ T such that X − Y is nonsingular if and only if
r(cid:20) A B
δA δB(cid:21) = r(A) + r( A + δA ).
(b) X − Y is nonsingular for all X ∈ S and Y ∈ T if and only if
2r(N ) + r[ A(δB)∗ − B(δA)∗ ] = r(cid:20) A
δB(cid:21) ⊆ R(cid:20) A
(c) S ∩ T 6= ∅ if and only if R(cid:20) B
δA (δB)A∗(cid:21) + r(cid:20) A
δA(cid:21) and A(δB)∗ = B(δA)∗.
BA∗
BA∗ + B(δA)∗
δA (δB)A∗ + (δB)(δA)∗(cid:21) + n.
(d) There exist X ∈ S and Y ∈ T such that X ≻ Y (X ≺ Y ) if and only if i+(M ) = r(A) +
r( A + δA ) ( i−(M ) = r(A) + r( A + δA ) ) .
(e) X ≻ Y (X ≺ Y ) holds for all X ∈ S and Y ∈ T if and only if i−(M ) = r(N ) − n
( i+(M ) = r(N ) − n ).
(f) There exist X ∈ S and Y ∈ T such that X < Y (X 4 Y ) if and only if i+(M ) = r(N )
( i−(M ) = r(N ) ).
(g) X < Y (X 4 Y ) holds for all X ∈ S and Y ∈ T if and only if
i−(M ) = r(A) + r( A + δA ) − n ( i+(M ) = r(A) + r( A + δA ) − n ) .
4 Equalities and inequalities for Hermitian solutions of AX A∗
=
B and its transformed equations
The transformation matrix equation in (1.8) may reasonably occur in the investigation of (1.2)
and its variations. For instance,
(a) setting T = A∗ in (1.8) yields A∗AXA∗A = A∗BA, which is the well-known normal equation
of (1.2) corresponding to trace[( B − AXA∗ )( B − AXA∗ )∗ ] = min;
(b) partitioning A and B in (1.2) as A = (cid:20) A1
A2(cid:21) and B =(cid:20) B1 B2
2 B3(cid:21), and setting T = [ Im1 , 0 ]
and T = [ 0, Im2 ] in (1.8), respectively, we obtain two small equations A1XA∗
A2XA∗
1 = B1 and
B∗
2 = B3;
(c) partitioning A and X in (1.2) as A = [ A1, A2 ] and X = (cid:20) X1 X2
and T = EA2, respectively, we obtain two small equations EA1 A2X2A∗
EA2A1X1A∗
1EA2 = EA2 BEA2, respectively;
2 X3(cid:21), and setting T = EA1
2EA1 = EA1 BEA1 and
X ∗
(d) decomposing A in (1.2) as a sum A = A1+A2 and setting T = EA1 and T = EA2 , respectively,
1EA2 =
2EA1 = EA1BEA1 and EA2 A1XA∗
we obtain two transformed equations EA1 A2XA∗
EA2BEA2 , respectively.
Since solutions of (1.2) and its transformed equations are not necessarily the same, it is necessary
to consider relations between the solutions of (1.2) and its transformed equations.
Theorem 4.1 Assume that (1.2) has a Hermitian solution, and let S and T be defined as in (1.9)
and (1.10). Then, the following hold.
(a) S ⊆ T always holds, namely, all Hermitian solutions of (1.2) are solutions of (1.8).
(b) S = T if and only if r(T A) = r(A), or equivalently, R(A∗T ∗) = R(A∗).
13
If X is a Hermitian solution of (1.2), then T AXA∗T ∗ = T BT ∗ holds as well. Hence, we
Proof
have (a). Note from (1.17) that the set inclusion S ⊇ T is equivalent to the following max-min
rank problem
Then, applying (1.65) and simplifying by (1.29), we obtain
max
Y ∈T
min
X∈S
r( X − Y ) = 0.
min
X∈S
r( X − Y ) = min
V
r(cid:2) A†B(A∗)† + FAV + V ∗FA − Y (cid:3)
= r(cid:20) A†B(A†)∗ − Y FA
0 (cid:21) − 2r(FA)
FA
= r[ A†B(A†)∗ − A†AY A†A ] = r( B − AY A∗ ).
From Lemma 1.11, the general Hermitian solution of (1.8) can be written as
Y = (T A)†T BT ∗(A∗T ∗)† − FT AU − U ∗FT A,
where U is arbitrary. Applying (1.60), we obtain
r( B − AY A∗ )
max
Y ∈T
= max
U
r[ B − A(T A)†T BT ∗(A∗T ∗)†A∗ + AFT AU A∗ + AU ∗FT AA∗ ]
= min(cid:26)r[ B − A(T A)†T BT ∗(A∗T ∗)†A∗, A ], r(cid:20) B − A(T A)†T BT ∗(A∗T ∗)†A∗ AFT A
= min(cid:26)r(A), r(cid:20) B − A(T A)†T BT ∗(A∗T ∗)†A∗ AFT A
(cid:21)(cid:27).
FT AA∗
FT AA∗
0
0
Applying (1.35) and simplifying by (1.20) and (1.23), we obtain
(cid:21)
0
A∗
0
FT AA∗
B − A(T A)†T BT ∗(A∗T ∗)†A∗ A
i±(cid:20) B − A(T A)†T BT ∗(A∗T ∗)†A∗ AFT A
= i±
= i±
= i±
0 A 0
A∗
0
0
−T B + T BT ∗(A∗T ∗)†A∗
0
A∗
0
0
0
0
− r(T A) = r(A) − r(T A),
0 A∗T ∗
T A
0
0
− r(T A)
0
0
B − A(T A)†T BT ∗(A∗T ∗)†A∗ A −BT ∗ + A(T A)†T BT ∗
− r(T A)
so that
(4.1)
(4.2)
(4.3)
(cid:21)(cid:27)
(4.4)
(4.5)
(4.6)
r(cid:20) B − A(T A)†T BT ∗(A∗T ∗)†A∗ AFT A
FT AA∗
0
(cid:21) = 2r(A) − 2r(T A).
Substituting (4.6) into (4.4), and then (4.4) into (4.2) yields
max
Y ∈T
min
X∈S1
r( X − Y ) = min{r(A), 2r(A) − 2r(T A)}.
(4.7)
Finally, substituting (4.7) into (4.1) leads to the result in (b).
(cid:3)
Theorem 4.2 Assume that (1.2) has a Hermitian solution, and let S and T be as given in (1.9)
and (1.10). Then, the following hold.
(a) There exist X ∈ S and Y ∈ T such that X ≻ Y (X ≺ Y ) if and only if T A = 0. So that if
(1.8) is not null equation, there don't exist X ∈ S and Y ∈ T such that X ≻ Y (X ≺ Y ).
14
(b) There always exist X ∈ S and Y ∈ T such that X < Y (X 4 Y ).
Proof From (1.18) and (1.19), there exist X ∈ S and Y ∈ T such that X ≻ Y (X ≺ Y ) if and
only if
max
X∈S, Y ∈T
i+( X − Y ) = n (cid:18) max
X∈S, Y ∈T
i−( X − Y ) = n(cid:19) ;
there exist X ∈ S and Y ∈ T such that X < Y (X 4 Y ) if and only if
min
X∈S, Y ∈T
i−( X − Y ) = 0 (cid:18) min
X∈S1, Y ∈T
i+( X − Y ) = 0(cid:19) .
From (1.39) and (4.3), the difference of X − Y can be written as
(4.8)
(4.9)
X − Y = A†B(A∗)† − (T A)†T BT ∗(A∗T ∗)† + FAV + V ∗FA + FT AU + U ∗FT A
= A†B(A∗)† − (T A)†T BT ∗(A∗T ∗)† + [ FA, FT A ](cid:20) V
FT A(cid:21).
U(cid:21) + [ V ∗, U ∗ ](cid:20) FA
(4.10)
Applying (1.66) and simplifying by (1.28) and (4.5), we obtain
max
X∈S, Y ∈T
i±( X − Y ) = i±
A†B(A∗)† − (T A)†T BT ∗(A∗T ∗)† FA FT A
FA
FT A
0
0
= i±(cid:20) B − A(T A)†T BT ∗(A∗T ∗)†A∗ AFT A
FAA∗
= r(A) − r(T A) + n − r(A) = n − r(T A).
0
0
0
(cid:21) + r(FA)
Substituting (4.11) into (4.8) leads to the result in (a).
Applying (1.67) and simplifying by (1.25), (1.28) and (4.5), we obtain
min
X∈S, Y ∈T
i±( X − Y ) = i±
A†B(A∗)† − (T A)†T BT ∗(A∗T ∗)† FA FT A
FA
FT A
0
0
− r[ FA, FT A ]
(4.11)
(4.12)
= i±(cid:20) B − A(T A)†T BT ∗(A∗T ∗)†A∗ AFT A
FAA∗
0
= r(A) − r(T A) − r(A) + r(T A) = 0.
0
0
(cid:21) − r(AFT A)
Substituting (4.12) into (4.9) leads to the result in (b).
(cid:3)
5 Average equalities for Hermitian solutions of AX A∗
= B
and its two transformed equations
In this section, we study the relations between the two sets in (1.11) and (1.12).
Theorem 5.1 Assume that (1.2) has a Hermitian solution, and let S and T be defined as in (1.11)
and (1.12), in which T1 ∈ Cp1×n and T2 ∈ Cp2×n. Then,
(a) S ⊆ T always holds.
(b) S = T if and only if
r(cid:20) T1A
T2A(cid:21) = r(T1A) + r(T2A) − r(A).
(5.1)
(c) In particular, if r(T1A) = r(T2A) = r(A), then S = T .
15
Proof If X is a Hermitian solution of (1.2), then T1AXA∗T ∗
hold as well, and
1 = T1BT ∗
1 and T2AXA∗T ∗
2 = T2BT ∗
2
T1BT ∗
1
0
A∗T ∗
1
0
−T2BT ∗
2
A∗T ∗
2
r
T1A
T2A
0
= 2r(cid:20) T1A
T2A(cid:21).
(5.2)
holds by Lemma 1.12(c). This fact means that any Hermitian solution X of (1.2) can be written
as X = ( X + X )/2, the average of the two Hermitian solutions of the two equations in (1.12).
Hence, we have (a).
Note from (1.17) that the set inclusion S ⊇ T is equivalent to
max
Y ∈T
min
X∈S
r( X − Y ) = 0.
(5.3)
Applying (1.65), we first obtain
min
X∈S
r( X − Y ) = min
V
r(cid:2) A†B(A∗)† + FAV + V ∗FA − Y (cid:3) = r( B − AY A∗ ).
(5.4)
From Lemma 1.11, the general expression of the matrices of the two equations in (1.12) can be
written as
Y = (T1A)†T1BT ∗
− FT1AU1 − U ∗
1 (A∗T ∗
1 FT1A − FT2AU2 − U ∗
1 )†/2 + (T2A)†T2BT ∗
2 FT2A,
2 (A∗T ∗
2 )†/2
where U1 and U2 are arbitrary. Then
B − AY A∗ = B − A(T1A)†T1BT ∗
− AFT1AU1A∗ − AU ∗
1 (A∗T ∗
1 )†A∗/2 + A(T2A)†T2BT ∗
1 FT1AA∗ − AFT2 AU2A∗ − AU ∗
2 (A∗T ∗
2 FT2AA∗
2 )†A∗/2
= G − [ AFT1A, AFT2A ](cid:20) U1
U2 (cid:21) A∗ − A[ U ∗
1 , U ∗
2 ](cid:20) FT1AA∗
FT2AA∗ (cid:21),
(5.5)
(5.6)
where G = B − A(T1A)†T1BT ∗
1 (A∗T ∗
1 )†A∗/2 − A(T2A)†T2BT ∗
2 (A∗T ∗
2 )†A∗/2. Applying (1.60) gives
max
Y ∈T
r( B − AY A∗ ) = max
U1, U2
1 , U ∗
2 ](cid:20) FT1AA∗
FT2AA∗(cid:21)(cid:19)
(5.7)
r(cid:18)G − [ AFT1A, AFT2A ](cid:20) U1
r(A), r
FT1AA∗
FT2AA∗
0
0
G
U2(cid:21) A∗ − A[ U ∗
0
0
,
AFT1 A AFT2A
= min
16
where applying (1.35) and simplifying by elementary matrix operations, we obtain
G
AFT1A AFT2 A
FT1AA∗
FT2AA∗
0
0
0
0
r
2B − A(T1A)†T1BT ∗
1 (A∗T ∗
1 )†A∗ − A(T2A)†T2BT ∗
2 (A∗T ∗
− 2r(T1A) − 2r(T2A)
A∗
A∗
0
0
0
A∗
A∗
= r
= r
= r
= r
= r
= r
= 2r(cid:20) T1A
0
0
0
0
A∗T ∗
2
0
0
0
0
A∗T ∗
2
0
0
2 )†A∗ A
0
0
0
A
0 A∗T ∗
1
0
T1A 0
0
T2A
0
0
0
0
0
0
A
0
0
0 −T1A
T2A
0
0
A∗T ∗
1
0
0
0
0
A∗T ∗
2
0
0
−2T1B + T1BT ∗
1 (A∗T ∗
1 )†A∗ + T1A(T2A)†T2BT ∗
2 (A∗T ∗
2 )†A∗
− 2r(T1A) − 2r(T2A)
0
0
A∗
0
0 −T1A 2T1BT ∗
0
T2A
+ r(A) − 2r(T1A) − 2r(T2A)
0
0
−A∗T ∗
1
0
1 − T1BT ∗
1 − T1A(T2A)†T2BT ∗
2 (A∗T ∗
2 )†A∗T ∗
1
A∗T ∗
2
0
0
+ 2r(A) − 2r(T1A) − 2r(T2A)
+ 2r(A) − 2r(T1A) − 2r(T2A)
−A∗T ∗
1
0
A∗T ∗
2
−T1A T1BT ∗
T2A
1 − T1A(T2A)†T2BT ∗
2 (A∗T ∗
2 )†A∗T ∗
1
−A∗T ∗
1
−T1A T1BT ∗
1 −T1A(T2A)†T2BT ∗
2
T2A
0
0
0
−A∗T ∗
1
−T1A T1BT ∗
1
T2A
0
A∗T ∗
2
0
−T2BT ∗
2
+ 2r(A) − 2r(T1A) − 2r(T2A)
T2A(cid:21) + 2r(A) − 2r(T1A) − 2r(T2A) (by (5.2)).
Hence,
max
Y ∈T
r( B − AY A∗ ) = min(cid:26)r(A), 2r(cid:20) T1A
T2A(cid:21)+ 2r(A) − 2r(T1A) − 2r(T2A)(cid:27).
Setting the both sides to zero leads to the equality in (5.1). Under r(T1A) = r(T2A) = r(A), both
sides of (5.1) reduces to 2r(A). Hence, (c) follows.
(cid:3)
We next give some consequences of Theorem 5.1. Partitioning A and B in (1.2) as
A2(cid:21) X[ A∗
(cid:20) A1
1, A∗
3 B2(cid:21),
2 ] =(cid:20) B1 B3
B∗
where A1 ∈ Cm1×n A2 ∈ Cm2×n, B1 ∈ Cm1
T1 = [ Im1 , 0 ] and T = [ 0, Im2 ] in (1.8), respectively, we obtain two small equations
H , B3 ∈ Cm1×m2, m1 + m2 = m, and setting
H , B2 ∈ Cm2
A1XA∗
1 = B1 and A2XA∗
2 = B2.
Let
T = { (X1 + X2)/2 A1X1A∗
1 = B1, A2X2A∗
2 = B2, X1, X2 ∈ Cn
H } .
(5.10)
Applying Theorem 5.1 to (1.11) and (5.10), we obtain the following result.
17
(5.8)
(5.9)
Corollary 5.2 Assume that (1.2) has a solution, and let S be as given in (1.11) and T as in
(5.10). Then, S = T if and only if R(A∗
1) = R(A∗
2).
Decomposing A in (1.2) as A = A1 + A2 and setting T = EA1 and T = EA2 respectively yields
the following two transformed equations
EA1 A2XA∗
2EA1 = EA1 BEA1 , EA2 A1XA∗
1EA2 = EA2BEA2 .
Also let
T = {( X1 + X2 )/2 EA2A1X1A∗
1EA2 = EA2BEA2 , EA1A2X2A∗
2EA1 = EA1BEA1 , X1, X2 ∈ Cn
H} .
(5.11)
Corollary 5.3 Assume that (1.2) has a solution, and let S and T be as given in (1.11) and (5.11).
Then, the following hold.
(a) S = T if and only if
r(cid:20) A1
0 A2
0 A2 A1(cid:21) = 2r[ A1, A2 ] − r(A).
(b) Under R(A1) ∩ R(A2) = {0}, S = T if and only if R(A∗
1) = R(A∗
2).
Proof From Theorem 5.1(b), S = T if and only if
EA1A2(cid:21) = r(EA2 A1) + r(EA1 A2) − r(A),
r(cid:20) EA2A1
(5.12)
(5.13)
which is equivalent to (5.12) by (1.24).
(cid:3)
In addition to the average equalities of Hermitian solutions of (1.2) and its two transformed
equations, it would be of interest to consider weighted average equalities for the Hermitian solutions
of (1.2) and its k transformed equations
TiAXiA∗T ∗
i = TiBT ∗
i ,
i = 1, . . . , k,
(5.14)
where Ti ∈ Cpi×n. As usual, define
TiAXiA∗T ∗
i = TiBT ∗
i , Xi = X ∗
i ,
λi = 1, λi > 0, i = 1, . . . , k).
(5.15)
k
Xi=1
An open problem is to establish necessary and sufficient conditions for S = T to hold.
T =( k
Xi=1
λiXi (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
6 Equalities and inequalities between least-squares and least-
rank Hermitian solutions of AX A∗
= B
It is well known that the normal equation corresponding to the norm minimization problem in
(1.13) is given by
A∗AXA∗A = A∗BA,
(6.1)
see [1], while the normal equation corresponding to the rank minimization problem in (1.14) is
given by
ET1 Y ET1 = −ET1 T M †T ∗ET1 ,
(6.2)
A∗
where M =(cid:20) B A
0(cid:21), T = [ 0, In ] and T1 = T FM ; see [10]. Both (6.1) and (6.2) are transformed
equations of AXA∗ = B. Relations between solutions of the two equations were considered in [19].
In this section, we establish a group of formulas for calculating the extremal ranks and inertias of
X − Y for their Hermitian solutions, and use the formulas to solve Problem 1.5.
18
Lemma 6.1 Let A ∈ Cm×n and B ∈ Cm
H be given. Then the following hold.
(a) [1] The solution of (1.13) is
min
X∈Cn
H
arg min
X∈Cn
H
k B − AXA∗ kF = k B − AA†BAA† kF ,
k B − AXA∗ kF = A†B(A†)∗ + FAU + U ∗FA,
where U ∈ Cn×n is arbitrary.
(b) [10] The solution of (1.14) is
r( B − AY A∗ ) = 2r[ A, B ] − r(cid:20) B A
0(cid:21),
A∗
r( B − AY A∗ ) = −T M †T ∗ + T1V + V ∗T ∗
1 ,
min
Y ∈Cn
H
arg min
Y ∈Cn
H
where V ∈ C(m+n)×n is arbitrary.
Theorem 6.2 Let S and T be as given in (1.13) and (1.14), and define
M =(cid:20) B A
A∗
0(cid:21) , N =
B
A∗B
A∗
Then,
BA A
0
0
0
0
.
max
X∈S,Y ∈T
min
X∈S,Y ∈T
r( X − Y ) = min{ n, 2n + r(N ) − 2r(A) − r(M )},
r( X − Y ) = r(N ) + r(M ) − 2r[ A, B ] − 2r(A),
max
X∈S,Y ∈T
min
X∈S,Y ∈T
i±( X − Y ) = i∓(N ) + n − r(A) − i∓(M ),
i±( X − Y ) = i∓(N ) + i±(M ) − r[ A, B ] − r(A)
hold. Under the condition B < 0,
max
X∈S,Y ∈T
min
X∈S,Y ∈T
r( X − Y ) = min{ n, 2n + r[ A, BA ] − 3r(A)},
r( X − Y ) = r[ A, BA ] − r(A),
max
X∈S,Y ∈T
max
X∈S,Y ∈T
min
X∈S,Y ∈T
min
X∈S,Y ∈T
i+( X − Y ) = r[ A, BA ] + n − 2r(A),
i−( X − Y ) = n − r(A),
i+( X − Y ) = r[ A, BA ] − r(A),
i−( X − Y ) = 0.
(6.3)
(6.4)
(6.5)
(6.6)
(6.7)
(6.8)
(6.9)
(6.10)
(6.11)
(6.12)
(6.13)
(6.14)
(6.15)
(6.16)
In consequence, the following hold.
(a) There exist X ∈ S and Y ∈ T such that X − Y is nonsingular if and only if r(N ) >
2r(A) + r(M ) − n.
(b) X − Y is nonsingular for all X ∈ S and Y ∈ T if and only if r(N ) + r(M ) = 2r[ A, B ] +
2r(A) + n.
(c) There exist X ∈ S and Y ∈ T such that X = Y if and only if r(N ) + r(M ) = 2r[ A, B ] +
2r(A).
(d) There exist X ∈ S and Y ∈ T such that X ≻ Y if and only if i−(N ) = i−(M ) + r(A).
19
(e) X ≻ Y holds for all X ∈ S and Y ∈ T if and only if i−(N ) = r(A) + r[ A, B ] − i+(M ) + n.
(f) There exist X ∈ S and Y ∈ T such that X < Y if and only if i+(N ) = r(A) + r[ A, B ] −
i−(M ).
(g) X < Y holds for all X ∈ S and Y ∈ T if and only if i+(N ) = i+(M ) + r(A) − n.
(h) There exist X ∈ S and Y ∈ T such that X ≺ Y if and only if i+(N ) = i+(M ) + r(A).
(i) X ≺ Y holds for all X ∈ S and Y ∈ T if and only if i+(N ) = r(A) + r[ A, B ] − i−(M ) + n.
(j) There exist X ∈ S and Y ∈ T such that X 4 Y if and only if i−(N ) = r(A) + r[ A, B ] −
i+(M ).
(k) X 4 Y holds for all X ∈ S and Y ∈ T if and only if i−(N ) = i−(M ) + r(A) − n.
Under the condition B < 0, the following hold.
(l) There exist X ∈ S and Y ∈ T such that X − Y is nonsingular if and only if r[ A, BA ] >
3r(A) − n.
(m) X − Y is nonsingular for all X ∈ S and Y ∈ T if and only if r[ A, BA ] = r(A) + n.
(n) There exist X ∈ S and Y ∈ T such that X = Y if and only if R(BA) ⊆ R(A).
(o) There exist X ∈ S and Y ∈ T such that X ≻ Y if and only if r[ A, BA ] = 2r(A).
(p) X ≻ Y holds for all X ∈ S and Y ∈ T if and only if r[ A, BA ] = r(A) + n.
(q) There always exist X ∈ S and Y ∈ T such that X < Y.
(r) X < Y holds for all X ∈ S and Y ∈ T if and only if r(A) = n.
(s) There exist X ∈ S and Y ∈ T such that X ≺ Y if and only if A = 0.
(t) There exist X ∈ S and Y ∈ T such that X 4 Y if and only if R(BA) ⊆ R(A).
(u) X 4 Y holds for all X ∈ S and Y ∈ T if and only if r[ A, BA ] = 2r(A) − n.
Proof Applying (1.42) -- (1.45) to (6.1) and (6.2) gives
A∗BA
0
A∗A
n, r
0
A∗A
ET1 T M †T ∗ET1 ET1
ET1
0
+ 2n − 2r(A) − 2r(ET1 )
,
(6.17)
− 2r[ A∗A, ET1 ],
(6.18)
max
X∈S,Y ∈T
min
X∈S,Y ∈T
max
X∈S,Y ∈T
min
X∈S,Y ∈T
r( X − Y ) =
r( X − Y ) = r
i±( X − Y ) = i±
i±( X − Y ) = i±
0
ET1
0
0
0
0
A∗BA
A∗A
A∗BA
0
A∗A
ET1 T M †T ∗ET1 ET1
A∗A
A∗BA
A∗A
ET1 T M †T ∗ET1 ET1
0
0
0
r(ET1 ) = n − r(T1) = n − r(T FM ) = n − r
A∗A
ET1 T M †T ∗ET1 ET1
= r(M ) − r[ A, B ],
A∗A
ET1
ET1
+ n − r(A) − r(ET1 ),
(6.19)
− r[ A∗A, ET1 ].
(6.20)
0
In
B A
A∗
0
+ r(M )
(6.21)
Applying Lemma 1.8 and simplifying by elementary operations of matrices that
r[ A∗A, ET1 ] = r(A∗AT1) + r(ET1 ) = r(AT FM ) + r(M ) − r[ A, B ]
= r(cid:20) A∗AT
M (cid:21) − r[ A, B ] = r
0 A
B A
A∗
0
20
− r[ A, B ] = r(A),
(6.22)
and by Lemma 1.8 and elementary operations of matrices that
− r(T FM )
(by (1.35))
0
0
0
0 −A∗AT EM
In
0
0
− r(cid:20) M
(cid:21) − r[ A, B ] + r(M )
0
(by (1.28))
T (cid:21) + r(M )
(by (1.20))
(by (1.22))
0
0
A∗BA
A∗BA
T M †T ∗
0
ET1
0
A∗A
0
0
0
T FM
0
A∗A
In
EM T
−EM T ∗A∗A
A∗A
In
0
0
0
A∗A
ET1 T M †T ∗ET1 ET1
0
0
A∗BA + A∗AT M †T ∗A∗A 0
0
In
0
i±
= i±
= i±
= i±(cid:20) A∗BA + A∗AT M †T ∗A∗A A∗AT EM
= i±(cid:20) A∗BA A∗AT
T ∗A∗A −M (cid:21) − r[ A, B ] + i±(M )
= i±
= i±
= i∓
0
0
A∗A −A∗
−A∗B
0
A∗A
−B −A
− r[ A, B ] + i±(M )
BA A
0
= i∓(N ) − r[ A, B ] + i±(M ).
0
B
A∗B
A∗
EM T ∗A∗A
0
0
0
−BA
−B
−A∗
A∗BA
0
0
− r[ A, B ] + i±(M )
0
−A
− r[ A, B ] + i±(M )
(by (1.20))
(by (1.20) and (1.21))
(6.23)
(6.24)
Substituting (6.21) -- (6.24) into (6.17) -- (6.20) yields (6.7) -- (6.10).
Applying (1.30) to (6.7) -- (6.10) yields (6.11) -- (6.17). Applying Lemma 1.6 to (6.7) -- (6.10) leads
to (a) -- (k). Under the condition B < 0, applying Lemma 1.6 to (6.11) -- (6.17) leads to (l) -- (u).
(cid:3)
The positive semi-definite least-squares Hermitian solution of (1.2) is defined to an X that
satisfies
the positive semi-definite least-rank Hermitian solution of (1.2) is defined to be a Y that satisfies
k B − AXA∗ kF = min s.t. X < 0;
(6.25)
The normal equations corresponding to (6.25) and (6.26) are given by
r( B − AY A∗ ) = min s.t. Y < 0.
A∗AXA∗A = A∗BA, X < 0,
ET1 Y ET1 = −ET1T M †T ∗ET1 , Y < 0.
(6.26)
(6.27)
(6.28)
Under the condition B < 0, (6.27) and (6.28) have solutions. In this case, it would be of interest
to characterize the following four inequalities
X ≻ Y < 0, X < Y < 0, Y ≻ X < 0, Y < X < 0.
(6.29)
As demonstrated in the previous sections, matrix ranks and inertias and their optimizations
problems are one of the most productive research field in matrix theory. The present author and
his collaborators paid great attention in recent years for the development of the theory on matrix
ranks and inertias, and established thousands of expansion formulas for calculating ranks and
inertias of matrices; see, e.g., [3, 4, 5, 6, 8, 9, 10, 11, 12, 14, 15, 16, 17, 18, 19, 20, 21, 22] for more
details. In addition, many follow-up papers by other people were also published on extensions and
applications of matrix rank and inertia formulas in different situations.
21
References
[1] Ben-Israel, A., Greville, T.N.E.: Generalized Inverses: Theory and Applications. Second ed., Springer,
New York, 2003
[2] Khatri, C.G., Mitra, S.K.: Hermitian and nonnegative definite solutions of linear matrix equations.
SIAM J. Appl. Math. 31, 579 -- 585 (1976)
[3] Liu, Y., Tian, Y.: Extremal ranks of submatrices in an Hermitian solution to the matrix equation
AXA∗ = B with applications. J. Appl. Math. Comput. 32, 289 -- 301 (2010)
[4] Liu, Y., Tian, Y.: A simultaneous decomposition of a matrix triplet with applications. Numer. Linear
Algebra Appl. 18, 69 -- 85 (2011)
[5] Liu, Y., Tian, Y.: Max-min problems on the ranks and inertias of the matrix expressions A − BX C ±
(BX C)∗ with applications. J. Optim. Theory Appl. 148, 593 -- 622 (2011)
[6] Liu, Y., Tian, Y., Takane, Y.: Ranks of Hermitian and skew-Hermitian solutions to the matrix
equation AXA∗ = B. Linear Algebra Appl. 431, 2359 -- 2372 (2009)
[7] Marsaglia, G., Styan, G.P.H.: Equalities and inequalities for ranks of matrices. Linear Multilinear
Algebra 2, 269 -- 292 (1974)
[8] Tian, Y.: On additive decompositions of solutions of the matrix equation AXB = C. Calcolo 47,
193 -- 209 (2010)
[9] Tian, Y.: Completing block Hermitian matrices with maximal and minimal ranks and inertias. Elec-
tron. J Linear Algebra 21, 124 -- 141 (2010)
[10] Tian, Y.: Equalities and inequalities for inertias of Hermitian matrices with applications. Linear
Algebra Appl. 433, 263 -- 296 (2010)
[11] Tian, Y.: Maximization and minimization of the rank and inertia of the Hermitian matrix expression
A − BX − (BX)∗ with applications. Linear Algebra Appl. 434, 2109 -- 2139 (2011)
[12] Tian, Y.: Expansion formulas for the inertias of Hermitian matrix polynomials and matrix pencils of
orthogonal projectors. J. Math. Anal. Appl. 376, 162 -- 186 (2011)
[13] Tian, Y.: Extremal ranks of a quadratic matrix expression with applications. Linear Multilinear
Algebra 59, 627 -- 644 (2011)
[14] Tian, Y.: Formulas for calculating the extremum ranks and inertias of a four-term quadratic matrix-
valued function and their applications. Linear Algebra Appl. 437, 835 -- 859 (2012)
[15] Tian, Y.: Solutions to 18 constrained optimization problems on the rank and inertia of the linear
matrix function A + BXB ∗. Math. Comput. Modelling 55, 955 -- 968 (2012)
[16] Tian, Y.: On an equality and four inequalities for generalized inverses of Hermitian matrices. Electron.
J. Linear Algebra 23, 11 -- 42 (2012)
[17] Tian, Y.: On additive decomposition of the Hermitian solution of the matrix equation AXA∗ = B.
Mediterr. J. Math. 9, 47 -- 60 (2012)
[18] Tian, Y.: Solving optimizations problems on ranks and inertias of some constrained nonlinear matrix
functions via an algebraic linearization method. Nonlinear Analysis A 75, 717 -- 734 (2012)
[19] Tian, Y.: On relations between least-squares and least-rank Hermitian solutions of the matrix equation
AXA∗ = B and their relations. Numer. Linear Algebra Appl., doi:10.1002/nla.829
[20] Tian, Y., Li, Y.: Distributions of eigenvalues and inertias of some block Hermitian matrices consisting
of orthogonal projectors. Linear Multilinear Algebra 60, 1027 -- 1069 (2012)
[21] Tian, Y., Liu, Y.: Extremal ranks of some symmetric matrix expressions with applications. SIAM J.
Matrix Anal. Appl. 28, 890 -- 905 (2006)
[22] Tian, Y., von Rosen, D.: Solving the matrix inequality AXB + (AXB)∗ > C. Math. Inequal. Appl.
15, 537 -- 548 (2012)
Yongge Tian
China Economics and Management Academy
Central University of Finance and Economics
Beijing 100081, China
e-mail: [email protected]
22
|
1508.07496 | 3 | 1508 | 2016-08-20T18:48:02 | On the utility of Robinson-Amitsur ultrafilters. II | [
"math.RA",
"math.LO"
] | We extend the result of arXiv:0911.5414 about embedding of ideal-determined algebraic systems into ultraproducts, to arbitrary algebraic systems, and to ultraproducts over $\kappa$-complete ultrafilters. We also discuss the scope of applicability of this result, and correct a mistake from the previous paper concerning homomorphisms from ultraproducts. | math.RA | math |
ON THE UTILITY OF ROBINSON -- AMITSUR ULTRAFILTERS. II
PASHA ZUSMANOVICH
ABSTRACT. We extend the result of the previous paper under the same title about embedding of ideal-
determined algebraic systems into ultraproducts, to arbitrary algebraic systems, and to ultraproducts over
k -complete ultrafilters. We also discuss the scope of applicability of this result, and correct a mistake from
the previous paper concerning homomorphisms from ultraproducts.
0. Introduction. In [Z], an old and simple trick, used by A. Robinson and S. Amitsur (see [A1, Proof
of Theorem 15] and [A2, Theorem 3]) to establish, in the context of ring theory, an embedding of
certain rings in ultraproducts, was generalized to algebraic systems with ideal-determined congruences.
Here we push it to the full generality, for arbitrary algebraic systems without any restrictions on their
congruences.
1. Recollection on congruences, ultrafilters, and ultraproducts. We refer to [C.B] and [CK] for the
rudiments of universal algebra and model theory we need.
defined on them, of, generally, various arity. The signature W
Let us recall some basic notions and fix notation. We consider the most general algebraic systems,
i.e. sets with a number of operations W
is
arbitrary, but fixed (so, in what follows all algebraic systems are supposed to be of signature W
). The set
of all congruences on a given algebraic system A forms a partially ordered set (actually, a lattice), and
the minimal element in this set is the trivial congruence, coinciding with the diagonal {(a, a) a ∈ A} in
A × A. The intersection of all congruences containing a given relation r , i.e. a set of pairs of elements
from A ×A, is called a congruence generated by r and is denoted by Con(r ). In the case of one-element
relation, i.e. a single pair (a, b) ∈ A ×A with a 6= b, we shorten this notation to Con(a, b) and speak about
principal congruences.
Given a cardinal k > 2, let us call a set S of sets k -complete, if the intersection of any nonempty set
of fewer than k elements of S belongs to S . If a set S of subsets of a set I satisfies a weaker condition
-- that the intersection of any nonempty set of fewer than k elements of S contains an element of S
-- then the set of subsets of I which are oversets of all such intersections is a k -complete filter on I
containing S (this is an obvious generalization of the standard and frequently employed fact that any
set of subsets satisfying the finite intersection property can be extended to a filter).
An algebraic system A is called k -subdirectly irreducible, if either of the following two equivalent
conditions is satisfied:
• The set of nontrivial congruences of A is k -complete.
• If A embeds in the direct product of < k algebraic systems (cid:213)
one of Bi's.
i∈I Bi, I < k , then A embeds in
Obviously, the condition of w -subdirect irreducibility, also called finite subdirect irreducibility, is equiv-
alent to n-subdirect irreducibility for any finite n > 2. Note that w -complete filters (ultrafilters) are just
the usual filters (ultrafilters).
Given a filter (respectively, ultrafilter) F on a set I, the quotient of the direct product of algebraic
systems (cid:213)
i∈I Ai by the congruence
q F = {(a, b) ∈ ((cid:213)
Ai) × ((cid:213)
i∈I
i∈I
Ai) {i ∈ I a(i) = b(i)} ∈ F }
Date: last revised August 14, 2016.
J. Algebra, to appear; arXiv:1508.07496.
1
ON THE UTILITY OF ROBINSON -- AMITSUR ULTRAFILTERS. II
2
is called filtered product (respectively, ultraproduct) of the corresponding algebraic systems, and is
denoted by (cid:213) F Ai.
As any k -complete ultrafilter on a set of cardinality < k
is principal, the condition of k -subdirect
irreducibility of an algebraic system A may be trivially reformulated as follows:
• If A embeds in the direct product of < k algebraic systems (cid:213)
the ultraproduct (cid:213) U Bi for some ultrafilter U on I.
i∈I Bi, I < k , then A embeds in
What is, perhaps, surprising, is that under a suitable set-theoretic assumption on the cardinal k , the latter
condition is equivalent to the same condition with an arbitrary index set I, without a restriction on its
cardinality. This equivalence is what constitutes the "Robinson -- Amitsur theorem" (Theorem 1 below).
2. Embeddings in direct products. The next proof follows the proof of Theorem 1.1 from [Z], with
ideals being replaced by congruences, and w being replaced by an arbitrary cardinal k . On this level of
generality, the proof is even simpler than an already simple proof from [Z].
Theorem 1 (ROBINSON -- AMITSUR). Let k be a cardinal > 2 and such that any k -complete filter can
be extended to a k -complete ultrafilter. Then for any algebraic system A the following are equivalent:
(i) A is k -subdirectly irreducible.
(ii) For any embedding f of A in the direct product (cid:213)
i∈I Bi of a set of algebraic systems {Bi}i∈I,
there is a k -complete ultrafilter U on the set I such that the composition of f with the canonical
homomorphism (cid:213)
i∈I Bi → (cid:213) U Bi, is an embedding.
Proof. (ii) ⇒ (i): take I < k and observe, as above, that then the ultrafilter U is principal.
(i) ⇒ (ii). For any two elements a, b ∈ A, define Sa,b = {i ∈ I a(i) 6= b(i)}, and let S = {Sa,b a, b ∈
A, a 6= b}. Let us verify that the intersection of < k elements of S contains an element of S .
Let a, b be two elements of A such that a 6= b. If for some i0 ∈ I we have a(i0) = b(i0), then (a, b)
belongs to the congruence of (cid:213)
i∈I Bi which is the kernel of the canonical projection Pri0 to Bi0, and by the
Third Isomorphism Theorem, belongs to the congruence Ker(Pri0) ∩ (A × A) of A, whence Con(a, b) ⊆
Ker(Pri0). The latter means that for any (c, d) ∈ Con(a, b), we have Sc,d ⊆ Sa,b.
Due to k -subdirect irreducibility of A, for any set of pairs of different elements {ai, bi} of A of
cardinality < k , the intersection Ti<k Con(ai, bi) is a nontrivial congruence. Pick an element (c, d),
c 6= d, from this intersection. Then by just proved we have Sc,d ⊆ Ti<k Sai,bi, as required.
Thus S can be extended to a k -complete filter, and then to a k -complete ultrafilter U on I. Factoring
i∈I Bi by the congruence q U , we get, again by the Third Isomorphism Theorem,
the embedding of A in (cid:213)
an embedding of the quotient A/(q U ∩ (A × A)) in the ultraproduct (cid:213) U Bi. But if (a, b) ∈ q U ∩ (A × A),
then, by definition, {i ∈ I a(i) = b(i)} ∈ U , and, since U is an ultrafilter, {i ∈ I a(i) 6= b(i)} /∈ U ,
and hence {i ∈ I a(i) 6= b(i)} /∈ S , what, in its turn, implies a = b. This shows that the congruence
q U ∩ (A × A) is trivial, and hence A embeds in (cid:213) U Bi.
(cid:3)
Coupling the case k = w of this theorem with the Birkhoff theorem about varieties of algebraic
systems, and some rudimentary model theory, we get:
Corollary (CRITERION FOR ABSENCE OF NONTRIVIAL IDENTITIES). Let A be a variety of algebraic
systems such that any free system in A is finitely subdirectly irreducible. Then for an algebraic system
A ∈ A the following three conditions are equivalent:
(i) A does not satisfy a nontrivial identity within A.
(ii) Any free system in A embeds in an ultrapower of A.
(iii) Any free system in A embeds in a filtered power of A.
Proof. (i) ⇒ (ii) is established exactly as in [Z, Corollaries 1.2 and 1.3]: by the Birkhoff theorem, a free
system in A embeds in the direct power of A. Apply Theorem 1, with k = w
.
(ii) ⇒ (iii): obvious.
(iii) ⇒ (i): follows from the fact that any nontrivial identity is a first-order Horn sentence, and Horn
(cid:3)
sentences are preserved under filtered products (see, e.g., [CK, Proposition 6.2.2]).
ON THE UTILITY OF ROBINSON -- AMITSUR ULTRAFILTERS. II
3
3. No way to move beyond w
. Discussion. Let us make a few remarks about the scope of applicability
of Theorem 1 and Corollary. By the Ło´s theorem, an algebraic system is elementarily equivalent to its
ultrapower, so if the condition of Corollary is met, it allows to reduce the question about the absence
of nontrivial identities in an algebraic system A to the question whether a system elementary equivalent
to A contains a free subsystem. This was demonstrated to be useful in some situations in [Z], but the
usefulness is severely restricted by the fact that any property of an algebraic system A we can use in
the process should be a first-order property. Most of the interesting properties of algebraic systems are
second- or higher-order.
Note that by the analog of Ło´s theorem for ultraproducts over k -complete ultrafilters, the ultrapower
AU of an algebraic system A is elementarily equivalent to A in the sense of certain higher-order logic
(denoted by Lk
in [D, §3.3]). But unfortunately, we cannot derive an analog
of Corollary to Theorem 1 for k > w
, at least in, arguably, the most interesting for applications cases --
groups and algebras over fields (the main protagonists of [Z]). The reason is that free systems in these
varieties are residually nilpotent (the intersection of all terms of the lower central series is trivial) and
hence are already not w 1-subdirectly irreducible.
in [CK, §4.2], and by Lkk
Moreover, it seems that no statement similar to Corollary, where the (usual) ultrapower construction
is replaced by whatever other construction providing us with elementary equivalence in the sense of
second- or higher-order logic of some sort, is possible. Indeed, any such logic L should be a priori weak
enough not to allow encode the fact that an algebraic system contains a free subsystem: otherwise, if in
the condition (ii) of Corollary we would be able to replace the ultrapower of A by another construction
elementary equivalent to A in the sense of L, this would imply that for any algebraic system the absence
of a nontrivial identity is equivalent to having a free subsystem -- an obviously false statement. While,
in general, free systems in arbitrary varieties are not necessary countable, they are, essentially, so in
all cases of interest (groups and algebras over fields): all identities in a given variety are captured by
free systems of no more than countable rank; such free groups are, obviously, countable, and such free
algebras are countable-dimensional over the base field. In the latter case, as identities of algebras do not
change under field extensions (except, possibly, the cases of finite base fields of "small" cardinality), we
may always assume the base field to be countable, and, hence, the whole free algebra to be countable.
To summarize: the hypothetical logic L should not allow to encode the fact that an algebraic system
contains a countable subsystem -- a very weak logic indeed, on the verge not to be qualified as the
"second-order" one!
What about the condition on k
in Theorem 1 (sometimes called strong compactness)? In the case
k = w
this amounts to the well-known fact that any filter can be extended to an ultrafilter (true by
the Zorn lemma). In the general case we are in deep waters of set theory. It seems that this is one
of the statements about which one does not make sense to speak if they are "true" or "false", but it is
rather a matter of which model of set theory is adopted. See [D, §3.3, Parts C,D] for this and many
other conditions of such sort, and relationships between them. Note also that the very existence of non-
principal k -complete ultrafilters for k > w
, being equivalent to the existence of measurable cardinals,
entails rather strange properties of the corresponding model(s) of set theory (see, again, [CK, §4.2] and
[D, §0.4]).
Note finally that it would be very interesting to extend arguments used in the proof of Theorem 1 to
the case of metric ultraproducts. This could provide an approach to various questions related to sofic
and hyperlinear groups.
4. Semigroups. Arguably, the most interesting class of algebraic systems whose congruences are not
ideal-determined, i.e. not covered by [Z], but by Theorem 1 and Corollary above, is the class of semi-
groups. Unfortunately, the Corollary is not applicable to the variety of all semigroups, as free semi-
groups of rank > 1 are not finitely subdirectly irreducible. For example, if x and y are among free gen-
erators of a free semigroup G, then the congruences of G generated by pairs (x, x2) and (y, y2) intersect
trivially. It seems to be interesting to investigate for which classes of semigroups (inverse semigroups?
ON THE UTILITY OF ROBINSON -- AMITSUR ULTRAFILTERS. II
4
Burnside varieties?) the Corollary would be applicable, and what good it could do. The same question
for the class of loops.
: (cid:213)
5. Homomorphisms from direct products. Finally, we take the opportunity to note a mistake in [Z].
Theorem 7.1 there contains a statement dual, in a sense, to Theorem 1: if there is a surjective homomor-
phism a
i∈I Bi → A, where A is finitely subdirectly irreducible, then A is a surjective homomorphic
image of an ultraproduct of the same family {Bi}. The proof of this theorem is in error. At the top of
p. 283 in the published version (at the bottom of p. 13 -- top of p. 14 in the arXiv version), it is, essen-
tially, claimed (keeping the notation and terminology of the original paper) that any equality in A of the
form a (u) = t(b1, . . ., bn,a ( f ), . . .,a ( f )), where u, f ∈ (cid:213)
i∈I Bi, b1, . . . , bn ∈ A, and t is an ideal term in
arguments occupied by a ( f )'s, can be lifted to (cid:213)
i∈I Bi
such that a (hi) = bi. There is no reason whatsoever for this to be true in general: for example, in the
simplest possible case t(x) = x (the ideal term just in one variable, without arguments occupied by bi's),
this claim amounts to saying that a
i∈I Bi: u = t(h1, . . ., hn, f , ..., f ) for some hi ∈ (cid:213)
is an isomorphism.
Luckily, we can slightly modify the statement, and supply it with a new proof. While the new state-
ment differs from the original one, it is more general for the most classes of algebraic systems of interest.
The proof uses an ingenious (and barely utilizing anything beyond the definition of ultrafilter) argument
from an array of recent papers by G. Bergman, some of them jointly with N. Nahlus (e.g., [BN] and
[G.B]), devoted to factoring homomorphisms from direct product of groups, algebras over fields, and
modules. The argument is valid for arbitrary algebraic systems, and we reproduce it here, throwing in
k -complete ultrafilters for good measure.
Theorem 2 (BERGMAN -- NAHLUS). For any cardinal k > 2, and any algebraic system A consisting of
more than one element, the following are equivalent:
(i) For any surjective homomorphism f of the direct product (cid:213)
such that f factors through the canonical projection (cid:213)
i∈I Bi, I < k , to A, there is i0 ∈ I
i∈I Bi to A, there is a k -complete
ultrafilter U on the indexing set I such that f factors through the canonical homomorphism
(ii) For any surjective homomorphism f of the direct product (cid:213)
i∈I Bi → Bi0.
i∈I Bi → (cid:213) U Bi.
Proof. (ii) ⇒ (i) is obvious (like in a similar situation in Theorem 1, take I < k and observe that U is
necessary principal).
(i) ⇒ (ii). Let U consist of subsets J ⊆ I such that f factors through a surjective homomorphism
from the (smaller) direct product of Bi's indexed over J, i.e. the diagram
Bi
i∈I
f ✲ A
✒
❄
Bi
i∈J
where the vertical arrow is the canonical projection, commutes. Utilizing the condition (i) with I = 2,
and reasoning as in [BN, Lemma 7 and Proposition 8] or [G.B, Lemma 1.2], we get that U is an
ultrafilter, and f factors through the canonical homomorphism (cid:213)
To prove that U is k -complete, it is sufficient to show that for any decomposition I = S j<k I j into
the union of pairwise disjoint sets I j,
i∈I Bi =
Bi for some j0 < k , i.e.
j<k (cid:16)(cid:213)
I j0 ∈ U , as required.
i∈I j Bi(cid:17), f factors through the canonical projection (cid:213)
j < k , at least one of them belongs to U . Since (cid:213)
i∈I Bi → (cid:213) U Bi.
i∈I Bi → (cid:213)
Note that in the case of groups and algebras over fields, the condition (i) of Theorem 2 with k = w
is
weaker than the finite subdirect irreducibility. This follows from [BN, Lemma 5] in the case of algebras
over fields, and in the case of groups the argument is repeated almost verbatim.
i∈I j0
(cid:3)
(cid:213)
(cid:213)
(cid:213)
(cid:213)
ON THE UTILITY OF ROBINSON -- AMITSUR ULTRAFILTERS. II
5
Note also that though Theorems 1 and 2 are, in a sense, dual to each other, this duality does not stretch
to the proofs: the proofs are different, and each proof seemingly cannot be adapted to the dual situation.
Acknowledgements. Thanks are due to Alexander Gein, Fares Maalouf, and Eugene Plotkin for very
useful remarks: Gein has dispelled my illusion about well-behavior of semigroup congruences, Maalouf
has turned my attention to a mistake in [Z], and Plotkin has insisted, a long time ago, that the setup of [Z]
can be generalized further (it took me several years to realize this -- obvious, as it looks now -- fact). The
financial support of the Regional Authority of the Moravian-Silesian Region (grant MSK 44/3316) and
of the Ministry of Education and Science of the Republic of Kazakhstan (grant 0828/GF4) is gratefully
acknowledged.
REFERENCES
[A1] S.A. Amitsur, Generalized polynomial identities and pivotal monomials, Trans. Amer. Math. Soc. 114 (1965), 210 --
226; reprinted in Selected Papers of S.A. Amitsur with Commentary, Part 1, AMS, 2001, 191 -- 208.
[A2]
, Prime rings having polynomial identities with arbitrary coefficients, Proc. London Math. Soc. 17 (1967),
470 -- 486; reprinted in Selected Papers of S.A. Amitsur with Commentary, Part 1, AMS, 2001, 417 -- 433.
[C.B] C. Bergman, Universal Algebra, CRC Press, 2012.
[G.B] G.M. Bergman, Families of ultrafilters, and homomorphisms on infinite direct product algebras, J. Symb. Logic 79
(2014), 223 -- 239; arXiv:1301.6383.
[BN]
and N. Nahlus, Homomorphisms on infinite direct product algebras, especially Lie algebras, J. Algebra 333
(2011), 67 -- 104; arXiv:0910.5181.
[CK] C.C. Chang and H.J. Keisler, Model Theory, Studies in Logic and the Foundations of Mathematics, Vol. 73, North-
Holland, 3rd ed., 1990; reprinted by Dover, 2012.
[D] M.A. Dickmann, Large Infinitary Languages, Studies in Logic and the Foundations of Mathematics, Vol. 83, North-
Holland, 1975.
P. Zusmanovich, On the utility of Robinson -- Amitsur ultrafilters, J. Algebra 388 (2013), 268 -- 286; arXiv:0911.5414v7.
[Z]
DEPARTMENT OF MATHEMATICS, UNIVERSITY OF OSTRAVA, OSTRAVA, CZECH REPUBLIC
E-mail address: [email protected]
|
1902.03396 | 1 | 1902 | 2019-02-09T09:37:44 | Commuting maps on certain incidence algebras | [
"math.RA",
"math.OA"
] | Let $\mathcal{R}$ be a $2$-torsion free commutative ring with unity, $X$ a locally finite pre-ordered set and $I(X,\mathcal{R})$ the incidence algebra of $X$ over $\mathcal{R}$. If $X$ consists of a finite number of connected components, in this paper we give a sufficient and necessary condition for each commuting map on $I(X,\mathcal{R})$ being proper. | math.RA | math | COMMUTING MAPS ON CERTAIN INCIDENCE ALGEBRAS
HONGYU JIA AND ZHANKUI XIAO
Abstract. Let R be a 2-torsion free commutative ring with unity, X a locally
finite pre-ordered set and I(X, R) the incidence algebra of X over R. If X
consists of a finite number of connected components, in this paper we give a
sufficient and necessary condition for each commuting map on I(X, R) being
proper.
9
1
0
2
b
e
F
9
]
.
A
R
h
t
a
m
[
1
v
6
9
3
3
0
.
2
0
9
1
:
v
i
X
r
a
1. Introduction
Let A be an associative algebra over R, a commutative ring with unity. Then
A has the Lie algebra structure under the Lie bracket [x, y] := xy − yx. An R-
linear map θ : A → A is called a commuting map if [θ(x), x] = 0 for all x ∈ A. A
commuting map θ of A is said to be proper if it can be written as
θ(x) = λx + µ(x),
∀x ∈ A,
where λ ∈ Z(A), the center of A, and µ is an R-linear map with image in Z(A). A
commuting map which is not proper will be called improper. The purpose of this
paper is to identify a class of algebras on which every commuting map is proper.
As far as we know, the first result about commuting maps is due to Posner. He
showed in [11] that the existence of a nonzero commuting derivation on a prime
algebra A implies the commutativity of A. One of the major promoter for studying
commuting maps is Bresar. He [3] initially related the commuting maps to some
Herstein's conjectures [7] which described the forms of Lie-type maps (for example,
Lie isomorphisms, Lie derivations) on associative simple or prime rings. We warmly
encourage the reader to read the well-written survey paper [4], in which the author
presented the development of the theory of commuting maps and their applications,
especially to Lie theory. More results related to commuting maps are considered in
[1, 2, 5, 6, 9, 10, 17] etc.
We now recall another notion, incidence algebras [12], with which we deal in
this paper. Let (X, 6) be a locally finite pre-ordered set (i.e., 6 is a reflexive and
transitive binary relation). Here the local finiteness means for any x 6 y there are
only finitely many elements z ∈ X satisfying x 6 z 6 y. The incidence algebra
I(X, R) of X over R is defined on the set of functions
I(X, R) := {f : X × X −→ R f (x, y) = 0 if x (cid:10) y}
2010 Mathematics Subject Classification. Primary 16W25, Secondary 15A78, 47L35.
Key words and phrases. commuting map, incidence algebra.
This work is partially supported by the NSF of Fujian Province (No. 2018J01002) and the
National Natural Science Foundation of China (No. 11301195).
1
2
HONGYU JIA AND ZHANKUI XIAO
with the natural R-module structure and the multiplication given by the convolu-
tion
(f g)(x, y) := X
x6z6y
f (x, z)g(z, y)
for all f, g ∈ I(X, R) and x, y ∈ X. It would be helpful to claim that the full matrix
algebra Mn(R), the upper (or lower) triangular matrix algebras Tn(R), and the
infinite triangular matrix algebras T∞(R) are examples of incidence algebras. The
incidence algebra of a partially ordered set was first considered by Ward [14] as a
generalized algebra of arithmetic functions. Rota and Stanley developed incidence
algebras as fundamental structures of enumerative combinatorial theory and the
allied areas of arithmetic function theory (see [13]).
Recently, the second author [16] studied the Herstein's Lie-type mapping research
program (see [4]) on incidence algebras and proved that every Jordan derivation of
I(X, R) degenerates to a derivation, provided that R is 2-torsion free. Since then
more and more Lie-type maps were considered on incidence algebras, see [8, 15, 18]
etc. Roughly speaking, all the known Lie-type maps of I(X, R) are proper or of
the standard form. On the other hand, it is well-known that the commuting maps
of the triangular matrix algebras Tn(R) and the full matrix algebra Mn(R) are
proper (see [6, 17]). Therefore, it is hopefully that every commuting map of the
incidence algebra I(X, R) is proper. Unfortunately, we can find a counter-example
2
◦.
as follows. Let X be the partially ordered set with Hasse diagram
Then
1
◦ ←
3
◦ →
I(X, R) =
a11
0
0
0
a13
a22 a23
0
a33
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
aij ∈ R
.
The reader can verify that the R-linear map θ defined by
θ :
a11
0
0
0
a13
a22 a23
0
a33
7−→
a11
0
0
0
a33
0
a13
0
a33
is a commuting map, but generally improper. Hence it is fascinating to study
the relationship between commuting maps and the structure of incidence algebras,
especially the combinatorial structure. This is our main motivation of this paper.
2. The finite rank case
From now on, we always assume that all the rings and algebras are 2-torsion
free. In this section, we study commuting maps of the incidence algebra I(X, R)
when X is a finite pre-ordered set. For reader's convenience, let's start with two
well-known results for general algebras.
Lemma 2.1. ([6, Proposition 2]) Let A, B be two R-algebras. Then A and B have
no improper commuting maps if and only if A ⊕ B has no improper commuting
maps.
Lemma 2.2. Let A be an R-algebra with an R-linear basis Y . Then an R-linear
map θ : A → A is a commuting map if and only if [θ(x), y] = [x, θ(y)] for all
x, y ∈ Y .
COMMUTING MAPS ON CERTAIN INCIDENCE ALGEBRAS
3
We now introduce some standard notations for the incidence algebra I(X, R).
The unity element δ of I(X, R) is given by δ(x, y) = δxy for x 6 y, where δxy ∈
{0, 1} is the Kronecker delta.
If x, y ∈ X with x 6 y, let exy be defined by
exy(u, v) = 1 if (u, v) = (x, y), and exy(u, v) = 0 otherwise. Then exyeuv = δyuexv
by the definition of convolution. Clearly the set B := {exy x 6 y} forms an
R-linear basis of I(X, R) when X is finite. For i 6 j and i 6= j, we write i < j or
j > i for short.
When X is finite, I(X, R) is also known as a digraph algebra. This means that
there is a directed graph with the vertex set X associated with I(X, R). This graph
contains all the self loops and the matrix unit exy corresponds to a directed edge
from y to x. We now define an equivalent relation on D := {(x, y) x < y}, the set
of all directed edges associated with the pre-ordered set X. Let ∼ be the relation
on X defined by x ∼ y if and only if x 6 y or y 6 x, in other words, there is at
least one directed edge between the vertices x and y. We also write y ∼ x for x ∼ y
by the symmetry. Let x1, x2, . . . , xn be n different vertices in X with n ≥ 2. We
say that {x1, x2, . . . , xn} forms a circle if
(i) x1 ∼ x2 when n = 2;
(ii) x1 ∼ x2, . . . , xi−1 ∼ xi, . . . , xn−1 ∼ xn, xn ∼ x1 when n ≥ 3.
Definition 2.3. For any two directed edges (x, y) and (u, v) in D, we define (x, y) ∼=
(u, v) if and only if there is a circle contains both x ∼ y and u ∼ v.
The reader can verify that the binary relation ∼= is in deed an equivalent relation
on the set D. We remark here that the n = 2 case does not satisfy the standard
notion, circle, in combinatorial theory, but it provides the reflexivity of the rela-
tion ∼=. The example appeared in the introduction, where (1, 3) ≇ (2, 3), and the
following Example 2.4 can help us get a more clear picture for the relation ∼=.
Example 2.4. Let X = {1, 2, 3, 4} with partially ordered relations (or arrows) 1 <
2, 2 < 3, 2 < 4. Then the associated set of directed edges is D = {(1, 2), (2, 3), (1, 3),
(2, 4), (1, 4)}. We have (2, 3) ∼= (2, 4), since 2 ∼ 3, 3 ∼ 1, 1 ∼ 4, 4 ∼ 2, and D forms
one equivalent class under the relation ∼=.
The main result of this section is as follows.
Theorem 2.5. Let R be a 2-torsion free commutative ring with unity and X be
finite. Then every commuting map θ of I(X, R) is proper if and only if the set of
all directed edges associated with each connected component forms one equivalent
class under the relation ∼=.
We only need to prove Theorem 2.5 when X is connected. In fact, assume that
X = Fi∈I Xi be the union of its distinct connected components, where I is a
finite index set. Let δi := Px∈Xi
exx. It follows from [12, Theorem 1.3.13] that
{δi i ∈ I} forms a complete set of central primitive idempotents. In other words,
I(X, R) = Li∈I δiI(X, R). Clearly δiI(X, R) ∼= I(Xi, R) for each i ∈ I. Hence we
only need to prove Theorem 2.5 when X is connected by Lemma 2.1.
From now on until the end of this section, we assume X is finite and connected.
Let θ : I(X, R) → I(X, R) be an arbitrary commuting map. We denote for all
i, j ∈ X with i 6 j
θ(eij ) = X
exy ∈B
C ij
xyexy.
We also make the convention C ij
xy = 0, if needed, for x (cid:10) y.
4
HONGYU JIA AND ZHANKUI XIAO
Lemma 2.6. The commuting map θ satisfies
θ(eii) = X
x∈X
θ(eij ) = X
x∈X
C ii
xxexx;
C ij
xxexx + C ij
ij eij,
if i 6= j.
(1)
(2)
Proof. Without loss of generality, we assume that X ≥ 2. Since [θ(eii), exx] =
[eii, θ(exx)] for any i, x ∈ X, multiplying this identity by exx on the left and by eyy
on the right, we have
Then left multiplication by exx on [θ(eii), eii] = 0 leads to
C ii
xy = 0, if i 6= x < y 6= i.
C ii
xi = 0, if x < i.
Similarly, right multiplication by eyy on [θ(eii), eii] = 0 leads to
C ii
iy = 0, if i < y.
Combining the identities (3), (4) and (5), we obtain
θ(eii) = X
x6y
xyexy = X
C ii
x∈X
xxexx + X
C ii
x<y
C ii
xyexy
(3)
(4)
(5)
= X
x∈X
= X
x∈X
xxexx + X
C ii
i6=x<y6=i
xyexy + X
C ii
x<i
xiexi + X
C ii
i<y
C ii
iyeiy
C ii
xxexx,
which proves (1).
Noting that [θ(eij), eyy] = [eij, θ(eyy)] for any i < j and y ∈ X, multiplying this
identity by exx on the left and by eyy on the right, we have
C ij
xy = 0, if i 6= x < y 6= j.
(6)
Taking the identity (1) into account, then left multiplication by exx on [θ(eij ), ejj ] =
[eij, θ(ejj )] leads to
Similarly, right multiplication by eyy on [θ(eij ), eii] = [eij, θ(eii)] leads to
C ij
xj = 0, if i 6= x < j.
C ij
iy = 0, if i < y 6= j.
Combining the identities (6), (7) and (8), we obtain
θ(eij ) = X
x6y
xyexy = X
C ij
x∈X
xxexx + X
C ij
x<y
C ij
xyexy
(7)
(8)
= X
x∈X
= X
x∈X
xxexx + X
C ij
i6=x<y6=j
xyexy + X
C ij
i6=x<j
xjexj + X
C ij
i<y6=j
C ij
iyeiy + C ij
ij eij
C ij
xxexx + C ij
ij eij,
which proves (2).
(cid:3)
COMMUTING MAPS ON CERTAIN INCIDENCE ALGEBRAS
5
Lemma 2.7. Let X be connected and θ : I(X, R) → I(X, R) be an R-linear map
satisfying the formulas (1) and (2). Then θ is a commuting map if and only if the
coefficients C ij
xy are subject to the following relations:
(R1) C il
(R2) C ki
(R3) C ii
(R4) C ij
(R5) C ij
il = C ii
ii − C ii
ll ,
ki = C ii
ii − C ii
kk,
kk = C ii
ll ,
xx = C ij
yy,
ij = C jl
jl ,
if i < l;
if k < i;
if k < l and k 6= i 6= l;
∀ x, y ∈ X;
if i < j < l.
Proof. By Lemma 2.2, we have θ is a commuting map if and only if [θ(eij ), ekl] =
[eij, θ(ekl)] for all i 6 j and k 6 l. There are four cases occurring depending on the
formulas (1) or (2).
Case 1. If i = j and k = l, then [θ(eii), ekk] = [eii, θ(ekk)] always holds.
Case 2. If i = j and k 6= l, then the formulas (1) and (2) imply that
(C ii
kk − C ii
ll )ekl = (δik − δil)C kl
kl ekl.
(9)
Noting that k 6= l, hence we can get (R1) (resp. (R2)) from the identity (9) by
setting i = k (resp. i = l). We can also get the relation (R3) from (9) by setting
k 6= i 6= l.
Case 3. If i 6= j and k = l, this case is symmetric to the Case 2.
Case 4. If i 6= j and k 6= l, it follows from the formula (2) that
(C ij
kk − C ij
ll )ekl + δjk(C ij
ij − C kl
kl )eil = (C kl
jj − C kl
ii )eij + δil(C ij
ij − C kl
kl )ekj .
When j 6= k and i 6= l, the identity (10) is equivalent to
C ij
kk = C ij
ll
for j 6= k < l 6= i.
(10)
(11)
When j 6= k and i = l (hence k < i < j), the identity (10) can be rewritten as
(C ij
ki )ekj , which gives
ii )eki = (C ki
jj − C ki
ij − C ki
kk − C ij
ii )eij + (C ij
kk = C ij
ii = C ki
C ki
C ij
jj
ii
for j 6= k < i;
for i < j 6= k;
(12)
(13)
(14)
(15)
For convenience, substituting the indices we here rewrite the identity (13) as
C ki
ki = C ij
ij
for j 6= k < i < j.
C ij
jj = C ij
ll
for j < l 6= i.
When j = k and i 6= l, by symmetry we can also get the identities (12)-(15).
When j = k and i = l (hence i < j < i), the identity (10) is equivalent to
(C ij
ji )ejj , which gives
ji )eii = (C ji
ii )eij + (C ij
ii )eji + (C ij
jj − C ji
ij − C ji
ij − C ji
jj − C ij
C ij
jj = C ij
ii
for j < i;
C ij
ij = C ji
ji
for i < j < i.
(16)
(17)
Combining (14) and (17), we obtain the relation (R5). The identities (11), (12),
(15) and (16) imply that
C ij
xx = C ij
yy for all x < y.
(18)
6
HONGYU JIA AND ZHANKUI XIAO
Since X is connected, for any x, y ∈ X there is a sequence x = x0, x1, . . . , xs = y
in X such that xi−1 covers or is covered by xi for 1 ≤ i ≤ s. Then a recursive
procedure, using (18), on the length s implies the desired relation (R4).
(cid:3)
Remark 2.8. The reader may find that the set of the relations (R1-R5) in Lemma
2.7 is not minimal. For example, the relations (R1), (R2) and (R5) can imply the
relation (R3). However, we present here the Lemma 2.7 for later use.
Proof of Theorem 2.5. Let θ be an arbitrary commuting map of the incidence alge-
bra I(X, R). Then θ has the form (1) and (2) in Lemma 2.6, where the coefficients
C ij
xy satisfy the relations (R1-R5) in Lemma 2.7. If X = 1, the incidence algebra
I(X, R) ∼= R, and hence Theorem 2.5 is clear. We now assume X ≥ 2 and first
study the sufficiency.
We claim that the relation (R3) can be strengthened as C ii
yy for x 6= i 6= y.
Since the set of all directed edges associated with X (is assumed connected) forms
one equivalent class under the relation ∼=, there is a circle contains both x and
y. Breaking the circle at x and y, there exists a sequence x = x1, x2, . . . , xs = y
of different vertices in X such that x1 ∼ x2, . . . , xi ∼ xi+1, . . . , xs−1 ∼ xs and
i /∈ {x1, x2, . . . , xs}. A recursive procedure, using (R3), on the length s implies the
desired claim.
xx = C ii
We then claim that C ij
il + C ii
ij + C ii
jj = C ii
ii = C il
C ij
kl for all i < j and k < l. By (R1), we have
ll for j 6= i 6= l. Hence
ij = C kl
ll and we just proved that C ii
C ij
for i < j and i < l.
jj = C ii
(19)
ij = C il
il
Similarly, we have
C ij
ij = C kj
(20)
i.e.,
Since X is connected, there is a path (forget the direction) form j to k,
there exists a series j = x1, x2, . . . , xs = k in X such that x1 ∼ x2, . . . , xi ∼
xi+1, . . . , xs−1 ∼ xs. Using (19), (20) and the relation (R5), an induction on the
index s implies the desired claim.
for i < j and k < j.
kj
For any i ∈ X, since X is connected and X ≥ 2, there is a vertex comparable
ij eij for
ki eii
kl for all i < j and
ij for
with i. Let's define an R-linear map L : I(X, R) → I(X, R) by L(eij) = C ij
i < j and L(eii) = C ij
if there exists a vertex k such that k < i. Note that C ij
k < l. The map L is well-defined and is of the form L(f ) = λf , where λ = C ij
i < j and f ∈ I(X, R).
ij eii if there exists a vertex j such that i < j, or L(eii) = C ki
ij = C kl
ij )eii. Combining the fact C ii
Let µ := θ−L. If there is a vertex j such that i < j, then µ(eii) = Px6=i C ii
ii − C ij
xxexx+
(C ii
yy for x 6= i 6= y and the relation
(R1), we get µ(eii) ∈ Z(I(X, R)), the center of I(X, R). Similarly, we can get
µ(eii) ∈ Z(I(X, R)) if there is a vertex k such that k < i. Finally the relation (R4)
implies µ(eij ) ∈ Z(I(X, R)) for all i < j. Hence µ is a central-valued linear map
and θ is proper.
xx = C ii
We now prove the necessity. By the hypothesis, θ is proper. Hence C ij
ij = C kl
kl
for all i < j and k < l. For any i ∈ X, since X is connected and X ≥ 2, there
ij = C ii
is a vertex comparable with i. Therefore, either C ii
xx for x 6= i < j
or C ii
xx for k < i 6= x. We can get C ii
ki = C ii
yy for x 6= i 6= y from
each case.
If the set of all directed edges associated with X does not form one
equivalent class under the relation ∼=, then there exist two vertices j and k such
ii − C ij
xx = C ii
ii − C ki
COMMUTING MAPS ON CERTAIN INCIDENCE ALGEBRAS
7
that they can not be contained in any circle. In this case, we must have X ≥ 3.
In fact, when X = 2, every commuting map of I(X, R) is proper and the set of all
directed edges associated with X forms one equivalent class. Fix one vertex i which
is different from j and k. The connectivity of X shows that there is a path (forget
the direction) form i to j (resp. a path from i to k). By (R3), we can assume j
and k are comparable to i without lose of generality. Noting that j and k do not
be contained in any circle, we can construct, by Lemmas 2.6 and 2.7, a commuting
map θ such that C ii
kk, a contradiction. We completes the proof of Theorem
2.5.
(cid:3)
jj 6= C ii
From Theorem 2.5, we immediately have the following corollaries.
Corollary 2.9. Let R be a 2-torsion free commutative ring with unity and Tn(R)
be the upper (or lower) triangular matrix algebra over R. Then every commuting
map of Tn(R) is proper.
Corollary 2.10. Let R be a 2-torsion free commutative ring with unity and Mn(R)
be the full matrix algebra over R. Then every commuting map of Mn(R) is proper.
3. The general case
In this section, we extend the Theorem 2.5 to the case of X being a locally
finite pre-ordered set. Let I(X, R) be the R-subspace of I(X, R) generated by the
elements exy with x 6 y. That means I(X, R) consists exactly of the functions
f ∈ I(X, R) which are nonzero only at a finite number of (x, y). Clearly I(X, R)
is a subalgebra of I(X, R). Hence I(X, R) becomes an I(X, R)-bimodule in the
natural manner. Let θ : I(X, R) → I(X, R) be a commuting map, i.e.
[θ(f ), f ] = 0
for all f ∈ I(X, R). Observe that Lemmas 2.6 and 2.7 remain valid, when we
replace the domain of θ by I(X, R). In fact, although the formal sums L(eij) =
Px6y C ij
xyexy are now infinite, multiplication by euv on the left or on the right
works as in the finite case.
Let's now recall some notations and results from [18]. For any f ∈ I(X, R) and
x 6 y, the restriction of f to {z ∈ X x 6 z 6 y} is defined by
x = X
f y
x6u6v6y
f (u, v)euv
Observe that the sum above is finite, and hence f y
and x 6 y, the observation
x ∈ I(X, R). For any f ∈ I(X, R)
exxf eyy = f (x, y)exy
(21)
will be frequently used.
Lemma 3.1. ([18, Lemma 3.2 (ii)]) For any f ∈ I(X, R) and x 6 y, we have
(f g)(x, y) = (f y
xg)(x, y) = (f gy
x)(x, y) = (f y
xgy
x)(x, y).
Lemma 3.2. Let θ be a commuting map of I(X, R) and x < y. Then
θ(f )(x, y) = θ(f y
x)(x, y).
8
HONGYU JIA AND ZHANKUI XIAO
Proof. It follows from (21) that
θ(f )(x, y) = [exx, θ(f )](x, y) = [θ(exx), f ](x, y)
= [θ(exx), f y
x](x, y) = θ(f y
x)(x, y),
where the third identity relies on Lemma 3.1.
(cid:3)
For the locally finite pre-ordered set X, we set D := {(x, y) x < y} and also
define the equivalent relation ∼= on D as those in Definition 2.3.
Theorem 3.3. Let θ be a commuting map of I(X, R). If D forms one equivalent
class under the relation ∼=, then θ is proper.
Proof. Restricting θ to I(X, R), denoting as θ I , we get that θ I : I(X, R) → I(X, R)
is a commuting map. Then θ I is proper by Theorem 2.5. By the hypothesis, X is
connected and hence Z(I(X, R)) ∼= R by [12, Corollary 1.3.15]. There exists λ ∈ R
such that θ I (f ) = λf + µ(f ), where f ∈ I(X, R) and µ : I(X, R) → Z(I(X, R)) is
an R-linear map.
Define µ : I(X, R) → I(X, R) by µ(f ) := θ(f ) − λf for all f ∈ I(X, R). We only
need to prove the commuting map µ is central-valued. Notice that µ(f ) = µ(f ) ∈
Z(I(X, R)) for all f ∈ I(X, R). For x < y and f ∈ I(X, R), Lemma 3.2 shows
µ(f )(x, y) = µ(f y
x)(x, y) = 0. We now prove µ(f )(x, x) = µ(f )(y, y)
for all f ∈ I(X, R) and x, y ∈ X. Since X is connected, we only need to prove
µ(f )(x, x) = µ(f )(y, y) for x < y. On one hand, by (21),
x)(x, y) = µ(f y
[exy, µ(f )](x, y) = µ(f )(y, y) − µ(f )(x, x).
On the other hand, by Lemma 3.1,
[exy, µ(f )](x, y) = [µ(exy), f ](x, y) = [µ(exy), f y
x)(x, x)
x)](x, y) = µ(f y
x)(y, y) − µ(f y
x](x, y)
= [exy, µ(f y
= µ(f y
x)(y, y) − µ(f y
x)(x, x) = 0.
Therefore, it follows from [12, Theorem 1.3.13] that µ is central-valued and hence
θ is proper.
(cid:3)
Corollary 3.4. Let R be a 2-torsion free commutative ring with unity. Let T∞(R)
be the ring of countable upper triangular R-matrices. Then every commuting map
of T∞(R) is proper.
It is obvious that Theorem 3.3 can be generalized to the case of X consisting of a
finite number of connected components. Hence the following conjecture is natural.
Conjecture 3.5. Let (X, 6) be a locally finite pre-ordered set and R be 2-torsion
free. If the set D associated with each connected component forms one equivalent
class under the relation ∼=, then every commuting map of I(X, R) is proper.
References
[1] M. Bresar, Centralizing mappings on von Neumann algebras, Proc. Amer. Math. Soc. 111
(1991), 501-510.
[2] M. Bresar, Centralizing mappings and derivations in prime rings, J. Algebra 156 (1993),
385-394.
[3] M. Bresar, Commuting traces of biadditive mappings, commutativity-preserving mappings and
Lie mappings, Trans. Amer. Math. Soc. 335 (1993), 525-546.
[4] M. Bresar, Commuting maps: a survey, Taiwanese J. Math. 8 (2004), 361-397.
COMMUTING MAPS ON CERTAIN INCIDENCE ALGEBRAS
9
[5] L. Chen and J. Cai, Commuting mappings on the Hochschild extension of an algebra, Bull.
Iran. Math. Soc. 44 (2018), 749-762.
[6] W.S. Cheung, Commuting maps of triangular algebras, J. London Math. Soc. 63 (2001), 117-
127.
[7] I.N. Herstein, Lie and Jordan structures in simple, associative rings, Bull. Amer. Math. Soc.
67 (1961), 517-531.
[8] M. Khrypchenko, Jordan derivations of finitary incidence rings, Linear Multilinear Algebra
64 (2016), 2104-2118.
[9] T.K. Lee, Derivations and centralizing mappings in prime rings, Taiwanese J. Math. 1 (1997),
333-342.
[10] T.K. Lee and T.C. Lee, Commuting additive mappings in semiprime rings, Bull. Inst. Math.
Acad. Sinica 24 (1996), 259-268.
[11] E.C. Posner, Derivations in prime rings, Proc. Amer. Math. Soc. 8 (1957), 1093-1100.
[12] E. Spiegel and C. O'Donnell, Incidence algebras, Monographs and Textbooks in Pure and
Applied Mathematics, vol.206, Marcel Dekker, New York, 1997.
[13] R. Stanley, Enumerative Combinatorics, vol. 1. With a foreword by Gian-Carlo Rota. Cam-
bridge Studies in Advanced Mathematics, vol. 49, Cambridge University Press, Cambridge, 1997.
[14] M. Ward, Arithmetic functions on rings, Ann. of Math. 38 (1937), 725-732.
[15] D.N. Wang and Z.K. Xiao, Lie triple derivations of incidence algebras, Comm. Algebra, to
apper.
[16] Z.K. Xiao, Jordan derivations of incidence algebras, Rocky Mountain J. Math. 45 (2015),
1357-1368.
[17] Z.K. Xiao and F. Wei, Commuting mappings of generalized matrix algebras, Linear Algebra
Appl. 433 (2010), 2178-2197.
[18] X. Zhang and M. Khrypchenko, Lie derivations of incidence algebras, Linear Algebra Appl.
513 (2017), 69-83.
Jia: School of Mathematical Sciences, Huaqiao University, Quanzhou, Fujian, 362021,
P. R. China
E-mail address: [email protected]
Xiao: Fujian Province University Key Laboratory of Computation Science, School
of Mathematical Sciences, Huaqiao University, Quanzhou, Fujian, 362021, P. R. China
E-mail address: [email protected]
|
1708.07758 | 1 | 1708 | 2017-08-24T17:37:35 | Degenerations of Jordan Superalgebras | [
"math.RA"
] | We describe degenerations of three-dimensional Jordan superalgebras over $\mathbb{C}$. In particular, we describe all irreducible components in the corresponding varieties. | math.RA | math |
Degenerations of Jordan Superalgebras
Mar´ıa Alejandra Alvareza, Isabel Hern´andezb, Ivan Kaygorodovc
a Departamento de Matem´aticas, Universidad de Antofagasta, Chile.
b CONACYT - Centro de Investigaci´on en Matem´aticas, A.C. Unidad M´erida, M´exico.
c Universidade Federal do ABC, CMCC, Santo Andr´e, Brazil.
E-mail addresses:
Mar´ıa Alejandra Alvarez ([email protected]),
Isabel Hern´andez ([email protected]),
Ivan Kaygorodov ([email protected]),
Abstract. We describe degenerations of three-dimensional Jordan superalgebras over C. In particular,
we describe all irreducible components in the corresponding varieties.
Keywords: Jordan superalgebra, orbit closure, degeneration, rigid superalgebra
1. INTRODUCTION
Contractions of Lie algebras are limiting processes between Lie algebras, which have been studied first
in physics [20, 34]. For example, classical mechanics is a limiting case of quantum mechanics as → 0,
described by a contraction of the Heisenberg-Weyl Lie algebras to the Abelian Lie algebra of the same
dimension. Description of contractions of low dimensional Lie algebras was given in [32]. The study of
contractions and graded contractions of binary algebras has a very big history (see, for example, [13,18,36]).
The study of graded contractions of Jordan algebras and Jordan superalgebras was iniciated in [23]. The
first attempt of the study of contractions of n-ary algebras stays in the variety of Filippov algebras [5].
In mathematics, often a more general definition of contraction is used, the so-called degeneration. De-
generations are related to deformations. Degenerations of algebras is an interesting subject, which was
studied in various papers (see, for example, [6–8, 10, 11, 16, 17, 29, 33]). In particular, there are many results
concerning degenerations of algebras of low dimensions in a variety defined by a set of identities. One
of the important problems in this direction is the description of the so-called rigid algebras [22]. These
algebras are of big interest, since the closures of their orbits under the action of generalized linear group
form irreducible components of a variety under consideration (with respect to the Zariski topology). There
are fewer works in which the full information about degenerations was found for some variety of alge-
bras. This problem was solved for two-dimensional pre-Lie algebras in [6], for two-dimensional Jordan
algebras in [2], for three-dimensional Novikov algebras in [7], for three-dimensional Jordan algebras [15],
for four-dimensional Lie algebras in [8], for nilpotent four-dimensional Jordan algebras [3], for nilpotent
four-dimensional Leibniz and Zinbiel algebras in [27], for nilpotent five- and six-dimensional Lie algebras
in [16, 33], for nilpotent five- and six-dimensional Malcev algebras in [26], and for all 2-dimensional alge-
bras [28]. On the same time, the study of degenerations of superalgebras and graded algebras was iniciated
in [4] for associative case and in [1] for Lie superalgebras.
1
2
2. DEFINITIONS AND NOTATION
2.1. Jordan superalgebras. Jordan algebras appeared as a tool for studies in quantum mechanic in the
paper of Jordan, von Neumann and Wigner [19]. A commutative algebra is called a Jordan algebra if it
satisfies the identity
(x2y)x = x2(yx).
The study of the structure theory and other properties of Jordan algebras was initiated by Albert. Jordan
algebras are related with some questions in differentional equations [35], superstring theory [12], analysis,
operator theory, geometry, mathematical biology, mathematical statistics and physics (see, the survey of
Iordanescu [21]).
Let G be the Grassmann algebra over F given by the generators 1, ξ1, . . . , ξn, . . . and the defining relations
ξ2
i = 0 and ξiξj = −ξjξi. The elements 1, ξi1ξi2 . . . ξik, i1 < i2 < . . . < ik, form a basis of the algebra G
over F. Denote by G0 and G1 the subspaces spanned by the products of even and odd lengths, respectively;
then G can be represented as the direct sum of these subspaces, G = G0 ⊕ G1. Here the relations GiGj ⊆
Gi+j(mod 2), i, j = 0, 1, hold. In other words, G is a Z2-graded algebra (or a superalgebra) over F. Suppose
now that A = A0 ⊕A1 is an arbitrary superalgebra over F. Consider the tensor product G⊗A of F-algebras.
The subalgebra
G(A) = G0 ⊗ A0 + G1 ⊗ A1
of G ⊗ A is referred to as the Grassmann envelope of the superalgebra A. Let Ω be a variety of algebras
over F. A superalgebra A = A0 ⊕ A1 is referred to as an Ω-superalgebra if its Grassmann envelope G(A)
is an algebra in Ω. In particular, A = A0 ⊕ A1 is referred to as a Jordan superalgebra if its Grassmann
envelope G(A) is a Jordan algebra. The study of Jordan superalgebras has very big history (for example,
see [9, 14, 24, 25, 30, 31]).
2.2. Degenerations. Given an (m, n)-dimensional vector superspace V = V0 ⊕ V1, the set
Hom(V ⊗ V, V ) = (Hom(V ⊗ V, V ))0 ⊕ (Hom(V ⊗ V, V ))1
is a vector superspace of dimension m3 + 3mn2. This space has a structure of the affine variety Cm3+3mn2
.
If we fix a basis {e1, . . . , em, f1, . . . , fn} of V , then any µ ∈ Hom(V ⊗ V, V ) is determined by m3 + 3mn2
structure constants αk
p,q ∈ C such that
i,j, βq
i,j, γq
i,j, δk
µ(ei ⊗ ej) =
m
X
k=1
αk
i,jek, µ(ei ⊗ fp) =
n
X
q=1
βq
i,pfq, µ(fp ⊗ ei) =
n
X
q=1
γq
p,ifq, µ(fp ⊗ fq) =
m
X
k=1
δk
p,qek.
A subset L(T ) of Hom(V ⊗ V, V ) is Zariski-closed if it can be defined by a set of polynomial equations T
in the variables αk
p,q (1 ≤ i, j, k ≤ m, 1 ≤ p, q ≤ n).
i,j, βq
i,p, γq
p,i, δk
Let Sm,n be the set of all superalgebras of dimension (m, n) defined by the family of polinomial super-
identities T , understood as a subset L(T ) of an affine variety Hom(V ⊗ V, V ). Then one can see that Sm,n
is a Zariski-closed subset of the variety Hom(V ⊗ V, V ). The group G = (Aut V )0 ≃ GL(V0) ⊕ GL(V1)
acts on Sm,n by conjugations:
(g ∗ µ)(x ⊗ y) = gµ(g−1x ⊗ g−1y)
for x, y ∈ V , µ ∈ L(T ) and g ∈ G.
Thus, Sm,n is decomposed into G-orbits that correspond to the isomorphism classes of superalgebras. Let
O(µ) denote the orbit of µ ∈ L(T ) under the action of G and O(µ) denote the Zariski closure of O(µ).
Let J, J ′ ∈ Sm,n and λ, µ ∈ L(T ) represent J and J ′ respectively. We say that λ degenerates to µ and
write λ → µ if µ ∈ O(λ). Note that in this case we have O(µ) ⊂ O(λ). Hence, the definition of a
degeneration does not depend on the choice of µ and λ, and we will right indistinctly J → J ′ instead of
λ → µ and O(J) instead of O(λ). If J 6∼= J ′, then the assertion J → J ′ is called a proper degeneration. We
write J 6→ J ′ if J ′ 6∈ O(J).
Let J be represented by λ ∈ L(T ). Then J is rigid in L(T ) if O(λ) is an open subset of L(T ). Recall
that a subset of a variety is called irreducible if it cannot be represented as a union of two non-trivial closed
subsets. A maximal irreducible closed subset of a variety is called irreducible component. In particular, J
3
is rigid in Sm,n iff O(λ) is an irreducible component of L(T ). It is well known that any affine variety can
be represented as a finite union of its irreducible components in a unique way. We denote by Rig(Sm,n) the
set of rigid superalgebras in Sm,n.
2.3. Principal notations. Let JSm,n be the set of all Jordan superalgebras of dimension (m, n). Let J be a
Jordan superalgebra with fixed basis {e1, . . . , em, f1, . . . fn}, defined by
m
eiej =
X
αk
ijek,
eifj =
k=1
We will use the following notation:
n
X
k=1
βk
ijfk,
fifj =
m
X
k=1
γk
ijek.
(1) a(J) is the Jordan superalgebra with the same underlying vector superspace than J , and defined by
n
fifj =
X
γk
ijek.
(2) J 1 = J , J r = J r−1J + J r−2J 2 + · · · + JJ r−1, and in every case J r = (J r)0 ⊕ (J r)1.
k=1
tr(L(x)i) · tr(L(y)j)
tr(L(x)i · L(y)j)
(3) ci,j =
is the Burde invariant, where L(x) is the left multiplication. This
invariant ci,j is defined as a quotient of two polynomials in the structure constants of J , for all
x, y ∈ J such that both polynomials are not zero and ci,j is independent of the choice of x, y.
3. METHODS
First of all, if J → J ′ and J 6∼= J ′, then dim Aut(J) < dim Aut(J ′), where Aut(J) is the space of
automorphisms of J . Secondly, if J → J ′ and J ′ → J ′′ then J → J ′′. If there is no J ′ such that J → J ′
and J ′ → J ′′ are proper degenerations, then the assertion J → J ′′ is called a primary degeneration. If
dim Aut(J) < dim Aut(J ′′) and there are no J ′ and J ′′′ such that J ′ → J , J ′′ → J ′′′, J ′
6→ J ′′′ and one
of the assertions J ′ → J and J ′′ → J ′′′ is a proper degeneration, then the assertion J 6→ J ′′ is called
a primary non-degeneration.
It suffices to prove only primary degenerations and non-degenerations to
describe degenerations in the variety under consideration. It is easy to see that any superalgebra degenerates
to the superalgebra with zero multiplication. From now on we will use this fact without mentioning it.
Let us describe the methods for proving primary non-degenerations. The main tool for this is the follow-
ing lemma.
Lemma 1. If J → J ′ then the following hold:
(1) dim(J r)i ≥ dim(J ′r)i, for i ∈ Z2;
(2) (J)0 → (J ′)0;
(3) a(J) → a(J ′);
(4) If the Burde invariant exist for J and J ′, then both superalgebras have the same Burde invariant;
(5) If J is associative then J ′ must be associative. In fact, if J satisfies a P.I. then J ′ must satisfy the
same P.I.
In the cases where all of these criteria can't be applied to prove J 6→ J ′, we will define R by a set of
polynomial equations and will give a basis of V , in which the structure constants of λ give a solution to all
these equations. We will omit everywhere the verification of the fact that R is stable under the action of
the subgroup of upper triangular matrices and of the fact that µ 6∈ R for any choice of a basis of V . These
verifications can be done by direct calculations.
Degenerations of Graded algebras. Let G be an abelian group and let V(F) be a variety of algebras
defined by a family of polynomial identities F. It is important to notice that degeneration on the G-graded
variety GV(F) is a more restrictive notion than degeneration on the variety V(F), In fact, consider A, A′ ∈
GV(F) such that A, A′ ∈ V(F), a degeneration between the algebras A and A′ may not give rise to a
degeneration between the G-graded algebras A and A′, since the matrices describing the basis changes in
GV(F) must preserve the G-graduation. Hence, we have the following result.
Lemma 2. Let A, A′ ∈ GV(F) ∩ V(F). If A 6→ A′ as algebras, then A 6→ A′ as G-graded algebras.
4
4. MAIN RESULT
In this section we describe all degenerations and non-degenerations of 3-dimensional Jordan superalge-
bras. Note that, there is only one (trivial) Jordan superalgebra of the type (0, 3); the variety of 3-dimensional
Jordan algebras (Jordan superalgebras of the type (3, 0)) has 19 non isomorphic algebras with non zero
multiplication, in particularly, 5 algebras are rigid. The full description of all degenerations and non-
degenerations of 3-dimensional Jordan algebras was given in [15]. The rest of the section is dedicated to
study of degenerations of Jordan superalgebras of types (1, 2) and (2, 1).
4.1. Jordan Superalgebras of type (1, 2).
4.1.1. Algebraic classification. As was noticed the algebraic classification of Jordan superalgebras of the
type (1, 2) was received in [30]. In the next table we give this classification with some additional useful
information about these superalgebras.
Table 1. (1, 2)-Dimensional Jordan superalgebras.
J multiplication tables
U s
1
S2
1
S3
1
S2
2
S3
2
S3
3
e1e1 = e1
e1e1 = e1, e1f1 = 1
2 f1
e1f1 = f2, f1f2 = e1
e1e1 = e1, e1f1 = f1
f1f2 = e1
e1f1 = f2
S3
4
S3
5
S3
6
S3
7
S3
8
e1e1 = e1, e1f1 = f1, e1f2 = 1
2 f2
e1e1 = e1, e1f1 = 1
2 f1, e1f2 = 1
e1e1 = e1, e1f1 = f1, e1f2 = f2
2 f2
e1e1 = e1, e1f1 = 1
2 f1, e1f2 = 1
2 f2, f1f2 = e1
e1e1 = e1, e1f1 = f1, e1f2 = f2, f1f2 = e1
dim Aut(J)
4
2
2
2
4
3
2
4
4
3
3
ci,j
1
2
6 ∃
2
6 ∃
6 ∃
(cid:16)2+( 1
(cid:16)1+2( 1
2 )j(cid:17)
2)j(cid:17)
2 )i(cid:17)(cid:16)2+( 1
2 )i+j(cid:17)
(cid:16)2+( 1
2 )i(cid:17)(cid:16)1+2( 1
2)i+j(cid:17)
(cid:16)1+2( 1
3
2 )i(cid:17)(cid:16)1+2( 1
2)i+j(cid:17)
(cid:16)1+2( 1
3
(cid:16)1+2( 1
2)j(cid:17)
type
associative
non-associative
non-associative
associative
associative
associative
non-associative
non-associative
associative
non-associative
non-associative
4.1.2. Degenerations.
Theorem 3. The graph of primary degenerations for Jordan superalgebras of dimension (1, 2) has the
following form:
S 3
4
S 3
3
S 3
6
S 2
2
U s
1
S 3
1
S 3
7
S 2
1
S 3
8
S 3
5
S 3
2
C1,2
Proof. We prove all required primary degenerations in Table 2 below. Recall that an associative superalge-
bra can only degenerate to an associative superalgebra. Let us consider the first degeneration S2
3 to
clarify this table. Write nonzero products in S2
1 → S3
1 in the basis Et
1, F t
1, F t
2:
Et
1Et
1 = tEt
1, Et
1F t
1 = te1(f1 − 2t−1f2) =
t
2
(f1 − 2t−1f2) + f2 =
t
2
1 + F t
F t
2.
It is easy to see that for t = 0 we obtain the multiplication table of S3
considered in the same way.
3 . The remaining degenerations can be
Table 2. Primary degenerations of Jordan superalgebras of dimension (1, 2).
degenerations
parametrized bases
5
3
3
S 2
S 2
S 3
S 3
S 3
S 3
S 3
S 3
S 3
1 → S 3
2 → S 3
1 → S 3
1 → S 3
4 → S 3
7 → S 3
7 → S 3
8 → S 3
8 → S 3
5
6
3
2
3
2
2
Et
Et
Et
Et
Et
Et
Et
Et
Et
1 = te1, F t
1 = te1, F t
F t
1 = e1,
F t
1 = e1,
1 = te1, F t
1 = te1, F t
F t
1 = e1,
1 = te1, F t
F t
1 = e1,
1 = f1 − 2t−1f2, F t
1 = f1 − t−1f2,
F t
F t
1 = tf1,
F t
1 = tf1,
1 = f1 − 2t−1f2, F t
F t
1 = tf1,
F t
1 = f1,
F t
1 = tf1,
F t
1 = tf1,
2 = f2
2 = f2
2 = tf2
2 = tf2
2 = f2
2 = f2
2 = tf2
2 = f2
2 = f2
The primary non-degenerations are proved in Table 3.
Table 3. Primary non-degenerations of Jordan superalgebras of dimension (1, 2).
2
non-degenerations
S 3
S 3
S 3
S 3
S 2
3 6→ S 3
3 6→ U s
7 6→ U s
4 6→ S 3
1 6→ S 3
1 , S 3
1 , S 3
7 , S 3
2 ; S 3
6 ; S 3
6 ; S 3
8 , U s
1 , S 3
4 6→ S 3
8 , U s
3 ; S 2
1 6→ S 3
8 6→ U s
5 , S 3
2 ; S 2
7 , S 3
1 , S 5
6; S 2
2 6→ S 3
2 ;
1 , S 3
6
5 , S 3
1 6→ S 3
1 , S 3
6
2 6→ U s
7 , S 3
8 , U s
1 , S 3
5 , S 3
6 ;
reason
dim(J 2)0 < dim(J ′2)0
J0 6→ J ′
0
ci,j
a(J) 6→ a(J ′)
✷
4.1.3. Irreducible components and rigid algebras. Using Theorem 3, we describe the irreducible compo-
nents and the rigid algebras in JS1,2.
Corollary 4. The irreducible components of JS1,2 are:
C1 = O(U s
C2 = O(S2
C3 = O(S3
C4 = O(S2
C5 = O(S3
C6 = O(S3
C7 = O(S3
1 ) = {U s
1) = {S2
1) = {S3
2) = {S2
4) = {S3
7) = {S3
8) = {S3
1 , C1,2} :
1 , S3
1 , S3
2 , S3
4 , S3
5 , S3
8 , S3
3 , C1,2};
3 , C1,2};
3 , S3
3 , C1,2};
2 , C1,2};
2 , S3
2 , C1,2};
6 , C1,2};
In particular, Rig(JS1,2) = {U s
1 , S2
1 , S3
1 , S2
2 , S3
4 , S3
7 , S3
8}.
4.2. Superalgebras of type (2, 1). In this section we describe all possible primary degenerations between
Jordan superalgebras of dimension (2, 1). First of all, notice that every Jordan superalgebra of dimension
(2, 1) has trivial odd product, so it can be considered as a Jordan algebra of dimension 3. However, the graph
of primary degenerations of Jordan superalgebras of dimension (2, 1) is not a subgraph of the primary
degenerations of de Jordan algebras of dimension 3.
In fact, there exist Jordan superalgebras, without
degenerations between them, such that they degenerate as Jordan algebras. Take for example S2
1 and
Bs
1 → Bs
1
as Jordan algebras. Notice that this basis change does not preserve the Z2-graduation. Moreover, we shall
prove that S2
1 (see Table 5), Taking the basis change: Et
1 = te2, it follows that S2
2 = f1 and F t
1 = e1, Et
2 ⊕ U s
2 ⊕ U s
1 as Jordan superalgebras.
1 6→ Bs
2 ⊕ U s
6
4.2.1. Algebraic classification. In the next table we provide the classification of (2, 1)-dimensional Jordan
superalgebras with some additional useful information about these superalgebras.
Table 4. (2, 1)-Dimensional Jordan superalgebras.
J
2U s
1
U s
1
Bs
1
Bs
2
Bs
3
S2
1 ⊕ U s
1
S2
1
S2
2 ⊕ U s
1
S2
2
S3
9
S3
10
S3
11
S3
12
S3
13
Multiplication tables
e1e1 = e1, e2e2 = e2
e1e1 = e1
e1e1 = e1, e1e2 = e2
e1e1 = e1, e1e2 = 1
2 e2
e1e1 = e2
e1e1 = e1, e2e2 = e2, e1f1 = 1
e1e1 = e1, e1f1 = 1
e1e1 = e1, e2e2 = e2, e1f1 = f1
e1e1 = e1, e1f1 = f1
e1e1 = e1, e1e2 = e2, e1f1 = 1
2 f1
e1e1 = e1, e1e2 = e2, e1f1 = f1
2 e2, e1f1 = 1
e1e1 = e1, e1e2 = 1
e1e1 = e1, e1e2 = 1
2 e2, e1f1 = f1
e1e1 = e1, e2e2 = e2, e1f1 = 1
2 f1
2 f1
2 f1
2 f1, e2f1 = 1
2 f1
dim Aut(J) Type
1
2
2
3
3
1
2
1
2
2
2
3
3
1
associative
associative
associative
non-associative
associative
non-associative
non-associative
associative
associative
non-associative
associative
non-associative
non-associative
non-associative
4.2.2. Degenerations.
Theorem 5. The graph of primary degenerations for Jordan superalgebras of dimension (2, 1) has the
following form:
S 2
1
⊕ U s
1
S 3
13
S 2
2
⊕ U s
1
2U s
1
S 3
9
S 2
1
S 3
10
S 3
12
U s
1
Bs
3
C2,1
S 2
2
Bs
1
S 3
11
Bs
2
Proof. We prove all required primary degenerations in Table 5 below. For clarifying this table was conside-
red an example in the proof of the theorem 3.
Table 5. Primary degenerations of Jordan superalgebras of dimension (2, 1).
7
parametrized bases
1 → U s
1 → S 2
1 → S 3
3
1
1
3
degenerations
2U s
2U s
U s
Bs
S 2
S 2
S 2
S 2
S 2
S 2
S 2
S 2
S 3
S 3
S 3
S 3
1 → U s
1 → Bs
1 → Bs
1 → Bs
1 ⊕ U s
1 ⊕ U s
1 ⊕ U s
1 → Bs
2 → Bs
2 ⊕ U s
2 ⊕ U s
2 ⊕ U s
9 → Bs
10 → Bs
13 → S 2
13 → S 3
10
3
3
3
3
1
1 → S 2
1 → U s
1 → S 3
Et
Et
Et
Et
1 Et
1 Et
9 Et
Et
Et
2 Et
1 Et
10 Et
Et
Et
Et
Et
1 = e1,
1 = e1 + e2,
1 = te1 + e2,
1 = te1 + e2,
1 = e2,
1 = e1,
1 = e1 + e2,
1 = te1 + e2,
1 = te1 + e2,
1 = e1,
1 = 1
1 = e1 + e2,
1 = te1 + e2,
1 = te1 − 1
1 = e1,
1 = e1 + e2,
Et
Et
Et
Et
Et
Et
Et
Et
Et
Et
Et
Et
Et
2 e2, Et
Et
Et
F t
2 = te2,
F t
2 = te2,
2 = t2e1,
F t
2 = −t2e1,
F t
F t
2 = te1,
F t
2 = te2,
F t
2 = te2,
2 = −t2e1,
F t
2 = t2e1,
F t
F t
2 = te2,
F t
2 = e1,
F t
2 = te2,
F t
2 = te2,
2 = t2e1 − te2, F t
F t
2 = te2,
F t
2 = te2,
1 = f1
1 = f1
1 = f1
1 = f1
1 = f1
1 = f1
1 = f1
1 = f1
1 = f1
1 = f1
1 = f1
1 = f1
1 = f1
1 = f1
1 = f1
1 = f1
t e2,
Primary non-degenerations between 3-dimensional Jordan algebras are given in [15], we use this result
and Lemma 2 to prove some primary non-degenerations, (see table 6).
12, and S2
From [15] it follows that 2U s
1 → Bs
1 → S2
9 → S3
2 , S2
2, S3
2 ⊕ U s
1 → Bs
1 as Jordan algebras; we
shall prove that they do not degenerate as Jordan superalgebras.
1 as Jordan superalgebras, then there exists a parameterized basis
First, suppose that S2
1 → Bs
2 ⊕ U s
Et
1 = a(t)e1 + b(t)e2, Et
1 , such that for t = 0 we obtain Bs
1 = Et
2 ⊕ U 2
for S2
that a(0) = c(0) = 0. Now, since Et
since Et
S2
2 ⊕ U s
2Et
1 6→ Bs
1. For the remaining cases see table 6.
1Et
2 = 0 at t = 0, it follows that d(0) = 0, showing that Et
2 = c(t)e1 + d(t)e2, F t
1. Since Et
1 = a(t)F t
1, it follows
1 it follows that a(t) = 0 and b(t) = 1 for all t, Finally,
2 = 0, for all t. This proves that
1 = x(t)f1
2F t
1 and Et
1 = c(t)F t
1Et
1F t
Table 6. Primary non-degenerations of Jordan superalgebras of dimension (2, 1).
non-degenerations
2U s
S 2
S 3
2U s
S 2
1 , S 2
2; S 3
2, S 3
2; S 2
1 6→ Bs
1 6→ S 2
1 6→ Bs
13 6→ Bs
1 6→ Bs
2 , S 3
9 6→ S 3
11, S 3
1 6→ S 3
1, S 2
1 ⊕ U s
12
9 , S 3
10, S 3
12; S 2
11, S 3
1 ⊕ U s
12
1 6→ Bs
2, S 3
11, S 3
12;
11, S 3
12; S 3
9 6→ Bs
2 , S 3
10; S 2
2 ⊕ U s
2, S 3
1 6→ S 2
11;
1 , S 3
9; S 3
13 6→ U s
1 , Bs
1, S 2
2 , S 3
9
reason
dim(J r)1 < dim((J ′)r)1
J0 6→ J ′
0
J 6→ J ′ as Jordan algebras
✷
4.2.3. Irreducible components and rigid algebras. Using Theorem 5, we describe the irreducible compo-
nents and the rigid superalgebras in JS2,1.
Corollary 6. The irreducible components of JS2,1 are:
1 , Bs
1, Bs
3, C2,1};
3, S2
3, S2
1 ⊕ U s
2 ⊕ U s
1 , S2
1 , S2
1 , S3
2 , S3
9 , C2,1};
10, C2,1};
C1 = O(2U s
1 , U s
2, C2,1};
1 ) = {2U s
2) = {Bs
1 ⊕ U s
2 ⊕ U s
11) = {S3
12) = {S3
13) = {Bs
1 ) = {U s
1 ) = {U s
1 , Bs
1 , Bs
11, C2,1};
12, C2,1};
3, S2
1 , S3
C2 = O(Bs
C3 = O(S2
C4 = O(S2
C5 = O(S3
C6 = O(S3
C7 = O(S3
10, S3
13, C2,1}.
8
In particular, Rig(JS2,1) = {2U s
1 , Bs
2, S2
1 ⊕ U s
1 , S2
2 ⊕ U s
1 , S3
11, S3
12, S3
13}.
Acknowledgements. This work was started during the research stay of I. Kaygorodov at the Department
of Mathematics, parcially funded by the Coloquio de Matem´atica (CR 4430) of the University of Antofa-
gasta. The work was supported by RFBR 17-01-00258, by FOMIX-CONACYT YUC-2013-C14-221183
and 222870.
REFERENCES
[1] Alvarez M.A., Hern´andez I., On degenerations of Lie superalgebras, preprint.
[2] Ancochea Berm´udez J.M., Campoamor-Stursberg R., Garc´ıa Vergnolle L., S´anchez Hern´andez J., Con-
tractions d´algebres de Jordan en dimension 2, Journal of Algebra, 319 (2008), 6, 2395–2409.
[3] Ancochea Berm´udez J.M., Fres´an J., Margalef Bentabol J., Contractions of low-dimensional nilpotent
Jordan algebras, Communications in Algebra, 39 (2011), 3, 1139–1151.
[4] Armour A., Zhang Yi., Geometric classification of 4-dimensional superalgebras, Chapter Algebra,
Geometry and Mathematical Physics, 315 Springer Proceedings in Mathematics and Statistics, 85,
(2014), 291–323.
[5] de Azcarraga J., Izquierdo J., Picon M., Contractions of Filippov algebras, J. Math. Phys., 52 (2011),
1, 013516.
[6] Benes T., Burde D., Degenerations of pre-Lie algebras, J. Math. Phys., 50 (2009), 11, 112102, 9 pp.
[7] Benes T., Burde D., Classification of orbit closures in the variety of three-dimensional Novikov alge-
bras, J. Algebra Appl., 13 (2014), 2, 1350081, 33 pp.
[8] Burde D., Steinhoff C., Classification of orbit closures of 4-dimensional complex Lie algebras, Journal
of Algebra, 214 (1999), 2, 729–739.
[9] Cantarini N., Kac V., Classification of linearly compact simple Jordan and generalized Poisson super-
algebras, J. Algebra, 313 (2007), 100–124
[10] Casas J., Khudoyberdiyev A., Ladra M., Omirov B., On the degenerations of solvable Leibniz algebras,
Linear Algebra and its Applications, 439 (2013), 2, 472–487.
[11] Chouhy S., On geometric degenerations and Gerstenhaber formal deformations, arXiv:1708.02933
[12] Corrigan E., Hollowood T., The exceptional Jordan algebra and the superstring, Comm. Math. Phys.,
122 (1989), 3, 393–410.
[13] Couture M., Patera J., Sharp R. T., Winternitz P., Graded contractions of sl(3, C), J. Math. Phys., 32
(1991), 2310–2318.
[14] Elduque A., Laliena J., Sacrist´an S., Maximal subalgebras of Jordan superalgebras, J. of Pure and
Appl. Alg., 212 (2008), 11, 2461–2478.
[15] Gorshkov I., Kaygorodov I., Popov Yu., Degenerations of Jordan algebras, arXiv:1707.08836
[16] Grunewald F., O'Halloran J., Varieties of nilpotent Lie algebras of dimension less than six, J. Algebra,
112 (1988), 315–325.
[17] Grunewald F., O'Halloran J., A characterization of orbit closure and applications, J. Algebra, 116
(1988), 163–175.
[18] Hrivnak J., Novotny P., Patera J., Tolar J., Graded contractions of the Pauli graded sl(3, C), Linear
Algebra Appl., 418 (2006), 498–550.
[19] Jordan P., v. Neumann J., Wigner E., On an Algebraic Generalization of the Quantum Mechanical
Formalism, Annals of Mathematics (2), 35 (1934), 1, 29–64.
[20] Inonu E., Wigner E. P., On the contraction of groups and their representations, Proc. Natl. Acad. Sci.
U.S.A. 39 (1953), 510–524.
[21] Iordanescu R., Jordan structures in mathematics and physics, arXiv:1106.4415
[22] Ismailov N., Kaygorodov I., Volkov Yu., The geometric classification of Leibniz algebras,
arXiv:1705.04346
[23] Kashuba I., Patera J., Graded contractions of Jordan algebras and of their representations, Journal of
Physics A: Mathematical and General, 36 (2003), 50, 12453.
9
[24] Kaygorodov I., δ-derivations of simple finite-dimensional Jordan superalgebras, Algebra and Logic,
46 (2007), 5, 318–329.
[25] Kaygorodov I., δ-superderivations of semisimple finite-dimensional Jordan superalgebras, Mathemat-
ical Notes, 91 (2012), 2, 187–197.
[26] Kaygorodov I., Popov Yu., Volkov Yu., Degenerations of binary Lie and nilpotent Malcev algebras,
arXiv:1609.07392.
[27] Kaygorodov I., Popov Yu., Pozhidaev A., Volkov Yu., Degenerations of nilpotent Leibniz and Zinbiel
algebras, Linear and Multilinear algebra, 2018, arXiv:1611.06454
[28] Kaygorodov I., Volkov Yu., 2-dimensional algebras over algebraically closed fields, arXiv:1701.08233
[29] Lauret J., Degenerations of Lie algebras and geometry of Lie groups, Differential Geom. Appl., 18
(2003), 2, 177–194.
[30] Martin M.E.,
Shestakov
I., Classification
of
three-dimensional
Jordan
superalgebras,
arXiv:1708.01963
[31] Martinez C., Zelmanov E., Simple finite-dimensional Jordan superalgebras of prime characteristic, J.
Algebra, 236 (2001), 2, 575–629.
[32] Nesterenko M., Popovych R., Contractions of low-dimensional Lie algebras, J. Math. Phys., 47 (2006),
123515.
[33] Seeley C., Degenerations of 6-dimensional nilpotent Lie algebras over C, Comm. Algebra, 18 (1990),
3493–3505.
[34] Segal I. E., A class of operator algebras determined by groups, Duke Math. J., 18 (1951), 221–265.
[35] Svinolupov S., Jordan algebras and generalized Kortewegde Vries equations, Theoret. and Math.
Phys., 87 (1991), 3, 611–620.
[36] Weimar-Woods E., The three-dimensional real Lie algebras and their contractions, J. Math. Phys., 32
(1991), 2028–2033.
|
0805.2064 | 2 | 0805 | 2010-05-10T22:45:23 | KW-sections for exceptional type Vinberg's $\theta$-groups | [
"math.RA",
"math.GR"
] | Let $k$ be an algebraically closed field of characteristic not equal to 2 or 3, let $G$ be an almost simple algebraic group of type $F_4$, $G_2$ or $D_4$ and let $\theta$ be an automorphism of $G$ of finite order, coprime to the characteristic. In this paper we consider the $\theta$-group (in the sense of Vinberg) associated to these choices; we classify the positive rank automorphisms and give their Kac diagrams and we describe the little Weyl group in each case. As a result we show that all such $\theta$-groups have KW-sections, confirming a conjecture of Popov in these cases. | math.RA | math |
KW-sections for exceptional type Vinberg's θ-groups
Paul Levy
[email protected]
November 1, 2018
Abstract
Let k be an algebraically closed field of characteristic not equal to 2 or 3, let G be
an almost simple algebraic group of type F4, G2 or D4 and let θ be an automorphism
of G of finite order, coprime to the characteristic.
In this paper we consider the θ-
group (in the sense of Vinberg) associated to these choices; we classify the positive
rank automorphisms via Kac diagrams and we describe the little Weyl group in each
case. As a result we show that all θ-groups in types G2, F4 and D4 have KW-sections,
confirming a conjecture of Popov in these cases.
0
Introduction
Let G be a reductive algebraic group over the algebraically closed field k and let g = Lie(G).
Let θ be a semisimple automorphism of G of order m, let dθ be the differential of θ and let ζ
be a primitive m-th root of unity in k. (Thus if k is of positive characteristic p then p ∤ m.)
There is a direct sum decomposition
g = g(0) ⊕ . . . ⊕ g(m − 1) where g(i) = {x ∈ g dθ(x) = ζ ix}
This is a Z/mZ-grading of g, that is [g(i), g(j)] ⊂ g(i + j) (i, j ∈ Z/mZ). Let G(0) = (Gθ)◦.
Then G(0) is reductive, Lie(G(0)) = g(0) and G(0) stabilizes each component g(i). In [21],
Vinberg studied invariant-theoretic properties of the G(0)-representation g(1). The central
concept in [21] is that of a Cartan subspace, which is a subspace of g(1) which is maximal
subject to being commutative and consisting of semisimple elements. The principal results
of [21] (for k = C) are:
- any two Cartan subspaces of g(1) are G(0)-conjugate and any semisimple element of
g(1) is contained in a Cartan subspace.
- the G(0)-orbit through x ∈ g(1) is closed if and only if x is semisimple, and is unstable
(that is, its closure contains 0) if and only if x is nilpotent.
- let c be a Cartan subspace of g(1) and let Wc = NG(0)(c)/ZG(0)(c), the little Weyl group.
Then we have a version of the Chevalley restriction theorem: the embedding c ֒→ g(1)
induces an isomorphism k[g(1)]G(0) → k[c]Wc.
- Wc is a finite group generated by complex (often called pseudo-)reflections, hence k[c]Wc
is a polynomial ring.
In the case of an involution, the decomposition g = g(0) ⊕ g(1) is the symmetric space
decomposition, much studied since the seminal paper of Kostant and Rallis [10]. (Many of
1
the results of [10] were generalized to good positive characteristic by the author in [11].)
While the theory of θ-groups can in some ways be thought of as an extension of the theory
of symmetric spaces, there are certain differences of emphasis. Broadly speaking, one can
say that the results here on geometry and orbits are weaker than for symmetric spaces, but
the connection with groups generated by pseudoreflections is more interesting. Recall that
a KW-section is an affine linear subspace v ⊂ g(1) such that restricting to v induces an
isomorphism k[g(1)]G(0) → k[v]. A long-standing conjecture of Popov [16] is the existence of
a KW-section in g(1) for the action of G(0). In characteristic zero, this conjecture is known
to hold in the cases when G(0) is semisimple [14] and when g(1) contains a regular nilpotent
element of g (the 'N-regular' case) [15], both due to Panyushev.
In [12], the results of [21] were extended to the case where k has positive characteristic
p and G satisfies the standard hypotheses: (A) the derived subgroup G′ of G is simply-
connected, (B) p is good for G and (C) there exists a non-degenerate G-equivariant symmet-
ric bilinear form κ : g × g → k. (In fact, the first three results mentioned above hold for all
p > 2; the standard hypotheses are only required for the fourth.) Moreover, an analysis of
the little Weyl group and an extension of Panyushev's result on N-regular automorphisms
revealed that KW-sections exist for all classical graded Lie algebras in zero or odd positive
characteristic. This leaves Popov's conjecture open in the following cases: (i) G is of excep-
tional type, and (ii) G is simply-connected of type D4, p > 3 and θ is an outer automorphism
of G such that θ3 is inner. Following Vinberg, we refer to all such cases as exceptional type
θ-groups.
In characteristic zero the automorphisms of finite order were classified by Kac [8]. In Sect.
2 we show that Kac's classification is valid in characteristic p, restricting to automorphisms
of order coprime to p. (The extension of Kac's results to positive characteristic was already
outlined by Serre [18].) Subsequently, we determine (Sect. 4) the positive rank exceptional
θ-groups of types F4, G2 and D4 and describe (Sect. 5) the corresponding little Weyl groups.
(The rank of an automorphism is the dimension of a Cartan subspace, thus θ is of positive
rank if and only if the invariants are non-trivial.) Our method is a continuation of the
method used in [12] to determine the Weyl group for the classical graded Lie algebras in
positive characteristic. In particular, given an automorphism θ let T be a θ-stable maximal
torus such that Lie(T ) contains a Cartan subspace. Then θ = Int nw where nw ∈ NAut G(T ),
and w = nwT ∈ NAut G(T )/T is either of order m, or is trivial (in which case θ is of zero
rank). Using Carter's classification of conjugacy classes in the Weyl group, this approach
gives us a relatively straightforward means to determine the positive rank automorphisms
and their Weyl groups (see Tables 1-3). This classification allows us to show that all θ-groups
in types G2, F4 or D4 have KW-sections (see Thm. 5.11):
Theorem. Any θ-group of type G2, F4 or D4 admits a KW-section.
Together with [12], this leaves only the θ-groups of type E to deal with. These will be
dealt with in subsequent work with B. Gross, M. Reeder and J-K. Yu.
Notation.
Throughout, G will denote an almost simple (semisimple) algebraic group and g its Lie
algebra. If T is a maximal torus of G and α ∈ Φ(G, T ) then we denote the corresponding
coroot by α∨, which we can also consider as a cocharacter k× → T . If H is a subgroup of
G then NG(H) (resp. ZG(H)) will denote its normalizer (resp. centralizer) in G. Similar
notation will be used for elements of G and subalgebras or elements of g. The connected
component of an algebraic group H is denoted H ◦; the derived subgroup of a connected
2
algebraic group is denoted H ′. We denote by µs the cyclic group of order s. Throughout the
paper we will assume that m is coprime to the characteristic of k, if this is positive.
Acknowledgements.
I would like to thank Ross Lawther for directing me towards the paper of Carter. I have
also benefited from numerous helpful comments from Dmitri Panyushev, Oksana Yakimova,
Willem de Graaf, Jiu-Kang Yu, Benedict Gross, Mark Reeder and Gunter Malle.
1 Preparation
We continue with the basic set-up of the introduction. Here we recall some results and
definitions which will be necessary in what follows.
Let Φ be an irreducible root system with basis ∆ = {α1, . . . , αn}. Let α =Pn
i=1 miαi be
the longest root with respect to ∆. Recall that p is good for G if p > mi for all i, 1 ≤ i ≤ n;
otherwise p is bad. Specifically, p is bad if either: p = 2 and Φ is not of type A; p = 3 and Φ
is of exceptional type, or; p = 5 and Φ is of type E8. If Φ is a reducible root system, then p
is good for Φ if and only if p is good for each irreducible component of Φ; p is good for the
reductive group G if and only if it is good for the root system of G. We will sometimes refer
to the standard hypotheses on a group G: (A) that p = char k is good for G; (B) that G′ is
simply-connected; (C) that there exists a non-degenerate symmetric bilinear form g× g → k.
If G is simple and of exceptional type and p is good for G, then G is separably isogenous to
a group satisfying the standard hypotheses. (In particular, if G is of type F4 or G2 then (B)
and (C) are automatic as long as (A) is satisfied.)
Let T be any θ-stable torus in G.
If θ is an involution then it is not difficult to see
that there is a decomposition T = T+ · T−, where T+ = {t ∈ T θ(t) = t}◦ and T− = {t ∈
T θ(t) = t−1}◦. In [12] we introduced analogues of T± for an automorphism of arbitrary
finite order m (if the characteristic is positive, then we require p ∤ m). Let pd(x) be the
(monic) minimal polynomial of e2πi/d over Q. Since pd has coefficients in Z, we can (and
will) consider it as a polynomial in Fp[x] as well. If p ∤ d then pd(x) has no repeated roots in
i=0 aixi ∈ Z[x], let f (θ) denote the algebraic endomorphism
i=0 θi(tai). Then the map Z[x] → End T , f 7→ f (θ) is a homomorphism of
rings, where the addition in End T is pointwise multiplication of endomorphisms, and the
multiplication is composition.
k. For any polynomial f = Pn
T → T , t 7→ Qn
Lemma 1.1 ([12, Lemma 1.10]). For each dm, let Td = {t ∈ T pm/d(θ)(t) = e}◦. Then
i=0 t(i) where
T = Qdm Td and Td1 ∩ Td2 is finite for any distinct d1, d2. Moreover, t = Pm
t(i) = t ∩ g(i) and Lie(Td) =P(i,m)=d t(i).
Remark 1.2. An alternative description of the tori Td is given in [2]. Since θ is an alge-
braic automorphism of T , it induces an automorphism θ∗ of Y (T ) := Hom(k×, T ) given by
θ∗(λ)(t) = θ∗(λ(t)). Then set Y (Td) = ker pd(θ∗). This also allows us to define the tori Td
when m is divisible by p; however, in this case we do not have a direct sum decomposition
t = ⊕dm Lie(Td).
An immediate application of Lemma 1.1 is the following.
Lemma 1.3. Let T be a maximal torus of G and let w ∈ W = NG(T )/T be of order m
(p ∤ m) and have finitely many fixed points on T . Then any two representatives for w in
NG(T ) are T -conjugate, and have the same m-th power.
3
Proof. Suppose nw ∈ NG(T ) is such that w = nwT . We have T =Qim,i6=m Ti and therefore
tw(t)w2(t) . . . w−1(t) = 1 for all t ∈ T . Thus (nwt)m = nm
w for all t ∈ T . Moreover, since
Tm = {1}, the map T → T , t 7→ tw(t−1) is surjective. In particular, if t ∈ T then there
exists s ∈ T such that tnw = snws−1.
Let now θ be an automorphism of G of order m, let ζ be a primitive m-th root of 1 in
k and let g(i) = {x ∈ g dθ(x) = ζ ix}. A θ-stable torus in G is θ-split if T = T1, and
is θ-anisotropic if Tm = {e}, that is, if θ has finitely many fixed points on T . We recall
that a Cartan subspace of g(1) is a maximal subspace which is commutative and consists of
semisimple elements. We have the following results on Cartan subspaces.
Lemma 1.4. (a) Any two Cartan subspaces of g(1) are G(0)-conjugate, and any semisimple
element of g(1) is contained in a Cartan subspace.
(b) Let c be a Cartan subspace of g(1). There is a θ-split torus T1 in G such that
c ⊂ Lie(T1). We have dim T1 = dim c · ϕ(m), where ϕ(m) is the Euler number of m. (In
particular, dim(Lie(T1) ∩ g(i)) = dim c for any i coprime to m.) If p > 2, then T1 is unique.
(c) Let c be a Cartan subspace of g(1) and let Wc = NG(0)(c)/ZG(0)(c), the little Weyl
group. If char k 6= 2, then the embedding c ֒→ g(1) induces an isomorphism k[g(1)]G(0) →
k[c]Wc.
(d) If char k = 0 or if G satisfies the standard hypotheses, then Wc is generated by
pseudoreflections and k[c]Wc is a polynomial ring.
Proof. Part (a) is [21, Thm. 1], and [12, Thm. 2.5 and Cor. 2.6]. For (b), see [21, §3.1] and
[12, Lemma 2.7]. Part (c) was [21, Th. 7], [12, Thm. 2.20]. Finally, part (d) is Thm. 8 in
[21] and [12, Prop. 4.22].
We recall the following results of Steinberg [20, 7.5,9.16].
Lemma 1.5. (a) If θ is a semisimple automorphism of G then there is a θ-stable Borel
subgroup B of G and a θ-stable maximal torus T of B.
(b) Let π : G → G be the universal covering of G. Then there exists a unique automor-
phism θ of G such that π(θ(g)) = θ(π(g)) for all g ∈ G. Moreover, if θ is of order m then
so is θ.
Let G be a simple, simply-connected group and let g = Lie(G). Denote by Aut G
(resp. Aut g) the algebraic group of rational (resp. restricted Lie algebra) automorphisms
of G (resp. g). In characteristic zero it is well-known that all automorphisms of g arise as
differentials of automorphisms of G, and the corresponding map Aut G → Aut g is bijective.
This may fail to be true in small characteristic [6].
Lemma 1.6. If p > 2 then differentiation d : Aut G → Aut g is bijective.
Proof. If G = SL(n, k) then this was proved in [11, Lemma 1.4]. But if p > 2 then the
automorphism group of g as an abstract Lie algebra is isomorphic to Int G ⋊ D, where
D is the group of 'graph automorphisms' of the Dynkin diagram of G [6, II. Table 1].
Thus any automorphism of g is the differential of an automorphism of G, and the map
d : Aut G → Aut g is bijective.
4
2 Kac diagrams
Here we recall Kac's classification [8] of periodic automorphisms of simple Lie algebras in
characteristic zero, and show that the classification extends to positive characteristic (con-
sidering only those automorphisms of Lie(G) which arise as differentials of rational auto-
morphisms of G, and only automorphisms of order coprime to the characteristic). For more
details on the classification, we recommend chapters 6 to 8 of Kac's book [9]. Let G be almost
simple and simply-connected, let ∆ = {α1, . . . , αr} be a basis of the root system Φ(G, T )
and let ∆ = ∆ ∪ {α0} be a basis of the extended root system. Let {hα, eβ α ∈ ∆, β ∈ Φ} be
a Chevalley basis for G. Recall that Aut G is generated over Int G by finitely many (graph)
automorphisms, in particular Aut G/ Int G is finite. If θ is a (rational) automorphism of G
then the index of θ is the order of θ modulo the inner automorphisms.
For the time being, let k = C and let ζ = e2πi/m. To each automorphism σ of g of (finite)
order m, Kac associated an infinite-dimensional Lie algebra, the twisted loop algebra:
L(g, σ) =Xj∈Z
ti ⊗ gj ⊂ C[t, t−1] ⊗ g
where gj = {x ∈ g σ(x) = ζ jx}. Kac showed that twisted loop algebras are closely related to
the extended Dynkin diagram of g; the Dynkin diagrams for the "twisted" types s > 1 are
Theorem 2.1. a) If σ and θ are two periodic automorphisms of g of the same index, then
L(g, σ) ∼= L(g, θ). In particular, if σ is inner then L(g, σ) ∼= L(g, 1) = C[t, t−1] ⊗ g.
affine type Lie algebras. To explain this, letbg(s) denote the affine type Lie algebra associated
to g and s (for s the index of some automorphism of g): the Dynkin diagram of bg(1) is just
given below. It is well known that bz(s) = z(bg(s)) is one-dimensional and contained in the
derived subalgebra (bg(s))′ (which is of codimension 1 inbg(s)). Identify a basis of simple roots
forbg(1) with ∆. Let bΦ denote the root system ofbg(s).
b) L(g, σ) ∼= (bg(s))′/bz(s), where s is the index of σ.
c) The grading of L(g, σ) given by L(g, σ)i = ti ⊗ gi induces a grading of bg(s). There is
a Cartan subalgebra bh of bg(s), a basis Π = {β0, . . . , βl} of simple roots in bΦ and a sequence
(n0, . . . , nl) of non-negative integers such that the grading of bg(s) is the grading obtained by
putting bh in degree zero and bg(s)
d) In the notation of (c), the order of σ is m = s(Pl
the shortest positive imaginary root in bΦ.
e) Given a grading of bg(s) determined by a sequence (n0, . . . , nl) of non-negative in-
tegers as in (c) there is an induced Z/mZ-grading of g given by the isomorphism g ∼=
L(g, σ)/(tm, t−m)L(g, σ).
j=0 ajnj), where sδ = sPl
in degree ±ni.
±βi
j=0 ajβj is
Remark 2.2. a) Another way to express (c) is that the grading of ZΠ, considered as an
element of the affine apartment, is conjugate by an element of the affine Weyl group to a
point in either the fundamental alcove or its opposite.
b) It is easy to show that bz = {h ∈ bh hα, hi = 0 for all α ∈ bΦ}. Dually, the space
{χ ∈ bh∗ hχ, α∨i = 0 for all α ∈ bΦ} is one-dimensional, generated by δ.
δ = α0 +P aiαi, where P aiαi = α is the highest root of the (finite) root system Φ. For
s 6= 1 we mark the coefficients aj on the diagrams below.
If s = 1 then
The "twisted type" Dynkin diagrams are as follows (type A(2)
3
is given by D(2)
3 ):
5
A(2)
2n (n ≥ 2)
A(2)
2
❝ ✟❍ ❝
2
1
❡ ❍✟ ❡
2
1
A(2)
2n−1 (n ≥ 3)
❝ ✟❍ ❝
2
1
D(2)
n+1 (n ≥ 2)
❝ ✟❍ ❝
1
1
❝ ❍✟ ❝
2
2
❝
1
❝
❅
2
❅
❅
❝
1
❝ ❍✟ ❝
1
1
D(3)
4
E(2)
6
❝
1
❝
1
❝ ❍✟ ❝
1
2
❝
2
❝ ❍✟ ❝
2
3
❝
1
(The diagrams for A(2)
2n are not given in their usual orientation. This choice of orientation
is due to our 'type-free' choice of graph automorphism, see the discussion below.)
The information Π, (n0, . . . , nl) can be written in a diagram called a Kac diagram µ, which
is a copy of the Dynkin diagram of bg(s) with the coefficient ni written above the vertex βi.
The order of a Kac diagram µ is the sum s(a0n0 + . . .+ alnl). From now on, any Kac diagram
µ will be primitive, that is, it won't be possible to write µ as jµ′ for j > 1 and µ′ some other
Kac diagram. Then to each Kac diagram we can associate an automorphism (which we call
a Kac automorphism) of g of order m; Kac's theorem tells us that any automorphism of g
of order m is conjugate (possibly by an element of the outer automorphism group of g) to a
Kac automorphism of order m.
In the inner case it is easy to see what the Kac automorphism corresponding to µ is: it's
Ad t, where t ∈ T is such that αi(t) = ζ µ(αi) for 1 ≤ i ≤ r. (Here ζ = e2πi/m.) Then it is
immediate that α(t) = ζ −µ(α0) and that gt is generated by t and all g±αi, where µ(αi) = 0
(0 ≤ i ≤ r).
Example 2.3. We describe all (classes of) automorphisms of order 3 of a Lie algebra of type
F4. Here any automorphism is inner. The possible Kac diagrams of order 3 are 00100, 11000
and 10001. Thus there are three classes of automorphisms of order 3, with representatives
Int t1, Int t2, Int t3, t1, t2, t3 ∈ T satisfying:
(i) α1(t1) = α3(t1) = α4(t1) = 1, α2(t1) = ζ;
(ii) α2(t2) = α3(t2) = α4(t2) = 1, α1(t2) = ζ; and
(iii) α1(t3) = α2(t3) = α3(t3) = 1, α4(t3) = ζ.
We wish to generalise this construction to positive characteristic p. If p ∤ m then we can
do this by fixing a primitive m-th root ζ of unity, and continuing exactly as above. Here,
we need to specify that Int t is an automorphism of G with differential Ad t; while it is no
longer true in general that gt is generated by t and the subspaces gαi with µ(αi) = 0, it is
nevertheless true that the subgroup ZG(t)◦ is (reductive and is) generated by T and all root
subgroups U±αi (see, for example, [7, 26.3]) with µ(αi) = 0.
Now consider Kac diagrams of twisted type.
In order to extend Kac's classification
to positive characteristic, we will first give a precise description of the Kac automorphism
6
corresponding to each Kac diagram in characteristic zero, and then explain how to extend
this description to positive characteristic. For a given index s let γ be a graph automorphism
of the root system Φ which preserves the basis ∆, and by abuse of notation let γ also denote
the unique automorphism of g which satisfies γ(eα) = eγ(α) for α ∈ ±∆. (For each index
s there is a unique such graph automorphism of Φ unless g is of type D4 and s = 3; in
this case there are two such γ, which are mutually inverse and conjugate under the action
of the automorphism group of g. In this case let us fix the choice satisfying γ(α1) = α3.)
Let T (0) = (T γ)◦. For each α ∈ Φ let (α) be the set of all hγi-conjugates of α and let
4 ; α = α1 +α2 +α3 +2α4 +2α5 +α6 in type E(2)
g(α) =Pβ∈(α) gβ. Let α be a root which is longest subject to g(α) 6⊆ gγ. Specifically, we have:
1 αi in type D(2)
α = α for type A(2)
n ; α = α1+α2+α3
in type D(3)
6 . Let β0 be the hγi-conjugacy class
2n−1, D(2)
of −α and choose E±β0 ∈ g(∓α) as follows: in case A(2)
n
and E(2)
let Eβ0 = e−α + σ−1γ(e−α) + σγ2(e−α) and
6
E−β0 = eα +σγ(eα)+σ−1γ2(eα), where σ = e2πi/3. We label the node on the far left hand side
(as displayed in the diagrams above; on the top in type A(2)
2n−1) with β0. (As a character of
T (0), β0 is just (−α)T (0).) Note that [Eβ0, E−β0] = Hβ0 ∈ tγ satisfies [Hβ0, E±β0] = ±2E±β0.
The remaining nodes are all labelled by hγi-conjugacy classes in ∆. Specifically, we label
the nodes β1, . . . from left to right:
let E±β0 = e∓α − γ(e∓α); in case D(3)
4
2n−1; α =Pn−1
2n ; α =P2n−2
2n let E±β0 = e∓α; in cases A(2)
i=1 αi for type A(2)
- βi = {αi, α2n+1−i} for each i, 1 ≤ i ≤ n in type A(2)
- βi = {αi, α2n−i} for 1 ≤ i ≤ n − 1 (β1 appearing underneath β0) and βn = {αn} in type
2n , n ≥ 1,
A(2)
2n−1,
- βi = {αi} for 1 ≤ i ≤ n − 1 and βn = {αn, αn+1} in type D(2)
- β1 = {α1, α3, α4} and β2 = {α2} in type D(3)
4 ,
- β1 = {α1, α6}, β2 = {α3, α5}, β3 = {α4} and β4 = {α2} in type E6
n+1,
(2)
.
We can set E±βi = Pα∈βi
e±α for each i, 1 ≤ i ≤ n except for βn in A(2)
2n in which case
(p 6= 2 and) we set Eβn = eαn + eαn+1, E−βn = 2e−αn + 2e−αn+1. Note that (for 0 ≤ i ≤ n)
βi is a well-defined character on T (0) and Ad t(Eβi) = βi(t)Eβi for any t ∈ T (0). Moreover,
setting Hβi = [Eβi, E−βi] and letting hβi, βji be the Cartan numbers determined by the
twisted diagram, it is easy to establish the following commutation relations:
[Eβi, E−βj ] =(cid:26) 0
Hβi
if i 6= j,
if i = j,
[Hβi, E±βj ] = ±hβi, βjiE±βj , [E±βi, E±βj ] = 0 if hβi, βji = 0
and (ad Eβi)1−hβi,βji(Eβj ) = (ad E−βi)1−hβi,βji(E−βj ) = 0 for i 6= j. In addition, γ(Hβi) = Hβi
for all i and γ(E±βi) = E±βi for 1 ≤ i ≤ n. Thus, if I is a proper subset of Π then the
elements E±βi, βi ∈ I and tγ together generate a reductive subalgebra of g with root system
given by the subdiagram of the twisted affine diagram which contains exactly the vertices
corresponding to elements of I. With this set-up, let µ be a Kac diagram of twisted affine
i=0 µ(βi)mi, where mi are the coefficients indicated
on the twisted diagrams above.) There exists t ∈ T (0) such that βi(t) = ζ µ(βi) for 1 ≤ i ≤ n.
Let θµ = Ad t ◦ γ: then θµ is of order m, θµ(E±βi) = ζ ±µ(βi)E±βi for 0 ≤ i ≤ n and gθµ is the
reductive subalgebra of g generated by tγ and the E±βi such that µ(βi) = 0.
type, of order m. (The order of µ is sPn
We can also repeat the above construction in (coprime) positive characteristic, with the
following clarification. For each α ∈ Φ let Uα be the root subgroup of G corresponding to
α [7, 26.3]. There exists a unique isomorphism (of algebraic groups) ǫα : Ga → Uα such
that tǫα(x)t−1 = ǫα(α(t)x) for all t ∈ T , x ∈ k and (dǫα)0(1) = eα (see for example [7,
7
Thm. 26.3]). By abuse of notation, let γ denote the unique automorphism of G such that
γ(ǫα(x)) = ǫγ(α)(x) for α ∈ ±∆. Fixing a primitive m-th root of unity ζ, we can associate
an automorphism Int t ◦ γ of G to each Kac diagram µ (of order coprime to p). As before
we will say that the automorphism θµ constructed in this way is the Kac automorphism
associated to the Kac diagram µ. We note that γ is the Kac automorphism corresponding
orthogonal and the subgroups Uα, α ∈ βi commute, or βi = {αn, αn+1} in type A(2)
to µ with µ(βi) = (cid:26) 1 if i = 0,
i ≥ 1, if the roots in βi are orthogonal then let ǫ±βi : Ga → G, ǫ±βi(x) = Qα∈±βi
2n . For
ǫα(x) and
let U±βi = ǫ±βi(Ga) (unipotent subgroups of G). Then (dǫ±βi)0(1) = E±βi, where E±βi is
as defined in the paragraph above. For the case βn in type A(2)
2n we can construct ǫ±βn by
restricting to the subgroup of type A2 which contains U±αn and U±αn+1. Specifically, ǫβn(x) =
ǫαn(x/2)ǫαn+1(x)ǫαn(x/2) and ǫ−βn(x) = ǫ−αn(x)ǫ−αn+1(2x)ǫ−αn(x) define homomorphisms
ǫ±βn : Ga → Gγ such that (dǫ±βn)0(1) = E±βn, where E±βn are defined as in characteristic
zero. Finally, either:
Moreover, for βi ∈ Π, either all roots α ∈ βi are
0 otherwise.
- α is γ-stable, in which case we define ǫ±β0(x) = ǫ∓α(x);
- or s = 2 and γ(α) 6= α, in which case we set ǫ±β0(x) = ǫ∓α(x)γ(ǫ∓α(−x));
- or s = 3 and we set σ = ζ m/3, ǫβ0(x) = ǫ−α(x)γ(ǫ−α(σ−1x))γ−1(ǫ−α(σx)) and ǫ−β0(x) =
ǫα(x)γ(ǫα(σx))γ−1(ǫα(σ−1x)).
We have γ(ǫ±β0(x)) = ǫ±β0(−x) if s = 2, γ(ǫ±β0)(x) = ǫ±β0(σ±1x) if s = 3 and
(dǫ±β0)0(1) = E±β0, where E±β0 are defined as in characteristic zero. Let U±β0 = ǫ±β0(Ga).
Then each of the subgroups U±βi with µ(βi) = 0 is contained in G(0) = (Gθµ)◦. We recall [20,
8.1] that G(0) is reductive. Moreover, (T θµ)◦ = T (0) is regular in G by inspection, and hence
is a maximal torus of G(0). We claim that G(0) is generated by T (0) and the subgroups
U±βi with µ(βi) = 0. To see this, we remark first of all that dim g(0) is independent of the
characteristic. For if α ∈ Φ then let l(α) be the number of γ-conjugates of α (here either 1, 2
or 3). Then g(α) ∩g(0) is of dimension 1 if dθl(α)
(eα) = eα and of dimension 0 otherwise. Since
this description is clearly independent of the characteristic of k, it follows that the same can
be said of the dimension of g(0). Let ΦI be the root system with basis {βi ∈ Π : µ(βi) = 0}.
Then our assumption that p is coprime to the order of θµ implies that in all cases p is good
for ΦI except for one case in type D4
(the Kac diagram 100) with p = 2 and one case in
type E(2)
(the Kac diagram 10000) with p = 3. If p is good then E±βi, µ(βi) = 0 and tγ
6
generate a subalgebra of g which is isomorphic to the Lie algebra of a reductive group with
root system ΦI . Since the dimension is independent of the characteristic, this subalgebra
must be all of g(0). Now, since the subgroup of G generated by T (0) and the U±βi, µ(βi) is
contained in G(0), it must be reductive and have root system ΦI.
(3)
µ
4 and 10000 in type E(2)
This leaves only the Kac diagrams 100 in type D(3)
two classes: (i) those such that γ(eα) = eα (specifically ±α ∈ {α2,P4
6 ; in both cases
the corresponding Kac automorphism is just γ. In the first case the roots α ∈ Φ fall into
1 αi, α}), (ii) those
It is thus easy to see that dim g(α) ∩ gγ = 1 for all α and, setting
such that γ(α) 6= α.
Hβ1 = hα1 + hα3 + hα4, Hβ2 = hα2, E(α) = eα in case (i) and E(α) = eα + γ(eα) + γ−1(eα)
in case two, the set {Hβ1, Hβ2, E(α) α ∈ Φ} is a basis for gγ and satisfies the relations of a
Chevalley basis for a Lie algebra of type G2. (Hβ1 and Hβ2 are always linearly independent
since the centre of g is generated by hα1 + hα3 and hα1 + hα4.) Since G(0) contains T (0)
and the subgroups U±β1, U±β2, this shows that G(0) is generated by these subgroups and
is semisimple of type G2.
In the second case, even though p = 3 is not good for a root
8
system of type F4, it is nevertheless clear that the Lie subalgebra of g generated by tγ and
the E±βi, 1 ≤ i ≤ 4 is isomorphic to the Lie algebra of a semisimple group of type F4 (since
it contains all appropriate root subspaces for T (0)). Thus by the same argument as above
G(0) is generated by T (0) and the subgroups U±βi, 1 ≤ i ≤ 4.
We will now show that any automorphism of order m is Aut G-conjugate to a Kac auto-
morphism. For inner automorphisms, this result appeared in [18]. One approach would be
to construct the loop algebra L(g, σ) as in characteristic zero; but this would (presumably)
require the theory of Kac-Moody Lie algebras in positive characteristic. For inner automor-
phisms, a more direct proof is suggested by considering all Z/mZ-gradings of g, and reducing
the problem to the statement about the fundamental alcove for the affine Weyl group 2.2(a).
(This was the approach of [18], which also makes it possible to extend Kac's classification to
semisimple inner automorphisms of order p, that is, Z/pZ-gradings for which Lie(T ) ⊂ g(0).)
This argument could also be applied to the outer automorphisms by considering the appro-
priate Bruhat-Tits building; but here we avoid such technical machinery by expressing the
problem in terms of conjugacy classes in T (0).
Lemma 2.4. The number of elements of order m in a torus of rank n is independent of the
characteristic of the ground field, assuming this characteristic is either zero or coprime to
m.
Proof. Let T be a torus of rank n. There are mdim T elements t of T satisfying tm = 1.
Let φT (m) denote the number of elements of T of order m. Then φT (m) = mdimT −
Pdm,d6=m φT (d). Since φT (1) = 1, the lemma follows by induction.
Lemma 2.5. Let G be almost simple and of simply-connected or adjoint type. Then any
automorphism of G of finite order coprime to p is Aut G-conjugate to a Kac automorphism.
Proof. Let T be a maximal torus of G. Let Z(G) be the scheme-theoretic centre of G and
let G = G/Z(G) be the adjoint group of G. Clearly any automorphism of G induces an
automorphism of G. Moreover, the induced map Aut G → Aut G is injective by a standard
description of Aut G in terms of graph automorphisms and inner automorphisms. Thus we
may assume that G is of adjoint type. Now any semisimple inner automorphism of G is
conjugate to Int t for some t ∈ T . Let ¯W = NAut G(T )/T . Then two elements of T are
Aut G-conjugate if and only if they are ¯W -conjugate.
To each element t ∈ T of order m we associate the homomorphism λt : ZΦ → Z/mZ such
that α(t) = ζ λt(α). If µ is a Kac diagram of non-twisted type, then by the above discussion
the corresponding Kac automorphism of G is Int tµ, where λtµ(αi) = µ(αi) modulo m for
0 ≤ i ≤ n. The action of ¯W on Φ gives rise to an action on the set of homomorphisms
ZΦ → Z/mZ. Moreover, this action satisfies Z ¯W (t) = Z ¯W (λt) for t ∈ T of order m, and
thus Z ¯W (tµ) = Z ¯W (µ) for any Kac diagram µ.
It is possible for two distinct Kac diagrams to be conjugate by some element of W . In
our circumstances it is easier to describe when Kac automorphisms corresponding to Kac
diagrams µ1 and µ2 are conjugate by an element of ¯W : this holds if and only if there is an
isomorphism of diagrams µ1 → µ2 (that is, an isomorphism ψ of graphs which also satisfies
µ2(ψ(α)) = µ1(α) for each node α). Pick a set I of representatives for the ¯W -conjugacy
classes of Kac diagrams of order m. Then the number of automorphisms of the form Int t,
t ∈ T which are conjugate to a Kac automorphism of order m is Pµ∈I #( ¯W )/#(Z ¯W (µ)) =
Pµ∈I #( ¯W )/#(Z ¯W (tµ)). If char k = 0, then this sum is equal to the number of elements
9
of T of order m. But therefore it is equal to the number of elements of T of order m in
arbitrary characteristic.
Now, suppose θ is an outer automorphism of G. Since any semisimple automorphism
of G fixes some Borel subgroup of G and a maximal torus contained in it [20, 7.5], any
outer automorphism of G is conjugate to an automorphism of the form Int t ◦ γ, where
t ∈ T and γ is one of the graph automorphisms described above. Let T (0) = (T γ)◦ and
let T (1) = {t ∈ T γ(t) = t−1}◦. Then T is the almost direct product of T (0) and T (1) by
Lemma 1.1. Hence t = t0.t1 for some t0 ∈ T (0), t1 ∈ T (1). Thus there is some s ∈ T (1) such
that s2 = t1; then Int s−1 ◦ Int t ◦ γ ◦ Int s = Int ts−2 ◦ γ = Int t0 ◦ γ. Therefore any outer
automorphism of G is conjugate to an automorphism of the form Int t ◦ γ with t ∈ T (0).
We claim that Int t ◦ γ and Int s ◦ γ, for t, s ∈ T (0) are conjugate if and only if there
exists some g ∈ NGγ (T ) such that gtg−1 = s. Since G is adjoint, Int t ◦ γ and Int s ◦ γ are
conjugate if and only if there exists some x ∈ G such that xtγ(x−1) = s. Consider the Bruhat
decomposition x = unv of x, where u, v ∈ U and n ∈ NG(T ). We have xt = unt · (t−1vt) and
sγ(x) = (sγ(u)s−1) · sγ(n)γ(v), thus by uniqueness nt = sγ(n). In particular, nT ∈ W γ.
Now, a direct check shows that each element of W γ has a representative in Gγ (once again
using adjointness of G), thus s and t are NGγ (T )-conjugate.
It follows that the Int G-conjugacy classes of outer automorphisms of the form Int x◦γ are
in one-to-one correspondence with the W γ-conjugacy classes in T . Repeating the counting
argument used for inner automorphisms above, we deduce that any outer automorphism is
conjugate to a Kac automorphism.
From now on we will refer to the type of an outer automorphism of a simple group G
by specifying the type of its corresponding Kac algebra, but without the tilde. We note the
following corollary of the above result for inner automorphisms. In good characteristic this
was already known ([13, Prop. 30] or [17, Prop. 3.1]). Recall that a pseudo-Levi subgroup of
G is a subgroup of the form ZG(x)◦ for a semisimple element x of G. If I is a proper subset
of ∆ then we denote by LI the subgroup of G generated by T and all U±αi with αi ∈ I.
Corollary 2.6. The pseudo-Levi subgroups are the G-conjugates of subgroups of the form
LI , where I is a proper subset of the ∆ such that not all elements of ∆ \ I have coefficient
divisible by p in the expression for ν.
(If p is good then there is no restriction here. The groups LI which don't satisfy the
conditions of Cor. 2.6 are the centralizers of non-smooth diagonalizable subgroups [18].)
For later use we make the following observation.
Lemma 2.7. Suppose µ is a Kac diagram corresponding to a positive rank automorphism.
Then µ(α) ∈ {0, 1} for each α ∈ Π.
Proof. Suppose µ(α) > 1 for some α ∈ Π. Then Π′ = Π \ {α} is a union of Dynkin diagrams.
If µ corresponds to an inner automorphism then l = t ⊕Pβ∈ZΠ′ gβ is the Lie algebra of the
subgroup LΠ′ of G, in the notation introduced above. Moreover, the subspace spanned by all
gβ, where β is non-zero and has non-negative coefficients in the elements of Π′, is contained
in the Lie algebra uΠ′ of a maximal unipotent subgroup of LΠ′. In particular, g(1) ⊂ uΠ′
and thus does not contain any semisimple elements.
Suppose therefore that µ is an outer automorphism of G. If µ(βi) > 1 for some i then let
µ′ be the Kac diagram with µ′(βj) = δij. There is a Kac automorphism ψ of G corresponding
to µ′. Moreover, it follows from the description of Kac automorphisms that g(1) ⊂ gdψ. But
θGψ is a zero-rank (inner) automorphism by the same argument as above.
10
3 Carter's classification of conjugacy classes
Let W be a Weyl group with natural real representation V . Here we recall the set-up of the
classification, according to Carter [3] of the conjugacy classes in W . Any element w of W can
be expressed as a product w = w1w2, where w2
2 = 1 and {v ∈ V w1 · v = −v} ∩ {v ∈
V w2 · v = −v} = {0}. Moreover, any involution w′ ∈ W can be expressed as a product of l
reflections corresponding to orthogonal roots, where l = dim{v ∈ V w′(v) = −v}. Thus let
sα (i = 1, 2). Then this gives
an expression for w as a product of reflections corresponding to l1 + l2 = dim V − dim V w
roots, where li = dim{v ∈ V wi(v) = −v}, i = 1, 2. Associate a graph Γ to w with one
I1, I2 be subsets of Φ with #(Ii) = l(wi) such that wi =Qα∈Ii
node for each root in I1` I2 and hα, βihβ, αi edges between nodes corresponding to distinct
1 = w2
roots α, β ∈ I1 ∪ I2. The graph Γ constructed in this way is the admissible diagram
associated to w. Less formally, we will say that w has Carter type Γ. (In fact, it is possible
to have two different such expressions for w giving rise to two different diagrams, and on
the other hand, non-conjugate elements can have the same admissible diagram. The first
problem Carter solved simple by making a particular choice of admissible diagram for each
conjugacy class. For the second problem, which only occurs in types D and E, some classes
are marked with a single prime and others with a double prime. There are never more than
two classes for the same admissible diagram [3].) For example, if Γ is the Dynkin diagram
for W then w is a Coxeter element of W , while if Γ is the trivial graph then w is the
identity element. The irreducible admissible diagrams are classified and their characteristic
polynomials determined in [3, Tables 2-3]. We will say that an admissible diagram Γ has
order N if an element of the corresponding conjugacy class has order N. Let w be an element
of W with admissible diagram Γ. We denote by Φ1 the (closed) subsystem of Φ spanned by
the elements of Γ, and by Φ2 the set of roots α ∈ Φ which are orthogonal to all roots in Φ1.
In [3, Tables 8-12], Carter lists the conjugacy classes in the exceptional type Weyl groups,
classified by admissible diagrams, and gives the number of elements in each class (and thus
the number of elements in the centralizer of an element of a given class). Following Carter's
notation, we will use a tilde to denote a subsystem consisting of short roots.
Example 3.1. We give some examples to illustrate the above notions.
a) Let W = Sn, the symmetric group on n letters. Then the admissible diagram corre-
ponding to an m-cycle is a Coxeter graph of type Am−1. More generally, any element w of
W is a product of disjoint cycles, of length m1, . . . , mr say. Then the admissible diagram
for w is a disjoint union of Coxeter graphs Am1−1, . . . , Amr−1. We say that w is of type
Am1−1 × . . . × Amr−1. In this case Φ1 is isomorphic to the union Am1−1 ∪ . . . ∪ Amr−1 and Φ2
is isomorphic to An−m1−...−mr−1.
b) If W is a Weyl group of type Bn then any element w ∈ W can be decomposed as a
product of signed cycles: a positive m-cycle has order m, and a negative m-cycle has order
2m. The admissible diagram for a positive m-cycle is a Coxeter graph of type Am−1; the
admissible diagram for a negative m-cycle is a Coxeter graph of type Bm. If w is a positive
m-cycle then Φ2 is isomorphic to Bn−m unless m = 2, in which case Φ2 is isomorphic to
Bn−2 ∪ A1. If w is a negative m-cycle then Φ2 is isomorphic to Dn+1−m.
c) If W is a Weyl group of type Dn then W is contained in a Weyl group of type Bn.
Thus any element of W can also be expressed as a product of disjoint signed cycles. (On the
other hand, two elements of W may have the same signed cycle type but not be conjugate
in W .) A product w of two negative 2-cycles has admissible diagram labelled D4(a1).
We want to ensure that all of the relevant information from [3] can also be applied in
11
positive characteristic, including the information about the characteristic polynomials of
elements of W . Consider the 'natural' representation of W to be its representation in a
Cartan subalgebra of the corresponding complex simple Lie algebra. For w ∈ W , denote by
cw(t) the characteristic polynomial of w in this natural representation.
Lemma 3.2. Let char k = p > 0 and let G be a simple group over k with root system
Φ = Φ(G, T ), where T is a maximal torus of G. Then the minimal polynomial of w as an
automorphism of t = Lie(T ) is just the reduction modulo p of cw(t).
Proof. Given a basis {χ1, . . . , χn} of the lattice of cocharacters Y (T ) we can associate a
matrix A ∈ GL(n, Z) to w by: w(χi) = Pj Ajiχj. Since w(dχi(1)) = Pj Ajidχj(1) and
{dχ1(1), . . . , dχn(1)} is a basis of t, clearly the characteristic polynomial of w as an element
of GL(t) is just the reduction modulo p of the characteristic polynomial of A. On the other
hand, the characteristic polynomial of A is invariant under change of basis in Y (T ) ⊗Z Q,
and in particular is the same if one replaces G by its universal covering. But now one can
choose a basis for Y (T ) consisting of the α∨ where α is a simple root. Since the matrix thus
associated to w is clearly independent of the characteristic, its characteristic polynomial
must be equal to cw(t).
Lemma 3.3. Let G, T, t, Φ, W, w, Φ1, Φ2 be as above and suppose that w has order m, p ∤ m.
Let U = {t ∈ t w(t) = ζt}, where ζ is a primitive m-th root of unity in k. Then any element
of W (Φ2) acts trivially on U.
Proof. Since G is simply-connected, t is spanned by elements hα, with α in a basis of simple
roots. Let tΦ1 be the linear span of the hα with α ∈ Φ1 and let V = {t ∈ t dα(t) = 0 ∀α ∈
Φ1}. Then t = tΦ1 ⊕ V by consideration of dimensions, and clearly U ⊂ tΦ1. But if β ∈ Φ2
then sβ(hα) = hα for all α ∈ Φ1, thus any element of W (Φ2) acts trivially on U.
We remark that a suitable generalization of Lemma 3.3 holds for any orthogonal subsys-
tems Φ1, Φ2 and an element w ∈ W (Φ1).
4 Determination of positive rank automorphisms
In this section we give details of the calculations we use to determine the positive rank
automorphisms. Assume that G is simple, simply-connected and of exceptional type, and
that char k is either zero or a good prime for G. (If G is simple and of exceptional type, then
the assumption that p is good implies that G is separably isogenous to a group satisfying the
standard hypotheses.) In particular we assume that p > 3, and therefore that all elements
of a Weyl group of type G2 or F4 are semisimple. (We recall that W (G2) is a dihedral group
of order 12, and W (F4) has order 1152 = 27.32.) Let c be a Cartan subspace of g(1) and let
T1 be the (unique) maximal θ-split torus of G such that c ⊂ Lie(T1) (Lemma 1.4(b)). Recall
that ZG(c)◦ = ZG(T1) [12, Rk. 2.8(c)]; since G is simply-connected, ZG(c) is connected and
hence equals ZG(T1). Let T (0) be a maximal torus of ZG(0)(c)◦. Then ZG(T (0)) ∩ ZG(c)
is a θ-stable maximal torus of G [12, Lemma 4.1]. In this section we will fix c and T (0),
and set T = ZG(T (0)) ∩ ZG(c), t = Lie(T ). With this assumption on T , we make some
straightforward observations.
Lemma 4.1. Suppose θ is inner. Then θ = Int nw, where nw ∈ NG(T ). Moreover, either
w = nwT has order m, or nw ∈ T and θ is of zero rank.
12
Proof. Since T is θ-stable, the first statement is obvious. But if nw has order less than
m, then {t ∈ t dθ(t) = ζt} is trivial, and therefore by our choice of T , T (0) = T and
nw ∈ T .
In fact, we can make a more precise statement than this.
Lemma 4.2. Either nw ∈ T or w = nwT has Carter type Γ(1) × . . . × Γ(l), where the Γ(i),
1 ≤ i ≤ l are disjoint irreducible diagrams and at least one has order m.
Proof. Let Φ(i) be the smallest root subsystem of Φ containing all the elements of Γ(i), let
t(i) be the vector subspace of t spanned by all hα with α ∈ Φ(i) and let w = w(1) . . . w(l),
where w(i) is a product of reflections corresponding to the vertices of Γ(i). (Here we define
hα = dα∨(1).) Since the roots in Γ(1) ∪ . . . ∪ Γ(l) are linearly independent ([3, §4]), and since
G is simply-connected, it follows that t contains the direct sum t(1) ⊕ . . . ⊕ t(l). Clearly w
preserves each of the subspaces Φ(i) and acts on Φ(i) by w(i). Hence {t ∈ t w(t) = ζt} is
spanned by the subspaces {t ∈ t(i) w(i)(t) = ζt}. In particular, if none of the w(i) has order
m then c is trivial, hence so is w by our assumption on T (0).
Lemma 4.2 excludes certain possibilities for w, such as an element of type A1 × A2 (since
here m = 6, but no irreducible subdiagram has order 6). Later we will see that in fact each
of the Γ(i) must have order m. (This was already established for the classical case in [12].
For outer automorphisms the situation is more complicated.)
Lemma 4.3. Let G be simple and simply-connected group and let h be the Coxeter number
of G. Assume the characteristic of the ground field is coprime to h. If nw ∈ NG(T ) is such
that w = nwT is a Coxeter element in W , then Int nw is an automorphism of G of order h
and the corresponding Kac diagram is the diagram with 1 on every node.
r (αr(tr−1)) . . . α∨
w ∈ Z(G). Clearly t = nh
Proof. For the first part we just have to show that nh
w satisfies
w(t) = t. We claim that this implies αi(t) = 1 for each i, hence t = Z(G). To prove the
claim, we may assume that w = sαr . . . sα1 where {α1, . . . , αr} is a basis of simple roots
of Φ(G, T ). Let t0 = t, ti = sαi . . . sα1(t) for 1 ≤ i ≤ r. Then ti+1 = ti · α∨
i+1(αi(ti)).
Hence t = t · α∨
1 (α1(t)). Since G is simply-connected, this implies that
αr(tr−1) = . . . = α1(t) = 1. But then t = t1 = . . . = tr−1, thus αi(t) = 1 for 1 ≤ i ≤ r.
Therefore t ∈ Z(G). Now, since any two maximal tori of G are conjugate, any two Coxeter
elements in W are conjugate, and any two representatives of a Coxeter element w are T -
conjugate by Lemma 1.3, it follows that there is a unique conjugacy class C of automorphisms
of G which act as a Coxeter element on some maximal torus. We claim that the Kac
automorphism corresponding to the Kac diagram with 1 on every node is of positive rank.
Indeed, it follows from the fact that p ∤ h that G satisfies the standard hypotheses. Thus we
regular nilpotent element, let λ : k× → T be the unique cocharacter such that α(λ(t)) = t2
for α ∈ ∆ and let m be an Ad λ(k×)-stable subalgebra of u− such that g = u− ⊕ [e, g]. (Here
can construct a KW-section for the adjoint representation as follows: let e =Pα∈∆ eα be a
u− = Pα∈−Φ+ gα.) Then e + m is a KW-section and hence e + m is non-nilpotent for any
non-zero m ∈ m. Now, since m is Ad λ(k×)-stable, we must have e− α ∈ m, and therefore
c = e + e− α ∈ g(1) ∩ (e + m). Since c is not nilpotent, we deduce that the Kac automorphism
with all coefficients equal to 1 is positive rank. Since it is the only Kac automorphism of
order h with coefficients 1 or 0, the lemma follows.
13
We will say that an automorphism which is conjugate to Int nw, where nw ∈ NG(T )
represents a Coxeter element in W , is a Coxeter automorphism. By Lemma 4.3, the Coxeter
automorphisms form a single conjugacy class in Int G. The following lemma is presumably
known, but we could not find a clear reference in the literature.
Lemma 4.4. Let nw ∈ NG(T ) be such that nwT represents a Coxeter element in W . Assume
p is coprime to h as before. Then nh
w is as follows:
a) G = SL(n, k), then h = n and nh
b) G = Spin(2n + 1, k), then h = 2n and nh
w = I if n is odd, nh
w = −I if n is even.
w = 1 if n ≡ 0 or 3 modulo 4, while
nh
w = α∨
n(−1) otherwise.
c) G = Sp(2n, k), then h = 2n and nh
d) G = Spin(2n, k) then h = 2(n − 1) and nh
w = −I.
nh
w = α∨
n−1(−1)α∨
n(−1) otherwise.
w = 1 if n ≡ 0 or 1 modulo 4, while
e) G of type G2 (resp. F4, E6, E8) then h = 6 (resp. h = 12, h = 12, h = 30) and
nh
w = 1.
g) G of type E7, then h = 18 and nh
w = α∨
2 (−1)α∨
5 (−1)α∨
7 (−1).
automorphism is just Int t, where t = Qn−1
Int t, where t =Qn−2
Proof. By Lemma 4.3, nh
w ∈ Z(G) in each case. Let ζ be a primitive h-th root of unity.
Types A or C can be calculated directly. If G is of type G2, F4 or E8 then Z(G) is trivial.
If G is of type Bn, then we use Lemma 4.3: Int nw is conjugate to the Kac automorphism
which sends each eα, α ∈ ∆ to ζeα, where ζ is a primitive h-th root of unity. But this
n(ξn(n+1)/2), ξ a square-root
of ζ. Thus th is as described. The calculation for type Dn is similar: Int nw is conjugate to
n(ξn(n−1)/2) and thus th = 1 if and
only if n ≡ 0 or 1 modulo 4. If G is of type E6 then let γ be an outer automorphism of G.
Then γ permutes the two non-identity elements of Z(G). On the other hand, Int γ(nw) ∈ C
and thus γ(n12
w = 1. Finally, if G is of type E7 then w is of order 18 and
Int nw is conjugate to Int t, where t = α∨
7 (ξ27),
and thus n18
i (ζ i(n−1)−i(i−1)/2) · α∨
i (ζ in−i(i−1)/2) · α∨
n−1(ξn(n−1)/2)α∨
w , whence n12
w ) = n12
1 (ξ34)α∨
3 (ξ66)α∨
4 (ξ96)α∨
6 (ξ52)α∨
5 (ξ75)α∨
2 (ξ49)α∨
i=0 α∨
w = t18 = α∨
2 (−1)α∨
5 (−1)α∨
i=1 α∨
7 (−1).
Recall that an automorphism θ is N-regular if g(1) contains a regular nilpotent element
of g, and that an automorphism θ of order m is of maximal rank if dim c · ϕ(m) = rk G,
where ϕ denotes the Euler number of m.
Lemma 4.5. Let w be one of the Weyl group elements on the following list. Then all
representatives nw of w in NG(T ) are T -conjugate and, modulo the centre of G, have the
same order as w. The (unique) Kac diagram corresponding to Int nw, the order of w (and
thus of Int nw) and the rank of Int nw are as given below.
a) G of type G2: w of type G2, A2 or A1 × A1. The respective Kac diagrams are: 111,
011 and 010, the respective orders of w are 6, 3 and 2 and the respective ranks of Int nw are
1, 1 and 2.
b) G of type F4: w of type F4, F4(a1), D4(a1), A2 × A2 and A4
1. The corresponding Kac
diagrams are: 11111, 10101, 10100, 00100 and 01000, the respective orders of w are 12, 6,
4, 3 and 2 and the respective ranks are 1, 1, 2, 2, and 4.
Each such automorphism is N-regular.
Proof. Each w listed in the Lemma is of maximal rank and is a power of the Coxeter element
by inspection of [3, Table 3]. (In particular, the orders and ranks are as given in the lemma.)
Thus all representatives of w are T -conjugate by Lemma 1.3. It remains to check that the Kac
14
diagrams are as stated. For the Coxeter elements this is Lemma 4.4. Suppose on the other
hand that l divides the Coxeter number. Then the l-th power of a Coxeter automorphism is
conjugate to the automorphism which sends e±α (α simple) to ζ ±le±α, where ζ is a primitive
h-th root of unity (h the Coxeter number). (We note that since p is good it doesn't divide
h in type G2 or F4.) In particular, g(0) is conjugate to the subalgebra spanned by t and
all root subspaces gα where α has length divisible by l. Thus, inspecting the possibilities
for automorphisms of order h/l, it is straightforward to determine the Kac diagram in each
case.
Type A2 in G2: this is the square of the Coxeter element, and hence g(0) is conjugate to
t ⊕ g±(2α1+α2).
Type A1 × A1 in G2: this is the cube of a Coxeter element, and hence g(0) is conjugate
to t ⊕ g±(α1+α2) ⊕ g±(3α1+α2).
Type F4(a1) in F4: this is the square of a Coxeter element and hence g(0) is conjugate
to t ⊕ g±1221 ⊕ g±1122.
Type D4(a1) in F4: this is the cube of a Coxeter element and hence after conjugation
g(0) = t ⊕ g±1111 ⊕ g±1120 ⊕ g±0121 ⊕ g±1232. Here 1111 and 0121 generate a root system of
type A2, while 1120 is a long root, thus g(0) is of type A2 × A1.
Type A2 × A2 in F4: this is a Coxeter element raised to the fourth power, hence g(0) is
conjugate to t ⊕ g±1110 ⊕ g±0120 ⊕ g±0111 ⊕ g±1221 ⊕ g±1122 ⊕ g±1242. Here 1110, 0111 generate
a root subsystem of Φ of type A2 while 0120, 1122 generate a root system of type A2.
Type A4
1 in F4: this is the sixth power of a Coxeter element, and hence g(0) is conjugate
to the subalgebra spanned by t and all root spaces gα where α is of even length. But the
roots of even length have basis: 1100, 0011, 0110 and 1120, where the first three span a
subsystem of type C3 and 1120 is a long root.
It is now easily seen that the only possible Kac diagrams with coefficients 0 and 1 which
could correspond to these automorphisms are those stated in the lemma.
In type G2 the only remaining non-trivial conjugacy classes in W are involutions. More-
over, it is easy to see from Lemma 2.5 (or see, for example [19]) that there is a unique class
of involution of a simple group of type G2 and hence Lemma 4.5 gives us a complete list of
positive rank automorphisms. (See Table 1.)
In type F4, we are reduced to studying elements of the Weyl group of the following types:
A2, A2 (order 3), B2, B2 × A1, A3, A3 × A1 (order 4), C3, B3, C3 × A1, D4 (order 6), B4
(order 8).
Consider an admissible diagram Γ = Γ′∪Γ′′, where Γ′ is a union of irreducible subdiagrams
of order m, and Γ′′ is a union of irreducible subdiagrams of order less than m. As before
let Φ1 be the smallest root subsystem of Φ containing all of the roots in Γ′, and let Φ2 be
the set of roots in Φ which are orthogonal to all elements of Φ1. Let Li (i = 1, 2) be the
subgroup of G generated by all root subgroups Uα, α ∈ Φi and let S be the torus generated
by all α∨(k×), α ∈ Φ1. Clearly S is a maximal torus of L1 and ZG(S)′ = L2.
Let w = w′w′′ be an element in the conjugacy class corresponding to Γ, where w′ corre-
sponds to Γ′ and w′′ corresponds to Γ′′. Suppose θ = Int nw, where nwT = w ∈ W . Since T
and S are θ-stable, it follows that L1 and L2 are θ-stable. Moreover, wS = w′S and (Sw)◦
is trivial, thus there exists nw′ ∈ NL1(S) such that θS = Int nw′S. Since (Int n−1
w′ ◦ θ)L1
acts trivially on S, we can replace nw′ by an element of the form nw′s, s ∈ S such that
θL1 = Int nw′L1. Therefore nw = nw′g for some g ∈ ZG(L1). Recall that we assume that
T (0) is maximal in ZG(c)θ.
15
Lemma 4.6. w′′ is trivial.
Proof. We have g ∈ ZG(L1) = Z ′ · ZL2(L1) where Z ′ = {t ∈ T α(t) = 1 for all α ∈ Φ1}.
Note that (Z ′)◦ ·S = T , w′ acts trivially on Z ′ and has finitely many fixed points on S. Hence
S′ = (Z ′)◦ = (T w′)◦ and H = L2S′ = S′L2. Then Z ′ = S′Z(L1) and thus, after replacing
nw′ by an appropriate element of nw′Z(L1) if necessary, we may assume that g ∈ ZH(L1) =
ZL2(L1)S′. Let h ∈ L1 be such that s = hnw′h−1 ∈ S. Then hnwh−1 = shgh−1 = sg.
Moreover, s and g commute and (sg)m = 1, thus g is semisimple. We deduce that there
exists h′ ∈ L2 such that h′gh′−1 = s′ ∈ S′. Thus nw is G-conjugate to ss′ ∈ T . But therefore
nw is conjugate to h−1ss′h = nw′s′. By our assumption of the maximality of T (0), we must
have w = w′ in the first place.
This result eliminates the cases A3 × A1, C3 × A1 and B2 × A1. But it also eliminates the
conjugacy class of type D4 by the same argument, since D4 has an alternative admissible
diagram of type B3 × A1. (This can easily be seen in the Weyl group of type B4, in which
an element of type D4 is a product of a negative 3-cycle and a negative 1-cycle.)
To continue, we make a few observations in a similar vein to Lemma 4.5.
Lemma 4.7. There exists a unique conjugacy class of positive rank automorphism of order
8 in type F4. The corresponding Kac diagram is 11101.
Proof. Let w be an element of W of type B4. We observe that B4 is the unique class in
W of order 8 [3, Tables 3,8]. Moreover, any two representatives nw, nwt of w in NG(T )
w = (nwt)4 = 1 (Lemma 4.4), thus there is a unique
are T -conjugate (Lemma 1.3) and n4
conjugacy class of positive rank automorphisms of order 8.
It remains to check that the
Kac diagram is as indicated in the Lemma. Consider the B4-type subsystem of Φ with
basis { − α = α0, α1, α2, α3}. Then Int nw is conjugate to the automorphism of G which
sends eαi to ζeαi for i = 0, 1, 2, 3, where ζ is a primitive 8-th root of unity. But for such an
automorphism either eα4 7→ ζ −1eα4 and thus g(0) = t ⊕ g±(α3+α4), or eα4 7→ ζ 3eα4, in which
case g(0) = t ⊕ g±1221. Since 11101 is the only Kac diagram of order 8 which has coefficients
1 and 0 and has fixed point subalgebra of type A1, this proves the Lemma.
Lemma 4.8. There are two conjugacy classes of automorphisms of F4 of order 6 and rank
1. They have Kac diagrams 01010 and 11100 and each element of the first (resp. second)
class acts on some maximal torus as a Weyl group element of type C3 (resp. B3).
Proof. We note first of all that there are 4 classes of automorphisms of order 6 with Kac
coefficients 0 and 1: the Kac diagrams 10101, 11100, 01010 and 00011. In addition, we have
seen above that 10101 is the unique class of automorphism of order 6 and rank two. Thus
any automorphism of rank 6 and order 1 is conjugate to Int nw where w = nwT ∈ W is
either of type C3 or of type B3.
Let θ = Int t be a Kac automorphism of type 01010 and consider the root subsystem
Σ of Φ generated by α3 + α4, α2 + α3 and α1. Then Σ is of type C3 and if we let H
be the (Levi) subgroup of G generated by T and the subgroups U±α with α ∈ Σ then θ
stabilizes H and is easily seen to be a Coxeter automorphism of H ′ (since dθ(eα) = ζeα for
α = α3 + α4, α2 + α3, α1). Thus t is H-conjugate to some nw ∈ NG(T ), where w = nwT is of
type C3.
Let θ = Int t be the Kac automorphism for the Kac diagram 11100 and consider the root
subsystem Σ of Φ generated by α1, α2 and α3 + α4. Then Σ is of type B3 and dθ(eα) = ζeα
16
for α = α1, α2, α3 + α4. Thus if we let H be the Levi subgroup of G generated by T and all
α with α ∈ Σ then θH ′ is a Coxeter automorphism. In particular, t is H-conjugate to some
nw ∈ NG(T ), where w = nwT is of type B3.
It remains to show that a Kac automorphism of type 00011 is of zero rank. Here G(0)
is the pseudo-Levi subgroup generated by T and Uα with α = ±α2, ±α1, ±α. In particular,
dim G(0) = 16. We have dim g(1) = 5; thus it will suffice to show that there exists e ∈ g(1)
such that dim ZG(0)(e) = 11. Let e = eα3 + eα4. Then zg(0)(e) is spanned by gα with α =
±α, ±α1, ±1342, −α2, −(α1 + α2), 1242 and a two-dimensional subalgebra of t. In particular,
dim ZG(0)(e) ≤ 11, whence dim G(0) · e ≥ 5. It follows that G(0) · e is dense in g(1) and
therefore θ is of zero rank.
Corollary 4.9. There are two conjugacy classes of automorphisms of F4 of order 3 and rank
1. They have Kac diagrams 11000 and 10001 and each element of the first (resp. second)
class acts on some maximal torus of G as a Weyl group element of type A2 (resp. A2).
Proof. Apart from the (unique) rank 2 automorphism 00100, the two Kac automorphisms
given in the corollary are the only remaining Kac automorphisms of order 3. Let θ be the
square of the Kac automorphism with diagram 01010: then g(0) is isomorphic to so(7, k)⊕k,
with basis of simple roots {α2, 1120, α4}. Thus θ is conjugate to a Kac automorphism with
diagram 10001. The statement in this case now follows since θ must therefore have rank 1,
and the square of an element of type C3 is an element of type A2. Now let θ be the square
of the Kac automorphism with diagram 11100. Then g(0) is isomorphic to sp(6) ⊕ k, with
basis of simple roots {α4, α3, 1220}. Thus, by the same reasoning, the Kac automorphism
with diagram 11000 has rank 1 and corresponds to a Weyl group element of type A2.
Lemma 4.10. There is one conjugacy class of automorphisms in type F4 of order 4 and
rank 1. The corresponding Kac diagram is 01001 and is represented by an element of W of
type B2.
Proof. By Lemma 2.7 the Kac diagram corresponding to a positive rank automorphism
can only have 0s and 1s on the nodes. Moreover, we have already seen in Lemma 4.5(b)
that the Kac automorphism with diagram 10100 is the unique class of automorphisms of
order 4 and rank 2. Hence there are only two other possibilities: 01001 and 00010.
It
is easy to see that the Kac automorphism with diagram 01001 is of positive rank since
e1100 + e0011 + f1122 is semisimple. Hence it is of rank 1. (By considering the root subsystem
generated by 1100 and 0011, we can see that θ is conjugate to an automorphism of the form
Int nw, where w = nwT is an element of W of type B2.) It remains to prove that the Kac
automorphism with diagram 00010 is of zero rank (first proved by Vinberg [21, §9]).
In
this case g(0) ∼= sl(4, k) ⊕ sl(2, k) and g(1), as a g(0)-module, is isomorphic to the tensor
product of the natural representation for sl(4) and the natural representation for sl(2). In
particular, dim g(1) = 8. If we let e = e0010 + f1231 then it is easy to check that zg(0)(e) is
spanned by hα1, eα1, fα1, hα2 + hα3 + hα4, f α, f1342, f1242 + fα4, e1242 + eα4, f1100 and fα2.
Thus dim ZG(0)(e) ≤ 10 and therefore dim G(0) · e ≥ 8. Hence G(0) · e is dense in g(1), and
so g(1) is of zero rank.
This completes the determination of the positive rank automorphisms in type F4. We
will use these results on automorphisms in type F4 to study the positive rank triality au-
tomorphisms in type D4. In [21] all automorphisms of so(2n, C) of the form x 7→ gxg−1,
g ∈ O(2n, k) were studied; this was generalized to (odd) positive characteristic in [12], and
17
it was proved that all such θ-groups have a KW-section. If n ≥ 5 then all automorphisms
have this form; in type D4 this leaves only the automorphisms of type D(3)
4 . Recall that the
set of long roots in a root system of type F4 is a root system of type D4, and correspondingly
W (F4) contains W (D4) as a normal subgroup of index 6. Let G be a simple algebraic group
of type F4, let T be a maximal torus of G, let Φ = Φ( G, T ) and let Φl be the set of long
roots in Φ. If {α1, α2, α3, α4} is a basis of Φ then {α2, α1, α2 + 2α3, α2 + 2α3 + 2α4} is a
basis of Φl. Note that (α2 + 2α3)∨ = α∨
4 , thus
the subgroup of G generated by T and all Uα with α ∈ Φl is isomorphic to Spin(8, k) = G.
The subgroup H of G generated by G and N G(T ) normalizes G and the corresponding map
H → Aut G is surjective. (In fact H is isomorphic to the semidirect product of G by the
symmetric group S3.)
Lemma 4.11. All Kac automorphisms of type D(3)
4 which have Kac coefficients equal to 0
or 1 are of positive rank, with the exception of the Kac automorphism of order 9. These
diagrams are:
3 and (α2 + 2α3 + 2α4)∨ = α∨
2 + α∨
2 + α∨
3 + α∨
(a) 111, which has rank 1 and order 12 and acts as a Coxeter element of F4,
(b) 101, which has rank 2 and order 6 and corresponds to an element of type F4(a1),
(c) 001, which has rank 2 and order 3 and corresponds to an element of type A2 × A2,
(d) 010, which has rank 1 and order 6 and corresponds to an element of type C3,
(e) 100, which has rank 1 and order 3 and corresponds to an element of type A2 (this is
the automorphism γ constructed in §2).
Proof. Let G, G and T be as above. By assumption on T , any automorphism of G is of
the form Int nwG for some nw ∈ N G(T ). Recall by Lemma 2.7 that a Kac diagram which
corresponds to a positive rank automorphism satisfies h(βi) ∈ {0, 1} for i = 0, 1, 2. Moreover,
there are no elements of W (F4) of order 9 and hence the only Kac diagrams which can be of
positive rank are the five diagrams listed in the Lemma. Clearly there is exactly one such Kac
diagram of order 12. Since n12
w = 1 if nw ∈ N G(T ) represents a Coxeter element in W (F4),
there exists at least one automorphism of rank 1 and order 12 and hence this automorphism
has Kac diagram 111. Let us recall our description of the Kac automorphism corresponding
to this class. Let ζ be a primitive 12-th root of unity. Then θ is the automorphism satisfying:
e±α1 7→ ζ ±1e±α3, e±α2 7→ ζ ±1e±α2, e±α3 7→ ζ ±1e±α4, e±α4 7→ ζ ±1e±α1
With this clarification, we can determine which Kac diagrams correspond to θ2 and θ4.
(We note that θ2 and θ4 are necessarily of positive rank, since θ is.) Indeed, the fixed point
subspace for θ2 is spanned by h2, h1+h3+h4 and e±(α1+α2)+ζ ±2e±(α2+α3)−ζ ±4e±(α2+α4). Thus
θ2, which corresponds to an element of W (F4) of type F4(a2), has Kac diagram 101. Similarly,
the fixed point subspace for θ4 is spanned by h2, h1 + h3 + h4, e±α1 + ζ ±4e±α3 + ζ ∓4e±α4,
e±(α1+α2) + ζ ±2e±(α2+α3) − ζ ±4e±(α2+α4) and e±(α1+α2+α3) + e±(α2+α3+α4) + e±(α1+α2+α4). Thus
the dimension of the fixed-point space is 6, and hence the corresponding Kac diagram is 100.
On the other hand, let nw ∈ N G(T ) be such that w = nwT is an element of type C3
(resp. A2) and Int nw, as an automorphism of G, is conjugate to a Kac automorphism with
diagram 01010 (resp. 10001). Then Int nwG has order 6 (resp. 3) and has rank at least 1
(since Lie(T ) ∩ g(1) is non-trivial); but Int nw has rank 1 (as an automorphism of Lie( G)) by
Lemma 4.8 and Corollary 4.9. Thus Int nwG is a rank one automorphism, which must also
be of type D4
since elements of W (F4) of type C3 and A2 are of order 3 modulo W (D4).
Hence there exist automorphisms of order 3 and 6 and of rank 1, which must correspond to
the remaining two Kac diagrams as indicated in the diagram.
(3)
18
5 Calculation of the Weyl group
It remains to calculate the little Weyl group for each of the automorphisms of the previous
section. To begin we recall the following straightforward observation [12, Lemma 4.2]. We
maintain the assumptions on θ, c, T from the previous section.
Lemma 5.1. Let ¯W = W θ/ZW θ(c). Then ¯W acts on c and Wc is a subgroup of ¯W .
We will see that for all θ-groups of type G2, F4 and D(3)
4 , ¯W = Wc. This is not true in
general, see Rk. 5.10(c).
Lemma 5.2. Let Γ be a product of irreducible admissible diagrams of order m and let w ∈ W
be an element of type Γ. Let Φ1 be the smallest root subsystem of G containing all roots in Γ
and let Φ2 be the set of roots in Φ which are orthogonal to Φ1. Let t(1) = {t ∈ t w(t) = ζt}
and let W0 = {w ∈ ZW (w) wt(1) = 1t(1)}. Then W0 contains W (Φ2).
Proof. This is clear from Lemma 3.3.
From now on, fix w and let W1 (resp. W2) denote the subgroup of W generated by all
sα with α ∈ Φ1 (resp. Φ2). Then Lemma 5.2 shows that the order of ¯W (and hence of Wc)
divides #(ZW (w))/#(W2). Use of this straightforward observation will allow us to identify
Wc for all the cases which concern us. Let Ti, im be the subtori of T defined in Lemma 1.1.
We will need the following lemma ([12, Lemma 4.3]).
Lemma 5.3. Let T ′
m. Assuming G is simply-connected, Wc = ¯W .
T ′
m = Qi6=m Ti = {t−1θ(t) t ∈ T }. Suppose {t ∈ Tm = T (0) tm = 1} ⊂
Our first result is for maximal rank automorphisms.
Lemma 5.4. Suppose θ is a maximal rank automorphism. Then W0 is trivial. Thus ¯W =
Wc = W θ.
Proof. By assumption, G is simply-connected. But now ZG(c) is connected, and therefore
equals T . Thus ZNG(T )(c) = ZG(c) = T . This shows that W0 is trivial. Furthermore, T ′
m = T
by assumption on θ, thus any element of ¯W has a representative in G(0) by Lemma 5.3.
Finally, we have the following preparatory lemma, which appeared in [15] in characteristic
zero, and was generalised to positive characteristic in [12, Prop. 5.3]. Recall that a KW-
section for θ is an affine linear subvariety v ⊂ g(1) such that the restriction of the categorical
quotient π : g(1) → g(1)//G(0) to v is an isomorphism.
Lemma 5.5. Suppose θ is an N-regular automorphism. Then k[t]W → k[c]Wc is surjective.
In particular, if θ is inner then the degrees of the generators of k[c]Wc are simply those degrees
of the invariants of g which are divisible by m.
Moreover, θ admits a KW-section.
We have the following application of Lemma 5.4. We identify automorphisms by Weyl
group elements w: that is, w, where θ is conjugate to Int nw as described in Sect. 4. Let Gt
for the t-th group in the Shephard-Todd classification.
19
Lemma 5.6. For the maximal rank automorphisms, the Weyl group is as described in the
following list:
(a) Type G2. Coxeter element: Wc = µ6; A2: Wc = µ6; A1 × A1: Wc = W (G2).
(b) Type F4. Coxeter element: Wc = µ12; B4: Wc = µ8; F4(a1) or A2 × A2: Wc = G5;
D4(a1): Wc = G8; A4
1: Wc = W (F4).
(c) Type D(3)
4 . Type F4: Wc = µ4; F4(a1) or A2 × A2: Wc = G4.
Proof. For the rank 1 inner automorphisms, this follows on reading off the orders of conjugacy
classes (and hence centralizers) in [3]. Moreover, since the maximal rank involutions in type
G2 and F4 lie in the centre of the Weyl group, it remains only to check type D(3)
4 and classes
F4(a1), A2 × A2 and D4(a1) in type F4.
Let W be a Weyl group of type F4 and let Wl be the subgroup of W generated by all sα
with α a long root. Then Wl is isomorphic to the Weyl group of type D4, and is a normal
subgroup of W of index 6. For an element in class F4(a1) or A2 × A2, the centralizer in
W has order 72 by [3]. Moreover, the square of an element in class F4(a1) is an element in
class A2 × A2, thus the little Weyl group for these two cases is equal. There are six cosets
of Wl in W and the factor group is isomorphic to S3. It follows that if w is an element of
W which has order 3 modulo Wl then ZWl(w) is a normal subgroup of ZW (w) of index 3.
In particular, ZWl(w) has order 4 (resp. 24) if w is of Coxeter type (resp. of type F4(a1) or
A2 × A2). Thus it is clear that ZWl(w) ∼= µ4 in the case where w is a Coxeter element of
type F4.
We claim that if w is of type A2 × A2 then ZWl(w) is isomorphic to G4.
Indeed,
#(ZWl(w)) = 24, and thus the only other possibilities are G(6, 3, 2), G(12, 12, 2) or a product
of two cyclic groups [4]. (We require coprimeness of the characteristic here, which is auto-
matic since we assume char k = 0 or char k > 3.) But if w is the fourth power of a Coxeter
element w0 then w3
0 ∈ ZWl(w) is non-central and thus ZWl(w) cannot be commutative. If we
write w as w1w2 = w2w1, where w1 is an element of type A2 and w2 is an element of type
A2 then we can construct a basis {c1, c2} for c such that wi(cj) = ζ δij cj. Moreover, w1 ∈ Wl
and hence there exists an element of ZWl(w) with characteristic polynomial (t − ζ)(t − 1) as
an automorphism of c. Since there is no such element of G(6, 3, 2) or G(12, 12, 2), ZWl(w) is
isomorphic to G4. This proves the remaining cases in type D(3)
4 . But now ZW (w) is a non-
commutative pseudoreflection group of rank 2 which has polynomial generators of degree 6
and 12 by Lemma 5.5, and thus is either G(6, 1, 2), G(12, 4, 2) or G5. Since ZW (w) contains
G4 as a normal subgroup, it follows that it is isomorphic to G5.
For an element of type D4(a1), the centralizer in W has order 96 and has degrees 8 and
12 by Lemma 5.5. Thus the only possibilities for ZW (w) are G(12, 3, 2), G8, G13 or µ8 × µ12
[4]. Since Wl is a normal subgroup of W , ¯W contains a normal subgroup which is isomorphic
to G(4, 2, 2). This rules out µ8 × µ12 and G(12, 3, 2) since for example if ξ is a primitive
12-th root of unity
(cid:18)ξ2 0
ξ(cid:19)(cid:18)0 1
1 0(cid:19)(cid:18)ξ−2
0
0
0
ξ−1(cid:19) =(cid:18)ξ
1 0(cid:19)
0 ξ−1(cid:19)(cid:18)0 1
0
and hence G(4, 2, 2) is not normal in G(12, 3, 2). Moreover, by [5, p. 395], G13 contains no
reflections of order 4. Thus ¯W is equal to G8.
For w ∈ W , let Φ1 be the smallest root subsystem of Φ containing all roots corresponding
to vertices of the admissible diagram for w, let Φ2 be the set of roots in Φ which are orthogonal
20
to all elements of Φ1 and let Wi be the subgroup of W generated by all sα with α ∈ Φi
(i = 1, 2). Let L1 be the Levi subgroup of G generated by T and all Uα with α ∈ Φ1. (See
the discussion in the paragraph preceding Lemma 4.6.) Then L1 is θ-stable and c ⊂ Lie(L′
1),
hence one can also consider the little Weyl group in L1, which is naturally a subgroup of Wc.
Lemma 5.7. For the following automorphisms in type F4, ¯W = Wc is equal to the little
Weyl group one obtains on restricting to the subgroup L1. We have:
(a) Wc = µ6 if w is of type C3 or B3,
(b) Wc = µ4 if w is of type B2.
(c) Wc = µ2 if w is of type A1.
Proof. This is a straightforward observation of the orders of the centralizer and the subgroup
W2 (see [3, Table 8]). If w is of type C3 or B3 then Φ2 has a basis consisting of one element
and hence W2 = W (Φ2) has order 2. But the centralizer of w has order 12, thus the order
of ¯W divides 6. If w is of type B2 then Φ2 is isomorphic to B2 (hence W2 has order 8) and
the centralizer of w has order 32, thus the order of ¯W divides 4. Finally, if w is of type A1
then Φ2 = B3 and hence the order of W2 is 48. Since the order of the centralizer is 96 by
[3], this shows that ¯W = µ2.
We remark that in other types, Wc may not be equal to the group one obtains on re-
stricting to L1.
Lemma 5.8. If θ = Int nw is an automorphism in type F4 such that w is of type A2 or A2
then ¯W = Wc = µ6. In fact, there exists a θ-stable semisimple subgroup L of G of type B3
(if w is of type A2) or type C3 (if w is of type A2) such that c ⊂ Lie(L), each element of Wc
has a representative in L(0), and θL is N-regular.
Proof. This is immediate since if w is of type A2 (resp.
automorphism corresponding to a Weyl group element of type B3 (resp. C3).
A2) then θ is the square of an
Lemma 5.9. Let θ be an automorphism of type D(3)
Wc = ¯W = µ2.
4 with Kac diagram 010 or 100. Then
Proof. We noted in the proof of Lemma 5.6 that if w ∈ W = W (F4) has order 3 modulo
Wl = W (D4) then ZWl(w) has index 3 in ZW (w). Thus in both cases here the group ¯W
of Lemma 5.1 is isomorphic to µ2. It therefore remains only to prove that the non-trivial
element of ¯W has a representative in G(0).
Let w be an element of W of type C3. Then (T w)◦ is of dimension 1 and is generated by
the coroot of a long root element β. The idea here is that we can centralize by β∨(k×) and
obtain a Levi subgroup of G whose Lie algebra contains c, and which has a little Weyl group
isomorphic to µ2. It is easy to see that ZG(β∨(k×)) is of type A1 × A1 × A1. Moreover, w and
w2 permute the 3 subgroups of type A1 transitively. (If, for example, we take w = s2s3s4
in W (F4), then Φl has basis {α2, α1, α2 + 2α3, α2 + 2α3 + 2α4}; β = α, the longest root
in F4, and hence the roots in Φl which are orthogonal to β are ±α2, ±(α2 + 2α3) and
±(α2 + 2α3 + 2α4); furthermore, w(α2) = α2 + 2α3, w(α2 + 2α3) = α2 + 2α3 + 2α4 and
w(α2 + 2α3 + 2α4) = −α2.) Setting L = ZG(β∨(k×))′, it is thus easy to see that c ⊂ Lie(L)
and that NL(0)(c)/ZL(0)(c) ∼= µ2. (Here the Kac automorphism with diagram 010 restricts to
an automorphism of L of the form (g1, g2, g3) 7→ (tg−1
3 , g1, g2); the Kac automorphism with
diagram 100 is conjugate to the square of the Kac automorphism with diagram 010.) Thus
¯W = Wc = µ2 in either case.
21
Table 1: Positive rank automorphisms in type G2
Kac diagram m
6
3
2 A1 × A1
r
N-reg.
1
N-reg.
1
2 W (G2) N-reg.
111
011
010
Wc
µ6
µ6
w
G2
A2
L
Remark 5.10. (a) In the case where the ground field has characteristic zero and G(0) is
semisimple (arbitrary G), the rank and little Weyl group were determined by Vinberg in
[21]. It was shown in [21, Prop. 18] that G(0) is semisimple if and only if the corresponding
Kac diagram has exactly one non-zero entry, which is equal to 1. Our calculations for Wc
agree with [21] in these cases.
(b) Let Gθ
Z = {g ∈ G g−1θ(g) ∈ Z(G)} and let W Z
(c). Then W Z
c
is a subgroup of ¯W . Recall that θ is saturated if Wc = W Z
It is immediate that all
c .
automorphisms in type F4 and G2 are saturated since in both cases the centre is trivial.
Moreover, it is not difficult to show without using our classification that any automorphism
of type D(3)
4
is saturated.
c = NGθ
Z
(c)/ZGθ
Z
(c) There is a strong relationship between Vinberg's construction of Wc and work of Brou´e
and Malle constructing certain pseudo-reflection groups in finite groups of (exceptional) Lie
type [1]. In general, the group constructed by Brou´e and Malle corresponds to our ¯W . It is
possible for Wc to be a proper subgroup of ¯W . For example, if θ = Int nw in type E6, where
w is an element of type D4(a1), then Wc is either G8 or G(4, 1, 2).
(d) In Table 3 we have indicated the action of θL for the cases above using the automor-
phism τ : SL(2, k)3 → SL(2, k)3, (g1, g2, g3) 7→ (t(g3)−1, g1, g2).
Theorem 5.11. Any θ-group of type G2, F4 or D(3)
4 has a KW-section.
Proof. To prove this we will observe that there exists a θ-stable reductive subgroup L of
G such that c ⊂ Lie(L), NL(0)(c)/ZL(0)(c) = Wc and θL is N-regular. Then we can apply
Lemma 5.5. Indeed, L is simply the group L1 (see the discussion before Lemma 4.6) in all
cases except automorphisms of type A2 or A2 in type F4 or those of type C3 or A2 in type
D(3)
4 . In case A2 (resp. A2) in type F4 we can reduce to a group of type B3 (resp. C3) by
(the proof of) Lemma 5.8. In cases C3 and A2 in type D(3)
4 we can reduce to a subgroup of
G isomorphic to SL(2, k)3 as indicated in the proof of Lemma 5.9.
This establishes Popov's conjecture in all types other than type E.
It is possible to
use similar methods to solve the remaining cases, but the calculations required would make
the task very time-consuming. An alternative approach to the problem (for inner automor-
phisms) is to consider representatives nw of (suitable) elements w ∈ W , and to use com-
putational methods to determine the Kac automorphism corresponding to Int nw in each
case. We will return to this question in future work with Benedict Gross, Mark Reeder and
Jiu-Kang Yu.
References
[1] Michel Brou´e and Gunter Malle. Zyklotomische Heckealgebren. Ast´erisque, (212):119 --
189, 1993. Repr´esentations unipotentes g´en´eriques et blocs des groupes r´eductifs finis.
22
Table 2: Positive rank automorphisms in type F4
C3
B3
F4(a1)
w
F4
B4
Kac diagram m
12
8
6
6
6
4 D4(a1)
4
3 A2 × A2
3
3
2
2
11111
11101
10101
01010
11100
10100
01001
00100
11000
10001
01000
00001
A2
A2
A4
1
A1
B2
Wc
µ12
µ8
G5
µ6
µ6
G8
µ4
G5
µ6
µ6
r
1
1
2
1
1
2
1
2
1
1
4 W (F4)
1
µ2
L
N-reg.
Spin(9)
N-reg.
Sp(6)
Spin(7)
N-reg.
Spin(5)
N-reg.
Spin(7)
Sp(6)
N-reg.
θL
Coxeter
Coxeter
Coxeter
Coxeter
positive 3-cycle
positive 3-cycle
short SL(2)
Coxeter
w
F4
Table 3: Positive rank automorphisms in type D(3)
4
Kac diagram m
θL
12
6
6
3 A2 × A2
3
r Wc
1 µ12 N-reg.
2 G4 N-reg.
SL(2)3
1 µ2
2 G4 N-reg.
SL(2)3
1 µ2
111
101
010
001
100
F4(a1)
A2
C3
L
τ
τ 2
23
[2] Michel Brou´e, Gunter Malle, and Jean Michel. Generic blocks of finite reductive
groups. Ast´erisque, (212):7 -- 92, 1993. Repr´esentations unipotentes g´en´eriques et blocs
des groupes r´eductifs finis.
[3] R. W. Carter. Conjugacy classes in the Weyl group. Compositio Math., 25:1 -- 59, 1972.
[4] Allan Clark and John Ewing. The realization of polynomial algebras as cohomology
rings. Pacific J. Math., 50:425 -- 434, 1974.
[5] Arjeh M. Cohen. Finite complex reflection groups. Ann. Sci. ´Ecole Norm. Sup. (4),
9(3):379 -- 436, 1976.
[6] G. M. D. Hogeweij. Almost-classical Lie algebras. I, II. Nederl. Akad. Wetensch. Indag.
Math., 44(4):441 -- 452, 453 -- 460, 1982.
[7] J. Humphreys. Linear Algebraic Groups. Springer-Verlag, New York, 1975.
[8] V. G. Kac. Automorphisms of finite order of semisimple Lie algebras. Funkcional. Anal.
i Prilozen., 3(3):94 -- 96, 1969. English translation: Functional Anal. Appl. 3 (1969), 252 --
254.
[9] Victor G. Kac. Infinite-dimensional Lie algebras. Cambridge University Press, Cam-
bridge, third edition, 1990.
[10] B. Kostant and S. Rallis. Orbits and representations associated with symmetric spaces.
Amer. J. Math., 93:753 -- 809, 1971.
[11] P. Levy. Involutions of reductive Lie algebras in positive characteristic. Adv. Math.,
210(2):505 -- 559, 2007.
[12] P. Levy. Vinberg's θ-groups in positive characteristic and Kostant-Weierstrass slices.
arXiv:0712.1725, 2007.
[13] George J. McNinch and Eric Sommers. Component groups of unipotent centralizers in
good characteristic. J. Algebra, 260(1):323 -- 337, 2003. Special issue celebrating the 80th
birthday of Robert Steinberg.
[14] D. I. Panyushev. Regular elements in spaces of linear representations. II. Izv. Akad.
Nauk SSSR Ser. Mat., 49(5):979 -- 985, 1120, 1985. English translation: Math. USSR-Izv.
27 (1986) 279284.
[15] Dmitri I. Panyushev. On invariant theory of θ-groups. J. Algebra, 283(2):655 -- 670, 2005.
[16] V. L. Popov. Representations with a free module of covariants. Funkcional. Anal. i
Prilozen., 10(3):91 -- 92, 1976. English translation: Functional Anal. Appl. 10 (1976), no.
3, 242 -- 243 (1977).
[17] Alexander Premet. Nilpotent orbits in good characteristic and the Kempf-Rousseau
theory. J. Algebra, 260(1):338 -- 366, 2003. Special issue celebrating the 80th birthday of
Robert Steinberg.
[18] Jean-Pierre Serre. Coordonn´ees de Kac. In Oberwolfach Reports Vol. 3 issue 3, 2006.
24
[19] T. A. Springer. The classification of involutions of simple algebraic groups. J. Fac. Sci.
Univ. Tokyo Sect. IA Math., 34(3):655 -- 670, 1987.
[20] Robert Steinberg. Endomorphisms of linear algebraic groups. Memoirs of the American
Mathematical Society, No. 80. American Mathematical Society, Providence, R.I., 1968.
[21] `E. B. Vinberg. The Weyl group of a graded Lie algebra. Izv. Akad. Nauk SSSR Ser.
Mat., 40(3):488 -- 526, 709, 1976. English translation: Math. USSR-Izv. 10 (1976), 463 --
495 (1977).
25
|
1305.5139 | 5 | 1305 | 2015-02-23T19:11:24 | Rings That Are Morita Equivalent to Their Opposites | [
"math.RA"
] | We consider the following problem: Under what assumptions do one or more of the following are equivalent for a ring $R$: (A) $R$ is Morita equivalent to a ring with involution, (B) $R$ is Morita equivalent to a ring with an anti-automorphism, (C) $R$ is Morita equivalent to its opposite ring. The problem is motivated by a theorem of Saltman which roughly states that all conditions are equivalent for Azumaya algebras. Basing on the recent "general bilinear forms", we present a general machinery to attack the problem, and use it to show that (C)$\iff$(B) when $R$ is semilocal or $\mathbb{Q}$-finite. Further results of similar flavor are also obtained, for example: If $R$ is a semilocal ring such that $\mathrm{M}_{n}(R)$ has an involution, then $\mathrm{M}_{2}(R)$ has an involution, and under further mild assumptions, $R$ itself has an involution. In contrast to that, we demonstrate that (B) does not imply (A). Our methods also give a new perspective on the Knus-Parimala-Srinivas proof of Saltman's Theorem. Finally, we give a method to test Azumaya algebras of exponent $2$ for the existence of involutions, and use it to construct explicit examples of such algebras. | math.RA | math |
RINGS THAT ARE MORITA EQUIVALENT TO THEIR
OPPOSITES
URIYA A. FIRST∗
Abstract. We consider the following problem: Under what assumptions are
one or more of the following equivalent for a ring R: (A) R is Morita equivalent
to a ring with involution, (B) R is Morita equivalent to a ring with an anti-
automorphism, (C) R is Morita equivalent to its opposite ring. The problem
is motivated by a theorem of Saltman which roughly states that all conditions
are equivalent for Azumaya algebras. Based on the recent general bilinear
forms of [10], we present a general machinery to attack the problem, and
use it to show that (C) ⇐⇒ (B) when R is semilocal or Q-finite. Further
results of similar flavor are also obtained, for example: If R is a semilocal ring
such that Mn(R) has an involution, then M2(R) has an involution, and under
further mild assumptions, R itself has an involution.
In contrast to that,
we demonstrate that (B) 6=⇒(A). Our methods also give a new perspective
on the Knus-Parimala-Srinivas proof of Saltman's Theorem. Finally, we give a
method to test Azumaya algebras of exponent 2 for the existence of involutions,
and use it to construct explicit examples of such algebras.
1. Overview
Let R be a ring. This paper is concerned with the question of under what
assumptions are all or some of the following conditions equivalent:
(A) R is Morita equivalent to a ring with involution,
(B) R is Morita equivalent to a ring with an anti-automorphism,
(C) R is Morita equivalent to Rop (the opposite ring of R).
(Actually, we consider a slight refinement that takes into account the type of the
involution/anti-automorphism/Morita equivalence; see section 2.) Note that obvi-
ously (A)=⇒(B)=⇒(C), so one is interested in showing (B)=⇒(A) or (C)=⇒(B).
The motivation for the question comes from Azumaya algebras (we recall the
definition in section 9). Let C be a commutative ring and let A be an Azumaya
C-algebra . It was shown by Saltman [19, Th. 3.1] that:
(i) A is Brauer equivalent to an Azumaya algebra B with an involution of the
first kind if and only if A is Brauer equivalent to Aop.
(ii) If C/C0 is a Galois extension with Galois group G = {1, σ} (σ 6= 1), then
A is Brauer equivalent to an Azumaya algebra B with an involution whose
restriction to C is σ if and only if the corestriction algebra CorC/C0(A) =
(A ⊗ Aσ)G is split (i.e. trivial in the Brauer group of C0).
In case C is semilocal and connected, Saltman also showed that one can take B = A
in (i) and (ii). (The case where C is a field is an earlier result of Albert, e.g. see [1,
∗Einstein Institute of Mathematics, Hebrew University of Jerusalem
E-mail address: [email protected].
Date: November 3, 2018.
2010 Mathematics Subject Classification. 11E39, 16D90, 16H05, 16W10.
Key words and phrases. Morita equivalence, anti-automorphism, involution, bilinear form,
general bilinear form, Brauer group, Azumaya algebra, corestriction, semilocal ring.
This research was supported by an ERC grant #226135 and by the Lady Davis Fellowship
Trust.
1
2
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
Ths. 10.19 & 10.22].) Two Azumaya algebras are Brauer equivalent if and only if
they are Morita equivalent as C-algebras ([3, Cor. 17.2]), so (i) can be understood
as: (C)=⇒(A) for Azumaya algebras, provided the Morita equivalence is "of the first
kind". A simpler proof of Saltman's Theorem was later found by Knus, Parimala
and Srinivas ([13, §4]).
In this paper, we use general bilinear forms, introduced in [10], to give partial
answer to Saltman's problem. More precisely, we show that the conditions (A) and
(B) above can be phrased in terms of existence of certain bilinear forms, and use
this observation to give some positive and negative results, Saltman's Theorem in
particular.
We show that (C)=⇒(B) when R is semilocal or when dimQ(R ⊗Z Q) and
ker(R → R ⊗Z Q) are finite (i.e. when R is Q-finite). Further results of simi-
lar flavor are also obtained. These include:
(1) If R is semiperfect (e.g. artinian) and Morita equivalent to Rop, then S,
the basic ring that is Morita equivalent to R, has an anti-automorphism.
In addition, if R has an involution, then so does M2(S).
(2) Suppose R is semilocal. If Mn(R) has an involution, then so does M2(R),
and under mild assumptions (see Theorem 7.3 below), R itself has an in-
volution.
In the special case that R is a division ring, (2) implies that Mn(R) has an involution
if and only if R has an involution, a result obtained by Albert (e.g. [1, Th. 10.12])
when [R : Cent(R)] < ∞ and by Herstein (e.g. [11, Th. 1.2.2]) in the general case.
In contrast to the above, we show (B) 6=⇒(A) even when R is a finite dimensional
algebra over a field, and even when it has an anti-automorphism fixing the center
pointwise. Whether (C)=⇒(B) in general is still open (and we believe this is not
the case).
We continue by describing the proof of Saltman's Theorem by Knus, Parimala
and Srinivas ([13, §4]) from the perspective of our methods. Namely, we recover this
proof as an application of our characterization of (A) in terms of general bilinear
forms. This suppresses some of the computations of [13, §4]. We also recover
the sharpening of Saltman's Theorem in case the base ring is semilocal. Finally,
we apply our methods to construct non-trivial Azumaya algebras over Dedekind
domains satisfying the conditions of Saltman's Theorem, but not admitting an
involution. (However, these examples are not optimal; see section 11.)
The main problem of the paper was suggested to us by David Saltman himself
after we gave a talk about general bilinear forms at the 10th Brauer Group confer-
ence. The idea to apply the same methods for the construction of Azumaya algebras
of exponent 2 not admitting an involution was communicated to us by Asher Auel,
after posting a previous version of this work on the internet. We deeply thank both
of them for their contribution.
Sections 2 and 3 are preliminaries: Section 2 recalls the basics of Morita theory,
and section 3 recalls general bilinear forms. In section 4, we give a criterion in terms
of bilinear forms to when a ring is Morita equivalent to a ring with an involution
(resp. anti-automorphism). This criterion is the core of this paper and it is used
several times later. In sections 5 -- 7, we show that (C)=⇒(B) under certain finiteness
assumptions, as well as other results of the same flavor. Section 8 demonstrates
that (B) 6=⇒(A). The rest of the paper concerns applications to Azumaya algebras:
Section 9 recalls some facts about Azumaya algebras, in section 10 we show how
our methods can reproduce the proof of Saltman's Theorem given in [13], and
in section 11, we construct Azumaya algebras of exponent 2 without involution.
Finally, section 12 presents some questions that we were unable to answer.
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
3
Notation and conventions: Unless specified otherwise, all rings are assumed
to have a unity and ring homomorphisms are required to preserve it. Given a ring R,
denote its set of invertible elements by R×, its center by Cent(R), and its Jacobson
radical by Jac(R). The n × n matrices over R are denoted by Mn(R). The category
of right R-modules is denoted by Mod-R and the category of f.g. projective right
R-modules is denoted by proj-R. For a subset X ⊆ R, we let CentR(X) denote the
centralizer of X in R. If a module M can be viewed as a module over several rings,
we use MR (resp. RM ) to denote "M , considered as a right (resp. left) R-module".
Endomorphisms of left (right) modules are applied on the right (left). Throughout,
a semisimple ring means a semisimple artinian ring.
2. Morita Theory
In this section, we recall some facts from Morita Theory, and also give a refine-
ment of the main problem of the paper. See [15, §18] or [18, §4.1] for proofs and
further details.
2.1. Morita Theory. Let R be a ring. A right R-module M is called a generator
if every right R-module is an epimorphic image ofLi∈I M for I sufficiently large,
or equivalently, if RR is a summand of M n for some n ∈ N. The module M is called
a progenerator if M is a generator, finitely generated and projective. In this case,
we also call M a (right) R-progenerator.
Let S be another ring. An (S, R)-progenerator is an (S, R)-bimodule P such
that PR is a progenerator and S = End(PR) (i.e. every endomorphism of PR is of
the form p 7→ sp for unique s ∈ S). In this case, SP is also a progenerator and
R = End(SP ).
The rings R, S are said to be Morita equivalent, denoted R ∼Mor S, if the
categories Mod-R and Mod-S are equivalent. Morita's Theorems assert that:
(1) For all equivalences1 F : Mod-S → Mod-R there exists an (S, R)-progenera-
tor P such that F M is naturally isomorphic to M ⊗S P for all M ∈ Mod-S.
(2) Conversely, for any (S, R)-progenerator P the functor (−) ⊗S P : Mod-S →
Mod-R is an equivalence of categories.
(3) There is a one-to-one correspondence between equivalences of categories
F : Mod-S → Mod-R (considered up to natural isomorphism) and iso-
morphism classes of (S, R)-progenerators. The correspondence maps the
composition of two equivalences to the tensor product of the corresponding
progenerators.
Note that (3) allows us to "divide" progenerators. For example, if P is an (S, R)-
progenerator and Q is an (S′, R)-progenerator, then there exists an (S′, S)-pro-
generator V , unique up to isomorphism, such that Q ∼= V ⊗S P . Indeed, if F :
Mod-S → Mod-R and G : Mod-S′ → Mod-R correspond to P and Q, respectively,
then V is the progenerator corresponding to F −1G : Mod-S′ → Mod-S. (In fact,
one can take V = HomR(P, Q).)
Every (S, R)-progenerator P induces an isomorphism σP : Cent(R) → Cent(S)
given by σP (r) = s where s is the unique element of Cent(S) satisfying sp = pr
for all p ∈ P . As σP depends only on the isomorphism class of P , it follows
that any equivalence of categories F : Mod-S → Mod-R induces an isomorphism
σF : Cent(R) → Cent(S).
1 According to textbooks, an equivalence between two categories A and B consists of a quartet
(F, G, δ, ε) such that F : A → B and G : B → A are functors and δ : idA → GF and
ε : idB → F G are natural isomorphisms. We do not need this detailed description here and hence
we only specify F . In this case, the implicit functor G is determined up to natural isomorphism.
4
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
Let C be a commutative ring and assume R and S are C-algebras. We say that
R and S are Morita equivalent as C-algebras or over C, denoted R ∼Mor/C S, if
there exists an equivalence F : Mod-S → Mod-R such that σF (c · 1R) = c · 1S for
all c ∈ C. Equivalently, this means that there exists an (S, R)-progenerator P such
that cp = pc for all p ∈ P and c ∈ C.
If S is an arbitrary ring that is Morita equivalent to R and F : Mod-S → Mod-R
is any equivalence, then we can make S into a C-algebra by letting C act on S via
σF . In this setting, we have S ∼Mor/C R.
2.2. Types. To make the phrasing of some results in the next sections easier, we
now introduce types: Let C be a commutative ring and let R and S be central
C-algebras. (The algebra R is central if the map c 7→ c · 1R : C → Cent(R) is
an isomorphism.) Every equivalence of categories F : Mod-S → Mod-R gives rise
to an isomorphism σF : Cent(R) → Cent(S). As both Cent(R) and Cent(S) are
isomorphic to C, we can realize σF as an automorphism of C, which we call the
type of F .
(For example, when F is of type idC , R is Morita equivalent to S
as C-algebras.) Likewise, the type of an (S, R)-progenerator P is the type of the
equivalence induced by P . Namely, it is the unique automorphism σ of C satisfying
σ(c)p = pc for all p ∈ P , c ∈ C.
Let α be an automorphism or an anti-automorphism of R. The type of α is
defined to be its restriction to C = Cent(R). For example, an involution of R is of
the first kind (i.e. it fixes Cent(R) pointwise) if and only if its type is idC .
We now make an essential sharpening of the problem presented in section 1. Let
R be a ring, let C = Cent(R) and let σ ∈ Aut(C). We look for sufficient conditions
ensuring that some or all of the following are equivalent:
(A) R is Morita equivalent over C to a (necessarily central) C-algebra with
involution of type σ.
(B) R is Morita equivalent over C to a (necessarily central) C-algebra with an
anti-automorphism of type σ.
(C) R is Morita equivalent to Rop via equivalence of type σ (Rop is considered
as a C-algebra in the obvious way).
Again, (A)=⇒(B)=⇒(C),2 so we want to show that (B)=⇒(A) or (C)=⇒(B). Satl-
man's Theorem ([19, Th. 3.1]) for involutions of the first kind can now be phrased
as (C)=⇒(A) when R/C is Azumaya and σ = idC .
2.3. Progenerators and Scalar Extension. We proceed by recalling several
facts about the behavior of progenerators with respect to scalar extension.
Throughout, C is a commutative ring and R is a C-algebra. All tensor products
are taken over C. If σ is an automorphism of C, then Rσ denotes the C-algebra
obtained from R by letting C act via σ. Observe that for all M, N ∈ Mod-R,
HomR(M, N ) admits a (right) C-module structure given by (f c)m = (f m)c (f ∈
HomR(M, N ), c ∈ C, m ∈ M ). In addition, if R′ is another C-algebra and M ′ ∈
Mod-R, then M ⊗M ′ has a right R⊗R′-module structure given by (m⊗m′)(r⊗r′) =
mr ⊗ m′r′. We start with recalling a well-known fact:
Proposition 2.1. Let R′ be a C-algebra and let X, Y ∈ Mod-R, X ′, Y ′ ∈ Mod-R′.
Then there is a natural homomorphism of C-modules
HomR(X, Y ) ⊗ HomR′ (X ′, Y ′) → HomR⊗R′ (X ⊗ X ′, Y ⊗ Y ′)
2 To see that (B)=⇒(C), let S be a central C-algebra admitting an anti-automorphism α of
type σ, and assume that there is an (S, R)-progenerator P of type idC (i.e. S ∼Mor/C R). Let P ′
be the (Rop, S)-bimodule obtained from P by setting rop · p · s = sαpr. Then P ′ is an (Rop , S)-
progenerator, hence P ′ ⊗S P is an (Rop, R)-progenerator, and the latter is easily seen to have
type σ.
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
5
given by setting (f ⊗f ′)(x⊗x′) = f x⊗f ′x′. This homomorphism is an isomorphism
whenever XR, X ′
R′ are finitely generated projective.
Proof. See [8, pp. 14], for instance. Alternatively, one can easily check that the map
in the proposition is an isomorphism in case X = RR and X ′ = R′
R′ . Since the
map is natural (in the functorial sense), it is additive in X and X ′, hence it is an
isomorphism whenever X and X ′ are summands of Rn and R′m, respectively. (cid:3)
As a special case, we get:
Proposition 2.2. Let S be a C-algebra, let RS := R⊗S, and set XS = X ⊗S for all
X ∈ Mod-R. (Observe that XS is a right RS-module via (x ⊗ s)(r ⊗ s′) = xr ⊗ ss′.)
Then for all X, Y ∈ Mod-R, there is a natural homomorphism
HomR(X, Y ) ⊗ S → HomRS (XS, YS)
given by setting (f ⊗ s)(x ⊗ s′) = f x ⊗ ss′ for s, s′ ∈ S, x ∈ X, r ∈ R. This
homomorphism is an isomorphism when XR is finitely generated projective.
Proof. Take R′ = X ′ = Y ′ = S in Proposition 2.1.
(cid:3)
Proposition 2.3. Let S and D be C-algebras and let P be an (S, R)-progenerator
of type σ ∈ Aut(C). Put RD = R ⊗ D, Sσ
D = (Sσ) ⊗ D and PD = P ⊗ D, and
endow PD with an (Sσ
D, RD)-bimodule structure by setting (s ⊗ d)(p ⊗ d′)(r ⊗ d′′) =
(spr) ⊗ (dd′d′′). Then PD is an (Sσ
Proof. Since P has type σ, End(PR) ∼= Sσ as C-algebras. By Proposition 2.2,
EndRD (PD) = HomRD (PD, PD) ∼= HomR(P, P ) ⊗ D = Sσ ⊗ D = Sσ
D. It is routine
to verify that the action of Sσ
D on PD via endomorphisms is the action specified in
the proposition. Finally, that P is a right R-progenerator implies that PD is a right
RD-progenerator, hence PD is an (Sσ
D, RD)-progenerator. The type is verified by
straightforward computation.
(cid:3)
D, RD)-progenerator of type idD.
Proposition 2.4. Let P be an (S, R)-progenerator and let N and M be the prime
radicals (resp. Jacobson radicals) of R and S, respectively. View P := P/P N as
a right R := R/N -module. Then P N = M P , hence P = P/M P admits a left
S-module structure. Furthermore, P is an (S, R)-progenerator.
Proof. By [15, Pr. 18.44], there is an isomorphism between the lattice of R-ideals
and the lattice of (S, R)-submodules of P given by I 7→ P I. Similarly, the ideals of
S correspond to (S, R)-submodules of P via J 7→ JP , hence every ideal I ER admits
a unique ideal J E S such that JP = P I. The ideal J can also be described as
HomR(P, P I). This description implies that S/J = HomR(P, P )/ Hom(P, P I) ∼=
HomR(P, P/P I) ∼= EndR/I (P/P I). Thus, P/P I is an (S/J, R/I)-progenerator.
Choose I = N . Then by [15, Cor. 18.45] (resp. [15, Cor. 18.50]) J = M , so we are
done.
(cid:3)
3. General Bilinear Forms
General bilinear forms were introduced in [10]. In this section, we recall their
basics and record several facts to be needed later. When not specified, proofs can
be found in [10, §2]. Throughout, R is a (possibly non-commutative) ring.
Definition 3.1. A (right) double R-module is an additive group K together with
two operations ⊙0, ⊙1 : K × R → K such that K is a right R-module with respect
to each of ⊙0, ⊙1 and
(k ⊙0 a) ⊙1 b = (k ⊙1 b) ⊙0 a
∀ k ∈ K, a, b ∈ R .
We let Ki denote the R-module obtained by letting R act on K via ⊙i.
6
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
For two double R-modules K, K ′, we define Hom(K, K ′) = HomR(K0, K ′
0) ∩
HomR(K1, K ′
1). This makes the class of double R-modules into an abelian cate-
gory (which is isomorphic to Mod-(R ⊗Z R) and also to the category of (Rop, R)-
bimodules).3
An involution of a double R-module K is an additive bijective map θ : K → K
satisfying θ ◦ θ = idK and
(k ⊙i a)θ = kθ ⊙1−i a
∀a ∈ R, k ∈ K, i ∈ {0, 1} .
Definition 3.2. A (general) bilinear space over R is a triplet (M, b, K) such that
M ∈ Mod-R, K is a double R-module and b : M × M → K is a biadditive map
satisfying
b(xr, y) = b(x, y) ⊙0 r
and
b(x, yr) = b(x, y) ⊙1 r
for all x, y ∈ M and r ∈ R. In this case, b is called a (general) bilinear form (over
R). Let θ be an involution of K. The form b is called θ-symmetric if
b(x, y) = b(y, x)θ
∀x, y ∈ M .
See [10, §2] for various examples of general bilinear forms.
Fix a double R-module K and let i ∈ {0, 1}. The i-K-dual (or just i-dual) of an
R-module M is defined by
M [i] := HomR(M, K1−i) .
Note that M [i] admits a right R-module structure given by (f r)(m) = (f m) ⊙i r
(where f ∈ M [i], r ∈ R and m ∈ M ). In fact, M 7→ M [i] is a left-exact contravariant
functor from Mod-R to itself, which we denote by [i]. Also observe that R[i] ∼= Ki
via f ↔ f (1).
Let b : M × M → K be a (general) bilinear form. The left adjoint map and right
adjoint map of b are defined as follows:
Adℓ
b : M → M [0],
(Adℓ
bx)(y) = b(x, y) ,
Adr
b : M → M [1],
(Adr
bx)(y) = b(y, x) ,
where x, y ∈ M . It is straightforward to check that Adℓ
b are right R-linear.
We say that b is right (resp. left) regular if Adr
b) is bijective. If b is both
right and left regular, we say that b is regular. Left and right regularity are not
equivalent properties; see [10, Ex. 2.6].
b (resp. Adℓ
b and Adr
Assume b is regular. Then for every w ∈ EndR(M ) there exists a unique element
wα ∈ EndR(M ) such that
b(wx, y) = b(x, wαy)
∀x, y ∈ M .
The map w 7→ wα, denoted α, turns out to be an anti-automorphism of EndR(M )
which is called the (right) corresponding anti-automorphism of b. (The left corre-
sponding anti-automorphism of b is the inverse of α.) If b is θ-symmetric for some
involution θ : K → K, then α is easily seen to be an involution.
We say that two bilinear spaces (M, b, K), (M, b′, K ′) are similar if there is an
isomorphism f : K → K ′ such that b′ = f ◦ b. It is easy to see that in this case, b
and b′ have the same corresponding anti-automorphism, provided they are regular.
3 The usage of double R-modules, rather than (Rop , R)-modules or R ⊗Z R-modules, was more
convenient in [10], so we follow the notation of that paper.
In addition, the notion of double
module is more natural when considering bilinear forms as a special case of multilinear forms,
where the form takes values in a (right) multi-R-module.
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
7
Theorem 3.3 ([10, Th. 5.7]). Let M be a right R-generator. Then the map sending
a regular bilinear form on M to its corresponding anti-automorphism gives rise to
a one-to-one correspondence between the class of regular bilinear forms on M , con-
sidered up to similarity, and the anti-automorphisms of EndR(M ). Furthermore,
the correspondence maps the equivalence classes of forms which are θ-symmetric
with respect to some θ to the involutions of EndR(M ).
The theorem implies that every anti-automorphism α of EndR(M ), with M an
R-generator, is induced by some regular bilinear form on M , which is unique up
to similarity. We will denote this form by bα and the double R-module in which it
takes values by Kα. In case α is an involution, then bα is symmetric with respect
to some involution of Kα, which we denote by θα.
The objects Kα, bα and θα can be explicitly constructed as follows: Let W =
EndR(M ). Then M is a left W -module. Using α, we may view M as a right W -
module by defining m · w = wαm. Denote by M α the right W -module obtained.
Then Kα = Mα ⊗W M . We make Kα into a double R-module by defining (x ⊗
y) ⊙0 r = x ⊗ yr and (x ⊗ y) ⊙1 r = xr ⊗ y. The form bα is given by bα(x, y) = y ⊗ x,
and when α is an involution, θα : Kα → Kα is defined by (x ⊗ y)θα = y ⊗ x.
We will also need the following technical proposition.
Proposition 3.4 ([10, Lm. 7.7]). Fix a double R-module K. For M ∈ Mod-R,
define ΦM : M → M [1][0] by (ΦM x)f = f (x) for all x ∈ M and f ∈ M [1]. Then:
(i) {ΦM }M∈Mod-R is a natural transformation from idMod-R to [0][1] (i.e. for
all N, N ′ ∈ Mod-R and f ∈ HomR(N, N ′), one has f [1][0] ◦ ΦN = ΦN ′ ◦ f ).
(ii) Φ is additive (i.e. ΦN ⊕N ′ = ΦN ⊕ ΦN ′ for all N, N ′ ∈ Mod-R).
(iii) (Adr
(iv) R[1][0] can be identified with EndR(K1). Under that identification, (ΦRr)k =
b for every general bilinear form b : M × M → K.
b)[0] ◦ ΦM = Adℓ
k ⊙0 r for all r ∈ R and k ∈ K.
To finish, we recall that the orthogonal sum of two bilinear spaces (M, b, K) and
(M ′, b′, K) is defined to be (M ⊕ M ′, b ⊥ b′, K) where (b ⊥ b′)(x ⊕ x′, y ⊕ y′) =
b(x, y) + b′(x′, y′). The form b ⊥ b′ is right regular if and only if b and b′ are right
regular.
4. Double Progenerators
The observation which forms the basis of all results of this paper is the fact that
whether a ring R is equivalent to a ring with an anti-automorphism (resp. involu-
tion) can be phrased in terms of existence of certain bilinear forms (resp. double
R-modules). In this section, we state and prove this criterion (Proposition 4.3 and
Theorem 4.5).
Throughout, R is a ring and C = Cent(R). Recall from section 2 that for all
M, N ∈ Mod-R, HomR(M, N ) admits a (right) C-module structure. In particular,
EndR(M ) is a C-algebra.
Let K be a double R-module. Then K can be viewed as an (Rop, R)-bimodule
by setting aop · k · b = k ⊙0 b ⊙1 a. If this bimodule is an (Rop, R)-progenerator,
we say that K is a double R-progenerator. The type of a double R-progenerator
is the type of its corresponding (Rop, R)-module. Namely, it is the automorphism
σ ∈ Aut(C) satisfying k ⊙0 c = k ⊙1 σ(c) for all c ∈ Cent(R), k ∈ K.
It turns out that Theorem 3.3 is useful for producing double progenerators.
Lemma 4.1. Let M be an R-progenerator and let α be an anti-automorphism of
EndR(M ). Then Kα is a double R-progenerator. Viewing EndR(M ) as a C-algebra,
the type of Kα is the type of α.
8
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
Proof. Let W = EndR(M ). Recall from section 3 that Kα = M α ⊗W M . Since
MR is an R-progenerator, M is a (W, R)-progenerator. Endow M α with a left Rop-
module structure by setting ropm = mr. Then M α is an (Rop, W )-bimodule and,
moreover, it is easily seen to be an (Rop, W )-progenerator (because M is a (W, R)-
progenerator). By Morita theory (see section 2), this means that Kα = Mα ⊗W M
is an (Rop, R)-progenerator, as required. That the type of Kα is the type of α
follows by straightforward computation.
(cid:3)
Lemma 4.2. Fix a double R-progenerator K. Then:
(i) ΦM is an isomorphism for all M ∈ proj-R (see Proposition 3.4 for the
definition of Φ).
(ii) The (contravariant) functors [0], [1] : proj-R → proj-R are mutual inverses.
(iii) Let (M, b, K) be a bilinear space with M ∈ proj-R. Then b is right regular
if and only if b is left regular.
Proof. (i) Since K is a double R-progenerator, every automorphism of K1 is of
the form k 7→ k ⊙0 r for a unique r ∈ R. Hence, ΦR is an isomorphism by
Proposition 3.4(iv). By the additivity of Φ (Proposition 3.4(ii)), ΦRn is also an
isomorphism for all n. As every M ∈ proj-R admits an M ′ ∈ proj-R with M ⊕M ′ ∼=
Rn, it follows that ΦM is an isomorphism (since ΦM ⊕ ΦM ′ = ΦRn ).
(ii) Recall that R[i] ∼= Ki ∈ proj-R. Since the functor [i] is additive, it follows
that [i] takes proj-R into itself. By (i), Φ : idproj-R → [1][0] is a natural isomorphism.
For all M ∈ Mod-R, define ΨM : M → M [0][1] by (ΨM x)f = f (x), where f ∈ M [0]
and x ∈ M . Then a similar argument shows that Ψ : idproj-R → [0][1] is a natural
isomorphism. It follows that [0] and [1] are mutual inverses.
(iii) By Proposition 3.4(iii), (Adr
b is bijective
b is bijective. The other direction follows by symmetry. (Use the identity
(cid:3)
b, so by (i), that Adr
b)[0] ◦ ΦM = Adℓ
implies Adℓ
(Adℓ
b)[1] ◦ ΨM = Adr
b.)
Proposition 4.3. The ring R is Morita equivalent over C to a (necessarily central)
C-algebra with an anti-automorphism of type σ ∈ Aut(C) if and only if there exists
a regular bilinear space (M, b, K) such that M is an R-progenerator and K is a
double R-progenerator of type σ.
Proof. If (M, b, K) is a regular bilinear space, we may associated to b its correspond-
ing anti-automorphism α : EndR(M ) → EndR(M ). Since M is an R-progenerator,
EndR(M ) ∼Mor/C R (recall that we view EndR(M ) as a C-algebra). In addition,
for all x, y ∈ M and c ∈ C, we have b(x, y) ⊙1 σ(c) = b(x, y) ⊙0 c = b(cx, y) =
b(x, cαy) = b(x, y) ⊙1 cα, so since K1 is faithful (because it is a progenerator), the
type of α is σ.
Conversely, let M be an R-progenerator and assume EndR(M ) has an anti-
automorphism of type σ. Then by Theorem 3.3, bα : M × M → Kα is a regular
bilinear form and Kα is a double R-progenerator of type σ by Lemma 4.1.
(cid:3)
Lemma 4.4. Let K be a double R-module with involution θ. For every M ∈
Mod-R, define uθ,M : M [0] → M [1] by uθ,M (f ) = θ ◦ f . Then uθ,M is a natural
isomorphism of right R-modules.
Proof. By computation.
(cid:3)
The proof of following theorem demonstrates an idea that we wish to stress: One
can construct involutions on rings that are Morita equivalent to R by constructing
symmetric general bilinear forms. Note that all possible involutions are obtained in
this manner by Theorem 3.3. (However, this fails if we limit ourselves to standard
sesquilinear forms. Indeed, the base ring may not even have an anti-automorphism;
see [10, Exs. 2.4 & 2.7], or section 11.)
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
9
Theorem 4.5. The ring R is Morita equivalent over C to a C-algebra with an
involution of type σ ∈ Aut(C) if and only if there exists a double R-progenerator of
type σ admitting an involution.
Proof. Assume MR is an R-progenerator such that EndR(M ) has an involution of
type σ. Then, as in the proof of Proposition 4.3, Kα is a double R-progenerator of
type σ. Since α is an involution, Kα has an involution, namely θα.
Conversely, assume K is a double R-progenerator of type σ with an involution θ.
Let P be any right R-progenerator and let M = P ⊕ P [1]. Define b : M × M → K
by b(x ⊕ f, y ⊕ g) = gx + (f y)θ. The form b is clearly θ-symmetric. We claim that b
is regular. By Lemma 4.2(iii) (or since b is θ-symmetric), it is enough to show only
right regularity. Indeed, a straightforward computation shows that
(cid:21) ∈ HomR(P ⊕ P [1], P [1] ⊕ P [1][1]) .
Adr
b =(cid:20)
0
uθ,P [1] ◦ ΦP
idP [1]
0
As ΦP and uθ,P [1] are both bijective by Lemmas 4.2(i) and 4.4, respectively, so
is Adr
b. Let α : EndR(M ) → EndR(M ) be the anti-endomorphism associated
with b. Then α is an involution (since b is θ-symmetric), and, as in the proof of
Proposition 4.3, α is of type σ.
(cid:3)
Using very similar ideas, one can show the following variation, which states when
a particular ring S that is Morita equivalent to R over C has an anti-automorphism
or an involution of a given type. Compare with [19, Th. 4.2].
Proposition 4.6. Let M be a right R-progenerator. Then EndR(M ) has an anti-
automorphism (involution) if and only if there exists a double R-progenerator K of
type σ (admitting an involution θ) and a right regular (θ-symmetric) bilinear form
b : M × M → K.
5. Rings That Are Morita Equivalent to Their Opposites
Let R be a ring.
In this section, we use Proposition 4.3 to show that under
certain finiteness assumptions, R ∼Mor Rop implies that R is Morita equivalent to
a ring with an anti-automorphism (i.e. (C)=⇒(B)). Whether this holds in general
is still open. Henceforth, we freely consider (Rop, R)-progenerators as double R-
progenerators and vice versa (see section 4).
We begin with two lemmas whose purpose is to show that the functors [0] and
[1] commute with certain scalar extensions.
D , RD)-module as in Proposition 2.3. Then KD is an (Rop
Lemma 5.1. Let K be an (Rop, R)-progenerator of type σ ∈ Aut(Cent(R)), let
C ⊆ Cent(R) be a subring fixed pointwise by σ, and let D/C be a commutative ring
extension. For every P ∈ proj-R, let PD := P ⊗C D ∈ proj-RD. Make KD into an
(Rop
D , RD)-progenerator
and (P [1])D ∼= (PD)[1] for all P ∈ proj-R (the functor [1] is computed with respect
to K in the left hand side and with respect to KD in the right hand side).
Proof. That KD is an (Rop
that (Rop)σ
from Proposition 2.2.
D , RD)-progenerator follows from Proposition 2.3 (observe
D = (Rop)D = (RD)op since σ fixes C). That (P [1])D ∼= (PD)[1] follows
(cid:3)
Lemma 5.2. Let K be an (Rop, R)-progenerator and let N be the prime (resp.
Jacobson) radical of R. For all P ∈ proj-R, define P := P/P N ∼= P ⊗R (R/N ) ∈
[1]
proj-R/N . Then EndR(K) ∼= R
(the functor [1] is computed with respect to K in the left hand side and with respect
to K in the right hand side).
, R)-progenerator and P [1] ∼= P
, K is an (R
op
op
10
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
Proof. By Proposition 2.4, KN = N opK and K is an (R
, R)-progenerator. Let
P ∈ proj-R. We claim that P [1]N = HomR(P, (KN )0) (we consider KN as a double
R-module here). Indeed, by definition, P [1]N = HomR(P, K0)N ⊆ HomR(P, (K ⊙1
N )0) = HomR(P, (N opK)0) = HomR(P, (KN )0), so there is a natural inclusion
P [1]N ⊆ HomR(P, (KN )0). As this inclusion is additive in P , it is enough to verify
the equality for P = RR, which is routine. Now, we get
op
P [1] =
HomR(P, K0)
P [1]N
=
HomR(P, K0)
HomR(P, (KN )0)
∼= HomR(P, K 0) ∼= HomR(P , K0) = P
as required.
[1]
,
(cid:3)
Recall that a ring R is called Q-finite if both dimQ(R ⊗Z Q) and the cardinality
of ker(R → R ⊗Z Q) are finite. The following lemma is inspired by [3, Pr. 18.2].
Lemma 5.3. Assume R is Q-finite and let N be the prime radical of R. Then
N is nilpotent and R/N ∼= T × Λ where T is a semisimple finite ring and Λ is a
subring of a semisimple Q-algebra E such that ΛQ = E.
Proof. Let T = ker(R → R ⊗Z Q). Then T is an ideal of R. Consider T as a non-
unital ring and let J = Jac(T ) (i.e. J is the intersection of the kernels of all right
T -module morphisms T → M where M is a simple right T -module with M T = M ).
Arguing as in [3, Pr. 18.2], we see that J is also an R-ideal. Since J and all its
submodules are finite (as sets), J n = 0 for some n (because M J ⊆ N for any right
T -module M and any maximal submodule N ≤ M ). In particular, J ⊆ N .
Replacing R with R/J, we may assume J = 0. Now, T is semisimple and of finite
length, hence it has a unit e. As er, re ∈ T for all r ∈ R, we see that er = ere = re.
Thus, e ∈ Cent(R) and R ∼= T × (1 − e)R. As Λ := (1 − e)R is torsion-free, it is a
subring of E := Λ ⊗Z Q, which is a f.d. Q-algebra by assumption.
Let I = Jac(E) ∩ Λ. Then I is nilpotent, hence 0 × I ⊆ N . Replacing R by
R/(0 × I), we may assume E semisimple. We are thus finished if we show that the
prime radical of Λ, denoted N ′, is 0 (because then N = 0 × N ′ = 0). Indeed, by
[5, Th. 2.5], Λ is noetherian (here we need E to be semisimple). Thus, N ′ is nil,
hence so is N ′Q E E. But E is semisimple, so we must have N ′ ⊆ N ′Q = 0.
(cid:3)
Theorem 5.4. Assume R is semilocal or Q-finite and let K be an (Rop, R)-
progenerator. Then for every P ∈ proj-R there is n ∈ N such that P ∼= P [1]n
:=
P [1][1]...[1] (n times). When R is semilocal, n is independent of P .
Proof. Let N denote the Jacobson radical of R in case R is semilocal and the
prime radical of R otherwise. In the latter case, N is nilpotent by Lemma 5.3, so
N ⊆ Jac(R) in both cases.
Using the notation of Lemma 5.2, observe that every P ∈ proj-R is the projective
cover of P = P/P N . As projective covers are unique up to isomorphism, we have
P ∼= Q ⇐⇒ P ∼= Q for all P, Q ∈ proj-R. Therefore, using Lemma 5.2, we may
assume N = 0. Thus, R is semisimple or R = T × Λ with Λ ⊗Z Q semisimple and
T finite and semisimple.
Assume R is semisimple and let V1, . . . , Vt be a complete set of simple R-modules
up to isomorphism. By Lemma 4.2(ii), [1] permutes isomorphism classes of f.g.
projective R-modules, and since [1] is additive, it permutes the indecomposable
projective modules, namely, V1, . . . , Vt. Therefore, there is n ∈ N (say, n = t!) such
that V [1]n
∼= Vi for all i. As any P ∈ proj-R is a direct sum of simple modules, we
get P [1]n ∼= P . We also record that length(P [1]) = length(P ).
i
Now assume R = T × Λ as above, and set E := Λ ⊗Z Q and S := T × E.
Let σ ∈ Aut(Cent(R)) be the type of K and let e = (1T , 0) ∈ R. Then e is the
maximal torsion idempotent in Cent(R), hence σ(e) = e. Define C := Ze + Z(1 − e)
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
11
and D := Ze + Q(1 − e)+ ⊆ T × E = S. Then σC = idC and S ∼= R ⊗C D.
Let K ′ = K ⊗C D. Then by Lemma 5.1, K ′ is an (Sop, S)-progenerator and
(PS)[1] ∼= (P [1])S for all P ∈ proj-R (where PS := P ⊗R S).
For every P ∈ proj-R, define j(P ) = length(PS). Since S is semisimple, the
previous paragraphs imply that j(P [1]) = j(P ). Therefore, we are done if we show
that for all m ∈ N there are finitely many isomorphism classes of modules P with
j(P ) = m (for this implies that action of [1] have finite orbits on proj-R/ ∼=, which
yields the theorem). Indeed, thanks to [5, Th. 2.8], up to isomorphism, there are
finitely many Λ-modules of any given Z-rank, and this is easily seen to imply that
there are finitely many isomorphism classes of modules P ∈ proj-R with PS of a
given length, as required.
(cid:3)
Remark 5.5. It is also possible to prove the semilocal case of Theorem 5.4 by using
a result of Facchini and Herbera [9, Cor. 2.13] stating that every semilocal ring R
has only finitely many indecomposable projective modules up to isomorphism, and
every f.g. projective module is a direct sum of these modules.
Corollary 5.6. Let C = Cent(R), σ ∈ Aut(C) and assume R is semilocal or
Q-finite. Then R is Morita equivalent over C to a (central) C-algebra with an anti-
automorphism of type σ if and only if R is Morita equivalent to Rop (as rings) via
Morita equivalence of type σ.
Proof. We only check the nontrivial direction. Assume R is Morita equivalent to
Rop via Morita equivalence of type σ. Then there exists a double R-progenerator
K of type σ. By Theorem 5.4, there exists n ∈ N such that R[1]n ∼= RR. Let
. Then there is an isomorphism f : M → M [1]. This isomorphism
gives rise to a right regular bilinear space (M, b, K) with f = Adr
b, namely, b :
M × M → K is given by b(x, y) = (f y)x. By Lemma 4.2(iii), b is regular, so we
are done by Proposition 4.3.
(cid:3)
M =Ln−1
m=0 R[1]m
The proof of Corollary 5.6 cannot be applied to arbitrary rings since there are
double R-modules K for which M [1] ≇ M for all 0 6= M ∈ proj-R:
Example 5.7. Let F be a field and let R = lim−→ {M2(F )⊗n}n∈N. Then any f.g.
projective right R-module is obtained by scalar extension from a f.g. projective
module over M2(F )⊗n ֒→ R. Using this, it not hard (but tedious) to show that
the monoid (proj-R/ ∼=, ⊕) is isomorphic to (Z[ 1
2 ] ∩ [0, ∞), +). If Vn is the unique
simple projective right module over M2(F )⊗n, then Vn ⊗ R is mapped to 2−n.
Let T denote the transpose involution on M2(F ). Then bT = lim
involution of R. Let K = R2 ∈ proj-R. Then EndR(K) ∼= M2(R) ∼= R and using bT ,
we can identify EndR(K) with Rop, thus making P into an (Rop, R)-progenerator.
We claim that for M ∈ proj-R and n ∈ N, M [1] ∼= M implies M = 0. To see this,
let ϕ1 be the map obtained from [1] by identifying proj-R/ ∼= with Z[ 1
2 ] ∩ [0, ∞).
∼= RR. Therefore, ϕ1(x) = 1
Then ϕ1(2) = 1 because (R2
2 x for all
x ∈ Z[ 1
2 ] ∩ [0, ∞), which means that ϕ1(x) 6= x for all 0 6= x ∈ Z[ 1
{T ⊗n}n∈N is an
R)[1] ∼= K 2
1
−→
2 ] ∩ [0, ∞).
6. Semiperfect Rings
Let R be a semilocal ring that is Morita equivalent to its opposite ring. While
Corollary 5.6 implies that R is Morita equivalent to a ring with an anti-automorphism,
it does not provide any information about this ring. However, when R is semiper-
fect, we can actually point out a specific ring which is Morita equivalent to R and
has an anti-automorphism.
12
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
Recall that a ring R is semiperfect if R is semilocal and idempotents lift modulo
Jac(R) (e.g. if Jac(R) is nil). In this case, the map
P 7→ P/P Jac(R) : proj-R/ ∼= → proj-(R/ Jac(R))/ ∼=
i=1 P mi
i
i=1 P ni
proj-R can be written as P ∼=Lt
particular, RR ∼= Lt
is bijective (e.g. see [18, §2.9] or [4, Th. 2.1]). Thus, up to isomorphism, R admits
finitely many indecomposable projective right R-modules P1, . . . , Pt and any P ∈
i with n1, . . . , nt uniquely determined. In
for some (necessarily positive) m1, . . . , mt. The ring
R is called basic if m1 = · · · = mt = 1, namely, if RR is a sum of non-isomorphic
indecomposable projective modules. It is well-known that every semiperfect ring
R admits a basic ring S that is Morita equivalent to it over Cent(R), and S is
well-determined up to isomorphism as a Cent(R)-algebra. (Indeed, S and the map
Cent(R) → S can be determined from Mod-R; see [15, Prp. 18.37], the preceding
discussion, and [15, Rm. 18.43]. Once S is fixed, the Morita equivalence Mod-S →
Mod-R is not unique in general.) Explicitly, we can take S = EndR(M ), where
M = P1 ⊕ · · · ⊕ Pt. (For example, if R = Mn(L) with L a local ring, then S = L.)
Assume now that there is an (Rop, R)-progenerator K of type σ ∈ Aut(Cent(R)).
Then the functor [1] must permute the isomorphism classes of P1, . . . , Pt (because
they are the only indecomposable modules in proj-R) and hence stabilize M =
P1 ⊕ · · · ⊕ Pt. Therefore, as in the proof of Corollary 5.6, EndR(M ), the basic ring
which is Morita equivalent to R, has an anti-automorphism of type σ. We have
thus obtained the following proposition.
Proposition 6.1. Let R be a semiperfect ring and let S be a basic ring that is
Morita equivalent to R over Cent(R). Then R is Morita equivalent to Rop via an
equivalence of type σ ∈ Aut(Cent(R)) if and only if S has an anti-automorphism
of type σ.
Proposition 6.1 has a version for involutions in which the ring S is replaced with
M2(S).
Proposition 6.2. Let R be a semiperfect ring and let S be a basic ring that is
Morita equivalent to R over Cent(R). If R has an involution of type σ, then so
does M2(S).
Proof. Let α be an involution of R of type σ, and let K be the double R-module
obtained from R by setting k ⊙0 r = rαk and k ⊙1 r = kr (k, r ∈ R). Then K
is double R-progenerator of type σ admitting an involution θ := α. For any P ∈
proj-R, let bP denote the bilinear form b constructed in the proof of Theorem 4.5.
Then (bP , P ⊕ P [1], K) is an α-symmetric regular bilinear space. Let P1, . . . , Pt be
a complete list of indecomposable projective right R-modules up to isomorphism.
Then b := bP1 ⊥ · · · ⊥ bPt is a regular α-symmetric bilinear form defined over
M ⊕ M [1], where M = P1 ⊕ · · · ⊕ Pt. Therefore, EndR(M ⊕ M [1]) has an involution
of type σ, namely, the corresponding anti-automorphism of b. However, we have
seen above that M ∼= M [1], so EndR(M ⊕ M [1]) ∼= M2(EndR(M )) ∼= M2(S) as
Cent(R)-algebras.
(cid:3)
In fact, in many cases, the assumptions of Proposition 6.2 imply that S itself
has an involution. The general statement and its proof will be given in the next
section. However, in case S is a division ring or local with with 2 ∈ S×, there is a
significantly simpler proof, with which we finish this section.
Proposition 6.3. Let L be a local ring and let R = Mn(L). Assume 2 ∈ L× or
L is a division ring. Then R has an involution of type σ if and only if L has an
involution of type σ.
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
13
Proof. That R has an involution when L has an involution is obvious. Conversely,
let α be an involution of R and let K, θ be as in the proof of Proposition 6.2.
Let P be the unique indecomposable projective right R-module. Then necessarily
P ∼= P [1]. Fix an isomorphism f : P → P [1] and observe that the bilinear form
b(x, y) := (f y)x+ ((f x)y)θ (resp. b′(x, y) := (f y)x− ((f x)y)θ) is θ-symmetric (resp.
(−θ)-symmetric). In addition, Adr
Assume 2 ∈ L×. Then f −1◦Adr
b′ = 2 idP . Since the r.h.s. is invertible
and lies in the local ring EndR(P ) ∼= L, one of f −1 ◦ Adr
b′ must be
invertible, hence one of b, b′ is right regular. In any case, we get that L ∼= EndR(P )
has an involution of type σ, namely, the corresponding anti-automorphism of b or
b′.
b + Adr
b +f −1◦Adr
b, f −1 ◦ Adr
b′ = 2f .
When L is a division ring, P is simple, so b′ is regular if Adr
b′ = 0,
then b′ = 0, hence (f y)x = ((f x)y)θ for all x, y ∈ P . This means that the bilinear
form b′′(x, y) := (f y)x is θ-symmetric. As Adr
(cid:3)
b′ 6= 0. If Adr
b′′ = f , b′′ is regular.
Remark 6.4. In case L is a division ring, Proposition 6.3 follows from [11, Th. 1.2.2].
The case where L is also finite dimensional over its center was noted earlier by Al-
bert (e.g. see [1, Th. 10.12]).
7. Transferring Involutions
Motivated by Proposition 6.2, this section concerns the question of whether the
fact that the ring Mn(R) has an involution implies that R has an involution. We
shall provide a positive answer for "most" semilocal rings, but the question is still
open for general semilocal rings, and even for finite dimensional algebras over fields.
For non-semilocal rings, that Mn(R) has an involution does not imply that R has
an anti-automorphism; an example will be given in section 11.
Throughout, R is a ring, C = Cent(R), σ ∈ Aut(C), and n ∈ N is fixed.
We begin by introducing some notation. For an anti-endomorphism γ : R → R,
we define the standard double R-module of (R, γ) to be R endowed with the actions
k ⊙0 r = rγk and k ⊙1 r = kr. Observe that when γ is invertible, this yields a
double R-progenerator of same type as γ. We now recall the following theorem,
which follows from Th. 7.8 in [10] and the comment following the statement. To
make the exposition more self-contained, we present here an ad-hoc proof which is
slightly simpler than the proof given in [10], but not essentially different.
Theorem 7.1. Assume that up to isomorphism M = RR is the only right R-module
satisfying M n ∼= Rn (e.g. when R is semilocal). Then for every anti-automorphism
α : Mn(R) → Mn(R), there exists an anti-automorphism γ : R → R such that Kα
is isomorphic to the standard double R-module of (R, γ). Furthermore, there is an
inner automorphism ϕ ∈ Inn(Mn(R)) such that ϕ ◦ α = Tnγ where Tnγ is defined
by (rij )Tnγ = (rγ
ji).
Proof. Identify Mn(R) with EndR(Rn), and let bα : Rn × Rn → K := Kα be
the bilinear form induced by α. Since bα is regular, we have an isomorphism
bα : Rn → (Rn)[1] ∼= (R[1])n. By assumption, this means that RR ∼= R[1].
Adr
Observe that R[1] = HomR(R, K0) ∼= K1 via f 7→ f (1). Thus, we may identify
RR ∼= R[1] with K1, so now k ⊙1 r = kr for all k, r ∈ K = R. Define γ : R → R
by rγ = 1R ⊙0 r, and note that k ⊙0 r = 1 ⊙0 r ⊙1 k = rγ ⊙1 k = rγk. This easily
implies that γ is an anti-endomorphism of R, and that K is just the standard
double R-module of (R, γ). Since K is a double R-progenerator, we must have
Rop ∼= End(K1) where the isomorphism is given by rop 7→ [k 7→ k ⊙0 r]. As
k ⊙0 r = rγ k, this forces γ to be an anti-automorphism. Finally, we refer the reader
to the proof of [10, Th. 7.8(iv)] for the existence of ϕ.
(cid:3)
14
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
As a corollary, we get the following theorem, which can be regarded as a variation
of Propositions 6.2.
Theorem 7.2. Suppose that up to isomorphism M = RR is the only right R-module
satisfying M n ∼= Rn. If Mn(R) has an involution (resp. anti-automorphism) of type
σ, then M2(R) (resp. R) has an involution (resp. anti-automorphism) of type σ.
Proof. The case where Mn(R) has an anti-automorphism follows from Theorem 7.1.
Let α be an involution of Mn(R). By Theorem 3.3 and Lemma 4.1, Kα is a double
R-progenerator admitting an involution. Thus, by the proof of Theorem 4.5, applied
with P = RR, EndR(R ⊕ R[1]) has an involution of type σ. As in the proof of
Theorem 7.1, R[1] ∼= (Kα)1 ∼= RR, so EndR(R ⊕ R[1]) ∼= EndR(R2) ∼= M2(R) (as
C-algebras).
(cid:3)
We now show that if Mn(R) has an involution, then so does R, under further
assumptions on R. To make the statement more general, we introduce reduced
types.
Set R := R/ Jac(R) and C := Cent(R) (C may be larger than the image of
C = Cent(R) in R). Let S be a ring such that S := S/ Jac(S) is equipped with
a central C-algebra structure (e.g. Rop or Mn(R)). If P is an (S, R)-progenerator,
then by Proposition 2.4, P Jac(R) = Jac(S)P and P := P/P Jac(R) is an (S, R)-
progenerator. Thus, P induces an isomorphism Cent(R) → Cent(S). We may
view this isomorphism as an automorphism σ : C → C which we call the reduced
type of P . Specializing to the case S = Rop, we can define reduced types of
(Rop, R)-progenerators and double R-progenerators. In addition, if α is an anti-
automorphism of S, then the reduced type of α is the automorphism it induces on
Cent(S) ∼= C. It is easy to check that all previous results mentioning types are
also valid for reduced types, provided the following convention: If M is a right
R-progenerator and S = EndR(M ), then C-algebra structure of S is given by the
isomorphism C → Cent(S) induced by the (S, R)-progenerator M := M/M Jac(R).
Theorem 7.3. Let R be a semilocal ring such that Mn(R) has an involution of type
i=1 Mni (Di)
σ ∈ Aut(C) and reduced type σ ∈ Aut(C). Write R := R/ Jac(R) ∼=Qt
where Di is a division ring and ni ∈ N, and identify C = Cent(R) with Qi=1 Fi
where Fi = Cent(Di). We view each Fi as a non-unital subring of C. Assume that
there is 1 ≤ ℓ ≤ t such that for all i ∈ {1, . . . , t} \ {ℓ} we have
(1) Di is not a field, or ni is even, or σFi 6= idFi ,
and for the index ℓ we have
(2) Dℓ is not a field, or nℓ is even, or σFℓ 6= idFℓ, or 2 ∈ D×
ℓ .
Then R has an involution of type σ and reduced type σ.
Proof. Step 1. Note first that for an R-module M , M n ∼= Rn implies M ∼= RR.
Indeed, this is clear when R is semisimple, and we can reduce to this case by
replacing M with M := M/M Jac(R), as explained in the proof of Theorem 5.4.
Let α be an involution of Mn(R) as above. By Theorem 7.1, we may assume Kα
is the standard double R-module of (R, γ) for some anti-automorphism γ : R → R,
necessarily of type (resp. reduced type) σ (resp. σ). Furthermore, by Theorem 3.3,
Kα has an involution θ. Namely, θ : R → R is a map satisfying
(1)
(aγbc)θ = cγbθa
∀a, b, c ∈ R.
Suppose that θ fixes an invertible element u ∈ R×. We claim that the map
β : R → R defined by rβ = u−1rγu is an involution, clearly of the same type and
reduced type as γ. Indeed, observe that for all r ∈ R, (ur)θ = rγ uθ = uu−1rγu =
urβ. Therefore, ur = (ur)θθ = (urβ)θ = urββ, which implies r = rββ.
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
15
We are thus reduced to show that there exists u ∈ R× with uθ = u. Likewise,
we are also done if we can find u ∈ R× with uθ = −u; simply replace θ with −θ.
Step 2. Let J = Jac(R). Clearly J γ = J, hence γ induces an anti-automorphism
on R. We claim that J θ ⊆ J. Indeed, J θ is an ideal by (1) and the bijectivity of
γ, so is enough to show that 1 + J θ = (1θ + J)θ consists of left invertible elements.
Indeed, 1 = (1 · 1)θθ = (1 · 1θ)θ = (1θ)γ · 1θ, hence 1θ is left invertible, and a simple
variation shows that 1θ is also right invertible. Thus, 1θ + J consists of invertible
elements. Now, θ sends right invertible elements to left invertible elements since
sr = 1 implies rγsθ = (sr)θ = 1θ ∈ R×. Therefore, (1θ + J)θ consists of left
invertible elements, as required.
Let γ, θ be the maps induced by γ, θ on R = R/J. In the following steps, we
shall establish the existence of x ∈ R with x + xθ ∈ R× or x − xθ ∈ R×. This would
finish the proof since we can then take u of Step 1 to be x ± xθ. It is enough to
prove the existence of x for R, γ, θ and then lift it arbitrarily to R. Thus, we may
henceforth assume R is semisimple.
Step 3. Let C = Cent(R). Then Cγ = C. Moreover, for all c ∈ C,
c = cθθ = ((1c)θ)θ = (cγ1θ)θ = (1θcγ)θ = cγγ1θθ = cγγ ,
i = fi for all i.
so γC is an involution. Let {e1, . . . , et} be the primitive idempotents of C. As R
is semisimple, we may assume that eiRei = eiR = Mni(Di) (with Di, ni as in the
theorem). Now, γ permutes {e1, . . . , et} and the orbits have size 1 or 2. Choose
representatives {ei}i∈I for the orbits of γ such that 1 ∈ I, and let fi = ei + eγ
if
i
ei 6= eγ
and f γ
i and fi = ei otherwise. Then {fi}i∈I are pairwise orthogonal,Pi∈I fi = 1
particular, θ takes fiRfi = fiR into itself for all i. As R =Q fiR, it is enough to
and take x =Pi∈I x′
ℓ is a unit of fℓR. (Indeed, take x =Pi∈I xi if xℓ + xθ
ℓ ∈ (f1R)×.) We now split into cases.
i with ei 6= eγ
i . Then fiR = eiR × eγ
i ∈ (fiR)× for all i 6= ℓ, and at least one
ℓ ∈ (f1R)×
ℓ − x′θ
Step 4. Suppose fi = ei + eγ
Observe that if f ∈ R satisfies f γ = f , then (f Rf )θ = f γRθf γ−1
find xi, x′
of xℓ + xθ
i ∈ fiR such that xi + xθ
ℓ , x′
ℓ − x′θ
= f Rf . In
i − x′θ
i if x′
i , x′
i = (eiei)θ = eγ
i eθ
i ∈ eγ
i R. We claim that eθ
i is invertible in eγ
i R. Observe
i R. Indeed, we
that eθ
have
i = (eγ
i eγ
i )θθ = (eγγ
eγ
i = eγθθ
i = eγ−1θθ
eγ
i
i )θ = eγθγ
i eγθ
)θθ = (eγ−1θ
eγγθ
i = eγθγ
eγ−1γ−1
)θ = eγ−1γ−1θ
eθ
i ,
i
i
i
i
i
= (eγ−1
i
eγ−1
i
eγ−1θγ−1
i
= eθ
i eγ−1θγ−1
i
,
i is left and right invertible in eγ
hence eθ
repeatedly). Since ei is invertible in eiR, it follows that ei + eθ
invertible in fiR = eiR × eγ
i R (we used (1) and the fact that eγγ
i and ei − eθ
i R. We may therefore take xi = x′
i = ei.
i = ei
i are
Step 5. Assume that fi = ei, and let S := fiR = eiR = Mni (Di). By
Theorem 7.1, there is an anti-automorphism β : Di → Di and v ∈ S× such that
v−1sγv = sTni β for all s ∈ S. Let γ′ = Tniβ and define θ′ : S → S by sθ ′
=
v−1sθvγ−1
. It is straightforward to check that (aγ ′
bc)θ ′
= a for
all a, b, c ∈ S. Furthermore, for all x ∈ S, x ± xθ ′
= v−1(vx + (vx)θ). Therefore,
without loss of generality, we may replace γ, θ with γ′, θ′.
a and aθ ′θ ′
= cγ ′
bθ ′
Let {ejk} be the standard Di-basis of S = Mni (Di). Then γ = Tniβ implies
eγ
jk = ekj . Therefore, (ejj Sekk)θ = eγ
jj = ekkSejj, namely, θ takes ejkDi to
ekjDi. Now, if ni is even, we can take xi = x′
j=1 e(2j)(2j−1). Indeed, both
kkSθeγ−1
i =Pni/2
16
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
xi + xθ
i and x′
i − x′θ
i have matrices of the form
0 ∗
∗ 0
0 ∗
∗ 0
. . .
with all the ∗-s being nonzero, so they are invertible.
Next, embed D := Di in S by sending d ∈ D to the diagonal matrix with diagonal
entries (d, . . . , d). Since γ = Tniβ, the anti-automorphism β of D coincides with
γD. We claim that θ sends D into itself.
Indeed, as a subring of S, D is the
centralizer of {ejk}, and for all d ∈ D and 1 ≤ j, k ≤ ni, we have
ejkdθ = eγ
kjdθ = (dekj )θ = (ekj d)θ = dθeγ−1
i , x′
kj = dθejk .
i − x′θ
It is therefore enough to find xi, x′
i ∈ D×. Since D is a
division ring, the non-existence of xi or x′
i forces θ = ± idD, which in turn implies
β = γD = idD, because then ±d = dθ = (1d)θ = dγ1θ = ±dγ. This is impossible
in case Di is not a field or σ (which is the restriction of γ to Cent(R)) does not fix
Fi = Cent(S) = Cent(D) pointwise.
i ∈ D with xi + xθ
In case i 6= ℓ, either ni is even, or Di is not a field, or σ does not fix Fi element-
wise, so the existence of both xi and x′
i is guaranteed by the previous paragraphs.
In case i = ℓ, ni is odd, Di is a field, and σ fixes Fj element-wise, we must have
char Di 6= 2. Returning to the setting of the previous paragraph, this means that
for any 0 6= y ∈ D, at least one of y + yθ, y − yθ is nonzero (for their sum is 2y 6= 0).
Thus, either x1 or x′
(cid:3)
1 exists, as required.
Corollary 7.4. Let R be a semiperfect ring having an involution of type σ and
i=1 Mni (Di) as in Theorem 7.3 and
reduced type σ. Write R := R/ Jac(R) ∼= Qt
assume that there is 1 ≤ ℓ ≤ t such that for all i ∈ {1, . . . , t} \ {ℓ} we have
(1′) Di is not a field, or σFi 6= idFi ,
and for the index ℓ we have
(2′) Dℓ is not a field, or σFℓ 6= idFℓ, or 2 ∈ D×
ℓ .
Then the basic ring of R has an involution of type σ and reduced type σ.
Proof. Let S be the basic ring of R. By Proposition 6.2, M2(S) has an involution
of type σ and reduced type σ. Using the description S given in section 6 and
i=1 Di.
Therefore, S satisfies the conditions of Theorem 7.3, and hence S has an involution
of type σ and reduced type σ.
(cid:3)
Proposition 2.4, it is easy to see that S is the basic ring of R. That is, S ∼=Qt
Corollary 7.5. Let R be a finite-dimensional algebra over a field F . Suppose
Mn(R) admits an involution α sending F = F · 1R into itself and satisfying αF 6=
idF . Then R has an involution of the same type and reduced type as α. The same
applies to the basic F -algebra that is Morita equivalent to R.
Proof. Let a ∈ F be an element with aα − a 6= 0. Write C = Cent(R/ Jac(R)) =
F1 × · · · × Fn with each Fi a field, and let σ ∈ Aut(C) be the reduced type of α.
Pick some 0 6= x ∈ Fi and view it as an element of C.
If both σ(x) = x, and
σ(ax) = ax, then ax = σ(ax) = σ(a)σ(x) = aαx, which implies (a − aα)x = 0,
a contradiction. Thus, σ does not fix any of the fields Fi element-wise, so we are
done by Theorems 7.3 and Corollary 7.4.
(cid:3)
Remark 7.6. In general, if R, θ, γ are as in the proof of Theorem 7.3, then there
may not exist u ∈ R× with u = uθ or u = −uθ. For example, take R = F ×F with F
a field of characteristic not 2, let α = idR, and let θ be defined by (x, y)θ = (x, −y).
This implies that the proof of Theorem 7.3 cannot be applied to arbitrary semilocal
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
17
rings. In fact, we believe that there exist semilocal rings R without involution such
that M2(R) has an involution.
Remark 7.7. Given R, the datum of θ and γ satisfying (1) is equivalent to the
datum of an anti-structure, a notion introduced by Wall [22, pp. 244] to define
quadratic forms over rings. Recall that an anti-structure on R consists of an anti-
automorphism γ : R → R and an element v ∈ R× such that vγ = v−1 and
rγγ = vrv−1 for all r ∈ R. Fixing γ, there is a one-to-one correspondence between
the possible θ-s and v-s given by v = θ(1) and rθ = rγ v = vrγ−1
. Therefore, the
proof of Theorem 7.2 shows that if R has an anti-structure, then M2(R) has an
involution. Unfolding the construction, this involution is given by
(cid:20) a b
d (cid:21) 7→(cid:20)
c
dγ
v−1cθv−1 aγ−1 (cid:21) =(cid:20)
bθ
dγ
v−1cγ
bγv
aγ−1 (cid:21)
This trick was noted by several authors in the past (see [19, pp. 532], for instance).
The proof of theorem 4.5 can be viewed as a generalization of it.
This means that the question of whether there is a semilocal ring R without
involution such that M2(R) has an involution is equivalent to whether there is a
semilocal ring without an involution admitting an anti-structure. In fact, we were
unable to find in the literature an example of a general ring with these properties.
8. Counterexamples
We now demonstrate that there are "nice" rings which are not Morita equivalent
to rings with an involution (of any kind), but still admit an anti-automorphism. In
the first example, that automorphism fixes the center element-wise.
Example 8.1. Recall that a poset consists of a finite set I equipped with a partial
order which we denote by ≤. For a field F and a poset I, the incidence algebra
F (I) is defined to be the subalgebra of the I-indexed matrices over F spanned as
an F -vector space by the matrix units {eij i, j ∈ I, i ≤ j}. If I is not the disjoint
union of two non-comparable subsets, then Cent(F (I)) = F . In this case, we say I
is connected. The algebra F (I) is well-known to be basic.
Let R be a ring that is Morita equivalent to F (I). The poset I can be recov-
ered from R, up to isomorphism, as follows: Let E denote the set of primitive
idempotents in R. Then R× acts by conjugation on E. Define IR to be the set
of equivalence classes in E, and for i, j ∈ IR, let i ≤ j if and only if eRf 6= 0 for
some (and hence any) e ∈ i and f ∈ j. To see that IR is indeed isomorphic to I,
observe that there is an isomorphism between I and the isomorphism classes of in-
decomposable projective R-modules via i 7→ Pi := eR (e ∈ i), and i ≤ j if and only
if HomR(Pj, Pi) 6= 0. This shows that IR can be determined from Mod-R, hence
IR ∼= IF (I). Finally, IF (I) is easily seen to be isomorphic to I (via sending the class
of eii ∈ F (I) to i). The construction of IR implies that any anti-automorphism
(resp. involution) of R induces an anti-automorphism (resp. involution) on I ∼= IR.
Suppose now that I is connected, has an anti-automorphism, but admits no
involution. Then the previous paragraphs imply that Cent(F (I)) = F , and any
ring that is Morita equivalent to F (I) does not have an involution. On the other
hand, the anti-automorphism of I gives rise to an anti-automorphism of F (I) of
type idF . An example of such a poset was given in [21] by Scharlau (for other
18
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
purposes); I is the 12-element poset whose Hasse diagram is:
•
•
?⑧⑧⑧⑧⑧⑧⑧
•
•
❅❅❅❅❅❅❅
/ •
•
/ •
•
•
•
_❅❅❅❅❅❅❅
⑧⑧⑧⑧⑧⑧⑧
•
•
(Using Scharlau's words, it is "the simplest example I could find".) An anti-
automorphism of I is given by rotating the diagram ninety degrees clockwise.
Involutions and automorphisms of incidence algebras are well-understood in gen-
eral; we refer the reader to the survey [6] and the references therein.
Example 8.2. Various f.d. division algebras admitting an anti-automorphism but
no involution were constructed in [16]. By Proposition 6.3, none of these algebras
is Morita equivalent to a ring with involution. Note that by Albert's Theorem
([1, Th. 10.19]), anti-automorphisms of such division algebras cannot fix the center
pointwise.
9. Azumaya Algebras
The rest of this paper concerns Saltman's Theorem about Azumaya algebras
with involution (see section 1) and the construction of Azumaya algebras without
involution. As preparation, we now briefly recall Azumaya algebras and several
facts about them to be used later. We refer the reader to [20] and [8] for an
extensive discussion and proofs. Throughout, C is a commutative ring and, unless
specified otherwise, all tensor products are taken over C.
9.1. Azumaya Algebras. A C-algebra A is called Azumaya if A is a progenerator
as a C-module and the standard map Ψ : A ⊗ Aop → EndC (A) given by Ψ(a ⊗
bop)(x) = axb is an isomorphism. When C is a field, being Azumaya is equivalent
to being simple and central, so Azumaya algebras are a generalization of central
simple algebras.
Let A, B be Azumaya C-algebras. The following facts are well-known:
(1) Cent(A) = C and CentA⊗B(C ⊗ B) = A ⊗ C.
(2) A ⊗ B and Aop are Azumaya C-algebras.
(3) If ψ : C → C′ is a commutative ring homomorphism, then A ⊗ C′ is an
Azumaya C′-algebra (C′ is viewed as a C-algebra via ψ).
(4) For every C-progenerator P , EndC (P ) is an Azumaya C-algebra.
(5) If B is a subalgebra of A, then B′ := CentA(B) is Azumaya (over C),
B = CentA(B′) and B ⊗ B′ ∼= A via b ⊗ b′ 7→ bb′.
For every M ∈ proj-C, we define rank(M ) = rankC (M ) to be the function
Spec(C) → Z sending a prime ideal P to dimkP (M ⊗ kP ) where kP is the fraction
field of C/P . We write rank(M ) = n to denote that rank(M )(P ) = n for all
P ∈ Spec(C). For example, when C is a field, rank(M ) = dimC (M ). More
generally, rank(M ) is constant when Spec(C) is connected (as a topological space),
or equivalently, when C does not decompose as product of two nonzero rings. In
fact, we can always write C = C(M)
) is
constant. (This follows from the well-known facts that rank(M ) : Spec(C) → Z
is continuous, and Spec(C) is a compact topological space.) Lastly, observe that
such that rank(M ⊗ C(M)
i
1 × · · · × C(M)
t
/
?
O
O
_
o
o
/
O
O
o
o
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
19
if ψ : C → C′ is a commutative ring homomorphism and P ′ ∈ Spec(C′), then
rankC ′(M ⊗ C′)(P ′) = rankC (M )(P ) where P = ψ−1(P ′). This allows us to
extend scalars when computing ranks.
Proposition 9.1. Let A and B be Azumaya C-algebras and let ϕ : A → B be a
homorphism of C-algebras. Then ϕ is injective. If moreover rank(A) = rank(B),
then ϕ is an isomorphism.
Two Azumaya C-algebras A, B are said to be Brauer equivalent, denoted A ∼Br B,
if there are C-progenerators P, Q such that
A ⊗ EndC (P ) ∼= B ⊗ EndC (Q)
as C-algebras. The Brauer class of A, denoted [A], is the collection of Azumaya
algebras which are Brauer equivalent to A. The Brauer group of C, denoted Br(C),
is the set of all Brauer equivalence classes endowed with the group operation [A] ⊗
[B] = [A ⊗ B]. The unit element of Br(C) is the class of C, namely, the class of
Azumaya algebras which are isomorphic to EndC (P ) for some progenerator P . The
inverse of [A] is [Aop].
The following theorem, which is essentially due to Bass, presents an alternative
definition of the Brauer equivalence.
Theorem 9.2 (Bass). Let A, B be two Azumaya C-algebras. Then A ∼Br B ⇐⇒
A ∼Mor/C B, i.e. there exists an (A, B)-progenerator P such that cp = pc for all
p ∈ P and c ∈ C.
Proof. See [3, Cor. 17.2]. The assumption that Spec(C) is noetherian in [3] can be
ignored by [20, Th. 2.3]; see also [19, §1].
(cid:3)
The exponent of an Azumaya algebra A is its order in Br(C).
Theorem 9.3. Let A be an Azumaya C-algebra. Then rank(A) is a square. Fur-
thermore, if rank(A) divides n2, then A⊗n ∼Br C.
We will also need the following proposition.
Proposition 9.4. Let A, B be Azumaya C-algebras and let K be an (A, B)-
bimodule satisfying ck = kc for all c ∈ C. Then K is an (A, B)-progenerator if and
only if K is a (C, Aop ⊗ B)-progenerator with Aop ⊗ B acting via k(aop ⊗ b) = akb.
In particular, in this case, EndC (C K) ∼= Aop ⊗ B.
Proof. The "only if" part easily follows from CentAop⊗B(C ⊗ B) = Aop ⊗ C, so we
turn to prove the "if" part. Let D = A ⊗ Aop and consider A as a right D-module
via a(x ⊗ yop) = yax. Since C A is a progenerator and D ∼= End(C A) (because
A is Azumaya), A is a (C, D)-progenerator. By Proposition 2.3, K ⊗ Aop is an
(A ⊗ Aop, B ⊗ Aop)-progenerator and hence C A ⊗D (K ⊗ Aop) is a (C, B ⊗ Aop)-
progenerator. It is straightforward to check that C A ⊗D (K ⊗ Aop) ∼= K as (C, B ⊗
Aop)-bimodules via x ⊗D (k ⊗ yop) 7→ yxk and k 7→ 1 ⊗D (k ⊗ 1) in the other
direction, so we are done.
(cid:3)
9.2. Galois Extensions. Let G be a finite group of ring-automorphisms of C and
let C0 = CG be the ring of elements fixed by G. For every 2-cocycle f ∈ Z 2(G, C×),4
let ∆(C/C0, G, f ) = Lσ∈G Cuσ where {uσ}σ∈G are formal variables. We make
∆(C/C0, G, f ) into a ring by linearly extending the following relations
uσuτ = f (σ, τ )uστ ,
uσc = σ(c)uσ,
∀σ, τ ∈ G, c ∈ C .
4 Recall that a 2-cocycle of G taking values in C× is a function f : G × G → C× satisfying
σ(f (τ, η))f (σ, τ η) = f (σ, τ )f (στ, η) and f (1, σ) = f (σ, 1) = 1 for all σ, τ, η ∈ G. The 2-cocycles
with the operation of point-wise multiplication form an abelian group denoted Z 2(G, C×).
20
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
This makes ∆(C/C0, G, f ) into a C0-algebra whose unity is u1.
We say that C/C0 is a Galois extension with Galois group G if ∆(C/C0, G, 1) is
an Azumaya C0-algebra (1 denotes the trivial 2-cocycle f (σ, τ ) ≡ 1). In this case:
(1) ∆(C/C0, G, 1) ∼= EndC0 (C) viaPσ cσuσ 7→ [x 7→Pσ cσσ(x)] ∈ EndC0(C).
(2) The C0-algebra ∆(C/C0, G, f ) is Azumaya for all f ∈ Z 2(G, C×).
(3) rankC0(C) = G.
(4) For every commutative C0-algebra D, the extension C ⊗C0 D/C0 ⊗C0 D is
Galois with Galois group {g ⊗C0 idD g ∈ G}.
See [20, §6] for proofs. Azumaya algebras of the form ∆(C/C0, G, f ) are called
crossed products.
Proposition 9.5. Let C/C0 be a Galois extension with Galois group G. Assume
M is a C-module endowed with a G-action such that σ(mc) = σ(m)σ(c) for all
σ ∈ G, m ∈ M , c ∈ C. Then M G ⊗C0 C ∼= M via m ⊗ c 7→ mc, where
M G := {m ∈ M : σ(m) = m ∀σ ∈ G} .
In particular, rankC0(M ) = rankC0(C) rankC0(M G) = G · rankC0(M G). Further-
more, if M is an Azumaya C-algebra and G acts via ring automorphisms on M ,
then M G is an Azumaya C0-algebra.
Proof. See [20, Prps. 6.10 & 6.11].
(cid:3)
9.3. Corestriction. Let C/C0 be a Galois extension with Galois group G. For
every Azumaya C-algebra A and σ ∈ G, define Aσ to be the C-algebra obtained
from A by viewing A as a C-algebra via σ : C → A. The algebra Aσ is also
Azumaya, but it need not be Brauer-equivalent to A. Observe that the algebra
B :=Nσ∈G Aσ admits a G-action given by τ (Nσ aσ) =Nσ aτ −1σ and that action
satisfies σ(bc) = σ(b)σ(c) for all σ ∈ G, b ∈ B, c ∈ C. The corestriction of A (with
respect to C/C0) is defined to be
CorC/C0(A) = BG =(cid:16)Oσ∈G
Aσ(cid:17)G
.
By Proposition 9.5, CorC/C0(A) is an Azumaya C0-algebra. Moreover, it can be
shown that the corestriction induces a group homomorphism
CorC/C0
: Br(C) → Br(C0)
given by CorC/C0([A]) = [CorC/C0(A)]. We also note that the corestriction can be
defined for separable extensions C/C0; see [20, Ch. 8] for further details.
10. Saltman's Theorem
In this section, we show how to recover the Knus-Parimala-Srinivas proof of
Saltman's Theorem ([13, §4]) as an application of Theorem 4.5. In order to keep
the exposition as self-contained and fluent as possible, we will first give a proof of
Saltman's Theorem using Theorem 4.5, and then explain how this proof relates to
the proof in [13].
10.1. Saltman's Theorem. Let C be a commutative ring and let R be a C-
algebra. Recall that a Goldman element of R/C is an element g ∈ R ⊗C R such
that g2 = 1 and g(r ⊗ s) = (s ⊗ r)g for all r, s ∈ R.
Proposition 10.1. All Azumaya C-algebras have a Goldman element
Proof. See [14, p. 112] or [20, Pr. 5.1], for instance.
(cid:3)
Theorem 10.2 (Saltman). Let C be a commutative ring and let A be an Azumaya
C-algebra. Then:
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
21
(i) A is Brauer equivalent to an Azumaya algebra B with an involution of the
first kind if and only if A ∼Br Aop.
(ii) Let C/C0 be a Galois extension with Galois group {1, σ} (σ 6= 1). Then
A is Brauer equivalent to an Azumaya algebra B with an involution whose
restriction to C is σ if and only if CorC/C0(B) ∼Br C0.
Proof. (i) By Theorem 9.2, A ∼Br Aop if and only if there exists a double A-
progenerator of type idC (i.e. an (Aop, A)-progenerator of type idC ). Likewise, by
Theorems 4.5 and 9.2, A is Brauer equivalent to a C-algebra B with involution
of the first kind if and only if there exist a double A-progenerator of type idC
with involution. Therefore, it is enough to show that every double A-progenerator
K of type idC has an involution. Indeed, consider K as an A ⊗C A-module via
k · (a ⊗C a′) = k ⊙0 a ⊙1 a′ (a, a′ ∈ A) and let g be a Goldman element of A. It is
easy to check that k 7→ kg is an involution of K.
(ii) Throughout, D = A ⊗C Aσ and E = DG = CorC/C0(D). Recall that σ
extends to an automorphism of D, also denoted σ, given by σ(a ⊗ a′) = a′ ⊗ a. By
Theorems 4.5 and 9.2, it is enough to prove that CorC/C0(A) ∼Br C0 if and only if
then there exists a double A-progenerator of type σ admitting an involution.
Assume K is a double A-progenerator of type σ with involution θ. Then K can
be considered as an (Aop, Aσ)-progenerator of type idC , hence by Proposition 9.4,
End(C K) ∼= A ⊗ Aσ = D. Extend the left action of C on K to a left action
of ∆ := ∆(C/C0, G, 1) on K by letting uσ act as θ. Then it is easy to see that
End(∆K) ∼= DG = E. Viewing ∆op and E as subrings of End(C0K), this means E is
the centralizer of ∆op in End(C0 K). As all these algebras are Azumaya over C0, we
have ∆op⊗C0 E ∼= End(C0K). In Br(C0) this reads as [C0]⊗[E] = [∆op]⊗[E] = [C0],
so CorC/C0(A) = E ∼Br C0.
Conversely, assume E = CorC/C0(A) ∼Br C0. Then there exists a (C0, E)-
progenerator Q of type idC0. Let K = Q ⊗C0 C. Then by Proposition 2.2, K is a
(C0⊗C0 C, E⊗C0 C)-progenerator. Identify E⊗C0 C with D via (e⊗c) 7→ ec. Then K
is a (C, D)-progenerator, hence by Proposition 9.4, K is an (Aop, Aσ)-progenerator
via aop · k · a′ := k(a ⊗ a′). We may thus view K as a double A-progenerator of
type σ. Let θ = σ ⊗C0 idQ : K → K (so (c ⊗ q)θ = σ(c) ⊗ q). We claim that θ is
an involution of K. Indeed, θ2 = idK and for all c, c′ ∈ C, e ∈ E, q ∈ Q, we have
((c ⊗ q)(c′e))θ = (cc′ ⊗ qe)θ = σ(c)σ(c′) ⊗ qe = (σ(c) ⊗ q)(σ(c′)e) = (c ⊗ q)θ(σ(c′e))
(e = σ(e) since e ∈ E = DG). This implies that (kx)θ = kθσ(x) for all k ∈ K,
x ∈ D. Putting x = 1 ⊗ a and x = a ⊗ 1 yields that θ is an involution.
(cid:3)
Remark 10.3. (i) The proof of Theorem 10.2 also shows that a C-algebra R with
a Goldman element is Morita equivalent to its opposite over C if and only if it is
Morita equivalent as a C-algebra to an algebra with an involution of the first kind.
We could not find a non-Azumaya algebra admitting a Goldman element, though.
(ii) A slightly different proof of the "only if" part of Theorem 10.2(ii) that does
not use double progenerators appears in [19, pp. 531].
In order to explain the connection of the previous proof with the Knus-Parimala-
Srinivas proof of Saltman's Theorem ([13, §4]), let us backtrack our proof to see
what is the algebra B. According to Theorem 4.5, B = EndA(P ⊕ P [1]) with P
an arbitrary A-progenerator, and the involution of B is induced by the bilinear
form bP constructed in the proof of Theorem 4.5. The functor [1] is computed
using a double A-progenerator K with involution which is obtained in the proof of
Theorem 10.2. Let us choose P = AA. Then B ∼= EndA(A ⊕ K1) (since A[1] =
HomA(AA, K0) ∼= K1 via f 7→ f (1A)). This algebra with involution is essentially
the algebra with involution constructed in [13, §4]. However, in [13], the involution
of B is constructed directly, while here we have obtained it from a general bilinear
22
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
form on the right A-module A⊕K1, and hence suppressed some of the computations
of [13].
We also note that many proofs of special cases of Saltman's Theorem in the
literature, [13] and [19] in particular, involve the construction of an involutary
map θ taking some (Aop, A)-bimodule or an equivalent object K into itself and
satisfying (aopkb)θ = bopkθa (a, b ∈ A, k ∈ K). For example, consider the map
α in [19, pp. 532 -- 3, 537], the maps ψ and σP in [13, pp. 71 -- 2] and the map u of
[12, pp. 196]. This hints that these proofs can be effectively phrased using general
bilinear forms.
10.2. Rank Bounds. We proceed by showing that the algebra B in Saltman's
Theorem can be taken to have rank(B) = 4 rank(A) in part (i) and rank(B) =
4 min{rank(A), rank(Aσ)} in part (ii). This follows from the following technical
lemmas.
Lemma 10.4. Let A be an Azumaya C-algebra and let M, N ∈ proj-A. Then
rank(HomA(M, N )) =
rank(M ) · rank(N )
rank(A)
.
Proof. Let P ∈ Spec(C) and let F be an algebraic closure of kP , the fraction field
of C/P . Set AF = A ⊗C F , MF = M ⊗C F and NF = N ⊗C F . By Proposition 2.2,
we have HomAF (MF , NF ) ∼= HomA(M, N ) ⊗C F ∼= (HomA(M, N ) ⊗C kP ) ⊗kP F .
Therefore, it is enough to verify the lemma in case C is an algebraically closed
field, i.e. when C = F , in which case rankC (−) and dimF (−) coincide.
In this
case, we must have A ∼= Mn(F ) (as F -algebras) and M ∼= Ms×n(F ), N ∼= Mt×n(F )
(as A-modules) for suitable s, t, n ∈ N ∪ {0}. But then, dimF HomA(M, N ) =
dimF Mt×s(F ) = ts = dimF (N ) · dimF (M )/ dimF (A), as required.
(cid:3)
Lemma 10.5. Let A be an Azumaya C-algebra and let K be a double A-progenerator
of type σ ∈ Aut(C). Then
rank(K0) =prank(A) rank(Aσ)
and
rank(K1) =qrank(A) rank(Aσ−1 )
Proof. Consider K as an (Aop, A)-bimodule as explained in section 4. Since A is
of type σ, EndA(K0) = End(KA) ∼= (Aσ)op as C-algebras, hence rank(EndA(K0)) =
rank(Aσ). However, by Lemma 10.4, we have rank(EndA(K0)) = rank(K0)2/ rank(A).
Comparing both expressions yields the formula for rank(K0). The formula for
rank(K1) is shown in the same manner.
(cid:3)
Proposition 10.6. In Theorem 10.2(i) (resp. Theorem 10.2(ii)), the algebra B can
be chosen such that rank(B) = 4 rank(A) (resp. rank(B) = 4 min{rank(A), rank(Aσ)}).
Proof. Let σ be idC in the case of Theorem 10.2(i) and a nontrivial Galois automor-
phism of C/C0 in the case of Theorem 10.2(ii). In the comment after Remark 10.3
we saw that B can taken to be EndA(A ⊕ K1) with K a double A-progenerator of
type σ. In this case, by Lemmas 10.5 and 10.4, we have
rank(B) = (cid:16)rank(A) +prank(A) rank(Aσ)(cid:17)2
rank(A)
= 1 +s rank(Aσ)
rank(A) !2
rank(A) .
In the case of Theorem 10.2(i), this means rank(B) = 4 rank(A), so we are done.
For the case of Theorem 10.2(ii), it is enough to show that A is Brauer equivalent to
an Azumaya algebra A′ of rank min{rank(A), rank(Aσ)} (for then we can replace
A with A′ and get the desired rank).
Recall from section 9 that we can decompose C as a product C = C1 × · · · × Ct
such that rank(A ⊗C Ci) and rank(Aσ ⊗C Ci) are constant for all i. Let ei ∈ C
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
23
the standard way. It is easy to see that every C-algebra R factors as a product
be the idempotent satisfying Ci = eiC. We identify Spec(C) with S Spec(Ci) in
Qi eiR and R/C is Azumaya if and only if eiR/eiC is Azumaya for all i. Define
A′ = Qi A′
i = ei(Aσ)op
otherwise. Then A′ ∼Br A (since eiA′ ∼Br eiA for all i), and, by definition,
rankC (A′) = min{rankC (A), rankC (Aσ)}, as required.
(cid:3)
i where A′
i = eiA if rankCi(eiA) < rankCi(ei(Aσ)) and A′
10.3. The Semilocal Case. In [19, §4], Saltman also showed that when C is
semilocal and connected, one can take B = A in Theorem 10.2 (Albert's Theorems
follow as the special case where C is a field). Let us recover the proof using the
language and the tools of the previous sections:
Since C is connected, A has constant rank, say rank(A) = n2. Suppose the
assumptions of parts (i) or (ii) of Theorem 10.2 are satisfied, and set σ = idC for
part (i). By the proof of Theorem 10.2, there is a double A-module K of type
σ admitting an involution θ. We claim that K is the standard double A-module
of some anti-automorphism γ : A → A (see section 7).
Indeed, by assumption,
rank(A) = n2 = rank(Aσ), hence by Lemma 10.5, rank(K1) = rank(A). We now
claim that for P, Q ∈ proj-A, rank(P ) = rank(Q) implies P ∼= Q. By tensoring
with C/ Jac(C), we may assume C is a finite product of fields and A is a finite
product of central simple algebras, in which case the claim is routine. Therefore,
K1 ∼= AA, and arguing as in the proof of Theorem 7.1 yields the desired γ.
We can now apply the proof of Theorem 7.3 with R = A (which is semilocal)
to assert that A has an involution of type σ. However, we need to verify the
assumptions of the theorem, so let ni, Di and Fi be defined as in Theorem 7.3 for
R = A. Since rank(A) = n2, we have dimFi Mni(Di) = n2 for all i. Thus, when
n is even, for all i, either ni is even or Di is a division ring, as required. When n
is odd and σ 6= idC, set A = A/ Jac(A), C = C/ Jac(C) and C0 = C0/ Jac(C0).
It is a standard fact that A/C is Azumaya (so C = Cent(A)) and C/C0 is Galois
with Galois group {σ, id}, where σ is the map induced by σ on C. Noting that
(C) = 2, we see that σ cannot fix any Fi pointwise, so
C = F1 × · · · × Ft and rankC 0
again the assumptions of Theorem 7.3 hold. Finally, in case n is odd and σ = idC ,
we have A⊗2 ∼Br C (by assumption) and A⊗n ∼Br C (by Theorem 9.3, since
rank(A) = n2), which implies A ∼Br C, i.e. A ∼= EndC (P ) for some C-progenerator
P , necessarily of rank n. By what we have shown above, this implies P ∼= Cn, so
A ∼= EndC(P ) ∼= Mn(C) and A has the transpose involution.
We note that specializing in Theorem 7.3 to the case R is an Azumaya C-
algebra and C is connected saves many technicalities in the last steps of the proof.
In particular, one can use the Skolem-Noether Theorem rather than basing on
Theorem 7.1; cf. the argument given by Saltman in [19, pp. 538].
Remark 10.7. Assume C is semilocal or Q-finite and let τ be any automorphism
of C. Then Corollary 5.6 (together with Theorem 9.2) implies that A is Brauer
equivalent to an Azumaya algebra with an anti-automorphism of type τ if and only
if Aop ∼Br Aτ . The semilocal part of this claim is somewhat standard since it is
well-known that Aop ∼Br Aτ implies Aop ∼= Aτ in this case (e.g. see the previous
paragraphs). However, the Q-finite case seems to be unknown. When τ is a Galois
automorphism of order 2 (i.e. C/C{τ } is Galois with Galois group {1, τ }), the
condition Aop ∼Br Aτ is equivalent to A ⊗C Aτ ∼= ResC/C0(CorC/C0 (A)) ∼ C. In
this special case, it could be that the claim is true without any assumption on C.
11. Azumaya Algebras of Exponent 2 Without Involution
Let C be a commutative ring and let A be an Azumaya C-algebra with A ∼Br
Aop. Then Saltman's Theorem asserts that there is some algebra B ∼Br A with
24
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
involution of the first kind. However, it can be very tricky to construct examples of
algebras A with A ∼Br Aop that do not have an involution already. For example,
Saltman have shown in [19, §4] that this is impossible if C is semilocal or rank(A) =
4. In particular, A cannot be a tensor product of quaternion algebras. (The proof
of the semilocal case was recovered in subsection 10.3. In case rank(A) = 4, the
map a 7→ Tr(a) − a is an involution on A, where Tr(a) denotes the reduced trace
of a.) Saltman has pointed out in [19, §4] how to produce examples of Azumaya
algebras without involution that are trivial in Br(C). However, we have not seen
in the literature examples of non-trivial such algebras. Of course, one can always
take the product of a non-trivial quaternion algebra with a trivial Azumaya algebra
without involution, but this results in C being non-connected (i.e. C is a product of
two rings). One is therefore interested in examples in which C is connected. More
generally, one can ask whether the bound rank(B) ≤ 4 rank(A) of Proposition 10.6
is tight.
In this section, we shall use the results of the section 4 to explain how to detect
whether an Azumaya algebra admits an anti-automorphisms. This will be used to
construct an explicit example of a non-trivial Azumaya algebra over a Dedekind
domain C that does not have an involution. However, this example does not show
that the bound rank(B) ≤ 4 rank(A) is optimal, and it also has zero divisors.
(Even worse, we shall see that for C as in the example, and also for many other
low-dimensional domains, we can always choose B to be without zero divisors and
to satisfy rank(B) ≤ rank(A).)
We thank Asher Auel for pointing us to this problem.
Throughout, C is a commutative ring and σ ∈ Aut(C). Unless specified other-
wise, all tensor products are taken over C. Recall that the Picard group, Pic(C),
consists of the isomorphism classes of rank-1 projective C-modules, multiplication
being tensor product (over C). Equivalently, Pic(C) consists of isomorphism classes
of (C, C)-progenerators of type idC . In case C is a Dedekind domain (e.g. a number
ring), Pic(C) is just the ideal class group of C (e.g. see [17]).
Theorem 11.1. Let A be an Azumaya C-algebra such that Aop ∼Br Aσ, let K
be any (Aop, Aσ)-progenerator of type idC (cf. Theorem 9.2), which we also view
as a double A-progenerator (of type σ), let P be a right A-progenerator and set
P [1] = HomA(P, K0). Then the following conditions are equivalent:
(a) B := EndA(P ) has an anti-automorphism of type σ.
(b) There is [I] ∈ Pic(C) such that I ⊗ P ∼= P [1] as A-modules.
(c) EndA(P ) ∼= EndA(P [1]) as C-algebras.
In particular, if I ⊗ P ≇ P [1] for all [I] ∈ Pic(C), then EndA(P ) does not have an
anti-automorphism of type σ.
Proof. (a)=⇒(b): By Proposition 4.6, there exists a double A-progenerator K ′ of
type σ and a regular bilinear form b : P × P → K ′. View K ′ as a right A ⊗ Aσ-
module via k(a ⊗ a′) = k ⊙0 a ⊙1 a′ and view K as a right A ⊗ Aσ in the standard
way. By Proposition 9.4, both K and K ′ are (C, A⊗Aσ ) progenerators. Thus, there
exists a (C, C)-progenerator I such that K ′ = I ⊗C K. As both K and K ′ have type
σ ∈ Aut(C), I is of type idC and hence [I] ∈ Pic(C). Now, by Proposition 2.1, we
have P ∼= Hom(P, K ′
0) ∼= HomC⊗A(C ⊗ P, I ⊗ K0) = HomC (C, I) ⊗ HomA(P, K0) ∼=
I ⊗ P [1].
(b)=⇒(c): We have EndC (I) = C since I is a (C, C)-progenerator of type idC , so
by Proposition 2.1, EndA(P [1]) ∼= EndC⊗A(I ⊗ P, I ⊗ P ) ∼= EndC(I) ⊗ EndA(P ) ∼=
C ⊗ EndA(P ) ∼= EndA(P ). The isomorphism is easily seen to be a C-algebra
isomorphism.
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
25
(c)=⇒(a): Let ψ : EndA(P [1]) → EndA(P ) be an isomorphism. The map
w 7→ w[1] : EndA(P ) → EndA(P [1]) is an anti-homomorphism of rings (since [1]
is an additive contravariant functor). Moreover, it is an anti-isomorphism of rings
since [1] : proj-A → proj-A is a duality of categories (Lemma 4.2(ii)). It is also
straightforward to check that for c ∈ C ⊆ EndA(P ), one has c[1] = σ(c). Thus,
α : EndA(P ) → EndA(P ) defined by wα = ψ(w[1]) is an anti-automorphism of type
σ.
(cid:3)
Remark 11.2. By applying Theorem 11.1 with P = AA, we can test whether A
itself has an involution. In this case, P [1] is just K1 (via f 7→ f (1)), so we only
need to verify that I ⊗ A ≇ K1 as A-modules for all [I] ∈ Pic(C).
We shall now use Theorem 11.1 to construct an Azumaya algebra B over a
Dedekind domain C such that B ⊗ B ∼Br C, B ≁Br C and B does not have a
C-anti-automorphism. For a fractional ideal I of C, we shall write I ⊗n for the n-th
power of I as a fraction ideal, and I ⊕n for the C-module I ⊕ · · · ⊕ I (n times).
The ambiguous notation I n shall be avoided henceforth, except for writing I −1 to
denote the inverse of I. We shall make extensive usage of some well-known facts
about projective modules over Dedekind domain, such as: Every f.g. projective
module over a Dedekind domain C is a direct sum of fractional ideals, and for
i=1 Ji if and only if
i=1 Ii ∼= Ln
fractional ideals I1, . . . , In, J1, . . . , Jn, we have Ln
[Qi Ii] = [Qi Ji] in Pic(C). We refer the reader to [17] for proofs.
Example 11.3. Let C is a Dedekind domain admitting a non-trivial quaternion
Azumaya C-algebra A. By [19, Th. 4.1], A has an involution of the first kind α,
which gives rise to a double A-module K with K1 ∼= AA (see section 7). Viewing
A as a C-module, we can write AC ∼= C⊕3 ⊕ J with J a fractional ideal.
Suppose further that there is [L] ∈ Pic(C) such that [L⊗8] is not a 16-th power
in Pic(C). We claim that the Azumaya C-algebra
B := EndC (C⊕3 ⊕ L) ⊗ A,
does not have an anti-automorphism of type idC, despite clearly satisfying B ⊗
B ∼Br C and B ≁Br C. We show this by applying Theorem 11.1 with P =
(C⊕3 ⊕ L) ⊗ AA. (The module P is a right C ⊗ A-module which we view as a right
A-module in the standard way. We have EndA(P ) ∼= B by Proposition 2.1.) In
fact, we shall show that I ⊗ P ≇ P [1] as C-modules for all [I] ∈ Pic(C).
Indeed, observe that P [1] = HomA(P, K0) = HomC⊗A((C⊕3⊕L)⊗AA, C⊗K0) ∼=
HomC (C⊕3 ⊕ L, C) ⊗ HomA(AA, K0) ∼= (C⊕3 ⊕ L−1) ⊗ K1. Thus, we have
P [1] ∼= (C⊕3 ⊕ L−1) ⊗ K1 ∼= (C⊕3 ⊕ L−1) ⊗ (C⊕3 ⊕ J)
∼= C⊕9 ⊕ (L−1)⊕3 ⊕ J ⊕3 ⊕ L−1J ∼= C15 ⊕ (L−1)⊗4J ⊗4 .
(as C-modules). On the other hand, for [I] ∈ Pic(C),
I ⊗ P = I ⊗ (C⊕3 ⊕ L) ⊗ A ∼= I ⊗ (C⊕3 ⊕ L) ⊗ (C⊕3 ⊕ J)
∼= I ⊕9 ⊕ (IJ)⊕3 ⊕ (IL)⊕3 ⊕ (ILJ) ∼= C⊕15 ⊕ I ⊗16L⊗4J ⊗4 .
It follows that I⊗P ∼= P [1] as C-modules if and only if [I ⊗16L⊗4J ⊗4] = [(L−1)⊗4J ⊗4]
in Pic(C), or equivalently, if [(I −1)⊗16] = [L⊗8]. But this is impossible by the as-
sumption on L.
We remark that if L is chosen such that [L⊗16] = [C], then (C⊕3 ⊕L)⊕16 ∼= C⊕64.
In this case, M16(B) ∼= A ⊗ M16(C), so M16(B) has an involution of type idC . As
a result, one of the algebras B, M2(B), M4(B), M8(B) does not an involution of
type idC while its 2 × 2 matrix algebra does have such involution. In addition, if
Aut(C) = idC (e.g. if the fraction field of C has no nontrivial automorphisms), then
B has no anti-automorphisms at all.
26
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
Explicit choices of C, A and L satisfying all previous conditions (including
[L⊗16] = [C] and Aut(C) = idC) are the following: Let D be the integer ring
of K := Q[x x3 + x + 521 = 0], and take
C = D[2−1],
A = C[i, j i2 = j2 = −1, ij = −ji],
L = h113, x − 16i⊗3 .
That A is Azumaya follows from the general fact (left to the reader) that (a, b)2,C :=
C[i, j i2 = a, j2 = b, ij = −ji] is Azumaya for all a, b ∈ C×, provided 1
2 ∈ C.
The algebra A is non-trivial in Br(C) since K (and hence C) embeds in R, and
A ⊗C R ∼= (−1, −1)2,R is well-known to be a division ring. The class group of D
is a cyclic group of order 48 generated by [h113, x − 16i] (verified using SAGE), so
when viewed as an element of Pic(D), [h113, x − 16i⊗3] has order 16 and its eighth
power is not a 16-th power in Pic(D). Adjoining 1
2 to D does not affect these facts
by the following easy lemma (note that 2 is prime in D).
Lemma 11.4. Let D be a Dedekind domain, let 0 6= p ∈ D be a prime element of
D, and set Dp = D[ 1
p ]. Then the map [I] 7→ [IDp] : Pic(D) → Pic(Dp) (known as
the restriction map) is an isomorphism of groups.
Proof. That [I] 7→ [IDp] is a group homomorphism is straightforward. It is onto
since any ideal I E Dp is easily seen to satisfy (I ∩ D)Dp = I.
To show injectivity, observe that D has Krull-dimension 1, hence pD is maximal.
As a result, every ideal 0 6= J E D can be written as J = pnJ ′ (n ∈ N) with J ′
is coprime to p. The same applies to elements x ∈ D. Also observe that if J is
coprime to p and x ∈ D, the px ∈ J implies x ∈ J. Indeed, px ∈ J ∩ pD = pJ
(since J is coprime to p), hence x ∈ J.
Suppose now that J E D is such that I := JDp is principal. We need to show
that J is principal (i.e. that [J] is trivial in Pic(D)). Replacing J with p−nJ if
needed, we may assume that J is coprime to p. Let z be a generator of I. Again,
replacing z with pnz (n ∈ Z), we may assume that z ∈ J, and since J is coprime
to p, we may further divide z by p unitl it is coprime to p. Let y ∈ J. Then
y = z(pnw) for some n ∈ Z and w ∈ D coprime to p. This implies p−ny = zw, so
n cannot be negative (since the right hand side is not divisible by p). Therefore,
wpn ∈ D and y = zwpn ∈ zD. This means that J = zD, as required.
(cid:3)
Remark 11.5. Let C be a regular integral domain of Krull dimension at most
2, and let F be the fraction field of C. Assume further that every central simple
F -algebra of exponent 2 is Brauer equivalent to a quaternion algebra. For exam-
ple, this is the case when F is a global field by the Albert-Brauer-Hasse-Noether
Theorem, or when F has transcendence degree at most 2 over a separably closed
subfield by [7]. Then every Azumaya C-algebra A of exponent 2 admits an algebra
B ∈ [A] with involution and rankC (B) ≤ rankC (A). In particular, in this case, the
bound rankC(B) ≤ 4 rankC (A) of Proposition 10.6 is not tight. Indeed, by Saltman
[19, Th. 4.1], it is enough to show that B can be chosen to be a quaternion algebra.
As A′ := A ⊗C F has exponent 2, there exists by assumption a quaternion central
simple F -algebra B′ ∼Br A′. Now, by the proof of [2, Pr. 7.4], B′ contains an
Azumaya C-algebra B such that B′ = B ⊗C F . Finally, by [2, Th. 7.2], B ∼Br A,
so we are done.
12. Questions
We finish with several questions that we were unable to answer.
Question 1. Is there a ring R such that R ∼Mor Rop but R is not Morita equivalent
to a ring with an anti-automorphism (cf. section 1)?
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
27
Question 2. Is there a semilocal ring R such that R does not have an involution
despite M2(R) having an involution (cf. Theorem 7.3)?
Question 3. Is there a non-Azumaya algebra admitting a Goldman element (cf.
Remark 10.3(i))?
Question 4. Let C/C0 be a Galois extension with Galois group {1, σ}. Is it true
that all Azumaya C-algebras A with A ∼Br Aσ are Brauer equivalent to an Azumaya
algebra with an anti-automorphism whose restriction to C is σ (cf. Remark 10.7)?
Question 5. Is the bound rank(B) ≤ 4 rank(A) of Proposition 10.6 tight when the
base ring is connected (cf. Remark 11.5)?
Question 6. Are there Azumaya algebras of exponent 2 and without zero-divisors
that do not admit an involution of the first kind?
For our last question, recall that an involution α on a ring R is called hyperbolic
if there exists an idempotent e ∈ R such that e + eα = 1. In all proofs of Salt-
man's Theorem that we have encountered (e.g. [19], [13], and the proof given in
section 10), the constructed involution was hyperbolic. In contrast, Albert's The-
orem guarantees an involution which is non-hyperbolic (and in fact anisotropic);
indeed, we can take B to be a division ring, and any involution on a division ring
is non-hyperbolic. We therefore ask:
Question 7. Let A be an Azumaya C-algebra with A⊗A ∼Br C. Does there always
exist an Azumaya algebra B ∈ [A] having a non-hyperbolic involution of the first
kind?
References
[1] A. Adrian Albert. Structure of algebras. Revised printing. American Mathematical Society
Colloquium Publications, Vol. XXIV. American Mathematical Society, Providence, R.I., 1961.
[2] Maurice Auslander and Oscar Goldman. Maximal orders. Trans. Amer. Math. Soc., 97:1 -- 24,
1960.
[3] H. Bass. K-theory and stable algebra. Inst. Hautes ´Etudes Sci. Publ. Math., (22):5 -- 60, 1964.
[4] Hyman Bass. Finitistic dimension and a homological generalization of semi-primary rings.
Trans. Amer. Math. Soc., 95:466 -- 488, 1960.
[5] E. Bayer-Fluckiger, C. Kearton, and S. M. J. Wilson. Decomposition of modules, forms and
simple knots. J. Reine Angew. Math., 375/376:167 -- 183, 1987.
[6] Rosali Brusamarello and David W. Lewis. Automorphisms and involutions on incidence al-
gebras. Linear Multilinear Algebra, 59(11):1247 -- 1267, 2011.
[7] A. J. de Jong. The period-index problem for the Brauer group of an algebraic surface. Duke
Math. J., 123(1):71 -- 94, 2004.
[8] Frank DeMeyer and Edward Ingraham. Separable algebras over commutative rings. Lecture
Notes in Mathematics, Vol. 181. Springer-Verlag, Berlin, 1971.
[9] Alberto Facchini and Dolors Herbera. Projective modules over semilocal rings. In Algebra and
its applications (Athens, OH, 1999), volume 259 of Contemp. Math., pages 181 -- 198. Amer.
Math. Soc., Providence, RI, 2000.
[10] Uriya A. First. General bilinear forms. Israel Journal of Mathematics, 2014. Currently avail-
able via Springer Link.
[11] I. N. Herstein. Rings with involution. The University of Chicago Press, Chicago, Ill.-London,
1976. Chicago Lectures in Mathematics.
[12] Nathan Jacobson. Finite-dimensional division algebras over fields. Springer-Verlag, Berlin,
1996.
[13] M.-A. Knus, R. Parimala, and V. Srinivas. Azumaya algebras with involutions. J. Algebra,
130(1):65 -- 82, 1990.
[14] Max-Albert Knus and Manuel Ojanguren. Th´eorie de la descente et alg`ebres d'Azumaya.
Lecture Notes in Mathematics, Vol. 389. Springer-Verlag, Berlin, 1974.
[15] T. Y. Lam. Lectures on modules and rings, volume 189 of Graduate Texts in Mathematics.
Springer-Verlag, New York, 1999.
[16] P. J. Morandi, B. A. Sethuraman, and J.-P. Tignol. Division algebras with an anti-
automorphism but with no involution. Adv. Geom., 5(3):485 -- 495, 2005.
28
RINGS THAT ARE MORITA EQUIVALENT TO THEIR OPPOSITES
[17] I. Reiner. Maximal orders, volume 28 of London Mathematical Society Monographs. New
Series. The Clarendon Press Oxford University Press, Oxford, 2003. Corrected reprint of the
1975 original, With a foreword by M. J. Taylor.
[18] Louis H. Rowen. Ring theory. Vol. I, volume 127 of Pure and Applied Mathematics. Academic
Press Inc., Boston, MA, 1988.
[19] David J. Saltman. Azumaya algebras with involution. J. Algebra, 52(2):526 -- 539, 1978.
[20] David J. Saltman. Lectures on division algebras, volume 94 of CBMS Regional Conference
Series in Mathematics. Published by American Mathematical Society, Providence, RI, 1999.
[21] Winfried Scharlau. Automorphisms and involutions of incidence algebras. In Proceedings of
the International Conference on Representations of Algebras (Carleton Univ., Ottawa, Ont.,
1974), Paper No. 24, pages 11 pp. Carleton Math. Lecture Notes, No. 9, Ottawa, Ont., 1974.
Carleton Univ.
[22] C. T. C. Wall. On the axiomatic foundations of the theory of Hermitian forms. Proc. Cam-
bridge Philos. Soc., 67:243 -- 250, 1970.
|
1808.00907 | 1 | 1808 | 2018-08-01T12:46:26 | Degenerations of Leibniz and anticommutative algebras | [
"math.RA"
] | We describe all degenerations of three dimensional anticommutative algebras $\mathfrak{Acom}_3$ and of three dimensional Leibniz algebras $\mathfrak{Leib}_3$ over $\mathbb{C}.$ In particular, we describe all irreducible components and rigid algebras in the corresponding varieties | math.RA | math |
Degenerations of Leibniz and anticommutative algebras 1
Nurlan Ismailova,b, Ivan Kaygorodovc, Yury Volkovd
a Universidade de Sao Paulo, IME, Sao Paulo, Brazil.
b Institute of Mathematics and Mathematical Modeling, Almaty, Kazakhstan.
c Universidade Federal do ABC, CMCC, Santo Andr´e, Brazil.
d Saint Petersburg State University, Saint Petersburg, Russia.
E-mail addresses:
Nurlan Ismailov ([email protected]),
Ivan Kaygorodov ([email protected]),
Yury Volkov (wolf86 [email protected]).
Abstract. We describe all degenerations of three dimensional anticommutative algebras Acom3 and of
three dimensional Leibniz algebras Leib3 over C. In particular, we describe all irreducible components and
rigid algebras in the corresponding varieties.
Keywords:
degeneration, rigid algebra, orbits closure, anticommutative algebra, Leibniz algebra, Lie algebra
2010 Mathematics Subject Classification: 17A32, 14D06, 14L30
1. INTRODUCTION
Degenerations of algebras is an interesting subject, which was studied in various papers (see, for example,
[1 -- 3, 6 -- 9, 12, 15 -- 17, 20 -- 23, 25 -- 27, 29, 30]). In particular, there are many results concerning degenerations
of algebras of low dimensions in a variety defined by a set of identities. One of important problems in this
direction is the description of so-called rigid algebras. These algebras are of big interest, since the closures
of their orbits under the action of the generalized linear group form irreducible components of a variety
under consideration (with respect to the Zariski topology). For example, rigid algebras were classified in
the varieties of low dimensional unital associative, Lie, Jordan and Leibniz algebras [19]. There are fewer
works in which the full information about degenerations was found for some variety of algebras. This
problem was solved for two dimensional pre-Lie algebras in [6], for three dimensional Novikov algebras
in [7], for four dimensional Lie algebras in [9], for four dimensional Zinbiel algebras and nilpotent four-
dimensional Leibniz algebras in [21], for nilpotent five and six dimensional Lie algebras in [15, 30], for
nilpotent five and six dimensional Malcev algebras in [20], and for all two dimensional algebras in [22].
The most well known generalizations of Lie algebras are Leibniz, Malcev and binary Lie algebras. The
Leibniz algebras were introduced as a non-anticommutative generalization of Lie algebras. The study of
the structure theory and other properties of Leibniz algebras was initiated by Loday in [28]. An algebra A
is called a Leibniz algebra if it satisfies the identity
(xy)z = (xz)y + x(yz).
The classification of all three dimensional Leibniz algebras can be found in [29]. Malcev algebras and
binary Lie algebras are anticommutative. Gainov proved that there are no Malcev and binary Lie three
dimensional algebras except Lie algebras [14]. The description of all three dimensional anticommutative
algebras was given in [24] and the central extensions of three dimensional anticommutative algebras were
described in [10]. In this paper we consider anticommutative algebras as a generalization of Lie algebras.
Note that some steps towards a classification of all three dimensional algebras have been done in [5].
In this paper we give the full information about degenerations of three dimensional anticommutative and
Leibniz algebras over C. The vertices of this graph are the isomorphism classes of algebras in the variety
under consideration. An algebra A degenerates to an algebra B if and only if there is a path from the
1The work was supported by FAPESP 17/15437-6, 17/21429-6; AP05131123 "Cohomological and structural problems of
non-associative algebras"; RFBR 18-31-00001; the President's Program "Support of Young Russian Scientists" (grant MK-
1378.2017.1).
1
2
vertex corresponding to A to the vertex corresponding to B. We also describe rigid algebras and irreducible
components in the corresponding varieties.
2. DEFINITIONS AND NOTATION
All spaces in this paper are considered over C, and we write simply dim, Hom and ⊗ instead of dimC,
HomC and ⊗C. An algebra A is a set with a structure of a vector space and a binary operation that induces
a bilinear map from A × A to A.
Given an n dimensional vector space V , the set Hom(V ⊗ V, V ) ∼= V ∗ ⊗ V ∗ ⊗ V is a vector space of
. Indeed, let us fix a basis e1, . . . , en of
i,j ∈ C such that µ(ei ⊗ ej) =
dimension n3. This space has a structure of the affine variety Cn3
V . Then any µ ∈ Hom(V ⊗ V, V ) is determined by n3 structure constants ck
n
ck
i,jek. A subset of Hom(V ⊗V, V ) is Zariski-closed if it can be defined by a set of polynomial equations
Pk=1
in the variables ck
i,j (1 ≤ i, j, k ≤ n).
Let T be a set of polynomial identities. All algebra structures on V satisfying polynomial identities from
T form a Zariski-closed subset of the variety Hom(V ⊗ V, V ). We denote this subset by L(T ). The general
linear group GL(V ) acts on L(T ) by conjugations:
(g ∗ µ)(x ⊗ y) = gµ(g−1x ⊗ g−1y)
for x, y ∈ V , µ ∈ L(T ) ⊂ Hom(V ⊗ V, V ) and g ∈ GL(V ). Thus, L(T ) is decomposed into GL(V )-orbits
that correspond to the isomorphism classes of algebras. Let O(µ) denote the orbit of µ ∈ L(T ) under the
action of GL(V ) and O(µ) denote the Zariski closure of O(µ).
Let A and B be two n dimensional algebras satisfying identities from T and µ, λ ∈ L(T ) represent A
and B respectively. We say that A degenerates to B and write A → B if λ ∈ O(µ). Note that in this case
we have O(λ) ⊂ O(µ). Hence, the definition of a degeneration does not depend on the choice of µ and λ.
If A 6∼= B, then the assertion A → B is called a proper degeneration. We write A 6→ B if λ 6∈ O(µ).
Let A be represented by µ ∈ L(T ). Then A is rigid in L(T ) if O(µ) is an open subset of L(T ). Recall
that a subset of a variety is called irreducible if it cannot be represented as a union of two non-trivial closed
subsets. A maximal irreducible closed subset of a variety is called an irreducible component. It is well
known that any affine variety can be represented as a finite union of its irreducible components in a unique
way. The algebra A is rigid in L(T ) if and only if O(µ) is an irreducible component of L(T ).
We denote by AComn the variety of n dimensional anticommutative algebras and by Leibn the variety of
n dimensional Leibniz algebras.
We use the following notation:
(1) AnnL(A) = {a ∈ A xa = 0 for all x ∈ A} is the left annihilator of A;
(2) A(+2) is the space {xy + yx x, y ∈ A}.
Given spaces U and W , we write simply U > W instead of dim U > dim W .
3. METHODS
In the present work we use the methods applied to Lie algebras in [9, 15, 16, 30]. First of all, if A → B
and A 6∼= B, then Der(A) < Der(B), where Der(A) is the Lie algebra of derivations of A. We will
compute the dimensions of algebras of derivations and will check the assertion A → B only for such
A and B that Der(A) < Der(B). Secondly, if A → C and C → B then A → B. If there is no C
such that A → C and C → B are proper degenerations, then the assertion A → B is called a primary
degeneration. If Der(A) < Der(B) and there are no C and D such that C → A, B → D, C 6→ D
and one of the assertions C → A and B → D is a proper degeneration, then the assertion A 6→ B is
called a primary non-degeneration. It suffices to prove only primary degenerations and non-degenerations
to describe degenerations in the variety under consideration. It is easy to see that any algebra degenerates
to the algebra with zero multiplication. From now on we use this fact without mentioning it.
To prove primary degenerations, we will construct families of matrices parametrized by t. Namely, let A
and B be two algebras represented by the structures µ and λ from L(T ) respectively. Let e1, . . . , en be a
basis of V and ck
i (t) ∈ C
aj
i (t)ej (1 ≤ i ≤ n) form a basis of V for any t ∈ C∗, and the
i,j (1 ≤ i, j, k ≤ n) be the structure constants of λ in this basis. If there exist aj
(1 ≤ i, j ≤ n, t ∈ C∗) such that Et
i =
n
Pj=1
3
structure constants of µ in the basis Et
A → B. In this case Et
1, . . . , Et
n is called a parametrized basis for A → B.
1, . . . , Et
n are such polynomials ck
i,j(t) ∈ C[t] that ck
i,j(0) = ck
i,j, then
Note also the following fact. Let B(α) be a series of algebras parametrized by α ∈ C and e1, . . . , en
be a basis of V . Suppose also that, for any α ∈ C, the algebra B(α) can be represented by a structure
µ(α) ∈ L(T ) having structure constants ck
i,j(t) ∈ C[t] for all
1 ≤ i, j, k ≤ n. Let A be an algebra such that A → B(α) for α ∈ C\S, where S is a finite subset of C. Then
A → B(α) for all α ∈ C. Indeed, if λ ∈ L(T ) represents A, then we have µ(α) ∈ {µ(β)}β∈C\S ⊂ O(λ)
for any α ∈ C. Thus, to prove that A → B(α) for all α ∈ C we will construct degenerations that are valid
for all but finitely many α.
i,j(α) ∈ C in the basis e1, . . . , en, where ck
Let us describe the methods for proving primary non-degenerations. The main tool for this is the follow-
ing lemma.
Lemma 1 ( [15]). Let B be a Borel subgroup of GL(V ) and R ⊂ L(T ) be a B-stable closed subset. If
A → B and A can be represented by µ ∈ R then there is λ ∈ R that represents B.
In particular, it follows from Lemma 1 that A 6→ B in the following cases:
(1) AnnL(A) > AnnL(B);
(2) A(+2) < B(+2).
In the cases where all of these criteria cannot be applied to prove A 6→ B, we will define R by a set of
polynomial equations and will give a basis of V , in which the structure constants of µ give a solution to all
these equations. We will omit everywhere the verification of the fact that R is stable under the action of
the subgroup of upper triangular matrices and of the fact that λ 6∈ R for any choice of a basis of V . These
verifications can be done by direct calculations.
If the number of orbits under the action of GL(V ) on L(T ) is finite, then the graph of primary degener-
ations gives the whole picture. In particular, the description of rigid algebras and irreducible components
can be easily obtained. Since the variety Leib3 contains infinitely many non-isomorphic algebras, we have
to fulfill some additional work. Let A(∗) := {A(α)}α∈I be a set of algebras, and let B be another algebra.
Suppose that, for α ∈ I, A(α) is represented by the structure µ(α) ∈ L(T ) and B ∈ L(T ) is represented
by the structure λ. Then A(∗) → B means λ ∈ {O(µ(α))}α∈I, and A(∗) 6→ B means λ 6∈ {O(µ(α))}α∈I.
Let A(∗), B, µ(α) (α ∈ I) and λ be as above. To prove A(∗) → B it is enough to construct a family of
pairs (f (t), g(t)) parametrized by t ∈ C∗, where f (t) ∈ I and g(t) ∈ GL(V ). Namely, let e1, . . . , en be a
i : C∗ → C
basis of V and ck
aj
i (t)ej (1 ≤ i ≤ n) form a basis of V for any t ∈ C∗, and
i,j (1 ≤ i, j, k ≤ n) be the structure constants of λ in this basis. If we construct aj
(1 ≤ i, j ≤ n) and f : C∗ → I such that Et
i =
n
the structure constants of µf (t) in the basis Et
then A(∗) → B. In this case Et
for A(∗) → B respectively.
1, . . . , Et
1, . . . , Et
i,j,
n and f (t) are called a parametrized basis and a parametrized index
n are such polynomials ck
i,j(t) ∈ C[t] that ck
i,j(0) = ck
We now explain how to prove A(∗) 6→ B. Note that if dim Der(A(α)) > dim Der(B) for all α ∈ I
then A(∗) 6→ B. One can use also the following generalization of Lemma 1, whose proof is the same as the
proof of Lemma 1.
Lemma 2. Let B be a Borel subgroup of GL(V ) and R ⊂ L(T ) be a B-stable closed subset. If A(∗) → B
and for any α ∈ I the algebra A(α) can be represented by a structure µ(α) ∈ R, then there is λ ∈ R
representing B.
Pj=1
4
4. CLASSIFICATION AND DEGENERATIONS OF THREE DIMENSIONAL ANTICOMMUTATIVE ALGEBRAS
First we consider the variety ACom3. Let us fix the basis e1, e2, e3 of V . Any structure µ ∈ ACom3
i,j (1 ≤ i, j, k ≤ 3) is determined by the 3 × 3 matrix Aµ whose (i, j)-entry is
with structure constants ck
(−1)i−1cj
u,v, where (u, v) is a unique pair of numbers such that u, v ∈ {1, 2, 3}\{i} and u < v. Since C is an
algebraically closed field the structure λ belongs to O(µ) if and only if there is a nonsingular matrix X such
that Aλ = X T AµX by [24, Corollary 2.4]. Then the classification of three dimensional anticommutative
algebras modulo isomorphism can be obtained from the classification of bilinear forms modulo congruence
given in [18].
i,j, where dk
We denote by W some four dimensional space that contains V as a subspace and by e4 some fixed vector
of W such that W = V ⊕ Ce4. Let us now consider four dimensional algebras A such that A(A2) =
(A2)A = 0 and dim A2 ≤ 1. It is easy to see that such an algebra can be represented by a structure χ on
W such that χ(W, W ) ⊂ Ce4 and χ(W, e4) = χ(e4, W ) = 0. Such a structure is defined by the 3 × 3
matrix Bχ, whose (i, j)-entry is d4
i,j (1 ≤ i, j, k ≤ 4) are the structure constants of χ. It is
clear that two such structures χ and η lie in the same orbit if and only if there is a nonsingular matrix X
such that Bη = X T BχX. Now we put in correspondence to an anticommutative algebra structure µ on
V the structure χµ on W satisfying the properties above with Bχµ = Aµ. As it was explained above, we
get a bijection between orbits of ACom3 and isomorphism classes of four dimensional algebras A such
that A(A2) = (A2)A = 0 and dim A2 ≤ 1. Moreover, it is clear that if λ ∈ O(µ), then χλ ∈ O(χµ).
The converse assertion follows from [15, Proposition 1.7] and the fact that the set of structures χ on W
satisfying χ(W, W ) ⊂ Ce4 and χ(W, e4) = χ(e4, W ) = 0 is a closed subset stable under the action of
lower triangular matrices.
Thus, isomorphism classes and degenerations of three dimensional anticommutative algebras can be
transfered from the isomorphism classes and degenerations of four dimensional algebras A such that
A(A2) = (A2)A = 0 and dim A2 ≤ 1. The last mentioned problem is a part of the problems that were
solved in [13, 21]. Unfortunately both of the mentioned works have problems. Some degenerations are
missed in the paper [13]. All degenerations between algebras that we are interested in are described cor-
rectly in [21], but the classification used in this paper lost one algebra. In the current work we will use
the results of [21]. Let us first deduce the classification of three dimensional anticommutative algebras
using the last mentioned paper. We do this in Table A.1 below, where in the first column we put the names
of anticommutative three dimensional algebras, in the second column we put the corresponding names of
algebras from [21], in the third and fourth columns we put multiplication tables and dimensions of alge-
bras of derivations of the corresponding anticommutative algebras. We omit products of basic elements
whose values are zero or can be recovered from the anticommutativity and given products. Note that if
dim Der(µ) = k, then dim Der(χµ) = k + 4.
Here g1, g2, gα
3 and g4 are Lie algebras and A2 corresponds to the algebra missed in [21] that is denoted by
N0 in this paper. We have gα
1 if αβ = 1 and there are no other nontrivial isomorphisms
3
between the algebras in the table. All degenerations and non-degenerations between the algebras from the
column B that do not involve N0 are described in [21]. Thus, it remains to describe degenerations involving
A2.
3 and Aα
1
∼= Aβ
∼= gβ
Note that dim AnnL(N0) > dim AnnL(N3(0)) = dim AnnL(N10) and dim Der(N0) <
dim Der(N3(0)) = dim Der(N10), and hence there are no degenerations between N0, N3(0) and N10.
Note now that, for any α ∈ C we have
• the degeneration A2 → gα
3 given by the parametrized basis
1 = te3, Et
2 = te1, Et
3 = e1 + (α + t)e2 + e3;
Et
• the degeneration Aα
1 → A2 given by the parametrized basis
Et
1 = te2, Et
2 = −e1, Et
3 = αe1 − e2 + e3.
Thus, we get the following result.
Theorem 3. The graph of primary degenerations for ACom3 can be obtained from the graph given in Figure
1 below by deleting all vertices named with L.
Since ACom3 is isomorphic to C9 as an algebraic variety, it is irreducible and equals O(Aα
1 )
5. DEGENERATIONS OF THREE DIMENSIONAL LEIBNIZ ALGEBRAS
The classification of three dimensional non-Lie Leibniz algebras is presented in Table A.2 below.
Theorem 4. The graph of primary degenerations for Leib3 can be obtained from the graph given in Figure
1 below by deleting all vertices named with A.
5
Proof. We prove all the required primary degenerations in Table A.3 below. Let us consider the degenera-
tion Lβ
1 → L2 to clarify our formulas. Write nonzero products in Lβ
3Et
2 = βt2Et
2 = tEt
1, Et
1, Et
2Et
3Et
Et
1 in the basis Et
i :
3 = Et
1.
It is easy to see that for t = 0 we obtain the multiplication table of L2. The remaining degenerations can be
interpreted in the same way.
A part of non-degenerations is given in Table A.4 below. Whenever an algebra named by A with the basis
i,j (1 ≤ i, j, k ≤ 3) denote the structure constants of A in the given basis and
f1, f2, f3 appear in this table, ck
Ai (1 ≤ i ≤ 3) denotes the subspace of A generated by fi, . . . , f3.
3i = cj
ij (1 ≤ i, j, k ≤ 3) satisfy the conditions ck
In the rest of the proof we will use ideas from the proof of [19, Theorem 2]. All the remaining de-
generations involve only solvable non-nilpotent Leibniz algebras with a two dimensional nilpotent radical.
Moreover, each of them is represented in Table A.2 by a structure µ such that he1, e2i is the nilpotent radical
and the structure constants ck
ij = 0 if i, j ≤ 2 and k ≥ min(i, j)
and cj
i3 = 0 for any 1 ≤ i, j ≤ 2 such that j < i. During this proof we will call a structure with
three dimensional nilpotent radical that satisfies the described conditions a standard structure. Let us put
in correspondence to a standard structure µ the 4-tuple Sµ = (c1
32) ∈ C4. It is not difficult
to show that if Sµ = (a1, b1, a2, b2) and λ ∈ O(µ) is a standard structure, then there is some permutation
σ : {1, 2} → {1, 2} and some c ∈ C∗ such that Sλ = (caσ(1), cbσ(1), caσ(2), cbσ(2)). Suppose now that
{µs}s∈T is a set of standard structures, Sµs = (a1,s, b1,s, a2,s, b2,s), and the homogeneous linear polynomials
f1, . . . , fl ∈ C[x1, x2, x3, x4] are such that fr(a1,s, b1,s, a2,s, b2,s) = 0 for all s ∈ T and 1 ≤ r ≤ l. If λ
is a standard structure with Sλ = (a1, b1, a2, b2), then it easily follows from Lemma 2 that there is some
permutation σ : {1, 2} → {1, 2} and some c ∈ C∗ such that fr(caσ(1), cbσ(1), caσ(2), cbσ(2)) = 0 for all
1 ≤ r ≤ l. Thus, we get
31, c2
23, c2
13, c1
B 6→ L0
6 for B ∈ {Lα6=0
6
, L7}
and
B 6→ L1
6 for B ∈ {Lα
4 , L5, Lα6=1
6
, L9}.
✷
Corollary 5. The irreducible components of Leib3 are
3 }α∈C) = {g1, g2, gα
3 , g4, C3};
3, Lβ
C1 = O({gα
C2 = O(g4) = {g1, g−1
C3 = O({Lα
C4 = O(L5) = {L2, L3, L2
6 }α∈C) = {L0
C5 = O({Lα
4 }α∈C) = {g1, g0
4, L5, C3};
1, L2, Lα
3 , C3}α∈C;
1 , L2, L3, Lα
4 , L0
6, C3}α,β∈C;
6 , L7, L8, L9, C3}α∈C.
In particular, the set of rigid algebras in the variety Leib3 is formed by g4 and L5.
Proof. All degenerations and non-degenerations that do not follow directly from Theorem 4 follow from
Talble A.5.
✷
6
1
2
3
4
5
6
9
FIGURE 1: THE GRAPH OF PRIMARY DEGENERATIONS FOR
LIE, ANTICOMMUTATIVE AND LEIBNIZ THREE DIMENSIONAL ALGEBRAS.
Aα
1
α = 1
A2
α = −1
A3
g4
α = 1
α = −1
α = 0
gα
3
α = 1
g1
g2
L5
α = 2
Lα
4
Lα
6
L7
L9
L8
L0
6
α = 2
β = 1−α
(2−α)2
β = 0
β = 0
Lβ
1
L3
β = 1/4
L1
6
L2
C3
Appendix A. Tables
Table A.1. Classification of three dimensional anticommutative algebras.
A
g1
g2
gα
3
g4
Aα
1
A2
A3
B
NC2
1
NC
1
NC
3 if α = −1,
NC
N3(0)
N4 if α = −1, N5 if α = 1,
(1+α)2(cid:17) otherwise
2 (cid:16) α
N3(cid:16) 1+α
1−α i(cid:17) otherwise
N0
N10
Multiplication tables
e2e3 = e1
e1e3 = e1, e2e3 = e2
e1e3 = e1 + e2, e2e3 = αe2
e1e2 = e3, e1e3 = −e2, e2e3 = e1
e1e2 = e3, e1e3 = e1 + e3, e2e3 = αe2
e1e2 = e1, e2e3 = e2
e1e2 = e3, e1e3 = e1, e2e3 = e2
Table A.2. Classification of three dimensional Leibniz (non-Lie) algebras.
A
Lβ
1
L2
L3
Lα
4
L5
Lα
6
L7
L8
L9
[11]
2(a)
2(b)
2(c)
2(e), 2(f )
2(g)
2(d), 3(a)
3(b)
3(c)
3(d)
Sµ
( β, 0, 1, −1 )
2, 0, 1, −1 )
(
( α,
0 )
0 )
(
0, 1,
1, 0, 1,
(
0, 0, 1,
0 )
Multiplication tables
e2e2 = βe1, e3e2 = e1, e3e3 = e1
e3e3 = e1
e2e2 = e1, e3e3 = e1
e1e3 = αe1, e2e3 = e2, e3e2 = −e2, e3e3 = e1
e1e3 = 2e1, e2e2 = e1, e2e3 = e2, e3e2 = −e2, e3e3 = e1
e1e3 = αe1, e2e3 = e2
e1e3 = e1 + e2, e2e3 = e2
e1e3 = e2, e3e3 = e1
e1e3 = e2, e2e3 = e2, e3e3 = e1
Table A.3. Degenerations of Leibniz algebras of dimension 3.
7
Der
6
6
4
3
1
2
3
Der
4
5
4
3
2
2 + δα,0 + 2δα,1
2
3
2
Degenerations
Lβ
1 → L2
L1/4
1 → g1
L3 → L2
1−α
4
Lα6=2
(2−α)2
→ L
1
4 → g0
L0
3
L2
4 → L3
L5 → L2
4
L0
6 → L0
1
L1
6 → L2
Lα6=0,1
→ L8
L7 → L1
6
L7 → L8
L8 → L0
1
L9 → L0
6
L9 → L8
6
Parametrized bases
2−α e1 + (1−α+t)t
2−α
Et
Et
Et
Et
Et
Et
1 = e1,
1 = t3e1,
1 = e1,
Et
1 = t2e1,
1 = −t−1e1 + te2, Et
Et
1 = t2e1,
Et
1 = te1,
1 = t2e2,
Et
Et
1 = te1,
Et
1 = e1 + te2,
Et
1 = te1,
Et
1 = e1 + e2,
Et
1 = te2,
Et
1 = t−1e1,
1 = t2e1,
Et
2 = te2,
2 = −2te2 + te3,
2 = te2,
2 = t
2 = t−1e1,
2 = ite1 + e2 − ite3,
2 = te2,
2 = te3,
2 = e2,
2 = (α − 1)te1,
2 = e2,
2 = te2,
2 = te3,
2 = t−2e2,
2 = t3e2,
Et
Et
Et
Et
Et
Et
Et
Et
Et
Et
Et
Et
Et
Et
Et
2 e1 + e3
2−α e2 + te3
3 = e3
3 = 2t2e2
3 = e3
3 = 1
3 = e3
3 = te3
3 = t−1
3 = te1 + te2 + te3
3 = e1 + te3
3 = α−1t−1e1 + e2 + te3
3 = e3
3 = t−1e1 + te3
3 = e1 + te3
3 = e3
3 = te3
e3, Et
Et
Et
Et
Et
Et
Et
Et
Et
Et
Et
Et
8
Table A.4. Non-degenerations of Leibniz algebras of dimension 3.
Non-degenerations
Reasons
Lα6=2
4
9 B, B ∈( L
β6= 1−α
(α−2)2
1
g1(α 6= 0), g2, gβ6=0
, L3,
3
L5
9 B, B ∈ {Lβ
1 , g1, g2}
A
9 B,
A ∈ {Lα
6 , L7, L9},
, L3,
B ∈(cid:26) Lβ6=0
4, g1, g2 (cid:27)
1
L1
) R =
R =
A(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
A(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
AnnL(A) > AnnL(B)
A = hf1, f2, f3i, c2
31 = −αc2
c3
A1A3 + A2A2 = 0, A3A1 ⊆ A3, A1A1 ⊆ A2
21 = (α − 1)c3
11 = 0, c2
21 = −c2
12, c3
12,
12,
Lα
4 ∈ O(R) (take f1 = e3, f2 = e2, f3 = e1), but B 6∈ O(R)
12, c3
A = hf1, f2, f3i, c3
A1A3 + A3A2 = 0, A3A1 + A2A2 ⊆ A3,
A1A2 + A2A1 ⊆ A2
21 = −2c2
31 = 2c2
21 = c3
12,
L5 ∈ O(R) (take f1 = e3, f2 = e2, f3 = e1), but B 6∈ O(R)
Table A.5. Orbit closures for some families of three dimensional Leibniz algebras.
L∗
4
L∗
6
L∗
6
L∗
1
L∗
4
L∗
4
L∗
6
Degenerations
→ L0
6
→ L7
→ L9
→ L3
Et
Et
Et
Et
Et
1 = e2,
1 = e1 + e2, Et
1 = e1 + te2, Et
1 = t4e1,
Et
Parametrized bases
Et
2 = e1,
Et
2 = te2,
2 = (1 − t)e1, Et
2 = t3e2,
Et
3 = te3
3 = e3
3 = e1 + e2 + te3
3 = t2e3
Indices
ǫ = t−1
ǫ = 1 − t
ǫ = t−1
ǫ = t−2
Non-degenerations
Reasons
9 B, B ∈ {L1
6, L8}
9 B, B ∈ {g2, gβ6=0
9 B, B ∈ {g1, g2, Lβ6=0
}
3
1
, L3, L1
4}
4 )(+2) < B(+2)
(Lα
AnnL(Lα
AnnL(Lα
4 ) > AnnL(B)
6 ) > AnnL(B)
REFERENCES
[1] Alvarez M.A., On rigid 2-step nilpotent Lie algebras, Algebra Colloquium, 25 (2018), 2, 349 -- 360.
[2] Alvarez M.A., The variety of 7-dimensional 2-step nilpotent Lie algebras, Symmetry, 10 (2018), 1, 26.
[3] Alvarez M.A., Hern´andez I., On degenerations of Lie superalgebras, arXiv:1802.08707
[4] Alvarez M.A., Hern´andez I., Kaygorodov I., Degenerations of Jordan superalgebras, arXiv:1708.07758
[5] Bekbaev U., Complete classification of a class of 3-dimensional algebras, arXiv:1710.10734
[6] Benes T., Burde D., Degenerations of pre-Lie algebras, Journal of Mathematical Physics, 50 (2009),
11, 112102, 9 pp.
[7] Benes T., Burde D., Classification of orbit closures in the variety of three dimensional Novikov alge-
bras, Journal of Algebra and Its Applications, 13 (2014), 2, 1350081, 33 pp.
[8] Burde D., Degenerations of nilpotent Lie algebras, Journal of Lie Theory, 9 (1999), 1, 193 -- 202.
[9] Burde D., Steinhoff C., Classification of orbit closures of 4 -- dimensional complex Lie algebras, Journal
of Algebra, 214 (1999), 2, 729 -- 739.
[10] Calder´on A., Fern´andez Ouaridi A., Kaygorodov I., The classification of n-dimensional anticom-
mutative algebras with (n − 3)-dimensional annihilator, Communications in Algebra, 47 (2019),
DOI:10.1080/00927872.2018.1468909
[11] Casas J., Insua M., Ladra M., Ladra S., An algorithm for the classification of 3-dimensional complex
Leibniz algebras, Linear Algebra and its Applications, 436 (2012), 9, 3747 -- 3756.
[12] Casas J., Khudoyberdiyev A., Ladra M., Omirov B., On the degenerations of solvable Leibniz algebras,
Linear Algebra and its Applications, 439 (2013), 2, 472 -- 487.
[13] Fialowski A., Penkava M., The moduli space of 4-dimensional nilpotent complex associative algebras,
Linear Algebra and its Applications, 457 (2014), 408 -- 427.
[14] Gainov A., Binary Lie algebras of lower ranks [Russian], Algebra i Logika Sem., 2 (1963), 4, 21 -- 40.
9
[15] Grunewald F., O'Halloran J., Varieties of nilpotent Lie algebras of dimension less than six, Journal of
Algebra, 112 (1988), 315 -- 325.
[16] Grunewald F., O'Halloran J., A Characterization of orbit closure and applications, Journal of Algebra,
116 (1988), 163 -- 175.
[17] Grunewald F., O'Halloran J., Deformations of Lie algebras, Journal of Algebra, 162 (1993), 1, 210 --
224.
[18] Horn R., Sergeichuk V., Canonical matrices of bilinear and sesquilinear forms, Linear Algebra and its
Applications, 428 (2008), 1, 193 -- 223.
[19] Ismailov N., Kaygorodov I., Volkov Yu., The geometric classification of Leibniz algebras, Interna-
tional Journal of Mathematics, 29 (2018), 5, 1850035.
[20] Kaygorodov I., Popov Yu., Volkov Yu., Degenerations of binary Lie and nilpotent Malcev algebras,
Communications in Algebra, 46 (2018), 11, 4929 -- 4941.
[21] Kaygorodov I., Popov Yu., Pozhidaev A., Volkov Yu., Degenerations of Zinbiel and nilpotent Leibniz
algebras, Linear and Multilinear Algebra, 66 (2018), 4, 704 -- 716.
[22] Kaygorodov I., Volkov Yu., The variety of 2-dimensional algebras over an algebraically closed field,
arXiv:1701.08233
[23] Kaygorodov I., Volkov Yu., The degeneration level classification of algebras, arXiv:1710.08943
[24] Kobayashi Yu., Shirayanagi K., Takahasi S., Tsukada M., Classification of three dimensional zeropo-
tent algebras over an algebraically closed field, Communications in Algebra, 45 (2017), 12, 5037 -- 5052.
[25] Khudoyberdiyev A., Omirov B., The classification of algebras of level one, Linear Algebra and its
Applications, 439 (2013), 11, 3460 -- 3463.
[26] Khudoyberdiyev A., Ladra M., Masutova K., Omirov B., Some irreducible components of the variety
of complex (n + 1)-dimensional Leibniz algebras, Journal of Geometry and Physics, 121 (2017), 228 --
246.
[27] Lauret J., Degenerations of Lie algebras and geometry of Lie groups, Differential Geometry and its
Applications, 18 (2003), 2, 177 -- 194.
[28] Loday J.-L., Pirashvili T., Universal enveloping algebras of Leibniz algebras and (co)homology, Math-
ematische Annalen, 296 (1993), 1, 139 -- 158.
[29] Rakhimov I., Mohd Atan K., On contractions and invariants of Leibniz algebras, Bulletin of the
Malaysian Mathematical Sciences Society, 35 (2012), 557 -- 565.
[30] Seeley C., Degenerations of 6-dimensional nilpotent Lie algebras over C, Communications in Algebra,
18 (1990), 3493 -- 3505.
|
1501.06808 | 3 | 1501 | 2016-06-30T16:47:04 | A prime ideal principle for two-sided ideals | [
"math.RA",
"math.AC"
] | Many classical ring-theoretic results state that an ideal that is maximal with respect to satisfying a special property must be prime. We present a "Prime Ideal Principle" that gives a uniform method of proving such facts, generalizing the Prime Ideal Principle for commutative rings due to T.Y. Lam and the author. Old and new "maximal implies prime" results are presented, with results touching on annihilator ideals, polynomial identity rings, the Artin-Rees property, Dedekind-finite rings, principal ideals generated by normal elements, strongly noetherian algebras, and just infinite algebras. | math.RA | math |
A PRIME IDEAL PRINCIPLE FOR TWO-SIDED IDEALS
MANUEL L. REYES
Abstract. Many classical ring-theoretic results state that an ideal that is maximal with
respect to satisfying a special property must be prime. We present a "Prime Ideal Principle"
that gives a uniform method of proving such facts, generalizing the Prime Ideal Principle
for commutative rings due to T. Y. Lam and the author. Old and new "maximal implies
prime" results are presented, with results touching on annihilator ideals, polynomial identity
rings, the Artin-Rees property, Dedekind-finite rings, principal ideals generated by normal
elements, strongly noetherian algebras, and just infinite algebras.
1. Introduction
A well-known phenomenon in ring theory is that, for certain properties P, ideals of a ring
that are maximal with respect to satisfying P are prime. This is probably most familiar in
the setting of commutative algebra, as in [7, pp. 70–71, 84–85]. For instance, an ideal in any
commutative ring R is prime if it is maximal with respect to any of the following properties:
• being a proper subset of R,
• not being finitely generated,
• not being principal, or
• having empty intersection with a given multiplicative submonoid S ⊆ R.
The Prime Ideal Principle of [19] unifies the above results along with many other classical
"maximal implies prime" results in commutative algebra. The basic idea behind this unifi-
cation was to find certain properties of a family F of ideals in a fixed commutative ring that
guarantee that an ideal maximal with respect to not lying in F is prime. The most notable
such condition is that the family F be an Oka family; this means that, for any ideal I E R
and any element a ∈ R, the following implication holds:
(I, a), (I : a) ∈ F =⇒ I ∈ F .
The Prime Ideal Principle then states that, for any Oka family F in a commutative ring R,
an ideal I E R maximal with respect to I /∈ F is prime. All of the examples above were
recovered from the Prime Ideal Principle in [19] by demonstrating that a relevant family of
ideals is Oka.
A version of the Prime Ideal Principle for right ideals in noncommutative rings was estab-
lished in [26]. This was achieved by identifying an appropriate type of "prime right ideal"
Date: June 30, 2016.
2010 Mathematics Subject Classification. Primary: 16D25, 16N60; Secondary: 13A15, 16D20.
Key words and phrases. maximal implies prime, Prime Ideal Principle, Oka family of ideals.
This material is based upon work supported by the National Science Foundation under Grant No. DMS-
1407152.
1
2
MANUEL L. REYES
(these were called completely prime right ideals) and by finding a suitable definition of Oka
families of right ideals. However, to date there is no version of the Prime Ideal Principle for
two-sided ideals in noncommutative rings.
The purpose of this paper is to present such a theory for two-sided ideals in noncommuta-
tive rings, unifying many of the classical noncommutative "maximal implies prime" results
and presenting some new ones. In Section 2 we briefly introduce Oka families of (two-sided)
ideals in noncommutative rings and prove the corresponding Prime Ideal Principle: if F is
an Oka family of ideals in a noncommutative ring R and I is an ideal that is maximal with
respect to I /∈ F , then I is prime. We also introduce stronger conditions on families of ideals
called (P1), (P2), and (P3) that are noncommutative analogues of those defined in [19].
The heart of the paper lies in the remaining sections, which present many examples of
families satisfying these different properties with corresponding applications of the Prime
Ideal Principle. Section 3 gives examples of families satisfying the properties (P1), (P2), and
(P3). Section 4 considers families that satisfy the weaker r-Oka and Oka properties, many
of which are constructed from various classes of (bi)modules; it concludes with a discussion
of problems for future work.
Acknowledgments. I wish to thank George Bergman, T. Y. Lam, and Lance Small for
helpful conversations, suggestions, and references to the literature. I also thank the referee
for offering several clarifying remarks.
Conventions. Throughout this paper, all rings, modules, and ring homomorphisms are
assumed to be unital. Let R be a ring. We write I E R to denote that I is an ideal of R.
If X is a subset of R, we write (X) for the ideal of R generated by X; in case X = {x} is
a singleton we simply write (x) = ({x}). Furthermore, if J E R and a ∈ R, then we denote
(I, J) = (I ∪ J) = I + J and (I, a) = (I ∪ {a}) = I + (a). The notation MR and RM
respectively indicate that M is a right or left R-module.
2. The Prime Ideal Principle
The families of ideals defined below illustrate one possible way to generalize those ideal
families defined in [19] from commutative rings to noncommutative rings. For two ideals
I, J E R we denote J −1I = {x ∈ R : Jx ⊆ I} and IJ −1 = {x ∈ R : xJ ⊆ I}, both of which
are clearly ideals in R.
Definition 2.1. Let R be a ring and let F be a family of ideals of R with R ∈ F . We say
that F is an Oka family of ideals if, for any I E R and a ∈ R,
(2.2)
(I, a), (a)−1I, I(a)−1 ∈ F =⇒ I ∈ F .
We say that F is an r-Oka family of ideals if, for any I E R and a ∈ R, the condition
(I, a), (a)−1I ∈ F implies that I ∈ F . Furthermore, we define the following properties of the
family F (recall the standing assumption that R ∈ F ), where I, J E R are arbitrary ideals:
• Monoidal : I, J ∈ F =⇒ IJ ∈ F ;
• Semifilter : I ∈ F and J ⊇ I =⇒ J ∈ F ;
• (P1): F is a monoidal semifilter;
• (P2): F is monoidal, and for any J ∈ F , I 2 ⊆ J ⊆ I =⇒ I ∈ F ;
• (P3): For A, B ∈ F and I E R, AB ⊆ I ⊆ A ∩ B =⇒ I ∈ F ;
A PRIME IDEAL PRINCIPLE FOR TWO-SIDED IDEALS
3
• Strongly r-Oka: I + J, J −1I ∈ F =⇒ I ∈ F ;
• Strongly Oka: I + J, J −1I, IJ −1 ∈ F =⇒ I ∈ F .
The r-Oka and strongly r-Oka familes defined above have obvious left-handed analogues,
which we refer to as (strongly) ℓ-Oka families. An alternative term would have been
"(strongly) right- and left-Oka" families. However, we have avoided this terminology since it
would have suggested that an Oka family is the same as a family that is both right and left
Oka. It seems likely that an Oka family need not be either r-Oka nor ℓ-Oka in full generality
(such as the families produced via Proposition 4.13), but we do not have an explicit example
to verify this.
Each of the properties of ideal families listed above is easily seen to pass to arbitrary
intersections of such families. Thus for each of these properties, the set of all ideal families
in R with that property forms a complete sublattice of the lattice of all families of ideals in
R.
The following result outlines the logical dependence between the many types of families
defined above.
Proposition 2.3. For a family F of ideals in a ring R, we have the following implications
of the properties defined above:
(P1) =⇒ (P2) =⇒ (P3) =⇒ strongly r-Oka =⇒ r-Oka
⇓
⇓
strongly Oka =⇒ Oka
Proof. The horizontal implications are proved in the commutative case in [19, Thm. 2.7],
and those arguments apply here with virtually no adjustment. The vertical implications are
obvious.
(cid:3)
We mention briefly that there are various equivalent characterizations of the (P2) and
(P3) conditions given in [19, §2] and [20, §2]. Though the statements and proofs are given
for commutative rings, they once again transfer easily to the noncommutative case. Note
that because (P2) ⇒ (P3) and because any (P3) family is monoidal, a family satisfying any
property (Pi) is monoidal.
Before proving the Prime Ideal Principle in this setting, we establish a variant of the usual
criterion for a ring to be prime. If R is a prime ring and a, b ∈ R \ {0} then one can conclude
that both aRb 6= 0 and bRa 6= 0. There is an inherent symmetry in the definition of a
prime ring in the sense that we can interchange the roles of a and b. What if R fails to be
prime? We know offhand that there exist a, b ∈ R \ {0} such that aRb = 0. But if R is not
commutative, we cannot necessarily conclude that bRa = 0. At first glance, the symmetry
seems to disappear in the failure of a ring to be prime. The following lemma rectifies this
situation.
Lemma 2.4. For any ring R 6= 0, the following are equivalent:
(1) R is a prime ring
(2) For a, b ∈ R \ {0}, both aRb 6= 0 and bRa 6= 0
(3) For a, b ∈ R \ {0}, either aRb 6= 0 or bRa 6= 0.
In particular if R is not a prime ring, then there exist 0 6= a, b ∈ R such that aRb = 0 = bRa.
4
MANUEL L. REYES
Proof. The implications (1) ⇒ (2) ⇒ (3) are immediate. To prove (3) ⇒ (1) we will verify
the contrapositive. Suppose that R is not a prime ring; we will produce a, b ∈ R \ {0} such
that aRb = bRa = 0. Because the ring is not prime, there exist x, y ∈ R \ {0} such that
xRy = 0. If yRx = 0 then we are finished. Otherwise there exists r ∈ R such that yrx 6= 0.
Setting a = b = yrx yields aRb = bRa = 0.
(cid:3)
We arrive at the following noncommutative version of the Prime Ideal Principle for two-
sided ideals in noncommutative rings. Given a family F of ideals in a ring R, its complement
is F ′ = {I E R : I /∈ F }. We use Max(F ′) to denote the set of ideals that are maximal in
the complement of F . Also, we let Spec(R) denote the set of prime ideals of R.
Theorem 2.5 (Prime Ideal Principle). For any Oka family F of ideals in a ring R, we have
Max(F ′) ⊆ Spec(R).
Proof. Let I ∈ Max(F ′), and assume for contradiction that I is not prime. By Lemma 2.4
there exist a, b ∈ R\I such that aRb, bRa ⊆ I. Then a ∈ (I, a)\I and b ∈ (a)−1I ∩I(a)−1 \I.
Maximality of I implies that the ideals (I, a), (a)−1I, and I(a)−1 lie in F . Because F is Oka,
this means that I ∈ F , a contradiction.
(cid:3)
The Prime Ideal Principle supplement of [19] was a streamlined way to apply the Prime
Ideal Principle in order to deduce that certain ideal-theoretic properties can be "tested" on
the set of primes. We also have a noncommutative analogue of this result.
Theorem 2.6. Let F be an Oka family such that every nonempty chain of ideals in F ′ (with
respect to inclusion) has an upper bound in F ′ (this holds, for example, if every ideal in F
is finitely generated).
(1) Let F0 be a semifilter of ideals in R. If every prime ideal in F0 belongs to F , then
F0 ⊆ F .
(2) For an ideal J E R, if all prime ideals containing J (resp. properly containing J)
belong to F , then all ideals containing J (resp. properly containing J) belong to F .
(3) If all prime ideals of R belong to F , then all ideals belong to F .
Proof. Both (3) and (2) are special cases of (1). We prove (1) by a contrapositive argument.
Let F0 be a semifilter such that F0 * F ; we will construct a prime ideal in F0 \ F . Let
I0 ∈ F0 \ F = F0 ∩ F ′. The assumption on chains in F ′ allows us to apply Zorn's lemma and
find I ∈ Max(F ′) such that I0 ⊆ I. The fact that F0 is a semifilter gives I ∈ F0. Because
I is maximal in the complement of F , the Prime Ideal Principle 2.5 implies that I is prime.
Thus I is a prime ideal in F0 \ F as desired.
(cid:3)
Remark 2.7. Another property of ideal families in commutative rings that was introduced
in [19] was that of an Ako family; a family F in a commutative ring R has the Ako property
if (I, a), (I, b) ∈ F implies (I, ab) ∈ F for any a, b ∈ R. One can readily produce noncom-
mutative versions of this property that satisfies the Prime Ideal Principle. For instance,
K. Goodearl proposed the following noncommutative version of the Ako property: given
I E R and a, b ∈ R,
(I, a), (I, b) ∈ F =⇒ (I, arb) ∈ F for some r ∈ R.
A PRIME IDEAL PRINCIPLE FOR TWO-SIDED IDEALS
5
Another possibility would be (I, a), (I, b) ∈ F =⇒ I + (a)(b) ∈ F . One can readily verify
that a family F satisfying either of these properties will also have Max(F ′) ⊆ Spec(R).
Since the Ako property has seemed to be less useful than the Oka property already in the
commutative setting, we do not focus our current efforts on this property.
Before proceeding to examples of Oka families, we conclude this section with a discussion
of a prominent family of ideals that does not generally form an Oka family. One might
wonder why a Prime Ideal Principle was given for one-sided ideals before it was established
in the more classical setting of two-sided ideals. We will give a few examples to show that,
in a sense, the case of two-sided ideals is more difficult to handle. Specifically, we recall the
following classical result of Cohen [6, Thm. 2].
Cohen's Theorem. An ideal in a commutative ring that is maximal with respect to not
being finitely generated is prime. Consequently, if every prime ideal of a commutative ring
is finitely generated, then that ring is noetherian.
This result provided strong guidance for the creation of the Prime Ideal Principle in [19]
and its noncommutative analogue in [26]. The behavior of the family of finitely generated
directly motivated the definition of an Oka family of ideals in a commutative ring and for
the definition of a right Oka family in a noncommutative ring.
In [26, Thm. 3.8] we provided a version of Cohen's result above for right ideals of a
noncommutative ring. Specifically, after fixing an appropriate notion of an Oka family of
right ideals, we proved that the family of finitely generated right ideals of any ring is an Oka
family. As a consequence we showed that a right ideal of a ring that is maximal with respect
to not being finitely generated is a completely prime right ideal. (Further Cohen-type results
for right ideals in noncommutative rings were investigated in [27].)
A fundamental difference in the case of two-sided ideals of a noncommutative ring is that,
if R is not a commutative ring, then an ideal of R that is maximal with respect to not being
finitely generated need not be prime. This is illustrated in the following examples.
Let A and B be simple rings, and let M be an (A, B)-bimodule. The triangular matrix
ring
R = T (A, M, B) = (cid:18)A M
0 B(cid:19)
will have exactly two prime ideals:
0
0
P1 = (cid:18)A M
= (cid:18)0 M
P2 = (cid:18)0 M
= (cid:18)0 M
0 (cid:19) = R(cid:18)1 0
0 (cid:19) + R(cid:18)1 0
0 B(cid:19) = R(cid:18)0 0
0 (cid:19) + R(cid:18)0 0
0 0(cid:19) R
0 0(cid:19) = (cid:18)0 M
0 1(cid:19) R
0 1(cid:19) = (cid:18)0 M
0
0
0 (cid:19) +(cid:18)1 0
0 0(cid:19) R,
0
0 (cid:19) +(cid:18)0 0
0 1(cid:19) R.
6
MANUEL L. REYES
The expressions above make it evident that P1 and P2 are always finitely generated as ideals,
and that if M is finitely generated as a left A-module (respectively, as a right B-module),
then P1 and P2 will be finitely generated as left (respectively, right) ideals of R.
Example 2.8. Let K be a field, let MK be an infinite-dimensional vector space viewed as
a bimodule with the same left and right action, and consider the ring R = T (K, M, K) (so
A = B = K above). Then P1 and P2 are finitely generated as ideals, but the ideal I = ( 0 V
0 0 )
is not finitely generated.
Example 2.9. Let K/F be an infinite extension of fields. In the (K, K)-bimodule M =
K ⊗F K, let N be the sub-bimodule generated by {1 ⊗ α − α ⊗ 1 : α ∈ K}. This is a maximal
sub-bimodule since M/N ∼= K as (K, K)-bimodules, and one can readily check that M is
not finitely generated (by choice of K and F ).
In the ring R = T (K, M, K), the choice
of M and N guarantees that the ideal ( 0 N
0 0 ) is maximal with respect to not being finitely
generated as an ideal of R. But because R/I ∼= ( K K
0 K ), we see that I is not even semiprime.
Example 2.10. We thank Lance Small for suggesting this example. Let S be a simple
ring that is not right noetherian (such as the endomorphism ring of a countably infinite
dimensional vector space modulo its finite rank operators), let Z = Z(S) be its central
subfield, and set R = T (Z, S, S). Then the prime ideals P1 and P2 of R are both finitely
generated as right ideals, but for any right ideal J of S that is not finitely generated, the
corresponding ideal ( 0 J
0 0 ) of R is not finitely generated.
Remark 2.11. Thanks to the examples given above, we see that for a general ring R the
family Ffg of finitely generated ideals of R need not be an Oka family. For if Ffg were
Oka and all prime ideals of R were finitely generated, then by Theorem 2.6 all ideals of R
would be finitely generated, contrary to those examples. Similarly, the family of ideals that
are finitely generated as right ideals is not an Oka family. These counterexamples sharply
contrast the case of commutative rings [19, Proposition 3.16] and the case of Oka families of
right ideals in noncommutative rings [26, Proposition 3.7].
The examples above naturally suggest the following question: do there exist simple rings
A and B and an (A, B)-bimodule M such that M is finitely generated as both a left A-
module and a right B-module, but such that M has a sub-bimodule that is not finitely
generated? For given such data, the ring R = T (A, M, B) will have both prime ideals
finitely generated as left ideals and as right ideals, but will have an ideal that is not finitely
generated. Consequently, for this ring R the family of ideals that are finitely generated
both as left ideals and as right ideals would fail to be an Oka family. We suspect that such
(A, M, B) should exist, but we have yet to produce an explicit example.
3. Some families satisfying the properties (Pi)
In this section we provide examples of families satisfying the conditions (P1), (P2), and
(P3). Comparing this section with the next, one sees that many well-known examples of the
noncommutative "maximal implies prime" phenomenon come from such families. We begin
with some of these classical examples.
Recall that a subset S ⊆ R containing 1 is called an m-system if, for every a, b ∈ S, there
exists r ∈ R such that arb ∈ S. It is well-known (and easy to show) that an ideal I E R is
A PRIME IDEAL PRINCIPLE FOR TWO-SIDED IDEALS
7
prime if and only if R \ I is an m-system. The notion of m-system generalizes the concept
of a multiplicative subset of R, more common in commutative algebra. Our first application
of the Prime Ideal Principle recovers a well-known generalization of the fact that an ideal in
a commutative ring maximal with respect to being disjoint from some fixed multiplicative
set is prime. The last part of this proposition is due to McCoy [22, Lem. 4].
Proposition 3.1. Let S ⊆ R be an m-system. Then the family F = {I E R : I ∩ S 6= ∅}
is (P1). Hence an ideal maximal with respect to being disjoint from S is prime, and every
(nonzero) ideal of R intersects S if and only if every (nonzero) prime ideal intersects S.
Proof. Because 1 ∈ S, we have R ∈ F . It is clear that F is a semifilter. To see that F is
monoidal, let A, B ∈ F and fix a ∈ A∩S and b ∈ B ∩S. Then for some r ∈ R, arb ∈ S ∩AB.
Hence AB ∈ F . The rest of the proposition follows from the Prime Ideal Principle 2.5. (cid:3)
Next we give an application of this result to the theory of algebras over a commutative
ring k. Let R be a k-algebra. We will say that an element r ∈ R is integral over k if, for all
r ∈ R, there exists a monic polynomial f (x) ∈ k[x] such that f (r) = 0 in R. The algebra
R is integral over k if every element of R is integral over k; if k is a field, notice that this is
equivalent to R being algebraic over k. The next result shows that, to check whether R is
integral over k, it suffices to check whether it is integral modulo each prime ideal. The fact
is well-known; an instance of its application in the noncommutative setting is [24, Thm. 1].
Proposition 3.2. Let R be an algebra over a commutative ring k. The family F = {I E R :
R/I is integral over k} is (P1). In particular, R is integral over k if and only if R/P is
integral over k for all (minimal) P ∈ Spec(R).
Proof. First, fix an element a ∈ R and define the multiplicative set Sa = {f (a) ∈ R : f (x) ∈
k[x] is monic}. Then by Proposition 3.1, the family Fa = {I E R : I ∩ Sa 6= ∅} is (P1).
Notice that Fa is precisely the family of ideals such that the image of a in R/I is integral
over k. Now notice that the family F in question is given by F = Ta∈R Fa. Because F
is an intersection of (P1) families, F itself is (P1). The last statement now follows from
Theorem 2.6.
(cid:3)
While on the subject of polynomials, we turn our attention to PI-algebras. We continue to
assume that k is a commutative ring. Let khx1, x2, . . .i denote the ring of polynomials over k
in noncommuting indeterminates xi. Suppose that R is a k-algebra and f (x1, . . . , xn) ∈ khxii.
Then we denote f (R) = {f (r1, . . . , rn) ∈ R : r1, . . . , rn ∈ R}. One says that f is monic if
one of its monomials of highest total degree has coefficient 1.
Lemma 3.3. If f, g ∈ khx1, x2, . . . i are monic, then f g is monic.
Proof. Suppose that f has degree m and g has degree n. Let
f = a1u1 + a2u2 + · · · + arur + (lower degree terms),
g = b1v1 + b2v2 + · · · + bsvs + (lower degree terms),
where the {ui} are distinct words of length m and the {vj} are distinct words of length n.
We may assume that a1 = b1 = 1 because f and g are monic.
8
MANUEL L. REYES
The highest degree terms of f g are the products aibjuivj. Moreover, the monomials uivj
are readily seen to be distinct. Hence f g has u1v1 as one of its leading monomials, with
coefficient a1b1 = 1, so that f g is monic.
(cid:3)
A k-algebra R is a polynomial identity algebra (or PI algebra) over k if f (R) = 0 for some
monic polynomial f ∈ khx1, x2, . . .i (see, for instance, [28, 6.1.2]). The last sentence of the
following is a folk result; for example, it is used implicitly in the proof of [1, Thm. 2].
Proposition 3.4. Let k be a commutative ring and let S ⊆ khx1, x2, . . .i be an m-system of
polynomials in noncommuting indeterminates. For a k-algebra R, the family F = {I E R :
R/I satisfies some f ∈ S} is (P1). Hence, an ideal maximal with respect to R/I not being a
PI-algebra over k is prime.
Proof. Notice that F = {I E R : f (R) ⊆ I for some f ∈ S}. This makes it clear that
F is a semifilter. To see that F is monoidal, suppose that A, B ∈ F . Choose f, g ∈ S
and h ∈ khx1, x2, . . .i such that f (R) ⊆ A and g(R) ⊆ B as well as f hg ∈ S. Then
(f hg)(R) ⊆ f (R)h(R)g(R) ⊆ AB while f hg ∈ S, proving that AB ∈ F .
For the last statement, we apply Theorem 2.5 to the family F taking S to be the set of all
monic polynomials in khx1, x2, . . .i, which is multiplicatively closed by the lemma above. (cid:3)
We recall another familiar result from commutative algebra. For a module MR 6= 0 over a
commutative ring R, a point annihilator is an ideal I E R of the form I = ann(m) for some
m ∈ M \ {0}. Then a maximal point annihilator of M is prime. But notice that, because R
is commutative, we have ann(m) = ann(mR) for all m ∈ M. So a maximal point annihilator
of M is just an ideal maximal among the ideals of the form ann(N) where 0 6= NR ⊆ M.
From this perspective, the result generalizes to modules over noncommutative rings: for a
module MR 6= 0 over a ring R, an ideal maximal among the annihilators ann(N) where
0 6= NR ⊆ M is prime.
This well-known fact is widely attributed to I. N. Herstein; for instance, see [14, Thm. 6]
(Lance Small has communicated to us that the first instance of this result is likely in [11].)
We recover it via the Prime Ideal Principle below.
Proposition 3.5. Fix a module MR 6= 0. Then the family F = {J E R : NJ = 0 for NR ⊆
M =⇒ N = 0} is (P1). A maximal annihilator of a nonzero submodule of M is prime.
Proof. It is straightforward to see that F is a semifilter. So suppose that A, B ∈ F and that
NR ⊆ M such that N(AB) = 0. Then (NA)B = 0 =⇒ NA = 0 =⇒ N = 0.
To see that a maximal annihilator is prime, we only need to note that the maximal
annihilators of nonzero submodules of M are precisely the elements of Max(F ′) and then
apply the Prime Ideal Principle 2.5.
(cid:3)
Applying this to the module RR gives the following result.
Proposition 3.6. In a nonzero ring R, the family F of ideals I that are faithful as left
R-modules is a (P1) family. If R satisfies the ascending chain condition (ACC) on ideals,
then R is a prime ring if and only if every nonzero prime ideal of R is left faithful.
Proof. Applying Proposition 3.5 to MR = RR, we see that the family F there corresponds
to the family of left-faithful ideals of R. Turning our attention to the final statement, notice
A PRIME IDEAL PRINCIPLE FOR TWO-SIDED IDEALS
9
that the "only if" part holds without the ACC assumption. The "if" part then follows from
Theorem 2.6.
(cid:3)
As a variation on the theme of maximal annihilator ideals, there are also maximal "middle
annihilators." For ideals X, Y E R we use the notation ann(X, Y ) = {r ∈ R : XrY = 0},
which is certainly an ideal of R. We call such an ideal a middle annihilator of R if XY 6= 0.
This definition originated in unpublished work of Kaplansky (see [15, p. 782]), who proved
the following "maximal implies prime" result.
Proposition 3.7. For any ring R, the family F = {I E R : for all X, Y E R, XIY = 0 =⇒
XY = 0} is (P1). A maximal middle annihilator of R is prime.
Proof. Certainly F is a semifilter. Suppose that A, B ∈ F , and let X, Y E R such that
X(AB)Y = 0. Then (XA)BY = 0 with B ∈ F implies that XAY = 0. But then A ∈ F , so
we must have XY = 0. Thus AB ∈ F , proving that F is (P1). Because Max(F ′) is equal
to the set of maximal middle annihilators of R, the last statement follows from the Prime
Ideal Principle 2.5.
(cid:3)
Our next aim is to recover the well-known result that if the ideals in a ring R satisfy ACC,
then R has finitely many minimal primes, along with a noncommutative generalization of a
result of D. D. Anderson from [2] that any commutative ring in which the minimal primes
are finitely generated has finitely many minimal primes. This makes use of the following.
Lemma 3.8. Let I be a right ideal and J be an ideal of a ring R. Suppose that these are
generated as right ideals by X ⊆ I and Y ⊆ J. Then the product IJ is generated as a right
ideal by the set {xy : x ∈ X, y ∈ Y }. In particular, if I and J are finitely generated (resp.
principal) as right ideals, then IJ is finitely generated (resp. principal) as a right ideal.
Proof. The second claim clearly follows from the first. Given I and J as above, the fact that
J is a (left) ideal gives the second equality below:
xR(cid:17) J
xJ
IJ = (cid:16)Xx∈X
= Xx∈X
= Xx∈X
= X(x,y)∈X×Y
x(cid:16)Xy∈Y
xyR.
yR(cid:17)
(cid:3)
The following statement under hypothesis (1) is well known; for instance, see [10, Theo-
rem 3.4]. The version of Anderson's theorem under hypothesis (2) was first suggested to us
by T. Y. Lam.
Proposition 3.9. For any monoidal set S of ideals in R, the family F = {I E R : I ⊇
J for some J ∈ S} is (P1). Suppose that one of the following two conditions holds:
(1) R satisfies ACC on ideals;
(2) The minimal prime ideals of R are finitely generated as right ideals.
Then the zero ideal is a product of (minimal) prime ideals, and R has finitely many minimal
primes.
10
MANUEL L. REYES
Proof. It is clear that the family F is (P1). To prove the last statement, let S be the set of
all finite products of minimal prime ideals of R and let F be the (P1) family described in the
Proposition. Notice that Spec(R) ⊆ F because every prime contains a minimal prime. In
the next paragraph, we will show that every nonempty chain in F ′ has an upper bound in
F ′. Theorem 2.6 thus implies that F consists of all ideals. In particular 0 ∈ F , so that the
zero ideal is a product of minimal primes, say P1 · · · Pn = 0. For any minimal prime P E R,
we have P ⊇ 0 = P1 · · · Pn. So some Pi ⊆ P , giving P = Pi. Thus the minimal primes of R
are precisely P1, . . . , Pn.
It remains to verify that every nonempty chain in F ′ has an upper bound. This is trivial
in case (1) holds. If R satisfies (2) then Lemma 3.8 implies that every ideal in S is finitely
generated as a (right) ideal, whence the claim easily follows from Zorn's lemma.
(cid:3)
Another notion that gives rise to prime ideals is the Artin-Rees property. An ideal I E R
is said to have the right Artin-Rees property if, for any right ideal KR ⊆ R, there exists a
positive integer n such that K ∩ I n ⊆ KI. This property arises in the study of localization
in noetherian rings (for example, see [10, Ch. 13] or [21, §4.2]). The ring R is said to be a
right Artin-Rees ring if every ideal of R has the right Artin-Rees property.
(In commutative algebra, the Artin-Rees Lemma is a result about I-filtrations of finitely
generated R-modules, where R is commutative noetherian and I E R-see [7, Lem. 5.1]. In
particular, the lemma implies that every ideal of a commutative noetherian ring satisfies the
Artin-Rees property. Thus the family of ideals satisfying the right Artin-Rees property is
mostly of interest in the noncommutative case.)
Parts of the following result were previously observed in [29, §3]. However, the "maximal
implies prime" result seems to be new.
Proposition 3.10. The family of ideals with the right Artin-Rees property in a ring R
satisfies (P2). Thus an ideal of R maximal with respect to not having the right Artin-Rees
property is prime. In particular, if R satisfies ACC on ideals, then R is a right Artin-Rees
ring if and only if every prime ideal of R has the right Artin-Rees property.
Proof. Let F be the family of ideals in R with the right Artin-Rees property. Suppose that
J ∈ F and I E R with I 2 ⊆ J ⊆ I. Fix a right ideal KR ⊆ R and an integer n such that
K ∩ J n ⊆ KJ. Then K ∩ I 2n ⊆ K ∩ J n ⊆ KJ ⊆ KI, which proves that I ∈ F .
Next suppose that A, B ∈ F . Fix a right ideal KR ⊆ R, and choose integers m and n such
that K ∩ Am ⊆ KA and (KA) ∩ Bn ⊆ (KA)B. Then for N = max{m, n}, we have
K ∩ (AB)N = K ∩ (AB)m ∩ (AB)n
⊆ (K ∩ Am) ∩ Bn
⊆ (KA) ∩ Bn
⊆ KAB.
Thus AB ∈ F and F is monoidal. So F satisfies (P2). The last two statements follow from
Theorems 2.5 and 2.6.
(cid:3)
The next family that we consider is the family of ideal direct summands of R; that is, the
family of all ideals I E R such that R = I ⊕ J for some ideal J E R. It is well-known that
A PRIME IDEAL PRINCIPLE FOR TWO-SIDED IDEALS
11
an ideal I E R is such a direct summand if and only if I = (e) for some central idempotent
e of R, in which case J = (1 − e) (see, for instance, [18, Ex. 1.7]). In fact, we will work in
the slightly more general setting of multiplicative sets of central idempotents.
Proposition 3.11. Let R be a ring and let S ⊆ R be a multiplicative set of central idem-
potents. Then the family F = {(e) E R : e ∈ S} satisfies (P2). In particular, the family
of ideal direct summands of R is (P3). An ideal maximal with respect to not being an ideal
direct summand is maximal. A ring R is a finite direct product of simple rings if and only if
every ideal of R is an ideal direct summand, if and only if all maximal ideals of R are ideal
direct summands.
Proof. To prove that F is monoidal, let e, e′ ∈ S so that (e) and (e′) are arbitrary ideals in
F . Then ee′ ∈ S, so we have (e)(e′) = (ee′) ∈ F . Also, if I E R with (e)2 ⊆ I ⊆ (e), then
(e)2 = (e2) = (e) implies that I = (e) ∈ F . Thus F satisfies (P2).
Taking S to be the multiplicative set of all central idempotents of R, the family F be-
comes the set of ideal direct summands of R. Now let M ∈ Max(F ′). By the Prime Ideal
Principle 2.5, M is prime. In the factor ring R/M, every ideal is generated by a central
idempotent. We want to prove that R/M is simple. Let 0 6= I E R/M with I = (e) for some
central idempotent e ∈ R/M. Then R/M = (e) ⊕ (1 − e), and (e)(1 − e) = (0). Because
R/M is prime and (e) 6= 0, we must have (1 − e) = 0. Thus R/M = (e) = I, proving that
R/M is simple.
The equivalence of the condition that all ideals are direct summands with the condition
that all maximal ideals are summands follows from Theorem 2.6 along with the fact that every
ideal in F is finitely generated. It remains to show that, if all ideals are direct summands,
then R is a finite direct product of simple rings (the converse being clear). If all ideals of R
are direct summands, then R is a finitely generated semisimple module over the enveloping
ring Re = R ⊗Z Rop. By the classical theory of semisimple modules (see [17, §2]), this means
that R is a direct sum of simple Re-submodules. But a simple Re-submodule is a minimal
ideal, and the desired equivalence easily follows.
(cid:3)
Next we investigate the ideals I E R such that R/I is Dedekind finite. (Recall that a
ring R is Dedekind finite, alternatively called directly finite or von Neumann finite, if ab = 1
implies ba = 1 for any a, b ∈ R.)
Proposition 3.12. The family F = {I E R : R/I is Dedekind finite} is (P3). An ideal
maximal with respect to R/I not being Dedekind finite is prime.
Proof. Let A, B ∈ F and I E R with AB ⊆ I ⊆ A ∩ B. We want to show that I ∈ F . This is
equivalent to showing that if a, b ∈ R with 1 − ab ∈ I, then 1 − ba ∈ I. If 1 − ab ∈ I ⊆ A ∩ B
then we must have 1 − ba ∈ A ∩ B because A, B ∈ F . But then 1 − 2ba + baba = (1 − ba)2 ∈
AB ⊆ I. Also notice that ba − baba = b(1 − ab)a ∈ I because 1 − ab ∈ I. Thus
1 − ba = (1 − 2ba + baba) + (ba − baba) ∈ I,
proving that I ∈ F . The last statement now follows from Theorem 2.5.
(cid:3)
Consideration of flat modules leads to the following example. Notice that the conclusion
here that the family is (P3) is stronger than the one given in [19, (5.7)] when restricted to
the commutative case.
12
MANUEL L. REYES
Proposition 3.13. Let R be a ring and set F = {I E R : (R/I)R is flat}. Then F is a (P3)
family. In particular, F is monoidal and an ideal P maximal with respect to (R/P )R not
being flat is a prime ideal.
Proof. Applying [16, (4.14)] to the exact sequence 0 → I → R → R/I → 0, we see that
(R/I)R is flat if and only if, for every left ideal RL ⊆ R one has I ∩ L ⊆ IL (so that
I ∩ L = IL). Thus
F = {I E R : I ∩ L ⊆ IL for all RL ⊆ R}.
Suppose that I, A, B E R with A, B ∈ F and AB ⊆ I ⊆ A ∩ B. Then I ∈ F because, for
every RL ⊆ R, we have
I ∩ L ⊆ (A ∩ B) ∩ L
= A ∩ (B ∩ L)
= A ∩ (BL)
= (AB)L
⊆ IL.
The last two statements follow from the the fact that (P3) families are monoidal and from
the Prime Ideal Principle 2.5.
(cid:3)
4. Oka families and families constructed from module categories
In this final section, we provide examples of families that satisfy the r-Oka and Oka
properties. Beginning with Proposition 4.7, these examples are produced from classes of
modules that satisfy certain properties. Some of those examples in fact satisfy the strongest
property (P1), but they are proved in this section as applications of the module-theoretic
methods to be introduced.
Kaplansky showed [13, p. 486] that a commutative ring R is a principal ideal ring (that is,
every ideal of R is principal) if and only if every prime ideal of R is principal. Here we give
a certain generalization of this result to noncommutative rings. (A different generalization
for one-sided ideals was given in [27, Theorem 5.11].) We will say that an element x ∈ R
is normal if xR = Rx, in which case we have xR = (x) = Rx. This is equivalent to saying
that both inclusions xR ⊆ (x) and Rx ⊆ (x) are equalities. The set of normal elements is
multiplicatively closed: if x, y ∈ R are normal, then xyR = xRy = Rxy.
Let us refine some of our notation. For a right ideal IR ⊆ R and an element x ∈ R, we
define x−1I = {y ∈ R : xy ∈ I} which is a priori only a right ideal of R. However, if I is
a two-sided ideal and x is normal, then one can easily verify that x−1I = (x)−1I, in which
case x−1I is an ideal.
Proposition 4.1. If S is a multiplicative set of normal elements in a ring R, then the set
F = {(s) : s ∈ S} is a strongly r-Oka family. Every ideal of a ring R is generated by a single
normal element if and only if every prime ideal in R is generated by a normal element.
Proof. Let I, J E R such that (I, J), J −1I ∈ F . Choose x, y ∈ S such that (I, J) = (x) and
J −1I = (y). We claim that I = (xy); because xy ∈ S we will therefore have I ∈ F . Noticing
that I ⊆ (I, J) = (x) = xR, it is easy to verify that I = x(x−1I). But x is normal, giving
A PRIME IDEAL PRINCIPLE FOR TWO-SIDED IDEALS
13
the first of the following equalities: x−1I = (x)−1I = J −1I = (y). Once more, normality of
x gives the final equality in I = x(x−1I) = x(y) = (xy).
For the last statement, we apply Theorem 2.6 to the family F taking S to be the set of
(cid:3)
all normalizing elements.
In the special case of a right noetherian ring, for an ideal to be principally generated by
a normal element, it suffices to test separately that it is principal as a left and a right ideal.
The following may be a known folk result, but we became aware of it in a conversation with
Konstantin Ardakov on Mathematics Stack Exchange.1
Lemma 4.2. Let I be an ideal of a ring R such that I = aR = Rb for some a, b ∈ R.
Assume that one of the following hypotheses holds:
(1) R is right noetherian;
(2) R satisfies ACC on principal right ideals and aR is a projective right ideal (e.g., the
right annihilator of a is zero).
Then I = bR and b is normal.
Proof. Fix x, y ∈ R such that a = xb and b = ay. Because I is a left ideal, the function
λ(r) = xr restricts to a right R-module endomorphism of I = aR. This map is surjective
because a = xb = xay. In both cases (1) and (2), we will prove that λ is an automorphism.
Because λ(b) = a implies that the submodule bR ⊆ aR also has image equal to λ(bR) = aR,
injectivity of λ will in turn imply that bR = aR as desired.
Under hypothesis (1), the right ideal I is a noetherian (and therefore Hopfian) module,
whence this surjection is an automorphism. Now suppose (2) holds, and assume toward a
contradiction that λ has kernel 0 6= K1 ⊆ aR. We can inductively define a chain of right
ideals K1 ( K2 ( · · · by setting Kn/Kn−1 to be the (nonzero) kernel of the homomorphism
aR/Kn−1
∼= aR λ→ aR. The third isomorphism theorem thus yields short exact sequences
0 → Kn → aR → aR → 0
for all n. Because aR is projective, each of these sequences splits. Thus Kn, being a direct
summand of the principal right ideal aR, is itself principal. Therefore the strictly ascending
chain of principal right ideals Kn contradicts condition (2).
(cid:3)
Corollary 4.3. Let R be a ring such that either:
(1) R is right noetherian, or
(2) all principal right ideals of R are projective (e.g., R is a domain) and R satisfies
ACC on principal right ideals.
Then any multiplicative submonoid of the family
F = {I E R I = aR = Rb for some a, b ∈ R}
(including F itself ) is an r-Oka family, and every ideal of R is generated by a single normal
element if and only if every prime ideal of R is principal as both a left and right ideal.
1See http://math.stackexchange.com/q/627609
14
MANUEL L. REYES
Proof. By Lemma 3.8, the family F is closed under products. Next, Lemma 4.2 implies that
every element of F is generated by a single normal element. The result now follows from
Proposition 4.1.
(cid:3)
We also mention the following immediate corollary of Lemma 4.2.
Corollary 4.4. If R is a principal left and right ideal ring, then every ideal of R is generated
by a single normal element.
Now we turn our attention to invertible ideals. Let R be a subring of a ring Q. We will
say that an ideal I E R is invertible with respect to Q (or Q-invertible) if there exists an
(R, R)-subbimodule I ∗ ⊆ Q such that I · I ∗ = I ∗ · I = R. Certainly I ∗ is unique. We claim
that every invertible ideal in R is finitely generated as a right ideal. To see this, let I E R be
invertible and choose xi ∈ I and yi ∈ I ∗ such that Pn
i=1 xiyi = 1. Then for x ∈ I we have
x = P xi(yix) where each yix ∈ I ∗I = R. Thus I = P xiR is finitely generated as a right
ideal. A symmetric argument proves that an invertible ideal is also finitely generated as a
left ideal.
In the argument below, the reader is advised to take care not to confuse products J ∗I of
(R, R)-bimodules inside of Q with ideal quotients J −1I = {x ∈ R : xJ ⊆ I}.
Lemma 4.5. Let R ⊆ Q be as above, and let I, J E R where I ⊆ J and J is invertible. Then
I = J · (J −1I).
Proof. Notice that I ⊆ J implies that J ∗I ⊆ J ∗J = R is an ideal of R. Because J(J ∗I) = I,
it follows that J ∗I ⊆ J −1I. Left multiplying by J gives I = J(J ∗I) ⊆ J(J −1I) ⊆ I, and the
desired equality follows.
(cid:3)
Proposition 4.6. Let R be a subring of a ring Q. Then any monoidal family F of Q-
invertible ideals of R is a strongly r-Oka family. Hence an ideal maximal with respect to not
being invertible is prime. Every nonzero ideal of R is invertible if and only if every nonzero
prime ideal of R is invertible.
If every nonzero ideal of R is Q-invertible, then the following hold:
(1) R is a prime ring;
(2) If every nonzero ideal of Q has nonzero intersection with R, then Q is simple.
Proof. Let I, J E R such that (I, J), J −1I ∈ F . Noting that (I, J)−1I = J −1I, we may
apply Lemma 4.5 to find that I = (I, J) · (J −1I) ∈ F . The second statement follows from
Theorem 2.6 once we notice that the family of all Q-invertible ideals in R is monoidal and
every invertible ideal is finitely generated (as a right ideal).
Now assume that all nonzero ideals of R are Q-invertible. Then (1) follows from the Prime
Ideal Principle 2.5 because the zero ideal is maximal in the complement of the Oka family of
all invertible ideals. Now assume that the hypothesis of (2) holds. To see that Q is simple,
let K E Q be nonzero. Then I = K ∩ R is a nonzero ideal in R. Thus I is invertible and
consequently 1 ∈ R = II ∗ ⊆ KI ∗ ⊆ K. So K = Q, proving that Q is simple.
(cid:3)
Invertibility is typically studied in the context where Q is a ring of quotients. For instance,
let R be a right Ore ring (that is, a ring in which the set of non-zero-divisors is a right Ore
set [16, §10B]) and let Q be its classical right ring of quotients. (In this case, every right
A PRIME IDEAL PRINCIPLE FOR TWO-SIDED IDEALS
15
ideal of Q has nonzero intersection with R, so the hypothesis of (B) above is satisfied.) If
every nonzero prime ideal of R is Q-invertible, the above implies that all nonzero ideals of
R are Q-invertible, that R is prime, and that Q is simple. When these conditions hold, Q
is (simple) artinian if and only if R has finite right uniform dimension. Indeed, the simple
ring Q is equal to its own classical right ring of quotients. As it is prime and nonsingular,
Goldie's theorem states that it is (right) artinian exactly when Q has finite right uniform
dimension. But Q has finite right uniform dimension if and only if R does (see [16, (10.35)]).
(Of course, the ring of quotients Q need not always be artinian if all ideals of R are Q-
invertible. For instance, consider that a ring which is a union of simple artinian subrings
is again simple and equal to its own classical ring of quotients, but may fail to be artinian.
Specifically we may take R = Q to be the direct limit of the matrix rings Rn = M2n(k)
for some division ring k, with Rn considered as a subring of Rn+1 via the natural map
Rn → Rn ⊗ I2 ⊆ Rn ⊗k M2(k) ∼= Rn+1. An explicit argument that Q is not artinian is given
in [17, p. 40].)
The remainder of the results in this section are based on families of ideals in a ring R that
are formed by considering those ideals I such that the (R, R)-bimodule R/I lies in a class C
of bimodules, always assumed to contain the zero module, satisfying certain properties. We
say that a class C of (R, R)-bimodules is closed under extensions if, for every short exact
sequence of bimodules 0 → L → M → N → 0, if L, N ∈ C then N ∈ C. (Taking L = 0,
note that this implies that if M ∼= N and N ∈ C then also M ∈ C.) We say that C is closed
under quotients if every homomorphic image of a bimodule in C is also in C.
The first application of this kind of reasoning gives a method to construct examples of
(P1) and r-Oka families. As one can tell from the hypotheses of (2) and (3) below, it applies
especially well to right noetherian rings. In the following, for a module M we use the term
direct sum power of M to mean a module that is a direct sum of copies of M, that is, a
module of the form M (X) = LX M for some set X.
Proposition 4.7. Let R be a ring and C a class of right R-modules containing the zero
module, and denote F = {I E R : R/I ∈ C}.
(1) If C is closed under extensions, quotients, and arbitrary direct sum powers, then F
satisfies (P1).
(2) Suppose that every ideal in F is finitely generated as a right ideal and that C is closed
under extensions and quotients. Then F satisfies (P1).
(3) Suppose that every principal (equivalently, each finitely generated) ideal in R is finitely
generated as a right ideal and that C is closed under extensions and quotients. Then
F is an r-Oka semifilter.
Proof. In each case, F is a semifilter because C is closed under quotients, and R ∈ F because
0 ∈ C. First suppose that C is as in (1). Let I, J ∈ F and consider the short exact sequence
of right R-modules
0 →
I
IJ
→
R
IJ
→
R
I
→ 0.
The right module I/IJ is annihilated by J, so for some sufficiently large set X we have a
surjection of LX R/J (which is in C by closure under direct sum powers) onto I/IJ (which
16
MANUEL L. REYES
we now see to be in C by closure under quotients). Because I/IJ and R/I belong to C,
which is closed under extensions, we have R/IJ ∈ C and thus IJ ∈ F .
Next suppose that F and C are as in (2), and fix I, J ∈ F . The argument that IJ ∈ F
is identical to that for (1), taking into account the following modificiations. Because of the
hypothesis on F , I ∈ F implies that I/IJ is finitely generated as a right R-module. Thus
the set X above can be made finite, and because C is closed under extensions we obtain that
(R/J)X lies in C.
Now under the hypothesis of (3), let I E R and a ∈ R be such that (I, a), (a)−1I ∈ F .
The assumption on R implies that (I, a)/I is a finitely generated right module in the short
exact sequence
0 →
(I, a)
I
→
R
I
→
R
(a)−1I
→ 0.
Further, the right annihilator of (I, a)/I is equal to (a)−1I. So we have a surjection of R-
modules (R/(a)−1I)n ։ (I, a)/I for some positive integer n, and the argument can proceed
as above to conclude that I ∈ F . Hence F is an r-Oka family.
(cid:3)
Example 4.8. Given an m-system S in a ring R, let C be the class of right R-modules M
such that ann(M) ∩ S 6= ∅. Then C is closed under extensions and quotients, because in
any exact sequence 0 → L → M → N → 0 of right R-modules, one has ann(N) ann(L) ⊆
ann(M) ⊆ ann(N). Also, ann(LX M) = ann(M) for any indexing set X. So C satisfies
the hypothesis of Proposition 4.7(1) and satisfies (P1). Because ann((R/I)R) = I for any
I E R, the family F = {I E R : R/I ∈ C} is equal to the set of all ideals that have nonempty
intersection with S. Thus we recover the same family that we considered in Proposition 3.1.
Example 4.9. Let R be a ring, and let S ⊆ R be a multiplicative subset. Let C be the class
of S-torsion modules: those modules in which every element is annihilated by an element
of S. This class is easily seen to be closed under extensions, quotients, and arbitrary direct
sums. It follows from Proposition 4.7(1) that the corresponding family
F = {I E R : R/I ∈ C} = {I E R : for all r ∈ R, r−1I ∩ S 6= ∅}
is (P1).
Two familiar facts in noncommutative ring theory state that (i) a ring is right artinian
if and only if it is right noetherian and all of its prime factors are right artinian, and (ii) a
left artinian ring is right artinian if and only if it is right noetherian. Here we improve these
criteria for a ring to be right artinian by relaxing the right noetherian hypothesis in each
case to the mere assumption that the two-sided ideals of the ring be finitely generated as
right ideals.
Proposition 4.10. If every principal ideal of a ring R is finitely generated as a right ideal,
then the family F = {I E R : R/I is right artinian} is r-Oka. A ring R is right artinian
if and only if R/P is right artinian for all P ∈ Spec(R) and every ideal in R is finitely
generated as a right ideal. A left artinian ring is right artinian if and only if all of its ideals
are finitely generated as right ideals.
Proof. The fact that F is r-Oka follows from Proposition 4.7(3) applied to the class C of
artinian right R-modules.
A PRIME IDEAL PRINCIPLE FOR TWO-SIDED IDEALS
17
If R is right artinian, then certainly all of its prime factors are right artinian. Also R
is right noetherian, so its ideals are all finitely generated as right ideals. For the converse,
suppose that all of the prime factors of R are right artinian and that its ideals are finitely
generated as right ideals. By the first part of this proposition, the family F defined above is
strongly r-Oka. Because Spec(R) ⊆ F , the finiteness assumption on the ideals of R allows us
to conclude that all ideals lie in F , according to Theorem 2.6. In particular we have 0 ∈ F ,
and R is right artinian.
For the last statement, given a left artinian ring R whose ideals are finitely generated as
right ideals, we merely need to show that R/P is right artinian for all P ∈ Spec(R). For
each prime ideal P E R the factor ring R/P is left artinian and prime, hence semisimple and
right artinian.
(cid:3)
An even more general criterion for a left artinian ring to be right artinian is the result of
D. V. Huynh [12, Theorem 1] that a left artinian ring is right artinian if and only if J/(J 2+D)
is right finitely generated where J ER is the Jacobson radical of R and D ER is the maximal
divisible torsion ideal.
A similar consideration gives a criterion for a ring to be right noetherian. We do not
include the proof, which is identical to the proposition above. Notice that we do not have
a corresponding result telling when a left noetherian ring is right noetherian due to the
existence of prime left noetherian rings which are not right noetherian, such as a twisted
polynomial extension k[x; σ] of a field k by an endomorphism σ : k → k that is not surjective.
Proposition 4.11. If every principal ideal of a ring R is finitely generated as a right ideal,
then the family F = {I ER : R/I is right noetherian} is r-Oka. A ring R is right noetherian
if and only if R/P is right noetherian for all P ∈ Spec(R) and every ideal in R is finitely
generated as a right ideal.
The previous two results raise the question of whether the assumption on the ideals of R
can be further weakened. The following example shows that we cannot hope to do much
better than requiring every ideal to be right finitely genrated. Consider the ring R = (cid:0) R R
0 Q(cid:1).
One can show (using, for example, [17, (1.17)]) that the only ideals in R are
0, I = (cid:18)0 R
0 0(cid:19) , P1 = (cid:18)R R
0(cid:19) , P2 = (cid:18)0 R
0 Q(cid:19) , and R.
0
In particular we see that R has finitely many ideals and thus satisfies both ACC and DCC
∼= Q
on ideals. In addition, R is not prime since I 2 = 0, and Spec(R) = {P1, P2} with R/P1
∼= R. Notice that I is the smallest nonzero ideal of R and that R/I ∼= R × Q
and R/P2
is semisimple, hence right artinian. Let Fa (resp. Fn) denote the family of all ideals whose
factor rings are right artinian (resp.
right noetherian). Then we see that every nonzero
ideal belongs to both Fa and Fn, but the zero ideal is not prime. Then by the Prime Ideal
Principle neither Fa nor Fn can be an Oka family. Additionally R is left artinian but not
right artinian or right noetherian (see [17, (1.22)]), even though it has finitely many ideals
and all of its prime quotients are right noetherian.
Following Artin, Small, and Zhang [3], we say that an algebra R over a commutative
noetherian ring C is strongly right noetherian if, for every commutative noetherian ring D
containing C as a subring, the D-algebra R ⊗C D is right noetherian. (An example of Resco
18
MANUEL L. REYES
and Small [25] shows that a noetherian algebra over a field need not be strongly noetherian.
On the other hand, Bell has shown [5] that this condition is automatically satisfied for a
countably generated right noetherian algebra over an uncountable algebraically closed field.)
These algebras play an important role in noncommutative algebraic geometry, especially in
the theory of point modules [4].
Similar to the above examples, the strong right noetherian property provides another
r-Oka family.
Proposition 4.12. Let C be a commutative noetherian ring and let R be a C-algebra. If
every principal ideal of R is finitely generated as a right ideal, then the semifilter
F = {I E R : R/I is a strongly right noetherian C-algebra}
is r-Oka. If R right noetherian, then it is strongly right noetherian over C if and only if
R/P is strongly right noetherian for all (minimal) primes P ∈ Spec(R).
Proof. Let C be the class of all right R-modules M such that, for any commutative noetherian
overring D ⊇ C, the right R ⊗C D-module M ⊗C D is noetherian. (For brevity, we write
M D = M ⊗C D below.) The statement will directly follow from Proposition 4.7 if we show
that C is closed under extensions and quotients.
Fix a commutative noetherian overring D ⊇ C. Given a short exact sequence 0 → L →
M → N → 0 of R-modules where L, N ∈ C, right exactness of the tensor product gives an
exact sequence LD → M D → N D → 0 of RD-modules. Letting K ⊆ M D denote the kernel
of M D → N D, we obtain a short exact sequence of RD modules:
0 → K → M D → N D → 0.
But K Is a homomorphic image of the noetherian RD-module LD. So in the above, K
and N D are noetherian, implying that M D is noetherian. A similar argument using right
exactness shows that C is also closed under quotient modules.
(cid:3)
All of the examples of Oka families encountered up to this point actually satisfied stronger
properties than the Oka condition. The next proposition will allow us to construct some
Oka families without relying on any of the stronger conditions.
Proposition 4.13. Let k be a commutative ring, and let C be a class of k-modules containing
the zero module that is closed under quotients, extensions, and tensor products. Then for
any k-algebra R, the family F = {I E R : R/I ∈ C} is an Oka semifilter.
Proof. The family F is a semifilter because C is closed under quotients. To see that F is
Oka, let I E R and a ∈ R be such that (I, a), (a)−1I, I(a)−1 ∈ F . Consider the following
short exact sequence of (R, R)-bimodules:
0 →
(I, a)
I
→
R
I
→
R
(I, a)
→ 0.
We want to conclude that R/I ∈ C. Because R/(I, a) ∈ C and C is closed under extensions,
it suffices to show that (I, a)/I ∈ C. Consider the k-bilinear map R/I(a)−1 × R/(a)−1I →
(I, a)/I given by
(r + I(a)−1, s + (a)−1I) 7→ ras + I.
A PRIME IDEAL PRINCIPLE FOR TWO-SIDED IDEALS
19
This induces a k-module homomorphism R/I(a)−1 ⊗k R/(a)−1I → (I, a)/I that is evidently
surjective. The fact that C is closed under tensor products and quotients then implies that
(I, a)/I ∈ C as desired.
(cid:3)
Part (2) of the following proposition gives a method of finding categories C satisfying the
hypothesis of Proposition 4.13.
Lemma 4.14. Let k be a ring and let C be a class of k-modules containing the zero module.
(1) If C is closed under quotients and extensions, then it is closed under finite sums of
modules in the following sense: if N1, . . . , Nm ∈ C are submodules of a single k-module
M, then P Ni ∈ C also.
(2) Assume that k is commutative. If C is closed under quotients and extensions and if
M, N ∈ C with N finitely generated, then M ⊗k N ∈ C. In particular, if every module
in C is finitely generated, then C is closed under tensor products.
Proof. (1) It suffices to prove the statement for a sum of two submodules, for then an
easy inductive argument extends the result to arbitrary finite sums. So suppose N1, N2 are
submodules of the k-module M. Then we have the following short exact sequence:
0 → N1 → N1 + N2 → (N1 + N2)/N1 → 0.
But (N1 + N2)/N1
exact sequence above gives N1 + N2 ∈ C as desired.
∼= N2/(N1 ∩ N2) ∈ C because C is closed under quotients. Thus the short
(2) Let x1, . . . , xn ∈ N form a generating set. Each of the submodules M ⊗ xi ⊆ M ⊗ N
is a homomorphic image of M (under the map − ⊗ xi : M → M ⊗ xi) and thus lies in C.
(cid:3)
i=1 M ⊗ xi ∈ C.
But then M ⊗ N = Pn
Now we take a look at some specific examples.
Example 4.15. Let R be an algebra over a commutative ring k. The family F of all ideals
I of R such that R/I is module-finite over k is an Oka semifilter (using Proposition 4.13
applied to the class C of finitely generated k-modules). Thus, an ideal I E R maximal with
respect to having R/I not module-finite over k is prime.
The result above is related to the study of "just infinite" algebras. An algebra R over a
commutative ring k is is said to be just infinite if R is not finitely generated as a k-module,
but every proper factor of R is module-finite over k. A result attributed to Lance Small (see
[28, Exercise 6.2.5], [23, Prop. 3.2], or [9, Lem. 2.1]) states that in case k is a field, an infinite
dimensional k-algebra has a just infinite factor ring (so that the family above has the Zorn
property) which is prime.
The "maximal implies prime" statement above recovers part of Small's result. (For an
alternative proof, see [8].) To recover the stronger result using the Zorn property, we require
the following Artin-Tate-style lemma. We follow the proof strategy of [23, Lemma 3.1].
Recall that a k-algebra is affine if it is finitely generated as a k-algebra.
Lemma 4.16. Let k be a commutative noetherian ring, and let R be an affine k-algebra. If
M is a finitely generated right R-module with a submodule L ⊆ M such that M/L is finitely
generated as a k-module, then L is also finitely generated as an R-module. (In particular, if
20
MANUEL L. REYES
I is a right ideal of R such that R/I finitely generated over k, then I is finitely generated as
a right ideal.)
Proof. Let {x1, . . . , xm} be k-algebra generating set of R and let {g1, . . . , gn} be a set of R-
module generators of M. Because M/L is finitely generated over k, there exist v1, . . . , vt ∈ M
such that, for V = P kvi, we have M = L + V .
Consequently there exist elements pα ∈ L and qβγ ∈ L such that each gα ∈ pα + V and
each vβxγ ∈ qβγ + V . Let L0 ⊆ L be the R-submodule generated by the finite set of the pα
and qβγ. It is straightforward to see that L0 + V is an R-submodule of M. By construction,
each gα ∈ L0 + V , so M = L0 + V .
Finally, if l ∈ L then l = l0 + v for l0 ∈ L0 ⊆ L and v ∈ V . But also v = l − l0 ∈ L. It
follows that L = L0 + (L ∩ V ). Because k is noetherian and V is finitely generated over k,
the k-submodule L ∩ V is also finitely generated over k. Thus L = L0 + (L ∩ V ) is finitely
generated as an R-module.
(cid:3)
Theorem 4.17. Let R be an affine algebra over a commutative noetherian ring k. The
family
F = {I E R : R/I is finitely generated as a k-module}
satisfies (P1). Thus any just infinite k-algebra is prime. Furthermore, an algebra R that is
not finitely generated as a k-module is just infinite over k if and only if R/P is module-finite
over k for all nonzero P ∈ Spec(R).
Proof. The previous lemma implies that every ideal in F is finitely generated as a right ideal.
Applying Proposition 4.7(2) to the class C of right R-modules that are finitely generated over
k, we conclude that F is a (P1) family. The final two claims respectively follow from the
Prime Ideal Principle 2.5 and Theorem 2.6.
(cid:3)
We present two more examples of Oka families derived from Proposition 4.13. In both
examples, k denotes a commutative ring.
Example 4.18. The class of noetherian k-modules is closed under quotients and extensions,
and consists of finitely generated modules. Then as above, the family of all I E R with R/I
noetherian over k is an Oka semifilter.
Example 4.19. The class of k-modules of finite (composition) length, which is the same as
the category of finitely generated artinian k-modules, is closed under quotients and extensions
and consists of finitely generated modules. So the family of I E R such that R/I is artinian
over k is an Oka semifilter.
We conclude with some thoughts on future directions in the study of the "maximal implies
prime" phenomenon for two-sided ideals in noncommutative rings. When comparing the
theories of Oka families for commutative rings [19] and for right ideals in noncommuative
rings [26] with the theory developed above, we notice one striking difference. In both of the
former two settings, it was shown that Oka families in a ring R are in bijective correspondence
with classes of cyclic R-modules that are closed under extensions (see [19, §4] and [26, §4]).
This allows one to take any module-theoretic property that is preserved by extensions and
produce a corresponding Oka family, a method which led to a number of novel examples of
"maximal implies prime" results in both cases.
A PRIME IDEAL PRINCIPLE FOR TWO-SIDED IDEALS
21
By contrast, we have not found any (bi)module-theoretic characterization of the Oka
families of Definition 2.1 leading to a correspondence between Oka families in a ring R and
certain classes of (bi)modules. While Propositions 4.7 and 4.13 provide sufficient conditions
for a class of bimodules to give rise to an Oka family, both of these methods seem severely
limited by the fact that they can only produce Oka semifilters of ideals. (Note that each of
those results involved a short exact sequence of (R, R)-bimodules the form
0 →
(I, a)
I
→
R
I
→
R
(I, a)
,
where I is an ideal and a is an element of the ring R. In each case, the hypotheses are imposed
with the intent of finding a description of (I, a)/I in terms of the bimodules R/I(a)−1 and
R/(a)−1I. The key noncommutative difficulty seems to be the lack of such a description in
full generality.)
Thus, in conclusion, we offer two general problems to stimulate further work in this direc-
tion.
(1) Is it possible to characterize Oka families of ideals in a noncommutative ring R
in terms of suitable classes of (R, R)-bimodules (perhaps using a more appropriate
definition than the one given in Definition 2.1)?
(2) In lieu of such a characterization, is there a related method that yields more examples
of Oka families that are not semifilters and that do not satisfy conditions (P1)–(P3)?
Even partial progress on these problems seems likely to lead to new "maximal implies prime"
results for ideals in noncommutative rings.
References
1. S. A. Amitsur and Lance W. Small, Algebras over infinite fields, revisited, Israel J. Math. 96 (1996),
no. part A, 23–25. MR 1432724 (97k:16025)
2. D. D. Anderson, A note on minimal prime ideals, Proc. Amer. Math. Soc. 122 (1994), no. 1, 13–14.
MR 1191864 (94k:13001)
3. M. Artin, L. W. Small, and J. J. Zhang, Generic flatness for strongly Noetherian algebras, J. Algebra
221 (1999), no. 2, 579–610. MR 1728399 (2001a:16006)
4. M. Artin and J. J. Zhang, Abstract Hilbert schemes, Algebr. Represent. Theory 4 (2001), no. 4, 305–394.
MR 1863391 (2002h:16046)
5. Jason P. Bell, Noetherian algebras over algebraically closed fields, J. Algebra 310 (2007), no. 1, 148–155.
MR 2307786 (2008f:16050)
6. I. S. Cohen, Commutative rings with restricted minimum condition, Duke Math. J. 17 (1950), 27–42.
MR 0033276 (11,413g)
7. David Eisenbud, Commutative Algebra: with a View Toward Algebraic Geometry, Graduate Texts in
Mathematics, vol. 150, Springer-Verlag, New York, 1995. MR 1322960 (97a:13001)
8. John Farina and Cayley Pendergrass-Rice, A few properties of just infinite algebras, Comm. Algebra 35
(2007), no. 5, 1703–1707. MR 2317639 (2008b:16030)
9. Daniel R. Farkas and Lance W. Small, Algebras which are nearly finite dimensional and their identities,
Israel J. Math. 127 (2002), 245–251. MR 1900701 (2003c:16033)
10. K. R. Goodearl and R. B. Warfield, Jr., An introduction to noncommutative Noetherian rings, second
ed., London Mathematical Society Student Texts, vol. 61, Cambridge University Press, Cambridge, 2004.
MR 2080008 (2005b:16001)
11. I. N. Herstein, Due risultati classici sugli anelli, Univ. e Politec. Torino Rend. Sem. Mat. 21 (1961/1962),
99–102. MR 0148689 (26 #6196)
22
MANUEL L. REYES
12. Dinh Van Huynh, A note on rings with chain conditions, Acta Math. Hungar. 51 (1988), no. 1-2, 65–70.
MR 934584 (89e:16024)
13. Irving Kaplansky, Elementary divisors and modules, Trans. Amer. Math. Soc. 66 (1949), 464–491.
MR 0031470 (11,155b)
14.
, Commutative Rings, revised ed., The University of Chicago Press, Chicago, Ill.-London, 1974.
MR 0345945 (49 #10674)
15. Gunter Krause, Middle annihilators in Noetherian rings, Comm. Algebra 8 (1980), no. 8, 781–791.
MR 566421 (81h:16025)
16. T. Y. Lam, Lectures on Modules and Rings, Graduate Texts in Mathematics, vol. 189, Springer-Verlag,
New York, 1999. MR 1653294 (99i:16001)
17.
18.
, A First Course in Noncommutative Rings, second ed., Graduate Texts in Mathematics, vol.
131, Springer-Verlag, New York, 2001. MR 1838439 (2002c:16001)
, Exercises in Classical Ring Theory, second ed., Problem Books in Mathematics, Springer-Verlag,
New York, 2003. MR 2003255 (2004g:16001)
19. T. Y. Lam and Manuel L. Reyes, A Prime Ideal Principle in commutative algebra, J. Algebra 319 (2008),
no. 7, 3006–3027. MR 2397420
20.
, Oka and Ako ideal families in commutative rings, Rings, modules and representations, Contemp.
Math., vol. 480, Amer. Math. Soc., Providence, RI, 2009, pp. 263–288. MR 2508156 (2010j:13008)
21. J. C. McConnell and J. C. Robson, Noncommutative Noetherian Rings, revised ed., Graduate Studies in
Mathematics, vol. 30, American Mathematical Society, Providence, RI, 2001, With the cooperation of
L. W. Small. MR 1811901 (2001i:16039)
22. Neal H. McCoy, Prime ideals in general rings, Amer. J. Math. 71 (1949), 823–833. MR 0032590 (11,311c)
23. D. S. Passman and W. V. Temple, Representations of the Gupta-Sidki group, Proc. Amer. Math. Soc.
124 (1996), no. 5, 1403–1410. MR 1307556 (96g:20009)
24. C. Procesi, The Burnside problem, J. Algebra 4 (1966), 421–425. MR 0212081 (35 #2956)
25. Richard Resco and L. W. Small, Affine Noetherian algebras and extensions of the base field, Bull. London
Math. Soc. 25 (1993), no. 6, 549–552. MR 1245080 (94m:16029)
26. Manuel L. Reyes, A one-sided prime ideal principle for noncommutative rings, J. Algebra Appl. 9 (2010),
no. 6, 877–919. MR 2748128 (2012a:16007)
27.
, Noncommutative generalizations of theorems of Cohen and Kaplansky, Algebr. Represent. The-
ory 15 (2012), no. 5, 933–975. MR 2969284
28. Louis H. Rowen, Ring Theory, Student Edition, Academic Press Inc., Boston, MA, 1991. MR 1095047
(94e:16001)
29. Boris Sirola, On noncommutative Noetherian schemes, J. Algebra 282 (2004), no. 2, 667–698.
MR 2101080 (2006b:16050)
Department of Mathematics, Bowdoin College, 8600 College Station, Brunswick, ME
04011–8486, USA
E-mail address: [email protected]
URL: http://www.bowdoin.edu/~reyes/
|
1307.0778 | 8 | 1307 | 2013-09-08T02:26:02 | Congruences of the fork extensions. I. The Congruence Extension Property | [
"math.RA"
] | For a slim, planar, semimodular lattice, G. Cz\'edli and E.\,T. Schmidt introduced the fork extension in 2012. In this note we prove that the fork extension has the Congruence Extension Property. This paper has been merged with Part II, under the title Congruences of fork extensions of slim semimodular lattices, see arXiv: 1307.8404 | math.RA | math |
CONGRUENCES OF THE FORK EXTENSIONS. I.
THE CONGRUENCE EXTENSION PROPERTY
G. GR ATZER
Abstract. For a slim, planar, semimodular lattice, G. Cz´edli and E. T. Schmidt
introduced the fork extension in 2012. In this note we prove that the fork ex-
tension has the Congruence Extension Property.
1. Introduction
Let L and K be lattices and let K be an extension of L. We say that the
Congruence Extension Property holds, if every congruence of L has an extension
to K.
Let L be a slim, planar, semimodular lattice, an SPS lattice. As in G. Cz´edli and
E. T. Schmidt [2], inserting a fork to L at the covering square S, firstly, replaces S
by a copy of S7 (see the lattice S7 in Figure 1).
Secondly, if there is a chain u ≺ v ≺ w such that the element v has just been
added and T = {x = u ∧ z, z, u, w = z ∨ u} is a covering square in the lattice L
(and so u ≺ v ≺ w is not on the boundary of L) but x ≺ z at the present stage of
the construction, then we insert a new element y such that x ≺ y ≺ z and y ≺ v.
Let L[S] denote the lattice we obtain when the procedure terminates. We say
that L[S] is obtained from L by inserting a fork to L at the covering square S. See
Figure 2 for an illustration.
Let L be an SPS lattice and S a covering square of L.
In this note we will
examine the connections between the congruence lattice of L and the congruence
lattice of L[S].
Date: July 2, 2013.
2010 Mathematics Subject Classification. Primary: 06C10. Secondary: 06B10.
Key words and phrases. semimodular lattice, fork extension, congruence.
Figure 1. The lattice S7
1
abcdeoi2
G. GR ATZER
Figure 2. Inserting a fork at S
Theorem 1. Let L be a slim, semimodular, planar lattice. Let S be a covering
square of L. Then the extension of L to L[S] has the Congruence Extension Prop-
erty.
We will use the notations and concepts of lattice theory as in [3].
2. Congruences of finite lattices
The following lemma is trivial but very useful.
Lemma 2. Let L be a finite lattice. Let δ be an equivalence relation on L with
intervals as equivalence classes. Then δ is a congruence relation iff the following
condition and its dual hold:
If x is covered by y (cid:54)= z in L and x ≡ y (mod δ), then z ≡ y ∨ z (mod δ).
(C∨)
Proof. We want to prove that if x ≤ y and x ≡ y (mod δ), then x ∨ z ≡ y ∨
z (mod δ). The proof is a trivial induction first on length[x, y] and then on
length[x, x ∨ z].
(cid:3)
Let (C∧) denote the dual of (C∨).
3. The fork construction
Let L be an SSP lattice. Let S be a covering square of L.
We need some notation for the L[S] construction, see Figure 3.
We start the construction by adding the elements t, zl,1, and zr,1 so that the set
{o, zl,1, zr,1, al, ar, t, i} forms a sublattice S7.
Let al = xl,1, o = yl,1. If k is the largest number so that xl,k, yl,k, and zl,k have
already been defined, and
T = {yl,k+1 = xl,k+1 ∧ yl,k, xl,k+1, yl,k, xl,k = xl,k+1 ∨ yl,k}
is a covering square in L, then we add the element zl,k+1, so we get two new covering
squares {yl,k+1, xl,k+1, yl,k, xl,k} and {zl,k+1, yl,k+1, zl,k, yl,k}. We proceed similarly
on the right.
So L[S] is constructed by inserting the elements in the set
F [S] = {t, zl,1 (cid:31) ··· (cid:31) zl,n, zr,1 (cid:31) ··· (cid:31) zr,m}
SCONGRUENCES OF THE FORK EXTENSIONS. I. CEP
3
Figure 3. Notation for the fork construction
so that {o, zl,1, zr,1, al, ar, t, i} is a sublattice S7, moreover, xl,i (cid:31) zl,i (cid:31) yl,i for
i = 1, . . . , n, and xr,i (cid:31) zr,i (cid:31) yr,i for i = 1, . . . , m. The new elements are black
filled in Figure 3.
Lemma 3. Let L be an SSP lattice with the covering square S. Then L is a
sublattice of L[S]. Therefore, every element x of L[S] has an upper cover x and
a lower cover x in L. Specifically, zl,i = xl,i for i = 1, . . . , n, zr,i = xr,i for
i = 1, . . . , m, and t = i.
If x, y ∈ L[S] and x /∈ F [S], then
x ∨ y = x ∨ y,
and dually.
The following results are well known.
Lemma 4. Let L be an SSP lattice.
(i) An element of L has at most two covers.
(ii) Let a ∈ L. Let a cover the three elements x1, x2, and x3. Then the set
{x1, x2, x3} generates an S7 sublattice.
(iii) If the elements x1, x2, and x3 are adjacent, then the S7 sublattice of (ii) is a
cover-preserving sublattice.
4. Proving Theorem 1
We prove Theorem 1 (and somewhat more) in the next three lemmas.
Lemma 5. Let L be an SSP lattice. Let S = {0, al, ar, i} be a covering square of L.
Let o ≡ i (mod α). Then α extends to L[S] uniquely to a congruence α of L[S].
Proof. We define α as the partition:
π = { [u, v]L[S] [u, v]L is a congruence class of α}
zl,nzr,1zr,2zr,mzl,1zl,2txl,2xl,nxr,2xr,myl,2yl,nyr,mal=xl,1yl,1=yr,1ar=xr,1ioyr,24
G. GR ATZER
(cid:91)
To verify that π is indeed a partition of L[S], let
A =
( [u, v]L[S] [u, v]L is a congruence class of α ).
Clearly, L ⊆ A. Since o ≡ i (mod α), there is a congruence class [u, v]L containing
o and i. Hence [u, v]L[S] ∈ π. Therefore, t, zl,1, zr,1 ∈ A. For i = 1, . . . , n, there is a
congruence class [ui, vi]L containing xl,i and yl,i. Hence zl,i ∈ [ui, vi]L[S] ⊆ A and
symmetrically zl,i ∈ A for i = 1, . . . , m. This proves that A = L.
Next we show that the sets in π are pairwise disjoint.
Finally, we verify the substitution properties. Let a, b, c ∈ L[S] and a ≡ b
(mod π). Then there exist u, v ∈ L with u ≡ v (mod α) such that a, b ∈ [u, v]L[S].
There is also an interval [u(cid:48), v(cid:48)]L[S] ∈ π with c ∈ [u(cid:48), v(cid:48)]L[S]. Since u ≡ v (mod α)
and u(cid:48) ≡ v(cid:48) (mod α), it follows that u∨u(cid:48) ≡ v∨v(cid:48) (mod α), so there is a congruence
class [u(cid:48)(cid:48), v(cid:48)(cid:48)] of α containing u∨u(cid:48) and v∨v(cid:48). So u∨u(cid:48), v∨v(cid:48) ∈ [u(cid:48)(cid:48), v(cid:48)(cid:48)]L[S], verifying
the substitution property for joins. The dual proof verifies the substitution property
for meets.
(cid:3)
Lemma 6. Let L be an SSP lattice. Let S = {0, al, ar, i} be a covering square of L.
Let α be a congruence of L satisfying α(cid:101)S = 0S. Then α extends to L[S].
Proof. We are going to define the minimal congruence α of L[S] extending α.
For i = 1, . . . , n, define i as the smallest element in {1, . . . , n} satisfying xl,i ≡ xl,i
The uniqueness statement is obvious.
(mod α); let i be the largest one.
We define α as the partition:
(1)
πd ={ [u, v]L[S] [u, v]L is a congruence class of α}
∪ {t} ∪ { [zl,i, zl,i] i = 1, . . . , n} ∪ { [zr,i, zr,i] i = 1, . . . , m}.
Clearly, α is a partition. To see that α is a congruence, we use Lemma 2. To
verify (C∨), let x ≺ y, z ∈ L[S], y (cid:54)= z, and x ≡ y (mod α). We want to prove
that z ≡ z ∨ y (mod α). By (1), either x ≡ y (mod α) or x, y ∈ [zl,i, zl,i] for some
i = 1, . . . , n (or symmetrically).
If z ∈ L, then z ≡ z ∨ y (mod α) since α is a
First, let x ≡ y (mod α).
congruence, so by (1), z ≡ z ∨ y (mod α). If z /∈ L, that is, if z ∈ F [S], then t (cid:54)= i,
since i does not cover an element not in F [S]. So z = zl,i for some i = 1, . . . , n
(or symmetrically). Since x ≺ z = zl,i and x ∈ L, we get that x = zl,i, i > 1 and
x = yl,i−1. It easily follows that z ≡ y ∨ z (mod α).
Second, let x, y ∈ [zl,i, zl,i] for some i = 1, . . . , n (or symmetrically). Then
x = zl,j and y = zl,j−1 with zl,j ≡ zl,j−1 (mod α) by (1), and so z ≡ z ∨ y
(cid:3)
(mod α).
Lemma 7. Let L be an SSP lattice. Let S = {0, al, ar, i} be a covering square of L.
Let α be a congruence of L satisfying al ≡ i (mod α) and ar (cid:54)≡ i (mod α). Then
α extends to a unique congruence α of L[S].
Proof. Define
(2)
(3)
(4)
i/α = i/α ∪ { zl,i xl,i ≡ xl,1 (mod α)}
xl,i/α = xl,i/α ∪ { zl,k xl,i ≡ xl,k (mod α)}
xr,j/α = xr,j/α ∪ { zr,k xr,j ≡ xr,k (mod α)}
We define α as follows:
for i = 1, . . . , n;
for i, k = 2, . . . , n;
for j, k = 2, . . . , m.
CONGRUENCES OF THE FORK EXTENSIONS. I. CEP
5
Figure 4. Illustrating α for Lemma 7
Let x/α be as defined above for
x ∈ i/α ∪(cid:91)
( xl,i/α i = 2, . . . , n ) ∪(cid:91)
( xr,j/α j = 2, . . . , m );
let x/α = x/α otherwise.
We have to prove that α is a congruence.
The sets x/α, x ∈ L[S], are pairwise disjoint intervals, so they define an equiv-
alence relation α with intervals as equivalence classes.
We again use Lemma 2. To verify (C∨), let x ≺ y, z ∈ L[S], y (cid:54)= z, and x ≡ y
(mod α). We want to prove that z ≡ z ∨ y (mod α) There are four cases to
consider.
Case 1: x, y ∈ L. Then x ≡ y (mod α). If z ∈ L, then x ∨ z ≡ y ∨ z (mod α),
since α is a congruence of L, so x ∨ z ≡ y ∨ z (mod α). So we can assume that
z ∈ F [S].
Since x ≺ y in L, it follows that x, y ∈ id(o) or x, y ∈ fil(xl,n) ∪ fil(xr,m).
Case 1.1: x, y ∈ id(o) and z ∈ F [S]. Let z = zl,i (z = zr,i proceeds similarly).
Note that x ≤ xl,i and xl,i ∨ y = xl,i−1. Since x ≡ y (mod α), it follows that
Case 1.2: x, y ∈ fil(xl,n) ∪ fil(xr,m) and z ∈ F [S]. This cannot happen in view
Then z ∨ y = zl,i−1. We have to verify that zl,i ≡ zl,i−1 (mod α).
xl,i ≡ xl,i−1 (mod α). By (3), zl,i ≡ zl,i−1 (mod α), as claimed.
of x ≺ z.
Case 2: x ∈ L, y ∈ F [S].
Case 2.1: y = zl,i. This cannot happen because by (3) there is no x ∈ L,
x < zl,i in xl,i/α.
Case 2.2: y = zr,i. Then x = yr,i.
zl,nzr,1zr,2zr,mzl,1zl,2txl,2xl,nxr,2xr,myl,2yl,nyr,mal=xl,1yl,1=yr,1ar=xr,1ioyr,2al,2yl,3zl,3xl,3xl,4zl,4yl,4G. GR ATZER
Case 2.2.1: i (cid:54)= 1. Then z = yr,i−1 and zr,i−1 ≡ y ∨ z = zr,i−1 (mod α)
6
by (4).
Case 2.3: y = t. This cannot happen because there is no x ∈ L with x ≺ t.
Case 2.2.2: i = 1, so y = yr,1. Then z = zl,1 and we proceed as in Case 2.2.1.
Case 3: x ∈ F [S], y ∈ L. Then x = zl,i and y = xl,i. Joining them with z, if we
get two distinct elements, they are of the same form, of the pair t, i, all of which
are congruence modulo α.
Case 4: x, y ∈ F [S]. Let x = zl,i and y = zl,i−1 (or symmetrically). Then
z = xl,i and the conclusion follows from (4).
(mod α). We distinguish the same four cases as for (C∧).
so x ∧ z ≡ y ∧ z (mod α). So we can assume that z ∈ F [S].
We have verified condition (C∨) of Lemma 2. The final step is to verify (C∧).
So let x cover y (cid:54)= z in L[S] and x ≡ y (mod α). We want to prove that z ≡ x∧z
Case 1: x, y ∈ L. Then x ≡ y (mod α). If z ∈ L, then x ∧ z ≡ y ∧ z (mod α),
Since z ∈ F [S] is covered by exactly one element z of L, so x = x, and y ∧ z, z ∈
Case 2: x ∈ L, y ∈ F [S], say y = zl,i. Then x = xl,i, so y = zl,i and z = xl,i+1.
Case 3: x ∈ F [S], y ∈ L. This cannot happen because there is no x ∈ F [S] and
Case 4: x, y ∈ F [S]. Let x = zl,i and y = zl,i+1 (or symmetrically). Then
(cid:3)
x/α, and the claim follows.
By (3), y ≡ y ∧ z (mod α), as claimed.
y ∈ L with x (cid:31) y and x ≡ y (mod α).
z = yl,i and the conclusion follows from the fact that yl,i ≡ yl,i+1 (mod α).
The uniqueness statement is obvious.
References
[1] G. Cz´edli and E. T. Schmidt, Slim semimodular lattices. I. A visual approach, Order 29 (2012),
481-497.
[2]
[3] G. Gratzer, Lattice Theory: Foundation. Birkhauser Verlag, Basel, 2011. xxix+613 pp. ISBN:
, Slim semimodular lattices. II. A description by patchwork systems, Order.
978-3-0348-0017-4.
Department of Mathematics, University of Manitoba, Winnipeg, MB R3T 2N2, Canada
E-mail address, G. Gratzer: [email protected]
URL, G. Gratzer: http://server.maths.umanitoba.ca/homepages/gratzer/
|
1106.2680 | 1 | 1106 | 2011-06-14T11:40:11 | $\delta$-superderivations of semisimple Jordan superalgebras | [
"math.RA",
"math.QA"
] | We described $\delta$-derivations and $\delta$-superderivations of simple and semisimple finite-dimensional Jordan superalgebras over algebraic closed fields with characteristic $p\neq2$. We constructed new examples of 1/2-derivations and 1/2-superderivations of simple Zelmanov's superalgebra $V_{1/2}(Z,D).$ | math.RA | math |
δ-SUPERDERIVATIONS OF SEMISIMPLE JORDAN SUPERALGEBRAS
Ivan Kaygorodov
Sobolev Inst. of Mathematics
Novosibirsk, Russia
[email protected]
Abstract:
We described δ-derivations and δ-superderivations of simple and semisimple finite-dimensional Jordan
superalgebras over algebraic closed fields with characteristic p 6= 2. We constructed new examples of 1
2 -
derivations and 1
2 -superderivations of simple Zelmanov's superalgebra V1/2(Z, D).
Key words: δ-(super)derivation, Jordan superalgebra.
В в е д е н и е
Антидифференцирования, то есть такие линейные отображения µ алгебры A, что
µ(xy) = −µ(x)y − xµ(y),
изучались в работах [1, 2]. Впоследствии, в работах В. Т. Филиппова было введено понятие δ-
дифференцирования, то есть такого линейного отображения φ алгебры A, что для фиксированного эле-
мента δ из основного поля и произвольных элементов x, y ∈ A верно
φ(xy) = δ(φ(x)y + xφ(y)).
Он рассматривал δ-дифференцирования первичных лиевых, альтернативных и мальцевских нелиевых ал-
гебр [3, 4, 5]. В дальнейшем, δ-дифференцирования йордановых алгебр и супералгебр, а также простых
супералгебр Ли рассматривались И. Б. Кайгородовым в работах [6, 7, 8, 9]; δ-супердифференцирования
супералгебр йордановой скобки рассматривались И. Б. Кайгородовым и В. Н. Желябиным в рабо-
те [10]; П. Зусманович рассматривал δ-супердифференцирования первичных супералгебр Ли в [11].
Отметим, что в [12] сделан подробный обзор, посвященный изучению δ-дифференцирований и δ-
супердифференцирований.
В данной работе дается полное описание δ-дифференцирований и δ-супердифференцирований простых
конечномерных неунитальных йордановых супералгебр над алгебраически замкнутым полем характери-
стики p > 2. В результате мы имеем полное описание δ-дифференцирований и δ-супердифференцирований
полупростых конечномерных йордановых супералгебр над алгебраически замкнутым полем характери-
стики отличной от 2. В частности показано, что полупростые конечномерные йордановы супералгебры над
алгебраически замкнутым полем характеристики нуль не имеют нетривиальных δ-дифференцирований и
δ-супердифференцирований.
§1 Основные факты и определения.
Пусть F (cid:22) поле характеристики p 6= 2. Алгебра A над полем F называется йордановой, если она
удовлетворяет тождествам
xy = yx,
(x2y)x = x2(yx).
Пусть G (cid:22) алгебра Грассмана над F , заданная образующими 1, ξ1, . . . , ξn, . . . и определяющими соотноше-
ниями: ξ2
i = 0, ξiξj = −ξjξi. Элементы 1, ξi1ξi2 . . . ξik , i1 < i2 < . . . < ik, образуют базис алгебры G над F .
Обозначим через G0 и G1 подпространства, порожденные соответственно произведениями четной и нечет-
ной длинны; тогда G представляется в виде прямой суммы этих подпространств: G = G0 ⊕ G1, при этом
справедливы соотношения GiGj ⊆ Gi+j(mod2), i, j = 0, 1. Иначе говоря, G является Z2-градуированной
алгеброй (или супералгеброй) над F .
Пусть теперь A = A0 ⊕ A1 (cid:22) произвольная супералгебра над F . Рассмотрим тензорное произведение
F -алгебр G ⊗ A. Его подалгебра
G(A) = G0 ⊗ A0 + G1 ⊗ A1
1
называется грассмановой оболочкой супералгебры A.
Пусть Ω (cid:22) некоторое многообразие алгебр над F . Супералгебра A = A0 ⊕ A1 называется Ω-
супералгеброй, если ее грассманова оболочка G(A) является алгеброй из Ω. В частности, A = A0 ⊕ A1
называется йордановой супералгеброй, если ее грассманова оболочка G(A) является йордановой алгеброй.
Далее для однородного элемента x супералгебры A = A0 ⊕ A1 будем считать p(x) = i, если x ∈ Ai, а для
элемента x ∈ A = A0 ⊕ A1 через xi обозначим проекцию на Ai.
Классификация простых конечномерных йордановых супералгебр над алгебраически замкнутым по-
лем характеристики ноль была приведена в работах И. Кантора и В. Каца [13, 14]. В последствии М.
Расином и Е. Зельмановым [15], были описаны простые конечномерные йордановы супералгебры с полу-
простой четной частью над алгебраически замкнутым полем характеристики отличной от 2. В работе Е.
Зельманова и К. Мартинез [16] была дана классификация простых унитальных конечномерных йордано-
вых супералгебр с неполупростой четной частью над алгебраически замкнутым полем характеристики
p > 2. Простые неунитальные конечномерных йордановы супералгебры над алгебраически замкнутым
полем характеристики p > 2 были описаны в работе Е. Зельманова [17]. Также, в этой работе была предъ-
явлена структура полупростых конечномерных йордановых супералгебр над алгебраически замкнутым
полем характеристики p 6= 2.
Приведем некоторые примеры йордановых супералгебр.
1.1. Супералгебра векторного типа J(Γ, D). Пусть Γ = Γ0 ⊕Γ1 (cid:22) ассоциативная суперкоммутатив-
ная унитальная супералгебра с ненулевым четным дифференцированием D. Рассмотрим J(Γ, D) = Γ ⊕ Γx
(cid:22) прямую сумму пространств, где Γx (cid:22) изоморфная копия пространства Γ. Тогда операция умножения
на J(Γ, D), которую мы обозначем через ·, определяется формулами
a · b = ab, a · bx = (ab)x, ax · b = (−1)p(b)(ab)x, ax · bx = (−1)p(b)(D(a)b − aD(b)),
где a, b однородные элементы из Γ и ab (cid:22) произведение в Γ.
В дальнейшем, нас будет интересовать случай Γ = B(m), где B(m) = F [a1, . . . , amap
i = 0] (cid:22) алгебра
усеченных многочленов от m четных переменных над полем характеристики p > 2.
1.2. Супералгебра Каца. Простая девятимерная супералгебра Каца K9 над полем характеристики
3 определяется следующим образом:
K9 = A ⊕ M, (K9)0 = A, (K9)1 = M ,
A = F e + F uz + F uw + F vz + F vw,
M = F z + F w + F u + F v .
Умножение задано условиями:
e2 = e, e (cid:22) единица алгебры A, em = 1
2 m, для любого m ∈ M,
[u, z] = uz, [u, w] = uw, [v, z] = vz, [v, w] = vw,
[z, w] = e, [u, z]w = −u, [v, z]w = −v, [u, z][v, w] = 2e,
а все остальные ненулевые произведения получаются из приведенных либо применением одной из косо-
симметрий z ↔ w, u ↔ v, либо применением одновременной подстановки z ↔ u, w ↔ v. Отметим, что
супералгебра K9 не является унитальной.
1.3. Супералгебра V1/2(Z, D). Пусть Z (cid:22) ассоциативно-коммутативная F -алгебра с единицей e и
дифференцированием D : Z → Z, удовлетворяющая двум условиям
i) Z не имеет собственных D-инвариантных идеалов,
ii) D обнуляет только элементы вида F e.
Рассмотрим Zx как изоморфную копию алгебры Z. Определим на векторном пространстве V (Z, D) =
Z + Zx структуру супералгебры. Положим A = Z и M = Zx (cid:22) соответственно четная и нечетная части.
Умножение · зададим следующим образом
a · b = ab, a · bx =
1
2
(ab)x, ax · bx = D(a)b − aD(b),
для произвольных элементов a, b ∈ Z. Полученную супералгебру будем обозначать как V1/2(Z, D).
Как было отмечено выше, для фиксированного элемента δ из основного поля, под δ-
дифференцированием супералгебры A мы понимаем линейное отображение φ : A → A, которое при
произвольных x, y ∈ A удовлетворяет условию
φ(xy) = δ(φ(x)y + xφ(y)).
2
Под центройдом Γ(A) супералгебры A мы будем понимать множество всех линейных отображений
χ : A → A, при произвольных a, b ∈ A удовлетворяющих условию
χ(ab) = χ(a)b = aχ(b).
Определение 1-дифференцирования совпадает с обычным определением дифференцирования; 0-
дифференцированием является произвольный эндоморфизм φ алгебры A такой, что φ(A2) = 0. Ясно,
что любой элемент центроида супералгебры является 1
2 -дифференцированием.
Ненулевое δ-дифференцирование φ будем считать нетривиальным δ-дифференцированием, если δ 6=
0, 1 и φ /∈ Γ(A).
Под суперпространством мы понимаем Z2-градуированное пространство. Рассматривая пространство
эндоморфизмов End(A) супералгебры A, мы можем задать Z2-градуировку, положив четными отображе-
ния φ, такие, что φ(Ai) ⊆ Ai, а под нечетными подразумевать отображения φ, такие что φ(Ai) ⊆ Ai+1.
Однородный элемент ψ суперпространства End(A) называется супердифференцированием, если для од-
нородных x, y ∈ A0 ∪ A1 выполненно
ψ(xy) = ψ(x)y + (−1)p(x)p(ψ)xψ(y).
Для фиксированного элемента δ ∈ F определим понятие δ-супердифференцирования супералгебры
A = A0 ⊕ A1. Однородное линейное отображение φ : A → A будем называть δ-супердифференцированием,
если для однородных x, y ∈ A0 ∪ A1 выполнено
φ(xy) = δ(φ(x)y + (−1)p(x)p(φ)xφ(y)).
Рассмотрим супералгебру Ли A = A0 ⊕ A1 с умножением [., .] и зафиксируем элемент x ∈ Ai. Тогда
Rx : y → [x, y] является супердифференцированием супералгебры A и его четность p(Rx) = i.
Под суперцентроидом Γs(A) супералгебры A мы будем понимать множество всех однородных линейных
отображений χ : A → A, для произвольных однородных элементов a, b удовлетворяющих условию
χ(ab) = χ(a)b = (−1)p(a)p(χ)aχ(b).
Определение 1-супердифференцирования совпадает с определением обычного супердифференцирова-
ния; 0-супердифференцированием является произвольный эндоморфизм φ супералгебры A такой, что
φ(A2) = 0. Ненулевое δ-супердифференцирование будем считать нетривиальным, если δ 6= 0, 1 и φ /∈ Γs(A).
Легко видеть, что четное δ-супердифференцирование будет являться δ-дифференцированием. Далее
мы будем этим пользоваться дополнительно не отмечая.
§2 δ-дифференцирования и δ-супердифференцирования простых конечномерных
йордановых супералгебр.
В данном параграфе мы рассмотрим δ-дифференцирования и δ-супердифференцирования неуниталь-
ных простых конечномерных йордановых супералгебр над алгебраически замкнутым полем характери-
стики p > 2, т.е. супералгебр K9 над полем характеристики 3 и супералгебры V1/2(Z, D) над полем
характеристики p > 2. В результате, учитывая результаты работ [6, 8], мы будем иметь полное описание
δ-дифференцирований и δ-супердифференцирований простых конечномерных йордановых супералгебр
над алгебраически замкнутым полем характеристики отличной от 2.
Далее через hx, yi обозначим векторное пространство, порожденное векторами x, y.
ЛЕММА 1. Супералгебра K9
супердифференцирований.
не
имеет нетривиальных
δ-дифференцирований
и
δ-
ДОКАЗАТЕЛЬСТВО. Пусть φ (cid:22) нетривиальное δ-дифференцирование супералгебры K9. Легко ви-
деть, что при m ∈ (K9)1 выполнено
Следовательно, учитывая φ(e)1u = 0 и φ(e)1v = 0, имеем φ(e)1 = 0.
0 = φ(me − em) = 2δmφ(e)1.
Рассмотрим ограничение φ на (K9)0. Заметим, что (K9)0 (cid:22) йорданова алгебра билинейной формы, по
2 получаем φ(x)0 = αx, x ∈ (K9)0, α ∈ F, в частности видим φ(e)0 = αe, а при
доказанному в [6], при δ = 1
δ 6= 1
2 имеем φ((K9)0)0 = 0.
3
Если δ 6= 1
2 и m ∈ (K9)1, то
φ(m) = 2φ(em) = 2δeφ(m) = 2δφ(m)0 + δφ(m)1.
Откуда получаем φ(m) = 0 и φ(m1m2) = δφ(m1)m2 + δm1φ(m2) = 0, для произвольных m1, m2 ∈ (K9)1,
что влечет тривиальность φ.
Если δ = 1
2 и m ∈ (K9)1, то 2φ(m) = 4φ(em) = 2eφ(m) + αm, что дает φ(m) = φ(m)0 + αm. Далее
можем считать, что α = 0 и φ(m) = φ(m)0. Заметим, что 0 = φ(m2) = φ(m)m, откуда
φ(w) = αwuw + βwvw, φ(z) = αzuz + βzvz,
φ(u) = αuuz + βuuw, φ(v) = αvvw + βvvz.
φ(uz) = −(φ(u)z + uφ(z)) = βzz − βuu,
Легко видеть, что
откуда
αuuz + βuuw = φ(u) = −φ((uz)w) = (βzz − βuu)w + uz(αwuw + βwvw) = βze − βuuw + 2βwe.
т.е. αu = βu = 0. Аналогично получаем αγ = βγ = 0, при γ ∈ {z, w, u, v}. Таким образом, φ (cid:22) тривиально.
Если φ (cid:22) нечетное δ-супердифференцирование, то легко получить, что
Также видим, что при δ 6= 1
2 верно
φ(e) = δφ(e)e + δeφ(e) = δφ(e) и φ(e) = 0.
φ(a) = φ(ea) = δ
2 φ(a) и φ(m) = 2φ(em) = 2δφ(m),
что нам дает тривиальность φ.
Пусть δ = 1
2 и для q ∈ {u, z, v, w} верно
φ(q) = χqe + αquz + βquw + γqvz + µqvw.
Теперь легко получить
φ(u) = −φ([u, z]w) = φ(uz)w + (uz)φ(w) = −(φ(u)z − uφ(z))w + (uz)φ(w),
φ(u) = φ([u, w]z) = −(φ(uw)z + (uw)φ(z)) = (φ(u)w − uφ(w))z − (uw)φ(z).
Ясно, что (φ(u)w − uφ(w))z − (uw)φ(z) ∈ ζµuvw + he, uw, uz, vwi, ζ = ±1, и −(φ(u)z − uφ(z))w + (uz)φ(w) ∈
he, uw, uz, vwi, то есть µu = 0. Аналогично получаем, что γu = 0. Проводя аналогичные рассуждения для
v, z, w, мы получми, что φ(q) = χqe + yqq, yq ∈ (K9)1.
Легко заметить, что
0 = 2φ(e) = 2φ([z, w]) = φ(z)w − zφ(w) = −χzw + (yzz)w + χwz − z(yww),
а также, что (yzz)w − z(yww) ∈ hu, vi, то есть χz = χw = 0. Аналогично вычисляя, имеем χu = χz = 0.
Далее заметим, что
0 = φ(e) = −φ([u, z][v, w]) = φ(uz)vw + uzφ(vw) =
1
2
((φ(u)z − uφ(z))vw + uz(φ(v)w − vφ(w))) = ζ1βuw + ζ2γzv + ζ3γvz + ζ4βwu,
где ζi принимает значения +1 или −1. Отсюда имеем, что βu = βw = γz = γv = 0.
Осталось отметить, что
0 = −φ(e) = −φ(uv) = φ(u)v − uφ(v) = (αuuz)v − u(µvvw),
что дает µv = αu = 0. Аналогично показываем, что φ(z) = φ(w) = 0. Таким образом, имеем φ (cid:22) триви-
ально. Лемма доказана.
ЛЕММА 2. Пусть V1/2(Z, D) супералгебра над полем характеристики 3, Z (cid:22) ее четная часть, ψ
(cid:22) дифференцирование алгебры Z, связанное c D соотношением ψ(a)D(b) = D(a)ψ(b) для любых a, b ∈ Z.
Тогда существует z ∈ Z, что D(z) (cid:22) обратим и ψ = cD при некотором c ∈ Z.
4
ДОКАЗАТЕЛЬСТВО. Легко заметить, что D(a)ψ = ψ(a)D. Мы покажем, что для некоторого z ∈ Z
элемент D(z) будет обратим, откуда будем иметь ψ = (D(z)−1ψ(z))D, то есть искомое.
Заметим, что D(a3) = 3D(a)a2 = 0. Отсюда, легко получить, что a3Z является D-инвариантным
идеалом в Z. Таким образом, либо a3Z = Z, либо a3Z = 0. Если для проивольного a ∈ Z верно a3Z = Z,
то Z (cid:22) поле. В противном случае, найдется элемент a ∈ Z, такой что a3 = 0. Рассмотрим R = {a ∈ Za3 =
0} 6= 0 (cid:22) идеал в Z, отличный от Z. Пусть I ✁ Z, тогда любой элемент a ∈ I не является обратимым,
и, следовательно, a3 не является обратимым, а также верно a3Z ✁ Z. Учитывая то, что a3Z является D-
инвариантным идеалом, мы получаем a3Z = 0, что влечет a3 = 0 и I ⊆ R. Поэтому, что R (cid:22) наибольший
идеал в Z. Легко понять, что D(R) * R. Иначе бы R был D-инвариантным идеалом и совпадал с Z.
Таким образом, для некоторого z ∈ R верно D(z) /∈ R. Следовательно, D(z) (cid:22) обратим и, автоматически,
доказывает условие леммы.
ЛЕММА 3. Пусть φ (cid:22) нечетное 1
2 -супердифференцирование
супералгебры V1/2(Z, D) над полем характеристики 3, заданное условиями φ(a) = ψ(a)x и φ(ax) = µ(a).
Тогда µ(a) = D(ψ(a)) + aµ(e) и ψ = cD при некотором c ∈ A.
2 -дифференцирование или нечетное 1
ДОКАЗАТЕЛЬСТВО. Заметим, что для произвольных a, b ∈ A выполняется
ψ(ab)x = φ(ab) = 2(φ(a) · b + a · φ(b)) = (ψ(a)b + aψ(b))x,
то есть, ψ (cid:22) дифференцирование A. Также верно, что
2µ(ab) = φ(a · bx) = 2(φ(a) · bx + a · φ(bx)) = 2(ψ(a)x · bx + aµ(b)) = 2D(ψ(a))b − 2ψ(a)D(b) + 2aµ(b),
то есть
что, при b = e, влечет
µ(ab) = D(ψ(a))b − ψ(a)D(b) + aµ(b),
Таким образом, при подстановке (2) в (1), мы имеем
µ(a) = D(ψ(a)) + aµ(e).
D(ψ(ab)) + abµ(e) = D(ψ(a))b − ψ(a)D(b) + aD(ψ(b)) + abµ(e),
что, путем прямых вычислений, нам дает
D(a)ψ(b) = ψ(a)D(b).
(1)
(2)
Откуда, по лемме 2, мы получаем, что ψ = cD, для некоторого c ∈ A. Лемма доказана.
ЛЕММА 4. Пусть φ (cid:22) нетривиальное δ-дифференцирование супералгебры V1/2(Z, D) над полем ха-
рактеристики p 6= 2. Тогда δ = 1
2 и φ(y) = (1 + p(y))z · y для фиксированного z ∈ A \ {F e}.
ДОКАЗАТЕЛЬСТВО. Легко заметить, что φ(e) = 2δφ(e)e = 2δφ(e)0 +δφ(e)1, т.е. либо δ 6= 1
2 и φ(e) = 0,
либо δ = 1
2 и φ(e) ∈ A.
Если mx ∈ M, то
φ(mx) = 2φ(e · mx) = 2δφ(e) · mx + 2δe · φ(mx) = δ(φ(e)m)x + 2δφ(mx)0 + δφ(mx)1.
Откуда видим, что при δ 6= 1
Для произвольного a ∈ A верно
2 будет φ(M ) = 0, а при δ = 1
2 получим φ(mx)1 = (φ(e)m)x.
φ(a) = φ(e · a) = δφ(e) · a + δe · φ(a) = δφ(e) · a + δφ(a)0 +
δ
2
φ(a)1.
Откуда, выполнено одно из условий:
2 , 2 и φ = 0;
1) δ 6= 1
2) δ = 2, p 6= 2, 3 и φ(a) ∈ M ;
3) δ = 1
4) δ = 1
2 , p 6= 2, 3 и φ(a) = φ(e)a;
2 и p = 3.
Покажем, что второй случай не дает нетривиальных 2-дифференцирований. Пусть φ (cid:22) 2-
дифференцирование и φ(a) = φax, тогда
0 = φ(a · x) = 2φ(a) · x = 2φax · x = 2D(φa),
5
откуда, пользуясь тем, что D обнуляет только элементы вида αe, имеем φa = αe.
Заметим, что
φa2 x = φ(a2) = 4φ(a) · a = 2(φaa)x,
т. е. φa = 0 при a ∈ A \ {F e}. Полученное дает тривиальность φ.
Рассмотрим третий случай, т.е. δ = 1
2 и p 6= 2, 3. Ясно, что отображение ψ заданное по правилу
ψ(a) = za, ψ(mx) = (zm)x, для z, a, m ∈ A
(3)
является 1
являться 1
2 -дифференцированием. Поэтому, отображение χ определенное как χ = φ − ψ также будет
2 -дифференцированием. Покажем, что χ = 0.
Легко видеть, что χ(A) = 0 и χ(mx) = φ(mx)0. Заметим, что
0 = 2χ(x · x) = 2χ(x) · x = χ(x)x,
т.е. χ(x) = 0. Следовательно, можем получить χ(ax) = χ(a) · x + a · χ(x) = 0. Откуда, χ (cid:22) тривиально и φ
имеет искомый вид.
Заметим, что для φ, определенного по правилу (3), верно
φ(ax · bx) = φ(D(a)b − aD(b)) = z(D(a)b − aD(b)) = (ax) · ((bz)x) + abD(z) = (ax) · φ(bx) + abD(z).
Откуда видим, что φ будет являться нетривиальным 1
2 -дифференцированием только если D(z) 6=
0, т.е. если z ∈ A \ {F e}. Ясно, что отображение, заданное полученным образом будет также 1
2 -
дифференцированием и над полем характеристики p = 3.
Рассмотрим четвертый случай, т.е. δ = 1
2 и p = 3. В силу того, что отображение, заданное формулами
(3), является 1
2 -дифференцированием данной супералгебры над полем характеристики 3, то мы можем
считать φ(A) ⊆ M, φ(M ) ⊆ A. Положим, что φ(a) = ψ(a)x и φ(ax) = µ(a). По лемме 3, мы получаем, что
ψ = cD, для некоторого c ∈ A.
Для того, чтобы отображение φ, заданное по правилу φ(a) = (cD(a))x, φ(ax) = D(cD(a)) + az для
2 -дифференцированием, нам необходимо проверить выполнение равенства
некоторых c, z ∈ A, являлось 1
Непосредственными вычислениями, имеем
φ(ax · bx) =
1
2
(φ(ax) · bx + ax · φ(bx)).
(cD(D(a)b − aD(b)))x = φ(ax · bx) =
1
2
откуда
(φ(ax) · bx + ax · φ(bx)) = ((D(cD(a)) + az)b)x + (a(D(cD(b)) + bz))x,
acD2(b) = D(c)D(a)b + aD(c)D(b) + 2azb,
что при b = a = e дает z = 0, а при b = e дает D(c)D(a) = 0. Учитывая, что по лемме 2 существует
w ∈ A, что D(w) является обратимым, то D(c) = 0 и c = αe, α ∈ F. Соответственно, получаем равенство
αaD2(b) = 0. Допустим, что α 6= 0, тогда D2(b) = 0. Отсюда получаем, что D(b) = βbe, βb ∈ F. Заметим,
что βb2e = D(b2) = 2D(b)b = 2βbb, то есть βb = 0, что дает D = 0 и противоречение с тем, что D ненулевое
отображение. Таким образом, мы имеем α = 0 и ψ = µ = 0. Лемма доказана.
ЛЕММА 5. Пусть φ (cid:22) нетривиальное нечетное δ-супердифференцирование супералгебры V1/2(Z, D)
над алгебраически замкнутым полем характеристики p 6= 2. Тогда δ = 1
1) если p 6= 3, то φ(A) = 0, φ(ax) = az для некоторого z ∈ A \ {0};
2) если p = 3, то φ(a) = (αD(a))x, φ(ax) = D(αD(a)) + az для некоторых z ∈ A, α ∈ F, таких что
элементы z и α одновременно не обращаются в нуль.
2 и
ДОКАЗАТЕЛЬСТВО. Ясно, что φ(A) ⊆ M и φ(M ) ⊆ A. Легко заметить, что
т.е. φ(e) = 0. Пусть a ∈ A, тогда
φ(e) = 2δφ(e) · e = δφ(e),
φ(a) = φ(e · a) = δeφ(a) =
δ
2
φ(a), φ(ax) = 2φ(e · ax) = 2δe · φ(ax) = 2δφ(ax).
Откуда, выполнено одно из условий:
1) δ = 1
2 , p = 3;
6
2) δ = 1
2 , p 6= 3;
3) δ = 2, p 6= 3;
4) φ = 0.
Третий случай дает φ(M ) = 0 и 0 = φ(a · x) = 2φ(a) · x, то есть φ(A) = 0.
Второй случай дает то φ(A) = 0 и φ(ax) = φa. Тогда
0 = 2φ(ax · bx) = φa · bx − ax · φb,
что влечет φab = aφb, т.е. φa = aφe. Для того, чтобы отображение φ определенное как φ(A) = 0, φ(ax) = za
являлось 1
2 -супердифференцированием, необходимо чтобы выполнялось условие
φ(a · bx) =
1
2
φ((ab)x) =
1
2
abz =
1
2
(0 · bx + a · (bz)) =
1
2
(φ(a) · bx + a · φ(bx)).
Откуда видим, что φ является 1
2 -супердифференцированием. Заметим, что
φ(x · x) = 0 6= −
1
2
zx = −x · φ(x),
т.е. φ является нетривиальным 1
2 -супердифференцированием.
Первый случай, то есть p = 3 и δ = 1
2 , рассмотрим более детально. Положим, что φ(a) = ψ(a)x и
φ(ax) = µ(a). По лемме 3, мы получаем, что ψ = cD, для некоторого c ∈ A.
Для того, чтобы отображение φ, заданное по правилу φ(a) = (cD(a))x, φ(ax) = D(cD(a))+ az для неко-
2 -супердифференцированием, нам необходимо проверить выполнение равенства
торых c, z ∈ A, являлось 1
φ(ax · bx) =
1
2
(φ(ax) · bx − ax · φ(bx)).
Непосредственными вычислениями, имеем
(cD(D(a)b − aD(b))x = φ(ax · bx) =
1
2
(φ(ax) · bx − ax · (bx)) = ((D(cD(a)) + az)b)x − (a(D(cD(b)) + bz))x,
что влечет D(c)(D(a)b − aD(b)) = 0, то есть, при b = e, легко получаем D(c)D(a) = 0. Согласно лемме 2,
существует такой элемент w ∈ A, что D(w) (cid:22) обратим, что влечет D(c) = 0 и по условиям определения
дифференцирования D для алгебры A, заключаем, что c = αe. Легко проверить, что отображение φ,
заданное по правилам
φ(a) = (αD(a))x, φ(ax) = D(αD(a)) + az
для z ∈ A, α ∈ F, является нечетным 1
то
2 -супердифференцированием. Ясно, что если α 6= 0 и a 6= βe, β ∈ F ,
φ(a · e) − a · φ(e) = φ(a) 6= 0,
то есть φ (cid:22) нетривиальное 1
2 -супердифференцирование. Лемма доказана.
Отметим, что леммы 4 и 5 дают примеры новых нетривиальных 1
супердифференцирований, не являющихся операторами правого умножения.
2 -дифференцирований и 1
2 -
Напомним, что в работе [10] были построены новые примеры нетривиальных 1
2 -дифференцирований
для простых унитальных супералгебр векторного типа J(Γ, D), построенных на супералгебрах с тривиаль-
ной нечетной часть. Оказалось, что каждый оператор правого умножения Rz, где D(z) 6= 0, z ∈ Γ являет-
ся нетривиальным 1
2 -дифференцированием, и, в свою очередь, все нетривиальные δ-дифференцирования
данных супералгебр исчерпываются операторами правого умножения данного вида.
ТЕОРЕМА 6. Пусть J (cid:22) простая конечномерная йорданова супералгебра над алгебраически за-
мкнутым полем характеристики p 6= 2, обладающая нетривиальным δ-дифференцированием или δ-
супердифференцированием. Тогда p > 2, δ = 1
2 и либо J = V1/2(Z, D), либо J = J(B(m), D).
ДОКАЗАТЕЛЬСТВО. Отметим, что δ-дифференцирования и δ-супердифференцирования простых ко-
нечномерных йордановых супералгебр над алгебраически замкнутым полем характеристики нуль пол-
ностью описаны в работах И. Б. Кайгородова [6, 8]. Там было показано отсутствие нетривиальных δ-
дифференцирований и δ-супердифференцирований для данных супералгебр. Согласно работе И. Б. Кай-
городова и В. Н. Желябина [10], нетривиальные δ-(супер)дифференцирования на простых унитальных
конечномерных йордановых супералгебрах над алгебраически замкнутым полем характеристики p > 2
7
возможны только в случае δ = 1
2 и супералгебры векторного типа J(B(m), D). Согласно работе Е. Зель-
манова [17] простые неунитальные конечномерные йордановы супералгебры над алгебраически замкну-
тым полем характеристики p > 2 исчерпываются супералгебрами вида K3, V1/2(Z, D), супералгеброй
K9 в характеристике 3. Для супералгебры Капланского K3 результаты об отсутствии нетривиальных δ-
дифференцирований и δ-супердифференцирований справедливы из работ И. Б. Кайгородова [6, 8] вне
зависимости от характеристики поля. Лемма 1 показывает, что супералгебра K9 не обладает нетриви-
альными δ-дифференцированиями и δ-супердифференцированиями. Леммы 4-5 дают примеры нетриви-
альных δ-дифференцирований и δ-супердифференцирований супералгебры V1/2(Z, D), которые возможны
только в случае δ = 1
2 . Учитывая приведенные пояснения, теорема доказана.
§3 δ-дифференцирования и δ-супердифференцирования полупростых конечномерных
йордановых супералгебр.
В
данном
параграфе
мы
δ-
супердифференцирований полупростых конечномерных йордановых супералгебр над алгебраически
замкнутым полем характеристики отличной от 2. В частности, мы покажем отсутствие нетривиаль-
ных δ-дифференцирований и δ-супердифференцирований на полупростых конечномерных йордановых
супералгебрах над алгебраически замкнутым полем характеристики нуль.
δ-дифференцирований
описание
получим
полное
и
Под супералгеброй с неделителем нуля, мы будем подразумевать супералгебру A для которой суще-
ствует элемент a, что из равенства ax = 0 для некоторого элемента x ∈ A, следует x = 0. Примером таких
супералгебр могут являться унитальные супералгебры, супералгебры K9, V1/2(Z, D) и др.
ЛЕММА 7. Пусть φ (cid:22) δ-дифференцирование или δ-супердифференцирование супералгебры A, причем
A = A1 ⊕ A2, где Ai (cid:22) супералгебры с однородным неделителем нуля. Тогда φ(Ai) ⊆ Ai.
ДОКАЗАТЕЛЬСТВО. Пусть ei (cid:22) однородный неделитель нуля супералгебры Ai, а xi произвольный
элемент Ai. Тогда
0 = φ(eixj) = δ(φ(ei)xj + (−1)p(ei)p(φ)eiφ(xj )) = δφ(ei)jxj + (−1)p(ei)p(φ)δeiφ(xj )i.
Откуда получаем eiφ(xj )i = 0 и φ(xj )i = 0, что влечет φ(Aj ) ⊆ Aj. Лемма доказана.
Пусть Ji неунитальная супералгебра, удовлетворяющая условиям:
i) алгебра (Ji)0 имеет единицу ei;
ii) для любого элемента z ∈ (Ji)1 верно 2ei · z = z.
Примерами таких супералгебр являются супералгебры K9, K3 и V1/2(Z, D).
Тогда справедлива
ЛЕММА 8. Супералгебра J = J1 ⊕ . . . ⊕ Jn + F · 1 не имеет нетривиальных δ-дифференцирований и
δ-супердифференцирований.
ДОКАЗАТЕЛЬСТВО. Пусть φ (cid:22) нетривиальное δ-дифференцирование или δ-супердифференциро-
вание. Согласно [6], унитальные супералгебры могут иметь нетривиальные δ-дифференцирования и δ-
супердифференцирования только при δ = 1
2 . Рассмотрим случай n = 1, то есть J = J1 + F · 1 и e (cid:22)
единица алгебры (J1)0, тогда φ(1) = α · 1 + j0 + j1, где ji ∈ (J1)i. Отметим, что
2αe + 2j0 +
1
2
j1 = 2(φ(1) · e) · e = φ(e) · e + e · φ(e) = 2φ(e) = 2φ(1) · e = 2αe + 2j0 + j1,
следовательно φ(1) = α · 1 + j0. Заметим, что для x ∈ (J1)1 верно
αx + j0 · x = φ(x) = 2φ(e · x) = φ(e) · x + e · φ(x) =
1
2
αx + j0 · x +
1
2
αx +
1
2
j0 · x,
откуда j0 = 0. Что влечет тривиальность φ в случае n = 1. В общем случае, рассматривая подсупералгебры
Ii = Ji +F ·1, получим тривиальность ограничения φ на этих подсупералгебрах, что влечет тривиальность
φ на всей супералгебре J. Лемма доказана.
Согласно работе Е. Земальнова [17], если J полупростая конечномерная йорданова супералгебра над
i=1(Ji1 ⊕. . .⊕Jiri +Ki ·1)⊕J1 ⊕. . .⊕Jt,
алгебраически замкнутым полем F характеристики p 6= 2, то J = Ls
8
где J1, . . . , Jt (cid:22) простые йордановы супералгебры, K1, . . . , Ks (cid:22) расширения поля F и Ji1, . . . , Jiri (cid:22) про-
стые неунитальные йордановы супералгебры над полем Ki. Воспользовавнись этим результатом, лем-
мами 7-8 и работами [6, 8], где было показано отсутствие нетривиальных δ-дифференцирований и δ-
супердифференцирований у простых конечномерных йордановых супералгебр над алгебраически замкну-
тым полем характеристики нуль, мы можем получить теорему
ТЕОРЕМА 9. Полупростая конечномерная йорданова супералгебра над алгебраически за-
мкнутым полем характеристики нуль не имеет нетривиальных δ-дифференцирований и δ-
супердифференцирований.
Пользуясь результатами работы Е. Зельманова [17], леммами 7-8 и теоремой 6 мы можем получить
следующую теорему
ТЕОРЕМА 10. Пусть полупростая конечномерная йорданова супералгебра J над алгебраиче-
ски замкнутым полем характеристики p > 2 имеет нетривиальное δ-дифференцирование или δ-
супердифференцирование. Тогда δ = 1
2 и J = J ∗ ⊕ J∗, где либо J∗ = J(B(m), D), либо J∗ = V1/2(Z, D).
В заключение, автор выражает благодарность В. Н. Желябину за внимание к работе и предложенное
доказательство леммы 2.
9
Список литературы
[1] Hopkins N. C., Generalizes Derivations of Nonassociative Algebras, Nova J. Math. Game Theory Algebra
5 (1996), №3, 215 -- 224.
[2] Филиппов В. Т., Об алгебрах Ли, удовлетворяющих тождеству 5-ой степени, Алгебра и логика, 34
(1995), №6, 681 -- 705.
[3] Филиппов В. Т., О δ-дифференцированиях алгебр Ли, Сиб. матем. ж. 39 (1998), №6, 1409 -- 1422.
[4] Филиппов В. Т., О δ-дифференцированиях первичных алгебр Ли, Сиб. матем. ж. 40 (1999), №1, 201 --
213.
[5] Филиппов В. Т., О δ-дифференцированиях первичных альтернативных и мальцевских алгебр, Ал-
гебра и Логика 39 (2000), №5, 618 -- 625.
[6] Кайгородов И. Б., О δ-дифференцированиях простых конечномерных йордановых супералгебр, Алгеб-
ра и логика 46 (2007), №5, 585 -- 605. [ http://arxiv.org/abs/1010.2419 ]
[7] Кайгородов И. Б., О δ-дифференцированиях классических супералгебр Ли, Сиб. матем. ж. 50 (2009),
№3, 547 -- 565. [ http://arxiv.org/abs/1010.2807 ]
[8] Кайгородов И. Б., О δ-супердифференцированиях простых конечномерных йордановых и лиевых су-
пералгебр, Алгебра и логика 49 (2010), №2, 195 -- 215. [ http://arxiv.org/abs/1010.2423 ]
[9] Кайгородов И. Б., Об обобщенном дубле Кантора, Вестник Самарского гос. университета 78 (2010),
№4, 42 -- 50. [ http://arxiv.org/abs/1101.5212 ]
[10] Желябин В. Н., Кайгородов И. Б., О δ-супердифференцированиях простых супералгебр йордановой
скобки, Алгебра и анализ 23 (2011), №4, 40 -- 58.
[11] Zusmanovich P., On δ-derivations of Lie algebras and superalgebras, J. of Algebra 324 (2010), №12, 3470 --
3486. [ http://arxiv.org/abs/0907.2034 ]
[12] Кайгородов И. Б., О δ-дифференцированиях алгебр и супералгебр, "Проблемы теоретической и при-
кладной математики Труды 41-ой Всероссийской молодежной школы-конференции, 29 -- 33. URL:
http://home.imm.uran.ru/digas/School-2010_A5.pdf
[13] Кантор И. Л., Йордановы и лиевы супералгебры, определяемые алгеброй Пуассона, Алгебра и анализ,
Томск, изд-во ТГУ (1989), 89 -- 126.
[14] Kac V. G., Сlassification of simple Z-graded Lie superalgebras and simple Jordan superalgebras, Comm.
Algebra 13 (1977), 1375 -- 1400.
[15] Racine M. L., Zelmanov E. I., Simple Jordan superalgebras with semisimple even part, J. of Algebra 270
(2003), №2, 374 -- 444.
[16] Martines C., Zelmanov E., Simple finite-dimensional Jordan superalgebras of prime characteristic, J. of
Algebra 236 (2001), №2, 575 -- 629.
[17] Zelmanov E., Semisimple finite dimensional Jordan superalgebras, (English) [A] Fong, Yuen (ed.) et al., Lie
algebras, rings and related topics. Papers of the 2nd Tainan-Moscow international algebra workshop '97,
Tainan, Taiwan, January 11 -- 17, 1997. Hong Kong: Springer (2000), 227 -- 243.
10
|
1611.01340 | 1 | 1611 | 2016-11-04T11:50:04 | Derivation Hom-Lie 2-algebras and non-abelian extensions of Hom-Lie algebras | [
"math.RA"
] | In this paper, we introduce the notion of a derivation of a Hom-Lie algebra and construct the corresponding strict Hom-Lie 2-algebra, which is called the derivation Hom-Lie 2-algebra. As applications, we study non-abelian extensions of Hom-Lie algebras. We show that iso- morphism classes of diagonal non-abelian extensions of a Hom-Lie algebra g by a Hom-Lie algebra h are in one-to-one correspondence with homotopy classes of morphisms from g to the derivation Hom-Lie 2-algebra DER(h). | math.RA | math |
Derivation Hom-Lie 2-algebras and non-abelian extensions of
Hom-Lie algebras ∗
Lina Song and Rong Tang
Department of Mathematics, Jilin University,
Changchun 130012, Jilin, China
Email: [email protected], [email protected]
Abstract
In this paper, we introduce the notion of a derivation of a Hom-Lie algebra and construct
the corresponding strict Hom-Lie 2-algebra, which is called the derivation Hom-Lie 2-algebra.
As applications, we study non-abelian extensions of Hom-Lie algebras. We show that iso-
morphism classes of diagonal non-abelian extensions of a Hom-Lie algebra g by a Hom-Lie
algebra h are in one-to-one correspondence with homotopy classes of morphisms from g to the
derivation Hom-Lie 2-algebra DER(h).
1
Introduction
The notion of a Hom-Lie algebra was introduced by Hartwig, Larsson, and Silvestrov in [9] as part
of a study of deformations of the Witt and the Virasoro algebras. In a Hom-Lie algebra, the Jacobi
identity is twisted by a linear map, called the Hom-Jacobi identity. Some q-deformations of the
Witt and the Virasoro algebras have the structure of a Hom-Lie algebra [9, 11]. Because of close
relation to discrete and deformed vector fields and differential calculus [9, 13, 14], more people
pay special attention to this algebraic structure. In particular, representations and deformations
of Hom-Lie algebras were studied in [3, 17, 19]; Extensions of Hom-Lie algebras were studied in
[6, 13]. Geometric generalization of Hom-Lie algebras was given in [16]; Quantization of Hom-Lie
algebras was studied in [22] and integration of Hom-Lie algebras was studied in [15].
Now higher categorical structures are very important due to connections with string theory [5].
One way to provide higher categorical structures is by categorifying existing mathematical concepts.
A Lie 2-algebra is the categorification of a Lie algebra [4]. The Jacobi identity in a Lie 2-algebra
is replaced by a natural transformation, called the Jacobiator, which also satisfies a coherence law
of its own. A very important example is the derivation Lie 2-algebra DER(k) = (k
−→ Der(k), l2)
associated to a Lie algebra k, where l2 is given by
ad
l2(D1, D2) = D1 ◦ D2 − D2 ◦ D1,
l2(D, u) = −l2(u, D) = D(u),
∀D, D1, D2 ∈ Der(k), u ∈ k.
0Keyword: Hom-Lie algebras, derivations, non-abelian extensions, Hom-Lie 2-algebras
0MSC: 17B40, 17B70, 18D35.
∗Research supported by NSFC (11471139) and NSF of Jilin Province (20140520054JH).
1
In [18], a non-abelian extension of a Lie algebra g by a Lie algebra h is explained by a Lie 2-algebra
morphism from g to the derivation Lie 2-algebra DER(h). The notion of a Hom-Lie 2-algebra,
which is the categorification of a Hom-Lie algebra, was given in [20].
In this paper, we give the notion of a derivation of a Hom-Lie algebra (g, [·, ·]g, φg). The set
of derivations Der(g) is a Hom-Lie subalgebra of the Hom-Lie algebra (gl(g), [·, ·]φg , Adφg) which
was given in [21]. We prove that the set of outer derivation Out(g) is exactly the first cohomology
group H1(g, ad) of the Hom-Lie algebra g with the coefficient in the adjoint representation. Then
we construct the derivation Hom-Lie 2-algebra DER(g). As applications, we study non-abelian
extensions of Hom-Lie algebras. Parallel to the case of Lie algebras, we characterize a diagonal
non-abelian extension of a Hom-Lie algebra g by a Hom-Lie algebra h using a Hom-Lie 2-algebra
morphism from g to the derivation Hom-Lie 2-algebra DER(h).
The paper is organized as follows.
In Section 2, we recall some basic notions of Hom-Lie
algebras, representations of Hom-Lie algebras and their cohomologies, Hom-Lie 2-algebras and
morphisms between Hom-Lie 2-algebras. In Section 3, we give the notion of a derivation of a Hom-
Lie algebra and construct the associated derivation Hom-Lie 2-algebra. In Section 4, we study
diagonal non-abelian extensions of Hom-Lie algebras and use Hom-Lie 2-algebra morphisms to
characterize them. In Section 5, we give a discussion on some other ways to characterize diagonal
non-abelian extensions of Hom-Lie algebras.
2 Preliminaries
In this section, we recall some basic notions of Hom-Lie algebras, representations of Hom-Lie
algebras and their cohomologies, Hom-Lie 2-algebras and morphisms between Hom-Lie 2-algebras.
Moreover, we give the notion of a 2-morphism between two morphisms of Hom-Lie 2-algebras.
2.1 Hom-Lie algebras and their representations
Definition 2.1.
(1) A (multiplicative) Hom-Lie algebra is a triple (g, [·, ·]g, φg) consisting of a
vector space g, a skew-symmetric bilinear map (bracket) [·, ·]g : ∧2g −→ g and a linear map
φg : g → g preserving the bracket, such that the following Hom-Jacobi identity with respect
to φg is satisfied:
[φg(x), [y, z]g]g + [φg(y), [z, x]g]g + [φg(z), [x, y]g]g = 0.
(1)
(2) A Hom-Lie algebra is called a regular Hom-Lie algebra if φg is an algebra automorphism.
In the sequel, we always assume that φg is an algebra automorphism.
Definition 2.2. A morphism of Hom-Lie algebras f : (g, [·, ·]g, φg) → (h, [·, ·]h, φh) is a linear
map f : g → h such that
f [x, y]g = [f (x), f (y)]h, ∀x, y ∈ g,
f ◦ φg = φh ◦ f.
(2)
(3)
Definition 2.3. A representation of a Hom-Lie algebra(g, [·, ·]g, φg) on a vector space V with
respect to β ∈ gl(V ) is a linear map ρ : g → gl(V ) such that for all x, y ∈ g, the following
equalities are satisfied:
ρ(φg(x)) ◦ β = β ◦ ρ(x),
ρ([x, y]g) ◦ β = ρ(φg(x)) ◦ ρ(y) − ρ(φg(y)) ◦ ρ(x).
(4)
(5)
2
We denote a representation by (ρ, V, β). For all x ∈ g, we define adx : g → g by
adx(y) = [x, y]g,
∀y ∈ g.
(6)
Then ad : g −→ gl(g) is a representation of the Hom-Lie algebra (g, [·, ·]g, φg) on g with respect to
φg, which is called the adjoint representation.
Let (ρ, V, β) be a representation. The cohomology of the Hom-Lie algebra (g, [·, ·]g, φg) with
the coefficient in V is the cohomology of the cochain complex C k(g, V ) = Hom(∧kg, V ) with the
coboundary operator d : C k(g, V ) → C k+1(g, V ) defined by
(df )(x1, · · · , xk+1) = Pk+1
g xi, φ−2
+Pi<j(−1)i+j βf ([φ−2
i=1 (−1)i+1ρ(xi)(f (φ−1
g xj ]g, φ−1
g x1, · · · ,
g x1, · · · ,
\
φ−1
g xi, · · · ,
\
φ−1
g xi, · · · , φ−1
\
φ−1
g xj , · · · , φ−1
g xk+1))
g xk+1).
The fact that d2 = 0 is proved in [7]. Denote by Z k(g; ρ) and Bk(g; ρ) the sets of k-cocycles and
k-coboundaries respectively. We define the k-th cohomolgy group Hk(g; ρ) to be Z k(g; ρ)/Bk(g; ρ).
Let (ad, g, φg) be the adjoint representation. For any 0-hom-cochain x ∈ g = C0(g, g), we have
(dx)(y) = [y, x]g, for all y ∈ g. Thus, we have dx = 0 if and only if x ∈ Cen(g), where Cen(g)
denotes the center of g. Therefore, we have
H0(g, ad) = Z 0(g, ad) = Cen(g).
We will analyze the first cohomology group after we introduce the notion of a derivation of a
Hom-Lie algebra.
Let V be a vector space, and β ∈ GL(V ). Define a skew-symmetric bilinear bracket operation
[·, ·]β : ∧2gl(V ) −→ gl(V ) by
[A, B]β = β ◦ A ◦ β−1 ◦ B ◦ β−1 − β ◦ B ◦ β−1 ◦ A ◦ β−1, ∀A, B ∈ gl(V ).
Denote by Adβ : gl(V ) → gl(V ) the adjoint action on gl(V ), i.e.
Adβ(A) = β ◦ A ◦ β−1.
(7)
(8)
Proposition 2.4. ([21, Proposition 4.1]) With the above notations, (gl(V ), [·, ·]β , Adβ) is a regular
Hom-Lie algebra.
This Hom-Lie algebra plays an important role in the representation theory of Hom-Lie algebras.
See [21] for more details.
2.2 Hom-Lie 2-algebras
Definition 2.5. ([20, Definition 3.6]) A Hom-Lie 2-algebra V consists of the following data:
• a complex of vector spaces V1
d−→ V0,
• bilinear maps l2 : Vi × Vj −→ Vi+j , where 0 ≤ i + j ≤ 1,
• two linear transformations φ0 ∈ gl(V0), φ1 ∈ gl(V1) satisfying φ0 ◦ d = d ◦ φ1,
• a skew-symmetric trilinear map l3 : V0 × V0 × V0 −→ V1 satisfying l3 ◦ φ⊗3
0 = φ1 ◦ l3, such
that for all w, x, y, z ∈ V0 and m, n ∈ V1, the following equalities are satisfied:
3
(a) l2(x, y) = −l2(y, x),
l2(x, m) = −l2(m, x),
(b) dl2(x, m) = l2(x, dm),
l2(dm, n) = l2(m, dn),
(c) φ0(l2(x, y)) = l2(φ0(x), φ0(y)), φ1(l2(x, m)) = l2(φ0(x), φ1(m)),
(d) dl3(x, y, z) = l2(φ0(x), l2(y, z)) + l2(φ0(y), l2(z, x)) + l2(φ0(z), l2(x, y)),
(e) l3(x, y, dm) = l2(φ0(x), l2(y, m)) + l2(φ0(y), l2(m, x)) + l2(φ1(m), l2(x, y)),
(f) l3(l2(w, x), φ0(y), φ0(z)) + l2(l3(w, x, z), φ2
+ l3(l2(w, z), φ0(x), φ0(y)) = l2(l3(w, x, y), φ2
+l3(φ0(w), l2(x, y), φ0(z))+l2(φ2
0(y)) + l3(φ0(w), l2(x, z), φ0(y))
0(z)) + l3(l2(w, y), φ0(x), φ0(z))
0(w), l3(x, y, z))+l2(l3(w, y, z), φ2
0(x))+l3(φ0(w), l2(y, z), φ0(x)).
We usually denote a Hom-Lie 2-algebra by (V1, V0, d, l2, l3, φ0, φ1) or simply by V. A Hom-Lie
2-algebra is called strict if l3 = 0. If φ0 and φ1 are identity maps, we obtain the notion of a Lie
2-algebra [4].
Definition 2.6. Let V and V ′ be Hom-Lie 2-algebras, a morphism f from V to V ′ consists of:
• a chain map f : V → V ′, which consists of linear maps f0 : V0 → V ′
0 and f1 : V1 → V ′
1
satisfying
and
f0 ◦ d = d′ ◦ f1,
f0 ◦ φ0 = φ′
0 ◦ f0, f1 ◦ φ1 = φ′
1 ◦ f1.
• a skew-symmetric bilinear map f2 : V0 × V0 → V ′
such that for all x, y, z ∈ V0 and m, n ∈ V1, we have
1 satisfying f2(φ0(x), φ0(y)) = φ′
1f2(x, y)
• df2(x, y) = f0(l2(x, y)) − l′
2(f0(x), f0(y)),
• f2(x, dm) = f1(l2(x, m)) − l′
2(f0(x), f1(m)),
• l′
2(f0(φ0(x)), f2(y, z)) + l′
= f2(l2(x, y), φ0(z)) + f2(l2(y, z), φ0(x)) + f2(l2(z, x), φ0(y)) + f1(l3(x, y, z)).
2(f0(φ0(z)), f2(x, y)) + l′
2(f0(φ0(y)), f2(z, x)) + l′
3(f0(x), f0(y), f0(z))
Definition 2.7.
(1) Let V and V ′ be Hom-Lie 2-algebras and let f, g : V → V ′ be morphisms
from V to V ′. A 2-morphism τ from f to g is a chain homotopy τ : f =⇒ g such that the
following equations hold for all x, y ∈ V0 :
φ′
1(τ (x)) = τ (φ0(x)),
f2(x, y) − g2(x, y) = l′
2(τ (x), f0(y)) + l′
2(g0(x), τ (y)) − τ (l2(x, y)).
(2) Two morphisms bewteen Hom-Lie 2-algebras are called homotopic if there is a 2-morphism
between them.
4
3 Derivations of a Hom-Lie algebra and the associated deriva-
tion Hom-Lie 2-algebra
In this section, we introduce the notion of a derivation of a Hom-Lie 2-algebra and give its coho-
mological characterization. Then we construct a strict Hom-Lie 2-algebra using derivations of a
Hom-Lie algebra, which is called the derivation Hom-Lie 2-algebra.
Definition 3.1. A linear map D : g → g is called a derivation of a Hom-Lie algebra (g, [·, ·]g, φg)
if
D[x, y]g = [φg(x), (Ad
φ−1
g
D)(y)]g + [(Ad
φ−1
g
D)(x), φg(y)]g, ∀x, y ∈ g.
(9)
Denote by Der(g) the set of derivations of the Hom-Lie algebra (g, [·, ·]g, φg).
Remark 3.2. The notion of an α-derivation was given in [19] under an extra condition D ◦ φg =
φg ◦ D. Under this condition, Adφg D = D, and it follows that our derivation is the same as
the one given in [19]. So our definition of a derivation of a Hom-Lie algebra is more general
than the one given in [19]. We will show that the set of derivations is a Hom-Lie subalgebra of
the Hom-Lie algebra (gl(g), [·, ·]φg , Adφg) given in Proposition 2.4 and the first cohomology group
of a Hom-Lie algebra with the coefficient in the adjoint representation is exactly the set of outer
derivations. These facts show that our definition of a derivation of a Hom-Lie algebra is more
meaningful. More importantly, we can construct a Hom-Lie 2-algebra using the derivations, by
which we characterize nonabelian extensions of Hom-Lie algebras.
Lemma 3.3. For all D ∈ Der(g), we have AdφgD ∈ Der(g).
Proof. By (8) and (9), we have
(AdφgD)[x, y]g = (φg ◦ D ◦ φ−1
g x, φ−1
g y]g
g D(y)]g + φg[φ−1
g )[x, y]g = (φg ◦ D)[φ−1
g D(x), y]g
(AdφgD)(cid:1)(y)]g + [(cid:0)Ad
φ−1
g
= φg[x, φ−1
= [φgx,(cid:0)Ad
φ−1
g
(AdφgD)(cid:1)(x), φgy]g.
Thus, Adφg D ∈ Der(g).
Consider the Hom-Lie bracket [·, ·]φg on gl(g) defined by (7), we have
Lemma 3.4. For all D, D′ ∈ Der(g), we have [D, D′]φg ∈ Der(g).
Proof. For all x, y ∈ g, by (7) and (9) we have
[D, D′]φg ([x, y]g) = (φg ◦ D ◦ φ−1
= (φg ◦ D ◦ φ−1
= (φg ◦ D ◦ φ−1
g ◦ D′ ◦ φ−1
g ◦ D′)([φ−1
g )([x, φ−1
g − φg ◦ D′ ◦ φ−1
g x, φ−1
g ◦ D ◦ φ−1
g y]g) − (φg ◦ D′ ◦ φ−1
g )([x, y]g)
g ◦ D)([φ−1
g (D′(y))]g) + (φg ◦ D ◦ φ−1
g )([φ−1
g x, φ−1
g (D′(x)), y]g)
g y]g)
−(φg ◦ D′ ◦ φ−1
g )([x, φ−1
g (D(y))]g) − (φg ◦ D′ ◦ φ−1
g )([φ−1
g (D(x)), y]g)
5
g (D′(x)), φ−1
g y]g)
g (D(x)), φ−1
g (y)]g)
= (φg ◦ D)([φ−1
g x, φ−2
g (D′(y))]g) + (φg ◦ D)([φ−2
−(φg ◦ D′)([φ−1
g (D(φ−1
g (D′(x)), φ−1
= φg[x, φ−1
+φg[φ−1
−φg[x, φ−1
−φg[φ−1
g (D′(φ−1
= [φg(x), (D ◦ φ−1
g (D′(φ−1
g (x), φ−2
g (D′(y))))]g + φg[φ−1
g (D(y))]g) − (φg ◦ D′)([φ−2
g (D(x)), φ−1
g (D′(y))]g
g (D(y))]g + φg[φ−1
g (D(y))))]g − φg[φ−1
g (D(x)))), y]g − φg[φ−1
g ◦ D′ − D′ ◦ φ−1
g ◦ D)(y)]g
g (D(φ−1
g (D′(x)), φ−1
g (D(x)), φ−1
g (D′(x)))), y]g
g (D(y))]g
g (D′(y))]g
+[(D ◦ φ−1
g ◦ D′ − D′ ◦ φ−1
g ◦ D)(x), φg(y)]g
= [φg(x), (Ad−1
φg
[D, D′]φg)(y)]g + [(Ad−1
φg
[D, D′]φg)(x), φg(y)]g.
Therefore, we have [D, D′]φg ∈ Der(g).
Proposition 3.5. With the above notations, (Der(g), [·, ·]g, Adφg) is a Hom-Lie algebra, which is
a sub-algebra of the Hom-Lie algebra (gl(g), [·, ·]φg , Adφg) given in Proposition 2.4.
Proof. By Lemma 3.3 and 3.4, (Der(g), [·, ·]g, Adφg) is a Hom-Lie subalgebra of the Hom-Lie algebra
(gl(g), [·, ·]φg , Adφg).
For all x ∈ g, adx is a derivation of the Hom-Lie algebra (g, [·, ·]g, φg), which we call an inner
derivation. This follows from
adx[y, z]g = [x, [y, z]g]g = [φg(φ−1
g x), [y, z]g]g
= [[φ−1
= [φ−1
= [(Ad
g x, y]g, φg(z)]g + [φg(y), [φ−1
g [x, φg(y)]g, φg(z)]g + [φg(y), φ−1
adx)(y), φg(z)]g + [φg(y), (Ad
g x, z]g]g
φ−1
g
g [x, φg(z)]g]g
adx)(z)]g .
φ−1
g
Denote by Inn(g) the set of inner derivations of the Hom-Lie algebra (g, [·, ·]g, φg), i.e.
Lemma 3.6. Let (g, [·, ·]g, φg) be a Hom-Lie algebra. For all x ∈ g and D ∈ Der(g), we have
Inn(g) = {adx x ∈ g}.
(10)
Adφg
adx = adφg(x),
[D, adx]φg = adD(x).
Therefore, Inn(g) is an ideal of the Hom-Lie algebra (Der(g), [·, ·]g, Adφg ).
Proof. For all x, y ∈ g, by (8), we have
(Adφg
adx)(y) = (φg ◦ adx ◦ φ−1
g )(y) = (φg ◦ adx)(φ−1
g (y)) = φg[x, φ−1
g (y))]g = [φg(x), y]g
= adφg(x)(y).
g ◦ adx ◦ φ−1
g [x, φ−1
g )(y) − (φg ◦ adx ◦ φ−1
g ◦ D ◦ φ−1
g (y)))
g )(D(φ−1
g )(y)
g (y)]g) − (φg ◦ adx ◦ φ−1
g (y)]g) − φg[x, φ−1
D)(φ−2
g (y))]g + [(Ad
g D(φ−1
g (y))]g
D)(φ−1
φ−1
g
g (x)), φ−1
g (y)]g(cid:17) − [φg(x), D(φ−1
g (y))]g
By (9), we have
[D, adx]φg(y) = (φg ◦ D ◦ φ−1
= (φg ◦ D)(φ−1
= φg(D[φ−1
= φg(cid:16)[x, (Ad
= [D(x), y]g
= adD(x)(y).
φ−1
g
g x, φ−2
6
Therefore, we have Adφg
adx = adφg(x) and [D, adx]φg = adD(x). The proof is finished.
Denote by Out(g) the set of out derivations of the Hom-Lie algebra (g, [·, ·]g, φg), i.e.
Out(g) = Der(g)/Inn(g).
(11)
Proposition 3.7. Let (g, [·, ·]g, φg) be a Hom-Lie algebra. We have
H1(g, ad) = Out(g).
Proof. For any f ∈ C1(g, g), we have
(df )(x1, x2) = [x1, f (φ−1
g x2)]g − [x2, f (φ−1
g x1)]g − φgf ([φ−2
g x1, φ−2
g x2]g).
Therefore, the set of 1-cocycles Z 1(g, ad) is given by
f ([φ−2
g x1, φ−2
g x2]g) = [φ−1
g x1, φ−1
g f (φ−1
g x2)]g + [φ−1
g f (φ−1
g x1), φ−1
= [φg(φ−2
g x1), (Ad
f )(φ−2
g x2)]g + [(Ad
φ−1
g
φ−1
g
Thus, we have Z 1(g, ad) = Der(g).
Furthermore, the set of 1-coboundaries B1(g, ad) is given by
dx = [·, x]g = ad−x,
g x2]g
f )(φ−2
g x1), φg(φ−2
g x2)]g.
for some x ∈ g. Therefore, we have B1(g, ad) = Inn(g), which implies that H1(g, ad) = Out(g).
At the end of this section, we construct a strict Hom-Lie 2-algebra using derivations of a Hom-
Lie algebra. We call this strict Hom-Lie 2-algebra the derivation Hom-Lie 2-algebra. It plays
an important role in our later study of nonabelian extensions of Hom-Lie algebras.
Let (h, [·, ·]h, φh) be a Hom-Lie algebra. Consider the complex h
ad
−→ Der(h), where h is of
degree 1 and Der(h) is of degree 0. Define l2 by
l2(D1, D2) = [D1, D2]φh , ∀D1, D2 ∈ Der(h),
l2(D, u) = −l2(u, D) = D(u), ∀D ∈ Der(h), u ∈ h.
(12)
(13)
Theorem 3.8. With the above notations, (h, Der(h), d = ad, l2, φ0 = Adφh , φ1 = φh) is a strict
Hom-Lie 2-algebra.
We denote this strict Hom-Lie 2-algebra by DER(h).
Proof. First we show that the condition φ0 ◦ d = d ◦ φ1 holds. It follows from
φ0(d(u))(v) = (Adφh(adu))(v) = (φh ◦ adu ◦ φ−1
h )(v) = [φh(u), v]h,
and
d(φ1(u))(v) = d(φh(u))(v) = adφh(u)(v) = [φh(u), v]h.
Condition (a) in Definition 2.5 holds obviously.
For all D ∈ Der(h) and u ∈ h, we have
d(l2(D, u))(v) = d(D(u))(v) = adD(u)(v) = [D(u), v]h.
7
By Lemma 3.6, we have
l2(D, du)(v) = [D, adu]φh(v) = [D(u), v]h = d(l2(D, u))(v).
(14)
For all u, v ∈ h, we have
l2(du, v) = l2(adu, v) = [u, v]h = −[v, u]h = −l2(adv, u) = l2(u, adv) = l2(u, dv).
(15)
By (14) and (15), we deduce that Condition (b) holds.
Conditions (c) and (d) follow from the fact that (Der(h), [·, ·]h, φ0 = Adφh) is a Hom-Lie algebra.
Condition (e) follows from
l2(φ0(D1), l2(D2, u)) + l2(φ0(D2), l2(u, D1)) + l2(φ1(u), l2(D1, D2))
= l2(Adφh(D1), D2(u)) + l2(Adφh(D2), −D1(u)) + l2(φh(u), [D1, D2]φh )
= (φh ◦ D1 ◦ φ−1
h )(D2(u)) − (φh ◦ D2 ◦ φ−1
h )(D1(u))
+l2(φh(u), φh ◦ D1 ◦ φ−1
h ◦ D2 ◦ φ−1
h − φh ◦ D2 ◦ φ−1
h ◦ D1 ◦ φ−1
h ) = 0.
Since l3 = 0, Condition (f) holds naturally. The proof is finished.
4 Non-abelian extensions of Hom-Lie algebras
In this section, we characterize diagonal non-abelian extensions of Hom-Lie algebras by Hom-Lie 2-
algebra morphisms from a Hom-Lie algebra (viewed as a trival Hom-Lie 2-algebra) to the derivation
Hom-Lie 2-algebra constructed in the last section.
Definition 4.1. A non-abelian extension of a Hom-Lie algebra (g, [·, ·]g, φg) by a Hom-Lie algebra
(h, [·, ·]h, φh) is a commutative diagram with rows being short exact sequence of Hom-Lie algebra
morphisms:
0 −−−−→ h
ι−−−−→ g
−−−−→ g −−−−→ 0
φhy
0 −−−−→ h
φgy
ι−−−−→ g
where (g, [·, ·]g, φg) is a Hom-Lie algebra.
p
p
φgy
−−−−→ g −−−−→ 0,
We can regard h as a subspace of g and φgh = φh. Thus, h is an invariant subspace of φg. We
say that an extension is diagonal if g has an invariant subspace X of φg such that h ⊕ X = g. In
general, g does not always have an invariant subspace X of φg such that h ⊕ X = g. For example,
the matrix representation of φg is a Jordan block. We only study diagonal non-abelian extensions
in the sequel.
Definition 4.2. Two extensions of g by h, (g1, [·, ·]g1 , φg1) and (g2, [·, ·]g2 , φg2 ), are said to be
isomorphic if there exists a Hom-Lie algebra morphism θ : g2 → g1 such that we have the following
commutative diagram:
0 −−−−→ h
ι2−−−−→ g2
p2−−−−→ g −−−−→ 0
(cid:13)(cid:13)(cid:13)
0 −−−−→ h
θy
ι1−−−−→ g1
(cid:13)(cid:13)(cid:13)
p1−−−−→ g −−−−→ 0.
8
Proposition 4.3. Let (g1, [·, ·]g1 , φg1 ) and (g2, [·, ·]g2 , φg2 ) be two isomorphic extensions of a Hom-
Lie algebra (g, [·, ·]g, φg) by a Hom-Lie algebra (h, [·, ·]h, φh). Then g1 is a diagonal non-abelian
extension if and only if g2 is also a diagonal non-abelian extension.
Proof. Let g2 be a diagonal non-abelian extension. Then it has an invariant subspace X of φg2
such that h ⊕ X = g2. Since θ is a Hom-Lie algebra morphism, for all u ∈ X, we have
φg1 (θu) = θ(φg2 u).
Therefore, θ(X) is an invariant subspace of φg1 . Moreover, we have h ⊕ θ(X) = g1. Thus, g1 is a
diagonal non-abelian extension.
A section of an extension g of g by h is a linear map s : g −→ g such that p ◦ i = Id.
Lemma 4.4. A Hom-Lie algebra (g, [·, ·]g, φg) is a diagonal non-abelian extension of a Hom-Lie
algebra (g, [·, ·]g, φg) by a Hom-Lie algebra (h, [·, ·]h, φh) if and only if there is a section s : g → g
such that
φg ◦ s = s ◦ φg.
(16)
A section s : g → g of g is called diagonal if (16) is satisfied.
Proof. Let g be a diagonal non-abelian extension of g by h. Then g has an invariant subspace X
of φg such that h ⊕ X = g. By the exactness, we have pX : X → g is a linear isomorphism. Thus
we have a section s = p−1
X : g → g, such that s(g) = X and p ◦ s = Id. Since p is a Hom-Lie
algebra morphism, we have
Thus, we have φg(s(x)) − s(φg(x)) ∈ h. Moreover, since X is an invariant subspace of φg, we have
p(cid:0)φg(s(x)) − s(φg(x))(cid:1) = 0,
∀x ∈ g.
which implies that
φg(s(x)) − s(φg(x)) ∈ X,
φg(s(x)) − s(φg(x)) ∈ h ∩ X = {0}.
Therefore, φg(s(x)) = sφg(x).
Conversely, let s : g −→ g be a section such that
φg(s(x)) = s(φg(x)),
∀x ∈ g.
Then s(g) is an invariant subspace of φg. By the exactness, we have h ⊕ s(g) = g. Hence, the
extension is diagonal.
Let (g, [·, ·]g, φg) be a diagonal extension of a Hom-Lie algebra (g, [·, ·]g, φg) by a Hom-Lie
algebra (h, [·, ·]h, φh) and s : g → g a diagonal section. Define linear maps ω : g ∧ g → h and
ρ : g → gl(h) respectively by
ω(x, y) = [s(x), s(y)]g − s[x, y]g, ∀x, y ∈ g,
ρx(u) = [s(x), u]g, ∀x ∈ g, u ∈ h.
(17)
(18)
9
Obviously, g is isomorphic to g ⊕ h as vector spaces. Transfer the Hom-Lie algebra structure on g
to that on g ⊕ h, we obtain a Hom-Lie algebra (g ⊕ h, [·, ·](ρ,ω), φ), where [·, ·](ρ,ω) and φ are given
by
[x + u, y + v](ρ,ω) = [x, y]g + ω(x, y) + ρx(v) − ρy(u) + [u, v]h,
φ(x + u) = φg(x) + φh(u).
(19)
(20)
The following proposition gives the conditions on ρ and ω such that (g⊕ h, [·, ·](ρ,ω), φ) is a Hom-Lie
algebra.
Proposition 4.5. With the above notations, (g ⊕ h, [·, ·](ρ,ω), φ) is a Hom-Lie algebra if and only
if ρ and ω satisfy the following equalities:
(21)
(22)
(23)
(24)
(25)
φh ◦ ω = ω ◦ φ⊗2
g ,
φh ◦ ρx = ρφg(x) ◦ φh,
ρx([u, v]h) = [φh(u), (Ad
[ρx, ρy]φh − ρ[x,y]g = adω(x,y),
φ−1
h
ρx)(v)]h + [(Ad
φ−1
h
ρx)(u), φh(v)]h,
ρφg(x)(ω(y, z)) + c.p. = ω([x, y]g, φg(z)) + c.p..
Proof. If (g ⊕ h, [·, ·](ρ,ω), φ) is a Hom-Lie algebra. By
φ([x + u, y + v](ρ,ω)) = [φ(x + u), φ(y + v)](ρ,ω),
we deduce that (21) and (22) holds. By (22) and
[[u, v](ρ,ω), φ(x)](ρ,ω) + [[v, x](ρ,ω), φ(u)](ρ,ω) + [[x, u](ρ,ω), φ(v)](ρ,ω) = 0,
we deduce that (23) holds. By (22) and
[[u, x](ρ,ω), φ(y)](ρ,ω) + [[x, y](ρ,ω), φ(u)](ρ,ω) + [[y, u](ρ,ω), φ(x)](ρ,ω) = 0,
we deduce that (24) holds. By
[[x, y](ρ,ω), φ(z)](ρ,ω) + [[y, z](ρ,ω), φ(x)](ρ,ω) + [[z, x](ρ,ω), φ(y)](ρ,ω) = 0,
we deduce that (25) holds.
Conversely, if (21)-(25) hold, it is straightforward to see that (g ⊕ h, [·, ·](ω,ρ), φ) is a Hom-Lie
algebra. The proof is finished.
Remark 4.6. Note that (23) implies that ρx ∈ Der(h).
Obviously, we have
Corollary 4.7. If ρ and ω satisfy Eqs. (21)-(25), the Hom-Lie algebra (g ⊕ h, [·, ·](ρ,ω), φ) is a
diagonal non-abelian extension of g by h.
For any diagonal nonabelian extensions, by choosing a diagonal section, it is isomorphic to
(g ⊕ h, [·, ·](ρ,ω), φ). Therefore, we only consider diagonal nonabelian extensions of the form (g ⊕
h, [·, ·](ρ,ω), φ) in the sequel.
10
Theorem 4.8. Let g = (g ⊕ h, [·, ·](ρ,ω), φ) be a diagonal non-abelian extension of g by h. Then,
(ρ, ω) give rise to a Hom-Lie 2-algebra morphism f = (f0, f1, f2) from g to the derivation Hom-Lie
2-algebra DER(h) given in Theorem 3.8, where f0, f1, f2 are given by
f0(x) = ρx,
f1 = 0,
f2(x, y) = −ω(x, y),
∀x, y ∈ g.
Conversely, for any morphism f = (f0, f1, f2) from g to DER(h), there is a diagonal non-abelian
extension (g ⊕ h, [·, ·](ρ,ω), φ) of g by h, where ρ and ω are given by
ρx = f0(x), ω(x, y) = −f2(x, y),
∀x, y ∈ g.
Proof. Let g = (g ⊕ h, [·, ·](ρ,ω), φ) be a diagonal non-abelian extension of g by h. By (23),
ρx ∈ Der(h) for all x ∈ g. By (21) and (22), we have
f0(φg(x)) = ρφg(x) = φh ◦ ρx ◦ φ−1
f2(φg(x), φg(y)) = −ω(φg(x), φg(y)) = φh(−ω(x, y)) = φh(f2(x, y)).
h = Adφh(ρx) = Adφh(f0(x)),
By (24), we have
df2(x, y) = ad−ω(x,y) = ρ[x,y]g − [ρx, ρx]φh = f0([x, y]g) − [f0(x), f0(y)]φh .
By (25), we have
l′
2(f0(φg(x)), f2(y, z)) + c.p. = ρφg(x)(−ω(x, y)) + c.p.
= −ω([x, y]g, φg(z)) + c.p.
= f2([x, y]g, φg(z)) + c.p..
Thus, (f0, f1, f2) is a morphism from g to the derivation Hom-Lie 2-algebra DER(h).
The converse part is easy to be checked. The proof is finished.
Theorem 4.9. The isomorphism classes of diagonal non-abelian extensions of g by h are in one-
to-one correspondence with the homotopy classes of Hom-Lie 2-algebra morphisms from g to the
derivation Hom-Lie 2-algebra DER(h).
Proof. Let (g ⊕ h, [·, ·](ω1,ρ1), φ) and (g ⊕ h, [·, ·](ω2,ρ2), φ) be diagonal non-abelian extensions of g
by h. By Theorem 4.8, we have two Hom-Lie 2-algebra morphisms from g to the strict Hom-Lie
2-algebra DER(h), given by
g = (g0 = ρ1, g1 = 0, g2 = −ω1),
f = (f0 = ρ2, f1 = 0, f2 = −ω2).
Assume that the two extensions are isomorphic. Then there is a Hom-Lie algebra morphism
θ : g ⊕ h → g ⊕ h, such that we have the following commutative diagram:
0 −−−−→ h
ι−−−−→ g ⊕ h(ρ2,ω2)
pr
−−−−→ g −−−−→ 0
(cid:13)(cid:13)(cid:13)
0 −−−−→ h
θy
ι−−−−→ g ⊕ h(ρ1,ω1)
(cid:13)(cid:13)(cid:13)
pr
−−−−→ g −−−−→ 0,
where pr is the projection. Since for all x ∈ g, pr(θ(x)) = x, we can assume that θ(x + u) =
x − ϕθ(x) + u for some linear map ϕθ : g → h. By θ ◦ φ = φ ◦ θ, we get
φh ◦ ϕθ = ϕθ ◦ φg.
(26)
11
By θ[x + u, y + v](ρ2,ω2) = [θ(x + u), θ(y + v)](ρ1,ω1), we get
ρ1
x − ρ2
x = adϕθ(x),
ω1(x, y) − ω2(x, y) = ρ2
x(ϕθ(y)) − ρ2
y(ϕθ(x)) + [ϕθ(x), ϕθ(y)]h − ϕθ([x, y]g).
(27)
(28)
We define the chain homotopy τ : f =⇒ g by τ (x) = ϕθ(x). Since
g0(x) − f0(x) = ρ1
x − ρ2
x = adϕθ(x) = d(τ (x)),
the above definition is well-defined. We go on to prove that τ is a 2-morphism from f to g. For
all x ∈ g, obviously, we have
φh(τ (x)) = φh(ϕθ(x)) = ϕθ(φg(x)) = τ (φg(x)).
By (28), we have
f2(x, y) − g2(x, y) = (cid:0) − ω2(x, y)(cid:1) − (cid:0) − ω1(x, y)(cid:1) = ω1(x, y) − ω2(x, y)
x(ϕθ(y)) − ρ2
x, ϕθ(y)) − l2(ρ2
y(ϕθ(x)) + [ϕθ(x), ϕθ(y)]h − ϕθ([x, y]g)
= ρ2
= l2(ρ2
= l2(f0(x), τ (y)) − l2(f0(y), τ (x)) + l2(d(τ (x)), τ (y)) − τ ([x, y]g)
= l2(f0(x) + d(τ (x)), τ (y)) + l2(τ (x), f0(y)) − τ ([x, y]g)
= l2(g0(x), τ (y)) + l2(τ (x), f0(y)) − τ ([x, y]g).
y, ϕθ(x)) + l2(adτ (x), τ (y)) − τ ([x, y]g)
Thus, τ is a 2-morphism from f to g, which implies that f and g are homotopic Hom-Lie 2-
algebra morphisms. Therefore, isomorphic diagonal non-abelian extensions of g by h correspond
to homotopic Hom-Lie 2-algebra morphisms from g to the derivation Hom-Lie 2-algebra DER(h).
Conversely, let g = (g0, g1 = 0, g2) and f = (f0, f1 = 0, f2) be homotopic morphisms from g
to the derivation Hom-Lie 2-algebra DER(h). By Theorem 4.8, we have two diagonal non-abelian
extensions (g⊕h, [·, ·](g0 ,−g2), φ) and (g⊕h, [·, ·](f0 ,−f2), φ) of g by h. Assume that τ is a 2-morphism
from f to g. We define θ : g ⊕ h → g ⊕ h by
θ(x + u) = x − τ (x) + u.
It is straightforward that θ is a Hom-Lie algebra morphism making the diagram in Definition 4.2
commutative. Therefore, (g ⊕ h, [·, ·](g0 ,−g2), φ) and (g ⊕ h, [·, ·](f0 ,−f2), φ) are isomorphic diagonal
extensions of g by h. Thus, homotopic Hom-Lie 2-algebra morphisms from g to the derivation
Hom-Lie 2-algebra DER(h) correspond to isomorphic diagonal non-abelian extensions of g by h.
This finishes the proof.
5 Outlook
There are several ways to study non-abelian extensions of Lie algebras. The authors classified
non-abelian extensions of Lie algebras using the second non-abelian cohomology group [12]. One
can also use outer derivations to study non-abelian extensions of Lie algebras and characterize the
existence of a non-abelian extension using a cohomological class [1, 2, 10]. Furthermore, one can
also use Maurer-Cartan elements to describe non-abelian extensions [8]. In the sequel, we give
a sketch on how to generalize these ways to study diagonal non-abelian extensions of Hom-Lie
12
algebras. In all, we think that the most nontrivial part is defining the notion of a derivation of
a Hom-Lie algebra and constructing the associated derivation Hom-Lie 2-algebra. Thus, we only
study diagonal non-abelian extensions of Hom-Lie algebras using the derivation Hom-Lie 2-algebra
in detail in this paper and omit details of other ways.
For non-abelian extensions of Hom-Lie algebras, we can define a non-abelian 2-cocycle using
Eqs. (21)-(25). Namely, a pair (ρ, ω) is called a nonabelian 2-cocycle if Eqs. (21)-(25) are satisfied.
We can further define an equivalence relation using Eqs. (26)-(28), i.e. two nonabelian 2-cocycles
(ρ1, ω1) and (ρ2, ω2) are equivalent if Eqs. (26)-(28) are satisfied. Then we obtain the second
nonabelian cohomology group, by which we can classify diagonal non-abelian extensions of Hom-
Lie algebras.
By (22)-(24), we deduce that the pair (ρ, ω) give rise to a Hom-Lie algebra morphism ¯ρ : g −→
Out(h), where ¯ρ = π ◦ ρ and π is the quotient map in the following exact sequence:
0 −→ Inn(h) −→ Der(h) π−→ Out(h) −→ 0.
(29)
Note that Der(h) is a non-abelian extension of Out(h) by Inn(h). We have another abelian extension
of Hom-Lie algebras:
0 −→ Cen(h) −→ h
ad
−→ Inn(h) −→ 0.
(30)
Under the assumption that both (29) and (30) are diagonal non-abelian extensions, for any Hom-Lie
algebra morphism ¯ρ : g −→ Out(h), the existence of a diagonal non-abelian extension that inducing
the morphism ¯ρ can be characterized by a condition on a cohomological class in H3(g, Cen(h)).
For a differential graded Hom-Lie algebra (DGHLA for short) (L, [·, ·]L, φL, d), the set M C(L)
of Maurer-Cartan elements is defined by
M C(L)
△
= {α ∈ L1 dα +
1
2
[α, α]L = 0, φLα = α}.
Let (g, [·, ·]g, φg) be a Hom-Lie algebra. Then (C(g, g) = ⊕kC k(g, g), [·, ·]φg , Adφg) is a graded
Hom-Lie algebra, where [·, ·]φg and Adφg are given by
[P, Q]φg = P ◦ Q − (−1)pqQ ◦ P, ∀P ∈ C p+1(g, g), Q ∈ C q+1(g, g),
(AdφgP )(x1, · · · , xp+1) = φg(P (φ−1
g xp+1)), ∀P ∈ C p+1(g, g),
g x1, · · · , φ−1
in which C k(g, g) = Hom(∧kg, g) and P ◦ Q ∈ C p+q+1(g, g) is defined by
P ◦ Q(x1, · · · , xp+q+1) =
X
(−1)σ
σ∈(q+1,p)−unshuffles
φgP(cid:16)φ−1
g Q(φ−1
g xσ(1), · · · , φ−1
g xσ(q+1)), φ−1
g xσ(q+2), · · · , φ−1
g xσ(p+q+1)(cid:17).
(31)
(32)
(33)
(34)
Furthermore (C(g, g), [·, ·]φg , Adφg, ∂) is a DGHLA, where ∂P = (−1)k+1[µg, P ]φg for all P ∈
C k(g, g) and µg is the Hom-Lie bracket on g, i.e. µg(x, y) = [x, y]g. See [7] for more details.
Let (g, [·, ·]g, φg) and (h, [·, ·]h, φh) be two Hom-Lie algebras. Let g ⊕ h be the Hom-Lie algebra
direct sum of g and h, where the bracket is defined by [x + u, y + v] = [x, y]g + [u, v]h, and the
algebra morphism φ is defined by φ(x + u) = φg(x) + φh(u). Then there is a DGHLA (C(g ⊕
h, g ⊕ h), [·, ·], Adφ, ∂), where ∂P = (−1)k+1[µg + µh, P ]φ for all P ∈ C k(g ⊕ h, g ⊕ h). Define
C k
>(g ⊕ h, h) ⊂ C k(g ⊕ h, h) by
C k(g ⊕ h, h) = C k
>(g ⊕ h, h) ⊕ C k(h, h).
13
Denote by C>(g⊕h, h) = ⊕kC k
>(g⊕h, h). It is straightforward to see that (C>(g⊕h, h), [·, ·]φ, Adφ, ∂)
is a sub-DGHLA of (C(g⊕h, g⊕h), [·, ·]φ, Adφ, ∂). We denote by (L, [·, ·]φ, Adφ, ∂) this sub-DGHLA,
where Lk = C k+1
>(g⊕h, h) = Hom(g, h) is abelian. Then it
is straightforward to check that (ρ, ω) satisfy Eqs. (21)-(25), i.e. (ρ, ω) give rise to a diagonal non-
abelian extension if and only if ρ + ω is a Maurer-Cartan element in the DGHLA (L, [·, ·]φ, Adφ, ∂).
> (g⊕h, h). Obviously, its degree 0 part C0
References
[1] D. Alekseevsky, P. W. Michor and W. Ruppert, Extensions of Lie algebras.
arXiv:math.DG/0005042.
[2] D. Alekseevsky, P. W. Michor and W. Ruppert, Extensions of super Lie algebras. J. Lie
Theory (2005) 15(1): 125-134.
[3] F. Ammar, Z. Ejbehi and A. Makhlouf, Cohomology and Deformations of Hom-algebras. J.
Lie Theory 21 (2011), no. 4, 813-836.
[4] J. Baez and A. S. Crans, Higher-Dimensional Algebra VI: Lie 2-Algebras, Theory and Appl.
Categ. 12 (2004), 492-528.
[5] J. C. Baez, A. E. Hoffnung, and C. L. Rogers, Categorified symplectic geometry and the
classical string, Comm. Math. Phys., 293(3) (2010), 701-725.
[6] J. M. Casas, M. A. Insua and N. Pacheco, On universal central extensions of Hom-Lie algebras.
Hacet. J. Math. Stat. 44 (2015), no. 2, 277-288.
[7] L. Cai and Y. Sheng, Hom-big brackets: theories and applications. SIGMA. 12 (2016), 014.
[8] Y. Frégier, Non-abelian cohomology of extensions of Lie algebras as Deligne groupoid. J.
Algebra. 398 (2014), 243 -- 257.
[9] J. Hartwig, D. Larsson and S. Silvestrov, Deformations of Lie algebras using σ-derivations.
J. Algebra 295 (2006), 314-361.
[10] N. K. Hermann, Non-abelian extensions of topological Lie algebras. Comm. Algebra. 34
(2006), no. 3, 991 -- 1041.
[11] N. Hu, q-Witt algebras, q-Lie algebras, q-holomorph structure and representations. Algebra
Colloq. 6 (1999), no. 1, 51-70.
[12] N. Inassaridze, E. Khmaladze and M. Ladra, Non-abelian cohomology and extensions of Lie
algebras. J. Lie Theory. 18 (2008), no. 2, 413 -- 432.
[13] D. Larsson and S. Silvestrov, Quasi-hom-Lie algebras, central extensions and 2-cocycle-like
identities. J. Algebra 288 (2005), 321-344.
[14] D. Larsson and S. Silvestrov, Quasi-Lie algebras. Contemp. Math. 391 (2005), 241-248.
[15] C. Laurent-Gengoux, A. Makhlouf and J. Teles, Universal algebra of a Hom-Lie algebra and
group-like elements. arXiv:1505.02439.
[16] C. Laurent-Gengoux and J. Teles, Hom-Lie algebroids. J. Geom. Phys. 68 (2013), 69-75.
14
[17] A. Makhlouf and S. Silvestrov, Notes on Formal Deformations of Hom-associative and Hom-
Lie Algebras. Forum Math. 22 (2010), no. 4, 715-739.
[18] Y. Sheng and C. Zhu, Integration of Lie 2-algebras and their morphisms. Lett. Math. Phys.
102 (2012), no. 2, 223 -- 244.
[19] Y. Sheng, Representations of Hom-Lie algebras. Algebr. Represent. Theory. 15 (2012), no. 6,
1081-1098.
[20] Y. Sheng and D. Chen, Hom-Lie 2-algebras. J. Algebra. 376 (2013), 174-195.
[21] Y. Sheng and Z. Xiong, On hom-Lie algebras. Linear Multilinear Algebra. 63 (2015), No. 12,
2379-2395.
[22] D. Yau, Hom-quantum groups: I. Quasi-triangular Hom-bialgebras. J. Phys. A 45 (2012),
no. 6, 065203, 23 pp.
15
|
1312.3756 | 1 | 1312 | 2013-12-13T10:17:08 | Arithmetical pseudo-valuations associated to Dubrovin valuation rings and prime divisors of bounded Krull domains | [
"math.RA"
] | We look at value functions of primes in simple Artinian rings and associate arithmetical pseudo-valuations to Dubrovin valuation rings which, in the Noetherian case, are $\mathbb{Z}$-valued. This allows a divisor theory for bounded Krull domains. | math.RA | math |
Arithmetical pseudo-valuations associated to Dubrovin
valuation rings and prime divisors of bounded Krull
domains
F. Van Oystaeyen and N. Verhulst
Universiteit Antwerpen
Department of mathematics & computer science
Middelheimlaan 1
2020 Antwerpen, Belgium
Abstract
We look at value functions of primes in simple Artinian rings and associate arith-
metical pseudo-valuations to Dubrovin valuation rings which, in the Noetherian case,
are Z-valued. This allows a divisor theory for bounded Krull domains.
1
Introduction
Primes in simple Artinian rings, introduced by Van Oystaeyen and Van Geel, replace
noncommutative valuation rings in skewfield. However, the value functions associated
to primes have only been studied in skewfields and arithmetical pseudo-valuations
have been studied only for orders containing an order with a commutative semigroup
of fractional ideals.
First we consider primes (R, P ) where R is a Goldie ring with a simple Artinian
quotient ring and such that R is invariant under inner A-automorphisms (this is a
property of valuation rings in skewfields). We obtain an arithmetical pseudo-valuation
(we will abbreviate this to apv) v ∶ F(R) → Γ where F(R) is the partially ordered
semigroup of fractional ideals of R and Γ is a totally ordered semigroup. We charac-
terize the rings for which Γ is a group and establish that if Γ is an Archimedean group,
R is a Dubrovin valuation. If ⋂ P n = 0, where P = J(R) is the Jacobson radical of R,
is added to the assumptions on R, then A is a skewfield and R is a valuation ring of A.
Next we look at Noetherian Dubrovin valuation rings and establish an apv v ∶
F(R) → Γ where Γ is totally ordered such that P = {a ∈ A v(RaR) > 0} and R =
{a ∈ A v(RaR) ≥ 0}. The case of non-Noetherian Dubrovin valuations allows P = P 2
and then v cannot exist (since v(P ) = 0 would follow and then v(I) = 0 for all I ∈ F(R)).
The condition ⋂ P n = 0 is enough to characterize Dubrovin valuation rings coming from
an apv in the well-described way. We may call these the valued Dubrovin rings. Our
results establish that Noetherian Dubrovin valuations define a Z-valued apv with all
1
the nice properties and so these are good generalizations of discrete valuation rings in
skewfields. In the final section we establish that bounded Krull domains have a divisor
theory based on those apvs.
2 Stable fractional primes
A prime in a ring R is a subring R′ with a prime ideal P ⊂ R′ such that for any x, y in
R, xR′y ⊆ P implies either x ∈ P or y ∈ P . A prime (P, R′) is called localized if for any
r ∈ R ∖ R′, there exist x, y ∈ R′ ∖ {0} with xry ∈ R′ ∖ P . A prime (P, R′) in a ring R is
called strict fractional if for any r ≠ 0 in R there exist x, y ∈ R′ with 0 ≠ xry ∈ R′, e.g.
any localized prime is strict fractional. We refer the interested reader to [1] for much
more information about primes.
Proposition 2.1. Let (P, R′) be a strict fractional prime in a simple Artinian ring A.
If R is any semisimple Artinian subring of A and R ≠ A, then R′ is not contained in
R.
Proof. Assume R′ ⊆ R and pick a ∈ A ∖ R. Since R is Noetherian, we may choose L
maximal for the property that Lay ⊆ R for some y ∈ R. Since R is semisimple Artinian,
we have R = L ⊕ U where U is a left ideal and uay ∉ R for every u ∈ U (otherwise
(L + Ru)ay ⊆ R entails u ∈ L which is a contradiction). There exist x′, y′ ∈ R′ with
0 ≠ x′uayy′ ∈ R′ ⊆ R. Since L is maximal for the property that Layy′ ⊆ R, it follows
that x′u ∈ L but x′u ∈ U , so x′u = 0 contradicting x′uayy′ ≠ 0.
A ring is said to be a Goldie ring is the set of regular elements satisfies the Ore
condition and S−1R is a semisimple Artinian ring.
Proposition 2.2. If (P, R′) is a strict fractional prime in a simple Artinian ring and
R′ is a Goldie ring, then S−1R′ = A where S is the set of regular elements in R′.
Proof. Let r ∈ S, then r is regular in A because if ru = 0 then u ∈ A ∖ R′ so there
exist x, y ∈ R′ with 0 ≠ xuy ∈ R′. Since S satisfies the Ore condition, there are x′ ∈ R′
and r′ ∈ S with r′x = x′r so r′xuy = x′ruy = 0 hence xuy = 0 which is a contradiction.
Since A is simple Artinian, r−1 ∈ A so S is invertible in A and R′ ↪ A extends to
S−1R′ ↪ A. Since S−1R′ is semisimple Artinian, the preceding proposition implies
that S−1R′ = A.
Remark 2.3. If R is a Goldie prime ring and I is an essential left ideal of R then I
is generated by the regular elements of I. (See [3].)
Consider a strict fractional prime (P, R) of a simple Artinian ring A with R = AP ,
i.e. R = {a ∈ A aP ⊆ P and P a ⊆ P }. We always assume that R is Goldie hence a
prime ring and an order of A (by proposition 2.2).
If P is invariant under innner
automorphisms of A, we say that (P, R) is an invariant prime of A.
Remark 2.4. If (R, P ) is an invariant prime in A, then R is invariant under inner
automorphisms of A.
Proof. Consider u ∈ A∗. For p ∈ P we have uRu−1p = uRu−1puu−1 and u−1pu ∈ P so
Ru−1pu ⊆ P and uRu−1p ⊆ uP u−1 ⊆ P . Hence uRu−1P ⊆ P which implies uRu−1 ⊆ R.
A similar reasoning gives P uRu−1 ⊆ R.
2
By a fractional R-ideal of A we mean an R-bimodule I ⊆ A such that I contains
a regular element of R and for some r ∈ R, rI ⊆ R. Observe that we may choose r
regular since R is an order. We will denote the set of fractional ideals of R by F(R).
Lemma 2.5. With assumptions as before, we have:
(1) If u is regular and uI ⊆ R then Iu ⊆ R. Also: uI ⊆ P if and only if Iu ⊆ P .
(2) If I, J ∈ F(R), then IJ ⊆ P if and only if J I ⊆ P .
(3) If I, J ∈ F(R) then IJ ⊆ R implies J I ⊆ R and vice versa. Moreover, if J ⊈ P
then I ⊆ R and if P ⊉ I ⊆ R then J ⊆ R.
Proof. (1) If uI ⊆ R, then Iu ⊆ u−1Ru = R. The other case is similar.
(2) If IJ ⊆ P then, since (P, R) is a prime, either I or J is in P , say I ⊆ P . Since I
is an ideal it is left essential so it is generated by regular elements. For every regular
element u ∈ I uJ ⊆ P yields J u ⊆ u−1P u = P , hence J I ⊆ P . The case I ⊈ P and J ⊆ P
is similar.
(3) Suppose I, J ∈ F(R) such that IJ ⊆ R.
If I, J ⊆ P there is nothing to prove
since then IJ ⊆ P and J I ⊆ P , so assume J ⊈ P (I ⊈ P is completely similar). From
P IJ ⊆ P we obtain then P I ⊆ P since (P, R) is a prime of A, so I ⊆ AP = R. Again, I
is generated by regular elements since it is left essential and for u ∈ I regular uJ ⊆ R
gives J u ⊆ u−1Ru = R hence J I ⊆ R.
Corollary 2.6. P is the unique maximal ideal of R.
Proof. Consider an ideal I ⊈ P and a regular element u of R which is in I but not in P
(this exists since I is generated by regular elements). Then Ru = RuR ≠ R so u−1 ∉ R.
From Ru−1RuR = R with RuR ⊈ P we obtain Ru−1R ⊆ R which is a contradiction.
Note that we really showed that every regular element in R ∖ P is invertible in R.
Corollary 2.7. If C(P ) = {x ∈ R x mod P regular in R~P } satisfies the Ore condi-
tion then it is invertible in R, i.e. QP (R) = R or R is local and P is the Jacobson
radical of R.
Proof. If C(P ) is an Ore set in the prime Goldie ring R which is also an order in a
simple Artinian ring A, then C(P ) consists of regular elements and since C(P ) ⊆ R ∖ P
it consists of invertible elements of R. Consequently, the localization of R at C(R) is
equal to R. It then follows that P is the Jacobson radical of R.
Proposition 2.8. If ⋂ P n = 0 then C(P ) satisifes the Ore condition.
Proof. We claim that 1 + P consists of units. Indeed, consider 1 + p with p ∈ P and
assume it is not regular, then r(1 + p) = 0 for some 0 ≠ r ∈ R. Then r = −rp yields
r ∈ ⋂ P n hence r = 0 which is a contradiction. If c ∈ C(P ) then c is regular in R~P . We
have that P + Rc is essential in R since it contains P hence it is generated by regular
elements. Since Ru = RuR for regular u, it follows that P + Rc is a two-sideed ideal of
R, hence P + Rc = R and Rc = R i.e. c is invertible. Then there is an u ∈ R with uc = 1
which means uc ∈ 1+ P . If rc = 0 then uru−1uc = 0 which would contradict the fact that
all elements of 1 + P are units. Consequently, C(P ) consists of R-regular elements. For
every r ∈ R and c ∈ C(P ) we have cr = crc−1c = r′c which gives the left Ore condition
and also rc = cc−1rc = cr′ which gives the right Ore condition. Therefore C(P ) is an
Ore set.
3
Corollary 2.9. If ⋂ P n = 0 then C(P ) is invertible in R and R is local with Jacobson
radical P .
Corollary 2.10. R~P is a skewfield.
Proof. If a ∈ R~P is not invertible then it is not regular (cfr. the proof of proposition
2.8), say as = 0. Let a = a mod P and s = s mod P , then sa ∈ P implies (Rs+P )a ⊆ P .
Furthermore, Rs + P is two-sided and it contains P strictly so Rs + P = R. This means
that Ra ⊆ P so a = 0.
Proposition 2.11. Under assumptions as before, the left ideals of R are totally ordered
and every finitely generated left ideal is generated by one regular element.
Proof. Suppose xy ∈ P with either x or y regular in A. We suppose without loss of
generality that x is regular, so it is invertible in A. We find xRy = xRx−1xy = Rxy ⊆ P
so since (R, P ) is prime, x or y must be in P . Consider now x regular (hence invertible)
in A ∖ R. Since x ∉ R, there must be a p ∈ P with xp ∉ P (or px ∉ P in which case we
argue similarly). Then we have Rx−1xp ⊆ P so x−1 ∈ P since it is A-regular. Consider
now a finitely generated left ideal I in R. By [3], it is generated by R-regular elements
so it is generated by a finite number of R-regular elements say I = Ru1 + ⋯+ Run. Since
R is Goldie, every R-regular element is A-regular, so by the preceding statements either
u1u−1
1 must be in R. Suppose the latter (again, in the other case we argue
similarly), then Ru2 = Ru2u−1
1 u1 ⊆ Ru1 which means that Ru1 + Ru2 = Ru1. By
induction we find that every finitely generated left ideal is principal and in fact even
principal for a regular element. This in turn implies that the finitely generated left
ideals are totally ordered by inclusion. Suppose now that I and J are left R-ideals with
J ⊈ I. There must be a regular x ∈ J ∖ I and for every y ∈ I we have either yx−1 ∈ R
which would imply y ∈ xR ⊆ J or xy−1 ∈ R but this is contradictory since it means
x ∈ Ry ⊆ I.
2 or u2u−1
Corollary 2.12. Since every left ideal generated by a regular element is two-sided,
every finitely generated left ideal is two-sided.
3 Arithmetical pseudo-valuations
An arithmetical pseudovaluation on R as before is a function v ∶ F(R) → Γ for some
partially ordered semigroup Γ such that:
(APV1) v(IJ) = v(I) + v(J);
(APV2) v(I + J) ≥ min {v(I), v(J)};
(APV3) v(R) = 0;
(APV4) I ⊆ J implies v(I) ≥ v(J).
For more information about airthmetical pseudo-valuations, we refer to [1] and [2].
Theorem 3.1. If (R, P ) is as before then there is an arithmetical pseudo-valuation v ∶
F(R) → Γ, where Γ is a totally ordered semigroup, such that P = {a ∈ A v(RaR) > 0}
and R = {a ∈ A v(RaR) ≥ 0}.
4
Proof. Observe that for any I, J ∈ F(R) we have IJ ∈ F(R) and I +J ∈ F(R), moreover
for every a ∈ A we have RaR ∈ F(R). Indeed, if a ∈ A then there is a regular u ∈ R
such that ua ∈ R since R is an order, then RuaR = RuRaR ⊆ RaR and as an R-ideal,
RuaR contains a regular element of R. If I and J are in F(R) then IJ contains a
regular element and if uI ⊆ R and vJ ⊆ R for regular u and v then J v ⊆ R so uIJ v ⊆ R
whence vuIJ ⊆ vRv−1 = R with vu regular. For I + J we have vu(I + J) ⊆ R + vuJ with
vuJ = vuv−1vJ ⊆ R since vuv−1 ∈ R.
For any I ∈ F(R) we define v(I) = (P ∶ I) = {a ∈ A aI ⊆ P } and since RaRI ⊆ P if
and only if IRaR ⊆ P this is also equal to v(I) = {a ∈ A Ia ⊆ P }. Note that v(I) ≠ {0}
because uI ⊆ R for some regular u ∈ R, hence 0 ≠ P u ⊆ v(I). We also have v(R) = P .
Put Γ = {v(I) I ∈ F(R)} and define a partial order ≤ by
v(I) ≤ v(J) ⇔ v(I) ⊆ v(J).
Note that if I ⊆ J then v(I) ≥ v(J). We claim that Γ is in fact totally ordered. Indeed,
if I, J ∈ F(R) such that v(I) ⊈ v(J) and v(J) ⊈ v(I) then there is an a ∈ A with aI ⊆ P
but aJ ⊈ P and a b ∈ A with bJ ⊆ P but bI ⊈ P . Since P is prime, aJ bI ⊈ P but
RbIaJ ⊆ RbP J ⊆ RbJ ⊆ P yields RaJ bI ⊆ P which is a contradiction in view of lemma
2.5.
We can define a (not necessarily commutative) operation + on Γ by putting v(I) +
v(J) = v(IJ). The unit for this operation is v(R). We now verify that + is well-defined.
Suppose v(I) = v(I ′) and v(J) = v(J ′) and consider x ∈ v(IJ), then RxRIJ ⊆ P so
RxRI ⊆ v(J) = v(J ′) or RxRIJ ′ ⊆ P . By the same lemma as before, IJ ′RxR ⊆ P
follows hence J ′RxR ⊆ v(I) = v(I ′) i.e.
I ′J ′RxR ⊆ P which implies x ∈ v(I ′J ′)
and consequently v(IJ) ⊆ v(I ′J ′). The other inclusion can be obtained by the same
argument if the roles of I, J and I ′, J ′ are interchanged.
We now check that this operation is compatible with ≤. Take some v(I) ≥ v(J)
and consider v(HI) and v(HJ). If q ∈ v(HJ) then qHJ ⊆ P so qH ⊆ v(J) ⊆ v(I)
which implies qHI ⊆ P so q ∈ v(HI). To prove that ≤ is also stable under right
multiplication, we consider q ∈ v(J H). Then qJ H ⊆ P or equivalently J Hq ⊆ P . By
lemma 2.5 HqJ ⊆ P follows so Hq ⊆ v(J) ⊆ v(I) hence IHq ⊆ P i.e. q ∈ v(IH).
If v(I) ≤ v(J) then aI ⊆ P yields a(I + J) ⊆ P since aJ ⊆ P , so v(I + J) ⊇ v(I) =
min {v(I), v(J)}. Together with the preceding, this implies that v is an arithmetical
pseudo-valuation. The only thing left to prove is that
R = {a ∈ A v(RaR) ≥ 0}
and P = {a ∈ A v(RaR) > 0} .
Suppose v(RaR) > 0 = v(R) = P , then there is some x ∈ v(RaR)∖P . Now xRaR ⊆ P
gives a ∈ P , so {a ∈ A v(RaR) > 0} ⊆ P .
If p ∈ P , then v(RpR) ⊇ R ⊋ P , hence
p ∈ {a ∈ A v(RaR) > 0} so P = {a ∈ A v(RaR) > 0}. If a ∈ A is such that v(RaR) = 0
and p ∈ P then v(RaRRpR) = v(RaR) + v(RpR) = v(RpR) > 0 so RaRRpR ⊆ P and
therefore ap ∈ P which implies a ∈ R since R = AP . On the other hand, if r ∈ R then
P RrR ⊆ P . Since RrR is generated by regular elements, it follows that r ∈ ∑ RuiR for
a finite set of regular ui. Consequently, since Γ is totally ordered, v(RrR) = v(RuiR)
where v(RuiR) has the minimal value among these regular elements. If v(RrR) < 0
then v(P ) ≤ v(P RrR) since P RrR ⊆ P and then
v(P ) ≤ v(P RrR) = v(P ) + v(RrR) ≤ v(P )
(1)
5
since v(RrR) < 0. This means that all ≤ in 1 are actually equalities and in fact
v(P ) = v(P ) + v(RuiR) = v(P RuiR) so if aP RuiR ⊆ P then also aP ⊆ P . By choosing
a = u−1
i we find u−1
i ⊆ P and consequently
u−1
∈ AP = R so v(RrR) = v(RuiR) = v(R) = 0. which contradicts v(RrR) < 0.
Consequently R = {a ∈ A v(RaR) ≥ 0}.
i P ⊆ P . In a similar fashion we find P u−1
i
Proposition 3.2. With R, P and A as before, Γ is a group if and only if for any
fractional R-ideal I there is a nonzero y ∈ R with yI ⊆ R but yI ⊈ P .
Proof. If Γ is a group and I ∈ F(R) then for some J ∈ F(R) we have v(I)+v(J) = 0 i.e.
v(IJ) = v(J I) = v(R). Consequently, IJ P ⊆ P ⊇ P IJ so IJ ⊆ AP = R. Since aIJ ⊆ P
iff aR ⊆ P we have IJ ⊈ P . Then we can choose a y ∈ J with Iy ⊆ R but Iy ⊈ P which
implies RIRy ⊆ R and RIRy ⊈ P .
Suppose now that there is some y with yI ⊆ R but yI ⊈ P . For any x ∈ v(RyRI)
we have RxRRyRI ⊆ P which implies RxR ⊆ P and consequently x ∈ v(R). From
RyRI ⊆ R we can deduce v(R) ⊆ v(RyRI) hence v(R) = v(RyRI) which means that
v(RyR) is the inverse of v(I).
Note that the second part of the proof of the preceding theorem guarantees that
every v(I) is also v(RaR) for some a ∈ A.
Lemma 3.3. If ⋂ P n = 0 and Γ is a group then R is a Dubrovin valuation.
Proof. Applying corollary 2.9 gives us that R~P is prime Goldie with invertible regular
elements, i.e. it is a simple Artinian ring. Consider q ∈ A ∖ R. There exists some y ∈ A
with RyRRqR ⊆ R but RyRRqR ⊈ P . Then there exists a z ∈ RyR with zq ∈ R ∖ P
and since RqRRyR ⊆ R but RqRRyR ⊈ P we can use a similar construction to find an
element z′ with qz′ ∈ R ∖ P .
Theorem 3.4. If Γ is a group and ⋂ P n = 0, then R is a valuation ring and A is a
skewfield.
Proof. If a ∈ R ∖ P then P + Ra is essential, two-sided and contains P so it is equal to
R. Then, for some r ∈ R and p ∈ P , we have 1 = p + ra. We have already seen (cfr.
proof of proposition 2.8) that 1 + P consist of units, so ra is a unit hence a is a unit.
If q ∈ A ∖ R there there is some y with yq ∈ R ∖ P , so yq is a unit of R hence q is a unit
of A. Finally, if some p ∈ P were not invertible, then Ap ⊆ P since no element in Ap
is a unit. Then we would have A(RpR) ⊆ P , but this would contain some regular u
which is invertible in A and Au ⊆ P would give a contradiction. This implies that A is
a skewfield and R is an invariant Dubrovin valuation on A, so it must be a valuation
ring.
Corollary 3.5. If Γ is an Archimedean group, then R is a valuation ring.
Proof. In view of the preceding proposition we only have to show that ⋂ P n = 0.
Suppose it is not, then I = ⋂ P n is a nonzero ideal. Pick 0 ≠ b ∈ I, then RbR ⊆ I is a
fractional ideal, hence there exists an ideal J ∈ F(R) with v(J) + v(RbR) = 0. Then
v(P n) + v(RbR) ≤ 0 for any n, so nv(P ) + v(RbR) ≤ 0. However, putting v(RbR) = γ,
there must be some n with nv(p) > −γ which is a contradiction.
6
Proposition 3.6. Let R be any order in a simple Artinian ring A and suppose that
v ∶ F(R) → Γ is an apv. Then:
(1) P = {a ∈ A v(RaR) > 0} defines a prime (P, AP ) with {a ∈ A v(RaR) ≥ 0} ⊆ AP .
(2) if v(I) = {a ∈ A aI ⊆ P } and Γ is a group, then {a ∈ A v(RaR) ≥ 0} = AP .
Proof. (1) For a, b ∈ P we have v(R(a + b)R) ≥ min {v(RaR), v(RbR)} which is strictly
positive, so a + b ∈ P . Clearly, P is an ideal in AP and R ⊆ AP since v(R) = 0 and
If a, a′ ∈ A are such
for all r ∈ R and p ∈ P we have v(RrRRpR) = v(RpR) > 0.
that aAP a′ ⊆ P then aRa′ ⊆ P hence v(RaRa′R) > 0. From v(RaR) + v(Ra′R) > 0
it follows that either v(RaR) > 0 or v(Ra′R) > 0, i.e. either a ∈ P or a′ ∈ P .
If
v(RaR) ≥ 0 for some a ∈ A then for all p ∈ P v(RaRpR)=v(RaR)+v(Rp)¿0
and
v(RpRaR)=v(RpR)+v(RaR)¿0 so a ∈ AP .
(2) Consider a ∈ AP . RaR is invertible in F(R) so there is a J ∈ F(R) with
v(RaR) + v(J) = 0 = v(J) + v(RaR), hence v(J aR) = v(RaJ) = 0.
If v(RaR) < 0
then v(J) > 0 or in other words J ⊆ P . But then a ∈ AP would give RaRJ ⊆ P
which implies v(RaRJ) > 0 which is a contradiction. Therefore v(RaR) ≥ 0 and
AP = {a ∈ A v(RaR) ≥ 0}.
4 Arithmetical pseudo-valuations on Dubrovin
valuations
For primes containing an order with commutative semigroup of fractional ideal, Van
Geel ([2]) introduced artithmetical pseudo-valuations, but this condition is very strong
and reduces the applicability in practice to maximal orders and Dubrovin valuations
in finite dimensional central simple algebras. For Dubrovin valuations on infinite di-
mensional csa the semigroup F(R) need not be commutative. The following facts are
known about Dubrovin valuations on simple Artinian rings (see [1]):
(D1) R is a (left and right) Goldie ring and a prime order of A;
(D2) (P, R) is a localized prime of R;
(D3) P = J(R) and it is the unique maximal ideal of R. Consequently, 1 + P consists
of units;
(D4) F(R) is linearly ordered;
(D5) finitely generated R-submodules of A are cyclic.
Proposition 4.1. For a Noetherian Dubrovin valuation R we have for all I, J ∈ F(R)
that IJ ⊆ P iff J I ⊆ P .
Proof. From IJ ⊆ P it follows that either I ⊆ P or J ⊆ P (by (D2)), assume without
loss of generality I ⊆ P . By (D4), if J I ⊈ P then P ⊊ J I so we have R ⊆ J I ⊆ J P ⊆ J
hence J = RJ ⊆ J IJ ⊆ J P ⊆ J which gives J = J P . Since R is an order, there is some
regular u ∈ R with uJ ⊆ R and since R is Noetherian uJ = ∑ aiR for a finite set of ai's
in uJ. Then also J = ∑ u−1aiR, so J is a finitely generated R-submodule of A. By
Nakayama's lemma J must be zero, which is a contradiction.
7
Corollary 4.2. If R is a Noetherian Dubrovin valuation then
v ∶ F(R) → Γ ∶ I ↦ (P ∶ I) = {a ∈ A aI ⊆ P }
is an arithmetical pseudo-valuation and Γ is a totally ordered group. Furthermore,
P = {a ∈ A v(RaR) > 0} and R = {a ∈ A v(RaR) ≥ 0}.
Proof. Using the preceding proposition instead of 2.5 we can repeat the proof of theo-
rem 3.1. The only thing we need to prove is that Γ is a group, so consider I ∈ F(R).
By a similar argument as in the proof of proposition 4.1 it is finitely generated as a
left R-ideal of A. By (D5) it is cyclic, in fact I = Ru for some regular u and thus
RuR = Ru. Since R is a Dubrovin valuation, there is some a ∈ A with ua ∈ R ∖ P . Then
Rua ⊆ R, Rua ⊈ P and Ia ⊆ R, Ia ⊈ P . We can similarly find a b such that bI ⊆ R but
bI ⊈ P . We can now repeat the last part of the proof of proposition 3.2 to conclude
that Γ is a group.
Remark 4.3. If R is a Dubrovin valuation where
v ∶ F(R) → Γ ∶ I ↦ {a ∈ A aI ⊆ P }
is a non-trivial arithmetical pseudo-valuation with values in a totally ordered group,
then IJ ⊆ P if and only if J I ⊆ P . Indeed, suppose IJ ⊆ P and J I ⊈ P then, as in
proposition 4.1 we find J P = J but then v(P ) = 0 which is impossible.
If R is non-Noetherian, then P = P 2 is possible in which case no nice apv can exist
since otherwise v(P ) = 2v(P ) which would imply v(P ) = 0. If we exclude this slightly
pathological case, a nice apv does exist.
Proposition 4.4. Let R be a Dubrovin valuation with ⋂ P n = 0, then there is an apv
as before.
Proof. If I, J ∈ F(R) with IJ ⊆ P but J I ⊈ P . The same argument as in proposition 4.1
leads to J = J P so J = J P n for any n. There is some regular u ∈ R with uJ ⊆ P hence
uJ = uJ P n ⊆ P n+1. But then uJ = 0 which implies J = 0 and this is a contradiction.
Now we can proceed as in corollary 4.2 to find an apv with values in a semigroup.
The only thing we need to prove is that Γ is a group. Lemma 1.5.4 in [1] says that
P = Rp = pR for some regular p ∈ P . Since P is principal as a left R-ideal, lemma 1.5.6
in the same source gives P P −1 = R = P −1P (here P −1 = {a ∈ A P aP ⊆ P }). Consider
now a fractional R-ideal I. Clearly, (R ∶ I)I ⊆ R. Suppose we also have (R ∶ I)I ⊆ P ,
then P −1(R ∶ I)I ⊆ R hence P −1(R ∶ I) ⊆ (R ∶ I) so P −1(R ∶ I)I ⊆ P . This means
(R ∶ I)I ⊆ P 2 and by repeating this process we find (R ∶ I)I ⊆ P n for any n, but
(R ∶ I)I ⊆ ⋂ P n = 0 which is a contradiction. Therefore, (R ∶ I)I ⊆ R but (R ∶ I)I ⊈ P ,
so there exists an a ∈ (R ∶ I) such that aI ⊆ R but aI ⊈ P .
The following characterizes Noetherian Dubrovin valuation rings within the class of
rank one Dubrovin valuations. The result may be known but we found no reference for
it in the literature. Recall that the rank of a Dubrovin valuation ring is the maximal
length of a chain of Goldie prime ideals in the ring. A rank 1 Dubrovin valuation ring
on a simple Artinian A is a maximal subring of A.
8
Proposition 4.5. For a Dubrovin valuation R on a simple Artinian ring A the fol-
lowing are equivalent:
(1) R is Noetherian.
(2) R has rank 1 and P ≠ P 2.
(3) R has rank 1 and ⋂ P n = 0.
Proof. (1) ⇒ (2) If R is Noetherian then all ideals (and R-ideals of A) are principal,
so P ≠ P 2. Suppose 0 ≠ Q is another prime ideal in P . Let P = Rp, then Q = Ip
for some non-trivial ideal I of R. Q = IP yields I ⊆ Q since Q is prime and P ⊈ Q.
Hence Q = IP ⊆ QP ⊆ Q implies Q = QP which implies Q = 0 by Nakayama's lemma.
(2) ⇒ (3) If P ≠ P 2, then ⋂ P n ≠ P which, by Lemma 1.5.15 in [1], gives ⋂ P n = 0.
(3) ⇒ (1) Since ⋂ P n = 0, P ≠ P 2. Since R is rank 1, R = Ol(I) = Or(I) for any R-ideal
I. By proposition 1.5.8 in [1], it follows that if I is not principal, then II −1 = P and
P = P 2 which s a contradiction.
5 Divisors of Bounded Krull orders
It is an order in a simple Artinian ring
We consider a prime Noetherian ring R.
A = Q(R), the classical ring of fractions.
If R is a maximal order then the set of
divisorial R-ideals of A (cfr. [1]) is a group and since R is Noetherian it is an Abelian
group generated by the maximal divisorial ideals and every maximal divisorial ideal is
a minimal prime ideal.
Recall that an order is an Asano order if every ideal I ≠ 0 of R is invertible and it
is a Dedekind order if it is an hereditary Asano order. If R is an Asano order satisfying
the ascending chain condition on ideals, then F(R) is the Abelian group generated
by maximal ideals and every maximal ideal is a minimal nonzero prime ideal. Any
bounded Noetherian order is a Dedekind order.
A semi-local order R in a simple Artinian A is a Noetherian Asano order if and
only if it is a principal ideal ring. If R is a Dubrovin valuation ring of A then R is a
maximal order if and only if rk(R) = 1 and R is Asano if and only if it is a principal
ideal ring, so a Noetherian Dubrovin valuation ring is a Noetherian maximal order and
an Asano order, i.e. a principal ideal ring.
Proposition 5.1. If R is a Noetherian Dubrovin valuation then the corresponding apv
takes values in Z.
Proof. Since R is a Noetherian Asano order, F(R) is generated by the maximal ideals
of R, but since P is the unique maximal ideal and the value group is necessarily
torsion-free, we have F(R) = Z.
Recall that an order R in a simple Artinian ring A is said to be a Krull order if it is
a maximal order and it is τ -Noetherian (see [1], definition 2.2.2). A Noetherian order
R in a simple Artinian A is a Krull order if and only if it is a maximal order.
Theorem 5.2. Let R be a prime Noetherian ring and an order in A = Q(R). Suppose
every minimal nonzero prime ideal is localizeable, Rp is a Dubrovin valuation ring for
every p ∈ X 1(R) = {minimal nonzero prime ideals of R} and R = ⋂ Rp, then R is a
bounded Krull domain.
9
Proof. Since R is Noetherian, every Rp is Noetherian too and since it is a Dubrovin
valuation it must be an Asano order hence a principal ideal ring. Since every Rp is a
maximal order, so is R. As a Noetherian maximal order, R is a Krull domain and by
theorem 2.2.16 in [1] every regular element is a non-unit in only finitely many of the
Rp's (for p maximal divisorial, i.e. p ∈ X 1(R)). Theorem 2.2.20 in the same source
gives the result.
Remark 5.3. If R is a bounded Krull domain then R = ⋂p∈X 1(R) Rp (cfr. [1] 2.2.18
& 2.2.19). Then every Rp is rank one Dubrovin valuation with P ≠ P 2 (2.2.16 in the
aforementioned source), so by proposition 4.5 it is Noetherian. This gives a correspon-
dence between p ∈ X 1(R) and apvs.
A divisor of a bounded Krull domain R is an element in the free Abelian group
Zp. To any I ∈ F(R) we can associate the divisor div(I) = ∑ vp(Ip)p where
ࣷp∈X 1(R)
Ip = RpI. This definition is justified by the following:
Proposition 5.4. Suppose Rp is Noetherian. If I is an R-ideal of A, then IP is an
RP -ideal of A.
Proof. Let u be regular in R with uI ⊆ R, then RuRI ⊆ R and RuR = Ru′ for some
regular u′ ∈ R. Then Rpu′I is the localization of Ru′I and it is an ideal of Rp. Rpu′ is
the localization of Ru′ so it is also an ideal of Rp, hence Rpu′I = Rpu′RpI = Rpu′Ip is
an ideal of Rp. Now U ′Ip ⊆ Rp, i.e. Ip is an Rp-ideal of A.
Observe that since any regular element is a non-unit in only finitely many localiza-
tions, div(I) contains only finitely many non-zero terms. Moreover, div(I) ≤ div(J)
is and only if vp(I) ≤ vp(J) for all p ∈ X 1(R). By putting I ∗ = ⋂p∈X 1(R) Ip we find
vp(I) = vp(I∗). For bounded Krull domains we can consider div ∶ F(R) → Div(R).
This is a group morphism of Abelian groups and it is order reversing in the sense that
I ⊆ J yields div(I) div(J). Further divisor theory requires a version of the aproxima-
tion theorems. This is work in progress.
References
[1] H. Marubayashi & F. Van Oystaeyen, General theory of primes, Springer LNM
2059, 2012
[2] J. Van Geel, Places and valuations in noncommutative ring theory, Lct. Notes in
Pure & Appl. Math. vol.71, M.Dekker, 1982
[3] J. C. McConnell & J. C. Robson, Noncommutative noetherian rings, Graduate
Studies in Mathematics Vol.30, Am. Math. Soc., ISBN 0-8218-2169-5, Providence
1987
[4] M.Chamaire, Anneaux de Krull non commutatifs, J. of Alg. 72, pp.210-222, 1981
[5] G.Maury & J.Raynaud, Ordres maximaux au sens de K.Asano, LNM vol.808,
Springer 1980
10
|
1210.5438 | 1 | 1210 | 2012-10-19T15:09:00 | Free resolutions of algebras | [
"math.RA",
"math.KT",
"math.RT"
] | Given an algebra A, presented by generators and relations, i.e. as a quotient of a tensor algebra by an ideal, we construct a free algebra resolution of A, i.e. a differential graded algebra which is quasi-isomorphic to A and which is itself a tensor algebra. The construction rests combinatorially on the set of bracketings that arise naturally in the description of a free contractible differential graded algebra with given generators. | math.RA | math |
Free resolutions of algebras
Joe Chuang
Alastair King
18 Oct 2012
Abstract
Given an algebra A, presented by generators and relations, i.e. as
a quotient of a tensor algebra by an ideal, we construct a free alge-
bra resolution of A, i.e. a differential graded algebra which is quasi-
isomorphic to A and which is itself a tensor algebra. The construction
rests combinatorially on the set of bracketings that arise naturally in
the description of a free contractible differential graded algebra with
given generators.
1
Introduction
Let S be any ring. We write ⊗ for ⊗S, and, for any S, S-bimodule V , we
write V n for V ⊗n. Further, we write
T +
S (V ) =Mn≥1
V n,
V (m) =Mn≥m
V n,
(1.1)
for the non-unital tensor algebra of ‘free words’ in V over S and for the ideal
of words of length at least m, respectively.
Our objective in this paper is to construct a free algebra resolution of
an arbitrary (non-unital) S-algebra A presented in terms of generators and
relations, that is,
A = T +
S (V ) /I,
for some S, S-bimodule V and ideal I. As a first step, in Section 2, we work
towards describing the case where I ⊆ V (2), i.e. the generators are ‘minimal’,
1
and I is homogeneous (Theorem 2.2). This case is controlled by the by-
now-familiar A∞ combinatorics of rooted trees or the corresponding set of
bracketings (see, for example, Figure 1). By extending this set of bracketings
in various ways, we find, in Sections 3 and 4, that the essential nature of the
proof becomes more transparent in the general case (Theorem 4.1).
As a typical motivating example, consider a quiver Q and field k. Set
S = kQ0, the semi-simple algebra spanned by the vertex idempotents, and
V = kQ1, the S, S-bimodule spanned by the arrows. Then the augmented
unital algebra S ⊕ T +
S (V ) is the path algebra kQ and S ⊕ A is a ‘quiver
algebra’, i.e.
is presented by a quiver with relations. Such augmentation
allows one to move easily between unital and non-unital S-algebras; we find
it notationally simpler to work in the slightly less familiar non-unital context
in this paper.
Giving a free resolution of A as an S-algebra is, almost tautologically, the
same as giving a ‘locally finite’ A∞-coalgebra over S
K• =Mn≥1
Kn,
where each Kn is an S, S-bimodule and such that A is quasi-isomorphic to
the differential graded (dg) algebra
Cobar K• =(cid:0)T +
S (K•[1]) , d(cid:1).
(1.2)
Here K•[1] denotes the shifted complex, defined by K[1]n = Kn+1. In general,
the quasi-isomorphism should be induced by some S, S-morphism
θ : K1 → A
such that θ(K1) generates A. In our case, since the generators V of A are
explicitly specified, we will suppose that K1 = V and that θ : V → A is the
specifying map. Then the degree zero term in Cobar K• is T +
S (V ) and the
quotient map T +
S (V ) → A will be the quasi-isomorphism.
The cobar construction here is ‘almost tautological’ in that the differential
d on T +
S (K•[1]) may be considered simply as an efficient way of encoding the
A∞-coalgebra structure on K•. More precisely, the A∞-coalgebra structure
consists of S, S-morphisms
∆k : Kn → Km1 ⊗ · · · ⊗ Kmk ,
2
for each k ≥ 1 andPk
Xr+s+t=n
i=1 mi = n − 2 + k, satisfying the conditions
(−1)r+st(cid:0)1⊗r ⊗ ∆s ⊗ 1⊗t(cid:1) ◦ ∆r+1+t = 0
for all n ≥ 1 (cf.
single condition that the endomorphism d of T +
[5, Definition 1.2.1.8]). These may be packaged into the
S (K•[1]), determined by
d = −[1]⊗n ◦ ∆n ◦ [−1] : K•[1] → K•[1]⊗n
(1.3)
and the (graded) Leibniz rule (see (3.2)), satisfies d2 = 0 (cf.
[5, §1.2]).
Note also that, in evaluating [1]⊗n, we use the standard Koszul sign rule; for
example
[1] ⊗ [1] := (−1)m : Km ⊗ Kn → Km ⊗ Kn.
Remark 1.1. The condition that K• is ‘locally finite’ is simply the require-
ment that (1.3) does define a differential on T +
S (K•[1]), which is defined as
an infinite direct sum, and not just on its completion, i.e. the corresponding
direct product.
In other words, for any element x ∈ K•, the coproducts
∆n(x) are non-zero for only finitely many n. It will be clear that all coalge-
bras we will encounter have this property and we will not explicitly mention
it again.
2 First examples
We begin by discussing the sort of construction we are looking for in the case
that I = V (2) and so A = T +
S (V ) /I is just V with trivial multiplication.
As a warm-up, we first observe that the classical candidate for K•, in this
case, is the free coassociative coalgebra generated by V ,
B•(V ) =Mn≥1
V n,
(2.1)
which is what the usual (unaugmented) bar construction yields. The comul-
tiplication ∆ : Bm+n → Bm ⊗ Bn is tautological, i.e. is the natural identifica-
tion τ : V m+n → V m ⊗ V n. This gives the A∞-coproduct ∆2, with all other
coproducts vanishing.
3
V π = V n,
for n =Xk
πk,
As one should expect, the dg algebra A• = Cobar B•(V ) is a free resolu-
tion of A. Indeed, we may explicitly write
A• =Mπ∈Π
V π,
(2.2)
where Π is the set of all finite sequences π = (π1, . . . , πr) of positive integers,
while
which is in homological degree d, i.e. is a summand of Ad, for
d = π =Xk
(πk − 1).
Multiplication in A• corresponds to concatenation of sequences, i.e. is given
by the tautological maps τ : V π ⊗ V η → V πη, while the non-trivial compo-
nents of the differential d : V π → V π′ are ±τ whenever π′ is obtained from π
p)
by splitting some term in the sequence into two. The sign is (−1)(π′
when the p-th term of π is split.
1,...,π′
To see explicitly that A• is quasi-isomorphic to the algebra A, we notice
first that, for each n ≥ 0, there is precisely one sequence of degree 0 summing
to n, namely π = (1, . . . , 1), and this yields A0 = T +
S (V ). On the other hand,
for each n ≥ 2, the part of A• consisting of summands equal to V n is given
by V n ⊗Z C aug
(σn−2)[1] the (shifted and augmented) chain complex of the
(n − 2)-simplex, which is exact, as required.
•
From the point-of-view of this paper, a more natural, but rather bigger,
candidate for K• is the free A∞-coalgebra generated by V ,
B∞
• (V ) = Mβ∈B[2]
V β.
(2.3)
Here B[2] is the set of all closed non-degenerate bracketings (or equivalently
those that correspond to ‘rooted trees’) and the bracketed tensor product
V β = V n if β has n inputs and is in homological degree d if β has d − 1 pairs
of brackets. Note that “closed” means that the whole expression is enclosed
in an outer bracket, while “non-degenerate” means that each inner pair of
brackets encloses at least two inputs. For example, one summand of B∞
4 (V )
would be
V β = [[V ⊗ V ] ⊗ [V ⊗ V ⊗ V ]] = V 5
4
for β = [[ • •][ • • • ]] or [[2][3]], a 3-fold bracketing of 5 inputs.
The differential ∆1 has non-zero components
(−1)m−1τ : V β → V β( bm),
where β(bm) is obtained from β by removing the mth internal left bracket
[ (counted from the left) together with its matching right bracket ]. Pre-
cisely one higher coproduct ∆k, for some k ≥ 2, is defined on each V β and
corresponds to removing the outer bracket and writing what is inside as a
concatenation of k closed bracketings, up to a sign. For example, there is a
component
∆4 : V [[2]2[3]] → V [2] ⊗ V ⊗ V ⊗ V [3].
For the general component
∆k : V [β1...βk] → V β1 ⊗ . . . ⊗ V βk
the sign we choose (see Remark 3.1 for an explanation) is
− (−1)Pk
i=1(k−i)di,
(2.4)
where di is the homological degree of V βi in B∞
• (V ).
By convention, the only 0-fold closed bracketing is 1 and so B∞
1 (V ) = V .
On the other hand, the 1-fold closed bracketings are [k], for each k ≥ 2,
and hence B∞
2 (V ) = V (2). As a further example, the possible bracketings of
4 inputs are 3, 2 or 1-fold, as listed in Figure 1 together with their corre-
sponding rooted trees. These are well-known to correspond to the 0,1 and 2
dimensional cells of a pentagon. Furthermore, the restriction of the differen-
tial on B∞
• corresponds to the coboundary map on the cochain complex of
the pentagon (with some care needed over signs).
More generally, writing B∞
n,k(V ) for the sum over all (n − 1)-fold bracket-
ings of k inputs, we have for k ≥ 2,
B∞
n,k(V ) ∼= V k ⊗Z C k−n(Sk−2),
(2.5)
where C •(Sm) is the cochain complex of the mth associahedron (or Stasheff
polytope, introduced in [7]). In addition, the differential on C •(Sk−2) induces
the differential on B∞
•,k(V ). Since the associahedra are all contractible, this
means that the homology of B∞
•,k(V ) is just V k in degree k. In other words,
5
[[[2]1]1] [1[[2]1]] [[1[2]]1] [1[1[2]]] [[2][2]]
[[3]1]
[[2]2]
[1[2]1]
[2[2]]
[1[3]]
[4]
Figure 1: Bracketings with four inputs.
the kernel of d restricted to B∞
map
k,k(V ) is isomorphic to Bk(V ) and the induced
η : B•(V ) → B∞
• (V ),
(2.6)
is a quasi-isomorphism of A∞ coalgebras (essentially because the A∞ operad
resolves the associative operad).
Using Corollary 6.3 from the Appendix, this is actually sufficient to prove
the following result, but we will also prove it directly as a special case of our
main result Theorem 4.1 in Section 4.
Theorem 2.1. Cobar B∞
• (V ) ≃ V .
More generally, suppose A is a graded algebra, generated by V in degree
1, so that A = T +
S (V ) /I, where
is a homogeneous ideal in V (2). Then, generalising (2.3), we define
Rn
I =Mn≥2
• (V, I) = Mβ∈B[2]
B∞
(V, I)β,
(2.7)
where (V, I)β is obtained from V β by replacing every occurrence of an inner
bracketed [V n] by [Rn]. The A∞ coalgebra structure on B∞
• (V, I) is defined,
as for B∞
• (V ), by tautological maps (with the appropriate sign), except for
6
the component of the differential corresponding to the removal of an inner
bracket. Such a component is induced by one of the two maps
V a ⊗ [Rn] ⊗ V b → Rn+a+b,
V a ⊗ [Rn] ⊗ V b → V n+a+b,
depending on whether the domain is enclosed by matching brackets [..] or
non-matching ones, e.g. ]..]. The first map exists because I is an ideal, while
the second is the composite of the first with the inclusion Rn+a+b ⊆ V n+a+b.
This inclusion also gives the degree 2 component ∆k : [Rk] → V k.
Another special case of Theorem 4.1 is then the following.
Theorem 2.2. Cobar B∞
• (V, I) ≃ A.
Example 2.3. We look more closely at the case when S is a separable k-
algebra, so that ⊗ is exact and hence B∞
• (V ). Now Theorem 2.2
implies (by Remark 4.3 and Proposition 5.1, or directly from Proposition 6.4)
that the degree k part of TorA
n (S, S) is isomorphic to the homology of d
at B∞
n,k(V, I), so this degree k part vanishes for k < n, since there are no
bracketings in this case. Since Extn
n (S, S), S), this also
starts in degree n (cf. [1, Lemma 2.1.2]).
A(S, S) ∼= HomS(TorA
• (V, I) ⊆ B∞
Observe further that all inner brackets in the bracketings that contribute
n,n(V ) are [2] (as for example in the top row of Figure 1). Hence, under
• (V ) of (2.6), the kernel of d restricted to
n,n(V, I) is identified with the familiar Koszul term Bn(V, R2) ⊆ Bn(V ) (cf.
to B∞
the embedding η : B•(V ) → B∞
B∞
[1, §2.6]), defined by
Bn(V, R2) = \p+q=n−2
V p ⊗ R2 ⊗ V q.
Thus, as is also well-known from Koszul theory (cf. [1, Thm 2.6.1]), the de-
gree n part of Torn(S, S) is isomorphic to Bn(V, R2). Note also that B•(V, R2)
is a subcoalgebra of B•(V ).
But now, if Extn
A(S, S), and hence TorA
n (S, S), is concentrated in degree
n, which is one characterisation of A being Koszul (cf. [1, Prop 2.1.3]), then
necessarily I = (R2) and we also deduce that B•(V, R2) ≃ B∞
• (V, I) and
hence, by Corollary 6.3, that Cobar B•(V, R2) ≃ A, which is the algebra
incarnation of the Koszul resolution for A.
7
3 A free contractible dg algebra
We now develop the machinery that will enable us to generalise the construc-
tions behind Theorems 2.1 and 2.2. In the process, we are naturally led to
consider bracketings of a slightly more general form than in Section 2.
For any ring S and any S, S-bimodule V , we can construct a free con-
tractible dg S-algebra
F• = F•(V ) =Mn≥0
Fn(V )
that is ‘freely’ generated by V in degree 0 and a contracting homotopy
h : F• → F• of degree 1, satisfying dh + hd = id and h2 = 0. The differential
d, of degree −1, is then determined recursively by the two conditions
d(hv) = v − h(dv),
d(v · w) = dv · w + (−1)deg vv · dw,
(3.1)
(3.2)
starting from dv = 0 for v ∈ V . Notice that (with these signs) we deduce
inductively that d2 = 0, by observing that
d2hv = dv − dhdv = dv − (dv − hd2v) = hd2v
and
d2(v · w) = d(cid:0)dv · w + (−1)deg vv · dw(cid:1)
= d2v · w + (−1)deg dvdv · dw + (−1)deg vdv · dw + v · d2w
= d2v · w + v · d2w,
since deg(dv) = (deg v) − 1.
We may describe F• more explicitly using an extended notion of bracketed
tensor products, similar to Section 2,
F•(V ) = Mβ∈B(1)
V β,
(3.3)
where, if β is a d-fold bracketing of n inputs, then V β is V n and is in homo-
logical degree d, i.e. is a summand of Fd. Note that this degree is different
from (2.3), because we are not describing an A∞-coalgebra here, but its cobar
construction directly.
8
We define the set B(1) of bracketings recursively as follows, noting that
each such bracketing is, in the first instance, a word in the symbols “•”
(representing an input), “[” and “]”, with the later two balanced in the
usual way of brackets:
(i) B(1) contains •,
(ii) if β ∈ B(1) and β 6= [α], for some α ∈ B(1), then [β] ∈ B(1),
(iii) if α, β ∈ B(1), then their concatenation αβ ∈ B(1)
Note that, in contrast to B[2] in (2.3), bracketings in B(1) may be open, i.e.
without an outer bracket, and degenerate, i.e. with only one input in an
inner bracket.
As before, we abbreviate a sequence of n uninterrupted •’s by “n”. Thus,
for example, [ • •][ • •[ • ]] becomes [2][2[1]]. In particular, there are
just two bracketings 1 and [1] with one input and eight with two inputs
2, [2], [1]1, 1[1], [[1]1], [1[1]], [1][1], [[1][1]].
Now the product in F• has non-zero components consisting of the tauto-
logical maps
τ : V α ⊗ V β → V αβ,
while the contracting homotopy h : F• → F• has non-zero components given
by the tautological maps
τ : V β → V [β],
for each β 6= [α],
(3.4)
that is, τ is the identity map V k → V k, where k is the number of inputs in
β (and in [β]).
On the other hand, the differential d : Fn → Fn−1 has n non-zero compo-
nents
(−1)m−1τ : V β → V β( bm),
for m = 1, . . . , n,
(3.5)
where β(bm) is obtained from β by removing the mth “[” from the left,
together with its matching “]”.
It is straightforward to check that this
does give a differential satisfying (3.1) and (3.2), noting that we count “[”s
from the left, because (3.2) is a ‘left’ Leibniz rule. Thus h is a contracting
homotopy and so F• is a contractible dg algebra.
9
Remark 3.1. Forgetting the differential d and the contracting homotopy h,
F• is the free graded S-algebra generated by
K•(V )[1] = V ⊕ h(F•) = Mβ∈B[1]
V β,
(3.6)
where B[1] ⊆ B(1) is the set of closed bracketings. Note that the convention
that “1” is a closed bracketing is precisely to get the initial summand V here.
In other words, F• = Cobar K•(V ). The differential and coproducts on
the A∞-coalgebra K•(V ) are determined by applying (1.3) in reverse and one
can check that they are given explicitly by the same rules as those of B∞
• (V )
in the paragraphs following (2.3). In particular, this explains the choice of
sign in (2.4).
4 Main theorem
S (V ) and, furthermore, that we have many other copies
S (V ) ‘embedded’ in F• for every pair of inner brackets. To make this
Note that F0(V ) = T +
of T +
explicit, we may introduce a new symbol [ ∗ ] with the meaning
V [∗] =Mm≥1
V [m] = [T +
S (V ) ]
and more generally
V α[∗]β =Mm≥1
V α[m]β = V α ⊗ [T +
S (V ) ] ⊗ V β,
for matching partial bracketings α, β. Thus we can define contracted sets B[∗]
of closed bracketings and B(∗) of open bracketings, in which the innermost
brackets are all [ ∗ ], and so that we can write
F•(V ) = Mβ∈B(∗)
V β,
K•(V ) = Mβ∈B[∗]
V β,
(4.1)
where the degrees of terms in the 2nd equation are shifted compared to (3.6).
Now, for any ideal I ⊆ T +
S (V ) we can define a new dg algebra
F•(V, I) = Mβ∈B(∗)
(V, I)β,
10
(4.2)
where (V, I)β is obtained from V β by replacing [T +
S (V ) ] by [I], for each
occurrence of [ ∗ ] in β. Because I is an ideal, there is a well-defined differ-
ential d : F•(V, I) → F•(V, I) given by the same rule (3.5) as the differential
d : F•(V ) → F•(V ). We can not quite define a contracting homotopy in the
same way, but simply because we have not replaced F0(V ) = T +
S (V ) by I.
S (V ) and hence
Indeed, the image of d : F1(V, I) → F0(V, I) is I ⊆ T +
there is a dg morphism
ρ : F•(V, I) → T +
S (V ) /I,
(4.3)
where the codomain here is just an algebra concentrated in degree 0.
Theorem 4.1. The map ρ in (4.3) is a quasi-isomorphism, that is, the dg
algebra F•(V, I) in (4.2) is a free resolution of the algebra A = T +
S (V ) /I.
Proof. Because ρ is surjective, we just want to show that ker ρ is contractible.
For this, we observe that ker ρ is the dg ideal
F ′
•(V, I) ⊆ F•(V, I)
(4.4)
obtained by also replacing F0(V ) by I. Then, the contracting homotopy h
can be defined on F ′
•(V, I) by the rule (3.4) as it was on F•(V ) and so we
can use it to deduce that F ′
•(V, I) is contractible, as required.
Remark 4.2. In some cases, e.g. when S is a separable k-algebra (so that
⊗ is exact), we note that F•(V, I) is a sub-dg-algebra of F•(V ), and so the
equations d2 = 0, for F•(V, I), and dh + hd = id, for F ′
•(V, I), follow by
restriction from F•(V ). However, in general, they follow rather because the
combinatorial structure of F•(V, I) is identical to that of F•(V ).
Remark 4.3. Just as F•(V ) = Cobar K•(V ), as in Remark 3.1, we have
F•(V, I) = Cobar K•(V, I), where
K•(V, I) = Mβ∈B[∗]
(V, I)β,
(4.5)
In particular, when I = V (2), we have K•(V, I) = B∞
with (V, I)β now in homological degree d when β has d − 1 pairs of brackets.
• (V ) from (2.3),
so that Theorem 4.1 yields Theorem 2.1. Further, for a homogeneous ideal
I ⊆ V (2), we have K•(V, I) = B∞
• (V, I) from (2.7), so that Theorem 4.1
yields Theorem 2.2.
11
5 Homological application
Here we restict to the case when S is a separable k-algebra over a field k
and V is an S, S-bimodule over k, i.e. the S, S-action on V factors through
S ⊗k Sop.
Note that S is a left and right A-module, with A acting trivially, and
we would expect (in good cases) that we could use an A∞-coalgebra K•
with Cobar K• ≃ A to compute the (positive) Tor-groups of S and hence, by
duality, its Ext groups. We observe that the case in hand, with K• = K•(V, I)
as in (4.5), is a good one.
Proposition 5.1. If A = T +
S (V ) /I, then we have an isomorphism
H(K•(V, I)) ∼= TorA
• (S, S)
of graded coalgebras.
Proof. The A∞-coalgebra K•(V ) is cocomplete; e.g. the filtration given by
K•(V )(i) = Mβ∈B[1],β≤i
V β
is admissible (see Appendix for definition). Since S is a separable k-algebra,
K•(V, I) is a A∞-sub-coalgebra of K•(V, I) and is therefore also cocomplete.
Since Theorem 4.1 tells us that F•(V, I) = Cobar K•(V, I) is a dg resolution
of A, we deduce from Proposition 6.4 that H(K•(V, I)) ∼= TorA(S, S) as
graded coalgebras.
It follows that HomS(K•(V, I), S) is an A∞-algebra whose cohomology is
A(S, S), in positive degrees.
Ext•
6 Appendix
Again we restrict to the case where S is a separable k-algebra over a field k.
We extend part of the bar-cobar formalism for dg algebras and cocomplete
dg coalgebras over S to cocomplete A∞-coalgebras, following [5], [3] and [4].
As a change of notation, we write Ω∞C for the cobar construction of an
A∞-coalgebra C. This coincides with the more classical cobar construction
ΩC, in the special case that C is a dg coalgebra. The bar construction of a
dg algebra A is denoted BA.
12
A filtration on an A∞-coalgebra C is a sequence C(0) ⊆ C(1) ⊆ . . . ⊆ C
of graded sub-bimodules such that for all n ≥ 1, the coproduct ∆n : C → C n
is compatible with the (induced) filtrations on C and C n. A filtration is
admissible if C(0) = 0 and C = ∪C(i). We say C is cocomplete if it supports
an admissible filtration; this is equivalent to the usual definition if C is a
dg coalgebra. See [6, §9.3, Remark] for the related notion of conilpotent
(curved) A∞-coalgebra.
A morphism f = (fi) : C ′ → C between A∞-coalgebras is a quasi-
isomorphism if f1 is a quasi-isomorphism of the underlying complexes of C ′
and C, and a weak equivalence if the morphism Ω∞f : Ω∞C ′ → Ω∞C of cobar
constructions is a quasi-isomorphism of dg algebras. A morphism f : C ′ → C
between cocomplete A∞-coalgebras is a filtered quasi-isomorphism if admis-
sible filtrations can be chosen on C ′ and on C so that the maps fi : C ′ → C i
are compatible with the (induced) filtrations on C ′ and C i, and the morphism
Gr(f1) : Gr(C) → Gr(C ′) induced by f1 is a quasi-isomorphism. Note that a
filtered quasi-isomorphism is a quasi-isomorphism.
For any dg algebra A, the classical bar-cobar resolution gives a canon-
ical morphism εA : Ω∞BA → A of dg algebras. Taking A = Ω∞C for
an A∞-coalgebra C, we obtain a corresponding map ǫC : BΩ∞C → C of
In fact, ǫC is a weak equivalence, because εA is a quasi-
A∞-coalgebras.
isomorphism (see, e.g.
[5, Lemme 1.3.2.3(b)]), but we can say more if C is
cocomplete.
Lemma 6.1.
1. If A → A′ is a quasi-isomorphism of dg algebras, then
the induced morphism BA → BA′ is a filtered quasi-isomorphism.
2. If C is a cocomplete A∞-coalgebra, then ǫC : BΩ∞C → C is a filtered
quasi-isomorphism.
Proof. The induced morphism BA → BA′ is a filtered quasi-isomorphism
with respect to the primitive filtrations of BA and BA′. For the second
statement, equip BΩ∞C with the admissible filtration induced by a given
admissible filtration on C. Then ǫC : BΩ∞C → C is filtered, and it suffices
to show that Gri((ǫC)1) : Gri(BΩ∞C) → Gri(C) is a quasi-isomorphism for
all i ≥ 1. Put W = C[1], so that
BΩ∞C = T +(cid:0)T +(W )[−1](cid:1)
13
Since the filtration on C is admissible, Gri(C j) = 0 if j > i. Equip
with the filtration
Gri (BΩ∞C) = Gri Mi1+...+ik≤i
Fl = Gri Mi+1−l≤i1+...+ik≤i
W i1[−1] ⊗ . . . ⊗ W ik[−1]!
W i1[−1] ⊗ . . . ⊗ W ik[−1]! ,
l ≥ 0.
Then Gri((ǫC)1) is a surjective map of complexes with kernel Fi−1, and, for
each 1 ≤ l ≤ i − 1, the subquotient complex
Fl/Fl−1 = Mi1+...+ik=i+1−l
W i1[−1] ⊗ . . . ⊗ W ik[−1]
is acyclic, with a contracting homotopy vanishing on components with i1 = 1
and given by isomorphisms
W i1[−1] ⊗ . . . ⊗ W ik[−1] → W [−1] ⊗ W i1−1[−1] ⊗ W i2[−1] ⊗ . . . ⊗ W ik[−1]
otherwise.
Lemma 6.2. Let f : C ′ → C be a morphism of cocomplete A∞-coalgebras.
1. If f is a filtered quasi-isomorphism, then it is a weak equivalence.
2. If f is a weak equivalence, then it is a quasi-isomorphism.
Proof. For the first part, the proof given by Lefevre [5, Lemma 1.3.2.2] for fil-
tered quasi-isomorphisms of cocomplete dg coalgebras goes through without
change. For the second, consider the commutative diagram
C ′
ǫC ′
f
/ C
ǫC
BΩ∞C ′
BΩ∞f
/ BΩ∞C
By Lemma 6.1, ǫC, ǫC ′ and BΩ∞f are quasi-isomorphisms. Hence f is a
quasi-isomorphism.
14
/
O
O
/
O
O
Corollary 6.3 (Keller [4]). Let f : C ′ → C be a morphism of A∞-coalgebras
which is also compatible with strictly positive gradings on C ′ and C. If f is
a quasi-isomorphism, then it is a weak equivalence.
Proof. The additional positive gradings give rise to admissible filtrations on
C ′ and C in an obvious way. If f is a quasi-isomorphism, then it is automat-
ically a filtered quasi-isomorphism, and then Lemma 6.2 applies.
Proposition 6.4. Suppose that C is a cocomplete A∞-algebra and we have
a quasi-isomorphism Ω∞C → A of dg algebras. Then C is weakly equivalent
to BA. In particular we have an isomorphism of graded coalgebras
H(C) ∼= TorA(S, S).
Proof. By Lemma 6.1, we have filtered quasi-isomorphisms BΩ∞C → BA
and BΩ∞C → C. In particular C and BA are weakly equivalent, and thus
quasi-isomorphic, by Lemma 6.2. Finally, recall that H(BA) ∼= TorA(S, S).
References
[1] A. Beilinson, V. Ginzburg, W. Soergel, Koszul duality patterns in rep-
resentation theory J.A.M.S. 9 (1996) 473–527.
[2] V. Hinich. Homological algebra of homotopy algebras, Comm. Algebra
25 (1997), no. 10, 3291–3323.
[3] B. Keller, Koszul duality and coderived categories (after K. Lef´evre),
notes of a 50-minute talk given at the Frobenius conference in Toru-n
(Poland) in September 2003.
[4] B. Keller, Notes on minimal models, available at the author’s homepage
http://www.math.jussieu.fr/~keller.
[5] K. Lef`evre, Sur le A∞-cat´egories, Th`ese, Universit´e Paris 7, 2003. Avail-
able at http://www.math.jussieu.fr/~lefevre/publ.html.
[6] L. Positselski. Two kinds of derived categories, Koszul duality and
comodule-contramodule correspondence, Mem. Amer. Math. Soc. 212
(2011), no. 996, vi+133 pp.
15
[7] J.D. Stasheff, Homotopy associativity of H-spaces. I, II. Trans. A.M.S.
108 (1963), 275–292; ibid. 293–312.
Coordinates:
JC: City University, London; [email protected]
AK: University of Bath; [email protected]
16
|
1607.06576 | 1 | 1607 | 2016-07-22T07:02:31 | Invariant theory of relatively free right-symmetric and Novikov algebras | [
"math.RA"
] | Algebras with the polynomial identity (x,y,z)=(x,z,y), where (x,y,z)=x(yz)-(xy)z is the associator, are called right-symmetric. Novikov algebras are right-symmetric algebras satisfying additionally the polynomial identity x(yz)=y(xz). We consider the d-generated free right-symmetric algebra F(R) and the free Novikov algebra F(N) over a filed K of characteristic 0. The general linear group GL(K,d) with its canonical action on the d-dimensional vector space with basis the generators of F(R) and F(N) acts on F(R) and F(N) as a group of linear automorphisms. For a subgroup G of GL(K,d) we study the algebras of G-invariants in F(R) and F(N). For a large class of groups G we show that these algebras of invariants are never finitely generated. The same result holds for any subvariety of the variety R of right-symmetric algebras which contains the subvariety L of left-nilpotent of class 3 algebras in R. | math.RA | math |
INVARIANT THEORY OF RELATIVELY FREE
RIGHT-SYMMETRIC AND NOVIKOV ALGEBRAS
VESSELIN DRENSKY
Dedicated to Askar Dzhumadil'daev on the occasion of his 60th birthday
Abstract. Algebras with the polynomial identity (x1, x2, x3) = (x1, x3, x2),
where (x1, x2, x3) = x1(x2x3) − (x1x2)x3 is the associator, are called right-
symmetric. Novikov algebras are right-symmetric algebras satisfying addi-
tionally the polynomial identity x1(x2x3) = x2(x1x3). We consider the free
right-symmetric algebra Fd(R) and the free Novikov algebra Fd(N) freely gen-
erated by Xd = {x1, . . . , xd} over a filed K of characteristic 0. The general
linear group GLd(K) with its canonical action on the d-dimensional vector
space KXd acts on Fd(R) and Fd(N) as a group of linear automorphisms. For
a subgroup G of GLd(K) we study the algebras of G-invariants Fd(R)G and
Fd(N)G. For a large class of groups G we show that the algebras Fd(R)G and
Fd(N)G are never finitely generated. The same result holds for any subvariety
of the variety R of right-symmetric algebras which contains the subvariety L
of left-nilpotent of class 3 algebras in R.
Introduction
In this paper we fix a field K of characteristic 0 and consider nonassociative
K-algebras. An algebra A is called right-symmetric if it satisfies the polynomial
identity
(x1, x2, x3) = (x1, x3, x2),
(1)
where (x1, x2, x3) = x1(x2x3) − (x1x2)x3 is the associator, i.e.,
(a1, a2, a3) = (a1, a3, a2) for all a1, a2, a3 ∈ A.
A right-symmetric algebra is Novikov if it satisfies additionally the polynomial
identity of left-commutativity
x1(x2x3) = x2(x1x3).
(2)
We denote by R and N the varieties of all right-symmetric algebras and all Novikov
algebras, respectively. For details on the history of right-symmetric and Novikov
algebras we refer to the introductions of the paper by Dzhumadil'daev and Lofwall
[20] and the recent preprint by Bokut, Chen, and Zhang [4]. The origins of the
right-symmetric algebras can be traced back till the paper by Cayley [6] in 1857.
Translated in modern language, Cayley mentioned an identity which implies the
2010 Mathematics Subject Classification. 17A36; 17A30; 17A50; 15A72.
Key words and phrases. Free right-symmetric algebras, free Novikov algebras, noncommutative
invariant theory.
Partially supported by Grant I02/18 "Computational and Combinatorial Methods in Algebra
and Applications" of the Bulgarian National Science Fund.
1
2
VESSELIN DRENSKY
right-symmetric identity for the associators and holds for the right-symmetric Witt
algebra in d variables
equipped with the multiplication
∂fi
∂xj(cid:19) ∂
∂xi
.
fi ∈ K[Xd])
W rsym
d
fi
∂
∂xi
=( d
Xi=1
∂xj(cid:19) =(cid:18)fj
∂xi(cid:19) ∗(cid:18)fj
∂
∂
(cid:18)fi
d
Cayley also considered the realization of W rsym
in terms of rooted trees. Later
right-symmetric algebras were studied under different names: Vinberg, Koszul,
Gerstenhaber, and pre-Lie algebras, see the references in [20]. The opposite algebras
of Novikov algebras (satisfying the left-symmetric identity for the associators and
right commutativity) appeared in the paper by Gel'fand and Dorfman [22]. There
the authors gave an algebraic approach to the notion of Hamiltonian operator in
finite-dimensional mechanics and the formal calculus of variations. Independently,
later Novikov algebras were rediscovered by Balinskii and Novikov in the study of
equations of hydrodynamics [2], see also the survey article by Novikov [31]. (Due
to the contributions in [22, 2] and [31] Bokut, Chen, and Zhang [4] suggest to call
these algebras Gel'fand-Dorfman-Novikov algebras. We shall continue to keep the
name Novikov algebras.) An example of a Novikov algebra is the right-symmetric
Witt algebra W rsym
in one variable. In a series of papers, see, e.g., [20, 18, 19]
Dzhumadil'daev, with coauthors or alone, has studied free right-symmetric and
free Novikov algebras, with applications to nonassociative algebras with polynomial
identities.
1
In commutative invariant theory one usually considers the general linear group
GLd(K) with its canonical action on the d-dimensional vector space Vd with basis
{e1, . . . , ed}. This induces an action on the polynomial algebra K[Xd] = K[x1, . . . , xd]
in d variables
g(f (v)) = f (g−1(v)),
g ∈ GLd(K), v ∈ Vd,
where the linear functions xi : Vd → K are defined by
xi(ej) = δij,
i, j = 1, . . . , d,
and δij is the Kronecker symbol. For our noncommutative considerations it is
more convenient to suppress one step and, replacing V with its dual space V ∗, to
assume that GLd(K) acts canonically on the vector space KXd with basis Xd =
{x1, . . . , xd}. Then, identifying the polynomial algebra K[Xd] with the symmetric
algebra of KXd, we extend diagonally this action of GLd(K) on K[Xd]:
g(f (Xd)) = g(f (x1, . . . , xd)) = f (g(x1), . . . , g(xd)),
(3)
g ∈ GLd(K), f (Xd) ∈ K[Xd].
In this way GLd(K) acts as the group of linear
automorphisms of K[Xd]. For a subgroup G of GLd(K) the algebra of G-invariants
is
K[Xd]G = {f ∈ K[Xd] g(f ) = f for all g ∈ G}.
This is a Z-graded vector space and its Hilbert (or Poincar´e) series is the formal
power series
H(K[Xd]G, z) =Xn≥0
dim(K[Xd]G)nzn,
INVARIANT THEORY OF RELATIVELY FREE ALGEBRAS
3
where (K[Xd]G)n is the homogeneous component of degree n in K[Xd]G. The
following are among the main problems related with the description of the algebra
K[Xd]G for different groups or classes of groups G. For details concerning also
computational and algorithmic problems see [9] or [35].
• Is the algebra K[Xd]G finitely generated? This problem was the main moti-
vation for the Hilbert 14th problem in his famous lecture "Mathematische
Probleme" given at the International Congress of Mathematicians held in
It is known that K[Xd]G is finitely generated for fi-
1900 in Paris [25].
nite groups (the theorem of Emmy Noether [30]), for reductive groups (the
Hilbert-Nagata theorem, see e.g., [11]), and for groups close to reductive
(see e.g., Grosshans [23] and Hadziev [24]). The first example of an algebra
of invariants K[Xd]G which is not finitely generated is due to Nagata [29].
• If K[Xd]G is finitely generated, describe it in terms of generators and defin-
In different degree of generality this problem is solved for
ing relations.
classes of groups. For example, the theorem of Emmy Noether [30] gives
that for finite groups the algebra K[Xd]G is generated by invariants of de-
gree ≤ G. Also for finite groups, the Chevalley-Shephard-Todd theorem
[7, 33] states that the algebra K[Xd]G is isomorphic to the polynomial alge-
bra in d variables (i.e., it is generated by a set of d algebraically independent
invariants) if and only if G is generated by pseudo-reflections.
• Calculate the Hilbert series H(K[Xd]G, z). For finite groups the answer is
given by the Molien formula [28]
H(K[Xd]G, z) =
1
G Xg∈G
1
det(1 − gz)
.
The analogue for reductive and close to them groups is the Molien-Weyl
integral formula [37], see also [38].
In noncommutative invariant theory one replaces the polynomial algebras K[Xd]
with other noncommutative or nonassociative algebras still keeping some of the typ-
ical features of polynomial algebras. One such feature is the universal property that
for an arbitrary commutative algebra A every mapping Xd → A is extended to a ho-
momorphism K[Xd] → A. In the noncommutative set-up the class of commutative
algebras is replaced by an arbitrary variety of algebras V and instead on K[Xd]G
one studies the algebra of G-invariants Fd(V)G of the d-generated relatively free
algebra Fd(V) in V, d ≥ 2. For a background see the surveys [21, 13]. Comparing
with commutative invariant theory, when K[Xd]G is finitely generated for all "nice"
groups, the main difference in the noncommutative case is that Fd(V)G is finitely
generated quite rarely. For a survey on invariants of finite groups G acting on rel-
atively free associative algebras see [21, 13] and [26]. For finite groups G 6= h1i and
varieties of Lie algebras Fd(V)G is finitely generated if and only if V is nilpotent,
see [5, 12].
Concerning the Hilbert series of Fd(V)G, for G finite there is an analogue of the
Molien formula, see Formanek [21]. Let
H(Fd(V), z1, . . . , zd) = Xni≥0
dim Fd(V)(n1,...,nd)zn1
1 · · · znd
d
be the Hilbert series of Fd(V) as a multigraded vector space. It is equal to the
generating function of the dimensions of the vector spaces Fd(V)(n1,...,nd) of the
4
VESSELIN DRENSKY
elements in Fd(V) which are homogeneous of degree ni in xi. If ξ1(g), . . . , ξd(g)
are the eigenvalues of g ∈ G, then the Hilbert series of the algebra of invariants
Fd(V)G is
H(Fd(V)G; z) =
H(Fd(V); ξ1(g)z, . . . , ξd(g)z).
1
G Xg∈G
There is also an analogue of the Molien-Weyl formula for the Hilbert series of
Fd(V)G which combines ideas of De Concini, Eisenbud, and Procesi [8] and Almkvist,
Dicks, and Formanek [1]. Evaluating the corresponding multiple integral one uses
the Hilbert series of Fd(V) instead of the Hilbert series of K[Xd]
H(K[Xd], z1, . . . , zd) =
1
1 − zi
.
d
Yi=1
We refer to [3] for other methods for computing the Hilbert series of Fd(V)G when
G is isomorphic to the special linear group SLm(K) or to the group U Tm(K) of
the m × m unitriangular matrices.
In this paper we study invariant theory of relatively free right-symmetric and
Novikov algebras. Let L be the variety of right-symmetric algebras which are left-
nilpotent of class 3, i.e., L is the subvariety of R satisfying the polynomial identity
x1(x2x3) = 0.
1 ]-module. If (A2
d)G is not finitely generated as a K[(Ad)G
(4)
For a large class of subgroups G of GLd(K), G 6= h1i, d > 1, we show that Fd(V)G
is not finitely generated for any variety V containing L. More precisely, let Ad =
K[Xd]+ be the algebra of polynomials without constant term and let (Ad)G
1 =
(KXd)G be the vector space of linear polynomials fixed by G. Clearly, (A2
d)G is a
K[(Ad)G
1 ]-module, then
Fd(V)G is not finitely generated for any V containing L. The class of such groups
G contains all finite groups. It contains also the classical and close to them groups
under some natural restrictions on the embedding into GLd(K). In particular, if
(Ad)G
d)G 6= 0, then Fd(V)G is not finitely generated. Results in the
same spirit hold if we replace the polynomial algebra K[Xd] with the free metabelian
Lie algebra Fd(A2) = Ld/L′′
d, where Ld is the free Lie algebra freely generated by
Xd and A2 is the variety of all metabelian (solvable of class 2) Lie algebras.
If
1 = 0 and dim Fd(A2)G = ∞, then again Fd(V)G is not finitely
(KXd)G = (Ad)G
generated.
1 = 0 and (A2
1. Preliminaries
We fix a field K of characteristic 0. All vector spaces and algebras will be over
K. Let
F (X) = K{X} = K{x1, x2, . . .}
be the (absolutely) free nonassociative algebra freely generated by the countable
set X = {x1, x2, . . .}. Recall that the polynomial f (x1, . . . , xm) ∈ K{X} is a
polynomial identity for the algebra A if f (a1, . . . , am) = 0 for all a1, . . . , am ∈ A.
The class of all algebras satisfying a given set U ⊂ K{X} of polynomial identities is
called the variety of associative algebras defined by the system U . If V is a variety,
then T (V) is the ideal of K{X} consisting of all polynomial identities of V. Let
Xd = {x1, . . . , xd} ⊂ X. Then the algebra
Fd(V) = K{x1, . . . , xd}/(K{x1, . . . , xd} ∩ T (V)) = K{Xd}/(K{Xd} ∩ T (V))
INVARIANT THEORY OF RELATIVELY FREE ALGEBRAS
5
is the relatively free algebra of rank d in V. We shall denote the generators of Fd(V)
with the same symbols Xd. The ideals K{Xd} ∩ T (V) of K{Xd} are preserved by
all endomorphisms ϕ of K{Xd}, i.e., ϕ(K{Xd} ∩ T (V)) ⊆ K{Xd} ∩ T (V).
In
particular, GLd(K)(K{Xd} ∩ T (V)) = K{Xd} ∩ T (V). Here the general linear
group GLd(K) acts canonically on the vector space KXd with basis Xd and this
action is extended diagonally on the whole Fd(V) as in (3). Hence Fd(V) has a
natural structure of a GLd(K)-module. For a background on representation theory
of GLd(K) see, e.g., [27, 38]. Since char(K) = 0, the algebra Fd(V) is a direct sum
of irreducible GLd(K)-modules and
Fd(V) =X mλ(V)Wd(λ),
where Wd(λ) is the irreducible polynomial GLd(K)-module corresponding to the
partition λ = (λ1, . . . , λd), λ1 ≥ · · · ≥ λd ≥ 0, and mλ(V) is the multiplicity of
Wd(λ) in the decomposition of Fd(V). Then the Hilbert series of Fd(V) is
H(Fd(V), z1, . . . , zd) =X mλ(V)Sλ(z1, . . . , zd),
where Sλ(z1, . . . , zd) is the Schur function corresponding to λ. Since the Schur
functions form a basis of the vector space K[Xd]Sn of symmetric polynomials in d
variables, the Hilbert series H(Fd(V), z1, . . . , zd) determines the GLd(K)-module
structure of Fd(V).
In the sequel we shall need some well known information for two relatively
free algebras: the polynomial algebra K[Xd] and the free metabelian Lie algebra
Fd(A2) = Ld/L′′
d.
Lemma 1.1. (i) The GLd(K)-module structure of the polynomial algebra K[Xd]
is
K[Xd] =Xn≥0
Wd(n).
(ii) The free metabelian Lie algebra Fd(A2) has a basis
{xi, [[· · · [xi1 , xi2 ], . . .], xin ] i, ij = 1, . . . , d, i1 > i2 ≤ · · · ≤ in}.
The GLd(K)-module structure of Fd(A2) is
Fd(A2) = Wd(1) +Xn≥2
Wd(n − 1, 1).
Part (i) of the lemma is well known. Part (ii) is also well known, see e.g., [34,
§52, pp. 274-276 of the English translation] for the basis of Fd(A2) and [17, the
proof of Lemma 2.5] for its GLd(K)-module structure.
The product of two Schur functions Sλ(z1, . . . , zd)Sµ(z1, . . . , zd) can be expressed
as a sum of Schur functions using the Littlewood-Richardson rule. A very special
case of this rule is the Branching theorem, when µ = (1). It states that
Sλ(z1, . . . , zd)S(1)(z1, . . . , zd) =X Sν(z1, . . . , zd),
where the sum runs on all partitions ν = (ν1, . . . , νd) obtained by adding 1 to one
of the components λi of λ = (λ1, . . . , λd).
In other words, the Young diagram
of ν is obtained by adding a box to the diagram of λ. Since the product of two
Schur functions corresponds to the tensor product of the corresponding irreducible
GLd(K)-modules, we obtain equivalently
(5)
Wd(λ) ⊗K Wd(1) =X Wd(ν),
(6)
6
VESSELIN DRENSKY
with the same summation on ν as in (5).
If G is a subgroup of GLd(K), then the GLd(K)-action on the irreducible
GLd(K)-module Wd(λ) induces a G-action on Wd(λ). Let Wd(λ)G be the vec-
tor space of the elements of Wd(λ) fixed by G, i.e., of the G-invariants of Wd(λ). If
W is a graded GLd(K)-module with polynomial homogeneous components,
mλ(k)Wd(λ),
then its Hilbert series is
W =Mk≥0
Wk, Wk =Xλ
H(W, z1, . . . , zd, z) =Xk≥0
Xni≥0
=Xk≥0Xλ
dim(Wk)(n1,...,nd)zn1
1 · · · znd
mλ(k)Sλ(z1, . . . , zd)zk.
(7)
(8)
d
zk
Lemma 1.2. Let W be a graded GLd(K)-module with polynomial homogeneous
components, as in (7), and let G be a subgroup of GLd(K). Then the Hilbert series
of the G-invariants of W
H(W G, z) =Xk≥0
dim W G
k zk
is determined from the Hilbert series (8) of W .
Proof. We follow the main ideas of the recent preprint [10] which contains more
applications in the spirit of the lemma. Since the dimension of Wd(λ)G depends on
Wd(λ) only, and the Schur functions Sλ(z1, . . . , zd) are in 1-1 correspondence with
the modules Wd(λ), we conclude that dim Wd(λ)G is a function of Sλ(z1, . . . , zd).
This immediately completes the proof because
H(W G, z) =Xk≥0 Xλ
mλ(k) dim Wd(λ)G! zk.
(cid:3)
The proof of the next statement can be found in [16, Proposition 4.2] in the case
of homomorphic images of the free associative algebra KhXdi. The proof in the
case below is exactly the same.
Proposition 1.3. Let I be an ideal of the relatively free algebra Fd(W) of the
variety W and let I be preserved under the GLd(K)-action on Fd(W). If G is a
subgroup of GLd(K), then every G-invariant of the factor algebra Fd(W)/I can be
lifted to a G-invariant of Fd(W), i.e., under the canonical homomorphism
π : Fd(W) → Fd(W)/I
Fd(W)G maps onto (Fd(W)/I)G. In particular, if V is a subvariety of the variety
W and π : Fd(W) → Fd(V), then
π(Fd(W)G) = Fd(V)G.
For more details on varieties of algebras (in the associative case) and the ap-
plications of representation theory of GLd(K) to PI-algebras we refer to the book
[14].
INVARIANT THEORY OF RELATIVELY FREE ALGEBRAS
7
2. The main result
Let L be the subvariety of the variety of right-symmetric algebras R defined
by the identity (4) of left-nilpotency of class 3. Since the identity (2) of left-
commutativity is a consequence of (4), L is also a subvariety of the variety N of
Novikov algebras. Working in L, the only nonzero products are left-normed. We
shall omit the parentheses and shall write a1a2 · · · an instead of (· · · (a1a2) · · · )an
and a1ak
.
2 instead of a1 a2 · · · a2
k times
{z }
Lemma 2.1. (i) The relatively free algebra Fd(L) has a basis
{xi1 xi2 · · · xin i1 = 1, . . . , d,
1 ≤ i2 ≤ · · · ≤ in ≤ d}.
(ii) The GLd(K)-module structure of Fd(L) is
Fd(L) = Wd(1) +Xn≥2
(Wd(n) + Wd(n − 1, 1)).
Proof. (i) Modulo the identity (4) the right-symmetric identity (1) reduces to
Hence L satisfies the identity
x1x2x3 = x1x3x2.
(9)
(10)
(11)
x1x2 · · · xn = x1xσ(2) · · · xσ(n),
σ ∈ Sn, σ(1) = 1,
and the algebra Fd(L) is spanned as a vector space on the elements (9). In order
to show that (9) is a basis of Fd(L) it is sufficient to construct an algebra A in L
which is generated by a1, . . . , ad and has a basis
{aian1
1 · · · and
d i1 = 1, . . . , d, nj ≥ 0}.
(12)
Since A is a homomorphic image of Fd(L), this would imply that (9) is a basis
of Fd(L). Consider the vector space A with basis (12) and define a multiplication
there by the rule
(aian1
1 · · · and
1 · · · and
d ) ∗ (aiam1
1
(aian1
d ) ∗ aj = aian1
1 · · · anj +1
j
· · · and
d ,
· · · amd
d ) = 0, if mj > 0 for some j.
Obviously A satisfies the identities (4) and (11), and hence belongs to L.
(ii) For n ≥ 2 we divide the basis elements from (9) in two groups. The first
group contains the monomials xi1 xi2 · · · xin with i1 ≤ i2 and the second group the
monomials with i1 > i2. Obviously, the monomials in the first group are in 1-1
correspondence with the monomials of degree ≥ 2 in K[Xd]. By Lemma 1.1 (ii),
the same holds for the monomials from the second group and the elements of degree
≥ 2 in Fd(A2). Hence the Hilbert series of Fd(L) is a sum of the Hilbert series of
the algebra of polynomials without constant term and the commutator ideal of the
Lie algebra Fd(A2). Now the proof follows from Lemma 1.1.
(cid:3)
The construction in the proof of Lemma 2.1 (i) suggests that the algebra Fd(L)
has the structure of a right K[Xd]-module with action defined by
(xpxn1
1 · · · xdnd) ◦ (xm1
1
Clearly, the ideal F 2
d (L) of the elements in Fd(L) without linear term is a K[Xd]-
submodule. We shall denote by (Ad)1 the vector space KXd and shall identify
K[Xd] and K[(Ad)1].
p = 1, . . . , d, nj, mj ≥ 0.
d ) = xpxn1+m1
· · · xnd+md
· · · xmd
1
,
d
8
VESSELIN DRENSKY
The following theorem and its consequences together with the examples in the
next section are the main results of the paper.
Theorem 2.2. Let V be a subvariety of the variety R of all right-symmetric al-
gebras and let V contain the variety L of left-nilpotent of class 3 algebras in R.
If G 6= h1i is a subgroup of GLd(K) such that the ideal F 2
d (L)G of the algebra of
invariants Fd(L)G is not finitely generated as a K[(Ad)G
1 ]-module, then the algebra
of G-invariants Fd(V)G is not finitely generated.
Proof. By Proposition 1.3 the canonical homomorphism Fd(V) → Fd(L) maps
Fd(V)G onto Fd(L)G and if Fd(V)G is finitely generated, the same is Fd(L)G.
Hence it is sufficient to show that Fd(L)G is not finitely generated. Therefore we
may work in Fd(L) and assume that Fd(L)G is finitely generated. As a vector
space Fd(L)G is a direct sum of the invariants of first degree (KXd)G = (Ad)G
1
and the invariants F 2
d (L)G without linear term. We may assume that Fd(L)G is
d (L)G. Since
generated by U = {u1, . . . , uk} ⊂ (Ad)G
Fd(L)GF 2
d (L)G = 0, the only nonzero products of the generators of Fd(L)G are
upui1 · · · uum, and wqui1 · · · uum, m ≥ 0. Hence KU = (Ad)G
1 ,
1 and W = {w1, . . . , wl} ⊂ F 2
F 2
d (L)G =
k
Xi=1
up1up2 ◦ K[(Ad)G
1 ] +
wq ◦ K[(Ad)G
1 ]
l
Xj=1
and F 2
d (L)G is a finitely generated K[(Ad)G
1 ]-module which is a contradiction. (cid:3)
Corollary 2.3. Let Ad = K[Xd]+ be the algebra of polynomials without constant
term and let G be a subgroup of GLd(K). If (A2
d)G is not finitely generated as a
K[(Ad)G
1 ]-module, then Fd(V)G is not finitely generated for any variety V contain-
ing L.
Proof. By the Branching theorem (6)
Wd(n − 1, 1) ⊗K Wd(1) = Wd(n, 1) ⊕ Wd(n − 1, 2) ⊕ Wd(n − 1, 1, 1).
(13)
Consider the GLd(K)-module decomposition of Fd(L) given in Lemma 2.1 (ii).
Since Fd(L)F 2
d (L) = 0, the only nonzero products Wd(λ)Wd(µ) with λ or µ equal
to (n − 1, 1), n ≥ 2, come from
Wd(n − 1, 1)Wd(1) = Wd(n − 1, 1)Fd(L) = Wd(n − 1, 1)(KXd) = Wd(n − 1, 1)(Ad)1.
This is a homomorphic image in Fd(L) of Wd(n − 1, 1) ⊗K Wd(1). By (13) we derive
that Wd(n − 1, 1)Fd(L) ⊂ Wd(n, 1). This implies that
is an ideal of Fd(L) and the GLd(K)-module structure of the factor algebra is
I =Xn≥2
Fd(L)/I =Xn≥1
Wd(n − 1, 1) ⊂ Fd(L)
Wd(n) ∼= Ad.
Hence the algebras Fd(L)/I and Ad have the same Hilbert series and by Lemma
1.2 the same holds for their algebras of invariants. Since (A2
d)G is not finitely gen-
erated as a K[(Ad)G
d (L)/I.
By Proposition 1.3, the K[(Ad)G
d (L) is not finitely generated and the
application of Theorem 2.2 completes the proof.
(cid:3)
1 ]-module, the same is true for the K[(Ad)G
1 ]-module F 2
1 ]-module F 2
INVARIANT THEORY OF RELATIVELY FREE ALGEBRAS
9
Corollary 2.4. Let Fd(A2) be the free metabelian Lie algebra and let G be a sub-
1 = 0 and dim Fd(A2)G = ∞, then Fd(V)G
group of GLd(K). If (KXd)G = (Ad)G
is not finitely generated for any variety V containing L.
1 = 0 we obtain that Fd(L)G = F 2
Proof. Since (KXd)G = (Ad)G
d (L)G. Hence the
algebra Fd(L)G is with trivial multiplication and the finite generation is equivalent
to the finite dimensionality. As a GLd(K)-module Fd(A2) is a homomorphic image
of Fd(L). Hence the vector space Fd(A2)G is a homomorphic image of Fd(L)G.
This implies that dim F 2
d (L)G = ∞, i.e., both the algebras Fd(L)G and Fd(V)G are
not finitely generated.
(cid:3)
Remark 2.5. In Corollary 2.4 we cannot remove directly the restriction (KXd)G =
0, as in Corollary 2.3, because the GLd(K)-submodule I =Pn≥2 Wd(n) of Fd(L)
is not an ideal. For example, one can show that Wd(2)(KXd) = Wd(3) ⊕ Wd(2, 1).
Hence we cannot use the property that the Lie algebra Fd(A2)G is not finitely
generated to show that the algebra Fd(L) is also not finitely generated. On the other
hand, we do not know examples of groups G when (KXd)G = 0, K[Xd]G = K, and
dim Fd(A2)G = ∞. Such an example would show that we may apply Corollary 2.4
when we cannot apply Corollary 2.3.
3. Examples
All examples in this section use the following statement which is a consequence
of Corollary 2.3.
Proposition 3.1. If for a subgroup G of GLd(K)
transcend.deg(K[Xd]G) > dim(KXd)G,
then the algebra Fd(V)G is not finitely generated for any variety V containing L.
Proof. Let t = transcend.deg(K[Xd]G). Since K[Xd]G is graded, we may choose
t algebraically independent homogeneous elements in AG
d = (K[Xd]+)G. If m =
dim(KXd)G, changing linearly the variables Xd we assume that (KXd)G has a basis
1 ] = K[Xm]. Since t > m, we obtain that ((Ad)2)G
Xm = {x1, . . . , xm} and K[(Ad)G
contains an element f (Xd), such that the system Xm ∪ {f (Xd)} is algebraically
independent. Hence the K[Xm]-module generated by the powers f k(Xd), k =
1, 2, . . ., is not finitely generated. Now the proof follows from Corollary 2.3.
(cid:3)
3.1. Finite groups.
Theorem 3.2. Let G be a finite subgroup of GLd(K) and G 6= h1i. Then the
algebra Fd(V)G is not finitely generated for any variety V containing L.
Proof. It is well known that for a finite group G
transcend.deg(K[Xd]G) = transcend.deg(K[Xd]) = d.
(14)
For self-containedness of the exposition, every element f (Xd) ∈ K[Xd] satisfies the
equation
uf (z) = Yg∈G
(z − g(f (Xd))) = zG − c1zG−1 + c2zG−2 − · · · ± cG
10
VESSELIN DRENSKY
where the coefficients ck are equal to the elementary symmetric polynomials in
{g(f (Xd)) g ∈ G}. Hence ck ∈ K[Xd]G and as a K[Xd]G-module K[Xd] is
generated by
1 · · · xad
xa1
d ,
0 ≤ ai < G.
The finite generation of the K[Xd]G-module K[Xd] implies (14) and the theorem
follows from Proposition 3.1.
(cid:3)
3.2. Reductive groups. If G ⊂ GLd(K) is a reductive group then there exists a
G-submodule W of KXd such that KXd = (KXd)G ⊕ W .
Proposition 3.3. In the above notation, if K[W ]G 6= K, then Fd(V)G is not
finitely generated for all V containing L.
Proof. Since the elements of K[W ] cannot be expressed as polynomials in (KXd)G,
the condition K[W ]G 6= K implies that
transcend.deg(K[Xd]G) = dim(KXd)G + transcend.deg(K[W ]G) > dim(KXd)G
and this completes the proof in virtue of Proposition 3.1.
(cid:3)
Example 3.4. For each k ≥ 1 there is a unique irreducible rational k-dimensional
SL2(K)-module Wk. Let the subgroup G of GLd(K) be isomorphic to SL2(K) and
KXd ∼= Wk1 ⊕ · · · ⊕ Wkp
It is well known that if k1 ≥ 3, then K[Wk1 ] contains
as an SL2(K)-module.
nontrivial SL2(K)-invariants. Similarly, K[W2 ⊕ W2]SL2(K) 6= K. Hence the only
cases when K[Xd]SL2(K) = K[(KXd)SL2(K)] are k1 = 2, k2 = · · · = kp = 1 when
K[Xd]SL2(K) = K[(KXd)SL2(K)] ∼= K[Xd−1] and k1 = · · · = kp = 1 with the trivial
action of SL2(K) on KXd (and the latter case is impossible because G ∼= SL2(K)
is a nontrivial subgroup of GLd(K)).
3.3. Weitzenbock derivations. A linear operator δ of an algebra A is a derivation
if
δ(uv) = δ(u)v + uδ(v),
u, v ∈ A.
If V is a variety of algebras, then every mapping δ : Xd → Fd(V) can be uniquely
extended to a derivation of Fd(V) which we shall denote by the same symbol δ.
If δ is a nilpotent linear operator on KXd, then the induced derivation is called
a Weitzenbock derivation. Weitzenbock [36] proved that in the case of polynomial
algebras the algebra of constants
K[Xd]δ = {f (Xd) ∈ K[Xd] δ(f (Xd)) = 0}
is finitely generated. Details on the algebra of constants K[Xd]δ can be found in the
book by Nowicki [32]. For varieties V of unitary associative algebras (and δ 6= 0)
the algebra Fd(V)δ is finitely generated if and only if V does not contain the algebra
T2(K) of 2 × 2 upper triangular matrices, see [15, 16]. Up to a change of the basis
of KXd the Weitzenbock derivation δ is determined by the Jordan normal form
J(δ) of the linear operator δ acting on KXd. Since δ acts nilpotently on KXd, the
matrix J(δ) consists of Jordan blocks with zero diagonals.
Proposition 3.5. If d > 2 and the Jordan normal form J(δ) of the Weitzenbock
derivation consists of less than d − 1 blocks, then the algebra Fd(V)δ is not finitely
generated for any variety V containing the variety L.
INVARIANT THEORY OF RELATIVELY FREE ALGEBRAS
11
Proof. Since αδ, α ∈ K, is nilpotent on KXd, it is a locally nilpotent deriva-
tion of Fd(V), i.e., for every f (Xd) ∈ Fd(V) there exists an n ≥ 1 such that
(αδ)n(f (Xd)) = 0. Hence
exp(αδ) = 1 +
αδ
1!
+
(αδ)2
2!
+ · · ·
is a well defined linear automorphism of Fd(V). It is well known that the group
{exp(αδ) α ∈ K}
is isomorphic to the unipotent group U T2(K) and
Fd(V)δ = Fd(V)U T2(K).
If the matrix J(δ) consists of p blocks, then the dimension of the vector space
(KXd)δ of the linear constants is equal to the number of the blocks p. Reading
carefully [32, Proposition 6.5.1, p. 65] we can see that
transcend.deg(K[Xd]δ) = d − 1
which is larger than p = dim(KXd)δ. Now the proof follows from Proposition 3.1
applied for U T2(K) ⊂ GLd(K).
(cid:3)
Remark 3.6. If in Proposition 3.5 the Jordan normal form of δ consists of d − 1
blocks, then the algebra of constants K[Xd]δ is generated by linear constants. In
this case we may assume that δ(x1) = x2 and δ(xi) = 0 for i = 2, . . . , d. It is easy
to see that Fd(L)δ is generated by x1x2 − x2x1, x2, . . . , xd. We do not know how
far can be lifted to Fd(V) the finite generation property of the algebra of constants
and do not have a description of the varieties V containing L such that the algebra
Fd(V)δ is finitely generated.
References
[1] G. Almkvist, W. Dicks, E. Formanek, Hilbert series of fixed free algebras and noncommutative
classical invariant theory, J. Algebra 93 (1985), 189-214.
[2] A.A. Balinskii, S.P. Novikov, Poisson brackets of hydrodynamic type, Frobenius algebras and
Lie algebras (Russian), Dokl. Akad. Nauk SSSR 283 (1985), No. 5, 1036-1039. Translation:
Sov. Math., Dokl. 32 (1985), 228-231.
[3] F. Benanti, S. Boumova, V. Drensky, G.K. Genov, P. Koev, Computing with rational sym-
metric functions and applications to invariant theory and PI-algebras, Serdica Math. J. 38
(2012), Nos 1-3, 137-188.
[4] L.A. Bokut, Y. Chen, Z. Zhang, On free Gelfand-Dorfman-Novikov-Poisson algebras and a
PBW theorem, arXiv:1604.06676v1 [math.RA].
[5] R.M. Bryant, On the fixed points of a finite group acting on a free Lie algebra, J. Lond.
Math. Soc., II. Ser. 43 (1991), No. 2, 215-224.
[6] A. Cayley, On the theory of analitical forms called trees, Phil. Mag. 13 (1857), 19-30. Col-
lected Math. Papers, University Press, Cambridge, vol. 3, 1890, 242-246.
[7] C. Chevalley, Invariants of finite groups generated by reflections, Amer. J. Math. 67 (1955),
778-782.
[8] C. De Concini, D. Eisenbud, C. Procesi, Young diagrams and determinantal varieties, Invent.
Math. 56 (1980), 129-165.
[9] H. Derksen, G. Kemper, Computational Invariant Theory, Invariant Theory and Algebraic
Transformation Groups, I. Encyclopaedia of Mathematical Sciences, 130, Springer-Verlag,
Berlin, 2002.
[10] M. Domokos, V. Drensky, Rationality of Hilbert series in noncommutative invariant theory,
arXiv:1512.06411v1 [math.RA].
[11] J.A. Dieudonn´e, J.B. Carrell, Invariant Theory, Old and New, Academic Press, New York-
London, 1971.
12
VESSELIN DRENSKY
[12] V. Drensky, Fixed algebras of residually nilpotent Lie algebras, Proc. Amer. Math. Soc. 120
(1994), 1021-1028.
[13] V. Drensky, Commutative and noncommutative invariant theory, Math. and Education in
Math., Proc. of the 24-th Spring Conf. of the Union of Bulgar. Mathematicians, Svishtov,
April 4-7, 1995, Sofia, 1995, 14-50.
[14] V. Drensky, Free Algebras and PI-Algebras, Springer-Verlag, Singapore, 1999.
[15] V. Drensky, Invariants of unipotent transformations acting on noetherian relatively free al-
gebras, Serdica Math. J. 30 (2004), 395-404.
[16] V. Drensky, C.K. Gupta, Constants of Weitzenbock derivations and invariants of unipotent
transformations acting on relatively free algebras, J. Algebra 292 (2005), 393-428.
[17] V. Drensky, A. Kasparian, Polynomial identities of eighth degree for 3×3 matrices, Annuaire
de l'Univ. de Sofia, Fac. de Math. et Mecan., Livre 1, Math. 77 (1983), 175-195.
[18] A.S. Dzhumadildaev, Codimension growth and non-Koszulity of Novikov operad, Commun.
Algebra 39 (2011), No. 8, 2943-2952.
[19] A.S. Dzhumadildaev, N.A. Ismailov, Sn- and GLn-module structures on free Novikov alge-
bras, J. Algebra 416 (2014), 287-313.
[20] A.S. Dzhumadil'daev, C. Lofwall, Trees, free right-symmetric algebras, free Novikov algebras
and identities, The Roos Festschrift volume, 1, Homology Homotopy Appl. 4 (2002), No. 2,
Part 1, 165-190.
[21] E. Formanek, Noncommutative invariant theory, Contemp. Math. 43, 1985, 87-119.
[22] I.M. Gel'fand, I.Ya. Dorfman, Hamiltonian operators and algebraic structures structures re-
lated to them (Russian), Funktsional. Anal. i Prilozhen. 13 (1979), No. 4, 13-30. Translation:
Funct. Anal. Appl. 13 (1980), 248-262.
[23] F. D. Grosshans, Algebraic Homogeneous Spaces and Invariant Theory, Lecture Notes in
Mathematics, 1673, Springer-Verlag, Berlin, 1997.
[24] Dz. Hadziev, Some questions in the theory of vector invariants (Russian), Mat. Sb. (NS)
72(114), (1967), 420-435. Translation: Math. USSR, Sb. 1 (1967), 383-396.
[25] D. Hilbert, Mathematische Probleme, Archiv f. Math. u. Phys. 1 (1901), 44-63, 213-
237; reprinted in "Gesammelte Abhandlungen, Band III, Analysis, Grundlagen der Math-
ematik, Physik, Verschiedenes, Lebensgeschichte", Zweite Auflage, Springer-Verlag, Berlin-
Heidelberg-New York, 1970, 290-329.
[26] O.G. Kharlampovich, M.V. Sapir, Algorithmic problems in varieties, Intern. J. Algebra and
Computation 5 (1995), 379-602.
[27] I.G. Macdonald, Symmetric Functions and Hall Polynomials, Oxford Univ. Press (Claren-
don), Oxford, 1979, Second Edition, 1995.
[28] T. Molien, Uber die Invarianten der linearen Substitutionsgruppen, Sitz. Konig Preuss. Akad.
Wiss. (1897), No. 52, 1152-1156.
[29] M. Nagata, On the 14th problem of Hilbert, Amer. J. Math. 81 (1959), 766-772.
[30] E. Noether, Der Endlichkeitssatz der Invarianten endlicher Gruppen, Math. Ann. 77 (1916),
89-92; reprinted in "Gesammelte Abhandlungen. Collected Papers", Springer-Verlag, Berlin-
Heidelberg-New York-Tokyo, 1983, 181-184.
[31] S.P. Novikov, Geometry of conservative systems of hydrodynamic type. The method of aver-
aging for field-theoretical systems (Russian), International conference on current problems in
algebra and analysis (Moscow-Leningrad, 1984), Uspekhi Mat. Nauk 40 (1985), No. 4(244),
79-89. Translation: Russ. Math. Surv. 40 (1985), No.4, 85-98.
[32] A. Nowicki, Polynomial Derivations and Their Rings of Constants, Uniwersytet Mikolaja
Kopernika, Torun, 1994. www-users.mat.umk.pl/anow/ps-dvi/pol-der.pdf
[33] G.C. Shephard, J.A. Todd, Finite unitary reflection groups, Canad. J. Math. 6 (1954), 274-
304.
[34] A.L. Shmel'kin, Free polynilpotent groups, Izv. Akad. Nauk SSSR Ser. Mat. 28 (1964), 91-
122. Translation: Amer. Math. Soc. Transl. Ser. 2, 55, Amer. Math. Soc., Providence, RI,
1966, 270-304.
[35] B. Sturmfels, Algorithms in Invariant Theory, Second Edition, Texts and Monographs in
Symbolic Computation, Springer-Wien-New York, Vienna, 2008.
[36] R. Weitzenbock, Uber die Invarianten von linearen Gruppen, Acta Math. 58 (1932), 231-293.
[37] H. Weyl, Zur Darstellungstheorie und Invariantenabzahlung der projektiven, der Komplex-
und der Drehungsgruppe, Acta Math. 48 (1926), 255-278; reprinted in "Gesammelte Abhand-
lungen", Band III, Springer-Verlag, Berlin - Heidelberg - New York, 1968, 1-25.
INVARIANT THEORY OF RELATIVELY FREE ALGEBRAS
13
[38] H. Weyl, The Classical Groups. Their Invariants and Representations, Princeton Univ. Press,
Princeton, N.J., 1946, New Edition: Princeton Landmarks in Mathematics, 1997.
Institute of Mathematics and Informatics, Bulgarian Academy of Sciences, 1113
Sofia, Bulgaria
E-mail address: [email protected]
|
1411.1382 | 2 | 1411 | 2016-03-29T09:21:20 | The ring of polynomials integral-valued over a finite set of integral elements | [
"math.RA"
] | Let $D$ be an integral domain with quotient field $K$ and $\Omega$ a finite subset of $D$. McQuillan proved that the ring ${\rm Int}(\Omega,D)$ of polynomials in $K[X]$ which are integer-valued over $\Omega$, that is, $f\in K[X]$ such that $f(\Omega)\subset D$, is a Pr\"ufer domain if and only if $D$ is Pr\"ufer. Under the further assumption that $D$ is integrally closed, we generalize his result by considering a finite set $S$ of a $D$-algebra $A$ which is finitely generated and torsion-free as a $D$-module, and the ring ${\rm Int}_K(S,A)$ of integer-valued polynomials over $S$, that is, polynomials over $K$ whose image over $S$ is contained in $A$. We show that the integral closure of ${\rm Int}_K(S,A)$ is equal to the contraction to $K[X]$ of ${\rm Int}(\Omega_S,D_F)$, for some finite subset $\Omega_S$ of integral elements over $D$ contained in an algebraic closure $\bar K$ of $K$, where $D_F$ is the integral closure of $D$ in $F=K(\Omega_S)$. Moreover, the integral closure of ${\rm Int}_K(S,A)$ is Pr\"ufer if and only if $D$ is Pr\"ufer. The result is obtained by means of the study of pullbacks of the form $D[X]+p(X)K[X]$, where $p(X)$ is a monic non-constant polynomial over $D$: we prove that the integral closure of such a pullback is equal to the ring of polynomials over $K$ which are integral-valued over the set of roots $\Omega_p$ of $p(X)$ in $\bar K$. | math.RA | math | J. Commut. Algebra 8 (2016), no. 1, 113-141. http://dx.doi.org/10.1216/JCA-2016-8-1-113.
The ring of polynomials integral-valued over a finite set of
6
1
0
2
r
a
M
9
2
integral elements
Giulio Peruginelli∗
July 24, 2018
Abstract
]
.
A
R
h
t
a
m
[
2
v
2
8
3
1
.
1
1
4
1
:
v
i
X
r
a
Let D be an integral domain with quotient field K and Ω a finite subset of D. McQuillan
proved that the ring Int(Ω, D) of polynomials in K[X] which are integer-valued over Ω, that
is, f ∈ K[X] such that f (Ω) ⊂ D, is a Prufer domain if and only if D is Prufer. Under the
further assumption that D is integrally closed, we generalize his result by considering a finite
set S of a D-algebra A which is finitely generated and torsion-free as a D-module, and the ring
IntK(S, A) of integer-valued polynomials over S, that is, polynomials over K whose image over
S is contained in A. We show that the integral closure of IntK (S, A) is equal to the contraction
to K[X] of Int(ΩS, DF ), for some finite subset ΩS of integral elements over D contained in an
algebraic closure K of K, where DF is the integral closure of D in F = K(ΩS). Moreover,
the integral closure of IntK (S, A) is Prufer if and only if D is Prufer. The result is obtained
by means of the study of pullbacks of the form D[X] + p(X)K[X], where p(X) is a monic
non-constant polynomial over D: we prove that the integral closure of such a pullback is equal
to the ring of polynomials over K which are integral-valued over the set of roots Ωp of p(X) in
K.
Keywords: Pullback, Integral closure, Integer-valued polynomial, Divided differences, Prufer ring. MSC
Classification codes: 13B25 (primary), 13F20, 13B22, 13F05 (secondary).
1
Introduction
Rings of integer-valued polynomials are a prominent source for providing examples of non-Noetherian Prufer
domains (see the book [6, Chapt. VI, p. 123]). Throughout this paper, D is an integral domain which is
not a field, and K is its quotient field. We denote by K a fixed algebraic closure of K and by D the integral
closure of D in K. We give the following definition, which generalizes the classical definition of the ring of
integer-valued polynomials over a subset ([6, Chapt. I.1, p. 3]).
Definition 1.1. Let R be an integral domain containing D. Let F be the quotient field of R (so that
K ⊆ F ). For a subset Ω of F we set
∗Department of Mathematics, University of Padova, Via Trieste, 63 35121 Padova, Italy. E-mail: gperu-
[email protected]
IntK(Ω, R) + {f ∈ K[X] f (Ω) ⊂ R},
1
which is the ring of polynomials in K[X] which map every element of Ω into R. If F = K we omit the
subscript K. Thus, Int(Ω, R) is a subring of K[X] (the coefficients of the relevant polynomials are in the
quotient field of R).
In the case of a finite subset Ω of D, McQuillan studied the algebraic structure of the corresponding
ring of integer-valued polynomials Int(Ω, D), describing the spectrum of such a ring and also its additive
structure ([13]). Using McQuillan's arguments, in [5] Boynton observed that Int(Ω, D) fits in a pullback
diagram. Here we generalize this class of rings by considering first a finite set Ω of integral elements in
D and polynomials in K[X] which preserve the integrality of the elements of Ω, that is, for each α in Ω,
f (α) is integral over D; according to the above definition, this ring is denoted by IntK (Ω, D). For example,
given a monic non-constant polynomial p ∈ D[X], let Ωp be the set of roots of p(X) in a splitting field.
Then the ring IntK(Ωp, D) is of the above kind, and it is not difficult to show that the ring IntK (Ω, D),
for a finite set Ω of D, can be reduced to this case. More generally, we consider a finite set S of integral
elements over D which do not necessarily lie in an algebraic extension of K, i.e.: S is contained in a
D-algebra A, which is finitely generated and torsion-free as a D-module (for example, a matrix algebra
or a quaternion algebra). We consider then polynomials in K[X] which map the elements of S into A:
IntK (S, A) = {f ∈ K[X] f (S) ⊂ A}. Note that A is not necessarily commutative and may contain
zero-divisors, and each of its elements satisfies a monic polynomial over D.
Given a monic polynomial p(X) in D[X], the study of the ring IntK (Ωp, D) we are going to do goes
through another kind of pullback ring. As for the rings IntK (Ω, D), the rings we introduce now are the
pullbacks of the canonical residue map K[X] ։
p(X)K[X] , thus
they are subrings of K[X] sharing with K[X] the ideal p(X)K[X].
p(X)K[X] with respect to some subring of
K[X]
K[X]
Definition 1.2. Let p(X) be a non-constant monic polynomial in D[X]. We consider the following subring
of K[X]:
D(p) + D[X] + p(X) · K[X] = {r(X) + p(X)q(X) r ∈ D[X], q ∈ K[X]}.
It is straightforward to verify that the elements of this set form a ring under the usual operation of sum
and product induced by the polynomial ring K[X]. In Lemma 1.6 we will show that a polynomial f (X) in
K[X] is in D(p) if and only if the remainder in the division of f (X) by p(X) is in D[X]. Note that the
principal ideal p(X) · K[X] of K[X] is also an ideal of D(p). We have then the following diagram:
D(p)
/ K[X]
D(p)
p(X)K[X]
/ K[X]
p(X)K[X]
so that D(p) is a pullback of K[X] (for a general reference about pullbacks see [9]). Examples of such
pullbacks appear in [5], and more widely in [16].
We see at once that D(p) is contained in IntK (Ωp, D). Also, IntK (Ωp, D) has the ideal p(X)K[X] in
common with K[X], so, like D(p), also IntK(Ωp, D) is a pullback ring. This point of view is clearly a
generalization of [5, Example 4.4 (1)], which we briefly recall below in section 1.2.
We give some motivation which led us to study the pullback rings D(p) = D[X] + p(X) · K[X]. In
[16] this kind of polynomial pullback arose as the ring of integer-valued polynomials over certain subsets
of matrices. Let Mn(D) be the D-algebra of n × n matrices with entries in D and let IntK (Mn(D)) =
{f ∈ K[X] f (Mn(D)) ⊂ Mn(D)}, the ring of integer-valued polynomials over Mn(D). Given a monic
polynomial p ∈ D[X] of degree n, we denote by M p
n(D) the set of matrices M in Mn(D) whose characteristic
polynomial is equal to p(X). We consider the overring of IntK(Mn(D)) made up by those polynomials which
are integer-valued over M p
n(D), namely:
IntK(M p
n(D), Mn(D)) = {f ∈ K[X] f (M p
n(D)) ⊂ Mn(D)}
2
/
/
This partition of Mn(D) into subsets of matrices having prescribed characteristic polynomial was used in
[16] to give a characterization of the polynomials of IntK (Mn(D)) in terms of their divided differences (see
[16, Theorem 4.1]). By [16, Lemma 2.2 & Remark 2.1] we have
IntK (M p
n(D), Mn(D)) = D(p).
In particular, the ring IntK (Mn(D)) is represented as an intersection of pullbacks D(p), as p(X) ranges
through the set of all the monic polynomials in D[X] of degree n ([16, Remarks 2.1 and 2.2]). In [17] the
authors address the following question, which generalizes the previous case: for a D-algebra A as above,
where D is integrally closed, we consider the ring IntK(A) = {f ∈ K[X] f (A) ⊂ A} of integer-valued
polynomials over A. Is IntK(A) equal to the intersection of pullbacks of the form D(p)? In general, we
have
D(µa) ⊆ IntK (A),
\a∈A
where, for a ∈ A, µa(X) denotes the minimal polynomial of a over K (by assumption on A and D,
µa ∈ D[X] and is monic). The conditions under which the previous containment is an equality are not
known.
Throughout the paper, given a monic polynomial p(X) in D[X], we denote by Ωp the multi-set of its
roots in K (we recall the notion of multi-set in section 2).
This work is organized as follows. In section 2 we recall a characterization for the polynomials in D(p)
in terms of their divided differences. We use this result to show that the ring Int{n}(Ω, D) of polynomials
whose divided differences of order less than or equal to n are integer-valued over a subset Ω of D can be
represented as an intersection of such pullbacks. This ring has been introduced by Bhargava in [1]; we recall
the definition in that section. In section 3 we prove the following theorem:
Theorem 1.3. Let p(X) a monic non-constant polynomial in D[X]. Then the integral closure of the ring
D(p) = D[X] + p(X)K[X] is the ring IntK (Ωp, D).
As a corollary, we show that the integral closure of Int{n}(Ω, D) is equal to the ring Int(Ω, D), in the
case of a finite subset Ω of D. For a general subset Ω of D, in the case where D has finite residue rings, an
argument from [17] gives the same conclusion. In section 4, we prove the main theorem:
Theorem 1.4. Assume D integrally closed and let Ω be a finite subset of D. Then the ring IntK (Ω, D) is
Prufer if and only if D is Prufer.
If Ω ⊂ D, then this is precisely the main result obtained by McQuillan. The crucial remark is that,
for a monic polynomial p(X) in D[X], IntK(Ωp, D) ⊆ IntF (Ωp, D) is an integral ring extension, where
F = K(Ωp) is the splitting field of p(X). It is not difficult to see that IntF (Ω, D) is equal to IntF (Ω, DF ),
where DF is the integral closure of D in F , and this is precisely the kind of ring considered by McQuillan.
We note that this is a partial answer to [17, Question 29], where we asked if IntK (Ω, D) is Prufer, when
Ω is a subset of integral elements of degree over K bounded by some positive integer n. If D is integrally
closed, we give also a criterion to establish when the pullback D(p) is integrally closed, that is, equal to
IntK (Ωp, D) (see Theorem 4.5). In particular, in the case of a Prufer domain D, this condition is satisfied
automatically if D(p) is integrally closed.
Finally, in the last section, we apply the previous results in the more general setting of a finite set S of
integral elements over D which do not necessarily lie in an algebraic extension of K.
Corollary 1.5. Assume D integrally closed and let S be a finite set of a torsion-free D-algebra A, which
is finitely generated as a D-module. Let ΩS be the set of roots in D of the minimal polynomials of s over
D, as s ranges through S. Then the integral closure of IntK (S, A) is IntK (ΩS, D).
3
1.1 Preliminary results
K[X]
In the case of a monic polynomial, the following lemma determines the quotient of D(p) by the ideal
p(X)K[X]. We denote by π : K[X] ։
p(X)K[X] the canonical residue map, which associates to a polynomial
f ∈ K[X] the residue class f (X) + p(X)K[X].
Lemma 1.6. Let p ∈ D[X] be a monic non-constant polynomial. Then D(p) is the pullback of
p(X)K[X] with respect to the canonical residue map π : K[X] ։
a pullback diagram (i.e.: D(p) = π−1( D[X]
p(X)D[X] ֒→
p(X)K[X] . In other words, the following is
K[X]
p(X)D[X] )):
K[X]
D[X]
D(p)
/ K[X]
D[X]
p(X)D[X]
/ K[X]
p(X)K[X]
In particular, a polynomial f ∈ K[X] belongs to D(p) if and only if the remainder in the division by p(X)
in K[X] belongs to D[X]. Equivalently, we have
D(p)
p(X) · K[X] ∼=
D[X]
p(X) · D[X]
.
p(X)D[X] embeds naturally into
p(X)D[X] is a free D-module of
In
Proof. Since p(X) is monic, we have two consequences. Firstly, D[t] ∼= D[X]
rank n = deg(p) with basis {1, t, . . . , tn−1}, where t is the residue class of X modulo p(X)D[X].
particular, every element r ∈ D[t] can be uniquely represented as r(t) = Pi=0,...,n−1 citi, with ci ∈ D.
Secondly, p(X) · K[X] ∩ D[X] = p(X) · D[X], so the image of the restriction of π to D[X] is isomorphic to
D[t]. Therefore, D[t] ∼= D[X]
p(X)K[X] ∼= K[t] (the class X (mod p(X)D[X]) is
mapped to X (mod p(X)K[X]), so without confusion we may denote them with the same letter t). Note
that K[t] is a free K-module of rank n with the same basis {1, t, . . . , tn−1}.
We consider now the composition of mappings D[X] ֒→ D(p) ։ D(p)/p(X)K[X]. By the second
consequence above and by the second isomorphism theorem we have the isomorphism of the claim. More
explicitly, given f ∈ K[X], there exist (uniquely determined) a quotient q ∈ K[X] and a remainder r ∈ K[X]
(with either r = 0 or deg(r) < deg(p)) such that f (X) = r(X) + q(X)p(X). Hence, if r(X) = Pi ciX i,
then π(f ) = π(r) = r(t) = Pi citi ∈ K[t]. From the algebraic structure of D[t] we deduce that r(t) is in
D[t] if and only if the remainder r(X) is in D[X]. This condition in turn is equivalent to f ∈ D(p).
K[X]
Lemma 1.7. Let p, q ∈ D[X] be monic polynomials. Then
D(p) is contained in D(q) ⇔ p(X) is divisible by q(X).
In particular, D(p) = D(q) ⇔ p(X) = q(X).
Proof. One direction is easy. Conversely, suppose D(p) ⊆ D(q) so that p(X) = r(X) + q(X)k(X), for some
r ∈ D[X], r = 0 or deg(r) < deg(q), k ∈ K[X]. If r 6= 0, let c ∈ K \ D be such that c · r(X) is not in D[X].
Then c · p is in D(p) but it is not in D(q), contradiction. Notice that k(X) has to be in D[X] (see also [12,
Lemma]).
The following two cases, linear and irreducible polynomial, are given as an example and to further
illustrate the connection between polynomial pullbacks and rings of integer-valued polynomials.
4
/
/
1.2 Linear case
In the linear case the connection between the polynomial pullbacks and ring of integer-valued polynomials
over finite sets becomes evident. Suppose p(X) = X − a ∈ D[X]. Then the remainder of the division of a
polynomial f ∈ K[X] by X − a is the value of f (X) at a. Hence,
D(p) = D + (X − a) · K[X] = Int({a}, D)
It is well-known (see for example [6, Proposition IV.4.1]) that Int({a}, D) is integrally closed if and only
if D is. It is easy to see that the integral closure of Int({a}, D) is Int({a}, D′), where D′ is the integral
closure of D in K (notice that Int({a}, D′) = D′ + (X − a)K[X] is a pullback). More generally, we recall
the following result.
Lemma 1.8. Let E ⊂ K be a finite set. Then the integral closure of Int(E, D) is Int(E, D′), where D′ is
the integral closure of D in K.
Proof. By [6, Proposition IV.4.1], Int(E, D′) is integrally closed. Conversely, take f ∈ Int(E, D′). Then
for each a ∈ E, there exists a monic polynomial mf (a) ∈ D[X] such that mf (a)(f (a)) = 0. We consider the
monic polynomial of D[X] equal to the product of the mf (a)(X)'s, as a ranges through E. Then m(f (X))
is in Int(E, D), because for each a ∈ E we have m(f (a)) = 0 ∈ D. This gives a monic equation for f (X)
over Int(E, D).
Remark 1.9. We recall now the following observation made in [5]. Under the assumptions of Lemma
i=1 K with respect to the canonical mapping π : K[X] ։
that p(X)K[X] is an ideal of Int(E, D), because every polynomial of K[X] which is divisible by p(X) is
zero on E. In particular, we have the following isomorphism of D-modules
i=1 K, where p(X) =Qa∈E(X − a). The map π is given by f (X) 7→ (f (a))a∈E. Notice also
K[X]
1.8, Int(E, D) is the pullback of Qm
p(X)K[X] ∼= Qm
i=1 D ⊂ Qm
Int(E, D)
p(X)K[X] ∼=
D
m
Yi=1
1.3
Irreducible polynomial case
We suppose now that D is integrally closed and p(X) is a monic irreducible polynomial in D[X] of degree
n > 0. It is easy to see (see for example [12] or [2, Proposition 11, Chapt. V]) that p(X) is irreducible in
K[X], so that p ∈ D[X] is also prime and D[X]/(p(X)) ∼= D[α], where α is a root of p(X) in K. The next
proposition follows by [15, Prop. 3.1] (which is proved in the case D = Z). We sketch the proof for the
sake of the reader, giving emphasis to the relevant points.
Proposition 1.10. Let p ∈ D[X] be a monic and irreducible polynomial, with set of roots Ωp ⊂ K. Let
F = K(Ωp) be the splitting field of p(X) over K and DF the integral closure of D in F . For each α ∈ Ωp
we set
Sα + IntK ({α}, Dα),
Then, for each α ∈ Ωp, Sα = IntK (Ωp, DF ) and this ring is the integral closure of D(p). Moreover,
where Dα is the integral closure of D in K(α) ⊆ F .
D(p) is integrally closed if and only if Dα = D[α], for some (hence all) α ∈ Ωp.
Proof. Using a Galois-invariance argument it is easy to show that the ring Sα does not depend on the choice
of the root α of p(X) and is equal to IntK(Ωp, DF ). We observe that Sα = {f ∈ K[X] f (α) is integral over D}.
Then for a polynomial f ∈ Sα and for every conjugate α′ of α over K, f (α′) is integral over D as well.
Since D[α], for α ∈ Ωp, is a free D-module of rank n, we can show that
D(p) = {f ∈ K[X] f (α) ∈ D[α]} = IntK({α}, D[α]).
5
Finally, using a pullback diagram argument, since Dα is the integral closure of D[α] in K(α), we deduce
that IntK(Ωp, DF ) is the integral closure of D(p) (see [15, Proposition 3.1] for the details).
In particular, the proposition shows that all the subrings Int({α}, DF ) ⊂ F [X], for α ∈ Ωp, contracts in
K[X] to the same ring Sα. Notice also that IntK (Ωp, D) is equal to IntK(Ωp, DF ), where DF is the integral
closure of D in the splitting field F = K(Ωp) of p(X) over K.
2 Pullbacks and divided differences
In this section we recall a result of [16] which characterizes a polynomial f (X) in a pullback D(p) =
D[X] + p(X)· K[X] in terms of a finite set of conditions on the evaluation of the divided differences of f (X)
at the roots of p(X) in K. We use this result to show that the ring of integer-valued polynomials whose
divided differences are also integer-valued can be represented as an intersection of such pullbacks.
Given a polynomial f ∈ K[X], the divided differences of f (X) are defined recursively as follows:
Φ0(f )(X0) +f (X0)
Φ1(f )(X0, X1) +
. . .
f (X0) − f (X1)
X0 − X1
Φk(f )(X0, . . . , Xk) +
Φk−1(f )(X0, . . . , Xk−1) − Φk−1(f )(X0, . . . , Xk−2, Xk)
Xk−1 − Xk
For each k ∈ N, Φk(f ) is a symmetric polynomial over K in k + 1 variables (see [7], [16], [18] and [19] for
the main properties of the divided differences of a polynomial). We recall here that, given a finite sequence
of elements a0, . . . , an of a commutative ring R, and a polynomial f ∈ R[X] of degree ≤ n we have the
following expansion due to Newton:
f (X) = f (a0) + Φ1(f )(a0, a1)(X − a0) + Φ2(f )(a0, a1, a2)(X − a0)(X − a1) + . . .
+Φn(f )(a0, . . . , an)(X − a0) · . . . · (X − an−1)
(2.1)
Since in general a polynomial may not have distinct roots, we need to recall the following definition.
Definition 2.1. A multi-set is a collection of elements Ω in which elements may occur multiple times. The
number of times an element occurs is called its multiplicity in the multi-set. The cardinality of a multi-set
Ω is defined as the number of elements of Ω, each of them counted with multiplicity. The underlying set of
Ω is the (proper) set containing the distinct elements in Ω.
A multi-set Ω1 is a sub-multi-set of a multi-set Ω2 if every element α of Ω1 of multiplicity n1 belongs to Ω2
with multiplicity n2 ≥ n1.
Remark 2.2. Let Ω be a multi-set of cardinality n and let S be the underlying set of Ω. The choice of an
ordering on the elements of Ω corresponds to a n-tuple in Sn (we have thus n! choices). Conversely, given
an n-tuple s in Sn, where S is a set, if we do not consider the order its components, we have a multi-set Ω
of cardinality n.
Remark 2.3. A particular ring of integer-valued polynomials involving divided differences has been intro-
duced by Bhargava in [1]. Given a subset S of D and n ∈ N, we consider those polynomials f (X) in K[X]
whose k-th divided difference Φk(f ) is integer-valued on S for all k ∈ {0, . . . , n}, namely:
Int{n}(S, D) + {f ∈ K[X] ∀0 ≤ k ≤ n, Φk(f )(Sk+1) ⊂ D}.
6
For n = 0 we recover the ring Int(S, D), which contains Int{n}(S, D) for all n ∈ N.
Given f ∈ Int{n}(S, D) and k ∈ {0, . . . , n} we have:
∀(a1, . . . , ak+1) ∈ Sk+1, Φk(f )(a1, . . . , ak+1) ∈ D.
(*)
Since Φk(f ) is a symmetric polynomial in k+1 variables, for all permutations σ ∈ Sk+1 we have Φk(f )(a1, . . . , ak+1) =
Φk(f )(aσ(1), . . . , aσ(k+1)). Hence, we may disregard the order of the components of the chosen (k + 1)-tuple.
If we consider a multi-set Ω of cardinality k + 1 formed by elements of S, we may define Φk(f )(Ω) as the
value of Φk(f ) at one of the (k + 1)-tuple associated to Ω. Thus we choose an ordering of Ω and, by above,
the value Φk(f )(Ω) does not depend on the chosen ordering. Notice that Ω is not necessarily a sub-multi-set
of S. We only require that the underlying set of Ω is contained in S. For example, if S = {1, 2, 3} and
k = 1, we have {1, 1}, {1, 3} and {2, 2} as possible choices for Ω.
We may rephrase the above property (*) by saying that for all multi-sets Ω of cardinality k + 1 such
that the underlying set Ω′ is contained in S, we have Φk(f )(Ω) ∈ D.
Notation. We fix now the notation for the rest of this section.
- p(X) is a monic non-constant polynomial in D[X] of degree n.
- Ωp = {α1, . . . , αn} is the multi-set of roots of p(X) in K (the αi's are integral over D).
- F = K(α1, . . . , αn) the splitting field of p(X).
- DF the integral closure of D in F .
Given f ∈ F [X], whenever we expand f ∈ F [X] as in (2.1) in terms of the roots Ωp of p(X), we implicitly
assume that an order of Ωp has been fixed (so we choose one of the n! associated n-tuples). Changing the
order of Ωp will give a different expansion.
We need now the following preliminary lemma: the divided differences of a polynomial p(X) are zero
when they are evaluated at the roots of the polynomial p(X) itself.
Lemma 2.4. For every sub-multi-set Ω of Ωp of cardinality k + 1, k < n − 1, we have Φk(p)(Ω) = 0, and
Φn−1(p)(Ωp) = 1. Equivalently, we have:
Φk(p)(α1, . . . , αk+1) =(cid:26) 0,
1,
if
if
0 ≤ k < n
k = n
for any possible choice of an ordering for Ωp.
Proof. We fix an ordering for Ωp. We consider the Newton expansion of p(X) over F with respect to Ωp up to
the order n (p(X) is split over F ). The coefficients of this expansion are exactly {Φk(p)(α1, . . . , αk+1)}0≤k≤n,
where for k = n we have the leading coefficient of p(X) which is 1. Since p(X) is divisible by itself, all the
other coefficients in this expansion are zero. Obviously, the result does not depend on the chosen ordering
for Ωp.
Lemma 2.5. Let f ∈ K[X] and let r ∈ K[X] be the unique remainder in the division of f (X) by p(X) in
K[X]. If r 6= 0, let m < n be the degree of r(X). Then over F [X] we have
r(X) = f (α1) + Φ1(f )(α1, α2) · (X − α1) + . . . + Φm(f )(α1, . . . , αm+1)
m
Yi=1
(X − αi)
(2.2)
which is the Newton expansion of r(X) with respect to Ωp = {α1, . . . , αn}.
7
Proof. If f (X) = q(X)p(X) + r(X), by linearity of the divided difference operator, we have Φk(f ) =
Φk(r) + Φk(p · q), for all k ∈ N. Moreover, by the so-called Leibniz rule for divided differences (see for
example [18]), we have Φk(p · q) = Pi=0,...,k Φi(p)Φk−i(q) (we omit the variables). By Lemma 2.4, for
0 ≤ k < n, we get that
Φk(f )(α1, . . . , αk+1) = Φk(r)(α1, . . . , αk+1).
(2.3)
Notice that, for k = m the above value is the leading coefficient of r(X), and for m < k < n it is zero.
Because of the last formula, r(X) has the desired expansion over F [X].
By means of Lemma 2.4 and Lemma 2.5 we give a new proof of [16, Proposition 4.1], which says that
a polynomial f (X) of K[X] is in D(p) if and only if the divided differences of f (X) up to the order n − 1
are integral on every sub-multi-set of the multi-set Ωp of the roots of p(X).
Proposition 2.6. Let D be an integrally closed domain with quotient field K. Let f ∈ K[X] and p ∈ D[X]
monic of degree n. Let Ωp = {α1, . . . , αn} be the multi-set of roots of p(X) in a splitting field F over K.
Then the following are equivalent:
i) f ∈ D(p).
ii) for all 0 ≤ k < n, Φk(f )(α1, . . . , αk+1) ∈ D[α1, . . . , αk+1].
iii) for all 0 ≤ k < n, Φk(f )(α1, . . . , αk+1) ∈ DF .
Proof. If i) holds, let f (X) = r(X) + p(X)q(X), for some q ∈ K[X], r ∈ D[X], deg(r) < n or r = 0. In par-
ticular, the divided differences of r(X) are polynomials with coefficients in D. By (2.3), Φk(f )(α1, . . . , αk+1) =
Φk(r)(α1, . . . , αk+1) ∈ D[α1, . . . , αk+1], for all the relevant k's. Hence, i)⇒ ii).
Obviously ii)⇒ iii), since the roots of p(X) are integral over D, so that D[α1, . . . , αk+1] ⊆ DF .
Suppose now that iii) holds. We have to prove that the remainder r(X) of the Euclidean division
in K[X] of f (X) by p(X) is in D[X]. Let m < n be the degree of r(X). Consider the Newton ex-
pansion of r(X) with respect to Ωp over F [X] as in Lemma 2.5 (see (2.2)). By assumption, the coef-
ficients {Φk(f )(α1, . . . , αk+1)}k=0,...,m of this expansion are in DF . The leading coefficient of r(X) is
equal to Φm(f )(α1, . . . , αm+1), so that it is in DF ∩ K = D (we use here the assumption that D is inte-
grally closed). The coefficient cm−1 of the term X m−1 of r(X) is Φm−1(f )(α1, . . . , αm) ± (Pi=1,...,m αi) ·
Φm(f )(α1, . . . , αm+1) which is in DF , so cm−1 is in K ∩ DF = D. If we continue in this way we prove that
r(X) is in D[X], which gives i).
Remark 2.7. If we choose another ordering on the multi-set Ωp of roots of p(X) we have other conditions
of integrality on the values of the divided differences of a polynomial f ∈ D(p) at the vectors of elements
in Ωp. Since condition i) of Proposition 2.6 does not depend on the order we choose on Ωp, the above
conditions are also equivalent to this one:
ii') for all 0 ≤ k < n, and for every sub-multi-set Ω of Ωp of cardinality k + 1, Φk(f )(Ω) ∈ D[Ω],
that is, Φk(f ) is integral-valued on Ω: Φk(f )(Ω) ∈ DF (see also [16, Proposition 4.1 & Remark 4.1]).
Note that, if p ∈ D[X] is a monic polynomial of degree n which is split over D, that is, p(X) =
Qn
i=1(X − ai), ai ∈ D, then condition i) and ii) are equivalent without the assumption that D is integrally
closed (this follows immediately from the formula (2.2)).
for all
0 ≤ k < n, Φk(f )(a1, . . . , ak+1) ∈ D. We have thus in this case found again the result of [7, Proposition
11] (see also [16, Lemma 2.2 & Remark 2.1]).
In particular, condition ii) becomes:
Now we give the link between the ring of integer-valued polynomials whose divided differences are also
integer-valued introduced by Bhargava and the polynomial pullbacks D(p) we are working with.
We observe first that, if p ∈ D[X] is a monic polynomial of degree n which is split over D (i.e.: the set
of roots Ωp is contained in D), then Int{n−1}(Ωp, DF ) may be strictly contained in D(p).
8
Example 2.8. Let n = 2, Ω = {1, 3} ⊂ Z and p(X) = (X − 1)(X − 3). Let f (X) = p(X)/3 ∈ Z(p). We
have that Φ1(f )(1, 1) = −2/3, so that f /∈ Int{1}(Ω, Z).
Indeed, by Proposition 2.6, given any f ∈ Z(p), Φ1(f ) is integer-valued over {(1, 3), (3, 1)} ( Ω2.
We need to introduce another notation before the next theorem.
Notation. Let Ω be a subset of D and let n be a positive integer. We denote by Pn(Ω) the set of monic
polynomials q(X) over D of degree n whose set of roots is contained in Ω (so, in particular, they are split
over D).
Theorem 2.9. Let Ω ⊆ D and n ∈ N. Then
Int{n−1}(Ω, D) = \q∈Pn(Ω)
D(q).
Proof. (⊆). Let f ∈ Int{n−1}(Ω, D) and let q ∈ Pn(Ω). Since for all 0 ≤ k < n we have Φk(f )(Ωk+1) ⊂ D,
then for each sub-multi-set {a1, . . . , ak+1} of Ωq of cardinality k + 1 we have Φk(f )(a1, . . . , ak+1) ∈ D. Then
by Proposition 2.6 (see also Remark 2.7), we have that f ∈ D(q).
(⊇). Let f ∈ D(q), for all q ∈ Pn(Ω). Let k ∈ {0, . . . , n− 1} and let (a1, . . . , ak+1) ∈ Ωk+1. We consider
a polynomial q ∈ Pn(Ω) such that the multi-set {a1, . . . , ak+1} is a sub-multi-set of the multi-set of roots Ωq
(that is, Qk+1
i=1 (X − ai) divides q(X)). Then by Proposition 2.6, condition ii), Φk(f )(a1, . . . , ak+1) ∈ D (see
also Remark 2.7, condition ii')). Since (a1, . . . , ak+1) was chosen arbitrarily, f (X) is in Int{n−1}(Ω, D).
In the Example 2.8 above, we have that f (X) = q(X)
is a polynomial in P2(Ω) = {(X − 1)(X − 3), (X − 1)2, (X − 3)2}.
3 − 2
3 (X − 1) is not in Z(q), where q(X) = (X − 1)2
Remark 2.10. By [16, Lemma 5.1], given a monic polynomial p ∈ D[X] of degree n which is split over
D, the pullback ring D(p) is equal to IntK (T p
n (D) is the set of n × n triangular
matrices with characteristic polynomial equal to p(X). In particular, we have this representation for the
ring of integer-valued polynomials over the algebra of n × n triangular matrices over D:
n (D), Mn(D)), where T p
IntK (Tn(D)) = \p∈P s
n(D)
D(p)
(2.4)
where P s
n(D) is the set of monic polynomials over D of degree n which are split over D; as we mentioned
in the introduction, a similar result holds for IntK(Mn(D)), see [16]. We note that this gives a positive
answer to [17, Question 31] for the algebra Tn(D). Similarly, given any subset P of P s
n(D), the intersection
of the pullbacks D(p) as p(X) ranges through P is the ring of polynomials which are integer-valued over
the set of triangular matrices whose characteristic polynomial belongs to P. By Theorem 2.9, this ring is
equal to Int{n−1}(Ω, D), where Ω ⊆ D is the set of roots of the polynomials in P.
In the case Ω = D, [7, Theorem 16] proves that Int{n−1}(D) = IntK (Tn(D)), which by (2.4) is also
equal to the intersection of the pullbacks D(p), as p(X) ranges through P s
n(D). Therefore, Theorem 2.9
generalizes this result to any subset Ω of D.
3
Integral closure of polynomial pullbacks
Remark 3.1. Let Ω ⊂ K be a finite set. Let F = K(Ω) and let DF be the integral closure of D in F .
By [6, Proposition IV.4.1], Int(Ω, DF ) is integrally closed. Hence, IntK (Ω, DF ) = Int(Ω, DF ) ∩ K[X] is
integrally closed, too. The same remark was used in [17, Proposition 7].
9
Lemma 3.2. Let D be an integrally closed domain. Let p ∈ D[X] be a non-constant polynomial of degree
n and Ωp ⊂ K the multi-set of its roots. Let f ∈ K[X] be integral-valued over Ωp, that is, f ∈ IntK (Ωp, D).
Then the polynomial
is in D[X]. Moreover, P (f (X)) is divisible by p(X) in K[X].
P (X) = Pf,p(X) + Yα∈Ωp
(X − f (α))
Proof. Notice that P (X) has degree n, because the product is over the elements of the multi-set Ωp. We
set g(X) +
(X − α), where lc(p) is the leading coefficient of p(X). The polynomial g(X) is
in K[X] and is monic.
p(X)
lc(p) = Qα∈Ωp
Let M ∈ Mn(K) be a matrix with characteristic polynomial equal to g(X) (e.g., the companion matrix
of g(X)). The multi-set of eigenvalues of M over K is exactly Ωp. Notice that f (M ) is in Mn(K), so its
characteristic polynomial is in K[X]. By [3, Chap. VII, Proposition 10] (considering everything over K)
the characteristic polynomial of f (M ) is precisely P (X). In particular, the set of eigenvalues of f (M ) is
f (Ωp) = {f (α) α ∈ Ωp}, which, by assumption on f (X), is contained in D. Hence, the coefficients of
P (X) are integral over D (being the elementary symmetric functions of the roots), and since D is integrally
closed they are in D.
For the last statement, notice that for each α ∈ Ωp, X − α divides f (X)− f (α) over F = K(Ωp). Hence,
(f (X) − f (α)) over F . Since both polynomials are in
p(X) = Qα∈Ωp
K[X], one divides the other over K, as we wanted.
(X − α) divides P (f (X)) = Qα∈Ωp
We prove now Theorem 1.3 of the Introduction. For the sake of the reader we repeat here the statement.
Theorem 3.3. Let p ∈ D[X] be a monic non-constant polynomial and let Ωp ⊂ K be the multi-set of its
roots. Then the integral closure of D(p) is IntK (Ωp, D).
Notice that by definition IntK (Ωp, D) = IntK(Ω′p, D), where Ω′p is the underlying set of Ωp, the set of
distinct roots of p(X).
Proof. Remember that IntK (Ωp, D) is integrally closed by the Remark at the beginning of this section. If
D′ is the integral closure of D in its quotient field K, then D(p) ⊆ D′(p) is an integral ring extension,
because D[X] ⊆ D′[X] is. Since D(p) ⊆ D′(p) ⊆ IntK(Ωp, D) (because p(X) is monic, so Ωp is contained
in D), without loss of generality we may assume that D is integrally closed (that is, D = D′). To prove
the statement, it suffices to prove that D(p) ⊆ IntK (Ωp, D) is an integral ring extension.
Let f ∈ IntK(Ωp, D) and consider P (X) defined as in Lemma 3.2. Then P (X) is a monic polynomial
in D[X] such that P (f (X)) is divisible by p(X) over K. Hence, P (f (X)) is in D(p), and this gives a monic
integral equation for f (X) over the pullback ring D(p).
We prove now that the ring of polynomials in K[X] whose divided differences of order up to n are
integer-valued over a finite subset Ω of D has integral closure equal to the ring of polynomials which are
integer-valued over Ω.
Corollary 3.4. Let D be an integrally closed domain. Let Ω ⊂ D be a finite set and let n ∈ N. Then the
integral closure of Int{n}(Ω, D) is Int(Ω, D).
Proof. As in the proof of Theorem 3.3, it is sufficient to show that any f ∈ Int(Ω, D) satisfies a monic
equation over the ring Int{n}(Ω, D).
By Theorem 2.9, Int{n}(Ω, D) is equal to the intersection of the pullbacks D(p), as p(X) ranges through
the finite family Pn+1(Ω) of monic polynomials over D of degree n + 1 whose set of roots is contained in
10
Ω. We consider the subset P of Pn+1(Ω) of those polynomials of the form q(X) = (X − a)n+1, for a ∈ Ω.
For each of them we consider the polynomial Pf,q ∈ D[X] as defined in Lemma 3.2. Therefore
Q(X) + Yq∈P
Pf,q(X)
is a monic polynomial in D[X] such that Q(f (X)) is in p(X)K[X] for each p ∈ Pn+1(Ω).
In fact, let
If a ∈ Ω is a root of p(X) of multiplicity e ≤ deg(p) = n + 1, then (X − a)e divides
p ∈ Pn+1(Ω).
(f (X) − f (a))n+1 over K. Notice that the latter is a factor of Q(f (X)). Since this holds for every root of
p(X), then p(X) divides Q(f (X)) over K, that is, Q(f (X)) ∈ pK[X] ⊂ D(p). Since this holds for every
p ∈ Pn+1(Ω), this concludes the proof of the Corollary.
Remark 3.5. If Ω ⊆ D is an infinite set and D has finite residue rings (that is, D/dD is a finite ring for
every non-zero d ∈ D), reasoning as in [17] by means of the pullback representation of Int{n}(Ω, D) given
by Theorem 2.9, the same result of Corollary 3.4 holds. For Ω = D, the result was given in [17, Corollary
17], where it is proved that the integral closure of IntK (Tn+1(D)) is Int(D). Note that, by [7, Theorem 16],
the former ring is equal to Int{n}(D) (see Remark 2.10).
4 Prufer rings of integral-valued polynomials
The next lemma, though easy, is a crucial step to establish when IntK (Ω, D) is a Prufer domain, for a finite
set Ω of integral elements over D.
Lemma 4.1. Let p ∈ D[X] be a monic non-constant polynomial and K ⊆ F be an algebraic extension. Let
DF the integral closure of D in F . Then D(p) ⊆ DF (p) is an integral ring extension.
Proof. We use the well-known fact that the integral closure of D[X] in F [X] is DF [X] ([2, Proposition 13,
Chapt. V]). Hence, given f (X) = r(X)+p(X)q(X) ∈ DF (p), for some r ∈ DF [X] (r = 0 or deg(r) < deg(p))
and q ∈ F [X], the polynomial r(X) is integral over D[X], so in particular it is also integral also over D(p).
We show now that h(X) = p(X)q(X) ∈ p(X) · F [X] is integral over D(p).
It is easy to see that, if Ψq(T, X) is the minimal polynomial of q(X) over K[X], then the minimal
polynomial of h(X) over K[X] is given by Ψh(T, X) = pn · Ψq( T
p , X), which is a monic polynomial in T
over D. Notice that the coefficients of Ψh(T, X)− T n are in p(X)· K[X], so that Ψh(T, X) ∈ D(p)[T ]. This
proves our assertion.
We prove now Theorem 1.4 of the Introduction.
Theorem 4.2. Assume that D is integrally closed and let Ω be a finite subset of D. Then IntK (Ω, D) is
Prufer if and only if D is Prufer.
Proof. Given f (X) in IntK(Ω, D) and α ∈ Ω, f (X) is integral-valued over all the conjugates of α over K
(see Proposition 1.10). Hence, without loss of generality, we can assume that Ω is equal to the set of roots
Ωp of a monic polynomial p(X) over D (more precisely, p(X) is the product of all the minimal polynomials
of the elements of Ω, without repetitions).
Let F = K(Ωp) be the splitting field of p(X) over D and let DF be the integral closure of D in F . By
assumption, Ωp ⊂ DF . Remember that IntK (Ωp, D) = IntK (Ωp, DF ) (see the remarks after Proposition
1.10). By the result of McQuillan ([13, Corollary 7]), Int(Ωp, DF ) is a Prufer domain if and only if DF is a
11
Prufer domain. Since D is integrally closed, by [10, Theorem 22.3 & 22.4] D is Prufer if and only if DF is
Prufer. We have the following diagram:
DF (p)
/ Int(Ωp, DF )
/ F [X]
D(p)
/ IntK (Ωp, DF )
/ K[X]
By Theorem 3.3, D(p) ⊆ IntK (Ωp, DF ) and DF (p) ⊆ Int(Ωp, DF ) are integral ring extensions. Hence, by
Lemma 4.1, Int(Ωp, DF ) is integral over IntK(Ωp, DF ). Moreover, since the former ring is integrally closed,
it is the integral closure of the latter ring in F [X]. Finally, we have these equivalences:
D Prufer ⇔ DF Prufer ⇔ Int(Ωp, DF ) Prufer ⇔ IntK(Ωp, DF ) Prufer
where the last equivalence follows again by [10, Theorem 22.3 & 22.4] (IntK (Ωp, DF ) is integrally closed by
Remark 3.1).
As we recalled in the introduction, the intersection of the polynomial pullbacks D(p) arises in many
different contexts, especially those concerning rings of integer-valued polynomials over algebras. In section
2 we saw that the ring of integer-valued polynomials whose divided differences are also integer-valued can
be represented as an intersection of such pullbacks. We now investigate more deeply how these pullbacks
intersect with each other. As a corollary, we obtain a criterion for a pullback D(p) to be integrally closed.
At the beginning of Section 1.3 we recalled that a monic irreducible polynomial over an integrally closed
domain D is still irreducible over the quotient field K. Moreover, a monic polynomial p ∈ D[X] can be
uniquely factored into monic irreducible polynomials over D (see [12]; this is a sort of Gauss' Lemma for
monic polynomials over an integrally closed domain). Therefore, given a monic polynomial p(X) in D[X],
we have p(X) =Qi qi(X), where qi(X) are powers of monic irreducible polynomials in D[X]. In particular,
the qi(X)'s are pairwise coprime in K[X] (but they may not be coprime over D, see below). A polynomial
p(X) is square-free exactly when each qi(X) is irreducible. Notice that p(X)K[X] is an ideal of each
pullback D(qi), for all i. In particular, it is an ideal of the intersection of the rings D(qi).
The next proposition is a generalization of Lemma 1.6. Recall that two ideals I, J of a commutative
ring R are coprime if I + J = R (see [2, Chapt. 2, p. 53]). For this statement we do not require D to be
integrally closed. Given q1, q2 ∈ D[X], we simply say that q1(X) and q2(X) are coprime (over D) if the
corresponding principal ideals q1(X)D[X] and q2(X)D[X] are coprime.
Proposition 4.3. Let p ∈ D[X] be a monic polynomial. Let p(X) = Qi qi(X) be a factorization into
monic polynomials over D which are pairwise coprime when they are considered over K. Then
Ti D(qi)
p(X)K[X] ∼=Yi
D[X]
qi(X)D[X]
.
Moreover, D(p) =Ti D(qi) if and only if {qi(X)}i are pairwise coprime over D.
Note that two polynomials q1, q2 ∈ D[X] may be coprime over K without being coprime over D: for
example, q1(X) = X and q2(X) = X − 2 over Z. However, under this condition, it is easy to verify that
q1(X)D[X] ∩ q2(X)D[X] = q1(X)q2(X)D[X].
Proof. It is sufficient to notice that Ti D(qi) is the pullback of
qi(X)K[X] ∼=
p(X)K[X]
K[X]
K[X]
Yi
D[X]
qi(X)D[X] ⊂Yi
12
/
/
O
O
/
O
O
/
O
O
with respect to the canonical residue mapping
that is:
Indeed, by definition we have
π : K[X] ։
K[X]
p(X)K[X]
,
D[X]
qi(X)D[X]
π−1(Yi
D(qi).
) =\i
π−1 Yi
D[X]
qi(X)D[X]! = {f ∈ K[X] f
(mod qi(X)K[X]) ∈
D[X]
qi(X)D[X]
,∀i}.
Since each qi(X) is monic, by Lemma 1.6 this is equivalent to the fact that the remainder of the division of
f (X) by qi(X) is in D[X], that is, f (X) is in D(qi), hence the statement regarding the isomorphism. We
have then the following pullback diagram:
D(p)
D[X]
p(X)D[X]
/ Ti D(qi)
D[X]
qi(X)D[X]
/ Qi
where the vertical arrows are the quotient map modulo the common ideal p(X)K[X]. Note that the bottom
horizontal arrow is injective by the remark above before the proof. Then D(p) = Ti D(qi) if and only if
D[X]/p(X)D[X] and Qi D[X]/qi(X)D[X] are isomorphic. By the converse of the Chinese Remainder
Theorem (see [2, Chapt. 2, §1, Proposition 5]) this holds if and only if the principal ideals qi(X)D[X] are
pairwise coprime.
Recall that, given two polynomials p1, p2 ∈ D[X], the principal ideals pi(X)D[X], i = 1, 2, are coprime
if and only if the resultant Res(p1, p2) is a unit of D if and only if p1, p2 have no common root modulo any
maximal ideal M ⊂ D. Notice that p1(X), p2(X) are coprime in K[X] if and only if Res(p1, p2) 6= 0.
The next proposition is a generalization of Remark 1.9: given a monic non-constant square-free polyno-
mial p(X) in D[X], we determine the quotient ring of IntK(Ωp, D) modulo the principal ideal p(X)K[X].
Note that in the case Ωp ⊂ D, we have IntK (Ωp, D) = Int(Ωp, D) and we are in the case already treated
(essentially by McQuillan).
IntK(Ωp, D)
p(X)K[X] ∼=
DKi
Proposition 4.4. Let p ∈ D[X] be a monic non-constant polynomial which is square-free, say p(X) =
Qk
i=1 pi(X), where pi(X), for i = 1, . . . , k, are monic, distinct and irreducible polynomials over D. Then
k
Yi=1
where DKi is the integral closure of D in the field Ki ∼= K[X]
Proof. For each i = 1, . . . , k, we set Ki + K[X]/(pi(X)) ∼= K[αi], which is a finite field extension of K, where
αi is a (fixed) root of pi(X). Let also DKi be the integral closure of D in Ki, for i = 1, . . . , k. By assumption
on the pi(X)'s, D[X]/(pi(X)D[X]) ∼= D[αi] ⊂ K[αi]. Note that IntK(Ωp, D) = IntK ({α1, . . . , αk}, D): if
f ∈ K[X] is integral-valued on αi then it is integral-valued on every conjugate root of α of αi, that is on
the set of roots Ωpi (see also Proposition 1.10).
As we remarked in the introduction, the rings IntK (Ωp, D) ⊂ K[X] have the ideal p(X)K[X] in common,
p(X)K[X] . The
so that IntK(Ωp, D) is a pullback with respect to the canonical residue map π : K[X] ։
pi(X)K[X] , for each i = 1, . . . , k.
K[X]
13
/
/
polynomial ring K[X] is mapped to K[X]/(p(X)) ∼=Qk
so that a polynomial f ∈ K[X] is mapped to (f (α1), . . . , f (αk)).
definition,
In the same way as in Proposition 4.3 we have just to prove that IntK(Ωp, D) = π−1(Qk
i=1 K[αi] by the map which sends X to (α1, . . . , αk),
i=1 DKi ). By
π−1 k
Yi=1
DKi! = {f ∈ K[X] f (αi) ∈ DKi ,∀i = 1, . . . , k}
so that a polynomial f (X) is in this ring if and only if it is integral-valued on every αi, that is, f ∈
IntK ({α1, . . . , αk}, D).
An equivalent statement of Proposition 4.4 is the following:
let Ω be a finite subset of D and let
p ∈ D[X] be the product of the minimal polynomials p1(X), . . . , pk(X) of the elements of Ω, without
repetitions. Then the quotient of IntK(Ω, D) modulo p(X)K[X] is isomorphic to Qk
i=1 DKi , where DKi is
as in the statement of Proposition 4.4. We notice that a proof of Theorem 4.2 follows also in another way
by [5, Theorem 4.3], due to Proposition 4.4.
Theorem 4.5. Let p ∈ D[X] be a monic non-constant polynomial. Suppose that p(X) =Qk=1,...,k pi(X)ei
is the unique factorization of p(X) into powers of monic irreducible polynomials in D[X], ei ≥ 1. Then
D(p) is integrally closed if and only if the following conditions are satisfied:
i) p(X) is squarefree (i.e.: ei = 1 for all i).
ii) for each i = 1, . . . , k, D[X]/(pi(X)) ∼= DKi , where the latter is the integral closure of D in the field
Ki ∼= K[X]/(pi(X)).
iii) Res(pi, pj ) ∈ D∗ for each i 6= j.
If D is a Prufer domain, D(p) is integrally closed if and only if D(p) is a Prufer domain, and in that case
D(p) = IntK (Ωp, D).
greater than 1. Let q(X) =Qk
Proof. Suppose that D(p) is integrally closed. If p(X) is not squarefree, then some exponent ei is strictly
i=1 pi(X) be the square-free part of p(X). By assumption, q(X) 6= p(X) and
q(X) divides p(X). So by Lemma 1.7, D(p) ( D(q). Since q(X) has the same set of roots of p(X), D(q) is
contained in IntK (Ωp, DF ). Hence, D(p) cannot be equal to IntK (Ωp, DF ) which is in contradiction with
Theorem 3.3. Then p(X) is square-free.
By Propositions 4.3 and 4.4 (we retain the same notation of those Propositions) we have the following
i=1 IntK (Ωpi , D) = IntK(Ωp, D)), where the vertical
diagram of pullbacks (notice that Ωp =Sk
lines are the reduction map modulo p(X)K[X]:
/ IntK (Ωp, D)
/ K[X]
(4.1)
D(p)
D[X]
p(X)D[X]
i=1 Ωpi andTk
/ Ti D(pi)
/ Qi D[αi]
/ Qi K[αi]
/ Qi DKi
i=1 D(pi) and Tk
i=1 D(pi) = IntK (Ωp, D).
Obviously, D(p) is integrally closed if and only if D(p) =Tk
Since D(p) = Tk
the above diagram, Tk
i=1 D(pi) = IntK (Ωp, D) if and only if
condition ii).
i=1 D(pi), by Proposition 4.3 this condition is equivalent to condition iii). Looking at
pi(X)D[X] = DKi for all i = 1, . . . , k, which is
D[X]
Conversely, suppose conditions i), ii) and iii) hold. Then looking at the above pullback diagram again,
we have that D(p) is equal to IntK(Ωp, D), hence, by Theorem 3.3, D(p) is integrally closed.
Suppose now D is a Prufer domain. If D(p) = IntK (Ωp, D) then D(p) is a Prufer domain by Theorem
4.2. Conversely, if D(p) is Prufer then it is integrally closed. The very last assertion follows at once by
Theorem 3.3.
14
/
/
/
/
/
/
In the next examples we show that the theorem does not hold if we remove one of the conditions.
Example 4.6. Let p1(X) = X 2 + 1, p2(X) = X 2 − 2 ∈ Z[X] and p(X) = p1(X)p2(X). The resultant
Res(p1, p2) is equal to 9. Moreover, K1 = Q(i) ⊃ OK1 = Z[X]/(p1(X)) and K2 = Q(√2) ⊃ OK2 =
Z[X]/(p2(X)).
Then Z(p1) ∩ Z(p2) = IntQ(Ωp, Z) (see the proof of Theorem 4.5 and the diagram (4.1)) but Z(p1 · p2) =
Z(p) ( Z(p1) ∩ Z(p2) (Proposition 4.3). Notice that Z(p1), Z(p2) are integrally closed: Z(pi) = IntQ(Ωpi , Z)
for i = 1, 2, but Z(p) is not integrally closed. Here, condition iii) of Theorem 4.5 is not satisfied.
Example 4.7. p1(X) = X 2 − 5, p2(X) = X 2 − 6. The resultant of p1(X) and p2(X) is equal to 1. Then
K1 = Q(√5) ⊃ OK1 = Z[ 1+√5
Then Z(p1) ∩ Z(p2) ( IntQ(Ωp, Z) but Z(p) = Z(p1) ∩ Z(p2). Hence, Z(p) is not integrally closed, because
condition ii) of Theorem 4.5 is not satisfied.
] ) Z[√5] ∼= Z[X]/(p1(X)) and K2 = Q(√6) ⊃ OK2 = Z[X]/(p2(X)).
2
Corollary 4.8. Let p ∈ D[X] be a monic polynomial over D which is split in D. Then D(p) is integrally
closed if and only if the discriminant of p(X) is a unit in D.
Notice that if the latter condition holds, in particular p(X) is separable, that is, it has no repeated roots.
We denote by ∆(p) the discriminant of p(X).
Proof. Let Ωp = {α1, . . . , αn} ⊂ D be the multi-set of roots of p(X). By Theorem 3.3 the integral closure
of D(p) is Int(Ωp, D) =Ti D(X − αi).
It is enough to observe that ∆(p) =Qi<j (αi − αj)2 and that if pi(X) = X − αi, for i = 1, . . . , n, then
Res(pi, pj) = ±(αj − αi). Then by Theorem 4.5 we conclude.
Remark 4.9. The statement is false if we do not assume that p(X) is split over D. For example, let
D = Z and p(X) = X 2 − 2. Then Z(p) is integrally closed by Proposition 1.10 (see also Theorem 4.5),
because Z[√2] is the ring of integers OK of K = Q(√2), so Z(p) = IntQ({±√2}, OK ). However, ∆(p) = 8.
This implies that the pullback OK (p) ⊂ K[X] is not integrally closed: the polynomial f (X) = X−√2
is in
2√2
Int({±√2}, OK ) and not in OK (p), and by Theorem 3.3 f (X) is integral over OK (p).
D[X]
D[X]
K[X]
K[X]
Remark 4.10. We can prove Theorem 3.3 by means of a pullback diagram argument. By Lemma 1.6 and
Proposition 4.4, looking at the diagram (4.1), by [8, Lemma 1.1.4 (8)], IntK (Ωp, D) is the integral closure
p(X)K[X] is
p(X)D[X] (see the proof of [14, Theorem 10.15]). Hence, by [10, Proposition 2.7],
of D(p), since Qi DKi is the integral closure of
p(X)K[X] . Indeed, it is known that
the total quotient ring of
p(X)K[X] is the total quotient ring of every subring containing
p(X)D[X] in
K[X]
[2, Proposition 9, Chapt. V], Qk
over D, it follows that Qk
p(X)D[X] , and in particular of Qi D[αi]. By
i=1 DKi is the integral closure of D in Qk
i=1 D[αi] in Qk
i=1 DKi is the integral closure of Qk
i=1 K[αi]. Since each αi is integral
i=1 K[αi].
D[X]
5 General case of a finite set of integral elements over D
We show in this section how to apply the previous results to the more general setting mentioned in the
introduction, namely when the finite set of integral elements over D is not necessarily contained in an
algebraic extension of K. We recall the assumptions we mentioned in the introduction.
For simplicity, we assume that D is integrally closed. Let A be a D-algebra, possibly non-commutative
and with zero-divisors, which is finitely generated and torsion-free as a D-module. Note that every element
a of A is integral over D. Let µa(X) be the minimal polynomial of a over D, which is not necessarily
irreducible. To be precise, µa(X) is the monic generator of the ideal of K[X] of those polynomials which
are zero on a. Since D is supposed integrally closed and a is integral over D, µa ∈ D[X] (so that µa(X)
15
is also the generator of the ideal of D[X] of those polynomials which are zero at a). For short, we set
Ωa = Ωµa , the set of roots in D of µa(X). We may evaluate polynomials of K[X] at the elements of A in
the extended K-algebra B = A ⊗D K (note that, by assumption, K and A embed into B). Given a subset
S of A, we consider the ring of integer-valued polynomials over S:
IntK (S, A) = {f ∈ K[X] f (S) ⊂ A}.
For S = A, we have the ring IntK (A, A) = IntK (A) of integer-valued polynomials over A. For more details
about this setting we refer to [17]. As in [17], we consider polynomials over K whose evaluation at the
elements of S are not necessarily in A, but are still integral over D. For this reason, we call them integral-
valued polynomials over S, since they preserve the integrality of the elements of S. We retain the notation
introduced in [17].
Definition 5.1. Let K[S] be the K-subalgebra of B = A ⊗D K generated by K and the elements of S.
Let also S′ be the subset of K[S] of those elements which are integral over D. We set
which we call integral-valued polynomials over S.
IntK (S, S′) = {f ∈ K[X] f (S) ⊂ S′}
Note that in general S′ does not form a ring, if A is non-commutative (even if S is a ring; for example,
consider the case A = Mn(D)). Nevertheless, IntK(S, S′) does form a ring by the argument given in [17,
Proposition 6]: in order to show that IntK(S, S′) is closed under addition and multiplication, it is sufficient
to consider what happens point-wise and use the fact that for each s ∈ S, K[s] is a commutative K-algebra.
We note that the ring IntK (S, S′) is equal to the ring of polynomials in K[X] such that f (s) (which a priori
is in K[s] ⊆ B) is integral over D for each s ∈ S. Clearly, IntK(S, A) ⊆ IntK (S, S′), because every element
of A is integral over D. The key result which links the ring of integral-valued polynomials IntK (S, S′) to a
previous ring of integral-valued polynomials over a subset Ω of D is the following.
Theorem 5.2. [17, Theorem 9] Let S be a subset of A and set ΩS =Ss∈S Ωs ⊂ D. Then
IntK(S, S′) = IntK (ΩS, D).
Proof. For the sake of the reader we give the proof. Since 1 ∈ D ⊂ B, we may embed B into the
endomorphism ring EndK (B), via the map given by multiplication on the left by b ∈ B. In particular, A
is a sub-D-algebra of EndK(B), and for s ∈ S, Ωs is the set of eigenvalues (in K) of s considered as a
K-endomorphism of B. Since A is finitely generated as a D-module, by [3, Chapt. VII, §. 5, Proposition
10], for any polynomial f ∈ K[X], f (Ωs) = {f (α) α ∈ Ωs} is the set of eigenvalues of f (s), so that in our
notation f (Ωs) = Ωf (s). Given f ∈ K[X] and s ∈ S, f (s) is integral over D if and only if the elements of
Ωf (s) = f (Ωs) are integral over D (because D is integrally closed). The claim is then proved.
We are ready to give the proof of the last main result of the paper, see Corollary 1.5 of the Introduction.
IntK (S, A) is IntK (ΩS, D).
Corollary 5.3. Let S be a finite subset of A and ΩS = Ss∈S Ωs ⊂ D. Then the integral closure of
Proof. Let p(X) =Qs∈S µs(X) ∈ D[X]. By above, we have the following inclusions:
D(p) ⊆ IntK(S, A) ⊆ IntK (S, S′) = IntK(ΩS, D)
and the claim follows by Theorem 3.3.
16
Note that by Theorem 4.2, the ring IntK (S, A) has Prufer integral closure if and only if D is Prufer.
Acknowledgements.
We wish to thank the referee for his/her valuable suggestions which improved the quality of the paper.
The author was supported by the Austrian Science Foundation (FWF), Project Number P23245-N18,
INDAM and also University of Roma 3. The paper was prepared during a visit at the Department of
Mathematics and Physics of the University of Roma 3. The author wishes to thanks Francesca Tartarone
for the hospitality.
References
[1] M. Bhargava. On P-orderings, Rings of Integer-Valued Polynomials and Ultrametric Analysis, Journal
of the Amer. Math. Soc. 22 (4) (2009), 963-993.
[2] N. Bourbaki. Commutative Algebra. Hermann, Paris; Addison-Wesley Publishing Co., Reading, Mass.
(1972)
[3] N. Bourbaki: Algebra. Translated from the French by P. M. Cohn and J. Howie. Elements of Mathe-
matics (Berlin). Springer-Verlag, Berlin, 1990. vii+461 pp.
[4] J. G. Boynton, S. Sather-Wagstaff. Regular pullbacks. Progress in commutative algebra 2, 145-169,
Walter de Gruyter, Berlin, 2012.
[5] J. G. Boynton. Pullbacks of arithmetical rings. Comm. Algebra 35 (2007), no. 9, 2671-2684.
[6] J.-P. Cahen, J.-L. Chabert, Integer-valued polynomials, Amer. Math. Soc. Surveys and Monographs,
48, Providence, 1997.
[7] S. Evrard, Y. Fares, K. Johnson. Integer valued polynomials on lower triangular integer matrices,
Monats. fur Math. 170 (2013), no. 2, 147-160.
[8] M. Fontana, J. A. Huckaba, I. J. Papick. Prufer domains. Monographs and Textbooks in Pure and
Applied Mathematics, 203. Marcel Dekker, Inc., New York, 1997.
[9] S. Gabelli, E. Houston. Ideal Theory in Pullbacks, Non-Noetherian commutative ring theory, 199-227,
Math. Appl., 520, Kluwer Acad. Publ., Dordrecht, 2000.
[10] R. Gilmer. Multiplicative ideal theory, Corrected reprint of the 1972 edition. Queen's University,
Kingston, ON, 1992.
[11] M. Griffin. Prufer rings with zero divisors. J. Reine Angew. Math. 239/240 1969 55-67.
[12] S. McAdam. Unique factorization of monic polynomials. Comm. Algebra 29 (2001), no. 10, 4341-4343.
[13] D. L. McQuillan. Rings of integer-valued polynomials determined by finite sets. Proc. Roy. Irish Acad.
Sect. A 85 (1985), no. 2, 177-184.
[14] M. Nagata. Local rings. Interscience Tracts in Pure and Applied Mathematics, No. 13 Interscience
Publishers a division of John Wiley & Sons New York-London 1962.
[15] G. Peruginelli. Integral-valued polynomials over sets of algebraic integers of bounded degree, J. Number
Theory 137 (2014) 241-255.
[16] G. Peruginelli. Integer-valued polynomials over matrices and divided differences, Monatsh. Math. 173
(2014), no. 4, 559-571.
17
[17] G. Peruginelli, N. Werner. Integral closure of rings of integer-valued polynomials on algebras, in "Com-
mutative Algebra: Recent Advances in Commutative Rings, Integer-Valued Polynomials, and Polyno-
mial Functions", M. Fontana, S. Frisch and S. Glaz (editors), Springer 2014, pp. 293-305.
[18] J. F. Steffensen. Note on divided differences, Danske Vid. Selsk. Math.-Fys. Medd. 17,(1939). no. 3.
[19] B. L. van der Waerden. Algebra. Vol. I. Springer-Verlag, New York, 1991.
18
|
1904.05968 | 2 | 1904 | 2019-09-23T14:19:19 | Every quasitrivial n-ary semigroup is reducible to a semigroup | [
"math.RA",
"cs.DM",
"math.CO"
] | We show that every quasitrivial n-ary semigroup is reducible to a binary semigroup, and we provide necessary and sufficient conditions for such a reduction to be unique. These results are then refined in the case of symmetric n-ary semigroups. We also explicitly determine the sizes of these classes when the semigroups are defined on finite sets. As a byproduct of these enumerations, we obtain several new integer sequences. | math.RA | math |
EVERY QUASITRIVIAL n-ARY SEMIGROUP IS REDUCIBLE
TO A SEMIGROUP
MIGUEL COUCEIRO AND JIMMY DEVILLET
Abstract. We show that every quasitrivial n-ary semigroup is reducible to
a binary semigroup, and we provide necessary and sufficient conditions for
such a reduction to be unique. These results are then refined in the case of
symmetric n-ary semigroups. We also explicitly determine the sizes of these
classes when the semigroups are defined on finite sets. As a byproduct of these
enumerations, we obtain several new integer sequences.
1. Introduction
Let X be a nonempty set and let n ≥ 2 be an integer.
In this paper we are
interested in n-ary operations F ∶ X n → X that are associative, namely that satisfy
the following system of identities
F (x1, . . . , xi−1, F (xi, . . . , xi+n−1), xi+n, . . . , x2n−1)
= F (x1, . . . , xi, F (xi+1, . . . , xi+n), xi+n+1, . . . , x2n−1)
for all x1, . . . , x2n−1 ∈ X and all 1 ≤ i ≤ n − 1. This generalisation of associativity
was originally proposed by Dornte [4] and studied by Post [10] in the framework of
n-ary groups and their reductions. An operation F ∶ X n → X is said to be reducible
to a binary operation (resp. ternary operation) if it can be written as a composition
of a binary (resp. ternary) associative operation (see Definition 2.1).
Recently, the study of reducibility criteria for n-ary semigroups , that is, a set
X endowed with an associative n-ary operation, gained an increasing interest (see,
e.g., [1,5 -- 7]). In particular, Dudek and Mukhin [5] provided necessary and sufficient
conditions under which an n-ary associative operation is reducible to a binary
associative operation. Indeed, they proved (see [5, Theorem 1]) that an associative
operation F ∶ X n → X is reducible to an associative binary operation if and only if
one can adjoin a neutral element e to X for F , that is, there is an n-ary associative
extension F ∶ (X ⋃{e})n → X ⋃{e} of F such that e is a neutral element for F and
F X n = F . In this case, a binary reduction Ge of F can be defined by
Ge(x, y) = F (x, e, . . . , e
´¹¹¹¹¹¹¹¹¹¸¹¹¹¹¹¹¹¹¹¶
n−2 times
, y) x, y ∈ X.
Date: September 24, 2019.
1991 Mathematics Subject Classification. 05A15, 20N15; 16B99, 20M14.
Key words and phrases. quasitrivial polyadic semigroup, reducibility, symmetry, enumeration.
The second author is supported by the Luxembourg National Research Fund under the project
PRIDE 15/10949314/GSM.
1
2
M. COUCEIRO AND J. DEVILLET
Recently, Ackerman [1] also investigated reducibility criteria for n-ary associative
operations that are quasitrivial, that is, operations that preserve all unary relations:
for every x1, . . . , xn ∈ X, F (x1, . . . , xn) ∈ {x1, . . . , xn}.
Remark 1.1. Quasitrivial operations are also called conservative operations [11].
This property has been extensively used in the classification of constraint satisfac-
tion problems into complexity classes (see, e.g, [2] and the references therein).
The following result reassembles Corollaries 3.14 and 3.15, and Theorem 3.18
of [1].
Theorem 1.2. Let F ∶ X n → X be an associative and quasitrivial operation.
(a) If n is even, then F is reducible to an associative and quasitrivial binary
operation G∶ X 2 → X.
(b) If n is odd, then F is reducible to an associative and quasitrivial ternary
operation H∶ X 3 → X.
(c) If n = 3 and F is not reducible to an associative binary operation G∶ X 2 → X,
then there exist a1, a2 ∈ X with a1 ≠ a2 such that
● F (X∖{a1,a2})3 is reducible to an associative binary operation.
● a1 and a2 are neutral elements for F .
From Theorem 1.2 (c) it would follow that if an associative and quasitrivial
operation F ∶ X n → X is not reducible to an associative binary operation G∶ X 2 → X,
then n is odd and there exist distinct a1, a2 ∈ X that are neutral elements for F .
However, Theorem 1.2 (c) supposes the existence of a ternary associative and
quasitrivial operation H∶ X 3 → X that is not reducible to an associative binary
operation, and Ackerman did not provide any example of such an operation.
In this paper we show that there is no associative and quasitrivial n-ary opera-
tion that is not reducible to an associative binary operation (Corollary 2.3). Hence,
for any associative and quasitrivial operation F ∶ X n → X one can adjoin a neutral
element to X. Now this raises the question of whether such a binary reduction is
unique and whether it is quasitrivial. We show that both of these properties are
equivalent to the existence of at most one neutral element for the n-ary associative
and quasitrivial operation (Theorem 3.9). Since an n-ary associative and quasitriv-
ial operation has at most one neutral element when n is even or at most two when
n is odd (Proposition 3.7), in the case when X is finite, we also provide several
enumeration results (Propositions 3.15 and 3.17) that explicitly determine the sizes
of the corresponding classes of associative and quasitrival n-ary operations in terms
of the size of the underlying set X. As a by-product, these enumeration results
led to several integer sequences that were previously unknown in the Sloane's On-
Line Encyclopedia of Integer Sequences (OEIS, see [12]). These results are further
refined in the case of symmetric operations (Theorem 4.6).
2. Motivating results
In this section we recall some basic definitions and present some motivating
In particular, we show that every associative and quasitrivial operation
results.
F ∶ X n → X is reducible to an associative binary operation (Corollary 2.3).
Throughout this paper let k ≥ 1 and x ∈ X. We use the shorthand notation
[k] ={1, . . . , k} and n ⋅ x = x, . . . , x (n times), and we denote the set of all constant
X ={(n ⋅ y) y ∈ X}. Also, we denote the size of any set S by
S .
n-tuples over X by ∆n
QUASITRIVIAL n-ARY SEMIGROUPS
3
Recall that a neutral element for F ∶ X n → X is an element eF ∈ X such that
F((i − 1) ⋅ eF , x,(n − i) ⋅ eF) = x
for all x ∈ X and all i ∈ [n]. When the meaning is clear from the context, we may
drop the index F and denote a neutral element for F by e.
Definition 2.1 (see [1, 5]). Let G∶ X 2 → X, and H∶ X 3 → X be associative opera-
tions.
(1) An operation F ∶ X n → X is said to be reducible to G if F(x1, . . . , xn) =
Gn−1(x1, . . . , xn) for all x1, . . . , xn ∈ X, where G1 = G and
Gm(x1, . . . , xm+1) = Gm−1(x1, . . . , xm−1, G(xm, xm+1)),
for each integer 2 ≤ m ≤ n−1. In this case, G is said to be a binary reduction
of F .
(2) Similarly, F is said to be reducible to H if n is odd and F(x1, . . . , xn) =
Hn−3(x1, . . . , xn) for all x1, . . . , xn ∈ X, where H0 = H and
Hm(x1, . . . , xm+3) = Hm−2(x1, . . . , xm, H(xm+1, xm+2, xm+3)),
for each even integer 2 ≤ m ≤ n − 3. In this case, H is said to be a ternary
reduction of F .
As we will see, every associative and quasitrivial operation F ∶ X n → X is re-
ducible to an associative binary operation. To show this, we will make use of the
follwing auxiliary result.
Lemma 2.2 (see [5, Lemma 1]). If F ∶ X n → X is associative and has a neutral
element e ∈ X, then F is reducible to the associative operation Ge∶ X 2 → X defined
by
(2.1)
Ge(x, y) = F(x,(n − 2) ⋅ e, y), for every x, y ∈ X.
The following corollary follows from Theorem 1.2 and Lemma 2.2.
Corollary 2.3. Every associative and quasitrivial operation F ∶ X n → X is reducible
to an associative binary operation.
Theorem 1.2(c) states that a ternary associative and quasitrivial operation F ∶ X 3 →
X must have two neutral elements, whenever it is not reducible to a binary oper-
ation. In particular, we can show that two distinct elements a1, a2 ∈ X are neutral
elements for F if and only if they are neutral elements for the restriction F {a1,a2}3
of F to {a1, a2}3. Indeed, the condition is obviously necessary, while its sufficiency
follows from the Lemma 2.4 below.
Lemma 2.4. Let H∶ X 3 → X be an associative and quasitrivial operation.
H(a1, a1, x) = H(x, a1, a1) = x = H(x, a2, a2) = H(a2, a2, x),
(a) If a1, a2 ∈ X are two distinct neutral elements for H {a1,a2}3 , then
(b) If a1, a2 ∈ X are two distinct neutral elements for H {a1,a2}3 , then both a1
(a) Let x ∈ X. We only show that H(a1, a1, x) = x, since the other
{a1, a2}. So let x ∈ X ∖ {a1, a2} and, for a contradiction, suppose that
equalities can be shown similarly. Clearly, the equality holds when x ∈
and a2 are neutral elements for H.
x ∈ X.
Proof.
4
M. COUCEIRO AND J. DEVILLET
H(a1, a1, x) = a1. By the associativity and quasitriviality of H, we then
have
a1 = H(a1, a1, x) = H(a1, H(a1, a2, a2), x)
= H(H(a1, a1, a2), a2, x) = H(a2, a2, x) ∈{a2, x},
which contradicts the fact that a1, a2 and x are pairwise distinct.
(b) Suppose to the contrary that a1 is not a neutral element for H (the other
case can be dealt with similarly). By Lemma 2.4(a) we have that H(a1, a1, y) =
H(y, a1, a1) = y for all y ∈ X. By assumption, there exists x ∈ X ∖{a1, a2}
such that H(a1, x, a1) = a1. We have two cases to consider.
● If H(a2, x, a2) = x, then by Lemma 2.4(a) we have that
H(x, a2, a1) = H(H(x, a1, a1), a2, a1) = H(x, a1, H(a1, a2, a1))
= H(x, a1, a2) = H(H(a1, a1, x), a1, a2)
= H(a1, H(a1, x, a1), a2) = H(a1, a1, a2) = a2.
Also, by Lemma 2.4(a) we have that
which contradicts the fact that x ≠ a1.
x = H(x, a1, a1) = H(H(a2, x, a2), a1, a1)
= H(a2, H(x, a2, a1), a1) = H(a2, a2, a1) = a1,
● If H(a2, x, a2) = a2, then by Lemma 2.4(a) we have that
H(x, x, a2) = H(x, H(a2, a2, x), a2)
= H(x, a2, H(a2, x, a2)) = H(x, a2, a2) = x,
and
H(a1, x, x) = H(a1, H(x, a1, a1), x)
= H(H(a1, x, a1), a1, x) = H(a1, a1, x) = x.
By Lemma 2.4(a) we also have that
x = H(x, a2, a2) = H(H(a1, x, x), a2, a2)
= H(a1, H(x, x, a2), a2) = H(a1, x, a2)
= H(a1, H(x, a1, a1), a2) = H(H(a1, x, a1), a1, a2)
= H(a1, a1, a2) = a2,
which contradicts the fact that x ≠ a2.
(cid:3)
We now present some geometric considerations of quasitrivial operations. The
preimage of an element x ∈ X under an operation F ∶ X n → X is denoted by F −1[x].
When X is finite, namely X = [k], we also define the preimage sequence of F as
the nondecreasing k-element sequence of the numbers F −1[x] , x ∈[k]. We denote
this sequence by F −1 .
Recall that the kernel of an operation F ∶[k]n → [k] is the equivalence relation
Ker(F) = {{x, y} F(x) = F(y)}. The contour plot of F ∶[k]n → [k] is the undi-
rected graph CF = ([k]n, E), where E is the non-reflexive part of Ker(F), that is,
E = {{x, y} x ≠ y and F(x) = F(y)}. We say that two tuples x, y ∈ [k]n are
F -connected (or simply connected ) if {x, y} ∈ Ker(F).
F(n ⋅ x) = x for all x ∈ X.
By an idempotent operation, we mean an operation F ∶ X n → X that satisfies
QUASITRIVIAL n-ARY SEMIGROUPS
5
Lemma 2.5. An operation F ∶[k]n →[k] is quasitrivial if and only if it is idempo-
tent and each (x1, ..., xn) ∈[k]n ∖ ∆n
Proof. Clearly, F is quasitrivial if and only if it is idempotent and for any(x1, ..., xn) ∈
[k]n ∖ ∆n
[k] there exists i ∈{1, ..., n} such that F(x1, ..., xn) = xi = F(n ⋅ xi).
[k] is connected to some (n ⋅ x) ∈ ∆n
[k].
(cid:3)
In the sequel we shall make use of the following two lemmas.
Remark 2.8. A neutral element need not be unique when n ≥ 3 (for instance,
one component equal to x. By Lemma 2.6, we conclude that there are exactly
(cid:3)
Lemma 2.6. For each x ∈ [k], the number of tuples (x1, . . . , xn) ∈ [k]n with at
least one component equal to x is given by kn −(k − 1)n.
Proof. Let x ∈[k]. The set of tuples in [k]n with at least one component equal to x
is the set [k]n ∖([k] ∖{x})n, and its cardinality is kn −(k − 1)n since ([k] ∖{x})n ⊆
[k]n.
Lemma 2.7. Let F ∶[k]n →[k] be a quasitrivial operation. Then, for each x ∈[k],
we have F −1[x] ≤ kn −(k − 1)n.
Proof. Let x ∈ [k]. Since F ∶[k]n → [k] is quasitrivial, it follows from Lemma 2.5
that the point (n ⋅ x) is at most connected to all (x1, ..., xn) ∈ [k]n with at least
kn −(k − 1)n such points.
Recall that an element z ∈ X is said to be an annihilator for F if F(x1, ..., xn) = z,
whenever (x1, ..., xn) ∈ X n has at least one component equal to z.
F(x1, x2, x3) ≡ x1 + x2 + x3 (mod 2) on X = Z2). However, if an annihilator exists,
Proposition 2.9. Let F ∶[k]n → [k] be a quasitrivial operation and let z ∈ [k].
Then z is an annihilator if and only if F −1[z] = kn −(k − 1)n.
Proof. (Necessity) If z is an annihilator, then we know that F(i ⋅ z, xi+1, ..., xn) = z
for all i ∈[n], all xi+1, ..., xn ∈ [k] and all permutations of (i ⋅ z, xi+1, ..., xn). Thus,
by Lemma 2.6 (n ⋅ z) is connected to kn −(k − 1)n points. Finally, using Lemma
2.7 we get F −1[z] = kn −(k − 1)n.
(Sufficiency) If F −1[z] = kn −(k − 1)n, then by Lemmas 2.5 and 2.6 we have
that (n ⋅ z) is connected to the kn −(k − 1)n points (x1, ..., xn) ∈ [k]n containing
at least one component equal to z. Thus, we have F(i ⋅ z, xi+1, ..., xn) = z for all
i ∈ [n], all xi+1, ..., xn ∈ [k] and all permutations of (i ⋅ z, xi+1, ..., xn), which shows
Remark 2.10. By Proposition 2.9, if F ∶[k]n → [k] is quasitrivial, then each ele-
ment x such that F −1[x] = kn −(k − 1)n is unique.
that z is an annihilator.
then it is unique.
(cid:3)
(cid:3)
3. Criteria for unique reductions and some enumeration results
In this section we show that an associative and quasitrivial operation F ∶ X n → X
is uniquely reducible to an associative and quasitrivial binary operation if and only
if F has at most one neutral element (Theorem 3.9). We also enumerate the class of
associative and quasitrivial n-ary operations, which leads to a previously unknown
sequence in the OEIS [12] (Proposition 3.17). Let us first recall a useful result
from [6].
6
M. COUCEIRO AND J. DEVILLET
Lemma 3.1 (see [6, Proposition 3.5]). Assume that the operation F ∶ X n → X is
associative and reducible to associative binary operations G∶ X 2 → X and G′∶ X 2 →
X. If G and G′ are idempotent or have the same neutral element, then G = G′.
From Lemma 3.1, we immediately get a necessary and sufficient condition that
guarantees unique reductions for associative operation that have a neutral element.
Corollary 3.2. Let F ∶ X n → X be an associative operation that is reducible to as-
sociative binary operations G∶ X 2 → X and G′∶ X 2 → X that have neutral elements.
Then, G = G′ if and only if G and G′ have the same neutral element.
Using Lemma 2.2, Corollary 3.2, and observing that
(i) a binary associative operation has at most one neutral element,
(ii) the neutral element of a binary reduction G∶ X 2 → X of an associative
operation F ∶ X n → X is also a neutral element for F , and
(iii) if e is a neutral element for an associative operation F ∶ X n → X and G∶ X 2 →
X is a reduction of F , then Gn−2((n−1) ⋅e) (see Definition 2.1) is the neutral
element for G,
we can generalise Corollary 3.2 as follows.
Proposition 3.3. Let F ∶ X n → X be an associative operation, and let EF be the
set of its neutral elements and RF of its binary reductions. If EF ≠ ∅, then for any
G ∈ RF , there exists e ∈ EF such that G = Ge. Moreover, the mapping σ∶ EF → RF
defined by σ(e) = Ge is a bijection. In particular, e is the unique neutral element
for F if and only if Ge is the unique binary reduction of F .
As we will see in Proposition 3.7, the size of EF , and thus of RF , is at most 2
whenever F is quasitrivial.
X ,
Let Q2
1(X) denote the class of associative and quasitrivial operations G∶ X 2 → X
1(X) denote the class of associative
that have exactly one neutral element, and let A2
operations G∶ X 2 → X that have exactly one neutral element eG ∈ X and that satisfy
the following conditions:
Note that Q2
Q2
1(X) = X X 2
1(X) = A2
1(X). Actually, we have that G ∈ Q2
● G(x, x) ∈{eG, x} for all x ∈ X,
● G(x, y) ∈{x, y} for all (x, y) ∈ X 2 ∖ ∆2
● If there exists x ∈ X ∖{eG} such that G(x, x) = eG, then x is unique and
we have G(x, y) = G(y, x) = y for all y ∈ X ∖{x, eG}.
when X = 1. Also, it is not difficult to see that
1(X) and
1(X) ⊆ A2
G−1[e] = 1, where e is the neutral element for G. A characterization of the class
1(X) can be found
Recall that two groupoids (X, G) and (Y, G′) are said to be isomorphic, and
we denote it by (X, G) ≃ (Y, G′), if there exists a bijection φ∶ X → Y such that
φ(G(x, y)) = G′(φ(x), φ(y)) for every x, y ∈ X. The following straightforward
1(X) gives rise to a
proposition states, in particular, that any G ∈ A2
semigroup which has a unique 2-element subsemigroup isomorphic to the additive
semigroup on Z2.
of associative and quasitrivial binary operations as well as Q2
in [3, Theorem 2.1, Fact 2.4].
1(X) if and only if G ∈ A2
1(X) ∖ Q2
Proposition 3.4. Let G∶ X 2 → X be an operation. Then G ∈ A2
if and only if there exists a unique pair (x, y) ∈ X 2 ∖ ∆2
X such that the following
1(X) ∖ Q2
1(X)
conditions hold
QUASITRIVIAL n-ARY SEMIGROUPS
7
(a) ({x, y}, G {x,y}2) ≃(Z2, +),
(b) G (X∖{x,y})2 is associative and quasitrivial, and
(c) every z ∈ X ∖{x, y} is an annihilator for G {x,y,z}2 .
Proposition 3.5. Let F ∶ X n → X be an associative and quasitrivial operation.
Suppose that e ∈ X is a neutral element for F .
(a) If n is even, then F is reducible to an operation G ∈ Q2
(b) If n is odd, then F is reducible to the operation Ge ∈ A2
1(X).
1(X).
Proof. (a) By Theorem 1.2(a) we have that F is reducible to an associative and
quasitrivial binary operation G∶ X 2 → X. Finally, we observe that Gn−2((n − 1) ⋅ e)
is the neutral element for G.
associativity of Ge, we have that
(b) By Lemma 2.2 we have that F is reducible to an associative operation
Ge∶ X 2 → X of the form (2.1) and that e is also a neutral element for Ge. Since
If
F is quasitrivial, it follows from (2.1) that Ge(x, x) ∈ {x, e} for all x ∈ X.
X = 2, then the proof is complete. So suppose that X > 2 and let us show that
Ge(x, y) ∈ {x, y} for all (x, y) ∈ X 2 ∖ ∆2
X . Since e is a neutral element for Ge, we
have that Ge(x, e) = Ge(e, x) = x for all x ∈ X ∖{e}. So suppose to the contrary
that there are distinct x, y ∈ X ∖{e} such that Ge(x, y)~∈{x, y}. As Ge is a reduc-
tion of F and F is quasitrivial, we must have Ge(x, y) = e. But then, using the
y = Ge(e, y) = Ge(Ge(x, y), y) = Ge(x, Ge(y, y)) ∈{Ge(x, y), Ge(x, e)} ={e, x},
Now, suppose that there exists x ∈ X ∖ {e} such that Ge(x, x) = e and let
y ∈ X ∖{x, e}. Since
we must have Ge(x, y) = y. Similarly, we can show that Ge(y, x) = y.
to the contrary that there exists x′ ∈ X ∖{x, e} such that Ge(x′, x′) = e. Since x, x′
y = Ge(e, y) = Ge(Ge(x, x), y) = Ge(x, Ge(x, y)),
To complete the proof, we only need to show that such an x is unique. Suppose
which contradicts the fact that x, y and e are pairwise distinct.
and e are pairwise distinct and
and
x′ = Ge(e, x′) = Ge(Ge(x, x), x′) = Ge(x, Ge(x, x′)),
x = Ge(x, e) = Ge(x, Ge(x′, x′)) = Ge(Ge(x, x′), x′),
we must have x = Ge(x, x′) = x′, which yields the desired contradiction.
We observe that the associative operation F ∶ Zn
2 → Z2 defined by
(cid:3)
F(x1, . . . , xn) ≡
n
Q
i=1
xi (mod 2),
x1, . . . , xn ∈ Z2,
has 2 neutral elements, namely 0 and 1, when n is odd. Moreover, it is quasitrivial if
and only if n is odd. This also illustrates the fact that an associative and quasitrivial
n-ary operation that has 2 neutral elements does not necessarily have a quasitrivial
reduction. Indeed, when n is odd, G(x1, x2) ≡ x1 + x2 (mod 2) and G′(x1, x2) ≡
x1 + x2 + 1 (mod 2) on X = Z2 are two distinct reductions of F but neither is
1(X), then it is quasitrivial. The following proposition provides a necessary
G ∈ Q2
and sufficient condition for F to be quasitrivial when G ∈ A2
Clearly, if an associative operation F ∶ X n → X is reducible to an operation
quasitrivial.
1(X) ∖ Q2
1(X).
8
M. COUCEIRO AND J. DEVILLET
1(X) ∖ Q2
Proposition 3.6. Let F ∶ X n → X be an associative operation. Suppose that F is
reducible to an operation G ∈ A2
if n is odd.
1(X). Then, F is quasitrivial if and only
Proof. To show that the condition is necessary, let x ∈ X ∖{e} such that G(x, x) = e.
If n is even, then F(n ⋅ x) = G n
1(X),
clearly have that F(n ⋅ x) = x for all x ∈ X such that G(x, x) = x.
Let y ∈ X ∖{e} such that G(y, y) = e. Since n is odd, we have that
⋅ G(y, y) = G(y, e) = y.
⋅ G(x, x)) = e, contradicting quasitriviality.
1(X)∖Q2
and thus we only need to show that F is idempotent. Since F is reducible to G, we
So let us prove that the condition is also sufficient. Note that G ∈ A2
F(n ⋅ y) = G y, G n−1
2 −1 n − 1
2
2 −1( n
2
Hence, F is idempotent and the proof is now complete.
(cid:3)
It is not difficult to see that the operation F ∶ Zn
n−1 → Zn−1 defined by
F(x1, . . . , xn) ≡
n
Q
i=1
xi (mod (n − 1)),
x1, . . . , xn ∈ Zn−1,
is associative, idempotent, symmetric (that is, F(x1, . . . , xn) is invariant under any
permutation of x1, . . . , xn), and has n − 1 neutral elements. However, this number
is much smaller for quasitrivial operations.
Proposition 3.7. Let F ∶ X n → X be an associative and quasitrivial operation.
(a) If n is even, then F has at most one neutral element.
(b) If n is odd, then F has at most two neutral elements.
Proof. (a) By Theorem 1.2(a) we have that F is reducible to an associative and
quasitrivial binary operation G∶ X 2 → X. Suppose that e1, e2 ∈ X are two neutral
elements for F . Since G is quasitrivial we have
e2 = F((n − 1) ⋅ e1, e2) = G(Gn−2((n − 1) ⋅ e1), e2)
= G(e1, e2) = G(e1, Gn−2((n − 1) ⋅ e2)) = F(e1,(n − 1) ⋅ e2) = e1.
Hence, F has at most one neutral element.
(b) By Theorem 1.2(b) we have that F is reducible to an associative and quasi-
trivial ternary operation H∶ X 3 → X. For a contradiction, suppose that e1, e2, e3 ∈
X are three distinct neutral elements for F . Since H is quasitrivial, it is not difficult
to see that e1, e2, and e3 are neutral elements for H. Also, by Proposition 3.5(b)
we have that H is reducible to the operations Ge1 , Ge2 , Ge3 ∈ A2
we have
1(X). In particular,
Ge1(e2, e3) = Ge1(Ge1(e1, e2), e3)
= H(e1, e2, e3) = Ge2(Ge2(e1, e2), e3) = Ge2(e1, e3)
and
H(e1, e2, e3) = Ge3(e1, Ge3(e2, e3)) = Ge3(e1, e2).
Hence, H(e1, e2, e3) ∈ {e2, e3} ∩{e1, e3} ∩{e1, e2}, which shows that e1, e2, e3 are
not pairwise distinct, and thus yielding the desired contradiction.
(cid:3)
Corollary 3.8. Let F ∶ X n → X be an operation and let e1 and e2 be distinct
elements of X. Then F is associative, quasitrivial, and has exactly the two neutral
QUASITRIVIAL n-ARY SEMIGROUPS
9
elements e1 and e2 if and only if n is odd and F is reducible to exactly the two
operations Ge1 , Ge2 ∈ A2
1(X) ∖ Q2
1(X).
Proof. (Necessity) This follows from Propositions 3.3, 3.5, and 3.7 together with
the observation that Ge1(e2, e2) = e1 and Ge2(e1, e1) = e2.
(Sufficiency) This follows from Propositions 3.3 and 3.6.
(cid:3)
We can now state and prove the main result of this section.
Theorem 3.9. Let F ∶ X n → X be an associative and quasitrivial operation. The
following assertions are equivalent.
(i) Any binary reduction of F is idempotent.
(ii) Any binary reduction of F is quasitrivial.
(iii) F has at most one binary reduction.
(iv) F has at most one neutral element.
(v) F((n − 1) ⋅ x, y) = F(x,(n − 1) ⋅ y) for any x, y ∈ X.
Proof. The implications (i) ⇒((ii) and (v)) and (v) ⇒ (iv) are straightforward. By
Proposition 3.7 and Corollary 3.8 we also have the implications ((ii) or (iii)) ⇒ (iv).
Hence, to complete the proof, it suffices to show that (iv) ⇒ ((i) and (iii)). First,
we prove that (iv) ⇒ (i). We consider the two possible cases.
If F has a unique neutral element e, then by Proposition 3.3 G = Ge is the unique
reduction of F with neutral element e. For the sake of a contradiction, suppose
that G is not idempotent. By Proposition 3.5 we then have that n is odd and
G ∈ A2
1(X) ∖ Q2
So let x ∈ X ∖{e} such that G(x, x) ≠ x. Since G = Ge, we must have G(x, x) = e.
It is not difficult to see that F(y,(n − 1) ⋅ x) = y = F((n − 1) ⋅ x, y) for all y ∈ X.
Now, if there is i ∈{2, . . . , n − 1} such that
1(X).
F((i − 1) ⋅ x, e,(n − i) ⋅ x) = x,
then we have that i − 1 and n − i are both even or both odd (since n is odd), and
thus
x = F((i − 1) ⋅ x, e,(n − i) ⋅ x) ∈{G2(x, e, x), G2(e, e, e)} ={e},
which contradicts our assumption that x ≠ e. Hence, we have F((i − 1) ⋅ x, e,(n −
i) ⋅ x) = e for all i ∈{1, . . . , n}.
Now, if X = 2, then the proof is complete since e and x are both neutral elements
for F , which contradicts our assumption. So suppose that X > 2.
Since e is the unique neutral element for F , there exist y ∈ X ∖ {e, x} and
i ∈{2, . . . , n − 1} such that
F((i − 1) ⋅ x, y,(n − i) ⋅ x) = x.
Again by the fact that n is odd, i − 1 and n − i are both even or both odd, and thus
x = F((i − 1) ⋅ x, y,(n − i) ⋅ x) ∈{G2(x, y, x), G2(e, y, e)} ={G2(x, y, x), y}.
Since x ≠ y, we thus have that G2(x, y, x) = x. But then
e = G(x, x) = G(x, G2(x, y, x))
= G(G(x, x), G(y, x)) = G(e, G(y, x)) = G(y, x) ∈{x, y},
which contradicts our assumption that x, y, and e are pairwise distinct.
Now, suppose that F has no neutral element and that G is a reduction of F that
is not idempotent. So let x ∈ X such that G(x, x) ≠ x, and let y ∈ X ∖{x, G(x, x)}.
10
M. COUCEIRO AND J. DEVILLET
By the quasitriviality of F we have F((n − 1) ⋅ x, y) ∈ {x, y}. On the other hand,
by the quasitriviality (and hence idempotency) of F and the associativity of G we
have
F((n − 1) ⋅ x, y) = F(F(n ⋅ x),(n − 2) ⋅ x, y)
= G(Gn−2(Gn−1(n ⋅ x),(n − 2) ⋅ x), y)
= G(G2n−3((2n − 2) ⋅ x), y)
= G(Gn−2((n − 1) ⋅ G(x, x)), y)
= F((n − 1) ⋅ G(x, x), y) ∈{G(x, x), y}.
Since x, G(x, x), and y are pairwise distinct, it follows that F((n − 1) ⋅ x, y) = y,
which implies that G(Gn−2((n − 1) ⋅ x), y) = y. Similarly, we can show that
G(y, Gn−2((n − 1) ⋅ x)) = y.
Also, it is not difficult to see that
G(Gn−2((n − 1) ⋅ x), G(x, x)) = G(x, x) = G(G(x, x), Gn−2((n − 1) ⋅ x)).
Furthermore, since F is idempotent and reducible to G, we also have that
G(Gn−2((n − 1) ⋅ x), x) = x = G(x, Gn−2((n − 1) ⋅ x)).
Thus Gn−2((n − 1) ⋅ x) is a neutral element for G and therefore a neutral element
for F , which contradicts our assumption that F has no neutral element.
As both cases yield a contradiction, we conclude that G must be idempotent. The
implication (iv) ⇒ (iii) is an immediate consequence of the implication (iv) ⇒ (i)
together with Lemma 3.1. Thus, the proof of Theorem 3.9 is now complete.
(cid:3)
Remark 3.10. We observe that an alternative necessary and sufficient condition
for the quasitriviality of a binary reduction of an n-ary quasitrivial semigroup has
also been provided in [1, Corollary 3.16].
Theorem 3.9 together with Corollary 2.3 imply the following result.
Corollary 3.11. Let F ∶ X n → X be an operation. Then F is associative, qua-
sitrivial, and has at most one neutral element if and only if it is reducible to an
associative and quasitrivial operation G∶ X 2 → X.
In this case, G is defined by
G(x, y) = F(x,(n − 1) ⋅ y).
Recall that a weak ordering on X is a binary relation ≲ on X that is total and
transitive (see, e.g., [8] p. 14). We denote the symmetric part of ≲ by ∼. Also, a
weakly ordered set, an element a ∈ X is said to be maximal for ≲ if x ≲ a for all
total ordering on X is a weak ordering on X that is antisymmetric. If (X, ≲) is a
x ∈ X. We denote the set of maximal elements of X for ≲ by M≲(X).
Given a weak ordering ≲ on X, the n-ary maximum operation on X for ≲ is the
partial symmetric n-ary operation maxn
≲ defined on
X n ∖{(x1, . . . , xn) ∈ X n ∶ M≲({x1, . . . , xn}) ≥ 2}
≲(x1, . . . , xn) = xi where i ∈ [n] is such that xj ≲ xi for all j ∈ [n]. If ≲
by maxn
reduces to a total ordering, then clearly the operation maxn
≲ is defined everywhere
on X n. Also, the projection operations π1∶ X n → X and πn∶ X n → X are respectively
defined by π1(x1, . . . , xn) = x1 and πn(x1, . . . , xn) = xn for all x1, . . . , xn ∈ X.
QUASITRIVIAL n-ARY SEMIGROUPS
11
Corollary 3.11 together with [9, Theorem 1] and [3, Corollary 2.3] imply the
following characterization of the class of quasitrivial n-ary semigroups with at most
one neutral element.
Theorem 3.12. Let F ∶ X n → X be an operation. Then F is associative, quasitriv-
ial, and has at most one neutral element if and only if there exists a weak ordering
≲ on X and a binary reduction G∶ X 2 → X of F such that
G A×B = ⎧⎪⎪⎨⎪⎪⎩
π1 A×B or π2 A×B,
max2
≲ A×B ,
if A = B,
otherwise,
∀A, B ∈ X~ ∼.
(3.1)
(3.2)
Moreover, when X =[k], then the weak ordering ≲ is uniquely defined as follows:
x ≲ y ⇔ G−1[x] ≤ G−1[y] ,
x, y ∈[k].
Now, let us illustrate Theorem 3.12 for binary operations by means of their
contour plots. We can always represent the contour plot of any operation G∶[k]2 →
[k] by fixing a total ordering on [k]. In Figure 1 (left), we represent the contour
plot of an operation G∶ X 2 → X using the usual total ordering ≤ on X ={1, 2, 3, 4}.
To simplify the representation of the connected components, we omit edges that
can be obtained by transitivity. It is not difficult to see that G is quasitrivial. To
check whether G is associative, by Theorem 3.12, it suffices to show that G is of
the form (3.1) where the weak ordering ≲ is defined on X by (3.2). In Figure 1
(right) we represent the contour plot of G using the weak ordering ≲ on X defined
by (3.2). We observe that G is of the form (3.1) for ≲ and thus by Theorem 3.12 it
is associative.
✻
4
3
2
1
r
r
r
r
✄
r
r
r
✂
r
r
r
r
r
r
r
r
✁
r
✻
1
3
4
2
r
r
r
r
r
r
r
r
r
r
r
r
r
r
r
r
✲
✲
1
2
3
4
2
4
3
1
Figure 1. An associative and quasitrivial binary operation G on
X = {1, 2, 3, 4} whose values on (1, 1),(2, 2),(3, 3) and (4, 4) are
1, 2, 3 and 4, respectively.
1, . . . , x′
Let ≤ be a total ordering on X. An operation F ∶ X n → X is said to be ≤-
for which an operation G ∈ A2
the binary addition modulo 2.
associative binary operations G∶ X 2 → X are ≤-preserving for any total ordering on
n), whenever xi ≤ x′
preserving if F(x1, . . . , xn) ≤ F(x′
i for all i ∈ [n]. Some
X (e.g., G(x, y) = x for all x, y ∈ X). However, there is no total ordering ≤ on X
1(X) is ≤-preserving. A typical example is
1(X), then there is no total
Proposition 3.13. Suppose X ≥ 2. If G ∈ A2
Proof. Let e ∈ X be the neutral element for G and let x ∈ X ∖ {e} such that
G(x, x) = e. Suppose to the contrary that there exists a total ordering ≤ on X such
ordering ≤ on X that is preserved by G.
1(X) ∖ Q2
1(X) ∖ Q2
12
M. COUCEIRO AND J. DEVILLET
that G is ≤-preserving. If x < e, then e = G(x, x) ≤ G(x, e) = x, which contradicts
our assumption. The case x > e yields a similar contradiction.
(cid:3)
Remark 3.14. It is not difficult to see that any ≤-preserving operation F ∶ X n → X
has at most one neutral element. Therefore, by Corollary 2.3 and Theorem 3.9 we
conclude that any associative, quasitrivial, and ≤-preserving operation F ∶ X n → X
is reducible to an associative, quasitrivial, and ≤-preserving operation G∶ X 2 → X.
For a characterization of the class of associative, quasitrivial, and ≤-preserving
operations G∶ X 2 → X, see [3, Theorem 4.5].
We now provide several enumeration results that give the sizes of the classes of
associative and quasitrivial operations that were considered above when X = [k].
Recall that for any integers 0 ≤ ℓ ≤ k, the Stirling number of the second kind k
ℓ is
defined by
k
ℓ = 1
ℓ!
ℓ
Q
i=0(−1)ℓ−iℓ
i ik.
1(k) the cardinality of Q2
1([k]). By definition, we have a2
by q2
of A2
In [3] the authors solved several
enumeration problems concerning associative and quasitrivial binary operations.
For any integer k ≥ 0, let q2(k) (resp. qn(k)) denote the number of associative and
quasitrivial binary (resp. n-ary) operations on [k]. For any integer k ≥ 1, we denote
1(k) the cardinality
In particular, they computed q2(k) (see [3, Theorem 4.1]) as well as q2
1(k) (see
A292932(k) and A292933(k). The following result summarizes [3, Theorem 4.1]
[3, Proposition 4.2]). These sequences were also introduced in the OEIS [12] as
1([k]). Also, we denote by a2
1(1) = 1.
and [3, Proposition 4.2].
Proposition 3.15. For any integer k ≥ 0, we have the closed-form expression
q2(k) =
k
Q
i=0
2i
k−i
Q
ℓ=0(−1)ℓk
ℓk − ℓ
i (i + ℓ)! ,
k ≥ 0,
1([k]) ∖ Q2
Proposition 3.16. For any integer k ≥ 2, we have a2
Proof. We already have that Q2
an operation G ∈ A2
where q2(0) = q2(1) = 1. Moreover, for any integer k ≥ 1, we have q2
1)q2(k − 2).
1(k) = k q2(k−1).
1(k) = kq2(k − 1) + k(k −
1([k]) ⊆ A2
1([k]). Now, let us show how to construct
1([k]). There are k ways to choose the element x ∈[k]
such that G(x, x) = e and G(x, y) = G(y, x) = y for all y ∈ [k] ∖ {x, e}. Then
1([k] ∖ {x}),
we observe that the restriction of G to ([k] ∖ {x})2 belongs to Q2
1(k − 1) possible choices to construct this restriction. This shows
1(k) + kq2
1(k − 1). Finally, by Proposition 3.15 we conclude that
1(k) = kq2(k − 1) + k(k − 1)q2(k − 2).
0(k)) denote the number of associative and
2(k) denote the number
2(1) = 0. The following proposition provides
no neutral element) on [k]. Also, for any integer k ≥ 1, let qn
[k]. Clearly, qn(1) = qn
of associative and quasitrivial n-ary operations that have two neutral elements on
quasitrivial n-ary operations that have exactly one neutral element (resp. that have
so we have q2
that a2
a2
explicit forms of the latter sequences. Table 1 below provides the first few values of
all the previously considered sequences. In view of Corollary 3.8, we only consider
the case where n is odd for qn
1(1) = 1 and qn
1(k) (resp. qn
For any integer k ≥ 1 let qn
1(k) = q2
(cid:3)
2(k) and qn(k).
QUASITRIVIAL n-ARY SEMIGROUPS
13
Proposition 3.17. For any integer k ≥ 1 we have qn
q2(k) − q2
1(k). Also, for any integer k ≥ 2 we have
1(k) = q2
1(k) and qn
0(k) =
and
qn(k) =
if n is even
if n is odd.
qn
2(k) =
0
k
2q2(k − 2)
q2(k)
q2(k) +k
2q2(k − 2)
if n is even
if n is odd.
Proof. By Theorem 3.9 we have that the number of associative and quasitrivial
n-ary operations that have exactly one neutral element (resp. that have no neutral
element) on [k] is exactly the number of associative and quasitrivial binary opera-
tion on [k] that have a neutral element (resp. that have no neutral element). This
1(k)). Also, if n is even, then by Theorem
1.2(a) and Proposition 3.7(a) we conclude that qn(k) = q2(k) and qn
1(k) (resp. q2(k) − q2
Now, suppose that n is odd. By Corollary 3.8 and Propositions 3.15 and 3.16
number is given by q2
2(k) = 0.
we have that qn
that qn(k) = qn
2(k) = a2
0(k) + qn
1(k)−q2
1 (k)
2
1(k) + qn
=k
2q2(k − 2). Finally, by Proposition 3.7 we have
2(k) = q2(k) +k
2q2(k − 2).
(cid:3)
k
1
2
3
4
5
6
q2(k)
q2
1(k)
qn
0(k)
qn
2(k)
qn(k)
a2
1(k)
1
4
18
128
1 090
11 232
OEIS A292932 A292933 A308352 A308354 A308362 A308351
1
4
20
138
1 182
12 166
1
5
23
162
1 382
14 236
0
2
8
58
492
5 074
1
2
12
80
690
7 092
0
1
3
24
200
2 070
Table 1. First few values of q2(k), q2
1(k), qn
0(k), qn
2(k), qn(k) and a2
1(k)
4. Symmetric operations
In this section we refine our previous results to the subclass of associative and
quasitrivial operations that are symmetric, and present further enumeration results
accordingly.
We first recall and establish some auxiliary results.
Fact 4.1. Suppose that F ∶ X n → X is associative and surjective. If it is reducible
to an associative operation G∶ X 2 → X, then G is surjective.
Lemma 4.2 (see [6, Lemma 3.6]). Suppose that F ∶ X n → X is associative, sym-
metric, and reducible to an associative and surjective operation G∶ X 2 → X. Then
G is symmetric.
Proposition 4.3. If F ∶ X n → X is associative, quasitrivial, and symmetric, then
it is reducible to an associative, surjective, and symmetric operation G∶ X 2 → X.
Moreover, if X =[k], then F has a neutral element.
14
M. COUCEIRO AND J. DEVILLET
Proof. By Corollary 2.3, F is reducible to an associative operation G∶ X 2 → X. By
Fact 4.1 and Lemma 4.2, it follows that G is surjective and symmetric.
For the moreover part, we only have two cases to consider.
● If G is quasitrivial, then by [3, Theorem 3.3] it follows that G has a neutral
element, and thus F also has a neutral element.
● If G is not quasitrivial, then by Proposition 3.7 and Theorem 3.9 F has in
(cid:3)
fact two neutral elements.
Proposition 4.4 (see [1, Corollary 4.10]). An operation F ∶ X n → X is associative,
quasitrivial, symmetric, and reducible to an associative and quasitrivial operation
G∶ X 2 → X if and only if there exists a total ordering ⪯ on X such that F = maxn
⪯ .
Proposition 4.5. A quasitrivial operation F ∶[k]n →[k] is associative, symmetric,
and reducible to an associative and quasitrivial operation G∶[k]2 → [k] if and only
if F −1 =(1, 2n − 1, . . . , kn −(k − 1)n).
Proof. (Necessity) Since G is quasitrivial, it is surjective and hence by Lemma 4.2
it is symmetric. Thus, by Proposition 4.4 there exists a total ordering ⪯ on X
⪯ , which has an
⪯(x, y) for all x, y ∈ [k]. Hence F = maxn
such that G(x, y) = max2
annihilator, and the proof of the necessity then follows by Proposition 2.9.
(Sufficiency) We proceed by induction on k. The result clearly holds for k = 1.
Suppose that it holds for some k ≥ 1 and let us show that it still holds for k + 1.
Assume that F ∶[k + 1]n →[k + 1] is quasitrivial and that
F −1 =(1, 2n − 1, . . . ,(k + 1)n − kn).
Let ⪯ be the total ordering on [k + 1] defined by
F −1(x) ≤ F −1(y) ,
x ⪯ y if and only if
⪯
and let z = maxk+1
(1, . . . , k + 1). Clearly, F ′ = F ([k+1]∖{z})n is quasitrivial and
F ′−1 = (1, 2n − 1, . . . , kn −(k − 1)n). By induction hypothesis we have that F ′ =
⪯′ , where ⪯′ is the restriction of ⪯ to [k +1]∖{z}. By Proposition 2.9, F −1[z] =
(k + 1)n − kn and thus F = maxn
maxn
⪯ .
(cid:3)
We can now state and prove the main result of this section.
Theorem 4.6. Let F ∶ X n → X be an associative, quasitrivial, symmetric operation.
The following assertions are equivalent.
(i) F is reducible to an associative and quasitrivial operation G∶ X 2 → X.
(ii) There exists a total ordering ⪯ on X such that F is ⪯-preserving.
(iii) There exists a total ordering ⪯ on X such that F = maxn
⪯ .
Moreover, when X = [k], each of the assertions (i) − (iii) is equivalent to each of
the following assertions.
(iv) F has exactly one neutral element.
(v) F −1 =(1, 2n − 1, . . . , kn −(k − 1)n).
Furthermore, the total ordering ⪯ considered in assertions (ii) and (iii) is uniquely
defined as follows:
(4.1)
x ⪯ y
if and only if
G−1[x] ≤ G−1[y] ,
x, y ∈[k].
Moreover, there are k! operations satisfying any of the conditions (i) − (v).
QUASITRIVIAL n-ARY SEMIGROUPS
15
Proof. (i) ⇒ (iii). This follows from Proposition 4.4.
(iii) ⇒ (ii). Obvious.
(ii) ⇒ (i). By Corollary 2.3 we have that F is reducible to an associative opera-
tion G∶ X 2 → X. Suppose to the contrary that G is not quasitrivial. From Theorem
3.9 and Proposition 3.7, it then follows that F has two neutral elements e1, e2 ∈ X,
which contradicts Remark 3.14.
(i) ⇔ (v). This follows from Proposition 4.5.
(i) ⇒ (iv). This follows from Theorem 3.9 and Proposition 4.3.
(iv) ⇒ (i). This follows from Lemma 2.2 and Theorem 3.9.
The rest of the statement follows from [3, Theorem 3.3].
(cid:3)
X using the usual total ordering ≤ on X = {1, 2, 3, 4}.
Now, let us illustrate Theorem 4.6 for binary operations by means of their contour
plots. In Figure 2 (left), we represent the contour plot of an operation G∶ X 2 →
In Figure 2 (right) we
represent the contour plot of G using the total ordering ⪯ on X defined by (4.1).
We then observe that G = max2
⪯, which shows by Theorem 4.6 that G is associative,
quasitrivial, and symmetric.
✻
4
3
2
1
r
r
r
r
r
r
r
r
r
r
r
r
r
r
r
r
✻
1
4
2
3
r
r
r
r
r
r
r
r
r
r
r
r
r
r
r
r
✲
✲
1
2
3
4
3
2
4
1
Figure 2. An associative, quasitrivial, and symmetric binary op-
eration G on X = {1, 2, 3, 4} whose values on (1, 1),(2, 2),(3, 3)
and (4, 4) are 1, 2, 3 and 4, respectively.
Based on this example, we illustrate a simple test to check whether an operation
ordering and if F is the maximum operation for ≾.
We denote the class of associative, quasitrivial, symmetric operations G∶ X 2 → X
that have a neutral element e ∈ X by QS2
class of symmetric operations G∶ X 2 → X that belong to A2
to see that QS2
F ∶[k]n → [k] is associative, quasitrivial, symmetric, and has exactly one neutral
element. First, construct the unique weak ordering ≾ on [k] from the preimage
sequence F −1 , namely, x ≾ y if F −1[x] ≤ F −1[y] . Then, check if ≾ is a total
1(X) the
1(X). It is not difficult
1(X) if and only if G ∈ AS2
1(X)
and G−1[e] = 1, where e is the neutral element for G.
For each integer k ≥ 2, let qsn(k) denote the number of associative, quasitrivial,
and symmetric n-ary operations on[k]. Also, denote by as2
1(k) the size of AS2
1([k]).
1([k]) = k!. Also, it is easy
From Theorems 3.9 and 4.6 it follows that qs2(k) = QS2
1(2) = 4. The remaining terms of the sequence are given in the
1(X). Also, we denote by AS2
1(X) ⊆ AS2
1(X). In fact, G ∈ QS2
to check that as2
following proposition.
Proposition 4.7. For every integer k ≥ 3, as2
Proof. As observed QS2
AS2
1([k]) ⊆ AS2
1([k]) ∖ QS2
1([k]). So let us enumerate the operations in
1([k]). There are k ways to choose the element x ∈ [k] such that
1(k) = qs2(k) + kqs2(k − 1) = 2k!.
16
M. COUCEIRO AND J. DEVILLET
For any integer k ≥ 2 let qsn
such restrictions. Thus as2
then follows that as2
1(k) = k! + k(k − 1)! = 2k!.
G(x, x) = e and G(x, y) = G(y, x) = y for all y ∈[k]∖{x, e}. Moreover, the restriction
1([k] ∖{x}), and we have qs2(k − 1) possible
of G to ([k] ∖{x})2 belongs to QS2
1(k) = qs2(k) + kqs2(k − 1). By Theorems 3.9 and 4.6 it
1(k) denote the number of associative, quasitrivial,
and symmetric n-ary operations that have exactly one neutral element on [k].
2(k) denote the number of associative, quasitrivial, and symmetric n-
ary operations that have two neutral elements on [k].
2(k) =
2 , and qsn(k) = 3k!
Proposition 4.8. For each integer k ≥ 2, qsn
k!
1(k) = qs2(k) = k!. Moreover, qsn
Also, let qsn
2 .
(cid:3)
Proof. By Theorems 4.6 and 3.9 and Lemma 4.2 we have that the number of as-
sociative, quasitrivial, and symmetric n-ary operations that have exactly one neu-
tral element on [k] is exactly the number of associative, quasitrivial, and sym-
metric binary operations on [k]. By Theorems 3.9 and 4.6 this number is given
by qs2(k) = k!. Also, by Corollary 3.8, Proposition 4.7, and Theorems 3.9 and
qn(k) = qsn
2 and by Proposition 3.7 we have that
(cid:3)
2(k) = as2
2(k) = 3k!
1(k) + qsn
4.6, we have that qn
= k!
1(k)−qs2(k)
2
2 .
Remark 4.9. Recall that an operation F ∶ X n → X is said to be bisymmetric if
F(F(r1), . . . , F(rn)) = F(F(c1), . . . , F(cn))
for all n × n matrices [c1 ⋯ cn] = [r1 ⋯ rn]T ∈ X n×n. In [6, Corollary 4.9] it was
shown that associativity and bisymmetry are equivalent for operations F ∶ X n →
X that are quasitrivial and symmetric. Thus, we can replace associativity with
bisymmetry in Theorem 4.6.
5. Conclusion
In this paper we proved that any quasitrivial n-ary semigroup is reducible to
a semigroup. Furthermore, we showed that a quasitrivial n-ary semigroup is re-
ducible to a unique quasitrivial semigroup if and only if it has at most one neutral
element. Moreover, we characterized the class of quasitrivial (and symmetric) n-ary
semigroups that have at most one neutral element. Finally, when the underlying
set is finite, this work led to four new integer sequences in the Sloane's OEIS [12],
namely, A308351, A308352, A308354, and A308362.
Note however that there exist idempotent n-ary semigroups that are not re-
ducible to a semigroup (for instance, consider the idempotent associative operation
F ∶ R3 → R defined by F(x, y, z) = x − y + z for all x, y, z ∈ R). This naturally asks
for necessary and sufficient conditions under which an idempotent n-ary semigroup
is reducible to a semigroup. This and other related questions constitute topics for
future research.
Acknowledgements
Both authors would like to thank Jean-Luc Marichal and the anonymous referee
for their useful comments and insightful remarks that helped improving the current
paper.
QUASITRIVIAL n-ARY SEMIGROUPS
17
References
[1] Ackerman, N.L.: A characterization of quasitrivial n-semigroups. Algebra Universalis (in
press)
[2] Bulatov, A.A.: Conservative constraint satisfaction re-revisited. Journal of Computer and
System Sciences 82, 347 -- 356 (2016)
[3] Couceiro, M., Devillet, J., Marichal, J.-L.: Quasitrivial semigroups: characterizations and
enumerations. Semigroup Forum 98, 472 -- 498 (2019)
[4] Dornte, W.: Untersuchungen uber einen verallgemeinerten Gruppenbegriff. Math. Z. 29, 1 -- 19
(1928)
[5] Dudek, W.A., Mukhin, V.V.: On n-ary semigroups with adjoint neutral element. Quasigroups
and Related Systems 14, 163 -- 168 (2006)
[6] Devillet, J., Kiss, G., Marichal, J.-L.: Characterizations of quasitrivial symmetric nonde-
creasing associative operations. Semigroup Forum 98, 154 -- 171 (2019)
[7] Kiss, G., Somlai, G.: Associative idempotent nondecreasing functions are reducible. Semi-
group Forum 98, 140 -- 153 (2019)
[8] Krantz, D.H., Luce, R.D., Suppes, P., Tverskyand, A.: Foundations of measurement, vol. 1.
Academic Press, New York (1971)
[9] Langer, H.: The free algebra in the variety generated by quasi-trivial semigroups. Semigroup
Forum 20, 151 -- 156 (1980)
[10] Post, E.L.: Polyadic groups. Trans. Amer. Math. Soc. 48, 208 -- 350 (1940)
[11] Pouzet, M., Rosenberg, I.G., Stone, M.G.: A projection property. Algebra Universalis 36,
159 -- 184 (1996)
[12] Sloane, N.J.A.: The On-Line Encyclopedia of Integer Sequences. http://www.oeis.org
Universit´e de Lorraine, CNRS, Inria, LORIA, F-54000 Nancy, France
E-mail address: miguel.couceiro[at]{loria,inria}.fr
Mathematics Research Unit, University of Luxembourg, Maison du Nombre, 6, avenue
de la Fonte, L-4364 Esch-sur-Alzette, Luxembourg
E-mail address: jimmy.devillet[at]uni.lu
|
1002.0278 | 1 | 1002 | 2010-02-01T16:13:45 | Minimal Prime Ideals of Ore Extensions over Commutative Dedekind Domains | [
"math.RA"
] | Let R = D[x;\sigma;\delta] be an Ore extension over a commutative Dedekind domain D, where \sigma is an automorphism on D. In the case \delta = 0 Marubayashi et. al. already investigated the class of minimal prime ideals in term of their contraction on the coefficient ring D. In this note we extend this result to a general case \delta not 0. | math.RA | math |
Minimal Prime Ideals of Ore
Extensions over Commutative
Dedekind Domains
Amir Kamal Amir1, Pudji Astuti2, Intan Muchtadi-Alamsyah2
1Algebra Research Division, Faculty of Mathematics and Natural Sciences,
Institut Teknologi Bandung (ITB), Jl. Ganesha 10 Bandung 40132, Indonesia;
Department of Mathematics, Hasanuddin University, Makassar 90245, Indonesia.
2Algebra Research Division, Faculty of Mathematics and Natural Sciences,
[email protected]
Institut Teknologi Bandung (ITB), Jl. Ganesha 10 Bandung 40132, Indonesia.
[email protected]; [email protected]
Abstract
Let R = D[x; σ, δ] be an Ore extension over a commutative Dedekind
domain D, where σ is an automorphism on D.
In the case δ = 0
Marubayashi et. al. already investigated the class of minimal prime
ideals in term of their contraction on the coefficient ring D. In this
note we extend this result to a general case δ 6= 0.
Keywords: minimal prime, Ore extension, derivation.
1
Introduction
This paper studies minimal prime ideals of an Ore extension over a commuta-
tive Dedekind domain. Ore extensions are widely used as the underlying rings
of various linear systems investigated in the area Algebraic system theory.
These systems may represent systems coming from mathematical physics, ap-
plied mathematics and engineering sciences which can be described by means
of systems of ordinary or partial differential equations, difference equations,
differential time-delay equations, etc. If these systems are linear, they can
be defined by means of matrices with entries in non-commutative algebras of
functional operators such as the ring of differential operators, shift operators,
time-delay operators, etc. An important class of such algebras is called Ore
extensions (Ore Algebras).
The structure of prime ideals of various kind of Ore extensions have been
investigated during the last few years. In [7], [8] primes of Ore extensions
over commutative noetherian rings were considered.
In [2], [3], and [11],
prime ideals of Ore extensions of derivation type were described. These
result recently were exploited in [9] to investigate properties of minimal prime
rings of Ore extensions of derivation type in term of their contraction on the
coefficient ring. In this note we extend this result to a general Ore extension
of automorphism type .
2 Ore Extension
We recall some definitions, notations, and more or less well known facts
concerning. A (left) skew derivation on a ring D is a pair (σ, δ) where σ is
a ring endomorphism of D and δ is a (left) σ-derivation on D; that is,
an additive map from D to itself such that δ(ab) = σ(a)δ(b) + δ(a)b for all
a, b ∈ D. For (σ, δ) any skew derivation on a ring D, we obtain
δ(am) =
m−1
X
i=0
σ(a)iδ(a)am−1−i
for all a ∈ D and m = 1, 2, · · · . (See [4, Lemma 1.1])
Definition 1 Let D be a ring with identity 1 and (σ, δ) be a (left) skew
derivation on the ring D. The Ore Extension over D with respect to the
skew derivation (σ, δ) is the ring consisting of all polynomials over D with
an indeterminate x denoted by:
D[x; σ, δ] = { f (x) = anxn + · · · + a0 ai ∈ D }
2
satisfying the following equation, for all a ∈ D
xa = σ(a)x + δ(a).
The notations D[x; σ] and D[x; δ] stand for the particular Ore extensions
where respectively δ = 0 dan σ the identity map. For the case δ = 0,
Marubayashi et. al. [9] studied the factor rings of D[x; σ] over minimal prime
ideals where D is a commutative Dedekind domain. In order to extend their
results to general cases, this paper investigates the class of minimal prime
ideals in D[x; σ, δ].
The Ore extension D[x; σ, δ] is a free left D-module with basis 1, x, x2, · · ·
To abbreviate the assertion, the symbol R stands for the Ore extension
D[x; σ, δ] constructed from a ring D and a skew derivation (σ, δ) on D.
The degree of a nonzero element f ∈ R is defined in the obvious fashion.
Since the standard form for elements of R is with left-hand coefficients, the
leading coefficient of f is fn if
f = f0 + f1x + · · · + fn−1xn−1 + fnxn
with all fi ∈ D and fn 6= 0. If σ is an automorphism, f can also be written
with right-hand coefficients, but then its xn-coefficient is σ−n(fn). While a
general formula for xna where a ∈ D and n ∈ N is too involved to be of much
use, an easy induction establishes that
xna = δn(a) + ax + · · · + an−1xn−1 + σn(a)xn
for some a1, · · · , an−1 ∈ D.
In preparation for our analysis of the types of ideals occured when prime
ideals of an Ore extension D[x; σ, δ] are contracted to the coefficient ring D,
we consider σ-prime, δ-prime, and (σ, δ)-prime ideals of D.
Definition 2 Let Σ be a set of map from the ring D to itself. A Σ-ideal of D
is any ideal I of D such that α(I) ⊆ I for all α ∈ Σ. A Σ-prime ideal is any
proper Σ-ideal I such that whenever J, K are Σ-ideals satisfying JK ⊆ I,
then either J ⊆ I or K ⊆ I.
3
In the context of a ring D equipped with a skew derivation (σ, δ), we shall
make use of the above definition in the cases Σ = {σ}, Σ = {δ} or Σ =
{σ, δ}; and simplify the prefix Σ to respectively σ, δ, or (σ, δ). Concerning
the contraction of prime ideals in an Ore Extension to its coefficient ring,
Goodearl [4] obtained the following theorem which will be of use later.
Theorem 1 Let R = D[x; σ, δ] where D is a commutative Dedekind domain
and σ is an automorphism. If p is any ideal of D which is (σ, δ)-prime, then
p = P ∩ R for some prime ideal P of R and more specially pR ∈ Spec(R)
where Spec(R) denotes the set of all Prime ideal in R.
3 Minimal Prime Ideals of Ore Extensions
Throughout this section, let D be a commutative Dedekind domain and
R = D[x; σ, δ] be the Ore extension over D, for (σ, δ) is a skew derivation,
σ 6= 1 is an automorphism of D and δ 6= 0.
Marubayashi et. al.
[9] already investigated the class of minimal prime
ideals in R where δ = 0. For the case δ 6= 0 but it is inner, Goodearl [4]
showed the existance of an isomorphism between D[x; σ, δ] and D[y; σ] as
described in the following. The σ-derivative δ is called inner if there exists
an element a ∈ D such that δ(b) = ab − σ(b)a for all b ∈ D.
Theorem 2 Let D[x; σ, δ] be an Ore extension where σ 6= 1 and δ 6= 1. If δ
is an inner σ-derivation, i.e, there exists a ∈ D such that δ(b) = ab − σ(b)a
for all b ∈ D, then D[x; σ, δ] and D[y; σ], where y = x − a, are isomorph.
Hence, by combining Theorem 2 and the class of minimal prime ideals in
Ore extensions R obtained in [9] we can derive the class of minimal prime
ideals in Ore extension R = D[x; σ, δ] for σ and δ being respectively an
automorphism and inner as the following. Notation Spec0(R) stands for the
set of all prime ideals in R = D[x; σ, δ] having zero intersection with D.
4
Theorem 3 Let R = D[x; σ, δ] be an Ore extension.
(1) The set
{p[x; σ, δ], P p is a σ − prime ideal of Dand P ∈ Spec0(R) with P 6= (0)}
consists of all minimal prime ideals of R.
(2) Let P ∈ Spec(R) with P 6= (0). Then P is invertible if and only if it is
a minimal prime ideal of R.
Now we shall investigate the class of minimal prime ideals for general
δ 6= 0. For this general case, we need the following lemma.
Lemma 1 If P = p[x; σ, δ] is a minimal prime ideal of R where p is a (σ, δ)-
prime ideal of D, then p is a minimal (σ, δ)-prime ideal of D.
Proof. Assume that p is a (σ, δ)-prime ideal of D but is not minimal (σ, δ)-
prime. Let q be a (σ, δ)-prime ideal of D such that q p and q 6= (0). Then
applying [2, Theorem 3.1] we have qR ∈ Spec(R). So, qR pR = P . This
is a contradiction because P is a minimal prime ideal. (cid:3)
Theorem 4 Let P be a prime ideal of R and P ∩ D = p 6= (0). Then P is
a minimal prime ideal of R if and only if either P = p[x; σ, δ] where p is a
minimal (σ, δ)-prime ideal of D or (0) is the largest (σ, δ)-ideal of D in p.
Proof. Let P be a minimal prime ideal of R and P ∩ D = p 6= (0). Since
p 6= (0), then there are two cases [4, Theorem 3.1]; namely, either p is a
(σ, δ)-prime ideal of D or p is a prime ideal of D and σ(p) 6= p.
If p is a (σ, δ)-prime ideal of D, then pR ∈ Spec(R), by [4, Theorem 3.1].
So, pR = P because pR ⊆ P and P is a minimal prime ideal. On the other
hand pR = p[x; σ, δ]. From here, we get P = p[x; σ, δ] and p is a minimal
(σ, δ)-prime ideal of D, by Lemma 1.
Suppose p is a prime ideal of D and σ(p) 6= p. Let m be the largest
(σ, δ)-ideal contained in p and assume that m 6= (0). Then by primeness of
p it can be shown that m is a (σ, δ)-prime ideal of D. So, mR is a prime
ideal of R by [4, Proposition 3.3]. On the other hand, since σ(p) 6= p, we
5
have m p. So, mR pR ⊆ P , i.e, P is not a minimal prime. This is a
contradiction. So, (0) is the largest (σ, δ)-ideal of D in p.
Conversely, let P = p[x; σ, δ], where p is a minimal (σ, δ)-prime ideal
of D. Then, according to [4, Theorem 3.3], P = p[x; σ, δ] is a prime ideal
of R. Let Q be a prime ideal of R where Q ⊆ P . Set q = Q ∩ D, then
q = Q ∩ D ⊆ P ∩ D = p. Applying [4, Theorem 3.1], we have two cases;
namely, either q is a (σ, δ)-prime ideal of D or q is a prime ideal of D and
σ(q) 6= q.
For the first case, suppose q is a (σ, δ)-prime ideal of D. Then q = p
because q ⊆ p and p is a minimal (σ, δ)-prime ideal of D. So, P = p[x; σ, δ] =
q[x; σ, δ] ⊆ Q. This implies P = Q. For the other case, if q is a prime ideal
of D, then q = p because D is a Dedekind domain. So, P = p[x; σ, δ] =
q[x; σ, δ] ⊆ Q. This implies P = Q. Thus P is a minimal prime ideal of R.
Let (0) be the largest (σ, δ)-ideal of D in p. Let Q be a prime nonzero
ideal of R satisfying Q ⊆ P . Set q = Q ∩ D, then q = Q ∩ D ⊆ P ∩ D = p.
Similar to the above explanation, we have two cases; namely, either q is a
(σ, δ)-prime ideal of D or q is a prime ideal of D and σ(q) 6= q but the first
case will not happen. If it is so, then, because of (0) being the largest (σ, δ)-
ideal of D in p, q = (0) implying a contradiction Q ∩ D = 0 (see [5, Lemma
2.19]). Thus q is a prime ideal of D with σ(q) 6= q. As a result, q = p. So
Q ∩ D = P ∩ D, which, according to [5, Proposition 3.5], implies Q = P .
Thus P is the minimal prime ideal of R. (cid:3)
4 Concluding Remark
In this paper we identify all minimal prime ideals in an Ore extension over
a Dedekind domain according to their contraction on the coefficient ring.
Studying the results in Marubayashi et. al [9] it is expected that this identi-
fication can be used to study the structure of the corresponding factor rings
which is currently under investigation.
6
Acknowledgement
This research was supported by ITB according to Surat Perjanjian Pelak-
sanaan Riset Nomor: 265/K01.7/PL/2009, 6 February 2009.
References
[1] A. D. Bell, When are all prime ideals in an Ore extension Goldie?,
Comm. Algebra 13(8) (1985), 1743-1762.
[2] W. Chin, Prime ideals in differential operator rings and crossed product
of infinite groups, J. Algebra 106 (1987), 78-104.
[3] M. Ferrero, J. Matczuk, Prieme ideals in skew polinomial rings of deriva-
tion type, Comm. Algebra 18 (3) (1990), 689-710.
[4] K.R. Goodearl, Prieme ideals in skew polinomial ring and quantized
Weyl algebras, J. of Algebra 150, (1992), 324-377
[5] K.R. Goodearl, R.B. Warfield, JR An Introduction to Noncommuta-
tive Noetherian rings, London Mathematical Society Student Text, 16
(1989).
[6] R.S. Irving, Prime ideals of Ore extension over commutative rings , J.
Algebra 56 (1979), 315-342
[7] R.S. Irving, Prime ideals of Ore extension over commutative rings II ,
J. Algebra 58 (1979), 399-423.
[8] A. Leroy, J. Matczuk, The extended centeroid and X-inner automor-
phism of Ore extensions, J. Algebra 145 (1992), 143-177.
[9] H. Marubayashi, A.K. Amir, Y. Wang, Prime factor rings of skew poly-
nomial rings over a commutative Dedekind domain, (submitted).
[10] J.C. McConnell and J.C. Robson, Noncommutative Noetherian Rings,
Wiley-Interscience, New York, (1987).
7
[11] D.S. Passman, Prime ideals in enveloping rings, Trans. Amer. Math.
Soc. 302(2) (1987), 535-560.
8
|
1305.0380 | 1 | 1305 | 2013-05-02T09:39:38 | Some remarks on non-commutative principal ideal rings | [
"math.RA",
"math-ph",
"math-ph",
"nlin.SI"
] | We prove some algebraic results on the ring of matrix differential operators over a differential field in the generality of non-commutative principal ideal rings. These results are used in the theory of non-local Poisson structures. | math.RA | math | SOME REMARKS ON NON-COMMUTATIVE PRINCIPAL IDEAL RINGS
SYLVAIN CARPENTIER, ALBERTO DE SOLE, VICTOR G. KAC
Abstract: We prove some algebraic results on the ring of matrix differential operators over a differential field in
the generality of non-commutative principal ideal rings. These results are used in the theory of non-local Poisson
structures.
R´esum´e: Nous d´emontrons quelques r´esultats alg´ebriques sur l'anneau des matrices op´erateurs diff´erentiels sur un
corp diff´erentiel dans la g´en´eralit´e des anneaux non-commutatives principaux. Ces r´esultats sont utilis´es dans la
th´eorie des structures de Poisson non-locales.
3
1
0
2
y
a
M
2
]
.
A
R
h
t
a
m
[
1. Introduction
In our previous two papers [CDSK12a, CDSK12b] we established some algebraic properties of the ring of ma-
trix differential operators over a differential field. The problems naturally arose in the study of non-local Poisson
structures [DSK12a, DSK12b].
Eventually we realized that the proofs of [CDSK12b] can be simplified, so that our results hold in the full generality
of left and right principal ideal rings.
The new result which is not contained in our previous paper is Theorem 3.3, which is used in the theory of
non-local Lenard-Magri scheme in [DSK12b].
We wish to thank Toby Stafford and Lance Small for very useful correspondence. In particular, Toby Stafford
provided us a proof of Theorem 2.2.
1
v
0
8
3
0
.
5
0
3
1
:
v
i
X
r
a
2. General facts about principal ideal rings
Let R be a unital associative (not necessarily commutative) ring. Recall that a left (resp. right ) ideal of R is an
additive subgroup I Ă R such that RI " I (resp. IR " I). The left (resp. right) principal ideal generated by a P R
is, by definition, Ra (resp. aR).
Throughout the paper, we assume that the ring R is both a left and a right principal ideal ring, meaning that
every left ideal of R and every right ideal of R is principal.
Example 2.1. Let K be a differential field with a derivation B, and let KrBs be the ring of differential operators over
K. It is well known that KrBs is a left and right principal ideal domain, see e.g. [CDSK12a]. Let R " MatℓℓpKrBsq
be the ring of ℓ ℓ matrices with coefficients in KrBs. By Theorem 2.2(a) below, the ring R is a left and right
principal ideal ring as well. Note also that Kℓ is naturally a left R-module.
Given an element a P R, an element d P R is called a right (resp. left ) divisor of a if a " a1d (resp. a " da1) for
some a1 P R. An element m P R is called a left (resp. right ) multiple of a if m " qa (resp. m " aq) for some q P R.
Given elements a, b P R, their right (resp. left ) greatest common divisor is the generator d of the left (resp. right )
ideal generated by a and b: Ra ` Rb " Rd (resp. aR ` bR " dR). It is uniquely defined up to multiplication by an
invertible element. It follows that d is a right (resp. left) divisor of both a and b, and we have the Bezout identity
d " ua ` vb (resp. d " au ` bv) for some u, v P R.
Similarly, the left (resp. right ) least common multiple of a and b is an element m P R, defined, uniquely up to
multiplication by an invertible element, as the generator of the intersection of the left (resp. right) principal ideals
generated by a and by b: Rm " Ra X Rb (resp. mR " aR X bR)..
We say that a and b are right (resp.
left ) greatest common divisor is 1 (or
invertible), namely if the left (resp. right ) ideal that they generate is the whole ring R: Ra ` Rb " R (resp.
aR ` bR " R). Clearly, this happens if and only if we have the Bezout identity ua ` vb " 1 (resp. au ` bv " 1) for
some u, v P R.
left ) coprime if their right (resp.
An element k P R is called a right (resp.
left ) zero divisor if there exists k1 P Rzt0u such that k1k " 0 (resp.
kk1 " 0). Note that, if d is a right (resp. left) divisor of a, and d is a left (resp. right) zero divisor, then so is a. In
particular, if either a or b is not a left (resp. right) zero divisor, then their right (resp. left) greatest common divisor
d is also not a left (resp. right) zero divisor. A non-zero element b P R is called regular if it is neither a left nor a
right zero divisor.
1
2
SYLVAIN CARPENTIER, ALBERTO DE SOLE, VICTOR G. KAC
The following results summarize some important properties of principal ideal rings that will be used in this paper.
Since a principal ideal ring is obviously Noetherian, one can use the powerful theory of non-commutative Noetherian
rings (see [MR01]).
Theorem 2.2. Let R be a left and right principal ideal ring. Then:
(a) The ring MatℓℓpRq of ℓ ℓ matrices with entries in R is a left and right principal ideal ring.
(b) The sets of left and right zero divisors of R coincide. Hence, an element of R is regular if and only if it is not
a left (or a right) zero divisor.
(c) The set of regular elements of R satisfies the left (resp. right) Ore property: for a, b P R with b regular, there
exist a1, b1 P R, with b1 regular, such that ba1 " ab1 (resp. a1b " b1a).
(d) There exists the ring of fractions QpRq containing R, consisting of left fractions ab´1 (or, equivalently, right
fractions b´1a), with a, b P R and b regular.
(e) Given a, b P R with b regular, there exists q P R such that a ` qb (resp. a ` bq) is regular.
(f ) Suppose that the ring R contains a central regular element r P R such that r´1 is regular too. Given a1, a2, b1, b2 P
R with b1, b2 regular, there exists q P R such that a1 ` qb1 and a2 ` qb2 (resp. a1 ` b1q and a2 ` b2q) are both
regular.
Proof (by J.T. Stafford). Statement (a) is in [MR01, Prop.3.4.10]. For part (b) [MR01, Cor.4.1.9] shows that R is a
direct sum R " A ' B of an Artinian ring A and a Noetherian semiprime ring B. Obviously the regular elements of
A are just the units. By Goldie's Theorem the right regular elements of B are the same as the left regular elements,
i.e. the regular elements (see [MR01, Prop.2.3.4 and 2.3.5]). Since an element pa, bq P R " A ' B is regular if and
only if a and b are both regular the same conclusion holds for R. This proves (b) The equivalence of (c) and (d)
is Ore's Theorem [MR01, Thm.2.1.12]. Part (c) then follows from Goldie's Theorem. It is routine to see that the
regular elements of A ' B form an Ore set if this is true for both A and B. Of course this result is vacuously true
for A while Goldie's Theorem does it for B. Part (e) follows from [SS82, Cor.2.5], and part (f) is in [Sta12].
(cid:3)
Remark 2.3. As T. Stafford pointed out, the ring R " Z{2Z does not satisfy the property in part (f).
Remark 2.4. From the above theorem we immediately get the following simple observations.
(a) By Theorem 2.2(b) we have that if a " bc, then a is regular if and only if b and c are regular. In particular, any
left or right divisor of a regular element is regular.
(b) If b is regular and a arbitrary, then we can write their right (resp.
left) least common multiple as ab1 " ba1
with b1 regular. This follows from the Ore property in Theorem 2.2(c). Indeed, let I " tb1 P R ab1 P bRu. It is
clearly a right ideal of R. Hence, I " b1R for some b1. Clearly, m " ab1 is the right least common multiple of a
and b. By the Ore property, there exists a regular element rb P I. Hence, rb " b1c, and therefore b1 is regular too.
(c) It follows from the above observation that, if a and b are regular, so is their right (resp.
left) least common
multiple.
(d) If a " a1d, b " b1d, (resp. a " da1, b " db1), and a1 and b1 are right (resp. left) coprime, then d is the right
left) greatest common divisor of a and b. Indeed, by the Bezout identity we have ua1 ` vb1 " 1 (resp.
(resp.
a1u ` b1v " 1), which implies ua ` vb " d (resp. au ` bv " d). But then Rd " Ra ` Rb (resp. dR " aR ` bR),
proving the claim.
(e) Conversely, if a " a1d, b " b1d, (resp. a " da1, b " db1), and d is the right (resp. left) greatest common divisor
of a and b, then, assuming that d is regular, we get that a1 and b1 are right (resp. left) coprime. Indeed, by the
Bezout identity we have d " ua ` vb " pua1 ` vb1qd (resp. d " au ` bv " dpa1u ` b1vq), and since by assumption
d is regular it follows that ua1 ` vb1 " 1.
3. Some arithmetic properties of principal ideal rings
1 P QpRq (resp. f " b´1a " b´1
Theorem 3.1. Let R be a left and right principal ideal ring and let QpRq be its ring of fractions. Let f " ab´1 "
a1b´1
1 a1 P QpRq), with a, a1, b, b1 P R and b, b1 regular, and assume that a1 and b1 are
right (resp. left) coprime. Then there exists a regular element q P R such that a " a1q and b " b1q (resp. a " qa1
and b " qb1).
Proof. By assumption a1 and b1 are right coprime, hence we have the Bezout identity ua1 ` vb1 " 1, for some
u, v P R. Let q " ua ` vb. We have
b1q " b1pua ` vbq " b1puab´1 ` vqb " b1pua1b´1
1 ` vqb
" b1pua1 ` vb1qb´1
1 b " b ,
and
a1q " a1b´1
1 b1q " a1b´1
1 b " ab´1b " a .
SOME REMARKS ON NON-COMMUTATIVE PRINCIPAL IDEAL RINGS
Finally, q is regular since q " b´1
1 b is invertible in QpRq.
3
(cid:3)
Corollary 3.2. For every f P QpRq there is a "minimal" right (resp. left) fractional decomposition f " ab´1 (resp.
f " b´1a) with a, b right (resp. left) coprime. Any other right (resp. left) fractional decomposition is obtained from
it by simultaneous multiplication of a and b on the right (resp. left) by some regular element q P R.
Proof. It follows immediately from Remark 2.4(d) and Theorem 3.1.
(cid:3)
Theorem 3.3. Let R be a left and right principal ideal ring, and let V be a left module over R. Assume that the
ring R contains a central regular element r P R such that r ´ 1 is regular too. Let a, b P R, with b regular, be left
coprime. Let m " ab1 " ba1 be their right least common multiple. Then, for every x, y P V such that ax " by, there
exists z P V such that x " b1z and y " a1z. In particular, aV X bV " mV .
Proof. We first reduce to the case when a is regular. Indeed, let, by Theorem 2.2(e), q P R be such that a ` bq is
regular. Then it is immediate to check that the right least common multiple of a` bq and b is pa` bqqb1 " bpa1 ` qb1q.
Moreover, since by assumption ax " by, we have pa ` bqqx " bpy ` qxq. Therefore, assuming that the theorem holds
for regular a, there exists z P V such that x " b1z and y ` qx " pa1 ` qb1qz, which implies y " a1z, proving the
claim.
Next, let us prove the theorem under the assumption that both a and b are regular. Since m " ab1 " ba1 is the
right least common multiple of a and b, it follows that a1 and b1 are right coprime, and therefore we have the Bezout
identity
(3.1)
ub1 ` va1 " 1 ,
for some u, v P R. After replacing u by u ` qa and v by v ´ qb, equation (3.1) still holds. Hence, by Theorem 2.2(f),
we can assume, without loss of generality, that u and v are both regular. Moreover, by Remark 2.4(c), since by
assumption both a and b are regular, their right least common multiple is regular too, and therefore a1 and b1 are
regular too. Multiplying in QpRq both sides of equation (3.1) on the left by u´1 and on the right by a´1
1 , we get
(3.2)
and similarly, multiplying (3.1) on the left by v´1 and on the right by b´1
a´1b " pa1uq´1p1 ´ a1vq ,
1 , we get
(3.3)
b´1a " pb1vq´1p1 ´ b1uq .
Since, by assumption, a and b are left coprime, both fractions a´1b and b´1a are in their minimal fractional decom-
position. Hence, by equations (3.2) and (3.3), there exist p, q P R such that
(3.4)
(3.5)
1 ´ a1v " pb , a1u " pa ,
1 ´ b1u " qa , b1v " qb .
Applying the first equation in (3.4) to y P V and using the assumption ax " by and the second equation of (3.4),
we get
y " a1vy ` pby " a1vy ` pax " a1pvy ` uxq ,
and, similarly, applying the first equation in (3.5) to x P V and using the second equation of (3.5), we get
x " b1ux ` qax " b1ux ` qby " b1pux ` vyq .
Hence, the statement holds with z " ux ` vy.
(cid:3)
If V is a left R-module and a P R, we denote Ker a " x P V ax " 0(.
Remark 3.4. If d is the right greatest common divisor of a and b in R, then Ker a X Ker b " Ker d. Indeed, by the
Bezout identity we have b1a ` a1b " d. Therefore Ker a X Ker b Ă Ker d. The reverse inclusion is obvious.
Corollary 3.5. Let R be as in Theorem 3.3, and let V be a left R-module. Let σ : R Ñ R be an anti-automorphism
of the ring R. Let a, b P R, with b regular, be right coprime, and suppose that σpaqb " ǫσpbqa, for some invertible
central element ǫ P R. Let x, y P V be such that σpaqx " ǫσpbqy. Then there exists z P V such that x " bz and
y " az.
Proof. First, since b is regular and σ is an anti-automorphism, σpbq is regular too. Moreover, since by assumption a
and b are right coprime and σ is an anti-automorphism, it follows that σpaq and σpbq are left coprime.
We claim that the left least common multiple of a and b is equal to the right least common multiple of σpaq and
σpbq, and it is given by m " σpaqb " ǫσpbqa. Indeed, clearly m is a common right multiple of σpaq and σpbq. It is
therefore a right multiple of the minimal one: m1 " σpaqb1 " σpbqa1. Namely, there exists q P R such that b " b1q
and a " ǫ´1a1q. But by assumption a and b are right coprime. Hence, q must be invertible, proving that m is
(3.6)
La,b " !bx ' ax x P V) Ă V ' V .
4
SYLVAIN CARPENTIER, ALBERTO DE SOLE, VICTOR G. KAC
the right least common multiple of σpaq and σpbq. The same argument proves that m is also the left least common
multiple of a and b.
We can now apply Theorem 3.3 to σpaq and σpbq, to deduce that there exists z P V such that x " bz and ǫy " ǫaz,
(cid:3)
hence y " az.
As in [CDSK12b], Corollary 3.5 implies the following maximal isotropicity property important for the theory of
Dirac structures, [Dor93, DSK12a].
Corollary 3.6. Let R be as in Theorem 3.3, and let V be a left R-module and let p , q : V V Ñ A be a non-
degenerate symmetric bi-additive pairing on V with values in an abelian group A. Let be an anti-involution of R
such that pax, yq " px, ayq for all a P R and x, y P V . Extend the pairing p , q to a pairing x y on V ' V with
values in A, given by
xx1 ' x2 y1 ' y2y " px1, y2q ` px2, y1q ,
for every x1, x2, y1, y2 P V . Given two elements a, b P R, we consider the following additive subgroup of V ' V :
(a) The subgroup La,b Ă V ' V is isotropic with respect to the pairing x y if and only if ab ` ba acts as 0 on V .
(b) If b is regular, a and b are right coprime, and ab ` ba " 0, then the subgroup La,b Ă V ' V is maximal
isotropic.
Proof. Part (a) is straightforward and part (b) follows immediately from Corollary 3.5 with σpaq " a and ǫ "
´1.
(cid:3)
Corollary 3.7. Let R be as in Theorem 3.3, and let V be a left R-module. Let a, b P R, with b regular, be left
coprime. Let m " ab1 " ba1 be their right least common multiple. Then Ker b " a1pKer b1q.
Proof. If k1 P Ker b1, then bpa1k1q " ab1k1 " 0. Therefore, a1pKer b1q Ă Ker b. We need to prove the opposite
inclusion. If k P Ker b, we have a0 " 0 " bk. Hence, by Theorem 3.3, there exists z P V such that 0 " b1z and
k " a1z. Namely, k P a1pKer b1q.
(cid:3)
Remark 3.8. In the ring R " Matℓℓ KrBs of ℓ ℓ matrix differential operators over a differential field K, the above
Corollary 3.7 implies that if b´1a " a1b´1
is a rational matrix pseudodifferential operator in its minimal left and
right fractional decompositions, then degpbq " degpb1q (where degpbq is the degree of the Dieudonn´e determinant
of b). Indeed, the fractional decomposition b´1a being minimal means that a and b are left coprime. Hence, by
Corollary 3.7 we have that dimpKer bq " dimpa1 Ker b1q in any differential field extension of K. Moreover, the
fractional decomposition a1b´1
1 being minimal means that Ker a1 X Ker b1 " 0 in any differential field extension of
K. The claim follows by the fact that deg b is equal to the dimension of Ker b in the linear closure of K [CDSK12b].
1
References
[CDSK12a] S. Carpentier, A. De Sole, and V.G. Kac, Some algebraic properties of matrix differential operators and their Dieudonn´e
determinant, J. Math. Phys. 53 (2012), 063501
[CDSK12b] S. Carpentier, A. De Sole, and V.G. Kac, Rational matrix pseudodifferential operators, preprint (2012) arXiv:1206.4165.
[DSK12a] A. De Sole, and V.G. Kac, Non-local Poisson structures and applications to the theory of integrable systems I, preprint (2012)
arXiv:1210.1688
[DSK12b] A. De Sole, and V.G. Kac, Non-local Poisson structures and applications to the theory of integrable systems II, preprint (2012)
arXiv:1211.2391
[Dor93] I.Ya. Dorfman, Dirac structures and integrability of nonlinear evolution equations, Nonlinear Sci. Th. Appl., Wiley & Sons, New
York, 1993.
[MR01] J.C. McConnell and J.C. Robson, Non-commutative Noetherian rings, Graduate Studies in Mathematics, v.30, American Math-
ematical Society, Providence, RI, 2001.
[SS82] L.W. Small, J.T. Stafford, Regularity of zero divisors, Proc. London Math. Soc. (3) 44 (1982), no. 3, 405 -- 419.
[Sta12] J.T. Stafford, private communication (2012).
Ecole Normale Superieure, Paris, France, e-mail: [email protected]
Dept. of Math., University of Rome 1, Italy e-mail: [email protected]
Dept. of Math., MIT, USA e-mail: [email protected]
|
1012.1849 | 3 | 1012 | 2018-08-10T06:43:23 | Isotopes of Hurwitz algebras | [
"math.RA"
] | We study the class of all algebras that are isotopic to a Hurwitz algebra. Isomorphism classes of such algebras are shown to correspond to orbits of a certain group action. A complete, geometrically intuitive description of the category of isotopes of Hamilton's quaternions is given. As an application, we demonstrate how some results concerning the classification of finite-dimensional composition algebras can be deduced from our general results. | math.RA | math |
ISOTOPES OF HURWITZ ALGEBRAS
ERIK DARP O
Abstract. We study the class of all algebras that are isotopic to a Hurwitz algebra. In the
general case, isomorphism classes of such algebras are shown to correspond to orbits of a certain
group action. Our main focus is the isotopes of Hamilton's quaternions, for which a more de-
tailed, and geometrically intuitive description of the isomorphism classes is given. As an applic-
ation, we also demonstrate how some results concerning the classification of finite-dimensional
composition algebras can be deduced from our general results.
1. Introduction
Let k be a field, and V a vector space over k. We shall say that a quadratic form q : V → k is
non-degenerate if the associated bilinear form hx, yi = q(x+ y)− q(x)− q(y) is non-degenerate (i.e.,
hx, V i = 0 only if x = 0). A composition algebra is a non-zero (not necessarily associative) algebra
A over a field k, equipped with a non-degenerate quadratic form n : A → k such that n(ab) =
n(a)n(b) for all a, b ∈ A. The form n is usually called the norm of A. A composition algebra
possessesing an identity element is called a Hurwitz algebra. Every Hurwitz algebra has dimension
one, two, four or eight (thus, in particular, it is finite dimensional), and can be constructed via
an iterative method known as the Cayley-Dickson process.1 The facts about Hurwitz algebras
referred in this section are described in detail in [15], Chapter VIII.
Two algebras A and B over a field k are said to be isotopic if there exist invertible linear maps
α, β, γ : A → B such that γ(xy) = α(x)β(y) for all x, y ∈ A. Clearly, isotopy is an equivalence
relation amongst k-algebras. If A and B are isotopic then there exist α, β ∈ GL(A) such that the
algebra (A, ◦), with multiplication x ◦ y = α(x)β(y), is isomorphic to B. The algebra (A, ◦) is
called the principal isotope of A determined by α and β, and is denoted by Aα,β.
Several important classes of non-associative algebras can be constructed by isotopy from the
Hurwitz algebras. Examples include:
(1) All finite-dimensional composition algebras [14, p. 957]. This includes in particular all
finite-dimensional absolute valued algebras, which are precisely the finite-dimensional com-
position algebras over R whose norm is anisotropic (i.e., n(x) = 0 only if x = 0). However,
there exist composition algebras without identity element that are infinite dimensional,
and thus not isotopic to any Hurwitz algebra; see e.g. [4, 8].
(2) All division algebras of dimension two over a field of characteristic different from two [17].
(3) All finite-dimensional division algebras A that are not isotopic to an associative algebra,
and satisfy the following property: for all non-zero a ∈ A there exists an element b ∈ A
such that b(ax) = x for all x ∈ A. [6]
The purpose of the present article is to describe, in a uniform way, all isotopes of Hurwitz
algebras. Generalising ideas that have earlier been used in more specialised situations (for example
in [3, 17]), we give a general description of all algebras isotopic to a Hurwitz algebra, encompassing
also the case of the ground field k having characteristic two. Our principal result is a comprehensive
geometric description of all isotopes of Hamilton's quaternion algebra H -- a class of real division
algebras that has not been studied before.
Key words and phrases. Hurwitz algebra, isotope, quaternion algebra, octonion algebra.
MSC 2010: 17A60 (17A35, 17A75).
1Some authors have used a weaker notion of non-degeneracy for the norm n, requiring that n(x + y) = n(y) for
all y implies x = 0. This definition gives rise to additional unital composition algebras over fields k of characteristic
two, in form of purely inseparable field extensions of k [14]. If char k 6= 2, the two definitions are equivalent.
1
2
ERIK DARP O
Isotopes of Hurwitz algebras of dimension two is a special case of Petersson's [17] description of
all 2-dimensional algebras, which is also based on the concept of isotopy. There is a large number
of articles on finite-dimensional composition algebras and absolute valued algebras (some examples
are [2, 3, 8, 14, 18]), most of which use the concept of isotopy as a central tool.
This article is organised as follows. In Section 2, a general description is given of the category
of isotopes of a Hurwitz algebra A. A more elaborate study of the case where (A, n) is a Euclidean
space is given in Section 3, bringing about the announced description of isotopes of H. Finally,
Section 4 treats composition algebras, showing how a description of these can be deduced from
the results in Section 2.
From here on, let k denote a field. All algebras are, unless otherwise stated, assumed to be finite
dimensional over k. Every element a of an algebra A determines linear endomorphisms La and Ra
of A, defined by La(x) = ax and Ra(x) = xa respectively. For a principal isotope Aα,β = (A, ◦)
of A, we use the notation L◦
a(x) = x ◦ a. An algebra A is said to be a division
algebra if A 6= 0 and La and Ra are bijective for all non-zero a ∈ A. Moreover, A is alternative if
the identities x2y = x(xy) and xy2 = (xy)y hold for all x, y ∈ A.
a(x) = a ◦ x and R◦
All Hurwitz algebras are alternative. Two-dimensional Hurwitz algebras are quadratic ´etale
algebras, i.e., either separable field extensions of k or isomorphic to k × k. The Hurwitz algebras
of dimension four are all quaternion algebras, that is, all four-dimensional central simple associ-
ative algebras. Eight-dimensional Hurwitz algebras are precisely the central simple alternative
algebras that are not associative [21] (these are called octonion algebras). A Hurwitz algebra A is
commutative if and only if dim A 6 2, and associative if and only if dim A 6 4.
Any element x in a Hurwitz algebra A = (A, n) satisfies x2 = hx, 1ix − n(x)1. Hence, the norm
n is uniquely determined by the algebra structure of A, and every algebra morphism of Hurwitz
algebras that respects the identity element also preserves the norm. Every Hurwitz algebra of
dimension at least 2 has a unique non-trivial involution2 κ : A → A, x 7→ ¯x satisfying x + ¯x ∈ k1
and x¯x = ¯xx = n(x)1 for all x ∈ A. Moreover, two Hurwitz algebras are isomorphic if and only
if their respective norms are equivalent (this was first proved in [12] in characteristic different
from two). The quadratic forms occurring as norms of Hurwitz algebras are precisely the m-fold
Pfister forms over k, for m ∈ {0, 1, 2, 3}. If A is a Hurwitz algebra and a ∈ A, then La and Ra
are invertible if and only if n(a) 6= 0. This is also equivalent to the existence of an inverse a−1 of
a in A: since a¯a = ¯aa = n(a)1, we have a−1 = n(a)−1¯a if n(a) 6= 0. Moreover, L−1
a = La−1 and
R−1
a = Ra−1 in this case. The invertible elements of any alternative algebra A form a so-calles
Moufang loop under multiplication (the concept was introduced by Moufang in [16] under the
name quasi-group), denoted by A∗.
For any algebra A, the nucleus is defined as N (A) = {a ∈ A (xy)z = x(yz) for a ∈ {x, y, z}}.
The nucleus is an associative subalgebra of A. If A is a Hurwitz algebra, then a ∈ N (A) if and
only if (xa)y = x(ay) for all x, y ∈ A. If dim A 6 4 then A is associative and thus N (A) = A; the
nucleus of an eight-dimensional Hurwitz algebra is k1.
A similitude of a non-zero quadratic space V = (V, q) is an invertible linear map ϕ : V → V
such that q(ϕ(x)) = µ(ϕ)q(x) for all x ∈ V , where µ(ϕ) ∈ k is a scalar independent of x. The
If l = dim V is even, then det(ϕ) = ±µ(ϕ)l/2 [15,
element µ(ϕ) is called the multiplier of ϕ.
12A]. If char k 6= 2, a similitude ϕ satisfying det(ϕ) = µ(ϕ)l/2 are said to be proper.
In the
characteristic two case, a similitude ϕ : V → V is defined to be proper if its Dickson invariant
(see [15, 12.12]) is zero. The group of all similitudes of V is denoted by GO(V, q), or GO(V ) for
short. The proper similitudes form a normal subgroup GO+(V ) ⊂ GO(V ) of index two. Elements
in GO(V ) r GO+(V ) are called improper similitudes. The map µ : GO(V ) → k∗, ϕ 7→ µ(ϕ) is
a group homomorphism, the kernel of which is the orthogonal group O(V ). We write O+(V ) =
O(V ) ∩ GO+(V ), or SO(V ) = O+(V ) in case k = R and (V, q) is a Euclidean space.
For any Hurwitz algebra A = (A, n), define G(A) to be the set of all ϕ ∈ GO(A) for which there
exist ϕ1, ϕ2 ∈ GO(A) such that ϕ(xy) = ϕ1(x)ϕ2(x) for all x, y ∈ A. Now, by what is known as
2By an involution is meant a self-inverse isomorphism A → Aop.
ISOTOPES OF HURWITZ ALGEBRAS
3
the principle of triality for Hurwitz algebras [19, 3.2],
G(A) =(GO+(A)
GO(A)
if dim A > 4,
if dim A 6 2.
We call ϕ1 and ϕ2 triality components of ϕ. It is not difficult to see that any other pair of triality
components of ϕ is of the form (R−1
ϕ2(1) ϕ and
ϕ2 = L−1
w ϕ1, Lw ϕ2) for some w ∈ N (A)∗, and that ϕ1 = R−1
ϕ1(1) ϕ. If A is associative, then
ϕ(xy) = ϕ1(x)ϕ2(y) = (ϕ(x)ϕ2(1)−1)(ϕ1(1)−1ϕ(y)) = ϕ(x)ϕ(1)−1ϕ(y) .
Given a Hurwitz algebra A, triality components ϕ1, ϕ2 of any ϕ ∈ G(A) are again elements of G(A).
Moreover, (ϕ1)−1 and (ϕ2)−1 are a pair of triality components of ϕ−1. We write PG(A) = G(A)/
(k∗I).
A groupoid is a category in which every morphism is an isomorphism. Every action of a group
G on a set X gives rise to a groupoid with object class X, and morphisms x → y being the set
of group elements g ∈ G satisfying g · x = y. We call this the groupoid of the G-action on X.
Given a vector space V over k, and a quadratic form q : V → k, set PGL(V ) = GL(V )/(k∗I),
PGO(V, q) = GO(V, q)/(k∗I) and PGO+(V, q) = GO+(V, q)/(k∗I). The orbit/coset (of some
group action/normal subgroup) represented by an element in a set/group will be denoted using
square brackets around the element in question. For example, if α ∈ GL(A), the element in
PGL(A) represented by α is written as [α]. If V is a Euclidean space then Pds(V ) denotes the
set of positive definite symmetric endomorphisms of V , and SPds(V ) = Pds(V ) ∩ SL(A). The
set of isomorphisms from an object A to an object B in a category C is denoted by Iso(A, B) =
IsoC (A, B). Throughout, C2 denotes the cyclic group of order two, generated by the canonical
involution in a Hurwitz algebra of dimension at least two: C2 = hκi = {I, κ}.
2. General description
The following lemma is essentially due to Albert [1, Theorem 7], for general (not necessarily
associative) algebras. The formulation has been sharpened slightly and adapted to our situtation.
Lemma 1. Let A be a Hurwitz algebra, and α, β ∈ GL(A). The isotope Aα,β is unital if and only
if α = Ra, β = Lb for some a, b ∈ A∗. The identity element in ARa,Lb is (ab)−1.
e = IA. Now e ◦ x = α(e)β(x), that is, L◦
e = Lα(e) β, so L◦
Proof. The isotope Aα,β = (A, ◦) is unital if and only if there exists an element e ∈ A such that
L◦
e = R◦
e = IA if and only if Lα(e) is
invertible β = L−1
α(e) =
Lα(e)−1 . Similarly, R◦
α(e). Now Lα(e) being invertible means that α(e) ∈ A∗, and thus β = L−1
e = Rβ(e) α equals the identity map if and only if α = R−1
β(e) = Rβ(e)−1 .
It readily verified that (ab)−1 ◦ x = x = x ◦ (ab) in ARa,Lb.
(cid:3)
Proposition 2. Let A be a Hurwitz algebra. Any isotope B of A that has an identity element is
again a Hurwitz algebra, isomorphic to A, and nB = nA(1B)−1nA.
Proof. By Lemma 1, any principal isotope B = (A, ◦) of A that is unital has the form B = ARc,Ld .
Defining nB(x) = nA(cd)nA(x) for all x ∈ B, we have
nB(x ◦ y) = nB((xc)(dy)) = nA(cd)nA((xc)(dy))
= nA(cd)nA(x)nA(cd)nA(y) = nB(x)nB(y)
so B is a Hurwitz algebra. Moreover, Lcd : (B, nB) → (A, nA) is an isometry. Being isometric
as quadratic spaces, A and B are isomorphic algebras. Since 1B = (cd)−1, it is clear that nB =
nA(cd)nA = nA(1B)−1nA.
(cid:3)
From Proposition 2 follows the simple but important observation that, if two isotopes Aα,β and
Bγ,δ of Hurwitz algebras A and B are isomorphic to each other, then A ≃ B.
Corollary 3. Let A be a Hurwitz algebra, and α, β, γ, δ ∈ GL(A). Any isomorphism ϕ : Aα,β →
Aγ,δ is a similitude of (A, nA) with multiplier nA(ϕ(1A)).
4
ERIK DARP O
Proof. Let ϕ : Aα,β → Aγ,δ be an isomorphism. It is straightforward to verify that ϕ is also an
isomorphism A → B, where B = Aγϕα−1ϕ,δϕβ−1ϕ Thus, in particular, ϕ is an orthogonal map
(A, nA) → (B, nB), and ϕ(1A) = 1B. By Proposition 2, nB = nA(1B)−1nA, so nA(ϕ(x)) =
nA(1B)nB(ϕ(x)) = nA(ϕ(1A))nA(x).
(cid:3)
The following proposition describes all isomorphisms between isotopes of Hurwitz algebras. It
generalises the description of eight-dimensional absolute-valued algebras given in [3, Theorem 4.3].
Proposition 4. Let A = (A, n) be a Hurwitz algebra and α, β, γ, δ ∈ GL(A). A map ϕ : Aα,β →
Aγ,δ is an isomorphism if and only if ϕ ∈ G(A) and there exist triality componenets ϕ1, ϕ2 of ϕ
such that
(γ = ϕ1αϕ−1,
δ = ϕ2βϕ−1.
Remark 5. Note that, since any pair (ϕ1, ϕ2) of triality components of ϕ satisfy ϕ1 = R−1
ϕ2 = L−1
ϕ1(1), we could also have written
ϕ2(1),
(γ = ϕ1αϕ−1 = R−1
δ = ϕ2βϕ−1 = L−1
ϕ2(1A) ϕαϕ−1,
ϕ1(1A) ϕβϕ−1
in the proposition above.
Proof. A direct computation shows that if ϕ ∈ G(A) and γ = ϕ1αϕ−1 and δ = ϕ2βϕ−1, then
ϕ ∈ Iso(Aα,β, Aγ,δ).
For the other direction, assume that ϕ ∈ Iso(Aα,β, Aγ,δ). This means that ϕ(α(x)β(y)) =
γϕ(x) · δϕ(y) for all x, y ∈ A, and setting z = α(x), w = β(y) gives
ϕ(zw) = γϕα−1(z) · δϕβ−1(w).
Inserting w = 1A into this equation yields ϕ(z) = γϕα−1(z)·δϕβ−1(1A), so γϕα−1 = R−1
δϕβ−1(1A) ϕ.
By Corollary 3, we know that ϕ is a similitude with multiplier nA(ϕ(1A)), so it follows that γϕα−1
nA(δϕβ−1(1A)) . Similarly, δϕβ−1 is a similitude with multiplier
is a similitude with multiplier
nA(γϕα−1(1A)) . Setting ϕ1 = γϕα−1 and ϕ2 = δϕβ−1 gives ϕ(zw) = ϕ1(z)ϕ2(w) with ϕ1, ϕ2 ∈
GO(A), which means that ϕ ∈ G(A). Moreover, γ = ϕ1αϕ−1 and δ = ϕ2βϕ−1, as required.
(cid:3)
nA(ϕ(1A))
nA(ϕ(1A))
We record the following observations for future use. The first statement is a consequence of the
fact, referred to in the introduction, that x ∈ N (A) if and only if (ax)b = a(xb) for all a, b ∈ A;
the second follows from Proposition 4.
Lemma 6. Let A be a Hurwitz algebra, α, β, γ, δ ∈ GL(A) and ρ ∈ k∗.
(1) Aα,β = Aγ,δ if and only if α = R−1
w γ, β = Lw δ for some w ∈ N (A)∗.
(2) The homothety hρ(x) = ρx on A defines an isomorphism AρI,I → A.
The set T = {([ϕ0], [ϕ1], [ϕ2]) ∈ PG(A)3 ϕ0(xy) = ϕ1(x)ϕ2(y) , ∀x, y ∈ A} is a group under
component-wise multiplication. The kernel of the group epimorphism
π0 : T → PG(A), (ϕ0, ϕ1, ϕ2) 7→ ϕ0
is
hence π0 induces an isomorphism T /N → PG(A). Now T acts on PGL(A)2 by
N = {([IA], [R−1
w ], [Lw]) w ∈ N (A)∗} ≃ N (A)∗/(k∗1) ,
(1)
We denote by XA = PGL(A)2/N the orbit set of the induced N -action on PGL(A)2. Then (1)
induces an action of PG(A) ≃ T /N on XA, given by
([ϕ0], [ϕ1], [ϕ2]) · ([α], [β]) = ([ϕ1αϕ−1
0 ], [ϕ2βϕ−1
0 ]) .
(2)
ϕ · [α, β] =(cid:2)ϕ1αϕ−1, ϕ2βϕ−1(cid:3)
for [α, β] ∈ XA and ϕ ∈ PG(A). Here ϕ1, ϕ2 are any pair of triality components of ϕ, that is,
(ϕ, ϕ1, ϕ2) ∈ π−1
0 (ϕ) ⊂ T .
ISOTOPES OF HURWITZ ALGEBRAS
5
We use the following notational convention: if γ, δ ∈ GL(A), then the element of XA represented
by ([γ], [δ]) ∈ PGL(A) is denoted by [γ, δ] (rather than [[γ], [δ]]).
Let X (A) = PG(A) XA be the groupoid of the action (2). For any Hurwitz algebra A, let I (A)
denote the category of principal isotopes of A, and I (A) the groupoid obtained from I (A) by
removing all non-isomorphisms between the objects. Note that if A is a division algebra then so
are all its isotopes, and thus any non-zero morphism in I (A) is an isomorphism in this case.
The essence of our findings so far is summarised in the following theorem.
Theorem 7. For any Hurwitz algebra A, the categories
equivalence FA : I (A) → X (A) is given by FA(Aα,β ) = [α, β] and FA(ϕ) = [ϕ].
Proof. Let (α, β), (γ, δ) ∈ GL(A)2. If Aα,β = Aγ,δ then, by Lemma 6,
I (A) and X (A) are equivalent. An
(γ, δ) = (R−1
w α, Lw β) = (IA, R−1
w , Lw) · (α, β)
for some w ∈ N (A)∗, and hence the elements ([α], [β]) and ([γ], [δ]) in PGL(A)2 represent the
same object in XA = PGL(A)2/N . Proposition 4 guarantees that [ϕ] · [α, β] = [γ, δ] whenever
ϕ ∈ Iso(Aα,β , Aγ,δ). This shows that FA is well defined. Clearly, FA is surjective on objects,
hence dense as a functor.
If ϕ, ψ ∈ Iso(Aα,β, Aγ,δ) and FA(ϕ) = FA(ψ), then ϕ = ρψ for some ρ ∈ k∗, so ρIA = ϕψ−1 ∈
Aut(Aα,β). This implies ρ = 1 and ϕ = ψ ; hence FA is faithful. Fullness is clear from the
construction.
(cid:3)
Remark 8.
(1) If k is a Euclidean field3 (e.g., k = R), then the group PGO(A, n) is canon-
ically isomorphic to O(A, n)/(±I), via composition of inclusion and quotient projection:
O(A, n)/(±I) ֒→ GO(A, n)/(±I) ։ GO(A, n)/(k∗I) = PGO(A, n). This also induces an
isomorphism O+(A, n)/(±I) → PGO+(A, n).
(2) The set XA = PGL(A)2/N may also be viewed as the orbit set PGL(A)2/N (A)∗ of the
N (A)∗-action on PGL(A)2 given by w · ([α], [β]) =(cid:0)[R−1
(3) Assume that A is associative. The maps πi : T → PG(A), (ϕ0, ϕ1, ϕ2) 7→ ϕi, i = 1, 2,
are group epimorphisms, and since N is normal in T , the images π1(N ) = {[Ra] a ∈
A∗} ⊂ PG(A) and π2(N ) = {[La] a ∈ A∗} ⊂ PG(A) of N under π1 and π2 are normal
subgroups of PG(A). It follows that RA∗ = {Ra a ∈ A∗} and LA∗ = {La a ∈ A∗} are
normal subgroups of G(A).
w α], [Lw β](cid:1).
(4) If dim A = 8, since N (A) = k1, we have XA = PGL(A)2.
If A is associative, then the group G(A) has a particularly nice form.
Proposition 9. If A is an associative Hurwitz algebra, then G(A) can be written as a semi-direct
product in the following ways:
In particular, LA∗ and RA∗ are normal subgroups of G(A).
G(A) = LA∗ ⋊ Aut(A) = RA∗ ⋊ Aut(A) .
Proof. As already noted in Remark 8(2), LA∗ and RA∗ are normal subgroups of G(A). Since any
automorphism of A must fix the identity element 1A in A, we have La ∈ Aut(A) for a ∈ A∗ if and
only if a = 1. Thus LA∗ ∩ Aut(A) = {I}. The inclusion Aut(A) ⊂ G(A) is obvious. If ϕ ∈ G(A),
then
L−1
ϕ(1) ϕ(xy) = L−1
ϕ(1) ϕ ∈ Aut(A). This implies G(A) = LA∗ Aut(A), which shows that G(A) = LA∗ ⋊ Aut(A).
(cid:3)
so L−1
The identity G(A) = RA∗ ⋊ Aut(A) is proved similarly.
ϕ(1)(cid:0)ϕ(x)ϕ(1)−1ϕ(y)(cid:1) = L−1
ϕ(1) ϕ(x) · Lϕ(1)−1 ϕ(y) = L−1
ϕ(1) ϕ(x) · L−1
ϕ(1) ϕ(y),
Note that if dim A = 2 then Aut(A) = {I, κ} = C2. If A is a quaternion algebra then it is
a ∈ A∗}.
b = Lab Rb−1 . This leads to the following
central simple, and the Skolem-Noether Theorem [13, p. 222] gives Aut(A) = {La R−1
a
Hence every ϕ ∈ GO+(A) can be written as ϕ = La Lb R−1
result.
3A field k is called Euclidean if k∗2 forms an ordering of k.
6
ERIK DARP O
Corollary 10. Every proper similitude of a quaterion algebra A has the form La Rb for some
a, b ∈ A∗. The kernel of the group epimorphism A∗ × (A∗)op → GO+(A), (a, b) 7→ La Rb is
{(ρ, ρ−1) ρ ∈ k∗} ⊂ A∗ × (A∗)op.
Proof. From the argument in the paragraph preceding Corollary 10, it is clear that every ϕ ∈
GO+(A) can be written as La Rb for some a, b ∈ A∗. For the second assertion, assume that
La Rb = IA, i.e., that axb = x for all x ∈ A. Setting x = a−1 gives b = a−1, and now La Ra−1 = IA
if and only if a ∈ k∗1.
(cid:3)
If A is an associative Hurwitz algebra, then the map La ψ ∈ LA∗ ⋊ Aut(A) = G(A) has a pair
of triality components (La ψ, ψ). Thus the action (2) of [La ψ] ∈ PG(A) on [α, β] ∈ XA can be
written as
(3)
[La ψ] · [α, β] =(cid:2)La ψαψ−1 L−1
a , ψβψ−1 L−1
a (cid:3) .
For dim A = 2, this description of the groupoid X (A) is equivalent to the isomorphism criterion
1.12 in [17], applied to isotopes of quadratic ´etale algebras.
We conclude this section by introducing a numerical, easily computed isomorphism invariant.
For l a positive integer, let k∗l = {ρl ∈ k∗ ρ ∈ k∗} ⊂ k∗.
Proposition 11. Let A be a Hurwitz algebra of dimension 2l > 4, and α, β ∈ GL(A). Then the
pair ([det(α)], [det(β)]) ∈(cid:0)k∗/k∗l(cid:1)2
is an isomorphism invariant for Aα,β.
Proof. Assuming the existence of an isomorphism ϕ : Aα,β → Aγ,δ, we need to show that
det(α) det(γ)−1 ∈ k∗l and det(β) det(δ)−1 ∈ k∗l. For any x ∈ A, we have ϕ Lα(x) β = Lγϕ(x) δϕ
and hence ϕ Lα(x) βϕ−1 = Lγϕ(x) δ, so
det(cid:0)Lα(x)(cid:1) det(β) = det(cid:0)ϕ Lα(x) βϕ−1(cid:1) = det(cid:0)Lγϕ(x) δ(cid:1) = det(Lγϕ(x)) det(δ).
(4)
Since the maps La and Ra are proper similitudes with multiplier nA(a) for any a ∈ A∗, the
equation (4) implies that nA(α(x))l det(β) = nA(γϕ(x))l det(δ) whenever α(x) ∈ A∗. Hence,
det(β) det(δ)−1 ∈ k∗l. Similarly, the identity ϕ Rβ(y) αϕ−1 = Rδϕ(y) γ implies that det(α) det(γ)−1 ∈
k∗l.
(cid:3)
Let A and l be as in Proposition 11. For i, j ∈ k∗/k∗l, setting
X (A)i,j =n[α, β] ∈ X (A) ([det(α)], [det(β)]) = (i, j) ∈(cid:0)k∗/k∗l(cid:1)2o ⊂ X (A) ,
the groupoid X (A) can be written as a coproduct
(5)
X (A) = ai,j∈ k∗/k∗l
X (A)i,j .
Hence, any subcategory A ⊂ X (A) can be classified by classifying each of the subcategories
Ai,j = A ∩ X (A)i,j ⊂ X (A)i,j .
As for the real ground field, [R∗ : R∗l] = 2 for any even integer l > 2, the two cosets being
represented by 1 and −1, and the quotient projection R∗ → R∗/R∗l is given by ρ 7→ [sign(ρ)]. If
A is either H or O, α, β ∈ GL(A) and Aα,β = (A, ◦), then det(L◦
x) = det(Lα(x)) det(β). Since
det(Lα(x)) = n(α(x))(dim A)/2 > 0 for any x 6= 0, it follows that sign(det(L◦
x)) = sign(det(β)), and
similarly sign(det(R◦
here coincides with the "double sign" decomposition for real division algebras, introduced in [5].
x)) = sign(det(α)). This means that the decomposition X (A) =`i,j∈{−1,1}
X (A)i,j
3. Isotopes of Hamilton's quaternions
In this section , we give a more detailed account for isotopes of real Hurwitz algebras whose
underlying quadratic space is Euclidean. Such a Hurwitz algebra is isomorphic to either R, C, H,
or O, and the isotopes are precisely the real division algebras that are isotopic to a Hurwitz algebra.
The isotopes of C are all the two-dimensional real division algebras, and their classification has
been described in [7, 11]. While our goal is to study the isotopes of H, some arguments hold also in
the 8-dimensional case. Thus, let A be either H or O. Our main tool will be polar decomposition
of linear maps.
ISOTOPES OF HURWITZ ALGEBRAS
7
Any α ∈ GL(A) can be written as α = α′λ, where det(α′) = det(α) > 0 and λ ∈ C2 = {I, κ}.
Polar decomposition now yields α′ = ζδ, with ζ ∈ SO(A) and δ ∈ Pds(A). Hence α = ζδλ, and
this decomposition is unique [10, §14].
Passing to the projective setting, the above implies that every α ∈ PGL(A) uniquely determines
ζ ∈ SO(A)/(±I), δ ∈ SPds(A) = Pds(A) ∩ SL(A) and λ ∈ C2 such that α = [ζδλ]. As noted
in Remark 8, SO(A)/(±I) ≃ PGO+(A), and ζ can indeed be viewed as an element in PGO+(A)
instead of SO(A)/(±I). The cyclic group C2 acts on PGO+(A) by [ϕ]λ = [λϕλ] (λ ∈ C2, ϕ ∈
a ] in PGO+(A). We write [ϕ]−λ
GO+(A)). Note that [La]κ = [R¯a] = [R−1
a ] and [Ra]κ = [L¯a] = [L−1
for (cid:0)[ϕ]−1(cid:1)λ
=(cid:0)[ϕ]λ(cid:1)−1
.
Let α, β ∈ PGL(A), α = [ζδλ] and β = [ηǫµ], where ζ, η ∈ PGO+(A), δ, ǫ ∈ SPds(A) and
λ, µ ∈ C2. The action (2) of [ϕ] ∈ PGO+(A) on [α, β] ∈ XA is given by
[ϕ] · [α, β] =(cid:2)ϕ1ζδλϕ−1 , ϕ2ηǫµϕ−1(cid:3) =(cid:2)ϕ1ζϕ−λ(ϕλδϕ−λ)λ , ϕ2ηϕ−µ(ϕµǫϕ−µ)µ(cid:3) ,
and ϕ1ζϕ−λ, ϕ2ηϕ−µ ∈ PGO+(A) , ϕλδϕ−λ, ϕµǫϕ−µ ∈ SPds(A).
The group N (A)∗ acts on PGO+(A)2 by w · (ζ, η) = ([Rw]−1ζ , [Lw]η), and we denote the orbit
set of this action by PGO+(A)2/N (A)∗. The argument in the preceding paragraph shows that
the PGO+(A)-action on PGO+(A)2/N (A)∗ × SPds(A)2 × C2
2 by
(6)
is equivalent to the PGO+(A)-action (2) on XA, via the map
[ϕ] · ([ζ, η], (δ, ǫ), (λ, µ)) =(cid:0)(cid:2)ϕ1ζϕ−λ, ϕ2ηϕ−µ(cid:3) , (ϕλδϕ−λ, ϕµǫϕ−µ), (λ, µ)(cid:1)
m : PGO+(A)2/N (A)∗ × SPds(A)2 × C2
2 → XA , ([ζ, η], (δ, ǫ), (λ, µ)) 7→ [ζδλ, ηǫµ]
(i.e., ϕm = mϕ for all ϕ ∈ PGO+(A)). Hence, in particular, the groupoid
of the action (6) is isomorphic to X (A):
Y (A) = PGO+(A)(cid:0) PGO+(A)2/N (A)∗ × SPds(A)2 × C2
2(cid:1)
Proposition 12. The functor GA : Y (A) → X (A) defined by GA(y) = m(y) for y ∈ Y (A), and
GA(ϕ) = ϕ for morphisms ϕ ∈ PGO+(A), is an isomorphism of categories.
From here on we focus exclusively on the four-dimensional case, in which A ≃ H. Corollary 10
implies that every element ζ ∈ PGO+(H) has the form ζ = [La Rb] for some a, b ∈ H∗. Since H is
associative, it follows that if ϕ = [La Rb] then ϕ1 = [La], ϕ2 = [Rb] are triality components of ϕ.
Recall that N (H)∗ = H∗ acts on PGO+(H)2 by c · (ζ, η) = (cid:0)[R−1
for all a, b ∈ H, the following identities hold in PGO+(H)2/N (H)∗ = PGO+(H)2/H∗:
]ζ, [Lc]η(cid:1). Since La Rb = Rb La
c
[La Rb, Lc Rd] = c−1 · [La Rb, Lc Rd] = [Rc La Rb, Rd] = [La Rbc, Rd] .
Hence every element [ζ, η] ∈ PGO+(H)2/H∗ can be written on the form [ζ, η] = [La Rb, Rc], with
a, b, c ∈ H∗. Now the action of ϕ = [Ls Rt] ∈ PGO+(H) (s, t ∈ H∗) on ([ζ, η], (δ, ǫ), (λ, µ)) ∈ Y (H)
is given by
(7) ϕ · ([ζ, η], (δ, ǫ), (λ, µ)) =(cid:16)hLs La Rb L−λ
For (i, j) ∈ {−1, 1}2, set Y (H)i,j = G −1
Y (H)(−1)i,(−1)j . This gives the decomposition
s R−λ
t
, Rt Rc L−µ
s R−µ
A (X (H)i,j ) ⊂ Y (H). Note that ([ζ, η], (δ, ǫ), (κi, κj)) ∈
t i , (cid:0)ϕλδϕ−λ, ϕµǫϕ−µ(cid:1) , (λ, µ)(cid:17) .
Y (H) = ai,j∈{−1,1}
Y (H)i,j ,
and the action of ϕ = Ls Rt on each of the cofactors Y (H)i,j can be studied separately.
For ([ζ, η], (δ, ǫ), (I, I)) ∈ X (H)1,1, we have
ϕ · ([ζ, η], (δ, ǫ), (I, I)) =(cid:0)(cid:2)Ls La Rb L−1
s Rb R−1
s R−1
t Ls La L−1
, Rt Rc L−1
s R−1
s , Rt Rc R−1
t
In particular, if s = 1, t = b, so that ϕ = Rb, then
=(cid:0)(cid:2)R−1
t (cid:3) , (cid:0)ϕδϕ−1, ϕǫϕ−1(cid:1) , (I, I)(cid:1)
t (cid:3) , (cid:0)ϕδϕ−1, ϕǫϕ−1(cid:1) , (I, I)(cid:1) .
ϕ · ([ζ, η], (δ, ǫ), (I, I)) =(cid:0)[La, Rbcb−1 ] , (cid:0)Rb δ R−1
b
, Rb ǫ R−1
b (cid:1) , (I, I)(cid:1) .
8
ERIK DARP O
Hence every orbit in Y (H)1,1 contains an element of the form ([La, Rb], (δ, ǫ), (I, I)). Moreover,
the action of ϕ = [Ls Rt] on such an element is given by
s R−1
t
, Rt Rb L−1
s R−1
(8)
ϕ · ([La, Rb], (δ, ǫ), (I, I)) =(cid:0)(cid:2)Ls La L−1
which has the form ([Lc, Rd], (δ, ǫ), (I, I)) if and only if t = s−1, that is, ϕ = [Ls R−1
s ].
=(cid:0)(cid:2)R(st)−1 Lsas−1 , Rt−1bt(cid:3) , (ϕδϕ−1, ϕǫϕ−1), (I, I)(cid:1)
Denoting by Z = H∗/R∗(cid:0)(H∗/R∗)2 × SPds(H)2(cid:1) the groupoid of the action
s · ((a, b), (δ, ǫ)) = ((sas−1, sbs−1), (csδc−1
s , csǫc−1
s )) ,
t (cid:3) , (ϕδϕ−1, ϕǫϕ−1), (I, I)(cid:1)
the above implies that the functor H1,1 : Z → Y (H)1,1 defined by
H1,1((a, b), (δ, ǫ)) = ([La, Rb], (δ, ǫ), (I, I))
on objects, and
Hi,j (s) = [Ls R−1
s ]
on morphisms, is an equivalence of categories.
Next, consider ([ζ, η], (δ, ǫ), (κ, I)) ∈ Y (H)−1,1. In this case,
s R−1
ϕ · ([ζ, η], (δ, ǫ), (κ, I)) =(cid:0)(cid:2)Ls La Rb L−κ
=(cid:0)(cid:2)Ls La Lt R−1
Setting s = 1 and t = a−1 gives ϕ = R−1
a and
t
, Rt Rc L−1
s R−κ
s Rb Rs, Rt Rc R−1
t (cid:3) , (cid:0)ϕκδϕ−κ, ϕǫϕ−1(cid:1) , (κ, I)(cid:1)
t (cid:3) , (cid:0)ϕκδϕ−κ, ϕǫϕ−1(cid:1) , (κ, I)(cid:1)
[Ra]−1 · ([ζ, η], (δ, ǫ), (κ, I)) =(cid:0)[Rb, Raca−1 ] , (cid:0)La δ L−1
so the orbit of ([ζ, η], (δ, ǫ), (κ, I)) contains an element of the form ([Ra, Rb], (δ′, ǫ′), (κ, I)). Similarly
to the previous case with Y (H)1,1, the group elements ϕ ∈ PGO+(H) stabilising this form, so
that ϕ · ([Ra, Rb], (δ, ǫ), (κ, I)) = ([Rc, Rd], (δ′, ǫ′), (κ, I)) for some c, d ∈ H, are precisely those of
the form ϕ = [Ls R−1
s ], s ∈ H∗. Note that if ϕ = [Ls R−1
s ] then ϕκ = ϕ, hence
a ǫ Ra(cid:1) , (κ, I)(cid:1)
a , R−1
ϕ · ([Ra, Rb], (δ, ǫ), (κ, I)) =(cid:0)[Rsas−1 , Rsbs−1 ], (ϕδϕ−1, ϕǫϕ−1), (κ, I)(cid:1) .
Again, this shows that there is an equivalence of categories H−1,1 : Z → Y (H)−1,1 is given by
H−1,1(s) = [Ls R−1
s ] on morphisms and H−1,1((a, b), (δ, ǫ)) = ([Ra, Rb], (δ, ǫ), (κ, I)) on objects.
Similar computations can be made for Y (H)1,−1 and Y (H)−1,−1, in each case resulting in an
equivalence with the category Z . The results are summarised in Theorem 13 below.
For a ∈ H∗, set ca = [La R−1
a ] ∈ PGO+(H). Note that the kernel of the morphism H∗ →
PGO+(H), a 7→ ca is R∗1.
Theorem 13. Let (i, j) ∈ {−1, 1}2. Each of the subcategories Y (H)i,j of Y (H) is equivalent to
the groupoid Z = H∗/R∗(cid:0)(H∗/R∗)2 × SPds(H)2(cid:1) of the action
s · ((a, b), (δ, ǫ)) = ((sas−1, sbs−1), (csδc−1
s , csǫc−1
s )) .
An equivalence Hi,j : Z → Y (H)i,j is given by Hi,j (s) = cs for morphisms s ∈ H∗/R∗ and
H1,1((a, b), (δ, ǫ)) = ([La, Rb], (δ, ǫ), (I, I)) , H−1,1((a, b), (δ, ǫ)) = ([Ra, Rb], (δ, ǫ), (κ, I)) ,
H1,−1((a, b), (δ, ǫ)) = ([La, Lb], (δ, ǫ), (I, κ)) , H−1,−1((a, b), (δ, ǫ)) = ([La, Rb], (δ, ǫ), (κ, κ)) .
Remark 14. Theorem 13 shows, in particular, that X (H)i,j ≃ X (H)i′,j ′ for all (i, j), (i′, j′) ∈
{−1, 1}2.
The image of the monomorphism H∗/R∗ → PGO+(H), s 7→ cs is {ϕ ∈ PGO+(H) ϕ(R∗1) =
R∗1}, which can be identified with SO1(H) = {ϕ ∈ SO(H) ϕ(1) = 1} ≃ SO(1⊥
H ). Thus the
map f : H∗/R∗ → SO1(H), s 7→ cs is an isomorphism, inducing an action of SO1(H) on the
object set (H∗/R∗)2 × SPds(H)2 of Z , given by ϕ · ((a, b), (δ, ǫ)) = f −1(ϕ) · ((a, b), (δ, ǫ)) =
((ϕ(a), ϕ(b)), (ϕδϕ−1, ϕǫϕ−1)).
This allows for the following geometric interpretation of the category Z . Elements in H∗/R∗
are viewed as lines through the origin in H (that is, elements in the real projective space P(H)),
and δ ∈ SPds(A) is identified with the three-dimensional hyper-ellipsoid Eδ = {x ∈ H hx, δ(x)i =
ISOTOPES OF HURWITZ ALGEBRAS
9
1} ⊂ H. The set E = {Eδ δ ∈ SPds(H)} consists of all hyper-ellipsoids centered in the origin
and satisfying λ1λ2λ3λ4 = 1, where λi ∈ R>0, i = 1, 2, 3, 4 are the lengths of the principal axes
(which lie along the eigenspaces of δ). Moreover, H is identified with R4 in the natural way, and
1⊥
H ⊂ H with V = span{e2, e3, e4} ⊂ R4. Now objects in Z can be viewed as configurations
in R4 consisting of two lines a, b ∈ P(R4), and two hyper-ellipsoids Eδ, Eǫ ∈ E. A morphism
(a, b, Eδ, Eǫ) → (a′, b′, Eδ′ , Eǫ′) between two such configurations is an element ϕ ∈ SO(V ) ⊂
SO(R4) transforming one configuration to the other: (ϕ(a), ϕ(b), ϕ(Eδ ), ϕ(Eǫ)) = (a′, b′, Eδ′ , Eǫ′ ).
The above interpretation gives a picture of the category of isotopes of H in elementary geometric
terms, making it easy to read of whether or not two different isotopes of H are isomorphic. To
extract from this description a complete and irredundant list of representatives for the set of
isomorphism classes of isotopes of H, one would need to find a normal form for the described
configurations of lines and hyper-ellipsoids under the natural action of SO(V ). While this task
is in principle not difficult, it is by its nature quite technical, and we shall not pursue it further
here. We note, however, that the object set of the groupoid Z is a 24-dimensional manifold, with
isomorphism classes being orbits under a continuous action of a 3-dimensional real Lie group.
4. Composition algebras
In this section, as an example, we show how the theory of composition algebras fits into the
general setting of Section 2. This leads to a short and easy proof of results by Stampfli-Rollier
[20] on the structure four-dimensional composition algebras. As a bonus, our approach works also
in characteristic two.
Lemma 15. Let A = (A, nA) be a Hurwitz algebra, and α, β ∈ GL(A). The isotope Aα,β is a
composition algebra if and only if α, β ∈ GO(A, nA).
Proof. If α, β are similitudes, then Aα,β is a composition algebra with respect to the norm n =
µ(α)µ(β)nA. Conversely, suppose that Aα,β = (A, ◦) is a composition algebra with norm n. Let
a ∈ A be an element such that n(a) 6= 0, then b = n(a)−1(a ◦ a) has norm 1, and thus the
linear endomorphisms L◦
b of Aα,β are orthogonal with respect to n. Now the isotope
b )−1 is a Hurwitz algebra with norm n and identity element b ◦ b.4 It follows
B = (Aα,β)(R◦
that B is isotopic to A and thus, by Proposition 2, n = ρnA for some ρ ∈ k∗. Hence
b and R◦
b )−1,(L◦
nA(α(x))nA(β(y)) = nA(α(x)β(y)) = nA(x ◦ y) = ρ−1n(x ◦ y) = ρ−1n(x)n(y) = ρnA(x)nA(y)
for all x, y ∈ A. Inserting y = 1A into this equation gives nA(α(x)) = ρnA(β(1))−1nA(x), so α
is a similitude with muliplier ρnA(β(1))−1 with respect to nA. Similarly, β is a similitude with
multiplier ρnA(α(1))−1.
(cid:3)
Given a Hurwitz algebra A, let X c(A) ⊂ X (A) be the full subcategory formed by all images
[α, β] = FA(Aα,β) where Aα,β is a composition algebra. Lemma 15 implies that X c(A) =
PGO(A, nA)2/N ⊂ X (A).
For dim A > 2, the property of being a proper respectively improper similitude is retained
by the factors α, β of [α, β] ∈ X c(A) under the action of PG(A). This means that for each
(i, j) ∈ {−1, 1}2, the subset
(where we use the notational convention PGO±1(A) = PGO±(A)) is invariant under this action,
and the category X c(A) decomposes as
X c(i,j)(A) =(cid:0)PGOi(A) × PGOj(A)(cid:1) /N (A)∗ ⊂ X c(A)
X c(A) = ai,j∈{−1,1}
X c(i,j)(A) .
This refines the decomposition (5) for dim A > 4: X c(i,j)(A) ⊂ X c(A)i,j for all i, j ∈ {−1, 1}. If
−1 6∈ kl, l = (dim A)/2, then X c(i,j)(A) = X c(A)i,j , but whereas the four sets X c(i,j)(A) are
always distinct, X c(A)i,j = X c(A) for all i, j ∈ {−1, 1} in case −1 ∈ kl.
4This argument, by which any finite-dimensional composition algebra is shown to be isotopic to a Hurwitz
algebra with the same norm, is sometimes referred to as Kaplansky's trick, after [14, p. 957].
10
ERIK DARP O
If (A, nA) is a Euclidean space, the groups PGO(A) and PGO+(A) are canonically identified
with O(A)/(±IA) and SO(A)/(±IA) respectively. This, together with Theorem 7, gives a descrip-
tion of all finite-dimensional absolute valued algebras equivalent to Theorem 4.3 in [3].
We proceed to describe all composition algebras isotopic to a fixed quaternion algebra A =
(A, n) over k. Every [α, β] ∈ X c(A) can be written as [α, β] = [ζλ, ηµ] with ζ, η ∈ GO+(A) and
λ, µ ∈ C2. Corollary 10 now gives ζ = [La Rb], η = [Lc Rd] for some a, b, c, d ∈ A∗, and since
N (A) = A, we have [α, β] = [La Rb λ, Lc Rd µ] = [La Rbc λ, Rd] in XA. Thus, analogously with the
Euclidean case treated in Section 3, [α, β] can be written as [α, β] = [La Rb λ, Rc µ]. Moreover,
one reads off that [α, β] ∈ X c(det(λ),det(µ))(A).
Let [α, β] = [La Rb, Rc] ∈ X c(1,1)(A). Now [Rb] · [α, β] = [La, Rb−1cb], so every PGO+(A)-orbit
in X c(1,1)(A) contains an element of the form [Lb, Rb]. Similarly, every orbit in X c(−1,1)(A)
contains an element of the form [Ra κ, Rb], every orbit in X c(1,−1)(A) contains some [La, Lb κ],
and every orbit in X c(−1,−1)(A) contains an element of the form [La κ, Rb κ]. By computations
similar to (8), one proves that ϕ ∈ PGO+(A) stabilises each of these forms if and only if ϕ = cs
for some s ∈ A∗, and that
cs · [La, Rb] = [Ls La L−1
s , R−1
s Rb Rs] = [Lsas−1 , Rsbs−1 ] ,
s Ra Rs κ, R−1
s Rb Rs] = [Rsas−1 κ, Rsbs−1 ] ,
cs · [Ra κ, Rb] = [R−1
cs · [La, Lb κ] = [Ls La L−1
cs · [La κ, Rb κ] = [Ls La L−1
s , Ls Lb L−1
s κ, R−1
s κ] = [Lsas−1 , Lsbs−1 κ] ,
s Rb Rs κ] = [Lsas−1 κ, Rsbs−1 κ] .
This proves the following result, which gives an isomorphism criterion for all composition algebras
isotopic to A.
Proposition 16. Let A be a quaternion algebra. Each of the categories X c(i,j)(A) is equivalent
to the groupoid Z c(A) = A∗/k∗ (A∗/k∗)2 of the action s · (a, b) = (sas−1, sbs−1). Equivalences
H c
i,j : Z c(A) → X c(A)i,j are given by H c
i,j (s) = cs for morphisms, and
H c
1,1(a, b) = [La, Rb] ,
1,−1(a, b) = [La, Lb] ,
H c
H c
−1,1(a, b) = [Ra, Rb] ,
−1,−1(a, b) = [La, Rb] .
H c
A characterisation of all four-dimensional composition algebras over k for char k 6= 2, similar
to Proposition 16, is given by Stampfli-Rollier in Section 3 -- 4 of [20]. Her exposition also contains
explicit isomorphism criteria in terms of the parameters a, b. The Euclidean case, comprising all
composition algebras isotopic to H, that is, all four-dimensional absolute valued algebras, has also
been described by Ram´ırez ´Alvarez [18]. Forsberg, in his master thesis [9], refined that description
to give an explicit cross-section for the isomorphism classes of these algebras.
References
[1] A. A. Albert. Non-associative algebras. I. Fundamental concepts and isotopy. Ann. of Math. (2), 43:685 -- 707,
1942.
[2] Seidon Alsaody. An approach to finite-dimensional real division composition algebras through reflections. Bull.
Sci. Math., 139(4):357 -- 399, 2015.
[3] A. Calder´on, A. Kaidi, C. Mart´ın, A. Morales, M. Ram´ırez, and A. Rochdi. Finite-dimensional absolute-valued
algebras. Israel J. Math., 184:193 -- 220, 2011.
[4] J. A. Cuenca Mira. On one-sided division infinite-dimensional normed real algebras. Publ. Mat., 36(2A):485 --
488 (1993), 1992.
[5] E. Darpo and E. Dieterich. The double sign of a real division algebra of finite dimension greater than one.
Math. Nachr., 285(13):1635 -- 1642, 2012.
[6] Erik Darpo and Jos´e Maria P´erez Izquierdo. Autotopies and quasigroup identities: New aspects of non-
associative division algebras. Forum Math., 27(5):2691 -- 2745, 2015.
[7] E. Dieterich. Classification, automorphism groups and categorical structure of the two-dimensional real division
algebras. J. Algebra Appl., 4(5):517 -- 538, 2005.
[8] A. Elduque and H. C. Myung. On flexible composition algebras. Comm. Algebra, 21(7):2481 -- 2505, 1993.
[9] L. Forsberg. Four-dimensional absolute valued algebras. Master's thesis, Uppsala University, 2009. U.U.D.M.
Project Report 2009:9.
[10] F. R. Gantmacher. The theory of matrices. Vol. 1. Translated by K. A. Hirsch. Chelsea Publishing Co., New
York, 1959.
ISOTOPES OF HURWITZ ALGEBRAS
11
[11] M. Hubner and H. P. Petersson. Two-dimensional real division algebras revisited. Beitrage Algebra Geom.,
45(1):29 -- 36, 2004.
[12] N. Jacobson. Composition algebras and their automorphisms. Rend. Circ. Mat. Palermo, 7(2):55 -- 80, 1958.
[13] N. Jacobson. Basic Algebra II. W.H. Freeman and Company, second edition, 1985.
[14] I. Kaplansky. Infinite-dimensional quadratic forms admitting composition. Proc. Amer. Math. Soc., 4:956 -- 960,
1953.
[15] M.-A. Knus, A. Merkurjev, M. Rost, and J.-P. Tignol. The book of involutions, volume 44 of American
Mathematical Society Colloquium Publications. American Mathematical Society, Providence, RI, 1998.
[16] R. Moufang. Zur Struktur von Alternativkorpern. Math. Ann., 110(1):416 -- 430, 1935.
[17] H. P. Petersson. The classification of two-dimensional nonassociative algebras. Results Math., 37(1-2):120 -- 154,
2000.
[18] M. I. Ram´ırez ´Alvarez. On four-dimensional absolute-valued algebras. In Proceedings of the International
Conference on Jordan Structures (M´alaga, 1997), pages 169 -- 173, M´alaga, 1999. Univ. M´alaga.
[19] T. A. Springer and F. D. Veldkamp. Octonions, Jordan algebras and exceptional groups. Springer Monographs
in Mathematics. Springer-Verlag, Berlin, 2000.
[20] C. Stampfli-Rollier. 4-dimensionale Quasikompositionsalgebren. Arch. Math. (Basel), 40(6):516 -- 525, 1983.
[21] M. Zorn. Theorie der alternativen Ringe. Abh. Math. Sem. Hamburg, 8:123 -- 147, 1931.
Graduate School of Mathematics, Nagoya University, Furo-cho, Chikusa-ku, Nagoya, Japan
|
1803.10209 | 1 | 1803 | 2018-03-27T17:48:44 | A graded pullback structure of Leavitt path algebras of trimmable graphs | [
"math.RA",
"math.OA"
] | Motivated by recent results in graph C*-algebras concerning an equivariant pushout structure of the Vaksman-Soibelman quantum odd spheres, we introduce a class of graphs called trimmable. Then we show that the Leavitt path algebra of a trimmable graph is graded-isomorphic to a pullback algebra of simpler Leavitt path algebras and their tensor products. | math.RA | math |
A GRADED PULLBACK STRUCTURE OF
LEAVITT PATH ALGEBRAS OF TRIMMABLE GRAPHS
PIOTR M. HAJAC, ATABEY KAYGUN, AND MARIUSZ TOBOLSKI
Abstract. Motivated by recent results in graph C*-algebras concerning an equivariant
pushout structure of the Vaksman-Soibelman quantum odd spheres, we introduce a class
of graphs called trimmable. Then we show that the Leavitt path algebra of a trimmable
graph is graded-isomorphic to a pullback algebra of simpler Leavitt path algebras and
their tensor products.
Introduction
The goal of this paper is to introduce and apply the concept of a trimmable graph.
We begin by recalling the fundamental concepts of path algebras [5] and Leavitt path
algebras [7, 2, 1, 3]. Then we define a trimmable graph, and prove our main result: There
is a Z-graded algebra isomorphism from the Leavitt path algebra of a trimmable graph to
an appropriate pullback algebra. The graph C*-algebraic version of this result is proven
in [6], where it was used to analyze the generators of K-groups of quantum complex
projective spaces.
1. Leavitt path algebras
Definition 1.1. A graph Q is a quadruple (Q0, Q1, s, t) consisting of the set of vertices Q0,
the set of edges Q1, and the source and target maps s, t : Q1 → Q0 assigning to each edge
its source and target vertex respectively.
0, Q(cid:48)
1, s(cid:48), t(cid:48)) is a sub-graph of a graph Q = (Q0, Q1, s, t) iff
We say that a graph Q(cid:48) = (Q(cid:48)
1 ⊆ Q1 , and the source and target maps s(cid:48) and t(cid:48) are respective restrictions-
0 ⊆ Q0 , Q(cid:48)
Q(cid:48)
corestrictions of the source and target maps s and t. Furthermore, we say that two edges
are composable if the end of one of them is the beginning of the other. Now we can define
a path in a graph as a sequence of composable edges. The length of a path is the number
of edges it consists of, infinity included. We treat vertices as zero-length paths that begin
and end in themselves.
Definition 1.2. Let k be a field and Q a graph. The path algebra kQ is the k-algebra
whose underlying vector space has as its basis the set of all finite-length paths Path(Q).
The product is given by the composition of paths when the end of one path matches the
beginning of the other path. The product is defined to be zero otherwise.
1
2
P. M. HAJAC, A. KAYGUN, AND M. TOBOLSKI
One can check that the path algebra kQ is unital if and only if the set of vertices Q0 is
finite. Then the unit is the sum of all vertices. It is also straightforward to verify that
kQ is N-graded by the path length.
we create a new set Q∗
To define a Leavitt path algebra, we need ghost edges. For any graph Q = (Q0, Q1, s, t),
1 := {x∗ x ∈ Q1} and call its elements ghost edges. Now, the
source and the target maps for the extended graph (cid:98)Q :=(cid:0)Q0, Q1
1, s, t(cid:1) are defined
(cid:96) Q∗
as follows:
s(x) := s(x),
s(x∗) := t(x),
t(x) := t(x),
t(x∗) := s(x).
(1.1)
Definition 1.3. Let k be a field and Q a graph. The Leavitt path algebra Lk(Q) of a
graph Q is the path algebra of the extended graph (cid:98)Q divided by the ideal generated by the
relations:
(1) For all edges xi, xj ∈ Q1 , we have x∗
(2) For every vertex v ∈ Q0 whose preimage s−1(v) is not empty and finite, we have
i xj = δijt(xi).
(cid:88)
xx∗ = v.
x∈s−1(v)
1, subject to relations:
In other words, the Leavitt path algebra Lk(Q) of a graph Q is the universal k-algebra
generated by the elements v ∈ Q0 , x ∈ Q1 , x∗ ∈ Q∗
(L1) vivj = δijvi for all vi, vj ∈ Q0,
(L2) s(x)x = xt(x) = x for all x ∈ Q1,
(L3) t(x)x∗ = x∗s(x) = x∗ for all x∗ ∈ Q∗
1,
i xj = δijt(xi) for all xi, xj ∈ Q1, and
(L4) x∗
x∈s−1(v) xx∗ = v for all v ∈ Q0 such that s−1(v) is finite and nonempty.
(L5) (cid:80)
Furthermore, note that the N-grading of the path algebra k(cid:98)Q induces a Z-grading of
the Leavitt path algebra Lk(Q) by counting the length of any ghost edge as −1 (see [2,
Lemma 1.7]). Let us recall now the Graded Uniqueness Theorem [9, Theorem 4.8] that
shows the importance of this grading. We will need it in the next section.
Theorem 1.4 ([9]). Let Q be an arbitrary graph and k be any field. If A is a Z-graded
ring, and f : Lk(E) → A is a graded ring homomorphism with f (v) (cid:54)= 0 for every vertex
v ∈ Q0, then f is injective.
Recall that a vertex v ∈ Q0 is called a sink if s−1(v) = ∅. Next, let x = x1x2 . . . xn be
a path in Q. If the length of x is at least 1, and if s(x) = v = t(x) ∈ Q0, we say that x
is a closed path based at v. If in addition s(xi) (cid:54)= s(xj) for every i (cid:54)= j, then x is called a
cycle based at v.
Next, if v ∈ Q0 is either a sink or a base of a cycle of length 1 (a loop), then a singleton
set {v} ⊆ Q0 is a basic example of a hereditary subset of Q0 [3, Definition 2.0.5 (i)], and
it follows from Corollary 2.4.13 (i) in [3] (cf. [9, Theorem 5.7 (2)]) that
Lk(Q)/I(v) ∼= Lk(Q \ {v}).
(1.2)
LEAVITT PATH ALGEBRAS OF TRIMMABLE GRAPHS
3
Here the graph Q \ {v} is obtained by removing from Q the vertex v and every edge that
ends in v. In other words,
(Q \ {v})0 = Q0 \ {v}
and
(Q \ {v})1 = {x ∈ Q1 : t(x) (cid:54)= v}.
(1.3)
By Lemma 2.4.1 in [3] (cf. [9, Lemma 5.6]), we also know that
(cid:40) n(cid:88)
i=1
I(v) =
kixiy∗
i
(cid:12)(cid:12)(cid:12) n ≥ 1, xi , yi ∈ Path(Q), t(xi) = s(y∗
i ) = v
(cid:41)
.
(1.4)
2. Trimmable graphs
We are now ready for the main definition of the paper. Merely to focus attention, we
assume henceforth that graphs are finite, i.e. that the set of vertices and the set of edges
are both finite.
Definition 2.1. Let Q be a finite graph consisting of a sub-graph Q(cid:48) emitting at least one
edge to an external vertex v0 whose only outgoing edge x0 is a loop. We call such a graph
(Q(cid:48), v0)-trimmable iff all edges from Q(cid:48) to v0 begin in a vertex emitting an edge that ends
inside Q(cid:48).
In symbols, a trimmable graph is described as follows:
0 ∪ {v0},
Q0 = Q(cid:48)
s−1(v0) = {x0},
∀ v ∈ s(cid:0)t−1(v0) \ {x0}(cid:1) :
v0 (cid:54)∈ Q(cid:48)
t(x0) = v0 ,
0 , Q1 = Q(cid:48)
1 ∪ t−1(v0),
t−1(v0) \ {x0} (cid:54)= ∅,
s−1(v) \ t−1(v0) (cid:54)= ∅.
(2.1)
(2.2)
(2.3)
The condition for a trimmable graph guarantees the fact that when we remove the dis-
tinguised vertex v0, the resulting graph does not have new sinks. One can imagine a
(Q(cid:48), v0)-trimmable graph like this:
The following graph is a simple example of a trimmable graph:
.
v2
v1
/ v0
.
(2.4)
O
O
/
t
t
4
P. M. HAJAC, A. KAYGUN, AND M. TOBOLSKI
Note that the direction of the edge joining vertices v1 and v2 is important as the following
graph is no longer trimmable:
v2
v1
/ v0
.
(2.5)
We need the trimmability condition to guarantee the existence of maps given in the
lemma below. This lemma is an algebraic incarnation of a graph-C*-algebraic lemma
proved in [6]. The only difference between their proofs is that instead of using the Gauge
Uniqueness Theorem [9, Theorem 4.8] we use the Graded Uniqueness Theorem [4, Theo-
rem 2.3] (Theorem 1.4).
0, v0)-trimmable graph. Denote by Q(cid:48)(cid:48) the sub-graph of Q
Lemma 2.2. Let Q be a (Q(cid:48)
obtained by removing the edge x0. The following formulas define homomorphisms of al-
gebras:
(1) π1 : Lk(Q) → Lk(Q(cid:48)),
(2) π2 : Lk(Q(cid:48)(cid:48)) → Lk(Q(cid:48)),
π1(α) =
π2(α) =
0 ∪ Q(cid:48)
1 ∪ Q(cid:48)∗
1 ,
if α ∈ Q(cid:48)
otherwise.
0 ∪ Q(cid:48)
1 ∪ Q(cid:48)∗
1 ,
if α ∈ Q(cid:48)
otherwise.
0
α
α
0
(3) f : Lk(Q) → Lk(Q(cid:48)(cid:48)) ⊗ k[u, u−1],
α ⊗ 1
v0 ⊗ u
v0 ⊗ u−1
α ⊗ u
α ⊗ u−1
f (α) =
(4) δ : Lk(Q(cid:48)) → Lk(Q(cid:48)) ⊗ k[u, u−1],
α ⊗ 1
α ⊗ u
α ⊗ u−1
δ(α) =
if α ∈ Q0,
if α = x0,
if α = x∗
0,
if α ∈ Q1 \ {x0},
1 \ {x∗
if α ∈ Q∗
0}.
if α ∈ Q(cid:48)
0,
if α ∈ Q(cid:48)
1,
if α ∈ (Q(cid:48)
1)∗.
These morphisms are Z-graded for the standard grading on Lk(Q), Lk(Q(cid:48)), Lk(Q(cid:48)(cid:48)), and
the gradings on Lk(Q(cid:48))⊗ k[u, u−1] and Lk(Q(cid:48)(cid:48))⊗ k[u, u−1] given by the standard grading of
the rightmost tensorand. Furthermore, π1 and π2 are surjective, and f and δ are injective.
/
t
t
LEAVITT PATH ALGEBRAS OF TRIMMABLE GRAPHS
5
3. A graded pullback structure
To prove the theorem of the paper, we need a general lemma along the lines of [8,
Proposition 3.1]. We omit its routine proof.
Lemma 3.1. Let A1, A2, B and P be abelian groups. A commutative diagram of group
homomorphisms
A1
p1
q1
P
B
p2
q2
A2
is a pullback diagram if and only if the following conditions hold:
ker(p1) ∩ ker(p2) = {0},
q−1
1 (q2(A2)) = p1(P ),
p2(ker(p1)) = ker(q2).
(3.1)
(3.2)
(3.3)
Recall that to prove that an algebra P is a pullback algebra, one can proceed as fol-
lows. The first step is to establish the existence of a commutative diagram of algebra
homomorphisms as above. This implies that p1 and p2 define an algebra homomorphism
p into the pullback algebra of A1 and A2 over B. Then one only needs to prove that the
three conditions of Lemma 3.1 are satisfied to conclude that p is an isomorphism. Note
that (3.1) is equivalent to the injectivity of p, whereas the conjunction of (3.2) and (3.3)
is equivalent to the surjectivity of p.
Much as Lemma 2.2, the theorem of the paper is an algebraic incarnation of a graph-C*-
algebraic theorem proved in [6]. This time, the only difference between their proofs is that
instead of using [4, Lemma 3.1] we use [3, Lemma 2.4.1] (see (1.4), cf. [9, Lemma 5.6]).
Theorem 3.2. Let π1, π2, f and δ be as in Lemma 2.2. Then the commutative diagram
Lk(Q)
π1
f
Lk(Q(cid:48))
Lk(Q(cid:48)(cid:48)) ⊗ k[u, u−1]
δ
Lk(Q(cid:48)) ⊗ k[u, u−1]
π2⊗id
of graded algebra homomorphisms is a pullback diagram.
Representing pictorially the Leavitt path algebras by their respective graphs, the above
diagram becomes:
~
~
~
~
w
w
)
)
'
'
u
u
6
P. M. HAJAC, A. KAYGUN, AND M. TOBOLSKI
π1
δ
⊗
f
π2⊗id
⊗
.
Note that the only non-standard map in this diagram is f . It can be described verbally
by the assignment
vertex (cid:55)−→ vertex ⊗ 1,
v0-emitted edge (cid:55)−→ v0 ⊗ u,
other edge (cid:55)−→ other edge ⊗ u.
Acknowledgement
The authors are very grateful to Francesco D'Andrea for sharing his mathematical insight
with us, and for designing the pictures of graphs. It is also a pleasure to thank Søren
Eilers, Adam Skalski and Wojciech Szyma´nski for discussions. This work was partially
supported by NCN grant UMO-2015/19/B/ST1/03098.
References
[1] G. Abrams, Leavitt path algebras: the first decade, Bull. Math. Sci. 5 (1), 55 -- 120, 2015.
[2] G. Abrams, G. Aranda Pino, The Leavitt path algebra of a graph, J. Algebra 293 (2), 319 -- 334, 2005.
[3] G. Abrams, P. Ara, M. Siles Molina, Leavitt path algebras. Lecture Notes in Mathematics, 2191.
Springer, London, 2017.
[4] A. an Huef, I. Raeburn, The ideal structure of Cuntz-Krieger algebras, Ergodic Theory Dynam. Sys.
17, 611 -- 624, 1997.
[5] I. Assem, D. Simson, A. Skowro´nski, Elements of the representation theory of associative algebras.
Vol. 1. Techniques of representation theory. London Mathematical Society Student Texts, 65. Cam-
bridge University Press, Cambridge, 2006.
{
{
'
'
$
$
w
w
LEAVITT PATH ALGEBRAS OF TRIMMABLE GRAPHS
7
[6] Francesco D'Andrea, Piotr M. Hajac, Mariusz Tobolski, An equivariant pullback structure of
trimmable graph C*-algebras, arXiv:1712.08010.
[7] W. G. Leavitt, The module type of a ring. Trans. Am. Math. Soc. 103, 113 -- 130, 1962.
[8] G. K. Pedersen, Pullback and pushout constructions in C∗-algebra theory, J. Funct. Anal. 167 (2),
243 -- 344, 1999.
[9] M. Tomforde, Uniqueness theorems and ideal structure for Leavitt path algebras, J. Algebra 318,
270 -- 299, 2007.
(P. M. Hajac) Instytut Matematyczny, Polska Akademia Nauk, ul. ´Sniadeckich 8, Warszawa,
00-656 Poland
E-mail address: [email protected]
(A. Kaygun) Istanbul Technical University, Istanbul, Turkey.
E-mail address: [email protected]
(M. Tobolski) Instytut Matematyczny, Polska Akademia Nauk, ul. ´Sniadeckich 8, Warszawa,
00-656 Poland
E-mail address: [email protected]
|
1506.00736 | 2 | 1506 | 2016-09-23T15:26:57 | On The Kantor Product | [
"math.RA"
] | We study the algebra of bilinear multiplications of an $n$-dimensional vector space. In particular, we study the Kantor product of some well-known (associative, Lie, alternative, Novikov and some other) multiplications. | math.RA | math |
On The Kantor Product
Ivan Kaygorodov
Universidade Federal do ABC, CMCC, Santo Andr´e, Brazil.
Abstract. We study the algebra of bilinear multiplications of an n-dimensional vector space. In particu-
lar, we study the Kantor product of some well-known (associative, Lie, alternative, Novikov and some other)
multiplications.
1. Introduction
Kantor introduced the class of conservative algebras in [11]. This class includes some well-known algebras:
associative, Jordan, Lie, Leibniz and Zinbiel [13]. In the theory of conservative algebras of great importance is
the conservative algebra U (n) [12]. In the theory of Lie algebras U (n) plays a role analogous to the role of gln.
The space of the algebra U (n) is the space of all bilinear multiplications on the n-dimensional space Vn. To
define the operation of multiplication [ , ] in the algebra U (n) we fix a vector u ∈ Vn and for two multiplications
A, B ∈ U (n) and two elements x, y ∈ Vn we set
x ∗ y = [A, B](x, y) = A(u, B(x, y)) − B(A(u, x), y) − B(x, A(u, y)).
(1)
Some properties of the algebra U (2) were studied in [13, 14]. We say that the product of two multiplications
on n-dimensional vector space defined by (1), is the left Kantor product of these multiplications. In a similar
way we can define the right Kantor product and obtain similar results. We assume that the Kantor product is
the left Kantor product. The Kantor product of a multiplication · by itself is the Kantor square of · and it is
denoted by [·,·]. It gives us a map K from any variety V of algebras to some class K(V ).
The Kantor square of a multiplication · can be rewritten (see [11]) as the product of the left multiplication
Lu and the multiplication ·, as [Lu,·], where
[Lu,·](x, y) = u · (x · y) − (u · x) · y − x · (u · y) = [·,·](x, y).
The multiplication [Lu,·] plays an important role in the definition of a (left) conservative algebras [2, 11]. We
recall that an algebra A with a multiplication · is called a (left) conservative algebra if and only if there exist a
new multiplication ∗ such that
[La, [Lb,·]] = −[La∗b,·].
The main aim of this paper is to study the properties of the Kantor product of multiplications. One of the
central questions studied in this paper is the following:
Question. What identities does the class of algebras K(V ) satisfy if we know the identities of V ?
We give some particularly answer of this question for associative, (anti)commutative, Perm, Lie, Leibniz,
Zinbiel, left-commutative, bicommutative, Novikov, alternative, quasi-associative and quasi-alternative algebras;
we also describe the Kantor product of multiplications in associative dialgebras, duplicial, dual duplicial, As(2),
Poisson, generalized Poisson and Novikov-Poisson algebras. Finally, we study the Kantor square in some special
cases; in particular, the associative algebras with identities, nilpotent and right-nilpotent algebras, associative
algebras isomorphic to its Kantor square; and discuss the coincidence of derivations and automorphisms of the
algebra and its Kantor square. Here we can to formulate
Open problem. Is K(V ) a variety of algebras for some variety V ?
2. The Kantor square
In this section we leave technical and trivial proofs of lemmas. We are using the standard notation:
(a, b, c)∗ = (a ∗ b) ∗ c − a ∗ (b ∗ c), (a, b, c) = (ab)c − a(bc);
[a, b]∗ = a ∗ b − b ∗ a, [a, b] = ab − ba;
1
2
2.1. Associative algebras. The variety of associative algebras is defined by the identity
(cid:8)a,b,c [f (a, b, c)] = f (a, b, c) + f (b, c, a) + f (c, a, b).
(xy)z = x(yz).
Lemma 1. Let (A;·) be an associative algebra. Then (A; [·,·]) is an associative algebra.
2.2. (Anti)commutative algebras. The variety of (anti)commutative algebras is defined by the identity
where ǫ = 1 in the commutative case and ǫ = −1 in the anticommutative case.
Lemma 2. Let (A;·) be an (anti)commutative algebra. Then (A; [·,·]) is an (anti)commutative algebra.
xy = ǫyx,
2.3. Perm algebras. The variety of Perm algebras (see, for example, [3]) is defined by the identity
Lemma 3. Let (A;·) be a Perm algebra. Then (A; [·,·]) is a Perm algebra.
(xy)z = x(yz) = x(zy).
2.4. Lie algebras. The variety of Lie algebras is defined by the identities
xy = −yx, (xy)z + (yz)x + (zx)y = 0.
Lemma 4. Let (A;·) be a Lie algebra. Then [·,·] = 0.
2.5. Leibniz algebras. The variety of (left) Leibniz algebras (see, for example, [6]) is defined by the identity
Lemma 5. Let (A;·) be a (left) Leibniz algebra. Then [·,·] = 0.
x(yz) = (xy)z + y(xz).
2.6. Left-commutative algebras. The variety of left-commutative algebras (see, for example, [16]) includes
commutative-associative, bicommutative, Novikov, Zinbiel algebras and some other. This variety is defined by
the identity
x(yz) = y(xz).
Lemma 6. Let (A;·) be a left-commutative algebra. Then (A; [·,·]) is a left-commutative algebra.
2.7. Bicommutative algebras. The variety of bicommutative algebras (see, for example, [8]) is defined by the
identities
x(yz) = y(xz), (xy)z = (xz)y.
Lemma 7. Let (A;·) be a bicommutative algebra. Then (A; [·,·]) is an associative-commutative algebra.
2.8. Zinbiel algebras. The variety of (left) Zinbiel algebras (see, for example, [7]) is defined by the identity
Lemma 8. Let (A;·) be a (left) Zinbiel algebra. Then (A; [·,·]) is a (left) Zinbiel algebra.
x(yz) = (xy)z + (yx)z.
3
2.9. Novikov algebras. The variety of (left) Novikov algebras (see, for example, [9]) is defined by the identities
Lemma 9. Let (A;·) be a (left) Novikov algebra. Then (A; [·,·]) is a (left) Novikov algebra.
x(yz) = y(xz), (x, y, z) = (x, z, y).
2.10. Alternative algebras. The variety of alternative algebras (see, for example, [15]) is defined by the
identities
x2y = x(xy), xy2 = (xy)y.
(2)
It is also well known (see, for example, [22]) that an alternative algebra is flexible:
and satisfies the Moufang identities:
(xy)x = x(yx);
and the following identities hold:
x(yzy) = ((xy)z)y, (yzy)x = y(z(yx)), (xy)(zx) = x(yz);
(x, y, z) = −(y, x, z), (x, y, z) = −(x, z, y),
(x, xy, z) = (x, y, z)x, (x, yx, z) = x(x, y, z).
The main example of a non-associative alternative algebra is a Cayley -- Dickson algebra C [22]. Let F be
a field of characteristic 6= 2. It is an algebra C with the basis e0 = 1, e1, . . . , e7 and the following multiplication
table:
(3)
(4)
e3
e2
e1
1
αe2
e3
α · 1
e1
−βe1
β · 1
−e3
e2
βe1 −αβ · 1
e3 −αe2
−e6
−e7
−e5
e4
e5 −αe4 −e7
−αe6
βe5
e6
e7
−βe4
e7
αe6 −βe5
αβe4
e6
−e7
βe4
−βe5
−γe2
γe3
e4
e5
e5
αe4
e6
e7
e7
αe6
γ · 1 −γe1
γe1 −αγ · 1
γe2
γe3 −αγe2
e7
−αe6
βe5
−αβe4
−γe3
−αγe2
−γe3 −βγ · 1 −βγ · e1
αβγ · 1
βγe1
Theorem 10. Let (A;·) be an alternative algebra. Then (A; [·,·]) is a flexible algebra. Furthermore,
1) (A; [·,·]) is an alternative algebra if and only if A satisfies the identity
(x, u, (x, u, y)) = 0;
2) (A; [·,·]) is a noncommutative Jordan algebra if and only if A satisfies the identity
[LuLxLuLx, RuRx] = [Lxuxu, Rux];
3) (A; [·,·]) is a Jordan algebra if (A,·) is a commutative alternative algebra;
4) (C; [·,·]) is alternative for a Cayley -- Dickson algebra C, if and only if u = u0 · 1.
Proof. It is easy to see that
Now, we can see
a ∗ b = u(ab) − (ua)b − a(ub) = (au)b − 2a(ub).
(x ∗ y) ∗ x − x ∗ (y ∗ x) = ((xu)y − 2x(uy)) ∗ x − x ∗ ((yu)x − 2y(ux)) =
(((xu)y)u)x − 2((x(uy))u)x − 2((xu)y)(ux) + 4(x(uy))(ux)−
(xu)((yu)x) + 2(xu)(y(ux)) + 2x(u((yu)x)) − 4x(u(y(ux))) =
x(uyu)x − 2((x, u, y)u)x − 2x(uyu)x − 2x(uyu)x + 2((xu)y, u, x) + 4x(uyu)x−
x(uyu)x − 2(xy)(y, u, x) + 2x(uyu)x + 2x(uyu)x + 2x(u(y, u, x)) − 4x(uyu)x =
2[((xu)y, u, x) − (x, u, x(uy)) − ((xy)(y, u, x) − x(u(y, u, x)))] =
2[((x, u, y), u, x) − ((x, u, y), u, x)] = 0.
4
It follows that (A,∗) is a flexible algebra.
1) It is easy to see that a flexible algebra is alternative if and only if it satisfies the first identity from (2).
We have
(x ∗ x) ∗ y − x ∗ (x ∗ y) =
−(xuxu)y + 2(xux)(uy) − (xu)((xu)y) + 2x(u((xu)y)) + 2(xu)(x(uy)) − 4x(u(x(uy))) =
−2(xu)2y − 2x(u(x(uy))) + 2x(u((xu)y)) + 2(xu)(x(uy)) = (x, u, (x, u, y)).
Now, the multiplication [·,·] is alternative if and only if (x, u, (x, u, y)) = 0.
Jordan identity: (x2, y, x) = 0.
2) Note that an algebra B is a non-commutative Jordan algebra if and only if it is flexible and it satisfies the
Obviously,
((x ∗ x) ∗ y) ∗ x − (x ∗ x) ∗ (y ∗ x) =
(−(xuxu)y + 2(xux)(uy)) ∗ x + (xux) ∗ ((yu)x − 2y(ux)) =
−(((xuxu)y)u)x + 2((xuxu)y)(ux) + 2(((xux)(uy))u)x − 4((xux)(uy))(ux)+
(xuxu)((yu)x) − 2(xux)(u((yu)x)) − 2(xuxu)(y(ux)) + 4(xux)(u(y(ux))) =
2(((xuxu)y)(ux) − (xuxu)(y(ux)) + ((x(u(x(uy))))u)x − x(u(x(u((yu)x)))).
Now, [·,·] is a noncommutative Jordan multiplication if and only if
[LxLuLxLu, RuRx] = [Lxuxu, Rux].
3) It is easy to see that if A is a commutative alternative algebra then we have
((xuxu)y)(ux) − (xuxu)(y(ux)) + (((xux)(uy))u)x − (xux)(u((yu)x)) =
(xu)((xu)((xu)y))) − (xu)((xu)((xu)y))) + x(u(x(u(x(uy))))) − x(u(x(u(x(uy))))) = 0.
4) If (C,∗) is an alternative algebra for every u then A satisfies (4). Note that for the elements ei1 , ei2, ei3 ,
It follows that [·,·] is non-commutative Jordan and from Theorem 2 we infer that [·,·] is Jordan.
where eik eil 6= ǫeim (where ǫ is some element from the ground field), we have
(ei1 , ei2, (ei1 , ei2 , ei3)) = 2(ei1 )2(ei2 )2ei3 .
Such triple (i1, i2, i3) we call a g-triple. It is easy to see that if (i, j, k) is not a g-triple then the subalgebra
generated by ei, ej, ek is a two-generated subalgebra, and by the Artin theorem this subalgebra is associative,
i. e., (ei, ej, (ei, ej, ek)) = 0. Now, for the element u = u0 · 1 + u1e1 + . . . + u7e7 we have (ei, u, (ei, u, ej)) = 0 if
and only if
(ukek)2 = 0. It is equivalent to the following system
P
k, (i,j,k) is a g-triple
αu2
1
1 +βu2
αu2
2
1 +βu2
αu2
2
αu2
1
+βu2
+βu2
−αβu2
3 +γu2
4
+γu2
4
−αβu2
2 −αβu2
2 −αβu2
3
3 +γu2
3
+γu2
−αβu2
−αβu2
4 −αβu2
4 −αβu2
5
5
−βγu2
5 −βγu2
6
6
+αβγu2
+αβγu2
= 0,
= 0,
7 = 0,
7 = 0,
= 0,
7 = 0,
7 = 0.
−βγu2
5 −βγu2
6 +αβγu2
6 +αβγu2
Calculating, we obtain u1 = √βγu7, u6 = √−αu7, u2 = u3 = u4 = u5 = 0.
we can find that u7 = 0 and u = u0 · 1.
The theorem is proved.
Now, from the relation (4) by simple calculations (for example, for x = e1 +e2, y = e1 and x = e2 +e6, y = e6)
2.11. Quasi-associative algebras. Quasi-associative algebras (see, for example, [4]) is defined by the identities
5
(x, y, z) + (y, z, x) + (z, x, y) = 0,
(x, y, z) = α[y, [x, z]],
where α is a fixed element in the ground field F. It is known [4] that an algebra (A,·) is quasi-associative if and
only if there exist an associative algebra A with the new multiplication, such that for some λ ∈ F :
Lemma 11. Let (A;·) be a quasi-associative algebra. Then (A; [·,·]) is a quasi-associative algebra.
x · y = λxy + (1 − λ)yx.
2.12. Quasi-alternative algebras. Quasi-alternative algebras (see, for example, [4]) is defined by the identities
(x, y, x) = 0,
(x, x, y) = α[x, [x, y]],
where α is a fixed element from the ground field F. It is known [4] that an algebra (A,·) is a quasi-alternative
algebra if and only there exist an alternative algebra A with new multiplication, such that for some λ ∈ F :
Lemma 12. Let (A;·) be a quasi-alternative algebra. Then (A; [·,·]) is a flexible algebra.
x · y = λxy + (1 − λ)yx.
2.13. Associative dialgebras. The variety of associative dialgebras (see, for example, [20]) is defined by the
identities
(x ⊢ y) ⊢ z = (x ⊣ y) ⊢ z, x ⊣ (y ⊢ z) = x ⊣ (y ⊣ z),
(x ⊢ y) ⊢ z = x ⊢ (y ⊢ z), (x ⊣ y) ⊣ z = x ⊣ (y ⊣ z), (x ⊢ y) ⊣ z = x ⊢ (y ⊣ z).
Lemma 13. Let (A;⊢,⊣) be an associative dialgebra. Then (A; [⊢,⊣]) is an associative algebra.
2.14. Duplicial algebras. The variety of duplicial algebras (see, for example, [18]) is defined by the identities
(x ≺ y) ≺ z = x ≺ (y ≺ z),
(x ≻ y) ≺ z = x ≻ (y ≺ z),
(x ≻ y) ≻ z = x ≻ (y ≻ z).
Lemma 14. Let (A;≺,≻) be a duplicial algebra. Then (A; [≻,≺]) is an associative algebra.
2.15. Dual duplicial algebras. The variety of dual duplicial algebras (see, for example, [23]) is defined by the
identities
(x ≺ y) ≺ z = x ≺ (y ≺ z), (x ≻ y) ≺ z = x ≻ (y ≺ z), (x ≻ y) ≻ z = x ≻ (y ≻ z),
x ≺ (y ≻ z) = (x ≺ y) ≻ z = 0.
Lemma 15. Let (A;≺,≻) be a dual duplicial algebra. Then [≻,≺] = 0 and (A; [≺,≻]) is a 2-nilpotent algebra.
2.16. As(2)-algebras. The variety of As(2)-algebras (see, for example, [23]) is defined by the identities
(x ◦ y) · z = x ◦ (y · z), (x · y) ◦ z = x · (y ◦ z),
(x ◦ y) ◦ z = x ◦ (y ◦ z), (x · y) · z = x · (y · z).
Lemma 16. Let (A;·,◦) be a As(2)-algebra. Then (A; [·,◦]) and (A; [◦,·]) are associative algebras.
2.17. Commutative tridendriform algebra. The variety of commutative tridendriform algebras (see, for
example, [17]) is defined by the identities
6
x · y = y · x, (x · y) · z = x · (y · z),
(x ≺ y) ≺ z = x ≺ (y ≺ z) + x ≺ (z ≺ y),
(x · y) ≺ z = x · (y ≺ z).
Lemma 17. Let (A;·,≺) be a commutative tridendriform algebra. Then (A; [≺,·]) is a commutative algebra
and (A; [·,≺]) is a right Zinbiel algebra.
2.18. Poisson algebras. The variety of Poisson algebras (see, for example, [19]) is defined by the identities
xy = yx, (xy)z = x(yz),{xy, z} = {x, z}y + x{y, z},
{x, y} = −{y, x},{{x, y}, z} + {{y, z}, x} + {{z, x}, y} = 0.
Theorem 18. Let (A;·,{,}) be a Poisson algebra. Then [{,},·] = 0 and (A; [·,{,}]) is a Lie algebra.
Proof. In the first case, we have
In the second case,
a ∗ b = {u, ab} − {u, a}b − a{u, b} = 0.
and
a ∗ b = u{a, b} − {ua, b} − {a, ub} = −a{u, b} − b{a, u} − u{a, b} = −b ∗ a.
(a ∗ b) ∗ c + (b ∗ c) ∗ a + (c ∗ a) ∗ b =
−(a{u, b} + {a, u}b + {a, b}u) ∗ c
−(b{u, c} + {b, u}c + {b, c}u) ∗ a
−(c{u, a} + {c, u}a + {c, a}u) ∗ b =
a{u, b}{u, c} + {a{u, b}, u}c + {a{u, b}, c}u+
{a, u}b{u, c} + {{a, u}b, u}c + {{a, u}b, c}u+
{a, b}u{u, c} + {{a, b}u, u}c + {{a, b}u, c}u+
b{u, c}{u, a} + {b{u, c}, u}a + {b{u, c}, a}u+
{b, u}c{u, a} + {{b, u}c, u}a + {{b, u}c, a}u+
{b, c}u{u, a} + {{b, c}u, u}a + {{b, c}u, a}u+
c{u, a}{u, b} + {c{u, a}, u}b + {c{u, a}, b}u+
{c, u}a{u, b} + {{c, u}a, u}b + {{c, u}a, b}u+
{c, a}u{u, b} + {{c, a}u, u}b + {{c, a}u, b}u =
a{u, b}{u, c} + {u, b}{a, u}c + ca{{u, b}, u} + au{{u, b}, c} + {u, b}{a, c}u+
{a, u}b{u, c} + {{a, u}, u}bc + {a, u}{b, u}c + bu{{a, u}, c} + {a, u}{b, c}u+
{a, b}u{u, c} + {{a, b}, u}uc + {a, b}{u, c}u + uu{{a, b}, c}+
b{u, c}{u, a} + {b, u}{u, c}a + ba{{u, c}, u} + {{u, c}, a}bu + {u, c}{b, a}u+
{b, u}c{u, a} + {b, u}{c, u}a + ca{{b, u}, u} + {b, u}{c, a}u + {{b, u}, a}cu+
{b, c}u{a, u} + {{b, c}, u}ua + {b, c}{u, a}u + uu{{b, c}, a}+
c{u, a}{u, b} + {c, u}{u, a}b + cb{{u, a}, u} + {c, b}{u, a}u + cu{{u, a}, b}+
{c, u}a{u, b} + {{c, u}, u}ab + {c, u}{a, u}b + {c, u}{a, b}u + {{c, u}, b}au+
{c, a}u{u, b} + {{c, a}, u}ub + {c, a}{u, b}u + uu{{c, a}, b} =
(a{u, b}{u, c} + {c, u}a{u, b}) + ({u, b}{a, u}c + {a, u}{b, u}c)+
(ca{{u, b}, u} + ca{{b, u}, u}) + ({u, b}{a, c}u + {c, a}{u, b}u)+
7
({a, u}b{u, c} + b{u, c}{u, a}) + ({{a, u}, u}bc + cb{{u, a}, u})+
({a, u}{b, c}u + {b, c}u{a, u}) + ({a, b}u{u, c} + {c, u}{a, b}u)+
({a, b}{u, c}u + {b, u}{u, c}a) + (ba{{u, c}, u} + {{c, u}, u}ab)+
({b, u}c{u, a} + {c, u}{u, a}b) + ({b, u}{c, a}u + {c, a}u{u, b})+
({b, c}{u, a}u + {c, b}{u, a}u) + ({c, u}{u, a}b + {c, u}{a, u}b)+
[au{{u, b}, c} + au{{b, c}, u} + au{{c, u}, b}]+
[bu{{a, u}, c} + bu{{u, c}, a} + bu{{c, a}, u}]+
[cu{{a, b}, u} + cu{{u, a}, b} + cu{{b, u}, a}]+
[uu{{a, b}, c} + uu{{b, c}, a} + uu{{c, a}, b}] = 0.
The theorem is proved.
2.19. Generalized Poisson algebras. The variety of unital generalized Poisson algebras (see, for example,
[1]) is defined by the identities
xy = yx, (xy)z = x(yz),{xy, z} = {x, z}y + x{y, z} + D(z)xy, D(x) = {1, x},
{x, y} = −{y, x},{{x, y}, z} + {{y, z}, x} + {{z, x}, y} = 0.
Theorem 19. Let (A;·,{,}) be a generalized Poisson algebra. Then (A; [{,},·]) is an associative-commutative
algebra, and (A; [·,{,}]) is a Lie algebra.
Proof. In the first case, we have
and
In the second case,
a ∗ b = {u, ab} − {u, a}b − a{u, b} = −D(u)ab = b ∗ a
(a ∗ b) ∗ c = D(u)2abc = a ∗ (b ∗ c).
a ∗ b = u{a, b} − {ua, b} − {a, ub} =
Here we use the proof of Theorem 18. It is easy to see that
−a{u, b} − b{a, u} − u{a, b} − D(b)ua + D(a)ub = −b ∗ a.
(cid:8)a,b,c [
(cid:8)a,b,c [
(a ∗ b) ∗ c] =(cid:8)a,b,c [({b, u}a + {b, a}u + {u, a}b − D(b)ua + D(a)ub) ∗ c] =
{c, u}{b, u}a + {c, b}{b, u}a + {c,{b, u}}au − {b, u}D(c)au + {u, a}{b, u}c +
{u,{b, u}}ac − {b, u}D(u)ac − {b, u}D(c)au + {b, u}D(a)cu + D({b, u})acu +
{c, u}{b, a}u + {c, u}{b, a}u + {c,{b, a}}u2 − {b, a}D(c)u2 + {u,{b, a}}cu −
{b, a}D(u)cu − {b, a}D(c)u2 + {b, a}D(u)cu + D({b, a})cu2 + {c, u}{u, a}b +
{c, b}{u, a}u + {c,{u, a}}bu − {u, a}D(c)bu + {u,{u, a}}bc + {u, b}{u, a}c −
{u, a}D(u)bc − {u, a}D(c)bu + {u, a}D(b)cu + D({u, a})bcu − {c, u}D(b)au −
{c, D(b)}au2 − {c, u}D(b)ua − {c, a}D(b)u2 + 2D(b)D(c)au2 − {u, a}D(b)cu −
{u, D(b)}acu + 2D(b)D(u)acu + D(b)D(c)au2 − D(D(b))acu2 − D(b)D(u)acu −
D(a)D(b)acu2 + {c, u}D(a)bu + {c, D(a)}bu2 + {c, u}D(a)bu + {c, b}D(a)u2 −
2D(a)D(c)bu2 + {u, D(a)}bcu + {u, b}D(a)cu − 2D(a)D(u)bcu − D(a)D(c)bu2 +
D(D(a))bcu2 + D(a)D(u)bcu + D(a)D(b)cu2].
By the proof of Theorem 18, we can conclude that the sum of all elements without D is zero. Now, we have
8
(cid:8)a,b,c [
(cid:8)a,b,c [
(a ∗ b) ∗ c] =
−{b, u}D(c)au − {b, u}D(u)ac − {b, u}D(c)au + {b, u}D(a)cu + D({b, u})acu −
{b, a}D(c)u2 − {b, a}D(u)cu − {b, a}D(c)u2 + {b, a}D(u)cu + D({b, a})cu2 −
{u, a}D(c)bu − {u, a}D(u)bc − {u, a}D(c)bu + {u, a}D(b)cu + D({u, a})bcu −
{c, u}D(b)au − {c, D(b)}au2 − {c, u}D(b)ua − {c, a}D(b)u2 + 2D(b)D(c)au2 −
{u, D(b)}acu + 2D(b)D(u)acu + D(b)D(c)au2 − D(D(b))acu2 − D(b)D(u)acu −
{u, a}D(b)cu − D(a)D(b)acu2 + {c, u}D(a)bu + {c, D(a)}bu2 + {c, u}D(a)bu +
{c, b}D(a)u2 − 2D(a)D(c)bu2 + {u, D(a)}bcu + {u, b}D(a)cu − 2D(a)D(u)bcu −
D(a)D(c)bu2 + D(D(a))bcu2 + D(a)D(u)bcu + D(a)D(b)cu2].
It is easy to see that
(cid:8)a,b,c
(cid:8)a,b,c
(cid:8)a,b,c
(cid:8)a,b,c
(cid:8)a,b,c
(cid:8)a,b,c
[D(D(a))bcu2 − D(D(b))acu2] = 0,
[D({b, u})acu + D({u, a})bcu] = 0,
[{u, D(a)}bcu − {u, D(b)}acu] = 0,
[D({b, a})cu2 − {c, D(b)au2 + {c, D(a)}bu2] = 0,
[−2{b, a}D(c)u2 − {c, a}D(b)u2 + {c, b}D(a)u2] = 0,
[{b, u}D(c)au + {u, a}D(c)bu + {c, u}D(b)au + {u, c}D(a)bu] = 0.
Obviously, (cid:8)a,b,c [(a ∗ b) ∗ c] = 0 and [·,{,}] is a Lie algebra. The theorem is proved.
2.20. Novikov-Poisson algebras. The variety of left Novikov-Poisson algebras is defined by the identities
xy = yx, (xy)z = x(yz),
x ◦ (y ◦ z) = y ◦ (x ◦ z), (x, y, z)◦ = (x, z, y)◦,
x ◦ (yz) = (x ◦ y)z, (xy) ◦ z − x(y ◦ z) = (xz) ◦ y − x(z ◦ y).
Theorem 20. Let (A;·,◦) be a left Novikov-Poisson algebra. Then (A; [·,◦]) is a left Novikov algebra and
(A; [◦,·]) is an associative-commutative algebra.
Proof. Firstly, we have
Hence,
and
Secondly,
Therefore,
a ∗ b = u(a ◦ b) − (ua) ◦ b − a ◦ (ub) = −(ua) ◦ b.
a ∗ (b ∗ c) = (ua) ◦ ((ub) ◦ c) = (ub) ◦ ((ua) ◦ c) = b ∗ (a ∗ c),
(a, b, c)∗ = (a ∗ b) ∗ c − a ∗ (b ∗ c) = (u((ua) ◦ b)) ◦ c − (ua) ◦ ((ub) ◦ c) =
((ua) ◦ (ub)) ◦ c − (ua) ◦ ((ub) ◦ c) = (ua, ub, c)◦ = (ua, c, ub)◦ =
= ((ua) ◦ c) ◦ (ub) − (ua) ◦ (c ◦ (ub)) =
u(ua, c, b)◦ = u(ua, b, c)◦ = (a ∗ c) ∗ b − a ∗ (c ∗ b) = (a, c, b)∗.
a ∗ b = u ◦ (ab) − (u ◦ a)b − a(u ◦ b) = −u ◦ (ab) = b ∗ a.
The theorem is proved.
(a ∗ b) ∗ c = u ◦ ((u ◦ (ab))c) = u ◦ (u ◦ (abc)) = u ◦ (a(u ◦ (bc))) = a ∗ (b ∗ c).
Similarly, the variety of right Novikov-Poisson algebras may be defined (see, for example, [21]). It is easy to
prove the following theorem:
9
Theorem 21. Let (A;·,◦) be a right Novikov-Poisson algebra. Then (A; [·,◦]) is a right Novikov algebra and
(A; [◦,·]) is a commutative algebra.
3. The Kantor square of algebras of special type.
Here we study some special cases of the Kantor square. For an algebra A := (A;·) its the Kantor square
(A; [·,·]) we denote by (A,∗). We denote the Kantor square for a fixed element u by (A,∗u). We consider the
relations between the ideals in A and (A,∗), the relations between an associative algebra A with polynomial
identity and its the Kantor square. Moreover, the relations between the nilpotency and right nilpotency in A
and (A,∗) are investigated.
3.1. Ideals in the Kantor product.
Theorem 22. Let I be an ideal of A. Then (I,∗) is an ideal of (A,∗), but the converse statement is not true
in general.
Proof. It is easy to see that if i ∈ I and a ∈ A then
i ∗ a = u(ia) − (ui)a − i(ua) ∈ I and a ∗ i = u(ai) − (ua)i − a(ui) ∈ I.
It follows that I is an ideal of (A,∗).
Conversely, we can consider the trivial case, where for an algebra A has zero Kantor square (for example,
Lie or Leibniz algebra) and every subspace of A is an ideal of (A,∗). For the non-trivial case (nonzero Kantor
product), we can consider the following associative algebra: A1 ⊕ A2 is the direct sum of the matrix algebras
of order 2. Here, if ei is the unit of Ai then the subspace generated by A1 and e2 is an ideal of (A,∗e1 ), but is
not an ideal of A1 ⊕ A2. The theorem is proved.
3.2. Associative algebras with polynomial identity. Given a polynomial f in n variables, we define
f∗(x1, . . . , xn) as the value of f in (A,∗), where x1, . . . , xn are some elements in A.
Theorem 23. Let (A;·) be an associative algebra that satisfies the polynomial identity f (x1, . . . , xn). Then
there exists an identity g such that A and (A,∗) satisfy g.
Proof.
It is easy to see that if A satisfies the identity f (x1, . . . , xn) then A satisfies the identity
g(x1, . . . , xn, z) = f (x1, . . . , xn)z. By Theorem 1, the multiplication in algebra (A,∗) is defined by x∗ y = −xuy.
Now, we can calculate the element g∗(x1, . . . , xn, z) in (A,∗). Obviously, it is (−1)nf (x1u, . . . , xnu)z which
amounts to zero in A. It follows that (A,∗) satisfies the identity g. The theorem is proved.
One of the most popular identity in the associative algebras is the standard polynomial identity of degree n:
sn(x1, . . . , xn) = X
σ∈Sn
(−1)σxσ(1) . . . xσ(n).
Theorem 24. Let (A;·) be an associative algebra that satisfies sn. Then (A,∗) satisfies sn+1.
Proof. It is easy to see that the standard polynomial of degree n + 1 may be written as
sn+1(x1, . . . , xn+1) =
X
( X
n
i=1
σ ∈ Sn+1,
σ(n + 1) = i
(−1)σxσ(1) . . . xσ(n)xσ(n+1)=i) =
=
n
X
i=1
(ǫisn(x1, . . . , xi, . . . , xn+1)xi), ǫi = ±1.
Now, by the proof of Theorem 23, (A,∗) satisfies the standard polynomial identity of degree n + 1. The theorem
is proved.
10
3.3. Nilpotent algebras. For the nilpotent algebras, we can prove the following theorem.
Lemma 25. Let (A;·) be a nilpotent algebra of nilpotency index n. Then (A,∗) is a nilpotent algebra of
nilpotency index ≤ [n/2] + 1.
Proof. Obviously, every product of the form x1 ∗ x2 ∗ . . . ∗ xt (with some order of brackets) is a sum of
multiplications of the form y1y2 ··· y2t−1 (with some order of brackets). Now, it is easy to see that (A,∗) is
nilpotent and its index of nilpotency ≤ [n/2] + 1. The Lemma is proved.
3.4. Right-nilpotent algebras. An algebra A is called right-nilpotent (or left-nilpotent) of nilpotency index
n if it satisfies the identity
Curiously, an analogue of the Theorem 25 is not true for the right-nilpotent algebras.
(. . . (x1x2) . . .)xn = 0
( or x1(. . . (xn−1xn) . . .) = 0).
Theorem 26. There exists a right nilpotent algebra (A;·) such that (A,∗u) is not right nilpotent, but (A,∗u)
is solvable.
Proof. An algebra A is right alternative if the following identity holds in A:
(x, y, y) = 0.
It is interesting fact that in contrast to the algebras of many well-studied classes (Jordan, alternative, Lie and
so on) a right nilpotent right alternative algebra need not be non-nilpotent. The corresponding example of a
five-dimensional right nilpotent but not nilpotent algebra belongs to Dorofeev [5]. Its basis is {a, b, c, d, e}, and
the multiplication is given by (zero products of basis vectors are omitted)
It is easy to see that
ab = −ba = ae = −ea = db = −bd = −c, ac = d, bc = e.
Obviously, c = (. . . (c ∗a b) ∗a . . .) ∗a b 6= 0, and (A,∗a) is not right-nilpotent. It is easy to see that A2 ⊆ hc, d, ei
and A ∗a A ⊆ hc, d, ei, but (A ∗a A) ∗a (A ∗a A) = 0, and (A,∗a) is solvable.
The theorem is proved.
c ∗a b = a(cb) − (ac)b − c(ab) = c.
3.5. Derivations. Remember that a linear mapping D of an algebra A is called a derivation if it satisfies the
relation D(xy) = D(x)y + xD(y). By [12], an element a of an algebra A is called a Jacobi element if if satisfies
the relation a(xy) = (ax)y + x(ay). All Jacobi elements of A form a vector space, which is called the Jacobi
space of A.
Lemma 27. Let D be a derivation of both A and (A,∗). Then
1) If A has zero Jacobi space, then D = 0;
2) If D is invertible, then A is a left Leibniz algebra and (A,∗) is a zero algebra. In particularly, if A is a
finite-dimensional algebra over a field of zero characteristic, then A is nilpotent.
Proof. 1). By simple calculations, from D(x ∗ y) = D(x) ∗ y + x ∗ D(y), we have
D(u)(xy) = (D(u)x)y + x(D(u)y).
By the definition of the Jacobi space, we have D = 0.
2). By invertibility of mapping D and arbitrarity of element u, we infer that A is a left Leibniz algebra. By
the Lemma 5, we imply that (A,∗) is zero algebra.
ting an invertible derivation is nilpotent. The Lemma is proved.
In [10] it was proved that a finite-dimensional Leibniz algebra over a field of characteristic zero which admit-
11
3.6. Automorphisms. Remember that an invertible linear mapping φ of an algebra is called an automorphism
if it satisfies the relation φ(xy) = φ(x)φ(y).
Lemma 28. Let φ be an automorphism of both A and (A,∗). If A is an algebra with zero Jacobi space, then φ
is the identity mapping.
Proof. By simple calculations from φ(x ∗ y) = φ(x) ∗ φ(y), we have
(u − φ(u))(xy) = ((u − φ(u))x)y + x((u − φ(u))y).
By the definition of the Jacobi space, we have that φ = id. The Lemma is proved.
3.7. Isomorphic Kantor squares. Here we talk about the situation where algebra A and its Kantor square
are isomorphic.
Theorem 29. Let A be a finite-dimensional associative algebra. Then A is isomorphic to (A,∗), if and only if
A is a skew field.
Proof. Let fu is an isomorphism between algebras A and (A,∗u) and fu(xy) = fu(x)∗fu(y) = −fu(x)ufu(y).
If in A there are two elements u and v with zero product, for x = f −1
u (v) we have
fu(fx(ab)) = −fu(fx(a)xfx(b)) = fu(fx(a))uvufu(fx(b)) = 0.
Now, if there is a zero divisor, then the algebra A has zero multiplication. It is Well known that every finite-
dimensional algebra without zero divisors is a skew field.
On the other side, for some fixed nonzero element u from a skew field A we define fu(a) = −au−1. It is an
isomorphism between algebras A and (A,∗u) for every nonzero element u. The theorem is proved.
Acknowledgments.
Ivan Shestakov for the idea of this work, Prof. Dr.
Alexandre Pojidaev and Yury Popov for some correction of the language, Dr. Yury Volkov for the idea of the
proof of the Theorem 29.
I am grateful to Prof. Dr.
References
[1] Cantarini N., Kac V., Classification of linearly compact simple Jordan and generalized Poisson superalgebras, J. Algebra, 313
(2007), 100 -- 124.
[2] Cantarini N., Kac V., Classification of linearly compact simple rigid superalgebras, Int. Mat. Res. Not., 17 (2010), 3341 -- 3393.
[3] Chapoton F., Un endofoncteur de la categorie des operades, Dialgebras and related operads, 105 -- 110, Lect. Notes in Math.,
1763, Springer, 2001.
[4] Dedkov A., Some properties of quasi-associative and quasi-alternative algebras, Siberian Math. J., 30 (1989), 3, 479 -- 483.
[5] Dorofeev G. V., On nilpotency of right alternative rings, Algebra and Logic, 9 (1970), 3, 302 -- 305.
[6] Dzhumadil'daev A., Abdykassymova S., Leibniz algebras in characteristic p, C. R. Acad. Sci. Paris Ser. I Math., 332 (2001),
12, 1047 -- 1052.
[7] Dzhumadil'daev A., Zinbiel algebras over a q-commutator, J. Math. Sci. (N. Y.), 144 (2007), 2, 3909 -- 3925.
[8] Dzhumadil'daev A., Ismailov N., A., Tulenbaev K., Free bicommutative algebras, Serdica Math. J., 37 (2011), 1, 25 -- 44.
[9] Dzhumadil'daev A., Ismailov N., Sn- and GLn-module structures on free Novikov algebras, Journal of Algebra, 416 (2014),
287 -- 313.
[10] Fialowski A., Khudoyberdiyev A., Omirov B., A characterization of nilpotent Leibniz algebras, Algebras and Repr. Theory, 16
(2013), 5, 1489 -- 1505.
[11] Kantor I., Certain generalizations of Jordan algebras, Trudy Sem. Vektor. Tenzor. Anal., 16 (1972), 407 -- 499. [in Russian]
[12] Kantor I., The universal conservative algebra, Siberian Math. J., 31 (1990), 3, 388 -- 395.
[13] Kaygorodov I., Lopatin A., Popov Yu., Conservative algebras of 2-dimensional algebras, Linear Algebra and its Applications,
486 (2015), 255 -- 274.
[14] Kaygorodov I., Volkov Yu., Conservative algebras of 2-dimensional algebras, II, Comm. Alg. (2017).
[15] Kaygorodov I., Popov Yu., Alternative algebras admitting derivations with invertible values and invertible derivations,
Izvestiya: Mathematics, 78 (2014), 5, 922 -- 936.
[16] Kuzmin E., Shestakov I., Nonassociative structures, Itogi Nauki i Tekhniki: Sovremennye Problemy Mat.: Fundamental'nye
Napravleniya, vol. 57, VINITI, Moscow 1990, pp. 179 -- 266; English transl., A.I. Kostrikin and I. R. Shafarevich (eds.), Encyclopae-
dia Math. Sci., vol. 57, Algebra VI, Springer-Verlag, London -- New York 1995, pp. 199 -- 280.
[17] Loday J.-L., On the algebra of quasi-shuffles, Manuscripta mathematica, 123(1) (2007), 79 -- 93.
[18] Loday J.-L., Generalized bialgebras and triples of operads, Asterisque, 320 (2008), x+116 p.
[19] Makar-Limanov L., Shestakov I., Polynomial and Poisson dependence in free Poisson algebras and free Poisson fields, J.
Algebra, 349 (2012), 372 -- 379.
[20] Pozhidaev A. P., Dialgebras and related triple systems, Sib. Math. J., 49 (2008), 4, 696 -- 708
[21] Zakharov A., Novikov-Poisson algebras and superalgebras of Jordan brackets, Comm. Algebra, 42 (2014), 5, 2285 -- 2298.
[22] Zhevlakov K., Slinko A., Shestakov I., Shirshov A., Rings that are nearly associative, Pure and Applied Mathematics, 104.
Academic Press, Inc. [Harcourt Brace Jovanovich, Publishers], New York-London, 1982. xi+371 pp.
[23] Zinbiel G. W., Encyclopedia of types of algebras 2010, Operads and universal algebra, 217 -- 297, Nankai Ser. Pure Appl. Math.
Theoret. Phys., 9, World Sci. Publ., Hackensack, NJ, 2012.
12
|
1912.08594 | 1 | 1912 | 2019-12-16T08:41:39 | Derivation of Five-Dimensional Lotka-Voltera Algebra | [
"math.RA"
] | Lotka-Volterra (LV) algebras are generally applied in solving biological problems and in examining the interactions among neighboring individuals. With reference to the methods applied by Gutierrez-Fernandez and Garcia in \cite{17}. this study examines the derivations of five-dimensional LV algebras. Before explicitly describing its derivation space, anti-symmetric matrices are used to define the LV algebra A. | math.RA | math |
DERIVATION OF FIVE-DIMENSIONAL LOTKA-VOLTERA
ALGEBRA
AHMAD ALARAFEEN
IZZAT QARALLEH AZHANA AHMAD
Abstract. Lotka-Volterra (LV) algebras are generally applied in solving bio-
logical problems and in examining the interactions among neighboring individu-
als. With reference to the methods applied by Gutierrez-Fernandez and Garcia
in [17]. this study examines the derivations of five-dimensional LV algebras. Be-
fore explicitly describing its derivation space, anti-symmetric matrices are used
to define the LV algebra A.
Mathematics Subject Classification: 17D92, 17D99, 39A70, 47H10.
Key words: Evolution algebra; Volterra quadratic stochastic operator; Nilpotent;
Isomorphism; Derivation.
1. Introduction
Many studies have examined non-associative algebras and their different classes,
including baric, evolution, Bernstein, train, and stochastic algebras. While each
of these classes has its own unique definition, they are all referred to as genetic
algebras. For instance, the genetics of abstract algebras were investigated in [20]
by referring to their formal language.
Bernstein [21], [20] introduced the concept of population genetics in their study
of evolution operators , which are often described by using quadratic stochastic
operators (see [13]).
Introduced in 1981 by Itoh [10], Lotka-Volterra (LV) algebras are formulations
that are used to describe solutions and singularities and are associated with qua-
dratic differential equations [10,17]. They have been widely applied in different
mathematical fields,
including dynamic systems, Markov chains, graph theory,
and population genetics [10, 12].
Normal Bernstein algebras, which are LV algebras associated with a zero anti-
symmetric matrix, are essential in solving the classical Bernstein problem [4, 5, 8,
14]. Many studies have described the structure of LV algebras [1 -- 3, 6, 7, 10, 16, 17,
24 -- 27]. For instance, Holgate described how the derivations of genetic algebras,
Date: Received: xxxxxx; Revised: yyyyyy; Accepted: zzzzzz.
∗ Corresponding author.
1
2
AHMAD ALARAFEEN
IZZAT QARALLEH
AZHANA AHMAD
such as LV algebras, can be interpreted in biological terms [9]. The derivations
of LV algebras have been classified up to three dimensions in [7] and up to three
and four dimensions in [3]. Meanwhile, [17], proposed several novel approaches for
examining LV algebras. For example, digraphs can be attached to LV algebras to
classify their derivations of into four dimensions at most without requiring much
effort and while taking into account the special cases in arbitrary dimensions.
By using the techniques introduced in [17], this paper attempts to classify the
derivations of LV algebras up to five dimensions.
2. Preliminaries
This section describes all the definitions and theorems used in this paper to
achieve the aforementioned objective.
Definition 2.1. A commutative (not necessarily associative) algebra A over a
field F which characteristic is not equal to 2 is called LV algebra if the natural
basis B = {e1, ..., en} is admitted such that eiej = αijei + αjiej, where αij and αji
are in field A, whereas aii = 1
2 and αij + αji = 1 for all i, j = 1, 2, ..., n.
The structural constants of LV-algebra A are formulated in matrix form as
(αij)n
i,j=1 with respect to natural basis B.
Remark 2.2. Each LV algebra A is baric in the sense that it admits a non-trivial
homomorphism ω : A → F, which is defined by ω (Pi λiei) = Pi λi for all λi ∈ F.
Definition 2.3. Let (A, ◦) be an algebra with a linear mapping D : A → A such
that
D(u ◦ v) = D(u) ◦ v + u ◦ D(v)
for all u, v ∈ A , derivation on algebra (A, ◦) D ≡ 0 is clearly a derivation, which
we call a trivial one.
We obtain the following notations on the basis of those described in [17]. The
hyper-plane unit and barideal of A are defined as H = {x ∈ Aω(x) = 1} and
N = kerω = {x ∈ Aω(x) = 0}, respectively.
supp(x) denotes the support of x = Pi λiei with respect to natural basis B, and is
induced when the corresponding coefficient is nonzero, that is i ∈ supp(x) if and
only if λi 6= 0. For simplification, we denote {1, 2, ..., n} by S. For each index k,
we define Sk as the set {i ∈ Seiek = (ei + ek)/2}, where k ∈ S. In this case, we
have, k ∈ Sk, and index i ∈ S belongs to Sk if and only if k ∈ Si. Meanwhile, if
x1, ..., xk ∈ A, then hx1, ..., xki is the vector subspace of A spanned by x1, ..., xk.
Let I be a non-empty subset of S, and U= heii ∈ Ii. For each element x =
Pn
k=1 λkek in A, the U-component of x is defined by [x]U = Pi∈I λiei. If U = {ei},
DERIVATION OF FIVE-DIMENSIONAL LOTKA-VOLTERA ALGEBRA
3
then we denote [x]U by [x]i. L(A) represents the set of all linear mappings from
A to A. In the following, D is a derivation of A, and λtk ∈ F such that
D(ek) =
n
X
t=1
λtket, k = 1, n.
(2.1)
Proposition 2.4.
[17] The following statements hold true:
(1) If D ∈ Der(A), then ImD ⊂ N and supp(D(ek)) ⊂ S for all k ∈ S.
(2) If Sk = 1 for all k ∈ S, then Der(A) = {0}.
(3) If i ∈ Sk, then supp(D(ek)) ⊆ Si.
(4) supp(D(ek)) ⊆ ∩u∈Sk Si, that is, if i, j ∈ supp(D(ek)), then
eiej = (ei+ej)
2
and eiek = (ei+ek)
2
.
We define Nk = ∩i∈Sk Si for k = 1, 2, ..., n., where index j belongs to Nk if and
only if eiej = (ei + ej)/2 for all i ∈ Sk. We observe that supp(D(ek)) ⊆ Nk for all
j ∈ S.
Theorem 2.5.
[17] Let e1e2 = αe1 + α′e2 where, α 6= 1
2, and define
I = N1 ∩ N2,
J = N1 \ N2,
K = N2 \ N1
U = < eii ∈ I >
V = < ejj ∈ J >
W = < ekk ∈ K >
Then,
D(e1) = u + v,
and D(e2) = u + w.
For some u ∈ U, we have v ∈ V and w ∈ W, where
ω(u) = ω(v) = ω(w) = 0.
Moreover,
eje2 = αej + α′e2,
for all j ∈ supp(v) and k ∈ supp(w).
and
e1ek = αe1 + α′ek
Corollary 2.6.
[17] The following statements hold true:
(i) Let A be similar to the previous theorem. If I ≤ 1, then u = 0. If J ≤ 1,
then v = 0. If K ≤ 1, then w = 0.
(ii) Let e1e2 = αe1 + α′e2, where α 6= 1
i ∈ N1 ∩ N2.
2. Therefore, [D(e1)]i = [D(e2)]i for all
4
AHMAD ALARAFEEN
IZZAT QARALLEH
AZHANA AHMAD
(iii) If i belongs to Nk, then we have Ni ⊆ Nk.
(iv) If i ∈ Nk and k ∈ Ni, then Ni = Nk.
Attached to the LV algebra are constantly a graph and a weight graph that
are connected and directed. Therefore, LV algebras will usually be presented in
graphical form throughout the rest of this paper. The following properties are
satisfied by graph Γ(A, B) = (S, E) :
(1) (i, j) ∈ E if and only if (i, j) /∈ E for all i, j ∈ S,i 6= j, and
(2) (i, i) /∈ E for all i ∈ S.
The weight graph attached to the LV algebra A relative to natural basis is
represented by the triple Γτ (A, ϕ) = (S, E, τ ) where τ : E −→ F is given by
τ (i, j) = αij. A unique LV algebra is defined up to isomorphism by a weight
′, E ′, τ ) when S = S
′.
graph. An LV algebra has equivalent graphs (S, E, τ ) and (S
For every pair (i, j) ∈ E, :if (i, j) ∈ E ′, then v(i,j) = ρ(i, j) or v(j,i) = 1 − ρ(i, j).
If and only if two graphs are equivalent, then they can be are attached to the same
LV algebra relative to the same natural basis. We define those edges whose weights
are equal and not equal to 1
2 , as :
Meanwhile, we define those edges that are not equal to6= 1
2 as:
The degree of symmetry of an algebra may be assessed by using its weight graph.
Therefore, we also take into consideration the subgraphs attached to algebra A.
The following implications hold (the elements of the basis are identified by the
graphs on the basis of their subindices):
G.1: If α 6= β, then 3 6∈ Supp(D(e2)).
1
β
α
3
2
DERIVATION OF FIVE-DIMENSIONAL LOTKA-VOLTERA ALGEBRA
5
G.2: [D(e2)]1 = [D(e3)]1
1
α
2
3
Proof. G.1: Suppose that 3 ∈ Supp(D(e2)), e1e2 = αe1 + α′e2 for α 6= 1
2, we can
obtain 3 ∈ N2 and 3 6∈ N1, . Therefore, we have 3 ∈ N2 \ (N1 ∩ N2), according to
the preivous theorem e1e3 = αe1 + α′e3.
G.2: Suppose that G.2 holds. If 1 /∈ supp(D(e2))∩ supp(D(e3)), then [D(e2)]1 =
[D(e3)]1 because both vanish. Now let 1 /∈ supp(D(e2)) ∪ supp(D(e3)), and
1 ∈ supp(D(e3)). We observe that 1 /∈ N3 \ (N3 ∩ N2) , and according to Theorem
1, we obtain [e2ek]k = (1 − α)ek for all k N3 (N3 ∩ N2) ∩ supp(D(e3)). Therefore,
1 ∈ N2 ∩ N3 according to the results of Corollary 2.6(ii), where [D(e2)]1 = [D(e3)]1.
(cid:3)
Remark 2.7. fully describes the derivation of 3D LV algebra, whereas [7], presents
a new technique for describing the 3D and 4D LV algebra. To describe the deriva-
tion of 5D LV algebra, we use the technique proposed in [17] .
3. Main Results
Let A be a 5D LV algebra over a field whose characteristic is unequal to 2,
and let D is a derivation of A. With reference to a suitable natural basis, A is
represented by a weighted graph γ(A) , which denotes the number of edges whose
weight is not equal to 1
2. If γ(A) = 0, then Der(A) represents the linear mapping
f from A to A such that Im(f ) ⊂ N. We present below some cases of 5D γ(A) .
Theorem 3.1. Let A be a 5D LV algebra, and in the following table summarizes
its derivations:
6
AHMAD ALARAFEEN
IZZAT QARALLEH
AZHANA AHMAD
Name Graph of
Der(A)
M1
M2
M3
M4
M5
2
3
2
3
2
3
2
3
2
3
1
5
1
5
1
α
5
1
γ
5
1
α
5
4
4
α
4
α
α
4
α
α
4
{f ∈ L(A)Im(f ) ⊂ N}
{f ∈ L(A)Im(f ) ⊂< e3 − e4, e3 − e5 > and f (e1) =
f (e2)}
{f ∈ L(A)Im(f ) ⊂< e2 − e4 > and f (e3) = f (e5) =
f (e1)}
{f ∈ L(A)e1, e5, e4 ∈ ker(f ) and Im(f ) ⊂< e2 − e3 >}
{f ∈ L(A)Im(f) ⊂< e2 − e3, e2 − e5 > and e1, e4 ∈
ker(f)}
DERIVATION OF FIVE-DIMENSIONAL LOTKA-VOLTERA ALGEBRA
7
Name Graph of
Der(A)
M6
M7
M8
M9
M10
1
α
5
1
γ
5
1
5
1
β
5
1
α
5
α
γ
α
2
3
2
3
2
3
2
α
3
2
3
α
4
α
β
4
α
4
α
β
4
α
α
4
{f ∈ L(A)Im(f ) ⊂< e2 − e5 > and e1, e3, e4 ∈ ker(f)}
{f ∈ L(A)Im(f ) ⊂< e3 − e4 > and f (e1) = f (e2) =
f (e5)}
{f ∈ L(A)e1, e2, e3 ∈ ker(f ) and Im(f ) ⊂< e4 − e5 >}
{f ∈ L(A)f (e1), f (e3) ∈< e1 − e3 >, f (e2), f (e5) ∈<
e2 − e5 > and e4 ∈ ker(f )}
{f ∈ L(A)e1 ∈ ker(f ) and Im(f ) ⊂< e2 − e3, e2 −
e4, e2 − e5 > }
8
AHMAD ALARAFEEN
IZZAT QARALLEH
AZHANA AHMAD
Name Graph of
Der(A)
M11
M12
M13
M14
M15
2
3
2
3
2
3
2
3
2
3
δ
δ
δ
α
1
α
5
1
α
5
1
α
5
1
5
1
α
5
α
α
4
α
δ
4
α
γ
4
α
4
α
4
{ f ∈ L(A)Im(f ) ⊂< e2 - e3, e2 − e5 > and e4, e1 ∈
ker(f ) }
{f ∈ L(A)f (e2), f (e5) ∈< e2 − e5 >, f (e3), f (e4) ∈<
e3 − e4 > and e1 ∈ ker(f )}
{f ∈ L(A)Im(f ) ⊂< e2 − e5 > and e1, e4, e3 ∈ ker(f )}
{f ∈ L(A)Im(f ) ⊂< e2 − e4 > and e1 ∈ ker(f )}
{f ∈ L(A)Im(f ) ⊂< e2 − e5 > and e1, e3, e4 ∈ ker(f )}
DERIVATION OF FIVE-DIMENSIONAL LOTKA-VOLTERA ALGEBRA
9
Name Graph of
Der(A)
M16
M17
M18
M19
M20
1
α
5
1
α
5
1
α
5
1
α
5
1
5
α
δ
2
3
2
3
2
3
2
3
2
3
δ
β
α
4
α
4
α
4
α
4
4
{f ∈ L(A)Im(f ) ⊂< e2 − e5 > and e1, e3, e4 ∈ ker(f )}
{f ∈ L(A)Im(f ) ⊂< e2 − e5 > and e1, e3, e4 ∈ ker(f )}
{f ∈ L(A)Im(f ) ⊂< e2 − e5 > and e1, e3, e4 ∈ ker(f )}
{f ∈ L(A)Im(f ) ⊂< e1 − e3 > and e2, e4, e5 ∈ ker(f )}
{f ∈ L(A)Im(f ) ⊂< e1 − e3 > and e2, e5, e4 ∈ ker(f )}
10
AHMAD ALARAFEEN
IZZAT QARALLEH
AZHANA AHMAD
δ
α
α
δ
4
2
3
2
α
3
1
5
1
5
M21
α
4
M22
{f ∈ L(A)f (e1), f (e3) ∈< e1 − e3 > and f (e2), f (e5) ∈< e2 − e5 >}
{f ∈ L(A)Im(f ) ⊂< e2 − e4 > and e1, e3, e5 ∈ ker(f )}
Proof. Depending on the order of the set, the proof is divided into the following
cases:
Case 1: If γ(A) = 1, then A can be graphed as follows up to equivalence and
isomorphism :
2
3
1
5
4
In this graph, we have S1 = {1, 3, 4, 5}, S2 = {2, 3, 4, 5} = S5, and Sk = S ,
where k = 3, 4, 5. From these we obtain N1 = {1, 3, 4, 5}, and Nk = {3, 4, 5},
where k = 3, 4, 5, and N2 = {2, 3, 4, 5}. If we have
N1(cid:31)(N1 ∩ N2) = N2(cid:31)(N1 ∩ N2) = 1,
then we obtain,
D(e1), D(e2) ∈< ekk ∈ N1 ∩ N2 > ∩N = < e3 − e4, e3 − e5 >.
Meanwhile, if we have Nk = {3, 4, 5}, then we obtain,
D(e3), D(e4), D(e5) ∈< ekk ∈ N3 > ∩N = < e3 − e4, e3 − e5 >.
DERIVATION OF FIVE-DIMENSIONAL LOTKA-VOLTERA ALGEBRA
11
We find from G.2 that [D(e1)]k = [D(e2)]k, where k = 3, 4, 5. In this case,
[D(e1)] = [D(e2)].
Case 2: If γ(A) = 2, then A an be graphed as follows up to equivalence and iso-
morphism:
2
3
1
5
4
1
α
5
2
3
β
4
where in the first graph, S1 = {1, 3, 4, 5}, S2 = {2, 3, 4, 5}, S3 = {1, 2, 3, 5},
S5 = S, and S4 = {1, 2, 4, 5}, where k = 3, 4, 5. From these, we obtain
N1 = {1, 5}, N2 = {2, 5}, N3 = {3, 5}, N5 = {5}, and N5 = {4, 5}. In this
case, D(e5) = 0 given that
Nk(cid:31)(N1 ∩ Nk) = N1(cid:31)(N1 ∩ Nk) = Nk ∩ N1 = 1; . Therefore,
D(ek) = 0, where k = 2, 3, 4, and
Der(A) = 0.
As for the second case, we have S1 = {1, 2, 3, 4}, S2 = S, S3 = {1, 2, 3, 4},
S4 = S, and S5 = {2, 4, 5}, and we obtain NK = {1, 2, 3, 4}, where k = 1,
3. Given that Nr = {2, 4} for r = 2, 4 ,N5 = {2, 4, 5}; we obtain D(e2),
D(e4) ∈< e2 − e4 >. Following G.2, we have:
[D(e1)]4 = [D(e5)]4
[D(e1)]2 = [D(e5)]2 ⇒ D(e5) = D(e1).
Similarly, we can obtain D(e3) = D(e5). Therefore, D(e3) = D(e5) =
D(e1).
, and Der(A) = 0 when α 6= β, Der(A) = 0. Following G.1, if
α = β, then the f ∈ L(A) set is a deviation if and only if
f (e1), f (e3), f (e5) ∈< eii ∈ N1 ∩ N3 ∩ N5 > ∩N =< e2 − e4 > .
12
AHMAD ALARAFEEN
IZZAT QARALLEH
AZHANA AHMAD
Case 3:
If γ(A) = 3, then A can be graphed up to equivalence and isomorphism as
follows:
1
γ
5
1
5
2
3
2
β
3
α
β
4
α
γ
4
1
γ
5
1
α
5
2
3
2
3
α
β
4
β
γ
4
In the first case, S1 = {1, 4}, S2 = {2, 3, 4, 5} = S5, S3 = {2, 3, 4, 5}, and
S4 = S, from which we obtain N1 = {1, 4}, and Nk = {2, 3, 4, 5}, where k
= 2, 3, 5, and N4 = {4}. Therefore, D(e4) = 0. Given that
N1 ∩ Nk = N1(cid:31)(N1 ∩ Nk) = 1 for k = 2, 3, 5, we have
D(e1) = 0. According to G.1, if α 6= β 6= γ α = β 6= γ then we have
Der(A) = 0. In this case, Der(A) is treated as the set of all f ∈ L(A)
where e5, e1, e4 ∈ ker(f ) and
f (e2), f (e3) ∈< e2 − e3 > .
Both α 6= β = γ and α = γ 6= β are analogous cases. Specifically, if
α = β = γ, then Der(A) can be easily proven as the set of all f ∈ L(A),
such as e1, e4 ∈ ker(f), that is,
Im(f) ⊆< e2, e3, e5 > ∩N =< e2 − e3, e2 − e5 > .
In the second case, we have S1 = { 1, 3, 4 }, S2 = {2, 3, 4}, S3 = S, S4 = S,
and S5 = {3, 4, 5}, such that N1 = {1, 3, 4}, N2 = {2, 3, 4}, and Nk = {3,
4} for k = 3, 4. N5 = {5, 3, 4}. From Nr = {3, 4},where r ={ 3, 4}, we
obtain D(e3), D(e4) ∈< e3 − e4 >. Given that
N1(cid:31)(N1 ∩ Nk) = Nk(cid:31)(N1 ∩ Nk) = 1,
where k = 2, 5, we have
D(e1), D(e2), D(e5) ∈< ek : k ∈ N1 ∩ Nk > ∩N =< e3 − e4 >
DERIVATION OF FIVE-DIMENSIONAL LOTKA-VOLTERA ALGEBRA
13
Following G.2 we have
[D(e1)]4 = [D(e2)]4 = [D(e5)]4 and [D(e1)]3 = [D(e2)]3 = [D(e5)]3.
Therefore,
D(e1) = D(e2) = D(e5).
In the third case, we have S1 = {1, 3, 4, 5 }, S2 = { 2, 4, 5 }, S3 = {
1, 3, 5 }, S4 = { 1, 2, 4, 5 }, and S5 = S, and we obtain N1 = { 1, 5},
N2 = {2, 4, 5}, N3 = {1, 3, 5}, N4 = {4, 5}, and N5 = {5}. Therefore,
D(e5) = 0. Given that
N1(cid:31)(N1 ∩ N2) = N1 ∩ N2 = 1,
we have D(ek) = 0, and k = 1. Similarly, on the basis of e4 and e3, we
obtain D(e4) = 0. Following G.2 we obtain [D(e2)]5 = [D(e3)]5, which
leads to D(e3) = D(e2). We also obtain [D(e2)]4 = [D(e1)]4, where,
D(e2) = D(e1) = 0, and D(e3) = D(e4) = 0, where Der(A) = 0.
In the fourth case, we have S1 = {1, 3, 4}, S2 = {2, 3, 4, 5}, S3 = {1, 2, 4, 5},
S4 = {1, 2, 4, 5}, and S5 = {2, 3, 4, 5}, and we obtain N1 = {1} and
Nk = {2, 5}, where k = 2, 5, N3 = {3}, and N4 = {4}. Therefore,
D(er) = 0, where r = 1, 3, 4. According to G.1, However, if α 6= β,
then Der(A) = 0. If α = β then Der(A) represents the set of all f ∈ L(A),
where er ∈ ker(f ) for r = 1, 3, 4, such that
f(e2), f(e5) ∈< e2, e5 > ∩N =< e2 − e5 >.
Case 4: If γ(A) = 4, then A can be graphed up to equivalence and isomorphism as
follows:
2
3
1
5
4
1
5
2
3
β
α
4
14
AHMAD ALARAFEEN
IZZAT QARALLEH
AZHANA AHMAD
2
β
3
1
δ
5
α
γ
4
2
3
1
β
5
δ
α
γ
4
In the first case, we have S1 = {1, 3, 4, 5}, S2 = {2, 4, 5}, S3 = {1, 3, 5},
S4 = {1, 2, 4}, and S5 = {1, 2, 3, 5}, and we obtain Nk = {k}, for k = 1, 2,
4, 5 and N3 = {1, 3, 5}. Therefore, D(ek) = 0, k=1, 2, 4, 5. Following G.2,
we have [D(e3)]5 = [D(e2)]5, where D(e3) = D(e2) = 0, and Der(A) = 0.
In the second case, we have S1 = {1, 3, 4, 5}, S2 = {2, 4, 5}, S3 = {1, 3},
S4 = {1, 2, 4, 5}, and S5 = {1, 2, 4, 5}, and we obtain N1 = {1}, N2 =
{2, 4, 5}, N3 = {1, 3}, N4 = {4, 5}, and N5 = {4, 5}, where D(e1) = 0. Fol-
lowing G.2 , we have [D(e1)]s = [D(e2)]s = 0 (where s = 4, 5). [D(e3)]1 =
[D(e4)]1, and [D(e3)] = [D(e4)] , and [D(e3)] = [D(e5)]. If α 6= β, then we
have Der(A) = 0, but if α 6= β, then we have e2, e1 ∈ ker(A). Therefore,
f (e4), f (e5) ∈ N ∩ N4 =< e4 − e5 >.
In the third case, we have S1 = {1, 3, 4}, S2 = {2, 4, 5}, S3 = {1, 3, 4},
S4 = S, and S5 = {2, 4, 5}, and Nr = {1, 3, 4}, (where r=1, 3) Nr = {2, 4, 5}
(for r= 2, 5). N4 = {4}. We obtain D(e4) = 0. Following G.1, if either
α 6= β or γ 6= δ, then D(e1) = D(e3) = 0, α 6= δ or γ 6= β , and
D(e2), D(e5) = 0 . We rearrange the induces if necessary and assume
without loss of generality that if α = β 6= γ = δ, then f ∈ L(A) is a
derivation of A if and only if e4 ∈ ker(f ) and f(e1), f(e3) ∈< e1 − e3 >, and
f(e5),f(e2) ∈< e2 − e5 >.
In the fourth case, we have S1 = {1}, and Sk = {2, 3, 4, 5}, where k = 2,
3, 4, 5. We subsequently obtain N1 = 1, D(e1) = 0, and Nk = {2, 3, 4, 5},
and k = 2, 3, 4, 5. The following cases are derived accordingly:
1)By letting α = β = γ = δ, Der(A) can be easily proven to be a set of all
f ∈ L(A) such that e1 ∈ ker(f ) and
Im(f) ⊂< e2, e3, e4, e5 > ∩N =< e2 − e3, e2 − e4, e2 − e5 > .
2)By letting α = β = γ 6= δ, we acquire G.1 forces e4, e1 ∈ ker(f ) and
D(e2), D(e3), D(e5) ∈ U ∩ N =< e2 − e3, e2 − e5 > .
DERIVATION OF FIVE-DIMENSIONAL LOTKA-VOLTERA ALGEBRA
15
Cases α 6= β = γ = δ, α = γ = δ 6= β, and α = γ = β 6= δ are all analogous.
3) By letting α = β 6= γ = δ, Der(A) can be easily proven to be a set of
all f ∈ L(A) such that f (e5), f(e2) ∈< e2 − e5 >, f(e3), f(e4) ∈< e3 − e4 >
and e1 ∈ ker(f ). Cases α = β 6= γ = δ, α = γ 6= β = δ, α = δ 6= γ = β are
all analogous.
4) By letting α = β 6= γ 6= δ, we have e1, e4, e3 ∈ ker(f), f(e2), f(e5) ∈<
e2 − e5 >. Cases α 6= β 6= γ = δ is analogous.
Case 5:
If γ(A) = 5, A can be graphed up to equivalence and isomorphism as
follows:
2
3
2
3
β
α
4
α
4
1
5
1
γ
5
2
3
1
γ
5
1
β
5
α
4
α
4
2
3
2
3
1
5
4
In the first case, we have S1 = {1}, S2 = {2, 3, 4, 5}, S3 = {2, 3, 4}, S4 =
{2, 3, 4, 5}, and S5 = {2, 4, 5}, and we obtain N1 = {1}, N2 = {2, 4},
N3 = {2, 3, 4}, N4 = {2, 4}, and N5 = {2, 4, 5}. Therefore, D(e1) = 0 and,
N3(cid:31)(N5 ∩ N3) = N5(cid:31)(N3 ∩ N5) = 1.
16
AHMAD ALARAFEEN
IZZAT QARALLEH
AZHANA AHMAD
In this case, D(e3), D(e5) ∈ U ∩ N =< e2 − e4 >. Following G.1, if α 6= β,
then e2, e4 ∈ ker(f).whereas if α = β, then f ∈ L(A) is considered a deriva-
tion of A if and only if e1 ∈ ker(f ) and f(e2), f(e4) ∈ U ∩ N =< e2 − e4 > .
In the second case, we have S1 = {1, 3, 4}, S2 = {2, 4, 5}, S3 = {1, 3, 5},
S4 = {1, 2, 4}, and S5 = {2, 3, 5}. and, we obtain Nk = {k}, k=1, 2, 3, 4,
5. Therefore, Der(A) = 0.
In the third case, we have S1 = {1, 4}, S2 = S5 = {2, 4, 5}, S3 = {3, 4},
S4 = {2, 4, 5}. and we obtain N1 = {1, 4}, Nk = {2, 4, 5}, (where k = 2, 5)
N3 = {3, 4}, and N4 = {4}. In this case, D(e4) = 0. Given that
N1 ∩ N3 = N3 \ (N1 ∩ N3) = N1 \ (N3 ∩ N1) = 1,
we have D(e1), D(e3) = 0. If α 6= γ, then Der(A)=0, whereas if α = γ,
then the set of all f ∈ L(A), similar that e1, e3, e4 ∈ ker(f ) and
f(e2), f(e5) ∈< e2, e5 > ∩N =< e2 − e5 >
.
In the fourth case, we have S1 = {1, 3}, S2 = {2, 4, 5}, S3 = {1, 3, 4}, S4 =
{2, 3, 4, 5}, and S5 = {2, 4, 5} and we obtain N1 = {1, 3}, N2 = {2, 4, 5},
N3 = {3}, N4 = {4}, and N5 = {2, 4, 5}. Therefore, D(e3), D(e4) = 0. By
using the previous theorem, we obtain
N1(cid:31)(N3 ∩ N1) = N3 ∩ N1 = 1.
and show that, D(e1) = 0. Following G.1, if α 6= β, then Der(A) = 0,
whereas if α = β, then the set of all f ∈ L(A) similar e1, e3, e4 ∈ ker(f )
and
f(e2), f(e5) ∈< e2, e5 > ∩N =< e2 − e5 >
In the fifth case, we have S1 = {1, 3}, S2 = {2, 5}, S3 = {1, 3, 4, 5}, S4 =
{3, 4, 5}, and S5 = {2, 3, 4, 5} and we obtain N1 = {1, 3}, N2 = {2, 5},
N3 = {3}, N4 = {3, 4, 5}, and N5 = {5}. Therefore, D(ek) = 0 for k = 3,
4, and
N2(cid:31)(N2 ∩ N4) = N2 ∩ N4 = 1.
In this case, D(e2) = 0. Following G.2, we obtain [D(e2)]5 = [D(e4)]5 = 0
, which suggests that D(e4) = 0. We also obtain D(e1) = 0, thereby sug-
gesting that Der(A)=0.
DERIVATION OF FIVE-DIMENSIONAL LOTKA-VOLTERA ALGEBRA
17
Case 6:
If γ(A) = 6, then A can be graphed up to equivalence and isomorphism as
follows:
2
3
2
3
4
4
1
5
1
5
1
3
1
β
5
1
β
5
α
4
α
4
2
3
2
3
2
5
4
In the first case, we have S1 = {1, 3}, S2 = {2, 4, 5}, S3 = {1, 3, 5}, S4 =
{2, 4}, and S5 = {2, 3, 5}, and we obtain N1 = {1, 3}, N2 = {2}, N3 = {3},
N4 = {2, 4}, and N5 = {5}. Therefore, D(e2), D(e3), D(e5) = 0. Following
G.2,
[D(e5)]2 = [D(e4)]2 = 0,
which suggests that, D(e4) = 0, D(e1) = 0 and Der(A) = 0.
In the second case, we have S1 = {1}, S2 = {2, 4, 5}, S3 = {3, 4}, S4 =
{2, 3, 4, 5}, and S5 = {2, 4, 5} and we obtain N1 = {1}, N2 = {2, 4, 5}, N3 =
{3, 4}, N4 = {4}, and N5 = {2, 4, 5}. Therefore, acquire D(e1), D(e4) = 0.
Following the previous theorem,
N3(cid:31)(N2 ∩ N3) = N2 ∩ N3 = 1,
which means that, D(e3) = 0. With reference to the same theorem, we let
Nk = {2, 4, 5} for k = 2, 5. In this case, if α = β, then the f ∈ L(A) set
18
AHMAD ALARAFEEN
IZZAT QARALLEH
AZHANA AHMAD
can be treated as a derivation if and only if ei ∈ ker(f ), where i = 1, 3, 4
and f(e2), f(e5) ∈< e2 − e5 >, and if α 6= β. Therefore, Der(A) = 0.
In the third case, we have S1 = {1, 4}, S2 = {2, 4}, S3 = {3, 4}, S1 = S,
and S5 = {4, 5}, and we obtain N1 = {1, 4}, N2 = {2, 4}, N3 = {3, 4},
N4 = {4}, and N5 = {4, 5}. Therefore, D(e4) = 0. Given that
N1(cid:31)(N1 ∩ Nk) = Nk(cid:31)(N1 ∩ Nk) = N1 ∩ Nk = 1.
we obtain D(ek) = 0, where k = 1, 2, 3, 5. In this case, Der(A) = 0.
In the fourth case, we have S1 = {1, 3}, S2 = {2, 5}, S3 = {1, 3}, S4 =
{3, 4, 5}, and S5 = {2, 4, 5}, so that N1 = {1, 3}, N2 = N5 = {2, 5},
N3 = {3}, and N4 = {4}. Therefore, D(ek) = 0 , where k = 3, 4. Following
G.2, we obtain
[D(e1)]3 = [D(e4)]3 ⇒ D(e1) = 0.
If α 6= β, then Der(A) = 0, whereas if α = β, then Der(A) repre-
sents the set of all f ∈ L(A), such as er ∈ ker(f ), where r = 1, 3, 4.
f(e2), f(e5) ∈< e2 − e5 >.
In the fifth case, we have S1 = {1, 3, 5}, S2 = {2, 3, 5}, S3 = {1, 2, 3},
S4 = {4}, and S5 = {1, 2, 5} and we obtain, Nk = {k}, where k = 1, 2, 3,
4, 5. In this case, Der(A) = 0.
Case 7:
If γ(A) = 7, then A can be graphed up to equivalence and isomorphism as
follows:
2
3
1
5
4
2
3
1
β
5
α
4
DERIVATION OF FIVE-DIMENSIONAL LOTKA-VOLTERA ALGEBRA
19
1
5
2
3
4
In the first case, we have S1 = {1}, S2 = {2, 4, 5}, S3 = {3, 5}, S4 = {2, 4},
and S5 = {2, 3, 5} and we obtain, Nk = {k}, for k = 1, 2, N3 = {3, 5},
N4 = {2, 4}, and N5 = {2, 5}. Given that
N4(cid:31)(N5 ∩ N4) = N4 ∩ N5 = N4(cid:31)(N3 ∩ N5) = 1.
we obtain D(e4), D(e5) = 0. Following G.2,
[D(e2)]5 = [D(e3)]5 ⇒ D(e3) = 0.
In this case, Der(A) = 0.
In the second case, we have S1 = {1, 3}, S2 = {2, 4, 5}, S3 = {1, 3},
S4 = {2, 4}, and S5 = {2, 5} and we obtain N1 = {1, 3},N2 = {2},
N3 = {1, 3}, N4 = {4}, and N5 = {2, 5}. Therefore, D(e4), D(e2) = 0.
Given that
[D(e5)]2 = [D(e4)]2 ⇒ D(e5) = 0.
we have D(e5) = 0. If α 6= β, then Der(A) = 0 whereas if α = β, then
Der(A) suggests that the set of all f ∈ L(A) is a derivation of A if and
only if e2, e4, e5 ∈ ker(f ) and f(e1), f(e3) ∈< e1 − e3 >.
In the third case, we have S1 = {1, 4}, S2 = {2, 4}, S3 = {3}, S4 =
{1, 2, 4, 5}, and S5 = {4, 5}, and we obtain N1 = {1, 4}, N2 = {2, 4},
N3 = {3}, N4 = {4}, and N5 = {4, 5}. Therefore, D(e4), D(e3) = 0. Given
that
N1(cid:31)(N1 ∩ Nk) = Nk(cid:31)(N1 ∩ Nk) = Nk ∩ N1 = 1.
we have D(ek) = 0, where k = 1, 2, 5. In this case, Der(A) = 0.
20
AHMAD ALARAFEEN
IZZAT QARALLEH
AZHANA AHMAD
Case 8:
If γ(A) = 8, then A can be graphed up to equivalence and isomorphism as
follows:
2
3
1
5
4
2
3
1
5
γ
β
α
δ
4
In the first case, we have Sr = {r}, (where r = 1, 3,) S2 = {2, 4, 5},
S4 = {2, 4} and S5 = {2, 5}, and we obtain Nk = {k}, (where k = 1, 2,
3)N4 = {2, 4} and N5 = {2, 5}. Therefore, D(ek) = 0 where k = 1, 2, 3.
Given that
N4(cid:31)(N5 ∩ N4) = N4 ∩ N5 = N4(cid:31)(N4 ∩ N5) = 1.
we have D(er) = 0, r = 4, 5. In this case, Der(A) = 0.
In the second case , we have S1 = {1, 3}, S2 = {2, 5}, S3 = {1, 3}, S4 = {4},
and S5 = {2, 5}, and we obtain, Nk = {1, 3}, (k = 1, 3) Nr = {2, 4}, (r
= 2, 5) and N4 = {4}. Therefore, D(e4) = 0. Following G.1, if α 6= γ
or β 6= δ, then D(e2), D(e5) = 0. Similarly, if α 6= β or γ 6= δ, we have
D(e1) = D(e3) = 0. In this case, Der(A) = 0.
If α 6= β, then f ∈ L(A) can be treated as a derivation if and only if
e1, e3 ∈ ker(f) and f(e2), f(e5) ∈< e2 − e5 >. Similarly, if α 6= γ, then
e2, e5 ∈ ker(f) and f(e1), f(e3) ∈< e1 − e3 >.
If α = β 6= γ = δ, then
f ∈ L(A) can be viewed as a derivation of A if and only if e4 ∈ ker(f ) and
f(e1), f(e3) ∈< e1 − e3 > and f(e2), f(e5) ∈< e2 − e5 >.
Case 9: If γ(A) = 9 then A up to equivalence and isomorphism as follows:
1
5
2
α
3
β
4
DERIVATION OF FIVE-DIMENSIONAL LOTKA-VOLTERA ALGEBRA
21
In this case, we have Sk = {k} (k = 1, 3, 5) and Sr = {2, 4}, r = 2, 4, and we
obtain, Nk = {k} (k = 1, 5, 3)Nk = {2, 4} (k = 2, 4), Therefore, D(ek) = 0,
where k= 1, 3, 5. Following G.1, if α 6= β, then e4, e2 ∈ ker(f). Therefore,
Der(A) = 0, and if α = β, then f ∈ L(A) can be treated as a derivation of
A if and only if es ∈ ker(f ), where s= 1, 3, 5, and f(e2), f(e4) ∈< e2 − e4 >.
(cid:3)
References
[1] H. Boujemaa, M. Rachidi and A. Micali, Sur les algA"bres de Lotka-Volterra, Algebras
Groups Geom. 10 (1993) 169-180
[2] H. Boujemaa, M. Rachidi and A. Micali, Automorphisms in Lotka-Volterra algebras, Alge-
bras Groups Geom. 18(2001) 203-222.
[3] H. Boujemaa, M. Rachidi and A. Micali, D"erivations dans les algA"bres de Lotka- Volterra,
Algebras Groups Geom. 2 (2004) 471-487.
[4] Juan C. Gutierrez Fernandez, Solution of the Bernstein problem in the non-regular case, J.
Algebra 223 (2000) 109-132.
[5] Juan C. Gutierrez Fernandez, Nuclear Bernstein algebras with a stochastic basis, J. Algebra
217 ( 1999) 300-311.
[6] uan C. Gutierrez Fernandez and Claudia I. Garcia, Antisymetric matrices and LotkaVolterra
algebras, https://arxiv.org/abs/1801.08888
[7] R. Ganikhodzhaev,
F. Mukhamedov, A. Pirnapasov
and
netic Volterra
https://doi.org/10.1080/00927872.2017.1347663.
algebras
and
their
derivations,
Comm.
I. Qaralleh, Ge-
(2017)
in Algebra
[8] P. Holgate, Genetic algebras satisfying Bernstein?s stationary principle, J. London Math.
Soc. 9 (1975) 621-624.
[9] P. Holgate, The interpretation of derivations in genetic algebras, Linear Algebra Appl. 85
(1987) 75-79
[10] Y. Itoh, Nonassociative algebra and Lotka-Volterra equation with ternary interaction, Non-
linear Anal. 5 (1981) 53-56.
[11] R.V. Kadison, Local derivations, Journal of Algebra 130 (1990) 494-509
[12] M. Kimura, On the change of population fitness by natural selection, Heredity 12 (1958)
145-167
[13] Y. Lyubich, Mathemmatical structures in population genetics, (Springer-Verlag, 1983).
[14] K. Mather, Selection through competition, Heredity 24 (1969) 529-540
[15] S. I. Yoon, Automorphisms of Lotka-Volterra algebras, Comm Korean Math. Soc. 12 (1997)
45-50
[16] S. I. Yoon, Idempotent elements in the Lotka-Volterra algebra., Comm Korean Math. Soc.
10 (1995) 123-13.
[17] Juan C. Gutierrez Fernandez and Claudia I. Garcia,Derivations of Lotka-Volterra alge-
bras,Sao Paulo Journal of Mathematical Sciences(2018)
[18] Worz-Busekros, A. (1980). Algebras in Genetics. Lect. Notes in Biomathematics. Vol. 36.
Berlin: Springer-Verlag.
[19] Reed, M. L. (1997). Algebraic structure of genetic inheritance. Bull. Amer. Math. Soc.(N.S.)
34:107130.
[20] Etherington, I. M. H. (1939). Genetic algebras. Proc. Roy. Soc. Edinburgh 59:242258
22
AHMAD ALARAFEEN
IZZAT QARALLEH
AZHANA AHMAD
[21] Bernstein, S. N. (1923). Principe de stationarit et gnralisation de la loi de Mendel. Comptes
Rendus Acad. Sci. Paris 177:581584.
[22] Bernstein, S. N. (1924). Solution of a mathematical problem connected with the theory of
heredity. Ann. Sci. de lUkraine 1:83114 (Russian).
[23] Mukhamedov, Farrukh, and Izzat Qaralleh. "On derivations of genetic algebras." Journal
of Physics: Conference Series. Vol. 553. No. 1. IOP Publishing, 2014.
[24] Mukhamedov, Farrukh, et al. "On Genetic and Evolution Algebras in Dimension Three."
International Journal of Algebra 10.7 (2016): 327-334.
[25] Qaralleh, Izzat, and Farrukh Mukhamedov. "Volterra Evolution Algebras and Their
Graphs." arXiv preprint arXiv:1904.10305 (2019).
[26] Qaralleh, Izzat. "On Genetic and Evolution Algebras." Journal of Physics: Conference
Series. Vol. 819. No. 1. IOP Publishing, 2017.
[27] Ladra, M., and U. A. Rozikov. "Evolution algebra of a bisexual population." Journal of
Algebra 378 (2013): 153-172.
Ahmad Alarafeen, School of Mathematical Sciences, , Universiti Sains Malaysia,
11800 USM, Penang, Malaysia
E-mail address: [email protected]
Izzat Qaralleh, Department of Mathematics, Faculty of Science, Tafila Tech-
nical University, Tafila, Jordan
E-mail address: izzat [email protected]
AZHANA AHMAD, School of Mathematical Sciences, , Universiti Sains Malaysia,
11800 USM, Penang, Malaysia
E-mail address: [email protected]
|
1211.5763 | 1 | 1211 | 2012-11-25T13:34:29 | On Artinian Rings with Restricted Class of Injectivity Domains | [
"math.RA"
] | In a recent paper of Alahmadi, Alkan and Lopez-Permouth, a ring R is defined to have no (simple) middle class if the injectivity domain of any (simple) R-module is the smallest or largest possible. Er, Lopez-Permouth and Sokmez use this idea of restricting the class of injectivity domains to classify rings, and give a partial characterization of rings with no middle class. In this work, we continue the study of the property of having no (simple) middle class. We give a structural description of right Artinian right nonsingular rings with no right middle class. We also give a characterization of right Artinian rings that are not SI to have no middle class, which gives rise to a full characterization of rings with no middle class. Furthermore, we show that commutative rings with no middle class are those Artinian rings which decompose into a sum of a semisimple ring and a ring of composition length two. Also, Artinian rings with no simple middle class are characterized. We demonstrate our results with several examples. | math.RA | math |
On Artinian Rings with Restricted Class of Injectivity Domains
Pınar Aydogdu∗
and
Bulent Sara¸c
Department of Mathematics, Hacettepe University, Beytepe 06800 Ankara / Turkey
Abstract
In a recent paper of Alahmadi, Alkan and L´opez -- Permouth, a ring R is defined to have no
(simple) middle class if the injectivity domain of any (simple) R -- module is the smallest or largest
possible. Er, L´opez -- Permouth and Sokmez use this idea of restricting the class of injectivity
domains to classify rings, and give a partial characterization of rings with no middle class. In
this work, we continue the study of the property of having no (simple) middle class. We give a
structural description of right Artinian right nonsingular rings with no right middle class. We
also give a characterization of right Artinian rings that are not SI to have no middle class, which
gives rise to a full characterization of rings with no middle class. Furthermore, we show that
commutative rings with no middle class are those Artinian rings which decompose into a sum of a
semisimple ring and a ring of composition length two. Also, Artinian rings with no simple middle
class are characterized. We demonstrate our results with several examples.
1
Introduction
Throughout this paper, our rings will be associative rings with identity, and modules will be unital
right modules, unless otherwise stated. For any ring R, Mod -- R will denote the category of all right
R -- modules.
Let R be a ring. Recall that an R -- module M is injective relative to an R -- module N (or, M is N --
injective) if, for any submodule K of N, any R -- homomorphism f : K → M extends to some member
of HomR(N, M ). It is evident that every module is injective relative to semisimple modules. Thus,
for any R -- module M, the injectivity domain In−1(M ) = {N ∈ Mod -- R : M is N -- injective} of M
contains all semisimple right R -- modules. In [1], Alahmadi, Alkan and L´opez -- Permouth initiated the
study of poor modules, namely modules whose injectivity domains consist only of semisimple modules
in Mod -- R. They consider rings over which every right module is either injective or poor, and refer
such rings as having no right middle class. The study of rings with no middle class has a growing
interest in recent years (see [1], [3], [6], and [9]).
In [3], Er, L´opez -- Permouth and Sokmez studied the rings with no right middle class and gave
a partial characterization of such rings. The following two theorems summarize the results on rings
with no right middle class obtained in [3]. To simplify the statements, we assume that the ring R is
not semisimple Artinian. All statements can be made to fit that possibility by setting T = 0.
Theorem 1 Let R be a right SI -- ring. Then R has no right middle class if and only if R ∼= S ⊕ T,
where S is semisimple Artinian and T is either
(i) Morita equivalent to a right P CI -- domain or
(ii) an indecomposable ring with homogenenous essential right socle satifying one of the following
equivalent conditions (where Q is the maximal right quotient ring of T ):
(a) Non-semisimple quasi -- injective right T -- modules are injective.
(b) Proper essential submodules of QT are poor.
(c) For any submodule A of QT containing Soc(TT ) properly, QA = Q.
Those rings of type (ii) are either right Artinian or right V -- rings and have a unique simple singular
right T -- module up to isomorphism.
Theorem 2 Let R be a ring with no right middle class which is not right SI. Then R ∼= S ⊕ T,
where S is semisimple Artinian and T is an indecomposable right Artinian ring satisfying the following
conditions:
∗Corresponding author : [email protected] (P. Aydogdu)
1
(i) soc(TT ) = Z(TT ) = J(T ),
(ii) T has homogeneous right socle, and
(iii) there is a unique non -- injective simple right T -- module up to isomorphism.
In this case T is either a QF -- ring with J(T )2 = 0, or poor as a right module. Conversely, if T is
a QF -- ring with homogeneous right socle and J(T )2 = 0, then T has no right middle class.
Note that the authors of [3] could not reverse this implication to show that the conditions (i) -- (iii)
in Theorem 2 above are sufficient as well as necessary. As a matter of fact, we show in our work that
there exist rings satisfying conditions (i) -- (iii) in Theorem 2 above which are poor as a right module
over itself and do have right middle class (see Examples 2.22 and 2.23). We also give a complete
characterization of non -- SI -- rings with no right middle class (see Theorem 2.16).
A characterization of right Artinian rings with no right middle class was given in Corollary 3.2 of [9].
Using that result in conjunction with those of [3], we have the following two complete characterizations:
Theorem 3 Let R be any ring. Then R has no right middle class if and only if R ∼= S ⊕ T, where S
is semisimple Artinian and T satisfies one of the following conditions:
(i) T is Morita equivalent to a right P CI -- domain, or
(ii) T is a right SI right V -- ring with the following properties:
(a) T has essential homogeneous right socle and
(b) for any submodule A of QT which does not contain the right socle of T properly, QA = Q,
where Q is the maximal right quotient ring of T, or
(iii) T is a right Artinian ring whose Jacobson radical properly contains no nonzero ideals.
Theorem 4 Let R be any ring. Then R has no right middle class if and only if R ∼= S ⊕ T, where S
is semisimple Artinian and T satisfies one of the following conditions:
(i) T is Morita equivalent to a right P CI -- domain, or
(ii) (a) T is a right Artinian ring or a right SI right V -- ring with homogeneous essential right
socle, and
(b) every nonsemisimple quasi -- injective right T -- module is injective.
In the process of studying these rings, various necessary or sufficient conditions are presented in
[3]. For instance,
(P1) R has homogeneous right socle, and
(P2) there is a unique simple singular right R -- module up to isomorphism
are necessary conditions for a nonsemisimple indecomposable right SI -- ring R to have no right middle
class (see [3, Theorem 2]). Likewise, in [3, Proposition 6], it is shown that right Artinian right SI -- rings
with homogeneous right socle anda unique local module of length two up tp isomorphism must have
no right middle class. We show here that (P1) and (P2) are not sufficient while the condition that
the ring has a unique local module of length two up to isomorphism is not necessary (see Examples
2.9(i) and 2.13).
It is shown, in [3, Corollary 5], that if R is an indecomposable right nonsingular right Artinian
ring with no right middle class, then R is isomorphic to a formal triangular matrix ring of the form
0
D
0
of Morita equivalences, we see that such rings simplifies to formal triangular matrix rings of the form
(cid:18) S
A S′ (cid:19) , where S and S′ are simple Artinian rings and A is an S′ -- S -- bimodule. Using the theory
(cid:18)
Mn×1(D) D′ (cid:19) , where D is a division ring and D′ is a division subring of Mn(D) for some positive
integer n (Theorem 2.1). We also prove that certain conditions on D′ characterizes these triangular
rings to have no right middle class which yields a general characterization for right nonsingular right
Artinian rings to have no right middle class (Theorem 2.5). This result also enables us to produce
many interesting examples of right nonsingular right Artinian rings with no right middle class.
It is also known from [3, Corollary 6] that if R is an indecomposable right Artinian ring with no
right middle class which is not right SI, then R is isomorphic to a formal triangular matrix ring of
0
X
the form (cid:18) Mn(A)
B (cid:19) , where A is a (nonsemisimple) local right Artinian ring, B is a semisimple
Artinian ring, and X is a B -- Mn(A) -- bimodule. As a matter of fact, a right Artinian ring which is not
right SI has no right middle class if and only if R ∼= S ⊕ Mn(A) where S is semisimple Artinian and
A is a local right Artinian ring whose Jacobson radical properly contains no nonzero ideals (Theorem
2.16).
2
In Section 3, we restrict our attention to only simple modules, and consider rings whose simple
right modules are either injective or poor. Such rings are said to have no simple middle class (see [1]).
We give necessary and sufficient conditions for a right Artinian ring to have no simple middle class.
The last section of our paper is concerned with the property of having no (simple) middle class in
the commutative setting. We give a complete description of commutative rings with no middle class.
In particular, we see that a commutative ring with no middle class is Artinian. We conclude our work
with a characterization of commutative Noetherian rings to have no simple middle class.
Recall that a ring is said to be a right V -- ring if every simple right module is injective. As a
generalization of right V -- rings, right GV -- rings were introduced by Ramamurthi and Rangaswamy
in [10]. A ring is called right GV if every simple singular module is injective, or equivalently, every
simple module is either injective or projective. We call a ring right SI if every singular right module
is injective (see[2]). Note that semilocal right GV -- rings are right SI.
If M is an R -- module, then E(M ), J(M ), Z(M ) and Soc(M ) will respectively denote the injective
hull, Jacobson radical, the singular submodule and the socle of M. We will use the notations ≤ and
≤e in order to indicate submodules and essential submodules, respectively. For a module with a
composition series, cl(M ) stands for the composition length of M. The ring of n × n matrices over a
ring R will be denoted by Mn(R). The notation A[i, j] will be used to indicate the (i, j) -- th entry of
a matrix A. We use eij to designate the standard matrix unit of Mn(R) with 1 in the (i, j) -- th entry
and zeros elsewhere. For any unexplained terminology, we refer the reader to [4] and [8].
2 Artinian Rings with No Middle Class
In [3, Corollary 5], Er, L´opez -- Permouth, and Sokmez proved that if R is an indecomposable
right nonsingular right Artinian ring with no right middle class, then R is isomorphic to a formal
triangular matrix ring of the form (cid:18) S
A S′ (cid:19) , where S and S′ are simple Artinian rings and A
is an S′ -- S -- bimodule. With the following theorem, we see that to determine when such rings have
no right middle class, it is enough to consider formal triangular matrix rings of the much simpler
0
form (cid:18)
positive integer n
D
Mn×1(D) D′ (cid:19) , where D is a division ring and D′ is a division subring of Mn(D) for some
0
Theorem 2.1 If R is a right Artinian right SI ring satisfying the properties (P 1) and (P 2), then it
is Morita equivalent to a formal triangular matrix ring of the form
(cid:18)
D
Mn×1(D) D′ (cid:19) ,
0
where D is a division ring and D′ is a division subring of Mn(D).
Proof. Since R is a right Artinian ring, there exists a complete set {e1, . . . , el, f1, . . . , fm} of local
orthogonal idempotents such that the eiR's are simple and fiR's are nonsemisimple local. Then
R = e1R ⊕ ··· ⊕ elR ⊕ f1R ⊕ ··· ⊕ fmR. By (P 2), fiR ∼= fjR for all i, j. Moreover, since eiR is
nonsingular, there is no nonzero R -- homomorphism from fjR into eiR, and so eiRfj = 0 for all i, j. As
R is right SI, R/Soc(RR) is semisimple Thus, J(R) ≤ Soc(RR). This gives that J(fiR) = Soc(fiR).
We set e = e1 + f1. Then eR = e1R ⊕ f1R. We shall prove that e is a full idempotent of R,
i.e., ReR = R. It is clear that e1, f1 ∈ ReR. Since R has homogeneous right socle, eiRe1R 6= 0
for all i = 1, . . . , l. Then ei ∈ eiR = eiRe1R ≤ ReR for all i = 1, . . . , l. Now, assume that
fk /∈ fkRf1R. Then fkRf1R ≤ Soc(fkR). Since R has homogeneous right socle and eiRfj = 0
for all i, j, fkRf1Rf1 = 0. Let u : f1R → fkR be an isomorphism of right R -- modules. Then
u(f1Rf1Rf1) = u(f1)Rf1Rf1 ≤ fkRf1Rf1 = 0, and so f1 ∈ f1Rf1Rf1 = 0, a contradiction. It follows
that fk ∈ fkRf1R ≤ ReR for all k = 1, . . . , m. Therefore, ReR = R.
Now let α be an endomorphism on E(f1R), and let α′ be the restriction of α to Soc(f1R). Suppose
Soc(f1R) = B1 ⊕ ··· ⊕ Bn, where B1, . . . , Bn are simple right R -- modules isomorphic to e1R, and let
vk : Bk → e1R be an isomorphism. Set αk = ikv−1
k and βk = vkπk, where ik is the natural embedding
of Bk into Soc(f1R), and πk the natural projection of Soc(f1R) onto Bk. Then the correspondence
α
ϕ
←→ (βiα′αj)n×n
3
between End(E(f1R)) and Mn(End(e1R)) gives a ring isomorphism. Moreover, since E(f1R) is
nonsingular and E(f1R)/Soc(f1R) is singular, this correspondence yields an embedding of End(f1R)
into Mn(End(e1R)). We denote ϕ(End(f1R)) by D′. Note that D′ is a division ring in view of the
proof of [3, Corollary 5]. Now it is routine to check that the mapping
eRe ∼=(cid:18)
0
End(e1R)
Hom(e1R, f1R) End(f1R) (cid:19) −→ (cid:18)
u2 u3 (cid:19) 7−→ (cid:18)
(cid:18) u1
0
0
D
Mn×1(D) D′ (cid:19) ,
(βku2)n×1 ϕ(u3) (cid:19) ,
u1
0
where D denotes End(e1R), is an isomorphism of rings. This completes the proof.
From now on, we will denote the formal triangular matrix ring
(cid:18)
D
Mn×1(D) D′ (cid:19)
0
by (D, Dn, D′).
Let R = (D, Dn, D′), where D is a division ring and D′ is a division subring of Mn(D). Then
R = (D, 0, 0) ⊕ (0, Dn, D′), where (D, 0, 0) is a simple right ideal and (0, Dn, D′) is a local right ideal
with the maximal submodule (0, Dn, 0).
Define (D, Mn(D))i as the set of ordered pairs (a, A), where a ∈ D, A ∈ Mn(D), and a scalar
multiplication
(a, A)(a1, (xk), A1) = (aa1 + A(i)(xk), AA1),
where (a1, (xk), A1) ∈ R and A(i) denotes the ith row of A. It is easy to see that (D, D′)i is a right
R -- submodule of (D, Mn(D))i. Also, if Bi = ⊕j6=iejD, where {e1, . . . , en} is the natural basis for Dn
over D, then (D, D′)i is isomorphic to
.
(0, Dn, D′)
(0, Bi, 0)
Lemma 2.2 u : (D, D′)i → (D, Mn(D))j is a nonzero R -- homomorphism if and only if there exist
d0 ∈ D and A0 ∈ Mn(D) such that A0[j, k] = δkid0 (k = 1, . . . , n) and u(d, A) = (d0d, A0A) for all
(d, A) ∈ (D, D′)i.
Proof. Straightforward.
Lemma 2.3 [3, Lemma 1] The property of having no (simple) middle class is inherited by factor
rings.
Lemma 2.4 Suppose a ring R = S ⊕ T is a direct sum of two rings S and T, where S is semisimple.
Then R has no (simple) middle class if and only if T has no (simple) middle class.
Proof. Let M be an N -- injective right R -- module, where N is cyclic and nonsemisimple. Then N is
isomorphic to a direct sum S/A ⊕ T /B of right R -- modules for some right ideals A and B contained
in S and T , respectively. Note that T /B is not semisimple (as both R -- and T -- modules). Since
M = M S ⊕ M T, M T is (T /B) -- injective as both R -- and T -- modules. By assumption, M T is an
injective right T -- module. However, it is not difficult to see that it is also injective as an R -- module.
We may also show, in a similar way, that M S is an injective right R -- module. This gives that M is an
injective R -- module. Thus we established the sufficiency part. The necessity is obvious by the above
lemma.
Let S be a subring of a ring R and u a unit in R. Obviously, uSu−1 is a subring of R isomorphic
to S as a ring. We call uSu−1 a conjugate ring of S in R.
Theorem 2.5 Let R be a right nonsingular right Artinian ring. Then R has no right middle class
if and only if R ∼= S ⊕ T, where S is a semisimple Artinian ring and T is zero or Morita equivalent
to a formal triangular matrix ring of the form (D, Dn, D′) where D is a division ring and D′ is a
division subring of Mn(D) such that for each conjugate ring U of D′ in Mn(D), the set of i -- th rows
of elements in U span Dn as a left D -- space for every i = 1, . . . , n.
4
Proof. Assume first that R has no right middle class. By [3, Theorem 2], R ∼= S ⊕ T, where S is
a semisimple Artinian ring and T is zero or a right Artinian right SI ring satisfying the properties
(P 1) and (P 2). Suppose T is not zero. Then by Theorem 2.1, T is Morita equivalent to a formal
triangular matrix ring of the form (D, Dn, D′), where D is a division ring and D′ is a division subring
of Mn(D). Since the property of having no right middle class is a Morita invariant property (as
remarked, for example, in [3] before Proposition 5), the ring (D, Dn, D′) has no right middle class.
j=1Deij )1 for all i = 1, . . . , n. By Lemma 2.2, (D, De1kD′)1 is (D, D′)k --
Note that (D, 0)1 ≤e (D,⊕n
injective as a right R -- module for all k = 1, . . . , n. Since R has no right middle class and (D, D′)k
is nonsemisimple, (D, De1kD′)1 must be injective for all k = 1, . . . , n. On the other hand, we have
(D, 0)1 ≤ (D, De1kD′)1 ≤ (D,⊕n
j=1De1j for all k = 1, . . . , n.
It therefore follows that the set of the k -- th rows of elements of D′ span Dn as a left D -- space for all
k = 1, . . . , n. Now let U = uD′u−1 for some unit u in Mn(D). Obviously, R ∼= (1, 0, u)R(1, 0, u−1) =
(D, Dn, U ). Then (D, Dn, U ) has no right middle class. Repeating the above arguments, we complete
the proof of the necessity part.
j=1De1j)1, which gives that De1kD′ = ⊕n
For the sufficiency, it is enough, by Lemma 2.4, to show that if, for each conjugate ring U of D′ in
Mn(D), the set of i -- th rows of elements in U span Dn as a left D -- space for every i = 1, . . . , n, then
the ring (D, Dn, D′) has no right middle class. Assume the contrary, i.e., assume that (D, Dn, D′)
has a right middle class. Note that the maximal right quotient ring of R is Q = Mn+1(D). By [3,
Proposition 8], there exists X ≤ QR which contains the right socle of (D, Dn, D′) properly such that
QX 6= Q. Since the right socle of the ring (D, Dn, D′) is (D, Dn, 0), there exists a nonzero right
D′ -- submodule Y of M(n+1)×n(D) such that
X =(cid:18) D
Dn
Y (cid:19) .
One can observe that if, for each i = 1, . . . , n, there exists an element of Y (depending on i) whose
i -- th column has a nonzero entry, then QX = Q. Thus, there exists j such that the j -- th column of
each element of Y is zero. Without loss of generality, we may assume j = 1. Then there exist elements
d1, . . . , dn−1 of D which are not all zero such that d1A[2, 1] +··· + dn−1A[n, 1] = 0 for all A ∈ D′. We
may choose dn−1 6= 0. Let B = e11 + (Pn
i=2 eii + di−1eni). Obviously, B is invertible in Mn(D), and
all elements of BD′B−1 have zero in the (n, 1) -- th entry. It follows that the n -- th rows of elements of
BD′B−1 cannot span Dn. This completes the proof.
Corollary 2.6 (i) Let D be a division ring and D′ a division subring of D. Then the ring(cid:18) D 0
D D′ (cid:19)
has no right middle class.
(ii) Let D be a division ring and D′ a division subring of M2(D). Then the ring R = (D, D2, D′)
has no right middle class if and only if the set of the ith rows of elements of D′ span D2 for i = 1, 2.
Proof. (i) Clear by Theorem 2.5. (ii) If we take n = 2 in the proof of Theorem 2.5, then we deduce
that when R has right middle class, there exists a nonzero element d ∈ D such that dA[2, 1] = 0 for
all A ∈ D′. This contradicts the fact that the set of the second rows of elements of D′ span D2.
It is shown in [3, Proposition 6] that if R is a right Artinian right SI -- ring with homogeneous right
socle and a unique local module of length two up to isomorphism, then R has no right middle class.
Example 2.9 below shows that the converse of this fact is not true in general. Before the example, we
need the following proposition.
Proposition 2.7 Let D be a division ring and D′ be a division subring of Mn(D). Let R = (D, Dn, D′)
and let R be the set of the first rows of all elements of D′. Then R has a unique local right R -- module
of length two up to isomorphism if and only if S(xi)∈R D(xi) = Dn.
Proof. Let M be a local right R -- module of length two. Then there exists an epimorphism g : R → M ,
and since M is local, we must have g(0, Dn, D′) = M . It follows that there exists a maximal submodule
A of (0, Dn, 0) such that A = Ker(g). Thus the unique simple submodule of M , say N , is isomorphic
to (D, 0, 0).
j=1 De1j)1 is injective relative to (D, D′)i for each i = 1, . . . , n, by Lemma 2.2.
j=1 De1j)1
j=1 De1j)1 is the injective hull of the local right R --
module (D, e11D′)1. There is an isomorphism from N to (D, 0)1 which extends to a homomorphism f
Observe that (D,Ln
Since R can be embedded into the sum (D, 0, 0)⊕(D, D′)1⊕···⊕(D, D′)n, we get that (D,Ln
is an injective R -- module. It follows that (D,Ln
5
j=1 De1j)1.
j=1 De1j)1 is nonsingular and M/N is singular, f must be
a monomorphism. It therefore follows that every local right R -- module of length two can be embedded
j=1 De1j)1. Since (D,Ln
from M into (D,Ln
into (D,Ln
Let M ′ be a local submodule of (D,Ln
right D′ -- subspace X of Ln
This shows that any local right R -- submodule of length two in (D,Ln
(D, (Pn
isomorphism from (D, (Pn
j=1 De1j)1 of length two. Then M ′ = (D, X)1 for a
j=1 De1j. Since M ′ is local, X must be one -- dimensional as a D′ -- space.
j=1 De1j)1 is of the form
j=1 e1jdj)D′)1 for some d1, . . . , dn ∈ D. Moreover, one can also prove that there exists an
j=1 e1jdj)D′)1 onto (D, e11D′)1 if and only if there exists a nonzero d ∈ D
i=1 if
i=1 ∈ R such that (di) = d(xi)n
such that d(di)n
and only if (di)n
i=1 ∈ R if and only if there exists d ∈ D and (xi)n
i=1 ∈S(xi)∈R D(xi). Now the result follows.
Remark 2.8 It can be easily seen from Corollary 2.6 (ii) that, for a division ring D and a division
subring D′ of M2(D), the ring
D
D
D
0
D′
has right middle class if and only if either all elements of D′ are lower triangular matrices or all
elements of D′ are upper triangular matrices. Suppose, in particular, that all elements of D′ are
upper triangular matrices. Then for every [aij ] ∈ D′, a22 is uniquely determined. Thus, we have a
mapping from D′ to D such that [aij] 7→ a22 for all [aij ] ∈ D′ which is a ring monomorphism, that is,
D′ can be embedded into D as a ring.
Example 2.9 (i) If D is a division ring and D′ is a division subring of M2(D) consisting only of
lower triangular matrices, then the ring (D, D2, D′) is a right Artinian right SI ring which satisfies the
properties (P 1) and (P 2). However, by Remark 2.8, (D, D2, D′) has right middle class. For instance,
if we let δ be a derivation on D and consider the division subring
D′ =(cid:26)(cid:18) a δ(a)
a (cid:19) a ∈ D(cid:27)
0
of M2(D), then the ring (D, D2, D′) has right middle class. Thus the converse of Theorem 2 of [3] is
not true, in general.
(ii) Let D = Z3 and w =(cid:18) 1
1
2
1 (cid:19) . Observe that D′ = {0, 1, w, w2, . . . , w7} is a field. By Remark
2.8, the ring (D, D2, D′) has no right middle class.
Example 2.10 Let p be a prime integer, F ≤ F1 a field extension, and K a division subring of Mp(F )
which properly contains the field of scalar matrices in Mp(F ). Then the ring
R = F1
1 K !
F p
0
If, in particular, we take F = Q, then any division subring of Mp(Q)
has no right middle class.
contains all scalar matrices. It follows that R has no right middle class for any division subring K of
Mp(Q) which is not the field of scalar matrices.
Proof. We first claim that for any i = 1, 2, . . . , p, the i -- th rows of all elements of K span F p as
an F -- space. To see this, let A be an element of K which is not a scalar matrix and let mA(x)
be the minimal polynomial of A over F. Let mA(x) = u(x)v(x), where u(x), v(x) ∈ F [x]. Then
0 = mA(A) = u(A)v(A), which implies that one of the determinants det(u(A)) or det(v(A)) is zero.
Assume that det(u(A)) = 0. Since K contains all scalar matrices over F, we have u(A) ∈ K. But K is
a division ring which means that every nonzero matrix in K has nonzero determinant. This gives that
u(A) = 0. Since deg(u(x)) ≤ deg(mA(x)) and mA(x) is the monic polynomial of least degree which
assumes A as a root, we must have u(x) and mA(x) are associates. It follows that mA(x) is irreducible
over F. Then the characteristic polynomial cA(x) of A over F is a power of mA(x). This implies that
deg(mA(x)) divides deg(cA(x)) = p. Since p is prime, deg(mA(x)) is either 1 or p. If deg(mA(x)) = 1,
then A is similar to a scalar matrix, B say. In other words, there exists a p × p invertible matrix
6
P over F such that P −1AP = B. Thus A = P BP −1 = BP P −1 = B, a contradiction. Therefore
mA(x) ∈ F [x] is an irreducible polynomial of degree p.
Now we shall show that for any i = 1, 2, . . . , p, the i -- th rows of the matrices I, A, . . . , Ap−1 span
F p as an F -- space. In order to prove this, without loss of generality, we may choose i = 1. Assume
the contrary, i. e., the first rows of the matrices I, A, . . . , Ap−1 do not span F p. Then the first rows of
these matrices should be linearly dependent. So, there exist scalar matrices c0, c1, . . . , cp−1 over F, not
all zero, such that the first row of the matrix C = c0 + c1A + ··· + cp−1Ap−1 is zero. This gives that
det(C) = 0. Since C lies in K, we must have C = 0. But then A happens to be a root of a polynomial
over F of degree at most p − 1, a contradiction. Consequently, for any i = 1, 2, . . . , p, the i -- th rows
of all elements of K span F p as an F -- space. This gives that the F -- space spanned by the i -- th rows
of elements of K contains the standard basis which is also contained in the F1 -- space spanned by the
i -- th rows of elements of K. Therefore, for any i = 1, 2, . . . , p, the i -- th rows of all elements of K span
F p
1 as an F1 -- space. This fact is true for any conjugate of K in Mp(F ) because, just as K, it also
properly contains the field of scalar matrices over F. The proof is complete by Theorem 2.5.
Remark 2.11 Let p be a prime number and F be a field. Let P (x) be an irreducible polynomial over
F of degree p (if exists) and let A ∈ Mp(F ) be such that P (A) = 0 (one can use the companion
matrix of P (x) from linear algebra to find such A). Then the set K = {c0 + c1A + ··· + cp−1Ap−1 :
c0, c1, . . . , cp−1 ∈ F} is a field isomorphic to F [x]/(P (x)) and properly contains the field of scalar
matrices over F. Indeed, we can show that all division subrings K of Mp(F ) properly containing the
field of scalar matrices are of this form: Let A be an element of K which is not a scalar matrix and
let B be any nonzero element of K. Since the set of the first rows of I, A, . . . , Ap−1 is a basis for F p,
we must have, by the same reasoning used in the proof of Example 2.10, there exist scalar matrices
c0, c1, . . . , cp−1, cp over F, not all zero, such that c0 + c1A + ··· + cp−1Ap−1 + cpB = 0. Here, clearly,
cp 6= 0. It follows that B is a linear combination of the powers Ai of A, where i = 0, 1, . . . , p − 1.
Therefore K = {c0 + c1A + ··· + cp−1Ap−1 : c0, c1, . . . , cp−1 ∈ F}.
Example 2.12 Let F be a field and P (x) be an irreducible polynomial over F of prime degree. Then
the ring
has no right middle class.
F
F [x]/(P (x)) F [x]/(P (x)) !
0
Proof. Let deg(P (x)) = p. Set K = {c0 + c1A + ··· + cp−1Ap−1 : c0, c1, . . . , cp−1 ∈ F}, where A is
the companion matrix of P (x) over F. It is routine to check that the mapping
F
F [x]/(P (x)) F [x]/(P (x)) ! −→ F
F p K ! ,
0
0
is a ring isomorphism. The result follows from Example 2.10 and Remark 2.11.
Example 2.13 The ring
R =
C
C
C
0
C
, where C =(cid:26)(cid:18) a −b
b
a (cid:19) a, b ∈ R(cid:27) ∼= C,
has no right middle class. However, R has at least two nonisomorphic local right R -- modules of length
two by Proposition 2.7. Therefore, the converse of [3, Proposition 6] is not true, in general.
Note that if a ring of the form (D, Dn, D′), where D and D′ are as above, has no right middle
class, then the property of having no right middle class of (D, Dn, D′) remains unaltered when we
7
by
a
p−1
Pi=0
cixi
0
p−1
dixi
Pi=0
7−→
a
c0
c1
...
cp−1
0
diAi
p−1
Pi=0
replace D by any division ring containing D. However, such a replacement may result in an increased
number of local modules of length two. On the other hand, as the following theorem shows, for the
ring R = (D, Dn, D′), it is necessary that certain local R -- modules of length two are isomorphic, which
is also sufficient when n = 2.
Lemma 2.14 Let 1 ≤ i, j ≤ n. Then (D, D′)i ∼= (D, D′)j if and only if D′ contains an element A
such that A[j, k] = δikc for some nonzero c ∈ D.
Proof. The proof is straightforward by Lemma 2.2.
Theorem 2.15 Let D be a division ring and D′ a division subring of Mn(D). If the ring
R =(cid:18)
D
Mn×1(D) D′ (cid:19)
0
has no right middle class, then there exists a conjugate D′′ of D′ in Mn(D) such that (D, D′′)i ∼=
(D, D′′)j for each i, j = 1, . . . , n as right (D, Dn, D′′) -- modules. In particular, if n = 2, then R has no
right middle class if and only if (D, D′)1 ∼= (D, D′)2.
Proof. Since the ring R has no right middle class, by Theorem 2.5, D′ has an element A such that
A[1, n] 6= 0. By standard techniques of linear algebra, it is not difficult to see that there exists a unit
y1 in Mn(D) such that B[1, i] = 0 for all i = 1, . . . , n − 1 and B[1, n] = A[1, n], where B = y1Ay−1
1 .
Now, pick an element A′ of D′ such that A′[1, n − 1] 6= 0. Then there exists a unit y2 ∈ Mn(D) such
that B′[1, i] = 0 for 1 ≤ i ≤ n, i 6= n− 1, and B′[1, n− 1] = A′[1, n− 1]. Notice that conjugating B by
y2 does not effect the current form of B, i.e., y2By−1
is still a matrix whose (1, n) -- th entry is nonzero
and (1, i) -- th entry is zero for every i = 1, . . . , n − 1. If we continue in this fashion, we may find a unit
y in Mn(D) such that the ring yD′y−1 contains elements A2, . . . , An, where Ai[1, k] = δikci for some
0 6= ci ∈ D for all i = 2, . . . , n. Now the first part of the theorem follows by Lemma 2.14. Moreover,
the remaining part also follows from the first part together with Corollary 2.6.
2
Our aim in concluding this section is to complete our investigation of rings which have no right
middle class. From Theorem 1 given in the introductory part, we know exactly what it means for a
right SI -- ring to have no right middle class . With the following theorem, we determine how precisely
rings with no right middle class which are not right SI look like.
Theorem 2.16 Let R be a ring which is not right SI. Then R has no right middle class if and only
if R ∼= S ⊕ Mn(A), where S is a semisimple Artinian ring, n is a positive integer, and A is either zero
or a local right Artinian ring whose Jacobson radical properly contains no nonzero ideals.
Proof. The sufficiency follows from [9, Corollary 2.14]. For the necessity, suppose that R is a ring with
no right middle class which is not right SI. By [3, Theorem 2], R ∼= S ⊕ T, where S is a semisimple
Artinian ring and T is zero or it is a ring as in Theorem 2(iii) of [3]. If T = 0, then we are done. Let T
be nonzero. Then by [3, Corollary 6], T ∼=(cid:18) Mn(A)
B (cid:19) , where A is a (nonsemisimple) local right
Artinian ring, B is a semisimple Artinian ring, and X is a B -- Mn(A) -- bimodule. Note that T has no
right middle class, too. As J(A) 6= 0, by [9, Corollary 2.14], we must have X = 0 and J(A) properly
contains no nonzero ideals. Since T is indecomposable, we must also have B = 0. This completes the
proof.
X
0
Corollary 2.17 Let R be a right Noetherian ring. Then R has no right middle class if and only if
R ∼= S ⊕ T, where S is a semisimple Artinian ring and T is zero or it is Morita equivalent to one of
the following rings:
(i) a right P CI -- domain, or
(ii) a formal triangular matrix ring of the form (D, Dn, D′) where D is a division ring and D′ is
a division subring of Mn(D) such that for each conjugate ring U of D′ in Mn(D), the set of i -- th rows
of elements in U span Dn as a left D -- space for every i = 1, . . . , n, or
(iii) a local right Artinian ring whose Jacobson radical properly contains no nonzero ideals.
Proof. The sufficiency follows from [3, Proposition 5], Theorem 2.5, and Theorem 2.16. For the
necessity, assume that R is a right Noetherian ring which has no right middle class. If R is right
Artinian, then by [3, Theorem 2], Theorem 2.5, and 2.16, R is Morita equivalent to a ring which
belongs to the class of rings in (ii) or (iii). If R is not right Artinian, then, by [3, Theorem 2], it is
either Morita equivalent to a right P CI -- domain or a V -- ring with essential socle. Since R is right
Noetherian, in the latter case R is semisimple Artinian. This completes the proof.
8
Corollary 2.18 Let R be any ring. Then R has no right middle class if and only if R ∼= S ⊕ T where
S is a semisimple Artinian ring and T is zero or it satisfies one of the following conditions:
(i) T is Morita equivalent to a right P CI -- domain, or
(ii) T ∼= Mn(A), where n is a positive integer, and A is a local right Artinian ring whose Jacobson
radical properly contains no nonzero ideals, or
(iii) T is an indecomposable right SI -- ring with homogeneous essential right socle which satisfies
one the following equivalent conditions (where Q is the maximal right quotient ring of T ):
(a) Non-semisimple quasi -- injective right T -- modules are injective.
(b) Proper essential submodules of QT are poor.
(c) For any submodule A of QT containing Soc(TT ) properly, QA = Q.
Proof. It follows from [3, Theorem 2 and Proposition 8] and Theorem 2.16.
Remark 2.19 Let R be a nonsemisimple right Artinian ring with no right middle class. For the sake
of simplicity, we assume that R is indecomposable. We know that either R is a QF -- ring with Jacobson
radical square zero or RR is poor. If R is a QF -- ring, then it is not right SI (because a nonsemisimple
right SI -- ring with no right middle class cannot be right self -- injective), and so, by Theorem 2.16,
R ∼= Mn(A) for some local right Artinian ring whose Jacobson radical properly contains no nonzero
ideals. Then A is also QF. If I is a nonzero right ideal of R, then J = r.ann(l.ann(I)) = I. This
gives that cl(RR) = 2, i.e., R is a right chain ring with right composition length two. However, there
are Artinian rings with no right (and left) middle class which are poor as a right (and left) module
although they have right (or left) composition length two (see Example 2.20).
Example 2.20 Let F be the field Q(√2) and α : F −→ Q defined by α(a + b√2) = a. Let R = F × F
as additive abelian group and define the multiplication on R as
(u, v)(w, z) = (uw, uz + vα(w)).
Then R is a noncommutative local Artinian ring with cl(RR) = 3 and cl(RR) = 2. Since cl(RR) = 2,
J(R) properly contains no nonzero ideals of R. It follows that R has no right (and left) middle class.
Also, R does not satisfy the double annihilator condition for right ideals. Then R cannot be QF, i.e.,
both RR and RR are poor.
Obviously, a ring with no right middle class is either right self -- injective or poor as a right module
over itself. It is known, from [3, Proposition 9], that the condition of Theorem 2(iii) in [3] are sufficient
if the ring is taken to be right self -- injective. The next two examples illustrate that these conditions
are not sufficient in general even if the ring is poor. In particular, these examples also indicate that
there are rings satisfying the conditions of Theorem 2(iii) in [3] which are not of the form Mn(A),
where A is as in Theorem 2.16. We first need the following lemma.
Lemma 2.21 Let R be a right semiartinian ring. Then RR is poor if and only if R is not injective
relative to a local right R -- module of length two.
Proof. The necessity is obvious. For the sufficiency, suppose that R is not injective relative to a local
right R -- module of length two. Let R be M -- injective. Without loss of generality, we may choose M
cyclic. Assume that M is not semisimple. Then there exists a local subfactor N of M of length two
since M is semiartinian. This gives that R is N -- injective, a contradiction.
Example 2.22 Let F be a field and V a finite dimensional vector space over F of dimension greater
than 1. Let R = (cid:26)(cid:18) a 0
v a (cid:19) : a ∈ F, v ∈ V(cid:27) . Then R is a commutative local Artinian ring which
satisfies the conditions of Theorem 2(iii) in [3]. However, R has right middle class by [9, Corollary
2.14]. Note too that R is poor as a module over itself. Indeed, if L is a local module of length two
with simple submodule S, then there is an isomorphism from S into R which cannot be extended to a
homomorphism from L. Otherwise, R would contain a local module of length two, which is impossible
since dimF (V ) > 1. Then R is not L -- injective. Hence, by Lemma 2.21, R is poor.
9
Example 2.23 Let R =(cid:18) Z/4Z
Z/2Z Z/2Z (cid:19) . Then
0
(1) Soc(RR) = J(R) = Z(RR),
(2) R has essential homogeneous right socle,
(3) there is a unique noninjective simple right R -- module up to isomorphism,
(4) RR is poor, and
(5) R has right middle class.
Proof. (1) It follows from [5, Proposition 4.2] that Soc(RR) = J(R) = Z(RR) =(cid:18) 2Z/4Z 0
Z/2Z 0 (cid:19)
(2) Since R is right Artinian, Soc(RR) ≤e RR. On the other hand, Soc(RR) = (cid:18) 2Z/4Z 0
(cid:18) 0
Z/2Z 0 (cid:19) , where simple summands are isomorphic.
(3) Since R/J(R) ∼= S ⊕ S′, where
0
0
0 (cid:19) ⊕
S =(cid:18) Z/2Z 0
0
0
0 (cid:19) , and S′ = (cid:18) 0
Z/2Z Z/2Z (cid:19)
(cid:18) 0
Z/2Z 0 (cid:19)
0
,
any simple right R -- module is isomorphic to either S or S′. As Soc(RR) ≤e RR, SR cannot be injective.
To establish (3), we shall show that S′
R is injective. Note that all proper essential right ideals of R are
0
0
0
0
0
0
I1 =(cid:18) 2Z/4Z 0
Z/2Z 0 (cid:19) , I2 =(cid:18) Z/4Z 0
Z/2Z 0 (cid:19) , and I3 =(cid:18) 2Z/4Z
Z/2Z Z/2Z (cid:19) .
If f : I1 −→ S is a nonzero homomorphism of R -- modules, then f (I1) = S. But I1(cid:18) 0 0
0 1 (cid:19) = 0 while
S(cid:18) 0
1 (cid:19) 6= 0, a contradiction. Thus HomR(I1, S) = 0. Similarly, HomR(I2, S) = 0. Now, let f :
I3 −→ S be a nonzero homomorphism. Observe that there are only two maximal right R -- submodule
of I3 : Soc(RR) and M =(cid:18) 0
Z/2Z Z/2Z (cid:19) . Since I3/M ≇ S, we must have Ker(f ) = Soc(RR). It
follows that there exists a unique nonzero homomorphism f : I3 −→ S, which can be extended to a
homomorphism R −→ S. Therefore, SR is injective.
(4) Note that there are two local right R -- modules of length two up to isomorphism: X =
(cid:18) Z/4Z 0
Z/2Z Z/2Z (cid:19) . Indeed, we can decompose RR as R = X ⊕ Y. Notice
that both X and Y are local right R -- modules of length two. Now let M be a local right R -- module
of length two. Then there exists an epimorphism f : R −→ M. Since M is local, f (X) = M or
f (Y ) = M. This gives that X ∼= M or Y ∼= M.
x 0 (cid:19) ,
where 0 6= x ∈ Z/2Z, is an R -- homomorphism which does not extend to a homomorphism f : X −→ R.
Indeed, if f(cid:18) 1
0 (cid:19) −→ R defined by(cid:18) 2
0 (cid:19) =(cid:18) 2a
R is not X -- injective because the map(cid:18) 2Z/4Z 0
0 (cid:19) and Y = (cid:18) 0
b (cid:19) , then f(cid:18) 2
0 (cid:19) =(cid:18) a 0
0 (cid:19) 7−→(cid:18) 2
1 0 (cid:19) 7−→
Now we claim that R is not Y -- injective. To see this, let f :(cid:18) 0
1 0 (cid:19) . Then f is a homomorphism which cannot extend to a homomorphism g : Y −→ R. Indeed,
(cid:18) 2 0
if g(cid:18) 0
0 (cid:19) =
0 (cid:19) and
(cid:18) a 0
(cid:18) 0 0
b (cid:19) , then a = y = 0 since(cid:18) 0
1 (cid:19) =(cid:18) 0
1 (cid:19)(cid:18) 1
b (cid:19) . But we also have(cid:18) 0
1 (cid:19) =(cid:18) a 0
0 (cid:19) . Thus, g(cid:18) 0
b (cid:19)(cid:18) 0
0 (cid:19) = 0 and(cid:18) a 0
1 (cid:19)(cid:18) 0
b (cid:19)(cid:18) 1
0 (cid:19) =(cid:18) 0
0 (cid:19) , a contradiction.
0 (cid:19) =(cid:18) 0
0
0
2b (cid:19) , a contradiction.
Z/2Z 0 (cid:19) −→ R with(cid:18) 0 0
1
0
y
0
y
0
0
b
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
1
0
0
0
0
0
0
y
0
0
y
By Lemma 2.21, RR is poor.
(5) By [9, Corollary 2.14], R has right middle class.
10
3 Artinian Rings With No Simple Middle Class
Notice that right V -- rings have automatically no simple middle class. In the theorem below, we
consider right GV -- rings without simple middle class whose proof uses almost the same arguments as
those used in the proof of [3, Lemma 8]. Before giving the theorem, we need the following lemma.
Lemma 3.1 Suppose that R is not a right V -- ring. Then R is a right GV -- ring with no simple middle
class if and only if R has a simple projective poor module.
Proof. It follows from [1, Corollaries 4.4 and 4.5].
As a direct consequence of Lemma 3.1, we have the following lemma.
Lemma 3.2 Suppose that a ring R has no simple middle class. Then R is a right GV -- ring or every
simple projective right module is injective.
The proof of the following theorem uses the notion of orthogonal modules. Recall that two modules
are said to be orthogonal if they have no nonzero isomorphic submodules.
Theorem 3.3 Suppose that R is a right nonsingular right GV -- ring which is not a right V -- ring. If
R has no simple middle class, then there is a ring decomposition R = S ⊕ T , where S is semisimple
Artinian and the right socle of T is nonzero poor homogeneous. If, further, RR has finite uniform
dimension, then the converse also holds.
Proof. Claim 1 : Soc(RR) does not contain a direct sum of two infinitely generated orthogonal
submodules.
Assume that A and B are infinitely generated orthogonal submodules of Soc(RR). Then A and
B are noninjective modules. Let f be a homomorphism from E(B) into E(A). We will show that
Ker(f ) ≤e E(B). Let X be a nonzero submodule of E(B). Then X ∩ B 6= 0. If we assume that
Ker(f ) ∩ X = 0, then we get 0 6= X ∩ B ∼= f (X ∩ B). But this contradicts the fact that A and B are
orthogonal. Hence, Ker(f ) ∩ X 6= 0. It follows that E(B)/Ker(f ) ∼= Im(f ) is singular, and hence
Im(f ) = 0. Thus, A is E(B) -- injective. Since A is poor by [1, Corollary 4.5], B is injective, which is
a contradiction.
Claim 2 : One of the two nonisomorphic simple right ideals is injective.
If S1 and S2 are two nonisomorphic noninjective simple right ideals, then S1 is E(S2) -- injective
which implies by assumption that either E(S2) is semisimple or S1 is injective. This gives that either
S1 or S2 is injective.
By the same technique above, one can observe that a simple right ideal which is orthogonal to an
infinitely generated semisimple right ideal is injective. Thus, Soc(RR) can have only finitely many
homogeneous components. Let H1, H2, . . . , Hn be the homogeneous components of Soc(RR). Notice
that all the Hi's will have to be injective except possibly for at most one of them. If n = 1 and H1 is
noninjective, then Soc(RR) is homogeneous and poor, and so we are done. Now suppose n > 1, H1 is
either noninjective or zero, and H2, . . . , Hn are injective. Set S = H2 ⊕ ··· Hn. Then R = S ⊕ T for
some right ideal T .
Claim 3 : R = S ⊕ T is a ring direct sum, where Soc(TT ) is nonzero poor homogeneous.
Obviously, T S = 0. If ST 6= 0, then there exists s ∈ S such that sT 6= 0. But Soc(TT ) ≤ annr(s)
and ST ≤ S. We will show that X = annr(s) ∩ T ≤e T . Let I ≤ T such that X ∩ I = 0. Define
f : I → R, x 7→ sx. Clearly I ∼= Im(f ) = sI, and hence I = 0. Therefore, sT ∼= T /(annr(s) ∩ T )
is zero, which gives that ST = 0. Thus, we obtain a ring decomposition R = S ⊕ T , where S is
semisimple Artinian and Soc(TT ) ∼= H1 is homogeneous, and poor if H1 is nonzero. It is routine to
check that T is a right GV -- ring, too. If Soc(TT ) is zero, then T has to be a right V -- ring. But this
leads to the fact that R is a right V -- ring, a contradiction.
For the last statement, suppose that RR has finite uniform dimension and Soc(TT ) is poor homo-
geneous. Then Soc(TT ) is a direct sum of finitely many isomorphic simple right ideals. This gives
that simple right ideals of T are poor, by assumption. On the other hand T is also a GV -- ring. Since
a simple module is either projective or singular and a simple projective right T -- module is isomorphic
to a simple right ideal of T, we get that T has no simple middle class. Now the result follows from
Lemma 2.4.
11
Corollary 3.4 Let R be a nonsemisimple ring with no simple middle class. If R is a right semiar-
tinian right GV -- ring which is not a right V -- ring, then we have a ring decomposition R = S ⊕ T ,
where S is semisimple Artinian and Soc(TT ) is poor homogeneous.
Proof. Since right semiartinian right GV -- rings are nonsingular the result follows from Theorem 3.3.
Corollary 3.5 [1, Theorem 4.7] Let R be a semiperfect right GV -- ring. If R has no simple middle
class, then we have a ring decomposition R = S ⊕ T , where S is semisimple Artinian and T is a
semiperfect ring with homogeneous projective and poor right socle.
Proof. Since semilocal right GV -- rings are right semiartinian, the proof follows from Corollary 3.4.
Proposition 3.6 Let R be a right semiartinian ring with a singular right socle. If R has no simple
middle class, then R is an indecomposable ring with unique noninjective simple R -- module up to
isomorphism and Soc(RR) is homogeneous.
Proof. Since Soc(RR) 6= 0, R is not a GV -- ring.
If a simple right ideal is injective, then it is
projective. But this is a contradiction since simple right ideals are singular. Consequently, every
simple right ideal of R is noninjective. Let S be a simple right ideal and M be any noninjective
simple singular right R -- module. Since R is right semiartinian, there exists N ≤ E(M ) such that M
is maximal in N . Since S is poor, there exists a homomorphism f : N → E(S) such that f (N ) * S.
Then S ( f (N ). Since N has composition length two whereas f (N ) has at least two, f must be
monic. Thus, S ∼= M . Noninjective simple modules are not projective because of Lemma 3.2, whence
they are singular. Thus, R has a unique noninjective simple module up to isomorphism. Moreover,
since Soc(RR) is a direct sum of noninjective simple singular right ideals, it is homogeneous. Also, it
is clear that a semiartinian ring with homogeneous socle is indecomposable.
Theorem 3.7 If R is a right Artinian nonsemisimple ring with no simple middle class, then R has
a ring decomposition R = S ⊕ T , where S is semisimple Artinian and Soc(TT ) is poor homogeneous.
Moreover, Soc(RR) is either projective or singular.
Proof. If R is a right GV -- ring, then we are done with by Theorem 3.3. Suppose that R is not a right
GV -- ring. Then every simple projective module is injective by Lemma 3.2. Write Soc(RR) = P ⊕ N ,
where P is the sum of all simple projective right ideals of R.Then P is injective. Therefore, R = P ⊕K
for some right ideal K. Since N does not have any simple projective summand, P is an ideal of R. Now
we will show that R = P ⊕ K is a ring direct sum. Obviously, KP = 0. Assume that P K 6= 0. Then
there exists p ∈ P such that pK 6= 0. But Soc(K) ⊆ annr(p). We claim that X = annr(p)∩ K ≤e K.
Let I ≤ K such that X ∩ I = 0. Define f : I → R such that x 7→ px for all x ∈ I. Then
I ∼= Im(f ) = pI, and hence I = 0. Note that P is nonsingular since it is semisimple projective. It
follows that pK ∼= K/(annr(p) ∩ K) is both singular and nonsingular, and hence P K = 0. Thus,
R = P ⊕ K is a ring direct sum. Then K ∼= R/P has no simple middle class by Lemma 2.3. K is
nonzero because R is nonsemisimple. Hence, Soc(K) is nonzero, too. Also, Soc(K) ∼= N is singular.
By Proposition 3.6, K is an indecomposable ring with singular poor homogeneous right socle.
Theorem 3.8 Let R be a right Artinian ring. Then R has no simple middle class if and only if there
is a ring decomposition R = S ⊕ T where S is semisimple Artinian and T is zero or has one of the
following properties:
(1) T is a right SI -- ring with homogeneous right socle.
(2) T has a unique noninjective simple right R -- module up to isomorphism, and the right socle of
T is (homogeneous) singular.
Proof. (⇒) It follows from Lemma 3.2, Theorem 3.3, Proposition 3.6 and Theorem 3.7.
(⇐) Let T be a nonzero ring which is not a V -- ring and assume that it satisfies (1). Since T is
right Artinian, we have a decomposition T = e1T ⊕ . . . ⊕ enT ⊕ f1T ⊕ . . . ⊕ fkT , where ei and fj
form a complete set of local orthogonal idempotents, eiT are isomorphic simple right ideals, and fjT
are nonsimple local T -- modules. Since T is right SI, the simple modules of the form fjT /fjJ are
injective, where J denotes the Jacobson radical of T . Therefore, if a right module does not contain
an isomorphic copy of eiT , then it is semisimple. Now assume that eiT is M -- injective, where M is a
12
cyclic right module. Then we have a decomposition M = A1 ⊕ . . . ⊕ Ap ⊕ B1 ⊕ . . . ⊕ Bq, where Ak
and Bt are indecomposable modules such that the Ak's do not contain an isomorphic copy of eiT and
the Bt's contain an isomorphic copy of eiT . By the above argument, A1 ⊕ . . . ⊕ Ap is semisimple. On
the other hand, eiT is Bt -- injective. One can observe that B1 ⊕ . . . ⊕ Bq is semisimple, too. Hence,
eiT is poor.
Now assume that T satisfies (2). By assumption, T has no simple projective module. Then we
have a decomposition T = f1T ⊕ . . . ⊕ fmT , where fiT are nonsimple local modules. Let fiT /fiJ be
a noninjective module for some i. Assume that fiT /fiJ is M -- injective for a cyclic module M . We
can write M = A1 ⊕ . . . ⊕ Ap ⊕ B1 ⊕ . . . ⊕ Bq, where Ak and Bt are indecomposable modules such
that the Ak's do not contain an isomorphic copy of fiT /fiJ and the Bt's contain an isomorphic copy
of fiT /fiJ. Because T has a unique noninjective simple module up to isomorphism, A1 ⊕ . . . ⊕ Ap
is semisimple. B1 ⊕ . . . ⊕ Bq is also semisimple since fiT /fiJ is Bt -- injective for each t = 1,··· , q.
Hence, T has no simple middle class. Now, the theorem follows from Lemma 2.4.
Following [1], we call a ring R simple -- destitute if every simple right R -- module is poor. Notice
that, just as V -- rings, simple -- destitute rings also constitute a natural subclass of rings with no simple
middle class. In [1, Theorem 5.2], it is proved that if a right Artinian ring R has only one simple
module up to isomorphism, then R is simple -- destitute. Now we establish the converse of this theorem
as follows.
Corollary 3.9 Assume that R is a right Artinian ring. R is simple -- destitute if and only if either R
is semisimple or R has a unique simple module up to isomorphism.
Proof. (⇐) It follows from [1, Theorem 5.2].
It follows from [1,
Theorem 5.3] that Soc(RR) is singular. Then R is an indecomposable ring by Proposition 3.6. Since
R is neither a right V -- ring nor a right SI -- ring, we get the desired result by Theorem 3.8.
(⇒) If R is semisimple, then we are done. Suppose R is not semisimple.
We see, in [1] and [3], that the ring S =(cid:18) F 0
F F (cid:19) ,where F is a field, is of a particular interest.
In [1], it is shown that S has no simple middle class. In [3], Er et al. proved that S has, indeed, no
right middle class. It is also proved, in [3], that a QF -- ring R with J(R)2 = 0 and homogeneous right
socle has no right middle class. In the following theorem, we give a more general result by replacing
QF with Artinian serial. Note that the class of Artinian serial rings contains that of both QF -- rings
of above type and rings in the form of S.
Theorem 3.10 If R is an Artinian serial ring with J(R)2 = 0 and homogeneous right socle, then R
has no (simple) middle class.
Proof. Since R is Artinian serial, we can write R = ⊕n
i=1eiR, where ei's are local idempotents and
eiR's are uniserial. Suppose ekR is not simple for some k = 1, . . . , n. Since ekJ(R) is the unique
maximal submodule of ekR, ekJ(R) = l.annekR(J(R)) = Soc(ekR). Moreover, ekR is an injective
R -- module by [2, 13.5, p.124]. It follows that, for each i = 1, . . . , n, eiR is either a simple module
or an injective local module of length two. Now let etR and et′R be nonsimple. By homogeneity of
the right socle, we have Soc(etR) ∼= Soc(et′ R). Then the injectivity of et′ R yields an isomorphism
between etR and et′R. Thus the nonsimple eiR's are all isomorphic to each other.
Now let M be a (simple) module. Assume M is N -- injective, where N is cyclic. Since R is an
Artinian serial ring, by [4, Theorem 5.6], N = ⊕r
k=1Nk, where Nk's are cyclic uniserial. If N is not
semisimple, then there exists t such that Nt is not simple. Since Nt is cyclic and local, Nt ∼= ejR for
some j = 1, . . . , n. This gives that M is ejR -- injective. Also, M is injective relative to any eiR which
is simple. It follows that M is R -- injective, i.e., it is injective. This completes the proof.
Corollary 3.11 Let R be an indecomposable Artinian serial ring. Then R has no right middle class
if and only if J(R)2 = 0 and R has homogeneous right socle.
Theorem 3.10 shows that, for a nonsemisimple Artinian serial ring R with J(R)2 = 0 and homo-
geneous right socle, R has no right middle class if and only if R has no simple middle class. However,
one can find an Artinian serial ring with homogeneous right socle and no simple middle class which
has right middle class, as the following example illustrates.
Example 3.12 Let R = Z/8Z. Then R is an Artinian chain ring with no simple middle class by
Corollary 3.9. However, R has right middle class since J 2(R) 6= 0.
13
4 Commutative Rings
In this section, we focus on commutative rings and investigate the property of having no (simple)
middle class. We see that commutative rings with no middle class are precisely those Artinian rings
which decompose into a sum of a semisimple ring and a ring of composition length two. We start with
the following lemma.
Lemma 4.1 [5, Exercise 17, Ch. 1, Sec. B] Let R be a commutative Noetherian ring, and let P, Q
be prime ideals of R. Then P ⊆ Q if and only if HomR(E(R/P ), E(R/Q)) 6= 0.
Proposition 4.2 If R is a commutative Noetherian ring with no middle class, then R is Artinian.
Proof. Let R be a commutative Noetherian ring with no middle class. We shall complete the proof
by showing that Krull dimension of R is zero, i.e., every prime ideal of R is maximal. If R is a V -- ring,
then there is nothing to prove. So, assume that R is not a V -- ring. Then there exists a maximal ideal
P of R such that R/P is not injective. Hence E(R/P ) is not semisimple. Let Q be any prime ideal
of R such that Q 6= P. Then by above lemma, HomR(E(R/P ), E(R/Q)) = 0, and so R/Q is injective
relative to E(R/P ). Since R has no middle class and E(R/P ) is nonsemisimple, R/Q is injective.
Thus R/Q is a self -- injective domain, which implies that Q is a maximal ideal. This completes the
proof.
Theorem 4.3 A commutative ring R has no middle class if and only if there is a ring decomposition
R = S ⊕ T, where S is a semisimple Artinian ring, and T is zero or a local ring whose maximal ideal
is minimal.
Proof. Suppose first that R has no middle class. Then, by [3, Theorem 2], there is a ring decompo-
sition R = S ⊕ T where S is semisimple Artinian and T is either zero or fits in one of the following
three cases:
Case I : T is Morita equivalent to a right PCI domain T ′. In this case, since T ′ is right Noetherian,
so is T . Then by Proposition 4.2, T is Artinian. Thus T ′ is an Artinian domain, and hence a simple
ring. This gives that T is also a simple ring. Since T is commutative, it is a field.
Case II : T is an indecomposable SI -- ring which is either Artinian or a V -- ring. Assume first that
T is Artinian. Then T is a finite product of local rings. Thus indecomposability gives that T is a
commutative local Artinian ring. Suppose that T is not a field. Then there is a minimal nonzero ideal
A of T. Notice that A ∼= T /J(T ). But since T is an SI -- ring and T /J(T ) is singular as a T -- module, A is
injective. Then A is a direct summand of T, which contradicts the indecomposability of T. Therefore
T is a field. Now let T be a V -- ring. We may assume that T is not Noetherian. Then by [3, Lemma 5],
T is semiartinian. This gives that soc(T ) 6= 0. Let A be a nonzero minimal ideal of T. Since J(T ) = 0,
there exists a maximal ideal M which does not contain A. Then A ⊕ M = T. It follows that A = T
and hence T is a field.
Case III : T is an indecomposable Artinian ring with soc(T ) = J(T ). Note that, just as with Case
II, R is a local ring. It, therefore, follows from [9, Corollary 2.14] that T is a ring whose maximal
ideal J(T ) is minimal.
Conversely, if T is a commutative local ring whose maximal ideal is simple, then, clearly, T
has a unique (up to isomorphism) local module of length two (which is, indeed, T itself), and has
homogeneous soc(T ) = J(T ). Thus, by [3, Proposition 7], T has no middle class. Now the result
follows from Lemma 2.4.
We give the following immediate consequences of the above theorem.
Corollary 4.4 Any commutative ring with no middle class is Artinian.
Corollary 4.5 A commutative ring R is a local ring whose (unique) maximal ideal is minimal if and
only if
(i) R is indecomposable Artinian,
(ii) soc(R) = J(R), and
(iii) R has no middle class.
Now we turn our attention to commutative Noetherian rings with no simple middle class although
they need not be Artinian as the following lemma shows.
14
Lemma 4.6 A commutative local ring (not necessarily Noetherian) has no simple middle class.
Proof. Let R be a commutative local ring with the unique maximal ideal M. Let R/M be (R/I) --
injective for some proper ideal I of R. Then R/I is a V -- ring since its unique simple module is injective.
This gives that I = M, and so R/M is a poor module. This completes the proof.
Theorem 4.7 Let R be a commutative Noetherian ring. Then R has no simple middle class if and
only if there is a ring decomposition R = S ⊕ T where S is semisimple Artinian and T is a local ring.
Proof. The sufficiency follows easily from Lemma 2.4 together with the above lemma. For the
necessity, let R be a commutative Noetherian ring with no simple middle class. Suppose R is not
semisimple Artinian. Then R is not a V -- ring, and so there exists a maximal ideal M of R such that
R/M is a poor R -- module. Let P be a prime ideal of R with P * M. Then R/M is E(R/P) -- injective
by Lemma 4.1. Then E(R/P) is semisimple, i.e., E(R/P) = R/P and P is a maximal ideal of R.
Since R/P is injective, by [8, Theorem 3.71], RP is a field. This, in particular, gives that P contains
no prime ideals properly, and that Pk = P for every positive integer k. Since R is Noetherian, there
exist minimal prime ideals P1, . . . , Pn of R such that Pt1
n = 0. If R is local, then we are
done. So, suppose R is not local. If Pi is contained in M for every i = 1, . . . , n, then for any maximal
ideal P of R, Pt1
n = 0 ⊆ P which yields Pj ⊆ P for some j. Then we must have, by
above arguments, Pj = P = M, a contradiction. Thus we may arrange the Pi's in such a way that
P1, . . . , Ps are not contained in M but Ps+1, . . . , Pn are, for some s < n. It follows that P1, . . . , Ps, M
is the complete list of all maximal ideals of R, and that P1 ∩ . . .∩ Ps ∩ P
n = 0. It is also
easy to see that (P1 ∩ . . .∩ Ps)⊕ (P
n ) = R. Notice that P
n is a semisimple
Artinian ring isomorphic to R/(P1 ∩ . . . ∩ Ps) whereas P1 ∩ . . . ∩ Ps is a local ring isomorphic to
R/(Pts+1
s+1 ∩ . . .∩ Ptn
n ). This completes the proof.
1 ∩ . . . ∩ Ptn
1 ∩ . . . ∩ Ptn
s+1 ∩ . . . ∩ Ptn
ts+1
ts+1
ts+1
s+1 ∩ . . .∩ Ptn
s+1 ∩ . . .∩ Ptn
Acknowledgement: The authors would like to express their gratitude to Professor Sergio R.
L´opez-Permouth and the anonymous referee for their invaluable comments and suggestions which
improved the presentation of this work.
References
[1] A. N. Alahmadi, M. Alkan, S. R. L´opez -- Permouth, Poor Modules: The opposite of injectivity,
Glasgow Math. J. 52A (2010) 7 -- 17.
[2] N. V. Dung, D. V. Huynh, P. F. Smith, R. Wisbauer, Extending modules. With the collaboration
of J. Clark and N. Vanaja. Pitman Research Notes in Mathematics Series, 313. Longman Scientific
& Technical, Harlow; copublished in the United States with John Wiley & Sons, Inc., New York,
1994.
[3] N. Er, S. R. L´opez -- Permouth, N. Sokmez, Rings whose modules have maximal or minimal injec-
tivity domains, J. Algebra 330(1) (2011) 404 -- 417.
[4] A. Facchini, Module theory. Endomorphism rings and direct sum decompositions in some classes
of modules. Progress in Mathematics, 167. Birkhauser Verlag, Basel, 1998.
[5] K. R. Goodearl, Ring theory. Nonsingular rings and modules. Pure and Applied Mathematics,
No. 33. Marcel Dekker, Inc., New York-Basel, 1976.
[6] C. Holston, S. R. L´opez -- Permouth, N. Orhan Erta¸s, Rings whose modules have maximal or
minimal projectivity domain, J. Pure Appl. Algebra 216(3) (2012) 480 -- 494.
[7] T. Y. Lam, A first course in noncommutative rings. Graduate Texts in Mathematics, 131.
Springer-Verlag, New York, 1991.
[8] T. Y. Lam, Lectures on Modules and Rings. New York: Springer -- Verlag, 1998
[9] S. R. L´opez-Permouth, J. E. Simental, Characterizing rings in terms of the extent of the injectivity
and projectivity of their modules, J. Algebra 362 (2012) 56 -- 69.
[10] V.S. Ramamurthi, K.M Rangaswamy,Generalized V-Rings, Math. Scand. 31 (1972) 69 -- 77.
15
|
1210.0958 | 1 | 1210 | 2012-10-03T02:03:03 | Spectrum nonincreasing maps on matrices | [
"math.RA"
] | Maps $\Phi$ which do not increase the spectrum on complex matrices in a sense that $\Sp(\Phi(A)-\Phi(B))\subseteq\Sp(A-B)$ are classified. | math.RA | math |
SPECTRUM NONINCREASING MAPS ON MATRICES
GREGOR DOLINAR, JINCHUAN HOU, BOJAN KUZMA, AND XIAOFEI QI
Abstract. Maps Φ which do not increase the spectrum on complex
matrices in a sense that Sp(Φ(A) − Φ(B)) ⊆ Sp(A − B) are classified.
1. Introduction
Let Mn(C) be the set of all n × n matrices over the complex field C,
and let Sp(X) be the spectrum of X ∈ Mn(C). In [9], Marcus and Moyls
proved that every linear map Φ : Mn(C) → Mn(C) preserving eigenvalues
(counting multiplicities) is either an isomorphism or an anti-isomorphism.
Furthermore, by using their result, one can show that every linear map
Φ : Mn(C) → Mn(C) preserving spectrum of matrices (that is, Sp(Φ(A)) =
Sp(A) for all A ∈ Mn(C)) also has the standard form, that is, it is an
isomorphism or an anti-isomorphism.
This result has been generalized in different directions. Instead of matrix
algebras, the algebras of all bounded linear operators on a complex Banach
space were considered, see for example [2, 3, 8, 11] and the references therein.
Also, instead of linear or additive preservers, general preservers (without lin-
earity and additivity assumption) of spectrum on Mn(C) were considered.
Baribeau and Ransford [4] proved that a spectrum preserving C1 diffeomor-
phism from an open subset of Mn(C) into Mn(C) has the standard form.
Mrcun showed in [10] that, if Φ : Mn(C) → Mn(C) is a Lipschitz map with
Φ(0) = 0 such that Sp(Φ(A) − Φ(B)) ⊆ Sp(A − B) for all A, B ∈ Mn(C)
then Φ has the standard form. Costara in [7] improved the above result by
relaxing Lipschitzian property to continuity. Recently, the continuity of the
map was replaced by surjectivity. Namely, in [5], Bendaoud, Douimi and
Sarih proved that a surjective map Φ : Mn(C) → Mn(C) satisfying Φ(0) = 0
and Sp(Φ(A) − Φ(B)) ⊆ Sp(A − B) for all A, B ∈ Mn(C) has the standard
form. We should mention here that the condition Φ(0) = 0 is a harmless
normalization: If Ψ is any map with Sp(Ψ(A) − Ψ(B)) ⊆ Sp(A − B), then
Φ(X) := Ψ(X) − Ψ(0) also satisfies this property.
2010 Mathematics Subject Classification. 15A04, 15A18.
Key words and phrases. Spectrum, Matrix algebras, General preservers.
This work was partially supported by a joint Slovene-Chinese Grant BI-CN/11-13/9-2,
National Natural Science Foundation of China (11171249, 11101250, 11201329) and a
grant from International Cooperation Program in Sciences and Technology of Shanxi
(2011081039).
1
2
GREGOR DOLINAR, JINCHUAN HOU, BOJAN KUZMA, AND XIAOFEI QI
It is our aim to prove the following generalization of [7, Theorem 1] and
[5, Theorem 1.3], in which the maps considered are neither continuous nor
surjective.
Theorem 1.1. Let n ≥ 2. Suppose that Φ : Mn(C) → Mn(C) is a map with
Φ(0) = 0 and
Sp(Φ(A) − Φ(B)) ⊆ Sp(A − B)
for all A, B ∈ Mn(C).
Then there exists an invertible matrix S ∈ Mn(C) such that either Φ(A) =
SAS−1 for all A ∈ Mn(C) or Φ(A) = SAtS−1 for all A ∈ Mn(C), where At
denotes the transpose of A.
Remark 1.2. It was shown by Costara [7] that the maps which satisfy
Sp(Φ(A) − Φ(B)) ⊇ Sp(A − B) are also linear and of a standard form.
2. Structural features of bases of matrix algebras
In this section, some features of bases of Mn(C) will be given, which are
useful for proving our main result.
Z, the ring of integers, if the only possibility that Pn
numbers z1, . . . , zn ∈ Z is z1 = z2 = · · · = zn = 0.
Recall that complex numbers α1, . . . , αn are linearly independent over
i=1 ziαi = 0 for some
Lemma 2.1. Let α1(t), . . . , αn(t) be n linearly independent analytic func-
tions in t, defined in a neighborhood of a closed unit disc ∆. Then the set
of all parameters t0 ∈ ∆ such that the complex numbers α1(t0), . . . , αn(t0)
are linearly dependent over Z is at most countable.
Proof. An analytic function either vanishes identically or it has only finitely
many zeros in compact subsets. Since α1(t), . . . , αn(t) are linearly indepen-
dent, none of them can be identically zero, hence each of them has only
finitely many zeros in ∆. Let t1, . . . , tk be all the zeros of the product
α1(t)α2(t) · · · αn(t) and let t0 ∈ ∆ \ {t1, . . . , tk}. It is straightforward that
there exist integers z1, . . . , zn ∈ Z, with zn 6= 0, such that
z1α1(t0) + · · · + znαn(t0) = 0
if and only if there exist rational numbers pi ∈ Q (in fact, pi = zi
zn
that the meromorphic functions bαi(t) := αi(t)
αn(t) satisfy
) such
p1cα1(t0) + · · · + pn−1[αn−1(t0) + 1 = 0.
By linear independency, the meromorphic function αp1,...,pn−1 : t 7→ p1cα1(t)+
· · · + pn−1[αn−1(t) + 1 is nonzero. Thus it has at most finitely many zeros on
compact subsets of ∆\{t1, . . . , tk}, and so it has at most countably many ze-
ros in ∆. Since there are countably many functions αp1,...,pn−1 as p1, . . . , pn−1
varies along rational numbers, we get at most Q × Q = Q, i.e., at most
countably many points which annihilate one among the functions αp1,...,pn−1.
Adding also {t1, . . . , tk}, we see that there are at most countably many points
SPECTRUM NONINCREASING MAPS
3
t ∈ ∆, for which the complex numbers α1(t), . . . , αn(t) are linearly depen-
dent with zn 6= 0. If zn = 0 we are seeking for linear dependence of scalars
α1(t), . . . , αn−1(t). By the same argument as before, there are at most count-
ably many such t's, under additional hypothesis that zn−1 6= 0. Proceeding
inductively backwards, there are at most countably many parameters t ∈ ∆
for which α1(t), . . . , αn(t) are linearly dependent.
(cid:3)
2 ) , ( 2
To formulate the next technical lemma, we introduce the following no-
tation: given the set Ω ⊆ C of cardinality n, let ~Ω ⊆ Cn be the set of n!
column vectors in Cn such that the set of their components, relative to a
standard basis, equals Ω. For example, if Ω = {1, 2}, then ~Ω = {( 1
1 )}.
Lemma 2.2. There exist n sets Ω1, . . . , Ωn ⊆ C, each of cardinality n, such
that n vectors x1, . . . , xn are linearly independent for any choice of xi ∈ ~Ωi,
i = 1, . . . , n.
Proof. It suffices to prove that there exist n column vectors x1, . . . , xn ∈ Cn
such that (i) each of them has pairwise distinct components in a standard
basis, and (ii) for arbitrary permutation matrices P1, . . . , Pn, the vectors
P1x1, . . . , Pnxn are linearly independent. Let x1 be an arbitrary column
vector with pairwise distinct components. Assume x1, . . . , xk, k < n, are col-
umn vectors with the properties from the lemma. Then Lin{P1x1, . . . , Pkxk}
(the linear span of vectors P1x1, . . . , Pkxk) with P1, . . . , Pk permutation ma-
trices is a k-dimensional linear plane, and there are at most finitely many
such distinct k-dimensional subspaces of Cn for all possible choices of per-
mutation matrices. Since the union of such k-dimensional subspaces is a
closed proper subset of the whole space Cn, there exists a vector xk+1 ∈ Cn
which does not belong to any of these subspaces and has pairwise distinct
components. Let P1, . . . , Pk, Pk+1 be arbitrary permutation matrices.
If
Pk+1xk+1 ∈ Lin{P1x1, . . . , Pkxk}, then xk+1 ∈ P −1
k+1 Lin{P1x1, . . . , Pkxk} =
{P −1
k+1Pi, i = 1, . . . , k, are again per-
mutation matrices, we obtain a contradiction. Thus P1x1, . . . , Pk+1xk+1 are
linearly independent. By induction on n, the lemma is true.
(cid:3)
k+1Pkxk}, and since P −1
k+1P1x1, . . . , P −1
Let K denotes the set of all matrices in Mn(C) which have n pairwise
distinct eigenvalues, linearly independent over Z. For example, since π =
is not algebraic, the diagonal matrix diag(1, π, π2, . . . , πn−1) ∈ K.
3·14 . . .
We will use the following properties of the set K.
Lemma 2.3. Let B1, . . . , Bm ∈ K be a finite sequence of matrices in Mn(C).
Then, the set of matrices X ∈ K such that Bk −X ∈ K for each k = 1, . . . , m
is dense in Mn(C).
Proof. Choose any A ∈ Mn(C) and let ε > 0. We will show that there exists
X ∈ K such that kA − Xk < ε and Bk − X ∈ K for each k = 1, . . . , m.
Let B0 = 0. It is easy to see that the set Dn of matrices with n distinct
eigenvalues is dense and open in Mn(C). Hence we may find A0 ∈ Dn
arbitrarily close to A. Since Dn is open, each neighborhood of A0, which
4
GREGOR DOLINAR, JINCHUAN HOU, BOJAN KUZMA, AND XIAOFEI QI
is small enough, contains only matrices from Dn. So we may find A1 ∈ Dn
arbitrarily close to A0 such that B1 −A1 ∈ Dn. Proceeding recursively, there
exists A ∈ Mn(C) such that kA − Ak < ε and that, moreover, A − Bk ∈ Dn
for each k = 0, . . . , m. Without loss of generality we write in the sequel A
instead of A, that is, we assume that A, A − Bk are all in Dn, k = 1, . . . , m.
Note that, for each fixed k, 0 ≤ k ≤ m, by Lemma 2.2, there exist n
matrices Ck,1, . . . , Ck,n such that the spectral sets Sp(Bk − Ck,i) have the
properties stated in Lemma 2.2. Then, for such Ck,i, it is easily checked that
there exists a polynomial A(x) such that A(0) = A and A((m+n)k+i) = Ck,i
for each (k, i) ∈ M := {0, . . . , m} × {1, . . . , n}.
We claim that, for each fixed k, 0 ≤ k ≤ m, Sp(Bk − A(x)) consists of n
linearly independent functions which are analytic in a neighborhood of x =
0. In fact, the spectrum of analytic perturbation Bk − A(x) of Bk consists of
functions which are locally analytic outside a closed discrete set of branching
points (see, e.g., [1, Theorem 3.4.25]). Let b1, . . . , br be all the real branching
points of modulus smaller or equal to (m+n)m+n. Note that for j ∈ {0, (m+
n)k + i : (k, i) ∈ M}, A(j) = A if j = 0, and A(j) = Ck,i otherwise, and so
# Sp(Bk − A(j)) = n. Hence none of bi equals some j ∈ {0, (m + n)k + i :
(k, i) ∈ M}. Choose a piecewise linear path α : [0, (m + n)m + n] → C
which avoids and does not encircle branching points and passes through j =
(m + n)k + i, (k, i) ∈ M. Then the spectral points λk,1(α(s)), . . . , λk,n(α(s))
of Sp(Bk − A(α(s))) are continuous functions of s ∈ [0, n + m(m + n)]. By
the construction of Ck,i, for any choice of x1 ∈ ~Sp(Bk − Ck,1), . . . , xn ∈
~Sp(Bk − Ck,n), the vectors x1, . . . , xn are linearly independent. Then it
easily follows that the n functions λk,1(α(s)), . . . , λk,n(α(s)) are also linearly
independent for each fixed k. Hence, λk,1(x), . . . , λk,n(x) of Sp(Bk − A(x))
are linearly independent analytic functions in a neighborhood of the curve
given by path α. Moreover, since # Sp(A(0)) = # Sp(A) = n, x = 0 is
not a branching point. Thus, also the restrictions of λk,1(x), . . . , λk,n(x)
to a neighborhood of x = 0 are linearly independent and distinct analytic
functions since linear independence is checked by nonvanishing of analytic
function, i.e. Wronskian.
Finally, by Lemma 2.1, Bk − A(x) ∈ K for every k ∈ {0, . . . , m} and each
x outside a countable subset of C. Hence, there exists x arbitrarily close
to 0 such that Bk − A(x) ∈ K for every k ∈ {0, . . . , m}. Since A(0) = A,
we can find x such that X = A(x) is close to original matrix A, and that
Bk − X ∈ K for each k. In particular, B0 = 0 implies that also X ∈ K. The
proof is complete.
(cid:3)
In particular, Lemma 2.3 implies that the set K is dense in Mn(C) and
hence it contains a basis of Mn(C).
The following proposition is the main result of this section.
It gives a
interesting structural feature of basis of Mn(C), and is crucial for our proof
of Theorem 1.1.
SPECTRUM NONINCREASING MAPS
5
Proposition 2.4. If B1, . . . , Bn2 ∈ K is a basis in Mn(C), then there exists
a basis C1, . . . , Cn2 in Mn(C) such that Ci ∈ K and Bi − Cj ∈ K for every
i, j ∈ {1, . . . , n2}.
Proof. The matrices C1, . . . , Cn2 form a basis if and only if the n2×n2 matrix
of their coefficients with respect to the standard basis Eij of Mn(C) (ordered
lexicographically) is invertible. Hence, starting with the basis Eij (whose
matrix of coefficients is the n2 × n2 identity matrix), the small perturbation
of Eij is again a basis for Mn(C). We now use the fact that the set
K′ = {C ∈ K : C − Bi ∈ K, i = 1, 2, . . . , n2}
is dense in Mn(C) (Lemma 2.3). By the density of K′, we can find matrices
C11, C12, . . . , Cnn ∈ K with Cij arbitrarily close to Eij, such that Cij −
Bk ∈ K for each i, j, k. Since they are close to basis Eij, the matrices
C11, C12, . . . , Cnn are again a basis for Mn(C).
(cid:3)
3. Proof of Theorem 1.1
In this section we give a proof of our main result. Throughout we al-
ways assume that Φ : Mn(C) → Mn(C) is a map satisfying Φ(0) = 0 and
Sp(Φ(A) − Φ(B)) ⊆ Sp(A − B) for all A, B ∈ Mn(C). First let us state four
facts which were already used in a paper by Costara [7]. As usual, Tr(X)
denotes the trace of a matrix X.
Lemma 3.1. For every X ∈ Mn(C), we have Tr(Φ(X)) = Tr(X).
Proof. The proof is the same as the proof of Equation (8) in [7, pp. 2675 --
2676]. We omit the details.
(cid:3)
Lemma 3.2. If A − B ∈ K, then Sp(Φ(A) − Φ(B)) = Sp(A − B), counted
with multiplicities. In particular, A ∈ K implies Sp Φ(A) = Sp A.
Proof. The first claim follows by [7, Lemma 5], Lemma 3.1 and the linearity
of trace. The last claim follows by inserting B = 0.
(cid:3)
For any X ∈ Mn(C), let S2(X) be the second symmetric function in eigen-
values of a matrix X (i.e., the coefficient of xn−2 in characteristic polynomial
p(x) = det(xI − X)).
Lemma 3.3. For every X ∈ Mn(C), we have (Tr X)2 = Tr(X 2) + 2S2(X).
Proof. A straightforward calculation. Also see [7, Eq.(10)].
(cid:3)
Lemma 3.4. If A, B, (A − B) ∈ K, then Tr(AB) = Tr(Φ(A)Φ(B)).
Proof. For any A, B ∈ K such that A − B ∈ K, by Lemma 3.3, we have
Tr(cid:0)(A − B)2(cid:1) = (cid:0)Tr(A − B)(cid:1)2 − 2S2(A − B).
Since A − B ∈ K, Lemma 3.2 implies S2(A − B) = S2(Φ(A) − Φ(B)) and
Tr(A − B) = Tr(Φ(A) − Φ(B)). It follows that
(1)
Tr(cid:0)(A − B)2(cid:1) = (cid:0)Tr(Φ(A) − Φ(B))2(cid:1).
6
GREGOR DOLINAR, JINCHUAN HOU, BOJAN KUZMA, AND XIAOFEI QI
Moreover, note that A, B ∈ K. Likewise, A, B ∈ K implies Tr(A2) =
Tr(Φ(A)2) and Tr(B2) = Tr(Φ(B)2). Hence, linearizing (1) gives
(2)
Tr(AB) = Tr(Φ(A)Φ(B))
whenever A, B, A − B ∈ K.
(cid:3)
Proof of Theorem 1.1. Given a matrix X = (xij) ∈ Mn, let us introduce its
row vector RX := (x11, x12, . . . , x1n, x21, . . . , x2n, . . . , xnn) and its column
vector CX := (cid:0)x11, x21, . . . , xn1, x12, . . . , xn2, . . . , xnn(cid:1)t
. It is elementary that
Tr(XY ) = RX CY , and hence we may rewrite (2) into
(3)
RΦ(A)CΦ(B) = RACB
whenever A, B, A − B ∈ K (see also Chan, Li, and Sze [6]).
Now, for any A ∈ K, by Proposition 2.4, we can find a basis B1, . . . , Bn2 ∈
K such that A − Bi ∈ K. Using Bi in place of B in (3), we obtain a system
of n2 linear equations
RΦ(A)CΦ(Bi) = RACBi ,
i = 1, 2, . . . , n2.
Introducing two n2 × n2 matrices U := [CΦ(B1)CΦ(B2) . . . CΦ(Bn2 )] and C :=
[CB1 . . . CBn2 ], this system can be rewritten into
(4)
RΦ(A)U = RAC.
The identity holds for each A ∈ K satisfying A − Bi ∈ K. By Proposition
2.4 again, there exists another basis A1, . . . , An2 ∈ K such that Bi − Aj ∈ K
for every i, j ∈ {1, 2, . . . , n2}. Using Aj in place of A in (4), the identity (4)
can be rewritten into a matrix equation
VU = RC,
where R is an n2 ×n2 matrix with j-th row equal to RAj , and V is an n2 ×n2
matrix with j-th row RΦ(Aj). Since A1, . . . , An2 is a basis, the matrix R is
invertible. Likewise, since B1, . . . , Bn2 is a basis, C is invertible. This implies
invertibility of U . In particular, (4) yields
RΦ(A) = RACU −1 = RAW;
(W = CU −1)
for all A ∈ K with A − Bi ∈ K.
Set K′ = {A ∈ K : A − Bi ∈ K, i = 1, 2, . . . , n2}. By Lemma 2.3, the
set K′ is dense in Mn(C). Therefore we get
RΦ(X) = RXW,
∀ X ∈ K′.
Recall that W = CU −1 is an invertible n2 × n2 matrix. Now, define a linear
bijection Ψ : Mn(C) → Mn(C) by
RΨ(X) = RX W,
∀ X ∈ Mn(C).
The map Ψ coincides with Φ on a dense subset K′. Moreover, Lemma 3.2 im-
plies that Sp(Φ(K)) = Sp(K) for every K ∈ K′. Hence we have Sp(Ψ(K)) =
Sp(K) for K ∈ K′. It follows from the continuity of Ψ and of the spectral
function Sp : Mn(C) → C that Ψ is a linear bijection satisfying Sp(Ψ(X)) =
SPECTRUM NONINCREASING MAPS
7
Sp(X) for every X ∈ Mn(C). Then, by Marcus-Moyls [9], there exists an
invertible S ∈ Mn(C) such that either Ψ(X) = SXS−1 for all X ∈ Mn(C)
or Ψ(X) = SX tS−1 for all X ∈ Mn(C). This gives that either
or
Φ(K) = SKS−1
for all K ∈ K′,
Φ(K) = SK tS−1
for all K ∈ K′.
Clearly, neither the hypothesis nor the end result changes if we replace Φ
by the map X 7→ S−1Φ(X)S or by the map X 7→ (S−1Φ(X)S)t. So, with
no loss of generality, we can assume that
Φ(K) = K for all K ∈ K′.
We assert that Φ(X) = X for every X ∈ Mn(C). To show this, write
Y := Φ(X). By the assumption on Φ, for any K ∈ K′, we have
Sp(K − Y ) = Sp(Φ(K) − Φ(X)) ⊆ Sp(K − X).
Since K′ is dense in Mn(C) and as spectral function is continuous, we derive
Sp(A − Y ) ⊆ Sp(A − X)
for all A ∈ Mn(C).
For any A ∈ Mn(C), let B = A − Y . Then the above relation yields
(5)
Sp(B) ⊆ Sp(B + (Y − X))
for all B ∈ Mn(C).
We will show that Y = X. Assume on the contrary that Y − X 6= 0. In
addition, for the sake of convenience, we may also assume that Y − X is
already in its Jordan form. If Y −X is not a nilpotent matrix, then inserting
B = −(Y −X) in (5) yields a contradiction {0} 6= Sp(Y −X) ⊆ Sp(0) = {0}.
If Y −X = Jn1 ⊕· · ·⊕Jnk is a nonzero nilpotent matrix in its Jordan form, let
)t in (5), where we tacitly assume that A0 = I for
B = (J n1−1
any A ∈ Mn(C) including the zero matrix. Since Y − X 6= 0, there exists at
least one block of size ≥ 2. Clearly then, B is not invertible, but (Y −X)+B
is of full rank. This contradicts the fact that Sp(B) ⊆ Sp(B +Y −X). Hence
Y = X, that is, Φ(X) = X for each X ∈ Mn(C).
(cid:3)
n1 ⊕ · · · ⊕ J nk−1
nk
References
[1] B. Aupetit, A Primer on Spectral Theory, Springer-Verlag, New York, 1991.
[2] B. Aupetit, Spectrum-preserving linear mappings between Banach algebras or Jordan-
Banach algebras, J. London Math. Soc.(2) 62 (2000), 917 -- 924.
[3] B. Aupetit, H. du T. Mouton, Spectrum preserving linear mappings in Banach alge-
bras, Studia math. 109 (1994), 91 -- 100.
[4] L. Baribeau, T. Ransford, Non-linear spectrum-preserving maps, Bull. London Math.
Soc. 32 (2000), no. 1, 8 -- 14.
[5] M. Bendaoud, M. Douimi, M. Sarih, Maps on matrices preserving local spectra, Linear
and Multilinear Algebra (2012), DOI:10.1080/03081087.2012.716429.
[6] J.T. Chan, C.K. Li, N.S. Sze, Mappings preserving spectra of products of matrices,
Proc. Amer. Math. Soc. 135 (2007) 977 -- 986.
[7] C. Costara, Maps on matrices that preserve the spectrum, Linear Algebra Appl. 435
(2011), 2674 -- 2680.
8
GREGOR DOLINAR, JINCHUAN HOU, BOJAN KUZMA, AND XIAOFEI QI
[8] A.A. Jafarian, A.R. Sourour, Spectrum-preserving linear maps, J. Funct. Anal. 66
(1986), 255 -- 261.
[9] M. Marcus, B.N. Moyls, Linear transformations on algebras of matrices, Canad. J.
Math. 11 (1959), 61 -- 66.
[10] J. Mrcun, Lipschitz spectrum preserving mappings on algebras of matrices, Linear
Algebra Appl. 215 (1995), 113 -- 120.
[11] M. Omladic, P. Semrl, Spectrum-preserving additive maps, Linear Algebra Appl. 153
(1991), 67 -- 72.
(Gregor Dolinar) Faculty of Electrical Engineering, University of Ljubl-
jana, Trzaska cesta 25, SI-1000 Ljubljana, Slovenia
E-mail address: [email protected]
(Jinchuan Hou) School of Mathematics, Taiyuan University of Technology,
Taiyuan 030024, P. R. China
E-mail address: [email protected]
(Bojan Kuzma) 1University of Primorska, FAMNIT, Glagoljaska 8, SI-6000
Koper, and 2Institute of Mathematics, Physics and Mechanics, Department of
Mathematics, Jadranska 19, SI-1000 Ljubljana, Slovenia.
E-mail address: [email protected]
(Xiaofei Qi) School of Mathematical science, Shanxi University, Taiyuan
030006, P. R. China
E-mail address: [email protected]
|
1404.6263 | 2 | 1404 | 2015-04-01T19:01:01 | Effect algebras are the Eilenberg-Moore category for the Kalmbach monad | [
"math.RA"
] | The Kalmbach monad is the monad that arises from the free-forgetful adjunction between bounded posets and orthomodular posets. We prove that the category of effect algebras is isomorphic to the Eilenberg-Moore category for the Kalmbach monad. | math.RA | math |
EFFECT ALGEBRAS ARE THE EILENBERG-MOORE
CATEGORY FOR THE KALMBACH MONAD
GEJZA JEN CA
Abstract. The Kalmbach monad is the monad that arises from the free-
forgetful adjunction between bounded posets and orthomodular posets. We
prove that the category of effect algebras is isomorphic to the Eilenberg-Moore
category for the Kalmbach monad.
In [6], Kalmbach proved the following theorem.
1. Introduction
Theorem 1. Every bounded lattice L can be embedded into an orthomodular lattice
K(L).
The proof of the theorem is constructive, K(L) is known under the name Kalm-
bach extension or Kalmbach embedding.
In [10], Mayet and Navara proved that
Theorem 1 can be generalized: every bounded poset P can be embedded in an
orthomodular poset K(P ). In fact, as proved by Harding in [5], this K is then left
adjoint to the forgetful functor from orthomodular posets to bounded posets. This
adjunction gives rise to a monad on the category of bounded posets, which we call
the Kalmbach monad.
For every monad (T, η, µ) on a category C, there is a standard notion Eilenberg-
Moore category CT (sometimes called the category of algebras or the category of
modules for T ). The category CT comes equipped with a canonical adjunction
between C and CT and this adjunction gives rise to the original monad T on C.
In the present paper we prove that the Eilenberg-Moore category for the Kalm-
bach monad is isomorphic to the category of effect algebras.
2. Preliminaries
We assume familiarity with basics of category theory, see [9, 1] for reference.
2.1. Bounded posets. A bounded poset is a structure (P, ≤, 0, 1) such that ≤ is a
partial order on P , 0, 1 ∈ P are the bottom and top elements of (P, ≤), respectively.
Let P1, P2 be bounded posets. A map φ : P1 → P2 is a morphism of bounded
posets if and only if it satisfies the following conditions.
• φ(1) = 1 and φ(0) = 0.
• φ is isotone.
The category of bounded posets is denoted by BPos.
1991 Mathematics Subject Classification. Primary: 03G12, Secondary: 06F20, 81P10.
Key words and phrases. effect algebra, Kalmbach extension, orthomodular poset, monad.
This research is supported by grants VEGA G-1/0297/11,G-2/0059/12 of MS SR, Slovakia
and by the Slovak Research and Development Agency under the contracts APVV-0073-10, APVV-
0178-11.
1
2
GEJZA JEN CA
2.2. Effect algebras. An effect algebra is a partial algebra (E; ⊕, 0, 1) with a bi-
nary partial operation ⊕ and two nullary operations 0, 1 satisfying the following
conditions.
(E1) If a ⊕ b is defined, then b ⊕ a is defined and a ⊕ b = b ⊕ a.
(E2) If a ⊕ b and (a ⊕ b) ⊕ c are defined, then b ⊕ c and a ⊕ (b ⊕ c) are defined
and (a ⊕ b) ⊕ c = a ⊕ (b ⊕ c).
(E3) For every a ∈ E there is a unique a′ ∈ E such that a ⊕ a′ exists and
a ⊕ a′ = 1.
(E4) If a ⊕ 1 is defined, then a = 0.
Effect algebras were introduced by Foulis and Bennett in their paper [3].
In an effect algebra E, we write a ≤ b if and only if there is c ∈ E such that
a ⊕ c = b. It is easy to check that for every effect algebra E, ≤ is a partial order on
E. Moreover, it is possible to introduce a new partial operation ⊖; b ⊖ a is defined
if and only if a ≤ b and then a ⊕ (b ⊖ a) = b. It can be proved that, in an effect
algebra, a ⊕ b is defined if and only if a ≤ b′ if and only if b ≤ a′. In an effect
algebra, we write a ⊥ b if and only if a ⊕ b exists.
Let E1, E2 be effect algebras. A map φ : E1 → E2 is called a morphism of effect
algebras if and only if it satisfies the following conditions.
• φ(1) = 1.
• If a ⊥ b, then φ(a) ⊥ φ(b) and φ(a ⊕ b) = φ(a) ⊕ φ(b).
The category of effect algebras is denoted by EA. There is an evident forgetful
functor U : EA → BPos.
2.3. D-posets. In their paper [8], Chovanec and Kopka introduced a structure
called D-poset. Their definition is an abstract algebraic version the D-poset of fuzzy
sets, introduced by Kopka in the paper [7].
A D-poset is a system (P ; ≤, ⊖, 0, 1) consisting of a partially ordered set P
bounded by 0 and 1 with a partial binary operation ⊖ satisfying the following
conditions.
(D1) b ⊖ a is defined if and only if a ≤ b.
(D2) If a ≤ b, then b ⊖ a ≤ b and b ⊖ (b ⊖ a) = a.
(D3) If a ≤ b ≤ c, then c ⊖ b ≤ c ⊖ a and (c ⊖ a) ⊖ (c ⊖ b) = b ⊖ a.
Let D1, D2 be D-posets. A map φ : D1 → D2 is called a morphism of D-posets
if and only if it satisfies the following conditions.
• φ(1) = 1.
• If a ≤ b, then φ(a) ≤ φ(b) and φ(b ⊖ a) = φ(b) ⊖ φ(a).
The category of D-posets is denoted by DP.
There is a natural, one-to-one correspondence between D-posets and effect al-
gebras. Every effect algebra satisfies the conditions (D1)-(D3). When given a
D-poset (P ; ≤, ⊖, 0, 1), one can construct an effect algebra (P ; ⊕, 0, 1): the do-
main of ⊕ is given by the rule a ⊥ b if and only if a ≤ 1 ⊖ b and we then have
a ⊕ b = 1 ⊖(cid:0)(1 ⊖ a) ⊖ b(cid:1). The resulting structure is then an effect algebra with
the same ⊖ as the original D-poset. It is easy to see that this correspondence is, in
fact, an isomorphism of categories DP and EA.
Another equivalent structure was introduced by Giuntini and Greuling in [4].
We refer to [2] for more information on effect algebras and related topics.
THE KALMBACH MONAD
3
The following lemma collects some well-known properties connecting the ⊕, ⊖
and ′ operations in effect algebras (or D-posets). Complete proofs can be found, for
example, in Chapter 1 of [2]. We shall use these facts without an explicit reference.
Lemma 2.
(a) a ≤ b′ iff b ≤ a′ iff a ⊕ b exists and then
(a ⊕ b)′ = a′ ⊖ b = b′ ⊖ a.
(b) a ≤ b iff a ⊕ b′ exists and then
(b ⊖ a)′ = a ⊕ b′
(c) a ≤ c ⊖ b iff b ≤ c ⊖ a iff a ⊕ b ≤ c and then
c ⊖ (a ⊕ b) = (c ⊖ a) ⊖ b = (c ⊖ b) ⊖ a
(d) a ≤ b ≤ c iff a ⊕ (c ⊖ b) exists and then
c ⊖ (b ⊖ a) = a ⊕ (c ⊖ b).
2.4. Orthomodular posets. An orthomodular poset is a structure (A, ≤,′ , 0, 1)
such that (A, ≤, 0, 1) is a bounded poset and ′ is a unary operation (called ortho-
complementation) satisfying the following conditions.
• x ≤ y implies y′ ≤ x′.
• x′′ = x.
• x ∧ x′ = 0.
• If x ≤ y′, then x ∨ y exists.
• If x ≤ y, then x ∨ (x ∨ y′)′ = y.
If x ≤ y′, we say that x, y are orthogonal.
Let A1, A2 be orthomodular posets. A map φ : A1 → A2 is called a morphism
of orthomodular posets if and only if it satisfies the following conditions.
• φ(1) = 1.
• If a ≤ b′, then φ(a) ≤ φ(b)′ and φ(a ∨ b) = φ(a) ∨ φ(b).
Alternatively, we may define a morphism of orthomodular posets as order pre-
serving, preserving the orthocomplementation, and preserving joins of orthogonal
elements.
The category of orthomodular posets is denoted by OMP. An orthomodular
lattice is an orthomodular poset that is a lattice. We remark that the usual category
of orthomodular lattices, with morphisms preserving joins and meets is not a full
subcategory of OMP.
If A is an orthomodular poset, then we may introduce a partial ⊕ operation on
A by the following rule: x ⊕ y exists iff x ≤ y′ and then x ⊕ y := x ∨ y. The resulting
structure is then an effect algebra. This gives us the object part of an evident full
and faithful functor OMP → EA.
2.5. Kalmbach construction. If C = {x1, . . . , xn} is a finite chain in a poset P ,
we write C = [x1 < · · · < xn] to indicate the partial order.
Definition 3. [6] Let P be a bounded poset, write
K(P ) = {C : C is a finite chain in P with even number of elements}
Define a partial order on K(P ) by the following rule:
[x1 < x2 < · · · < x2n−1 < x2n] ≤ [y1 < y2 < · · · < y2k−1 < y2k]
4
GEJZA JEN CA
if for every 1 ≤ i ≤ n there is 1 ≤ j ≤ k such that
y2j−1 ≤ x2i−1 < x2i ≤ y2j.
Define a unary operation C 7→ C ⊥ on K(P ) to be the symmetric difference with
the set {0, 1}.
Originally, Kalmbach considered the construction only for lattices.
If P is a
′, 0, 1) is
bounded lattice, then K(P ) is a lattice as well. Moreover, (K(P ), ∧, ∨,
an orthomodular lattice. However, as observed by Harding in [5], K is not an
object part of a functor from the category of bounded lattices to the category of
orthomodular lattices.
On the positive side, for any bounded poset P , K(P ) is an orthomodular poset
(see [10]) and K can be made to a functor K : BPos → OMP.
Indeed, let
f : P → Q be a morphism in BPos and define K(f ) : K(P ) → K(Q) by the
following rule.
For an arrow f : P → Q in BPos, write
K(f )([x1 < x2 < · · · < x2n−1 < x2n]) =
{y ∈ Q : card({1 ≤ i ≤ n : f (xi) = y}) is odd}.
A more elegant way how to write the same rule is
K(f )([x1 < x2 < · · · < x2n−1 < x2n]) = ∆2n
i=1{f (xi)},
where ∆ is the symmetric difference of sets.
Then K is a functor. Moreover, as proved by Harding in [5], K is left-adjoint
to the forgetful functor U : OMP → BPos. Since every functor has (up to
isomorphism) at most one adjoint, this can be viewed as an alternative definition
of the Kalmbach construction.
The unit of the K ⊣ U adjunction is the natural transformation η : idBPos →
U K, given by the rule
ηP (a) =([0 < a] a > 0
a = 0
∅
and the counit of the adjunction is the natural transformation ǫ : KU → idOMP
given by the rule
ǫL([x1 < · · · < x2n]) = (x⊥
1 ∧ x2) ∨ · · · ∨ (x⊥
2n−1 ∧ x2n).
3. Kalmbach monad
Let C be a category. A monad on C can be defined as a monoid in the strict
monoidal category of endofunctors of C. Explicitly, a monad on C is a triple
(T, η, µ), where T : C → C is an endofunctor of C and η, µ are natural transfor-
mations η : idC → T , µ : T 2 → T satisfying the equations µ ◦ T µ = µ ◦ µT and
µ ◦ T η = µ ◦ ηT = 1T .
Every adjoint pair of functors F : C ⇄ D : G, with F being left adjoint, gives
rise to a monad (F G, η, GǫF ) on C.
Let (T, η, µ) be a monad on a category C. Recall, that the Eilenberg-Moore
category for (T, η, µ) is a category (denoted by CT ), such that objects (called al-
gebras for that monad) of CT are pairs (A, α), where α : T (A) → A, such that the
diagrams
(1)
(2)
THE KALMBACH MONAD
5
A
ηA /
T (A)
❉
❉
❉
❉
1A
❉
❉
❉
❉
!❉
α
A
T (α)
T 2(A)
T (A)
µA
α
T (A)
α
/ A
commute. A morphism of algebras h : (A1, α1) → (A2, α2) is a C-morphism such
that the diagram
T (A)
α1
T (h)
T (B)
α2
A
h
/ B
commutes.
Consider now the adjunction K ⊣ U between the categories, BPos and OMP
from the preceding section. This adjunction gives rise to a monad on BPos, which
we will denote (T, η, µ). Explicitly, T = U ◦ K, η remains the same and µ = U ǫK
turns out to be given by the following rule
where [C1 < C2 < · · · < C2n] is a chain of even length of chains of even length,
that means, an element of T 2(P ), and ∆ is the symmetric difference of sets.
µP(cid:0)[C1 < C2 < · · · < C2n](cid:1) = ∆2n
i=1Ci,
Theorem 4. The category of effect algebras is isomorphic to the Eilenberg-Moore
category for the Kalmbach monad.
Proof. From now on, let U be the forgetful functor U : EA → BPos. Let us define
a functor G : EA → BPosT . For an effect algebra A, define mA : T (U (A)) → U (A)
by the rule
mA(cid:0)[x1 < x2 < . . . x2n−1 < x2n](cid:1) = (x2 ⊖ x1) ⊕ · · · ⊕ (x2n ⊖ x2n−1).
We claim that G(A) = (U (A), mA) is an algebra for the Kalmbach monad. We
need to prove that the diagrams (1) and (2) commute. Clearly, for every x ∈ U (A),
(mA ◦ ηU(A))(x) = mA([0 < x]) = (x ⊖ 0) = x,
and we see that the triangle diagram (1) commutes. Consider now the square di-
agram (2): the elements of T 2(U (A)) are chains of chains of elements of U (A);
let [C1 < C2 < · · · < C2n] ∈ T 2(U (A)). Note that Ci < Cj implies that
mA(Ci) < mA(Cj ), so the elements of the sequence (mA(C1), . . . , mA(C2n)) are
pairwise distinct. Therefore,
(cid:0)mA ◦ T (mA)(cid:1)(cid:0)[C1 < C2 < · · · < C2n](cid:1) =
mA(cid:0)(cid:2)mA(C1) < mA(C2) < · · · < mA(C2n)(cid:3)(cid:1) =
(cid:0)mA(C2) ⊖ mA(C1)(cid:1) ⊕ · · · ⊕(cid:0)mA(C2n) ⊖ mA(C2n−1)(cid:1)
/
!
/
/
/
/
/
/
6
GEJZA JEN CA
Note that, if C < D in T (U (A)), then C∆D < D, mA(C) < mA(D) and
mA(D) ⊖ mA(C) = mA(C∆D). Using these facts,
(cid:0)mA ◦ µU(A)(cid:1)(cid:0)[C1 < C2 < · · · < C2n](cid:1) = mA(C1∆C2∆ . . . ∆C2n) =
mA(cid:0)(C1∆C2∆ . . . ∆C2n−1)∆C2n(cid:1) =
mA(C2n) ⊖ mA(C1∆C2∆ . . . ∆C2n−1) =
mA(C2n) ⊖(cid:0)mA(C2n−1) ⊖ mA(C1∆C2∆ . . . ∆C2n−2)(cid:1) =
(cid:0)mA(C2n) ⊖ mA(C2n−1)(cid:1) ⊕ mA(C1∆C2∆ . . . ∆C2n−2).
The desired equality now follows by a simple induction.
If f : A → B is a morphism of effect algebras, we define G(f ) = U (f ). We need
to prove that the diagram
T U(f )
T U (A)
T U (A)
mA
mB
U (A)
/ U (B)
U(f )
commutes. After some simple steps, this reduces to the following equality in B:
(3)
(cid:0)f (x2) ⊖ f (x1)(cid:1) ⊕ · · · ⊕(cid:0)f (x2n) ⊖ f (x2n−1)(cid:1) = mB(cid:0)∆n
for each [x1 < · · · < x2n] ∈ T (U (A)).
i=1{f (xi)}(cid:1),
Let us define an auxiliary function k : T (U (A)) → N: for C = [x1 < x2 < · · · <
x2n] ∈ T (U (A)), k(C) is the number of equal consecutive pairs in the sequence
(cid:0)f (x1), . . . , f (xn)(cid:1), that means, k(C) is the cardinality of the set {i : f (xi) =
To prove the equality (3), we use induction with respect to k(C). If k(C) = 0,
f (xi+1)}.
then the equality (3) clearly holds.
If k(C) > 0, then let us pick some i with f (xi) = f (xi+1). Then {f (xi)}∆{f (xi+1)} =
∅ and we may skip them on the right hand side of (3).
If i is odd, then f (xi+1) ⊖ f (xi) = 0 and we may delete that term from the
left-hand side of (3). If i is even, then
and we may simplify the left-hand side of (3) accordingly.
(cid:0)f (xi) ⊖ f (xi−1)(cid:1) ⊕(cid:0)f (xi+2) ⊖ f (xi+1)(cid:1) = f (xi+2) ⊖ f (xi−1)
So (3) is true if and only if it is true for the chain C − {xi, xi+1}. Clearly,
k(C − {xi, xi+1}) = k(C) − 1 and we have completed the induction step.
Let (A, α) be an algebra for the Kalmbach monad. Let us define a partial
operation ⊖ on the bounded poset A given by this rule: b ⊖ a is defined if and only
if a ≤ b and
b ⊖ a =(0
a = b
α([a < b]) a < b
We claim that E(A, α) = (A, ≤, ⊖, 0, 1) is then a D-poset, hence an effect algebra.
The axiom (D1) follows by definition.
Before we prove the other two axioms, let us note that for all a ∈ A, a ⊖ 0 = a.
Indeed, if 0 < a then the triangle diagram (1) implies that a = α([0 < a]) = a ⊖ 0
and for a = 0 we obtain a ⊖ 0 = 0 ⊖ 0 = 0 by definition of ⊖.
To prove (D2), let a, b ∈ A be such that a ≤ b.
/
/
/
THE KALMBACH MONAD
7
Let us prove that b ⊖ a ≤ b. If a < b, then [a < b] ≤ [0 < b] in the poset T (A)
and
If a = b then b ⊖ a = 0 ≤ b.
b ⊖ a = α(cid:0)[a < b](cid:1) ≤ α(cid:0)[0 < b](cid:1) = b ⊖ 0 = b.
Let us prove that b ⊖ (b ⊖ a) = a There are three possible cases.
(D2.1) Suppose that 0 < a < b. Then, [a < b] < [0 < b] in T (A) and hence (cid:2)[a <
b] < [0 < b](cid:3) ∈ T 2(A). Suppose that α(cid:0)[a < b](cid:1) = α(cid:0)[0 < b](cid:1). From the
commutativity of the square (2) we obtain
(cid:2)[a < b] < [0 < b](cid:3) ✤
µA
❴
T (α)
∅
❴
α
[0 < a] ✤
α
/ α(cid:0)[0 < a](cid:1) = 0
However, 0 < a = α(cid:0)[0 < a](cid:1) = 0 is false and we have proved that α(cid:0)[a <
b](cid:1) < α(cid:0)[0 < b](cid:1). Chasing the element (cid:2)[a < b] < [0 < b](cid:3) around the square
(cid:2)[a < b] < [0 < b](cid:3) ✤
(cid:2)α(cid:0)[a < b](cid:1) < α(cid:0)[0 < b](cid:1)(cid:3)
T (α)
❴
µA
❴
α
[0 < a] ✤
α
/ α(cid:0)[0 < a](cid:1) = α(cid:16)(cid:2)α(cid:0)[a < b](cid:1) < α(cid:0)[0 < b](cid:1)(cid:3)(cid:17)
gives us the equality in the bottom right corner, meaning that b ⊖ (b ⊖ a) = a.
(D2.2) Suppose that 0 = a. We already know that b ⊖ 0 = b and we may compute
b ⊖ (b ⊖ a) = b ⊖ (b ⊖ 0) = b ⊖ b = 0 = a.
(D2.3) Suppose that a = b. Then
b ⊖ (b ⊖ a) = b ⊖ 0 = b = a.
To prove (D3), let a, b, c ∈ A be such that a ≤ b ≤ c.
Let us prove that c ⊖ b ≤ c ⊖ a. If a = b, there is nothing to prove. If b = c, then
b ⊖ c = 0 ≤ c ⊖ a. Assume that a < b < c. Then [b < c] < [a < c] and
Let us prove that b ⊖ a = (c ⊖ a) ⊖ (c ⊖ b).
c ⊖ b = α(cid:0)[b < c](cid:1) ≤ α(cid:0)[a < c](cid:1) = c ⊖ a.
(D3.1) Suppose that a < b < c and assume that α([b < c]) = α([a < c]). The square
(cid:2)[b < c] < [a < c](cid:3) ✤
µA
❴
T (α)
∅
❴
α
[a < b] ✤
α
/ α(cid:0)[a < b](cid:1) = 0
gives us α(cid:0)[a < b](cid:1) = 0, so b ⊖ a = 0. However, using only the properties of ⊖
we already proved,
b = b ⊖ 0 = b ⊖ (b ⊖ a) = a < b,
/
/
/
/
/
/
/
/
/
8
GEJZA JEN CA
which is false. Thus, assuming α(cid:0)[b < c](cid:1) < α(cid:0)[a < c](cid:1) the square
(cid:2)[b < c] < [a < c](cid:3) ✤
(cid:2)α(cid:0)[b < c](cid:1) < α(cid:0)[a < c](cid:1)(cid:3)
T (α)
❴
α
❴
µA
[a < b] ✤
α
/ α(cid:0)[a < b](cid:1) = α(cid:16)(cid:2)α(cid:0)[b < c](cid:1) < α(cid:0)[a < c](cid:1)(cid:3)(cid:17)
gives us the equality in the bottom right corner meaning that
b ⊖ a = (c ⊖ a) ⊖ (c ⊖ b).
(D3.2) Suppose that b = c. Then
(c ⊖ a) ⊖ (c ⊖ b) = (c ⊖ a) ⊖ 0 = c ⊖ a = b ⊖ a.
(D3.3) If a = b, then there is nothing to prove.
If is now easy to check that an arrow h : (A, α) → (B, β) in BPosT is, at
the same time, a morphism of D-posets (and thus, a morphism of effect algebras)
E(A, α) → E(B, β). Indeed, h(0) = 0 and h(1) = 1. If a < b and h(a) < h(b), then
h(b ⊖ a) = h(cid:0)α([a < b])(cid:1) = β(cid:0)T (h)([a < b])(cid:1) = β(cid:0)[h(a) < h(b)](cid:1) = h(b) ⊖ h(a).
If a < b and h(a) = h(b) then
h(b ⊖ a) = h(α[a < b]) = β(cid:0)T (h)([a < b])(cid:1) = β(∅) = 0 = h(b) ⊖ h(a).
Therefore E is a functor from BPosT to EA.
It remains to prove that E, G are mutually inverse functors. Let A be an effect
algebra. We claim that EG(A) = A. The underlying poset of EG(A) and A is the
same. For all a < b,
b ⊖EG(A) a = mA([a < b]) = b ⊖A a,
hence EG(A) = A.
algebras EG(f ) = f , since both E and G preserve the underlying poset maps.
It is obvious that for every morphism f : A → B of effect
Let (A, α) be an algebra for the Kalmbach monad. We claim that (A, α) =
GE(A, α), that means, for all [x1 < · · · < x2k] ∈ T (A),
(4)
α([x1 < x2 < · · · < x2k−1 < x2k]) = (x2 ⊖ x1) ⊕ · · · ⊕ (x2k ⊖ x2k−1),
where the ⊕, ⊖ on the right-hand side are taken in E(A, α).
To prove (4) we need an auxiliary claim:
for every C ∈ T (A) and an upper
bound u of C with u /∈ C, α(C∆[0 < u]) = α([α(C) < u]). This is easily seen by
chasing the element [C < [0 < u]] ∈ T 2(A) around the square (2).
Clearly, equality (4) is true for k = 0. Suppose it is valid for some k = n ∈ N.
Then, for k = n + 1, equality (4) is then equivalent to
α([x1 < x2 < · · · < x2n−1 < x2n < x2n+1 < x2n+2]) =
α([x1 < x2 < · · · < x2n−1 < x2n]) ⊕ (x2n+2 ⊖ x2n+1)
/
/
/
THE KALMBACH MONAD
9
Put C = [x1 < x2 < · · · < x2n−1 < x2n]. Using the definition of ⊖ in E(A, α) and
applying the auxiliary claim twice we obtain
α(C) ⊕ (x2n+2 ⊖ x2n+1) =
x2n+2 ⊖(cid:0)x2n+1 ⊖ α(C)(cid:1) =
x2n+2 ⊖(cid:16)α(cid:0)(cid:2)α(C) < x2n+1(cid:3)(cid:1)(cid:17) =
x2n+2 ⊖(cid:0)α(cid:0)C∆[0 < x2n+1](cid:1)(cid:1) =
α(cid:16)(cid:2)α(cid:0)C∆[0 < x2n+1](cid:1) < x2n+2(cid:3)(cid:17) =
α(cid:0)(cid:2)C∆[0 < x2n+1]∆[0 < x2n+2](cid:3)(cid:1) =
α(cid:0)(cid:2)C∆[x2n+1 < x2n+2](cid:3)(cid:1) =
α(cid:0)[x1 < x2 < · · · < x2n−1 < x2n < x2n+1 < x2n+2](cid:1)
It is obvious that for every morphism f in BPosT , GE(f ) = f .
References
(cid:3)
[1] Awodey, S.: Category theory. No. 49 in Oxford Logic Guides. Oxford University Press (2006)
[2] Dvurecenskij, A., Pulmannov´a, S.: New Trends in Quantum Structures. Kluwer, Dordrecht
and Ister Science, Bratislava (2000)
[3] Foulis, D., Bennett, M.: Effect algebras and unsharp quantum logics. Found. Phys. 24, 1325 --
1346 (1994)
[4] Giuntini, R., Greuling, H.: Toward a formal language for unsharp properties. Found. Phys.
19, 931 -- 945 (1989)
[5] Harding, J.: Remarks on concrete orthomodular lattices. International Journal of Theoretical
Physics 43(10), 2149 -- 2168 (2004)
[6] Kalmbach, G.: Orthomodular lattices do not satisfy any special lattice equation. Archiv der
Mathematik 28(1), 7 -- 8 (1977)
[7] Kopka, F.: D-posets of fuzzy sets. Tatra Mt. Math. Publ. 1, 83 -- 87 (1992)
[8] Kopka, F., Chovanec, F.: D-posets. Math. Slovaca 44, 21 -- 34 (1994)
[9] Mac Lane, S.: Categories for the Working Mathematician. No. 5 in Graduate Texts in Math-
ematics. Springer-Verlag (1971)
[10] Mayet, R., Navara, M.: Classes of logics representable as kernels of measures. Contributions
to General Algebra 9, 241 -- 248 (1995)
Department of Mathematics and Descriptive Geometry, Faculty of Civil Engineer-
ing, Slovak Technical University, Radlinsk´eho 11, Bratislava 813 68, Slovak Republic
E-mail address: [email protected]
|
1506.07203 | 2 | 1506 | 2016-04-01T14:07:19 | Range-compatible homomorphisms on spaces of symmetric or alternating matrices | [
"math.RA"
] | Let $U$ and $V$ be finite-dimensional vector spaces over an arbitrary field $\mathbb{K}$, and $\mathcal{S}$ be a linear subspace of the space $\mathcal{L}(U,V)$ of all linear maps from $U$ to $V$. A map $F : \mathcal{S} \rightarrow V$ is called range-compatible when it satisfies $F(s) \in \mathrm{im}(s)$ for all $s \in \mathcal{S}$. Among the range-compatible maps are the so-called local ones, that is the maps of the form $s \mapsto s(x)$ for a fixed vector $x$ of $U$.
In recent works, we have classified the range-compatible group homomorphisms on $\mathcal{S}$ when the codimension of $\mathcal{S}$ in $\mathcal{L}(U,V)$ is small. In the present article, we study the special case when $\mathcal{S}$ is a linear subspace of the space $S_n(\mathbb{K})$ of all $n$ by $n$ symmetric matrices: we prove that if the codimension of $\mathcal{S}$ in $S_n(\mathbb{K})$ is less than or equal to $n-2$, then every range-compatible homomorphism on $\mathcal{S}$ is local provided that $\mathbb{K}$ does not have characteristic $2$. With the same assumption on the codimension of $\mathcal{S}$, we also classify the range-compatible homomorphisms on $\mathcal{S}$ when $\mathbb{K}$ has characteristic $2$. Finally, we prove that if $\mathcal{S}$ is a linear subspace of the space $A_n(\mathbb{K})$ of all $n$ by $n$ alternating matrices with entries in $\mathbb{K}$, and the codimension of $\mathcal{S}$ is less than or equal to $n-3$, then every range-compatible homomorphism on $\mathcal{S}$ is local. | math.RA | math | Range-compatible homomorphisms on spaces of
symmetric or alternating matrices
Cl´ement de Seguins Pazzis∗†
July 23, 2021
Abstract
Let U and V be finite-dimensional vector spaces over an arbitrary field
K, and S be a linear subspace of the space L(U, V ) of all linear maps from
U to V . A map F : S → V is called range-compatible when it satisfies
F (s) ∈ Im s for all s ∈ S. Among the range-compatible maps are the so-
called local ones, that is the maps of the form s 7→ s(x) for a fixed vector
x of U .
In recent works, we have classified the range-compatible group homo-
morphisms on S when the codimension of S in L(U, V ) is small. In the
present article, we study the special case when S is a linear subspace of the
space Sn(K) of all n by n symmetric matrices: we prove that if the codimen-
sion of S in Sn(K) is less than or equal to n−2, then every range-compatible
homomorphism on S is local provided that K does not have characteristic
2. With the same assumption on the codimension of S, we also classify
the range-compatible homomorphisms on S when K has characteristic 2.
Finally, we prove that if S is a linear subspace of the space An(K) of all
n by n alternating matrices with entries in K, and the codimension of S is
less than or equal to n − 3, then every range-compatible homomorphism on
S is local.
AMS Classification: 15A03, 15A30
Keywords: Range-compatible map, operator space, symmetric matrices, alter-
nating matrices.
∗Universit´e de Versailles Saint-Quentin-en-Yvelines, Laboratoire de Math´ematiques de Ver-
sailles, 45 avenue des Etats-Unis, 78035 Versailles cedex, France
†e-mail address: [email protected]
1
6
1
0
2
r
p
A
1
]
.
A
R
h
t
a
m
[
2
v
3
0
2
7
0
.
6
0
5
1
:
v
i
X
r
a
1
Introduction
1.1 Notation
Throughout the article, all the vector spaces are assumed to be finite-dimensional
and over a given arbitrary field K. Given vector spaces U and V , we denote by
L(U, V ) the space of all linear maps from U to V . Given abelian groups A and B,
we denote by Hom(A, B) the group of all homomorphisms from A to B. Group
homomorphisms will be simply called homomorphisms in this article.
Given non-negative integers n and p, we denote by Mn,p(K) the space of all
matrices with n rows, p columns and entries in K. For (i, j) ∈ [[1, n]] × [[1, p]], we
denote by Ei,j the matrix of Mn,p(K) in which all the entries equal zero except
the one at the (i, j)-spot, which equals 1. Given finite-dimensional vector spaces
U and V , equipped with respective bases B and C, and given a linear map
u : U → V , we denote by MB,C(u) the matrix of u in the bases B and C.
We set Mn(K) := Mn,n(K) and we denote by Sn(K) the subspace of Mn(K)
consisting of its symmetric matrices, and by An(K) the subspace of all n by n
alternating matrices with entries in K. Recall that a square matrix M ∈ Mn(K)
is called alternating whenever X T M X = 0 for all X ∈ Kn, which is equivalent
to having M skew-symmetric with all diagonal entries zero.
Given a square matrix M = (mi,j) ∈ Mn(K), we denote its diagonal vector
by
Given a vector X = (xi)1≤i≤n ∈ Kn and a map α : K → K, we denote by
X α := (α(xi))1≤i≤n the vector of Kn deduced from X by applying α entry-wise.
Let m, n, p, q be non-negative integers. Given respective subsets A and B of
Mm,n(K) and Mp,q(K), one sets
A ⊕ B :=(cid:26)(cid:20)A 0
0 B(cid:21) A ∈ A, B ∈ B(cid:27),
which is a subset of Mm+p,n+q(K). Note that if A and B are respective linear
subspaces of Sn(K) and Sp(K) (respectively, of An(K) and Ap(K)), then A ⊕ B is
a linear subspace of Sn+p(K) (respectively, of An+p(K)) with dimension dim A +
dim B.
2
∆(M ) :=
m1,1
...
mn,n
∈ Kn.
1.2 The problem
Let U and V be vector spaces, and S be a subset of L(U, V ). A map F : S → V
is called range-compatible whenever
∀s ∈ S, F (s) ∈ Im s.
It is called local when there exists a vector x ∈ U such that
∀s ∈ S, F (s) = s(x).
Clearly, every local map is range-compatible, but the converse is not true, even
for linear maps.
The study of range-compatible maps is a very recent topic in linear algebra.
It is mainly motivated by its connection with spaces of bounded rank matrices
and from the fact that it is a reformulation of the concept of algebraic reflexivity.
The basic result in the theory of range-compatible maps is the following one.
Theorem 1.1. Every range-compatible linear map on L(U, V ) is local.
This result was independently discovered by several authors (it is implicit in
[2], for instance). In [8], it was extended as follows.
Theorem 1.2. Let S be a linear subspace of L(U, V ) such that codim S ≤
dim V − 2. Then, every range-compatible linear map on S is local.
Then, in [5], this result was also extended to group homomorphisms, for
which the upper-bound dim V − 2 turns out to be optimal1.
Theorem 1.3. Let S be a linear subspace of L(U, V ) such that codim S ≤
dim V − 2. Then, every range-compatible homomorphism on S is local.
Theorem 1.2 is a major key in a generalization [8] of an important result
of Atkinson and Lloyd [1] on the classification of large spaces of matrices with
rank bounded above, and it was also used in a study of invertibility preservers
on large spaces of square matrices [9]. Further work on range-compatibility has
appeared recently: we refer to [5, 6, 7] for the latest developments of this topic.
1The upper-bound dim V − 2 is not optimal for linear maps, see Theorem 1.2 of [5] for the
optimal bound.
3
In this article, we shall focus on the special case when S is a linear subspace
of Sn(K) or An(K). Of course, S is then naturally identified with a linear sub-
space of L(Kn, Kn) through the canonical basis of Kn. The main motivation
for considering such subspaces is the potential application to the study of large
spaces of symmetric or alternating matrices with bounded rank: in further re-
search, the results of this article will be used to generalize theorems of Radwan
and Loewy [3, 4] on the structure of such spaces.
The determination of the range-compatible homomorphisms on Sn(K) was
achieved in [5]. For the characteristic 2 case, we need some additional terminol-
ogy before we can state the result.
Definition 1.1. Assume that K has characteristic 2. Let V and V ′ be vector
spaces over K. A root-linear map f : V → V ′ is a group homomorphism such
that
∀(λ, x) ∈ K × V, f (λ2x) = λf (x).
Note that if K has characteristic 2 and more than 2 elements, then only the
zero map from V to V ′ is both linear and root-linear. However, if #K = 2
root-linear maps coincide with linear maps.
Theorem 1.4 (Theorem 3.1 of [5]). Let n ≥ 2 be an integer.
(a) If K has characteristic not 2, then every range-compatible homomorphism
on Sn(K) is local.
(b) If K has characteristic 2, then the range-compatible homomorphisms on
Sn(K) are the sums of the local maps and the maps of the form M 7→ ∆(M )α
where α is a root-linear map from K to K.
(c) If K has more than 2 elements, then every range-compatible linear map on
Sn(K) is local.
1.3 Main results
Definition 1.2. Let S be a linear subspace of Sn(K).
A range-compatible homomorphism on S is called standard when it can be
extended into a range-compatible homomorphism on the full space Sn(K).
Thus, if K has characteristic not 2 and n ≥ 2, then standard range-compatible
homomorphisms are just local maps. If K has characteristic 2, then a range-
compatible homomorphism on S is standard if and only if it is the sum of a local
map and of a map of the form M 7→ ∆(M )α for some root-linear form α on K.
4
Now, we can state our main result on range-compatible homomorphisms over
spaces of symmetric matrices.
Theorem 1.5. Let S be a linear subspace of Sn(K) such that codim S ≤ n − 2.
Then, every range-compatible homomorphism on S is standard.
If #K > 2, only the zero map is both linear and root-linear. Thus, Theorem
1.5 yields:
Corollary 1.6. Let S be a linear subspace of Sn(K) such that codim S ≤ n − 2
and #K > 2. Then, every range-compatible linear map on S is local.
The following counter-example demonstrates that the upper-bound n − 2 is
optimal. For n ≥ 2, consider the subspace S := S1(K) ⊕ Sn−1(K) of Sn(K). Note
that S has codimension n − 1 in Sn(K). If there exists a non-linear homomor-
phism ϕ : K → K (which is the case if and only if K is not a prime field) then
the mapping
is obviously range-compatible but we check that it is not standard. Indeed, as
F is non-linear, if it is standard then K has characteristic 2 and more than 2
elements and there is a root-linear form α on K and linear forms β1, . . . , βn on
[0](n−1)×1(cid:21)
F : (mi,j) ∈ S 7→(cid:20) ϕ(m1,1)
+ ∆(M )α. Judging from the last entry
β1(M )
in F (M ), we would find that α is both root-linear and linear, and hence α = 0;
then we would see from the first entry of F (M ) that ϕ is linear, contradicting
our assumptions.
S such that F : M = (mi,j) 7→
...
βn(M )
Remark 1. An open problem remains to find the optimal upper-bound on the
codimension on S for all range-compatible linear maps on S to be local, provided
that K has more than 2 elements of course. We conjecture that a reasonable
upper-bound should be 2 dim V − 4, except for some very small fields for which
special cases might arise.
In any case, the following example shows that the
upper-bound should be less than or equal to 2 dim V − 4.
Consider the space U2 of all matrices of the form (cid:20)a b
and the map F : (mi,j) ∈ U 7→ (cid:20)m1,1
b 0(cid:21) with (a, b) ∈ K2,
0 (cid:21). The map F is non-local. However, F
5
is range-compatible because whenever M ∈ U2 r {0} satisfies F (M ) 6= 0, either
F (M ) is the first column of M or else M has rank 2 and hence its range contains
F (M ). For all n ≥ 2, we extend this counter-example as follows: we consider
the space S := U2 ⊕ Sn−2(K) and, for all M = (cid:20) A [0]
[0] B(cid:21) with A ∈ U2 and
B ∈ Sn−2(K), we set
[0](n−2)×1(cid:21) .
eF (M ) :=(cid:20) F (A)
Then, it is easy to check that eF is linear, range-compatible and non-local,
whereas codim S = 2n − 3.
Now, we turn to our main result on range-compatible homomorphisms on
spaces of alternating matrices.
Theorem 1.7. Let S be a linear subspace of An(K) such that codim S ≤ n − 3.
Then, every range-compatible homomorphism on S is local.
The following example shows that the upper-bound n−3 is optimal. Consider
indeed the subspace S consisting of all the alternating matrices A = (ai,j) such
that ai,1 = 0 for all i ∈ [[3, n]]. If K is not a prime field, we can choose a non-linear
group endomorphism ϕ of K, and hence
A ∈ S 7→
0
ϕ(a2,1)
[0](n−2)×1
is obviously range-compatible, but it is non-linear and hence non-local.
As in the symmetric case, the upper bound n − 3 in Theorem 1.7 does not
seem to be optimal if we restrict the study to range-compatible linear maps.
The following examples suggest that the optimal upper-bound in this situation
could be 2n − 6 if #K > 2, and 2n − 7 if #K = 2, unless n ≤ 3 in which case no
provision on the codimension of S appears necessary.
Example 2. Assume that n ≥ 4. Consider the space U of all matrices of M2(K) of
the form(cid:20)a b
0 a(cid:21) with (a, b) ∈ K2. As in Remark 1, one checks that(cid:20)a b
0 a(cid:21) 7→(cid:20)b
0(cid:21)
is range-compatible. Now, consider the space S of all matrices of the form
[0]2×2
A
[0](n−4)×2
−AT
B
C
6
[0]2×(n−4)
−C T
D
in which A ∈ U , B ∈ A2(K), C ∈ Mn−4,2(K) and D ∈ An−4(K). One checks
that S is a linear subspace of An(K) with codimension 2n − 5. The linear map
is range-compatible (as F (M ) is always a linear combination of the first two
columns of M ), but one checks that it is non-local.
Example 3. Assume that n ≥ 4 and #K = 2. We know from Theorem 1.4 that
c(cid:21) is range-compatible. Now, consider the space S of all matrices of
c(cid:21) 7→(cid:20)a
(cid:20)a b
b
the form
in which A ∈ S2(K), B ∈ A2(K), C ∈ Mn−4,2(K) and D ∈ An−4(K). One checks
that S is a linear subspace of An(K) with codimension 2n − 6. However, the
linear map
F : (mi,j) ∈ S 7→
0
0
m3,2
[0](n−3)×1
A
[0]2×2
[0](n−4)×2
−AT
B
C
F : (mi,j) ∈ S 7→
[0]2×(n−4)
−C T
D
0
0
m3,1
m4,2
[0](n−4)×1
is range-compatible (as F (M ) is always a linear combination of the first two
columns of M ), but one checks that it is non-local.
As an easy consequence of Theorem 1.7, we obtain the following result.
Theorem 1.8. Let n be an arbitrary non-negative integer. Every range-compatible
linear map on An(K) is local.
Let us immediately show how this result follows from Theorem 1.7.
Proof of Theorem 1.8. For n ≥ 3, the result is a direct consequence of Theorem
1.7. On the other hand, in a linear subspace S = Ks1 of L(U, V ) with dimension
at most 1, every-range compatible linear map is local:
indeed, given a linear
map F : S → V that is range-compatible, we have some x ∈ U such that
7
F (s1) = s1(x), and as the linear maps F and s 7→ s(x) coincide on a generating
subset of the vector space S, they are equal. For n ≤ 2, the claimed result thus
follows from that general basic point.
1.4 Strategy and structure of the article
In this article, we will follow the main method from [5], which consists in per-
forming inductive proofs over the dimension of the target space V , by using
quotient spaces. Here, a major problem appears: if S is a subspace of Sn(K) or
of An(K), "moding out" a non-zero subspace V0 of V yields an operator space
S mod V0 which cannot be represented by a space of symmetric of alternating
matrices, simply because the source and target spaces of the operators in S no
longer have the same dimension!
In order to rescue the quotient space tech-
nique, it is necessary to enlarge the theorem as to encompass not only subspaces
of Sn(K), but also subspaces of Sn(K)` Mn,p(K) for arbitrary integers n ≥ 2
and p ≥ 0 (and ditto for alternating matrices instead of symmetric ones). To
avoid the need of constantly going from matrix spaces to operator spaces, we
shall reframe the results in terms of subspaces of self-adjoint or alternating oper-
ators from U to the dual space of one of its subspaces V . Then, the generalized
versions of Theorems 1.5 and 1.7 can be proved by induction on the dimension
of V (with fixed U ), and Theorems 1.5 and 1.7 follow from the special case when
U = V .
The rest of the article is organized as follows. In Section 2, we give a quick re-
view of the main techniques for the study of range-compatible homomorphisms,
that is the quotient space technique and the splitting technique. We also intro-
duce some notation on duality that is used throughout the text. Sections 3 and
4 are devoted to the study of range-compatible homomorphisms, respectively on
spaces of self-adjoint operators and on spaces of alternating operators. These
two sections are logically independent from one another, but they are essentially
based upon similar methods. In the self-adjoint case, the main difficulty comes
from the case of fields with characteristic 2, whereas for alternating operators
the proof is common to all fields, but substantially more technical.
2 Quotient and splitting space techniques
2.1 Quotient space techniques
We recall the following notation and result from [5].
8
Notation 2.1. Let S be a linear subspace of L(U, V ) and V0 be a linear subspace
of V . Denote by π : V → V /V0 the canonical projection. Then, we set
which is a linear subspace of L(U, V /V0).
S mod V0 :=(cid:8)π ◦ s s ∈ S(cid:9),
Lemma 2.1. Let F : S → V be a range-compatible homomorphism. Then, there
is a unique range-compatible homomorphism F mod V0 : S mod V0 → V /V0 such
that
∀s ∈ S, (F mod V0)(π ◦ s) = π(F (s)),
i.e. such that the following diagram is commutative
S
F
s7→π◦s
V
π
S mod V0
F mod V0
/ V /V0.
When V0 = Ky for some non-zero vector y, we simply write S mod y instead
of S mod Ky, and F mod y instead of F mod Ky.
In terms of matrices, the case when V0 is a hyperplane reads as follows.
Corollary 2.2. Let S be a linear subspace of Mn,p(K) and F : S → Kn
be a range-compatible homomorphism. Then, there are group homomorphisms
F1, . . . , Fn such that
∀M ∈ S, F (M ) =
F1(R1(M ))
...
Fn(Rn(M ))
where R1(M ), . . . , Rn(M ) denote the rows of M .
2.2 On duality
Notation 2.2. Given a vector space V , the dual space of V (i.e. the set of all
linear forms on V ) is denoted by V ⋆.
9
/
/
/
Definition 2.3. Let V be a linear subspace of the vector space U . We denote
by V o the linear subspace of U ⋆ consisting of the linear forms on U that vanish
everywhere on V .
Let W be a linear subspace of U ⋆. We denote by oW the linear subspace of
U consisting of the vectors that annihilate all the linear forms in W .
In any case, the letter "o" stands for "orthogonal".
Remember that if U is finite-dimensional then o(V o) = V for every linear
subspace V of U , and (oW )o = W for every linear subspace W of U ⋆. Moreover,
for every linear subspace W of U ⋆, we have a natural isomorphism
U ⋆/W
≃−→ (oW )⋆.
In the rest of the article, we shall systematically use this isomorphism to identify
U ⋆/W with (oW )⋆. In particular, given a linear form f ⋆ ∈ U ⋆, the space U ⋆/Kf ⋆
is naturally identified with (Ker f ⋆)⋆.
We finish with some terminology on dual bases.
Definition 2.4. Let U be a finite-dimensional vector space and V be a linear
subspace of U , with respective dimensions p and n. A compatible pair of
bases of U and V ⋆ is a pair (B1, B⋆
2) in which B1 = (e1, . . . , ep) is a basis of U
such that (e1, . . . , en) is a basis of V whose dual basis is B⋆
2.
2.3 The splitting technique
Notation 2.5. Let n, p, q be non-negative integers, and A and B be respective
subsets of Mn,p(K) and Mn,q(K). We set
Aa B :=n(cid:2)A B(cid:3) (A, B) ∈ A × Bo.
The following easy lemma was established in [5].
Lemma 2.3 (Splitting Lemma). Let n, p, q be non-negative integers, and A and
B be linear subspaces, respectively, of Mn,p(K) and Mn,q(K).
Given maps f : A → Kn and g : B → Kn, set
fa g :(cid:2)A B(cid:3) ∈ Aa B 7−→ f (A) + g(B).
Then:
10
where f ∈ Hom(A, Kn) and g ∈ Hom(B, Kn).
(a) The homomorphisms from A` B to Kn are the maps of the form f` g,
(b) Given f ∈ Hom(A, Kn) and g ∈ Hom(B, Kn), the homomorphism f` g
is range-compatible (respectively, local) if and only if f and g are range-
compatible (respectively, local).
3 Range-compatible homomorphisms on large spaces
of symmetric matrices
3.1 Spaces of self-adjoint operators
The main obstacle in trying to prove Theorem 1.5 by induction is that, given a
vector y ∈ Kn r {0}, the operator space S mod y can no longer be represented
by a space of symmetric matrices. In order to circumvent that problem, we shall
both broaden the result and frame it in terms of operators rather than in terms
of matrices.
Definition 3.1. Let U be a vector space and V be a linear subspace of U . A
linear map f : U → V ⋆ is called self-adjoint when
∀(x, y) ∈ V 2,
f (x)[y] = f (y)[x],
i.e. when the bilinear form (x, y) ∈ V 2 7→ f (x)[y] is symmetric. The set of all
self-adjoint linear maps from U to V ⋆ is denoted by Ls(U, V ⋆). One checks that
it is a linear subspace of L(U, V ⋆).
Let (B1, B⋆
2) be a compatible pair of bases of U and U ⋆. A linear map from U
to U ⋆ is self-adjoint if and only if its matrix in B1 and B⋆
2 is symmetric. Hence,
we have a vector space isomorphism f ∈ Ls(U, U ⋆) 7−→ MB1,B⋆
2(f ) ∈ Sn(K),
where n := dim U . More generally, given a compatible pair (B1, B⋆
2) of bases
of U and V ⋆, a linear map f : U → V ⋆ is self-adjoint if and only if its matrix
in the bases B1 and B⋆
p := dim U .
Remark 4. Let W be a linear subspace of V ⋆. Then, through the canonical iden-
tification between V ⋆/W and (oW )⋆, the space Ls(U, V ⋆) mod W corresponds to
Ls(U, (oW )⋆).
2 belongs to Sn(K)` Mn,p−n(K), where n := dim V and
In particular, Ls(U, V ⋆) corresponds to Ls(U, U ⋆) mod V o.
11
Note these identifications have no impact on the problems under scrutiny,
which follows from the following general observation: given a linear subspace
S of L(U1, U2) (where U1 and U2 are arbitrary vector spaces) , a vector space
2 and a group homomorphism F : S → U2, the linear
isomorphism ϕ : U2
subspace S ′ := {ϕ ◦ s s ∈ S} of L(U1, U ′
2) is isomorphic to S through Φ :
s 7→ ϕ ◦ s, and F ′ := ϕ ◦ F ◦ Φ−1 is a group homomorphism from S ′ to U ′
2;
one checks that F is range-compatible (respectively, local) if and only if F ′ is
range-compatible (respectively, local).
≃→ U ′
Combining the splitting lemma and Theorems 1.2 and 1.4, we can easily de-
scribe the general form of range-compatible homomorphisms on Sn(K)` Mn,p(K)
for arbitrary integers n ≥ 2 and p ≥ 0. The interpretation in terms of operators
then reads as follows.
Proposition 3.1. Let U be a finite-dimensional vector space and V be a linear
subspace of U with dim V ≥ 2. Let (cid:0)(e1, . . . , ep), (e⋆
pair of bases of U and V ⋆.
1, . . . , e⋆
n)(cid:1) be a compatible
(a) If K does not have characteristic 2 then every range-compatible homomor-
phism on Ls(U, V ⋆) is local.
(b) If K has characteristic 2 then every range-compatible homomorphism on
Ls(U, V ⋆) splits in a unique fashion as the sum of a local map and of s 7→
α(s(ek)[ek]) e⋆
k for some root-linear form α on K.
nPk=1
As a corollary, we obtain the following result.
Corollary 3.2. Let U be a finite-dimensional vector space and V be a linear
subspace of U with dim V ≥ 2. Then, every range-compatible homomorphism on
Ls(U, V ⋆) can be written as G mod V o for some range-compatible homomorphism
G on Ls(U, U ⋆).
Proof. Let F be a range-compatible homomorphism on Ls(U, V ⋆). If F is local,
we have F : s 7→ s(x) for some x ∈ U and then it is clear that F = G mod V o
for G : s ∈ Ls(U, U ⋆) 7→ s(x).
Now, assume that K has characteristic 2. Let (e⋆
n) be a basis of V ⋆,
with pre-dual basis (e1, . . . , en) of V , which we extend into a basis (e1, . . . , ep)
of U . Denote by (f ⋆
p ) the dual basis of (e1, . . . , ep). One sees that
n+1, . . . , f ⋆
f ⋆
p belong to V o, whereas (f ⋆
1 , . . . , f ⋆
i )V = e⋆
i for all i ∈ [[1, n]].
1, . . . , e⋆
12
nPk=1
pPk=1
By Proposition 3.1, the map F splits as F1 + F2 with some local map F1 :
k for some root-linear form α on K.
s 7→ s(x) and with F2 : s 7→
α(s(ek)[ek]) e⋆
Setting G2 : s ∈ Ls(U, U ⋆) 7→
k , we check that G2 mod V o = F2,
whereas G1 mod V o = F1 for G1 : s ∈ Ls(U, U ⋆) 7→ s(x). Hence, F = (G1 +
G2) mod V o and G1 + G2 is range-compatible.
α(s(ek)[ek]) f ⋆
Now, we can extend the definition of standard maps as follows.
Definition 3.2. Let S be a linear subspace of Ls(U, V ⋆). A range-compatible
homomorphism on S is called standard when it can be extended into a range-
compatible homomorphism on the full space Ls(U, V ⋆).
In particular, when K has characteristic not 2 the standard range-compatible
homomorphisms are simply the local ones. Note that in any case the set of
all standard range-compatible homomorphisms on S is a linear subspace of
Hom(S, V ⋆).
We are now ready to state our main result on range-compatible homomor-
phisms on spaces of self-adjoint operators.
Theorem 3.3. Let U be a finite-dimensional vector space, V be a linear subspace
of U , and S be a linear subspace of Ls(U, V ⋆). Assume that codim S ≤ dim V −2
(here, the codimension of S is meant to be the one of S in the space Ls(U, V ⋆),
not in the full space L(U, V ⋆)). Then, every range-compatible homomorphism
on S is standard.
The special case U = V is simply Theorem 1.5.
The proof will require the following additional notation and remarks. Let S
be a linear subspace of Ls(U, V ⋆). To S, we can attach two operator spaces:
• The space
Sr :=(cid:8)fV f ∈ S(cid:9),
which is a linear subspace of Ls(V, V ⋆) (the subscript "r" stands for "re-
stricted");
• And the space of all f ∈ S that vanish everywhere on V , which we denote
by Sm and naturally reinterpret as a linear subspace of L(U/V, V ⋆) (the
subscript "m" stands for "modulo").
13
By the rank theorem, we have
dim S = dim Sr + dim Sm,
and on the other hand
dim Ls(U, V ⋆) = dim Ls(V, V ⋆) + dim L(U/V, V ⋆).
Let (B1, B⋆
2) be a compatible pair of bases of U and V ⋆, and denote by
M the matrix space representing S in them. Write B1 = (e1, . . . , ep) and set
B′
1 := (en+1, . . . , ep), which are bases of V and U/V ,
respectively. Every M ∈ M splits as
1 := (e1, . . . , en) and B′′
M =(cid:2)S(M ) R(M )(cid:3) with S(M ) ∈ Sn(K) and R(M ) ∈ Mn,p−n(K).
Then, the matrix space S(M) represents Sr in the bases B′
1. On the
other hand, if we denote by T the subspace of M consisting of all its matrices
M such that S(M ) = 0, then R(T ) represents Sm in the bases B′′
1 and B⋆
1 and B⋆
1.
3.2 Basic lemmas
Lemma 3.4. Let U be a finite-dimensional vector space with dim U ≥ 3. Let
W be a proper linear subspace of Ls(U, U ⋆). Then, there exist non-collinear
vectors f ⋆
1 and
no operator with range Kf ⋆
2 .
2 of U ⋆ such that W contains no operator with range Kf ⋆
1 and f ⋆
Proof. Assume on the contrary that there exists a non-zero linear form f ⋆ ∈ U ⋆
such that W contains a rank 1 operator with range g⋆ for all g⋆ ∈ U ⋆ r Kf ⋆.
We can find a basis B of U such that the coordinates of f ⋆ in the dual basis
B⋆ are all equal to 1. Denote by M the matrix space that represents W in the
bases B and B⋆. Then, M should be a proper linear subspace of Sn(K) where
n := dim U . Set X0 := (cid:2)1 · · ·
1(cid:3)T ∈ Kn. For all X ∈ Kn r KX0, we know
that M contains aXX T for some a ∈ K r {0}, and hence M actually contains
XX T for all such X. In particular, as n ≥ 3, we see that M contains Ei,i for
all i ∈ [[1, n]], and it also contains Ei,i + Ej,j + Ei,j + Ej,i for all i and j in
[[1, n]]2 with i 6= j. Hence, it contains Ei,j + Ej,i for all i and j in [[1, n]]2 with
i 6= j. By linearly combining those special matrices, we obtain that M = Sn(K),
contradicting the fact that M is a proper subspace of Sn(K).
Hence, for all f ⋆ ∈ U ⋆, there exists g⋆ ∈ U ⋆ r Kf ⋆ such that W contains no
1 ∈ U ⋆ r {0} such
operator with range Kg⋆. Starting from f ⋆ = 0, we obtain f ⋆
14
that W contains no operator with range Kf ⋆
more to find some f ⋆
Kf ⋆
2 .
2 ∈ U ⋆ r Kf ⋆
1 , and then we apply the result once
1 such that W contains no operator with range
Lemma 3.5. Let U be a vector space, V be a linear subspace of U , and S
be a linear subspace of Ls(U, V ⋆). Assume that codim S ≤ dim V − 2 and
dim V ≥ 3. Then, there are non-collinear vectors f ⋆ and g⋆ in V ⋆ such that
codim(S mod f ⋆) ≤ dim V − 3 and codim(S mod g⋆) ≤ dim V − 3.
Proof. Let f ⋆ be a non-zero vector of V ⋆. We say that f ⋆ is S-good if codim(S mod f ⋆) ≤
dim V − 3. Thus, f ⋆ is not S-good if and only if codim S = dim V − 2 and S
contains every rank 1 operator of Ls(U, V ⋆) with range Kf ⋆. Assume that we
1 , · · · , f ⋆
cannot find non-collinear S-good vectors. Then, we can find a basis (f ⋆
n)
of V ⋆ in which no vector is S-good. In particular, for all i ∈ [[1, n]], the space S
contains every operator whose kernel includes V and whose range is included in
Kf ⋆
i . Summing such operators yields that Sm = L(U/V, V ⋆), whence
codim Sr = codim S = dim V − 2 > 0.
Applying Lemma 3.4, we deduce that there are non-collinear vectors f ⋆ and g⋆
of V ⋆ such that Sr contains no operator whose range equals either Kf ⋆ or Kg⋆.
Then, f ⋆ and g⋆ are both S-good, which completes the proof.
Lemma 3.6. Let S be a linear subspace of Ls(U, V ⋆) such that codim S ≤
dim V −2 and dim V ≥ 3. Let F : S → V ⋆ be a range-compatible homomorphism.
Assume that there exist non-collinear vectors f ⋆
2 in V ⋆ such that both
maps F mod f ⋆
1 and f ⋆
2 are local. Then, F is local.
1 and F mod f ⋆
Proof. Subtracting a local map from F , we lose no generality in assuming that
F mod f ⋆
1 = 0, in which case we have a vector x ∈ U such that
and
∀s ∈ S, F (s) = s(x) mod Kf ⋆
2 ,
∀s ∈ S, F (s) ∈ Kf ⋆
1 .
In particular, we note that
∀s ∈ S,
s(x) ∈ span(f ⋆
1 , f ⋆
2 ).
Now, we show that x 6= 0 would lead to a contradiction. We distinguish
between three cases.
15
Case 1: x 6∈ V .
We choose a basis B = (e1, . . . , en) of V , whose dual basis we denote by B⋆.
dimensional) space of coordinates of the vectors of span(f ⋆
from the above that M is a subspace of M′
However, dim M ≥ dim M′, whence M = M′. Denote by G : M → Kn
the map on matrices that corresponds to F in the above bases. Then, the
range-compatible homomorphism G′ : P → Kn deduced from restricting G to
Then, (e1, . . . , en, x) can be extended into a basis eB of U . We denote by M
the space of matrices representing S in eB and B⋆, and we denote by P the (2-
:= Sn(K)` P` Mn,p−n−1(K).
{0}` P`{0} has rank 1! This is absurd as G′, being local by Theorem 1.3,
should be a scalar multiple of the identity of P .
2 ) in B⋆. It follows
1 , f ⋆
1 , f ⋆
1 , f ⋆
2 ) and x 6= 0.
Case 2: x ∈ o span(f ⋆
In that case, we choose two vectors e1, e2 of V such that f ⋆
i (ej ) = δi,j for all
(i, j) ∈ [[1, 2]]2, we note that x 6∈ span(e1, e2), and we extend (e1, e2) into a basis
B = (e1, . . . , en) of V such that en = x and all the vectors e3, . . . , en belong
to o span(f ⋆
n). Finally, we
2 ). Then, the dual basis of V ⋆ reads (f ⋆
2 , . . . , f ⋆
of Sn(K) consisting of the matrices (si,j) such that si,n = 0 for all i ∈ [[3, n]].
extend B into a basis eB of U . In the bases eB and B⋆, the matrix space M that
corresponds to S is included in N` Mn,p−n(K), where N denotes the subspace
Obviously, N` Mn,p−n(K) has codimension n−2 in Sn(K)` Mn,p−n(K), whence
M = N` Mn,p−n(K). Moreover, the map that corresponds to F in those bases
1 , f ⋆
is
G : (mi,j) ∈ M 7−→(cid:20) m1,n
[0](n−1)×1(cid:21) .
Define M = (mi,j) ∈ M by mi,j = 1 whenever i ≤ 2 or j ≤ 2, and mi,j = 0
otherwise. Then, G(M ) =(cid:20)
M is spanned by (cid:2)1 1 0 · · ·
1
[0](n−1)×1(cid:21), but one easily checks that the range of
, and hence it is
0(cid:3)T
and (cid:2)0 0 1 · · ·
1(cid:3)T
obvious that this range does not contain G(M ).
2 ).
1 , f ⋆
1 , f ⋆
Case 3: x ∈ V r o span(f ⋆
We can extend (f ⋆
i (x) = 0
for all i ∈ [[3, n]]. We denote by (e1, . . . , en) its dual basis of V , which we extend
2 ) into a basis B⋆ = (f ⋆
n) of V ⋆ such that f ⋆
1 , . . . , f ⋆
are scalars α and β such that x = α e1 + β e2. Now, denote by M the space of
into a basis eB = (e1, . . . , ep) of U . Note that x ∈ span(e1, e2), and hence there
matrices representing S in eB and B⋆. Then, M is included in N1` Mn,p−n(K),
where N1 denotes the subspace of Sn(K) consisting of all the matrices (si,j) such
16
that α si,1 + β si,2 = 0 for all i ∈ [[3, n]].
As codim S ≤ n − 2, we see that dim(N1` Mn,p−n(K)) ≤ dim M, and hence
M = N1` Mn,p−n(K). Then, the map that corresponds to F through the above
bases reads
and hence it is range-compatible. It follows from the splitting lemma that
[0](n−1)×1 (cid:21) ,
G : (si,j) 7→(cid:20)α s1,1 + β s1,2
[0](n−1)×1 (cid:21)
G′ : (si,j) ∈ N1 7→(cid:20)α s1,1 + β s1,2
is also range-compatible.
Applying G′ to any matrix of the form (cid:20)
S
[0](n−2)×2
[0]2×(n−2)
[0](n−2)×(n−2)(cid:21), with
S ∈ S2(K), yields that the linear map
(cid:20)a b
c(cid:21) ∈ S2(K) 7→(cid:20)αa + βb
0
b
(cid:21)
is range-compatible. Yet, since (α, β) 6= (0, 0) it is obvious that this map is
non-local. Hence, by Theorem 1.4 we have #K = 2. Applying the above map to
(cid:20)1 1
1 1(cid:21) then yields α + β = 0, whence α = β = 1 (since (α, β) 6= (0, 0)). A final
contradiction then comes by applying G′ to the matrix M = (mi,j) ∈ N1 defined
by m1,j = m2,j = mj,1 = mj,2 = 1 for all j ∈ [[3, n]], m1,2 = 1, m1,1 = m2,2 = 0
and mi,j = 0 for all (i, j) ∈ [[3, n]]2. One checks that the range of M is spanned
by the vectors
and
and that it does not include(cid:20)
1
[0](n−1)×1(cid:21) = G′(M ).
0
1
1
...
1
1
0
1
...
1
This contradicts the fact that G′ is range-compatible.
In any of the above cases, we have found a contradiction. The only remaining
possibility is that x = 0. Then, F is the local map s 7→ s(0).
3.3 Proof of Theorem 3.3 for fields with characteristic not 2
Here, we assume that the characteristic of K is not 2.
17
We prove Theorem 3.3 by induction on the dimension of V . The result is vac-
uous if dim V ≤ 1. If dim V = 2, then the result is obvious because the assump-
tions tell us that S = Ls(U, V ⋆). Assume now that dim V ≥ 3. By Lemma 3.5,
we can pick non-collinear vectors f ⋆
1 ) ≤
dim V − 3 and codim(S mod f ⋆
2 ) ≤ dim V − 3. However, we have a canoni-
cal identification of S mod f ⋆
i )⋆), and
dim Ker f ⋆
i is local. Lemma
3.6 then yields that F is local. This completes the proof.
i = dim V −1. Thus, by induction, each map F mod f ⋆
i with a linear subspace of Ls(U, (Ker f ⋆
2 in V ⋆ such that codim(S mod f ⋆
1 and f ⋆
3.4 Proof of Theorem 3.3 for fields with characteristic 2 and
more than 2 elements
Here, we assume that K has characteristic 2 and more than 2 elements. Again, we
prove the result by induction on the dimension of V . The case when dim V ≤ 2 is
either vacuous or trivial. Assuming that dim V ≥ 3 and considering an arbitrary
range-compatible homomorphism F : S → V ⋆, we proceed as in the above proof
2 in V ⋆ such that both maps F mod f ⋆
to find linearly independent forms f ⋆
1
1 equals F ′ mod f ⋆
and F mod f ⋆
1 for some standard
map F ′ on S. Thus, replacing F with F − F ′, we see that no generality is lost
in assuming that
1 and f ⋆
2 are standard. Then, F mod f ⋆
∀s ∈ S, F (s) ∈ Kf ⋆
1 .
Claim 1. The map F mod f ⋆
2 is local.
2 is non-local. Then, F mod f ⋆
Proof. Assume on the contrary that F mod f ⋆
2 is
the sum of a local map x 7→ s(x), for some vector x ∈ U , and of a non-zero
root-linear map. Let us extend (f ⋆
2 , . . . ) of V ⋆, and then
consider the dual basis (e1, . . . , en) of V , which we extend into a basis (e1, . . . , ep)
of U . Denote by M the matrix space associated with S in the bases (e1, . . . , ep)
n), and by G : M → Kn the map on matrices that corresponds to
and (f ⋆
F . One deduces that there is a non-zero root-linear form α on K together with
linear form β1, β3, . . . , βn on M such that
2 ) into a basis (f ⋆
1 , . . . , f ⋆
1 , f ⋆
1 , f ⋆
G : M = (mi,j) 7−→
α(m1,1) + β1(M )
?
α(m3,3) + β3(M )
...
α(mn,n) + βn(M )
18
On the other hand, as F mod f ⋆
1 = 0, it turns out that
∀i ∈ [[3, n]], ∀M ∈ S, α(mi,i) = βi(M ).
As K has more than 2 elements, only the zero map is both root-linear and linear,
and hence β3 = · · · = βn = 0 and, as α is non-zero, we deduce that
∀i ∈ [[3, n]], ∀M ∈ S, mi,i = 0.
Denote by T the subspace of Sn(K) consisting of all the matrices M = (mi,j) ∈
Sn(K) such that ∀i ∈ [[3, n]], mi,i = 0. Then, M ⊂ T ` Mn,p−n(K) and
dim(T ` Mn,p−n(K)) ≤ dim S, whence M = T ` Mn,p−n(K).
Denote by H : S2(K) → K2 the homomorphism such that
∀A ∈ S2(K), G(cid:18)(cid:20)
A
[0](n−2)×2
[0]2×(p−2)
[0](n−2)×(p−2)(cid:21)(cid:19) =(cid:20) H(A)
[0](n−2)×1(cid:21) .
As G is range-compatible, so is H. Note that we have a linear form θ on S2(K)
such that
Then, by Theorem 1.4, the map H equals
0
H : A = (ai,j) 7→(cid:20)α(a1,1) + θ(A)
(cid:21) .
A = (ai,j) 7→(cid:20)α′(a1,1) + θ1(A)
α′(a2,2) + θ2(A)(cid:21)
for some root-linear form α′ on K and some linear forms θ1 and θ2 on S2(K).
As above we would deduce from looking at the first row that α′ = α, and from
looking at the second row that α′ = 0. This leads to α = 0, contradicting earlier
results.
Thus, both maps F mod f ⋆
2 are local. By Lemma 3.6, the map
F is local. This completes the inductive step. Hence, Theorem 3.3 is now proved
for all fields with more than 2 elements.
1 and F mod f ⋆
3.5 Proof of Theorem 3.3 for fields with 2 elements
Here, we use a similar strategy as in the previous two proofs, but now we need
a stronger version of Lemma 3.5. In its statement, we shall use the following
19
notation:
T3(K) :=(
a b
c
b d 0
c 0 e
(a, b, c, d, e) ∈ K5) ⊂ S3(K).
Note that T3(K) is a linear hyperplane of S3(K).
Lemma 3.7. Assume that #K = 2. Let U be a finite-dimensional vector space,
V be a linear subspace of U , and S be a linear subspace of Ls(U, V ⋆). Assume
that codim S ≤ dim V − 2 and dim V ≥ 3. Then:
(a) Either there exist distinct non-zero vectors f ⋆
i ) ≤ dim V − 3 for all i ∈ [[1, 3]];
codim(S mod f ⋆
1 , f ⋆
2 and f ⋆
3 in V ⋆ such that
(b) Or dim V = 3 and S is represented, in a choice of bases of U and V ⋆, by
T3(K)` M3,p−3(K), where p := dim U .
1 , . . . , f ⋆
Proof. We use a similar line of reasoning as in the proof of Lemma 3.5. Assume
first that Sr = Ls(V, V ⋆). If S = Ls(U, V ⋆), we simply pick three distinct vectors
in V ⋆r{0}. If S ( Ls(U, V ⋆), then Sm ( L(U/V, V ⋆), and hence there is no basis
n) of V ⋆ for which, for all i ∈ [[1, n]], the linear subspace Sm contains
(f ⋆
every operator of L(U/V, V ⋆) with range Kf ⋆
i ; hence, there is a linear hyperplane
H of V ⋆ such that, for all f ⋆ ∈ V ⋆ r H, the space S does not contain every
operator of Ls(U, V ⋆) with range Kf ⋆, leading to codim(S mod f ⋆) ≤ dim V − 3.
In any case, condition (a) is easily seen to hold.
1 , f ⋆
1 and f ⋆
In the rest of the proof, we assume that Sr ( Ls(V, V ⋆) and that condition (a)
2 in V ⋆ r {0} such that,
does not hold. Then, there are distinct vectors f ⋆
2 }, one has codim(S mod f ⋆) > dim V −3. For any such
for all f ⋆ ∈ V ⋆ r{0, f ⋆
f ⋆, we deduce that S contains all the operators of Ls(U, V ⋆) with range Kf ⋆.
Then, as those linear forms span V ⋆, we learn that Sm = L(U/V, V ⋆). On the
other hand, as there is at least one such linear form we find codim S = dim V − 2
and hence codim Sr = dim V − 2. As f ⋆
2 are non-collinear (as they are
n) of V ⋆
distinct and non-zero, while #K = 2), there is a basis B⋆ = (e⋆
e⋆
k. Consider the predual basis B of V , and
denote by M the matrix space representing Sr is the bases B and B⋆. Note that
M has codimension n − 2 in Sn(K). Moreover, we know that, for every X ∈ Kn
in which f ⋆
k and f ⋆
e⋆
nPk=2
nPk=1
1 and f ⋆
1 =
2 =
1, . . . , e⋆
20
with the possible exception of X1 :=
0
1
...
1
contain XX T . As in the proof of Lemma 3.4, this shows:
and X2 :=
1
...
1
, the space M should
• That M contains Ei,i for all i ∈ [[1, n]];
• That M contains Ei,j + Ei,j for all (i, j) ∈ [[1, n]]2 such that i 6= j, unless
n = 3 in which case we can only assert that M contains E1,2 + E2,1 and
E1,3 + E3,1.
If n > 3, then we deduce that M = Sn(K), which contradicts the fact that
codim M = n−2. Therefore, n = 3, and we see from the above that T3(K) ⊂ M.
However dim T3(K) = 5 = dim M, whence M = T3(K). Let us extend B into a
basis eB of U . Then, as Sm = L(U/V, V ⋆), we conclude that in the bases eB and
B⋆ the matrix space T3(K)` M3,p−3(K) represents S.
Now, let us assume that #K = 2. We prove Theorem 3.3 by induction on the
dimension of V . Again, the case dim V ≤ 2 is either vacuous or trivial. Assume
now that dim V ≥ 3.
Claim 2. There are distinct non-zero forms f ⋆
map F mod f ⋆
i
is standard.
1 , f ⋆
2 , f ⋆
3 in V ⋆ such that each
1
1
1
0
1
1
Proof. If condition (a) from Lemma 3.7 holds, then the result is an obvious
consequence of the induction hypothesis. Assume now that S is represented, in a
1
0
0
2 and f ⋆
1 , f ⋆
compatible pair (B, C⋆) of bases of U and V ⋆, by T3(K)` M3,p−3(K). Set X1 :=
, X2 :=
and X3 :=
and note that X1, X2, X3 are distinct non-zero
3 is represented by the matrix space K2` D1` D2` M2,p−3(K),
vectors of K3. Denote by f ⋆
3 the corresponding vectors of V ⋆ (through
B⋆). Then, as T3(K) contains no rank 1 matrix with range either KX1 or KX2,
we see that codim(S mod f ⋆
2 ) = 0. On the other hand, we see
that S mod f ⋆
where D1 and D2 respectively denote the 1-dimensional linear subspaces K×{0}
and {0} × K of K2. Combining Theorem 1.1 with the splitting lemma, we
find that every range-compatible linear map on S mod f ⋆
3 is local. Thus, as
here #K = 2, every range-compatible homomorphism on S mod f ⋆
3 is local. In
particular, F mod f ⋆
i
is standard for all i ∈ {1, 2, 3}.
1 ) = codim(S mod f ⋆
21
2 = G2 mod f ⋆
1 and F mod f ⋆
2 are both non-local. We know that F mod f ⋆
We are now about to conclude the proof. Let us pick distinct non-zero forms
2 , f ⋆
f ⋆
1 , f ⋆
3 satisfying the conclusion of Claim 2. Without loss of generality, we
can assume that F mod f ⋆
2 are both local or both non-local. In
the first case, Lemma 3.6 yields that F is local. Assume now that F mod f ⋆
1
and F mod f ⋆
1 and
F mod f ⋆
2 for some standard range-compatible homomorphisms G1
and G2 on S. Neither G1 nor G2 is local. Moreover, the identity is the sole non-
zero root-linear map from K to K. Hence, from the general form of standard
maps that is given in Proposition 3.1, we deduce that G1 − G2 is local. Thus,
1 and F ′ mod f ⋆
replacing F with F ′ = F − G1, we see that both maps F ′ mod f ⋆
2
are local. It follows again from Lemma 3.6 that F ′ is local, and we conclude
that F = F ′ + G1 is standard.
1 = G1 mod f ⋆
Thus, the inductive step is completed for fields with two elements. Theorem
3.3 is now established, and Theorem 1.5 follows from it.
4 Range-compatible homomorphisms on large spaces
of alternating matrices
4.1 Main results
As in the symmetric case, it is necessary, in order to obtain Theorem 1.7, to
consider a general version that applies to a larger class of operator spaces.
Definition 4.1. Let U be a finite-dimensional vector space and V be a linear
subspace of U . A linear map f : U → V ⋆ is called alternating when
∀x ∈ V, f (x)[x] = 0,
i.e. when the bilinear form (x, y) ∈ V 2 7→ f (x)[y] is alternating. The set of all
alternating linear maps from U to V ⋆ is denoted by La(U, V ⋆). One checks that
it is a linear subspace of L(U, V ⋆).
For every compatible pair (B1, B⋆
2) of bases of U and V ⋆, a map from
2 belongs to
U to V ⋆ is alternating if and only if its matrix in B1 and B⋆
An(K)` Mn,p−n(K), where n := dim V and p := dim U .
Remark 5. Let W be a linear subspace of V ⋆. Through the canonical identifi-
cation between V ⋆/W and (oW )⋆, the space La(U, V ⋆) mod W corresponds to
La(U, (oW )⋆).
22
In particular, La(U, V ⋆) corresponds to La(U, U ⋆) mod V o.
As in Remark 4, such identifications have no impact on the specific problem
we are studying.
Let S be a linear subspace of La(U, V ⋆). To S, we naturally attach two
operator spaces: the space
Sr :=(cid:8)fV f ∈ S(cid:9),
which is a linear subspace of La(V, V ⋆), and the space of all f ∈ S such that f
vanishes everywhere on V , which we denote by Sm and naturally identify with
a linear subspace of L(U/V, V ⋆). By the rank theorem, we have
dim S = dim Sr + dim Sm
whereas
dim La(U, V ⋆) = dim La(V, V ⋆) + dim L(U/V, V ⋆).
2) be a compatible pair of bases of U and V ⋆, and denote by M
Let (B1, B⋆
the matrix space representing S in them. Write B1 = (e1, . . . , ep) and set
B′
1 := (en+1, . . . , ep), which are bases of V and U/V ,
respectively. Every M ∈ M splits as
1 := (e1, . . . , en) and B′′
M =(cid:2)S(M ) R(M )(cid:3) with S(M ) ∈ An(K) and R(M ) ∈ Mn,p−n(K).
Then, the matrix space S(M) represents Sr in the bases B′
2. On the
other hand, if we denote by T the subspace of S consisting of all its matrices M
such that S(M ) = 0, then R(T ) represents Sm in the bases B′′
1 and B⋆
1 and B⋆
2.
The proper generalization of Theorem 1.7 to spaces of alternating linear
operators is the following one.
Theorem 4.1. Let U be a finite-dimensional vector space and V be a lin-
ear subspace of U . Let S be a linear subspace of La(U, V ⋆) and assume that2
codim S ≤ dim V − 2 and codim Sr ≤ dim V − 3. Then, every range-compatible
homomorphism on S is local.
Again, the proof of Theorem 4.1 will be done by induction on the dimension
of V . The case when dim V = 3 is dealt with in Section 4.2, and the inductive
step is performed in Section 4.3.
2 Here, codim S and codim Sr stand, respectively, for the codimension of S in La(U, V ⋆)
and for the one of Sr in La(V, V ⋆).
23
4.2 The case dim V = 3
Here, we let U be a finite-dimensional vector space and V be a linear subspace
of U with dimension 3. Let S be a linear subspace of La(U, V ⋆) such that
codim Sr ≤ dim V − 3 and codim S ≤ dim V − 2. Then, Sr = La(V, V ⋆) and Sm
has codimension at most 1 in L(U/V, V ⋆). Set p := dim U .
Notation 4.2. For any non-negative integer r, we denote by slr(K) the space
of all trace zero matrices in Mr(K).
Let us consider the bilinear form
b : (s, t) ∈ L(U/V, V ⋆) × L(V ⋆, U/V ) 7→ tr(v ◦ u).
The orthogonal complement of Sm with respect to b is then a linear subspace
S ⊥
m of L(V ⋆, U/V ) with dimension at most 1, and its orthogonal complement for
b is Sm. There are two main cases to consider:
• Case 1: S ⊥
m = {0}.
Then, S = La(U, V ⋆).
m contains a non-zero operator, say t, with rank de-
• Case 2: S ⊥
noted by r.
We can find bases (e⋆
in U ) in which t is represented by(cid:20)
of the form (cid:20) N
[?](3−r)×r
1, e⋆
2, e⋆
3) and (f4, . . . , fp) of V ⋆ and U/V (with f4, . . . , fp
Ir
[0](p−3−r)×r
[0]r×(3−r)
[0](p−3−r)×(3−r)(cid:21). Then,
in those bases, the space Sm is represented by the set of all matrices
[?]r×(p−3−r)
[?](3−r)×(p−3−r)(cid:21) with N ∈ slr(K).
If we de-
note by (e1, e2, e3) the predual basis of (e⋆
3), we find that B =
(e1, e2, e3, f4, . . . , fp) is a basis of U . Finally, as Sr = La(V, V ⋆), we con-
clude that there is a linear map f : A3(K) → Mr(K) such that S is repre-
sented by the space of all matrices of the form
2, e⋆
1, e⋆
(cid:2)A [0]3×(p−3)(cid:3) +(cid:20) [0]r×3
[0](3−r)×3
with A ∈ A3(K) and N ∈ slr(K).
N + f (A)
[?](3−r)×r
[?]r×(p−3−r)
[?](3−r)×(p−3−r)(cid:21)
Case 2 helps motivate the following notation.
24
Notation 4.3. Let r ∈ [[0, 3]] and f : A3(K) → Mr(K) be a linear map. We
denote by Mf the space of all 3 by 3 + r matrices of the form
(cid:2)A [0]3×r(cid:3) +(cid:20) [0]r×3
[0](3−r)×3
with A ∈ A3(K) and N ∈ slr(K).
N + f (A)
[?](3−r)×r(cid:21)
Note that Mf = A3(K) if r = 0. To sum up, we have proved that there
exists an integer r ∈ [[0, 3]], a linear map f : A3(K) → Mr(K) and a compatible
pair of bases in which S is represented by the matrix space Mf` M3,p−3−r(K).
However, we know from Theorem 1.3 that every range-compatible homomor-
phism on M3,p−3−r(K) is local. Thus, the splitting lemma shows that in order
to conclude, it remains to prove the following lemma.
Lemma 4.2. Let r ∈ [[0, 3]] and f : A3(K) → Mr(K) be a linear map. Then,
every range-compatible homomorphism on Mf is local.
To prove Lemma 4.2, we start with the case r = 0.
Lemma 4.3. Every range-compatible homomorphism on A3(K) is local.
Proof of Lemma 4.3. Let F : A3(K) → K3 be a range-compatible homomor-
phism. By Corollary 2.2, there are group endomorphisms u, g, h, i, j, k of K such
that
0 −a
a
−b
b
0 −c
c
0
F :
7→
−u(a) + g(b)
h(a) − i(c)
−j(b) + k(c)
.
For all (a, b, c) ∈ K3r{(0, 0, 0)}, the range of the alternating matrix
is the orthogonal complement of its kernel, which is spanned by
to
0 −a
a
−b
b
0 −c
c
0
c
b
a
. This leads
∀(a, b, c) ∈ K3, −u(a)c + g(b)c + h(a)b − i(c)b − j(b)a + k(c)a = 0.
(1)
Fixing b = 0 and c = 1 and varying a, we obtain that u is linear. Similarly, one
shows that g, h, i, j, k are all linear. Then, (1) reads
∀(a, b, c) ∈ K3, (cid:0)−u(1) + k(1)(cid:1)ac +(cid:0)g(1) − i(1)(cid:1)bc +(cid:0)h(1) − j(1)(cid:1)ab = 0.
25
On the left-hand side of this identity, we have a polynomial of degree at most 1 in
each variable, and hence all its coefficients are zero. This leads to u(1) = k(1),
g(1) = i(1) and h(1) = j(1). Therefore, F is the local map A 7→ AX where
X :=
h(1)
u(1)
g(1)
.
Now, we prove Lemma 4.2.
Proof of Lemma 4.2. The case r = 0 has already been dealt with in Lemma 4.3.
Assume now that r ≥ 1. Let F : Mf → K3 be a range-compatible homo-
morphism.
Denote by T the subspace of Mf consisting of its matrices with all first three
columns equal to 0. Then, we see that T = {0}` N for some subspace N
of M3,r(K) with codimension 1. By the splitting lemma and Theorem 1.3, the
restriction of F to T must be local. Thus, subtracting a well-chosen local map
from F , no generality is lost in assuming that F vanishes everywhere on T ,
a condition that will be assumed to hold throughout the rest of the proof. It
follows that there is a homomorphism
G : A3(K) → K3
such that, for all M ∈ Mf , we have F (M ) = G(K(M )), where
M =(cid:2)K(M )
[?]3×r(cid:3) with K(M ) ∈ A3(K).
We shall prove that G is range-compatible. To do so, we distinguish between
three cases.
Case a: r = 3.
Let A ∈ A3(K) r {0}. We choose a non-zero column C of A. The subspace
{CX T X ∈ K3} of M3(K) is not included in sl3(K), and hence we can find a
rank 1 matrix B ∈ M3(K) r sl3(K) whose range equals KC. Then, M3(K) =
KB ⊕ sl3(K), and hence we can write f (A) = λ B + N for some λ ∈ K and
some N ∈ sl3(K). Thus, Mf contains M :=(cid:2)A λB(cid:3), whose range equals Im A.
Then, G(A) = F (M ) ∈ Im M , and hence G(A) ∈ Im A.
Case b: r = 2.
Let A ∈ A3(K) r {0}. We prove that there exists a matrix M ∈ Mf such
26
G(A) ∈ Im A.
that M =(cid:2)A [?]3×2(cid:3) and Im M = Im A, which, as in Case a, will entail that
One of the columns of A, say the i-th, can be written as (cid:20)Y
?(cid:21) with Y ∈
find a row matrix L ∈ M1,2(K) such that(cid:20)λ B
L (cid:21) has all its columns collinear to
K2 r {0}. As in Case a, we find B ∈ M2(K) r sl2(K) with range KY . Then,
f (A) = λ B + N for some λ ∈ K and some N ∈ sl2(K). It follows that we can
the i-th column of A. Then, the matrix
(cid:2)A [0]3×2(cid:3) +(cid:20)[0]2×3 λ B
L (cid:21)
[0]1×3
belongs to Mf and its range equals Im A, which proves our claim.
Case c: r = 1.
Using Corollary 2.2, we find endomorphisms u, g, h, i, j, k, θ of (K, +) such that
−u(a) + g(b) + θ(c)
0 −a
a
−b
?
0 −c d
e
c
F :
.
M ∈ Mf of the form M = (cid:2)A [?]3×1(cid:3) such that Im M = Im A:
2-dimensional affine subspaces
7→
+ ({0} × K2) and Im A of K3 are non-
Let A ∈ A3(K) be with non-zero first row. Again, we see that there exists some
indeed, the
parallel, and hence they have a common point. Thus, G(A) = F (M ) ∈ Im A.
h(a) − i(c)
−j(b) + k(c)
b
0
f (A)
0
0
As in the proof of Lemma 4.3, this yields
∀(a, b, c) ∈ K3, (a, b) 6= (0, 0) ⇒ −u(a)c+g(b)c+h(a)b−i(c)b−j(b)a+k(c)a+θ(c)c = 0.
Next, we prove that θ = 0. We distinguish between two cases:
• Assume that #K > 2. Let c ∈ Kr{0}. Taking b = 0, we find that −u(a)c+
k(c)a + θ(c)c = 0 for all a ∈ K r {0}. Thus, the group endomorphism
χ : a ∈ K 7→ −u(a)c + k(c)a is constant on K r {0} with sole value −θ(c)c.
However, since K has more than 2 elements, we can find x and y in K r {0}
such that x + y 6= 0, which leads to χ(x) + χ(y) = χ(x + y), and hence
θ(c)c = 0. Therefore, θ(c) = 0.
27
• Assume that #K = 2. Then, u, g, h, i, j, k, θ are all linear, and hence the
quadratic form
(a, b, c) 7→ (−u(1) + k(1))ac + (g(1) − i(1))bc + (h(1) − j(1))ab + θ(1)c2 = 0
vanishes everywhere on K3 r span(cid:0)(0, 0, 1)(cid:1). By Lemma 5.2 of [5], q = 0,
and in particular θ(1) = 0.
Therefore, in any case θ = 0. Moreover, if (a, b) = (0, 0) it is obvious that
−u(a)c + g(b)c + h(a)b − i(c)b − j(b)a + k(c)a = 0.
Hence,
∀(a, b, c) ∈ K3, −u(a)c + g(b)c + h(a)b − i(c)b − j(b)a + k(c)a = 0,
which shows that G is range-compatible (see the proof of Lemma 4.3).
Thus, in any case we have shown that G is range-compatible. Lemma 4.3
then yields a vector Y ∈ K3 such that G : A 7→ AY , and we conclude that F is
the local map M 7→ M X for X :=(cid:20) Y
[0]r×1(cid:21).
This completes the proof in the case when dim V = 3.
4.3 The case dim V > 3
Here, we perform the inductive step of the proof of Theorem 4.1. Set n := dim V ,
p := dim U and assume that dim V > 3.
Step 1. There exist non-collinear forms f ⋆
n − 3 and codim(S mod f ⋆
i )r ≤ n − 4 for all i ∈ {1, 2}.
1 and f ⋆
2 in V ⋆ such that codim(S mod f ⋆
i ) ≤
Proof. Let f ⋆ ∈ V ⋆ r {0}. Denote by S f ⋆
the subspace of all the operators
s ∈ Sr such that (x, y) 7→ s(x)[y] vanishes everywhere on Ker f ⋆ × Ker f ⋆. Then,
by the rank theorem, we have
r
codim(S mod f ⋆)r = codim Sr +(cid:0)dim S f ⋆
r − dim V + 1(cid:1).
Thus, in order to have
codim(S mod f ⋆)r ≤ n − 4,
28
i
1 , . . . , f ⋆
n−1 in V ⋆ such that dim S f ⋆
it suffices that dim S f ⋆
r < n−1. Assume that there are n−1 linearly independent
vectors f ⋆
r = dim V − 1 for all i ∈ [[1, n]].
n) of V ⋆, whose
Then, we extend this family into a basis B⋆ = (f ⋆
corresponding basis of V is denoted by B. Denote by M the matrix space
associated with Sr in the bases B and B⋆. The assumptions show that, for
all (i, j) ∈ [[1, n]]2 such that i > j, the space M contains Ei,j − Ej,i (since
f ⋆
j
dim S
r = dim V − 1). By linearly combining those matrices, we find that
M = An(K), which means that Sr = La(V, V ⋆). In turn, this shows that for all
f ⋆ ∈ V ⋆ r {0}, we have (S mod f ⋆)r = La(cid:0)Ker f ⋆, (Ker f ⋆)⋆(cid:1) and hence
1 , . . . , f ⋆
n−1, f ⋆
codim(S mod f ⋆)r = 0 ≤ n − 4.
Thus, in any case, we have found a linear subspace P of codimension 2 in V ⋆
such that
∀f ⋆ ∈ V ⋆ r P, codim(S mod f ⋆)r ≤ n − 4.
Let f ∈ V ⋆ r {0}. If we denote by S f ⋆
m the space of all linear maps s ∈ Sm
such that Im s ⊂ Kf ⋆, the rank theorem yields
codim(S mod f ⋆) = codim S +(cid:0)dim(S f ⋆
m ) − dim(U/V )(cid:1).
Indeed, the rank of an alternating linear map from V to V ⋆ cannot equal 1, and
hence if s ∈ S satisfies Im s ⊂ Kf ⋆ then s vanishes everywhere on V , to the
effect that s ∈ Sm.
Thus, in order to have
codim(S mod f ⋆) ≤ n − 3,
it suffices that dim S f ⋆
V ⋆ such that dim S f ⋆
Sm = L(U/V, V ⋆), and hence
i
m < dim(U/V ).
n) of
m = dim(U/V ) for all i ∈ [[1, n]], then it would follow that
If there existed a basis (f ⋆
1 , . . . , f ⋆
codim S = codim Sr ≤ n − 3.
In that case, we would obtain
codim(S mod f ⋆) ≤ codim S ≤ n − 3
whatever the choice of f ⋆ in V ⋆ r {0}.
29
This yields a linear hyperplane H of V ⋆ such that
∀f ⋆ ∈ V ⋆ r H, codim(S mod f ⋆) ≤ n − 3.
Hence, for every f ⋆ ∈ V ⋆ r (P ∪ H), the space S mod f ⋆ satisfies the conditions
of Theorem 4.1. However, the union of two proper linear subspaces of V ⋆ is
always a proper subset of V ⋆: this successively yields some f ⋆
1 ∈ V r (P ∪ H),
and then we can pick f ⋆
2 are linearly
independent and both spaces S mod f ⋆
2 satisfy the requirements of
Theorem 4.1.
2 in V r ((P + Kf ⋆
1 ) ∪ H), so that f ⋆
1 and S mod f ⋆
1 and f ⋆
By induction, we obtain that both range-compatible homomorphisms F mod f ⋆
1
and F mod f ⋆
2 are local, yielding vectors x1 and x2 in U such that
∀s ∈ S, F (s) = s(x1) mod Kf ⋆
1
and F (s) = s(x2) mod Kf ⋆
2 .
Replacing F with s 7→ F (s) − s(x1), we reduce the situation further to the point
where there exists x ∈ U such that
∀s ∈ S, F (s) ∈ Kf ⋆
1
and F (s) = s(x) mod Kf ⋆
2 .
(2)
Notice then that
∀s ∈ S,
s(x) ∈ span(f ⋆
1 , f ⋆
2 ).
Step 2. The vector x belongs to V .
2 ) into a basis B⋆
Proof. Assume on the contrary that x 6∈ V . Let us extend (f ⋆
of V ⋆, whose predual basis of V is denoted by B = (e1, . . . , en), and let us extend
1 , f ⋆
(e1, . . . , en, x) into a basis eB of U . Denote by M the matrix space representing S
ineB and B⋆. Then, if we denote by P the subspace K2×{0} of Kn, we see that M
is a linear subspace of An(K)` P` Mn,p−n−1(K), where p := dim U . However,
that subspace has codimension n − 2 in An(K)` Mn,p−n(K), whereas M has
codimension at most n − 2 in it. Therefore, M = An(K)` P` Mn,p−n−1(K).
[0](n−1)×1(cid:21). Then, we have a range-compatible
matrix M = (mi,j) of M to (cid:20) m1,n+1
Denote by G : M → Kn the range-compatible homomorphism that is as-
sociated with F in the above bases. Condition (2) shows that G maps every
homomorphism H : P → Kn such that, for all Y ∈ P ,
G(cid:16)(cid:2)[0]n×n Y [0]n×(p−n−1)(cid:3)(cid:17) = H(Y ),
30
and we see from the above form of G that Im H = K×{0}. However, by Theorem
1.3 the map H should be a scalar multiple of the identity, which is false since P
has dimension 2.
Step 3. The vector x belongs to Ker f ⋆
1 ∩ Ker f ⋆
2 .
1, g⋆
1 , f ⋆
2) of span(f ⋆
Proof. Assume on the contrary that x 6∈ o span(f ⋆
2 ). Then, we can find a
basis (g⋆
2(x) = 0. We extend
this basis into a basis B⋆ = (g⋆
i (x) = 0 for all
i ∈ [[2, n]], and we consider the corresponding basis B of V . Obviously, x is the
first vector of B. It then turns out that if we denote by Mr the matrix space
associated with Sr in the bases B and B⋆, this space is included in An(K) and
1(x) = 1 and g⋆
n) of V ⋆ in which g⋆
2 ) such that g⋆
2, . . . , g⋆
1 , f ⋆
1, g⋆
every matrix in Mr has its first column of the form
0
?
[0](n−2)×1
. Thus, we see
that Mr has codimension at least n − 2 in An(K), contradicting the assumption
that codim Sr ≤ n − 3.
Step 4. One has x = 0.
Proof. Assume on the contrary that x 6= 0. Let us consider a linear form f ⋆
0 on
2 ) into a basis B∗ in which
V such that f0(x) = 1. Then, we extend (f ⋆
the last n − 3 linear forms annihilate x, and we denote by B the corresponding
0 , f ⋆
1 , f ⋆
associated with S in those bases. For M ∈ M we write
basis of V , which we extend into a basis eB of U . Note that x is the first vector
of B, and hence also the first one of eB. Let us denote by M the matrix space
M =(cid:2)A(M ) B(M )(cid:3) with A(M ) ∈ An(K) and B(M ) ∈ Mn,p−n(K).
Then, we know that the first column of every matrix of M has the form
vector
[0](n−3)×1
Denote by G : M → Kn the range-compatible homomorphism that corre-
sponds to F in the above bases. Then, G maps every matrix (mi,j) of M to the
Denote by N the linear subspace of An(K) consisting of its matrices (mi,j)
such that mi,1 = 0 for all i ∈ [[4, n]]. Then, codim N = n − 3. However,
.
[0](n−2)×1
m2,1
0
?
?
0
.
31
codim A(M) = codim Sr ≤ n − 3, whence A(M) = N and codim Sr = n − 3. It
follows that we can find a linear mapping
K : A3(K) −→ M3,p−n(K)
such that, for all C ∈ A3(K), the space M contains a matrix of the form
C
[0]3×(n−3)
[0](n−3)×3
[0](n−3)×(n−3)
K(C)
[?](n−3)×(p−n)(cid:21) .
Now, denote by H the subspace of all matrices M ∈ M such that A(M ) = 0.
Then codim B(H) + codim Sr = codim S, whence codim B(H) ≤ 1. Thus, B(H)
includes a linear hyperplane of Mn,p−n(K).
For M ∈ H, denote by B′(M ) the sub-matrix of B(M ) obtained by deleting
all the rows starting from the fourth one, so that B′(H) is a linear subspace
of M3,p−n(K) with codimension at most 1. Thus, for all C ∈ A3(K) and N ′ ∈
B′(H), the space M contains a matrix of the form
C
[0]3×(n−3)
[0](n−3)×3
[0](n−3)×(n−3)
K(C) + N ′
[?](n−3)×(p−n)(cid:21) .
Let us finally denote by M′ the space of all matrices
(cid:2)C K(C) + N ′(cid:3) with C ∈ A3(K) and N ′ ∈ B′(H).
Applying Lemma 2.1 to the subspace V0 = {0} × Kn−3 of Kn, we obtain that
(cid:20)
(cid:20)
G′ : (mi,j) ∈ M′ 7→
m2,1
0
0
is a range-compatible homomorphism. On the other hand, M′ represents a space
of alternating operators that satisfies the assumptions of Theorem 4.1. From
the 3-dimensional case treated in Section 4.2, we deduce that G′ is a local map.
This would yield a vector X ∈ K3+p−n such that dim M′X = 1. However, if
X ∈ K3 × {0} we would have dim M′X = 2 or dim M′X = 0; on the other hand,
if X 6∈ (K3 × {0}), we see that dim M′X ≥ 2 because B′(H) has codimension
at most 1 in M3,p−n(K). Thus, we have a contradiction in any case, and we
conclude that x = 0.
We conclude that, for all s ∈ S, the vector F (s) belongs to both Kf ⋆
1 and
Kf ⋆
2 , and hence it equals 0. Thus, F is the local map s 7→ s(0), which completes
the inductive step. Thus, Theorem 4.1 is now established, and Theorem 1.7
follows as it is a reformulation of the special case when U = V .
32
References
[1] M. D. Atkinson, S. Lloyd, Large spaces of matrices of bounded rank. Quart.
J. Math. Oxford (2) 31 (1980), 253 -- 262.
[2] J. Dieudonn´e, Sur une g´en´eralisation du groupe orthogonal `a quatre vari-
ables. Arch. Math. 1 (1948), 282 -- 287.
[3] R. Loewy, Large spaces of symmetric matrices of bounded rank are decom-
posable. Linear Multilinear Algebra 48 (2001), 355 -- 382.
[4] R. Loewy, N. Radwan, Spaces of symmetric matrices of bounded rank. Linear
Algebra Appl. 197-198 (1994), 189 -- 215.
[5] C. de Seguins Pazzis, Range-compatible homomorphisms on matrix spaces.
Linear Algebra Appl. 484 (2015) 237 -- 289.
[6] C. de Seguins Pazzis, Range-compatible homomorphisms over the field with
two elements. Preprint, arXiv: http://arxiv.org/abs/1407.4077
[7] C. de Seguins Pazzis, Quasi-range-compatible affine maps on large operator
spaces. Linear Multilinear Algebra 64 (2016) 1056 -- 1085.
[8] C. de Seguins Pazzis, The classification of large spaces of matrices with
bounded rank. Israel J. Math. 208 (2015) 219 -- 259
[9] C. de Seguins Pazzis, The linear preservers of non-singularity in a large space
of matrices. Linear Algebra Appl. 436 (2012), 3507 -- 3530.
33
|
1004.1660 | 1 | 1004 | 2010-04-09T22:56:13 | Representation Theory of Finite Semigroups over Semirings | [
"math.RA",
"math.RT"
] | We develop the representation theory of a finite semigroup over an arbitrary commutative semiring with unit, in particular classifying the irreducible and minimal representations. The results for an arbitrary semiring are as good as the results for a field. Special attention is paid to the boolean semiring, where we also characterize the simple representations and introduce the beginnings of a character theory. | math.RA | math |
REPRESENTATION THEORY OF FINITE SEMIGROUPS
OVER SEMIRINGS
ZUR IZHAKIAN, JOHN RHODES, AND BENJAMIN STEINBERG
Abstract. We develop the representation theory of a finite semigroup
over an arbitrary commutative semiring with unit, in particular clas-
sifying the irreducible and minimal representations. The results for an
arbitrary semiring are as good as the results for a field. Special attention
is paid to the boolean semiring, where we also characterize the simple
representations and introduce the beginnings of a character theory.
1. Introduction
This paper is about the representation theory of finite semigroups over
commutative semirings with unit. See [33] for a modern presentation of finite
semigroup theory, including a theory of semirings influenced by a semigroup
perspective.
The importance of semirings in mathematics and theoretical computer
science was first recognized by Schutzenberger [38] in his theory of weighted
automata and rational power series [3, 36]. Conway also heavily employed
semirings in his approach to automata theory [9]. See [26 -- 29] for further ap-
plications of semirings to theoretical computer science. Recently, idempotent
semirings have entered into mainstream mathematics because they are at the
heart of the relatively new subject of tropical geometry [10, 12, 17, 21, 35].
They also play a role in the notion of characteristic one being developed by
Connes et al. [7, 8].
Before turning to semirings, we discuss the classical case of fields. Work
of Clifford [4, 5], Munn [24, 25] and Ponizovskiı [30] parameterized the ir-
reducible representations of a finite semigroup over a field in terms of the
irreducible representations of its maximal subgroups. The reader is referred
to [6, Chapter 5] for a full account of this work. Explicit constructions of the
irreducible representations were later obtained independently by Rhodes and
Zalcstein [34] (which was written in 1968) and by Lallement and Petrich [20]
in terms of the Schutzenberger representation by monomial matrices [37];
Date: August 4, 2018.
2010 Mathematics Subject Classification. Primary: 16G10, 20M30, 20M25; Secondary:
16Y60, 14T05.
Key words and phrases. Representations, semirings, semigroups.
The first author was supported in part by the ISF (Ref. No. 448/09).
The third author was supported in part by NSERC.
1
2
Z. IZHAKIAN, J. RHODES, AND B. STEINBERG
see also [23]. All of these approaches make use of Rees's Theorem [31] char-
acterizing 0-simple semigroups up to isomorphism and Wedderburn theory.
This viewpoint makes it hard to see how to generalize things to rings, let
alone semirings. So it was once believed that we knew everything about
representations over the field of complex numbers and nothing about repre-
sentations over, say, the boolean semiring.
The purpose of this paper is to show that we essentially know just as much
about boolean representations as we do about complex ones. In particular,
we construct all irreducible representations of a finite semigroup S over any
commutative semiring with unit modulo the case of groups. In the case of the
boolean semiring we identify the congruence associated to the direct sum of
all irreducible representations with one of the congruences from the semilocal
theory [33, Chapter 4], generalizing the case of representations over fields [1,
32]. In addition to classifying irreducible representations, we also describe
all the minimal representations. For the case of boolean representations we
are also able to classify the simple representations by showing that they are
dual to the minimal ones. In the boolean setting, we propose a notion of
characters.
Here we follow the coordinate-free approach from [11], which was used to
handle arbitrary commutative rings, in order to deal with semirings. Basic
facts about semirings can be found in [13, 16, 18] or [33, Chapters 8 and 9].
2. Preliminaries
We collect here some basic definitions and facts concerning finite semi-
groups that can be found in any of [6, 19, 33]. Let S be a (fixed) finite
semigroup. If e is an idempotent, then eSe is a monoid with identity e; its
group of units Ge is called the maximal subgroup of S at e. Two idempotents
e, f are said to be isomorphic if there exist x ∈ eSf and x′ ∈ f Se such that
xx′ = e, x′x = f . In this case one can show that eSe is isomorphic to f Sf
as monoids and hence Ge ∼= Gf ; see Fact 2.1.
If s ∈ S, then J(s) = S1sS1 is the principal (two-sided) ideal generated
by s (here S1 means S with an adjoined identity). Following Green [14], two
elements s, t of a semigroup S are said to be J -equivalent if J(s) = J(t).
In this case one writes s J t. In fact, there is a preorder on S given by
s ≤J t if J(s) ⊆ J(t). This preorder induces an ordering on J -classes in
the usual way.
Fact 2.1. In a finite semigroup, idempotents e, f are isomorphic if and only
if e J f , that is, SeS = Sf S.
An element s of a semigroup S is said to be (von Neumann) regular if
s = sts for some t ∈ S. Each idempotent is of course regular.
Fact 2.2. Let S be a finite semigroup and J a J -class of S. Then the
following are equivalent:
(1) J contains an idempotent;
REPRESENTATION THEORY OF FINITE SEMIGROUPS OVER SEMIRINGS
3
(2) J contains a regular element;
(3) all elements of J are regular;
(4) J 2 ∩ J 6= ∅.
A J -class satisfying the equivalent conditions in Fact 2.2 is called a
regular J -class. The poset of regular J -classes is denoted U (S). The
following standard result from finite semigroup theory will play a role in
this paper.
Fact 2.3. Let S be a finite semigroup and J a regular J -class. Let e ∈ J
be an idempotent. Then eSe ∩ J = Ge.
Let J be a J -class of S. Set J 6 ↑ = {s ∈ S J * J(s)}; it is the ideal of
all elements of S that are not J -above some (equals any) element of J.
The reader is referred to [33, Chapter 9] for basic notions concerning
modules1 over semirings. Let us say that a congruence on a module over a
semiring is proper if it has more than one equivalence class and that it is
trivial if the associated partition is into singletons. Fix a base commutative
semiring ring k with unit.
Definition 2.4. If A is a k-algebra, not necessarily unital, then a right
A-module M with M A 6= 0 is said to be:
(1) simple if it has only trivial quotient modules;
(2) minimal if it contains no proper non-zero submodules;
(3) irreducible if it is both simple and minimal.
Over a ring k, all three notions coincide. Observe that minimality amounts
to asking that, for all 0 6= m ∈ M , the cyclic module mA is M .
The category of (right) A-modules will be denoted mod-A. We adopt here
the convention that if A is unital, then by mod-A we mean the category of
unitary A-modules. The reader should verify that all functors considered in
this paper respect this convention.
Definition 2.5 (Radical and socle). Let us denote by rad(M ) the intersec-
tion of all maximal congruences on a module M ; it is called the radical of
M . The submodule of M generated by all minimal submodules is denoted
Soc(M ) and is called the socle of M .
We state and prove Schur's lemma in the semiring context.
Lemma 2.6 (Schur). Let M and N be A-modules. Then each non-zero
homomorphism ϕ : M → N is:
(1) injective if M is simple;
(2) surjective if N is minimal;
(3) an isomorphism if M is simple and N is minimal.
Proof. Suppose that ϕ 6= 0. Then ϕ(M ) is a non-zero submodule of N and
ker ϕ is a proper congruence on M , from which the result is trivial.
(cid:3)
1We note that some authors use the term semimodule for what we call a module.
4
Z. IZHAKIAN, J. RHODES, AND B. STEINBERG
The class of minimal modules is closed under quotients.
Proposition 2.7. Let M be a minimal A-module. Then any non-zero quo-
tient module of M is also minimal.
Proof. Suppose that M is minimal and ϕ : M → N is a surjective A-module
homomorphism. Let N ′ be a non-zero submodule of N . Then ϕ−1(N ) is a
non-zero submodule of M and so M = ϕ−1(N ), whence N = N ′. Thus N
is minimal.
(cid:3)
3. Construction of the irreducible and minimal modules
Fix a finite semigroup S and a commutative semiring with unit k. The
If M is a kS-module, then
semigroup algebra kS need not be unital.
AnnS(M ) = {s ∈ S M s = 0} is an ideal of S. The following definition,
due to Munn [25], is crucial to semigroup representation theory.
Definition 3.1 (Apex). A regular J -class J is said to be the apex of a
kS-module M if AnnS(M ) = J 6 ↑.
It is easy to see that M has apex J if and only if J is the unique ≤J -
minimal J -class that does not annihilate M . The notion of apex is closely
related to that of lifting J -classes [33, Lemma 4.6.10]. For further back-
ground see [33, Chapter 4.6].
Fix an idempotent transversal E = {eJ J ∈ U (S)} to the set U (S)
of regular J -classes and set GJ = GeJ . Let AJ = kS/kJ 6 ↑. Notice that
the category of kS-modules with apex J can be identified with the full
subcategory of mod-AJ whose objects are modules M such that M eJ 6= 0.
Our first goal is to show that every minimal module has an apex. This
result is due independently to Munn and Ponizovskiı [24, 25, 30] in the case
of fields.
Theorem 3.2. Let M be a minimal kS-module. Then M has an apex.
Proof. Because M kS 6= 0, there is a ≤J -minimal J -class J such that
J * AnnS(M ). Let I = S1JS1; of course, I is an ideal of S. Since I \ J
annihilates M by minimality of J, it follows 0 6= M kJ = M kI. From the
fact that I is an ideal of S, we may deduce that M kI is a kS-submodule
and so by minimality
M = M kI = M kJ.
(3.1)
Therefore, since JJ 6 ↑ ⊆ I \ J ⊆ AnnS(M ), it follows from (3.1) that J 6 ↑ =
AnnS(M ). Now if J is not regular, then Fact 2.2 implies J 2 ⊆ I \ J and
hence J annihilates M by (3.1), a contradiction. Thus J is regular and is
an apex for M .
(cid:3)
Now we wish to establish a bijection between irreducible kS-modules with
apex J and irreducible kGJ -modules. This relies on a semiring analogue of
a well-known result of Green [15, Chapter 6]. Let A be a k-algebra and e
REPRESENTATION THEORY OF FINITE SEMIGROUPS OVER SEMIRINGS
5
an idempotent of A. Then eA is an eAe-A-bimodule and Ae is an A-eAe-
bimodule. Hence we have a restriction functor Res : mod-A → mod-eAe and
induction/coinduction functors Ind, Coind : mod-eAe → mod-A given by
Ind(M ) = M ⊗eAe eA, Res(M ) = M e and Coind(M ) = HomeAe(Ae, M ).
Moreover, Ind is right exact, Res is exact, Coind is left exact and Ind and
Coind are the left and right adjoints of Res, respectively (where a functor is
left exact if it preserves finite limits and right exact if it preserves finite col-
imits). This follows from observing that HomA(eA, M ) = M e = M ⊗A Ae
and the usual adjunction between hom and the tensor product. Further-
more, it is well known that the unit of the first adjunction gives a natural
isomorphism M ∼= Ind(M )e while the counit of the second gives a natural
isomorphism Coind(M )e ∼= M .
We need the following lemma relating congruences on M and M e.
Proposition 3.3. Let M be an A-module and let e ∈ A be an idempotent.
Then every congruence R on M e extends to a congruence R′ on M by setting
m R′ m′ if and only if mae R m′ae for all a ∈ A. Moreover, R′ is the largest
congruence whose restriction to M e is contained in R.
Proof. Clearly R′ is k-module congruence. To see that it is an A-module
congruence, suppose b ∈ A and m R′ m′. Then for any a ∈ A, we have
m(bae) R m′(bae) and so mb R′ m′b as required. Finally, observe that if
m, m′ ∈ M e and m R′ m′, then m = mee R m′ee = m′. Conversely, if
m, m′ ∈ M e are R-related and a ∈ A, then mae = meae R m′eae = m′ae
and so m R′ m′. Thus R′ extends R.
Finally, suppose that R′′ is some other congruence on M whose restriction
to M e is contained in R and suppose m R′′ m′. Then if a ∈ A one has
mae R m′ae and so m R′ m′ completing the proof.
(cid:3)
Let M be an A-module and define
N (M ) = {(m, m′) mae = m′ae, ∀a ∈ A}
and L(M ) = M eA. It is easily verified using Proposition 3.3 that N (M )
is the largest congruence on M whose restriction to M e is trivial. On the
other hand, L(M ) is the smallest A-submodule of M with L(M )e = M e.
The congruence class of 0 under N (M ) is
K(M ) = {m ∈ M mae = 0, ∀a ∈ A}.
It is also the largest submodule of M annihilated by e. The constructions
K, L, N are functorial.
Observe that if V is an eAe-module, then
L(Ind(V )) = Ind(V )eA = V ⊗eAe eAeA = V ⊗eAe eA = Ind(V ).
(3.2)
Alternatively, one can observe that Ind(V )eA satisfies the same universal
property as Ind(V ).
The analogue of our next result for rings can be found in [15, Chapter
6.2]. The proof for semirings is essentially a modification. We remind the
6
Z. IZHAKIAN, J. RHODES, AND B. STEINBERG
reader that if M is an A-module and N is a submodule, then M/N is the
quotient of M by the congruence given by m ≡ m′ mod N if and only if
there exist n, n′ ∈ N with m + n = m′ + n′; it is the largest congruence
identifying all elements of N with 0, cf. [33, Chapter 9].
Lemma 3.4. Let A be a k-algebra and e an idempotent of A.
(1) If M is an irreducible (minimal, simple) A-module, then M e = 0 or
M e is an irreducible (minimal, simple) eAe-module.
(2) If V is a minimal eAe-module, then the unique maximal A-submodule
of Ind(V ) is K(Ind(V )). Moreover, the minimal A-modules M with
M e ∼= V are (up to isomorphism) the quotients of Ind(V ) by con-
gruences in between congruence modulo K(Ind(V )) and N (Ind(V )).
(3) If V is a simple eAe-module, then Ind(V ) has unique maximal con-
gruence N (Ind(V )). Moreover, if V is irreducible, then the quo-
tient Ind(V )/N (Ind(V )) is the unique irreducible A-module M with
M e ∼= V .
(4) If V is a minimal eAe-module, then Coind(V ) has unique minimal
A-submodule L(Coind(V )). Furthermore, if V is irreducible, then
L(Coind(V )) is the unique irreducible A-module M with M e ∼= V .
Consequently, restriction yields a bijection between irreducible A-modules
that are not annihilated by e and irreducible eAe-modules.
Proof. To prove (1), assume M e 6= 0. Suppose first that M is minimal
and let m ∈ M e be non-zero. Then meA = mA = M , so meAe = M e.
Thus M e is minimal. Next suppose that M is simple and let R be a proper
congruence on M e. Then R′ from Proposition 3.3 is a proper congruence
on M and hence trivial. But then R, which is the restriction of R′ to M e,
is trivial. Thus M e is simple. The irreducible case follows by combining the
minimal and simple cases.
Next we turn to (2). Suppose that L is a proper submodule of Ind(V ).
Then Le is an eAe-submodule of Ind(V )e ∼= V . By minimality of V , either
Le = {0}, and so L ⊆ K(Ind(V )), or Le = Ind(V )e.
In the latter case
we have L ⊇ LeA = Ind(V )eA = Ind(V ), where the last equality uses
(3.2). Thus K(Ind(V )) is the unique maximal proper submodule. It follows
that Ind(V )/K(Ind(V )) is minimal. Next observe that since N (Ind(V ))
has trivial restriction to Ind(V )e, Proposition 2.7 now implies that, for any
congruence R between congruence modulo K(Ind(V )) and N (Ind(V )), one
has that Ind(V )/R is minimal and [Ind(V )/R]e ∼= V . Finally, suppose that
M is a minimal A-module with M e ∼= V . Then the adjunction yields a
non-zero homomorphism ϕ : Ind(V ) → M which is surjective by minimality
and restricts to an isomorphism of eAe-modules from Ind(V )e → M e. In
particular, it follows that the congruence ker ϕ is injective on Ind(V )e and
hence contained in N (Ind(V )). Also, as K(Ind(V ))e = 0 and M e 6= 0,
minimality implies ϕ(K(Ind(V ))) = 0. This establishes (2).
Now we turn to (3). Let V be a simple eAe-module.
It is immediate
from (3.2) that any proper congruence on Ind(V ) must restrict to a proper
REPRESENTATION THEORY OF FINITE SEMIGROUPS OVER SEMIRINGS
7
congruence on Ind(V )e ∼= V . But V is simple and so the only proper con-
gruence on V is the trivial one. Proposition 3.3 now implies that N (Ind(V ))
is the unique maximal congruence on Ind(V ). Assume furthermore that V
is irreducible. Then Ind(V )/N (Ind(V )) is minimal, and hence irreducible,
and [Ind(V )/N (Ind(V ))]e ∼= V by (2). Uniqueness follows also from (2),
since if M is irreducible with M e ∼= V , then in particular M is minimal and
so isomorphic to Ind(V )/R for a certain congruence R ⊆ N (Ind(V )). But
simplicity of M implies that R = N (Ind(V )). This completes the proof of
(3).
Finally, to prove (4) first observe that if M is any non-zero A-submodule
of Coind(V ), then M e 6= 0. Indeed, suppose M e = 0 and let ϕ ∈ M . Then,
for any x in Ae, we have ϕ(x) = (ϕxe)(e) = 0 since ϕxe ∈ M e = 0. It follows
that M = 0. Since Coind(V )e ∼= V is a minimal eAe-module, it now follows
that if M is a non-zero A-submodule of Coind(V ), then M e = Coind(V )e
and hence
L(Coind(V )) = Coind(V )eA ⊆ M eA ⊆ M.
This establishes that L(Coind(V )) is the unique minimal A-submodule.
Suppose now that V is irreducible. We must show that any proper congru-
ence on L(Coind(V )) is trivial. Since Coind(V )e ∼= V is irreducible, it fol-
lows that any proper congruence on L(Coind(V )) is trivial on L(Coind(V ))e
and so by Proposition 3.3 it suffices to show that N (L(Coind(V ))) is the
trivial congruence. So suppose ϕ, ψ ∈ L(Coind(V )) are equivalent and let
a ∈ A. Then
ϕ(ae) = (ϕae)(e) = (ψae)(e) = ψ(ae)
Since L(Coind(V ))e = Coind(V )eAe = Coind(V )e ∼= V ,
and hence ϕ = ψ. This completes the proof L(Coind(V)) that is irreducible.
it just re-
mains to prove uniqueness. Suppose M is an irreducible A-module with
M e ∼= V . Then the existence of a non-zero element of HomeAe(M e, V ) ∼=
HomA(M, Coind(V )) implies that M admits a non-zero homomorphism to
Coind(V ). Hence M is isomorphic to an irreducible (and hence minimal) A-
submodule of Coind(V ). But L(Coind(V )) is the unique minimal submodule
of Coind(V ) and so M ∼= L(Coind(V )), as required.
(cid:3)
We may now etablish an analogue of the Clifford-Munn-Ponizovskiı the-
orem for semirings.
Theorem 3.5. Let S be a finite semigroup, k a commutative semiring with
unit and E = {eJ J ∈ U (S)} be an idempotent transversal to the set U (S)
of regular J -classes of S. Let GJ be the maximal subgroup GeJ . Define
functors IndJ , CoindJ : mod-kGJ → mod-kS by
IndJ (V ) = V ⊗kGJ eJ (kS/kJ 6 ↑)
CoindJ (V ) = HomkGJ ((kS/kJ 6 ↑)eJ , V ).
Then:
8
Z. IZHAKIAN, J. RHODES, AND B. STEINBERG
(1) If M is an irreducible (minimal) kS-module with apex J, then M eJ
is an irreducible (minimal) kGJ -module;
(2) If V is an irreducible kGJ -module, then
N = {(u, v) ∈ IndJ (V ) uae = vae, ∀a ∈ kS/kJ 6 ↑},
is the unique maximal congruence on IndJ (V ) and IndJ (V )/N is the
unique irreducible kS-module M with apex J such that M eJ ∼= V ;
(3) If V is an irreducible kGJ -module, then the unique minimal kS-
submodule of CoindJ (V ) is CoindJ (V )eJ kS, which moreover is the
unique irreducible kS-module M with apex J such that M eJ ∼= V .
(4) If V is a minimal kGJ -module, then
K = {m ∈ IndJ (V ) mae = 0, ∀a ∈ kS/kJ 6 ↑}
is the unique maximal kS-submodule of IndJ (V ). Moreover, the min-
imal kS-modules M with apex J such that M eJ ∼= V are up to iso-
morphism the quotients IndJ (V )/R with (retaining the notation of
(2)) R ⊆ N and K contained in a single class of R.
Consequently, there is a bijection between the irreducible kS-modules and
the irreducible kGJ -modules, where J runs over U (S).
Proof. Theorem 3.2 implies that every minimal kS-module M has an apex.
Again setting AJ = kS/kJ 6 ↑ for a regular J -class J, we know that irre-
ducible kS-modules with apex J are in bijection with irreducible AJ -modules
M such that M eJ 6= 0. It follows directly from Fact 2.3 that
eJ AJ eJ = keJ SeJ /keJ J 6 ↑eJ = kGJ .
Lemma 3.4 then yields that irreducible AJ -modules not annihilated by eJ ,
that is, irreducible kS-modules with apex J, are in bijection with irreducible
kGJ -modules in the prescribed manner. Similarly, the minimal kS-modules
are as advertised by application of Lemma 3.4.
(cid:3)
3.1. A construction in coordinates. Let us relate the above construction
of the irreducible modules to the explicit ones found in [20,34] for fields. All
the facts about finite semigroups used in this discussion can be found in the
appendix of [33] or in [19]. According to Green [14], two elements s, t of a
semigroup are said to be R-equivalent if they generate the same principal
right ideal. Dually s, t are said to be L -equivalent if they generate the same
principal left ideal.
Once more let S be a finite semigroup, k a commutative semiring with
unit and E = {eJ J ∈ U (S)} an idempotent transversal to the set U (S)
of regular J -classes of S. Let GJ be the maximal subgroup GeJ . We use
LJ and RJ for the L - and R-classes of eJ , respectively.
Here we follow [22] to give a concrete description of the irreducible kS-
modules. If V is an irreducible kGJ -module, we use eV for the corresponding
irreducible kS-module. The reader should recall the definition of radical and
socle from Definition 2.5.
REPRESENTATION THEORY OF FINITE SEMIGROUPS OVER SEMIRINGS
9
Proposition 3.6. Let V be an irreducible kGJ -module. Then there is a
natural isomorphism HomkS(IndJ (V ), CoindJ (V )) ∼= HomkGJ (V, V ) 6= 0.
Moreover, if ϕ ∈ HomkS(IndJ (V ), CoindJ (V )) is non-zero, then we have
ker ϕ = rad(IndJ (V )) and Im ϕ = eV = Soc(CoindJ (V )).
Proof. First note that since IndJ (V ), CoindJ (V ) are kS/kJ 6 ↑-modules, the
adjunction yields
HomkGJ (V, V ) = HomkGJ (IndJ (V )eJ , V ) ∼= HomkS(IndJ (V ), CoindJ (V )).
Suppose now that ϕ : IndJ (V ) → CoindJ (V ) is a non-zero homomorphism.
Because IndJ (V )eJ kS = IndJ (V ) by construction, it follows that
ϕ(IndJ (V )) = ϕ(IndJ (V ))eJ kS ⊆ CoindJ (V )eJ kS = eV .
Since ϕ 6= 0,
As IndJ (V ) has a unique maximal congruence, we conclude that ker ϕ =
rad(IndJ (V )).
(cid:3)
it follows by irreducibility of eV , that ϕ(IndJ (V )) = eV .
Observe that as k-modules, kLJ = (kS/kJ 6 ↑)eJ and kRJ = eJ kS/kJ 6 ↑
by stability. Moreover, the corresponding kGJ -kS-bimodule structure on
kRJ is induced by left multiplication by elements of GJ and by the right
Schutzenberger representation of S on RJ [6, 19, 33] (i.e., the action of S on
RJ by partial functions obtained via restriction of the regular action). To
simplify notation, we will use kRJ and kLJ for the rest of this section. Then
we have
IndJ (V ) = V ⊗kGJ kRJ
CoindJ (V ) = HomkGJ (kLJ , V ).
Multiplication in the semigroup induces a non-zero homomorphism
CJ : kRJ ⊗kS kLJ ∼= eJ kS/kJ 6 ↑ ⊗kS (kS/kJ 6 ↑)eJ → eJ (kS/kJ 6 ↑)eJ ∼= kGJ
which moreover is a map of kGJ -bimodules.
Let T ⊆ RJ be a complete set of representatives of the L -classes of J and
T ′ ⊆ LJ be a complete set of representatives of the R-classes of J. Then
GJ acts freely on the left of RJ and T is a transversal for the orbits and
dually T ′ is a transversal for the orbits of the free action of GJ on the right
of LJ , see [33, Appendix A]. Thus kRJ is a free left kGJ -module with basis
T and kLJ is a free right kGJ -module with basis T ′.
It is instructive to
verify that the associated matrix representation over kGJ of S on kRJ is
the classical right Schutzenberger representation by row monomial matrices
and the representation of S on kLJ is the left Schutzenberger representation
by column monomial matrices [6,19,33,34]. Hence if ℓJ = T and rJ = T ′,
then as kGJ -modules we have kRJ ∼= kGℓJ
J . Thus CJ is
the bilinear form given by the ℓJ × rJ -matrix (also denoted CJ ) with
J and kLJ ∼= kGrJ
(3.3)
(CJ )ba =(λbρa λbρa ∈ J
otherwise
0
10
Z. IZHAKIAN, J. RHODES, AND B. STEINBERG
where λb ∈ T represents the L -class b and ρa ∈ T ′ represents the R-class a.
Note that (CJ )ba ∈ GJ ∪{0} by stability and CJ is just the usual sandwich (or
structure) matrix of the J -class J coming from the Green-Rees structure
theory [6,19,33]. The reader may take (3.3) as the definition of the sandwich
matrix if he/she so desires.
Suppose now that V is a kGJ -module. We can consider the induced map
V ⊗ CJ : V ⊗kGJ kRJ ⊗kS kLJ → V ⊗kGJ kGJ ∼= V
which moreover is non-zero as v ⊗ eJ ⊗ eJ 7→ v. From the isomorphism
HomkGJ (V ⊗kGJ kRJ ⊗kS kLJ , V ) ∼= HomkS(V ⊗kGJ kRJ , HomkGJ (kLJ , V ))
we obtain a corresponding non-zero kS-linear map
V ⊗ CJ : IndJ (V ) → CoindJ (V )
(abusing notation).
Putting together the above discussion with Proposition 3.6, we obtain the
following result.
Theorem 3.7. Let V be an irreducible kGJ -module. Then the irreducible
kS-module corresponding to V is the image of the morphism
V ⊗ CJ : IndJ (V ) → CoindJ (V )
where CJ is the sandwich matrix for J, i.e., it is the k-span of the rows of
V ⊗ CJ .
Remark 3.8. Note that since kRJ and kLJ are free kGJ -modules with bases
T and T ′ respectively, as k-modules, we have IndJ (V ) = V ℓJ and IndJ (V ) =
V rJ ; in particular, these two functors are exact. Moreover, one can easily
compute that V ⊗ CJ is given via right multiplication by CJ where we view
elements of V ℓJ and V rJ as row vectors with entries in V .
A semigroup S is called generalized group mapping if it has a distinguished
(0-)minimal ideal I on which it acts faithfully on both the left and right [33,
Chapter 4]. The distinguished ideal is unique and regular. The following
result generalizes a result of Rhodes and Zalcstein for fields [34]. The original
proof uses Wedderburn theory, while our proof uses the description of the
irreducible modules. Recall that a module M is faithful for S if ms = mt
for all m ∈ M implies s = t.
Proposition 3.9. Let S be a finite semigroup and suppose that the irre-
ducible kS-module M is faithful. Then S is generalized group mapping with
distinguished ideal J or J ∪ {0} where J is the apex of M .
Proof. We just handle the case that S has a zero element 0, as the other
case is easier. Also, by Schur's lemma, 0 must act either as the identity (in
which case S is trivial) or as the zero endomorphism of M . Suppose that we
are in the latter case. By definition of an apex, it is clear that I = J ∪ {0} is
an ideal. Let e ∈ E(J) and put V = M e. Then M is a quotient of IndJ (V )
and a submodule of CoindJ (V ). It then follows that S acts faithfully on
REPRESENTATION THEORY OF FINITE SEMIGROUPS OVER SEMIRINGS
11
IndJ (V ) and CoindJ (V ). Now if s, t act the same on the right of I, then
they will act the same on the right of Re and hence on IndJ (V ). Thus the
action of S on the right of I is faithful. Similarly, if s, t act the same on the
left of I, then they act the same on the left of Le and hence on CoindJ (V ).
This completes the proof that S is generalized group mapping.
(cid:3)
4. The case of idempotent semirings
It turns out that we could have restricted our attention to two cases
for irreducible modules: rings (already handled in [11]) and idempotent
semirings, as the following observation shows, cf. [40].
Proposition 4.1. Let S be a finite semigroup and M a simple kS-module.
Then the additive structure of M is either an abelian group or a join semi-
lattice with minimum.
Proof. Define a relation on M by m ≡ n if there exists j, k ∈ N so that
jm ∈ n + M and kn ∈ m + M . It is straightforward to verify that ≡ is
a congruence. Suppose first that ≡ is trivial and let m ∈ M . Then since
m ≡ m + m, it follows that m + m = m and so M is a join semilattice with
minimum. If ≡ is not proper, then m ≡ 0 and hence 0 ∈ M + m and so M
is an additive group.
(cid:3)
Let us now consider the join semilattice case. It turns out that in this
case, every representation of a finite group is trivial and so there is exactly
on irreducible module over an idempotent semiring associated to any regular
J -class of a finite semigroup.
Proposition 4.2. Let G be a finite group and k a commutative semiring
with unit. Suppose that M is a minimal kG-module with idempotent addi-
tion. Then there is a quotient semiring k′ of k so that M = k′ with trivial
action by G.
Proof. By minimality, it follows that G acts by automorphisms of M . Let
0 6= m0 ∈ M and put m = Pg∈G m0g. Then m is evidentally fixed by G
and so the k-span of m is a kG-submodule and hence is M by minimality.
If k′ is the faithful quotient of k acting on M , then M = k′ with the trivial
G-action.
(cid:3)
In particular, if k is a congruence-free commutative idempotent semiring
with unit (e.g., the boolean semiring B), then the trivial action of G on k is
the only irreducible kG-module for G a group. Recall that a finite semigroup
is aperiodic if all its maximal subgroups are trivial.
Corollary 4.3. Let S be a finite semigroup with a faithful irreducible kS-
module M whose addition is idempotent. Then S is generalized group map-
ping with aperiodic distinguished minimal ideal.
Proof. By Proposition 3.9, S is generalized group mapping. Let J be the
apex of M and let e ∈ J be an idempotent. Then M e is an irreducible
12
Z. IZHAKIAN, J. RHODES, AND B. STEINBERG
kGe-module, and hence has trivial action of Ge by Proposition 4.2. By
faithfulness, we conclude Ge is trivial. Since Ge is the maximal subgroup of
the distinguished ideal of S, this completes the proof.
(cid:3)
The irreducible BS-modules admit the following description.
Theorem 4.4. Let S be a finite semigroup. Then the minimal and irre-
ducible BS-modules are obtained as follows. Fix a regular J -class J of S
with set A of R-classes and B of L -classes. Let C : B × A → B be the
matrix with Cba = 1 if and only if the H -class a ∩ b contains an idempotent.
Let BB be the free module on B and consider the natural right action of S on
BB. Define a congruence ≡ on BB by putting m ≡ n if ms = 0 ⇐⇒ ns = 0
for all s ∈ S. Then:
(1) The congruence ≡ is the unique maximal proper congruence on B;
(2) The module BB is minimal, as is every proper quotient of B;
(3) BB/≡ is irreducible and all irreducible modules BS-modules are of
this form for some J -class.
Alternatively, BB/≡ can be identified with the B-span of the rows of the
matrix C.
Proof. First observe that by Proposition 4.2, the only minimal (and hence
irreducible) module for a finite group G over B is B equipped with the trivial
action of G. Thus each J -class provides a unique irreducible BS-module
MJ , coming from the trivial representation of the maximal subgroup.
Let us observe that C is the tensor product of the structure matrix of
J with the trivial representation of the maximal subgroup of G. It follows
that MJ can be identified with the B-span of the rows of C by Theorem 3.7.
This theorem also implies that MJ ∼= BB/ker C. Let m, n ∈ BB. Then
first observe that mC is determined by which entries are 0. Now (mC)a =
Pb∈B mbCba and hence is 0 if and only if m is annihilated by the R-class
It now follows that mC = nC if and only if, for all s ∈ J, one has
a.
ms = 0 ⇐⇒ ns = 0.
Next observe that since J is the apex of MJ , it follows easily by minimality
of MJ that if 0 6= m ∈ MJ , then mJ 6= 0. Thus if ms 6= 0 with s ∈ S, we
can find x ∈ J so that msx 6= 0. In particular, it follows by the definition of
an apex that sx ∈ J. We conclude that m ≡ n if and only if ms = 0 ⇐⇒
ns = 0 for all s ∈ J. This completes the proof of the (3) of the proposition.
The general theory implies that BB has a unique maximal congruence and
hence it must be ≡.
It remains to prove (2). First notice that by the general theory, the unique
maximal submodule of BB is the congruence class of 0 under the unique
maximal congruence. Therefore, the unique maximal submodule of BB is
the set of all vectors annihilated by C. But C is a boolean matrix with no
zero rows or columns. Hence, no non-zero vector in BB is annihilated by C.
Thus BB is minimal and hence so are all its quotients by Proposition 2.7. (cid:3)
REPRESENTATION THEORY OF FINITE SEMIGROUPS OVER SEMIRINGS
13
In [33, Chapter 4.6], it is shown that, for each regular J -class J of a finite
semigroup S, there is a unique congruence ≡J on S such that S/≡J is gener-
alized group mapping with aperiodic distinguished ideal and J 6 ↑ maps to 0.
The resulting quotient is denoted AGGMJ (S) and the quotient map is written
ΓJ : S → AGGMJ (S). Consequently, AGGMJ (S) must then be isomorphic
to the image of S under the irreducible representation S → EndB(MJ ) con-
structed in the above proof. In [33, Chapter 4] (see also [39]), it is shown that
the intersection over all regular J -classes J of the congruences ≡J is the
largest J ′-congruence on S. Recall that a congruence ≡ is a J ′-congruence
if s ≡ t and s, t regular implies s J t. Thus we have proved:
Theorem 4.5. The largest J ′-congruence on a finite semigroup is the con-
gruence associated to the direct sum of all irreducible representations of S
over B.
The analogous theorems for fields of characteristic 0 and p can be found
in [1, 32].
A semigroup S is called a local group if eSe is a group for each idempotent
e ∈ S. The collection of finite local groups is denoted LG and is a pseudova-
riety, i.e., is closed under finite products, subsemigroups and homomorphic
images. If V is a pseudovariety, then the Mal'cev product LG (cid:13)m V consists
of all finite semigroups S admitting a homomorphism ϕ : S → T with T ∈ V
and ϕ−1(e) ∈ LG for each idempotent e of T . Theorem 4.5 in conjunction
with [33, Theorem 4.6.50] yields our next result.
Corollary 4.6. Let V be a pseudovariety of semigroups and let S be a finite
semigroup. Then S ∈ LG (cid:13)m V if and only if the image of S under every
irreducible representation over B belongs to V.
4.1. Duality and simple boolean modules. If M is a finite join semi-
lattice with identity, then it is automatically a complete lattice. The dual
semilattice M op is M with the reverse ordering. It can be identified with
the collection of functionals f : M → B with pointwise operations. Indeed,
it is well known [33, Chapter 9] that the functionals are given by choosing
m ∈ M and defining
ϕm(n) =(0 n ≤ m
1 n (cid:2) m
and so m ≤ k if and only if ϕk ≤ ϕm.
From now on we identify M op with the space of functionals. It will be
convenient to use the following boolean analogue of the Stone-Weierstrass
theorem.
Proposition 4.7. Let M be a finite join semilattice with identity. Then
a subsemilattice with identity N ⊆ M op is equal to M op if and only if it
separates the points of M .
Proof. By the above construction of the functionals, it is clear that M op
separates the points of M . Suppose that N is a proper subsemilattice of M
14
Z. IZHAKIAN, J. RHODES, AND B. STEINBERG
with identity and let
M ′ = {m ϕm ∈ N }.
Then M ′ is a proper meet-semilattice containing the top of M . Let m be a
maximal element of M that does not belong to M ′. Then the set of elements
strictly above m is non-empty and belongs to M ′. It therefore has a meet m′
in M ′, which must be the unique cover of m. Suppose that f ∈ N . We claim
f (m) = f (m′). Indeed, if f = ϕk with k ∈ M ′, then we have two cases. If
m ≤ k, then since m < k we have m′ ≤ k and so f (m) = 0 = f (m′). If
m (cid:2) k, then certainly m′ (cid:2) k and so f (m) = 1 = f (m′). It follows that N
does not separate points of M .
(cid:3)
Suppose now that M is a finite right-BS module for a finite semigroup S.
Then M op is naturally a left BS-module by putting sf (m) = f (ms).
Theorem 4.8 (Duality). Let S be a finite semigroup and let M be a finite
right BS-module. Then M is simple (minimal) if and only if M op is minimal
(simple).
Proof. Since (M op)op ∼= M , it suffices to show that M is simple if and only if
M op is minimal. Suppose first that M is simple and let N be a non-zero BS-
submodule of M op. Define a congruence ≡ on M by m ≡ m′ if f (m) = f (m′)
for all f ∈ N . This is a congruence because m ≡ m′ and s ∈ S implies that,
for all f ∈ N , we have f (ms) = sf (m) = sf (m′) = f (m′s) as sf ∈ N . Thus
ms ≡ m′s and so ≡ is a congruence. Since N contains a non-zero functional
f , it follows that ≡ is a proper congruence. Thus by simplicity of M , it
follows that ≡ is the trivial congruence. Thus the elements of N separate
points and so N = M op by Proposition 4.7. It follows that M op is minimal.
Conversely, suppose that M op is minimal and let ≡ be a non-trivial con-
gruence on M . Let N = {f ∈ M op ≡ ⊆ ker f }. Then N is a BS-submodule
of M op. Indeed, trivially 0 ∈ N . If f, g ∈ N and m ≡ m′, then (f + g)(m) =
f (m) + g(m) = f (m′) + g(m′) = (f + g)(m′). Finally, if f ∈ N , s ∈ S and
m ≡ m′, then ms ≡ m′s and so sf (m) = f (ms) = f (m′s) = sf (m′). Thus
sf ∈ N . Since M op separates points and ≡ is non-trivial, we conclude that
N 6= M op and hence N = 0 by minimality. Suppose ≡ is proper. Then
M/≡ 6= 0 and has enough functionals to separate points. Hence there is a
non-zero functional f on M with ≡ ⊆ ker f , a contradiction. Thus ≡ is not
proper. This completes the proof that M is simple.
(cid:3)
It follows that in principle, we can construct the simple BS-modules by du-
alizing the minimal left BS-modules, which are constructed in Theorem 4.4.
4.2. Characters. In this subsection we propose a definition of the character
of a boolean representation and also the notion of a generalized character.
These results are preliminary and will be expanded on in a future paper.
Let M be a finite lattice, which we view as a B-module via its join (and
hence we utilize additive notation for the join).
REPRESENTATION THEORY OF FINITE SEMIGROUPS OVER SEMIRINGS
15
Definition 4.9 (sji). An element m ∈ M is said to be strictly join irreducible
(or sji) if m 6= 0 and m = m1 + m2 implies m = m1 or m = m2. See [33,
Chapter 6.1.2].
Let us denote by min M the set of sji elements: it is the the unique minimal
spanning set of M as a B-module. In particular, M is a free B-module if
and only if min M is a basis. Let us say that a decomposition
m = Xx∈min M
cxx
(4.1)
is irredundant if changing any coefficient cx from a 1 to a 0 results in a strictly
smaller element of M . In other words, an irredundant decomposition is one
of the form m = Px∈X x with X ⊆ min M and such that for no proper
subset Y ( X is m = Py∈Y y.
If M is free, then any decomposition of
an element m is irredundant and in particular x ∈ min M appears in an
irredundant decomposition of m if and only if x ≤ m.
Example 4.10. Let M be the span of B = {(1, 0, 0), (1, 1, 0), (0, 1, 1)} in B3.
Then min M = B. Now one checks
(1, 1, 1) = (1, 0, 0) + (0, 1, 1)
(1, 1, 1) = (1, 1, 0) + (0, 1, 1)
and these are all the irredundant decompositions of (1, 1, 1).
Suppose that S is a finite semigroup and M is a module for S over a field
k. Let χ be the character of M . Then if B is a basis for M , one has that
where
χ(s) =Xb∈B
bs = Xb′∈B
cbb
cbb′b′.
In other words, it sums over all b ∈ B the multiplicity of b in the decom-
position of bs with respect to the basis B (where the multiplicity is taken
in the field k). The problem with extending this idea to boolean case is
the non-uniqueness of irredundant decompositions. So instead we try and
minimize over all decompositions. With this in mind, we proceed to define
the character of a BS-module in two steps.
Definition 4.11 (Character of a boolean matrix representation). Suppose
that ϕ : S → Mn(B) is a matrix representation. Let B be the basis of Bn.
Then define
χϕ(s) = {b ∈ Bbs ≥ b} .
Equivalently, χϕ(s) is the trace tr(ϕ(s)) where we view ϕ(s) as a zero-one
matrix over C. If M is the corresponding BS-module, then we also use the
notation χM for its character.
16
Z. IZHAKIAN, J. RHODES, AND B. STEINBERG
Recall [2] that a boolean representation ϕ : S → Mn(B) is unambiguous if
the product ϕ(s)ϕ(t), viewed as matrices over C, coincides with ϕ(st). Un-
ambiguous representations play a key role in the theory of rational codes [2].
We shall say that a BS-module M is unambiguous if it is a free B-module
and the corresponding matrix representation is unambiguous. For instance,
if S acts on a finite set X, then the BS-module BX is unambiguous. From
the definition, it is immediate that the character of an unambiguous module
is a complex character of the semigroup.
Next suppose that M is a finite BS-module (with S a finite semigroup).
Then there is a natural surjective B-linear map π : B(min M ) → M induced
by the identity map on min M . Associated to each set-theoretic section
σ : M → B(min M ) of π with σmin M = 1min M is a BS-module structure Mσ
on B(min M ) defined by sx = σ(sx) for s ∈ S and x ∈ min M . Moreover,
notice that if S has an identity 1 and M is unitary, then 1x = σ(1x) =
σ(x) = x and so Mσ is unitary. In any case, one has that π : Mσ → M is a
surjective morphism of BS-modules.
Definition 4.12 (Min character). Let S be a finite semigroup and M a
finite BS-module. Then the min character χM : S → N is defined by
χM (s) = min{χMσ (s)}
where σ runs over all set-theoretic sections of π : B(min M ) → M with
σmin M = 1min M .
In more concrete terms, to compute χM (s), one first fixes an irredundant
decomposition of each element of M . Then one counts how many x ∈ min X
appear in the chosen irredundant decomposition of xs. Then one minimizes
this quantity over all choices made. Of course, if M is a BS-module that
is free as a B-module, then clearly the two notions of the character of M
coincide.
Example 4.13. Let M be the span of B = {(1, 0, 0), (1, 1, 0), (0, 1, 1)} in B3.
The remaining elements of M are (0, 0, 0) and (1, 1, 1). As observed earlier
min M = B. Any admissible section of π must be the identity on all elements
of M except (1, 1, 1), which has three lifts:
(1, 1, 1) = (1, 0, 0) + (0, 1, 1)
(1, 1, 1) = (1, 1, 0) + (0, 1, 1)
(1, 1, 1) = (1, 0, 0) + (1, 1, 0) + (0, 1, 1)
and so there are three corresponding sections σ1, σ2, σ3. Let S be the two-
element semilattice {1, e} and let S act on M by having 1 act as the identity
and e act via the map sending all non-zero elements to (1, 1, 1) (and of course
preserving zero). Then M is a BS-module. Let us compute χM (e). It is easy
to compute χMσ1 (e) = 2, χMσ2 (e) = 2 and χMσ3 (e) = 3. Thus χM (e) = 2.
Notice that σ3 corresponds to a redundant decomposition and hence has to
be eliminated when taking the minimum.
REPRESENTATION THEORY OF FINITE SEMIGROUPS OVER SEMIRINGS
17
Notice that if we were working over C, then B would be a basis for C and
if e took each basis vector to (1, 1, 1), then since (1, 1, 1) = (1, 0, 0) + (0, 1, 1)
we would also get 2 as being the character value on e.
Next we discuss the notion of a generalized character. Let M be a finite
BS-module and min M ⊆ D ⊆ M \ {0}. Then we define the generalized
character ψM,D : S → N by
ψM,D(s) = {m ∈ D ms = m} .
For example, if S acts on the finite set X, then the generalized character
ψBX,X is the complex character of the CS-module CX and also coincides
with the min character introduced above. Let us define the generalized
character spectrum cspec(M ) to be the set of all min M ⊆ D ⊆ M \ {0}
such that ψM,D is a complex character of S.
Proposition 4.14. Let M be a non-zero finite BS-module. Let min M ⊆
D ⊆ M \ {0} be a subset such that d ∈ D implies ds ∈ D ∪ {0} for all s ∈ S.
Then D ∈ cspec(M ). In particular, M \ {0} ∈ cspec(M ).
Proof. Let us write for the moment θ for the zero of M and put D′ = D∪{θ}.
Then S acts by total functions on D′. Thus CD′ is a finite dimensional
CS-module in a natural way and Cθ is a CS-submodule. Consider the CS-
module V = CD/Cθ. It is easy to see that ψM,D is precisely the character
of V . This completes the proof.
(cid:3)
Recall that if S is a semigroup and R is an R-class the Schutzenberger
representation of S on R is the actions of S on R by partial transformations
given by r · s = rs if rs ∈ R and otherwise is undefined (where r ∈ R and
s ∈ S). One can turn CR into a CS-module as follows. First let S act on
R ∪ {(cid:3)} by sending all undefined products to (cid:3) and demanding (cid:3)s = (cid:3) for
all s ∈ S. Then consider the CS-module C(R ∪ {(cid:3)})/C(cid:3) (which as a vector
space is isomorphic to CR).
Theorem 4.15. Let S be a finite semigroup and MJ an irreducible BS-
module where we retain the notation of Theorem 4.4. Then there is subset
min M ⊆ D ⊆ M \ {0} such that the generalized character ψM,D is the
complex character of S obtained by lifting the right Schutzenberger repre-
sentation of AGGMJ (S) on an R-class of its distinguished J -class via the
projection ΓJ : S → AGGMJ (S).
Proof. Without loss of generality, we may assume that the action of S on
MJ is faithful and hence S = AGGMJ (S). In this case, since J is aperiodic,
we may identify the action of S on B by partial transformations with the
Schutzenberger representation. Let [b] denote the equivalence class of b ∈ B
under the congruence ≡ on B from Theorem 4.4. Then D = {[b] b ∈ B}
satisfies the conditions of Proposition 4.14. If we can show that the map
b 7→ [b] is injective, then the proof of Proposition 4.14 will imply that ψMJ ,D
is the complex character of the Schutzenberger representation. Suppose that
18
Z. IZHAKIAN, J. RHODES, AND B. STEINBERG
[b] = [b′] with b 6= b′. Let a be an R-class of J and choose s ∈ a ∩ b and
s′ ∈ a ∩ b′. Then, for x ∈ B, one has [x]s = [b] if Cxa = 1 and is otherwise
0 and [x]s′ = [b′] if Cxa = 1 and is otherwise 0. Thus s and t act the same
on MJ and so the action of S on MJ is not faithful, a contradiction. This
completes the proof.
(cid:3)
5. Density
This section relates our work with that of Zumbragel [40]. In particular,
we look at irreducible modules for semirings and discuss an application to
semigroups. Of course, any irreducible module for a semiring R is an irre-
ducible module for its underlying multiplicative semigroup, but the converse
is false. So in principle if R is a finite semiring, then we can use our results
to understand its irreducible representations as a semiring. One just has to
determine which irreducible representations preserve the additive structure.
However, since we are not assuming in general that the semirings in question
are finite and also because proofs can become shorter and coordinate-free
by taking advantage of the additive structure, we do not treat the represen-
tation theory of semirings as a special case of the representation theory of
semigroups.
1, . . . , m′
1, . . . , m′
A semiring R is called primitive if it has a faithful irreducible module M .
Let D be a division ring and M a left vector space over D. Then a subring
R ⊆ EndD(M ) is said to be dense if, for any pair of k-tuples (m1, . . . , mk)
and (m′
k) of linearly independent elements of M , there is an ele-
ment r ∈ R with (m1r, . . . , mnr) = (m′
k). If R is a primitive ring
with faithful irreducible module M , then EndR(M ) is a division ring D by
Schur's lemma and so R ⊆ EndD(M ). Jacobson's density theorem shows
that R must be a dense subring. Zumbragal [40] proved an analogous re-
sult for finite primitive semirings with idempotent addition, although he
stated it only under the hypothesis that R is congruence-simple. In fact,
for finite semirings with idempotent addition, being primitive implies being
congruence-simple. For finite rings, primitivity is also equivalent to simplic-
ity since a finite primitive ring R will have a faithful finite irreducible module
M and hence D above will be a finite division ring and thus a field by a the-
orem of Wedderburn. But then R will be a finite dimensional algebra over
a field with a faithful irreducible module and hence by Wedderburn-Artin
theory is simple.
Because Zumbragal does not state his result [40] in full generality, we
reproduce it for the reader's convenience. In what follows we assume that
M is a join semilattice with minimum and maximum. For example any finite
join semilattice with minimum also has a maximum. We shall always denote
the maximum by ∞. Following Zumbragal [40], given a, b ∈ M , define
xea,b =(0 x ≤ a
else.
b
REPRESENTATION THEORY OF FINITE SEMIGROUPS OVER SEMIRINGS
19
One can check that the ea,b ∈ End(M ) and that {ea,b a, b ∈ M } ∪ {0} is a
subsemigroup E since
ea,bec,d =(0
ea,d
b ≤ c
b (cid:2) c.
It is shown below that M is an irreducible module for E. Zumbragal defines
R ⊆ End(M ) to be dense if it contains all the ea,b with a, b ∈ M .
Proposition 5.1. Let M be a join semilattice with minimum and let E be as
above. Then M is an irreducible BE-module. Thus any dense subsemiring
of End(M ) is primitive.
Indeed, if 0 6= m, n ∈ M then
Proof. First observe that M is minimal.
me0,n = n. Next suppose that ≡ is a non-trivial semilattice congruence on
M . To show that ≡ is not proper, suppose m ≡ n with m 6= 0. Then without
loss of generality we may assume m (cid:2) n. Let a ∈ M . Then mem,a = 0 and
men,a = a. Thus 0 ≡ a, completing the proof since a was arbitrary.
(cid:3)
The following is [40, Theorem 2.3].
Theorem 5.2 (Zumbragal). Let M be a join semilattice with minimum and
let R ⊆ End(M ) be dense. Then R is congruence-simple.
The next result is a strengthening of the statement of [40, Proposition
3.13], but the proof is the same. The reader should compare with Theo-
rem 4.4.
Theorem 5.3. Let R be an idempotent semiring and M a faithful irreducible
R-module with maximum. Then R is a dense subring of End(M ).
Proof. Define a congruence on M by m ≡ n if mr = 0 ⇐⇒ nr = 0 for all
r ∈ R. This is easily verified to be a congruence. Moreover, it cannot be
universal since m ≡ 0 implies mR = 0. Thus it is the trivial congruence.
Let Im denote the annihilator in R of m. It is a right ideal.
First note that e∞,b = 0 and so belongs to R. So fix ∞ 6= a ∈ M . We
first show ea,∞ ∈ R. Suppose x (cid:2) a. We claim Ia does not annihilate x.
Indeed, if Ia annihilates x, then since (x+ a)r = 0 if and only if xr = 0 = ar,
it follows that x + a ≡ a and so x ≤ x + a = a. Now xIa is then a non-
zero submodule of M and so xIa = M . Thus we can find rx ∈ Ia so that
xrx = ∞. Let
s =Xx(cid:2)a
rx ∈ Ia.
Then if x ≤ a, one has xs ≤ as = 0, whereas if x (cid:2) a, then xs ≥ xrx = ∞
and so s = ea,∞.
Now let ∞ 6= b ∈ M . Then by irreducibility, ∞R = M and so b = ∞r for
some r ∈ R. Then, ea,∞r = ea,∞r = ea,b and so R is dense, as required. (cid:3)
As a consequence, we obtain the following result of [40] (wherein the
equivalence with the first item is not stated explicitly).
20
Z. IZHAKIAN, J. RHODES, AND B. STEINBERG
Corollary 5.4 (Zumbragal). Let R be a finite idempotent semiring with
R2 6= 0. Then the following are equivalent:
(1) R is primitive;
(2) R is isomorphic to a dense subsemiring of End(M ) for some finite
semilattice M with minimum;
(3) R is congruence-free.
Proof. The implication 2 implies 3 is [40, Theorem 2.3], whereas 3 implies
1 is [40, Proposition 3.10]. The final implication follows from Theorem 5.3
and the observation that any irreducible module for a finite idempotent
semiring must be finite and idempotent (since M = mR for any non-zero
element m ∈ M ).
(cid:3)
It follows that if S is a finite semigroup, k is a finite idempotent semir-
ing and M is an irreducible kS-module, then the span of the image of the
representation ϕ : S → Endk(M ) is dense. Zumbragal showed [40, Proposi-
tion 4.9, Remark 4.10] that if M is finite, then End(M ) contains no proper
dense subsemirings if and only if M is a distributive lattice. In particular,
this applies when M is a finitely generated free B-module since then M is
isomorphic to the power set of its basis. We summarize this discussion in
the next corollary.
Corollary 5.5. Suppose S is a finite semigroup and let ϕ : S → End(M )
be an irreducible representation where M is a join semilattice with identity.
Then ϕ(S) spans a dense subsemiring of End(M ). In particular, if M is
a distributive lattice, then ϕ(S) spans End(M ). Consequently, given an
irreducible representation ϕ : S → Mn(B), the image of ϕ spans Mn(B).
The last part of the corollary can also be deduced in a straightforward
way from Theorem 4.4. The key step is to note that the span of the rows
of C is a free B-module if and only if C has an identity submatrix of the
appropriate rank.
References
[1] J. Almeida, S. Margolis, B. Steinberg, and M. Volkov. Representation theory of finite
semigroups, semigroup radicals and formal language theory. Trans. Amer. Math. Soc.,
361(3):1429 -- 1461, 2009.
[2] J. Berstel, D. Perrin, and C. Reutenauer. Codes and automata, volume 129 of Encyclo-
pedia of Mathematics and its Applications. Cambridge University Press, Cambridge,
2010.
[3] J. Berstel and C. Reutenauer. Rational series and their languages, volume 12 of
EATCS Monographs on Theoretical Computer Science. Springer-Verlag, Berlin, 1988.
[4] A. H. Clifford. Matrix representations of completely simple semigroups. Amer. J.
Math., 64:327 -- 342, 1942.
[5] A. H. Clifford. Basic representations of completely simple semigroups. Amer. J.
Math., 82:430 -- 434, 1960.
[6] A. H. Clifford and G. B. Preston. The algebraic theory of semigroups. Vol. I. Math-
ematical Surveys, No. 7. American Mathematical Society, Providence, R.I., 1961.
REPRESENTATION THEORY OF FINITE SEMIGROUPS OVER SEMIRINGS
21
[7] A. Connes and C. Consani. Characteristic one, entropy and the absolute point. Tech-
nical Report arXiv:0911.3537, arXiv, 2009.
[8] A. Connes, C. Consani, and M. Marcolli. Fun with F1. J. Number Theory,
129(6):1532 -- 1561, 2009.
[9] J. H. Conway. Regular algebra and finite machines. Chapman & Hall, London, 1971.
[10] M. Develin, F. Santos, and B. Sturmfels. On the rank of a tropical matrix. In Combi-
natorial and computational geometry, volume 52 of Math. Sci. Res. Inst. Publ., pages
213 -- 242. Cambridge Univ. Press, Cambridge, 2005.
[11] O. Ganyushkin, V. Mazorchuk, and B. Steinberg. On the irreducible representations
of a finite semigroup. Proc. Amer. Math. Soc., 137(11):3585 -- 3592, 2009.
[12] A. Gathmann. Tropical algebraic geometry. Jahresber. Deutsch. Math.-Verein.,
108(1):3 -- 32, 2006.
[13] K. G lazek. A guide to the literature on semirings and their applications in mathemat-
ics and information sciences. Kluwer Academic Publishers, Dordrecht, 2002. With
complete bibliography.
[14] J. A. Green. On the structure of semigroups. Ann. of Math. (2), 54:163 -- 172, 1951.
[15] J. A. Green. Polynomial representations of GLn, volume 830 of Lecture Notes in
Mathematics. Springer-Verlag, Berlin, 1980.
[16] U. Hebisch and H. J. Weinert. Semirings: algebraic theory and applications in com-
puter science, volume 5 of Series in Algebra. World Scientific Publishing Co. Inc.,
River Edge, NJ, 1998. Translated from the 1993 German original.
[17] I. Itenberg, G. Mikhalkin, and E. Shustin. Tropical algebraic geometry, volume 35 of
Oberwolfach Seminars. Birkhauser Verlag, Basel, second edition, 2009.
[18] M. Kilp, U. Knauer, and A. V. Mikhalev. Monoids, acts and categories, volume 29 of
de Gruyter Expositions in Mathematics. Walter de Gruyter & Co., Berlin, 2000. With
applications to wreath products and graphs, A handbook for students and researchers.
[19] K. Krohn, J. Rhodes, and B. Tilson. Algebraic theory of machines, languages, and
semigroups. Edited by Michael A. Arbib. With a major contribution by Kenneth
Krohn and John L. Rhodes. Academic Press, New York, 1968. Chapters 1, 5 -- 9.
[20] G. Lallement and M. Petrich. Irreducible matrix representations of finite semigroups.
Trans. Amer. Math. Soc., 139:393 -- 412, 1969.
[21] G. L. Litvinov. The Maslov dequantization, and idempotent and tropical mathemat-
ics: a brief introduction. Zap. Nauchn. Sem. S.-Peterburg. Otdel. Mat. Inst. Steklov.
(POMI), 326(Teor. Predst. Din. Sist. Komb. i Algoritm. Metody. 13):145 -- 182, 282,
2005.
[22] S. W. Margolis and B. Steinberg. The quiver of an algebra associated to the Mantaci-
Reutenauer descent algebra and the homology of regular semigroups. Algebr. Repre-
sent. Theory, to appear.
[23] D. B. McAlister. Characters of finite semigroups. J. Algebra, 22:183 -- 200, 1972.
[24] W. D. Munn. On semigroup algebras. Proc. Cambridge Philos. Soc., 51:1 -- 15, 1955.
[25] W. D. Munn. Matrix representations of semigroups. Proc. Cambrdige Philos. Soc.,
53:5 -- 12, 1957.
[26] L. Pol´ak. Syntactic semiring of a language (extended abstract). In Mathematical foun-
dations of computer science, 2001 (Mari´ansk´e L´azne), volume 2136 of Lecture Notes
in Comput. Sci., pages 611 -- 620. Springer, Berlin, 2001.
[27] L. Pol´ak. Syntactic semiring and language equations. In Implementation and appli-
cation of automata, volume 2608 of Lecture Notes in Comput. Sci., pages 182 -- 193.
Springer, Berlin, 2003.
[28] L. Pol´ak. Syntactic semiring and universal automaton. In Developments in language
theory, volume 2710 of Lecture Notes in Comput. Sci., pages 411 -- 422. Springer,
Berlin, 2003.
[29] L. Pol´ak. A classification of rational languages by semilattice-ordered monoids. Arch.
Math. (Brno), 40(4):395 -- 406, 2004.
22
Z. IZHAKIAN, J. RHODES, AND B. STEINBERG
[30] I. S. Ponizovskiı. On matrix representations of associative systems. Mat. Sb. N.S.,
38(80):241 -- 260, 1956.
[31] D. Rees. On semi-groups. Proc. Cambridge Philos. Soc., 36:387 -- 400, 1940.
[32] J. Rhodes. Characters and complexity of finite semigroups. J Combinatorial Theory,
6:67 -- 85, 1969.
[33] J. Rhodes and B. Steinberg. The q-theory of finite semigroups. Springer Monographs
in Mathematics. Springer, New York, 2009.
[34] J. Rhodes and Y. Zalcstein. Elementary representation and character theory of fi-
nite semigroups and its application. In Monoids and semigroups with applications
(Berkeley, CA, 1989), pages 334 -- 367. World Sci. Publ., River Edge, NJ, 1991.
[35] J. Richter-Gebert, B. Sturmfels, and T. Theobald. First steps in tropical geometry. In
Idempotent mathematics and mathematical physics, volume 377 of Contemp. Math.,
pages 289 -- 317. Amer. Math. Soc., Providence, RI, 2005.
[36] A. Salomaa and M. Soittola. Automata-theoretic aspects of formal power series.
Springer-Verlag, New York, 1978. Texts and Monographs in Computer Science.
[37] M.-P. Schutzenberger. Sur la repr´esentation monomiale des demi-groupes. C. R. Acad.
Sci. Paris, 246:865 -- 867, 1958.
[38] M. P. Schutzenberger. On the definition of a family of automata. Information and
Control, 4:245 -- 270, 1961.
[39] B. R. Tilson. Appendix to "Algebraic theory of finite semigroups". On the p-length
of p-solvable semigroups: Preliminary results. In K. Folley, editor, Semigroups (Proc.
Sympos., Wayne State Univ., Detroit, Mich., 1968), pages 163 -- 208. Academic Press,
New York, 1969.
[40] J. Zumbragel. Classification of finite congruence-simple semirings with zero. J. Alge-
bra Appl., 7(3):363 -- 377, 2008.
Department of Mathematics, Bar-Ilan University, Ramat-Gan 52900, Israel
E-mail address: [email protected]
Department of Mathematics, University of California, Berkeley, Berke-
ley, CA 94720-3840, USA
E-mail address: [email protected]
E-mail address: [email protected]
Carleton University, 1125 Colonel By Drive, Ottawa, Ontario K1S 5B6,
Canada
E-mail address: [email protected]
|
1903.09063 | 1 | 1903 | 2019-03-21T15:32:35 | Noncyclic Division Algebras over Fields of Brauer Dimension One | [
"math.RA"
] | Let $K$ be a complete discretely valued field of rank one, with residue field $\Q_p$. It is well known that period equals index in $\Br(K)$. We prove that when $p=2$ there exist noncyclic $K$-division algebras of every $2$-power degree divisible by four. Otherwise, every $K$-division algebra is cyclic. | math.RA | math |
NONCYCLIC DIVISION ALGEBRAS OVER FIELDS OF
BRAUER DIMENSION ONE
ERIC BRUSSEL
Abstract. Let K be a complete discretely valued field of rank one, with
residue field Qp. It is well known that period equals index in Br(K). We prove
that when p = 2 there exist noncyclic K-division algebras of every 2-power
degree divisible by four. Otherwise, every K-division algebra is cyclic.
1. Introduction
Recent research has focused on formulating and computing arithmetic invariants in the
Brauer group, over fields of cohomological dimension greater than 1. Two of the most
prominent measures are Brauer dimension and cyclic length. Famous fields of Brauer
dimension one include local fields and global fields, and both have cyclic length one. Be-
cause of the local-global principle and the degree-criterion for splitting over local fields,
one proves both "cyclicity" and "period equals index" for global fields at the same time.
Which raises the question: If K is a field of Brauer dimension one, is it like a global field
in this respect, that every K-division algebra is cyclic? We show that the answer is no.
A field K has Brauer dimension one if the Brauer group Br(K) is not trivial, and every
element in Br(K) of period n is represented by a central simple algebra of degree n, for
any n. In other words, every class has equal period and index. K has cyclic length one
if every class of period n is represented by a cyclic central simple algebra of degree n, for
any n. All K-division algebras are then cyclic crossed products.
When K contains the n-th roots of unity, the theorem of Merkurjev-Suslin [19] guaran-
tees that nBr(K) is generated by cyclic classes of degree n, and the cyclic length is called
the symbol length. This has been studied extensively; see [2] and [6] for a discussion of
generation by cyclic classes, and [25] for fundamental results on symbol length. Cyclic
length is interesting not only as a measure of arithmetic complexity, but also because of
the central open problem in the area of finite-dimensional division algebras, which is to
determine whether every division algebra of prime degree is cyclic.
Recent work on Brauer dimension includes [3], [5], [9], [10], [11], [12], [16], [17], [20],
[21], and [22]. Two-dimensional local fields, such as Qp((t)) and Fp((s))((t)), were shown
to have Brauer dimension one in [9], and Fp((s))((t)) was shown to have cyclic length one
in [5]. The Brauer dimension of the function field of a p-adic curve was proved to be two
in [22], and shown to have cyclic length two in [8]. See [13], [18], and [14] for known results
on the relationship between Brauer dimension and symbol length.
In this paper we show that the field K = Q2((t)) has Brauer dimension one and cyclic
length two. This is the first example of a field K whose Brauer dimension is proved to be
less than its cyclic length. The testifying noncyclic division algebras are of every 2-power
degree divisible by four. Noncyclic division algebras of equal period and degree themselves
are not new, and were constructed in the early 1930's by Albert, but over fields of Brauer
dimension at least three [1, Lemma 10]. Our examples exist in a very small space, in the
1
2
ERIC BRUSSEL
sense that they seem to depend on the noncyclicity of the cyclotomic extension Q2(µ8)/Q2,
they all have small cyclic splitting fields, and all Q2((t))-division algebras of odd degree
are cyclic, as are all Qp((t))-division algebras for odd p.
2. Notation and Background
2.1. For Fields of Characteristic Zero. Let K be a field of characteristic zero. Let
X(K) denote the character group, and Br(K) the Brauer group. If δ ∈ Br(K), the period
per(δ) is the order in Br(K), and the index ind(δ) is the smallest degree of a splitting
field, equal to the degree of the K-division algebra underlying δ. If δ ∈ Br(K) and E/K
is a field extension, write δE for the restriction from K to E.
If ψ ∈ X(K) has order
n, let κ(ψ)/K denote the cyclic field extension of degree n fixed by ker(ψ). If E/K is a
finite field extension, write ψE for the restriction, then κ(ψE) is the corresponding cyclic
extension of E, which is the compositum of κ(ψ) and E inside some algebraic closure.
Let µn and µ denote the roots of unity groups, with µn(K) and µ(K) the corresponding
roots of unity in K. Let ζn denote a primitive n-th root of unity, and put i = ζ4. By
Hilbert 90 we have an isomorphism K ×/K ×n ≃ H1(K, µn); let (a)n ∈ H1(K, µn) denote
either the class of a (mod K ×n), or the cocycle GK → µn defined by σ 7→ (a1/n)σ−1.
Since −1 ∈ K and µ2 is canonically identified with {±1}, we may identify (a)2 with the
character of order 2. We will cite Albert's norm criterion, which says a character ψ extends
to one of order 2ψ if and only if −1 ∈ N(κ(ψ)/K). This appears in [4].
Let (a, b) ∈ Br(K) denote the standard quaternion class, for a, b ∈ K, and put (a, b) = 1
or (a, b) = −1, depending on whether the class is trivial or nontrivial. A cyclic class of
degree n is a Brauer class of the form θ ∪ (b)n where θ ∈ X(K), b ∈ K ×, and θ = n. It
then represents a cyclic central simple algebra of degree n. If ind((θ, b)) = θ, the division
algebra underlying (θ, b) is a cyclic crossed product, with maximal subfield κ(θ). By the
norm criterion for cyclic classes, (a, b) = 1 if and only if b ∈ N(K(√a)/K), and (θ, b) = 0
if and only if b ∈ N(κ(θ)/K).
For n ∈ N, the n-cyclic length of K is zero if Br(K) has no elements of period n,
and otherwise it is the minimum number of cyclic classes of degree n needed to express
a general element of Br(K) of period n. We use ∞ if there is no such expression. The
cyclic length of K is zero if Br(K) = {0}, and otherwise it is the supremum of the n-cyclic
lengths for all n. The n-Brauer dimension of K is zero if Br(K) has no elements of period
n, and otherwise it is the smallest number d such that ind(δ) divides nd for all δ ∈ Br(K)
of period n. The Brauer dimension of K is zero if Br(K) = {0}, and otherwise it is the
supremum of the n-Brauer dimensions over all n. Since a class of period n and n-cyclic
length d has index at most nd, the n-Brauer dimension is bounded by the n-cyclic length.
2.2. For Complete Discretely-Valued Fields. Suppose K is complete with respect to
a discrete rank-one valuation, with residue field k of characteristic zero, valuation ring OK,
n = Hom(µn, Q/Z) be the Pontrjagin dual, then H0(µn, Q/Z) =
and uniformizer t. Let µ∗
(µ∗
k is a subgroup of µ∗
n of order µn(k), and we have a split residue sequence
n)G
0 −→ nX(k) −→ nX(K) −→ (µ∗
n)Gk −→ 0
Thus every χ ∈ nX(K) is expressible as a sum χ = ψ + ω ∗ ◦ (t)n for ψ defined over k and
ω ∗ : µn → Q/Z of some order e dividing µn(k). If L = κ(eχ) then χL = ω ∗ ◦ (vt)n for
some v ∈ L by Kummer Theory, and then κ(χ) = L( e√vt) has t-ramification degree e.
The split residue sequence
0 −→ Br(k) −→ Br(K) −→ X(k) −→ 0
NONCYCLIC DIVISION ALGEBRAS
3
lets us express every δ ∈ Br(K) in the form δ = α + (θ, t), where α ∈ Br(k) and θ ∈ X(k)
are identified with their inflations to K. We call this the Witt decomposition (with respect
to t). The splitting criterion states that δ is split by a finite t-unramified field extension
E/k if and only if E contains κ(θ) and splits α, and we have an index formula (see e.g.
[7])
ind(δ) = θind(ακ(θ))
2.3. For Local Fields. Let k be a local field of characteristic zero, and let ζm be a
generator of µ(k). The reciprocity map ρ : k× → Gab
−→ (k×)∗
k induces an isomorphism
ρ∗ : X(k)
∼
by Pontrjagin duality. For each θ ∈ X(k) we set θ∗ = ρ∗(θ).
If k has residue field Fq, Wedderburn's Theorem Br(Fq) = 0 transforms the residue
sequence into an isomorphism from Br(k) to X(Fq), and its composition with the evaluation
at Frobenius yields the invariant map
Then
invk : Br(k)
∼
−→ Q/Z
invk(θ, b) = θ∗(b)
by [24, Ch.XIV, Prop.3] and Tate Duality. In particular, θ∗(b) equals the order of b in
k×/N(κ(θ)/k).
The decomposition k× ≃ µ(k) × Z × ZN
p induces a split exact sequence
0 −→ (Z × ZN
p )∗ −→ (k×)∗ −→ µ(k)∗ −→ 0
Since (Z × ZN
p )∗ is divisible, it follows that a character θ ∈ X(k) of prime-power order
extends to a character of any (larger) prime-power order if and only if θ∗(ζm) = 0, if and
only if ζm ∈ N(κ(θ)/k).
3. Results
Proposition 3.1. Let K be a complete discretely valued field of rank one with residue
field k = Qp. Then K has cyclic length at most two, and Brauer dimension one.
Proof. This is well known. The Witt decomposition shows nBr(K) is generated by n-cyclic
classes, and its n-cyclic length is at most two. Let δ = α + (θ, t) ∈ Br(K). By Local Class
Field Theory (LCFT), ind(ακ(θ)) = per(α)/gcd{per(α),θ}, hence ind(δ) = per(δ) =
lcm{θ, per(α)} by the index formula. Therefore K has Brauer dimension one.
Theorem 3.2. Let K be a complete discretely valued field with residue field Q2, Then
there exist noncyclic K-division algebras of every 2-power degree divisible by 4.
(cid:3)
Proof. Set k = Q2, and let t be a uniformizer for K. Since k does not contain a primitive
fourth root of unity, any character of 2-power order over K has residue of order dividing
2, and the corresponding cyclic extension has t-ramification degree dividing 2. Similarly,
any tamely ramified cyclic field extension of k of 2-power degree has p-ramification degree
dividing 2. Let α ∈ Br(k) be an element of order 2n divisible by 4, and let D be the
K-division algebra underlying the Brauer class
δ = α + (−1, t)
Then ind(D) = per(α) = 2n. D has no t-unramified cyclic maximal subfields: Such
a field extension would have degree 2n and contain k(i), by the splitting criterion, but
(−1,−1) = −1 by computation of the Hilbert symbol ([23, III.1.2, Theorem 1]), hence −1
is not a norm from k(i), hence k(i) is not contained in a cyclic extension of degree 4 by
4
ERIC BRUSSEL
Albert's norm criterion. Therefore no such subfield exists. It follows that D is cyclic if
and only if it has a cyclic maximal subfield of t-ramification degree 2. Such fields have the
form
E = L(√vt)
L . Let ¯L denote the residue
where L/K is of degree 2n−1 and defined over k, and v ∈ O×
field of L. Since the group of principal units of OL is divisible, we may assume v ∈ ¯L×.
Let χ ∈ X(K) be a character for E/K, and let
Then κ(ψ) = ¯L(√v) is a cyclic extension of k of degree 2n. Conversely if ¯L(√v)/k is cyclic
of degree 2n, then E = L(√vt) is cyclic over K. Therefore for our purposes ¯L/k could be
any cyclic extension of degree 2n−1 that extends to a cyclic extension of degree 2n.
ψ = χ − (t)2
Let τ = √vt. Compute
δE = αE + (−1, v−1τ 2)E = αE + (−1, v−1)E
Since E/L is totally t-ramified, and αE and (−1, v−1)E are defined over ¯L, the index of
this class is the same as that of α ¯L + (−1, v) ¯L (see [7, Lemma 1]). Therefore
ind(δE) = ind(α ¯L + (−1, v) ¯L)
Since [ ¯L : k] = 2n−1, ind(α ¯L) = 2 by the local theory. Since Br( ¯L) ≃ Q/Z, any two
classes of order 2 are inverse to each other. Therefore D is cyclic via E/K if and only if
(−1, v) ¯L = −1.
Claim: (−1, v) ¯L = 1. It follows immediately that δE is nonzero, and since E/K is arbitrary,
that D is noncyclic. By LCFT the corestriction from Br( ¯L) to Br(k) is injective, and since
−1 ∈ k, cor ¯L/k(−1, v) ¯L = (−1, N ¯L/k(v)) by the cup product formula for corestriction.
Therefore to prove the claim it suffices to show (−1, N ¯L/k(v)) = 1.
The claim applies to all possible ¯L/k, namely all ¯L/k of degree 2n−1 that extend to
cyclic extensions of degree 2n, and we must test all ¯L and v ∈ ¯L such that ¯L(√v)/k is
cyclic. We first show that if the claim is true on a given ¯L for one such v then it is true
for all v. Suppose κ(ψ) = ¯L(√v) is cyclic as above. If ψ′ ∈ X(k) is a character of order 2n
such that 2ψ′ = 2ψ, then ψ′ = ψ + (w)2 for some w ∈ k, and since ψ ¯L = (v)2, ψ′
¯L = (vw)2.
The corresponding χ′ = ψ′ + (t)2 ∈ X(K) yields the cyclic extension E ′ = L(√vwt), and
δE ′ = (α + (−1, t))E ′ = αE ′ + (−1, vw)E ′ . Since E ′/L is totally ramified, the index of δE ′
can again be computed over ¯L, and since w ∈ k, cor ¯L/k(−1, vw) ¯L = (−1, N ¯L/k(v)w2n−1
) =
(−1, N ¯L/k(v)). Thus if the claim is true for ¯L and v ∈ ¯L then (−1, N ¯L/k(v)) = 1 for any v.
We first prove the claim for n = 2, i.e., D of degree 4. Then [ ¯L : k] = 2. We have
H1(Q2, µ2) = {(±1)2, (±2)2, (±5)2, (±10)2}
by [23, II.3.3, Corollary], hence Q2 has 7 nontrivial quadratic extensions. By the computa-
tion of the Hilbert symbol ([23, III.1.2, Theorem 1]), (−1, 2) = (−1, 5) = (−1, 10) = 1 and
(−1,−1) = −1, and (−1, −2) = (−1,−5) = (−1, −10) = −1. Therefore the candidates for
¯L are Q2(√2), Q2(√5), or Q2(√10), by Albert's criterion. Now:
(i) If ¯L = Q2(√2), let v = 2 + √2. Then N ¯L/Q2 (v) = 2 = NQ2(i)/Q2 (1 + i).
(ii) If ¯L = Q2(√5), let v = 5 + 2√5. Then N ¯L/Q2 (v) = 5 = NQ2(i)/Q2 (2 + i).
(iii) If ¯L = Q2(√10), let v = 10 + √10. Then N ¯L/Q2 (v) = 90 = NQ2(i)/Q2 (9 + 3i).
It is easy to check, using [15, VI, Exercise 8] for example, that each ¯L(√v)/Q2 is cyclic
of degree 4. We conclude that (−1, N ¯L/Q2 (v)) = 1, hence (−1, v) ¯L = 1, for all quadratic
extensions ¯L/Q2 extendable to degree-4 cyclic extensions. Therefore D is noncyclic.
NONCYCLIC DIVISION ALGEBRAS
5
For the general case, we will reduce to the n = 2 case, as follows. Let ¯L′/k be the
quadratic subextension of ¯L, and let v′ = N ¯L/ ¯L′ (v). Then v′ is a product of the Galois
conjugates of v over ¯L′, each of which can replace v as an element whose square root
generates ¯L(√v), since ¯L(√v) is a splitting field over ¯L′. Since √v′ is the product of these
square roots, it is contained in ¯L, hence ¯L′(√v′)/k is a subextension of ¯L/k.
n)G
The element v′ is not a square in ¯L′, hence ¯L′(√v′)/k is cyclic of degree four. To
see this, let ω ∗ ∈ (µ∗
k be the element of order 2, and let res and cor be restriction
and corestriction for ¯L/ ¯L′. We have (v′)2, ¯L′ = cor ¯L/ ¯L′ ((v)2, ¯L), since the corestriction is
induced by the norm, hence cor(ω ∗ ◦ (v)2, ¯L) = ω ∗ ◦ (v′)2, ¯L′ . Since res(ψ ¯L′ ) = ω ∗ ◦ (v)2, ¯L,
and cor ◦ res is multiplication by [ ¯L : ¯L′] = 2n−2, we conclude ω ∗ ◦ (v′)2, ¯L′ = 2n−2ψ ¯L′ is a
character of order 2, hence v′ is not a square in ¯L′.
Since ¯L′(√v′)/k is cyclic of degree 4, (−1, v′) = (−1, N ¯L′/k(v′)) = 1 by the n = 2 case
of the claim. But since v′ = N ¯L/ ¯L′ (v), we have N ¯L′/k(v′) = N ¯L/k(v), so (−1, N ¯L/k(v)) = 1.
This proves the claim in general, and we conclude that D is noncyclic in general.
(cid:3)
Remark 3.3. It is not hard to show that the noncyclic division algebra of degree 2n
constructed above has a cyclic splitting field of degree 2n+1. In fact, set ζj = ζ2j , and
let ¯Ej, j ≥ 0, be the subfield of Q2(ζj+2) fixed by the automorphism ζj+2 7→ ζ −1
j+2. Then
¯Ej/Q2 is cyclic of degree 2j , and ¯Ej = Q2(ηj ), where ηj = ζj+2 + ζ −1
j+2. The sequence
{ηj : j = 0, . . . ,} is recursively definable by η0 = 0 and η2
j+1 = 2+ηj , and it is easy to prove
by induction that N ¯Ej+1/Q2 (ηj+1) = 2 for j ≥ 1. Now E = En(√ηnt) is a cyclic extension
of K of degree 2n+1, where En = ¯EnK. Since N ¯En/Q2 (ηn) = 2 = NQ2(i)/Q2 (1 + i), we
compute (−1, ηn) = 1, and since ¯En splits α, we easily verify that E splits D.
Theorem 3.4. Let K be a complete discretely valued field with residue field Qp, and let
D be a K-division algebra. Suppose either ind(D) is odd, or p is odd. Then D is cyclic.
Proof. Assume the hypotheses. Set k = Qp, and let m = µ(k). Let D be a K-division
algebra of degree n, with Brauer class δ = α + (θ, t) for α ∈ Br(k) and θ ∈ X(k).
If
θ = 0 then D is defined over the local field k, and is cyclic by local field theory. Therefore
suppose θ 6= 0. We may assume n = ℓa for some prime ℓ and a ∈ N by prime-power
decomposition. If κ(θ) extends to a (t-unramified) cyclic extension E/k of degree n, then
E contains κ(θ) and splits α, hence D is cyclic via E by the splitting principle. Therefore
we assume for the remainder of the proof that 1 < θ < n, and θ does not extend to a
character of order n. Since ind(δ) = n and θ < n, it follows that ind(α) = n, hence
invk(α) = i/n for some i : gcd(i, n) = 1.
Since it does not extend to a cyclic extension of degree n, κ(θ)/k is p-ramified, and
e = θ∗(ζm) is the smallest number such that e θ is extendable to a character of any
larger ℓ-power order, hence e is the order of ζm in k×/N(κ(θ)/k), by Section 2. Evidently
e : 1 < e ≤ θ.
By hypothesis, at least one of the numbers ℓ, p is odd, and our assumption on the non-
extendability of θ implies that ℓ 6= p: For if ℓ = p, then p is odd, so K contains no p-th
roots of unity, and the p-primary subgroup X(k)(p) is p-divisible by LCFT, contradicting
the non-extendability of θ. Therefore ℓ 6= p.
Suppose ℓ 6= p, and if ℓ = 2 then p ≡ 1 (mod 4). We will construct a cyclic maximal
subfield of D. In this case κ(θ)/k is tame, e is its ramification degree, and κ(eθ) is its
maximal p-unramified subextension. Since ℓ divides e divides m, and since ζm generates
µ(k), ζm is not an ℓ-th power in k×. If ℓ = 2 then ζm is not in −4k×4 since p ≡ 1 (mod 4).
Therefore xn − ζm is irreducible by [15, VI.9], with root ζmn, and the field ¯L = k(ζmn/e)
is cyclic and p-unramified of degree n/e over k. Since ζm has order e modulo N(κ(θ)/k),
we can find a j : gcd(j, e) = 1 so that invk(θ, ζ j
m) = i/e, where i is as above.
6
Let
ERIC BRUSSEL
v =(ζ j
mn/e
ζ j(m/2+1)
mn/e
if ℓ is odd
if ℓ = 2
m: When ℓ is odd, v is a root of xn/e − ζ j
Since the exponent is prime-to-ℓ in each case, k(v) = k(ζmn/e). This v is designed to have
norm ζ j
m. When ℓ = 2,
v is a root of xn/e − ζ j(m/2+1)
=
(−1)1+jm/2ζ j
, and since 4m, we compute Nk(v)/k(v) = −ζ j(m/2+1)
Put ¯L = k(v), L = K(v). Then ¯L( e√v) = k(ζmn) is cyclic of degree n over k. Let τ be
m, so Nk(v)/k(v) = ζ j
m
m
m = ζ j
m.
a root of xe − vt ∈ L[t]. Then we claim
E = L(τ )
is a cyclic maximal subfield of D.
It is cyclic over K as the cyclic extension of a sum
φ + ω ∗ ◦ (t)e as in Section 2.2, where φ ∈ X(k) is such that κ(φ) = k(ζmn)/k and φ ¯L =
ω ∗ ◦ (v)e. It remains to show E is a maximal subfield of D. Since t = τ e/v,
δE = αE + (θE, τ e) + (θE, 1/v)
Since ¯L/k is p-unramified, and since κ(eθ) is the maximal p-unramified subextension of
κ(θ)/k, θE = θ ¯L = e, so (θE, τ e) = 0, and since E/L is t-totally ramified, ind(δE) =
ind(α ¯L + (θ ¯L, 1/v)).
Since [ ¯L : k] = n/e and invk(α) = i/n, inv ¯L(α ¯L) = i/e by the local theory. Since
cor ¯L/k((θ ¯L, 1/v)) = (θ, N ¯L/k(1/v)) = (θ, ζ −j
m )
by the cup product formula, and since the corestriction is the identity on invariants by
the local theory, we have inv ¯L(θ ¯L, 1/v) = invk(θ, ζ −j
m ) = −i/e. Therefore inv ¯L(α ¯L +
(θ ¯L, 1/v)) = i/e − i/e = 0, hence δE = 0. Since ind(δ) = [E : K] = n, we conclude E is a
maximal subfield of D, so D is cyclic.
It remains to prove it for ℓ = 2 and p ≡ 3 (mod 4). Set ind(D) = n = 2r. If r = 1 then
D is already known to be cyclic, so assume r ≥ 2. We have ind(α) = 2r and 1 < θ < 2r,
and θ does not extend to a character of order 2r, hence κ(θ) is p-ramified. Since p ≡ 3
(mod 4), all characters of 2-power order have residue of order at most 2 by the sequence
in Section 2.2, so κ(θ)/k has ramification degree 2, and θ does not extend to a character
of larger 2-power degree. Therefore −1 6∈ N(κ(θ)/k) by Albert's criterion.
Let s = v2(p2 − 1) be the (additive) 2-value. Then ζ2s is the largest 2-power root of
unity in k(i). Let v = ζ2s+r−2 , and set ¯L = k(v), L = K(v), and
E = L(√vt)
By the local theory, ¯L/k is cyclic unramified of degree 2r−1, θ ¯L has order 2, and N ¯L/k(i)(v) =
−ζ2s . The Galois conjugate of −ζ2s over k is −ζ p
2s , the image under Frobenius, so
N ¯L/k(v) = ζ p+1
. We compute v2(p + 1) = s − 1 since p ≡ 3 (mod 4), therefore ζ p+1
has order 2, therefore N ¯L/k(v) = −1.
2s
2s
An argument similar to the previous case shows E/K is cyclic of degree 2r, and
ind(δE) = ind(α ¯L + (θ, v) ¯L)
Since N ¯L/k(v) = −1 is not a norm from κ(θ), ind((θ, v) ¯L) = ind((θ, N ¯L/k(v))) 6= 1, and
since θ ¯L has order 2, ind((θ, v) ¯L) = 2. Since [ ¯L : k] = 2r−1 we compute ind(α ¯L) = 2 by
the local theory, and since in Br(k) any two classes of order 2 are inverse to each other, we
conclude α ¯L + (θ, v) ¯L = 0. Therefore ind(δE) = 1, so D is split by E, hence D is cyclic.
This completes the proof.
(cid:3)
NONCYCLIC DIVISION ALGEBRAS
7
Corollary 3.5. Let K be a complete discretely valued field with residue field k = Qp.
Then the 2r-cyclic length of K is two if p = 2 and 4 divides 2r; the n-cyclic length of K
is one if p = 2 and n is odd or n = 2; and the cyclic length of K is one if p 6= 2.
Proof. Since all division algebras over the fields Q2 and Qp are cyclic, the Witt decom-
position of 2r Br(K) shows the 2r-cyclic length is at most two. Theorem 3.2 shows the
2r-cyclic length is at least two for Q2 and r ≥ 2. If 2r = 2 then the Witt decomposition
shows that in all cases there is a quadratic splitting field, hence the cyclic length is one.
The rest is Theorem 3.4.
(cid:3)
The symbol length does not detect the examples of Theorem 3.2, because symbol length
is only defined in circumstances where the examples don't exist:
Theorem 3.6. Let K be a complete, discretely valued field with residue field a local field k
of characteristic zero, and suppose k contains µn. Then every K-division algebra of degree
n is cyclic.
Proof. Let t be a uniformizer for K. As above, the Brauer class of a division algebra D of
degree n has the form δ = α + (θ, t), where α ∈ Br(k) and θ ∈ X(k) have order dividing
n. Since k contains µn, θ extends to a character ψ of order n by Kummer theory, and
the t-unramified cyclic extension κ(ψ)/K then contains κ(θ) and splits α, hence it splits
δ. Therefore D is cyclic.
(cid:3)
Example 3.7. Let K = k((t)) for k = Q3(i), and let n be a power of a prime ℓ. We show
how to prove every K-division algebra is cyclic. We have µ(k) = 8, and so
H1(k, µn) ≃ (Z/n × Z/gcd(n, 8)
Z/n × Z/n × Z/n
if ℓ 6= 3
if ℓ = 3
Now arguments identical to those in the proof of Theorem 3.4 show that every K-division
algebra is cyclic.
References
[1] A. Albert. Non-cyclic division algebras of degree and exponent four. Trans. Amer. Math. Soc.,
35:112 -- 121, 1933.
[2] S. Amitsur. Division algebras. A survey. In Algebraists' homage: papers in ring theory and
related topics (New Haven, Conn., 1981), volume 13 of Contemp. Math., pages 3 -- 26. Amer.
Math. Soc., Providence, R.I., 1982.
[3] B. Antieau. Cohomological obstruction theory for Brauer classes and the period-index prob-
lem. J. K-Theory, 8(3):419 -- 435, 2011.
Amer. Math. Soc., 313(2):843 -- 851, 1989.
[4] J. K. Arason, B. Fein, M. Schacher, and J. Sonn. Cyclic extensions of K(√
−1)/K. Trans.
[5] R. Aravire and B. Jacob. p-algebras over maximally complete fields. In K-theory and algebraic
geometry: connections with quadratic forms and division algebras (Santa Barbara, CA, 1992),
volume 58 of Proc. Sympos. Pure Math., pages 27 -- 49. Amer. Math. Soc., Providence, RI, 1995.
With an appendix by Jean-Pierre Tignol.
[6] A. Auel, E. Brussel, S. Garibaldi, and U. Vishne. Open problems on central simple algebras.
Transform. Groups, 16(1):219 -- 264, March 2011.
[7] E. Brussel. Noncrossed products and nonabelian crossed products over Q(t) and Q((t)). Amer.
J. Math., 117(2):377 -- 393, 1995.
[8] E. Brussel, K. McKinnie, and E. Tengan. Cyclic length in the tame Brauer group of the
function field of a p-adic curve. Amer. J. Math., 138(2):251 -- 286, 2016.
[9] I. D. Chipchakov. Henselian discrete valued stable fields. ArXiv e-prints, Feb. 2018.
[10] P. L. Clark. The period-index problem in WC-groups IV: a local transition theorem. J. Théor.
Nombres Bordeaux, 22(3):583 -- 606, 2010.
8
ERIC BRUSSEL
[11] A. de Jong. The period-index problem for the Brauer group of an algebraic surface. Duke
Math. J., 123(1):71 -- 94, 2004.
[12] D. Harbater, J. Hartmann, and D. Krashen. Applications of patching to quadratic forms and
central simple algebras. Invent. Math., 178:231 -- 263, 2009.
[13] B. Kahn. Comparison of some field invariants. J. Algebra, 232(2):485 -- 492, 2000.
[14] D. Krashen. Period and index, symbol lengths, and generic splittings in Galois cohomology.
Bull. Lond. Math. Soc., 48(6):985 -- 1000, 2016.
[15] S. Lang. Algebra, volume 211 of Graduate Texts in Mathematics. Springer-Verlag, New York,
third edition, 2002.
[16] M. Lieblich. Period and index in the Brauer group of an arithmetic surface. J. Reine Angew.
Math., 659:1 -- 41, 2011. With an appendix by Daniel Krashen.
[17] M. Lieblich. The period-index problem for fields of transcendence degree 2. Ann. of Math.
(2), 182(2):391 -- 427, 2015.
[18] E. Matzri. Symbol length in the Brauer group of a field. Trans. Amer. Math. Soc., 368(1):413 --
427, 2016.
[19] A. Merkurjev and A. Suslin. K-cohomology of Severi-Brauer varieties and the norm residue
homomorphism. Math. USSR Izv., 21(2):307 -- 340, 1983.
[20] R. Parimala and V. Suresh. The u-invariant of the function fields of p-adic curves. Ann. of
Math. (2), 172(2):1391 -- 1405, 2010.
[21] R. Parimala and V. Suresh. Period-index and u-invariant questions for function fields over
complete discretely valued fields. Invent. Math., 197(1):215 -- 235, 2014.
[22] D. Saltman. Division algebras over p-adic curves. J. Ramanujan Math. Soc., 12:25 -- 47, 1997.
[23] J.-P. Serre. A Course in Arithmetic. Springer-Verlag, New York-Heidelberg, 1973. Translated
from the French, Graduate Texts in Mathematics, No. 7.
[24] J.-P. Serre. Local Fields, volume 67 of Graduate Texts in Mathematics. Springer, New York-
Berlin, 1979.
[25] J.-P. Tignol. On the length of decompositions of central simple algebras in tensor products
of symbols. In Methods in ring theory (Antwerp, 1983), volume 129 of NATO Adv. Sci. Inst.
Ser. C Math. Phys. Sci., pages 505 -- 516. Reidel, Dordrecht, 1984.
Department of Mathematics, California Polytechnic State University, San Luis
Obispo, CA 93405, USA
E-mail address: [email protected]
|
1811.10584 | 1 | 1811 | 2018-11-26T18:41:25 | Dimension theory in iterated local skew power series rings | [
"math.RA",
"math.QA"
] | By analysing the structure of the associated graded ring with respect to certain filtrations, we deduce a number of good properties of iterated local skew power series rings over appropriate base rings. In particular, we calculate the Krull dimension, prime length and global dimension in well-behaved cases, obtaining lower bounds to complement the upper bounds obtained by Venjakob and Wang. | math.RA | math | Dimension theory in iterated local skew power series rings
William Woods
November 27, 2018
Abstract
By analysing the structure of the associated graded ring with respect to certain filtrations, we deduce a
number of good properties of iterated local skew power series rings over appropriate base rings. In particular,
we calculate the Krull dimension, prime length and global dimension in well-behaved cases, obtaining lower
bounds to complement the upper bounds obtained by Venjakob and Wang.
8
1
0
2
v
o
N
6
2
]
.
A
R
h
t
a
m
[
1
v
4
8
5
0
1
.
1
1
8
1
:
v
i
X
r
a
Contents
1 Preliminaries
1.1 Definitions and first results
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2 Local skew power series extensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2 Filtered rings
2.1 Constructing skew derivations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.2 Filtrations and their associated graded rings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.3 Lifting properties from the graded ring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3
3
4
5
5
6
7
3 Rigid iterated extensions
8
8
3.1 Quotients by stable ideals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
8
3.2 Skew power series presentations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.3 Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9
3.4 Non-examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
4 Dimension theory
13
4.1 Krull dimension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
4.2 Classical Krull dimension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
4.3 Global dimension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1
Introduction
The main objects of study of this paper are iterated skew power series rings
R = k[[x1; σ1, δ1]] . . . [[xn; σn, δn]]
for suitable choices of k and (σi, δi). By this, we mean that R0 = k, and we iteratively define for each 1 ≤ i ≤ n
((σi, δi) is a skew derivation on Ri−1,
Ri is the skew power series ring Ri−1[[xi; σi, δi]],
(0.1)
and finally set R = Rn. Full definitions of these objects are given below.
Skew power series extensions B = A[[x; σ, δ]] were first introduced in [18] and [20], with a view to using them
to study Iwasawa algebras: it was noted in [18] that certain Iwasawa algebras can be written as iterated skew
power series extensions over a base field (usually Fp) or complete discrete valuation ring (usually Zp).
Modelled on the notion of a skew polynomial extension A[x; σ, δ], a skew power series extension A[[x; σ, δ]] is a
ring which is isomorphic to A[[x]] as topological left (or right) A-modules, with multiplication given by
xa = σ(a)x + δ(a)
(0.2)
for all a ∈ A. Here, σ is an automorphism of A, and δ is a σ-derivation of A, i.e. a linear map δ : A → A
satisfying δ(ab) = δ(a)b + σ(a)δ(b). (We say that (σ, δ) is a skew derivation for short.)
Unlike the case of skew polynomial extensions, it is not the case that an arbitrary skew derivation (σ, δ) on
A gives rise to a well-defined ring A[[x; σ, δ]], due to possible convergence issues. For this reason, we work
throughout the paper with a special class of skew power series extensions whose question of existence is already
well understood. We denote this class of rings by SPS(A), and call them local skew power series extensions:
we require A to have a unique maximal ideal m, with respect to which it is complete (and separated), and we
stipulate that σ(m) ⊆ m, δ(R) ⊆ m and δ(m) ⊆ m2. These are known to exist, and while other classes have been
studied (see e.g. [2] and [9, §5], dealing with the rather different case in which δ is assumed locally nilpotent ),
the local case encompasses the case of interest in the Iwasawa context.
There is a growing literature on simple power series extensions S = R[[x; σ, δ]]: see, for instance, [19] and [13]
for important milestones in this theory. However, very little work has been done to treat the iterated case so far.
The most basic noncommutative case, that of q-commutative power series rings (completed quantum planes),
has been studied in [14]. A few properties of general iterated local skew power series rings are established
in [21] (though see the remarks before Theorem D below for a caveat). The author is not aware of any other
developments in the theory.
As above, we restrict our work to the local case, and denote the class of n-fold iterated local skew power series
extensions of A by SPSn(A) (Definition 1.10 below). Even under rather general conditions like this, we can
understand much of the dimension theory of these rings: our first result, along these lines, complements the
work of Wang [21].
Theorem A. Let k be a field, and R ∈ SPSn(k). Then Kdim(R) = gldim(R) = n.
This result follows from Theorem 4.3, Theorem 4.4 and Corollary 4.10.
The process of iteration is often rather badly behaved. Indeed, in the notation of (0.1): when n ≥ i ≥ 2, there is
no guarantee that (σi, δi) restricts to a skew derivation of Rj for any 0 ≤ j ≤ i− 2. Hence we identify a subclass
of SPSn(A), which we denote RSPSn(A), and whose elements we call rigid, whose elements are well-behaved
in the above sense. See Definition 3.8 for the precise definition.
This appears to be a fairly restrictive condition: we expect that RSPSn(A) is in fact a much smaller class than
SPSn(A) except in trivial cases when n and A are very small. But, in fact many well-known rings do lie in
RSPSn(A), including q-commutative skew power series rings (Example 3.11), Iwasawa algebras of supersoluble
uniform groups (Examples 3.12 -- 3.13), and various other completed quantum algebras (Examples 3.14 -- 3.15).
We are interested in the prime ideal structure of iterated skew power series rings R ∈ SPSn(A). As a first step
towards a more general theory, we calculate the classical Krull dimension (prime length), as defined in [15], of
elements of RSPSn(A), and show that they obtain the upper bound given by the Krull dimension, similarly
to pure automorphic extensions, which are well studied and in some senses easier to understand. This perhaps
indicates that, in understanding the theory of prime ideals of iterated non-pure-automorphic skew power series
rings, a good first step will be to consider the rigid ones.
2
Theorem B. Let k be a division ring, and R ∈ SPSn(k). If R ∈ RSPSn(k), or R has pure automorphic type,
then clKdim(R) = n.
The proof of Theorem B is contained within Theorem 4.4 and Proposition 4.6.
So far we have not said much about the natural filtration on R, but this will be crucial for understanding its
ideals in future work. If R is an iterated local skew power series ring with unique maximal ideal m, we can
consider R as a complete m-adically filtered ring. We compute its associated graded ring as follows:
Theorem C. Let (R, m) be a complete local ring, (σ, δ) a local skew derivation on R, and S = R[[x; σ, δ]]
a local skew power series extension of R with unique maximal ideal n. Then there exists a skew deriva-
tion (σ, δ) of grm(R) such that the inclusion of graded rings grm(R) → grn(S) extends to an isomorphism
(grm(R))[X; σ, δ] ∼= grn(S) upon mapping X to gr(x). Moreover, if δ(m) ⊆ m3, then δ = 0.
The proof is given in Lemma 2.3.
We give Example 2.5 to show that δ can indeed be nonzero: this corrects a small error in [20, Proposition
2.9], [21, 2.3(iii)] and [13, 3.10(i)], and a similar error can be found in [18, Lemma 1.4(iv)]. This phenomenon
also arises in practice when studying the Iwasawa algebras of certain non-uniform 2-valuable groups. However,
we can get rid of δ by modifying the filtration, which we prove as Lemma 2.6:
Theorem D. Let R and S be as in Theorem C. Then there exists a filtration f of S, cofinal with the n-adic filtra-
tion, such that the inclusion of graded rings grf (R) → grf (S) extends to an isomorphism (grf (R))[X; σ] ∼= grf (S)
upon mapping X to gr(x).
With this in mind, we note in §2.3 that the results of [21] hold even in cases such as Example 2.5.
Finally, we note some basic structural results that seem to be absent from the literature.
Theorem E. Let R and S be as in Theorem C, and let n be the maximal ideal of S. Let f be either the n-adic
filtration or the filtration of Theorem D. Then:
(i) If grf (R) is prime, then grf (S) is prime, and hence S is prime.
(ii) If grf (R) is a maximal order, then grf (S) is a maximal order, and hence S is a maximal order.
(iii) The natural inclusion map R → S is faithfully flat.
Part (i) is proved as Proposition 2.7, part (ii) as Lemma 2.9 and part (iii) as Lemma 1.11.
Notation and conventions
We often talk about topological rings: unless specified, the filtration on a local ring R with unique maximal
ideal m is the m-adic filtration. All filtrations considered are assumed to be discrete, positive and separated.
When we need to specify a filtration explicitly, we will usually denote it as a function f : R → N ∪ {∞}.
When the derivation δ is zero, we will write the skew polynomial ring R[x; σ, δ] (resp. the skew power series
ring R[[x; σ, δ]]) as R[x; σ] (resp. R[[x; σ]]). Such rings are said to have (pure) automorphic type.
Acknowledgements
I am very grateful to K. A. Brown for some interesting discussions and his extensive comments on an early
draft of this paper. I also gratefully acknowledge a helpful discussion with Adam Jones about soluble Iwasawa
algebras; Example 3.13(ii) and Non-example 3.17 are in large part due to him.
1 Preliminaries
1.1 Definitions and first results
Write A for the left R-module of left formal power series
ri ∈ R)
A =( ∞
Xi=0
rixi (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
3
over R. Suppose the multiplication in R, together with the multiplication rule (0.2), extends to a well-defined
right R-module structure on A. Then there is a unique R-bimodule map A ⊗R
A → A such that r ⊗ s 7→ rs
for all r, s ∈ R and xi ⊗ xj 7→ xi+j ; and A becomes a ring under this multiplication. In this case, we write
R[[x; σ, δ]] := A for this ring. Note that R[[x; σ, δ]] contains R, and is a skew power series ring over R as
described above by definition.
When A has a right R-module structure in this way, we will say as shorthand simply that the ring R[[x; σ, δ]]
exists, and otherwise that R[[x; σ, δ]] does not exist.
The following computational lemma will be useful.
Lemma 1.1. Fix a positive integer n. Then, for a ∈ R, we have
xna = Xm∈Mn
m(σ, δ)(a)xe(m)
inside the skew polynomial ring R[x; σ, δ] or (if it exists) the skew power series ring R[[x; σ, δ]]. Here, Mn is the
set of formal (noncommutative) monomials m = m(X, Y ) of degree n in the variables X and Y , and e(m) is
the total degree of X in the monomial m.
Proof. When n = 1, this is just the multiplication rule (0.2) in S. For n > 1, this follows by an easy induction:
note that all elements of Mn are either of the form Xm(X, Y ) or of the form Y m(X, Y ) for some m ∈ Mn−1.
1.2 Local skew power series extensions
There are several variant notions of "locality" in the literature; for the purposes of this paper, we fix the
following definition.
Definition 1.2. Let R be a ring. Then R is local if it has a unique maximal two-sided ideal m, and R is scalar
local ring if additionally m is maximal among right (and hence also left ) ideals. (It is easy to see that scalar
local implies local, but that this implication is not reversible.)
An alternative formulation of this definition, which is sometimes useful, goes as follows. Let R be a ring with
unique maximal ideal m. Then R is local (resp. scalar local ) if R/m is simple artinian (resp. a division ring).
We will sometimes say that (R, m) is a local (resp. scalar local ) ring, as shorthand for "R is a local (resp. scalar
local) ring with unique maximal ideal m".
The residue ring of a local ring (R, m) is defined to be the quotient R/m.
Remark 1.3. Let R be a ring with unique maximal left ideal m. Then it is well known that m is also the unique
maximal right ideal, and is hence equal to the Jacobson radical of R.
The applicability of our results is guaranteed by the lemma below.
Definition 1.4. Let (R, m) be a complete local ring. We say that (σ, δ) is a skew derivation of (R, m) (or just
R) if σ is an automorphism of R and δ is a (left) σ-derivation of R. We say that the skew derivation (σ, δ) is
local if σ(m) ⊆ m, δ(R) ⊆ m and δ(m) ⊆ m2.
Lemma 1.5. [20, Lemma 2.1] Let (R, m) be a complete local ring, and (σ, δ) a local skew derivation of R. Then
the ring R[[x; σ, δ]] exists.
We do not deal with the question of existence any further in this paper; all rings written are implicitly assumed
to exist.
Definition 1.6. Let (R, m) be a local ring. We will say that the ring S is a local skew power series ring over
R, or a local skew power series extension of R, if it satisfies the following properties:
(i) S is a skew power series ring over R with respect to some automorphism σ and some σ-derivation δ, say
S = R[[x; σ, δ]];
(ii) σ(m) ⊆ m;
(iii) δ(R) ⊆ m and δ(m) ⊆ m2.
Remark 1.7. Condition (iii) implies that δ(mn) ⊆ mn+1 for all n ∈ N. Hence, taken together, conditions (ii)
and (iii) are simply the natural requirement that the multiplication data σ, δ of R should interact "nicely" with
the m-adic topology on R, i.e. σ should be a homeomorphism, and δ should be topologically nilpotent.
4
As the hypotheses above are cumbersome to repeat, we set up some shorthand notation that will remain in
force for the rest of the paper.
Definition 1.8. Let (R, m) be a complete local ring. Then we will write S ∈ SPS(R) to mean that S is a
local skew power series ring R[[x; σ, δ]] over R. If σ and δ are A-linear (for some subring A ⊆ R), we may write
S ∈ SPSA(R) to emphasise this fact. We may also choose to specify the maximal ideals of R or S explicitly,
e.g. by writing (S, n) ∈ SPS(R, m) to mean that m and n are the maximal ideals of R and S respectively.
We justify the name "local skew power series ring":
Lemma 1.9. Let (R, m) be a complete local ring, and let S = R[[x; σ, δ]] ∈ SPS(R).
S/n ∼= R/m of residue rings.
(i) n = m + xR is the unique maximal ideal of S, and the natural inclusion R ⊆ S induces an isomorphism
(ii) (S, n) is local. Moreover, (S, n) is scalar local if and only if (R, m) is scalar local.
(iii) S is n-adically complete.
Proof. (i) and (iii) follow from [20, §2]. (ii) follows from (i) and the remark immediately after Definition 1.2.
Definition 1.10. Let (R, m) be a complete local ring. Then, for each positive integer n, we will inductively
define the notation S ∈ SPSn(R) as follows: S ∈ SPS1(R) if and only if S ∈ SPS(R); and, for n > 1, we write
S ∈ SPSn(R) if and only if S ∈ SPS(T ) for some T ∈ SPSn−1(R).
It will be convenient to have several explicit ways of writing a ring S ∈ SPSn(R). We will use either of the
following equivalent forms interchangeably:
• S = R[[x1; σ1, δ1]] . . . [[xn; σn, δn]],
• S = R[[x; σ, δ]] when the number n is understood; and, in this case, x = (x1, . . . , xn), σ = (σ1, . . . , σn),
and δ = (δ1, . . . , δn).
A(R) if all the σi and δi are A-linear.
As before, we may write S ∈ SPSn
In this way, the expression SPSn
series extensions of R".
If S ∈ SPSn(R), the number n is called the rank of S (over R). (Later, we will see that this number can often
be recovered from the global dimensions or Krull dimensions of R and S.)
A(R) may be read as "the class of n-fold iterated A-linear local skew power
Lemma 1.11. S is a faithfully flat R-module.
Proof. As a left R-module, we have S ∼= Q∞
i=0 Rxi, a direct product of flat R-modules, which is flat by [7,
Theorem 2.1], as R is noetherian. We may now conclude that S is faithfully flat as a left R-module using [15,
Proposition 7.2.3]: given any proper right ideal I of R, we have IS ⊆ mS ⊆ n 6= S. (The same holds for S as a
right module by a symmetric argument.)
2 Filtered rings
2.1 Constructing skew derivations
In the rare case when we wish to construct a local skew derivation on a ring R, the following lemma gives us a
method of doing so.
Let k be a fixed local ring, and R ∈ SPSn
automorphism of R (necessarily preserving m).
Lemma 2.1. Given any choice of b1, . . . , bn ∈ m2, the assignment d(xi) = bi for all 1 ≤ i ≤ n extends to a
unique local k-linear τ -derivation d of R.
k (k), say R = k[[x; σ, δ]] with maximal ideal m. Let τ be a fixed
Proof. First, as the elements x1, . . . , xn are k-linearly independent, the mapping xi 7→ bi (for all 1 ≤ i ≤ n)
extends uniquely to a k-linear map d : kx1 ⊕ ··· ⊕ kxn → m2.
To extend d to a k-module homomorphism R → R, it will suffice to define d(m) for each ordered monomial m
in the elements x1, . . . , xn. We do this inductively on the degree of the monomial as follows. If the monomial
m is of degree 1, then m ∈ {x1, . . . , xn}, and the value of d(m) is already known. Proceeding inductively, let
5
n > 1: if m is a monomial of degree n, then it may be written uniquely as xjm′, where m′ is a monomial of
degree n − 1 in xj , xj+1, . . . , xn. Then we will define d(m) := d(xj )m′ + τ (xj )d(m′).
To show that this is indeed a τ -derivation, we must show that the value of d(m) is well-defined regardless of
how it is computed. More precisely: let m be an ordered monomial of total degree s,
m = xj1 xj2 . . . xjs ,
where j1 ≤ j2 ≤ ··· ≤ js. Then, for each 1 ≤ r < s, the monomial m can be written as the product m = prqr,
where pr = xj1 xj2 . . . xjr and qr = xjr+1 xjr+2 . . . xjs . Then we may define:
dr(m) = d(pr)qr + τ (pr)d(qr).
Note that d(m) was defined to be d1(m). In this notation, we must show that d1(m) = ··· = ds−1(m).
We will do this by induction on s. There is nothing to check when s = 2. Now suppose that, for some N , we
have established d1(m) = ··· = dt−1(m) for all monomials m of total degree 2 ≤ t ≤ N . Take a monomial m of
total degree N + 1: in the above notation, we will write it as m = xj1 xj2 . . . xjN +1 = prqr for each 1 ≤ r ≤ N .
Fix 1 ≤ r ≤ N − 1. Then m = prqr = pr+1qr+1, where qr = xr+1qr+1 and pr+1 = prxr+1, i.e.
So, exactly as above, we may calculate
m = pr xr+1qr+1
qr+1.
= prxr+1
pr+1
{z }
}
qr
{z
dr(m) = d(pr)qr + τ (pr)d(qr)
= d(pr)xr+1qr+1 + τ (pr)d(xr+1qr+1)
= d(pr)xr+1qr+1 + τ (pr)[d(xr+1)qr+1 + τ (xr+1)d(qr+1)]
= [d(pr)xr+1 + τ (pr)d(xr+1)]qr+1 + τ (prxr+1)d(qr+1)
= d(prxr+1)qr+1 + τ (prxr+1)d(qr+1)
= d(pr+1)qr+1 + τ (pr+1)d(qr+1)
= dr+1(m).
Hence these di are all equal, and in particular are equal to d. This shows that d is a τ -derivation as required.
2.2 Filtrations and their associated graded rings
Let k be a complete local ring and R ∈ SPSn(k). Then R is also a complete local ring, say with maximal
ideal m. Studying the m-adic filtration and its associated graded ring is the key to understanding many basic
properties of R.
and can be recovered as n = dimk(m/m2).
Remarks 2.2.
(i) When k is a field, it is easy to see that the rank n of (R, m) ∈ SPSn(k) over a field is uniquely defined,
(ii) Suppose A is a central subring of R and S ∈ SPSn(R). Then S ∈ SPSn
A(R) if and only if A is a central
subring of S (under the natural inclusion A ⊆ R ⊆ S).
(iii) Let (R, m) be a complete local ring, and (S, n) ∈ SPSn(R). Then the restriction of the n-adic valuation
to R is the m-adic valuation, i.e. R ∩ ni = mi. In particular, m is generated in n-adic degree 1.
(iv) Let (R, m) be a complete local ring, and (S, n) ∈ SPSn(R, m). We will always write gr(R) for the graded
ring associated to the m-adic filtration, and likewise gr(S) for the graded ring associated to the n-adic
filtration.
We now calculate this associated graded ring inductively.
Let R be a complete local ring with maximal ideal m, take a local skew derivation (σ, δ) of R, and form
S = R[[x; σ, δ]] ∈ SPS(R) with maximal ideal n. Note that σ and δ induce linear endomorphisms of the graded
ring gr(R), of degrees 0 and 1 respectively, as follows: for all x ∈ mλ \ mλ+1, where λ ∈ N, we have
• σ(x + mλ+1) = σ(x) + mλ+1,
• δ(x + mλ+1) = δ(x) + mλ+2.
It is easy to check that σ is in fact a graded automorphism.
6
Lemma 2.3. The unique homomorphism of graded rings (gr(R))[z; σ, δ] → gr(S), extending the natural inclu-
sion map gr(R) → gr(S) and sending z to x + m2, is an isomorphism of graded rings.
Proof. Clear.
Remark 2.4. It is easy to see that δ = 0 if
δ(v(x)) > v(x) + 1
(2.1)
for all nonzero x ∈ R, where v is the m-adic filtration: v(x) = λ if x ∈ mλ \ mλ+1. We give an example for
which δ 6= 0.
Example 2.5. Take R = k[[x]] with skew derivation σ = id and δ(x) = x2: this is indeed a skew derivation by
e.g. 2.1. Form S = R[[y; id, δ]]. It is easy to see that the graded ring has nonzero δ. Set X = x + n2 and
Y = y + n2 inside gr(S): then the multiplication in gr(S) is determined by the rule
Y X = XY + X 2,
i.e. gr(S) ∼= k[X][Y ; id, δ], where δ(X) = X 2.
Retain the above notation, and continue to write v for the m-adic filtration on R.
Lemma 2.6. The function f : S → R ∪ {∞} defined by
f ∞
Xi=0
rixi! = inf{2v(ri) + i}
is a Zariskian ring filtration on S, and the associated graded ring is
grf (S) ∼= (grf (R))[z; σ].
Proof. Write r = P∞
f (xisj) = f (σi(sj)xi) and that f (xisj − σi(sj )xi) > f (xisj). The claims of the lemma now follow easily.
j=0 sjxj, for ri, sj ∈ R. An application of Lemma 1.1 shows that
i=0 rixi and s = P∞
2.3 Lifting properties from the graded ring
Set f1 to be the n-adic filtration on S, and f2 to be the filtration obtained in Lemma 2.6.
A few preliminary results are given for the rings S ∈ SPSn(R), for R a complete local ring, in [21, Corollary
2.9]:
(a) If grf1 (R) is a domain (resp. right noetherian, resp. Auslander regular), then so is grf1 (S), and hence so
is S.
(b) If grf1 (R) is right noetherian, then r.Kdim(S) ≤ r.Kdim(grf1 (R))+n and r.gldim(S) ≤ r.gldim(grf1(R))+n.
The proofs in [21] were given under the erroneous assumption that δ = 0 (in the notation of Lemma 2.3), but
they remain true with essentially identical proofs even after removing this assumption. (We note that they also
hold on replacing f1 by f2, of course.)
Throughout this subsection, we fix either f = f1 or f = f2, giving a filtration f on R and S. The expressions
gr(R) and gr(S) will always implicitly mean grf (R) and grf (S) respectively.
We record some further important properties that lift from the graded ring.
Proposition 2.7. Let R be a complete local ring, and S ∈ SPSn(R). If gr(R) is prime, then gr(S) is prime,
and hence S is prime.
Proof. If gr(R) is prime, then gr(S) is prime by Remark 2.2(iv) along with iterated application of [15, Theorem
1.2.9(iii)]. Hence S is prime by [11, II, Lemma 3.2.7].
Corollary 2.8. Let R be a complete local ring, and S ∈ SPSn(R). Suppose that gr(R) is Auslander regular.
Then S is AS-Gorenstein.
Proof. S is Auslander regular by [21, 2.3(iii)], and so in particular S is Auslander-Gorenstein. As S is scalar
local by Lemma 1.9(ii), we deduce from [6, Lemma 4.3] that S is AS-Gorenstein.
7
Lemma 2.9. Let R be a complete local ring such that gr(R) is a maximal order, and take S ∈ SPSn(R). Then
S is a maximal order.
Proof. This follows from [11, Ch. II, §3, Theorem 11] alongside the above, similarly to the proof of [11, Ch. II,
§3, Corollary 12].
3 Rigid iterated extensions
Let (R0, m0) be a complete local ring, and let S ∈ SPSn(R0) for n ≥ 2. That is, for each 1 ≤ i ≤ n, we may
inductively find Ri ∈ SPS(Ri−1), say Ri = Ri−1[[xi; σi, δi]] with maximal ideal mi, such that S = Rn. For
convenience, write σ = σn, δ = δn.
We noted in Remark 1.7 that we wanted each Ri to interact "nicely" with the topology of Ri−1, i.e. (σi, δi)
should be a local skew derivation of (Ri−1, mi−1) (see Definition 1.6(ii -- iii)). Unfortunately, naively iterating
this procedure as in Definition 1.10, we may end up in a situation like the following. Writing the above chain
of local rings explicitly,
(R0, m0) (cid:12) (R1, m1) (cid:12) ··· (cid:12) (Rn−1, mn−1) (cid:12) S,
and (σ, δ) is a local skew derivation of Rn−1 as desired, but we are not guaranteed that it restricts to a local
skew derivation (σRi , δRi ) of Ri for any 0 ≤ i ≤ n − 2, as the following example shows.
Example 3.1. Let k be a field. Let R0 = k[[Y ]] (cid:12) k[[Y, Z]] = R1, so that R0 has maximal ideal m0 = (Y ). Take
S = R[[X; σ, δ]], where σ is the k-linear automorphism of R given by σ(Y ) = Z, σ(Z) = −Y , and δ = 0. Then
S ∈ SPS2
This turns out to be a very natural stipulation to make when performing this iterative construction, and this
motivates the definitions we make in this section.
k(R0), but σ(m0) 6⊆ m0.
3.1 Quotients by stable ideals
Recall the following basic definition (cf. [13, 3.13]).
Definition 3.2. Let R be a ring and I an ideal. If (σ, δ) is a skew derivation of R, then I is said to be a
(σ, δ)-ideal if σ(I) ⊆ I and δ(I) ⊆ I.
This is a useful class of ideals because of results such as the following lemma:
Lemma 3.3. Let R be a complete local ring, and S = R[[x; σ, δ]] ∈ SPS(R). Suppose that I is a (σ, δ)-ideal
of R. Then IS = SI is a two-sided ideal, and S/IS ∼= (R/I)[[x; σ, δ]] ∈ SPS(R/I).
Proof. Note that [13, Setup 3.1(4)] is satisfied by Remark 2.2(iv). Hence we may apply [13, 3.13(ii) and Lemma
3.14(iv)].
We slightly extend this notion as follows.
Definition 3.4. Let R be a ring and I an ideal. Let σ = (σ1, . . . , σr) and δ = (δ1, . . . , δr), where each (σi, δi)
is a skew derivation of R. We will say that I is a (σ, δ)-ideal if it is a (σi, δi)-ideal for each 1 ≤ i ≤ r.
Proposition 3.5. Let R be a complete local ring, and S = R[[x; σ, δ]] ∈ SPSn(R). Suppose that I is a
(σ, δ)-ideal of R. Then IS = SI is a two-sided ideal, and S/IS ∼= (R/I)[[x; σ, δ]] ∈ SPSn(R/I).
Proof. Both claims follow from recursive application of Lemma 3.3.
3.2 Skew power series presentations
Definition 3.6. Fix a complete local ring (R0, m0) and a ring R ∈ SPSn(R0). A presentation for R (over R0)
is a sequence of rings
(3.1)
where Ri ∈ SPSdi(Ri−1) for each 1 ≤ i ≤ ℓ, and d1 + ··· + dℓ = n. The number ℓ is called the length of the
presentation.
R0 (cid:12) R1 (cid:12) ··· (cid:12) Rℓ−1 (cid:12) Rℓ = R,
8
Remark 3.7. Note that, by definition, each di ≥ 1, so the length ℓ of any presentation (3.1) must be bounded
above by the rank n of R over R0.
Definition 3.8. With R ∈ SPSn(R0) as above, denote R = R0[[x; σ, δ]]. We will say that the presentation
(3.1) is stable if the maximal ideal of Ri is a (σj, δj)-ideal for each pair (i, j) satisfying 0 ≤ i < j ≤ ℓ.
Definition 3.9. We say that R ∈ SPSn(R0) is rigid if it admits a stable presentation of length n, i.e. a
saturated presentation which is also stable, and we will denote this by R ∈ RSPSn(R0). (As before, we will
write RSPSn
Proposition 3.10. Let R0 be a complete local ring with residue ring k, and take some R ∈ RSPSn(R0), say
with stable presentation (R0, m0) (cid:12) (R1, m1) (cid:12) ··· (cid:12) (Rn, mn) = (R, m). Then R/miR ∈ RSPSn−i(k).
Proof. When i = 0, we may apply Proposition 3.5, and the result is immediate.
A(R0) ∩ RSPSn(R0).)
A(R0) = SPSn
When i > 0, set R′
R as an element of RSPSn−i(R′
where R′
t = Rt+i and m
0 = Ri, so that R′
′
0 is a complete local ring with residue ring k by Lemma 1.9. We may view
n−i) = R,
n−i, m
1, m
t = mt+i. Now the result follows from the previous case.
0), with stable presentation (R′
0) (cid:12) (R′
0, m
′
′
1) (cid:12) ··· (cid:12) (R′
′
3.3 Examples
It turns out that many interesting iterated local skew power series extensions arising in nature are indeed rigid.
Examples 3.11 -- 3.13 below were important motivating examples for this paper, and will be referred to later.
Example 3.11. q-commutative power series rings. Let k be a field, and q ∈ Mn(k×) a multiplicatively
antisymmetric matrix (i.e. qijqji = 1 for all i and j). Then the q-commutative power series ring is the ring
R = kq[[x1, . . . , xn]],
defined as follows: R ∼= k[[x1, . . . , xn]] as topological k-modules; and the multiplication is given by the n2
relations xixj = qij xjxi. It is easy to see that R ∈ RSPSn
For the following two examples, we assume familiarity with the notion of uniform groups [8] and completed
group rings (also known as Iwasawa algebras) [12].
k (k).
Example 3.12. Nilpotent Iwasawa algebras. Let G be a nilpotent uniform group. G admits a series
{1} = G0 ≤ G1 ≤ ··· ≤ Gn = G
of closed subgroups of G such that Gi−1 is normal in G and Gi/Gi−1 ∼= Zp for all 1 ≤ i ≤ n: an appropriate
refinement of the isolated lower central series, defined in [22, Definition 3.7], will suffice. Hence G is supersoluble,
as defined below. Now it will follow from Example 3.13 below that its appropriate Iwasawa algebras are rigid.
Example 3.13. Supersoluble Iwasawa algebras. Let G be a supersoluble uniform group, i.e. there exists a
sequence
of closed subgroups of G such that Gi−1 is normal in G and Gi/Gi−1 ∼= Zp for all 1 ≤ i ≤ n. Fix such a
sequence. Let k be either the ring of integers of a finite extension of Qp or a finite field extension of Fp. Now,
as in [20, Example 2.3], kG ∈ SPSn
k (k) with presentation
{1} = G0 ≤ G1 ≤ ··· ≤ Gn = G
k = kG0 ≤ kG1 ≤ ··· ≤ kGn = kG,
and the condition that Gi−1 should be normal in G ensures that this presentation is stable. Hence kG ∈ RSPSn
We demonstrate the existence of some supersoluble, non-nilpotent uniform groups of small rank below. In both
cases, uniformity can be easily checked using [8, Theorem 4.5].
(i) Let Γ1 and Γ2 be copies of Zp, and take the continuous group homomorphism ρ : Γ2 → Aut(Γ1) ∼= Z×
p
p . Form the semidirect product G = Γ1 ⋊ Γ2. Then G is a
sending a generator of Γ2 to 1 + p ∈ Z×
supersoluble but non-nilpotent uniform group of dimension 2. (cf. [20, Example 2.2])
k (k).
(ii) Take p to be a prime congruent to 1 mod 4, so that i := √−1 ∈ k. Let A = hy, zi ∼= Z2
p and B = hxi ∼= Zp,
and fix the left action of B on A, say ρ : B → Aut(A), defined by ρ(x)(y) = yzp and ρ(x)(z) = zy−p.
Then G = B ⋊ A is easily checked to be a soluble, non-nilpotent uniform group of dimension 3, and the
chain of normal subgroups
shows that G is in fact supersoluble. (Compare Non-example 3.17.)
1 ≤ hyzii ≤ B ≤ A
9
The next two examples are not crucial for the current paper, but we include them to illustrate the wide
applicability of Theorems B and D.
Example 3.14. Completed quantised k-algebras. Let k be a field, Γ = (γij) ∈ Mn(k×) a multiplicatively
antisymmetric matrix, and P = (p1, . . . , pn) ∈ (k×)n, Q = (q1, . . . , qn) ∈ (k×)n two vectors with pi 6= qi for
all 1 ≤ i ≤ n. Horton's algebra R = K P,Q
n,Γ (k), a simultaneous generalisation of quantum symplectic space and
quantum Euclidean 2n-space, can be written as an iterated skew polynomial ring,
k[x1][y1; τ1][x2; σ2][y2; τ2, δ2] . . . [xn; σn][yn; τn, δn],
where the σi (for 2 ≤ i ≤ n) and τi (for 1 ≤ i ≤ n) are k-linear automorphisms, and each δi (for 2 (cid:12) i (cid:12) n) is a k-
linear τi-derivation. In [21, §3.2], it is proved that the I-adic completion R of R, where I = (x1, y1, x2, y2, . . . , xn, yn),
is an iterated skew power series extension of k:
R = k[[x1]][[y1; τ1]][[x2; σ2]][[y2; τ2, δ2]] . . . [[xn; σn]][[yn; τn, δn]] ∈ SPS2n
k (k).
(3.2)
We do not spell out the relations in full: see [10, Proposition 3.5] for details.
purposes, to know the following:
It is only necessary, for our
• σi(xj ), τi(xj ), δi(xj ) are scalar multiples of xj for all j < i;
• σi(yj), τi(yj), δi(yj) are scalar multiples of yj for all j < i;
• τi(xi) is a scalar multiple of xi for all i;
• δi(xi) is a k-linear combination of the elements ylxl for all l < i.
k (k).
It now follows by an easy calculation that the saturated presentation associated to (3.2) is stable, and hence
that R ∈ RSPS2n
Example 3.15. Completed quantum matrix algebras. Let k be a field, λ ∈ k× a scalar, and p = (pij) ∈ Mn(k×)
a multiplicatively antisymmetric matrix (i.e. pijpji = 1 for all i, j). Then the multiparameter quantum n × n
matrix algebra R = Oλ,p(Mn(k)) can be defined (see e.g. [3, Definition I.2.2]) as a skew polynomial ring in n2
variables labelled Xi,j for each 1 ≤ i, j ≤ n, in which k is central. Again, we do not spell out the relations in
full, but we note:
• Xl,mXi,j is a linear combination of Xi,jXl,m and Xi,mXl,j when l > i and m > j;
• Xl,mXi,j is a scalar multiple of Xi,jXl,m whenever either l ≤ i or j ≤ m.
In [21, §3.2] it is proved that the I-adic completion R of R, where I is the ideal generated by the n2 variables
Xi,j for 1 ≤ i, j ≤ n, is an iterated skew power series extension of k satisfying the same relations: R ∈ SPSn2
k (k).
But the "obvious" saturated presentations, e.g. those associated to
k[[X1,1]][[X1,2]][[X1,3]] . . . [[Xn,n]]
(where we have omitted the skew derivations for readability) are usually not stable. (For a counterexample,
take R to be the usual quantum 2 × 2 matrix algebra Oq(M2(k)), given by n = 2, p =(cid:16) 1 q
for any q ∈ k×. See [3, Definition I.1.7]) for the relations in this case.)
We fix this by adjoining the variables in the following order:
q−1 1(cid:17), and λ = q−2
• at the 0th stage, adjoin the "antidiagonal" elements Xi,j satisfying i + j − (n + 1) = 0, in any order;
• at the 1st stage, adjoin those Xi,j satisfying i + j − (n + 1) = 1;
• at the 2nd stage, adjoin those Xi,j satisfying i + j − (n + 1) = 2;
and so on, until finally all variables have been adjoined at the end of the (n − 1)th stage.
Diagrammatically:
⊛
. . .
⊛
⊛
⊛
0th stage
. . .
⊛ ∗
⊛ ∗ ⊛
⊛ ∗ ⊛
∗ ⊛
1st stage
. . .
. . .
. . .
. . .
⊛ ∗
∗
∗
⊛ ∗
∗
∗
∗
∗ ⊛
∗
∗ ⊛
2nd stage
. . .
. . .
. . .
. . .
It is easy to verify that such a presentation of R is stable. The only case in which there is anything to prove is
when l > i and m > j: multiplying Xl,m by Xi,j results in a term involving the variables Xi,m and Xl,j, and we
must check that each of the variables Xi,m and Xl,j has been adjoined before we adjoin both of Xl,m and Xi,j.
10
More precisely, let M = max{i + j, l + m} − (n + 1) be the first stage after which both Xl,m and Xi,j have
been adjoined, and likewise let N = max{i + m, l + j} − (n + 1) be the first stage after which both Xi,m and
Xl,j have been adjoined. Then it is easy to see that the inequalities l > i and m > j imply
i + j < i + m < l + m,
i + j < l + j < l + m,
and hence N < M .
The existence of such a stable presentation shows that R ∈ RSPSn2
k (k).
3.4 Non-examples
Showing that an extension is not rigid appears to involve lots of tedious calculation, but we give two examples
which seem of interest to the theory.
Non-example 3.16. An extension of pure automorphic type. Let k be a field such that √−1 6∈ k, and let
S = k[[Y, Z]][[X; σ]], where σ is a k-linear automorphism of the commutative power series ring k[[Y, Z]] defined
by σ(Y ) = Z, σ(Z) = −Y : that is, ZX = XY and Y X = −XZ inside S.
By construction, S ∈ SPS3
Suppose that S is rigid, and denote its maximal ideal by n. Then there must exist a stable presentation
k(k).
k (cid:12) (R1, m1) (cid:12) (R2, m2) (cid:12) (S, n)
for S. We will show that no such stable presentation can exist. Write I = m1S and J = m2S: then, by Lemma
1.9(i), I = sS and J = sS + tS with s, t ∈ n, and s, t 6∈ n2 by Remark 2.2(iii).
For computation purposes, we will write
• s = aX + bY + cZ + ε,
• t = αX + βY + γZ + ε′,
where ε, ε′ ∈ n2, and a, b, c, α, β, γ ∈ k are constants, which must satisfy (a, b, c) 6= (0, 0, 0) 6= (α, β, γ) by
Remark 2.2(iii).
As S is rigid, I = m1S must in fact be a two-sided ideal. This places some restrictions on possible choices for
s, which we now compute.
Henceforth, we work in S/n3 for ease of computation. We have
Xs ≡ aX 2 + bXY + cXZ,
sX ≡ aX 2 + cXY − bXZ mod n
3,
and so
Xs − sX = (b − c)XY + (b + c)XZ mod n
3.
But Xs− sX ∈ I = sS, so we must have (b− c)XY + (c + b)XZ ≡ sα mod n3 for some α ∈ S. As the left-hand
side belongs to n2, we must have α ∈ n, and so εα ∈ n3. Writing therefore α ≡ dX X + dY Y + dZ Z mod n2 for
some dX , dY , dZ ∈ k, we see that
(b − c)XY + (b + c)XZ ≡ (aX + bY + cZ)(dX X + dY Y + dZ Z) mod n
3.
Multiplying out the right-hand side:
(b − c)XY + (b + c)XZ ≡ adX X 2 + (adY + cdX )XY + (adZ − bdX )XZ
+ bdY Y 2 + (bdZ + cdY )Y Z + cdZ Z 2
mod n
3.
Now, equating the coefficients of each monomial on both sides, some tedious case-checking shows that the only
solution to this congruence is b = c = dX = dY = dZ = 0.
Hence we have s = aX + ε, so that a 6= 0.
Now, as S is rigid, J = m2S must also be a two-sided ideal, and so we calculate the restrictions that this places
on t.
As R1 ∈ SPSk(k), it must be a commutative power series ring over k, so that R1 ∼= k[[s]]. Then R2 = k[[s]][[t; τ, δ]]
for some local skew derivation (τ, δ) of k[[s]], and an easy calculation shows that there must be a unit η ∈ k[[s]]×
11
such that τ (s) = ηs, and there must be an element θ ∈ k[[s]] such that δ(s) = θs2. (Note that η 6≡ 0 mod n2.)
Hence we have τ (s) ≡ ηs ≡ ηaX mod n2 and δ(s) ≡ θs2 ≡ a2θX 2 mod n3, and so
(αX + βY + γZ)ηaX ≡ ηaX(αX + βY + γZ) + a2θX 2 mod n
3.
Multiplying out again:
from which we see immediately that β = γ = θ = 0, and hence t = αX + ε′.
a2θX 2 + ηa(β − γ)XY + ηa(β + γ)XZ ≡ 0 mod n
3,
This implies that the images of s and t in n/n2, and hence also in m2/m2
dimk(m2/m2
dimk(m2/m2
2) ≤ 1. But R2 ∈ SPS2
2) = 2. This is a contradiction.
2, are linearly dependent, and so
k(k) by construction, and Remark 2.2(i) tells us that we should have
Non-example 3.17. A soluble Iwasawa algebra.
This example is similar to the previous in many ways. Compare also Example 3.13(ii).
Fix a prime p congruent to 3 mod 4, so that √−1 6∈ Fp. Let A = hy, zi ∼= Z2
semidirect product G = B ⋊ A as in Example 3.13(ii). Construct its Fp-Iwasawa algebra S = FpG.
Writing X = x − 1, Y = y − 1, Z = z − 1, we may easily calculate (see e.g. [20, Example 2.3]) that
p and B = hxi ∼= Zp, and form the
S = Fp[[Y, Z]][[X; σ, δ]],
where σ(Y ) = Y +(1+Y )Z p, σ(Z) = Z +(−Y +Y 2−Y 3 +. . . )p(1+Z), and δ = σ−id. Clearly, S ∈ SPS3
Suppose that S is rigid, and denote its maximal ideal by n. Then there must exist a stable presentation
Fp(Fp).
Fp (cid:12) (R1, m1) (cid:12) (R2, m2) (cid:12) S
for S: in particular, by Proposition 3.10, S must admit a quotient S/m1S ∈ RSPS2
this leads to a contradiction.
As in Non-example 3.16, take I = m1S = sS, and write s = aX + bY + cZ + ε, where ε ∈ n2, and a, b, c ∈ Fp.
By rigidity of S, I must be a two-sided ideal; this time, we calculate restrictions on s by working in S/np+1.
We have
Fp(Fp). We will show that
σ(Y ) ≡ Y + Z p,
σ(Z) ≡ Z − Y p, mod n
p+1,
and so we must have
Xs − sX ≡ bZ p − cY p mod n
p+1.
But Xs − sX ∈ I = sS, so we must have bZ p − cY p ≡ sα mod np+1 for some α ∈ S. As the left-hand side
belongs to np, we must have α ∈ np−1, and so εα ∈ np+1. So this equation becomes
dγX γ1Y γ2 Z γ3! mod n
bZ p − cY p ≡ (aX + bY + cZ) Xγ
p+1,
for some choices of dγ ∈ Fp, where this sum ranges over all γ = (γ1, γ2, γ3) with p − 1 ≤ γ1 + γ2 + γ3 ≤ p.
Suppose that, for our given a, b, c, we have a solution {dγ} to this congruence. Then, multiplying out the
right-hand side, and writing e1 = (1, 0, 0), e2 = (0, 1, 0), e3 = (0, 0, 1):
bZ p − cY p ≡Xγ ′
(adγ ′−e1 + bdγ ′−e2 + cdγ ′−e3 ) X γ ′
1Y γ ′
2 Z γ ′
3 mod n
p+1,
where for convenience we set dγ = 0 if any of the γi is equal to −1. We may eliminate any term in the sum
of total degree not equal to p, as all nonzero monomials appearing on the left hand side have degree p, so this
sum may be taken to range over all γ ′ = (γ ′
3 = p; furthermore, as there are no terms
in X γ ′
3 on the left hand side except those with γ1 = 0, we may also eliminate all monomials of nonzero
degree in X on the right. We can now rewrite this congruence as
3) with γ ′
2 + γ ′
1 + γ ′
1, γ ′
2, γ ′
1Y γ ′
2 Z γ ′
bZ p − cY p ≡
p
Xi=0(cid:0)bd(0,i−1,p−i) + cd(0,i,p−i−1)(cid:1) Y iZ p−i mod n
p+1.
It is easy to see that, if b 6= 0, then c 6= 0, and vice-versa. We assume for contradiction that b 6= 0 6= c: we will
show that, in this case, the above congruence cannot hold for any choice of {dγ}.
12
Indeed, equating monomial coefficients on the left and right hand sides:
b = cd(0,0,p−1)
0 = bd(0,m−1,p−m) + cd(0,m,p−m−1)
−c = bd(0,p−1,0)
(i = 0)
(i = m : 1 ≤ m ≤ p − 1)
(i = p).
On the one hand, multiplying the equations labelled (i = 0) and (i = p) together, we get
−bc = bcd(0,0,p−1)d(0,p−1,0),
i.e. d(0,0,p−1)d(0,p−1,0) = −1. On the other hand, multiplying the equation labelled (i = m) by bp−mcm and
rearranging for each 1 ≤ m ≤ p − 1, we get
substituting each one into the next, we eventually get
bp−m+1cmd(0,m−1,p−m) = −bp−mcm+1d(0,m,p−m−1);
bpcd(0,0,p−1) = bcpd(0,p−1,0)
as p is odd; and since b, c ∈ Fp, we have bp = b and cp = c. This tells us that d(0,0,p−1) = d(0,p−1,0), and denoting
this common value by d, we have shown that we must have d2 = −1 ∈ Fp, which is a contradiction.
Hence we have shown that b = c = 0, and so s = aX + ε. But now
sY − Y s ≡ aZ p mod n
p+1,
and a very similar (but easier) calculation shows that we must have a = 0. Hence s = ε ∈ n2: that is, m1 is
generated in n-adic degree ≥ 2. This contradicts Remark 2.2(iii).
4 Dimension theory
Many of the results in this section can be slightly extended; but we will not always strive for full generality, and
often work over a field or a division ring for simplicity.
4.1 Krull dimension
Let k be a division ring, and (R, m) ∈ SPSn(k). Remark 2.2(v)(c) implies that Kdim(R) ≤ n: in this subsection,
we show that this is always an equality.
For any ring R, write Ir(R) for the lattice of right ideals of R.
The following is the result corresponding to [13, 3.14(ii)] in the case when I is not a (σ, δ)-ideal.
Proposition 4.1. Let R be a complete local ring, S = R[[x; σ, δ]] ∈ SPS(R), and let I be a right ideal of R.
Set I[[x; σ, δ]] := {P aixi : ai ∈ I}. Then I[[x; σ, δ]] is a right ideal of S. Moreover, the map θ : Ir(R) → Ir(S)
sending I to I[[x; σ, δ]] is a strictly increasing poset map.
Proof. I[[x; σ, δ]] is clearly an additive subgroup of S.
Take r ∈ R and a =P∞
i=0 aixi ∈ I[[x; σ, δ]]. Then we may evaluate ar inside S:
ar =
=
∞
∞
aixir
Xi=0
Xi=0 Xm∈Mi
aim(σ, δ)(r)xe(m)
in the notation of Lemma 1.1. Now, m(σ, δ)(r) ∈ R, so aim(σ, δ)(r) ∈ I, and hence ar ∈ I[[x; σ, δ]].
We need to check that this gives a well-defined right S-action on I[[x; σ, δ]] -- in other words, that the right
actions of the elements xr and σ(r)x + δ(r) agree for all r ∈ R. But this is already true a fortiori, as the right
action of S on I[[x; σ, δ]] is just induced by multiplication inside the ring S.
Finally, it is clear that, if I1 ≤ I2, then θ(I1) ≤ θ(I2); and, if J = θ(I), then we may recover I as J/Jx. This
shows that θ is a strict map of posets.
13
Lemma 4.2. Let (R, m) be a complete local ring with residue ring k. Let Y ⊆ X be adjacent right ideals of R:
then, as right S-modules, θ(X)/θ(Y ) is isomorphic to S/mS ∼= k[[x; σ]], a skew power series ring of automorphic
type.
Proof. Let θ continue to denote the map Ir(R) → Ir(S) defined in Proposition 4.1.
Y ⊂ X are adjacent if and only if X/Y is a simple right module. In particular, the annihilator ann(X/Y )R
must be the unique maximal right ideal m of R, and so we must have X/Y ∼= R/m ∼= k.
The proposed isomorphism is obvious on the level of abelian groups, and it is easy to see that right multiplication
by x ∈ S is the same as right multiplication by x ∈ k[[x; σ]]. It remains to check the R-action. Recall, from
Lemma 1.1, that
∞
Xi=0
aixi! r =
∞
Xi=0 Xm∈Mi
aim(σ, δ)(r)xe(m)
for all ai ∈ X, r ∈ R. But, for a given m ∈ Mi, if m(σ, δ) contains an instance of δ (i.e.
m(σ, δ)(r) ∈ m, and hence aim(σ, δ)(r) ∈ X m ⊆ Y . This implies that
if e(m) < i), then
∞
Xi=0
aixi! r =
∞
Xi=0
aiσi(r)xi
inside X/Y , as required.
Theorem 4.3. Let k be a division ring, and S ∈ SPSn(k). Then Kdim(S) = Kdim(gr(S)) = n.
Proof. The proof of this theorem closely follows some of the methods of [1]. We will calculate the right Krull
dimension of S, but the calculation of the left Krull dimension is identical. Let θ continue to denote the map
Ir(R) → Ir(S) of Proposition 4.1.
When n = 0, we have S = gr(S) = k, and there is nothing to prove. We proceed by induction on the rank of S.
Let R ∈ SPSn−1(k), with S = R[[x; σ, δ]] ∈ SPS(R). By the inductive hypothesis, we know that
Kdim(R) = Kdim(gr(R)) = n − 1.
We also know, by [21, Corollary 2.9(ii)], that gr(S) ∼= gr(R)[x; σ], a skew polynomial ring of automorphic type,
and so Kdim(gr(S)) = Kdim(gr(R)) + 1 = n by [15, Proposition 6.5.4(i)].
Now, given arbitrary adjacent right ideals Y ⊆ X of R, we know already from Lemma 4.2 that θ(X)/θ(Y ) ∼= k[[x; σ]]
as right S-modules: in particular, θ(X)/θ(Y ) is not artinian as a right S-module, so we must have KdimS(θ(X)/θ(Y )) ≥ 1.
Now applying [1, Lemma 2.3], we see that n = Kdim(R) + 1 ≤ Kdim(S).
Together with the inequality of [21, Corollary 2.9(iv)], we see that
n ≤ Kdim(S) ≤ Kdim(gr(R)) + 1 = n,
and the result follows.
4.2 Classical Krull dimension
Theorem 4.4. Let k be a division ring, and R ∈ RSPSn(k). Then clKdim(R) = n.
Proof. It is well known that clKdim(R) ≤ Kdim(R) (e.g. [15, Lemma 6.4.5]), and here Kdim(R) = n by Theorem
4.3. To obtain a lower bound, consider the chain of ideals {miR}n
i=0 given in Proposition 3.10. This chain has
length n, and again by Proposition 3.10, the quotient rings are iterated local skew power series rings over k,
and are hence prime by Proposition 2.7. Hence clKdim(R) ≥ n.
Remark 4.5. Rigidity is a sufficient, but not a necessary, condition to have clKdim(R) = Kdim(R), as shown
by the following proposition together with Non-example 3.16.
Proposition 4.6. Let k be a division ring, and let R ∈ SPSn(k) have pure automorphic type. Then
clKdim(R) = n.
14
Proof. Suppose R = k[[x1; σ1]][[x2; σ2]] . . . [[xn; σn]]. Note that (xn) is a two-sided ideal of R, and
The result follows by induction on n.
R/(xn) ∼= k[[x1; σ1]][[x2; σ2]] . . . [[xn−1; σn−1]].
It is likely that, for many R ∈ SPSn(k), we have clKdim(R) < n. Of particular interest is the case where
k = Fp or k = Zp, and R = kG is the completed group algebra of a soluble p-valuable group G over k. Based
on the corresponding result for polycyclic group algebras [17, Theorem H1], we can ask the following question:
Question 4.7. Is clKdim(FpG) equal to the plinth length of G?
By Example 3.13, this is true in the case when G is supersoluble.
4.3 Global dimension
Theorem 4.8. Let R be a complete local ring and S ∈ SPS(R). Then Exti
groups for all i and all left S-modules M that are finitely generated as left R-modules.
R(M, R) ∼= Exti+1
S (M, S) as abelian
Proof. This follows from a similar argument to [16], after minor adjustments -- see e.g. [18, Theorem 3.1].
Corollary 4.9. Let k be a field, R ∈ SPSn(k), and S = R[[x; σ, δ]] ∈ SPS(R). Then gldim(S) = gldim(R) + 1.
Proof. We have augmentation maps R → k and S → k, so by [4, Corollary 3.7], we have gldim(R) = projdimR(k)
and gldim(S) = projdimS(k).
Suppose that projdimR(k) = n < ∞. Then by [5, VI, Ex. 9], we have Extn
4.8, Extn+1
Now assume (for contradiction) that projdimS(k) ≥ n+2. By the same argument, this gives us Extn+2
and hence Extn+1
projdimS(k) = n + 1 = projdimR(k) + 1.
(k, S) 6= 0,
R (k, R) 6= 0. But this implies that projdimR(k) ≥ n + 1, a contradiction. So we must have
(k, S) 6= 0, so that projdimS(k) ≥ n + 1.
S
R(k, R) 6= 0, and hence by Theorem
S
Finally, as projdimk(k) = 0, it is easy to see by induction on the rank of R (as an iterated local skew power
series ring over k) that we always have projdimR(k) < ∞.
Corollary 4.10. Let k be a field and R ∈ SPSn(k). Then gldim(R) = n.
References
[1] K. Ardakov. Krull dimension of Iwasawa algebras. J. Algebra, 280:190 -- 206, 2004.
[2] Jeffrey Bergen and Piotr Grzeszczuk. Skew power series rings of derivation type. Journal of Algebra and
its Applications, 10(6):1383 -- 1399, 2011.
[3] K.A. Brown and K.R. Goodearl. Lectures on Algebraic Quantum Groups. Advanced courses in mathematics
-- CRM Barcelona. Birkhauser, 2002.
[4] A. Brumer. Pseudocompact algebras, profinite groups and class formations. Journal of Algebra, 4:442 -- 470,
1966.
[5] Henri Cartan and Samuel Eilenberg. Homological Algebra. Princeton University Press, 1956.
[6] D. Chan, Q.-S. Wu, and J.J. Zhang. Pre-balanced dualizing complexes. Israel J. Math., 132(1):285 -- 314,
2002.
[7] S.U. Chase. Direct products of modules. Trans. Amer. Math. Soc., 97(3):457 -- 473, 1960.
[8] J.D. Dixon, M.P.F. du Sautoy, A. Mann, and D. Segal. Analytic Pro-p Groups. Cambridge University
Press, 1999.
[9] Be'eri Greenfeld, Agata Smoktunowicz, and Micha l Ziembowski. On radicals of Ore etensions and related
questions. Preprint, arXiv: 1702.08103v2, 2017.
[10] K.L. Horton. The prime and primitive spectra of multiparameter quantum sympectic and Euclidean spaces.
Comm. Alg., 31(10):4713 -- 4743, 2003.
15
[11] Li Huishi and Freddy van Oystaeyen. Zariskian Filtrations. Springer Science+Business Media, 1996.
[12] Michel Lazard. Groupes analytiques p-adiques. Publications Math´ematiques de l'IH ´ES, 26:5 -- 219, 1965.
[13] Edward S. Letzter. Prime ideals of noetherian skew power series rings. Israel J. Math., 192:67 -- 81, 2012.
[14] Edward S. Letzter and Linhong Wang. Prime ideals of q-commutative power series rings. Algebr. Represent.
Theor., 14:1003 -- 1023, 2011.
[15] J.C. McConnell and J.C. Robson. Noncommutative Noetherian Rings. American Mathematical Society,
2001.
[16] George S. Rinehart and Alex Rosenberg. The global dimensions of Ore extensions and Weyl algebras.
Algebra, Topology, and Category Theory, pages 169 -- 180, 0.
[17] J.E. Roseblade. Prime ideals in group rings of polycyclic groups. Proc. London Math. Soc., 36:385 -- 447,
1978.
[18] Peter Schneider and Otmar Venjakob. On the codimension of modules over skew power series rings with
applications to Iwasawa algebras. J. Pure Appl. Algebra, 204:349 -- 367, 2005.
[19] Peter Schneider and Otmar Venjakob. Localisations and completions of skew power series rings. Am. J.
Math., 132(1):1 -- 36, 2010.
[20] Otmar Venjakob. A noncommutative Weierstrass preparation theorem and applications to Iwasawa theory.
J. Reine Angew. Math., 559:153 -- 191, 2003.
[21] Linhong Wang. Completions of quantum coordinate rings. Proc. Amer. Math. Soc., 137(3):911 -- 919, 2009.
[22] William Woods. On the structure of virtually nilpotent compact p-adic analytic groups. J. Group Theory,
21(1):165 -- 188, 2018.
16
|
1112.6245 | 3 | 1112 | 2013-03-08T14:26:55 | Graded polynomial identities, group actions, and exponential growth of Lie algebras | [
"math.RA"
] | Consider a finite dimensional Lie algebra L with an action of a finite group G over a field of characteristic 0. We prove the analog of Amitsur's conjecture on asymptotic behavior for codimensions of polynomial G-identities of L. As a consequence, we prove the analog of Amitsur's conjecture for graded codimensions of any finite dimensional Lie algebra graded by a finite Abelian group. | math.RA | math |
GRADED POLYNOMIAL IDENTITIES, GROUP ACTIONS, AND
EXPONENTIAL GROWTH OF LIE ALGEBRAS
A. S. GORDIENKO
Abstract. Consider a finite dimensional Lie algebra L with an action of a finite group G
over a field of characteristic 0. We prove the analog of Amitsur's conjecture on asymptotic
behavior for codimensions of polynomial G-identities of L. As a consequence, we prove the
analog of Amitsur's conjecture for graded codimensions of any finite dimensional Lie algebra
graded by a finite Abelian group.
1. Introduction
In the 1980's, a conjecture about the asymptotic behaviour of codimensions of ordinary
polynomial identities was made by S.A. Amitsur. Amitsur's conjecture was proved in 1999
by A. Giambruno and M.V. Zaicev [1, Theorem 6.5.2] for associative algebras, in 2002 by
M.V. Zaicev [2] for finite dimensional Lie algebras, and in 2011 by A. Giambruno, I.P. Shes-
takov, M.V. Zaicev for finite dimensional Jordan and alternative algebras [3]. In 2011 the
author proved its analog for polynomial identities of finite dimensional representations of
Lie algebras [4]. Alongside with ordinary polynomial identities of algebras, graded polyno-
mial identities [5, 6] and G-identities are important too [7, 8]. Therefore the question arises
whether the conjecture holds for graded and G-codimensions. E. Aljadeff, A. Giambruno,
and D. La Mattina proved [9, 10] the analog of Amitsur's conjecture for codimensions of
graded polynomial identities of associative algebras graded by a finite Abelian group (or,
equivalently, for codimensions of G-identities where G is a finite Abelian group).
This article is concerned with graded codimensions (Theorem 1) and G-codimensions
(Theorem 2) of Lie algebras.
1 , x(g)
Sg∈G X (g), X (g) = {x(g)
1.1. Graded polynomial identities and their codimensions. Let G be an Abelian
group. Denote by L(X gr) the free G-graded Lie algebra on the countable set X gr =
2 , . . .}, over a field F of characteristic 0, i.e. the algebra of Lie
polynomials in variables from X gr. The indeterminates from X (g) are said to be homogeneous
of degree g. The G-degree of a monomial [x(g1)
] ∈ L(X gr) (all long commutators in
the article are left-normed) is defined to be g1g2 . . . gt, as opposed to its total degree, which
is defined to be t. Denote by L(X gr)(g) the subspace of the algebra L(X gr) spanned by all
the monomials having G-degree g. Notice that [L(X gr)(g), L(X gr)(h)] ⊆ L(X gr)(gh), for every
g, h ∈ G. It follows that
, . . . , x(gt)
i1
it
L(X gr) =Mg∈G
L(X gr)(g)
is a G-grading. Let f = f (x(g1)
identity of a G-graded Lie algebra L =Lg∈G L(g) and write f ≡ 0 if f (a(g1)
2010 Mathematics Subject Classification. Primary 17B01; Secondary 17B70, 17B40, 20C30.
Key words and phrases. Lie algebra, polynomial identity, grading, codimension, cocharacter, symmetric
it ) ∈ L(X gr). We say that f is a graded polynomial
it ) = 0
, . . . , x(gt)
, . . . , a(gt)
i1
i1
group, Young diagram, group action.
Supported by post doctoral fellowship from Atlantic Association for Research in Mathematical Sciences
(AARMS), Atlantic Algebra Centre (AAC), Memorial University of Newfoundland (MUN), and Natural
Sciences and Engineering Research Council of Canada (NSERC).
1
2
A. S. GORDIENKO
npcgr
npcn(L).
for all a(gj )
ij ∈ L(gj ), 1 6 j 6 t. The set Idgr(L) of graded polynomial identities of L is a
graded ideal of L(X gr). The case of ordinary polynomial identities is included for the trivial
group G = {e}.
Example 1. Let G = Z2 = {¯0, ¯1}, gl2(F ) = gl2(F )(¯0) ⊕ gl2(F )(¯1) where gl2(F )(¯0) =
(cid:18) F 0
0 F (cid:19) and gl2(F )(¯1) =(cid:18) 0 F
F 0 (cid:19). Then [x(¯0), y(¯0)] ∈ Idgr(gl2(F )).
Let Sn be the nth symmetric group, n ∈ N, and
σ(2), . . . , x(gn)
n := h[x(g1)
V gr
σ(1), x(g2)
σ(n)] gi ∈ G, σ ∈ SniF .
The non-negative integer cgr
polynomial identities or the nth graded codimension of L.
V gr
n (L) := dim(cid:16)
V gr
n
n ∩Idgr(L)(cid:17) is called the nth codimension of graded
The analog of Amitsur's conjecture for graded codimensions can be formulated as follows.
Conjecture. There exists PIexpgr(L) := lim
n→∞
n (L) ∈ Z+.
Remark. I.B. Volichenko [11] gave an example of an infinite dimensional Lie algebra L with
a non-trivial polynomial identity for which the growth of codimensions cn(L) of ordinary
polynomial identities is overexponential. M.V. Zaicev and S.P. Mishchenko [12, 13] gave an
example of an infinite dimensional Lie algebra L with a non-trivial polynomial identity such
that there exists fractional PIexp(L) := lim
n→∞
Theorem 1. Let L be a finite dimensional non-nilpotent Lie algebra over a field F of char-
acteristic 0, graded by a finite Abelian group G. Then there exist constants C1, C2 > 0,
r1, r2 ∈ R, d ∈ N such that C1nr1dn 6 cgr
n (L) 6 C2nr2dn for all n ∈ N.
Corollary. The above analog of Amitsur's conjecture holds for such codimensions.
Remark. If L is nilpotent, i.e.
cgr
n (L) = 0 for all n > p.
[x1, . . . , xp] ≡ 0 for some p ∈ N, then V gr
n ⊆ Idgr(L) and
Theorem 1 will be obtained as a consequence of Theorem 2 in Subsection 1.3.
1.2. Polynomial G-identities and their codimensions. Analogously, one can consider
polynomial G-identities for any group G. We use the exponential notation for the action of
a group and its group algebra. We say that a Lie algebra L is a Lie algebra with G-action or
a Lie G-algebra if there is a fixed linear representation G → GL(L) such that [a, b]g = [ag, bg]
for all a, b ∈ L and g ∈ G. Denote by L(XG) the free Lie algebra over F with free formal
generators xg
for h ∈ G. Let X := {x1, x2, x3, . . .} where
xj := x1
j , 1 ∈ G. Then L(XG) becomes the free G-algebra with free generators xj, j ∈ N.
Let L be a Lie G-algebra over F . A polynomial f (x1, . . . , xn) ∈ L(XG) is a G-identity of
L if f (a1, . . . , an) = 0 for all ai ∈ L. The set IdG(L) of all G-identities of L is an ideal in
L(XG) invariant under G-action.
j , j ∈ N, g ∈ G. Define (xg
j )h := xhg
j
Example 2. Consider ψ ∈ Aut(gl2(F )) defined by the formula
(cid:18) a b
c d (cid:19)ψ
:=(cid:18) a −b
d (cid:19) .
−c
Then [x + xψ, y + yψ] ∈ IdG(gl2(F )) where G = hψi ∼= Z2.
Denote by V G
n the space of all multilinear G-polynomials in x1, . . . , xn, i.e.
n = h[xg1
V G
σ(1), xg2
σ(2), . . . , xgn
σ(n)] gi ∈ G, σ ∈ SniF .
GRADED POLYNOMIAL IDENTITIES
3
Then the number cG
G-identities or the nth G-codimension of L.
n (L) := dim(cid:16)
V G
V G
n
n ∩IdG(L)(cid:17) is called the nth codimension of polynomial
Remark. As in the case of associative algebras [1, Lemma 10.1.3], we have
cn(L) 6 cG
n (L) 6 Gncn(L).
Here cn(L) = c{e}
n (L) are ordinary codimensions.
Also we have the following upper bound:
Lemma 1. Let L be a finite dimensional Lie algebra with G-action over any field F and let
G be any group. Then cG
n (L) 6 (dim L)n+1.
Proof. Consider G-polynomials as n-linear maps from L to L. Then we have a natural map
n → HomF (L⊗n; L) with the kernel V G
V G
n ∩ IdG(L) that leads to the embedding
V G
n
n ∩ IdG(L)
V G
֒→ HomF (L⊗n; L).
Thus
cG
n (L) = dim(cid:18)
V G
n
n ∩ IdG(L)(cid:19) 6 dim HomF (L⊗n; L) = (dim L)n+1.
V G
The analog of Amitsur's conjecture for G-codimensions can be formulated as follows.
(cid:3)
Conjecture. There exists PIexpG(L) := lim
n→∞
n (L) ∈ Z+.
npcG
Theorem 2. Let L be a finite dimensional non-nilpotent Lie algebra over a field F of char-
acteristic 0. Suppose a finite group G not necessarily Abelian acts on L. Then there exist
constants C1, C2 > 0, r1, r2 ∈ R, d ∈ N such that C1nr1dn 6 cG
n (L) 6 C2nr2dn for all n ∈ N.
Corollary. The above analog of Amitsur's conjecture holds for such codimensions.
Remark. If L is nilpotent, i.e. [x1, . . . , xp] ≡ 0 for some p ∈ N, then, by the Jacobi identity,
n ⊆ IdG(L) and cG
V G
n (L) = 0 for all n > p.
Remark. The theorem is still true if we allow G to act not only by automorphisms, but by
anti-automorphisms too, i.e. if G = G0 ∪ G1 such that [a, b]g = [ag, bg] for all a, b ∈ L, g ∈ G0
and [a, b]g = [bg, ag] for all a, b ∈ L, g ∈ G1. Indeed, we can replace G with G = G0 ∪ (−G1)
where [a, b]−g = −[a, b]g = −[bg, ag] = [a−g, b−g] for all (−g) ∈ (−G1). Then G acts on
L by automorphisms only. Moreover, n-linear functions from L to L that correspond to
polynomials from P G
n , are the same. Thus
n and P G
cG
n (L) = dim(cid:18)
V G
n
n ∩ IdG(L)(cid:19) = dim
V G
V G
n
V G
n ∩ Id
G(L)! = c G
n (L)
has the desired asymptotics.
Theorem 2 is proved in Sections 4 -- 6.
4
A. S. GORDIENKO
1.3. Duality between group gradings and group actions. If F is an algebraically
closed field of characteristic 0 and G is finite Abelian, there exists a well known duality
defines a G-grading on L.
of this duality to polynomial identities can be found, e.g., in [1, Chapters 3 and 10].
between G-gradings and bG-actions where bG = Hom(G, F ∗) ∼= G. Details of the application
A character ψ ∈ bG acts on L in the natural way: (ag)ψ = ψ(g)ag for all g ∈ G and
ag ∈ L(g). Conversely, if L is a bG-algebra, then L(g) = {a ∈ L aψ = ψ(g)a for all ψ ∈ bG}
Note that if G is finite Abelian, then L(X gr) is a free bG-algebra with free generators
yj = Pg∈G x(g)
. Thus there exists an isomorphism ε : L(XbG) → L(X gr) defined by
ε(xj) =Pg∈G x(g)
, that preserves bG-action and G-grading. The isomorphism has the prop-
GPψ(ψ(g))−1ψ is one of the minimal idempotents of FbG
Lemma 2. Let L be a G-graded Lie algebra where G is a finite Abelian group. Consider the
erty ε((xj)eg) = x(g)
defined above.
j where eg := 1
j
j
corresponding bG-action on L. Then
(1) ε(Id bG(L)) = Idgr(L);
(2) c bG
n (L) = cgr
n (L).
n ) = V gr
n .
Proof. The first assertion is evident. The second assertion follows from the first one and the
equality ε(V bG
(cid:3)
Remark. Note that Z2-grading in Example 1 corresponds to Z2-action in Example 2.
Proof of Theorem 1. Codimensions do not change upon an extension of the base field. The
proof is analogous to the cases of ordinary codimensions of associative [1, Theorem 4.1.9]
and Lie algebras [2, Section 2]. Thus without loss of generality we may assume F to be
algebraically closed.
In virtue of Lemma 2, Theorem 1 is an immediate consequence of
Theorem 2.
(cid:3)
1.4. Formula for the PI-exponent. Theorem 2 is formulated for an arbitrary field F of
characteristic 0, but without loss of generality we may assume that F is algebraically closed.
Fix a Levi decomposition L = B ⊕ R where B is a maximal semisimple subalgebra of
L and R is the solvable radical of L. Note that R is invariant under G-action. By [14,
Theorem 1, Remark 3], we can choose B invariant under G-action too.
We say that M is an L-module with G-action if M is both left L- and F G-module, and
(a · v)g = ag · vg for all a ∈ L, v ∈ M and g ∈ G. There is a natural G-action on EndF (M)
defined by ψgm = (ψmg−1)g, m ∈ M, g ∈ G, ψ ∈ EndF (M). Note that L → gl(M) is a
homomorphism of F G-modules. Such module M is irreducible if for any G- and L-invariant
subspace M1 ⊆ M we have either M1 = 0 or M1 = M. Each G-invariant ideal in L can be
regarded as a left L-module with G-action under the adjoint representation of L.
Consider G-invariant ideals I1, I2, . . . , Ir, J1, J2, . . . , Jr, r ∈ Z+, of the algebra L such that
Jk ⊆ Ik, satisfying the conditions
(1) Ik/Jk is an irreducible L-module with G-action;
(2) for any G-invariant B-submodules Tk such that Ik = Jk ⊕ Tk, there exist numbers
qi > 0 such that
Let M be an L-module. Denote by Ann M its annihilator in L. Let
q1
{z }
d(L) := max(cid:18)dim
[[T1, L, . . . , L
], [T2, L, . . . , L
]] 6= 0.
], . . . , [Tr, L, . . . , L
qr
q2
{z }
{z }
Ann(I1/J1) ∩ · · · ∩ Ann(Ir/Jr)(cid:19)
L
GRADED POLYNOMIAL IDENTITIES
5
where the maximum is found among all r ∈ Z+ and all I1, . . . , Ir, J1, . . . , Jr satisfying
Conditions 1 -- 2. We claim that PIexpG(L) = d(L) and prove Theorem 2 for d = d(L).
1.5. Examples. Now we give several examples.
Example 3. Let L be a finite dimensional G-simple Lie algebra over an algebraically closed
field F of characteristic 0 where G is a finite group. Then there exist C > 0 and r ∈ R such
that Cnr(dim L)n 6 cG
n (L) 6 (dim L)n+1.
Proof. The upper bound follows from Lemma 1. Consider G-invariant L-modules I1 = L
and J1 = 0. Then I1/J1 is an irreducible L-module, Ann(I1/J1) = 0 since a G-simple algebra
has zero center, and dim(L/ Ann(I1/J1)) = dim L. Thus d(L) > dim L and by Theorem 2
we obtain the lower bound.
(cid:3)
Example 4. Let L be a finite dimensional simple G-graded Lie algebra over an algebraically
closed field F of characteristic 0 where G is a finite Abelian group. Then there exist C > 0
and r ∈ R such that Cnr(dim L)n 6 cgr
n (L) 6 (dim L)n+1.
Proof. This follows from Example 3 and Lemma 2.
(cid:3)
Example 5. Let L be a finite dimensional Lie algebra with G-action over any field F of
characteristic 0 such that PIexpG(L) 6 2 where G is a finite group. Then L is solvable.
Proof. It is sufficient to prove the statement for an algebraically closed field F . (See the
remark before Theorem 2.) Consider the G-invariant Levi decomposition L = B ⊕ R. If B 6=
0, there exists a G-simple Lie subalgebra B1 ⊆ L, dim B1 > 3 and PIexpG(L) = d(L) > 3
by Example 3. We get a contradiction. Hence L = R is a solvable algebra.
(cid:3)
Analogously, we derive Example 6 from Example 4.
Example 6. Let L be a finite dimensional G-graded Lie algebra over any field F of charac-
teristic 0 such that PIexpgr(L) 6 2 where G is a finite Abelian group. Then L is solvable.
Example 7. Let L = B1 ⊕ . . . ⊕ Bs be a finite dimensional semisimple Lie G-algebra over
an algebraically closed field F of characteristic 0 where G is a finite group and Bi are G-
minimal ideals. Let d := max16i6s dim Bi. Then there exist C1, C2 > 0 and r1, r2 ∈ R such
that C1nr1dn 6 cG
n (L) 6 C2nr2dn.
Proof. Note that if I is a G-simple ideal of L, then [I, L] 6= 0 and hence [I, Bi] 6= 0 for some
1 6 i 6 s. However [I, Bi] ⊆ Bi ∩ I is a G-invariant ideal. Thus I = Bi. And if I is a
G-invariant ideal of L, then it is semisimple and each of its simple components coincides with
one of Bi. Thus if I ⊆ J are G-invariant ideals of L and I/J is irreducible, then I = Bi ⊕ J
for some 1 6 i 6 s and dim(L/ Ann(I/J)) = dim Bi. Suppose I1, . . . , Ir, J1, . . . , Jr satisfy
Conditions 1 -- 2. Let Ik = Bik ⊕ Jk, 1 6 k 6 r. Then
[[Bi1, L, . . . , L], [Bi2, L, . . . , L], . . . , [Bir , L, . . . , L]] 6= 0
for some number of copies of L. Hence i1 = . . . = ir and
dim
L
Ann(I1/J1) ∩ · · · ∩ Ann(Ir/Jr)
= dim Bi1.
Therefore, d(L) = max16i6s dim Bi and the result follows from Theorem 2.
(cid:3)
Example 8. Let L = B1 ⊕ . . . ⊕ Bs be a finite dimensional semisimple G-graded Lie algebra
over an algebraically closed field F of characteristic 0 where G is a finite Abelian group and
Bi are minimal graded ideals. Let d := max16i6s dim Bi. Then there exist C1, C2 > 0 and
r1, r2 ∈ R such that C1nr1dn 6 cgr
n (L) 6 C2nr2dn.
6
A. S. GORDIENKO
Proof. This follows from Example 7 and Lemma 2.
(cid:3)
Example 9. Let m ∈ N, G ⊆ Sm and Oi be the orbits of G-action on
Denote
{1, 2, . . . , m} =
Oi.
sai=1
d := max
16i6s
Oi.
Let L be the Lie algebra over any field F of characteristic 0 with basis a1, . . . , am, b1, . . . , bm,
dim L = 2m, and multiplication defined by formulas [ai, aj] = [bi, bj] = 0 and
[ai, bj] =(cid:26) bj
if
0 if
i = j,
i 6= j.
Suppose G acts on L as follows: (ai)σ = aσ(i) and (bj)σ = bσ(j) for σ ∈ G. Then there exist
C1, C2 > 0 and r1, r2 ∈ R such that
C1nr1dn 6 cG
n (L) 6 C2nr2dn.
In particular, if
G = hτ i ∼= Zm = Z/(mZ) = {¯0, ¯1, . . . , m − 1}
where τ = (1 2 3 . . . m) (a cycle), then
C1nr1mn 6 cG
n (L) 6 C2nr2mn.
However, cn(L) = n − 1 for all n ∈ N.
Proof. If K ⊇ F is a larger field, then K ⊗F L is defined by the same formulas as L.
Since cG
n (L) = cG,K
(K ⊗F L) (see the remark before Theorem 2), we may assume F to be
algebraically closed.
n
Let Bi := hbj j ∈ OiiF , 1 6 i 6 s. Suppose I is a G-invariant ideal of L. If bi ∈ I,
then bσ(i) = (bi)σ ∈ I for all σ ∈ G. Thus if i ∈ Oj, then bk ∈ I for all k ∈ Oj. Let
mPi=1
c :=
(αiai + βibi) ∈ I for some αi, βi ∈ F . Then βibi = [ai, c] ∈ I for all 1 6 i 6 m too.
Therefore, I = A0 ⊕ Bi1 ⊕ . . . ⊕ Bik for some 1 6 ij 6 s and A0 ⊆ ha1, . . . , amiF .
If I, J ⊆ L are G-invariant ideals, then J ⊆ J + [L, L] ∩ I ⊆ I is a G-invariant ideal too.
Suppose I/J is irreducible. Then either [L, L] ∩ I ⊆ J and Ann(I/J) = L or I ⊆ J + [L, L]
where [L, L] = hb1, . . . , bmiF . Thus Ann(I/J) 6= L implies J = A0 ⊕ Bi1 ⊕ . . . ⊕ Bik and
I = Bℓ ⊕ J for some 1 6 ℓ 6 s. In this case dim(L/ Ann(I/J)) = Oℓ.
Note that if I1 = Bi1 ⊕ J1 and I2 = Bi2 ⊕ J2, then
[[Bi1, L, . . . , L], [Bi2, L, . . . , L]] = 0.
Thus I1, . . . , Ir, J1, . . . , Jr can satisfy Conditions 1 -- 2 only if r = 1. Hence
d(L) = max
16i6s
Oℓ
and by Theorem 2 we obtain the bounds.
Consider the ordinary polynomial identities. Using the Jacobi identity, any monomial in
Vn can be rewritten as a linear combination of left-normed commutators [x1, xj, xi3, . . . , xin].
Since the polynomial identity
[[x, y], [z, t]] ≡ 0
2 6 j 6 n, are linearly independent modulo Id(L). Indeed, ifPn
holds in L, we may assume that i3 < i4 < . . . < in. Note that fj = [x1, xj, xi3, . . . , xin],
k=2 αkfk ≡ 0, αk ∈ F , then
we substitute xj = b1 and xi = a1 for i 6= j. Only fj does not vanish. Hence αj = 0 and
cn(L) = n − 1.
(cid:3)
Example 10. Let m ∈ N, L = L¯k∈Zm
GRADED POLYNOMIAL IDENTITIES
7
L(¯k) be the Zm-graded Lie algebra with L(¯k) = hc¯k, d¯kiF ,
dim L(¯k) = 2, multiplication [c¯ı, c¯] = [d¯ı, d¯] = 0 and [c¯ı, d¯] = d¯ı+¯ where F is any field of
characteristic 0. Then there exist C1, C2 > 0 and r1, r2 ∈ R such that
Proof. Again, we may assume F to be algebraically closed. Let ζ ∈ F be an mth primitive
C1nr1mn 6 cgr
n (L) 6 C2nr2mn.
root of 1. Then bG = {ψ0, . . . , ψm−1} for G = Zm where ψℓ(¯) := ζ ℓj. We can identify
the algebras from Example 9 and Example 10 by formulas c¯ = Pm
Pm
k=1 ζ −jkak and d¯ =
k=1 ζ −jkbk. The Zm-grading and hτ i-action correspond to each other since (c¯)τ ℓ = ζ ℓjc¯ =
n (L) and the bounds follow
(cid:3)
ψℓ(¯)c¯ and (d¯)τ ℓ = ζ ℓjd¯ = ψℓ(¯)d¯. By Lemma 2, cgr
from Example 9.
n (L) = chτ i
V G
n
V G
1.6. Sn-cocharacters. One of the main tools in the investigation of polynomial identities
is provided by the representation theory of symmetric groups. The symmetric group Sn acts
n ∩IdG(L) by permuting the variables. Irreducible F Sn-modules are described
on the space
by partitions λ = (λ1, . . . , λs) ⊢ n and their Young diagrams Dλ. The character χG
n (L) of
n ∩IdG(L) is called the nth cocharacter of polynomial G-identities of L. We
the F Sn-module
can rewrite it as a sum χG
eTλ = aTλbTλ and e∗
(sign σ)σ, be the
∼= F Se∗
Young symmetrizers corresponding to a Young tableau Tλ. Then M(λ) = F SeTλ
Tλ
is an irreducible F Sn-module corresponding to the partition λ ⊢ n. We refer the reader
to [1, 17, 18] for an account of Sn-representations and their applications to polynomial
identities.
n (L) = Pλ⊢n m(L, G, λ)χ(λ) of irreducible characters χ(λ). Let
Tλ = bTλaTλ where aTλ = Pπ∈RTλ
π and bTλ = Pσ∈CTλ
V G
n
V G
Our proof of Theorem 2 follows the outline of the proof by M.V. Zaicev [2]. However, in
many cases we need to apply new ideas.
In Section 2 we discuss modules with G-action over Lie G-algebras, their annihilators and
complete reducibility.
In Section 3 we prove that m(L, G, λ) is polynomially bounded. In Section 4 we prove
that if m(L, G, λ) 6= 0, then the corresponding Young diagram Dλ has at most d long rows.
This implies the upper bound.
In Section 5 we consider faithful irreducible L0-modules with G-action where L0 is a re-
ductive Lie G-algebra. For an arbitrary k ∈ N, we construct an associative G-polynomial
that is alternating in 2k sets, each consisting of dim L0 variables. This polynomial is not an
identity of the corresponding representation of L0. In Section 6 we choose reductive alge-
bras and faithful irreducible modules with G-action, and glue the corresponding alternating
polynomials. This allows us to find λ ⊢ n with m(L, G, λ) 6= 0 such that dim M(λ) has the
desired asymptotic behavior and the lower bound is proved.
2. Lie algebras and modules with G-action
We need several auxiliary lemmas. First, the Weyl theorem [15, Theorem 6.3] on complete
reducibility of representations can be easily extended to the case of Lie algebras with G-
action.
Lemma 3. Let M be a finite dimensional module with G-action over a Lie G-algebra L0.
Suppose M is a completely reducible L0-module disregarding the G-action. Then M is com-
pletely reducible L0-module with G-action.
Corollary. If M is a finite dimensional module with G-action over a semisimple Lie G-
algebra B0, then M is a completely reducible module with G-action.
8
A. S. GORDIENKO
Proof of Lemma 3. Suppose M1 ⊆ M is a G-invariant L0-submodule of M. Then it is
sufficient to prove that there exists a G-invariant L0-submodule M2 ⊆ M such that M =
M1 ⊕ M2.
Since M is completely reducible, there exists an L0-homomorphism π : M → M1 such that
π(v) = v for all v ∈ M1. Consider a homomorphism π : M → M1, π(v) = 1
Then π(v) = v for all v ∈ M1 too and for all a ∈ L0, h ∈ G we have
GPg∈G π(vg−1)g.
π(a · v) =
π((a · v)g−1
)g =
π(ag−1
· vg−1
)g =
a · π(vg−1
)g = a · π(v),
π(vh) =
π((vh)g−1
)g =
π(v(h−1g)−1
)h(h−1g) =
1
GXg∈G
GXg∈G
1
1
GXg∈G
GXg∈G
1
where g′ = h−1g. Thus we can take M2 = ker π.
1
GXg∈G
GXg′∈G
1
(π(vg′−1
)g′
)h = π(v)h
(cid:3)
Note that [L, R] ⊆ N by [16, Proposition 2.1.7] where N is the nilpotent radical, which is
a G-invariant ideal.
Lemma 4. There exists a G-invariant subspace S ⊆ R such that R = S ⊕ N is the direct
sum of subspaces and [B, S] = 0.
Proof. Note that R is a B-submodule under the adjoint representation of B on L. Applying
the corollary of Lemma 3 to N ⊆ R, we obtain a G-invariant complementary subspace S ⊆ R
such that [B, S] ⊆ S. Thus [B, S] ⊆ S ∩ [L, R] ⊆ S ∩ N = 0.
(cid:3)
Therefore, L = B ⊕ S ⊕ N (direct sum of subspaces).
Let M be an L-module and let T be a subspace of L. Denote AnnT M := (Ann M) ∩ T .
Lemma 5 is a G-invariant analog of [2, Lemma 4].
Lemma 5. Let J ⊆ I ⊆ L be G-invariant ideals such that I/J is an irreducible L-module
with G-action. Then
(1) AnnB(I/J) and AnnS(I/J) are G-invariant subspaces of L;
(2) Ann(I/J) = AnnB(I/J) ⊕ AnnS(I/J) ⊕ N.
Proof. Since I/J is a module with G-action, Ann(I/J), AnnB(I/J), and AnnS(I/J) are
G-invariant. Moreover [N, I] ⊆ J since N is a nilpotent ideal and I/J is a composition
factor of the adjoint representation. Hence N ⊆ Ann(I/J). In order to prove the lemma, it
is sufficient to show that if b + s ∈ Ann(I/J), b ∈ B, s ∈ S, then b, s ∈ Ann(I/J). Denote
ϕ : L → gl(I/J). Then ϕ(b) + ϕ(s) = 0 and
[ϕ(b), ϕ(B)] = [−ϕ(s), ϕ(B)] = 0.
Hence ϕ(b) belongs to the center of ϕ(B) and ϕ(b) = ϕ(s) = 0 since ϕ(B) is semisimple.
Thus b, s ∈ Ann(I/J) and the lemma is proved.
(cid:3)
Lemma 6. Let L0 = B0 ⊕ R0 be a finite dimensional reductive Lie algebra with G-action,
B0 be a maximal semisimple G-subalgebra, and R0 be the center of L0. Let M be a finite
dimensional irreducible L0-module with G-action. Then
(1) M = M1 ⊕ . . . ⊕ Mq for some L0-submodules Mi, 1 6 i 6 q;
(2) elements of R0 act on each Mi by scalar operators;
(3) for every 1 6 i 6 q and g ∈ G there exists such 1 6 j 6 q that M g
i = Mj and this
action of G on the set {M1, . . . , Mq} is transitive.
Proof. Denote by ϕ the homomorphism L0 → gl(M). Then ϕ is a homomorphism of G-
representations. We claim that ϕ(R0) consist of semisimple operators. Let r1, . . . , rt be a
basis in R0. Consider the Jordan decomposition ϕ(ri) = r′
i is semisimple,
i where each r′
i + r′′
GRADED POLYNOMIAL IDENTITIES
9
each r′′
i is nilpotent, and both are polynomials of ϕ(ri) without a constant term [15, Section
4.2]. Since each ϕ(ri) commutes with all operators ϕ(a), a ∈ L0, the elements (r′′
i )g, 1 6
i 6 t, g ∈ G, generate a nilpotent G-invariant associative ideal K in the enveloping algebra
A ⊆ EndF (M) of the Lie algebra ϕ(L0). Suppose KM 6= 0. Then for some κ ∈ N we have
Kκ+1M = 0, but KκM 6= 0. Note that KκM is a non-zero G-invariant L0-submodule. Thus
KκM = M and KM = Kκ+1M = 0. Since K ⊆ EndF (M), we obtain K = 0.
Therefore ϕ(ri) = r′
i are commuting semisimple operators. They have a common basis of
eigenvectors. Hence we can choose subspaces Mi, 1 6 i 6 q, q ∈ N, such that
and each Mi is the intersection of eigenspaces of ϕ(ri). Note that [ϕ(ri), ϕ(x)] = 0 for all
x ∈ L0. Thus Mi are L0-submodules and Propositions 1 and 2 are proved.
M = M1 ⊕ . . . ⊕ Mq,
For every Mi we can define a linear function αi : R0 → F such that ϕ(r)m = αi(r)m for
all r ∈ R0 and m ∈ Mi. Then Mi =Tr∈R0
M g
i = \r∈R0
ker(ϕ(rg) − αi(r) · 1) = \r∈R0
ker(ϕ(r) − αi(r) · 1) and
ker(ϕ(r) − αi(rg−1
) · 1)
where r = rg. Therefore, M g
irreducible with respect to L0- and G-action that implies Proposition 3.
i must coincide with Mj for some 1 6 j 6 q. The module M is
(cid:3)
Lemma 7. Let W be a finite dimensional L-module with G-action. Let ϕ : L → gl(W )
be the corresponding homomorphism. Denote by A the associative subalgebra of EndF (W )
generated by the operators from ϕ(L) and G. Then ϕ([L, R]) ⊆ J(A) where J(A) is the
Jacobson radical of A.
Proof. Let W = W0 ⊇ W1 ⊇ W2 ⊇ . . . ⊇ Wt = {0} be a composition chain in W of
not necessarily G-invariant L-submodules. Then each Wi/Wi+1 is an irreducible L-module.
Denote the corresponding homomorphism by ϕi : L → gl(Wi/Wi+1). Then by E. Cartan's
theorem [16, Proposition 1.4.11], ϕi(L) is semisimple or the direct sum of a semisimple ideal
and the center of gl(Wi/Wi+1). Thus ϕi([L, L]) is semisimple and ϕi([L, L] ∩ R) = 0. Since
[L, R] ⊆ [L, L] ∩ R, we have ϕi([L, R]) = 0 and [L, R]Wi ⊆ Wi+1. Denote by ρ : G →
GL(W ) the homomorphism corresponding to G-action. The associative G-invariant ideal of
A generated by ϕ([L, R]) is nilpotent since for any ai ∈ ϕ([L, R]), bij ∈ ϕ(L), gij ∈ G we
have
a1(cid:0)ρ(g10)b11ρ(g11) . . . ρ(g1,s1−1)b1,s1ρ(g1,s1)(cid:1)a2 . . .
at−1(cid:0)ρ(gt−1,0)bt−1,1ρ(gt−1,1) . . . ρ(gt−1,st−1−1)bt−1,st−1ρ(gt−1,st−1)(cid:1)at =
a1(cid:0)bg10
t−1,st−1(cid:1)agt
g′
g′
t−1,st−1
t−1,1
t−1,1 . . . b
1,s1 (cid:1)ag2
t−1(cid:0)b
g′
1,s1
11 . . . b
2 . . . agt−1
t ρ(gt+1) = 0
where gi, g′
g ∈ G, b ∈ ϕ(L), w ∈ W . Thus ϕ([L, R]) ⊆ J(A).
ij ∈ G are products of gij obtained using the property ρ(g)bw = bgρ(g)w where
(cid:3)
3. Multiplicities of irreducible characters in χG
n (L)
The aim of the section is to prove
Theorem 3. Let L be a finite dimensional Lie G-algebra over a field F of characteristic 0
where G is a finite group. Then there exist constants C > 0, r ∈ N such that
for all n ∈ N.
m(L, G, λ) 6 Cnr
Xλ⊢n
for some C3 > 0 and r3 ∈ N.
Let G1 ⊆ G2 be finite groups and W1, W2 be F G1- and F G2-modules respectively. Then
we denote F G2-module F G2 ⊗F G1 W1 by W1 ↑ G2. Here G2 acts on the first component.
Let W2 ↓ G1 be W2 with G2-action restricted to G1. We use analogous notation for the
characters.
Denote by length(M) the number of irreducible components of a module M.
Consider the diagonal embedding ϕ : Sn → SnG,
2
n
. . .
. . . σ(n) n + σ(1) n + σ(2)
n + 1
n + 2
2n
. . .
. . . n + σ(n)
. . .
. . . (cid:19) .
ϕ(σ) :=(cid:18) 1
σ(1) σ(2)
Then we have
Lemma 8.
10
A. S. GORDIENKO
Remark. Cocharacters do not change upon an extension of the base field F (the proof is
completely analogous to [1, Theorem 4.1.9]), so we may assume F to be algebraically closed.
In [19, Theorem 13 (b)] A. Berele, using the duality between Sn- and GLm(F )-
cocharacters [20, 21], showed that such sequence for an associative algebra with an action
of a Hopf algebra is polynomially bounded. One may repeat those steps for Lie G-algebras
and prove Theorem 3 in that way. However we provide an alternative proof based only on
Sn-characters.
Let {e} be the trivial group, Vn := V {e}
n
, χn(L) := χ{e}
n (L), m(L, λ) := m(L, {e}, λ),
Id(L) := Id{e}(L). Then, by [22, Theorem 3.1],
m(L, λ) 6 C3nr3
(1)
Xλ⊢n
m(L, G, λ) = length(cid:18)
V G
n
n ∩ IdG(L)(cid:19) 6 length(cid:18)(cid:18)
V G
VnG
VnG ∩ Id(L)(cid:19) ↓ ϕ(Sn)(cid:19) .
Xλ⊢n
Proof. Consider Sn-isomorphism π : (VnG ↓ ϕ(Sn)) → V G
where G = {g1, g2, . . . , gG}, 1 6 t 6 n. Note that π(VnG ∩ Id(L)) ⊆ V G
F Sn-module
n ∩IdG(L) is a homomorphic image of F Sn-module(cid:16) VnG
n defined by π(xn(i−1)+t) = xgi
n ∩ IdG(L). Thus
(cid:3)
VnG∩Id(L)(cid:17) ↓ ϕ(Sn).
Hence it is sufficient to prove that length(cid:16)(cid:16) VnG
VnG∩Id(L)(cid:17) ↓ ϕ(Sn)(cid:17) is polynomially bounded.
However, we start with the study of the restriction on the larger subgroup
V G
n
V G
t
S{1, . . . , n} × S{n + 1, . . . , 2n} × . . . × S{n(G − 1), . . . , nG} ⊆ SnG
that we denote by (Sn)G.
This is a particular case of a more general situation. Let m = m1 + . . . + mt, mi ∈ N.
Then we have a natural embedding Sm1 × . . . × Smt ֒→ Sm. Irreducible representations of
Sm1 × . . . × Smt are isomorphic to M(λ(1))♯ . . . ♯M(λ(t)) where λ(i) ⊢ mi. Here
M(λ(1))♯ . . . ♯M(λ(t)) ∼= M(λ(1)) ⊗ . . . ⊗ M(λ(t))
as a vector space and Smi acts on M(λ(i)). Denote by χ(λ(1))♯ . . . ♯χ(λ(t)) the character of
M(λ(1))♯ . . . ♯M(λ(t)).
Analogously, χ(λ(1))b⊗ . . .b⊗ χ(λ(t)) is the character of F Sm-module
M(λ(1))b⊗ . . .b⊗ M(λ(t)) := (M(λ(1))♯ . . . ♯M(λ(t))) ↑ Sm.
Note that if m1 = . . . = mt = k, one can define the inner tensor product, i.e.
M(λ(1)) ⊗ . . . ⊗ M(λ(t))
with the diagonal Sk-action. The character of this F Sk-module equals χ(λ(1)) . . . χ(λ(t)).
GRADED POLYNOMIAL IDENTITIES
11
Recall that irreducible characters of any finite group G0 are orthonormal with respect to
the scalar product (χ, ψ) = 1
χ(g−1)ψ(g).
Denote by λT the transpose partition of λ ⊢ n. Then λT
1 equals the height of the first
G0Pg∈G0
1
1 .
Proof. By Frobenius reciprocity,
6 λT
1 for all 1 6 i 6 t and λT
column of Dλ.
Lemma 9. Let h, t ∈ N. There exist C4 > 0, r4 ∈ N such that for all λ ⊢ m, λ(1) ⊢ m1, . . . ,
λ(t) ⊢ mt, where Dλ lie in the strip of height h, i.e. λT
1 6 h, and m1 + m2 + . . . + mt = m,
we have
If λ ⊢ m, λ(1) ⊢ m1, . . . , λ(t) ⊢ mt, m1 + m2 + . . . + mt = m, and
Now we prove the lemma by induction on t. The case t = 1 is trivial. Suppose
1 6Pt
i=1(cid:0)λ(i)(cid:1)T
(cid:16)χ(λ), χ(λ(1))b⊗ . . .b⊗ χ(λ(t))(cid:17).
(cid:16)χ(λ) ↓ (Sm1 × . . . × Smt), χ(λ(1))♯ . . . ♯χ(λ(t))(cid:17) =(cid:16)χ(λ), χ(λ(1))b⊗ . . .b⊗ χ(λ(t))(cid:17) 6 C4mr4.
(cid:16)χ(λ) ↓ (Sm1 × . . . × Smt), χ(λ(1))♯ . . . ♯χ(λ(t))(cid:17) =(cid:16)χ(λ), χ(λ(1))b⊗ . . .b⊗ χ(λ(t))(cid:17) 6= 0
then(cid:0)λ(i)(cid:1)T
(cid:16)χ(λ) ↓ (Sm1 × . . . × Smt), χ(λ(1))♯ . . . ♯χ(λ(t))(cid:17) =(cid:16)χ(λ), (χ(λ(1))♯ . . . ♯χ(λ(t))) ↑ Sm(cid:17) =
(cid:16)χ(µ), χ(λ(1))b⊗ . . .b⊗ χ(λ(t−1))(cid:17) is polynomially bounded for every µ ⊢ (m1 + . . . + mt−1)
(cid:16)χ(λ), χ(λ(1))b⊗ . . .b⊗ χ(λ(t))(cid:17) =(cid:16)χ(λ), (cid:0)χ(λ(1))b⊗ . . .b⊗ χ(λ(t−1))(cid:1)b⊗ χ(λ(t))(cid:17) =
In order to determine the multiplicity of χ(λ) in χ(µ) b⊗ χ(λ(t)), we are using the Little-
if(cid:0)λ(t)(cid:1)T
strip of height h. Then we may consider only the case(cid:0)λ(t)(cid:1)T
the number of variants to add the boxes from a row is bounded by mh. Since(cid:0)λ(t)(cid:1)T
wood -- Richardson rule (see the algorithm in [23, Corollary 2.8.14]). We cannot obtain Dλ
1 . Suppose the Young diagram Dλ lies in the
1 6 h. Each time
6 h,
the second multiplier in (2) is bounded by (mh)h = mh2. The number of diagrams in the
strip of height h is bounded by mh. Thus the number of terms in (2) is bounded by mh.
Together with the inductive assumption this yields the lemma.
(cid:3)
Xµ⊢(m1+...+mt−1)(cid:16)χ(µ), χ(λ(1))b⊗ . . .b⊗ χ(λ(t−1))(cid:17)(cid:16)χ(λ), χ(µ)b⊗ χ(λ(t))(cid:17).
1 >(cid:0)λ(t)(cid:1)T
1 > λT
1 or µT
1 > λT
1 , or λT
with µT
1 6 h. We have
6 h and µT
1
1 + µT
(2)
1
VnG
VnG ∩ Id(L)(cid:19) ↓ (Sn)G(cid:19) 6 C5nr5
1 > dim L for some 1 6 i 6 G, then M(λ(1))♯ . . . ♯M(λ(G))
Lemma 10. There exist C5 > 0, r5 ∈ N such that
length(cid:18)(cid:18)
for all n ∈ N. Moreover, if(cid:0)λ(i)(cid:1)T
M(λ(1))♯ . . . ♯M(λ(G)) in(cid:16) VnG
does not appear in the decomposition.
Proof. Fix an G-tuple of partitions (λ(1), . . . , λ(G)), λ(i) ⊢ n. Then the multiplicity of
VnG∩Id(L)(cid:17) ↓ (Sn)G equals
(cid:16)χ(λ(1))♯ . . . ♯χ(λ(G)), χnG(L) ↓ (Sn)G(cid:17) =
12
A. S. GORDIENKO
Xλ⊢nG(cid:16)χ(λ(1))♯ . . . ♯χ(λ(G)), χ(λ) ↓ (Sn)G(cid:17)m(L, λ).
(3)
By [22, Lemma 3.4] (or Lemma 14 for G = hei), m(L, λ) = 0 for all λ ⊢ nG with
1 > dim L. Thus Lemma 9 implies that for all M(λ(1))♯ . . . ♯M(λ(G)) that appear in
λT
VnG∩Id(L)(cid:17) ↓ (Sn)G, the Young diagrams Dλ(i) lie in the strip of height (dim L). Thus
(cid:16) VnG
the number of different (λ(1), . . . , λ(G)) that appear in the decomposition of(cid:16) VnG
VnG∩Id(L)(cid:17) ↓
(Sn)G is bounded by n(dim L)G. Together with (1), (3), and Lemma 9, this yields the
lemma.
(cid:3)
Lemma 11. Let h, k ∈ N. There exist C6 > 0, r6 ∈ N such that for the inner tensor product
M(λ) ⊗ M(µ) of any F Sn-modules M(λ) and M(µ), λ, µ ⊢ n, λT
1 6 k, we have
1 6 h, µT
lengthSn(M(λ) ⊗ M(µ)) 6 C6nr6
and(cid:16)χ(λ)χ(µ), χ(ν)(cid:17) = 0 for any ν ⊢ n with νT
1 > hk.
Proof. Let Tµ be any Young tableau of the shape µ. Denote by IRTµ the one-dimensional
trivial representation of the Young subgroup (i.e. the row stabilizer) RTµ. Then
F SnaTµ
∼= IRTµ ↑ Sn
(see [24, Section 4.3]). By [25, Theorem 38.5],
M(λ) ⊗ (IRTµ ↑ Sn) ∼= ((M(λ) ↓ RTµ) ⊗ IRTµ) ↑ Sn.
Thus
M(λ) ⊗ M(µ) ∼= M(λ) ⊗ F Sne∗
M(λ) ⊗ (IRTµ ↑ Sn) ∼= ((M(λ) ↓ RTµ) ⊗ IRTµ) ↑ Sn
∼=
Tµ = M(λ) ⊗ F SnbTµaTµ ⊆ M(λ) ⊗ F SnaTµ
∼= (M(λ) ↓ RTµ) ↑ Sn.
1 6 k, κ(i) ⊢ µi,(cid:0)κ(i)(cid:1)T
1
Note that length(M(λ) ↓ RTµ) is polynomially bounded by Lemma 9 and M(λ) ↓ RTµ is a
sum of M(κ(1))♯ . . . ♯M(κ(s)), s = µT
6 h. Thus (M(λ) ↓ RTµ) ↑ Sn
Lemma 12. There exist C7 > 0, r7 ∈ N satisfying the following properties.
is a sum of M(κ(1))b⊗ . . .b⊗ M(κ(s)). Applying Lemma 9 again, we obtain the lemma. (cid:3)
(λ(1), . . . , λ(G)) is an G-tuple of partitions λ(i) ⊢ n where (cid:0)λ(i)(cid:1)T
lengthSn(cid:0)M(λ(1)) ⊗ . . . ⊗ M(λ(G))(cid:1) 6 C7nr7.
If
6 dim L for all
1 6 i 6 G, then
Proof. Note that
1
M(λ(1)) ⊗ . . . ⊗ M(λ(t)) = (M(λ(1)) ⊗ . . . ⊗ M(λ(t−1))) ⊗ M(λ(t)).
Using induction on t and applying Lemma 11 with h = (dim L)t−1 and k = dim L, we obtain
the lemma.
(cid:3)
Proof of Theorem 3. The theorem is an immediate consequence of Lemmas 8, 10, and 12. (cid:3)
Fix a composition chain of G-invariant ideals
4. Upper bound
L = L0 % L1 % L2 % . . . % N % . . . % Lθ−1 % Lθ = {0}.
Let ht a := maxa∈Lk k for a ∈ L.
Remark. If d = d(L) = 0, then L = Ann(Li−1/Li) for all 1 6 i 6 θ and [a1, a2, . . . , an] = 0
for all ai ∈ L and n > θ + 1. Thus cG
n (L) = 0 for all n > θ + 1. Therefore we assume d > 0.
GRADED POLYNOMIAL IDENTITIES
13
Let Y := {y11, y12, . . . , y1j1; y21, y22, . . . , y2j2; . . . ; ym1, ym2, . . . , ymjm}, Y1,
. . . , Yq, and
{z1, . . . , zm} be subsets of {x1, x2, . . . , xn} such that Yi ⊆ Y , Yi = d + 1, Yi ∩ Yj = ∅
for i 6= j, Y ∩ {z1, . . . , zm} = ∅, ji > 0. Denote
fm,q := Alt1 . . . Altq[[zg1
1 , yg11
11 , yg12
12 , . . . , y
2 , yg21
21 , yg22
22 , . . . , y
g2j2
2j2 ], . . . ,
g1j1
1j1 ], [zg2
m2 , . . . , ygmjm
mjm ]]
[zgm
m , ygm1
m1 , ygm2
where Alti is the operator of alternation on the variables of Yi, gi, gij ∈ G.
Let ϕ : L(XG) → L be a G-homomorphism induced by some substitution
{x1, x2, . . . , xn} → L. We say that ϕ is proper for fm,q if ϕ(z1) ∈ N ∪ B ∪ S, ϕ(zi) ∈ N for
2 6 i 6 m, and ϕ(yik) ∈ B ∪ S for 1 6 i 6 m, 1 6 k 6 ji.
Lemma 13. Let ϕ be a proper homomorphism for fm,q. Then ϕ(fm,q) can be rewritten as
a sum of ψ(fm+1,q′) where ψ is a proper homomorphism for fm+1,q′, q′ > q − (dim L)m − 2.
(Y ′, Y ′
m+1 may be different for different terms.)
1, . . . , z′
i , z′
Proof. Let αi := ht ϕ(zi). We will use induction on Pm
that αi 6 θ 6 dim L. Denote Ii := Lαi, Ji := Lαi+1.
First, consider the case when I1, . . . , Im, J1, . . . , Jm do not satisfy Conditions 1 -- 2. In this
case we can choose G-invariant B-submodules Ti, Ii = Ti ⊕ Ji, such that
i=1 αi. (The sum will grow.) Note
], [T2, L, . . . , L
], . . . , [Tm, L, . . . , L
]] = 0
(4)
q2
{z }
qm
{z }
for all qi > 0. Rewrite ϕ(zi) = a′
i > ht ϕ(zi). Since fm,q
is multilinear, we can rewrite ϕ(fm,q) as a sum of similar terms ϕ(fm,q) where ϕ(zi) equals
either a′
i ∈ Ti, equals 0. For the other terms
i . By (4), the term where all ϕ(zi) = a′
i ∈ Ji. Note that ht a′′
i ∈ Ti, a′′
i or a′′
i , a′
q1
[[T1, L, . . . , L
i + a′′
{z }
i=1 ht ϕ(zi) >Pm
i=1 ht ϕ(zi).
ϕ(fm,q) we havePm
Thus without lost of generality we may assume that I1, . . . , Im, J1, . . . , Jm satisfy Condi-
tions 1 -- 2. In this case, dim(Ann(I1/J1) ∩ . . . ∩ Ann(Im/Jm)) > dim(L) − d. In virtue of
Lemma 5,
Ann(I1/J1) ∩ . . . ∩ Ann(Im/Jm) = B ∩ Ann(I1/J1) ∩ . . . ∩ Ann(Im/Jm)⊕
S ∩ Ann(I1/J1) ∩ . . . ∩ Ann(Im/Jm) ⊕ N.
Choose a basis in B that includes a basis of B ∩ Ann(I1/J1) ∩ . . . ∩ Ann(Im/Jm) and a basis
in S that includes the basis of S ∩ Ann(I1/J1) ∩ . . . ∩ Ann(Im/Jm). Since fm,q is multilinear,
we may assume that only basis elements are substituted for ykℓ. Note that fm,q is alternating
in Yi. Hence, if ϕ(fm,q) 6= 0, then for every 1 6 i 6 q there exists yjk ∈ Yi such that either
or
ϕ(yjk) ∈ B ∩ Ann(I1/J1) ∩ . . . ∩ Ann(Im/Jm)
ϕ(yjk) ∈ S ∩ Ann(I1/J1) ∩ . . . ∩ Ann(Im/Jm).
Consider the case when ϕ(ykj) ∈ B ∩ Ann(I1/J1) ∩ . . . ∩ Ann(Im/Jm) for some ykj. By the
corollary from Lemma 3, we can choose G-invariant B-submodules Tk such that Ik = Tk ⊕Jk.
We may assume that ϕ(zk) ∈ Tk since elements of Jk have greater heights. Therefore
[ϕ(zgk
k ), a] = 0.
Moreover, B ∩ Ann(I1/J1) ∩ . . . ∩ Ann(Im/Jm) is a G-invariant ideal of B and [B, S] = 0.
Thus, applying Jacobi's identity several times, we obtain
k ), a] ∈ Tk ∩ Jk for all a ∈ B ∩ Ann(I1/J1) ∩ . . . ∩ Ann(Im/Jm). Hence [ϕ(zgk
Expanding the alternations, we get ϕ(fm,q) = 0.
ϕ([zgk
k , ygk1
k1 , . . . , y
gkjk
kjk
]) = 0.
14
A. S. GORDIENKO
Consider the case when ϕ(ykℓ) ∈ S ∩ Ann(I1/J1) ∩ . . . ∩ Ann(Im/Jm) for some ykℓ ∈ Yq.
Expand the alternation Altq in fm,q and rewrite fm,q as a sum of
2 , yg21
fm,q−1 := Alt1 . . . Altq−1[[zg1
1 , yg11
m , ygm1
[zgm
11 , yg12
m1 , ygm2
12 , . . . , y
m2 , . . . , ygmjm
g1j1
1j1 ], [zg2
mjm ]].
21 , yg22
22 , . . . , y
g2j2
2j2 ], . . . ,
The operator Altq may change indices, however we keep the notation ykℓ for the variable
with the property ϕ(ykℓ) ∈ S ∩ Ann(I1/J1) ∩ . . . ∩ Ann(Im/Jm). Now the alternation does
not affect ykℓ. Note that
[zgk
k , ygk1
k1 , . . . , ygkℓ
kℓ , . . . , y
gkjk
kjk
] = [zgk
k , ygkℓ
kℓ , ygk1
k1 , . . . , y
gkjk
kjk
]+
[zgk
k , ygk1
k1 , . . . , ygk,β−1
k,β−1 , [ygkβ
kβ , ygkℓ
kℓ ], ygk,β+1
k,β+1 , . . . , ygk,ℓ−1
k,ℓ−1 , ygk,ℓ+1
k,ℓ+1 , . . . , y
gkjk
kjk
].
ℓ−1Xβ=1
k , ygkℓ
kℓ ] with z′
k and define ϕ′(z′
In the first term we replace [zgk
kℓ ]), ϕ′(x) :=
ϕ(x) for other variables x. Then ht ϕ′(z′
k) > ht ϕ(zk) and we can use the inductive as-
If ykβ ∈ Yj for some j, then we expand the alternation Altj in this term in
sumption.
fm,q−1. If ϕ(ykβ) ∈ B, then the term is zero. If ϕ(ykβ) ∈ S, then ϕ([ygkβ
kℓ ]) ∈ N. We
replace [ygkβ
kℓ ]),
ψ(x) := ϕ(x) for other variables x. Applying Jacobi's identity several times, we obtain the
polynomial of the desired form. In each inductive step we reduce q no more than by 1 and
the maximal number of inductive steps equals (dim L)m. This finishes the proof.
(cid:3)
kℓ ] with an additional variable z′
m+1 and define ψ(z′
m+1) := ϕ([ygkβ
k) := ϕ([zgk
kβ , ygkℓ
kβ , ygkℓ
kβ , ygkℓ
k , ygkℓ
Since N is a nilpotent ideal, N p = 0 for some p ∈ N.
Lemma 14. If λ = (λ1, . . . , λs) ⊢ n and λd+1 > p((dim L)p + 3) or λdim L+1 > 0, then
m(L, G, λ) = 0.
Proof. It is sufficient to prove that e∗
λ ⊢ n, with λd+1 > p((dim L)p + 3) or λdim L+1 > 0.
Tλf ∈ IdG(L) for every f ∈ V G
n and a Young tableau Tλ,
Fix some basis of L that is a union of bases of B, S, and N. Since polynomials are
multilinear, it is sufficient to substitute only basis elements. Note that e∗
Tλ = bTλaTλ and bTλ
alternates the variables of each column of Tλ. Hence if we make a substitution and e∗
Tλf does
not vanish, then this implies that different basis elements are substituted for the variables of
each column. But if λdim L+1 > 0, then the length of the first column is greater than dim L.
Therefore, e∗
Tλf ∈ IdG(L).
Consider the case λd+1 > p((dim L)p + 3). Let ϕ be a substitution of basis elements for
the variables x1, . . . , xn. Then e∗
Tλf can be rewritten as a sum of polynomials fm,q where
1 6 m 6 p, q > p((dim L)p + 2), and zi, 2 6 i 6 m, are replaced with elements of N.
(For different terms fm,q, numbers m and q, variables zi, yij, and sets Yi can be different.)
Indeed, we expand symmetrization on all variables and alternation on the variables replaced
with elements from N. If we have no variables replaced with elements from N, then we take
m = 1, rewrite the polynomial f as a sum of long commutators, in each long commutator
expand the alternation on the set that includes one of the variables in the inner commutator,
and denote that variable by z1. Suppose we have variables replaced with elements from N.
We denote them by zk. Then, using Jacobi's identity, we can put one of such variables inside
a long commutator and group all the variables, replaced with elements from B ∪ S, around
zk such that each zk is inside the corresponding long commutator.
Applying Lemma 13 many times, we increase m. The ideal N is nilpotent and ϕ(fp+1,q) = 0
for every q and a proper homomorphism ϕ. Reducing q no more than by p((dim L)p + 2),
we obtain ϕ(e∗
(cid:3)
Tλf ) = 0.
Now we can prove
GRADED POLYNOMIAL IDENTITIES
15
Theorem 4. If d > 0, then there exist constants C2 > 0, r2 ∈ R such that cG
for all n ∈ N. In the case d = 0, the algebra L is nilpotent.
n (L) 6 C2nr2dn
Proof. Lemma 14 and [1, Lemmas 6.2.4, 6.2.5] imply
Xm(L,G,λ)6=0
dim M(λ) 6 C8nr8dn
for some constants C8, r8 > 0. Together with Theorem 3 this implies the upper bound. (cid:3)
In this section we prove auxiliary propositions needed to obtain the lower bound.
5. Alternating polynomials
Lemma 15. Let α1, α2, . . . , αq, β1, . . . , βq ∈ F , 1 6 k 6 q, αi 6= 0 for 1 6 i < k, αk = 0,
and βk 6= 0. Then there exists such γ ∈ F that αi + γβi 6= 0 for all 1 6 i 6 k.
Proof. It is sufficient to choose γ /∈ n− α1
infinite.
β1
, . . . , − αk−1
βk−1
, 0o.
It is possible to do since F is
(cid:3)
Let F hXGi be the free associative algebra over F with free formal generators xg
j )h = xhg
g ∈ G. Define (xg
with free generators xj = x1
multilinear G-polynomials in variables x1, . . . , xn. In other words,
j , j ∈ N,
for h ∈ G. Then F hXGi becomes the free associative G-algebra
j , j ∈ N, 1 ∈ G. Denote by P G
n , n ∈ N, the subspace of associative
j
P G
n =( Xσ∈Sn, g1,...,gn∈G
ασ,g1,...,gn xg1
σ(1)xg2
σ(2) . . . xgn
σ(n)(cid:12)(cid:12)(cid:12)(cid:12) ασ,g1,...,gn ∈ F) .
Lemma 16. Let L0 = B0 ⊕ R0 be a reductive Lie algebra with G-action, B0 be a maximal
semisimple G-subalgebra, and R0 be the center of L0 with a basis r1, r2, . . . , rt. Let M be
a faithful finite dimensional irreducible L0-module with G-action. Denote the correspond-
ing representation L0 → gl(M) by ϕ. Then there exists such alternating in x1, x2, . . . , xt
polynomial f ∈ P G
t
that f (ϕ(r1), . . . , ϕ(rt)) is a nondegenerate operator on M.
Proof. By Lemma 6, M = M1 ⊕ . . . ⊕ Mq where Mj are L0-submodules and ri acts on each
Mj as a scalar operator. Note that it is sufficient to prove that for each j there exists such
alternating in x1, x2, . . . , xt polynomial fj ∈ P G
that fj(ϕ(r1), . . . , ϕ(rt)) multiplies each
t
element of Mj by a nonzero scalar. Indeed, in this case Lemma 15 implies the existence of
such f = γ1f1 + . . . + γqfq, γi ∈ F , that f (ϕ(r1), . . . , ϕ(rt)) acts on each Mi as a nonzero
scalar.
Lemma 6, Proposition 3, we can choose such gi ∈ G that M gi
Denote by pi ∈ EndF (M) the projection on Mi along Lk6=i Mk. Fix 1 6 j 6 q. By
Consider fj := Pσ∈Sq (sign σ)xg1
i = pj.
σ(q). Note that either pg1
σ(q) = 0 or
σ(1)pg2
σ(q) = pj if and
σ(i) = Mj. Hence σ(i) = i.
pg1
σ(1)pg2
only if σ(i) = i for all 1 6 i 6 q. Indeed, pgi
This implies that fj(p1, . . . , pq) acts as an identical map on Mj.
σ(q) = pk for some 1 6 k 6 s. Now we prove that pg1
σ(i) = pj if and only if M gi
i = Mj, 1 6 i 6 q. Then pgi
σ(1)pg2
σ(2) . . . pgq
σ(2) . . . xgq
σ(2) . . . pgq
σ(2) . . . pgq
σ(1)xg2
We can choose it+1, . . . , iq such that ϕ(r1), ϕ(r2), . . . , ϕ(rt), pit+1, . . . , piq form a basis in
hp1, . . . , pqiF . Then fj(ϕ(r1), ϕ(r2), . . . , ϕ(rt), pit+1, . . . , piq) acts as a nonzero scalar on Mj.
If t = q, then we define fj = fj. Suppose t < q. Since the projections commute, we can
rewrite
fj(ϕ(r1), ϕ(r2), . . . , ϕ(rt), pit+1, . . . , piq ) =
fi(ϕ(r1), ϕ(r2), . . . , ϕ(rt))pi
qXi=1
16
A. S. GORDIENKO
where fi ∈ P G
as a nonzero scalar operator. We define fj := fj.
t are alternating in x1, x2, . . . , xt. Hence fj(ϕ(r1), ϕ(r2), . . . , ϕ(rt)) acts on Mj
(cid:3)
Let L0 be a Lie algebra with G-action, M be L0-module with G-action, ϕ : L0 → gl(M)
be the corresponding representation. A polynomial f (x1, . . . , xn) ∈ F hXGi is a G-identity
of ϕ if f (ϕ(a1), . . . , ϕ(an)) = 0 for all ai ∈ L0. The set IdG(ϕ) of all G-identities of ϕ is a
two-sided ideal in F hXGi invariant under G-action.
Lemma 17 is an analog of [3, Lemma 1].
Lemma 17. Let L0 be a Lie algebra with G-action, M be a faithful finite dimensional irre-
ducible L0-module with G-action, and ϕ : L0 → gl(M) be the corresponding representation.
n \ IdG(ϕ) alternating in {x1, . . . , xℓ}
Then for some n ∈ N there exists a polynomial f ∈ P G
and in {y1, . . . , yℓ} ⊆ {xℓ+1, . . . , xn} where ℓ = dim L0.
Proof. Since M is irreducible, by the density theorem, EndF (M) ∼= Mq(F ) is generated by
operators from G and ϕ(L0). Here q := dim M. Consider Regev's polynomial
(sign(στ ))xσ(1) yτ (1) xσ(2)xσ(3)xσ(4) yτ (2)yτ (3)yτ (4) . . .
f (x1, . . . , xq2; y1, . . . , yq2) := Xσ∈Sq ,
τ ∈Sq
xσ(q2−2q+2) . . . xσ(q2) yτ (q2−2q+2) . . . yτ (q2).
This is a central polynomial [1, Theorem 5.7.4] for Mk(F ), i.e. f is not a polynomial identity
for Mq(F ) and its values belong to the center of Mq(F ).
Let a1, . . . , aℓ be a basis of L0. Denote by ρ the representation G → GL(M). Note that if
we have the product of elements of ϕ(L0) and ρ(G), we can always move the elements from
ρ(G) to the right, using ρ(g)a = agρ(g) for g ∈ G and a ∈ ϕ(L0). Then ϕ(a1), . . . , ϕ(aℓ),
(cid:0)ϕ (ai11) . . . ϕ(cid:0)ai1,m1(cid:1)(cid:1) ρ(g1), . . . ,(cid:0)ϕ(cid:0)air,1(cid:1) . . . ϕ(cid:0)air,mr(cid:1)(cid:1) ρ(gr), is a basis of EndF (M) for ap-
g ∈ G, in fq to the right and rewrite f asPg∈G fg ρ(g) where each fg ∈ P G
propriate ijk ∈ {1, 2, . . . , ℓ}, gj ∈ G, since EndF (M) is generated by operators from G and
j,mj ρ(gj) in f and
ϕ(L0). We replace xℓ+j with zj1zj2 . . . zj,mj ρ(gj) and yℓ+j with z′
denote the expression obtained by f . Using ρ(g)a = agρ(g) again, we can move all ρ(g),
is an
alternating in x1, . . . , xℓ and in y1, . . . , yℓ polynomial. Note that f becomes a nonzero scalar
operator on M under the substitution xi = yi = ϕ(ai) for 1 6 i 6 ℓ and zjk = z′
jk = ϕ(aijk )
for 1 6 j 6 r, 1 6 k 6 mj. Thus fg /∈ IdG(ϕ) for some g ∈ G and we can take f = fg.
(cid:3)
j2 . . . z′
2ℓ+2 Pr
j1z′
j=1 mj
Let kℓ 6 n where k, ℓ, n ∈ N are some numbers. Denote by QG
n the sub-
space spanned by all polynomials that are alternating in k disjoint subsets of variables
{xi
ℓ,k,n ⊆ P G
1, . . . , xi
Theorem 5 is an analog of [3, Theorem 1].
ℓ} ⊆ {x1, x2, . . . , xn}, 1 6 i 6 k.
Theorem 5. Let L0 = B0 ⊕R0 be a reductive Lie algebra with G-action over an algebraically
closed field F of characteristic 0, B0 be a maximal semisimple G-subalgebra, R0 be the center
of L0, and dim L0 = ℓ. Let M be a faithful finite dimensional irreducible L0-module with
G-action. Denote the corresponding representation L0 → gl(M) by ϕ. Then there exists
T ∈ Z+ such that for any k ∈ N there exists f ∈ QG
Proof. Let f1 = f1(x1, . . . , xℓ, y1, . . . , yℓ, z1, . . . , zT ) be the polynomial from Lemma 17 al-
ℓ,2,2ℓ+T \ IdG(ϕ), we may assume that
ternating in x1, . . . , xℓ and in y1, . . . , yℓ. Since f1 ∈ QG
k > 1. Note that
ℓ,2k,2kℓ+T \ IdG(ϕ).
f (1)
1 (u1, v1, x1, . . . , xℓ, y1, . . . , yℓ, z1, . . . , zT ) :=
f1(x1, . . . , [u1, [v1, xi]], . . . , xℓ, y1, . . . , yℓ, z1, . . . , zT )
ℓXi=1
GRADED POLYNOMIAL IDENTITIES
17
is alternating in x1, . . . , xℓ and in y1, . . . , yℓ and
f (1)
1 (¯u1, ¯v1, ¯x1, . . . , ¯xℓ, ¯y1, . . . , ¯yℓ, ¯z1, . . . , ¯zT ) =
tr(adϕ(L0) ¯u1 adϕ(L0) ¯v1)f1(¯x1, ¯x2, . . . , ¯xℓ, ¯y1, . . . , ¯yℓ, ¯z1, . . . , ¯zT )
for any substitution of elements from ϕ(L0) since we may assume ¯x1, . . . , ¯xℓ to be different
basis elements. Here (ad a)b = [a, b].
Let
f (j)
1 (u1, . . . , uj, v1, . . . , vj, x1, . . . , xℓ, y1, . . . , yℓ, z1, . . . , zT ) :=
f (j−1)
1
(u1, . . . , uj−1, v1, . . . , vj−1, x1, . . . , [uj, [vj, xi]], . . . , xℓ, y1, . . . , yℓ, z1, . . . , zT ),
ℓXi=1
2 6 j 6 s, s = dim B. Note that if we substitute an element from ϕ(R0) for ui or vi, then
f (j)
1 vanish since R0 is the center of L0. Again,
f (j)
1 (¯u1, . . . , ¯uj, ¯v1, . . . , ¯vj, ¯x1, . . . , ¯xℓ, ¯y1, . . . , ¯yℓ, ¯z1, . . . , ¯zT ) =
tr(adϕ(L0) ¯u1 adϕ(L0) ¯v1) tr(adϕ(L0) ¯u2 adϕ(L0) ¯v2) . . . tr(adϕ(L0) ¯uj adϕ(L0) ¯vj)·
· f1(¯x1, ¯x2, . . . , ¯xℓ, ¯y1, . . . , ¯yℓ, ¯z1, . . . , ¯zT )
(5)
Let h be the polynomial from Lemma 16. We define
Xσ,τ ∈Sℓ
f2(u1, . . . , uℓ, v1, . . . , vℓ, x1, . . . , xℓ, y1, . . . , yℓ, z1, . . . , zT ) :=
sign(στ )f (s)
1 (uσ(1), . . . , uσ(s), vτ (1), . . . , vτ (s), x1, . . . , xℓ, y1, . . . , yℓ, z1, . . . , zT )
·h(uσ(s+1), . . . , uσ(ℓ))h(vτ (s+1), . . . , vτ (ℓ)).
Then f2 ∈ QG
ℓ,4,4ℓ+T . Suppose a1, . . . , as ∈ ϕ(B0) and as+1, . . . , aℓ ∈ ϕ(R0) form a basis of
ϕ(L0). Consider a substitution xi = yi = ui = vi = ai, 1 6 i 6 ℓ. Suppose that the values
zj = ¯zj, 1 6 j 6 T , are chosen in such a way that f1(a1, . . . , aℓ, a1, . . . , aℓ, ¯z1, . . . , ¯zT ) 6= 0.
We claim that f2 does not vanish either. Indeed,
f2(a1, . . . , aℓ, a1, . . . , aℓ, a1, . . . , aℓ, a1, . . . , aℓ, ¯z1, . . . , ¯zT ) =
sign(στ )f (s)
1 (aσ(1), . . . , aσ(s), aτ (1), . . . , aτ (s), a1, . . . , aℓ, a1, . . . , aℓ, ¯z1, . . . , ¯zT )
sign(στ )f (s)
·h(aσ(s+1), . . . , aσ(ℓ))h(aτ (s+1), . . . , aτ (ℓ)) =
1 (aσ(1), . . . , aσ(s), aτ (1), . . . , aτ (s), a1, . . . , aℓ, a1, . . . , aℓ, ¯z1, . . . , ¯zT )! ·
Xπ,ω∈S{s+1,...,ℓ}
sign(πω)h(aπ(s+1), . . . , aπ(ℓ))h(aω(s+1), . . . , aω(ℓ))
since aj, s < j 6 ℓ, belong to the center of ϕ(L0) and f (s)
vanishes if we substitute such ai
for ui or vi. Here S{s + 1, . . . , ℓ} is the symmetric group on {s + 1, . . . , ℓ}. Note that h is
alternating. Using (5), we obtain
j
Xσ,τ ∈Sℓ
Xσ,τ ∈Ss
Xσ,τ ∈Ss
f2(a1, . . . , aℓ, a1, . . . , aℓ, a1, . . . , aℓ, a1, . . . , aℓ, ¯z1, . . . , ¯zT ) =
sign(στ ) tr(adϕ(L0) aσ(1) adϕ(L0) aτ (1)) . . . tr(adϕ(L0) aσ(s) adϕ(L0) aτ (s))! ·
f1(a1, . . . , aℓ, a1, . . . , aℓ, ¯z1, . . . , ¯zT )((ℓ − s)!)2 (h(as+1, . . . , aℓ))2 .
18
A. S. GORDIENKO
sign(στ ) tr(adϕ(L0) aσ(1) adϕ(L0) aτ (1)) . . . tr(adϕ(L0) aσ(s) adϕ(L0) aτ (s)) =
Note that
Xσ,τ ∈Ss
Xσ,τ ∈Ss
Xσ,τ ′∈Ss
sign(στ ) tr(adϕ(L0) a1 adϕ(L0) aτ σ−1(1)) . . . tr(adϕ(L0) as adϕ(L0) aτ σ−1(s))
(τ ′=τ σ−1)
=
sign(τ ′) tr(adϕ(L0) a1 adϕ(L0) aτ ′(1)) . . . tr(adϕ(L0) as adϕ(L0) aτ ′(s)) =
s! det(tr(adϕ(L0) ai adϕ(L0) aj))s
i,j=1 = s! det(tr(adϕ(B0) ai adϕ(B0) aj))s
i,j=1 6= 0
since the Killing form tr(ad x ad y) of the semisimple Lie algebra ϕ(B0) is nondegenerate.
Thus
f2(a1, . . . , aℓ, a1, . . . , aℓ, a1, . . . , aℓ, a1, . . . , aℓ, ¯z1, . . . , ¯zT ) 6= 0.
Note that if f1 is alternating in some of z1, . . . , zT , the polynomial f2 is alternating in
those variables too. Thus if we apply the same procedure to f2 instead of f1, we obtain
f3 ∈ QG
ℓ,6,6ℓ+T . Analogously, we define f4 using f3, f5 using f4, etc. Eventually, we obtain
f = fk ∈ QG
(cid:3)
ℓ,2k,2kℓ+T \ IdG(ϕ).
By the definition of d = d(L), there exist G-invariant ideals I1, I2, . . . , Ir, J1, J2, . . . , Jr,
r ∈ Z+, of the algebra L, satisfying Conditions 1 -- 2, Jk ⊆ Ik, such that
6. Lower bound
d = dim
L
Ann(I1/J1) ∩ · · · ∩ Ann(Ir/Jr)
.
We consider the case d > 0.
Without loss of generality we may assume that
Ann(Ik/Jk) 6=
r\k=1
Ann(Ik/Jk)
r\k=1,
k6=ℓ
for all 1 6 ℓ 6 r. In particular, L has nonzero action on each Ik/Jk.
Our aim is to present a partition λ ⊢ n with m(L, G, λ) 6= 0 such that dim M(λ) has the
desired asymptotic behavior. We will glue alternating polynomials constructed in Theorem 5
for faithful irreducible modules over reductive algebras. In order to do this, we have to choose
the reductive algebras.
Lemma 18. There exist G-invariant ideals B1, . . . , Br in B and G-invariant subspaces
R1, . . . , Rr ⊆ S (some of Ri and Bj may be zero) such that
dim(Bk ⊕ Rk) = d;
(1) B1 + . . . + Br = B1 ⊕ . . . ⊕ Br;
(2) R1 + . . . + Rr = R1 ⊕ . . . ⊕ Rr;
(3)
rPk=1
(5) Ik/Jk is an irreducible(cid:16)Pr
(6) BiIk/Jk = RiIk/Jk = 0 for i > k.
(4) Ik/Jk is a faithful (Bk ⊕ Rk ⊕ N)/N-module;
i=1(Bi ⊕ Ri) ⊕ N(cid:17) /N-module with G-action;
Proof. Consider Nℓ :=
ℓTk=1
GRADED POLYNOMIAL IDENTITIES
19
Ann(Ik/Jk), 1 6 ℓ 6 r, N0 = L. Note that Nℓ are G-invariant.
Since B is semisimple, we can choose such G-invariant ideals Bℓ that Nℓ−1∩B = Bℓ⊕(Nℓ∩B).
Also we can choose such G-invariant subspaces Rℓ that Nℓ−1 ∩ S = Rℓ ⊕ (Nℓ ∩ S). Hence
Properties 1, 2, 6 hold.
By Lemma 5, Nk = (Nk ∩ B) ⊕ (Nk ∩ S) ⊕ N. Thus Property 4 holds. Furthermore,
Nℓ−1 = Bℓ ⊕ (Nℓ ∩ B) ⊕ Rℓ ⊕ (Nℓ ∩ S) ⊕ N = (Bℓ ⊕ Rℓ) ⊕ Nℓ
(direct sum of subspaces). Hence L =(cid:16)Lr
too.
i=1(Bi ⊕ Ri)(cid:17) ⊕ Nr, and Properties 3 and 5 hold
(cid:3)
Let A be the associative subalgebra in EndF (L) generated by operators from ad L and G.
Then J(A)p = 0 for some p ∈ N. Denote by A2 a subalgebra of EndF (L) generated by ad L
only. Let aℓ1, . . . , aℓ,kℓ be a basis of Rℓ.
Lemma 19. There exist decompositions ad aij = cij + dij, 1 6 i 6 r, 1 6 j 6 ki, such
that cij ∈ A acts as a diagonalizable operator on L, dij ∈ J(A), elements cij commute with
each other, and cij and dij are polynomials in ad aij. Moreover, Rℓ := hcℓ1, . . . , cℓ,kℓiF are
G-invariant subspaces in A.
Proof. Consider the solvable G-invariant Lie algebra (ad R) + J(A).
In virtue of the Lie
theorem, there exists a basis in L in which all the operators from (ad R) + J(A) have upper
triangular matrices. Denote the corresponding embedding A ֒→ Mm(F ) by ψ. Here m :=
dim L.
Let A1 be the associative algebra generated by ad aij, 1 6 i 6 r, 1 6 j 6 ki. This algebra
is G-invariant since for every fixed i the elements aij, 1 6 j 6 ki, form a basis of the G-
invariant subspace Ri. By the G-invariant Wedderburn -- Malcev theorem [14, Theorem 1,
Remark 1], A1 = A1 ⊕ J(A1) (direct sum of subspaces) where A1 is a G-invariant semisimple
subalgebra of A1. Since ψ(ad R) ⊆ tm(F ), we have ψ(A1) ⊆ UTm(F ). Here UTm(F ) is the
associative algebra of upper triangular matrices m × m. There is a decomposition
where
UTm(F ) = F e11 ⊕ F e22 ⊕ · · · ⊕ F emm ⊕ N
N := heij 1 6 i < j 6 miF
is a nilpotent ideal. Thus there is no subalgebras in A1 isomorphic to M2(F ) and A1 =
F e1 ⊕ · · · ⊕ F et for some idempotents ei ∈ A1. Denote for every aij its component in
J(A1) by dij and its component in F e1 ⊕ · · · ⊕ F et by cij. Note that ei are commuting
diagonalizable operators. Thus they have a common basis of eigenvectors in L and cij are
commuting diagonalizable operators too. Moreover
ad ag
ij = cg
ij + dg
ij ∈ had aiℓ 1 6 ℓ 6 kiiF ⊆ hciℓ 1 6 ℓ 6 kiiF ⊕ hdiℓ 1 6 ℓ 6 kiiF
for all g ∈ G. Thus Ri is G-invariant.
We claim that the space J(A1)+J(A) generates a nilpotent G-invariant ideal I in A. First,
ψ(J(A1)), ψ(J(A)) ⊆ UTm(F ) and consist of nilpotent elements. Thus the corresponding
matrices have zero diagonal elements and ψ(J(A1)), ψ(J(A)) ⊆ N. Denote Nk := heij
i + k 6 jiF ⊆ N . Then
N = N1 % N2 % . . . % Nm−1 % Nm = {0}.
Let ht N a := k if ψ(a) ∈ Nk, ψ(a) /∈ Nk+1.
20
A. S. GORDIENKO
Recall that (J(A))p = 0. We claim that I m+p = 0. Let ρ : G → GL(L) be the G-action on
L. Using the property
(6)
where a ∈ A2, g ∈ G, we obtain that the space I m+p is a span of h1j1h2j2 . . . jm+phm+p+1ρ(g)
where jk ∈ J(A1)∪J(A), hk ∈ A2 ∪{1}, g ∈ G. If at least p elements jk belong to J(A), then
the product equals 0. Thus we may assume that at least m elements jk belong to J(A1).
ρ(g)a = agρ(g)
expressed as a sum of j1j2 . . . jαj′
Let ji ∈ J(A1), hi ∈ A2 ∪ {1}. We prove by induction on ℓ that j1h1j2h2 . . . hℓ−1jℓ can be
i ∈ J(A), a ∈ A2 ∪ {1}, and
i > ℓ. Indeed, suppose that j1h1j2h2 . . . hℓ−2jℓ−1 can be expressed as a sum of
i > ℓ − 1.
βa where ji ∈ J(A1), j′
i=1 ht N j′
2 . . . j′
i=1 ht N j′
j1j2 . . . jγj′
κa where ji ∈ J(A1), j′
Then j1h1j2h2 . . . jℓ−1hℓ−1jℓ is a sum of
2 . . . j′
1j′
i ∈ J(A), a ∈ A2 ∪ {1}, and γ +Pκ
α +Pβ
1j′
j1j2 . . . jγj′
1j′
2 . . . j′
κahℓ−1jℓ = j1j2 . . . jγj′
1j′
2 . . . j′
κ[ahℓ−1, jℓ] + j1j2 . . . jγj′
1j′
2 . . . j′
κjℓ(ahℓ−1).
Note that, in virtue of the Jacobi identity and Lemma 7, [ahℓ−1, jℓ] ∈ J(A). Thus it is
sufficient to consider only the second term. However
j1j2 . . . jγj′
1j′
2 . . . j′
κjℓ(ahℓ−1) = j1j2 . . . jγjℓj′
1j′
2 . . . j′
κ(ahℓ−1)+
j1j2 . . . jγj′
1j′
2 . . . j′
i−1[j′
i, jℓ]j′
i+1 . . . j′
κ(ahℓ−1).
κXi=1
Since [j′
fore,
i, jℓ] ∈ J(A) and ht N [j′
i, jℓ] > 1 + ht N j′
i, all the terms have the desired form. There-
I m+p = 0, and
j1h1j2h2 . . . jm−1hm−1jm ∈ ψ−1( Nm) = {0},
J(A) ⊆ J(A1) + J(A) ⊆ I ⊆ J(A).
In particular, dij ∈ J(A1) ⊆ J(A).
(cid:3)
Denote
B := rMi=1
ad Bi! ⊕ hcij 1 6 i 6 r, 1 6 j 6 kiiF ,
B0 := (ad B) ⊕ hcij 1 6 i 6 r, 1 6 j 6 kiiF ⊆ A.
Lemma 20. The space L is a completely reducible B0-module with G-action. Moreover, L
is a completely reducible (ad Bk) ⊕ Rk-module with G-action for any 1 6 k 6 r.
Proof. By Lemma 3, it is sufficient to show that L is a completely reducible B0-module and
a completely reducible (ad Bk) ⊕ Rk-module disregarding the G-action. The elements cij are
diagonalizable on L and commute. Therefore, an eigenspace of any cij is invariant under the
i=1 Wi where Wi are intersections of
eigenspaces of ckℓ and elements ckℓ act as scalar operators on Wi. In virtue of Lemmas 4, 19,
and the Jacobi identity, [cij, ad B] = 0. Thus Wi are B-submodules and L is a completely
reducible B0-module and (ad Bk) ⊕ Rk-module since B and Bk are semisimple.
(cid:3)
Lemma 21. There exist complementary subspaces Ik = Tk ⊕ Jk such that
action of other ckℓ. Using induction, we split L = Lα
(1) Tk is a B-submodule and an irreducible B-submodule with G-action;
(2) Tk is a completely reducible faithful (ad Bk) ⊕ Rk-module with G-action;
(3)
dim((ad Bk) ⊕ Rk) = d;
rPk=1
(4) Bi Tk = Ri Tk = 0 for i > k.
GRADED POLYNOMIAL IDENTITIES
21
Proof. By Lemma 20, L is a completely reducible B0-module with G-action. Therefore, for
every Jk we can choose a complementary G-invariant B0-submodules Tk in Ik. Then Tk are
both B- and B-submodules.
Note that (ad aij)w = cijw for all w ∈ Ik/Jk since Ik/Jk is an irreducible A-module and
J(A) Ik/Jk = 0. Hence, by Lemma 18, Ik/Jk is a faithful (ad Bk) ⊕ Rk-module, Ri Ik/Jk =
0 for i > k and the elements cij are linearly independent. Moreover, by Property 5 of
i=1(Bi ⊕ Ri) ⊕ N(cid:17) /N-module with G-action. However
Lemma 18, Ik/Jk is an irreducible(cid:16)Pr
(cid:16)Pr
i=1(Bi ⊕ Ri) ⊕ N(cid:17) /N acts on Ik/Jk by the same operators as B. Thus Tk
∼= Ik/Jk
is an irreducible B-module with G-action. Property 1 is proved. By Lemma 20, L is a
completely reducible (ad Bk) ⊕ Rk-module with G-action for any 1 6 k 6 r. Using the
∼= Ik/Jk, we obtain Properties 2 and 4 from the remarks above. Property 3
isomorphism Tk
is a consequence of Property 3 of Lemma 18.
(cid:3)
Lemma 22. For all 1 6 k 6 r we have
Tk = Tk1 ⊕ Tk2 ⊕ · · · ⊕ Tkm
where Tkj are faithful irreducible (ad Bk)⊕Rk-submodules with G-action, m ∈ N, 1 6 j 6 m.
Proof. By Lemma 21, Property 2, Tk = Tk1⊕Tk2⊕· · ·⊕Tkm for some irreducible (ad Bk)⊕Rk-
submodules with G-action. Suppose Tkj is not faithful for some 1 6 j 6 m. Hence bTkj = 0
for some b ∈ (ad Bk) ⊕ Rk, b 6= 0. Note that B = ((ad Bk) ⊕ Rk) ⊕ Bk where
Bk :=Mi6=k
(ad Bi) ⊕Mi6=k
Ri
generated by operators from Bk. Then
and [(ad Bk) ⊕ Rk, Bk] = 0. Denote by bBk the associative subalgebra of EndF ( Tk) with 1
andPa∈ bBk
aTkj ⊇ Tkj is a G-invariant B-submodule of Tk since
[(ad Bk) ⊕ Rk, bBk] = 0
aTkj
Xa∈ bBk
kj = Xa∈ bBk
= Xa∈ bBk
for all g ∈ G. Thus Tk =Pa∈ bBk
baTkj = Xa∈ bBk
b Tk = Xa∈ bBk
aTkj and
agT g
agTkj = Xa′∈ bBk
a(bTkj) = 0.
a′Tkj
g
We get a contradiction with faithfulness of Tk.
(cid:3)
By Condition 2 of the definition of d, there exist numbers q1, . . . , qr ∈ Z+ such that
[[ T1, L, . . . , L
], [ T2, L, . . . , L
] . . . , [ Tr, L, . . . , L
]] 6= 0
jrk! Tr, L, . . . , L
{z }
qr
]] 6= 0
Choose ni ∈ Z+ with the maximal
q2
q1
ni such that
{z }
{z }
rPi=1
], [ n2Yk=1
j2k! T2, L, . . . , L
{z }
q2
qr
{z }
] . . . , [ nrYk=1
[[ n1Yk=1
j1k! T1, L, . . . , L
{z }
q1
k=1 jik. Then ji ∈ J(A) ∪ {1} and
], . . . , [jr Tr, L, . . . , L
], [j2 T2, L, . . . , L
]] 6= 0,
22
A. S. GORDIENKO
[[j1 T1, L, . . . , L
for some jik ∈ J(A). Let ji :=Qni
{z }
{z }
for all j ∈ J(A) and 1 6 k 6 r.
[[j1 T1, L, . . . , L
but
q1
q1
q2
{z }
{z }
qk
qr
{z }
{z }
qr
qr
{z }
], . . . , [jk(j Tk), L, . . . , L
], . . . , [jr Tr, L, . . . , L
]] = 0
(7)
In virtue of Lemma 22, for every k we can choose a faithful irreducible (ad Bk) ⊕ Rk-
submodule with G-action Tk ⊆ Tk such that
] . . . , [jrTr, L, . . . , L
]] 6= 0.
(8)
Lemma 23. Let ψ : Lr
i=1((ad Bi) ⊕ Ri) be the linear isomorphism defined
by formulas ψ(b) = ad b for all b ∈ Bi and ψ(aiℓ) = ciℓ, 1 6 ℓ 6 kℓ. Let fi be multilinear
associative G-polynomials, h(i)
i=1 Bi ⊕ Ri, ¯ti ∈ Ti, ¯uik ∈ L, be some elements.
Then
[[j1T1, L, . . . , L
q2
q1
], [j2T2, L, . . . , L
{z }
{z }
i=1(Bi ⊕ Ri) →Lr
ni ∈Lr
1 , . . . , h(i)
[[j1f1(ad h(1)
1 , . . . , ad h(1)
nr )¯tr, ¯ur1, . . . , ¯urqr]] =
n1 )¯t1, ¯u11, . . . , ¯u1q1], . . . , [jrfr(ad h(r)
[[j1f1(ψ(h(1)
[jrfr(ψ(h(r)
1 , . . . , ad h(r)
n1 ))¯t1, ¯u11, . . . , ¯u1q1], . . . ,
nr ))¯tr, ¯ur1, . . . , ¯urqr]].
1 ), . . . , ψ(h(1)
1 ), . . . , ψ(h(r)
In other words, we can replace ad aiℓ with ciℓ and the result does not change.
Proof. We rewrite ad aiℓ = ciℓ + diℓ = ψ(ai) + diℓ and use the multilinearity of fi. By (7),
terms with diℓ vanish.
(cid:3)
Denote by A3 ⊆ EndF (L) the linear span of products of operators from ad L and G such
that each product contains at least one element from ad L.
Lemma 24. J(A) ⊆ A3.
Proof. Note that A3 is a G-invariant two-sided ideal of A and A3 + A3 = A where
A3 ⊆ EndF (L) is the associative subalgebra generated by operators from G. Thus
∼= A3/( A3 ∩ A3) is a semisimple algebra since A3 is a homomorphic image of the
A/A3
semisimple group algebra F G. Thus J(A) ⊆ A3.
(cid:3)
Lemma 25. If d 6= 0, then there exist a number n0 ∈ N such that for every n > n0 there
exist disjoint subsets X1, . . . , X2k ⊆ {x1, . . . , xn}, k :=(cid:2) n−n0
n \ IdG(L) alternating in the variables of each set Xj.
2d (cid:3), X1 = . . . = X2k = d and
a polynomial f ∈ V G
Proof. Denote by ϕi : (ad Bi) ⊕ Ri → gl(Ti) the representation corresponding to the action of
(ad Bi) ⊕ Ri on Ti. In virtue of Theorem 5, there exist constants mi ∈ Z+ such that for any
di,2k,2kdi+mi\ IdG(ϕi), di := dim((ad Bi) ⊕ Ri),
k there exist multilinear polynomials fi ∈ QG
alternating in the variables from disjoint sets X (i)
, 1 6 ℓ 6 2k, X (i)
= di.
ℓ
ℓ
In virtue of (8),
[[j1¯t1, ¯u11, . . . , ¯u1,q1], [j2¯t2, ¯u21, . . . , ¯u2,q2], . . . , [jr¯tr, ¯ur1, . . . , ¯ur,qr]] 6= 0,
for some ¯uiℓ ∈ L and ¯ti ∈ Ti. All ji ∈ J(A) ∪ {1} are polynomials in elements from G and
ad L. Denote by m the maximal degree of them.
Recall that each Ti is a faithful irreducible (ad Bi) ⊕ Ri-module with G-action. Therefore
by the density theorem, EndF (Ti) is generated by operators from G and (ad Bi) ⊕ Ri. Note
that EndF (Ti) ∼= Mdim Ti(F ). Thus every matrix unit e(i)
jℓ ∈ Mdim Ti(F ) can be represented as
GRADED POLYNOMIAL IDENTITIES
23
a polynomial in operators from G and (ad Bi) ⊕ Ri. Choose such polynomials for all i and
all matrix units. Denote by m0 the maximal degree of those polynomials.
Let n0 := r(2m0 + m + 1) +Pr
fi /∈ IdG(ϕi), there exist ¯xi1, . . . , ¯xi,2kdi+mi ∈ (ad Bi)⊕Ri such that fi(¯xi1, . . . , ¯xi,2kdi+mi) 6= 0.
Hence
i=1(mi + qi). Now we choose fi for k = (cid:2) n−n0
2d (cid:3). Since
e(i)
ℓiℓi
fi(¯xi1, . . . , ¯xi,2kdi+mi)e(i)
sisi 6= 0
for some matrix units e(i)
ℓiℓi
, e(i)
sisi ∈ EndF (Ti), 1 6 ℓi, si 6 dim Ti. Thus
dimTiXℓ=1
e(i)
ℓℓi
fi(¯xi1, . . . , ¯xi,2kdi+mi)e(i)
siℓ
is a nonzero scalar operator in EndF (Ti).
Hence
e(1)
ℓℓ1f1(¯x11, . . . , ¯x1,2kd1+m1)e(1)
e(r)
ℓℓr fr(¯xr1, . . . , ¯xr,2kdr+mr )e(r)
s1ℓ! ¯t1, ¯u11, . . . , ¯u1q1], . . . ,
srℓ! ¯tr, ¯ur1, . . . , ¯urqr]] 6= 0.
[[j1 dim T1Xℓ=1
[jr dim TrXℓ=1
i=1 X (i)
ℓ
. Let Altℓ be the operator of alternation in the variables from Xℓ.
Denote Xℓ :=Sr
Consider
Then
f (x11, . . . , x1,2kd1+m1, . . . , xr1, . . . , xr,2kdr+mr ) :=
Alt1 Alt2 . . . Alt2k[[j1 dim T1Xℓ=1
e(1)
ℓℓ1f1(x11, . . . , x1,2kd1+m1)e(1)
s1ℓ! ¯t1, ¯u11, . . . , ¯u1q1], . . . ,
[jr dim TrXℓ=1
e(r)
ℓℓr fr(xr1, . . . , xr,2kdr+mr )e(r)
srℓ! ¯tr, ¯ur1, . . . , ¯urqr]].
(d1!)2k . . . (dr!)2k[[j1 dim T1Xℓ=1
[jr dim TrXℓ=1
f (¯x11, . . . , ¯x1,2kd1+m1, . . . , ¯xr1, . . . , ¯xr,2kdr+mr ) =
e(1)
ℓℓ1f1(¯x11, . . . , ¯x1,2kd1+m1)e(1)
s1ℓ! ¯t1, ¯u11, . . . , ¯u1q1], . . . ,
e(r)
ℓℓr fr(¯xr1, . . . , ¯xr,2kdr+mr )e(r)
srℓ! ¯tr, ¯ur1, . . . , ¯urqr]] 6= 0.
since fi are alternating in each X (i)
ℓ and, by Lemma 21, ((ad Bi) ⊕ Ri) Tℓ = 0 for i > ℓ. Now
ℓj as polynomials in elements of (ad Bi) ⊕ Ri and G. Using linearity of f in e(i)
we rewrite e(i)
ℓj ,
we can replace e(i)
ℓj with the products of elements from (ad Bi)⊕Ri and G, and the expression
will not vanish for some choice of the products. Using (6), we can move all ρ(g) to the right.
By Lemma 23, we can replace all elements from (ad Bi) ⊕ Ri with elements from Bi ⊕ Ri
i=1((ad Bi) ⊕ Ri)
the corresponding linear isomorphism. Now we rewrite ji as polynomials in elements ad L
and G. Since f is linear in ji, we can replace ji with one of the monomials, i.e. with the
product of elements from ad L and G. Using (6), we again move all ρ(g) to the right. Then
we replace the elements from ad L with new variables, and
and the expression will be still nonzero. Denote by ψ : Lr
i=1(Bi ⊕ Ri) →Lr
f := Alt1 Alt2 . . . Alt2k(cid:20)hhy11, [y12, . . . [y1α1,hz11, [z12, . . . , [z1β1,
24
A. S. GORDIENKO
(f1(ad x11, . . . , ad x1,2kd1+m1))g1[w11, [w12, . . . , [w1γ1, th1
hhyr1, [yr2, . . . , [yrαr,hzr1, [zr2, . . . , [zrβr,
(fr(ad xr1, . . . , ad xr,2kdr+mr ))gr[wr1, [wr2, . . . , [wrγr, thr
1 ] . . .i, u11, . . . , u1q1i, . . . ,
r ] . . .i, ur1, . . . , urqri(cid:21)
for some 0 6 αi 6 m,
under the substitution ti = ¯ti, uiℓ = ¯uiℓ, xiℓ = ψ−1(¯xiℓ), yiℓ = ¯yiℓ, ziℓ = ¯ziℓ, wiℓ = ¯wiℓ.
0 6 βi, γi 6 m0,
¯yiℓ, ¯ziℓ, ¯wiℓ ∈ L does not vanish
gi, hi ∈ G,
we take f := f . Suppose n > n. Let b ∈ (ad B1) ⊕ R1, b 6= 0. Then e(1)
i=1(mi + qi + αi + βi + γi) 6 n. If n = n, then
6= 0 for
¯t1 = µ¯t1, µ ∈ F \{0}. Hence f does not
jj be(1)
ℓℓ
¯t1; ti = ¯ti for 2 6 i 6 r; uiℓ = ¯uiℓ,
ℓs )(cid:17)n−n
(e(1)
sj be(1)
ℓs )(cid:17)n−n
s=1
(e(1)
sj be(1)
Note that f ∈ V G
n , n := 2kd + r +Pr
some 1 6 j, ℓ 6 dim T1 and(cid:16)Pdim T1
vanish under the substitution t1 =(cid:16)Pdim T1
can rewrite (cid:16)Pdim T1
xiℓ = ψ−1(¯xiℓ), yiℓ = ¯yiℓ, ziℓ = ¯ziℓ, wiℓ = ¯wiℓ.
By Lemma 24,
s=1
b ∈ J(A) ⊕ ad(B1 ⊕ R1) ⊆ A3
and using (6) we
[¯v1, [¯v2, [. . . , [¯vq, ¯tg
substitution t1 = [¯v1, [¯v2, [. . . , [¯vq, ¯tg
2 6 i 6 r; uiℓ = ¯uiℓ, xiℓ = ψ−1(¯xiℓ), yiℓ = ¯yiℓ, ziℓ = ¯ziℓ, wiℓ = ¯wiℓ. Therefore,
elements
1] . . .], q > n − n, ¯vi ∈ L, g ∈ G. Hence f does not vanish under a
1] . . .] for some q > n − n, ¯vi ∈ L, g ∈ G; ti = ¯ti for
¯t1 as a sum of
(e(1)
sj be(1)
s=1
ℓs )(cid:17)n−n
f := Alt1 Alt2 . . . Alt2k(cid:20)hhy11, [y12, . . . [y1α1,hz11, [z12, . . . , [z1β1,
(f1(ad x11, . . . , ad x1,2kd1+m1))g1[w11, [w12, . . . , [w1γ1,
(f2(ad x21, . . . , ad x2,2kd2+m2))g2[w21, [w22, . . . , [w2γ2, th2
(cid:2)vh1
1 , [vh1
n−n, th1
2 , [. . . , [vh1
1 ] . . .(cid:3) . . .i, u11, . . . , u1q1i,
hhy21, [y22, . . . [y2α2,hz21, [z22, . . . , [z2β2,
. . . ,hhyr1, [yr2, . . . , [yrαr ,hzr1, [zr2, . . . , [zrβr ,
(fr(ad xr1, . . . , ad xr,2kdr+mr ))gr[wr1, [wr2, . . . , [wrγr, thr
2 ] . . .i, u21, . . . , u2q2i,
r ] . . .i, ur1, . . . , urqri(cid:21)
does not vanish under
[¯vn−n+1, [¯vn−n+2, [. . . , [¯vq, ¯tg
ziℓ = ¯ziℓ, wiℓ = ¯wiℓ. Note that f ∈ V G
the substitution vℓ = ¯vℓ, 1 6 ℓ 6 n − n,
t1 =
1] . . .]; ti = ¯ti for 2 6 i 6 r; uiℓ = ¯uiℓ, xiℓ = ψ−1(¯xiℓ), yiℓ = ¯yiℓ,
(cid:3)
n and satisfies all the conditions of the lemma.
Lemma 26. Let k, n0 be the numbers from Lemma 25. Then for every n > n0 there exists a
partition λ = (λ1, . . . , λs) ⊢ n, λi > 2k − C for every 1 6 i 6 d, with m(L, G, λ) 6= 0. Here
C := p((dim L)p + 3)((dim L) − d) where p ∈ N is such number that N p = 0.
Proof. Consider the polynomial f from Lemma 25.
IdG(L) for some tableau Tλ of the desired shape λ. It is known that F Sn =Lλ,Tλ
Pλ,Tλ
Tλf /∈
F Sne∗
Tλ
where the summation runs over the set of all standard tableax Tλ, λ ⊢ n. Thus F Snf =
Tλf /∈ IdG(L) for some λ ⊢ n. We claim that λ is of the desired
shape. It is sufficient to prove that λd > 2k − C, since λi > λd for every 1 6 i 6 d. Each row
of Tλ includes numbers of no more than one variable from each Xi, since e∗
= bTλaTλ and
Tλ
Tλf 6⊆ IdG(L) and e∗
It is sufficient to prove that e∗
F Sne∗
aTλ is symmetrizing the variables of each row. ThusPd−1
In virtue of Lemma 14,Pd
{z
}
d
Proof of Theorem 1. The Young diagram Dλ from Lemma 26 contains the rectangular subdi-
agram Dµ, µ = (2k − C, . . . , 2k − C
). The branching rule for Sn implies that if we consider
GRADED POLYNOMIAL IDENTITIES
25
i=1 λi > n − C. Therefore λd > 2k − C.
i=1 λi 6 2k(d−1)+(n−2kd) = n−2k.
(cid:3)
the restriction of Sn-action on M(λ) to Sn−1, then M(λ) becomes the direct sum of all
non-isomorphic F Sn−1-modules M(ν), ν ⊢ (n − 1), where each Dν is obtained from Dλ by
deleting one box. In particular, dim M(ν) 6 dim M(λ). Applying the rule (n − d(2k − C))
times, we obtain dim M(µ) 6 dim M(λ). By the hook formula,
where hij is the length of the hook with edge in (i, j). By Stirling formula,
dim M(µ) =
(d(2k − C))!
Qi,j hij
cG
n (L) > dim M(λ) > dim M(µ) >
(d(2k − C))!
((2k − C + d)!)d ∼
p2πd(2k − C)(cid:16) d(2k−C)
(cid:16)p2π(2k − C + d)(cid:0) 2k−C+d
(cid:17)d(2k−C)
(cid:1)2k−C+d(cid:17)d ∼ C9kr9d2kd
e
e
for some constants C9 > 0, r9 ∈ Q, as k → ∞. Since k =(cid:2) n−n0
The upper bound has been proved in Theorem 4.
2d (cid:3), this gives the lower bound.
(cid:3)
I am grateful to Yuri Bahturin and Mikhail Kotchetov for helpful discussions.
7. Acknowledgements
References
[1] Giambruno, A., Zaicev, M. V. Polynomial identities and asymptotic methods. AMS Mathematical Sur-
veys and Monographs Vol. 122, Providence, R.I., 2005.
[2] Zaitsev, M. V. Integrality of exponents of growth of identities of finite-dimensional Lie algebras. Izv.
Math. 66 (2002), 463 -- 487.
[3] Giambruno, A., Shestakov, I.P., Zaicev, M. V. Finite-dimensional non-associative algebras and codimen-
sion growth. Adv. Appl. Math. 47 (2011), 125 -- 139.
[4] Gordienko, A. S. Codimensions of polynomial identities of representations of Lie algebras. Proc. Amer.
Math. Soc. (to appear).
[5] Bahturin, Yu. A., Zaicev, M. V. Identities of graded algebras. J. Algebra, 205 (1998), 1 -- 12.
[6] Bahturin, Yu. A., Zaicev, M. V. Identities of graded algebras and codimension growth. Trans. Amer.
Math. Soc. 356:10 (2004), 3939 -- 3950.
[7] Bakhturin, Yu. A., Zaıtsev, M. V., Sehgal, S. K. G-identities of non-associative algebras. Sbornik: Math-
ematics, 190:11 (1999), 1559 -- 1570.
[8] Bahturin, Yu. A., Giambruno, A., Zaicev, M. V. G-identities on associative algebras. Proc. Amer. Math.
Soc., 127:1 (1999), 63 -- 69.
[9] Aljadeff, E., Giambruno, A., La Mattina, D. Graded polynomial identities and exponential growth. J.
reine angew. Math., 650 (2011), 83 -- 100.
[10] Giambruno, A., La Mattina, D. Graded polynomial identities and codimensions: computing the expo-
nential growth. Adv. Math., 225 (2010), 859 -- 881.
[11] Volichenko, I. B. Varieties of Lie algebras with identity [[X1, X2, X3], [X4, X5, X6]] = 0 over a field of
characteristic zero. (Russian) Sibirsk. Mat. Zh. 25:3 (1984), 40 -- 54.
[12] Zaicev, M. V., Mishchenko, S. P. An example of a variety of Lie algebras with a fractional exponent. J.
Math. Sci. (New York), 93:6 (1999), 977 -- 982.
[13] Mishchenko, S.P., Verevkin, A.B., Zaitsev, M.V. A sufficient condition for coincidence of lower and
upper exponents of the variety of linear algebras. Mosc. Univ. Math. Bull., 66:2 (2011), 86 -- 89.
[14] Taft, E.J. Invariant Wedderburn factors. Illinois J. Math., 1 (1957), 565 -- 573.
26
A. S. GORDIENKO
[15] Humphreys, J. E. Introduction to Lie algebras and representation theory. New-York, Springer-Verlag,
1978.
[16] Goto, M., Grosshans, F. Semisimple Lie algebras. Marcel Dekker, New York and Basel, 1978.
[17] Bakhturin, Yu. A. Identical relations in Lie algebras. VNU Science Press, Utrecht, 1987.
[18] Drensky, V. S. Free algebras and PI-algebras: graduate course in algebra. Singapore, Springer-Verlag,
2000.
[19] Berele, A. Cocharacter sequences for algebras with Hopf algebra actions. J. Alg., 185 (1996), 869 -- 885.
[20] Drensky, V.S. Representations of the symmetric group and varieties of linear algebras. Mathematics of
the USSR -- Sbornik, 43:1 (1982), 85 -- 101.
[21] Berele, A. Homogeneous polynomial identities. Israel J. Math, 42:3 (1982), 258 -- 272.
[22] Giambruno, A., Regev, A., Zaicev, M. V. Simple and semisimple Lie algebras and codimension growth.
Trans. Amer. Math. Soc., 352:4 (2000), 1935 -- 1946.
[23] James, G., Kerber, A. The representation theory of the symmetric group. Massachusetts, Addison-
Wesley, 1981.
[24] Fulton, W., Harris, J. Representation theory: a first course. New York , Springer-Verlag, 1991.
[25] Curtis, C. W., Reiner, I. Representation theory of finite groups and associative algebras. Pure and
Applied Mathematics, Vol. XI, John Wiley & Sons, New York-London-Sydney, 1962.
Memorial University of Newfoundland, St. John's, NL, Canada
E-mail address: [email protected]
|
1601.07827 | 1 | 1601 | 2016-01-28T16:47:12 | A non-abelian Hom-Leibniz tensor product and applications | [
"math.RA"
] | The notion of non-abelian Hom-Leibniz tensor product is introduced and some properties are established. This tensor product is used in the description of the universal ($\alpha$-)central extensions of Hom-Leibniz algebras. We also give its application to the Hochschild homology of Hom-associative algebras. | math.RA | math |
A non-abelian Hom-Leibniz tensor product and applications
J. M. Casas(1), E. Khmaladze(2) and N. Pacheco Rego(3)
(1)Dpto. Matem´atica Aplicada I, Univ. de Vigo, 36005 Pontevedra, Spain
e-mail address: [email protected]
(2)A. Razmadze Math. Inst. of I. Javakhishvili Tbilisi State University,
Tamarashvili Str. 6, 0177 Tbilisi, Georgia
e-mail address: [email protected]
(3)IPCA, Dpto. de Ciencias, Campus do IPCA, Lugar do Aldao
4750-810 Vila Frescainha, S. Martinho, Barcelos, Portugal
e-mail address: [email protected]
Abstract
The notion of non-abelian Hom-Leibniz tensor product is introduced
and some properties are established. This tensor product is used in the
description of the universal (α-)central extensions of Hom-Leibniz algebras.
We also give its application to the Hochschild homology of Hom-associative
algebras.
A. M. S. Subject Class. (2010): 17A30, 17B55, 17B60, 18G35, 18G60
Key words: Hom-Leibniz algebra, non-abelian tensor product, universal
(α)-central extension, Hom-associative algebra, Hochschild homology.
1
Introduction
Since the invention of Hom-Lie algebras as the algebraic model of deformed Lie
algebras coming from twisted discretizations of vectors fields by Hartwig, Larsson
and Silvestrov in [10], many papers appeared dealing with Hom-type generaliza-
tions of various algebraic structures (see for instance [1, 2, 3, 6, 7, 14, 15, 16,
17, 18, 19] and related references given therein).
In particular, Makhlouf and
Silvestrov introduced the notion of Hom-Leibniz algebras in [14], which simulta-
neously is a non-commutative generalization of Hom-Lie algebras and Hom-type
generalization of Leibniz algebras. In this generalized framework, it is natural to
seek for possible extensions of results in the categories of Lie or Leibniz algebras
to the categories of Hom-Lie or Hom-Leibniz algebras.
1
Recently, in [4], we developed the non-abelian Hom-Lie tensor product, ex-
tending the non-abelian Lie tensor product by Ellis [8] from Lie to Hom-Lie alge-
bras. It has applications in universal (α-)central extensions of Hom-Lie algebras
and cyclic homology of Hom-associative algebras.
In this paper we have chosen to work with Hom-Leibniz algebras. This work
is a continuation and non-commutative generalization of the work already begun
in [4]. Thus, we introduce a non-abelian Hom-Leibniz tensor product, extend-
ing the non-abelian Leibniz tensor product by Gnedbaye [9], which itself is the
Leibniz algebra (non-commutative) version of the non-abelian Lie tensor product
[8, 11]. Then we investigate properties of the non-abelian Hom-Leibniz tensor
product (Section 3) and give its applications to universal (α-)central extensions
of Hom-Leibniz algebras (Section 4) and Hochschild homology of Hom-associative
algebras (Section 5).
One observes that not all results can be transferred from Leibniz to Hom-
Leibniz algebras. For example, results on universal central extensions of Leib-
niz algebras can not be extended directly to Hom-Leibniz algebras because the
category of Hom-Leibniz algebras doesn't satisfy the so-called universal central
extension condition [5], which means that the composition of central extensions
is not central in general [3]. By this reason, the notion of α-central extension
of Hom-Leibniz algebras is introduced in [3], and classical results are divided
between universal central and universal α-central extensions of Hom-Leibniz al-
gebras (see Theorem 4.3). Further, Hom-type version of Gnedbaye's result relat-
ing Hochschild and Milnor type Hochschild homology of associative algebras [9],
doesn't hold for all Hom-associative algebras and requires an additional condition
(see Theorem 5.7).
Notations
Throughout this paper we fix K as a ground field. Vector spaces are considered
over K and linear maps are K-linear maps. We write ⊗ for the tensor product ⊗K
over K. For any vector space (resp. Hom-Leibniz algebra) L, a subspace (resp. a
two-sided ideal) L′ and x ∈ L we write x to denote the coset x + L′. We denote
by Lie and Lb the categories of Lie and Leibniz algebras, respectively.
2 Preliminaries on Hom-Leibniz algebras
2.1 Basic definitions
In this section we review some terminology on Hom-Leibniz algebras and recall
notions used in the paper. We also introduce notions of actions and semi-direct
product of Hom-Leibniz algebras.
2
Definition 2.1. [14] A Hom-Leibniz algebra is a triple (L, [−, −], αL) consisting
of a vector space L, a bilinear map [−, −] : L × L → L, called bracket operation,
and a linear map αL : L → L satisfying:
[αL(x), [y, z]] = [[x, y], αL(z)] − [[x, z], αL(y)] (Hom-Leibniz identity)
(2.1)
for all x, y, z ∈ L.
In the whole paper we only deal with (the so-called multiplicative [19]) Hom-
Leibniz algebras (L, [−, −], αL) such that αL preserves the bracket operation, that
is, αL[x, y] = [αL(x), αL(y)], for all x, y ∈ L.
Example 2.2.
a) Taking α = id in Definition 2.1, we obtain the definition of a Leibniz algebra
[12]. Hence any Leibniz algebra L can be considered as a Hom-Leibniz
algebra with αL = id.
b) Any Leibniz algebra L can be considered as a Hom-Leibniz algebra with
αL = 0. In fact, any vector space L endowed with any bracket operation is
a Hom-Leibniz algebra with αL = 0.
c) Any Hom-Lie algebra [10] is a Hom-Leibniz algebra whose bracket operation
satisfies the skew-symmetry condition.
d) Any Hom-dialgebra [18] (D, ⊣, ⊢, αD) becomes a Hom-Leibniz algebra (D,
[−, −], αD) with the bracket given by [x, y] = x ⊣ y − y ⊢ x, for all x, y ∈ D.
e) Let (L, [−, −]) be a Leibniz algebra and αL : L → L a Leibniz algebra
endomorphism. Define [−, −]α : L ⊗ L → L by [x, y]α = [α(x), α(y)], for
all x, y ∈ L. Then (L, [−, −]α, αL) is a Hom-Leibniz algebra.
f ) Any Hom-vector space (V, αV ), (i.e. V is a vector space and αV : V → V
is a linear map) together with the trivial bracket [−, −] (i.e. [x, y] = 0 for
all x, y ∈ V ) is a Hom-Leibniz algebra, called abelian Hom-Leibniz algebra.
g) The two-dimensional C-vector space L with basis {a1, a2}, endowed with the
bracket operation [a2, a2] = a1 and zero elsewhere, and the endomorphism
αL given by the matrix (cid:18) 1 1
0 1 (cid:19) is a non-Hom-Lie Hom-Leibniz algebra.
In the sequel we shall use the shortened notation (L, αL) for (L, [−, −], αL).
Definition 2.3. A homomorphism of Hom-Leibniz algebras f : (L, αL) → (L′, αL′)
is a linear map f : L → L′ such that
for all x, y ∈ L.
f ([x, y]) = [f (x), f (y)],
f ◦ αL = αL′ ◦ f,
3
Hom-Leibniz algebras and their homomorphisms form a category, which we
denote by HomLb. Example 2.2 a), b) and c) say that there are full embedding
functors
I0, I1 : Lb −→ HomLb,
I0(L) = (L, 0), I1(L) = (L, id)
and
inc : HomLie −→ HomLb,
(L, αL) 7→ (L, αL),
where HomLie denotes the category of Hom-Lie algebras. Note that the restric-
tions of I0 and I1 to the category of Lie algebras are full embeddings
0, I ′
I ′
1 : Lie −→ HomLie,
0(L) = (L, 0), I ′
I ′
1(L) = (L, id).
Definition 2.4. A Hom-Leibniz subalgebra (H, αH) of a Hom-Leibniz algebra
(L, αL) consists of a vector subspace H of L, which is closed under the bracket,
together with the linear map αH : H → H being the restriction of αL on H. In
such a case we may write αL for αH.
A Hom-Leibniz subalgebra (H, αH) of (L, αL) is said to be a two-sided Hom-
ideal if [x, y], [y, x] ∈ H, for all x ∈ H, y ∈ L.
If (H, αH) is a two-sided Hom-ideal of (L, αL), then the quotient vector space
L/H together with the endomorphism αL : L/H → L/H induced by αL, naturally
inherits a structure of Hom-Leibniz algebra, and it is called the quotient Hom-
Leibniz algebra.
The commutator of two-sided Hom-ideals (H, αL) and (K, αL) of a Hom-
Leibniz algebra (L, αL), denoted by ([H, K], αL), is the Hom-Leibniz subalgebra
of (L, αL) spanned by the brackets [h, k] and [k, h] for all h ∈ H, k ∈ K.
The following lemma can be readily checked.
Lemma 2.5. Let (H, αH ) and (K, αK) be two-sided Hom-ideals of a Hom-Leibniz
algebra (L, αL). The following statements hold:
a) (H ∩ K, αL) and (H + K, αL) are two-sided Hom-ideals of (L, αL);
b) [H, K] ⊆ H ∩ K;
c) If αL is surjective, then ([H, K], αL) is a two-sided Hom-ideal of (L, αL);
d) ([H, K], αL) is a two-sided Hom-ideal of (H, αH) and (K, αK). In particu-
lar, ([L, L], αL) is a two-sided Hom-ideal of (L, αL);
e) (αL(L), αL) is a Hom-Leibniz subalgebra of (L, αL);
f ) If H, K ⊆ αL(L), then ([H, K], αL) is a two-sided Hom-ideal of (αL(L), αL).
Definition 2.6. Let (L, αL) be a Hom-Leibniz algebra. The subspace Z(L) =
{x ∈ L [x, y] = 0 = [y, x], for all y ∈ L} of L is said to be the center of (L, αL).
4
Note that if αL : L → L is a surjective homomorphism, then (Z(L), αL) is a
two-sided Hom-ideal of L.
Corollary 2.7. Any Hom-Leibniz algebra (L, αL) gives rise to a Hom-Lie algebra
(LLie, αL), which is obtained as the quotient of L by the relation [x, x] = 0, x ∈ L.
Here αL is induced by αL. This defines a functor (−)Lie : HomLb −→ HomLie.
Moreover, the canonical epimorphism (L, αL) ։ (LLie, αL) is universal among all
homomorphisms from (L, αL) to a Hom-Lie algebra, implying that the functor
(−)Lie is left adjoint to the inclusion functor inc : HomLie −→ HomLb. This ad-
junction is a natural extension of the well-known adjunction Lie ⊥
Lb
between
inc
the categories of Lie and Leibniz algebras, in the sense that the following inner
and outer diagrams
(−)Lie
Lie
I ′
i
HomLie
(−)Lie
⊥
inc
inc
⊤
(−)Lie
Lb
Ii
HomLb
are commutative for i = 0, 1.
2.2 Hom-Leibniz actions and semi-direct product
Definition 2.8. Let (L, αL) and (M, αM ) be Hom-Leibniz algebras. A Hom-
Leibniz action of (L, αL) on (M, αM ) is a couple of linear maps, L ⊗ M → M,
x ⊗ m 7→ xm and M ⊗ L → M, m ⊗ x 7→ mx, satisfying the following identities:
a) αM (m)[x,y] = (mx)αL(y) − (my)αL(x) ,
b) [x,y]αM (m) = (xm)αL(y) − αL(x) (my) ,
c) αL(x) (ym) = −αL(x) (my) ,
d) αL(x) [m, m′] = [xm, αM (m′)] − [xm′, αM (m)] ,
e) [m, m′] αL(x) = [mx, αM (m′)] + [αM (m) , m′ x] ,
f ) [αM (m) , xm′] = − [αM (m) , m′ x] ,
g) αM (xm) = αL(x)αM (m) ,
h) αM (mx) = αM (m)αL(x) ,
5
/
/
o
o
/
/
o
o
/
/
o
o
for all x, y ∈ L and m, m′ ∈ M.
The action is called trivial if xm = 0 = mx, for all x ∈ L, m ∈ M.
Example 2.9.
a) A Hom-representation of a Hom-Leibniz algebra (L, αL) is a Hom-vector
space (M, αM ) equipped with two linear operations, L ⊗ M → M, x ⊗ m 7→
xm and M ⊗ L → M, m ⊗ x 7→ mx, satisfying the axioms a), b), c), g),
h) of Definition 2.8. Therefore, representations over a Hom-Leibniz algebra
(L, αL) are abelian Leibniz algebras enriched with Hom-Leibniz actions of
(L, αL).
b) Any action of a Leibniz algebra L on another Leibniz algebra M (see e.g.
[13]) gives a Hom-Leibniz action of (L, idL) on (M, idM ).
c) Let (K, αK) be a Hom-Leibniz subalgebra of a Hom-Leibniz algebra (L, αL)
and (H, αH) be a two-sided Hom-ideal of (L, αL). There exists a Hom-
Leibniz action of (K, αK) on (H, αH) given by the bracket in (L, αL) .
d) Let 0 → (M, αM ) i→ (K, αK) π→ (L, αL) → 0 be a split short exact sequence
of Hom-Leibniz algebras, i. e. there exists a homomorphism of Hom-Leibniz
algebras s : (L, αL) → (K, αK) such that π ◦ s = idL. Then there is a
Hom-Leibniz action of (L, αL) on (M, αM ) defined in the standard way:
xm = i−1[s(x), i(m)] and mx = i−1[i(m), s(x)] for all x ∈ L, m ∈ M.
Definition 2.10. Let (M, αM ) and (L, αL) be Hom-Leibniz algebras together
with a Hom-Leibniz action of (L, αL) on (M, αM ). Their semi-direct product
(M ⋊ L, α⋊) is the Hom-Leibniz algebra with the underlying vector space M ⊕ L,
endomorphism α⋊ : M ⋊ L → M ⋊ L given by α⋊ (m, l) = (αM (m) , αL (l)) and
bracket
[(m1, l1) , (m2, l2)] = (cid:16)[m1, m2] + αL(l1)m2 + mαL(l2)
1
, [l1, l2](cid:17) .
Let (M, αM ) and (L, αL) be Hom-Leibniz algebras with a Hom-Leibniz action
of (L, αL) on (M, αM ). Then we have the following short exact sequence of Hom-
Leibniz algebras
0 → (M, αM ) i→ (M ⋊ L, α⋊) π→ (L, αL) → 0 ,
(2.2)
where i : M → M ⋊ L, i(m) = (m, 0), and π : M ⋊ L → L, π (m, x) = x.
Moreover, this sequence splits by the Hom-Leibniz homomorphism L → M ⋊ L,
x 7→ (0, x).
6
2.3 Homology of Hom-Leibniz algebras
In this subsection we recall from [3] the construction of homology vector spaces
of a Hom-Leibniz algebra with coefficients in a Hom-co-representation.
Definition 2.11. A Hom-co-representation of a Hom-Leibniz algebra (L, αL) is a
Hom-vector space (M, αM ) together with two linear maps L ⊗ M → M, x ⊗ m 7→
xm and M ⊗ L → M, m ⊗ x = mx, satisfying the following identities:
a) [x,y]αM (m) = αL(x)(ym) − αL(y)(xm),
b) αM (m)[x,y] = (ym)αL(x) − αL(y)(mx),
c) (mx)αL(y) = −αL(y)(mx),
d) αM (xm) = αL(x)αM (m),
e) αM (mx) = αM (m)αL(x),
for any x, y ∈ L and m ∈ M
Example 2.12.
a) Let M be a co-representation of a Leibniz algebra L [13], then (M, idM ) is
a Hom-co-representation of the Hom-Leibniz algebra (L, idL).
b) The underlying Hom-vector space of a Hom-Leibniz algebra (L, αL) has a
Hom-co-representation structure given by xy = −[y, x] and yx = [y, x],
x, y ∈ L.
Let (L, αL) be a Hom-Leibniz algebra and (M, αM ) be a Hom-co-representation
⋆ (L, M) of (L, αL) with coefficients in (M, αM ) is
of (L, αL). The homology HLα
defined to be the homology of the chain complex (CLα
⋆ (L, M), d⋆), where
CLα
n(L, M) := M ⊗ L⊗n, n ≥ 0
and dn : CLα
n(L, M) → CLα
n−1(L, M), n ≥ 1, is the linear map given by
dn(m ⊗ x1 ⊗ · · · ⊗ xn) = mx1 ⊗ αL(x2) ⊗ · · · ⊗ αL(xn)
n
+
Xi=2
+ X1≤i<j≤n
(−1)i xim ⊗ αL(x1) ⊗ · · · ⊗ \αL(xi) ⊗ · · · ⊗ αL(xn)
(−1)j+1αM (m) ⊗ αL(x1) ⊗ · · · ⊗ αL(xi−1) ⊗ [xi, xj] ⊗ αL(xi+1)
⊗ · · · ⊗ \αL(xj) ⊗ · · · ⊗ αL(xn),
where the notation \αL(xi) indicates that the variable αL(xi) is omitted. Hence
HLα
n(L, M) := Hn(CLα
⋆ (L, M), d⋆), n ≥ 0.
7
Direct calculations show that HLα
0 (L, M) = M/M L, where M L = {mx m ∈
M, x ∈ L}, and if (M, αM ) is a trivial Hom-co-representation of (L, αL), that is
mx = xm = 0, then HLα
1 (L, M) = (M ⊗ L) / (αM (M) ⊗ [L, L]). In particular, if
M = K then HLα
n(L, K)
and it is called homology with trivial coefficients.
1 (L, K) = L/[L, L]. Later on we write HLα
n(L) for HLα
3 Non-abelian Hom-Leibniz tensor product
Let (M, αM ) and (N, αN ) be Hom-Leibniz algebras acting on each other. We
denote by M ∗ N the vector space spanned by all symbols m ∗ n, n ∗ m and
subject to the following relations:
λ(m ∗ n) = (λm) ∗ n = m ∗ (λn),
λ(n ∗ m) = b(λn) ∗ m = n ∗ (λm),
(m + m′) ∗ n = m ∗ n + m′ ∗ n,
m ∗ (n + n′) = m ∗ n + m ∗ n′,
(n + n′) ∗ m = n ∗ m + n′ ∗ m,
n ∗ (m + m′) = n ∗ m + n ∗ m′,
αM (m) ∗ [n, n′] = mn ∗ αN (n′) − mn′ ∗ αN (n),
αN (n) ∗ [m, m′] = nm ∗ αM (m′) − nm′ ∗ αM (m),
[m, m′] ∗ αN (n) = mn ∗ αM (m′) − αM (m) ∗ nm′,
[n, n′] ∗ αM (m) = nm ∗ αN (n′) − αN (n) ∗ mn′,
αM (m) ∗ m′n = −αM (m) ∗ nm′,
αN (n) ∗ n′m = −αN (n) ∗ mn′,
mn ∗ m′n′ = mn ∗ m′n′
,
mn ∗ n′m′
= mn ∗ n′m′,
nm ∗ m′n′ = nm ∗ m′n′
,
nm ∗ n′m′
= nm ∗ n′m′,
(3.1)
for all λ ∈ K, m, m′ ∈ M, n, n′ ∈ N.
We claim that (M ∗ N, αM ∗N ) is a Hom-vector space, where αM ∗N is the linear
map induced by αM and αN , i.e.
αM ∗N (m ∗ n) = αM (m) ∗ αN (n) , αM ∗N (n ∗ m) = αN (n) ∗ αM (m) .
Indeed, it can be checked readily that α∗ preserves all the relations in (3.1).
To be able to introduce the non-abelian Hom-Leibniz tensor product, we need
to assume that the actions are compatibly in the following sense.
Definition 3.1. Let (M, αM ) and (N, αN ) be Hom-Leibniz algebras with Hom-
8
Leibniz actions on each other. The actions are said to be compatible if
(mn)m′ = [mn, m′],
(nm)m′ = [nm, m′],
m(m′
n) = [m, m′ n],
m(nm′
) = [m,n m′],
(nm)n′ = b[nm, n′],
(mn)n′ = [mn, n′],
n(n′
m) = [n, n′ m],
n(mn′
) = [n,m n′],
(3.2)
for all m, m′ ∈ M and n, n′ ∈ N.
Example 3.2. If (H, αH) and (H ′, αH ′) both are Hom-ideals of a Hom-Leibniz
algebra (L, αL), then the Hom-Leibniz actions of (H, αH) and (H ′, αH ′) on each
other, considered in Example 2.9 c), are compatible.
Now we have the following property:
Proposition 3.3. Let (M, αM ) and (N, αN ) be Hom-Leibniz algebras acting com-
patibly on each other, then the Hom-vector space (M ∗ N, αM ∗N ) endowed with
the following bracket operation
[m ∗ n, m′ ∗ n′] = mn ∗m′ n′,
[m ∗ n, n′ ∗ m′] = mn ∗ n′m′
,
[n ∗ m, m′ ∗ n′] = nm ∗m′ n′,
[n ∗ m, n′ ∗ m′] = nm ∗ n′m′
,
(3.3)
is a Hom-Leibniz algebra.
Proof. Routine calculations show that the bracket given by (3.3) is compatible
with the defining relations in (3.1) of M ∗ N and can be extended from generators
to any elements. The verification of the Hom-Leibniz identity (2.1) is straight-
forward by using compatibility conditions in (3.2). Finally, it follows directly by
definition of αM ∗N that it preserves the bracket given by (3.3).
Definition 3.4. The above Hom-Leibniz algebra structure on (M ∗ N, αM ∗N ) is
called the non-abelian Hom-Leibniz tensor product of the Hom-Leibniz algebras
(M, αM ) and (N, αN ).
Remark 3.5. If αM = idM and αN = idN , then M ∗ N coincides with the non-
abelian tensor product of Leibniz algebras introduced in [9].
Remark 3.6. Let (M, αM ) and (N, αN ) be Hom-Lie algebras. One can readily
check that the following assertions hold:
a) Any Hom-Lie action of (M, αM ) on (N, αN ), M ⊗ N → N, m ⊗ n 7→ mn
(see [4, Definition 1.7] for the definition), gives a Hom-Leibniz action of
(M, αM ) on (N, αN ) by letting nm = −mn for all m ∈ M and n ∈ N.
9
b) For compatible Hom-Lie actions (see [4, Definition 2.1]) of (M, αM ) and
(N, αN ) on each other, the induced Hom-Leibniz actions are also compatible.
c) If (M, αM ) and (N, αN ) act compatibly on each other, then there is an
epimorphism of Hom-Leibniz algebras (M ∗ N, αM ∗N ) ։ (M ⋆ N, αM ⋆N )
defined on generators by m ∗ n 7→ m ⋆ n and n ∗ m 7→ −m ⋆ n, where ⋆
denotes the non-abelian Hom-Lie tensor product (see [4, Definition 2.4]).
Sometimes the non-abelian Hom-Leibniz tensor product can be described as
the tensor product of vector spaces. In particular, we have the following:
Proposition 3.7. If the Hom-Leibniz algebras (M, αM ) and (N, αN ) act trivially
on each other and both αM , αN are epimorphisms, then there is an isomorphism
of abelian Hom-Leibniz algebras
(M ∗ N, αM ∗N ) ∼= (cid:0)(M ab ⊗ N ab) ⊕ (N ab ⊗ M ab), α⊕(cid:1),
where M ab = M/[M, M], N ab = N/[N, N] and α⊕ denotes the linear self-map of
(M ab ⊗ N ab) ⊕ (N ab ⊗ M ab) induced by αM and αN .
Proof. Since the actions are trivial, then relations (3.3) enables us to see that
(M ∗ N, αM ∗N ) is an abelian Hom-Leibniz algebra.
Since αM and αN are epimorphisms, the defining relations (3.1) of the non-
abelian tensor product say precisely that the vector space M ∗ N is the quotient
of (M ⊗ N)⊕ (N ⊗ M) by the relations
m ∗ [n, n′] = [m, m′] ∗ n = [n, n′] ∗ m = n ∗ [m, m′] = 0
for all m, m′ ∈ M, n, n′ ∈ N. The later is isomorphic to (M ab⊗N ab)⊕(N ab⊗M ab)
and this isomorphism commutes with the endomorphisms α⊕ and αM ∗N .
The non-abelian Hom-Leibniz tensor product is functorial in the following
if f : (M, αM ) → (M ′, αM ′) and g : (N, αN ) → (N ′, αN ′) are homomor-
sense:
phisms of Hom-Leibniz algebras together with compatible actions of (M, αM )
(resp. (M ′, αM ′)) and (N, αN ) (resp. (N ′, αN ′)) on each other such that f , g
preserve these actions, that is
f (nm) = g(n)f (m),
g(mn) = f (m)g(n),
f (mn) = f (m)g(n),
g(nm) = g(n)f (m),
for all m ∈ M, n ∈ N, then we have a homomorphism of Hom-Leibniz algebras
f ∗ g : (M ∗ N, αM ∗N ) → (M ′ ∗ N ′, αM ′∗N ′)
defined by (f ∗ g)(m ∗ n) = f (m) ∗ g(n), (f ∗ g)(n ∗ m) = g(n) ∗ f (m).
10
g
→ (M3, αM3) → 0 be a
Proposition 3.8. Let 0 → (M1, αM1)
short exact sequence of Hom-Leibniz algebras. Let (N, αN ) be a Hom-Leibniz
algebra together with compatible Hom-Leibniz actions of (N, αN ) and (Mi, αMi)
(i = 1, 2, 3) on each other and f , g preserve these actions. Then there is an exact
sequence of Hom-Leibniz algebras
f
→ (M2, αM2)
(M1 ∗ N, αM1∗N )
f ∗idN−→ (M2 ∗ N, αM2∗N )
g∗idN−→ (M3 ∗ N, αM3∗N ) −→ 0.
Proof. Clearly g ∗ idN is an epimorphism and Im (f ∗ idN ) ⊆ Ker (g ∗ idN ). Since
Im (f ∗ idN ) is generated by all elements of the form f (m1) ∗ n, n ∗ f (m1), with
m1 ∈ M1, n ∈ N, it is a two-sided Hom-ideal in (M2 ∗ N, αM2∗N ) because of the
following equalities:
1 ) ∗ m2n′ ∈ Im (f ∗ idN ) ,
[f (m1) ∗ n, m2 ∗ n′] = f (m1)n ∗ m2n′ = f (m n
[f (m1) ∗ n, n′ ∗ m2] = f (m1)n ∗ n′ m2 = f (m n
1 ) ∗ n′ m2 ∈ Im (f ∗ idN ) ,
[n ∗ f (m1), m2 ∗ n′] = nf (m1) ∗ m2n′ = f (nm1) ∗ m2n′ ∈ Im (f ∗ idN ) ,
[n ∗ f (m1), n′ ∗ m2] = nf (m1) ∗ n′ m2 = f (nm1) ∗ n′ m2 ∈ Im (f ∗ idN ) ,
[m2 ∗ n′, f (m1) ∗ n] = m n′
∗ f (m1n) ∈ Im (f ∗ idN ) ,
[m2 ∗ n′, n ∗ f (m1)] = m n′
m1(cid:1) ∈ Im (f ∗ idN ) ,
2 ∗ f (cid:0)n
[n′ ∗ m2, f (m1) ∗ n] = n′m2 ∗f (m1) n = n′m2 ∗ f (m1n) ∈ Im (f ∗ idN ) ,
[n′ ∗ m2, n ∗ f (m1)] = n′m2 ∗ nf (m1) = n′m2 ∗ f (cid:0)n
m1(cid:1) ∈ Im (f ∗ idN ) ,
∗f (m1) n = m n′
2
∗ nf (m1) = mn′
αM2∗N (f (m1) ∗ n) = f (αM2 (m1)) ∗ αN (n) ∈ Im (f ∗ idN ) ,
αM2∗N (n ∗ f (m1)) = f (αN (n) ∗ αM2 (m1)) ∈ Im (f ∗ idN ) ,
2
2
for any m1 ∈ M1, m2 ∈ M2, n, n′ ∈ N. Thus, g ∗ idN induces a homomorphism
of Hom-Leibniz algebras
((M2 ∗ N) /Im (f ∗ idN ) , αM2∗N )−→(M3 ∗ N, αM3∗N ),
given on generators by m2 ∗ n 7→ g(m2) ∗ n and n ∗ m2 7→ n ∗ g(m2), which is an
isomorphism with the inverse map
(M3 ∗ N, αM3∗N ) −→ ((M2 ∗ N) /Im (f ∗ idN ) , αM2∗N )
defined by m3 ∗ n 7→ m2 ∗ n and n ∗ m3 = n ∗ m2, where m2 ∈ M2 such that
g(m2) = m3. Then the required exactness follows.
Proposition 3.9. If (M, αM ) is a two-sided Hom-ideal of a Hom-Leibniz algebra
(L, αL), then there is an exact sequence of Hom-Leibniz algebras
(cid:0)(M ∗ L) ⋊ (L ∗ M), α⋊(cid:1) σ−→ (L ∗ L, αL∗L)
τ−→ (L/M ∗ L/M, αL/M ∗L/M ) −→ 0.
where the Hom-Leibniz action of L ∗ M on M ∗ L is naturally given by the bracket
in L ∗ M.
11
Proof. First we note that τ is the functorial homomorphism induced by projec-
tion (L, αL) ։ (cid:0)L/M, αL/M(cid:1) and clearly it is an epimorphism.
Let σ′ : (M ∗ L, αM ∗L) → (L ∗ L, αL∗L), σ′′ : (L ∗ M, αL∗M ) → (L ∗ L, αL∗L)
be the functorial homomorphisms induced by the inclusion (M, αM ) ֒→ (L, αL)
and the identity map (L, αL) → (L, αL). Then σ : ((M ∗ L) ⋊ (L ∗ M) , α⋊) →
(L ∗ L, αL∗L), is defined by σ (x, y) = σ′(x) + αL∗L ◦ σ′′(y) for all x ∈ M ∗ L and
y ∈ L ∗ M, i. e.
σ((m1 ∗ l1), (l2 ∗ m2)) = m1 ∗ l1 + αL(l2) ∗ αM (m2),
σ((l1 ∗ m1), (l2 ∗ m2)) = l1 ∗ m1 + αL(l2) ∗ αM (m2),
σ((m1 ∗ l1), (m2 ∗ l2)) = m1 ∗ l1 + αM (m2) ∗ αL(l2),
σ((l1 ∗ m1), (m2 ∗ l2)) = l1 ∗ m1 + αM (m2) ∗ αL(l2),
for all m1, m2 ∈ M and l1, l2 ∈ L.
The exactness can be checked in the same way as in the proof of Proposition
3.8 and we omit it.
Proposition 3.10. Let (M, αM ) and (N, αN ) be Hom-Leibniz algebras with com-
patible actions on each other.
a) There are homomorphisms of Hom-Leibniz algebras
ψ1 : (M ∗ N, αM ∗N ) → (M, αM ), ψ1(m ∗ n) = mn, ψ1(n ∗ m) = nm,
ψ2 : (M ∗ N, αM ∗N ) → (N, αN ), ψ2(m ∗ n) = mn, ψ2(n ∗ m) = nm.
b) There is a Hom-Leibniz action of (M, αM ) (resp. (N, αN ) ) on the non-
abelian tensor product (M ∗ N, αM ∗N ) given, for all m, m′ ∈ M, n, n′ ∈ N,
by
m′(m ∗ n) = [m′, m] ∗ αN (n) −m′ n ∗ αM (m),
m′(n ∗ m) = m′n ∗ αM (m) − [m′, m] ∗ αN (n),
(m ∗ n)m′ = [m, m′] ∗ αN (n) + αM (m) ∗ nm′,
(n ∗ m)m′ = nm′ ∗ αM (m) + αN (n) ∗ [m, m′],
(cid:0) resp. n′(m ∗ n) = n′m ∗ αN (n) − [n′, n] ∗ αM (m),
n′(n ∗ m) = [n′, n] ∗ αM (m) −n m ∗ αN (n′),
(m ∗ n)n′ = mn′ ∗ αN (n) + αM (m) ∗ [n, n′] ,
(n ∗ m)n′ = [n, n′] ∗ αM (m) + αN (n) ∗ mn′ (cid:1).
d) Ker(ψ1) and Ker(ψ2) both are contained in the center of (M ∗ N, αM ∗N ).
e) The induced Hom-Leibniz action of Im(ψ1) (resp. Im(ψ2)) on Ker(ψ1) (resp.
Ker(ψ2)) is trivial.
f ) ψ1 and ψ2 satisfy the following properties for all m, m′ ∈ M, n, n′ ∈ N:
12
i) ψ1(m′(m ∗ n)) = [αM (m′), ψ1(m ∗ n)],
ii) ψ1((m ∗ n)m′) = [ψ1(m ∗ n), αM (m′)],
iii) ψ1(m′(n ∗ m)) = [αM (m′), ψ1(n ∗ m)],
iv) ψ1((n ∗ m)m′) = [ψ1(n ∗ m), αM (m′)],
v) ψ2(n′(m ∗ n)) = [αN (n′), ψ2(m ∗ n)],
vi) ψ2((m ∗ n)n′) = [ψ2(m ∗ n), αN (n′)],
vii) ψ2(n′(n ∗ m)) = [αN (n′), ψ2(n ∗ m)],
viii) ψ2((n ∗ m)n′) = [ψ2(n ∗ m), αN (n′)],
ix) ψ1(m∗n)(m′ ∗ n′) = [αM ∗N (m ∗ n), m′ ∗ n′] = ψ2(m∗n)(m′ ∗ n′),
x) ψ1(m∗n)(n′ ∗ m′) = [αM ∗N (m ∗ n), n′ ∗ m′] = ψ2(m∗n)(n′ ∗ m′),
xi) ψ1(n∗m)(m′ ∗ n′) = [αM ∗N (n ∗ m), m′ ∗ n′] = ψ2(n∗m)(m′ ∗ n′),
xii) ψ1(n∗m)(n′ ∗ m′) = [αM ∗N (n ∗ m), n′ ∗ m′] = ψ2(n∗m)(n′ ∗ m′),
xiii) (m′ ∗ n′)ψ1(m∗n) = [m′ ∗ n′, αM ∗N (m ∗ n)] = (m′ ∗ n′)ψ2(m∗n),
xiv) (n′ ∗ m′)ψ1(m∗n) = [n′ ∗ m′, αM ∗N (m ∗ n)] = (n′ ∗ m′)ψ2(m∗n),
xv) (m′ ∗ n′)ψ1(n∗m) = [m′ ∗ n′, αM ∗N (n ∗ m)] = (m′ ∗ n′)ψ2(n∗m),
xvi) (n′ ∗ m′)ψ1(n∗m) = [n′ ∗ m′, αM ∗N (n ∗ m)] = (n′ ∗ m′)ψ2(n∗m).
Proof. The proof requires routine combinations of equations in Definitions 2.8
and 3.1 with the defining relations (3.1) and (3.3) of the non-abelian Hom-Leibniz
tensor product.
Remark 3.11.
a) If αM = idM and αN = idN then the statement f ) of Lemma 3.10 says that
both ψ1 and ψ2 are crossed modules of Leibniz algebras (see [9]).
b) If M = N and the action of M on itself is given by the bracket in M, then
ψ1 = ψ2 and they are defined on generators by m ∗ m′ 7→ [m, m′]. In such
a case we write ψM for ψ1.
4 Application in universal (α-)central exten-
sions of Hom-Leibniz algebras
In this section we complement by new results the investigation of universal central
extensions of Hom-Leibniz algebras done in [3]. We also describe universal (α)-
central extensions via non-abelian Hom-Leibniz tensor product.
13
π
Definition 4.1. An epimorphism of Hom-Leibniz algebras (K, αK)
։ (L, αL),
with Ker(π) = (M, αM ), is called a central (resp. α-central) extension of (L, αL)
if [M, K] = 0 = [K, M], i.e. M ⊆ Z(K) (resp. [αM (M), K] = 0 = [K, αM (M)],
i.e. αM (M) ⊆ Z(K)).
Such a central extension is called universal central (resp. α-central) exten-
π
sion if, for every central (resp. α-central) extension (K ′, αK ′)
։ (L, αL) of
(L, αL) there exists one and only one homomorphism of Hom-Leibniz algebras
h : (K, αK) → (K ′, αK ′) such that π′ ◦ h = π.
Remark 4.2. Obviously every central extension is an α-central extension and
these notions coincide when αM = idM . On the other hand, every universal α-
central extension is a universal central extension and these notions coincide when
αM = idM . Let us also observe that if a universal (α-)central extension exists then
it is unique up to isomorphism.
The category HomLb is an example of a semi-abelian category which does not
satisfy universal central extension condition in the sense of [5], that is, the com-
position of central extensions of Hom-Leibniz algebras is not central in general,
but it is α-central extension (see Theorem 4.3 (a) below). This fact does not
allow complete generalization of classical results to Hom-Leibniz algebras and
the well-known properties of universal central extensions are divided between
universal central and universal α-central extensions of Hom-Leibniz algebras. In
particular, the assertions in Theorem 4.3 below are proved in [3].
To state the following theorem we need to recall that a Hom-Lie algebra
(L, αL) is said to be perfect if L = [L, L].
Theorem 4.3.
a) Let (K, αK)
π
։ (L, αL) and (F, αF )
ρ
։ (K, αK) be central extensions of
Hom-Leibniz algebras and (K, αK) be a perfect Hom-Leibniz algebra. Then
the composition extension (F, αF )
π◦ρ
։ (L, αL) is an α-central extension.
b) Let (K, αK)
π
։ (L, αL) and (K ′, αK ′)
π′
։ (L, αL) be two central extensions
of a Hom-Leibniz algebra (L, αL). If (K, αK) is perfect, then there exists at
most one homomorphism of Hom-Leibniz algebras f : (K, αK) → (K ′, αK ′)
such that π′ ◦ f = π.
c) Let (K, αK)
π′
π
։ (L, αL) be a central extension and (K ′, αK ′)
։ (L, αL)
be an α-central extension of a Hom-Leibniz algebra (L, αL).
If (K, αK)
is α-perfect, then there exists at most one homomorphism of Hom-Leibniz
algebras f : (K, αK) → (K ′, αK ′) such that π′ ◦ f = π.
d) If (K, αK)
π
։ (L, αL) is a universal α-central extension, then (K, αK) is a
perfect Hom-Leibniz algebra and every central extension of (K, αK) splits.
14
e) If (K, αK) is a perfect Hom-Leibniz algebra and every central extension of
π
։ (L, αL) is a universal
(K, αK) splits, then any central extension (K, αK)
central extension.
f ) A Hom-Leibniz algebra (L, αL) admits a universal central extension if and
only if (L, αL) is perfect. Furthermore, the kernel of the universal central
extension is canonically isomorphic to the second homology HLα
2 (L).
g) An α-perfect Hom-Leibniz algebra admits a universal α-central extension.
h) If (K, αK)
HLα
2 (K) = 0.
π
։ (L, αL) is a universal α-central extension, then HLα
1 (K) =
i) If HLα
1 (K) = HLα
2 (K) = 0, then any central extension (K, αK)
π
։ (L, αL)
is a universal central extension.
Given a Hom-Leibniz algebra (L, αL) we have the epimorphism of Hom-
Leibniz algebras
ψL : (L ∗ L, αL∗L) ։ ([L, L], αL), ψL(l ∗ l′) = [l, l′],
(cf. Remark 3.11 b)) which is a central extension of ([L, L], αL) because of the
equalities (3.3). Moreover, we have
Theorem 4.4. If (L, αL) is a perfect Hom-Leibniz algebra, then the central ex-
tension (L ∗ L, αL∗L)
ψL
։ (L, αL) is the universal central extension of (L, αL).
φ
Proof. Let (C, αC)
։ (L, αL) be a central extension of (L, αL). Since Ker (φ) ⊆
Z (C), we get a well-defined homomorphism of Hom-Leibniz algebras f : (L ∗ L,
αL∗L) → (C, αC) given on generators by f (l ∗ l′) = [cl, cl′], where cl and cl′ are
any elements in φ−1(l) and φ−1(l′), respectively. Obviously φ ◦ f = ψL and
f ◦ αL∗L = αC ◦ f , having in mind that αC(cl) ∈ φ−1(αL(l)) for all l ∈ L. Since
L is perfect, then by equalities (3.3), so is L ∗ L. Hence the homomorphism f is
unique by Theorem 4.3 b).
Remark 4.5. If the Hom-Leibniz algebra (L, αL) is perfect, by Theorem 4.3 e)
we have HLα
ψL→ L).
2 (L) ≈ Ker(L ∗ L
Theorem 4.6. Let (M, αM ) be a two-sided Hom-ideal of a perfect Hom-Leibniz
algebra (L, αL). Then there is an exact sequence of vector spaces
Ker(L ∗ M
ψ2−→ L) → HLα
2 (L) → HLα
2 (L/M) → M/[L, M] → 0.
15
Proof. By Proposition 3.9 there is a commutative diagram of Hom-Leibniz alge-
bras with exact rows
(cid:0)(M ∗ L) ⋊ (L ∗ M ), α⋊(cid:1)
ψ
0
/ (M, αM )
σ /
(L ∗ L, αL∗L)
τ
(L/M ∗ L/M, αL/M ∗L/M )
ψL
/ (L, αL)
ψL/M
π
/ (L/M, αL/M )
0
/ 0
where
and
ψ((m1 ∗ l1), (l2 ∗ m2)) = [m1, l1] + [αL(l2), αM (m2)],
ψ((l1 ∗ m1), (l2 ∗ m2)) = [l1, m1] + [αL(l2), αM (m2)],
ψ((m1 ∗ l1), (m2 ∗ l2)) = [m1, l1] + [αM (m2), αL(l2)],
ψ((l1 ∗ m1), (m2 ∗ l2)) = [l1, m1] + [αM (m2), αL(l2)],
ψL(l1 ∗ l2) = [l1, l2],
ψL/M (l1 ∗ l2) = [l1, l2],
for all m1, m2 ∈ M, l1, l2 ∈ L. Then, forgetting the Hom-Leibniz algebra struc-
tures, by using the Snake Lemma for the same diagram of vector spaces, the
assertion follows from Remark 4.5 and the fact that there is a surjective map
Ker(ψ) → Ker(ψ2).
Now suppose (L, αL) is a perfect Hom-Lie algebra. By [4, Theorem 3.4 and
Remark 3.5] we know that its universal central extension in the category Hom-Lie
is
(L ⋆ L, αL⋆L)
uL
։ (L, αL),
(4.1)
and Ker(uL) ≈ H α
2 (L), where ⋆ denotes the non-abelian Hom-Lie tensor product
and H α
2 (L) is the second homology with trivial coefficients of the Hom-Lie algebra
(L, αL). Furthermore, since any perfect Hom-Lie algebra is a perfect Hom-Leibniz
algebra as well, by Theorem 4.3 f ), (L, αL) admits universal central extension in
the category HomLb, which is described via the non-abelian Hom-Leibniz tensor
product in Theorem 4.4 and Remark 4.5. Then, by the universal property of (L ∗
ψL
L, αL∗L)
։ (L, αL) and considering (4.1) as a central extension of Hom-Leibniz
algebras, we get a homomorphism of Hom-Leibniz algebras ξ : (L∗L, αL∗L) → (L⋆
L, αL⋆L), ξ(l ∗ l′) = l ⋆ l′, such that ψL = uL ◦ ξ. Note that ξ is the epimorphism
described in Remark 3.6 c). Now the proof of the following proposition is obvious.
Proposition 4.7. Let (L, αL) be a perfect Hom-Lie algebra, then the non-abelian
Hom-Lie and Hom-Leibniz tensor squares are isomorphic, (L ⋆ L, αL⋆L) ≈ (L ∗ L,
αL∗L), if and only if the second Hom-Lie and Hom-Leibniz homologies with trivial
coefficients are isomorphic, H α
2 (L) ≈ HLα
2 (L).
Now we deal with the universal α-central extension of an α-perfect Hom-
Leibniz algebra. We need the following notion.
16
/
/
/
/
/
/
/
/
/
Definition 4.8. [3] A Hom-Leibniz algebra (L, αL) is said to be α-perfect if
Remark 4.9.
L = [αL(L), αL(L)]
a) When αL = id the notions of perfect and α-perfect Hom-Leibniz algebras
are the same.
b) Any α-perfect Hom-Lie algebra is an α-perfect Hom-Leibniz algebra.
c) Any α-perfect Hom-Leibniz algebra is perfect. Nevertheless the converse is
not true in general. An example of this is given in [4, Remark 3.8 b)].
d) If (L, αL) is α-perfect, then L = αL(L), i.e. αL is surjective.
It is shown in [3, Theorem 5.5 (b)] that an α-perfect Hom-Leibniz algebra
admits a universal α-central extension. Now we give its description via the non-
abelian Hom-Leibniz tensor product.
Theorem 4.10. Let (L, αL) be an α-perfect Hom-Leibniz algebra. Then the
epimorphism ψ : (cid:0)αL(L) ∗ αL(L), ααL(L)∗αL(L)(cid:1) ։ (L, αL), ψ (αL (l) ∗ αL (l′)) =
[αL (l) , αL (l′)], is its universal α-central extension.
Proof. Obviously ψ is a central extension. For every α-central extension (C, αC)
φ
։
(L, αL) there is a homomorphism f : (cid:0)αL(L) ∗ αL(L), ααL(L)∗αL(L)(cid:1) → (C, αC)
given on generators by f (αL (l) ∗ αL (l′)) = [αC (cl) , αC (cl′)], where cl and cl′
are any elements in φ−1(l) and φ−1(l′), respectively.
f is well-defined since
αC (Ker (φ)) ⊆ Z (C). Obviously φ ◦ f = ψ and f ◦ ααL(L)∗αL(L) = αC ◦ f ,
having in mind that αC(cl) ∈ φ−1(αL(l)) and α2
L(l)) for all l ∈ L.
Since L is α-perfect, then by equality (3.3), so is αL(L) ∗ αL(L). Hence the
homomorphism f is unique by Theorem 4.3 c).
C(cl) ∈ φ−1(α2
Lb
An alternative construction of the universal α-central extension (uce
α (L), α)
of an α-perfect Hom-Leibniz algebra (L, αL) is given in [3, Theorem 5.5 (b)]. Let
us recall that uce
α (L) is the quotient of αL(L) ⊗ αL(L) by the vector subspace
spanned by all elements −[x1, x2] ⊗ αL(x3) + [x1, x3] ⊗ αL(x2) + αL(x1) ⊗ [x2, x3],
where x1, x2, x3 ∈ L, the bracket of uce
α (L) is given on generators by
Lb
Lb
[αL(x1) ⊗ αL(x2), αL(y1) ⊗ αL(y2)] = [αL(x1), αL(x2)] ⊗ [αL(y1), αL(y2)],
x1, x2, y1, y2 ∈ L, and α : uce
Lb
α (L) → uce
α (L) is induced by αL.
Lb
Since the universal α-central extension of an α-perfect Hom-Leibniz algebra
(L, αL) is unique up to isomorphisms, then there is an isomorphism of Hom-
Leibniz algebras
(cid:0)α(L) ∗ α(L), αα(L)∗α(L)(cid:1) ≈ (uce
Lb
α (L), α).
17
uct (cid:0)α(L) ⋆ α(L), αα(L)⋆α(L)(cid:1) in [4, Theorem 3.11].
Now suppose that (L, αL) is an α-perfect Hom-Lie algebra. By [3, Theo-
rem 5.5 (a)] it admits a universal α-central extension in the category HomLie of
Hom-Lie algebras, which is described as the non-abelian Hom-Lie tensor prod-
(L, αL) admits a universal
α-central extension in the category HomLb described in Theorem 4.10 via non-
abelian Hom-Leibniz tensor product. Then [3, Proposition 5.6] provides the fol-
lowing relationship between the non-abelian Hom-Lie and Hom-Leibniz tensor
products:
(cid:0)α(L) ⋆ α(L), αα(L)⋆α(L)(cid:1) ≈ (cid:0)(α(L) ∗ α(L))Lie , αα(L)∗α(L)(cid:1) .
versal α-central extension in the category HomLb of Hom-Leibniz algebras is
Moreover, (cid:0)α(L) ⋆ α(L), αα(L)⋆α(L)(cid:1) is an α-perfect Hom-Lie algebra and its uni-
isomorphic to (cid:0)α(L) ∗ α(L), αα(L)∗α(L)(cid:1).
5 Application in Hochschild homology of Hom-
associative algebras
Definition 5.1. A (multiplicative) Hom-associative algebra (A, αA) is a vector
space A together with linear maps αA : A → A and A ⊗ A → A, a ⊗ b 7→ ab, such
that
αA(a)(bc) = (ab)αA(c),
αA(ab) = αA(a)αA(b)
for all a, b, c ∈ A.
Any Hom-associative algebra (A, αA) can be viewed as a Hom-Leibniz (in
fact Hom-Lie) algebra with the bracket defined by [a, b] := ab − ba, a, b ∈ A (see
Example 5.2 in [19]).
Given a Hom-associative algebra (A, αA), we denote Lα(A) := (A⊗A)/Im(b3),
where b3 : A⊗A⊗A → A⊗A, b3 (a ⊗ b ⊗ c) = ab⊗αA(c)−αA(a)⊗bc+ca⊗αA(b),
is the boundary map for the Hochschild complex of the Hom-associative algebra
(A, αA) constructed in [19]. Then we have the following short exact sequence of
vector spaces
0 −→ HH α
1 (A)
i−→ Lα(A)
φ
−→ [A, A] −→ 0 ,
(5.1)
where HH α
1 (A) denotes the first Hochschild homology of (A, αA) [19], [A, A] is
the subspace of A spanned by the elements ab − ba and φ(a ⊠ b) = ab − ba,
a, b ∈ A. Here a ⊠ b stands for the equivalence class of a ⊗ b.
Suppose αA : Lα(A) → Lα(A) is the linear map induced by αA, i.e. αA(a ⊠ b) =
αA(a) ⊠ αA(b). Then there is a Hom-Leibniz algebra structure on (Lα(A), αA)
given by the bracket
[a ⊠ b, a′ ⊠ b′] := (ab − ba) ⊠ (a′b′ − b′a′) = [a, b] ⊠ [a′, b′],
18
for all a, b, a′, b′ ∈ A. Indeed, it is immediate that
[a, b] ⊠ αA(c) − αA(a) ⊠ [b, c] + [c, a] ⊠ αA(b) = 0,
(5.2)
then the Hom-Leibniz identity (2.1) easily follows.
Remark 5.2. (Lα(A), αA) is the quotient of the non-abelian Hom-Leibniz tensor
product (A ∗ A, αA∗A) by the two-sided Hom-ideal generated by the elements of
the form ab ∗ αA(c) − αA(a) ∗ bc + ca ∗ αA(b), for all a, b, c ∈ A.
Definition 5.3. [4] We say that a Hom-associative algebra (A, αA) satisfies the
α-identity condition if
[A, Im(αA − idA)] = 0 ,
(5.3)
where [A, Im(αA − idA)] = 0 is the subspace of A spanned by all elements ab − ba,
with a ∈ A and b ∈ Im(αA − idA).
Examples of Hom-associative algebras satisfying the α-identity condition can
be found in [4].
Proposition 5.4. Let (A, αA) be a Hom-associative algebra.
a) There is a Hom-Leibniz action of (A, αA) on (Lα(A), αA) given, for all
a′ ∈ A, a ⊠ b ∈ Lα(A), by
a′
(a ⊠ b) = [a′, a] ⊠ αA (b) − [a′, b] ⊠ αA (a) ,
(a ⊠ b)a′
= [a, a′] ⊠ αA (b) + αA (a) ⊠ [b, a′] ,
and a Hom-Leibniz action of (Lα(A), αA) on (A, αA) given by
(a⊠b)a′ = [[a, b] , a′] ,
a′(a⊠b) = [a′, [a, b]] .
Moreover, these actions are compatible if (A, αA) satisfies the α-identity
condition (5.3).
b) There is a short exact sequence of Hom-Leibniz algebras
0 → (HH α
1 (A), αA) i→ (Lα(A), αA)
φ
→ ([A, A], αA) → 0
where (HH α
1 (A), αA) is considered as an abelian Hom-Leibniz algebra, αA
(resp. αA) is the restriction of αA (resp. αA) and φ(a⊠b) = [a, b] = ab−ba.
c) The induced Hom-Leibniz action of (A, αA) on (HH α
1 (A), αA) is trivial.
Moreover, i always preserves the actions and, if (A, αA) satisfies the α-
identity condition (5.3), then φ also preserves the actions.
19
Proof. a) By using formula (5.2) and Remark 5.2, one can readily check that the
actions are well-defined Hom-Leibniz actions.
It is also easy to see that these
actions are compatible under condition (5.3). For example, we have
(a′
(a⊠b))a′′ = [a′,a]⊠αA(b)a′′ − [a′,b]⊠αA(a)a′′ = (cid:2)[[a′, a], αA(b)] − [[a′, b], αA((a))], a′′(cid:3)
(2.1)
= (cid:2)[αA(a′), [a, b]], a′′(cid:3) (5.3)
= (cid:2)[a′, [a, b]], a′′(cid:3) = [a′ a⊠b, a′′].
b) It is an immediate consequence of (5.1) and the definitions above.
c) Since a′ (a ⊠ b) = αA(a′) ⊠ [a, b] = 0 when a ⊠ b ∈ Ker(φ), we deduce that
the action of (A, αA) on (HH α
1 (A), αA) is trivial and, by this reason, i preserves
the actions of (A, αA). Now, if (A, αA) satisfies the α-identity condition (5.3),
then we have
(a ⊠ b)(cid:1) = (cid:2)αA(a′), [a, b](cid:3) (5.3)
φ(cid:0)a′
φ(cid:0)(a ⊠ b)a′(cid:1) = (cid:2)[a, b], αA(a′)(cid:3) (5.3)
= (cid:2)a′, [a, b](cid:3) = a′
= (cid:2)[a, b], a′(cid:3) = φ(a ⊠ b)a′
φ(a ⊠ b),
,
for all a′, a, b ∈ A, implying that φ also preserves the actions.
Remark 5.5. The statements in Proposition 5.4 when αA = idA recover the
corresponding results established in [9, Section 7] for Leibniz algebras.
In the following definition we introduce the Hom-version of the first Milnor-
type Hochschield homology of associative algebras (see e.g. [9]).
Definition 5.6. Let (A, αA) be a Hom-associative algebra. The first Milnor-type
Hochschield homology HH M
1 (A, αA) is the quotient of the vector space A ⊗ A by
the relations
ab ⊗ αA(c) − αA(a) ⊗ bc + ca ⊗ αA(b) = 0,
αA(a) ⊗ bc − αA(a) ⊗ cb = 0,
ab ⊗ αA(c) − ba ⊗ αA(c) = 0,
for any a, b, c ∈ A.
Theorem 5.7. Let (A, αA) be a Hom-associative (non-commutative) algebra sat-
isfying the α-identity condition (5.3). Then there is an exact sequence of vector
spaces
A ∗ HH α
1 (A) → Ker(A ∗ Lα(A) → Lα(A)) → Ker(A ∗ [A, A] → [A, A])
1 (A, αA) → [A, A]/[A, [A, A]] → 0.
1 (A) → HH M
→ HH α
20
Proof. By using Proposition 5.4 and Proposition 3.8 we have the commutative
diagram of Hom-Leibniz algebras (written without α endomorphisms)
A ∗ HH α
1 (A)
A ∗ Lα(A)
A ∗ [A, A]
0
ψ2
ψ2
ψ3
0
/ HH α
1 (A)
/ Lα(A)
φ
/ [A, A]
/ 0,
where ψ homomorphisms are defined as in Proposition 3.10. ψ2(a ∗ (x ⊗ y)) =
a(x⊗y), ψ2((x⊗y)∗a) = (x⊗y)a and ψ3(a∗[x, y]) = [αA(a), [x, y]], ψ2((x⊗y)∗a) =
[[x, y], αA(a)].
Thus Coker(ψ3) = [A, A]/[A, [A, A]], Coker(ψ2) = HH M
1 (A) and Ker(ψ2) = A ∗ HH α
1 (A, αA), Coker(ψ2) =
1 (A). Then the assertion is a consequence of
HH α
the Snake Lemma.
Remark 5.8.
a) Let (A, αA) be a Hom-associative (non-commutative) algebra satisfying the
α-identity condition (5.3). If in addition αA is an epimorphism, then the
term A ∗ HH α
1 (A) in the exact sequence of Theorem 5.7 can be replaced by
Proposition 3.7. In Particular, if αA = idA, the exact sequence in Theorem
5.7 coincides with that of [9, Theorem 7.4].
1 (A) ⊗A/[A, A](cid:1) since they are isomorphic by
(cid:0)A/[A, A] ⊗HH α
1 (A)(cid:1)⊕(cid:0)HH α
b) From the exact sequence in Theorem 5.7 and Theorem 4.4 immediately fol-
lows that the vector spaces HH α
1 (A, αA) are isomorphic when
the Hom-associative algebra (A, αA) is perfect as Hom-Leibniz algebra and
HLα
1 (A) and HH M
2 (A) = 0.
1 (A) and HH M
c) HH α
1 (A, αA) are also isomorphic for any commutative Hom-
associative algebra (A, αA).
Acknowledgements
First and second authors were supported by Ministerio de Econom´ıa y Competi-
tividad (Spain) (European FEDER support included), grant MTM2013-43687-P.
The second author was supported by Xunta de Galicia, grants EM2013/016 and
GRC2013-045 (European FEDER support included), and Shota Rustaveli Na-
tional Science Foundation, grant FR/189/5-113/14.
References
[1] F. Ammar, S. Mabrouk and A. Makhlouf, Representations and cohomology
of n-ary multiplicative Hom-Nambu-Lie algebras, J. Geom. Phys. 61 (10)
(2011), 1898 -- 1913.
21
/
/
/
/
/
/
/
/
/
/
[2] S. Benayadi and A. Makhlouf, Hom-Lie algebras with symmetric invariant
nondegenerate bilinear forms, J. Geom. Phys. 76 (2014), 38 -- 60.
[3] J. M. Casas, M. A. Insua and N. Pacheco Rego, On universal central exten-
sions of Hom-Leibniz algebras, J. Algebra Appl. 13 (8) (2014), 1450053 (22
pp.).
[4] J. M. Casas, E. Khmaladze and N. Pacheco Rego, A non-abelian tensor prod-
uct of Hom-Lie algebras, Bull. Malaysian Math. Sci. Soc (2016), to appear.
[5] J. M. Casas and T. Van der Linden, Universal central extensions in semi-
abelian categories, Appl. Categor. Struct. 22 (1) (2014), 253 -- 268.
[6] D. Chen and Y. Sheng, Hom-Lie 2-algebras, J. Algebra 376 (2013), 174 -- 195.
[7] Y. S. Chen and Y. C. Su, (Co)homology and universal central extensions of
Hom-Leibniz algebras, Acta Math. Sin. (Engl. Ser.) 27 (5) (2011), 813 -- 830.
[8] G. Ellis, A non-abelian tensor product of Lie algebras, Glasgow Math. J. 33
(1991), 101 -- 120.
[9] A. V. Gnedbaye, A non-abelian tensor product of Leibniz algebras, Ann. Inst.
Fourier, Grenoble 49 (4) (1999), 1149 -- 1177.
[10] J. T. Hartwing, D. Larson and S. D. Silvestrov, Deformations of Lie algebras
using σ-derivations, J. Algebra 295 (2006), 314 -- 361.
[11] N. Inassaridze, E. Khmaladze and M. Ladra, Non-abelian homology of Lie
algebras, Glasgow Math. J. 46 (2004), 417 -- 429.
[12] J.-L. Loday, Une version non commutative des alg`ebres de Lie: les alg`ebres
de Leibniz, L'Enseignement Math´ematique 39 (1993), 269 -- 292.
[13] J.-L. Loday and T. Pirashvili, Universal enveloping algebras of Leibniz alge-
bras and (co)homology, Math. Ann. 296 (1993), 139 -- 158.
[14] A. Makhlouf and S. Silvestrov, Hom-algebra structures, J. Gen. Lie Theory
Appl. 2 (2) (2008), 51 -- 64.
[15] A. Makhlouf and S. Silvestrov, Hom-Lie admissible Hom-coalgebras and
Hom-Hopf algebras, Generalized Lie theory in mathematics, physics and
beyond, (Springer, Berlin 2009) 189 -- 206.
[16] A. Makhlouf and S. Silvestrov, Notes on 1-parameter formal deformations of
Hom-associative and Hom-Lie algebras, Forum Math. 22 (4) (2010), 715 -- 739.
[17] Y. Sheng, Representations of Hom-Lie algebras, Algebr. Represent. Theory
15 (6) (2012), 1081 -- 1098.
22
[18] D. Yau, Enveloping algebras of Hom-Lie algebras, J. Gen. Lie Theory Appl.
2 (2) (2008), 95 -- 108.
[19] D. Yau, Hom-algebras and homology, J. Lie Theory 19 (2) (2009), 409 -- 421.
23
|
1307.7891 | 1 | 1307 | 2013-07-30T09:50:03 | Symmetric Powers of Hyperbolic Forms and of Trace Forms on Symbol Algebras | [
"math.RA",
"math.RT"
] | Let $K$ be a field with characteristic different from 2 and let $S$ be a symbol algebra over $K$. We compute the symmetric powers of hyperbolic quadratic forms over $K$. Also, we compute the symmetric powers of the quadratic trace form of $S$. In both cases we apply a generalised form of the Vandermonde convolution in the course of the computations. | math.RA | math |
SYMMETRIC POWERS OF HYPERBOLIC FORMS
AND OF TRACE FORMS ON SYMBOL ALGEBRAS
RONAN FLATLEY
Abstract. Let K be a field with characteristic different from 2 and let S be a symbol
algebra over K. We compute the symmetric powers of hyperbolic quadratic forms
over K. Also, we compute the symmetric powers of the quadratic trace form of S . In
both cases we apply a generalised form of the Vandermonde convolution in the course
of the computations.
1. Introduction
We assume throughout this paper that K is a field with characteristic different from
2. In [3] we computed the exterior powers of hyperbolic forms over K and used these
results to compute the exterior powers of the quadratic trace form of symbol algebras
over K. Here we are interested in finding corresponding results for the symmetric
powers of such forms.
In [8], McGarraghy investigated symmetric powers of classes of symmetric bilin-
ear forms in the Witt-Grothendieck ring of K, deriving their basic properties as well
as computing several of their classical invariants such as determinant, signature with
respect to an ordering and Hasse invariant. Their relation to exterior powers was also
given. For a given symmetric bilinear form ϕ over K there was a distinction drawn
between factorial symmetric powers Skϕ and non-factorial symmetric powers S kϕ.
Factorial symmetric powers were seen to have the advantages of being computable
for any given symmetric bilinear form and of being independent of basis. However,
effectively they are useful only in characteristic 0. On the other hand, non-factorial
symmetric powers are independent of characteristic but require the form to be diag-
onalised, i.e., a basis needs to be chosen.
In this paper we deal with non-factorial
symmetric powers of forms, hereafter referred to simply as symmetric powers. Since
char(K) , 2, we use the one-to-one correspondence between symmetric bilinear forms
and quadratic forms.
Notation and terminology is borrowed from Lam [7] and Scharlau [9]. A diago-
nalised quadratic form over K with coefficients a1, . . . , am ∈ K× is denoted by ha1, . . . , ami.
The hyperbolic plane h1, −1i is denoted by H. If ϕ and ψ are forms over K then ϕ ≃ ψ
means that these forms are isometric. The tensor product of the 1-dimensional form
Date: September 25, 2018.
2010 Mathematics Subject Classification. Primary: 11E81; Secondary: 16K20.
Key words and phrases. hyperbolic form, symmetric power, symbol algebra, trace form.
1
2
RONAN FLATLEY
hni with ϕ is denoted hniϕ to be distinguished from n copies of ϕ which is written as
n × ϕ.
2. Preliminaries
2.1. Exterior powers. Bourbaki defined the concept of exterior power of a symmetric
bilinear form in [1, IX, §1, (37)]:
Definition 2.1. Let V be a vector space of dimension m over K. Let ϕ : V × V → K
be a non-singular bilinear form and let k be a positive integer, k ≤ m. We define the
k-fold exterior power of ϕ,
Λkϕ : ΛkV × ΛkV −→ K
by
Λkϕ(x1 ∧ · · · ∧ xk, y1 ∧ · · · ∧ yk) = det(cid:0)ϕ(xi, y j)(cid:1)1≤i, j≤k.
The bilinear extension of this form defines Λkϕ everywhere on ΛkV × ΛkV. We define
Λ0ϕ := h1i. Also, for k > m, we define Λkϕ := 0, the zero form.
We use the following two results on exterior powers of hyperbolic forms:
Proposition 2.2. [3, Proposition 5.6] Let φ ≃ h × H where h ∈ N and k odd with
1 ≤ k ≤ 2h − 1. Then
Λkφ ≃
1
2 2h
k ! × H.
Proposition 2.3. [3, Proposition 5.7] Let φ ≃ h×H where h ∈ N, k = 2ℓ and 0 ≤ ℓ ≤ h.
Then
Λkφ = Λ2ℓφ ≃ h
ℓ! × h(−1)ℓi ⊥
1
2 2h
2ℓ! − h
ℓ!! × H.
2.2. Symmetric powers.
Definition 2.4. [8, adapted statement of Proposition 3.5] Let V be a vector space of
dimension m over K. Let ϕ be a symmetric bilinear form over K with ϕ ≃ ha1, . . . , ami.
Let k be a non-negative integer. We define the k-fold symmetric power of ϕ,
by
S kϕ : S kV × S kV → K
S kϕ = ⊥
+···+kiℓ
1≤i1<···<iℓ≤m
=k
ki1
haki1
i1
. . . akiℓ
iℓ
i.
Remark 2.5. The form S kϕ has dimension (cid:16)m+k−1
k
(cid:17).
Remark 2.6. Clearly, S 0ϕ = h1i and S 1ϕ = ϕ.
Remark 2.7. We note that S k preserves isometries, i.e., ϕ ≃ ψ ⇒ S kϕ ≃ S kψ. In
general the converse is not true; consider a field where h1i ; h−1i. Let ϕ = h1, 1i ⊥ H
and ψ = h−1, −1i ⊥ H. Then ϕ ; ψ but S 2ϕ ≃ S 2ψ = 4 × h1i ⊥ 3 × H.
SYMMETRIC POWERS OF HYPERBOLIC FORMS AND OF TRACE FORMS ON SYMBOL ALGEBRAS3
Remark 2.8. The k-fold exterior power is always a subform of the k-fold symmetric
power. Therefore, Λkϕ isotropic ⇒ S kϕ isotropic.
Lemma 2.9. S k(m × h1i) = (cid:16)m+k−1
k
(cid:17) × h1i and S k(m × h−1i) = (cid:16)m+k−1
k
(cid:17) × h(−1)ki.
The next two propositions give properties that are very useful for the computations
in Sections 3 and 4.
Proposition 2.10. [6, p. 47] Let ϕ and ψ be symmetric bilinear forms over K and let k
be a positive integer. Then
S k(ϕ ⊥ ψ) = ⊥
i+ j=k
S iϕ ⊗ S jψ .
Proposition 2.11. [8, Proposition 4.4] Let ϕ be an n-dimensional symmetric bilinear
form over K and let k be a positive integer. Then
S kϕ =
⌈k/2⌉
i=0 n + i − 1
⊥
i
! × Λk−2iϕ .
3. Symmetric powers of hyperbolic forms
For each dimension of even parity, there exists exactly one hyperbolic form up to
isometry. In other words, if ϕ is a hyperbolic form of dimension 2h, then ϕ ≃ h × H.
In this section we compute the symmetric powers of these forms. For computational
convenience, we often do not state the specific number of hyperbolic planes. Instead
we shall use the word "Hyp" to represent the number of hyperbolic planes required in
order to give full dimension to the particular symmetric power in question.
Proposition 3.1. Let k be any positive odd integer, h ∈ N. Then
S k(h × H) =
Proof.
S k(h × H) = S k(h × h1i ⊥ h × h−1i)
1
2 2h + k − 1
k
! × H.
= ⊥
i+ j=k
= ⊥
i+ j=k
j even
S i(h × h1i) ⊗ S j(h × h−1i)
S i(h × h1i) ⊗ S j(h × h−1i) ⊥ ⊥
i+ j=k
j odd
S i(h × h1i) ⊗ S j(h × h−1i)
[by Proposition 2.10]
= ⊥
i+ j=k
j even
h + i − 1
i
! × h1i! ⊗ h + j − 1
j
! × h1i! ⊥ ⊥
i+ j=k
j odd
h + i − 1
i
! × h1i! ⊗ h + j − 1
j
! × h−1i!
4
RONAN FLATLEY
[by Lemma 2.9]
h + i − 1
i
h + i − 1
i
= Xi+ j=k
j even
= Xi+ j=k
j even
! h + j − 1
j
! h + j − 1
j
! × h1i ⊥ Xi+ j=k
! × h1i ⊥ Xi+ j=k
j odd
i even
h + i − 1
i
! h + j − 1
j
! × h−1i
h + j − 1
j
! h + i − 1
i
! × h−1i .
From the expression above we observe that there is the same number of summands h1i
as summands h−1i. Given that the dimension of S k(h × H) is(cid:16)2h+k−1
k
(cid:17), we conclude that
S k(h × H) =
1
2 2h + k − 1
k
! × H.
We now seek to compute S k(h × H) for k an arbitrary even natural number. First, we
need two lemmata:
Lemma 3.2.
r
Xj=0
(−1) j 2p + j − 1
j
r − j! = (−1)r p + r − 1
! p
r
! .
Proof. By the Vandermonde convolution (see [4] for example), for any integer p and
any positive integer r,
r
j ! p
By applying the "minus transformation" (cid:16)−q
Xj=0 −2p
r − j! = −p
r ! .
i (cid:17) = (−1)i(cid:16)q+i−1
required identity.
i
(cid:17) to both sides, we get the
Lemma 3.3. [Pascal's rule]
For any r ∈ N, 1 ≤ s ≤ r, we have that
r − 1
s
! + r − 1
s − 1! = r
s! .
Remark 3.4. In several of the remaining proofs we use the following property of
binomial coefficients, which is easy to derive:
Proposition 3.5. Let k be any non-negative even integer, k = 2ℓ, h ∈ N. Then
r
s! =
r
s r − 1
s − 1! .
S k(h × H) = S 2ℓ(h × H) = h + ℓ − 1
ℓ
! × h1i ⊥
1
2 2h + 2ℓ − 1
2ℓ
! − h + ℓ − 1
ℓ
!! × H.
SYMMETRIC POWERS OF HYPERBOLIC FORMS AND OF TRACE FORMS ON SYMBOL ALGEBRAS5
Proof. Using the formula
⌈k/2⌉
S kφ =
i=0 n + i − 1
⊥
i
! × Λk−2iϕ
[Proposition 2.11]
we get
S k(h × H) = S 2ℓ(h × H)
=
=
ℓ
i
i=0 2h + i − 1
⊥
i=0 2h + i − 1
⊥
i
ℓ
! × Λ2ℓ−2i(h × H)
! × h
ℓ − i! × h(−1)ℓ−ii ⊥
1
2 2h
2(ℓ − i)! − h
ℓ − i!! × H!
[by Proposition 2.3
ℓ
ℓ
i
i
ℓ
=
=
i=0 2h + i − 1
! h
ℓ − i! × h(−1)ℓ−ii ⊥ Hyp
⊥
i=0 2h + i − 1
! h
ℓ − i! × h(−1)i−ℓi ⊥ Hyp
⊥
(−1)i 2h + i − 1
! h
ℓ − i! × h(−1)−ℓi ⊥ Hyp
Xi=0
= (−1)ℓ h + ℓ − 1
= h + ℓ − 1
! × h(−1)−ℓi ⊥ Hyp
! × h1i ⊥ Hyp .
=
ℓ
ℓ
i
[by Lemma 3.2]
4. Symmetric powers of trace forms on symbol algebras
Let n be an arbitrary positive integer and let K contain a primitive n-th root of unity
ω. Let a, b ∈ K× and let S be the algebra over K generated by elements x and y where
xn = a,
yn = b
and
yx = ωxy.
We call this algebra a symbol algebra (see [5, Chapter 1, §2]) and denote it as (a, b; n, K, ω).
In [2, §11], Draxl shows it to be a central simple algebra over K of degree n.
Let A be a central simple algebra of degree n over a field K of characteristic different
from 2. We write TA : A → K for the quadratic trace form
for z ∈ A,
TA(z) = TrdA(z2)
where TrdA is the reduced trace of A.
In [3], we proved the following:
6
RONAN FLATLEY
Proposition 4.1. [3, Propositions 2.1, 3.1] For S = (a, b; n, K, ω), we have
(i) TS ≃ h(−1)n/2i ⊥
n2 − 1
2
× H
(ii) TS ≃ hnih1, a, b, (−1)n/2abi ⊥
n2 − 4
2
× H
for n odd.
for n even.
Proposition 4.2. Let n be odd and k ≥ 0. Then
S kTS =
Proof. Let k be odd. Then
2
k−1
2
(cid:16) n2 +k−2
(cid:16) n2 +k−1
2
k
2
2 i ⊥ Hyp,
(cid:17) × h(−1) n−1
(cid:17) × h1i ⊥ Hyp,
if k is odd;
if k is even.
[by Proposition 4.1]
[by Proposition 2.10]
S i(cid:16)h(−1) n−1
2 i(cid:17) ⊗ S j n2 − 1
2
× H!
[by Proposition 3.1]
[by Lemma 2.9]
S kTS = S k h(−1) n−1
2 i ⊥
= ⊥
i+ j=k
= ⊥
j even
S i(cid:16)h(−1) n−1
S i(cid:16)h(−1) n−1
S i(cid:16)h(−1) n−1
(n−1)i
2
2
2
n2 − 1
j odd
× H!
2 i(cid:17) ⊗ S j n2 − 1
2 i(cid:17) ⊗ S j n2 − 1
2 i(cid:17) ⊗ S j n2 − 1
2 i ⊗ S j n2 − 1
2 i ⊗
2
n2−1+ j−2
× H!
× H! ⊥ ⊥
× H! ⊥ Hyp
× H!! ⊥ Hyp
! × h1i ⊥
2
j
2
2
(n−1)
j even
= ⊥
j even h(−1)
= ⊥
j even
= ⊥
h(−1)
n2 − 1 + j − 2
j
! −
n2−1+ j−2
2
j
2
!
× H
⊥ Hyp
[by Proposition 3.5]
2
j
2
=
k−1
2
= Xj even
Xj′=0 n2−1
= n2 +k−2
2
k−1
2
2
n2+ j−3
! × h(−1) n−1
2 i ⊥ Hyp
+ j′ − 1
j′
! × h(−1) n−1
2 i ⊥ Hyp
! × h(−1) n−1
2 i ⊥ Hyp .
[changing the index, j′ = j/2]
[by repeated use of Lemma 3.3]
SYMMETRIC POWERS OF HYPERBOLIC FORMS AND OF TRACE FORMS ON SYMBOL ALGEBRAS7
Now let k be even. Then
S kTS = S k h(−1) n−1
n2 − 1
2
j even
j even
2
2
i+ j=k
2 i ⊥
= ⊥
= ⊥
× H!
2 i(cid:17) ⊗ S j n2 − 1
S i(cid:16)h(−1) n−1
2 i(cid:17) ⊗ S j n2 − 1
S i(cid:16)h(−1) n−1
2 i(cid:17) ⊗ S j n2 − 1
= ⊥
S i(cid:16)h(−1) n−1
2 i ⊗ S j n2 − 1
j even h(−1) (n−1)i
= ⊥
! × h1i ⊥
j even
h1i ⊗
= ⊥
= Xj even
Xj′ =0 n2−1
= n2+k−1
! × h1i ⊥ Hyp .
! × h1i ⊥ Hyp
! × h1i ⊥ Hyp
+ j′ − 1
j′
n2−1+ j−2
n2 + j−3
k
2
=
2
j
2
2
2
j
2
2
k
2
2
2
j odd
× H!
× H! ⊥ ⊥
× H! ⊥ Hyp
× H!! ⊥ Hyp
n2 − 1 + j − 2
j
[by Proposition 4.1]
[by Proposition 2.10]
S i(cid:16)h(−1) n−1
2 i(cid:17) ⊗ S j n2 − 1
2
× H!
[by Proposition 3.1]
[by Lemma 2.9]
! −
n2−1+ j−2
2
j
2
!
× H
[by Proposition 3.5]
⊥ Hyp
[changing the index, j′ = j/2]
[by repeated use of Lemma 3.3]
Proposition 4.3. Let n be even, k odd. We write TS ≃ qS ⊥ m × H where qS ≃
hnih1, a, b, (−1) n
2 abi and m = n2−4
S kTS =
Proof.
2m+2k+4
2 . Then for k > 1,
(cid:16)(2m+k+3)/2
(k−3)/2 (cid:17) × qS ⊥ Hyp,
k−1 (cid:16)(2m+k+3)/2
(k−3)/2 (cid:17) × qS ⊥ Hyp,
k−1
2m+6
if n ≡ 0
if n ≡ 2
(mod 4);
(mod 4).
S kTS = S k (qS ⊥ m × H)
= ⊥
i+ j=k
= ⊥
j even
S iqS ⊗ S j (m × H)
[by Proposition 2.10]
S iqS ⊗ S j (m × H) ⊥ ⊥
j odd
S iqS ⊗ S j (m × H)
8
RONAN FLATLEY
= ⊥
j even
S iqS ⊗ S j (m × H) ⊥ Hyp
! × h1i ⊥
m + j
2 − 1
j
2
j even
j even
= ⊥
S iqS ⊗
S iqS ⊗
= ⊥
= Xj even m + j
= Xj even m + j
= Xj even m + j
= Xj even m + j
= Xj even m + j
= Xj even m + j
Xj′=0 m + j′ − 1
2 − 1
j
2
2 − 1
j
2
2 − 1
j
2
2 − 1
j
2
2 − 1
j
2
2 − 1
j
2
k−1
2
j′
=
i−1
2
(i+1)/2
2 − 1
j
2
m + j
! × h1i
! × S iqS ⊥ Hyp
! ×
ℓ=0 3 + ℓ
⊥
3 + i−1
! ×
3 + i−1
! ×
! 3 + i−1
! 3 + k−1
! 3 + k−1
k−1
2 − j′
2 −
j
2
2 − j′
k−1
2 −
i−1
2
i−1
2
j
2
2
2
[by Proposition 3.1]
1
2
2m + j − 1
j
! − m + j
2 − 1
j
2
[by Proposition 3.5]
!
× H
⊥ Hyp
⊥ Hyp
2
2
ℓ ! × Λi−2ℓqS
! × Λ1qS ⊥ 3 + i−3
! × qS ⊥ 3 + i−3
! × qS ⊥ Xj even m + j
i−3
2
i−3
2
2
2 − 1
j
2
! × qS ⊥ Xj even m + j
! × qS ⊥ Xj even m + j′ − 1
j′
! × Λ3qS
! ×(cid:16)h(−1)n/2i ⊗ qS(cid:17)
! 3 + i−3
2 − 1
j
2
k−3
2 −
2 −
j
2
! 3 + k−3
! 3 + k−3
k−3
2 − j′
i−3
2
2
j
2
2 − j′
⊥ Hyp
! ×(cid:16)h(−1)n/2i ⊗ qS(cid:17) ⊥ Hyp
! ×(cid:16)h(−1)n/2i ⊗ qS(cid:17) ⊥ Hyp
! ×(cid:16)h(−1)n/2i ⊗ qS(cid:17) ⊥ Hyp
⊥ Hyp
[by Proposition 2.11]
⊥ Hyp [since for larger k, Λk is zero]
[changing the index, j′ = j/2]
= m + 3 + k−1
2
k−1
2
Now if n ≡ 0 (mod 4)
S kTS =
=
m + 3 + k−1
2
k−1
2
2m + 2k + 4
k − 1
! × qS ⊥ m + 3 + k−3
2
k−3
2
! ×(cid:16)h(−1)n/2i ⊗ qS(cid:17) ⊥ Hyp .
!
! × qS ⊥ Hyp .
! + m + 3 + k−3
2m+k+3
× qS ⊥ Hyp
k−3
2
2
2
k−3
2
[by Remark 3.4]
[by [4, Equation (3)]]
SYMMETRIC POWERS OF HYPERBOLIC FORMS AND OF TRACE FORMS ON SYMBOL ALGEBRAS9
On the other hand, if n ≡ 2 (mod 4)
S kTS =
=
2
k−1
2
m + 3 + k−1
k − 1 2m+k+3
! − m + 3 + k−3
! × qS ⊥ Hyp .
k−3
2
2m + 6
2
2
k−3
2
× qS ⊥ Hyp
!
[by Remark 3.4]
Proposition 4.4. Let n and k be even. We write TS ≃ qS ⊥ m × H where qS ≃
hnih1, a, b, (−1) n
2 . Then for k > 1,
2 abi and m = n2−4
(cid:16)1 + (m+3+k/2)(m+2+k/2)
(cid:16) (m+3+k/2)(m+2+k/2)
(k/2)(k/2−1)
(k/2)(k/2−1)
S kTS =
Proof.
S kTS = S k (qS ⊥ m × H)
(cid:17)(cid:16)m+1+k/2
− 1(cid:17)(cid:16)m+1+k/2
k/2−2 (cid:17) × h1i ⊥ Hyp,
k/2−2 (cid:17) × h1i ⊥ Hyp,
if n ≡ 0 (mod 4);
if n ≡ 2 (mod 4).
S iqS ⊗ S j (m × H)
[by Proposition 2.10]
S iqS ⊗ S j (m × H) ⊥ ⊥
j odd
S iqS ⊗ S j (m × H)
S iqS ⊗ S j (m × H) ⊥ Hyp
! × h1i ⊥
m + j
2 − 1
j
2
[by Proposition 3.1]
1
2
2m + j − 1
j
! − m + j
2 − 1
j
2
[by Proposition 3.5]
⊥ Hyp
!
× H
= ⊥
i+ j=k
= ⊥
j even
= ⊥
j even
j even
j even
= ⊥
S iqS ⊗
S iqS ⊗
= ⊥
= Xj even m + j
= Xj even m + j
= Xj even m + j
⊥ Hyp
2 − 1
j
2
m + j
! × h1i
! × S iqS ⊥ Hyp
! ×
ℓ=0 3 + ℓ
⊥
3 + i
! ×
2 − 1
j
2
2 − 1
j
2
2 − 1
j
2
i/2
i
2
2
ℓ ! × Λi−2ℓqS
! × Λ0qS ⊥ 3 + i−2
2
i−2
2
⊥ Hyp
[by Proposition 2.11]
! × Λ2qS ⊥ 3 + i−4
2
i−4
2
⊥ Hyp
! × Λ4qS
10
RONAN FLATLEY
[since for larger k, Λk is zero]
! × h1i ⊥ 3 + i−2
2
i−2
2
! × ha, b, abi ⊗ h1, (−1)n/2i ⊥ 3 + i−4
2
i−4
2
! × h(−1)n/2i
= Xj even m + j
2 − 1
j
2
⊥ Hyp
= Xj even m + j
2 − 1
j
2
2
i
2
3 + i
! ×
! 3 + k− j
2
2
2
k− j−4
2
k− j−2
! 3 + k− j−2
2 − 1
j
2
k− j
2
2 − 1
j
2
! × h1i ⊥ Xj even m + j
! 3 + k− j−4
! 3 + k/2 − j′
! × h(−1)n/2i ⊥ Hyp
Xj′ =0 m + j′ − 1
! × h1i ⊥
! 3 + k/2 − 2 − j′
! × h(−1)n/2i ⊥ Hyp
k/2 − 2 − j′
k/2 − j′
k/2−1
j′
2
⊥ Xj even m + j
Xj=0 m + j′ − 1
k/2
j′
=
⊥
k/2−2
Xj′ =0 m + j′ − 1
j′
! × ha, b, abi ⊗ h1, (−1)n/2i
! 3 + k/2 − 1 − j′
k/2 − 1 − j′
! × ha, b, abi ⊗ h1, (−1)n/2i
[changing the index, j′ = j/2]
= m + 3 + k/2
k/2
! × h1i ⊥ m + 2 + k/2
k/2 − 1 ! × ha, b, abi ⊗ h1, (−1)n/2i
⊥ m + 1 + k/2
k/2 − 2 ! × h(−1)n/2i ⊥ Hyp .
[by [4, Equation (3)]]
We now examine separately the cases of n ≡ 0 (mod 4) and n ≡ 2 (mod 4). Suppose
n ≡ 0 (mod 4). In this case we have (−1)n/2 = 1 and so
S kTS = m + 3 + k/2
! + m + 1 + k/2
k/2 − 2 !! × h1i ⊥ 2 m + 2 + k/2
k/2 − 1 ! × ha, b, abi ⊥ Hyp
k/2
(m + 3 + k/2)(m + 2 + k/2)
(k/2)(k/2 − 1)
(m + 3 + k/2)(m + 2 + k/2)
(k/2)(k/2 − 1)
= 1 +
= 1 +
! m + 1 + k/2
! m + 1 + k/2
k/2 − 2 ! × h1i ⊥ 2 m + 2 + k/2
k/2 − 2 ! × h1i ⊥ Hyp .
k/2 − 1 ! × ha, b, abi ⊥ Hyp
Now suppose n ≡ 2 (mod 4). In this case we have (−1)n/2 = −1 and so
S kTS = m + 3 + k/2
= m + 3 + k/2
k/2 − 2 ! × h−1i ⊥ Hyp
! × h1i ⊥ m + 1 + k/2
! − m + 1 + k/2
k/2 − 2 !! × h1i ⊥ Hyp
k/2
k/2
SYMMETRIC POWERS OF HYPERBOLIC FORMS AND OF TRACE FORMS ON SYMBOL ALGEBRAS11
= (m + 3 + k/2)(m + 2 + k/2)
(k/2)(k/2 − 1)
− 1! m + 1 + k/2
k/2 − 2 ! × h1i ⊥ Hyp .
5. Summary of results
We give here a summary of the above results on symmetric powers alongside the
corresponding results on exterior powers computed in [3, Section 5].
Let ϕ ≃ h × H for arbitrary h ∈ N. Then
k
odd
Λkϕ
Hyp
S kϕ
Hyp
even h
k
2! × h(−1) k
2 i ⊥ Hyp h + k
2 − 1
k
2
! × h1i ⊥ Hyp
Let S = (a, b; n, K, ω) be a symbol algebra of degree n as described in Section 4.
Let ϕ = TS = hnih1, a, b, (−1) n
2 abi and m = n2−4
2 . Then
n
odd
odd
k
odd
even
0 (mod 4)
odd
0 (mod 4) even
2 (mod 4)
odd
2 (mod 4) even
Λkϕ
S kϕ
2 i ⊥ Hyp
2 i ⊥ Hyp
4 iqS ⊥ Hyp
n2−1
2
k
2
k
2
k−1
k−1
2
2 (cid:17) × h(−1) k−1
(cid:16)
(cid:16) n2−1
2 (cid:17) × h(−1) k
m + 1
! × h(−1) n(k−1)
n2
2 ! × h1i ⊥ Hyp
! × h(−1) n(k−1)
2 ! × h(−1) k
2 ! × h(−1) k+2
m + 1
n2(cid:17) n2
(cid:16)1 − 2k
n2 − 1(cid:17) n2
(cid:16) 2k
k−1
2
2
k
2
k
4 iqS ⊥ Hyp
2 i ⊥ Hyp, k ≤ n2
2
2 i ⊥ Hyp, k > n2
2
n2 +k−2
2
k
2
k−1
(cid:16)
2
k−1
2
2m+2k+4
2 i ⊥ Hyp
(cid:17) × h(−1) n−1
(cid:16) n2 +k−1
(cid:17) × h1i ⊥ Hyp
(cid:16) 2m+k+3
(cid:16)1 + (m+3+k/2)(m+2+k/2)
k−1 (cid:16) 2m+k+3
(cid:17) × qS ⊥ Hyp
(cid:17)(cid:16) 2m+2+k
(cid:17) × qS ⊥ Hyp
(k/2)(k/2−1)
2
k−3
2
2
k−4
2
2
k−3
2
2m+6
(cid:17) × h1i ⊥ Hyp
(cid:16) (m+3+k/2)(m+2+k/2)
(k/2)(k/2−1)
− 1(cid:17)(cid:16) 2m+2+k
2
k−4
2
(cid:17) × h1i ⊥ Hyp
12
RONAN FLATLEY
References
[1] Bourbaki, N., ´El´ements de Math´ematique, Livre II, Alg`ebre, Hermann, Paris, 1959.
[2] Draxl, P. K., Skew Fields, Cambridge Univ. Press, Cambridge, 1983.
[3] Flatley, R., Trace Forms of Symbol Algebras, Algebra Colloq. 19:spec01 (2012) 1117-1124.
[4] Gould, H. W., Some generalizations of Vandermonde's Convolution, Amer. Math. Monthly 63:2
(1956) 84-91.
[5] Knus, M.-A., Merkurjev, A., Rost, M., Tignol, J.-P., The Book of Involutions, Amer. Math. Soc.
Colloq. Publ., Providence, RI, 1998.
[6] Knutson, D. Rings and the Representation Theory of the Symmetric Group, volume 308 of Lecture
Notes in Mathematics. Springer-Verlag, Berlin, 1973.
[7] Lam, T. Y., Introduction to Quadratic Forms over Fields, Grad. Stud. Math., Providence, RI, 2004.
[8] McGarraghy, S., Symmetric powers of symmetric bilinear forms, Algebra Colloq. 12:1 (2005)
41-57.
[9] Scharlau, W., Quadratic and Hermitian Forms, Springer, Berlin, 1985.
Department of Mathematics and Computer Studies, Mary Immaculate College, Limerick, Ireland
E-mail address: [email protected]
|
1701.02169 | 1 | 1701 | 2017-01-09T13:33:00 | Orthogonal involutions and totally singular quadratic forms in characteristic two | [
"math.RA"
] | We associate to every central simple algebra with involution of orthogonal type in characteristic two a totally singular quadratic form which reflects certain anisotropy properties of the involution. It is shown that this quadratic form can be used to classify totally decomposable algebras with orthogonal involution. Also, using this form, a criterion is obtained for an orthogonal involution on a split algebra to be conjugated to the transpose involution. | math.RA | math |
Orthogonal involutions and totally singular
quadratic forms in characteristic two
A.-H. Nokhodkar
Abstract
We associate to every central simple algebra with involution of ortho-
gonal type in characteristic two a totally singular quadratic form which
reflects certain anisotropy properties of the involution. It is shown that
this quadratic form can be used to classify totally decomposable algebras
with orthogonal involution. Also, using this form, a criterion is obtained
for an orthogonal involution on a split algebra to be conjugated to the
transpose involution.
Mathematics Subject Classification: 16W10, 16K20, 11E39, 11E04.
1
Introduction
The theory of algebras with involution is closely related to the theory of bilinear
forms. Assigning to every symmetric or anti-symmetric regular bilinear form
on a finite-dimensional vector space V its adjoint involution induces a one-
to-one correspondence between the similarity classes of bilinear forms on V
and involutions of the first kind on the endomorphism algebra EndF (V ) (see
[5, p. 1]). Under this correspondence several basic properties of involutions
reflect analogous properties of bilinear forms. For example a symmetric or anti-
symmetric bilinear form is isotropic (resp. anisotropic, hyperbolic) if and only
if its adjoint involution is isotropic (resp. anisotropic, hyperbolic).
Let (A, σ) be a totally decomposable algebra with orthogonal involution
over a field F of characteristic two.
In [3], a bilinear Pfister form Pf(A, σ)
was associated to (A, σ), which determines the isotropy behaviour of (A, σ).
It was shown that for every splitting field K of A, the involution σK on AK
becomes adjoint to the bilinear form Pf(A, σ)K (see [3, (7.5)]). Also, according
to [7, (6.5)] this invariant can be used to determine the conjugacy class of the
involution σ on A.
In this work we associate to every algebra with orthogonal involution (A, σ)
in characteristic two a pair (S(A, σ), qσ) where S(A, σ) is a subalgebra of A and
qσ is a totally singular quadratic form on S(A, σ). Using this pair, we find in
Theorem 3.7 some criteria for σ to be direct (a stronger notion than anisotropy
defined in [2]). As a consequence, several sufficient conditions for anisotropy
of σ are obtained in Corollary 3.10. Further, it is shown in Theorem 3.14
that qσ can classify the transpose involution on a split algebra. For the case
where (A, σ) is totally decomposable, using the quadratic space (S(A, σ), qσ)
we will complement some results of [3] and [7] in Theorem 4.1 and state several
necessary and sufficient conditions for σ to be anisotropic. Finally, we shall
1
see in Theorem 4.6 and Theorem 4.10 that the form qσ can be used to find
a classification of totally decomposable algebras with orthogonal involution in
characteristic two.
2 Preliminaries
In this paper, F denote a field of characteristic two.
Let V be a vector space of finite dimension over F . A bilinear form b :
V × V → F is called isotropic if b(v, v) = 0 for some 0 6= v ∈ V . Otherwise,
b is called anisotropic. We say that b represents α ∈ F if b(v, v) = α for some
nonzero vector v ∈ V . The set of all elements represented by b is denoted by
D(b). If K/F is a field extension, we denote by bK the scalar extension of b
i=1 αixiyi is denoted
i=1h1, αii is called a bilinear Pfister form
and is denoted by hhα1, · · · , αnii. If b is a bilinear Pfister form over F , there
exists a bilinear form b′, called the pure subform of b, such that b ≃ h1i ⊥ b′.
As observed in [1, p. 16] the pure subform of b is uniquely determined, up
to isometry. According to [4, (6.5)], the form b is anisotropic if and only if
dimF 2 Q(b) = 2n, where Q(b) = D(b) ∪ {0}.
to K. For α1, · · · , αn ∈ F the diagonal bilinear form Pn
by hα1, · · · , αni. Also, the form Nn
i=1 αix2
i
by hα1, · · · , αniq.
A quadratic form on V is a map q : V → F such that (i) q(αv) = α2q(v)
for α ∈ F and v ∈ V ; (ii) the map bq : V × V → F given by b(v, w) =
q(v + w) − q(v) − q(w) is an F -bilinear form. A quadratic form q is called
isotropic if q(v) = 0 for some 0 6= v ∈ V and anisotropic otherwise. For a
quadratic space (V, q) over F we use the notation D(q) = {q(v) 0 6= v ∈ V }
and Q(q) = D(q) ∪ {0}. The scalar extension of q to an extension K of F is
denoted by qK. A quadratic form q is called totally singular if bq is the zero map.
is denoted
For α1, · · · , αn ∈ F the totally singular quadratic form Pn
Let A be a central simple algebra over F and let σ be an involution on
A, i.e., an anti-automorphism of A of order two. We say that σ is of the first
kind if it restricts to the identity map on F . For a symmetric bilinear space
(V, b) over F we denote by σb the adjoint involution of EndF (V ) with respect
to b (see [5, p. 1]). An involution σ of the first kind on A is called symplectic
if it becomes adjoint to an alternating bilinear form over a splitting field of
A (i.e., a bilinear form b with D(b) = 0). Otherwise, σ is called orthogonal.
According to [5, (2.6)], σ is orthogonal if and only if 1 /∈ Alt(A, σ), where
Alt(A, σ) = {x − σ(x) x ∈ A}. The discriminant of an orthogonal involution
σ is denoted by disc σ (see [5, (7.1)]). An involution σ is called isotropic if
σ(x)x = 0 for some nonzero element x ∈ A. Otherwise, σ is called anisotropic.
We will frequently use the following result. Recall that if u is a unit in a
central simple algebra A, the inner automorphism of A induced by u is defined
as Int(u)(x) = uxu−1 for x ∈ A.
Proposition 2.1. Let α1, · · · , αn ∈ F × and let u ∈ Mn(F ) be the diagonal ma-
trix diag(α1, · · · , αn). Consider the involution σ = Int(u) ◦ t on Mn(F ), where t
is the transpose involution. If (V, b) is the diagonal bilinear space hα1, · · · , αni,
then (Mn(F ), σ) ≃ (EndF (V ), σb).
Proof. See [5, pp. 13-14].
2
3 The alternator form
For a central simple algebra with orthogonal involution (A, σ) over F we use
the following notation:
S(A, σ) = {x ∈ A σ(x)x ∈ F ⊕ Alt(A, σ)}.
In other words, x ∈ S(A, σ) if and only if there exists a unique element α ∈ F
such that σ(x)x + α ∈ Alt(A, σ). We denote the element α by qσ(x). Hence,
qσ : S(A, σ) → F is a map satisfying
σ(x)x + qσ(x) ∈ Alt(A, σ)
for x ∈ S(A, σ).
Lemma 3.1. Let (A, σ) be a central simple algebra with involution over F . If
x ∈ Alt(A, σ), then σ(y)xy ∈ Alt(A, σ) for every y ∈ A.
Proof. Write x = z − σ(z) for some z ∈ A. Then
σ(y)xy = σ(y)(z − σ(z))y = σ(y)zy − σ(σ(y)zy) ∈ Alt(A, σ).
Lemma 3.2. Let (A, σ) be a central simple algebra with orthogonal involution
over F . Then
(i) S(A, σ) is a (unitary) F -subalgebra of A.
(ii) qσ(λx + y) = λ2qσ(x) + qσ(y) and qσ(xy) = qσ(x)qσ(y) for every λ ∈ F
and x, y ∈ S(A, σ).
Proof. For every λ ∈ F we have σ(λ)λ + λ2 = 0 ∈ Alt(A, σ), so F ⊆ S(A, σ).
Let x, y ∈ S(A, σ) and λ ∈ F . Set α = qσ(x) ∈ F and β = qσ(y) ∈ F . Then
σ(λx+ y)(λx+ y)+ λ2α+ β = λ2(σ(x)x+ α)+ (σ(y)y + β)+ σ(λx)y − σ(σ(λx)y).
Hence, σ(λx + y)(λx + y) + λ2α + β ∈ Alt(A, σ), which implies that λx + y ∈
S(A, σ) and qσ(λx+y) = λ2α+β = λ2qσ(x)+qσ(y). Similarly, using Lemma 3.1
we have
σ(xy)(xy) + αβ = σ(y)σ(x)xy + αβ = σ(y)(σ(x)x + α)y + ασ(y)y + αβ
= σ(y)(σ(x)x + α)y + α(σ(y)y + β) ∈ Alt(A, σ).
Hence, xy ∈ S(A, σ) and qσ(xy) = αβ = qσ(x)qσ(y), proving the result.
Corollary 3.3. Let (A, σ) be a central simple algebra with orthogonal involution
over F . Then qσ is a totally singular quadratic form on S(A, σ).
Proof. The result follows from Lemma 3.2 (ii).
Definition 3.4. Let (A, σ) be a central simple algebras with orthogonal invo-
lution over F . We call S(A, σ) the alternator subalgebra of (A, σ). We also call
the quadratic form qσ the alternator form of (A, σ).
Lemma 3.5. Let (A, σ) and (A′, σ′) be two central simple algebras with ortho-
gonal involution over F . If f : (A, σ) ∼−→ (A′, σ′) is an isomorphism of algebras
with involution, the restriction of f to S(A, σ) defines an isometry (S(A, σ), qσ)
∼−→ (S(A′, σ′), qσ′ ).
3
Proof. For every x ∈ S(A, σ) we have σ(x)x + qσ(x) ∈ Alt(A, σ), which implies
that f (σ(x)x + qσ(x)) ∈ Alt(A′, σ′). Hence, σ′(f (x))f (x) + qσ(x) ∈ Alt(A′, σ′),
i.e., f (x) ∈ S(A′, σ′) and qσ′ (f (x)) = qσ(x).
The following definition was given in [2].
Definition 3.6. An involution σ on a central simple algebra A is called direct
if for every x ∈ A the condition σ(x)x ∈ Alt(A, σ) implies that x = 0.
Theorem 3.7. For an orthogonal involution σ on a central simple F -algebra
A the following conditions are equivalent:
(1) σ is direct.
(2) qσ is anisotropic.
(3) S(A, σ) is a field.
Moreover, if these conditions hold, then x2 ∈ F for all x ∈ S(A, σ).
Proof. The implication (1) ⇒ (2) is evident.
(2) ⇒ (3) : Since S(A, σ) is a subalgebra of A, it suffices to show that (i)
S(A, σ) contains no zero devisor; (ii) x−1 ∈ S(A, σ) for every nonzero element
x ∈ S(A, σ); and (iii) S(A, σ) is commutative.
Suppose that xy = 0 for some 0 6= x ∈ S(A, σ) and y ∈ A. Set α = qσ(x),
so that σ(x)x + α ∈ Alt(A, σ). By Lemma 3.1 we have
ασ(y)y = 0 + ασ(y)y = σ(y)σ(x)xy + ασ(y)y = σ(y)(σ(x)x + α)y ∈ Alt(A, σ).
Since qσ is anisotropic we have α 6= 0. Hence, y ∈ S(A, σ) and qσ(y) = 0.
Again, the anisotropy of qσ implies that y = 0, proving (i).
To prove (ii) let 0 6= x ∈ S(A, σ) and α = qσ(x) 6= 0, so that σ(x)x + α ∈
Alt(A, σ). By Lemma 3.1 we have σ(x−1)(σ(x)x + α)x−1 ∈ Alt(A, σ), i.e.,
ασ(x−1)(x−1) + 1 ∈ Alt(A, σ). It follows that σ(x−1)(x−1) + α−1 ∈ Alt(A, σ),
so x−1 ∈ S(A, σ).
Finally, if x, y ∈ S(A, σ), then Lemma 3.2 implies that
qσ(xy + yx) = qσ(xy) + qσ(yx) = qσ(x)qσ(y) + qσ(y)qσ(x) = 0.
Since qσ is anisotropic we get xy = yx, proving (iii).
(3) ⇒ (1) : Suppose that σ(x)x ∈ Alt(A, σ) for some x ∈ A. Then x ∈
S(A, σ) and qσ(x) = 0. If x 6= 0 then x is a unit, because S(A, σ) is a field. Since
σ(x)x ∈ Alt(A, σ), Lemma 3.1 implies that 1 = σ(x−1)σ(x)xx−1 ∈ Alt(A, σ).
This contradicts the orthogonality of σ.
To prove the last statement of the result, let x ∈ S(A, σ) and set α = qσ(x).
By 3.2 we have qσ(x2) = α2 = qσ(α), so qσ(x2 + α) = 0. As qσ is anisotropic,
we get x2 = α ∈ F .
Lemma 3.8. ([5, (2.26)]) Let (A, σ) be a central simple algebra with orthogonal
involution over F . Then the set Sym(A, σ) generates A as an (associative)
F -algebra.
4
Proof. If degF A > 2, the result follows from [5, (2.26)]. Suppose that degF A =
2. Let B ⊆ A be the subalgebra of A generated by Sym(A, σ). Using the idea of
the proof of [5, (2.26)], it is enough to show that BK = AK for some extension
K of F . Choose an extension K/F with (A, σ)K ≃ (M2(K), t). The conclusion
now easily follows by identifying Sym(A, σ)K with the set of matrices of the
form (cid:0) a b
b c(cid:1), where a, b, c ∈ K.
Proposition 3.9. Let (A, σ) be a central simple algebra with orthogonal invo-
lution over F . If S(A, σ) ⊆ Sym(A, σ), then σ is direct.
Proof. Suppose that σ(x)x ∈ Alt(A, σ) for some x ∈ A. Then x ∈ S(A, σ),
which implies that σ(x) = x. We claim that Sym(A, σ) ⊆ CA(x), where CA(x)
is the centralizer of x in A. Let y ∈ Sym(A, σ). By Lemma 3.1 we have
σ(xy)xy = σ(y)σ(x)xy ∈ Alt(A, σ),
hence xy ∈ S(A, σ) ⊆ Sym(A, σ). It follows that yx = σ(y)σ(x) = σ(xy) = xy,
because the elements x, y and xy are all symmetric. This proves the claim.
By Lemma 3.8, Sym(A, σ) generates A as an F -algebra. Hence, CA(x) = A,
i.e., x ∈ F . Since σ is orthogonal, the condition σ(x)x ∈ Alt(A, σ) implies that
x = 0, so σ is direct.
Since every direct involution is anisotropic, one can use Theorem 3.7 and
Proposition 3.9 to find some sufficient conditions for anisotropy of orthogonal
involutions:
Corollary 3.10. Let (A, σ) be a central simple algebra with orthogonal involu-
tion over F . If any of these conditions is satisfied, then σ is anisotropic: (i) qσ
is anisotropic. (ii) S(A, σ) is a field. (iii) S(A, σ) ⊆ Sym(A, σ).
Lemma 3.11. Let (V, b) be a symmetric non-alternating bilinear space over F .
(i) If x ∈ EndF (V ), then b(x(v), x(v)) = qσb (x)b(v, v) for every v ∈ V .
(ii) If b represents 1, then D(qσb ) ⊆ D(b).
Proof. Let α = qσb (x), so that σb(x)x + α ∈ Alt(EndF (V ), σb). Write σb(x)x =
y − σb(y) − α for some y ∈ EndF (V ). For every v ∈ V we have
b(x(v), x(v)) = b((σb(x)x)(v), v) = b((y − σb(y) − α)(v), v)
= b(y(v), v) − b(σb(y)(v), v) − αb(v, v)
= b(y(v), v) − b(v, y(v)) − αb(v, v) = αb(v, v).
This proves the first part. The second part follows by applying (i) to a vector
v ∈ V with b(v, v) = 1.
Remark 3.12. The converse of Proposition 3.9 does not hold in general. To
construct a counter-example, let hhα, βii be an anisotropic bilinear Pfister form
over F and let u be the diagonal matrix diag(1, α, β, αβ + 1). Consider the
involution σ = Int(u) ◦ t on M4(F ). By Proposition 2.1 we have (M4(F ), σ) ≃
(EndF (V ), σb), where (V, b) is the diagonal bilinear space h1, α, β, αβ +1i. Since
5
b is anisotropic, the form qσ is also anisotropic by Lemma 3.11 (ii). Hence, σ
is direct by Theorem 3.7. Let
0
0 (αβ)−1 β−1
0
1
0 1+(αβ)−1
0
0
0 α(1+αβ)−1
(1+αβ)−1
0
0
0
x =
∈ M4(F ).
Computations shows that (σ(x)x + β−1I4)u ∈ Alt(M4(F ), t), where I4 is the
4 × 4 identity matrix. By [5, (2.7)] we have σ(x)x + β−1I4 ∈ Alt(M4(F ), σ), so
x ∈ S(M4(F ), σ). On the other hand
xu = 0 β−1
0 α+β−1 0 0! /∈ Sym(M4(F ), t),
1 0
0 α
0 1
0
1
0
0
which implies that x /∈ Sym(M4(F ), σ), thanks to [5, (2.7)].
x ∈ S(M4(F ), σ) \ Sym(M4(F ), σ).
It follows that
Lemma 3.13. Let t be the transpose involution on Mn(F ). Then
(i) Q(qt) = F 2.
(ii) qt ≃ h1iq ⊥ (n2 − n) × h0iq.
Proof. (i) Clearly, we have F 2 ⊆ Q(qt). The converse inclusion follows from
Lemma 3.11 (ii) and the fact that the transpose involution is the adjoint invo-
lution of the bilinear form n × h1i (see Proposition 2.1).
(ii) Using the first part and the isometry h1, 1iq ≃ h1, 0iq we have qt ≃
h1iq ⊥ k × h0iq for some non-negative integer k. We claim that k = n2 − n.
Let W = {x ∈ S(Mn(F ), t) qt(x) = 0}. Then W is a k-dimensional vector
space over F . A matrix x = (xij ) ∈ Mn(F ) belongs to W if and only if
xtx ∈ Alt(Mn(F ), t). Note that Alt(Mn(F ), t) is the set of symmetric matrices
ij = 0 for
with zero diagonal. Hence, xtx ∈ Alt(Mn(F ), t) if and only if Pn
j = 1, · · · , n, or equivalently
i=1 x2
i=1 xij = 0,
for j = 1, · · · , n.
(1)
Hence, W is the set of answers of the homogeneous system of linear equations
(1) with n2 unknowns xij , i, j = 1, · · · , n. This set is a vector space of dimension
n2 − n over F , hence k = n2 − n.
Pn
Theorem 3.14. Let (A, σ) be a central simple algebra of degree n with ortho-
gonal involution over F . If A splits, then (A, σ) ≃ (Mn(F ), t) if and only if
qσ ≃ h1iq ⊥ (n2 − n) × h0iq.
Proof. The 'only if' implication follows from Lemma 3.5 and Lemma 3.13.
To prove the converse, we may identify (A, σ) = (EndF (V ), σb), where (V, b)
is a symmetric non-alternating bilinear space over F . By [6, (2.1)] there exist
unique integers m, k and a1, · · · , am ∈ F such that
b ≃ ban ⊥ M(a1) ⊥ · · · ⊥ M(am) ⊥ k × H,
(2)
where ban is an anisotropic bilinear form, M(ai) = hai, aii and H is the hyper-
bolic plane. Let
U = {x ∈ S(EndF (V ), σb) qσb (x) = 0} and W = {v ∈ V b(v, v) = 0}.
6
Then U and W are two vector spaces over F . We have dimF U = n2−n, because
qσ ≃ h1iq ⊥ (n2 − n) × h0iq. Also, by [6, (2.1)] we have dimF W = 2k + m.
On the other hand Lemma 3.11 (i) implies that x(V ) ⊆ W for every x ∈ U ,
i.e., U ⊆ HomF (V, W ). By dimension count we get dimF W > n − 1. However,
we have W 6= V , because b is not alternating. Hence, dimF W = n − 1, i.e.,
2k + m = n − 1. By (2) we have n = dimF ban + 2k + 2m, which implies
that dimF ban + m = 1.
It follows that either ban is trivial and m = 1 or
dimF ban = 1 and m = 0. Hence, either b ≃ hα, αi ⊥ k × H or b ≃ hαi ⊥ k × H
for some α ∈ F ×. Using the isometry hαi ⊥ H ≃ hα, α, αi in [4, (1.16)], we get
b ≃ n × hαi. Hence, (A, σ) ≃ (Mn(F ), t) by Proposition 2.1.
The next example shows that for n > 2 there exists a central simple algebra
with orthogonal involution (A, σ) of degree n over F such that qσ = h1iq. Note
that for every algebra with involution (A, σ) over F we have F ⊆ S(A, σ).
Hence, the form h1iq is always a subform of the alternator form qσ.
Example 3.15. For α1, · · · , αn ∈ F × let u be the diagonal n × n matrix
diag(α1, · · · , αn) and consider the involution σ = Int(u) ◦ t on Mn(F ). Let
b = hα1, · · · , αni. By Proposition 2.1 we have (M4(F ), σ) ≃ (EndF (V ), σb),
where V is an underlying vector space of b. Let x = (xij ) ∈ Mn(F ). We first
claim that x ∈ S(Mn(F ), σ) with qσ(x) = λ ∈ F if and only if
α−1
1 x2
1i + · · · + α−1
n x2
ni = α−1
i λ for i = 1, · · · , n.
(3)
By definition x ∈ S(Mn(F ), σ) (with qσ(x) = λ) if and only if
y := σ(x)x + λIn ∈ Alt(Mn(F ), σ).
By [5, (2.4)] we have Alt(Mn(F ), σ) = u · Alt(Mn(F ), t), so y ∈ Alt(Mn(F ), σ)
if and only if u−1y ∈ Alt(Mn(F ), t). Since y ∈ Sym(Mn(F ), σ) we have u−1y ∈
Sym(Mn(F ), t) by [5, (2.4)]. Hence, x ∈ S(Mn(F ), σ) if and only if u−1y has
zero diagonal. Write u−1y = (yij ) for some yij ∈ F , 1 6 i, j 6 n. As y =
uxtu−1x + λIn, computation shows that
n x2
i λ for i = 1, · · · , n.
1i + · · · + α−1
ni + α−1
yii = α−1
1 x2
We have yii = 0 if and only if (3) is satisfied, as claimed.
Now, if n > 2 and hhα1, · · · , αnii is an anisotropic bilinear Pfister form, then
nn and xij = 0 for i 6= j. It follows that
(3) implies that λ = x2
λ ∈ F 2 and x is a scalar (matrix). Hence, S(A, σ) = F and qσ = h1iq.
11 = · · · = x2
Remark 3.16. Example 3.15 shows that the alternator form does not necessar-
ily classify orthogonal involutions on a given central simple algebra. Also, using
Example 3.15 one can show that the inclusion Q(qσb ) ⊆ Q(b) in Lemma 3.11
Indeed, with the notation of Example 3.15 set b′ = α1 · b.
could be strict.
Then b′ represents 1 and (EndF (V ), σb) ≃ (EndF (V ), σb′ ) (see [5, p. 1]). By
Lemma 3.5 we have Q(qσb′ ) = Q(qσb ) = F 2. Since b is anisotropic we have
α2 /∈ F 2, hence α2 ∈ Q(b′) \ Q(qσb′ ).
4 Applications to totally decomposable involu-
tions
A quaternion algebra over F is a central simple algebra of degree 2. An algebra
with involution (A, σ) over F is called totally decomposable if it decomposes
7
Nn
into tensor products of quaternion F -algebras with involution. Let (A, σ) ≃
i=1(Qi, σi) be a totally decomposable algebra with orthogonal involution over
F . By [5, (2.23)] every σi is an orthogonal involution. Write disc σi = αiF ×2 ∈
F ×/F ×2 for some αi ∈ F ×, i = 1, · · · , n. As in [3] we denote the bilinear Pfister
form hhα1, · · · , αnii by Pf(A, σ). By [3, (7.5)], Pf(A, σ) is independent of the
decomposition of (A, σ). Also, as observed in [7] there exists a unique, up to
isomorphism, F -algebra Φ(A, σ) ⊆ F ⊕ Alt(A, σ) of dimension 2n satisfying: (i)
x2 ∈ F for x ∈ Φ(A, σ); (ii) the centralizer of Φ(A, σ) in A coincides with Φ(A, σ)
itself; (iii) Φ(A, σ) is generated, as an F -algebra by n elements. According to
[7, (5.5)] the algebra Φ(A, σ) may be considered as an underlying vector space
of Pf(A, σ) such that
Pf(A, σ)(x, x) = x2
for x ∈ Φ(A, σ).
Finally, let x ∈ Φ(A, σ) and set α = x2 ∈ F . Then σ(x)x + α = x2 + α = 0 ∈
Alt(A, σ). Hence, Φ(A, σ) ⊆ S(A, σ) and
qσ(x) = Pf(A, σ)(x, x) = x2
for x ∈ Φ(A, σ).
The following theorem complements some results in [3] and [7].
Theorem 4.1. For a totally decomposable algebra with orthogonal involution
(A, σ) over F the following conditions are equivalent: (1) σ is anisotropic. (2)
σ is direct. (3) Pf(A, σ) is anisotropic. (4) qσ is anisotropic. (5) Φ(A, σ) is a
field. (6) S(A, σ) is a field. (7) Φ(A, σ) = S(A, σ). (8) S(A, σ) ⊆ Sym(A, σ).
In particular, if these conditions hold, the algebra Φ(A, σ) is uniquely deter-
mined.
Proof. The equivalences (1) ⇔ (2) ⇔ (3) can be found in [3] (see [3, (6.1), (6.2)
and (7.5)]). The equivalences (2) ⇔ (4) ⇔ (6) are proved in Theorem 3.7 and
(1) ⇔ (5) follows from [7, (6.6)] and [3, (6.2)]. Suppose that is S(A, σ) is a
field. Since Φ(A, σ) ⊆ S(A, σ) and Φ(A, σ) is maximal commutative, we get
Φ(A, σ) = S(A, σ). This proves (6) ⇒ (7). The implication (7) ⇒ (8) is evident
and (8) ⇒ (2) follows from Proposition 3.9.
Lemma 4.2. Let K/F be a separable quadratic extension and let b be a sym-
metric bilinear form over F . Then D(bK) ∩ F = D(b).
Proof. Clearly, we have D(b) ⊆ D(bK) ∩ F . Suppose that α ∈ D(bK) ∩ F . Let
V be an underlying vector space of b. Write K = F (η) for some η ∈ K with
δ := η2 + η ∈ F . Then α = bK(u ⊗ 1 + v ⊗ η, u ⊗ 1 + v ⊗ η) for some u, v ∈ V .
Thus
α = (b(u, u) + δb(v, v)) + η(b(u, v) + b(v, u) + b(v, v))
= (b(u, u) + δb(v, v)) + ηb(v, v).
Since α ∈ F we get b(v, v) = 0. Hence, α = b(u, u) ∈ D(b), proving the
result.
Proposition 4.3. If (A, σ) is a totally decomposable algebra with orthogonal
involution over F , then D(qσ) = D(Pf(A, σ)).
8
Nn
Proof. Let b = Pf(A, σ). Since b(x, x) = x2 = qσ(x) for every x ∈ Φ(A, σ) ⊆
S(A, σ) we have D(b) ⊆ D(qσ). To prove the converse inclusion, let (A, σ) ≃
i=1(Qi, σi) be a decomposition of (A, σ) into quaternion algebras with invo-
lution. For i = 0, · · · , n, define a field Ki inductively as follows: set K0 = F
and suppose that Ki is defined. If Ki splits A, set Ki+1 = Ki. Otherwise, let
r be the minimal number for which Ki does not split Qr. Then Qr ⊗F Ki is a
division algebra over Ki. Let Ki+1 be a maximal separable subfield of Qr ⊗ Ki.
Note that for i = 0, · · · , n − 1, Ki may be identified with a subfield of Ki+1.
Also, either Ki+1 = Ki or Ki+1/Ki is a separable quadratic extension. Set
L := Kn, so that AL splits.
By [3, (7.5)], we may identify (A, σ)L = (EndL(V ), σbL ). Using Lemma 3.11
we get D(qσL ) ⊆ D(bL). If x ∈ S(A, σ) and α = qσ(x), then x ⊗ 1 ∈ S((A, σ)L)
and qσL (x ⊗ 1) = α ⊗ 1. Hence, by identifying F ⊗ F ⊆ A ⊗ F with F we have
D(qσ) ⊆ D(qσL ). It follows that D(qσ) ⊆ D(bL). By 4.2 and induction on
n we have D(bL) ∩ F = D(b) ⊆ D(qσL ). Hence, D(qσ) ⊆ D(b), proving the
result.
Lemma 4.4. Let b and b′ be two isotropic bilinear n-fold Pfister forms over F .
Then b ≃ b′ if and only if Q(b) = Q(b′).
Proof. The 'only if'
implication is evident. To prove the converse, choose
positive integers r and r′ and anisotropic bilinear Pfister forms c and c′ over
F such that b ≃ hh1iir ⊗ c and b′ ≃ hh1iir′
⊗ c′, where hh1iis is the s-fold
Pfister form hh1, · · · , 1ii (see [1, p. 909]). Since c and c′ are anisotropic we
have dimF 2 Q(c) = 2n−r and dimF 2 Q(c′) = 2n−r′
. As Q(b) = Q(c) and
Q(b′) = Q(c′), the assumption implies that Q(c) = Q(c′), hence r = r′. The
conclusion now follows from [1, (A.8)].
Corollary 4.5. Let (A, σ) and (A′, σ′) be totally decomposable algebras with
isotropic orthogonal involution over F . If qσ ≃ qσ′ then Pf(A, σ) ≃ Pf(A′, σ′).
Proof. The result follows from Proposition 4.3 and Lemma 4.4.
Theorem 4.6. Let (A, σ) and (A′, σ′) be totally decomposable algebras with
isotropic orthogonal involution over F . Then (A, σ) ≃ (A′, σ′) if and only if
A ≃ A′ and qσ ≃ qσ′ .
Proof. The 'only if' implication follows from Lemma 3.5 and the converse follows
from Corollary 4.5 and [7, (6.5)].
Notation 4.7. Let (A, σ) be a totally decomposable algebra with anisotropic
orthogonal involution over F . By Theorem 4.1 we have S(A, σ) = Φ(A, σ) ⊆
F ⊕ Alt(A, σ). We denote the set S(A, σ) ∩ Alt(A, σ) by S ′(A, σ). We also
denote by q′
σ the restriction of qσ to S ′(A, σ).
Note that we have S(A, σ) = F ⊕ S ′(A, σ) and qσ ≃ h1iq ⊥ q′
σ, because
qσ(1) = 1. Also, as observed in [7, p. 223] one has an orthogonal decomposition
σ(x) = x2 =
Φ(A, σ) = F ⊥ S ′(A, σ) with respect to Pf(A, σ). It follows that q′
b′(x, x) for x ∈ S ′(A, σ), where b′ is the pure subform of Pf(A, σ). Hence,
we have the following result (recall that for a symmetric bilinear space (V, b)
over F , there exists a unique totally singular quadratic form ϕb on V given by
ϕb(x) = b(x, x)).
9
Lemma 4.8. Let (A, σ) be a totally decomposable algebra with anisotropic or-
thogonal involution over F and let b = Pf(A, σ). Then qσ = ϕb and q′
σ = ϕb′ ,
where b′ is the pure subform of b.
Let (A, σ) be a totally decomposable algebra of degree 2n with orthogonal
involution over F . Then there exists a set {v1, · · · , vn} consisting of units such
that Φ(A, σ) ≃ F [v1, · · · , vn] and vi1 · · · vis ∈ Alt(A, σ) for every 1 6 s 6 n
and 1 6 i1 < · · · < is 6 n (see [7, (5.1)] for more details). As in [7] we
call {v1, · · · , vn} a set of alternating generators of Φ(A, σ). According to [7,
(5.3) and (5.5)], if {v1, · · · , vn} is a set of alternating generators of Φ(A, σ) and
αi = v2
i ∈ F × for i = 1, · · · , n, then Pf(A, σ) ≃ hhα1, · · · , αnii.
Proposition 4.9. Let (A, σ) and (A′, σ′) be totally decomposable algebras with
anisotropic orthogonal involution over F . Then q′
σ′ if and only if Pf(A, σ)
≃ Pf(A′, σ′).
σ ≃ q′
Proof. The 'if' implication follows from Lemma 4.8. To prove the converse, let
degF A = 2n and let {x1, · · · , xn} be a set of alternating generators of Φ(A, σ).
Set αi = x2
i ∈ F ×, so that Pf(A, σ) ≃ hhα1, · · · , αnii. By dimension count the
set
{xi1 · · · xis 1 6 s 6 n and 1 6 i1 < · · · < is 6 n},
is a basis of S ′(A, σ) over F . Let f : (S ′(A, σ), q′
isometry and set x′
i = f (xi) ∈ S ′(A′, σ′), i = 1, · · · , n. Then
σ) ∼−→ (S ′(A′, σ′), q′
σ′ ) be an
x′2
i = q′
σ′ (x′
i) = q′
σ(xi) = αi
for i = 1, · · · , n.
(4)
We claim that f (xi1 · · · xis ) = x′
Since S(A′, σ′) is an F -algebra we have x′
i1 · · · x′
is for 1 6 s 6 n and 1 6 i1 < · · · < is 6 n.
i1 · · · x′
is ∈ S(A′, σ′). We also have
qσ′ (f (xi1 · · · xis ) + x′
i1 · · · x′
is ) = qσ(xi1 · · · xis ) + qσ′ (x′
is )
i1 · · · x′
is )2.
= (xi1 · · · xis )2 + (x′
i1 · · · x′
(5)
Since S(A, σ) = Φ(A, σ), S(A, σ) is commutative. Similarly, S(A′, σ′) is also
commutative. Hence, using (5) and (4) we get
qσ′ (f (xi1 · · · xis ) + x′
i1 · · · x′
is ) = x2
i1 · · · x2
is + x′2
i1 · · · x′2
is = 0.
As qσ′ is anisotropic we get f (xi1 · · · xis ) = x′
is , proving the claim. In
is ∈ S ′(A′, σ′) ⊆ Alt(A′, σ′) for 1 6 s 6 n and
particular, we have x′
1 6 i1 < · · · < is 6 n. Hence, {x′
n} is a set of alternating generators
of Φ(A′, σ′). The relation (4) now implies that Pf(A′, σ′) ≃ hhα1, · · · , αnii ≃
Pf(A, σ).
1, · · · , x′
i1 · · · x′
i1 · · · x′
Using Lemma 3.5, [7, (6.5)] and Proposition 4.9 we have the following ana-
logue of Theorem 4.6.
Theorem 4.10. Let (A, σ) and (A′, σ′) be totally decomposable algebras with
anisotropic orthogonal involution over F . Then (A, σ) ≃ (A′, σ′) if and only if
A ≃ A′ and q′
σ ≃ q′
σ′ .
10
References
[1] J. Arason, R. Baeza, Relations in I n and I nW
q in characteristic 2. J. Algebra 314
(2007), no. 2, 895 -- 911.
[2] A. Dolphin, Decomposition of algebras with involution in characteristic 2. J. Pure Appl.
Algebra 217 (2013), no. 9, 1620 -- 1633.
[3] A. Dolphin, Orthogonal Pfister involutions in characteristic two. J. Pure Appl. Algebra
218 (2014), no. 10, 1900 -- 1915.
[4] R. Elman, N. Karpenko, A. Merkurjev, The algebraic and geometric theory of quadratic
forms. American Mathematical Society Colloquium Publications, 56. American Math-
ematical Society, Providence, RI, 2008.
[5] M.-A. Knus, A. S. Merkurjev, M. Rost, J.-P. Tignol, The book of involutions. American
Mathematical Society Colloquium Publications, 44. American Mathematical Society,
Providence, RI, 1998.
[6] A. Laghribi, P. Mammone. Hyper-isotropy of bilinear forms in characteristic 2. Con-
temporary Mathematics, 493 (2009), 249-269.
[7] M. G. Mahmoudi, A.-H. Nokhodkar, On totally decomposable algebras with involution
in characteristic two. J. Algebra 451 (2016), 208 -- 231.
A.-H. Nokhodkar, [email protected],
Department of Pure Mathematics, Faculty of Science, University of Kashan, P. O.
Box 87317-51167, Kashan, Iran.
11
|
1705.04501 | 3 | 1705 | 2018-11-05T18:49:09 | Uniqueness of the von Neumann continuous factor | [
"math.RA",
"math.OA"
] | For a division ring $D$, denote by $\mathcal M_D$ the $D$-ring obtained as the completion of the direct limit $\varinjlim_n M_{2^n}(D)$ with respect to the metric induced by its unique rank function. We prove that, for any ultramatricial $D$-ring $\mathcal B$ and any non-discrete extremal pseudo-rank function $N$ on $\mathcal B$, there is an isomorphism of $D$-rings $\overline{\mathcal B} \cong \mathcal M_D$, where $\overline{\mathcal B}$ stands for the completion of $\mathcal B$ with respect to the pseudo-metric induced by $N$. This generalizes a result of von Neumann. We also show a corresponding uniqueness result for $*$-algebras over fields $F$ with positive definite involution, where the algebra $\mathcal M_F$ is endowed with its natural involution coming from the $*$-transpose involution on each of the factors $M_{2^n}(F)$. | math.RA | math |
UNIQUENESS OF THE VON NEUMANN CONTINUOUS FACTOR
PERE ARA AND JOAN CLARAMUNT
Abstract. For a division ring D, denote by MD the D-ring obtained as the completion of
the direct limit lim−→n
M2n(D) with respect to the metric induced by its unique rank function.
We prove that, for any ultramatricial D-ring B and any non-discrete extremal pseudo-rank
function N on B, there is an isomorphism of D-rings B ∼= MD, where B stands for the
completion of B with respect to the pseudo-metric induced by N . This generalizes a result of
von Neumann. We also show a corresponding uniqueness result for ∗-algebras over fields F
with positive definite involution, where the algebra MF is endowed with its natural involution
coming from the ∗-transpose involution on each of the factors M2n(F ).
1. Introduction
Murray and von Neumann showed in [13, Theorem XII] a uniqueness result for approx-
imately finite von Neuman algebra factors of type II1. This unique factor R is called the
hyperfinite II1-factor and plays a very important role in the theory of von Neumann algebras.
It was shown later by Alain Connes [6] that the factor R is characterized (among II1-factors)
by various other properties, such as injectivity (in the operator space sense), semidiscrete-
ness or Property P. It is in particular known (e.g.
[18, Theorem 3.8.2]) that, for an infinite
countable discrete group G whose non-trivial conjugacy classes are all infinite, the group von
Neumann algebra N (G) is isomorphic to R if and only if G is an amenable group. (The
groups with the above property on the conjugacy classes are termed ICC-groups.)
For a field K, the direct limit lim−→n
Von Neumann also considered a purely algebraic analogue of the above situation, as follows.
M2n(K) with respect to the block diagonal embeddings
0 x(cid:19) is a (von Neumann) regular ring, which admits a unique rank function (see
x 7→ (cid:18)x 0
M2n(K), denoted here
below for the definition of rank function). The completion of lim−→n
by MK, with respect to the induced rank metric, is a complete regular ring with a unique
rank function, which is a continuous factor, i.e., it is a right and left self-injective ring and
the set of values of the rank function fills the unit interval [0, 1]. There are recent evidences
[7, 8, 9] that the factor MK could play a role in algebra which is similar to the role played
by the unique hyperfinite factor R in the theory of operator algebras. In particular, Elek
has shown in [8] that, if Γ = Z2 ≀ Z is the lamplighter group, then the continuous factor c(Γ)
obtained by taking the rank completion of the ∗-regular closure of C[Γ] in the ∗-algebra U(Γ)
of unbounded operators affiliated to N (Γ), is isomorphic to MC.
Date: November 6, 2018.
2000 Mathematics Subject Classification. Primary 16E50; Secondary 16D70.
Key words and phrases. rank function, von Neumann regular ring, completion, factor, ultramatricial.
Both authors were partially supported by DGI-MINECO-FEDER through the grants MTM2014-53644-P
and MTM2017-83487-P.
1
2
PERE ARA AND JOAN CLARAMUNT
This raises the question of what uniqueness properties the von Neumann factor MK has,
and whether we can formulate similar characterizations to those in the seminal paper by
Connes [6]. As von Neumann had already shown (and was published later by Halperin [16]),
MK is isomorphic to the factor obtained from any factor sequence (pi), that is,
MK
∼= lim−→ Mpi(K),
where (pi) is a sequence of positive integers converging to ∞ and such that pi divides pi+1
for all i. Here the completion is taken with respect to the unique rank function on the direct
limit.
The purpose of this paper is to obtain stronger uniqueness properties of the factor MK.
Specifically, we show that if B is an ultramatricial K-algebra and N is a non-discrete extremal
pseudo-rank function on B, then the completion of B with respect to N is necessarily isomor-
phic to MK. We also derive a characterization of the factor MK by a local approximation
property (see Theorem 2.2). This will be used in [2] to generalize Elek's result to arbitrary
fields K of characteristic 6= 2, using a concrete approximation of the group algebra K[Γ] by
matricial algebras. It is also worth to mention that, as a consequence of our result and [14,
Theorem 2.8], one obtains that the center of an algebra Q satisfying properties (ii) or (iii) in
Theorem 2.2 is the base field K.
Gabor Elek and Andrei Jaikin-Zapirain have recently raised the question of whether, for
any subfield k of C closed under complex conjugation, and any countable amenable ICC-
group G, the rank completion c(k[G]) of the ∗-regular closure of k[G] in U(G) is either of the
form Mn(D) or of the form MD := D ⊗k Mk, where D is a division ring with center k. In
view of this question, it is natural to obtain uniqueness results in the slightly more general
setting of D-rings over a division ring D, and also in the setting of rings with involution,
since in the above situation, the algebras have a natural involution which is essential even to
define the corresponding completions. We address these questions in the final two sections.
2. von Neumann's continuous factor
A ring R is said to be (von Neumann) regular in case for each x ∈ R there exists y ∈ R
such that x = xyx. We refer the reader to [15] for the general theory of regular rings.
We recall the definition of a pseudo-rank function on a general unital ring.
Definition 2.1. A pseudo-rank function on a unital ring R is a function N : R → [0, 1]
satisfying the following properties:
(1) N(1) = 1.
(2) N(a + b) ≤ N(a) + N(b) for all a, b ∈ R.
(3) N(ab) ≤ N(a), N(b) for all a, b ∈ R.
(4) If e, f ∈ R are orthogonal idempotents, then N(e + f ) = N(e) + N(f ).
A rank function on R is a pseudo-rank function N such that N(x) = 0 implies x = 0.
VON NEUMANN FACTOR
3
Any pseudo-rank function N on a ring R induces a pseudo-metric by d(x, y) = N(x − y) for
x, y ∈ R. If, in addition, R is regular, then the completion of R with respect to this pseudo-
metric is again a regular ring R, and R is complete with respect to the unique extension N
of N to a rank function on R ([15, Theorem 19.6]). The space of pseudo-rank functions P(R)
on a regular ring R is a Choquet simplex ([15, Theorem 17.5]), and the completion R of R
with respect to N ∈ P(R) is a simple ring if and only if N is an extreme point in P(R) ([15,
Theorem 19.14]).
For a field K, a matricial K-algebra is a K-algebra which is isomorphic to an algebra of
the form
Mn(1)(K) × Mn(2)(K) × · · · × Mn(k)(K)
for some positive integers n(1), n(2), . . . , n(k). An ultramatricial K-algebra is an algebra
An of a sequence of matricial K-algebras An and
which is isomorphic to a direct limit lim−→n
unital algebra homomorphisms ϕn : An → An+1, see [15, Chapter 15].
Let K be a field. Write M = MK for the rank completion of the direct limit lim−→n
M2n(K)
with respect to its unique rank function. Von Neumann proved a uniqueness property for
M. We are going to extend it to ultramatricial algebras. The proof follows the steps in the
paper by Halperin [16] (based on von Neumann's proof), but the proof is considerably more
involved. Indeed, we will obtain a uniqueness result for the class of continuous factors which
have a local matricial structure.
By a continuous factor we understand a simple, regular, (right and left) self-injective ring
Q of type IIf (see [15, Chapter 10] for the definition of the types and for the structure
theory of regular self-injective rings). It follows from [15, Corollary 21.14] that Q admits a
unique rank function, denoted here by NQ, and that Q is complete in the NQ-metric. Also, it
follows easily from the structure theory of regular self-injective rings ([15, Chapter 10]) that
NQ(Q) = [0, 1].
The adjective "continuous" used here refers to the fact that NQ takes a "continuous" set
of values, in contrast with the algebra of finite matrices, where the rank function takes only
a finite number of values. Note however that any regular self-injective ring R is a right (left)
continuous regular ring, in the technical sense that the lattice of principal right (left) ideals
is continuous, see [15]. The latter property will play no explicit role in the present paper.
We will show the following result:
Theorem 2.2. Let Q be a continuous factor, and assume there exists a dense subalgebra
(with respect to the NQ-metric topology) Q0 ⊆ Q of countable K-dimension. The following
are equivalent:
(i) Q ∼= MK.
(ii) Q ∼= B for a certain ultramatricial K-algebra B, where the completion of B is taken
with respect to the metric induced by an extremal pseudo-rank function on B.
(iii) For every ε > 0 and x1, ..., xn ∈ Q, there exists a matricial K-subalgebra A of Q and
elements y1, ..., yn ∈ A such that
NQ(xi − yi) < ε
(i = 1, . . . , k).
4
PERE ARA AND JOAN CLARAMUNT
(i) =⇒ (ii) =⇒ (iii) is clear. For the proof of the implication (iii) =⇒ (i) we will use a
method similar to the one used in [16]. However the technical complications are much higher
here.
We first prove a lemma, and show the implication (iii) =⇒ (i) assuming that the hypotheses
of the lemma are satisfied. After this is done, we will show how to construct (using (iii)) the
sequences, algebras, and homomorphisms appearing in this lemma.
Given a factor sequence (pi), the natural block-diagonal unital embeddings Mpi(K) →
Mpi+1(K) will be denoted by γi+1,i. If j > i, the map γj,i : Mpi(K) → Mpj (K) will denote the
composition γj,i = γj,j−1◦· · ·◦γi+1,i, and the map γ∞,i : Mpi(K) → lim−→n
Mpn(K) will stand for
the canonical map into the direct limit. By [16], there is an isomorphism MK
Mpn(K),
where the completion is taken with respect to the unique rank function on the direct limit.
We henceforth will identify M = MK with the algebra lim−→n
Notation 2.3. Let (X, d) be a metric space, Y a subset of X and ε > 0. For A ⊆ X, we
write A ⊆ε Y in case each element of A can be approximated by an element of Y up to ε,
that is, for each a ∈ A there exists y ∈ Y such that d(a, y) < ε.
∼= lim−→n
Mpn(K).
Lemma 2.4. Let Q be a continuous factor with unique rank function NQ. Assume there
exists a dense subalgebra Q0 of Q of countable dimension, and let {xn}n be a K-basis of Q0.
Let θ be a real number such that 0 < θ < 1. Assume further that we have constructed
two strictly increasing sequences (qi) and (pi) of natural numbers such that pi divides pi+1,
satisfying
1 >
and
p1
q1
> · · · >
>
pi
qi
pi+1
qi+1
> · · · > θ,
lim
i→∞
= θ,
pi
qi
pi+1
qi+1
− θ <
1
2(cid:16)pi
qi
− θ(cid:17),
for i ≥ 0, where we set p0 = q0 = 1. Moreover, suppose that there exists a sequence of
positive numbers εi < δi := pi
2δi−1 < 2−i for all i ≥ 1),
qi
and matricial subalgebras Ai ⊆ Q together with algebra homomorphisms ρi : Mpi(K) → Q
satisfying the following properties:
− θ for each i (in which case δi < 1
(i) NQ(ρi(1)) = pi
qi
(ii) For each i and each x ∈ ρi(1)Aiρi(1), there exists y ∈ Mpi+1(K) such that
for all i,
(iii) For each z ∈ Mpi(K), we have
NQ(x − ρi+1(y)) < δi ,
NQ(ρi(z) − ρi+1(γi+1,i(z))) < δi ,
(iv) span{x1, ..., xi} ⊆εi Ai (that is, we can approximate every element of span{x1, ..., xi}
by an element of Ai up to εi in rank).
Then there exists an isomorphism ψ : M → eQe, with e ∈ Q an idempotent such that
NQ(e) = θ.
Proof. For a given positive integer i, and for z ∈ Mpi(K), we consider the sequence in Q
VON NEUMANN FACTOR
5
{ρj(γj,i(z))}j≥i.
It is a simple computation to show, using (iii), that for h > j ≥ i we have
(2.1)
NQ(ρh(γh,i(z)) − ρj(γj,i(z))) < δj + · · · + δh−1 .
As a consequence, we obtain
NQ(ρh(γh,i(z)) − ρj(γj,i(z))) < 2−j + · · · + 2−h+1 < 2−j+1,
and the sequence is Cauchy; so we can define ψi : Mpi(K) → Q by
ψi(z) = lim
j
ρj(γj,i(z)) ∈ Q.
Note that ψi+1(γi+1,i(z)) = ψi(z), so the maps {ψi}i give a well-defined algebra homomor-
phism ψ : lim−→i
Mpi(K) → Q, defined by ψ(γ∞,i(z)) = ψi(z) for z ∈ Mpi(K).
Observe that NQ(ρi(z)) = pi
qi
Npi(z) = pi
qi
NM(γ∞,i(z)) for z ∈ Mpi(K), where Npi denotes
the unique rank function on Mpi(K). Therefore
NQ(ψ(γ∞,i(z))) = lim
j
NQ(ρj(γj,i(z))) = lim
j
pj
qj
NM(γ∞,i(z)) = θ · NM(γ∞,i(z))
It follows that NQ(ψ(x)) = θ · NM(x) for every x ∈ lim−→i
Mpi(K), and thus ψ can be extended
to a unital algebra homomorphism ψ : M → eQe, where e := ψ(1) = lim−→i
ρi(1), which
satisfies the identity NQ(ψ(z)) = θ · NM(z) for all z ∈ M. In particular, NQ(e) = θ. Clearly,
ψ is injective.
It remains to show that ψ is surjective onto eQe. Let x ∈ Q, and fix η > 0. Take i large
,
δi <
,
NQ(e − ρi(1)) <
η
5
η
5
enough so that
εi <
η
10
and such that there exists an element ex ∈ span{x1, ..., xi} satisfying NQ(x −ex) < η
By (iv), there exists y ∈ Ai so that NQ(ex − y) < η
NQ(x − y) <
10 .
10 ; hence
η
5
.
We thus have
NQ(exe − ρi(1)yρi(1)) ≤ NQ(exe − exρi(1)) + NQ(exρi(1) − eyρi(1))
+ NQ(eyρi(1) − ρi(1)yρi(1)) <
3
5
η.
On the other hand, it follows from (ii) that there exists z ∈ Mpi+1(K) such that
NQ(ρi(1)yρi(1) − ρi+1(z)) < δi <
η
5
.
Also, for i + 1 < h, we get from (2.1):
NQ(ρh(γh,i+1(z)) − ρi+1(z)) < δi+1 + · · · + δh−1 < δi+1(cid:16)1 + · · · + 2−h+i+2(cid:17) < 2δi+1 < δi ,
6
PERE ARA AND JOAN CLARAMUNT
and so letting h → ∞ leads to
NQ(ψ(γ∞,i+1(z)) − ρi+1(z)) ≤ δi <
η
5
.
Using the above inequalities, we obtain
NQ(exe − ψ(γ∞,i+1(z))) ≤ NQ(exe − ρi(1)yρi(1)) + NQ(ρi(1)yρi(1) − ρi+1(z))
+ NQ(ρi+1(z) − ψ(γ∞,i+1(z))) ≤
3
5
η +
1
5
η +
1
5
η = η.
By choosing a decreasing sequence ηn → 0, it follows that there is a sequence {wn}n of
elements in M such that limn ψ(wn) = exe. Since NM(wi − wj) = θ−1 · NQ(ψ(wi) − ψ(wj))
for all i, j, it follows that {wn}n is a Cauchy sequence in M, and hence convergent to w ∈ M
satisfying ψ(w) = exe. This shows that ψ is surjective.
(cid:3)
We now show how Theorem 2.2 follows from Lemma 2.4, assuming we are able to show
that the hypotheses of that lemma are satisfied. This indeed follows as in [16]. Take θ = 1/2
and apply Lemma 2.4 to obtain an isomorphism ψ : M → eQe, where NQ(e) = 1/2. Since
eQ ∼= (1 − e)Q as right Q-modules (by [15, Corollary 9.16]), we get an isomorphism of K-
algebras Q ∼= M2(eQe). Hence, we obtain an isomorphism M ∼= M2(M) ∼= M2(eQe) ∼= Q.
It remains to show that the hypotheses of Lemma 2.4 are satisfied. We need a preliminary
lemma, which might be of independent interest.
Lemma 2.5. Let p be a positive integer. Then there exists a constant K(p), depending only
on p, such that for any field K, for any ε > 0, for any pair A ⊆ B, where B is a unital K-
algebra and A is a unital regular subalgebra of B, for any pseudo-rank function N on B, and
for every K-algebra homomorphism ρ : Mp(K) → B such that {ρ(eij) i, j = 1, . . . , p} ⊆ε A
with respect to the N-metric, where eij denote the canonical matrix units in Mp(K), there
exists a K-algebra homomorphism ψ : Mp(K) → A such that
N(ρ(eij) − ψ(eij)) < K(p)ε
for 1 ≤, i, j ≤ p.
Proof. We proceed by induction on p. Let p = 1, and let K, ε, A, B, N and ρ : K → B be
as in the statement. Then ρ(1) is an idempotent in B and, by assumption, there is x ∈ A
such that N(ρ(1) − x) < ε. By [15, Lemma 19.3], there exists an idempotent g ∈ A such
x − g ∈ A(x − x2) and it follows that N(ρ(1) − g) < 4ε. Therefore we can take K(1) = 4.
Now assume that p ≥ 2 and that there is a constant K(p − 1) satisfying the property
corresponding to p − 1. Let K, ε, A, B, N and ρ : Mp(K) → B be as in the statement. We
identify Mp−1(K) with the subalgebra of Mp(K) generated by eij with 1 ≤ i, j ≤ p − 1.
By the induction hypothesis, there is a set of (p − 1) × (p − 1) matrix units xij ∈ A (so
that xijxkl = δjkxil for 1 ≤ i, j, k, l ≤ p − 1) satisfying N(ρ(eij) − xij) < K(p − 1)ε for all
1 ≤ i, j ≤ p − 1. By hypothesis, there are z1p, zp1 ∈ A such that N(ρ(e1p) − z1p) < ε and
N(ρ(ep1) − zp1) < ε. Our first task is to modify z1p and zp1 in order to obtain new elements
z′
1p and z′
(2.2)
for 1 ≤ i ≤ p − 1,
p1 such that
z′
1pxi1 = 0 = x1iz′
p1
VON NEUMANN FACTOR
7
with suitable bounds on the ranks. To get the desired elements, we proceed by induction on
i. We will only prove the result for the position (1, p). The element in the position (p, 1) is
built in a similar way. For i = 1, we use that A is regular to obtain an idempotent g1 ∈ A
such that
Note that
z1px11A = g1A.
N(g1) = N(z1px11) = N(z1px11 − ρ(e1p)ρ(e11)) < ε + K(p − 1)ε = (K(p − 1) + 1)ε.
Now take z(1)
1p := (1 − g1)z1p. We get that z(1)
1p x11 = 0 and that
N(z(1)
1p − ρ(e1p)) ≤ N(z1p − ρ(e1p)) + N(g1) < (K(p − 1) + 2)ε.
Iterating this process, we get, for each 1 ≤ i ≤ p−1, an element z(i)
for 1 ≤ j ≤ i and
1p in A such that z(i)
1p xj1 = 0
N(z(i)
1p − ρ(e1p)) < ((2i − 1)K(p − 1) + 2i)ε.
Therefore, taking z′
elements z′
1p, z′
p1 ∈ A satisfying (2.2) and such that
1p = z(p−1)
1p
and the element z′
p1 := z(p−1)
p1
built in a similar fashion, we get
(2.3)
max{N(z′
1p − ρ(e1p)), N(z′
p1 − ρ(ep1))} < ((2p−1 − 1)K(p − 1) + 2p−1)ε.
The next step is to convert z′
p1 into mutually quasi-inverse elements in A. Indeed, we
will replace in addition our original elements x1i and xi1, for 1 ≤ i ≤ p − 1, in order to get
a coherent family of "partial matrix units" y1j, yj1 for 1 ≤ j ≤ p. For this we will use [15,
Lemma 19.3] and its proof. Consider the element x′
p1x11 ∈ A, and note that
11 := x11z′
1p and z′
1pz′
N(x′
11 − ρ(e11)) ≤ 2N(x11 − ρ(e11)) + N(z′
1p − ρ(e1p)) + N(z′
p1 − ρ(ep1))
< (K(p − 1) + 1)2pε,
where we have used the bound given by the induction hypothesis and (2.3). Therefore, we
get
N(x′
11 − (x′
11)2) < 3(K(p − 1) + 1)2pε.
11A ∩ Ax′
11 − g ∈ A(x′
11g = g, so that we get gz′
Now using [15, Lemma 19.3] and its proof, we can find an idempotent g ∈ A such that
g ∈ x′
It follows that g ≤ x11 and
that gx′
p1g = g. Set y11 = g ≤ x11, y1i = gx1i and yi1 = xi1g
for i = 2, . . . , p − 1. Also, set y1p = gz′
p1g. Then we have y1iyj1 = δijy11 for
1 ≤ i, j ≤ p. We have
1p and yp1 = z′
11 − (x′
1pz′
11)2) and x′
11g = g.
11, x′
N(g − ρ(e11)) ≤ N(g − x′
11) + N(x′
11 − ρ(e11))
< 3(K(p − 1) + 1)2pε + (K(p − 1) + 1)2pε = (K(p − 1) + 1)2p+2ε.
8
PERE ARA AND JOAN CLARAMUNT
Using this inequality, we obtain
N(y1p − ρ(e1p)) = N(gz′
1p − ρ(e11)ρ(e1p)) ≤ N(g − ρ(e11)) + N(z′
1p − ρ(e1p))
< (K(p − 1) + 1)2p+2ε + ((2p−1 − 1)K(p − 1) + 2p−1)ε
= ((2p+2 + 2p−1 − 1)K(p − 1) + 2p+2 + 2p−1)ε.
Similar computations give that max{N(y1i − ρ(e1i)), N(yi1 − ρ(ei1)) : i = 1, . . . , p} < ((2p+2 +
2p−1 − 1)K(p − 1) + 2p+2 + 2p−1)ε. Finally, put yij = yi1y1j. We obtain that {yij} is a
complete system of p×p matrix units in A, so that we can define a K-algebra homomorphism
ψ : Mp(K) → A such that ψ(eij) = yij. Moreover we have N(ρ(eij) − ψ(eij)) < K(p)ε, where
K(p) := (2p+3 + 2p − 2)K(p − 1) + (2p+3 + 2p). This concludes the proof.
(cid:3)
We now show that that the hypotheses of Lemma 2.4 are satisfied (assuming condition (iii)
in Theorem 2.2). This is obtained from the next lemma by applying induction (starting with
p0 = q0 = 1 and A0 = K).
Lemma 2.6. Let Q be a continuous factor with unique rank function NQ. Assume there
exists a dense subalgebra Q0 of Q of countable dimension, and let {xn}n be a K-basis of
Q0. Assume that Q satisfies condition (iii) in Theorem 2.2, and let θ be a real number such
that 0 < θ < 1. Let p be a positive integer such that there exist an algebra homomorphism
ρ : Mp(K) → Q, a matricial subalgebra A ⊆ Q, a positive integer m, and ε > 0 such that
q > θ for some positive integer q.
(a) NQ(ρ(1)) = p
(b) {ρ(eij) i, j = 1, . . . , p} ⊆ε A, and span{x1, ..., xm} ⊆ε A.
(c) ε <
q − θ(cid:17), where K(p) is the constant introduced in Lemma 2.5.
48K(p)p2(cid:16) p
1
Then there exist positive integers p′, g, q′, with p′ = gp, a real number ε′ > 0, an algebra
homomorphism ρ′ : Mp′(K) → Q and a matricial subalgebra A′ ⊆ Q such that the following
conditions hold:
(1) NQ(ρ′(1)) = p′/q′.
(2)
0 <
p′
q′ − θ <
1
2(cid:16)p
q
− θ(cid:17).
(3) For each x ∈ ρ(1)Aρ(1) there exists y ∈ Mp′(K) such that
NQ(x − ρ′(y)) <
p
q
− θ.
(4) For each z ∈ Mp(K), we have
NQ(ρ(z) − ρ′(γ(z))) <
p
q
− θ,
where γ : Mp(K) → Mp′(K) = Mp(K)⊗Mg(K) is the canonical unital homomorphism
sending z to z ⊗ 1g.
(5) {ρ′(e′
ij) i, j = 1, . . . , p′} ⊆ε′ A′, and span{x1, ..., xm, xm+1} ⊆ε′ A′, where {e′
ij i, j =
1, . . . , p′} denote the canonical matrix units in Mp′(K).
VON NEUMANN FACTOR
9
(6) ε′ <
1
48K(p′)p′2(cid:16) p′
q′ − θ(cid:17).
Proof. We denote by eij, for 1 ≤ i, j ≤ p, the canonical matrix units in Mp(K). Set f ′ :=
ρ(e11), which is an idempotent in Q with NQ(f ′) = 1/q (because NQ(ρ(1)) = p/q). By
(b) and Lemma 2.5, there exists a K-algebra homomorphism ψ : Mp(K) → A such that
N(ρ(eij) − ψ(eij)) < K(p)ε for 1 ≤ i, j ≤ p. Set f = ψ(e11) ∈ A and observe that
(2.4)
NQ(f − f ′) < K(p)ε.
Since A is matricial, we can write f = f1 + · · · + fk, where f1, f2, . . . , fk are nonzero mutually
orthogonal idempotents belonging to different simple factors of A. We can now consider, for
each 1 ≤ i ≤ k, a set of matrix units {f (i)
is a
minimal idempotent in the simple factor to which fi belongs, and such that
: 1 ≤ j, l ≤ ri} inside fiAfi such that each f (i)
jj
jl
for i = 1, . . . , k. Note that
riXj=1
f (i)
jj = fi
NQ(f ) =
kXi=1
riNQ(f (i)
11 )
so that by [15, Lemma 19.1(e)] and (2.4), we get
(2.5)
1
q
−
kXi=1
(cid:12)(cid:12)(cid:12)
riNQ(f (i)
11 )(cid:12)(cid:12)(cid:12) = NQ(f ′) − NQ(f ) ≤ NQ(f − f ′) < K(p)ε
We now approximate each real number NQ(f (i)
set
11 ) by a rational number pi/qi. Concretely, we
1
i=1 ri)(cid:16) p
q
− θ(cid:17) ,
δ :=
48p(Pk
and take positive integers pi, qi so that 0 < NQ(f (i)
we may assume that qi = q′ for i = 1, . . . , k. Let α′ be such that 1/α′ = Pk
observe that, by using (2.5), we have
11 )−pi/qi < δ. Taking common denominator,
i=1 ripi/q′, and
p/q − p/α′ ≤ ph(cid:12)(cid:12)(cid:12)
1
q
−
kXi=1
riNQ(f (i)
11 )(cid:12)(cid:12)(cid:12) +
ri(cid:17)δ <
< K(p)pǫ + p(cid:16) kXi=1
kXi=1
ri(cid:16)NQ(f (i)
11 ) −
pi
q′(cid:17)i
1
48p
(p/q − θ) +
1
48
(p/q − θ) ≤
1
24
(p/q − θ).
So in particular
(2.6)
p/q − p/α′ <
1
8
(p/q − θ)
10
PERE ARA AND JOAN CLARAMUNT
Now take
Then Pk
λi =
α′piri
q′
and
εi =
λi
pri(cid:16)p
q
− θ(cid:17).
i=1 λi = 1. Moreover λi, εi (and of course pi/q′), i = 1, . . . , k, do not depend on
replacing pi and q′ by piN and q′N respectively, for any integer N ≥ 1, so we can assume
that pi and q′ are arbitrarily large. Taking pi large enough, we see that we can find non-
negative integers p′
(2.7)
i, for 1 ≤ i ≤ k, such that
p′
pi
i
q′ −
q′ <
for i = 1 . . . , k. Indeed, using (2.6), we can see that
− θ(cid:17)(cid:17) <
8 (cid:16) α′
p(cid:16) p
5εi
8
5εiq′
5pi
=
<
8
q
3εi
4
5pi
8
8
7
=
5
7
pi < pi .
We can choose q′ big enough so that εiq′
( 5
8εiq′, 3
4εiq′). Since 5εiq′
Now, using that Pk
8 < pi we can find a non-negative integer p′
i=1 λi = 1, we get
5
8p(cid:16)p
q
− θ(cid:17) <
1
α′ −(cid:16) kXi=1
ri
p′
i
q′(cid:17) <
3
4p(cid:16)p
q
− θ(cid:17).
8 > 1 and thus there is an integer in the open interval
i such that (2.7) holds.
Hence, setting g =Pk
i=1 rip′
Hence, using (2.6), we get
(2.8)
i and p′ = pg, we get
p′
q′ <
p
α′ −
5
q
8(cid:16) p
2(cid:16)p
1
q
− θ(cid:17) <
− θ(cid:17) <
p
q
−
p′
q′ <
q
3
4(cid:16) p
8(cid:16)p
7
q
− θ(cid:17).
− θ(cid:17).
Now, since Q is continuous, there exists an idempotent e in Q such that NQ(e) = 1/q′, and
since p′
11 ) and Q is simple and injective, we get
i/q′ < NQ(f (i)
for i = 1, . . . , k. We may (and will) assume that e ≤ f (1)
of matrix units
11 . Therefore we can build a system
i · e . f (i)
p′
11
{h(i1,i2)
(j1,j2),(u1,u2) : 1 ≤ i1, i2 ≤ k, 1 ≤ j1 ≤ ri1, 1 ≤ j2 ≤ ri2, 1 ≤ u1 ≤ p′
i1, 1 ≤ u2 ≤ p′
i2},
with
(j1,j2),(u1,u2)h(i′
h(i1,i2)
(1,1),(1,1), {h(i,i)
(j ′
such that e = h(1,1)
f (i)
11 Qf (i)
11 for all i, and
1,i′
2)
2),(u′
1,j ′
2) = δi2,i′
1,u′
1 · δj2,j ′
1 · δu2,u′
1 · h(i1,i′
2)
2),(u1,u′
(j1,j ′
2) ,
(1,1),(u1,u2) : 1 ≤ u1, u2 ≤ p′
i} is a system of matrix units inside
h(i,i)
(j1,j2),(u1,u2) = f (i)
j1,1h(i,i)
(1,1),(u1,u2)f (i)
1,j2
VON NEUMANN FACTOR
11
for i = 1, . . . , k, 1 ≤ j1, j2 ≤ ri and 1 ≤ u1, u2 ≤ p′
we proceed as follows. First we construct a family
i. To build such a system of matrix units,
{h(1,i)
(1,1),(1,u), h(i,1)
(1,1),(u,1) : 1 ≤ u ≤ p′
i}
so that
h(1,i)
(1,1),(1,u)h(i,1)
(1,1),(u,1) = h(1,1)
(1,1),(1,1) = e,
eh(1,i)
(1,1),(1,u) = h(1,i)
(1,1),(1,u),
h(i,1)
(1,1),(u,1)e = h(i,1)
(1,1),(u,1),
(1,1),(u,u)
:= h(i,1)
(1,1),(u,1)h(1,i)
(1,1),(1,u) are pairwise orthogonal idempotents inside
and such that h(i,i)
f (i)
11 Qf (i)
11 for all i. Then, define, for 1 ≤ i ≤ k, 1 ≤ j ≤ ri and 1 ≤ u ≤ p′
i,
(1,1),(1,u) · f (i)
1,j .
h(1,i)
(1,j),(1,u) = h(1,i)
h(i,1)
(j,1),(u,1) = f (i)
j,1 · h(i,1)
(1,1),(u,1),
Finally, set, for 1 ≤ i1, i2 ≤ k, 1 ≤ j1 ≤ ri1, 1 ≤ j2 ≤ ri2, 1 ≤ u1 ≤ p′
i1, 1 ≤ u2 ≤ p′
i2,
h(i1,i2)
(j1,j2),(u1,u2) = h(i1,1)
(j1,1),(u1,1) · h(1,i2)
(1,j2),(1,u2).
It is straightforward to verify that the family {h(i1,i2)
(j1,j2),(u1,u2)} satisfies the required properties.
(j1,j2),(u1,u2)} is a system of g × g-matrix
units inside f Qf , and we can now define an algebra homomorphism ρ′ : Mp′(K) = Mp(K) ⊗
Mg(K) → Q by the rule
Recalling that g = Pk
i, we get that {h(i1,i2)
i=1 rip′
ρ′(eij ⊗ e(i1,i2)
(j1,j2),(u1,u2)) = ψ(ei1)h(i1,i2)
(j1,j2),(u1,u2)ψ(e1j) ,
where {e(i1,i2)
(j1,j2),(u1,u2)} is a complete system of matrix units in Mg(K).
It remains to verify properties (1)-(7).
(1) We have
NQ(ρ′(1)) = pgNQ(e) =
p′
q′ ,
as desired.
(2) This follows from (2.8).
(3) Let x ∈ ρ(1)Aρ(1). Then we can write
x = ρ(1)x′ρ(1) =
pXa,b=1
ρ(ea1)f ′ρ(e1a)x′ρ(eb1)f ′ρ(e1b) ,
where x′ ∈ A. Now by (b) we can approximate each ρ(e1a), ρ(eb1) by an element of A:
NQ(ρ(e1a) − x1a) < ε
for x1a ∈ A
NQ(ρ(eb1) − xb1) < ε
for xb1 ∈ A
Thus we can consider the element
pXa,b=1
ex =
ψ(ea1) f x1ax′xb1f
ψ(e1b) ∈ A ,
xab∈f Af
{z
}
12
PERE ARA AND JOAN CLARAMUNT
so that NQ(x−ex) < p2(4K(p) + 2)ε < 5K(p)p2ε (using that K(p) ≥ 4 for the last inequality).
Now we can write each xab in the form
xab =
for some scalars λ(a, b)(i)
jl ∈ K.
Take
kXi=1
riXj,l=1
λ(a, b)(i)
jl f (i)
jl
λ(a, b)(i)
jl(cid:16) p′
iXu=1
e(i,i)
(j,l),(u,u)(cid:17)(cid:17) ∈ Mp′(K).
jl f (i)
j1 and dbil = f (i)
1l ψ(e1b), we have
h(i,i)
(1,1),(u,u)(cid:17)dbil(cid:17)
(1,1),(u,u)(cid:17)(cid:17)(cid:17)
h(i,i)
p′
i
p′
i
11 −
11 ) −
i=1 rip′
q′
riNQ(f (i)
cbil(cid:16)f (i)
riXl=1
kXi=1
iXu=1
11 ) − NQ(cid:16) p′
ri(cid:16)NQ(f (i)
iXu=1
q′(cid:17)(cid:17)
ri(cid:16)NQ(f (i)
11 )(cid:17) − pPk
qi +(cid:16)p
− θ(cid:17)
8(cid:16)p
48(cid:16) p
− θ(cid:17) ≤
− θ(cid:17) +
11 ) −
riNQ(f (i)
−
1
5
7
q
q
q
p′
q′(cid:17)
e(i,i)
(j,j),(u,u) = γ(z).
q
43
48(cid:16)p
48(cid:16)p
− θ(cid:17)
− θ(cid:17) =
43
q
p
q
− θ.
Writing cbil =Pp
y =
riXj,l=1
j=1 ψ(ea1)λ(a, b)(i)
eab ⊗(cid:16) kXi=1
pXa,b=1
a=1Pri
NQ(ex − ρ′(y)) = NQ(cid:16) pXb=1
≤ p(cid:16) kXi=1
= p(cid:16) kXi=1
= p(cid:16) kXi=1
= ph kXi=1
Using (2.5) and (2.8), we get
Putting everything together,
q
q
1
7
≤
NQ(ex − ρ′(y)) < K(p)εp +
48p(cid:16) p
48(cid:16)p
8(cid:16)p
− θ(cid:17) +
− θ(cid:17) <
(4) Suppose now that x = ρ(z) for z = Pp
riXj=1
iXu=1
NQ(x − ρ′(y)) < 5K(p)p2ε +
kXi=1
y = z ⊗
43
q
p′
can see that, using the same construction of y given in (3), we obtain
a,b=1 µabeab ∈ Mp(K), with µab ∈ K. Then we
VON NEUMANN FACTOR
13
To conclude the proof, just take ε′ > 0 satisfying ε′ <
(iii) in Theorem 2.2, consider a matricial subalgebra A′ such that {ρ′(e′
A′ and span{x1, ..., xm, xm+1} ⊆ε′ A′.
1
48K(p′)p′2(cid:16) p′
q′ −θ(cid:17) and, using condition
ij) i, j = 1, . . . , p′} ⊆ε′
(cid:3)
3. D-rings
We now consider a generalization of Theorem 2.2 to D-rings, where D is a division ring.
We have not found a reasonable analogue of the local condition (iii) in this setting, but we
are able to extend condition (ii).
The reason we consider this generalization is the question raised by Elek and Jaikin-
Zapirain of whether the completion of the ∗-regular closure of the group algebra of a countable
amenable ICC-group is isomorphic to either Mn(D), n ≥ 1, or to MD, for some division ring
D. Here MD is the completion of lim−→n
M2n(D) with respect to its unique rank function.
Throughout this section, D will denote a division ring, and K will stand for the center of
D.
A D-ring is a unital ring R together with a unital ring homomorphism ι : D → R. A
morphism of D-rings R1 → R2 is a ring homomorphism ϕ : R1 → R2 such that ι2 = ϕ ◦ ι1.
A matricial D-ring is a D-ring A which is isomorphic as a D-ring to a finite direct product
Mn1(D) × · · · × Mnr (D), where the structure of D-ring of the latter is the canonical one.
A D-ring A is an ultramatricial D-ring if it is isomorphic as D-ring to a direct limit of a
sequence (An, ϕn) of matricial D-rings An and D-ring homomorphisms ϕn : An → An+1.
We start with a simple lemma.
Lemma 3.1. There is a unique rank function S on the (possibly non regular) simple D-ring
M2n(D) is dense in D ⊗K MK with respect to
D ⊗K MK, and D ⊗K (lim−→n
the S-metric.
M2n(K)) ∼= lim−→n
Proof. We denote by NMK the unique rank function on MK.
The ring D ⊗K MK is simple by [5, Corollary 7.1.3]. Let x = Pk
M2n(K) be such that NMK (xi − yi) < ε
and ε > 0. Let yi ∈ lim−→n
Then, for any rank function S on D ⊗K MK, we have
i=1 di ⊗ xi ∈ D ⊗K MK
i=1 di ⊗ yi.
k , and set y :=Pk
S(x − y) ≤
kXi=1
S(1 ⊗ (xi − yi)) =
kXi=1
NMK (xi − yi) < ε.
Since there is a unique rank function on lim−→n
unique rank function S on D ⊗K MK, and that D ⊗K (lim−→n
with respect to the S-metric.
M2n(D), this shows at once that there is a
M2n(K)) is dense in D ⊗K MK
(cid:3)
Theorem 3.2. Let A be an ultramatricial D-ring, and let N be an extremal pseudo-rank
function on A such that the completion Q of A with respect to N is a continuous factor.
Then there is an isomorphism of D-rings Q ∼= MD.
14
PERE ARA AND JOAN CLARAMUNT
Proof. We can assume that A = lim−→n
map ϕn : An → An+1 is an injective morphism of D-rings.
(An, ϕn), where each An is a matricial D-ring and each
Write Bn = CAn(D) for the centralizer of D in An. Then Bn is a matricial K-algebra and,
∼= D ⊗K Bn. Moreover, we have ϕn(Bn) ⊆ Bn+1
(Bn, (ϕn)Bn) is an ultramatricial
since K is the center of D, we have An
for all n ≥ 1, and A ∼= D ⊗K B, where B = CA(D) = lim−→n
K-algebra.
Now, it is not hard to show that the restriction map S → SB defines an affine homeomor-
phism P(A) ∼= P(B). Consequently, the restriction NB of N to B is an extremal pseudo-rank
function on B. Moreover, since N(A) = N(B), it follows that N(B) is a dense subset of
the unit interval, which implies that the completion R of B in the NB-metric is a continu-
ous factor over K. Now it follows from Theorem 2.2 that there is a K-algebra isomorphism
ψ′ : MK → R, which induces an isomorphism of D-rings
ψ := idD ⊗ ψ′ : D ⊗K MK → D ⊗K R.
Since A ⊆ D ⊗K R = ψ(D ⊗K MK) ⊆ Q, it follows that ψ(D ⊗K MK) is dense in Q. By
M2n(K))) is dense in ψ(D ⊗K MK) with respect to the restriction
Lemma 3.1, ψ(D ⊗K (lim−→n
M2n(K))) is dense in Q. Hence, the restriction of ψ to
of NQ to it, therefore ψ(D ⊗K (lim−→n
D ⊗K (lim−→n
M2n(D) gives a rank-preserving isomorphism of D-rings from
M2n(D) onto a dense D-subring of Q, and thus it can be uniquely extended to an
lim−→n
isomorphism from MD onto Q.
(cid:3)
M2n(K)) ∼= lim−→n
4. Fields with involution
In this section, we will consider the corresponding problem for ∗-algebras. Again, the
motivation comes from the theory of group algebras. If K is a subfield of C closed under
complex conjugation, and G is a countable discrete group, then there is a natural involution
on the group algebra K[G], and the completion of the ∗-regular closure of K[G] in U(G)
is a ∗-regular ring containing K[G] as a ∗-subalgebra.
It would be thus desirable to find
conditions under which this completion is ∗-isomorphic to MK, where MK is endowed with
M2n(K), which is in turn obtained by
the involution induced from the involution on lim−→n
endowing each algebra M2n(K) with the conjugate-transpose involution.
We recall some facts about ∗-regular rings and their completions (see for instance [1, 3]). A
∗-regular ring is a regular ring endowed with a proper involution, that is, an involution ∗ such
that x∗x = 0 implies x = 0. The involution is called positive definite in case the condition
nXi=1
x∗
i xi = 0 =⇒ xi = 0
(i = 1, . . . , n)
holds for each positive integer n. If R is a ∗-regular ring with positive definite involution,
then Mn(R), endowed with the ∗-transpose involution, is a ∗-regular ring.
We will work with ∗-algebras over a field with positive definite involution (F, ∗). The
involution on Mn(F ) will always be the ∗-transpose involution.
VON NEUMANN FACTOR
15
The ∗-algebra A is standard matricial if A = Mn(1)(F ) × · · · × Mn(r)(F ) for some positive
integers n(1), . . . , n(r). A standard map between two standard matricial ∗-algebras A, B is a
block-diagonal ∗-homomorphism A → B (see [1, p. 232]). A standard ultramatricial ∗-algebra
Φ3−→ · · · of standard matricial ∗-algebras An
is a direct limit of a sequence A1
and standard maps Φn : An → An+1. An ultramatricial ∗-algebra is a ∗-algebra which is ∗-
isomorphic to the direct limit of a sequence of standard matricial ∗-algebras An and ∗-algebra
maps Φn : An → An+1. Let A be a ∗-algebra which is ∗-isomorphic to a standard matricial
algebra, through a ∗-isomorphism
Φ2−→ A3
Φ1−→ A2
γ : A → Mn(1)(F ) × · · · × Mn(r)(F ).
Then we say that a projection (i.e., a self-adjoint idempotent) p in A is standard (with respect
to γ) in case, for each i = 1, 2, . . . , r, the i-th component γ(p)i of γ(p) is a diagonal projection
in Mn(i)(F ).
Two idempotents e, f ∈ R are equivalent, written e ∼ f , if there are x ∈ eRf and y ∈ f Re
If e, f are projections of a ∗-ring R, then we say that e is
such that e = xy, f = yx.
∗-equivalent to f , written e
∗∼ f , in case there is x ∈ eRf such that e = xx∗ and f = x∗x.
If R is a ∗-regular ring and x ∈ R, then there exist unique projections LP(x) and RP(x),
called the left and the right projections of x, such that xR = LP(x)R and Rx = R · RP(x).
Moreover, with e = LP(x) and f = RP(x), there exists a unique element y ∈ R, the relative
inverse of x, such that xy = e and yx = f . We will denote the relative inverse of x by x.
A ∗-regular ring R satisfies the condition LP
∗∼ RP(x) holds for each
x ∈ R. Observe that R satisfies LP ∗∼ RP if and only if equivalent projections of R are
∗-equivalent ([1, Lemma 1.1]). In general this condition is not satisfied for a ∗-regular ring,
but many ∗-regular rings satisfy it. It is worth to mention that for a field F with positive
∗∼ RP for all n ≥ 1 if and only if F is ∗-Pythagorean
definite involution, Mn(F ) satisfies LP
[12, Theorem 4.9] (see also [11, Theorem 4.5], [1, Theorem 1.12]).
∗∼ RP in case LP(x)
The following result is relevant for our purposes:
Theorem 4.1. [1, Theorem 3.5] Let (F, ∗) be a field with positive definite involution, let A
be a standard ultramatricial ∗-algebra, and let N be a pseudo-rank function on A. Then the
type II part of the N-completion of A is a ∗-regular ring satisfying LP
∗∼ RP.
As a consequence of this result, the ∗-algebra MF always satisfies LP ∗∼ RP, independently
of whether the field F is ∗-Pythagorean or not.
We collect, for the convenience of the reader, some properties of a pseudo-rank function on
a ∗-regular ring. For an element r of a ∗-regular ring R we denote by r the relative inverse
of r.
Lemma 4.2. Let N be a pseudo-rank function on a ∗-regular ring R. The following hold:
(a) The involution is isometric, that is, N(r∗) = N(r) for each r ∈ R.
(b) N(r − s) ≤ 3N(r − s) for all r, s ∈ R.
(c) N(LP(r) − LP(s)) ≤ 4N(r − s), and N(RP(r) − RP(s)) ≤ 4N(r − s) for all r, s ∈ R.
16
PERE ARA AND JOAN CLARAMUNT
(d) Suppose that e1, e2, f1, f2 are projections in R such that f1
i ≤ ei such that e′
1
for i = 1, 2. Then there exist projections e′
for i = 1, 2.
∗∼ f2 and N(ei − fi) ≤ ε
∗∼ e′
i) ≤ 5ε
2 and N(ei − e′
Proof. (a) See the proof of Proposition 1 in [10] or [17, Proposition 6.11].
(b) In [4, p. 310], it is shown that N(r − s) ≤ 19N(r − s), and the authors comment that
K. R. Goodearl has reduced 19 to 5. Here we show that indeed it can be reduced to 3.
Let e = rr, f = rr, g = ss and h = ss. Clearly r∗r + (1 − f ) and ss∗ + (1 − g) are invertible
in R and so
(4.1)
N(r − s) = N((r∗r + (1 − f ))(r − s)(ss∗ + (1 − g))).
On the other hand, we have
N((r∗r + (1 − f ))(r − s)(ss∗ + (1 − g))) = N(r∗ss∗ − r∗rs∗ + r∗(1 − g) − (1 − f )s∗)
≤ N(r∗ss∗ − r∗rs∗) + N(r∗(1 − g) − (1 − f )s∗)
≤ N(s − r) + N(r∗ − s∗) + N(f s∗ − r∗g)
= 2N(s − r) + N(f (s∗ − r∗)g) ≤ 3N(r − s).
By (4.1), we get N(r − s) ≤ 3N(r − s).
(c) Using (b), we get
N(RP(r) − RP(s)) = N(rr − ss) ≤ N((r − s)r) + N(s(r − s))
≤ 3N(r − s) + N(r − s) = 4N(r − s).
The proof for LP is similar.
(d) We follow the idea in [1, proof of Lemma 2.6]. Let w ∈ f1Rf2 be a partial isometry
such that f1 = ww∗ and f2 = w∗w. Consider the self-adjoint element a = e1 − e1ww∗e1 and
set p1 := LP(a) = RP(a) ≤ e1. Then
N(p1) = N(a) = N(e1 − e1f1e1) ≤ ε.
1 := e1 − p1. Then N(e1 − p′
1) ≤ ε and, since p′
1ap′
1 = 0, we have p′
1 = w′(w′)∗, where
Set p′
w′ := p′
1w.
Now observe that (w′)∗w′ = w∗p′
1w ≤ w∗w = f2. Consider the elements
b = e2 − e2(w′)∗w′e2,
e′′
2 = LP(b) = RP(b).
We have e′′
2 ≤ e2 and
N(e′′
2) = N(b) = N(e2 − e2(w′)∗w′e2) ≤ N(e2 − (w′)∗w′)
≤ N(e2 − f2) + N(w∗w − w∗p′
≤ ε + N(f1 − p′
1)
≤ ε + N(f1 − e1) + N(e1 − p′
1w)
1) ≤ 3ε.
Set e′
N(e2 − e′
2 = e2 − e′′
2) = N(e′′
2. As before, we have e′
2) ≤ 3ε. Write e′
1) = N(e1 − p′
1 = w′′(w′′)∗. Then e′
1) + N(p′
1 − e′
N(e1 − e′
1 ≤ p′
1 ≤ e1, e′
1
∗∼ e′
1) ≤ ε + N(w′f2(w′)∗ − w′e′
2, and
2(w′)∗)
VON NEUMANN FACTOR
17
2 = (w′′)∗w′′, where w′′ = w′e′
2 = p′
1we′
2, and
≤ ε + N(f2 − e2) + N(e2 − e′
2) ≤ 5ε.
(cid:3)
Lemma 4.3. Let R be a ∗-regular ring, and assume that R is complete with respect to a rank
function N. Then R satisfies LP ∗∼ RP if and only if, given equivalent projections p, q ∈ R
and ε > 0 there exist subprojections p′ ≤ p and q′ ≤ q such that p′ ∗∼ q′ and N(p − p′) < ε,
N(q − q′) < ε.
Proof. The "only if" direction follows trivially from [1, Lemma 1.1].
Set p′ := p − (Pn
∗∼ qi for i = 1, . . . , n, and N(p − (Pn
To show the "if" direction, suppose that p and q are equivalent projections of R. Assume
we have built, for some n ≥ 1, orthogonal projections p1, . . . , pn ≤ p and q1, . . . , qn ≤ q
i=1 qi)) < 2−n.
such that pi
i=1 qi). Then p′ ∼ q′ by [15, Theorems 19.7 and
∗∼ qn+1
4.14], so that there are subprojections pn+1 ≤ p′ and qn+1 ≤ q′ such that pn+1
and N(p′ − pn+1) < 2−n−1 and N(q′ − qn+1) < 2−n−1. Therefore we can build sequences
∗∼ qn, and
{pn} and {qn} of orthogonal subprojections of p and q respectively such that pn
i=1 qi)) < 2−n for all n ≥ 1. Let wn ∈ pnRqn be partial
i=1 pi)) < 2−n, N(q − (Pn
i=1 pi) and q′ = q − (Pn
i=1 pi)) < 2−n, N(q − (Pn
isometries such that pn = wnw∗
N(p − (Pn
n and qn = w∗
nwn. Then
N(wn) ≤ N(pn) ≤ N(cid:16)p − (
n−1Xi=1
pi)(cid:17) < 2−n+1 ,
and it follows that the sequence {Pn
i=1 wi}n converges to a partial isometry w ∈ pRq such
that p = ww∗ and q = w∗w. Hence R satisfies condition LP ∗∼ RP (by [1, Lemma 1.1]). (cid:3)
In order to state the local condition in our main result of this section, we need the following
somewhat technical definition.
Definition 4.4. Let R be a unital ∗-regular ring with pseudo-rank function N, and let A be
a unital ∗-subalgebra which is ∗-isomorphic to a standard matricial ∗-algebra. We say that a
projection p ∈ A is hereditarily quasi-standard if
(1) p is ∗-equivalent in A to a standard projection of A, and,
(2) for each subprojection p′ ≤ p, p′ ∈ A, and each ε > 0 there exists a unital ∗-subalgebra
A′ of R and a projection p′′ ∈ A′ satisfying the following properties:
(a) A′ is ∗-isomorphic to a standard matricial ∗-algebra,
(b) p′′ is ∗-equivalent in A′ to a standard projection of A′,
(c) p′′ ≤ p′ and N(p′ − p′′) < ε, and
(d) A ⊆ A′.
18
PERE ARA AND JOAN CLARAMUNT
We can now state the following analogue of Theorem 2.2. By a continuous ∗-factor over F
we mean a ∗-regular ring Q which is a ∗-algebra over F , and which is a continuous factor in
the sense of Section 2.
Theorem 4.5. Let (F, ∗) be a field with positive definite involution. Let Q be a continuous ∗-
factor over F , and assume that there exists a dense subalgebra (with respect to the NQ-metric
topology) Q0 ⊆ Q of countable F -dimension. The following are equivalent:
(i) Q ∼= MF as ∗-algebras.
(ii) Q is isomorphic as a ∗-algebra to B for a certain standard ultramatricial ∗-algebra B,
where the completion of B is taken with respect to the metric induced by an extremal
pseudo-rank function on B.
(iii) For every ε > 0, elements x1, ..., xn ∈ Q, and projections p1, p2 ∈ Q, there exist a ∗-
subalgebra A of Q, which is ∗-isomorphic to a standard matricial ∗-algebra, elements
y1, ..., yn ∈ A, and hereditarily quasi-standard projections q1, q2 ∈ A such that
N(pj − qj) < ε,
(j = 1, 2),
and
N(xi − yi) < ε
(i = 1, . . . , n).
Proof. Clearly, (i) =⇒ (ii).
(Bn, Φn) as a direct limit of a sequence of standard matricial
(ii) =⇒ (iii). Write B = lim−→n
∗-algebras Bn and standard maps Φn : Bn → Bn+1. Write Φji : Bi → Bj for the composition
maps Φj−1 ◦ · · · ◦ Φi, for i < j, and write θi : Bi → B ∼= Q for the canonical map. We identify
Q with B.
We will show that the desired ∗-subalgebra A satisfying the required conditions is of the
form θj(Bj). Since those algebras form an increasing sequence, whose union is dense in the
NQ-metric topology, we see that it is enough to deal only with the projections, and indeed
that it is enough to deal with a single projection. Let p be a projection in Q and let ε > 0.
Now there is some i ≥ 1 and an element x ∈ Bi such that N(p − θi(x)) < ε/8. Write
p1 := LP(x) ∈ Bi. By Lemma 4.2(c), we have
N(p − θi(p1)) = N(LP(p) − θi(LP(x))) = N(LP(p) − LP(θi(x))) ≤ 4N(p − θi(x)) <
ε
2
,
so that N(p − θi(p1)) < ε/2.
There exists a standard projection g in Bi such that p1 ∼ g in Bi. By the proof of [1,
1 ≤ Φji(p1), g′ ≤
Theorem 3.5], there are j > i and projections p′
Φji(g), g′ is a standard projection, p′
1)) < ε/2 and
1
N(θi(g) − θj(g′)) < ε/2. Therefore, p′
1 is ∗-equivalent to a standard projection in Bj, and
moreover
∗∼ g′, and moreover N(θi(p1) − θj(p′
1, g′ ∈ Bj such that p′
N(p − θj(p′
1)) ≤ N(p − θi(p1)) + N(θi(p1) − θj(p′
1)) < ε/2 + ε/2 = ε.
Now take A := θj(Bj) and q := θj(p′
1). Clearly, property (1) in Definition 4.4 is satisfied. To
show property (2), take a subprojection θj(p′) of q = θj(p′
1), where p′ is a subprojection of
p′
1, and δ > 0. Then we use the same argument as above but now applied to the projection
p′ of Bj and to δ > 0. We obtain k ≥ j and a projection θk(p′′) in the ∗-subalgebra θk(Bk)
VON NEUMANN FACTOR
19
such that the pair (θk(p′), θk(Bk)) satisfies properties (a)-(d) in Definition 4.4 (with ε replaced
with δ).
∗∼ RP. Let p1, p2 be equivalent projections of
(iii) =⇒ (i). We first show that Q satisfies LP
Q and ε > 0. Choose x ∈ p1Qp2 and y ∈ p2Qp1 such that p1 = xy and p2 = yx. Observe
that necessarily y = x, the relative inverse of x in Q. By (iii), there exists a ∗-subalgebra
A of Q, which is ∗-isomorphic to a standard matricial ∗-algebra, projections q1, q2 ∈ A such
∗∼ ei in A, i = 1, 2, for some standard projections e1, e2 ∈ A, and
that N(pi − qi) < ε, and qi
an element x1 ∈ A such that N(x − x1) < ε. Now set x′
1 := q1x1q2 ∈ A, and note that
N(x − x′
1) ≤ N(p1xp2 − q1xq2) + N(q1xq2 − q1x1q2) < 2ε + ε = 3ε.
It follows from Lemma 4.2(c) that, with q′′
1 := LP(x′
1) ∈ A and q′′
2 := RP(x′
1) ∈ A, we have
Moreover, we have q′′
1 = LP(x′
1) = q′′
2 . In addition, we get
N(pi − q′′
i ) < 12ε,
1) ∼ RP(x′
q′′
i ≤ qi,
(i = 1, 2).
N(qi − q′′
i ) ≤ N(qi − pi) + N(pi − q′′
i ) < ε + 12ε = 13ε.
∗∼ ei in A, we obtain in particular projections e′′
1 ∼ e′′
Write η = 13ε. Since qi
2
(in A) and N(ei − e′′
i ) < η. Now A is a standard matricial ∗-algebra, and the restriction of
N to A is a convex combination of the normalized rank functions on the different simple
components of A, so the above information enables us to build standard projections e′
i ≤ ei
i) < η for i = 1, 2. This in turn gives us projections q′
such that e′
i ≤ qi
1
∗∼ ei) such that q′
(through the ∗-equivalences qi
2 and N(qi − q′
The last step is to transfer these to p1, p2. For this, observe that
i ≤ ei such that e′′
i) < η for i = 1, 2.
2, and N(ei − e′
∗∼ e′
∗∼ q′
1
N(pi − q′
i) ≤ N(pi − qi) + N(qi − q′
i) < ε + η.
Since moreover q′
projections p′
Lemma 4.3 to conclude that Q satisfies LP
i ≤ pi such that p′
1
1 and q′
2 are ∗-equivalent, it follows from Lemma 4.2(d) that there exist
i) < 5(ε + η) = 70ε. Now we can apply
2 and N(pi − p′
∗∼ p′
∗∼ RP.
Now (i) is shown by using the same method employed in Section 2. We only need to prove a
variant of Lemma 2.4 with ∗-algebra homomorphisms ρi : Mpi(F ) → Q instead of just algebra
homomorphisms. For this, a new version of Lemmas 2.5 and 2.6 is required, as follows:
Lemma 4.6. Let p be a positive integer. Then there exists a constant K ∗(p), depending
only on p, such that for any field with involution F , for any ε > 0, for any pair A ⊆ B,
where B is a unital ∗-algebra over F , and A is a unital ∗-regular subalgebra of B, for any
pseudo-rank function N on B such that N(b∗) = N(b) for all b ∈ B, and for every ∗-algebra
homomorphism ρ : Mp(F ) → B such that {ρ(eij) i, j = 1, . . . , p} ⊆ε A with respect to the
N-metric, where eij denote the canonical matrix units in Mp(F ), there exists a ∗-algebra
homomorphism ψ : Mp(F ) → A such that
N(ρ(eij) − ψ(eij)) < K ∗(p)ε
for 1 ≤, i, j ≤ p.
If, in addition, we are given a projection f ∈ A such that N(ρ(e11) − f ) < ε, then the map ψ
can be built with the additional property that ψ(e11) ≤ f .
20
PERE ARA AND JOAN CLARAMUNT
Proof of Lemma 4.6. The proof follows the same steps as the proof of Lemma 2.5. There is
only an additional degree of approximation due to the fact that we need projections instead
of idempotents. Proceeding by induction on p, just as in the proof of Lemma 2.5, we start
with ∗-matrix units {xij} for 1 ≤ i, j ≤ p − 1, so that xji = x∗
ij for all i, j, and we have to
define new elements y1i, for i = 1, . . . , p, so that the family yij = y∗
1iy1j, 1 ≤ i, j ≤ p, is the
desired new family of ∗-matrix units. To this end, one only needs to replace the idempotent
g found in that proof by the projection LP(g). Using Lemma 4.2, one can easily control the
corresponding ranks.
The last part is proven by the same kind of induction, starting with ψ(1) = f for the case
(cid:3)
p = 1.
Lemma 4.7. Assume that Q satisfies condition (iii) in Theorem 4.5. Let θ be a real number
such that 0 < θ < 1 and let {xn}n be a K-basis of Q0. Let p be a positive integer such that
there exist a ∗-algebra homomorphism ρ : Mp(F ) → Q, a ∗-subalgebra A ⊆ Q, which is ∗-
isomorphic to a standard matricial ∗-algebra, a hereditarily quasi-standard projection g ∈ A,
a positive integer m, and ε > 0 such that
q > θ for some positive integer q.
(a) NQ(ρ(1)) = p
(b) NQ(ρ(e11) − g) < ε, where eij are the canonical matrix units of Mp(F ).
(c) {ρ(eij) i, j = 1, . . . , p} ⊆ε A, and span{x1, ..., xm} ⊆ε A.
(d) ε <
1
48K ∗(p)p2(cid:16) p
q − θ(cid:17).
Then there exist positive integers p′, t, q′, and a real number ε′ > 0 with p′ = tp, a ∗-algebra
homomorphism ρ′ : Mp′(F ) → Q, a ∗-subalgebra A′ ⊆ Q, which is ∗-isomorphic to a stan-
dard matricial ∗-algebra, and a hereditarily quasi-standard projection g′ ∈ A′, such that the
following conditions hold:
(1) NQ(ρ′(1)) = p′/q′.
(2)
0 <
p′
q′ − θ <
1
2(cid:16)p
q
− θ(cid:17).
(3) For each x ∈ ρ(1)Aρ(1) there exists y ∈ Mp′(F ) such that
NQ(x − ρ′(y)) <
p
q
− θ.
(4) For each z ∈ Mp(F ), we have
NQ(ρ(z) − ρ′(γ(z))) <
p
q
− θ,
where γ : Mp(F ) → Mp′(F ) = Mp(F )⊗Mt(F ) is the canonical unital ∗-homomorphism
sending z to z ⊗ 1t.
11) − g′) < ε′, where e′
ij are the canonical matrix units of Mp′(F ).
ij) i, j = 1, . . . , p′} ⊆ε′ A′, and span{x1, ..., xm, xm+1} ⊆ε′ A′
(5) NQ(ρ′(e′
(6) {ρ′(e′
(7) ε′ <
48K ∗(p′)p′2(cid:16) p′
q′ − θ(cid:17).
1
VON NEUMANN FACTOR
21
Proof of Lemma 4.7. The proof is very similar to the proof of Lemma 2.6. We only indicate
the points where the proof has to be modified.
We denote by eij, for 1 ≤ i, j ≤ p, the canonical matrix units in Mp(F ). Note that
e∗
ij = eji for all i, j. Set f ′ := ρ(e11), which is a projection in Q with NQ(f ′) = 1/q. By
hypothesis, there is a hereditarily quasi-standard projection g in the ∗-subalgebra A such that
NQ(f ′ − g) < ε. Now by Lemma 4.6 there exists a ∗-algebra homomorphism ψ : Mp(F ) → A
such that ψ(e11) ≤ g and NQ(ρ(eij) − ψ(eij)) < K ∗(p)ε for all i, j. Now by condition (2) in
Definition 4.4, there exists another ∗-subalgebra A′ of Q, which is ∗-isomorphic to a standard
matricial ∗-algebra and contains A, and a projection f ∈ A′, which is ∗-equivalent in A′ to a
standard projection of A′, such that f ≤ ψ(e11) and NQ(ψ(e11) − f ) < K ∗(p)ε − µ, where
µ = max{NQ(ρ(eij) − ψ(eij)) : i, j = 1, . . . , p}.
Now, setting ψ′(eij) = ψ(ei1)f ψ(e1j), we obtain that ψ′ is a ∗-algebra homomorphism from
Mp(F ) to A′, and that
NQ(ρ(eij) − ψ′(eij)) < µ + (K ∗(p)ε − µ) = K ∗(p)ε,
so that, after changing notation, we may assume that f = ψ(e11), and that f is ∗-equivalent
in A to a standard projection of A.
Since A is a standard matricial ∗-algebra, we can write f = f1 +· · ·+fk, where f1, f2, . . . , fk
are nonzero mutually orthogonal projections belonging to different simple factors of A. Since
f is ∗-equivalent in A to a standard projection, there exists, for each 1 ≤ i ≤ k, a set of
matrix units {f (i)
is a minimal projection in
the simple factor to which fi belongs, such that
: 1 ≤ j, l ≤ ri} inside fiAfi such that each f (i)
jj
jl
riXj=1
f (i)
jj = fi
for i = 1, . . . , k and moreover (f (i)
jl )∗ = f (i)
lj
for all i, j, l.
Now the proof follows the same steps as the one of Lemma 2.6. The idempotent e built in
that proof can be replaced now by a projection and, since Q satisfies LP ∗∼ RP, we have that
i · e is ∗-equivalent to a subprojection of f (i)
p′
for
all i, j, l, one builds a system of matrix units inside f Qf
11 . Using this and the fact that (f (i)
jl )∗ = f (i)
lj
{h(i1,i2)
(j1,j2),(u1,u2) : 1 ≤ i1, i2 ≤ k, 1 ≤ j1 ≤ ri1, 1 ≤ j2 ≤ ri2, 1 ≤ u1 ≤ p′
i1, 1 ≤ u2 ≤ p′
i2},
satisfying all the conditions stated in the proof of 2.6, and in addition
(h(i1,i2)
(j1,j2),(u1,u2))∗ = h(i2,i1)
(j2,j1),(u2,u1)
for all allowable indices.
We can now define a ∗-algebra homomorphism ρ′ : Mp′(K) = Mp(K) ⊗ Mt(K) → Q by the
rule
ρ′(eij ⊗ e(i1,i2)
(j1,j2),(u1,u2)ψ(e1j) ,
(j1,j2),(u1,u2)} is a complete system of ∗-matrix units in Mt(K).
(j1,j2),(u1,u2)) = ψ(ei1)h(i1,i2)
where {e(i1,i2)
22
PERE ARA AND JOAN CLARAMUNT
The verification of properties (1)-(7) is done in the same way, using condition (iii) to show
(cid:3)
that conditions (5) and (6) are satisfied.
Lemma 4.7 enables us to build the sequence of ∗-algebra homomorphisms ρi : Mpi(F ) → Q
satisfying the properties stated in Lemma 2.4, and the same proof gives a ∗-isomorphism from
M to Q, as desired.
(cid:3)
In case the base field with involution (F, ∗) is *-Pythagorean, we can derive a result which
is completely analogous to Theorem 2.2, as follows.
Corollary 4.8. Let (F, ∗) be a *-Pythagorean field with positive definite involution. Let Q be
a continuous ∗-factor over F , and assume that there exists a dense subalgebra (with respect
to the NQ-metric topology) Q0 ⊆ Q of countable F -dimension. The following are equivalent:
(i) Q ∼= MF as ∗-algebras.
(ii) Q is isomorphic as a ∗-algebra to B for a certain ultramatricial ∗-algebra B, where the
completion of B is taken with respect to the metric induced by an extremal pseudo-rank
function on B.
(iii) For every ε > 0 and elements x1, ..., xn ∈ Q, there exist a matricial ∗-subalgebra A of
Q, and elements y1, ..., yn ∈ A such that
NQ(xi − yi) < ε
(i = 1, . . . , k).
Proof. This follows from Theorem 4.5, by using the fact that Mn(F ) satisfies LP ∗∼ RP for all
∗∼ RP for
n ([12, Theorem 4.9]) and [1, Proposition 3.3]. Note that, since Mn(F ) satisfies LP
all n, every projection of a standard matricial ∗-algebra is hereditarily quasi-standard.
(cid:3)
Acknowledgments
The authors would like to thank Andrei Jaikin-Zapirain and Kevin O'Meara for their
useful suggestions. The authors also thank the referee for his/her very careful reading of the
manuscript and for his/her many suggestions.
References
[1] P. Ara, Matrix rings over *-regular rings and pseudo-rank functions, Pacific J. Math. 129 (1987), 209 --
241.
[2] P. Ara, J. Claramunt, Approximating the group algebra of the lamplighter by finite-dimensional algebras.
In preparation.
[3] S. K. Berberian, Baer ∗-rings. Die Grundlehren der mathematischen Wissenschaften, Band 195. Springer-
Verlag, New York-Berlin, 1972.
[4] B. Blackadar, D. Handelman, Dimension functions and traces on C*-algebras, J. Funct. Anal. 45 (1982),
297 -- 340.
[5] P. M. Cohn, Algebra. Vol. 3, Second edition, John Wiley & Sons, Ltd., Chichester, 1991.
[6] A. Connes, Classification of injective factors. Cases II1, II∞, IIIλ, λ 6= 1, Ann. of Math. (2) 104 (1976),
73 -- 115.
[7] G. Elek, Connes embeddings and von Neumann regular closures of amenable group algebras, Trans. Amer.
Math. Soc. 365 (2013), 3019 -- 3039.
VON NEUMANN FACTOR
23
[8] G. Elek, Lamplighter groups and von Neumann continuous regular rings, Proc. Amer. Math. Soc. 144
(2016), 2871 -- 2883.
[9] G. Elek, Infinite dimensional representations of finite dimensional algebras and amenablility, Math.
Annalen 369 (2017), 397 -- 439.
[10] D. Handelman, Completions of rank rings, Canad. Math. Bull. 20 (1977), 199 -- 205.
[11] D. Handelman, Coordinatization applied to finite Baer *-rings, Trans. Amer. Math. Soc. 235 (1978),
1 -- 34.
[12] D. Handelman, Rings with involution as partially ordered abelian groups, Rocky Mountain J. Math. 11
(1981), 337 -- 381.
[13] F. J. Murray, J. von Neumann, On rings of operators. IV, Ann. of Math. (2) 44 (1943), 716 -- 808.
[14] K. R. Goodearl, Centers of regular self-injective rings, Pacific J. Math. 76 (1978), 381 -- 395.
[15] K. R. Goodearl, "Von Neumann Regular Rings", Pitman, London 1979; Second Ed., Krieger, Malabar,
Fl., 1991.
[16] I. Halperin, Von Neumann's manuscript on inductive limits of regular rings, Canad. J. Math. 20 (1968),
477 -- 483.
[17] A. Jaikin-Zapirain, L2-Betti numbers and their analogues in positive characteristic, to appear in Pro-
ceedings of Groups St. Andrews 2017.
[18] A. M. Sinclair, R. R. Smith, Finite von Neumann algebras and masas, London Mathematical Society
Lecture Note Series, 351. Cambridge University Press, Cambridge, 2008.
Departament de Matem`atiques, Universitat Aut`onoma de Barcelona, 08193 Bellaterra
(Barcelona), Spain.
E-mail address: [email protected]
Departament de Matem`atiques, Universitat Aut`onoma de Barcelona, 08193 Bellaterra
(Barcelona), Spain.
E-mail address: [email protected]
|
1610.03740 | 2 | 1610 | 2017-04-25T02:06:53 | Extensions of almost faithful prime ideals in virtually nilpotent mod-$p$ Iwasawa algebras | [
"math.RA",
"math.RT"
] | Let $G$ be a nilpotent-by-finite compact $p$-adic analytic group for some $p>2$, and $H = \mathbf{FN}_p(G)$ its finite-by-(nilpotent $p$-valuable) radical. Fix a finite field $k$ of characteristic $p$, and write $kG$ for the completed group ring of $G$ over $k$. We show that almost faithful $G$-stable prime ideals $P$ of $kH$ extend to prime ideals $PkG$ of $kG$. | math.RA | math | Extensions of almost faithful prime ideals in
virtually nilpotent mod-p Iwasawa algebras
r
p
A
5
2
]
.
A
R
h
t
a
m
[
2
v
0
4
7
3
0
.
0
1
6
1
:
v
i
X
r
a
William Woods
November 5, 2018
Abstract
Let G be a nilpotent-by-finite compact p-adic analytic group for some
p > 2, and H = FN
p(G) its finite-by-(nilpotent p-valuable) radical. Fix
a finite field k of characteristic p, and write kG for the completed group
ring of G over k. We show that almost faithful G-stable prime ideals P
of kH extend to prime ideals P kG of kG.
2010 Mathematics Subject Classification: 16S34, 16D25, 16S35, 16W60.
1
Contents
1 p-valuations and crossed products
1.1 Preliminaries on p-valuations
. . . . . . . . . . . . . . . . . . . .
1.2 Ordered bases . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.3 Separating a free abelian quotient . . . . . . . . . . . . . . . . . .
1.4
. . . . . . . . .
Invariance under the action of a crossed product
2 A graded ring
2.1 Generalities on ring filtrations . . . . . . . . . . . . . . . . . . . .
2.2 Constructing a suitable valuation . . . . . . . . . . . . . . . . . .
2.3 Automorphisms trivial on a free abelian quotient . . . . . . . . .
3 Extending prime ideals from FNp(G)
. . . . . . . . . . . . . . . . . . . . . . .
3.1 X-inner automorphisms
3.2 Properties of FNp(G)
. . . . . . . . . . . . . . . . . . . . . . . .
3.3 The extension theorem . . . . . . . . . . . . . . . . . . . . . . . .
6
6
8
10
12
16
16
18
24
27
27
28
30
2
Introduction
Let G be a nilpotent-by-finite compact p-adic analytic group and k a finite field
of characteristic p.
Recall the characteristic open subgroup H = FNp(G), the finite-by-(nilpotent
p-valuable) radical of G, defined in [10, Theorem C]. This plays an important
role in the structure of the group G: for instance, see the structure theorem [10,
Theorem D].
In this paper, we demonstrate a connection between certain prime ideals of kH
and those of kG. The main result of this paper is:
Theorem A. Fix some prime p > 2. Let G be a nilpotent-by-finite compact
p-adic analytic group, H = FNp(G), and k a finite field of characteristic p. Let
P be an almost faithful, G-stable prime ideal of kH. Then P kG is a prime ideal
of kG.
The proof (given in Propositions 3.7 and 3.8) comprises several technical ele-
ments, which we outline below.
First, let G be a nilpotent-by-finite compact p-adic analytic group with finite
radical ∆+ = 1 [10, Definition 1.2], and let H = FNp(G). Note that H is p-
valuable [6, III, 2.1.2], and that G acts on the set of p-valuations of H as follows:
if α is a p-valuation on H and g ∈ G, then we may define a new p-valuation g · α
on H by
g · α(x) = α(g−1xg).
(In fact, we do this in a slightly more general case, but the details are identical.
See Lemma 1.17 for the setup.)
Recall the definition of an isolated orbital (closed) subgroup L of H from [10,
Definition 1.4], and that normal subgroups are automatically orbital. We show
in Definition 1.2 that, if ω is a p-valuation on H and L is a closed isolated normal
subgroup of H, then ω induces a quotient p-valuation Ω on H/L. We also define
the (t, p)-filtration (actually a p-valuation) on a free abelian pro-p group A of
finite rank in Definition 1.4: this is a particularly "uniform" p-valuation on A,
analogous to the p-adic valuation vp on Zp.
It is now easy to show the following.
Theorem B. With the above notation: let L be a proper closed isolated normal
subgroup of H containing the commutator subgroup [H, H]. Then there exists
a p-valuation ω on H with the following properties:
(i) ω is G-invariant,
(ii) there exists a real number t > (p − 1)−1 such that ωL > t, and the
quotient p-valuation induced by ω on G/L is the (t, p)-filtration.
3
Continue to take G to be a nilpotent-by-finite compact p-adic analytic group
with ∆+ = 1, and H = FNp(G). Let p be a prime, k a field of characteristic
p, and P a faithful prime ideal of kH.
It is shown in [2, Theorem 8.4] that
P = pkH for some prime ideal p of kZ, where Z is the centre of H; and,
furthermore, in [2, proof of Theorem 8.6], that there exist an integer e and a
ring filtration f on kH/P such that
grf (kH/P ) ∼= (grv(kZ/p))[Y1, . . . , Ye]
(†)
where v = f kZ/p is a valuation, and grf (kZ/p) is a commutative domain. The
valuation f is partly constructed using the p-valuation ω on the group H.
Our next theorem is an extension of this result. Write f1 for the ring filtration
constructed above. Suppose now that P is G-stable so that we may consider
the ring kG/P kG, and fix a crossed product decomposition (kH/P ) ∗ F of this
ring, where F = G/H.
Write Q′ for the classical ring of quotients of kZ/p. The filtration f1 restricts
to a valuation on kZ/p, which extends naturally to a valuation on Q′, which
we will call v1. F acts on the set of valuations of Q′, and v1 has some orbit
{v1, . . . , vs}.
Write Q for a certain partial ring of quotients of kH/P containing Q′. We may
naturally form Q ∗ F as an overring of (kH/P ) ∗ F .
Theorem C. In the above notation: there exists a filtration f on Q ∗ F such
that
(i) gr f (Q∗F ) ∼= gr f (Q)∗F , where the right-hand side is some crossed product,
(ii) gr f (Q) ∼=Ls
i=1 grfi (Q),
(iii) grfi (Q) ∼= (grvi Q′)[Y1, . . . , Ye] for all 1 ≤ i ≤ s,
where s and e are determined as in (†), and the action of F in the crossed
product of (i) permutes the s summands in the decomposition of (ii) transitively
by conjugation.
We combine Theorems B and C as follows.
Theorem C, of course, only invokes (†) in the case when Q 6= Q′, so we suppose
that we are in this case, which occurs precisely when H is non-abelian. Take
L to be the smallest closed isolated normal subgroup of H containing both the
isolated derived subgroup H ′ [10, Theorem B] and the centre Z of H. Now L is
a proper subgroup by Lemma 3.5, and we will choose ω for L as in Theorem B.
We may arrange it in (†) and Theorem C so that, for some l ≤ e, the elements
Y1, . . . , Yl correspond to a Zp-module basis x1, . . . , xl for H/L; and here the
value of the filtration f can be understood in terms of the p-valuation ω. We
show that:
4
Theorem D. Take an automorphism σ of H. Suppose that the induced auto-
morphism on gr f (Q ∗ F ) fixes each of the valuations v1, . . . , vs and fixes each
of the elements Y1, . . . , Yl. Then the induced automorphism on H/L (which
can be seen as a matrix Mσ ∈ GLl(Zp)) lies in the first congruence subgroup of
GLl(Zp), i.e. it takes the form Mσ ∈ 1+pX for some X ∈ Ml(Zp). In particular,
when p > 2, σ has finite order if and only if it is the identity automorphism.
A special case of Theorem A, in which ∆+ = 1, is now deduced from Theo-
rem D via a long but elementary argument about X-inner automorphisms: see
Definition 3.1 and Proposition 3.7 for details.
The case when ∆+ 6= 1 now follows as a consequence of the "untwisting" results
of [11, Theorems B and C], which allow us to understand the prime ideals of
kH, along with the conjugation action of G, in terms of the corresponding
information for k′[[H/∆+]] (for various finite field extensions k′/k). Now, as
∆+(G/∆+) = 1 and H/∆+ = FNp(G/∆+), we are back in the previous case.
See Proposition 3.8 for details.
5
1 p-valuations and crossed products
1.1 Preliminaries on p-valuations
Definition 1.1. Recall from [6, III, 2.1.2] that a p-valuation on a group G is a
function ω : G → R ∪ {∞} satisfying:
• ω(xy−1) ≥ min{ω(x), ω(y)} for all x, y ∈ G
• ω([x, y]) ≥ ω(x) + ω(y) for all x, y ∈ G
• ω(x) = ∞ if and only if x = 1
• ω(x) > 1
p−1 for all x ∈ G
• ω(xp) = ω(x) + 1 for all x ∈ G.
Throughout this paper we will often be considering several p-valuations admit-
ted by a group G, so to clarify we may refer to G together with a p-valuation ω
as the p-valued group (G, ω) (though when the p-valuation in question is clear
from context, we will simply write G).
Given a p-valuation ω on a group G, we may write
Gω,λ := Gλ := ω−1([λ, ∞]),
Gω,λ+ := Gλ+ := ω−1((λ, ∞])
and define the graded group
grωG :=Mλ∈R
Gλ/Gλ+ .
Then each element 1 6= x ∈ G has a principal symbol
grω(x) := xGµ+ ∈ Gµ/Gµ+ ≤ grωG,
where µ is defined such that µ = ω(x).
Remark. Let (G, ω) be a p-valued group, and N an arbitrary subgroup of G.
Then (N, ωN ) is p-valued. Moreover, if G has finite rank [6], then so does N ;
and if G is complete with respect to ω and N is a closed subgroup of G, then
N is complete with respect to ωN .
Definition 1.2. Given an arbitrary complete p-valued group (G, ω) of finite
rank, and a closed isolated normal subgroup K (i.e. a closed normal subgroup
K such that G/K is torsion-free), we may define the quotient p-valuation Ω
induced by ω on G/K as follows:
Ω(gK) = sup
k∈K
{ω(gk)}.
6
This is defined by Lazard, but the definition is spread across several results, so we
collate them here for convenience. The definition in the case of filtered modules
is [6, I, 2.1.7], and is modified to the case of filtered groups in [6, the remark
after II, 1.1.4.1]. The specialisation from filtered groups to p-saturable groups
is done in [6, III, 3.3.2.4], where it is proved that Ω is indeed still a p-valuation
on G/K; and the general case is stated in [6, III, 3.1.7.6], and eventually proved
in [6, IV, 3.4.2].
As a partial inverse to the above process of passing to a quotient p-valuation, we
prove the following general result about "lifting" p-valuations from torsion-free
quotients.
Theorem 1.3. Let G be a complete p-valued group of finite rank, and N a
closed isolated orbital (hence normal) subgroup of G. Suppose we are given two
functions
α, β : G → R ∪ {∞},
such that α is a p-valuation on G, and β factors through a p-valuation on G/N ,
i.e.
β : G/N → R ∪ {∞}.
Then ω = inf{α, β} is a p-valuation on G.
Proof. α and β are both filtrations on G (in the sense of [6, II, 1.1.1]), and so
by [6, II, 1.2.10], ω is also a filtration. Following [6, III, 2.1.2], for ω to be a
p-valuation, we need to check the following three conditions:
(i) ω(x) < ∞ for all x ∈ G, x 6= 1.
This follows from the fact that α is a p-valuation, and hence α(x) < ∞
for all x ∈ G, x 6= 1.
(ii) ω(x) > (p − 1)−1 for all x ∈ G.
This follows from the fact that α(x) > (p − 1)−1 and β(x) > (p − 1)−1 for
all x ∈ G by definition.
(iii) ω(xp) = ω(x) + 1 for all x ∈ G.
Take any x ∈ G. As α is a p-valuation, we have by definition that
α(xp) = α(x) + 1.
If x ∈ N , this alone is enough to establish the condition, as ωN = αN
(since β(x) = ∞).
Suppose instead that x ∈ G \ N . Then, as N is assumed isolated orbital
in G, we also have xp ∈ G \ N , so by definition of β we have
β(xp) = β((xN )p) = β(xN ) + 1 = β(x) + 1,
with the middle equality coming from the fact that β is a p-valuation.
Now it is clear that ω(xp) = ω(x) + 1 by definition of ω.
7
Finally, the following function will be crucial. (It is in fact a p-valuation, but
we delay the proof of this fact until Lemma 1.6.)
Definition 1.4. Let A be a free abelian pro-p group of rank d > 0 (here written
multiplicatively). Choose a real number t > (p − 1)−1. Then the (t, p)-filtration
on A is the function ω : A → R ∪ {∞} defined by
ω(x) = t + n,
where n is the non-negative integer such that x ∈ Apn
ω(1) = ∞.)
\ Apn−1
. (By convention,
1.2 Ordered bases
Definition 1.5. Recall from [2, 4.2] that an ordered basis for a p-valued group
(G, ω) is a set {g1, . . . , ge} of elements of G such that every element x ∈ G can
be uniquely written as the (ordered) product
for some λi ∈ Zp, and
x = Y1≤i≤e
gλi
i
ω(x) = inf
1≤i≤e
{ω(gi) + vp(λi)},
where vp is the usual p-adic valuation on Zp. (Note that an ordered basis for
(G, ω) need not be an ordered basis for (G, ω′) for another p-valuation ω′.)
As in [2], we will often write
gλ := Y1≤i≤e
gλi
i
as shorthand, where λ ∈ Ze
p.
We now show that the function given in Definition 1.4 is indeed a p-valuation,
and demonstrate some of its properties.
Lemma 1.6. Let A and t be as in Definition 1.4.
(i) The (t, p)-filtration ω is a p-valuation on A.
(ii) Suppose we are given a Zp-module basis B = {a1, . . . , ad} for A, and a
p-valuation α on A satisfying α(a1) = · · · = α(ad) = t. Then α is the
(t, p)-filtration on A, and B is an ordered basis for (A, α).
(iii) The (t, p)-filtration ω is completely invariant under automorphisms of A,
i.e. the subgroups Aω,λ and Aω,λ+ are characteristic in A.
Proof.
8
(i) This is a trivial check from the definition [6, III, 2.1.2].
(ii) By [6, III, 2.2.4], we see that
α(aλ1
1 . . . aλd
d ) = t + inf
1≤i≤d
{vp(λi)},
which is precisely the (t, p)-filtration.
(iii) The subgroups Apn
are clearly characteristic in A.
Remark. The (t, p)-filtration as defined here is equivalent to the definition given
in [6, II, 3.2.1] for free abelian pro-p groups of finite rank.
Recall from [10, Definitions 1.1 and 1.4] that a closed subgroup H of a profinite
group G is (G-)orbital if it has finitely many G-conjugates, and isolated orbital
if any G-orbital H ′ (cid:13) H satisfies [H ′ : H] = ∞.
The following is a general property of ordered bases.
Lemma 1.7. Let (G, ω) be a complete p-valued group of finite rank, and N
a closed isolated normal subgroup of G. Then there exist sets BN ⊆ BG such
that BN is an ordered basis for (N, ωN ) and BG is an ordered basis for (G, ω).
Proof. This was established in [2, proof of Lemma 8.5(a)].
Remark. It may be helpful to think of this as follows:
BG =(cid:8) x1, . . . , xr
}
{z
BG/N
BN
{z
, xr+1, . . . , xs
(cid:9),
}
where BG/N = BG \BN is in fact some appropriate preimage in G of any ordered
basis for (G/N, Ω), where Ω is the quotient p-valuation.
Lemma 1.8. Let (G, α) be a complete p-valued group of finite rank, and N a
closed isolated orbital (hence normal) subgroup of G. Take also a p-valuation β
on G/N . Suppose we are given sets
BG =(cid:8) x1, . . . , xr
{z
}
BG/N
, xr+1, . . . , xs
BN
{z
}
(cid:9),
such that
• BN is an ordered basis for (N, αN ),
• BG is an ordered basis for (G, α), and
• the image in G/N of BG/N is an ordered basis for (G/N, β).
In the notation of Theorem 1.3, write β for the composite of G → G/N with β,
and form the p-valuation ω = inf{α, β} for G.
Then BG is an ordered basis for (G, ω).
9
Proof. We need only check that
ω(xλ) = inf
1≤i≤s
{ω(xi) + vp(λi)}
for any λ ∈ Zs
p. But we have by definition that
α(xλ) = inf
1≤i≤s
{α(xi) + vp(λi)},
β(xλ) = inf
1≤i≤r
{β(xi) + vp(λi)},
and the result follows trivially.
1.3 Separating a free abelian quotient
Results in later sections will require the existence of a p-valuation on an appro-
priate group G satisfying a certain technical property, which we can now finally
state:
Definition 1.9. Let (G, ω) be a complete p-valued group of finite rank, and
L a closed isolated normal subgroup containing [G, G] (and hence containing
the isolated derived subgroup G′, which was defined and written as G(1) in [10,
Theorem B]). We will say that ω satisfies property (AL) if there is an ordered
basis {gd+1, . . . , ge} for (L, ωL), contained in an ordered basis {g1, . . . , ge} for
(G, ω) (e.g. constructed by Lemma 1.7), such that the following hold:
and, for all ℓ ∈ L,
ω(g1) = · · · = ω(gd),
ω(g1) < ω(ℓ). )
(AL)
Remark. In the notation of the above definition, suppose that ω satisfies ω(g1) < ω(ℓ)
for all ℓ ∈ L. Then, by our earlier remarks, we note that the condition (AL) is
equivalent to the statement that the quotient p-valuation induced by ω on G/L
is the (t, p)-filtration for t := ω(g1).
Definition 1.10. Following [6, III, 2.1.2], we will say that a group G is p-
valuable if there exists a p-valuation ω for G, and G is complete with respect to
ω and has finite rank.
Lemma 1.11. Let G be a nilpotent p-valuable group, and L a closed isolated
normal subgroup containing G′. Then there exists some p-valuation ω for G
satisfying (AL).
Proof. Let α be a p-valuation on G. Take an ordered basis {gd+1, . . . , ge} for
(L, αL) and extend it to an ordered basis {g1, . . . , ge} for (G, α) by Lemma 1.7.
Fix a number t satisfying
(p − 1)−1 < t ≤ inf
1≤i≤e
α(gi).
10
Applying Theorem 1.3 with N = L and β the (t, p)-filtration on G/L, we see
that ω = inf{α, β} is a p-valuation for G; and by Lemma 1.8, {g1, . . . , ge} is
still an ordered basis for (G, ω), so we can check easily that ω satisfies (AL) by
construction.
Remark. In fact, by analysing the construction in Theorem 1.3, we can see that
we have shown something stronger: that any p-valuation α may be refined to
such an ω satisfying ωL = αL. But we will not use this fact in this paper.
Remark. If ω satisfies (AL) as above, write t := ω(g1). Then, for any automor-
phism σ of G and any 1 ≤ i ≤ d, we have
ω(σ(gi)) = t.
This follows from Lemma 1.6(iii). Indeed, by construction, we have Gt = G,
and Gt+ = Gp · L, an open normal subgroup; and when L is characteristic, Gt+
is characteristic.
Now let G be a p-valuable group with fixed p-valuation ω, and let σ ∈ Aut(G).
In this subsection and the next, we seek to establish conditions under which a
given automorphism σ of G will preserve the "dominant" part of certain elements
x ∈ G (with respect to ω). That is, we are looking for a condition under which
Clearly it is necessary and sufficient that the following holds:
grω(σ(x)) = grω(x).
ω(σ(x)x−1) > ω(x).
(1.1)
The results of this paper rely on our ability to invoke the following technical
result.
Theorem 1.12. Let G be a p-valuable group, and let L be a proper closed
isolated orbital (hence normal) subgroup containing [G, G], so that we have an
isomorphism ϕ : G/L → Zd
p for some d ≥ 1. Write q : G → G/L for the natural
quotient map.
Choose a Zp-basis {e1, . . . , ed} for Zd
p. For each 1 ≤ i ≤ d, fix an element gi ∈ G
with ϕ◦ q(gi) = ei. Fix an automorphism σ of G preserving L, so that σ induces
an automorphism σ of G/L, and hence an automorphism σ = ϕ ◦ σ ◦ ϕ−1 of Zd
p.
Let Mσ be the matrix of σ with respect to the basis {e1, . . . , ed}.
Suppose there exists some p-valuation ω on G with the following properties:
(i) (1.1) holds for all x ∈ {g1, . . . , gd},
(ii) ω(g1) = · · · = ω(gd)(= t, say),
(iii) ω(ℓ) > t for all ℓ ∈ L.
Then Mσ − 1 ∈ pMd(Zp).
11
Remark. Conditions (ii) and (iii) are just the statement that ω satisfies (AL).
Proof. Define the function Ω : Zd
p → R ∪ {∞} by
Ω ◦ ϕ(gL) = sup
ℓ∈L
{ω(gℓ)}.
By the remarks made in Definition 1.2, Ω is in fact a p-valuation.
By assumption (iii), we see that, for each 1 ≤ i ≤ d and any ℓ ∈ L, we have
ω(gi) = ω(giℓ), so that
Ω(ei) = Ω ◦ ϕ(giL) = sup
ℓ∈L
{ω(giℓ)} = ω(gi),
so by assumption (ii), Ω(ei) = t. Hence, by Lemma 1.6(ii), Ω must be the
(t, p)-filtration on Zd
p. Now, by assumption (i), we have
Ω(σ(x) − x) > t
for all x ∈ {e1, . . . , ed}, and hence, as Ω − t takes integer values (by Definition
1.4),
Ω(σ(x) − x) ≥ t + 1,
and so σ(x) − x ∈ pZd
prove.
p for each x ∈ {e1, . . . , ed}, which is what we wanted to
Remark. With Lemma 1.6 in mind, we note the following: suppose ω satis-
fies hypothesis (iii) of Theorem 1.12. Then hypothesis (ii) is equivalent to the
statement that the quotient filtration induced by ω on G/L is actually the
(t, p)-filtration on G/L.
1.4
Invariance under the action of a crossed product
Definition 1.13. Let R be a ring, and fix a subgroup G ≤ R×; let F be a
group. Fix a crossed product
S = R ∗
hσ,τ i
F.
Consider the following properties that this crossed product may satisfy:
The image σ(F ) normalises G, i.e. xσ(f ) ∈ G for all x ∈ G, f ∈ F .
The image τ (F, F ) normalises G.
The image τ (F, F ) is a subset of G.
(NG)
(N′
G)
(PG)
In the case when G is p-valuable, consider the set of p-valuations of G. Then
Aut(G) acts on this set as follows:
(ϕ · ω)(x) = ω(xϕ).
12
When S satisfies (N′
G), τ (F, F ) ⊆ G, so we get a map ρ : τ (F, F ) → Inn(G)
(with elements of G acting by conjugation), so we will also consider the following
property:
Every p-valuation ω of G is invariant under elements of τ (F, F ).
(QG)
Lemma 1.14. In the notation above:
(i) If S satisfies (NG), then S satisfies (N′
(ii) If S satisfies (PG), then S satisfies (N′
G).
G).
(iii) If S satisfies (PG), then S satisfies (QG).
Proof.
(i) Note that ρ ◦ τ (x, y) = σ(xy)−1σ(x)σ(y).
(ii) Obvious.
(iii) By (ii), we see that S satisfies (N′
G), so it makes sense to consider (QG).
Let ω be a p-valuation of G, and take t ∈ τ (F, F ). As S satisfies (PG), we
actually have t ∈ G. Then, for any x ∈ G, we have
(t · ω)(x) = ω(xt)
= ω(t−1xt)
= ω(x · [x, t])
≥ min{ω(x), ω([x, t])} = ω(x),
and so (by symmetry) ω(t−1xt) = ω′(x).
Definition 1.15. Recall, from [11, Definition 5.4], that if we have a fixed crossed
product
S = R ∗
hσ,τ i
F
(1.2)
and a 2-cocycle
then we may define the ring
α ∈ Z 2
σ(F, Z(R×)),
Sα = R ∗
hσ,τ αi
F,
the 2-cocycle twist (of R, by α, with respect to the decomposition (1.2)).
Lemma 1.16. Continuing with the notation above,
(i) S satisfies (NG) if and only if Sα satisfies (NG).
13
(ii) S satisfies (QG) if and only if Sα satisfies (QG).
Proof.
(i) Trivial from Definitions 1.13 and 1.15.
(ii) As α(F, F ) ⊆ Z(R)×, conjugation by α is the identity automorphism on
G.
These properties will be interesting to us later as they will allow us to invoke
the following lemma:
Lemma 1.17. If S satisfies (NG), then, given any g ∈ F and p-valuation ω on
G, the function g · ω given by
(g · ω)(x) = ω(xσ(g))
is again a p-valuation on G. If, further, S satisfies (QG), then this is a group
action of F on the set of p-valuations of G.
Proof. If x ∈ G, then xσ(g) ∈ G because S satisfies (NG), so it makes sense to
consider ω(xσ(g)). The definition above does indeed give a group action when
S satisfies (QG), as, for all g, h ∈ F ,
(g · (h · ω))(x) = h · ω(xσ(g))
= ω(xσ(g)σ(h))
= ω(xσ(gh)τ (g,h))
= ω(xσ(gh))
= (gh · ω)(x).
by (QG)
The following lemma will allow us to prove the existence of a sufficiently "nice"
p-valuation.
Lemma 1.18. Suppose S satisfies (NG) and (QG), so that σ induces an action
of F on the set of p-valuations on G as in the above lemma. Let ω be a p-
If the F -orbit of ω is finite, then ω′(x) = inf g∈F (g · ω)(x)
valuation on G.
defines an F -invariant p-valuation on G.
Furthermore, if L is a closed isolated characteristic subgroup of G containing
G′, and ω satisfies (AL) (as in Definition 1.9), then ω′ satisfies (AL).
Proof. The function ω′ satisfies condition [6, III, 2.1.2.2], since the F -orbit of
ω is finite, and is hence a p-valuation that is F -stable by the remark in [6, III,
2.1.2].
Suppose ω satisfies (AL). That is, for some t > (p − 1)−1, ω induces the
(t, p)-filtration on G/L, and ω(ℓ) > t for all ℓ ∈ L. But, given any g ∈ F ,
14
clearly g · ω still induces the (t, p)-filtration on G/L by Lemma 1.6(iii), and
(g · ω)(ℓ) = ω(ℓσ(g)) > t, since ℓσ(g) ∈ L as L is characteristic. Taking the
infimum over the finitely many distinct g · ω, g ∈ F , shows that ω′ also satisfies
(AL).
Recall the finite radical ∆+ = ∆+(G) from [10, Definition 1.2].
Definition 1.19. Let G be an arbitrary compact p-adic analytic group with
∆+ = 1, H an open normal subgroup of G, F = G/H, and P a faithful G-
stable ideal of kH. Recall from [11, Definition 5.11] that the crossed product
decomposition
kG/P kG = kH/P ∗
hσ,τ i
F
is standard if the basis F is a subset of the image of the map G ֒→ (kG/P kG)×.
Lemma 1.20. Suppose that kG/P kG = kH/P ∗
hσ,τ i
F is a standard crossed
product decomposition. Take any α ∈ Z 2
tral 2-cocycle twist
σ(F, Z((kH/P )×)), and form the cen-
(kG/P kG)α := kH/P ∗
hσ,τ αi
F
with respect to this decomposition [11, Definition 5.4].
Consider H as a subgroup of (kH/P )×: then conjugation by elements of G
inside ((kG/P kG)α)× induces a group action of F on the set of p-valuations of
H, as in Lemma 1.17.
Remark. As the crossed product notation suggests, this lemma simply says that
the action of F on H, via σ, is unchanged after applying (−)α.
Proof. As the decomposition is standard, kG/P kG trivially satisfies both (NH )
(as H is normal in G) and (PH ). By Lemma 1.14(iii), kG/P kG also satisfies
(QH ). Now Lemma 1.16 shows that (kG/P kG)α also satisfies (NH ) and (QH ), so
that σ induces a group action of F on the p-valuations of H inside (kG/P kG)α
by Lemma 1.17.
Let L be a closed isolated characteristic subgroup of H containing [H, H].
Corollary 1.21. With notation as above, we can find an F -stable p-valuation
ω on H satisfying (AL).
Proof. This now follows immediately from Lemmas 1.11 and 1.18.
Proof of Theorem B. This follows from Corollary 1.21.
15
2 A graded ring
2.1 Generalities on ring filtrations
Definition 2.1. Recall that a filtration v on the ring R is a function v : R → R∪{∞}
satisfying, for all x, y ∈ R,
• v(x + y) ≥ min{v(x), v(y)},
• v(xy) ≥ v(x) + v(y),
• v(0) = ∞, v(1) = 0.
If in addition we have v(xy) = v(x) + v(y) for all x, y ∈ R, then v is a valuation
on R.
First, a basic property of ring filtrations.
Lemma 2.2. Suppose v is a filtration on R which takes non-negative values,
i.e. v(R) ⊆ [0, ∞], and let u ∈ R×. Then v(ux) = v(xu) = v(x) for all x ∈ R.
Proof. By the definition of v, we have 0 = v(1) = v(uu−1) ≥ v(u) + v(u−1). As
v(u) ≥ 0 and v(u−1) ≥ 0, we must have v(u) = 0 = v(u−1). Then
v(x) = v(u−1ux) ≥ v(u−1) + v(ux) = v(ux) ≥ v(u) + v(x) = v(x),
from which we see that v(x) = v(ux); and by a symmetric argument, we also
have v(xu) = v(x).
We will fix the following notation for this subsection.
Notation. Let G be a p-valuable group equipped with the fixed p-valuation
ω, and k a field of characteristic p. Take an ordered basis {g1, . . . , gd} for G,
and write bi = g1 − 1 ∈ kG for all 1 ≤ i ≤ d. As in [2], we make the following
definitions:
• for each α ∈ Nd, bα means the (ordered) product bα1
p, gα means the (ordered) product gα1
• for each α ∈ Zd
1 . . . bαd
1 . . . gαd
d ∈ kG,
d ∈ G,
• for each α ∈ Nd, hα, ω(g)i means
αiω(gi),
d
Xi=1
• the canonical ring homomorphism Zp → k will sometimes be left implicit,
but will be denoted by ι when necessary for clarity.
Definition 2.3. With notation as above, let w be the valuation on kG defined
in [2, 6.2], given by
Xα∈Nd
λαbα 7→ inf
α∈Nd(cid:8)hα, ω(g)i(cid:12)(cid:12) λα 6= 0(cid:9).
16
Note that, in light of this formula [2, Corollary 6.2(b)], and by the construc-
tion [6, III, 2.3.3] of w, it is clear that the value of w is in fact independent
of the ordered basis chosen.
In particular, if ϕ is an automorphism of G,
then {gϕ
d } is another ordered basis of G; hence if ω is ϕ-stable (in the
sense that ω(gϕ) = ω(g) for all g ∈ G), then w is ϕ-stable (in the sense that
w(x ϕ) = w(x) for all x ∈ kG, where ϕ here denotes the natural extension of ϕ
to kG, obtained by the universal property [11, Lemma 2.2]).
1 , . . . , gϕ
We will need the following result:
Lemma 2.4. Let
b = b0 + b1p + b2p2 + · · · ∈ Zp,
n = n0 + n1p + n2p2 + · · · + nsps ∈ N,
where all bi, ni ∈ {0, 1, . . . , p − 1}. Then
(cid:18)b
n(cid:19) ≡
s
Yi=0(cid:18)bi
ni(cid:19) mod p.
Proof. See e.g. [1, Theorem].
Corollary 2.5. Let b ∈ Zp, n ∈ N. If
vp(cid:18)(cid:18)b
n(cid:19)(cid:19) = 0,
(2.1)
then vp(b) ≤ vp(n). Further, for fixed b ∈ Zp,
Proof. From Lemma 2.4 above, we can see that
n(cid:19)(cid:19) = 0(cid:27) = pvp(b).
vp(cid:18)(cid:18)b
inf(cid:26)n ∈ N(cid:12)(cid:12)(cid:12)(cid:12)
(cid:18)b
n(cid:19) ≡ 0 mod p
if and only if, for some 0 ≤ i ≤ s,
ni(cid:19) = 0,
(cid:18)bi
which happens if and only if one of the pairs (bi, ni) for 0 ≤ i ≤ s has bi = 0 6= ni.
Hence, to ensure that this does not happen, we must have vp(b) ≤ vp(n). It is
clear from Lemma 2.4 that n = pvp(b) satisfies (2.1), and is the least n ∈ N with
vp(b) ≤ vp(n).
Theorem 2.6. Take any x ∈ G, and t = inf ω(G). Then w(x − 1) > t implies
ω(x) > t.
17
Proof. Write x = gα. In order to show that ω(gα) > t, it suffices to show that
ω(gj) + vp(αj) > t for each j (as there are only finitely many), and hence that
vp(αj ) ≥ 1 for all j such that ω(gj) = t. This is equivalent to the claim that
pvp(αj ) > 1, which we will write as pvp(αj )ω(gj) > t for all j with ω(gj) = t.
Let β(j) be the d-tuple with ith entry δij pvp(αj ). Then, of course,
hβ(j), ω(g)i = pvp(αj )ω(gj),
and by Corollary 2.5, we have
(cid:18) α
β(j)(cid:19) 6≡ 0 mod p.
Now suppose that w(gα − 1) > t. We perform binomial expansion in kG to see
that
(1 + bi)αi − 1
gα − 1 = Y1≤i≤d
ι(cid:18)α
β(cid:19)bβ − 1
= Xβ∈Nd
ι(cid:18)α
β(cid:19)bβ,
=Xβ6=0
so that
(ordered product)
β 6= 0,(cid:18)α
β(cid:19) 6≡ 0 mod p(cid:27) .
w(gα − 1) = inf(cid:26)hβ, ω(g)i(cid:12)(cid:12)(cid:12)(cid:12)
So in particular, for all j satisfying ω(gj) = t, we have
t < w(gα − 1) ≤ hβ(j), ω(g)i = pvp(αj )ω(gj),
which is what we wanted to prove.
2.2 Constructing a suitable valuation
Let H be a nilpotent p-valuable group with centre Z. If k is a field of charac-
teristic p, and p is a faithful prime ideal of kZ, then by [2, Theorem 8.4], the
ideal P := pkH is again a faithful prime ideal of kH.
We will fix the following notation for this subsection.
Notation. Let G be a nilpotent-by-finite compact p-adic analytic group, with
∆+ = 1, and let H = FNp(G) [10, Definition 5.3], here a nilpotent p-valuable
radical, so that ∆ = Z := Z(H) [10, proof of Lemma 1.2.3(iii)]. We will also
write F = G/H.
18
Define Q′ = Q(kZ/p), the (classical) field of fractions of the (commutative)
domain kZ/p, and Q = Q′ ⊗
kH, a tensor product of kZ-algebras, which (as
kZ
P = pkH) we may naturally identify with the (right) localisation of kH/P with
respect to (kZ/p) \ {0} -- a subring of the Goldie ring of quotients Q(kH/P ).
Suppose further that the prime ideal p ✁ kZ is invariant under conjugation by
elements of G.
Choose a crossed product decomposition
kG/P kG = kH/P ∗
hσ,τ i
F
which is standard in the sense of the notation of Corollary 1.21. Choose also
σ(F, Z((kH/P )×)), and form as in [11, Definition 5.4] the central
any α ∈ Z 2
2-cocycle twist
(kG/P kG)α = kH/P ∗
hσ,τ αi
F.
Now the (right) divisor set (kZ/p) \ {0} is G-stable by assumption, so by [8,
Lemma 37.7], we may define the partial quotient ring
R := Q ∗
hσ,τ αi
F.
(2.2)
Our aim in this subsection is to construct an appropriate filtration f on the ring
R. We will build this up in stages, following [2]. First, we define a finite set of
valuations on Q′.
Definition 2.7. In [2, Theorem 7.3], Ardakov defines a valuation on Q(kH/P );
let v1 be the restriction of this valuation to Q′, so that v1(x + p) ≥ w(x) for all
x ∈ kZ (where w is as in Definition 2.3).
Lemma 2.8. σ induces a group action of F on the set of valuations of Q′.
Proof. Let u be a valuation of Q′. G acts on the set of valuations of Q′ as
follows:
(g · u)(x) = u(g−1xg).
Clearly, if g ∈ H, then g−1xg = x (as x ∈ Q(kZ/p) where Z is the centre of
H). Hence H lies in the kernel of this action, and we get an action of F on the
set of valuations. By our choice of F as a subset of the image of G, this is the
same as σ.
Write {v1, . . . , vs} for the F -orbit of v1.
Lemma 2.9. The valuations v1, . . . , vs are independent.
Proof. The vi are all non-trivial valuations with value groups equal to subgroups
of R by definition. Hence, by [3, VI.4, Proposition 7], they have height 1.
19
They are also pairwise inequivalent:
indeed, suppose vi is equivalent to g · vi
for some g ∈ F . Then by [3, VI.3, Proposition 3], there exists a positive real
number λ with vi = λ(g · vi), and so vi = λn(gn · vi) (as the actions of λ and
g commute) for all n. But F is a finite group: so, taking n = o(g), we get
vi = λnvi. As vi is non-trivial, we must have that λn = 1, and so λ = 1. So
we may conclude, from [3, VI.4, Proposition 6(c)], that the valuations v1, . . . , vs
are independent.
Definition 2.10. Let v be the filtration of Q′ defined by
v(x) = inf
1≤i≤s
vi(x)
for each x ∈ Q′.
Lemma 2.11. grvQ′ ∼=
Proof. The natural map
grvi Q′.
s
Mi=1
Q′
v,λ →
s
Mi=1
Q′
vi,λ/Q′
vi,λ+
Q′
vi,λ+ = Q′
v,λ+ , giving an injective map grvQ′ →
grvi Q′.
s
Mi=1
clearly has kernel
s
\i=1
The surjectivity of this map now follows from the Approximation Theorem [3,
VI.7.2, Th´eor`eme 1], as the vi are independent by Lemma 2.9.
Next, we will extend the vi and v from Q′ to Q, as in the proof of [2, 8.6].
Notation. Continue with the notation above. Now, H is p-valuable, and by
Lemma 1.20, F acts on the set of p-valuations of H; hence, by Lemma 1.18 (or
Corollary 1.21), we may choose a p-valuation ω which is F -stable. Fix such an
ω, and construct the valuation w on kH from it as defined in Definition 2.3.
Let {ye+1, . . . , yd} be an ordered basis for Z, and extend it to an ordered basis
{y1, . . . , yd} for H as in Lemma 1.7 (noting that Z is a closed isolated normal
subgroup of H by [2, Lemma 8.4(a)]). For each 1 ≤ j ≤ e, set cj = yj − 1 inside
the ring kH/P .
Recall from [2, 8.5] that elements of Q may be written uniquely as
rγ cγ ,
Xγ∈Ne
where rγ ∈ Q′ and cγ := cγ1
module.
1 . . . cγe
e , so that Q ⊆ Q′[[c1, . . . , ce]] as a left Q′-
20
Definition 2.12. For each 1 ≤ i ≤ s, as in [2, proof of Theorem 8.6], we will
define the valuation fi : Q → R ∪ {∞} by
rγ cγ
fi
Xγ∈Ne
γ∈Ne
= inf
{vi(rγ) + w(cγ )}.
(We remark here a slight abuse of notation: the domain of w is kH, and so
w(cγ ) must be understood to mean w(bγ ), where bj = yj − 1 inside the ring
kH for each 1 ≤ j ≤ e. That is, bj is the "obvious" lift of cj from kH/P to kH.
This relies on the assumption that P is faithful.)
Note in particular that fiQ′ = vi, and grfi Q is a commutative domain, again
by [2, proof of Theorem 8.6].
Lemma 2.13. σ induces a group action of F on the set of valuations of Q.
Proof. Let u be a valuation of Q. Again, G acts on the set of valuations of Q
by (g · u)(x) = u(g−1xg). Now, any n ∈ H can be considered as an element of
Q×, so that
(n · u)(x) = u(n−1xn) = u(n−1) + u(x) + u(n) = u(x).
In the following lemma, we crucially use the fact that ω has been chosen to be
F -stable.
Lemma 2.14. f1, . . . , fs is the F -orbit of f1.
Proof. Take some g ∈ F and some 1 ≤ i, j ≤ s such that vj = g · vi. We
will first show that, for all x ∈ Q, we have fj(x) ≤ g · fi(x).
Indeed, as
fjQ′ = vj = g · vi = g · fiQ′ , and both fj and g · fi are valuations, it will suffice
to show that (w(ck) =)fj(ck) ≤ g · fi(ck) for each 1 ≤ k ≤ e.
Fix some 1 ≤ k ≤ e. Write yg
k = zyα for some α ∈ Ze
p and z ∈ Z, so that
cg
k = yg
k − 1 = zyα − 1
(1 + ci)αi − 1!
= (z − 1) + z e
Yi=1
β(cid:19)cβ
= (z − 1) + z
ι(cid:18)α
Xβ6=0
,
(g · fi)(ck) = inf(cid:26)vi(z − 1), w(cβ )(cid:12)(cid:12)(cid:12)(cid:12)
ι(cid:18)α
β(cid:19) 6= 0(cid:27)
≥ inf(cid:26)w(z − 1), w(cβ )(cid:12)(cid:12)(cid:12)(cid:12)
ι(cid:18)α
β(cid:19) 6= 0(cid:27)
= w(cg
k),
and hence
21
(ordered product)
by Definition 2.12
by Definition 2.7
with this final equality following from [2, Lemma 8.5(b)]. But now, as ω has
been chosen to be G-stable, w is also G-stable (see the remark in Definition
2.3), so that w(cg
k) = w(ck).
Now, we have shown that, if vj = g · vi on Q′, then fj ≤ g · fi on Q.
Similarly, we have vi = g−1·vj on Q′, so fi ≤ g−1·fj on Q. But fi(x) ≤ fj(xg−1
)
for all x ∈ Q is equivalent to fi(yg) ≤ fj(y) for all y ∈ Q (by setting x = yg).
Hence we have fi = g · fj on Q, and we are done.
As in Definition 2.10:
Definition 2.15. Let f be the filtration of Q defined by
f (x) = inf
1≤i≤s
fi(x)
for each x ∈ Q.
We now verify that the relationship between f and v is the same as that between
the fi and the vi (Definition 2.12).
Lemma 2.16. Take any x ∈ Q, and write it in standard form as
rγ cγ.
x = Xγ∈Ne
Then we have
f (x) = inf
γ∈Ne
{v(rγ) + w(cγ )}.
Proof. Immediate from Definitions 2.10, 2.12 and 2.15.
Now we can extend Lemma 2.11 to Q:
Lemma 2.17. grf Q ∼=
s
Mi=1
grfi Q.
Proof. As in the proof of Lemma 2.11, we get an injective map
grf Q →
s
Mi=1
grfi Q.
The proof of [2, 8.6] gives a map
and isomorphisms
(grv(kZ/p))[Y1, . . . , Ye] → grf (kH/P )
(grvi(kZ/p))[Y1, . . . , Ye] ∼= grfi (kH/P )
22
for each 1 ≤ i ≤ s, in each case mapping Yj to gr(cj) for each 1 ≤ j ≤ e.
Now, gr kH is a gr-free [5, §I.4.1, p. 28] gr kZ-module with respect to f and
each fi, and each of these filtrations is discrete on kH by construction (see [2,
Corollary 6.2 and proof of Theorem 7.3]), so by [5, I.6.2(3)], kH is a filt-free kZ-
module with respect to f and each fi; and by [5, I.6.14], these maps extend to a
map (grvQ′)[Y1, . . . , Ye] → grf Q and isomorphisms (grvi Q′)[Y1, . . . , Ye] ∼= grfiQ
for each i.
Applying Lemma 2.14 to each 1 ≤ i ≤ s, we get isomorphisms
(grvi Q′)[Y1, . . . , Ye] → grfi Q,
which give a commutative diagram
(grvQ′)[Y1, . . . , Ye]
∼= /
s
Mi=1
(grvi Q′)[Y1, . . . , Ye]
grf Q
∼=
grfiQ.
s
Mi=1
Hence clearly all maps in this diagram are isomorphisms.
Now we return to the ring R = Q ∗ F defined in (3.2).
Definition 2.18. We can extend the filtration f on Q to an F -stable fil-
tration on R by giving elements of the basis F value 0. That is, writing
r=1 grxr
F = {g1, . . . , gm}, any element of Q ∗ F can be expressed uniquely asPm
for some xr ∈ Q: the assignment
Q ∗ F → R ∪ {∞}
m
Xr=1
grxr 7→ inf
1≤r≤mnf (xr)o
is clearly a filtration on Q∗F whose restriction to Q is just f . We will temporar-
ily refer to this filtration as f , though later we will drop the hat and simply call
it f .
Note that, for any real number λ,
(Q ∗ F ) f ,λ =
(Q ∗ F ) f ,λ+ =
gi(Qf,λ),
gi(Qf,λ+ ),
m
m
Mi=1
Mi=1
23
/
/
/
so that
gr f (Q ∗ F ) =Mλ∈R m
Mi=1
gi Mλ∈R
Mi=1
=
m
gi(Qf,λ/Qf,λ+)!
(Qf,λ/Qf,λ+)! =
m
Mi=1
gi(cid:0)grf (Q)(cid:1) .
That is, given the data of a crossed product Q ∗ F as in (3.2), we may view
gr f (Q ∗ F ) as grf (Q) ∗ F in a natural way.
We will finally record this as:
Lemma 2.19.
grf (Q ∗ F ) = grf (Q) ∗ F ∼= s
Mi=1
∼= s
Mi=1
grfiQ! ∗ F
(grvi Q′)[Y1, . . . , Ye]! ∗ F,
where each grfi Q (or equivalently each grvi Q′) is a domain (see Definition 2.12).
F permutes the fi (or equivalently the vi) transitively by conjugation.
Proof of Theorem C. This is Lemma 2.19.
2.3 Automorphisms trivial on a free abelian quotient
We will fix the following notation for this subsection.
Notation. Let H be a nilpotent but non-abelian p-valuable group with centre
Z. Write H ′ for its isolated derived subgroup [10, Theorem B]. Suppose we are
given a closed isolated proper characteristic subgroup L of H which contains
H ′ and Z. (We will show that such an L always exists in Lemma 3.5.) Fix a
p-valuation ω on H satisfying (AL) (which is possible by Corollary 1.21).
Let {gm+1, . . . , gn} be an ordered basis for Z. Using Lemma 1.7 twice, extend
this to an ordered basis {gl+1, . . . , gn} for L, and then extend this to an ordered
basis {g1, . . . , gn} for H. Diagrammatically:
, gl+1, . . . , gm
, gm+1, . . . , gn
BH =(cid:8) g1, . . . , gl
{z
}
BH/L
BL/Z
{z
}
BZ
{z
(cid:9),
}
extending the notation of the remark after Lemma 1.7 in the obvious way. Here,
0 < l ≤ m < n, corresponding to the chain of subgroups 1 (cid:12) Z ≤ L (cid:12) H.
Let k be a field of characteristic p. As before, let p be a faithful prime ideal of kZ,
so that P := pkH is a faithful prime ideal of kH, and write bj = gj − 1 ∈ kH/P
for all 1 ≤ j ≤ m.
24
In this subsection, we will write:
• for each α ∈ Nm, bα means the (ordered) product bα1
p , gα means the (ordered) product gα1
• for each α ∈ Zm
1 . . . bαm
1 . . . gαm
m ∈ H,
m ∈ kH/P ,
• for each α ∈ Nm, hα, ω(g)i means
αiω(gi).
m
Xi=1
x = zgα
Note the use of m rather than n in each case. This means that every element
x ∈ H may be written uniquely as
for some α ∈ Zm
uniquely as
p and z ∈ Z; and every element y ∈ kH/P may be written
y = Xγ∈Nm
rγ bγ
for some elements rγ ∈ kZ/p.
Recall the definitions of the filtrations w on kH (Definition 2.3), v on kZ/p
(Definition 2.10) and f on kH/P (Definition 2.15). We will continue to abuse
notation slightly for w, as in Definition 2.12.
Recall also that, as we have chosen ω to satisfy (AL), we have that
w(b1) = · · · = w(bl) < w(br)
for all r > l.
Let σ be an automorphism of H, and suppose that, when naturally extended to
an automorphism of kH, it satisfies σ(P ) = P . Hence we will consider σ as an
automorphism of kH/P , preserving the subgroup H ⊆ (kH/P )×.
Corollary 2.20. With the above notation, fix 1 ≤ i ≤ l. If f (σ(bi)−bi) > f (bi),
then w(σ(bi) − bi) > w(bi).
Proof. Write in standard form
σ(bi) − bi = Xγ∈Nm
rγ bγ,
for some rγ ∈ kZ, and suppose that f (σ(bi) − bi) > f (bi). That is, by Lemma
2.16,
v(rγ ) + w(bγ ) > w(bi)
for each fixed γ ∈ Nm.
We will show that w(rγ ) + w(bγ) > w(bi) for each γ. We deal with two cases.
Case 1: w(bγ ) > w(bi). Then, as w takes non-negative values on kH, we are
already done.
25
Case 2: w(bγ ) ≤ w(bi). Then, by (AL), we have either w(rγ ) > w(bi) or
w(rγ ) = 0. In the former case, we are done automatically, so assume we are in
the latter case and w(rγ ) = 0. Then, by [2, 6.2], rγ must be a unit in kZ, and
so f (rγ) = 0 by Lemma 2.2, a contradiction.
Hence w(rγ ) + w(bγ ) > w(bi) for all γ ∈ Nm. But, as w is discrete by [2, 6.2],
we may now take the infimum over all γ ∈ Nm, and the inequality remains
strict.
Let σ be an automorphism of H, and recall that H/L is a free abelian pro-
p group of rank l. Choose a basis e1, . . . , el for Zl
p; then the map giL 7→ ei
for 1 ≤ i ≤ l is an isomorphism j : H/L → Zl
p. As L is characteristic in
H by assumption, σ induces an automorphism of H/L, which gives a matrix
Mσ ∈ GLl(Zp) under this isomorphism.
Write
for the quotient p-valuation on H/L induced by ω, i.e.
ω : H/L → R ∪ {∞}
ω(xL) = sup
ℓ∈L
{ω(xℓ)}
-- note that this is just the (t, p)-filtration (Definition 1.4), as we have chosen ω
to satisfy (AL). Then write
Ω : Zl
p → R ∪ {∞}
for the map Ω = ω ◦ j−1, the (t, p)-filtration on Zl
the isomorphism j.
p corresponding to ω under
Remark. If x ∈ Zl
(t, p)-filtration.
p has Ω(x) ≥ t + 1, then x ∈ pZl
p, by the definition of the
We will write Γ(1) = 1 + pGLl(Zp) for the first congruence subgroup of GLl(Zp),
the open subgroup of GLl(Zp) whose elements are congruent to the identity
element modulo p.
Corollary 2.21. With the above notation, if f (σ(bi) − bi) > f (bi) for all
1 ≤ i ≤ l, then Mσ ∈ Γ(1).
Proof. We have, for all 1 ≤ i ≤ l,
f (σ(bi) − bi) > f (bi) =⇒ w(σ(bi) − bi) > w(bi)
by Corollary 2.20,
=⇒ ω(σ(gi)g−1
i
) > ω(gi)
by Theorem 2.6,
-- which is condition (1.1). Now we may invoke Theorem 1.12.
Corollary 2.22. Suppose now further that σ is an automorphism of H of finite
order. If p > 2 and f (σ(bi) − bi) > f (bi) for all 1 ≤ i ≤ l, then σ induces the
identity automorphism on H/L.
26
Proof. We have shown that Mσ ∈ Γ(1), which is a p-valuable (hence torsion-
free) group for p > 2 by [4, Theorem 5.2]; and if σ has finite order, then Mσ
must have finite order. So Mσ is the identity map.
Proof of Theorem D. This now follows from Corollaries 2.21 and 2.22.
Remark. When p = 2, Γ(1) is no longer p-valuable.
Example 2.23. Let p = 2, and let
H = hx, y, z [x, y] = z, [x, z] = 1, [y, z] = 1i
be the (2-valuable) Z2-Heisenberg group. Let σ be the automorphism sending
x to x−1, y to y−1 and z to z. Take L = hzi, and P = 0.
Write X = x − 1 ∈ kH/P , and likewise Y = y − 1 and Z = z − 1. Now,
σ(X) = σ(x) − 1 = x−1 − 1 = (1 + X)−1 − 1 = −X + X 2 − X 3 + . . . ,
and so σ(X)−X = X 2−X 3+. . . (as char k = 2). Hence f (σ(X)−X) = f (X 2) > f (X);
but
0
Mσ =(cid:18)−1
0 −1(cid:19) ∈ Γ(1, GL2(Z2)),
and in particular Mσ 6= 1.
3 Extending prime ideals from FNp(G)
3.1 X-inner automorphisms
Definition 3.1. We recall the notation of [11, §5]: given R a ring, G a group
and a fixed crossed product S of R by G, we will sometimes write the structure
explicitly as
S = R ∗
hσ,τ i
G,
where σ : G → Aut(R) is the action and τ : G × G → R× the twisting.
Furthermore, we say that an automorphism ϕ ∈ Aut(R) is X-inner if there exist
nonzero elements a, b, c, d ∈ R such that, for all x ∈ R,
axb = cxϕd,
where xϕ denotes the image of x under ϕ. Write Xinn(R) for the subgroup of
Aut(R) consisting of X-inner automorphisms; and, given a crossed product as
in the previous paragraph, we will write XinnS(R; G) = σ−1(σ(G) ∩ Xinn(R)).
Lemma 3.2. R a prime ring and R∗G a crossed product. Let Ginn := XinnR∗G(R; G).
(i) If σ ∈ Aut(R) is X-inner, then σ is trivial on the centre of R.
27
(ii) If H is a subgroup of G containing Ginn, and R ∗ H is a prime ring, then
R ∗ G is a prime ring.
Proof.
(i) This follows from the description of X-inner automorphisms of R as re-
strictions of inner automorphisms of the Martindale symmetric ring of quo-
tients Qs(R), and the fact that Z(R) stays central in Qs(R): see [8, §12]
for details.
(ii) This follows from [8, Corollary 12.6]: if I is a nonzero ideal of R ∗ G, then
I ∩ R ∗ Ginn is nonzero, and hence I ∩ R ∗ H is nonzero.
3.2 Properties of FNp(G)
We prove here some important facts about the group FNp(G) (defined in [10,
Theorem C]).
Lemma 3.3. Let G be a nilpotent-by-finite compact p-adic analytic group with
∆+ = 1. Let H = FNp(G), and write
K := KG(H) = {x ∈ G [H, x] ≤ H ′},
where H ′ denotes the isolated derived subgroup of H [10, Theorem B]. Then
K = H.
Proof. Firstly, note that K clearly contains H, by definition of H ′.
Secondly, suppose that H is p-saturable. By the same argument as in [10,
Lemma 4.3], K acts nilpotently on H, and so K acts nilpotently on the Lie
algebra h associated to H under Lazard's isomorphism of categories [6]. That
is, we get a group representation Ad : K → Aut(h), and (Ad(k) − 1)(hi) ⊆ hi+1
for each k ∈ K and each i. (Here, hi denotes the ith term in the lower central
series for h.)
Choosing a basis for h adapted to the flag
h ) h2 ) · · · ) hr = 0,
we see that Ad is a representation of K for which Ad(k) − 1 is strictly upper
triangular for each k ∈ K; in other words, Ad : K → U, where U is a closed
subgroup of some GLn(Zp) consisting of unipotent upper-triangular matrices.
Hence the image Ad(K) is nilpotent and torsion-free.
Furthermore, ker Ad is the subgroup of K consisting of those elements k which
centralise h, and therefore centralise H. This clearly contains Z(H). On the
other hand, if k centralises H, then k is centralised by H, an open subgroup of
G, and so k must be contained in ∆. But ∆ = Z(H) by [10, Lemma 5.1(ii)]
28
Hence K is a central extension of two nilpotent, torsion-free compact p-adic
analytic groups of finite rank, and so is such a group itself; hence K is nilpotent
p-valuable by [10, Lemma 2.3], and so must be contained in H by definition of
FNp(G).
Now suppose H is not p-saturable, and fix a p-valuation on H. Conjugation
by k ∈ K induces the trivial automorphism on H/H ′, so by [6] it does also
on Sat (H/H ′), which is naturally isomorphic to Sat H/(Sat H)′ by [10, Lemma
3.2]. This shows that K ⊆ KG(Sat H). But now, writing h for the Lie algebra
associated to Sat H, the same argument as above, mutatis mutandis, shows that
KG(Sat H) = H.
Some properties.
Lemma 3.4. Let G be a compact p-adic analytic group with ∆+ = 1, and
write H = FNp(G). If H is not abelian, then H/Z = FNp(G/Z).
Proof. H/Z is a nilpotent p-valuable open normal subgroup of G/Z, so must be
contained within FNp(G/Z). Conversely, the preimage in G of FNp(G/Z) is
a central extension of Z by FNp(G/Z), two nilpotent and torsion-free groups,
and hence is nilpotent and torsion-free, so must be p-valuable by [10, Lemma
2.3], which shows that it must be contained within H.
Recall that, if J is a closed isolated subgroup of H, then there exists a unique
smallest isolated orbital subgroup of H containing J, which we call its isolator,
and denote iH (J), as in [10, Definition 1.6].
The (closed, isolated orbital, characteristic) subgroup iH (H ′Z) of H = FNp(G)
will be crucial throughout this section, so we record some results.
Lemma 3.5. Let H be a nilpotent p-valuable group. If H is not abelian, then
H 6= iH (H ′Z).
Proof. Suppose first that H is p-saturated, and write h and z for the Lie algebras
of H and Z respectively under Lazard's correspondence [6]. If h = h2z (writing
h2 for the second term in the lower central series of h), then by applying [h, −] to
both sides, we see that h2 = h3. But as h is nilpotent, this implies that h2 = 0,
so that h is abelian, a contradiction.
When H is not p-saturated: note that iH (H ′Z) = Sat(H ′Z) ∩ H, by [10,
Lemma 3.1], and so that Sat(H/iH (H ′Z)) ∼= Sat(H)/Sat(H ′Z) by Lemma [10,
Lemma 3.2]. Hence H/iH(H ′Z) has the same (in particular non-zero) rank as
Sat(H)/Sat(H ′Z).
Lemma 3.6. Let G be a nilpotent-by-finite compact p-adic analytic group with
∆+ = 1. Let H = FNp(G), and assume that H is not abelian. Write
M := MG(H) = {x ∈ G [H, x] ≤ iH (H ′Z)},
29
where H ′ denotes the isolated derived subgroup of H, and Z the centre of H.
Then M = H.
Proof. Clearly Z ≤ M . We will calculate M/Z.
First, note that iH (H ′Z)/Z is an isolated normal subgroup of H/Z, as the
quotient is isomorphic to H/iH(H ′Z), which is torsion-free. Also, as iH (H ′Z)
contains H ′Z and hence [H, H]Z as an open subgroup, clearly iH (H ′Z)/Z con-
tains [H, H]Z/Z as an open subgroup, so that iH (H ′Z)/Z ≤ iH/Z ([H, H]Z/Z).
Now, [H/Z, H/Z] = [H, H]Z/Z as abstract groups, so by taking their closures
followed by their (H/Z)-isolators, we see that
so that
(H/Z)′ = iH/Z(cid:0)[H, H]Z/Z(cid:1) = iH/Z(cid:0)[H, H]Z/Z(cid:1),
iH (H ′Z)/Z = (H/Z)′.
But x ∈ M if and only if [H, x] ≤ iH (H ′Z), which is equivalent to [H/Z, xZ] ≤ (H/Z)′,
or in other words xZ ∈ KG/Z(H/Z) = H/Z by Lemma 3.3. So M/Z = H/Z,
and hence M = H.
3.3 The extension theorem
Proposition 3.7. Fix a prime p > 2 and a finite field k of characteristic p. Let
G be a nilpotent-by-finite compact p-adic analytic group with ∆+ = 1. Suppose
H = FNp(G), and write F = G/H. Let P be a G-stable, faithful prime ideal
of kH. Let (kG)α be a central 2-cocycle twist of kG with respect to a standard
(Definition 1.19) decomposition
kG = kH ∗
hσ,τ i
F,
for some α ∈ Z 2
prime ideal of (kG)α.
σ(F, Z((kH)×)), as in [11, Theorem 5.12]. Then P (kG)α is a
Proof. First, we note that the claim that P (kG)α is a prime ideal of (kG)α is
equivalent to the claim that
(kG)α/P (kG)α = kH/P ∗
hσ,τ αi
F
is a prime ring.
Case 1. Suppose that G centralises Z.
If H is abelian, so that H = Z, then every g ∈ G is centralised by Z, an open
subgroup of G. Hence g ∈ ∆, i.e. G = ∆. But, by [10, Theorem D], ∆ ≤ H,
and so we have G = H and there is nothing to prove.
30
So suppose henceforth that Z (cid:12) H, and write L := iH (H ′Z), so that, by Lemma
3.5, we have L (cid:12) H. As the decomposition of kG is standard, we may view F
as a subset of G.
The idea behind the proof is as follows. We will construct a crossed product
R ∗ F ′, where R is a certain commutative domain and F ′ is a certain subgroup
of F , with the following property: if R ∗ F ′ is a prime ring, then P (kG)α is a
prime ideal. Then, by using the well-understood structure of R, we will show
that the action of F ′ on R is X-outer (in the sense of Definition 3.1), so that
R ∗ F ′ is a prime ring.
By Corollary 1.21, we can see that H admits an F -stable p-valuation ω satisfying
(AL). Hence, in the notation of §2.1, we may define the filtration w from ω as
in Definition 2.3. Furthermore, we write
Q′ = Q(kZ/P ∩ kZ),
Q = Q′ ⊗
kZ
kN,
as in §2.2; and we endow Q with the F -orbit of filtrations fi (1 ≤ i ≤ s) and
the filtration f of Definitions 2.12 and 2.15, defined in terms of the filtration w
above.
By [7, 2.1.16(vii)], in order to show that the crossed product
kH/P ∗
hσ,τ αi
F
is a prime ring, it suffices to show that the related crossed product
Q ∗
hσ,τ αi
F
(3.1)
(3.2)
is prime, where this crossed product is defined in §2.2. Then, by [5, II.3.2.7], it
suffices to show that
grf (Q ∗ F )
is prime. Details of this graded ring are given in Lemma 2.19:
note that
grf (Q ∗ F ) ∼= s
Mi=1
grfi Q! ∗ F.
(3.3)
in particular,
Now, as noted in Definition 2.12, each grfiQ is a commutative domain, and by
construction, F permutes the summands grfi Q transitively. So by [8, Corollary
14.8] it suffices to show that
grf1 Q ∗ F ′
(3.4)
is prime, where F ′ = StabF (f1).
31
Notation. We set up notation in order to be able to apply the results of §2.3.
Let {ym+1, . . . , yn} be an ordered basis for Z, which we extend to an ordered
basis {yl+1, . . . , yn} for L, which we extend to an ordered basis {y1, . . . , yn} for
H. Set bi = yi − 1 ∈ kH/P , and let Yi = grf1 (bi) for all 1 ≤ i ≤ m. Then
The ring on the right-hand side inherits a crossed product structure
(3.5)
grf1 Q ∼=(cid:0)grv1 Q′(cid:1) [Y1, . . . , Ym].
(cid:0)grv1 Q′(cid:1) [Y1, . . . , Ym] ∗ F ′.
from (3.4). Writing R :=(cid:0)grv1 Q′(cid:1) [Y1, . . . , Ym], we have now shown, by passing
along the chain
(3.5) → (3.4) → (3.3) → (3.2) → (3.1),
that we need only show that R ∗ F ′ is prime.
Write F ′
crossed product (3.5), i.e.
inn for the subgroup of F ′ acting on R by X-inner automorphisms in the
inn = XinnR∗F ′ (R; F ′)
F ′
in the notation of Definition 3.1. By the obvious abuse of notation, we will
denote this action as the map of sets gr σ : F ′ → Aut(R).
Take some g ∈ F ′. If gr σ(g) acts non-trivially on R, then as R is commutative,
we have g 6∈ F ′
inn
is prime, we may restrict our attention to those g ∈ F ′ that act trivially on R.
In particular, such a g ∈ F ′ must centralise each Yi. But
inn. Hence, as by Lemma 3.2(ii) we need only show that R ∗ F ′
gr σ(g)(Yi) = Yi ⇔ f (σ(g)(bi) − bi) > f (bi).
Now we see (as p > 2) from Corollary 2.22 that σ(g) induces the identity
automorphism on H/L, and hence from Lemma 3.6 that g ∈ H. That is, F ′
is the trivial group, so that R ∗ F ′
inn = R is automatically prime.
inn
Case 2. Suppose some x ∈ F does not centralise Z. Write Finn for the subgroup
of F acting by X-inner automorphisms on kH/P in the crossed product (3.1),
i.e.
Finn := Xinn(kG)α/P (kG)α (kH/P ; F ).
Then, by Lemma 3.2(i), x 6∈ Finn; so Finn is contained in CF (Z), and we need
only prove that the sub-crossed product (kH/P ) ∗ CF (Z) is prime by Lemma
3.2(ii). This reduces the problem to Case 1.
Proposition 3.8. Let G be a nilpotent-by-finite compact p-adic analytic group,
and k a finite field of characteristic p > 2. Let H = FNp(G), and write
F = G/H. Let P be a G-stable, almost faithful prime ideal of kH. Then P kG
is prime.
32
Proof. We assume familiarity with [11, Lemma 1.1], and adopt the notation
of [11, Notation 1.2] for this proof.
Let e ∈ cpik∆+
of kG if and only if f · P kG is prime in f · kG.
(P ), and write fH = eH , f = eG. Then P kG is a prime ideal
Write H1 = StabH (e) and G1 = StabG(e). Then, by the Matrix Units Lemma
[11, Lemma 6.1], we get an isomorphism
f · kG ∼= Ms(e · kG1)
for some s, under which the ideal f · P kG is mapped to Ms(e · P1kG1), where
P1 is the preimage in kH1 of e · P · e. It is easy to see that P1 is prime in kH1;
indeed, applying the Matrix Units Lemma to kH, we get
fH · kH ∼= Ms′ (e · kH1),
under which fH · P 7→ Ms′(e · P1), so that P1 is prime by Morita equivalence
(see e.g. [11, Lemma 1.7]). We also know from [11, Lemma 6.6] (or the remark
after [11, Lemma 6.2]) that
P † = \h∈H
(P †
1 )h.
Now, writing q to denote the natural map G → G/∆+,
q(cid:18)(cid:16)P †
1 ∩ ∆(cid:17)h(cid:19) = q(cid:16)P †
1 ∩ ∆(cid:17)
for all h ∈ H, as q(∆) = Z(q(H)) by definition of H (see [10, Lemma 5.1(ii)]);
and so
q(cid:0)P † ∩ ∆(cid:1) = q(cid:16)P †
1(cid:17) is a normal subgroup of the nilpotent group q (H1). Hence, as the
1(cid:17) with the centre q(∆) of q(H) is trivial, we must have that
1 ∩ ∆(cid:17) = q(1).
1 ≤ ∆+(H1) = ∆+.
1(cid:17) is trivial also [9, 5.2.1]. That is, P †
But q(cid:16)P †
intersection of q(cid:16)P †
q(cid:16)P †
Now, in order to show that Ms(e · P1kG1) is prime, we may equivalently (by
Morita equivalence) show that e · P1kG1 is prime. By [11, Theorem 5.12], we
get an isomorphism
e · kG1 ∼= Mt(cid:0)(k′[[G1/∆+]])α(cid:1),
for some integer t, some finite field extension k′/k, and a central 2-cocycle twist
(see above or [11, Definition 5.4]) of k′[[G1/∆+]] with respect to a standard
crossed product decomposition
k′[[G1/∆+]] = k′[[H1/∆+]] ∗
hσ,τ i
(G1/H1)
33
given by some
α ∈ Z 2
σ(cid:16)G1/H1, Z(cid:16)(cid:0)k′[[H1/∆+]](cid:1)×(cid:17)(cid:17) .
Writing the image of e · P1 as Mt(p) for some ideal p ∈ k′[[H1/∆+]], we see
by (see above or [11, Theorem C]) that p is a faithful, (G1/∆+)-stable prime
ideal of k′[[H1/∆+]]. It now remains only to show that the extension of p to
k′[[G1/∆+]] is prime; but this now follows from Proposition 3.7.
Proof of Theorem A. This follows from Proposition 3.8.
References
[1] R.C. Alperin. p-adic binomial coefficients MOD P . The American Mathe-
matical Monthly, 92(8):576 -- 578, 1985.
[2] K. Ardakov. Prime ideals in nilpotent Iwasawa algebras. Inventiones math-
ematicae, 190(2):439 -- 503, 2012.
[3] N. Bourbaki. Commutative Algebra. Springer, 1998.
[4] J.D. Dixon, M.P.F. du Sautoy, A. Mann and D. Segal. Analytic Pro-p
Groups. Cambridge University Press, 1999.
[5] Li Huishi and Freddy van Oystaeyen. Zariskian Filtrations. Springer Sci-
ence+Business Media, 1996.
[6] Michel Lazard. Groupes analytiques p-adiques. Publications Math´ematiques
de l'IH ´ES, 26:5 -- 219, 1965.
[7] J.C. McConnell and J.C. Robson. Noncommutative Noetherian Rings.
American Mathematical Society, 2001.
[8] Donald S. Passman. Infinite Crossed Products. Academic Press Inc., 1989.
[9] Derek J.S. Robinson. A course in the theory of groups. Springer-Verlag
New York, 1996.
[10] W. Woods. On the structure of virtually nilpotent compact p-adic analytic
groups. Preprint, arXiv:1608.03137 [math.GR], 2016. To appear in J.
Group Theory.
[11] W. Woods. Maximal prime homomorphic images of mod-p iwasawa alge-
bras. Preprint, arXiv:1608.07755 [math.RT], 2016.
34
|
1408.3580 | 2 | 1408 | 2015-01-19T19:50:52 | Extensions of simple modules over Leavitt path algebras | [
"math.RA"
] | Let $E$ be a directed graph, $K$ any field, and let $L_K(E)$ denote the Leavitt path algebra of $E$ with coefficients in $K$. For each rational infinite path $c^\infty$ of $E$ we explicitly construct a projective resolution of the corresponding Chen simple left $L_K(E)$-module $V_{[c^\infty]}$. Further, when $E$ is row-finite, for each irrational infinite path $p$ of $E$ we explicitly construct a projective resolution of the corresponding Chen simple left $L_K(E)$-module $V_{[p]}$. For Chen simple modules $S,T$ we describe ${\rm Ext}_{L_K(E)}^1(S,T)$ by presenting an explicit $K$-basis. For any graph $E$ containing at least one cycle, this description guarantees the existence of indecomposable left $L_K(E)$-modules of any prescribed finite length. | math.RA | math |
EXTENSIONS OF SIMPLE MODULES
OVER LEAVITT PATH ALGEBRAS
GENE ABRAMS∗, FRANCESCA MANTESE, AND ALBERTO TONOLO
Dedicated to Alberto Facchini on the occasion of his sixtieth birthday.
Abstract. Let E be a directed graph, K any field, and let LK(E) denote the Leavitt path
algebra of E with coefficients in K. For each rational infinite path c∞ of E we explicitly
construct a projective resolution of the corresponding Chen simple left LK(E)-module V[c∞].
Further, when E is row-finite, for each irrational infinite path p of E we explicitly construct
a projective resolution of the corresponding Chen simple left LK(E)-module V[p]. For Chen
simple modules S, T we describe Ext1
LK (E)(S, T ) by presenting an explicit K-basis. For any
graph E containing at least one cycle, this description guarantees the existence of indecom-
posable left LK(E)-modules of any prescribed finite length.
1. Introduction
Given any directed graph E and field K, one may construct the Leavitt path algebra of
E with coefficients in K (denoted LK(E)), as first described in [2] and [3]. Since their in-
troduction, various structural properties of the algebras LK(E) have been discovered, with a
significant number of the results in the subject taking on the following form: LK(E) has some
specified algebraic property if and only if E has some specified graph-theoretic property. (The
structure of the field K often plays no role in results of this type.) A few (of many) examples
of such results include a description of those Leavitt path algebras which are simple; purely
infinite simple; finite dimensional; prime; primitive; exchange; etc.
Although there are graphs for which the structure of corresponding Leavitt path algebra is
relatively pedestrian (e.g., is a direct sum of matrix rings either over K, or over the Laurent
polynomial algebra K[x, x−1], or some combination thereof), the less-mundane examples of
Leavitt path algebras exhibit somewhat exotic behavior. For instance, the prototypical Leav-
itt path algebra A = LK(Rn) (n ≥ 2), which arises from the graph Rn having one vertex and
n loops, has the property that A ∼= An as left (or right) A-modules. Analogous "super de-
composability" properties are also found in other important classes of Leavitt path algebras.
Key words and phrases. Leavitt path algebra, Chen simple module.
2010 AMS Subject Classification: 16S99 (primary)
∗corresponding author [email protected] 7192553182
.
The first author is partially supported by a Simons Foundation Collaboration Grants for Mathematicians
Award #208941. The second and third authors are supported by Progetto di Eccellenza Fondazione Cariparo
"Algebraic structures and their applications: Abelian and derived categories, algebraic entropy and repre-
sentation of algebras" and Progetto di Ateneo "Categorie Differenziali Graduate" CPDA105885. Part of this
work was carried out during a visit of the first author to the Universit`a degli Studi di Padova. The first
author is pleased to take this opportunity to again express his thanks to the host institution, and its faculty,
for its warm hospitality and support by the Visiting Scientist 2012-13 grant of the Universit`a degli Studi di
Padova.
1
2
GENE ABRAMS∗, FRANCESCA MANTESE, AND ALBERTO TONOLO
These types of structural properties lead to a dearth (if not outright absence) of indecom-
posable one-sided LK(E)-ideals, which subsequently makes the search for simple (and, more
generally, indecomposable) modules over Leavitt path algebras somewhat of a challenge.
For a graph E, an infinite path in E is a sequence of edges e1e2e3 · · · , for which s(ei+1) =
r(ei) for all i ∈ N. In [6], Chen produces, for each infinite path p in E, a simple left LK(E)-
module V[p]. Further, Chen describes, for each sink vertex w of E, a simple left LK(E)-module
Nw.
In Section 2 we produce explicit projective resolutions for Chen simple modules. As a
result, we will see in Theorem 2.8 that V[c∞] is finitely presented for any closed path c.
Further, in Theorem 2.20 we give necessary and sufficient conditions on a row-finite graph E
which ensure that V[p] is not finitely presented for an irrational infinite path p. In Section 3 we
describe the extension groups Ext1(S, T ) corresponding to any pair of Chen simple modules
S, T . Using some general results about uniserial modules over hereditary rings, we conclude
by showing (Corollary 3.25) how our description of Ext1(S, S) guarantees the existence of
indecomposable LK(E)-modules of any prescribed finite length.
We set some notation. A (directed) graph E = (E0, E1, s, r) consists of a vertex set E0,
an edge set E1, and source and range functions s, r : E1 → E0. For v ∈ E0, the set of edges
{e ∈ E1 s(e) = v} is denoted s−1(v). E is called finite in case both E0 and E1 are finite sets.
E is called row-finite in case s−1(v) is finite for every v ∈ E0. A path α in E is a sequence
e1e2 · · · en of edges in E for which r(ei) = s(ei+1) for all 1 ≤ i ≤ n − 1. We say that such α
has length n, and we write s(α) = s(e1) and r(α) = r(en). We view each vertex v ∈ E0 as a
path of length 0, and denote v = s(v) = r(v). We denote the set of paths in E by Path(E).
A path σ = e1e2 · · · en in E is closed in case r(en) = s(e1). Following [6] (but not standard
in the literature), a closed path σ is called simple in case σ 6= βm for any closed path β and
integer m ≥ 2. A sink in E is a vertex w ∈ E0 for which the set s−1(w) is empty, while an
infinite emitter in E is a vertex u ∈ E0 for which the set s−1(u) is infinite.
For any field K and graph E the Leavitt path algebra LK(E) has been the focus of sus-
tained investigation since 2004. We give here a basic description of LK(E); for additional
information, see [2] or [1]. Let K be a field, and let E = (E0, E1, s, r) be a directed graph
with vertex set E0 and edge set E1. The Leavitt path K-algebra LK(E) of E with coefficients
in K is the K-algebra generated by a set {v v ∈ E0}, together with a set of symbols
{e, e∗ e ∈ E1}, which satisfy the following relations:
vu = δv,uv for all v, u ∈ E0,
s(e)e = er(e) = e for all e ∈ E1,
r(e)e∗ = e∗s(e) = e∗ for all e ∈ E1,
(V)
(E1)
(E2)
(CK1) e∗e′ = δe,e′r(e) for all e, e′ ∈ E1, and
the "double graph" of E, gotten by adding to E an edge e∗ in a reversed direction for each
(CK2) v =P{e∈E1s(e)=v} ee∗ for every v ∈ E0 for which 0 < s−1(v) < ∞.
An alternate description of LK(E) may be given as follows. For any graph E let bE denote
edge e ∈ E1. Then LK(E) is the usual path algebra KbE, modulo the ideal generated by the
Pv∈E0 v. Every element of LK(E) may be written as Pn
It is easy to show that LK(E) is unital if and only if E0 is finite; in this case, 1LK (E) =
i , where ki is a nonzero
If α ∈ Path(E) then we may
relations (CK1) and (CK2).
element of K, and each of the αi and βi are paths in E.
i=1 kiαiβ∗
EXTENSIONS OF SIMPLE MODULES OVER LEAVITT PATH ALGEBRAS
3
view α ∈ LK(E), and will often refer to such α as a real path in LK(E); analogously, for
β = e1e2 · · · en ∈ Path(E) we often refer to the element β∗ = e∗
1 of LK(E) as a ghost
path in LK(E). The map KE → LK(E) given by the K-linear extension of α 7→ α (for
α ∈ Path(E)) is an injection of K-algebras by [1, Corollary 1.5.12].
n · · · e∗
2e∗
The ideas presented in the following few paragraphs come from [6]; however, some of the
notation we use here differs from that used in [6], in order to make our presentation more
notationally consistent with the general body of literature regarding Leavitt path algebras.
Let p be an infinite path in E; that is, p is a sequence e1e2e3 · · · , where ei ∈ E1 for all
i ∈ N, and for which s(ei+1) = r(ei) for all i ∈ N. We emphasize that while the phrase
infinite path in E might seem to suggest otherwise, an infinite path in E is not an element of
Path(E), nor may it be interpreted as an element of the path algebra KE nor of the Leavitt
path algebra LK(E). (Such a path is sometimes called a left-infinite path in the literature.)
We denote the set of infinite paths in E by E∞.
For p = e1e2e3 · · · ∈ E∞ and n ∈ N we denote by τ≤n(p), or often more efficiently by pn,
the (finite) path e1e2 · · · en, while we denote by τ>n(p) the infinite path en+1en+2 · · · . We note
that τ≤n(p) is an element of Path(E) (and thus may be viewed as an element of LK(E)), and
that p is the concatenation p = τ≤n(p) · τ>n(p).
Let c be a closed path in E. Then the path ccc · · · is an infinite path in E, which we denote
by c∞. We call an infinite path of the form c∞ a cyclic infinite path. For c a closed path in
E let d be the simple closed path in E for which c = dn. Then c∞ = d∞ as elements of E∞.
If p and q are infinite paths in E, we say that p and q are tail equivalent (written p ∼ q)
in case there exist integers m, n for which τ>m(p) = τ>n(q); intuitively, p ∼ q in case p and q
eventually become the same infinite path. Clearly ∼ is an equivalence relation on E∞, and
we let [p] denote the ∼ equivalence class of the infinite path p.
The infinite path p is called rational in case p ∼ c∞ for some closed path c. By a previous
observation, we may assume without loss of generality that such c is a simple closed path. In
particular, for any closed path c we have that c∞ is rational. If p ∈ E∞ is not rational we
say p is irrational.
Example 1.1. Let R2 denote the "rose with two petals" graph
e
•v
f
.
Then q = ef ef f ef f f ef f f f e · · · is an irrational infinite path in R∞
2 . Indeed, it is easy to
show that there are uncountably many distinct irrational infinite paths in R∞
2 . We note
additionally that there are infinitely many simple closed paths in Path(R2), for instance, any
path of the form ef i for i ∈ Z+.
Let M be a left LK(E)-module. For each m ∈ M we define the LK(E)-homomorphism
ρm : LK(E) → M, given by ρm(r) = rm. The restriction of the right-multiplication map
ρm may also be viewed as an LK(E)-homomorphism from any left ideal I of LK(E) into M.
When I = LK(E)v for some vertex v of E, we will denote ρm simply by ρm.
Following [6], for any infinite path p in E we construct a simple left LK(E)-module V[p], as
follows.
Definition 1.2. Let p be an infinite path in the graph E, and let K be any field. Let V[p]
denote the K-vector space having basis [p], that is, having basis consisting of distinct elements
6
6
h
h
4
GENE ABRAMS∗, FRANCESCA MANTESE, AND ALBERTO TONOLO
of E∞ which are tail-equivalent to p. For any v ∈ E0, e ∈ E1, and q = f1f2f3 · · · ∈ [p], define
e∗ · q =(τ>1(q)
0
if e = f1
otherwise.
v · q =(q
if v = s(f1)
0 otherwise,
e · q =(eq
0
if r(e) = s(f1)
otherwise,
and
Then the K-linear extension to all of V[p] of this action endows V[p] with the structure of a
left LK(E)-module.
Theorem 1.3. ([6, Theorem 3.3]). Let E be any directed graph and K any field. Let p ∈ E∞.
Then the left LK(E)-module V[p] described in Definition 1.2 is simple. Moreover, if p, q ∈ E∞,
∼= V[q] as left LK(E)-modules if and only if p ∼ q, which happens precisely when
then V[p]
V[p] = V[q].
We will refer to a module of the form V[p] as presented in Theorem 1.3 as a Chen simple
module.
For any sink w in a graph E, Chen in [6] presents a construction, similar in flavor to the
one given in Definition 1.2, of a simple left LK(E)-module Nw. He then shows that Nw
is isomorphic as a left LK(E)-module to the left ideal LK(E)w of LK(E) generated by w.
Observe that, for any sink w, the ideal LK(E)w is spanned by the paths in E ending in w.
Moreover for any i ∈ Z+, we get that wi = w and thus we can consider w = w∞ as an element
in E∞. For these reasons, for any sink w of E, we refer to Nw = LK(E)w as a Chen simple
module and, for consistency, we denote Nw by V[w∞].
Remark 1.4. By invoking a powerful result of Bergman, it was established in [3, Theorem
3.5] that, when E is row-finite, then LK(E) is hereditary, i.e., every left ideal of LK(E)
is projective. This presumably could make the search for projective resolutions of various
LK(E)-modules somewhat easier, in that the projectivity of left ideals is already a given.
However, much of the strength of our results lies in our explicit description of the kernels of
germane maps; for instance, it is these explicit descriptions which will allow us to analyze
the Ext1 groups of the Chen simple modules.
A significant majority of the structural properties of a Leavitt path algebras LK(E) do
not rely on the specific structure of the field K. The results contained in this article are no
exceptions. So while each of the statements of the results made herein should also contain the
explicit hypothesis "Let K be any field", we suppress this statement throughout for efficiency.
For a field K, K × denotes the nonzero elements of K.
2. Projective resolutions of Chen simple modules over LK(E)
The goal of this section is to present an explicit description of a projective resolution
of S, where S is a Chen simple module over the Leavitt path algebra LK(E). Such an
explicit description will provide a strengthening of some previously established results (see
[4, Proposition 4.1]), as well as provide the necessary foundation for subsequent results. As
we shall see, the description of projective resolutions, as well as the description of the Ext1
groups, of Chen simple modules will proceed based on which of the following three types
describes the module:
∼= LK(E)w where w is a sink,
(1) V[w∞]
(2) V[c∞] where c is a simple closed path;
EXTENSIONS OF SIMPLE MODULES OVER LEAVITT PATH ALGEBRAS
5
(3) V[q] where q is an irrational infinite path.
Let v be any vertex in E. Since v is an idempotent, the left ideal LK(E)v is a projective
left LK(E)-module. Therefore projective resolutions of Chen simple modules of type 1 are
easy:
Proposition 2.1 (Type (1)). Let w be a sink in E. Then the Chen simple left module V[w∞]
is projective.
Proof. We have V[w∞]
∼= LK(E)w as left LK(E)-modules by [6].
(cid:3)
We now begin the process of describing projective resolutions of Chen simple modules of
the second type, namely, of the form V[c∞] for c a simple closed path.
Notations: Let c = e1e2 · · · et be a simple closed path in E, with v = s(e1) = r(et).
(1) For 0 ≤ i ≤ t we define ci := e1e2 · · · ei and di := ei+1ei+2 · · · et (where c0 = v = dt
and ct = c = d0). Then clearly c = cidi for each 0 ≤ i ≤ t.
(2) For n ≥ 0 we let c−n denote (c∗)n, and let c0 denote v = s(c).
(3) An element µ of LK(E) is said to be a standard form monomial in case there exist
α, β ∈ Path(E) for which µ = αβ∗. We denote the set of standard form monomials in
LK(E) by S. For µ = αβ∗ a standard form monomial we define r(µ) := r(β∗) = s(β);
that is, r(µ) is the unique element v ∈ E0 for which µv = µ. Define
S1(c) := {µ ∈ S µ · cN = 0 in LK(E) for some N ∈ N}, and S2(c) := S \ S1(c).
Although S1(c) and S2(c) depend on c, we will often simply write S1 and S2 for these
sets.
By analyzing the form of monomials in LK(E), we get the following description of the
elements of S1 and S2.
Lemma 2.2. Let 0 6= µ ∈ S. If c is a sink then µ ∈ S1 if and only if r(µ) 6= c. If c is a
closed path e1e2 · · · et, then µ ∈ S1 if and only if µ is of one of the following two forms:
(1) r(µ) 6= s(c) (i.e., µ · s(c) = 0 in LK(E)), or
(2) µ = µ′f ∗c∗
i (c∗)n for some n, i ∈ Z+, some µ′ ∈ S, and some f ∈ E1 for which
s(f ) = s(ei+1) but f 6= ei+1.
Consequently, 0 6= µ ∈ S2 if and only if µ = αc∗
of non-negative integers n, i.
i (c∗)n for some path α in E, and some pair
Lemma 2.3. Let c be a closed path in the graph E, and let v = s(c).
(1) For any z ∈ Z we have cz − v ∈ LK(E)(c − v).
(2) Suppose µ ∈ S1(c). Then µ ∈ (Pu∈E0\{v} LK(E)u)S LK(E)(c − v).
Proof. (1) If z = 0 we have s(c) − v = 0 = 0(c − v). For z > 0 we have cz − v = (cz−1 + cz−2 +
. . . + c + v)(c − v). For z < 0 we have cz − v = −cz(c−z − v), which is in LK(E)(c − v) by the
previous case.
(2) Suppose µ ∈ S1(c).
suppose r(µ) = v, and that µ · cN = 0 for some N ∈ N. But r(µ) = v gives µv = µ, so that
with the hypothesis µ = −µ(cN − v), which gives that µ ∈ LK(E)(cN − v) ⊆ LK(E)(c − v)
by the previous paragraph.
(cid:3)
If r(µ) 6= v then µ ∈ Pu∈E0\{v} LK(E)u. On the other hand,
6
GENE ABRAMS∗, FRANCESCA MANTESE, AND ALBERTO TONOLO
Remark 2.4. Let p = e1e2 · · · be an infinite path in E. If p = τ>r(p) for some r > 0, then
p is a rational path of the form p = c∞, where c is the closed path e1e2 · · · er. This follows
from the observation that p = τ>r(p) implies p = τ>ir(p) for all i ∈ N.
Lemma 2.5. Let c be a simple closed path e1e2 · · · et in E with s(c) = r(c) = v. Suppose α
and β are paths in E for which 0 6= α · c∞ = β · c∞ in V[c∞]. Then there exists N ∈ Z+ for
which α = βcN or β = αcN .
Consequently, α · c∞ = β · c∞ in V[c∞] implies α − β ∈ LK(E)(c − v).
Proof. Assume α = f1f2 · · · fℓ and β = g1g2 · · · gm, where the fi and gj are edges in E. If
ℓ = m, from α · c∞ = β · c∞ we get α = β. So assume m > ℓ; we have
with m − ℓ = k + n × t, k ≤ t. If k < t, from α · c∞ = β · c∞ we get
g1 · · · gℓgℓ+1 · · · gm = f1 · · · fℓcne1e2 · · · ek
c∞ = ck+1 · · · ct · c∞ = τ>k(c∞);
then by Remark 2.4 we would have c∞ = (e1 · · · ek)∞, a contradiction since c is simple.
Therefore k = t and β = αcn+1. The case m < ℓ is identical.
For the second statement, note that 0 6= α · c∞ = β · c∞ gives r(α) = r(β); denote this
common vertex by v. So if α = βcn then α − β = β(cn − v), which is in LK(E)(c − v) by
Lemma 2.3(1). The case β = αcn is identical.
(cid:3)
Proposition 2.6. Let E be any graph. Let c be a simple closed path in E, and let v de-
note s(c) = r(c). Let ρc∞ : LK(E)v → V[c∞] and ρc∞ : LK(E) → V[c∞] denote the right
multiplication by c∞. Then
Ker(ρc∞) = LK(E)(c − v)
and Ker(ρc∞) = Xu∈E0\{v}
LK(E)u ⊕ LK(E)(c − v).
Proof. Since (c − v) · c∞ = c∞ − c∞ = 0 in V[c∞], we get LK(E)(c − v) ⊆ Ker(ρc∞). We now
proceed to show that Ker(ρc∞) ⊆ LK(E)(c − v). For notational convenience we denote the
left ideal LK(E)(c − v) of LK(E) by J.
So let λ ∈ Ker(ρc∞), and write
λ = Xµ∈M
kµµ
where M ⊆ S is some finite set of distinct standard form monomials in LK(E), and kµ ∈ K ×.
By Lemma 2.3 we may assume that M ⊆ S2; that is, by Lemma 2.2, we may assume that,
for each µ ∈ M, µ = αµc∗
iµ(c∗)nµ for some path αµ, some 0 ≤ iµ ≤ t, and some nµ ≥ 0.
iµ(c∗)nµ. By hypothesis λ · c∞ = 0 in V[c∞], so that
So we have λ =Pµ∈M kµαµc∗
Xµ∈M
Xµ∈M
But (c∗)n · c∞ = c∞ in V[c∞] for any n ∈ Z. So
kµαµc∗
iµ(c∗)nµ · c∞ = 0 in V[c∞].
kµαµc∗
iµ · c∞ = 0 in V[c∞].
EXTENSIONS OF SIMPLE MODULES OVER LEAVITT PATH ALGEBRAS
7
Also, c∗
i · c∞ = di · c∞ in V[c∞] for any 0 ≤ i ≤ t. So
Now define
kµαµdiµ · c∞ = 0 in V[c∞].
Xµ∈M
λ′ = Xµ∈M
kµαµdiµ.
Then the previous equation gives that λ′ ∈ Ker(ρc∞).
We claim that λ ∈ J if and only if λ′ ∈ J. To show this, we show that λ = λ′ as elements
i = di in LK(E)/J; this follows immediately from the
of LK(E)/J. We note first that c∗
observation that di − c∗
i = c∗
i (c − v) ∈ J. But then in LK(E)/J we have
kµαµc∗
iµ(c∗)nµ
kµαµc∗
iµ(c∗)nµ
kµαµc∗
iµv
by Lemma 2.3(1)
kµαµc∗
iµ
kµαµdiµ
by the above note
kµαµdiµ
λ = Xµ∈M
= Xµ∈M
= Xµ∈M
= Xµ∈M
= Xµ∈M
= Xµ∈M
= λ′.
By Lemma 2.5, if µ ∼ µ′ then αµdiµ = αµ′diµ′ in LK(E)/J; we denote this common element
Thus in order to show that λ ∈ J, it suffices to show that λ′ ∈ J, i.e., that λ′ = 0 in LK(E)/J.
t=1Mt in such
a way that µ ∼ µ′ ∈ Mt (for some t) if and only if αµdiµ · c∞ = αµ′diµ′ · c∞ in V[c∞].
But λ′ ∈ Ker(ρc∞), i.e.,Pµ∈M kµαµdiµ · c∞ = 0 in V[c∞]. Now partition M = ⊔ℓ
NowPµ∈M kµαµdiµ · c∞ = 0 gives
of LK(E)/J by xt.
ℓXt=1 Xµ∈Mt
kµαµdiµ · c∞ = 0,
Pµ∈Mt kµ = 0 for each 1 ≤ t ≤ ℓ. But then
kµαµdiµ =
kµαµdiµ
ℓXt=1 Xµ∈Mt
=
λ′ = Xµ∈M
ℓXt=1 Xµ∈Mt
ℓXt=1
(Xµ∈Mt
=
kµxt
kµαµdiµ =
ℓXt=1 Xµ∈Mt
ℓXt=1
easily from LK(E) =Pu∈E0\{v} LK(E)u ⊕ LK(E)v.
kµ)xt =
(0)xt = 0,
8
GENE ABRAMS∗, FRANCESCA MANTESE, AND ALBERTO TONOLO
which by the linear independence of sets of distinct elements of the form α · c∞ in V[c∞] gives
which establishes that Ker(ρc∞) ⊆ LK(E)(c − v), as desired. The claim about ρc∞ follows
(cid:3)
Lemma 2.7. Let E be any graph. Let c be a simple closed path in E based at the vertex v,
and let r ∈ LK(E)v. Then r(c − v) = 0 in LK(E) if and only if r = 0. In particular, the map
ρc−v : LK(E)v → LK(E)(c − v)
is an isomorphism of left LK(E)-modules.
Furthermore, if E is a finite graph, then the map
is an isomorphism of left LK(E)-modules.
ρc−1 : LK(E) → LK(E)(c − 1)
i=1 kiαiβi
Proof. Let r ∈ LK(E)v. If r(c − v) = 0 then rc = rv = r, which recursively gives rcj = r for
∗, where the αi and βi are in Path(E). We note that,
for any m ∈ N, if β ∈ Path(E) has length at most m, then β∗ has the property that β∗cm
is either 0 or an element of Path(E) in LK(E). Now let N be the maximum length of the
paths in the set {β1, β2, . . . , βn}. Then the above discussion shows that rcN is an element of
i=1 kiγi, where γi ∈ Path(E) for 1 ≤ i ≤ n; that is, rcN ∈ KE. But
rcN = r, so that r ∈ KE. However, the equation rc = r (i.e., r(c − v) = 0) has only the zero
solution in KE by a degree argument. So r = 0.
any j ≥ 1. Now write r =Pn
LK(E)v of the formPn
The second statement is established in an almost identical manner.
(cid:3)
We now have all the tools to describe a projective resolution for the modules V[c∞] where c
is a simple closed path, thus completing the study of the second type of Chen simple module.
Theorem 2.8 (Type(2)). Let E be any graph. Let c be a simple closed path in E, with
v = s(c). Then the Chen simple module V[c∞] is finitely presented.
Indeed, a projective
resolution of V[c∞] is given by
0
/ LK(E)v
ρc−v
/ LK(E)v
ρc∞
/ V[c∞]
/ 0 .
If E is a finite graph, an alternate projective resolution of V[c∞] is given by
0
/ LK(E)
ρc−1
/ LK(E)
ρc∞
/ V[c∞]
/ 0 .
/
/
/
/
/
/
/
/
EXTENSIONS OF SIMPLE MODULES OVER LEAVITT PATH ALGEBRAS
9
Proof. V[c∞] is a simple left LK(E)-module by Theorem 1.3, and c∞ = vc∞ is a nonzero
element in V[c∞]. So the map ρc∞ : LK(E)v → V[c∞] is surjective. By Proposition 2.6 we have
Ker(ρc∞) = LK(E)(c − v). We get the first short exact sequence since by Lemma 2.7 the map
ρc−v : LK(E)v → LK(E)(c − v)
is an isomorphism of left LK(E)-modules. Moreover since v is idempotent, LK(E)v is a
projective left LK(E)-module.
Assume now that E is a finite graph. Let us see that Ker(ρc∞) = LK(E)(c − 1). Since
Ker(ρc∞) clearly contains u for any u 6= v ∈ E0, we have c − 1 = c −Pu∈E0 u = (c − v) −
Pu6=v u ∈ Ker(ρc∞). But for any u 6= v = s(c) we have uc = 0, so that u = −u(c − 1) ∈
LK(E)(c − 1). Since c − v = v(c − 1) ∈ LK(E)(c − 1), using Proposition 2.6 we have
shown that each of the generators of Ker(ρc∞) is in LK(E)(c − 1). But by Lemma 2.7,
ρc−1 : LK(E) → LK(E)(c − 1) is an isomorphism of left LK(E)-modules, thus establishing
the result.
(cid:3)
Corollary 2.9. Let E be any graph. Let c be a simple closed path in E, with v = s(c). Then
the Chen simple module V[c∞] has projective dimension 1.
Proof. From Theorem 2.8 we get the exact sequence
0
/ LK(E)v
ρc−v
/ LK(E)v
ρc∞
/ V[c∞]
/ 0 .
Since v is an idempotent in LK(E), the left module LK(E)v is projective and hence V[c∞]
has projective dimension ≤ 1. The left module V[c∞] is not projective, otherwise the above
sequence splits and LK(E)v would contain a direct summand isomorphic to V[c∞]; in particular
LK(E)v would contain a nonzero element α (the element corresponding to c∞) such that
cα = α and hence cnα = α for each n ∈ N. This is impossible by a degree argument.
(cid:3)
Before we present a projective resolution of the third type of Chen simple module, we study,
in the situation where E is row-finite, right multiplication by any of the monomial generators
of V[c∞] for c a simple closed path or a sink. We first introduce some notation which will be
useful throughout the remainder of the section.
Definition 2.10. Let E be any graph. Let β = e1e2 · · · en be a path in E. For each 1 ≤ i ≤ n
let βi denote e1e2 · · · ei. For each 0 ≤ i ≤ n − 1 let
Xi(β) = {f ∈ E1 s(f ) = s(ei+1), and f 6= ei+1}.
The elements of Xi(β) are called the exits of β at s(ei+1). Note that, for a given i, it is
possible that Xi(β) = ∅. For each i ≥ 0 let Ji(β) be the left ideal of LK(E) defined by setting
Ji(β) = Xf ∈Xi(β)
LK(E)f ∗β∗
i .
(So possibly Ji(β) = {0}, precisely when Xi(β) = ∅.) When the path β is clear from context,
we may denote Xi(β) (resp., Ji(β)) by Xi (resp., Ji).
Now let p = e1e2e3 · · · ∈ E∞ be an infinite path in E. Let p0 denote s(e1), and for each
i ≥ 0 let pi+1 denote τ≤i+1(p) = e1e2 · · · ei+1. For each i ≥ 0 we define
Xi(p) := Xi(pi+1), and Ji(p) := Ji(pi+1).
/
/
/
/
10
GENE ABRAMS∗, FRANCESCA MANTESE, AND ALBERTO TONOLO
Definition 2.11. Let E be any graph. Let β = e1e2 · · · en be a path in E for which no vertex
of β is an infinite emitter. For 0 ≤ i ≤ n − 1 let
Fi(β) = Xf ∈Xi(β)
f f ∗ ∈ LK(E).
Note that this sum is finite by the hypothesis on β. (We interpret Fi(β) as 0 in case Xi(β) =
∅.) In particular, by the (CK2) relation we have
for 0 ≤ i ≤ n − 1, and by (CK1) that Fi(β)ei+1 = 0.
s(ei+1) − Fi(β) = ei+1e∗
i+1
Lemma 2.12. Let E be any graph. Let α = e1e2 · · · en be a path in E for which no vertex of
α is an infinite emitter. Let αi denote e1e2 · · · ei for each 1 ≤ i ≤ n (so in particular α = αn).
Suppose q, x ∈ LK(E) satisfy the equation qα = x in LK(E). Then
n−1 + · · · + qα1F1(α)α∗
q = xα∗ + qαn−1Fn−1(α)α∗
1 + qF0(α).
Proof. Multiply both sides of the equation qα = x by e∗
n, to get
xe∗
n = qαe∗
n = qe1 · · · en−1ene∗
n = qe1 · · · en−1(s(en) − Fn−1(α)).
Multiplying the final term and switching sides, this gives
qe1 · · · en−1 = xe∗
n + qe1 · · · en−1Fn−1(α).
Multiplying now both sides of this displayed equation on the right by e∗
in the same way, we easily get
ne∗
n−1 + qe1 · · · en−1Fn−1(α)e∗
qe1 · · · en−2 = xe∗
n−1 + qe1 · · · en−2Fn−2(α).
n−1, and proceeding
Continuing in this way, after n steps we reach
q = xe∗
ne∗
n−1 · · · e∗
1 + qe1 · · · en−1Fn−1(α)e∗
n−1 · · · e∗
1 + · · · + qe1F1(α)e∗
1 + qF0(α)
as desired.
(cid:3)
Of course, if c is a simple closed path or a sink, any nonzero element of the Chen simple
module V[c∞] generates V[c∞]; this is in particular true of any "monomial" element αc∞,
where α is a path in E for which r(α) = s(c). We describe here the projective resolution
corresponding to such elements, in case E is row-finite.
Theorem 2.13 (Types (1) & (2)). Let E be any graph. Let c be a simple closed path or a
sink in E, with v = s(c). Let α = e1e2 · · · en be any path in E for which no vertex of α is
an infinite emitter, and for which r(α) = r(en) = v. Let u denote s(α) = s(e1). Then the
following is a projective resolution of the Chen simple LK(E)-module V[c∞]:
0
/ LK(E)(αcα∗ − u)
/ LK(E)u
ραc∞
/ V[c∞]
/ 0 .
Proof. Since uα = α, we have that ραc∞(u) = αc∞ is a nonzero element of the Chen sim-
ple module V[c∞], so that ραc∞ is surjective. So we need only establish that Ker(ραc∞) =
LK(E)(αcα∗ − u). Since ραc∞(αcα∗ − u) = (αcα∗ − u)αc∞ = αcc∞ − αc∞ = 0, it remains
only to show that Ker(ραc∞) ⊆ LK(E)(αcα∗ − u).
/
/
/
/
EXTENSIONS OF SIMPLE MODULES OVER LEAVITT PATH ALGEBRAS
11
So let q ∈ Ker(ραc∞); specifically, qαc∞ = 0. But then qα ∈ Ker(ρc∞), which, by Theorem
2.8, is precisely LK(E)(c − v). So
qα = r(c − v)
for some r ∈ LK(E). By Lemma 2.12, we have
q = r(c − v)α∗ + qαn−1Fn−1(α)α∗
n−1 + · · · + qα1F1(α)α∗
1 + qF0(α).
Using this representation of q, it suffices to show that each of the summands on the right
hand side is an element of LK(E)(αcα∗ − u). Since easily we get (c − v)α∗ = α∗(αcα∗ − u),
we have that r(c − v)α∗ ∈ LK(E)(αcα∗ − u). But for each 0 ≤ i ≤ n − 1 we have Fi(α)α∗
i α =
Fi(α)ei+1 · · · en = 0 (using the observation made in Definition 2.11). Using this, we see
that qαiFi(α)α∗
i ∈ LK(E)(αcα∗ − u) for each
0 ≤ i ≤ n − 1, thus completing the proof.
(cid:3)
i (αcα∗ − u), so that qαiFi(α)α∗
i = −qαiFi(α)α∗
We now describe a projective resolution of the third type of Chen simple module, namely,
one corresponding to an irrational infinite path. Whereas a Chen simple corresponding to
a rational path is always finitely presented, we will see that the determination of the finite-
presentedness of a Chen simple corresponding to an irrational infinite path will depend on
the structure of the graph itself.
Lemma 2.14. Let E be any graph. Let p be an irrational infinite path in E with s(p) = v,
and let ρp : LK(E)v → V[p] be the map r 7→ rp. Let x ∈ Ker(ρp). Then there exists nx ∈ N
such that xτ≤nx(p) = 0 in LK(E). In other words, if xp = 0 in V[p], then xpnx = 0 in LK(E)
for some finite initial segment pnx of p.
i=1 kiαiβ∗
i ∈ Ker(ρp), where αi, βi ∈ Path(E). Denote by N the maximum
Proof. Let x =Pm
length of the βi, i = 1, ..., m. We have
ρp(x) =
kiαiρp(β∗
i ) =
kiαiρτ>N (p)(β∗
i τ≤N (p)).
mXi=1
Since the length of each βi is less than or equal to N, ti := β∗
path. Therefore
i τ≤N (p) is either zero or a real
m′Xℓ=1
m′Xℓ=1
0 = ρp(x) =
kiαiρτ>N (p)(ti) = ρτ>N (p)(
kiαiti) = ρτ>N (p)(
hℓγℓ) =
hℓγℓτ>N (p),
where the γℓ (1 ≤ ℓ ≤ m′) are distinct elements of the form αiti in Path(E), and hℓ ∈ K.
Since p is irrational and γℓ (1 ≤ ℓ ≤ m′) are distinct paths, we claim that the infinite paths
γℓτ>N (p) (1 ≤ ℓ ≤ m′) are distinct elements of V[p], as follows. Assume to the contrary that
γiτ>N (p) = γjτ>N (p) for some i 6= j; necessarily γi and γj have distinct lengths si and sj.
Assume si − sj = s > 0; then
γiτ>N (p) = γjκiτ>N (p) = γjτ>N (p),
and hence κiτ>N (p) = τ>N (p), where κi is a suitable element of Path(E) having length s.
Therefore τ>N (p) = τ>s(τ>N (p)) = τ>s+N (p). But this property implies by Remark 2.4 that
p is rational, contrary to hypothesis. Thus the γℓτ>N (p) (1 ≤ ℓ ≤ m′) are distinct infinite
paths.
mXi=1
mXi=1
mXi=1
12
GENE ABRAMS∗, FRANCESCA MANTESE, AND ALBERTO TONOLO
Consequently, the set {γℓτ>N (p) 1 ≤ ℓ ≤ m′} is linearly independent over K, so the
ℓ=1 hℓγℓτ>N (p) yields that hℓ = 0 for each 1 ≤ ℓ ≤ m′.
previously displayed equation 0 =Pm′
Therefore
xτ≤N (p) =
as desired.
mXi=1
kiαiβ∗
i τ≤N (p) =
kiαiti =
mXi=1
m′Xℓ=1
hℓγℓ = 0,
(cid:3)
Lemma 2.15. Let E be any graph. Suppose β is a path of length n in E for which no vertex
of β is an infinite emitter, and for which s(β) = v. For each 0 ≤ i ≤ n − 1 let Ji(β) be the left
ideal of LK(E) given in Definition 2.10. If x ∈ LK(E)v has xβ = 0, then x ∈Pn−1
Proof. Write β = e1e2 · · · en. For each 1 ≤ i ≤ n let βi = e1e2 · · · ei. So β = βn, and thus
by hypothesis we are assuming that xβn = 0. Then using the (CK2) relation at the vertices
s(e1), s(e2), · · · , s(en) in order (this is possible by the hypothesis on β), and interpreting
empty sums as 0, we get
i=0 Ji(β).
= · · ·
f f ∗ + β1β∗
x = xv = x( Xf ∈X0(β)
= x( Xf ∈X0(β)
= x( Xf ∈X0(β)
= x( Xf ∈X0(β)
= x( Xf ∈X0(β)
= x( Xf ∈X0(β)
x = Xf ∈X0(β)
f f ∗) + xβ1( Xf ∈X1(β)
f f ∗) + xβ1( Xf ∈X1(β)
f f ∗) + xβ1( Xf ∈X1(β)
f f ∗) + xβ1( Xf ∈X1(β)
f f ∗) + xβ1( Xf ∈X1(β)
(xf )f ∗ + Xf ∈X1(β)
f f ∗) + xβ1r(β1)β∗
1
1 ) = x( Xf ∈X0(β)
f f ∗ + e2e∗
2)β∗
1
f f ∗)β∗
1 + xβ2r(β2)β∗
2
f f ∗)β∗
f f ∗)β∗
f f ∗)β∗
1 + · · · + xβn−1( Xf ∈Xn−1(β)
1 + · · · + xβn−1( Xf ∈Xn−1(β)
1 + · · · + xβn−1( Xf ∈Xn−1(β)
1 + · · · + Xf ∈Xn−1(β)
f f ∗)β∗
n−1 + xβn−1ene∗
nβ∗
n−1
f f ∗)β∗
n−1 + xβnβ∗
n
f f ∗)β∗
n−1 + 0,
with the final statement following from the hypothesis that xβ = xβn = 0. Thus
(xβ1f )f ∗β∗
(xβn−1f )f ∗β∗
n−1 ∈
Ji(β).
n−1Xi=0
(cid:3)
Lemma 2.16. Let E be a finite graph, and let p = e1e2 · · · ∈ E∞ be an irrational infinite
path in E. Then Xi(p) is nonempty for infinitely many i ∈ Z+. Consequently, in this case,
Ji(p) is nonzero for infinitely many i ∈ Z+.
Proof. Suppose to the contrary that there exists N ∈ N for which Xi(p) = ∅ for all i ≥ N.
Since E0 is finite, there exist t, t′ ≥ N, t < t′, for which s(et) = s(et′). But Xt(p) = ∅ then
gives et = et′, and in a similar manner yields et+ℓ = et′+ℓ for all ℓ ∈ Z+. If d denotes the
closed path etet+1 · · · et′−1, then we get p ∼ d∞, the desired contradiction.
(cid:3)
EXTENSIONS OF SIMPLE MODULES OVER LEAVITT PATH ALGEBRAS
13
We note that Lemma 2.16 is not necessarily true without the finiteness hypothesis on the
graph. For instance, let MN be the graph
and let p ∈ M ∞
N be the irrational infinite path e1e2 · · · . Then Xi(p) = ∅ for all i ≥ 0.
•
e1
/ •
e2
/ •
e3 /
/ · · ·
Corollary 2.17. Let E be any graph. Let p ∈ E∞ be an irrational infinite path in E for
which no vertex of p is an infinite emitter, and for which s(p) = v. Let ρp : LK(E)v → V[p]
be the map r 7→ rp. For each i ≥ 0 let Ji(p) be the left ideal of LK(E) given in Definition
2.10. Then
Ker(ρp) =M∞
i=0
Ji(p).
Proof. Clearly, for every i ≥ 0, each element of Ji(p) is in Ker(ρp). Now suppose x ∈ LK(E)
has xp = 0 in V[p]. By Lemma 2.14, xβ = 0 where β = pn = τ≤n(p) for some n ∈ N. Then
i=0Ji(p).
i=0 ri = 0 in LK(E), where ri ∈ Ji(p) for 0 ≤ i ≤ n. By construction,
n, so that
n = rn for all rn ∈ Jn(p). Thus multiplying both sides of the proposed equation
n gives rn = 0. Using this same idea iteratively, we get ri = 0
(cid:3)
Lemma 2.15, together with the definition of Ji(p) for p ∈ E∞, gives that Ker(ρp) =P∞
Now suppose Pn
Pn
ripn = 0 for all i < n. On the other hand, for any f ∈ Xn(p), f ∗p∗
rnpnp∗
for all 0 ≤ i ≤ n, so that the sum is indeed direct.
i=0 ri = 0 on the right by pnp∗
We note that Corollary 2.17 is not necessarily true without the finite emitter hypothesis
npnp∗
n = f ∗p∗
on the vertices of p. For instance, let F be the graph
•w
∞
•v
e1
/ •
e2
/ •
e3 /
/ · · ·
where there are infinitely many edges {fi i ∈ Z+} from v to w. Let p be the irrational infinite
path e1e2 · · · , and let ρp : LK(E)v → V[p] as usual. Then easily x = v − e1e∗
1 ∈ Ker(ρp).
1 plus
i=0Ji(p), since otherwise this would yield that v is a finite sum of e1e∗
i for ri ∈ LK(E), which cannot happen as v is an infinite emitter.
However, x /∈P∞
terms of the form rifif ∗
Remark 2.18. Corollary 2.17 shows that if E is row-finite and p is an irrational infinite
path, then Ker(ρp) is generated by those ghost paths of LK(E) which annihilate some (finite)
initial path of p. Effectively, this is the main difference between the rational and irrational
cases; in the rational case, where p = d∞ and s(p) = v, there are additional elements in
Ker(ρp) which are not of this form, namely, elements of the form r(d − v) where r ∈ LK(E).
Lemma 2.19. Let p be an irrational infinite path in an arbitrary graph E. For f ∈ E1 let
vf denote the vertex r(f ). Then, for each i ≥ 0,
Ji(p) = Mf ∈Xi(p)
LK(E)f ∗p∗
i
LK(E)vf .
∼= Mf ∈Xi(p)
as left LK(E)-modules. In particular, each Ji(p) is a projective left LK(E)-module.
Proof. By definition Ji(p) =Pf ∈Xi(p) LK(E)f ∗p∗
0 =Pf ∈Xi(p) rf f ∗p∗
for each f ∈ Xi(p). Take g ∈ Xi(p); by multiplying 0 =Pf ∈Xi(p) rf f ∗p∗
i . We claim the sum is direct. So suppose
i , with rf ∈ LK(E) for each f ∈ Xi(p). Without loss we may assume that
each expression rf f ∗ is nonzero, so that we may further assume without loss that rf vf = rf
i on the right by pig,
and using the (CK1) relation, we get 0 = rgg∗g = rg · vg = rg. Thus the sum is direct, so that
/
/
k
s
/
/
14
GENE ABRAMS∗, FRANCESCA MANTESE, AND ALBERTO TONOLO
i . But for g ∈ Xi(p) it is easy to show that LK(E)g∗p∗
Ji(p) = ⊕f ∈Xi(p)LK(E)f ∗p∗
by the map x 7→ xpig.
Theorem 2.20 (Type (3)). Let E be any graph. Let p ∈ E∞ be an irrational infinite path in
E for which no vertex of p is an infinite emitter. Then the Chen simple LK(E)-module V[p]
is finitely presented if and only if Xi(p) is nonempty only for finitely many i ∈ Z+.
∼= LK(E)vg,
(cid:3)
i
In particular, if E is a finite graph, then V[p] is not finitely presented.
Proof. Let v denote s(p). We consider the exact sequence
0
/ Ker(ρp)
/ LK(E)v
ρp
/ V[p]
/ 0 .
By Corollary 2.17 we have that Ker(ρp) = ⊕∞
i=0Ji(p). Furthermore, each Ji(p) is projective
by Lemma 2.19, so the given exact sequence is a projective resolution of V[p]. Therefore V[p]
is finitely presented if and only if Ji(p) is nonzero only for finitely many i ∈ Z+, i.e. Xi(p) is
nonempty only for finitely many i ∈ Z+.
For the particular case, when E is finite then by Lemma 2.16 Ji(p) is nonzero for infinitely
(cid:3)
many i.
Corollary 2.21. If E is a finite graph, and p ∈ E∞ is an irrational infinite path in E, then
the Chen simple LK(E)-module V[p] has projective dimension 1.
Proof. From Corollary 2.17 we get the exact sequence
0
i=0Ji(p)
/ LK(E)v
ρp
/ V[p]
/ 0 .
/L∞
Since v is an idempotent in LK(E), the left module LK(E)v is projective; by Lemma 2.19
i=0Ji(p) is projective and hence V[p] has projective dimension ≤ 1. Since E is finite,
i=0Ji(p) is not finitely generated. Then
i=0Ji(p) would be a not finitely generated
(cid:3)
also L∞
Ji(p) is not zero for infinitely many i and hence L∞
the left module V[p] is not projective, otherwiseL∞
direct summand of a cyclic module: contradiction.
Remark 2.22. Let MN be the graph
•
e1
/ •
e2
/ •
e3 /
/ · · ·
considered previously, and let p ∈ M ∞
N be the irrational infinite path e1e2e3 · · · . Then Xi(p) =
∅ for all i ≥ 0. So by Corollary 2.17, the Chen simple module V[p] is isomorphic to LK(E)v,
and hence it is projective.
Example 2.23. We reconsider the graph R2 and irrational infinite path q = ef ef f ef f f e · · · ∈
R∞
2 described in Example 1.1. Then, as R2 is finite, Theorem 2.20 yields that the Chen simple
module V[q] is not finitely presented.
Remark 2.24. We note that Theorems 2.8 and 2.20 strengthen and sharpen [4, Proposition
4.1], most notably because we have been able to explicitly describe a projective resolution of
each of the Chen simple modules.
In [5, Theorem 4.12] it is shown that for any graph E, for any vertex v ∈ E0, L(E)v is a
simple left ideal if and only if v is a line point, i.e.
in the full subgraph of E generated by
{u ∈ E0 there is a path from v to u} there are no cycles, and there are no vertices which
emit more than one edge. Our results allow us to recover [5, Theorem 4.12], as follows.
/
/
/
/
/
/
/
/
/
/
EXTENSIONS OF SIMPLE MODULES OVER LEAVITT PATH ALGEBRAS
15
Corollary 2.25. Let E be any graph. Let u ∈ E0. Then LK(E)u is simple if and only if u
is a line point.
Proof. There are three possibilities:
(1) there is a path α ∈ Path(E) with s(α) = u and for which r(α) = w is a sink in E;
(2) there is a path α ∈ Path(E) with s(α) = u and for which r(α) = v is the source of a
simple closed path c;
(3) there is an infinite irrational path q for which s(q) = u.
If in α (cases 1 and 2) or in q (case 3) there is an infinite emitter x, then LK(E)x is not a
simple submodule of LK(E)v (see [5, Lemma 4.3]). Therefore we can assume that α (cases 1
and 2) and q (case 3) have no infinite emitter.
Cases 1 and 2. By Theorem 2.13 LK(E)u is a simple module if and only if αcα∗ = u, where
c is either a simple closed path or a sink. If c is a simple closed path, by a degree argument
αcα∗ is not a vertex. If c is a sink and α = e1 · · · eℓ then αcα∗ = αα∗ = e1 · · · eℓe∗
1 is
equal to u if and only if eie∗
if and only if s(ei) is the source of
only one edge, i.e. u is a line point.
i = s(ei) for i = 1, ..., ℓ, i.e.
ℓ · · · e∗
Case 3. By Corollary 2.17, LK(E)u is simple if and only ifL∞
is equivalent to p having no exits, i.e. u is a line point.
i=0 Ji(p) = 0 and the latter
(cid:3)
3. Extensions of Chen simple modules
In this section we use the results of Section 2 to describe Ext1
LK (E)(S, T ), where S and
T are Chen simple modules over the Leavitt path algebra LK(E) corresponding to a finite
graph E. As a consequence, this will allow us to (among other things) construct classes of
indecomposable non-simple LK(E)-modules.
We give here a short review of Ext1; see e.g.
[9] for more information. Let R be a ring,
and let M, N be left R-modules. Suppose
0
/ Q
µ
/ P
f
/ M
/ 0
is a short exact sequence with P projective. Then there is an exact sequence of abelian groups
HomR(P, N)
µ∗
/ HomR(Q, N)
∆f
/ Ext1
R(M, N)
/ 0,
where µ∗(ϕ) = ϕ ◦ µ for ϕ ∈ HomR(P, N), and ∆f is the "connecting morphism". If µ is
viewed as an inclusion of submodules, then µ∗(ϕ) = ϕQ, the restriction of ϕ to Q. Exactness
yields that Ext1
R(M, N) 6= 0 if and
only if there exists a non-splitting short exact sequence
R(M, N) = 0 if and only µ∗ is surjective. Moreover, Ext1
0 → N → L → M → 0,
i.e., L is a non-trivial extension of N by M. For instance if M, N are simple left R-modules,
then Ext1
R(M, N) 6= 0 if and only if there exist indecomposable left R-modules of length 2
which are extensions of N by M. Finally, observe that if R is a K-algebra over a field K,
then the abelian group Ext1
R(M, N) has a natural structure of K-vector space for any left
R-module M and N.
/
/
/
/
/
/
/
16
GENE ABRAMS∗, FRANCESCA MANTESE, AND ALBERTO TONOLO
We outline our approach. There are three types of Chen simple modules: those of the
form V[w∞] for a sink w; of the form V[c∞] for a simple closed path c; and of the form V[p]
for an irrational infinite path p. Let T denote any Chen simple module.
In Lemma 3.1
we make the (trivial) observation that Ext1
LK (E)(V[w∞], T ) = 0; in Theorem 3.13 we describe
Ext1
LK (E)(V[p], T ). We recall that we are
assuming w = w∞ ∈ E∞ for any sink w.
LK (E)(V[c∞], T ); and in Theorem 3.21 we describe Ext1
Lemma 3.1. (Type (1)) Let E be any graph. Let w be a sink in E, and let T denote any
left LK(E)-module. Then Ext1
LK (E)(V[w∞], T ) = 0, i.e. any extension of V[w∞] by T splits.
Proof. This follows immediately from the fact that V[w]
module (see Proposition 2.1).
∼= LK(E)w is a projective LK(E)-
(cid:3)
Definition 3.2. Let T be a Chen simple module. Denote by U(T ) the set
U(T ) := {v ∈ E0 vT 6= {0}} = {v ∈ E0 there exists t ∈ T with vt 6= 0}.
Remark 3.3. Let T be a Chen simple module and let q = e1e2 · · · ∈ E∞ such that T = V[q].
Then U(T ) consists of those vertices v for which there is a path α ∈ Path(E) having s(α) = v
and r(α) = s(ei) for some i ≥ 1. Equivalently, a vertex v ∈ U(T ) if and only if there is an
infinite path tail-equivalent to q starting from v. Hence U(T ) is a feature of the Chen simple
module T that can be read directly from the graph E.
Definitions 3.4. Let E be any graph and let d be a simple closed path in E.
For any p ∈ E∞ we say that p is divisible by d if p = dp′ for some p′ ∈ E∞.
For any q ∈ E∞, we define the set
L(d,q) := {p ∈ E∞ p ∼ q, s(p) = s(d), and p is not divisible by d} ⊆ V[q],
where V[q] is the Chen simple LK(E)-module generated by q.
An infinite path p is divisible by a simple closed path d ∈ E if and only if d = t≤ℓ(p), where
ℓ is the length of d. The set L(d,q) consists of those infinite paths which start at s(d), and
which eventually equal some tail of q, but do not start out by traversing the closed path d.
Observe that the subset L(d,q) of V[q] does not depend on q but only on the equivalence class
[q]. Let T = V[q]; if q is not tail equivalent to d∞, then there exists q′ ∼ q such that d 6 q′ and
hence T has a generator not divisible by d.
Remark 3.5. Let d be a simple closed path in E and q ∈ E∞.
1) Suppose q is not tail equivalent to d∞ and consider the Chen simple module V[q]; we can
assume without loss of generality that q is not divisible by d. The set L(d,q) is not empty if
and only if s(d) belongs to U(V[q]); in such a case any 0 6= t ∈ V[q] for which s(d)t = t is a
linear combination of infinite paths tail equivalent to q whose sources coincide with s(d). In
particular, taking in account the divisibility by d of these infinite paths, t can be written in
a unique way as
t = t0 + dt1 + d2t2 + · · · + dsts,
where the ti are K-linear combinations of elements in L(d,q) and ts 6= 0. We call s ≥ 0 the
d-degree of t and we denote it by degd(t).
EXTENSIONS OF SIMPLE MODULES OVER LEAVITT PATH ALGEBRAS
17
(2) Suppose q = d∞. Then L(d,d∞) 6= ∅ if and only if there exists a cycle c 6= d with
s(c) = s(d). Any 0 6= t ∈ V[d∞] for which s(d)t = t can be written in a unique way as
t = kd∞ + t0 + dt1 + d2t2 + · · · + dsts,
where the ti ∈ V[d∞] are K-linear combinations of elements in L(d,d∞) and ts 6= 0. We call
s ≥ 0 the d-degree of t and we denote it by degd(t).
In particular, any 0 6= t ∈ L(d,q) has d-degree equal to 0. We emphasize that, in case
q = d∞, the d-degree of the element d∞ of V[d∞] is zero too: degd(d∞) = 0. The d-degree is
not defined on 0.
Example 3.6. We revisit the graph R2 given by
e
•v
f
.
Consider the simple closed path e and the rational infinite path f ∞. Then L(e,f ∞) = {p ∈
R∞
p ∼ f ∞ and p is not divisible by e} ⊆ V[f ∞] contains, for instance, the infinite paths
2
{f iejf ∞ i ≥ 1, j ≥ 0}. (There are additional elements of L(e,f ∞), for instance, f ef ef ∞.)
Moreover, consider an element of the form ejf ief ∞ ∈ V[f ∞], with i ≥ 1 and j ≥ 0. Then
dege(ejf ief ∞) = j.
On the other hand, L(f,f ∞) = {p ∈ R∞
2
p ∼ f ∞ and p is not divisible by f } contains
the infinite paths {eif ∞ i ≥ 1}. Note that the element f ∞ of Vf ∞ is defined to have
degf (f ∞) = 0.
Recall that LK(E) is a ring wit unity if and only if E is finite.
Lemma 3.7. Let E be a finite graph. Let d be a simple closed path and q ∈ E∞. Let t ∈ V[q],
and consider the equation in the variable X
(d − 1)X = t.
The equation admits a solution in V[q] if one of the following holds:
(1) s(d)t = 0;
(2) t = dnp − p for some p ∈ L(d,q) and n ≥ 0.
Proof. (1) is easy, since if s(d)t = 0 then dt = 0, and hence X = −t is a solution. (2) is
i=0 dip is a
(cid:3)
i=0 dip = dnp − p = t, and hence X =Pn−1
nearly as easy, since we have (d − 1)Pn−1
solution.
Lemma 3.8. Let E be a finite graph. Let d be a simple closed path and let q ∈ E∞. Assume
either q = d∞ or q is a generator of V[q] not divisible by d. Let 0 6= t ∈ V[q], and consider the
equation
(d − 1)X = t.
Assume t = dnt′ for some n ≥ 0 and some 0 6= t′ ∈ V[q] for which s(d)t′ = t′ and degd(t′) = 0.
Then the equation has no solution in V[q]. In particular:
(1) the equation (d − 1)X = t has no solution in V[q] whenever t ∈ L(d,q), and
(2) the equation (d − 1)X = d∞ has no solution in V[d∞].
6
6
h
h
18
GENE ABRAMS∗, FRANCESCA MANTESE, AND ALBERTO TONOLO
Proof. Let v = s(d). Since vd = d and t = dnt′, we get vt = t. So if x is a solution of
(d − 1)X = t, then we would have v(d − 1)x = t, so that (d − 1)vx = t; thus we may assume
without loss that vx = x. Hence the equation yields
and, since t 6= 0, necessarily then x 6= 0. Let degd(x) = s and write
x = kd∞ + x0 + dx1 + · · · + dsxs,
x = dx − t,
where the xi's are linear combination of elements in L(d,q), and k = 0 in case q 6= d∞. Then,
using d · d∞ = d∞, we get
t = dnt′ = (d − 1)x = dx − x
= kd∞ − kd∞ − x0 + d(x0 − x1) + · · · + ds(xs−1 − xs) + ds+1xs
= −x0 + d(x0 − x1) + · · · + ds(xs−1 − xs) + ds+1xs.
We claim that this is impossible. Set x−1 = 0 = xs+1. By the uniqueness of the decomposition
in Remark 3.5, since degd(t′) = 0, one gets t′ = xn−1 − xn and xi−1 − xi = 0 for any i 6= n,
−1 ≤ n ≤ s + 1. Then we have 0 = x0 = x1 = · · · = xn−1 and t′ = −xn = · · · − xs+1 = 0,
contradiction.
(cid:3)
Assume E is a finite graph and d a simple closed path in E. In order to compute the groups
LK (E)(V[d∞], T ) for any Chen simple module T , we can consider the projective resolution
Ext1
of V[d∞]
0 → LK(E)
ρ(d−1)→ LK(E)
ρd∞→ V[d∞] → 0
ensured by Theorem 2.8.
Lemma 3.9. Let E be a finite graph. Let d be a simple closed path in E and let T be a Chen
simple module. Consider the exact sequence
HomLK (E)(LK(E), T )
ρ(d−1)∗
/ HomLK (E)(LK(E), T )
π
/ Ext1
LK (E)(V[d∞], T )
/ 0
where ρ(d−1)∗ (φ) = φ ◦ ρd−1, and π is the connecting homomorphism. Then
π(ρt) = 0 if and only if the equation (d − 1)X = t has a solution in T.
Consequently, Ext1
t ∈ T .
LK (E)(V[d∞], T ) = 0 if and only if (d − 1)X = t has a solution in T for every
Proof. By exactness it follows that π(ρt) = 0 if and only if there exists x ∈ T such that
ρt = ρ(d−1)∗(ρx) = ρx ◦ ρ(d−1) = ρ(d−1)x
i.e. if and only if the equation (d − 1)X = t has a solution in T .
The final statement follows directly from the exactness of the displayed sequence.
(cid:3)
Theorem 3.10. (Type (2)) Let E be a finite graph. Let d be a simple closed path in E and
let T be a Chen simple module. Then the following are equivalent:
(1) Ext1
(2) s(d) ∈ U(T )
LK (E)(V[d∞], T ) 6= 0.
/
/
/
EXTENSIONS OF SIMPLE MODULES OVER LEAVITT PATH ALGEBRAS
19
Proof. (1) ⇒ (2) If s(d)T = 0, then for any t ∈ T we have s(d)t = 0, so by Lemma 3.7(1) the
equation (d − 1)X = t admits a solution for any t ∈ T . Applying Lemma 3.9(2), we get that
Ext1
LK (E)(V[d∞], T ) = 0.
(2) ⇒ (1) First assume T 6= V[d∞]. As observed in Remark 3.5, T admits a generator
q not divisible by d and L(d,q) is not empty. Let p ∈ L(d,q). By Lemma 3.8, the equation
(d − 1)X = p has no solution in V[q] and so, by Lemma 3.9, π(ρp) 6= 0.
On the other hand, suppose T = V[d∞]. By Lemma 3.8, the equation (d − 1)X = d∞ has
no solution in V[d∞], and so, again invoking Lemma 3.9, π(ρd∞) 6= 0.
In either case we have established the existence of a nonzero element in Ext1
LK (E)(V[d∞], T ).
(cid:3)
Corollary 3.11. Let E be a finite graph. For any simple closed path d, Ext1
0.
LK (E)(V[d∞], V[d∞]) 6=
Example 3.12. We again revisit the graph R2:
e
•v
f
.
Let q be any element of R∞
Since clearly Condition (2) of Theorem 3.10 is satisfied for V[q], we get that Ext1
0.
2 . Let d be any (of the infinitely many) simple closed paths in R2.
LK (R2)(V[d∞], V[q]) 6=
✷
Having now established conditions which ensure that there exist nontrivial extensions of
the Chen simple module T by the simple module V[d∞], we now give a more explicit description
of the number of such extensions.
Proposition 3.13. Let E be any finite graph. Let d be a simple closed path in E and let T
be a Chen simple module. Assume q ∈ E∞ such that T = V[q].
(1) Suppose T 6= V[d∞]. Then dimK Ext1
(2) On the other hand, dimK Ext1
LK (E)(V[d∞], T ) = L(d,q).
LK (E)(V[d∞], V[d∞]) = L(d,d∞) + 1.
Proof. We consider the exact sequence
HomLK (E)(LK(E), V[q])
ρ(d−1)∗
/ HomLK (E)(LK(E), V[q])
π
/ Ext1
LK (E)(V[d∞], V[q])
/ 0 .
(1) Without loss of generality we can assume q is not divisible by d. By Remark 3.5(1)
and Theorem 3.10, if L(d,q) = ∅ then Ext1
LK (E)(V[d∞], T ) = 0. Otherwise, by Lemmas 3.8
and 3.9, π(ρp) 6= 0 for any path p ∈ L(d,q). We claim that the set {π(ρp) p ∈ L(d,q)} is a
basis for the vector space Ext1
LK (E)(V[d∞], T ). In order to show that {π(ρp) p ∈ L(d,q)} is
K-linearly independent, suppose there is a K-linear combination 0 = k1π(ρp1)+· · ·+knπ(ρpn)
in Ext1
LK (E)(V[d∞], V[q]), with pi ∈ L(d,q). Let t = k1p1 + · · · + knpn in V[q] so that π(ρt) = 0
in Ext1
LK (E)(V[d∞], V[q]). Thus, applying Lemma 3.9, we get that the equation (d − 1)X = t
has a solution in V[q]. If t 6= 0, since s(d)t = t and pi ∈ L(d,q) we get degd(t) = 0, which is a
contradiction by Lemma 3.8. Hence t = 0 and by the linear independence of {p1, . . . , pn} in
V[q] we get that k1 = · · · = kn = 0. So {π(ρp) p ∈ L(d,q)} is K-linearly independent.
We now show that {π(ρp) p ∈ L(d,q)} spans Ext1
Lemma 3.9(1) it suffices to show that any π(ρt) ∈ Ext1
LK (E)(V[d∞], T ). As π is surjective, by
LK (E)(V[d∞], T ) is a K-linear combination
6
6
h
h
/
/
/
20
GENE ABRAMS∗, FRANCESCA MANTESE, AND ALBERTO TONOLO
′′
t
j=1 kjp′′
j with s(p′′
i=1 kip′
i with s(p′
i) = s(d) and
j ) 6= s(d). By Lemma 3.7(1), the equation (d − 1)X = t has
solution in T = V[q] if and only if (d − 1)X = t′ has solution in V[q], so we can assume
without loss of generality that s(d)t = t. Hence t = t0 + dt1 + d2t2 + · · · + dsts, and so
j=1 kijuij, for some
of elements from this set. Write t = t′ + t′′ where t′ = Pmt′
t′′ = Pm
ρt = ρt0 + ρdt1 + ρd2t2 + · · · + ρdsts, where each ti is of the form ti = Pmi
uij ∈ L(d, q). Thus π(ρt) =Pm0
j=1 k1jπ(ρdu1j ) + · · · +Pj=1 msksjπ(ρdsusj ).
Observe that, by Lemmas 3.7(2) and 3.9, we get π(ρdnu − ρu) = 0 for any u ∈ L(d,q) and any
n ∈ N, so π(ρdnu) = π(ρu) for any n ∈ N. Hence {π(ρu) u ∈ L(d,q)} is a set of generators for
Ext1
j=1 k0jπ(ρu0j ) +Pm1
LK (E)(V[d∞], T ).
(2) Let us show that {π(ρp) p ∈ L(d,d∞)} ∪ {π(ρd∞)} is a basis for Ext1
LK (E)(V[d∞], V[d∞]).
First observe that, by Lemmas 3.8 and 3.9(2), π(ρd∞) 6= 0 and π(ρp) 6= 0 for any p ∈ L(d,d∞).
Arguing as in part (1) we claim that {π(ρp) p ∈ L(d,d∞)} ∪ {π(ρd∞)} is a linearly indepen-
dent set in Ext1
LK (E)(V[d∞], V[d∞]). Indeed, consider a K-linear combination 0 = k0π(ρd∞) +
k1π(ρp1) + · · · + knπ(ρpn) in Ext1
LK (E)(V[d∞], V[d∞]). Define y = k0d∞ + k1p1 + · · · + knpn ∈ V[d∞]
so that π(ρy) = 0 and hence, by Lemma 3.9(2), the equation (d − 1)X = y has a solution in
V[d∞]. Note that if y 6= 0 then degd(y) = 0 (whether or not k0 = 0) since each pi ∈ L(d,d∞),
which is a contradiction by Lemma 3.8. So y = 0, which yields that each ki (0 ≤ i ≤ n) is 0.
Since any t in V[d∞] with s(d)t = t is of the form t = kd∞ + t0 + dt1 + d2t2 + · · · + dsts,
using the same arguments as in part (1) it can be easily be shown that the set {π(ρp) p ∈
L(d,d∞)} ∪ {π(ρd∞)} spans Ext1
(cid:3)
Lemma 3.14. Let d be a simple closed path in the finite graph E.
LK (E)(V[d∞], V[d∞]).
(1) If q ∈ E∞ is irrational and L(d,q) 6= ∅, then L(d,q) is infinite.
(2) If L(d,d∞) 6= ∅, then L(d,d∞) is infinite.
Proof. (1) Let q = e1e2 · · · for ei ∈ E1. First notice that, for any w ∈ E0, if w = r(ei) for
some i > 0, then we can assume without loss of generality that w = r(ej) for infinitely many
j > 0 (as otherwise, since E1 is finite, we can replace q with q′ ∈ E∞ for which q ∼ q′ and
w 6∈ (q′)0).
Consider now an element p ∈ L(d,q). Then p = βq0 and q = γq0 for some q0 ∈ [q] and
β, γ ∈ Path(E) and β not divisible by d. Consider w = r(β) = s(q0). Then, by the previous
assumption, there exists a set of infinite and distinct truncations {τ>nk(q) k ∈ N} such that,
for each k ∈ N, q = γkwτ>nk(q) for some γk ∈ Path(E). Since q is irrational, by Remark 2.4
the infinite paths in the set {τ>nk(q) k ∈ N} are distinct. Hence there are infinitely many
distinct elements βτ>nk(q) in L(d,q), which establishes (1).
(2) If L(d,d∞) 6= ∅, then there is at least one simple closed path c for which s(c) = s(d) and
c 6= d. Then we easily get that each of the distinct paths {cid∞ i ∈ N} is tail equivalent to
d∞, which gives that L(d,d∞) is infinite.
(cid:3)
Corollary 3.15. Let d be a simple closed path in E and T a Chen simple module.
dimK Ext1
Proof. It follows directly from Lemma 3.14 and Proposition 3.13.
LK (E)(V[d∞], T ) is finite, then T = V[c∞] for a simple closed path c.
If
(cid:3)
Example 3.16. For each n ∈ N, consider the graph
En =
d
•v
(n)
/ •w
f
,
6
6
/
h
h
EXTENSIONS OF SIMPLE MODULES OVER LEAVITT PATH ALGEBRAS
21
where the symbol (n) indicates that there are n edges {e1, . . . , en} for which s(ei) = v and
r(ei) = w. Then in En we have L(d,f ∞) = {e1f ∞, . . . , enf ∞}, so that L(d,f ∞) = n. By
Proposition 3.13(1) we conclude that dimK Ext1
LK (En)(V[d∞], V[f ∞]) = n.
Example 3.17. Consider the graph
R1 = •v
d
,
for which LK(R1) ∼= K[x, x−1]. Then L(d,d∞) is empty, hence by Proposition 3.13(2) we
conclude that dimK Ext1
LK (R1)(V[d∞], V[d∞]) = 1.
Having given a complete analysis of Ext1
LK (E)(V[d∞], T ) for any simple closed path d of E
and any Chen simple module T , we now analyze Ext1
LK (E)(V[p], T ) for any irrational infinite
path p and any Chen simple module T . The projective resolution of V[p] we are going to use
is the one introduced in the proof of Theorem 2.20:
0
/ Ker(ρp)
/ LK(E)v
ρp
/ V[p]
/ 0 ,
where Ker(ρp) = ⊕∞
i=0Ji(p) as in Corollary 2.17 and v = s(p).
Remark 3.18. Let E be a finite graph and u ∈ LK(E). For each left LK(E)-module M, any
morphism φ ∈ HomLK (E)(LK(E)u, M) is the right product by the element φ(u) of M. If u is
an idempotent, then it is HomLK (E)(LK(E)u, M) ∼= uM as abelian groups, by means of the
isomorphism φ 7→ φ(u) = uφ(u).
In order to state the analog of Theorem 3.10 for the irrational case we need the following
notation. Let p = e1e2 · · · ∈ E∞ be an irrational infinite path in E. For each i ≥ 0 let Xi(p)
denote the set {f ∈ E1 s(f ) = s(ei+1) and f 6= ei+1} as presented in Definition 2.10, and
define
r(Xi(p)) := {w ∈ E0 w = r(f ) for some f ∈ Xi(p)}.
Finally, for any p ∈ E∞ and any i ≥ 0 recall from Definitions 2.10 that the left LK(E)-ideal
Ji(p) is
Ji(p) = Xf ∈Xi(p)
LK(E)f ∗p∗
i ,
Ji(p) = Mf ∈Xi(p)
where pi denotes the truncation τ≤i(p). As proved in Lemma 2.19, if p is irrational, then
LK(E)f ∗p∗
i
LK(E)r(f ).
∼= Mf ∈Xi(p)
Lemma 3.19. Let p be an irrational infinite path in the finite graph E. Let T denote a
Chen simple module and let t ∈ T . Then there exists a positive integer N = N(t) for which
(Ji(p))t = 0 for all i ≥ N.
Proof. Assume q ∈ E∞ (q can be rational, irrational or a sink) and let α ∈ Path(E) with
length(α) = n. Observe that, for any i ≥ n, one has p∗
i αq = 0 unless pi = ατ≤i−n(q). So if
p∗
i αq 6= 0 for all i ∈ N, we can conclude p = αq. Finally notice that, if there exists N ∈ N
such that p∗
i αq = 0 for any i ≥ N.
N αq = 0, then p∗
(Case 1.) Let T 6= V[p] and let q ∈ E∞, necessarily not tail-equivalent to p, such that
u=1 kuαuτ>iu(q), where
T = V[q]. Consider an element t ∈ T . Then t can be written as t =Ps
h
h
/
/
/
/
22
GENE ABRAMS∗, FRANCESCA MANTESE, AND ALBERTO TONOLO
the αu's are in Path(E) and the iu's are in N, and hence αuτ>iu(q) 6= p for any u = 1, . . . , s.
Since any element in (Ji(p))t is a finite sum of expressions of the form kuf ∗p∗
i αuτ>iu(q), and
since αuτ>iu(q) 6= p, by the previous observations we can choose an N = N(t) sufficiently
large such that (Ji(p))t = 0 for any i ≥ N.
written as t = Ps
(Case 2.) On the other hand, let T = V[p] and consider an element t ∈ T . Then t can be
u=1 kuqu, where the qu's are tail equivalent to p. Let f ∈ Xi(p), i ≥ 0; if
i p = f ∗τ>i(p) = 0, by construction of f ∗. If qu 6= p, there exists an integer
iuτ≤iu(q) = 0. Then, by the initial observation, if
(cid:3)
qu = p then f ∗p∗
iu > 0 such that τ≤iu(q) 6= piu and hence p∗
N = Nt = max{iu : u = 1, ..., s}, we conclude that (Ji(p))t = 0 for any i ≥ N.
Lemma 3.20. Let E be a finite graph, and let p be an infinite irrational path in E. Let T
be a Chen simple LK(E)-module. Then HomLK (E)(Ji(p), T ) 6= 0 if and only if r(f ) ∈ U(T )
for some f ∈ Xi(p).
Proof. By standard ring theory, we have the following isomorphisms of abelian groups
HomLK (E)(Ji(p), T ) ∼= HomLK (E)(⊕f ∈Xi(p)LK(E)r(f ), T )
∼= ⊕f ∈Xi(p)HomLK (E)(LK(E)r(f ), T ) ∼= ⊕f ∈Xi(p)r(f )T,
where the second isomorphism holds because Xi(p) is finite, and the final one by Remark 3.18
because each r(f ) is idempotent.
(cid:3)
Theorem 3.21. (Type (3)) Let p be an irrational infinite path in the finite graph E and let
T be any Chen simple LK(E)-module. Then Ext1
LK (E)(V[p], T ) 6= 0 if and only if r(Xi(p)) ∩
U(T ) 6= ∅ for infinitely many i ≥ 0. In such a situation, dimK(Ext1
LK (E)(V[p], T )) is infinite.
Proof. (⇒) Suppose r(Xi(p)) ∩ U(T ) 6= ∅ for at most finitely many i ≥ 0. We seek to show
that every element of HomLK (E)(Ker(ρp), T ) arises as right multiplication by an element of
T . We have HomLK (E)(Ker(ρp), T ) = HomLK (E)(⊕i≥0Ji(p), T ) ∼= Qi≥0 HomLK (E)(Ji(p), T ),
which by Lemma 3.20 and hypothesis equalsQN
i=0 HomLK (E)(Ji(p), T ) for some N ∈ N. For
is an idempotent generator of LK(E)f ∗p∗
i ;
i : f ∈ Xi(p), i ≥ 0} is a set of orthogonal idempotents in LK(E). Every el-
i ); then every
i ).
each i ≥ 0 and f ∈ Xi(p), the element pif f ∗p∗
i
moreover {pif f ∗p∗
ement ϕ of HomLK (E)(LK(E)pif f ∗p∗
element ψ of HomLK (E)(⊕N
So Ext1
LK (E)(V[p], T ) = 0.
(⇐) Conversely, let us see that r(Xi(p)) ∩ U(T ) 6= ∅ for infinitely many i ≥ 0 implies that
there is an element of HomLK (E)(Ker(ρp), T ) which does not arise as a right multiplication
by an element of T . By Lemma 3.20 there exists an increasing sequence (in)n∈N of natural
numbers such that HomLK (E)(Ji(p), T ) 6= 0 if and only if i = in for a suitable n ∈ N. Let
{φi ∈ HomLK (E)(Ji(p), T ) : i ∈ N} be a family of morphisms such that φin 6= 0 for each
n ∈ N. Then
i , T ) is the right multiplication by ϕ(pif f ∗p∗
i=0Ji(p), T ) is the right multiplication by ψ(PN
i=0Pf ∈Xi(p) pif f ∗p∗
ϕ =Yi∈N
φi ∈ HomLK (E)(⊕i∈NJi(p), T )
is a morphism which is not, by Lemma 3.19, right multiplication by element of T .
EXTENSIONS OF SIMPLE MODULES OVER LEAVITT PATH ALGEBRAS
23
To establish the final statement, consider an increasing sequence (in)n∈N of natural numbers
and a family {φin ∈ HomLK (E)(Jin(p), T ) : n ∈ N} of nonzero morphisms. Define for each
prime z ∈ N the morphism Ψz ∈ HomLK (E)(Ker(ρp), T ) as follows: for each j ≥ 0,
Ψz(Jij (p)) = ψij (Jij (p)) if z divides j, while Ψz(Jℓ(p)) = 0 otherwise.
Observe that π(Ψz) 6= 0, since Ψz has infinitely many nonzero components. Finally, {π(Ψz) z ∈
N, z prime} is a set of linearly independent elements of Ext1
LK (E)(V[p], T )), as follows. Let F
be a finite subset of primes in N, and assumePz∈F kzπ(Ψz) = 0; then π(Pz∈F kzΨz) = 0 and
therefore Pz∈F kzΨz is a right multiplication by an element t of T . By Lemma 3.19 there
exists a positive integer N = N(t) for which (Ji(p))t = 0 for all i ≥ N. For each prime z ∈ F ,
let mz a natural number greater than N; then
0 = (Jzmz (p))t =Xz∈F
kzΨz(Jzmz (p)) = kzΨz(Jzmz (p))
and hence kz = 0. Hence dimK(Ext1
LK (E)(V[p], T )) is infinite.
(cid:3)
We emphasize the fact that Theorems 3.10 and 3.21 allow us to compute the dimension of the
Ext1-groups between two Chen simple modules completely and solely in terms of properties
of the graph E.
Example 3.22. We again revisit the graph R2 and irrational infinite path q = ef ef f ef f f e · · ·
of Example 1.1. Let T = V[q]. Since clearly U(T ) = {v} and r(Xi) = {v} for all i ∈ N as
well, Theorem 3.21 yields that dimK(Ext1
LK (E)(V[q], V[q])) is infinite.
Example 3.23. With the statement of Theorem 3.21 as motivation, we give examples of
graphs En, an irrational infinite path p in En, and Chen simple LK(En)-modules T having
r(Xi(p)) ∩ U(T ) 6= ∅ for only finitely many i ∈ Z+. For n ∈ N consider the graph En given
by
•v1
e1
•v2
e2
· · ·
/ •vn
en /
s❣❣❣❣❣❣❣❣❣❣❣❣❣❣❣❣❣❣❣❣❣❣❣❣❣❣❣❣
u❥❥❥❥❥❥❥❥❥❥❥❥❥❥❥❥❥❥❥
❉
❉
❉
❉
❉
❉
❉
!❉
•w
en+1
•vn+1
•v
e
f
h
g
Let p denote the irrational infinite path e1e2 · · · enen+1ef ef f ef f f e · · · . Let T1 be the Chen
simple LK(E)-module V[g∞], and let T2 denote the Chen simple LK(E)-module V[q] correspond-
ing to the irrational infinite path q = ghghhghhhg · · · . Then for j = 1, 2, r(Xi(p)) ∩ U(Tj) is
nonempty (indeed, equals {w}) precisely when 0 ≤ i ≤ n.
Consequently, by Theorem 3.21, Ext1
LK (E)(V[p], Tj) = {0} for j = 1, 2.
We conclude the article by demonstrating the existence of indecomposable LK(E)-modules
of prescribed finite length, in case E is a finite graph which contains cycles. Recall that
a module M is called uniserial in case the lattice of submodules of M is totally ordered.
In particular, any uniserial module is indecomposable. Moreover, the radical Rad(M) of a
uniserial module M is the unique maximal submodule of M, hence M/ Rad M is simple.
/
/
!
/
/
/
/
u
/
/
s
R
R
j
j
4
4
24
GENE ABRAMS∗, FRANCESCA MANTESE, AND ALBERTO TONOLO
Lemma 3.24. [8, Lemma 16.1 with Proposition 16.2] Let R be any unital ring. Let U be a
uniserial left R-module of finite length, and X a simple left R-module. Consider the morphism
ψ : Ext1
R(X, U) is uniserial if and only
if it does not belong to Ker ψ.
R(X, U/ Rad U). An extension in Ext1
R(X, U) → Ext1
In particular, if R is hereditary, there exists a uniserial extension of U by X if and only if
R(X, U/ Rad U) 6= 0.
Ext1
As observed in Remark 1.4, LK(E) is hereditary for any row-finite graph E. So Lemma
3.24 gives the following:
Corollary 3.25. Let E be a finite graph. If S is a Chen simple LK(E)-module such that
LK (E)(S, S) 6= 0 and L is a uniserial LK(E)-module such that L/ Rad(L) ∼= S, then there
Ext1
exists a uniserial LK(E)-module M which is an extension of L by S.
In particular, for any n ∈ N there exists a uniserial LK(E)-module of length n, all of whose
composition factors are isomorphic to S.
Proof. The first statement follows directly from Lemma 3.24 and the hereditariness of LK(E).
In order to show the existence of uniserial modules of arbitrary length, first observe that any
non-zero element of the abelian group Ext1
LK (E)(S, S) 6= 0 corresponds to an indecomposable
uniserial module L2 of length 2, with Rad(L2) ∼= S and L2/Rad(L2) ∼= S. Then, by applying
the first statement, there exists a uniserial module L3 of length 3 which is an extension of L2
by S. Since Rad(L3) ∼= L2 and hence L3/ Rad(L3) ∼= S, we can proceed by induction.
(cid:3)
Observe that if E contains a simple closed path d, by Corollary 3.11 the module S = V[d∞]
satisfies Ext1
LK (E)(S, S) 6= 0 and hence Corollary 3.25 applies.
References
[1] G. Abrams, P. Ara, M. Siles Molina. "Leavitt path algebras". Lecture Notes Series in Mathematics,
Springer Verlag, to appear.
[2] G. Abrams, G. Aranda Pino, The Leavitt path algebra of a graph, J. Algebra 293(2) (2005), 319 - 334.
[3] P. Ara, M.A. Moreno, E. Pardo, Non-stable K-theory for graph algebras, Algebr. Represent. Theor. 10(2)
(2007), 157 - 178.
[4] P. Ara, K.M. Rangaswamy, Finitely presented simple modules over Leavitt path algebras, J. Algebra 417
(2014), 333 - 352.
[5] G. Aranda Pino, D. Martin Barquero, C. Martin Gonzalez, M. Siles Molina, Socle theory for leavitt path
algebras of arbitrary graphs, Rev. Mat. Iberoamericana 26 (2010), no. 2, 611 - 638.
[6] X.W. Chen, Irreducible representations of Leavitt path algebras, Forum Math., to appear. arXiv:
1108.3726.
[7] W. Leavitt, The module type of a ring, Trans. Amer. Math. Soc. 103(1) (1962), 113 - 130.
[8] L.S. Levy, J. C. Robson. "Hereditary Noetherian prime rings and idealizers." Mathematical Surveys and
Monographs Volume 174. American Mathematical Society, Providence, USA. 2011. ISBN 978-0-8218-
5350-4.
[9] C. Weibel. "An introduction to homological algebra." Cambridge Studies in Advanced Mathematics
(Book 38). Cambridge University Press, Cambridge, UK. ISBN 978-0-5215-5987-4.
EXTENSIONS OF SIMPLE MODULES OVER LEAVITT PATH ALGEBRAS
25
Department of Mathematics, University of Colorado, Colorado Springs, CO 80918 U.S.A.
E-mail address: [email protected]
Dipartimento di Informatica, Universit`a degli Studi di Verona, I-37134 Verona, Italy
E-mail address: [email protected]
Dipartimento Matematica, Universit`a degli Studi di Padova, I-35121, Padova, Italy
E-mail address: [email protected]
|
1407.3978 | 2 | 1407 | 2015-11-03T03:39:21 | Some structure theories of Leibniz triple systems | [
"math.RA"
] | In this paper, we investigate the Leibniz triple system $T$ and its universal Leibniz envelope $U(T)$. The involutive automorphism of $U(T)$ determining $T$ is introduced, which gives a characterization of the $\Z_2$-grading of $U(T)$. We give the relationship between the solvable radical $R(T)$ of $T$ and $Rad(U(T))$, the solvable radical of $U(T)$. Further, Levi's theorem for Leibniz triple systems is obtained. Moreover, the relationship between the nilpotent radical of $T$ and that of $U(T)$ is studied. Finally, we introduce the notion
of representations of a Leibniz triple system. | math.RA | math |
Some structure theories of Leibniz triple
systems
Yao Ma1, Liangyun Chen2∗
1School of Mathematical Sciences, University of Science and Technology of China,
2School of Mathematics and Statistics, Northeast Normal University,
Hefei 230026, CHINA
Changchun 130024, CHINA
Abstract
In this paper, we investigate the Leibniz triple system T and its universal Leibniz
envelope U (T ). The involutive automorphism of U (T ) determining T is introduced,
which gives a characterization of the Z2-grading of U (T ). We give the relationship
between the solvable radical R(T ) of T and Rad(U (T )), the solvable radical of
U (T ). Further, Levi's theorem for Leibniz triple systems is obtained. Moreover, the
relationship between the nilpotent radical of T and that of U (T ) is studied. Finally,
we introduce the notion of representations of a Leibniz triple system.
Key words: Leibniz triple system, Lie triple system, Levi's theorem, solvable
radical, nilpotent radical
MSC(2010): 17A32, 17A40, 17A60, 17A65
1
Introduction
The notion of Leibniz algebras was introduced by Loday [14], which is a "nonan-
tisymmetric" generalization of Lie algebras. A Leibniz algebra is a vector space equipped
with a bilinear bracket satisfying the (right) Leibniz identity
[[x, y], z] = [[x, z], y] + [x, [y, z]].
(1.1)
A Leibniz algebra whose bracket is antisymmetric is a Lie algebra. In fact, such algebras
were considered by Bloh in 1965, who called them D-algebras [6]. Later, Loday introduced
* Corresponding author(L. Chen): [email protected].
Supported by NNSF of China (Nos. 11171055 and 11471090) and China Postdoctoral Science Foun-
dation(No. 159347).
1
this class of algebras to search an "obstruction" to the periodicity in algebraic K-theory.
So far many results of Leibniz algebras have been studied, including extending important
theorems in Lie algebras: there are analogs of Lie's theorem, Engel's theorem, Levi's
theorem and Cartan's criterion for Leibniz algebras [1 -- 5, 8 -- 10, 15, 17].
Leibniz triple systems were introduced by Bremner and S´anchez-Ortega [7]. Leib-
niz triple systems are defined in a functorial manner using the Kolesnikov-Pozhidaev
algorithm, which takes the defining identities for a variety of algebras and produces the
defining identities for the corresponding variety of dialgebras [12]. As an application of
this algorithm, it is showed that associative dialgebras and Leibniz algebras can be ob-
tained from associative and Lie algebras, respectively. In [7], Leibniz triple systems were
obtained by applying the Kolesnikov-Pozhidaev algorithm to Lie triple systems. Further-
more, Leibniz triple systems are related to Leibniz algebras in the same way that Lie
triple systems related to Lie algebras. So it is natural to prove analogs of results from the
theory of Lie triple systems to Leibniz triple systems.
This paper proceeds as follows. Section 2 devotes to some basic facts about a Leibniz
triple system T . In Section 3, we give the involutive automorphism of U(T ) determining
T , where U(T ) is the universal Leibniz envelope of T , using which to investigate the
connection between automorphisms of T and those of U(T ), and to describe the Z2-
graded subspace of U(T ). In Section 4, the solvable radical of a Leibniz triple system
and the definition of a semisimple Leibniz triple system are introduced.
In Section 5,
Levi's theorem is extended to the case of Leibniz triple systems. In Section 6, the notion
of nilpotent ideals of T is introduced. Section 7 is devoted to the representations of a
Leibniz triple system.
In the sequel, all vector spaces are finite-dimensional and defined over a fixed but
arbitrarily chosen field K of characteristic 0.
2 Preliminaries
Definition 2.1. [13, 16] A vector space T together with a trilinear map (a, b, c) 7→ [abc]
is called a Lie triple system if
[aac] = 0,
[abc] + [bca] + [cab] = 0,
[ab[cde]] = [[abc]de] + [c[abd]e] + [cd[abe]],
for all a, b, c, d, e ∈ T .
Definition 2.2. [7] A Leibniz triple system (LeibTS for short) is a vector space T
with a trilinear operation {·, ·, ·} : T × T × T → T satisfying
{a{bcd}e} = {{abc}de} − {{acb}de} − {{adb}ce} + {{adc}be},
{ab{cde}} = {{abc}de} − {{abd}ce} − {{abe}cd} + {{abe}dc}.
(2.2)
(2.3)
2
A Lie triple system gives a LeibTS with the same ternary product. If L is a Leibniz
algebra with product [·, ·], then L becomes a LeibTS by putting {xyz} = [[xy]z]. The
following examples of LeibTSs are induced by Leibniz algebras.
Example 2.3. (1) Let T = Khx, yi with multiplications given by {xyy} = {yyy} = x,
and the rest are 0. Then T is a LeibTS.
(2) Let T = Khx, y, zi with multiplications given by {xzz} = {yzz} = {zzz} = x,
and the rest are 0. Then T is a LeibTS.
(3) Let T = Khx, a, b, c, di with the following multiplications
{axx} = −{xax} = a,
{bax} = {cxx} = c,
{abx} = {xab} = {axb} = {xcx} = {xdx} = {dxx} = d,
and the rest are 0. Then T is a LeibTS.
More examples refer to [7].
Proposition 2.4. [7] Let T be a LeibTS. Then the following identities hold.
{a{bcd}e} + {a{cbd}e} = 0, {ab{cde}} + {ab{dce}} = 0,
(2.4)
{a{bcd}e}+ {a{cdb}e}+ {a{dbc}e} = 0, {ab{cde}}+ {ab{dec}}+ {ab{ecd}} = 0, (2.5)
{{cde}ba} − {{cde}ab} − {{cba}de} + {{cab}de} − {c{abd}e} − {cd{abe}} = 0.
(2.6)
Remark 2.5. Any two of Equations (2.2), (2.3) and (2.6) induce the rest one.
Theorem 2.6. [7] Suppose that T is a LeibTS with product {xyz}. The universal
Leibniz envelope of T is the quotient algebra U(T ) = A(T )/I(T ) with A(T ) the free
Leibniz algebra and I(T ) the ideal generated by the elements [[x, y], z] − {xyz}. Then
U(T ) = T ⊕ (T ⊗ T ) together with product [·, ·] satisfies
[a, b] = a ⊗ b,
[a ⊗ b, c] = {abc},
[a, b ⊗ c] = {abc} − {acb},
[a ⊗ b, c ⊗ d] = {abc} ⊗ d − {abd} ⊗ c.
It is straightforward to verify that U(T ) is a Leibniz algebra and T ⊗ T is a subalgebra of
U(T ).
Generally speaking, U(T ) is not a Lie algebra even if T is a Lie triple system, so we
try to add a condition.
Proposition 2.7. Let T be a Lie triple system and U(T ) be defined as in Theorem 2.6.
then U(T ) is a Lie algebra.
Denote by K(T ) = {P a ⊗ b ∈ T ⊗ T [P a ⊗ b, T ] = [T,P a ⊗ b] = 0}. If K(T ) = 0,
Proof. We need only to show that for all x = a +P b ⊗ c ∈ U(T ), [x, x] = 0, since
U(T ) is already a Leibniz algebra by Theorem 2.6.
3
Note that T is a Lie triple system. Take a, b, c ∈ T , then one has
[a ⊗ a, b] = {aab} = 0,
[b, a ⊗ a] = {baa} − {baa} = 0,
which imply [a, a] = a ⊗ a ∈ K(T ) = 0. It follows from (2.3) and the definition of Lie
triple systems that
[[a ⊗ b, a ⊗ b], c] = [{aba} ⊗ b − {abb} ⊗ a, c] = {{aba}bc} − {{abb}ac}
={ab{abc}} + {{abc}ab} − {{abc}ba} = {ab{abc}} + {{abc}ab} + {b{abc}a} = 0,
and
[c, [a ⊗ b, a ⊗ b]] = [c, {aba} ⊗ b − {abb} ⊗ a]
={c{aba}b} − {cb{aba}} − {c{abb}a} + {ca{abb}}
={b{aba}c} + {{abb}ac} = {ab{bac}} − {ba{abc}} = 0,
that is, [a ⊗ b, a ⊗ b] ∈ K(T ) = 0.
i=1 bi ⊗ ci ∈ U(T ), then
n
n
bi ⊗ ci, a +
bi ⊗ ci#
Xi=1
Now take a +Pn
"a +
Xi=1
Xi=1
=a ⊗ a +
n
=Xi<j
({bicia} + {abici} − {acibi}) +
([bi ⊗ ci, bj ⊗ cj] + [bj ⊗ cj, bi ⊗ ci]).
n
[bi ⊗ ci, bj ⊗ cj]
Xi,j=1
Note that for all d ∈ T , [d, [bi ⊗ ci, bj ⊗ cj] + [bj ⊗ cj, bi ⊗ ci]] = 0 by using (1.1), and
[[bi ⊗ ci, bj ⊗ cj], d] = [{bicibj} ⊗ cj − {bicicj} ⊗ bj, d]
={{bicibj}cjd} − {{bicicj}bjd} = {bici{bjcjd}} − {bjcj{bicid}}.
Then [[bi ⊗ ci, bj ⊗ cj] + [bj ⊗ cj, bi ⊗ ci], d] = 0, and so
[bi ⊗ ci, bj ⊗ cj] + [bj ⊗ cj, bi ⊗ ci] ∈ K(T ) = 0.
Thus [x, x] = 0.
Definition 2.8. Let I be a subspace of a LeibTS T . Then I is called a subsystem of T ,
if {III} ⊆ I; I is called an ideal of T , if {IT T } + {T IT } + {T T I} ⊆ I.
Let I be an ideal of a LeibTS T and define some notations as follows.
i(I) = I ⊗ T + T ⊗ I,
j(I) =nX a ⊗ b ∈ T ⊗ T (cid:12)(cid:12)(cid:12) hX a ⊗ b, Ti +hT,X a ⊗ bi ⊆ Io ,
I(I) = I + i(I), J (I) = I + j(I).
It is easy to see that K(T ) = j(0) = J (0). The notion of K(T ) will be used in Section 4,
too.
4
Theorem 2.9. If I is an ideal of a LeibTS T , then
(1) i(I) ⊆ j(I), I(I) ⊆ J (I).
(2) i(I) and j(I) are ideals of T ⊗ T .
(3) I(I) and J (I) are ideals of U(T ).
Proof.
(1) follows from
[i(I), T ] = [I ⊗ T + T ⊗ I, T ] ⊆ {IT T } + {T IT } ⊆ I
and
[T, i(I)] = [T, I ⊗ T + T ⊗ I] ⊆ {T IT } + {T T I} ⊆ I.
(2) i(I) is an ideal of T ⊗ T since
[i(I), T ⊗ T ] = [I ⊗ T + T ⊗ I, T ⊗ T ] ⊆ {IT T } ⊗ T + {T IT } ⊗ T ⊆ I ⊗ T ⊆ i(I)
and
[T ⊗ T, i(I)] = [T ⊗ T, I ⊗ T +T ⊗ I] ⊆ {T T I} ⊗ T +{T T T } ⊗ I ⊆ I ⊗ T +T ⊗ I = i(I).
It is sufficient to prove that for all c ∈ T ,
To show that j(I) is an ideal of T ⊗ T , we take P t ⊗ s ∈ T ⊗ T and P a ⊗ b ∈ j(I).
hhX a ⊗ b,X t ⊗ si , ci ∈ I,
hhX t ⊗ s,X a ⊗ bi , ci ∈ I,
hc,hX a ⊗ b,X t ⊗ sii ∈ I,
hc,hX t ⊗ s,X a ⊗ bii ∈ I.
In fact, it follows from (2.3) that
hhX a ⊗ b,X t ⊗ si , ci =X([{abt} ⊗ s − {abs} ⊗ t, c])
=X({{abt}sc} − {{abs}tc}) =X({[a ⊗ b, t]sc} − {[a ⊗ b, s]tc}) ∈ I,
hc,hX a ⊗ b,X t ⊗ sii =X[c, {abt} ⊗ s − {abs} ⊗ t]
=X({c{abt}s} − {cs{abt}} − {c{abs}t} + {ct{abs}})
=X({c[a ⊗ b, t]s} − {cs[a ⊗ b, t]} − {c[a ⊗ b, s]t} + {ct[a ⊗ b, s]}) ∈ I,
hhX t ⊗ s,X a ⊗ bi , ci =X([{tsa} ⊗ b − {tsb} ⊗ a, c])
=X({{tsa}bc} − {{tsb}ac}) =X({ts{abc}} + {{tsc}ab} − {{tsc}ba})
=X({ts[a ⊗ b, c]} + [{tsc}, a ⊗ b]) ∈ I.
5
and
Moreover, by (1.1), [c, [P t ⊗ s,P a ⊗ b]] = − [c, [P a ⊗ b,P t ⊗ s]] ∈ I.
(3) It is routine to prove that I(I) is an ideal of U(T ) by the facts of I being an ideal
of T and i(I) being an ideal of T ⊗ T . J (I) is an ideal of U(T ) since
[J (I), U(T )] =[I + j(I), T + T ⊗ T ] = I ⊗ T + [j(I), T ] + [I, T ⊗ T ] + [j(I), T ⊗ T ]
⊆i(I) + I + j(I) = I + j(I) = J (I),
and
[U(T ), J (I)] =[T + T ⊗ T, I + j(I)] = T ⊗ I + [T ⊗ T, I] + [T, j(I)] + [T ⊗ T, j(I)]
⊆i(I) + I + j(I) = J (I).
Thus the proof is completed.
3 The involutive automorphism of U (T ) determining
T
Theorem 2.6 says that U(T ) is a Z2-graded Leibniz algebra with U(T )¯0 = T ⊗ T and
U(T )¯1 = T . Then every Leibniz triple system T is the ¯1 component of a Z2-graded Leibniz
algebra. Moreover, for a Z2-graded Leibniz algebra L = L¯0 ⊕ L¯1, L¯1 has the structure of
a Leibniz triple system.
The Z2-grading of U(T ) can be characterized by an involutive automorphism. In what
follows we will use this involutive automorphism of U(T ) to investigate the connection
between automorphisms of T and those of U(T ), and describe the Z2-graded subspace of
U(T ).
Theorem 3.1. Let T be a LeibTS and U(T ) the universal Leibniz envelope of T . Then
there is a unique involutive automorphism θ : U(T ) → U(T ) such that
T = {x ∈ U(T ) θ(x) = −x}.
that θ is linear and θ2 = id. Note that
Proof. For a +P b ⊗ c ∈ U(T ), define θ (a +P b ⊗ c) = −a +P b ⊗ c. It is clear
hθ(cid:16)a +X b ⊗ c(cid:17) , θ(cid:16)a′ +X b′ ⊗ c′(cid:17)i =h−a +X b ⊗ c, −a′ +X b′ ⊗ c′i
=a ⊗ a′ −X{bca′} −X{ab′c′} +X{ac′b′} +X{bcb′} ⊗ c′ −X{bcc′} ⊗ b′,
and
θ(cid:16)ha +X b ⊗ c, a′ +X b′ ⊗ c′i(cid:17)
=θ(cid:16)a ⊗ a′ +X{bca′} +X{ab′c′} −X{ac′b′} +X{bcb′} ⊗ c′ −X{bcc′} ⊗ b′(cid:17)
6
=a ⊗ a′ −X{bca′} −X{ab′c′} +X{ac′b′} +X{bcb′} ⊗ c′ −X{bcc′} ⊗ b′.
Then θ is an involutive automorphism of U(T ) and T = {x ∈ U(T ) θ(x) = −x}.
If φ is another involutive automorphism of U(T ) with T = {x ∈ U(T ) φ(x) = −x},
then θT = φT = −idT and
θ(cid:16)a +X b ⊗ c(cid:17)
=θ(cid:16)a +X[b, c](cid:17) = θ(a) +X[θ(b), θ(c)] = φ(a) +X[φ(b), φ(c)] = φ(cid:16)a +X[b, c](cid:17)
=φ(cid:16)a +X b ⊗ c(cid:17) ,
which implies θ = φ, so θ is unique. θ is called the involutive automorphism of U(T )
determining T .
Proposition 3.2. Suppose that T is a LeibTS and f is an automorphism of T . Then
there is a unique automorphism f of U(T ) such that f = f T and f θ = θ f , where θ is the
involutive automorphism of U(T ) determining T .
clear that f is well defined, f T = f and f is a linear isomorphism. Moreover, we have
Proof. Define f : U(T ) → U(T ) by f (a +P b ⊗ c) = f (a) +P f (b) ⊗ f (c). It is
f(cid:16)ha +X b ⊗ c, a′ +X b′ ⊗ c′i(cid:17)
= f(cid:16)a ⊗ a′ +X{bca′} +X{ab′c′} −X{ac′b′} +X{bcb′} ⊗ c′ −X{bcc′} ⊗ b′(cid:17)
=f (a) ⊗ f (a′) +X{f (b)f (c)f (a′)} +X{f (a)f (b′)f (c′)} −X{f (a)f (c′)f (b′)}
+X{f (b)f (c)f (b′)} ⊗ f (c′) −X{f (b)f (c)f (c′)} ⊗ f (b′)
=hf (a) +X f (b) ⊗ f (c), f (a′) +X f (b′) ⊗ f (c′)i
=h f(cid:16)a +X b ⊗ c(cid:17) , f(cid:16)a′ +X b′ ⊗ c′(cid:17)i ,
and
f θ(cid:16)a +X b ⊗ c(cid:17) = f(cid:16)−a +X b ⊗ c(cid:17) = −f (a) +X f (b) ⊗ f (c)
=θ(cid:16)f (a) +X f (b) ⊗ f (c)(cid:17) = θ f(cid:16)a +X b ⊗ c(cid:17) .
Hence f is an automorphism and f θ = θ f . f is unique since U(T ) is generated by T .
Proposition 3.3. If f is an automorphism of U(T ) satisfying f θ = θf , then f (T ) ⊆ T
and f T is an automorphism of T .
Proof. For all a ∈ T , f θ(a) = f (−a) = −f (a). Since f θ = θf , it follows that
It is clear that f T is an
θf (a) = −f (a), which implies f (a) ∈ T by Theorem 3.1.
injective endomorphism of T . Note that
f (T ⊗ T ) = f ([T, T ]) = [f (T ), f (T )] = f (T ) ⊗ f (T ) ⊆ T ⊗ T,
and f is surjective, so f T is surjective. Thus f T is an automorphism of T .
7
Note that U(T ) is a Z2-graded Leibniz algebra with U(T )¯0 = T ⊗ T and U(T )¯1 = T .
Then a subspace V of U(T ) is Z2-graded if and only if V = V ∩ T + V ∩ (T ⊗ T ). Suppose
that is, V = V ∩ T + V ∩ (T ⊗ T ). Conversely, if V is a subspace of U(T ) such that
that V is a θ-invariant subspace of U(T ). Then for a +P b ⊗ c ∈ V , θ (a +P b ⊗ c) =
−a +P b ⊗ c ∈ V . Since chK = 0, it follows a ∈ V ∩ T and P b ⊗ c ∈ V ∩ (T ⊗ T ),
V = V ∩ T + V ∩ (T ⊗ T ), then a +P b ⊗ c ∈ V implies that a ∈ V and P b ⊗ c ∈ V , so
θ (a +P b ⊗ c) = −a +P b ⊗ c ∈ V and V is a θ-invariant subspace of U(T ).
Therefore, V being a θ-invariant subspace of U(T ) is equivalent to that V is a Z2-
graded subspace of U(T ).
Theorem 3.4. Let V be a θ-invariant subspace of U(T ). If V is an ideal of U(T ), then
V ∩ T is an ideal of T and V ∩ (T ⊗ T ) is an ideal of T ⊗ T such that
i(V ∩ T ) ⊆ V ∩ (T ⊗ T ) ⊆ j(V ∩ T ),
I(V ∩ T ) ⊆ V ⊆ J (V ∩ T ).
Proof. Denote I = V ∩ T and M = V ∩ (T ⊗ T ). Then V = I + M. Using the
condition that V is an ideal of U(T ), one has
[V, U(T )] = [I + M, T + T ⊗ T ] = I ⊗ T + [M, T ] + [I, [T, T ]] + [M, T ⊗ T ] ⊆ I + M,
[U(T ), V ] = [T + T ⊗ T, I + M] = T ⊗ I + [[T, T ], I] + [T, M] + [T ⊗ T, M] ⊆ I + M.
It follows that
I ⊗ T + T ⊗ I + [M, T ⊗ T ] + [T ⊗ T, M] ⊆ M,
[M, T ] + [I, [T, T ]] + [[T, T ], I] + [T, M] ⊆ I.
Then i(I) ⊆ M ⊆ j(I) and M is an ideal of T ⊗ T . Note that
{T T I} = [[T, T ], I] ⊆ I,
{T IT } = [[T, I], T ] = [T ⊗ I, T ] ⊆ [M, T ] ⊆ I,
{IT T } = [[I, T ], T ] = [I ⊗ T, T ] ⊆ [M, T ] ⊆ I.
Thus I is an ideal of T and I(I) ⊆ I + M ⊆ J (I).
4 The solvability of a Leibniz triple system
Given an arbitrary Leibniz algebra L, the derived sequence of an ideal I of L is defined
as
Suppose that I is an ideal of a LeibTS T . Let I [0] = I and for n ≥ 1,
I (0) = I, I (n+1) = [I (n), I (n)],
∀n ≥ 1.
I [n+1] = {T I [n]I [n]} + {I [n]T I [n]} + {I [n]I [n]T }.
8
Proposition 4.1. If I is an ideal of a LeibTS T , then I [n] is also an ideal of T and
I ⊇ I [1] ⊇ · · · ⊇ I [n] ⊇ · · · , ∀n ∈ N.
Proof. First we show {I [1]T T } ⊆ I [1]. By (2.2) and (2.3), it follows that
{{T II}T T } ⊆ {T I{IT T }}+{{T IT }IT }+{{T IT }T I} ⊆ {T II}+{IIT }+{IT I} ⊆ I [1],
{{IT I}T T } ⊆ {IT {IT T }} + {{IT T }IT } + {{IT T }T I} ⊆ {IT I} + {IIT } ⊆ I [1],
{{IIT }T T } ⊆ {{IT I}T T } + {{IT T }IT } + {I{IT T }T } ⊆ I [1] + {IIT } = I [1],
which imply {I [1]T T } ⊆ I [1]. Similarly, one can prove {T I [1]T } ⊆ I [1] and {T T I [1]} ⊆ I [1].
So I [1] is an ideal of T . Suppose that I [k] is an ideal of T . Then I [k+1] = (I [k])[1] is an ideal
of T . Hence I [n] is an ideal of T for all n ∈ N. It is clear that I ⊇ I [1] ⊇ · · · ⊇ I [n] ⊇ · · · ,
∀n ∈ N.
Definition 4.2. An ideal I of a LeibTS T is called solvable, if there is a positive integer
k such that I [k] = 0.
Theorem 4.3. Let I be an ideal of a LeibTS T . Then the following statements are
equivalent.
(1) I is a solvable ideal of T .
(2) I(I) is a solvable ideal of U(T ).
(3) J (I) is a solvable ideal of U(T ).
Proof.
(1)⇒(2). We will use the induction to show
I(I)(2n) ⊆ I [n] + I [n] ⊗ T.
Consider the base step n = 1. We obtain
I(I)(1) = [I(I), I(I)] = [I + i(I), I + i(I)] = I ⊗ I + [i(I), I] + [I, i(I)] + [i(I), i(I)].
Note that
[i(I), I] = {IT I} + {T II} ⊆ I [1],
[i(I), i(I)] = [I ⊗ T + T ⊗ I, I ⊗ T + T ⊗ I]
[I, i(I)] ⊆ {IIT } + {IT I} ⊆ I [1],
⊆{IT I} ⊗ T + {IT T } ⊗ I + {T II} ⊗ T + {T IT } ⊗ I ⊆ I [1] ⊗ T + I ⊗ I.
Hence I(I)(1) ⊆ I [1] + I [1] ⊗ T + I ⊗ I. So
I(I)(2) = [I(I)(1), I(I)(1)] ⊆ [I [1] + I [1] ⊗ T + I ⊗ I, I [1] + I [1] ⊗ T + I ⊗ I]
⊆I [1] ⊗ I [1] + {I [1]T I [1]} + {III [1]} + {I [1]I [1]T } + {I [1]T I [1]} ⊗ T + {I [1]T T } ⊗ I [1]
+ {III [1]} ⊗ T + {IIT } ⊗ I [1] + {I [1]II} + {I [1]T I} ⊗ I + {III} ⊗ I
9
⊆I [1] + I [1] ⊗ T.
Suppose I(I)(2k) ⊆ I [k] + I [k] ⊗ T . Then
I(I)(2k+1) =[I(I)(2k), I(I)(2k)] ⊆ [I [k] + I [k] ⊗ T, I [k] + I [k] ⊗ T ]
⊆I [k] ⊗ I [k] + {I [k]T I [k]} + {I [k]I [k]T } + {I [k]T I [k]} ⊗ T + {I [k]T T } ⊗ I [k]
⊆I [k+1] + I [k] ⊗ I [k] + I [k+1] ⊗ T.
Hence
I(I)(2k+2) = [I(I)(2k+1), I(I)(2k+1)]
⊆[I [k+1] + I [k] ⊗ I [k] + I [k+1] ⊗ T, I [k+1] + I [k] ⊗ I [k] + I [k+1] ⊗ T ]
⊆I [k+1] ⊗ I [k+1] + {I [k]I [k]I [k+1]} + {I [k+1]T I [k+1]} + {I [k+1]I [k]I [k]} +{I [k]I [k]I [k]} ⊗ I [k]
+ {I [k+1]T I [k]} ⊗ I [k] + {I [k+1]I [k+1]T } +{I [k]I [k]I [k+1]} ⊗ T
+{I [k]I [k]T } ⊗ I [k+1] +{I [k+1]T I [k+1]} ⊗ T +{I [k+1]T T } ⊗ I [k+1]
⊆I [k+1] + I [k+1] ⊗ T.
Thus I(I)(2n) ⊆ I [n] + I [n] ⊗ T by induction, which implies that I(I) is solvable.
(2)⇒(1). It is sufficient to prove I [n] ⊆ I(I)(n) for all n ∈ N. In fact,
I [1] ={T II} + {IT I} + {IIT } = [[T, I], I] + [[I, T ], I] + [[I, I], T ]
⊆[[T, I], I] + [[I, T ], I] + [I, [I, T ]] ⊆ [i(I), I] + [I, i(I)] ⊆ [I(I), I(I)] = I(I)(1).
Suppose I [k] ⊆ I(I)(k). Then
I [k+1] ={T I [k]I [k]} + {I [k]T I [k]} + {I [k]I [k]T }
⊆[[T, I [k]], I [k]] + [[I [k], T ], I [k]] + [I [k], [I [k], T ]]
⊆[[T, I(I)(k)], I(I)(k)] + [[I(I)(k), T ], I(I)(k)] + [I(I)(k), [I(I)(k), T ]]
⊆[I(I)(k), I(I)(k)] = I(I)(k+1).
Hence I [n] ⊆ I(I)(n) follows from the induction. So (1)⇔(2).
(3)⇒(2). It is clear since I(I) ⊆ J (I).
(2)⇒(3). Note that
[J (I), U(T )] = [I + j(I), T + T ⊗ T ]
⊆I ⊗ T + [j(I), T ] + {IT T } + [j(I), T ] ⊗ T
⊆I ⊗ T + I ⊆ I(I).
Then J (I)(1) = [J (I), J (I)] ⊆ [J (I), U(T )] ⊆ I(I). Suppose J (I)(k) ⊆ I(I)(k−1). Then
J (I)(k+1) = [J (I)(k), J (I)(k)] ⊆ [I(I)(k−1), I(I)(k−1)] = I(I)(k).
It follows that J (I)(n+1) ⊆ I(I)(n) by induction and so the solvability of I(I) implies the
solvability of J (I). Thus (2)⇔(3).
Therefore, the above three items are equivalent and the proof is completed.
10
Corollary 4.4. Let V = I + M be a θ-invariant ideal of U(T ). Then I is a solvable ideal
of T if and only if V is a solvable ideal of U(T ). In particular, T is a solvable LeibTS if
and only if U(T ) is a solvable Leibniz algebra.
Proposition 4.5. Suppose that I and J are solvable ideals of a LeibTS T . Then I + J
is a solvable ideal of T .
Proof.
It is clear that I + J is an ideal of T . Now we use the induction to prove
(I + J)[n] ⊆ I [n] + J [n] + I ∩ J. The base step n = 1 is true, for
(I + J)[1] = {T, I + J, I + J} + {I + J, T, I + J} + {I + J, I + J, T } ⊆ I [1] + J [1] + I ∩ J.
Suppose (I + J)[k] ⊆ I [k] + J [k] + I ∩ J. Then
(I + J)[k+1] = {T (I + J)[k](I + J)[k]} + {(I + J)[k]T (I + J)[k]} + {(I + J)[k](I + J)[k]T }
⊆{T, I [k] + J [k] + I ∩ J, I [k] + J [k] + I ∩ J} + {I [k] + J [k] + I ∩ J, T, I [k] + J [k] + I ∩ J}
+ {I [k] + J [k] + I ∩ J, I [k] + J [k] + I ∩ J, T }
⊆I [k+1] + J [k+1] + I ∩ J.
So there is n1 ∈ N such that (I + J)[n1] ⊆ I ∩ J. Note that I ∩ J is a solvable ideal of T ,
which implies I + J is solvable.
Definition 4.6. Let R(T ) denote the sum of all solvable ideals in T . Then R(T ) is the
unique maximal solvable ideal by Proposition 4.5, called the solvable radical of T .
For a Leibniz algebra L, there is a corresponding Lie algebra L/Ker(L), where Ker(L)
is a two-side ideal of L spanned by {[x, x] x ∈ L}. Similarly, for a LeibTS T , we define
Ker(T ) to be the subspace of T spanned by all elements in T of the form {abc} − {acb} +
{bca}, for all a, b, c ∈ T .
Theorem 4.7. Let T be a LeibTS and U(T ) be its universal Leibniz envelope. Then
(1) Ker(T ) is an ideal of T satisfying {T T Ker(T )} = {T Ker(T )T } = 0.
(2) T /Ker(T ) is a Lie triple system. Moreover, T is a Lie triple system if and only if
Ker(T ) = 0.
(3) Ker(T ) ⊆ R(T ).
(4) Ker(U(T )) ∩ T = Ker(T ).
(5) I(Ker(T )) ⊆ Ker(U(T )) ⊆ J (Ker(T )).
Proof.
(1) For {abc} − {acb} + {bca} ∈ Ker(T ) and d, e ∈ T , by (2.4) and (2.5), we
have
{d, e, {abc} − {acb} + {bca}} = {d, e, {abc} + {cab} + {bca}} = 0,
11
{d, {abc} − {acb} + {bca}, e} = {d, {abc} + {cab} + {bca}, e} = 0,
which imply {T T Ker(T )} = {T Ker(T )T } = 0. Using (2.2) and (2.3), we have
{{abc} − {acb}, d, e} ={{abc}de} − {{acb}de} = {a{bcd}e} + {{adb}ce} − {{adc}be}
={a{bcd}e} + {ad{bce}} + {{ade}bc} − {{ade}cb},
and
Note that
and
{{bca}de} ={bc{ade}} + {{bcd}ae} + {{bce}ad} − {{bce}da}.
{{ade}bc} − {{ade}cb} + {bc{ade}} ∈ Ker(T ),
{{bce}ad} − {{bce}da} + {ad{bce}} ∈ Ker(T ),
{a{bcd}e} + {{bcd}ae}
=({a{bcd}e} − {ae{bcd}} + {{bcd}ea}) + ({{bcd}ae} − {{bcd}ea} + {ae{bcd}})
∈Ker(T ).
Therefore, {{abc} − {acb} + {bca}, d, e} ∈ Ker(T ) and Ker(T ) is an ideal of T .
(2) Since Ker(T ) is an ideal of T , T /Ker(T ) is also a LeibTS with the product
[¯a¯b¯c] = {abc}. [¯a¯a¯b] = ¯0 comes from {aab} = {aab} − {aba} + {aba} ∈ Ker(T ), and then
[¯a¯b¯c] + [¯b¯c¯a] + [¯c¯a¯b] = [¯a¯b¯c] + [¯b¯c¯a] − [¯a¯c¯b] = {abc} − {acb} + {bca} = ¯0.
Moreover,
[¯a¯b[¯c ¯d¯e]] ={ab{cde}} = {{abc}de} − {{abd}ce} − {{abe}cd} + {{abe}dc}
={{abc}de} + {c{abd}e} + {cd{abe}} = [[¯a¯b¯c] ¯d¯e] + [¯c[¯a¯b ¯d]¯e] + [¯c ¯d[¯a¯b¯e]].
Hence T /Ker(T ) is a Lie triple system. It is clear T is a Lie triple system if and only if
Ker(T ) = 0.
(3) Since
Ker(T )[1] = {T Ker(T )Ker(T )} + {Ker(T )T Ker(T )} + {Ker(T )Ker(T )T } = 0,
Ker(T ) is a solvable ideal of T and so Ker(T ) ⊆ R(T ).
(4) Ker(T ) ⊆ Ker(U(T )) ∩T follows from {abc} −{acb} + {bca} = [a, b⊗c] + [b⊗c, a]
= [a + b ⊗ c, a + b ⊗ c] − [a, a] − [b ⊗ c, b ⊗ c] ∈ Ker(U(T )).
Conversely, for all x = [a +P bi ⊗ ci, a +P bi ⊗ ci] ∈ Ker(U(T )), suppose x = d + m
with d ∈ T, m ∈ T ⊗ T . Then d = P({bicia} + {abici} − {acibi}) ∈ Ker(T ), that is,
Ker(U(T )) ∩ T ⊆ Ker(T ).
(5) Note that Ker(U(T )) is an ideal of U(T ) and Ker(U(T )) ∩ T = Ker(T ).
It
follows from Theorem 3.4 that I(Ker(T )) ⊆ Ker(U(T )) ⊆ J (Ker(T )).
12
Let L be a Leibniz algebra and Rad(L) the solvable radical of L. L is called semisim-
ple if Rad(L) = Ker(L). Likewise, we introduce the definition of a semisimple LeibTS.
Definition 4.8. A LeibTS T is said to be semisimple, if R(T ) = Ker(T ).
Proposition 4.9. Let T be a LeibTS. Then the following statements hold.
(1) T /R(T ) is a semisimple Lie triple system.
(2) Let I be an ideal of T . If T /I is a semisimple LeibTS, then R(T ) ⊆ Ker(T ) + I.
(3) If I is an ideal of T and T /I is a semisimple Lie triple system, then R(T ) ⊆ I.
Proof.
(1) T /R(T ) is clearly a Lie triple system since Ker(T ) ⊆ R(T ). If I/R(T )
is a solvable ideal of T /R(T ), then I [k]/R(T ) = (I/R(T ))[k] = ¯0, for some k ∈ N. Then
I [k] ⊆ R(T ), it follows that I is a solvable ideal of T , so I = R(T ). Hence the only solvable
ideal of T /R(T ) is ¯0 and T /R(T ) is semisimple.
(2) Since T /I is semisimple, R(T /I) = Ker(T /I). Note that R(T ) + I/I is solvable
in T /I and Ker(T /I) = Ker(T ) + I/I. Then
R(T ) + I/I ⊆ R(T /I) = Ker(T /I) = Ker(T ) + I/I,
which implies R(T ) ⊆ Ker(T ) + I.
(3) If T /I is a Lie triple system, then Ker(T /I) = 0, so Ker(T ) ⊆ I, and hence
R(T ) ⊆ I by using (2).
Theorem 4.10. R(T ) = Rad(U(T )) ∩T and Rad(U(T )) = I(R(T )) + K(T ) = J (R(T )).
Proof. Suppose that θ is the involutive automorphism of U(T ) determining T .
its homomorphic image θ(Rad(U(T ))) is solvable, then
Since Rad(U(T )) is solvable,
θ(Rad(U(T ))) ⊆ Rad(U(T )) and Rad(U(T )) is θ-invariant. So
Rad(U(T )) = Rad(U(T )) ∩ T + Rad(U(T )) ∩ (T ⊗ T ),
I(Rad(U(T )) ∩ T ) ⊆ Rad(U(T )) ⊆ J (Rad(U(T )) ∩ T ).
Then I(Rad(U(T ))∩T ) is solvable. By Theorem 4.3, Rad(U(T ))∩T and J (Rad(U(T ))∩
T ) is solvable, so J (Rad(U(T )) ∩ T ) = Rad(U(T )).
Since Rad(U(T ))∩T is solvable, Rad(U(T ))∩T ⊆ R(T ), which implies Rad(U(T )) =
J (Rad(U(T )) ∩ T ) ⊆ J (R(T )). But J (R(T )) is solvable by the solvability of R(T ),
then J (R(T )) ⊆ Rad(U(T )), hence J (R(T )) = Rad(U(T )) = J (Rad(U(T )) ∩ T ). So
R(T ) = Rad(U(T )) ∩ T and Rad(U(T )) = J (R(T )).
Consider the factor Leibniz algebra U(T ) = U(T )/I(R(T )). Since U(T ) = T + T ⊗ T
= T + T ⊗ T = U(T ) and T = T + I(R(T ))/I(R(T )) ∼= T /(T ∩ I(R(T ))) = T /R(T ), it
follows that T is a semisimple Lie triple system, so R(T ) = 0. Hence
Rad(U(T )) ⊆ Rad(U(T )) = Rad(U(T )) = J (R(T )) = J (0) = J (0) = K(T ),
13
which implies Rad(U(T )) ⊆ K(T ) + I(R(T )). On the other hand, note that K(T ) =
J (0) ⊆ J (R(T )) and I(R(T )) ⊆ J (R(T )), so Rad(U(T )) = I(R(T ))+ K(T ) = J (R(T )).
Theorem 4.11. If U(T ) is a semisimple Leibniz algebra, then T is a semisimple LeibTS;
if T is a semisimple LeibTS with K(T ) = 0, then U(T ) is a semisimple Leibniz algebra.
Proof.
If U(T ) is semisimple, then Rad(U(T )) = Ker(U(T )), so
R(T ) = Rad(U(T )) ∩ T = Ker(U(T )) ∩ T = Ker(T ),
that is, T is semisimple.
If T is semisimple, then R(T ) = Ker(T ), which implies Rad(U(T )) = I(Ker(T )) =
J (Ker(T )) = Ker(U(T )). Hence U(T ) is semisimple.
5 Levi's theorem for Leibniz triple systems
Definition 5.1. [11] A vector space V is called a module for a Lie triple system T if the
vector space direct sum T ∔ V is itself a Lie triple system such that (1) T is a subsystem,
(2) [abc] lies in V if any one of a, b, c is in V , (3) [abc] = 0 if any two of a, b, c are in V .
Definition 5.2. [18] Let T be a Lie triple system and V a vector space. V is called a
T -module if there exists a bilinear map δ : T ×T → End(V ) such that for all a, b, c, d ∈ T ,
δ(c, d)δ(a, b) − δ(b, d)δ(a, c) − δ(a, [bcd]) + D(b, c)δ(a, d) = 0,
δ(c, d)D(a, b) − D(a, b)δ(c, d) + δ([abc], d) + δ(c, [abd]) = 0,
where D(a, b) = δ(b, a) − δ(a, b).
It is not difficult to prove that the above two definitions about the module for Lie
triple systems are equivalent.
Theorem 5.3. [11] If T is a finite-dimensional semisimple Lie triple system over a field
of characteristic 0, then every finite-dimensional module V is completely reducible.
Theorem 5.4 (Levi's theorem for Lie triple systems). [13] If T is a Lie triple system,
then there is a semisimple subsystem S such that T = R(T )∔S, where R(T ) is the solvable
radical of T .
Theorem 5.5 (Levi's theorem for Leibniz triple systems). Let T be a LeibTS and R(T )
its solvable radical. Then there is a semisimple subsystem S of T such that T = S ∔R(T ).
In particular, S is a semisimple Lie triple system.
14
Proof. By Theorem 4.7, T = T /Ker(T ) is a Lie triple system. Then there are a
semisimple subsystem S and the solvable radical R of T such that T = S ∔ R from Levi's
theorem for Lie triple systems. Let π : T → T be the canonical projection. Then π(R(T ))
is solvable since R(T ) is solvable, hence π(R(T )) ⊆ R.
Conversely, denote by π−1(cid:0)R(cid:1) the inverse image of R. Then π−1(cid:0)R(cid:1) is a subsystem
of T . Since Kerπ = Ker(T ), π−1(cid:0)R(cid:1) /Ker(T ) ∼= R. Note that Ker(T ) and R are
both solvable, which implies that π−1(cid:0)R(cid:1) is solvable, then π−1(cid:0)R(cid:1) ⊆ R(T ), and so
R ⊆ π(R(T )). Thus π(R(T )) = R and R(T ) = π−1(cid:0)R(cid:1).
Denote by F = π−1(cid:0)S(cid:1) the inverse image of S. Then F is a subsystem of T and
S = F/Ker(T ). Since T = T /Ker(T ) and R = R(T )/Ker(T ), it follows that
T /Ker(T ) = F/Ker(T ) ∔ R(T )/Ker(T ).
If a ∈ F ∩ R(T ), then ¯a ∈ (F/Ker(T )) ∩ (R(T )/Ker(T )) = 0, which implies a ∈ Ker(T ),
hence F ∩ R(T ) = Ker(T ). So
T = F + R(T ), F ∩ R(T ) = Ker(T ).
Define a bilinear map δ : S × S → End(F ) by δ( ¯s1, ¯s2)(a) = {as1s2}. Then {as1s2} ∈
2, then
If ¯s1 = ¯s′
F since S = F/Ker(T ) and F is a subsystem of T .
s1 − s′
1 and ¯s2 = ¯s′
2 ∈ Ker(T ), it follows from {T T Ker(T )} = {T Ker(T )T } = 0 that
1, s2 − s′
{as1s2} − {as′
1s′
2} ={as1s2} − {as′
1s2} + {as′
={a(s1 − s′
1)s2} + {as′
1(s2 − s′
1s2} − {as′
1s′
2)} = 0.
2}
Hence δ is well defined. Let D( ¯s1, ¯s2)(a) = δ( ¯s2, ¯s1)(a) − δ( ¯s1, ¯s2)(a) = {as2s1} − {as1s2}.
Then by (2.3) and (2.6),
δ( ¯s3, ¯s4)δ( ¯s1, ¯s2)(a) − δ( ¯s2, ¯s4)δ( ¯s1, ¯s3)(a) − δ( ¯s1, {s2s3s4})(a) + D( ¯s2, ¯s3)δ( ¯s1, ¯s4)(a)
={{as1s2}s3s4} − {{as1s3}s2s4} − {as1{s2s3s4}} + {{as1s4}s3s2} − {{as1s4}s2s3}
=0,
δ( ¯s3, ¯s4)D( ¯s1, ¯s2)(a) − D( ¯s1, ¯s2)δ( ¯s3, ¯s4)(a) + δ({s1s2s3}, s4)(a) + δ( ¯s3, {s1s2s4})(a)
={{as2s1}s3s4} − {{as1s2}s3s4} − {{as3s4}s2s1} + {{as3s4}s1s2}
+ {a{s1s2s3}s4} + {as3{s1s2s4}}
=0.
Thus F is an S-module. By Theorem 5.3, F is a completely reducible S-module since S
is a semisimple Lie triple system. Note that Ker(T ) is an ideal of F . Then Ker(T ) is
a submodule of F . Hence by the completely reducibility of F , there is a complementary
submodule S of F such that F = S ∔Ker(T ). Let σ : F → S be the canonical projection.
Then Kerσ = Ker(T ) and S ∼= F/Ker(T ) is a semisimple Lie triple system such that
T = F + R(T ) = S + Ker(T ) + R(T ) = S + R(T ).
15
Similarly, R(T ) is an S-module and there is a complementary submodule R′ of R(T )
such that R(T ) = R′ ∔ Ker(T ). If a ∈ S ∩ R(T ), then a = a′ + t, for some a′ ∈ R′
and t ∈ Ker(T ). Then a′ ∈ S ⊆ F , which implies a′ ∈ R(T ) ∩ F = Ker(T ). Moreover,
a′ ∈ R′ ∩ Ker(T ) = 0. Hence a = t ∈ Ker(T ) ∩ S = 0, i.e., R(T ) ∩ S = 0. Therefore,
T = S ∔ R(T ) with S both a Lie triple system and a semisimple subsystem of T .
6 The nilpotency of Leibniz triple systems
For a Leibniz algebra L, the sequence of ideals
L ⊇ L1 ⊇ L2 ⊇ · · · where Ln+1 = [LnL]
is called the central lower sequence of L.
Given an arbitrary LeibTS T , the central lower sequence of an ideal I of T is defined
as I 0 = I and for n ≥ 1,
I n+1 = {I nIT } + {I nT I} + {II nT } + {IT I n} + {T II n} + {T I nI}.
In particular, T 0 = T and T n+1 = {T nT T } + {T T nT } + {T T T n}.
In [3], the authors defined another sequence for a Leibniz algebra L as L<0> = L and
L<n+1> = [L<0>L<n>] + [L<1>L<n−1>] + · · · + [L<n−1>L<1>] + [L<n>L<0>].
It is proved that L<n> = Ln for all n ∈ N. Similarly, we could simplify the notation of
T n.
Proposition 6.1. For a LeibTS T , we define another sequence:
T (0) = T, T (n+1) = {T (n)T T }.
Then T (n) = T n, for all n ∈ N.
Proof. The proof is by induction on n. The base step n = 0 is true, for T (0) = T 0 =
T . Suppose T (k) = T k, ∀k ≤ n. Note that
T n+1 = {T nT T } + {T T nT } + {T T T n} = {T (n)T T } + {T T (n)T } + {T T T (n)}.
So it is sufficient to prove
{T T (n)T } + {T T T (n)} ⊆ {T (n)T T } = T (n+1).
In fact, the relation {T (i)T (j)T } + {T (i)T T (j)} ⊆ T (i+j+1) holds, for all i, j ∈ N. We
prove it by induction on j for each i. If j = 0, then
{T (i)T (0)T } + {T (i)T T (0)} = {T (i)T T } = {T (i+1)T T }, ∀i ∈ N.
16
Suppose {T (i)T (j)T } + {T (i)T T (j)} ⊆ T (i+j+1), ∀i ∈ N. Then
{T (i)T (j+1)T } + {T (i)T T (j+1)}
={T (i){T (j)T T }T } + {T (i)T {T (j)T T }}
⊆{{T (i)T (j)T }T T } + {{T (i)T T (j)}T T } + {{T (i)T T }T (j)T }
+ {{T (i)T T (j)}T T } + {{T (i)T T }T (j)T } + {{T (i)T T }T T (j)}
⊆{T (i+j+1)T T } + {T (i+1)T (j)T } + {T (i+1)T T (j)}
=T (i+j+2).
Fix i = 0, and it follows {T T (n)T } + {T T T (n)} ⊆ T (n+1), which completes the proof.
Hence the notions of T n and T (n) coincide.
Definition 6.2. An ideal I of a LeibTS T is called nilpotent, if there exists n ∈ N such
that I n = 0.
Proposition 6.3. If I is an ideal of a LeibTS T , then I n is also an ideal of T and
I n+1 ⊆ I n, ∀n ∈ N.
Proof. We proceed by induction. It is clear when n = 0. Suppose that I k is an ideal
of T . Then
{I k+1T T } = {{I kT I} + {I kIT } + {IT I k} + {II kT } + {T I kI} + {T II k}, T, T }.
By (2.2) and (2.3), it follows that
{{I kT I}T T } ⊆ {I kT {IT T }} + {{I kT T }IT } + {{I kT T }T I} ⊆ I k+1,
{{I kIT }T T } ⊆ {I k{IT T }T } + {{I kT I}T T } + {{I kT T }IT } ⊆ I k+1,
{{IT I k}T T } ⊆ {IT {I kT T }} + {{IT T }I kT } + {{IT T }T I k} ⊆ I k+1,
{{II kT }T T } ⊆ {I{I kT T }T } + {{IT I k}T T } + {{IT T }I kT } ⊆ I k+1,
{{T I kI}T T } ⊆ {T I k{IT T }} + {{T I kT }IT } + {{T I kT }T I} ⊆ I k+1,
{{T II k}T T } ⊆ {T I{I kT T }} + {{T IT }I kT } + {{T IT }T I k} ⊆ I k+1,
which imply {I k+1T T } ⊆ I k+1. Similarly, one can prove
{T I k+1T } ⊆ I k+1
and {T T I k+1} ⊆ I k+1.
So I k+1 is an ideal of T . Hence I n is an ideal of T and I n+1 ⊆ I n, ∀n ∈ N.
Proposition 6.4. If V is an ideal of U(T ), then V ∩ T is an ideal of T such that
(V ∩ T )n ⊆ V n ∩ T for all n ∈ N.
17
Proof. Since V is an ideal of a Leibniz algebra U(T ), V 0 = V and V n = [V n−1, V ].
Note that V is an ideal of U(T ) if and only if [V, U(T )] + [U(T ), V ] ⊆ V . Then
{(V ∩ T )T T } = [[V ∩ T, T ], T ] ⊆ [[V, U(T )], U(T )] ⊆ V,
{T (V ∩ T )T } = [[T, V ∩ T ], T ] ⊆ [[U(T ), V ], U(T )] ⊆ V,
{T T (V ∩ T )} = [[T, T ], V ∩ T ] ⊆ [U(T ), V ] ⊆ V,
{(V ∩ T )T T } + {T (V ∩ T )T } + {T T (V ∩ T )} ⊆ {T T T } ⊆ T.
That is,
{(V ∩ T )T T } + {T (V ∩ T )T } + {T T (V ∩ T )} ⊆ V ∩ T.
So V ∩ T is an ideal of T .
Now we use the induction to prove (V ∩ T )n ⊆ V n ∩ T for all n ∈ N. The base step
n = 0 is clearly true. Suppose (V ∩ T )k ⊆ V k ∩ T . Then
(V ∩ T )k+1
={(V ∩ T )k(V ∩ T )T } + {(V ∩ T )kT (V ∩ T )} + {(V ∩ T )(V ∩ T )kT }
+ {(V ∩ T )T (V ∩ T )k} + {T (V ∩ T )(V ∩ T )k} + {T (V ∩ T )k(V ∩ T )}
⊆{(V k ∩ T )(V ∩ T )T } + {(V k ∩ T )T (V ∩ T )} + {(V ∩ T )(V k ∩ T )T }
+ {(V ∩ T )T (V k ∩ T )} + {T (V ∩ T )(V k ∩ T )} + {T (V k ∩ T )(V ∩ T )}
⊆[[V k, V ], T ] + [[V k, T ], V ] + [[V, V k], T ] + [[V, T ], V k] + [[T, V ], V k] + [[T, V k], V ]
⊆[[V k, T ], V ] + [V k, [V, T ]] + [[V, T ], V k] + [V, [V k, T ]] + [V, V k] + [V k, V ]
⊆[V k, V ] + [V, V k] = V k+1.
Then (V ∩ T )k+1 ⊆ V k+1 ∩ T . Therefore, (V ∩ T )n ⊆ V n ∩ T for all n ∈ N.
Lemma 6.5. Let I be an ideal of a LeibTS T . Then
(1) I n ⊆ I(I)n, for all n ∈ N.
(2) I(I)2n−1 ⊆ I n + I n−1 ⊗ I + I n ⊗ T and I(I)2n ⊆ I n + I n ⊗ T , ∀n ≥ 1.
Proof.
(1) It follows from Proposition 6.4.
(2) We still use the induction. It is straightforward that
I(I)1 =[I(I), I(I)] = [I + I ⊗ T + T ⊗ I, I + I ⊗ T + T ⊗ I]
⊆I ⊗I +{IIT }+{IT I}+{IT I}⊗T +{IT T }⊗I +{T II}+{T II}⊗T +{T IT }⊗I
⊆I 1 + I ⊗ I + I 1 ⊗ T
and
I(I)2 =[I(I)1, I(I)] ⊆ [I 1 + I ⊗ I + I 1 ⊗ T, I + I ⊗ T + T ⊗ I]
⊆I 1⊗I +{I 1IT }+{I 1T I}+{III}+{III}⊗T +{IIT }⊗I +{I 1T I}⊗T +{I 1T T }⊗I
18
⊆I 1 + I 1 ⊗ T.
Suppose I(I)2k−1 ⊆ I k + I k−1 ⊗ I + I k ⊗ T and I(I)2k ⊆ I k + I k ⊗ T . Then
I(I)2k+1 =[I(I)2k, I(I)] ⊆ [I k + I k ⊗ T, I + I ⊗ T + T ⊗ I]
⊆I k ⊗I +{I kIT }+{I kT I}+{I kT I}⊗T +{I kT T }⊗I
⊆I k+1 + I k ⊗ I + I k+1 ⊗ T
and
I(I)2k+2 =[I(I)2k+1, I(I)] ⊆ [I k+1 + I k ⊗ I + I k+1 ⊗ T, I + I ⊗ T + T ⊗ I]
⊆I k+1 ⊗ I + {I k+1IT } + {I k+1T I} + {I kII} + {I kII} ⊗ T + {I kIT } ⊗ I
+ {I k+1T I} ⊗ T + {I k+1T T } ⊗ I
⊆I k+1 + I k+1 ⊗ T.
The proof is completed.
Lemma 6.6. Let I and J be two ideals of a LeibTS T . Then
(I + J)n ⊆ I n + J n +
n−1
Xk=0
I k ∩ J n−1−k,
∀n ≥ 1.
Proof.
If n = 1, then
(I + J)1 = {(I + J)(I + J)T } + {(I + J)T (I + J)} + {T (I + J)(I + J)} ⊆ I 1 + J 1 + I ∩ J.
Suppose (I + J)m ⊆ I m + J m +Pm−1
k=0 I k ∩ J m−1−k. Then
(I + J)m+1 ={(I + J)m(I + J)T } + {(I + J)mT (I + J)} + {(I + J)(I + J)mT }
+ {(I + J)T (I + J)m} + {T (I + J)(I + J)m} + {T (I + J)m(I + J)}
Note that
m−1
{(I + J)m(I + J)T } ⊆ {I m + J m +
I k ∩ J m−1−k, I + J, T }
m−1
Xk=0
Xk=0
I k+1 ∩ J m−1−k +
I k ∩ J m−k
m−1
Xk=0
⊆I m+1 + I m ∩ J + I ∩ J m + J m+1 +
=I m+1 + J m+1 +
I k ∩ J m−k.
m
Xk=0
One can prove that other five items belong to I m+1 + J m+1 +Pm
same way. Hence the lemma follows from the induction.
k=0 I k ∩ J m−k in the
19
By Lemmas 6.5 and 6.6, it is clear that the following theorem holds.
Theorem 6.7. Let T be a LeibTS. Then
(1) I is a nilpotent ideal of T if and only if I(I) is a nilpotent ideal of U(T ). In
particular, T is a nilpotent LeibTS if and only if U(T ) is a nilpotent Leibniz algebra.
(2) If I and J are nilpotent ideals of T , then I + J is a nilpotent ideal of T .
Definition 6.8. Let N(T ) denote the sum of all nilpotent ideals in T . Then N(T ) is the
unique maximal nilpotent ideal by Theorem 6.7, called the nilpotent radical of T .
Theorem 6.9. Suppose Nil(U(T )) is the nilpotent radical of U(T ). Then N(T ) =
Nil(U(T )) ∩ T .
Proof. Since Nil(U(T )) is a nilpotent ideal of U(T ), Nil(U(T )) ∩ T is a nilpotent
ideal of T by Proposition 6.4. If I is a nilpotent ideal of T , then I(I) a nilpotent ideal
of U(T ) by Theorem 6.7, hence I(I) ⊆ Nil(U(T )). So I = I(I) ∩ T ⊆ Nil(U(T )) ∩ T .
Therefore, Nil(U(T )) ∩ T is a maximal nilpotent ideal of T , that is, Nil(U(T )) ∩ T =
N(T ).
Lemma 6.10. [3] If L is a solvable Leibniz algebra, then [L, L] is nilpotent.
Proposition 6.11. Suppose T is a LeibTS. If T is nilpotent, then T is solvable; if T is
solvable, then T 1 = {T T T } is nilpotent.
Proof.
It is clear that T [n] ⊆ T n. So the nilpotency of T implies the solvability of
T . Conversely, if T is solvable, then U(T ) is solvable by Corollary 4.4, so [U(T ), U(T )] is
nilpotent, hence [U(T ), U(T )] ⊆ Nil(U(T )). Note that
T 1 = {T T T } = [[T, T ], T ] ⊆ [U(T ), U(T )] ⊆ Nil(U(T )).
Then T 1 ⊆ Nil(U(T )) ∩ T = N(T ). So T 1 is nilpotent.
7 The representation of Leibniz triple systems
Definition 7.1. Let T be a LeibTS and V a vector space. V is called a T -module, if
T ∔ V is a LeibTS such that (1) T is a subsystem, (2) {abc} ∈ V if any one of a, b, c is
in V , (3) {abc} = 0 if any two of a, b, c are in V .
Definition 7.2. Let T be a LeibTS and V a vector space. Suppose l, m, r : T × T →
End(V ) are bilinear maps such that
l(a, {bcd}) = l({abc}, d) − l({acb}, d) − l({adb}, c) + l({adc}, b),
m(a, d)l(b, c) = m({abc}, d) − m({acb}, d) − r(c, d)m(a, b) + r(b, d)m(a, c),
m(a, d)m(b, c) = r(c, d)l(a, b) − r(c, d)m(a, b) − m({acb}, d) + r(b, d)l(a, c),
(7.7)
(7.8)
(7.9)
20
m(a, d)r(b, c) = r(c, d)m(a, b) − r(c, d)l(a, b) − r(b, d)l(a, c) + m({acb}, d),
r({abc}, d) = r(c, d)r(a, b) − r(c, d)r(b, a) − r(b, d)r(c, a) + r(a, d)r(c, b),
l(a, b)l(c, d) = l({abc}, d) − l({abd}, c) − r(c, d)l(a, b) + r(d, c)l(a, b),
l(a, b)m(c, d) = m({abc}, d) − r(c, d)l(a, b) − l({abd}, c) + m({abd}, c),
l(a, b)r(c, d) = r(c, d)l(a, b) − m({abc}, d) − m({abd}, c) + l({abd}, c),
m(a, {bcd}) = r(c, d)m(a, b) − r(b, d)m(a, c) − r(b, c)m(a, d) + r(c, b)m(a, d),
r(a, {bcd}) = r(c, d)r(a, b) − r(b, d)r(a, c) − r(b, c)r(a, d) + r(c, b)r(a, d).
(7.10)
(7.11)
(7.12)
(7.13)
(7.14)
(7.15)
(7.16)
Then (r, m, l) is called a representation of T on V .
Remark 7.3. If V is a T -module and define l(a, b)(v) = {abv}, m(a, b)(v) = {avb},
r(a, b)(v) = {vab}, then (r, m, l) is a representation of T . Conversely, if (r, m, l) is
a representation of T , then V is a T -module by setting {abv} = l(a, b)(v), {avb} =
m(a, b)(v) and {vab} = r(a, b)(v). So the notions of a T -module and a representation of
T are equivalent.
Proposition 7.4. Suppose that T is a LeibTS and (r, m, l) is a representation of T on
V .
(1) m(a, b)k+1 = (−1)km(a, b)r(a, b)k, ∀k ∈ N. So if r(a, b) is nilpotent, then m(a, b)
is nilpotent.
(2) Set R(a, b) = r(a, b) − r(b, a). Then l(a, b)k+1 = (−1)kl(a, b)R(a, b)k, ∀k ∈ N. So
if R(a, b) is nilpotent, then l(a, b) is nilpotent.
Proof.
(1) By (7.9) and (7.10), m(a, b)m(c, d) = −m(a, b)r(c, d). Then
m(a, b)k+1 = −m(a, b)kr(a, b) = · · · = (−1)km(a, b)r(a, b)k, ∀k ∈ N.
(2) By (7.14),
l(a, b)r(c, d) = r(c, d)l(a, b) − m({abc}, d) − m({abd}, c) + l({abd}, c),
l(a, b)r(d, c) = r(d, c)l(a, b) − m({abd}, c) − m({abc}, d) + l({abc}, d).
Then
l(a, b)R(c, d) = −l({abc}, d) + l({abd}, c) + r(c, d)l(a, b) − r(d, c)l(a, b) = −l(a, b)l(c, d),
where the last identity is by (7.12). Hence
l(a, b)k+1 = −l(a, b)kR(a, b) = · · · = (−1)kl(a, b)R(a, b)k, ∀k ∈ N.
The proof is completed.
Denote by l(T, T ) = {P l(a, b) a, b ∈ T }, m(T, T ) = {P m(a, b) a, b ∈ T },
r(T, T ) = {P r(a, b) a, b ∈ T } and R(T, T ) = {P R(a, b) a, b ∈ T }. Then l(T, T ),
21
m(T, T ), r(T, T ) and R(T, T ) are subspaces of End(V ). Note that for all a, b, c, d ∈ T , by
(7.11) and (7.16),
[R(a, b), R(c, d)] = R(a, b)R(c, d) − R(c, d)R(a, b)
=(r(a, b) − r(b, a))(r(c, d) − r(d, c)) − (r(c, d) − r(d, c))(r(a, b) − r(b, a))
=r(a, b)r(c, d) − r(b, a)r(c, d) − r(a, b)r(d, c) + r(b, a)r(d, c)
− r(c, d)r(a, b) + r(d, c)r(a, b) + r(c, d)r(b, a) − r(d, c)r(b, a)
=r(c, {dab}) + r(d, b)r(c, a) + r(d, a)r(c, b) − r(a, d)r(c, b)
− r(c, {dba}) − r(d, a)r(c, b) − r(d, b)r(c, a) + r(b, d)r(c, a)
− r(d, {cab}) − r(c, b)r(d, a) − r(c, a)r(d, b) + r(a, c)r(d, b)
+ r(d, {cba}) + r(c, a)r(d, b) + r(c, b)r(d, a) − r(b, c)r(d, a)
− r({cba}, d) + r(a, d)r(c, b) − r(a, d)r(b, c) − r(b, d)r(a, c)
+ r({dba}, c) − r(a, c)r(d, b) + r(a, c)r(b, d) + r(b, c)r(a, d)
+ r({cab}, d) − r(b, d)r(c, a) + r(b, d)r(a, c) + r(a, d)r(b, c)
− r({dab}, c) + r(b, c)r(d, a) − r(b, c)r(a, d) − r(a, c)r(b, d)
=R(c, {dab}) − R(c, {dba}) − R(d, {cab}) + R(d, {cba}).
So R(T, T ) is a subalgebra of gl(V ).
Proposition 7.5. l(T, T ), m(T, T ) and r(T, T ) are all adjoint R(T, T )-module.
Proof.
It is sufficient to prove that [R(T, T ), l(T, T )] ⊆ l(T, T ), [R(T, T ), m(T, T )] ⊆
m(T, T ) and [R(T, T ), r(T, T )] ⊆ r(T, T ).
It follows from (7.14) that
[r(c, d), l(a, b)] = m({abc}, d) + m({abd}, c) − l({abd}, c),
[r(d, c), l(a, b)] = m({abd}, c) + m({abc}, d) − l({abc}, d).
Then [R(c, d), l(a, b)] = l({abc}, d) − l({abd}, c) ∈ l(T, T ).
It follows from (7.10) that
m(a, d)r(b, c) = r(c, d)m(a, b) − r(c, d)l(a, b) − r(b, d)l(a, c) + m({acb}, d),
m(a, d)r(c, b) = r(b, d)m(a, c) − r(b, d)l(a, c) − r(c, d)l(a, b) + m({abc}, d).
Then m(a, d)R(b, c) = r(c, d)m(a, b) − r(b, d)m(a, c) + m({acb}, d) − m({abc}, d). Note
that by (7.15),
R(b, c)m(a, d) = r(c, d)m(a, b) − r(b, d)m(a, c) − m(a, {bcd}).
Hence [R(b, c), m(a, d)] = −m(a, {bcd}) − m({acb}, d) + m({abc}, d) ∈ m(T, T ).
It follows from (7.11) and (7.16) that
r(c, d)R(a, b) = r({abc}, d) + r(b, d)r(c, a) − r(a, d)r(c, b),
R(a, b)r(c, d) = −r(c, {abd}) + r(b, d)r(c, a) − r(a, d)r(c, b).
Then [R(a, b), r(c, d)] = −r(c, {abd}) − r({abc}, d) ∈ r(T, T ).
22
Set
ZT (V ) = {x ∈ T {xT V } = {xV T } = {T xV } = {V xT } = {V T x} = {T V x} = 0}.
If T is a Lie triple system, then it is clear that ZT (V ) is an ideal of T . But it is not true
if T is a non-Lie LeibTS.
In fact, it is easy to prove that
{T V {ZT (V )T T }} = {T V {T ZT (V )T }} = {T V {T T ZT (V )}} = 0,
{V T {ZT (V )T T }} = {V T {T ZT (V )T }} = {V T {T T ZT (V )}} = 0,
{T {ZT (V )T T }V } = {T {T ZT (V )T }V } = {T {T T ZT (V )}V } = 0,
{V {ZT (V )T T }T } = {V {T ZT (V )T }T } = {V {T T ZT (V )}T } = 0,
{{T T ZT (V )}T V } = {{T ZT (V )T }T V } = {{T T ZT (V )}V T } = {{T ZT (V )T }V T } = 0.
However, we fail to show {{ZT (V )T T }T V } = 0 or {{ZT (V )T T }V T } = 0. Therefore, one
can not say that ZT (V ) is an ideal of T .
Theorem 7.6. Suppose that T is a LeibTS and V is an irreducible T -module. If ZT (V )
is an ideal of T , then T /ZT (V ) is a Lie triple system, and either l(T, T ) = m(T, T ) = 0
or
l(x, y) = −l(y, x) = R(x, y),
r(x, y) = −m(x, y),
∀x, y ∈ T.
Proof. Let T be a split extension of V by T . Then T = T ∔ V and V is also a
T -module. Note that
Z T (V ) = {x ∈ T {x T V } = {xV T } = { T xV } = {V x T } = {V T x} = { T V x} = 0}
= {x ∈ T {xT V } = {xV T } = {T xV } = {V xT } = {V T x} = {T V x} = 0}
= ZT (V ) ∔ V.
Consider the following two cases.
1. ZT (V ) = 0. Since V is an irreducible T -module, V is a minimal ideal of T .
Note that Ker( T ) is an ideal of T . Then either V ⊆ Ker( T ) or V ∩ Ker( T ) = 0.
Then {V T Ker( T )} = {V Ker( T ) T } = { T V Ker( T )} = {Ker( T )V T } = { T Ker( T )V } =
{Ker( T ) T V } = 0 by Theorem 4.7. Hence Ker( T ) ⊆ Z T (V ) = V , and so Ker(T ) ⊆
Ker( T ) ⊆ V . Then Ker(T ) ⊆ V ∩ T = 0 and T /V ∼= T is a Lie triple system. It follows
from Ker( T ) ⊆ V and the minimality of V that Ker( T ) = 0 or Ker( T ) = V .
If Ker( T ) = V , then { T T V } = { T V T } = 0, which implies {T T V } = {T V T } = 0,
that is, l(T, T ) = m(T, T ) = 0.
If Ker( T ) = 0, then T is a Lie triple system. Hence l(x, y) = −l(y, x) = R(x, y) and
r(x, y) = −m(x, y), for all x, y ∈ T .
2. ZT (V ) 6= 0. Let ¯T = T /ZT (V ). Then ¯T is a LeibTS and V is a ¯T -module
satisfying Z ¯T (V ) = 0. Note that V is also an irreducible ¯T -module. Hence ¯T is a Lie
triple system.
23
Theorem 7.7. Let T be a LeibTS and V 6= 0 a finite-dimensional T -module. Suppose
that ZT (V0) is an ideal of T for every submodule V0 of V . If R(x, y) is nilpotent for all
x, y ∈ T , then l(x, y) is nilpotent and there exists 0 6= v ∈ V such that
R(x, y)(v) = l(x, y)(v) = 0,
∀x, y ∈ T.
Proof. Since V is finite-dimensional, there exists a sequence of submodules
V = V0 ⊃ V1 ⊃ · · · ⊃ Vn−1 ⊃ Vn = 0
such that each factor Vk/Vk+1 (k = 0, 1, · · · , n − 1) is an irreducible T -module. Then
V ∼= V0/V1 ∔ V1/V2 ∔ · · · ∔ Vn−2/Vn−1 ∔ Vn−1/Vn.
Note that R(T, T ) is a subalgebra of gl(V ) and by the Engel's theorem for Lie
algebras, there exists 0 6= v ∈ V such that R(x, y)(v) = 0, ∀x, y ∈ T . Suppose
v = v1 + · · · + vn−1, where vi ∈ Vi/Vi+1. Since Vi/Vi+1 is an irreducible T -module, it
follows that l(x, y)Vi/Vi+1 = 0 or l(x, y)Vi/Vi+1 = −R(y, x)Vi/Vi+1. In either case we have
l(x, y)(vi) = 0, so l(x, y)(v) = 0, ∀x, y ∈ T .
Remark 7.8. If ZT (I) is an ideal of T for every ideal I of T , then by Theorem 7.7, there
exits a basis of a finite-dimensional LeibTS T relative to which the matrix of l(x, y) is
strictly upper triangular for all x, y ∈ T . Then {T T T n} = 0 for some n ∈ N. But one
can not say that T is nilpotent. Hence the Engel's theorem for a LeibTS could not be
proved in this way.
References
[1] S. Albeverio, S. Ayupov, B. Omirov, (2005), On nilpotent and simple Leibniz alge-
bras. Comm. Algebra 33(1), 159-172.
[2] S. Albeverio, S. Ayupov, B. Omirov, (2006), Cartan subalgebras, weight spaces, and
criterion of solvability of finite dimensional Leibniz algebras. Rev. Mat. Complut.
19(1), 183-195.
[3] S. Ayupov, B. Omirov, (1998), On Leibniz algebras. Algebra and operator theory,
Kluwer Acad. Publ., Dordrecht, 1-12.
[4] D. Barnes, (2012), On Engel's theorem for Leibniz algebras. Comm. Algebra 40(4),
1388-1389.
[5] D. Barnes, (2012), On Levi's theorem for Leibniz algebras. Bull. Aust. Math. Soc.
86(2), 184-185.
[6] A. Bolh, (1965), On a generalization of the concept of Lie algebra. (Russian) Dokl.
Akad. Nauk SSSR 165, 471-473.
24
[7] M. Bremner, J. S´anchez-Ortega, (2014), Leibniz triple systems. Commun. Contemp.
Math. 16(1), 1350051, 19 pp.
[8] I. Demir, K. Misra, E. Stitzinger, (2014), On some structures of Leibniz algebras.
Contemp. Math. 623, Amer. Math. Soc., Providence, RI.
[9] S. G´omez-Vidal, S. Khudoyberdiyev, B. Omirov, (2014), Some remarks on semisimple
Leibniz algebras. J. Algebra 410, 526-540.
[10] V. Gorbatsevich, (2013), On some basic properties of Leibniz algebras. arXiv: 1302.
3345.
[11] B. Harris, (1961), Cohomology of Lie triple systems and Lie algebras with involution.
Trans. Amer. Math. Soc. 98, 148-162.
[12] P. Kolesnikov, (2008), Varieties of dialgebras, and conformal algebras. (Russian)
Sibirsk. Mat. Zh. 49(2), 322-339; translation in Sib. Math. J. 49(2), 257-272.
[13] W. Lister, (1952), A structure theory of Lie triple systems. Trans. Amer. Math. Soc.
72, 217-242.
[14] J. Loday, (1993), Une version non commutative des alg`ebres de Lie: les alg`ebres de
Leibniz. (French) Enseign. Math. 39(3-4), 269-293.
[15] J. Loday, T. Pirashvili, (1993), Universal enveloping algebras of Leibniz algebras and
(co)homology. Math. Ann. 296(1), 139-158.
[16] K. Meyberg, (1972), Lectures on algebras and triple systems. The University of
Virginia, Charlottesville, Va. Notes on a course of lectures given during the academic
year 1971-1972.
[17] A. Patsourakos, (2007), On nilpotent properties of Leibniz algebras. Comm. Algebra
35(12), 3828-3834.
[18] K. Yamaguti, (1960), On the cohomology space of Lie triple system. Kumamoto J.
Sci. Ser. A 5, 44-52.
25
|
1211.6323 | 1 | 1211 | 2012-11-27T15:10:47 | Ring coproducts embedded in power-series rings | [
"math.RA",
"math.GR"
] | Let $R$ be a ring (associative, with 1), and let $R<< a,b>>$ denote the power-series $R$-ring in two non-commuting, $R$-centralizing variables, $a$ and $b$. Let $A$ be an $R$-subring of $R<< a>>$ and $B$ be an $R$-subring of $R<< b>>$, and let $\alpha$ denote the natural map $A \amalg_R B \to R<< a,b>>$. This article describes some situations where $\alpha$ is injective and some where it is not.
We prove that if $A$ is a right Ore localization of $R[a]$ and $B$ is a right Ore localization of $R[b]$, then $\alpha$ is injective. For example, the group ring over $R$ of the free group on $\{1+a, 1+b\}$ is $R[ (1+a)^{\pm 1}] \amalg_R R[ (1+b)^{\pm 1}]$, which then embeds in $R<< a,b>>$. We thus recover a celebrated result of R H Fox, via a proof simpler than those previously known.
We show that $\alpha$ is injective if $R$ is \textit{$\Pi$-semihereditary}, that is, every finitely generated, torsionless, right $R$-module is projective.
The article concludes with some results contributed by G M Bergman that describe situations where $\alpha$ is not injective. He shows that if $R$ is commutative and $\text{w.gl.dim\,} R \ge 2$, then there exist examples where the map $\alpha' \colon A \amalg_R B \to R<< a>>\amalg_R R<< b>>$ is not injective, and hence neither is $\alpha$. It follows from a result of K R Goodearl that when $R$ is a commutative, countable, non-self-injective, von Neumann regular ring, the map $\alpha"\colon R<< a>>\amalg_R R<< b>> \to R<< a,b>>$ is not injective. Bergman gives procedures for constructing other examples where $\alpha"$ is not injective. | math.RA | math |
Ring coproducts embedded in power-series rings
Pere Ara and Warren Dicks
June 8, 2021
Abstract
Let R be a ring (associative, with 1), and let Rhha, bii denote the power-
series R-ring in two non-commuting, R-centralizing variables, a and b. Let
A be an R-subring of Rhhaii and B be an R-subring of Rhhbii, and let α denote
the natural map A ∐R B → Rhha, bii. This article describes some situations
where α is injective and some where it is not.
We prove that if A is a right Ore localization of R[a] and B is a right Ore
localization of R[b], then α is injective. For example, the group ring over R
of the free group on {1+ a, 1+ b} is R[(1+ a)±1] ∐R R[(1+ b)±1], which then
embeds in Rhha, bii. We thus recover a celebrated result of R. H. Fox, via a
proof simpler than those previously known.
We show that α is injective if R is Π-semihereditary, that is, every finitely
generated, torsionless, right R-module is projective. (This concept was first
studied by M. F. Jones, who showed that it is left-right symmetric.
It fol-
lows from a result of I. I. Sahaev that if w.gl.dim R 6 1 and R embeds in
a skew field, then R is Π-semihereditary. Also, it follows from a result of
V. C. Cateforis that if R is right semihereditary and right self-injective, then
R is Π-semihereditary.)
The arguments and results extend easily from two variables to any set of
variables.
The article concludes with some results contributed by G. M. Bergman
that describe situations where α is not injective. He shows that if R
is commutative and w.gl.dim R > 2, then there exist examples where the
map α′ : A ∐R B → Rhhaii ∐R Rhhbii is not injective, and hence neither is
α.
It follows from a result of K. R. Goodearl that when R is a commu-
tative, countable, non-self-injective, von Neumann regular ring, the map
α′′ : Rhhaii ∐R Rhhbii → Rhha, bii is not injective. Bergman gives procedures
for constructing other examples where α′′ is not injective.
2010 Mathematics Subject Classification. Primary: 16S10; Secondary: 20C07, 20E05.
Key words. Ring coproduct, free-group group ring, power series, Ore localization.
1 Summary of the results
Some of the terms that we use in this section will be explained in more detail in
subsequent sections.
Throughout, we fix a ring R (associative, with 1). By an R-ring S we mean a
ring S together with a specified ring homomorphism R → S. We write U(R) for
the multiplicative group of units of R. We shall be considering the following.
1.1 Hypotheses. Let Rhha, bii denote the power-series R-ring in two non-com-
muting, R-centralizing variables, a and b. Let A be an R-subring of Rhhaii and
B be an R-subring of Rhhbii. Let α denote the natural map A ∐R B → Rhha, bii.
1
2
Ring coproducts embedded in power-series rings
This article describes some situations where α is injective and some where it is
not.
In Section 2, we fix some of the notation, and we use a result of P. M. Cohn
to decompose the map from the domain of α to the image of α as a direct sum of
R-bimodule maps.
In Section 3, in Proposition 3.1, we shall see that if A is a right Ore localization
of R[a] and B is a right Ore localization of R[b], then α is injective.
1.2 Example. Let h := 1+ a, H := hhi 6 U(Rhhaii), and let RH denote the
group ring of H over R.
It is not difficult to see that we may view R[a] as
R[h] ⊆ RH ⊆ Rhhaii and that RH is a central Ore localization of R[h]. The anal-
ogous statements hold for k := 1+ b and K := hki 6 U(Rhhbii). By Proposition 3.1
below, the map α : RH ∐R RK → Rhha, bii is injective. Here, RH ∐R RK may be
identified with the group ring over R of the group F freely generated by two symbols
1+ a, 1+ b. We thus recover the celebrated result given in 1953 by R. H. Fox [11],
that RF embeds in Rhha, bii. Although Fox considers only the case R = Z, his
argument works for any ring. The proof given here is simpler than the previously
known proofs, such as the original proof reviewed recently in [1, pp. 366 -- 371], and
the proof by G. M. Bergman [8, pp. 528 -- 529] of the case where R is a field.
(One consequence of Fox's result is that if R 6= {0}, then the group F embeds
in U(Rhha, bii). W. Magnus [21] had already given a short proof of the R = Z
case of this consequence in 1935, and deduced much useful information about free
groups. Some of this information eventually led to the discovery, in 1946, of the
important fact that F is an orderable group. Much later, Bergman [3] remarked
that orderability follows directly from Magnus' embedding, since Zhha, bii can easily
be given a ring ordering whose positive cone contains F .)
In Section 4, we review some definitions and results from ring theory. We
say that R is Π-semihereditary if every finitely generated, right R-submodule of
a direct product of copies of R is projective.
(Completely reducible rings are
clearly Π-semihereditary, since all their modules are projective. It is also clear that
Π-semihereditary rings are right semihereditary and, hence, satisfy w.gl.dim R 6 1.)
This concept was studied first by M. F. Jones [16] who showed that it is left-right
symmetric. Earlier, K. R. Goodearl [12] had observed that a result of V. C. Cate-
foris [4] shows that if R is right semihereditary and right self-injective, then
R is Π-semihereditary; see Theorem 4.17 below.
It follows from a result of
I. I. Sahaev [24] that if w.gl.dim R 6 1 and R embeds in a skew field, then R is
Π-semihereditary; see Corollary 4.15(i) below. We recall these and other examples
of Π-semihereditary rings.
In Section 5, we write α as a composite A ∐R B α′
→ Rhha, bii.
Then, in Corollary 5.4, we show that α′, α′′, and α are injective if R is Π-semihered-
itary, or, more generally, if every finitely generated right R-submodule of Rhhaii is
projective. The examples of the preceding section then apply.
→ Rhhaii ∐R Rhhbii α′′
The results of Sections 3 and 5 extend from two variables to any set of variables;
the arguments are very similar but the notation is more complicated. We leave the
details to the interested reader.
Section 6 contains results contributed by Bergman that describe situations where
α is not injective. Examples of non-injectivity of α can arise from non-injectivity ei-
ther of α′ or of α′′. (Examples of the former sort clearly lead to non-injectivity of α,
while an example of the latter sort does so on taking A = Rhhaii, B = Rhhbii.)
Pere Ara and Warren Dicks
3
Examples are given of both sorts. He obtains non-injectivity of α′ for any com-
mutative ring R with w.gl.dim R > 2, e.g. R = Q[x, y]. A result of Goodearl [12]
yields non-injectivity of α′′ whenever R is a commutative, countable, non-self-in-
jective, von Neumann regular ring, e.g. R = Q[ei : i ∈ Z]/(eiej − δi,jei : i, j ∈ Z).
Constructions are described that generalize the latter example.
2 The bimodule structure of ring coproducts
2.1 Notation. We denote by N the set of finite cardinals, {0, 1, 2, 3, . . .}.
For any R-bimodules M1 and M2, we will denote the R-bimodule M1 ⊗R M2 by
M1 ⊗ M2 if R is understood.
For any R-bimodule M and any n ∈ N, we recursively define the R-bimodule
tensor power M ⊗n by the formulas M ⊗0 := R and M ⊗(n+1) := M ⊗n ⊗ M .
2.2 Notation. Suppose that Hypotheses 1.1 hold.
Let {a, b}∗ denote the free monoid on {a, b}. We shall usually write elements of
f (w)·w, where f : w 7→ f (w) is an arbitrary function
Rhha, bii as formal sums Pw∈{a,b}∗
from {a, b}∗ to R. The set {w ∈ {a, b}∗ : f (w) 6= 0} is called the {a, b}∗-support of
Pw∈{a,b}∗
f (w)·w.
We view R ⊆ R[a] ⊆ Rhhaii ⊆ Rhha, bii and R ⊆ R[b] ⊆ Rhhbii ⊆ Rhha, bii. Let
a := A ∩ aRhhaii and b := B ∩ bRhhbii. Then a is a two-sided ideal of A, and, as
R-bimodules, A = R ⊕ a. Analogous statements hold for B.
The ring coproduct of A and B amalgamating the two copies of R will be denoted
A ∐R B, or by A ∐ B if R is understood. Now A ∐ B = (R ⊕ a) ∐ (R ⊕ b). As
noted by P. M. Cohn [7, pp. 60 -- 61], it is not difficult to show that there is then an
expansion as a direct sum of R-bimodules
A ∐ B = R ⊕ a ⊕ b ⊕ (a⊗b) ⊕ (b⊗a) ⊕ (a⊗b⊗a) ⊕ (b⊗a⊗b) ⊕ · · · .
We may write this in the form
(1) A ∐ B = R ⊕ a ⊕ b ⊕ Ln>1
(cid:16)(a⊗b)⊗n ⊕ (b⊗a)⊗n ⊕ ((a⊗b)⊗n⊗a) ⊕ ((b⊗a)⊗n⊗b)(cid:17).
When α is applied to (1), the direct sums are replaced with sums, and the
tensor-product multiplications within A ∐ B are replaced with the multiplications
of Rhha, bii. Thus, we may write
(2)
α(A ∐ B) = R + a + b + Pn>1
(cid:16)(ab)n + (ba)n + ((ab)na) + ((ba)nb)(cid:17).
The {a, b}∗-support of a lies in {ai : i > 1}, and the {a, b}∗-support of b lies in
{bj : j > 1}.
It follows that any two summands appearing in (2) have disjoint
{a, b}∗-supports. Hence, we recover directness in the summation, and may write
α(A ∐ B) = R ⊕ a ⊕ b ⊕ Ln>1
(cid:16)(ab)n ⊕ (ba)n ⊕ ((ab)na) ⊕ ((ba)nb)(cid:17).
For any finite alternating string w formed from the letters a and b, let us write αw
for the map from the corresponding alternating tensor product of factors a and b in
A∐B to the corresponding alternating product in Rhha, bii. Thus, as an R-bimodule
map, A ∐ B → α(A ∐ B) decomposes as the direct sum of the three identity maps
R
αb−→ b, and the further R-bimodule maps, n > 1,
α∅−−→ R, a
αa−−→ a, b
(a⊗b)⊗n
(a⊗b)⊗n ⊗ a
α(ab)n
−−−−→ (ab)n,
α(ab)n a
−−−−−→ (ab)na,
(b⊗a)⊗n
(b⊗a)⊗n ⊗ b
α(ba)n
−−−−→ (ba)n,
α(ba)n b
−−−−−→ (ba)nb.
4
Ring coproducts embedded in power-series rings
Thus α is injective if and only if each of the four maps is injective for all n > 1.
3 Ore localizations
We can now give a simple condition that ensures that α is injective.
3.1 Proposition. If Hypotheses 1.1 hold and, moreover, A is a right Ore localiza-
tion of R[a] and B is a right Ore localization of R[b], then α is injective.
Proof. We use Notation 2.2. We shall show below that for any n > 1, if α(ab)n is
injective, then α(ab)na is injective. The analogous arguments will clearly work for
the other three cases required.
Suppose then that (a⊗b)⊗n
α(ab)n
−−−−→ (ab)n ⊆ Rhha, bii is injective. By considering
{a, b}∗-supports, we see that, for each d > 0, (a ⊗ b)⊗n⊗ Rad → (ab)nad is then
injective. Again by considering {a, b}∗-supports, we see that the map
(cid:16)(ab)nad(cid:17) ⊆ Rhha, bii
Ld>0
(cid:16)(a⊗b)⊗n ⊗ (Rad)(cid:17) → Ld>0
is injective; that is, the map
(a⊗b)⊗n ⊗ (R[a]) → (ab)n(R[a]) ⊆ Rhha, bii
is injective.
Since A is a right Ore localization of R[a], there exists some subset U of U(A)
such that the family (R[a]u : u ∈ U ) forms a directed system under inclusion and
the direct limit of the system is A. For each u ∈ U , we have a commutative diagram
(a⊗b)⊗n ⊗ (R[a]) −−−−→ (ab)n(R[a])
u
y
(a⊗b)⊗n ⊗ (R[a]u) −−−−→ (ab)n(R[a]u)
u
y
in which the maps on the top and the two sides are bijective. Hence, the map on
the bottom,
(a⊗b)⊗n ⊗ (R[a]u) → (ab)n(R[a]u) ⊆ Rhha, bii,
is injective. On taking the directed union over u ∈ U , we find that the map
(a ⊗ b)⊗n ⊗ A → (ab)nA ⊆ Rhha, bii
is injective. By considering {a, b}∗-supports, we see that the latter map is the direct
sum of the two maps α(ab)n and α(ab)na. Hence, α(ab)na is injective.
The other three inductive implications can be proved in the same way. The
injectivity of α then follows by induction.
3.2 Remarks. In Example 1.2, we noted that one case of Proposition 3.1 is the
result of Fox [11] that the natural map RF → Rhha, bii is injective, where F is the
free group on two symbols 1+ a, 1+ b. Fox's proof introduced R-linear endomor-
phisms of RF that are now called Fox derivatives; see [8, Example 7, p. 55]. To
indicate one important connection between the above proof of Proposition 3.1 and
Fox's original argument, we remark that right multiplication by a gives a bijective
map
(a⊗b)⊗n ⊗ (Rad) → (a⊗b)⊗n ⊗ (Rad+1),
and the inverse map has the same action as that of the left Fox derivative on RF
with respect to 1+ a relative to the free generating set {1+ a, 1+ b}.
The original motivation of this article was to show that the proof of the embed-
ding became more transparent when more emphasis was placed on the ring-theoretic
viewpoint.
Pere Ara and Warren Dicks
5
4 Review of Π-semihereditary rings
In this section, we review some of the history of what we call Π-semihereditary rings.
This will provide us with some examples to which the results of the next section
apply. We shall recall the proofs since they are all fairly short, scattered over the
literature, and not always available in the formulation that will be required. No
new results are claimed, but we have tried to give proofs that minimize background
requirements.
4.1 Definitions. For each of the definitions given below, the dual left-right defini-
tion will also be understood.
Let M be a left R-module.
(1) Let X and Y be sets.
For m, n ∈ N, we let mY n denote the set of m × n matrices with coordinates
in Y . Absence of an exponent is to be read as an exponent 1.
Let QX
Y denote the set whose elements are the functions X → Y , x 7→ yx,
represented as families (yx : x ∈ X). We shall sometimes write QX
think of the elements intuitively as '1 × X matrices'. Similarly, we sometimes write
QX
Y as XY , and think of the elements intuitively as 'X × 1 matrices'.
In a natural way, QX
M is a left R-module. By
Y as Y X , and
the multiplication map (QX
R-module map determined by (rx : x ∈ X) ⊗ m 7→ (rxm : x ∈ X). We shall some-
times let (XR) ⊗ M → (XR)M ⊆ XM denote the underlying additive map; here,
XR has a right R-module structure and XM has an abelian group structure. When
M is an R-bimodule, the right R-action is to be maintained in all cases.
M , we shall mean the left
R is an R-bimodule and QX
R)M ⊆ QX
R) ⊗ M → (QX
When M = QY
we have an R-bimodule map
R, we let µX,Y denote the foregoing multiplication map. Here,
(QX
R) ⊗ (QY
R)
µX,Y−−−→ QX×Y
R,
(rx : x ∈ X) ⊗ (sy : y ∈ Y ) 7→ (rxsy : (x, y) ∈ X × Y ).
We shall sometimes denote the underlying additive map by XR ⊗ RY µX,Y−−−→ XRY ,
where we think of the elements of XRY imprecisely as 'X × Y matrices'.
(2) We say that M is torsionless if there exists an injective left R-module map
from M to a direct product of copies of R. Clearly, submodules of torsionless
modules are torsionless.
(3) One says that M is coherent if every finitely generated submodule is finitely
presented. Clearly, submodules of coherent modules are coherent.
The ring R is left coherent if R is coherent as left R-module, that is, every finitely
generated left ideal of R is finitely presented as left R-module.
The ring R is left Π-coherent if, for every set Y , RY is coherent as left R-module,
or, equivalently, every finitely generated, torsionless, left R-module is finitely pre-
sented. This property was studied first by Jones [16, p. 103]. Clearly, left Π-coherent
rings are left coherent.
(4) We say that M is semihereditary if every finitely generated submodule is
projective. Clearly, semihereditary modules are coherent, and submodules of semi-
hereditary modules are semihereditary.
The ring R is left semihereditary if R is semihereditary as left R-module, that
is, every finitely generated left ideal of R is projective as left R-module.
6
Ring coproducts embedded in power-series rings
We now come to the property of interest to us, which was studied first by
Jones [16], who showed that it is left-right symmetric; see Theorem 4.11 below.
We say that the ring R is Π-semihereditary if, for every set X, XR is semiheredi-
tary as right R-module, or, equivalently, every finitely generated, torsionless right
R-module is projective. Prior to Jones' work, Goodearl [12] had mentioned that
right self-injective, von Neumann regular rings have this property; see Theorem 4.17
below.
Clearly, Π-semihereditary rings are right semihereditary and right Π-coherent.
(5) We say that M is flat if, for all injective right R-module maps K → F , the
induced map K ⊗R M → F ⊗R M is injective, or, equivalently, for all finitely gen-
erated right ideals I of R, the multiplication map I ⊗R M → IM ⊆ M = R ⊗R M
is injective. See [23, Theorem 3.53]. Notice that it is therefore sufficent to consider
inclusion maps K → F where F is a finitely generated, free, right R-module and K
is a finitely generated R-submodule of F .
If every finitely generated submodule of M is flat, then M is flat. More generally,
if M is the direct limit of a directed system of flat modules, then M is flat. See [23,
Theorem 3.47].
If M is flat, then every left R-summand of M is flat. See [23, Theorem 3.45].
We write w.gl.dim R 6 1 if every finitely generated left ideal of R is flat as left
R-module, or, equivalently, every submodule of every flat left R-module is flat, or
equivalently every submodule of every flat right R-module is flat; see [23, Theo-
rem 9.24]. Otherwise, we write w.gl.dim R > 2.
(6) For any infinite cardinal κ, we say that R is left κ-Noetherian if every left
ideal of R is generated by κ (or fewer) elements. For example, if R 6 ℵ0, then R
is left ℵ0-Noetherian. Also, if R > ℵ0, then R is left R-Noetherian.
The next result is a variant of [6, Theorem 2.4] suitable for our purposes.
4.2 Theorem. (Cohn, 1959) For any flat left R-module F and left R-submodule K
of F , the following are equivalent.
(a) F/K is left R-flat.
(b) For all ℓ, m ∈ N and y ∈ ℓRm, (y(mF )) ∩ (ℓK) ⊆ y(mK) in ℓF .
Proof. If ℓ, m ∈ N and y ∈ ℓRm, then ℓR may be considered an arbitrary finitely
generated, free, right R-module and y(mR) an arbitrary finitely generated, right
R-submodule of ℓR. Thus, the left R-module M := F/K is flat if and only if the
natural map
(3)
(y(mR)) ⊗R M → (ℓR) ⊗R M
is injective for all ℓ, m, y.
Suppose that ℓ, m, and y are given.
We have an exact sequence
(y(mR)) ⊗R K → (y(mR)) ⊗R F → (y(mR)) ⊗R M → 0,
(4)
and we shall re-interpret each term. Since F is left R-flat, (y(mR)) ⊗R F embeds
in (ℓR) ⊗R F = ℓF , and the image is y(mF ). Hence, we may make the identification
(y(mR)) ⊗R F = y(mF ). The image of (y(mR)) ⊗R K in (y(mR)) ⊗R F = y(mF )
is then y(mK). Using (4), we now find that we may make the identification
(y(mR)) ⊗R M = (y(mF ))/(y(mK)).
In the special case where y is an identity matrix, we have the (obvious) iden-
tification (ℓR) ⊗R M = (ℓF )/(ℓK). We now find that we may identify (3) with the
natural map (y(mF ))/(y(mK)) → (ℓF )/(ℓK). Then (a) ⇔(b) follows.
The next two results are taken from [5, Proposition 2.2 and Corollary], attributed
to O. E. Villamayor.
Pere Ara and Warren Dicks
7
4.3 Theorem. (Villamayor, 1960) For any n ∈ N and left R-submodule K of Rn,
the following are equivalent.
(a) Rn/K is left R-flat.
(b) For all ℓ ∈ N and x ∈ ℓK ⊆ ℓRn, x ∈ x(nK).
Proof. The case F = Rn of Theorem 4.2 allows us to rewrite (a) as
(a′) For all ℓ, m ∈ N and y ∈ ℓRm, (y(mRn)) ∩ (ℓK) ⊆ y(mK) in ℓRn.
(a′)⇒(b). Suppose x ∈ ℓK. Taking m = n and y = x in (a′) we obtain
(x(nRn)) ∩ (ℓK) ⊆ x(nK) in ℓRn. Then x = xIn ∈ x(nRn) ∩ (ℓK) ⊆ x(nK).
(b)⇒(a′). Suppose y ∈ ℓRm. Consider any x ∈ (y(mRn)) ∩ (ℓK). We have
x ∈ ℓK, and then, by (b), x ∈ (x)(nK) ⊆ (y(mRn))(nK) ⊆ y(mK).
4.4 Theorem. (Villamayor, 1960) For any left R-module M , the following are
equivalent.
(a) M is finitely generated and projective.
(b) M is finitely presented and flat.
Proof. (a)⇒(b) is clear.
(b)⇒(a). Since M is a finitely presented left R-module, there exist n ∈ N and
a finitely generated left R-submodule K of Rn such that M = Rn/K. Since K
is finitely generated, there exist ℓ ∈ N and x ∈ ℓK ⊆ ℓRn such that K = (Rℓ)x.
By Theorem 4.3 (a)⇒(b), since M is R-flat, x ∈ x(nK), that is, there exists some
e ∈ nK such that x = x·e. Now the left R-module map Rn → K, y 7→ y·e, acts as
the identity on K because it does so on the rows of x, which form a generating set
of K. This proves that Rn/K is projective.
The following result is a variant of [20, Satz 2] which is the same as [9, Propo-
sition 2.1], attributed to M. Auslander.
4.5 Theorem. (Lenzing, 1969 & Auslander, 1970) For any finitely generated left
R-module M , the following are equivalent.
(a) M is finitely presented.
(b) For every set X, the multiplication map (XR) ⊗R M → XM is injective.
(c) For some infinite set X such that R is left X-Noetherian, the multiplication
map (XR) ⊗R M → XM is injective.
Proof. (a)⇒ (b). By (a), there exist m, n ∈ N and an exact sequence of left
R-modules Rm → Rn → M → 0. We then have a commutative diagram with exact
rows:
(XR) ⊗R (Rm) −−−−→ (XR) ⊗R (Rn) −−−−→ (XR) ⊗R M −−−−→ 0
µX,m(cid:13)(cid:13)(cid:13)
XRm
µX,n(cid:13)(cid:13)(cid:13)
XRn
−−−−→
y
XM
−−−−→
−−−−→ 0.
Hence, (XR) ⊗R M → XM is injective (and surjective).
(b)⇒ (c) is clear.
(c)⇒ (a). By hypothesis, there exist n ∈ N and an exact sequence of left
R-modules 0 → K → Rn → M → 0, and it suffices to show that K is finitely
generated. We then have a commutative diagram with exact rows:
(XR) ⊗R K −−−−→ (XR) ⊗R (Rn) −−−−→ (XR) ⊗R M −−−−→ 0
y
XK
µX,n(cid:13)(cid:13)(cid:13)
XRn
−−−−→
(cid:13)(cid:13)(cid:13)
XM
−−−−→
0 −−−−→
−−−−→ 0,
8
Ring coproducts embedded in power-series rings
where (XR) ⊗R M → XM is injective by (c), and is here easily seen to be surjec-
tive. Hence, (XR) ⊗R K → XK is surjective, that is, (XR)K = XK. Since R is left
X-Noetherian by (c), K is X-generated; hence, there exists some generating fam-
ily (kx : x ∈ X) which may be viewed as an element of XK, and it then has the form
Pm
i=1 rx,ik′
i.
Hence, K = Px∈X Rkx ⊆ Pm
i, since XK = (XR)K. Then, for each x ∈ X, kx = Pm
i ⊆ K. Thus, K is finitely generated.
i=1(rx,i : x ∈ X)k′
i=1 Rk′
The next two results are taken from [5, Theorems 2.1 and 4.1].
4.6 Theorem. (Chase, 1960) The following are equivalent.
(a) R is left coherent, i.e. every finitely generated left ideal is finitely presented.
(b) For every finitely generated left ideal I of R and every set X, the multiplication
map (XR) ⊗R I → (XR)I ⊆ XI ⊆ XR = (XR) ⊗R R is injective.
(c) For every set X, XR is right R-flat.
Proof (after Lenzing [20, Section 4]). (a)
Theorem 4.5
⇐======⇒ (b)
clear⇐==⇒ (c).
4.7 Theorem. (Chase, 1960) The following are equivalent.
(a) R is left semihereditary, i.e. every finitely generated left ideal is projective.
(b) w.gl.dim R 6 1 and R is left coherent.
(c) w.gl.dim R 6 1 and, for every set X, XR is right R-flat.
(d) Every torsionless right R-module is flat.
(e) Every finitely generated, torsionless, right R-module is flat.
Proof. (a) Theorem 4.4
⇐======⇒ (b) Theorem 4.6
⇐======⇒ (c)
clear⇐==⇒ (d)
clear⇐==⇒ (e).
Goodearl [12, Theorem 1] generalized Theorem 4.5 to the non-finitely generated
case by showing that, for any left R-module M , all of the multiplication maps
(XR) ⊗R M → XM are injective if and only if, for each finitely generated submodule
N of M , the inclusion map N → M factors through a finitely presented module. We
record the special case we shall be using and its special proof. Recall the meaning
of µX,Y from Definitions 4.1(1).
4.8 Theorem. (Goodearl, 1972) For any non-empty set Y , the following are
equivalent.
(a) RY is coherent as left R-module.
(b) R is a left coherent ring, and, for every set X, µX,Y is injective.
(c) R is a left coherent ring, and, for some infinite set X such that R is left
X-Noetherian, µX,Y is injective.
Proof. Let M := RY , and let M denote the directed family of finitely generated left
R-submodules of M .
(a)⇒(b).
Since Y is non-empty, R embeds in M , and, hence, R is co-
Let N ∈ M.
herent as left R-module, that is, R is a left coherent ring.
By (a), N is finitely presented. By Theorem 4.5 (a)⇒(b), the multiplication map
(XR) ⊗ N → XN ⊆ XM is injective. On taking the direct limit of the system of
µX,Y−−−→ XM
injective maps (XR) ⊗ N → XM over all N ∈ M, we see that (XR) ⊗ M
is injective, as desired.
(b)⇒(c) is clear.
(c)⇒(a) (after Herbera-Trlifaj [13, Corollary 2.11] ). Let N ∈ M and consider
the natural commutative diagram
Pere Ara and Warren Dicks
9
(XR) ⊗ N −−−−→ XN
y
(XR) ⊗ M
y
µX,Y−−−−→ XM.
By Theorem 4.6 (a)⇒(c), XR is right R-flat, and, hence, the left map is injective.
By (c), the bottom map is injective. Hence, the top map is injective. By Theorem 4.5
(c)⇒(a), N is finitely presented. Thus, M is coherent as left R-module.
The following result is a variant of [2, (4.5)] that is suitable for our purposes.
4.9 Theorem. (Bass, 1960) Let Y be an infinite set such that R is right
Y -Noetherian. If M is a finitely generated, torsionless, left R-module, then M
embeds in RY . Hence, R is a left Π-coherent ring if and only if RY is a coherent
left R-module.
Proof. Since M is a finitely generated left R-module, on dualizing we find that the
right R-module M ∗ := HomR(M, RR) embeds in a finitely generated, free, right
R-module. Since R is right Y -Noetherian, M ∗ is Y -generated. On dualizing we
find that the left R-module M ∗∗ := HomR(M ∗, RR) embeds in RY . Since M is
torsionless, the double-dual map M → M ∗∗ is injective, and M embeds in RY .
4.10 Corollary. The following are equivalent.
(a) R is a left Π-coherent ring, i.e. every finitely generated, torsionless, left module
is finitely presented.
(b) R is a left coherent ring and, for all sets X and Y, µX,Y is injective.
(c) R is a left coherent ring and, for some infinite sets X and Y such that R is left
X-Noetherian and right Y -Noetherian, µX,Y is injective.
Proof. This follows from Theorems 4.8 and 4.9.
We now recall the aspect of [16, Theorem 2.11] that is of interest to us.
4.11 Theorem. (Jones, 1982) The following are equivalent.
(a) R is left and right semihereditary, and, for all sets X, Y , µX,Y is injective.
(b) R is left and right coherent, w.gl.dim R 6 1, and, for all sets X, Y , µX,Y is
injective.
(c) R is left coherent, w.gl.dim R 6 1, and R is right Π-coherent.
(d) Every finitely generated, torsionless, right R-module is flat and finitely pre-
sented.
(e) R is Π-semihereditary, i.e. every finitely generated, torsionless, right R-module
is projective.
These conditions are also equivalent to their left-right duals.
Proof. (a) Theorem 4.7
⇐======⇒ (b)
(a) is left-right symmetric.
Corollary 4.10
⇐=======⇒ (c) Theorem 4.7
⇐======⇒ (d) Theorem 4.4
⇐======⇒ (e), and
In the remainder of this section, we recall some types of rings that are
Π-semihereditary. We first present a result from [24].
4.12 Theorem. (Sahaev, 1965) For each n ∈ N and each y ∈ nRn, let
In− y. The following are equivalent.
(a) There exists a finitely generated, non-finitely presented, flat, left R-module M .
(b) There exist n ∈ N and a function N → nRn, k 7→ yk, such that, for each
•yk; equivalently, ykyk+1 = yk and yk+1yk 6= yk+1;
•yk+1 = 0n 6= yk+1
•y denote
k ∈ N, yk
equivalently,
•yk
•yk+1 = •yk+1, and
•yk+1
•yk 6= •yk.
10
Ring coproducts embedded in power-series rings
Proof. (a)⇒ (b). Since M is finitely generated and not finitely presented, there exist
n ∈ N and a non-finitely generated left R-submodule K of Rn such that M = Rn/K.
We view Rn as an (R, nRn)-bimodule.
We shall recursively construct a sequence (yk : k ∈ N) in nK ⊆ nRn.
Set
y0 := 0n ∈ nK. We may now suppose that k ∈ N and yk ∈ nK. Since K is not
finitely generated, it is easy to see that there exists some xk ∈ n+1K ⊆ n+1Rn
such that (Rn)yk ⊂ (Rn+1)xk ⊆ K. By Theorem 4.3 (a)⇒(b), since M is
flat, xk ∈ xk(nK), that is, there exists some yk+1 ∈ nK such that xk = xkyk+1.
•yk+1 = {0}, and we see that
Hence, xk
yk
•yk+1 = 0n.
Also, (Rn)yk+1yk ⊆ (Rn)yk ⊂ (Rn+1)xk = (Rn+1)xkyk+1 ⊆ (Rn)yk+1, and we
•yk+1 = 0n. Now, (Rn)yk
•yk+1 ⊆ (Rn+1)xk
see that yk+1yk 6= yk+1. Thus, yk+1
•yk 6= 0n.
This completes the recursive construction of the sequence, and (b) holds.
(b)⇒ (a). Let F denote the (R, nRn)-bimodule Rn. Then (F yk : k ∈ N) is a
family of left R-submodules of F . For each k ∈ N, F yk = F ykyk+1 ⊆ F yk+1; also
•yk+1, and, hence, F yk+2 6= F yk. Thus, (F yk : k ∈ N ) is a
F yk+2
non-stationary, ascending chain of left R-submodules of F .
•yk+1 6= {0} = F yk
Set K := S∞
k=0(F yk) and M := F/K. Then M is a finitely generated,
non-finitely presented, left R-module. To prove (a), it suffices to show that M
is left R-flat, and here we may apply Theorem 4.3 (b)⇒ (a). Let ℓ ∈ N and x ∈ ℓK;
it remains to show that x ∈ x(nK). As x ∈ ℓK = S∞
k=0(ℓ(F yk)), there exists some
k ∈ N such that x ∈ ℓ(F yk). Then x •yk+1 = 0. Since each row of yk+1 lies in K,
yk+1 ∈ nK. Now, x = xyk+1 ∈ x(nK), as desired.
4.13 Definitions. (1) We shall say that R is a left Sahaev ring if every finitely
generated, flat, left R-module is finitely presented, or, equivalently, projective, by
Theorem 4.4. The term 'left S-ring' is sometimes used in the literature.
Every subring of a left Sahaev ring is again a left Sahaev ring, since these are
the rings for which the condition in Theorem 4.12(b) fails. In particular, rings that
embed in skew fields are left and right Sahaev rings.
It is clear from the foregoing definition that left Noetherian rings are left Sahaev
rings. Both Sahaev [24] and S. Jøndrup [15, Lemma 1.4] discuss connections between
the condition in Theorem 4.12(b) and various chain conditions.
(2) A commutative Prufer domain is a semihereditary, commutative domain.
A commutative B´ezout domain is a commutative domain in which every finitely
generated ideal is principal.
(3) One says that R is a semifir if every finitely generated left ideal of R is free of
unique rank, as left R-module, and similarly on the right. It is sufficient to assume
the condition on the left; see [8, Theorem I.1.1].
We now present [15, Corollary 2].
4.14 Theorem. (Jøndrup, 1971) The following hold.
(i) If R is right semihereditary and not left Sahaev, then R is not right Sahaev.
(ii) If w.gl.dim R 6 1 and R is right Sahaev, then R is left Sahaev and Π-semi-
hereditary.
Proof. (i) We apply Theorem 4.12 (a)⇒(b), and we change y0 to 0n. We shall speak
of the kernel and image of each element of nRn viewed as an R-endomorphism of
nR acting on the left by matrix multiplication.
Let k ∈ N. Since yk+2
•yk+1, Ker(yk+2) 6⊇ Im( •yk+1) ⊆ Ker(yk).
Hence, Ker(yk+2) 6= Ker(yk). Clearly •yk+1 acts as the identity on Ker(yk+1),
and we see that Ker(yk+1) ⊆ Im( •yk+1) ⊆ Ker(yk). Hence, Ker(y2k+2) ⊂ Ker(y2k).
Since R is right semihereditary, Im(y2k+2) is a projective R-submodule of nR, and,
•yk+1 6= 0n = yk
Pere Ara and Warren Dicks
11
hence, Ker(y2k+2) is an R-summand of nR, and, therefore, of Ker(y2k). Thus,
Ker(y2k) = Ker(y2k+2) ⊕ Lk for some Lk 6= {0}. Then,
k
nR = Ker(y0) = Ker(y2k+2) ⊕ (
Li).
Li=0
Each term of the directed system (nR/(Lk
taking the direct limit, we see that nR/(L∞
presented, and flat. Hence, R is not right Sahaev.
i=0 Li) : k ∈ N) is then R-projective. On
i=0 Li) is finitely generated, not finitely
(ii) As w.gl.dim R 6 1, every finitely generated right ideal of R is flat, and hence
projective, since R is right Sahaev. Thus, R is right semihereditary. By the contra-
positive of (i), R is left Sahaev. Hence, R is left semihereditary. By Theorem 4.7
(a)⇒(e), every finitely generated, torsionless, right R-module is flat, and hence
projective, since R is right Sahaev.
4.15 Corollary. The following hold.
(i) If w.gl.dim R 6 1 (e.g. R is left or right (semi)hereditary) and R is left or right
Sahaev (e.g. R is left or right Noetherian or R embeds in a skew field ), then
R is Π-semihereditary.
(ii) If R is a commutative principal ideal domain, or more generally, a commuta-
tive B´ezout domain, or, even more generally, a commutative Prufer domain,
then R is Π-semihereditary.
Proof. (i) is Theorem 4.14(ii) and its left-right dual, while (ii) gives some cases of (i)
where R is semihereditary and embeds in a field.
The following is [14, Theorem 2B], attributed to Cohn.
4.16 Theorem. (Cohn, 1969) Semifirs are left and right semihereditary, left and
right Sahaev rings. Hence, semifirs are Π-semihereditary.
Proof (after Jøndrup [15, Corollary 3]). It is clear that semifirs are left and right
semihereditary. From the proof of Theorem 4.14(i), it may be seen that if R is right
semihereditary and not left Sahaev, then, for some n ∈ N, nR is a direct sum of n+1
non-zero right R-submodules; this cannot happen if R is a semifir. Hence semifirs
are left (and right) Sahaev rings, and Corollary 4.15(i) applies.
We now turn to the final topic of this section, self-injective rings; for background
on injective modules, see [23, pp. 65 -- 68].
At the beginning of the proof of [12, Theorem 2 (c)⇒(a)], Goodearl notes the
consequence of [4, Theorem 2.1 (a)⇒(b)] that, over a right self-injective, von Neu-
mann regular ring, every torsionless right module is projective. This seems to have
been one of the very earliest occasions on which the projectivity of finitely generated
torsionless modules was considered.
4.17 Theorem. (Cateforis, 1969) If R is right semihereditary and right self-injec-
tive, then R is Π-semihereditary.
Proof. By definition, R is Π-semihereditary if each finitely generated, torsionless,
right R-module M is projective. Since M is finitely generated, we may write
M = F/K where F is a finitely generated, free, right R-module, and K is a submod-
ule of F . In particular, F is right R-injective. Let L denote the set of submodules
of F whose intersection with K is {0}. Clearly, L 6= ∅. By Zorn's lemma, L con-
tains some ⊆-maximal element L. Then F ⊇ K⊕ L. We then have injective right
R-module maps K → F/L, k 7→ k+L, and K → F , k 7→ k. Since F is right
R-injective, the domain of the latter map can be transported along the former map
to give a right R-module map φ : F/L → F such that, for all k ∈ K, φ(k+L) = k.
12
Ring coproducts embedded in power-series rings
Define φ′ : F → F by f 7→ φ(f +L). Then Ker(φ′) ⊇ L, and, for all k ∈ K,
φ′(k) = k. If Im(φ′) = K, then F/K is projective, as desired. Thus, it suffices to
assume that Im(φ′) ⊃ K, and obtain a contradiction.
Define φ′′ : F → M by f 7→ φ′(f )+K ∈ F/K = M . Then there exists some
m ∈ Im(φ′′)−{0}. Thus, F ⊃ Ker(φ′′) ⊇ K⊕L.
Since M is torsionless, we may compose φ′′ with a map from M to R which
does not vanish on m, and thus obtain a map ψ : F → R with F ⊃ Ker(ψ) ⊇ K⊕L.
Then Im(ψ) is a finitely generated right ideal of R. Since R is right semihereditary,
Im(ψ) is projective. Hence, F = Ker(ψ)⊕L′ for some L′ 6= {0}. Now F ⊇ K⊕L⊕L′
and this contradicts the ⊆-maximality of L in L, as desired.
4.18 Remarks. Recall that if R is von Neumann regular, then every finitely pre-
sented right R-module is projective by Theorem 4.4, hence every finitely generated
right ideal of R is a summand of R, and hence R is right semihereditary.
Recall also that if R is right semihereditary and right self-injective, then every
finitely generated right ideal is projective, hence injective, hence a summand of R,
and R is von Neumann regular.
We shall be using [22, Corollary], which is as follows.
4.19 Theorem. (Osofsky, 1964) If R is right self-injective and right hereditary,
then R is completely reducible.
Proof. Suppose not. We shall obtain a contradiction. Let U denote the set of right
ideals of R that are not finitely generated. By Remarks 4.18, R is von Neumann
regular; since R is not completely reducible, U 6= ∅. By Zorn's lemma, U contains
some ⊆-maximal element I.
Since R is right hereditary, I is right R-projective. Since R is von Neumann
regular, results of Kaplansky show that I is a direct sum of infinitely many nonzero
right ideals of R; in the case where I is ℵ0-generated, this follows from [18, Proof
of Lemma 1], and in the case where I is not ℵ0-generated, it follows from [17,
Theorem 1]. There then exists some decomposition I = I ′ ⊕ I ′′ with I ′, I ′′ ∈ U.
We shall now show that there exists some right ideal I ′ of R with the properties
that I ′ ⊆ I ′, I ′ 6∈ U, and I ′ ∩ I ′′ = {0}; in Remarks 4.20, we shall give an alter-
native argument which does not require background on injective hulls. Recall that
Eckmann and Schopf [10] showed that, since R is right self-injective, I ′ has a right
R-injective hull I ′ in R which is a maximal right R-essential extension of I ′ in R;
see [23, proof of Theorem 3.30 (iii)⇒(i)]. Then I ′ is a right R-summand of R, and,
hence, I ′ is right R-cyclic. Thus, I ′ 6∈ U. Also, since I ′ ∩ I ′′ = {0}, it follows that
I ′ ∩ I ′′ = {0}, as claimed.
Since I ′
6∈ U, we have I 6= I ′ and I ⊂ I ′. Since I ′′ ∈ U, it can be seen that
I ′ ⊕ I ′′ ∈ U. Now I = I ′ ⊕ I ′′ ⊂ I ′ ⊕ I ′′. This contradicts the maximality of I in U
and completes the proof.
4.20 Remarks. Here is an alternative proof of the existence of an I ′. Let
M := R/I ′, and consider the double-dual map φ : M → M ∗∗ as in the proof of The-
orem 4.9. There exists a right ideal I ′ of R such that Ker(φ) = I ′/I ′, and then
Im(φ) ≃ R/I ′. By Theorem 4.17, R is right Π-coherent.
It is clear that Im(φ)
is a finitely generated, torsionless, right R-module, and, hence, Im(φ) is finitely
presented. Thus, I ′ is finitely generated, and, hence, I ′ 6∈ U. We shall now show
that I ′ ∩ I ′′ = {0}. Consider any x ∈ I ′′. Then xR = eR for some idempotent
e ∈ R, since R is von Neumann regular. Since eR ⊆ I ′′, we see that eR ∩ I ′ = {0},
and, hence, eR embeds in R/I ′ = M . Since R is right self-injective, eR is right
R-injective. Thus, eR becomes a summand of M which, as eR is projective,
Pere Ara and Warren Dicks
13
must then embed in M ∗∗. We now see that eR ∩ I ′ = {0}.
I ′ ∩ I ′′ = {0}, as claimed.
It then follows that
The following combines [12, Theorem 2 (a)⇒(c)] and the commutative case of
Theorem 4.19.
4.21 Theorem. Let R be a commutative, Π-coherent, von Neumann regular ring.
(i) (Goodearl, 1972) R is self-injective.
(ii) (Osofsky, 1964) If R is ℵ0-Noetherian or, more generally, hereditary, then R
is completely reducible.
Proof. (i) (based loosely on Kobayashi [19, Theorem 2]) By Baer's criterion [23,
Theorem 3.20], to show that R is self-injective, it suffices to show that, for each ideal
I of R, each R-module map φ : I → R is given by multiplication by some element
of R.
Now π1 : R2 → R, (x, y) 7→ x, and ψ : R2 → RI, (x, y) 7→ (φ(x·i) − y·i : i ∈ I),
are R-module maps. Then Im(ψ) is a finitely generated, torsionless R-module.
Since R is Π-coherent, Ker(ψ) is a finitely generated R-submodule of R2. Hence,
π1(Ker(ψ)) is a finitely generated ideal of R. Since R is von Neumann regular, there
exists some idempotent e ∈ R such that π1(Ker(ψ)) = R·e. For each x ∈ R, we now
see that x ∈ R·e if and only if there exists some y ∈ R such that, for each i ∈ I,
φ(x·i) = y·i, that is, φ(i·x) = i·y, since R is commutative.
We apply the 'if' part taking x ∈ I and y = φ(x). For each i ∈ I, we have
φ(i·x) = i·φ(x) = i·y. Hence, x ∈ R·e. Thus, I ⊆ R·e and i·e = i for all i ∈ I.
We now apply the 'only if' part taking x = e. There exists some y ∈ R such
that, for each i ∈ I, φ(i·e) = i·y, that is, φ(i) = i·y, as desired.
(ii) Recall that a right ℵ0-Noetherian, von Neumann regular ring is right hered-
itary, by [18, Lemma 1]. Now (ii) follows from (i) and Theorem 4.19.
4.22 Remarks. If w.gl.dim R > 2, then R is not Π-semihereditary.
If w.gl.dim R = 1 and R is right Sahaev, then R is left Sahaev and Π-semihered-
itary, by Theorem 4.14(ii). This class includes all the semifirs that are not skew
fields, by Theorem 4.16. It also includes all the Prufer domains that are not fields.
If w.gl.dim R = 0 and R is left or right self-injective, then R is Π-semihereditary,
by Theorem 4.17. This class includes all the right semihereditary, right self-injective
rings.
It also includes all the commutative Π-semihereditary rings which have
w.gl.dim R = 0, by Theorem 4.21(i). It also includes all the completely reducible
rings.
If w.gl.dim R = 0 and R is right Sahaev, then clearly every finitely generated
right R-module is projective, and R is then completely reducible. Such rings are
included in the previous case.
Thus, we have two disjoint classes of examples of Π-semihereditary rings.
5
If R is Π-semihereditary, then α is injective
For the remainder of the article, we fix the following.
5.1 Notation. For each n ∈ N, we have a multiplication map that will be denoted
(QN
R)⊗n βn−−→ QNn
R.
Whenever Hypotheses 1.1 hold, we have a natural factorization of α that will be
denoted A ∐R B α′
−→ Rhhaii ∐R Rhhbii α′′
−−→ Rhha, bii.
14
Ring coproducts embedded in power-series rings
5.2 Proposition. If Hypotheses 1.1 hold and A, B, and QN
R-flat, then A ∐R B α′
Proof. Clearly, the R-bimodule map QN
is bijective. Similarly for bRhhbii.
−→ Rhhaii ∐R Rhhbii is injective.
R → aRhhaii, (ri : i ∈ N) 7→ Pi>0(riai+1),
R are left and right
We see that aRhhaii and bRhhbii are left and right R-flat.
We use Notation 2.2. Now, A = R ⊕ a and B = R ⊕ b; hence, a and b are left
and right R-flat.
Let n ∈ N. For 1 6 i 6 n, let Mi denote one of aRhhaii, a, bRhhbii, or b. It
follows by induction that the R-bimodule M1 ⊗ M2 ⊗ · · · ⊗ Mn is left and right
R-flat. It then follows by induction that each of the natural maps
(a ⊗ b)⊗n → (aRhhaii ⊗ bRhhbii)⊗n,
(b ⊗ a)⊗n → (bRhhbii ⊗ aRhhaii)⊗n,
(a ⊗ b)⊗n ⊗ a → (aRhhaii ⊗ bRhhbii)⊗n ⊗ aRhhaii,
(b ⊗ a)⊗n ⊗ b → (bRhhbii ⊗ aRhhaii)⊗n ⊗ bRhhbii,
is injective. By using the standard R-bimodule decompositions of A ∐ B and
Rhhaii ∐ Rhhbii, we see that, as an R-bimodule map, α′ is a direct sum of these
injective maps, and hence is injective.
5.3 Proposition. Suppose that Hypotheses 1.1 hold.
(i) Rhhaii ∐R Rhhbii α′′
−−→ Rhha, bii is injective if and only if, for each n ∈ N,
(QN
R)⊗n βn−−→ QNn
R is injective.
R is left or right R-coherent, then α′′ is injective.
(ii) If R is left or right coherent and β2 is injective, then α′′ is injective.
(iii) If QN
Proof. (i) We may assume that A = Rhhaii, B = Rhhbii and α = α′′. We use
Notation 2.2. Let n ∈ N. Consider the map (a ⊗ b)⊗n → (ab)n ⊆ Rhha, bii.
The R-bimodule isomorphisms QN
R → b give an embedding
(QN
ding QN2n
the map (a ⊗ b)⊗n → \(ab)n is a copy of β2n. We now see that α is a direct sum
of R-bimodule maps that consist of one copy of β0 and two copies of βn for each
n > 1. In particular, α is injective if and only if all the βn, n ∈ N, are injective.
R → Rhha, bii with image \(ab)n, the closure of (ab)n in Rhha, bii. Thus
R)⊗(2n) → Rhhaii ∐ Rhhbii with image (a ⊗ b)⊗n. They also give an embed-
R → a and QN
(ii) By symmetry, we may assume that R is left coherent.
We shall show by induction that, for each n ∈ N, βn is injective. It is clear that
β0 is injective. Suppose that n > 0, and that βn is injective. Notice that βn+1 may
be factored as
(Q
R)⊗βn
N
β′
R)⊗n)
(QN
R) ⊗ ((QN
−−−−−−→ (QN
R) ⊗ ( QNn
Since R is left coherent, by Theorem 4.6 (a)⇒(c), QN
R) ⊗ βn is injective. Since there exists a bijection between Nn and N, we see that
(QN
β′
2 may be identified with β2 and is then injective. Hence, the composition βn+1 is
injective. This completes the inductive argument. By (i), α′′ is injective.
R is right R-flat, and, hence,
R)
2−→ QNn+1
R.
(iii) By symmetry, we may assume that QN
R is left R-coherent. By Theo-
rem 4.8 (a)⇒(b), R is left coherent and β2 is injective. By (ii), α′′ is injective.
Pere Ara and Warren Dicks
15
R is a left or right semihereditary R-module, then α is injective.
5.4 Corollary. With Hypotheses 1.1, the following hold.
(i) If QN
(ii) If R is a Π-semihereditary ring, then α is injective.
(iii) If R is right semihereditary (e. g. w.gl.dim R = 0) and R is right self-injective,
then α is injective (and w.gl.dim R = 0).
(iv) If w.gl.dim R 6 1 (e. g. R is left or right semihereditary) and R is left or right
Sahaev, then α is injective (and R is left and right semihereditary and left and
right Sahaev).
Proof. (i) By symmetry, we may assume that QN
Proposition 5.3(iii), α′′ is injective.
R is left R-semihereditary. By
Notice that QN
R is left R-coherent and that every left R-submodule of QN
R is
flat. In particular, R is left coherent and w. gl. dim R 6 1. By Theorem 4.6 (a)⇒(c),
QN
R, Rhhaii,
Rhhbii, A, and B, are left and right R-flat. By Proposition 5.2, α′ is injective.
R is right R-flat, and then all its right R-submodules are flat. Hence, QN
Hence, α is injective.
(ii) follows from (i).
(iii) follows from (ii) and Theorem 4.17.
(iv) follows from (ii) and Corollary 4.15(i).
In the next section, we shall see results of Bergman and Goodearl that show
that α can fail to be injective whenever R is a commutative ring such that either
w. gl. dim R > 2 or R is ℵ0-Noetherian, non-self-injective, and von Neumann regular.
6 Non-injectivity phenomena
In this section, we give examples contributed by G. M. Bergman where Hypothe-
ses 1.1 hold and α is not injective. Throughout, we use the factorization of α as
A ∐R B α′
−→ Rhhaii ∐R Rhhbii α′′
−−→ Rhha, bii.
We begin with a general example where R[a] ⊆ A ⊆ R[a, (1+ a)−1] and
R[b] ⊆ B ⊆ R[b, (1+ b)−1], but α′ is not injective.
6.1 Proposition. (Bergman) Suppose that R has two-sided ideals I, J such that
the multiplication map I ⊗ J → IJ is not injective, e.g. R = Z/p2Z, p prime, or
R = Q[x, y]. Then, with a suitable choice of A and B, Hypotheses 1.1 hold and α′,
α are not injective.
Proof. For R = Z/p2Z, p prime, we may take I = J = pR, where p ⊗ p 7→ 0.
For R = Q[x, y], we may take I = J = xR + yR, where (x ⊗ y)−(y ⊗ x) 7→ 0.
Let h := 1+ a and H := hhi 6 U(Rhhaii). Then R[h] = R[a], and we view
R[h] ⊆ RH ⊆ Rhhaii. We have R-bimodule decompositions
RH = Li∈Z
hiR = R[h] ⊕ Li6−1
(hiR).
In RH, take A to be the subring R[h]⊕ Li6−1
(hiI). Since h−1 = 1−h−1a, R+ aA = A.
Let k := 1+ b, K := hki 6 U(Rhhbii). We view R[b] = R[k] ⊆ RK ⊆ Rhhbii,
and we have an R-bimodule decomposition
RK = R[k] ⊕ Li6−1
(Rki).
16
Ring coproducts embedded in power-series rings
In RK, take B to be the subring R[k]⊕ Li6−1
(Jki). Since k−1 = 1−k−1b, R+ bB = B.
We use Notation 2.2. Here,
a = aA = aR[h] ⊕ Li6−1
(hiaI),
and
b = bB = bR[k] ⊕ Li6−1
(Jbki).
In particular, h−1aI is an R-bimodule direct summand of a, and Jbk−1 is an
R-bimodule direct summand of b. Hence (h−1aI) ⊗ (Jbk−1) may be viewed as
an R-bimodule direct summand of a ⊗ b, and also of A ∐ B. This summand does
not map injectively to (h−1aI)(Jbk−1) in (RH) ∐ (RK). It follows that α′ is not
injective in this case. Hence, α is not injective.
Recall that w.gl.dim R > 2 if and only if there exists a right ideal I of R that is
not right R-flat; recall also that I is not right R-flat if and only if there exists a left
ideal J of R such that the multiplication map I ⊗R J → IJ is not injective. The
next result then follows from Proposition 6.1.
6.2 Corollary. Suppose that R is commutative and that w.gl.dim R > 2. Then with
a suitable choice of A and B, Hypotheses 1.1 hold and α is not injective.
6.3 Remarks. Suppose that R is a commutative Sahaev ring and that Hypothe-
ses 1.1 hold.
By Corollary 6.2, if α is injective for all choices of A and B, then w.gl.dim R 6 1.
Conversely, by Corollaries 5.4 and 4.15 (i), if w.gl.dim R 6 1, then α is injective.
Thus, among the commutative Sahaev rings R, the ones for which α is always
injective are the ones with w.gl.dim R 6 1, that is, the semihereditary ones.
Hence, among the commutative domains R, the ones for which α is always
injective are the commutative Prufer domains.
Also, among the commutative Noetherian rings R, the ones for which α is always
injective are the hereditary ones.
We now give examples where Hypotheses 1.1 hold and β2 is not injective, and,
hence, by Proposition 5.3(i), α′′ is not injective. These are then examples where
A = Rhhaii and B = Rhhbii in Hypotheses 1.1 and α is not injective. We remark
that if we had been working in the setting of commutative rings of power series,
then α′′ would have looked like β2.
The following result gives a method for constructing examples where β2 is not
injective.
6.4 Proposition. (Bergman) Let Q be a field. For i = 1, 2, let Ri be a commutative,
augmented Q-ring whose augmentation ideal Ii is not finitely generated, and let Xi
be an infinite set such that Ii is Xi-generated. Let R := (R1 ⊗Q R2)/(I1 ⊗Q I2), a
commutative Q-ring. Then µX1,X2 : (X1R) ⊗R (RX2) → X1RX2 is not injective.
In detail, for i = 1, 2, any family mi := (ri,ji : ji ∈ Xi) that generates Ii as
R, and then m1 ⊗ m2 is a non-zero
ideal of Ri may be viewed as an element of QXi
element of Ker(µX1,X2 ).
Proof. Notice that R1 ⊗Q R2 = (Q ⊕ I1) ⊗Q (Q ⊕ I2) = Q ⊕ I1 ⊕ I2 ⊕ (I1 ⊗Q I2),
R = Q ⊕ I1 ⊕ I2, R1 and R2 are subrings of R, I1 and I2 are ideals of R with
product zero, and R is a commutative augmented Q-ring with augmentation ideal
I := I1 ⊕ I2.
Here, µX1,X2 carries m1 ⊗ m2 to (r1,j1 r2,j2 : (j1, j2) ∈ X1 × X2), which is zero, by
our definition of R. Thus, it remains to show that m1 ⊗ m2 6= 0 in (X1R) ⊗R (RX2 ),
and we shall do this by finding a quotient R-module in which the image of m1 ⊗ m2
is not zero.
Pere Ara and Warren Dicks
17
Let M1 := X1(R/I2), a quotient R-module of X1R with trivial I2-action. Let
M2 := (R/I1)X2 , a quotient R-module of RX2 with trivial I1-action. For i = 1, 2, set
M i := Mi/(MiI) = Mi/(MiIi), a quotient R-module of QXi
R with trivial I-action,
and let mi denote the image of mi in M i. Then we have a map
(X1R) ⊗R (RX2 ) → M 1 ⊗R M 2 = M 1 ⊗Q M 2,
with m1 ⊗R m2 mapping to m1 ⊗Q m2. It suffices to show that m1 ⊗Q m2 6= 0, and,
since Q is a field, it suffices to show that m1 6= 0 and m2 6= 0. By symmetry it
suffices to assume that m1 = 0 and obtain a contradiction, as follows.
The natural bijection R1 → R/I2 induces a bijection X1R1 → M1, and it carries
(X1R1)I1 to M1I1. Since m1 ∈ X1R1 and m1 = 0, we have m1 ∈ (X1R1)I1. Hence,
there is some expression m1 = Pℓ
k=1 vkrk with each vk ∈ X1R1 and each rk ∈ I1.
For each j1 ∈ X1, the j1st coordinate of m1 is r1,j1 , and, hence, r1,j1 lies in the
ideal of R1 generated by {rk : 1 6 k 6 ℓ}, a finite subset of I1. It follows that I1 is
a finitely generated ideal of R1. This is a contradiction, as desired.
The following expands on the last two paragraphs of [12].
6.5 Proposition. If R is a commutative, ℵ0-Noetherian, von Neumann regular
ring that is not completely reducible, then the map α′′ : Rhhaii ∐ Rhhbii → Rhha, bii
is not injective.
Proof. By Theorem 4.21(ii), R is not Π-coherent. By the contrapositive of
Corollary 4.10 (c)⇒(a), β2 is not injective. By Proposition 5.3(i), α′′ is not in-
jective.
6.6 Example. If Q is a field and R = Q[ej : j ∈ N]/(ekeℓ − δk,ℓek : k, ℓ ∈ N), then
α′′ is not injective, since R satisfies the hypotheses of Proposition 6.5; the countable
case was first seen in the last two paragraphs of [12]. Let us give an alternative
proof by showing that this R has the form considered in Proposition 6.4 with X1
and X2 countable. Partition N into two infinite subsets X1 and X2. For i = 1, 2,
let mi := {ej : j ∈ Xi}, let Ii denote the ideal of R generated by mi, and let Ri
denote the Q-subring of R generated by mi. Then we may make the identifica-
tion R = (R1 ⊗Q R2)/(I1 ⊗Q I2), and, by Proposition 6.4, m1 ⊗ m2 represents a
non-zero element of Ker(µX1,X2 ). We may identify µX1,X2 with β2.
Here is a result similar to Proposition 6.4, which uses a different, rather curious
argument to prove that an appropriate element of Ker µX,X is not zero.
6.7 Proposition. (Bergman) Let Q be a non-zero commutative ring, X an infinite
set, I the free Q-module on X, R the commutative augmented Q-ring Q ⊕ I with
I 2 = {0}, and m the element (x : x ∈ X) of QX
R. Then m⊗m represents a non-zero
element of Ker(µX,X ).
Proof. It is clear that m ⊗R m is an element of Ker(µX,X ), and it remains to show
that m ⊗R m 6= 0 in (XR) ⊗R (RX ); we shall do this by finding a quotient R-module
in which the image of m ⊗R m is not zero.
Define R-bimodules P := X(R ⊗Q R)X and P := (R/I) ⊗R P ⊗R (R/I), and
make the identification P = P/(IP + P I). We have natural R-bimodule maps
(XR) ⊗Q (RX ) → X(R ⊗Q R)X = P → P .
Since I acts trivially on P on the left and the right, the R-bimodule map
(XR) ⊗Q (RX ) → P is R-centralizing, and, hence, factors through the universal
18
Ring coproducts embedded in power-series rings
R-centralizing quotient (XR) ⊗R (RX ) of the domain. Under the resulting map
(XR) ⊗R (RX ) → P , our element m ⊗R m is mapped to p + IP + P I where
p := (x ⊗Q y : (x, y) ∈ X × X) ∈ P . Thus to show that m ⊗R m 6= 0, it suf-
fices to show that p 6∈ IP + P I.
For every x, y ∈ X and t ∈ R ⊗Q R, we shall write cx⊗y(t) ∈ Q for the coefficient
of x ⊗ y in the expression for t with respect to the Q-basis (X ∪ {1}) ⊗ (X ∪ {1})
of R ⊗Q R.
Consider any q = (qx,y : (x, y) ∈ X × X) ∈ P . For each x0 ∈ X,
it can be
seen that x0P = X(x0Q ⊗Q R)X . Hence, if q ∈ x0P , then, for all (x, y) ∈ X × X,
cx⊗y(qx,y) = 0 if x 6= x0. Similar statements hold for P x0. If q ∈ IP + P I, then
there exist finite subsets X0, Y0 ⊆ X such that q ∈ Px0∈X0
P y0.
Since X is infinite, there exist x ∈ X−X0 and y ∈ X−Y0, and then cx⊗y(qx,y) = 0.
Since Q 6= {0}, cx⊗y(qx,y) 6= 1. Hence, q 6= p. This shows that m ⊗R m 6= 0, as
desired.
x0P + Py0∈Y0
In the previous two propositions, we have created elements of Ker(µX1,X2 ) of
the form m1 ⊗ m2, and this requires the existence of zero-divisors in R. By using
elements of Ker(µX1 ,X2) of the form m1 ⊗ m2 − m3 ⊗ m4, we can avoid having
zero-divisors in R, as follows.
6.8 Proposition. (Bergman) Let Q be a field, and let R be the subring of Q[x, y]
generated by {xiy : i ∈ N}. In particular, R is a commutative domain. In QN
R, let
m1 := m2 := (x2i+1y : i ∈ N), m3 := (x2iy : i ∈ N), m4 := (x2i+2y : i ∈ N).
Then m1 ⊗ m2 − m3 ⊗ m4 lies in Ker(β2) − {0}.
Proof. For i, j ∈ N, both m1 ⊗ m2 and m3 ⊗ m4 have x2i+2j+2y2 as their (i, j)th
component. Thus m1 ⊗ m2 − m3 ⊗ m4 ∈ Ker(β2).
Let I denote the ideal of R generated by {x2iy, x2iy2 : i ∈ N}, and let R′ := R/I.
Then R′ is the commutative augmented Q-ring with augmentation ideal of square
R′, let m := (x2i+1y : i ∈ N). By
zero and Q-basis X := {x2i+1y : i ∈ N}. In QN
R)⊗2 → (QN
Proposition 6.7, in (QN
carries m1⊗m2−m3⊗m4 to (m⊗m)−(0⊗0) 6= 0. Hence, m1⊗m2−m3⊗m4 6= 0.
R′)⊗2, m ⊗ m 6= 0. The natural map (QN
R′)⊗2
Acknowledgments
The first-named author was partially supported by DGI MICIIN MTM2011-28992-C02-01,
and by the Comissionat per Universitats i Recerca de la Generalitat de Catalunya.
The second-named author was partially supported by Spain's Ministerio de Ciencia e Inno-
vaci´on through Project MTM2011-25955.
We are very grateful to George Bergman for generously contributing the examples of Section 6
and suggesting many improvements of various earlier versions.
We are also grateful to Dolors Herbera for providing much useful information for Section 4.
References
[1] Pere Ara and Warren Dicks, Universal localizations embedded in power-series rings, Forum
Math. 19 (2007), 365 -- 378.
[2] Hyman Bass, Finitistic dimension and a homological generalization of semi-primary rings,
Trans. Amer. Math. Soc. 95 (1960), 466 -- 488.
[3] George M. Bergman, Ordering coproducts of groups and semigroups, J. Algebra 133 (1990),
313 -- 339.
[4] Vasily C. Cateforis, On regular self-injective rings, Pacific J. Math. 30 (1969), 39 -- 45.
[5] Stephen U. Chase, Direct products of modules, Trans. Amer. Math. Soc. 97 (1960), 457 -- 473.
[6] P. M. Cohn, On the free product of associative rings, Math. Z. 71 1959, 380 -- 398.
Pere Ara and Warren Dicks
19
[7] P. M. Cohn, Free ideal rings, J. Algebra 1 (1964), 47 -- 69.
[8] P. M. Cohn, Free rings and their relations. Second edition, LMS Monographs 19, Academic
Press, London, 1985. xxii+588 pp.
[9] S. H. Cox and R. L. Pendleton,
Rings for which certain flat modules are projective,
Trans. Amer. Math. Soc. 150 (1970), 139 -- 156.
[10] B. Eckmann and A. Schopf, Uber injektive Moduln, Arch. Math. 4 (1953), 75 -- 78.
[11] Ralph H. Fox, Free differential calculus. I Derivation in the free group ring, Ann. of Math.
(2) 57 (1953), 547 -- 560.
[12] K. R. Goodearl, Distributing tensor product over direct product, Pacific J. Math. 43 (1972),
107 -- 110.
[13] Dolors Herbera and Jan Trlifaj, Almost
free modules and Mittag-Leffler conditions,
Adv. Math. 229 (2012), 3436 -- 3467.
[14] C. U. Jensen, Some cardinality questions for flat modules and coherence, J. Algebra 12
(1969), 231 -- 241.
[15] S. Jøndrup, On finitely generated flat modules III , Math. Scand. 29 (1971), 206 -- 210.
[16] Marsha Finkel Jones, Flatness and f -projectivity of torsion-free modules and injective mod-
ules, pp. 94 -- 116 in: Advances in noncommutative ring theory. Proc. Twelfth George H. Hud-
son Symp., SUNY, Plattsburgh NY, 1981, (ed. Patrick J. Fleury), Lecture Notes in Math.
951, Springer-Verlag, Berlin, 1982. iii+142 pp.
[17] Irving Kaplansky, Projective modules, Ann. of Math. 68 (1958), 372 -- 377.
[18] Irving Kaplansky, On the dimension of modules and algebras, X A right hereditary ring which
is not left hereditary, Nagoya Math. J. 13 (1958), 85 -- 88.
[19] Shigeru Kobayashi, A note on regular self-injective rings, Osaka J. Math. 21 (1984), 679 -- 682.
[20] Helmut Lenzing, Endlich prasentierbare Moduln, Arch. Math. 20 (1969), 262 -- 266.
[21] Wilhelm Magnus, Beziehungen zwischen Gruppen und Idealen in einem speziellen Ring,
Math. Ann. 111 (1935), 259 -- 280.
[22] B. L. Osofsky, Rings all of whose finitely generated modules are injective, Pacific J. Math. 14
(1964), 645 -- 650.
[23] Joseph J. Rotman, An introduction to homological algebra, Pure and applied mathematics 89,
Academic Press, New York, 1979. xi+376 pp.
[24] I. I. Sahaev, The projectivity of finitely generated flat modules, Mat. Z. 6 (1965), 564 -- 573.
Departament de Matem`atiques, Universitat Aut`onoma de Barcelona, E-08193 Bel-
laterra (Barcelona), Spain
E-mail addresses: [email protected], [email protected].
Home page: http://mat.uab.cat/~dicks/
|
1005.2373 | 1 | 1005 | 2010-05-13T16:47:18 | A Hom-associative analogue of n-ary Hom-Nambu algebras | [
"math.RA",
"math-ph",
"math-ph"
] | It is shown that every n-ary totally Hom-associative algebra with equal twisting maps yields an n-ary Hom-Nambu algebra via an n-ary version of the commutator bracket. The class of n-ary totally Hom-associative algebras is shown to be closed under twisting by self-weak morphisms. Every multiplicative n-ary totally Hom-associative algebra yields a sequence of multiplicative totally Hom-associative algebras of exponentially higher arities. Under suitable conditions, an n-ary totally Hom-associative algebra gives an (n-k)-ary totally Hom-associative algebra. | math.RA | math |
A HOM-ASSOCIATIVE ANALOGUE OF n-ARY HOM-NAMBU ALGEBRAS
DONALD YAU
Abstract. It is shown that every n-ary totally Hom-associative algebra with equal twisting maps
yields an n-ary Hom-Nambu algebra via an n-ary version of the commutator bracket. The class
of n-ary totally Hom-associative algebras is shown to be closed under twisting by self-weak mor-
phisms. Every multiplicative n-ary totally Hom-associative algebra yields a sequence of multiplica-
tive totally Hom-associative algebras of exponentially higher arities. Under suitable conditions,
an n-ary totally Hom-associative algebra gives an (n − k)-ary totally Hom-associative algebra.
1. Introduction
Nambu algebras play an important role in physics. For example, Nambu mechanics [16, 20]
involves n-ary Nambu algebras [8, 18]. In these n-ary Nambu algebras, the n-ary compositions are
derivations, a property called the n-ary Nambu identity (a.k.a. Filippov identity), which generalizes
the Jacobi identity. Lie triple systems [10, 11], which are ternary Nambu algebras with two further
properties, can be used to solve the Yang-Baxter equation [17]. An n-ary Nambu algebra whose
product is anti-symmetric is called an n-ary Nambu-Lie algebra (a.k.a. Filippov algebra). Ternary
Nambu-Lie algebras appear in the work of Bagger and Lambert [6] and many others on M-theory.
Other applications of n-ary Nambu algebras in physics are discussed in, e.g., [4, 17, 18].
Generalizations of n-ary Nambu(-Lie) algebras, called n-ary Hom-Nambu(-Lie) algebras, were
introduced by Ataguema, Makhlouf, and Silvestrov in [3] . In an n-ary Hom-Nambu(-Lie) algebra,
the n-ary Nambu identity is replaced by the n-ary Hom-Nambu identity (see Definition 4.4), which
involves n − 1 linear twisting maps. These twisting maps can be thought of as additional degrees
of freedom or as deformation parameters. An n-ary Nambu(-Lie) algebra can be regarded as an
n-ary Hom-Nambu(-Lie) algebra in which the twisting maps are all equal to the identity map. Hom-
Nambu(-Lie) algebras are interesting even when the underlying algebras are Nambu(-Lie) algebras.
In fact, certain ternary Nambu-Lie algebras can be regarded as ternary Hom-Nambu-Lie algebras
with non-identity twisting maps [3].
Binary Hom-Nambu-Lie algebras are called Hom-Lie algebras, which originated in [9] in the study
of q-deformations of the Witt and the Virasoro algebras. The binary Hom-Nambu identity in this
case is called the Hom-Jacobi identity [14]. The associative counterparts of Hom-Lie algebras are
Hom-associative algebra [14]. Hom-Lie algebras are to Hom-associative algebras as Lie algebras are
to associative algebras [14, 21].
Let us recall some properties of n-ary Hom-Nambu(-Lie) algebras.
It is shown in [3] that n-
ary Nambu(-Lie) algebras can be twisted along self-morphisms to yield n-ary Hom-Nambu(-Lie)
algebras. This twisting construction of n-ary Hom-Nambu(-Lie) algebras is a generalization of a
result about G-Hom-associative algebras due to the author [22].
It is shown in [1] that ternary
Date: November 3, 2018.
2000 Mathematics Subject Classification. 17A40, 17A42, 17B81.
Key words and phrases. Hom-Nambu algebra, totally Hom-associative algebra, n-commutator bracket.
1
2
DONALD YAU
Virasoro-Witt algebras can be q-deformed into ternary Hom-Nambu-Lie algebras. It is shown in [2]
that a ternary Hom-Nambu-Lie algebra can be obtained from a Hom-Lie algebra together with a
compatible linear map and a trace function.
Further properties of n-ary Hom-Nambu(-Lie) algebras were established by the author in [24, 25].
A unique feature of Hom-type algebras is that they are closed under twisting by suitably defined self-
morphisms. In particular, it is shown in [24] that the category of n-ary Hom-Nambu(-Lie) algebras
is closed under twisting by self-weak morphisms. Starting with an n-ary Nambu(-Lie) algebra, this
closure property reduces to the twisting construction for n-ary Hom-Nambu(-Lie) algebras in [3].
Moreover, it is proved in [24] that every multiplicative n-ary Hom-Nambu algebra yields a sequence
of Hom-Nambu algebras of exponentially higher arities. It is also shown in [24] that, under suitable
conditions, an n-ary Hom-Nambu(-Lie) algebra reduces to an (n− k)-ary Hom-Nambu(-Lie) algebra.
Hom-Jordan and Hom-Lie triple systems were defined in [24] as Hom-type generalizations of
Jordan and Lie triple systems [10, 11, 15]. A Hom-Lie triple system is automatically a ternary Hom-
Nambu algebra, but it is usually not a ternary Hom-Nambu-Lie algebra because its ternary product
is not assumed to be anti-symmetric. It is proved in [24] that Hom-Lie triple systems, and hence
ternary Hom-Nambu algebras, can be obtained from Hom-Jordan triple systems, ternary totally
Hom-associative algebras [3], multiplicative Hom-Lie algebras, and Hom-associative algebras.
Furthermore, it is proved in [25] that multiplicative Hom-Jordan algebras [23] have underlying
Hom-Jordan triple systems, and hence also ternary Hom-Nambu algebras. Combined with results
from [24], this implies that every multiplicative Hom-Jordan algebra gives rise to a sequence of
Hom-Nambu algebras of arities 2k+1 + 1. As in the classical case, a major source of Hom-Jordan
algebras is the class of Hom-alternative algebras, which were defined in [13]. It is proved in [23] that
multiplicative Hom-alternative algebras are Hom-Jordan admissible. Therefore, every multiplicative
Hom-alternative algebra also gives rise to a sequence of Hom-Nambu algebras of arities 2k+1 + 1.
Finally, the class of n-ary Hom-Nambu-Lie algebras is extended to the class of n-ary Hom-Maltsev
algebras in [25].
The main purpose of this paper is to study a Hom-associative analogue of n-ary Hom-Nambu
algebras. The basic motivation is that the n-ary Hom-Nambu identity is an n-ary version of the
Hom-Jacobi identity. As is well-known, the commutator bracket of an associative algebra satisfies
the Jacobi identity. Likewise, the commutator bracket of a Hom-associative algebra satisfies the
Hom-Jacobi identity [14]. Therefore, it is natural to ask the following question.
Is there an n-ary version of a Hom-associative algebra that gives rise to an n-ary
Hom-Nambu algebra via an n-ary version of the commutator bracket?
One main result of this paper is an affirmative answer to this question when the twisting maps
are equal (Theorem 4.5). The relevant Hom-associative type objects are the n-ary totally Hom-
associative algebras defined in [3], which generalize n-ary totally associative algebras. The relevant
commutator bracket is what we call the n-commutator bracket (Definition 4.3), which involves 2n−1
terms. Restricting to the special case where all the twisting maps are equal to the identity map,
this result implies that every n-ary totally associative algebra yields an n-ary Nambu algebra via
the n-commutator bracket.
Low-dimensional cases of the n-commutator bracket have been used elsewhere. In particular, the
2-commutator bracket is the usual commutator. The 3-commutator bracket was used by the author
in [24] to show that a ternary totally Hom-associative algebra with equal twisting maps yields a
A HOM-ASSOCIATIVE ANALOGUE OF n-ARY HOM-NAMBU ALGEBRAS
3
ternary Hom-Nambu algebra. We should point out that our n-commutator bracket is not the same
as the totally anti-symmetrized n-ary commutator in [5, 7]. Moreover, the n-commutator bracket
is not anti-symmetric when n ≥ 3. Therefore, the n-ary Hom-Nambu algebras arising from n-ary
totally Hom-associative algebras via the n-commutator bracket are usually not n-ary Hom-Nambu-
Lie algebras.
A description of the rest of this paper follows.
In section 2 we observe that the class of n-ary totally Hom-associative algebras is closed under
twisting by self-weak morphisms (Theorem 2.5). The corresponding closure property for n-ary Hom-
Nambu(-Lie) and n-ary Hom-Maltsev algebras can be found in [24] and [25], respectively. A special
case of Theorem 2.5 says that each multiplicative n-ary totally Hom-associative algebra gives rise
to a sequence of multiplicative n-ary totally Hom-associative algebras by twisting along its own
twisting map (Corollary 2.7). We obtain Theorem 3.6 in [3] as another special case of Theorem
2.5.
It says that n-ary totally associative algebras can be twisted along self-morphisms to yield
multiplicative n-ary totally Hom-associative algebras (Corollary 2.8). Section 2 ends with several
examples of n-ary totally Hom-associative algebras.
In section 3 we study how totally Hom-associative algebras of different arities are related. First, we
show that every multiplicative n-ary totally Hom-associative algebra yields a sequence of multiplica-
tive totally Hom-associative algebras of exponentially higher arities, namely, 2k(n − 1) + 1 for k ≥ 0
(Corollary 3.2). The transition from Hom-associative algebras to ternary totally Hom-associative
algebras was proved in [24]. One major difference between the n = 2 case in [24] and the n ≥ 3 case
here is that the latter requires multiplicativity while the former does not. Second, we show that
under suitable conditions an n-ary totally Hom-associative algebra reduces to an (n − k)-ary totally
Hom-associative algebra (Corollary 3.5). The corresponding results for Hom-Nambu algebras can
be found in [24].
In section 4 we define the n-commutator and show that every n-ary totally Hom-associative alge-
bra with equal twisting maps yields an n-ary Hom-Nambu algebra via the n-commutator (Theorem
4.5). The special case of this result when n = 2 is Proposition 1.6 in [14]. The special case when
n = 3 is Corollary 4.3 in [24]. In these low dimensional cases, due to the relatively small number of
terms involved, the binary and ternary Hom-Nambu identities can be shown by a direct computation
with all the terms written out. In the general case, a more systematic argument is needed because
of the large number of terms in the Hom-Nambu identity. In fact, the n-ary Hom-Nambu identity
for the n-commutator bracket involves 22n−2(n + 1) terms.
2. Totally Hom-associative algebras
In this section we observe that the class of n-ary totally Hom-associative algebras is closed under
twisting by self-weak morphisms. Some examples of n-ary totally Hom-associative algebras are then
given.
2.1. Conventions. Throughout this paper we work over a fixed field k of characteristic 0. If V is
a k-module and f : V → V is a linear map, then f n denotes the composition of n copies of f with
f 0 = Id. For i ≤ j, elements xi, . . . , xj ∈ V and maps f, fk, . . . , fl : V → V with j − i = l − k, we
4
DONALD YAU
adopt the abbreviations
xi,j = (xi, xi+1, . . . , xj ),
f (xi,j) = (f (xi), f (xi+1), . . . , f (xj)),
(2.1.1)
fk,l(xi,j) = (fk(xi), fk+1(xi+1), . . . , fl(xj)).
For i > j, the symbols xi,j, f (xi,j), and fk,l(xi,j ) denote the empty sequence. For a bilinear map
µ : V ⊗2 → V , we often write µ(x, y) as the juxtaposition xy.
Let us begin with the following basic definitions.
Definition 2.2. Let n ≥ 2 be an integer.
(1) An n-ary Hom-algebra (V, (, ..., ), α) with α = (α1, . . . , αn−1) [3] consists of a k-module
V , an n-linear map (, ..., ) : V ⊗n → V , and linear maps αi : V → V for i = 1, . . . , n − 1,
called the twisting maps.
(2) An n-ary Hom-algebra (V, (, ..., ), α) is said to be multiplicative if (i) the twisting maps
are all equal, i.e., α1 = · · · = αn−1 = α, and (ii) α ◦ (, ..., ) = (, ..., ) ◦ α⊗n.
(3) A weak morphism f : V → U of n-ary Hom-algebras is a linear map of the underlying
k-modules such that f ◦ (, ..., )V = (, ..., )U ◦ f ⊗n. A morphism of n-ary Hom-algebras is a
weak morphism such that f ◦ (αi)V = (αi)U ◦ f for i = 1, . . . n − 1 [3].
For an n-ary Hom-algebra V and elements x1, . . . , xn ∈ V , using the abbreviations in (2.1.1), the
n-ary product (x1, . . . , xn) will often be denoted by (x1,n) below. We sometimes omit the commas
in the n-ary product (, ..., ).
An n-ary Hom-algebra V in which all the twisting maps are equal, as in the multiplicative case,
will be denoted by (V, (, ..., ), α), where α is the common value of the twisting maps. An n-ary
algebra in the usual sense is a k-module V with an n-linear map (, ..., ) : V ⊗n → V . We consider
an n-ary algebra (V, (, ..., )) also as an n-ary Hom-algebra (V, (, ..., ), Id) in which all n − 1 twisting
maps are the identity map. Also, in this case a weak morphism is the same thing as a morphism,
which agrees with the usual definition of a morphism of n-ary algebras.
Let us now recall the definition of an n-ary totally Hom-associative algebra from [3].
Definition 2.3. Let (A, (, ..., ), α) be an n-ary Hom-algebra.
(1) For i ∈ {1, . . . , n − 1} define the ith Hom-associator asi
A : A⊗2n−1 → A to be the (2n − 1)-
linear map
asi
A(a1,2n−1) = (α1,i−1(a1,i−1), (ai,i+n−1), αi,n−1(ai+n,2n−1))
− (α1,i(a1,i), (ai+1,i+n), αi+1,n−1(ai+n+1,2n−1))
for a1, . . . , a2n−1 ∈ A.
(2) An n-ary totally Hom-associative algebra is an n-ary Hom-algebra A that satisfies
total Hom-associativity
for all i ∈ {1, . . . , n − 1}.
asi
A = 0
An n-ary totally Hom-associative algebra with αi = Id for all i is called an n-ary totally
associative algebra. In this case, asi
A = 0 is referred to as total associativity.
A HOM-ASSOCIATIVE ANALOGUE OF n-ARY HOM-NAMBU ALGEBRAS
5
When n = 2 total Hom-associativity means
((a1a2)α(a2)) = (α(a1)(a2a3)),
which is the defining identity for Hom-associative algebras [14]. When n = 3 total Hom-associativity
means
((a1a2a3), α1(a4), α2(a5)) = (α1(a1), (a2a3a4), α2(a5)) = (α1(a1), α2(a2), (a3a4a5)).
(2.3.1)
In particular, if both twisting maps α1 and α2 are equal to the identity map, then (2.3.1) is the
defining identity for ternary rings [12].
To see that the category of n-ary totally Hom-associative algebras is closed under twisting by
self-weak morphisms, we need the following observations.
Lemma 2.4. Let (A, (, ..., ), α) be an n-ary Hom-algebra and β : A → A be a weak morphism.
Consider the n-ary Hom-algebra
Aβ = (A, (, ..., )β = β(, ..., ), βα = (βα1, . . . , βαn−1)).
(2.4.1)
Then the following statements hold.
(1) β2asi
(2) If A is multiplicative and βα = αβ, then Aβ is also multiplicative.
for i ∈ {1, . . . , n − 1}.
A = asi
Aβ
Proof. Both assertions are immediate from the definitions.
(cid:3)
The desired closure property is now an immediate consequence of Lemma 2.4.
Theorem 2.5. Let (A, (, ..., ), α) be an n-ary totally Hom-associative algebra and β : A → A be a
weak morphism. Then Aβ in (2.4.1) is also an n-ary totally Hom-associative algebra. Moreover, if
A is multiplicative and βα = αβ, then Aβ is also multiplicative.
Let us now discuss some special cases of Theorem 2.5. If A is a multiplicative n-ary Hom-algebra,
then its twisting map is a morphism (and hence a weak morphism) on A. Therefore, we have the
following special case of Theorem 2.5.
Corollary 2.6. Let (A, (, ..., ), α) be a multiplicative n-ary totally Hom-associative algebra. Then
is also a multiplicative n-ary totally Hom-associative algebra.
Aα = (A, (, ..., )α = α(, ..., ), α2)
Iterating Corollary 2.6 we obtain the following result, which says that every multiplicative n-ary
totally Hom-associative algebra gives rise to a sequence of derived n-ary totally Hom-associative
algebras.
Corollary 2.7. Let (A, (, ..., ), α) be a multiplicative n-ary totally Hom-associative algebra. Then
is also a multiplicative n-ary totally Hom-associative algebra for each k ≥ 0.
Ak = (A, (, ..., )k = α2k −1(, ..., ), α2k
)
On the other hand, if we set αi = Id for all i in Theorem 2.5, then we obtain the following
twisting result, which is Theorem 3.6 in [3]. It says that n-ary totally Hom-associative algebras can
be obtained from n-ary totally associative algebras and their morphisms.
6
DONALD YAU
Corollary 2.8. Let (A, (, ..., )) be an n-ary totally associative algebra and β : A → A be a morphism.
Then
is a multiplicative n-ary totally Hom-associative algebra.
Aβ = (A, (, ..., )β = β(, ..., ), β)
The rest of this section contains examples of n-ary totally Hom-associative algebras.
Example 2.9. Let A be an associative algebra, f : A → A be an algebra morphism, and ζ ∈ k be
a primitive nth root of unity. Then the ζ-eigenspace of f ,
is an (n + 1)-ary totally associative algebra under the (n + 1)-ary product
A(f, ζ) = {a ∈ A : f (a) = ζa},
(a1, . . . , an+1) = a1 · · · an+1.
(2.9.1)
(2.9.2)
Let α : A → A be an algebra morphism such that αf = f α. Then α restricts to a morphism
of (n + 1)-ary totally associative algebras on A(f, ζ). By Corollary 2.8 there is a multiplicative
(n + 1)-ary totally Hom-associative algebra
where
for all ai ∈ A.
A(f, ζ)α = (A(f, ζ), (, ..., )α, α),
(a1, . . . , an+1)α = α(a1 · · · an+1)
(cid:3)
Example 2.10. Let A be the associative algebra over k consisting of polynomials in r ≥ 2 associative
variables X1, . . . , Xr with 0 constant term. Fix an integer n ≥ 2. Let An denote the submodule
of A spanned by the homogeneous polynomials of degrees 1 (mod n). Note that An is actually an
eigenspace A(f, ζ) as in (2.9.1), where ζ ∈ k is a primitive nth root of unity and f : A → A is
determined by
f (Xi) = ζXi
for all i. In any case, An is an (n + 1)-ary totally associative algebra with the (n + 1)-ary product
in (2.9.2). When n = 2 the ternary totally associative algebra A3 is an example in [12] (p.47).
For each i ∈ {1, . . . , r} let mi ≥ 1 be an integer with mi ≡ 1 (mod n). Then the map α : A → A
determined by
α(Xi) = X mi
i
for all i is an algebra morphism that commutes with f . As in Example 2.9 there is a multiplicative
(n + 1)-ary totally Hom-associative algebra (An)α = (An, (, ..., )α, α).
Note that (An, (, ..., )α) is not totally associative because
((X1 · · · X1
)α X2 · · · X2
)α = X
1(n+1)
m2
1
X m2n
2
,
{z
n
n+1
{z
}
}
}
n
{z
{z
n
}
whereas
They are not equal, provided m1 > 1 or m2 > 1.
(X1 · · · X1
(X1 X2 · · · X2
)α)α = X m1(m1+n)
1
X
2n
m2
2
.
(cid:3)
A HOM-ASSOCIATIVE ANALOGUE OF n-ARY HOM-NAMBU ALGEBRAS
7
Example 2.11. Fix an integer n ≥ 2, and let V1, . . . , Vn be k-modules. Consider the direct sum
A =
Hom(Vi, Vi+1),
n
Mi=1
where Vn+1 ≡ V1. A typical element in A is written as ⊕fi, where fi ∈ Hom(Vi, Vi+1) for i ∈
{1, . . . , n}. One can visualize the element ⊕fi ∈ A as the braid diagram
· · ·
V1
2
2
2
2
2
2
2
2
2
2
2
2
2
V2
tiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
V3
2
2
2
2
2
2
2
2
2
2
2
2
2
V4
V2
2
2
2
2
2
2
2
2
2
2
2
2
2
V3
Vn−1
4
4
4
4
4
4
4
4
4
4
4
4
4
4
Vn
· · ·
Vn
V1
on n strands. Define an (n + 1)-ary product on A by
i , . . . , ⊕f n+1
i
where
Fi = f n+1
· · · f n−i+2
1
f n−i+1
n
· · · f 2
i+1f 1
i
(cid:0)⊕f 1
i
i
{z
(cid:1) = ⊕Fi,
{z
n−i+1
}
}
for each i. Pictorially, the (n + 1)-ary product ⊕Fi is represented by the vertical composition of
n + 1 braid diagrams. With this (n + 1)-ary product, A becomes an (n + 1)-ary totally associative
algebra. When n = 2 the ternary totally associative algebra A is an example in [12] (p.46).
For each i ∈ {1, . . . , n}, let γi : Vi → Vi be a linear automorphism. Define the map α : A → A by
α(⊕fi) = ⊕γ−1
i+1fiγi,
where γn+1 ≡ γ1. Then α is an automorphism of (n + 1)-ary totally associative algebras. By
Corollary 2.8 there is a multiplicative n-ary totally Hom-associative algebra
Aα = (A, (, ..., )α = α(, ..., ), α).
Moreover, (A, (, ..., )α) is in general not an n-ary totally associative algebra. For example, suppose
i ∈ Hom(Vi, Vi+1) for i ∈ {1, . . . , n} and f n+1
f i
∈ Hom(V1, V2). Then
1
((f 1
1 , . . . , f n
n , f n+1
1
)α, f 2
2 , . . . , f n+1
1
)α = γ−1
2 f n+1
1
· · · f 2
2 γ−1
2 F1γ2
1 ,
whereas
n , (f n+1
They are not equal in general.
1 , . . . , f n
(f 1
1
, f 2
2 , . . . , f n+1
1
)α)α = γ−2
2 f n+1
1
· · · f 2
2 f n+1
1
γ1f n
n · · · f 1
1 γ1.
(cid:3)
3. Totally Hom-associative algebras of different arities
There are two main results in this section. The first main result (Theorem 3.1) says that every
multiplicative n-ary totally Hom-associative algebra yields a multiplicative (2n−1)-ary totally Hom-
associative algebra. The second main result (Theorem 3.4) says that under suitable conditions an
n-ary totally Hom-associative algebra reduces to an (n − 1)-ary totally Hom-associative algebra.
Both of these results can be iterated.
Here is the first main result of this section. The Hom-Nambu analogue is discussed in [24]. Recall
the abbreviations in (2.1.1).
t
8
DONALD YAU
Theorem 3.1. Let (A, (, ..., ), α) be a multiplicative n-ary totally Hom-associative algebra. Then
A1 = (A, (, ..., )(1), α2)
is a multiplicative (2n − 1)-ary totally Hom-associative algebra, where
(a1,2n−1)(1) = ((a1,n), α(an+1,2n−1))
for all ai ∈ A.
Proof. It is clear that A1 is a multiplicative (2n − 1)-ary Hom-algebra. We must show that its jth
Hom-associator asj
A1 (Definition 2.3) is equal to 0, that is,
(cid:16)α2(a1,j−1), (aj,j+2n−2)(1), α2(aj+2n−1,4n−3)(cid:17)(1)
=(cid:16)α2(a1,j), (aj+1,j+2n−1)(1), α2(aj+2n,4n−3)(cid:17)(1)
(3.1.1)
for all j ∈ {1, . . . , 2n − 2}. The condition (3.1.1) is divided into three cases: (1) j ≤ n − 1, (2) j = n,
and (3) j ≥ n + 1. Note that the case j ≥ n + 1 does not occur if n = 2. The three cases are proved
similarly, so we only provide the details for case (3), which is the only case where multiplicativity is
used. With j ≥ n + 1, using the multiplicativity and total Hom-associativity of A, we compute the
left-hand side of (3.1.1) as follows:
(cid:16)α2(a1,j−1), (aj,j+2n−2)(1), α2(aj+2n−1,4n−3)(cid:17)(1)
=(cid:0)(α2(a1,n)), α3(an+1,j−1), α ((aj,j+n−1), α(aj+n,j+2n−2)) , α3(aj+2n−1,4n−3)(cid:1)
=(cid:0)(α2(a1,n)), α3(an+1,j−1), α (α(aj), (aj+1,j+n), α(aj+n+1,j+2n−2)) , α3(aj+2n−1,4n−3)(cid:1)
=(cid:0)α2((a1,n)), α3(an+1,j−1),(cid:0)α2(aj), α(aj+1,j+n), α2(aj+n+1,j+2n−2)(cid:1) , α3(aj+2n−1,4n−3)(cid:1)
=(cid:0)α2((a1,n)), α3(an+1,j),(cid:0)α(aj+1,j+n), α2(aj+n+1,j+2n−1)(cid:1) , α3(aj+2n,4n−3)(cid:1)
=(cid:0)(α2(a1,n)), α3(an+1,j), α((aj+1,j+n), α(aj+n+1,j+2n−1)), α3(aj+2n,4n−3)(cid:1)
The last expression above is equal to the right-hand side of (3.1.1), as desired.
(cid:3)
Applying Theorem 3.1 repeatedly, we obtain the following result. It says that every multiplica-
tive n-ary totally Hom-associative algebra gives rise to a sequence of multiplicative totally Hom-
associative algebras of exponentially higher arities.
Corollary 3.2. Let (A, (, ..., ), α) be a multiplicative n-ary totally Hom-associative algebra. Define
the (2k(n − 1) + 1)-ary product (, ..., )(k) inductively by setting (, ..., )(0) = (, ..., ) and
(cid:0)a1,2k(n−1)+1(cid:1)(k)
for k ≥ 1. Then
=(cid:16)(cid:0)a1,2k−1(n−1)+1(cid:1)(k−1)
, α2k−1(cid:0)a2k−1(n−1)+2,2k(n−1)+1(cid:1)(cid:17)(k−1)
Ak = (A, (, ..., )(k), α2k
)
is a multiplicative (2k(n − 1) + 1)-ary totally Hom-associative algebra for each k ≥ 0.
For example, when k = 2 we have:
(a1,4n−3)(2) =(cid:16)(a1,2n−1)(1) , α2(a2n,4n−3)(cid:17)(1)
=(cid:0)(cid:0)((a1,n), α(an+1,2n−1)) , α2(a2n,3n−2)(cid:1) , α3(a3n−1,4n−3)(cid:1) .
A HOM-ASSOCIATIVE ANALOGUE OF n-ARY HOM-NAMBU ALGEBRAS
9
When k = 3, writing x = (a1,4n−3)(2), we have:
(a1,8n−7)(3) =(cid:0)x, α4(a4n−2,8n−7)(cid:1)(2)
=(cid:0)(cid:0)(cid:0)(x, α4(a4n−2,5n−4)), α5(a5n−3,6n−5)(cid:1) , α6(a6n−4,7n−6)(cid:1) , α7(a7n−5,8n−7)(cid:1) .
In general, (, ..., )(k) involves an iterated composition of 2k copies of the n-ary product (, ..., ) and
n − 1 copies of αi for each i ∈ {1, . . . , 2k − 1}.
Restricting to the case α = Id in Corollary 3.2, we obtain the following construction result for
higher arity totally associative algebras.
Corollary 3.3. Let (A, (, ..., )) be an n-ary totally associative algebra. Define the (2k(n − 1) + 1)-ary
product (, ..., )(k) inductively by setting (, ..., )(0) = (, ..., ) and
(cid:0)a1,2k(n−1)+1(cid:1)(k)
for k ≥ 1. Then
=(cid:16)(cid:0)a1,2k−1(n−1)+1(cid:1)(k−1)
, a2k−1(n−1)+2,2k(n−1)+1(cid:17)(k−1)
Ak = (A, (, ..., )(k))
is a multiplicative (2k(n − 1) + 1)-ary totally associative algebra for each k ≥ 0.
The following result is the second main result of this section. It gives sufficient conditions under
which an n-ary totally Hom-associative algebra reduces to an (n − 1)-ary totally Hom-associative
algebra. This result is the totally Hom-associative analogue of results due to Pozhidaev [19] and
Filippov [8] about n-ary Maltsev algebras and Nambu-Lie algebras, respectively. The n-ary Hom-
Nambu(-Lie) and Hom-Maltsev analogues can be found in [24] and [25], respectively.
Theorem 3.4. Let (A, (, ..., ), α) be an n-ary totally Hom-associative algebra with n ≥ 3. Suppose
a ∈ A satisfies
(1) αn−1(a) = a, and
(2) (x1,n−1, a) = (x1,n−2, a, xn−1) for all xi ∈ A.
Then
is an (n − 1)-ary totally Hom-associative algebra, where
A1 = (A, (, ..., )′, α′)
(x1,n−1)′ = (x1,n−1, a) and α′ = (α1, . . . , αn−2)
for all xi ∈ A. Moreover, if A is multiplicative, then so is A1.
Proof. The multiplicativity assertion is clear. We must show that for j ∈ {1, . . . , n − 2}, the jth
Hom-associator asj
A1 is equal to 0, that is,
(α1,j−1(x1,j−1), (xj,j+n−2)′, αj,n−2(xj+n−1,2n−3))
′
= (α1,j(x1,j ), (xj+1,j+n−1)′, αj+1,n−2(xj+n,2n−3))
′
.
(3.4.1)
Using the assumptions on a and the total Hom-associativity of A, we compute the left-hand side of
(3.4.1) as follows:
(α1,j−1(x1,j−1), (xj,j+n−2)′, αj,n−2(xj+n−1,2n−3))
′
= (α1,j−1(x1,j−1), (xj,j+n−2, a), αj,n−2(xj+n−1,2n−3), αn−1(a))
= (α1,j(x1,j), (xj+1,j+n−2, a, xj+n−1), αj+1,n−2(xj+n,2n−3), αn−1(a))
= (α1,j(x1,j), (xj+1,j+n−1, a), αj+1,n−2(xj+n,2n−3), a) .
10
DONALD YAU
The last expression above is equal to the right-hand side of (3.4.1), as desired.
(cid:3)
Note that in Theorem 3.4 the first assumption about a is automatically satisfied if αn−1 is the
identity map on A. On the other hand, the second assumption on a is automatically satisfied if the
n-ary product (, ..., ) is commutative in the last two variables.
Applying Theorem 3.4 repeatedly, we obtain the following result. It gives sufficient conditions un-
der which an n-ary totally Hom-associative algebra reduces to an (n−k)-ary totally Hom-associative
algebra.
Corollary 3.5. Let (A, (, ..., ), α) be an n-ary totally Hom-associative algebra with n ≥ 3. Suppose
there exist a1, . . . , ak ∈ A for some k ≤ n − 2 such that
(1) αn−i(ai) = ai for all i ∈ {1, . . . , k}, and
(2) (x1,n−i, ai, ai−1, . . . , a1) = (x1,n−i−1, ai, xn−i, ai−1, . . . , a1) for all i ∈ {1, . . . , k} and xj ∈ A.
Then
is an (n − k)-ary totally Hom-associative algebra, where
Ak = (A, (, ..., )k, (α1, . . . , αn−1−k))
(x1,n−k)k = (x1,n−k, ak, ak−1, . . . , a1)
for all xj ∈ A. Moreover, if A is multiplicative, then so is Ak.
4. From totally Hom-associative algebras to Hom-Nambu algebras
The main result of this section says that an n-ary totally Hom-associative algebra with equal
twisting maps yields an n-ary Hom-Nambu algebra via the n-commutator bracket.
Let us first define the n-commutator words, which generalize the two terms in the usual commu-
tator bracket.
Definition 4.1. Let X1, X2, . . . be non-commuting variables. For n ≥ 2 define the set Wn of
n-commutator words inductively as
W2 = {X1X2, −X2X1}
Wn = {zXn, −Xnz : z ∈ Wn−1}
and
for n > 2.
For example,
and W4 consists of the 4-commutator words
W3 = {X1X2X3, −X2X1X3, −X3X1X2, X3X2X1}
X1X2X3X4, −X2X1X3X4, −X3X1X2X4, X3X2X1X4,
− X4X1X2X3, X4X2X1X3, X4X3X1X2, −X4X3X2X1.
In general, Wn consists of 2n−1 n-commutator words. Every n-commutator word gives a self-map
on the n-fold tensor product as follows.
A HOM-ASSOCIATIVE ANALOGUE OF n-ARY HOM-NAMBU ALGEBRAS
11
Definition 4.2. Let V be a k-module and w = ±Xi1 · · · Xin ∈ Wn. Define the map w : V ⊗n → V ⊗n
by
w(v1, . . . , vn) = ±vi1 ⊗ · · · ⊗ vin
for all vj ∈ V .
Using these maps defined by the n-commutator words, we can now define the n-commutator
bracket.
Definition 4.3. Let (A, (, ..., ), α) be an n-ary Hom-algebra. Define the n-commutator bracket
[, ... , ] : A⊗n → A⊗n by
(w(a1, . . . , an))
(4.3.1)
[a1, . . . , an] = Xw∈Wn
for all aj ∈ A.
For example, the 2-commutator bracket is the usual commutator bracket:
[a1, a2] = (a1a2) − (a2a1).
The 3-commutator bracket is the sum
[a1,3] = (a1a2a3) − (a2a1a3) − (a3a1a2) + (a3a2a1),
which was first used in Corollary 4.3 in [24].
Let us now recall the definition of an n-ary Hom-Nambu algebra from [3].
Definition 4.4. Let (V, [, ... , ], α) be an n-ary Hom-algebra.
(1) The n-ary Hom-Jacobian of V is the (2n − 1)-linear map J n
V : V ⊗2n−1 → V defined as
(using the shorthand in (2.1.1))
J n
V (x1,n−1; y1,n) = [α1,n−1(x1,n−1), [y1,n]]
−
[α1,i−1(y1,i−1), [x1,n−1, yi], αi,n−1(yi+1,n)]
(4.4.1)
n
Xi=1
for x1, . . . , xn−1, y1, . . . , yn ∈ V .
(2) An n-ary Hom-Nambu algebra is an n-ary Hom-algebra V that satisfies
called the n-ary Hom-Nambu identity.
J n
V = 0,
When the twisting maps are all equal to the identity map, n-ary Hom-Nambu algebras are the
V is called the
V = 0 is called the n-ary Nambu identity.
usual n-ary Nambu algebras [4, 8, 16, 18]. In this case, the n-ary Hom-Jacobian J n
n-ary Jacobian, and the n-ary Hom-Nambu identity J n
We are now ready for the main result of this section.
Theorem 4.5. Let (A, (, ..., ), α) be an n-ary totally Hom-associative algebra with equal twisting
maps. Then
N (A) = (A, [, ... , ], α)
is an n-ary Hom-Nambu algebra, where [, ... , ] is the n-commutator bracket in (4.3.1). Moreover, if
A is multiplicative, then so is N (A).
12
DONALD YAU
Since the n-commutator bracket does not involve the twisting maps, we have the following special
case of Theorem 4.5
Corollary 4.6. Let (A, (, ..., )) be an n-ary totally associative algebra with equal twisting maps.
Then
is an n-ary Nambu algebra, where [, ... , ] is the n-commutator bracket.
N (A) = (A, [, ... , ])
For the proof of Theorem 4.5, we need to prove the n-ary Hom-Nambu identity J n
N (A) = 0. In
the following Lemmas, we first compute the various terms in the n-ary Hom-Jacobian J n
N (A) (4.4.1).
The n terms in the sum in (4.4.1) are considered in two cases, i = n (Lemma 4.8) and 1 ≤ i ≤ n − 1
(Lemma 4.10).
Let us compute the first term in the n-ary Hom-Jacobian J n
N (A).
Lemma 4.7. With the hypotheses of Theorem 4.5, we have
[α(x1,n−1), [y1,n]] = Xz,z ′∈Wn−1
− Xz,z ′∈Wn−1
− Xz,z ′∈Wn−1
+ Xz,z ′∈Wn−1
(z′(α(x1,n−1)), (z(y1,n−1), yn))
(z′(α(x1,n−1)), (yn, z(y1,n−1)))
((z(y1,n−1), yn), z′(α(x1,n−1)))
((yn, z(y1,n−1)), z′(α(x1,n−1)))
(4.7.1)
for all xj , yl ∈ A.
Proof. From the definitions of the n-commutator bracket (4.3.1) and the n-commutator words (Def-
inition 4.1), we have
(w(a1,n))
[a1,n] = Xw∈Wn
= Xz∈Wn−1
(z(a1,n−1), an) − (an, z(a1,n−1)).
(4.7.2)
for all aj ∈ A. The Lemma is obtained by using (4.7.2) on both [y1,n] and [α(x1,n−1), ·].
(cid:3)
In Lemma 4.7 we did not use the total Hom-associativity of A. In the next result, we compute
the i = n term in the sum in the n-ary Hom-Jacobian J n
N (A).
Lemma 4.8. With the hypotheses of Theorem 4.5, we have
−[α(y1,n−1), [x1,n−1, yn]] = − Xz,z ′∈Wn−1
+ Xz,z ′∈Wn−1
+ Xz,z ′∈Wn−1
− Xz,z ′∈Wn−1
(z(α(y1,n−1)), (z′(x1,n−1), yn))
((z(y1,n−1), yn), z′(α(x1,n−1)))
(z′(α(x1,n−1)), (yn, z(y1,n−1)))
(4.8.1)
((yn, z′(x1,n−1)), z(α(y1,n−1)))
for all xj , yl ∈ A.
A HOM-ASSOCIATIVE ANALOGUE OF n-ARY HOM-NAMBU ALGEBRAS
13
Proof. Using (4.7.2) we have
−[α(y1,n−1), [x1,n−1, yn]] = − Xz,z ′∈Wn−1
+ Xz,z ′∈Wn−1
+ Xz,z ′∈Wn−1
− Xz,z ′∈Wn−1
(z(α(y1,n−1)), (z′(x1,n−1), yn))
(z(α(y1,n−1)), (yn, z′(x1,n−1)))
((z′(x1,n−1), yn), z(α(y1,n−1)))
(4.8.2)
((yn, z′(x1,n−1)), z(α(y1,n−1))) .
The first (resp., fourth) sums in (4.8.1) and (4.8.2) are equal. The second (resp., third) sums in
(4.8.1) and (4.8.2) are equal by the total Hom-associativity of A.
(cid:3)
Combining Lemmas 4.7 and 4.8, we obtain the following result.
Lemma 4.9. With the hypotheses of Theorem 4.5, we have
[α(x1,n−1), [y1,n]] − [α(y1,n−1), [x1,n−1, yn]]
= Xz,z ′∈Wn−1
+ Xz,z ′∈Wn−1
− Xz,z ′∈Wn−1
− Xz,z ′∈Wn−1
(z′(α(x1,n−1)), (z(y1,n−1), yn))
((yn, z(y1,n−1)), z′(α(x1,n−1)))
(z(α(y1,n−1)), (z′(x1,n−1), yn))
((yn, z′(x1,n−1)), z(α(y1,n−1)))
A1
{z
Bn1
A4
{z
{z
{z
Bn4
}
}
}
}
for all xj , yl ∈ A.
Proof. This follows from Lemmas 4.7 and 4.8 because the second (resp., third) sum in (4.7.1) is
equal to the third (resp., second) sum in (4.8.1) with the opposite sign.
(cid:3)
The labels A1, A4, Bn1, and Bn4 will be used below.
Next we compute the ith term (1 ≤ i ≤ n − 1) in the sum in the n-ary Hom-Jacobian J n
N (A).
Lemma 4.10. With the hypotheses of Theorem 4.5, for i ∈ {1, . . . , n − 1} we have
−[α(y1,i−1), [x1,n−1, yi], α(yi+1,n)]
= − Xz,z ′∈Wn−1
+ Xz,z ′∈Wn−1
+ Xz,z ′∈Wn−1
− Xz,z ′∈Wn−1
(z(α(y1,i−1), (z′(x1,n−1), yi), α(yi+1,n−1)), α(yn))
(α(yn), z(α(y1,i−1), (z′(x1,n−1), yi), α(yi+1,n−1)))
(z(α(y1,i−1), (yi, z′(x1,n−1)), α(yi+1,n−1)), α(yn))
(α(yn), z(α(y1,i−1), (yi, z′(x1,n−1)), α(yi+1,n−1)))
Bi1
{z
{z
{z
{z
Bi2
Bi3
Bi4
}
}
}
}
14
DONALD YAU
for all xj , yl ∈ A.
Proof. Just use (4.7.2) twice, as in Lemma 4.7.
(cid:3)
Using Lemmas 4.9 and 4.10 we can now give the proof of Theorem 4.5.
Proof of Theorem 4.5. Since the multiplicativity assertion is clear, it remains to establish the n-ary
Hom-Nambu identity J n
N (A) = 0. By Lemmas 4.9 and 4.10 the n-ary Hom-Jacobian J n
N (A) is
J n
N (A) = Xz,z ′∈Wn−1 A1 + A4 − Bn1 − Bn4 +
(−Bi1 + Bi2 + Bi3 − Bi4)! .
n−1
Xi=1
(4.10.1)
The total Hom-associativity of A implies the following six types of cancellation. For i ∈ {1, . . . , n−1}
we have:
z=±Xi ···∈Wn−1
Xz ′∈Wn−1
Xz ′∈Wn−1
z=±···Xi ∈Wn−1
(A1 − Bi1) = 0,
(−Bn1 + Bi3) = 0,
z=±···Xi∈Wn−1
Xz ′∈Wn−1
Xz ′∈Wn−1
z=±Xi ···∈Wn−1
(A4 − Bi4) = 0,
(−Bn4 + Bi2) = 0.
For i 6= j in {1, . . . , n − 1} we have:
Xz ′∈Wn−1
z=±···Xj Xi ···∈Wn−1
(−Bi1 + Bj3) = 0,
Xz ′∈Wn−1
z=±···Xj Xi ···∈Wn−1
(Bi2 − Bj4) = 0.
Here z = ±Xi · · · ∈ Wn−1 (resp., z = ± · · · Xi ∈ Wn−1) means that z is an (n − 1)-commutator
word starting (resp., ending) with Xi. Likewise, z = ± · · · XjXi · · · ∈ Wn−1 means that z is an
(n − 1)-commutator word in which Xi is immediately preceded by Xj. Using the expression (4.10.1)
for J n
N (A), these six types of cancellation imply that N (A) satisfies the n-ary Hom-Nambu identity
J n
N (A) = 0.
(cid:3)
References
[1] F. Ammar, A. Makhlouf,
and S. Silvestrov, Ternary q-Virasoro-Witt Hom-Nambu-Lie algebras,
arXiv:1002.4116v1.
[2] J. Arnlind, A. Makhlouf, and S. Silvestrov, Ternary Hom-Nambu-Lie algebras induced by Hom-Lie algebras, to
appear in J. Math. Phys., arXiv:0912.0116.
[3] H. Ataguema, A. Makhlouf, and S. Silvestrov, Generalization of n-ary Nambu algebras and beyond, J. Math.
Phys. 50, no. 8 (2009), 083501.
[4] J.A. de Azc´arraga and J.M. Izquierdo, n-ary algebras: A review with applications, arXiv:1005.1028v1.
[5] J.A. de Azc´arraga and and J.C. P´erez-Bueno, Higher-order simple Lie algebras, Comm. Math. Phys. 184 (1997)
669-681.
[6] J. Bagger and N. Lambert, Gauge symmetry and supersymmetry of multiple M2-branes, Phys. Rev. D 77 (2008),
no. 6, 065008, 6 pp.
[7] M.R. Bremner and L.A. Peresi, Ternary analogues of Lie and Malcev algebras, Linear Alg. Appl. 414 (2006)
1-18.
[8] V.T. Filippov, n-Lie algebras, Sib. Mat. Zh. 26 (1985) 126-140.
[9] J.T. Hartwig, D. Larsson, and S.D. Silvestrov, Deformations of Lie algebras using σ-derivations, J. Algebra 295
(2006) 314-361.
[10] N. Jacobson, Lie and Jordan triple systems, Amer. J. Math. 71 (1949) 149-170.
[11] W.G. Lister, A structure theory of Lie triple systems, Trans. Amer. Math. Soc. 72 (1952) 217-242.
[12] W.G. Lister, Ternary rings, Trans. Amer. Math. Soc 154 (1971) 37-55.
[13] A. Makhlouf, Hom-alternative algebras and Hom-Jordan algebras, arXiv:0909.0326.
A HOM-ASSOCIATIVE ANALOGUE OF n-ARY HOM-NAMBU ALGEBRAS
15
[14] A. Makhlouf and S. Silvestrov, Hom-algebra structures, J. Gen. Lie Theory Appl. 2 (2008) 51-64.
[15] K. Meyberg, Jordan-Tripelsysteme und die Koecher-Konstruktion von Lie-Algebren, Math. Z. 115 (1970) 58-78.
[16] Y. Nambu, Generalized Hamiltonian dynamics, Phys. Rev. D 7 (1973), 2405-2412.
[17] S. Okubo, Introduction to octonion and other non-associative algebras in physics, Cambridge Univ. Press,
Cambridge, UK, 1995.
[18] N.G. Pletnev, Filippov-Nambu n-algebras relevant to physics, Sib. ´Elektron. Mat. Izv. 6 (2009) 272-311.
[19] A.P. Pozhidaev, n-ary Mal'tsev algebras, Alg. Logic. 40 (2001) 170-182.
[20] L. Takhtajan, On foundations of generalized Nambu mechanics, Comm. Math. Phys. 160 (1994) 295-315.
[21] D. Yau, Enveloping algebras of Hom-Lie algebras, J. Gen. Lie Theory Appl. 2 (2008) 95-108.
[22] D. Yau, Hom-algebras and homology, J. Lie Theory 19 (2009) 409-421.
[23] D. Yau, Hom-Maltsev, Hom-alternative, and Hom-Jordan algebras, arXiv:1002.3944.
[24] D. Yau, On n-ary Hom-Nambu and Hom-Nambu-Lie algebras, arXiv:1004.2080.
[25] D. Yau, On n-ary Hom-Nambu and Hom-Maltsev algebras, arXiv:1004.4795.
Department of Mathematics, The Ohio State University at Newark, 1179 University Drive, Newark,
OH 43055, USA
E-mail address: [email protected]
|
1207.3487 | 1 | 1207 | 2012-07-15T09:48:31 | Categorical notions of layered tropical algebra and geometry | [
"math.RA",
"math.CT"
] | This paper supplements [17], showing that categorically the layered theory is the same as the theory of ordered monoids (e.g. the max-plus algebra) used in tropical mathematics. A layered theory is developed in the context of categories, together with a "tropicalization functor" which permits us to pass from usual algebraic geometry to the tropical world. We consider tropical varieties from this categorical viewpoint, with emphasis on polynomial functions and their roots. | math.RA | math |
CATEGORICAL NOTIONS OF
LAYERED TROPICAL ALGEBRA AND GEOMETRY
ZUR IZHAKIAN, MANFRED KNEBUSCH, AND LOUIS ROWEN
Abstract. This paper supplements [17], showing that categorically the layered theory is the same as
the theory of ordered monoids (e.g. the max-plus algebra) used in tropical mathematics. A layered
theory is developed in the context of categories, together with a "tropicalization functor" which permits
us to pass from usual algebraic geometry to the tropical world. We consider tropical varieties from this
categorical viewpoint, with emphasis on polynomial functions and their roots.
1. Introduction
Tropical geometry has led to considerable mathematical success in degenerating various combinatoric
questions. At the algebraic level, the degeneration often has led to the max-plus algebra, but in certain
ways this is too crude a process to preserve many important algebraic properties. Over the last few
years, the theory of supertropical algebras has been developed in a series of papers including [16], [22],
[23], [24], and [25], in which classical notions of commutative algebra pertaining to algebraic varieties,
matrices, and valuations, carry over intrinsically to the "tropical" world. This degeneration still is too
crude to handle several issues, such as multiple roots of polynomials. A more refined structure, called
L-layered domains, was introduced in [17] together with its basic traits, in order to be able to preserve
more algebraic properties.
Recent years have seen considerable progress in the algebraic perspective of tropical geometry. Notably,
building on work of Bieri-Groves [5], Berkovich [3] and Payne [36] have shown how to view the analyti-
fication of an affine variety algebraically, in terms of valuations and multiplicative seminorms extending
valuations.
This paper is part of a series including [17] and [20]. In [17] we showed by example how the layered
structure can cope with algebraic aspects of tropical mathematics that are inaccessible to less refined
structures; some of these examples are reviewed here for the reader's convenience.
Our main purpose in this paper is to provide a more formal, unified foundation for further study,
for both the algebraic and geometric aspects. Since category theory pervades modern mathematics so
thoroughly, one feels obligated to describe the theory in categorical terms, and indeed this language
provides valuable information as to how the theory should progress, thereby throwing further light on
tropical geometry. We aim to understand those categories arising from algebraic considerations, focusing
on those algebraic aspects of the theory that reflect most directly on tropical geometry, largely via
a Zariski-type correspondence. To describe these categories in full detail would involve an inordinate
amount of technical detail, so we often make simplifying assumptions when they do not impact on the
tropical applications. Even so, each aspect of the theory involves its corresponding categories, and so
Date: April 3, 2019.
2010 Mathematics Subject Classification. Primary 06F20, 11C08, 12K10, 14T05, 14T99, 16Y60; Secondary 06F25,
16D25.
Key words and phrases. Tropical categories, tropical algebra, tropical geometry, valued monoids, valuation, tropicaliza-
tion, Zariski topology.
This research of the first and third authors is supported by the Israel Science Foundation (grant No. 448/09).
The research of the first author has been supported by the Oberwolfach Leibniz Fellows Programme (OWLF), Mathe-
matisches Forschungsinstitut Oberwolfach, Germany.
The second author was supported in part by the Gelbart Institute at Bar-Ilan University, the Minerva Foundation at
Tel-Aviv University, the Mathematics Dept. of Bar-Ilan University, and the Emmy Noether Institute. Research on this
paper was carried out by the three authors in the Resarch in Pairs program of the MFO in Oberwohlfach.
We thank Steve Shnider and Erez Sheiner for explaining the proof of Payne's theorem in our tropical seminar.
1
2
Z. IZHAKIAN, M. KNEBUSCH, AND L. ROWEN
there are many categories to be described here. Although the language involves some technicalities, we
try to keep it to a minimum, leaving subtler matters to [20]. Another related paper is [19], which delves
into considerable detail in the supertropical setting, for which we generalize parts to the layered setting,
To obtain the appropriate functors, we need first to make categories of the classical "algebraic world"
and the "tropical world." Informally, the classical "algebraic world" is described by the categories asso-
ciated to classical algebraic geometry, often over the complex numbers C.
A deep connection between tropical geometry and valuation theory is already implicit in [5], and it is
convenient to work over algebraically closed fields with valuation. Thus, as the algebraic aspect of the
tropical theory has developed, C has been replaced by the field of Puiseux series, an algebraically closed
field endowed with a (nonarchimedean) valuation, whose target is an ordered group, so it makes sense to
work with ordered groups, or, slightly more generally, ordered monoids.
There has been considerable recent interest in developing algebraic geometry over arbitrary monoids
[4, 8], and we shall draw on their work. One theme of this paper is how the assumption of an order on
the monoid enriches the theory. The ordered monoid most commonly used in the tropical world is the
"max-plus" algebra M (or its dual, the "min-plus" algebra), cf. [1], [2], [14], and [30]. Our first main
result (Proposition 3.11), which sets the flavor for the paper, is that the category of ordered cancellative
monoids is isomorphic to the category of bipotent semirings (without a zero element). Any ordered
monoid can be viewed as a semiring, where multiplication is the given monoid operation and addition is
defined by taking a + b to be max{a, b} in Proposition 3.11. The universal of the appropriate forgetful
functor is constructed in this context, in Proposition 3.13.
Since the underlying algebraic structures now are semirings, we switch to the language of semirings in
order to be able to adapt concepts from ring theory and module theory, such as polynomials and matrices.
We find it more convenient to work in the category of semirings†, defined as semirings not necessarily
having a zero element, for the following reasons:
• The duality given in Proposition 3.12 holds for semirings† but not for semirings;
• Proofs are usually neater for semirings†, since the zero element 0 of a semiring needs special
treatment;
• Many important examples (such as Laurent series and tori) are defined over semirings† but
not over semirings (and in particular, Bieri-Groves' main theorem [5, Theorem A] is given for
multiplicative groups);
• Once we get started with the layered theory, it is more natural to utilize a 0-layer (an ideal
comprised of several elements) rather than a single element 0; anyway, one can recover the
element 0 by inserting it into the 0-layer.
One might counter that various critical aspects of geometry such as intersection theory (which involve
curves such as xy = 0) require a zero element. This turns out to be less important in the tropical theory
since the zero element, −∞, already is artificial, and can be dealt with at the appropriate time.
To describe tropicalization categorically, we utilize the category ValField describing fields with valua-
tion, or, slightly more generally, the category ValDom describing integral domains with valuations. (In
the sequel [20] to this paper, we proceed still further, with valued rings.) The theory is applicable to fields
with valuation, in particular to the Puiseux series field. Intuitively, the corresponding tropical category
just reformulates the valuation, where the operations are taken from the target of the valuation. Our
category ValMon (cf. §4) is described in the language of monoids, in order to permit other tropicalization
techniques.
At this point, let us stress that one principal role of the tropical algebra is to provide an intrinsic
algebraic setting for studying valuations in ValField and their extensions, as described in §6.2, via Maslov
dequantization [29] or the degeneration of "amoebas" [11], [32], and [40]. In a few words, one takes the
power valuation to pass from the Puiseux series field to Q, viewed as the max-plus algebra. This is
formalized in Remark 4.9 as the functor Fval from the category of valued monoids to the category of
ordered monoids (or, equivalently, bipotent semirings).
Unfortunately, the algebraic theory of bipotent semirings† is too weak to provide much information
without additional structure. Accordingly, the algebra M was extended to extended tropical arith-
metic [15] which evolved into the supertropical domain [22] and then to the layered domain† R(L,G)
CATEGORICAL LAYERED MATHEMATICS
3
of an ordered monoid G with respect to an indexing semiring† L, called the the sorting set, cf. [17, Def-
inition 3.5]. L-layered domains† become max-plus algebras when L is {1} and become supertropical
domains when L is {1,∞}.
The general L-layered theory, set forth in §5 and §6, has many advantages over the other theories, as
shown in [17], because it enables us to distinguish among different ghost levels. This is really a linguistic
distinction, as is explained in the next paragraph. Nevertheless, there is a definite advantage in making
use of the tools available in the language of layered semirings.
Whereas the supertropical domain enables us to distinguish multiple tropical roots (say in the poly-
nomial f (λ) = (λ + 3)2) from single roots, it does not say anything about the multiplicity of the corner
root 3. Thus, it would not enable us to tell intrinsically whether 3 is a root or a pole of the function (λ+3)j
(λ+3)k ,
whereas questions of this sort are answered at once in the layered structure. More sophisticated geometric
examples are given in Example 7.24.
For the reader's convenience let us point also to several applications of the layered structure from [17]:
• [17, Theorem 8.25] The ν-multiplicativity of the resultant of tropical polynomials (in one inde-
terminate).
• [17, Theorem 8.33] The multiplicativity of the resultant of products of primary tropical polyno-
mials (in one indeterminate).
• [17, Theorem 9.8] The computation of the layered discriminant of a tropical polynomial.
• [17, Example 10.6] Multiplicity of roots of tropical polynomials, by means of [17, Equation (9.1)].
• [17, Example 10.8] Unique factorization in many cases, as well as integration being defined.
Thus, we rely heavily on Construction 5.1 in order to pass back and forth between cancellative ordered
monoids and L-layered domains†, and this should be considered the main thrust of the layering procedure.
Note that Construction 5.1 is formulated for semirings† without 0, in order to avoid complications. The
more general theory is given in [20].
Intuitively, to obtain the appropriate layered category one might expect to take morphisms to be
semiring† homomorphisms that preserve the layers, and these indeed play a key role to be described below.
The category of main interest for the tropical algebraic theory is the category ULayBidom† of uniform L-
layered bi-domains†, which by Theorem 6.3 is isomorphic to the category OMon+ of cancellative ordered
monoids, under the natural functor that restricts a uniform L-layered bi-domain† to its submonoid of
tangible elements. In this way, we begin to see how identifications of categories help guide us in developing
the theory.
This leads us to a delicate side issue. Although the ordered monoids of interest in the tropical theory
are cancellative, such as the real max-plus algebra or, more generally, any ordered group, homomorphic
images of cancellative monoids need not be cancellative. Thus, for a rich algebraic theory, we need a way
of passing from arbitrary ordered monoids to layered semirings†. Unfortunately the naive generalization
of Construction 5.1 is not a semiring† since distributivity fails! In order not to go too far afield in this
paper, we stick with cancellative monoids, and consider noncancellative monoids in [20].
In §6.2, we get to the functor FLTrop : ValMon+ → ULayBidom†, which describes the passage to the
layered tropical world. FLTrop is applied to fields with valuation, in particular the field of Puiseux series,
and enables one to translate equality to the "surpassing relation" described in [17, §3.2]. In full generality
the functor FLTrop involves subtleties discussed in [20].
The functor FLTrop is not faithful, since it only measures the action of the given valuation, and does not
enable us to distinguish among elements having the same value. Thus in §6.3 we also introduce briefly the
exploded tropicalization functor utilized in [31] and another functor FLTrop;unit which retains extra
information given in Proposition 6.10, such as is contained in "coamoebas." Borrowing from classical
valuation theory, we describe the exploded tropicalization functor in terms of the associated graded
algebra, noting that in the case of the field of Puiseux series, the components of the associated graded
algebra can be identified with the base field.
Although monoids recently have been seen to provide much of the underpinning for algebraic geometry,
cf. [4, 8, 33, 34] for example, classical algebraic geometry relies for a large part on roots of polynomials,
which can be understood more easily using semirings†. Our approach to tropical geometry is to define
affine varieties as sets of "ghost roots" of polynomials.
4
Z. IZHAKIAN, M. KNEBUSCH, AND L. ROWEN
As is well known, and discussed in detail in [22], in contrast to the classical situation for polynomials
over algebras over an infinite field, different tropical polynomials over a semiring† R often take on the
same values identically, viewed as functions. Furthermore, in max-plus situations one often wants to use
variants such as Laurent polynomials (involving λ−1 as well as λ) or polynomials with rational exponents,
or even more generally one could talk in the language of the lattice of characters and its dual lattice,
cf. [35, §2.2]. Also, as in classical algebraic geometry, we often want to limit the domain of definition
to a given subset of R(n) such as an algebraic variety. Thus, we work directly with functions from
a set S to a layered domain, denoted Fun(S, R), or, more specifically, polynomially defined functions,
denoted Pol(S, R) or Laurent polynomially defined functions, denoted Laur(S, R). In Proposition 7.8 we
check that passing to the monoid of functions from S to an ordered monoid M and then translating to
semirings† yields the same categorical theory as moving first to a bipotent semiring† and then passing to
its function semiring†.
Thus, taking S ⊂ R(n), we redefine polynomials and monomials over R intrinsically as functions from S
to R, leading to an analog of the Zariski topology in Definition 9.2. This enables us to define a coordinate
semiring† via Definition 9.5.
Our view of tropical geometry relies largely on Kapranov's Theorem, as extended by [36], which
describes the 1:1 correspondence between roots of polynomials and corner roots of their tropicalizations.
This process is understood categorically in terms of the supertropical structure, in §8. Ironically, although
the Kapranov-Payne Theorem can be stated in the language of the tropicalization functor FLTrop, the
exploded tropicalization functor is needed (at least implicitly) in order to carry out the proof.
1.1. Overview of the major categories and functors in this paper.
In summary, let us review the main algebraic categories and their uses.
• The category ValField (resp. ValMon) describing fields with valuation (resp. integral domains)
with valuation. This is the ultimate arena of investigation, but its theory often is very difficult,
thereby historically giving rise to tropical mathematics, which can be thought of as a degeneration
of ValField.
• The category OMon+ of cancellative ordered monoids, which is isomorphic to the category Bipot†
of bipotent semirings. This is the traditional algebraic category underpinning tropical mathemat-
ics, but is too coarse a degeneration for many algebraic arguments, and often requires returning
to ValField in proofs.
• The category ULayBidom† of uniform L-layered bi-domains†. For L = {1} this is just the
category OMon+. For L = {1,∞} or L = {0, 1,∞} we get the supertropical theory, which suffices
in linear algebra for the investigation of nonsingular matrices, bases, characteristic polynomials,
and related notions. In order to discuss multiple roots of polynomials and singularity of curves,
one needs to take L containing N.
• The category of exploded L-layered bi-domains†. This is used by Sheiner and Shnider for the
proof of the Kapranov-Payne theorem, as well as other deep results in the theory.
Here is a diagram of the categories under discussion in this paper, and the main functors connecting
them.
ValMon+
Fval
/ OMon+
FOMon
◆
◆
◆
◆
◆
Flay
◆
FunMon(S,
◆
◆
◆
◆
◆
◆
◆
◆
'◆
❖
'❖
ULayBidom†
/ Bipot† ⊂ Semir†
)
FunSemir† (S,
)
OMon+
/ Semir†
❖
❖
❖
❖
❖
❖
❖
FLTrop
❖
❖
❖
❖
❖
❖
❖
❖
❖
❖
❖
❖
❖
FLTrop;exp
❖
❖
❖
❖
❖
❖
❖
'❖
S
ValDom
S
ValField
ULayBidom† × Ring
'
/
'
o
o
/
'
/
O
O
CATEGORICAL LAYERED MATHEMATICS
5
Fval, which can be viewed as the customary tropicalization procedure, formalizes the order valuation
on Puiseux series, which in most recent research has replaced the logarithm as the means of tropicalizing
a variety.
geometry to the layered tropical world of this paper.
putting tools of semiring theory (such as polynomials) at our disposal.
FLTrop, perhaps the most important functor in our theory, takes us from the classical world of algebraic
FOMon is the functor that enables us to pass from ordered monoids to bipotent semirings, thereby
Flay is the functor that enables us to "layer" an ordered monoid, and thus pass to the layered theory.
FLTrop;exp is the "exploded" functor, which preserves the leading coefficient of the original polynomial
when tropicalizing, and thus permits Payne's generalization of Kapranov's theorem (and its application
to tropical varieties).
The Fun functors take us to semirings† of functions, thereby enabling us to treat polynomials (as
functions).
At the conclusion of this paper, we consider how the layered category LayBidom† enables us to define
corner varieties, and we relate the algebraic and geometric categories along the classical lines of algebraic
geometry, obtaining a Zariski-type correspondence in Proposition 9.8.
There also is a functor FLTrop;unit : ValDom → ULayBidom† ×ValMon(1) which we did not put into
the diagram, whose justification is given in the discussion after Proposition 6.10.
We start with the category Mon of monoids and their monoid homomorphisms, viewed in the context
2. Background
of universal algebras, cf. Jacobson [27, §2].
Definition 2.1. A semigroup is a set with an associative operation, usually written multiplicatively as ·.
A monoid M := (M,· ) is a semigroup with a unit element 1M. A semigroup M is (left) cancellative
with respect to a subset S if for every a1, a2,∈ M, b ∈ S,
b · a1 = b · a2
implies a1 = a2.
M is cancellative if M is cancellative with respect to itself.
An element a of M is absorbing if ab = ba = a for all b ∈ M. Usually the absorbing element (if it
exists) is denoted as the zero element 0M, but it could also be identified with −∞. A semigroup M is
pointed if it has an absorbing element 0M. A pointed semigroup M is cancellative if M is cancellative
with respect to M \ {0M}. A subset a ⊂ M is a left (right) semigroup ideal if Ma ⊂ a (aM ⊂ a).
The semigroups (as well as monoids) in this paper are presumed commutative, so left semigroup ideals
are semigroup ideals.
bm = a.
φ(a1a2) = φ(a1)φ(a2),
A semigroup M := (M,· ) is divisible if for every a ∈ M and m ∈ N there is b ∈ M such that
A semigroup homomorphism is a map φ : M → M′ satisfying
∀a1, a2 ∈ M.
(When dealing with pointed semigroups, we also require that φ(0M) = 0′
M
is a semigroup homomorphism φ : M → M′ also satisfying φ(1M) = 1M′ .
2.1. Semirings without zero. We ultimately work in the environment of semirings (or, more precisely,
semirings without a zero element, which we call a semiring†. A standard general reference for the
structure of semirings is [12]; also cf. [9]. Thus, a semiring† (R, +,· , 1R) is a set R equipped with two
binary operations + and · , called addition and multiplication, together with a unit element 1R such
that:
.) A monoid homomorphism
(1) (R, +) is an Abelian semigroup;
(2) (R,· , 1R) is a monoid with unit element 1R;
(3) Multiplication distributes over addition on both sides.
When the multiplicative monoid (R,· , 1R) is cancellative, we say that (R, + , · , 1R) is a domain†; when
(R,· , 1R) is also an Abelian group, we say that (R, + , · , 1R) is a semifield†. As customary, N denotes
the positive natural numbers, which is a cancellative domain†.
6
Z. IZHAKIAN, M. KNEBUSCH, AND L. ROWEN
Definition 2.2. A homomorphism ϕ : R → R′ between two semirings† is defined as a homomorphism
of multiplicative monoids that also preserves addition, to wit,
A semiring† isomorphism is a semiring† homomorphism that is 1:1 and onto.
ϕ(a + b) = ϕ(a) + ϕ(b)
for all a, b ∈ R.
Thus, we have the category Semir† of semirings† and their homomorphisms. This is closely related to
the category Semir of semirings and semiring homomorphisms, especially since the semirings R of interest
in the tropical theory, besides being multiplicatively cancellative, have the property that a+b 6= 0R unless
a = b = 0R; in other words, R \ {0R} is closed under addition.
Remark 2.3. Any semiring† R can be embedded in a semiring R ∪ {0} by formally adjoining a zero
element 0 satisfying 0 + a = a + 0 = a and 0· a = a· 0 = 0, ∀a ∈ R ∪{0}. Conversely, if R is a semiring
such that R \ {0R} is closed under multiplication and addition, then R \ {0R} is a semiring†.
Proposition 2.4. The category Semir† is isomorphic to a subcategory of the category Semir.
Proof. We just apply Remark 2.3, noting that any semiring† homomorphism ϕ : R → R′ can be extended
to a semiring homomorphism ϕ : R ∪ {0R} → R′ ∪ {0R′} by putting ϕ(0R) = 0R′ .
(cid:3)
An ideal a of a semiring† R is defined to be a sub-semigroup of (R, +) which is also a (multiplicative)
semigroup ideal of (R,· , 1R). (Clearly, when R has a zero element 0R, then 0R ∈ a.)
Example 2.5. If R is a semiring, then {0R} is an ideal of the semiring R ∪ {0R} of Remark 2.3.
The tropical theory is closely involved with certain kinds of semirings†.
Definition 2.6. A semiring† R is idempotent if
a + a = a
∀a ∈ R;
R is bipotent if
∀a, b ∈ R.
The max-plus algebra is the prototype of a bipotent semiring†.
a + b ∈ {a, b}
2.2. Congruences. Unfortunately, kernels, such an important feature of category theory, play virtually
In ring theory, the kernel ϕ−1(0R′ ) of any onto
no role in the general structure theory of semirings.
homomorphism ϕ : R → R′ is an ideal a of R, and furthermore one can recover R′ as isomorphic to R/a.
This is not the case with semirings†. Ideals do not play such a powerful role in the structure theory of
semirings†, since the construction R/a is problematic for an arbitrary ideal a (the difficulty arising from
the fact that distinct cosets need not be disjoint).
Instead, one needs to consider more generally equivalence relations preserving the semiring† operations.
From the general theory of universal algebra, one defines a congruence Ω of an algebraic structure A
to be an equivalence relation ≡ which preserves all the relevant operations and relations; we call ≡ the
underlying equivalence of Ω. Equivalently, a congruence Ω is a sub-semiring† of A × A that contains
the diagonal
diag(A) := {(a, a) : a ∈ A}
as described in Jacobson [27, §2]. In other words, writing the underlying equivalence relation as a ≡ b
whenever (a, b) ∈ Ω, we require that ≡ preserves all the relevant operations and relations.
Remark 2.7. We recall some key results of [27, §2]:
• Given a congruence Ω of an algebraic structure A, one can endow the set
A/Ω := {[a] : a ∈ A}
of equivalence classes with the same (well-defined) algebraic structure, and the map a 7→ [a]
defines an onto homomorphism A → A/Ω. (For this reason, Berkovich [4] calls them "ideals,"
but this terminology conflicts with some of the literature, and we prefer to reserve the usage of
"ideal" for the usual connotation.)
CATEGORICAL LAYERED MATHEMATICS
7
• For any homomorphism ϕ : A → A′, one can define a congruence Ω on A by saying that a ≡ b
iff ϕ(a) = ϕ(b). Then ϕ induces a 1:1 homomorphism
eϕ : A/≡ → A′,
via eϕ([a]) = ϕ(a).
We repeat the definition of congruence in each specific case that we need. Thus, a congruence Ω on
a semigroup M is an equivalence relation that preserves multiplication, in the sense that if a1 ≡ b1 and
a2 ≡ b2, then a1a2 ≡ b1b2. In this case, the set of equivalence classes M/Ω becomes a semigroup under
the operation
[a][b] = [ab],
and there is a natural semigroup homomorphism given by a 7→ [a]. When M is a monoid, this becomes a
monoid homomorphism, since [1M ] is the multiplicative unit of M/Ω. When M is pointed, then M/Ω
is also pointed, with absorbing element [0M].
Here is another instance of a congruence that comes up in the passage from arbitrary monoids to
cancellative monoids.
Example 2.8. Given an equivalence relation ≡ on a semigroup M, and a sub-semigroup S of M, we
define the equivalence ≡S given by b1 ≡S b2 if b1s ≡ b2s for some s ∈ S. When ≡ defines a congruence Ω,
then ≡S also defines a congruence ΩS. This congruence then identifies b1 and b2, thereby eliminating
instances of non-cancellation, and is a useful tool.
2.2.1. Congruences over semirings†. The congruence Ω is a semiring† congruence on a semiring† R iff
a1 ≡ a2 and b1 ≡ b2
imply (cid:26) a1 + b1 ≡ a2 + b2,
≡ a2b2.
a1b1
(2.1)
Lemma 2.9. To verify the conditions in (2.1) for commutative semirings†, it is enough to assume b1 = b2
and show for all a1, a2, and b in R:
a1 ≡ a2
implies a1 + b ≡ a2 + b;
implies a1b ≡ a2b.
Proof. a1 + b1 ≡ a2 + b1 ≡ a2 + b2. Likewise, a1b1 ≡ a2b1 ≡ a2b2.
a1 ≡ a2
(2.2)
(2.3)
(cid:3)
It often turns out that (2.2) enables us to obtain (2.3). On the other hand, in the case of semifields†,
multiplicative cosets are more easily described than additive cosets, as is described in detail in [13]. To
wit, let N := {a ∈ R : a ≡ 1R}. For any a ∈ R we have ab1 ≡ ab2 iff b1b−1
We write diag(M) for {(a, a) : a ∈ M}. As Berkovich [4] points out, any semigroup ideal a of
a semigroup M gives rise to the congruence (a × a) ∪ diag(M), which corresponds to the Rees factor
semigroup, and the analogous statement holds for monoids. A wrinkle emerges when we move to bipotent
semirings†, since (a× a)∪ diag(M) need not be closed under addition. Thus, the applications are limited,
and are discussed in [20].
2 ∈ N.
Definition 2.10. An identity f = g of a semiring† R is an elementary sentence f (x1, . . . , xm) =
g(x1, . . . , xm) that holds for all x1, . . . , xm in R.
Remark 2.11. Suppose we want to force a semiring† R to satisfy a particular identity, in the sense
that we want a semiring† ¯R in which f = g is an identity, together with a surjective homomorphism
ϕ : R → ¯R satisfying the universal property that any homomorphism of R to a semiring† satisfying the
identity f = g factors through ϕ.
Intuitively, one must mod out the relation f = g by putting f (a1, . . . , am) ≡ g(a1, . . . , am) for all ai
in R. For semirings†, in view of Lemma 2.9, since we are dealing with congruences, we must mod out
the equivalence relation obtained by putting f (a1, . . . , am) + c ≡ g(a1, . . . , am) + c and f (a1, . . . , am)c ≡
g(a1, . . . , am)c for all c and ai in R.
8
Z. IZHAKIAN, M. KNEBUSCH, AND L. ROWEN
Example 2.12. Consider the additive idempotence identity x + x = x. We attain this by imposing
the equivalence relation given by a + a ≡ a,∀a ∈ R. The congruence that it generates must also satisfy
the relation a + a + c ≡ a + c,∀a ∈ R.
But then we also get (2.3), since ab + ab = (a + a)b and
(a + a + c)b = ab + ab + cb ≡ ab + cb = (a + c)b.
Thus, (2.2) already defines the congruence. (This observation is to be elaborated shortly.)
Note that additive idempotence implies all identities of the form x + x + ··· + x = x.
Whereas in ring theory the equivalence class [0R] determines the congruence Ω, this is no longer the
case for semirings, and we need to consider all the classes {[a] : a ∈ R}. This is another reason that we
do not require the element 0 in a semiring†, for it has lost much of its significance. Nevertheless, ideals
do play a role in the layered algebraic theory, pursued in a different paper [21].
Lemma 2.13. The bipotent semirings† comprise a full subcategory Bipot† of Semir†.
Proof. If ϕ : R → R′ is a semiring† homomorphism and a + b ∈ {a, b}, then
ϕ(a) + ϕ(b) = ϕ(a + b) ∈ {ϕ(a), ϕ(b)}.
(cid:3)
2.3. Hom and Adjoint functors. We need to use some well-known facts about categories.
Definition 2.14. For any category C and some given object A in C, we recall the well-known covariant
functor
which sends an object B in C to Hom(A, B), and which sends the morphism φ : B → B′ to the morphism
Hom( , φ) : Hom(A, B) → Hom(A, B′) given by f 7→ φf for f : A → B.
Likewise, given an object B in D, we define the contravariant functor
Hom(A,
) : C → Set,
which sends an object A to Hom(A, B), and which sends the morphism ϕ : A′ → A to the morphism
Hom(ϕ,
) : Hom(A′, B) → Hom(A, B) given by f 7→ f ϕ for f : A → B.
Hom(
, B) : D → Set
Recall that a functor F : C → D is a left adjoint to H : D → C (and H is a right adjoint to F ) if
there is a canonical identification Ψ : Hom(F (A), B) → Hom(A,H(B)) for all objects A of C and B of D,
for which the following diagrams are always commutative for all morphisms ϕ : A → A′ and φ : B → B′:
Hom(F (A), B)
Ψ
Hom(A,H(B))
Hom(F (A), B)
Ψ
Hom(F (ϕ),
)
/ Hom(F (A′), B)
Ψ
Hom(ϕ,
)
Hom( ,φ)
/ Hom(A′,H(B)),
/ Hom(F (A), B′)
Ψ
It is well-known that any left adjoint functor is unique up to isomorphism.
Hom(A,H(B))
Hom( ,H(φ))
/ Hom(A,H(B′)).
2.4. Universals. Recall from [27, §1.7 and §1.8] that the adjoint functor of a functor F : C → D
is obtained by identifying the appropriate universal U of F together with the canonical morphisms
ι : D → F (U (D)), for objects D in D, satisfying the property that for any morphism f : D → F (C) in D
and object C in C, there is a morphism g : U (D) → C in C such that
F (g ◦ ι) = f.
The example used in [8] is for the forgetful functor from K-algebras to monoids; its universal is the
monoid algebra K[M] of a monoid M.
/
/
/
/
endowed with addition
[M] =(cid:26)Xa∈S
Xa∈S
a + Xa∈S′
a S ⊂ M(cid:27)
a = Xa∈S∪S′
a ,
CATEGORICAL LAYERED MATHEMATICS
9
Example 2.15. We define the forgetful functor Semir† → Mon, by forgetting addition. The appropriate
universal in this case is the monoid semiring† N[M], defined analogously to the monoid algebra.
Definition 2.16. [M] denotes the semiring† obtained by taking N[M] modulo the additive idempotence
congruence of Example 2.12. Explicitly, [M] is comprised of formal sums of distinct elements of the
monoid M, i.e.,
and multiplication is obtained from the original multiplication in M, extended distributively.
Example 2.17. Since additive idempotence defines an identity, one has the category of additively idem-
potent semirings†; the forgetful functor to Mon now has the universal [M]. The customary way to view
tropical mathematics is by means of the max-plus semiring†, which is additively idempotent.
3. Pre-ordered semigroups, monoids, and semirings
Recall that a partial pre-order is a transitive relation (≤); it is called a partial order if it is
A partial pre-order is called a preorder if any two elements are comparable. A (total) order is a
antisymmetric, i.e., a ≤ b and b ≤ a imply a = b. We write a < b when a ≤ b but a 6= b.
partial order which is also a preorder.
3.1. Pre-ordered semigroups. We work with pre-ordered semigroups in this paper. The natural defi-
nition in terms of universal algebra is the following:
Definition 3.1. A semigroup M := (M,· ) (or a monoid M := (M,· , 1M)) is partially pre-ordered
(resp. partially ordered, pre-ordered, ordered) if it has a partial pre-order ≤ (resp. partial order,
pre-order, order) such that
b ≤ c
(3.1)
We denote an ordered semigroup by (M,· ,≤). Thus, totally ordered semigroups satisfy the following
(3.2)
implies ab ≤ ac and
∀a ∈ M.
ba ≤ ca,
property:
a max{b, c} = max{ab, ac},
∀a, b, c ∈ M.
We say that the relation (≤) is strict if
b < c
and ba < ca,
implies ab < ac
(3.3)
Note 3.2. This definition requires that all elements of (M,· ,≤) are positive or 0, an implicit assumption
made throughout this paper, to be discussed after Definition 3.8.
Lemma 3.3. A total order (≤) on a semigroup M is strict iff the semigroup M is cancellative.
Proof. (⇒) : Suppose ab = ac. By symmetry, we may assume that b ≤ c. But if b < c then ab < ac, a
contradiction, so we conclude b = c.
∀a ∈ M.
(⇐) : If b < c then ab 6= ac, implying ab < ac.
Let us construct the appropriate categories.
(cid:3)
Definition 3.4. An order-preserving semigroup homomorphism is a homomorphism φ : M → M′
satisfying the condition (where ≤ denotes the partial order on the appropriate semigroup):
(3.4)
PPreOMon, PreOMon, POMon, POMon+, OMon, and OMon+ denote the respective categories of
partially pre-ordered, pre-ordered, partially ordered, cancellative partially ordered, ordered, and cancella-
tive ordered monoids, whose morphisms are the order-preserving homomorphisms.
implies φ(a) ≤ φ(b),
∀a, b ∈ M.
a ≤ b
By definition, OMon+ is a full subcategory both of OMon and of POMon+, each of which is a full
subcategory of POMon, which is a full subcategory of PPreOMon.
10
Z. IZHAKIAN, M. KNEBUSCH, AND L. ROWEN
Remark 3.5. The forgetful functor from the category POMon to the category PPreOMon is obtained by
viewing any partially ordered monoid M naturally in PPreOMon.
We also can go in the other direction.
Remark 3.6. For the class of partially pre-ordered semigroups, our congruences Ω also satisfy the prop-
erty that if a1 ≤ a2 and bi ≡ ai, then b1 ≤ b2. In this case, M/Ω inherits the partial pre-order given by
[a] ≤ [b] iff a ≤ b.
Proposition 3.7. There is a retraction F : PPreOMon → POMon to the forgetful functor of Remark 3.5.
Namely, we take the congruence Ω on a pre-ordered monoid M given by a ≡ b when a ≤ b and b ≤ a,
and define F (M) := M/Ω.
Proof. It is easy to see that ≡ is an equivalence relation that preserves the operation and the order, so is
an ordered monoid congruence, and thus induces a partial order on M/Ω according to Remark 3.6.
We claim that any order-preserving homomorphism φ : M → M′ induces an order-preserving ho-
momorphism eφ : M/Ω → M′/Ω. Indeed, if a ≡ b, then a ≤ b and b ≤ a, implying φ(a) ≤ φ(b) and
φ(b) ≤ φ(a), yielding φ(a) ≡ φ(b).
The functor F is a retraction to the forgetful functor, since it acts trivially on any total ordered
monoid.
(cid:3)
3.2. Pre-ordered semirings†.
Definition 3.8. We say that a semiring† R is pre-ordered (resp. partially ordered, ordered) if it
has a pre-order ≥ (resp. partial order, order) with respect to which both the monoid (R,· , 1R) and the
semigroup (R, +) satisfy Condition (3.1) of Definition 3.1.
In other words, both multiplication and addition preserve the pre-order. There is a delicate issue in this
definition. In the rational numbers, viewed as a multiplicative monoid, we have 1 < 2 but (−1)1 > (−1)2.
This difficulty is dealt with in [17], in which we define the order in terms of a cone of "positive" elements.
Definition 3.8 is the special case in which all elements of R are positive or 0, and is reasonable for tropical
mathematics since the "zero" element (when it is included) is minimal. We use Definition 3.8 here because
it is more appropriate to our categorical treatment.
A semiring† R has the infinite element ∞ if
for some a ∈ R.
Recall from [17, Corollary 2.15] that if R has a unique infinite element, then
∞ + a = ∞ = ∞ · a = a · ∞,
(3.5)
∞ + a = ∞ = ∞ · a = a · ∞,
∀a < ∞.
Nonzero positive elements of an ordered semiring† need not be finite, and we could have several infinite
elements (as can be seen easily by means of ordinals). We do not deal with such issues in this paper, and
assume there is at most one infinite element ∞.
The following observation is implicit in [13, Theorem 4.2].
Proposition 3.9. There is a natural functor Semir† → PPreOMon, where we define the preorder on a
semiring† R given by
a ≤ b
iff
a = b
or
b = a + c
for some c ∈ R.
This functor always yields the trivial partial preorder on rings, since then b = a + (b− a). The situation
is quite different for the semirings† arising in tropical mathematics, because of bipotence.
Proposition 3.10. Suppose R is an idempotent semiring†.
(i) a ≤ b iff a + b = b.
(ii) ≤ is a partial order, which is total when R is bipotent.
Proof. (i): (⇐) Take c = b.
(⇒) Suppose a + c = b. Then
a + b = a + (a + c) = (a + a) + c = a + c = b.
CATEGORICAL LAYERED MATHEMATICS
11
(ii): Transitivity follows because a + b = b and b + c = c imply
a + c = a + (b + c) = (a + b) + c = b + c = c.
It remains to prove antisymmetry. Suppose a ≤ b and b ≤ a. Then, in view of (i), b = a + b = a. (cid:3)
We are ready for a key identification of categories.
Proposition 3.11. There is a faithful functor FOMon : OMon → Semir†, whose image is Bipot†.
Proof. Given any totally ordered monoid (M,· ,≥, 1M) we define a + b to be max{a, b}. Then (M, +) is
a semigroup, since
Finally, this gives rise to a semiring†, since, by Equation (3.2),
(a + b) + c = max{a, b, c} = a + (b + c).
Any order-preserving monoid homomorphism ϕ : M → M′ is a semiring† homomorphism, since for a ≤ b
we have
(a + b)c = max{a, b}c = max{ac, bc} = ab + ac.
ϕ(a + b) = ϕ(b) = ϕ(a) + ϕ(b).
Conversely, given a bipotent semiring† R, the relation ≤ of Proposition 3.9 is a total order by Propo-
sition 3.10. Furthermore, ≤ is preserved under multiplication, since b ≤ c implies b + c = c and thus
ab+ac = a(b+c) = ac, yielding ab ≤ ac. Any semiring† homomorphism ϕ : R → R′ is an order-preserving
monoid homomorphism, for if a ≤ b, then
ϕ(a) + ϕ(b) = ϕ(a + b) = ϕ(b),
implying ϕ(a) ≤ ϕ(b).
(cid:3)
Note that we have just reconstructed the max-plus algebra. We will rephrase this result in the layered
setting, as Theorem 6.3.
Proposition 3.11 enables one to pass back and forth between categories of totally ordered monoids and
bipotent semirings. The first category enables us to exploit techniques from valuation theory, whereas
the second enables us to introduce concepts from ring theory such as polynomials, modules, matrices,
and homology theory.
Proposition 3.12. There is a functor Bipot† → Bipot† sending a semiring† to its dual bipotent
semiring† obtained as the same multiplicative monoid, but reversing the bipotence in addition; i.e., if
originally a + b = a, now we put a + b = b.
Proof. This is seen readily by defining the pre-order given by a ≥ b iff a + b = a; then the dual bipotent
semiring† corresponds to the reverse pre-order, and any homomorphism preserves the (reverse) order. (cid:3)
For example, the dual semiring† of (R, max, +, 0) is (R, min, +, 0). (The number 0 is really the unit
element 1R.)
3.3. The universal for the Frobenius property. Usually one works with commutative, totally ordered
monoids and semirings†. In this case, recall the well-known Frobenius property, cf. [22, Remark 1.1]:
(a + b)m = am + bm
(3.6)
for any m ∈ N.
These are identities of R, so we could define the Frobenius monoid semiring† [M] of an arbitrary
monoid M, in which, in view of Remark 2.11, we impose on [M] (defined in Definition 2.16) the relations
a(cid:19)m
(cid:18)Xa∈S
+ c =(cid:18)Xa∈S
am(cid:19) + c,
a(cid:19)m
(cid:18)Xa∈S
c =Xa∈S
amc,
for S ⊂ M finite.
we have
a(cid:19)m
dm +(cid:18)Xa∈S
Note that when R is divisible, these relations are formal consequences of (3.6) since writing c = dm
=(cid:18)d +Xa∈S
a(cid:19)m
= dm +Xa∈S
am;
dm(cid:18)Xa∈S
a(cid:19)m
=(cid:18)dXa∈S
a(cid:19)m
= dmXa∈S
am.
12
Z. IZHAKIAN, M. KNEBUSCH, AND L. ROWEN
The Frobenius monoid semiring† [M] satisfies the following universal property:
Proposition 3.13. Suppose ϕ : M → M′ is a monoid homomorphism, where the monoid M′ is totally
ordered. Viewing M′ as a bipotent semiring† via Proposition 3.11, we have a natural homomorphism
bϕ : [M] → M′
bϕ(cid:18)Xa∈S
a(cid:19) =Xa∈S
ϕ(a),
given by
satisfying the universal property that ϕ factors as
ϕ : M
/ [M]
bϕ
/ M′.
satisfies the Frobenius property.
Proof. The map given by Pa∈S a 7→ Pa∈S ϕ(a) is the desired semiring† homomorphism, since M′
On the other hand, the same argument shows that [M] itself is not ordered as a monoid, since one
can provide any ordered monoid M with two orders, one order making a + b = a and the reverse order
making a + b = b, as shown in Remark 3.12. The point here is that the Frobenius property, being
an algebra identity, permits the definition of a universal. Furthermore, one could define the category
of semirings† satisfying the Frobenius property, which comprises a full subcategory of Semir† . Although
Proposition 3.13 indicates that this is the "correct" category in which to conduct much of the investigation
in tropical algebraic geometry, we forego further consideration of this category in this paper.
(cid:3)
4. Integral domains and monoids with valuation
We turn to the main notion of "tropicalization." As indicated in the introduction, we need to consider
integral domains W with valuation v : W \ {0W} → G, having cancellative (ordered) value monoid G. In
valuation theory it is customary to write the operation of the value monoid G as addition, and to utilize
the axiom
Note that we can replace the valuation v by v′ := −v to get the dual equation
v(a + b) ≥ min{v(a), v(b)}.
v′(a + b) ≤ max{v′(a), v′(b)}.
(4.1)
We adjust the notation of valuation theory to fit in with the algebraic language of semirings†. Thus,
from now on in this paper, we use multiplicative notation, written G := (G,· ,≥, 1G), for the value
monoid G with unit element 1G, which can be viewed as a semiring† via Proposition 2.13, and use (4.1)
for the valuation axiom, since it fits in better with the semiring† approach. (But several authors, such as
Sturmfels and his school, have used the min-plus algebra instead, in order to forego taking the negative.)
Definition 4.1. The algebra of Puiseux series K over an algebraically closed field K is the field of series
of the form
p := Xτ∈T
cτ tτ ,
cτ ∈ K,
(4.2)
with T ⊂ R well-ordered (from below).
Sometimes one takes T ⊂ Q; any totally ordered field will do. We will take R in this paper. For any
field F , we write K× for K \ {0}. The tropical connection is that the max-plus algebra appears as the
target of the valuation
given by sending p(t) 6= 0K to the negative of the lowest exponent of its monomials having nonzero
coefficient;
Val : K× −→ R
Val(p) := − min{τ ∈ T : cτ 6= 0K}.
(4.3)
/
/
CATEGORICAL LAYERED MATHEMATICS
13
Remark 4.2. There is a natural multiplicative map π : K× → K×, sending a Puiseux series p =
Pτ∈T cτ tτ to cVal(p).
This gives an extra important piece of information, since for any two Puiseux series p, q we must have
Val(p + q) = max{Val(p), Val(q)} unless Val(p) = Val(q) and π(p) = π(q), in which case Val(p + q) <
max{Val(p), Val(q)}. In this way, π measures how much bipotence is lost with respect to Val .
4.1. Valued monoids. We view the previous observations in a somewhat more general setting.
Definition 4.3. A monoid M = (M,· , 1M) is m-valued with respect to a totally ordered monoid G :=
(G,· ,≥, 1G) if there is an onto monoid homomorphism v : M → G. This set-up is notated as the
triple (M,G, v).
Note 4.4. The hypothesis that v is onto can always be attained by replacing G by v(M) if necessary.
Given a field with valuation, or more generally, an integral domain W with valuation v : W \{0W} −→
G, we take M = \{0M}, a cancellative submonoid of W , to obtain the triple (M,G, v) as in Definition
4.3. When W is an arbitrary commutative ring with valuation, we must assume that the monoid G is
pointed, and take the triple (W,G, v).
Example 4.5. Another major example of an m-valued monoid is M = (C×,· , 1), G = (R≥0, +,≥, 0),
and v : C× → R≥0, given by v : z 7→ logt(z), where t is a given positive parameter. This leads us to the
theory of complex amoebas, cf. Passare [32].
The category of m-valued monoids is quite intricate, since the morphisms should include all maps
which "transmit" one m-valuation to another, as defined in [28]. In order to simplify this aspect of the
theory, we restrict ourselves to a subcategory, but consider the general version in [20].
Definition 4.6. ValMon is the category of m-valued monoids whose objects are triples (M,G, v) as in
Definition 4.3, for which a morphism
(4.4)
is comprised of a pair (φM, φG) of a monoid homomorphism φM : M → M′, as well as an order-
preserving monoid homomorphism φG : G → G′, satisfying the compatibility condition
φ : (M,G, v) −→ (M′,G′, v′)
ValMon+ is the full subcategory of ValMon in which the target monoid G is cancellative.
Thus, we have the categories ValField (resp. ValDom) whose objects are fields (resp. integral domains)
with valuations to cancellative monoids, and whose morphisms are ring homomorphisms which restrict
to morphisms in ValMon+,and each has its respectful forgetful functor to ValMon+.
Remark 4.7. If (M,G, v) is a triple, then v induces a pre-order ≤ on M, given by a ≤ b iff v(a) ≤ v(b)
in G.
Lemma 4.8. There is a fully faithful functor of categories ValMon → PreOMon .
Proof. The functor is given by Remark 4.7.
Conversely, given any monoid M with pre-order, we define G := M/≡ as in Proposition 3.7. Then we
define v : M → G by a 7→ [a]; clearly (M,G, v) is a triple. One sees easily that the morphisms match. (cid:3)
On the other hand, as we have observed, the main idea of tropicalization is the following observation:
Remark 4.9. The valuation itself provides a forgetful functor Fval : ValMon+ → OMon+, where we
remember only the target monoid G from the triple (M,G, v) .
Remark 4.10. Let us recall some valuation theory, which we can state in terms of an integral domain W
with valuation (W,G, v). The valuation ring R (resp. valuation ideal p) is the set of elements of W
having value ≥ 0 (resp. > 0); the residue domain W is R/p.
The residue domain is an integral domain. When W is a field F , the residue domain ¯F is also a field.
For example, the valuation ideal p of K of Definition 4.1 is the set of Puiseux series having value > 0, and
the residue field can be identified with K.
Here is another example, to illustrate some subtler aspects of the definitions.
v′(φM(a)) = φG(v(a)),
∀a ∈ M.
(4.5)
14
Z. IZHAKIAN, M. KNEBUSCH, AND L. ROWEN
Example 4.11.
(i) The integral domain C[λ1, λ2] has the natural valuation to Z×Z, ordered via the lexicographic order
where v(λ1) = (1, 0) and v(λ2) = (0, 1). On the other hand, there is the valuation v : C[λ1, λ2] → Z
given by v(Pi,j αi,jλi
2) = k for that smallest k = i + j such that αi,j 6= 0. (In other words,
v(λ1) = v(λ2) = 1.) The identity map (1C[λ1,λ2], 1Z×Z) (where we replace the valuation v by v)
is not a morphism in ValMon+ since it is not order-preserving. v(λ1) = (1, 0) > (0, 2) = v(λ2
2)
whereas v(λ1) = 1 < 2 = v(λ2
1λj
2).
(ii) In (i), we take a different order on Z × Z, where two pairs are ordered first by the sum of their
coordinates and then only secondarily via the lexicographic order. Now the identity map (where
we replace the valuation v by v) is a morphism in ValMon+ since it is order-preserving. Note
however that it is not strictly order-preserving, since v(λ1) = (1, 0) > (0, 1) = v(λ2) whereas
v(λ1) = 1 = v(λ2).
5. The layered structure
We are ready to bring our leading player. In this section we describe the algebraic category in whose
context we may formulate all the algebraic structure we need (including matrices and polynomials) for
the layered theory. To simplify notation and avoid technical complications, we work with a semiring† L
without a zero element, even though information is lost; the full theory is given in [20]. Much of the
layered theory stems from the following fundamental construction from [17], which is inspired by [2].
Construction 5.1. R := R(L,G) is defined set-theoretically as L×G, where we denote the element (ℓ, a)
as [ℓ]a and, for k, ℓ ∈ L, a, b ∈ G, we define multiplication componentwise, i.e.,
Addition is given by the usual rules:
[k]a ·
[ℓ]b = [kℓ]ab .
[k]a + [ℓ]b =
[k]a
[ℓ]b
[k+ℓ]a
if a > b,
if a < b,
if a = b.
(5.1)
(5.2)
We define Rℓ := {ℓ} × G, for each ℓ ∈ L. Namely R = Sℓ∈LRℓ.
This is to be our prototype of a layered bi-domain†, and should be borne in mind throughout the
sequel. Nevertheless, one should also consider the possibility that the monoid G is non-cancellative, in
which case, as noted in [17], Construction 5.1 fails to satisfy distributivity and thus is not a semiring†.
This difficulty can be resolved, but the ensuing category becomes rather technical, so we defer it to [20].
5.1. Layered pre-domains†. We axiomatize Construction 5.1 in order to place it in its categorical
framework.
Definition 5.2. Suppose (L,≥) is a partially pre-ordered semiring†. An L-layered pre-domain†
R := (R, L, (νm,ℓ)),
is a semiring† R, together with a partition {Rℓ : ℓ ∈ L} into disjoint subsets Rℓ ⊂ R, called layers, such
that
Rℓ,
(5.3)
and a family of sort transition maps
such that
for every ℓ ∈ L, and
R :=
[ℓ∈L
νm,ℓ : Rℓ → Rm,
νℓ,ℓ = idRℓ
∀m ≥ ℓ > 0,
whenever both sides are defined, satisfying the following axioms A1 -- A4, and B.
νm,ℓ ◦ νℓ,k = νm,k,
∀m ≥ ℓ ≥ k,
CATEGORICAL LAYERED MATHEMATICS
15
We say that any element a of Rk has layer k (k ∈ L). We write a ∼=ν b for b ∈ Rℓ, whenever
νm,k(a) = νm,ℓ(b) in Rm for some m ≥ k, ℓ. (This notation is used generically: we write a ∼=ν b even
when the sort transition maps νm,ℓ are notated differently.)
Similarly, in line with Remark 3.9, we write a ≤ν b if νm,k(a) + νm,ℓ(b) = νm,ℓ(b) in Rm for some
The axioms are as follows:
m ≥ k, ℓ.
A1. 1R ∈ R1.
A2. If a ∈ Rk and b ∈ Rℓ, then ab ∈ Rkℓ.
A3. The product in R is compatible with sort transition maps: Suppose
a ∈ Rk and b ∈ Rℓ, with m ≥ k and m′ ≥ ℓ. Then
νm,k(a) · νm′,ℓ(b) = νmm′,kℓ(ab).
A4. νℓ,k(a) + νℓ′,k(a) = νℓ+ℓ′,k(a) for all a ∈ Rk and all ℓ, ℓ′ ≥ k.
B. (Supertropicality) Suppose a ∈ Rk, b ∈ Rℓ, and a ∼=ν b. Then
a + b ∈ Rk+ℓ with a + b ∼=ν a.
If moreover k = ∞, then a + b = a.
L is called the sorting semiring† of the L-layered pre-domain† R =Sℓ∈L Rℓ.
For convenience, we assume in the sequel that L = L≥0, i.e., all nonzero elements of L are positive.
Often L is N or N+.
Remark 5.3. The L-layered pre-domain† R has the special layer R1, which is a multiplicative monoid,
called the monoid of tangible elements, and acts with the obvious monoid action (given by multiplica-
tion) on each layer Rk of R.
Thus, in one sense, R extends its monoid of tangible elements. Although we have given up bipotence,
and Axiom B provides us the slightly weaker notion of ν-bipotence, which says that a + b ∼=ν a or
a + b ∼=ν b for all a, b ∈ R.
Definition 5.4. An L-layered bi-domain† is a ν-bipotent L-layered pre-domain† which is (multiplica-
tively) cancellative. (We use the prefix "bi" in this paper to stress the ν-bipotence.)
An L-layered bi-domain† R is called an L-layered bi-semifield† if (R1,· ) is an Abelian group.
Note that according to this definition, an L-layered bi-semifield† need not be a semifield† unless L
itself also is a multiplicative group (and thus a semifield†). When R is an L-layered bi-semifield†, the
action of Remark 5.3 is simply transitive, in the sense that for any a, b ∈ Rℓ there is a unique element
r ∈ R1 for which ar = b.
Definition 5.5. We write R>ℓ (resp. R≥ℓ ) for Sk>ℓ Rk (resp. Sk≥ℓ Rk).
Definition 5.6. The layer R1 of an L-layered pre-domain† R is called the monoid of tangible ele-
ments.
We are interested in the case that R1 generates R.
Lemma 5.7. If M is any submonoid of a layered pre-domain† R := (R, L, (νm,ℓ)), then the additive
sub-semigroup M of R generated by M is also a layered pre-domain†.
Proof. M is a semiring†, by distributivity. Axiom A1 is given, and the other axioms follow a fortiori. (cid:3)
Definition 5.8. The tangibly generated sub-semiring† is the sub-semiring† generated by R1; if this
is R, we say that R is tangibly generated.
Remark 5.9. Several initial observations are in order.
(i) The layered structure resembles that of a graded algebra, with two major differences: On the one
hand, the condition that R is the disjoint union of its layers is considerably stronger than the
usual condition that R is the direct sum of its components; on the other hand, Axioms A4 and B
show that the layers are not quite closed under addition.
16
Z. IZHAKIAN, M. KNEBUSCH, AND L. ROWEN
(ii) This paper is mostly about L-layered bi-domains† (in particular, L-layered bi-semifields†). How-
ever, since ν-bipotence does not hold for polynomials, one considers the more general L-layered
pre-domains† when studying polynomial semirings†.
(iii) For each ℓ ∈ L we introduce the sets
Rm
R≥ℓ := [m≥ℓ
and
R>ℓ := [m>ℓ
Rm.
Many of our current examples satisfy L = L≥1 and thus R = R≥1. When R is an L-layered
bi-domain†, we claim that R≥1 is an L≥1-layered sub-bi-domain† of R, and R≥k and R>k are
semiring† ideals of R≥1, for each k ∈ L≥1. Indeed, this is an easy verification of the axioms,
mostly from Axiom A2.
(iv) Given any L-layered bi-domain† R and any multiplicative submonoid M of R≥1, we want to
define the L-layered sub-bi-domain† of R generated by M. First we take
M′ := {νℓ,k(a) : ℓ ≥ k ∈ L, a ∈ M ∩ Rk},
which is a submonoid closed under the transition maps. Then we take
M′′ := M′ ∪ {a + b : a, b ∈ M′ with a ∼=ν b}.
This is closed under all the relevant operations, so is the desired L-layered bi-domain†. Note that
the second stage is unnecessary for a = b, in view of Axiom A4.
(v) Although ubiquitous in the definition, the sort transition maps get in the way of computations,
and it is convenient to define the elements
eℓ := νℓ,1(1R)
(ℓ ≥ 1).
(5.4)
If a ∈ Rk, ℓ ∈ L, and ℓ ≥ 1, we conclude by Axiom A3 that
νℓ·k,k(a) = νℓ·k,1·k(a · 1R) = νℓ,1(1R) · νk,k(a) = νℓ,1(1R) · a = eℓa.
Thus the sort transition map νℓ·k,k means multiplication by eℓ.
Note that ek + eℓ = ek+ℓ by Axiom A4.
The element eℓ is a (multiplicative) idempotent of R iff ℓ2 = ℓ in L. In particular, e1 and e∞
(when ∞ ∈ L) are idempotents of R.
Let us introduce the sorting map s : R → L, which sends every element a ∈ Rℓ to its sort index ℓ,
and we view the semiring† R as an object fibered by s over the sorting semiring† L.
Remark 5.10. Axioms A1 and A2 yield the conditions
s(1R) = 1L,
s(ab) = s(a) s(b),
∀a, b ∈ R.
(5.5)
Also, Axiom A4 yields s(a + a) = s(a) + s(a) = 2s(a), thereby motivating us to view addition of an
element with itself as doubling the layer. Applying ν-bipotence to Axiom B shows that
s(a + b) ∈ {s(a), s(b), s(a) + s(b)}.
To emphasize the sorting map, as well as the order on L, we sometimes write (R, L, s, P, (νm,ℓ)) for a
given L-layered bi-domain† R with sort transition maps (νm,ℓ : m ≥ ℓ) and their accompanying sorting
map s : R → L.
5.2. Uniform L-Layered bi-domains†.
sort transition maps νm,ℓ are all bijective.
There are two main examples coming from tropical mathematics.
(a) Let R = R(L,G) (corresponding to the "naive" tropical geometry). By Construction 5.1, the
(b) Suppose K is the field of Puiseux series {f := Pu∈Q αuλu : f has well-ordered support} over a
given field F . Then we have the m-valuation v : K → Q taking any Puiseux series f to the lowest
real number u in its support.
We incorporate K into the structure of R, by putting Rℓ to be a copy of K for ℓ ≤ 1 and Rℓ
to be a copy of G for ℓ > 1. We take the νm,ℓ to be v whenever m > 1 ≥ ℓ, and the identity
otherwise. In this way, v is preserved within the structure of R.
CATEGORICAL LAYERED MATHEMATICS
17
We focus on the first case, since one can reduce to it anyway via the equivalence given below in
Definition 5.19 (which takes us from the usual algebraic world to the tropical world).
Definition 5.11. An L-layered pre-domain† R is uniform if νℓ,k is 1:1 and onto for each ℓ > k.
Example 5.12. Example 5.1 is a uniform L-layered bi-domain†, when the monoid G is cancellative.
Let us see how the layered theory simplifies for uniform L-layered bi-domains†, enabling us to remove
the sort transition maps νℓ,k from the picture.
Lemma 5.13. Any element a ∈ Rℓ can be written uniquely as eℓa1 = νℓ,1(a1) for a1 ∈ R1.
Proof. Existence and uniqueness of a1 are clear since νℓ,1 is presumed to be 1:1. The last assertion follows
from Axiom A3.
(cid:3)
Proposition 5.14. In a uniform L-layered bi-domain†, if a ∼=ν b for a ∈ Rk and b ∈ Rℓ with ℓ ≥ k then
b = νℓ,k(a). In particular, if a ∼=ν b for a, b ∈ Rℓ, then a = b.
Proof. An immediate application of Lemma 5.13.
Now we can remove the sort transition maps from the definition, when we write R =Sℓ∈L eℓR1.
Proposition 5.15. If (L,· ) is a multiplicative group, then one has νℓ,k(ak) ∼=ν emak where ℓ = mk.
In a uniform L-layered bi-domain† (for L arbitrary), the transition map νm,ℓ is given by eℓa1 7→ ema1.
Proof. If ℓ = k there is nothing to prove, so we assume that ℓ > k are non-negative, and write ℓ = k + p
for p ∈ L. Then ℓ = k(1 + pk−1), and m = 1 + pk−1. Now emak ∈ Rℓ, and
(cid:3)
emak ∼=ν ak ∼=ν νℓ,k(ak).
The second assertion now is clear.
(cid:3)
Thus the sort transition maps have been replaced by multiplication by the em. Note that ν-bipotence
and Axiom B′ could then be used as the definition for addition in R, and we summarize our reductions:
Proposition 5.16. A uniform L-layered bi-domain† can be described as the semiring†
R :=
Rℓ,
[ℓ∈L
where each Rℓ = eℓR1, (R1,· ) is a monoid, and there is a 1:1 correspondence R1 → Rℓ given by a 7→ eℓa
for each a ∈ R1.
Proposition 5.17. In the uniform case, axioms A2 and A3 can be replaced by the respective axioms:
A2′. If a = eka1 ∈ Rk and b = eℓb1 ∈ Rℓ, for a1, b1 ∈ R1, then
A3′. eℓek = eℓk for all k, ℓ ∈ L.
ab = (a1b1)ekℓ.
Furthermore, Axiom A4 now is equivalent to Axiom B, which we can reformulate as:
B′. If a = eka1 and b = eℓa1 (so that a ∼=ν b), then a + b = ek+ℓa1.
The operations in R are given by Axioms A2 ′, A3 ′, B ′, and ν-bipotence.
Proof. Axiom A3 follows from the observation that eℓa1ekb1 = eℓk(a1b1); when a1, b1 ∈ R1 then a1b1 ∈
R1.
(cid:3)
5.3. Reduction to the uniform case. In one sense, we can reduce the general case of an L-layered
pre-domain† R to the uniform case. First we cut down on superfluous elements. Note that if νk,1 are
onto for all k ≥ 1, then all the νℓ,k are onto for all ℓ ≥ k. Indeed, if a ∈ Rℓ then writing a = νℓ,1(a1) we
have
a = νℓ,k(νk,1(a1)).
Remark 5.18. Suppose L = L≥1. For any L-layered pre-domain† R := (R, L, (νm,ℓ)), if we replace Rk
by νk,1(R1) for each k ∈ L, we get an L-layered bi-domain† for which all the νℓ,k are onto.
18
Z. IZHAKIAN, M. KNEBUSCH, AND L. ROWEN
Having reduced many situations to the case for which all the νℓ,k are onto, we can get a uniform
L-layered pre-domain† by specifying when two elements are "interchangeable" in the algebraic structure.
Definition 5.19. Define the equivalence relation
a ≡ b
when
s(a) = s(b) and a ∼=ν b.
In view of Proposition 5.14, this relation is trivial in case R is a uniform L-layered bi-domain†.
Proposition 5.20. The binary relation <ν on an L-layered pre-domain† R induces a pre-order on the
semiring† of equivalence classes R/≡. Furthermore, if a ≡ b, then ac ≡ bc and a + c ≡ b + c for all c ∈ R.
Thus, ≡ is a congruence.
Proof. The first assertion is immediate. For the second assertion, s(ac) = s(a)s(c) = s(b)s(c) = s(bc)
and ac ∼=ν bc, proving ac ≡ bc.
Next, we consider addition. If a >ν c, then
If a <ν c, then a + c = c = b + c. If a ∼=ν c, then
a + c = a ≡ b = b + c.
s(a + c) = s(a) + s(c) = s(b) + s(c) = s(b + c),
and a + c ∼=ν a ∼=ν b ∼=ν b + c.
Let us summarize.
(cid:3)
Corollary 5.21. When the transition maps νℓ,k are onto, one can reduce to uniform L-layered bi-
domains†, by means of the equivalence relation ≡ of Definition 5.19.
Proof. Any ν-equivalent elements having the same sort are identified. Then Proposition 5.20 shows that
R/≡ is an L-layered bi-domain†, under the natural induced layering, and the transition maps on R/≡
clearly are bijective.
(cid:3)
5.3.1. Ghosts and the surpassing relation. We want a layered version of ghosts.
Definition 5.22. An ℓ-ghost sort is an element ℓ + k ∈ L for some 0 6= k ∈ L. An element b ∈ R is
an ℓ-ghost (for given ℓ ∈ L) if s(b) ∈ L is an ℓ-ghost sort. A ghost element of R is a 1-ghost.
Thus, the relation (≥) on L satisfies
m ≥ ℓ when
Definition 5.23. The L-surpassing relation L
m = ℓ
or
m is an ℓ-ghost sort.
= is given by
Here is a key relation in the theory, even though it does not play a major role in this discussion.
= b
a L
iff either
a = b + c
a = b,
a ∼=ν b
with c an s(b)-ghost,
with a an s(b)-ghost.
(5.6)
It follows that if a L
Remark 5.24. If a L
operations.
= b, then a + b is s(b)-ghost. When a 6= b, this means a ≥ν b and a is an s(b)-ghost.
= respects the semiring†
= bc. Thus L
= b, then clearly a + c L
= b + c and ac L
Remark 5.25. If a >ν b, then (a + b)m = am. Hence, the Frobenius property (a + b)m = am + bm is
satisfied in an L-layered pre-domain† whenever a 6∼=ν b. We always have (a + b)m L
= am + bm.
CATEGORICAL LAYERED MATHEMATICS
19
5.4. Layered homomorphisms. In line with the philosophy of this paper, we would like to introduce
the category of L-layered pre-domains†. This entails finding the correct definition of morphism. We start
with the natural definition from the context of domains†. Although this definition is good enough for
the purposes of this paper, a more sophisticated analysis would require us to to consider the notion of
"supervaluation" from [16], and how this relates to morphisms that preserve the layers. Here we take
the morphisms in this category to be semiring† homomorphisms which respect the order on the sorting
semiring L:
Definition 5.26. A layered homomorphism of L-layered pre-domains† is a map
(5.7)
such that ρ : L → L′ is a semiring† homomorphism, together with a semiring† homomorphism ϕ : R → R′
such that
Φ := (ϕ, ρ) : (R, L, s, (νm,ℓ)) → (R′, L′, s′, (ν′m′,ℓ′))
M1. If ϕ(a) /∈ R′0, then s′(ϕ(a)) ≥ ρ(s(a)).
M2. If a ∼=ν b, then ϕ(a) ∼=ν ϕ(b). (This is taken in the context of the
ν′m′,ℓ′.)
We always denote Φ = (ϕ, ρ) as Φ : R → R′ when unambiguous. In most of the following examples,
the sorting semirings† L and L′ are the same. Accordingly, we call the layered homomorphism Φ an
L-homomorphism when L = L′ and ρ = 1L.
Proposition 5.27. Any layered homomorphism ϕ preserves ν, in the following sense:
If a ≥ν b, then ϕ(a) ≥ν′ ϕ(b).
Proof. ϕ(a) ∼=ν′ ϕ(a + b) = ϕ(a) + ϕ(b), implying ϕ(a) ≥ν′ ϕ(b).
Proposition 5.28. Suppose ϕ : R → R′ is a layered homomorphism, and R is tangibly generated
(cf. Definition 5.8). Then ϕ is determined by its restriction to R1, via the formula
(cid:3)
ϕ(a + b) = ϕ(a) + ϕ(b),
∀a, b ∈ R1.
Proof. It is enough to check sums, in view of Lemma 5.7. We get the action of ϕ on all of R since R1
generates R.
(cid:3)
Remark 5.29. The definition given here of layered homomorphism is too strict for some applications.
One can weaken the definition of layered homomorphism by utilizing the surpassing relation, requiring
merely that ϕ(a) + ϕ(b) L
= ϕ(a + b), but various technical difficulties arise, so we defer the study of this
category to [20].
Before continuing, let us see how this definition encompasses various prior tropical situations.
Example 5.30. We assume throughout that R is an L-layered pre-domain†.
(i) In the max-plus situation, when L = {1}, ρ must be the identity, and Φ is just a semiring†
homomorphism.
(ii) In the "standard supertropical situation," when L = {1,∞}, Φ must send the ghost layer R∞
to R∞. If a ⊳ R, one could take R′1 := R \ a and R′
∞ := R∞ ∪ a. The identity map is clearly a
layered homomorphism; its application "expands the ghost ideal" to a, thereby taking the place of
a semiring homomorphism to the factor semiring†.
(iii) Generalizing (ii), we obtain layered homomorphisms by modifying the layering. We say a re-
sorting map of a uniform L-layered pre-domain† R is a map s′ : R → L satisfying the following
properties:
(a) s′(1R) = 1,
(b) s′(R1) ⊆ L≥1,
(c) s′(ab) = s′(a)s′(b), ∀a, b ∈ R1,
20
Z. IZHAKIAN, M. KNEBUSCH, AND L. ROWEN
(d) s′(eℓa) = ℓs′(a), ∀a ∈ R1.
Then the following properties also are satisfied:
(a) s′(eℓ) = ℓ for all ℓ ∈ L.
(b) s′(ab) ≥ s′(a)s′(b) for all a, b ∈ R.
(c) s′(a) ≥ s(a), ∀a ∈ R.
To see this, take a ∈ Rk and b ∈ Rℓ, and write a = eka1 and b = eℓb1 for a1, b1 ∈ R1. Then
s′(eℓ) = s′(eℓ1R) = ℓs′(1R) = ℓ · 1 = ℓ
Taking c1 = a1b1 ∈ R1, we have
s′(ab) = s′(ekeℓc1) = kℓs′(c1) = kℓs′(a1)s′(b1) = s′(a)s′(b),
and s′(a) = s′(eka1) = ks′(a1) ≥ k.
phisms.
(iv) The natural injections R≥1 → R and {Sℓ Rℓ : ℓ ∈ N} → R are all examples of layered homomor-
(v) The L-truncation map of [17, §3] is a layered homomorphism.
(vi) Suppose R is a layered pre-domain†. We adjoin ∞ to L, and take R∞ and ν∞,k to be the direct
limit of the Rk and νℓ,k, and write ν for the various ν∞,k. An element in a ∈ R1 is ν-non-
cancellative if ab ∼=ν ac for suitable b, c, where b 6∼=ν c. We define the map ϕ : R → R which is
the identity on ν-cancellative elements but ϕ(a) = aν for all ν-non-cancellative elements a ∈ R.
In particular, ϕ(R)1 is comprised precisely of the ν-cancellative tangible elements.
We claim that ϕ is a homomorphism. If ab is ν-cancellative this is clear, so we may assume
that a is ν-non-cancellative. Then
ϕ(ab) = (ab)ν = aνϕ(b) = ϕ(a)ϕ(b).
Certainly ϕ(a + b) = ϕ(a) + ϕ(b) by bipotence unless a ∼=ν b, in which case
ϕ(a + b) = ϕ(aν ) = aν = ϕ(a) + ϕ(b).
Furthermore, ϕ(R) is a layered pre-domain† which is ν-cancellative with respect to ϕ(R)1.
Indeed, if ϕ(a)ϕ(b) ∼=ν ϕ(a)ϕ(c) with ϕ(a) ∈ ϕ(R)1, then ϕ(b) ∼=ν ϕ(c).
Note that this is not the same example used in [19].
Our main example for future use is to be given in Remark 7.10.
6. The layered categories and the corresponding tropicalization functors
Having assembled the basic concepts, we are finally ready for the layered tropical categories. Our
objective in this section is to introduce the functor that passes from the "classical algebraic world" of
integral domains with valuation to the "layered world," taking the cue from [22, Definition 2.1], which
we recall and restate more formally.
Here are our first main layered categories, starting with the more encompassing and proceeding to the
specific. In each case the morphisms are the relevant layered homomorphisms.
Definition 6.1.
(a) LayPreD† is the category whose objects are layered pre-domains†.
(b) LayBidom† is the full subcategory of LayPreD† whose objects are layered bi-domains†.
(c) ULayBidom† is the full subcategory of LayPreD† whose objects are uniform layered bi-domains†.
CATEGORICAL LAYERED MATHEMATICS
21
6.1. Identifications of categories of monoids and layered pre-domains†.
Remark 6.2. We define the forgetful functor ULayBidom† → OMon+ given by sending any uniform
L-layered bi-domain† R := R(L,G) to R1.
We want retracts for this forgetful functor. By Proposition 5.28, any layered homomorphism cor-
responds to a homomorphism of the underlying monoid of tangible elements, thereby indicating an
identification between categories arising from the construction of layered bi-domains† from pre-ordered
monoids.
Theorem 6.3. There is a faithful layering functor
Flay : OMon+ −→ ULayBidom†,
given by sending G to R(L,G), and sending the ordered homomorphism ϕ : G → G′ to the layered
homomorphism R(L,G) → R(L,G′) induced by ϕ. The functor Flay is a left retract of the forgetful
functor of Remark 6.2.
Proof. The image of a cancellative ordered monoid G is a layered bi-domain†, in view of [17, Proposi-
tion 2.3], and one sees easily that Flayϕ is a layered morphism since, for a ≥ν b,
Flayϕ( [k]a + [ℓ]b ) ∼=ν Flayϕ( [k]a ) ∼=ν ϕ( [k]a ) + ϕ( [ℓ]b ),
and s′(Flayϕ( [k]a + [ℓ]b )) ≥ k.
morphisms by applying the forgetful functor of Remark 6.2.
Also, the morphisms match. The functor Flay is faithful, since one recovers the original objects and
(cid:3)
More subtly, at times we want to forget the order on our monoids, to apply the theory of [8]. Even so,
we have a universal construction with respect to "universal characteristic."
Example 6.4. Given a cancellative monoid G and a partially ordered semiring L, define the semiring†
UL(G) as follows:
Each element of UL(G) is a formal sum of elements of G, each supplied with its layer, i.e., has the
form
Addition is given by the rule
(cid:26)Xa∈S
[ℓa]a + Xa∈S′
[ℓa]a : S ⊂ G(cid:27).
a]a = Xa∈S∪S′
[ℓ′
Xa∈S
[ℓa+ℓ′
a]a .
(6.1)
(6.2)
Here we formally define ℓa + ℓ′a to be ℓa (resp. ℓ′a) if a /∈ S′ (resp. if a /∈ S).
Multiplication is given by
extended via distributivity.
[k]a ·
[ℓ]b = [kℓ](ab) ,
We want UL(G) to be the universal to the forgetful functor of Corollary 6.3. This is "almost" true,
with a slight hitch arising from (6.1).
Proposition 6.5. Given any monoid bijection ϕ : M → G where G := (G,· ,≤, 1G) is a totally ordered
monoid, viewed as a bipotent semiring† as in Proposition 3.11, there is a natural homomorphism
given by
The composite
bϕ : UL(M) → R(L,G)
bϕ(cid:18)Xa∈S
[ℓa]a(cid:19) =Xa∈S
[ℓa]ϕ(a1) .
M
ϕ
/ G
/ R(L,G).
/
/
22
Z. IZHAKIAN, M. KNEBUSCH, AND L. ROWEN
also factors naturally as
M
/ (UL(M),· )
bϕ
/ R(L,G).
In case L = {1} (the max-plus setting) or L = {1,∞} (the standard supertropical setting), the previous
assertion holds more generally for any monoid homomorphism ϕ : M → G.
Proof. The multiplication rules match, so the verifications follow formally, cf. Remark 5.25. The last
assertion is true because in these particular situations the Frobenius property is an identity, holding even
when a ∼=ν b.
(cid:3)
Remark 6.6. Since the Frobenius property is an identity, one could just mod it out from our construction
of UL(M) utilizing Remark 2.11, and thus get a universal with respect to satisfying the Frobenius property.
6.2. The layered tropicalization functor. Having our categories in place, we can get to the heart of
tropicalization.
Definition 6.7. Given a semiring† L, the L-tropicalization functor
FLTrop : ValMon+ −→ ULayBidom†
from the category of valued monoids (with cancellation in the target) to the category of uniform layered
bi-domains† is defined as follows: FLTrop : (M,G, v) 7→ R(L,G) and FLTrop : φ 7→ αφ, where given a
morphism φ : (M,G, v) → (M′,G′, v′) we define αφ : R(L,G) → R(L,G′), by
cf. Formula (4.4).
αφ( [ℓ]a ) := [ℓ]φ(a) ,
a ∈ G,
We also consider FLTrop as acting on individual elements of M, whereby
FLTrop(a) = [1]v(a) .
(6.3)
(6.4)
This is indeed a functor, in view of [17, Theorem 4.9].
Note that the tropicalization functor FLTrop factors as ValMon+ → OMon+ → ULayBidom†.
6.3. More comprehensive layered tropicalization functors. The basic layered tropicalization func-
tor only recognizes the image in G, so loses much information about the original monoid M. In analogy
to [31], in order to preserve information, we can encode extra information, motivated by the residue field
in valuation theory.
6.3.1. The unit tropicalization functor.
Definition 6.8. Given a monoid M := (M,· , 1M) with m-valuation v : M → G, we define its unit
submonoid
the submonoid of M on which the restriction of v is the trivial valuation.
M(1) := {a ∈ M : v(a) = 1G},
When M is a group, then M(1) also is a group. In particular, the category ValMon(1) of unit monoids
with m-valuation is a full subcategory of the category ValMon.
Example 6.9. In Example 4.5, C(1) is the complex unit circle.
The following observation is now clear.
Proposition 6.10. There is a functor
FLTrop;unit : ValMon+ −→ ULayBidom† ×ValMon(1),
given as follows: FLTrop;unit((M,G, v)) = (R(L,G),M(1)) and FLTrop;unit(φ) = (αφ, φM(1) ), where the
morphism αφ : R(L,G) → R(L′,G′) is given by Equation (6.3).
Proof. We piece together the two functors.
(cid:3)
/
/
CATEGORICAL LAYERED MATHEMATICS
23
This functor could be interpreted as separating the m-valuation v into two components, corresponding
to the value monoid and the residue domain. Tropicalization in its original form involved taking the
logarithm of the absolute value of reiθ, which is just log r. Thus, the argument eiθ is lost, and researchers
dealt with that separately. Since these all have absolute value 1, it seems appropriate in the valuation-
theory analog to have FLTrop;unit at our disposal.
A more direct approach in the terminology of Remark 4.2: Given two Puiseux series p, q ∈ K with
Val(p) = Val(q), we see that V al(p) = V al(q) iff V al(pq−1) = V al(1) = 1K, i.e., pq−1 − 1 is in the
valuation ideal of the valuation Val. Thus, Proposition 6.10 gives us a way of understanding FLTrop;unit
in terms of Val. Namely, we check whether two Puiseux series have the same lowest order exponent, and
then can check whether their lowest coefficients are the same by means of the residue field.
Remark 6.11. Suppose W is an arbitrary integral domain with valuation v : W \ {0W} → G, with
valuation ring R and residue domain ¯W . Take the unit submonoid W1 of W , cf. Definition 6.8. Clearly
W1 = {r ∈ R : r + p = 1 + p}.
When W is a field, W1 is a multiplicative subgroup of W which could be thought of as the "first
congruence subgroup" in valuation theory. Then, for b 6= 0, aW1 = bW1 iff v(a) = v(b) and 1 − ab−1 ∈ p,
which relates to the condition of the previous paragraph.
6.3.2. The exploded tropicalization functor. One could preserve more information, according to Parker [31],
who introduced "exploded" tropical mathematics, and Payne [36]. This entails taking the leading coeffi-
cient of Puiseux series.
E. Sheiner introduced a related structure R(K, R) on Puiseux series, in which he uses the residue
field K as the sorting set. Define the map K → R(K, R) by p 7→ [α]v(p) where α is the coefficient of the
lowest monomial of the Puiseux series p. This map, generalizing the Kapranov map, keeps track of the
"leading coefficient" of the Puiseux series p in terms of when the image of p has layer 0.
From this perspective, the 0K layer represents the "corner ghosts." Thus, Sheiner has "exploded" the
notion of valuation, and it is not difficult to define the "exploded functor" and transfer the statement
and proof of Payne [36] to this context, to be indicated in §8. Let us describe this procedure in algebraic
terms, which means working in the associated graded algebra.
Definition 6.12. Given a valued monoid v : M → G, and g ∈ G, we write M≥g for the M-module
{a ∈ M : v(a) ≥ g}, and M>g for its submodule {a ∈ M : v(a) > g}.
When M is the multiplicative monoid of an integral domain W , we can define the associated graded
algebra
gr(W ) :=Ma∈G
W≥g/W>g,
where operations are given by
(a + W>g)(b + W>h) = ab + W>gh
(a + W>g) + (b + W>h) = a + b + W>gh.
Remark 6.13. It is well known that the associated graded algebra is an algebra, with the natural valua-
tion v induced by v, i.e., v(a+ W>g) = v(a). When the valuation v is discrete, each component W≥g/W>g
is (multiplicatively) isomorphic to ¯W .
Let us interpret "explosion" with respect to Puiseux series. For any real number α, the component
K≥α/K>α can be identified with Ktα, which as a module is isomorphic to K, by means of taking the
coefficient of the monomial of lowest order in a Puiseux series.
Definition 6.14. Notation as in Remark 6.11, define the exploded layered domain† R( ¯W ,G). In other
words, we sort the elements according to ¯W , with multiplication following the given multiplication in G
and addition given by the following rules:
[a]x + [b]y =
[a]x
[b]y
[a+b]x
if x > y,
if x < y,
if x = y.
(6.5)
24
Z. IZHAKIAN, M. KNEBUSCH, AND L. ROWEN
Remark 6.15. Note that addition here is the classical addition induced from the integral domain W , so
although this structure has a tropical aroma, it does preserve some of the original algebraic structure of
the residue domain ¯W .
Proposition 6.16. There is a functor
FLTrop;exp : ValDom −→ ULayBidom† × Ring,
given as follows: FLTrop;exp((W,G, v)) = (R(L,G), ¯W ) and FLTrop;exp(φ) = (αφ, φ), where the morphism
αφ : R(L,G) → R(L′,G′) is given by Equation (6.3) and φ is the induced map on the residue domains.
Proof. As in Proposition 6.10, we piece together the two functors.
(cid:3)
To preserve even more information, one could sort instead with gr(W ).
7. The function category
We assume throughout that R is an L-layered domain†. In the next section we describe layered varieties
in terms of corner roots of ideals of polynomials over R. Thus, we need some preliminaries about the
polynomial semiring† over a layered bi-domain†; this is no longer bipotent.
7.1. The layered function monoid and domain†. As noted in the introduction, one significant
difference between the tropical theory and "classical" algebra is that different tropical polynomials can
agree as functions (whereas for algebras over an infinite field, any two distinct polynomials are also
distinct as functions). The clearest way of coping with this phenomenon is to treat polynomials directly
as functions from some subset of R(n) to an extension of R, and this enables us to unify various other
constructions related to polynomials.
Definition 7.1. For any set S and monoid M, Fun(S,M) denotes the set of functions from S to M.
Remark 7.2.
(i) Fun(S,M) becomes a monoid, under pointwise multiplication, i.e.,
(f g)(a) = f (a)g(a),
∀f, g ∈ Fun(S, R),
∀a ∈ S.
(7.1)
(ii) If the monoid M is partially ordered, then Fun(S,M) is also partially ordered, with respect to
taking f ≥ g when f (a) ≥ g(a) for all a ∈ S.
When moreover R is a semiring†, Fun(S, R) also becomes a semiring†, under pointwise addition, i.e.,
(f + g)(a) = f (a) + g(a),
∀a ∈ S,
(7.2)
cf. [17, Definition 5.1].
Lemma 7.3.
(i) If a monoid M is cancellative, then the function monoid Fun(S,M) is cancellative.
(ii) If a layered pre-domain† R is cancellative, then the function semiring† Fun(S, R) is also a can-
cellative layered pre-domain† (but not bipotent!).
(iii) If a semiring† R satisfies the Frobenius property (3.6), then Fun(S, R) also satisfies the Frobenius
property.
Proof. (i): By pointwise verification. For cancellation, note that if f g = f h, then f (a)g(a) = f (a)h(a)
for all a ∈ S, implying g(a) = h(a) and thus g = h.
(ii): Same verification as in (i).
(iii): For the Frobenius property,
(f + g)n(a) = ((f + g)(a))n = f (a)n + g(a)n,
for all positive n ∈ N.
∀f, g ∈ Fun(S, R),
(7.3)
(cid:3)
There is a natural semiring† injection R → Fun(S, R), given by viewing r ∈ R as the constant
function fr given by fr(a) = r, ∀a ∈ S. In this way, we view R as a sub-semiring† of Fun(S, R). At first,
we take S to be R(n). Later we will take S to be a given "layered variety." More generally, following
Payne [35, §2.2], one could take the set S to be the lattice of characters of an algebraic torus.
CATEGORICAL LAYERED MATHEMATICS
25
7.2. Functorial properties of the function monoid and semiring†. We categorize the discussion
of Section 7.1. First we define the function and polynomial categories.
Definition 7.4. F := FunMon(S,
) is the functor from Mon to Mon given by M 7→ Fun(S,M) for
objects, and such that for any morphism ϕ : M → M′, we define F ϕ : Fun(S,M) → Fun(S,M′) to be
given by
The functor F := FunSemir† (S,
) : Semir† → Semir† is given by R 7→ Fun(S, R) for objects, and
again such that for any morphism ϕ : R → R′, F ϕ : Fun(S, R) → Fun(S, R′) is given by
F ϕ(f )(a) = ϕ(f (a)).
F ϕ(f )(a) = ϕ(f (a)).
Lemma 7.5. FunMon(S,
a functor from OMon+ to POMon+.
) and FunSemir† (S,
) are functors. Furthermore, FunMon(S,
) restricts to
Proof. The verifications are straightforward, in view of Remark 7.2(ii) and Lemma 7.3.
Definition 7.6. We denote the respective images of OMon+ and Semir† under the functors FunMon(S,
and FunSemir† (S,
and Semir†.
)
)as Fun(S, OMon+) and Fun(S, Semir†), which are respective subcategories of POMon+
(cid:3)
Now Proposition 3.11 says:
Proposition 7.7. There is a faithful functor
F(S,OMon+) : Fun(S, OMon+) −→ Fun(S, Semir†),
induced by the functor FOMon of Proposition 3.11, as described in the proof.
Proof. We define F(S,OMon)(Fun(S,M)) = Fun(S,M) (viewing M as a semiring) and, for any monoid
homomorphism ϕ : M → M′, F(S,OMon)(ϕ) : f 7→ ϕ ◦ f. This is clearly a functor, and is faithful since M
is embedded into Fun(S,M).
Proposition 7.8. The functors F(S,OMon)(S,
tion 3.11, in the sense that
) commute with FOMon of Proposi-
) and FunSemir† (S,
(cid:3)
F(S,OMon) FunMon(S,
) = FunSemir† (S,
) FunOMon .
Proof. Letting R be the semiring† of Proposition 3.11, we have F(S,OMon)FMon(S, R)(M) = Fun(S, R) =
FunSemir† (S, R) FunOMon(M).
Lemma 7.9. Construction 5.1 is functorial, in the sense that
(cid:3)
Fun(S, R(L,G)) ≈ R(Fun(S, L), Fun(S,G)).
Proof. Any f ∈ Fun(S, R(L,G)) is given by f (a) = [k]b for suitable k ∈ L and b ∈ G; we define fL and
fG by fL(a) = k and fG(a) = b. Now f 7→ [fL]fG defines a semiring† homomorphism
Conversely, given fL ∈ Fun(S, L) and fG ∈ Fun(S,G) we define f ∈ Fun(S, R(L,G)) by putting
Fun(S, R(L,G)) → R(Fun(S, L), Fun(S,G)).
f (a) = [fL(a)]fG(a) .
One sees that the sorts are preserved.
(cid:3)
7.3. Sorting the function semiring†.
Remark 7.10. If S′ ⊆ S, there is a natural semiring† homomorphism
Fun(S, R) → Fun(S′, R)
given by f 7→ fS ′ . In particular, for S′ = {a}, we have the evaluation homomorphism at a.
One main interest in the layered theory is the nature of these homomorphisms. To understand them,
we need to introduce the appropriate sorting function.
26
Z. IZHAKIAN, M. KNEBUSCH, AND L. ROWEN
Remark 7.11. When L is a partially ordered semiring†, Fun(S, L) is also a semiring† (whose unit
element is the constant function 1), which by Remark 7.2(iii) is partially ordered by the relation:
f ≤S g
if
f (a) ≤ g(a)
for all a ∈ S.
When L is directed from above, this partial order also is directed from above, since f (a), g(a) ∈ L are
bounded by max{f (a), g(a)}.
If R is L-layered, then Fun(S, R) inherits the layered structure from R pointwise with respect to
Fun(S, L), in the following sense taken from [17, Remark 5.3]:
Definition 7.12. The L-layering map of a function f ∈ Fun(S, R) is the map ϑf : S → L given by
In the layered theory, we only consider functions that are ν-compatible, in the sense that if a ∼=ν a′,
For a set I ⊂ Fun(S, R) we define
ϑf (a) := s(f (a)),
a ∈ S.
ϑI(a) := min{ϑf (a) : f ∈ I}.
then f (a) ∼=ν f (a′).
Example 7.13. ϑ{1R} is the given sorting map on R.
Example 7.14. Take R = R(N, R). Assume that S = R(2)
logarithmic notation; e.g., 1 := 0 is the multiplicative unit, and 2 · 3 = 5.
1 + λ2 + 0 for k ∈ N, and a = (a1, a2) ∈ S.
(i) Take fk = λk
ϑfk (a) =
3
2
1
for a1 = a2 = 0;
for a1 = 0 > a2
otherwise.
or
a1 = 0 > a2
or
ak
1 = a2 > 0;
1 = R(2). The examples are written in
(ii) Take I = {fk : k ∈ N}, a = (a1, a2) ∈ S. In view of (i),
ϑI (a) =
3
2
1
for a1 = a2 = 0;
for a1 = 0 > a2
otherwise.
or
a1 = 0 > a2;
Thus, the 2-layer is the union of two perpendicular rays.
(iii) Take I = {λ1 +2, λ1 +3}. The layering map ϑI restricted to the tangible elements is identically 1,
the same as that of a tangible constant, although the ideal generated by I does not contain any
constants.
Nevertheless, we can distinguish between I and tangible constants, by assuming that S contains
elements of R having layer > 1. For example, ϑI( [2]4 ) = 2 whereas ϑf for a tangible constant
function f is identically 1.
sending f 7→ ϑf .
As noted in [17], we layer the semiring† Fun(S, R) with respect to the sorting semiring† Fun(S, L), by
Given f, g ∈ Fun(S, L), write k = ϑf and ℓ = ϑg. When ℓ > k we define the transition map
by
νℓ,k : Fun(S, R)k → Fun(S, R)ℓ
νℓ,k(f ) : a → νℓ(a),k(a)(f (a)),
∀a ∈ S.
Lemma 7.15. If R is a layered pre-domain† with partial pre-order ≥ν, then we can extend ∼=ν and ≥ν
respectively to an equivalence and a partial pre-order on Fun(S, R) as follows:
(i) f ∼=ν g iff f (a) ∼=ν g(a),
(ii) f ≥ν g iff f (a) ≥ν g(a),
∀a ∈ S;
∀a ∈ S.
Proof. An easy point-by-point verification.
We usually start with a given layered domain† R, and then apply Lemma 7.15. This rather general
framework encompasses some very useful concepts, including polynomials, Laurent polynomials, etc.
(cid:3)
CATEGORICAL LAYERED MATHEMATICS
27
7.4. Polynomials. We want to understand tropical algebraic geometry in terms of roots of polynomials.
Specifically, we work in the sub-semiring† of Fun(S, R)≥1 (for S ⊆ R(n)) defined by formulas in the
elementary language under consideration, which we call polynomial functions. Thus, in the usual
language of semirings†, R[Λ] := R[λ1, . . . , λn] denotes the usual polynomials, whose image in Fun(S, R)≥1
we denote as Pol(S, R). If we adjoin the symbol −1 (for multiplicative inverse), then Laur(S, R) denotes
the image of the Laurent polynomials R[Λ, Λ−1] := R[λ1, λ−1
n ]. If our language includes the
symbol m√ , i.e., if we are working over a divisible monoid, then we would consider polynomials with
1
rational powers, which are well-defined in view of Equation (3.6); although this case is important, we do
not treat it here explicitly because of the extra notation involved.
. . . , λn, λ−1
Thus, we are working in the full subcategories Pol(S, OMon+) and Laur(S, OMon+) of Fun(S, OMon+),
and the full subcategories Pol(S, Semir†) and Laur(S, Semir†) of Fun(S, Semir†). The functor of Proposi-
tion 7.7 restricts to faithful functors Pol(S, OMon) → Pol(S, Semir†) and Laur(S, OMon) → Laur(S, Semir†).
The difficulty with treating polynomials (as well as Laurent polynomials) as functions could be that
two polynomial functions may agree on R but differ on some extension semiring† of R. Fortunately,
semifield† of fractions of R, if two polynomial functions differ on some extension of R, then they already
in [17, Theorem 5.33 and Corollary 5.34] we saw that taking eR to be the 1-divisible closure of the bi-
differ on eR. Thus, it suffices to look at Pol(S, eR) and Laur(S, eR). Strictly speaking, this was proved only
for the specific construction used in [17], so to work with layered bi-domains† we need to generalize the
construction of 1-divisible closure to L-layered bi-domains†.
Example 7.16 (1-localization). If R is an L-layered bi-domain†, then taking any multiplicative sub-
monoid S of R1, we can form the localization S−1R as a monoid, and define addition via
a
u
+
b
v
=
av + bu
uv
u ) = s(a). There is a
, which is injective since R1 is cancellative.
Taking S = R1, we call S−1R the L-layered bi-semifield† of fractions of R; this construction shows
for a, b ∈ R, u, v ∈ S. S−1R becomes an L-layered bi-domain† when we define s( a
natural layered homomorphism R → S−1R given by a 7→ a
that any uniform L-layered bi-domain† can be embedded into a uniform L-layered bi-semifield†.
Example 7.17 (ν-divisible closure). We say that an L-layered bi-domain† R is ν-divisible if for each
a ∈ R and n ∈ N there is b ∈ R such that bn ≡ a under the equivalence of Definition 5.19. Note that if
s(a) = ℓ then s(b) = n√ℓ. This implies that L must be closed under taking n-th roots for each n. Assuming
that L is a group satisfying this condition, one can construct the ν-divisible closure, sketched as follows:
1R
Step 1: Given a ∈ Rℓ, adjoin a formal element b ∈ R n√ℓ, and consider all formal sums
(7.4)
f (b) :=Xi
αibi :
αi ∈ R.
i ai.)
∈ L.
(Pi αibi is to be considered as the n-th root of Pi αn
Define Rb to be the set of all elements of the form (7.4), where any α ∈ R is identified with
αb0. We can define the sorting map s : Rb → L via
s(αi) n√ℓ
i
s(f (b)) =Xi
We define ∼=ν on Rb (notation as in (7.4)) by saying fb ∼=ν Pt′
In particular, fb ∼=ν c for c ∈ R if Pi αn
i ai ∼=ν cn. Likewise, we write fb >ν f′b := Pt′
i ai >ν α′j
αn
Now we can define addition on Rb so as to be ν-bipotent, where for ν-equivalent elements
we define f (b) + g(b) to be their formal sum (combining coefficients of the same powers of b);
multiplication is then defined in the obvious way, via distributivity over addition. Now Rb is an
L-layered bi-domain†, in view of Proposition 5.15.
j=0 α′jbj ifPi αn
naj.
i ai ∼=ν Pj α′j
naj.
j=0 α′jbi if
Step 2: Using Step 1 as an inductive step, one can construct the ν-divisible closure by means
of Zorn's Lemma, analogously to the well-known construction of the algebraic closure, cf. [37,
Theorem 4.88].
28
Z. IZHAKIAN, M. KNEBUSCH, AND L. ROWEN
Example 7.18 (Completion). One can construct the completion of any L-layered domain† R as follows:
We define ν-Cauchy sequences in R to be those sequences (ai) := {a1, a2, . . .} which become Cauchy
sequences modulo ∼=ν, but which satisfy the extra property that there exists an m (depending on the
sequence) for which s(ai) = s(ai+1), ∀i ≥ m. This permits us to define the sort of the ν-Cauchy sequence
to be s(am). Then we define the null ν-Cauchy sequences in R to be those sequences (ai) := {a1, a2, . . .}
which become null Cauchy sequences modulo ∼=ν , and the completion bR to be the factor group.
We also extend our given pre-order ν to ν-Cauchy sequences by saying that (ai) ∼=ν (bi) if (aib−1
) is
a null ν-Cauchy sequence, and, for (ai) 6∼=ν (bi), we say (ai) >ν (bi) when there is m such that ai >ν bi
for all i > m. The completion bR becomes an L-layered bi-domain† under the natural operations, i.e.,
componentwise multiplication of ν-Cauchy sequences, and addition given by the usual rule that
(In the last line, we arranged for the layers to be added when the ν-Cauchy sequences are ν-equivalent.)
(ai)
(bi)
νs(ai)+s(bi),s(ai+bi)(ai + bi)
(ai) + (bi) =
It is easy to verify ν-bipotence for bR.
Proposition 7.19. Suppose there is an embedding ϕ : R → F ′ of a uniform L-layered domain† R into a
1-divisible, uniform L-layered bi-semifield† F ′, and let F be the 1-divisible closure of the bi-semifield† of
fractions of R. Then F ′ is an extension of F . If F ′ is complete with respect to the ν-pre-order, then we
can take F ′ to be an extension of the completion of F .
if (ai) >ν (bi),
if (ai) <ν (bi),
if (ai) ∼=ν (bi).
These constructions are universal, in the following sense:
i
(7.5)
Proof. This is standard, so we just outline the argument. First we embed the L-layered bi-semifield† of
a1 → ϕ(b)
fractions of R into F ′, by sending b
, then c1b = a1d, implying
ϕ(c1b) = ϕ(a1d), and thus ϕ(b)
ϕ(c1) . Thus, we may assume that R is an L-layered bi-semifield†. Now
we define the map F → F ′ by sending m√a → m√ϕ(a), for each a ∈ F1. This is easily checked to be a
ϕ(a1) . This map is 1:1, since if b
ϕ(a1) = ϕ(d)
= d
c1
a1
well-defined, 1:1 layered homomorphism.
In case F ′ is complete, then we can embed the completion of F into F ′. (The completion of a 1-
divisible bi-semifield† is 1-divisible, since taking roots of a ν-Cauchy sequence in F1 yields a ν-Cauchy
sequence.)
(cid:3)
Corollary 7.20. Any L-layered homomorphism Φ : R → R′ of uniform L-layered bi-domains† extends
uniquely to an L-layered homomorphism eΦ : eR → eR′.
Proof. Each of the constructions of bi-semifield† of fractions, 1-divisible closure, and completion are
universal, so applying them in turn yields us a unique ordered monoid homomorphism from the tangible
component R1 to R′1, which readily extends (uniquely) to all of R since eℓ 7→ e′ℓ.
(cid:3)
7.5. Roots and layered varieties. In order to understand affine layered geometry, we need to know
more about the affine layered algebraic sets. We fix the sorting semiring† L for convenience, although one
could also let L vary, and think of S as a subset of R(n), where R is an L-layered bi-domain†. Standard
tropical geometry can be recaptured by taking S ⊆ R(n)
1 .
Definition 7.21. Suppose f, g ∈ Pol(S, R). We say that f dominates g at a ∈ S if f (a) ≥ν g(a).
Write f = Pi fi as a sum of monomials. The dominant part fa of f at a is the sum of all those fi
dominating f at a, i.e., for which fi(a) ∼=ν f (a). We write fX for the restriction of f to a nonempty
subset X of S.
Definition 7.22. An element a ∈ S is a corner root of f = Pi fi if f (a) is s(fi(a))-ghost for every
monomial fi of f . (Thus, fa contains at least two fi.) The (affine) corner locus of f ∈ Pol(S, R) with
respect to the set S is
Zcorn(f ;S) := {a ∈ S : a is a corner root of f}.
We write Zcorn(f ) for Zcorn(f ; R(n)).
CATEGORICAL LAYERED MATHEMATICS
29
An element a ∈ S is a cluster root of f if f (a) = fi(a) is 1-ghost for some monomial fi of fa.
(Thus, fa is comprised of a single monomial fi.) The combined ghost locus with respect to the set S
is
The (affine) corner algebraic set and the (affine) algebraic set of a subset A ⊆ Pol(S, R) with
Zcomb(f ;S) := {a ∈ S : a is a cluster or corner root}.
respect to the set S, are respectively
Zcorn(A;S) := \f∈A
Zcorn(f ;S),
Zcomb(A;S) := \f∈A
Zcomb(f ;S).
When S is unambiguous (usually R(n)), we write Zcorn(A) and Zcomb(A) for Zcorn(A;S) and Zcomb(A;S)
respectively.
Example 7.23. Here are basic examples of affine layered algebraic sets.
(i) We view R(n) as Zcomb(∅). Note that also R(n) = Zcomb({a}) for any "ghost" constant a ∈ R>1.
(ii) The empty set is an algebraic set: ∅ = Z({a}) for any a ∈ R1.
(iii) A single point a = (a1, . . . , an) ∈ S, where S ⊂ R(n)
1 , is a corner algebraic set:
(iv) The familiar tropical line in the affine plane is Zcorn(f ;S) where f is linear of the form
a = Z({λ1 + a1, . . . , λn + an}).
αλ1 + βλ2 + γ,
with α, β, γ ∈ R1, and S = R(2)
restricted to R(2)
1
"balancing condition" of tropical geometry.
1 . On the other hand, for I as in Example 7.14, Zcorn(I;S)
is the union of two perpendicular rays, and does not satisfy the celebrated
Example 7.24. A more sophisticated example: Whereas in the standard supertropical theory we have
(x + y + z)(xy + xz + yz) = (x + y)(x + z)(y + z),
they differ in the layered theory, since xyz has layer 3 in the left side but only layer 2 in the right side.
Thus the layered theory permits greater refinement in reducing tropical varieties.
8. The tropicalization functor on polynomials and their roots
The tropicalization map FLTrop of §6.2, Equation (6.4), extends readily to polynomials, i.e., to the
functor bFLTrop : Pol(S, ValMon+) → Pol(S, LayBidom†), where we define
n =Xi
n (cid:19) =Xi
FLTrop(ai)λi1
1 ··· λin
n ,
aiλi1
1 ··· λin
bFLTrop(cid:18)Xi
1 ··· λin
[1]v(ai) λi1
for i = (i1, . . . , in), (and analogously for morphisms).
If a ∈ F (n) is a root of f ∈ F [Λ], then clearly v(a) is a corner root of bFLTrop(f ). We are interested in
the opposite direction. One of the key results of tropical mathematics is Kapranov's theorem [14], which
says that for any polynomial f (λ1, . . . , λn), any corner root of the tropicalization of f has a pre-image
which is a root of f . This assertion also works for finite sets of polynomials, and thus for ideals, in view
of [36]. Our objective in this section is to understand this result in terms of the appropriate layered
categories.
Remark 8.1. Let A := F [λ1, . . . , λn]. Then the Puiseux series valuation V al extends naturally to a
map V al : A → R[λ1, . . . , λn], where each λi is fixed. If I is an ideal of A, then Φ(I) is an ideal of
Φ(A), so this "tropicalization" process sends ideals of algebras to semiring† ideals, and transfers many
properties from the "classical algebraic" world to the "tropical" world. One property which it does not
preserve is generation of ideals. For example, two different polynomials f, g of I might have the same
leading monomial and the same tropicalization, and then Φ(f + (−g)) cannot be described in terms of
Φ(f ) and Φ(g) = Φ(f ). One can bypass this particular difficulty by using Grobner bases (since they are
comprised of polynomials of different lowest orders), but the necessity of choosing the "right" generators
raises serious issues in tropical geometry. Fortunately, this concern is not critical in the current paper,
since we do not require generators for studying the relevant categories.
30
Z. IZHAKIAN, M. KNEBUSCH, AND L. ROWEN
i
Remark 8.2. We start with a triple (F,G, v), where F for example may be the algebra of Puiseux series
over C, G = (R, +), and v : F → G the valuation Val. Any point (α1, . . . , αn) ∈ F (n) can be considered
as a valuation v extending v, where v(λi) = αi. This can be extended to the group G generated by the λi
and λ−1
in the ring of Laurent series over F . But if p is a prime ideal of F [Λ] := F [λ1, . . . , λn], then the
natural image of G in the field of fractions K of F [Λ]/p is a group ¯G, and Bieri-Groves [5] describe the
possible extensions of v to F [ ¯G]. Namely, ¯G, being a finitely generated Abelian group, can be written as
the direct sum of a free Abelian group of some rank m and a torsion group T . We let F [ ¯G] denote the
F -subalgebra of K generated by ¯G. After extending the valuation v to the free Abelian group, one sees by
an exercise of Bourbaki [6] that further extensions to F [ ¯G] correspond to corner roots of the polynomials
of p.
This is explained in the proof of [5, Theorem A], and can be explained tropically in terms of the proof
of Bourbaki's exercise:
If f (a) = 0 then two of the monomials of FLTrop(f ) must be equal and dominant when evaluated at a,
say αai = βaj, so one can extend v to a valuation v on F [a] given by v(a) = v(βα−1)
.
This discussion could be formulated in the language of [16], [18], [19], as elaborated in [20, Remark 6.6].
Definition 8.3. As in Remark 6.11, suppose F is an arbitrary field with valuation v : F → G, having
valuation ring R and associated graded algebra gr(F ). For any f ∈ F [λ], we define ¯f to be its natural
image in gr(F )[λ]. For a ⊳ F [Λ], we define the exploded tropicalization ¯a of a to be
i−j
An element a := (a1, . . . , an) of gr(F ) is a graded root of a polynomial ¯f ∈ gr(F )[λ] if
¯f (a1 + F>s(a1), . . . , an + F>s(an)) = 0
{ ¯f : f ∈ a}.
in gr(F ). (Intuitively, s(f (a1, . . . , an)) is larger than expected.)
We take F to be a Henselian field with respect to a valuation v whose residue field is algebraically
closed. For example, we could take F = K, the field of Puiseux series over C. We have two areas of
interest when studying Puiseux series -- the semifield† (which corresponds to the value group) and the
residue field, which is a copy of C. We can combine these using the 'exploded' structure of Definition 6.14.
Given a polynomial f ∈ gr(F )[Λ], we define its corner exploded roots to be
(cid:8)Graded roots a = (a1, . . . , an) ∈ F (n)
1
of f : s(f (a1, . . . , an)) = 0(cid:9),
cf. Remark 6.15. The corner exploded variety of an ideal a of gr(F ) is the set of common corner
exploded roots of the polynomials of a.
The standard valuation-theoretic proofs of Kapranov's theorem show that any corner root x of FLTrop(f )
is the tropicalization of a point in the variety Z defined by f . In other words, x lifts to an exploded root
of f . Payne's theorem [36] can be stated as follows:
Suppose X is an affine variety defined by a proper ideal a of F [Λ], and a is an graded root of the
exploded tropicalization ¯a of a. Then the preimage of any point defined by ¯a, if nonempty, is Zariski
dense in X. This is the algebraic essence of Parker's 'exploded' approach.
9. The category of affine layered geometry
Our goal in this section is to connect affine layered geometry to a category which can be studied by
means of standard algebraic techniques. This ties in with the algebraic categories of the previous sections,
by means of the coordinate semiring†, which is to be studied more thoroughly in a subsequent paper.
Throughout, let F denote a layered bi-semifield†.
9.1. The Zariski topology. We want to mimic the classical Zariski theory as far as we can, starting
with our layered bi-semifield† F and describing a topology on S, a given subset of F (n).
Actually, there are several natural topologies on S.
Definition 9.1. Suppose f =Pi fi is written as a sum of monomials in Pol(S, R). The fi-component
of f is
Dfi (S) := {a ∈ S : fi(a) = f (a)}.
CATEGORICAL LAYERED MATHEMATICS
31
Any root of f in a component Dfi must be a cluster root.
Remark 9.2. In [17, Definition 6.5], we defined the L-layered component topology to have as its
sub-base the components of polynomials of Pol(S, R). Note that different components of a polynomial are
disjoint, so open sets here are not necessarily dense in the component topology. Thus, although it provides
useful information, the component topology is too fine to permit us to develop tropical algebraic geometry
along classical lines. We rectify the situation by defining the principal corner open sets to be
D(f ;S) = S \ Zcorn(f ) = [i∈I
Dfi,
where f =Pi∈I fi is written as a sum of monomials in Pol(S, R). Put another way,
D(f ;S) = {a ∈ S : s(f (a)) = s(fi(a)) for some monomial fi of f},
The principal corner open sets form a base for a topology on S, which we call the (L-layered) corner
Analogously, one could respectively take cluster roots and use Zcomb(f ;S) in place of corner roots and
Zcorn(f ;S) to define the combined Zariski topology, whose closed sets are the algebraic sets. This is
a somewhat finer topology, but the corner Zariski topology provides a closer analog to the usual notions
of tropical geometry, so we will use that.
Zariski topology, whose closed sets are affine corner algebraic sets.
Lemma 9.3. The intersection of two principal corner open sets contains a nonempty principal corner
open set.
Proof. If f (a) = fi(a) on Df,i and g(a) = gj(a) on Dg,j, then clearly f g(a) = fi(a)gj(a) on Df,i ∩ Dg,j
and nowhere else.
(cid:3)
Proposition 9.4. All open sets in the (L-layered) corner Zariski topology are dense.
Proof. Immediate from the lemma.
(cid:3)
9.2. The coordinate semiring†. We can return to algebra via the coordinate semiring†, just as in
classical algebraic geometry.
Definition 9.5. The coordinate semiring† of an affine layered algebraic set X ⊆ S, denoted F [X], is
the natural image of the semiring† Pol(X, F ). The Laurent coordinate semiring† F (X) is the natural
image of Laur(X, F ); its elements are called the regular functions of the algebraic set.
Pol(X, F ) can be identified with classes of polynomials over X whose representatives are polynomials
having no inessential monomials, cf. [17, Definition 5.5]. We say that a function in F [X] (resp. F (X)) is
tangible if it can be written as a tangible polynomial (resp. Laurent polynomial), i.e., having coefficients
only in F1.
Remark 9.6. When X ⊂ Y we have a natural map F [Y ] → F [X] obtained by restricting the domain of
the function from Y to X.
Coordinate semirings† correspond naturally to congruences on Pol(S, F ) in the following manner.
Definition 9.7. A nonempty subset X ⊆ S defines the congruence of X on Fun(S, F ), denoted ΩX ,
whose underlying equivalence ≡X is given by
f ≡X g
iff
f (a) = g(a) for every a ∈ X.
Conversely, given a congruence Ω on Fun(S, F ), define the variety of the congruence
V (Ω) := {a ∈ S : f (a) = g(a), ∀(f, g) ∈ Ω} ⊆ S.
It is readily checked that
ΩX∪Y = ΩX ∩ ΩY ,
for any X, Y ⊂ S.
9.3. Zariski correspondences. We have various correspondences between varieties and the algebraic
structure.
32
Z. IZHAKIAN, M. KNEBUSCH, AND L. ROWEN
9.3.1. The Zariski correspondence with ideals. Inspired by the layered Nullstellensatz given in [17, The-
orem 6.14], the naive approach would be to define the corner ideal Icorn(S) of a set S to be
{f ∈ Pol(S, F ) : a is a corner root of f,
∀a ∈ S},
and Icomb(S) to be
{f ∈ Pol(S, F ) : a is in the combined ghost locus of f,
∀a ∈ S}.
This approach misses the mark, somewhat. On the one hand, different congruences can define the
same ideal which is the pre-image of 0. On the other hand, there are "too many" ideals, in the sense that
not every ideal defines a variety, and the correct algebraic approach is to utilize congruences rather than
ideals. Furthermore, we need somehow to filter out those varieties obtained by degenerate intersections
of hypersurfaces; this is treated in a later paper under preparation.
9.3.2. The Zariski correspondence with congruences. As just noted, it makes more sense to deal with
congruences instead of ideals. We have the usual straightforward but important inverse Zariski corre-
spondence:
Proposition 9.8. If Ω1 ⊇ Ω2, then V (Ω1) ⊆ V (Ω2). Conversely, if Y ⊇ X, then ΩY ⊆ ΩX . Conse-
quently,
V (ΩV (Ω)) = V (Ω) and ΩV (ΩX ) = ΩX .
It follows that there is a 1:1 correspondence between congruences of varieties and varieties of congruences,
given by X 7→ ΩX and Ω 7→ V (Ω). Furthermore, the coordinate semiring† satisfies
F [V (Ω)] ∼= Pol(S, F )/Ω.
Proof. The inverse correspondence is immediate, and the next assertion is immediate. The 1:1 corre-
spondence is then formal. To see the last assertion, note that two polynomials in f, g are identified in
F [V (Ω)] iff they agree on V (Ω), which by definition is the point set on which every pair (f, g) ∈ Ω agree;
namely, f and g are identified in Pol(S, F )/Ω.
(cid:3)
By the proposition, one sees that for any nonempty subset X ⊆ S we have
F [X] ∼= Pol(S, F )/ΩX .
(9.1)
Definition 9.9. A morphism of affine layered algebraic sets Φ : X → Y is a continuous function that
preserves (i.e., pulls back) regular functions, in the sense that if U is an open subset of Y and ψ ∈ F (U ),
then ψ ◦ Φ ∈ F (Φ−1(U )).
L -TropAff is the category whose objects are the affine layered algebraic sets X ⊂ F (n) and whose
morphisms Φ : X → Y are morphisms of layered affine algebraic sets .
Proposition 9.10. Any morphism Φ : X → Y of affine layered algebraic set gives rise to a natural
algebra homomorphism Φ∗ : F (Φ(U )) → F (U ), by ψ 7→ Φ∗(ψ), where Φ∗(ψ)(a) = ψ(Φ(a)), for every
a ∈ U .
Proof. Φ∗(ψ + ϕ) = Φ∗(ψ) + Φ∗(ϕ) and Φ∗(ψϕ) = Φ∗(ψ)Φ∗(ϕ).
(cid:3)
We conclude by introducing the functor linking the algebraic and geometric (affine) categories.
Definition 9.11. FL -Coord is the contravariant functor from L -TropAff to ULayBidom† given by sending
an affine layered algebraic set X to its coordinate semiring† F [X], and any morphism Φ : X → Y of
affine layered algebraic sets to the layered semiring† homomorphism Φ∗ : F [Y ] → F [X], i.e., f 7→ fΦ
where fΦ(a) = f (Φ(a)).
Many subtleties lie behind this definition; for example, which affine layered varieties correspond to
the coordinate semirings† of tropical varieties satisfying the balancing condition? This question is to be
treated in a subsequent paper.
CATEGORICAL LAYERED MATHEMATICS
33
References
[1] M. Akian, R. Bapat, and S. Gaubert. Max-plus algebra, In: Hogben, L., Brualdi, R., Greenbaum, A., Mathias, R. (eds.)
Handbook of Linear Algebra. Chapman and Hall, London, 2006.
[2] M. Akian, S. Gaubert, and A. Guterman. Linear independence over tropical semirings and beyond. In Tropical and
Idempotent Mathematics, G.L. Litvinov and S.N. Sergeev, (eds.), Contemp. Math., 495:1 -- 38, 2009.
[3] V. Berkovich. Spectral theory and analytic geometry over non-Archimedean fields. Mathematical surveys and mono-
graphs 33, Amer. Math. Soc., 1990
[4] V. Berkovich. Lecture at Lodz joint meeting of the Polish and Israel Mathematical Societies, July, 2011
[5] R. Bieri and R. Groves. The geometry of the set of characters induced by valuations. J. fur die Reine und angevandte
Mathematik, 374:168 -- 195, 1984.
[6] N. Bourbaki. Commutative Algebra. Paris and Reading, 1972.
[7] A. Connes, C. Consani. Characteristsic 1, entropy, and the absolute point. preprint at arXiv:math.0911.3537, 2009.
[8] G. Cortinas, C. Haesemeyer, M. Walker, and C. Weibel. Toric varieties, monoid schemes, and descent, preprint, 2010.
[9] A.A. Costa. Sur la theorie g´en´erale des demi-anneaux. Publ. Math. Decebren 10 (1963), 14 -- 29.
[10] A. Dickenstein, E. M. Feichtner, and B. Sturmfels. Tropical discriminants. J. Amer. Math. Soc., 20:1111 -- 1133., 2007.
[11] M. Einsiedler, M. Kapranov, and D. Lind. Non-Archimedean amoebas and tropical varieties. J. Reine Angew. Math.,
601:139 -- 157, 2006.
[12] J. Golan. The theory of semirings with applications in mathematics and theoretical computer science, volume 54.
Longman Sci & Tech., 1992.
[13] H.C. Hutchins and H.J. Weinert. Homomorphisms and kernels of semifields Periodica Mathematica Hungaria,
21(2):113 -- 152, 1990.
[14] I. Itenberg, G. Mikhalkin, and E. Shustin. Tropical algebraic geometry, vol. 35. Birkhauser, 2007. Oberwolfach seminars.
[15] Z. Izhakian. Tropical arithmetic and matrix algebra. Commun. in Algebra, 37(4):1445 -- 1468, 2009.
[16] Z. Izhakian, M. Knebusch, and L. Rowen. Supertropical semirings and supervaluations. J. Pure and Appl. Alg.,
215(10):2431 -- 2463, 2011.
[17] Z. Izhakian, M. Knebusch, and L. Rowen. Layered tropical mathematics, preprint at arXiv:0912.1398, 2011.
[18] Z. Izhakian, M. Knebusch, and L. Rowen. Dominance and transmissions in supertropical valuation theory. Comm. in
Alg, to appear. (Preprint at arXiv:1102.1520.)
[19] Z. Izhakian, M. Knebusch, and L. Rowen. Supertropical monoids: Basics, canonical factorization, and lifting ghosts to
tangibles, preprint at arXiv:1108.1880, 2011.
[20] Z. Izhakian, M. Knebusch, and L. Rowen. Categories of layered semirings, preprint, 2012.
[21] Z. Izhakian and L. Rowen. Ideals of polynomial semirings in tropical mathematics. J. Alg. and its Appl., to appear.
(Preprint at arXiv:1111.6253.)
[22] Z. Izhakian and L. Rowen. Supertropical algebra. Adv. in Math. 324(8):1860 -- 1886, 2010.
[23] Z. Izhakian and L. Rowen. Supertropical matrix algebra. Israel J. Math. 182(1):383 -- 424, 2011.
[24] Z. Izhakian and L. Rowen. Supertropical matrix agebra II: solving tropical equations. Israel J. Math., 186(1):69-97,
2011.
[25] Z. Izhakian and L. Rowen. Supertropical resultants. J. Alg., 324(8):1860 -- 1886, 2010.
[26] Z. Izhakian and E. Shustin. Idempotent semigroups and tropical sets. J. EMS, 14:489 -- 520, 2012.
[27] N. Jacobson. Basic Algebra II. Freeman, 1980.
[28] M. Knebusch and D. Zhang, Manis Valuations and Prufer Extensions. I. A New Chapter in Commutative Algebra.
Lecture Notes in Mathematics, 1791, Springer-Verlag, Berlin, 2002.
[29] G. Litvinov. The Maslov dequantization, idempotent and tropical mathematics: a very brief introduction. J. of Math.
Sciences, 140(3):426 -- 444, 2007.
[30] D. Maclagan and B. Sturmfels. Tropical Geometry. Preprint, 2009.
[31] B. Parker. Exploded fibrations, preprint at arXiv: 0705.2408v1, 2007.
[32] M. Passare and A. Tsikh. Amoebas: their spines and their contours. Contemp. Math. 377:275 -- 288, 2005.
[33] A. Patchkoria. On derived functors of semimodule-valued functors. Proc. A. Razmadze Math. Inst. (in Russian) 83:60 --
75,1986.
[34] A. Patchkoria, Extension of semimodules and the Takahashi functor ExtA(C, A). Homology, Homotopy, and Applica-
tions, 5:387 -- 406, 2003.
[35] S. Payne. Fibers of tropicalizations, Arch. Math., 2010 Correction: preprint at arXiv:0705.1732v2 [math.AG], 2012.
[36] S. Payne. Analytification is the limit of all tropicalizations, preprint at arXiv: 0806.1916v3 [math.AG], 2009.
[37] L. Rowen. Graduate algebra: Commutative view. Graduate Studies in Mathematics 73, 2006. American Mathematical
Society 91, 2006.
[38] L. Rowen. Graduate algebra: Noncommutative view. Graduate Studies in Mathematics 73, 2006. American Mathemat-
ical Society, 2006.
[39] E. Sheiner and S. Shnider. An exploded-layered version of Payne's generalization of Kapranov's theorem. preprint,
2012.
[40] E. Shustin. Patchworking singular algebraic curves, non-Archimedean amoebas and enumerative geometry. Algebra i
Analiz, 17(2):170-214, 2005.
[41] M.Takahashi. Extension of semimodules I. Math.Sem.Notes Kobe. Univer. 10:563 -- 592, 1982.
[42] J. Worthington. A bialgebra approach to automata and formal language theory. Proceedings of the 2009 International
Symposium on Logical Foundations of Computer Science, Proceeding LFCS 09, 451 -- 467, 2009.
34
Z. IZHAKIAN, M. KNEBUSCH, AND L. ROWEN
Department of Mathematics, Bar-Ilan University, Ramat-Gan 52900, Israel
E-mail address: [email protected]
Department of Mathematics, University of Regensburg, Regensburg, Germany
E-mail address: [email protected]
Department of Mathematics, Bar-Ilan University, Ramat-Gan 52900, Israel
E-mail address: [email protected]
|
1107.2076 | 1 | 1107 | 2011-07-11T17:24:44 | Finite Modules over $\Bbb Z[t,t^{-1}]$ | [
"math.RA",
"math.AT"
] | Let $\Lambda=\Bbb Z[t,t^{-1}]$ be the ring of Laurent polynomials over $\Bbb Z$. We classify all $\Lambda$-modules $M$ with $|M|=p^n$, where $p$ is a primes and $n\le 4$. Consequently, we have a classification of Alexander quandles of order $p^n$ for $n\le 4$. | math.RA | math |
FINITE MODULES OVER Z[t, t−1]
XIANG-DONG HOU
Abstract. Let Λ = Z[t, t−1] be the ring of Laurent polynomials over Z. We
classify all Λ-modules M with M = pn, where p is a primes and n ≤ 4.
Consequently, we have a classification of Alexander quandles of order pn for
n ≤ 4.
1. Introduction
Let Λ = Z[t, t−1] be the ring of Laurent polynomials over Z, which is also the
group ring over Z of the infinite cyclic group. Each Λ-module is uniquely determined
by a pair (M, α), where M is an abelian group and α ∈ AutZ(M ). The resulting
Λ-module, denoted by Mα, is M with a scalar multiplication defined by tx = α(x),
x ∈ M . If two Λ-modules Mα and Nβ are isomorphic, where α ∈ AutZ(M ) and
β ∈ AutZ(N ), then M ∼= N as abelian groups. Moreover, for α, β ∈ AutZ(M ),
Mα ∼= Mβ if and only if α and β are conjugate in AutZ(M ). Thus, to classify Λ-
modules with an underlying abelian group M is to determine the conjugacy classes
of AutZ(M ).
Our interest in finite Λ-modules comes from topology. In knot theory, a quandle
is defined to be a set of Q equipped with a binary operation ∗ such that for all
x, y, z ∈ Q,
(i) x ∗ x = x,
(ii) ( ) ∗ y is a permutation of Q,
(iii) (x ∗ y) ∗ z = (x ∗ z) ∗ (y ∗ z).
Finite quandles are used to color knots; the number of colorings of a knot K by
a finite quandle Q is an invariant of K which allows us to distinguish inequivalent
knots effectively [1, 2].
An Alexander quandle is a Λ-module M with a quandle operation defined by
x∗y = tx+(1−t)y, x, y ∈ M . The following theorem is of fundamental importance.
Theorem 1.1 ([8]). Two finite Alexander quandles M and N are isomorphic if
and only if M = N and the Λ-modules (1 − t)M and (1 − t)N are isomorphic.
Therefore, the classification of finite Alexander quandles is essentially the clas-
sification of finite Λ-modules.
The classification of finite Λ-modules can be reduced to that of Λ-modules of
order pn, where p is a prime; see section 2. The same is true for the classification
of finite Alexander quandles; see section 4. Finite Alexander quandles have been
classified for orders up to 15 in [8] and for order 16 in [6, 7]. Also known is the
classification of connected Alexander quandles of order p2 [3, 8]. (A finite Alexander
quandle is called connected if 1 − t ∈ AutZ(M ).) The purpose of the present paper
2000 Mathematics Subject Classification. 16S34, 20K01, 57M27.
Key words and phrases. Alexander quandle, finite module, knot, group ring.
1
2
XIANG-DONG HOU
is to classify all Λ-modules and Alexander quandles of order pn, n ≤ 4. The
details of the classification are given in Table 1 in the appendix. For a snapshot,
there are 5p4 − 2p3 − 2p − 1 nonisomorphic Λ-modules of order p4 and there are
5p4 − 6p3 + p2 − 6p − 1 nonisomorphic Alexander quandles of order p4.
In section 2, we show that every finite Λ-module has a unique decomposition
where each direct summand M has the following properties:
(i) M = pn for some prime p and integer n > 0.
(ii) When treating t as an element of EndZp (M/pM ), the minimal polynomial
of t is a power of some irreducible f ∈ Zp[X].
In section 3, we classify such Λ-modules M of order pn with n ≤ 4. In section 4, we
derive the classification of Alexander quandles of order pn, n ≤ 4, from the results
of section 3. For this purpose, we prove the following fact which is of interest in
its own right: Given a finite Λ-module N and an integer l > 0, a necessary and
sufficient condition for the existence of a Λ-module M ⊃ N such that (1 − t)M = N
and M/N = l is N/(1 − t)N (cid:12)(cid:12) l.
In our notation, the letter t is reserved for the element t ∈ Λ = Z[t, t−1]. The
group of units of a ring R is denoted by R×; the set of all m × n matrices over R
is denoted by Mm×n(R).
2. Decomposition of Finite Λ-Modules
Let M be a finite Λ-module. For each prime p, let
Mp = {x ∈ M : pnx = 0 for some n ≥ 0}.
It is quite obvious that
(2.1)
Mp.
M =Mp
Moreover, two finite Λ-modules M and N are isomorphic if and only if Mp ∼= Np
for all primes p.
Theorem 2.1. Let M be a finite Λ-module with M = pn. For each irreducible
f ∈ Zp[X], let f ∈ Z[X] be a lift of f and define
Mf = {x ∈ M : f (t)mx = 0 for some m ≥ 0}.
(2.2)
Then
(2.3)
Mf ,
M =Mf
where f runs over all irreducible polynomials in Zp[X]. Moreover, if N is another
finite Λ-module whose order is a power of p, then M ∼= N if and only if Mf ∼= Nf
for all irreducible f ∈ Zp[X].
Note. Mf depends only on f but not on f . Also, Mf = 0 unless f divides the
minimal polynomial of t (viewed as an element of EndZp (M/pM )).
Proof of Theorem 2.1. 1◦ Let the minimal polynomial of t (∈ EndZp (M/pM )) be
f e1
1 · · · f ek
k , where f1, . . . , fk ∈ Zp[X] are distinct irreducibles and e1, . . . , ek are
positive integers. We claim that
(2.4)
M = M1≤i≤k
Mfi .
FINITE MODULES OVER Z[t, t−1]
3
We first show that P1≤i≤k Mfi
(cid:0)P1≤j≤k, j6=i Mfj(cid:1). Then there exists m > 0 such that fi(t)mx = 0 and
(cid:0)Q1≤j≤k, j6=i fj(t)(cid:1)m
x = 0. Since gcd(cid:0)fi,Q1≤j≤k, j6=i fj(cid:1) = 1, there exist u, v ∈
is a direct sum. Assume that x ∈ Mfi ∩
Zp[X] such that
uf m
i + v(cid:16) Y1≤j≤k
j6=i
fj(cid:17)m
= 1.
Let u, v ∈ Z[X] be arbitrary lifts of u, v, respectively. Then
m
ufi
+ v(cid:16) Y1≤j≤k
j6=i
fj(cid:17)m
≡ 1 (mod p).
u(t)fi(t)m + v(t)(cid:16) Y1≤j≤k
j6=i
fj(t)(cid:17)m
∈ AutZ(M ).
hu(t)fi(t)m + v(t)(cid:16) Y1≤j≤k
j6=i
fj(t)(cid:17)mix = 0,
Therefore
Since
we have x = 0.
Now we prove that M =P1≤i≤k Mfi . There exist u1, . . . , uk ∈ Zp[X] such that
X1≤i≤k
ui(cid:16) Y1≤j≤k
j6=i
f ej
j (cid:17)n
= 1.
Let ui ∈ Z[X] be a lift of ui and let Fi =Q1≤j≤k, j6=i fj
uiF n
i ≡ 1
(mod p).
X1≤i≤k
ej . Then
Thus P1≤i≤k ui(t)Fi(t)n ∈ AutZ(M ). It follows that
Fi(t)nM.
(2.5)
M = X1≤i≤k
Since (cid:0)Q1≤j≤k fj(t)ej(cid:1)M ⊂ pM , we have
fi(t)einFi(t)nM =(cid:16) Y1≤j≤k
fj(t)ej(cid:17)n
M ⊂ pnM = 0.
Thus Fi(t)nM ⊂ Mfi. Then it follows from (2.5) that M =P1≤i≤k Mfi .
2◦ Let N be another finite Λ-module whose order is a power of p.
If there
is a Λ-module isomorphism φ : M → N , then for each irreducible f ∈ Zp[X],
φMf : Mf → Nf is an isomorphism. Conversely, if Mf ∼= Nf for all irreducible
f ∈ Zp[X], then by (2.3), M ∼= N .
(cid:3)
4
XIANG-DONG HOU
3. Classification of Λ-Modules of Order pn, n ≤ 4
3.1. The automorphism group of a finite abelian group.
Let p be a prime and let m ≥ n > 0 be integers. Elements of Zpm can be viewed
as elements of Zpn via the homomorphism
Zpm
−→
Zpn
a + pmZ 7−→ a + pnZ,
a ∈ Z.
Likewise, elements of pm−nZpn can be viewed as elements of Zpm via the embedding
pm−nZpn
pm−n(a + pnZ)
−→
7−→ pm−na + pmZ,
Zpm
a ∈ Z.
We shall adopt these conventions hereafter.
Let M = Zn1
pe1 × · · · × Znk
pek , where ni > 0 and e1 > · · · > ek > 0. Elements of
EndZ(M ) are of the form
σA : M −→
M
x1
...
xk
7−→ A
,
xi ∈ Zni
pei ,
x1
...
xk
A11
A21
...
Ak1
A =
pe1−e2 A12
A22
...
Ak2
· · ·
· · ·
· · ·
pe1−ek A1k
pe2−e1 A2k
...
Akk
,
where
(3.1)
and Aij ∈ Mni×nj (Zpei ). Let M(M ) denote the set of all matrices of the form (3.1).
Then
M(M ) −→ EndZ(M )
A
7−→
σA
is a ring isomorphism. Let GL(M ) denote the group of units of M(M ). Of course
GL(M ) ∼= AutZ(M ) under the above isomorphism. It is known [4, 9] (and also easy
to prove) that
GL(M ) = {A : A is of the form (3.1) with Aii ∈ GL(ni, Zpei ), 1 ≤ i ≤ k}.
The modulo p reduction from GL(M ) to GL(n1 + · · · + nk, Zp) is denoted by ( ).
For each (monic) irreducible f ∈ Zp[X] with f 6= X, define
GL(M )f = {A ∈ GL(M ) : the minimal polynomial of
A ∈ GL(n1 + · · · + nk, Zp) is a power of f }.
If λ(i) = (λi1, λi2, . . . ) is a partition of the integer ni/ deg f , 1 ≤ i ≤ k, we define
GL(M )λ(1) ...λ(k)
f
= {A as in (3.1) : the elementary divisors of Aii
are f λi1 , f λi2 , . . . , 1 ≤ i ≤ k}.
In this setting, our goal is to determine the GL(M )-conjugacy classes in GL(M )f .
We will proceed according to the structure of (M, +).
FINITE MODULES OVER Z[t, t−1]
5
3.2. (M, +) = Zpe .
In this case we must have f = X − a, a ∈ Z×
p . The conjugacy classes in GL(M )f
are represented by
3.3. (M, +) = Zn
p .
[b],
b ∈ Zpe , b ≡ a (mod p).
In this case we must have deg f n. The conjugacy classes in GL(M )f are
represented by the rational canonical forms in GL(n, Zp) with elementary divisors
f λ1, f λ2 , . . . , where λ1 ≥ λ2 ≥ · · · > 0 is a partition of n/ deg f .
3.4. (M, +) = Zpe × Zp, e > 1.
In this case, deg f = 1.
Theorem 3.1. Assume (M, +) = Zpe × Zp, e > 1, and f = X − a, a ∈ Z×
conjugacy classes in GL(M )f are represented by the following matrices:
p . The
(i) (cid:20)b
(ii) (cid:20)b
(iii) (cid:20)b
0
b(cid:21) +(cid:20)pe−1α 0
0(cid:21),
b(cid:21) +(cid:20)0 0
1 0(cid:21),
b(cid:21) +(cid:20)0
0 (cid:21),
pe−1
γ
0 < b < pe−1, b ≡ a (mod p), α ∈ Zp.
0 < b < pe−1, b ≡ a (mod p).
0 < b < pe−1, b ≡ a (mod p), γ ∈ Zp.
Proof. Elements of GL(M )f are of the form
A(b, α, β, γ) :=(cid:20)b
0
0
b(cid:21) +(cid:20)pe−1α pe−1β
0 (cid:21) ,
γ
where 0 < b < pe−1, b ≡ a (mod p), α, β, γ ∈ Zp. Let A(b, α, β, γ), A(b, α′, β′, γ′) ∈
GL(M )f and
The above equation can be written as a matrix equation over Zp:
The equation P A(b, α, β, γ) = A(b, α′, β′, γ′)P is equivalent to
x ∈ Z×
pe , w ∈ Z×
p , y, z ∈ Zp.
z
0
wγ
P =(cid:20)x pe−1y
w (cid:21) ∈ GL(M ),
(cid:20)pe−1(xα + yγ) pe−1xβ
(cid:20)xα + yγ xβ
(cid:20)x y
0 w(cid:21)(cid:20)β α
wγ
0
(cid:21) .
0
γ′x
(cid:21) =(cid:20)pe−1(α′x + β′z) pe−1β′w
0 (cid:21) =(cid:20)α′x + β′z β′w
0 (cid:21) ,
γ(cid:21) =(cid:20)β′ α′
γ′(cid:21)(cid:20)w z
0 x(cid:21) .
γ′x
0
equivalently,
So, A(b, α, β, γ) and A(b, α′, β′, γ′) are conjugate if and only if there exist x, y ∈ Z×
p
and y, z ∈ Zp such that
(3.2)
(cid:20)x y
0 w(cid:21)(cid:20)β α
γ(cid:21)(cid:20)w−1
0
z
0
0
x−1(cid:21) =(cid:20)β′ α′
γ′(cid:21) .
0 γ ′i ∈ M, say A ∼ A′
0 γi , A′ = h β ′ α′
p and y, z ∈ Zp. It is easy to see that the
Let M = {h β α
0 γi : α, β, γ ∈ Zp}. For A = h β α
if (3.2) is satisfied for some x, w ∈ Z×
∼ equivalence classes in M are represented by
6
XIANG-DONG HOU
0
(i) (cid:20)0 α
0(cid:21) , α ∈ Zp,
(ii) (cid:20)0
1(cid:21),
(iii) (cid:20)1
γ(cid:21) ,
γ ∈ Zp.
These matrices correspond to the representatives of the conjugacy classes in GL(M )f
stated in the theorem.
(cid:3)
3.5. (M, +) = Z2
p2 .
In this case, deg f = 1 or 2.
Theorem 3.2. Assume (M, +) = Z2
p2 .
(i) Let f = X − a, a ∈ Z×
p . Then the conjugacy classes in GL(M )(1,1)
f
are
represented by the following matrices:
(i.1) (cid:20)b
(i.2) (cid:20)b
(i.3) (cid:20)b
b(cid:21) + p(cid:20)α
δ(cid:21) ,
b(cid:21) + p(cid:20)α 1
α(cid:21) ,
b(cid:21) + p(cid:20) 0
1
−b0 −b1(cid:21) ,
Zp[X] irreducible.
(ii) Let f = X − a, a ∈ Z×
sented by
0 < b < p, b ≡ a (mod p), 0 ≤ α ≤ δ < p.
0 < b < p, b ≡ a (mod p), α ∈ Zp.
0 < b < p, b ≡ a (mod p), X 2 + b1X + b0 ∈
p . Then the conjugacy class in GL(M )(2)
f
are repre-
(cid:20)b
0
1
b(cid:21) + p(cid:20)α 0
0(cid:21) ,
γ
0 < b < p, b ≡ a (mod p), α, γ ∈ Zp.
(iii) Let f = X 2 + a1X + a0 ∈ Zp[X] be irreducible. Then the conjugacy classes
in GL(M )f are represented by
1
−b0 −b1(cid:21) + p(cid:20)α β
0(cid:21) ,
(cid:20) 0
0
0 ≤ b0, b1 < p, b0 ≡ a0
(mod p),
b1 ≡ a1
(mod p), α, β ∈ Zp.
Proof. We remind the reader that in the proof, our notation is local in each of the
three cases.
(i) Elements of GL(M )(1,1)
f
are of the form
γ
are represented by
0 < b < p, b ≡ a (mod p), α, β, γ, δ ∈ Zp.
b(cid:21) + p(cid:20)α β
δ(cid:21) ,
Clearly, A(b, α, β, γ, δ) and A(b, α′, β′, γ′, δ′) are conjugate in GL(M ) if and only if
A(b, α, β, γ, δ) :=(cid:20)b
γ ′ δ′i are conjugate in M2×2(Zp). The conjugacy classes in M2×2(Zp)
γ δi and h α′ β ′
h α β
(1) (cid:20)α
δ(cid:21) ,
(2) (cid:20)α 1
α(cid:21) , α ∈ Zp,
0 ≤ α ≤ δ < p,
FINITE MODULES OVER Z[t, t−1]
7
(3) (cid:20) 0
−b0 −b1(cid:21) , X 2 + b1X + b0 ∈ Zp[X] irreducible.
1
These correspond to the matrices in (i.1) -- (i.3).
(ii) Elements of GL(M )(2)
f
are conjugate to matrices of the form
A(b, α, β, γ, δ) :=(cid:20)b
0
1
b(cid:21) + p(cid:20)α β
δ(cid:21) ,
γ
0 < b < p, b ≡ a (mod p), α, β, γ, δ ∈ Zp.
Assume that P ∈ GL(M ) = GL(2, Z
p2 ) such that
(3.3)
Then over Zp,
P A(b, α, β, γ, δ) = A(b, α′, β′, γ′, δ′)P.
which implies that P = [ c d
0 c ], c ∈ Z×
p , d ∈ Zp. So
P(cid:20)b
0
1
b(cid:21) =(cid:20)b
0
1
b(cid:21) P ,
P =(cid:20)c d
c(cid:21) + p(cid:20)x y
z w(cid:21) ,
0
x, y, z, w ∈ Zp.
Now (3.3) becomes
p(cid:20)c d
c(cid:21)(cid:20)α β
δ(cid:21) + p(cid:20)x y
z w(cid:21)(cid:20)b
γ
0
0
Over Zp, this becomes
(cid:20)c d
c(cid:21)(cid:20)α β
δ(cid:21) +(cid:20)x y
z w(cid:21)(cid:20)b
γ
0
0
which can be simplified as
1
b(cid:21) = p(cid:20)α′ β′
δ′(cid:21)(cid:20)c d
c(cid:21) + p(cid:20)b
γ′
0
0
1
b(cid:21)(cid:20)x y
z w(cid:21) .
1
b(cid:21) =(cid:20)α′ β′
δ′(cid:21)(cid:20)c d
c(cid:21) +(cid:20)b
γ′
0
0
1
b(cid:21)(cid:20)x y
z w(cid:21) ,
(cid:20)c d
c(cid:21)(cid:20)α β
δ(cid:21) =(cid:20)α′ β′
δ′(cid:21)(cid:20)c d
c(cid:21) +(cid:20)z w − x
−z (cid:21) .
γ′
γ
0
0
0
Thus, A(b, α, β, γ, δ) and A(b, α′, β′, γ′, δ′) are conjugate if and only if there exist
d, z, w ∈ Zp such that
(3.4)
0
γ
(cid:20)1 d
1(cid:21)(cid:20)α β
γ δi, A′ = h α′ β ′
δ(cid:21)(cid:20)1 −d
1 (cid:21) +(cid:20)z w
0 −z(cid:21) =(cid:20)α′ β′
δ′(cid:21) .
γ′
0
For A = h α β
some d, z, w ∈ Zp. It is easy to see that the ∼ equivalence classes in M2×2(Zp) are
represented by
γ ′ δ′i ∈ M2×2(Zp), say A ∼ A′ if (3.4) is satisfied for
which correspond to the matrices in (ii).
(cid:20)α 0
0(cid:21) , α, β ∈ Zp,
γ
(iii) Elements of GL(M )f are conjugate to matrices of the form
A(f, α, β, γ, δ) :=(cid:20) 0
−b0 −b1(cid:21) + p(cid:20)α β
δ(cid:21) , 0 ≤ b0, b1 < p, b0 ≡ a0
γ
1
(mod p),
b1 ≡ a1
(mod p), α, β, γ, δ ∈ Zp.
Assume that P ∈ GL(2, Z
p2 ) such that
(3.5)
P A(f, α, β, γ, δ) = A(f, α′, β′, γ′, δ′)P.
8
XIANG-DONG HOU
Then over Zp,
which implies that
1
−b0 −b1(cid:21) =(cid:20) 0
P (cid:20) 0
−b0 −b1(cid:21) P ,
1
P = uI + v(cid:20) 0
−b0 −b1(cid:21) + p(cid:20)x y
z w(cid:21) ,
1
0 ≤ u, v < p, (u, v) 6= (0, 0), x, y, z, w ∈ Zp.
Now (3.5) becomes the following equation over Zp:
(3.6)
(cid:16)uI + v(cid:20) 0
−b0 −b1(cid:21)(cid:17)(cid:20)α β
γ
1
1
[5, §4.4] and has a basis
The space (cid:8)(cid:2) 0
−b0 −b1(cid:3) X − X(cid:2) 0
−b0 −b1(cid:21)(cid:20)1 0
(cid:20) 0
−b0 −b1(cid:21)(cid:20)0
(cid:20) 0
1
1
1
1
γ′
δ(cid:21) = (cid:20)α′ β′
+(cid:20) 0
δ′(cid:21)(cid:16)uI + v(cid:20) 0
−b0 −b1(cid:21)(cid:20)x y
−b0 −b1(cid:21)(cid:17)
z w(cid:21) −(cid:20)x y
−b0 −b1(cid:21) .
−b0 −b1(cid:3) : X ∈ M2×2(Zp)(cid:9) has dimension 2 over Zp
z w(cid:21)(cid:20) 0
1
1
1
1
0 0(cid:21) −(cid:20)1 0
0(cid:21) −(cid:20)0
0 0(cid:21)(cid:20) 0
0(cid:21)(cid:20) 0
−b0 −b1(cid:21) =(cid:20) 0
−b0 −b1(cid:21) =(cid:20)b0
0 (cid:21) ,
0 −b0(cid:21) .
−b0
−1
b1
0
1
1
0
So (3.6) can be written as
(3.7)
(cid:16)uI + v(cid:20) 0
−b0 −b1(cid:21)(cid:17)(cid:20)α β
γ
1
γ′
δ(cid:21) = (cid:20)α′ β′
+(cid:20)−d
−b0 −b1(cid:21)(cid:17)
δ′(cid:21)(cid:16)uI + v(cid:20) 0
(cid:21) ,
− d b1
b0
d
c, d ∈ Zp.
c
b0
1
c
Thus A(f, α, β, γ, δ) and A(f, α′, β′, γ′, δ′) are conjugate if and only if there exist
0 ≤ u, v ≤ v < p, (u, v) 6= (0, 0), and c, d ∈ Zp such that
(3.8)
1
γ
c
b0
(cid:16)uI+v(cid:20) 0
For A = h α β
−b0 −b1(cid:21)(cid:17)(cid:16)(cid:20)α β
=(cid:20)α′ β′
δ(cid:21)−(cid:20)−d
δ′(cid:21) .
γ ′ δ′i ∈ M2×2(Zp), say A ∼ A′ if (3.8) is satisfied for
γ δi , A′ = h α′ β ′
−b0 −b1(cid:21)(cid:17)−1
(cid:21)(cid:17)(cid:16)uI+v(cid:20) 0
some 0 ≤ u, v < p, (u, v) 6= (0, 0), and c, d ∈ Zp. It remains to show that the ∼
equivalence classes in M2×2(Zp) are represented by
− d b1
b0
d
γ′
1
c
(cid:20)α β
0(cid:21) , α, β ∈ Zp.
0
First, choose u = 1, v = 0, c = −γ, d = −δ. Then the left side of (3.8) becomes
(cid:2) α′ β ′
0 0 (cid:3) for some α′, β′ ∈ Zp.
Next, assume that (3.8) holds with γ = δ = γ′ = δ′ = 0. We want to show that
(α, β) = (α′, β′). Taking the traces of the two sides of (3.8), we have α = α′. Now
(3.7) with α = α′ and γ = δ = γ′ = δ′ = 0 gives
uβ
−vb0α −vb0β(cid:21) =(cid:20)αu − β′vb0 αv − β′(u − vb1)
(cid:20) uα
0
0
(cid:21) +(cid:20)−d
c
c
b0
− d b1
b0
d
(cid:21) .
FINITE MODULES OVER Z[t, t−1]
9
Taking the traces, we have vb0β = vb0β′. If v 6= 0, then β = β′. If v = 0, then
c = d = 0, which implies uβ = uβ′. Since u 6= 0, we also have β = β′.
(cid:3)
3.6. (M, +) = Z
p2 × Z2
p.
In this case deg f = 1.
Theorem 3.3. Assume (M, +) = Z
p2 × Z2
p and f = X − a, a ∈ Z×
p .
(i) The conjugacy classes in GL(M )(1)(1,1)
f
matrices:
are represented by the following
0 < b < p, b ≡ a (mod p), α ∈ Zp.
0 < b < p, b ≡ a (mod p).
0 < b < p, b ≡ a (mod p), η ∈ Zp.
0 < b < p, b ≡ a (mod p).
0 < b < p, b ≡ a (mod p), α ∈ Zp.
0 < b < p, b ≡ a (mod p).
0 < b < p, b ≡ a (mod p), η ∈ Zp.
b
b
b
b
(i.1)
(i.2)
(i.3)
(i.4)
trices:
b
b
b
(ii.1)
(ii.2)
(ii.3)
b
b
b
b
b 1
b 1
b 1
pα 0
0
0
0
0
0
0
0 0
0 0
0
,
0 0
,
0
,
0 0
p 0
0
0
0
,
0 p 0
1
0 0
0
pα 0
0
0
0
0
0 0
0 0
1 0
0
0
0
0
0
,
0
,
0
,
p 0
0
0
0
0
1
0
0
0
η
b
+
b
+
+
b
b
+
b
+
b
+
b
+
+
b
0
0
η
b
(ii) The conjugacy classes in GL(M )(1)(2)
f
are represented by the following ma-
Proof. (i) Elements of GL(M )(1)(1,1)
are of the form
f
b
A(b, α, . . . , η) :=
pα pβ pγ
δ
0
η
0
0
0
,
Assume that P ∈ GL(M ) such that
(3.9)
Write
P A(b, α, . . . , η) = A(b, α′, . . . , η′)P.
P =(cid:20)x pY
Z W(cid:21) ,
0 < b < p, b ≡ a (mod p), α, . . . , η ∈ Zp.
10
XIANG-DONG HOU
where x ∈ Z×
p2 , Y ∈ M1×2(Zp), Z ∈ M2×1(Zp), W ∈ GL(2, Zp). Then (3.9) becomes
η(cid:21) px[β, γ]
pxα + pY (cid:20)δ
W (cid:20)δ
η(cid:21)
Over Zp, this becomes
0
0
α
=
=
η(cid:21)
=
(cid:20)δ
η(cid:21)
(cid:20)W −1
(cid:20)δ
η(cid:21)
(cid:20)δ
η(cid:21)
, A′ =
(cid:20)δ
[β, γ]
α
α
α
0
0
η(cid:21) x[β, γ]
xα + Y (cid:20)δ
W (cid:20)δ
η(cid:21)
0 W(cid:21)
(cid:20)x Y
[β, γ]
0
0
[β, γ]
0 W(cid:21)
(cid:20)x Y
M =n
pα′x + p[β′, γ′]z
(cid:20)δ′
η′(cid:21) x
α′x + [β′, γ′]z
(cid:20)δ′
η′(cid:21) x
p[β′, γ′]W
0
.
[β′, γ′]W
0
.
[β′, γ′]
0
0
α′
η′(cid:21)
(cid:20)W Z
x(cid:21) .
(cid:20)δ′
x−1(cid:21) =
η′(cid:21)
(cid:20)δ′
[β′, γ′]
α′
Z
0
: α, . . . , η ∈ Zpo.
η′(cid:21)
(cid:20)δ′
∈ M,
[β′, γ′]
α′
0
(3.10)
Let
For
It is more convenient to write the above equation as
So, A(b, α, . . . , η) and A(b, α′, . . . , η′) are conjugate if and only if
for some x ∈ Z×
p , W ∈ GL(2, Zp), Y ∈ M1×2(Zp), Z ∈ M2×1(Zp).
say A ∼ A′ if (3.10) is satisfied. It is easy to see that the ∼ equivalence classes in
M are represented by
0
α
[β, γ]
A =
0(cid:21)
(cid:20)0
, α ∈ Zp,
0(cid:21)
(cid:20)1
,
η(cid:21)
(cid:20)0
0(cid:21)
(cid:20)1
η ∈ Zp,
.
,
[0 0]
[0 0]
[1 0]
[1 0]
(1)
(2)
(3)
(4)
FINITE MODULES OVER Z[t, t−1]
11
These correspond to the matrices in (i.1) -- (i.4).
(ii) Elements of GL(M )(1)(1,1)
f
are conjugate for matrices of the form
b
A(b, α, . . . , η) :=
b 1
b
+
pα pβ pγ
δ
0
η
0
0
0
Assume that P ∈ GL(M ) such that
, 0 < b < p, b ≡ a (mod p), α, . . . , η ∈ Zp.
P A(b, α, . . . , η) = A(b, α′, . . . , η′)P.
P =(cid:20)x pY
Z W(cid:21) ,
where x ∈ Z×
p2 , Y ∈ M1×2(Zp), Z ∈ M2×1(Zp), W ∈ GL(2, Zp). Since W commutes
0 c ]. Equation (3.11) is equivalent to
(3.11)
Write
with (cid:2) b 1
pα′x + p[β′, γ′]Z p[β′, γ′]W
0
.
Over Zp, this becomes
η(cid:21) px[β, γ]
0
pxα + pY (cid:20)δ
W (cid:20)δ
η(cid:21)
+
=
0
1
0
0
1
0(cid:21) Z (cid:20)0
b(cid:3), we have W = [ c d
+
0 pY (cid:20)0 1
0(cid:21)
0 W (cid:20)0
0(cid:21)
=
0(cid:21) W
(cid:20)0 1
+
xα+Y(cid:20)δ
η(cid:21) x[β, γ]
W(cid:20)δ
η(cid:21)
+
Y (cid:20)0 1
0(cid:21)
η(cid:21)
(cid:20)δ
[β, γ]
α
0
0
0
0
(cid:20)δ′
η′(cid:21) x
0(cid:21)Z 0
+
(cid:20)0 1
=
0(cid:21) Z
0
1
−(cid:20)0
0 Y(cid:20)0 1
0(cid:21)
0
0
0 W(cid:21)
(cid:20)x Y
which can be written as
α′x+[β′, γ′]Z [β′, γ′]W
(cid:20)δ′
η′(cid:21) x
0
,
[β′, γ′]
0
α′
η′(cid:21)
(cid:20)W Z
x(cid:21) .
(cid:20)δ′
0
So, A(b, α, . . . , η) and A(b, α′, . . . , η′) are conjugate if and only if
(3.12)
[β, γ] α
0 W(cid:21)
(cid:20)x Y
0
η(cid:21)
"W −1 Z
(cid:20)δ
0
x−1# +
Y(cid:20)0 1
0(cid:21)W −1 Y (cid:20)0 1
0(cid:21) Z
(cid:20)0 1
0(cid:21) W Z
0
=
for some x ∈ Z×
p , Y ∈ M1×2(Zp), Z ∈ M2×1(Zp), W = [ c d
c ] ∈ GL(2, Zp).
[β′, γ′] α′
0
η′(cid:21)
(cid:20)δ′
Let
[β, γ]
0
M =n
α
η(cid:21)
(cid:20)δ
: α, . . . , η ∈ Zpo.
12
For
XIANG-DONG HOU
[β, γ]
0
A =
α
η(cid:21)
(cid:20)δ
, A′ =
[β′, γ′]
0
α′
η′(cid:21)
(cid:20)δ′
∈ M,
say A ∼ A′ if (3.12) is satisfied. It remains to determine the representatives of the
∼ equivalence classes in M.
In (3.12), we may assume W = [ 1 d
respectively. Let Y = [y1, y2], Z = [ z1
(3.13)
1 ] by replacing x, Y, W, Z with 1
z2 ]. Then (3.12) becomes
c x, 1
c Y, 1
c W, cZ,
xβ −xβd+xγ +y1 α + xβz1 + xγz2+y1δx−1 +y2ηx−1 +y1z2
0
0
δx−1 + dηx−1 + z2
ηx−1
0
0
=
β′ γ′ α′
0 δ′
0
0
0 η′
.
We claim that the ∼ equivalence classes in M are represented by
[0 0]
[0 0]
[1 0]
(1)
(2)
(3)
0
α
0(cid:21)
(cid:20)0
, α ∈ Zp,
1(cid:21)
(cid:20)0
,
η(cid:21)
(cid:20)0
,
η ∈ Zp.
0
The proof of (ii) will be complete when this claim is proved.
First, it is clear that matrices from different families of (1) -- (3) are not ∼ equiv-
alent. So it remains to show that every A ∈ M can be brought into one of the
"canonical forms" in (1) -- (3) through ∼ equivalence, and the entries in the canon-
ical form are uniquely determined by A.
Let
First assume β = 0 and η = 0. Then
α
[β, γ]
A =
η(cid:21)
(cid:20)δ
LHS of (3.13) =
(xγ + y1 = 0,
δx−1 + z2 = 0,
0
[0 0]
∈ M.
α′
0(cid:21)
(cid:20)0
α′ = α + γδ.
if and only if
(3.14)
and
(3.15)
System (3.14) has a solution (x, y1, z2) = (1, −γ, −δ). Equation (3.15) shows that
α′ is uniquely determined by A.
FINITE MODULES OVER Z[t, t−1]
13
Next, assume β = 0 and η 6= 0. Then
if and only if
(3.16)
[0 0]
LHS of (3.13) =
0
1(cid:21)
(cid:20)0
xγ + y1 = 0,
α + xγz2 + y1δx−1 + y2ηx−1 + y1z2 = 0,
δx−1 + dηx−1 + z2 = 0,
ηx−1 = 1.
System (3.16) has a solution (d, x, y1, y2, z2). (Let d be arbitrary. Solve for x form
the last equation, y1 from the first equation, z2 from the third equation, and y2
from the second equation.)
Finally, assume β 6= 0. Then
[1 0]
LHS of (3.13) =
0
η′(cid:21)
(cid:20) 0
xβ = 1,
−xβd + xγ + y1 = 0,
α + xβz1 + xγz2 + y1δx−1 + y2ηx−1 + y1z2 = 0,
δx−1 + dηx−1 + z2 = 0,
η′ = ηβ.
if and only if
(3.17)
and
(3.18)
System (3.17) has a solution (d, x, y1, y2, z1, z2). (Let y1 and y2 be arbitrary. Solve
for x from the first equation, d from the second equation, z2 from the last equa-
tion, and z1 from the third equation.) Equation (3.18) shows that η′ is uniquely
determined by A.
(cid:3)
3.7. Classification of Λ-modules of order pn, n ≤ 4.
The classification of Λ-modules of order pn, n ≤ 4, is obtained by combining
the results in 3.2 -- 3.6 and using Theorem 2.1. A complete description of the
classification is given in Table 1 in the appendix. From Table 1 we find that the
number of nonisomorphic Λ-modules of order pn is
(3.19)
1
p − 1
2p2 − p − 1
3p3 − 2p2 − 1
5p4 − 2p3 − 2p − 1
if n = 0,
if n = 1,
if n = 2,
if n = 3,
if n = 4.
14
XIANG-DONG HOU
4. Finite Alexander Quandles
By Theorem 1.1, the classification of finite Alexander quandles M is the same
as the classification of finite Λ-modules of the form (1 − t)M . First, the following
question has to be answered: Given a finite Λ-module N and an integer l > 0, does
there exist a Λ-module M ⊃ N such that (1 − t)M = N and M/N = l? Assume
that such an M exists. Since
M/(1 − t)M 1−t−→ (1 − t)M/(1 − t)2M = N/(1 − t)N
is an onto Λ-map, we have N/(1 − t)N (cid:12)(cid:12) l. We will see in Theorem 4.3 that
N/(1 − t)N (cid:12)(cid:12) l is also a sufficient condition for the existence of M .
Lemma 4.1. Let N ⊂ M be abelian groups and let α : N → N and α : M → N be
Z-maps such that αN = α. If 1 − α ∈ Aut(N ), then 1 − α ∈ Aut(M ).
Proof. We first show that 1 − α is 1-1. Let x ∈ ker(1 − α). Then
0 = α(0) = α(x − α(x)) = α(x) − α(α(x)) = (1 − α)(α(x)).
Since 1 − α ∈ Aut(N ), we have α(x) = 0. Thus x = [(1 − α) + α](x) = 0.
Now we show that 1 − α : M → M is onto. Let y ∈ M . Since α(y) ∈ N
and 1 − α ∈ Aut(N ), there exists x ∈ N such that (1 − α)(x) = α(y). Then
y = y − α(y) + x − α(x) = (1 − α)(y + x).
(cid:3)
Theorem 4.2. Let N be a finite abelian group and α ∈ EndZ(N ). Then there exist
a finite abelian group M ⊃ N with M/N = N/α(N ) and an onto homomorphism
α : M → N such that αN = α.
Proof. We may assume that N is a finite abelian p-group. If α(N ) = N , there is
nothing to prove. So assume α(N ) 6= N . Let N/α(N ) = pk and rank N = r (the
number of cyclic summands in a decomposition of N ). We will inductively construct
finite abelian p-groups N = M0 ⊂ M1 ⊂ · · · ⊂ Mk and Z-maps αi : Mi → N ,
0 ≤ i ≤ k, such that α0 = α, Mi+1/Mi = αi+1(Mi+1)/αi(Mi) = p, rank Mi = r,
and αi+1Mi = αi. Then M = Mk and α = αk have the desired property.
Mk
........................................
...........
...
........................................
...........
Mi+1
⊂
...........
....................................................................
Mi
........................................
...........
...
........................................
...........
N = M0
αi+1
............................................................................................................................................................................................................................................................................................................................................. ...........
........................................................................................................................................................................................................................................................................................ ...........
............................................................................................................................................................................................................................................... ...........
αi
α
N
FINITE MODULES OVER Z[t, t−1]
15
Let 0 ≤ i < k and assume that Mi and αi have been constructed. We now
construct Mi+1 and αi+1.
We claim that the mapping Mi/pMi → N/pN induced by αi is not 1-1. Oth-
erwise, since Mi/pMi = pr = N/pN , the mapping is also onto. Then for each
x ∈ N , there exist y0 ∈ Mi and x0 ∈ N such that
x = αi(y0) + px0.
In the same way, x0 = αi(y1) + px1 for some y1 ∈ Mi and x1 ∈ N . Continuing this
way, we can write
x = αi(y0 + py1 + · · · + pnyn) + pn+1xn,
y0, . . . , yn ∈ Mi, xn ∈ N.
Choose n large enough such that pn+1xn = 0. Then x = αi(y0 + py1 + · · · + pnyn) ∈
αi(Mi). So N = αi(Mi), which is a contradiction since αi(Mi)/α(N ) = pi < pk =
N/α(N ).
By the above claim, there exists a ∈ Mi \ pMi such that αi(a) ∈ pN . Write
αi(a) = pb for some b ∈ N .
Case 1. Assume b /∈ αi(Mi). Write Mi = Zpe1 × · · · × Zper , e1 ≥ · · · ≥ er > 0.
pes−1
pes−1 ,
Since a ∈ Mi \ pMi, we may assume a = (pw, 1, 0), where w ∈ Zpe1 × · · · × Z
pes+1 × B where A = Zpe1 × · · · × Z
for some 0 ≤ s < r. Let Mi+1 = A × Z
B = Z
pes+1 × · · · × Zper . Define Z-maps
ι : Mi = A × Zpes × B −→ Mi+1 = A × Z
pes +1 × B
(x, y, z)
7−→
(x, py, z)
αi+1 : Mi+1 = A × Z
pes +1 × B −→
N
(x, y, z)
7−→ αi(x, 0, z) + y(b − αi(w, 0, 0))
Then ι is 1-1, αi+1ι = αi, and Mi+1/Mi = p = αi+1(Mi+1)/αi(Mi).
Case 2. Assume b ∈ αi(Mi), say, b = αi(c), c ∈ Mi. Then αi(a) = pαi(c).
Let a1 = a − pc. Then a1 ∈ Mi \ pMi and αi(a1) = 0. Choose b′ ∈ N \ αi(Mi)
such that pb′ ∈ αi(Mi). Write pb′ = αi(d), d ∈ Mi. Choose ǫ = 0 or 1 such that
a′ := d + ǫa1 /∈ pMi. Then αi(a′) = pb′. Now we are in Case 1 with a′, b′ in place
of a, b, respectively.
(cid:3)
Theorem 4.3. Let N be a finite Λ-module with N/(1 − t)N = l. Then there
exists a finite Λ-module M ⊃ N with M/N = l and (1 − t)M = N .
Proof. Let α = 1−t ∈ EndZ(N ). By Theorem 4.2, there exist a finite abelian group
M ⊃ N and an onto Z-map α : M → N such that αN = α and M/N = N/α(N ).
Since 1−α ∈ AutZ(N ), by Lemma 4.1, 1−α ∈ AutZ(M ). Make M into a Λ-module
by defining
tx = (1 − α)(x),
x ∈ M.
Then ΛN is a submodule of ΛM and (1 − t)M = α(M ) = N .
(cid:3)
Corollary 4.4. Let p be a prime and n a positive integer. Let Mpn be a complete
set of nonisomorphic Λ-modules N such that N = pi, (1 − t)N = pj, 2i − j ≤ n.
For each N ∈ Mpn , let MN ⊃ N be a Λ-module with MN = pn and (1 − t)MN =
N . (The existence of MN is MN is guaranteed by Theorem 4.3.) Then {(MN , ∗) :
N ∈ Mpn } is a complete set of nonisomorphic Alexander quandles of order pn.
16
XIANG-DONG HOU
Proof. Given a Λ-module N with N = pi and (1 − t)N = pj, it follows from
Theorem 4.3 that n ≥ 2i − j is a necessary and sufficient condition on n for which
there exists a Λ-module M ⊃ N with M = pn and (1 − t)M = N . Now the
conclusion in the corollary follows from Theorem 1.1.
(cid:3)
The Λ-modules in Mpn , n ≤ 4, are contained in Table 1; to save space, we will
not enumerate these modules separately. From Table 1 we find that the number of
nonisomorphic Alexander quandles of order pn (n ≤ 4) is
(4.1)
(4.2)
Remark.
The number of nonisomorphic connected Alexander quandles of order pn (n ≤ 4),
also from Table 1, is
if n = 0,
1
if n = 1,
p − 1
2p2 − 2p − 1
if n = 2,
3p3 − 4p2 + p − 3
if n = 3,
5p4 − 6p3 + p2 − 6p − 1 if n = 4.
if n = 0,
1
if n = 1,
p − 2
2p2 − 3p − 1
if n = 2,
3p3 − 6p2 + p
if n = 3,
5p4 − 9p3 + p2 − 2p + 1 if n = 4.
(i) (4.1) agrees with the numbers of nonisomorphic Alexander quandles of order
≤ 15 in [8].
(ii) (4.2) with n = 2 agrees with the results of [3, 8]; (4.2) with pn = 24 agrees
with the number in [7].
(iii) [7] stated that the number of nonisomorphic Alexander quandles of order
16 is 24. Our result ((4.1) with pn = 24) is 23. It appears that the two
Alexander quandles in [7] with Im(Id − φ) = Z4 ⊕ Z2 (notation of [7]) are
isomorphic. Professor W. E. Clark computed the numbers of nonisomorphic
quandles of order pn < 28 using a computer program; his results (with
n ≤ 4) agree with (4.1).
Appendix: Table
Table 1. Nonisomorphic Λ-modules of order pn, n ≤ 4
n = 0
(M, +) matrix of t
0
[0]
n = 1
(M, +) matrix of t
Zp
[b], b ∈ Z×
p
(1 − t)M number
1
1
total
1
(1 − t)M number
p0 if b = 1
p1 if b 6= 1
p − 2
1
total
p − 1
FINITE MODULES OVER Z[t, t−1]
17
Acknowledgment
I thank Professor W. Edwin Clark for sharing his computational results on the
numbers of nonisomorphic Alexander quandles.
References
[1] S. Carter, S. Kamada, M. Saito, Surfaces in 4-Space, Encyclopaedia of Mathematical Sciences,
142. Low-Dimensional Topology, III. Springer-Verlag, Berlin, 2004.
[2] W. E. Clark, M. Elhamdadi, X. Hou, M. Saito, T. Yeatman Connected quandles associated
with pointed abelian groups, preprint.
[3] M. Grana, Indecomposable racks of order p2, Beitrage Algebra Geom. 45 (2004), 665 - 676.
[4] C. J. Hillar and D. L. Rhea, Automorphisms of finite abelian groups, Amer. Math. Monthly
114 (2007), 917 - 923.
[5] R. A. Horn and C. R. Johnson, Topics in Matrix Analysis, Cambridge University Press,
Cambridge, 1991.
[6] G. Murillo and S. Nelson, Alexander quandles of order 16, J. Knot Theory Ramifications 17
(2008), 273 - 278.
[7] G. Murillo and S. Nelson, Erratum: Alexander quandles of order 16, J. Knot Theory Rami-
fications 18 (2009), 727.
[8] S. Nelson, Classification of finite Alexander quandles, Topology Proc. 27 (2003), 245 - 258.
[9] A. Ranum, The group of classes of congruent matrices with application to the group of
isomorphisms of any abelian group, Trans. Amer. Math. Soc. 8 (1907), 71 - 91.
Department of Mathematics and Statistics, University of South Florida, Tampa, FL
33620
E-mail address: [email protected]
Table 1. Nonisomorphic Λ-modules of order pn, n ≤ 4 (continued)
1
8
matrix of t
(1 − t)M
number
total
n = 2
(M, +)
Z
p2
[b], b ∈ Z×
p2
-
I
X
A
N
G
D
O
N
G
H
O
U
Z2
p
Z2
p
Z2
p
(cid:20)b
c(cid:21) , 0 < b ≤ c < p
(cid:20)b 1
b(cid:21) , b ∈ Z×
−b0 −b1(cid:21) , X 2 + b1X + b0 ∈ Zp[X] irr p2
(cid:20) 0
1
p
p0 if b = 1
p1 if b 6= 1, b ≡ 1 (p)
p2 if b 6≡ 1 (p)
p0 if b = c = 1
p1 if b = 1 < c
p2 if b > 1
p1 if b = 1
p2 if b 6= 1
1
p − 1
(p − 2)p
1
p − 2
(cid:0)p−1
2 (cid:1)
1
p − 2
p2 − p
(cid:0)p
2(cid:1)
p − 1
1
2 (p2 − p)
1
2 (p2 − p)
n = 3
(M, +)
matrix of t
(1 − t)M
Z
p3
[b], b ∈ Z×
p3
Z
p2 × Zp (cid:20)b
c(cid:21) , b ∈ Z×
p2 , c ∈ Z×
p
p0 if b = 1
p1 if b 6= 1, b ≡ 1 (p2)
p2 if b 6≡ 1 (p2), b ≡ 1 (p)
p3 if b 6≡ 1 (p)
p0 if b = 1, c = 1
p1 if b 6= 1, b ≡ 1 (p), c = 1
or b = 1, c 6= 1
p2 if b 6≡ 1 (p), c = 1
or b 6= 1, b ≡ 1 (p), c 6= 1
p3 if b 6≡ 1 (p), c 6= 1
number
1
p − 1
p(p − 1)
p2(p − 2)
1
2p − 3
total
p3 − p2
p(p − 1)2
(p − 2)(2p − 1)
p(p − 2)2
Table 1. Nonisomorphic Λ-modules of order pn, n ≤ 4 (continued)
n = 3 (continued)
(M, +)
matrix of t
(1 − t)M
number
p1 if b = 1
p3 if b 6= 1
p1 if b = 1, γ = 0
p2 if b = 1, γ 6= 0
p3 if b 6= 1
p0 if b = c = d = 1
p1 if b = c = 1 < d
p2 if b = 1 < c
p3 if b > 1
p1 if b = c = 1
p2 if b = 1, c 6= 1
or b 6= 1, c = 1
p3 if b 6= 1 c 6= 1
p2 if b = 1
p3 if b 6= 1
1
p − 2
1
p − 1
p(p − 2)
1
p − 2
(cid:0)p−1
2 (cid:1)
(cid:0)p
3(cid:1)
1
2(p − 2)
(p − 2)2
1
p − 2
total
p − 1
p(p − 1)
(cid:0)p+1
3 (cid:1)
(p − 1)2
p − 1
F
I
N
I
T
E
M
O
D
U
L
E
S
O
V
E
R
Z
[
t
,
t
−
1
]
1
9
Z
p2 × Zp
Z
p2 × Zp
Z3
p
Z3
p
Z3
p
Z3
p
Z3
p
b
γ
1
(cid:20)b
(cid:20)b
0
0
0
0
c
p
, b, c ∈ Z×
p
, 0 < b ≤ c ≤ d < p
b(cid:21), 0 < b < p
b(cid:21), 0 < b < p, γ ∈ Zp
d
c
b
, b ∈ Z×
c
, X 2 + b1X + b0 ∈ Zp[X] irr, c ∈ Z×
0
1
1
0
1
p
b 1
b
b 1
b
1
−b0 −b1 −b2
−b0 −b1
, X 3 + b2X 2 + b1X + b0 ∈ Zp[X] irr p3
1
3 (p3 − p)
1
3 (p3 − p)
p
p2 if c = 1
p3 if c 6= 1
1
2 (p2 − p)
1
2 (p2 − p)(p − 2)
1
2 p(p − 1)2
Table 1. Nonisomorphic Λ-modules of order pn, n ≤ 4 (continued)
n = 4
(M, +)
matrix of t
Z
p4
[b], b ∈ Z×
p4
Z
p3 × Zp
(cid:20)b
c(cid:21), b ∈ Z×
p3 , c ∈ Z×
p
Z
p3 × Zp
Z
p3 × Zp
0
1
b(cid:21), 0 < b < p2, b 6≡ 0 (p)
(cid:20)b
(cid:20)b p2
γ b(cid:21), 0 < b < p2, b 6≡ 0 (p), γ ∈ Zp
Z2
p2
Z2
p2
(cid:20)b
(cid:20)b
0
c(cid:21), 0 < b ≤ c < p2
p
b(cid:21) , b ∈ Z×
p2
(1 − t)M
p0 if b = 1
p1 if b 6= 1, b ≡ 1 (p3)
p2 if b 6≡ 1 (p3), b ≡ 1 (p2)
p3 if b 6≡ 1 (p2), b ≡ 1 (p)
p4 if b 6≡ 1 (p)
p0 if b = 1, c = 1
p1 if b 6= 1, b ≡ 1 (p2), c = 1
or b = 1, c 6= 1
p2 if b 6≡ 1 (p2), b ≡ 1 (p), c = 1
or b 6= 1, b ≡ 1 (p2), c 6= 1
p3 if b 6≡ 1 (p), c = 1
or b 6≡ 1 (p2), b ≡ 1 (p), c 6= 1
p4 if b 6≡ 1 (p), c 6= 1
p1 if b = 1
p2 if b 6= 1, b ≡ 1 (p)
p4 if b 6≡ 1 (p)
p1 if b = 1, γ = 0
p2 if b 6= 1, b ≡ 1 (p)
or b = 1, γ 6= 0
p4 if b 6≡ 1 (p)
p0 if b = c = 1
p1 if b = 1 < c, c ≡ 1 (p)
p2 if b = 1, c 6≡ 1 (p)
or b, c 6= 1, b, c ≡ 1 (p)
p3 if {b, c} = {b1, c1}, b1 6≡ 1 (p), c1 6= 1, c1 ≡ 1 (p)
p4 if b, c 6≡ 1 (p)
p1 if b = 1
p2 if b 6= 1, b ≡ 1 (p)
p4 if b 6≡ 1 (p)
2
0
total
p3(p − 1)
number
1
p − 1
p(p − 1)
p2(p − 1)
p3(p − 2)
1
2p − 3
-
I
X
A
N
G
D
O
N
G
H
O
U
2(p − 1)2
p2(p − 1)2
p(p − 2)(2p − 1)
p2(p − 2)2
1
p − 1
p(p − 2)
1
p2 − 1
p2(p − 2)
1
p − 1
p(p − 1)(p − 2)
p(p − 2) +(cid:0)p
2(cid:1)
(cid:0)p(p−2)+1
(cid:1)
2
1
p − 1
p(p − 2)
p(p − 1)
p2(p − 1)
2
(cid:0)p(p−1)+1
(cid:1)
p(p − 1)
Table 1. Nonisomorphic Λ-modules of order pn, n ≤ 4 (continued)
n = 4 (continued)
(M, +)
matrix of t
(1 − t)M
Z2
p2
Z2
p2
Z2
p2
0 < b < p,
X 2 + b1X + b0 ∈ Zp[X] irr
p
−pb0
b − pb1(cid:21),
(cid:20) b
(cid:20)b + pα 1
b(cid:21), 0 < b < p, α, γ ∈ Zp
−b1 (cid:21),
(cid:20) pα 1 + pβ
−b0
pγ
α, β ∈ Zp, 0 ≤ b0, b1 < p
X 2 + b1X + b0 ∈ Zp[X] irr
Z
p2 × Z2
b
p
c
, b ∈ Z×
p2 , 0 < c ≤ d < p
d
Z
p2 × Z2
Z
p2 × Z2
Z
p2 × Z2
b
1
0
b
0
η
b
1
0
p
p
p
0 0
b
0
0
p 0
b
0
0
p 0
b
0
0
p
, 0 < b < p, η ∈ Zp
c
, 0 < b < p, c ∈ Z×
b
b
, 0 < b < p
p2 if b = 1
p4 if b 6= 1
p2 if b = 1, γ = 0
p3 if b = 1, γ 6= 0
p4 if b 6= 1
p4
p0 if b = 1, c = d = 1
p1 if b 6= 1, b ≡ 1 (p), c = d = 1
or b = 1, c = 1 < d
p2 if b 6≡ 1 (p), c = d = 1
or b 6= 1, b ≡ 1 (p), c = 1 < d
or b = 1, c > 1
p3 if b 6≡ 1 (p), c = 1 < d
or b 6= 1, b ≡ 1 (p), c > 1
p4 if b 6≡ 1 (p), c > 1
p1 if b = 1, c = 1
p2 if b = 1, c 6= 1
p3 if b 6= 1, c = 1
p4 if b 6= 1, c 6= 1
p1 if b = 1, η = 0
p2 if b = 1, η 6= 0
p4 if b 6= 1
p2 if b = 1
p4 if b 6= 1
number
1
2 (p2 − p)
1
2 (p2 − p)(p − 2)
p
p(p − 1)
p2(p − 2)
total
1
2 p(p − 1)2
p2(p − 1)
1
2 p2(p2 − p)
1
2 p2(p2 − p)
1
2p − 3
1
2 (p − 2)(5p − 3)
1
2 p2(p − 1)2
1
2 (p − 2)(3p2 − 6p + 1)
1
2 p(p − 1)(p − 2)2
1
F
I
N
I
T
E
M
O
D
U
L
E
S
O
V
E
R
Z
[
t
,
t
−
1
]
p − 2
p − 2
(p − 2)2
1
p − 1
p(p − 2)
1
p − 2
(p − 1)2
p(p − 1)
p − 1
2
1
Table 1. Nonisomorphic Λ-modules of order pn, n ≤ 4 (continued)
n = 4 (continued)
(M, +)
matrix of t
Z
p2 × Z2
c
, b ∈ Z×
p2 , c ∈ Z×
p
Z
p2 × Z2
, 0 < b < p
Z
p2 × Z2
, 0 < b < p, η ∈ Zp
b
b
0
1
b
0
η
b
b
b
p
p
p
1
c
b
b
0 0
b
1
0
p 0
b
1
0
c
1
b
1
b
c
c
d
1
c
Z4
p
Z4
p
Z4
p
, 0 < b ≤ c ≤ d ≤ e < p
d
e
, b ∈ Z×
p , 0 < c ≤ d < p
, 0 < b ≤ c < p
2
2
-
I
X
A
N
G
D
O
N
G
H
O
U
(1 − t)M
p1 if b = 1, c = 1
p2 if b 6= 1, b ≡ 1 (p), c = 1
or b = 1, c 6= 1
p3 if b 6≡ 1 (p), c = 1
or b 6= 1, b ≡ 1 (p), c 6= 1
p4 if b 6≡ 1 (p), c 6= 1
number
1
2p − 3
(p − 2)(2p − 1)
p(p − 2)2
p2 if b = 1
p4 if b 6= 1
p2 if b = 1, η = 0
p3 if b = 1, η 6= 0
p4 if b 6= 1
p0 if b = c = d = e = 1
p1 if b = c = d = 1 < e
p2 if b = c = 1 < d
p3 if b = 1 < c
p4 if b > 1
p1 if b = 1, c = d = 1
p2 if b 6= 1, c = d = 1
or b = 1, c = 1 < d
p3 if b 6= 1, c = 1 < d
or b = 1, c > 1
p4 if b 6= 1, c > 1
p2 if b = c = 1
p3 if b = 1 < c
p4 if b > 1
1
p − 2
1
p − 1
p(p − 2)
1
p − 2
(cid:0)p−1
2 (cid:1)
(cid:0)p
3(cid:1)
(cid:0)p+1
4 (cid:1)
1
2(p − 2)
1
2 (p − 2)(3p − 5)
1
2 (p − 1)(p − 2)2
1
p − 2
(cid:0)p−1
2 (cid:1)
total
p(p − 1)2
p − 1
p(p − 1)
(cid:0)p+2
4 (cid:1)
1
2 p(p − 1)2
(cid:0)p
2(cid:1)
Table 1. Nonisomorphic Λ-modules of order pn, n ≤ 4 (continued)
n = 4 (continued)
(M, +)
matrix of t
Z4
p
Z4
p
Z4
p
Z4
p
Z4
p
c
1
b
b 1
b
b 1
b
1
b
1
b
0
1
−b0 −b1
0
1
−b0 −b1
, b, c ∈ Z×
p
, b ∈ Z×
p
0
1
−c0 −c1
1
0
0
0
1
1
−b0 −b1
0
0
0
1
0
0
0
1
0
0
0
1
−b0 −b1 −b2 −b3
(*) ≤ is a total order in Z2
p
,
X 2 + b1X + b0, X 2 + c1X + c0 ∈ Zp[X] irr
(b0, b1) ≤ (c0, c1) (*)
, X 2 + b1X + b0 ∈ Zp[X] irr
, X 4 + b3X 3 + b2X 2 + b1X + b0 ∈ Zp[X] irr
(1 − t)M
p2 if b = c = 1
p3 if b = 1, c 6= 1
or b 6= 1, c = 1
p4 if b 6= 1, c 6= 1
p3 if b = 1
p4 if b 6= 1
number
total
1
2(p − 2)
(p − 2)2
1
p − 2
(p − 1)2
p − 1
p4
p4
p4
1
2 (p2−p)+1
2
(cid:1)
(cid:0)
(cid:0)
1
2 (p2−p)+1
2
(cid:1)
1
2 (p2 − p)
1
2 (p2 − p)
1
4 (p4 − p2)
1
4 (p4 − p2)
F
I
N
I
T
E
M
O
D
U
L
E
S
O
V
E
R
Z
[
t
,
t
−
1
]
2
3
Table 1. Nonisomorphic Λ-modules of order pn, n ≤ 4 (continued)
2
4
n = 4 (continued)
(M, +)
matrix of t
, 0 < b < p, γ ∈ Zp, c ∈ Z×
p , b 6≡ c (p)
p
b
c
1
0
0
0
0
1
−b0 −b1 −b2
,
X 3 +b2X 2+b1X +b0 ∈ Zp[X] irr,
c ∈ Z×
p
Z
p2 × Z2
b
γ
b
p
p
Z4
p
Z4
p
Z4
p
c
d
0
1
−c0 −c1
0
1
−b0 −b1
b 1
b
0
1
−c0 −c1
Z
p2 × Z2
, b ∈ Z×
p2 , X 2 + c1X + c0 ∈ Zp[X] irr
,
X 2 + b1X + b0 ∈ Zp[X] irr,
0 < c ≤ d < p
c
, b ∈ Z×
p , X 2 + c1X + c0 ∈ Zp[X] irr
(1 − t)M
p2 if b = 1, γ = 0, c 6= 1
p3 if b 6= 1, c = 1
or b = 1, γ 6= 0, c 6= 1
p4 if b 6= 1, c 6= 1
p3 if c = 1
p4 if c 6= 1
p2 if b = 1
p3 if b 6= 1, b ≡ 1 (p)
p4 if b 6≡ 1 (p)
p2 if c = d = 1
p3 if c = 1 < d
p4 if c > 1
p3 if b = 1
p4 if b 6= 1
number
p − 2
total
(p − 2)(2p − 1)
p(p − 1)(p − 2)
p(p − 2)(p − 3)
1
3 (p3 − p)
1
3 (p3 − p)(p − 2)
1
2 (p2 − p)
1
2 (p2 − p)(p − 1)
1
2 (p2 − p)p(p − 2)
1
2 (p2 − p)
1
2 (p2 − p)(p − 2)
1
2 (p2 − p)(cid:0)p−1
2 (cid:1)
2 (p2 − p)
1
1
2 (p2 − p)(p − 2)
1
3 (p3 − p)(p − 1)
1
2 p2(p − 1)2
1
4 p2(p − 1)2
1
2 p(p − 1)2
-
I
X
A
N
G
D
O
N
G
H
O
U
|
1504.06013 | 2 | 1504 | 2015-05-05T04:53:05 | A note on standard equivalences | [
"math.RA",
"math.RT"
] | We prove that any derived equivalence between triangular algebras is standard, that is, it is isomorphic to the derived tensor functor given by a two-sided tilting complex. | math.RA | math |
A NOTE ON STANDARD EQUIVALENCES
XIAO-WU CHEN
Abstract. We prove that any derived equivalence between triangular algebras
is standard, that is, it is isomorphic to the derived tensor functor given by a
two-sided tilting complex.
1. Introduction
Let k be a field. We will require that all categories and functors are k-linear.
Let A be a finite dimensional k-algebra. We denote by A-mod the category of finite
dimensional left A-modules and by Db(A-mod) its bounded derived category.
Let B be another finite dimensional k-algebra. We will require that k acts cen-
trally on any B-A-bimodule. Recall that a two-sided tilting complex is a bounded
complex X of B-A-bimodules such that the derived tensor functor gives an equiv-
alence X ⊗L
A − : Db(A-mod) → Db(B-mod).
A triangle equivalence F : Db(A-mod) → Db(B-mod) is said to be standard if it
is isomorphic, as a triangle functor, to X ⊗L
A − for some two-sided tilting complex
X. It is an open question whether all triangle equivalences are standard. The aim
of this note is to answer this question affirmatively in a special case.
Recall that the algebra A is triangular provided that the Ext-quiver of A has no
oriented cycles. There are explicit examples of algebras A and B, which are derived
equivalent such that A is triangular, but B is not; consult the top of [2, p.21]. It
makes sense to have the following notion: an algebra A is derived-triangular if it is
derived equivalent to a triangular algebra.
Theorem 1.1. Let A be a derived-triangular algebra. Then any triangle equivalence
F : Db(A-mod) → Db(B-mod) is standard.
We observe that a derived-triangular algebra has finite global dimension. The
converse is not true in general. Indeed, let A be a non-triangular algebra with two
simple modules which has finite global dimension. Then A is not derived-triangular.
Indeed, any triangular algebra B which is derived equivalent to A has two simple
modules and thus is hereditary. This forces that the algebra A is triangular, yielding
a contradiction.
We recall that a piecewise hereditary algebra is triangular. In particular, The-
orem 1.1 implies that the assumption on the standardness of the auto-equivalence
in [3, Section 4] is superfluous.
The proof of Theorem 1.1 is a rather immediate application of [1, Theorem
4.7], which characterizes certain triangle functors between the bounded homotopy
categories of Orlov categories. Here, we observe that the category of projective
modules over a triangular algebra is naturally an Orlov category.
We refer to [4, 5] for unexplained notions in the representation theory of algebras.
Date: August 26, 2018.
2010 Mathematics Subject Classification. 13D09, 16G10, 18E30.
Key words and phrases. tilting complex, standard equivalence, Orlov category, homotopy cat-
egory, triangle functor.
E-mail: [email protected].
1
2
XIAO-WU CHEN
2. The bounded homotopy category of an Orlov category
Let A be a k-linear additive category, which is Hom-finite and has split idempo-
tents. Here, the Hom-finitess means that all the Hom spaces are finite dimensional.
It follows that A is a Krull-Schmidt category.
We denote by Ind A a complete set of representatives of indecomposable ob-
jects in A. The category A is called bricky if the endomorphism algebra of each
indecomposable object is a division algebra.
We slightly generalize [1, Definition 4.1]. A bricky category A is called an Orlov
category provided that there is a degree function deg : Ind A → Z with the following
property: for any indecomposable objects P, P ′ having HomA(P, P ′) 6= 0, we have
that P ≃ P ′ or deg(P ) > deg(P ′). An object X in A is homogeneous of degree n, if
it is isomorphic to a finite direct sum of indecomposables of degree n. An additive
functor F : A → A is homogeneous if it sends homogeneous objects to homogenous
objects and preserves their degrees.
Let A be a finite dimensional k-algebra. We denote by {S1, S2, · · · , Sn} a com-
plete set of representatives of simple A-modules. Denote by Pi the projective cover
of Si. We recall that the Ext-quiver QA of A is defined as follows. The vertex set
of QA equals {1, 2, · · · , n}, and there is a unique arrow from i to j provided that
Ext1
A(Si, Sj) 6= 0. The algebra A is triangular provided that QA has no oriented
cycles.
Let A be a triangular algebra. We denote by Q0
A inductively, such that a vertex i belongs to Qd
A the set of sources in QA. Here, a
vertex is a source if there is no arrow ending at it. For each d ≥ 1, we define the set
Qd
A if and only if any arrow ending
at i necessarily starts at S0≤m≤d−1 Qm
A ⊆ · · · and
that Sd≥0 Qd
A = {1, 2, · · · , n}. We mention that this construction can be found in
[4, p.42].
A . It follows that Q0
A ⊆ Q1
A ⊆ Q2
We denote by A-proj the category of finite dimensional projective A-modules.
Then {P1, P2, · · · , Pn} is a complete set of representatives of indecomposables in
A and i /∈ Qd−1
A-proj. For each 1 ≤ i ≤ n, we define deg(Pi) = d such that i ∈ Qd
A .
The following example of an Orlov category seems to be well known.
Lemma 2.1. Let A be a triangular algebra. Then A-proj is an Orlov category
with the above degree function. Moreover, any equivalence F : A-proj → A-proj is
homogeneous.
Proof. Since A is triangular,
it is well known that EndA(Pi) is isomorphic to
EndA(Si), which is a division algebra. Then A-proj is bricky. We recall that
for i 6= j with HomA(Pi, Pj) 6= 0, there is a path from j to i in QA. From the very
A, we have a ∈ Qd−1
construction, we infer that for an arrow α : a → b with b ∈ Qd
A .
Then we are done by the following consequence: if there is a path from j to i in
QA, then deg(Pj ) < deg(Pi).
For the final statement, we observe that the equivalence F extends to an auto-
equivalence on A-mod, and thus induces an automorphism of QA. The automor-
phism preserves the subsets Qd
A. Consequently, the equivalence F preserves degrees,
and is homogeneous.
(cid:3)
Let A be a k-linear additive category as above. We denote by Kb(A) the ho-
motopy category of bounded complexes in A. Here, a complex X is visualized as
dn−1
X→ X n dn
· · · → X n−1
X = 0.
The translation functor on Kb(A) is denoted by [1], whose n-th power is denoted
by [n].
X→ X n+1 → · · · , where the differentials satisfy dn
X ◦ dn−1
We view an object A in A as a stalk complex concentrated at degree zero, which
is still denoted by A. In this way, we identify A as a full subcategory of Kb(A).
A NOTE ON STANDARD EQUIVALENCES
3
We are interested in triangle functors on Kb(A). We recall that a triangle functor
(F, θ) consists of an additive functor F : Kb(A) → Kb(A) and a natural isomor-
phism θ : [1]F → F [1], which preserves triangles. More precisely, for any triangle
X → Y → Z h→ X[1] in Kb(A), the sequence F X → F Y → F Z
−→ (F X)[1] is
a triangle. We refer to θ as the commutating isomorphism for F . A natural trans-
formation between triangle functors is required to respect the two commutating
isomorphisms.
θX ◦F (h)
For a triangle functor (F, θ), the commutating isomorphism θ is trivial if [1]F =
F [1] and θ is the identity transformation. In this case, we suppress θ and write F
for the triangle functor.
Any additive functor F : A → A gives rise to a triangle functor Kb(F ) : Kb(A) →
Kb(A), which acts on complexes componentwise. The commuting isomorphism for
Kb(F ) is trivial. Similarly, any natural transformation η : F → F ′ extends to a
natural transformation Kb(η) : Kb(F ) → Kb(F ′) between triangle functors.
The following fundamental result is due to [1, Theorem 4.7].
Proposition 2.2. Let A be an Orlov category, and let (F, θ) : Kb(A) → Kb(A) be
a triangle functor such that F (A) ⊆ A. We assume further that F A : A → A is
homogeneous. Let F1, F2 : A → A be two homogeneous functors.
(1) There is a unique natural isomorphism (F, θ) → Kb(F A) of triangle func-
tors, which is the identity on the full subcategory A.
(2) Any natural transformation Kb(F1) → Kb(F2) of triangle functors is of the
form Kb(η) for a unique natural transformation η : F1 → F2.
Proof. The existence of the natural isomorphism in (1) is due to [1, Theorem 4.7];
compare [1, Remark 4.8]. The uniqueness follows from the commutative diagram
(4.10) and Lemma 4.5(2) in [1], by induction on the support of a complex in the
sense of [1, Subsection 4.1]. Here, we emphasize that the commutating isomor-
phism θ is used in the construction of the natural isomorphism on stalk complexes;
compare the second paragraph in [1, p.1541].
The statement (2) follows from the uniqueness part of (1).
(cid:3)
Recall that Db(A-mod) denotes the bounded derived category of A-mod. We
identify A-mod as the full subcategory of Db(A-mod) formed by stalk complexes
concentrated at degree zero. We denote by H n(X) the n-th cohomology of a com-
plex X.
The following observation is immediate.
Lemma 2.3. Let A be a finite dimensional algebra, and let F : Db(A-mod) →
Db(A-mod) be a triangle equivalence with F (A) ≃ A. Then we have F (A-mod) =
A-mod, and thus the restricted equivalence F A-mod : A-mod → A-mod.
Proof. We use the canonical isomorphisms H n(X) ≃ HomDb(A-mod)(A[−n], X). It
follows that both F and its quasi-inverse send stalk complexes to stalk complexes.
Then we are done.
(cid:3)
We assume that we are given an equivalence F : A-mod → A-mod with F (A) ≃
A. Then there is an algebra automorphism σ : A → A such that F is isomorphic to
σA1 ⊗A −. Here, the A-bimodule σA1 is given by the regular right A-module, where
the left A-module is twisted by σ. This bimodule is invertible and thus viewed as
a two-sided tilting complex. We refer to [5, Section 6.5] for details on two-sided
tilting complexes and standard equivalences.
We now combine the above results.
4
XIAO-WU CHEN
Proposition 2.4. Let A be a triangular algebra, and let (F, θ) : Db(A-mod) →
Db(A-mod) be a triangle equivalence with F (A) ≃ A. We recall the algebra auto-
morphism σ given by the restricted equivalence F A-mod, and the A-bimodule σA1.
Then there is a natural isomorphism (F, θ) → σA1 ⊗L
A − of triangle functors. In
particular, the triangle equivalence (F, θ) is standard.
Proof. Since the algebra A is triangular, it has finite global dimension. The natural
functor Kb(A-proj) → Db(A-mod) is a triangle equivalence. We identify these
two categories. Therefore, the triangle functor (F, θ) : Kb(A-proj) → Kb(A-proj)
restricts to an equivalence F A-proj, which is isomorphic to σA1 ⊗A −. By Lemma
2.1, the statements in Proposition 2.2 apply in our situation. Consequently, we
have an isomorphism between (F, θ) and Kb(σA1 ⊗A −). Then we are done.
(cid:3)
3. The proof of Theorem 1.1
We now prove Theorem 1.1.
In what follows, for simplicity, when writing a
triangle functor we suppress its commutating isomorphism.
We first assume that the algebra A is triangular. The complex F (A) is a one-
sided tilting complex. By [5, Theorem 6.4.1], there is a two-sided tilting complex
X of B-A-bimodules with an isomorphism X → F (A) in Db(B-mod). Denote by
A − : Db(A-mod) → Db(B-mod).
G a quasi-inverse of the standard equivalence X ⊗L
Then the triangle functor GF : Db(A-mod) → Db(A-mod) satisfies GF (A) ≃ A.
Proposition 2.4 implies that GF is standard, and thus F is isomorphic to the
composition of X ⊗L
A − and a standard equivalence. Then we are done in this
case by the well-known fact that the composition of two standard equivalences is
standard.
In general, let A be derived-triangular. Assume that A′ is a triangular algebra
which is derived equivalent to A. By [5, Proposition 6.5.5], there is a standard
equivalence F ′ : Db(A′-mod) → Db(A-mod). The above argument implies that
the composition F F ′ is standard. Recall from [5, Proposition 6.5.6] that a quasi-
inverse F ′−1 of F ′ is standard. We are done by observing that F is isomorphic to
the composition (F F ′)F ′−1, a composition of two standard equivalences.
Acknowledgements We thank Martin Kalck for pointing out the example in
[2]. The author is supported by National Natural Science Foundation of China
(No. 11201446), NCET-12-0507, and the Fundamental Research Funds for the
Central Universities.
References
[1] P.N. Achar, and S. Riche, Koszul duality and semisimplicity of Frobenius, Ann. Inst.
Fourier 63(4) (2013), 1511 -- 1612.
[2] G. Bonbinski, C. Geiss, and A. Skowronski, Classification of derived discrete algebras,
Cent. Euro. J. Math. 2(1) (2004), 19 -- 49.
[3] B. Keller, On triangulated orbit categories, Doc. Math. 10 (2005), 551 -- 581.
[4] C.M. Ringel, Tame Algebras and Integral Quadratic Forms, Lect. Notes Math. 1099,
Springer-Verlag, Berlin Heidelberg New York Tokyo, 1984.
[5] A. Zimmermann, Representation Theory, A Homological Algebra Point of View, Springer,
International Publishing Switzerland, 2014.
Xiao-Wu Chen
Key Laboratory of Wu Wen-Tsun Mathematics, Chinese Academy of Sciences
School of Mathematical Sciences, University of Science and Technology of China
No. 96 Jinzhai Road, Hefei, 230026, Anhui, P.R. China.
URL: http://home.ustc.edu.cn/∼ xwchen.
|
1602.08731 | 1 | 1602 | 2016-02-28T15:39:03 | Yetter-Drinfeld modules for weak Hom-Hopf algebras | [
"math.RA",
"math-ph",
"math-ph"
] | The aim of this paper is to define and study Yetter-Drinfeld modules over weak Hom-Hopf algebras. We show that the category ${}_H{\cal WYD}^H$ of Yetter-Drinfeld modules with bijective structure maps over weak Hom-Hopf algebras is a rigid category and a braided monoidal category, and obtain a new solution of quantum Hom-Yang-Baxter equation. It turns out that, If $H$ is quasitriangular (respectively, coquasitriangular)weak Hom-Hopf algebras, the category of modules (respectively, comodules) with bijective structure maps over $H$ is a braided monoidal subcategory of the category ${}_H{\cal WYD}^H$ of Yetter-Drinfeld modules over weak Hom-Hopf algebras. | math.RA | math |
Yetter-Drinfeld modules for weak Hom-Hopf
algebras
Shuangjian Guo1, Yizheng Li1, Shengxiang Wang2
1. School of Mathematics and Statistics, Guizhou University of Finance and Economics
Guiyang, 550025, P. R. China
Email: [email protected], Email: [email protected]
2. School of Mathematics and Finance, Chuzhou University
Chuzhou 239000, P. R. China
E-mail: [email protected]
ABSTRACT
The aim of this paper is to define and study Yetter-Drinfeld modules
over weak Hom-Hopf algebras. We show that the category HWYDH of
Yetter-Drinfeld modules with bijective structure maps over weak Hom-
Hopf algebras is a rigid category and a braided monoidal category, and
obtain a new solution of quantum Hom-Yang-Baxter equation. It turns
out that, If H is quasitriangular (respectively, coquasitriangular)weak
Hom-Hopf algebras, the category of modules (respectively, comodules)
with bijective structure maps over H is a braided monoidal subcategory
of the category H WYDH of Yetter-Drinfeld modules over weak Hom-
Hopf algebras.
Key words: Yetter-Drinfeld module, braided monoidal category,
(co)quasitriangular, weak-Hom type entwined-module.
Mathematics Subject Classification: 16W30, 16T15.
0. Introduction
The first examples of Hom-type algebras were related to q-deformations of Witt and
Virasoro algebras, which play an important role in Physics, mainly in conformal field
theory. The q-deformations of Witt and Virasoro algebras are obtained when the deriva-
tion is replaced by a σ-derivation. It was observed in the pioneering works (See [5]-[8]).
Motivated by these examples and their generalization, Hartwig, Larsson and Silvestrov
introduced the Hom-Lie algebras when they concerned about the q-deformations of Witt
and Virasoro algebras in [4]. In a Hom-Lie algebra, the Jacobi identity is replaced by the
1
so called Hom-Jacobi identity via an homomorphism. Hom-associative algebras, the cor-
responding structure of associative algebras, were introduced by Makhlouf and Silvestrov
in [12]. The associativity of the Hom-algebra is twisted by an endomorphism (here we call
it the Hom structure map). The generalized notions, Hom-bialgebras, Hom-Hopf alge-
bras were developed in [13], [14]. Caenepeel and Goyvaerts studied in [2] Hom-bialgebras
and Hom-Hopf algebras from a categorical view point, and called them monoidal Hom-
bialgebras and monoidal Hom-Hopf algebras respectively, which are slightly different from
the above Hom-bialgebras and Hom-Hopf algebras. Thus a monoidal Hom-bialgebra is
Hom-bialgebra if and only if the Hom-structure map α satisfies α2 = id. Yau introduced
Quasitriangular Hom-bialgebras in [18]), which provided a solution of the quantum Hom-
Yang-Baxter euqation, a twisted version of the quantum Yang-Baxter equation called the
Hom-Yang-Baxter equation in [19]. Zhang and Wang introduced weak Hom-Hopf algebra
H, which is generalization of both Hom-Hopf algebras and weak Hopf algebras, and dis-
cussed the category Rep(H) (resp. Corep(H)) of Hom-modules (resp. Hom-comodules)
with bijective Hom-structure maps, they proved that if H is a (co)quasitrialgular weak
Hom-bialgebra (resp. ribbon weak Hom-Hopf algebra), then Rep(H) (resp. Corep(H)) is
a braided monoidal category (resp. ribbon category) in [16].
Makhlouf and Panaite defined and studied Yetter-Drinfeld modules over Hom bialge-
bras, a generalized version of bialgebras obtained by modifying the algebra and coalgebra
structures by a homomorphism. Yetter-Drinfeld modules over a Hom bialgebra with bi-
jective structure map provide solutions of the Hom-Yang-Baxter equation in [10]. It is
well known that the Yetter-Drinfeld modules category of a (weak) Hopf algebra is a rigid
monoidal category, and is braided. Does this result remain true in a weak Hom-Hopf
algebra? How the corresponding results appear under the condition that the associativity
and coassociativity are twisted by an endomorphism? Is there any relation between this
Yetter-Drinfeld modules category and module category or comodule category? This is the
motivation of the present article.
In order to investigate these questions, we introduce
the definition of Yetter-Drinfeld modules over weak Hom-Hopf algebras, which is general-
ization of both weak Yetter-Drinfeld modules introduced by [3] or [15] and Hom-Yetter-
Drinfeld modules introduced by [10] or [11], and consider that when the Yetter-Drinfeld
modules category of a weak Hom-Hopf algebra is is a rigid monoidal category, and is
braided.
To make sure that the Yetter-Drinfeld modules category of a weak Hom-Hopf algebra
H is a monoidal category, we need H is unital and counital, and the Hom structure maps
over H are all bijective maps.
The paper is organized as follows. In Section 2, we recall now several concepts and
results, fixing thus the terminology to be used in the rest of the paper.
In Section 3, we introduce the definition of Yetter-Drinfeld modules over weak Hom-
Hopf algebras and show the category HWYDH of Yetter-Drinfeld modules is a monoidal
category and a rigid category.
In Section 4, we show that the category HWYDH of Yetter-Drinfeld modules is a
braided monoidal category and obtain a new solution of quantum Hom-Yang-Baxter equa-
tion. It turns out that, if H is a quasitriangular weak Hom-Hopf algebra, the category
of left H-modules with bijective structure maps is a braided monoidal subcategory of the
category H WYDH of Yetter-Drinfeld modules.
In Section 5, we find another braided monoidal category structure on the category
2
HWYDH of Yetter-Drinfeld modules , with the property that if H is a coquasitriangular
weak Hom-Hopf algebra, then HWYDH contains the category of right H-comodules with
bijective structure maps as a braided monoidal category.
2. Preliminaries
Throughout the paper, we let k be a fixed field and all algebras are supposed to be
over k. For the comultiplication ∆ of a vector space C, we use the Sweedler-Heyneman's
notation:
∆(c) = c1 ⊗ c2,
for any c ∈ C. τ means the flip map τ (a ⊗ b) = b ⊗ a. When we say a "Hom-algebra" or
a "Hom-coalgebra", we mean the unital Hom-algebra and counital Hom-coalgebra.
In this section, we will review several definitions and notations related to weak Hom-
Hopf algebras and rigid categories.
2.1. Hom-algebras and Hom-coalgebras.
Recall from [12] that a Hom-associative algebra is a quadruple (A, µ, η, αA), in which A
is a linear space, αA : A → A, µ : A⊗ A → A and η : k → A are linear maps, with notation
µ(a ⊗ b) = ab and η(1k) = 1A, satisfying the following conditions, for all a, b, c ∈ A:
(1) αA(ab) = αA(a)α(b);
(2) αA(a)(bc) = (ab)αA(c);
(3) αA(1A) = 1A;
(4) 1Aa = a1A = αA(a).
A morphism f : A → B of Hom-algebras is a linear map such that αB ◦ f = f ◦ αA,
f (1A) = 1B and µB ◦ (f ⊗ f ) = f ◦ µA.
Let A be a Hom-algebra. Recall that a left A-module is a triple (M, αM , θM ), where
M is a k-space, αM : M → M and θM : A ⊗ M → M are linear maps with notation
θM (a ⊗ m) = a · m, satisfying the following conditions, for all a, b ∈ A, m ∈ M :
(1) α(a · m) = α(a) · αM (m);
(2) α(a) · (b · m) = (ab) · αM (m);
(3) 1A · m = αM (m).
A morphism f : M → N of A-modules is a linear map such that αN ◦ f = f ◦ αM and
θN ◦ (idA ⊗ f ) = f ◦ θM .
Recall from [14] that a Hom-coassociative coalgebra is a quadruple (C, ∆, ε, αC ), in
which C is a linear space, α : C → C, ∆ : C → C ⊗ C and ε : C → k are linear maps,
with notation ∆(c) = c1 ⊗ c2, satisfying the following conditions for all c ∈ C:
(1) ∆(αC(c)) = αC(c1)α(c2);
(2) αC(c1) ⊗ ∆(c2) = ∆(c1) ⊗ αC(c2);
(3) ε ◦ αC = ε;
(4) ε(c1)c2 = c1ε(c2) = αC(c).
A morphism f : C → D of Hom-coalgebras is a linear map such that αD ◦ f = f ◦ αC,
εC = εD ◦ f and ∆D ◦ f = (f ⊗ f ) ◦ ∆C.
3
Let C be a Hom-coalgebra. Recall that a right C-comodule is a triple (M, αM , ρM ),
where M is a k-space, αM : M → M and ρM : M → M ⊗ C are linear maps with notation
ρM (m) = m(0) ⊗ m(1), satisfying the following conditions for all m ∈ M :
(1) ρM (αM (m)) = αM (m(0)) ⊗ αC(m(1));
(2) αM (m(0)) ⊗ ∆(m(1)) = ρM (m(0)) ⊗ αC(m(1));
(3) ε(m1)m0 = αM (m).
A morphism f : M → N of C-comodules is a linear map such that αN ◦ f = f ◦ αM
and ρN ◦ f = (idC ⊗ f ) ◦ ρM .
Recall from [16] that a weak Hom-bialgebra is a sextuple H = (H, αH , µ, η, ∆, ε) if
(H, αH ) is both a Hom-algebra and a Hom-coalgebra, satisfying the following identities
for any a, b, c ∈ H:
(1) ∆(ab) = ∆(a)∆(b);
(2) ε((ab)c) = ε(ab1)ε(b2c), ε(a(bc)) = ε(ab2)ε(b1c);
(3) (∆ ⊗ idH )∆(1H ) = 11 ⊗ 121′
Recall from [16] that a Weak Hom-Hopf algebra is a septuple (H, µ, η, ∆, ε, S, αH ),
in which (H, αH ) is a weak Hom-bialgebra, if H endowed with a k-linear map S (the
antipode), such that for any h, g ∈ H, the following conditions hold:
(idH ⊗ ∆)∆(1H ) = 11 ⊗ 1′
112 ⊗ 1′
2.
1 ⊗ 1′
2,
(1) S ◦ αH = αH ◦ S;
(2) h1S(h2) = εt(h), S(h1)h2 = εs(h);
(3) S(hg) = S(g)S(h), S(1H ) = 1H ;
(4) ∆(S(h)) = S(h2) ⊗ S(h1), ε ◦ S = ε.
Let (H, αH ) be a weak Hom-bialgebra. Define linear maps εt and εs by the formula
εt(h) = ε(11h)12,
εs(h) = 11ε(h12),
for any h ∈ H, where εt, εs are called the target and source counital maps. We adopt the
notations Ht = εt(H) and Hs = εs(H) for their images.
Similarly, we define the linear maps bεt and bεs by the formula
bεs(h) = 11ε(12h),
bεt(h) = ε(h11)12,
for any h ∈ H. Their images are denoted by cHt = bεt(H) and cHs = bεs(H).
2.2. Duality and rigid categories.
Recall from [9] that let (C, ⊗, I, a, l, r) be a monoidal category. V ∈ C, a left dual of V is
a triple (V ∗, evV , coevV ), where V ∗ is an object, evV : V ∗ ⊗V → I and coevV : I → V ⊗V ∗
are morphisms in C, satisfying
rV ◦ (idV ⊗ evV ) ◦ aV,V ∗,V ◦ (coevV ⊗ idV ) ◦ l−1
V = idV ,
and
lV ∗ ◦ (evV ⊗ idV ∗) ◦ a−1
V ∗,V,V ∗ ◦ (idV ∗ ⊗ coevV ) ◦ r−1
V ∗ = idV ∗.
Similarly, a right dual of V is a triple (∗V, eevV , gcoevV ), where ∗V is an object, eevV :
V ⊗ ∗V → I and gcoevV : I → ∗V ⊗ V are morphisms in C, satisfying
r∗V ◦ (idV ⊗ eevV ) ◦ a∗V,V,∗V ◦ (gcoevV ⊗ id∗V ) ◦ l−1
∗V = id∗V ,
4
and
lV ◦ (eevV ⊗ idV ) ◦ a−1
V,∗V,V ◦ (idV ⊗ gcoevV ) ◦ r−1
V = idV .
If each object in C admits a left dual (resp. a right dual, both a left dual and a right
dual), then C is called a left rigid category (resp. a right rigid category, a rigid category).
3. Left-right Yetter-Drinfeld modules over a weak Hom-Hopf
algebra
Definition 3.1. Let (H, αH ) be a weak Hom-Hopf algebra. A Yetter-Drinfeld module
over H is a vector space (M, αM ), such that M is a unital left H-module (with notation
h ⊗ m 7→ h · m) and a counital right H-comodule (with notation m ⊗ h 7→ m(0) ⊗ m(1))
with the following compatibility condition:
(h · m)(0) ⊗ (h · m)(1) = α−1
H (h21) · m(0) ⊗ [α−2(h22)α−1
H (m(1))]S−1(h1),
(3. 1)
for all h ∈ H and m ∈ M . We denote by H WYDH the category of Yetter-Drinfeld
modules, morphisms being the H-linear H-colinear maps.
Proposition 3.2. one has that(3.1) is equivalent to the following equations
αH(h1) · m(0) ⊗ α2
ρ(m) = m(0) ⊗ m(1) ∈ M ⊗t H , (11 ⊗ 12) · (M ⊗ H)
H(h1)
H(h2)αH (m(1)) = (h2 · m)(0) ⊗ (h2 · m)(1)α2
(3. 2)
(3. 3)
Proof (3.1) =⇒ (3.2), (3.3). We have
m(0) ⊗ m(1)
H (121) · α−1
1 · (12 · α−1
1 · (12 · α−1
1 · (12 · α−1
= α−1
= 1′
= 1′
= 1′
H (m(1))]S−1(11)
M (m(0)) ⊗ [α−2
M (m(0))) ⊗ [α−2
M (m(0))) ⊗ α−1
M (m(0))) ⊗ 1′
H (122)α−2
H (1′
H (1′
2[α−2
2)α−2
2)[α−2
H (m(1))S−1(11)].
H (m(1))]S−1(11)
H (m(1))S−1(α−1
H (11))]
5
Then we do a calculation as follows:
H (m(1)))S−1(h21)]α2
H (m(1)))S−1(h12)]αH (h11)
H (h1)
H (h1)
(h2 · m)(0) ⊗ (h2 · m)(1)α2
H (h221) · m(0) ⊗ [(α−2
H (h22)α−1
H (h222)α−1
= α−1
= h21 · m(0) ⊗ [(α−1
= h21 · m(0) ⊗ [(h22m(1))]S−1(h12)h11
= h21 · m(0) ⊗ [h22m(1)]S−1(11)ε(h112)
= h12 · m(0) ⊗ [αH(h2)m(1)]S−1(11)ε(α−1
= α−1
= α−1
= α−1
= h112 · m(0) ⊗ [h2m(1)]S−1(11)
H (m(1))]]S−1(11)
2α−1
= h11′
H (h2)[[13α−1
= αH(h1)[12 · α−1
= αH(h1) · m(0) ⊗ α2
H (h11)12)
2 · m(0) ⊗ [αH (h2)m(1)]S−1(11)ε(α−2
2 · m(0) ⊗ [αH (h2)m(1)]S−1(11)ε(α−1
2 · m(0) ⊗ [αH (h2)m(1)]S−1(11)ε(α−1
H (h12)1′
H (h12)1′
H (h12)1′
112 · m(0) ⊗ [αH (h2)[1′
M (m(0))] ⊗ α2
H (h2)αH (m(1)).
H (m(1))]S−1(α−1
H (11))]
H (h11)α−1
H (h11)[α−1
H (h11)[1′
H (1′
H (1′
112])
1)12)
1)α−1
H (12)])
For (3.2), (3.3) =⇒ (3.1), we have
H (h22) · α−2
H (h21) · m(0) ⊗ [α−2
α−1
M (α−4
= α2
H (h2) · m)(0) ⊗ (α−2
= (α−1
H (h2) · m)(0) ⊗ (α−2
= (α−1
2α−3
2α−2
H (h2) · m)(0) ⊗ (1′
= (1′
H (h2) · m)(0) ⊗ (13α−3
= (13α−2
H (h) · m)(0) ⊗ (12α−2
= (12α−1
= (12 · (α−1
= 11 · α−1
= (h · m)(0) ⊗ (h · m)(1).
M (h · m)(0) ⊗ 12α−1
H (h) · α−1
H (h22)α−1
H (m(1))]S−1(h1)
M (m))(0) ⊗ (α−4
H (h2) · α−1
H (h2) · α−1
H (h22) · α−2
M (m))(1)α−2
M (m))(1)11ε(12α−2
M (m))(1)α2
H(α−4
H (h12))S−1(α−2
H (h21))S−1(h1)
H (h11))
H (h1))
1α−3
H (h1))
H (h1))
H (h2) · α−1
H (h2) · α−1
H (h2) · α−1
H (m))(0) ⊗ (12 · (α−2
M (m))(1)11ε(121′
M (m))(1)11ε(12α−2
M (m))(1)11
H (h2) · α−2
M (m)))(1)11
H (h · m)(1)
Definition 3.3. Let (H, αH ) be a weak Hom-Hopf algebra. Left-right weak-Hom type
entwining structure is a triple (A, C, ψ), where (A, αA) is a Hom-algebra and (C, αC ) is a
Hom-coalgebra with a linear map ψ : A⊗C → A⊗C such that ψ◦(αA⊗αC) = (αA⊗αC)◦ψ
satisfying the following conditions:
αA(ψa) ⊗ ∆(cψ) = αA(a)ϕψ) ⊗ (c(1)
ψ(c ⊗ 1A) = ε(cψ
ψ(ab) ⊗ αC(cψ) = ψaϕb ⊗ αC(c)ψϕ,
1 )ψ1A ⊗ c2,
ψ ⊗ c(2)
ϕ),
ε(cψ)ψa = ε(cψ)a(ψ1A).
(3. 4)
(3. 5)
(3. 6)
(3. 7)
6
Over a weak-Hom type entwining structure (A, C, ψ), a left-right weak-Hom type entwined
modules (M, αM ) is both a right C-comodule and a left A-module such that
ρM (a · m) = αA(ψa) · m(0) · ⊗αC(mψ
(1)),
(3. 8)
for all a ∈ A and m ∈ M . AWM(ψ)C will denote the category of left-right weak-Hom
type entwined modules and morphisms between them.
Proposition 3.4. Let (H, αH ) be a weak Hom-Hopf algebra. Define φ : H ⊗ H →
H (c))S−1(a1) for all h, g ∈ H, and
In fact, for any
H ⊗ H given by φ(a ⊗ c) = α−1
so HWM(ψ)H is the category of weak-Hom type entwined modules.
(M, µ) ∈ HWM(ψ)H , one has compatible condition
H (a21) ⊗ (α−2
H (a22)α−1
ρM (a · m) = α−1
H (a21) · m(0) ⊗ (α−2
H (a22)α−1
H (m(1)))S−1(a1).
Proof. We need to prove that (3.4-3.7) hold. First, it is straightforward to check (3.4)
and (3.6). In what follows, we only verify (3.5) and (3.7). In fact, for all a, b, c ∈ H, we
have
c2 ⊗ ε(cψ
1 )ψ1A = c2 ⊗ ε(α−2
1S−1(11))121′′
1
1S−1(11))121′′
1
112)S(11)1′′
1
112)S(11)1′′
1
H (c1))]1′
H (c1)1′
H (c1))S−1(11))αH (12)
2[e11α−2
2e11]α−1
2 α−1
H (c1)]1′
2 α−1
2)ε(1′
2)ε(1′
2)ε(1′
2)ε(1′
H (c1)]1′
112)S(11)1′′
1
H (13)α−1
H (c2) ⊗ ε(1′′
H (c2) ⊗ ε([1′′
H (c2) ⊗ ε([1′′
H (c2)1′
H (c)1′
H (c)12 ⊗ S(11)1′′
1
H (c)S−1(11) ⊗ 121′
1
H (c)S−1(11) ⊗ 12
= e12α−1
= e12α−1
3α−1
= 1′′
3α−2
= 1′′
2α−1
= 1′′
2α−1
= 1′′
2α−1
= 1′
= 13α−1
= cψ ⊗ ψ1A.
3 ⊗ ε([1′′
2 ⊗ ε(1′
As for (3.7), we compute:
H (c)12))ε(11S−1(a1))αH (a21)
H (c)S−1(11)))ε(a112)αH (a21)
H (a11)12)αH (a12)
2(α−1
2(α−1
H (c))S−1(a1))αH (a21)
H (c))12)ε(11S−1(a1))αH (a21)
H (c)12))ε(11S−1(a1))αH (a21)
1)ε(1′
1)ε(1′
2(α−1
2(α−1
21′
1])ε(1′
H (a22)α−1
ε(cψ)ψa = ε((α−2
H (a22)α−1
= ε((α−2
H (a22)(α−1
= ε(α−1
= ε(α−1
H (a22)1′
= ε(α−1
H (a22)1′
1)ε(1′
= ε(a21′
= ε(a21′
1)ε(1′
= ε(α−1(a2)1′′
21′
= ε(a2[1′′
2(α−1
H (c)S−1(11)))αH (a1)1′
= ε(1′
2(α−1
H (c)S−1(11)))a1[1′
= ε(1′
112]
H (c)S−1(11)))a112
= ε(13(α−1
= ε(cψ)a(ψ1A).
H (c)S−1(11)))ε(α−1
H (c)S−1(11)))ε(a1(1′′
1)ε(1′
2(α−1
2(α−1
H (c)S−1(11)))a11′′
H (c)S−1(11)))a11′′
112
112
112
112))a211′′
2
7
Proposition 3.5. Let (H, αH ) be a weak Hom-Hopf algebra, for any (M, αM ), (N, αN ) ∈
HWYDH , and define the linear map
BM,N : M ⊗ N → N ⊗ M,
BM,N (m ⊗ n) = n(0) ⊗ α−1
H (n(1)) · m.
Then, we have (αN ⊗ αM ) ◦ BM,N = BM,N ◦ (αM ⊗ αN ) and, if (P, αP ) ∈ HWYDH, the
maps B−,− satisfy the Hom-Yang-Baxter equation:
(αP ⊗ BM,N ) ◦ (BM,P ) ⊗ (αM ⊗ BN,P )
= (BN,P ⊗ αM ) ◦ (αN ⊗ BN,P ) ◦ ((BM,P ⊗ αM ).
Proof. The proof is similar to Proposition 3.4 in [10].
lemma 3.6. Let(H, αH ) be a weak Hom-Hopf algebra, then Hs is the unit object in
HWYDH with the action: for any h ∈ H, x ∈ Hs,
and αHs = α.
h · x = bεs(h)(hx), ρ(x) = x1 ⊗ x2,
Proof. The proof is similar to [15].
lemma 3.7. Let (H, αH ) be a weak Hom-Hopf algebra, the left and right unit con-
straints lM : Hs ⊗t M → M and rM : M ⊗t Hs → M and their inverses are given by the
formulas
lM (x ⊗ m) = S(x) · α−2
rM (m ⊗ x) = x · α−2
M (m),
M (m),
l−1
M (m) = 1H ⊗ αM (m),
r−1
M (m) = ε(13)εs(12) · αM (m) ⊗ 11.
Proof. It is easy to see that lM is natural isomorphisms in HWYDH . We only check that
M lM (x ⊗t m) = l−1
l−1
M (S(x) · α−2
M (m)) = 1H ⊗t S(x) · α−1
M (m)
= εt(11) ⊗ (12S(x)) · m
= εt(bεs(S(x))1) ⊗ bεs(x)2 · m
= εt(11bεs(S(x))) ⊗ 12 · m
= εt(11x) ⊗ 12 · m = x ⊗t m,
and
lM l−1
M (m) = lM (1H ⊗t αM (m)) = 1H · α−2
M (αM (m)) = m,
which implies l−1
M is the inverse of lM .
HWYDH .
Similarly, we can check that rM is a natural isomorphism with the inverse r−1
M in
Theorem 3.8. Let (H, αH ) be a weak Hom-Hopf algebra. Then (H WYDH , ⊗t, Hs)
is a monoidal category.
Proof. Firstly, for any (M, αM ), (N, αN ), (P, αP ) ∈ HWYDH, define an associativity
constraint by
aM,N,P ((m ⊗t n) ⊗t p) = α−1
M (m) ⊗t (n ⊗t αP (p)), m ∈ M, n ∈ N, p ∈ P.
8
Obviously that a is natural and satisfies aM,N,P ◦ (αM ⊗ (αN ⊗ αP )) = ((αM ⊗ αN ) ⊗ αP ) ◦
aM,N,P . For any h ∈ H, since
aM,N,P (h · ((m ⊗t n) ⊗t p))
= α−1
M (h11 · m) ⊗t (h12 · n ⊗t αP (h2 · p))
= h1 · α−1
M (m) ⊗t (h21 · n ⊗t h22 · αP (p))
= h · (α−1
M (m) ⊗t (n ⊗t αP (p)))
= h · (aM,N,P ((m ⊗t n) ⊗t p)),
aM,N,P is H-linear.
Next we will check that aM,N,P is H-colinear.
(aM,N,P ⊗ idH ) ◦ ρ(M ⊗N ) ⊗P ((m ⊗ n) ⊗ p)
= (aM,N,P ⊗ idH )((m ⊗ n)(0) ⊗ p(0) ⊗ α−2
= aM,N,P ((m(0) ⊗ n(0)) ⊗ p(0)) ⊗ α−2
M (m(0)) ⊗ (n(0) ⊗ αP (p(0))) ⊗ α−2
= α−1
H (p(1)α−2
H (p(1))α−4
H (n(1)m(1)))
H (n(1)m(1)),
H (p(1)(m ⊗ n)(1)))
ρ(M ⊗N ) ⊗P ◦ aM,N,P ((m ⊗ n) ⊗ p)
M (m) ⊗ (n ⊗ αP (p)))
M (m)(0) ⊗ (n ⊗ αP (p))(0) ⊗ α−2
M (m)(0) ⊗ (n(0) ⊗ αP (p)(0)) ⊗ α−2
M (m)(0) ⊗ (n(0) ⊗ αP (p)(0)) ⊗ [α−3
M (m(0)) ⊗ (n(0) ⊗ αP (p(0))) ⊗ [α−2
M (m(0)) ⊗ (n(0) ⊗ αP (p(0))) ⊗ α−2
= ρ(M ⊗N ) ⊗P (α−1
= α−1
= α−1
= α−1
= α−1
= α−1
H ((n ⊗ αP (p))(1)α−1
M (m)(1))
H (αH(p)(1)n(1))α−1
H (α−2
H (p)(1)α−4
H (p)(1)[α−4
H (p(1))α−4
H (n(1))]α−3
H (n(1))α−4
H (n(1)m(1)).
M (m)(1)
M (m)(1)]
M (m)(1))
And aM,N,P is a bijection because of αM , αP are all bijective maps. Thus a is a natural
isomorphism in HWYDH.
Secondly, it is also a direct check to prove that a satisfies the Pentagon Axiom.
At last, we will check the Triangle Axiom. In fact, for any x ∈ Hs, we have
(rM ⊗ idN )((m ⊗t x) ⊗t n)
M (m) ⊗t n
M (m)) ⊗t 12 · n
= x · α−2
= 11 · (x · α−2
= 11x · α−1
= 11 · α−1
= 11 · α−1
= α−1
= α−1
= (idM ⊗ lN )aM,Ht,N ((m ⊗t x) ⊗t n).
M (m) ⊗t 12 · n
M (m) ⊗t 12S(x) · n
M (m) ⊗t 12 · (S(x) · α−1
M (m) ⊗ S(x) · α−1
M (m) ⊗t S(x) · α−2
N (n)
N (αN (n))
N (n))
Let (H, αH ) be a weak Hom-Hopf algebra with a bijective antipode S. Consider the
f.d. of HWYDH whose objects are finite-dimensional. Using the
full subcategory H WYDH
antipode S of H, we can provide WYD(H)f.d. with a duality.
9
For any (M, αM ) ∈ HWYDH
f.d., we set ∗M = Hom(M, k), with the action and the
coaction of H on M ∗ given by
(h·f )(m) = f (S(α−1
H (h))·α−2
M (m)) and f(0)(m)⊗f(1) = f (α−2
M (m(0)))⊗S−1(α−1
H (m(1))).
Similarly, for any (M, αM ) ∈ WYD(H)f.d., we set ∗M = Hom(M, k), with the action
and the coaction of H on M ∗ given by
(h·f )(m) = f (S−1(α−1
H (h))·α−2
M (m)) and f(0)(m)⊗f(1) = f (α−2
M (m(0)))⊗S(α−1
H (m(1))).
Theorem 3.9. The category H WYDH
Proof. Define the maps
f.d. is a rigid category.
coevM : Ht → M ⊗t M ∗,
x 7→ X x · (ei ⊗t αM ∗(ei)),
where ei and ei are bases of M and M ∗, respectively, dual to each other, and
evM : M ∗ ⊗t M → Ht,
f ⊗t m 7→ f (11 · m)12.
Firstly, we will prove that M ∗ is indeed an object in HWYDH, and α∗M is given by
α∗M (f )(m) = f (α−1
M (m)),
f ∈ ∗M, m ∈ M.
We have
(h · f )(0)(m) ⊗ (h · f )(1) = (h · f )(α−2
= f (S(α−1
M (m(0))) ⊗ S−1(α−1
H (m(1)))
H (h)) · α−4(m(0)))) ⊗ S−1(α−1
H (m(1))),
10
(α−1
H (h21) · f(0))(m) ⊗ (α−2
H (h22)α−1
H (f(1)))S−1(h1)
H (f(1)))S−1(h1)
H (S(α−1
H (h21)) · α−2
H (m(1))))S−1(h1)
H (h221))]
H (h22)α−1
H (h22)α−2
H (h22)
H (h2111))])S−1(h1)
H (h222)S−1(α−4
M (m)) ⊗ (α−2
M (m))(0)) ⊗ (α−2
M (m)(0)) ⊗ (α−2
H (S−1(m(1)))α−6
M (m)(0))) ⊗ ([α−4
H (h211))])S−1(h1)
M (m)(0))) ⊗ (11ε(12h22)
H (h211))])S−1(h1)
M (m)(0))) ⊗ (11ε(12h222)(α−4
M (m)(0))) ⊗ (11ε(12h222)(α−4
M (m)(0))) ⊗ (11ε(12h22)(α−3
2h22)(α−3
M (m)(0))) ⊗ (1′
2h2)(α−2
2h2)(α−3
M (m)(0))) ⊗ (1′
M (m)(0))) ⊗ (1′
1ε(1′
1ε(1′
1ε(1′
(α−4
(α−4
= f (S(α−4
H (h21)) · α−2
= f(0)(S(α−2
= f (S(α−4
= f (S(α−5
[S−1(α−4
= f (S(α−4
H (h21)) · α−4
H (h2112)) · α−4
H (h212))(α−5
H (h212)) · α−4
H (S−1(m(1)))α−4
H (h212)) · α−2
H (S−1(m(1)))α−4
H (h221)) · α−4
H (h221)) · α−4
H (h21)) · α−4
H (h21)) · α−4
2h12)) · α−4
H (1′′
H (12h1)) · α−4
H (1′′
1h)) · α−4
H (121′
H (h))S(12) · α−4
H (h))(12 · α−5
H (h)) · α−4
= f (S(α−4
= f (S(α−4
= f (S(α−3
= f (S(α−3
= f (S(α−4
= f (S(α−3
= f (S(α−4
= f (S(α−3
= f (S(α−2
= f (S(α−1
= f (S(α−1
2)(α−3
M (m)(0))) ⊗ (S−1(1′
M (m)(0))) ⊗ (S−1(13α−3
M (m)(0))) ⊗ (S−1(13α−3
H (m(1))).
M (m)(0)) ⊗ S−1(α−1
H (h21))])S−1(h1)
H (h21))])S−1(h1)
H (h12))S−1(α−2
H (h11))]
1h11)
H (S−1(m(1)))α−3
H (S−1(m(1)))α−3
H (S−1(m(1)))[α−2
H (S−1(m(1)))11ε(12h1)
H (S−1(m(1)))11ε(121′′
H (S−1(m(1)))11
2h2)(α−3
2)ε(1′
H (S−1(m(1)))11
H (S−1(m(1)))S−1(11))
11′′
H (S−1(m(1)))S−1(11))
1h1))S(12) · α−4
M (m)(0))) ⊗ (S−1(1′
H (S−1(m(1)))11
Which means that
(h · f )(0) ⊗ (h · f )(1) = (α−1
H (h21) · f(0)) ⊗ (α−2
H (h22)α−1
H (f(1)))S−1(h1).
We have known that Hs ∈ HWYDH, with left H-module structure h · z = bεs(hz) and
right H-comodule structure ρ(x) = x1 ⊗ x2, for all x ∈ Hs. Next, we will check evM and
coevM are morphisms in HWYDH. For any h ∈ H, m ∈ M , f ∈ M ∗, we compute
evM (h · (f ⊗t m)) = (h1 · f )(11 · (h2 · m))12
2α−3
H (h1)) · ((11 · (1′
H (h1))(12α−2
H (h)) · m)12
1α−2
= f (S(1′
= f ((S(11α−2
= f (εs(11α−2
= f (εs(α−2
= f (11 · m)εt(h12) = h · (evM (f ⊗t m)),
H (h1)) · v)εt(α−2
H (h2))) · ·α−1
H (h1))
H (h2))) · α−1
M (m))13
M (m)))12
and on one hand,
ρ ◦ evM (f ⊗ m) = ρ(12)f (11 · m)
= f (11 · m)S(1′
1) ⊗ 1′
2S−1(12),
11
on the other hand
(evM ⊗ id) ◦ ρ(f ⊗ m) = (evM ⊗ id)(f(0) ⊗ m(0)) ⊗ α−2
H (m(1)f(1))
= f(0)(11 · m(0))12 ⊗ α−2
= f (12 · α−2
M (m(0)(0)))(1′
= f (12 · α−1
M (m)(0))(1′
= f (12 · α−1
M (m)(0))(1′
= f (11 · m)1′
= f (11 · m)S(1′
2 ⊗ S−1(12)S−1(1′
1)
2S−1(12).
1) ⊗ 1′
H (m(1)f(1))
2) ⊗ α−2
H (m(1))S−1(1′
H (m(1)2)S−1(1′
2) ⊗ α−3
2) ⊗ S−1(εt(m(1)))S−1(1′
113α−3
113α−3
1))
H (m(0)(1))S−1(11))
H (m(1)1)S−1(11))
Thus evM is H-linear and H-colinear. And it is easy to get that evM ◦ (αM ∗ ⊗ αM ) =
αH ◦ evM , hence evM ∈ HWYDH.
Next we have
and
coevM (h · x)(m) = X εt(hx) · (ei ⊗ αM ∗(ei))(m)
= εt(hx) · α−2
M (m)),
h · coevM (x)(m) = (α−1
= (α−1
= εt(α−2
H (h1)x1) · αM (ei) ⊗t ((α−1
H (h2)α−1
H (h1)x1) · (S(α−2
H (h2)x2) · α2
H (x2)) · α−3
M (m))
M ∗(ei))(m)
H (h)α−1
H (x)) · α−2
M (m) = εt(hx) · α−2
M (m),
hence coevV is H-linear, it is not hard to check that coevV is H-colinear and is left to the
reader. Obviously that coevM ◦ αH = (αM ⊗ αM ∗) ◦ coevM , thus coevM ∈ H WYDH.
Secondly, we consider
(rM ◦ (idM ⊗ evM ) ◦ aM,M ∗,M ◦ (coevM ⊗ idM ) ◦ l−1
M )(m)
= (rM ◦ (idM ⊗ evM ) ◦ aM,M ∗,M )((11 · ei ⊗t 12 · αM ∗ (ei)) ⊗t αM (m))
= rM (ei ⊗t 12 · α2
M (m)))
= bεs(12) · (11 · α2
and
M ∗(ei)(11 · α2
M (m)) = m,
(lM ∗ ◦ (evM ⊗ idM ∗ ) ◦ a−1
= (lM ∗ ◦ (evM ⊗ idM ∗ ) ◦ a−1
= lV ∗(α2
= f (11 · (S(12) · α−2
M (m))) = f (m).
M ∗ (f )(11 · αM (ei))12 ⊗t αM ∗(ei))(m)
M ∗,M,M ∗ ◦ (idM ∗ ⊗ coevM ) ◦ r−1
M ∗,M,M ∗)(αM ∗ (f ) ⊗t (αM (ei) ⊗t α2
M ∗)(f )(m)
M ∗(ei)))(m)
Thus H WYDH
f.d. is a left rigid category.
Similarly, we define the following maps
and
x 7→ x · (X α∗M (ei) ⊗t ei),
∗M → Ht, m ⊗t f 7→ f (S−1(11) · m)12.
gcoevM : Ht → ∗M ⊗t M,
eevM : M ⊗t
We can show that (∗M, eevM , gcoevM ) is a right dual of M . Thus H WYDH
category.
f.d. is a right rigid
12
4. A braided monoidal category HWYDH I
Proposition 4.1. Let (H, αH ) be a weak Hom-Hopf algebra. For any (M, αM ), (N, αN ) ∈
HWYDH , then M ⊗t N = 11M ⊗ 12N ∈ H WYDH with structures:
h · (m ⊗t n) = h1 · m ⊗t h2 · n,
m ⊗t n 7→ (m ⊗t n)(0) ⊗t (m ⊗t n)(1) = (m(0) ⊗t n(0)) ⊗ α−2
H (n(1)m(1)).
Proof. Obviously M ⊗t N is a left H-module and a right H-comodule. We check now the
compatibility condition. We compute:
(h · (m ⊗ n))(0) ⊗ (h · (m ⊗ n))(1)
H ((h2 · n)(1)(h1 · m)(1))
H (((α−2
H (h222)α−1
H (n1))S−1(h21))
= (h1 · m ⊗ h2 · n)(0) ⊗ (h1 · m ⊗ h2 · n)(1)
= ((h1 · m)(0) ⊗ (h2 · n)(0) ⊗ α−2
= (α−1
((α−2
H (h121) · m(0) ⊗ α−1
H (h122)α−1
= (h12 · m(0) ⊗ α−1
H (h221) · n(0)) ⊗ α−2
H (m(1)))S−1(h11)))
H (h212) · n(0)) ⊗ α−2
H (h2111))(α−1
H (h212) · n(0)) ⊗ α−2
((S−1(α−3
H (h2112))α−3
= (h12 · m(0) ⊗ α−1
(12ε(α−3
H (h211)11)(α−1
H (m(1))S−1(α−1
= (h12 · m(0) ⊗ α−1
(12ε(α−2
H (h21)11)(α−1
H (h221) · n(0)) ⊗ α−2
H (m(1))S−1(α−1
H ((h22n1)
H (m(1))S−1(α−1
H ((h22n1)
H (h11))))
H ((h222n1)
H (h11))))
H (h11))))
= (α−1
H (h211) · m(0) ⊗ α−1
H (h212)11)(α−1
H (h221) · n(0)) ⊗ α−2
H (m(1))S−1(h1)))
(12ε(α−2
H ((h222n1)
= (α−2
H (h211)1′
(12ε(α−2
H (h212)1′
= (α−2
H (h211)1′
1 · m(0) ⊗ α−1
211)(α−1
1 · m(0) ⊗ α−1
211)(α−1
H (h221) · n(0)) ⊗ α−2
H (m(1))S−1(h1)))
H (h221) · n(0)) ⊗ α−2
H (m(1))S−1(h1)))
(12ε(α−2
H (h212)1′
H ((h222n1)
H ((h222n1)
= (α−2
H (h211)1′
211 · m(0) ⊗ α−1
H (m(1))S−1(α−1(h1)1′
(12(α−1
H (h21) · (m ⊗ n)(0) ⊗ α−2
= α−1
1)))
H (h22)α−1
H (m ⊗ n)(1)S−1(h1).
H (h212) · n(0)) ⊗ α−2
H ((αH (h22)n1)
Hence M ⊗t N ∈ HWYDH.
Proposition 4.2. Let (M, αM ), (N, αN ) ∈ HWYDH. Define the map
cM,N : M ⊗t N → M ⊗t M, cM,N (m ⊗ n) = α−1
N (n(0)) ⊗ α−1
M (α−1
H (n(1)) · m).
Then cM,N is H-linear H-colinear and satisfies the conditions (for (P, αP ) ∈ HWYDH)
P,M,N ◦ cM ⊗N,P ◦ a−1
a−1
M,N,P = (cM,P ⊗ idN ) ◦ a−1
M,P,N ◦ (idM ⊗ cN,P ),
(4. 1)
13
aN,P,M ◦ cM,N ⊗P ◦ aM,N,P = (idN ⊗ cM,P ) ◦ aN,M,P ◦ (cM,N ⊗ idP ).
(4. 2)
Proof. First, we prove that cM,N is H-linear, we compute:
cM,N (h · (m ⊗ n))
M (α−1
H (h221) · n(0)) ⊗ α−1
= cM,N (h1 · m ⊗ h2 · n)
N ((h2 · n)(0)) ⊗ α−1
= α−1
N (α−1
= α−1
N (h21 · n(0)) ⊗ α−1
= α−1
N (h21 · n(0)) ⊗ α−1
= α−1
N (h21 · n(0)) ⊗ α−1
= α−1
N (h21 · n(0)) ⊗ α−1
= α−1
N (α−1
= α−1
N (h112 · n(0)) ⊗ α−1
= α−1
= h1 · (12 · α−2
= h1 · α−1
= h · cM,N (m ⊗ n).
N (n(0)) ⊗ α−1
H (h12)13 · n(0)) ⊗ α−1
M ([α−2
N (n(0))) ⊗ α−1
M (h2)α−2
M (α−1
M ([α−2
M ([α−2
M ([α−2
H (n(1))]S−1(h21)) · (h1 · m))
H (h11) · m))
H (h11) · m))
H (n(1))]S−1(h12)) · (α−1
H (h12)) · (α−1
H (h12))α−2
H (h11)] · αM (m))
H (h222)α−1
H ([α−2
H (h22)α−1
H ((h2 · n)(1))) · (h1 · m))
M (α−1
H ([α−1
H (h22)α−2
H (h22)α−2
H (h22)α−2
M ([α−2
H (h2)13α−2
H (h2)[13α−4
H (n(1)) · m
H (n(1))]S−1(α−1
H (n(1))][S−1(α−2
H (n(1))][S−1(11)ε(α−2
H (h2)14α−2
H (n(1))]S−1(11) · αM (m))
H (n(1))S−1(11)] · m
H (h112))] · αM (m))
H (n(1))][S−1(11)ε(α−2
H (h1112))] · αM (m))
Next we prove that cM,N is H-colinear.
ρN ⊗M cM,N (m ⊗ n)
H (n(1)) · m))
H (n(1)) · α−1
H (n(1)21) · α−1
M (m))(0) ⊗ α−2
M (m(0)) ⊗ α−2
H ((α−2
H ((α−4
H (n(1)) · α−1
H (n(1)22)α−2
M (m))(1)α−1
H (m(1))
N (n(0)(1)))
= α−1
M (α−1
N (n(0)) ⊗ α−1
= ρN ⊗M (α−1
= α−1
= α−1
N (n(0)(1)))
N (n(0)(0)) ⊗ (α−2
N (n(0)(0)) ⊗ α−3
S−1(n(1)1))α−1
N (n(0)(0)) ⊗ α−2
[S−1(α−3
= n(0) ⊗ α−3
= α−1
= α−1
= α−1
= (cM,N ⊗ idH )ρM ⊗N (m ⊗ n).
N (n(0)(0)) ⊗ α−3
N (n(0)(0)) ⊗ α−2
N (n(0)(0)) ⊗ α−2
H (n(0)(1)2))α−3
H (n(1)1)12 · α−1
H (n(1)1) · α−1
M (m(0)) ⊗ α−2
H ((α−2
H (n(1)2)α−1
H (m(1)))
N (n(0)(1)(1))])
M (m(0)) ⊗ α−2
H ((α−3
H (n(1)2)13α−1
H (m(1)))S−1(11))
H (n(0)(1))12 · α−1
H (n(0)(1))(12 · α−2
H (n(0)(1)) · α−1
M (m(0)) ⊗ α−2
M (m(0))) ⊗ α−2
M (m(0)) ⊗ α−2
H (n(1)m(1))
H ((α−2
H (n(1))13α−1
H (m(1)))S−1(11))
H (n(1)[13α−2
H (m(1))]S−1(11))
As for (4.2), for any m ∈ M, n ∈ N and p ∈ P , we have
(aN,P,M ◦ cM,N ⊗P ◦ aM,N,P )((m ⊗t n) ⊗t p)
N (n(0)) ⊗ p(0) ⊗ α−4
N (n(0)) ⊗ (p(0) ⊗ α−3
H (αH (p(1))n(1)) · α−2
= aN,P,M (α−1
= α−2
= (idN ⊗t (cM,P ))(α−2
M (m) ⊗ αP (p))
= ((idN ⊗t cM,P ) ◦ aN,M,P ◦ (cM,N ⊗t idP ))((m ⊗t n) ⊗t p),
H (αH (p(1))n(1)) · α−1
H (n(1)) · α−1
N (n(0)) ⊗ (α−2
M (m))
M (m))
14
we can check that (4.1) in the similar way.
Lemma 4.3. cM,N is bijective with inverse
M,N (n ⊗ m) = α−1
c−1
M (α−1
H (S(n(1))) · m) ⊗ α−1
N (n(0)).
Proof. First, we prove that cM,N ◦ c−1
M,N = id. For any m ∈ M and n ∈ N , we have
H (S(n(1))) · m) ⊗ α−1
M (m) ⊗ α−1
N (n(0)))
N (n(0)))
M,N (n ⊗ m)
M (α−1
H (S(n(1))) · α−1
cM,N c−1
= cM,N (α−1
= cM,N (α−2
N (n(0)(0)) ⊗ α−3
= α−2
N (n(0)(0)) ⊗ [α−4
= α−2
N (n(1)1)α−4
N (n(0)) ⊗ [α−4
= α−1
N (n(0)) ⊗ 12ε(11n(1)) · α−1
= α−1
1α−2
= 1′
= 11α−1
= n ⊗ m.
N (n(0)) ⊗ 12ε(111′
N (n) ⊗ 12 · α−1
M (m)
N (n(0)(1)) · [α−3
N (n(0)(1))α−3
H (S(n(1))) · α−2
H (S(n(1)))] · α−1
M (m)
M (m)]
M (m)
H (S(n(1)2))] · α−1
M (m)
2n(1)) · α−1
M (m)
Then, we note that the following relation holds, for all m ∈ M ,
m(0) ⊗ m(1)
H (121) · α−1
1 · (12 · α−1
1 · (12 · α−1
1 · (12 · α−1
= α−1
= 1′
= 1′
= 1′
= 12 · α−1
H (m(1))]S−1(11)
M (m(0)) ⊗ [α−2
M (m(0))) ⊗ [α−2
M (m(0))) ⊗ α−1
M (m(0))) ⊗ 1′
H (122)α−2
H (1′
H (1′
2[α−2
2)α−2
2)[α−2
H (m(1))S−1(11)]
H (m(1))]S−1(11)
H (m(1))S−1(α−1
H (11))]
M (m(0)) ⊗ α−2
H (m(1))S−1(11).
15
Finally, we check that c−1
M,N ◦ cM,N = id. For any m ∈ M and n ∈ N , we have
c−1
M,N cM,N (m ⊗ n)
N (n(0)) ⊗ α−1
M,N (α−1
= c−1
H (S(n(0)(1))) · [α−3
= α−3
H (S(n(0)(1)))α−3
= [α−4
H (S(n(1)1))α−4
= [α−4
M (m) ⊗ α−1
= εs(n(1)) · α−1
= 11S((S−1εs(n(1)))) · α−1
= S(12)S((S−1εs(n(1)))) · α−1
= S((S−1εs(n(1)))12) · α−1
= S((S−1εs(n(1)))S(11)) · α−1
= S2(11) · α−1
= S2(11) · α−1
= m ⊗ n.
H (n(1)) · m))
M (α−1
H (n(1)) · α−2
H (n(1))] · α−1
H (n(1)2)] · α−1
N (n(0))
M (m) ⊗ 12 · α−1
M (m)] ⊗ α−2
M (m) ⊗ α−2
M (m) ⊗ α−1
N (n(0)(0))
N (n(0)(0))
N (n(0))
N (n(0))
M (m) ⊗ S(11) · α−1
N (n(0))
M (m) ⊗ S(11) · α−1
N (n(0))
M (m) ⊗ S2(12) · α−1
N (n(0))
N (n(0))
M (m) ⊗ S2(12S−1εs(n(1))) · α−1
M (m) ⊗ S2(12) · α−1
N (n)
Theorem 4.4. HWYDH is a braided monoidal category.
We can make now the connection between Yetter-Drinfeld modules over weak Hom-
Hopf algebras and modules over quasitriangular weak Hom-Hopf algebras.
Definition 4.5.[16] Let (H, α) be a weak Hom-bialgebra. If there exists R = R(1) ⊗
R(2) ∈ ∆op(1)(H ⊗k H)∆(1), such that the following conditions hold:
(1) (α ⊗ α)R = R;
(2) R∆(h) = ∆op(h)R;
(3) there exists R ∈ ∆(1)(H ⊗k H)∆op(1), such that RR = ∆op(1), RR = ∆(1);
(4) α(R(1)) ⊗ R(2)
(5) R(1)
2 = α−1(r(1)R(1)) ⊗ R(2) ⊗ r(2);
2 ⊗ α(R(2)) = r(1) ⊗ R(1) ⊗ α−1(r(2)R(2)),
1 ⊗ R(2)
1 ⊗ R(1)
where h ∈ H, r = R = R(1) ⊗ R(2) = r(1) ⊗ r(2), then R is called an R-matrix of H, R is
called the weak inverse of R. (H, R) is called a quasitriangular weak Hom-bialgebra.
Proposition 4.6. Let (H, αH , R) be a quasitriangular weak Hom-Hopf algebra, then
we have
(i) Let (M, αM ) be a left H-module with action H ⊗ M → M, h ⊗t m 7→ h · m. Define
the linear map ρM : M → M ⊗t H, ρM (m) = m(0) ⊗t m(1) := R(2) · m ⊗t αH (R(1)). Then
(M, αM ) with these structures is a Yetter-Drinfeld module over H.
(ii) Let (N, αN ) be another left H-module with action H ⊗t N → N, h ⊗t n 7→ h · n,
regarded as a Yetter-Drinfeld module as in (i), via the map ρN : N → N ⊗ H, ρN (n) =
n(0) ⊗ n(1) := r(2) · m ⊗t αH(r(1)). We regard (M ⊗t N, αM ⊗ αN ) as a left H-module via
the standard action h · (m ⊗ n) = h1 · m ⊗t h2 · n and then we regard (M ⊗t N, αM ⊗ αN ) as
a Yetter-Drinfeld module as in (i). Then this Yetter-Drinfeld module (M ⊗t N, αM ⊗ αN )
coincides with the Yetter-Drinfeld module M ⊗t N defined as in Proposition 4.1.
Proof. First we have to prove that (M, αM ) is a right H-comodule; ρ(α(m)) =
16
αM (m(0)) ⊗ α(m(1)) is easy and left to the reader, we check
(αM ⊗ ∆)ρM (m) = αM (R(2) · m) ⊗ ∆(αH (R(1)))
= αH(R(2)) · αM (m) ⊗ αH (R(1)
= r(2)R(2) · αM (m) ⊗ α2
= αH(r(2)) · (R(2) · m) ⊗ α2
= r(2) · (R(2) · m) ⊗ αH (r(1)) ⊗ α2
= ρM (R(2) · m) ⊗ α2
= (ρM ⊗ αM )ρM (m).
H(R(1))
1 ) ⊗ αH (R(1)
2 )
H(R(1))
H(r(1)) ⊗ α2
H(r(1)) ⊗ α2
H(R(1))
H(R(1))
Now we check the Yetter-Drinfeld condition (3.3):
(h2 · m)(0) ⊗ (h2 · m)(1)α2
H(h1) = R(2) · (h2 · m) ⊗ αH (R(1))α2
= αH (R(2)) · (h2 · m) ⊗ α2
= (R(2)h2) · αM (m) ⊗ α2
= (h1R(2)) · αM (m) ⊗ α2
= αH (h1) · (R(2) · m) ⊗ α2
= αH (h1) · m(0) ⊗ α2
H (h2)αH(m(1)).
H (h1)
H (h1)
H (R(1))α2
H (R(1)h1)
H (h2R(1))
H (h2)α2
H (R(1))
(ii) We only need to prove that the two comodule structures on M ⊗t N coincide, that
is, for all m ∈ M and n ∈ N ,
m(0) ⊗ n(0) ⊗ α−2
H (n(1)m(1)) = R(2) · (m ⊗ n) ⊗ αH(R(1)),
that is
R(2) · m ⊗ r(2) · n ⊗ α−2
H (αH (r(2))αH (R(2))) = R(2)
1
· m ⊗ R(2)
2
· n ⊗ αH (R(1)),
which is equivalent to
αH (R(2)) · m ⊗ αH(r(2)) · n ⊗ r(2)R(2) = R(2)
1
· m ⊗ R(2)
2
· n ⊗ αH(R(1)).
Proposition 4.7. Let (H, αH , R) be a quasitriangular weak Hom-Hopf algebra. De-
note by Rep(H) the category whose objects are left H-modules and whose morphisms
are H-linear maps. Then Rep(H) is a braided monoidal subcategory of H WYDH, with
tensor product defined as in Proposition 4.1, associativity constraints defined by the for-
mula aM,N,P ((m ⊗n) ⊗p) = α−1
M (m) ⊗(n ⊗αP (p)) for any M, N, P ∈ Rep(H), and braid-
N (n) ⊗t R(1) · α−1
ing cM,N : M ⊗t M → N ⊗t M, m ⊗t n 7→ R(2) · α−1
M (m), with in-
· α−1
· α−1
verse c−1
M (m) ⊗t R
N (n), for any
(M, αM ), (N, αN ) ∈ Rep(H).
M,N : N ⊗t M → M ⊗t M, n ⊗t m 7→ R
(1)
(2)
5. A braided monoidal category HWYDH II
17
Modules over quasitriangular weak Hom-Hopf algebras become Yetter-Drinfeld mod-
ules over weak Hom-Hopf algebras are proved in Section 4. Similarly, comodules over
coquasitriangular weak Hom-Hopf algebras become Yetter-Drinfeld modules over weak
Hom-Hopf algebras; inspired by this, we can introduce a second braided monoidal cate-
gory structure on H WYDH. We include these facts here for completeness. Each of the
next results is the analogue of a result in Section 4; their proofs are similar to those of
their analogues and are left to the reader.
Proposition 5.1. Let (H, αH ) be a weak Hom-Hopf algebra.
(i) Let (M, αM ), (N, αN ) ∈ H WYDH, with notation as above, and the tensor product
M ⊗N is obtained by
M ⊗N = {m ⊗n = m0 ⊗k n0ε(m1n1) m ∈ M, n ∈ N },
with structures:
h · (m ⊗n) = α−2
m ⊗n 7→ (m ⊗n)(0) ⊗ (m ⊗n)(1) = (m(0) ⊗n(0)) ⊗n(1)m(1).
H (h1) · m ⊗α−2
H (h2) · n,
(ii) H WYDH is a braided monoidal category, with tensor product ⊗ as in (i) and asso-
ciativity constraints aM,N,P and quasi-braiding cM,N defined as follows: for any (M, αM ),
(N, αN ), (P, αP ) ∈ HWYDH, define an associativity constraint by
aM,N,P ((m ⊗n) ⊗p) = α−1
M (m) ⊗(n ⊗αP (p)), m ∈ M, n ∈ N, p ∈ P,
cM,N : M ⊗N → M ⊗M, cM,N (m ⊗n) = α−1
N (n(0)) ⊗α−1
M (α−1
H (n(1)) · m).
with inverse
M,N (n ⊗m) = α−1
c−1
M (α−1
H (S(n(1))) · m) ⊗α−1
N (n(0))
.
Definition 5.2.[16] Let (H, α) be a weak Hom-bialgebra, if there is a linear map
σ : H ⊗k H → k, such that the following conditions hold:
(1) σ(a, b) = ε(b1a1)σ(a2, b2)ε(a3b3);
(2) σ(a1, b1)a2b2 = b1a1σ(a2, b2);
(3) there exists σ′ ∈ homk(H ⊗ H, k), such that σ(a1, b1)σ′(a2, b2) = ε(ab),
and σ′(a1, b1)σ(a2, b2) = ε(ba);
(4) σ(α(a), α(b)) = σ(a, b);
(5) σ(α(a), bc) = σ(a1, α(c))σ(a2, α(b));
(6) σ(ab, α(c)) = σ(α(a), c1)σ(α(b), c2),
where a, b, c ∈ H, then σ is called an coquasitriangular form of H, σ′ is called the weak
convolution inverse of σ. (H, σ) is called a coquasitriangular weak Hom-bialgebra.
Proposition 5.3. Let (H, αH , σ) be a coquasitriangular weak Hom-Hopf algebra,
then we have
(i) Let (M, αM ) be a left H-comodule with coaction M → M ⊗H, ρM (m) = m(0) ⊗m(1).
Define the linear map H ⊗ M → M, h ⊗m 7→ h · m := σ(αH (h), m(1))m(0). Then (M, αM )
with these structures is a Yetter-Drinfeld module over H.
(ii) Let (N, αN ) be another left H-comodule with coaction N → N ⊗H, ρN (n) =
n(0) ⊗n(1). Define the linear map H ⊗ N → N, h ⊗n 7→ h · n := σ(αH (h), n(1))n(0). We
18
regard (M ⊗N, αM ⊗ αN ) as a left H-module via the standard action h·(m ⊗n) = α−2
H (h1)·
m ⊗α−2
H (h2)· n and then we regard (M ⊗N, αM ⊗ αN ) as a Yetter-Drinfeld module as in (i).
Then this Yetter-Drinfeld module (M ⊗N, αM ⊗ αN ) coincides with the Yetter-Drinfeld
module M ⊗N defined as in Proposition 5.1.
Theorem 5.4. Let (H, αH , σ) be a coquasitriangular weak Hom-Hopf algebra. Denote
by Corep(H) the category whose objects are right H-comodules (M, αM ) and morphisms
are morphisms of right H-comodules. Then Corep(H) is a braided monoidal subcategory
of H WYDH, with tensor product defined as in Proposition 5.1, associativity constraints
defined by the formula aM,N,P ((m ⊗n) ⊗p) = α−1
M (m) ⊗(n ⊗αP (p)) for any M, N, P ∈
Corep(H), and braiding cM,N : M ⊗N → N ⊗M, m ⊗n 7→ α−1
M (m0)σ(m1, n1),
with inverse c−1M,N : N ⊗M → M ⊗N, n ⊗m 7→ α−1
N (n0)σ′(m1, n1), for any
(M, αM ), (N, αN ) ∈ Corep(H).
M (m0) ⊗α−1
M (n0) ⊗α−1
ACKNOWLEDGEMENT
The work is supported by Project Funded by China Postdoctoral Science Foundation
(No. 2015M580508), the Fund of Science and Technology Department of Guizhou Province
(No. 2014GZ81365) and the Program for Science and Technology Innovation Talents in
Education Department of Guizhou Province(No. KY[2015]481).
References
[1] G. Bohm, F. Nill, and K. Szlach´anyi, Weak Hopf algebras I: Integral theory and C ∗-
structure, J. Algebra 221 (1999), 385-438.
[2] S. Caenepeel, and I. Goyvaerts, Monoidal Hom-Hopf algebras, Comm. Algebra 39
(2011), 2216-2240.
[3] S. Caenepeel, D. G. Wang, and Y. Yan, Yetter-Drinfeld modules over weak bialgebras,
Ann. Univ. Ferrara Sez. VII (N.S.) 51 (2005), 69-98.
[4] J.T. Hartwig, D. Larsson, and S.D. Silvestrov, Deformation of Lie algebras using
σ-derivations, J. Algebra 295 (2006), 314-361.
[5] M. Chaichian, D. Ellinas and Z. Popowicz, Quantum conformal algebra with central
extension, Phys. Lett. B 248(1-2) (1990), 95-99.
[6] M. Chaichian, A. P. Isaev, J. Lukierski, Z. Popowi, and P. Presnajder, q-deformations
of Virasoro algebra and conformal dimensions, Phys. Lett. B 262(1) (1991), 32-38.
[7] M. Chaichian, P. Kulish, and J. Lukierski, q-deformed Jacobi identity, q-oscillators
and q-deformed infinite-dimensional algebras, Phys. Lett. B 237(3-4) (1990), 401-406.
[8] N. Hu, q-Witt algebras, q-Lie algebras, q-holomorph structure and representations,
Algebra Colloq. 6(1)(1999), 51-70.
[9] C. Kassel, Quantum Groups, Springer-Verlag, New York, 1995.
[10] A. Makhlouf, and F. Panaite, Yetter-Drinfeld modules for Hom-bialgebras, J. Math.
Phys. 55(1) (2014), 013501.
19
[11] A. Makhlouf, and F. Panaite, Hom-L-R-smash products, Hom-diagonal crossed prod-
ucts and the Drinfeld double of a Hom-Hopf algebra, J. Algebra 441(2015), 314-343.
[12] A. Makhlouf, and S. D. Silvestrov, Hom-algebra stuctures, J. Gen. Lie Theory Appl.
2 (2008), 51-64.
[13] A. Makhlouf, and S. D. Silvestrov, Hom-Lie admissible Hom-coalgebras and Hom-
Hopf algebras, J. Gen. Lie Theory in Mathematics, Physics and beyond. Springer-
Verlag, Berlin, 2009, pp. 189-206.
[14] A. Makhlouf, and S. D. Silvestrov, Hom-algebras and Hom-coalgebras, J. Algebra
Appl. 9(2010), 553-589.
[15] A. Nenciu, The center construction for weak Hopf algebras, Tsukuba J. Math. 26
(2002), 189-2004.
[16] X. H. Zhang, and S. H. Wang, Weak Hom-Hopf algebras and their (co)representations,
Journal of Geometry and Physics 94(2014), 50-71.
[17] D. Yau, Hom-bialgebras and comodule algebras, Int. Electron. J. Algebra 8 (2010),
45-64.
[18] D. Yau, The Hom-Yang-Baxter equation, Hom-Lie algebras, and quasi-triangular bial-
gebras, J. Phys. A. 42(16) (2010), 165202.
[19] D. Yau, The Hom-Yang-Baxter equation and Hom-Lie algebras, J. Math. Phys.
52(2011), 053502.
20
|
1511.02323 | 1 | 1511 | 2015-11-07T08:53:30 | Centers of Cuntz-Krieger $C^*$-algebras | [
"math.RA"
] | For a finite directed graph $\Gamma$ we determine the center of the Cuntz-Krieger $C^*$-algebra $CK(\Gamma).$ | math.RA | math |
CENTERS OF CUNTZ-KRIEGER C ∗-ALGEBRAS
ADEL ALAHMADI AND HAMED ALSULAMI
Abstract. For a finite directed graph Γ we determine the center of the Cuntz-
Krieger C ∗-algebra CK(Γ).
1. Definitions and Main Results
Let Γ = (V, E, s, r) be a directed graph that consists of a set V of vertices and a
set E of edges, and two maps r : E → V and s : E → V identifying the range and
the source of each edge. A graph is finite if both sets V and E are finite. A graph
is row-finite if s−1(v) < ∞ for an arbitrary vertex v ∈ V.
Definition 1. If Γ is a row-finite graph, the Cuntz-Krieger C ∗-algebra CK(Γ) is
the universal C ∗-algebra generated ( as a C ∗-algebra ) by V ∪ E and satisfying the
relations (1) s(e)e = er(e) = e for all e ∈ E, (2) e∗f = δe,f r(f ) for all e, f ∈ E, (3)
v = Xe∈s−1(v)
ee∗ whenever s−1(v) 6= ∅.
The discrete C-subalgebra of CK(Γ) generated by V, E, E ∗ is isomorphic to the
Leavitt path algebra L(Γ) of the graph Γ ( see [T2] ). We will identify L(Γ) with
its image in CK(Γ). Clearly L(Γ) is dense in CK(Γ) in the C ∗- topology.
A path is a finite sequence p = e1 · · · en of edges with r(ei) = s(ei+1) for 1 ≤ i ≤
n − 1. We consider the vertices to be paths of length zero. We let P ath(Γ) denote
the set of all paths in the graph Γ and extend the maps r, s to P ath(Γ) as follows:
for p = e1 · · · en we set s(p) = s(e1), r(p) = r(en). For v ∈ V viewed as a path we
set s(v) = r(v) = v. A vertex w is a descendant of a vertex v if there exists a path
p ∈ P ath(Γ) such that s(p) = v, r(p) = w.
A cycle is a path C = e1 · · · en, n ≥ 1 such that s(e1) = r(en) and all vertices
s(e1), . . . , s(en) are distinct. An edge e ∈ E is called an exit from the cycle C if
s(e) ∈ {s(e1), · · · , s(en)}, but e /∈ {e1, · · · , en}. A cycle without an exit is called a
Key words and phrases. Cuntz-Krieger algebra, Leavitt path algebra.
1
2
ADEL ALAHMADI AND HAMED ALSULAMI
N E-cycle. A subset W ⊂ V is hereditary if all descendants of an arbitrary vertex
w ∈ W also lie in W. For two nonempty subsets W1, W2 ⊂ V let E(W1, W2) denote
the set of edges {e ∈ E s(e) ∈ W1, r(e) ∈ W2}.
For a hereditary subset W ⊂ V the C ∗-subalgebra of CK(Γ) generated by
W, E(W, W ) is isomorphic to the Cuntz-Krieger algebra of the graph
(W, E(W, W ), sE(W,W ), rE(W,W )), ( see [BPRS], [BHRS] ). We will denote it as
CK(W ).
Example 1. Let the graph Γ be a cycle, V = {v1, · · · , vn}, E = {e1, · · · , en},
s(ei) = vi, 1 ≤ i ≤ n; r(ei) = vi+1 for 1 ≤ i ≤ n − 1, r(en) = v1. The algebra
CK(Γ) in this case is isomorphic to the matrix algebra Mn(T ), where T is the C ∗-
algebra of continuous functions on the unit circle. The center of CK(Γ) is generated
by the element e1 · · · en + e2e3 · · · e1 + · · · + ene1 · · · e1 and is isomorphic T.
For an arbitrary row-finite graph Γ if a path C = e1 · · · en is a N E-cycle with
the hereditary set of vertices V (C) = {s(e1), · · · , s(en)} then we denote CK(C) =
CK(V (C)) ∼= Mn(T ). The center Z(C) of the subalgebra CK(C) of CK(Γ) is
generated by the element
z(C) = e1 · · · en + e2e3 · · · ene1 + · · · + ene1 · · · en−1.
We will need some definitions and some results from [AA1], [AA2].
Definition 2. Let W ⊂ V be a nonempty subset. We say that a path p =
e1 · · · en, ei ∈ E, is an arrival path in W if r(p) ∈ W, and {s(e1), · · · , s(en)} * W.
In other words, r(p) is the first vertex on p that lies in W. In particular, every vertex
w ∈ W, viewed as a path of zero length, is an arrival path in W. Let Arr(W ) be
the set of all arrival paths in W.
Definition 3. A hereditary set W ⊆ V is called finitary if Arr(W ) < ∞.
If W is a hereditary finitary subset of V then e(W ) = Xp∈Arr(W )
idempotent in L(Γ) and, hence in CK(Γ), see [AA1],[AA2]. If C is a N E-cycle in Γ
pp∗ is a central
with the hereditary set of vertices V (C) then we will denote Arr(C) = Arr(V (C)).
If the set V (C) is finitary then we will say that the cycle is finitary. In this case
pzp∗ lies in the center of L(Γ)
for an arbitrary element z ∈ Z(C) the sum Xp∈Arr(C)
and CK(Γ), see [AA2].
CENTERS OF CUNTZ-KRIEGER C ∗-ALGEBRAS
3
Theorem 1. Let Γ be a finite graph. The center Z(CK(Γ)) is spanned by:
(i) central idempotents e(W ), where W runs over all nonempty hereditary fini-
tary subsets of V ;
(ii) subspaces { Xp∈Arr(C)
cycles of Γ.
pzp∗ z ∈ Z(C)}, where C runs over all finitary N E-
Corollary 1. Z(CK(Γ)) is the closure of Z(L(Γ)).
Corollary 2. The center Z(CK(Γ)) is isomorphic to a finite direct sum C ⊕ · · · ⊕
C ⊕ T ⊕ · · · ⊕ T.
In [CGBMGSMSH] it was shown that the center of a prime Cuntz-Krieger C ∗-
algebra is equal to C · 1 ( for a finite graph ) or to (0) ( for infinite graph ).
We remark that for two distinct hereditary subsets W1 $ W2 the central idem-
potents e(W1), e(W2) may be equal.
To make the statement of the Theorem more precise we will consider annihilator
hereditary subsets.
Let W be a nonempty subset of V. Consider the subset W ⊥ = {v ∈ V
the vertex v does not have descendants in W }.
For empty set we let ∅⊥ = V. It is easy to see that W ⊥ is always a hereditary
subset of V. If W1 ⊆ W2 ⊆ V then W ⊥
1 ⊇ W ⊥
2 , (W ⊥)⊥ ⊇ W, ((W ⊥)⊥)⊥ = W ⊥.
Definition 4. We will refer to W ⊥, W ⊆ V as annihilator hereditary subsets.
In [AA1] it was proved that (W ⊥)⊥ is the largest hereditary subset of V such
that every vertex in it has a descendant in W and that e(W ) = e((W ⊥)⊥).
Hence in the part (i) of the Theorem we can let W run over nonempty finitary
hereditary annihilator subsets of V.
In fact there is a 1-1 correspondence ( and a Boolean algebra isomorphism )
between finitary hereditary annihilator subsets of V and central idempotents of
L(Γ) and CK(Γ).
Example 2. Let Γ =
Thus there are no proper finitary hereditary subsets and Z(L(Γ)) = C · 1.
v2 . The set {v2} is hereditary, but not finitary.
v1
4
ADEL ALAHMADI AND HAMED ALSULAMI
v1
v2
v3
v4
. The set {v2, v3, v4} is hereditary and finitary,
Example 3. Let Γ =
but ({v2, v3, v4}⊥)⊥ = V. Thus there are no proper finitary hereditary annihilator
subsets and again Z(L(Γ)) = C · 1.
v1
v2
v3
v5
Example 4. Let Γ =
subsets are {v5} and {v2, v3, v4}. Hence Z(L(Γ)) = T ⊕ C.
. The only finitary hereditary annihilator
v4
2. Closed Ideals
Let W be a hereditary subset of V. The ideal I(W ) of the Leavitt path algebra
generated by the set W is the C-span of the set {pq∗ p, q ∈ P ath(Γ), r(p) = r(q) ∈
W }. The closure I(W ) of the ideal W is the closed ideal of the C ∗-algebra CK(Γ)
generated by the set W.
In this section we will use induction on V to prove that for a proper hereditary
subset W ⊂ V central elements from Z(CK(Γ)) ∩ I(W ) are of the form predicted
by the Theorem.
Given paths p, q ∈ P ath(Γ) we say q is a continuation of the path p if there exists
a path p′ ∈ P ath(Γ) such that q = pp′. In this case the path p is called a beginning
of the path q. We will often use the following well known fact: if p, q ∈ P ath(Γ),
p∗q 6= 0, then one of the paths p, q is a continuation of the other one.
Remark that if W is a hereditary subset of V and p, q ∈ Arr(W ), p 6= q, then
none of the paths p, q is a continuation of the other one.
For a path p ∈ P ath(Γ) we consider the idempotent ep = pp∗.
Lemma 1. Let W be a nonempty hereditary subset of V let a ∈ I(W ), let ǫ > 0.
Then the set {p ∈ Arr(W ) kepak ≥ ǫ} is finite.
CENTERS OF CUNTZ-KRIEGER C ∗-ALGEBRAS
5
Proof. The ideal I(W ) generated by the set W in the Leavitt path algebra L(Γ) is
pbp,qq∗, bp,q ∈ L(W ),
dense in I(W ). Choose an element b ∈ I(W ), b = Xp,q∈Arr(W )
such that ka − bk < ǫ. If p′ ∈ Arr(W ) is an arrival path in W that is different
from all the paths involved in the decomposition of the element b then p′∗b = 0 and
ep′b = 0.
Now
kep′ak = kep′(a − b)k ≤ kep′kka − bk < ǫ,
which proves the Lemma.
(cid:3)
Lemma 2. Let a ∈ CK(Γ), v ∈ V, a ∈ vCK(Γ)v; p ∈ P ath(Γ), r(p) = v. Then
kpap∗k = kak.
Proof. We have
kpap∗k ≤ kpk · kak · kp∗k = kak.
On the other hand, a = p∗(pap∗)p,
kak ≤ kp∗k · kpap∗k · kpk = kpap∗k,
which proves the Lemma.
(cid:3)
Lemma 3. Let W be a nonempty hereditary subset of V let z ∈ Z(CK(Γ) ∩ I(W ).
For an arbitrary vertex w ∈ W if wz 6= 0 then the set {p ∈ Arr(W ) r(p) = w} is
finite.
Proof. Let p ∈ Arr(W ), r(p) = w, zw 6= 0. We have epz = pp∗z = pzp∗ =
p(wzw)p∗. By Lemma 2 kepzk = kwzk > 0. Now it remains to refer to Lemma
1.
(cid:3)
where C runs over finitary N E-cycles of Γ.
pzp∗ z ∈ Z(C)},
Let eZ denote the sum of all subspaces Ce(W ), where W runs over nonempty
finitary hereditary subsets of V, and all subspaces { Xp∈Arr(C)
Our aim is to show that Z(CK(Γ)) = eZ.
Let's use induction on the number of vertices. In other words, let's assume that
for a graph with < V vertices the assertion of the Theorem is true.
Lemma 4. Let W be a proper hereditary subset of V. Then Z(CK(Γ) ∩ I(W ) ⊆ eZ.
6
ADEL ALAHMADI AND HAMED ALSULAMI
Proof. Let 0 6= z ∈ Z(CK(Γ) ∩ I(W ). Consider the element z0 = z(Xw∈W
Z(CK(W )). If z0 = 0 then zW = (0), zI(W ) = (0), z2 = 0, which contradicts
semiprimeness of CK(Γ) ( see [BPRS],[BHRS]).
w) ∈
By the induction assumption there exist disjoint hereditary finitary ( in W )
cycles C1, · · · , Cr and hereditary finitary (again in W ) subsets W1, · · · , Wk ⊂ W
such that
z0 =
rXi=1
αi Xp∈ArrW (Ci)
paip∗+
kXj=1
βj Xq∈ArrW (Wj )
qq∗ ; αi, βj ∈ C, ai ∈ Z(Ci).
The notations ArrW (Ci), ArrW (Wj ) are used to stress that arrival paths are
considered in the graph (W, E(W, W )).
The fact that the hereditary finitary subsets V (Ci), Wj can be assumed disjoint
follows from the description of the Boolean algebra of finitary hereditary subsets in
[AA2].
If αi 6= 0 then for arbitrary vertex w ∈ V (Ci) we have z0w = zw 6= 0. Hence by
Lemma 3 there are only finitely many paths p ∈ Arr(W ) such that r(p) = w. Hence
V (Ci) is a finitary subset of V. Similarly, if βj 6= 0 then Wj is a finitary subset in
V.
βje(Wj) ∈ Z(CK(Γ)).
w) = (0), (z −z′)I(W ) =
Consider the central element
z′ =
αi Xp∈Arr(Ci)
rXi=1
w) = z0 = z(Xw∈W
kXj=1
paip∗ +
w). Hence, (z −z′)(Xw∈W
We have z′(Xw∈W
(0), (z − z′)2 = 0. Again by semiprimeness of CK(Γ) we conclude that z = z′, which
proves the Lemma.
(cid:3)
3. Proof of the Theorem
Definition 5. A vertex v ∈ V is called a sink if s−1(v) = ∅.
Definition 6. A hereditary subset W ⊂ V is called saturated if for an arbitrary
non-sink vertex v ∈ V the inclusion r(s−1(v)) ⊆ W implies v ∈ W.
Definition 7. If W is hereditary subset then we define the saturation of W to be the
smallest saturated hereditary subsetcW that contains W. In this case I(W ) = I(cW ).
CENTERS OF CUNTZ-KRIEGER C ∗-ALGEBRAS
7
Definition 8. If W is a hereditary saturated subset of V then the graph Γ/W =
(V \ W, E(V, V \ W )) is called the factor graph of Γ modulo W.
We have CK(Γ)/I(W ) ∼= CK(Γ/W ) ( see[T1] ). In [AAP], [T2] it was proved
that the following 3 statements are equivalent:
1) the Cuntz-Krieger C ∗-algebra CK(Γ) is simple,
2) the Leavitt path algebra L(Γ) is simple,
3) (i) V does not have proper hereditary saturated subsets, (ii) every cycle
has an exit.
We call a graph satisfying the condition 3) simple.
The following lemma is well known. Still we prove it for the sake of completeness.
Lemma 5. Let Γ be a graph such that V does not have proper hereditary subsets.
Then Γ is either simple or a cycle.
Proof. If Γ is not simple then Γ contains a N E-cycle C. The set of vertices V (C)
is hereditary subset of V. In view of our assumption V (C) = V, which proves the
Lemma.
(cid:3)
Let U = {α ∈ C α = 1} be the unit circle in C. Let E ′ be a subset of the set E
of edges. For an arbitrary α ∈ U the mapping gE ′(α) such that gE ′(α) : v 7→ v, v ∈
V ; gE ′(α) : e 7→ αe, e∗ 7→ αe, e ∈ E ′; gE ′(α) : e 7→ e, e∗ 7→ e∗, e ∈ E \ E ′, extends
to an automorphism gE ′(α) of the C ∗-algebra CK(Γ). Denote GE ′ = {gE ′(α), α ∈
U} ≤ Aut(CK(Γ)). The group GE is called the gauge group of the C ∗-algebra
CK(Γ). An ideal of CK(Γ) is called gauge invariant if it is invariant with respect
to the group GE.
In [BPRS], [BHRS] it is proved that a nonzero closed gauge invariant ideal of
CK(Γ) has a nonempty intersection with V.
Lemma 6. Let the graph Γ be a cycle, Γ = (V, E), V = {v1, · · · , vd}, E = {e1, · · · , ed},
s(ei) = vi for 1 ≤ i ≤ d; r(ei) = vi+1 for 1 ≤ i ≤ d − 1, r(ed) = v1. Then the central
elements from Z(CK(Γ)) that are fixed by all gE(α), α ∈ U, are scalars.
Proof. The center of CK(Γ) is isomorphic to the algebra of continuous function T =
{f : U → C}, the corresponding action of GE on T is (gE(α)f )(u) = f (αdu).Now,
if f (u) = f (αdu) for all α, u ∈ U then f is a constant function, which proves the
Lemma.
(cid:3)
8
ADEL ALAHMADI AND HAMED ALSULAMI
Lemma 7. Let W be a hereditary saturated subset of V such that Γ/W is a cycle,
E(V \W, W ) 6= ∅, Γ/W = {v1, · · · , vd}. Then dXi=1
viCK(Γ)vi!∩Z(CK(Γ)) = (0).
Proof. Consider the set
W ′ = {w ∈ W E(V \ W, W )CK(Γ)w = (0)}.
The set W ′ is hereditary and saturated. Moreover, dXi=1
viCK(Γ)vi!∩I(W ′) = (0).
Indeed, we only need to notice that if p ∈ P ath(Γ), s(p) = vi and r(p) ∈ W ′ then
p = 0. Let p = e1 · · · en, ei ∈ E. At least one edge ej, 1 ≤ j ≤ n, lies in E(V \W, W ).
This implies the claim. Factoring out I(W ′) we can assume that W ′ = ∅.
viCK(Γ)vi! ∩ Z(CK(Γ)). For an arbitrary edge e ∈ E(V \
Let 0 6= z ∈ dXi=1
W, W ) we have ze = ez. Hence ze = zer(e) = ezr(e) = 0. Consider the ideal
J = {a ∈ CK(Γ) E(V \ W, W )CK(Γ)a = aCK(Γ)E(V \ W, W ) = (0)}
of the algebra CK(Γ). The element z lies in J. The ideal J is gauge invariant. Hence
by [BPRS], [BHRS] J ∩ V 6= ∅. A vertex vi, 1 ≤ i ≤ d, can not lie in J because
viCK(Γ)E(V \ W, W ) 6= (0). On the other hand J ∩ W ⊆ W ′ = ∅, a contradiction,
which proves the Lemma.
(cid:3)
Lemma 8. Let W be a hereditary saturated subset of V such that Γ/W is a cycle
and E(V \ W, W ) 6= ∅. Then Z(CK(Γ)) ⊆ C · 1CK(Γ) + I(W ).
Proof. As in the Lemma 7 we assume that V \ W = {v1, · · · , vd}, E ′ = E \
E(V, W ) = {e1, · · · , ed}; s(ei) = vi, 1 ≤ i ≤ d, r(ei) = vi+1 for 1 ≤ i ≤ d − 1,
r(ed) = v1. Consider the action of the group GE ′ on CK(Γ). Let z ∈ Z(CK(Γ)),
dXi=1
vizvi, b = Xw∈W
z = a + b, a =
wzw. Since every element from GE ′ fixes CK(W )
dXi=1
it follows that g(b) = b for all g ∈ GE ′. Now g(z) = g(a) + b, g(z) − z = g(a) − a ∈
viCK(Γ)vi! ∩ Z(CK(Γ)) = (0) by Lemma 7. we proved that an arbitrary
element of Z(CK(Γ)) is fixed by GE ′ . The ideal I(W ) is invariant with respect to
GE ′. Hence the group GE ′ acts on CK(Γ)/I(W ) ∼= CK(Γ/W ) as the full gauge
group of automorphisms. The image of the central element z in Z(CK(Γ/W ))
is fixed by GΓ/W . Hence by Lemma 6 it is scalar. This finishes the proof of the
Lemma.
(cid:3)
CENTERS OF CUNTZ-KRIEGER C ∗-ALGEBRAS
9
Proof of Theorem 1. If V does not contain proper hereditary subsets then by Lemma
5 Γ is either simple or a cycle. If the C ∗-algebra CK(Γ) is simple then Z(CK(Γ)) =
C · 1 ( see [D] ) and the assertion of the Theorem is clearly true.
If C is a cycle then Z(CK(Γ)) ∼= T and the assertion of the Theorem is again
true.
Let now W be a maximal proper hereditary subset of V. The saturation cW is
equal to V or the set W is saturated. In the first case CK(Γ) = I(W ) and it suffices
to refer to Lemma 4. Suppose now that the set W is saturated. The graph Γ/W
does not have proper hereditary subsets. Again by Lemma 5 the graph Γ/W is
either simple or a cycle. If Γ/W is simple then Z(CK(Γ/W )) = C · 1, which implies
Z(CK(Γ) ⊆ C · 1 + I(W ), which together with Lemma 4 implies the Theorem. If
Γ/W is a cycle then by Lemma 8 we again have Z(CK(Γ) ⊆ C · 1 + I(W ) and the
Theorem follows.
(cid:3)
Acknowledgement
This project was funded by the Deanship of Scientific Research (DSR), King
Abdulaziz University, under Grant No. (27-130-36-HiCi). The authors, therefore,
acknowledge technical and financial support of KAU.
References
[A] G. Abrams, Leavitt path algebras: the first decade, Bull. Math. Sci. (2015) 5:59 -- 120.
[AAP] G. Abrams, G. Aranda Pino, The Leavitt path algebra of a graph, J. Algebra 293 (2005),
319-334.
[AMP] P. Ara, M.A.Moreno, E.Pardo, Nonstable k-theory for graph algebras, Algebra Represent.
Theory 10 (2007), 157-178.
[AA1] A. Alahmadi, H. Alsulami, Completions of Leavitt path algebras, to appear in the Bull. Math.
Sciences.
[AA2] A. Alahmadi, H. Alsulami, Centers of Leavitt path algebras and their completions,
arXiv:1507.07439 [math.RA].
[BPRS] T. Bates, D. Pask, I. Raeburn, W. Szymanski, C ∗-algebras of row-finie graphs, New York J.
Math. 6( 2000), 307-324.
[BHRS] T. Bates, J.H.Hong, I. Raeburn, W. Szymanski, The ideal structure of C ∗-algebras of ifinite
graphs, Illinois J. Math. 46( 2002), 1159-1176.
[C] J. Cuntz, Simple C ∗-algebras generated by isometries, Comm. Math. Phys. 57(1977), 173-185.
[CGBMGSMSH] M.G. Corrales Garcia,D.M.Barquero, C. Martin Gonzalez, M.Siles Molina, J.F.
Solanilla Hernandez, Centers of path algebras, Cohn and Leavitt path algebras, Bull. Malay.
Math. Sci. So. DOI 10.1007/s4084001502141
[D] J. Dixmier, C ∗-algebras, North-Holland, 1977.
10
ADEL ALAHMADI AND HAMED ALSULAMI
[T1] M. Tomforde, Structure of graph C*-algebras and generalizations, Chapter in the book"Graph
Algebras: Bridging the Gap between Algebra and Analysis", Servicio de Publications de la
Universidas de Malaga, Malaga, Spain, 2006
[T2] M. Tomforde,, Uniqueness theorems and ideal structure for Leavitt path algebras, J. Algebra
318 (2007), 270-299.
Department of Mathematics, Faculty of Science, King Abdulaziz University, P.O.Box
80203, Jeddah, 21589, Saudi Arabia
E-mail address: [email protected]
Department of Mathematics, Faculty of Science, King Abdulaziz University, P.O.Box
80203, Jeddah, 21589, Saudi Arabia
E-mail address: [email protected]
|
1101.4415 | 1 | 1101 | 2011-01-23T23:21:28 | On some embedding of recursively presented Lie algebras | [
"math.RA"
] | In this paper we prove that every recursively presented Lie algebra over a field which is a finite extention of its simple subfield can be embedded in a recursively presented Lie algebra defined by relations which are equalities of (nonassociative) words of generators and a+b=c, where a,b,c are generators. | math.RA | math |
On some embedding of recursively presented Lie algebras
E.Chibrikov
1
Introduction
In 1961 G.Higman [7] proved an important Embedding Theorem which states that every recursively
presented group can be embedded in a finitely presented group. Recall that a group (or an algebra) is
called recursively presented if it can be given by a finite set of generators and a recursively enumerable
set of defining relations. If a group (or an algebra) can be given by finite sets of generators and defining
relations it is called finitely presented. As a corollary to this theorem G.Higman proved the existence of
a universal finitely presented group containing every finitely presented group as a subgroup. In fact, its
finitely generated subgroups are exactly the finitely generated recursively presented groups.
In [2] V.Ya.Belyaev proved an analog of Higman's theorem for associative algebras over a field which is
a finite extention of its simple subfield. The proof was based on his theorem stating that every recursively
presented associative algebra over a field as above can be embedded in a recursively presented associative
algebra with defining relations which are equalities of words of generators and α + β = γ, where α, β, γ
are generators. This result allowed Belyaev to apply V.Murskii analog of Higman's theorem [10] for
semigroups to obtain a Higman embedding for associative algebras. In recent paper [1] Y.Bahturin and
A.Olshanskii showed that such embedding can be performed distortion-free. The idea of transition from
algebras to semigroups was also used by G.P.Kukin in [8] (see also [5]).
This paper appears as a byproduct of the author's joint attemps with Prof. Y.Bahturin to prove Lie
algebra analog of Higman's Theorem. In particular, Y.Bahturin suggested to prove that any recursively
presented Lie algebra can be embedded in a Lie algebra given by Lie relations of the type mentioned
above. In this paper we show that this is indeed true. Namely, every recursively presented Lie algebra
over a field which is a finite extention of its simple subfield can be embedded in a recursively presented
Lie algebra defined by relations which are equalities of (nonassociative) words of generators and α+β = γ
(α, β, γ are generators). To prove this embedding we use Grobner-Shirshov basis theory for Lie algebras.
A short review of this theory as well as some properties of Lyndon-Shirshov words including a new proof
of Kukin's Lemma (see [5], Lemma 2.11.15) are given in the section 2. Note that an existence of Higman's
embedding for Lie algebras is still an open problem (see [9]). It is worth to mention a result by L.A.Bokut
[3] that for every recursively enumerable set M of positive integers, the Lie algebra
LM = Lie < a, b, c [abnc] = 0, n ∈ M >,
where [abnc] = [[. . . [[ab]b] . . . b]c], can be embedded into a finitely presented Lie algebra.
1
This paper was written when the author was a postdoctoral fellow at Memorial University of New-
foundland, supported by a PDF grant by Atlantic Association for Research in Mathematical Sciences as
well as Discovery grants of Drs. Y.Bahturin, M.Kotchetov and M.Parmenter. It gives me a pleasure to
thank them for the support and encouragement.
2
Some definitions and results
Let X = {xii ∈ I} be a linearly ordered set, k be a field and Liek(X) be the free Lie algebra over k
generated by X. Define hXi to be the free monoid of all associative words in X (including the empty
word 1). We use two linear orderings of hXi:
(i) (lexicographical order) u < 1 for every nonempty word u, and, by induction, u < v if u = xiu′,
v = xj v′ and either xi < xj or xi = xj and u′ < v′;
(ii) (deg-lex order) u ≺ v if u < v, or u = v and u < v, where w denotes the length of w.
We regard Liek(X) as the subspace of the free associative algebra khXi which is generated as an alge-
bra by X under the Lie bracketing [xy] = xy − yx. Given f ∈ khXi, denote by ¯f the maximal associative
word of f under the ordering (ii); f is a monic if f = ¯f +P αivi, where αi ∈ k, vi ∈ hXi and vi ≺ ¯f .
Definition 2.1 ([13], see also [15], [11]) An associative word w is an associative Lyndon -- Shirshov word
if, for arbitrary nonempty u and v such that w = uv, we have w > vu.
We will use the following properties of associative Lyndon-Shirshov words (see [13], [15] [4], [5], [12]):
(1) if w is an associative Lyndon-Shirshov word, then an arbitrary proper prefix of w cannot be
a suffix of w;
(2) if w = uv is an associative Lyndon-Shirshov word, where u, v 6= 1, then w > v;
(3) if u, v are associative Lyndon-Shirshov words and u > v, then uv is also an associative
Lyndon-Shirshov word;
(4) an arbitrary associative word w can be uniquely represented as
where c1, . . . , cn are associative Lyndon-Shirshov words and c1 ≤ c2 ≤ . . . ≤ cn.
w = c1c2 . . . cn,
Definition 2.2 A nonassociative word [u] is a Lyndon-Shirshov word if
(1) u is an associative Lyndon-Shirshov word;
(2) if [u] = [[u1][u2]], then [u1] and [u2] are Lyndon-Shirshov words (from (1) it then follows that
u1 > u2);
(3) if [u] = [[[u11][u12]][u2]], then u12 ≤ u2.
Put [x] = x for x ∈ X and put by induction [w] = [[u][v]] for an associative Lyndon-Shirshov word
w, where v is the longest proper associative Lyndon-Shirshov end of w (then u is also an associative
2
Lyndon-Shirshov word). Then [w] is a (nonassociative) Lyndon-Shirshov word. The main property of
[w] is
[w] = w.
It was shown in [13], [6] (see also [15] [5], [12]) that the set of all Lyndon-Shirshov words in the al-
phabet X forms a linear basis of Liek(X). This implies that if f ∈ Liek(X) then ¯f is an associative
Lyndon-Shirshov word.
Lemma (Shirshov [13], see also [15]) Suppose that w = aub, where w, u are associative Lyndon-
Shirshov words. Then a pair of related brackets in the nonassociative Lyndon-Shirshov word [w] is given
by [uc], i.e.
[w] = [a[uc]d],
where [uc] is a nonassociative Lyndon-Shirshov word and b = cd. Represent c in the form
c = c1c2 . . . ck,
where c1 ≤ c2 ≤ . . . ≤ ck are associative Lyndon-Shirshov words. Then replacing [uc] by [. . . [[u][c1]] . . . [ck]]
we obtain the word [w]u such that
[w]u = w.
The word [w]u is called the special bracketing or the special Shirshov bracketing of w relative to u.
We provide some additional information about bracketings in nonassociative Lyndon-Shirshov words.
Lemma 2.1 Take some associative word w represented as
w = c1c2 . . . cn,
where c1 ≤ c2 ≤ . . . ≤ cn are associative Lyndon-Shirshov words and an associative Lyndon-Shirshov
word v which is a subword of w. Then v is a subword (possibly not proper) of one of the words c1,
c2,. . .,cn.
Proof. Assume that v is not a subword of any of the words c1, . . . , cn. Then
v = c′′
i ci+1 . . . c′
t
for some 1 ≤ i < t ≤ n, where ci = c′
ct = c′
associative Lyndon-Shirshov words implies that c′′
property 2 also yields v > c′
t.
i , ct = c′
ic′′
t. Since a proper prefix is bigger than the word v, we have v < c′′
i and ct ≤ c′
i ≤ ci. Since ci ≤ . . . ≤ ct it follows that v < c′
tc′′
t and c′′
i 6= 1, c′
t 6= 1. It is possible that ci = c′′
i and/or
t. Property 2 of
t, but
3
Corollary 2.1 Suppose that w = aub, where w and u are associative Lyndon-Shirshov words. Then
a pair of related brackets in the nonassociative Lyndon-Shirshov word [w] is given by [uc], i.e.
where [uc] is a nonassociative Lyndon-Shirshov word and b = cd. Represent c in the form
[w] = [a[uc]d],
c = c1c2 . . . ck,
where c1 ≤ c2 ≤ . . . ≤ ck are associative Lyndon-Shirshov words. Then [uc] = [u[c1][c2] . . . [ck]], that is
[w] = [a[u[c1] . . . [ck]]d].
Proof. Shirshov's Lemma implies that [w] = [a[uc]d], where b = cd (possibly c = 1). Represent
the word c as c = c1c2 . . . ck, where c1 ≤ c2 ≤ . . . ≤ ck are associative Lyndon-Shirshov words. Let us
consider the Lyndon-Shirshov word [uc] = [uc1c2 . . . ck]. By applying Shirshov's Lemma and Lemma 2.1
to the words c1, c2,. . . ,ck we deduce that [uc] = [u[c1][c2] . . . [ck]].
The following Lemma is a generalization of the Shirshov Lemma and for the first time was noticed by
G.Kukin (see [5], Lemma 2.11.15). To prove this Lemma we use a different approach.
Lemma 2.2 (Kukin) Suppose that w = aubvd, where w, u, v are associative Lyndon-Shirshov words.
Then there is some bracketing
in the word w such that
[w]u,v = [a[u]b[v]d]
[w]u,v = w.
Proof. Shirshov's Lemma implies that [w] = [a[uc]p], where [uc] is a nonassociative Lyndon-Shirshov
word and cp = bvd. If v is a subword of p, then [w] = [a[uc]q[vs]l] by the Shirshov Lemma, where [vs] is a
Lyndon-Shirshov word and p = qvsl. Write c = c1c2 . . . cn and s = s1s2 . . . sm, where c1 ≤ c2 ≤ . . . ≤ cn
and s1 ≤ s2 ≤ . . . ≤ sm are associative Lyndon-Shirshov words. Then we define
where
and
[w]u,v = [a [[u][c1] . . . [cn]] q [[v][s1] . . . [sm]] l],
[[u][c1] . . . [cn]] = [. . . [[u][c1]] . . . [cn]]
[[v][s1] . . . [sm]] = [. . . [[v][s1]] . . . [sm]]
are Shirshov's special bracketings in the words uc and vs relative to u and v respectively (see Shirshov's
Lemma). Therefore, we get
[w]u,v = w.
4
Assume now that the word v is not a subword of p. Shirshov's Lemma implies that [w] = [aub[vs]q],
where [vs] is a nonassociative Lyndon-Shirshov word and sq = d. Therefore, [vs] is a nonassociative
subword of [uc], hence v is a subword of c.
Represent the word c as c = c1c2 . . . cn, where c1 ≤ c2 ≤ . . . ≤ cn are associative Lyndon-Shirshov
words. By Lemma 2.1 we deduce that v is a subword of ct for some t. If v = ct, then we define
[w]u,v = [w]u = [a [[u] [c1] . . . [ct] . . . [cn]] p],
i.e. [w]u,v is the special bracketing in w relative to u. It is obvious that
[w]u,v = w.
Now, we suppose that v is a proper subword of ct. Corollary 2.1 gives us the equality:
[w] = [a [u [c1] . . . [ct] . . . [cn] ] p].
t and c′′
Consequently, vs is a subword of ct, that is ct = c′
s1 ≤ s2 ≤ . . . ≤ sm are associative Lyndon-Shirshov words. Then we define
t for some c′
tvsc′′
t . Write s = s1s2 . . . sm, where
[w]u,v = [a [[u] [c1] . . . [ct]v . . . [cn]] p],
t [[v][s1] . . . [sm]] c′′
where [ct]v = [c′
t ] is the Shirshov special bracketing in ct relative to v. The word [w]u,v
results from [[u] [c1] . . . [ct] . . . [cn]], which is the Shirshov special bracketing in uc1 . . . ct . . . cn relative to
u, by replacing [ct] by [ct]v. It is clear that
[w]u,v = w.
Remark 2.1 It is not difficult to see that Lemma 2.2 can be easily generalized to an arbitrary number
of associative Lyndon-Shirshov subwords of w.
Let f be a monic Lie polynomial such that ¯f = h is a subword of w, i.e. w = u ¯f v. Denote by [uf v]f
the Lie polynomial obtained from [uhv]h by replacing [h] by f . The polynomial [uf v]f has the property
[uf v]f = w.
Definition 2.3 Take monic Lie polynomials f and g and a word w such that w = ¯f u = v¯g, where
u, v ∈ hXi and ¯f + ¯g > w. The intersection composition of f and g relative to w is defined by
(f, g)w = [f u]f − [vg]g.
Definition 2.4 Take monic Lie polynomials f and g and a word w such that w = ¯f = u¯gv, where
u, v ∈ hXi. The inclusion composition of f and g relative to w is defined by
(f, g)w = f − [ugv]g.
5
The main properties of compositions are: (f, g)w ∈ Id(f, g) and (f, g)w ≺ w.
Definition 2.5 ([3]) Given a set S of monic Lie polynomials, the composition (f, g)w of f and g is called
trivial relative to S if (f, g)w = Pi αi[uisivi]si, where αi ∈ k, ui, vi ∈ hXi, si ∈ S and ui¯sivi ≺ w.
Definition 2.6 Let S be a set of monic Lie polynomials. Then S is a Grobner-Shirshov basis if every
composition of any two elements of S is trivial relative to S.
Remark 2.2 If f ∈ Liek(X), then ¯f is an associative Lyndon-Shirshov word and by property 1 of
associative Lyndon-Shirshov words, there is no composition (f, f )w for any w ∈ hXi. Therefore, S = {f }
is a Grobner-Shirshov basis for every f ∈ Liek(X).
A Lyndon-Shirshov word [w] is called S-reduced if w 6= u¯sv for any s ∈ S and u, v ∈ hXi. A set Y is
called well-ordered if any chain of elements w1 > . . . > wk > . . . of hY i is stabilized. An important result
is Shirshov's Composition Lemma. We recall it as stated in [3]:
Composition Lemma Let X be a well-ordered set. If S is a Grobner-Shirshov basis and f ∈ Id(S),
then ¯f = u¯sv for some s ∈ S and u, v ∈ hXi.
It has an important corollary:
Composition-Diamond Lemma Suppose that X is a well-ordered set. Then S is a Grobner-
Shirshov basis if and only if the set of all Lyndon-Shirshov S-reduced words is a linear basis for Liek(X)/Id(S) =
Liek(XS).
Let f and g be elements of Liek(X). In some applications the following question appears:
which conditions on f and g give rise to the equality
where Id(h) denotes the ideal of Liek(X) generated by h?
As a corollary to Kukin's Lemma we obtain the following sufficient condition for the equality (1) to
Id(f )\ Id(g) = Id(f ) · Id(g),
(1)
hold.
Proposition 2.1 If there is a linear order of X such that there are no compositions (f, g)w and (g, f )w
for any w ∈ hXi, then Id(f )T Id(g) = Id(f ) · Id(g).
Proof. If h ∈ Id(f )T Id(g), then
h = Xi
αi[aif bi] = Xj
βj[cjgdj],
6
where αi, βj ∈ k and [...] are some bracketings. The Composition-Diamond Lemma (see also Remark 2.2)
and the hypotheses of the proposition imply that the maximal associative word of the polynomial h is
Let us consider
¯h = u1 ¯f u2¯gu3.
h − [u1f u2gu3]f,g,
where [u1f u2gu3]f,g is obtained from [u1 ¯f u2¯gu3] ¯f ,¯g by replacing ¯[f ] and ¯[g] by f and g respectively.
Lemma 2.2 implies that
Since
and
[u1f u2gu3]f,g = ¯h.
h − [u1f u2gu3]f,g ∈ Id(f )\ Id(g)
h − [u1f u2gu3]f,g < ¯h,
the claim of the proposition follows by induction.
3 Definition of the Functions ni(j) and s(i, j)
The idea of these functions belongs to V.Ya.Belyaev. We introduce them slightly modified.
Suppose that φ(i, j) is a recursive function. We define two functions
ni(j) : N × N → N and s(i, j) : N × N → N
as follow:
Let i > j and n2(1) be a natural number which is greater than or equal to max{2, φ(2, 1).}. Then we
define ni(j) as an arbitrary natural number such that ni(j) ≥ max{ni(j − 1) + 1, φ(i, j)} for j ≥ 2 and
ni(1) ≥ max{ni−1(i − 2) + 1, φ(i, 1)} for j = 1. For i ≤ j we set ni(j) = nj+1(i).
Let i < j. We define s(i, j) = s(j, i) = nj(i).
It is not difficult to notice that the functions satisfy the following properties:
ni(j) ≥ i for ∀j and s(i, j) ≥ φ(i, j).
4 Encoding of Addition and Multiplication
Now, let X = {x, y, z}, k be a field which is a finite extension of its simple subfield and let Liek(X) be
the free Lie algebra over k generated by X. If w = [..[[x1, x2], x3], . . . , xn] is a left-normed word, we will
write w =(cid:2)(cid:2)(cid:2)x1x2 . . . xn(cid:3)(cid:3)(cid:3)l. Denote by I the ideal of Liek(X) generated by the following relations:
(cid:2)(cid:2)(cid:2)xyiz(cid:3)(cid:3)(cid:3)l +(cid:2)(cid:2)(cid:2)xyjz(cid:3)(cid:3)(cid:3)l −(cid:2)(cid:2)(cid:2)xyφ(i,j)z(cid:3)(cid:3)(cid:3)l, i > j; i, j = 1, 2, . . .
(2)
7
(cid:2)(cid:2)(cid:2)(cid:2)xyiz(cid:3)(cid:3)(cid:3)l,(cid:2)(cid:2)(cid:2)xyjz(cid:3)(cid:3)(cid:3)l(cid:3) −(cid:2)(cid:2)(cid:2)xyψ(i,j)z(cid:3)(cid:3)(cid:3)l, i > j; i, j = 1, 2, . . .
δt(cid:2)(cid:2)(cid:2)xyiz(cid:3)(cid:3)(cid:3)l −(cid:2)(cid:2)(cid:2)xyj z(cid:3)(cid:3)(cid:3)l, (i, j) ∈ D1,
(cid:2)(cid:2)(cid:2)xyiz(cid:3)(cid:3)(cid:3)l −(cid:2)(cid:2)(cid:2)xyjz(cid:3)(cid:3)(cid:3)l, (i, j) ∈ D2,
where φ, ψ are recursive functions, D1, D2 are recursively denumerable sets, δt (t = 1, 2, . . . , n) are
generators of the field k.
Let X1 = X S{u, α, β, γ} and Liek(X1) be the free Lie algebra over the field k generated by X1.
Denote by I1 the ideal of Liek(X1) generated by the relations:
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(cid:2)(cid:2)(cid:2)xyiz(cid:3)(cid:3)(cid:3)l −(cid:2)(cid:2)(cid:2)xuni(j)ǫijz(cid:3)(cid:3)(cid:3)l; i, j = 1, 2, . . . ; ǫij = (cid:26) α,
β,
i + j is even ,
i + j is odd ,
(cid:2)(cid:2)(cid:2)xyφ(i,j)z(cid:3)(cid:3)(cid:3)l −(cid:2)(cid:2)(cid:2)xus(i,j)γz(cid:3)(cid:3)(cid:3)l, i 6= j; i, j = 1, 2, . . .
α + β − γ,
(cid:2)(cid:2)(cid:2)(cid:2)xyiz(cid:3)(cid:3)(cid:3)l,(cid:2)(cid:2)(cid:2)xyjz(cid:3)(cid:3)(cid:3)l(cid:3) −(cid:2)(cid:2)(cid:2)xyψ(i,j)z(cid:3)(cid:3)(cid:3)l, i > j; i, j = 1, 2, . . .
δt(cid:2)(cid:2)(cid:2)xyiz(cid:3)(cid:3)(cid:3)l −(cid:2)(cid:2)(cid:2)xyj z(cid:3)(cid:3)(cid:3)l, (i, j) ∈ D1,
(cid:2)(cid:2)(cid:2)xyiz(cid:3)(cid:3)(cid:3)l −(cid:2)(cid:2)(cid:2)xyjz(cid:3)(cid:3)(cid:3)l, (i, j) ∈ D2,
where φ, ψ are the recursive functions, D1, D2 are the recursively denumerable sets, δt (t = 1, 2, . . . , n)
are the generators of the field k and ni(j), s(i, j) are functions defined in 1.1 relative to φ.
Lemma 4.1 I ⊆ I1.
Proof. It suffices to show that the relation (2) belogns to I1. Let i < j, then in Liek(X1)/I1 we have
(cid:2)(cid:2)(cid:2)xyiz(cid:3)(cid:3)(cid:3)l +(cid:2)(cid:2)(cid:2)xyjz(cid:3)(cid:3)(cid:3)l =(cid:2)(cid:2)(cid:2)xuni(j−1)ǫi(j−1)z(cid:3)(cid:3)(cid:3)l +(cid:2)(cid:2)(cid:2)xunj (i)ǫijz(cid:3)(cid:3)(cid:3)l.
Since ni(j − 1) = nj(i) we obtain that
(cid:2)(cid:2)(cid:2)xyiz(cid:3)(cid:3)(cid:3)l +(cid:2)(cid:2)(cid:2)xyjz(cid:3)(cid:3)(cid:3)l =(cid:2)(cid:2)(cid:2)xus(i,j)(ǫi(j−1) + ǫij)z(cid:3)(cid:3)(cid:3)l =(cid:2)(cid:2)(cid:2)xus(i,j)(α + β)z(cid:3)(cid:3)(cid:3)l =(cid:2)(cid:2)(cid:2)xus(i,j)γz(cid:3)(cid:3)(cid:3)l =(cid:2)(cid:2)(cid:2)xyφ(i,j)z(cid:3)(cid:3)(cid:3)l.
Thus, the relation (cid:2)(cid:2)(cid:2)xyiz(cid:3)(cid:3)(cid:3)l +(cid:2)(cid:2)(cid:2)xyjz(cid:3)(cid:3)(cid:3)l −(cid:2)(cid:2)(cid:2)xyφ(i,j)z(cid:3)(cid:3)(cid:3)l belogns to I1.
Let x > z > α > β > γ > u > y. Denote by R a set of relations the union of which and (2)-(5)
is closed with respect to the operation of composition, that is the union is a Grobner-Shirshov basis. It
follows from the definition of composition that R ⊆ I and the set R consists of Lie polynomials in(cid:2)(cid:2)(cid:2)xyiz(cid:3)(cid:3)(cid:3)l.
Lemma 4.2 The following set S forms a Grobner-Shirshov basis:
(cid:2)(cid:2)(cid:2)xuni(j)ǫijz(cid:3)(cid:3)(cid:3)l −(cid:2)(cid:2)(cid:2)xyiz(cid:3)(cid:3)(cid:3)l; i, j = 1, 2, . . . ; ǫij = (cid:26) α,
β,
i + j is even ,
i + j is odd ,
(12)
8
(cid:2)(cid:2)(cid:2)xus(i,j)γz(cid:3)(cid:3)(cid:3)l −(cid:2)(cid:2)(cid:2)xyφ(i,j)z(cid:3)(cid:3)(cid:3)l, i 6= j; i, j = 1, 2, . . .
α + β − γ,
(cid:2)(cid:2)(cid:2)xyiz(cid:3)(cid:3)(cid:3)l +(cid:2)(cid:2)(cid:2)xyjz(cid:3)(cid:3)(cid:3)l −(cid:2)(cid:2)(cid:2)xyφ(i,j)z(cid:3)(cid:3)(cid:3)l, i > j; i, j = 1, 2, . . .
(cid:2)(cid:2)(cid:2)(cid:2)xyiz(cid:3)(cid:3)(cid:3)l,(cid:2)(cid:2)(cid:2)xyjz(cid:3)(cid:3)(cid:3)l(cid:3) −(cid:2)(cid:2)(cid:2)xyψ(i,j)z(cid:3)(cid:3)(cid:3)l, i < j; i, j = 1, 2, . . .
δt(cid:2)(cid:2)(cid:2)xyiz(cid:3)(cid:3)(cid:3)l −(cid:2)(cid:2)(cid:2)xyj z(cid:3)(cid:3)(cid:3)l, (i, j) ∈ D1,
(cid:2)(cid:2)(cid:2)xyiz(cid:3)(cid:3)(cid:3)l −(cid:2)(cid:2)(cid:2)xyjz(cid:3)(cid:3)(cid:3)l, (i, j) ∈ D2,
R
(13)
(14)
(15)
(16)
(17)
(18)
(19)
where φ, ψ are the recursive functions, D1, D2 are the recursively denumerable sets, δt (t = 1, 2, . . . , n)
are the generators of the field k.
Proof. Note that all the words of the relations (12)-(19) are nonassociative Lyndon-Shirshov words.
Since ni(j) ≥ i for ∀j and s(i, j) ≥ φ(i, j), the leading words of the relations (12)-(14) contain α, β
or γ. Therefore, the relations (12)-(14) do not form compositions with the relations (15)-(19). Because
the relations (15)-(19) are closed under composition by the definition of R, we have only one composition
to verify that it is trivial, namely, the inclusion composition of (12) and (14).
Let f =(cid:2)(cid:2)(cid:2)xuni(j)αz(cid:3)(cid:3)(cid:3)l −(cid:2)(cid:2)(cid:2)xyiz(cid:3)(cid:3)(cid:3)l, where i + j is even , and g = α + β − γ. Then w = xuni(j)αz and
(f, g)w = f −(cid:2)(cid:2)(cid:2)xuni(j)(α + β − γ)z(cid:3)(cid:3)(cid:3)l = −(cid:2)(cid:2)(cid:2)xyiz(cid:3)(cid:3)(cid:3)l −(cid:2)(cid:2)(cid:2)xuni(j)βz(cid:3)(cid:3)(cid:3)l +(cid:2)(cid:2)(cid:2)xuni(j)γz(cid:3)(cid:3)(cid:3)l.
If i ≤ j, then ni(j) = nj+1(i) and
(f, g)w = −((cid:2)(cid:2)(cid:2)xunj+1(i)βz(cid:3)(cid:3)(cid:3)l−(cid:2)(cid:2)(cid:2)xyj+1z(cid:3)(cid:3)(cid:3)l)+((cid:2)(cid:2)(cid:2)xus(i,j+1)γz(cid:3)(cid:3)(cid:3)l−(cid:2)(cid:2)(cid:2)xyφ(i,j+1)z(cid:3)(cid:3)(cid:3)l)−((cid:2)(cid:2)(cid:2)xyiz(cid:3)(cid:3)(cid:3)l+(cid:2)(cid:2)(cid:2)xyj+1z(cid:3)(cid:3)(cid:3)l−(cid:2)(cid:2)(cid:2)xyφ(i,j+1)z(cid:3)(cid:3)(cid:3)l).
If i > j, then nj(i − 1) = ni(j) and
(f, g)w = −((cid:2)(cid:2)(cid:2)xunj (i−1)βz(cid:3)(cid:3)(cid:3)l −(cid:2)(cid:2)(cid:2)xyjz(cid:3)(cid:3)(cid:3)l) + ((cid:2)(cid:2)(cid:2)xus(i,j)γz(cid:3)(cid:3)(cid:3)l −(cid:2)(cid:2)(cid:2)xyφ(i,j)z(cid:3)(cid:3)(cid:3)l) − ((cid:2)(cid:2)(cid:2)xyiz(cid:3)(cid:3)(cid:3)l +(cid:2)(cid:2)(cid:2)xyjz(cid:3)(cid:3)(cid:3)l −(cid:2)(cid:2)(cid:2)xyφ(i,j)z(cid:3)(cid:3)(cid:3)l).
Therefore, (f, g)w is trivial relative to S.
Proposition 4.1 Liek(X)/I is embedded into Liek(X1)/I1.
Proof. It is sufficient to prove that Liek(X)T I1 = I. The inclusion I ⊆ Liek(X)T I1 follows from
Lemma 4.1. Suppose that f ∈ Liek(X)T I1. Composition Lemma for Lie algebras implies that in the free
f = asb for some words a, b ∈ hX1i and s ∈ S (recall that I1 = Id(S)). But
associative algebra khX1i
f ∈ Liek(X), hence, f ∈ hXi and, in particular, s ∈ hXi. Since the relations (12)-(14) contain α, β or γ
in their leading words, s is a relation of (15)-(19) and, therefore, s ∈ I. We have f − [asb]s ∈ Liek(X)T I1
and f − [asb]s < f . By performing the same calculations at some step we obtain that
f − [asb]s − [a1s1b1]s1 − ... − [akskbk]sk = 0,
where s, s1, ..., sk ∈ I and a, b, a1, b1, ..., ak, bk ∈ hXi. Thus, f ∈ I.
9
5 Proof of Embedding
Let Y = {a, b, c} with a > c > b and Liek(Y ) be the free Lie algebra generated by Y over a field k which
is a finite extention of its simple subfield. Note that the set of left-normed elements
T = {(cid:2)(cid:2)(cid:2)abic(cid:3)(cid:3)(cid:3)l i = 1, 2, 3, . . .}
generates a free Lie subalgebra and constitutes a set of free generators. Indeed, the words (cid:2)(cid:2)(cid:2)abic(cid:3)(cid:3)(cid:3)l are
Lyndon-Shirshov words and by ordering T as (cid:2)(cid:2)(cid:2)abic(cid:3)(cid:3)(cid:3)l > (cid:2)(cid:2)(cid:2)abjc(cid:3)(cid:3)(cid:3)l if and only if i < j, we obtain that every
nonassocitive Lyndon-Shirshov word in the alphabet T is also a Lyndon-Shirshov word in the alphabet
Y . It implies that Lyndon-Shirshov words in the alphabet T are linearly independent in Liek(Y ), thus,
T is a set of free generators.
Let L be a finitely generated Lie algebra over the field k with a recursively denumerable set of defining
relations. Then L can be represented as L = {a1, a2, a3, . . .}, where each element of L is repeated at least
twice. There exists an embedding Φ : L −→ Liek(Y )/J such that Φ(ai) = (cid:2)(cid:2)(cid:2)abic(cid:3)(cid:3)(cid:3)l and the ideal J of
Liek(Y ) is generated by the following relations:
(cid:2)(cid:2)(cid:2)abic(cid:3)(cid:3)(cid:3)l +(cid:2)(cid:2)(cid:2)abjc(cid:3)(cid:3)(cid:3)l −(cid:2)(cid:2)(cid:2)abφ(i,j)c(cid:3)(cid:3)(cid:3)l, i > j; i, j = 1, 2, . . .
(cid:2)(cid:2)(cid:2)(cid:2)abic(cid:3)(cid:3)(cid:3)l,(cid:2)(cid:2)(cid:2)abjc(cid:3)(cid:3)(cid:3)l(cid:3) −(cid:2)(cid:2)(cid:2)abψ(i,j)c(cid:3)(cid:3)(cid:3)l, i > j; i, j = 1, 2, . . .
δt(cid:2)(cid:2)(cid:2)abic(cid:3)(cid:3)(cid:3)l −(cid:2)(cid:2)(cid:2)abjc(cid:3)(cid:3)(cid:3)l, (i, j) ∈ D1,
(cid:2)(cid:2)(cid:2)abic(cid:3)(cid:3)(cid:3)l −(cid:2)(cid:2)(cid:2)abjc(cid:3)(cid:3)(cid:3)l, (i, j) ∈ D2,
(20)
(21)
(22)
(23)
where φ, ψ are recursive functions, D1, D2 are recursively denumerable sets, δt (t = 1, 2, . . . , n) are
generators of the field k.
Indeed, the Lie algebra Liek(T )/J ′, where J ′ is an ideal of Liek(T ) generated by (20)-(23), is iso-
morphic to L. We have to show that Liek(T )T J = J ′. The inclusion J ′ ⊆ Liek(T )T J is obvious. Let
f ∈ Liek(T )T J. By Composition Lemma we have f = asb, where a, b ∈ hY i and s is a composition
obtained from the relations (20)-(23). Since s is a Lie polynomial in (cid:2)(cid:2)(cid:2)abic(cid:3)(cid:3)(cid:3)l (hence, s ∈ J ′) and f ∈ khT i
we can write
f = abi1 c . . . abit c s abit+1 c . . . abik c.
Therefore,
f − [(cid:2)(cid:2)(cid:2)abi1 c(cid:3)(cid:3)(cid:3)l . . .(cid:2)(cid:2)(cid:2)abit c(cid:3)(cid:3)(cid:3)l s (cid:2)(cid:2)(cid:2)abit+1c(cid:3)(cid:3)(cid:3)l . . .(cid:2)(cid:2)(cid:2)abik c(cid:3)(cid:3)(cid:3)l]s ∈ Liek(T )\ J and
f − [(cid:2)(cid:2)(cid:2)abi1 c(cid:3)(cid:3)(cid:3)l . . .(cid:2)(cid:2)(cid:2)abitc(cid:3)(cid:3)(cid:3)l s (cid:2)(cid:2)(cid:2)abit+1 c(cid:3)(cid:3)(cid:3)l . . .(cid:2)(cid:2)(cid:2)abik c(cid:3)(cid:3)(cid:3)l]s < f ,
and the proof follows from the induction on the degree of f .
Now, Proposition 4.1 implies the following
Theorem 5.1 A recursively presented Lie algebra over a field which is a finite extention of its simple
subfield can be embedded into a recursively presented Lie algebra defined by relations which are equalities
of (nonassociative) words of generators and α + β − γ, where α, β, γ are generators.
10
References
[1] Y.Bahturin, A.Olshanskii Filtrations and distortions in infinite-dimensional algebras, J.Algebra,
to appear; doi:10.1016/j.jalgebra.2010.09.019.
[2] V.Ya.Belyaev Subrings of finitely presented associative rings, Algera i Logica, 17 (1978), 627-638.
[3] L.A.Bokut Unsolvability of the equality problem and subalgebras of finitely presented Lie algebras.
Math. USSR Izvestia 6 (1972), 1153 -- 1199.
[4] L.A.Bokut, P.S.Kolesnikov Grobner-Shirshov bases: from their incipiency to the present. Journal of
Mathematical Sciences, 116 (2003), 1, 2894 -- 2916.
[5] L.A.Bokut, G.P.Kukin Algorithmic and combinatorial algebra. Mathematics and its Applications,
Kluwer Academic Publishers Group, Dordrecht, (1994).
[6] K.T.Chen, R.H.Fox, R.C.Lyndon Free differential calculus.IV: The quotient groups of the lower
central series. Ann. Math. 68 (1958), 2, 81 -- 95.
[7] G.Higman Subgroups of finitely presented groups, Proc. Royal Soc. London (Series A), 262 (1961),
455-475.
[8] G.P.Kukin On the equality problem for Lie algebras, Sib. Mat. Zh., 18, No. 5, 1194-1197 (1977).
[9] O. G. Kharlampovich, M. V. Sapir Algorithmic problems in varieties, Inter. J.Algebra Compt., 5,
no.4, 5 (1995) 379 -- 602.
[10] V.L.Murskii Isomorphic embeddability of a semigroup with an enumerable set of defining relations
into a finitely presented semigroup, Mat.Zemetki, 1(2) (1967), 217-224.
[11] R.C.Lyndon On Burnside's problem I. Trans. Amer. Math. Soc. 77 (1954), 202 -- 215.
[12] C.Reutenauer Free Lie algebras. London Mathematical Society Monographs. New Series, 7. Oxford
Science Publications. The Clarendon Press, Oxford University Press, New York, (1993).
[13] A.I.Shirshov On free Lie rings. Mat. Sb., 45 (1958), 2, 113 -- 122.
[14] A.I.Shirshov Sertain algorithmic problems for Lie algebras. Sibirsk. Mat. Z. 3 (1962), 292 -- 296 (Trans-
lation in ACM SIGSAM Bull 33 (1999), 2, 3 -- 6).
[15] Selected works of A.I.Shirshov, Birkhauser, 2009.
11
|
1103.4721 | 1 | 1103 | 2011-03-24T10:33:03 | Automorphisms and derivations of Leibniz algebras | [
"math.RA"
] | The present work is devoted to the extension of some general properties of automorphisms and derivations which are known for Lie algebras to finite dimensional complex Leibniz algebras. The analogues of the Jordan-Chevalley decomposition for derivations and the multiplicative decomposition for automorphisms of finite dimensional complex Leibniz algebras are obtained. | math.RA | math |
AUTOMORPHISMS AND DERIVATIONS OF LEIBNIZ ALGEBRAS
M. LADRA, I. M. RIKHSIBOEV, AND R. M. TURDIBAEV
Abstract. The present work is devoted to the extension of some general properties of
automorphisms and derivations which are known for Lie algebras to finite dimensional
complex Leibniz algebras. The analogues of the Jordan-Chevalley decomposition for
derivations and the multiplicative decomposition for automorphisms of finite dimen-
sional complex Leibniz algebras are obtained.
1. Introduction
Leibniz algebras were first introduced by Loday in [10, 11] as a non-antisymmetric
version of Lie algebras. Many results of Lie algebras were also established in Leibniz
algebras. Since the study of the properties of derivations and automorphisms of Lie
algebra play an essential role in the theory of Lie algebras, the question naturally arises
whether the corresponding results can be extended to the more general framework of
the Leibniz algebras.
In this work we consider some general properties of derivations and automorphisms of
Leibniz algebras. We extend some results obtained for derivations and automorphisms
of Lie algebras in [4, 7] to the case of Leibniz algebras. Among them we prove the ana-
logue of the Jordan-Chevalley decomposition, which expresses a derivation of a Leibniz
algebra as the sum of its commuting semisimple and nilpotent parts. Similar results
were established in [4] and [6] for Lie algebras. If the linear operator is invertible, then
the Jordan–Chevalley decomposition expresses it as a product of commuting semisimple
and unipotent operators. Gantmacher [4], in the theory of Lie algebras, proved that any
automorphism of Lie algebras decomposes into the product of commuting semisimple
automorphism and exponent of a nilpotent derivation. In this work we verify that the
same results hold in Leibniz algebras.
In 1955, Jacobson [7] proved that every Lie algebra over a field of characteristic zero
admitting a nonsingular derivation is nilpotent. The problem whether the converse
of this statement is correct remained open until that an example of a nilpotent Lie
algebra in which every derivation is nilpotent (and hence, singular) was constructed in
[3]. Nilpotent Lie algebras with this property were named characteristically nilpotent
Lie algebras. In [9] it was proved that every irreducible component of the variety of
complex filiform Lie algebras of dimension greater than 7 contains a Zariski open set
consisting of characteristically nilpotent Lie algebras. Note that among the nilpotent
Lie algebras of dimension less than 7, characteristically nilpotent Lie algebras do not
occur due to the classification given in [5].
In this paper we prove that a finite dimensional complex Leibniz algebra admitting
a non-degenerate derivation is nilpotent. Similar to the Lie case, the inverse of this
statement does not hold. The notion of characteristically nilpotent Leibniz algebra is
2010 Mathematics Subject Classification. 17A32, 17A36, 17B40.
Key words and phrases. Leibniz algebra; Lie algebra; derivation; automorphism; nilpotent Leibniz
algebra.
1
2
M. LADRA, I. M. RIKHSIBOEV, AND R. M. TURDIBAEV
defined similarly as in the Lie case. It was established in [13] that characteristically
nilpotent non-Lie filiform Leibniz algebras occur starting with dimension 5.
An advance of Theorems 3.8 and 3.10 was presented in [14]. We also have found in
the literature the reference [2], where some results here proved are showed with another
techniques.
In the present paper, all vector spaces and algebras are considered over the field of
the complex numbers C. We will denote by C i
k the binomial coefficient (cid:0)k
i(cid:1).
2. Preliminaries
In this section we present some known notions and results concerning Leibniz algebras
that we use further in this work.
Definition 2.1. An algebra L over a field F is called a Leibniz algebra if for any
x, y, z ∈ L the Leibniz identity
is satisfied, where [−, −] is the multiplication in L.
[[x, y], z] = [[x, z], y] + [x, [y, z]]
In other words, the right multiplication operator [−, z] by any element z is a derivation
(see [10]).
Any Lie algebra is a Leibniz algebra, and conversely any Leibniz algebra L is a Lie
algebra if [x, x] = 0 for all x ∈ L. Moreover, if Lann = ideal < [x, x] x ∈ L >, then the
factor algebra L/Lann is a Lie algebra.
For a Leibniz algebra L consider the following derived and lower central series:
(i)
(ii)
L(1) = L,
L1 = L,
L(n+1) = [L(n), L(n)],
Ln+1 = [Ln, L],
n > 1;
n > 1.
Definition 2.2. An algebra L is called solvable (nilpotent) if there exists s ∈ N (k ∈ N,
respectively) such that L(s) = 0 (Lk = 0, respectively).
The following theorem from linear algebra characterizes the decomposition of a vector
space into a direct sum of characteristic subspaces.
Theorem 2.3 ([12]). Let A be a linear transformation of vector space V . Then V
decomposes into the direct sum of characteristic subspaces V = Vλ1 ⊕ Vλ2 ⊕ · · · ⊕ Vλk
with respect to A, where Vλi = {x ∈ V (A − λiI)k(x) = 0 for some k ∈ N} and
λi, 1 ≤ i ≤ k, are eigenvalues of A.
The following proposition gives the (additive) Jordan–Chevalley decomposition of an
endomorphism.
Proposition 2.4 ([6]). Let V be a finite dimensional vector space over C, x ∈ End(V ).
(i) There exist unique xd, xn ∈ End(V ) satisfying the conditions: x = xd + xn, xd
is diagonalizable, xn is nilpotent, xd and xn commute.
(ii) There exist polynomials p(t), q(t) ∈ C[t], without constant term, such that xd =
p(x), xn = q(x). In particular, xd and xn commute with any endomorphism
commuting with x.
(iii) If A ⊆ B ⊆ V are subspaces and x maps B in A, then xd and xn also map B
in A.
In Leibniz algebras a derivation is defined as usual.
AUTOMORPHISMS AND DERIVATIONS OF LEIBNIZ ALGEBRAS
3
Definition 2.5. A linear operator d : L → L is called a derivation of L if
d([x, y]) = [d(x), y] + [x, d(y)]
for any x, y ∈ L.
For an arbitrary element x ∈ L, we consider the right multiplication operator
Rx : L → L defined by Rx(z) = [z, x]. Right multiplication operators are derivations
of the algebra L. The set R(L) = {Rx x ∈ L} is a Lie algebra with respect to the
commutator and the following identity holds:
RxRy − RyRx = R[y,x] .
(2.1)
Definition 2.6 ([8]). A subset S of an associative algebra A over a field F is called
weakly closed if for every pair (a, b) ∈ S × S an element γ(a, b) ∈ F is defined such that
ab + γ(a, b) ba ∈ S.
Further, we need a result concerning the weakly closed sets.
Theorem 2.7 ([8]). Let S be a weakly closed subset of the associative algebra A of
linear transformations of a finite-dimensional vector space V over F . Assume every
W ∈ S is nilpotent, that is, W k = 0 for some positive integer k. Then the enveloping
associative algebra S ∗ of S is nilpotent.
The classical Engel's theorem from Lie algebras has the following analogue in Leibniz
algebras.
Theorem 2.8 ([1], Engel's theorem). A Leibniz algebra L is nilpotent if and only if Rx
is nilpotent for any x ∈ L.
Definition 2.9. The set AnnR(L) = {x ∈ L [L, x] = 0} of a Leibniz algebra L is called
the right annihilator of L.
One can show that AnnR(L) is an ideal of L.
For a Leibniz algebra L, let H be a maximal solvable ideal in the sense that H
contains any solvable ideal of L. Since the sum of solvable ideals is again a solvable
ideal (see [1]), this implies the existence of a unique maximal solvable ideal, which is
said to be the radical of L.
Similarly, let K be a maximal nilpotent ideal of Leibniz algebra L. Since the sum
of nilpotent ideals is a nilpotent ideal (see [1]), this implies the existence of a unique
maximal nilpotent ideal, which is said to be the nilradical of L. Notice that, the
nilradical does not possess the properties of the radical in the sense of Kurosh.
3. Main Result
This section is devoted to the extension of known results for Lie algebras on auto-
morphisms and derivations to Leibniz algebras.
Lemma 3.1. Let L be a finite dimensional Leibniz algebra with a derivation d defined
on it and L = Lρ1 ⊕ · · · ⊕ Lρs be a decomposition of L into characteristic spaces with
respect to d. Then for any α, β ∈ Spec(d) we have
[Lα, Lβ] ⊆(cid:26) Lα+β
0
if α + β is an eigenvalue of d
if α + β is not an eigenvalue of d .
Proof. First observe that (d − (α + β)I)([x, y]) = [d(x), y] + [x, d(y)] − (α + β)[x, y] =
[(d − αI)(x), y] + [x, (d − βI)(y)]. Now assume that
(d − (α + β)I)k([x, y]) =
k
Xi=0
C i
k[(d − αI)i(x), (d − βI)k−i(y)]
(3.1)
4
M. LADRA, I. M. RIKHSIBOEV, AND R. M. TURDIBAEV
for some k > 1. Then
(d − (α + β)I)k+1([x, y]) = (d − (α + β)I) k
Xi=0
Xi=0
k[(d − αI)i+1(x), (d − βI)k−i(y)] +
Xi=0
C i
=
k
k
C i
k[(d − αI)i(x), (d − βI)k−i(y)]!
C i
k[(d − αI)i(x), (d − βI)k−i+1(y)]
= [(d − αI)k+1(x), (y)] +
C i
k[(d − αI)i+1(x), (d − βI)k+1−(i+1)(y)]
k−1
Xi=0
C i
k[(d − αI)i(x), (d − βI)k+1−i(y)] + [x, (d − βI)k+1(y)]
+
k
Xi=1
k
Xi=1
Xi=1
k
= [(d−αI)k+1(x), y]+
(C i−1
k +C i
k)[(d−αI)i(x), (d−βI)k+1−i(y)]+[x, (d−βI)k+1(y)]
= [(d − αI)k+1(x), y] +
C i
k+1[(d − αI)i(x), (d − βI)k+1−i(y)] + [x, (d − βI)k+1(y)]
=
k+1
Xi=0
C i
k+1[(d − αI)i(x), (d − βI)k+1−i(y)] .
Hence (3.1) holds for any k ∈ N.
Consider x ∈ Lα, y ∈ Lβ. Then there exist natural numbers p, q such that (d −
αI)p(x) = 0 and (d − βI)q(y) = 0. In (3.1) taking k = p + q we have that (cid:0)d − (α +
β)I(cid:1)k([x, y]) = 0 which completes the proof of the statement of the lemma.
Let d be a derivation of a Leibniz algebra L. From the definition of derivation
it is straightforward that ker d is a subalgebra. Moreover, by Lemma 3.1 we have
[L0, L0] ⊆ L0 and hence L0 is also a subalgebra of L.
(cid:3)
The following theorem is a generalization of the analogous result in the theory of Lie
algebras established in [4].
Theorem 3.2. Let D be a derivation of a Leibniz algebra L. Then there exists a unique
diagonalizable derivation D0 and a unique nilpotent derivation T such that D = D0 + T
and D0T = T D0.
Proof. Let L = Lρ1 ⊕ · · · ⊕ Lρs be a decomposition of L into characteristic spaces with
respect to d. Let us define a linear operator D0 : L → L as D0(x) = ρix for x ∈ Lρi.
Then D0 is obviously diagonalizable and D0D = DD0.
Now we show that D0 is a derivation of L.
By Lemma 3.1 if x ∈ Lρi, y ∈ Lρj we obtain [x, y] ∈ Lρi+ρj if ρi + ρj is an eigenvalue
and [x, y] = 0 otherwise. If ρi + ρj is an eigenvalue of D, then we obtain
D0([x, y]) = (ρi + ρj)[x, y] ,
[D0(x), y] + [x, D0(y)] = [ρix, y] + [x, ρjy] = (ρi + ρj)[x, y] .
So D0([x, y]) = [D0(x), y] + [x, D0(y)].
If ρi + ρj is not an eigenvalue, then [x, y] = 0 and again we obtain D0([x, y]) = 0 and
[D0(x), y] + [x, D0(y)] = (ρi + ρj)[x, y] = 0. Hence, D0 is a derivation.
AUTOMORPHISMS AND DERIVATIONS OF LEIBNIZ ALGEBRAS
5
Now denote by T = D − D0. Obviously, T is a derivation of L and T is nilpotent.
Moreover, T commutes with D0.
The uniqueness of such decomposition follows from Proposition 2.4.
(cid:3)
In order to obtain a similar result for automorphisms of Leibniz algebras we need the
following lemma.
Lemma 3.3. Let P be a nilpotent transformation of Leibniz algebra L such that P + I
is an automorphism. Then
P k([x, y]) =
k
Xi=0
i
Xj=0
for all k ∈ N.
C i
kC j
i [P k−j(x), P k−i+j(y)]
(3.2)
Proof. Let us denote Q = P + I. Since Q is an automorphism we obtain
P ([x, y]) = (Q − I)([x, y]) = [Q(x), Q(y)] − [x, y]
= [Q(x) − x, Q(y) − y] + [Q(x) − x, y] + [x, Q(y) − y]
= [P (x), P (y)] + ([P (x), y] + [x, P (y)]) =
C i
1C j
i [P 1−j(x), P 1−i+j(y)] .
1
Xi=0
i
Xj=0
Now assume that (3.2) holds for some natural k > 1. Then
P k+1([x, y]) =
k
i
=
C i
k
C j
k
Xi=0
i
Xj=0
Consider
C i
kC j
Xj=0
i P ([P k−j(x), P k−i+j(y)])
Xi=0
i (cid:0)[P k−j+1(x), P k−i+j+1(y)] + [P k−j+1(x), P k−i+j(y)] + [P k−j(x), P k−i+j+1(y)](cid:1) .
C j
i [P k−j+1(x), P k−i+j(y)] +
i
Xj=0
i
Xj=0
C j
i [P k−j(x), P k−i+j+1(y)]
= C 0
i [P k+1(x), P k−i(y)] +
i [P k+1−j(x), P k−i+j(y)]
+ C j−1
i
i [P k−i(x), P k+1(y)]
i
Xj=1(cid:0)C j
[P k+1−j(x), P k−i+j(y)](cid:1) + C i
(cid:1) [P k+1−j(x), P k+1−(i+1)+j(y)] + C i+1
i+1[P k+1(x), P k+1−(i+1)(y)]
= C 0
+
i
Xj=1(cid:0)C j
i + C j−1
i
Using the fact C j
i + C j−1
i = C j
i+1 we obtain
i+1 [P k+1−(i+1)(x), P k+1(y)] .
C j
i [P k−j+1(x), P k−i+j(y)] +
i
Xj=0
i
Xj=0
C j
i [P k−j(x), P k−i+j+1(y)]
=
i+1
Xj=0
C j
i+1[P k+1−j(x), P k+1−(i+1)+j(y)] .
6
Now
M. LADRA, I. M. RIKHSIBOEV, AND R. M. TURDIBAEV
P k+1([x, y]) =
k
Xi=0
i
C i
Xj=0
Xi=0
+
k
i+1
Xj=0
kC j
i [P k−j+1(x), P k−i+j+1(y)]
C i
kC j
i+1[P k+1−j(x), P k+1−(i+1)+j(y)]
k−1
Xi=0
i+1
Xj=0
= [P k+1(x), P k+1(y)] +
C i+1
k C j
i+1[P k−j+1(x), P k+1−(i+1)+j(y)]
+
k−1
Xi=0
i+1
Xj=0
C i
kC j
i+1[P k+1−j(x), P k+1−(i+1)+j(y)] +
C j
k+1[P k+1−j(x), P j(y)]
k+1
Xj=0
= [P k+1(x), P k+1(y)] +
k + C i
i+1[P k−j+1(x), P k+1−(i+1)+j(y)]
k−1
Xi=0
i+1
Xj=0(cid:0)C i+1
k(cid:1) C j
C j
k+1[P k+1−j(x), P j(y)] = [P k+1(x), P k+1(y)]
+
k+1
Xj=0
+
k−1
Xi=0
i+1
Xj=0
C i+1
k+1C j
i+1[P k−j+1(x), P k+1−(i+1)+j(y)] +
C j
k+1[P k+1−j(x), P j(y)]
k+1
Xj=0
= [P k+1(x), P k+1(y)] +
C i
k+1C j
i [P k−j+1(x), P k+1−i+j(y)]
k
Xi=1
i
Xj=0
+
k+1
Xj=0
C j
k+1[P k+1−j(x), P j(y)] =
k+1
Xi=0
i
Xj=0
C i
k+1C j
i [P k−j+1(x), P k+1−i+j(y)] .
Thus, (3.2) is proved.
(cid:3)
The next lemma presents the similar result for automorphisms of Leibniz algebras
as Lemma 3.1 does for derivations. Notice that, it also generalizes the result for Lie
algebras given in [4].
Lemma 3.4. Let L be a finite dimensional Leibniz algebra and L = Lρ1 ⊕ · · · ⊕ Lρs
be a decomposition of L into characteristic spaces with respect to an automorphism A.
Then for any α, β ∈ Spec(A) we have
[Lα, Lβ] ⊆(cid:26) Lαβ
0
if αβ is an eigenvalue of A
if αβ is not an eigenvalue of A .
Proof. First observe that
(A − αβI)([x, y]) = [A(x), A(y)] − αβ[x, y]
= [(A − αI)(x), (A − βI)(y)] + [(A − αI)(x), βy] + [αx, (A − βI)(y)] .
Similarly to the proof of Lemma 3.3 one can establish by induction
(A − αβI)k([x, y]) =
k
Xj=0
j
Xi=0
αiβj−iC j
kC i
j[(A − αI)k−i(x), (A − βI)k−j+i(y)] .
(3.3)
AUTOMORPHISMS AND DERIVATIONS OF LEIBNIZ ALGEBRAS
7
Now let x ∈ Lα and y ∈ Lβ. Then there exist natural numbers p, q such that
In (3.3) taking k = p + q we have that
(cid:3)
(A − αI)p(x) = 0 and (A − βI)q(y) = 0.
(A − αβI)k([x, y]) = 0 which completes the proof of the lemma.
Below, we establish a technical lemma and a corollary in order to obtain a similar
result to Theorem 3.2 for automorphisms of Leibniz algebra.
Lemma 3.5. For any polynomial P of degree less than n, where n ∈ N, the following
equality holds:
(−1)iC i
nP (i) = 0 .
n
Xi=0
Proof. Since deg P (x) < n, applying Lagrange interpolation formula to the points
qk(x)P (k), where qk(x) =
1
=
(−1)n−1 · (−1)kC k
n .
n−1
xk = k, 0 ≤ k ≤ n − 1 we obtain P (x) =
Xk=0
x(x − 1) · · ·(cid:0)x − (k − 1)(cid:1) ·(cid:0)x − (k + 1)(cid:1) · · ·(cid:0)x − (n − 1)(cid:1)
k(k − 1) · · · 1 · (−1)(−2) · · ·(cid:0) − (n − 1 − k)(cid:1)
n(n − 1) · · ·(cid:0)n − (k − 1)(cid:1) ·(cid:0)n − (k + 1)(cid:1) · · ·(cid:0)n − (n − 1)(cid:1)
k(k − 1) · · · 1 · (−1)(−2) · · ·(cid:0) − (n − 1 − k)(cid:1)
qk(n) =
Now
n!
.
=
(−1)n−1−kk!(n − k)!
Thus P (n) =
qk(n)P (k) =
1
(−1)n−1
(−1)kC k
n · P (k).
n−1
n−1
Xk=0
Xk=0
n−1
Xk=0
n
Xi=0
Hence, 0 =
(−1)kC k
n · P (k) + (−1)nC n
n P (n) =
(−1)iC i
nP (i).
(cid:3)
Corollary 3.6. Let n, m be non-negative integers such that n < m. Then
n
Xi=0
(−1)i
m − i
C i
nC n
m−i =(cid:26) 1
m
0
if n = 0
otherwise .
Proof. Let n > 1 and consider the polynomial
P (x) =
1
n!
(m − 1 − x)(m − 2 − x) · · · (m − (n − 1) − x) =
1
m − x
· C n
m−x
of degree n − 1.
By Lemma 3.5 we obtain
0 =
(−1)iC i
nP (i) =
n
Xi=0
(−1)i
m − i
C i
nC n
m−i .
n
Xi=0
For n = 0, 1, simple calculations verify the statement of the corollary.
(cid:3)
The following result shows that the analogous one established for Lie algebras [4] is
also valid for Leibniz algebras.
Theorem 3.7. Let A be an automorphism of a Leibniz algebra. Then there exists a
unique diagonalizable automorphism A0 and a unique nilpotent derivation T such that
A = A0 exp(T ) and A0T = T A0.
8
M. LADRA, I. M. RIKHSIBOEV, AND R. M. TURDIBAEV
Proof. Let L = Lρ1 ⊕ · · · ⊕ Lρs be a decomposition of a Leibniz algebra L into charac-
teristic spaces with respect to A.
Let us define a linear operator A0 : L → L as A0(x) = ρix for x ∈ Lρi. Then
A0 is obviously diagonalizable and A0A = AA0. Notice that if x ∈ Lρi, y ∈ Lρj
then [A0(x), A0(y)]) = ρiρj[x, y] and by Lemma 3.4 we have [x, y] ∈ Lρiρj . Therefore,
A0([x, y]) = ρiρj[x, y], which implies that A0 is an automorphism.
Let us denote by Q = A−1
0 A. Then A = A0Q and A0Q = QA0. Also note that
Spec(Q) = {1}.
Consider P = Q − I. Obviously, P is nilpotent and hence log Q = log(I + P ) =
P − 1
2P 2 + · · · + (−1)n−1
n P n + · · · diverges.
Since P is nilpotent, log Q is also a nilpotent transformation. We will prove that
log(I + P ) is a derivation, i.e.,
∞
Xk=1
(−1)k−1
k
P k([x, y]) =h ∞
Xk=1
(−1)k−1
k
P k(x), yi +hx,
∞
Xk=1
(−1)k−1
k
P k(y)i .
(3.4)
By Lemma 3.3, formula (3.4) is valid for P . Putting C i
k = C k−i
k
and substituting
r = k − i, we obtain P k([x, y]) =
k
Xr=0
k−r
Xj=0
C r
kC j
k−r[P k−j(x), P r+j(y)].
Now denote by Bk,r =
C r
kC j
k−r[P k−j(x), P j+r(y)] for all 0 ≤ r ≤ k.
k−r
Xj=0
Then P k([x, y]) = Bk,0 + Bk,1 + · · · + Bk,k.
Therefore,
(−1)k−1
k
P k([x, y]) =
∞
Xk=1
(−1)k−1
k
∞
Xk=1
(Bk,0 + Bk,1 + · · · + Bk,k)
B2m+1,0 −
2m + 1
1
2m
B2m,1 + · · · +
(−1)m
m + 1
B2m,0 −
1
2m − 1
B2m−1,1 + · · · +
(−1)m
m
∞
∞
=
−
2m
Xm=0 1
Xm=1 1
Xm=0 m
Xt=0
Xm=0 m
Xt=0
=
∞
∞
=
Bm+1,m!
Bm,m!
B2m−t,t!
(−1)t
2m + 1 − t
2m + 1 − t
2m+1−2t
(−1)t
B2m+1−t,t! −
Xj=0
Xm=1 m
Xt=0
(−1)t
2m − t
Xj=0
2m+1−tC j
2m−2t
C t
∞
−
∞
(−1)t
2m − t
Xm=1 m
Xt=0
2m+1−2t[P 2m+1−t−j(x), P j+t(y)]!
C t
2m−tC j
2m−2t[P 2m−t−j(x), P j+t(y)]!
AUTOMORPHISMS AND DERIVATIONS OF LEIBNIZ ALGEBRAS
9
=
∞
Xm=0 1
2m + 1
[P 2m+1(x), y] +
· [P 2m+1−s(x), P s(y)] +
+
2m−1
Xs=1 s
Xt=0
(−1)t
2m − t
C t
2m+1−2t!
1
2m
C t
2m+1−tC s−t
(−1)t
2m + 1 − t
Xs=1 s
Xt=0
[x, P 2m+1(y)](cid:19) −
Xm=1(cid:18) 1
2m−2t![P 2m−s(x), P s(y)] +
2m−tC s−t
2m
∞
2m + 1
[P 2m(x), y]
1
2m
[x, P 2m(y)]! .
Now since C t
2m+1−tC s−t
2m+1−2t = C t
sC s
2m+1−t and C t
2m−tC s−t
2m−2t = C t
sC s
2m−t we obtain
s
Xt=0
(−1)t
2m + 1 − t
C t
2m+1−tC s−t
2m+1−2t =
(−1)t
2m − t
C t
2m−tC s−t
2m−2t =
s
Xt=0
(−1)t
2m + 1 − t
C t
sC s
2m+1−t ,
(−1)t
2m − t
C t
sC s
2m−t .
s
s
Xt=0
Xt=0
However, by Corollary 3.6 the last sums are zero for all 1 ≤ s ≤ 2m (1 ≤ s ≤ 2m − 1,
respectively). Hence,
(−1)k−1
k
∞
Xk=1
P k([x, y]) =
(−1)n−1
n
∞
Xn=1
([P n(x), y] + [x, P n(y)])
= [
∞
Xn=1
(−1)n−1
n
P n(x), y] + [x,
(−1)n−1
n
P n(y)]
∞
Xn=1
and (3.4) is proved.
Thus, T = log Q is a nilpotent derivation of L and A = A0 exp(T ), A0T = T A0. Now
since exp(T ) − I is nilpotent, we obtain the additive Jordan–Chevalley decomposition
A = A0 + A0(exp(T ) − I) of A. Therefore, by Proposition 2.4 A0, and as consequence
T , are determined uniquely.
(cid:3)
The following theorems generalize the results from the theory of Lie algebras [7] to
Leibniz algebras.
Theorem 3.8. Let L be a finite-dimensional complex Leibniz algebra which admits a
non-degenerated derivation. Then L is a nilpotent algebra.
Proof. Let d be a non-singular derivation of a Leibniz algebra L and L = Lρ1 ⊕ Lρ2 ⊕
· · · ⊕ Lρk be a decomposition of L into characteristic spaces with respect to d.
Let α, β ∈ Spec(d). Then by Lemma 3.1 we have [. . . [[Lα, Lβ], Lβ], . . . , Lβ]
⊆ Lα+kβ.
k−times
{z
}
Since for sufficiently large k ∈ N we have α + kβ 6∈ Spec(d), and by Lemma 3.1 we
obtain [. . . [[Lα, Lβ], Lβ], . . . , Lβ] = 0.
nilpotent.
Thus, for x ∈ Lβ any right multiplication operator Rx is nilpotent, and due to the
i=1 R(Lρi) is
fact that α, β were taken arbitrarily, it follows that every operator fromSk
Now from identity (2.1) and Lemma 3.1 it follows thatSk
i=1 R(Lρi) is a weakly closed
set of an associative algebra R(L). Hence, by Theorem 2.7 it follows that every operator
from R(L) is nilpotent.
Now by Theorem 2.8 we obtain the result, i.e., L is nilpotent.
(cid:3)
10
M. LADRA, I. M. RIKHSIBOEV, AND R. M. TURDIBAEV
Remark 3.9. The following family L(β) = he1, . . . , eni of characteristically nilpotent
Leibniz algebras, i.e. algebras in which every derivation is nilpotent, with the following
multiplication
[e0, e0] = e2,
[e0, e1] = α3e3 + α4e4 + · · · + αn−1en−1 + θen ,
[ei, e1] = α3ei+2 + α4ei+3 + · · · + αn+1−ien
[ei, e0] = ei+1
(1 ≤ i ≤ n − 1) ,
(1 ≤ i ≤ n − 2) ,
where (α3, . . . , αn, θ ∈ C) and αiαj 6= 0 for some 3 ≤ i 6= j ≤ n, was constructed in
[13]. This implies that the statement of Theorem 3.8 in the opposite direction does not
hold.
Theorem 3.10. Let L be a finite dimensional complex Leibniz such that it admits an
automorphism of prime order with no fixed-points. Then L is a nilpotent algebra.
Proof. Let A be an automorphism of Leibniz algebra L with the properties given in the
statement of the theorem. Since A has no fixed points then 1 is not an eigenvalue of A.
Let L = Lρ1 ⊕ Lρ2 ⊕ · · · ⊕ Lρk be a decomposition of L into characteristic spaces with
respect to A. From the condition that A is an automorphism of prime order we obtain
that the spectrum of A consists of primitive p−th roots of the unity. Therefore, for any
α, β ∈ Spec(A) there exists k ∈ N such that αβk = 1 6∈ Spec(A). Hence, by Lemma 3.4
we obtain
[. . . [[Lα, Lβ], Lβ], . . . , Lβ]
⊆ Lαβk = 0 .
k−times
{z
}
Thus, for x ∈ Lβ any right multiplication operator Rx is nilpotent, and similarly as
(cid:3)
in the proof of Theorem 3.8 we obtain that L is nilpotent.
Let D be a derivation of a Leibniz algebra L such that D commutes with any in-
ner derivation. Then D(L) ⊆ AnnR(L).
Indeed, since D commutes with any right
multiplication operator we have [D(x), y] = (Ry ◦ D)(x) = (D ◦ Ry)(x) = D([x, y]) =
[D(x), y] + [x, D(y)] which implies [x, D(y)] = 0 for any x, y ∈ L. Thus, [L, D(L)] = 0
and D(L) ⊆ AnnR(L).
Lemma 3.11. Let J be an ideal of Leibniz algebra L and D be a derivation given on
L. Then J + D(J) is also an ideal of L.
Proof. Since for any x ∈ J, y ∈ L we have
[y, D(x)] = D([x, y]) − [D(x), y] ∈ D([J, L]) + [J, L] ⊆ D(J) + J ,
and so [L, D(J)] ⊆ D(J) + J. Therefore, [L, J + D(J)] ⊆ J + D(J).
Similarly, since for any x ∈ J, y ∈ L we have
[D(x), y] = D([x, y]) − [x, D(y)] ∈ D([J, L]) + [J, L] ⊆ D(J) + J ,
and so [D(J), L] ⊆ D(J) + J. Therefore, [J + D(J), L] ⊆ J + D(J). This implies that
J + D(J) is an ideal of L.
(cid:3)
Theorem 3.12. Let J be the solvable radical of a Leibniz algebra L and D be a deriva-
tion. Then D(J) ⊆ J.
Proof. By Lemma 3.11 it follows that J + D(J) is an ideal of Leibniz algebra L. We
have
(J + D(J))(2) = [J + D(J), J + D(J)] ⊆ J + [D(J), D(J)] ⊆ J + D2(J (2)) .
AUTOMORPHISMS AND DERIVATIONS OF LEIBNIZ ALGEBRAS
11
Now assume that
for some natural k > 1.
Then
(J + D(J))(k) ⊆ J + D2k−1
(J (k))
(3.5)
(J + D(J))(k+1) = [(J + D(J))(k), (J + D(J))(k)]
⊆ [J + D2k−1
(J (k)), J + D2k−1
(J (k))] ⊆ J + [D2k−1
(J (k)), D2k−1
(J (k))]
⊆ J + D2k−1+2k−1
([J (k), J (k)]) = J + D2k
(J (k+1)) .
Hence, (3.5) is verified.
Let J (m) = 0. Then (J + D(J))(m) ⊆ J + D2m−1
(J (m)) = J. Now (J + D(J))(2m−1) =
(cid:0)(J + D(J))(m)(cid:1)(m)
⊆ J (m) = 0.
Hence, J + D(J) is a solvable ideal of Leibniz algebra L. Since J is the solvable
(cid:3)
radical of L, it follows that J + D(J) ⊆ J and therefore, D(J) ⊆ J.
Remark 3.13. In Theorem 3.12 if J is the nilradical, analogous arguments establish the
invariance of J with respect to any derivation of L.
It is not difficult to verify that a derivation in a Leibniz algebra induces a derivation
in the corresponding Lie quotient algebra. However, the following example shows that
the inverse is not necessarily true, i.e., not every derivation in the Lie quotient algebra
can be extended to a derivation of the Leibniz algebra.
Example 3.14. Consider a Leibniz algebra L = he1, . . . , em, f1, . . . , fmi with the following
multiplication
[ei, ei] = fi, 1 ≤ i ≤ m
[e1, ei] = fi, 1 ≤ i ≤ m .
Then Lann = hf1, . . . , fmi and L/Lann is an abelian Lie algebra. Therefore, any linear
operator in L/Lann is a derivation.
Now consider an arbitrary derivation d : L → L.
Since [ep, e1] = 0 for p > 1, we have that 0 = d([ep, e1]) = [d(ep), e1] + [ep, d(e1)].
If d(ep) = d1pe1 +· · ·+dmpem +c1pf1 +· · ·+cmpfm then [d(ep), e1] = d1p[e1, e1] = d1pf1.
Now if d(e1) = d11e1 + · · · + dm1em + c11f1 + · · · + cm1fm then [ep, d(e1)] = dp1[ep, ep] =
dp1fp. Hence we obtain a condition d1pf1 + dp1fp = 0 which implies d1p = dp1 = 0 for
all 2 ≤ p ≤ m. Therefore, not every derivation of L/Lann can be extended to L.
Acknowledgments
The first author was supported by MICINN grant MTM 2009-14464-C02 (European
FEDER support included) and by Xunta de Galicia grant Incite 09207215 PR.
References
[1] Sh.A. Ayupov, B.A. Omirov, On Leibniz algebras. Algebra and operator theory, Proceedings of
the Colloquium in Tashkent 1997. Kluwer Academic Publishers. 1998, p. 1–12.
[2] L. Bosko, J.T. Hird, A. Mcalister, N. Schwartz, K. Stagg, Jacobson's refinement of Engel's theorem
for Leibniz algebras, arXiv:1101.2438v1, 2001.
[3] J. Dixmier, W.G. Lister, Derivations of nilpotent Lie algebras, Proc. Amer. Math. Soc. 8 (1957),
155–158.
[4] F. Gantmacher, Canonical representation of automorphisms of a complex semi-simple Lie group,
Rec. Math. (Moscou) 5(47) (1939), 101–146.
12
M. LADRA, I. M. RIKHSIBOEV, AND R. M. TURDIBAEV
[5] M. Goze, Yu.B. Khakimdjanov, Nilpotent Lie algebras. Mathematics and its Applications 361,
Kluwer Academic Publishers, Dordrecht, 1996.
[6] J.E. Humphreys, Introduction to Lie algebras and representation theory, GTM Vol. 9, Springer-
Verlag, New York-Berlin, 1972.
[7] N. Jacobson, A note on automorphisms and derivations of Lie algebras, Proc. Amer. Math. Soc.
6 (1955), 281–283.
[8] N. Jacobson, Lie algebras, Interscience Publishers, John Wiley & Sons, New York-London 1962.
[9] Yu.B. Khakimdjanov, Characteristically nilpotent Lie algebras, Math. USSR Sbornik 70 (1) 1991,
65–78.
[10] J.-L. Loday, Cyclic homology, Grundl. Math. Wiss. Bd. 301, Springer-Verlag, Berlin, 1992.
[11] J.-L. Loday, Une version non commutative des alg`ebres de Lie: les alg`ebres de Leibniz, Enseign.
Math. (2) 39 (1993), 269–293.
[12] A.I. Mal'cev, Foundations of linear algebra, W. H. Freeman & Co., San Francisco, Calif.-London
1963.
[13] B.A. Omirov, On derivations of filiform Leibniz algebras, Math. Notes 77 (5-6) (2005), 677–685.
[14] I.M. Rikhsiboev, On the nilpotence of complex Leibniz algebras (Russian), Uzbek. Mat. Zh. 2,
2005, 58-62.
Manuel Ladra: Department of Algebra, University of Santiago de Compostela, 15782 San-
tiago de Compostela, Spain
[email protected]
Ikrom Rikhsiboev: Malaysian Institute of Industrial Technology (MITEC), University
Kuala Lumpur (UniKL), 81750 Masai, Johor Darul Takzim, Malaysia
[email protected]
Rustam Turdibaev: Department of Mathematics, National University of Uzbekistan, Vuz-
gorogok, 27, 100174 Tashkent, Uzbekistan
[email protected]
|
1605.01970 | 1 | 1605 | 2016-05-05T10:32:50 | Pseudo Principal Pivot Transform: The Group Inverse Case | [
"math.RA"
] | In this short note, we prove a formula for the group inverse of a block matrix and consider the pseudo principal pivot transform expressed in terms of group inverses. Extensions of the usual principal pivot transform, where the usual inverse is replaced by the Moore-Penrose inverse, were considered in the literature. The objective here is to derive the corresponding formulae for the group generalized inverse. These are expected to be useful in our future work. | math.RA | math | Pseudo Principal Pivot Transform: The Group Inverse Case
Kavita Bisht
Department of Mathematics
Indian Institute of Technology Madras
Chennai 600 036, India
and
K.C. Sivakumar
Department of Mathematics
Indian Institute of Technology Madras
Chennai 600 036, India.
Abstract
In this short note, we prove a formula for the group inverse of a block matrix and consider
the pseudo principal pivot transform expressed in terms of group inverses. Extensions of
the usual principal pivot transform, where the usual inverse is replaced by the Moore-
Penrose inverse, were considered in the literature. The objective here is to derive the
corresponding formulae for the group generalized inverse. These are expected to be useful
in our future work.
Keywords: Group inverse, pseudo Schur complement, pseudo principal pivot trans-
form.
6
1
0
2
y
a
M
5
]
.
A
R
h
t
a
m
[
1
v
0
7
9
1
0
.
5
0
6
1
:
v
i
X
r
a
1
Introduction and Preliminaries
Let A ∈ Cn×n. If there exists X ∈ Cn×n satisfying the equations AXA = A, XAX = X
and AX = XA, then such an X can be shown to be unique. This unique solution is
called the group inverse of A and is denoted by A#. The nomenclature group inverse
arises from the fact that the positive powers of A and A# together with the idempotent
matrix AA# as the identity element, form an abelian group under matrix multiplication
and was thus named by I.Erdelyi in 1967. The group inverse of a matrix A ∈ Cn×n need
not always exist. It is well known that A# exists if and only if R(A) ∩ N(A) = {0}. In
other words, A# exists if and only if the index of A equals 1. Let us recall that the index
of a square matrix A is the smallest positive integer k such that rank(Ak) = rank(Ak+1).
If A is invertible, then the index is defined to be zero. An easy dimensionality argument
can be used to show that the index exists for any square matrix. Thus, A# exists if and
only if rank(A) = rank(A2). For more details and other properties of the group inverse,
we refer to the book [1].
Let A, B, C and D ∈ Cn×n and M =
A B
C D
. Suppose that A−1 exists. Then
the matrix D − CA−1B is called the Schur complement of A in M. Next, let D−1 exist.
Then the matrix A − BD−1C is called the associated Schur complement of D in M. The
usefulness of the Schur complement is well documented in numerous texts on matrices and
numerical analysis (see for instance, [7]). Let us turn our attention to the principal pivot
transform. Tucker introduced this notion in his studies on linear programming problems.
Let M be the block matrix, defined as above. Suppose that A−1 exists. Then the principal
pivot transform of M relative to A is defined by the matrix
A1
−A−1B
CA−1 D − CA−1B
.
Note that the bottom right block of the principal pivot transform is the Schur complement
of A in M, establishging a relationship between these notions. We refer to the recent work
[6] for some interesting properties of the principal pivot transform.
Extensions of the formulae for the Schur complement [3] and the principal pivot trans-
form [5], where the usual inverse is replaced by the Moore-Penrose inverse were studied
rather long ago. We refer to these as the pseudo Schur complement and pseudo princi-
2
pal pivot transform, respectively. In [2], some of the results of [6] and a few inheritance
properties were proved, for the pseudo Schur complement and the pseudo principal pivot
transform. In the present work, we consider the case of the group inverse, especially for
the pseudo principal pivot transform. First, we prove a formula for the group inverse of
a block matrix in the presence of some assumptions and then derive the basic properties
of the principal pivot transform.
2 The Pseudo Principal Pivot Transform in terms of
the Group Inverse.
We begin by proving a formula for the group inverse of partitioned matrices.
Theorem 2.1. Let A, B, C and D ∈ Cn×n. Suppose that A# exists. Set K = D − CA#B
and M =
A B
C D
. Suppose that K # exists. Then R(C ∗) ⊆ R(A∗), R(B) ⊆ R(A),
R(C) ⊆ R(K) and R(B ∗) ⊆ R(K ∗) if and only if
M # =
A# + A#BK #CA# −A#BK #
−K #CA#
K #
.
Proof. First, we observe that CA#A = C (since R(C ∗) ⊆ R(A∗)) and BK #K = B (since
R(B ∗) ⊆ R(K ∗)). We then have
DK #K = (K + CA#B)K #K
= K + CA#BK #K
= K + CA#B
= D.
Also,
A#B + A#BK #CA#B − A#BK #D = A#B + A#BK #(CA#B − D)
= A#B − A#BK #K
= 0.
3
Set
X =
A# + A#BK #CA# −A#BK #
−K #CA#
K #
.
From the earlier calculations one has
and
XM =
=
M X =
=
A# + A#BK #CA# −A#BK #
K #
A#A
−K #CA#
0
0 K #K
A B
C D
A# + A#BK #CA# −A#BK #
−K #CA#
K #
A B
C D
AA#
0
0 KK #
,
where we have used the facts that AA#B = B (since R(B) ⊆ R(A)) and C = KK #C
(since R(C) ⊆ R(K)). So, XM = M X. Also,
M XM =
=
= M.
A BK #K
C DK #K
A B
C D
Further,
XM X =
=
= X.
A#A
0
0 K #K
A# + A#BK #CA# −A#BK #
K #
A# + A#BK #CA# −A#BK #
−K #CA#
−K #CA#
K #
This completes the proof of the necessity part.
4
Conversely, suppose that
M # =
A# + A#BK #CA# −A#BK #
−K #CA#
K #
.
Then,
M M # =
AA# + AA#BK #CA# − BK #CA# −AA#BK # + BK #
CA# + CA#BK #CA − DK #CA# −CA#BK # + DK #
.
Equating the top left blocks of M M #M and M, we then have
AA#A + AA#BK #CA#A − BK #CA#A − AA#BK #C + BK #C = A.
This simplifies to
which in turn yields
A + (I − AA#)BK #C(I − A#A) = A,
(I − AA#)BK #C(I − A#A) = 0.
(1)
By equating the top right blocks of M M #M and M, we get
AA#B + AA#BK #CA#B − BK #CA#B − AA#BK #D + BK #D = B,
so that one has
This reduces to
AA#B + (I − AA#)BK #K = B.
(I − AA#)B(I − K #K) = 0.
Again, equating the bottom left blocks of M M #M and M,
CA#A + CA#BK #CA#A − DK #CA#A − CA#BK #C + DK #C = C,
we then have
(I − KK #)C(I − A#A) = 0.
(2)
(3)
We also have M M # = M #M and so, on equating the bottom left blocks of M M # and
M #M, we have
K #C(I − A#A) = (I − KK #)CA#.
(4)
5
Premultiplying (4) by K, we get
KK #C(I − A#A) = 0
and thus from equation (3), one has CA#A = C. So, R(C ∗) ⊆ R(A∗). Postmultiplying
(4) by A and using the fact that CA#A = C, we get
Thus R(C) ⊆ R(K). Now, equating top right blocks of M M # and M #M, one has
(I − KK #)C = 0.
(I − AA#)BK # = A#B(I − KK #).
(5)
Postmultiplying equation (5) by K, we get
(I − AA#)BK #K = 0
and from equation (2), we get AA#B = B. Thus R(B) ⊆ R(A). Finally, premultiplying
(5) by A and using the fact that AA#B = B,
Thus R(B ∗) ⊆ R(K ∗).
B(I − K #K) = 0.
Next, we state a complementary result, whose proof is similar to the proof of Theorem
2.1. Note that this result uses the pseudo Schur complement L = A − BD#C, which will
be called the complementary Schur complement.
Theorem 2.2. Let M =
A B
C D
as above. Suppose that D# exists and L = A −
BD#C. Suppose that L# exists. Then R(B ∗) ⊆ R(D∗), R(C) ⊆ R(D), R(B) ⊆ R(L)
and R(C ∗) ⊆ R(L∗) if and only if
M # =
L#
−L#BD#
−D#CL# D# + D#C #BD#
.
Next, we define the principal pivot transform in terms of the group inverse. As men-
tioned earlier, principal pivot transform involving Moore-penrose inverse of the block
matrices was studied in [5].
6
Definition 2.1. Let M be defined as above and A# exist. Then the pseudo principal pivot
transform of M relative to A is defined by
P := pppt(M, A)# =
A# −A#B
CA#
K
,
where K = D − CA#B. Next, suppose that D# exists. The complementary pseudo
principal pivot transform of M relative to D is defined by
Q := cpppt(M, D)# =
L
BD#
−D#C D#
,
where L = A − BD#C.
Both the operations of pseudo principal transforms are involutions, in the presence of
certain assumptions, as we prove next.
Lemma 2.1. Let M be defined as above. Let A# and D# exist.
(i) Suppose that R(B) ⊆ R(A) and R(C ∗) ⊆ R(A∗). Then pppt(cid:0)P, A#(cid:1)# = M.
(ii) Suppose that R(C) ⊆ R(D) and R(B ∗) ⊆ R(D∗). Then cpppt(cid:0)Q, D#(cid:1)# = M.
Proof. (i): Set W = A#, X = −A#B and Y = CA#. Then P =
. So,
W X
Y K
pppt(P, A#)# = pppt(P, W )# =
=
=
= M.
W #
−W #X
Y W # K − Y W #X
A
−A(−A#B)
CA#A D − CA#B + CA#AA#B
A B
C D
(ii): The proof is similar to part (i).
Finally, we derive the domain-range exchange property. Domain-range exchange prop-
erty in terms of Moore-Penrose inverse of the matrix is proved in [2]. This property is
well known in the nonsingular case [6].
7
Lemma 2.2. Let M be defined as earlier. Let A# and D# exist.
(i) Suppose that R(B) ⊆ R(A) and R(C ∗) ⊆ R(A∗). Then M and P = pppt(M, A)# are
related by the formula:
=
M
x1
x2
AA#y1
y2
if and only if P
y1
x2
=
A#Ax1
y2
.
(ii) Suppose that R(C) ⊆ R(D) and R(B ∗) ⊆ R(D∗). Then M and Q = cpppt(M, D)#
are related by the formula:
M
x1
x2
=
y1
DD#y2
if and only if Q
y1
x2
=
x1
D#Dy2
.
Proof. We prove (i). The proof for (ii) is similar. Suppose that
Then
and
M
x1
x2
=
AA#y1
y2
.
Ax1 + Bx2 = AA#y1
Cx1 + Dx2 = y2.
Premultipling the first equation by A# (and rearranging) we get
A#y1 − A#Bx2 = A#Ax1.
Premultiplying this equation by C, we then have
CA#y1 − CA#Bx2 = CA#Ax1 = Cx1.
So, CA#y1 + Kx2 = CA#y1 + Dx2 − CA#Bx2 = Cx1 + Dx2 = y2. Thus,
P
y1
x2
=
A#y1 − A#Bx2
CA#y1 + Kx2
=
A#Ax1
y2
.
Conversely, let
Then
P
y1
x2
=
A#Ax1
y2
.
A#y1 − A#Bx2 = A#Ax1
8
and
CA#y1 + (D − CA#B)x2 = y2.
Premultiplying the first equation by A, we have AA#y1 − Bx2 = Ax1 so that Ax1 + Bx2 =
AA#y1. Again, premultiplying the first equation by C, we get CA#y1 − CA#Bx2 = Cx1.
Hence, using the second equation we have, Cx1 + Dx2 = CA#y1 − CA#Bx2 + Dx2 = y2,
proving that
M
x1
x2
=
AA#y1
y2
.
References
[1] A. Ben-Israel and T.N.E. Greville, Generalized Inverses: Theory and Applications:
Springer-Verlag, New York, 2003.
[2] K. Bisht, G. Ravindran and K.C. Sivakumar, Pseudo Schur complements, pseudo prin-
cipal pivot transforms and their inheritance properties, Electron. J. Linear Algebra,
30, (2015), 455-477.
[3] D. Carlson, E.V. Haynsworth and T.L. Markham, A generalization of the Schur com-
plement by means of the Moore-Penrose inverse, SIAM J. Appl. Math, 26 (1974)
169-175.
[4] Kavita Bisht and K.C. Sivakumar, Pseudo Schur Complements, Pseudo Principal
Pivot Transforms and Their Inheritance Properties, (April 2015) arXiv:1504.04527, 8
pp.
[5] A.R. Meenakshi, Principal pivot transforms of an EP matrix, C.R. Math. Rep. Acad.
Sci. Canada, 8 (1986) 121-126.
[6] M. Tsatsomeros, Principal pivot transforms: Properties and applications, Lin. Alg.
Appl., 307 (2000), 151-165.
[7] F. Zhang, The Schur Complement and Its Applications, Springer, New York, 2005.
9
|
1101.3736 | 3 | 1101 | 2011-05-24T12:11:12 | On tropical dualities in cluster algebras | [
"math.RA"
] | We study two families of integer vectors playing a crucial part in the structural theory of cluster algebras: the $\gg$-vectors parameterizing cluster variables, and the $\cc$-vectors parameterizing the coefficients. We prove two identities relating these vectors to each other. The proofs depend on the sign-coherence assumption for $\cc$-vectors that still remains unproved in full generality. | math.RA | math | ON TROPICAL DUALITIES IN CLUSTER ALGEBRAS
TOMOKI NAKANISHI AND ANDREI ZELEVINSKY
Abstract. We study two families of integer vectors playing a crucial part in the
structural theory of cluster algebras: the g-vectors parameterizing cluster variables,
and the c-vectors parameterizing the coefficients. We prove two identities relating
these vectors to each other. The proofs depend on the sign-coherence assumption
for c-vectors that still remains unproved in full generality.
1
1
0
2
y
a
M
4
2
]
.
A
R
h
t
a
m
[
3
v
6
3
7
3
.
1
0
1
1
:
v
i
X
r
a
1. Introduction
In the theory of cluster algebras, the central role is played by two families of el-
ements obtained by certain algebraic recurrences: cluster variables and coefficients
(V. Fock and A. Goncharov refer to them as a-coordinates, and x-coordinates, respec-
tively). In this paper we study certain tropical limits of these elements: two families
of integer vectors (g-vectors and c-vectors, respectively) introduced in [5]. Despite
the fact that these two families are given by very different piecewise-polynomial re-
currences, it turns our that they are closely related to each other. We refer to the
identities involving g-vectors and c-vectors as tropical dualities. The main result of
this paper is Theorem 1.2 containing two such dualities.
We start by briefly recalling the formalism of cluster algebras (more details can
be found in [5]). In the heart of this formalism there are several discrete dynami-
cal systems on a n-regular tree given by birational recurrences and their "tropical"
versions. More precisely, we fix a positive integer n, and denote by Tn an n-regular
tree whose edges are labeled by the numbers 1, . . . , n, so that the n edges emanating
k−−− t′ to indicate that vertices
from each vertex receive different labels. We write t
t, t′ ∈ Tn are joined by an edge labeled by k.
We need a little algebraic preparation. We call a semifield an abelian multiplicative
group P, supplied with the addition operation ⊗, which is commutative, associative,
and distributive with respect to multiplication. Let ZP denote the integer group ring
of (the multiplicative group of) P (note that its definitionignores the addition ⊕). It
is easy to show that (the multiplicative group of) P is torsion-free (see the remark
before Definition 5.3 in [4]), hence ZP is a domain, hence it has the field of fractions
Q(P).
We call an ambient field a field F isomorphic to the field of rational functions in
n indeterminates with the coefficients from Q(P).
Fix a semifield P and an ambient field F . Following [5], we call a (labeled) seed a
triple (x, y, B), where
Date: January 19, 2011; revised April 13, 2011 and May 24, 2011.
Research of A. Z. supported by the NSF grant DMS-0801187.
1
2
TOMOKI NAKANISHI AND ANDREI ZELEVINSKY
• B = (bij) is an n×n integer matrix which is skew-symmetrizable, that is, its
transpose BT is equal to −DBD−1 for some diagonal matrix D with positive
integer diagonal entries d1, . . . , dn;
• y = (y1, . . . , yn) is an n-tuple of elements of P, and
• x = (x1, . . . , xn) is an n-tuple of elements of F forming a free generating set,
that is, being algebraically independent and such that F = Q(P)(x1, . . . , xn).
We refer to B as the exchange matrix of a seed, y as the coefficient tuple, and x
as the cluster.
Throughout the paper we use the notation [b]+ = max(b, 0). For k = 1, . . . , n, the
seed mutation µk transforms (x, y, B) into the labeled seed µk(x, y, B) = (x′, y′, B ′)
defined as follows:
• The entries of the exchange matrix B ′ = (b′
ij) are given by
b′
ij =(−bij
bij + [bik]+[bkj]+ − [−bik]+[−bkj]+ otherwise.
if i = k or j = k;
• The coefficient tuple y′ = (y′
1, . . . , y′
n) is given by
y′
j =(y−1
k
yjy
1, . . . , x′
[bkj]+
(yk ⊕ 1)−bkj
k
n) is given by x′
if j = k;
if j 6= k.
• The cluster x′ = (x′
is determined by the exchange relation
j = xj for j 6= k, whereas x′
k ∈ F
(1.1)
(1.2)
(1.3)
x′
k =
yk Q x[bik]+
i
(yk ⊕ 1)xk
+ Q x[−bik]+
i
.
It is easy to see that B ′ is skew-symmetrizable (with the same choice of D),
implying that (x′, y′, B ′) is indeed a seed. Furthermore, the seed mutation µk is
involutive, that is, it transforms (x′, y′, B ′) into the original seed (x, y, B). We
shall also use the notation B ′ = µk(B) (resp. (y′, B ′) = µk(y, B)) and call the
transformation B 7→ B ′ the matrix mutation (resp. (y, B) 7→ (y′, B ′) the Y -seed
mutation).
A seed pattern is an assignment of a seed (xt, yt, Bt) to every vertex t ∈ Tn, such
k−−− t′ are obtained from each
that the seeds assigned to the endpoints of any edge t
other by the seed mutation µk. We write:
(1.4)
xt = (x1;t , . . . , xn;t) , yt = (y1;t , . . . , yn;t) , Bt = (bij;t) .
We also refer to a family (yt, Bt)t∈Tn as a Y -seed pattern, and a family (Bt)t∈Tn as
an exchange matrix pattern.
It is convenient to fix a vertex (root) t0 ∈ Tn. Then a seed pattern is uniquely
determined by a seed at t0, which can be chosen arbitrarily. We will just write this
initial seed as (x, y, B), with
(1.5)
x = (x1 , . . . , xn) , y = (y1 , . . . , yn) , B = (bij) .
The cluster algebra associated with a seed (x, y, B) (or rather with the correspond-
ing seed pattern) is the ZP-subalgebra of the ambient field F generated by all cluster
ON TROPICAL DUALITIES IN CLUSTER ALGEBRAS
3
variables xj;t. One of the central problems in the theory of cluster algebras is to find
explicit expressions for all xj;t and yj;t as rational functions in x1, . . . , xn, y1, . . . , yn.
A step in this direction was made in [5], where the following was proved.
Proposition 1.1. [5, Proposition 3.13, Corollary 6.3] Every pair (B; t0) gives rise
to a family of polynomials Fj;t = F B;t0
j;t ∈ Z[u1, . . . , un] and two families of integer
vectors cj;t = cB;t0
j;t = (g1j;t, . . . , gnj;t) ∈ Zn
(where j ∈ {1, . . . , } and t ∈ Tn) with the following properties:
j;t = (c1j;t, . . . , cnj;t) ∈ Zn and gj;t = gB;t0
(1) Each Fj;t is not divisible by any ui, and can be expressed as a ratio of two poly-
nomials in u1, . . . , un with positive integer coefficients, thus can be evaluated
in every semifield P.
(2) For any j and t, we have
(1.6)
yj;t = y
c1j;t
1
· · · ycnj;t
(3) For any j and t, we have
Fi;tP(y1, . . . , yn)bij;t .
n Yi
(1.7)
g1j;t
xj;t = x
1
· · · xgnj;t
n
Fj;tF (y1, . . . , yn)
Fj;tP(y1, . . . , yn)
,
where the elements yj are given by
bij
x
i
.
yj = yjYi
Following [5], we refer to gj;t as the g-vector of a cluster variable xj;t. It is in-
structive to view the g-vectors as some kind of discrete (or tropical ) limits of cluster
variables. In fact, as explained in [5, Remark 7.15], these vectors are expected to
provide a parametrization of cluster variables (and more generally, cluster monomi-
als) by "Langlands dual tropical Y -seed patterns" in accordance with a conjecture
by V. Fock and A. Goncharov [3, Conjecture 5.1]. Some properties of g-vectors
and F -polynomials were established in [5] but several basic properties still remain
conjectural.
Comparing (1.6) and (1.7), it is natural to view the c-vector cj;t as a tropical limit
of a coefficient yj;t. These vectors also made their appearance in [5], although not
under this name, and only as a tool for studying g-vectors and F -polynomials. In this
note we focus on the properties of c-vectors and their relationships with g-vectors.
The following (unfortunately, still conjectural) sign-coherence property of c-vectors
is crucial for our analysis:
(1.8) Each vector cj;t has either all entries nonnegative or all entries nonpositive.
As shown in [5, Proposition 5.6], (1.8) is equivalent to the following conjecture made
in [5, Conjecture 5.4]:
(1.9)
Each polynomial Fj;t(u1, . . . , un) has constant term 1.
This conjecture (hence the property (1.8)) was proved in [2] for the case of skew-
symmetric exchange matrices, using quivers with potentials and their representations
(two different proofs were recently given in [6, 8]).
4
TOMOKI NAKANISHI AND ANDREI ZELEVINSKY
We denote by C B;t0
) the integer matrix with columns c1;t, . . . , cn;t
(resp. with columns g1;t, . . . , gn;t), where B is the exchange matrix at t0. In partic-
ular, we have
(resp. GB;t0
t
t
(1.10)
C B;t0
t0 = GB;t0
t0 = I
(the identity matrix).
The main results of this paper are the following two identities.
Theorem 1.2. Under the assumption (1.8), for any skew-symmetrizable exchange
matrix B, and any t0, t ∈ Tn, we have
(1.11)
and
(GB;t0
t
)T = (C −BT ;t0
t
)−1,
(1.12)
where t 7→ Bt is the exchange matrix pattern on Tn such that Bt0 = B, and BT
stands for the transpose matrix of B.
C B;t0
t = (C −Bt;t
)−1,
t0
Note that in the case when B is skew-symmetric, (1.11) takes the form (GB;t0
)T =
t
(C B;t0
)−1. In this case it was proved in [7, Proposition 4.1].
t
One can show that identities (1.11) and (1.12) imply most of the conjectures made
in [5] and recast in [2], namely Conjectures 1.1 - 1.4 and 1.6 from [2]. For instance,
by combining them, we obtain the equality
(1.13)
(GB;t0
t
)T = C
t ;t
BT
t0
,
which can be shown to imply [2, Conjecture 1.6]. More details will be given in
Section 4.
In contrast with [2], the proofs of (1.11) and (1.12) given below do not use any
categorical interpretation of g- or c-vectors but are based on the analysis of recur-
rences satisfied by them. To describe these recurrences we need to develop some
matrix formalism.
We extend the notation [b]+ = max(0, b) to matrices, writing [B]+ for the matrix
obtained from B by applying the operation b 7→ [b]+ to all entries of B. For a matrix
index k, we denote by B •k the matrix obtained from B by replacing all entries outside
of the k-th column with zeros; the matrix Bk• is defined similarly using the k-th row
instead of the column. Note that the operations B 7→ [B]+ and B 7→ B •k commute
with each other, making the notation [B]•k
+ ) unambiguous.
+ (and [B]k•
Using this formalism, we can rephrase the sign-coherence condition (1.8) for a
matrix C = C B;t0
(1.14) For every j, there exists the sign εj(C) = ±1 such that [−εj(C)C]•j
as follows:
t
+ = 0.
Let Jk denote the diagonal matrix obtained from the identity matrix by replacing
the (k, k)-entry with −1. We deduce (1.11) from the following proposition.
Proposition 1.3. Suppose t
ℓ−−− t′ in Tn, and let C = C B;t0
t
, G = GB;t0
t
, C ′ = C B;t0
t′
,
and G′ = GB;t0
t′
(1.15)
. Then, under the assumption that C satisfies (1.14), we have
C ′ = C(Jℓ + [εℓ(C)Bt]ℓ•
+ ), G′ = G(Jℓ + [−εℓ(C)Bt]•ℓ
+ ) .
ON TROPICAL DUALITIES IN CLUSTER ALGEBRAS
5
As for (1.12), we prove it together with the following proposition that provides
"at the opposite end." We still assume
a recurrence relation for the matrices C B;t0
that every matrix of the form C = C B;t0
t
satisfies (1.8) or equivalently (1.14).
t
Proposition 1.4. Suppose t0
abbreviate Ct = C B;t0
, and C ′
t
t = C B1;t1
t
. Then we have
k−−− t1 in Tn, and let B1 = µk(B). For t ∈ Tn,
(1.16)
C ′
t = (Jk + [−εk(C −Bt;t
t0
)B]k•
+ )Ct .
Proposition 1.3 and the identity (1.11) will be proved in Section 2, while Propo-
sition 1.4 and (1.12) will be proved in Section 3. In the last section we give some
corollaries.
2. Proofs of Proposition 1.3 and identity (1.11)
Proof of Proposition 1.3. We start with the following identity involving the function
[b]+ = max(b, 0): for any real numbers b and c, and a sign ε = ±1, we have
(2.1)
[c]+[b]+ − [−c]+[−b]+ = c[εb]+ + b[−εc]+ .
This is a consequence of an obvious identity
(2.2)
Indeed, we have
[b]+ − [−b]+ = b .
c[b]+ + b[−c]+ = ([c]+ − [−c]+)[b]+ + ([b]+ − [−b]+)[−c]+ = [c]+[b]+ − [−c]+[−b]+ ,
proving (2.1) for ε = 1; the case ε = −1 is proved similarly.
The first equality in (1.15) was essentially shown in [1, (3.2)] (in a different nota-
tion). For the convenience of the reader, we reproduce the argument here. Recall
from [5, Remarks 3.2, 3.14] that the relationship between C = C B;t0
and C ′ = C B;t0
can be described as follows: if Bt is a 2n × n integer matrix with the top n × n block
, then Bt′ is obtained from Bt by the matrix mutation
Bt and the bottom block C B;t0
µℓ given by the same formula as in (1.1). Thus, we get
t′
t
t
(2.3)
c′
ij =(−cij
cij + [ciℓ]+[bℓj;t]+ − [−ciℓ]+[−bℓj;t]+ otherwise.
if j = ℓ;
Using (2.1) and rewriting the resulting formula in the matrix form, we get
(2.4)
C ′ = C(Jℓ + [εBt]ℓ•
+ ) + [−εC]•ℓ
+ Bt
for any choice of the sign ε. Setting ε = εℓ(C) and remembering (1.14), we see that
the second term in (2.4) disappears, implying the desired equality.
To prove the second equality in (1.15), we rewrite [5, (6.12)-(6.13)] in the matrix
form as follows:
(2.5)
G′ = G(Jℓ + [−εBt]•ℓ
+ ) − B[−εC]•ℓ
+
(again for any choice of the sign ε). Again setting ε = εℓ(C) makes the second term
in (2.5) disappear, completing the proof of Proposition 1.3.
(cid:3)
6
TOMOKI NAKANISHI AND ANDREI ZELEVINSKY
Proof of identity (1.11). We prove (1.11) by induction on the distance between t and
t0 in the tree Tn. For t = t0, the claim follows from (1.10). It remains to show that
ℓ−−− t′.
if (1.11) holds for some t ∈ Tn then it also holds for t′ ∈ Tn such that t
This implication is a consequence of (1.15) combined with the following three simple
observations:
• For every integer square matrix B and an index ℓ such that bℓℓ = 0, we have
(2.6)
(Jℓ + B •ℓ)T = Jℓ + (BT )
ℓ•
,
(Jℓ + Bℓ•)−1 = Jℓ + Bℓ• .
• The replacement of the initial exchange matrix Bt0 = B with −BT leads to
the replacement of each Bt with −BT
t , and we have
(2.7)
C −BT ;t0
t
= DC B;t0
t D−1,
where D is a diagonal n × n matrix with positive integer entries such that
−BT = DBD−1.
• In particular, we have εℓ(C −BT ;t0
t
) = εℓ(C B;t0
t
) for every matrix index ℓ.
(cid:3)
Remark 2.1. As in Proposition 1.3, let us abbreviate C = C B;t0
. In
the equality (2.5), the fact that two choices of the sign give the same answer implies
the following identity for G (shown already in [5, (6.14)]):
, and G = GB;t0
t
t
(2.8)
GBt = BC .
Combining this identity with (1.11) and (2.7), we obtain the following:
(2.9)
DBt = C T · DB · C ,
where the diagonal matrix D is as in (2.7). This shows that the exchange matrix Bt
at every vertex t ∈ Tn (that is, the top part of the 2n × n matrix Bt) is determined
by the initial exchange matrix B and the matrix C which is the bottom part of Bt.
3. Proofs of Proposition 1.4 and identity (1.12)
We prove (1.16) and (1.12) by a simultaneous induction. To prepare the ground
for it, we note that, under the notation and assumptions of Proposition 1.4, we have
Bk•
). In view
of the second equality in (2.6), this allows us to interchange t0 and t1 in (1.16). Thus,
it suffices to prove (1.16) under the assumption that
1 = −Bk•, and (C −Bt;t
)•k, hence εk(C −Bt;t
) = −εk(C −Bt;t
)•k = −(C −Bt;t
t1
t0
t1
t0
(3.1)
t0 belongs to the (unique) path between t and t1 in Tn.
In other words, (3.1) means that d(t, t1) = d(t, t0) + 1, where d(t, t0) denotes the
distance between t and t0 in Tn.
For d ≥ 0, we denote by (Id) and (IId) the following two statements:
(Id) The equality (1.12) holds for d(t, t0) = d.
(IId) The equality (1.16) holds under the assumption (3.1) whenever d(t, t0) = d.
ON TROPICAL DUALITIES IN CLUSTER ALGEBRAS
7
We will prove both (Id) and (IId) simultaneously by induction on d.
For d = 0 we have t = t0, and both (1.12) and (1.16) are immediate from the
definitions.
It remains to prove the implications (Id) & (IId) =⇒ (Id+1) and (Id) &(IId) =⇒
(IId+1).
Proof of the implication (Id) & (IId) =⇒ (Id+1). We need to show that if (1.12) and
(1.16) hold for some t, t0, and t1 satisfying (3.1), then (1.12) also holds if t0 is replaced
with t1, and B is replaced by B1 = µk(B) (note that this replacement leaves Bt
unchanged by the definition of an exchange matrix pattern). Let us abbreviate
C = C B;t0
. To prove the desired equality
t
C B1;t1
t
= (C −Bt;t
t1
)−1
we use (1.16), the second equality in (2.6), the inductive assumption C −1 = C −Bt;t
and the first equality in (1.15) to get
t0
,
(C B1;t1
t
)−1 = ((Jk + [−εk(C −Bt;t
t0
)B]k•
= C −1(Jk + [−εk(C −Bt;t
= C −Bt;t
(Jk + [εk(C −Bt;t
= C −Bt;t
t0
t0
t0
t1
+ ) C)−1
)B]k•
+ )
) · (−B)]k•
+ )
(to see that the last equality is indeed an instance of (1.15), note that the matrix
mutation commutes with the operation B 7→ −B, thus the exchange matrix pattern
that assigns −Bt to t, also assigns −B to t0).
(cid:3)
Proof of the implication (Id) & (IId) =⇒ (IId+1). This proof is more involved than
the previous one. Let us first summarize our assumptions, and what has to be proven.
ℓ−−− t′,
Suppose d(t0, t) = d in Tn, and let t1, t′ ∈ Tn be such that t0
k−−− t1, t
and t and t0 belong to the unique path between t′ and t1. Thus we have d(t1, t) =
d(t0, t′) = d + 1, and d(t1, t′) = d + 2. The assumption (Id) is just the equality (1.12).
Since we have already shown that (Id) and (IId) imply (Id+1), we can also assume
the equalities
(3.2)
C B1;t1
t
= (C −Bt;t
t1
)−1, C B;t0
t′ = (C
−Bt′ ;t′
t0
)−1 .
(3.3)
Now the assumption (IId) gives us the equalities
= (Jk + [−εk(C −Bt;t
t0
= (Jℓ + [εℓ(C B;t0
C B1;t1
t
−Bt′ ;t′
t0
C
t
)Bt]ℓ•
,
)B]k•
t
+ )C B;t0
+ )C −Bt;t
t0
,
while our goal is to prove that
(3.4)
C B1;t1
t′
= (Jk + [−εk(C
−Bt′ ;t′
t0
)B]k•
+ )C B;t0
t′
.
To prove (3.4), we invoke the following equalities which are instances of (1.15):
(3.5) C B;t0
t′ = C B;t0
t
(Jℓ + [εℓ(C B;t0
t
)Bt]ℓ•
+ ), C B1;t1
t′
= C B1;t1
t
(Jℓ + [εℓ(C B1;t1
t
)Bt]ℓ•
+ ) .
8
TOMOKI NAKANISHI AND ANDREI ZELEVINSKY
The following observation is immediate from the first equality in (3.3):
(3.6) The transformation C B;t0
t
7→ C B1;t1
t
affects only the entries in the k-th row.
Now we consider separately the following two mutually exclusive cases:
Case 1: the matrix C B;t0
Case 2: the only non-zero entry in the ℓ-th column of C B;t0
has a non-zero entry (i, ℓ) for some i 6= k.
is the (k, ℓ) entry;
equivalently, the ℓth column of C B;t0
is of the form εek, where e1, . . . , en is the
standard basis of Zn. Note that in this case the coefficient ε is equal to ±1, since
both C B;t0
and its inverse C −Bt;t
are integer matrices.
t
t
t
t
t0
First we deal with Case 1. In view of (3.6), we have εℓ(C B1;t1
) (here
we use the assumption (1.14)!). Combining (3.5) and (3.3), we see that the desired
equality (3.4) follows from the equality
) = εℓ(C B;t0
t
t
(3.7)
εk(C
−Bt′ ;t′
t0
) = εk(C −Bt;t
t0
) .
Applying the same argument as above to the transformation C −Bt;t
given
by the second equality in (3.3), we see that it is enough to show that C −Bt;t
satisfies
the analog of Case 1, namely has a non-zero entry (i, k) for some i 6= ℓ. Now recall
that by our assumption (Id), the matrices C B;t0
are inverses of each other.
Thus, it is enough to show the following statement from linear algebra:
and C −Bt;t
7→ C
−Bt′ ;t′
t0
t0
t0
t0
t
(3.8)
For any indices k and ℓ, an invertible matrix C has a non-zero entry
(i, ℓ) for some i 6= k if and only if C −1 has a non-zero entry (i, k) for some i 6= ℓ.
The easiest way to prove (3.8) is to observe that it becomes obvious after replacing
the equivalent statements in question by their negations:
(3.9)
For any k and ℓ, the ℓth column of C is of the form εek
with ε = ±1 if and only if the kth column of C −1 is εeℓ.
This completes the proof of (3.4) in Case 1.
Now assume that we are in Case 2, that is, in view of (3.9), the ℓth column
is εeℓ for some ε = ±1.
is εek, while the kth column of (C B;t0
)−1 = C −Bt;t
t
t0
of C B;t0
In particular, we have
t
εℓ(C B;t0
t
) = εk(C −Bt;t
t0
) = ε .
Using the two equalities in (3.3), we conclude that the ℓth column of C B1;t1
while the kth column of C
is −εeℓ, hence
t
is −εek,
−Bt′ ;t′
t0
εℓ(C B1;t1
t
) = εk(C
−Bt′ ;t′
t0
) = −ε .
Combining (3.5) and (3.3), we can rewrite the desired equality (3.4) as follows:
(Jk + [−εB]k•
+ )C B;t0
t
(Jℓ + [−εBt]ℓ•
+ ) = (Jk + [εB]k•
+ )C B;t0
t
(Jℓ + [εBt]ℓ•
+ ) ,
or equivalently (in view of (2.6)) as
(Jk + [εB]k•
+ )(Jk + [−εB]k•
+ )C B;t0
t = C B;t0
t
(Jℓ + [εBt]ℓ•
+ )(Jℓ + [−εBt]ℓ•
+ ) .
Performing the matrix multiplication and remembering (2.2), we can simplify the
last equality to
(I + εBk•)C B;t0
t = C B;t0
t
(I + εBℓ•
t ) ,
ON TROPICAL DUALITIES IN CLUSTER ALGEBRAS
9
or even further to
(3.10)
Bk•C B;t0
t = C B;t0
t Bℓ•
t
.
To prove (3.10) we recall the identity (1.11), and in particular the matrix GB;t0
t
that appears there. To simplify the notation, we abbreviate
GB;t0
t = G, C B;t0
t = C ;
as shown in the proof of (1.11) given above, it can be rewritten as follows:
(3.11)
GT = (C −BT ;t0
t
)−1 = DC −1D−1 ,
where D is the diagonal matrix with positive diagonal entries such that −BT =
DBD−1.
k εeℓ. However, we
know that both GT and its inverse C −BT ;t0
are integer matrices. Therefore, dℓ = dk,
and we have
In particular, the kth column of GT is equal to dℓd−1
t
(3.12)
the kth row of G is equal to εeT
ℓ .
Now we recall the equality (2.8). Computing the entries in the kth row on both sides
of (2.8) and using (3.12), we get, for any j = 1, . . . , n:
εbℓj;t =Xp
bkpcpj .
Rewriting this in the matrix form yields (3.10), thus completing the proofs of Propo-
sition 1.4 and identity (1.12).
(cid:3)
4. Some corollaries
In this section we show that the assumption (1.8) and the identities (1.11) and
(1.12) imply most of the conjectures made in [5] and recast in [2], namely Conjec-
tures 1.1 - 1.4 and 1.6 from [2]. For the convenience of the reader we reproduce their
statements.
Conjecture 4.1.
(i) Each polynomial F B;t0
j;t
has constant term 1.
(ii) Each polynomial F B;t0
has a unique monomial of maximal degree. Further-
more, this monomial has coefficient 1, and it is divisible by all the other
occurring monomials.
j;t
(iii) For every t ∈ Tn, the vectors gB;t0
1;t
n;t are sign-coherent, i.e., for any
i = 1, . . . , n, the i-th components of all these vectors are either all nonnega-
tive, or all nonpositive.
, . . . , gB;t0
(iv) For every t ∈ Tn, the vectors gB;t0
1;t
form a Z-basis of the lattice Zn.
k−−− t1 be two adjacent vertices in Tn, and let B ′ = µk(B). Then,
, . . . , gB;t0
n;t
(v) Let t0
for any t ∈ Tn and j = 1, . . . , n, the g-vectors gB;t0
gB ′;t1
j;t = (g′
n) are related as follows:
1, . . . , g′
j;t = (g1, . . . , gn) and
(4.1)
g′
i =(−gk
gi + [bik]+gk − bik min(gk, 0)
if i = k;
if i 6= k.
10
TOMOKI NAKANISHI AND ANDREI ZELEVINSKY
Proposition 4.2. The assumption (1.8) implies all the statements in Conjecture 4.1.
Proof. The equivalence of (i) and (ii) was shown in [5, Section 5] (see Conjectures 5.4,
5.5 and Proposition 5.3 there). The fact that (1.8) implies conjectures (i) and (ii)
was shown in [5, Proposition 5.6] (note that (1.8) appears as condition (ii′) in the
proof).
Part (iii) is immediate from (1.8) and (1.13).
Part (iv) can be restated by saying that the matrix GB;t0
t
invertible over Z. But this is immediate from (1.11).
with columns gB;t0
j;t
is
It remains to prove (v). Replacing min(gk, 0) with −[−gk]+, and using (2.1), we
rewrite the desired equality (4.1) in the matrix form as follows:
(4.2)
GB ′;t1
t
= (Jk + [εB]•k
+ )GB;t0
t + B[−εGB;t0
t
]k•
+ ,
for any choice of sign ε = ±1. Taking transpose matrices on both sides of (4.2) and
using (1.13), we can rewrite (4.2) as
(4.3)
t1 = C BT
C BT
t ;t
t ;t
t0
(Jk + [εBT ]k•
+ ) + [−εC BT
t ;t
t0
]•k
+ BT .
In view of (1.14), choosing ε = εk(C
t ;t
BT
t0
), we see that (4.3) takes the form
t ;t
BT
t1 = C
BT
t0
t ;t
C
(4.4)
which is just the first equality in (1.15) (with (t, t′) replaced by (t0, t1), and (B; t0)
replaced by (BT
t ; t)). This proves (4.2) and completes the proof of Proposition 4.2.
(cid:3)
(Jk + [εk(C
+ ) ,
t ;t
BT
t0
) BT ]k•
References
[1] A. Berenstein, S. Fomin, A. Zelevinsky, Cluster algebras III: Upper bounds and double Bruhat
cells, Duke Math. J. 126 (2005), 1 -- 52.
[2] H. Derksen, J. Weyman, A. Zelevinsky, Quivers with potentials and their representations II:
Applications to cluster algebras, J. Amer. Math. Soc. 23 (2010), no. 3, 749 -- 790.
[3] V. V. Fock, A. B. Goncharov, Cluster ensembles, quantization and the dilogarithm, Annales
Sci. de l' ´Ecole Norm. Sup. (4) 42 (2009), 865-930.
[4] S. Fomin, A. Zelevinsky, Cluster algebras I: Foundations, J. Amer. Math. Soc. 15 (2002),
497 -- 529.
[5] S. Fomin, A. Zelevinsky, Cluster algebras IV: Coefficients, Comp. Math. 143 (2007), 112 -- 164.
[6] K. Nagao, Donaldson-Thomas theory and cluster algebras, arXiv:1002.4884.
[7] T. Nakanishi, Periodicities in cluster algebras and dilogarithm identities, arXiv:1006.0632.
[8] P. Plamondon, Cluster algebras via cluster categories with infinite-dimensional morphism
spaces, arXiv:1004.0830.
Graduate School of Mathematics, Nagoya University, Nagoya, 464-8604, Japan
E-mail address: [email protected]
Department of Mathematics, Northeastern University, Boston, MA 02115, USA
E-mail address: [email protected]
|
1001.0191 | 2 | 1001 | 2012-11-30T22:35:27 | Group gradings on restricted Cartan type Lie algebras | [
"math.RA"
] | For a given abelian group G, we classify the isomorphism classes of G-gradings on the simple restricted Lie algebras of types W(m;1) and S(m;1) (m>=2), in terms of numerical and group-theoretical invariants. Our main tool is automorphism group schemes, which we determine for the simple restricted Lie algebras of types S(m;1) and H(m;1). The ground field is assumed to be algebraically closed of characteristic p>3. | math.RA | math | GROUP GRADINGS ON RESTRICTED CARTAN TYPE
LIE ALGEBRAS
YURI BAHTURIN AND MIKHAIL KOCHETOV
Abstract. For a given abelian group G, we classify the isomorphism classes of
G-gradings on the simple restricted Lie algebras of types W (m; 1) and S(m; 1)
(m ≥ 2), in terms of numerical and group-theoretical invariants. Our main tool
is automorphism group schemes, which we determine for the simple restricted
Lie algebras of types S(m; 1) and H(m; 1). The ground field is assumed to be
algebraically closed of characteristic p > 3.
]
.
A
R
h
t
a
m
[
2
v
1
9
1
0
.
1
0
0
1
:
v
i
X
r
a
1. Introduction
Let U be an algebra (not necessarily associative) over a field F and let G be a
group, written multiplicatively.
Definition 1.1. A G-grading on U is a vector space decomposition
U =Mg∈G
Ug
such that
UgUh ⊂ Ugh for all g, h ∈ G.
Ug is called the homogeneous component of degree g. The support of the G-grading
is the set
{g ∈ G Ug 6= 0}.
If U is finite-dimensional, then, replacing G with the subgroup generated by the
support of the grading, we may assume without loss of generality that G is finitely
generated.
ψ(Ug) = U ′
g for all g ∈ G,
are isomorphic if there exists an algebra automorphism ψ : U → U such that
Definition 1.2. We say that two G-gradings, U =Lg∈G Ug and U =Lg∈G U ′
i.e., U =Lg∈G Ug and U =Lg∈G U ′
Since the same vector space decomposition can be regarded as a G-grading for
different groups G, one can also define equivalence of gradings, which is a weaker
relation than isomorphism -- see e.g. [6] for a discussion. Fine gradings (i.e., those
that cannot be refined) as well as their universal groups are of particular interest.
We are interested in the problem of finding all possible group gradings on finite-
dimensional simple Lie algebras. If L is a simple Lie algebra, then it is known that
g are isomorphic as G-graded algebras.
g,
Keywords: graded algebra, simple Lie algebra, grading, Cartan type Lie algebra.
2000 Mathematics Subject Classification: Primary 17B70; Secondary 17B60.
The first author acknowledges support by by NSERC grant # 227060-04. The second author
acknowledges support by NSERC Discovery Grant # 341792-07.
1
2
BAHTURIN AND KOCHETOV
the support of any G-grading on L generates an abelian group. Hence, in this paper
we will always assume that G is abelian. We will also assume that the ground field
F is algebraically closed.
For an arbitrary abelian group G, the classification of G-gradings (up to isomor-
phism) is known for almost all classical simple Lie algebras over an algebraically
closed field of characteristic 0 or p > 2. The classification of fine gradings (up to
equivalence) is also known. The reader may refer to [2, 5] and references therein.
Our goal is to carry out the same classification for simple restricted Lie algebras
of Cartan type. In the present paper, we achieve this goal for Witt algebras and
for special algebras (see definitions in Section 2) in characterisitc p > 3: Theorem
4.13 with Corollary 4.14 and Theorem 4.17 with Corollary 4.18, respectively.
In a number of cases, a fruitful approach to the classification of gradings by
abelian groups on an algebra U is to use another algebra, R, that shares with U the
automorphism group scheme (see Section 3) and whose gradings are easier to study.
This approach often requires equipping R with some additional structure. For
classical simple Lie algebras of series A, B, C and D, R is the matrix algebra Mn(F),
possibly equipped with an antiautomorphism. For Lie algebras of Cartan type, R is
the "coordinate algebra" O(m; n) (see Definition 2.1), which, in the restricted case,
is just the truncated polynomial algebra O(m; 1) = F[x1, . . . , xm]/(xp
m). It
is not difficult to classify G-gradings on the algebra O(m; 1) -- see Theorem 4.8
and Corollary 4.11. Since it is known that O(m; 1) has the same automorphism
group scheme as the Witt algebra W (m; 1), this immediately gives the classification
of gradings for the latter.
In Section 3, we show that the automorphism group
scheme of the special algebra S(m; 1)(1), m ≥ 3 -- respectively, Hamiltonian algebra
H(m; 1)(2), m = 2r -- is isomorphic to the stabilizer of the differential form ωS --
respectively, ωH -- in the automorphism group scheme of O(m; 1); see Theorems 3.2
and 3.5, respectively. As a consequence, all gradings on S(m; 1)(1) and H(m; 1)(2)
come from gradings on O(m; 1). However, this does not yet give a classification
of gradings on S(m; 1)(1) and H(m; 1)(2) up to isomorphism, because one must
make sure that the isomorphism preserves the appropriate differential form -- see
Corollary 4.2. With some more work, we obtain a classification of gradings on
S(m; 1)(1), m ≥ 3, and S(2; 1)(2) = H(2; 1)(2). The classification for H(2r; 1)(2)
with r > 1 remains open.
1, . . . , xp
The paper is structured as follows. In Section 2, we recall the definitions and
basic facts regarding Lie algebras of Cartan type. In Section 3, we briefly recall
background information on automorphism group schemes and determine them for
S(m; 1)(1) and H(m; 1)(2). In Section 4, we obtain the classification of gradings for
Witt and special algebras (using the results on automorphism group schemes).
2. Cartan type Lie algebras
We start by briefly recalling the definitions and relevant properties of Cartan
type Lie algebras. We will use [11] as a standard reference. Fix m ≥ 1 and
n = (n1, . . . , nm) where ni ≥ 1. Set
Z(m;n) := {α ∈ Zm 0 ≤ αi < pni for i = 1, . . . , m}.
The elements of Z(m;n) will be called multi-indices and denoted by Greek letters α,
β, γ. For α = (α1, . . . , αm), we set
α = α1 + · · · + αm.
GRADINGS ON RESTRICTED CARTAN TYPE LIE ALGEBRAS
3
We will denote by 1 the multi-index that has 1 in all positions and by εi the multi-
index that has 1 in position i and zeros elsewhere.
Let F be a field of characteristic p > 0.
Definition 2.1. The algebra O = O(m; n) over F is a commutative associative
algebra with a basis {x(α) α ∈ Z(m,n)} where multiplication given by
x(α)x(β) =(cid:18)α + β
α (cid:19)x(α+β) where(cid:18)α + β
α (cid:19) =
αi (cid:19).
mYi=1(cid:18)αi + βi
m) by identifying xi with x(εi):
If n = 1, then O ∼= F[x1, . . . , xm]/(xp
1, . . . , xp
1
x(α) =
α1! · · · αm!
xα1
1 · · · xαm
m .
The algebra O has a canonical Z-grading O =Lℓ≥0 Oℓ defined by declaring the
degree of x(α) to be α. The associated filtration will be denoted by
O(ℓ) :=Mj≥ℓ
Oj.
Note that M := O(1) is the unique maximal ideal of O.
We will now define the following graded Cartan type Lie algebras: Witt, special
and Hamiltonian. The contact algebras and generalized (i.e., non-graded) Cartan
type Lie algebras will not be considered in this paper.
Definition 2.2. Define a linear map ∂i : O → O by ∂ix(α) = x(α−εi) where the
right-hand side is understood to be zero if αi = 0. Then ∂i is a derivation of O.
The Witt algebra W = W (m; n) is the subalgebra of Der(O) that consists of all
operators of the form
f1∂1 + · · · + fm∂m where fi ∈ O.
The canonical Z-grading of O induces a Z-grading on End (O). Since W is a
graded subspace of End (O), it inherits the Z-grading: W =Lℓ≥−1 Wℓ. We will
denote the associated filtration by W(ℓ).
The de Rahm complex Ω0
d−→ . . . is defined as follows: Ω0 = O,
Ω1 = Hom O(W, O), and Ωk = (Ω1)∧k for k ≥ 2. The map d : Ω0 → Ω1 is defined
by (df )(D) = D(f ) for all f ∈ O and D ∈ W . The remaining maps d : Ωk → Ωk+1
are defined in the usual way: d (f dxi1 ∧ · · · ∧ dxik ) = df ∧ dxi1 ∧ · · · ∧ dxik .
d−→ Ω2
d−→ Ω1
Any element D ∈ W acts on Ω1 = Hom O(W, O) by setting
D(ω)(E) = D(ω(E)) − ω([D, E]) for all ω ∈ Ω1 and E ∈ W.
This action turns all Ωk = (Ω1)∧k into W -modules. Of course, all Ωk also have
canonical Z-gradings and associated filtrations.
We will need the following differential forms to define the special and Hamiltonian
algebras:
ωS := dx1 ∧ dx2 ∧ · · · ∧ dxm ∈ Ωm,
ωH := dx1 ∧ dxr+1 + dx2 ∧ dxr+2 + · · · + dxr ∧ dx2r ∈ Ω2
(m ≥ 2);
(m = 2r).
Definition 2.3. The special algebra S = S(m; n) is the stabilizer of ωS in W (m; n):
S = {D ∈ W D(ωS) = 0}.
4
BAHTURIN AND KOCHETOV
The Hamiltonian algebra H = H(m; n) is the stabilizer of ωH in W (m; n):
H = {D ∈ W D(ωH ) = 0}.
Note that in the case m = 2, we have ωS = ωH and hence S = H. It is well-
known that W (m; n) is simple unless p = 2 and m = 1. The algebras S(m; n) and
H(m; n) are not simple, but the first derived algebra S(m; n)(1) (m ≥ 3) and the
second derived algebra H(m; n)(2) are simple.
The Lie algebras W (m; n), S(m; n) and H(m; n) are restrictable -- i.e., admit
p-maps making them restricted Lie algebras -- if and only if n = 1. From now on,
we will assume that this is the case. Since W , S and H have trivial center, their
p-maps are unique. Also, in this case W = Der(O) and hence the p-map is just the
p-th power in the associative algebra End (O). The algebras S and H are restricted
subalgebras of W .
3. Automorphism group schemes
Let O = O(m; 1). Any automorphism µ of the algebra O gives rise to an auto-
morphism Ad (µ) of W given by Ad (µ)(D) = µ ◦ D ◦ µ−1. Then we can define the
action of µ on Ω1 = Hom O(W, O) by setting µ(ω)(D) = µ(ω(Ad (µ−1)(D))) for
all ω ∈ Ω1 and D ∈ W . This action turns all Ωk = (Ω1)∧k into Aut(O)-modules.
Clearly, these actions can still be defined in the same way if we extend the scalars
from the base field F to any commutative associative F-algebra K, i.e., replace O
with O(K) := O ⊗ K, W with W (K) := W ⊗ K and Ωk with Ωk(K) := Ωk ⊗ K.
Recall the automorphism group scheme of a finite-dimensional F-algebra U (see
e.g. [14] for background on affine group schemes). As a functor, the (affine) group
scheme Aut(U ) is defined by setting Aut(U )(K) = AutK (U ⊗K) for any commuta-
tive associative F-algebra K. From the above discussion it follows that we have mor-
phisms of group schemes Ad : Aut(O) → Aut(W ) and also Aut(O) → GL(Ωk).
(We identify a smooth algebraic group scheme such as GL(V ) with the correspond-
ing algebraic group.) Note that, since the p-map of W ⊗ K is uniquely determined,
the automorphism group scheme of W as a Lie algebra is the same as its au-
tomorphism group scheme as a restricted Lie algebra. Note also that the maps
d : Ωk → Ωk+1 are Aut(O)-equivariant.
The algebraic group scheme Aut(U ) contains the algebraic group Aut(U ) as the
largest smooth subgroupscheme. The tangent Lie algebra of Aut(U ) is Der(U ), so
Aut(U ) is smooth if and only if Der(U ) equals the tangent Lie algebra of the group
Aut(U ). The automorphism group schemes of simple Cartan type Lie algebras,
unlike those of the classical simple Lie algebras, are not smooth. Indeed, the tangent
Lie algebra of Aut(O) is W(1), which is a proper subalgebra of W = Der(O), so
Aut(O) is not smooth. In view of the following theorem, we see that Aut(W ) is
not smooth.
Theorem 3.1 ([13]). Let O = O(m; 1) and W = W (m; 1). Assume p > 3. Then
the morphism Ad : Aut(O) → Aut(W ) is an isomorphism of group schemes. (cid:3)
The automorphism group scheme of the general W (m; n) is also known -- see
[15] (p > 2, with small exceptions in the case p = 3) and [9, 10] (any p, with
small exceptions in the cases p = 2 and p = 3). In particular, Theorem 3.1 holds
for p = 3 if m ≥ 2 and for p = 2 if m ≥ 3.
In this section we will establish
analogues of Theorem 3.1 for the simple algebras S(m; 1)(1) and H(m; 1)(2). We
GRADINGS ON RESTRICTED CARTAN TYPE LIE ALGEBRAS
5
will follow the approach of [13]. Suppose Φ : G → H is a morphism of algebraic
group schemes. Let Gred and Hred be the largest smooth subgroupschemes, which
will be regarded as algebraic groups.
In order for Φ to be an isomorphism, the
following two conditions are necessary:
A) the restriction Φ : Gred → Hred is a bijection;
B) the tangent map Lie(Φ) : Lie(G) → Lie(H) is a bijection.
However, unless G is known to be smooth (i.e., G = Gred), these two conditions
are not sufficient for Φ to be an isomorphism. In general, one has to show that
the associated map of distribution algebras eΦ : G → H is surjective. (The two
conditions above imply that eΦ : G → H is injective.)
Recall that the distribution algebra G of an algebraic group scheme G is a con-
nected cocommutative Hopf algebra (see e.g. [8] for background on Hopf algebras),
with the space of primitive elements Prim(G) = Lie(G) of finite dimension. Hence
Lie(G) has a descending chain of restricted Lie subalgebras (see e.g. [12] or [4, II,
§3, No. 2]):
Lie(G) = Lie0(G) ⊃ Lie1(G) ⊃ Lie2(G) ⊃ . . . ,
defined by Liek(G) := Liek(G) = Vk(G) ∩ Prim(G), where V : G → G is the Ver-
schiebung operator (see e.g. [12, Theorem 1] or [4, II, §2, No. 7]). The intersection
of this chain is Lie(Gred), which can be identified with the tangent algebra of the
algebraic group Gred.
Recall that a sequence of elements 1 = 0h, 1h, . . . , nh in a connected cocom-
mutative Hopf algebra G is called a sequence of divided powers (lying over 1h) if
ih ⊗ j−ih for all j = 1, . . . , n. It follows that 1h ∈ Prim(G) and
that ε(jh) = 0 for all j = 1, . . . , n. It is easy to see that Vk(pk
h) = 1h for any
pk ≤ n. Hence, if there exists a sequence of divided powers of length pk lying over
h ∈ Prim(G), then h ∈ Liek(G). The converse is also true [12, Theorem 2].
∆(jh) = Pj
i=0
Now we come back to the problem of proving that a morphism Φ : G → H of
algebraic group schemes is an isomorphism. Assuming that Φ satisfies the above
H. Regarding H as a Hopf subalgebra in the distribution algebra of GL(V ) for a
suitable space V , we can apply [4, II, §3, No. 2, Corollary 1] to conclude that
two conditions, we need to show that the Hopf subalgebra eΦ(G) ⊂ H in fact equals
eΦ(G) = H if and only if
C) Lie(Φ) maps Liek(G) onto Liek(H) for all k.
Here we are interested in the case G = Aut(O), where O = O(m; 1), and its
subgroupschemes AutS(O) := StabG(hωSi) and AutH (O) := StabG(hωH i). We
have
Lie(Aut(O)) = Der(O) = W ;
Aut(O)red = Aut(O),
AutS(O)red = StabAut(O)(hωSi),
Lie(AutS(O)) = StabW (hωSi) =: CS;
AutH (O)red = StabAut(O)(hωH i), Lie(AutH (O)) = StabW (hωH i) =: CH.
We will denote StabAut(O)(hωSi) by AutS(O) and StabAut(O)(hωH i) by AutH (O)
for brevity.
Assume p > 3.
It is known that the morphism Ad : Aut(O) → Aut(W )
as well as its restrictions AutS(O) → Aut(S(1)) (m ≥ 3) and AutH (O) →
Aut(H (2)) (m = 2r) induce bijections Aut(O) → Aut(W ), AutS(O) → Aut(S(1))
and AutH (O) → Aut(H (2)) -- see e.g. [11, Theorem 7.3.2]. Also, the tangent map
ad : W → Der(W ) as well as its restrictions CS → Der(S(1)) and CH → Der(H (2))
6
BAHTURIN AND KOCHETOV
are bijective -- see e.g. [11, Theorem 7.1.2]. Thus, the above conditions A) and B)
are satisfied for the morphisms Aut(O) → Aut(W ), AutS(O) → Aut(S(1)) and
AutH (O) → Aut(H (2)).
By [1, Lemma 3.5, 2], Liek(Aut(O)) = StabW (M) = W(0) for all k > 0. Hence,
for k > 0, we have
Liek(AutS(O)) ⊂ Liek(Aut(O)) ∩ CS = CS(0),
Liek(AutH (O)) ⊂ Liek(Aut(O)) ∩ CH = CH(0).
On the other hand, Lie(AutS(O)) = CS(0) and Lie(AutH (O)) = CH(0). It follows
that, in fact,
(1)
Liek(AutS(O)) = CS(0) and Liek(AutH (O)) = CH(0) for all k > 0.
By [1, Lemma 3.5, 4], Liek(Aut(W )) = ad (W(0)) for all k > 0, so condition
C) is satisfied for the morphism Aut(O) → Aut(W ). This is how Theorem 3.1 is
proved in [13]. We are now ready to prove our analogues for S and H.
Theorem 3.2. Let O = O(m; 1), m ≥ 3, and S(1) = S(m; 1)(1). Let
AutS(O) = StabAut(O)(hωSi).
Assume p > 3. Then the morphism Ad : AutS(O) → Aut(S(1)) is an isomorphism
of group schemes.
Proof. By the above discussion, we have to prove that condition C) is satisfied for
Ad : AutS(O) → Aut(S(1)). Let G be the distribution algebra of Aut(S(1)). In
view of (1), it suffices to show that Lie1(G) ⊂ ad (CS(0)). In other words, we have
to verify, for any D ∈ CS, that if D /∈ CS(0), then ad D /∈ Lie1(G). We can write
D = λ1∂1 + · · · + λm∂m + D0 where D0 ∈ CS(0) and the scalars λ1, . . . λm are not
all zero. Now, D0 ∈ Lie1(AutS(O)) implies ad D0 ∈ Lie1(G), so it suffices to prove
that ad (λ1∂1 + · · · + λm∂m) /∈ Lie1(G). Applying an automorphism of O induced
by a suitable linear transformation on the space Span {∂1, . . . , ∂m}, we may assume
without loss of generality that D = ∂1.
By way of contradiction, assume that ad ∂1 ∈ Lie1(G). Then there exists a
sequence of divided powers 1 = 0h, 1h, . . . , ph in G such that 1h = ad ∂1.
As pointed out in the proof of [1, Lemma 3.5, 4], it follows from [12, Lemma 7]
that we may assume without loss of generality that kh = 1
k! (1h)k for k = 0, . . . , p−1.
The distribution algebra G acts canonically on S(1), so we have a homomorphism
η : G → End (S(1)). The restriction of η to Prim(G) = Der(S(1)) is the identity
map. Let kδ = η(kh) for k = 0, . . . , p. Then we have
(2)
kδ =
1
k!
(ad ∂1)k for k = 0, . . . , p − 1,
and, since S(1) is a G-module algebra,
(3)
kδ([X, Y ]) =
kXj=0(cid:2)jδ(X), k−j δ(Y )(cid:3) for all k = 0, . . . , p and X, Y ∈ S(1).
Note that the action of G on S(1) extends canonically to the universal enveloping
algebra U (S(1)) and, since the p-map of S(1) is uniquely determined, the G-action
passes on to the restricted enveloping algebra u(S(1)). By abuse of notation, we
GRADINGS ON RESTRICTED CARTAN TYPE LIE ALGEBRAS
7
will use kδ to denote the action of kh on u(S(1)) as well as on S(1). We note for
future reference that
(4)
kδ(XY ) =
(jδ)(X) (k−j δ)(Y ) for all k = 0, . . . , p and X, Y ∈ u(S(1)).
kXj=0
Observe that if we replace pδ by pδ + ξ, where ξ is any derivation of S(1), then
equations (3) and (4) will still hold (with the same 0δ, . . . , p−1δ). We will use this
observation to simplify the operator pδ.
Let zi = 1 + xi, i = 1, . . . , m. For each multi-index α ∈ Z(m;1), we set
zα = zα1
1 · · · zαm
m .
Since zp
i = 1 for all i, we may regard the components of α as elements of the cyclic
group Zp when dealing with zα. It is this property that will make the basis {zα}
of O = O(m; 1) more convenient for us than the standard basis {xα}.
Recall [11, Section 4.2] that S(1) = S(m; 1)(1) is spanned by the elements of the
form
where f ∈ O and 1 ≤ i < j ≤ m. Hence, S(1) is spanned by the elements
Di,j(f ) := ∂j(f )∂i − ∂i(f )∂j
Di,j(zα) = αjzα−εj ∂i − αizα−εi∂j.
For the calculations we are about to carry out, we will need the following:
Lemma 3.3. For any 1 ≤ i < j ≤ m and α, β ∈ Z(m;1), the commutator
is given by the following expressions:
(cid:2)D1,2(zα), Di,j (zβ)(cid:3)
(5)
(6)
(7)
(8)
− (α1β2 − α2β1)Di,j(zα+β−ε1−ε2 ) if 2 < i < j;
− (α1(β2 − 1) − α2β1)D2,j(zα+β−ε1−ε2 ) if 2 = i < j;
−α1βjD1,2(zα+β−ε1−εj ) + α2β1D1,j(zα+β−ε1−ε2 ) − α1β1D2,j(zα+β−2ε1)
if i = 1, j > 2;
− (α1β2 − α2β1)D1,2(zα+β−ε1−ε2 ) if i = 1, j = 2.
Proof. The verification of the above expressions is straightforward. Here we will
verify (7), which is somewhat special, and leave the rest to the reader. We have,
for j > 2,
(cid:2)D1,2(zα), D1,j(zβ)(cid:3) =(cid:2)α2zα−ε2∂1 − α1zα−ε1∂2, βjzβ−εj ∂1 − β1zβ−ε1∂j(cid:3)
= α2βjβ1zα+β−ε1−ε2−εj ∂1 − α2βjα1zα+β−ε1−ε2−εj ∂1
+ α2β1αjzα+β−ε1−ε2−εj ∂1 − α2β1(β1 − 1)zα+β−2ε1−ε2 ∂j
+ α1βj(α1 − 1)zα+β−2ε1−εj ∂2 − α1βjβ2zα+β−ε1−ε2−εj ∂1
+ α1β1β2zα+β−2ε1−ε2 ∂j − α1β1αjzα+β−2ε1−εj ∂2
=(α2βjβ1 − α2βjα1 + α2β1αj − α1βjβ2)zα+β−ε1−ε2−εj ∂1
+ α1(βj(α1 − 1) − β1αj)zα+β−2ε1−εj ∂2
+ β1(−α2(β1 − 1) + α1β2)zα+β−2ε1−ε2 ∂j.
8
BAHTURIN AND KOCHETOV
Comparing the above with
D1,2(zα+β−ε1−εj ) =(α2 + β2)zα+β−ε1−ε2−εj ∂1 − (α1 + β1 − 1)zα+β−2ε1−εj ∂2,
D1,j(zα+β−ε1−ε2 ) =(αj + βj)zα+β−ε1−ε2−εj ∂1 − (α1 + β1 − 1)zα+β−2ε1−ε2 ∂j,
D2,j(zα+β−2ε1) =(αj + βj)zα+β−2ε1−εj ∂2 − (α2 + β2)zα+β−2ε1−ε2 ∂j,
one readily sees that (7) holds.
Another useful fact is the following:
(cid:3)
(9)
[∂ℓ, Di,j(f )] = Di,j(∂ℓ(f )) for all i, j, ℓ = 1, . . . , m and f ∈ O.
The remaining part of the proof of Theorem 3.2 will be divided into four steps.
Step 1: Without loss of generality, we may assume
(10)
pδ (D1,2(z1z2)) = 0.
Substituting α = ε1 + ε2 into expressions (5) through (8), we see that each
nonzero element Di,j(zβ) is an eigenvector for the operator ad D1,2(z1z2), with
eigenvalue λ(i, j, β) = β1 − β2 − 1, β1 − β2 or β1 − β2 + 1, depending on i, j. (For the
case i = 1 and j > 2, one has to combine the first and the third terms in expression
(7), which gives −(β2 + 1)D1,j(zβ).) Since λ(i, j, β) is in the field GFp, we have
D1,2(z1z2) = D1,2(z1z2)p. Applying the operator pδ to both sides and using (4),
we obtain:
pδ (D1,2(z1z2)) = Xi1+···+ip=p
(i1 δ) (D1,2(z1z2)) · · · (ip δ) (D1,2(z1z2))
Taking into account (2) and (9), we see that kδ (D1,2(z1z2)) = 0 for 1 < k < p.
Hence,
(11)
pδ (D1,2(z1z2)) =(cid:0)1δ (D1,2(z1z2))(cid:1)p
+
D1,2(z1z2)k(pδ) (D1,2(z1z2)) D1,2(z1z2)p−k−1.
p−1Xk=0
p−1Xk=0
Since 1δ (D1,2(z1z2)) = [∂1, D1,2(z1z2)] = D1,2(z2) = ∂1 and ∂p
1 = 0, the first term
on the right-hand side of (11) vanishes. The second term can be rewritten using
the identity
X k Y X p−k−1 = (ad X)p−1(Y ),
where X = D1,2(z1z2) and Y = pδ(X). Thus, (11) yields
Y = (ad D1,2(z1z2))p−1 (Y ).
It follows that Y can be written as a linear combination of those Di,j(zβ) for which
the eigenvalue λ(i, j, β) is nonzero:
pδ (D1,2(z1z2)) = Xi,j,β : λ(i,j,β)6=0
σi,j
β Di,j(zβ).
It remains to replace pδ with
pδ +Xi,j,β
σi,j
β
λ(i, j, β)
ad Di,j(zβ),
GRADINGS ON RESTRICTED CARTAN TYPE LIE ALGEBRAS
9
to complete Step 1.
Step 2: Without loss of generality, we may assume that, in addition to (10), we
pδ(∂1) = Xi,j,β : β1=p−1
τ i,j
β Di,j(zβ)
also have
(12)
for some scalars τ i,j
β .
pδ(∂1) =
(13)
Now replace pδ with
By (9), we have [∂1, D1,2(z1z2)] = ∂1. Applying the operator pδ to both sides
and using (3), (2) and (10), we obtain:
Hence [D1,2(z1z2), Y ] = −Y where Y = pδ(∂1). It follows that Y can be written as
a linear combination of those Di,j(zβ) for which the eigenvalue λ(i, j, β) is −1:
pXk=0(cid:2)kδ(∂1), p−kδ(D1,2(z1z2))(cid:3) = [pδ(∂1), D1,2(z1z2)] .
pδ(∂1) = Xi,j,β : λ(i,j,β)=−1
pδ + Xi,j,β : β16=p−1
ad Di,j(zβ+ε1).
τ i,j
β Di,j(zβ).
τ i,j
β
β1 + 1
Using (9), one readily sees that, for the new pδ, we have (12), because all terms
with β1 6= p − 1 in the right-hand side of (13) will cancel out. It remains to check
that we still have (10) for the new pδ.
In other words, we have to check that
[D1,2(z1z2), Di,j (zβ+ε1)] = 0 for all i, j, β with τ i,j
6= 0. But this is clear, because
β
λ(i, j, β + ε1) = λ(i, j, β) + 1 and thus we have λ(i, j, β + ε1) = 0 for all i, j, β that
occur in the right-hand side of (13). Step 2 is complete.
Step 3: For any element X = f1∂1 + · · · + fm∂m ∈ W , define
pr1(X) := f1 ∈ O.
Assume (10) and (12). Then, for any k = 1, . . . , p − 1, pr1(cid:0)pδ(D1,2(zk
linear combination of zγ with 0 ≤ γ1 < k.
1 z2))(cid:1) is a
We proceed by induction on k. The basis for k = 1 follows from (10). Now
suppose the claim holds for some k ≥ 1. By (9), we have
z2)] = (k + 1)D1,2(zk
[∂1, D1,2(zk+1
1
1 z2).
Applying the operator pδ to both sides, we obtain
(14)
pδ([∂1, D1,2(zk+1
1
z2)]) = (k + 1)(pδ)(D1,2(zk
1 z2)).
Using (3),(2) and (12), the left-hand side of (14) becomes
Xi,j,β : β1=p−1
Setting Y = pδ(D1,2(zk+1
1
z2)), we can rewrite (14) as follows:
(15) [∂1, Y ] = (k + 1)(pδ)(D1,2(zk
τ i,j
β Di,j(zβ), D1,2(zk+1
1
1
z2) +(cid:2)∂1, pδ(D1,2(zk+1
β (cid:2)D1,2(zk+1
τ i,j
1
z2))(cid:3) .
z2), Di,j(zβ)(cid:3) .
1 z2)) + Xi,j,β : β1=p−1
10
BAHTURIN AND KOCHETOV
Our goal is to show that monomials zγ with γ1 ≥ k + 1 do not occur in f1 :=
pr1(Y ). Since pr1[∂1, Y ] = ∂1f1, it suffices to show that elements zγ∂1 with γ1 ≥ k
do not occur in the right-hand side of (15), when it is regarded as an element of
W . The induction hypothesis tells us that such elements do not occur in the first
term of the right-hand side of (15). We are going to prove the same for the second
term.
In the case 2 < i < j, we have by (5):
Hence, no elements zγ∂1 occur here.
In the case 2 = i < j, we have by (6):
1
(cid:2)D1,2(zk+1
(cid:2)D1,2(zk+1
z2), Di,j (zβ)(cid:3) = (β1 − β2(k + 1))Di,j(zβ+kε1 ).
z2), Di,j(zβ)(cid:3) = (β1 − (β2 − 1)(k + 1))D2,j(zβ+kε1 ).
1
Again, no elements zγ∂1 occur.
In the case i = 1 and 2 < j, we can write(cid:2)D1,2(zk+1
β1 = p − 1, as follows:
1
z2), Di,j(zβ)(cid:3), using (7) and
−(k + 1)βjD1,2(zβ+kε1+ε2−εj ) − D1,j(zβ+kε1 ) + (k + 1)D2,j(zβ+(k−1)ε1+ε2 ).
Elements zγ∂1 occur only in the first two summands, and we have γ = β + kε1 − εj
in either case. Therefore, γ1 = β1 + k = k − 1 mod p (recall that we may take the
exponents of z modulo p).
In the case i = 1,j = 2, we have by β1 = p − 1 and (8):
(cid:2)D1,2(zk+1
1
z2), D1,2(zβ)(cid:3) = −((k + 1)β2 + 1)D1,2(zβ+kε1 ).
Hence, elements zγ∂1 occur with γ = β + kε1 − ε2. Once again, γ1 = k − 1 mod p.
The inductive proof of Step 3 is complete.
Step 4: We can finally obtain a contradiction. By (8), we have
hD1,2(zp−1
1
z2), D1,2(z2
1z2)i = 3D1,2(z2) = 3∂1.
Applying pδ and taking into account (3), (2) and (12), we obtain:
(16)
τ i,j
β Di,j(zβ)
1
3 Xi,j,β : β1=p−1
=hpδ(D1,2(zp−1
+(cid:20)D1,2(cid:18)
+(cid:20)D1,2(cid:18)
1
1
(p − 1)!
(p − 2)!
z2)), D1,2(z2
z2), pδ(D1,2(z2
1
1z2)i +hD1,2(zp−1
z2)(cid:19) , D1,2(cid:18) 1
z2)(cid:19) , D1,2(cid:18) 1
1!
2!
(zp−1
1
(zp−1
1
∂1(z2
1 (z2
∂2
1z2)(cid:19)(cid:21)
1z2)(cid:19)(cid:21) .
∂p−1
1
∂p−2
1
1z2))i
One readily verifies that the sum of the third and fourth terms in the right-hand
side of (16) is 3∂1. Let us consider the first and the second terms. Denote
X := pδ(D1,2(zp−1
1
z2)) and Y := pδ(D1,2(z2
1z2)).
By Step 3, we know that pr1(X) is a linear combination of zγ with 0 ≤ γ1 ≤ p − 2
and pr1(Y ) is a linear combination of zγ with 0 ≤ γ1 ≤ 1.
GRADINGS ON RESTRICTED CARTAN TYPE LIE ALGEBRAS
11
1z2) = z2
Since D1,2(z2
on z1 and hence all terms with ∂1 in the commutator [X, D1,2(z2
terms with ∂1 in X. In other words,
1∂1 − 2z1z2∂2, we see that the coefficient of ∂1 depends only
1z2)] come from
pr1[X, D1,2(z2
1z2)] = pr1[pr1(X)∂1, D1,2(z2
1z2)].
Since
[zγ∂1, D1,2(z2
1z2)] = (2 − γ1 + 2γ2)zγ+ε1∂1 − 2zγ+ε2∂2,
we conclude that pr1[X, D1,2(z2
1z2)] is a linear combination of monomials zγ+ε1
with 0 ≤ γ1 ≤ p − 2. Therefore, elements zα∂1 with α1 = 0 do not occur in the
first term in the right-hand side of (16).
∂1 + zp−2
z2), Y ] = pr1[D1,2(zp−1
z2) = zp−1
pr1[D1,2(zp−1
z2∂2, we also see that
Since D1,2(zp−1
z2), pr1(Y )∂1].
1
1
1
1
1
Since
[D1,2(zp−1
1
z2), zγ∂1] = (1 + γ1 + γ2)zγ+(p−2)ε1∂1 + 2zγ+(p−3)ε1+ε2 ∂2,
we conclude that pr1[D1,2(zp−1
z2), Y ] is a linear combination of monomials zγ+(p−2)ε1
with 0 ≤ γ1 ≤ 1. Therefore, elements zα∂1 with α1 = 0 do not occur in the second
term in the right-hand side of (16).
1
Finally, all elements zα∂1 that occur in the left-hand side of (16) have α1 = p−1.
Summarizing our analysis, we obtain
3∂1 = 0,
which is a contradiction, since p > 3. The proof of Theorem 3.2 is complete.
(cid:3)
Corollary 3.4. Under the assumptions of Theorem 3.2,
Liek(Aut(S(1))) = ad (CS(0)) for all k > 0.
Theorem 3.5. Let O = O(m; 1), m = 2r, and H (2) = H(m; 1)(2). Let
AutH (O) = StabAut(O)(hωH i).
Assume p > 3. Then the morphism Ad : AutH (O) → Aut(H (2)) is an isomor-
phism of group schemes.
Proof. Let G be the distribution algebra of Aut(H (2)). As in the proof of Theorem
3.2, we have to show that Lie1(G) ⊂ ad (CH(0)) -- i.e., for any D ∈ CH, if D /∈
CH(0), then ad D /∈ Lie1(G). Again, we can write D = λ1∂1+· · ·+λm∂m+D0 where
D0 ∈ CH(0) and the scalars λ1, . . . λm are not all zero. Since D0 ∈ Lie1(AutH (O))
implies ad D0 ∈ Lie1(G), it suffices to prove that ad (λ1∂1 + · · · + λm∂m) /∈ Lie1(G).
Applying an automorphism of O induced by a suitable symplectic transformation
on the space Span {∂1, . . . , ∂m}, we may assume without loss of generality that
D = ∂1.
By way of contradiction, assume that ad ∂1 ∈ Lie1(G). Then there exists a
sequence of divided powers 1 = 0h, 1h, . . . , ph in G such that 1h = ad ∂1. We may
assume without loss of generality that kh = 1
k! (1h)k for k = 0, . . . , p − 1.
The distribution algebra G acts canonically on H (2), so we have a homomorphism
η : G → End (H (2)). The restriction of η to Prim(G) = Der(H (2)) is the identity
map. Let kδ = η(kh) for k = 0, . . . , p. Then we have
(17)
kδ =
1
k!
(ad ∂1)k for k = 0, . . . , p − 1,
12
BAHTURIN AND KOCHETOV
and, since H (2) is a G-module algebra,
(18)
kδ([X, Y ]) =
kXj=0
[jδ(X), k−j δ(Y )] for all k = 0, . . . , p and X, Y ∈ H (2).
For the extended action of G on the restricted enveloping algebra u(H (2)), we have
(19)
kδ(XY ) =
kXj=0
(jδ)(X) (k−j δ)(Y ) for all k = 0, . . . , p and X, Y ∈ u(H (2)).
We may replace pδ by pδ + ξ, where ξ is any derivation of H (2), without affecting
equations (18) and (19). We will use this observation to simplify the operator pδ.
As in [11, Section 4.2], we define
σ(i) :=(cid:26) 1
−1
if i = 1, . . . , r;
if i = r + 1, . . . , 2r;
and
i′ := i + σ(i)r.
Also we define a map DH : O → H as follows:
DH (f ) :=
2rXi=1
σ(i)∂i(f )∂i′ .
Note that the kernel of DH is F1.
Let zi = 1 + xi, i = 1, . . . , 2r. For each multi-index α ∈ Z(2r;1), we set
zα = zα1
1 · · · zα2r
2r .
We may regard the components of α as elements of the cyclic group Zp when dealing
with zα. For the calculations we are about to carry out, we will need the following
formula:
(20)
(21)
In particular,
[DH (zα), DH (zβ)] = DH(cid:0)DH (zα)(zβ)(cid:1) for all α, β ∈ Z(2r;1).
[∂ℓ, DH(zβ)] = DH(cid:0)∂ℓ(zβ)(cid:1) for all ℓ = 1, . . . , 2r and β ∈ Z(2r;1).
Let τ = (p − 1, . . . , p − 1) ∈ Z(2r;1). It follows from [11, Section 4.2] that
{DH(zα) 0 < α < τ } is a basis of H (2).
The remaining part of the proof of Theorem 3.5 will be divided into four steps,
which are similar to the steps in the proof of Theorem 3.2.
Step 1: Without loss of generality, we may assume
(22)
pδ (DH(z1zr+1)) = 0.
Substituting α = ε1 +ε2 into equation (20), we see that DH (zβ) is an eigenvector
for the operator ad DH (z1zr+1), with eigenvalue βr+1 − β1. Since βr+1 − β1 is in
the field GFp, we have DH (z1zr+1) = DH (z1zr+1)p. Applying the operator pδ to
both sides and using (19), we obtain:
pδ (DH(z1zr+1)) = Xi1+···+ip=p
(i1 δ) (DH (z1zr+1)) · · · (ip δ) (DH (z1zr+1))
p−1Xk=0
p−1Xk=0
GRADINGS ON RESTRICTED CARTAN TYPE LIE ALGEBRAS
13
Taking into account (17) and (21), we see that kδ (DH (z1zr+1)) = 0 for 1 < k < p.
Hence,
(23)
pδ (DH (z1zr+1)) =(cid:0)1δ (DH (z1zr+1))(cid:1)p
+
DH (z1zr+1)k(pδ) (DH (z1zr+1)) DH (z1zr+1)p−k−1.
Since 1δ (DH(z1zr+1)) = [∂1, DH(z1zr+1)] = DH(zr+1) = −∂1 and ∂p
1 = 0, the first
term on the right-hand side of (23) vanishes. The second term can be rewritten
using the identity
X k Y X p−k−1 = (ad X)p−1(Y ),
where X = DH(z1zr+1) and Y = pδ(X). Thus, (23) yields
Y = (ad DH (z1zr+1))p−1 (Y ).
It follows that Y is a linear combination of those DH (zβ) for which the eigenvalue
βr+1 − β1 is nonzero:
It remains to replace pδ with
pδ (DH (z1zr+1)) = Xβ : βr+16=β1
σβDH (zβ).
pδ +Xβ
σβ
βr+1 − β1
ad DH (zβ),
Step 2: Without loss of generality, we may assume that, in addition to (22), we
to complete Step 1.
also have
(24)
for some scalars τβ.
pδ(∂1) = Xβ : β1=p−1
τβDH (zβ)
By (21), we have [∂1, DH(z1zr+1)] = −∂1. Applying the operator pδ to both
sides and using (18), (17) and (22), we obtain:
−pδ(∂1) =
pXk=0(cid:2)kδ(∂1), p−kδ(DH (z1zr+1))(cid:3) = [pδ(∂1), DH (z1zr+1)] .
Hence [DH(z1zr+1), Y ] = Y where Y = pδ(∂1). It follows that Y is a linear combi-
nation of those DH(zβ) for which the eigenvalue βr+1 − β1 is 1:
(25)
Now replace pδ with
pδ(∂1) = Xβ : βr+1−β1=1
pδ + Xβ : β16=p−1
β1 + 1
τβ
τβDH (zβ).
ad DH(zβ+ε1).
Using (21), one readily sees that, for the new pδ, we have (24), because all terms
with β1 6= p − 1 in the right-hand side of (25) will cancel out. It remains to check
that we still have (22) for the new pδ.
In other words, we have to check that
[DH(z1zr+1), DH (zβ+ε1)] = 0 for all β with τβ 6= 0. But this is clear, because we
14
BAHTURIN AND KOCHETOV
have βr+1 − (β1 + 1) = 0 for all β that occur in the right-hand side of (25). Step 2
is complete.
Step 3: Assume (22) and (24). Then, for any k = 1, . . . , p − 1, pδ(DH (zk
1 zr+1))
is a linear combination of DH (zγ) with 0 ≤ γ1 < k.
We proceed by induction on k. The basis for k = 1 follows from (22). Now
suppose the claim holds for some k ≥ 1. By (21), we have
[∂1, DH(zk+1
1
zr+1)] = (k + 1)DH(zk
1 zr+1).
Applying the operator pδ to both sides and taking into account (18) and (17), we
obtain
(26) [pδ(∂1), DH (zk+1
1
zr+1)]+[∂1, pδ(DH (zk+1
1
zr+1))] = (k+1)(pδ)(DH (zk
1 zr+1)).
Writing
(27)
pδ(DH (zk+1
1
zr+1)) = X0<γ<τ
σγDH (zγ)
and taking into account (24), (20) and (21), we can rewrite the left-hand side of
(26) as follows:
τβ[DH (zβ), DH (zk+1
1
σγ[∂1, DH (zγ)]
zr+1)] +Xγ
Xβ : β1=p−1
= − Xβ : β1=p−1
= − Xβ : β1=p−1
= − Xβ : β1=p−1
1
τβDH (((k + 1)zk
1 zr+1∂r+1 − zk+1
∂1)(zβ)) +Xγ
τβDH ((k + 1)βr+1zβ+kε1 − β1zβ+kε1) +Xγ
τβ((k + 1)βr+1 + 1)DH (zβ+kε1 ) +Xγ
σγγ1DH (zγ−ε1).
σγDH (∂1(zγ))
σγγ1DH (zγ−ε1)
Setting τ ′
β := τβ((k + 1)βr+1 + 1), we can now rewrite (26) as follows:
(28) Xγ
σγγ1DH (zγ−ε1) = (k + 1)(pδ)(DH (zk
1 zr+1)) + Xβ : β1=p−1
βDH (zβ+kε1).
τ ′
Since the induction hypothesis applies to the first term in the right-hand side of
(28), we see that all elements DH (zα) that occur in the right-hand side have 0 ≤
α1 ≤ k − 1. Comparing this with the left-hand side, we conclude that for any γ
with σγ 6= 0 we have either γ1 = 0 or 0 ≤ γ1 − 1 ≤ k − 1. Hence the elements
DH(zγ) that occur in the right-hand side of (27) have 0 ≤ γ1 ≤ k.
The inductive proof of Step 3 is complete.
Step 4: We can finally obtain a contradiction. By (20), we have
[DH(z2
1zr+1), DH (zp−1
1
zr+1)] = 3DH(zr+1) = −3∂1.
GRADINGS ON RESTRICTED CARTAN TYPE LIE ALGEBRAS
15
Applying pδ and taking into account (18) and (17), we obtain:
−3(pδ)(∂1) =[pδ(DH (z2
1zr+1)), DH (zp−1
1
zr+1)] + [DH (z2
1zr+1), pδ(DH (zp−1
1
+(cid:20)DH(cid:18) 1
+(cid:20)DH(cid:18) 1
1!
∂1(z2
∂2
1(z2
1zr+1)(cid:19) , DH(cid:18)
1zr+1)(cid:19) , DH(cid:18)
1
(p − 1)!
1
(p − 2)!
=[pδ(DH (z2
2!
1zr+1)), DH (zp−1
+ 3[DH(z1zr+1), DH (zr+1)]
1zr+1)), DH (zp−1
=[pδ(DH (z2
1
1
∂p−1
1
(zp−1
1
∂p−2
1
(zp−1
1
)zr+1(cid:19)(cid:21)
)zr+1(cid:19)(cid:21)
zr+1)] + [DH (z2
1zr+1), pδ(DH (zp−1
1
zr+1)] + [DH (z2
1zr+1), pδ(DH (zp−1
1
zr+1))]
zr+1))]
zr+1))]
− 3∂1.
So we have
(29)
3∂1 =[pδ(DH (z2
1zr+1)), DH (zp−1
1
+ 3(pδ)(∂1).
By Step 3, we know that
zr+1)] + [DH (z2
1zr+1), pδ(DH (zp−1
1
zr+1))]
pδ(DH (z2
pδ(DH (zp−1
1
1zr+1)) = Xα : 0≤α1≤1
zr+1)) = Xα : 0≤α1≤p−2
σ(2)
α DH(zα);
σ(p−1)
α DH (zα).
Hence, by (20) we obtain:
[pδ(DH (z2
1zr+1)), DH (zp−1
1
zr+1)]
α [DH (zα), DH(zp−1
σ(2)
1
zr+1)]
α DH ((−zp−2
σ(2)
1
zr+1∂r+1 − zp−1
1
∂1)(zα))
α (αr+1 + α1)DH (zα−2ε1 ),
σ(2)
= Xα : 0≤α1≤1
= − Xα : 0≤α1≤1
= Xα : 0≤α1≤1
= Xα : 0≤α1≤p−2
= Xα : 0≤α1≤p−2
= Xα : 0≤α1≤p−2
and, similarly,
[DH (z2
1zr+1), pδ(DH (zp−1
1
zr+1))]
1zr+1), DH (zα)]
σ(p−1)
α
[DH (z2
α DH((2z1zr+1∂r+1 − z2
σ(p−1)
1∂1)(zα))
σ(p−1)
α
(2αr+1 − α1)DH (zα+ε1 ).
σ(2)
α (αr+1 + α1)DH (zα−2ε1)
σ(p−1)
α
(2αr+1 − α1)DH (zα+ε1 )
3∂1 = Xα : 0≤α1≤1
+ Xα : 0≤α1≤p−2
+ 3 Xβ : β1=p−1
τβDH (zβ).
16
BAHTURIN AND KOCHETOV
Using the above calculations and (24), we can rewrite (29) as follows:
This equation is impossible, because p > 3 and none of the sums in the right-hand
side involves DH (zr+1). The proof of Theorem 3.5 is complete.
(cid:3)
Corollary 3.6. Under the assumptions of Theorem 3.5,
Liek(Aut(H (2))) = ad (CH(0)) for all k > 0.
4. Group gradings
Let G be an abelian group. In this section we will give a classification of G-
gradings on the algebra O = O(m; 1) and on the simple Lie algebras W (m; 1),
S(m; 1)(1) (m ≥ 3) and S(2; 1)(2) = H(2; 1)(2).
End (O). It is easy to see that W = Der(O) is a graded subspace, so it inherits a
Given a G-grading ΓO : O = Lg∈G Og, we obtain an induced grading on
G-grading, which will be denoted by ΓW : W =Lg∈G Wg. The spaces Ωk also re-
ceive G-gradings in a natural way, and one can verify that the maps d : Ωk → Ωk+1
respect the G-gradings. (The canonical Z-gradings of W and Ωk are induced by
the canonical Z-grading of O in this manner.) However, S = S(m; 1) (respectively,
H = H(m; 1)) is not a graded subspace of W , in general. It is certainly a graded
subspace if we assume that ωS (respectively, ωH) is a homogeneous element with
respect to the G-grading on Ωm (respectively, Ω2).
Definition 4.1. We will say that a G-grading ΓO : O =Lg∈G Og is S-admissible
(respectively, H-admissible) of degree g0 ∈ G if the form ωS (respectively, ωH ) is a
homogeneous element of degree g0.
If ΓO is S-admissible (respectively, H-admissible), then we will denote the in-
duced G-gradings on S (respectively, H) and its derived algebra(s) by ΓS (respec-
tively, ΓH ).
We will now recall the connection between group gradings on an algebra and
certain subgroupschemes of its automorphism group scheme. Let U be an algebra.
For any group G, a G-grading on U is equivalent to a structure of an FG-comodule
algebra (see e.g.
[8]). Assuming U finite-dimensional and G finitely generated
abelian, we can regard this comodule structure as a morphism of algebraic group
schemes GD → Aut(U ) where GD is the Cartier dual of G, i.e., the group scheme
represented by the commutative Hopf algebra FG. Two G-gradings are isomorphic
if and only if the corresponding morphisms GD → Aut(U ) are conjugate by an
automorphism of U .
If char F = 0, then GD = bG, the algebraic group of multiplicative characters of
G, and Aut(U ) = Aut(U ), the algebraic group of automorphisms. The image of bG
in Aut(U ) is a quasitorus, i.e., a diagonalizable algebraic group. The G-grading on
U is, of course, the eigenspace decomposition of U with respect to this quasitorus.
Hence, group gradings on U correspond to quasitori in Aut(U ).
GRADINGS ON RESTRICTED CARTAN TYPE LIE ALGEBRAS
17
Here we are interested in the case char F = p > 0. Then we can write G =
p ,
Gp′ × Gp where Gp′ has no p-torsion and Gp is a p-group. Hence GD =dGp′ × GD
p is finite and connected. The algebraic group dGp′
where dGp′
(which is equal to bG) is a quasitorus, and it acts by automorphisms of U as follows:
is smooth and GD
χ ∗ X = χ(g)X for all X ∈ Ug and g ∈ G.
If Gp is an elementary p-group, then the distribution algebra of GD
p is the restricted
enveloping algebra u(T ) where T is the group of additive characters of Gp, regarded
as an abelian restricted Lie algebra. If {a1, . . . , as} is a basis of Gp (as a vector
space over the field GFp), then the dual basis {t1, . . . , ts} of T has the property
(ti)p = ti for all i. Therefore, T is a torus in the sense of restricted Lie algebras. It
acts by derivations of U as follows:
t ∗ X = t(g)X for all X ∈ Ug and g ∈ G.
If Gp is not elementary, then the distribution algebra of GD
p is not generated by
primitive elements and hence its action on U does not reduce to derivations. Re-
gardless of what the case may be, the image of GD in Aut(U ) is a diagonalizable
subgroupscheme. In some sense, the G-grading on U is its eigenspace decomposition
(see e.g. [14]).
Now, Theorems 3.1 (where, as was pointed out, one can include the cases p = 2
and p = 3), 3.2 and 3.5 give us the following corollary.
Corollary 4.2. Let G be an abelian group. Let L be one of the following simple
Lie algebras: W = W (m; 1) (m ≥ 3 if p = 2 and m ≥ 2 if p = 3), S(1) = S(m; 1)(1)
(m ≥ 3 and p > 3) or H (2) = H(m; 1)(2) (m = 2r and p > 3). Then any G-grading
on L is induced by a G-grading on O = O(m; 1). More precisely,
1) The correspondence ΓO 7→ ΓW is a bijection between the G-gradings on O
and the G-gradings on W . It induces a bijection between the isomorphism
classes of these gradings.
2) The correspondence ΓO 7→ ΓS is a bijection between the S-admissible G-
gradings on O and the G-gradings on S(1). It induces a bijection between
the isomorphism classes of G-gradings on S(1) and the AutS(O)-orbits of
the S-admissible G-gradings on O.
3) The correspondence ΓO 7→ ΓH is a bijection between the H-admissible G-
gradings on O and the G-gradings on H (2). It induces a bijection between
the isomorphism classes of G-gradings on H (2) and the AutH (O)-orbits of
the H-admissible G-gradings on O.
Proof. Let Γ : L = Lg∈G Lg be a G-grading. Replacing G with the subgroup
generated by the support, we may assume that G is finitely generated. We also
obtain that the corresponding morphism GD → Aut(L) is a closed imbedding.
Consider the case L = W . Due to the isomorphism Ad : Aut(O) → Aut(L),
we obtain a closed imbedding GD → Aut(O), which corresponds to a G-grading
ΓO : O = Lg∈G Og (whose support also generates G, since otherwise we would
not have a closed imbedding). The induced G-grading ΓW on W is obtained by
inducing the FG-comodule structure from O to End (O) and then restricting to L,
which agrees with how Ad : Aut(O) → Aut(L) is defined. Therefore, Γ = ΓW .
18
BAHTURIN AND KOCHETOV
In the case L = S(1), we obtain a closed imbedding GD → AutS(O), so the
subspace hωSi of Ωm is GD-invariant, i.e., hωSi is an FG-subcomodule. Hence ωS
is a homogeneous element in the corresponding G-grading ΓO : O =Lg∈G Og.
The proof in the case L = H (2) is similar.
(cid:3)
Remark 4.3. It follows from the proof that the supports of the gradings ΓO, ΓW ,
ΓS and ΓH generate the same subgroup in G.
We will now describe all possible G-gradings on O = O(m; 1).
Proposition 4.4. Let O = O(m; 1) and let M be its unique maximal ideal. Let G
be an abelian group and let O =Lg∈G Og be a G-grading.
1) There exist elements y1, . . . , ym of M and 0 ≤ s ≤ m such that the elements
1 + y1, . . . , 1 + ys, ys+1, . . . , ym are G-homogeneous and {y1, . . . , ym} is a
basis of M modulo M2.
2) Let P = {g ∈ G Og 6⊂ M}. Then P is an elementary p-subgroup of G.
3) Let {b1, . . . , bs} be a basis of P . Then the elements y1, . . . , ym can be chosen
in such a way that the degree of 1 + yi is bi, for all i = 1, . . . , s.
Proof. 1) Pick a basis for O consisiting of G-homogeneous elements and select a
subset {f1, . . . , fm} of this basis that is linearly independent modulo F1⊕M2. Order
the elements fi so that f1, . . . , fs have a nonzero constant term and fs+1, . . . , fm
belong to M. Rescale f1, . . . , fs so that the constant term is 1. Let yi = fi − 1
for i = 1, . . . , s and yi = fi for i = s + 1, . . . , m. Then y1, . . . , ym is a basis of M
modulo M2.
2) Clearly, e ∈ P . If a, b ∈ P , then there exist elements u ∈ Oa and v ∈ Ob that
are not in M. Then the element uv ∈ Oab is not in M, so ab ∈ P . Also, since up is
a nonzero scalar, we have ap = e. It follows that P is an elementary p-subgroup.
3) Any element of O can be uniquely written as a (truncated) polynomial in the
variables 1 + y1, . . . , 1 + ys, ys+1, . . . , ym. Hence, for any g ∈ G,
(30) Og = Span {(1 + y1)j1 · · · (1 + ys)js yjs+1
m = g},
where a1, . . . , am ∈ G are the degrees of 1+y1, . . . , 1+ys, ys+1, . . . , ym, respectively.
It follows that a1, . . . , as generate P . Suppose they do not form a basis of P -- say,
as = aℓ1
m 0 ≤ ji < p, aj1
s+1 · · · yjm
1 · · · ajm
1 · · · aℓs−1
s−1 . Set eyi = yi for i 6= s and
eys := 1 + ys − (1 + y1)ℓ1 · · · (1 + ys−1)ℓs−1 .
eys = ys − (ℓ1y1 + · · · + ℓs−1ys−1)
Then 1 +ey1, . . . , 1 +eys−1,eys, . . . ,eym are homogeneous of degrees a1, . . . , am, respec-
tively. Also, eys ∈ M and
so ey1, . . . ,eym still form a basis of M modulo M2. We have decreased s by 1.
P . Finally, if {b1, . . . , bs} is another basis of P , we can write bj =Qs
Repeating this process as necessary, we may assume that {a1, . . . , as} is a basis of
, where
(ℓij) is a non-degenerate matrix with entries in the field GFp. Set
(mod M2),
i=1 aℓij
i
(1 + yi)ℓij − 1 for j = 1, . . . , s,
sYi=1
eyj :=
and eyj = yj for j = s + 1, . . . , m. Then ey1, . . . ,eym form a basis of M modulo M2,
and 1 +eyj is homogeneous of degree bj, j = 1, . . . , s.
(cid:3)
GRADINGS ON RESTRICTED CARTAN TYPE LIE ALGEBRAS
19
Remark 4.5. Without loss of generality, assume that G is generated by the support
of the grading O =Lg∈G Og. Let Q be the image of GD under the corresponding
closed imbedding GD → Aut(O). Let H = StabAut(O)(M). (In fact, H = Aut(O),
regarded as the largest smooth subgroupscheme of Aut(O).) Let Q0 = Q ∩ H.
Then P is the subgroup of G corresponding to the Hopf ideal of FG defining the
subgroupscheme Q0 of Q.
Proof. Let I0 be the Hopf ideal defining the subgroupscheme Q0 and let G0 be the
Og of the
This coarsening corresponds to the subgroupscheme Q0 ⊂ Q. Since Q0 stabilizes
(Og ∩ M). Hence Og ⊂ M for g 6= e
and Oe = F1 ⊕ (Oe ∩ M). Hence Og ⊂ M for all g /∈ G0, which proves P ⊂ G0.
To prove that P = G0, consider the Hopf ideal I of FG corresponding to P . Then
corresponding subgroup of G. Consider the coarsening O = Lg∈G/G0
G-grading induced by the natural homomorphism G → G/G0, i.e., Og =Lg∈g Og.
the subspace M ⊂ O, we have M =Lg∈G/G0
I ⊂ I0. The subgroupscheme eQ of Q defined by I acts trivially on each Og with
g ∈ P . It follows that eQ stabilizes M. Hence eQ ⊂ Q0 and I ⊃ I0.
The description of G-gradings on O(m; 1) resembles the description of G-gradings
on the matrix algebra Mn(F) -- see e.g.
[2, 5]. Namely, Proposition 4.4 shows
that the G-graded algebra O(m; 1) is isomorphic to the tensor product O(s; 1) ⊗
O(m − s; 1) where the first factor has a division grading (in the sense that each
homogeneous component is spanned by an invertible element) and the second factor
has an elementary grading (in the sense that it is induced by a grading of the
underlying vector space M/M2). The isomorphism in question is, of course, the one
defined by y1 7→ x1 ⊗1, . . . , ys 7→ xs ⊗1 and ys+1 7→ 1⊗x1, . . . , ym 7→ 1⊗xm−s. The
first factor, O(s; 1), is isomorphic to the group algebra FP as a G-graded algebra
(where FP has the standard P -grading, which is regarded as a G-grading).
(cid:3)
To state the classification of G-gradings on O up to isomorphism, we introduce
some notation.
Definition 4.6. Let P ⊂ G be an elementary p-subgroup of rank s, 0 ≤ s ≤ m.
Let t = m − s and let
γ = (g1, . . . , gt) ∈ Gt.
We endow the algebra O = O(m; 1) with a G-grading as follows. Select a basis
{b1, . . . , bs} for P and declare the degrees of 1 + x1, . . . , 1 + xs to be b1, . . . , bs,
respectively. Declare the degrees of xs+1, . . . , xm to be g1, . . . , gt, respectively. We
will denote the resulting G-grading on O by ΓO(G, b1, . . . , bs, g1, . . . , gt). Since the
gradings corresponding to different choices of basis for P are isomorphic to each
other, we will also denote this grading (abusing notation) by ΓO(G, P, γ).
Theorem 4.8. Let F be an algebraically closed field of characteristic p > 0. Let G
Definition 4.7. Let γ,eγ ∈ Gt. We will write γ ∼eγ if there exists a permutation
π of the set {1, . . . , t} such that egi ≡ gπ(i) (mod P ) for all i = 1, . . . , t.
be an abelian group. Let O =Lg∈G Og be a grading on the algebra O = O(m; 1)
Two G-gradings, ΓO(G, P, γ) and ΓO(G, eP ,eγ), are isomorphic if and only if P = eP
and γ ∼eγ (Definition 4.7).
over F. Then the grading is isomorphic to some ΓO(G, P, γ) as in Definition 4.6.
20
BAHTURIN AND KOCHETOV
1
(31)
· · · bℓis
defined by
s , then the automorphism of O defined by
Proof. Let y1, . . . , ym be as in Proposition 4.4. Let g1, . . . , gt ∈ G be the degrees
of ys+1, . . . , ym, respectively. Then the automorphism of O defined by yi 7→ xi,
xi 7→ xi for i = 1, . . . , s and xs+i 7→ xs+π(i) for i = 1, . . . , t,
i = 1, . . . , m, sends the grading O =Lg∈G Og to ΓO(G, b1, . . . , bs, g1, . . . , gt).
If egi = gπ(i), i = 1, . . . , t, for some permutation π, then the automorphism of O
sends ΓO(G, P,eγ) to ΓO(G, P, γ).
Ifegi = gibℓi1
sends ΓO(G, P,eγ) to ΓO(G, P, γ).
Hence, if γ ∼eγ as in Definition 4.7, then ΓO(G, P,eγ) is isomorphic to ΓO(G, P, γ).
invariants of the G-graded algebra O = Lg∈G Og. This is obvious for P , since
grading, O =Lg∈G Og, induced by the natural homomorphism G → G. It follows
from the definition of P that M is a G-graded subspace of O. Consequently, M2 is
also a G-graded subspace, and the quotient V := M/M2 inherits a G-grading:
P = {g ∈ G Og 6⊂ M}. Let G = G/P and consider the coarsening of the G-
It remains to show that the subgroup P and the equivalence class of γ are
xi 7→ xi for i = 1, . . . , s and xs+i 7→ xs+i
(1 + xj)ℓij for i = 1, . . . , t,
sYj=1
(32)
V = Va1 ⊕ · · · ⊕ Vaℓ.
and k1, . . . , kℓ are invariants of the G-graded algebra O = Lg∈G Og.
Let ki = dim Vai if ai 6= e and ki = dim Vai − s if ai = e. Clearly, a1, . . . , aℓ
If the G-
grading on O is ΓO(G, P, γ), then, up to a permutation, g1P = . . . = gk1 P = a1,
gk1+1P = . . . = gk1+k2 P = a2, and so on.
(cid:3)
Remark 4.9. Instead of using γ = (g1, . . . , gt) where some of the cosets giP may
be equal to each other, one can take multiplicities,
κ = (k1, . . . , kℓ) where ki are positive integers,
with κ := k1 + · · · + kℓ = t,
γ = (g1, . . . , gℓ) where gi ∈ G are such that g−1
i gj /∈ P for all i 6= j,
and write
ΓO(G, P, κ, γ) = ΓO(G, P, g1, . . . , g1
, . . . , gℓ, . . . , gℓ
same number of components ℓ and there exists a permutation π of the set {1, . . . , ℓ}
{z
Then ΓO(G, P, κ, γ) is isomorphic to ΓO(G, eP ,eκ,eγ) if and only if κ andeκ have the
such thateki = kπ(i) and egi ≡ gπ(i) (mod P ) for all i = 1, . . . , ℓ.
Definition 4.10. Fix 0 ≤ s ≤ m. For a multi-index α ∈ Zm, let
k1 times
kℓ times
{z
}
}
).
α := (α1 + pZ, . . . , αs + pZ, αs+1, . . . , αm) ∈ Zs
p × Zm−s.
Define a Zs
p × Zm−s-grading on O = O(m; 1) by declaring the degree of 1 + xi,
i = 1, . . . , s, and the degree of xi, i = s + 1, . . . , m, to be εi. This is the
grading ΓO(G, P, γ) where G = Zs
p, and
γ = (εs+1, . . . εm). We will denote this grading by ΓO(s).
p × Zm−s (written additively), P = Zs
GRADINGS ON RESTRICTED CARTAN TYPE LIE ALGEBRAS
21
Corollary 4.11. Let O = O(m; 1). Then, up to equivalence, there are exactly
m + 1 fine gradings of O. They are ΓO(s), s = 0, . . . , m. The universal group of
ΓO(s) is Zs
p × Zm−s.
Proof. All homogeneous components of ΓO(s) are 1-dimensional, so it is a fine
grading. All relations in the grading group Zs
p × Zm−s come from the fact that
0 6= (Og)p ⊂ Oe for certain elements g. Hence Zs
p × Zm−s is the universal group of
ΓO(s).
For any abelian group G and a p-subgroup P ⊂ G with a basis {b1, . . . , bs}, any
p × Zm−s-grading
G-grading ΓO(G, b1, . . . , bs, g1, . . . , gm−s) is induced from the Zs
ΓO(s) by the homomorphism Zs
p × Zm−s → G defined by
εi 7→ bi for i = 1, . . . , s, and εi 7→ gi−s for i = s + 1, . . . , m.
It follows that, up to equivalence, there are no other fine gradings. The grad-
ings ΓO(s) are pair-wise non-equivalent, because their universal groups are non-
isomorphic.
(cid:3)
Definition 4.12. The G-grading induced by ΓO(G, b1, . . . , bs, g1, . . . , gt) (Defini-
tion 4.6) on the Lie algebra W will be denoted by ΓW (G, b1, . . . , bs, g1, . . . , gt) or
ΓW (G, P, γ). Explicitly, we declare the degree of each element
(1 + x1)α1 · · · (1 + xs)αs xαs+1
s+1 · · · xαm
m ∂i where α ∈ Z(m;1), 1 ≤ i ≤ m,
to be
bα1−δi,1
1
· · · bαs−δi,s
s
gαs+1−δi,s+1
1
· · · gαm−δi,m
t
,
where δi,j is the Kronecker delta.
(Definition 4.10) will be denoted by ΓW (s).
In particular, the gradings induced by ΓO(s)
The following is a generalization of a result in [3] (see also [11, Corollary 7.5.2])
on maximal tori of the restricted Lie algebra W , which corresponds to the case
when G is an elementary p-group.
Theorem 4.13. Let F be an algebraically closed field of characteristic p > 0. Let G
be an abelian group. Let W = W (m; 1) over F. Assume m ≥ 3 if p = 2 and m ≥ 2
if p = 3. Then any grading W =Lg∈G Wg is isomorphic to some ΓW (G, P, γ) as
in Definition 4.12. Two G-gradings, ΓW (G, P, γ) and ΓW (G, eP ,eγ), are isomorphic
if and only if P = eP and γ ∼eγ (Definition 4.7).
Proof. A combination of Theorem 4.8 and Corollary 4.2.
(cid:3)
Corollary 4.14. Let W = W (m; 1). Assume m ≥ 3 if p = 2 and m ≥ 2 if p = 3.
Then, up to equivalence, there are exactly m + 1 fine gradings of W . They are
ΓW (s), s = 0, . . . , m. The universal group of ΓW (s) is Zs
(cid:3)
p × Zm−s.
We now turn to special algebras.
Proposition 4.15. In the notation of Proposition 4.4, assume that O =Lg∈G Og
is an S-admissible G-grading of degree g0. Then the elements y1, . . . , ym can be cho-
sen in such a way that the degrees a1, . . . , am ∈ G of 1 + y1, . . . , 1 + ys, ys+1, . . . , ym
(respectively) satisfy the equation g0 = a1 · · · am.
22
BAHTURIN AND KOCHETOV
Proof. Choose elements y1, . . . , ym as in Proposition 4.4. Let a1, . . . , am ∈ G be
the degrees of the elements 1 + y1, . . . , 1 + ys, ys+1, . . . , ym, respectively. We are
going to adjust y1, . . . , ym to make a1, . . . , am satisfy the above equation.
The form dy1 ∧ · · · ∧ dym is G-homogeneous of degree a0 := a1 · · · am. On the
other hand, we have
dy1 ∧ · · · ∧ dym = f ωS where f = det(∂jyi).
Since ωS is G-homogeneous of degree g0, we conclude that f is G-homogeneous of
degree a0g−1
0 . Since f /∈ M, we have a0g−1
0 ∈ P .
First consider the case s = m. Then a0 ∈ P and thus g0 ∈ P . Also, the G-
grading in this case is the eigenspace decomposition of O with respect to a torus
T ⊂ Der(O) = W , where T is isomorphic to the group of additive characters of P ,
so T has rank s = m. If g0 = e, then ωS is T -invariant, so T ⊂ StabW (ωS) = S,
which is a contradiction, because the toral rank of S = S(m; 1) is less than m (in
fact, it is m − 1). Therefore, in this case we necessarily have g0 6= e. It follows
that there exists a basis {b1, . . . , bm} of P such that g0 = b1 · · · bm. By Proposition
· · · a−ℓs
s
1
1 · · · aℓs
0 = aℓ1
are as desired.
Now assume that s < m. Write a0g−1
degree bi, i = 1, . . . , m. The proof in this case is complete.
4.4, we can replace y1, . . . , ym with ey1, . . . ,eym so that 1 +eyi is G-homogeneous of
s . Set eyi = yi for i < m and
Then eym is G-homogeneous of degreeeam = ama−ℓ1
and hence ey1, . . . ,eym
eym = ym(1 + y1)−ℓ1 · · · (1 + ys)−ℓs.
Recall that in Definition 4.6 of ΓO(G, P, γ), we had to choose a basis {b1, . . . , bs}
for P . The isomorphism class, i.e., the Aut(O)-orbit, of the grading does not depend
on this choice. Clearly, the grading is S-admissible of degree g0 = b1 · · · bsg1 . . . gt
and hence it induces a G-grading on the Lie algebra S and its derived subalgebras.
Let L = S(m; 1)(1) if m ≥ 3 and L = S(m; 1)(2) if m = 2. Since g0 is AutS(O)-
invariant, the induced gradings on L corresponding to different values of g0 are
not isomorphic. Conversely, suppose {eb1, . . . ,ebs} is another basis of P such that
eb1 · · ·ebs = b1 · · · bs (i.e., this basis leads to the same value of g0). Write ebj =
Qs
i where (αij ) is a non-degenerate matrix with entries in the field GFp. Set
i=1 bαij
(cid:3)
(33)
(1 + xi)αij − 1 for j = 1, . . . , s,
sYi=1
exj :=
(34)
andexj = xj for j = s + 1, . . . , m. Thenex1, . . . ,exm form a basis of M modulo M2,
and 1 +exj is homogeneous of degreeebj, j = 1, . . . , s. One readily computes that
sYi=1
det(∂jexi) = det(αij)
Noweb1 · · ·ebs = b1 · · · bs means that Ps
j=1 αij = 1 for all i, so det(∂jexj) is in F.
Therefore, the automorphism of O defined by xi 7→ exi, i = 1, . . . , m, belongs to
the subgroup AutS(O). We have proved that two G-gradings on L arising from the
same data P and γ, but different choices of basis for P , are isomorphic if and only
if they have the same value of g0. This justifies the following:
(1 + xi)−1+Ps
j=1 αij .
Definition 4.16. Let P and γ be as in Definition 4.6. Let g0 ∈ G be such that
g0g−1
1
· · · g−1
t ∈ P \ {e}.
GRADINGS ON RESTRICTED CARTAN TYPE LIE ALGEBRAS
23
Select a basis {b1, . . . , bs} for P such that g0 = b1 · · · bsg1 · · · gt. The G-grading in-
duced by ΓO(G, b1, . . . , bt, g1, . . . , gs) on the Lie algebra S and its derived subalge-
bras will be denoted by ΓS(G, b1, . . . , bt, g1, . . . , gs) or ΓS(G, P, γ, g0). In particular,
the Zs
p × Zm−s-grading induced by ΓO(s) (Definition 4.10, with {ε1, . . . , εs} as a
basis for Zs
p), will be denoted by ΓS(s).
The following is a generalization of a result in [3] (see also [11, Theorem 7.5.5])
on maximal tori of the restricted Lie algebra CS, which corresponds to the case
when G is an elementary p-group.
Theorem 4.17. Let F be an algebraically closed field of characteristic p > 3. Let G
be an abelian group. Let L = S(m; 1)(1) if m ≥ 3 and L = S(m; 1)(2) = H(m; 1)(2) if
to some ΓS(G, P, γ, g0) as in Definition 4.16. Two G-gradings, ΓS(G, P, γ, g0) and
m = 2 (a simple Lie algebra over F). Then any grading L =Lg∈G Lg is isomorphic
ΓS(G,eP ,eγ,eg0), are isomorphic if and only if P = eP , γ ∼eγ (Definition 4.7) and
g0 =eg0.
Proof. First we show that the grading L =Lg∈G Lg is isomorphic to some grading
O. Let Γ′ : O =Lg∈G O′
that induces the grading L =Lg∈G Lg. As usual, let P = {g ∈ G O′
ΓS(G, P, γ, g0). We can apply Corollary 4.2 to translate this problem to the algebra
g be the S-admissible grading on O, of some degree g0 ∈ G,
g 6⊂ M} and
let s be the rank of P . By Proposition 4.15, there exist elements y1, . . . , ym ∈ M
that form a basis of M mod M2 and such that 1 + yi, i ≤ s, and yi, i > s, are
G-homogeneous of some degrees ai, i = 1, . . . , m, where {a1, . . . , as} is a basis
of P and g0 = a1 · · · am. We want to show that there exists an automorphism
in AutS(O) that sends Γ′ to the grading ΓO = ΓO(G, a1, . . . , as, as+1, . . . , am).
Denote the latter grading by O = Lg∈G Og. Let µ be the automorphism of O
defined by yi 7→ xi, i = 1, . . . , m. Then µ sends Γ′ to ΓO, but µ may not belong to
AutS(O). Write µ(ωS) = f ωS for some f ∈ O. Now µ(ωS) has degree g0 relative
to the grading induced on Ωm by ΓO, ωS has degree a1 · · · am relative to the said
grading, and g0 = a1 · · · am, so we conclude that f has degree e relative to ΓO. If
s = m, this implies that f is in F and hence µ ∈ AutS(O), completing the proof.
So we assume s < m.
Now we follow the idea of the proof of [11, Proposition 7.5.4], which is due to
[7]. Observe that
µ(ωS) =µ (d(x1dx2 ∧ · · · ∧ dxm))
=d (µ(x1)dµ(x2) ∧ · · · ∧ dµ(xm))
=d mXi=1
= mXi=1
(−1)i−1hidx1 ∧ · · · ∧ dxi−1 ∧ dxi+1 ∧ · · · ∧ dxm!
∂ihi! ωS,
i=1 hi∂i ∈ W . Since µ(ωS) = f ωS, we have
i=1 ∂ihi = f . One can immediately verify that div(Wg) ⊂ Og for all
where h1, . . . , hm ∈ O. Set E := Pm
div(E) =Pm
g ∈ G, where ΓW : W = Lg∈G Wg is the grading induced on W by ΓO. (Also,
this is a consequence of the fact that div : W → O is Aut(O)-equivariant.) Since
f ∈ Oe, replacing E with its G-homogeneous component of degree e will not affect
the equation div(E) = f , so we will assume that E ∈ We.
24
BAHTURIN AND KOCHETOV
Define a Z-grading on O by declaring the degree of x1, . . . , xs (or, equivalently,
1 + x1, . . . , 1 + xs) to be 0 and the degree of xs+1, . . . , xm to be 1. This Z-grading is
compatible with the G-grading ΓO in the sense that the homogeneous components of
one grading are graded subspaces of O relative to the other grading. We will denote
the filtration associated to this Z-grading by O{ℓ}, ℓ = 0, 1, 2, . . ., to distinguish it
from the filtration O(ℓ) associated to the canonical Z-grading.
Write f =Pk≥0 fk, where fk has degree k in the Z-grading and degree e in the
G-grading. Observe that the constant term of f is equal to the constant term of
f0, so f0 is an invertible element of O. Let τ1 be the automorphism of O defined
by
τ1(xi) = xi for i < m and τ1(xm) = f −1
0 xm.
Since f0 has degree e in the G-grading, τ1 preserves ΓO, i.e., τ1(Og) = Og for all
g ∈ G. We also have τ1(O{ℓ}) = O{ℓ} for all ℓ. Since xm has degree 1 in the
Z-grading, it does not occur in f0. Hence τ1(f0) = f0 and we can compute:
(τ1 ◦ µ)(ωS) =τ1(f ωS) = τ1(f )τ1(ωS)
whereeh =Pk≥1 fk and h = f −1
the G-grading ΓO and has the following property:
0 ωS = (1 + h)ωS,
=(f0 + τ1(eh))f −1
0 τ1(eh). Note that h ∈ O{1}.
Claim: For any ℓ = 1, 2, . . . there exists an automorphism τℓ of O that preserves
(35)
(τℓ ◦ µ)(ωS) = (1 + h)ωS where h ∈ O{ℓ}.
We proceed by induction on ℓ. The basis for ℓ = 1 was proved above. Assume
(35) holds for some ℓ ≥ 1 and τℓ. Since τℓ preserves ΓO, we have 1 + h ∈ Oe and
defined by
induced from our Z-grading of O and degree e in the G-grading. Since div preserves
degree e in the G-grading. As was shown above, there exists E ∈ We such that
eτ (xi) = xi − Eℓ(xi), i = 1, . . . , m.
eτ (ωS) = (1 − div(Eℓ) + ef )ωS = (1 − hℓ + ef )ωS
hence h ∈ Oe. Write h = Pk≥ℓ hk where hk has degree k in the Z-grading and
div(E) = 1 + h. Write E = Pk≥−1 Ek where Ek has degree k in the Z-grading
the Z-grading, we have divEk = hk for k ≥ 1. Let eτ be the automorphism of O
Since Eℓ ∈ We, the automorphism eτ preserves the G-grading ΓO. We also have
eτ (f ) = f (mod O{k+1}) for all f ∈ O{k} and
for some ef ∈ O{2ℓ}. Hence we can compute:
=(1 + hℓ + bf )(1 − hℓ + ef )ωS = (1 +eh)ωS,
where bf ∈ O{ℓ+1} and eh = −h2
ℓ + bf (1 − hℓ) + ef (1 + hℓ + bf ) ∈ O{ℓ+1}. Setting
τℓ+1 =eτ ◦ τℓ, we complete the induction step.
Seteµ = τℓ ◦ µ for ℓ = (p − 1)(m − s) + 1. Theneµ sends Γ′ to ΓO and belongs to
AutS(O), since eµ(ωS) = ωS. We have proved the first assertion of the theorem.
that, if γ ∼ eγ and b1 · · · bsg1 · · · gt = g0 = b1 · · · bsg1 · · · gt where {b1, . . . , bs} and
{eb1, . . . ,ebs} are bases of P as in Definition 4.16, then ΓO(G, b1, . . . , bs, g1, . . . , gt)
Now, the subgroup P and the equivalence class of γ = (g1, . . . , gt) are invari-
ants of the G-graded algebra O, and g0 is AutS(O)-invariant. It remains to show
(eτ ◦ τℓ ◦ µ)(ωS) =eτ ((1 + h)ωS) =eτ (1 + h)eτ (ωS)
j=1 αij!
j=1 αij +Pt
sYj=1
tYi=1
j=1 ℓji! ωS.
(1 + xj )ℓij ωS
j=1 αij +Pt
j=1 ℓji
Ps
i
b
,
On the other hand,
(1 + xi)−1+Ps
(1 + xi)−1+Ps
µ(ωS) = det(αij ) sYi=1
= det(αij ) sYi=1
eb1 · · ·ebseg1 · · ·egt = g1 · · · gt
tXj=1
sXj=1
sYi=1
GRADINGS ON RESTRICTED CARTAN TYPE LIE ALGEBRAS
25
and ΓO(G, b1, . . . , bs, g1, . . . , gt) are in the same AutS(O)-orbit. Clearly, the au-
tomorphism (31) of O, determined by a permutation π of {1, . . . , t}, belongs to
i=1 bαij
AutS(O). So it suffices to consider the caseegi ≡ gi (mod P ). Writeebj =Qs
where (αij ) is a non-degenerate matrix with entries in the field GFp. Also writeegi =
giQs
xj 7→exj , j ≤ s, and xj 7→ xj , j > s, whereexj are as in (33), and the automorphism
defined by (32), sends ΓO(G,eb1, . . . ,ebs,eg1, . . . ,egt) to ΓO(G, b1, . . . , bs, g1, . . . gt).
, i = 1, . . . , t. Then the composition µ of the automorphism defined by
Now, (34) implies that
j=1 bℓij
j
i
so the equalityeb1 · · ·ebseg1 · · ·egt = g0 = b1 · · · bsg1 · · · gt implies that
ℓji = 1 for all i
αij +
and hence µ ∈ AutS(O).
(cid:3)
Corollary 4.18. Under the assumptions of Theorem 4.17, there are, up to equiva-
lence, exactly m+1 fine gradings of L. They are ΓS(s), s = 0, . . . , m. The universal
group of ΓS(s) is Zs
(cid:3)
p × Zm−s.
References
[1] Allen, H. P.; Sweedler, M. E. A theory of linear descent based upon Hopf algebraic techniques.
J. Algebra, 12 (1969), 242 -- 294.
[2] Bahturin, Y.; Kochetov, M. Classification of group gradings on simple Lie algebras of types
A, B, C and D. arXiv:0908.0906v1 [math.RA]
[3] Demuskin, S. P. Cartan subalgebras of the simple Lie p-algebras Wn and Sn. Sibirsk. Mat.
Z., 11 (1970), 310 -- 325 [Russian]; Siberian Math. J., 11 (1970), 233 -- 245 [English translation].
[4] Dieudonn´e, J. Introduction to the theory of formal groups. Pure and Applied Mathematics,
20, Marcel Dekker, Inc., New York, 1973.
[5] Elduque, A. Fine gradings on simple classical Lie algebras. arXiv:0906.0655v1 [math.RA]
[6] Kochetov, M. Gradings on finite-dimensional simple Lie algebras. Acta Appl. Math. 108
(2009), 101 -- 127.
[7] Kuznetsov, M.I.; Yakovlev, V.A. Elementary proof of Demuskin's theorem on tori in special
Lie p-algebras of Cartan type. Comm. Algebra 25 (1997), 3979 -- 3983.
[8] Montgomery, S. Hopf Algebras and their Actions on Rings. CBMS Regional Conference
Series in Mathematics, 82, American Math. Soc., Providence, RI, 1993.
[9] Skryabin, S. Modular Lie algebras of Cartan type over algebraically non-closed fields, I and
II. Comm. Algebra, 19 (1991), no. 6, 1629 -- 1741 and Comm. Algebra 23 (1995), no. 4,
1403 -- 1453.
[10] Skryabin, S. On the automorphism group schemes of Lie algebras of Witt type. Comm.
Algebra, 29 (2001), no. 9, 4047 -- 4077.
[11] Strade, H. Simple Lie algebras over fields of positive characteristic. I. Structure theory. De
Gruyter Expositions in Mathematics, 38, Walter de Gruyter & Co., Berlin, 2004.
26
BAHTURIN AND KOCHETOV
[12] Sweedler, M. E. Hopf algebras with one grouplike element. Trans. Amer. Math. Soc., 127
(1967), 515 -- 526.
[13] Waterhouse, W. C. Automorphism schemes and forms of Witt Lie algebras. J. Algebra, 17
(1971), 34 -- 40.
[14] Waterhouse, W. C. Introduction to affine group schemes. Graduate Texts in Mathematics,
66, Springer-Verlag, New York-Berlin, 1979.
[15] Waterhouse, W. C. Automorphisms and twisted forms of generalized Witt Lie algebras.
Trans. Amer. Math. Soc., 327 (1991), no. 1, 185 -- 200.
Department of Mathematics and Statistics, Memorial University of Newfoundland,
St. John's, NL, A1C5S7, Canada
E-mail address: [email protected]
Department of Mathematics and Statistics, Memorial University of Newfoundland,
St. John's, NL, A1C5S7, Canada
E-mail address: [email protected]
|
1906.06213 | 1 | 1906 | 2019-05-26T23:15:07 | Solvable extensions of the naturally graded quasi-filiform Leibniz algebra of second type $\mathcal{L}^4$ | [
"math.RA"
] | For a sequence of the naturally graded quasi-filiform Leibniz algebra of second type $\mathcal{L}^4$ introduced by Camacho, G\'{o}mez, Gonz\'{a}lez and Omirov, all the possible right solvable indecomposable extensions over the field $\Bbb C$ are constructed. | math.RA | math | SOLVABLE EXTENSIONS OF THE NATURALLY GRADED
QUASI-FILIFORM LEIBNIZ ALGEBRA OF SECOND TYPE L 4
Department of Mathematics, Adrian College, 110 S Madison St., Adrian, MI 49221,
A. Shabanskaya
USA
[email protected]
Abstract. For a sequence of the naturally graded quasi-filiform Leibniz algebra of
second type L 4 introduced by Camacho, Gómez, González and Omirov, all the possible
right solvable indecomposable extensions over the field C are constructed.
AMS Subject Classification: 17A30, 17A32, 17A36, 17A60, 17B30
Keywords: Leibniz algebra, solvability, nilpotency, nilradical, nil-independence, deriva-
tion.
9
1
0
2
y
a
M
6
2
]
.
A
R
h
t
a
m
[
1
v
3
1
2
6
0
.
6
0
9
1
:
v
i
X
r
a
1
2
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
1. Introduction
Leibniz algebras were discovered by Bloch in 1965 [4] who called them D− algebras.
Later on they were considered by Loday and Cuvier [10, 15, 16, 17] as a non-antisymmetric
analogue of Lie algebras. It makes every Lie algebra be a Leibniz algebra, but the converse
is not true. Exactly Loday named them Leibniz algebras after Gottfried Wilhelm Leibniz.
Since then many analogs of important theorems in Lie theory were found to be true
for Leibniz algebras, such as the analogue of Levi's theorem which was proved by Barnes
[3]. He showed that any finite-dimensional complex Leibniz algebra is decomposed into a
semidirect sum of the solvable radical and a semisimple Lie algebra. Therefore the biggest
challenge in the classification problem of finite-dimensional complex Leibniz algebras is
to study the solvable part. And to classify solvable Leibniz algebras, we need nilpotent
Leibniz algebras as their nilradicals, same as in the case of Lie algebras [18].
Every Leibniz algebra satisfies a generalized version of the Jacobi identity called the
Leibniz identity. There are two Leibniz identities: the left and the right. We call Leibniz
algebras right Leibniz algebras if they satisfy the right Leibniz identity and left, if they
satisfy the left. A left Leibniz algebra is not necessarily a right Leibniz algebra [11].
Leibniz algebras inherit an important property of Lie algebras which is that the right
(left) multiplication operator of a right (left) Leibniz algebra is a derivation [9]. Besides
the algebra of right (left) multiplication operators is endowed with a structure of a Lie
algebra by means of the commutator [9]. Also the quotient algebra by the two-sided ideal
generated by the square elements of a Leibniz algebra is a Lie algebra [19], where such
ideal is the minimal, abelian and in the case of non-Lie Leibniz algebras it is always non
trivial.
It is possible to find solvable Leibniz algebras in any finite dimension working with the
sequence of nilpotent Leibniz algebras in any finite dimension and their "nil-independent"
derivations. This method for Lie algebras is based on what was shown by Mubarakzyanov
in [18]: the dimension of the complimentary vector space to the nilradical does not exceed
the number of nil-independent derivations of the nilradical. This result was extended to
Leibniz algebras by Casas, Ladra, Omirov and Karimjanov [8] with the help of [2]. Be-
sides, similarly to the case of Lie algebras, for a solvable Leibniz algebra L we also have
the inequality dim nil(L) ≥ 1
2 dim L [18]. There is the following work performed over
the field of characteristic zero using this method: Casas, Ladra, Omirov and Karimjanov
classified solvable Leibniz algebras with null-filiform nilradical [8]; Omirov and his col-
leagues Casas, Khudoyberdiyev, Ladra, Karimjanov, Camacho and Masutova classified
solvable Leibniz algebras whose nilradicals are a direct sum of null-filiform algebras [13],
naturally graded filiform [9, 14], triangular [12] and finally filiform [7]. Bosko-Dunbar,
Dunbar, Hird and Stagg attempted to classify left solvable Leibniz algebras with Heisen-
berg nilradical [5]. Left and right solvable extensions of R18 [1], L 1, L 2 and L 3 [6] over
the field of real numbers were found by Shabanskaya in [22, 23, 24].
The starting point of the present article is a naturally graded quasi-filiform non Lie
Leibniz algebra of the second type L 4, (n ≥ 4) in the notation of [6]. This algebra is left
and right at the same time and an associative when n = 4.
Naturally graded quasi-filiform Leibniz algebras in any finite dimension over C were
studied by Camacho, Gómez, González, Omirov [6]. They found six such algebras of the
first type, where two of them depend on a parameter and eight algebras of the second
type with one of them depending on a parameter.
This paper continues a work on finding all solvable extensions of quasi-filiform Leib-
niz algebras over the field of complex numbers. For a sequence L 4 such extensions of
codimension at most two are possible.
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
3
The paper is organized as follows: in Section 2 we give some basic definitions, in Section
3 we show what involves constructing solvable Leibniz algebras with a given nilradical.
In Section 4 we describe the nilpotent sequence L 4 and give the summary of the results
stated in theorems, which could be found in the remaining Section 5.
As regards notation, we use he1, e2, ..., eri to denote the r-dimensional subspace gener-
ated by e1, e2, ..., er, where r ∈ N. Besides g and l are used to denote solvable right and
left Leibniz algebras, respectively.
Throughout the paper all the algebras are finite dimensional over the field of complex
numbers and if the bracket is not given, then it is assumed to be zero, except the brackets
for the nilradical, which most of the time are not given (see Remark 5.1) to save space.
In the tables an ordered triple is a shorthand notation for a derivation property of the
multiplication operators, which is either Rz ([x, y]) = [Rz(x), y]+[x, Rz(y)] or Lz ([x, y]) =
[Lz(x), y] + [x, Lz(y)]. We also assign Ren+1 := R and Len+1 := L.
We use Maple software to compute the Leibniz identity, the "absorption" (see [20, 21]
and Section 3.2), the change of basis for solvable Leibniz algebras in some particular
dimensions, which are generalized and proved in an arbitrary finite dimension.
2. Preliminaries
We give some Basic definitions encountered working with Leibniz algebras.
Definition 2.1.
1. A vector space L over a field F with a bilinear operation
[−,−] : L → L is called a Leibniz algebra if for any x, y, z ∈ L the Leibniz
identity
[[x, y], z] = [[x, z], y] + [x, [y, z]]
holds. This Leibniz identity is known as the right Leibniz identity and we call L
in this case a right Leibniz algebra.
2. There exists the version corresponding to the left Leibniz identity
[[x, y], z] = [x, [y, z]] − [y, [x, z]],
and a Leibniz algebra L is called a left Leibniz algebra.
Remark 2.1. In addition, if L satisfies [x, x] = 0 for every x ∈ L, then it is a Lie
algebra. Therefore every Lie algebra is a Leibniz algebra, but the converse is not true.
Definition 2.2. The two-sided ideal C(L) = {x ∈ L : [x, y] = [y, x] = 0} is said to be
the center of L.
Definition 2.3. A linear map d : L → L of a Leibniz algebra L is a derivation if for all
x, y ∈ L
d([x, y]) = [d(x), y] + [x, d(y)].
If L is a right Leibniz algebra and x ∈ L, then the right multiplication operator
Rx : L → L defined as Rx(y) = [y, x], y ∈ L is a derivation (for a left Leibniz algebra
L with x ∈ L, the left multiplication operator Lx : L → L, Lx(y) = [x, y], y ∈ L is a
derivation).
4
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
Any right Leibniz algebra L is associated with the algebra of right multiplications
R(L) = {Rx x ∈ L} endowed with the structure of a Lie algebra by means of the
commutator [Rx, Ry] = RxRy − RyRx = R[y,x], which defines an antihomomorphism
between L and R(L).
For a left Leibniz algebra L, the corresponding algebra of left multiplications L(L) =
{Lx x ∈ L} is endowed with the structure of a Lie algebra by means of the commutator
as well [Lx, Ly] = LxLy − LyLx = L[x,y]. In this case we have a homomorphism between
L and L(L).
Definition 2.4. Let d1, d2, ..., dn be derivations of a Leibniz algebra L. The derivations
d1, d2, ..., dn are said to be "nil-independent" if α1d1 + α2d2 + α3d3 + . . . + αndn is not
nilpotent for any scalars α1, α2, ..., αn ∈ F, otherwise they are "nil-dependent".
Definition 2.5. For a given Leibniz algebra L, we define the sequence of two-sided ideals
as follows:
L0 = L, Lk+1 = [Lk, L], (k ≥ 0)
L(0) = L, L(k+1) = [L(k), L(k)], (k ≥ 0),
which are the lower central series and the derived series of L, respectively.
A Leibniz algebra L is said to be nilpotent (solvable) if there exists m ∈ N such that
Lm = 0 (L(m) = 0). The minimal such number m is said to be the index of nilpotency
(solvability).
Definition 2.6. A Leibniz algebra L is called a quasi-filiform if Ln−3 6= 0 and Ln−2 = 0,
where dim(L) = n.
3. Constructing solvable Leibniz algebras with a given nilradical
Every solvable Leibniz algebra L contains a unique maximal nilpotent ideal called the
nilradical and denoted nil(L) such that dim nil(L) ≥ 1
2 dim(L) [18]. Let us consider the
problem of constructing solvable Leibniz algebras L with a given nilradical N = nil(L).
Suppose {e1, e2, e3, e4, ..., en} is a basis for the nilradical and {en+1, ..., ep} is a basis for a
subspace complementary to the nilradical.
If L is a solvable Leibniz algebra [2], then
(3.0.1)
and we have the following structure equations
(3.0.2)
where 1 ≤ i, j, k, m ≤ n and n + 1 ≤ a, b ≤ p.
3.1. Solvable right Leibniz algebras
ijek, [ea, ei] = Ak
[ei, ej] = C k
[L, L] ⊆ N
aiek, [ei, ea] = Ak
iaek, [ea, eb] = Bk
abek,
Calculations show that satisfying the right Leibniz identity is equivalent to the following
ijAm
biAm
ak, Ak
ak, Ak
iaC m
aiAm
ajC m
aiAm
ki +C k
kb+Ak
aiC m
abC m
kj = Ak
ki = Ak
conditions:
(3.1.1) Ak
ijAm
(3.1.2) Bk
abC m
Then the entries of the matrices Aa, which are (Ak
obtained from all the possible Leibniz identities between the triples {ea, ei, ej}.
1 ≤ a ≤ p) is nilpotent i.e. the matrices Aa must be "nil-independent" [8, 18].
ka +Ak
jaC m
ik ,
ki +Ak
kaAk
ib.
i )a, must satisfy the equations (3.1.1)
Since N is the nilradical of L, no nontrivial linear combination of the matrices Aa, (n+
kj +Ak
ia−Am
kj = C k
kb = Bk
ijAm
abC m
ka = Ak
ik = Am
ajC m
ibAm
ik , C k
ak, Bk
iaC m
kbAk
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
5
Let us now consider the right multiplication operator Rea and restrict it to N, (n + 1 ≤
a ≤ p). We shall get outer derivations of the nilradical N = nil(L) [8]. Then finding the
matrices Aa is the same as finding outer derivations Rea of N. Further the commutators
[Reb, Rea] = R[ea,eb], (n + 1 ≤ a, b ≤ p) due to (3.0.1) consist of inner derivations of N. So
those commutators give the structure constants Bk
ab as shown in the last equation of (3.1.2)
but only up to the elements in the center of the nilradical N, because if ei, (1 ≤ i ≤ n) is
in the center of N, then (Rei)N
is an inner derivation of the nilradical.
= 0, where (Rei)N
3.2. Solvable left Leibniz algebras
jaC m
iaAm
ki +C k
kb+Ak
aiC m
abC m
jk = Ak
ik = Ak
Satisfying the left Leibniz identity, we have
jk = C k
ak = Bk
jiAm
(3.2.1) Ak
(3.2.2) Bk
abC m
and the entries of the matrices Aa, which are (Aa)k
Similarly Aa = (Lea)N
[Lea, Leb] = L[ea,eb] give the structure constants Bk
center of the nilradical N.
ajC m
ik ,
bkAk
ai,
i , must satisfy the equations (3.2.1).
, (n + 1 ≤ a ≤ p) are outer derivations and the commutators
ab, but only up to the elements in the
kj +Ak
bi−Am
ak = Ak
ki = Am
ka +Ak
ik +Ak
jaC m
aiAm
ik , C k
kb, Bk
ijAm
abC m
jiAm
ibAm
ak, Ak
ak, Ak
iaC m
ibAm
aiC m
akAk
Once the left or right Leibniz identities are satisfied in the most general possible way
and the outer derivations are found:
(i) We can carry out the technique of "absorption" [20, 21], which means we can sim-
plify a solvable Leibniz algebra without affecting the nilradical in (3.0.2) applying
the transformation
n
i = ei, (1 ≤ i ≤ n), e′
e′
a = ea +
dkek, (n + 1 ≤ a ≤ p).
Xk=1
(ii) We change basis without affecting the nilradical in (3.0.2) to remove all the pos-
sible parameters and simplify the algebra.
4. The nilpotent sequence L 4
In L 4, (n ≥ 4) the positive integer n denotes the dimension of the algebra. The center
in the
of this algebra is C(L 4) = he2, eni. L 4 can be described explicitly as follows:
basis {e1, e2, e3, e4, . . . , en} it has only the following non-zero brackets:
(4.0.1)
[e1, e1] = e2, [ei, e1] = ei+1, (3 ≤ i ≤ n − 1), [e1, e3] = 2e2 − e4, [e3, e3] = e2,
[e1, ej] = −ej+1, (4 ≤ j ≤ n − 1, n ≥ 4).
DS = [n, n − 2, 0], LS = [n, n − 2, n − 4, n − 5, n − 6, ..., 0], (n ≥ 4).
The dimensions of the ideals in the characteristic series are
A quasi-filiform Leibniz algebra L 4 was introduced by Camacho, Gómez, González
and Omirov in [6]. This algebra is served as the nilradical for the left and right solvable
indecomposable extensions we construct in this paper.
It is shown below that solvable right (left) Leibniz algebras with the nilradical L 4 only
exist for dim g = n + 1 and dim g = n + 2(dim l = n + 1 and dim l = n + 2).
Right solvable extensions with a codimension one nilradical L 4 are found following
the steps in Theorems 5.1.1, 5.1.2 and 5.1.3 with the main result summarized in The-
orem 5.1.3, where it is shown there are eight such algebras: gn+1,i, (1 ≤ i ≤ 4, n ≥ 4),
g5,5, g5,6, g5,7 and g5,8. It is noticed that gn+1,1 is left as well when a = 0, g5,5 is left when
b = −1 and gn+1,4, g5,7, g5,8 are right and left Leibniz algebras at the same time. There are
four solvable indecomposable right Leibniz algebras with a codimension two nilradical:
gn+2,1, (n ≥ 5), g6,2, g6,3 and g6,4 stated in Theorem 5.1.4, where none of them is left.
We follow the steps in Theorems 5.2.1, 5.2.2 and 5.2.3 to find codimension one left
solvable extensions. We notice in Theorem 5.2.3, that we have eight of them as well:
ln+1,1, ln+1,2, ln+1,3, gn+1,4, l5,5, l5,6, g5,7 and g5,8, such that ln+1,1 is right when a = 0 and
6
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
l5,5 is right when b = −1. We find four solvable indecomposable left Leibniz algebras with
a codimension two nilradical as well: ln+2,1, (n ≥ 5), l6,2, l6,3 and l6,4 stated in Theorem
5.2.4, where none of them is right.
5. Classification of solvable indecomposable Leibniz algebras with a
nilradical L 4
Our goal in this Section is to find all possible right and left solvable indecomposable
extensions of the nilpotent Leibniz algebra L 4, which serves as the nilradical of the
extended algebra.
Remark 5.1. It is assumed throughout this section that solvable indecomposable right
and left Leibniz algebras have the nilradical L 4; however, most of the time, the brackets
of the nilradical will be omitted.
5.1. Solvable indecomposable right Leibniz algebras with a nilradical L 4
5.1.1. Codimension one solvable extensions of L 4
The nilpotent Leibniz algebra L 4 is defined in (4.0.1). Suppose {en+1} is in the
complementary subspace to the nilradical L 4 and g is the corresponding solvable right
Leibniz algebra. Since [g, g] ⊆ L 4, we have the following:
Xs=1
[e1, e1] = e2, [ei, e1] = ei+1, (3 ≤ i ≤ n − 1), [e1, e3] = 2e2 − e4, [e3, e3] = e2,
[e1, ej] = −ej+1, (4 ≤ j ≤ n − 1), [er, en+1] =
bs,kes,
(1 ≤ k ≤ n, 1 ≤ r ≤ n + 1, n ≥ 4).
Theorem 5.1.1. We set a1,1 := a and a3,3 := b in (5.1.1). To satisfy the right Leibniz
(5.1.1)
as,res, [en+1, ek] =
Xs=1
n
n
identity, there are the following cases based on the conditions involving parameters, each
gives a continuous family of solvable Leibniz algebras:
(1) If a1,3 = 0, b 6= −a, a 6= 0, b 6= 0, (n = 4) or b 6= (3 − n)a, a 6= 0, b 6= 0, (n ≥ 5),
then we have the following brackets for the algebra:
n
ak−1,3ek, [ei, en+1] = ((i − 3)a + b) ei+
Xk=4
ak,1ek, [e2, en+1] = 2be2, [e3, en+1] = a2,3e2 + be3+
n
n
n
Xk=5
[e1, en+1] = ae1 + A2,1e2 + (b − a)e3 +
Xk=4
Xk=i+1
[en+1, e3] = (a2,3 + 2a4,3)e2 − be3 −
Xk=i+1
[en+1, ei] = ((3 − i)a − b) ei −
ak,3ek, [e4, en+1] = (b − a)e2 + (a + b)e4 +
Xk=4
ak−i+3,3ek, [en+1, en+1] = a2,n+1e2, [en+1, e1] = −ae1 + b2,1e2 + (a − b)e3 −
Xk=5
ak,3ek, [en+1, e4] = (a + b)(e2 − e4) −
Xk=4
ak−i+3,3ek, (5 ≤ i ≤ n),
(2b − a)b2,1 − 2b · a4,1 + 2(a − b)(a2,3 + a4,3)
where A2,1 :=
n
n
.
ak,1ek,
n
ak−1,3ek,
n
a
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
7
ak−i+3,3ek, [en+1, en+1] = a2,n+1e2 + an,n+1en,
n
n
n
n
Xk=4
ak,1ek, [e2, en+1] = 2(3 − n)ae2,
Xk=4
ak−1,3ek, [ei, en+1] = (i − n)aei +
(2) If a1,3 = 0, b := −a, a 6= 0, (n = 4) or b := (3 − n)a, a 6= 0, (n ≥ 5), then
[e1, en+1] = ae1 + A2,1e2 + (2 − n)ae3 +
[e3, en+1] = a2,3e2 + (3 − n)ae3 +
ak,3ek, [e4, en+1] = (2 − n)ae2 + (4 − n)ae4+
Xk=5
Xk=i+1
Xk=4
[en+1, e1] = −ae1 + b2,1e2 + (n − 2)ae3 −
(n − 3)ae3 −
[en+1, ei] = (n − i)aei −
where A2,1 := (5 − 2n)b2,1 + 2(n − 3)a4,1 + 2(n − 2)(a2,3 + a4,3).
(3) If a1,3 = 0, a = 0, b 6= 0, (n = 4) or a = 0 and b 6= 0, (n ≥ 5), then
[e1, en+1] = a2,1e2 + be3 +
ak,3ek, [en+1, e4] = (4 − n)ae2 + (n − 4)ae4 −
ak,1ek, [e2, en+1] = 2be2, [e3, en+1] = a2,3e2 + be3 +
ak−i+3,3ek, (5 ≤ i ≤ n − 1),
ak,1ek, [en+1, e3] = (a2,3 + 2a4,3)e2+
Xk=i+1
ak−1,3ek,
Xk=5
Xk=4
n
n
n
n
n
Xk=4
ak,3ek,
n
n
Xk=4
Xk=5
[e4, en+1] = b(e2 + e4) +
ak−1,3ek, [ei, en+1] = bei +
n
Xk=i+1
ak−i+3,3ek,
n
n
n
Xk=4
Xk=4
ak,3ek, [en+1, e4] = b(e2 − e4) −
[en+1, en+1] = a2,n+1e2, [en+1, e1] = (a2,3 + a4,1 + a4,3) e2 − be3 −
[en+1, e3] = (a2,3 + 2a4,3)e2 − be3 −
[en+1, ei] = −bei −
(4) If a1,3 = 0, b = 0, a 6= 0, (n = 4) or b = 0, a 6= 0, (n ≥ 5), then
[e1, en+1] = ae1 + (a2,3 − b2,1 + b2,3) e2 − ae3 +
[e4, en+1] = −ae2 + ae4 +
ak−i+3,3ek, (5 ≤ i ≤ n).
Xk=i+1
Xk=4
n
n
n
ak,1ek,
n
Xk=5
ak−1,3ek,
Xk=5
ak−1,3ek, [ei, en+1] = (i − 3)aei +
Xk=4
n
n
ak−i+3,3ek,
Xk=i+1
ak,1ek, [en+1, e3] = b2,3e2−
n
[en+1, en+1] = a2,n+1e2, [en+1, e1] = −ae1 + b2,1e2 + ae3 −
Xk=4
(5 ≤ i ≤ n).
ak,3ek, [en+1, e4] = ae2 − ae4 −
Xk=5
In the remaining cases a1,3 := c.
ak−1,3ek, [en+1, ei] = (3 − i)aei −
n
Xk=i+1
ak−i+3,3ek,
ak,1ek, [e3, en+1] = a2,3e2 +
n
Xk=4
ak,3ek,
Re5 = "
a
0
c
A2,1 2(b+c) a2,3 2c+b−a
b+c−a
a4,1
0
0
b
A4,3
2a
0
a+b # .
0
8
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
(5) If b 6= −a, a 6= 0, b 6= −c, c 6= 0, then
[e1, e5] = ae1 + A2,1e2 + (b + c − a)e3 + a4,1e4, [e2, e5] = 2(b + c)e2, [e3, e5] = ce1 + a2,3e2+
be3 + A4,3e4, [e4, e5] = (2c + b − a)e2 + (a + b)e4, [e5, e5] = a2,5e2, [e5, e1] = −ae1 + b2,1e2+
(a − b − c)e3 − a4,1e4, [e5, e3] = −ce1 + b2,3e2 − be3 − A4,3e4, [e5, e4] = (a + b)e2 − (a + b)e4,
where A2,1 := a2,3 − b2,1 + b2,3 −
A4,3 :=
(c − a)a2,3 + (a + c)b2,3 − 2c(b2,1 − a4,1)
(b + c)(a2,3 − 2b2,1 + 2a4,1 + b2,3)
and
a
,
(6) If b := −a, a 6= 0, a 6= c, c 6= 0, then
[e1, e5] = ae1 + A2,1e2 + (c − 2a)e3 + a4,1e4, [e2, e5] = 2(c − a)e2, [e3, e5] = ce1 + a2,3e2−
ae3 + A4,3e4, [e4, e5] = 2(c − a)e2, [e5, e5] = a2,5e2 + a4,5e4, [e5, e1] = −ae1 + b2,1e2+
(2a − c)e3 − a4,1e4, [e5, e3] = −ce1 + b2,3e2 + ae3 − A4,3e4,
where A2,1 := 2a2,3 − 3b2,1 + 2b2,3 + 2a4,1 −
A4,3 :=
(c − a)a2,3 + (a + c)b2,3 − 2c(b2,1 − a4,1)
c(a2,3 − 2b2,1 + 2a4,1 + b2,3)
and
a
,
0
c
Re5 = " a
A2,1 2(c−a) a2,3 2(c−a)
c−2a
a4,1
−a
A4,3
0
0
0
0
# .
2a
0
c
a
0
0
0
0 −c
(7) If b := −c, c 6= 0, a 6= c, a 6= 0, then
[e1, e5] = ae1 + (a2,3 − b2,1 + b2,3) e2 − ae3 + a4,1e4, [e3, e5] = ce1 + a2,3e2 − ce3 + a4,3e4,
[e4, e5] = (c − a)e2 + (a − c)e4, [e5, e5] = a2,5e2, [e5, e1] = −ae1 + b2,1e2 + ae3 − a4,1e4,
[e5, e3] = −ce1 + b2,3e2 + ce3 − a4,3e4, [e5, e4] = (a − c)e2 + (c − a)e4,
0 a4,3 a−c# .
(8) If c := a, b := −a, a 6= 0, then1
[e1, e5] = ae1 + (a2,3 − b2,1 + b2,3) e2 − ae3 + a4,1e4, [e3, e5] = ae1 + a2,3e2 − ae3 + a4,3e4,
[e5, e5] = a2,5e2 + a4,5e4, [e5, e1] = −ae1 + b2,1e2 + ae3 − (a4,1 − a4,3 − b4,3) e4,
[e5, e3] = −ae1 + b2,3e2 + ae3 + b4,3e4,
Re5 = "
a2,3−b2,1+b2,3 0 a2,3 c−a
−a
a4,1
−a
a4,1
Re5 = "
0 a 0
a2,3−b2,1+b2,3 0 a2,3 0
0 −a 0
0 a4,3 0# .
(9) If a = 0, b = 0, c 6= 0, then
[e1, e5] = (3b2,1 − 4a4,1 − 2a2,3 − 2a4,3) e2 + ce3 + a4,1e4, [e2, e5] = 2ce2, [e3, e5] = ce1+
a2,3e2 + a4,3e4, [e4, e5] = 2ce2, [e5, e5] = a2,5e2 + a4,5e4, [e5, e1] = b2,1e2 − ce3 − a4,1e4,
[e5, e3] = −ce1 + (2b2,1 − 2a4,1 − a2,3) e2 − a4,3e4,
a
Re5 = "
0
0
3b2,1−4a4,1−2a2,3−2a4,3 2c a2,3 2c
0
0 a4,3 0 # .
a4,1
0
0
0
c
c
1The outer derivation Re5 is nilpotent, so we do not consider this case any further.
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
9
(10) If a = 0, b 6= 0, b 6= −c, c 6= 0, then
[e1, e5] = a2,1e2 + (b + c)e3 + a4,1e4, [e2, e5] = 2(b + c)e2, [e3, e5] = ce1 + a2,3e2 + be3+
A4,3e4, [e4, e5] = (2c + b)e2 + be4, [e5, e5] = a2,5e2, [e5, e1] = a4,1 +
(b + c)e3 − a4,1e4, [e5, e3] = −ce1 + b2,3e2 − be3 − A4,3e4, [e5, e4] = b(e2 − e4),
where A4,3 :=
(3c + 2b)b2,3 − (2b + c)a2,3 − 2c(a2,1 + a4,1)
! e2−
a2,3 + b2,3
2
,
4(b + c)
0
0
0
0
0
c
b
A4,3
Re5 = " 0
a2,1 2(b+c) a2,3 2c+b
b+c
a4,1
b # .
(11) If a = 0, b := −c, c 6= 0, then
[e1, e5] = a2,1e2 + a4,1e4, [e3, e5] = ce1 + a2,3e2 − ce3 + a4,3e4, [e4, e5] = ce2 − ce4,
[e5, e5] = a2,5e2, [e5, e1] = (a2,3 + b2,3 − a2,1) e2 − a4,1e4, [e5, e3] = −ce1 + b2,3e2 + ce3−
a4,3e4, [e5, e4] = −ce2 + ce4,
a4,1 0 a4,3 −c# .
Re5 = " 0
0
a2,1 0 a2,3 c
0
0 −c
0
c
0
Proof.
(1) For (n ≥ 5) the proof is given in Table 1. For (n = 4) we work out the
following identities: 1., 3. − 5., 7., 8., 10., 12., 13.(or 15.), 16. − 19.
(2) For (n ≥ 5), we apply the same identities given in Table 1, except 17. For (n = 4),
the identities are as follows: 1., 3. − 5., 7., 8., 10., 12., 15., 16. − 19.
(3) For (n ≥ 5), same identities except 18. and 19. applying instead Re3 ([en+1, en+1]) =
[Re3(en+1), en+1] + [en+1, Re3(en+1)] and R[en+1, e1] = [R(en+1), e1] + [en+1, R(e1)].
For (n = 4), same identities as in case (1), except 18. and 19. applying two
identities given above.
(4) Same identities as in case (1).
(5) We apply the following identities: 1., 3.−5., 7., 8., 10., 12., 13., 16., 17., Re3 ([e5, e5]) =
[Re3(e5), e5] + [e5, Re3(e5)], 18., 19.
(6) We apply the same identities as in (5), except 17. and 18.
(7) Same as in (5), except 19.
(8) We apply the same identities as in (5), except 17., 18. and 19.
(9) Same identities as in (5), except 17. and 18.
(10) We have the identities: 1., 3. − 5., 7., 8., 10., 12., 13., 16., 17., 19., Re5 ([e5, e1]) =
[Re5(e5), e1] + [e5, Re5(e1)], Re3 ([e5, e5]) = [Re3(e5), e5] + [e5, Re3(e5)].
(11) Same identities as in (5), except 19.
(cid:3)
10
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
Table 1. Right Leibniz identities in case (1) in Theorem 5.1.1, (n ≥ 5).
Result
a1,2 = 0, a3,1 := 1
2 a2,2 − a, ak,2 = 0, (3 ≤ k ≤ n) =⇒ [e1, en+1] = ae1 + a2,1e2 +
Steps Ordered triple
1.
2.
3.
4.
5.
6.
7.
8.
9.
R[e1, e1]
R[e3, ei]
R[e3, en]
R[e3, e3]
R[e1, e3]
R[e1, ei]
Re1 ([en+1, e1])
Re1 ([e3, en+1])
Re1 ([e1, en+1])
10.
Re3 ([e1, en+1])
11.
Rei ([e1, en+1])
12.
13.
14.
Ren ([e1, en+1])
Re1 ([en+1, e3])
Re1 ([en+1, ei])
15.
Re1 ([en+1, en−1])
16.
R[e1, en+1]
k=4 ak,iek, (4 ≤ i ≤ n − 1).
k=4 ak,1ek, [e2, en+1] = a2,2e2.
2 a2,2 − a(cid:1) e3 +Pn
(cid:0) 1
a1,3 = a1,i = a3,i = 0 =⇒ [e3, en+1] = a2,3e2 + be3 +Pn
a2,ie2 +Pn
a1,n = a3,n = 0 =⇒ [en, en+1] = a2,ne2 +Pn
a2,2 := 2b =⇒ [e1, en+1] = ae1 + a2,1e2 + (b − a)e3 +Pn
(a + b)e4 +Pn
k=5 ak−1,3ek.
k=4 ak,nek.
k=4 ak,1ek, [e2, en+1] = 2be2.
a2,4 := b − a, a4,4 := a + b, ak,4 := ak−1,3, (5 ≤ k ≤ n) =⇒ [e4, en+1] = (b − a)e2 +
a2,i+1 = a4,i+1 = 0, ai+1,i+1 := (i − 2)a + b, ak,i+1 := ak−1,i, (5 ≤ k ≤ n, k 6=
k=4 ak,3ek, [ei, en+1] =
i + 1, 4 ≤ i ≤ n − 1), where i is fixed =⇒ [ej , en+1] = ((j − 3)a + b) ej +
bk−1,1 := −ak−1,1, (5 ≤ k ≤ n, n ≥ 5) =⇒ [en+1, e1] = −ae1 + b2,1e2 + (a − b)e3 −
k=j+1 ak−j+3,3ek, (5 ≤ j ≤ n).
[en+1, e2] = 0 =⇒ bk,2 = 0, (1 ≤ k ≤ n).
Pn
b1,1 := −a, b3,1 := a − b =⇒ [en+1, e1] = −ae1 + b2,1e2 + (a − b)e3 +Pn
Pn−1
Pn−1
b3,i = 0 =⇒ b1,i = 0; bi,i
k=4 ak,1ek + bn,1en.
k=4 ak,3ek + bn,3en.
b1,3 = 0, b3,3 := −b, bk−1,3 := −ak−1,3, (5 ≤ k ≤ n) =⇒ [en+1, e3] = b2,3e2 − be3 −
:= (3 − i)a − b, bk−1,i = 0, (5 ≤ k ≤ i), bk−1,i
:=
k=4 bk,1ek.
−ak−i+2,3, (i+2 ≤ k ≤ n), where i is fixed. =⇒ [en+1, ei] = b2,ie2+((3 − i)a − b) ei−
k=i+1 ak−i+3,3ek + bn,ien, (4 ≤ i ≤ n − 1).
b3,n = 0 =⇒ b1,n = 0; bk−1,n = 0, (5 ≤ k ≤ n) =⇒ [en+1, en] = b2,ne2 + bn,nen.
k=5 ak−1,3ek.
b2,i+1 = 0, bn,i+1 := −an−i+2,3, (4 ≤ i ≤ n − 2) =⇒ [en+1, ej] = ((3 − j)a − b) ej −
Pn−1
b2,4 := a + b, bn,4 := −an−1,3 =⇒ [en+1, e4] = (a + b)e2 − (a + b)e4 −Pn
Pn
14., [en+1, ei] = ((3 − i)a − b) ei −Pn
a3,n+1 = 0 =⇒ a1,n+1 = 0; ak−1,n+1 = 0, (5 ≤ k ≤ n) =⇒ [en+1, en+1] =
b2,n = 0, bn,n := (3 − n)a − b =⇒ [en+1, en] = ((3 − n)a − b) en. Combining with
k=j+1 ak−j+3,3ek, (5 ≤ j ≤ n − 1).
k=i+1 ak−i+3,3ek, (5 ≤ i ≤ n).
a2,n+1e2 + an,n+1en.
17.
18.
R[en+1, en+1]
an,n+1 = 0, (b 6= (3 − n)a) =⇒ [en+1, en+1] = a2,n+1e2.
R[en+1, e3]
bn,3 := −an,3, (a 6= 0), b2,3 := a2,3 + 2a4,3, (b 6= 0) =⇒ [en+1, e3] = (a2,3 + 2a4,3) e2 −
19.
Re1 ([en+1, en+1])
bn,1 := −an,1, (a 6= 0), A2,1 := (2b−a)b2,1−2b·a4,1+2(a−b)(a2,3+a4,3)
=⇒ [en+1, e1] =
a
k=4 ak,1ek, [e1, en+1] = ae1 + A2,1e2 + (b − a)e3 +
k=4 ak,3ek.
be3 −Pn
−ae1 + b2,1e2 + (a − b)e3 − Pn
Pn
k=4 ak,1ek.
Theorem 5.1.2. Applying the technique of "absorption" (see Section 3.2), we can further
simplify the algebras in each of the cases in Theorem 5.1.1 as follows:
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
11
(1) If a1,3 = 0, b 6= −a, a 6= 0, b 6= 0, (n = 4) or b 6= (3 − n)a, a 6= 0, b 6= 0, (n ≥ 5),
then we have the following brackets for the algebra:
n
n
[e1, en+1] = ae1 + A2,1e2 + (b − a)e3, [e2, en+1] = 2be2, [e3, en+1] = a2,3e2 + be3 +
[e4, en+1] = (b − a)e2 + (a + b)e4 +
Xk=i+2
[en+1, e4] = (a + b) (e2 − e4) −
ak−i+3,3ek, [en+1, e1] = −ae1 + b2,1e2 + (a − b)e3, [en+1, e3] = a2,3e2 − be3 −
Xk=i+2
ak−1,3ek, [en+1, ei] = ((3 − i)a − b) ei −
ak−1,3ek, [ei, en+1] = ((i − 3)a + b) ei+
Xk=6
n
n
Xk=6
(2b − a)b2,1 + 2(a − b)a2,3
(5 ≤ i ≤ n); where A2,1 :=
(2) If a1,3 = 0, b := −a, a 6= 0, (n = 4) or b := (3 − n)a, a 6= 0, (n ≥ 5), then the
a
.
n
Xk=5
n
Xk=5
ak,3ek,
ak,3ek,
ak−i+3,3ek,
brackets for the algebra are
n
[e1, en+1] = ae1 + A2,1e2 + (2 − n)ae3, [e2, en+1] = 2(3 − n)ae2, [e3, en+1] = a2,3e2+
(3 − n)ae3 +
[ei, en+1] = (i − n)aei +
ak,3ek, [e4, en+1] = (2 − n)ae2 + (4 − n)ae4 +
ak−i+3,3ek, [en+1, en+1] = an,n+1en,
ak−1,3ek,
Xk=6
Xk=5
n
n
Xk=i+2
n
Xk=5
[en+1, e1] = −ae1 + b2,1e2 + (n − 2)ae3, [en+1, e3] = a2,3e2 + (n − 3)ae3 −
Xk=i+2
[en+1, e4] = (4 − n)a(e2 − e4) −
(5 ≤ i ≤ n); where A2,1 := (5 − 2n)b2,1 + 2(n − 2)a2,3.
(3) If a1,3 = 0, a = 0, b 6= 0, (n = 4) or a = 0 and b 6= 0, (n ≥ 5), then
Xk=5
[e1, en+1] = a2,1e2 + be3, [e2, en+1] = 2be2, [e3, en+1] = a2,3e2 + be3 +
ak−1,3ek, [en+1, ei] = (n − i)aei −
Xk=6
n
n
n
n
ak,3ek,
[e4, en+1] = b (e2 + e4) +
Xk=6
ak−1,3ek, [ei, en+1] = bei +
n
ak−i+3,3ek,
Xk=i+2
n
ak,3ek,
ak−i+3,3ek,
n
ak,3ek,
Xk=6
Xk=5
ak−1,3ek, [en+1, ei] = −bei −
[en+1, e1] = a2,3e2 − be3, [en+1, e3] = a2,3e2 − be3 −
[en+1, e4] = b (e2 − e4) −
(4) If a1,3 = 0, b = 0, a 6= 0, (n = 4) or b = 0, a 6= 0, (n ≥ 5), then
Xk=5
[e1, en+1] = ae1 + (a2,3 − b2,1 + b2,3) e2 − ae3, [e3, en+1] = a2,3e2 +
Xk=i+2
[e4, en+1] = −a(e2 − e4) +
ak−1,3ek, [ei, en+1] = (i − 3)aei +
Xk=i+2
Xk=6
n
n
n
n
ak−i+3,3ek, (5 ≤ i ≤ n).
ak,3ek,
ak−i+3,3ek,
n
Xk=5
ak,3ek,
[en+1, en+1] = a2,n+1e2, [en+1, e1] = −ae1 + b2,1e2 + ae3, [en+1, e3] = b2,3e2 −
[en+1, e4] = a(e2 − e4) −
ak−1,3ek, [en+1, ei] = (3 − i)aei −
n
n
Xk=6
Xk=i+2
ak−i+3,3ek, (5 ≤ i ≤ n).
In the remaining cases a1,3 := c.
12
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
(5) If b 6= −a, a 6= 0, b 6= −c, c 6= 0, then
[e1, e5] = ae1 + A2,1e2 + (b + c − a)e3, [e2, e5] = 2(b + c)e2, [e3, e5] = ce1 + a2,3e2 + be3,
[e4, e5] = (2c + b − a)e2 + (a + b)e4, [e5, e1] = −ae1 + B2,1e2 + (a − b − c)e3,
[e5, e3] = −ce1 + B2,3e2 − be3, [e5, e4] = (a + b)(e2 − e4),
where A2,1 :=
(3a − 2b − 3c)a2,3 + (a − 2b − 3c)b2,3
(a − c)a2,3 − (a + c)b2,3
, B2,1 :=
,
2a
2a
B2,3 :=
(a − c)a2,3 − c · b2,3
,
a
Re5 = "
a
0
b+c−a
0
0
0
A2,1 2(b+c) a2,3 2c+b−a
c
b
0
0
a+b # .
0
(6) If b := −a, a 6= 0, a 6= c, c 6= 0, then
[e1, e5] = ae1 + A2,1e2 + (c − 2a)e3, [e2, e5] = 2(c − a)e2, [e3, e5] = ce1 + a2,3e2 − ae3,
[e4, e5] = 2(c − a)e2, [e5, e5] = a4,5e4, [e5, e1] = −ae1 + B2,1e2 + (2a − c)e3,
(5a − 3c)a2,3 + (3a − 3c)b2,3
[e5, e3] = −ce1 + B2,3e2 + ae3; where A2,1 :=
B2,1 :=
2a
(a − c)a2,3 − c · b2,3
,
, B2,3 :=
,
a
(a − c)a2,3 − (a + c)b2,3
# .
A2,1 2(c−a) a2,3 2(c−a)
c−2a
2a
0
0
c
0
0
0
0
0
−a
0
(7) If b := −c, c 6= 0, a 6= c, a 6= 0, then
Re5 = " a
[e1, e5] = ae1 + (a2,3 − b2,1 + b2,3) e2 − ae3, [e3, e5] = ce1 + a2,3e2 − ce3,
[e4, e5] = (c − a) (e2 − e4) , [e5, e5] = a2,5e2, [e5, e1] = −ae1 + b2,1e2 + ae3,
[e5, e3] = −ce1 + b2,3e2 + ce3, [e5, e4] = (a − c) (e2 − e4) ,
Re5 = "
a2,3−b2,1+b2,3 0 a2,3 c−a
0 a−c# .
0 −c
0
−a
0
0
0
0
a
c
(8) If a = 0, b = 0, c 6= 0, then
[e1, e5] = (3b2,1 − 2a2,3) e2 + ce3, [e2, e5] = 2ce2, [e3, e5] = ce1 + a2,3e2, [e4, e5] = 2ce2,
[e5, e5] = a4,5e4, [e5, e1] = b2,1e2 − ce3, [e5, e3] = −ce1 + (2b2,1 − a2,3) e2,
Re5 = "
0
0
0
3b2,1−2a2,3 2c a2,3 2c
0
c
0
0
0
0
0 # .
c
0
(9) If a = 0, b 6= 0, b 6= −c, c 6= 0, then
[e1, e5] = A2,1e2 + (b + c)e3, [e2, e5] = 2(b + c)e2, [e3, e5] = ce1 + a2,3e2 + be3,
[e4, e5] = (2c + b)e2 + be4, [e5, e1] = B2,1e2 − (b + c)e3, [e5, e3] = −ce1 + B2,3e2 − be3,
[e5, e4] = b(e2 − e4); where A2,1 :=
B2,1 :=
(2b + c)a2,3 − (2b + 3c)b2,3
(2b + c)a2,3 − c · b2,3
, B2,3 :=
4(b + c)
,
,
2(b + c)
(4b + 3c)a2,3 − c · b2,3
b # .
A2,1 2(b+c) a2,3 2c+b
b+c
4(b + c)
c
Re5 = " 0
0
0
0
0
0
b
0
0
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
13
(10) If a = 0, b := −c, c 6= 0, then
[e1, e5] = a2,1e2, [e3, e5] = ce1 + a2,3e2 − ce3, [e4, e5] = c(e2 − e4), [e5, e5] = a2,5e2,
[e5, e1] = (a2,3 + b2,3 − a2,1) e2, [e5, e3] = −ce1 + b2,3e2 + ce3, [e5, e4] = −c(e2 − e4),
Re5 = " 0
0
a2,1 0 a2,3 c
0
0 −c# .
0 −c
0
0
0
0
c
Proof.
(1) The right (a derivation) and left (not a derivation) multiplication operators
restricted to the nilradical are given below:
Ren+1 =
·
·
·
a5,3
a4,3
ai,1
ai,3
ai−1,3 ai−2,3 ···
(i−3)a+b ···
2a+b
...
...
···
···
···
···
···
a4,3
...
...
0
0
0
0
0
···
···
···
···
···
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
...
...
...
...
...
...
0
...
...
...
0
...
...
...
0
0
an−1,1 0 an−1,3 an−2,3 an−3,3 ··· an−i+3,3 an−i+2,3 ··· a4,3 (n−4)a+b
an,1
0
0
0
0
0 a2,3+2a4,3
0
0 −a4,3
0 −a5,3
an,3 an−1,3 an−2,3 ··· an−i+4,3 an−i+3,3 ··· a5,3
···
···
···
···
···
−a−b
−a4,3 −2a−b
···
···
···
···
···
0
0
0
0
0
0
0
0
0
a+b
−b
0
−a
b2,1
a−b
−a4,1
−a5,1
a4,3
0
0
0
0
0
(n−3)a+b
0
0
0
0
0
Len+1 =
·
·
·
−a5,3
−a4,3
−ai,1
−ai,3
−ai−1,3 −ai−2,3 ···
−a4,3
(3−i)a−b ···
...
...
...
...
...
...
...
...
...
...
0
...
...
...
0
,
0
0
0
0
0
...
...
...
0
0
.
...
...
a
0
0
A2,1 2b a2,3
b−a
a4,1
a5,1
a4,3
a5,3
0
0
0
b
0
b−a
0
a+b
a4,3
...
...
0
...
...
0
...
...
...
...
...
...
...
...
...
...
0
0
0
0
...
...
...
...
−an−1,1 0 −an−1,3 −an−2,3 −an−3,3 ··· −an−i+3,3 −an−i+2,3 ··· −a4,3 (4−n)a−b
−an,1
0 −an,3 −an−1,3 −an−2,3 ··· −an−i+4,3 −an−i+3,3 ··· −a5,3 −a4,3
(3−n)a−b
• The transformation e′
k = ek, (1 ≤ k ≤ n), e′
n+1 = en+1 − a4,3e1 removes a4,3
in Ren+1 and −a4,3 in Len+1 from the (i, i − 1)st positions, where (4 ≤ i ≤ n),
but it affects other entries as well, such as the entry in the (2, 1)st position in
Ren+1 and Len+1, which we change to A2,1 − a4,3 and b2,1 − a4,3, respectively.
It also changes the entry in the (2, 3)rd position in Len+1 to a2,3. At the same
time, it affects the coefficient in front of e2 in the bracket [en+1, en+1], which
we change back to a2,n+1.
i = ei, (1 ≤ i ≤ n), e′
• Applying the transformation e′
k=3 ak+1,1ek,
we remove ak+1,1 in Ren+1 and −ak+1,1 in Len+1 from the entries in the (k +
1, 1)st positions, where (3 ≤ k ≤ n − 1). It changes the entry in the (2, 1)st
position in Ren+1 to A2,1 + 2a4,1 − a4,3, the entries in the (2, 3)rd positions in
Ren+1 and Len+1 to a2,3 + a4,1. It also affects the coefficient in front of e2 in
n+1 = en+1+Pn−1
[en+1, en+1], which we rename back by a2,n+1. We assign a2,3 + a4,1 := a2,3 and
b2,1 − a4,3 := b2,1. Then A2,1 + 2a4,1 − a4,3 := (2b−a)b2,1+2(a−b)a2,3
.
a
14
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
• The transformation e′
j = ej, (1 ≤ j ≤ n), e′
n+1 = en+1 − a2,n+1
2b e2 removes the
coefficient a2,n+1 in front of e2 in [en+1, en+1] and we prove the result.
(2) The right (a derivation) and left (not a derivation) multiplication operators re-
stricted to the nilradical are as follows:
0
0
0
0
2(3−n)a
(3−n)a
(2−n)a
(4−n)a
(2−n)a
A2,1
a2,3
0
0
0
0
a
Ren+1 =
·
·
·
a5,3
a4,3
a4,3
a5,3
...
...
a4,3
(5−n)a
...
...
···
a4,3
...
...
...
...
...
...
···
···
···
···
···
0
0
0
0
0
···
···
···
···
···
0
0
0
0
0
0 0
0 0
0 0
0 0
0 0
ai,3
ai−1,3 ai−2,3
(i−n)a ···
0 0
an,3
an−1,3 an−2,3 an−3,3 ··· an−i+3,3 an−i+2,3 ··· a4,3 −a 0
an−1,3 an−2,3 ··· an−i+4,3 an−i+3,3 ··· a5,3 a4,3 0
0
0
0
0
0
(n−4)a
−a4,3
···
···
···
···
···
···
···
···
···
···
(n−5)a
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
−a
b2,1
0
0 a2,3+2a4,3 (4−n)a
0
(n−2)a 0
−a4,1
−a5,1
(n−3)a
0 −a4,3
0 −a5,3
·
·
·
−ai,1
−ai,3
−ai−1,3 −ai−2,3 ···
−a4,3
(n−i)a
···
...
...
−a5,3
−a4,3
...
...
...
...
...
...
,
...
...
...
...
...
...
.
0
0
0
0
0
...
...
...
0
...
...
...
0
...
...
...
0
...
...
...
0
...
...
...
...
...
...
0
0
0
0
...
...
0
0
0
...
...
a4,1
a5,1
ai,1
...
...
an−1,1
an,1
...
...
0
...
...
Len+1 =
−an−1,1 0 −an−1,3 −an−2,3 −an−3,3 ··· −an−i+3,3 −an−i+2,3 ··· −a4,3
0
0 −an,3 −an−1,3 −an−2,3 ··· −an−i+4,3 −an−i+3,3 ··· −a5,3 −a4,3 0
−an,1
a
• The transformation e′
k = ek, (1 ≤ k ≤ n), e′
n+1 = en+1 − a4,3e1 removes a4,3
in Ren+1 and −a4,3 in Len+1 from the (i, i − 1)st positions, where (4 ≤ i ≤ n),
but it affects other entries as well, such as the entry in the (2, 1)st position in
Ren+1 and Len+1, which we change to A2,1 − a4,3 and b2,1 − a4,3, respectively.
It also changes the entry in the (2, 3)rd position in Len+1 to a2,3. At the same
time, it affects the coefficient in front of e2 in the bracket [en+1, en+1], which
we change back to a2,n+1.
i = ei, (1 ≤ i ≤ n), e′
• Then we apply the transformation e′
n+1 = en+1 +
Pn−1
k=3 ak+1,1ek to remove ak+1,1 in Ren+1 and −ak+1,1 in Len+1 from the entries
in the (k + 1, 1)st positions, where (3 ≤ k ≤ n−1). It changes the entry in the
(2, 1)st position in Ren+1 to A2,1+2a4,1−a4,3, the entries in the (2, 3)rd positions
in Ren+1 and Len+1 to a2,3 + a4,1. It also affects the coefficient in front of e2
in [en+1, en+1], which we rename back by a2,n+1. We assign a2,3 + a4,1 := a2,3
and b2,1 − a4,3 := b2,1. Then A2,1 + 2a4,1 − a4,3 := (5 − 2n)b2,1 + 2(n − 2)a2,3,
which we set to be A2,1.
• Applying the transformation e′
2(n−3)a e2, we
remove the coefficient a2,n+1 in front of e2 in [en+1, en+1] and prove the result.
j = ej, (1 ≤ j ≤ n), e′
n+1 = en+1 + a2,n+1
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
15
(3) The right (a derivation) and left (not a derivation) multiplication operators re-
stricted to the nilradical are
0
a2,1
b
a4,1
a5,1
0
0
2b a2,3
0
0
0
a4,3
a5,3
b
0
b
0
b
a4,3
0
0
0
0
b
···
···
···
···
···
0
0
0
0
0
Ren+1 =
·
·
·
a5,3
a4,3
ai,1
ai,3
ai−1,3 ai−2,3 ···
...
...
...
...
a4,3
...
...
...
...
...
b
a2,3+a4,1+a4,3 0 a2,3+2a4,3
an,1
0
an−1,1 0 an−1,3 an−2,3 an−3,3 ··· an−i+3,3 an−i+2,3 ··· a4,3
0
an,3 an−1,3 an−2,3 ··· an−i+4,3 an−i+3,3 ··· a5,3 a4,3 b
0
0
0
0
0
0
0
0
0
0
−b
0
b
0
−b
···
···
···
···
···
···
···
···
···
···
0
0
0
0
0
−a4,3
b
−b
−a4,1
−a5,1
−b
0
0 −a4,3
0 −a5,3
Len+1 =
·
·
·
−a5,3
−a4,3
−ai,1
−ai,3
−ai−1,3 −ai−2,3 ···
−a4,3
−b
···
...
...
...
...
...
...
0
...
...
...
...
...
...
0
...
...
0
0
...
...
...
...
...
...
...
...
···
···
···
···
···
···
...
...
...
0
0
0
0
0
0 0
0 0
0 0
0 0
0 0
...
...
...
0
...
...
...
0 0
,
0
0
0
0
0
0
0
0
0
0
...
...
...
...
...
...
0
.
...
...
...
0
...
...
...
0
−an−1,1
−an,1
0 −an−1,3 −an−2,3 −an−3,3 ··· −an−i+3,3 −an−i+2,3 ··· −a4,3 −b
0
0 −an,3 −an−1,3 −an−2,3 ··· −an−i+4,3 −an−i+3,3 ··· −a5,3 −a4,3 −b
• The transformation e′
k = ek, (1 ≤ k ≤ n), e′
n+1 = en+1 − a4,3e1 removes a4,3
in Ren+1 and −a4,3 in Len+1 from the (i, i − 1)st positions, where (4 ≤ i ≤ n),
but it affects other entries as well, such as the entry in the (2, 1)st position in
Ren+1 and Len+1, which we change to a2,1 − a4,3 and a2,3 + a4,1, respectively.
It also changes the entry in the (2, 3)rd position in Len+1 to a2,3. At the same
time, it affects the coefficient in front of e2 in the bracket [en+1, en+1], which
we change back to a2,n+1.
• Applying the transformation e′
i = ei, (1 ≤ i ≤ n), e′
n+1 = en+1+Pn−1
k=3 ak+1,1ek,
we remove ak+1,1 in Ren+1 and −ak+1,1 in Len+1 from the entries in the (k +
1, 1)st positions, where (3 ≤ k ≤ n − 1). It changes the entry in the (2, 1)st
position in Ren+1 to a2,1 + 2a4,1 − a4,3, the entries in the (2, 3)rd positions in
Ren+1 and Len+1 to a2,3 + a4,1. It also affects the coefficient in front of e2 in
[en+1, en+1], which we rename back by a2,n+1. Then we assign a2,1 + 2a4,1 −
a4,3 := a2,1 and a2,3 + a4,1 := a2,3.
• The transformation e′
j = ej, (1 ≤ j ≤ n), e′
n+1 = en+1 − a2,n+1
2b e2 removes the
coefficient a2,n+1 in front of e2 in [en+1, en+1] and we prove the result.
···
···
···
···
···
0
0
0
0
0
···
···
···
···
···
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
a
0
0
a2,3−b2,1+b2,3 0 a2,3
−a
a4,1
a5,1
0
0
0 a4,3
0 a5,3
·
·
·
...
...
...
...
0
−a
0
a
a4,3
...
...
0
0
0
0
2a
...
...
a5,3
a4,3
...
...
a4,3
...
...
ai,1
0 ai,3
ai−1,3 ai−2,3 ···
(i−3)a ···
Ren+1 =
an−1,1
0
b2,3
an,1
0
0
0
0 −a4,3
0 −a5,3
0
−a
b2,1
a
−a4,1
−a5,1
0 an−1,3 an−2,3 an−3,3 ··· an−i+3,3 an−i+2,3 ··· a4,3 (n−4)a
0 an,3 an−1,3 an−2,3 ··· an−i+4,3 an−i+3,3 ··· a5,3
0
0
0
0
0
a4,3
0
0
0
0
0
0
a
0
−a
···
···
···
···
···
···
···
···
···
···
0
0
0
0
0
0
0
0
0
−2a
−a4,3
Len+1 =
·
·
·
−a5,3
−a4,3
...
...
...
...
...
...
...
...
...
...
...
...
−ai,1
0 −ai,3 −ai−1,3 −ai−2,3 ···
−a4,3
(3−i)a
···
...
...
...
...
...
...
...
...
...
...
...
...
...
0
...
...
...
0
...
...
...
0
...
...
...
0
...
...
...
0
0
(n−3)a
0
0
0
0
0
...
...
...
0
0
,
.
16
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
(4) The right (a derivation) and left (not a derivation) multiplication operators re-
stricted to the nilradical are given below:
−an−1,1 0 −an−1,3 −an−2,3 −an−3,3 ··· −an−i+3,3 −an−i+2,3 ··· −a4,3 (4−n)a
−an,1
0 −an,3 −an−1,3 −an−2,3 ··· −an−i+4,3 −an−i+3,3 ··· −a5,3 −a4,3 (3−n)a
• The transformation e′
k = ek, (1 ≤ k ≤ n), e′
n+1 = en+1 − a4,3e1 removes a4,3 in
Ren+1 and −a4,3 in Len+1 from the entries in the (i, i − 1)st positions, where
(4 ≤ i ≤ n), but it affects other entries as well, such as the entry in the
(2, 1)st position in Ren+1 and Len+1, which we change to a2,3 − b2,1 − a4,3 + b2,3
and b2,1 − a4,3, respectively. It also changes the entry in the (2, 3)rd position
in Len+1 to b2,3 − 2a4,3. At the same time, it affects the coefficient in front of
e2 in the bracket [en+1, en+1], which we change back to a2,n+1.
• Applying the transformation e′
i = ei, (1 ≤ i ≤ n), e′
n+1 = en+1+Pn−1
k=3 ak+1,1ek,
we remove ak+1,1 in Ren+1 and −ak+1,1 in Len+1 from the entries in the (k +
1, 1)st positions, where (3 ≤ k ≤ n − 1). It changes the entry in the (2, 1)st
position in Ren+1 to 2a4,1 + a2,3 − b2,1 − a4,3 + b2,3, the entries in the (2, 3)rd
positions in Ren+1 and Len+1 to a2,3 +a4,1 and b2,3 +a4,1−2a4,3, respectively. It
also affects the coefficient in front of e2 in [en+1, en+1], which we rename back
by a2,n+1. We assign a2,3 +a4,1 := a2,3, b2,1−a4,3 := b2,1 and b2,3 +a4,1−2a4,3 :=
b2,3. Then 2a4,1 + a2,3 − b2,1 − a4,3 + b2,3 := a2,3 − b2,1 + b2,3.
(5) We apply the transformation e′
2a4,1A4,3 + b2,1A4,3 − A2
assign a2,3 + a4,1 := a2,3 and b2,3 − 2b2,1 + a4,1 := b2,3.
4,3 − a2,3a4,1 − a2
i = ei, (1 ≤ i ≤ 4), e′
5 = e5−A4,3e1+ 1
2(b+c) (A2,1A4,3+
4,1 − a4,1b2,3 − a2,5)e2 + a4,1e3 and then we
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
17
(6) The transformation we apply is e′
i = ei, (1 ≤ i ≤ 4), e′
5 = e5−A4,3e1+ 1
2(c−a) (A2,1A4,3+
2a4,1A4,3 + b2,1A4,3 − A2
a2,3 + a4,1 := a2,3 and b2,3 − 2b2,1 + a4,1 := b2,3.
4,3 − a2,3a4,1 − a2
4,1 − a4,1b2,3 − a2,5)e2 + a4,1e3. We assign
(7) We apply the transformation e′
5 = e5 − a4,3e1 + a4,1e3 and
rename the coefficient in front of e2 in [e5, e5] back by a2,5. Then we assign a2,3 +
a4,1 := a2,3, b2,1 − a4,3 := b2,1 and b2,3 + a4,1 − 2a4,3 := b2,3.
i = ei, (1 ≤ i ≤ 4), e′
(8) We apply e′
2a4,1b2,1 + 3a2
b2,1 − a4,3 := b2,1.
i = ei, (1 ≤ i ≤ 4), e′
4,1 + 2a4,1a4,3 +
4,3 − 4a4,3b2,1 + a2,5)e2 + a4,1e3. We assign a2,3 + a4,1 := a2,3 and
5 = e5 − a4,3e1 − 1
2c(2a2,3a4,3 − a2
(9) The transformation is e′
2a2,3a4,1 + a2,3A4,3− 2a2
Then we assign a2,3 + a4,1 := a2,3 and b2,3 − 2a2,1 − 3a4,1 := b2,3.
i = ei, (1 ≤ i ≤ 4), e′
4,1 + 6a4,1A4,3− 2a4,1b2,3 − 2A2
5 = e5 − A4,3e1 + 1
4(b+c) (2a2,1A4,3 −
4,3 + b2,3A4,3− 2a2,5)e2 + a4,1e3.
(10) We apply the transformation e′
5 = e5 − a4,3e1 + a4,1e3 and
rename the coefficient in front of e2 in [e5, e5] back by a2,5. We assign a2,3 + a4,1 :=
a2,3, a2,1 + 2a4,1 − a4,3 := a2,1 and b2,3 + a4,1 − 2a4,3 := b2,3.
i = ei, (1 ≤ i ≤ 4), e′
(cid:3)
18
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
Theorem 5.1.3. There are eight solvable indecomposable right Leibniz algebras up to
isomorphism with a codimension one nilradical L 4, (n ≥ 4), which are given below:
(i) gn+1,1 : [e1, en+1] = e1 + (a − 1)e3, [e2, en+1] = 2ae2, [e3, en+1] = ae3,
[e4, en+1] = (a − 1)e2 + (a + 1)e4, [ei, en+1] = (a + i − 3) ei, [en+1, e1] = −e1 − (a − 1)e3,
[en+1, e3] = −ae3, [en+1, e4] = (a + 1) (e2 − e4) , [en+1, ei] = (3 − i − a) ei, (5 ≤ i ≤ n),
(ii) gn+1,2 : [e1, en+1] = e1 + (2 − n)e3, [e2, en+1] = 2(3 − n)e2, [e3, en+1] = (3 − n)e3,
[e4, en+1] = (2 − n)e2 + (4 − n)e4, [ei, en+1] = (i − n)ei, [en+1, en+1] = en,
[en+1, e1] = −e1 + (n − 2)e3, [en+1, e3] = (n − 3)e3, [en+1, e4] = (4 − n) (e2 − e4) ,
[en+1, ei] = (n − i)ei, (5 ≤ i ≤ n),
(iii) gn+1,3 : [e1, en+1] = e3, [e2, en+1] = 2e2, [e4, en+1] = e2, [ei, en+1] = ei + ǫei+2+
n
n
bk−i−2ek,
Xk=i+3
bk−i−2ek, [en+1, e1] = −e3, [en+1, e4] = e2, [en+1, ei] = −ei − ǫei+2 −
Xk=i+3
(ǫ = 0, 1, 3 ≤ i ≤ n),
(iv) gn+1,4 : [e1, en+1] = e1 − e3, [e3, en+1] = de2, [e4, en+1] = e4 − e2, [ei, en+1] = (i − 3)ei,
[en+1, en+1] = ǫe2, [en+1, e1] = −e1 + (d + f ) e2 + e3, [en+1, e3] = f e2, [en+1, e4] = e2 − e4,
[en+1, ei] = (3 − i)ei, (5 ≤ i ≤ n; ǫ = 0, 1; if ǫ = 0, then d2 + f 2 6= 0),
(v) g5,5 : [e1, e5] = ae1 + (b − a + 1)e3, [e2, e5] = 2(b + 1)e2, [e3, e5] = e1 + be3,
[e4, e5] = (b − a + 2)e2 + (a + b)e4, [e5, e1] = −ae1 + (a − b − 1)e3, [e5, e3] = −e1 − be3,
[e5, e4] = (a + b)(e2 − e4), (if b = −1, then a 6= 1),
(vi) g5,6 : [e1, e5] = ae1 + (1 − 2a)e3, [e2, e5] = 2(1 − a)e2, [e3, e5] = e1 − ae3,
[e4, e5] = 2(1 − a)e2, [e5, e5] = e4, [e5, e1] = −ae1 + (2a − 1)e3, [e5, e3] = ae3 − e1, (a 6= 1),
(vii) g5,7 : [e1, e5] = a(e1 − e3), [e3, e5] = e1 + f e2 − e3, [e4, e5] = (1 − a) (e2 − e4) ,
[e5, e5] = ǫe2, [e5, e1] = −ae1 + (d + f ) e2 + ae3, [e5, e3] = −e1 + de2 + e3,
[e5, e4] = (a − 1) (e2 − e4) , (ǫ = 0, 1; if ǫ = 0, then d2 + f 2 6= 0; a 6= 1),
(viii) g5,8 : [e1, e5] = ce2, [e3, e5] = e1 − e3, [e4, e5] = e2 − e4, [e5, e5] = ǫe2,
[e5, e1] = (c + d) e2, [e5, e3] = −e1 + (d + 2c) e2 + e3, [e5, e4] = e4 − e2, (c 6= 0, ǫ = 0, 1).
Proof. One applies the change of basis transformations keeping the nilradical L 4 given
in (4.0.1) unchanged.
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
19
(1) We have the right (a derivation) and the left (not a derivation) multiplication
a
0
operators restricted to the nilradical given below:
0
0
0
0
0
0
A2,1 2b a2,3
b−a 0
0
0
0
···
···
···
···
···
3a+b ···
0
0
0
0
0
2a+b
0
0
0
0
b−a
a+b
a5,3
0
0
0
b
0
0
0
0
0
0
·
a5,3
Ren+1 =
0
...
·
...
0
...
0
0
0
·
...
·
...
0 an−2,3 an−3,3
0 an−1,3 an−2,3
0
an,3 an−1,3
0
0
−a 0
b2,1 0
a−b 0
0
0 −a5,3
0
a2,3
−b
0
0
0
0
·
a+b
0
−a−b
−a5,3
·
...
0
...
0
...
0
0
0
0 −an−2,3 −an−3,3
0 −an−1,3 −an−2,3
0 −an,3 −an−1,3
0
...
···
···
···
0
0
0
0
0
0
...
...
···
···
···
0
0
0
0
0
...
···
···
···
0
−2a−b
−3a−b
...
...
a5,3
...
...
...
0 (n−5)a+b
·
·
a5,3
·
0
a5,3
(n−4)a+b
0
···
···
···
···
···
···
0
0
0
0
0
0
...
...
...
...
(5−n)a−b
...
0
0
0
0
0
0
0
...
...
0
,
0
0
0
0
0
0
...
...
0
0
(n−3)a+b
0
0
0
0
0
0
...
...
0
0
0
0
0
0
0
0
...
...
0
0
.
Len+1 =
··· −a5,3
···
···
1 = e1, e′
·
· −a5,3
0
(4−n)a−b
·
−a5,3
(3−n)a−b
2 = e2, e′
i = ei− ak−i+3,3
• We apply the transformation e′
(k−i)a ek, (3 ≤ i ≤ n−
2, i+2 ≤ k ≤ n, n ≥ 5), e′
j = ej, (n−1 ≤ j ≤ n+1), where k is fixed, renaming
all the affected entries back. This transformation removes a5,3, a6,3, ..., an,3 in
Ren+1 and −a5,3,−a6,3, ...,−an,3 in Len+1. Besides it introduces the entries in
the (5, 1)st, (6, 1)st, ..., (n, 1)st positions in Ren+1 and Len+1, which we set to
be a5,1, a6,1, ..., an,1 and −a5,1,−a6,1, ...,−an,1, respectively.
(I) Suppose b 6= a
2 .
• The transformation e′
2 = e2, e′
a2,3
b e2, e′
A2,1 and b2,1 from the (2, 1)st positions in Ren+1 and Len+1, respectively. It
b
(cid:17) e2, e′
a−2b (cid:16)A2,1 + (b−a)a2,3
n+1 = en+1−a5,1e2 +Pn−1
1 = e1 + 1
i = ei, (4 ≤ i ≤ n, n ≥ 4), e′
3 = e3 −
k=4 ak+1,1ek removes
also removes a2,3 from the (2, 3)rd positions in Ren+1 and Len+1 as well as ak+1,1
in Ren+1 and −ak+1,1 in Len+1 from the entries in the (k + 1, 1)st positions,
where (4 ≤ k ≤ n − 1).
Remark 5.1.1. If n = 4, then a5,1 = 0 and the same is in case (II).
• Then we scale a to unity applying the transformation e′
i = ei, (1 ≤ i ≤ n, n ≥
a by b, we obtain a continuous family of Leibniz
a . Renaming b
n+1 = en+1
4), e′
20
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
(5.1.2)
algebras:
[e1, en+1] = e1 + (b − 1)e3, [e2, en+1] = 2be2, [e3, en+1] = be3,
[e4, en+1] = (b − 1)e2 + (b + 1)e4, [ei, en+1] = (b + i − 3) ei,
[en+1, e1] = −e1 − (b − 1)e3, [en+1, e3] = −be3, [en+1, e4] = (b + 1)e2−
(b + 1)e4, [en+1, ei] = (3 − i − b) ei, (5 ≤ i ≤ n),
(b 6= 0, b 6=
, b 6= 3 − n).
1
2
(II) Suppose b := a
• The transformation e′
2 . We have that A2,1 = a2,3.
1 = e1− b2,1+a2,3
e2, e′
a
i ≤ n, n ≥ 4), e′
(2, 1)st, (2, 3)rd positions in Ren+1 and from the (2, 3)rd position in Len+1. It
n+1 = en+1 − a5,1e2 + Pn−1
2 = e2, e′
3 = e3− 2a2,3
i = ei, (4 ≤
k=4 ak+1,1ek removes a2,3 from the
a e2, e′
also removes b2,1 from the (2, 1)st position in Len+1 as well as ak+1,1 in Ren+1
and −ak+1,1 in Len+1 from the entries in the (k + 1, 1)st positions, where
(4 ≤ k ≤ n − 1).
• To scale a to unity, we apply the transformation e′
i = ei, (1 ≤ i ≤ n, n ≥
and obtain a limiting case of (5.1.2) with b = 1
2 given below:
e2
+
2
, [e2, en+1] = e2, [e3, en+1] =
, [e4, en+1] = −
3e4
2
e3
2
,
2(cid:19) ei, [en+1, e1] = −e1 +
(e2 − e4) , [en+1, ei] = (cid:18)5
, [en+1, e3] = −
2 − i(cid:19) ei, (5 ≤ i ≤ n).
e3
2
3
2
e3
2
,
a
4), e′
n+1 = en+1
e3
[e1, en+1] = e1 −
2
5
[ei, en+1] = (cid:18)i −
[en+1, e4] =
(2) We have the right (a derivation) and the left (not a derivation) multiplication
a
operators restricted to the nilradical are as follows:
···
···
···
···
···
(6−n)a ···
2(3−n)a
(4−n)a
(3−n)a
(5−n)a
(2−n)a
(2−n)a
0
0
0
0
0
0
0
0
0
0
0
0
0
A2,1
0
0
0
a2,3
a5,3
0
0
0
0
0
0
0
·
a5,3
Ren+1
0
...
0
0
0
0
...
0
0
0
0
0
−a
b2,1
·
...
·
...
an−2,3 an−3,3
an−1,3 an−2,3
an−1,3
0
an,3
0
a2,3
(4−n)a
(n−2)a 0 (n−3)a
0
0
0
0
0
0
0 −a5,3
0
·
(n−4)a
−a5,3
0
(n−5)a
...
···
···
···
0
0
0
0
0
...
···
···
···
0
0
0
0
0
(n−6)a
...
...
a5,3
·
·
···
···
···
···
···
···
...
...
−a5,3
Len+1 =
0
...
0
0
0
0
...
·
...
·
...
0 −an−2,3 −an−3,3
0 −an−1,3 −an−2,3
0 −an,3 −an−1,3
0
...
···
···
···
.
...
...
...
...
...
...
...
· −a5,3
·
0
2a
0
0 0
a 0
· −a5,3 0 0
0
...
···
···
···
0
0
0
0
0
0
0 0
0 0
0 0
0 0
0 0
0 0
...
...
...
...
...
...
...
a5,3
·
0 −2a 0 0
0 −a 0
a5,3 0 0
0 0
0 0
0 0
0 0
0 0
0 0
0
0
0
0
0
0
,
• We apply the transformation e′
2, i+2 ≤ k ≤ n, n ≥ 5), e′
1 = e1, e′
2 = e2, e′
(k−i)a ek, (3 ≤ i ≤ n−
j = ej, (n−1 ≤ j ≤ n+1), where k is fixed, renaming
i = ei− ak−i+3,3
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
21
all the affected entries back. This transformation removes a5,3, a6,3, ..., an,3 in
Ren+1 and −a5,3,−a6,3, ...,−an,3 in Len+1. Besides it introduces the entries in
the (5, 1)st, (6, 1)st, ..., (n, 1)st positions in Ren+1 and Len+1, which we set to
be a5,1, a6,1, ..., an,1 and −a5,1,−a6,1, ...,−an,1, respectively.
n−3 (cid:17) e2, e′
(2n−5)a (cid:16)A2,1 + (n−2)a2,3
a2,3
(n−3)a e2, e′
removes A2,1 and b2,1 from the (2, 1)st positions in Ren+1 and Len+1, respec-
n+1 = en+1 − a5,1e2 + Pn−1
i = ei, (4 ≤ i ≤ n, n ≥ 4), e′
• The transformation e′
1 = e1 + 1
k=4 ak+1,1ek
2 = e2, e′
3 = e3 +
It also removes a2,3 from the (2, 3)rd positions in Ren+1 and Len+1;
tively.
ak+1,1 and −ak+1,1 from the entries in the (k + 1, 1)st positions in Ren+1 and
Len+1, respectively, where (4 ≤ k ≤ n − 1). (See Remark 5.1.1).
• To scale a to unity, we apply the transformation e′
i = ei, (1 ≤ i ≤ n), e′
n+1 =
en+1
a
renaming the coefficient an,n+1
a2
in front of en in [en+1, en+1] back by an,n+1.
We obtain a Leibniz algebra:
[e1, en+1] = e1 + (2 − n)e3, [e2, en+1] = 2(3 − n)e2, [e3, en+1] = (3 − n)e3,
[e4, en+1] = (2 − n)e2 + (4 − n)e4, [ei, en+1] = (i − n)ei, [en+1, en+1] = an,n+1en,
[en+1, e1] = −e1 + (n − 2)e3, [en+1, e3] = (n − 3)e3, [en+1, e4] = (4 − n) (e2 − e4) ,
[en+1, ei] = (n − i)ei, (5 ≤ i ≤ n).
If an,n+1 = 0, then we have a limiting case of (5.1.2) with b = 3− n. If an,n+1 6= 0,
then an,n+1 = reiφ and we apply the transformation e′
n−2 ej, (1 ≤ j ≤
n+1 = en+1 to scale an,n+1 to 1. We have the
j = (cid:16)reiφ(cid:17)
2), e′
k−2
j
n−2 ek, (3 ≤ k ≤ n), e′
k = (cid:16)reiφ(cid:17)
algebra gn+1,2 given below:
[e1, en+1] = e1 + (2 − n)e3, [e2, en+1] = 2(3 − n)e2, [e3, en+1] = (3 − n)e3,
[e4, en+1] = (2 − n)e2 + (4 − n)e4, [ei, en+1] = (i − n)ei, [en+1, en+1] = en,
[en+1, e1] = −e1 + (n − 2)e3, [en+1, e3] = (n − 3)e3, [en+1, e4] = (4 − n) (e2 − e4) ,
[en+1, ei] = (n − i)ei, (5 ≤ i ≤ n).
(3) We have the right (a derivation) and the left (not a derivation) multiplication
operators restricted to the nilradical are as follows:
Ren+1 =
0
0
0
a2,1 2b a2,3
b
0
0
0
0
0
0
0
b
0
a5,3
·
0
...
·
...
0
...
0
0
0
0
b
0
b
0
·
...
a5,3
0
0
0
0
b
0
0
0
0
0
0
b
···
···
···
···
···
···
... 0
...
...
...
0 an−2,3 an−3,3 ···
0 an−1,3 an−2,3 ···
0
an,3 an−1,3 ···
··· a5,3
···
···
·
·
0 0 0
0 0 0
0 0 0
0 0 0
0 0 0
0 0 0
...
...
...
...
...
...
b
0
0 0
b 0
a5,3 0 b
,
...
0
a5,3
·
22
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
Len+1 =
0
0
0
a2,3 0
−b 0
0
0
0 −a5,3
0
0
0
a2,3
−b
0
·
0
b
0
−b
0
−a5,3
0
0
0
0
0
0
0
0
−b
0
0 −b
···
···
···
···
···
···
... 0
...
...
...
...
·
...
0 −an−2,3 −an−3,3 ···
0 −an−1,3 −an−2,3 ···
0 −an,3 −an−1,3 ···
··· −a5,3
···
···
·
· −a5,3
0
...
·
...
0
...
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
...
...
...
...
...
...
.
0
0
−b
0
0 −b 0
· −a5,3 0 −b
2 = e2, e′
e2, e′
• Applying the transformation e′
i =
ei, (4 ≤ i ≤ n + 1), we remove a2,1 from the (2, 1)st position in Ren+1 and a2,3
from the (2, 1)st, the (2, 3)rd positions in Len+1 and from the (2, 3)rd position
1 = e1− a2,1+a2,3
3 = e3− a2,3
b e2, e′
2b
in Ren+1 keeping other entries unchanged.
• To scale b to unity, we apply the transformation e′
i = ei, (1 ≤ i ≤ n), e′
n+1 =
en+1
b
. Then we rename a5,3
b , a6,3
b , ..., an,3
b by a5,3, a6,3, ..., an,3, respectively. We
obtain a Leibniz algebra
[e1, en+1] = e3, [e2, en+1] = 2e2, [e4, en+1] = e2, [ei, en+1] = ei +
n
n
Xk=i+2
ak−i+3,3ek,
[en+1, e1] = −e3, [en+1, e4] = e2, [en+1, ei] = −ei −
ak−i+3,3ek, (3 ≤ i ≤ n).
If a5,3 6= 0, (n ≥ 5), then a5,3 = reiφ and applying the transformation e′
(cid:16)reiφ(cid:17)
2 ek, (3 ≤ k ≤ n), e′
2 ej, (1 ≤ j ≤ 2), e′
k = (cid:16)reiφ(cid:17)
scale a5,3 to 1. We also rename all the affected entries back and then we
n+1 = en+1, we
j =
Xk=i+2
k−2
j
rename a6,3, ..., an,3 by b1, ..., bn−5, respectively. We combine with the case
when a5,3 = 0 and obtain a Leibniz algebra gn+1,3 given below:
n
[e1, en+1] = e3, [e2, en+1] = 2e2, [e4, en+1] = e2, [ei, en+1] = ei + ǫei+2 +
bk−i−2ek,
Xk=i+3
bk−i−2ek,
[en+1, e1] = −e3, [en+1, e4] = e2, [en+1, ei] = −ei − ǫei+2 −
(ǫ = 0, 1, 3 ≤ i ≤ n).
Remark 5.1.2. If n = 4, then ǫ = 0.
n
Xk=i+3
(4) We have the right (a derivation) and the left (not a derivation) multiplication
operators restricted to the nilradical are as follows:
Ren+1 =
a
0
0
a2,3−b2,1+b2,3 0 a2,3
−a
0
0
0
0
0
0
0
0 a5,3
0
·
0
−a
0
a
0
a5,3
·
...
0
0
0
0
2a
0
···
0
···
0
···
0
···
0
0
···
3a ···
... 0
...
...
...
0
...
·
...
0
...
0
0
0
0 an−2,3 an−3,3 ···
0 an−1,3 an−2,3 ···
0 an,3 an−1,3 ···
··· a5,3
···
···
·
·
0
0
0
0
0
0
...
...
(n−5)a
0
a5,3
...
0
a5,3
·
0
0
0
0
0
0
...
...
0
(n−4)a
0
0
0
0
0
0
...
...
0
0
0
(n−3)a
,
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
23
Len+1 =
0
b2,3
−a 0
b2,1 0
a 0
0 0
0 0 −a5,3
0 0
0
0
·
0
a
0
−a
0
0
0
0
0
0
0
0
0
−2a 0
−a5,3
0 −3a
···
···
···
···
···
···
0 0
...
...
·
...
·
...
0 0 −an−2,3 −an−3,3
0 0 −an−1,3 −an−2,3
0 0 −an,3 −an−1,3
...
···
···
···
...
...
0
...
··· −a5,3
···
···
·
0
0
0
0
0
0
...
...
(5−n)a
...
0
0
0
0
0
0
0
...
...
0
0
0
0
0
0
0
...
...
0
0
.
· −a5,3
0
(4−n)a
·
−a5,3
0
(3−n)a
2 = e2, e′
1 = e1, e′
i = ei− ak−i+3,3
• We apply the transformation e′
(k−i)a ek, (3 ≤ i ≤ n−
2, i+2 ≤ k ≤ n, n ≥ 5), e′
j = ej, (n−1 ≤ j ≤ n+1), where k is fixed, renaming
all the affected entries back. This transformation removes a5,3, a6,3, ..., an,3 in
Ren+1 and −a5,3,−a6,3, ...,−an,3 in Len+1. Besides it introduces the entries in
the (5, 1)st, (6, 1)st, ..., (n, 1)st positions in Ren+1 and Len+1, which we set to
be a5,1, a6,1, ..., an,1 and −a5,1,−a6,1, ...,−an,1, respectively.
• The transformation e′
n+1 =
en+1 + Pn−1
k=4 ak+1,1ek removes a2,3 − b2,1 + b2,3 from the (2, 1)st position in
Ren+1. It changes the entry in the (2, 1)st position in Len+1 to a2,3 + b2,3. It
also removes ak+1,1 and −ak+1,1 from the entries in the (k + 1, 1)st positions,
where (4 ≤ k ≤ n − 1) in Ren+1 and Len+1, respectively.
i = ei, (2 ≤ i ≤ n, n ≥ 4), e′
1 = e1+ a2,3−b2,1+b2,3
e2, e′
a
• We assign a2,3 := d and b2,3 := f and then we scale a to unity applying
a , f
by d, f and a2,n+1, respectively, we obtain a right and left Leibniz
i = ei, (1 ≤ i ≤ n, n ≥ 4), e′
the transformation e′
a . Renaming d
n+1 = en+1
and a2,n+1
a
a2
algebra:
[e1, en+1] = e1 − e3, [e3, en+1] = de2, [e4, en+1] = e4 − e2, [ei, en+1] = (i − 3)ei,
[en+1, en+1] = a2,n+1e2, [en+1, e1] = −e1 + (d + f ) e2 + e3, [en+1, e3] = f e2,
[en+1, e4] = e2 − e4, [en+1, ei] = (3 − i)ei, (5 ≤ i ≤ n),
which is a limiting case of (5.1.2) with b = 0, when d = f = a2,n+1 = 0.
Altogether (5.1.2) and all its limiting cases after replacing b with a give us a
Leibniz algebra gn+1,1 given below:
[e1, en+1] = e1 + (a − 1)e3, [e2, en+1] = 2ae2, [e3, en+1] = ae3,
[e4, en+1] = (a − 1)e2 + (a + 1)e4, [ei, en+1] = (a + i − 3) ei, [en+1, e1] = −e1−
(a − 1)e3, [en+1, e3] = −ae3, [en+1, e4] = (a + 1) (e2 − e4) , [en+1, ei] = (3 − i − a) ei,
(5 ≤ i ≤ n).
24
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
It remains to consider a continuous family of Leibniz algebras given below
and scale any nonzero entries as much as possible.
[e1, en+1] = e1 − e3, [e3, en+1] = de2, [e4, en+1] = e4 − e2, [ei, en+1] = (i − 3)ei,
[en+1, en+1] = a2,n+1e2, [en+1, e1] = −e1 + (d + f ) e2 + e3, [en+1, e3] = f e2,
2,n+1 + d2 + f 2 6= 0, 5 ≤ i ≤ n),
[en+1, e4] = e2 − e4, [en+1, ei] = (3 − i)ei, (a2
j
If a2,n+1 6= 0, then a2,n+1 = reiφ and applying the transformation e′
(cid:16)reiφ(cid:17)
2 ek, (3 ≤ k ≤ n, n ≥ 4), e′
2 ej, (1 ≤ j ≤ 2), e′
k = (cid:16)reiφ(cid:17)
scale it to 1. We also rename all the affected entries back. Then we combine
n+1 = en+1, we
j =
k−2
with the case when a2,n+1 = 0 and obtain a right and left Leibniz algebra
gn+1,4 given below:
[e1, en+1] = e1 − e3, [e3, en+1] = de2, [e4, en+1] = e4 − e2, [ei, en+1] = (i − 3)ei,
[en+1, en+1] = ǫe2, [en+1, e1] = −e1 + (d + f ) e2 + e3, [en+1, e3] = f e2,
[en+1, e4] = e2 − e4, [en+1, ei] = (3 − i)ei,
(5 ≤ i ≤ n; ǫ = 0, 1; if ǫ = 0, then d2 + f 2 6= 0).
(5) Applying the transformation e′
(c−2a)a2,3+c·b2,3
2a(b+c)
e2, e′
4 = e4, e′
5 = e5
1 = e1 + (b+2c−2a)a2,3+(b+2c)b2,3
c and renaming a
c and b
2a(b+c)
e2, e′
2 = e2, e′
3 = e3 +
c by a and b, respectively,
we obtain a continuous family of Leibniz algebras given below:
(5.1.3)
[e1, e5] = ae1 + (b − a + 1)e3, [e2, e5] = 2(b + 1)e2, [e3, e5] = e1 + be3,
[e4, e5] = (b − a + 2)e2 + (a + b)e4, [e5, e1] = −ae1 + (a − b − 1)e3,
[e5, e3] = −e1 − be3, [e5, e4] = (a + b)(e2 − e4), (b 6= −a, a 6= 0, b 6= −1).
(6) We apply the transformation e′
(2a−c)a2,3−c·b2,3
2a(a−c)
e2, e′
4 = e4, e′
5 = e5
1 = e1 + (3a−2c)a2,3+(a−2c)b2,3
c and rename a
c and a4,5
2a(a−c)
e2, e′
2 = e2, e′
3 = e3 +
c2 by a and a4,5, respectively,
to obtain a Leibniz algebra given below:
(5.1.4)
[e1, e5] = ae1 + (1 − 2a)e3, [e2, e5] = 2(1 − a)e2, [e3, e5] = e1 − ae3,
[e4, e5] = 2(1 − a)e2, [e5, e5] = a4,5e4, [e5, e1] = −ae1 + (2a − 1)e3,
[e5, e3] = ae3 − e1, (a 6= 0, a 6= 1),
which is a limiting case of (5.1.3) with b := −a if a4,5 = 0. If a4,5 6= 0, then
a4,5 = reiφ. To scale a4,5 to 1, we apply the transformation e′
2 =
1 = √rei φ
2 e1, e′
reiφe2, e′
3 = √rei φ
2 e3, e′
4 = reiφe4, e′
5 = e5 and obtain a Leibniz algebra given
(5.1.5)
below:
[e1, e5] = ae1 + (1 − 2a)e3, [e2, e5] = 2(1 − a)e2, [e3, e5] = e1 − ae3,
[e4, e5] = 2(1 − a)e2, [e5, e5] = e4, [e5, e1] = −ae1 + (2a − 1)e3,
[e5, e3] = −e1 + ae3, (a 6= 0, a 6= 1).
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
25
(7) We apply the transformation e′
assign d := a·b2,3+c(a2,3−b2,1+b2,3)
a
family of Leibniz algebras:
1 = e1 + a2,3−b2,1+b2,3
e2, e′
, f := a·a2,3−c(a2,3−b2,1+b2,3)
a
i = ei, (2 ≤ i ≤ 5) and
to obtain a continuous
a
[e1, e5] = a(e1 − e3), [e3, e5] = ce1 + f e2 − ce3, [e4, e5] = (c − a)(e2 − e4), [e5, e5] = a2,5e2,
[e5, e1] = −ae1 + (d + f ) e2 + ae3, [e5, e3] = −ce1 + de2 + ce3, [e5, e4] = (a − c)(e2 − e4).
c renaming
Then we continue with the transformation e′
5 = e5
i = ei, (1 ≤ i ≤ 4), e′
(5.1.6)
(5.1.7)
d
c , f
c and a2,5
c , a
c2 by d, f, a and a2,5, respectively, to obtain a Leibniz algebra:
[e1, e5] = a(e1 − e3), [e3, e5] = e1 + f e2 − e3, [e4, e5] = (1 − a) (e2 − e4) ,
[e5, e5] = a2,5e2, [e5, e1] = −ae1 + (d + f ) e2 + ae3, [e5, e3] = −e1 + de2 + e3,
[e5, e4] = (a − 1) (e2 − e4) , (a 6= 0, a 6= 1).
If d = f = a2,5 = 0, then we have a limiting case of (5.1.3) with b = −1. If
a2,5 6= 0, then we apply the same transformation as we did to scale a4,5 to 1. We
also rename all the affected entries back. Then we combine with the case when
a2,5 = 0 and obtain a Leibniz algebra given below:
[e1, e5] = a(e1 − e3), [e3, e5] = e1 + f e2 − e3, [e4, e5] = (1 − a) (e2 − e4) ,
[e5, e5] = ǫe2, [e5, e1] = −ae1 + (d + f ) e2 + ae3, [e5, e3] = −e1 + de2 + e3,
[e5, e4] = (a − 1) (e2 − e4) , (ǫ = 0, 1; if ǫ = 0, then d2 + f 2 6= 0),
(a 6= 0, a 6= 1).
Remark 5.1.3. We notice by applying the transformation e′
1 = e1 + f e2, e′
i =
ei, (2 ≤ i ≤ 5) that this algebra (5.1.7) is isomorphic to
[e1, e5] = ae1 − af e2 − ae3, [e3, e5] = e1 − e3, [e4, e5] = (1 − a) (e2 − e4) , [e5, e5] = ǫe2,
[e5, e1] = −ae1 + (af + d + f ) e2 + ae3, [e5, e3] = −e1 + (d + f )e2 + e3,
[e5, e4] = (a − 1) (e2 − e4) , (ǫ = 0, 1; if ǫ = 0, then d2 + f 2 6= 0), (a 6= 0, a 6= 1).
3 = e3 − b2,1
(8) Applying the transformation e′
c2 back by a4,5, we obtain a Leibniz algebra:
c and renaming a4,5
1 = e1 + a2,3−2b2,1
2 = e2, e′
c e2, e′
5 = e5
e2, e′
e4, e′
c
4 =
[e1, e5] = e3, [e2, e5] = 2e2, [e3, e5] = e1, [e4, e5] = 2e2, [e5, e5] = a4,5e4, [e5, e1] = −e3,
[e5, e3] = −e1,
which is a limiting case of (5.1.4) with a = 0 and at the same time a limiting
case of (5.1.3) with b := −a if a4,5 = 0. Therefore we only consider the case when
a4,5 6= 0. One applies the transformation below (5.1.4) to scale a4,5 to 1 and we
have a limiting case of (5.1.5) with a = 0. Altogether (5.1.5) and all its limiting
26
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
cases give us the algebra g5,6 in full generality:
[e1, e5] = ae1 + (1 − 2a)e3, [e2, e5] = 2(1 − a)e2, [e3, e5] = e1 − ae3, [e4, e5] = 2(1 − a)e2,
[e5, e5] = e4, [e5, e1] = −ae1 + (2a − 1)e3, [e5, e3] = −e1 + ae3,
where a 6= 1, otherwise nilpotent.
(9) If a = 0, b 6= 0, b 6= −c, c 6= 0, (n = 4), then we apply the transformation e′
e1 + (b+2c)b2,3−(3b+2c)a2,3
(b+c)2
e2, e′
2 = e2, e′
3 = e3 − B2,1
b+c e2, e′
4 = e4, e′
5 = e5
by b and obtain a Leibniz algebra:
[e1, e5] = (b + 1)e3, [e2, e5] = 2(b + 1)e2, [e3, e5] = e1 + be3, [e4, e5] = (b + 2)e2 + be4,
[e5, e1] = (−b − 1)e3, [e5, e3] = −e1 − be3, [e5, e4] = b(e2 − e4), (b 6= 0, b 6= −1),
which is a limiting case of (5.1.3) with a = 0. Altogether (5.1.3) and all its limiting
cases give us the algebra g5,5 in full generality:
1 =
c . We rename b
c
[e1, e5] = ae1 + (b − a + 1)e3, [e2, e5] = 2(b + 1)e2, [e3, e5] = e1 + be3,
[e4, e5] = (b − a + 2)e2 + (a + b)e4, [e5, e1] = −ae1 + (a − b − 1)e3, [e5, e3] = −e1 − be3,
[e5, e4] = (a + b)(e2 − e4),
where if b = −1, then a 6= 1, otherwise nilpotent.
c e2, e′
(10) We apply the transformation e′
1 = e1 + a2,3
c , b2,3
c and a2,5
c2 by a2,1, a2,3, b2,3 and a2,5, respectively, to obtain a
i = ei, (2 ≤ i ≤ 4), e′
5 = e5
c and
rename a2,1
c , a2,3
Leibniz algebra:
[e1, e5] = a2,1e2, [e3, e5] = e1 − e3, [e4, e5] = e2 − e4, [e5, e5] = a2,5e2,
[e5, e1] = (a2,3 + b2,3 − a2,1) e2, [e5, e3] = −e1 + (a2,3 + b2,3) e2 + e3, [e5, e4] = e4 − e2.
We scale a2,5 to 1 if nonzero. Combining with the case when a2,5 = 0 and renaming
all the affected entries back, we have the algebra:
[e1, e5] = a2,1e2, [e3, e5] = e1 − e3, [e4, e5] = e2 − e4, [e5, e5] = ǫe2,
[e5, e1] = (a2,3 + b2,3 − a2,1) e2, [e5, e3] = −e1 + (a2,3 + b2,3) e2 + e3, [e5, e4] = e4 − e2,
(ǫ = 0, 1).
If a2,1 = 0, then we obtain a limiting case of (5.1.6) and (5.1.7) with a = 0
according to Remark 5.1.3. Altogether (5.1.7) and all its limiting cases, give us
the algebra g5,7 in full generality:
[e1, e5] = a(e1 − e3), [e3, e5] = e1 + f e2 − e3, [e4, e5] = (1 − a) (e2 − e4) , [e5, e5] = ǫe2,
[e5, e1] = −ae1 + (d + f ) e2 + ae3, [e5, e3] = −e1 + de2 + e3, [e5, e4] = (a − 1) (e2 − e4) ,
(ǫ = 0, 1; if ǫ = 0, then d2 + f 2 6= 0),
where a 6= 1, otherwise nilpotent.
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
27
If c := a2,1 6= 0 and we assign d := a2,3 + b2,3 − 2a2,1, then we obtain a Leibniz
algebra g5,8 given below:
[e1, e5] = ce2, [e3, e5] = e1 − e3, [e4, e5] = e2 − e4, [e5, e5] = ǫe2, [e5, e1] = (c + d) e2,
[e5, e3] = −e1 + (d + 2c) e2 + e3, [e5, e4] = e4 − e2, (c 6= 0, ǫ = 0, 1).
(cid:3)
5.1.2. Codimension two and three solvable extensions of L 4
The non-zero inner derivations of L 4, (n ≥ 4) are given by
, Rei = −Ei+1,1 =
(4 ≤ i ≤ n−1),
0 0 0 ··· 0
0 0 0 ··· 0
0 0 0 ··· 0
0 0 0 ··· 0
−1 0 0 ··· 0
...
...
...
...
...
...
· 0 0 ··· 0
...
...
Re1 =
0 0 0 0 ··· 0 0 0
1 0 0 0 ··· 0 0 0
0 0 0 0 ··· 0 0 0
0 0 1 0 ··· 0 0 0
0 0 0 1 ··· 0 0 0
...
...
...
...
...
...
...
...
0 0 0 0 ··· 1 0 0
0 0 0 0 ··· 0 1 0
, Re3 =
0 0 0 0 ··· 0
2 0 1 0 ··· 0
0 0 0 0 ··· 0
−1 0 0 0 ··· 0
0 0 0 0 ··· 0
...
...
...
...
0 0 0 0 ··· 0
...
where Ei+1,1 is the n× n matrix that has 1 in the (i + 1, 1)st position and all other entries
are zero.
Remark 5.1.4. If we have four or more outer derivations, then they are "nil-dependent"(see
Section 2.). Therefore the solvable algebras we are constructing might be of codimension
at most three. (As Section 5.1.2.3 shows, we have at most two outer derivations.)
General approach to find right solvable Leibniz algebras with a codimension two
nilradical L 4.2
(i) We consider R[er,es] = [Res, Rer] = Res
Res, (n + 1 ≤ r ≤ n + 2, 1 ≤ s ≤
k=3 ckRek, because e2 and en are in the center
n + 2) and compare with c1Re1 +Pn−1
of L 4, (n ≥ 4) defined in (4.0.1) to find all the unknown commutators.
(ii) We write down [er, es], (n + 1 ≤ r ≤ n + 2, 1 ≤ s ≤ n + 2) including a linear
combination of e2 and en as well. We add the brackets of the nilradical L 4 and
outer derivations Ren+1 and Ren+2.
Rer − Rer
(iii) One satisfies the right Leibniz identity: [[er, es], et] = [[er, et], es] + [er, [es, et]] or,
equivalently, Ret ([er, es]) = [Ret(er), es] + [er, Ret(es)], (1 ≤ r, s, t ≤ n + 2) for all
the brackets obtained in step (ii).
(iv) Then we carry out the technique of "absorption" (see Section 3.2) to remove some
parameters to simplify the algebra.
(v) We apply the change of basis transformations without affecting the nilradical to
remove as many parameters as possible.
5.1.2.1. Codimension two solvable extensions of L 4, (n = 4)
There are the following cases based on the conditions involving parameters a, b and c:
(1) b 6= −a, a 6= 0, b 6= −c,
(2) b := −a, a 6= 0, a 6= c,
(3) b := −c, a 6= c, a 6= 0,
(4) a = 0, b 6= 0, b 6= −c.
2When we work with left Leibniz algebras, we first change the right multiplication operator to the left
everywhere and the right Leibniz identity to the left Leibniz identity in step (iii). We also interchange s
and r in the very left in steps (i) and (ii) as well.
28
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
1
b
1
1
a
0
a1
b1
c1
a2
b2
c2
=
=
(1) (a) One could set
Therefore the vector space of outer derivations as 4 × 4 matrices is as follows:
Re5 =
and
2 b2,3 2a a2,3 a − 1
a + 1
1
−b · α2,3 − (1 + b)β2,3 2(b + 1) α2,3
b
0
a − 1
1
2 a2,3 + 1−2a
a
0
3−2a
0
0
0
0
b
0
0
0
0
0
0
0
1
0
,
, (a 6= −1, a 6= 0, b 6= −1).
(i) Considering R[e5,e6], we obtain that a := 1 and α2,3 := (cid:16)b + 3
it follows that β2,3 := b2,3
2 . Since b 6= −1,
.
0
b + 1
2(cid:17) a2,3 + b2,3
b + 1
Re6 =
2 −(cid:16)b + 1
1
2(cid:17) a2,3 and R[e5,e6] = 0. As a result,
Re5 =
0
0
2 a2,3 0
0
0
0
2
a2,3−b2,3
2
0
0
1
0
0
,
2(cid:17) a2,3 + b2,3
1
2
b
0
0
0
0
0
b + 1
0
b + 1
, (b 6= −1).
Re6 =
a2,3
2 −(cid:16)b + 1
2(cid:17) b2,3 2(b + 1) (cid:16)b + 3
1
b
0
Further, we find the following commutators:
(ii) We include a linear combination of e2 and e4:
( R[e5,e1] = −Re1, R[e5,e2] = 0, R[e5,e3] = −Re3, R[e5,ei] = 0, R[e6,e1] = −Re1 − bRe3,
R[e6,e2] = 0, R[e6,e3] = −Re1 − bRe3, R[e6,ei] = 0, (b 6= −1, 4 ≤ i ≤ 6).
[e5, e1] = −e1 + c2,1e2 + c4,1e4, [e5, e2] = c2,2e2 + c4,2e4, [e5, e3] = c2,3e2 − e3 + c4,3e4,
[e5, ei] = c2,ie2 + c4,ie4, [e6, e1] = −e1 + d2,1e2 − be3 + d4,1e4, [e6, e2] = d2,2e2 + d4,2e4,
[e6, e3] = −e1 + d2,3e2 − be3 + d4,3e4, [e6, ei] = d2,ie2 + d4,ie4, (b 6= −1, 4 ≤ i ≤ 6).
Besides we have the brackets from L 4 and from outer derivations Re5 and Re6 as well.
(iii) We satisfy the right Leibniz identity, which is shown in Table 2.
We obtain that Re5 and Re6 restricted to the nilradical do not change, but the remaining
brackets are as follows:
a2,3 − b2,3
1
2
1
b2,3
b2,3
e2, [e5, e3] = a2,3e2 − e3, [e5, e4] = 2 (e2 − e4) , [e5, e5] = c2,5e2,
2 ! e2 − be3,
[e5, e1] = −e1 +
[e5, e6] = c2,6e2 + ((b + 1)c2,5 − c2,6) e4, [e6, e1] = −e1 + (cid:18)b +
[e6, e3] = −e1 + (cid:18)b +
[e6, e5] = d2,5e2 + (c2,6 − (b + 1)c2,5) e4, [e6, e6] = (cid:16)(b + 1) (c2,6 + d2,5) − (b + 1)2c2,5(cid:17) e2,
(b 6= −1).
2(cid:19) a2,3 −
2 ! e2 − be3, [e6, e4] = (b + 1) (e2 − e4) ,
2(cid:19) a2,3 −
Altogether the nilradical L 4 (4.0.1), the outer derivations Re5 and Re6 written in the
bracket notation and the remaining brackets given above define a continuous family of
Leibniz algebras depending on the parameters.
(iv)&(v) We apply the following transformation: e′
6 = e6 − d2,5
e3 − a2,3e2, e′
1 = e1 + b2,3−a2,3
2 c2,5 − c2,6
5 = e5 − c2,5
2 = e2, e′
4 = e4, e′
2 e2, e′
e2, e′
3 =
2 (cid:17) e4 and obtain a
2 e2 + (cid:16) b+1
2
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
29
Table 2. Right Leibniz identities in case (1) (a) with a nilradical L 4, (n = 4).
Steps Ordered triple
Result
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
Re1 ([e5, e1])
Re1 ([e6, e1])
Re3 ([e5, e1])
Re3 ([e6, e1])
Re5 ([e5, e5])
Re6 ([e5, e6])
Re5 ([e5, e3])
Re6 ([e5, e3])
Re1 ([e5, e6])
Re3 ([e5, e6])
Re5 ([e5, e6])
Re5 ([e6, e3])
Re6 ([e6, e3])
Re6 ([e6, e5])
[e5, e2] = 0 =⇒ c2,2 = c4,2 = 0.
[e6, e2] = 0 =⇒ d2,2 = d4,2 = 0.
c2,4 := 2, c4,4 := −2 =⇒ [e5, e4] = 2 (e2 − e4) .
d2,4 := 1 + b, d4,4 := −1 − b =⇒ [e6, e4] = (b + 1) (e2 − e4) .
c4,5 = 0 =⇒ [e5, e5] = c2,5e2.
d4,6 = 0 =⇒ [e6, e6] = d2,6e2.
c2,3 := a2,3, c4,3 = 0 =⇒ [e5, e3] = a2,3e2 − e3.
c2,1 := a2,3−b2,3
d4,1 = 0 =⇒ [e6, e1] = −e1 + d2,1e2 − be3.
, c4,1 = 0 =⇒ [e5, e1] = −e1 + a2,3−b2,3
2
2
e2.
d4,3 = 0 =⇒ [e6, e3] = −e1 + d2,3e2 − be3.
d4,5
:= −c4,6 =⇒ c4,6
:= (b + 1)c2,5 − c2,6 =⇒ [e5, e6] = c2,6e2 +
((b + 1)c2,5 − c2,6) e4, [e6, e5] = d2,5e2 + (c2,6 − (b + 1)c2,5) e4
b2,3
2 =⇒ [e6, e3] = −e1 +(cid:16)(cid:0)b + 1
2 =⇒ [e6, e1] = −e1 +(cid:16)(cid:0)b + 1
2(cid:1) a2,3 −
2(cid:1) a2,3 − b2,3
d2,3 :=(cid:0)b + 1
d2,1 :=(cid:0)b + 1
(cid:0)(b + 1) (c2,6 + d2,5) − (b + 1)2c2,5(cid:1) e2.
(b + 1) (c2,6 + d2,5) − (b + 1)2c2,5
d2,6
:=
b2,3
2(cid:1) a2,3 −
2(cid:1) a2,3 − b2,3
=⇒
2 (cid:17) e2 − be3.
2 (cid:17) e2 − be3.
[e6, e6]
=
Leibniz algebra g6,2 given below:
Remark 5.1.5. We notice that if b = −1, then the outer derivation Re6 is nilpotent.
(1) (b) We set
vector space of outer derivations as 4 × 4 matrices is as follows:
[e1, e5] = e1, [e2, e5] = 2e2, [e3, e5] = e3, [e4, e5] = 2e4, [e5, e1] = −e1, [e5, e3] = −e3,
[e5, e4] = 2 (e2 − e4) , [e1, e6] = e1 + be3, [e2, e6] = 2(b + 1)e2, [e3, e6] = e1 + be3,
[e4, e6] = (b + 1) (e2 + e4) , [e6, e1] = −e1 − be3, [e6, e3] = −e1 − be3,
[e6, e4] = (b + 1) (e2 − e4) , (b 6= −1).
a2
and
=
b2
c2
− 1+3c
2 a2,3 − 3+3c
2 b2,3 2(c + 2) a2,3 2c + 1
=
, (c 6= −2, d 6= −1). Therefore the
a1
b1
c1
1
1
d
1
0
0
c
,
0
1
2
c
c + 1
Re5 =
Re6 =
a2,3 := (cid:16) 3
2 c + 2(cid:17) α2,3 + c
(cid:16) 3
2 α2,3 −(cid:16) 3
2 + c(cid:17) β2,3 − 1
2 α2,3 − c−2
2 α2,3 − 1+3d
d
0
1−3d
1
.
d
0
0
0
2
0
0
0
0
3
0
2 β2,3 2(d + 1) α2,3 2d
0
2
2(cid:17) b2,3 = 0.
2 β2,3,
2 c + 1
2 c + 3
2(cid:17) a2,3 −(cid:16) 3
2 β2,3 and R[e5,e6] = 0. As a result,
1
0
There are the following two cases:
(I) If c 6= −1, then b2,3 := − 3c+2
(i) Considering R[e5,e6], we obtain that d = 0 and we have the system of equations:
Re5 =
α2,3
2 − 2c+3
c + 1
2 β2,3 2(c + 2) (cid:16) 3c
2 + 2(cid:17) α2,3 + c
2 β2,3 2c + 1
,
0
0
0
c
2
0
1
0
0
0
3
30
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
1
α2,3−β2,3
2
0
0
Further, we find the following:
Re6 =
0
0
0
2 α2,3 0
0
0
0
2
1
0
, (c 6= −2).
( R[e5,e1] = −Re1 − (c + 1)Re3, R[e5,e2] = 0, R[e5,e3] = −cRe1 − 2Re3, R[e5,ei] = 0,
R[e6,e1] = −Re1, R[e6,e2] = 0, R[e6,e3] = −Re3, R[e6,ei] = 0, (c 6= −2, 4 ≤ i ≤ 6).
(II) If c = −1, then a2,3 := α2,3−β2,3
0
−1
Re5 =
2 α2,3−β2,3
2
2
0
0
0
, Re6 =
0
0
2 α2,3 0
0
0
2
0
and R[e5,e6] = 0. It follows that
and we have the following commutators:
0
−1
0
3
α2,3−β2,3
α2,3−β2,3
2
0
0
2
0
0
1
0
1
0
1
2
( R[e5,e1] = −Re1, R[e5,e2] = 0, R[e5,e3] = Re1 − 2Re3, R[e5,ei] = 0,
R[e6,e1] = −Re1, R[e6,e2] = 0, R[e6,e3] = −Re3, R[e6,ei] = 0, (4 ≤ i ≤ 6).
(ii) We combine cases (I) and (II) together, include a linear combination of e2 and e4,
and have the following brackets:
[e5, e1] = −e1 + a2,1e2 − (c + 1)e3 + a4,1e4, [e5, e2] = a2,2e2 + a4,2e4, [e5, e3] = −ce1+
a2,3e2 − 2e3 + a4,3e4, [e5, ei] = a2,ie2 + a4,ie4, [e6, e1] = −e1 + b2,1e2 + b4,1e4,
[e6, e2] = b2,2e2 + b4,2e4, [e6, e3] = b2,3e2 − e3 + b4,3e4, [e6, ei] = b2,ie2 + b4,ie4,
(c 6= −2, 4 ≤ i ≤ 6).
Besides we have the brackets from L 4 and from outer derivations Re5 and Re6 as well.
(iii) To satisfy the right Leibniz identity, we refer to the identities given in Table 2.
as much as possible. As a result, the identities we apply are the following: 1. − 6., 8.,
Re6([e5, e1]) = [Re6(e5), e1]+[e5, Re6(e1)], 9.−11., Re6 ([e6, e1]) = [Re6(e6), e1]+[e6, Re6(e1)],
13. and 14. We obtain that Re5 and Re6 restricted to the nilradical do not change, but
the remaining brackets are the following:
3
β2,3
2(cid:19) α2,3 −
+ 2(cid:19) α2,3 −
[e5, e1] = −e1 + (cid:18)c +
2 ! e2 − (c + 1)e3,
[e5, e3] = −ce1 +(cid:18)(cid:18) c
β2,3(cid:19) e2 − 2e3, [e5, e4] = 3 (e2 − e4) ,
α2,3 − β2,3
[e5, e5] = (c + 2) (a2,6 + a4,6) e2, [e5, e6] = a2,6e2 + a4,6e4, [e6, e1] = −e1 +
[e6, e3] = α2,3e2 − e3, [e6, e4] = 2 (e2 − e4) , [e6, e5] = ((c + 2)b2,6 + a4,6) e2 − a4,6e4,
[e6, e6] = b2,6e2, (c 6= −2).
c
2
2
2
e2,
Altogether the nilradical L 4 (4.0.1), the outer derivations Re5 and Re6 written in the
bracket notation and the remaining brackets given above define a continuous family of
Leibniz algebras depending on the parameters.
(iv)&(v) We apply the transformation: e′
6 = e6 − b2,6
e4, e′
5 = e5 − a2,6
[e1, e5] = e1 + (c + 1)e3, [e2, e5] = 2(c + 2)e2, [e3, e5] = ce1 + 2e3, [e4, e5] = (2c + 1)e2 + 3e4,
[e5, e1] = −e1 − (c + 1)e3, [e5, e3] = −ce1 − 2e3, [e5, e4] = 3 (e2 − e4) , [e1, e6] = e1,
[e2, e6] = 2e2, [e3, e6] = e3, [e4, e6] = 2e4, [e6, e1] = −e1, [e6, e3] = −e3, [e6, e4] = 2 (e2 − e4) ,
(c 6= −2).
1 = e1− α2,3−β2,3
2 e2 and obtain a Leibniz algebra g6,3:
3 = e3 − α2,3e2, e′
2 e2 − a4,6
2 = e2, e′
2 e4, e′
e2, e′
4 =
2
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
31
a1
b1
c1
a2
b2
c2
a
1
0
=
(1) (c) We set
vector space of outer derivations as 4 × 4 matrices is as follows:
b
Re5 =
0
0
2 α2,3 2 − b
0
0
0
b
(i) Considering R[e5,e6], we obtain that a := 1 and we have the system of equations:
and
0
2 a2,3 1 − a
0
a + 1
0
=
, Re6 =
, (a, b 6= 0, a 6= −1). Therefore the
(3b−3)α2,3+(b−3)β2,3
(3a−2)a2,3+(a−2)b2,3
1 − b
0
1 − a
b
0
1
1
0
0
0
0
1
0
0
0
2a
a
2b
.
( α2,3 := 3a2,3+b2,3
b2a2,3 + (b2 − 2b)b2,3 + (3 − 3b)α2,3 + (3 − b)β2,3 = 0.
,
2
There are the following two cases:
2
0
1
a2,3−b2,3
(I) If b 6= 3, then β2,3 := (2b−3)a2,3+(2b−1)b2,3
, Re6 =
Re5 =
0
0
2 a2,3 0
0
0
0
2
Further, we find the commutators:
2
0
0
1
0
b·a2,3+(b−2)b2,3
2
1 − b
0
and R[e5,e6] = 0. Consequently,
b
1
0
2 3a2,3+b2,3
0
0
2
0
0
0
2 − b
0
b
, (b 6= 0).
( R[e5,e1] = −Re1, R[e5,e2] = 0, R[e5,e3] = −Re3, R[e5,ei] = 0, R[e6,e1] = −bRe1 + (b − 1)Re3,
R[e6,e2] = 0, R[e6,e3] = −Re1, R[e6,ei] = 0, (b 6= 0, 4 ≤ i ≤ 6).
(II) If b := 3, then R[e5,e6] = 0 and Re5, Re6 are as follows:
0
2 3a2,3+b2,3
0
0
0
0
2 a2,3 0
0
0
0
2
0
−1
0
3
−2
0
3a2,3+b2,3
a2,3−b2,3
2
0
0
2
0
0
1
0
0
3
1
1
.
2
, Re6 =
Re5 =
We have the following commutators:
( R[e5,e1] = −Re1, R[e5,e2] = 0, R[e5,e3] = −Re3, R[e5,ei] = 0, R[e6,e1] = −3Re1 + 2Re3,
R[e6,e2] = 0, R[e6,e3] = −Re1, R[e6,ei] = 0, (4 ≤ i ≤ 6).
(ii) We combine cases (I) and (II) together and include a linear combination of e2 and
e4 :
[e5, e1] = −e1 + c2,1e2 + c4,1e4, [e5, e2] = c2,2e2 + c4,2e4, [e5, e3] = c2,3e2 − e3 + c4,3e4,
[e5, ei] = c2,ie2 + c4,ie4, [e6, e1] = −be1 + d2,1e2 + (b − 1)e3 + d4,1e4, [e6, e2] = d2,2e2 + d4,2e4,
[e6, e3] = −e1 + d2,3e2 + d4,3e4, [e6, ei] = d2,ie2 + d4,ie4, (b 6= 0, 4 ≤ i ≤ 6).
We also have the brackets from L 4 and from outer derivations Re5 and Re6 as well.
(iii) To satisfy the right Leibniz identity, we apply the same identities as in Table 2.
We have that Re5 and Re6 restricted to the nilradical do not change, but the remaining
brackets are the following:
a2,3 − b2,3
2
[e5, e1] = −e1 +
[e5, e6] = c2,6e2 + (c2,5 − c2,6) e4, [e6, e1] = −be1 + 2 − b
[e6, e3] = −e1 +
[e6, e6] = (d2,5 − c2,5 + c2,6) e2, (b 6= 0).
e2, [e5, e3] = a2,3e2 − e3, [e5, e4] = 2 (e2 − e4) , [e5, e5] = c2,5e2,
b2,3! e2 + (b − 1)e3,
e2, [e6, e4] = b (e2 − e4) , [e6, e5] = d2,5e2 + (c2,6 − c2,5) e4,
Altogether the nilradical L 4 (4.0.1), the outer derivations Re5 and Re6 written in the
bracket notation and the remaining brackets given above define a continuous family of
Leibniz algebras depending on the parameters.
a2,3 − b2,3
a2,3 −
b
2
2
2
32
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
1 = e1 + b2,3−a2,3
2
e2, e′
2 = e2, e′
(iv)&(v) We apply the transformation: e′
e4, e′
2 e2, e′
2 e2 + c2,5−c2,6
6 = e6 − d2,5
5 = e5 − c2,5
[e1, e5] = e1, [e2, e5] = 2e2, [e3, e5] = e3, [e4, e5] = 2e4, [e5, e1] = −e1, [e5, e3] = −e3,
[e5, e4] = 2 (e2 − e4) , [e1, e6] = be1 + (1 − b)e3, [e2, e6] = 2e2, [e3, e6] = e1,
[e4, e6] = (2 − b)e2 + be4, [e6, e1] = −be1 + (b − 1)e3, [e6, e3] = −e1, [e6, e4] = b (e2 − e4) ,
(b 6= 0).
e4 and obtain a Leibniz algebra g6,4:
(2) In this case we consider R[e5,e6] and compare with c1Re1 + c3Re3, where
2
3 = e3 − a2,3e2, e′
4 =
a
0
c
0
Re5 =
Re6 =
(5a−3c)a2,3+(3a−3c)b2,3
2a
c − 2a
0
α
(5α−3γ)α2,3+(3α−3γ)β2,3
2α
γ − 2α
0
2(c − a) a2,3 2(c − a)
,
0
0
0
0
0
−a
0
γ
−α
0
2(γ − α) α2,3 2(γ − α)
.
0
0
0
0
0
c ! and
(3) Considering R[e5,e6] and comparing with c1Re1 + c3Re3, where
We obtain that aγ − αc = 0, where a, α 6= 0, which is impossible, because a
γ ! are supposed to be linearly independent.
α
Re5 =
0 −γ
0
0
we have to have that aγ − αc = 0, where a, α 6= 0, which is impossible.
(4) Finally we consider R[e5,e6] and compare with c1Re1 + c3Re3 as well. We obtain that
bγ − βc = 0, where b, β 6= 0, which is impossible.
α2,3 − β2,1 + β2,3 0 α2,3 γ − α
α − γ
c
a2,3 − b2,1 + b2,3 0 a2,3
0 −c
0
0
, Re6 =
0
c − a
0
a − c
−α
0
−a
0
α
0
0
0
0
a
γ
,
5.1.2.2. Codimension two solvable extensions of L 4, (n ≥ 5)
By taking a linear combination of Ren+1 and Ren+2 and keeping in mind that no nontrivial
linear combination of the matrices Ren+1 and Ren+2 can be a nilpotent matrix, one could
β ! = 1
1 ! . Therefore the vector space of outer derivations
b ! = 1
2 ! and α
set a
as n × n matrices is as follows:
1
3b2,1−2a2,3 4 a2,3
0
0
1
0
0
0
2
0
0
0
0 a5,3
0
·
Ren+1 =
0
1
0
3
0
a5,3
0
0
0
0
4
0
0
0
0
0
0
5
···
···
···
···
···
···
... 0
...
...
...
·
...
0
...
·
...
0
...
0
0
0
0 an−2,3 an−3,3 ···
0 an−1,3 an−2,3 ···
0 an,3 an−1,3 ···
··· a5,3
···
···
·
·
...
a5,3
·
0 n−3
0 n−2
a5,3
0 n−1
0
0
0
0
0
0
...
...
0
0
0
0
0
0
...
...
0
0
0
0
0
0
0
...
...
0
0
,
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
33
1
0
0
β2,1 2 α2,3
0
0
0
0
1
0
0
0
0 α5,3
0
·
0
0
0
2
0
α5,3
0
0
0
0
3
0
0
0
0
0
0
4
···
···
···
···
···
···
Ren+2 =
0
...
·
...
... 0
...
...
...
...
·
...
0 αn−2,3 αn−3,3 ···
0 αn−1,3 αn−2,3 ···
0 αn,3 αn−1,3 ···
··· α5,3
···
···
·
0 n−4
· α5,3
0 n−3
· α5,3
0 n−2
0
0
0
0
0
0
...
...
0
0
0
0
0
0
...
...
0
0
0
0
0
0
0
...
...
0
0
.
0
...
0
0
0
0
...
0
0
0
1
b2,1−
0
0
0
0
(i) Considering R[en+1,en+2], which is the same as [Ren+2, Ren+1], we deduce that αi,3 :=
ai,3, (5 ≤ i ≤ n), α2,3 := a2,3
2 . As a result, the outer derivation Ren+2
changes as follows:
2 and β2,1 := b2,1 − a2,3
a2,3
0
2
Ren+2 =
a2,3
0
2
0
0
0 a5,3
0
2
1
0
·
0
...
·
...
0
0
0
2
0
·
...
a5,3
0
0
0
0
3
0
0
0
0
0
0
4
···
···
···
···
···
···
... 0
...
...
...
0 an−2,3 an−3,3 ···
0 an−1,3 an−2,3 ···
0 an,3 an−1,3 ···
··· a5,3
···
···
·
·
0
0
0
0
0
0
...
...
0
0
0
0
0
0
...
...
0
0
0
0
0
0
0
...
...
0
0
.
...
a5,3
·
0 n−4
0 n−3
a5,3
0 n−2
Altogether we find the following commutators:
R[en+1,e1] = −Re1 − Re3, R[en+1,e2] = 0, R[en+1,ei] = (1 − i)Rei −
R[en+1,ej] = 0, (n ≤ j ≤ n + 1), R[en+1,en+2] = −
ak+1,3Rek, R[en+2,e1] = −Re1,
R[en+2,e2] = 0, R[en+2,ei] = (2 − i)Rei −
n−1
n−1
Xk=i+2
ak−i+3,3Rek, (3 ≤ i ≤ n − 1),
R[en+2,en] = 0, R[en+2,en+1] =
ak+1,3Rek, R[en+2,en+2] = 0.
n−1
Xk=4
n−1
Xk=i+2
ak−i+3,3Rek,
Xk=4
(ii) We include a linear combination of e2 and en :
[en+1, e1] = −e1 + c2,1e2 − e3 + cn,1en, [en+1, e2] = c2,2e2 + cn,2en, [en+1, ei] = c2,ie2+
(1 − i)ei −
ak−i+3,3ek + cn,ien, [en+1, ej] = c2,je2 + cn,jen, (n ≤ j ≤ n + 1),
n−1
Xk=i+2
[en+1, en+2] = c2,n+2e2 −
ak+1,3ek + cn,n+2en, [en+2, e1] = −e1 + d2,1e2 + dn,1en,
n−1
Xk=4
[en+2, e2] = d2,2e2 + dn,2en, [en+2, ei] = d2,ie2 + (2 − i)ei −
ak−i+3,3ek + dn,ien,
n−1
Xk=i+2
(3 ≤ i ≤ n − 1), [en+2, en] = d2,ne2 + dn,nen, [en+2, en+1] = d2,n+1e2 +
dn,n+1en, [en+2, en+2] = d2,n+2e2 + dn,n+2en.
n−1
Xk=4
ak+1,3ek+
Besides we have the brackets from L 4 and from outer derivations Ren+1 and Ren+2 as
well.
34
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
(iii) We satisfy the right Leibniz identity shown in Table 3. We notice that Ren+1 and
Ren+2 restricted to the nilradical do not change, but the remaining brackets are as follows:
n
Xk=5
ak,3ek, [en+1, e4] = 3 (e2 − e4) −
n
n
Xk=i+2
ak−1,3ek, [en+1, ei] = (1 − i)ei −
[en+1, e1] = −e1 + b2,1e2 − e3, [en+1, e3] = a2,3e2 − 2e3 −
Xk=6
ak+1,3ek + cn,n+2en, [en+2, e1] = −e1 +(cid:18)b2,1 −
Xk=4
[en+1, en+2] = c2,n+2e2 −
Xk=5
[en+2, e3] =
e2 − e3 −
ak,3ek, [en+2, e4] = 2 (e2 − e4) −
Xk=i+2
ak−i+3,3ek, (5 ≤ i ≤ n), [en+2, en+1] = d2,n+1e2 +
ak−i+3,3ek, [en+1, en+1] = (2c2,n+2 − 2a5,3) e2,
2 (cid:19) e2,
ak−1,3ek,
a2,3
2
Xk=6
a2,3
n−1
n
n
n
n−1
Xk=4
ak+1,3ek−
[en+2, ei] = (2 − i)ei −
cn,n+2en, [en+2, en+2] =
d2,n+1 + a5,3
e2.
2
Table 3. Right Leibniz identities in the codimension two nilradical
L 4, (n ≥ 5).
Steps Ordered triple
Result
k=6 ak−1,3ek.
c2,i+1 = 0, cn,i+1 := −an−i+2,3, (4 ≤ i ≤ n − 2), where a4,3 = 0 =⇒ [en+1, ej ] =
c2,n = 0, cn,n := 1 − n =⇒ [en+1, en] = (1 − n) en. Altogether with 4., [en+1, ei] =
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
d2,4 := 2, dn,4 := −an−1,3, where a4,3 = 0 =⇒ [en+2, e4] = 2(e2 − e4) −
d2,i+1 = 0, dn,i+1 := −an−i+2,3, (4 ≤ i ≤ n − 2), where a4,3 = 0 =⇒ [en+2, ej] =
Re1 ([en+1, e1])
[en+1, e2] = 0 =⇒ c2,2 = cn,2 = 0.
k=6 ak−1,3ek.
[en+2, e2] = 0 =⇒ d2,2 = dn,2 = 0.
k=i+2 ak−i+3,3ek, (5 ≤ i ≤ n).
Re1 ([en+2, e1])
Re3 ([en+1, e1])
Rei ([en+1, e1])
Ren−1 ([en+1, e1])
Re3 ([en+2, e1])
Rei ([en+2, e1])
k=j+2 ak−j+3,3ek, (5 ≤ j ≤ n − 1).
c2,4 := 3, cn,4 := −an−1,3, where a4,3 = 0 =⇒ [en+1, e4] = 3(e2−e4)−Pn
(1 − j) ej −Pn
(1 − i) ei −Pn
Pn
(2 − j) ej −Pn
(2 − i) ei −Pn
c2,3 := a2,3, cn,3 := −an,3 =⇒ [en+1, e3] = a2,3e2 − 2e3 −Pn
2 e2 − e3 −Pn
2 , dn,1 = 0 =⇒ [en+2, e1] = −e1 +(cid:0)b2,1 −
2 , dn,3 := −an,3 =⇒ [en+2, e3] = a2,3
c2,1 := b2,1, cn,1 = 0 =⇒ [en+1, e1] = −e1 + b2,1e2 − e3.
Ren+1 ([en+1, en+1])cn,n+1 = 0 =⇒ [en+1, en+1] = c2,n+1e2.
Ren+2 ([en+1, en+2])dn,n+2 = 0 =⇒ [en+2, en+2] = d2,n+2e2.
Ren+1 ([en+1, e3])
Ren+2 ([en+2, e3]) d2,3 := a2,3
Ren+2 ([en+1, e1])
Ren+2 ([en+2, e1]) d2,1 := b2,1 −
Ren+1 ([en+1, en+2])c2,n+1
:= 2c2,n+2 − 2a5,3, dn,n+1
k=j+2 ak−j+3,3ek, (5 ≤ j ≤ n − 1).
k=i+2 ak−i+3,3ek, (5 ≤ i ≤ n).
k=5 ak,3ek.
k=5 ak,3ek.
2 (cid:1) e2.
:= −cn,n+2
=⇒
a2,3
a2,3
Ren+2 ([en+2, en+1])d2,n+2 := d2,n+1+a5,3
(2c2,n+2 − 2a5,3) e2, [en+2, en+1] = d2,n+1e2 +Pn−1
=⇒ [en+2, en+2] = d2,n+1+a5,3
2
2
e2.
k=4 ak+1,3ek − cn,n+2en.
Ren−1 ([en+2, e1]) d2,n = 0, dn,n := 2 − n =⇒ [en+2, en] = (2 − n) en. Combining with 7., [en+2, ei] =
[en+1, en+1] =
Altogether the nilradical L 4 (4.0.1), the outer derivations Ren+1 and Ren+2 and the re-
maining brackets given above define a continuous family of solvable right Leibniz algebras
depending on the parameters. Then we apply the technique of "absorption" according to
step (iv).
• First we apply the transformation e′
c2,n+2
e2, e′
n+2 = en+2 − d2,n+1+a5,3
4
2
i = ei, (1 ≤ i ≤ n, n ≥ 5), e′
n+1 = en+1 −
e2 to remove the coefficients c2,n+2 and d2,n+1+a5,3
2
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
35
2
a5,3
a5,3
2 e4, e′
n+1 = en+1 + a5,3
i = ei, (1 ≤ i ≤ n, n ≥ 5), e′
in front of e2 in [en+1, en+2] and [en+2, en+2], respectively. This transformation
changes the coefficient in front of e2 in [en+1, en+1] and [en+2, en+1] to −2a5,3 and
−a5,3, respectively.
• Then we apply e′
n+2 = en+2 to re-
move the coefficients −a5,3 and −2a5,3 in front of e2 in [en+2, en+1] and [en+1, en+1],
respectively. Besides this transformation removes a5,3 and −a5,3 in front of e4 in
[en+2, en+1] and [en+1, en+2], respectively, and changes the coefficients in front of
ek, (6 ≤ k ≤ n − 1) in [en+2, en+1] and [en+1, en+2] to ak+1,3 − a5,3
2 ak−1,3 and
2 ak−1,3 − ak+1,3, respectively. It also affects the coefficients in front en, (n ≥ 6)
in [en+1, en+2] and [en+2, en+1], which we rename back by cn,n+2 and −cn,n+2, re-
spectively. The following entries are introduced by the transformation: − a5,3
2 and
in the (5, 1)st, (n ≥ 5) position in Ren+1 and Len+1, respectively.
• Applying the transformation e′
j = ej, (1 ≤ j ≤ n + 1, n ≥ 6), e′
Pn−1
2 a5,3ak−1,3−Pk
(6 ≤ k ≤ n − 1, n ≥ 7), we remove the coefficients a6,3 and −a6,3 in front of e5 in
[en+2, en+1] and [en+1, en+2], respectively. We also remove ak+1,3 − a5,3
2 ak−1,3 and
a5,3
2 ak−1,3 − ak+1,3 in front of ek, (6 ≤ k ≤ n − 1) in [en+2, en+1] and [en+1, en+2],
respectively. This transformation introduces a6,3
in the (6, 1)st, (n ≥ 6)
position as well as Ak+1,3
in the (k + 1, 1)st, (6 ≤ k ≤ n− 1) in Ren+2 and
Len+2, respectively. It also affects the coefficients in front en, (n ≥ 7) in [en+1, en+2]
and [en+2, en+1], which we rename back by cn,n+2 and −cn,n+2, respectively.
i = ei, (1 ≤ i ≤ n + 1, n ≥ 5), e′
n+2 =
en+2 + cn,n+2
n−1 en, we remove cn,n+2 and −cn,n+2 in front of en in [en+1, en+2] and
[en+2, en+1], respectively, without affecting other entries. We obtain that Ren+1
and Ren+2 are as follows:
k−1 ek, where A6,3 := a6,3 and Ak+1,3 := ak+1,3− 1
• Finally applying the transformation e′
n+2 = en+2 −
4 and − a6,3
k−1 and Ak+1,3
1−k
Ak+1,3
k=5
i−3
i=7
4
Ai−1,3ak−i+5,3
,
Ren+2 =
a2,3
2
1
b2,1−
0
0
0
a6,3
4
A7,3
5
A8,3
6
...
An−2,3
n−4
An−1,3
n−3
An,3
n−2
0 an−2,3 an−3,3 ···
0 an−1,3 an−2,3 ···
0 an,3 an−1,3 ···
···
···
···
··· a5,3
0 n−4
···
···
·
·
a5,3
0 n−3
·
a5,3
0 n−2
1
0
0
3b2,1−2a2,3 4 a2,3
1
0
a5,3
2
0
−
2
0
0
0
0 a5,3
0
·
Ren+1 =
0
1
0
3
0
·
...
a5,3
0
0
0
0
4
0
0
0
0
0
0
5
···
···
···
···
···
···
... 0
...
...
...
0
...
0
0
0
0
a2,3
0
2
0
0
0 a5,3
0
2
1
0
·
0
...
·
...
0 an−2,3 an−3,3 ···
0 an−1,3 an−2,3 ···
0 an,3 an−1,3 ···
0
0
0
0
0
0
0
0
0
3
0
0
0
0
0
0
0
0
2
0
a5,3
0
4
0
0
5
a5,3
0
0
...
·
·
...
·
·
...
·
a5,3 0
...
...
a5,3
·
0
0
0
0
0
0
...
...
...
·
·
··· a5,3
···
···
···
···
···
···
···
···
...
...
...
,
0 n−3
0 n−2
0 n−1
0
0
0
0
0
0
...
...
a5,3
0
0
0
0
0
0
...
...
...
0
0
0
0
0
0
0
...
...
0
0
0
0
0
0
0
...
...
...
0
0
0
0
0
0
0
0
...
...
0
0
, (n ≥ 5).
36
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
The remaining brackets are given below:
a5,3
2
(v) Finally we apply the following two change of basis transformations:
Bk−i+3,3
n
ak,3ek,
ak−i+3,3ek,
n
n = en, e′
n
n
a2,3
2 = e2, e′
n
a2,3
2
n
Bk−2,3aj−k+5,3
k=7
k−5
ek, [en+2, e3] =
n
Xk=6
Ak,3
k − 2
3 = e3 − a2,3
2 e2, e′
n+1 = en+1, e′
Xk=5
ak,3ek,
e2 − e3 −
ak−i+3,3ek, (5 ≤ i ≤ n).
Xk=i+2
i = ei − Pn
Xk=5
e5, [en+1, e3] = a2,3e2 − 2e3 −
Xk=i+2
[en+1, e1] = −e1 + b2,1e2 − e3 +
Xk=6
[en+1, e4] = 3 (e2 − e4) −
ak−1,3ek, [en+1, ei] = (1 − i)ei −
[en+2, e1] = −e1 +(cid:18)b2,1 −
2 (cid:19) e2 −
Xk=6
[en+2, e4] = 2 (e2 − e4) −
ak−1,3ek, [en+2, ei] = (2 − i)ei −
1 = e1 − (cid:16)b2,1 − a2,3
2 (cid:17) e2, e′
• e′
n−1 = en−1, e′
(3 ≤ i ≤ n − 2), e′
aj,3 −Pj
, (5 ≤ j ≤ n).
This transformation removes a5,3, a6,3, ..., an,3 in Ren+1, Ren+2 and −a5,3,−a6,3, ...,−an,3
in Len+1, Len+2. It also removes − a5,3
from the (5, 1)st positions in Ren+1
and Len+1, respectively. Besides it removes 3b2,1 − 2a2,3 and b2,1 from the (2, 1)st
positions in Ren+1 and Len+1, respectively, as well as b2,1− a2,3
from the (2, 1)st po-
sitions in Ren+2 and Len+2. The transformation also removes a2,3 from the (2, 3)rd
positions in Ren+1, Len+1 and a2,3
from the same positions in Ren+2, Len+2. This
transformation introduces the entries in the (i, 1)st positions in Ren+1 and Len+1,
which we set to be ai,1 and −ai,1, (6 ≤ i ≤ n), respectively. The transforma-
tion affects the entries in the (j, 1)st, (8 ≤ j ≤ n) positions in Ren+2 and Len+2,
but we rename all the entries in the (i, 1)st positions by i−3
i−2 ai,1 in Ren+2 and by
3−i
i−2 ai,1, (6 ≤ i ≤ n) in Len+2.
n+2 = en+2 +Pn−1
i−2 ai,1 and 3−i
k−1ak+1,1ek, we remove ai,1 in Ren+1 and −ai,1 in Len+1 as
• Finally applying the transformation e′
ek,
n+2 = en+2, where Bj,3 :=
k=i+2
k−i
n+1 = en+1+Pn−1
i−2 ai,1, (6 ≤ i ≤ n) in Ren+2 and Len+2, respectively.
k = ek, (1 ≤ k ≤ n), e′
2 and a5,3
2
k=5 ak+1,1ek,
e′
well as i−3
k−2
k=5
2
2
We obtain a Leibniz algebra gn+2,1 given below:
[e1, en+1] = e1 + e3, [e2, en+1] = 4e2, [e3, en+1] = 2e3, [e4, en+1] = e2 + 3e4,
[ei, en+1] = (i − 1)ei, [en+1, e1] = −e1 − e3, [en+1, e3] = −2e3, [en+1, e4] = 3(e2 − e4),
[en+1, ei] = (1 − i)ei, [e1, en+2] = e1, [e2, en+2] = 2e2, [ej, en+2] = (j − 2)ej, (3 ≤ j ≤ n),
[en+2, e1] = −e1, [en+2, e3] = −e3, [en+2, e4] = 2(e2 − e4), [en+2, ei] = (2 − i)ei, (5 ≤ i ≤ n).
We summarize a result in the following theorem:
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
37
Theorem 5.1.4. There are four solvable indecomposable right Leibniz algebras up to
isomorphism with a codimension two nilradical L 4, (n ≥ 4), which are given below:
(i) gn+2,1 : [e1, en+1] = e1 + e3, [e2, en+1] = 4e2, [e3, en+1] = 2e3, [e4, en+1] = e2 + 3e4,
[ei, en+1] = (i − 1)ei, [en+1, e1] = −e1 − e3, [en+1, e3] = −2e3, [en+1, e4] = 3(e2 − e4),
[en+1, ei] = (1 − i)ei, [e1, en+2] = e1, [e2, en+2] = 2e2, [ej, en+2] = (j − 2)ej, (3 ≤ j ≤ n),
[en+2, e1] = −e1, [en+2, e3] = −e3, [en+2, e4] = 2(e2 − e4), [en+2, ei] = (2 − i)ei, (5 ≤ i ≤ n),
(n ≥ 5),
(ii) g6,2 : [e1, e5] = e1, [e2, e5] = 2e2, [e3, e5] = e3, [e4, e5] = 2e4, [e5, e1] = −e1, [e5, e3] = −e3,
[e5, e4] = 2 (e2 − e4) , [e1, e6] = e1 + be3, [e2, e6] = 2(b + 1)e2, [e3, e6] = e1 + be3,
[e4, e6] = (b + 1) (e2 + e4) , [e6, e1] = −e1 − be3, [e6, e3] = −e1 − be3, [e6, e4] = (b + 1) (e2 − e4) ,
(b 6= −1),
(iii) g6,3 : [e1, e5] = e1 + (c + 1)e3, [e2, e5] = 2(c + 2)e2, [e3, e5] = ce1 + 2e3,
[e4, e5] = (2c + 1)e2 + 3e4, [e5, e1] = −e1 − (c + 1)e3, [e5, e3] = −ce1 − 2e3, [e5, e4] = 3 (e2 − e4) ,
[e1, e6] = e1, [e2, e6] = 2e2, [e3, e6] = e3, [e4, e6] = 2e4, [e6, e1] = −e1, [e6, e3] = −e3,
[e6, e4] = 2 (e2 − e4) , (c 6= −2),
(iv) g6,4 : [e1, e5] = e1, [e2, e5] = 2e2, [e3, e5] = e3, [e4, e5] = 2e4, [e5, e1] = −e1, [e5, e3] = −e3,
[e5, e4] = 2 (e2 − e4) , [e1, e6] = be1 + (1 − b)e3, [e2, e6] = 2e2, [e3, e6] = e1, [e4, e6] = (2 − b)e2+
be4, [e6, e1] = −be1 + (b − 1)e3, [e6, e3] = −e1, [e6, e4] = b (e2 − e4) , (b 6= 0).
5.1.2.3. Codimension three solvable extensions of L 4, (n = 4)
Considering R[e5,e6], R[e5,e7] and R[e6,e7] and comparing with c1Re1 + c3Re3, where
Rei =
ai
0
ci
0
(3ai−2bi−3ci)ai2,3+(ai−2bi−3ci)bi2,3
bi + ci − ai
2ai
0
2(bi + ci) ai2,3 2ci + bi − ai
0
0
bi
0
0
ai + bi
, (5 ≤ i ≤ 7),
a1
b1
c1
we have to have, respectively, that
a1c2 − a2c1 − b1c2 + b2c1 = 0, a1c3 − a3c1 − b1c3 + b3c1 = 0, a2c3 − a3c2 − b2c3 + b3c2 = 0.
However, it means that
are linearly dependent: one could
see that considering det
a1 (a2c3 − a3c2) − a2 (a1c3 − a3c1) + a3 (a1c2 − a2c1) = 0.
5.2. Solvable indecomposable left Leibniz algebras with a nilradical L 4
= a1 (b2c3 − b3c2)−a2 (b1c3 − b3c1)+a3 (b1c2 − b2c1) =
and
a1 a2 a3
b1
b3
c3
c1
b2
c2
,
a2
b2
c2
a3
b3
c3
5.2.1. Codimension one solvable extensions of L 4
Classification follows the same steps in theorems with the same cases per step.
38
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
Theorem 5.2.1. We set a1,1 := a and a3,3 := b in (5.1.1). To satisfy the left Leibniz
identity, there are the following cases based on the conditions involving parameters, each
gives a continuous family of solvable Leibniz algebras:
(1) If a1,3 = 0, b 6= −a, a 6= 0, b 6= 0, (n = 4) or b 6= (3 − n)a, a 6= 0, b 6= 0, (n ≥ 5),
then we have the following brackets for the algebra:
n
n
[e1, en+1] = ae1 + a2,1e2 + (b − a)e3 +
[e4, en+1] = (a + b)(e4 − e2) +
n
Xk=4
Xk=5
ak,1ek, [e3, en+1] = a2,3e2 + be3 +
ak−1,3ek, [ei, en+1] = ((i − 3)a + b) ei +
ak,3ek,
ak−i+3,3ek,
n
Xk=4
Xk=i+1
[en+1, en+1] = a2,n+1e2, [en+1, e1] = −ae1 + B2,1e2 + (a − b)e3 −
Xk=4
[en+1, e2] = −2be2, [en+1, e3] = (a2,3 + 2a4,3)e2 − be3 −
Xk=i+1
(a + b)e4 −
ak−1,3ek, [en+1, ei] = ((3 − i)a − b) ei −
(2b − a)a2,1 + 2b · a4,1 + 2(a − b)(a2,3 + a4,3)
where B2,1 :=
Xk=5
n
n
n
,
n
Xk=4
ak,1ek,
ak,3ek, [en+1, e4] = (a − b)e2−
ak−i+3,3ek, (5 ≤ i ≤ n),
Len+1 =
−ai,1
−ai,3
−ai−1,3 −ai−2,3
−a4,3
(3−i)a−b ···
0
0
−a
B2,1 −2b a2,3+2a4,3
a−b
−a4,1
−a5,1
−a4,3
−a5,3
0
0
0
−b
·
·
·
...
...
0
...
...
...
...
0
a−b
0
...
...
−a−b
−a4,3 −2a−b
−a5,3
−a4,3
a
0
0
0
0
...
...
···
···
···
···
···
0
0
0
0
0
···
···
···
···
···
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
...
...
···
...
...
...
...
...
...
...
...
0
...
...
...
0
...
...
...
0
0
(3−n)a−b
.
−an−1,1
−an,1
0 −an−1,3 −an−2,3 −an−3,3 ··· −an−i+3,3 −an−i+2,3 ··· −a4,3 (4−n)a−b
0
−an,3 −an−1,3 −an−2,3 ··· −an−i+4,3 −an−i+3,3 ··· −a5,3 −a4,3
(2) If a1,3 = 0, b := −a, a 6= 0, (n = 4) or b := (3 − n)a, a 6= 0, (n ≥ 5), then the
brackets for the algebra are
n
n
n
n
n
Xk=4
ak,1ek, [e3, en+1] = a2,3e2 + (3 − n)ae3+
Xk=5
ak−1,3ek, [ei, en+1] = (i − n) aei+
ak,3ek, [e4, en+1] = (n − 4)a(e2 − e4) +
ak−i+3,3ek, [en+1, en+1] = a2,n+1e2 + an,n+1en, [en+1, e1] = −ae1 + B2,1e2+
[e1, en+1] = ae1 + a2,1e2 − (n − 2)ae3 +
Xk=4
Xk=i+1
(n − 2)ae3 −
(n − 3)ae3 −
[en+1, ei] = (n − i) aei −
where B2,1 := (5 − 2n)a2,1 + (6 − 2n)a4,1 + 2(n − 2)(a2,3 + a4,3),
ak,1ek, [en+1, e2] = (2n − 6)ae2, [en+1, e3] = (a2,3 + 2a4,3)e2+
ak,3ek, [en+1, e4] = (n − 2)ae2 + (n − 4)ae4 −
ak−i+3,3ek, (5 ≤ i ≤ n),
Xk=4
Xk=4
Xk=i+1
ak−1,3ek,
Xk=5
n
n
n
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
39
Len+1 =
0
0
0
(2n−6)a a2,3+2a4,3 (n−2)a
(n−3)a
−a4,3
−a5,3
0
(n−4)a
−a4,3
0
0
0
0
(n−5)a
···
···
···
···
···
0
0
0
0
0
−a5,3
−a4,3
...
...
...
...
...
...
···
−a4,3
...
...
·
...
...
...
...
...
−ai,1
−ai,3
−ai−1,3 −ai−2,3
(n−i)a
−a
B2,1
(n−2)a
−a4,1
−a5,1
·
...
...
···
···
···
···
···
···
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
...
...
...
0
...
...
...
0
.
...
...
...
0
−an−1,1
−an,1
−an−1,3 −an−2,3 −an−3,3 ··· −an−i+3,3 −an−i+2,3 ··· −a4,3
0
−an,3 −an−1,3 −an−2,3 ··· −an−i+4,3 −an−i+3,3 ··· −a5,3 −a4,3 0
a
(3) If a1,3 = 0, a = 0, b 6= 0, (n = 4) or a = 0 and b 6= 0, (n ≥ 5), then
[e1, en+1] = (a2,3 + a4,3 − a4,1) e2 + be3 +
[e4, en+1] = b (e4 − e2) +
ak−1,3ek, [ei, en+1] = bei +
Xk=4
n
n
n
ak,1ek, [e3, en+1] = a2,3e2 + be3 +
n
Xk=4
ak,3ek,
n
Xk=4
ak−i+3,3ek,
Xk=i+1
ak,1ek, [en+1, e2] = −2be2,
Xk=5
n
ak,3ek, [en+1, e4] = −b (e2 + e4) −
ak−1,3ek,
Xk=5
0
...
...
[en+1, en+1] = a2,n+1e2, [en+1, e1] = b2,1e2 − be3 −
[en+1, e3] = (a2,3 + 2a4,3)e2 − be3 −
[en+1, ei] = −bei −
ak−i+3,3ek, (5 ≤ i ≤ n),
Xk=4
n
n
Xk=i+1
0
b2,1 −2b a2,3+2a4,3
−b
−b
−a4,1
−a5,1
−a4,3
−a5,3
0
−b
0
−b
−a4,3
0
0
0
0
−b
···
···
···
···
···
0
0
0
0
0
Len+1 =
·
·
·
−a5,3
−a4,3
−ai,1
−ai,3
−ai−1,3 −ai−2,3
...
...
...
...
...
...
···
−a4,3
...
...
...
...
...
−b
0
...
...
0
0
0
·
0
...
...
0
0
0
0
0
0
...
...
···
···
···
···
···
···
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
...
...
...
0
...
...
...
0
.
...
...
...
0
−an−1,1
−an,1
0 −an−1,3 −an−2,3 −an−3,3 ··· −an−i+3,3 −an−i+2,3 ··· −a4,3 −b
0
0
−an,3 −an−1,3 −an−2,3 ··· −an−i+4,3 −an−i+3,3 ··· −a5,3 −a4,3 −b
(4) If a1,3 = 0, b = 0, a 6= 0, (n = 4) or b = 0, a 6= 0, (n ≥ 5), then
Xk=4
ak,1ek, [e3, en+1] = a2,3e2 +
[e1, en+1] = ae1 + a2,1e2 − ae3 +
Xk=i+1
[e4, en+1] = a(e4 − e2) +
ak−1,3ek, [ei, en+1] = (i − 3)aei +
Xk=5
Xk=4
n
n
n
n
ak,3ek,
ak−i+3,3ek,
n
[en+1, en+1] = a2,n+1e2, [en+1, e1] = −ae1 + (a2,3 − a2,1 + b2,3) e2 + ae3 −
Xk=4
[en+1, e3] = b2,3e2 −
[en+1, ei] = (3 − i)aei −
ak,3ek, [en+1, e4] = a(e2 − e4) −
Xk=i+1
ak−i+3,3ek, (5 ≤ i ≤ n),
ak−1,3ek,
Xk=5
n
n
n
Xk=4
ak,1ek,
40
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
Len+1 =
0
−a
0
a2,3−a2,1+b2,3 0
0
0 −a4,3
0 −a5,3
−a4,1
−a5,1
b2,3
0
a
0
a
0
−a
0
0
0
0
−a4,3
−2a
···
···
···
···
···
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
·
·
·
−a5,3
−a4,3
...
...
...
...
...
...
...
...
...
...
...
...
···
−a4,3
...
...
−ai,1
0 −ai,3 −ai−1,3 −ai−2,3
(3−i)a
...
...
...
...
...
...
0
...
...
...
0
...
...
...
0
···
···
···
···
···
···
−an−1,1
−an,1
0 −an−1,3 −an−2,3 −an−3,3 ··· −an−i+3,3 −an−i+2,3 ··· −a4,3 (4−n)a
0 −an,3 −an−1,3 −an−2,3 ··· −an−i+4,3 −an−i+3,3 ··· −a5,3 −a4,3 (3−n)a
0
In the remaining cases a1,3 := c.
.
(5) If b 6= −a, a 6= 0, b 6= −c, c 6= 0, then
[e1, e5] = ae1 + a2,1e2 + (b + c − a)e3 + a4,1e4, [e3, e5] = ce1 + a2,3e2 + be3 + A4,3e4,
[e4, e5] = (a + b)(e4 − e2), [e5, e5] = a2,5e2, [e5, e1] = −ae1 + B2,1e2 + (a − b − c)e3 − a4,1e4,
[e5, e2] = −2(b + c)e2, [e5, e3] = −ce1 + b2,3e2 − be3 − A4,3e4, [e5, e4] = (a − 2c − b)e2−
(a + b)e4; B2,1 :=
(2b − a + 2c)a2,1 + 2(b + c)a4,1 + (a − b − c)(a2,3 + b2,3)
and
a
2c(a2,1 + a4,1) − (a + c)a2,3 + (a − c)b2,3
,
A4,3 :=
0
−a
B2,1 −2(b+c)
Le5 =
.
(6) If b := −a, a 6= 0, a 6= c, c 6= 0, then
−A4,3 −a−b
a−b−c
−a4,1
0
0
0
2a
−c
b2,3 a−2c−b
−b
0
[e1, e5] = ae1 + a2,1e2 + (c − 2a)e3 + a4,1e4, [e3, e5] = ce1 + a2,3e2 − ae3 + A4,3e4,
[e5, e5] = a2,5e2 + a4,5e4, [e5, e1] = −ae1 + B2,1e2 + (2a − c)e3 − a4,1e4,
[e5, e2] = 2(a − c)e2, [e5, e3] = −ce1 + b2,3e2 + ae3 − A4,3e4, [e5, e4] = 2(a − c)e2,
where B2,1 :=
(2c − 3a)a2,1 + 2(c − a)a4,1 + (2a − c)(a2,3 + b2,3)
and
A4,3 :=
2c(a2,1 + a4,1) − (a + c)a2,3 + (a − c)b2,3
,
a
0
Le5 = " −a
B2,1 2(a−c)
2a−c
−a4,1
0
0
−c
b2,3
a
−A4,3
2a
0
2(a−c)
0
0
# .
−a
0 −c
(7) If b := −c, c 6= 0, a 6= c, a 6= 0, then
[e1, e5] = ae1 + a2,1e2 − ae3 + a4,1e4, [e3, e5] = ce1 + a2,3e2 − ce3 + a4,3e4,
[e4, e5] = (c − a)(e2 − e4), [e5, e5] = a2,5e2, [e5, e1] = −ae1 + (a2,3 − a2,1 + b2,3) e2 + ae3−
a4,1e4, [e5, e3] = −ce1 + b2,3e2 + ce3 − a4,3e4, [e5, e4] = (c − a)(e4 − e2),
a2,3−a2,1+b2,3 0 b2,3 a−c
Le5 = "
0 −a4,3 c−a# .
(8) If c := a, b := −a, a 6= 0, then3
[e1, e5] = ae1 + a2,1e2 − ae3 + (a4,3 + b4,3 − b4,1) e4, [e3, e5] = ae1 + a2,3e2 − ae3 + a4,3e4,
[e5, e5] = a2,5e2 + a4,5e4, [e5, e1] = −ae1 + (a2,3 − a2,1 + b2,3) e2 + ae3 + b4,1e4,
[e5, e3] = −ae1 + b2,3e2 + ae3 + b4,3e4,
3The outer derivation Le5 is nilpotent, so we remove this case from further consideration.
−a4,1
0
0
0
a
c
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
41
−a
Le5 = "
0 −a 0
a2,3−a2,1+b2,3 0 b2,3 0
0 a 0
0 b4,3 0# .
(9) If a = 0, b = 0, c 6= 0, then
a
b4,1
[e1, e5] = a2,1e2 + ce3 + a4,1e4, [e3, e5] = ce1 + (2a2,1 + 2a4,1 − b2,3) e2 + a4,3e4,
[e5, e5] = a2,5e2 + a4,5e4, [e5, e1] = (3a2,1 + 4a4,1 − 2b2,3 + 2a4,3) e2 − ce3 − a4,1e4,
[e5, e2] = −2ce2, [e5, e3] = −ce1 + b2,3e2 − a4,3e4, [e5, e4] = −2ce2,
Le5 = "
3a2,1+4a4,1−2b2,3+2a4,3 −2c b2,3 −2c
0 # .
0
0 −a4,3
−a4,1
−c
−c
0
0
0
0
0
2
− a4,1! e2 + (b + c)e3 + a4,1e4, [e3, e5] = ce1 + a2,3e2 + be3 + A4,3e4,
(10) If a = 0, b 6= 0, b 6= −c, c 6= 0, then
[e1, e5] = a2,3 + b2,3
[e4, e5] = b(e4 − e2), [e5, e5] = a2,5e2, [e5, e1] = b2,1e2 − (b + c)e3 − a4,1e4,
[e5, e2] = −2(b + c)e2, [e5, e3] = −ce1 + b2,3e2 − be3 − A4,3e4, [e5, e4] = −(2c + b)e2 − be4,
where A4,3 :=
(2b + c)b2,3 − (2b + 3c)a2,3 + 2c(b2,1 − a4,1)
,
Le5 =
0
0
b2,1 −2(b+c)
−b−c
−a4,1
0
0
0
−c
b2,3 −2c−b
−b
0
−A4,3 −b
4(b + c)
.
(11) If a = 0, b := −c, c 6= 0, then
[e1, e5] = (a2,3 + b2,3 − b2,1) e2 + a4,1e4, [e3, e5] = ce1 + a2,3e2 − ce3 + a4,3e4,
[e4, e5] = c(e2 − e4), [e5, e5] = a2,5e2, [e5, e1] = b2,1e2 − a4,1e4, [e5, e3] = −ce1 + b2,3e2+
ce3 − a4,3e4, [e5, e4] = c(e4 − e2),
0 −c
Le5 = " 0
0
b2,1 0 b2,3 −c
0
−a4,1 0 −a4,3 c # .
0
0
c
Proof.
(1) The proof is off-loaded to Table 4, when (n ≥ 5). For (n = 4), we recalcu-
late the applicable identities, which are 1., 2., 4., 6. − 8., 10. − 15.
(2) We repeat case (1), except the identity 13.
(3) If (n ≥ 5), then we apply the identities given in Table 4, except 14. and 15. apply-
ing instead: Le3[en+1, en+1] = [Le3(en+1), en+1]+[en+1, Le3(en+1)] and L[e1, en+1] =
[L(e1), en+1] + [e1, L(en+1)]. For (n = 4), we apply the same identities as in case
(1) except 14. and 15. applying two identities given above.
(4) We apply the same identities as in case (1).
(5) We apply the following identities: 1., 2., 4., 6.−8., 10.−14., Le3[e5, e5] = [Le3(e5), e5]+
[e5, Le3(e5)], 15.
(6) We apply the same identities as in case (2) for (n = 4).
(7) We apply the same identities as in case (1) for (n = 4).
(8) We apply the same identities as in case (1) for (n = 4), except 13. and 15.
42
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
(9) We apply the same identities as in case (2) for (n = 4).
(10) The same identities as in case (5).
(11) The same identities as in case (5), except the identity 15.
(cid:3)
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
43
Table 4. Left Leibniz identities in case (1) in Theorem 5.2.1, (n ≥ 5).
Steps Ordered triple
Result
1.
2.
Le1 ([e1, en+1])
[e2, en+1] = 0 =⇒ ak,2 = 0, (1 ≤ k ≤ n).
Le1 ([e3, en+1])
a1,4 = 0, ak,4 := ak−1,3, (5 ≤ k ≤ n), a3,1 := a2,4 + a1,3 + 2b, a3,4 = 0, a4,4 := a + b
=⇒ [e1, en+1] = ae1 + a2,1e2 + (a2,4 + a1,3 + 2b)e3 +Pn
(a + b)e4 +Pn
k=5 ak−1,3ek.
a1,i+1 = a3,i+1 = 0 and we had that a1,4 = a3,4 = 0 =⇒ a2,i+1 = a4,i+1 =
k=4 ak,1ek, [e4, en+1] = a2,4e2 +
0; ai+1,i+1 := (i − 2)a + b, ak,i+1 := ak−1,i, (5 ≤ k ≤ n, k 6= i + 1, 4 ≤ i ≤ n − 1)
=⇒ [ej , en+1] = ((j − 3)a + b) ej +Pn
k=j+1 ak−j+3,3ek, (5 ≤ j ≤ n).
b1,2 = b3,2 = 0, bk,2 = 0, (5 ≤ k ≤ n), b3,3 := 2a1,3 + b + b2,2, b4,2 := a1,3 + b1,3 =⇒
[en+1, e2] = b2,2e2 + (a1,3 + b1,3)e4, [en+1, e3] = b1,3e1 + b2,3e2 + (2a1,3 + b + b2,2)e3 +
=⇒ [e1, en+1] = ae1 + a2,1e2 + (a2,4 +
k=4 ak,3ek, [en+1, e2] = b2,2e2 +
k=4 bk,3ek, [en+1, ei] = b2,ie2 +
3.
Le1 ([ei, en+1])
4.
Le3 ([en+1, e3])
5.
Le3 ([en+1, ei])
6.
7.
8.
9.
Le3 ([en+1, en])
L[e3, e3]
Le1 ([en+1, e3])
Le1 ([en+1, ei])
10.
Le3 ([en+1, e1])
11.
Le1 ([en+1, e1])
b1,3 = 0 =⇒ b2,2 := −2b =⇒ [en+1, e2] = −2be2, [en+1, e3] = b2,3e2 − be3 +
b2,4 := a2,4 + 2a, b4,4 := −a − b, bk,4 := bk−1,3, (5 ≤ k ≤ n) =⇒ [en+1, e4] =
b2,i+1 = b4,i+1 = 0, bi+1,i+1 := (2 − i)a − b, bk,i+1 := bk−1,i, (5 ≤ k ≤ n, k 6= i + 1, 4 ≤
k=4 bk,3ek.
k=4 bk,3ek.
k=4 bk,nek.
b1,i = b3,i = 0, a1,3 = 0
k=4 bk,iek, (4 ≤ i ≤ n − 1).
Pn
k=4 ak,1ek, [e3, en+1] = a2,3e2 + be3 +Pn
2b)e3 +Pn
b1,3e4, [en+1, e3] = b1,3e1 + b2,3e2 + (b + b2,2)e3 +Pn
Pn
b1,n = b3,n = 0 =⇒ [en+1, en] = b2,ne2 +Pn
Pn
(a2,4 + 2a) e2 − (a + b) e4 +Pn
i ≤ n − 1) =⇒ [en+1, ej] = ((3 − j)a − b) ej +Pn
[en+1, e1] = −ae1 + b2,1e2 + (a2,4 + 2a)e3 +Pn
Pn−1
k=4 ak,3ek+bn,3en, [en+1, e4] = (a2,4+2a)e2−(a+b)e4−Pn
((3 − i)a − b) ei −Pn
(b − a)e3 +Pn
−ae1 + b2,1e2 + (a − b)e3 −Pn−1
Pn
k=4 ak,1ek, [e4, en+1] = (a + b)(e4 − e2) +Pn
k=i+1 ak−i+3,3ek, (5 ≤ i ≤ n).
k=5 ak−1,3ek.
k=5 bk−1,3ek.
b1,1
:= −a, b3,1
:= a2,4 + 2a, bk−1,3
:= −ak−1,3, (5 ≤ k ≤ n)
=⇒
k=j+1 bk−j+3,3ek, (5 ≤ j ≤ n).
k=4 bk,1ek, [en+1, e3] = b2,3e2 − be3 −
k=5 ak−1,3ek, [en+1, ei] =
a2,4 := −a − b, bk−1,1 := −ak−1,1, (5 ≤ k ≤ n) =⇒ [e1, en+1] = ae1 + a2,1e2 +
k=4 ak,1ek + bn,1en, [en+1, e4] = (a − b)e2 − (a + b)e4 −
k=5 ak−1,3ek, [en+1, e1] =
L[en+1, e1]
L[en+1, en+1]
12.
13.
14.
a1,n+1 = 0, ak,n+1 = 0, (3 ≤ k ≤ n − 1) =⇒ [en+1, en+1] = a2,n+1e2 + an,n+1en.
an,n+1 = 0, (because b 6= (3 − n)a) =⇒ [en+1, en+1] = a2,n+1e2.
L[e3, en+1]
bn,3 := −an,3, (because a 6= 0), b2,3 := a2,3 + 2a4,3, (because b 6= 0) =⇒ [en+1, e3] =
15.
Le1 ([en+1, en+1])
bn,1 := −an,1, B2,1 := (2b−a)a2,1+2b·a4,1+2(a−b)(a2,3+a4,3)
, (because a 6= 0) =⇒
k=4 ak,3ek.
(a2,3 + 2a4,3)e2 − be3 −Pn
[en+1, e1] = −ae1 + B2,1e2 + (a − b)e3 −Pn
a
k=4 ak,1ek.
Theorem 5.2.2. Applying the technique of "absorption" (see Section 3.2), we can further
simplify the algebras in each of the cases in Theorem 5.2.1 as follows:
44
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
Len+1 =
(1) If a1,3 = 0, b 6= −a, a 6= 0, b 6= 0, (n = 4) or b 6= (3 − n)a, a 6= 0, b 6= 0, (n ≥ 5),
then we have the following brackets for the algebra:
n
Xk=5
n
ak,3ek,
Xk=6
ak−1,3ek, [ei, en+1] = ((i − 3)a + b) ei +
[e1, en+1] = ae1 + a2,1e2 + (b − a)e3, [e3, en+1] = a2,3e2 + be3 +
[e4, en+1] = (a + b)(e4 − e2) +
[en+1, e1] = −ae1 + B2,1e2 + (a − b)e3, [en+1, e2] = −2be2, [en+1, e3] = a2,3e2 − be3−
Xk=5
Xk=i+2
ak,3ek, [en+1, e4] = (a − b)e2 − (a + b)e4 −
ak−i+3,3ek, (5 ≤ i ≤ n); where B2,1 :=
Xk=6
(2b − a)a2,1 + 2(a − b)a2,3
ak−1,3ek, [en+1, ei] = ((3 − i)a − b) ei−
Xk=i+2
a
n
n
n
n
,
ak−i+3,3ek,
0
0
0
0
0
0
...
...
0
0
.
0
−a
B2,1 −2b
a−b
0
a2,3
−b
0
−a5,3
·
·
...
0
a−b
0
−a−b
−a5,3
·
...
0
0
0
0
0
...
0
0
0
0
...
0
0
0
0
−2a−b
0
0
0
0
0
...
···
···
···
0
0
0
0
0
−3a−b
0
...
···
···
···
···
···
···
...
...
0
0
0
0
0
0
0
0
0
0
0
0
...
...
(5−n)a−b
...
0
...
...
0
0 −an−2,3 −an−3,3
0 −an−1,3 −an−2,3
0
−an,3 −an−1,3
··· −a5,3
···
···
·
· −a5,3
0
(4−n)a−b
·
−a5,3
0
(3−n)a−b
(2) If a1,3 = 0, b := −a, a 6= 0, (n = 4) or b := (3 − n)a, a 6= 0, (n ≥ 5), then the
brackets for the algebra are as follows:
n
n
ak,3ek,
Xk=6
ak−1,3ek, [ei, en+1] = (i − n) aei +
[e1, en+1] = ae1 + a2,1e2 − (n − 2)ae3, [e3, en+1] = a2,3e2 + (3 − n)ae3 +
[e4, en+1] = (n − 4)a(e2 − e4) +
[en+1, en+1] = an,n+1en, [en+1, e1] = −ae1 + B2,1e2 + (n − 2)ae3, [en+1, e2] = (2n − 6)ae2,
[en+1, e3] = a2,3e2 + (n − 3)ae3 −
ak,3ek, [en+1, e4] = (n − 2)ae2 + (n − 4)ae4−
Xk=6
Xk=i+2
where B2,1 := (5 − 2n)a2,1 + 2(n − 2)a2,3,
Xk=5
ak−1,3ek, [en+1, ei] = (n − i) aei −
ak−i+3,3ek, (5 ≤ i ≤ n),
Xk=5
Xk=i+2
ak−i+3,3ek,
n
n
n
n
Len+1 =
(n−2)a
0
0
0
0
0
0
0
0
...
0
0
0
0
...
0
0
0
−a
B2,1
0
0
0
(2n−6)a
a2,3
(n−2)a
(n−3)a
0
0
(n−4)a
−a5,3
·
0
(n−5)a
−a5,3
0
0
0
0
0
0
0
0
0
···
···
···
···
···
···
·
...
·
...
−an−2,3 −an−3,3
−an−1,3 −an−2,3
−an,3 −an−1,3
0
...
···
···
···
(n−6)a
0
...
···
···
···
...
...
−a5,3
...
· −a5,3
·
0
2a
0
0 0
a 0
· −a5,3 0 0
0
0
0
0
0
0
...
...
0 0
0 0
0 0
0 0
0 0
0 0
...
...
...
...
.
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
45
(3) If a1,3 = 0, a = 0, b 6= 0, (n = 4) or a = 0 and b 6= 0, (n ≥ 5), then
[e1, en+1] = a2,3e2 + be3, [e3, en+1] = a2,3e2 + be3 +
n
ak,3ek, [e4, en+1] = b (e4 − e2) +
Xk=5
n
n
n
ak−1,3ek, [ei, en+1] = bei +
Xk=6
[en+1, e3] = a2,3e2 − be3 −
Xk=i+2
[en+1, ei] = −bei −
n
0
ak−i+3,3ek, [en+1, e1] = b2,1e2 − be3, [en+1, e2] = −2be2,
Xk=i+2
ak,3ek, [en+1, e4] = −b (e2 + e4) −
Xk=5
ak−i+3,3ek, (5 ≤ i ≤ n),
n
Xk=6
ak−1,3ek,
0
b2,1 −2b
−b
0
0
0
0
0
0
0
0
a2,3
−b
0
−a5,3
·
0
−b
0
−b
0
−a5,3
0
0
0
0
0
0
0
0
−b
0
0 −b
···
···
···
···
···
···
0
...
·
...
... 0
...
...
...
...
·
...
0 −an−2,3 −an−3,3 ···
0 −an−1,3 −an−2,3 ···
0
−an,3 −an−1,3 ···
··· −a5,3
···
···
·
· −a5,3
0
0
−b
0
0 −b 0
· −a5,3 0 −b
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
...
...
...
...
...
...
.
Len+1 =
0
...
0
0
0
n
n
ak−1,3ek, [ei, en+1] = (i − 3)aei +
(4) If a1,3 = 0, b = 0, a 6= 0, (n = 4) or b = 0, a 6= 0, (n ≥ 5), then
[e1, en+1] = ae1 + a2,1e2 − ae3, [e3, en+1] = a2,3e2 +
Xk=6
[en+1, e1] = −ae1 + (a2,3 − a2,1 + b2,3) e2 + ae3, [en+1, e3] = b2,3e2 −
Xk=i+2
[en+1, e4] = a(e2 − e4) −
ak−1,3ek, [en+1, ei] = (3 − i)aei −
Xk=i+2
Xk=6
Xk=5
n
n
n
ak−i+3,3ek, [en+1, en+1] = a2,n+1e2,
n
ak,3ek,
Xk=5
ak−i+3,3ek, (5 ≤ i ≤ n),
ak,3ek, [e4, en+1] = a(e4 − e2)+
Len+1 =
0
−a
0
a2,3−a2,1+b2,3 0
0
0
0 −a5,3
0
a
0
0
0
b2,3
0
0
·
0
...
·
...
0
...
0
0
0
In the remaining cases a1,3 := c.
0
a
0
−a
0
·
...
0
0
0
0
0
0
0
0
−2a 0
...
0
...
···
···
···
···
···
···
...
...
−a5,3
0 −3a
0
0
0
0
0
0
...
...
(5−n)a
...
0
0 −an−2,3 −an−3,3 ···
0 −an−1,3 −an−2,3 ···
0 −an,3 −an−1,3 ···
··· −a5,3
···
···
·
· −a5,3
0
(4−n)a
·
−a5,3
0
(3−n)a
0
0
0
0
0
0
...
...
0
0
.
(5) If b 6= −a, a 6= 0, b 6= −c, c 6= 0, then
[e1, e5] = ae1 + A2,1e2 + (b + c − a)e3, [e3, e5] = ce1 + a2,3e2 + be3, [e4, e5] = (a + b)e4−
(a + b)e2, [e5, e1] = −ae1 + B2,1e2 + (a − b − c)e3, [e5, e2] = −2(b + c)e2, [e5, e3] = −ce1+
(a + c)a2,3 + (c − a)b2,3
B2,3e2 − be3, [e5, e4] = (a − 2c − b)e2 − (a + b)e4; where A2,1 :=
,
B2,1 :=
(3a − 2b − c)a2,3 + (a − 2b − c)b2,3
2a
(a + c)a2,3 + c · b2,3
,
and B2,3 :=
0
0
0
0
0
0
...
...
0
a
Le5 = " −a
0
B2,1 −2(b+c) B2,3 a−2c−b
a−b−c
0
2a
−c
−b
0
0
0
0
0
−a−b # .
46
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
(6) If b := −a, a 6= 0, a 6= c, c 6= 0, then
[e1, e5] = ae1 + A2,1e2 + (c − 2a)e3, [e3, e5] = ce1 + a2,3e2 − ae3, [e5, e5] = a4,5e4,
[e5, e1] = −ae1 + B2,1e2 + (2a − c)e3, [e5, e2] = 2(a − c)e2, [e5, e3] = −ce1 + B2,3e2 + ae3,
(a + c)a2,3 + c · b2,3
[e5, e4] = 2(a − c)e2; where A2,1 :=
,
(5a − c)a2,3 + (3a − c)b2,3
B2,1 :=
,
# .
(a + c)a2,3 + (c − a)b2,3
Le5 = " −a
B2,1 2(a−c) B2,3 2(a−c)
2a−c
, B2,3 :=
2a
2a
−c
a
0
0
0
0
a
0
0
0
0
(7) If b := −c, c 6= 0, a 6= c, a 6= 0, then
[e1, e5] = ae1 + a2,1e2 − ae3, [e3, e5] = ce1 + a2,3e2 − ce3, [e4, e5] = (c − a)(e2 − e4),
[e5, e5] = a2,5e2, [e5, e1] = −ae1 + (a2,3 − a2,1 + b2,3) e2 + ae3, [e5, e3] = −ce1 + b2,3e2 + ce3,
[e5, e4] = (c − a)(e4 − e2),
Le5 = "
a2,3−a2,1+b2,3 0 b2,3 a−c
−a
a
0
0
0 −c
0 0 c−a# .
0 c
0
(8) If a = 0, b = 0, c 6= 0, then
[e1, e5] = a2,1e2 + ce3, [e3, e5] = ce1 + (2a2,1 − b2,3) e2, [e5, e5] = a4,5e4,
[e5, e1] = (3a2,1 − 2b2,3) e2 − ce3, [e5, e2] = −2ce2, [e5, e3] = −ce1 + b2,3e2, [e5, e4] = −2ce2,
Le5 = "
0
−c
0
0 −c
0
0
0
0
0
0 # .
0
3a2,1−2b2,3 −2c b2,3 −2c
(9) If a = 0, b 6= 0, b 6= −c, c 6= 0, then
[e1, e5] = A2,1e2 + (b + c)e3, [e3, e5] = ce1 + a2,3e2 + be3, [e4, e5] = b(e4 − e2),
[e5, e1] = B2,1e2 − (b + c)e3, [e5, e2] = −2(b + c)e2, [e5, e3] = −ce1 + B2,3e2 − be3,
[e5, e4] = −(2c + b)e2 − be4; where A2,1 :=
B2,1 :=
4(b + c)
(2b + 3c)a2,3 + c · b2,3
(4b + 5c)a2,3 + c · b2,3
and B2,3 :=
,
,
2(b + c)
(2b + 3c)a2,3 − (2b + c)b2,3
−b # .
(10) If a = 0, b := −c, c 6= 0, then
B2,1 −2(b+c) B2,3 −2c−b
−b−c
Le5 = " 0
4(b + c)
−c
0
−b
0
0
0
0
0
0
[e1, e5] = (a2,3 + b2,3 − b2,1) e2, [e3, e5] = ce1 + a2,3e2 − ce3, [e4, e5] = c(e2 − e4),
[e5, e5] = a2,5e2, [e5, e1] = b2,1e2, [e5, e3] = −ce1 + b2,3e2 + ce3, [e5, e4] = c(e4 − e2),
Le5 = " 0 0 −c 0
b2,1 0 b2,3 −c
0
c # .
0 0 c
0 0 0
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
47
Proof.
(1) The right (not a derivation) and the left (a derivation) multiplication op-
erators restricted to the nilradical are given below:
Ren+1 =
0
0
0 a2,3 −a−b
0
a
a2,1
b−a 0
a4,1
a5,1
0 a4,3
0 a5,3
0
a+b
a4,3
2a+b
·
·
·
a5,3
a4,3
b
...
...
...
...
0
0
0
0
...
...
···
···
···
···
···
a4,3
...
...
...
...
0
0
0
0
0
...
...
...
ai,1
0 ai,3
ai−1,3 ai−2,3 ···
(i−3)a+b ···
...
...
...
0
···
···
···
···
···
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
an−1,1 0 an−1,3 an−2,3 an−3,3 ··· an−i+3,3 an−i+2,3 ··· a4,3 (n−4)a+b
0 an,3 an−1,3 an−2,3 ··· an−i+4,3 an−i+3,3 ··· a5,3
an,1
0
0
−a
B2,1 −2b a2,3+2a4,3
a−b
−a4,1
−a5,1
−a4,3
−a5,3
0
0
0
−b
−a−b
−a4,3 −2a−b
···
···
···
···
···
0
0
0
0
0
···
···
···
···
···
a4,3
0
0
0
0
0
(n−3)a+b
0
0
0
0
0
Len+1 =
·
·
·
−a5,3
−a4,3
...
...
...
...
...
...
...
...
...
...
...
−ai,1
−ai,3
−ai−1,3 −ai−2,3 ···
−a4,3
(3−i)a−b ···
,
0
0
0
0
0
...
...
...
0
0
...
...
...
0
0
...
...
...
0
...
...
...
0
...
...
...
0
.
...
...
0
...
...
...
...
0
a−b
0
...
...
0
0
0
0
...
...
−an−1,1
−an,1
0 −an−1,3 −an−2,3 −an−3,3 ··· −an−i+3,3 −an−i+2,3 ··· −a4,3 (4−n)a−b
0
−an,3 −an−1,3 −an−2,3 ··· −an−i+4,3 −an−i+3,3 ··· −a5,3 −a4,3
(3−n)a−b
k = ek, (1 ≤ k ≤ n), e′
• We start with applying the transformation e′
n+1 =
en+1 − a4,3e1 to remove a4,3 in Ren+1 and −a4,3 in Len+1 from the (i, i − 1)st
positions, where (4 ≤ i ≤ n), but it affects other entries as well, such as the
entry in the (2, 1)st position in Ren+1 and Len+1 that we change to a2,1 − a4,3
and B2,1 − a4,3, respectively. It also changes the entry in the (2, 3)rd position
in Len+1 to a2,3. At the same time, it affects the coefficient in front of e2 in
the bracket [en+1, en+1], which we change back to a2,n+1.
i = ei, (1 ≤ i ≤ n), e′
• Then we apply the transformation e′
n+1 = en+1 +
Pn−1
k=3 ak+1,1ek to remove ak+1,1 in Ren+1 and −ak+1,1 in Len+1 from the entries
in the (k + 1, 1)st positions, where (3 ≤ k ≤ n − 1). The transformation
changes the entry in the (2, 1)st position in Ren+1 to 2a4,1 + a2,1 − a4,3, the
entries in the (2, 3)rd positions in Ren+1 and Len+1 to a2,3 + a4,1. It also affects
the coefficient in front of e2 in [en+1, en+1], which we rename back by a2,n+1.
We assign 2a4,1 + a2,1 − a4,3 := a2,1 and a2,3 + a4,1 := a2,3. Then B2,1 − a4,3 :=
(2b−a)a2,1+2(a−b)a2,3
.
a
• Applying the transformation e′
j = ej, (1 ≤ j ≤ n), e′
n+1 = en+1 + a2,n+1
2b e2, we
remove the coefficient a2,n+1 in front of e2 in [en+1, en+1].
48
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
(2) The right (not a derivation) and left (a derivation) multiplication operators re-
stricted to the nilradical are as follows:
a
a2,1
0
0
0
a2,3
0
(n−4)a
(2−n)a 0 (3−n)a
0
a4,1
a5,1
0
0
a4,3
a5,3
·
·
·
(4−n)a
a4,3
(5−n)a
a5,3
a4,3
0
0
0
0
...
...
···
···
···
···
···
0
0
0
0
0
···
···
···
···
···
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
...
...
···
a4,3
...
...
...
...
...
...
...
...
0
...
...
...
0
ai,1
ai,3
ai−1,3 ai−2,3
(i−n)a ···
Ren+1 =
...
...
0
...
...
0
0 an,3
an,1
0
(2n−6)a a2,3+2a4,3 (n−2)a
an−1,1 0 an−1,3 an−2,3 an−3,3 ··· an−i+3,3 an−i+2,3 ··· a4,3 −a 0
an−1,3 an−2,3 ··· an−i+4,3 an−i+3,3 ··· a5,3 a4,3 0
0
0
0
0
0
(n−3)a
−a4,3
−a5,3
(n−4)a
−a4,3
···
···
···
···
···
···
···
···
···
···
(n−5)a
0
0
0
0
0
0
0
0
0
0
0
0
0
0
−a
B2,1
(n−2)a
−a4,1
−a5,1
Len+1 =
·
·
·
−a5,3
−a4,3
−ai,1
−ai,3
−ai−1,3 −ai−2,3 ···
−a4,3
(n−i)a
···
...
...
...
...
...
...
...
...
...
,
0
0
0
0
0
0
0
0
0
0
.
...
...
...
0
...
...
...
0
...
...
...
0
...
...
...
0
...
...
...
...
...
...
...
...
...
...
0
...
...
0
0
−an−1,1
−an,1
−an−1,3 −an−2,3 −an−3,3 ··· −an−i+3,3 −an−i+2,3 ··· −a4,3
0
−an,3 −an−1,3 −an−2,3 ··· −an−i+4,3 −an−i+3,3 ··· −a5,3 −a4,3 0
a
• We apply the transformation e′
k = ek, (1 ≤ k ≤ n), e′
n+1 = en+1 − a4,3e1
to remove a4,3 in Ren+1 and −a4,3 in Len+1 from the (i, i − 1)st positions,
where (4 ≤ i ≤ n), but it affects other entries as well, such as the entry
in the (2, 1)st position in Ren+1 and Len+1 that we change to a2,1 − a4,3 and
B2,1 − a4,3, respectively. It also changes the entry in the (2, 3)rd position in
Len+1 to a2,3. At the same time, it affects the coefficient in front of e2 in the
bracket [en+1, en+1], which we change back to a2,n+1.
i = ei, (1 ≤ i ≤ n), e′
• Then we apply the transformation e′
n+1 = en+1 +
Pn−1
k=3 ak+1,1ek to remove ak+1,1 in Ren+1 and −ak+1,1 in Len+1 from the entries
in the (k + 1, 1)st positions, where (3 ≤ k ≤ n−1). It changes the entry in the
(2, 1)st position in Ren+1 to 2a4,1+a2,1−a4,3, the entries in the (2, 3)rd positions
in Ren+1 and Len+1 to a2,3 + a4,1. It also affects the coefficient in front of e2 in
[en+1, en+1], which we rename back by a2,n+1. We assign 2a4,1 + a2,1 − a4,3 :=
a2,1 and a2,3 + a4,1 := a2,3. Then B2,1 − a4,3 := (5 − 2n)a2,1 + 2(n − 2)a2,3.
n+1 = en+1 − a2,n+1
• Finally the transformation e′
j = ej, (1 ≤ j ≤ n), e′
2(n−3)a e2
removes the coefficient a2,n+1 in front of e2 in [en+1, en+1].
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
49
(3) The right (not a derivation) and left (a derivation) multiplication operators re-
stricted to the nilradical are given below:
Ren+1 =
a5,3
a4,3
···
···
···
···
···
0
0
0
0
0
0
0
0
a2,3+a4,3−a4,1 0 a2,3
b
a4,1
a5,1
b
0
0 a4,3
0 a5,3
·
·
·
...
...
...
...
...
...
0
−b
0
b
a4,3
...
...
0
0
0
0
b
...
...
ai,1
0 ai,3
ai−1,3 ai−2,3 ···
...
...
a4,3
...
...
···
···
···
···
···
···
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
...
...
...
0
...
...
...
0
an−1,1
an,1
0
0
b2,1 −2b a2,3+2a4,3
−b
−b
−a4,1
−a5,1
−a4,3
−a5,3
0 an−1,3 an−2,3 an−3,3 ··· an−i+3,3 an−i+2,3 ··· a4,3
0
0 an,3 an−1,3 an−2,3 ··· an−i+4,3 an−i+3,3 ··· a5,3 a4,3 b
0
0
0
0
0
0
0
0
0
−b
0
−b
0
−b
···
···
···
···
···
···
···
···
···
···
0
0
0
0
0
0
0
0
0
0
−a4,3
b
Len+1 =
·
·
·
−a5,3
−a4,3
...
...
...
...
...
...
...
...
...
...
−ai,1
−ai,3
−ai−1,3 −ai−2,3 ···
−a4,3
−b
···
...
...
...
0
...
...
...
b
...
...
...
0
...
...
0
0
0
0
...
...
,
0
0
0
0
0
...
...
...
0
...
...
...
0
...
...
...
0
.
−an−1,1
−an,1
0 −an−1,3 −an−2,3 −an−3,3 ··· −an−i+3,3 −an−i+2,3 ··· −a4,3 −b
0
0
−an,3 −an−1,3 −an−2,3 ··· −an−i+4,3 −an−i+3,3 ··· −a5,3 −a4,3 −b
k = ek, (1 ≤ k ≤ n), e′
• Applying the transformation e′
n+1 = en+1 − a4,3e1, we
remove a4,3 in Ren+1 and −a4,3 in Len+1 from the (i, i − 1)st positions, where
(4 ≤ i ≤ n), but the transformation affects other entries, such as the entry
in the (2, 1)st position in Ren+1 and Len+1, that we change to a2,3 − a4,1 and
b2,1 − a4,3, respectively. It also changes the entry in the (2, 3)rd position in
Len+1 to a2,3. At the same time, it affects the coefficient in front of e2 in the
bracket [en+1, en+1], which we change back to a2,n+1.
• Then we apply the transformation e′
n+1 = en+1 +
Pn−1
k=3 ak+1,1ek to remove ak+1,1 in Ren+1 and −ak+1,1 in Len+1 from the entries
in the (k + 1, 1)st positions, where (3 ≤ k ≤ n − 1). This transformation
changes the entry in the (2, 1)st position in Ren+1 as well as the entries in
i = ei, (1 ≤ i ≤ n), e′
the (2, 3)rd positions in Ren+1 and Len+1 to a2,3 + a4,1. It also affects the
coefficient in front of e2 in [en+1, en+1], which we rename back by a2,n+1. We
assign a2,3 + a4,1 := a2,3 and b2,1 − a4,3 := b2,1.
• Finally applying the transformation e′
j = ej, (1 ≤ j ≤ n), e′
n+1 = en+1 +
a2,n+1
2b e2, we remove the coefficient a2,n+1 in front of e2 in [en+1, en+1].
50
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
(4) The right (not a derivation) and left (a derivation) multiplication operators re-
...
...
...
...
...
...
...
...
...
...
...
...
...
...
0
a
0
−a
...
...
,
0
0
0
0
0
...
...
...
0
...
...
...
0
0
...
...
...
0
a4,3
0
0
0
0
0
···
···
···
···
···
(n−3)a
0
0
0
0
0
...
...
...
0
.
stricted to the nilradical are as follows:
a
a2,1
−a
a4,1
a5,1
0
0
0 a2,3
0
0 a4,3
0 a5,3
0
0
−a
0
a
a4,3
···
···
···
···
···
0
0
0
0
0
···
···
···
···
···
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Ren+1 =
·
·
·
a5,3
a4,3
ai,1
0 ai,3
ai−1,3 ai−2,3 ···
(i−3)a ···
...
...
a4,3
...
...
...
...
...
...
...
...
0
...
...
...
0
an−1,1 0 an−1,3 an−2,3 an−3,3 ··· an−i+3,3 an−i+2,3 ··· a4,3 (n−4)a
an,1
0 an,3 an−1,3 an−2,3 ··· an−i+4,3 an−i+3,3 ··· a5,3
0
0
0
0
2a
...
...
0
−a
0
a2,3−a2,1+b2,3 0
0
0 −a4,3
0 −a5,3
−a4,1
−a5,1
b2,3
0
a
−a4,3
−2a
Len+1 =
·
·
·
−a5,3
−a4,3
0
0
0
0
...
...
...
...
···
···
···
···
···
...
...
0
0
0
0
0
...
...
...
−ai,1
0 −ai,3 −ai−1,3 −ai−2,3 ···
−a4,3
(3−i)a
···
−an−1,1
−an,1
0 −an−1,3 −an−2,3 −an−3,3 ··· −an−i+3,3 −an−i+2,3 ··· −a4,3 (4−n)a
0 −an,3 −an−1,3 −an−2,3 ··· −an−i+4,3 −an−i+3,3 ··· −a5,3 −a4,3 (3−n)a
0
k = ek, (1 ≤ k ≤ n), e′
• We continue with the transformation e′
n+1 = en+1 −
a4,3e1 to remove a4,3 in Ren+1 and −a4,3 in Len+1 from the (i, i− 1)st positions,
where (4 ≤ i ≤ n), but other entries are affected as well, such as the entry
in the (2, 1)st position in Ren+1 and Len+1, that we change to a2,1 − a4,3 and
a2,3−a2,1−a4,3 +b2,3, respectively. The transformation also changes the entry
in the (2, 3)rd position in Len+1 to b2,3 − 2a4,3 and affects the coefficient in
front of e2 in the bracket [en+1, en+1], which we change back to a2,n+1.
• Applying the transformation e′
i = ei, (1 ≤ i ≤ n), e′
n+1 = en+1+Pn−1
k=3 ak+1,1ek,
we remove ak+1,1 in Ren+1 and −ak+1,1 in Len+1 from the entries in the (k +
1, 1)st positions, where (3 ≤ k ≤ n − 1). This transformation changes the
entry in the (2, 1)st position in Ren+1 to 2a4,1 + a2,1 − a4,3, the entries in
the (2, 3)rd positions in Ren+1 and Len+1 to a2,3 + a4,1 and a4,1 + b2,3 − 2a4,3,
respectively. It also affects the coefficient in front of e2 in [en+1, en+1], that we
rename back by a2,n+1. We assign 2a4,1 + a2,1 − a4,3 := a2,1, a2,3 + a4,1 := a2,3
and a4,1 + b2,3 − 2a4,3 := b2,3.
(5) We apply the transformation e′
a2,1A4,3 + 2a4,1A4,3− A2
a2,3 + a4,1 := a2,3 and b2,3 − 2a2,1 − 3a4,1 := b2,3.
4,3− a2,3a4,1− a2
i = ei, (1 ≤ i ≤ 4), e′
5 = e5−A4,3e1− 1
2(b+c) (B2,1A4,3+
4,1− a4,1b2,3− a2,5)e2 + a4,1e3. Then we assign
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
51
(6) One applies the transformation e′
i = ei, (1 ≤ i ≤ 4), e′
5 = e5−A4,3e1+ 1
2(a−c) (B2,1A4,3+
a2,1A4,3 + 2a4,1A4,3− A2
a2,3 + a4,1 := a2,3 and b2,3 − 2a2,1 − 3a4,1 := b2,3.
4,3− a2,3a4,1− a2
4,1− a4,1b2,3− a2,5)e2 + a4,1e3. Then we assign
(7) We apply the transformation e′
5 = e5 − a4,3e1 + a4,1e3 and
rename the coefficient in front of e2 in [e5, e5] back by a2,5. Then we assign a2,1 +
2a4,1 − a4,3 := a2,1, a2,3 + a4,1 := a2,3 and b2,3 + a4,1 − 2a4,3 := b2,3.
i = ei, (1 ≤ i ≤ 4), e′
(8) The transformation is as follows: e′
i = ei, (1 ≤ i ≤ 4), e′
5 = e5 − a4,3e1 +
4,3 + 2a4,3b2,3 + a2,5)e2 + a4,1e3. We
1
2c(2a2,1a4,1 − 4a2,1a4,3 + 3a2
assign a2,1 + 2a4,1 − a4,3 := a2,1 and b2,3 + a4,1 − 2a4,3 := b2,3.
5 = e5−A4,3e1+ 1
i = ei, (1 ≤ i ≤ 4), e′
4,1 − 6a4,1a4,3 − a2
(9) The transformation is e′
4,3−a2,3A4,3−
4,1 + 2a4,1b2,3 + 2a2,5)e2 + a4,1e3. We
4(b+c) (2A2
2a4,1A4,3 − 2b2,1A4,3 − b2,3A4,3 + 2a2,3a4,1 + 2a2
assign a2,3 + a4,1 := a2,3 and b2,3 + a4,1 − 2b2,1 := b2,3.
i = ei, (1 ≤ i ≤ 4), e′
(10) We apply the transformation e′
5 = e5 − a4,3e1 + a4,1e3 and
rename the coefficient in front of e2 in [e5, e5] back by a2,5. We assign a2,3 + a4,1 :=
a2,3, b2,1 − a4,3 := b2,1 and b2,3 + a4,1 − 2a4,3 := b2,3.
(cid:3)
52
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
Theorem 5.2.3. There are eight solvable indecomposable left Leibniz algebras up to iso-
morphism with a codimension one nilradical L 4, (n ≥ 4), which are given below:
(i) ln+1,1 : [e1, en+1] = e1 + (a − 1)e3, [e3, en+1] = ae3, [e4, en+1] = (a + 1)(e4 − e2),
[ei, en+1] = (a + i − 3) ei, [en+1, e1] = −e1 − (a − 1)e3, [en+1, e2] = −2ae2, [en+1, e3] = −ae3,
[en+1, e4] = (1 − a)e2 − (a + 1)e4, [en+1, ei] = (3 − i − a) ei, (5 ≤ i ≤ n),
(ii) ln+1,2 : [e1, en+1] = e1 + (2 − n)e3, [e3, en+1] = (3 − n)e3, [e4, en+1] = (n − 4)(e2 − e4),
[ei, en+1] = (i − n) ei, [en+1, en+1] = en, [en+1, e1] = −e1 + (n − 2)e3, [en+1, e2] = (2n − 6)e2,
[en+1, e3] = (n − 3)e3, [en+1, e4] = (n − 2)e2 + (n − 4)e4, [en+1, ei] = (n − i) ei,
(5 ≤ i ≤ n),
(iii) ln+1,3 : [e1, en+1] = e3, [e4, en+1] = −e2, [ei, en+1] = ei + ǫei+2 +
bk−i−2ek,
n
Xk=i+3
n
Xk=i+3
bk−i−2ek,
[en+1, e1] = −e3, [en+1, e2] = −2e2, [en+1, e4] = −e2, [en+1, ei] = −ei − ǫei+2 −
(ǫ = 0, 1, 3 ≤ i ≤ n),
(iv) gn+1,4 : [e1, en+1] = e1 − e3, [e3, en+1] = f e2, [e4, en+1] = −e2 + e4, [ei, en+1] = (i − 3)ei,
[en+1, en+1] = ǫe2, [en+1, e1] = −e1 + (d + f ) e2 + e3, [en+1, e3] = de2,
[en+1, e4] = e2 − e4, [en+1, ei] = (3 − i)ei, (5 ≤ i ≤ n; ǫ = 0, 1; if ǫ = 0, then d2 + f 2 6= 0),
(v) l5,5 : [e1, e5] = ae1 + (b − a + 1)e3, [e3, e5] = e1 + be3, [e4, e5] = (a + b)(e4 − e2),
[e5, e1] = −ae1 + (a − b − 1)e3, [e5, e2] = −2(b + 1)e2, [e5, e3] = −e1 − be3,
[e5, e4] = (a − b − 2)e2 − (a + b)e4, (if b = −1, then a 6= 1),
(vi) l5,6 : [e1, e5] = ae1 + (1 − 2a)e3, [e3, e5] = e1 − ae3, [e5, e5] = e4, [e5, e1] = −ae1+
(2a − 1)e3, [e5, e2] = 2(a − 1)e2, [e5, e3] = ae3 − e1, [e5, e4] = 2(a − 1)e2, (a 6= 1),
(vii) g5,7 : [e1, e5] = a(e1 − e3), [e3, e5] = e1 + f e2 − e3, [e4, e5] = (1 − a) (e2 − e4) ,
[e5, e5] = ǫe2, [e5, e1] = −ae1 + (d + f ) e2 + ae3, [e5, e3] = −e1 + de2 + e3,
[e5, e4] = (a − 1) (e2 − e4) , (ǫ = 0, 1; if ǫ = 0, then d2 + f 2 6= 0; a 6= 1),
(viii) g5,8 : [e1, e5] = ce2, [e3, e5] = e1 − e3, [e4, e5] = e2 − e4, [e5, e5] = ǫe2, [e5, e1] = (c + d) e2,
[e5, e3] = −e1 + (d + 2c) e2 + e3, [e5, e4] = e4 − e2, (c 6= 0, ǫ = 0, 1).
Proof. One applies the change of basis transformations keeping the nilradical L 4 given
in (4.0.1) unchanged.
(1) We have the right (not a derivation) and the left (a derivation) multiplication
operators restricted to the nilradical are as follows:
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
53
Ren+1 =
Len+1 =
a 0
0
0
a2,1 0 a2,3 −a−b
b−a 0
0
0 a5,3
0
a+b
0
0
0
a5,3
b
0
0
0
·
·
...
0 an−2,3 an−3,3
0 an−1,3 an−2,3
0 an,3 an−1,3
0
...
0
...
·
...
0
0
0
−a
B2,1 −2b
a−b
0
0
a2,3
−b
0
−a5,3
·
0
0
0
0
2a+b
0
...
···
···
···
0
a−b
0
−a−b
−a5,3
·
...
·
...
0 −an−2,3 −an−3,3
0 −an−1,3 −an−2,3
0 −an,3 −an−1,3
0
0
0
0
0
...
0
0
0
0
...
0
0
0
,
0
0
0
0
0
0
...
...
0
(n−4)a+b
0
0
0
0
0
0
...
...
0
0
0
(n−3)a+b
0
0
0
0
0
0
...
...
(5−n)a−b
...
0
0
0
0
0
0
0
...
...
0
0 (n−5)a+b
0
0
0
0
0
···
···
···
···
···
3a+b ···
0
0
0
0
0
0
...
...
a5,3
·
·
0
...
···
···
···
0
0
0
0
0
...
...
a5,3
·
0
0
0
0
0
0
...
...
...
0
a5,3
···
···
···
···
···
···
...
...
···
··· −a5,3
···
···
···
···
1 = e1, e′
·
0
−2a−b
−3a−b
0
0
0
0
0
0
...
...
0
0
.
· −a5,3
0
(4−n)a−b
·
−a5,3
0
(3−n)a−b
2 = e2, e′
i = ei− ak−i+3,3
• We apply the transformation e′
(k−i)a ek, (3 ≤ i ≤ n−
2, i+2 ≤ k ≤ n, n ≥ 5), e′
j = ej, (n−1 ≤ j ≤ n+1), where k is fixed, renaming
all the affected entries back. This transformation removes a5,3, a6,3, ..., an,3 in
Ren+1 and −a5,3,−a6,3, ...,−an,3 in Len+1. Besides it introduces the entries in
the (5, 1)st, (6, 1)st, ..., (n, 1)st positions in Ren+1 and Len+1, which we set to
be a5,1, a6,1, ..., an,1 and −a5,1,−a6,1, ...,−an,1, respectively.
(I) Suppose b 6= a
2 .
• Applying the transformation e′
2 = e2, e′
3 =
1 = e1 + 1
i = ei, (4 ≤ i ≤ n, n ≥ 4), e′
b
2b−a (cid:16)B2,1 + (b−a)a2,3
(cid:17) e2, e′
n+1 = en+1 − a5,1e2 +Pn−1
we remove a2,1 and B2,1 from the (2, 1)st positions in Ren+1 and Len+1, re-
e3 + a2,3
b e2, e′
k=4 ak+1,1ek,
spectively. This transformation also removes a2,3 from the (2, 3)rd positions
in Ren+1 and Len+1 as well as ak+1,1 in Ren+1 and −ak+1,1 in Len+1 from the
entries in the (k + 1, 1)st positions, where (4 ≤ k ≤ n − 1). (For n = 4, we
direct to the Remark 5.1.1.)
• Then we scale a to unity applying the transformation e′
4), e′
i = ei, (1 ≤ i ≤ n, n ≥
a by b, we obtain a continuous family of Leibniz
a . Renaming b
n+1 = en+1
(5.2.1)
algebras:
[e1, en+1] = e1 + (b − 1)e3, [e3, en+1] = be3, [e4, en+1] = (b + 1)(e4 − e2),
[ei, en+1] = (b + i − 3) ei, [en+1, e1] = −e1 − (b − 1)e3,
[en+1, e2] = −2be2, [en+1, e3] = −be3, [en+1, e4] = (1 − b)e2 − (b + 1)e4,
[en+1, ei] = (3 − i − b) ei, (5 ≤ i ≤ n), (b 6= 0, b 6=
, b 6= 3 − n).
1
2
54
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
(II) Suppose b := a
2 . We have that B2,1 = a2,3.
• We apply the transformation e′
1 = e1+ a2,1+a2,3
a
e2, e′
2 = e2, e′
3 = e3+ 2a2,3
a e2, e′
i =
ei, (4 ≤ i ≤ n, n ≥ 4), e′
the (2, 1)st, (2, 3)rd positions in Len+1 and from the (2, 3)rd position in Ren+1.
n+1 = en+1−a5,1e2 +Pn−1
k=4 ak+1,1ek to remove a2,3 from
This transformation also removes a2,1 from the (2, 1)st position in Ren+1 as
well as ak+1,1 and −ak+1,1 from the entries in the (k + 1, 1)st positions in
Ren+1 and Len+1, respectively, where (4 ≤ k ≤ n − 1). (For n = 4, we refer to
Remark 5.1.1.)
• To scale a to unity, we apply the transformation e′
4), e′
n+1 = en+1
and obtain a limiting case of (5.2.1) with b = 1
i = ei, (1 ≤ i ≤ n, n ≥
2 given below:
2(cid:19) ei,
5
(e4 − e2), [ei, en+1] = (cid:18)i −
e2
2 −
, [en+1, e4] =
e3
2
3e4
2
,
e3
[e1, en+1] = e1 −
2
[en+1, e1] = −e1 +
[en+1, ei] = (cid:18)5
a
, [e3, en+1] =
e3
2
2 − i(cid:19) ei, (5 ≤ i ≤ n).
e3
2
, [e4, en+1] =
3
2
, [en+1, e2] = −e2, [en+1, e3] = −
operators restricted to the nilradical are as follows:
(2) We have the right (not a derivation) and the left (a derivation) multiplication
0
0
0
0
0
0
,
0 0
0 0
0 0
0 0
0 0
0 0
...
...
...
...
...
...
.
0
0
0
0
0
0
0 0
0 0
0 0
0 0
0 0
0 0
...
...
...
...
...
...
a5,3
0 −2a 0 0
0 −a 0
a5,3 0 0
·
a
a2,1
0
0
0
a2,3
0
(n−4)a
(2−n)a 0 (3−n)a
0
0
0
0
0
0
0
0
a5,3
·
(4−n)a
0
a5,3
0
0
0
0
0
0
0
0
0
···
···
···
···
···
(6−n)a ···
(5−n)a
0
...
···
···
···
0
0
...
0
0
0
0
...
·
...
·
...
0 an−2,3 an−3,3
0 an−1,3 an−2,3
0 an,3
an−1,3
0
0
(2n−6)a
a2,3
(n−2)a
(n−3)a
0
0
(n−4)a
...
...
a5,3
·
·
0
0
0
0
0
...
···
···
···
···
···
···
0
...
···
···
···
0
0
0
0
0
...
−a5,3
·
0
(n−5)a
−a5,3
(n−6)a
−a
B2,1
(n−2)a
0
0
0
0
0
0
0
Len+1 =
Ren+1
0
...
0
0
0
0
...
0
0
0
·
...
·
...
−an−2,3 −an−3,3
−an−1,3 −an−2,3
−an,3 −an−1,3
···
···
···
1 = e1, e′
...
...
−a5,3
...
· −a5,3
·
0
2a
0
0 0
a 0
· −a5,3 0 0
0
...
···
···
···
2 = e2, e′
i = ei− ak−i+3,3
• We apply the transformation e′
(k−i)a ek, (3 ≤ i ≤ n−
2, i+2 ≤ k ≤ n, n ≥ 5), e′
j = ej, (n−1 ≤ j ≤ n+1), where k is fixed, renaming
all the affected entries back. This transformation removes a5,3, a6,3, ..., an,3 in
Ren+1 and −a5,3,−a6,3, ...,−an,3 in Len+1. Moreover it introduces the entries
in the (5, 1)st, (6, 1)st, ..., (n, 1)st positions in Ren+1 and Len+1, which we set
to be a5,1, a6,1, ..., an,1 and −a5,1,−a6,1, ...,−an,1, respectively.
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
55
• Applying the transformation e′
e3 + a2,3
1 = e1+ 1
i = ei, (4 ≤ i ≤ n, n ≥ 4), e′
(3−n)a e2, e′
k=4 ak+1,1ek,
we remove a2,1 and B2,1 from the (2, 1)st positions in Ren+1 and Len+1, respec-
(5−2n)a (cid:16)B2,1 + (2−n)a2,3
3−n (cid:17) e2, e′
n+1 = en+1 − a5,1e2 +Pn−1
2 = e2, e′
3 =
tively. We also remove a2,3 from the (2, 3)rd positions in Ren+1 and Len+1 as
well as ak+1,1 in Ren+1 and −ak+1,1 in Len+1 from the entries in the (k + 1, 1)st
positions, where (4 ≤ k ≤ n − 1). (See Remark 5.1.1.)
• To scale a to unity, we apply the transformation e′
i = ei, (1 ≤ i ≤ n), e′
n+1 =
en+1
a
renaming the coefficient an,n+1
a2
in front of en in [en+1, en+1] back by an,n+1.
We obtain a Leibniz algebra given below:
[e1, en+1] = e1 + (2 − n)e3, [e3, en+1] = (3 − n)e3, [e4, en+1] = (n − 4)(e2 − e4),
[ei, en+1] = (i − n) ei, [en+1, en+1] = an,n+1en, [en+1, e1] = −e1 + (n − 2)e3,
[en+1, e2] = (2n − 6)e2, [en+1, e3] = (n − 3)e3, [en+1, e4] = (n − 2)e2 + (n − 4)e4,
[en+1, ei] = (n − i) ei, (5 ≤ i ≤ n),
If an,n+1 = 0, then we have a limiting case of (5.2.1) with b = 3− n. If an,n+1 6= 0,
then we scale it to 1. It gives us the algebra ln+1,2.
(3) We have the right (not a derivation) and the left (a derivation) multiplication
operators restricted to the nilradical are as follows:
Ren+1 =
0
0
...
0 0
0
a2,3 0 a2,3
b
0
0
b
0 0
0 0 a5,3
0 0
·
0 0
...
...
·
...
0
−b
0
b
0
a5,3
·
...
0 0 an−2,3 an−3,3 ···
0 0 an−1,3 an−2,3 ···
0 0 an,3 an−1,3 ···
0
0
0
0
b
0
0
0
0
0
0
b
···
···
···
···
···
···
... 0
...
...
...
·
·
··· a5,3
···
···
0
0
0
0
0
0
0
0
0
−b
0 −b
···
···
···
···
···
···
... 0
...
...
...
Len+1 =
0
−b
0
−b
0
·
...
−a5,3
0
b2,1 −2b
−b
0
0
0
0
0
0
0
0
a2,3
−b
0
−a5,3
·
·
...
0
...
0
0
0
0 −an−2,3 −an−3,3 ···
0 −an−1,3 −an−2,3 ···
0 −an,3 −an−1,3 ···
··· −a5,3
···
···
·
· −a5,3
0 0 0
0 0 0
0 0 0
0 0 0
0 0 0
0 0 0
...
...
...
...
...
...
b
0
0 0
b 0
a5,3 0 b
...
0
a5,3
·
0
0
0
0
0
0
,
0
0
0
0
0
0
...
...
...
...
0
0
0
0
0
0
...
...
...
0
0
−b
0
0 −b 0
· −a5,3 0 −b
e2, e′
2 = e2, e′
.
• Applying the transformation e′
i =
ei, (4 ≤ i ≤ n + 1), we remove b2,1 from the (2, 1)st position in Len+1 and a2,3
from the (2, 1)st position in Ren+1 and from the (2, 3)rd positions in Ren+1 and
1 = e1 + b2,1+a2,3
3 = e3 + a2,3
b e2, e′
2b
Len+1 keeping other entries unchanged.
56
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
• To scale b to unity, we apply the transformation e′
i = ei, (1 ≤ i ≤ n), e′
n+1 =
en+1
b
. Then we rename a5,3
b , a6,3
b , ..., an,3
b by a5,3, a6,3, ..., an,3, respectively. We
obtain a Leibniz algebra
n
[e1, en+1] = e3, [e4, en+1] = −e2, [ei, en+1] = ei +
Xk=i+2
[en+1, e2] = −2e2, [en+1, e4] = −e2, [en+1, ei] = −ei −
n
ak−i+3,3ek, [en+1, e1] = −e3,
Xk=i+2
ak−i+3,3ek, (3 ≤ i ≤ n),
If a5,3 6= 0, (n ≥ 5), then we scale it to 1. We also rename all the affected
entries back and then we rename a6,3, ..., an,3 by b1, ..., bn−5, respectively. We
combine with the case when a5,3 = 0 and obtain a Leibniz algebra ln+1,3.
Remark 5.2.1. If n = 4, then ǫ = 0.
(4) We have the right (not a derivation) and the left (a derivation) multiplication
operators restricted to the nilradical are as follows:
Ren+1 =
a 0
0
a2,1 0 a2,3
−a 0
0 0
0 0 a5,3
0 0
0
0
·
0 0
...
...
·
...
0
−a
0
a
0
a5,3
·
...
0
0
0
0
2a
0
···
0
···
0
···
0
···
0
0
···
3a ···
... 0
...
...
...
0 0 an−2,3 an−3,3 ···
0 0 an−1,3 an−2,3 ···
0 0 an,3 an−1,3 ···
0
0
0
0
0
0
...
...
(n−5)a
0
a5,3
...
0
a5,3
·
0
0
0
0
0
0
...
...
0
(n−4)a
0
0
0
0
0
0
...
...
0
0
0
(n−3)a
,
·
·
··· a5,3
···
···
0
0
0
0
0
0
0
0
−2a 0
...
0
...
···
···
···
···
···
···
...
...
0
a
0
−a
0
·
...
−a5,3
0 −3a
0
...
·
...
0 −an−2,3 −an−3,3 ···
0 −an−1,3 −an−2,3 ···
0 −an,3 −an−1,3 ···
··· −a5,3
···
···
1 = e1, e′
·
0
0
0
0
0
0
...
...
(5−n)a
...
0
0
0
0
0
0
0
...
...
0
0
0
0
0
0
0
0
...
...
0
0
.
· −a5,3
0
(4−n)a
·
−a5,3
(3−n)a
−a
0
a2,3−a2,1+b2,3 0
0
0
0 −a5,3
0
0
b2,3
0
0
a
0
0
0
·
Len+1 =
0
...
0
0
0
2 = e2, e′
i = ei− ak−i+3,3
• We apply the transformation e′
(k−i)a ek, (3 ≤ i ≤ n−
2, i+2 ≤ k ≤ n, n ≥ 5), e′
j = ej, (n−1 ≤ j ≤ n+1), where k is fixed renaming
all the affected entries back. This transformation removes a5,3, a6,3, ..., an,3 in
Ren+1 and −a5,3,−a6,3, ...,−an,3 in Len+1. Besides it introduces the entries in
the (5, 1)st, (6, 1)st, ..., (n, 1)st positions in Ren+1 and Len+1, which we set to
be a5,1, a6,1, ..., an,1 and −a5,1,−a6,1, ...,−an,1, respectively.
• Applying the transformation e′
i = ei, (2 ≤ i ≤ n, n ≥
k=4 ak+1,1ek, we remove a2,1 from the (2, 1)st position
in Ren+1. This transformation changes the entry in the (2, 1)st position in
n+1 = en+1 + Pn−1
1 = e1 + a2,1
a e2, e′
4), e′
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
57
Len+1 to a2,3 + b2,3. It also removes ak+1,1 and −ak+1,1 from the entries in the
(k + 1, 1)st positions, where (4 ≤ k ≤ n− 1) in Ren+1 and Len+1, respectively.4
• We assign a2,3 := d and b2,3 := f and then we scale a to unity applying the
a and
a . Renaming d
transformation e′
i = ei, (1 ≤ i ≤ n, n ≥ 4), e′
n+1 = en+1
a , f
by d, f and a2,n+1, respectively, we obtain a Leibniz algebra, which is
a2,n+1
a2
right and left at the same time and a limiting case of (5.2.1) with b = 0, when
d = f = a2,n+1 = 0:
[e1, en+1] = e1 − e3, [e3, en+1] = de2, [e4, en+1] = e4 − e2, [ei, en+1] = (i − 3)ei,
[en+1, en+1] = a2,n+1e2, [en+1, e1] = −e1 + (d + f ) e2 + e3, [en+1, e3] = f e2,
[en+1, e4] = e2 − e4, [en+1, ei] = (3 − i)ei, (5 ≤ i ≤ n).
Altogether (5.2.1) and all its limiting cases after replacing b with a give us a
Leibniz algebra ln+1,1. It remains to consider a continuous family of Leibniz
algebras given below and scale any nonzero entries as much as possible.
[e1, en+1] = e1 − e3, [e3, en+1] = de2, [e4, en+1] = e4 − e2, [ei, en+1] = (i − 3)ei,
[en+1, en+1] = a2,n+1e2, [en+1, e1] = −e1 + (d + f ) e2 + e3, [en+1, e3] = f e2,
[en+1, e4] = e2 − e4, [en+1, ei] = (3 − i)ei, (a2
2,n+1 + d2 + f 2 6= 0, 5 ≤ i ≤ n),
If a2,n+1 6= 0, then we scale it to 1. We also rename all the affected entries
back. Then we combine with the case when a2,n+1 = 0 and obtain a right
and left Leibniz algebra gn+1,4.
(5) Applying the transformation e′
1 = e1 + (2a−b)a2,3−b·b2,3
2a(b+c)
e2, e′
2 = e2, e′
3 = e3 +
(2a+c)a2,3+c·b2,3
2a(b+c)
4 = e4, e′
e′
e2,
5 = e5
c and renaming a
c and b
c by a and b, respectively, we obtain a
continuous family of Leibniz algebras given below:
(5.2.2)
[e1, e5] = ae1 + (b − a + 1)e3, [e3, e5] = e1 + be3, [e4, e5] = (a + b)(e4 − e2),
[e5, e1] = −ae1 + (a − b − 1)e3, [e5, e2] = −2(b + 1)e2, [e5, e3] = −e1 − be3,
[e5, e4] = (a − b − 2)e2 − (a + b)e4, (b 6= −a, a 6= 0, b 6= −1).
(6) We apply the transformation e′
e′
4 = e4, e′
5 = e5
c and rename a
1 = e1+ 3a2,3+b2,3
c and a4,5
2(c−a) e2, e′
c2 by a and a4,5, respectively, to obtain a
3 = e3+ (2a+c)a2,3+c·b2,3
2 = e2, e′
2a(c−a)
e2,
4Except this transformation it is the same as case (4) for the right Leibniz algebras.
58
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
Leibniz algebra given below:
(5.2.3)
(5.2.4)
[e1, e5] = ae1 + (1 − 2a)e3, [e3, e5] = e1 − ae3, [e5, e5] = a4,5e4,
[e5, e1] = −ae1 + (2a − 1)e3, [e5, e2] = 2(a − 1)e2, [e5, e3] = ae3 − e1,
[e5, e4] = 2(a − 1)e2, (a 6= 0, a 6= 1),
which is a limiting case of (5.2.2) with b := −a when a4,5 = 0. If a4,5 6= 0, then we
scale it to 1 and obtain a continuous family of Leibniz algebras:
[e1, e5] = ae1 + (1 − 2a)e3, [e3, e5] = e1 − ae3, [e5, e5] = e4,
[e5, e1] = −ae1 + (2a − 1)e3, [e5, e2] = 2(a − 1)e2, [e5, e3] = ae3 − e1,
[e5, e4] = 2(a − 1)e2, (a 6= 0, a 6= 1).
(7) We apply the transformation e′
d := a·b2,3+c·a2,1
a
, f := a·a2,3−c·a2,1
a
Theorem 5.1.3.
1 = e1 + a2,1
i = ei, (2 ≤ i ≤ 5) and assign
. Then this case becomes the same as case (7) of
a e2, e′
(8) Applying the transformation e′
1 = e1 + 2a2,1−b2,3
c
e2, e′
2 = e2, e′
3 = e3 + a2,1
c e2, e′
4 =
e4, e′
5 = e5
c and renaming a4,5
c2 back by a4,5, we obtain a Leibniz algebra:
[e1, e5] = e3, [e3, e5] = e1, [e5, e5] = a4,5e4, [e5, e1] = −e3, [e5, e2] = −2e2, [e5, e3] = −e1,
[e5, e4] = −2e2,
which is a limiting case of (5.2.3) with a = 0. If a4,5 6= 0, then we scale a4,5 to
1 and obtain a limiting case of (5.2.4) with a = 0. Altogether (5.2.4) and all its
limiting cases give us the algebra l5,6.
(9) One applies the transformation e′
1 = e1 + (3b+4c)a2,3−b·b2,3
4(b+c)2
e2, e′
2 = e2, e′
3 = e3 +
(4b+5c)a2,3+c·b2,3
4(b+c)2
given below:
e2, e′
4 = e4, e′
5 = e5
c . Renaming b
c by b, we obtain a Leibniz algebra
[e1, e5] = (b + 1)e3, [e3, e5] = e1 + be3, [e4, e5] = b(e4 − e2), [e5, e1] = (−b − 1)e3,
[e5, e2] = −2(b + 1)e2, [e5, e3] = −e1 − be3, [e5, e4] = −(b + 2)e2 − be4, (b 6= 0, b 6= −1),
which is a limiting case of (5.2.2) with a = 0. Altogether (5.2.2) and all its limiting
cases give us the algebra l5,5.
(10) We apply the transformation e′
1 = e1 + a2,3
c e2, e′
i = ei, (2 ≤ i ≤ 4), e′
5 = e5
c and
c , b2,3
rename b2,1
c , a2,3
c and a2,5
c2 by b2,1, b2,3, a2,3 and a2,5, respectively. Then we assign
a2,1 := a2,3 + b2,3 − b2,1 and this case becomes the same as case (10) of Theorem
5.1.3.
(cid:3)
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
59
5.2.2. Codimension two and three solvable extensions of L 4
The non-zero inner derivations of L 4, (n ≥ 4) are given by
Le1 =
···
0
0 0 0
···
0
1 0 2
···
0 0 0
0
0 0 −1 0
···
0 0 0 −1 ···
...
...
...
0 0 0
0 0 0
...
0
0
...
0
0
0
0
0
...
0 0
0 0
0 0
0 0
0 0
...
...
··· −1 0 0
···
0 −1 0
, Le3 =
0 0 0 0 ··· 0
0 0 1 0 ··· 0
0 0 0 0 ··· 0
1 0 0 0 ··· 0
0 0 0 0 ··· 0
...
...
...
...
0 0 0 0 ··· 0
...
0 0 0 ··· 0
0 0 0 ··· 0
0 0 0 ··· 0
0 0 0 ··· 0
1 0 0 ··· 0
...
...
...
...
...
...
· 0 0 ··· 0
...
...
, Lei = Ei+1,1 =
(4 ≤ i ≤ n−1),
where Ei+1,1 is the n× n matrix that has 1 in the (i + 1, 1)st position and all other entries
are zero. According to Remark 5.1.4, we have at most two outer derivations.
5.2.2.1. Codimension two solvable extensions of L 4, (n = 4)
We consider the same cases as in Section 5.1.2.1 and follow the General approach given
in Section 5.1.2.
, (a 6= −1, a 6= 0, b 6= −1).
1
a
0
a1
b1
c1
=
(1) (a) One could set
Therefore the vector space of outer derivations as 4 × 4 matrices is as follows:
Le5 =
=
0
1 − a
2 b2,3 −2a a2,3
−a
0 −1 − a
−1
1 − a
and
2 a2,3 + 1−2a
a2
b2
c2
1
b
1
3−2a
0
0
0
0
0
0
,
.
0
0
0
0
0
As a result,
−1
−b
0
−1
−b
0
2(cid:17) a2,3− b2,3
2 − b(cid:17) a2,3 + 3
(1 − b)α2,3 − b · β2,3 −2(b + 1) 2α2,3 + β2,3 −1 − b
−1 − b
Le6 =
2 and it follows that β2,3 := (cid:16) 1
(i) Considering L[e5,e6], we obtain that a := 1. Since b 6= −1, we have that α2,3 :=
(cid:16)b + 1
2 b2,3. It implies that L[e5,e6] = 0.
0
0
0
−2 a2,3
0
0 −1
0
0 −2
0
−1
2(cid:17) a2,3 + b2,3
−b
0
( L[e1,e5] = Le1, L[e2,e5] = 0, L[e3,e5] = Le3, L[ei,e5] = 0, L[e1,e6] = Le1 + bLe3,
L[e2,e6] = 0, L[e3,e6] = Le1 + bLe3 , L[ei,e6] = 0, (b 6= −1, 4 ≤ i ≤ 6).
2 −1 − b
−1 − b
2(cid:17) b2,3 −2(b + 1) (cid:16)b + 3
−1
2 −(cid:16)b + 1
−b
0
Le5 =
Further, we find the following commutators:
, (b 6= −1)5.
−1
2
0
0
Le6 =
a2,3−b2,3
0
0
a2,3
0
0
0
,
(ii) We include a linear combination of e2 and e4:
[e1, e5] = e1 + c2,1e2 + c4,1e4, [e2, e5] = c2,2e2 + c4,2e4, [e3, e5] = c2,3e2 + e3 + c4,3e4,
[ei, e5] = c2,ie2 + c4,ie4, [e1, e6] = e1 + d2,1e2 + be3 + d4,1e4, [e2, e6] = d2,2e2 + d4,2e4,
[e3, e6] = e1 + d2,3e2 + be3 + d4,3e4, [ei, e6] = d2,ie2 + d4,ie4, (b 6= −1, 4 ≤ i ≤ 6).
Besides we have the brackets from L 4 and from outer derivations Le5 and Le6 as well.
(iii) We satisfy the right Leibniz identity shown in Table 5.
5We notice that Le6 is nilpotent if b = −1.
60
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
Table 5. Left Leibniz identities in case (1) (a) with a nilradical L 4, (n = 4).
Steps Ordered triple
Result
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
Le1 ([e1, e5])
Le1 ([e1, e6])
Le1 ([e3, e5])
Le1 ([e3, e6])
Le5 ([e5, e5])
Le6 ([e6, e6])
Le3 ([e5, e5])
Le1 ([e5, e5])
Le1 ([e5, e6])
Le5 ([e3, e6])
Le5 ([e6, e5])
[e2, e5] = 0 =⇒ c2,2 = c4,2 = 0.
[e2, e6] = 0 =⇒ d2,2 = d4,2 = 0.
c2,4 := −2, c4,4 := 2 =⇒ [e4, e5] = 2 (e4 − e2) .
d2,4 := −b − 1, d4,4 := b + 1 =⇒ [e4, e6] = (b + 1) (e4 − e2) .
c4,5 = 0 =⇒ [e5, e5] = c2,5e2.
b 6= −1 =⇒ d4,6 = 0 =⇒ [e6, e6] = d2,6e2.
c2,3 := a2,3, c4,3 = 0 =⇒ [e3, e5] = a2,3e2 + e3.
c2,1 := a2,3−b2,3
, c4,1 = 0 =⇒ [e1, e5] = e1 + a2,3−b2,3
e2.
2
2
d2,1 :=(cid:0)b + 1
d2,3 :=(cid:0)b + 1
2(cid:1) a2,3 −
2(cid:1) a2,3 −
d4,5
b2,3
b2,3
2 , d4,1 = 0 =⇒ [e1, e6] = e1 +(cid:16)(cid:0)b + 1
2 , d4,3 = 0 =⇒ [e3, e6] = e1 +(cid:16)(cid:0)b + 1
2(cid:1) a2,3 −
2(cid:1) a2,3 −
b2,3
b2,3
2 (cid:17) e2 + be3.
2 (cid:17) e2 + be3.
:= −c4,6 =⇒ c4,6
:= (b + 1)c2,5 − c2,6 =⇒ [e5, e6] = d2,5e2 +
12.
Le5 ([e6, e6])
d2,6
:=
(b + 1) (c2,6 + d2,5) − (b + 1)2c2,5
=⇒
[e6, e6]
=
(c2,6 − (b + 1)c2,5) e4, [e6, e5] = c2,6e2 + ((b + 1)c2,5 − c2,6) e4
(cid:0)(b + 1) (c2,6 + d2,5) − (b + 1)2c2,5(cid:1) e2.
We obtain that Le5 and Le6 restricted to the nilradical do not change, but the remaining
brackets are as follows:
a2,3 − b2,3
1
1
2
b2,3
b2,3
[e1, e5] = e1 +
e2, [e3, e5] = a2,3e2 + e3, [e4, e5] = 2 (e4 − e2) , [e5, e5] = c2,5e2,
2 ! e2 + be3,
[e6, e5] = c2,6e2 + ((b + 1)c2,5 − c2,6) e4, [e1, e6] = e1 + (cid:18)b +
[e3, e6] = e1 + (cid:18)b +
[e5, e6] = d2,5e2 + (c2,6 − (b + 1)c2,5) e4, [e6, e6] = (cid:16)(b + 1) (c2,6 + d2,5) − (b + 1)2c2,5(cid:17) e2,
(b 6= −1).
2(cid:19) a2,3 −
2 ! e2 + be3, [e4, e6] = (b + 1) (e4 − e2) ,
2(cid:19) a2,3 −
Altogether the nilradical L 4 (4.0.1), the outer derivations Le5 and Le6 and the remaining
brackets given above define a continuous family of Leibniz algebras depending on the
parameters.
(iv)&(v) We apply the following transformation: e′
e3 + a2,3e2, e′
algebra l6,2 given below:
3 =
e4 and obtain a Leibniz
2 e2 + c2,6−(b+1)c2,5
1 = e1 + a2,3−b2,3
6 = e6 + d2,5
5 = e5 + c2,5
2 = e2, e′
4 = e4, e′
2 e2, e′
e2, e′
2
2
[e1, e5] = e1, [e3, e5] = e3, [e4, e5] = 2(e4 − e2), [e5, e1] = −e1, [e5, e2] = −2e2, [e5, e3] = −e3,
[e5, e4] = −2e4, [e1, e6] = e1 + be3, [e3, e6] = e1 + be3, [e4, e6] = (b + 1) (e4 − e2) ,
[e6, e1] = −e1 − be3, [e6, e2] = −2(b + 1)e2, [e6, e3] = −e1 − be3, [e6, e4] = −(b + 1) (e2 + e4) ,
(b 6= −1).
Remark 5.2.2. We notice that if b = −1 in the algebra, then the outer derivation Le6 is
nilpotent.
(1) (b) We set
vector space of outer derivations as 4 × 4 matrices is as follows:
Le5 =
=
−1
− c+1
2 a2,3 − c+3
2 b2,3 −2(c + 2)
−c − 1
=
(c + 1)a2,3 + c · b2,3 −1 − 2c
, (c 6= −2, d 6= −1). Therefore the
and
−c
−2
0
0
−3
a1
b1
c1
a2
b2
c2
1
1
d
1
2
c
0
0
0
0
0
,
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
61
(i) Considering L[e5,e6], we obtain that d = 0 and we have the system of equations:
.
There are the following two cases:
(I) If c 6= −1, then a2,3 := c+4
0
1−d
0
0
−1
−d
0
−d
−1
0
2 α2,3 − d+1
2 β2,3 −2(d + 1)
Le6 =
( b2,3 := (cid:16) c
(2c + 3) β2,3 − α2,3 − (c + 1) a2,3 − (c + 3) b2,3 = 0.
0
(d + 1)α2,3 + d · β2,3 −2d
0
−2
2 + 1(cid:17) α2,3,
2 + 1(cid:17) β2,3 −(cid:16) c
2 α2,3 − c
2 β2,3 and L[e5,e6] = 0. Consequently,
0
2 β2,3 −2(c + 2)
2 β2,3 −2c − 1
Le5 =
2 α2,3 + c
0
−3
3c+4
α2,3
0
,
0
0
0
0
−2 α2,3
0 −1
0
and we find the commutators given below:
−1
2
0
0
0
0
0
0 −2
α2,3−β2,3
0
−1
2 − 2c+3
−c − 1
Le6 =
−c
−2
0
, (c 6= −2)
2
1
α2,3−β2,3
(II) If c = −1, then b2,3 := β2,3−α2,3
0
−2 α2,3−β2,3
0
−2
0
0
( L[e1,e5] = Le1 + (c + 1)Le3, L[e2,e5] = 0, L[e3,e5] = cLe1 + 2Le3, L[ei,e5] = 0,
L[e1,e6] = Le1, L[e2,e6] = 0, L[e3,e6] = Le3, L[ei,e6] = 0, (c 6= −2, 4 ≤ i ≤ 6).
Le5 =
( L[e1,e5] = Le1, L[e2,e5] = 0, L[e3,e5] = 2Le3 − Le1, L[ei,e5] = 0,
L[e1,e6] = Le1, L[e2,e6] = 0, L[e3,e6] = Le3, L[ei,e6] = 0, (4 ≤ i ≤ 6).
and L[e5,e6] = 0. As a result,
0
0
−2 α2,3
0 −1
0
, Le6 =
and we have the following commutators:
0
0
0
0 −2
0
1
0
−3
−1
2
0
0
−1
2
0
0
α2,3−β2,3
2
(ii) We combine cases (I) and (II), include a linear combination of e2 and e4, and obtain
the following:
[e1, e5] = e1 + a2,1e2 + (c + 1)e3 + a4,1e4, [e2, e5] = a2,2e2 + a4,2e4, [e3, e5] = ce1 + a2,3e2+
2e3 + a4,3e4, [ei, e5] = a2,ie2 + a4,ie4, [e1, e6] = e1 + b2,1e2 + b4,1e4, [e2, e6] = b2,2e2 + b4,2e4,
[e3, e6] = b2,3e2 + e3 + b4,3e4, [ei, e6] = b2,ie2 + b4,ie4, (c 6= −2, 4 ≤ i ≤ 6).
Besides we have the brackets from L 4 and from outer derivations Le5 and Le6 as well.
(iii) To satisfy the left Leibniz identity, we refer to the identities given in Table 5. as much
as possible. The identities we apply are the following: 1.−6., Le3([e6, e6]) = [Le3(e6), e6]+
[e6, Le3(e6)], Le1 ([e6, e6]) = [Le1(e6), e6] + [e6, Le1(e6)], Le1 ([e6, e5]) = [Le1(e6), e5] +
[e6, Le1(e5)], Le3 ([e6, e5]) = [Le3(e6), e5] + [e6, Le3(e5)], 11. and 12. We have that Le5 and
Le6 restricted to the nilradical do not change, but the remaining brackets are as follows:
[e1, e5] = e1 + (cid:18)c +
[e3, e5] = ce1 +(cid:18)(cid:18) c
2
3
2(cid:19) α2,3 −
+ 2(cid:19) α2,3 −
β2,3
2 ! e2 + (c + 1)e3,
β2,3(cid:19) e2 + 2e3, [e4, e5] = 3 (e4 − e2) ,
c
2
α2,3 − β2,3
[e5, e5] = (c + 2) (a2,6 + a4,6) e2, [e6, e5] = a2,6e2 + a4,6e4, [e1, e6] = e1 +
[e3, e6] = α2,3e2 + e3, [e4, e6] = 2 (e4 − e2) , [e5, e6] = ((c + 2)b2,6 + a4,6) e2 − a4,6e4,
[e6, e6] = b2,6e2, (c 6= −2).
Altogether the nilradical L 4 (4.0.1), the outer derivations Le5 and Le6 and the remaining
brackets given above define a continuous family of Leibniz algebras.
e2,
2
62
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
1 = e1 + α2,3−β2,3
2
e2, e′
2 = e2, e′
3 = e3 + α2,3e2, e′
4 =
(iv)&(v) Applying the transformation: e′
6 = e6 + b2,6
e4, e′
a
1
0
a1
b1
c1
2 e4, e′
2 e2 + a4,6
2 e2, we obtain a Leibniz algebra l6,3:
5 = e5 + a2,6
[e1, e5] = e1 + (c + 1)e3, [e3, e5] = ce1 + 2e3, [e4, e5] = 3 (e4 − e2) , [e5, e1] = −e1 − (c + 1)e3,
[e5, e2] = −2(c + 2)e2, [e5, e3] = −ce1 − 2e3, [e5, e4] = (−2c − 1)e2 − 3e4, [e1, e6] = e1,
[e3, e6] = e3, [e4, e6] = 2 (e4 − e2) , [e6, e1] = −e1, [e6, e2] = −2e2, [e6, e3] = −e3,
[e6, e4] = −2e4, (c 6= −2).
=
Le5 =
=
(1) (c) We set
vector space of outer derivations as 4 × 4 matrices is as follows:
0
0
0
a − 1
−2 a2,3
0 −1
0 −a − 1
0
−1
b
0
0
and
−a
a − 1
−b
b − 1
0
0
−2 (b+1)α2,3+β2,3
0
0
, (a, b 6= 0, a 6= −1). Therefore the
(3a−2)a2,3 +(a−2)b2,3
a2
b2
c2
b
0
1
0
0
2a
.
,
(i) Considering L[e5,e6], we obtain that a := 1 and we have the system of equations:
0
b − 2
0
−b
2b
(3b−1)α2,3+(b−1)β2,3
Le6 =
( β2,3 := 3b·a2,3+b·b2,3
(b − 3)α2,3 + b−3
2
− (b + 1)α2,3,
2 (b2,3 − a2,3) = 0.
There are the following two cases:
and L[e5,e6] = 0. As
a2,3−b2,3
a result,
−1
2
0
0
(I) If b 6= 3, then α2,3 := a2,3−b2,3
2
2
=⇒ β2,3 := (2b−1)a2,3+(2b+1)b2,3
0
−1
−2 3a2,3+b2,3
2
0
0
0
0
−b
b − 1
0
b·a2,3+(b−2)b2,3
2
, (b 6= 0).
0
b − 2
0
−b
Further, we find the following:
0
0
−2 a2,3
0 −1
0
0
0
0
0 −2
, Le6 =
Le5 =
( L[e1,e5] = Le1, L[e2,e5] = 0, L[e3,e5] = Le3, L[ei,e5] = 0, L[e1,e6] = bLe1 + (1 − b)Le3,
L[e2,e6] = 0, L[e3,e6] = Le1, L[ei,e6] = 0, (b 6= 0, 4 ≤ i ≤ 6).
(II) If b := 3, then β2,3 := 9a2,3+3b2,3
− 4α2,3 and L[e5,e6] = 0 as well as Le5, Le6 are as
, Le6 =
( L[e1,e5] = Le1, L[e2,e5] = 0, L[e3,e5] = Le3, L[ei,e5] = 0, L[e1,e6] = 3Le1 − 2Le3,
L[e2,e6] = 0, L[e3,e6] = Le1, L[ei,e6] = 0, (4 ≤ i ≤ 6).
0
−1
−2 3a2,3+b2,3
2
0
0
0
0
Le5 =
0
0
0
0 −2
0
0
−2 a2,3
0 −1
0
We have the following commutators:
(ii) We combine cases (I) and (II) and include a linear combination of e2 and e4 :
0
1
0
−3
−3
2
2
0
−1
2
0
0
follows:
3a2,3+b2,3
a2,3−b2,3
.
2
[e1, e5] = e1 + c2,1e2 + c4,1e4, [e2, e5] = c2,2e2 + c4,2e4, [e3, e5] = c2,3e2 + e3 + c4,3e4,
[ei, e5] = c2,ie2 + c4,ie4, [e1, e6] = be1 + d2,1e2 + (1 − b)e3 + d4,1e4, [e2, e6] = d2,2e2+
d4,2e4, [e3, e6] = e1 + d2,3e2 + d4,3e4, [ei, e6] = d2,ie2 + d4,ie4, (b 6= 0, 4 ≤ i ≤ 6).
Besides we have the brackets from L 4 and from outer derivations Le5 and Le6 as well.
(iii) To satisfy the left Leibniz identity, we mostly apply the identities given in Table
5: 1. − 5., Le6 ([e6, e5]) = [Le6(e6), e5] + [e6, Le6(e5)], 7. − 12. We have that Le5 and Le6
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
63
restricted to the nilradical do not change, but the remaining brackets are the following:
e2, [e3, e5] = a2,3e2 + e3, [e4, e5] = 2 (e4 − e2) , [e5, e5] = c2,5e2,
a2,3 − b2,3
[e1, e5] = e1 +
2
(2 − b)a2,3 − b · b2,3
[e6, e5] = c2,6e2 + (c2,5 − c2,6) e4, [e1, e6] = be1 +
[e3, e6] = e1 +
[e6, e6] = (d2,5 − c2,5 + c2,6) e2, (b 6= 0).
e2 + (1 − b)e3,
e2, [e4, e6] = b (e4 − e2) , [e5, e6] = d2,5e2 + (c2,6 − c2,5) e4,
a2,3 − b2,3
2
2
Altogether the nilradical L 4 (4.0.1), the outer derivations Le5 and Le6 and the remaining
brackets given above define a continuous family of Leibniz algebras depending on the
parameters.
(iv)&(v) We apply the transformation: e′
e4, e′
5 = e5 + c2,5
[e1, e5] = e1, [e3, e5] = e3, [e4, e5] = 2 (e4 − e2) , [e5, e1] = −e1, [e5, e2] = −2e2, [e5, e3] = −e3,
[e5, e4] = −2e4, [e1, e6] = be1 + (1 − b)e3, [e3, e6] = e1, [e4, e6] = b (e4 − e2) ,
[e6, e1] = −be1 + (b − 1)e3, [e6, e2] = −2e2, [e6, e3] = −e1, [e6, e4] = (b − 2)e2 − be4, (b 6= 0).
e4 and obtain a Leibniz algebra l6,4:
1 = e1 + a2,3−b2,3
3 = e3 + a2,3e2, e′
2 e2 + c2,6−c2,5
6 = e6 + d2,5
2 = e2, e′
2 e2, e′
e2, e′
4 =
2
2
5.2.2.2. Codimension two solvable extensions of L 4, (n ≥ 5)
One could set a
derivations as n × n matrices is as follows:
2 ! and α
β ! = 1
1 ! . Therefore the vector space of outer
b ! = 1
−1
0
0
3a2,1−2a2,3 −4
0
0
0 −a5,3
0
−1
0
0
0
a2,3
−2
0
·
Len+1 =
0
...
0
...
·
...
0
0
0
−1
0
α2,1 −2
0
0
0 −α5,3
0
0 −an−2,3 −an−3,3 ···
0 −an−1,3 −an−2,3 ···
0 −an,3 −an−1,3 ···
0
0
0
0
0
0
0
0
−3 0
0 −4
0
0
0
−2
0
α2,3
−1
0
0
0
0
0
−α5,3
0
·
0
...
·
...
... 0
...
·
...
···
···
···
···
···
···
...
...
Len+2 =
0
−1
0
−3
0
−a5,3
·
...
0
0
0
0
0
0
0
0
−4 0
0 −5
... 0
...
···
···
···
···
···
···
...
...
...
0
··· −a5,3
···
···
·
· −a5,3
0
0
0
0
0
0
...
...
3−n
0
0
0
0
0
0
0
0
0
0
0
0
0
...
...
0
0
2−n 0
0
1−n
,
...
...
.
· −a5,3
0
0
0
0
0
0
0
0
0
0
0
0
...
...
...
...
4−n
0
...
0
0
0
0
0
0
0
...
...
0
...
0
0
0
0
...
0
0
0
0 −αn−2,3 −αn−3,3 ···
0 −αn−1,3 −αn−2,3 ···
0 −αn,3 −αn−1,3 ···
··· −α5,3
···
···
·
· −α5,3
0
0
3−n 0
· −α5,3
0
2−n
(i) Considering L[en+1,en+2] and comparing withPn
i ≤ n), α2,3 := a2,3
as follows:
2 and α2,1 := a2,1 − a2,3
i=1 ciLei, we deduce that αi,3 := ai,3, (5 ≤
2 . As a result, the outer derivation Len+2 changes
0
−1
a2,1−
0
0
0
0
a2,3
0
a2,3
2 −2
0
0
0 −a5,3
0
2
−1
0
·
0
...
·
...
0
0
0
−2
0
·
...
−a5,3
0
0
0
0
0
0
0
0
−3 0
0 −4
... 0
...
···
···
···
···
···
···
...
...
Len+2 =
0
0
0
0
0
0
...
...
4−n
0
0
0
0
0
0
0
0
0
0
0
0
0
...
...
...
...
0
0
3−n 0
...
0
.
0 −an−2,3 −an−3,3 ···
0 −an−1,3 −an−2,3 ···
0 −an,3 −an−1,3 ···
··· −a5,3
···
···
·
· −a5,3
· −a5,3
0
2−n
64
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
Altogether we find the following commutators:
L[e1,en+1] = Le1 + Le3, L[e2,en+1] = 0, L[ei,en+1] = (i − 1)Lei +
n−1
n−1
Xk=i+2
ak−i+3,3Lek,
L[ej ,en+1] = 0, (n ≤ j ≤ n + 1), L[en+2,en+1] =
Xk=i+2
L[e2,en+2] = 0, L[ei,en+2] = (i − 2)Lei +
n−1
ak+1,3Lek, L[e1,en+2] = Le1,
Xk=4
ak−i+3,3Lek, (3 ≤ i ≤ n − 1),
L[en,en+2] = 0, L[en+1,en+2] = −
ak+1,3Lek , L[en+2,en+2] = 0.
(ii) We include a linear combination of e2 and en :
n−1
Xk=4
[e1, en+1] = e1 + c2,1e2 + e3 + cn,1en, [e2, en+1] = c2,2e2 + cn,2en, [ei, en+1] = c2,ie2+
(i − 1)ei +
n−1
Xk=i+2
ak−i+3,3ek + cn,ien, [ej, en+1] = c2,je2 + cn,jen, (n ≤ j ≤ n + 1),
n−1
Xk=4
[en+2, en+1] = c2,n+2e2 +
ak+1,3ek + cn,n+2en, [e1, en+2] = e1 + d2,1e2 + dn,1en,
n−1
Xk=i+2
[e2, en+2] = d2,2e2 + dn,2en, [ei, en+2] = d2,ie2 + (i − 2)ei +
ak−i+3,3ek + dn,ien,
(3 ≤ i ≤ n − 1), [en, en+2] = d2,ne2 + dn,nen, [en+1, en+2] = d2,n+1e2 −
dn,n+1en, [en+2, en+2] = d2,n+2e2 + dn,n+2en.
n−1
Xk=4
ak+1,3ek+
Besides we have the brackets from L 4 and from outer derivations Len+1 and Len+2 as
well.
(iii) We satisfy the right Leibniz identity shown in Table 6. We notice that Len+1 and
Len+2 restricted to the nilradical do not change, but the remaining brackets are as follows:
[e1, en+1] = e1 + a2,1e2 + e3, [e3, en+1] = a2,3e2 + 2e3 +
n
n
ak−1,3ek, [ei, en+1] = (i − 1)ei +
Xk=i+2
Xk=6
n
ak,3ek, [e4, en+1] = 3 (e4 − e2) +
Xk=5
ak−i+3,3ek, [en+1, en+1] = (2c2,n+2 + 2a5,3) e2,
[en+2, en+1] = c2,n+2e2 +
[e3, en+2] =
e2 + e3 +
a2,3
2
n−1
n
ak+1,3ek + cn,n+2en, [e1, en+2] = e1 +(cid:18)a2,1 −
Xk=4
Xk=5
ak,3ek, [e4, en+2] = 2 (e4 − e2) +
Xk=i+2
ak−i+3,3ek, (5 ≤ i ≤ n), [en+1, en+2] = d2,n+1e2 −
d2,n+1 − a5,3
ak−1,3ek,
Xk=6
n
n
n−1
Xk=4
a2,3
2 (cid:19) e2,
[ei, en+2] = (i − 2)ei +
cn,n+2en, [en+2, en+2] =
Altogether the nilradical L 4 (4.0.1), the outer derivations Len+1 and Len+2 and the
remaining brackets given above define a continuous family of the solvable left Leibniz
algebras. Then we apply the technique of "absorption" according to step (iv).
e2.
2
ak+1,3ek−
2
c2,n+2
e2, e′
n+2 = en+2 + d2,n+1−a5,3
• We start with the transformation e′
n+1 = en+1 +
e2. This transformation removes the coefficients
c2,n+2 and d2,n+1−a5,3
in front of e2 in [en+2, en+1] and [en+2, en+2], respectively, and
changes the coefficient in front of e2 in [en+1, en+1] and [en+1, en+2] to 2a5,3 and
a5,3, correspondingly.
i = ei, (1 ≤ i ≤ n, n ≥ 5), e′
2
4
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
65
Table 6. Left Leibniz identities in the codimension two nilradical
L 4, (n ≥ 5).
Steps Ordered triple
Result
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
c2,n = 0, cn,n := n − 1 =⇒ [en, en+1] = (n − 1) en. Altogether with 4., [ei, en+1] =
d2,4 := −2, dn,4 := an−1,3, where a4,3 = 0 =⇒ [e4, en+2] = 2(e4 − e2) +
d2,i+1 = 0, dn,i+1 := an−i+2,3, (4 ≤ i ≤ n − 2), where a4,3 = 0 =⇒ [ej, en+2] =
k=6 ak−1,3ek.
c2,i+1 = 0, cn,i+1 := an−i+2,3, (4 ≤ i ≤ n − 2), where a4,3 = 0 =⇒ [ej , en+1] =
Le1 ([e1, en+1])
[e2, en+1] = 0 =⇒ c2,2 = cn,2 = 0.
k=6 ak−1,3ek.
[e2, en+2] = 0 =⇒ d2,2 = dn,2 = 0.
k=i+2 ak−i+3,3ek, (5 ≤ i ≤ n).
k=j+2 ak−j+3,3ek, (5 ≤ j ≤ n − 1).
Le1 ([e1, en+2])
Le1 ([e3, en+1])
Le1 ([ei, en+1])
Le1 ([en−1, en+1])
Le1 ([e3, en+2])
Le1 ([ei, en+2])
c2,4 := −3, cn,4 := an−1,3, where a4,3 = 0 =⇒ [e4, en+1] = 3(e4−e2)+Pn
(j − 1) ej +Pn
(i − 1) ei +Pn
Pn
(j − 2) ej +Pn
(i − 2) ei +Pn
c2,3 := a2,3, cn,3 := an,3 =⇒ [e3, en+1] = a2,3e2 + 2e3 +Pn
2 e2 + e3 +Pn
2 , dn,1 = 0 =⇒ [e1, en+2] = e1 +(cid:0)a2,1 − a2,3
2 , dn,3 := an,3 =⇒ [e3, en+2] = a2,3
c2,1 := a2,1, cn,1 = 0 =⇒ [e1, en+1] = e1 + a2,1e2 + e3.
Len+1 ([en+1, en+1])cn,n+1 = 0 =⇒ [en+1, en+1] = c2,n+1e2.
Len+2 ([en+2, en+2])dn,n+2 = 0 =⇒ [en+2, en+2] = d2,n+2e2.
Le3 ([en+1, en+1])
Le3 ([en+2, en+2]) d2,3 := a2,3
Le1 ([en+1, en+1])
Le1 ([en+2, en+2]) d2,1 := a2,1 − a2,3
Len+1 ([en+2, en+1])c2,n+1
k=j+2 ak−j+3,3ek, (5 ≤ j ≤ n − 1).
k=i+2 ak−i+3,3ek, (5 ≤ i ≤ n).
k=5 ak,3ek.
k=5 ak,3ek.
:= 2c2,n+2 + 2a5,3, dn,n+1
2 (cid:1) e2.
=⇒
:= −cn,n+2
Len+1 ([en+2, en+2])d2,n+2 := d2,n+1−a5,3
(2c2,n+2 + 2a5,3) e2, [en+1, en+2] = d2,n+1e2 −Pn−1
=⇒ [en+2, en+2] = d2,n+1−a5,3
2
2
e2.
[en+1, en+1] =
k=4 ak+1,3ek − cn,n+2en.
Le1 ([en−1, en+2]) d2,n = 0, dn,n := n − 2 =⇒ [en, en+2] = (n − 2) en. Combining with 7., [ei, en+2] =
2 ak−1,3 and a5,3
i = ei, (1 ≤ i ≤ n, n ≥ 5), e′
• Then we apply the transformation e′
n+1 = en+1 +
a5,3
2 e4, e′
n+2 = en+2 to remove the coefficients a5,3 and 2a5,3 in front of e2 in
[en+1, en+2] and [en+1, en+1], respectively. At the same time this transformation
removes a5,3 and −a5,3 in front of e4 in [en+2, en+1] and [en+1, en+2], respectively,
and changes the coefficients in front of ek, (6 ≤ k ≤ n − 1) in [en+2, en+1] and
[en+1, en+2] to ak+1,3 − a5,3
2 ak−1,3 − ak+1,3, respectively. It also af-
fects the coefficients in front en, (n ≥ 6) in [en+2, en+1] and [en+1, en+2], which we
rename back by cn,n+2 and −cn,n+2, respectively. The following entries are intro-
duced by the transformation: − a5,3
in the (5, 1)st, (n ≥ 5) position in
Ren+1 and Len+1, respectively.
• Applying the transformation e′
n+2 = en+2 −
Pn−1
(6 ≤ k ≤ n − 1, n ≥ 7), we remove the coefficients a6,3 and −a6,3 in front of
e5 in [en+2, en+1] and [en+1, en+2], respectively. Besides the transformation re-
moves ak+1,3 − a5,3
2 ak−1,3 − ak+1,3 in front of ek, (6 ≤ k ≤ n − 1)
in [en+2, en+1] and [en+1, en+2], respectively. This transformation introduces a6,3
4
and Ak+1,3
and − a6,3
in the
1−k
(k + 1, 1)st, (6 ≤ k ≤ n − 1) position in Ren+2 and Len+2, respectively.
It also
affects the coefficients in front en, (n ≥ 7) in [en+2, en+1] and [en+1, en+2], which
we rename back by cn,n+2 and −cn,n+2, respectively.
j = ej, (1 ≤ j ≤ n + 1, n ≥ 6), e′
2 a5,3ak−1,3−Pk
in the (6, 1)st, (n ≥ 6) position as well as Ak+1,3
k−1 ek, where A6,3 := a6,3 and Ak+1,3 := ak+1,3− 1
2 ak−1,3 and a5,3
2 and a5,3
Ak+1,3
k−1
k=5
i−3
i=7
4
2
Ai−1,3ak−i+5,3
,
66
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
• Finally applying the transformation e′
en+2 − cn,n+2
[en+1, en+2], respectively, without affecting other entries.
n+2 =
n−1 en, we remove cn,n+2 and −cn,n+2 in front of en in [en+2, en+1] and
i = ei, (1 ≤ i ≤ n + 1, n ≥ 5), e′
Len+2 =
−1
We obtain that Len+1 and Len+2 are as follows:
···
···
···
···
···
···
0
3a2,1−2a2,3 −4
0
0
0 −a5,3
0
0
0
0
0
0
0
0
0
−4 0
0 −5
0
−1
0
−3
0
a2,3
−2
0
−1
0
a5,3
2
0
−a5,3
0
·
Len+1 =
0
...
0
0
0
0
...
·
...
... 0
...
...
...
·
...
...
0
0 −an−2,3 −an−3,3 ···
0 −an−1,3 −an−2,3 ···
0 −an,3 −an−1,3 ···
··· −a5,3
···
···
·
· −a5,3
0
0
0
0
0
0
...
...
3−n
0
0
0
0
0
0
0
0
0
0
0
0
0
...
...
...
...
0
0
2−n 0
0
a2,3
−1
a2,1−
0
0
0
a6,3
0
a2,3
2 −2
0
0
0 −a5,3
0
2
−1
0
−
·
4
0
0
0
−2
0
−a5,3
0
0
0
0
−3
0
0
0
0
0
0
−4
0
0
0
0
0
0
A7,3
5
A8,3
−
−
6
...
An−2,3
4−n
An−1,3
3−n
An,3
2−n
0
0
...
·
·
...
·
·
...
−a5,3
0 −5
· −a5,3 0
...
0 −an−2,3 −an−3,3
0 −an−1,3 −an−2,3
···
···
··· −a5,3
···
···
···
···
···
···
···
···
···
...
...
1−n
0
0
0
0
0
· −a5,3
0
0
0
0
0
0
0
...
...
...
4−n
0
0
0
0
0
0
...
...
...
0
...
0
0
...
...
...
0
···
···
· −a5,3
0
3−n 0
·
· −a5,3
0
2−n
n
,
, (n ≥ 5).
···
The remaining brackets are given below:
0 −an,3 −an−1,3
a5,3
2
(v) Finally we apply the following two change of basis transformations:
n
n
n
n
n
n
a2,3
ak,3ek,
ak,3ek,
Xk=6
Xk=5
a2,3
2
e2 + e3 +
ak−i+3,3ek,
ek, [e3, en+2] =
Ak,3
k − 2
Xk=5
Xk=i+2
e5, [e3, en+1] = a2,3e2 + 2e3 +
ak−i+3,3ek, (5 ≤ i ≤ n).
[e1, en+1] = e1 + a2,1e2 + e3 −
Xk=6
[e4, en+1] = 3 (e4 − e2) +
ak−1,3ek, [ei, en+1] = (i − 1)ei +
[e1, en+2] = e1 +(cid:18)a2,1 −
2 (cid:19) e2 +
Xk=6
[e4, en+2] = 2 (e4 − e2) +
ak−1,3ek, [ei, en+2] = (i − 2)ei +
2 (cid:17) e2, e′
1 = e1 + (cid:16)a2,1 − a2,3
• e′
(3 ≤ i ≤ n − 2), e′
n−1 = en−1, e′
aj,3 −Pj
, (5 ≤ j ≤ n).
This transformation removes a5,3, a6,3, ..., an,3 in Ren+1, Ren+2 and −a5,3,−a6,3, ...,−an,3
in Len+1, Len+2. It also removes − a5,3
from the (5, 1)st positions in Ren+1
and Len+1, respectively. Besides it removes a2,1 and 3a2,1 − 2a2,3 from the (2, 1)st
positions in Ren+1 and Len+1, respectively, as well as a2,1− a2,3
from the (2, 1)st po-
sitions in Ren+2 and Len+2. The transformation also removes a2,3 from the (2, 3)rd
positions in Ren+1, Len+1 and a2,3
from the same positions in Ren+2, Len+2. It intro-
duces the entries in the (i, 1)st positions in Ren+1 and Len+1, that we set to be ai,1
and −ai,1, (6 ≤ i ≤ n), respectively. The transformation affects the entries in the
(j, 1)st, (8 ≤ j ≤ n) positions in Ren+2 and Len+2, but we rename all the entries in
the (i, 1)st positions by i−3
Xk=i+2
i = ei − Pn
ek,
n+2 = en+2, where Bj,3 :=
2 e2, e′
n+1 = en+1, e′
3 = e3 + a2,3
2 and a5,3
i−2 ai,1 in Ren+2 and by 3−i
2 = e2, e′
n = en, e′
Bk−2,3aj−k+5,3
i−2 ai,1, (6 ≤ i ≤ n) in Len+2.
Bk−i+3,3
k=i+2
k−5
k=7
k−i
2
2
2
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
67
k−2
k=5
and 3−i
We obtain a Leibniz algebra ln+2,1 given below:
k = ek, (1 ≤ k ≤ n), e′
n+1 = en+1+Pn−1
i−2 ai,1, (6 ≤ i ≤ n) in Ren+2 and Len+2, respectively.
k=5 ak+1,1ek, e′
k−1 ak+1,1ek, we remove ai,1 in Ren+1 and −ai,1 in Len+1 as well as i−3
• Applying the transformation e′
en+2+Pn−1
[e1, en+1] = e1 + e3, [e3, en+1] = 2e3, [e4, en+1] = 3(e4 − e2), [ei, en+1] = (i − 1)ei,
[en+1, e1] = −e1 − e3, [en+1, e2] = −4e2, [en+1, e3] = −2e3, [en+1, e4] = −e2 − 3e4,
[en+1, ei] = (1 − i)ei, [e1, en+2] = e1, [e3, en+2] = e3, [e4, en+2] = 2(e4 − e2),
[ei, en+2] = (i − 2)ei, (5 ≤ i ≤ n, n ≥ 5), [en+2, e1] = −e1, [en+2, e2] = −2e2,
[en+2, ej] = (2 − j)ej, (3 ≤ j ≤ n).
n+2 =
i−2 ai,1
We summarize a result in the following theorem:
Theorem 5.2.4. There are four solvable indecomposable left Leibniz algebras up to iso-
morphism with a codimension two nilradical L 4, (n ≥ 4), which are given below:
(i) ln+2,1 : [e1, en+1] = e1 + e3, [e3, en+1] = 2e3, [e4, en+1] = 3(e4 − e2), [ei, en+1] = (i − 1)ei,
[en+1, e1] = −e1 − e3, [en+1, e2] = −4e2, [en+1, e3] = −2e3, [en+1, e4] = −e2 − 3e4,
[en+1, ei] = (1 − i)ei, [e1, en+2] = e1, [e3, en+2] = e3, [e4, en+2] = 2(e4 − e2),
[ei, en+2] = (i − 2)ei, (5 ≤ i ≤ n, n ≥ 5), [en+2, e1] = −e1, [en+2, e2] = −2e2,
[en+2, ej] = (2 − j)ej, (3 ≤ j ≤ n),
(ii) l6,2 : [e1, e5] = e1, [e3, e5] = e3, [e4, e5] = 2(e4 − e2), [e5, e1] = −e1, [e5, e2] = −2e2,
[e5, e3] = −e3, [e5, e4] = −2e4, [e1, e6] = e1 + be3, [e3, e6] = e1 + be3, [e4, e6] = (b + 1)e4−
(b + 1)e2, [e6, e1] = −e1 − be3, [e6, e2] = −2(b + 1)e2, [e6, e3] = −e1 − be3,
[e6, e4] = −(b + 1) (e2 + e4) , (b 6= −1),
(iii) l6,3 : [e1, e5] = e1 + (c + 1)e3, [e3, e5] = ce1 + 2e3, [e4, e5] = 3 (e4 − e2) , [e5, e1] = −e1−
(c + 1)e3, [e5, e2] = −2(c + 2)e2, [e5, e3] = −ce1 − 2e3, [e5, e4] = (−2c − 1)e2 − 3e4,
[e1, e6] = e1, [e3, e6] = e3, [e4, e6] = 2 (e4 − e2) , [e6, e1] = −e1, [e6, e2] = −2e2, [e6, e3] = −e3,
[e6, e4] = −2e4, (c 6= −2),
(iv) l6,4 : [e1, e5] = e1, [e3, e5] = e3, [e4, e5] = 2 (e4 − e2) , [e5, e1] = −e1, [e5, e2] = −2e2,
[e5, e3] = −e3, [e5, e4] = −2e4, [e1, e6] = be1 + (1 − b)e3, [e3, e6] = e1, [e4, e6] = b (e4 − e2) ,
[e6, e1] = −be1 + (b − 1)e3, [e6, e2] = −2e2, [e6, e3] = −e1, [e6, e4] = (b − 2)e2 − be4, (b 6= 0).
68
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
References
[1] Albeverio, S., Omirov, B. A., Rakhimov, I. S. (2006). Classification of 4-dimensional nilpotent
complex Leibniz algebras. Extracta Math. 21 (3):197 -- 210.
[2] Ayupov, Sh. A., Omirov, B. A. (1998). On Leibniz algebras. Algebra and operator theory. Kluwer
Acad. Publ., Dordrecht, pp. 1 -- 12.
[3] Barnes, D. W. (2012). On Levi's theorem for Leibniz algebras. Bull. Aust. Math. Soc. 86(2):184 -- 185.
[4] Bloch, A. M. (1965). On a generalization of the concept of Lie algebra. Dokl. Akad. Nauk SSSR
18(3):471 -- 473.
[5] Bosko-Dunbar, L., Dunbar, J. D., Hird, J. T., Stagg, K. (2015). Solvable Leibniz algebras with
Heisenberg nilradical. Comm. Algebra. 43(6):2272 -- 2281.
[6] Camacho, L. M., Gómez, J. R., González, A. J., Omirov, B. A. (2009). Naturally graded quasi-
filiform Leibniz algebras. J. Symbolic Comput. 44(5):527 -- 539.
[7] Camacho, L. M., Omirov, B. A., Masutova, K. K. (2016). Solvable Leibniz Algebras with Filiform
Nilradical. Bull. Malays. Math. Sci. Soc. 39(1):283 -- 303.
[8] Casas, J. M., Ladra, M., Omirov, B. A., Karimjanov, I. A. (2013). Classification of solvable Leibniz
algebras with null-filiform nilradical. Linear Multilinear Algebra. 61(6):758 -- 774.
[9] Casas, J. M., Ladra, M., Omirov, B. A., Karimjanov, I. A. (2013). Classification of solvable Leibniz
algebras with naturally graded filiform nilradical. Linear Algebra Appl. 438(7):2973 -- 3000.
[10] Cuvier, C. (1994). Algèbres de Leibnitz: définitions, propriétés. Ann. Sci. École Norm. Sup. (4)
27(1):1 -- 45.
[11] Demir, I., Misra, K. C., Stitzinger, E. (2014). On some structures of Leibniz algebras. Recent
advances in representation theory, quantum groups, algebraic geometry, and related topics. Contemp.
Math. 623:41 -- 54.
[12] Karimjanov, I. A., Khudoyberdiyev, A. K., Omirov, B. A. (2015). Solvable Leibniz algebras with
triangular nilradicals. Linear Algebra Appl. 466:530 -- 546.
[13] Khudoyberdiyev, A. K., Ladra, M., Omirov, B. A. (2014). On solvable Leibniz algebras whose
nilradical is a direct sum of null-filiform algebras. Linear Multilinear Algebra. 62(9):1220 -- 1239.
[14] Ladra, M., Masutova, K. K., Omirov, B. A. (2016). Corrigendum to "Classification of solvable
Leibniz algebras with naturally graded filiform nilradical" [Linear Algebra Appl. 438 (7) (2013)
2973-3000]. Linear Algebra Appl. 507:513 -- 517.
[15] Loday, J.-L. (1992). Cyclic homology. Grundl. Math. Wiss. 301. Springer, Berlin.
[16] Loday, J.-L. (1993). Une version non commutative des algèbres de Lie:
les algèbres de Leibniz.
Enseign. Math. (2) 39(3-4):269 -- 293.
[17] Loday J.-L., Pirashvili T.,
(1993). Universal enveloping algebras of Leibniz algebras and
(co)homology. Math. Ann. 296(1):139 -- 158.
SOLVABLE EXTENSIONS OF QUASI-FILIFORM ALGEBRAS
69
[18] Mubarakzyanov, G. M. (1963). On solvable Lie algebras. Izv. Vysshikh Uchebn. Zavedenii Mat.
1(32):114 -- 123.
[19] Omirov, B. A., Rakhimov, I. S., Turdibaev, R. M. (2013). On description of Leibniz algebras corre-
sponding to sl2. Algebr. Represent. Theory. 16(5):1507 -- 1519.
[20] Shabanskaya, A. (2011). Classification of Six Dimensional Solvable Indecomposable Lie Algebras
with a codimension one nilradical over R. (Doctoral dissertation, the University of Toledo).
[21] Shabanskaya, A., Thompson, G. (2013). Six-dimensional Lie algebras with a five-dimensional nil-
radical. Journal of Lie Theory. 23(2):313 -- 355.
[22] Shabanskaya, A. (2017). Right and left solvable extensions of an associative Leibniz algebra. Comm.
Algebra. 45(6):2633 -- 2661.
[23] Shabanskaya, A. (2017). Solvable extensions of naturally graded quasi-filiform Leibniz algebras of
second type L 1 and L 3. Comm. Algebra. 45(10):4492 -- 4520.
[24] Shabanskaya, A. (2018). Solvable extensions of the naturally graded quasi-filiform Leibniz algebra
of second type L 2. Comm. Algebra. 46(11):5008 -- 5033.
|
1207.0298 | 4 | 1207 | 2013-02-19T17:21:22 | Echoes in correlated neural systems | [
"q-bio.NC",
"cond-mat.dis-nn",
"cond-mat.stat-mech"
] | Correlations are employed in modern physics to explain microscopic and macroscopic phenomena, like the fractional quantum Hall effect and the Mott insulator state in high temperature superconductors and ultracold atoms. Simultaneously probed neurons in the intact brain reveal correlations between their activity, an important measure to study information processing in the brain that also influences macroscopic signals of neural activity, like the electro encephalogram (EEG). Networks of spiking neurons differ from most physical systems: The interaction between elements is directed, time delayed, mediated by short pulses, and each neuron receives events from thousands of neurons. Even the stationary state of the network cannot be described by equilibrium statistical mechanics. Here we develop a quantitative theory of pairwise correlations in finite sized random networks of spiking neurons. We derive explicit analytic expressions for the population averaged cross correlation functions. Our theory explains why the intuitive mean field description fails, how the echo of single action potentials causes an apparent lag of inhibition with respect to excitation, and how the size of the network can be scaled while maintaining its dynamical state. Finally, we derive a new criterion for the emergence of collective oscillations from the spectrum of the time-evolution propagator. | q-bio.NC | q-bio |
Echoes in correlated neural systems
M Helias1, T Tetzlaff1 and M Diesmann1,2,3
1Institute of Neuroscience and Medicine (INM-6) and
Institute for Advanced Simulation (IAS-6)
Julich Research Centre and JARA, Julich, Germany
2RIKEN Brain Science Institute, Wako, Saitama, Japan
3Medical Faculty, RWTH Aachen University, Germany
E-mail: [email protected]
Abstract. Correlations are employed in modern physics to explain microscopic
and macroscopic phenomena,
like the fractional quantum Hall effect and the
Mott insulator state in high temperature superconductors and ultracold atoms.
Simultaneously probed neurons in the intact brain reveal correlations between their
activity, an important measure to study information processing in the brain that
also influences macroscopic signals of neural activity, like the electro encephalogram
(EEG). Networks of spiking neurons differ from most physical systems: The
interaction between elements is directed, time delayed, mediated by short pulses,
and each neuron receives events from thousands of neurons. Even the stationary
state of the network cannot be described by equilibrium statistical mechanics.
Here we develop a quantitative theory of pairwise correlations in finite sized
random networks of spiking neurons. We derive explicit analytic expressions for
the population averaged cross correlation functions. Our theory explains why the
intuitive mean field description fails, how the echo of single action potentials causes
an apparent lag of inhibition with respect to excitation, and how the size of the
network can be scaled while maintaining its dynamical state. Finally, we derive a
new criterion for the emergence of collective oscillations from the spectrum of the
time-evolution propagator.
Keywords:
integrate-and-fire model
spiking neural networks,
correlations, non-equilibrium dynamics,
PACS numbers: 87.18.Sn, 87.19.lc, 87.19.lj, 87.19.lm, 05.10.Gg, 05.70.Ln, 82.40.Bj
AMS classification scheme numbers:
Echoes in correlated neural systems
2
Submitted to: New J. Phys.
Echoes in correlated neural systems
3
1. Introduction
Correlations are an established feature of neural activity [1] and evidence increases
that they can provide insights into the information processing in the brain [2].
The temporal relationship between the activity of pairs of neurons is described by
correlation functions. Their shape has early been related to the direct coupling
between neurons and to the common input shared by pairs of neurons. On the one
hand, correlations may limit the signal-to-noise ratio of population rate signals [3],
on the other hand they have been shown to increase the amount of information
available to unbiased observers [4]. Furthermore, synchronous neural activity has
been proposed to bind elementary representations into more complex objects [5]
and experimental evidence for such a correlation code is provided by task related
modulation of synchrony in primary visual cortex [6] and in motor cortex [7].
The small magnitude [8] of pairwise correlations in the asynchronous irregular
state [9] of cortex has recently been related to the balance between excitation and
inhibition in local networks [10, 11] and inhibitory feedback was identified as a
general mechanism of decorrelation [12]. However, a quantitative theory explaining
the temporal shape of correlation functions in recurrently impulse coupled networks
of excitatory and inhibitory cells remained elusive.
Assuming random connectivity with identical numbers and strengths of
incoming synapses per neuron, as illustrated in Figure 1, suggests by mean field
arguments [13, 14] that the resulting activity of two arbitrarily selected neurons
and hence the power spectra of activities averaged over excitatory or inhibitory
neurons should be the same. Direct simulations, however, exhibit different power
spectra for these sub-populations [15]. A similar argument holds for the covariance
cff between the two neurons: If the covariance c between any pair of inputs is known,
the covariance between their outgoing activity cff is fully determined [15–24]. By self-
consistency, as both neurons belong to the same recurrent network, one concludes
that cff = c. In particular the covariance averaged over excitatory pairs should be
identical to the corresponding average over inhibitory pairs, which is in contrast
to direct simulation (Figure 1b).
In this work, we elucidate why this mean field
argument for covariances fails and derive a self-consistency equation for pairwise
covariances in recurrent random networks which explains the differences in the power
spectra and covariances.
Theories for pairwise covariances have been derived for binary neuron models
Echoes in correlated neural systems
a
)b
.
.
u
a
(
n
o
i
t
l
a
e
r
r
o
c
4
cee
cii
s
s
o
r
c
−10
0
t(ms)
10
Figure 1.
Self-consistency argument fails for covariances in a homogeneous
recurrent random network. (a) Each neuron (black circles) receives input from the
same number of randomly chosen excitatory (e) and inhibitory (i) neurons in the
network, so the input statistics of all neurons is the same. The covariance c within
the network determines the covariance between the inputs to a pair of neurons
and hence the covariance cff of their outputs. Self-consistency seems to require
cff = c = cee = cii. (b) Covariance functions averaged over pairs of excitatory (cee)
and over pairs of inhibitory (cii) integrate-and-fire model neurons are different in
a direct simulation. Other parameters are given in Appendix E.
[11, 25] and for excitatory stochastic point process models [26]. However, the lack of
either inhibition or delayed pulsed interaction limits the explanatory power of these
models. A theory for networks of leaky integrate-and-fire (LIF) model neurons [27]
is required, because this model has been shown to well approximate the properties
of mammalian pyramidal neurons [28] and novel experimental techniques allow to
reliably assess the temporal structure of correlations in cortex [29]. Moreover, the
relative timing of action potentials is the basis for models of synaptic plasticity
[30], underlying learning in biological neural networks. Analytical methods to treat
population fluctuations in spiking networks are well advanced [31] and efficient hybrid
analytical-numerical schemes exist to describe pairwise covariances [32]. Here we
present an analytically solvable theory of pairwise covariances in random networks
of spiking leaky integrate-and-fire model neurons with delayed pulsed interaction in
the asynchronous irregular regime.
2. Results
We consider recurrent random networks of N excitatory and γN inhibitory leaky
integrate-and-fire model neurons receiving pulsed input (spikes) from other neurons
Echoes in correlated neural systems
5
in the network.
Each neuron has K = pN incoming excitatory synapses
independently and randomly drawn from the pool of excitatory neurons, and
γK = γpN inhibitory synapses (homogeneous Erdos-R´enyi random network with
fixed in-degree). An impulse at time t arrives at the target neuron after the synaptic
delay d and elicits a synaptic current Ii that decays with time constant τs and causes
a response in the membrane potential Vi (with time constant τm) proportional to the
synaptic efficacy J (excitatory) or −gJ (inhibitory), respectively. The coupled set
of differential equations governing the subthreshold dynamics of a single neuron i is
[33]
τm
τs
dVi
dt
dIi
dt
= − Vi + Ii(t)
Xj=1,j
= − Ii + τm
N
Jijsj(t − d),
(1)
where the membrane resistance was absorbed into Jij. If Vi reaches the threshold Vθ
at time point ti
k the neuron emits an action potential and the membrane potential is
reset to Vr, where it is clamped for the refractory time τr. The spiking activity
of neuron i is described by this sequence of action potentials, the spike train
si(t) =Pk δ(t − ti
k).
The activity of a given neuron i depends on the history of the other neurons’
activities s(t) = (s1(t), . . . , sN (t))T in the network, so formally we can consider
the spike train of neuron i as a functional of all other spike trains. The time
averaged covariance matrix expresses these interrelations and is defined as ¯c(τ ) =
(cid:10)s(t + τ )sT (t)(cid:11)t − rrT , where r = hsit is the vector of time averaged firing rates.
The diagonal contains the autocovariance functions (diagonal matrix a(τ )) which
are dominated by a δ-peak at zero time lag and for τ 6= 0 exhibit a continuous
shape mostly determined by refractoriness, the inability of the neuron to fire spikes
in short succession due to the voltage reset, as shown in Figure 2d. The off-diagonal
elements contain the cross covariance functions c(τ ) that originate from interactions.
We therefore decompose the covariance matrix into ¯c = a + c. A basic property of
covariance matrices is the symmetry ¯c(τ ) = ¯cT (−τ ), so we only need to consider
τ > 0 and obtain the solution for τ < 0 by symmetry. Each spike at time t′ can
influence the other neurons at time t > t′. Formally we express this influence of the
history up to time t on a particular neuron i in the network as si(t,{s(t′)t′ < t}),
In the asynchronous state of the
which is a functional of all spike times until t.
Echoes in correlated neural systems
6
network [9] and for small synaptic amplitudes Jij a single spike of neuron j causes
only a small perturbation of si. The other inputs to neuron i effectively act as
additional noise. We may therefore perform a linear approximation of j’s direct
influence on neuron i and average over the realizations of the remaining inputs s\sj,
as illustrated in Figure 2a. This linearization and the superposition principle lead to
the convolution equation
hsi(t)sjis\sj = ri +Z t
−∞
= ri + [hij ∗ (sj − rj)](t),
hij(t, t′)(sj(t′) − rj) dt′
(2)
the functional
δsj(t′)Es\sj
where we define as the linear response kernel hij(t, t′) = D δsi(t)
derivative of si(t) with respect to sj(t′), formally defined in Appendix A. The kernel
hij quantifies the effect of a single spike at time t′ of neuron j on the expected
density of spikes of neuron i at time t by a direct synaptic connection from neuron
j to neuron i, earlier introduced as the “synaptic transmission curve” [34]. This
density vanishes for t < t′ due to causality. For the stationary network state studied
here, the kernel further only depends on the time difference τ = t−t′. In a consistent
linear approximation there are no higher order terms, so the effects of two inputs
sj and sk superimpose linearly. In general, the response of a cell is typically supra-
linear in the number of synchronously arriving excitatory spikes [34–36]. If, however,
the network state to be described is sufficiently asynchronous, as is the case here,
a linear approximation is adequate. Using this linear expansion and the definition
of the covariance matrix, the off-diagonal elements of the covariance matrix fulfill a
linear convolution equation
c(τ ) = [h ∗ (a + c)](τ )
for τ > 0.
(3)
The equation is by construction valid for τ > 0 and needs to be solved simultaneously
obeying the symmetry condition c(t) = c(−t)T . Up to linear order in the interaction,
equation (3) is the correct replacement of the intuitive self-consistency argument
sketched in Figure 1.
In order to relate the kernel hij to the leaky integrate-and-fire model, we
employ earlier results based on Fokker-Planck theory [33]. For small synaptic
amplitudes J ≪ Vθ − Vr and weak pairwise covariances the summed synaptic input
τmPN
j=1 Jijsj(t − d) can be approximated as a Gaussian white noise with mean
µi = τmPj Jijrj and variance σ2
ijrj for neurons firing with rates rj and
i = τmPj J 2
Echoes in correlated neural systems
7
i ), taking into account the dependence of µi and σ2
Poisson statistics. For short synaptic time constants τs ≪ τm the stationary firing
rate ri(µi, σ2
i ) (A.1) depends on these two moments [33]. In a homogeneous random
recurrent network the input to each neuron is statistically the same, so the stationary
rate ri = r is identical for all neurons. It is determined by the self-consistent solution
of r(µi, σ2
i on the rate r itself [9].
0 hij(t) dt of the response kernel is equivalent to the DC
susceptibility wij = ∂ri
[37] and has earlier been termed “asynchronous gain” [34].
∂rj
The approximation is second order in the synaptic amplitude wij = αJij + βJ 2
ij. The
first order term originates from the dependence of µi on rj, the second order term
stems from the dependence of σ2
The integral wij = R ∞
i on rj (A.3).
Throughout this work we choose the working point of the neurons in the network
such that the firing of the cells is driven by strong fluctuations and the mean
membrane potential is close to threshold, in order to have irregular firing. This is
achieved by appropriate choices of the external driving Poisson sources, as described
in Appendix E. For the small networks considered here, it is realistic to assume that
about 50 percent of the inputs to a neuron come from outside the local network [38].
Figure 2b shows the deflection of the firing rate from baseline caused by an impulse
in the input averaged over many repetitions. For sufficiently strong fluctuations σi,
the quadratic term in Jij is negligible, as seen from Figure 2c. For smaller membrane
potential fluctuations σi we expect the linear approximation to be less accurate.
The kernel shows exponential relaxation with an effective time constant τe that
depends on the working point (µi, σi) and the parameters of the neuron, which is
obtained by a least squares fit of a single exponential to the simulated response in
Figure 2b for one particular amplitude Jij. We therefore approximate the response
hij(t) as
wijh(t) = Θ(t − d)
wij
τe
e− t−d
τe ,
(4)
where d is the synaptic delay and Θ the Heaviside step function.
In experiments covariance functions are typically averaged over statistically
equivalent pairs of neurons. Such averages are important, because they determine
the behavior of the network on the macroscopic scale of populations of neurons. We
therefore aim at a corresponding effective theory. Assuming identical dynamics (1),
all neurons have, to good approximation, the same autocovariance function a(t) and
response kernel h(t). So each incoming excitatory impulse causes a response w h(t),
an inhibitory impulse −gw h(t). We define the covariance function averaged over all
Echoes in correlated neural systems
8
a
)c
1
−
0
1
(
j
i
w
1
0
l
e
n
r
e
k
−1
l
a
r
g
e
n
t
i
b
)
s
/
1
(
)
t
(
j
i
h
10
0
l
e
n
r
e
k
−10
−10
0
t (ms)
10
d
2
s
/
1
)
t
(
a
.
v
o
c
t
o
u
a
1000
0
−5
0
Jij (mV)
5
−20
0
20
t (ms)
Figure 2. Mapping the integrate-and-fire dynamics to a linear coupling kernel. (a)
The kernel hij determines the transient effect of an incoming impulse at time point
tj (black arrow) on the density si(t) of outgoing action potentials, averaged over
realizations of the stochastic activity of the remaining inputs (indicated as red and
blue triangles). (b) Response kernel (4) (green) compared to direct simulation for
an impulse of amplitude J = 1 mV (black dots) and J = −1 mV (gray dots). Time
constant τe = 4.07 ms determined by a least squares fit to a single exponential. The
background activity causes a mean µi = 15 mV and fluctuations σi = 10 mV. (c)
Linear and quadratic dependence (A.3) of the integral response wij on Jij (dark
gray curve) and linear term alone (light gray line). (d) Autocovariance function of
the spike train with a δ peak at t = 0 and covariance trough due to refractoriness.
pairs of excitatory neurons as cee(τ ) = 1
N 2 Pi,j∈E,i6=j cij(τ ), (setting N(N − 1) ≃ N 2
for N ≫ 1), where E denotes the set of all excitatory neurons. The pairings cei, cie,
Inserting equation (3) into the average cee(τ ),
and cii are defined analogously.
the first term proportional to the autocovariance a(t) only contributes if neuron
j projects to neuron i. For fixed i, there are K such indices j, so the first term
yields Pi,j∈E,i6=j hij ∗ aj = NKw h ∗ a. The second sum Pi,j∈E,i6=j hik ∗ ckj can
be decomposed into a sum over all intermediate excitatory neurons k ∈ E and
over all inhibitory neurons k ∈ I projecting to neuron i. Replacing the individual
Echoes in correlated neural systems
9
covariances by their population average, cee and cie, respectively, and considering the
number of connections and their amplitude we obtain wNK h ∗ (cee − γg cie), with
γ = Ni/Ne and g = wi/we the relative number of inhibitory neurons and the relative
linearized inhibitory synaptic amplitude. Similar relations hold for the remaining
three averages, so we arrive at a two-by-two convolution matrix equation for the
pairwise averaged covariances for τ > 0
c(τ )
(5)
= [h ∗ Mc] (τ ) + Q [h ∗ a] (τ )
1 −γg ! , Q =
cii(τ ) ! .
with M = Kw 1 −γg
and c(τ ) = cee(τ ) cei(τ )
cie(τ )
Kw
1 −g ! ,
N 1 −g
The convolution equation only holds for positive time lags τ . For negative
time lags it is determined by the symmetry c(−τ ) = cT (τ ). The solution
of this equation can be obtained by an extension of the method used in [26]
employing Wiener-Hopf theory [39] to the cross spectrum C(ω) = R ∞
−∞ c(t)e−iωt dt
in frequency domain, as shown in Appendix B (here capital
letters denote the
Fourier transform of the respective lower case letters). With the definition
of the propagator P(ω) = (1 − MH(ω))−1 the cross spectrum takes the form
C(ω) = P(ω)(cid:2)D+(ω)Q + D+(−ω)QT − A(ω)H(ω)2QMT(cid:3) PT (−ω), where we split
the term H(ω) A(ω) = D+(ω) + D−(ω) so that d+(τ ) and d−(τ ) vanish for times
τ < 0 and τ > 0, respectively. For the averaged cross spectrum, the matrix Q is
defined in (5), the non-averaged cross spectrum can be recovered as a special case
setting Q = M = W, because the convolution equations (3) and (5) have the same
structure and symmetries. If all eigenvalues of MH(ω) have an absolute value smaller
than unity, the propagator P(ω) can be expanded into a geometric series in which
the n-th term contains only interactions via n steps in the connectivity graph. This
expansion has been used to obtain the contribution of different motifs to the integral
of covariance functions [40] and their temporal shape [41].
In the following, we neglect the continuous part of the autocovariance function,
setting a(t) = r δ(t), because the δ-peak is typically dominant. With this
replacement we mainly neglect the trough around 0 due to the relative refractoriness.
An estimate of the error can be obtained considering the respective weights of the
Echoes in correlated neural systems
10
delta peak (r) and the through. From the relation R ∞
−∞ a(t) dt = rCV2 [42, 43] the
integral weight of the trough follows as r(CV2 − 1), which is small for irregular spike
trains with a coefficient of variation CV close to unity.
For an arbitrary causal kernel h it follows that D+(ω) = r H(ω), so the cross
spectrum takes the form
C(ω) = r
Kw
N 1 −g
1 −g ! U(iω) + c.c. trans.
1 1 ! U(iω)2
N 1 1
(Kw)2
+ r(1 + g2γ)
(6)
1
with U(z) =
and L
H −1(−iz) − L
= Kw(1 − γg).
The limit ω → 0 corresponds to the time integral of the cross covariance function,
approximating the count covariance for long time bins [2, 8]. With A(0) = r, the
integral correlation coefficient averaged over neuron pairs fulfills the equation
C(0)
A(0)
=
Kw
N
1
1 − L 2
1 − g −2g !
1 − g
1 1 ! ,
(1 − L)2 1 1
1 + g2γ
+
(Kw)2
N
(7)
which has previously been derived from a noise-driven linear rate dynamics [12].
The quantity L plays a key role here:
It determines the feedback magnitude of
in-phase fluctuations of the excitatory and inhibitory population. Stability of the
average firing rate requires this feedback to be sufficiently small [9], i.e. L < 1,
indicated by the pole in equation (7) at L = 1. Typically cortical networks are in
the balanced regime [9, 13, 14], i.e. L < 0. For such inhibition dominated networks,
the denominator in equation (7) is larger than unity, indicating a suppression of
covariances [12]. As shown in Figure 3a, the prediction (7) agrees well with the results
of simulations of leaky integrate-and-fire networks for a broad range of network sizes
N.
Previous works have investigated neural networks in the thermodynamic limit
N → ∞ [11, 13], scaling the synaptic amplitudes J ∝ 1/√N in order to arrive
Echoes in correlated neural systems
a
100
)
0
(
C
10−1
10−2
10−3
Cee(0)
Cei(0)
Cii(0)
b
)
2
−
0
1
(
i
e
c
i
r
e
r
0
N N
5
0
11
N = 104
N = 2 104
N = 5 104
104
log(N)
105
−20
0
t (ms)
20
Figure 3. Shape invariance of covariances with network scale. Synapses scaled
as J ∝ 1/N with network size N to conserve the population feedback L = const.
(a) Integral correlation coefficient averaged over different pairs of neurons and
theory (7) confirming the ∝ 1/N dependence. (b) Rescaled covariance functions
N cei averaged over excitatory-inhibitory pairs of neurons for different network sizes
(color coded) and theory (14) (black).
at analytical results. Such a scaling increases the feedback on the network level
L ∝ √N and therefore changes the collective network state. Equation (7) provides
an alternative criterion to scale the synapses while keeping the dynamics comparable:
The two terms in equation (7) depend differently on the feedback L. In order to
maintain their ratio, we need to keep the population feedback L constant. The
synaptic amplitude J (approximately ∝ w (A.3)) hence needs to scale as J ∝ 1/N.
In addition, the response kernel h of each single neuron must remain unchanged,
requiring the same working point, characterized by the mean µi and fluctuations σi
in the input into each cell. Constant mean directly follows from L = const., but
the variance due to local input from other neurons in the network decreases as 1/N.
To compensate, we supply each neuron with an additional external uncorrelated
balanced noise whose variance appropriately increases with N (as described in detail
in Appendix E). Figure 3b shows that the shape of the covariance functions is
invariant over a large range of network sizes N, in particular the apparent time
lag of inhibition behind excitation observed as the asymmetry in Figure 3b does not
vanish in the limit N → ∞. The magnitude of the covariance decreases as 1/N as
expected from equation (7), because Kw = const.
Global properties of the network dynamics can be inferred by considering the
spectrum of equation (6), those complex frequencies zk at which the expression has
a pole due to the function U(z). These poles are resonant modes of the network,
Echoes in correlated neural systems
12
d = 5.0
d = 3.0
d = 1.0
d = 0.5
−20
0
−10
damping R(τez)
−5
0
5
0
−5
a
)
z
e
τ
(
I
.
q
e
r
f
.
c
s
o
c
e
e
c
2e
r
0.1
0.0
−0.1
500
0
cee
b
0
−2
L
−4
exp. decaying
damped osc.
osc.
1/4
1/2
fcrit.d
5
10
τe/d
d
ae
)
t
(
e
a
2e
r
0
−10
0
10
t(ms)
−1
−40 −20
0
20
40
t(ms)
Figure 4. Phase diagram determined by spectral analysis. Throughout all panels
colors correspond to delays as given in a. (a) Each dot in the inset represents a
pole zk (8) for delay d = 1 ms (two rightmost poles appear as one point). The two
rightmost poles change with delay d. At d = 0.753 ms (gray St. Andrew’s cross) (9)
the poles become a conjugate pair, at d = 6.88 ms (black crosses) (11) both poles
have a zero real part, causing oscillations (Hopf bifurcation). (b) Right: Phase
diagram spanned by τe/d and feedback L. Onset of oscillations below the black
curve (11) (Hopf bifurcation, black crosses in a), damped oscillations below the gray
curve (9) (gray cross in a). Left: Oscillation frequency (11) at the Hopf bifurcation.
(c) Averaged cross covariance between excitatory neurons and theory (14) (black).
Simulated data averaged over 106 neuron pairs for 100 s. (d) Autocovariance of
excitatory neurons (δ-peak not shown) averaged over 2500 neurons for 100 s.
where the real part ℜ(zk) denotes the damping of the mode, and the imaginary part
ℑ(zk) is the oscillation frequency. A pole appears whenever zk is a single root of
U −1(zk) = H −1(−izk) − L = 0. With the Fourier representation H(ω) = e−iωd
of
the response kernel (4), the poles correspond to the spectrum of the delay differential
equation τe
dt (t) = −y(t) + Ly(t − d), (cf. [44]) which describes the evolution of the
population averaged activity. As shown in Appendix C, the location of the poles
can be expressed by the branches k of the Lambert W function, the solution of
1+iωτe
dy
Echoes in correlated neural systems
WkeWk = x [45], as
zk = −
1
τe
+
1
d
Wk(L
d
τe
e
d
τe ) k ∈ N0.
13
(8)
The spectrum only depends on the population feedback L, the delay d and the
effective time constant τe of the neural response kernel. This explains why keeping
L constant while scaling the network in Figure 3 yields shape invariant covariance
functions. A typical spectrum is shown in Figure 4a as an inset, where each dot
marks one of the poles zk (8). The two principal branches of Wk are the modes
with the largest real part ℜ(zk), and hence with the least damping, dominating the
network dynamics. The remaining branches appear as conjugate pairs and their
real parts are more negative, corresponding to stronger damping. Investigating the
location of the principal branches therefore enables us to classify the dynamics in the
network. Their dependence on the delay is shown in Figure 4a as a parametric plot in
d. The point at which the two real principal solutions turn into a complex conjugate
pair marks a transition from purely exponentially decaying dynamics to damped
oscillations. This happens at sufficiently strong negative coupling L or sufficiently
long delay d, precisely when the argument of Wk is smaller than −e−1 [45], leading
to the condition
L < −
τe
d
e− d
τe
−1.
(9)
The gray cross marks this point in Figure 4a, the gray curve shows the corresponding
relation of feedback and delay in the phase diagram Figure 4b.
In the region
below the curve, the dominant mode of fluctuations in the network is thus damped
oscillatory, whereas above the curve fluctuations are relaxing exponentially in time.
For sufficiently long delay d the principal poles may assume positive real values,
leading to ongoing oscillations, a Hopf bifurcation. The condition under which
this happens can be derived from H −1(ωcrit.) = L, as detailed in Appendix C.
Equating the absolute values on both sides leads to the condition ωcrit.τe = √L2 − 1:
oscillations can only be sustained, if the negative population feedback is sufficiently
strong L < −1. The oscillation frequency increases the stronger the negative
feedback. The condition for the phases leads to the critical delay required for the
onset of oscillations (see Appendix C for details)
.
(10)
dcrit.
τe
=
π − arctan(√L2 − 1)
√L2 − 1
Echoes in correlated neural systems
14
This relation is shown as the black curve in the phase diagram Figure 4b. The
oscillatory frequency on the bifurcation line, at the onset of oscillations can be
expressed as
2πfcrit.d = ωcrit.d = π − arctan(√L2 − 1),
(11)
which is shown in the left sub-panel of the phase diagram Figure 4b. Consequently,
the oscillation frequency fcrit. at the onset is between (4dcrit.)−1 and (2dcrit.)−1 ,
depending on the strength of the feedback L, approaching fcrit. = (4dcrit.)−1 at the
onset with increasing negative feedback.
Changing the synaptic delay homogeneously for all synapses in the network
allows us to observe the transition of the network from exponentially damped,
to oscillatory damped, and finally to oscillatory dynamics. For a short delay of
d = 0.5 ms the dynamics is dominated by the single real pole near −1/τe (brown
dot in Figure 4a) and the covariance function is exponentially decaying (Figure 4c).
Increasing the delay to d = 1 ms the principal poles split into a complex conjugate
pair as the delay crosses the gray curve in Figure 4b so that side troughs become
visible in the covariance function in Figure 4c. Further increasing the delay, the
network approaches the point of oscillatory instability, where a Hopf bifurcation
occurs, marked by black crosses in Figure 4a and the black curve in Figure 4b.
The damping of oscillations decreases as the system approaches the bifurcation
(Figure 4c). The structure of the auto covariance function of single spike trains
(Figure 4d) is dominated by the dip due to refractoriness of the neuron after
reset. At pronounced network oscillations, the autocorrelation function shows a
corresponding modulation. The neglect of the oscillating continuous part of the
autocorrelation function in the theory does apparently not have a pronounced effect
on the obtained cross correlation functions, evidenced by the good agreement between
direct simulation and theory for d = 5 ms. For weaker oscillations, e.g. at d = 3 ms,
the coherence time of the oscillations is typically shorter than the width of the dip in
the autocorrelation. The phase coherence of the oscillation is then shorter than the
typical inter-spike-interval and single neuron spike trains are irregular. This state is
known as synchronous irregular activity [9], where the activity of a single neuron is
irregular, but collectively the neurons participate in a global oscillation.
If the network is not in the oscillatory state, all modes are damped in time,
all poles zk of the function U(z) appearing in equation (6) lie in the left
i.e.
complex half plane, ℜ(zk) < 0. Hence, the dynamics is stable, and we can expect
Echoes in correlated neural systems
15
a
c
b
echo e spike
echo i spike
cff
d
0.05
e
e
c
2e
r
0.00
cee
0
d
2d
3d
t(ms)
e
0.05
e
i
c
i
r
e
r
0.00
15
20
−20
0
20
cie
f
0.05
i
i
c
i
r
i
r
0.00
cii
−20
0
t (ms)
20
−20
0
t(ms)
20
Figure 5. Composition of covariance functions. (a) Network echo caused by
a spike sent at time t = 0 sets in after one synaptic delay (d = 3 ms): red
curve in c, inhibitory spike, blue curve in c, excitatory spike. (b) Correlated
inputs from the network to a pair of neurons (black circles) cause covariance cff
between their outputs (green curve in c). (d)-(f ) Covariance functions averaged
over pairs of neurons (black dots, d: excitatory pairs, e: excitatory-inhibitory
inhibitory pairs) and theory (14) (gray underlying curves). Inset shows
pairs, f :
the two components from c that are added up.
Echoes in correlated neural systems
16
to obtain a unique solution for the covariance as an observable of this stable
dynamics. We perform the Fourier transform to time domain using the residue
theorem u(t) = 1
U(z) ezt dz = Pzk∈Et Res(U, zk) ezkt, where the integration
path Et proceeds along the imaginary axis from −i∞ to i∞ and is then closed in
infinity in the left half plane (for t > d) or the right half plane (for 0 < t < d) to
ensure convergence, resulting in (see Appendix D for the detailed calculation)
2πiHEt
u(t) =
∞
Xk=0
1
(1 + zkτe) d + τe
Θ(t − d)ezk(t−d).
(12)
The back transform of V (ω) def= U(ω)2 proceeds along similar lines and results in
v(t) =
∞
Xk=0
1
(1 + zkτe) d + τe
ezkt
(1 − zkτe) − Lezkd .
(13)
The population averaged covariance functions in the time domain then follow from
equation (6) for t > 0 as
c(t) = r
Kw
N 1 −g
1 −g ! u(t)
(1 + g2γ) 1 1
1 1 ! v(t),
+ r
(Kw)2
N
(14)
which is the central result of our work. Figure 5 shows the comparison of the theory
(14) with the covariance functions obtained by direct simulation. The analytical
expression unveils that the covariance functions are composed of two components:
the first line in equation (14) has heterogeneous matrix elements and hence depends
Its origin is illustrated in Figure 5a: If
on the neuron types under consideration.
one of the neurons emits a spike, as indicated, this impulse travels along its axon
and reaches the target neurons after one synaptic delay d. Depending on the type
of the source neuron, the impulse excites (synaptic amplitude J) or inhibits (−gJ)
its targets.
Its effect is therefore visible in the pairwise covariance function as a
positive (blue) or negative (red) deflection, respectively in Figure 5c. This deflection
not only contains the direct synaptic effect, but also infinitely many reverberations
Echoes in correlated neural systems
17
of the network, seen formally in equation (12). This expression is not proportional
to the kernel h(t) directly, but is rather a series including the whole spectrum of the
network. The shape of the spike echo consequently shows onsets of reverberations at
integer multiples of the synaptic delay (Figure 5c), being transmitted over multiple
synaptic connections. The contribution of the second line in equation (14) follows the
intuitive argument illustrated in Figure 5b. The incoming activity from the network
to a pair of neurons is correlated. As the input statistics is the same for each neuron,
this contribution is identical for any pair of neurons (green curve in Figure 5c). The
sum of both components results in the covariance functions shown in Figure 5d-
f. The same analytical solution is shown for different delays in Figure 4c showing
good agreement with direct simulation. For different sizes of simulated networks
in Figure 3b-d the analytical expression (14) explains why the spike echo does not
become negligible in the thermodynamic limit N → ∞: for fixed population feedback
L, both contributions in equation (14) scale as 1/N, so the relative contribution of
the echo stays the same. This also explains the apparent paradox (see Figure 1), that
covariance functions in recurrent networks not only depend on the input statistics,
but in addition the spike feedback causes a reverberating echo. The power spectrum
of population-averages is dominated by pairwise covariances, explaining the different
spectra observed in the excitatory and inhibitory population activity [15]. Scaling
the network such as to keep the marginal statistics of single neurons constant,
J ∝ w ∝ 1/√N [11, 13] changes the spectrum (8), because the feedback increases as
L ∝ √N which can ultimately lead to oscillations as shown in Figure 4c.
3. Discussion
The present work qualitatively explains certain features of the correlation structure
of simultaneously recorded synaptic currents of two cells in vivo. Novel experimental
techniques are able to separate contributions of excitatory and inhibitory inputs [29].
We calculate such covariances in a random network and show that the covariance
between synaptic impulses decomposes into a linear combination of the covariance
of the spiking activity and the autocovariance functions (see caption of Figure 6).
Each synaptic impulse has a certain time course, here modeled as a first-order low-
pass filter with time constant τs = 2 ms (see (1)). The covariances between these
filtered currents are shown in Figure 6. Their temporal structure resembles those
measured in cortex in vivo [29, their Figure 1e,f]: covariances between afferents of
Echoes in correlated neural systems
18
cIeIe
cIiIi
cIeIi
cIiIe
)
2
V
m
(
I
I
c
0.1
0.0
−0.1
−10
0
10
t (ms)
Figure 6. Covariance between synaptic currents of a pair of neurons in a recurrent
random network in analogy to in vivo experiments [29]. Covariance of excitatory
contributions (blue, cIeIe = q ∗ (J 2pKae + J 2K 2cee)), analogously between
inhibitory contributions (red), between excitatory and inhibitory contribution
(green, cIeIi = −q ∗ (gJ 2γK 2cei)), and CIiIe analogously (brown). Currents filter
spiking input by an exponential kernel with time constant τs = 2 ms (1), leading
to the filtering of the covariances by q(t) = τ 2
2τs
e−t/τs.
m
the same type are monophasic and positive, while the covariances between excitatory
and inhibitory afferents are biphasic and mostly negative. The lag reported between
inhibitory and excitatory activity [29, their Figure 2b], which was also observed in
binary random networks [11, 25], is explained by the echo of the spike contributing
to the covariance function. In contrast to previous work, we take the delayed and
pulsed synaptic interaction into account. Without delays and with binary neurons
[11, 25] the echo appears as a time lag of inhibition with respect to excitation.
Measurements of membrane potential fluctuations during quiet wakefulness in
the barrel cortex of mice [46] showed that correlations between inhibitory neurons are
typically narrower than those between two excitatory neurons [46, their Figure 4A, 5B
and Figure 5C,E]. These results qualitatively agree with our theory for covariances
between the spiking activity, because fluctuations of the membrane potential are
uniformly transferred to fluctuations of the instantaneous firing intensity. The direct
measures of spiking activity [46, their Figure 6] confirm the asymmetric correlation
between excitation and inhibition. The low correlation between excitatory neurons
reported in that study may partly be due to the unnormalized, firing rate dependent
measure and the low rates of excitatory neurons.
The qualitative features of the cross correlation functions, namely their different
widths and their asymmetry for excitatory-inhibitory pairs, are generic and agree
Echoes in correlated neural systems
19
with experimental results. They are fully explained by the decomposition into an
echo term and a term corresponding to the feed-forward transmission of correlation.
This decomposition merely relies on the fact that the autocorrelation of a spike train
has a delta peak and that a spike triggers a response in the target cell with positive
or negative sign for excitatory and inhibitory connections, respectively. Hence, we
expect that these features are robust and survive also for more realistic network
models with many heterogeneous subpopulations. For weakly correlated fluctuations,
if the input to each cell is sufficiently noisy, a linear approximation of the neuronal
response provides a viable first order approximation also for non-linear neuron
dynamics, as shown here. We suspect that a deeper reason why such a linearization
is possible is the inherent decorrelation [12] by negative feedback in networks in the
inhibition dominated regime. The decorrelation keeps population fluctuations small
and hence prevents strong excursions that would exceed the validity of the linear
approximation.
Oscillations in the γ range (25 − 100 Hz) are ubiquitous in population measures
of neural activity in humans, and have earlier been explained in networks of leaky
integrate-and-fire model neurons [9] by the Hopf bifurcation induced by delayed
negative feedback. For the regime of high noise we here uncover a simpler analytical
condition for the onset (10) and frequency (11) of fast global oscillations. For lower
noise, deviations of the non-linear leaky integrate-and-fire dynamics from the linear
theory presented here are expected.
A traditional motivation to scale the network size to infinity is to obtain an
analytic solution for an otherwise hard problem. Biologically realistic networks have
a finite size. In the present work we have determined the correlation structure for
such finite sized networks analytically. We present the scaling of the correlation
functions in Figure 3 to relate our work to previous results that applied scaling
arguments to obtain the correlation structure [11]. The latter work investigated
networks of binary neurons without conduction delays and assumed a scaling of
the synaptic amplitudes J ∝ 1/√N. Such a scaling increases the overall feedback
strength L ∝ pNw ∝ √N. This has two consequences: Firstly, as seen from (7), the
relative contributions of the spike echo and the feed forward term change with L and
hence with network size. Therefore the shape of correlation functions depends on the
network size. Secondly, the overall dynamic regime of the network is affected by the
scaling. This can be seen from Figure 4b. For non-zero synaptic conduction delays,
the network eventually becomes oscillatory if the network size exceeds a certain value.
Echoes in correlated neural systems
20
This happens precisely at the point where L crosses the bifurcation line shown in
Figure 4b. We therefore propose an alternative scaling J ∝ 1/N here for which we
show that it preserves the shape of correlation functions and the overall network state.
Only the magnitude of the cross correlation functions decreases ∝ 1/N. However,
a caveat of this scaling is that while it preserves the global network properties, it
affects the working point of each individual neuron, because the fluctuations due
to the local synaptic input decrease ∝ 1/√N. We alleviated this shortcoming by
supplying each neuron with additional, uncorrelated noise.
in contrast,
Our results are based on a simplified network model composed of two
homogeneous (excitatory and inhibitory) subpopulations of leaky integrate-and-
fire neurons. The real cortex,
is highly heterogeneous in several
respects: Its layered structure with layer-specific neuron and connection properties
(e.g.
time constants, spike thresholds, synaptic weights, in-degrees) requires the
distinction of more than two subpopulations. Even within each subpopulation and
for each combination of subpopulations, the neuron and connection parameters are
not constant but broadly distributed. Further, a plethora of cortical neurons, in
particular various types of interneurons, exhibit a much richer dynamical repertoire
(e.g. resonating behavior) than the leaky integrate-and-fire neuron model (regular
spiking integrator).
In principle, the mathematical framework presented in this
article can be extended to networks composed of n (n > 2) heterogeneous
subpopulations of different neuron types. This would require to account for
subpopulation-specific working points (e.g. due to layer-specific firing rates; see [47])
and for the effect of parameter distributions [48, 49] and the single-neuron dynamics
on the effective linearized subpopulation responses. This extended theory would
result in an n-dimensional linear algebraic equation for the subpopulation-averaged
cross spectra, similar to (6) where n = 2. For n > 2, this equation most likely needs
to be solved numerically.
A fundamental assumption of the presented theory is that the network states
show irregular single neuron dynamics. This requirement arises from the analytical
description replacing spike trains by spike densities and a stochastic realization
of spikes. Regular spike trains are outside the scope of such a description.
Moreover, the approximation of the neuronal response to linear order is only a viable
approach in sufficiently asynchronous network states with low correlations. States
with stronger correlations, such as observed in convergent-divergent feed-forward
structures [34, 50], require an explicit treatment of the non-linear response [36].
Echoes in correlated neural systems
21
From a physics viewpoint, neuronal networks unite several interesting properties.
They do not reach thermodynamic equilibrium even in the stationary state, as
detailed balance does not hold for all pairs of states of the system.
In detailed
balance, the rate of transition from one state to another is equal to the rate of the
reverse transition. For a leaky integrate-and-fire neuron the state of the neuron
is uniquely determined by its membrane voltage.
In the stationary state neurons
fire with a constant rate, so there is a continuous flux of the neurons’ voltage
from reset up to threshold.
Imagining a discretization of the voltage axis we see
that a pair of adjacent voltage-intervals between reset and threshold is more often
traversed from lower to higher voltage than in the reverse direction, so obviously
detailed balance does not hold even for a single neuron in the stationary state.
Moreover, the interaction between pairs of neurons is directed, delayed, pulsed, and
depends on the flux of the sending neuron’s state variable at threshold. In contrast,
pairwise interactions frequently studied in physics, like the Coulomb interaction or
exchange interaction, can be expressed by a pair potential and are thus symmetric
(undirected), instantaneous, and depend directly on the state variables (e.g. spatial
coordinates or spins) of the pair of interacting particles. Non-equilibrium systems
are at the heart of ubiquitous transport phenomena, like heat or electric conduction.
Understanding fluctuations in such a system marks the starting point to infer
macroscopic properties by the assertion of the fluctuation-dissipation theorem that
connects microscopic fluctuations to macroscopic transport properties. Despite
the non-equilibrium dynamics and the non-conservative pairwise interaction,
in
this manuscript we develop a simple analytical framework merely based on linear
perturbation theory that explains time dependent covariance functions of the activity
of pairs of integrate-and-fire model neurons in a recurrent random network. Formally
our approach resembles the step from the kinetic Ising model near equilibrium to its
non-equilibrium counterpart, the network of binary neurons [25]. A difference is the
spiking interaction considered in our work, which led us to the describe each neuron
in terms of the flux over threshold (spike train) rather than by its state variables
(membrane voltage and synaptic current). In this respect, we follow the established
mean-field approach for spiking neuronal systems [9, 14]. However, while this mean
field approach proceeds by assuming vanishing correlations to obtain the dynamics of
the ensemble averaged activity, we here derive and solve the self-consistency equation
for the pairwise averaged covariances of the microscopic system.
The typical time scale of covariance functions found here coincides with the time
Echoes in correlated neural systems
22
window of biological synaptic plasticity rules [30], so that non-trivial interactions
of dynamics and structure are expected.
It is our hope that the novel capability
to resolve the temporal structure of covariances in spiking networks presented here
proves useful as a formal framework to further advance the theory of these correlated
non-equilibrium systems and in particular serves as a further stepping stone in the
endeavor to understand how learning on the system level is implemented by the
interplay of neuronal dynamics and synaptic plasticity.
Acknowledgments
We are thankful to Birgit Kriener, Sonja Grun and George Gerstein for discussions
and exploratory simulations in fall 2005 that led to the observation of asymmetric
covariance functions. Partially supported by the Helmholtz Association: HASB and
portfolio theme SMHB, the Next-Generation Supercomputer Project of MEXT, EU
Grant 15879 (FACETS), EU Grant 269921 (BrainScaleS). All network simulations
carried out with NEST (http://www.nest-initiative.org).
Appendix A. Response kernel of the LIF model
The response kernel kernel hij needs to be related to the dynamics of the neuron
model (1). Here we present an approximation of this kernel which is sufficiently
accurate to allow quantitative predictions, but yet simple enough to enable an
analytical solution for the correlation structure.
If the synaptic time constant is
short τs ≪ τm, the synaptic amplitude J can be thought of as the amplitude of
the jump in the membrane potential V caused upon arrival of an incoming impulse.
If correlations between incoming spike trains are sufficiently small, the first and
second moments of the summed impulses τmPj Jijsj(t − d) are µi = τmPj Jijrj
and σ2
ijrj, respectively, if the inputs’ statistics can be approximated by
Poisson processes of rate rj each. For small J and a high total rate, the system of
differential equations (1) is hence approximated by a stochastic differential equation
driven by a unit variance Gaussian white noise ξ
i = τmPj J 2
τm
τs
dVi
dt
dIi
dt
= − Vi + Is,i(t)
= − Ii + µi + σi√τmξ(t).
Echoes in correlated neural systems
The stationary firing rate in this limit is given by [33]
23
(A.1)
r−1
i
f (y)
= τr + τm√π (F (yθ) − F (yr))
(1 + erf(y)) F (y) =Z y
= ey2
Vθ,r − µi
+
α
f (y) dy
α = √2ζ(
1
2
),
2r τs
τm
with yθ,r =
σi
with Riemann’s zeta function ζ. The rate ri is the density of action potentials per
time. The response of the firing density of the neuron i at time point t with respect
to a point-like deflection of the afferent input sj at time point t′ defines the response
kernel as the functional derivative
δsj(t′)(cid:29)s\sj
(cid:28) δsi(t)
= lim
ǫ→0
1
ǫ hsi(t,{s(τ ) + ǫδ(τ − t′)ejτ < t})
− si(t,{s(τ )τ < t})is\sj
def= hij(t − t′) = wij h(t − t′).
Here we used the homogeneity, namely the identical input statistics of each neuron
i, leading to the same temporal shape h(t) independent of i and the stationarity, so
that the kernel only depends on the time difference t − t′. We choose h(t) to have
unit integral and define wij as the integral of the kernel. We determine the temporal
integral of the kernel as
hij(t) dt
(A.2)
wij = Z ∞
−∞
=
∂ri
∂rj
.
The second equality holds because the integral of the impulse response equals the
step response [51]. Further, a step in the density sj corresponds to a step of rj. Up to
linear approximation the effect of the step in the rate rj on the rate ri can be expressed
by the derivative considering the perturbation of the mean µi and the variance σ2
i
∂r−1
upon change of rj. Using equation (A.1) we note that by chain rule ∂ri
.
i
∂rj
∂rj
The latter derivative follows as ∂r−1
terms yields ∂r−1
∂yA
with yA = A−µi
σi
= √πτmf (yA) with yA ∈ {yθ, yr}. The second derivative evaluates
2p τs
. The first derivative in both
τmJij − A−µi
(1 + A−µi
σi
= −τm
= −r2
= ∂r−1
i
∂yθ
= − 1
σi
to ∂yA
∂ri
τmJ 2
ij
2σi
∂yθ
∂rj
+ ∂r−1
i
∂yr
∂yr
∂rj
+ α
Jij
2σi
). So
Jij
σi
i
∂rj
σ2
i
τm
i
i
Echoes in correlated neural systems
together we obtain
= αJij + βJ 2
wij
ij
with α = √π(τmri)2 1
σi
and β = √π(τmri)2(cid:18)f (yθ)
(f (yθ) − f (yr))
Vθ − µi
2σ3
i − f (yr)
i (cid:19) .
Vr − µi
2σ3
24
(A.3)
Appendix B. Cross spectral matrix in frequency domain
The autocovariance A(ω)
in the frequency domain (F (ω) = F [f ](ω) =
R ∞
−∞ f (t)e−iωt dt) has two different terms. The first term is a constant r due to the
spiking with rate r resulting from the delta peak rδ(t) in time domain. The second
term is the continuous function ac(t), for example due to refractoriness of the neuron.
Further follows from a(t) = a(−t) that A(ω) = A(−ω). For τ > 0 the covariance
matrix fulfills the linear convolution equation (5). As this equation only holds for the
positive half of the time axis, we cannot just apply the Fourier transform to obtain
the solution. For negative time lags τ < 0 the covariance matrix is determined
by the symmetry c(τ ) = cT (−τ ). Here we closely follow [26] and employ Wiener-
Hopf theory [39] to derive an equation for the cross spectral matrix in the frequency
domain that has the desired symmetry and solves (5) simultaneously. To this end
we introduce the auxiliary matrix b(τ ) = (h ∗ (Mc)) (τ ) + Q(h ∗ a)(τ ) − c(τ ) for
−∞ < τ < ∞. Obviously, b(τ ) = 0 for τ > 0. Since the defining equation
for b holds on the whole time axis, we may apply the Fourier transform to obtain
B(ω) = H(ω) (MC(ω) + QA(ω)) − C(ω). Solving for C
C(ω) = (1 − MH(ω))−1 (H(ω)A(ω)Q − B(ω))
(B.1)
and using the symmetry C(ω) = CT (−ω) we obtain the equation
(H(ω)A(ω)Q − B(ω))(cid:0)1 − MT H(−ω)(cid:1)
= (1 − MH(ω))(cid:0)H(−ω)A(−ω)QT − BT (−ω)(cid:1) .
We observe that QMT = MQT is symmetric and with A(ω) = A(−ω) the term
proportional to H(ω)2 cancels on both sides, remaining with
(B.2)
H(ω)A(ω)Q + (1 − MH(ω)) BT (−ω)
= H(−ω)A(ω)QT + B(ω)(cid:0)1 − MT H(−ω)(cid:1) .
Echoes in correlated neural systems
25
We next introduce D(ω) = H(ω)A(ω) which we split into D(ω) = D+(ω) + D−(ω),
chosen such that d+(t) (in time domain) vanishes for t < 0 and d−(t) vanishes
for t > 0. Consequently the Fourier transforms of both terms may have poles in
distinct complex half-planes: D+(ω) may only have poles in the upper half plane
ℑ(ω) > 0 and the function vanishes for limω→∞,ℑ(ω)<0 D+(ω) = 0, following from
the definition of the Fourier integral. For D−(ω) the half planes are reversed. The
analytical properties of H(ω) are thus similar to those of D+(ω), those of B(ω) are
similar to D−(ω). We sort the terms in (B.2) such that the left hand side only
contains terms that vanish at infinity in the lower half plane ℑ(ω) < 0, the right
hand side those that vanish in infinity in the upper half plane ℑ(ω) > 0
(B.3)
D+(ω)Q − D−(−ω)QT + (1 − MH(ω)) BT (−ω)
= D+(−ω)QT − D−(ω)Q + B(ω)(cid:0)1 − MT H(−ω)(cid:1) .
The left hand side consequently is analytic for ℑ(ω) < 0 the right hand side is analytic
for ℑ(ω) > 0, so (B.3) defines a function that is analytic on the whole complex plane
and that vanishes at the border for ω → ∞. Hence by Liouville’s theorem it is 0
and we can solve the right hand side of (B.3) for B
B(ω) = (cid:0)D−(ω)Q − D+(−ω)QT(cid:1)(cid:0)1 − MT H(−ω)(cid:1)−1
Inserted into (B.1) this yields with the definition P(ω) = (1 − MH(ω))−1
.
C(ω) = P(ω)(cid:0)H(ω)A(ω)Q −(cid:0)D−(ω)Q − D+(−ω)QT(cid:1) PT (−ω)(cid:1)
= P(ω)(cid:0)(D+(ω) + D−(ω)) Q(1 − MT H(−ω))
−D−(ω)Q + D+(−ω)QT(cid:1) PT (−ω)
= P(ω)(cid:0)D+(ω)Q + D+(−ω)QT − A(ω)H(ω)2QMT(cid:1) PT (−ω).
The latter expression can be brought to the form
C(ω) = D+(ω)P(ω)Q + D+(−ω)QT PT (−ω)
+(cid:0)D+(ω)H(−ω) + D+(−ω)H(ω) − A(ω)H(ω)2(cid:1) × (B.4)
× P(ω)MQT PT (−ω),
which has the advantage that the first two terms have poles in distinct half planes
ℑ(ω) > 0, and ℑ(ω) < 0, respectively. This means these terms only contribute for
Echoes in correlated neural systems
26
positive and negative times, respectively, the last term contributes for positive and
negative times.
Appendix C. Spectrum of the propagator
With the Fourier representation H(ω) = e−iωd
of the delayed exponential kernel (4)
1+iωτe
the averaged cross spectrum (6) contains the two functions U(z) and V (z) = U(z)2
defined on the complex frequency plane z = iω. These functions may exhibit
poles. The function U has a pole zk whenever the denominator has a single root
H −1(−iz) − L = 0 which amounts to the condition (1 + zkτe)ezkd = L. These
complex frequencies can be expressed by the Lambert W function, the solution of
W eW = x [45], by
as
(1 + zkτe)ezkd
= L
(
d
τe
+ zkd)e
d
τe
+zkd = L
d
τe
e
d
τe
zk = −
1
τe
+
1
d
Wk(L
d
τe ),
e
d
τe
(C.1)
leading to (8). The Lambert Wk(x) function has infinitely many branches k [45].
The principal branch has two real solutions, if x > −e−1. The remaining branches
appear in conjugate pairs. For x < −e−1 the principal solutions turn into a complex
conjugate pair. This happens at sufficiently strong negative coupling L or long delays
d
d
τe
e
L
L
or
d
τe < − e−1
τe
d
< −
d
τe
e− d
τe
−1
> W0(−
1
Le
).
The principal poles may assume positive real values, leading to oscillations. The
condition under which this happens can be derived from (C.1). At the point of
transition the pole can be written as z = iωcrit.; it is a solution to (1+iωcrit.τe)eiωcrit.d =
Echoes in correlated neural systems
27
L. In order for this equation to be fulfilled, the absolute value and the phase
must be identical on both sides. The equation for the absolute value requires
1 + (ωcrit.τe)2 = L2. This means there are only oscillatory solutions, if the magnitude
of the feedback exceeds unity L < −1. Since the poles come in conjugate pairs, we
can assume w.l.o.g. that ωcrit. > 0. The condition for the absolute value hence reads
ωcrit.τe = √L2 − 1.
(C.2)
This is the frequency of oscillation at the onset of the Hopf bifurcation. For strong
feedback L ≫ 1 the frequency increases linearly with the magnitude of the feedback.
The condition for the agreement of the phase angles reads ∠(1+iωcrit.τe)+ωcrit.d = 0,
ℜ(1+iωcrit.τe) = − ℑ(eiωcrit.d)
so ℑ(1+iωcrit.τe)
ℜ(eiωcrit.d) = tan ωcrit.d, which leads to tan ωcrit.d = −ωcrit.τe. This
equation has a solution in π
2 ≤ ωcrit.d ≤ π. In the limit of vanishing delay d → 0 the
frequency goes to infinity, as the solution converges to ωcrit.d = π
2 . This corresponds
√L2 − 1) = −√L2 − 1,
4d . Inserting (C.2) leads to tan( d
to the frequency fcrit. = 1
which can be solved for the critical delay
τe
d
τe
=
π − arctan(√L2 − 1)
√L2 − 1
(C.3)
where we took care that the argument of the tangent is in [ π
2 , π]. So with (C.2) and
(C.3) the oscillatory frequency at the transition can be related to the synaptic delay
as
2πfcrit.d = ωd = π − arctan(√L2 − 1).
Appendix D. Back transform by residue theorem
In the non-oscillatory state all poles zk (8) have a negative real part. The function
U(z) = ((1 + zτe)ezd − L)−1 in (6) then has all poles in the left complex half plane,
ℜ(zk) < 0 ∀k. We perform the Fourier back transform
u(t) =
=
−∞
1
2πZ ∞
2πiIEt
1
U(iω) eiωt dω
U(z) ezt dz,
(D.1)
replacing the integration path by a closed contour Et following the imaginary axis
from −i∞ to i∞. In order to ensure convergence of the integral, for t < d we need
Echoes in correlated neural systems
28
ℜ(z) > 0, so we close Et<d in infinity within the right half-plane, where the integrand
vanishes. Since there are no poles in the right half-plane, for t < d the path Et<d
does not enclose any poles, so u(t) = 0. For t ≥ d the path Et≥d must be closed in
the left half-plane to ensure convergence of (D.1), so the residue theorem yields
u(t) = Θ(t − d) Xzk∈Et>d
Res(U, zk) ezkt.
(D.2)
The residue can be calculated by linearizing the denominator of U(zk + z) around zk
(1 + (zk + z)τe)e(zk+z)d − L = (1 + zkτe)ezkdezd − L + zτeezkdezd
= L(ezd − 1) + zτeezkd(1 + zd) + O(z2)
= z(Ld + τeezkd) + O(z2),
which yields
Res(U, zk) = lim
z→0
zU(zk + z)
z
=
1
Ld + τeezkd
= lim
z→0
=
z(Ld + τeezkd)
e−zkd
,
(1 + zkτe)d + τe
where we used (C.1) in the last step. The poles of V (z) = U(z)U(−z) are located
in both half-planes, consequently v(t) is nonzero on the whole time axis. Here we
only calculate v(t) for positive times t > 0, because it follows for negative times by
symmetry v(−t) = v(t). The path has to be closed in the left half-plane, where the
poles zk have the residues
Res(V, zk) = Res(U, zk)U(−zk) =
So applying (D.2) the functions u and v are
1
(1 + zkτe) d + τe
1
(1 − zkτe) − Lezkd .
u(t) =
v(t) =
=
∞
∞
Xk=0
Xk=0
Xk=0
∞
(1 + zkτe) d + τe
Θ(t − d)ezk(t−d)
Res(V, zk)(cid:0)Θ(t)ezkt + Θ(−t)e−zkt(cid:1)
1
1
(1 + zkτe) d + τe
1
(1 − zkτe) − Lezkd ezkt.
(D.3)
Echoes in correlated neural systems
29
The amplitude of the modes decrease with k. For all figures in the manuscript we
truncated the series after k = 30.
Appendix E. Simulation parameters used for figures
All network simulations were performed using NEST [52]. The parameters of the
leaky integrate-and-fire neuron model (1) throughout this work are τm = 20 ms,
τs = 2 ms, τr = 2 ms, Vθ = 15 mV, Vr = 0 mV. All simulations are performed
with precise spike timing and time stepping of 0.1 ms [53]. Figure 1 and Figure 3-
Figure 6 of the main text all consider recurrent random networks of N excitatory and
γN inhibitory leaky integrate-and-fire model neurons receiving input from randomly
drawn neurons in the network and external excitatory and inhibitory Poisson input,
so that the first and second moments are µi = 15 mV and σ2
i = 10 mV, respectively.
Unless stated explicitly, we use N(1 + γ) = 10000 neurons except in Figure 3 where
the number of neurons is given in the legend. Each neuron has K = pN incoming
excitatory synapses with synaptic amplitude J independently and randomly drawn
from the pool of excitatory neurons, and γK = γpN inhibitory synapses with
amplitude −gJ (homogeneous Erdos-R´enyi random network with fixed in-degree),
realizing a connection probability p = 0.1. Cross covariance functions are measured
throughout as the covariance between two disjoint populations of 1000 neurons each
taken from the indicated populations in the network. Correlation functions are
evaluated with a time resolution of 0.1 ms.
In Figure 1 we use a synaptic delay d = 1 ms.
In Figure 3 we keep the feedback of the population rate constant L = Kw(1 −
γg) = const. Increasing the size of the network N the synaptic amplitude J (which
is proportional to w in linear approximation) needs to scale as J = J0N0/N, where
we chose J0 = 0.1 mV and N0 = 10000 here. The variance caused by local input
from the network then decreases with increasing network size ∝ 1/N, while the local
mean is constant because L = const. Each cell receives in addition uncorrelated
external balanced Poisson input, adjusted to keep the mean µi = 15 mV, and
fluctuations σi = 10 mV constant. This is achieved by choosing the rates of
the external excitatory (re,ext., amplitude Jext. = 0.1 mV) and inhibitory (ri,ext.,
amplitude −gJext.) inputs as
re,ext.
= re,0 + rbal
ri,ext. = rbal/g
(E.1)
REFERENCES
with re,0 =
µi − µloc.
Jext.τm
and rbal =
σ2
i − σ2
τmJ 2
loc. − τmre,0J 2
ext.(1 + g2)
ext.
30
,
loc. = τmrKJ 2(1 + γg2) are the mean and
where µloc. = τmrKJ(1 − γg) and σ2
variance due to local input from other neurons of the network firing with rate r.
From L = const. follows that also Kw = const., so that (7) predicts a scaling of
the magnitude of the covariance functions in proportion to 1/N. Other network
parameters are d = 3 ms and g = 5. The firing rate in the network is r = 23.6 Hz.
In Figure 4 and Figure 5 we use N = 104, g = 6, J = 0.1 mV, and the delay d
as described in the captions, the remaining parameters are as in Figure 3.
In Figure 6 we use N = 104, J = 0.1 mV, g = 5, and d = 2 ms and the
remaining parameters as in Figure 3. We obtain the filtered synaptic currents by
filtering the spike trains with an exponential filter of time constant τs = 2 ms. This
results in an effective filter for the cross covariances of q(t) = τ 2
e−t/τs. The different
m
2τs
contributions shown are cIeIe = q∗(J 2pKae +J 2K 2cee), cIiIi = q∗(J 2pKai +J 2K 2cii),
cIeIi = −q ∗ (gJ 2γK 2cei), and cIiIe = −q ∗ (gJ 2γK 2cie), where ∗ denotes the
convolution.
For Figure 2, we simulate two populations of N = 1000 neurons each. Each
neuron receives independent background activity from Poisson processes and in
addition input from a common Poisson process with rate rc = 25 Hz causing in
population 1 a positive synaptic amplitude of J and for population 2 a negative
synaptic amplitude J (J is given on the x-axis). The synaptic amplitude of the
background inputs is Je = 0.1 mV for an excitatory impulse and Ji = −0.5 mV for
an inhibitory impulse. The rates of the excitatory and inhibitory background inputs
are chosen so that the first and second moments µi = τm(Jere + Jiri + J rc) = 15 mV
and σ2
c ) = 10 mV are independent of J. The spikes produced
by each population are triggered to the arrival of an impulse in the common input
and averaged over a duration of 10 s to obtain the impulse response.
i = τm(J 2
i ri + J r2
e re + J 2
References
[1] Gerstein, G. L., & Perkel, D. H. (1969). Simultaneously recorded trains of action
potentials: analysis and functional interpretation. Science 881 (164), 828–830.
[2] Cohen, M. R., & Kohn, A. (2011). Measuring and interpreting neuronal
correlations. Nat. Rev. Neurosci. 14 (7), 811–819. doi:10.1038/nn.2842.
REFERENCES
31
[3] Zohary, E., Shadlen, M. N., & Newsome, W. T. (1994). Correlated neuronal
discharge rate and its implications for psychophysical performance. Nature 370,
140–143.
[4] Abbott, L. F., & Dayan, P. (1999). The effect of correlated variability on the
accuracy of a population code. Neural Comput. 11, 91–101.
[5] von der Malsburg, C. (1986). Am I thinking assemblies? In G. Palm & A. Aertsen
(Eds.), Brain Theory, pp. 161–176. Berlin: Springer-Verlag.
[6] Maldonado, P., Babul, C., Singer, W., Rodriguez, E., Berger, D., & Grun, S.
(2008). Synchronization of neuronal responses in primary visual cortex of monkeys
viewing natural images. J. Neurophysiol. 100 (3), 1523–1532.
[7] Kilavik, B. E., Roux, S., Ponce-Alvarez, A., Confais, J., Gruen, S., & Riehle, A.
(2009). Long-term modifications in motor cortical dynamics induced by intensive
practice. J. Neurosci. 29, 12653–12663.
[8] Ecker, A. S., Berens, P., Keliris, G. A., Bethge, M., & Logothetis, N. K. (2010).
Decorrelated neuronal firing in cortical microcircuits. Science 327 (5965), 584–587.
[9] Brunel, N. (2000). Dynamics of sparsely connected networks of excitatory and
inhibitory spiking neurons. J. Comput. Neurosci. 8 (3), 183–208.
[10] Hertz, J. (2010). Cross-correlations in high-conductance states of a model
cortical network. Neural Comput. 22, 427–447.
[11] Renart, A., De La Rocha, J., Bartho, P., Hollender, L., Parga, N., Reyes, A.,
& Harris, K. D. (2010). The asynchronous state in cortical cicuits. Science 327,
587–590.
[12] Tetzlaff, T., Helias, M., Einevoll, G., & Diesmann, M. (2012). Decorrelation
of neural-network activity by inhibitory feedback. PLoS Comput. Biol. 8 (8),
e1002596.
[13] van Vreeswijk, C., & Sompolinsky, H. (1996). Chaos in neuronal networks with
balanced excitatory and inhibitory activity. Science 274, 1724–1726.
[14] Amit, D. J., & Brunel, N. (1997). Model of global spontaneous activity and local
structured activity during delay periods in the cerebral cortex. Cereb. Cortex 7,
237–252.
[15] Kriener, B., Tetzlaff, T., Aertsen, A., Diesmann, M., & Rotter, S. (2008).
Correlations and population dynamics in cortical networks. Neural Comput. 20,
2185–2226.
REFERENCES
32
[16] Shadlen, M. N., & Newsome, W. T. (1998). The variable discharge of cortical
neurons: Implications for connectivity, computation, and information coding. J.
Neurosci. 18 (10), 3870–3896.
[17] Stroeve, S., & Gielen, S. (2001). Correlation between uncoupled conductance-
based integrate-and-fire neurons due to common and synchronous presynaptic
firing. Neural Comput. 13 (9), 2005–2029.
[18] Tetzlaff, T., Buschermohle, M., Geisel, T., & Diesmann, M. (2003). The spread
of rate and correlation in stationary cortical networks. Neurocomputing 52–54,
949–954.
[19] Moreno-Bote, R., & Parga, N. (2006). Auto- and crosscorrelograms for the
spike response of leaky integrate-and-fire neurons with slow synapses. Phys. Rev.
Lett. 96, 028101.
[20] De la Rocha, J., Doiron, B., Shea-Brown, E., Kresimir, J., & Reyes, A. (2007).
Correlation between neural spike trains increases with firing rate. Nature 448 (16),
802–807.
[21] Shea-Brown, E., Josic, K., de la Rocha, J., & Doiron, B. (2008). Correlation
basic properties and
and synchrony transfer in integrate-and-fire neurons:
consequences for coding. Phys. Rev. Lett. 100, 108102.
[22] Burak, Y., Lewallen, S., & Sompolinsky, H. (2009).
Stimulus-dependent
correlations in threshold-crossing spiking neurons. Neural Comput. 21, 2269–2308.
[23] Rosenbaum, R., & Josic, K. (2011). Mechanisms that modulate the transfer of
spiking correlations. Neural Comput. 23 (5), 1261–1305.
[24] Tchumatchenko, T., Malyshev, A., Geisel, T., Volgushev, M., & Wolf, F. (2010).
Correlations and synchrony in threshold neuron models. Phys. Rev. Lett. 104,
058102.
[25] Ginzburg, I., & Sompolinsky, H. (1994). Theory of correlations in stochastic
neural networks. Phys. Rev. E 50 (4), 3171–3191.
[26] Hawkes, A. (1971). Point spectra of some mutually exciting point process. J.
R. Statist. Soc. Ser. B 33 (3), 438–443.
[27] Stein, R. B. (1965). A theoretical analysis of neuronal variability. Biophys. J. 5,
173–194.
[28] Rauch, A., La Camera, G., Luscher, H., Senn, W., & Fusi, S. (2003). Neocortical
REFERENCES
33
pyramidal cells respond as integrate-and-fire neurons to in vivo like input currents.
J. Neurophysiol. 90, 1598–1612.
[29] Okun, M., & Lampl, I. (2008).
Instantaneous correlation of excitation and
inhibition during sensory-evoked activities. Nat. Neurosci. 11 (5), 535–537.
[30] Morrison, A., Diesmann, M., & Gerstner, W. (2008). Phenomenological models
of synaptic plasticity based on spike-timing. Biol. Cybern. 98, 459–478.
[31] Cai, D., Tao, L., Shakarayev, M. S., Rangan, A. V., McLaughlin, D. W., &
Kovacic, G. (2012). The role of fluctuations in coarse-grained descriptions of
neuronal networks. Comm. Math. 10 (1), 307–354.
[32] Cai, D., Tao, L., & McLaughlin, D. W. (2004). An embedded network approach
for scale-up of fluctuation-driven systems with preservation of spike information.
Proc. Natl. Acad. Sci. USA 101 (39), 14288–14293.
[33] Fourcaud, N., & Brunel, N. (2002). Dynamics of the firing probability of noisy
integrate-and-fire neurons. Neural Comput. 14, 2057–2110.
[34] Abeles, M. (1991). Corticonics: Neural Circuits of the Cerebral Cortex (1st
ed.). Cambridge: Cambridge University Press.
[35] Abeles, M. (1982). Role of cortical neuron: integrator or coincidence detector?
Israel J. Med. Sci. 18, 83–92.
[36] Goedeke, S., & Diesmann, M. (2008). The mechanism of synchronization in
feed-forward neuronal networks. New J. Phys. 10, 015007.
[37] Helias, M., Deger, M., Rotter, S., & Diesmann, M. (2010).
Instantaneous
non-linear processing by pulse-coupled threshold units. PLoS Comput Biol 6 (9),
e1000929.
[38] Stepanyants, A., Martinez, L. M., Ferecsk´o, A. S., & Kisv´arday, Z. F. (2009).
The fractions of short- and long-range connections in the visual cortex. Proc. Nat.
Acad. Sci. USA 106 (9), 3555–3560.
[39] Hazewinkel, M. (Ed.) (2002). Encyclopaedia of Mathematics. Springer.
[40] Pernice, V., Staude, B., Cardanobile, S., & Rotter, S. (2011). How structure
determines correlations in neuronal networks. PLoS Comput. Biol. 7 (5), e1002059.
[41] Trousdale, J., Hu, Y., Shea-Brown, E., & Josic, K. (2012).
Impact of
network structure and cellular response on spike time correlations. PLoS Comput.
Biol. 8 (3), e1002408.
REFERENCES
34
[42] Rieke, F., Warland, D., de Ruyter van Steveninck, R., & Bialek, W. (1997).
Spikes: Exploring the Neural Code. Cambridge, MA: The MIT Press.
[43] Moreno-Bote, R., Renart, A., & Parga, N. (2008). Theory of input spike auto-
and cross-correlations and their effect on the response of spiking neurons. Neural
Comput. 20, 1651–1705.
[44] Guillouzic, S., L’Heureux, I., & Longtin, A. (1999). Small delay approximation
of stochastic delay differential equations. Phys. Rev. E 59, 3970–3982.
[45] Corless, R. M., Gonnet, G. H., Hare, D. E. G., Jeffrey, D. J., & Knuth, D. E.
(1996). On the lambert w function. Advances in Computational Mathematics 5,
329–359.
[46] Gentet, L., Avermann, M., Matyas, F., Staiger, J. F., & Petersen, C. C. (2010).
Membrane potential dynamics of GABAergic neurons in the barrel cortex of
behaving mice. Neuron 65, 422–435.
[47] Potjans, T. C., & Diesmann, M. (2012). The cell-type specific cortical
microcircuit: Relating structure and activity in a full-scale spiking network model.
Cerebral Cortex , doi: 10.1093/cercor/bhs358.
[48] Tetzlaff, T., Einevoll, G. T., & Diesmann, M. (2009). Synchronization and
rate dynamics in embedded synfire chains: effect of network heterogeneity and
feedback. BMC Neuroscience 10 (Suppl I), P258.
[49] Roxin, A. (2011). The role of degree distribution in shaping the dynamics in
networks of sparsely connected spiking neurons. Front. Comput. Neurosci. 5 (8).
[50] Diesmann, M., Gewaltig, M.-O., & Aertsen, A. (1999). Stable propagation of
synchronous spiking in cortical neural networks. Nature 402 (6761), 529–533.
[51] Oppenheim, A., & Wilsky, A. (1996). Systems and signals. Prentice Hall.
[52] Gewaltig, M.-O., & Diesmann, M. (2007). NEST (NEural Simulation Tool).
Scholarpedia 2 (4), 1430.
[53] Hanuschkin, A., Kunkel, S., Helias, M., Morrison, A., & Diesmann, M. (2010).
A general and efficient method for incorporating precise spike times in globally
time-driven simulations. Front. Neuroinform. 4, 113.
|
1806.07365 | 2 | 1806 | 2018-07-03T14:45:06 | State equation from the spectral structure of human brain activity | [
"q-bio.NC",
"cond-mat.dis-nn"
] | Neural electromagnetic (EM) signals recorded non-invasively from individual human subjects vary in complexity and magnitude. Nonetheless, variation in neural activity has been difficult to quantify and interpret, due to complex, broad-band features in the frequency domain. Studying signals recorded with magnetoencephalography (MEG) from healthy young adult subjects while in resting and active states, a systematic framework inspired by thermodynamics is applied to neural EM signals. Despite considerable inter-subject variation in terms of spectral entropy and energy across time epochs, data support the existence of a robust and linear relationship defining an effective state equation, with higher energy and lower entropy in the resting state compared to active, consistently across subjects. Mechanisms underlying the emergence of relationships between empirically measured effective state functions are further investigated using a model network of coupled oscillators, suggesting an interplay between noise and coupling strength can account for coherent variation of empirically observed quantities. Taken together, the results show macroscopic neural observables follow a robust, non-trivial conservation rule for energy modulation and information generation. | q-bio.NC | q-bio |
State equation from the spectral structure of human brain activity
Trang-Anh Nghiem,1, 2, ∗ Jean-Marc Lina,3, 4, ∗ Matteo di Volo,1, 2 Cristiano
Capone,1, 2 Alan C. Evans,5, 6 Alain Destexhe,1, 2, † and Jennifer S. Goldman1, 2, 3, 5, †
1European Institute for Theoretical Neuroscience,
74 Rue du Faubourg Saint-Antoine, Paris, 75012 France
2Unit of Neuroscience, Information, and Complexity, Centre National de la Recherche Scientifique,
5Ludmer Centre for Neuroinformatics and Mental Health, Montreal Neurological Institute and Hospital,
1 Avenue de la Terrasse, Gif-sur-Yvette 91190 France
3Centre de recherches mathématiques, Université de Montréal, 2920,
Chemin de la tour, bur. 5357 Montréal, Québec, H3T 1J4, Canada
4Département de génie électrique, École de technologie supérieure,
1100 rue Notre-Dame Ouest, Montréal, Québec, H3C 1K3 Canada
3801 Rue University, Montréal, Quebec, H3A 2B4 Canada
6Department of Biomedical Engineering, McGill University,
3775 Rue University, 316, Montréal, Quebec, H3A 2B4 Canada
Neural electromagnetic (EM) signals recorded
non-invasively from individual human subjects
vary in complexity and magnitude. Nonetheless,
variation in neural activity has been difficult to
quantify and interpret, due to complex, broad-
band features in the frequency domain. Study-
ing signals recorded with magnetoencephalogra-
phy (MEG) from healthy young adult subjects
while in resting and active states, a systematic
framework inspired by thermodynamics is ap-
plied to neural EM signals. Despite consider-
able inter-subject variation in terms of spectral
entropy and energy across time epochs, data sup-
port the existence of a robust and linear rela-
tionship defining an effective state equation, with
higher energy and lower entropy in the resting
state compared to active, consistently across sub-
jects. Mechanisms underlying the emergence of
relationships between empirically measured effec-
tive state functions are further investigated us-
ing a model network of coupled oscillators, sug-
gesting an interplay between noise and coupling
strength can account for coherent variation of em-
pirically observed quantities. Taken together, the
results show macroscopic neural observables fol-
low a robust, non-trivial conservation rule for en-
ergy modulation and information generation.
Brain activity varies between states, e.g.
in uncon-
sciousness vs consciousness, but a formal macroscopic
description remains poorly understood. Spectral analy-
sis of neural electromagnetic (EM) signals indicates that
fluctuations occur simultaneously at all measurable fre-
quencies, along a 1/fβ distribution, above which resonant
modes occur at different frequencies [1–3]. While neural
power spectra display broadband features, they are con-
ventionally investigated by ad hoc partition of the fre-
quency domain. Results of band-limited analyses have
demonstrated that the power of bands shifts between
brain states. The shift in power within a frequency band
Lower spectral energy and higher spectral
FIG. 1.
entropy in active versus resting brain state, for one
human subject. (a) Magentoencephalography (MEG) sig-
nals (X) from human subjects in resting and active states are
used to compute (b) power spectra ( X) for each subject (φ),
state (τ), sensor (µ), and epoch (). (c) Spectral energy (Eq.
1) and entropy (Eq. 2) are derived. Panel c shows the energy
and entropy across epochs for one subject in resting and ac-
tive states. Between brain states, a significant shift in energy
and entropy (Mann-Whitney U test, p-values reported) can
be seen in histograms (c) as well as a change in slope and in-
tercept of the negative linear energy-entropy relation (best fit
line shown, Pearson's r reported) as shown in the scatter plot.
The inset labeled δS , δU implies a non-tautological relation
between effective energy and entropy as measured empirically
(see text).
is thought at least in part to reflect changes in the level of
abc010203040rest38.5[fT2/s2]activesignal[fT]timefrequencypowerentropyenergyx10-23******p << 0.001p << 0.001r = -0.89 p << 0.001r = -0.92p << 0.001synchronous neuronal activity at the time scale of that
band. Indeed, vigilant behavioral states are commonly
called 'desynchronized' whereas unconscious states 'syn-
chronized' [1–3].
Macroscopic, EM brain signals measured outside the
human head reflect the coordinated activity of tens of
thousands of neurons [4]. Analogies to statistical physics
have helped to understand how microscopic properties
of neurons and their interactions lead to neural popula-
tion behavior at the mesoscale [5–12] across brain states
[13, 14]. Since the use of methodology from statistical
physics has uncovered descriptions of individual neurons'
activity and resulting population behaviour at meso-
scopic scales, macroscopically observed changes in signal
complexity and magnitude could be addressed in anal-
ogy to thermodynamics. In fact, for large-scale, whole-
brain recordings, spectral entropy measures reportedly
vary with levels of consciousness [15–18]. In the present
paper, brain states are described as a function of global
state variables, derived from the spectral structure of dif-
ferent human subjects' brain activity.
Neural signals from each human subject in each brain
state may be dissimilar, but the organization of spectra
could follow general principles characterized by a state
equation. To test this possibility, a statistical analysis of
broadband signals is performed using magnetic fields ob-
tained by magnetoencephalography (MEG) from healthy,
adult, human subjects in two brain states - resting state
with eyes open and fixated (rest) and while performing
an N-back visual working memory task (active) [19, 20].
Specifically, the magnetic field X, measured for each
subject φ = {1 . . . 77}, brain state τ = {rest, active},
sensor µ = {1 . . . 248}, and time epoch = {1 . . . M}
where M is the total number of epochs (Fig.1) is ana-
lyzed.
In figure 1a, the time courses of fields for such
Xφ,τ,µ,(t) in rest (τ = r, Fig.1a, top) and active (τ = a,
Fig.1a, bottom) states is shown. The corresponding
power spectra Xφ,τ,µ,(f ) are computed for each epoch
(Fig.1b).
Observables between resting and active states may
present different statistical properties. In order to test
this hypothesis, a spectral energy measure Uφ,τ, is in-
troduced for each subject in each brain state and each
time epoch, summing over sensors :
Xφ,τ,µ,(f )
(1)
Uφ,τ, ≡(cid:88)
µ,f
Similarly, a spectral entropy measure Sφ,τ, is defined,
for each subject in each brain state and epoch, summing
over sensors, as
P (f ) ln P (f ),
(2)
Sφ,τ, ≡ −(cid:88)
µ,f
(cid:80)
Xφ,τ,µ,(f )
Xφ,τ,µ,(f )
f
where, P (f )
:=
describes the relative
2
FIG. 2. Variation of the spectral energy-entropy re-
lation between brain states is robust across subjects.
Mean spectral entropy (a), mean spectral energy (b), slope
(c), and intercept (d) (Eq. 3) are shown in active state against
rest (one point per subject, identity line shown). In the rest-
ing state, spectral energy is consistently larger, and entropy
smaller than in the active state (Wilcoxon signed-rank test).
The energy-entropy relation has a steeper negative slope (c)
and a higher intercept (d) in resting than active state.
heights of power spectral frequency bins, from each sub-
ject φ in each brain state τ.
A negative relation between energy and entropy across
time epochs is found (Fig.1c): when energy decreases,
entropy increases, suggesting a linear relationship of the
following form:
Uφ,τ, = Tφ,τ Sφ,τ, + Wφ,τ
(3)
where Tφ,τ and Wφ,τ are respectively the slope and in-
tercept of the entropy-energy relation across time epochs,
for each subject in each brain state. Tφ,τ and Wφ,τ dif-
fer between brain states; in the resting state, energy is
higher, entropy is lower, and their relationship follows a
steeper (more negative slope) line with a higher-intercept
than in the active state (Fig. 1c).
Such a clear linear relationship between the state vari-
ables Sφ,τ and Uφ,τ raises naturally the question of
whether it could be a direct consequence of how the quan-
tities are defined. This possibility is tested through ma-
nipulation of the signals where the entropy can be mod-
ified (δS) by adding zero-mean noise to the power spec-
trum, with no consequent effect on energy as reported
in the inset of Fig.1c. Conversely, multiplying the full
spectrum by a constant results in a change of the energy
(δU) without altering the entropy. The results support
the hypothesis that the observed linear relationship be-
tween energy and entropy could reflect fundamental rules
that define the way neural activity is organized.
Despite important inter-subject variability in the
SrSaUaUrTaTrWrWaentropyenergyslopeinterceptabcdx 10x 10x 10x 10x 10x 10-23-23-23-23-22-22p << 0.001p << 0.001p << 0.001p << 0.001means over epochs of Uφ,τ, and Sφ,τ,, as well as Tφ,τ ,
and Wφ,τ , it is verified that the active-rest differences are
strongly consistent across subjects, evidence for robust-
ness of the introduced framework (Fig. 2).
Toward a better understanding of mechanisms govern-
ing fluctuating oscillations in neural assemblies between
brain states, a classical model of coupled oscillators (Ku-
ramoto model) is next studied [21, 22]. N oscillators of
phase θi, i ∈ 1, ..., N are arranged over a fully connected
network, each one evolving according to the following
equation:
θi = ωi + K
sin(θj − θi) + σηi,
(4)
(cid:88)
j(cid:54)=i
where K is the coupling strength. The bare frequencies
ωi are extracted from a bimodal distribution (sum of two
Gaussians). A zero-mean white i.i.d. noise term ηi of
standard deviation σ is received by each oscillator.
From simulated network activity, a collective time-
varying variable R, to compare with Xφ,τ,µ,, is defined:
R = r
where
1 − cos(Θ)
2
(cid:88)
j
eiθj .
reiΘ =
,
(5)
(6)
The parameter r(t) captures the synchronization between
the oscillators - indeed, when the phases are equally dis-
tributed over [0, 2π], r(t) = 0. Conversly, when the sys-
tem is completely synchronous, all oscillators have the
same phase, so that r(t) = 1. The variable Θ(t) repre-
sents the time evolution of the system and describes the
frequency of synchronous events.
To investigate further the behavior of the effective
energy-entropy relation found in human data, the dy-
namics of the Kuramoto model is investigated by chang-
ing the coupling parameter K and the amplitude of noise
σ, which are known to strongly modulate synchrony and
complexity in coupled oscillator models [23]. Varying K,
a transition from asynchronous active-like to synchronous
rest-like dynamical regime (Fig.3a-c) occurs. To mimic
the observed variation between time epochs, the ampli-
tude of noise σ can be understood as varying in time
(Fig.3d-f).
Increasing noise amplitude σ results in less
synchronous activity, consistent with previous reports, as
well as decreased R [23], reduced energy, and increased
entropy (Fig. 3). Altogether, the results indicate that a
change in brain state can be modeled by varying coupling
strength, while variation across time can be simulated by
fluctuations in noise amplitude.
If changes in coupling contribute to empirically ob-
served shifts in neural state variables as predicted by the
model, one may expect to find alterations in the phase
synchrony in the data. In order to test this prediction,
3
FIG. 3. Phase coupling and noise modulate spectral
energy and entropy. A parameter exploration of the Ku-
ramoto model is performed in order to explain variation of
state variables in experiments. Change in coupling strength
K between oscillators causes a shift in spectral state variables.
(a) Phase of each oscillator throughout time. (b) R (Eq. 5).
(c) Power spectra of R. (d-e) To reproduce variation across
epochs, noise amplitude is modulated - the higher the noise,
the larger the spectral entropy and the lower the spectral en-
ergy. (f) Energy and entropy as defined therefore vary along
a negative linear relation, whose slope becomes steeper and
intercept increases with coupling strength.
the Phase-Lag Index (PLI), a measure of synchroniza-
tion across time series is applied to human data [24]. By
definition, the PLI is larger in more phase-locked states.
Indeed, in resting compared to active state data, a sig-
nificant trend toward enhanced phase synchrony is found
(Fig.4).
A potential interpretation of the robust relation be-
tween these effective state variables could reflect the fact
that energy is used to generate information in brain ac-
tivity. It is important to note that the energy quantity
proposed here is an indirect measure of neural activity
and may be non-trivially related to actual internal en-
ergy. We also find evidence for a change in coupling,
due to the consistent change in intercept and slope of the
energy-entropy relation. Coupling regulates the sensitiv-
0.00.51.01.52.02.53.05.05.56.06.57.00.00.10.20.30.40.50.60.70400.00.51.01.52.02.53.05.05.56.06.57.00.00.10.20.30.40.50.6123456Time (s)Time (s)Frequency (rad/s)Frequency (rad/s)PowerPowerPopulation activity ROscillatorsTime (s)Phase5.07.0Time (s)5.07.00.00.20.40.000.100.200.30K = 2K = 8CouplingstrengthCouplingstrengthOscillators8004080white noise amplitude1.21.41.61.82.02.22.42.620406080100120K = 2K = 2.5K = 3K = 3.5K = 4K = 4.5K = 5K = 5.5K = 6K = 6.5K = 7K = 7.5K = 8entropyenergyenergyentropy0.250.500.751.00204060801001200.250.500.751.001.21.41.61.82.02.22.42.62.8abcdef4
with global electromagnetic measurements, it would pave
the way to more formal, scale-integrated descriptions of
brain activity in healthy and pathological states.
ACKNOWLEDGEMENTS
Data were provided by the Human Connectome
Project, WU-Minn Consortium (Principal Investigators:
David Van Essen and Kamil Ugurbil; 1U54MH091657)
funded by the 16 NIH Institutes and Centers that support
the NIH Blueprint for Neuroscience Research; and by the
McDonnell Center for Systems Neuroscience at Wash-
ington University. This project was supported by the
European Union (Human Brain Project H2020-720270
and H2020-785907). JSG was supported by the Lud-
mer Centre for Neuroinformatics and Mental Health, the
Molson Neuroengineering Award, The NSERC-CREATE
Training Program in Neuroengineering, and the Ann
and Richard Sievers Foundation for Innovation in Neu-
roscience. JML was supported by an NSERC Discovery
grant. The authors thank Gleb Bezgin, Bruno Cessac,
Alexis Garcia, Peter Grutter, George Kostopoulos, Naj
Mahani, Danko Nikolic, Bartosz Teleńczuk, and Núria
Tort-Colet for useful discussion.
AUTHOR CONTRIBUTIONS
T.-A. N. wrote data analysis codes, investigated the
Kuramoto model, contributed to interpreting the results,
and writing the manuscript. J.-M. L. contributed to writ-
ing the analysis codes and the manuscript. M. d. V.
contributed to interpreting the results, investigating the
Kuramoto model, and writing the manuscript. C. C.
investigated the Kuramoto model, contributed to inter-
preting the results and editing the manuscript. A. C. E.
provided resources and supervision of the work. A. D.
designed research, provided supervision, and edited the
manuscript. J. S. G. conceived of the question, designed
research, analyzed data, interpreted results, and wrote
the paper.
COMPETING INTERESTS
The authors declare no competing interests.
REFERENCES
∗ These authors contributed equally.
FIG. 4. Phase Lag Index (PLI) is larger in resting
than active state, consistent with stronger coupling
during rest. The PLI is computed across frequency bins
in each epoch in rest and task for each subject. (a-b) The
mean PLI across epochs for each subject and state is reported,
showing the PLI is significantly larger during the resting than
active state (paired Student's T-test). (c) Summary diagram
of the results. The data support a model in which variation
of effective energy and entropy between brain states relies on
noise fluctuations and a shift in coupling strength.
ity of networks to noise, which can account for the slope
of the aforementioned relation. Indeed, with strong cou-
pling, perturbations propagate more efficiently through-
out the network, causing changes in the collective ac-
tivity and affecting the resulting energy. Conversely, in
a weakly-coupled network, perturbations do not easily
spread across the system. In other words, the 'gas-like'
regime found in active brains may be useful for the poten-
tial to generate information versus the 'liquid-like' state
in which strong coupling promotes a low entropy state
with less informational capacity. This provides a new in-
terpretation of previously reported changes in functional
connectivity across brain states [25–29].
Lastly, in light of statistical physics inspired models
of neuronal activity [5–14], our results suggest a strat-
egy to bridge the gap from macroscopic system signals
studied here to microscopic cellular level activity.
In-
deed, biophysical models of spiking neural networks could
be used to investigate how the mechanisms uncovered
with the Kuramoto model translate at the microscopic
scale. For instance, biophysical processes that control
the variability of noisy inputs or the network's tendency
to synchronize could be studied. This may also provide
insight on how the spectral state variables defined here
relate to entropy and energy of micro-states in the sense
of statistical physics and spin glass models. While such
an approach demands scale-integrated data from a suf-
ficiently large population of single neurons simultaneous
0.0390.0400.041Phase Lag Index, rest0.0380.0390.0400.041Phase Lag Index, active0.0380.0390.0400.0410.00.10.20.3restactivePhase Lag Indexabcrestactivep << 0.0015
1 (2008).
[27] M. E. Raichle, A. M. MacLeod, A. Z. Snyder, W. J. Pow-
ers, D. A. Gusnard, and G. L. Shulman, Proceedings of
the National Academy of Sciences 98, 676 (2001).
[28] M. Massimini, F. Ferrarelli, R. Huber, S. K. Esser,
H. Singh, and G. Tononi, Science 309, 2228 (2005).
[29] R. G. Bettinardi, N. Tort-Colet, M. Ruiz-Mejias, M. V.
and G. Deco, Neuroimage 114, 185
Sanchez-Vives,
(2015).
† These authors contributed equally.
[1] P. L. Nunez and R. Srinivasan, Electric fields of the brain:
the neurophysics of EEG (Oxford University Press, USA,
2006).
[2] E. Niedermeyer and F. L. da Silva, Electroencephalogra-
phy: basic principles, clinical applications, and related
fields (Lippincott Williams & Wilkins, 2005).
[3] G. Buzsaki, Rhythms of the Brain (Oxford University
Press, 2006).
[4] S. Baillet, Nature Neuroscience 20, 327 (2017).
[5] E. Schneidman, M. J. Berry, R. Segev, and W. Bialek,
Nature 440, 1007 (2006).
[6] S. Cocco, S. Leibler, and R. Monasson, Proceedings of
the National Academy of Sciences 106, 14058 (2009).
[7] O. Marre, S. El Boustani, Y. Frégnac, and A. Destexhe,
Physical review letters 102, 138101 (2009).
[8] C. Capone, C. Filosa, G. Gigante, F. Ricci-Tersenghi,
and P. Del Giudice, PloS one 10, e0118412 (2015).
[9] U. Ferrari, Physical Review E 94, 023301 (2016).
[10] M. Okun, N. A. Steinmetz, L. Cossell, M. F. Iacaruso,
H. Ko, P. Barthó, T. Moore, S. B. Hofer, T. D. Mrsic-
Flogel, M. Carandini, et al., Nature 521, 511 (2015).
[11] C. Gardella, O. Marre, and T. Mora, eneuro 3, ENEURO
(2016).
[12] C. Capone, G. Gigante,
and P. Del Giudice, arXiv
preprint arXiv:1804.00153 (2018).
[13] G. Tavoni, U. Ferrari, F. P. Battaglia, S. Cocco, and
R. Monasson, Network Neuroscience 1, 275 (2017).
[14] T.-A. Nghiem, B. Telenczuk, O. Marre, A. Destexhe, and
U. Ferrari, arXiv preprint arXiv:1801.01853 (2018).
[15] J. D. Sitt, J.-R. King,
I. El Karoui, B. Rohaut,
F. Faugeras, A. Gramfort, L. Cohen, M. Sigman, S. De-
haene, and L. Naccache, Brain 137, 2258 (2014).
[16] S. Sarasso, M. Boly, M. Napolitani, O. Gosseries,
V. Charland-Verville, S. Casarotto, M. Rosanova, A. G.
Casali, J.-F. Brichant, P. Boveroux, et al., Current Biol-
ogy 25, 3099 (2015).
[17] I. D. McKay, L. J. Voss, J. W. Sleigh, J. P. Barnard, and
E. K. Johannsen, Anesthesia & Analgesia 102, 91 (2006).
[18] A. L. Vanluchene, H. Vereecke, O. Thas, E. P. Mortier,
and M. M. Struys, The Journal of the
S. L. Shafer,
American Society of Anesthesiologists 101, 34 (2004).
[19] L. J. Larson-Prior, R. Oostenveld, S. Della Penna,
G. Michalareas, F. Prior, A. Babajani-Feremi, J.-M.
Schoffelen, L. Marzetti, F. de Pasquale, F. Di Pompeo,
et al., Neuroimage 80, 190 (2013).
[20] D. C. Van Essen, K. Ugurbil, E. Auerbach, D. Barch,
T. Behrens, R. Bucholz, A. Chang, L. Chen, M. Corbetta,
S. W. Curtiss, et al., Neuroimage 62, 2222 (2012).
[21] Y. Kuramoto, in International symposium on mathemat-
ical problems in theoretical physics (Springer, 1975) pp.
420–422.
[22] M. Breakspear, S. Heitmann, and A. Daffertshofer, Fron-
tiers in human neuroscience 4, 190 (2010).
[23] A. Pikovsky, M. Rosenblum, J. Kurths, and J. Kurths,
Synchronization: a universal concept in nonlinear sci-
ences, Vol. 12 (Cambridge university press, 2003).
[24] S. Silva Pereira, R. Hindriks, S. Mühlberg, E. Maris,
F. van Ede, A. Griffa, P. Hagmann, and G. Deco, Brain
Connectivity 7, 541 (2017).
[25] B. Biswal, F. Zerrin Yetkin, V. M. Haughton, and J. S.
Hyde, Magnetic resonance in medicine 34, 537 (1995).
[26] R. L. Buckner, J. R. Andrews-Hanna, and D. L. Schac-
ter, Annals of the New York Academy of Sciences 1124,
SUPPLEMENTARY INFORMATION
Data and preprocessing
Once again, summing over all bins and all sensors, the
entropy can be derived following Eq. 2.
6
Kuramoto model
(cid:110)
(cid:104)− (ω − ω0)2
(cid:105)
(cid:104)− (ω − ω1)2
(cid:105)(cid:111)
2∆2
In all our simulations, we consider an all-to-all network
of N = 100 oscillators. The bare frequencies of each oscil-
lator ωi are extracted from a distribution of the following
form:
1√
8π∆
exp
2∆2
+exp
p(ω) =
,
(7)
where ∆ = 1 Hz, ω0 = 5 Hz, and ω1 = 10 Hz. We
verified that the general picture reported in the main
text is not affected by the specific choice of these three
parameters. The simulations were run for 15 minutes
of simulated time (to match with the experimental data
and to ensure a robust estimation of observables), using
an Euler integration method with a time step of 5 ms.
The energy and entropy are computed on power spectra
estimated on windows of 2 s, as with the experiments. A
transient time of 100 s was discarded in all simulations.
Phase Lag Index (PLI)
The PLI was computed for each subject and time win-
dow, summing over all sensors. The frequency range of
interest [4,100] Hz was divided into ten equally wide bins.
Within each frequency bin, a time series is obtained by
filtering the signal with a Butterworth band-pass filter.
The Hilbert transform is then employed to extract the
phase ψk of the time series in each frequency bin k. From
there, the PLI, given by
PLI ≡ < sign(ψk) >,
(8)
is computed, where < · > denotes averaging over time
[24]. One may note that the PLI takes values between 0
(random phase relations) and 1 (perfect phase locking).
In this work we report the mean PLI over all time epochs
for each subject in each brain state.
Magnetoencephalography (MEG) data were acquired,
preprocessed, anonymized, and distributed by the Hu-
man Connectome Project (HCP). Healthy adult human
subjects were imaged in a magnetically shielded room
using a whole head MAGNES 3600 (4D Neuroimaging,
San Diego, CA) system at the Saint Louis University
(SLU) medical campus. HCP protocols collected rest-
ing state (rest) and visual N-back working memory (ac-
tive) data from the same subjects. The MEG has 248
magnetometer channels. Electrooculography, electrocar-
diography, and electromyography recordings are all syn-
chronized with the MEG. Data were acquired with a
bandwidth of 400Hz, DC high pass filter,
in a con-
tinuous acquisition mode, with a 2034.5 Hz sampling
rate. MEG data were preprocessed by the HCP. Bio-
logical and environmental artifacts, including 60 Hz ar-
tifacts, bad channels, and bad segments were removed
first automatically by an independent component anal-
ysis (ICA)-based, publically available, custom Fieldtrip-
scripted pipeline and further quality controlled by hu-
man verification. Channel-level preprocessing pipelines
also downsampled data to 508.63Hz. N-back data were
split into groups of trials corresponding to task design,
and divided into epochs time-locked to the onset of the
stimulus (TIM) to yield Matlab structures containing
epoched, preprocessed data. Further documentation de-
scribing data collection and preprocessing is available [19]
and www.humanconnectome.org/documentation.
Power spectrum
Subjects with data in both N-back memory and resting
states (N = 77) were included in the analyses. Per sub-
ject average recording time is: 14.06±0.55 min for resting
state and 12.35±0.67 min for working memory. Respect-
ing constraints introduced by epoch time and Nyquist ar-
tifacts, power spectra between [4,100] Hz were obtained
with Welch windowing method per Xφ,τ,µ,, indexing 2
sec MEG time series from each subject φ, brain state τ
(active or rest), sensor µ, and epoch .
Spectral energy and entropy
Each power spectrum Xφ,τ,µ,(f ) was used to construct
a histogram with bin size 0.1 Hz. Summing over the his-
togram bins of the power spectra of all sensors, the en-
ergy Uφ,τ, is obtained (Eq. 1). By normalizing each
histogram, one obtains the frequency probability distri-
bution P (f ) for each sensor, epoch, state, and subject.
|
1312.2950 | 1 | 1312 | 2013-12-10T13:33:18 | Revisiting the two-mass model of the vocal folds | [
"q-bio.NC"
] | Realistic mathematical modeling of voice production has been recently boosted by applications to different fields like bioprosthetics, quality speech synthesis and pathological diagnosis. In this work, we revisit a two-mass model of the vocal folds that includes accurate fluid mechanics for the air passage through the folds and nonlinear properties of the tissue. We present the bifurcation diagram for such a system, focusing on the dynamical properties of two regimes of interest: the onset of oscillations and the normal phonation regime. We also show theoretical support to the nonlinear nature of the elastic properties of the folds tissue by comparing theoretical isofrequency curves with reported experimental data. | q-bio.NC | q-bio |
Papers in Physics, vol. 5, art. 050004 (2013)
Received: 2 March 2013, Accepted: 5 June 2013
Edited by: G. Mindlin
Licence: Creative Commons Attribution 3.0
DOI: http://dx.doi.org/10.4279/PIP.050004
www.papersinphysics.org
ISSN 1852-4249
Revisiting the two-mass model of the vocal folds
M. F. Assaneo,1∗ M. A. Trevisan1†
Realistic mathematical modeling of voice production has been recently boosted by ap-
plications to different fields like bioprosthetics, quality speech synthesis and pathological
diagnosis. In this work, we revisit a two-mass model of the vocal folds that includes accu-
rate fluid mechanics for the air passage through the folds and nonlinear properties of the
tissue. We present the bifurcation diagram for such a system, focusing on the dynamical
properties of two regimes of interest: the onset of oscillations and the normal phonation
regime. We also show theoretical support to the nonlinear nature of the elastic properties
of the folds tissue by comparing theoretical isofrequency curves with reported experimental
data.
I.
Introduction
In the last decades, a lot of effort was devoted to de-
velop a mathematical model for voice production.
The first steps were made by Ishizaka and Flana-
gan [1], approximating each vocal fold by two cou-
pled oscillators, which provide the basis of the well
known two-mass model. This simple model repro-
duces many essential features of the voice produc-
tion, like the onset of self sustained oscillation of
the folds and the shape of the glottal pulses.
Early analytical treatments were restricted to
small amplitude oscillations, allowing a dimen-
sional reduction of the problem.
In particular, a
two dimensional approximation known as the flap-
ping model was widely adopted by the scientific
community, based on the assumption of a transver-
sal wave propagating along the vocal folds [2, 3].
Moreover, this model was also used to successfully
∗E-mail: [email protected]
†E-mail: [email protected]
1 Laboratorio de Sistemas Din´amicos, Depto. de F´ısica,
FCEN, Universidad de Buenos Aires. Pabell´on I, Ciudad
Universitaria, 1428EGA Buenos Aires, Argentina.
explain most of the features present in birdsong
[4, 5].
Faithful modeling of the vocal folds has recently
found new challenges: realistic articulatory speech
synthesis [6 -- 8], diagnosis of pathological behavior
of the folds [9, 10] and bioprosthetic applications
[11]. Within this framework, the 4-dimensional
two-mass model was revisited and modified. Two
main improvements are worth noting: a realistic
description of the vocal fold collision [13,14] and an
accurate fluid mechanical description of the glottal
flow, allowing a proper treatment of the hydrody-
namical force acting on the folds [8, 15].
In this work, we revisit the two-mass model de-
veloped by Lucero and Koenig [7]. This choice rep-
resents a good compromise between mathematical
simplicity and diversity of physical phenomena act-
ing on the vocal folds, including the main mechani-
cal and fluid effects that are partially found in other
models [13, 15].
It was also successfully used to
reproduce experimental temporal patterns of glot-
tal airflow. Here, we extend the analytical study
of this system: we present a bifurcation diagram,
explore the dynamical aspects of the oscillations
at the onset and normal phonation and study the
050004-1
Papers in Physics, vol. 5, art. 050004 (2013) / M. F. Assaneo et al.
isofrequency curves of the model.
This work is organized as follows: in the second
section, we describe the model.
In the third sec-
tion, we present the bifurcation diagram, compare
our solutions with those of the flapping model ap-
proximation and analyze the isofrecuency curves.
In the fourth and last section, we discuss our re-
sults.
force, m is the mass and kc the coupling stiffness.
The horizontal displacement from the rest position
x0 is represented by x.
We use a cubic polynomial for the restitution
term [Eq. (2)], adapted from [1, 7]. The term with
a derivable step-like function Θ [Eq. (3)] accounts
for the increase in the stiffness introduced by the
collision of the folds. The restitution force reads
II. The model
Each vocal fold is modeled as two coupled damped
oscillators, as sketched in Fig. 1.
Ki(xi) = kixi(1 + 100xi
2)
(2)
+ Θ(cid:18) xi + x0
x0 (cid:19) 3ki(xi + x0)[1 + 500(xi + x0)2],
with
Θ(x) =(cid:26)
0 if x ≤ 0
if x > 0
x2
8 10−4+x2
,
(3)
where x0 is the rest position of the folds.
For the damping force, we have adapted the ex-
pression proposed in [7], making it derivable, arriv-
ing at the following equation:
Bi(xi) =
(cid:20)1 + Θ(cid:18) xi + x0
x0 (cid:19) 1
ǫi(cid:21) ri(1 + 850xi
(4)
2)yi,
where ri = 2ǫi√kimi, and ǫi is the damping ratio.
In order to describe the hydrodynamic force that
the airflow exerts on the vocal folds, we have
adopted the standard assumption of small inertia of
the glottal air column and the model of the bound-
ary layer developed in [7, 11, 15]. This model as-
sumes a one-dimensional, quasi-steady incompress-
ible airflow from the trachea to a separation point.
At this point, the flow separates from the tissue
surface to form a free jet where the turbulence dis-
sipates the airflow energy. It has been experimen-
tally shown that the position of this point depends
on the glottal profile. As described in [15], the
separation point located at the glottal exit shifts
down to the boundary between masses m1 and m2
when the folds profile becomes more divergent than
a threshold [Eq. (7)].
Figure 1: Sketch of the two-mass model of the vo-
cal folds. Each fold is represented by masses m1
and m2 coupled to each other by a restitution force
kc and to the laryngeal walls by K1 and K2 (and
dampings B1 and B2), respectively. The displace-
ment of each mass from the resting position x0 is
represented by x1 and x2. The different aerody-
namic pressures P acting on the folds are described
in the text.
Assuming symmetry with respect to the saggital
plane, the left and right mass systems are identical
(Fig. 1) and the equation of motion for each mass
reads
xi = yi
1
mi
yi =
[fi − Ki(xi) − Bi(xi, yi) − kc(xi − xj)] ,
(1)
for i, j = 1 or 2 for lower and upper masses, re-
spectively. K and B represent the restitution and
damping of the folds tissue, f the hydrodynamic
Viscous losses are modeled according to a bi-
dimensional Poiseuille flow [Eqs. (6) and (7)]. The
equations for the pressure inside the glottis are
050004-2
Papers in Physics, vol. 5, art. 050004 (2013) / M. F. Assaneo et al.
,
ρu2
g
2a2
1
12µugd1l2
g
a3
1
g
Pin = Ps +
P12 = Pin −
P21 =( 12µug d2l2
a3
2
Pout = 0.
,
(5)
(6)
+ Pout
if a2 > ksa1
0 if a2 ≤ ksa1
,
(7)
(8)
As sketched in Fig. 1, the pressures exerted by
the airflow are: Pin at the entrance of the glottis,
P12 at the upper edge of m1, P21 at the lower edge
of m2, Pout at the entrance of the vocal tract and
Ps the subglottal pressure.
The width of the folds (in the plane normal to
Fig. 1) is lg; d1 and d2 are the lengths of the lower
and upper masses, respectively. ai are the cross-
sections of the glottis, ai = 2lg(xi + x0); µ and ρ
are the viscosity and density coefficient of the air;
ug is the airflow inside the glottis, and ks = 1.2 is an
experimental coefficient. We also assume no losses
at the glottal entrance [Eq. (5)], and zero pressure
at the entrance of the vocal tract [Eq. (8)].
The hydrodynamic force acting on each mass
reads:
2
Pin +P12
f1 =(cid:26) d1lgPs
f2 =
d2lgPs
0
P21+Pout
2
if x1 ≤ −x0 or x2 ≤ −x0
in other case
(9)
if x1 > −x0 and x2 ≤ −x0
if x1 ≤ −x0
in other case
(10)
Following [1, 7, 10], these functions represent
opening, partial closure and total closure of the
glottis. Throughout this work, piecewise functions
P21, f1 and f2 are modeled using the derivable step-
like function Θ defined in Eq. (3).
III. Analysis of the model
i. Bifurcation diagram
The main anatomical parameters that can be ac-
tively controlled during the vocalizations are the
subglottal pressure Ps and the folds tension con-
trolled by the laryngeal muscles. In particular, the
action of the thyroarytenoid and the cricothyroid
muscles control the thickness and the stiffness of
folds. Following [1], this effect is modeled by a pa-
rameter Q that scales the mechanic properties of
the folds by a cord-tension parameter: kc = Qkc0,
ki = Qki0 and mi = mi0
Q . We therefore performed a
bifurcation diagram using these two standard con-
trol parameters Ps and Q.
Five main regions of different dynamic solutions
are shown in Fig. 2. At low pressure values (re-
gion I), the system presents a stable fixed point.
Reaching region II, the fixed point becomes un-
stable and there appears an attracting limit cycle.
At the interface between regions I and II, three
bifurcations occur in a narrow range of subglot-
tal pressure (Fig. 3, left panel), all along the Q
axis. The right panel of Fig. 3 shows the oscilla-
tion amplitude of x2. At point A, oscillations are
born in a supercritical Hopf bifurcation. The am-
plitude grows continuously for increasing Ps until
point B, where it jumps to the upper branch. If the
pressure is then decreased, the oscillations persist
even for lower pressure values than the onset in A.
When point C is reached, the oscillations suddenly
stop and the system returns to the rest position.
This onset-offset oscillation hysteresis was already
reported experimentally in [12].
The branch AB depends on the viscosity. De-
creasing µ, points A and B approach to each other
until they collide at µ = 0, recovering the result re-
ported in [3, 10, 14], where the oscillations occur as
the combination of a subcritical Hopf bifurcation
and a cyclic fold bifurcation.
On the other hand, the branch BC depends on
the separation point of the jet formation. In par-
ticular, for increasing ks, the folds become stiffer
and the separation point moves upwards toward the
output of the glottis. From a dynamical point of
view, points C and B approach to each other until
they collapse. In this case, the oscillations are born
at a supercritical Hopf bifurcation and the system
presents no hysteresis, as in the standard flapping
model [17].
Regions II and III of Fig. 2 are separated by
a saddle-repulsor bifurcation. Although this bifur-
cation does not represent a qualitative dynamical
change for the oscillating folds, its effects are rele-
vant when the complete mechanism of voiced sound
050004-3
Papers in Physics, vol. 5, art. 050004 (2013) / M. F. Assaneo et al.
Figure 3: Hysteresis at the oscillation onset-offset.
Left panel: zoom of the interface between regions I
and II. The blue and green lines represent folds of
cycles (saddle-node bifurcations in the map). The
red line is a supercritical Hopf bifurcation. Right
panel: the oscillation amplitude of x2 as a function
of the subglottal pressure Ps, at Q = 1.71. The
continuation of periodic solutions was realized with
the AUTO software package [20].
Figure 2: Bifurcation diagram in the plane of sub-
glottal pressure and fold tension (Q,Ps). The in-
sets are two-dimensional projections of the flow on
the (v1,x1) plane, the red crosses represent unsta-
ble fixed points and the dotted lines unstable limit
cycles. Normal voice occurs at (Q, Ps) ∼ (1, 800).
The color code represents the linear correlation be-
tween (x1 − x2) and (y1 + y2): from dark red for
R = 1 to dark blue for R = 0.6. This diagram
was developed with the help of AUTO continuation
software [20]. The rest of the parameters were fixed
at m1 = 0.125 g, m2 = 0.025 g, k10 = 80 N/m,
k20 = 8 N/m, kc = 25 N/m, ǫ1 = 0.1, ǫ2 = 0.6,
lg = 1.4 cm, d1 = 0.25 cm, d2 = 0.05 cm and
x0 = 0.02 cm.
production is considered. Voiced sounds are gener-
ated as the airflow disturbance produced by the
oscillation of the vocal folds is injected into the se-
ries of cavities extending from the laryngeal exit to
the mouth, a non-uniform tube known as the vocal
tract. The disturbance travels back and forth along
the vocal tract, that acts as a filter for the origi-
nal signal, enhancing the frequencies of the source
that fall near the vocal tract resonances. Voiced
sounds are in fact perceived and classified accord-
ing to these resonances, as in the case of vowels [18].
Consequently, one central aspect in the generation
of voiced sounds is the production of a spectrally
rich signal at the sound source level.
Interestingly, normal phonation occurs in the re-
gion near the appearance of the saddle-repulsor bi-
furcation. Although this bifurcation does not al-
ter the dynamical regime of the system or its time
scales, we have observed that part of the limit cy-
cle approaches the stable manifold of the new fixed
point (as displayed in Fig. 4), therefore changing
its shape. This deformation is not restricted to the
appearance of the new fixed point but rather oc-
curs in a coarse region around the boundary be-
tween II and III, as the flux changes smoothly in
a vicinity of the bifurcation. In order to illustrate
this effect, we use the spectral content index SCI
[21], an indicator of the spectral richness of a sig-
nal: SCI = Pk Akfk/(Pk Akf0), where Ak is the
Fourier amplitude of the frequency fk and f0 is
the fundamental frequency. As the pressure is in-
creased, the SCI of x1(t) increases (upper right
panel of Fig. 4), observing a boost in the vicinity of
the saddle-repulsor bifurcation that stabilizes after
the saddle point is generated.
Thus, the appearance of this bifurcation near the
region of normal phonation could indicate a possi-
ble mechanism to further enhance the spectral rich-
ness of the sound source, on which the production
of voiced sounds ultimately relies.
050004-4
Papers in Physics, vol. 5, art. 050004 (2013) / M. F. Assaneo et al.
rium x0, and τ is the time that the surface wave
takes to travel half the way from bottom to top.
Equation (11) can be rewritten as (x1 − x2) =
τ (y1 + y2). We use this expression to quantify the
difference between the oscillations obtained with
the two-mass model solutions and the ones gener-
ated with the flapping approximation, computing
the linear correlation coefficient between (x1 − x2)
and (y1 + y2). As expected, the correlation coeffi-
cient R decreases for increasing Ps or decreasing Q.
In the region near normal phonation, the approx-
imation is still relatively good, with R ∼ 0.8. As
expected, the approximation is better for increasing
x0, since the effect of colliding folds is not included
in the flapping model.
ii.
Isofrequency curves
One basic perceptual property of the voice is the
pitch, identified with the fundamental frequency f0
of the vocal folds oscillation. The production of
different pitch contours is central to language, as
they affect the semantic content of speech, carry-
ing accent and intonation information. Although
experimental data on pitch control is scarce, it was
reported that it is actively controlled by the laryn-
geal muscles and the subglottal pressure. In par-
ticular, when the vocalis or interarytenoid muscle
activity is inactive, a raise of the subglottal pres-
sure produces an upraising of the pitch [16].
Compatible with these experimental results, we
performed a theoretical analysis using Ps as a sin-
gle control parameter for pitch. In the upper pan-
els of Fig. 5, we show isofrequency curves in the
range of normal speech for our model of Eqs. (1)
to (10). Following the ideas developed in [22] for
the avian case, we compare the behavior of the
fundamental frequency with respect to pressure Ps
in the two most usual cases presented in the lit-
the cubic [1, 7] and the linear [10, 14]
erature:
restitutions.
In the lower panels of Fig. 5, we
show the isofrequency curves that result from re-
placing the cubic restitution by a linear restitution
Ki(xi) = kixi + Θ( xi+x0
)3ki(xi + x0).
x0
Although the curves f0(Ps) are not affected by
the type of restitution at the very beginning of os-
cillations, the changes become evident for higher
values of Ps, with positive slopes for the cubic case
and negative for the linear case. This result sug-
gests that a nonlinear cubic restitution force is a
Figure 4: A projection of the limit cycle for x1 and
the stable manifold of the saddle point, for param-
eters consistent with normal phonatory conditions,
(Q, Ps) = (1, 850) (region III). Left inset: projec-
tion in the 3-dimensional space (y1, x1, x2). Right
inset: Spectral content index of x1(t) as a function
of Ps for a fixed value of Q = 0.95. In green, the
value at which the saddle-repulsor bifurcation takes
place.
In the boundary between regions III and IV, one
of the unstable points created in the saddle-repulsor
bifurcation undergoes a subcritical Hopf bifurca-
tion, changing stability as an unstable limit cycle
is created [19]. Finally, entering region V, the sta-
ble and the unstable cycles collide and disappear in
a fold of cycles where no oscillatory regimes exist.
In Fig. 2, we also display a color map that quan-
tifies the difference between the solutions of the
model and the flapping approximation. The flap-
ping model is a two dimensional model that, instead
of two masses per fold, assumes a wave propagating
along a linear profile of the folds, i.e., the displace-
ment of the upper edge of the folds is delayed 2τ
with respect to the lower. The cross sectional areas
at glottal entry and exit (a1 and a2) are approxi-
mated, in terms of the position of the midpoint of
the folds, by
(cid:26) a1 = 2lg(x0 + x + τ x)
a2 = 2lg(x0 + x − τ x)
,
(11)
where x is the midpoint displacement from equilib-
050004-5
Papers in Physics, vol. 5, art. 050004 (2013) / M. F. Assaneo et al.
respect to the oscillation onset, we showed how jets
and viscous losses intervene in the hysteresis phe-
nomenon.
Many different models for the restitution prop-
erties of the tissue have been used across the liter-
ature, including linear and cubic functional forms.
Yet, its specific role was not reported. Here we
showed that the experimental relationship between
subglottal pressure and pitch is fulfilled by a cubic
term.
Acknowledgements - This work was partially
funded by UBA and CONICET.
[1] K Ishizaka, J L Flanagan, Synthesis of voiced
sounds from a two-mass model of the vocal
cords, Bell Syst. Tech. J. 51, 1233 (1972).
[2] I R Titze, The physics of smallamplitude os-
cillation of the vocal folds, J. Acoust. Soc. Am.
83, 1536 (1988).
[3] M A Trevisan, M C Eguia, G Mindlin, Nonlin-
ear aspects of analysis and synthesis of speech
time series data, Phys. Rev. E 63, 026216
(2001).
[4] Y S Perl, E M Arneodo, A Amador, F Goller,
G B Mindlin, Reconstruction of physiological
instructions from Zebra finch song, Phys. Rev.
E 84, 051909 (2011).
[5] E M Arneodo, Y S Perl, F Goller, G B Mindlin,
Prosthetic avian vocal organ controlled by a
freely behaving bird based on a low dimensional
model of the biomechanical periphery, PLoS
Comput. Biol. 8, e1002546 (2012).
[6] B H Story, I R Titze Voice simulation with a
bodycover model of the vocal folds, J. Acoust.
Soc. Am. 97, 1249 (1995).
[7] J C Lucero, L Koening Simulations of tempo-
ral patterns of oral airflow in men and women
using a two-mass model of the vocal folds un-
der dynamic control, J. Acoust. Soc. Am. 117,
1362 (2005).
[8] X Pelorson, X Vescovi, C Castelli, E
Hirschberg, A Wijnands, A P J Bailliet, H M
Figure 5: Relationship between pitch and restitu-
tion forces. Left panels:
isofrequency curves in
the plane (Q,Ps). Right panels: Curves f0(Ps)
for Q=0.9, Q=0.925 and Q=0.95.
In the upper
panels, we used the model with the cubic nonlin-
ear restitution of Eq. (2). In the lower panels, we
show the curves obtained with a linear restitution,
Ki(xi) = kixi + Θ( xi+x0
)3ki(xi + x0).
x0
good model for the elastic properties of the oscil-
lating tissue.
IV. Conclusions
In this paper, we have analyzed a complete two-
mass model of the vocal folds integrating collisions,
nonlinear restitution and dissipative forces for the
tissue and jets and viscous losses of the air-stream.
In a framework of growing interest for detailed
modeling of voice production, the aspects studied
here contribute to understanding the role of the
different physical terms in different dynamical be-
haviors.
We calculated the bifurcation diagram, focusing
in two regimes: the oscillation onset and normal
phonation. Near the parameters of normal phona-
tion, a saddle repulsor bifurcation takes place that
modifies the shape of the limit cycle, contributing
to the spectral richness of the glottal flow, which is
central to the production of voiced sounds. With
050004-6
Papers in Physics, vol. 5, art. 050004 (2013) / M. F. Assaneo et al.
A Hirschberg, Description of the flow through
in-vitro models of the glottis during phonation.
Application to voiced sounds synthesis, Acta
Acust. 82, 358 (1996).
[9] M E Smith, G S Berke, B R Gerratt, Laryn-
geal paralyses: Theoretical considerations and
effects on laryngeal vibration, J. Speech Hear.
Res. 35, 545 (1992).
[10] I Steinecke, H Herzel Bifurcations in an asym-
metric vocalfold model, J. Acoust. Soc. Am.
97, 1874 (1995).
[11] N J C Lous, G C J Hofmans, R N J Veldhuis, A
Hirschberg, A symmetrical two-mass vocal-fold
model coupled to vocal tract and trachea, with
application to prosthesis design, Acta Acust.
United Ac. 84, 1135 (1998).
[12] T Baer, Vocal fold physiology, University of
Tokyo Press, Tokyo, (1981).
[13] T Ikeda, Y Matsuzak, T Aomatsu, A nu-
merical analysis of phonation using a two-
dimensional flexible channel model of the vocal
folds, J. Biomech. Eng. 123, 571 (2001).
[14] J C Lucero, Dynamics of the two-mass model
of the vocal folds: Equilibria, bifurcations, and
oscillation region, J. Acoust. Soc. Am. 94,
3104 (1993).
[15] X Pelorson, A Hirschberg, R R van Hassel, A
P J Wijnands, Y Auregan, Theoretical and ex-
perimental study of quasisteadyflow separation
within the glottis during phonation. Applica-
tion to a modified twomass model, J. Acoust.
Soc. Am. 96, 3416 (1994).
[16] T Baer, Reflex activation of laryngeal muscles
by sudden induced subglottal pressure changes,
J. Acoust. Soc. Am. 65, 1271 (1979).
[17] J C Lucero, A theoretical study of the hystere-
sis phenomenon at vocal fold oscillation onset-
offset, J. Acoust. Soc. Am. 105, 423 (1999).
[18] I Titze, Principles of voice production, Pren-
tice Hall, (1994).
[19] J Guckenheimer, P Holmes, Nonlinear oscil-
lations, dynamical systems and bifurcations of
vector fields, Springer, (1983).
[20] E Doedel, AUTO: Software for continuation
and bifurcation problems in ordinary differen-
tial equations, AUTO User Manual, (1986).
[21] J Sitt, A Amador, F Goller, G B Mindin, Dy-
namical origin of spectrally rich vocalizations
in birdsong, Phys. Rev. E 78, 011905 (2008).
[22] A Amador, F Goller, G B Mindlin, Frequency
modulation during song in a suboscine does
not require vocal muscles, J. Neurophysiol. 99,
2383 (2008).
050004-7
|
1106.5678 | 1 | 1106 | 2011-06-28T14:16:30 | The cell-type specific connectivity of the local cortical network explains prominent features of neuronal activity | [
"q-bio.NC"
] | In the past decade, the cell-type specific connectivity and activity of local cortical networks have been characterized experimentally to some detail. In parallel, modeling has been established as a tool to relate network structure to activity dynamics. While the available connectivity maps have been used in various computational studies, prominent features of the simulated activity such as the spontaneous firing rates do not match the experimental findings. Here, we show that the inconsistency arises from the incompleteness of the connectivity maps. Our comparison of the most comprehensive maps (Thomson et al., 2002; Binzegger et al., 2004) reveals their main discrepancies: the lateral sampling range and the specific selection of target cells. Taking them into account, we compile an integrated connectivity map and analyze the unified map by simulations of a full scale model of the local layered cortical network. The simulated spontaneous activity is asynchronous irregular and the cell-type specific spontaneous firing rates are in agreement with in vivo recordings in awake animals, including the low rate of layer 2/3 excitatory cells. Similarly, the activation patterns evoked by transient thalamic inputs reproduce recent in vivo measurements. The correspondence of simulation results and experiments rests on the consideration of specific target type selection and thereby on the integration of a large body of the available connectivity data. The cell-type specific hierarchical input structure and the combination of feed-forward and feedback connections reveal how the interplay of excitation and inhibition shapes the spontaneous and evoked activity of the local cortical network. | q-bio.NC | q-bio | The cell-type specific connectivity of the
local cortical network explains prominent
features of neuronal activity
Tobias C. Potjans1,2,3, Markus Diesmann1,2,4
1
1
0
2
n
u
J
8
2
]
.
C
N
o
i
b
-
q
[
1
v
8
7
6
5
.
6
0
1
1
:
v
i
X
r
a
1Institute of Neuroscience and Medicine (INM-6)
Computational and Systems Neuroscience
Research Center Juelich, 52425 Juelich, Germany
2Brain and Neural Systems Team
RIKEN Computational Science Research Program
Wako-shi, Saitama 351-0198, Japan
3Faculty of Biology III
Albert-Ludwigs-University Freiburg
Schaenzlestrasse 1, 79104 Freiburg, Germany
4RIKEN Brain Science Institute
Wako-shi, Saitama 351-0198, Japan
Abstract
In the past decade, the cell-type specific connectivity and activity of local cor-
tical networks have been characterized experimentally to some detail. In parallel,
modeling has been established as a tool to relate network structure to activity
dynamics. While the available connectivity maps have been used in various com-
putational studies, prominent features of the simulated activity such as the spon-
taneous firing rates do not match the experimental findings. Here, we show that
the inconsistency arises from the incompleteness of the connectivity maps. Our
comparison of the most comprehensive maps (Thomson et al., 2002; Binzegger
et al., 2004) reveals their main discrepancies: the lateral sampling range and the
specific selection of target cells. Taking them into account, we compile an inte-
grated connectivity map and analyze the unified map by simulations of a full scale
model of the local layered cortical network. The simulated spontaneous activity
is asynchronous irregular and the cell-type specific spontaneous firing rates are in
agreement with in vivo recordings in awake animals, including the low rate of layer
2/3 excitatory cells. Similarly, the activation patterns evoked by transient thalamic
inputs reproduce recent in vivo measurements. The correspondence of simulation
results and experiments rests on the consideration of specific target type selec-
tion and thereby on the integration of a large body of the available connectivity
data. The cell-type specific hierarchical input structure and the combination of
feed-forward and feedback connections reveal how the interplay of excitation and
inhibition shapes the spontaneous and evoked activity of the local cortical network.
Potjans & Diesmann, Connectivity explains cell-type specific activity
Introduction
The local cortical network is considered a building block of brain function and
over the last century, the hypothesis that the interactions of neurons within the
microcircuit are governed by the cell-type specific connectivity has been refined
(see e.g. Douglas & Martin (2007a,b) for reviews). In the last decade, progress in
methodology enabled the compilation of comprehensive connectivity maps: Thom-
son et al. (2002) used electrophysiological recordings to estimate the connection
probabilities between various cell types in layers 2/3, 4 and 5 in slices of rat and cat
neocortex. Shortly thereafter, Binzegger et al. (2004) applied a modified version
of Peters' rule (Braitenberg & Schuz, 1998) to derive the cell-type specific distri-
bution of synapses from morphological reconstructions of in vivo labeled cells from
area 17 of the cat. These approaches entail partly contradicting results (Thom-
son & Lamy, 2007), but the compatibility of these maps and the influence of the
different methodologies have not been quantitatively assessed.
Due to recent advances in in vivo electrophysiology and two-photon optical
imaging, the structural data can now be contrasted with observations of the dy-
namics. Characteristic features are the cell-type specific firing rates during ongoing
activity in awake animals: low pyramidal neuron firing rates below 1Hz are reported
in layer 2/3 (L2/3) and highest rates in L5 (e.g. Greenberg et al., 2008; de Kock
& Sakmann, 2009).
Early network models already incorporate basic anatomy and electrophysiology
such as the separation of excitatory and inhibitory cell types and a sparse, seem-
ingly random connectivity (Amit & Brunel, 1997; van Vreeswijk & Sompolinsky,
1996). The balance of excitation and inhibition explains the asynchronous irregu-
lar (AI) spiking activity and the large membrane potential fluctuations observed in
vivo. Models eventually incorporated multiple cell types to capture layer-specific
connections (e.g. Hill & Tononi, 2005; Traub et al., 2005) and employ data based
connectivity maps (Haeusler & Maass, 2007; Haeusler et al., 2009; Heinzle et al.,
2007; Izhikevich & Edelman, 2008; Binzegger et al., 2009). However, no study to
date reported cell-type specific firing rates consistent with the experimental obser-
vations. A priori it is unclear whether this is due to a misinterpretation of the raw
connectivity data or due to further model assumptions. Since the studies comprise
networks based on point-neuron as well as on multi-compartment neuron models,
the mismatch in fundamental characteristics like stationary firing rates is unlikely
to be caused by a lack in complexity of the network elements but rather by the
incompleteness of the connectivity map.
In the present study we quantify the discrepancies between the electrophysio-
logical and anatomical connectivity maps to systematically compile an integrated
map. To resolve conflicts, we additionally incorporate insights from photostim-
ulation (Dantzker & Callaway, 2000; Zarrinpar & Callaway, 2006) and electron
microscopy (McGuire et al., 1984) studies, reporting the specific selection of in-
terneurons by a subset of inter-layer projections. We then check the consistency
of structure and activity by means of full scale simulations of the local cortical
network.
1
Potjans & Diesmann, Connectivity explains cell-type specific activity
Figure 1: Model definition. Layers 2/3, 4, 5 and 6 are each represented by
an excitatory (triangles) and an inhibitory (circles) population of model neurons.
The number of neurons in a population is chosen according to Binzegger et al.
(2004) based on the countings of Beaulieu & Colonnier (1983); Gabbott & Somogyi
(1986). Input to the populations is represented by thalamo-cortical input targeting
layers 4 and 6 and background input to all populations. Excitatory (black) and
inhibitory (gray) connections with connection probabilities > 0.04 are shown. The
model size corresponds to the cortical network below 1 mm2 surface.
2
Potjans & Diesmann, Connectivity explains cell-type specific activity
Materials and Methods
The network model (Fig. 1) represents four layers of cortex, L2/3, L4, L5 and
L6, each consisting of two populations of excitatory (e) and inhibitory (i) neurons.
Throughout the article, we use the term connection with reference to populations,
defined by the pre- and postsynaptic layers and neuron types. The term projection
is used for the two connections of a single presynaptic population to both popula-
tions of a target layer. A connectivity map is defined by the sixty-four connection
probabilities between the eight considered cell types.
Connectivity data
For the anatomical map (a), Binzegger et al. (2004) provide the relative number of
synapses participating in a connection and the total absolute number of synapses,
depending on pre- and postsynaptic type, of area 17 (supplementary Table 6).
The product of these measures gives the absolute number of synapses K for any
connection. To calculate the corresponding connection probabilities Ca we assume
that the synapses are randomly distributed allowing multiple contacts between any
two neurons. With N pre(post) being the number of neurons in the presynaptic
(postsynaptic) population:
(cid:18)
(cid:19)K
Ca = 1 −
The often used expression
1 −
1
N preN post
Ca = K/N preN post
.
(1)
(2)
is the corresponding first-order Taylor series approximation and valid for small
K/(N preN post) (see Supplemental Material). The original published data consti-
tute our raw connectivity map (Binzegger et al. (2004), their figure 12). Consistent
with other modeling work (Izhikevich & Edelman, 2008), we construct an improved
("modified") anatomical map by assigning the unassigned symmetric (inhibitory)
synapses, originating from a potential underestimation of interneuronal connectiv-
ity, to within-layer projections originating from local interneurons (Binzegger et al.,
2004). The derived connection probabilities are inversely proportional to the con-
sidered surface area πr2 (Fig. 2B). This can be easily understood when considering
the approximation eq. (2): the numbers of neurons N and synapses K increase
linear with the surface area and therefore Ca ∝ πr2/(πr2)2 = 1/πr2. The prod-
uct of the connection probability and the surface area is constant for large areas
(Fig. 2B). Hence, we use throughout this article the area-corrected connection
probability Ca = limr→∞ Caπr2 for all numerical values of the anatomical map.
The physiological hit rate estimates (Thomson et al. (2002), their Table 1)
provide the physiological map (p). We combine multiple independently measured
hit rates for the same connection by a weighted sum
Cp =(cid:80)
i RiQi/(cid:80)
j Qj
,
(3)
where Ri and Qi are the hit rate and the number of tested pairs in the ith ex-
periment, respectively.
In accordance with Haeusler & Maass (2007), we set the
probabilities of the L2/3i to L5e and of the L4i to L2/3i connections to 0.2. While
3
Potjans & Diesmann, Connectivity explains cell-type specific activity
these data constitute the raw map, we incorporate additional hit rate estimates
(Table 1) to create an improved (modified) physiological connectivity map. The
numerical values of all connectivity maps are listed in supplementary Table 6.
We classify all connections into two main groups:
recurrent intra-layer or
"within-layer" connections and connections between different layers or "inter-layer"
connections.
Lateral connectivity model
We use a Gaussian model for describing the lateral connection probability profile
(cid:18)−r2
(cid:19)
2σ2
C(r) = C0 exp
.
(4)
with r being the lateral distance and C0 and σ specifying the peak connec-
tion probability (zero lateral distance) and the lateral spread of connections, re-
spectively. Thereby, we assume that the underlying lateral connectivity is the
same for both connectivity maps, i.e.
that C0 and σ are universal. Further-
more, we assume that the experimental data correspond to a random sampling
of connections within a cylinder of a fixed sampling radius ra > rp and corre-
sponding mean connection probabilities Ca/p = 1/(πr2
0 C(r)rdrdϕ =
2πC0σ2/(πr2
a/p/2σ2)]. These expressions for the mean connection
probabilities of the two connectivity maps allow us to determine the two unknown
parameters C0 and σ. We obtain in closed form (see Supplemental Material)
a/p)[1− exp(−r2
(cid:82) 2π
0
a/p)(cid:82) ra/p
(cid:19)(cid:21)−1/2
(cid:20)
(cid:18)
−2 ln
1 − πr2
pCp
Ca
σ = rp
and
(5)
(6)
C0 =
Ca
2πσ2 .
In principle, this approach may be applied to an individual connection. However, the
sampling radius is the same for all connections of a map. Therefore we determine
σ and C0 only for the global mean connection probabilities of the two maps which
provides robustness against uncertainties in the probability estimate of a particular
connection.
The simulations use a laterally uniform connectivity profile, i.e. the connectivity
between two neurons is exclusively determined by the cell-types and not their
location in space. The mean connection probability of the model Cm depends on
m) and the parameters of the
the size of the network (e.g.
lateral model, but by applying eqs. (5) and (6) it can also be expressed in terms
of the experimentally accessible parameters Cp, rp and Ca
the surface area πr2
rm(cid:90)
2π(cid:90)
0
0
Cm =
1
πr2
m
C(r)rdrdϕ
=
=
(cid:104)
C0σ2[1 − exp(−r2
2
r2
m
Ca
πr2
m
1 − (1 − πr2
p
m/(2σ2))]
¯Cp/ ¯Ca)r2
m/r2
p
(cid:105)
.
(7)
4
Potjans & Diesmann, Connectivity explains cell-type specific activity
where ¯Cp, and ¯Ca specify the global means. To arrive at the individual connection
probabilities at a given model size it is sufficient to multiply a connectivity map by
the ratio of Cm and the global mean of the map ¯Ca/p.
Table 1: Modified physiological connectivity map. The map
incorporates hit rate estimates of several studies. The se-
lection of studies is based on the comprehensive review by
Thomson & Lamy (2007) including all data where hit rate
and the number of tested pairs can be extracted such that
eq. (3) is applicable. The table lists, from left to right, con-
nection specifier, number of existing connections (product
of hit rate and number of tested pairs), number of tested
pairs and the publication from which the data are extracted.
A star (*) indicates that the number of tested pairs is not
explicitly given, but estimated from the stated accuracy of
connection probability. Furthermore, we use the following
additional data on within-layer connections that is not re-
ported separately. Thomson et al. (1996); Thomson & Lamy
(2007): i to e in L2/3, L4 and L5 21 connected of 93 tested
pairs; Ali et al. (2007): i to e in L2/3, L4 and L5 30 con-
nected of 90 tested pairs, e to i in L2/3, L4 and L5 21 con-
nected of 48 tested pairs; i to e in L2/3 and L4 9 connected
of 69 tested pairs and e to i in L2/3 and L4 21 connected of
147 tested pairs. The reported numbers of connected and
tested pairs are uniformly distributed to the reported layers.
connection
L2/3e→L2/3e
L2/3e→L2/3i
L2/3i→L2/3e
L2/3i→L2/3i
L4e→L4e
existing tested
65
8
8
3
48
32
22
63
24
6
22
151
19
29
7
17
136
26
19
2
2
10
22
247
81
32
36
549
305
112
760
110
25
107
243
40
100
25
107
243
39
39
2
8
139
528
publication
Thomson et al. (2002) (rat)
Thomson et al. (2002) (cat)
Bannister & Thomson (2007) (rat)
Bannister & Thomson (2007) (cat)
Mason et al. (1991)
Kapfer et al. (2007)
Yoshimura et al. (2005)
Holmgren et al. (2003)
Ren et al. (2007)
Thomson et al. (2002) (cat)
Thomson et al. (2002) (rat)
Holmgren et al. (2003)
Kapfer et al. (2007) (FS)
Kapfer et al. (2007)(SOM)
Thomson et al. (2002) (cat)
Thomson et al. (2002) (rat)
Holmgren et al. (2003)
Kapfer et al. (2007) (FS)
Kapfer et al. (2007)(SOM)
Thomson et al. (2002) (cat)
Thomson et al. (2002) (rat)
Bannister & Thomson (2007) (cat)
Bannister & Thomson (2007) (rat)
5
Potjans & Diesmann, Connectivity explains cell-type specific activity
connection
L4e→L4i
L4i→L4e
L4i→L4i
L5e→L5e
L5e→L5i
L5i→L5e
L5i→L5i
L6e→L6e
L6e→L6i
L2/3e→L4e
L2/3e→L4i
L2/3i→L4e
L2/3e→L5e
L4e→L2/3e
L4e→L2/3i
L4i→L2/3e
existing tested
4
131
11
25
8
3
11
74
36
10
10
83
26
4
3
15
50
218
29
148
26
173
19
6
7
9
3
56
4
8
5
0
0
1
7
0
0
2
16
25
247
10
7
7
64
1
3
6
23
655
89
234
42
21
154
172
63
64
40
190
74
42
6
163
500
1655
206
1233
260
1450
190
79
73
73
5
1512
204
38
21
25
70
12
37
29
10
2
29
259
1324
50
25
70
640
10
31
12
publication
Thomson et al. (2002)
Feldmeyer et al. (2005)
Beierlein et al. (2003)
Maffei et al. (2004)
Thomson et al. (2002)
Ali et al. (2007) (nonFS)
Ali et al. (2007) (FS)
Beierlein et al. (2003) (FS)
Beierlein et al. (2003) (LTS)
Ali et al. (2007) (nonFS)
Ali et al. (2007) (FS)
Beierlein et al. (2003) (FS)
Beierlein et al. (2003) (LTS)
Thomson et al. (2002)
Thomson et al. (2002)
Thomson et al. (2002)
Markram et al. (1997)
Le Be & Markram (2006)
Le Be & Markram (2006)
Wang et al. (2006)
Wang et al. (2006)
Silberberg & Markram (2007)
Thomson (1997); Thomson & Deuchars (1997)*
Thomson et al. (1995)
Thomson et al. (2002)
Thomson et al. (2002)
Thomson et al. (2002)
Mercer et al. (2005)
Beierlein & Connors (2002)
West et al. (2006) (cat)
West et al. (2006) (rat)
Thomson et al. (2002) (rat)
Thomson et al. (2002) (cat)
Thomson et al. (2002) (rat)
Thomson et al. (2002) (cat)
Thomson et al. (2002) (rat)
Thomson et al. (2002) (cat)
Thomson et al. (2002) (cat)
Thomson et al. (2002) (rat)
Thomson & Bannister (1998)
Kampa et al. (2006)
Yoshimura et al. (2005)
Thomson et al. (2002) (rat)
Thomson et al. (2002) (cat)
Feldmeyer et al. (2002, 2005)
Thomson et al. (2002) (rat)
Thomson et al. (2002) (cat)
Thomson et al. (2002) (rat)
6
Potjans & Diesmann, Connectivity explains cell-type specific activity
connection
L4e→L5e
L5e→L2/3e
existing tested
10
12
1
3
37
86
29
259
publication
Thomson et al. (2002) (cat)
Feldmeyer et al. (2005)*
Thomson et al. (2002)
Thomson & Bannister (1998)
Connectivity data analysis
To compare the connectivity maps we define recurrence strength as the ratio of
the mean within-layer and the mean inter-layer connection probabilities and loop
strength as the ratio of the mean connection probability of the cortical feed-forward
loop (Gilbert (1983), L4 to L2/3 to L5 to L6 and back to L4) and the mean
connection probability of all other inter-layer connections. For a fair comparison
we base recurrence and loop strength only on connections for which estimates are
available in both data sets. Therefore, layers 2/3, 4 and 5 are included but not
layer 6.
A measure with higher resolution is the scaling factor ζ which compares the
connection probabilities of individual connections provided both connectivity maps
assign non-zero probabilities.
ζ =
max(Ca/ ¯Ca, Cp/ ¯Cp)
min(Ca/ ¯Ca, Cp/ ¯Cp)
(8)
is independent of model size because Cm cancels from the expression (see Supple-
mental Material).
Furthermore, to quantify the specificity of connections we introduce the target
specificity
T =
C post=e − C post=i
C post=e + C post=i .
(9)
as the normalized difference of the connection probabilities constituting a projec-
tion.
Consistent modifications of target specificity
In order to construct a consistent integrated connectivity map, it is necessary to
modify the target specificity of certain projections (see Results), i.e. connection
probabilities are modified to meet a given target specificity value. However, we
constrain these modifications by demanding consistency with the underlying ex-
perimental data. For the anatomical data, this underlying measure is the number
of synapses participating in a projection. For the physiological data, it is the mea-
sured connection probability of one of the two connections forming the projection
(typically the second connection has not been quantified).
Modifying the connection probabilities while conserving the total number of
synapses of a projection requires a redistribution of synapses across the target
neurons (see supplementary Fig. 13). To that end, we determine the fraction
of synapses targeting excitatory neurons ∆ as a function of the requested tar-
get specificity constrained by the total number of synapses and the sizes of the
presynaptic and the two postsynaptic populations. The main complication is that
target specificity is defined in terms of connection probabilities, see eq. (9), and
the relation of connection probability and the number of synapses is non-linear, see
7
Potjans & Diesmann, Connectivity explains cell-type specific activity
eq. (1) (for the exact expression see Supplemental Material). Nevertheless, in the
first-order Taylor series expansion of C, eq. (2), the relation is linear and substi-
tuting C post=e = ∆K/(N preN post=e) and C post=i = (1 − ∆)K/(N preN post=i) in
eq. (9) we find
∆ =
(1 + T )N post=e
(1 − T )N post=i + (1 + T )N post=e .
The modifications of the physiological data are straightforward because in all
cases considered here only one connection probability is experimentally given so
that we can estimate the unknown value based on the definition eq. (9):
(cid:18)1 − T
(cid:19)+(−)1
1 + T
C post=i(e) =
C post=e(i).
Compilation of the integrated connectivity map
We compile the integrated connectivity map algorithmically. The procedure re-
quires as input the anatomical and the physiological connectivity maps as well as
the model size and information about desired modifications of the target specifici-
ties. The procedure automatically estimates the parameters of the Gaussian model
and, based on these, the mean model connectivity. Subsequently the procedure
separately modifies the target specificities of both scaled maps as instructed and
finally averages the two maps (see also Supplemental Material).
Layer-specific external input
inputs:
We distinguish three types of layer-specific external
thalamic afferents
as reconstructed by Binzegger et al. (2004), "gray-matter" external inputs, i.e.
intrinsic non-local inputs entering the local network through the gray matter, which
we estimate based on the properties of axonal clusters (Binzegger et al., 2007),
and "white-matter" external inputs, which include all inputs not covered by the
previous types. The number of the latter is estimated based on the difference of
the number of synapses the different cell types receive according to Binzegger et al.
(2004) and the total synapse count in a given layer (Beaulieu & Colonnier, 1985).
The thalamic afferents are included in the anatomical connectivity map (Binzeg-
ger et al., 2004). We extract the gray-matter inputs from the information on bou-
ton distributions in 3-dimensional space described in Binzegger et al. (2007). The
authors find that boutons of all cell types form multiple clusters and the article
provides the lateral distance of cluster centers and the corresponding somata. We
interpret a cluster to be non-local if the lateral distance to the soma is larger than
≈ 0.56 mm (corresponding to a local network surface area of 1 mm2). By addi-
tionally using data on the relative sizes of different cluster types, we estimate the
proportion of intrinsic gray-matter connections that originate outside of the local
network. Thereupon, we use the estimated proportion of gray-matter inputs and
the number of local connections in our network to calculate the absolute number
of gray-matter inputs.
In this way we construct an estimate of the gray-matter
external inputs that is consistent with both, the axonal structure in Binzegger et al.
(2007) and the structure of our model. The detailed procedure is described in the
Supplemental Material.
The white-matter inputs are estimated based on the comparison of the abso-
lute number of synapses obtained in Binzegger et al. (2004) which only contains
8
Potjans & Diesmann, Connectivity explains cell-type specific activity
the contributions from local, thalamic and gray-matter synapses, with those in
Beaulieu & Colonnier (1985) containing all synapses. The difference has been
termed the "dark matter" of cortex (Binzegger et al., 2004) and, in case of the
excitatory synapses, is usually interpreted as white-matter external inputs. The
explicit numbers are published in Izhikevich & Edelman (2008, their figure 9 of the
supplemental material) at subcellular resolution. As our model is based on point
neurons, we sum over all contributions to a given cell type and average across the
cell types that are collapsed to a single population in our model. Thereby, our esti-
mates take neuronal morphology into account. The resulting counts for the three
external input types as well as the total number of external inputs to the excitatory
populations are given in supplementary Table 7. Since long-range projections tar-
get excitatory as well as inhibitory neurons (Johnson & Burkhalter, 1996; Gonchar
& Burkhalter, 2003), we choose target specificity values for external inputs to be
comparable to recurrent connections, resulting in similar total numbers of external
inputs to inhibitory neurons (Table 3).
The cell-type specific external inputs are used as a reference parametrization
of the model. To comprehensively assess the dependence of the activity on exter-
nal inputs, we conduct simulations in which we choose the external inputs to a
population randomly with uniform distribution: The inputs to the excitatory popu-
lations are constrained by the values from the reference and the layer-independent
parametrization (compare supplementary Fig. 18). Those to inhibitory populations
are chosen such that the target specificity of the external input to a given layer is
between 0 and 0.1 (to L2/3, L4 and L5) and to L6, due to the high number of
external inputs to excitatory cells in this layer, between 0 and 0.2.
Network simulations
The network is defined by eight neuronal populations representing the excitatory
and inhibitory cells in the four layers 2/3, 4, 5 and 6. The populations consist
of current-based leaky integrate-and-fire model neurons with exponential synaptic
currents (see Supplemental Material) and are randomly connected with connection
probabilities according to the integrated connectivity map we derive in this arti-
cle. Every population receives Poissonian background spike trains (Amit & Brunel,
1997; Brunel, 2000a); the firing rates of these inputs are composed by the number
of external inputs a neuron in a particular population receives and the background
spike rate contributed by each synapse. Synaptic strengths and synaptic time con-
stants of all connections are chosen such that an average excitatory postsynaptic
potential (EPSP) has an amplitude of 0.15 mV with a rise time of 1.6 ms and
a width of 8.8 ms mimicking the in vivo situation (Fetz et al., 1991).
Inhibitory
strengths are negative and increased by a factor g compared to the excitatory ones.
Delays in the network are chosen independent of the layer, with excitatory delays
being on average around twice as long as inhibitory delays but the exact ratio
is uncritical. To introduce heterogeneity into the network, we draw the synaptic
strengths and delays from Gaussian distributions (prohibiting a change of sign of
the strengths and constricting delays to be positive and multiples of the computa-
tion step size). The network structure and a complete list of parameters and their
values for the reference network model are systematically described according to
Nordlie et al. (2009) in Tables 2 and 3.
In some cases, we explicitly model the thalamic input to L4 and L6 by a thala-
mic population of 902 neurons (Peters & Payne, 1993) that emit Poissonian spike
trains at a given rate in some prescribed time interval. These relay cells are ran-
9
Potjans & Diesmann, Connectivity explains cell-type specific activity
A: Model summary
Populations
Topology
Connectivity
Neuron model
nine; eight cortical populations and one thalamic population
--
random connections
cortex: leaky integrate-and-fire, fixed voltage threshold, fixed absolute
refractory period (voltage clamp), thalamus: fixed-rate Poisson
Synapse model exponential-shaped postsynaptic currents
Plasticity
Input
Measurements spike activity, membrane potentials
B: Populations
--
cortex: independent fixed-rate Poisson spike trains
Type
Elements
Cortical network iaf neurons
Th
Poisson
Number of populations Population size
N (type-specific)
eight, two per layer
one
Nth
C: Connectivity
Type
Weights
Delays
random connections with independently chosen pre- and postsynaptic
neurons; see Table 3 for probabilities
fixed, drawn from Gaussian distribution
fixed, drawn from Gaussian distribution multiples of sim. stepsize
D: Neuron and synapse model
Name
Type
Subthreshold
dynamics
Spiking
+ I(t)
Cm
τm
iaf neuron
leaky integrate-and-fire, exponential-shaped synaptic current inputs
dt = − V
dV
V (t) = Vreset
Isyn(t) = w e−t/τsyn
If V (t−) < θ ∧ V (t+) ≥ θ
1. set t∗ = t, 2. emit spike with time stamp t∗
if (t > t∗ + τref)
else
Type
Background
Target
iaf neurons
E: Input
Description
independent Poisson spikes (see Table 3)
F: Measurements
Spiking activity and membrane potentials from a subset of neurons in every population
Table 2: Model description after Nordlie et al. (2009).
10
Potjans & Diesmann, Connectivity explains cell-type specific activity
L2/3e L2/3i L4e
Name
Population size N 20683 5834 21915 5479
External inputs kext 1600 1500 2100 1900
Background rate νbg 8 Hz
L4i
B+E: Populations and Inputs
L5i
1065
1900
L5e
4850
2000
L6i
L6e
14395 2948
2900
Th
902
2100 --
L4i
L6e
L5i
0.008
0.0
0.004
0.0
0.0003 0.045
0.106
0.0
0.020
0.373
0.316
0.009
0.040
0.020
0.008
0.066
C: Connectivity
from
L5e
0.032
0.075
0.007
0.003
0.083
0.060
0.057
0.028
Description
excitatory synaptic strengths
relative inhibitory synaptic strength
excitatory synaptic transmission delays
inhibitory synaptic transmission delays
L2/3e L2/3i L4e
0.101 0.169 0.044 0.082
0.135 0.137 0.032 0.052
0.008 0.006 0.050 0.135
0.069 0.003 0.079 0.160
0.100 0.062 0.051 0.006
0.055 0.027 0.026 0.002
0.016 0.007 0.021 0.017
0.036 0.001 0.003 0.001
Value
87.8 ± 8.8 pA
−4
1.5 ± 0.75 ms
0.8 ± 0.4 ms
L6i
0.0
0.0
0.0
0.0
0.0
0.0
0.225
0.144
Th
0.0
0.0
0.0983
0.0619
0.0
0.0
0.0512
0.0196
L2/3e
L2/3i
L4e
L4i
L5e
L5i
L6e
L6i
to
Name
w ± δw
g
de ± δde
di ± δdi
Name
τm
τref
τsyn
Cm
Vreset
θ
νth
Table 3: Parameter specification. The categories refer to the model description
in Table 2.
D: Neuron Model
Description
membrane time constant
absolute refractory period
postsynaptic current time constant
membrane capacity
reset potential
fixed firing threshold
thalamic firing rate during input period
Value
10 ms
2 ms
0.5 ms
250 pF
−65 mV
−50 mV
15 Hz
11
Potjans & Diesmann, Connectivity explains cell-type specific activity
domly connected to the cortex with the cell-type specific connection probabilities
according to Binzegger et al. (2004), see Table 3.
To instantiate the network model we randomly draw for every synapse the pre-
and the postsynaptic neuron. In contrast to the often used convergent and diver-
gent connectivity schemes (Eppler et al., 2009), this procedure results in binomially
distributed numbers of incoming and outgoing synapses. In practice, we could first
calculate the total number of synapses forming a connection by inverting eq. (1)
and then successively create the synapses. In a distributed simulation setup, how-
ever, this procedure is inefficient because the neurons are distributed over multiple
processes. Although a synapse is only created if the postsynaptic neuron is local to
the process (Morrison et al., 2005) the full algorithm would have to be carried out
on each process. We solve this problem by calculating a priori how many synapses
will be created locally on each process, exploiting that the distribution of synapses
over processes is multinomial. Subsequently we apply the serial algorithm on every
machine to the local synapses only: The presynaptic neuron is drawn from all neu-
rons in the presynaptic population and the postsynaptic cell on a given process is
drawn only from the neurons located on this process (compare supplementary Fig.
16). While the first step is serial, but efficient for the number of processes we typ-
ically employ, the second step is fully parallelized. The procedure is detailed in the
Supplemental Material. A reference implementation of this algorithm will be made
available in the NEST simulation tool (http://www.nest-initiative.org) as
RandomPopulationConnect.
All simulations are carried out with the NEST simulation tool (Gewaltig &
Diesmann, 2007) using a grid constrained solver and a computation step size
h = 0.1 ms on a compute cluster with 24 nodes each equipped with 2 quad core
AMD Opteron 2834 processors and interconnected by a 24 port Voltaire InfiniBand
switch ISR9024D-M. 48 cores simulate the network of around 80,000 neurons and
0.3 billion synapses in close to real-time (Djurfeldt et al., 2010).
Results
Comparison of connectivity maps
The anatomical and the physiological connectivity maps exhibit a similar struc-
ture (Fig. 2): Recurrent within-layer connections are all non-zero with connection
probabilities tending to decrease from superficial to deeper layers, excepting the
physiological interneuron to interneuron connections which are, however, subject
to poor statistics (Table 1). The inter-layer connections can be subdivided into
connections with similar probabilities as within-layer connections and those with
values close or equal to zero. Consequently, the recurrence strength, quantifying
the relative strength of recurrent within-layer connections, is greater than one and
statistically indistinguishable for the two maps (z-test, P > 0.1, Fig. 2C). Similarly,
the loop strength, comparing the connectivity of the feed-forward loop to all other
inter-layer connections, is indistinguishable (z-test, P > 0.05, Fig. 2D). However,
50% of the scaling factors of inter-layer connections are large (L2/3e to L4i, L5e
to L2/3e, L4i to L2/3e and L4i to L2/3i) for both, the raw and the modified data.
Lateral connectivity
In contrast to the largely consistent relative measures (Fig. 2C and D), absolute
connection probability values differ (supplementary Table 6). We hypothesize that
12
Potjans & Diesmann, Connectivity explains cell-type specific activity
Figure 2: Properties of connectivity maps. (A) Connection probabilities accord-
ing to the anatomical (top panel, circles) and physiological connectivity map (cen-
ter panel, squares) and corresponding scaling factors (bottom panel, triangles).
Both, raw (closed markers) and modified (open markers) are shown. The data are
horizontally arranged according to their classification as within-layer (black) and
inter-layer (gray) connections. For a given pair of pre- and post-synaptic layer,
the data are arranged from left to right according to connection types: excita-
tory to excitatory, excitatory to inhibitory, inhibitory to excitatory and inhibitory
to inhibitory. L5i to L5e/i outside of the displayed range, see supplementary Ta-
ble 6. Error bars are minimal statistical errors (see Supplemental Material). (B)
Sampling radius dependence of anatomical connection probability (solid: eq. (1),
dashed: eq. (2)) and of the product of connection probability and area (dotted)
in double-logarithmic representation. (C) Anatomical and physiological recurrence
strength. (D) Anatomical and physiological loop strength. Error bars in C and
D are based on the minimal statistical error estimates of connection probabilities
using error propagation.
13
0.00.10.2anatomicalconnection probabilitiesconnectionprobabilityABCD0.00.20.40.6physiological15101520scaling factorL2/3 to L2/3 L4 to L4 L5 to L5 L6 to L6 L2/3 to L4 L2/3 to L5 L2/3 to L6 L4 to L2/3 L4 to L5 L4 to L6 L5 to L2/3 L5 to L4 L5 to L6 L6 to L2/3 L6 to L4 L6 to L5anat.phys.024recurrence strengthanat.phys.024loop strength0.10.51.0sampling radius [mm]0.010.11.0Potjans & Diesmann, Connectivity explains cell-type specific activity
the differences in the mean connection probabilities are explained by differences in
the methodology applied to obtain the connectivity maps: Physiological recordings
in slices are usually restricted to a maximal lateral distance of the somata of around
100 µm (as reported in Thomson & Morris (2002) for the raw physiological map).
The anatomical data, in contrast, are based on reconstructed axons and dendrites,
with axons extending up to 4mm (Binzegger et al., 2007), in general beyond 1mm.
When providing absolute numbers, Binzegger et al. (2004) refer to the surface area
of cat area 17 (399 mm2).
We employ a Gaussian lateral connectivity model (eq. (4)), similar to the one
by Hellwig (2000); Buzas et al. (2006) to account for the different experimental
sampling radii (see Materials and Methods). We assume the model to reflect the
in vivo connectivity structure and the experimental connectivity maps to charac-
terize samples of this structure. The anatomical measurement is interpreted as
an unconstrained sampling over the complete lateral connectivity structure while
the physiological measurement corresponds to a local measure sampling from the
center region of the Gaussian (Fig. 3A).
The model parameters, peak connection probability and lateral spread, are
determined based on the mean connection probabilities of the two maps and the
physiological sampling radius (eqs. (5) and (6), Fig. 3). The estimated lateral
spread is consistent with data from rat and cat primary visual cortex based on the
potential connectivity method: Hellwig (2000), caption to his figure 7, reports a
lateral spread of 150 to 310 µm, Stepanyants et al. (2008), their figure 7, find a
spread of around 200 µm of main projections in input and output maps. Also the
overall connectivity level of 0.138 for nearby neurons with a distance of 100µm is in
good agreement with the extensively used estimate of 0.1 provided by Braitenberg
& Schuz (1998). These consistencies indicate that our underlying assumption
-- anatomical and physiological experiments sample independently from the same
lateral connectivity profile -- is valid.
Average model connectivity Our network model does not incorporate a lateral
connectivity structure but randomly connected populations. We use the Gaussian
lateral connectivity model exclusively to determine the average connection proba-
bility for a given network size (eq. (7), Fig. 3D). The connectivity of small networks
(up to about 7,000 neurons) is largely determined by the physiological connectivity
and the one of large networks (above 100,000 neurons) by the anatomical con-
nection probability (decaying quadratically, see Fig. 2B). For intermediate network
sizes, eq. (7) interpolates between these two extremes according to the Gaussian
lateral connectivity profile. Fig. 3E shows the average synaptic convergence as a
function of the network size. It reveals that only for large networks the majority of
local synapses is represented in the model: for example a network of around 80,000
neurons comprises more than 85% of all local synapses. In contrast, a network of
e.g. 10,000 neurons represents only around 20% of the local connectivity. There-
fore, we select our network to correspond to 1 mm2 of cortical surface (77,169
neurons).
According to our analysis the maximal average number of synapses per neuron
is about 5,000. This number is consistent with the data of Binzegger et al.(2004,
see their figure 11A). In Fig. 3 we also display the connectivities and convergences
of a selection of other modeling studies on the local cortical network (some data
representing local networks embedded in larger networks). Independent of model
size most studies use a connection probability around 0.1 which is largely consistent
14
Potjans & Diesmann, Connectivity explains cell-type specific activity
Figure 3: Lateral connectivity model. (A) Two dimensional Gaussian with two
cylinders indicating the lateral sampling of the anatomical (gray outer cylinder) and
the physiological (black inner cylinder) experiments. (B) Estimated peak amplitude
and (C) lateral spread of the connectivity model based on mean connectivity of
the anatomical and physiological raw and modified maps. (D) Average connection
probability and (E) average synaptic convergence (average number of synaptic
inputs per neuron) of the layered network model as a function of the network
size expressed in number of neurons. The dashed horizontal line marks 85% of
the maximal synaptic convergence in the local network. Black diamonds show
the data used in our simulations, further markers indicate other published cortical
network models: Haeusler & Maass (2007) (light gray square), Izhikevich (2006)
(light gray triangle), Izhikevich et al. (2004) (light gray circle, embedded local
network is defined by the area receiving connections from a single long-range axon),
Lundqvist et al. (2006); Djurfeldt et al. (2008) (light gray diamond, local network
represented by one hypercolumn), Vogels & Abbott (2005); Vogels et al. (2005)
(dark gray circle), Sussillo et al. (2007) (dark gray square), Brunel (2000a) (dark
gray triangle), Kriener et al. (2008) (dark gray diamond), Kumar et al. (2008)
(black circles), Morrison et al. (2007) (black square).
15
Potjans & Diesmann, Connectivity explains cell-type specific activity
with our results. Only for large networks of 50,000 neurons and more, this con-
nection probability is above our estimate. Two studies use a significantly smaller
connection probabilities of 0.02, arguing that this value interpolates between high
local and low distal connectivity. Although the absolute numbers differ from our
estimates, the reasoning is the same as for our model. In all but two cases (Mor-
rison et al., 2007; Kumar et al., 2008) the models' convergence is maximally 20%
of the anatomical estimate.
Randomness and specificity
A central assumption of the anatomical connectivity map is randomness,
i.e.
synapses are established independent of the pre- and postsynaptic cell type. Never-
theless, the target specificity estimates of the anatomical connectivity map (circles
in Fig. 4) are > 0.2, reflecting a preferential selection of excitatory targets. The
bias is introduced by the application of Peters' rule, which assumes synaptic densi-
ties on dendrites to be independent of cell-type, to bouton densities and dendritic
lengths. Furthermore, some projections exhibit very high values > 0.5 because
only the dendrites of excitatory cells, but barely those of inhibitory cells, reach into
the cloud of presynaptic axonal elements.
The target specificity values of the physiological map contrast with the anatomi-
cal findings. Most values (squares in Fig. 4) are consistently smaller and show larger
variability than the anatomical estimates. In addition, excitatory within-layer con-
nections of the raw connectivity map univocally select their targets independent
of the postsynaptic type. Several projections in the physiological map, however,
connect exclusively to excitatory neurons due to incomplete sampling of inhibitory
subtypes. This highlights that a straightforward application of the physiological
connectivity map in simulations results in artifacts due to missing feed-forward
inhibition. Finally, the projection from L2/3e to L4 specifically targets inhibitory,
but not excitatory cells (see also Table 1).
The specific selection of inhibitory targets of the L2/3e to L4 projection cannot
be explained by differences in the overlap of the excitatory and inhibitory dendrites
with the excitatory axons and is therefore beyond the scope of anatomical studies
relying on the statistics of neuronal morphology such as Peters' rule (Binzegger
et al., 2004) and also potential connectivity (Stepanyants et al., 2008). The speci-
ficity in the inter-layer circuitry explains the large scaling factor of this projection
(Fig. 2A).
We identify three additional candidates of specific target type selection: L5e to
L2/3 (Dantzker & Callaway (2000); Thomson & Bannister (1998); Thomson et al.
(2002); Lefort et al. (2009)) L2/3e to L6 (Zarrinpar & Callaway, 2006) and L6e
to L4 (McGuire et al., 1984), see Supplemental Material for details on the choice
of these candidates. The structure of these projections has not been quantified
comprehensively in paired recordings and evidence suggests that the target type
selection is less strict than for the L2/3e to L4 projection. We tentatively assume
them to have intermediate values (triangles in Fig. 4). Two of these projections
(L2/3e to L4 and L5e to L2/3) are inverse to the feed-forward loop. Thomson
& Morris (2002); Thomson et al. (2002) argued that the specific target type
selection plays a distinct functional role because the inhibition-specific ("i-specific")
feedback projections may prevent reverberant excitation involving L2/3, L4 and L5
and enhance the propagation of synchronous thalamic inputs.
We utilize the information on i-specific feedback and the anatomical estimates
to remove for some projections the methodological biases by consistently mod-
16
Potjans & Diesmann, Connectivity explains cell-type specific activity
Figure 4: Anatomical (circles) and physiological (squares) target specificity es-
timates based on the modified connectivity maps. +1(−1) indicates exclusive
selection of excitatory (inhibitory) targets, 0 random selection. Triangles show
additional candidates of inhibition-specific projections discovered in photostimula-
tion or electron microscopy studies. The shaded area highlights the estimates of
within-layer projections and inter-layer projections with target specificity values be-
tween 0 and 0.5 ("non-specific" connections). Within these bounds the anatomical
and physiological estimates are 0.32 ± 0.07 and −0.17 ± 0.28, respectively. The
largest statistically well constrained values from a single laboratory are exhibited
by the projections L2/3e to L2/3, L4e to L4 and L5e to L5 (compare supplemen-
tary Table 6) of the raw physiological map. The target specificity of these data is
−0.01 ± 0.03. The four highlighted data points are candidates of specific target
type selection. For every pair pre- and post-synaptic layer the figure shows data
both pre-synaptic neuron types (left: excitatory, right: inhibitory).
17
-1.0-0.50.00.51.0target specificityL2/3 to L2/3 L4 to L4 L5 to L5 L6 to L6 L2/3 to L4 L2/3 to L5 L2/3 to L6 L4 to L2/3 L4 to L5 L4 to L6 L5 to L2/3 L5 to L4 L5 to L6 L6 to L2/3 L6 to L4 L6 to L5Potjans & Diesmann, Connectivity explains cell-type specific activity
projection
L2/3e to L4
L5e to L2/3
L2/3e to L6
L6e to L4
L2/3e to L5
L4e to L5
L2/3i to L5
L4i to L2/3
data source
T
-0.8 Thomson et al. 2002
-0.4 Dantzker & Callaway 2000
-0.4 Zarrinpar & Callaway 2006
-0.4 McGuire et al. 1984
0.29 Binzegger et al. 2004
0.32 Binzegger et al. 2004
0.4 Binzegger et al. 2004
0.23 Binzegger et al. 2004
Table 4: Amendment candidates for target specificity. The rows describe the
projections whose target specificities are modified during the compilation of the
integrated connectivity map. For each projection the second column states the
target specificity value T after the amendment, the third the publication on which
the modification is based. The top four rows are the candidate projections for
a preference of inhibitory targets.
In these cases, no quantitative estimates are
known. T = −0.8 is set if the literature provides a strong indication and T = −0.4
for a comparably weak indication (compare Supplemental Material). The T -values
of the bottom four rows are based on the anatomical map and provide estimates of
the previously not measured connections to inhibitory neurons for the physiological
map.
ifying the respective target specificities (see Materials and Methods and Table
4). Thereby, we estimate previously not measured physiological connection prob-
abilities and introduce the specific selection of targets into the anatomical map.
The latter constitutes an effective redistribution of synapses and corresponds to a
refinement of Peter's rule (supplementary Fig. 13).
Integrated connectivity map
Based on the information gathered in the previous sections we now compile an inte-
grated connectivity map. Our algorithmic compilation (see Materials and Methods)
accounts for the differences in the lateral sampling of the two methods and corrects
for methodological shortcomings expressed in the target specificity of projections
(Table 4) by incorporating photostimulation and electron microscopy data.
The resulting connection probabilities are shown in the upper panel of Fig. 5.
Visual inspection shows that the overall structure of the original connectivity maps
is preserved. For a consistency check, we calculate the scaling factors between
our integrated map and the recently published data for excitatory to excitatory
connections of mouse C2 barrel column (Lefort et al., 2009).
In this comparison
we combine the data of Lefort et al. on L2 and L3 to L2/3 and on L5A and L5B
to L5 according to eq. (3). The scaling factors (see Fig. 5, center panel) are low,
indicating a good agreement of the connectivity maps. The main outlier is the
recurrent L4e to L4e connection, which exhibits the highest connection probability
in the study of Lefort et al. (2009) but rather low values in the physiological
and especially the anatomical map. The lower panel of Fig. 5 shows the target
specificity values of the integrated connectivity map. Within-layer projections select
their targets randomly and inter-layer projections inherit mostly the properties of
the anatomical map, except for the four candidate i-specific projections.
The cell-type specific convergences and divergences (Fig. 6) show that the in-
tegrated connectivity map reflects prominent features of local cortical connectivity:
18
Potjans & Diesmann, Connectivity explains cell-type specific activity
Figure 5: Properties of the integrated connectivity map. Layout of graphs as in
Fig. 2 and Fig. 4 respectively. The top panel shows the connection probabilities of
the model (L5i to L5e/i outside the displayed range, see Table 3). The center panel
shows the scaling factors between the integrated map, restricted to excitatory to
excitatory connections, and the recently published map of Lefort et al. (2009).
The bottom panel shows the target specificity of the integrated connectivity map
(within-layer connections: −0.02 ± 0.17, non-specific inter-layer connections, see
Fig. 4: 0.33 ± 0.08).
19
-1.0-0.50.00.51.0target specificityscaling factorconnection probabilityL2/3 to L2/3 L4 to L4 L5 to L5 L6 to L6 L2/3 to L4 L2/3 to L5 L2/3 to L6 L4 to L2/3 L4 to L5 L4 to L6 L5 to L2/3 L5 to L4 L5 to L6 L6 to L2/3 L6 to L4 L6 to L50.00.10.2123Potjans & Diesmann, Connectivity explains cell-type specific activity
Except for L5e, convergence is dominated by within-layer connections (consistent
with e.g. Douglas & Martin, 1991, 2004). Furthermore, the strongest inter-layer
excitatory to excitatory divergences correspond to the feed-forward loop from L4
to L2/3 to L5 to L6 and back to L4 (Gilbert, 1983; Gilbert & Wiesel, 1983).
The excitatory to inhibitory divergence is dominated by the i-specific feedback
connections.
By comparing the average convergence and divergence to the neuronal densities
of the different cell populations (supplementary Fig. 14) we find that neurons in
the local microcircuit sample most excitatory inputs from L2/3 and fewest from
L5 and L6. In contrast, local outputs within the microcircuit project preferentially
to L5.
External inputs The model consists in total of about 217 million excitatory
and 82 million inhibitory synapses. The inhibitory synapse count is consistent with
Beaulieu & Colonnier (1985) (64 ± 21 million) while the number of excitatory
synapses is lower than their estimate (339± 43 million) presumably reflecting that
a fraction of all excitatory synapses originates outside of the local network. The
ratio of local synapses (total number of synapses in our network model) and all
synapses (according to the countings of Beaulieu & Colonnier (1985)) is 0.74,
similar to the ratio reported by Binzegger et al. (2004), but see Stepanyants et al.
(2009).
The layer-specific external input structure distinguishes between thalamic af-
ferents, gray-matter and white-matter inputs (see Materials and Methods). The
resulting total number of external inputs per neuron (Table 3) is lowest in L2/3,
intermediate in L4 and L5 and highest in L6. This relative structure is largely
dominated by the white-matter inputs. In contrast, most gray-matter long-range
inputs form synapses on L2/3 neurons and fewest form synapses in L6. Given the
presently available data, we cannot exclude that some synapses treated here as
external input actually represent a pathway in the local microcircuit still awaiting
comprehensive experimental assessment.
Spontaneous layer-specific activity
The simulated spontaneous spiking activity of all cell types corresponds to the
asynchronous irregular activity state observed in mono-layered balanced random
network models (Amit & Brunel, 1997; Brunel, 2000a). Fig. 7 (A-D) shows the
ongoing spontaneous spiking activity of all populations and the corresponding firing
rates, irregularity and synchrony. The activity varies significantly across cell types.
L2/3e and L6e exhibit the lowest firing rates with a mean below or close to 1 Hz.
L4e cells fire more rapidly at around 4 Hz and L5e cells at more than 7 Hz. In all
layers, inhibitory firing exceeds excitatory rates. The boxplots furthermore visualize
that the firing rates of single neurons can differ substantially. For instance in
L2/3e, several neurons fire at more than 5 Hz while the majority of neurons is
rather quiescent emitting less than one spike per second. This effect is due to the
binomially distributed convergence.
Single unit activity is irregular; the mean of the single unit coefficients of
variation of the inter-spike intervals is greater than 0.8. The population activity
is largely asynchronous, but exhibits fast oscillations with low amplitude similar
to balanced random networks (e.g. Brunel, 2000a). We assess the synchrony of
every population's multi-unit activity by the variability of the spike count histogram
(Fig. 7D). At the given firing rates and bin width, the synchrony of the spiking
20
Potjans & Diesmann, Connectivity explains cell-type specific activity
Figure 6: Cell-type specific convergence (A) and divergence (B) of the integrated
connectivity map. The histograms display blocks of data for the four different
connection types between excitatory (e) and inhibitory (i) neurons (as indicated).
For a neuron in the layer specified on the horizontal axis, the individual bar segments
show the absolute number of synapses the neuron receives from a source layer
(convergence) or establishes in a target layer (divergence). Bar segments are
arranged according to the physical location of the layers in the cortex (from top
to bottom: L2/3, L4, L5, L6). Hatched bars represent within-layer connections.
Lightness of gray increases from superficial to deeper layers. Gray horizontal lines
indicate the convergence and divergence of a balanced random network with the
same total number of neurons and synapses as the layered model.
21
010002000300040005000convergencee to eAi to ee to ii to i010002000300040005000divergenceL2/3L4L5L6e to eBL2/3L4L5L6e to iL2/3L4L5L6i to eL2/3L4L5L6i to iPotjans & Diesmann, Connectivity explains cell-type specific activity
Figure 7: Spontaneous cell-type specific activity.
(A) Raster plot of spiking
activity recorded for 400 ms of biological time of layers 2/3, 4, 5 and 6 (from
top to bottom; black: excitatory, gray: inhibitory). Relative number of displayed
spike trains corresponds to the relative number of neurons in the network (total
of 1862 shown). (B-D) Statistics of the spiking activity of all eight populations
in the network based on 1000 spike trains recorded for 60 s (B and C) and 5 s
(D) for every population. (B) Boxplot (Tukey, 1977) of single-unit firing rates.
Crosses show outliers, stars indicate the mean firing rate of the population. (C)
Irregularity of single-unit spike trains quantified by the coefficient of variation of
the inter-spike intervals. (D) Synchrony of multi-unit spiking activity quantified by
the variance of the spike count histogram (bin width 3 ms) divided by its mean.
(E-H) Histograms of the excitatory and inhibitory population firing rates for L2/3
(E), L4 (F), L5 (G) and L6 (H) for randomly drawn external inputs (100 trials, see
Materials and Methods for details).
22
100200300400time [ms]L6L5L4L2/3ABCDEFGH0510152025firing rates [Hz]L6L5L4L2/30.00.20.40.60.81.0irregularityL6L5L4L2/302468synchronyL6L5L4L2/3051015firing rates [Hz]L6 (a.u.)0510152025firing rates [Hz]L5 (a.u.)0510firing rates [Hz]L4 (a.u.)0510firing rates [Hz]L2/3 (a.u.)Potjans & Diesmann, Connectivity explains cell-type specific activity
activity is highest in L5e and lowest in L6. The synchrony of the membrane
potential traces (Golomb, 2007, supplementary Fig. 20) confirms that the activity
is asynchronous.
The observed activity features of the network do not depend on the specific
structure of the external inputs: replacing the Poissonian background by a constant
current (DC) to all neurons (supplementary Fig. 17) or applying layer-independent
Poissonian background inputs (supplementary Fig. 18) yields similar results. Ran-
dom selection of the number of external inputs (see Materials and Methods) also
confirms the previous findings: Fig. 7 (E-H) shows the histograms of the population
firing rates in the different layers for excitatory and inhibitory cells, respectively.
The distribution of excitatory population firing rates in L2/3 and L6 are persistently
low. L5e activity exhibits the highest firing rates and also the largest variability.
L4e and the inhibitory populations vary only slightly with mean firing rates similar
to the reference parametrization (Fig. 7B). Apparently, the local microcircuitry
reconfigures the firing rate distributions for different input situations while con-
serving general features like the low rate regime in L2/3e and L6e. In 85% of the
simulations, L2/3e and L6e fire at a lower rate than L4e and simultaneously L5e
exhibits the highest firing rate. Also, we observe the inhibitory firing rate within a
given layer to be higher than the excitatory rate in 83% of all cases.
Comparison to in vivo activity Table 5 contrasts the experimentally observed
firing rates in individual layers with our simulation results. Experimentally, the
spontaneous activity of L2/3e pyramids has been studied extensively. Consistent
over species and areas the firing rate is below 1Hz, in good quantitative agreement
with the model. The L6e firing rates are similar to the model values, although the
experimental data base is more sparse. The L4e and L5e firing rates of rat primary
somato-sensory cortex are lower than in the model, but L5e consistently shows the
highest spontaneous activity, also in rat auditory cortex. The activity of cortico-
tectal cells in L5 (and L4) of various cortices in the rabbit is slightly higher. Several
studies provide data on putative interneurons (Swadlow, 1988, 1989, 1991, 1994;
Sakata & Harris, 2009), demonstrating that inhibitory activity is typically higher
than that of excitatory cells. The statistics of single neuron spike trains in our
model show great variations due to the random connectivity which also imposes
a variance in the convergence of inputs. Therefore, "neighboring" neurons, i.e.
neurons with statistically identical connectivity, can exhibit very different firing
rates, which has also been observed experimentally (e.g. Swadlow, 1988; Heimel
et al., 2005; de Kock & Sakmann, 2009).
Stability of the network activity The low-rate asynchronous irregular (AI)
firing regime has been considered to be the ground state of cortical activity (Amit
& Brunel, 1997). For the balanced random network model, the region of stability
of the AI state is bounded by the relative strength of inhibitory synapses (> 4)
and sufficiently high background rates (Brunel, 2000a). Fig. 8 characterizes the AI
state of the layered network. As in the balanced random network model, the layered
network requires sufficient external input and sufficiently strong inhibitory coupling
to enter the AI state.
Increasing the background rate predominantly affects the
activity of L4e, while an increase of the relative inhibitory synaptic strength de-
creases mostly the activity of L5e cells. Consequently, the order of excitatory firing
rates (smallest in L2/3 and L6, highest in L5) is largely preserved except for large
relative inhibitory synaptic strengths (combined with large background rates).
23
Potjans & Diesmann, Connectivity explains cell-type specific activity
i
d
e
n
a
t
b
o
s
e
t
a
r
g
n
i
r
fi
n
a
e
m
d
e
v
l
o
s
e
r
-
r
e
y
a
l
e
h
t
w
o
h
s
s
n
m
u
o
c
l
l
a
c
i
r
e
m
u
N
.
s
e
t
a
r
g
n
i
r
fi
c
fi
i
c
e
p
s
e
p
y
t
-
l
l
e
c
d
e
t
a
u
m
l
i
s
d
n
a
d
e
r
u
s
a
e
m
y
l
l
a
t
n
e
m
i
r
e
p
x
E
:
5
e
l
b
a
T
s
a
e
r
a
d
e
t
a
g
i
t
s
e
v
n
i
e
h
T
.
)
n
o
i
t
a
i
v
e
d
d
r
a
d
n
a
t
s
e
h
t
y
l
l
a
n
o
i
t
i
d
d
a
s
e
t
a
c
i
d
n
i
w
o
r
t
s
a
l
(
y
d
u
t
s
g
n
i
l
e
d
o
m
t
n
e
s
e
r
p
e
h
t
n
i
d
n
a
i
s
g
n
d
r
o
c
e
r
l
a
m
n
a
i
e
k
a
w
a
o
v
i
v
n
i
n
i
d
e
t
a
g
i
t
s
e
v
n
i
s
a
e
r
a
r
u
o
f
e
h
T
.
x
e
t
r
o
c
y
r
o
t
i
d
u
a
y
r
a
m
i
r
p
:
1
A
,
x
e
t
r
o
c
r
o
t
o
m
y
r
a
m
i
r
p
:
1
M
,
x
e
t
r
o
c
l
a
u
s
i
v
y
r
a
m
i
r
p
:
1
V
,
x
e
t
r
o
c
y
r
o
s
n
e
s
-
o
t
a
m
o
s
y
r
a
m
i
r
p
:
1
S
e
r
a
5
L
,
s
e
i
d
u
t
s
r
u
o
f
e
s
e
h
t
n
I
.
y
l
e
v
i
t
c
e
p
s
e
r
,
1
M
d
n
a
)
x
e
t
r
o
c
y
r
o
s
n
e
s
-
o
t
a
m
o
s
y
r
a
d
n
o
c
e
s
(
2
S
,
1
S
,
1
V
e
r
a
)
4
9
9
1
,
1
9
9
1
,
9
8
9
1
,
8
8
9
1
(
l
w
o
d
a
w
S
y
b
t
i
b
b
a
r
e
h
t
n
i
)
8
0
0
2
(
n
e
s
r
e
t
e
P
&
t
e
l
u
o
P
;
)
6
0
0
2
(
n
e
s
r
e
t
e
P
&
t
e
h
c
o
r
C
)
4
9
9
1
,
1
9
9
1
,
9
8
9
1
,
8
8
9
1
(
w
o
d
a
w
S
l
)
5
0
0
2
(
.
l
a
t
e
l
e
m
i
e
H
)
9
0
0
2
(
n
n
a
m
k
a
S
&
k
c
o
K
e
d
)
9
0
0
2
(
s
i
r
r
a
H
&
a
t
a
k
a
S
)
8
0
0
2
(
.
l
a
t
e
g
r
e
b
n
e
e
r
G
)
6
0
0
2
(
.
l
a
t
e
e
e
L
5
.
0
--
1
<
4
7
.
0
--
--
--
--
--
--
3
-
2
4
-
3
7
-
4
7
.
1
4
.
1
--
--
5
3
.
0
--
--
--
1
6
.
0
4
4
.
0
6
3
.
0
3
.
0
1
<
1
<
9
1
.
0
1
S
1
V
1
M
1
S
1
A
e
s
u
o
M
t
a
R
t
a
R
t
a
R
t
a
R
s
a
e
r
a
4
t
i
b
b
a
R
1
V
l
e
r
r
i
u
q
S
H
-
E
7
B
7
.
g
F
i
.
g
F
i
9
.
0
±
6
5
.
0
9
0
.
1
1
.
6
±
1
1
9
5
.
7
1
.
1
±
8
.
4
5
4
.
4
8
.
0
±
1
1
.
1
6
8
.
0
e
c
n
e
r
e
f
e
r
m
o
d
n
a
r
l
e
d
o
M
l
e
d
o
M
]
z
H
[
s
e
t
a
r
g
n
i
r
i
F
e
c
r
u
o
s
a
t
a
d
e
6
L
e
5
L
e
4
L
e
3
/
2
L
a
e
r
A
s
e
i
c
e
p
S
24
e
h
t
o
t
r
e
f
e
r
s
t
l
u
s
e
r
l
e
d
o
m
e
h
T
i
.
s
n
a
d
e
m
e
h
t
e
r
a
l
e
r
r
i
u
q
s
y
a
r
g
e
h
t
r
o
f
a
t
a
d
e
h
T
.
4
L
n
i
d
e
t
a
c
o
l
o
s
l
a
y
l
t
r
a
p
e
r
a
t
a
h
t
s
l
l
e
c
l
a
t
c
e
t
-
o
c
i
t
r
o
c
o
t
s
d
n
o
p
s
e
r
r
o
c
.
s
t
u
p
n
i
l
a
n
r
e
t
x
e
g
n
i
y
r
a
v
r
o
f
s
e
t
a
r
n
o
i
t
a
u
p
o
p
l
e
h
t
f
o
d
t
s
o
t
d
n
a
n
o
i
t
a
z
i
r
t
e
m
a
r
a
p
e
c
n
e
r
e
f
e
r
±
n
a
e
m
e
h
t
Potjans & Diesmann, Connectivity explains cell-type specific activity
Figure 8: Dependence of network activity on the external background firing rate
and the relative inhibitory synaptic strength. White stars mark the reference pa-
rameter set. (A) Population firing rates of excitatory populations in layers 2/3
(squares), 4 (diamonds), 5 (circles) and 6 (triangles), lightness increases with cor-
tical depth, as a function of the background rate with fixed relative inhibitory
synaptic strength (4). (B) AIness%, the percentage of populations with firing rate
below 30 Hz, irregularity between 0.7 and 1.2, and synchrony below 8 (data col-
lected for 5 s per simulation), as a function of the background rate and the relative
inhibitory synaptic strength. Labeled black iso-lines indicate areas where 50%,
75% and 100% of all populations fire asynchronously and irregularly at low rate.
Dashed iso-lines confine the area where the firing rates are ordered in accordance
to Table 5. (C) Population firing rates of excitatory populations as a function of
the relative inhibitory synaptic strength at fixed background rate (8 Hz) (markers
as in A).
25
246810relative inh. synaptic strength468101214background rate [Hz]50%50%75%75%100%0%50%100%AIness%0481216firing rates [Hz]01020firing rates [Hz]CBAPotjans & Diesmann, Connectivity explains cell-type specific activity
Figure 9: Relevance of target specificity for network stability. (A) Population firing
rates (top panel) and synchrony (bottom panel), both in logarithmic representation,
as a function of the target specificity of candidate projections L2/3e to L4 (negative
values twice as large), L2/3e to L6, L5e to L2/3 and L6e to L4. A target specificity
of 0 reflects random connectivity, gray-shaded area marks range of target specificity
of other inter-layer connections (0.33 ± 0.08). (B) Population firing rates of the
model with target specificity of candidate projections of +0.4 as a function of
the asymmetry of excitatory to inhibitory and excitatory to excitatory synaptic
strengths (defined as (wie − wee)/(wie + wee), with fixed mean excitatory synaptic
strength). Stars indicate firing rates of the reference model with target specificity
of candidate projections of −0.4.
(C) As B, but as a function of the relative
inhibitory synaptic strength. All markers as in Fig. 8A.
Role of i-specific projections for the stability of the AI state In the
following we conduct a series of simulation experiments where we alter the target
type selection of the i-specific projections. The modifications affect exclusively the
target specificity of these projections (upper four rows in Table 4). Technically,
we compile for each parameter set a new connectivity map algorithmically (see
Materials and Methods) so that the experimental data are fully respected. Fig. 9A
shows that the firing rates and the synchrony of the excitatory populations first
increase exponentially and then superexponentially when the target specificity of
the four candidate projections approach random connectivity and then the level of
other inter-layer connections, before the spike rates saturate for target specificity
values above 0.2. The increase in synchronization precedes the firing rate increases.
For L6e, we observe two outliers at T = 0.2 and 0.25 where the activity in this layer
corresponds to the low-rate AI state. This is likely due to the strong within-layer
inhibitory feedback in L6 and the high amount of random external inputs to L6e.
The general trend for L6 is nevertheless the same as for the other layers.
The modification of target specificity not only changes the local microcircuit
at the level of specific cell types but also the overall level of excitation in the net-
work. Therefore, we simulate further control networks which globally correct for
the change in the level of excitation: we increase for all connections, not only for
the i-specific candidates, the synaptic strength of excitatory to inhibitory connec-
tions and simultaneously reduce the synaptic strength of excitatory to excitatory
connections. Fig. 9B shows that a sufficiently large asymmetry of excitatory synap-
tic strengths with respect to target cell type counterbalances the overexcitation.
However, the natural order of the excitatory activity levels of the cortical layers
26
100101102firing rate [Hz]-0.4-0.20.00.20.4target specificity100101102synchrony0.00.040.080.12asymmetry of exc. synaptic strengths100101102firing rate [Hz]48121620relative inh. synaptic strength100101102firing rate [Hz]ABCPotjans & Diesmann, Connectivity explains cell-type specific activity
(Table 5) is partly inverted.
This stabilization procedure uses different excitatory synaptic strengths ac-
cording to the target cell type and thereby introduces an additional parameter.
Therefore, we also investigate whether the network can alternatively be stabilized
by changing an already existing parameter, the relative inhibitory synaptic strength.
We find that only implausibly large values (> 15) lead to a stable low-rate AI state
(Fig. 9C) and that also in this case the order of firing rates is partly inverted.
In summary, a layered network model that is parametrized equivalent to the
balanced random network model requires the inclusion of i-specific feedback con-
nections in order to exhibit asynchronous irregular spiking activity. The alternative
stabilization of the network by global changes of parameters results in a distribution
of layer-specific firing rates in conflict with experimental observations.
Propagation of transient thalamic inputs
Confronted with a transient thalamic input the layered network model responds
with a stereotypic propagation of activity through the different layers. Fig. 10A
shows an exemplary spike raster of the model after a short-lasting increase of
thalamic firing rate. The cell-type specific activity pattern is consistent over 100
different network and input instantiations (Fig. 10B).
Amplitude and timing of cell-type specific responses L2/3e, L4e and L5e
emit a comparable amount of additional spikes in response to the stimulus while
L6e shows a comparatively sparse response (Fig. 10B). In total, only a minority of
all neurons in the network is activated by the thalamic stimulus (Fig. 10E). Only in
L5e a large fraction of all cells emits additional spikes in response to the stimulus.
In relation to the ongoing activity, we find that the input layers (L4 and L6) exhibit
a similar dynamical gain which is much lower than the gain of the output layers
L5 and especially L2/3.
The response is initiated in the input layers and then propagates to layers L2/3
and L5 (see Fig. 10A, B). The latency of activation (defined as the maximum of
the excitatory spike count histogram) is shortest in L4 followed by L6 and L5, and
finally L2/3. The early onset of activation of L5, not after but rather synchronously
with L2/3, is in contrast to the expectation according to the classical notion of the
feed-forward loop from L4 to L2/3 to L5 (Gilbert, 1983) but in agreement with the
experimental activity data (Sakata & Harris, 2009, compare also Mitzdorf, 1985).
The feed-forward connection from L2/3 to L5 causes the prolonged response in L5
that is reflected in the second peak in the spike count. L6, being already slightly
excited by the thalamic input, receives feed-forward input from L5 which triggers
a sparse response during the ramp-up phase in L5. The activity is back to baseline
in all layers before the last thalamic spikes arrive at cortex. Deactivation is ordered
similar to activation, starting in L4, followed by L2/3 and L6, and finally L5.
Interplay of excitation and inhibition in the propagation of inputs Not
only the excitatory populations but also the inhibitory populations show a distinct
activation pattern (see Fig. 10A, gray dots, and B, gray lines).
Initially, as the
interneurons in any layer receive the same, albeit slightly weaker, feed-forward
inputs, the inhibitory response resembles the excitatory response. However, the
inhibitory populations show, in contrast to the respective excitatory populations,
two pronounced activation peaks in L2/3, L4 and L6. As shown above, these
27
Potjans & Diesmann, Connectivity explains cell-type specific activity
Figure 10: Response to transient thalamic input. Thalamic firing rates increase
step-like by 15 Hz for a duration of 10 ms; 0 ms corresponds to the onset of tran-
sient input, gray bars show the arrival of thalamic spikes at cortical neurons taking
the mean delay (for simplicity the same as within the network, 1.5 ms) into ac-
count. (A) Cell-type specific spiking activity of the network with i-specific projec-
tions. Markers as in Fig. 7A. (B) Corresponding cell-type specific population spike
counts averaged over 100 instantiations of network and input (excitatory popula-
tions in black, inhibitory in gray). Spike counts are calculated with a bin-width
of 0.5 ms with the number of recorded neurons L3e: 500, L3i: 141, L4e: 529,
L4i: 132, L5e: 117, L5i: 25, L6e: 347, L6i: 71 (numbers correspond to rela-
tive population sizes). (C) Spiking activity of a control network without i-specific
projections (target specificity of candidate projections of +0.4) stabilized by an
asymmetry of excitatory synaptic strengths of 0.095. (D) Corresponding cell-type
specific population spike counts of excitatory populations averaged over 100 in-
stantiations. Filled area shows the difference of the data in D and B. (E) Average
percentage of cells in the excitatory populations that are activated by thalamic
stimulation in relation to the ongoing activity (according to the data in B). (F)
Dynamical gain, defined as the firing rate during the stimulus presentation divided
by the spontaneous firing rate, of excitatory populations (according to data in B).
28
5 spikesL2/3L4L5L601020time [ms]10 spikesL2/3eL4eL5eL6eBDEF020406080100% activated cellsL2/3eL4eL5eL6e0510152025dynamical gainL6L5L4L2/3A010time [ms]L6L5L4L2/3CPotjans & Diesmann, Connectivity explains cell-type specific activity
layers receive i-specific feedback connections. Apparently, the cell-type specific
connectivity structure results in a complex interplay of excitation and inhibition not
explained by within-layer recurrent inhibition and thereby shapes the propagating
response to a transient thalamic input. Specifically we observe that the activation
of L2/3 entails the increased activity of inhibitory interneurons in L4, thereby
stopping the excitatory activity in this layer. A similar effect is observed in the next
step of the feed-forward loop between L2/3 and L5. Activation of L2/3 prolongs
the excitatory activity in L5 as stated above.
In contrast, the early activation of
L5 results in a sharpening of the response in L2/3 by the additional activation of
L2/3 interneurons. The connection from L6e to L4i adds to the sharpening of the
L4 response and the rather weak i-specific connection from L2/3 to L6 plays a role
in preventing a stronger ramp-up of excitatory activity in L6.
Role of i-specific feedback connections for the propagation of inputs
These observations suggest that the i-specific feedback connections control the
duration and the amplitude of the response to thalamic inputs. To further eluci-
date their role for the propagation of input-related activity, we study the response
of a network without i-specific feedback connections but similar spontaneous ac-
tivity. The small differences in the firing rates (compare Fig. 9B) are reflected in
the initial response of the network to the thalamic input (first bumps in the spike
count histograms in Fig. 11D) which exhibits a steeper increase in L2/3e and L4e
and is weaker in L5e. After this initial phase, the response is drastically different
and shows reverberating activation of the different layers lingering well beyond the
offset of the input. The response is much stronger and shows oscillatory compo-
nents by reciprocal activation of the different layers. The effect stays the same,
albeit smaller, for a control network with the candidate projections having a target
specificity value of +0.2 which is well below the range for non-specific inter-layer
connections.
Discussion
Modeling approach
The present work extends the balanced random network model (Amit & Brunel,
1997; Brunel, 2000a; van Vreeswijk & Sompolinsky, 1996, 1998) to multiple layers
with realistic connection probabilities. Despite their reduced structure the mono-
layered models exhibit qualitatively consistent activity dynamics and the classical
analysis of them has guided our research. Our neuron and synapse model as well as
the random connectivity scheme do not differ qualitatively from the earlier work.
The model size is selected sufficiently large to incorporate the majority of all local
synapses. The network structure, one excitatory and one inhibitory population in
each layer, represents the minimal laminar extension of the mono-layered models
and also the minimal set of cell types typically distinguished in experiments. Data
resolving the connectivity at a finer scale (e.g. Mercer et al., 2005; West et al.,
2006) are combined to match the more coarse resolution of our model. Previous
multi-layered models partly use the same approach (e.g. Haeusler et al., 2009) and
partly more detailed cell type classifications (e.g. Traub et al., 2005; Izhikevich &
Edelman, 2008). However, quantitative connectivity data are not yet widely and
consistently available on a finer level of detail so that it remains unclear which
dynamical consequences any further separation of cell types implies.
29
Potjans & Diesmann, Connectivity explains cell-type specific activity
Integrated connectivity map
The success of the dynamical analysis in the second part of the study relies on
our finding that the two connectivity maps are consistent when one considers the
differences in methodology. The compiled connectivity map accounts for these,
but it nevertheless mingles data not only from multiple laboratories but also from
different cortical areas and species. This choice is not exclusively motivated by
canonicity in structure (e.g. Douglas et al., 1989; Nelson, 2002; Groh et al., 2010)
and activity (Table 5), but driven by the incompleteness of data for a specific area
and species. The density of neurons in our model is based on cat area 17 and
the density of synapses is consistent with cat data (Beaulieu & Colonnier, 1985).
The most crucial difference between our map and the original data based maps
is the target specific structure which removes the fundamental bias introduced by
undersampling of inhibitory cells (electrophysiology) or by the application of Peters'
rule (anatomy).
The integrated connectivity map is consistent with the most prominent features
of the cortical microcircuit: the recurrence of connections (Douglas & Martin,
1991) and the feed-forward loop from L4 to L2/3 to L5 to L6 to L4 (Gilbert,
1983). The excitatory sub-circuit is largely consistent with the recently published
excitatory map of the C2 barrel column of the mouse (Lefort et al., 2009).
In
addition, the circuit exhibits a distinct feedback structure with projections targeting
predominantly interneurons from L2/3e to L4 and from L5e to L2/3. Thomson
et al. (2002); Thomson & Morris (2002) recognized the potential of selective
feedback projections for stabilizing the activity and increasing the sensitivity for
time-dependent signaling, but were not able to test this hypothesis. Furthermore,
reports on the projections from L6e to L4 and the rather weak projection from
L2/3e to L6 indicate specific selection of inhibitory target cells. Our selection of
the projection from L6e to L4 is based on the electron microscopy study by McGuire
et al. (1984), providing sparse and partial data. In their discussion, Ahmed et al.
(1994) present an alternative interpretation of these data proposing that many
synapses originally assigned to inhibitory targets are potentially on excitatory cells.
Still they acknowledge that the relative number of synapses targeting interneurons
is very high in comparison to other excitatory projections. The ongoing discussion
on this projection has recently been reviewed by Thomson (2010).
Here, we quantified the dynamical relevance of these i-specific connections for
spontaneous and evoked activity. Especially the two feedback projections (L2/3e to
L4 and L5e to L2/3) are crucial for stability and reliable input propagation because
of the relatively small structural and dynamical
impact of L6 on other layers.
Extending the idea of i-specific feedback, it is a conceivable but untested hypothesis
that L6e (especially cortico-thalamic cells) targets predominantly interneurons in
L5, too.
Model parametrization
Only a subset of the required model parameters are known experimentally. Here,
we focus on cell-type specific structural parameters:
the numbers of neurons,
the numbers of external inputs and the connection probabilities between neurons.
Other parameters like neuronal parameters, synaptic strengths and delays are se-
lected independent of the cell type. This choice enables us to expose the dynamical
consequences of the structure of the local microcircuit unaffected by additional cell-
type specificity (e.g. Br´emaud et al., 2007; Lefort et al., 2009). The consistency
30
Potjans & Diesmann, Connectivity explains cell-type specific activity
Figure 11: Sketch of the flow of activity following transient thalamic input. Black
and gray ellipses represent excited and inhibited activity states, respectively. Dark
gray dashed arrows indicate input and output of the local network. The black
arrows represent the feed-forward loop projections L4 to L2/3 to L5 to L6. The
gray arrows correspond to the activation of the candidate i-specific connections
(L2/3e to L4 and to L6, L5e to L2/3 and L6e to L4).
of the activity in our model with the experimental data suggests that the (static)
connectivity structure plays a dominant role in shaping the neuronal activity and
that it is not required to model complex neuronal features such as morphology to
reproduce the experimental findings discussed here.
In future, modeling of more
complex neuronal dynamics will eventually reveal where spatially extended neuron
models are required to understand the experimentally observed phenomena.
An exception to the cell-type independent parametrization is the increased
synaptic strength for the connection from L4e to L2/3e. Although this change
affects the ongoing activity only marginally (supplementary Fig. 19), it is impor-
tant for a successful transmission of activity from L4 to L2/3 following thalamic
stimulation. The modification is motivated by the large discrepancies of the L4i
to L2/3 projection in the anatomical and physiological maps and the difference in
the relative convergence of excitatory inputs from L2/3 and L4 to L2/3 pyramids
between our model and Feldmeyer et al. (2006). To ultimately resolve this issue,
it might be necessary to incorporate additional specificity (Yoshimura et al., 2005;
Sarid et al., 2007; Fares & Stepanyants, 2009) and, despite a plethora of studies on
the L4 to L2/3 connections, potentially additional experiments especially regarding
the inhibitory projection.
Cell-type specific activity
The application of the integrated connectivity map and the parametrization accord-
ing to balanced random network models (Brunel, 2000a) results in asynchronous
irregular activity without specific tuning. This activity state is stable over a wide
range of parameters regarding e.g. external inputs, synaptic strengths and delays.
The model predicts cell-type specific firing rates in agreement with data from
awake animals (Table 5).
In particular, the connectivity map captures the low
excitatory firing rates in L2/3 and L6 quantitatively although mono-layered models
hardly show stable activity at these low levels of activity (Sussillo et al., 2007). The
particular ordering of firing rates depends, however, on the inclusion of i-specific
31
Potjans & Diesmann, Connectivity explains cell-type specific activity
Figure 12: Differences in input structure for the excitatory cell types L2/3e (A),
L4e (B), L5e (C) and L6e (D) (large triangles). The illustrations show the strongest
pathways of direct (first-order, thick arrows) and indirect (second-order, thin ar-
rows) excitation (black) and inhibition (gray) of a given population (see Supple-
mental Material for further details). Triangles represent excitatory and circles
inhibitory populations.
feedback connections. The lacking consistency of the firing rates in previous models
is presumably due to the incompleteness of the previously used connectivity maps.
Confronted with a transient thalamic input, the model shows a concise prop-
agation of activity from the input layers to the output layers (compare Miller,
1996). The propagation pattern (Fig. 11) is shaped by the interaction of excita-
tion and inhibition between the different layers and promotes a temporal neural
code (Thomson & Morris, 2002).
Relation of structure and activity
The differences in the cell-type specific input structure (Fig. 12) shed light on the
mechanisms underlying the observed activity features. For example, the low firing
rates of L2/3e and L6e neurons have different structural origins: L2/3e effectively
integrates, next to the excitatory inputs from L2/3e and L4e, inhibitory inputs from
all layers. In contrast, L6e interacts largely with the recurrent within-L6 network;
other inputs predominantly pass through L5e and rather modulate L6e activity. L4e
is also dominated by within-layer connectivity and the i-specific inputs from L2/3
and L6 modulate its activity and temporally structure the response to transient
stimuli. L5 consists of relatively few neurons and correspondingly forms rather
few recurrent within-layer inputs. Furthermore, L5e integrates the highest number
of first-order inputs, but does not receive i-specific projections. As a result, L5e
reacts with a wide range of firing rates to changes in the external input, especially
in comparison to the other layers. This, together with the control that L5 exerts
on L2/3 by the i-specific feedback, puts it in a special position to integrate and
amplify information.
Inhibitory cells receive predominantly excitatory inter-layer
inputs (supplementary Fig. 15) and therefore exhibit elevated firing rates.
Conclusion
The connectivity structure of the local cortical network shapes the cell-type specific
activity and defines functional roles of the different layers. Any fine-scale connec-
tivity structure (e.g. Song et al., 2005; Yoshimura et al., 2005; Kampa et al., 2006)
32
Potjans & Diesmann, Connectivity explains cell-type specific activity
faces the constraints imposed by the connectivity implemented in this model. The
presented framework can be continuously refined as new data become available
and extends the available mathematical methods to infer synaptic connectivity
from neuronal morphology. Based on the currently available data it reproduces
prominent activity features, suggesting that these arise predominantly from the
network structure, not single cell properties. The results predict distinct activity
patterns of interneurons and highlight the need to uncover the target specificity of
projections in future experiments.
Acknowledgements: We are grateful to Kathleen S. Rockland and Dirk Feld-
meyer for fruitful discussions about the structure of the local cortical network,
and to our colleagues in the NEST Initiative for continued support. We also
acknowledge Ad Aertsen for his contributions in the initial phase of the project.
Partially supported by the Helmholtz Alliance on Systems Biology, EU Grant 15879
(FACETS), EU Grant 269921 (BrainScaleS), DIP F1.2, BMBF Grant 01GQ0420
to BCCN Freiburg, and the Next-Generation Supercomputer Project of MEXT
(Japan).
33
Potjans & Diesmann, Connectivity explains cell-type specific activity
References
Ahmed, B., Anderson, J., Douglas, R., Martin, K., & Nelson, J. (1994). Polyneu-
innervation of spiny stellate neurons in cat visual cortex. J. Compar.
ronal
Neurol. 341 (1), 39 -- 49.
Ali, A. B., Bannister, A. P., & Thomson, A. M. (2007). Robust correlations
between action potential duration and the properties of synaptic connections in
layer4 interneurones in neocortical slices from juvenile rats and adult rat and
cat. J. Physiol. (Lond.) 580 (1), 149 -- 169.
Amit, D. J., & Brunel, N. (1997). Model of global spontaneous activity and local
structured activity during delay periods in the cerebral cortex. Cereb. Cortex 7,
237 -- 252.
Bannister, A. P., & Thomson, A. M. (2007). Dynamic properties of excitatory
synaptic connections involving layer 4 pyramidal cells in adult rat and cat neo-
cortex. Cereb. Cortex 17 (9), 2190 -- 2203.
Barbour, D. L., & Callaway, E. M. (2008). Excitatory local connections of super-
ficial neurons in rat auditory cortex. J. Neurosci. 28 (44), 11174 -- 11185.
Beaulieu, C., & Colonnier, M. (1983). The number of neurons in the different
laminae of the binocular and monocular regions of area 17 in the cat. J. Compar.
Neurol. 217, 337 -- 344.
Beaulieu, C., & Colonnier, M. (1985). A laminar analysis of the number of round-
asymmetrical and flat-symmetrical synapses on spines, dendritic trunks, and cell
bodies in area 17 of the cat. J. Compar. Neurol. 231, 180 -- 189.
Beierlein, M., & Connors, B. W. (2002). Short-term dynamics of thalamocortical
and intracortical synapses onto layer 6 neurons in neocortex. J. Neurophysiol. 88,
1924 -- 1932.
Beierlein, M., Gibson, J. R., & Connors, B. W. (2003). Two dynamically distinct
inhibitory networks in layer 4 of the neocortex. J. Neurophysiol. 90, 2987 -- 3000.
Binzegger, T., Douglas, R. J., & Martin, K. A. C. (2004). A quantitative map of
the circuit of cat primary visual cortex. J. Neurosci. 39 (24), 8441 -- 8453.
Binzegger, T., Douglas, R. J., & Martin, K. A. C. (2007). Stereotypical bouton
clustering of individual neurons in cat primary visual cortex. J Neurosci 27 (45),
12242 -- 12254.
Binzegger, T., Douglas, R. J., & Martin, K. A. C. (2009). Topology and dynamics
of the canonical circuit of cat V1. Neural Networks 22 (8), 1071 -- 1078.
Braitenberg, V., & Schuz, A. (1998). Cortex: Statistics and Geometry of Neuronal
Connectivity (2nd ed.). Berlin: Springer-Verlag.
Br´emaud, A., West, D. C., & Thomson, A. M. (2007). Binomial parameters differ
across neocortical layers and with different classes of connections in adult rat
and cat neocortex. Proc. Nat. Acad. Sci. USA 104 (35), 14134 -- 14139.
Briggs, F. (2010). Organizing principles of cortical layer 6. Frontiers in Neural
Circuits 4 (3). doi: 10.3389/neuro.04.003.2010.
34
Potjans & Diesmann, Connectivity explains cell-type specific activity
Brunel, N. (2000a). Dynamics of sparsely connected networks of excitatory and
inhibitory spiking neurons. J. Comput. Neurosci. 8 (3), 183 -- 208.
Brunel, N. (2000b). Dynamics of sparsely connected networks of excitatory and
inhibitory spiking neurons. J. Comput. Neurosci. 8 (3), 183 -- 208.
Buzas, P., Kovacs, K., Ferecsko, A. S. Budd, J. M. L., & Eysel, U. T.Kisvarday,
Z. F. (2006). Model-based analysis of excitatory lateral connections in the visual
cortex. J. Compar. Neurol. 499, 861 -- 881.
Crochet, S., & Petersen, C. C. H. (2006). Correlating whisker behavior with
membrane potential in barrel cortex of awake mice. Nat. Neurosci. 9 (5), 608 --
610.
Dantzker, J. L., & Callaway, E. M. (2000). Laminar sources of synaptic input
to cortical inhibitory interneurons and pyramidal neurons. Nat. Neurosci. 3 (7),
701 -- 707.
Davis, C. S. (1993). The computer generation of multinomial random variates.
Computational Statistics & Data Analysis 16, 205 -- 217.
de Kock, C. P. J., & Sakmann, B. (2009). Spiking in primary somatosensory cortex
during natural whisking in awake head-restrained rats is cell-type specific. Proc.
Natl. Acad. Sci. USA 106 (38), 16446 -- 16450.
Djurfeldt, M., Hjorth, J., Eppler, J. M., Dudani, N., Helias, M., Potjans, T. C.,
Bhalla, U. S., Diesmann, M., Hellgren Kotaleski, J., & Ekeberg, O. (2010). Run-
time interoperability between neuronal network simulators based on the MUSIC
framework. Neuroinformatics 8, 43 -- 60.
Djurfeldt, M., Lundqvist, M., Johansson, C., Rehn, M., Ekeberg, O., & Lansner,
A. (2008). Brain-scale simulation of the neocortex on the IBM Blue Gene/L
supercomputer. IBM Journal of Research and Development 52 (1/2), 31 -- 41.
Douglas, R., & Martin, K. (2007a). Mapping the matrix: the ways to neocortex.
Neuron 56, 226 -- 238.
Douglas, R. J., Martin, K. A., & Whitteridge, D. (1989). A canonical microcircuit
for neocortex. Neural Comput. 1, 480 -- 488.
Douglas, R. J., & Martin, K. A. C. (1991). A functional microcircuit for cat visual
cortex. J. Physiol. (Lond) 440, 735 -- 769.
Douglas, R. J., & Martin, K. A. C. (2004). Neuronal circuits of the neocortex.
Annu. Rev. Neurosci. 27, 419 -- 451.
Douglas, R. J., & Martin, K. A. C. (2007b). The butterfly and the loom. Brain
Res. Bull. 55, 314 -- 328.
Elhanany, E., & White, E. L. (1990).
Intrinsic circuitry: synapses involving the
local axon collaterals of corticocortical projection neurons in the mouse primary
somatosensory cortex. J. Compar. Neurol. 291, 43 -- 54.
Eppler, J. M., Helias, M., Muller, E., Diesmann, M., & Gewaltig, M. (2009).
PyNEST: a convenient interface to the NEST simulator. Front. Neuroinform. 2,
12.
35
Potjans & Diesmann, Connectivity explains cell-type specific activity
Fares, T., & Stepanyants, A. (2009). Cooperative synapse formation in the neo-
cortex. Proc. Natl. Acad. Sci. USA 106 (38), 16463 -- 16468.
Feldmeyer, D., Lubke, J., & Sakmann, B. (2006). Efficacy and connectivity of
intracolumnar pairs of layer 2/3 pyramidal cells in the barrel cortex of juvenile
rats. J. Physiol. (Lond.) 575, 583 -- 602.
Feldmeyer, D., Lubke, J., Silver, R. A., & Sakmann, B. (2002). Synaptic connec-
tions between layer 4 spiny neurone-layer 2/3 pyramidal cell pairs in juvenile rat
barrel cortex: physiology and anatomy of interlaminar signalling within a cortical
column. J. Physiol. (Lond.) 538 (3), 803 -- 822.
Feldmeyer, D., Roth, A., & Sakmann, B. (2005). Monosynaptic connections be-
tween pairs of spiny stellate cells in layer 4 and pyramidal cells in layer 5a indicate
that lemniscal and paralemniscal afferent pathways converge in the infragranular
somatosensory cortex. J. Neurosci. 25 (13), 3423 -- 3431.
Fetz, E., Toyama, K., & Smith, W. (1991). Synaptic interactions between cortical
In A. Peters (Ed.), Cerebral Cortex, Volume 9, Chapter 1, pp. 1 -- 47.
neurons.
New York and London: Plenum Press.
Gabbott, P. L., & Somogyi, P. (1986). Quantitative distribution of GABA-
immunoreactive neurons in the visual cortex (area 17) of the cat. Exp. Brain
Res. 61 (2), 323 -- 331.
Gewaltig, M.-O., & Diesmann, M. (2007). NEST (Neural Simulation Tool). Schol-
arpedia 2 (4), 1430.
Gilbert, C. D. (1983). Microcircuitry of the visual cortex. Annu. Rev. Neurosci. 6,
217 -- 247.
Gilbert, C. D., & Wiesel, T. N. (1983). Clustered intrinsic connections in cat visual
cortex. J. Neurosci. 5, 1116 -- 33.
Golomb, D. (2007). Neuronal synchrony measures. Scholarpedia 2 (1), 1347.
Gonchar, Y., & Burkhalter, A. (2003). Distinct GABAergic targets of feedforward
and feedback connections between lower and higher areas of rat visual cortex.
J. Neurosci. 23 (34), 10904 -- 10912.
Greenberg, D. S., Houweling, A. R., & Kerr, J. N. D. (2008). Population imaging of
ongoing neuronal activity in the visual cortex of awake rats. Nat. Neurosci. 11 (7),
749 -- 751.
Groh, A., Meyer, H. S., Schmidt, E. F., Heintz, N., Sakmann, B., & Krieger, P.
(2010). Cell-type specific properties of pyramidal neurons in neocortex underlying
a layout that is modifiable depending on the cortical area. Cereb. Cortex 20 (4),
826 -- 836.
Haeusler, S., & Maass, W. (2007). A statistical analysis of information-processing
properties of lamina-specific cortical microcircuit models. Cereb Cortex 17 (1),
149 -- 162.
Haeusler, S., Schuch, K., & Maass, W. (2009). Motif distribution, dynamical prop-
erties, and computational performance of two data-based cortical microcircuit
templates. J. Physiol. (Paris) 103 (1 -- 2), 73 -- 87.
36
Potjans & Diesmann, Connectivity explains cell-type specific activity
Heimel, J. A., Van Hooser, S. D., & Nelson, S. B. (2005). Laminar organiza-
tion of response properties in primary visual cortex of the gray squirrel (sciurus
carolinensis). J. Neurophysiol. 94, 3538 -- 3554.
Heinzle, J., Hepp, K., & Martin, K. A. C. (2007). A microcircuit model of the
frontal eye fields. J. Neurosci. 27 (35), 9341 -- 9353.
Hellwig, B. (2000). A quantitative analysis of the local connectivity between pyra-
midal neurons in layers 2/3 of the rat visual cortex. Biol. Cybern. 2 (82), 111 -- 121.
Hill, S., & Tononi, G. (2005). Modeling sleep and wakefulness in the thalamocor-
tical system. J Neurophysiol 93 (3), 1671 -- 1698. Comparative Study.
Holmgren, C., Harkany, T., Svennenfors, B., & Zilberter, Y. (2003). Pyramidal cell
communication within local networks in layer 2/3 of rat neocortex. J. Physiol.
(Lond.) 1 (551), 139 -- 153.
Izhikevich, E. M. (2006). Polychronization: Computation with spikes. Neural
Comput. 18, 245 -- 282.
Izhikevich, E. M., & Edelman, G. M. (2008). Large-scale model of mammalian
thalamocortical systems. Proc. Natl. Acad. Sci. USA 105 (9), 3593 -- 3598.
Izhikevich, E. M., Gally, J. A., & Edelman, G. M. (2004). Spike-timing dynamics
of neuronal groups. Cereb. Cortex 14, 933 -- 944.
Johnson, R. R., & Burkhalter, A. (1996). Microcircuitry of forward and feedback
connections within rat visual cortex. J. Compar. Neurol. 368, 383 -- 398.
Kampa, B. M., Letzkus, J. J., & Stuart, G. J. (2006). Cortical feed-forward net-
works for binding different streams of sensory information. Nat. Neurosci. 9 (12),
1472 -- 1473.
Kapfer, C., Glickfeld, L., Atallah, B., & Scanziani, M. (2007). Supralinear increase
of recurrent inhibition during sparse activity in the somatosensory cortex. Nat.
Neurosci. 10 (6), 743 -- 753.
Kriener, B., Tetzlaff, T., Aertsen, A., Diesmann, M., & Rotter, S. (2008). Cor-
relations and population dynamics in cortical networks. Neural Comput. 20,
2185 -- 2226.
Kumar, A., Schrader, S., Aertsen, A., & Rotter, S. (2008). The high-conductance
state of cortical networks. Neural Comput. 20 (1), 1 -- 43.
Le Be, J.-V., & Markram, H. (2006). Spontaneous and evoked synaptic rewiring
in the neonatal neocortex. Proc. Natl. Acad. Sci. USA 103 (35), 13214 -- 13219.
Lee, A., Manns, I., Sakmann, B., & Brecht, M. (2006). Whole-cell recordings in
freely moving rats. Neuron 51, 399 -- 407.
Lefort, S., Tomm, C., Sarria, J.-C. F., & Petersen, C. C. H. (2009). The excita-
tory neuronal network of the C2 barrel column in mouse primary somatosensory
cortex. Neuron 61, 301 -- 316.
37
Potjans & Diesmann, Connectivity explains cell-type specific activity
Lundqvist, M., Rehn, M., Djurfeldt, M., & Lansner, A. (2006). Attractor dy-
namics in a modular network model of neocortex. Network: Comput. Neural
Systems 17 (3), 253 -- 276.
Maffei, A., Nelson, S. B., & Turrigiano, G. G. (2004). Selective reconfiguration of
layer 4 visual circuitry by visual deprivation. Nat. Neurosci. 7 (12), 1353 -- 1359.
Markram, H., Lubke, J., Frotscher, M., Roth, A., & Sakmann, B. (1997). Phys-
iology and anatomy of synaptic connections between thick tufted pyramidal
neurons in the developing rat neocortex. J. Physiol. (Lond) 500 (2), 409 -- 440.
Martin, K. A. C., & Whitteridge, D. (1984). Form, function, and intracortical
projections of spiny neurons in the striate visual cortex of the cat. J. Physiol.
(Lond.) 353, 463 -- 504.
Mason, A., Nicoll, A., & Stratford, K. (1991). Synaptic transmission between
individual pyramidal neurons of the rat visual cortex in vitro. J. Neurosci. 11 (1),
72 -- 84.
McGuire, B. A., Hornung, J.-P., Gilbert, C. D., & Wiesel, T. N. (1984). Patterns
of synaptic input to layer 4 of cat striate cortex. J. Neurosci. 4 (12), 3021 -- 3033.
Mercer, A., West, D. C., Morris, O. T., Kirchhecker, S., Kerkhoff, J. E., & Thom-
son, A. M. (2005). Excitatory connections made by presynaptic cortico-cortical
pyramidal cells in layer 6 of the neocortex. Cereb. Cortex 15, 1485 -- 1496.
Miller, R. (1996). Neural assemblies and laminar interactions in the cerebral cortex.
Biol. Cybern. 75 (3), 253 -- 261.
Mitzdorf, U. (1985). Current source-density method and application in cat cere-
Investigation of evoked potentials and eeg phenomena. Physiol.
bral cortex:
Rev. 65 (1), 37 -- 100.
Morrison, A., Aertsen, A., & Diesmann, M. (2007). Spike-timing dependent plas-
ticity in balanced random networks. Neural Comput. 19, 1437 -- 1467.
Morrison, A., Mehring, C., Geisel, T., Aertsen, A., & Diesmann, M. (2005). Ad-
vancing the boundaries of high connectivity network simulation with distributed
computing. Neural Comput. 17 (8), 1776 -- 1801.
Nelson, S. B. (2002). Cortical microcircuits: Diverse or canonical? Neuron 36,
19 -- 27.
Nordlie, E., Gewaltig, M.-O., & Plesser, H. E. (2009). Towards reproducible de-
scriptions of neuronal network models. PLoS Comput Biol 5 (8), e1000456.
Peters, A., & Payne, B. R. (1993). Numerical relationships between geniculocor-
tical afferents and pyramidal cell modules in cat primary visual cortex. Cereb.
Cortex 3 (1), 69 -- 78.
Poulet, J., & Petersen, C. (2008). Internal brain state regulates membrane poten-
tial synchrony in barrel cortex of behaving mice. Nature 454 (7206), 881 -- 5.
Ren, M., Yoshimura, Y., Takada, N., Horibe, S., & Komatsu, Y. (2007). Special-
ized inhibitory synaptic actions between nearby neocortical pyramidal neurons.
Science 316, 758 -- 761.
38
Potjans & Diesmann, Connectivity explains cell-type specific activity
Sakata, S., & Harris, K. D. (2009). Laminar structure of spontaneous and sensory-
evoked population activity in auditory cortex. Neuron 64, 404 -- 418.
Sarid, L., Bruno, R., Sakmann, B., Segev, I., & Feldmeyer, D. (2007). Modeling a
layer 4-to-layer 2/3 module of a single column in rat neocortex: Interweaving in
vitro and in vivo experimental observations. Proc. Natl. Acad. Sci. USA 104 (41),
16353 -- 16358.
Schubert, D., Kotter, R., Luhmann, H. J., & Staiger, J. F. (2006). Morphology,
electrophysiology and functional input connectivity of pyramidal neurons charac-
terizes a genuine layer va in the primary somatosensory cortex. Cereb. Cortex 16,
223 -- 236.
Silberberg, G., & Markram, H. (2007). Disynaptic inhibition between neocortical
pyramidal cells mediated by martinotti cells. Neuron 53, 735 -- 746.
Song, S., Per, S., Reigl, M., Nelson, S., & Chklovskii, D. (2005). Highly nonrandom
features of synaptic connectivity in local cortical circuits. Public Library of
Science, Biology 3 (3), 0507 -- 0519.
Stepanyants, A., Hirsch, J., Martinez, L. M., Kisvarday, Z. F., Ferecsko, A. S.,
& Chklovskii, D. B. (2008). Local potential connectivity in cat primary visual
cortex. Cereb. Cortex 18 (1), 13 -- 28.
Stepanyants, A., Martinez, L. M., Ferecsk´o, A. S., & Kisv´arday, Z. F. (2009). The
fractions of short- and long-range connections in the visual cortex. Proc. Nat.
Acad. Sci. USA 106 (9), 3555 -- 3560.
Sussillo, D., Toyoizumi, T., & Maass, W. (2007). Self-tuning of neural circuits
through short-term synaptic plasticity. J. Neurophysiol. 97, 4079 -- 4095.
Swadlow, H. A. (1988). Efferent neurons and suspected interneurons in binocular
visual cortex of the awake rabbit: Receptive fields and binocular properties. J.
Neurophysiol. 59 (4), 1162 -- 1187.
Swadlow, H. A. (1989). Efferent neurons and suspected interneurons in s-1 vib-
rissa cortex of the awake rabbit: Receptive fields and axonal properties. J.
Neurophysiol. 62 (1), 288 -- 308.
Swadlow, H. A. (1991). Efferent neurons and suspected interneurons in second
somatosensory cortex of the awake rabbit: Receptive fields and axonal properties.
J. Neurophysiol. 66 (4), 1392 -- 1409.
Swadlow, H. A. (1994). Efferent neurons and suspected interneurons in motor
cortex of the awake rabbit: Axonal properties, sensory receptive fields, and
subthreshold synaptic inputs. J. Neurophysiol. 71 (2), 437 -- 453.
Thomson, A. M. (1997). Activity-dependent properties of synaptic transmission
at two classes of connections made by rat neocortical pyramidal axons in vitro.
J. Physiol. (Lond.) 502 (1), 131 -- 147.
Thomson, A. M. (2010). Neocortical
layer 6, a review.
Frontiers in Neu-
roanatomy 4 (13). doi: 10.3389/fnana.2010.00013.
39
Potjans & Diesmann, Connectivity explains cell-type specific activity
Thomson, A. M., & Bannister, A. P. (1998). Postsynaptic pyramidal target se-
lection by descending layer iii pyramidal axons: dual intracellular recordings and
biocytin filling in slices of rat neocortex. Neuroscience 84 (3), 669 -- 683.
Thomson, A. M., Bannister, A. P., Mercer, A., & Morris, O. T. (2002). Target and
temporal pattern selection at neocortical synapses. Philosophical Transactions
of the Royal Society London, Series B 357, 1781 -- 1791.
Thomson, A. M., & Deuchars, J. (1997). Synaptic interactions in neocortical local
circuits: Dual intracellular recordings in vitro. Cereb. Cortex 7, 510 -- 522.
Thomson, A. M., & Lamy, C. (2007). Functional maps of neocortical local circuitry.
Frontiers in Neuroscience 1 (1), 19 -- 42.
Thomson, A. M., & Morris, O. T. (2002). Selectivity in the inter-laminar connec-
tions made by neocortical neurones. J. Neurocytol. 31, 239 -- 246.
Thomson, A. M., West, D. C., & Deuchars, J. (1995). Properties of single axon
excitatory postsynaptic potentials elicited in spiny interneurons by action po-
tentials in pyramidal neurons in slices of rat neocortex. Neuroscience 69 (3),
727 -- 738.
Thomson, A. M., West, D. C., Hahn, J., & Deuchars, J. (1996). Single axon
ipsps elicited in pyramidal cells by three classes of interneurones in slices of rat
neocortex. J. Physiol. (Lond.) 496 (1), 81 -- 102.
Thomson, A. M., West, D. C., Wang, Y., & Bannister, A. (2002). Synaptic
connections and small circuits involving excitatory and inhibitory neurons in layer
2-5 of adult rat and cat neocortex: Triple intracellular recordings and biocytin
labelling in vitro. Cereb. Cortex 12, 936 -- 953.
Traub, R. D., Contreras, D., Cunningham, M. O., Murray, H., LeBeau, F. E. N.,
Roopun, A., Bibbig, A., Wilent, W. B., Higley, M. J., & Whittington, M. A.
(2005). Single-column thalamocortical network model exhibiting gamma oscilla-
tions, sleep spindles, and epileptogenic bursts. J Neurophysiol 93 (4), 2194 -- 2232.
Comparative Study.
Tukey, J. W. (1977). Exploratory data analysis. Addison-Wesley.
van Vreeswijk, C., & Sompolinsky, H. (1996). Chaos in neuronal networks with
balanced excitatory and inhibitory activity. Science 274, 1724 -- 1726.
van Vreeswijk, C., & Sompolinsky, H. (1998). Chaotic balanced state in a model
of cortical circuits. Neural Comput. 10, 1321 -- 1371.
Vogels, T. P., & Abbott, L. F. (2005). Signal propagation and logic gating in
networks of integrate-and-fire neurons. J. Neurosci. 25 (46), 10786 -- 10795.
Vogels, T. P., Rajan, K., & Abbott, L. F. (2005). Neural network dynamics. Annu.
Rev. Neurosci. 28, 357 -- 376.
Wang, Y., Markram, H., Goodman, P. H., Berger, T. K., Ma, J., & Goldman-Rakic,
P. S. (2006). Heterogeneity in the pyramidal network of the medial prefrontal
cortex. Nat. Neurosci. 9 (4), 534 -- 542.
40
Potjans & Diesmann, Connectivity explains cell-type specific activity
West, D. C., Mercer, A., Kirchhecker, S., Morris, O. T., & Thomson, A. M. (2006).
Layer 6 cortico-thalamic pyramidal cells preferentially innervate interneurons and
generate facilitating epsps. Cereb. Cortex 16, 200 -- 211.
White, E. L., & Keller, A. (1987).
Intrinsic circuitry involving the local axon
collaterals of corticothalamic projection cells in mouse smi cortex. J. Compar.
Neurol. 262, 13 -- 26.
Yoshimura, Y., Dantzker, J., & Callaway, E. (2005). Excitatory cortical neurons
form fine-scale functional networks. Nature 433 (24), 868 -- 873.
Zarrinpar, A., & Callaway, E. M. (2006). Local connections to specific types of
layer 6 neurons in the rat visual cortex. J. Neurophysiol. 95, 1751 -- 1761.
41
K(cid:89)
Potjans & Diesmann, Connectivity explains cell-type specific activity
Supplemental Material
Connection probabilities
Derivation of Eq. (1) The connection probability CN pre,N post(K) of two neu-
rons from populations of sizes N pre and N post which are randomly connected (with
uniform probability) by K synapses can be derived as follows: the probability that
a particular pair of neurons is connected is equal to one minus the probability that
it is not connected, i.e.
CN pre,N post(K) = 1 − qN pre,N post(K).
Since the K synapses are created independently, qN pre,N post(K) is the probability
of not being connected by any of the synapses
qN pre,N post(K) =
qN pre,N post(1) = [qN pre,N post(1)]K.
i=1
The probability of not being connected by a particular synapse is one minus the
probability of being so
hence
qN pre,N post(1) = 1 − CN pre,N post(1)
= 1 − 1/N preN post,
CN pre,N post(K) = 1 −
(cid:18)
1 −
(cid:19)K
.
1
N preN post
Taylor-series expansion of Eq. (1) The expression for the connection prob-
ability can be expanded in a Taylor series using the binomial series
(1 + x)K = 1 + Kx +
K(K − 1)
2
x2 + ...
Although conversion is guaranteed for x < 1, we require K 2x2 → 0 in order to
write (1 + x)K = 1 + Kx. With x = −1/N preN post we find the approximation
CN pre,N post(K) = 1 −
1 −
1
(cid:18)
(cid:19)K
N preN post
= 1 − (1 + x)K
= 1 − (1 + Kx)
= −Kx
K
=
N preN post
valid for small K/N preN post.
Errors of experimental connection probabilities A lower bound for the sta-
tistical error of Ca results from the experimental standard deviations of the neuron
count by Beaulieu & Colonnier (1983) and the consideration of error propagation.
The physiological search for connected neurons corresponds to a random sam-
pling test, so that the statistical error of the number of connected neuron pairs
42
Potjans & Diesmann, Connectivity explains cell-type specific activity
δ(RQ) is given by the standard deviation of the binomial distribution. Therefore,
the statistical error of the connection probability is δCp =(cid:112)Cp(1 − Cp)/Q (given
Q > 0). For untested connections (i. e. (cid:80)
j Qj = 0), we set δCp = 0.01.
Both estimates are minimal statistical errors. The estimate for the anatomical
data ignores errors in the estimation of the number of synapses as well as errors due
to the limited number of reconstructed axons and dendrites. Both error estimates
do not account for any potential systematic error e.g. due to sampling biases. The
minimal statistical errors are sufficient to show that recurrence strength and loop
strength of the two connectivity maps (see Fig. 2) are statistically indistinguishable.
Gaussian lateral connectivity model
The anatomical and physiological mean connection probabilities Ca/p correspond
to the integration of the lateral connectivity profile C(r) over the corresponding
sampling radius ra/p, i.e. Ca/p = 1/(πr2
0 C(r)rdrdϕ, yielding the two
equations
0
a/p)(cid:82) ra/p
(cid:82) 2π
Ca = 2πC0σ2/(πr2
Cp = 2πC0σ2/(πr2
a)[1 − exp(−r2
p)[1 − exp(−r2
a/2σ2)]
p/2σ2)].
(10)
(11)
Assuming that the parameters of the lateral connectivity profile C0 and σ are
identical in both equations, we find
πr2
aCa
1 − exp(−r2
a/2σ2)
=
πr2
pCp
1 − exp(−r2
p/2σ2)
.
This equation can be solved numerically for σ. For ra (cid:29) σ we have exp(−r2
0 and therefore
a/2σ2) =
which can be solved for σ:
σ = rp
exp(−r2
pCp
aCa
p/2σ2) = 1 − πr2
(cid:20)
(cid:18)
πr2
(cid:19)(cid:21)−1/2
−2 ln
1 − πr2
πr2
pCp
aCa
C0 can now be found by solving eq. (10) (or analogously eq. (11)):
(cid:20)
(cid:18)
C0 =
πr2
aCa
2πσ2
1 − exp
− r2
a
2σ2
.
.
(cid:19)(cid:21)−1
In practice, we are interested in the limit ra → ∞, arriving at eq. (5) for σ and,
using limra→∞ exp(−r2
a/2σ2) = 0, eq. (6) for C0.
The resulting parameters depend on the sampling radius of the physiological
experiments, i.e. the lateral distance of the somata of cells in the paired recordings.
For the raw data set, this value is provided (100 µm, Thomson & Morris, 2002).
The modified physiological map, however, combines different experiments with po-
tentially different sampling radii. Here, we find that increasing the sampling radius
increases the zero-distance connection probability monotonically but decreases the
lateral spread. Nevertheless, the effect is small: the estimates of both parameters
change by less than 8% when altering the sampling radius from 50 to 150 µm.
43
Potjans & Diesmann, Connectivity explains cell-type specific activity
Scaling factor
The scaling factor ζ is used to compare measurements of connection probabilities
of individual connections. In order to first remove global differences that arise from
the differences in the lateral sampling, we scale the connection probabilities Ca/p of
a connectivity map such that the new mean of the map corresponds to a previously
a/p ← Ca/pCm/ ¯Ca/p, where ¯Ca/p denotes
determined model connectivity Cm: C(cid:48)
the global mean of the original connectivity map. The ratio of the scaled individual
connection probabilities is 1 if two maps differ with respect to the lateral sampling
but are otherwise in perfect agreement. In order to exclusively measure the quality
of the agreement, we remove the information which connectivity map provides the
larger estimate by calculating the ratio of the larger of the two estimates divided
by the smaller one
ζ =
max(C(cid:48)
min(C(cid:48)
a, C(cid:48)
p)
a, C(cid:48)
p)
if C(cid:48)
a/p > 0,
restricting the measure to ζ > 1.
Instead of scaling to a previously determined
model connectivity, it is equivalent to compare the normalized connection proba-
bilities
ζ =
=
=
a, C(cid:48)
p)
a, C(cid:48)
p)
max(C(cid:48)
min(C(cid:48)
max(CaCm/ ¯Ca, CpCm/ ¯Cp)
min(CaCm/ ¯Ca, CpCm/ ¯Cp)
max(Ca/ ¯Ca, Cp/ ¯Cp)
min(Ca/ ¯Ca, Cp/ ¯Cp)
.
This can be seen by substituting the mathematical definitons of max(x, y) and
min(x, y), x + y ± x − y.
Consistent modification of target specificity: exact expression for redis-
tribution of synapses
The redistribution of synapses is a method to modify the connection probabilities
forming a projection while conserving the total number of synapses. The connection
probability is a non-linear function of the number of synapses (see Eq. (1)) and
therefore the proportion of synapses that contacts excitatory targets ∆ depends
on the number of neurons in the presynaptic and the two postsynaptic populations
(N pre, N post=e and N post=i) as well as on the total number of synapses K and
the desired target specificity T . In Materials and Methods, we provide the solution
for ∆ assuming the linear approximation C = K/(N preN post). The exact value is
found by numerically solving
2T =
(cid:18)
−
1 −
(cid:18)
(cid:19)(1−∆)K
(cid:19)∆K
1
N post=iN pre
1 −
1
N post=eN pre
(1 + T )
(1 − T )
(12)
for ∆. In practice, we use this variant in order to prevent inaccuracies due to the
approximation if K/(N preN post) is not sufficiently small.
44
Potjans & Diesmann, Connectivity explains cell-type specific activity
Figure 13: Redistribution of synapses with conserved total number of synapses
according to eq. (12). The cartoons depict a situation with N pre = 10 presy-
naptic neurons (bottom triangles), N post=e = 16 excitatory (top triangles) and
N post=i = 4 inhibitory (circles) postsynaptic neurons and K = 20 synapses form-
ing the projection of the presynaptic population to the postsynaptic layer. The
arrow thickness corresponds to the indicated number of synapses that select ex-
citatory (Ke) and inhibitory (Ki) targets. (A) Due to the larger dendritic length
of the postsynaptic excitatory neurons, the application of Peters' rule results in
a preferential targeting of excitatory neurons with a target specificity of at least
T = +0.2 (Fig. 4). (B) Random selection of postsynaptic neurons as it is typically
applied in mono-layered network models (e.g. Brunel (2000b)). (C) and (D) show
preferental selection of inhibitory targets with a target specificity of T = −0.2 and
T = −0.5, respectively.
45
Potjans & Diesmann, Connectivity explains cell-type specific activity
Selection of additional candidates for specific target type selection
Electrophysiological recordings (Thomson et al., 2002) demonstrated that the pro-
jection from L2/3e to L4 exclusively targets interneurons. We are not aware of
further studies that investigate the inputs from L2/3 to L4 inhibitory cells. How-
ever, no further study in visual or somatosensory areas found connections from
L2/3e to L4e, but connections in the inverse direction were reported from L4e to
L2/3e (see Table 5). Only in auditory cortex, projections from L2/3e to L4e have
been reported to pyramids and star pyramids (Barbour & Callaway, 2008).
The projection from L5e to L2/3 has a large scaling factor (Fig. 2) and evidence
exists from several studies that this projection targets specifically inhibitory neurons
in L2/3: Strongest evidence comes from a photostimulation study (Dantzker &
Callaway, 2000) reporting that L2/3e cells receive few inputs from L5e while a
subset of L2/3 inhibitory neurons receives the majority of its inputs from this layer.
For the inputs from deep L5, only the input to this type of interneurons is significant
at all. Yet, no paired recordings study reports measurements of the L5e to L2/3i
connection, but several studies report an asymmetry of the feed-forward L2/3e
to L5e and the inverse L5e to L2/3e connection (Thomson & Bannister, 1998;
Thomson et al., 2002: ten-fold higher feed-forward connectivity, Lefort et al., 2009:
3.6-fold higher feed-forward connectivity).
In contrast, the anatomical estimate
provides similar probabilities for both connections and, in addition to Binzegger
et al. (2004) which is based on a single reconstructed L5e axon projecting to L2/3,
several studies found L5e cells predominantly projecting to L2/3 (e.g. Martin
& Whitteridge, 1984; Stepanyants et al., 2008). These discrepancies between
physiological and anatomical estimates can partly be related to undersampling of
cells projecting to L2/3 in physiological recordings and also to stronger cutting of
ascending axons in slice experiments: Stepanyants et al. (2009) estimated that only
60% of all potential connections can be expected to be intact for the excitatory
L5 to L2/3 connection in paired recordings in slices. A refinement of our model
that takes into account multiple excitatory L5 populations (e.g. L5A and L5B, see
Schubert et al., 2006) can potentially resolve some of the connectivity observed
on a finer scale. Taken together, this evidence qualifies the L5e to L2/3 projection
as an i-specific candidate projection.
Zarrinpar & Callaway (2006) investigated the layer-specific input to L6 pyra-
mids and interneurons in photostimulation experiments in rat primary visual cortex.
Although the inputs from L2/3 to L6 are found to be sparse, they are significantly
preferring interneuronal targets: in only very few cases (less than 10%) significant
excitatory inputs from L2/3 to L6 pyramids are found, but in around 70% of all
trials to interneurons (see their figure 5).
McGuire et al. (1984) find in an electron microscopy (EM) study that asym-
metric (excitatory) synapses originating in L6 preferentially target the shafts of
dendrites in L4. We include this projection as a candidate for specific target type
selection inspite of the few samples underlying this study and the indirect assess-
ment of connectivity without explicit identification of the postsynaptic cell. This
interpretation of the EM data is partly supported by a similar case in the literature:
White & Keller (1987) and Elhanany & White (1990) applied EM to study the
connections of L6 cortico-cortical (CC) and cortico-thalamic (CT) cells and found
that CT cells target predominantly dendritic shafts (as the L6e to L4 projection
inMcGuire et al. (1984)) while CC cells target spines as typical for excitatory cells
(Braitenberg & Schuz, 1998). Later, paired recordings (Mercer et al., 2005; West
et al., 2006) showed that this ultrastructural feature indeed reflects specific target
46
Potjans & Diesmann, Connectivity explains cell-type specific activity
type selection of interneurons. Since primarily CT cells project to L4 (Briggs, 2010)
it is possible that these cells show the same target type selection in this layer as in
L6. Although the evidence is rather sparse (see also Discussion), we include also
this projection in the list of i-specific candidates.
For the simulations, our reference parametrization assumes that the target
specificity of the i-specific projections is −0.8 for the projection from L2/3e to L4
and −0.4 for the three other candidate projections.
Algorithmic compilation of integrated connectivity map
(i) Input:
(a) Ca = 1 −(cid:0)1 −
i RiQi/((cid:80)
(b) Cp =(cid:80)
1
(cid:1)K
N preN post
j Qj)
(c) define rm (here 1 mm2)
(d) define amendment candidates for target specificity T (Table 2)
(ii) Scale connection matrices
(cid:104)−2 ln
(cid:16)
1 − Cp
Ca
(cid:17)(cid:105)−1/2
(a) σ = rp
(b) C0 = Ca
2πσ2
(c) ¯Cm = 2
r2
m
(d) C a/p ← Ca/p
C0σ2[1 − exp(−r2
m/(2σ2))]
¯Cm/ ¯Ca/p
(iii) Redistribute synapses of anatomical map
(a) solve eq. (12) for ∆
(b) C post=e
a
← 1 −(cid:0)1 −
←(cid:0) 1−T
1+T
1
N preN post
(cid:1)+(−)1 C post=e(i)
p
(a) C post=i(e)
p
(iv) Correct target specificity of physiological map
(cid:1)∆K (inhibitory connections analogously)
(v) Cm = 1
2(C a + C p)
Gray-matter long-range inputs
ext/K gm
In order to estimate the layer-specific number of external gray-matter inputs K gm
ext,
we first define the relative number of external gray-matter connections as γext =
K gm
total, where the total number of gray-matter connections can be divided
into local and external connections K gm
ext. Here, we assume
that the relative number of external gray-matter connections γext corresponds to
the weighted and normalized number of bouton clusters located outside of the
local cortical network as measured by Binzegger et al. (2007). The weighted and
normalized number of non-local bouton clusters is defined as follows: we count the
number of bouton clusters ξρ with a horizontal displacement greater than 0.56 mm
(i.e. outside of the local cortical volume below 1 mm2 of cortical surface) in
Binzegger et al. (2007), their figure 11, according to the rank ρ ∈ {1, 2, 3} (where
total = Klocal + K gm
47
Potjans & Diesmann, Connectivity explains cell-type specific activity
Figure 14: Relative connectivity of the four connection types. The relative con-
vergent (left column) connectivity is the ratio of the relative averaged convergence
(weighted according to neuronal densities of postsynaptic cell types) and the rela-
tive neuronal densities of the presynaptic cell types. The relative divergent (right
column) connectivity is defined analogously for divergence. The relative connec-
tivity can be used to determine, which layer plays the dominant role in the local
network: If the overall effect of a neuron would be independent of its layer, any
neuron in the network, on average, sampled randomly from all other neurons and
the layer specificity of the average convergence and divergence corresponded to the
distribution of the number of neurons (relative connectivity of 1). We find that
neurons do not sample randomly from all other neurons in the network, for differ-
ent connection types, different layers play the dominant role: the highest number
of excitatory inputs relative to neuron numbers (to excitatory and inhibitory tar-
gets) originates from L2/3, inhibitory inputs (again to both target types) from
L4. Fewest inputs relative to neuron numbers are provided by L6 (e to e) and L5
(all other connection types). For outputs, the situation is different: the highest
number of outputs relative to neuron numbers are projected to L5 (e to e), to L4
(e to i) and to L2/3 (i to e/i). Fewest outputs relative to neuron numbers are
projected to L4 (i to e) and to L6 (all other types).
48
0.00.51.01.5e to erelative connectivityconvergence0.00.51.01.5e to i0.00.51.01.5i to e0.00.51.01.5i to iL2/3L4L5L60.00.51.01.5e to edivergence0.00.51.01.5i to e0.00.51.01.5e to i0.00.51.01.5i to iL2/3L4L5L6Potjans & Diesmann, Connectivity explains cell-type specific activity
number of external clusters ξ1
number of external clusters ξ2
number of external clusters ξ3
number of clusters Ξtotal
cluster weight ω1
cluster weight ω2
cluster weight ω3
number of local connections klocal
number of gray-matter inputs kgm
ext
number of thalamic inputs
number of white-matter inputs
total number of external inputs ktotal
ext
L2/3e
1
2
9
24
0.65
0.18
0.17
4512
534
0
1072
1606
L4e
2
1
1
18
0.75
0.2
0.05
3277
353
93
1665
2111
L5e
1
0
1
6
0.55
0.25
0.2
2721
389
0
1609
1997
L6e
0
1
2
14
0.75
0.2
0.05
2702
79
47
2790
2915
Table 6: Layer-specific external input properties. From top to bottom: the ex-
tracted parameters required to calculate the number of gray-matter external con-
nections, the estimates of the three types of external inputs (gray-matter, thalamic
and white-matter) to excitatory neurons, and the total number of external inputs.
The total number of external inputs is rounded for simulations (compare Table 4).
rank 3 collapses rank > 2). The relative number of external bouton clusters
is calculated by dividing ξρ by the total number of clusters Ξtotal that can be
extracted from Binzegger et al. (2007), their figure 3B. In order to assess the
relative proportion of synapses formed by neurons outside of the local cortical
network, we multiply the relative number of external bouton clusters with the
cluster weights ωρ that can be extracted from Binzegger et al. (2007), their figures
4C and 4D for rank ρ = 1 and 2. As an estimate for rank 3 we use the remaining
weight ω3 = 1 − (ω1 + ω2). Finally, we sum over all ranks and obtain with
3(cid:88)
γext =
ξρωρ/Ξtotal
for the number of external gray-matter inputs:
ρ=1
K gm
ext = Klocal
= Klocal
γext
1 − γext
(cid:80)3
Ξtotal −(cid:80)3
ρ=1 ξρωρ
ρ=1 ξρωρ
.
The total number of layer-specific external inputs Kext then is the sum of the
external gray-matter inputs K gm
ext, the extrinsic (white-matter, wm) inputs K wm
ext
and specific thalamic inputs K th
ext. Table 6 contains detailed information on the
extracted values for all parameters of external inputs.
Cell-type specific input structure
To visualize the strongest pathways in the cell-type specific input structure we
calculate a input hierarchy. Therefore, we consider the graph G = (V, E) with the
neuronal populations as vertices V = {L2/3e, L2/3i, L4e, L4i, L5e, L5i, L6e, L6i}
and the edges E = {(v, w)C((v, w)) > 0.04} being those connections with
In the input hierarchy, the first
connection probabilities C greater than 0.04.
49
Potjans & Diesmann, Connectivity explains cell-type specific activity
Figure 15: Differences in input structure for inhibitory cell types L2/3i (A), L4i
(B), L5i (C) and L6i (D) (large circles). The illustrations show the strongest path-
ways of direct (first-order, thick arrows) and indirect (second-order, thin arrows)
excitation (black) and inhibition (gray) of a given population. Triangles represent
excitatory and circles inhibitory populations.
order inputs to a vertex w are defined as the direct inputs
L1(w) = {v(v, w) ∈ E}.
The second order inputs to w are the strongest of the direct inputs to the elements
in L1(w):
L2(w) = {v∃v ∈ V \ L1(w)
∩∃w(cid:48) ∈ L1(w) : (v, w(cid:48)) ∈ E
∩∀w(cid:48)(cid:48) ∈ L1(w) \ {w(cid:48)} : C((v, w(cid:48)))C((w(cid:48), w)) > C((v, w(cid:48)(cid:48)))C((w(cid:48)(cid:48), w))}.
The definition can easily be extended to higher order inputs. Second and higher
order inputs are excitatory (inhibitory) if the product of mean synaptic strengths
in the pathway is positive (negative).
Wiring algorithm
The time consumption of the serial wiring algorithm described in Fig. 16A is O(K).
In a distributed simulation setup (Fig. 16B), the neurons are distributed over M
processes and the synapses are only created on the process where the postsynaptic
neuron is located.
In this case, the high-level connection routine for randomly
connecting neuronal populations is as follows: Let M be the number of processes,
K the number of synapses to create, Npre(post) the arrays containing all global
identifiers (GIDs) of the presynaptic (postsynaptic) neurons and Npost
M the dis-
tribution of postsynaptic neurons on processes, i.e. Npost
M [m] contains all GIDs
of postsynaptic neurons located on the mth process. The numbers of synapses
created on a given process KM is binomially distributed (because of the uniform
probability that a synapse is established on a given machine) with the boundary
m KM [m], i.e. KM is
multinomially distributed. In order to optimize the parallelization of the high-level
connection routine, we draw a priori a random sample KM from the multinomial
distribution depending on K, M and Npost
M (Davis, 1993). This sample has to be
identical on every process, which can be achieved by the usage of an identically
condition that the total number of connections is K = (cid:80)
50
Potjans & Diesmann, Connectivity explains cell-type specific activity
Figure 16: Wiring algorithm. The cartoons depicts the presynaptic (bottom
triangles) and the postsynaptic (top triangles) populations, here both containing
N pre(post) = 21 neurons. The connection probability between the two populations
is C = 0.357, corresponding to K = 16 synapses (arrows, black indicating the
currently established synapses). (A) Serial version. For every synapse, the pre-
and postsynaptic neuron (highlighted triangles) are drawn from the corresponding
(B) Distributed version. The network is distributed over M = 5
populations.
processes (gray boxes) such that the first process hosts Npost
[0] = 5 postsynaptic
neurons and all other processes 4 postsynaptic neurons. The number of synapses on
each process (here KM = [3, 2, 4, 4, 3]) is multinomially distributed. The algorithm
can establish 5 connections in parallel (black arrows and highlighted triangles).
5
seeded random number generator. To create the synapses, we draw (on process
m and using independent random number generators on every process) KM [m]
times a presynaptic neuron j from Npre and a postsynaptic neuron i from Npost
M [m]
as well as the synaptic weight wij and delay dij from the gaussian distributions
and call the low-level function Connect(i,j,wij,dij). Fig. 16B shows that the
presynaptic neuron is drawn from all neurons in the presynaptic population, but
that the postsynaptic neuron on a given process is drawn only from postsynaptic
neurons located on this process.
The algorithm requires a small serial overhead in order to create the distribu-
tion of the postsynaptic neurons over processes and the random sample from the
multinomial distribution. Else, it guarantees that on every process, only calcula-
tions are carried out that are required to create synapses local to the process, i. e.
the time consumption is O(K/M ).
51
Potjans & Diesmann, Connectivity explains cell-type specific activity
Figure 17: Replacing the Poissonian background noise with constant input cur-
rents to all neurons yields basically the same activity, demonstrating that the ex-
ternal noise is not requirement for the asynchronous irregular firing. The raster
plot (A) exhibits only slightly more synchrony than the simulation with Poissonian
background (Fig. 7A). The input current to the different populations is chosen
identical to the mean input current evoked by the Poissonian background input
in the reference parametrization (Table 4). The resulting firing rates (B) are the
same as in Fig. 7B.
inputs kext with khom
Figure 18: The network simulations exhibit comparable spontanous activity fea-
tures when the external inputs are independent of the layer. (A) shows the raster
plot and (B) the cell-type specific firing rates after replacing the estimated num-
bers of external
ext = 2000 for excitatory populations and
khom
ext = 1850 for inhibitory populations. The order of firing rates is basically the
same as with data based external inputs: L2/3e and L6e exhibit lowest, L4e in-
termediate and L5e highest rates; inhibitory rates are higher than excitatory ones.
L6e is basically silent. This is due to the small excitatory input to the excitatory
population: the data based estimate assigns 50% more inputs to this population.
52
100200300400500600time [ms]L6L5L4L2/3AB02468firing rates [Hz]L6L5L4L2/3100200300400500600time [ms]L6L5L4L2/3AB02468firing rates [Hz]L6L5L4L2/3Potjans & Diesmann, Connectivity explains cell-type specific activity
Figure 19: Dependence of stationary activity on the synaptic strength of the
L4e to L2/3e connection. The available experimental data do not constrain the
connection probabilities between L4 and L2/3 unambigously (see also Discussion).
Feldmeyer et al. (2006) find that the convergence onto L2/3 pyramids from other
L2/3 pyramids and from L4 cells is the same. In our model, however, the conver-
gence from L2/3 cells is twice as large as from L4. To test for the influence of
this connection, we increase the synaptic strength of the L4e to L2/3e connection.
The graph shows the firing rates of the excitatory populations in L2/3 (squares),
L4 (diamonds), L5 (circles) and L6 (triangles), lightness increases with depth as
a function of the relative increase of this synaptic strength. L2/3e fires a signifi-
cant number of spikes for an increase of > 1.6. The other layers are only slightly
affected by this modification. An increase of 2 is consistent with the relative con-
vergence described by Feldmeyer et al. (2006) and corresonds to our reference
parametrization.
53
1.01.21.41.61.82.0relative increase synaptic strength (L4e to L2/3e)246810firing rate [Hz]Potjans & Diesmann, Connectivity explains cell-type specific activity
Figure 20: Membrane potential synchrony according to (Golomb, 2007). The
graphs shows the membrane potential synchrony of (A) excitatory populations and
(B) inhibitory populations in L2/3 (squares), L4 (diamonds), L5 (circles) and L6
(triangles), lightness increases with depth, as a function of the number of recorded
membrane potential traces. The membrane potential synchrony χ depends on
+ O(N ) where a > 0 is a
the number of neurons N as χ(N ) = χ(∞) + a√
constant (Golomb, 2007). As known from previous studies on mono-layer models
(Brunel, 2000b), the asynchronous activity is not perfectly asynchronous (which
would correspond to χ(∞) = 0), but weakly synchronized. In the layered network
model, the subthreshold activity is similar, with χ(∞) ≈ 0.1. The membrane
potential synchrony of excitatory neurons is ordered as follows (from largest to
smallest values): L2/3e, L6e, L4e, L5e. For inhibitory neurons it is highest in L5i
and almost identical in the other layers.
N
Table 7: Numerical connectivity values. From left to right:
connection specifier, physiological connection probability es-
timates for raw and modified data, anatomical estimates for
the number of synapses (in billion) and the corresponding
connection probabilities for raw and modified data sets, re-
spectively. A dash ( -- ) indicates connections that have not
been measured. Non-zero but undetermined values of the
raw physiological data set are given with the estimates used
by Haeusler & Maass (2007) in brackets.
connection
L2/3e→L2/3e
L2/3e→L2/3i
L2/3i→L2/3e
L2/3i→L2/3i
L4e→L4e
L4e→L4i
L4i→L4e
L4i→L4i
L5e→L5e
L5e→L5i
L5i→L5e
L5i→L5i
L6e→L6e
p
C raw
0.223
0.212
0.182
0.4
0.174
0.19
0.095
0.5
0.092
0.096
0.123
0.6
--
p
C mod
0.122
0.416
0.413
0.4
0.122
0.282
0.304
0.5
0.122
0.109
0.194
0.6
--
a
K raw
73.6
10.3
16.7
2.9
23.5
3.5
10.8
1.9
3.1
0.42
0.42
0.07
15.7
54
a
K mod
73.6
10.3
20.3
3.4
23.5
3.5
18.0
2.9
3.1
0.42
4.0
0.47
15.7
a
C raw
0.172
0.086
0.139
0.086
0.05
0.029
0.09
0.065
0.13
0.081
0.082
0.062
0.075
a
C mod
0.172
0.086
0.169
0.101
0.05
0.029
0.15
0.098
0.13
0.081
0.781
0.414
0.075
101000200030004000number of recorded neurons0.00.10.20.3membrane potential synchronyAB101000200030004000number of recorded neurons0.00.10.20.3membrane potential synchronyPotjans & Diesmann, Connectivity explains cell-type specific activity
connection
L6e→L6i
L6i→L6e
L6i→L6i
L2/3e→L4e
L2/3e→L4i
L2/3i→L4e
L2/3i→L4i
L2/3e→L5e
L2/3e→L5i
L2/3i→L5e
L2/3i→L5i
L2/3e→L6e
L2/3e→L6i
L2/3i→L6e
L2/3i→L6i
L4e→L2/3e
L4e→L2/3i
L4i→L2/3e
L4i→L2/3i
L4e→L5e
L4e→L5i
L4i→L5e
L4i→L5i
L4e→L6e
L4e→L6i
L4i→L6e
L4i→L6i
L5e→L2/3e
L5e→L2/3i
L5i→L2/3e
L5i→L2/3i
L5e→L4e
L5e→L4i
L5i→L4e
L5i→L4i
L5e→L6e
L5e→L6i
L5i→L6e
L5i→L6i
L6e→L2/3e
L6e→L2/3i
L6i→L2/3e
L6i→L2/3i
L6e→L4e
L6e→L4i
L6i→L4e
L6i→L4i
L6e→L5e
L6e→L5i
p
p
C mod
--
--
--
0.0
0.163
0.0
0.0
0.180
0.0
--
--
--
--
0.112
0.098
0.327
C raw
--
--
--
0.0
0.163
0.0
0.0
0.58
0.0
>0.0(0.2) >0.0(0.2)
>0.0(0.0) >0.0(0.0)
--
--
--
--
0.147
0.098
0.327
>0.0(0.2) >0.0(0.2)
0.0
0.0
0.0
0.0
--
--
--
--
0.034
0.0
0.0
0.0
0.0
0.0
0.0
0.0
--
--
--
--
--
--
--
--
--
--
--
--
--
--
0.14
0.0
0.0
0.0
--
--
--
--
0.014
0.0
0.0
0.0
0.0
0.0
0.0
0.0
--
--
--
--
--
--
--
--
--
--
--
--
--
--
55
K raw
a
1.4
--
--
9.2
0.95
1.8
0.22
12.3
1.5
0.84
0.08
9.2
0.26
0.66
0.02
18.4
2.6
0.96
0.17
3.7
0.42
0.36
0.03
7.8
0.26
1.6
0.01
8.9
1.3
0.0
0.0
1.7
0.21
0.18
0.0
4.8
0.47
0.36
0.03
2.7
0.42
--
--
37.2
5.7
--
--
1.7
0.16
K mod
a
1.4
11.4
1.5
9.2
0.95
1.8
0.22
12.3
1.5
0.84
0.08
9.2
0.26
0.66
0.02
18.4
2.6
0.96
0.17
3.7
0.42
0.36
0.03
7.8
0.26
1.6
0.01
8.9
1.3
0.0
0.0
1.7
0.21
0.18
0.0
4.8
0.47
0.36
0.03
2.7
0.42
0.0
0.0
37.2
5.7
0.0
0.0
1.7
0.16
a
C raw
0.032
--
--
0.02
0.008
0.014
0.007
0.123
0.067
0.03
0.013
0.031
0.004
0.008
0.001
0.041
0.02
0.008
0.005
0.035
0.018
0.014
0.005
0.025
0.004
0.02
0.001
0.089
0.045
0.0
0.0
0.016
0.008
0.001
0.0
0.068
0.033
0.024
0.01
0.009
0.005
--
--
0.12
0.072
--
--
0.024
0.01
a
C mod
0.032
0.269
0.173
0.02
0.008
0.014
0.007
0.123
0.067
0.03
0.013
0.031
0.004
0.008
0.001
0.041
0.02
0.008
0.005
0.035
0.018
0.014
0.005
0.025
0.004
0.02
0.001
0.089
0.045
0.0
0.0
0.016
0.008
0.001
0.0
0.068
0.033
0.024
0.01
0.009
0.005
0.0
0.0
0.12
0.072
0.0
0.0
0.024
0.01
Potjans & Diesmann, Connectivity explains cell-type specific activity
connection
L6i→L5e
L6i→L5i
mean values
p
C raw
--
--
0.145
p
C mod
--
--
0.139
a
K raw
--
--
--
K mod
a
0.0
0.0
--
a
C raw
--
--
0.046
C mod
a
0.0
0.0
0.079
56
|
1811.07423 | 2 | 1811 | 2018-11-23T10:10:16 | The Frequent Network Neighborhood Mapping of the Human Hippocampus Shows Much More Frequent Neighbor Sets in Males Than in Females | [
"q-bio.NC"
] | In the study of the human connectome, the vertices and the edges of the network of the human brain are analyzed: the vertices of the graphs are the anatomically identified gray matter areas of the subjects; this set is exactly the same for all the subjects. The edges of the graphs correspond to the axonal fibers, connecting these areas. In the biological applications of graph theory, it happens very rarely that scientists examine numerous large graphs on the very same, labeled vertex set. Exactly this is the case in the study of the connectomes. Because of the particularity of these sets of graphs, novel, robust methods need to be developed for their analysis. Here we introduce the new method of the Frequent Network Neighborhood Mapping for the connectome, which serves as a robust identification of the neighborhoods of given vertices of special interest in the graph. We apply the novel method for mapping the neighborhoods of the human hippocampus and discover strong statistical asymmetries between the connectomes of the sexes, computed from the Human Connectome Project. We analyze 413 braingraphs, each with 463 nodes. We show that the hippocampi of men have much more significantly frequent neighbor sets than women; therefore, in a sense, the connections of the hippocampi are more regularly distributed in men and more varied in women. Our results are in contrast to the volumetric studies of the human hippocampus, where it was shown that the relative volume of the hippocampus is the same in men and women. | q-bio.NC | q-bio |
The Frequent Network Neighborhood Mapping of the
Human Hippocampus Shows Much More Frequent
Neighbor Sets in Males Than in Females
M´at´e Fellnera, B´alint Vargaa, Vince Grolmusza,b,∗
aPIT Bioinformatics Group, Eotvos University, H-1117 Budapest, Hungary
bUratim Ltd., H-1118 Budapest, Hungary
Abstract
In the study of the human connectome, the vertices and the edges of the network
of the human brain are analyzed: the vertices of the graphs are the anatomi-
cally identified gray matter areas of the subjects; this set is exactly the same for
all the subjects. The edges of the graphs correspond to the axonal fibers, con-
necting these areas. In the biological applications of graph theory, it happens
very rarely that scientists examine numerous large graphs on the very same,
labeled vertex set. Exactly this is the case in the study of the connectomes.
Because of the particularity of these sets of graphs, novel, robust methods need
to be developed for their analysis. Here we introduce the new method of the
Frequent Network Neighborhood Mapping for the connectome, which serves as
a robust identification of the neighborhoods of given vertices of special interest
in the graph. We apply the novel method for mapping the neighborhoods of the
human hippocampus and discover strong statistical asymmetries between the
connectomes of the sexes, computed from the Human Connectome Project. We
analyze 413 braingraphs, each with 463 nodes. We show that the hippocampi of
men have much more significantly frequent neighbor sets than women; therefore,
in a sense, the connections of the hippocampi are more regularly distributed in
men and more varied in women. Our results are in contrast to the volumetric
studies of the human hippocampus, where it was shown that the relative volume
of the hippocampus is the same in men and women.
Introduction
While it seems to be clear for all brain scientists that the complex connec-
tion patterns of the neurons play a fundamental role in brain function [1, 2, 3],
when the large-scale, macroscopic description of these connections has become
∗Corresponding author
Email addresses: [email protected] (M´at´e Fellner), [email protected]
(B´alint Varga), [email protected] (Vince Grolmusz)
1
available by the development of diffusion MRI techniques, it turned out that
novel methods are needed to handle these large graphs [1, 2]. MRI-mapped
human connectomes have only several hundred or at most one thousand ver-
tices today [4], and, therefore, more complex, more refined graph theoretical
algorithms [5, 6, 7] can be applied for their analysis than the widely followed
network science approach, originally developed for tens of millions of vertices of
the web graph [8].
The need for robust analytical methods
In the mathematical analysis of the large biological graphs, it is necessary
to apply methods that are capable of dealing with the frequently erroneous
networks, computed from high-deviation experimental data [9, 10, 11]. Our re-
search group has developed several fault-tolerant analytical methods for biologi-
cal graphs, based on a well-known robust network measure: Google's PageRank
[12, 13, 14, 15].
Today, one of the main challenges in brain science is the detailed mapping
of the brain circuitry with reliable methods. While diffusion MRI yields a rela-
tively reliable set of tools for brain imaging, the workflow of identifying the com-
mon, human brain areas across different subjects and the tractography phase of
the processing have numerous difficulties [16, 17, 18]. Human braingraphs, or
connectomes are very focused structures for the description of the cerebral con-
nections: the nodes of these graphs are the anatomically identified small (1-1.5
cm2) areas of the gray matter (called ROIs, Regions of Interests), and two nodes,
corresponding to two ROIs, are connected by an edge if in the tractography
phase an axonal fiber is found, connecting these two ROIs. These connectomes
describe the macroscopical scale set of connections between hundreds of brain
areas. Before the era of diffusion MR imaging, only very fractional knowledge
was available on these connections [1]; today tens of thousands of connections
can be identified and examined.
Previous Work
Perhaps the most straightforward robust approach to be considered is the
study of the frequently appearing cerebral connections. In work [19] we have
mapped the differences in the individual variability of the connections within
the lobes and some smaller brain areas.
We have constructed the Budapest Reference Connectome Server [20, 21]
at the address https://pitgroup.org/connectome/, which is capable of gen-
erating consensus connectomes from the data of 477 subjects, consisting of k-
frequent edges (i.e., edges that are present in at least k braingraphs), with
user-selected k and other parameters.
The Budapest Reference Connectome Server is an excellent tool for gener-
ating a robust human connectome, and, additionally, its construction has led
to the discovery of the phenomenon of the Consensus Connectome Dynamics
(CCD) [22, 23, 6, 24], mirroring the development of the axonal connections
within the human brain.
2
The global, or general approaches for describing the frequent (and, there-
fore, robust) cerebral connections are not always detailed enough for the study
of specific brain regions. Additionally, the frequently appearing connections
(e.g., in the Budapest Reference Connectome Server [20, 21]) may describe the
frequent neighbors of the individual vertices of these graphs, but not the fre-
quently appearing neighbor-sets of important vertices. The description of these
neighbor-sets is the goal of the present work.
Our contribution: the Frequent Network Neighborhood Mapping
Let us consider an important small area, corresponding to a vertex in the con-
nectome (called ROI, region of interest) of the brain, say the left hippocampus.
It is an important question to describe those ROIs, which are directly connected
to the left hippocampus since all the connections to and from the other cerebral
areas go through these edges and these neighbors of the important ROI (in our
case the hippocampus). It is a very interesting question whether almost all the
subjects have the same neighbors of the hippocampus, or there is a considerable
variability among the subjects.
If there were no any variability among the connectomes of the individual
subjects, then in each connectome, the left hippocampus would be connected
to the very same set of other nodes or ROIs. However, there is a considerable
variability of these connections between distinct subjects [19, 20, 21]. Therefore,
no such common neighbor-set exists for any vertex in the braingraphs.
Instead of the non-existent single, universal neighbor-set, which would have
been present in the connectome of all the subjects, we can still identify at least
the frequently appearing neighbor-sets of the left hippocampus (or any other
given vertex of interest in the graph).
Clearly, this is a completely different task than identifying the frequently ap-
pearing edges of the connectome, which are mapped by the Budapest Reference
Connectome Server at https://pitgroup.org/connectome. As an example,
let us consider a vertex u, and two other vertices v and w. Suppose, that both
edges {u, v} and {u, w} are present in 90% of all connectomes, but it may hap-
pen that the vertex-set {v, w} appears only in the 80% of the graphs as the
neighbors of vertex v:
if the connectomes are indexed from 1 through 100, it
may happen that in connectomes 1 through 90 {u, v} is an edge; in connectomes
11 through 100 {u, w} is an edge; so both of them are present in 90% of the
connectomes, but the set {v, w} is neighboring with u from connectomes 11
through 90, i.e., only 80 connectomes, i.e., 80%.
In the present contribution, we map the frequently appearing neighbor-sets
of the left and the right hippocampi of the human connectome, and we make
comparisons between the lateral and sex-differences in the frequent neighbor-
sets of the left- and right hippocampi. The neighbor set sizes are bounded by
4 in our present study, since if we considered larger sets than 4, the numbers of
the sets would be increased considerably. Our braingraphs have 463 vertices for
all subjects.
Our results show strong differences in the neighbor-sets of the hippocampi
between the sexes: we mapped the neighbor-sets, which have significant dif-
3
ferences in frequency in men and women (we call these vertex sets "significant
neighbor-sets"), and we have found that
• the number of the significant neighbor-sets of the left hippocampus is 65
times higher in males than in females;
• the number of the significant neighbor-sets of the right hippocampus is 16
times higher in males than in females;
In a sense, these results show that the neighbor sets of the hippocampus
of the women are more varied between individuals, while these sets are more
regular, that is, less varied in the case of men's connectomes. These results
complement our general studies of the deep graph-theoretical parameters of the
connectomes of men and women [5, 25, 7], where it was proven that women's
connectomes are better "connected", in precisely defined mathematical and com-
puter engineering terms.
Discussion and Results
Mapping the frequent graph-theoretical structures in the human braingraph
makes possible the robust analysis of the possibly noisy data. If the frequency
count is set to a high enough value, (say, the structure in question needs to
be present in 80% or 90% of the connectomes of the subjects in the group
analyzed), then image acquisition artifacts, data processing errors and small,
random individual variabilities in the connectomes could be counter-measured.
Here we consider the hippocampus and its neighbors of the human brain.
The hippocampus plays an important role in numerous brain functions, like the
processing of short-time memory and turning it into long-time memory, in spa-
tial memory and orientation [26, 27, 28, 29]. Today, the hippocampus is perhaps
the most widely studied functional and structural entity of the human brain,
and, consequently, the detailed study of its neighbor sets is a relevant area. Ad-
ditionally, the detailed study of the cerebral circuitry is an emphasized research
topic today: describing the direct neighbors of one of the most important brain
areas in this sense is also a crucial question.
In our present study, we have discovered and analyzed frequent 1,2,3 and 4
element neighbor-sets of the left and the right human hippocampi.
Frequent Network Neighborhood Mapping of the hippocampus
From now on, we refer to the brain areas, or ROIs, by their resolution-
[30]
listed at
250 parcellation labels, based on the Lausanne 2008 brain atlas
and computed by using FreeSurfer [31] and CMTK [32, 33],
https://github.com/LTS5/cmp_nipype/blob/master/cmtklib/data/parcellation/lausanne2008/ParcellationLausanne2008.xls.
The "lh" and the "rh" prefixes abbreviate the "left-hemisphere" and "right-
hemisphere" localizations.
We have mapped separately the direct neighbor sets of the left- and the right
hippocampi.
4
We need to recall an important property of the frequencies of the neighbor
sets of a given vertex, in our case the left- or the right hippocampus. We say
that a set U is a subset of set V , if every element of U is, at the same time, the
element of V . V is called the superset of U . We denote this relation as follows:
U ⊆ V or, equivalently, V ⊇ U .
Let us consider the left hippocampus. For every neighbor-set U of the left
hippocampus, we assign a frequency value as follows: we count the graphs of the
subjects, where every element of set U is connected to the left hippocampus,
and divide this number by the number of all the graphs. Let us denote this
frequency value by φ(U ). Clearly, if V is a superset of U , then the frequency of
V cannot be larger than the frequency of U : φ(U ) ≥ φ(V ).
This observation concerning the frequencies, of course, holds for the
neighbor-sets of any vertex of our graphs.
Table 1 lists the neighbor-sets of the left hippocampus with a minimum fre-
quency of 0.995. Three ROIs (the Left-Putamen, Left-Thalamus-Proper and the
lh.isthmuscingulate 3) are connected to the left hippocampus in all braingraphs,
while several other ROI (such as the lh.superiortemporal 2 and the lh.insula 2),
together with some subsets of the first three ROIs form the remaining neighbor
sets with a minimum frequency of 0.995.
The supporting Tables S1 and S2 contain the one, two three and four-element
subsets of the neighbor-sets of the left- and the right hippocampi, respectively,
with a minimum frequency of 0.9.
Sex differences
In what follows we compare the neighbor sets of the left- and right hip-
pocampi in braingraphs, computed from the male and female subjects of the
dataset of the Human Connectome Project [34]. We identify those neighbor
sets of the hippocampus that are significantly more frequent in male- and in fe-
male connectomes. We will see that male connectomes have much more frequent
hippocampal neighbor sets than female connectomes.
By our knowledge, this is the first observed significant sex difference in the
connections of the hippocampus in the literature.
Anatomical sex differences in the volume of the hippocampus were studied
in [35]: it was found that males have larger absolute hippocampus volumes, but
the relative hippocampus volume, compared to both the total brain volume or
the intracranial volume, are the same in the two sexes.
Here we show that there are 65 times more frequent neighbor sets of size
at most 4 of the left hippocampus in males than in females; and there are 16
times more frequent neighbor sets of size at most 4 of the right hippocampus in
males than in females. These results show that the variability of the neighbor
sets of the hippocampus is smaller in the case of males than in females: in males
there are much more frequent neighbor sets than in females. In other words,
the variability of the neighbor sets of the hippocampus in the connectomes of
women is greater than in the case of men.
Table 2 summarizes the results for the sex differences in the frequent neigh-
bor sets of the hippocampus. In size 1, 2, 3 and 4 neighbor-sets, males have
5
Frequency
1
1
1
1
1
1
1
.
0.99758
0.99758
0.99758
0.99758
0.99758
0.99758
0.99758
0.99758
.......
0.99517
0.99517
0.99517
0.99517
0.99517
0.99517
0.99517
0.99517
Subset
(Left-Putamen)
(Left-Thalamus-Proper)
(lh.isthmuscingulate 3)
(Left-Putamen)(Left-Thalamus-Proper)
(Left-Putamen)(lh.isthmuscingulate 3)
(Left-Thalamus-Proper)(lh.isthmuscingulate 3)
(Left-Putamen)(Left-Thalamus-Proper)(lh.isthmuscingulate 3)
...........................................................
(lh.superiortemporal 2)
(Left-Putamen)(lh.superiortemporal 2)
(Left-Thalamus-Proper)(lh.superiortemporal 2)
(lh.isthmuscingulate 3)(lh.superiortemporal 2)
(Left-Putamen)(Left-Thalamus-Proper)(lh.superiortemporal 2)
(Left-Putamen)(lh.isthmuscingulate 3)(lh.superiortemporal 2)
(Left-Thalamus-Proper)(lh.isthmuscingulate 3)(lh.superiortemporal 2)
(Left-Putamen)(Left-Thalamus-Proper)(lh.isthmuscingulate 3)(lh.superiortemporal 2)
...................................................................................
(lh.insula 2)
(Left-Putamen)(lh.insula 2)
(Left-Thalamus-Proper)(lh.insula 2)
(lh.insula 2)(lh.isthmuscingulate 3)
(Left-Putamen)(Left-Thalamus-Proper)(lh.insula 2)
(Left-Putamen)(lh.insula 2)(lh.isthmuscingulate 3)
(Left-Thalamus-Proper)(lh.insula 2)(lh.isthmuscingulate 3)
(Left-Putamen)(Left-Thalamus-Proper)(lh.insula 2)(lh.isthmuscingulate 3)
Table 1: The most frequent subsets of the neighbors of the left hippocampus (cut fre-
quency value: 0.995). 413 subjects from the Human Connectome Project public release
were examined. In all the subjects, the left hippocampus is connected to the following three
ROIs: the Left-Putamen, Left-Thalamus-Proper and the lh.isthmuscingulate 3, and, there-
fore, to all 7 (= 23 − 1) non-empty subsets of those (the first 7 lines of the table). The
lh.superiortemporal 2 ROI is connected to the left hippocampus in all, but one subjects, so
its frequency is 412/413=0.99758. Note that no subset, containing lh.superiortemporal 2,
may have a higher frequency than the frequency of
i.e.,
0.99758.
Indeed, all the 8 (empty and non-empty) subsets of the Left-Putamen, Left-
Thalamus-Proper and the lh.isthmuscingulate 3, together with the lh.superiortemporal 2
i.e., with 0.99517 frequency. The ROI lh.insula 2
is present in 412 out of 413 subjects,
is connected to the left hippocampus in 411 subjects out of the 413 subjects, there-
fore its frequency is 411/413=0.99517.
Similarly, all the 8 subsets of the ROIs Left-
Putamen, Left-Thalamus-Proper, and the lh.isthmuscingulate 3, together with lh.insula 2
lh.insula 2, together with the
have the same 411/413=0.99517 frequency. Theoretically,
lh.superiortemporal 2 may have the same frequency as lh.insula 2 alone (if the subject, where
the left hippocampus - lh.superiortemporal 2 edge is missing is one of the two subjects where
the left hippocampus - lh.insula 2 edge is missing), but this is not the case: the frequency
of the neighbor set {lh.superiortemporal 2,lh.insula 2} is below the cut frequency value for
Table 1, i.e., 0.995.
lh.superiortemporal 2 alone,
6
Size # significant
differences
Support Node
0.8
0.8
0.8
0.8
0.9
0.9
0.8
0.8
0.9
HPC left
HPC left
HPC right
HPC right
HPC
HPC
HPC left
HPC right
HPC
sex
male
female
male
female
male
female
all
all
all
Size
1
45
38
50
50
64
62
43
52
68
Size
2
844
679
1023
997
1781
1406
759
1059
1728
Size
3
9102
7128
11989
10725
28823
17976
7863
11963
24741
4
65150
48717
91498
73424
309659
150167
54861
85624
233548
15732
1762
19828
Sign. diff.
for whom
15497
235
1659
103
17688
2140
Table 2: The summary of the results for sex differences. The first column list the minimum
support, or, in other words, the frequency cut-off values: there are two values: 0.8 or 0.9, i.e.,
80% 90%. The second column denotes the righ-, left- or both hippocampi; the abbreviation
HPC stands for the word "hippocampus". In the third column the sex is given; the next four
columns contain the number size 1, 2, 3 and 4 frequent neighbor-sets of the hippocampus
considered. The next column gives the number of the neighbor-sets, which have significantly
different frequencies (p=0.001) in male and female connectomes. The last, ninth column
gives the number of neighbor-sets, which are significantly more frequent in male or in female
connectomes: the sum of the two numbers in the ninth column is equal to the number in the
eighth column. For example, in the first row, we can see that in males, the left hippocampus
has 45 frequent 1-element neighbor sets; 844 frequent 2-element neighbor sets, 9102 3-element
neighbor sets and 65150 frequent 4-element neighbor sets, where the frequency cut-off is 0.8.
Moreover, one can see that there are 15732 sets, differing significantly in frequency in males
and in females; and the last column says that from these 15732 sets, 15497 are present in the
braingraph of males and only 235 in the braingraphs of females.
more frequent sets than females. The only exception is the 1-element frequent
neighbors of the right hippocampus, where both males and females have 50 fre-
quent singleton sets. Since all the elements of the frequent 2,3 and 4 element
subsets need to be present also as a frequent 1-element set, it is surprising that
there is such a big difference in the 4 element frequent neighbors of the right
hippocampus in males (91498 sets) and females (73424 sets).
The following observation is much more surprising: There is a definitive,
but not two large difference between the numbers of the frequent size-1,2,3 and
4 neighbor sets of the left and the right hippocampi between the sexes. If we
consider, however, the number of neighbor sets with frequencies statistically
significantly differing (with p=0.001) between the two sexes, we have got that
15732 sets differ, and from these, 15497 is significantly more frequent in male-,
and 235 is significantly more frequent in female connectomes, in the case of
the neighbors of the left hippocampus. Neighbor sets of the right hippocampus
have 1762 significant differences, from which 1659 is significantly more frequent
in males, and 103 in female connectomes.
If we take the union of the neighbor sets of the left- and right hippocampi,
then the number of the neighbor-sets with significant differences is 19828, from
which 17688 are more frequent in male connectomes, and 2140 in female con-
nectomes (p=0.001).
Table 3 lists 10 neighbor-sets of the left hippocampus with the most signif-
icantly different frequencies in the sexes, where the higher frequency appears
at the male )5 sets) and also at the female subjects (5 sets). The supporting
7
frequency
male
0.823
0.823
0.823
0.823
0.823
frequency
female
0.556
0.561
0.561
0.561
0.561
name
(lh.fusiform 4)(lh.precuneus 10)(lh.precuneus 11)(lh.superiortemporal 6)
(lh.fusiform 4)(lh.isthmuscingulate 2)(lh.precuneus 6)(lh.superiortemporal 6)
(lh.fusiform 4)(lh.lingual 6)(lh.precuneus 10)(lh.superiortemporal 6)
(lh.fusiform 4)(lh.lingual 8)(lh.precuneus 10)(lh.superiortemporal 6)
(lh.fusiform 4)(lh.isthmuscingulate 2)(lh.precuneus 10)(lh.superiortemporal 6)
0.880
0.880
0.880
0.880
0.880
0.967
0.967
0.967
0.967
0.967
(Brain-Stem)(lh.bankssts 2)
(Brain-Stem)(Left-Thalamus-Proper)(lh.bankssts 2)(lh.isthmuscingulate 3)
(Brain-Stem)(Left-Putamen)(lh.bankssts 2)(lh.isthmuscingulate 3)
(Brain-Stem)(Left-Thalamus-Proper)(lh.bankssts 2)
(Brain-Stem)(lh.bankssts 2)(lh.isthmuscingulate 3)
Table 3: Several neighbor-sets of the left hippocampus with the most significant differences
in the frequencies between the sexes. The first five rows list five subsets, which are more
frequent in the braingraphs of men than of women. It is interesting that the lh.fusiform 4
ROI is present in the five sets. The next five are the most significant sets with frequencies
higher in females than in males. The lh.bankssts 2 and the Brain-Stem ROIs are present in
all five sets. The supporting Table S3 lists those neighbor-sets of the left hippocampus, which
are significantly more frequent in female connectomes; while supporting Table S4 lists those,
which are significantly more frequent in male connectomes, p ≤ 0.01. Similarly, Tables S5 and
S6 contain the analogous data for the right hippocampus.
Table S3 lists those neighbor-sets of the left hippocampus, which are signifi-
cantly more frequent in female connectomes; while Table S4 lists those, which
are significantly more frequent in male connectomes.
Table 4 lists 10 neighbor-sets of the right hippocampus with the most sig-
nificantly different frequencies in the sexes, where the higher frequency appears
at the male (5 sets) and also at the female subjects (5 sets). The supporting
Table S5 lists those neighbor-sets of the right hippocampus, which are signifi-
cantly more frequent in female connectomes; while Table S6 lists those, which
are significantly more frequent in male connectomes. The significance threshold
is p=0.01 (corrected by the Holm-Bonferroni method).
As we can see in Table 2, there is not a large difference between the frequent
1-element neighbors of the hippocampus in men and women. However, there
is a very significant difference in neighbor-set frequencies of higher cardinality,
as it is described in the last two columns of Table 2. One possible reason for
this could be that the neighbor sets of the hippocampus in general and the left
hippocampus, in particular, have less variability in the case of men than in the
case of women: men have the more regularly appearing neighbor-sets, while
women have more varied neighbor-sets.
Materials and Methods
The primary data source of the present study is Human Connectome
Project's website at http://www.humanconnectome.org/documentation/S500
[34], containing the HARDI MRI data of healthy human subjects between 22
and 35 years of age.
8
frequency
male
0.840
0.909
0.914
0.914
0.914
frequency
female
0.682
0.774
0.782
0.787
0.787
name
(rh.entorhinal 1)(rh.parahippocampal 2)(rh.precuneus 4)(rh.transversetemporal 1)
(rh.entorhinal 1)(rh.parahippocampal 2)(rh.precuneus 2)(rh.precuneus 4)
(Brain-Stem)(rh.entorhinal 1)(rh.parahippocampal 2)(rh.precuneus 4)
(Brain-Stem)(rh.entorhinal 1)(rh.precuneus 2)(rh.precuneus 4)
(rh.bankssts 2)(rh.entorhinal 1)(rh.parahippocampal 2)(rh.precuneus 4)
0.736
0.769
0.769
0.791
0.791
0.862
0.887
0.887
0.900
0.900
(rh.fusiform 8)(rh.inferiortemporal 1)(rh.middletemporal 9)
(rh.fusiform 8)(rh.inferiorparietal 4)(rh.lingual 7)(rh.middletemporal 9)
(rh.fusiform 8)(rh.middletemporal 9)(rh.supramarginal 9)
(rh.fusiform 8)(rh.lingual 7)(rh.middletemporal 9)
(Right-Amygdala)(rh.fusiform 8)(rh.middletemporal 9)
Table 4: Several neighbor-sets of the right hippocampus with the most significant differences in
the frequencies between the sexes. The first five rows list five subsets, which are more frequent
in the braingraphs of men than of women. It is interesting that the rh.precuneus 4 ROI is
present in all five sets. The next five sets are the most significant with frequencies higher in
females than in males. The rh.fusiform 8 and the rh.middletemporal 9 ROIs are present in all
five sets. The supporting Table S5 lists those neighbor-sets of the right hippocampus, which
are significantly more frequent in female connectomes; while Table S6 lists those, which are
significantly more frequent in male connectomes, p ≤ 0.01.
Construction of the Graphs
The workflow for generating the connectomes has applied the CMTK toolkit
[33], including the FreeSurfer tool and the MRtrix tractography processing tool
[36] with randomized seeding and with the deterministic streamline method,
with 1 million streamlines. For the present study we have applied the 463-
vertex graph resolution.
The parcellation data (containing the ROI labels) is listed in the CMTK
repository
nypipe
https://github.com/LTS5/cmp_nipype/blob/master/cmtklib/data/parcellation/lausanne2008/ParcellationLausanne2008.xls.
GitHub
The further details of braingraph-constructions are given in [37].
The
downloaded
from the https://braingraph.org/cms/download-pit-group-connectomes/
site, by choosing the "Full set, 413 brains, 1 million streamlines" option. In the
present study we have used the 463-node resolution graphs.
braingraphs
can
be
The Apriori Algorithm
The apriori algorithm [38] is a well-known tool in data mining for selecting
the frequent item sets from a large collection of subsets of a big item set. In
constructing association rules [39, 40] the selection of frequent subsets is a basic
In general, an n element set has 2n subsets,
step of the rule construction.
therefore for not-too-small n's it is not feasible to review all the 2n subsets.
However, if we want to identify only the subsets with high enough frequency (or
"support", in data mining terms [41]), then we can make use of the following
observation: Suppose that the set A has frequency α ≥ 0. Then all subsets of A
has a frequency at least α. Therefore, first, we identify those 1-element subsets,
which has a frequency at least α, it is an easy task. Then, for identifying all the
2-element subsets of frequency α we need to screen only the pairs of the frequent
9
1-element subsets. Next, for identifying the frequent 3-element subsets, we take
all the frequent 2-element subset appears with exactly one common element,
and verify if their union is frequent or not. The algorithm is continued in a
similar way, and usually, it finishes quickly.
Here we have applied an adaptation of the apriori code from the website
http://adataanalyst.com/machine-learning/apriori-algorithm-python-3-0/
with small modifications.
Statistical Analysis
For a chosen frequent neighbor set F , we have counted its occurrences in
the male dataset by count1(F ) and in the female dataset by count2(F ). The
support was calculated as suppi(F ) = counti(F )
, where Si, for i = 1, 2, wh is the
number of male and female braingraphs, respectively. For each set F we need
to determine whether supp1(F ) and supp2(F ) significantly differ. For this goal
we used the chi-squared test for categorical data:
Si
1st sample
2nd sample
total
contains F
count1(F )
count2(F )
does not contain F
S1 − count1(F )
S2 − count2(F )
total
S1
S2
count1(F ) + count2(F )
S1 + S2 − count1(F ) − count2(F )
S1 + S2
Then the test is calculated as
χ2 =
(count1(F ) · (S2 − count2(F )) − count2(F ) · (S1 − count1(F )))2 · (S1 + S2)
S1 · S2 · (count1(F ) + count2(F )) · (S1 + S2 − count1(F ) − count2(F ))
The degree of freedom for this test is one because it is the number of samples
minus one times the number of categories minus one.
Holm-Bonferroni correction [42]: After computing the p value for every
frequent set, we ordered these p-values p1 ≤ p2 ≤ p3 ≤ . . . ≤ pm. With a
significance level α = 0.01 let the Holm-Bonferroni value for kth frequent set be
k =
t: we have to
p
reject the null hypotheses for i indices i ≤ t. If t = 1, then we do not reject any
null hypotheses thus the difference in supports is significant.
m+1−k . Then let t be the minimal index such that pt > p
′
′
α
Conclusions
First in the literature, we have mapped the frequent neighbor sets of the hu-
man hippocampus, by applying the Frequent Network Neighborhood Mapping
method. We have identified the frequent neighbor sets of the human hippocam-
pus, and we have also compared the data of healthy young men and women in
respect to the neighborhood of the hippocampus. We have found that men have
much more significantly more frequent neighbor sets of the hippocampus than
women. Our results are in contrast with the generally much better connection
properties of the braingraphs of women than of men, as reported in [5, 25, 7].
Our results also need to be compared to the volumetric studies [35], where it
10
was shown that hippocampal volumes, relative to the intracranial volume and
also to the total brain volume are the same in the two sexes. Therefore, we
have shown that the neighbors of the human hippocampus significantly differ
in men and women, while there are no relative volumetric differences in the
hippocampus.
Data availability
The data source of this study is Human Connectome Project's website at
http://www.humanconnectome.org/documentation/S500 [34].
The
data,
containing the ROI labels, is listed in the CMTK nypipe GitHub repository
https://github.com/LTS5/cmp_nipype/blob/master/cmtklib/data/parcellation/lausanne2008/ParcellationLausanne2008.xls.
parcellation
The
braingraphs
downloaded
from the https://braingraph.org/cms/download-pit-group-connectomes/
site, by choosing the "Full set, 413 brains, 1 million streamlines" option. In the
present study we have used exclusively the 463-node resolution graphs.
can
be
Supplementary Tables S1 and S2 contain the one, two three and four-
element subsets of the neighbor-sets of the left- and the right hippocampi,
respectively, with a minimum frequency of 0.9. The Supplementary Ta-
ble S3 lists those neighbor-sets of the left hippocampus, which are signifi-
cantly more frequent in female connectomes; while Table S4 lists those, which
are significantly more frequent in male connectomes. Similarly, Tables S5
and S6 contain the analogous data for the right hippocampus. The supple-
mentary tables can be downloaded in a compressed MS Excel format from
http://uratim.com/hpc/supplementary_HCP_neighbors.zip.
Acknowledgments
Data were provided in part by the Human Connectome Project, WU-Minn
Consortium (Principal Investigators: David Van Essen and Kamil Ugurbil;
1U54MH091657) funded by the 16 NIH Institutes and Centers that support
the NIH Blueprint for Neuroscience Research; and by the McDonnell Center
for Systems Neuroscience at Washington University. VG and BV were partially
supported by the VEKOP-2.3.2-16-2017-00014 program, supported by the Eu-
ropean Union and the State of Hungary, co-financed by the European Regional
Development Fund, VG and MF by the NKFI-126472 grant of the National
Research, Development and Innovation Office of Hungary. BV and MF was
supported in part by the EFOP-3.6.3-VEKOP-16-2017-00002 grant, supported
by the European Union, co-financed by the European Social Fund.
Conflict of Interest: The authors declare no conflicts of interest.
11
Author Contribution
MF analyzed braingraphs and developed statistical and graph theoretical
tools, BV constructed the image processing system and computed the brain-
graphs, VG has initiated the study, analyzed data and wrote the paper.
References
[1] H Sebastian Seung.
Reading
sampling versus dense mapping
(1):17 -- 29, Apr 2009.
http://dx.doi.org/10.1016/j.neuron.2009.03.020.
the book of memory:
of
10.1016/j.neuron.2009.03.020.
connectomes.
doi:
Neuron,
sparse
62
URL
[2] Olaf Sporns, Giulio Tononi, and Rolf Kotter. The human connec-
tome: A structural description of the human brain. PLoS Comput
Biol, 1(4):e42, Sep 2005.
10.1371/journal.pcbi.0010042. URL
http://dx.doi.org/10.1371/journal.pcbi.0010042.
doi:
[3] Jeff W. Lichtman, Jean Livet, and Joshua R. Sanes. A technicolour ap-
proach to the connectome. Nat Rev Neurosci, 9(6):417 -- 422, Jun 2008. doi:
10.1038/nrn2391. URL http://dx.doi.org/10.1038/nrn2391.
[4] Patric Hagmann, Patricia E. Grant, and Damien A. Fair. MR con-
nectomics: a conceptual framework for studying the developing brain.
Front Syst Neurosci, 6:43, 2012. doi: 10.3389/fnsys.2012.00043. URL
http://dx.doi.org/10.3389/fnsys.2012.00043.
[5] Bal´azs Szalkai, B´alint Varga, and Vince Grolmusz. Graph theoretical anal-
ysis reveals: Women's brains are better connected than men's. PLoS
One, 10(7):e0130045, 2015. doi: 10.1371/journal.pone.0130045. URL
http://dx.doi.org/10.1371/journal.pone.0130045.
[6] Csaba Kerepesi, Balazs Szalkai, Balint Varga, and Vince Grolmusz.
How to direct
the
consensus connectomes and the development of the connections in
the human brain.
URL
http://dx.doi.org/10.1371/journal.pone.0158680.
PLOS One, 11(6):e0158680, June 2016.
the connectomes: Dynamics of
the edges of
[7] Bal´azs Szalkai, B´alint Varga,
and Vince Grolmusz.
in women's
graph-theoretical
bias-compensated
size
better
havior,
http://dx.doi.org/10.1007/s11682-017-9720-0.
preprint arXiv:1512.01156.
connectomes.
doi:
Imaging
10.1007/s11682-017-9720-0.
parameters
Brain
2017.
Brain
are
also
and Be-
URL
Also in arXiv
[8] Michalis Faloutsos, Petros Faloutsos, and Christos Faloutsos. On power-
law relationships of the internet topology. In ACM SIGCOMM Computer
Communication Review, volume 29, pages 251 -- 262. ACM, 1999.
12
[9] Johannes Goll and Peter Uetz. The elusive yeast interactome. Genome
Biol, 7(6):223, 2006.
[10] Anne-Claude Gavin, Patrick Aloy, Paola Grandi, Roland Krause, Markus
Boesche, Martina Marzioch, Christina Rau, Lars Juhl Jensen, Sonja
Bastuck, Birgit Dumpelfeld, Angela Edelmann, Marie-Anne Heurtier,
Verena Hoffman, Christian Hoefert, Karin Klein, Manuela Hudak,
Anne-Marie Michon, Malgorzata Schelder, Markus Schirle, Marita Re-
mor, Tatjana Rudi, Sean Hooper, Andreas Bauer, Tewis Bouwmeester,
Georg Casari, Gerard Drewes, Gitte Neubauer, Jens M Rick, Bern-
hard Kuster, Peer Bork, Robert B Russell, and Giulio Superti-Furga.
Proteome survey reveals modularity of the yeast cell machinery. Na-
ture, 440(7084):631 -- 636, Mar 2006. doi: 10.1038/nature04532. URL
http://dx.doi.org/10.1038/nature04532.
[11] Nevan J Krogan, Gerard Cagney, Haiyuan Yu, Gouqing Zhong, Xinghua
Guo, Alexandr Ignatchenko, Joyce Li, Shuye Pu, Nira Datta, Aaron P
Tikuisis, Thanuja Punna, Jos´e M Peregr´ın-Alvarez, Michael Shales, Xin
Zhang, Michael Davey, Mark D Robinson, Alberto Paccanaro, James E
Bray, Anthony Sheung, Bryan Beattie, Dawn P Richards, Veronica
Canadien, Atanas Lalev, Frank Mena, Peter Wong, Andrei Starostine,
Myra M Canete, James Vlasblom, Samuel Wu, Chris Orsi, Sean R Collins,
Shamanta Chandran, Robin Haw, Jennifer J Rilstone, Kiran Gandi, Na-
talie J Thompson, Gabe Musso, Peter St Onge, Shaun Ghanny, Mandy
H Y Lam, Gareth Butland, Amin M Altaf-Ul, Shigehiko Kanaya, Ali
Shilatifard, Erin O'Shea, Jonathan S Weissman, C. James Ingles, Timo-
thy R Hughes, John Parkinson, Mark Gerstein, Shoshana J Wodak, Andrew
Emili, and Jack F Greenblatt. Global landscape of protein complexes in the
yeast saccharomyces cerevisiae. Nature, 440(7084):637 -- 643, Mar 2006. doi:
10.1038/nature04670. URL http://dx.doi.org/10.1038/nature04670.
[12] Vince I Grolmusz. Identifying diabetes-related important protein targets
with few interacting partners with the pagerank algorithm. Royal Society
Open Science, 2(4):140252, 2015.
[13] Vince Grolmusz. A note on the pagerank of undirected graphs. Information
Processing Letters, 115(6):633 -- 634, 2015.
[14] D´aniel B´anky, G´abor Iv´an, and Vince Grolmusz. Equal opportunity for
low-degree network nodes: a pagerank-based method for protein target
identification in metabolic graphs. PLoS One, 8(1):e54204, 2013.
[15] G´abor Iv´an and Vince Grolmusz. When the web meets the cell: using
personalized pagerank for analyzing protein interaction networks. Bioin-
formatics, 27(3):405 -- 407, 2011.
[16] Liang Zhan, Jiayu Zhou, Yalin Wang, Yan Jin, Neda Jahanshad, Gautam
Prasad, Talia M Nir, Cassandra D Leonardo, Jieping Ye, Paul M Thomp-
son, and For The Alzheimer's Disease Neuroimaging Initiative. Comparison
13
of nine tractography algorithms for detecting abnormal structural brain net-
works in Alzheimer's disease. Frontiers in Aging Neuroscience, 7:48, 2015.
ISSN 1663-4365. doi: 10.3389/fnagi.2015.00048.
[17] Saad Jbabdi and Heidi Johansen-Berg. Tractography: where do we go from
here? Brain Connect, 1(3):169 -- 183, 2011. doi: 10.1089/brain.2011.0033.
URL http://dx.doi.org/10.1089/brain.2011.0033.
[18] Matteo Bastiani, Nadim Jon Shah, Rainer Goebel, and Alard Roe-
Human cortical connectome reconstruction from diffusion
broeck.
weighted mri:
the effect of tractography algorithm. Neuroimage, 62
(3):1732 -- 1749, Sep 2012. doi: 10.1016/j.neuroimage.2012.06.002. URL
http://dx.doi.org/10.1016/j.neuroimage.2012.06.002.
[19] Csaba Kerepesi, Bal´azs Szalkai, B´alint Varga, and Vince Grolmusz. Com-
parative connectomics: Mapping the inter-individual variability of connec-
tions within the regions of the human brain. Neuroscience Letters, 662(1):
17 -- 21, 2018. doi: 10.1016/j.neulet.2017.10.003.
[20] Bal´azs Szalkai, Csaba Kerepesi, B´alint Varga, and Vince Grolmusz. The
Budapest Reference Connectome Server v2. 0. Neuroscience Letters, 595:
60 -- 62, 2015.
[21] Balazs Szalkai, Csaba Kerepesi, Balint Varga, and Vince Grolmusz. Param-
eterizable consensus connectomes from the Human Connectome Project:
The Budapest Reference Connectome Server v3.0. Cognitive Neurodynam-
ics, feb 2016. doi: http://dx.doi.org/10.1007/s11571-016-9407-z.
[22] Csaba Kerepesi, Balint Varga, Balazs Szalkai, and Vince Grolmusz. The
dorsal striatum and the dynamics of the consensus connectomes in the
frontal lobe of the human brain. Neuroscience Letters, 673:51 -- 55, 2018.
doi: 10.1016/j.neulet.2018.02.052.
[23] Bal´azs Szalkai, B´alint Varga, and Vince Grolmusz. The robustness and
the doubly-preferential attachment simulation of the consensus connectome
dynamics of the human brain. Scientific Reports, 7(16118), 2017. doi:
10.1038/s41598-017-16326-0.
[24] Balazs Szalkai, Csaba Kerepesi, Balint Varga, and Vince Grolmusz. High-
resolution directed human connectomes and the consensus connectome dy-
namics. arXiv, 1609.09036, September 2016.
[25] Bal´azs Szalkai, B´alint Varga, and Vince Grolmusz. The graph of our mind.
arXiv preprint arXiv:1603.00904, 2016.
[26] L J Santin, S Rubio, A Begega, R Miranda, and J L Arias. Spatial learning
ISSN
and the hippocampus. Revista de Neurologia, 31:455 -- 462, 2000.
0210-0010.
14
[27] Aristotle N Voineskos, Julie L Winterburn, Daniel Felsky, Jon Pipitone,
Tarek K Rajji, Benoit H Mulsant, and M Mallar Chakravarty. Hippocampal
(subfield) volume and shape in relation to cognitive performance across the
adult lifespan. Human brain mapping, 36:3020 -- 3037, August 2015. ISSN
1097-0193. doi: 10.1002/hbm.22825.
[28] Frauke Nees and Sebastian T. Pohlack. Functional MRIstudies of the hip-
pocampus. Frontiers of Neurology and Neuroscience, 34:85 -- 94, 2014. ISSN
1662-2804. doi: 10.1159/000356427.
[29] Juan Eugenio Iglesias, Jean C Augustinack, Khoa Nguyen, Christopher M
Player, Allison Player, Michelle Wright, Nicole Roy, Matthew P Frosch,
Ann C McKee, Lawrence L Wald, Bruce Fischl, Koen Van Leemput, and
Alzheimer's Disease Neuroimaging Initiative. A computational atlas of the
hippocampal formation using ex vivo, ultra-high resolution mri: Applica-
tion to adaptive segmentation of in vivo mri. NeuroImage, 115:117 -- 137,
July 2015. ISSN 1095-9572. doi: 10.1016/j.neuroimage.2015.04.042.
[30] Patric Hagmann, Leila Cammoun, Xavier Gigandet, Reto Meuli,
Christopher J. Honey, Van J. Wedeen, and Olaf Sporns. Map-
PLoS Biol,
ping the structural core of human cerebral cortex.
6(7):e159, Jul 2008.
URL
http://dx.doi.org/10.1371/journal.pbio.0060159.
10.1371/journal.pbio.0060159.
doi:
[31] Bruce Fischl. Freesurfer. Neuroimage, 62(2):774 -- 781, 2012.
[32] Stephan Gerhard, Alessandro Daducci, Alia Lemkaddem, Reto Meuli, Jean-
Philippe Thiran, and Patric Hagmann. The connectome viewer toolkit:
an open source framework to manage, analyze, and visualize connec-
tomes. Front Neuroinform, 5:3, 2011. doi: 10.3389/fninf.2011.00003. URL
http://dx.doi.org/10.3389/fninf.2011.00003.
[33] Alessandro Daducci, Stephan Gerhard, Alessandra Griffa, Alia Lemkad-
dem, Leila Cammoun, Xavier Gigandet, Reto Meuli, Patric Hag-
mann, and Jean-Philippe Thiran. The connectome mapper: an open-
source processing pipeline to map connectomes with MRI.
PLoS
10.1371/journal.pone.0048121. URL
One, 7(12):e48121, 2012.
http://dx.doi.org/10.1371/journal.pone.0048121.
doi:
[34] Jennifer A. McNab, Brian L. Edlow, Thomas Witzel, Susie Y. Huang, Hi-
manshu Bhat, Keith Heberlein, Thorsten Feiweier, Kecheng Liu, Boris
Keil, Julien Cohen-Adad, M Dylan Tisdall, Rebecca D. Folkerth, Han-
nah C. Kinney, and Lawrence L. Wald. The Human Connectome Project
initial applications of 300 mT/m gradients. Neuroimage,
and beyond:
80:234 -- 245, Oct 2013.
doi: 10.1016/j.neuroimage.2013.05.074. URL
http://dx.doi.org/10.1016/j.neuroimage.2013.05.074.
[35] Anh Tan, Wenli Ma, Amit Vira, Dhruv Marwha, and Lise Eliot. The human
hippocampus is not sexually-dimorphic: Meta-analysis of structural MRI
15
volumes. NeuroImage, 124:350 -- 366, January 2016. ISSN 1095-9572. doi:
10.1016/j.neuroimage.2015.08.050.
[36] J Tournier, Fernando Calamante, Alan Connelly, et al. Mrtrix: diffusion
tractography in crossing fiber regions. International Journal of Imaging
Systems and Technology, 22(1):53 -- 66, 2012.
[37] Csaba Kerepesi, Balazs Szalkai, Balint Varga, and Vince Grolmusz. The
braingraph. org database of high resolution structural connectomes and the
brain graph tools. Cognitive Neurodynamics, 11(5):483 -- 486, 2017.
[38] Rakesh Agrawal, Ramakrishnan Srikant, et al. Fast algorithms for mining
In Proc. 20th int. conf. very large data bases, VLDB,
association rules.
volume 1215, pages 487 -- 499, 1994.
[39] Rakesh Agrawal, Tomasz Imielinski, and Arun N. Swami. Mining associa-
tion rules between sets of items in large databases. In Peter Buneman and
Sushil Jajodia, editors, Proceedings of the 1993 ACM SIGMOD Interna-
tional Conference on Management of Data, Washington, D.C., May 26-28,
1993, pages 207 -- 216. ACM Press, 1993.
[40] Rakesh Agrawal and Ramakrishnan Srikant. Fast algorithms for mining
association rules in large databases. In Jorge B. Bocca, Matthias Jarke, and
Carlo Zaniolo, editors, Proc. of the 20th International Conference on Very
Large Data Bases (VLDB '94),, volume 1215, pages 487 -- 499. Kaufmann
Publishers Inc.
1994.
"
[41] Jiawei Han and Micheline Kamber. Data Mining: Concepts and Techniques.
Morgan Kaufmann Publishers, 2000.
[42] Sture Holm. A simple sequentially rejective multiple test procedure. Scan-
dinavian Journal of Statistics, pages 65 -- 70, 1979.
16
|
1210.4695 | 1 | 1210 | 2012-10-17T11:12:02 | Regulating the information in spikes: a useful bias | [
"q-bio.NC",
"cs.IT",
"cs.LG",
"cs.IT"
] | The bias/variance tradeoff is fundamental to learning: increasing a model's complexity can improve its fit on training data, but potentially worsens performance on future samples. Remarkably, however, the human brain effortlessly handles a wide-range of complex pattern recognition tasks. On the basis of these conflicting observations, it has been argued that useful biases in the form of "generic mechanisms for representation" must be hardwired into cortex (Geman et al).
This note describes a useful bias that encourages cooperative learning which is both biologically plausible and rigorously justified. | q-bio.NC | q-bio |
Regulating the information in spikes:
a useful bias
David Balduzzi
Department of Computer Science
ETH Zurich, Switzerland
[email protected]
The bias/variance tradeoff is fundamental to learning: increasing a model's complexity can improve
its fit on training data, but potentially worsens performance on future samples [1]. Remarkably,
however, the human brain effortlessly handles a wide-range of complex pattern recognition tasks.
On the basis of these conflicting observations, it has been argued that useful biases in the form of
"generic mechanisms for representation" must be hardwired into cortex [2].
This note describes a useful bias that encourages cooperative learning which is both biologically
plausible and rigorously justified [3 -- 9].
Let us outline the problem. Neurons learn inductively. They generalize from finite samples and
encode estimates of future outcomes (for example, rewards) into their spiketrains [10]. Results from
learning theory imply that generalizing successfully requires strong biases [1] or, in other words,
specialization. Thus, at any given time some neurons' specialties are more relevant than others.
Since most of the data neurons receive are other neurons' outputs, it is essential that neurons indicate
which of their outputs encode high quality estimates. Downstream neurons should then be biased to
specialize on these outputs.
The proposed biasing mechanism is based on a constraint on the effective information, ei, gener-
ated by spikes, see Eq. (*) below. The motivation for using effective information comes from a
connection to learning theory explained in §2. There, we show the ei generated by empirical risk
minimization quantifies capacity: higher ei yields tighter generalization bounds.
Sections §3 and §4 consider implications of the constraint in two cases: abstractly and for a concrete
model. In both cases we find that imposing constraint (*) implies: (i) essentially all information is
carried by spikes; (ii) spikes encode reward estimates and (iii) the higher the effective information,
the better the guarantees on estimates.
Although the proposal is inspired by cortical learning, the main ideas are information-theoretic,
suggesting they may also apply to other examples of interacting populations of adaptive agents.
1 Information
We model physical systems as input/output devices. For simplicity, we require that inputs X and
outputs Y form finite sets. Systems are not necessarily deterministic. We encode the probability that
system m outputs y ∈ Y given input x ∈ X in Markov matrix Pm(yx).
Consider two perspectives on a physical system. The first is computational: the system receives
an input, and we ask what output it will produce according to the probabilistic or deterministic
rule encoded in Pm. The second is inferential: the system produces an output, and we ask what
information it generates about its input.
The inferential perspective is based on the notion of Bayesian information gain. Suppose we have
model PM(dh) that specifies the probability of observing data given a hypothesis and also prior
distribution P (h) on hypotheses. If we observe data d, how much have we learned about the hy-
1
potheses? The Bayesian information gain is
Pi log2
D(cid:2)PM(Hd)(cid:13)(cid:13) P (H)(cid:3), where D[P kQ] :=Xi
Pi
Qi
is the Kullback-Leibler divergence and PM(hd) is computed via Bayes' rule.
Effective information is simply1 the Bayesian information gain of physical system m, where inputs
and outputs correspond to hypotheses and data respectively [3]. In the absence of additional con-
straints, we place the uniform (maximum entropy) prior on inputs. The effective information about
X generated by m when it outputs y is
(2)
Effective information quantifies the distinctions in the input that are "visible" to m, insofar as they
make a different to its output.
ei(m, y) := D(cid:2)Pm(Xy)(cid:13)(cid:13) Punif (X)(cid:3).
(1)
Finally, observe that effective information quantifies selectivity:
ei(m, y) = H(cid:2)Punif (X)(cid:3)
}
total bits available
{z
− H[Pm(Xy)]
bits indistinguishable to m
{z
}
=nselectivity of response y by mo,
(3)
where H[•] denotes entropy. Outputs generating higher effective information therefore trace back
to more specific causes (i.e. more concentrated posteriors).
2 Learning
The information one system generates about another should have implications for their future in-
teractions. We show this holds for the well-studied special case of empirical risk minimization
(ERM). Results are taken from [4], which should be consulted for details.
Given function class F ⊂ ΣX = {σ : X → ±1} and unlabelled data D = (x1, . . . , xℓ) ∈ X ℓ,
ERM takes labelings of D to the empirical error of the best-performing classifier in F
EF ,D : ΣX −→ R : σ 7→ min
f ∈F
1
ℓ
ℓXi=1
f (xi)6=σ(xi).
I
(4)
It is easy to show that ei(EF ,D, 0) = ℓ − V CF (D), where V CF (D) is the empirical VC-entropy
[4, 12]. It follows with high probability that
EhI
bf (x)6=σ(x)i
{z
}
expected error
≤
1
ℓ
I
ℓXi=1
bf (xi)6=σ(xi)
training error
{z
+c1vuuut
}
ei(EF ,D, 0)
1 −
effective information
ℓ
{z
}
+nconfidence termo.
(5)
Effective information answers the question: To what extent does the error take the form it does
because of the supervisor? Note that the optimal classifier does not depend on the supervisor ("en-
vironment") directly, but rather on the supervisor factored through EF ,D, which outputs the error:
LF ,D : ΣD −→ F : σ 7→ arg min
f ∈F
1
ℓ
f (xi)6=σ(xi)
I
ℓXi=1
{z
EF ,D(σ)
}
=: bf
(6)
A learning algorithm that shatters the data achieves zero empirical error for all supervisors, which
implies the error is independent of the supervisor. Equivalently, it implies the error achieved by
ERM generates no information about the supervisor. Increasing the effective information generated
by EF ,D progressively concentrates the distribution of likely future errors. Guarantees tighten as ei
increases.
An empirical risk minimizer's training error is a meaningful indicator of future performance to
the extent that it generates high effective information. This motivates investigating whether the
effective information generated when performing more biologically plausible optimizations also has
implications for future performance.
1In more general settings, effective information makes essential use of Pearl's interventional calculus [11].
2
3 Cooperative learning in abstract
Organisms aim to choose beneficial actions in the situations they encounter. Responsibility for mak-
ing choices falls largely on the cortex. However, cortical neurons interact extraordinarily indirectly
with the external environment -- their inputs and outputs are mediated through millions of other
neurons that constantly rewire themselves. It follows that, at best, neurons can encode provisional
estimates of expected outcomes into their spiketrains.
Guaranteeing and highlighting high quality estimates of future outcomes is therefore essential. In
particular, since interneuronal communication is dominated by spikes, it is necessary that spikes
provide meaningful indicators of future outcomes.
We propose an information-theoretic constraint that simultaneously guarantees and highlights esti-
mates in populations of interacting learners [5 -- 8]. The next section considers a particular model of
cortical neurons in more detail.
Let us model abstract learners as adaptable channels X
spikes y1 and silences y0. Impose the following
m−→ Y with two outputs, suggestively called
constraint:
ei(m, y1) = λ bits, where λ ≫ ei(m, y0).
(*)
Parameter λ controls the fraction of inputs causing the learner to produce y1 (the higher λ, the
smaller the fraction). It makes sense that each learner in a large population should specialize on a
small fraction of possible inputs. Indeed, increasing λ decreases the frequency of y1, so Pm(y1) ≪
Pm(y0).
Consequence 1: Spikes carry (essentially all) information. Under constraint (*), the informa-
tion transferred by learners is carried by spikes alone
I(X; Y ) = Pm(y1) · ei(m, y1) + O(cid:0)Pm(y1)2(cid:1) ≈ Pm(y1) · ei(m, y1)
(7)
to a first-order approximation [7]. It follows that silent learners can be ignored, despite the fact that
they typically constitute the bulk of the population's responses (recall: Pm(y1) ≪ Pm(y0)).
This suggests a principled way to distribute credit [6]. When a positive/negative global signal is
released, the few learners with informative responses -- that trace back to specific stimuli, recall (3)
-- should reinforce/weaken their behaviors. Conversely, the many learners producing uninformative
responses that do not trace back to specific stimuli should not modify their synapses. It turns out
this is exactly how neurons modify their synapses, see §4.
Consequence 2: Spikes encode high quality reward estimates. Under constraint (*), the effec-
tive information generated by reward maximizing2 learners essentially equals their empirical relative
reward [7]. Thus, outputs with high ei indicate high empirical reward relative to alternatives.
Furthermore, constraint (*) ensures that the information encoded in spikes is reliable. Applying a
PAC-Bayes inspired variant of Ockham's razor [15], it can be shown that the higher the effective
information generated by spikes, the smaller the difference between the empirical reward estimate
.
(8)
bRm and expected reward Rm:
(cid:12)(cid:12)Rm − bRm(cid:12)(cid:12)
{z
}
accuracy of reward estimate
≤r c1
T1
exp[ei(m, y1)]
·s ei(m, y1) + 1
+nconfidence termo
{z
}
term that decreases as ei increases
Summary. The information-theoretic constraint (*) introduces an asymmetry into outputs, ensures
that spikes carry reliable information about future rewards.
4 Cooperative learning in cortex
Spike-timing dependent plasticity (STDP) is a standard and frequently extended model of plasticity
[16]. Unfortunately, it operates in continuous time and is difficult to analyze using standard learning-
theoretic techniques. Recently [5], we investigated the fast-time constant limit of STDP. Taking the
2formalized as a constrained optimization following the free-energy approaches developed in [13, 14].
3
α+ · e(cid:16) tj −tk
τ+ (cid:17)
τ− (cid:17)
−α− · e(cid:16) tk −tj
∆wjk =
if tj ≤ tk
else.
(9)
STDP modifies synapses when input and output spikes co-occur in a short time window, so that
spikes gate learning. This makes sense if spikes are selective, and so by (7) carry most of the
information in cortex.
Synaptic weights control expected error.
If STDP incorporates neuromodulatory signals then it
can be shown to encode reward estimates into spikes in the fast-time constant limit τ• → 0, see [5].
The accuracy of these estimates is controlled by synaptic weights.
More precisely, let ν : X → R be a random variable representing neuromodulatory signals; l denote
the error, i.e. whether a spike is followed by a negative neuromodulatory signal; and R the empirical
reward after spiking [5]. The expected error is controlled by the sum ω of neuron m's synaptic
weights and m's empirical reward:
limit strips out the exponential discount factors, essentially reducing STDP to a simpler discrete time
algorithm whilst preserving its essential structure.
We recall STDP. Given a presynaptic spike at time tj and postsynaptic at time tk, the strength of
synapse j → k is updated according to
E(cid:2)l(x, m, ν)(cid:3)
}
{z
expected error
≤ c1 · ω2 −Xi
R(cid:0)x(i), m, ν(cid:1)
}
{z
empirical reward
+ ω ·ncapacity termo +nconfidence termo.
(10)
Thus, the lower synaptic weights ω, the better the quality of spikes as indicators of future outcomes.
Synaptic weights are homeostatically regulated. Spikes are both metabolically expensive [17]
and selective: they typically occur in response to specific stimuli -- e.g. an edge or a familiar face
[18]. Using spikes selectively reduces metabolic expenditures, which is important since the brain
accounts for a disproportionate fraction of the body's total energy budget [19].
There is evidence that synaptic strengths increase on average during wakefulness and are downscaled
during sleep [9, 20, 21]. This suggests that homeostatic regulation during sleep may both reduce
metabolic costs and simultaneously improve guarantees on reward estimates. Finally, it is easy to
show that decreasing synaptic weights increases the effective information generated by spikes.
5 Discussion
There is an interesting analogy between spikes and paper currency. Money plays many overlapping
roles in an economy, including: (i) focusing attention; (ii) stimulating activity; and (iii) providing a
quantitative lingua franca for tracking revenues and expenditures.
Spikes may play similar roles in cortex. Spikes focus attention: STDP and other proposed learning
rules are particularly sensitive to spikes and spike timing. Spikes stimulate activity: input spikes
cause output spikes. Finally, spikes leave trails of (Calcium) traces that are used to reinforce and
discourage neuronal behaviors in response to neuromodulatory signals.
Neither money nor spikes are intrinsically valuable. Currency can be devalued by inflation. Simi-
larly, the information content and guarantees associated with spikes are eroded by overpotentiating
synapses which reduces their selectivity (potentially leading to epileptic seizures in extreme cases).
Regulating the information content of spikes is therefore essential. Eq. (*) provides a simple con-
straint that can be approximately imposed by regulating synaptic weights. Indeed, there is evidence
that one of the functions of sleep is precisely this.
Spikes with high information content are valuable because they come with strong guarantees on
their estimates. They are therefore worth paying attention to, worth responding to, worth keeping
track of, and worth learning from.
Acknowledgements.
sions.
I thank Michel Besserve, Samory Kpotufe, Pedro Ortega for useful discus-
4
References
[1] Vapnik V: Estimation of Dependencies Based on Empirical Data. Springer 1982.
[2] Geman S, Bienenstock E, Doursat R: Neural Networks and the Bias/Variance Dilemma. Neural Comp
1992, 4:1 -- 58.
[3] Balduzzi D, Tononi G: Integrated Information in Discrete Dynamical Systems: Motivation and The-
oretical Framework. PLoS Comput Biol 2008, 4(6):e1000091.
[4] Balduzzi D: Falsification and Future Performance. In Proceedings of Solomonoff 85th Memorial Con-
ference, LNAI, Springer in press.
[5] Balduzzi D, Besserve M: Towards a learning-theoretic analysis of spike-timing dependent plasticity.
To appear in Adv Neural Information Processing Systems (NIPS) 2012.
[6] Balduzzi D, Tononi G: What can neurons do for their brain? Communicate selectivity with spikes.
To appear in Theory in Biosciences 2012.
[7] Balduzzi D, Ortega PA, Besserve M: Metabolic cost as an organizing principle for cooperative learn-
ing. Under review, 2012.
[8] Nere A, Olcese U, Balduzzi D, Tononi G: A neuromorphic architecture for object recognition and
motion anticipation using burst-STDP. PLoS One 2012, 7(5):e36958.
[9] Tononi G, Cirelli C: Sleep function and synaptic homeostasis. Sleep Med Rev 2006, 10:49 -- 62.
[10] Gottfried JA, O'Doherty J, Dolan RJ: Encoding predictive reward value in human amygdala and
orbitofrontal cortex. Science 2003, 301(5636):1104 -- 7.
[11] Pearl J: Causality: models, reasoning and inference. Cambridge University Press 2000.
[12] Boucheron S, Lugosi G, Massart P: A Sharp Concentration Inequality with Applications. Random
Structures and Algorithms 2000, 16(3):277 -- 292.
[13] Ortega PA, Braun DA: Information, utility and bounded rationality. The fourth conference on artificial
general intelligence 2011, :269 -- 274.
[14] Tishby N, Polani D: Information theory of decisions and actions. In Perception-Reason-Action. Edited
by Vassilis, Hussain, Taylor, Springer 2011.
[15] Seldin Y, Tishby N: Multi-Classification by Categorical Features via Clustering. In Proceedings of the
25th International Conference on Machine Learning 2008.
[16] Song S, Miller KD, Abbott LF: Competitive Hebbian learning through spike-timing-dependent
synaptic plasticity. Nature Neuroscience 2000, 3(9).
[17] Hasenstaub A, Otte S, Callaway E, Sejnowski TJ: Metabolic cost as a unifying principle governing
neuronal biophysics. Proc Natl Acad Sci U S A 2010, 107(27):12329 -- 34.
[18] Quiroga RQ, Reddy L, Koch C, Fried I: Invariant visual representation by single neurons in the
human brain. Nature 2005, 435(1102-1107).
[19] Attwell D, Laughlin SB: An energy budget for signaling in the grey matter of the brain. J Cereb Blood
Flow Metab 2001, 21(10):1133 -- 45.
[20] Vyazovskiy VV, Cirelli C, Pfister-Genskow M, Faraguna U, Tononi G: Molecular and electrophysio-
logical evidence for net synaptic potentiation in wake and depression in sleep. Nat Neurosci 2008,
11(2):200 -- 8.
[21] Maret S, Faraguna U, Nelson AB, Cirelli C, Tononi G: Sleep and waking modulate spine turnover in
the adolescent mouse cortex. Nat Neurosci 2011, 14(11):1418 -- 1420.
5
|
1705.00550 | 1 | 1705 | 2017-05-01T14:50:52 | Topography of the nuclei and distribution of Acetylcholinesterase activity in the septum of the telencephalon in man | [
"q-bio.NC"
] | Distribution of acetylcholinesterase (AChE) activity in the septum of the telencephalon in man was studied in 15 human brains using the acetylthiocholine method. Highest activity of AChE was found in the nucleus of the diagonal band and nucleus accumbens, and lowest in the Lateral nucleus. Comparison of histochemical results with cellular structure and wi.th the course of fibers showed absence in man of some of the nuclei described in animals such as the anterior medial nucleus, triangular nucleus, and marked reduction of the septo-hippocampal nucleus and fimbriate nucleus. Areas of the septum showing AChE activity were divided into an anterior and posterior system. The applicability to man of some neurophysiologic findings in animals is discussed. | q-bio.NC | q-bio | FOLIA MORPHOL. (WARSZ.), 1976, XXXV, 4, 405-412
JACEK BIAŁOW ĄS
TOPOGRAPHY OF THE NUCLEI AND DISTRIBUTION
OF ACETYLCHOLINESTERASE ACTIVITY IN THE SEPTUM
OF THE TELENCEPHALON IN MAN
Departrnent of Normal Anatomy, Institute of Medical Biology, Medical Academy,Gdańsk
Director of the Department: Prof. Dr. O. Nar'kiewicz
Distribution of acetylcholinesterase (AChE) activity in the septum
of the telencephalon in man was studied in 15 human brains using the
acetylthiocholine method. Highest activity of AChE was found in the
nucleus of the diagonal band and nucleus accumbens, and lowest in the
Lateral nucleus. Comparison of histochemical results with cellular
structure and wi.th the course of fibers showed absence in man of some
of the nuclei described in animals such as the anterior medial nucleus,
triangular nucleus, and marked reduction of the septo-hippocampal
nucleus and fimbriate nucleus. Areas of the septum showing AChE
activity were divided into an anterior and posterior system. The
applicability to man of some neurophysiologic findings in animals is
discussed.
The region of the septum of the telencephalon is one of the centers of the so-
called limbic system, which embraces the cortex of the cingulated gyrus and
some subcortical centers such as the amygdaloid body and hippocampus. The
name of this septum should not be confused with that of the septum
pellucidum, which applies only to the upper, thinned, part of the septum in
man and some monkeys. On the other hand, it includes the much wider basal
part and the paraterminal gyrus on the medial surface of the hemisphere,
corresponding to the vertical part of the diagonal band of Broca. Studies on
some animals show that this area contains, among others, inhibitory systems
which are active in emotional states (6, 9, 10, 14, 15, 17, 28). Lesion of the
septum is followed by increased activity in rats and cats, which become less
timorous. Zeeman and King (30) observed similar symptoms in human beings
with tumors in this area. Nowicki (22), in a pneumoencephalographic study,
noted a relation between symptoms of characteropathy and thickening
Fol. Morph. – 3
406 J. Białowąs Nr 4
of the septum in man. Various vegetative disorders have been reported after
lesions of the septum in rats (for literature, see Cytawa- 9).
Hamilton et al. and Igic et al. (15, 17) noted an effect of atropine and amiton
on functions of the septum, suggesting existence of specific systems of
cholinergic conduction in this area. Animals treated locally with these drugs
exhibit symptom s suggesting damage of the septum. Studies on rats, cats and
monkeys (4, 5, 12, 13, 18, 20, 21, 27) showed characteristic distribution of
acetylcholinesterase (AChE) in the septal nuclei. We considered that a similar
study in man would be interesting, especially since, according to the literature,
cholinergic transmission seems to play an important role in this region (4, 5,
15, 17, 19, 20, 23).
MATERIAL AND METHODS
Sections from 15 human brains obtained from the Department of Pathological
Anatomy of the Medical Academy, Gdańsk, taken 19-30 hours after death
from subjects aged 2 weeks to 74 years, were studied. A separate subgroup
consisted of brains from children (1 from a 2-weekold infant, and 2 from 3-
month-old children); all other brains were from adults. The patients from
whom the brain sections were taken had died from causes unrelated to the
central nervous system, with the exception of two who had hemorrhagic foci
in the brain, but distant from the septum, which was grossly unaffected. After
fixation in 10% formalin neutralized with calcium carbonate and cooled to
4°C, serial coryostat sections were stained by Koelle's acetylthiooholine
method in the modification of Gerebtzoff (11). Etopropazine was added to the
incubation mixture in the concentration of 10-4M to inhibit nonspecific
cholinesterases. The reaction was carried out at pH 5.6 at room temperature.
Sections next to those stained with acetylthiocholine were stained with cresyl
violet according to Nissl and with hematoxylin by the method of Weil.
RESULTS
Basing on a preliminary analysis of preparations stained with cresyl
violet and on published data from similar studies on animals (1, 2, 4, 5,
12, 13, 16, 21, 29), the septum was divided as proposed by Andy and
Stephan (3) with some modifications. The general scheme of the different
parts of the septum in man in serial frontal sections is illustrated in Fig. 1.
Nr 4 Nuclei of the septum of the telencephalon 407
The septum contains the fallowing nuclei:
1. Septo-hippocampal nucleus (HA),
2. Nucleus of the vertical part of the diagonal tract of Broca (NB),
3. Nuc1eus accumbens of the septum (NA),
4. Lateral nuc1eus (L),
5. The dorsal nuc1eus, consisting of an inner (Dl), intermediate (DM)
and outer part (DE),
6. The fimbriate nucleus (NF).
First, typical sections of the septum, from before backward, stained for AChE,
will be discussed.
Anterior part of the septum
Fig. 2A represents the most anterior segment of the septum, with distinctly
standing out rostrurn of the corpus callosum. AChE activity is increased in the
septum pellucidum 'in the form of two symmetric bands. Just below the
rostrum of the corpus callosum, a band of increased reactivity can be seen,
which corresponds to the rudimentary form of the septo-hippocampal nucleus
in man. In preparations stained by the method of Nissl, dark cells similar to
those encountered in the hippocampus can be seen in moderate numbers. Thin
active bands running to the sides and downward connect this area with the
deepest layer of cortex.
The next section in' the backward direction (Fig. 2B) shows high AChE
activity in the most anterior upper part of the diagonal band of Broca. An
anteromedial nuc1eus with increased enzyme activity, as seen in animals,
cannot be recognized here.
Below, the dark area of the nucleus accumbens forming the lower limit of
the ventric1e and indenting the septum is seen. In this region, high AChE
activity has characteristic diffuse dark-brown coloration. The area of increased
AChE activity coincides strictly with the boundaries of the .nucleus
accumbens, as determined by cellular structure. The rather small cells
intensely stained by cresyl violet with characteristic fine granules in their
cytoplasm farm irregular groups, especially in the medial part of the nuc1eus
accumbens. It is hard to say whether the increased reaction pertains mainly to
neuropil, as also to the cells as suggested by different intensity of staining
corresponding to the cell groups described above.
Between the nuc1eus accumbens and nuc1eus of the diagonal band,
bands giving an intense 'reaction for AChE connect the two. They run
diagonally upward and medial ward showing stratified activity; their external
part merges with the lateral part of the septum, while only the internal
408 J. Białowąs Nr 4
part reaches the upper part of the diagonal tract. In preparations stained with
cresyl violet, small groups of dark cells of a type similar to those in the
nucleus accumbens can be seen. These areas are usually distinguished
by darker brown coloration, indicating high AChE content. In horizontal
sections (Fig. 4 C, D) these bands extend fairly far in the forward direction,
running on the boundary between the deepest layer of the cortex and the white
substance of the cingulum.
Middle part of the septum
The next sections (Fig. 2C, D) represent the middle part of the septum. The
distinctly dark region in the medial part of the septum in the neighborhood of
the longitudinal fissure of the brain is the nucleus of the vertical part of the
diagonal band of Broca. The boundaries of the area showing increased AChE
activity in the form of diffuse brown coloration of varying intensity are quite
sharp. They correspond to the area containing the large irregularly shaped cells
with cresyl-violet stained granules in their cytoplasm, which are characteristic
of the nucleus of the diagonal band. The fairly numerous darker spots on the
brown background probably represent activity of the enzyme in the perikaryon
of these cells; the nuclei, on the other hand, give a negative reaction. In
sections further backward (Fig. 3A), the active area of the nucleus of the
diagonal band is reduced to a thin layers surrounding bundles of fibers of the
fornices from the side and from below, as can be seen also in the horizontal
sections (Fig. 4A, B).
Laterally to the diagonal tract and above the nucleus accumbens, the basal
area of the septum, occupied by the lateral nucleus, is characterized by lack of
AChE activity (Fig. 2, B, C, D). In preparations stained with cresyl violet, the
cells of this nucleus have various shape and size and are not very intensely
stained so that the boundaries of the nucleus are not sharply defined. In
preparations stained by the thiocholine method, the boundaries, particularly
with the dorsal nucleus, are somewhat more distinct (Fig. 3A),
The next frontal section (Fig: 3A) visualizes the part of the septum where the
crura of the anterior commissure approach the median plane and tend to join.
Besides the previously mentioned thin band surrounding the columns of the
fornix from the sides, which is the furthest backward reaching part of the
diagonal band, two other thin bands of strong AChE activity are visible in the
lateral and upper area of the septum, situated in the so-called dorsal nucleus of
the septum, in its lateral part upward and backward of the lateral nucleus. In
preparations stained with cresyl violet, three layers can be distinguished,
although not as distinctly as in some animals:
J. Białowąs
Fig. 1. Medial surface of the cerebral hemisphere in man. Planes of the frontal
sections in Figs. 2 and 3 are shown.
Designations : AS - area subcallosa, CA - commissura anterior,
CC - corpus callosum, CHO - chiasma opticum, CM - corpus mamillare, F -
jornix, PCH - plexus chorioideus, SP - septum pellucidum, SV - septum verum,
TH - thalamus.
Fig. 2. Consecutive frontal sections through the Septum in man. 'Ihiochołine
technique. The nuclei are designated, A, B, D - magn, X6; C - magn. X4. The
arrow points to active bands connecting the nucleus accumbens with the
nucleus of the diagonal band.
Designations : CA - commissura anterior, CC - corpus callosum,
HA - nucl. septo-hippocampalis, L - nucl. lateralis, NA - nucl. accumbens, NB -
nucl. tractus diagonalis Broca, NC - nucl. caudatus, R - rostrum corporis
callosi, SP - septum pellucidum.
J. Białowąs
Fig. 3. Further frontal sections through the septum in man. Thiocholine technique.
A - magn, X4; B - magn, X6.
Designations : CA - commissura anterior, DE - nucl. dorsalis - pars
externa, Dl - nucl. dorsalis - pars interna, DM - nucl. dorsalis - pars
intermedia, F - fornix, NC - nucl. caudatus, NF - nucl. fimbratus septi .
Fig. 4. Horizontal sections through the septum in man, from above downward.
Thiocholine technique. A, B, C, D - magn. X3. Arrows point to AOhE activity of
the band s connecting the septum with the cortex. Designations as in the preceding
figures (Dorsal nucleus – D).
Nr 4 Nuclei of the septum of the telencephalon 409
: an internal layer, neighboring with the posterior part of the diagonal band
and fornix, and containing fairly intensely stained cells; an intermediate part,
and an external part, neighboring with the ventricle, with less densely
distributed cells. The course of the bands of intense AChE activity agrees with
the course of the layers, but the bands are narrower than the layers. The first
band, reaching furthest downward, is situated in the internal part; and the
second band, which is very poorly visible, is situated in the intermediate part.
A stratification of the reaction in the postero-superior part of the septum can
be discerned also in the horizontal sections (Fig. 4A).
Posterior part of the septum
The last of the frontal sections (Fig. 3B) represents the septum just before
the interventricular foramen. The upper part of the septum is thick and hardly
fits here the term septum pellucidum any more. The columns of the fornix are
inactive, and higher up the somewhat darker area of the dorsal nucleus can be
seen. Of the bands of increased activity, only the internal one, separating the
fimbriate from the dorsal nucleus, remains. Compared to other animals, the
area occupied by the fimbriate nucleus is small. Only a few dark bands,
presumably representing acetylcholinesterase-rich nerve fibers, can be seen
above the columns of the fornix.
The triangular nucleus below the columns is indistinguishable in man,
probably owing to marked reduction of the anterior commissure of the fornix
to a thin band of fibers connecting both fornices on the ventral side, posteriorly
to the interventricular foramen. No significant differences were noted between
the preparations incubated with etopropazine and those incubated without it.
Preparations from brains received 26-30 hours after death gave less strongly
positive reactions compared with fresher brains.
DISCUSSION
The available literature contains precise descriptions of the distribution
of acetylcholinesterase activity in the septum in the cat, monkey
and rat (4, 5, 12, 13, 16, 18, 21), but only fragmentary information about
its distribution in man (16). The reports agree that highest AChE activity
is found in the nuclei of the diagonal band and nucleus accumbens of
the septum. According to the results of the present study, this applies
410 J. Białowąs Nr 4
also to man. In preceding studies (4, 5, 16, 21), stratification of the reaction
in the dorsal nucleus in the cat and rat was described. Girgiss (12, 13) has
described similar differentiation of the activity in Galago and monkeys. In the
present study, layers of increased activity were observed in the area of the
dorsal nucleus in man, in confirmation of the division of this nucleus into
layers proposed by Andy and Stephan (1-3, 29). Similar results were found by
Harkmark et al. (16).
In the light of the presented data, the division of Andy and Stephan reflects
the structural organization better than the former division by Shimazono and
Brockhaus (7, 8, 26). Nevertheless, AChE activity allows further
simplification. For instance, an anterior medial nucleus, which in animals
shows moderately high AChE activity, is not distinguishable in man. The area
adjacent to the ventricle given this name by Andy and Stephan should be
considered a part of the lateral nucleus because of the lack of AChE activity.
The triangular nucleus is absent in man, and the septo-hippocampal and
fimbriate nuclei are markedly reduced.
In previous studies on rats the acetylcholinesterase-rich centers in the septum
were divided into connected systems. The same can be done with the human
brain. For instance, the nucleus of the diagonal band together with the
fimbriate nucleus form a single system which, according to experimental
studies on animals, has massive cholinergic connections with the hippocampus
(5, 19-21, 23-25), and which may be called the posterior system.
A second group of AChE-rich centers in the septum consists of the
septo -hippocampal and medial anterior nuclei together with active bands
which connect them with the cingulate cortex. In man, in spite of absence of
the medial anterior nucleus, this system is better developed than in animals
owing to the active bands reaching far into the cingulated cortex. The name
anterior system is proposed.
The remaining centers showi.ng AChE activity are difficult to systematize.
The nucleus accumbens is probably connected with the striatum, and the
dorsal nucleus, which receives stratified projection from the hippocampus (24,
25), may also be the site of terminals of collaterals of fibers from the diagonal
tract (16).
The studies cited in the introduction indicate that the septum plays a
considerable role in the regulation of emotional states and vegetative functions
in animals and in man. Establishment of homology of the various areas of the
septum in animals and man by further comparative anatomical studies should
permit comparison of the results of some experimental studies on animals with
clinical observations.
Nr 4 Nuclei of the septum of the telencephalon 411
REFERENCES
l. Andy O. J., Stephan H.: J. Comp. Neurol., 1959, 111, 503.
2. Andy O. J., Stephan H.: J. Comp. Neurol., 1961, 1117,251.
3. Andy O. J., Stephan H.: J. Comp. Neurol., 1·968,133, 383.
4. Bialowąs J., Narkiewicz O.: Acta Neurobiol. Exp. (Warsz.), 1974, 34, 573.
5. Bialowąs J., Nitecka L., Narkiewicz O.: Folia Morphol. (Warsz.), 1972, 31,
145.
6. Brady J. V., Nauta W. J. H.: J. Comp. Physiol. Psychol., 1953, 46, 339.
7. Brockhaus H.: J. Psychol. Neurol., 1942a, 51, l.
8. Brockhaus H.: J. Psychol. Neurol., 1942b, 51, 57.
9. Cytawa J.: Acta Neurobiol. Exp. (Warsz.), 1974, 34, 161.
10. Donovik P. J.: J. Comp. Physioi. Psychol., 1968, 66, 569.
11. Gerebtzoij M. A.: Acta Anat. (Basel), 1953, 19, 366.
12. Girgis M.: Acta Anat. (Basel), 1969, 72, 94.
13. Girgis M.: Acta Anat, (Basel), 1973, 84, 202.
14. Hamilton L. W., Kelsey J. E., Grossman S. P.: J. Comp. Physiol. Psychol.,
1970, 70, 79.
15. Hamilton L. W., McCleary R. A., Grossman S. P.: J. Comp. Physiol.
Psychol., 1968, 66, 563.
16. Harkmark W., Mellgren S. I., Srebro B.: Brain Res., 1975, 95, 281.
17. Iqic R., Stern P., Basagic E.: Neuropharmacology, 1970, 9, 73.
18. Koelle G. B.: J. Comp. Neurol., 1954, 100, 21.1.
19. Lewis P. R., Shute C. C. D.: Brain, 1967, 90, 5211.
20. Lewis P. R., Shute C. C. D.: J. Physiol., 1957, UH, 2115.
21. Mellgren S. I., Srebro B.: Brain Res., 1973, 52, 19.
22. Nowicki Z.: Znaczenie rozszerzonych jam przegrody przeźroczyste] w
psychopatologii. Thesis for degree of medicine doctor, Medical Academy,
Gdańsk 1973.
23. Oderfeld-Nowak B., Narkiewicz O., Białowąs J., Dąbrowska J.,
Wieraszko A., Grądkowska M.: Acta Neurobiol Exp. (Warsz.), 1974, 34,
583...
24. Raisman G.: Brain, 1966, 89, 317.
25. Raisman G.: Exp. Brain Res., 1969, 7, 317.
26. Shimazono J.: Arch. Anat. Physiol., Anat. Abt., 1912, 55.
27. Shute C. C. D., Lewis P. R.: Nature (Lond.), 1963, 199, 1160.
412 J. Białowąs Nr 4
28. Smythies J. R.: Brain mechanisms and behavior. Blackwell Scientific
Publications, Oxford and Edinburgh 1970.
29. Stephan H., Andy O. J.: J. Hirnforsch., 1964, 7, 1.
30. Zeeman W., King F. A.: J. Nerv. Ment. Dis., 1958, 127, 490.
The author's present contact address: [email protected] (Dr. med.
Jacek Białowąs in Polish , Jacek Bialowas MD in English),
|
1207.0033 | 2 | 1207 | 2012-10-08T16:32:07 | Quantum-like model of behavioral response computation using neural oscillators | [
"q-bio.NC"
] | In this paper we propose the use of neural interference as the origin of quantum-like effects in the brain. We do so by using a neural oscillator model consistent with neurophysiological data. The model used was shown to reproduce well the predictions of behavioral stimulus-response theory. The quantum-like effects are obtained by the spreading activation of incompatible oscillators, leading to an interference-like effect mediated by inhibitory and excitatory synapses. | q-bio.NC | q-bio |
Quantum-like model of behavioral response computation
using neural oscillators
J. Acacio de Barros
Liberal Studies Program, San Francisco State University, San Francisco, CA 94132
Abstract
In this paper we propose the use of neural interference as the origin of quantum-
like effects in the brain. We do so by using a neural oscillator model consistent
with neurophysiological data. The model used was shown elsewhere to reproduce
well the predictions of behavioral stimulus-response theory. The quantum-like
effects are brought about by the spreading activation of incompatible oscilla-
tors, leading to an interference-like effect mediated by inhibitory and excitatory
synapses.
Keywords: disjunction effect, quantum cognition, quantum-like model, neural
oscillators, stimulus-response theory
1. Introduction
Quantum mechanics is one of the most successful scientific theories in his-
tory. From it, detailed predictions and extremely precise descriptions of a wide
range of physical systems are given. Thus, it is not surprising that researchers
from social and behavioral sciences disciplines started asking whether the ap-
paratus of quantum mechanics could be useful to them (Khrennikov, 2010). In
applying the quantum formalism, most researchers do not claim to have found
social or behavioral phenomena that are determined by the physical laws of
quantum mechanics (Bruza et al., 2009).
Instead, they claim that by using
the representation of states in a Hilbert space, together with the correspond-
ing non-Kolmogorovian interference of probabilities, a better description of ob-
served phenomena could be achieved. To distinguish the idea that the formalism
describing a system is quantum without requiring the system itself to be, re-
searchers often use the term quantum-like.
One of the first applications of quantum-like dynamics outside of physics was
in finances (Baaquie, 1997; Haven, 2002) and in decision making (Busemeyer et al.,
2006; Aerts, 2009).
In economy, Baaquie (1997) showed that a more general
form of the Black-Scholes option pricing equation was given by a Schrödinger-
type equation, and Haven (2002) linked the equivalent of the Plank constant to
the existence of arbitrage in the model. In psychology, most of the initial ef-
fort was focused on using quantum-like dynamics and Hilbert-space formalisms
Preprint submitted to BioSystems
June 25, 2018
to describe discrepancies between empirical data and "classical" models using
standard probability theory (see, for example, Aerts (2009); Asano et al. (2010);
Busemeyer et al. (2006); Busemeyer and Wang (2007); Busemeyer et al. (2009);
Khrennikov (2009); Khrennikov and Haven (2009); Khrennikov (2011)).
To try to describe quantum-like effects in cognitive sciences, in a recent paper
Khrennikov (2011) used a classical electromagnetic-field model for the mental
processing of information. In it, Khrennikov argues that the collective activity
of neurons involved in mental processing produces electromagnetic signals. Such
signals then propagate in the brain, leading to interference and the appearance
of quantum-like correlations. He used this model to show how quantum-like
effects help understand the binding problem.
In this paper we set forth a neural oscillator model exhibiting many of the
characteristics of Khrennikov's. The neural model we employ was initially pro-
posed as an attempt to obtain behavioral stimulus-response theory from the
neuronal activities in the brain (Suppes et al., 2012). There are many different
ways to use neural oscillators to model learning (see Vassilieva et al., 2011,
and references therein), but to our knowledge, this is the only one that makes
a clear connection between neural oscillator computations and the behavioral
responses. Furthermore, the model is simple enough to help understand the
basic principles behind the computation of a response from a stimulus without
compromising the neurophysiological interpretation of it. This must be empha-
sized, as most neural models constructed from a neurophysiological basis are so
computationally intensive and complex that it is very hard to understand why
or how one response was select instead of another. We shall see later that this
is not the case with Suppes et al. (2012).
As with Khrennikov's electromagnetic field model, our model has many
quantum-like characteristics, such as signaling, superposition, and interference.
However, it does not rely on the propagation of electromagnetic fields in the
brain. Instead, we show that these quantum-like effects could be obtained by
directly considering the interference of the activities of collections of firing neu-
rons coupled via inhibitory and excitatory synapses. In particular, we show a
violation of Savage's sure-thing principle, often cited as an example of quantum-
like behavior.
This paper is organized as follows.
In section 2 we introduce Suppes, de
Barros, and Oas's (2012) oscillator model, with special emphasis to its neu-
rophysiological interpretation and connection to SR theory. Then, in section
3.1, we present a contextual theory of quantum-like phenomena coming from
classical interference of waves (de Barros and Suppes, 2009). Finally, in section
2 we show computer simulations of neural oscillators and how they fit some
quantum-like experimental data in the literature. We end with some remarks.
2. Neural oscillator model of SR-theory
In this section, we delineate the modeling of SR theory by neural oscillators.
This section is divided into three parts. First, in subsection 2.1 we sketch the
mathematical version of behavioral SR theory we model. Then, in subsection
2
2.2 we present the model of Suppes et al. (2012) in a qualitative way. Finally,
in subsection 2.3 we give a mathematical description of the oscillator model.
Our goal is not to be exhaustive, but only to focus on the main features of
the model that are relevant for the emergence of quantum-like effects derived
later. Readers interested in more detail are referred to (Suppes et al., 2012;
de Barros et al., 2012).
2.1. Review of SR theory
Stimulus-response theory (or SR theory) is one of the most successful be-
havioral learning theories in psychology (Suppes and Atkinson, 1960). Among
the many reasons for its success, it has been shown to fit well empirical data
in a variety of experiments. This fitting requires few parameters (the learning
probability c and the number of stimuli), giving it strong prediction powers from
few assumptions. Also, because it requires a rigid trial structure, its concepts
can be formally axiomatized, resulting in many important non-trivial experi-
ments. Finally, despite its simplicity, SR theory is rich enough such that even
language can be represented within its framework (Suppes, 2002). Thus, SR
theory presents an ideal mathematical structure to be modeled at a neuronal
level1.
Here we present the mathematical version of SR theory for a continuum of re-
sponses, formalized in terms of a stochastic process (here we follow Suppes et al.,
2012). Let (Ω,F , P ) be a probability space, and let Z, S, R, and E be random
variables, with Z : Ω → ES S : Ω → S, R : Ω → R, and E : Ω → E, where
S is the set of stimuli, R the set of responses, and E the set of reinforcements.
Then a trial in SR theory has the following structure:
Zn → Sn → Rn → En → Zn+1.
(1)
Intuitively, the trial structure works the following way. Trial n starts with a
certain state of conditioning and a sampled stimulus. Once a stimulus is sam-
pled, a response is computed according to the state of conditioning. Then,
reinforcement follows, which can lead (with probability c) to a new state of con-
ditioning for trial n + 1 . In more detail, at the beginning of a trial, the state
, . . . , z(n)
1
m (cid:17).
, . . . , z(n)
m (cid:17) associates to each stimuli si ∈ S, i = 1, . . . , m,
of conditioning is represented by the random variable Zn = (cid:16)z(n)
The vector (cid:16)z(n)
where m = S is the cardinality of S, a value z(n)
Sn = si is sampled with probability P (Sn = sisiǫS) =
z(n)
i
i (cid:17),
K(cid:16)rz(n)
i.e. P (cid:16)a1 ≤ Rn ≤ a2Sn = si, Zn,i = z(n)
determines the probability of responses in R by the probability distribution
on trial n. Once a stimulus
i (cid:17) = ´ a2
a1
k(cid:16)xz(n)
i (cid:17) dx,
1
i
1
m
, its corresponding
1SR theory, in the form presented here, has lost most of its support among learning theo-
rists, mainly because of of inability to satisfactorly explain certain experiments (Mackintosh,
1983). However, many of its theorems are relevant to current neurophysiological experiments.
3
where k(cid:16)xz(n)
where Zn,i is the i-th component of the vector (cid:16)z(n)
distribution K(cid:16)rz(n)
variance and mode z(n)
fective with probability c, i.e. P (cid:16)Zn+1,i = ySn = si, En = y, Zn,i = z(n)
and P (cid:16)Zn+1,i = z(n)
i (cid:17) is the probability density associate to the distribution, and
m (cid:17). The probability
i (cid:17) is the smearing distribution, and it is determined by its
i (cid:17) = c
i (cid:17) = 1− c. The trial ends with
Sn = si, En = y, Zn,i = z(n)
, . . . , z(n)
1
. The next step is the reinforcement En, which is ef-
i
a new (with probability c) state of conditioning Zn+1.
i
2.2. Qualitative description of oscillator model
Because of its focus on behavioral outcomes, mathematical SR theory does
not provide a clear connection to the internal processing of information by the
brain. To bridge this gap, Suppes et al. (2012) proposed a neural-oscillator
based response computation model able to reproduce the main stochastic fea-
tures of SR theory, including the conditional probabilities for a continuum of
responses. It is this model that we describe qualitatively in this subsection.
In SR theory, a trial is given by the sequence in (1). In the oscillator model,
with the exception of Zn, each random variable is represented by a corresponding
oscillator. To better understand the model, let us examine each step of an SR
trial in terms of oscillators.
Let us start with the sampling of a stimulus, Sn. At the beginning of a trial,
a (distal) stimulus is presented. Through the perceptual system processing, it
reaches an area of the brain where it produces a somewhat synchronized firing
of a set of neurons. This set of firing neurons is what we think as the activation
of the sampled stimulus oscillator2, Os (t). The oscillator Os (t) is a simplified
description of the semi-periodic activity of the collection of (perhaps thousands
of) neurons.
We now turn to the computation of a response, Rn. For simplicity, we first
consider two possible responses, R1 and R2 (i.e. R = {R1, R2}); later we show
how we generalize to any number of to a continuum of responses. Once Os (t) is
activated, its couplings to other neurons may lead to a spreading of its activation
to other sets of neurons, including the response neurons. Say we can split the
neurons activated by Os (t)'s couplings into two sets, one representing R1 and
the other R2. Since those neurons were activated, as the stimulus neurons, they
fire in relative synchrony, and can be represented by the oscillators Or1 (t) and
Or2 (t). Of course, the activation of both Or1 (t) and Or2 (t) is not enough for the
computation of a response. To see how a response is computed in the oscillator
model from Or1 (t) and Or2 (t), we need think of what happens if two oscillators
are in-phase or out-of-phase. When two neural oscillators are in phase, the
firing of one adds to the firing of the other, perhaps reaching a certain response
2We limit our discussion to a single stimulus oscillator, but its generalization to N stimuli
is straightforward.
4
threshold; if they are out of phase, such threshold may not be reached, as the
firings do not add above their activated intensities. So, a response is chosen
depending on the relative phases of the oscillators. If Os (t) is in phase with
Or1 (t) and out of phase with Or2 (t), response R1 is selected. Which response
is selected depends on the actual couplings between Os (t), Or1 (t), and Or2 (t)
(see next subsection for details).
We can now talk about En, Zn, and Zn+1. Since the selected response is
determined by the couplings between neural oscillators, clearly the state of con-
ditioning Zn depends on those couplings. Therefore, on the oscillator model,
saying that a trial starts with a state of conditioning Zn is the same as say-
ing that a trial starts with a set of synaptic connections between the neurons
belonging to the ensembles representing the activated stimulus and responses.
But, as the reinforcement En may change Zn into a different state of condi-
tioning, Zn+1, it follows that during reinforcement the neural couplings need to
change. So, in the oscillator model, such couplings change when a neural rein-
forcement oscillator (corresponding to the activation of an ensemble of neurons
representing reinforcement) interacts with the stimulus and response oscillators,
thus driving a Hebb-like change in synaptic connection, resulting in learning.
The previous paragraphs summarize qualitatively the model, but there are
three points that need to be further discussed before we proceed to the quan-
titative description. First, since neural oscillators correspond to a tremendous
dimensional reduction in the neuronal dynamical system, we need to justify their
use. Second, as it is crucial for the model, an argument needs to be made as to
how oscillators synchronize. Finally, we should the two-response case, but how
can a finite number of oscillators encode a large number of responses, possibly
a continuum of responses?
Why neural oscillators? First, we note that Suppes et al. (2012) does not
propose the use of neural oscillators for any type of modeling. Instead, they
argue that if we are interested in higher cognitive functions, such as language,
it can be showed that they can be represented on electroencephalogram (EEG)
oscillation patterns (see Suppes, 2002, Chapter 8, and corresponding refer-
ences). But EEG signals are the result of a large assembly of neurons firing
synchronously or quasi-synchronously (Nunez and Srinivasan, 2006). Thus, we
can think of a word as represented in the brain by a set of coupled neurons.
When this word is activated by an external stimulus, this set of neurons fire
coherently. Such an ensemble of synchronizing neurons could, in first approxi-
mation, be represented by a periodic function FT (t), where T is the period of
the function3. So, for Suppes et al. (2012) a neural oscillator is simply a set of
firing neurons represented by such periodic functions, and a good candidate as
a unit of processing of information in the brain.
It must be emphasized that representing a collection of neurons by a periodic
function, as we did above, does not mean that all neurons fire simultaneously.
3We remark that neurons in this ensemble do not need to fire at the same time, but only
that their frequencies synchronize. They may still be in synchrony but out of phase.
5
It just means that the firing frequencies of individual neurons become very close
to each other. But neurons with the same frequency do not need to fire at
the same times. In other words, they may synchronize out of phase. But, more
importantly, once they synchronize, the initial dynamical system with thousands
of degrees of freedom become describable by a single dynamical variable, the
periodic function FT (t). It is this dramatic dimensional reduction that allows
us to produce a model whose behavior we can understand in certain specific
situations.
We now move to the question of how neural oscillators synchronize. Let us
first look at the qualitative behavior of individual neurons in two ensembles,
A and B, each with a large number of neurons firing coherently. Let nA be a
single neuron in ensemble A firing with period TA, and let nB be another neu-
ron in B firing with period TB. Let t′ be a particular time such that nB would
fire if A were not activated, i.e. the time it would fire because of its natural
periodicity TB. If nA and nB are synaptically coupled, a firing of nA at a time
t / t′ would anticipate nB's firing to a time t′′ closer to t, thus approaching
the timing of firing for both neurons4. If more neurons from ensemble A are
coupled to nB, the stronger the effect of anticipating its firing time. Further-
more, since nB is also coupled to neurons in A, its firing has the same effect
on A (though this effect does not need to be symmetric). So, the couplings
between A and B lead both periods TA and TB to approach each other, i.e., A
and B synchronize. In fact, it is possible to prove mathematically that, under
the right conditions, if the number of neurons is large enough, the sum of the
several weak synaptic interactions can cause a strong effect, making all neurons
fire close together (Izhikevich, 2007). In other words, even when weakly coupled,
two neural ensembles represented by oscillators may synchronize.
We end this subsection with the representation of a continuum of responses in
terms of neural oscillators. Continuum of responses show up in some behavioral
experiments. For example, a possible task could be to predict the position of an
airplane on a radar screen (represented by a flashing dot appearing periodically)
after observing its position for several trials. Since the radar position can be
anywhere in the screen, this cannot be represented by a discrete set of responses.
So, how could we represent a continuum of responses with neural oscillators?
With a discrete number of responses, what we did was to create a representation
for each response in terms of a distinct oscillator (in our example above, Or1 (t)
and Or2 (t)). But this approach would lead to an uncountable number of neural
oscillators for the continuum case, clearly a physically unreasonable assumption.
But there is another alternative. When we used oscillators for the two responses,
we thought about Or1 (t) and Or2 (t) as being either in phase or out of phase with
Os (t). However, they do not need to be in perfect phase. In the next section,
we show that by using specific differences of phase between Or1 (t) and Or2 (t)
and Os (t), we can control the amount of "intensity" of a neural activation on
4This is true for excitatory synapses. As we shall see later on this paper, inhibitory synapses
will play a different yet important role.
6
each oscillator. This relative intensity between Or1 (t) and Or2 (t) can be used
as a measure of how close a response is to either R1 or R2; in other words, we
can think of the response as being between R1 and R2, which would correspond
to a continuum. So, by thinking of R1 and R2 as extremes in a possible range of
responses in a continuum interval, the relative intensities of Or1 (t) and Or2 (t),
given by their phase relation with Os (t), could code any response in between.
2.3. Quantitative description of the oscillator model
We now turn to a more rigorous mathematical description. Our underlying
assumption is that we have two neural ensembles A and B described by periodic
functions FTA (t) and FTB (t) with periods TA and TB, respectively. Without
loss of generality in our argument, we assume that FTA (t) and FTB (t) have
the same shape, i.e., there exists a constant c such that FTA (t) = FTB (tc).
A simple way to describe the synchronization of A and B is to rewrite the
time argument in the functions, rewriting them as FTA (tαA) and FTB (tαB).
Clearly, if no couplings exist between A and B, their dynamics is not modified
and αA = αB = 1. However, when the ensembles are couples, αA and αB
are a function of time, their synchronization means that they evolve such that
FTA (tαA (t)) = FTB (tαB (t)). Thus, when we are studying the dynamics of
coupled neural oscillators, it suffices to study the dynamics of the arguments of
FTA and FTB above, which we call their phases.
To illustrate this point, let us imagine a simple case where when there is no
interaction A follows a harmonic oscillator with angular frequency ωA = 2π/TA.
Then FTA (t) = A cos (ωAt + δA), where and δA is a constant, and expressions
hold for FTB (t). Following the above paragraph, we rewrite
FTA (t) = A cos (ϕA (t)) ,
where
ϕA (t) = ωAt + δA
(2)
is the phase. Let us now focus on the phase dynamics.
For a set of coupled phase oscillators, Kuramoto (1984) proposed a simple set
of dynamical equations for ϕA (t). To better understand them, let us assume
that in the absence of interactions ϕA evolves according to (2). Thus, the
differential equation describing ϕA would be
and for ϕB,
dϕA (t)
dt
= ωA,
dϕB (t)
dt
= ωB.
(3)
(4)
In the presence of a synchronizing interaction, Kuramoto proposed that equa-
tions (3) and (4) should be replaced by
dϕA (t)
dt
= ωA − kAB sin (ϕA (t) − ϕB (t)) ,
(5)
7
and for ϕB,
dϕB (t)
dt
= ωB − kBA sin (ϕB (t) − ϕA (t)) .
(6)
It is easy to see how equations (5) and (6) work. When the phases ϕA and ϕB
are close to each other, we can linearize the sine term, and rewrite equations
(5) and (6) as
and for ϕB,
dϕA (t)
dt ∼= ωAt − kAB (ϕA (t) − ϕB (t)) ,
dϕB (t)
dt ∼= ωBt − kBA (ϕB (t) − ϕA (t)) .
(7)
(8)
The effect of the added term in equation (7) is to make the instantaneous fre-
quency increase above its natural frequency ωA if ϕB is greater than ϕA, and
decrease otherwise. In other words, it pushes the phases ϕA and ϕB towards
synchronization. We should emphasize that Kuramoto's equations were pro-
posed for a large number of oscillators, and his goal was to find exact solutions
for such large systems. However, as we described above, his equations also
make sense for systems with small number of oscillators (for applications of
Kuramoto's equations to systems with small number of oscillators, in addition
to Suppes et al. (2012), see also Billock and Tsou (2005, 2011); Seliger et al.
(2002); Trevisan et al. (2005) and references therein). For a set of N coupled
phase oscillators, Kuramoto's equations are
dϕi (t)
dt
= ωi −
N
Xj=1
j6=i
kij sin (ϕi (t) − ϕj (t)) .
(9)
But independent of whether we have large or small number of oscillators or not,
it is possible to prove that for oscillating dynamical systems near a bifurcation
(which is the case for many neuronal models), Kuramoto's equations present a
first order approximation for the synchronizing coupled dynamics (Izhikevich,
2007).
In the model proposed in (Suppes et al., 2012), each stimulus in the set S of
stimuli corresponds to an oscillator, i.e. there are m stimulus neural oscillators,
{si (t)}, i = 1, . . . , N . Here we use the notation si (t) to distinguish between the
oscillator and the actual stimulus si ∈ S. Once a distal stimulus is presented,
the processing of the proximal stimulus leads, after sensory processing, to the
activation of neurons in the brain corresponding to a neural oscillator repre-
sentation of such stimulus. Once a stimulus oscillator is activated by starting
to fire synchronously, a set of response oscillators, r1 (t) and r2 (t), connected
to the active stimulus oscillator via the couplings ksi,rj and kr1,r2 lead to the
synchronization of the stimulus and response oscillators. The couplings ksi,rj
and kr1,r2 correspond to the state of conditioning in SR-theory. Depending on
the details of the synchronization dynamics, as explained below, a response is
selected (this being the equivalent of sampling Xn). Finally, during reinforce-
ment, a reinforcement oscillator ey (t) is activated, and its couplings with si (t),
8
r1 (t), and r2 (t), together with ksi,rj and kr1,r2, leads to a dynamics that allow
for changes in ksi,rj and kr1,r2, which accounts for the last step in the SR trial
(1), with a new state of conditioning.
Before we detail the dynamics of the oscillator model, it is important to
discuss how si (t), r1 (t), and r2 (t) can encode a response through their cou-
plings, and how can we interpret such couplings. Let us write the case where
si is sampled, and let us assume that once the dynamics is acting, all oscilla-
tors synchronize, acquiring the same frequency (though perhaps with a phase
difference). Then,
si(t) = A cos (ϕsi (t)) = A cos (ω0t) ,
r1(t) = A cos (ϕr1 (t)) = A cos (ω0t + δφ1) ,
r2(t) = A cos (ϕr2 (t)) = A cos (ω0t + δφ2) ,
(10)
(11)
(12)
where s(t), r1(t), and r2(t) represent harmonic oscillations, ϕs(t), ϕr1 (t), and
ϕr2(t) their phases, δφ1 and δφ2 are constants, and A their amplitude, assumed
to be the same. As argued in (Suppes et al., 2012), since neural oscillators have
a wave-like behavior (Nunez and Srinivasan, 2006), their dynamics satisfy the
principle of superposition, thus making oscillators prone to interference effects.
As such, the mean intensity in time gives us a measure of the excitation of the
neurons in the neural oscillators. For the superposition of s(t) and r1(t),
where
I1 = D(si(t) + r1(t))2Et
= (cid:10)s(t)2(cid:11)t +(cid:10)r1(t)2(cid:11)t + h2s(t)r1(t)it ,
hf (t)it = lim
T →∞
1
T T
0
f (t) dt
is the time average. It is easy to compute that
and
I1 = A2 (1 + cos (δφ1)) ,
I2 = A2 (1 + cos (δφ2)) .
From the above equations, the maximum intensity for each superposition is 2A2,
and the minimum is zero. Thus, the maximum difference between I1 and I2
happens when their relative phases are π. We also expect a maximum contrast
between I1 and I2 when a response is not in between the responses represented
by the oscillators r1 (t) and r2 (t). For in between responses, we should expect
less contrast, with the minimum contrast happening when the response lies on
the mid-point of the continuum between the responses associated to r1(t) and
r2(t). The ideal balance of responses happen if we impose
δφ1 = δφ2 + π ≡ δφ,
9
(13)
which results in
and
I1 = A2 (1 + cos (δφ)) ,
(14)
(15)
From equations (14) and (15), let x ∈ [−1, 1] be the normalized difference in
intensities between r1 and r2, i.e.
I2 = A2 (1 − cos (δφ)) .
x ≡
I1 − I2
I1 + I2
= cos (δϕ) ,
(16)
0 ≤ δϕ ≤ π. The parameter x codifies the dispute between response oscillators
r1 (t) and r2 (t). So, we can use arbitrary phase differences between oscillators
to code for a continuum of responses between −1 and 1.
As we mentioned above, the dynamics of the phase oscillators leading to
(10) -- (12) are modeled here by Kuramoto equations (9). However, as we also
mentioned, (9) leads to the synchronization of all oscillators with the same
phase, which is not what we need to code responses according to equation (16).
Naturally, Kuramoto's equations need to be modified to encode the phase dif-
ferences δϕ in (10) -- (12). This can be accomplished by adding a term inside the
sine, resulting in
dϕi (t)
dt
= ωi −
N
Xj=1
j6=i
kij sin (ϕi (t) − ϕj (t) + δij ) .
(17)
The main problem with such change is how to interpret it. Equation (9) had a
clear interpretation: the firing of oscillator neurons coupled through excitatory
synapses displaced the phase of the other oscillator into synchrony. But this
interpretation does not make sense for (17). Why would oscillators be brought
close to each other, but be kept at a phase distance of δij?
To understand the origin of δij , let us rewrite (17) as
dϕi
dt
= ωi −
N
Xj=1
j6=i
kij cos (δij ) sin (ϕi − ϕj)
−
N
Xj=1
j6=i
kij sin (δij) cos (ϕi − ϕj) .
(18)
Since the terms involving the phase differences δij are constant, we can write
(18) as
dϕi
dt
= ωi −
N
Xj=1
j6=i
(cid:2)kE
ij sin (ϕi − ϕj) + kI
ij cos (ϕi − ϕj)(cid:3) ,
(19)
10
ij ≡ kij cos (δij) and kI
where kE
ij ≡ kij sin (δij). Equation (17) now has a clear
ij makes oscillators ϕi (t) and ϕj (t) approach each other, kE
interpretation: kE
ij
makes them move further apart. Thus, kE
ij corresponds to excitatory couplings
between neurons and kI
ij to inhibitory couplings. In other words, we give mean-
ing to equations (17) by rethinking their couplings in terms of excitatory and
inhibitory neuronal connections.
To summarize the response process, once a stimulus oscillator si (t) is acti-
vated at time ts,n on trial n, the response oscillators are also activated. Because
of the excitatory and inhibitory couplings between stimulus and response os-
cillators, after a certain time their dynamics lead to their synchronization, but
with phase differences given by (13). Here we point out that, due to stochas-
tic variations of biological origin, the initial conditions si (ts,n), r1 (ts,n), and
r2 (ts,n) vary according to the distribution
f (ϕi) =
1
σϕ√2π
exp(cid:18)−
ϕi
2σ2
ϕ(cid:19) .
(20)
Therefore, the phase differences at the time of response, tx,n, may not be exactly
the ones given in (13), which gives an underlying explanation for a component
of the smearing distribution5. Interference between oscillators, determined by
their phase differences, leads to a relative intensity that codes a continuum
of responses according to x in equation (16). The variable x is the response
computed by the oscillators.
We now turn to learning. Here we will only present the main features of
learning relevant to this paper. The actual details are numerous, and we refer
ij and kI
the to (Suppes et al., 2012). For learning to happen, the couplings kE
ij
need to change during reinforcement. Since reinforcement must have a brain
representation in terms of synchronously firing neurons, during reinforcement
a neural oscillator ϕy (t) gets activated. We assume that ϕy (t) is a fixed rep-
resentation in the brain, with frequencies that are independent of the stimulus
and response oscillators, and therefore can be represented by
ϕy (t) = ωet.
Furthermore, since ϕy is coding a response y being reinforced, from (16) the
phase of the oscillators must be related to y via
δϕ = arccos y.
5We note that we here only model the brain computation of a stimulus and response, and
not the representation of the distal stimulus into brain oscillators and the representation of
responses into actual muscle movement or sound production. Of course, those extra steps
between the stimulus and the response will lead to further smearing of the actual observed
distribution, and a detailed brain computation of K (cid:16)rz
i (cid:17) should include such factors. The
interested reader should refer to Suppes et al. (2012) for details about the used parameters
and the fitting of the model to experimental data.
(n)
11
During the reinforcement period, the (active) stimulus and response oscillators
evolve according to the same equations as before, but now with an extra term
due to the reinforcement oscillator, according to
dϕi
dt
= ωi − Xsi,r1,r2
kE
ij sin (ϕi − ϕj)
− Xsi,r1,r2
kE sin (ϕi − ϕj )
−K0 sin(cid:0)ϕsj − ωet + ∆i(cid:1) ,
where ∆ij reflects the reinforced response y,
(21)
∆i = − (δi,r1 + δi,r2) arccos y + δi,r2 π,
and where δi,j is Kronecker's delta. During reinforcement, couplings also change
according to a Hebbian rule represented by the equations (Seliger et al., 2002)
and
where
dkE
ij
dt
dkI
ij
dt
= ǫ (K0)(cid:2)α cos (ϕi − ϕj) − kE
ij(cid:3) ,
= ǫ (K0)(cid:2)α sin (ϕi − ϕj) − kI
ij(cid:3) ,
ǫ (K0) = (cid:26) 0 if K0 < K ′
ǫ0 otherwise,
(22)
(23)
(24)
where ǫ0 ≪ ω0, α and K0 are constant during ∆te, and K ′ is a threshold
constant throughout trials (Hoppensteadt and Izhikevich, 1996a,b). We also
assume that that there is a normal probability distribution governing the cou-
pling strength K0 between the reinforcement and the other active oscillators. It
has mean K 0 and standard deviation σK0 . Its density function is:
f (K0) =
1
σK0√2π
exp(cid:26)−
1
2σ2
K0 (cid:0)K0 − K 0(cid:1)2(cid:27) .
(25)
So, when a reinforcement oscillator is activated, the system evolves under the
coupled set of differential equations (21), (22), and (23).
To summarize, we described a model of SR theory in terms of neural oscilla-
tors. In such a model, stimulus and responses are represented by collections of
neurons firing in synchrony. Such collections of neurons, when coupled, synchro-
nize to each other. The relative phases of synchronization lead to interference
of sets of neurons, and such interference results in the coding of a continuum of
responses. We left our many of the details of the stochastic processes involved
in this model, as they are not necessary for this paper, but details can be found
in reference (Suppes et al., 2012).
12
3. Quantum-like neural oscillator effects
In this section we discuss possible quantum-like effects in the brain and
how they can be understood in terms of oscillators. We start by discussing
what we believe are quantum-like effects in the brain. We then describe how
quantum-like effects show up in decision-making experiments. Finally, we show
that neural oscillators can reproduce such effects.
3.1. What are quantum-like effects?
As we mentioned earlier, quantum mechanics is one of the most successful
theories in history. However, such success did not come without a price, as
quantum mechanics presents a view of the world that most people would find
disturbing, to say the least. This was certainly the view of many of the founders
of quantum mechanics, such as Plank, Einstein, and Pauli. At the core of their
concerns were three characteristics of quantum mechanics: nondeterminism,
contextuality, and nonlocality. Let us examine each one of those characteristics,
and see how they can be relevant to brain processes.
We start with nondeterminism. Intuitively, a dynamical system is determin-
istic if the current state of the system completely determines the future state of
such system, and it is nondeterministic otherwise. Quantum mechanics is non-
deterministic because a quantum state only gives the probabilities for the values
of certain observables during a measurement process. Of course, nondetermin-
ism is not unique to quantum mechanics. For practical purposes, there are many
nondeterministic processes, such as the famous Brownian motion, or the tossing
of a coin. But when we toss a coin or throw a die, physicists believe that the
newtonian dynamics would allow for the computation of the final state of the
die or coin, if we were to know exactly the initial conditions, i.e., the state of the
system (Ford, 1983; Vulović and Prange, 1986). In other words, before quantum
mechanics physicists used to believe that the underlying dynamics for nonde-
terministic processes was actually deterministic; we just could not distinguish
the deterministic from the nondeterministic because we could not know enough
details about the system. But whether we can distinguish between a determin-
istic and stochastic dynamics is not the important issue (in fact sometimes we
can't; see Suppes and de Barros (1996) for detail). The main point is that for
quantum theory the underlying dynamics is essentially nondeterministic.
Nondeterministic stochastic processes are often used in cognitive modeling
(Busemeyer and Diederich, 2010). For example, the stochastic SR theory men-
tioned above is nondeterministic, as conditioning happens probabilistically. Yet,
as in the coin tossing example, there is no reason to believe that the underlying
dynamics must be nondeterministic, as its stochasticity may come from our lack
of detailed knowledge about the brain or its biological noises (Josić et al., 2009).
So, it should be clear that when we talk about quantum-like brain processes,
nondeterminism should not play a prominent role. Insofar as nondeterminism is
concerned, there is no need to add further quantum-mechanical mathematical
or conceptual machinery to account for it in the brain.
13
Now let us examine nonlocality. To discuss nonlocality, we should first dis-
cuss causality, albeit briefly (interested readers are referred to Suppes (1970)).
Let A and B be two events, and let A and B be ±1-random variables corre-
sponding to whether A and B occurred (+1 if occurred, −1 otherwise). We
say that C is a cause of A if P (A = 1C = 1) > P (A = 1) and there not
exist a spurious cause (represented by a hidden variable D) that could account
for the correlations. Now, it is possible to prove that for some quantum sys-
tems, there are space-like events A and A′ such that A is a the cause of A′.
What is key in the previous statement is that A and A′ are space-like separated
events; in other words, whatever mechanism is making A′ influence A must be
superluminal6. This, it may be argued, is the main puzzling characteristic of
quantum processes: to understand them we need to accept superluminal cau-
sation7. However, we believe that quantum-like effects in the brain are not the
outcome of superluminal causation. The brain is small, of the order of tens
of centimeters, and an electromagnetic field would only need of the order of
10−10 seconds to travel the whole brain. Given that brain processes are orders
of magnitude slower than 10−10 seconds, no phenomena in the brain could not
be accounted for non-superluminal causality. In other words, we doubt it would
be possible to create an experiment where nonlocal effects in the brain would
be detected in a superluminal way.
Here we need to differentiate our use of nonlocality from what is some-
times found in the literature on quantum cognition (Nelson et al., 2003). Some-
times, authors consider a violation of some form of Bell's inequalities (Bell, 1964,
1966) as evidence of nonlocality. However, from our discussion, the correlated
quantities must be measured such that no superluminal signal explaining the
correlations is possible, otherwise a violation of Bell's inequalities would only
imply a contextuality (Suppes et al., 1996a). Classical fields, such as the electro-
magnetic fields used by Khrennikov, also exhibit contextuality, violating Bell's
inequalities and not allowing for certain configurations a joint probability distri-
bution (Suppes et al., 1996b). Here we are using nonlocality in the strict sense
of "spooky" action-at-a-distance correlations that cannot be explained without
using superluminal interactions.
This brings us to the last quantum-like issue we wish to discuss: contex-
tuality. Early on, the wave description of a particle led physicists to realize,
through Fourier's theorem, that it was impossible to simultaneously assign val-
ues of momentum and position to it. This developed into the concept of comple-
mentarity. Without trying to be too technical, we can say that two observables
are complementary when they cannot be simultaneously observed, i.e., when
the corresponding hermitian operators O1 and O2 for such properties does not
6We are summarizing a very complex and subtle discussion in a few sentences. The reader
interested in more details and in a mathematically rigorous treatment is directed to Suppes
(2002) and references therein.
7Or abandon realism, in the sense that the act of measurement of an observer (a free choice
of the experimenter) determines the existence of the quantity being measured (though realist
theories may also have other problems; see de Barros et al. (2007)).
14
commute ([ O1, O2] 6= 0). But the question is not whether we can measure O1
and O2 simultaneously, but whether we can assign those properties values even
when we cannot measure them. In other words, can we generate a data table
that fills out the values of O1 and O2 for every trial? If the number of observ-
ables is large enough, the answer to that question was given in the negative
first by Bell (1966), who showed that any attempts to fill out such tables would
result in values inconsistent with those predicted by quantum mechanics, and
later by Kochen and Specker (1975). In other words, there are quantum systems
whose observables cannot be assigned values when we do not measure them, and
therefore we cannot provide a consistent joint probability distribution for such
observables (de Barros and Suppes, 2000, 2001, 2010; de Barros, 2011)8.
This impossibility of defining a joint probability distribution is related to the
change of values of the random variables when contexts change. For example, a
random variable O1 representing O1 the outcomes of an experiment may not be
the same random variable when O2 is being measured. Such random variables
change with the context. Contextuality is not new in physics, nor in psychology.
It happens in classical systems, such as with the classical electromagnetic field
(de Barros and Suppes, 2009). However, we claim it is contextuality, with its
associated impossibility of defining joint probability distributions, that leads to
quantum-like events in brain processing.
At this point, it is important to raise the issue of how much of the quantum
mechanical apparatus is needed to describe brain processes. Quantum mechan-
ics brings to the table more than just contextuality, nonlocality, and nondeter-
minism. It also brings an additional mathematical structure, formalized by the
algebra of observables on a Hilbert space, initially advocated by von Neumann
(1996). To see this, let us examine the following case, analyzed in details by
Suppes and Zanotti (1981); Suppes et al. (1996a). Let X, Y, and Z be three
±1-valued random variables with observed pairwise joint expectations given by
E (XY) = E (XZ) = E (YZ) = −ǫ,
where ǫ > 1/3. Suppes and Zanotti (1981) showed that such expectations are
not consistent with the existence of a joint probability distribution for X, Y,
and Z if
−1 ≤ E (XY) + E (XZ) + E (YZ) ≤ 1 + 2 min{E (XY) , E (XZ) , E (YZ)} .
Thus, if they represent the outcomes of local measurements, they are contextual.
If, on the other hand, they each represent space-like separated measurement
events, they are non-local. And each random variable is indistinguishable from a
tossed coin, and are therefore nondeterministic9. However, X, Y, and Z cannot
8Though with the redefinition of what constitutes a particle, local models reproducing
many of the characteristics of quantum mechanics non-locality are possible. See, for example,
Suppes and de Barros (1994b,a); Suppes et al. (1996c,d) for a particular approach.
9The distinction between nondeterministic and deterministic is a complicated and subtle
one, c.f. Suppes and de Barros (1996), and we refrain from it in this paper. The interested
reader should also refer to Werndl (2009).
15
represent quantum mechanical observables, as, since they all commute, we could
in principle simultaneously observe X, Y, and Z, which is a sufficient condition
for the existence of a joint probability distribution10. But we could, on the
other hand, imagine a social-science or psychology example (albeit probably a
contrived one) where correlations such as the ones exhibited above could appear.
Furthermore, as shown by de Barros (2012), such random variable correlations
can be obtained from the same neural oscillator model from section 2.
In this section we discussed the different ways in which quantum-like pro-
cesses may show up in the brain. We argued that among them, the most prob-
able is contextuality. Contextuality may appear in a system for several rea-
sons. For example, certain systems evolve according to a dynamic dependent
on boundary conditions, and those may change with the context. Additionally,
a complex system may have different parts that can interfere, changing their
behavior due to alterations in the conditions of other parts. The latter pos-
sibility is mainly what Khrennikov (2011) explored in his field model. In the
next section, we will show that the complex interaction of neural oscillators are
another plausible explanation for quantum-like behavior in the brain.
3.2. Quantum-like effects in decision-making
The experimental violation of Savage's sure-thing principle (STP) is con-
sidered an example of a quantum-like decision making, so, let us start with a
description of the STP. Savage presents the following example.
"A businessman contemplates buying a certain piece of property. He
considers the outcome of the next presidential election relevant to the
attractiveness of the purchase. So, to clarify the matter for himself,
he asks whether he should buy if he knew that the Republican can-
didate were going to win, and decides that he would do so. Similarly,
he considers whether he would buy if he new that the Democratic
candidate were going to win, and again finds that he would do so.
Seeing that he would buy in either event, he decides that he should
buy, even though he does not know which event obtains, or will ob-
tain, as we would ordinarily say. It is all too seldom that a decision
can be arrived at on the basis of the principle used by this business-
man, but, except possibly for the assumption of simple ordering, I
know of no other extralogical principle governing decisions that finds
such ready acceptance." (Savage, 1972, pg. 21)
The idea illustrated is that if X (buying) is preferred to Y (not buying) under
condition A (Republican wins) and also under condition ¬A (Democrat wins),
then X is preferred to Y . Savage calls this the sure-thing principle.
10This comes from the fact that, since they commute with each other, there exists a set of
orthogonal base vectors in the Hilbert space representation such that the observables corre-
sponding to X, Y, and Z, namely X, Y , and Z, are all diagonal in this base.
16
Putting it in a more formal way, consider the following three propositions,
A, X, and Y , and let P (XA), the conditional probability of X given A, rep-
resent a measure of a rational belief on whether X is true given that A is true.
Since the measure P requires rationality of belief, it follows that it satisfies Kol-
mogorov's axioms of probability (Jaynes, 2003; Galavotti, 2005). We start with
the assumption that
This expression can be interpreted as stating that if A is true, then X is preferred
over Y. If we also assume
P (XA) > P (Y A).
P (X¬A) > P (Y ¬A),
then we obtain, multiplying each inequality by P (A) and P (¬A), respectively,
P (XA)P (A) + P (X¬A)P (¬A) > P (Y A)P (A) + P (Y ¬A)P (¬A) .
From P (A&¬A) = 1 and the definition of conditional probabilities we have
P (X) > P (Y ).
In other words, if we prefer X from Y when A is true, and we also prefer X
from Y when ¬A is true, then we should prefer X over Y regardless of whether
A is true. This, of course, is equivalent to the Savage's example.
Though STP should hold if agents are making rational decisions, Tversky and Shafir
(1992) and Shafir and Tversky (1992) showed that it was violated by decision
makers. In Tversky and Shafir (1992), they presented several simple decision-
making problems to Stanford students. For example, in one question students
were told about a game of chance, to be played in two steps. In the first step,
not voluntary, players had a 50% probability of winning $200 and 50% of loosing
$100. In the second step, a choice needed to be made: whether to gamble once
again or not. If a player accepted a second gamble, the same odds and payoffs
would be at stake. When told that that they won the first bet, 69% of subjects
said they would gamble again on the second step. When told they lost, 59% of
the subjects also said they would gamble again. Following the discussion above,
we translate the experiment into the following propositions.
and we have that
and
A = "Won first bet,"
¬A = "Lost first bet,"
X = "Accept second gamble,"
Y = "Reject second gamble,"
P (XA) = 0.69 > P (Y A) = 0.31,
P (X¬A) = 0.59 > P (Y ¬A) = 0.41,
17
since P (X) = 1 − P (Y ), as X = ¬Y . Clearly, X is preferred over Y regardless
of A. Later on the semester, the same problem was presented, but this time
students were not told whether the bet was won or not in the first round. In
other words, they had to make a decision between X and Y without knowing
whether A or ¬A. This time, 64% of students chose to reject the second gamble,
and 36% chose to accept it. Since in this case
P (X) = 0.36 < P (Y ) = 0.64,
there is a clear violation of the STP.
3.3. Violation of the sure-thing-principle with neural oscillators
We now turn to the representation of the above situation in terms of neural
oscillators. Following Tversky and Shafir (1992), we call "Won/Lost Version"
the case when students were told about A, and the "Disjunctive Version" when
students were not told about A. Let us start with the Won/Lost Version. In
the simplest case, we have two stimulus oscillators corresponding to the stim-
uli associated to the brain representation of A and ¬A. Let us call sa (t) the
oscillator corresponding to A, and sa (t) to ¬A. As before, response oscillators
are r1 (t) and r2 (t). For simplicity, we assume that all oscillators have the same
natural frequency ωi = ω0. We emphasize that this is not a necessary assump-
tion, but since the dynamics will lead to synchronization, this will make the
overall computations simpler. Then, when sa is activated, so are the response
oscillators, and the dynamics is given by
ϕsa = ω0 − kE
sa,r1 sin (ϕsa − ϕr1 )
−kE
−kI
−kI
sa,r2 sin (ϕsa − ϕr2 )
sa,r1 cos (ϕsa − ϕr1)
sa,r2 cos (ϕsa − ϕr2) ,
ϕr1 = ω0 − kE
r1,sa sin (ϕr1 − ϕsa )
−kE
−kI
−kI
r1,r2 sin (ϕr1 − ϕr2 )
r1,sa cos (ϕr1 − ϕsa )
r1,r2 cos (ϕr1 − ϕr2) ,
ϕr2 = ω0 − kE
r2,r1 sin (ϕr2 − ϕr1)
−kE
−kI
−kI
r2,sa sin (ϕr2 − ϕsa )
r2,r1 cos (ϕr2 − ϕr1 )
r2,sa cos (ϕr2 − ϕsa ) .
18
(26)
(27)
(28)
For such a system, it is possible to show (Suppes et al., 2012, Appendix) that a
response x is selected when
and
kE
sa,r1 = αx,
kE
sa,r2 = −αx,
kE
r1,r2 = −α,
kE
r1,sa = αx,
kE
r2,sa = −αx,
kE
r2,r1 = −α,
kI
sa,r1 = αp1 − x2,
sa,r2 = −αp1 − x2,
kI
kI
r1,r2 = 0,
r1,sa = −αp1 − x2,
kI
r2,sa = αp1 − x2,
kI
kI
r2,r1 = 0,
(29)
(30)
(31)
(32)
(33)
(34)
(35)
(36)
(37)
(38)
(39)
(40)
where α is a coupling strength parameter that determines how fast the solution
converges to the phase differences given in (13). We have similar equations for
sa (t), namely
ϕsa = ω0 − kE
sa,r1 sin (ϕsa − ϕr1 )
−kE
−kI
−kI
sa,r2 sin (ϕsa − ϕr2 )
sa,r1 cos (ϕsa − ϕr1)
sa,r2 cos (ϕsa − ϕr2) ,
ϕr1 = ω0 − kE
r1,sa sin (ϕr1 − ϕsa )
−kE
−kI
−kI
r1,r2 sin (ϕr1 − ϕr2 )
r1,sa cos (ϕr1 − ϕsa )
r1,r2 cos (ϕr1 − ϕr2) ,
ϕr2 = ω0 − kE
r2,r1 sin (ϕr2 − ϕr1)
−kE
−kI
−kI
r2,sa sin (ϕr2 − ϕsa )
r2,r1 cos (ϕr2 − ϕr1 )
r2,sa cos (ϕr2 − ϕsa ) ,
19
(41)
(42)
(43)
Figure 1: Histogram density of 300 oscillator models reinforced using the dynamics given in
equations (21) -- (23) for y = 0.5. The histogram was obtained using 6300 points corresponding
to 300 oscillators and 21 reinforcement trials per set of oscillators (trials 40 to 60). All
parameters used were the same as those described in Suppes et al. (2012), and K
0 was set to
4, 500. The fitted Gaussian has µ = 0.51 and σ = 0.05, with p < 10−3.
′
and the equivalent equations for (29) -- (40).
Equations (26) -- (40) determine a given phase relation for a response x in a
continuous interval, but they do not necessarily model the discrete case of a se-
lecting X over Y . To do so, let us recall that because of the stochasticity of the
initial conditions, if a particular value x is conditioned through couplings (29) --
(40), such response is selected according to a smearing distribution K(xksa ).
In fact, if f (y) is a simple reinforcement given by a Dirac delta function cen-
tered in z, i.e. f (y) = δ(y − z), then the response distribution r(x) becomes
asymptotically (Suppes, 1959)
r(x) = 1
−1
ksa (xy)δ(y − z)dy = ks(xz),
i.e. r(x) coincides with the smearing distribution at the point of reinforcement
z. Thus, by using a reinforcement density given by a Dirac delta function
centered at z, we are able to obtain the shape of the smearing distribution from
the oscillator dynamics. Figure 1 shows the density histogram for a MATLAB
simulation of the three oscillator model. Not surprisingly, the model's smearing
distribution ks(xz) fits well a Gaussian
1
ks (xz) =
σ√2π
e− (x−z)2
2σ2
,
where σ = 0.05. We should mention that the estimation of the smearing distri-
bution from a reinforcement schedule given by the Dirac delta function is not
realistic for real psychological experiments. However, because we are running
simulations without taking into consideration other behavioral and environmen-
tal aspects, we are able to extract ks(xy) from it.
20
With the smearing distribution, we may now describe how a stochastic de-
cision making processes may happen in the brain. Let X and Y be two of the
possible responses for a certain behavioral experiment. In our model, response
X would be associated with an oscillator, r1 (t), and Y with the other, r2 (t). If
I1 = 2A2 and I2 = 0, then the response would clearly be I1. Since −1 ≤ x ≤ 1,
x given by 16, we may state that x > 0 corresponds to a response X and x ≤ 0
to response Y . If we do this, when the reinforcement is a value different from 1
or −1, there is a nonzero chance, given by the smearing distribution, to select
each response. In other words, say a stimulus sa is conditioned to −1 ≤ z ≤ 1.
Then,
P (X) = 1
ksa (xz) dx
erf(cid:18) z
√2σ(cid:19)
1
2
and
≈
0
1
2
+
P (Y ) = 0
−1
1
2 −
≈
ksa (xz) dx
erf(cid:18) z
1
2
√2σ(cid:19) ,
for z , σ ≪ 1, where erf (x) is the error function. So, we can use the expression
z = √2σerf−1 (2P (R1) − 1)
to estimate the reinforcement value z leading to the desired probabilities of
responses. Let us summarize the oscillator implementation of the Won/Lost
version. We started with two stimulus, either Won or Lost, corresponding to
the oscillators sa (t) and sa (t). Once sa (t) or sa (t) are activated, the dynamics
of the system leads to a selection of either X or Y , corresponding to the decisions
of betting or not betting on the next step of the game.
We now model the "Disjunctive Version." Because the response Win or Lost
is not known, we assume that both oscillators sa (t) and sa (t) are activated
simultaneously. Furthermore, since the subject also knows that we either Win
or we Lose, oscillators sa (t) and sa (t) are incompatible, in the sense that they
must represent off-phase oscillations in an SR-oscillator model. Therefore, the
response system is composed not only of three oscillators, but four: the two
stimulus and the two response oscillators. The equivalent dynamical expressions
for (26) -- (43) when both oscillators are activated are the following.
ϕsa = ω0 − kE
sa,r1 sin (ϕsa − ϕr1 )
−kE
−kI
−kI
−kI
sa,r2 sin (ϕsa − ϕr2 )
sa,sa cos (ϕsa − ϕsa )
sa,r1 cos (ϕsa − ϕr1)
sa,r2 cos (ϕsa − ϕr2) ,
21
(44)
ϕsa = ω0 − kE
sa,r1 sin (ϕsa − ϕr1 )
−kE
−kI
−kI
−kI
sa,r2 sin (ϕsa − ϕr2 )
sa,sa cos (ϕsa − ϕsa )
sa,r1 cos (ϕsa − ϕr1)
sa,r2 cos (ϕsa − ϕr2) ,
ϕr1 = ω0 − kE
r1,sa sin (ϕr1 − ϕsa )
−kE
−kE
−kI
−kI
−kI
r1,sa sin (ϕr1 − ϕsa )
r1,r2 sin (ϕr1 − ϕr2 )
r1,sa cos (ϕr1 − ϕsa )
r1,sa cos (ϕr1 − ϕsa )
r1,r2 cos (ϕr1 − ϕr2) ,
ϕr2 = ω0 − kE
r2,r1 sin (ϕr2 − ϕr1)
−kE
−kE
−kI
−kI
−kI
r2,sa sin (ϕr2 − ϕsa )
r2,sa sin (ϕr2 − ϕsa )
r2,r1 cos (ϕr2 − ϕr1 )
r2,sa cos (ϕr2 − ϕsa )
r2,sa cos (ϕr2 − ϕsa ) ,
(45)
(46)
(47)
with the couplings between sa and r1 and r2 as well as sa and r1 and r2 being
the same, but
sa,sa = α′.
kI
(48)
As mentioned above, the parameter α′ in (48) represents a measure of the the
degree of incompatibility of stimulus oscillators sa (t) and sa (t).
1 be the mean intensity at r1 (t) given by
Now, as above, let I ′
I ′
1 = D(sa(t) + sa (t) + r1(t))2E ,
where this time we have both sa (t) and sa (t) contributing to the intensity.
Defining δϕr1,a ≡ ϕr1 − ϕsa and δϕr1,a ≡ ϕr1 − ϕsa , it is straightforward to
show that
I ′
1 = A2(cid:18) 3
2
+ cos (δϕr1,a) + cos (δϕr1,a) + cos (δϕr1,a − δϕr1,a)(cid:19) .
Similarly, for r2 (t) we have
I ′
2 = A2(cid:18) 3
2
+ cos (δϕr2,a) + cos (δϕr2,a) + cos (δϕr2,a − δϕr2,a)(cid:19) .
22
We notice that, because we now have more oscillators, extra interference terms
shows up in the intensity. We now use the new intensities, I ′
2 to compute
the response, using
1 and I ′
b′ =
I ′
1 − I ′
2
I ′
1 + I ′
2
.
At this point, we should remark on the appearance of quantum-like effects.
The model we are using, of interfering oscillators, carry some similarities with
the famous two-slit experiment (Suppes and de Barros, 1994a). In the two-slit
experiment, a quantum particle can go through two slits, and then hit a phos-
phorous screen, thus being detected. Since a particle is a localized object, going
through one slit should mean no interaction with the other slit, and therefore
we should expect to make no difference whether we keep the other slit closed
or open. However, if we open both slits, we observe different probability pat-
terns than if we close one of the slits. In other words, if we close one of the
slits, and therefore know through which slit the particle went through, we get
a probability of observing the particle in a certain region of the screen. If, on
the other hand, we do not close one of the slits, we do not know through which
slit it went, and when we do not know, the probability of detecting the particle
changes. Formally, let L be the proposition "went through the slit on the left
because the slit on the right was closed," R ="went through the slit on the right
because the slit on the left was closed," and A ="was observed at a certain
region on the screen." Then, it is possible to choose a region on the screen such
that
and
P (AR) > P (¬AR) ,
P (AL) > P (¬AL) ,
i.e., such that there are more particles being detected on it than outside of it.
However, because of quantum interference, if we do not close the slits, and do
not know where they went, it is again possible to have an A such that the above
holds and
This is the two slit formal equivalent of the violation of STP.
P (A) < P (¬A) .
Now, let us go back to the oscillator model. For the the Win/Lost Version,
a single stimulus oscillator is active at a time. Such oscillator produces a dy-
namics that leads to a certain balance between the responses X and Y . This
corresponds to one slit open, when there is no interference from the other slit.
However, for the Disjunctive Version, both oscillators are active, and their ac-
tivity interferes with each other, in a way similar to the interference from the
two-slit experiment. The strength of interference, i.e. the degree of coherence
between the two oscillators, is determined by the inhibitory coupling parame-
ter kI
sa,sa. Therefore, when both oscillators are active, we obtain a probability
distribution violating the standard axioms of probability, and consequently STP.
To end this section, let us look at a simulation of the violation of the STP
using neural oscillators. We simulated in Matlab R2012a the oscillators' dynam-
ics determined by equations (26) -- (43) and (44) -- (48) using the Dormand-Prince
23
sa,r1 = −kE
sa,r2 = kE
r1,sa = kE
r1,r2 = kE
sa,r2 = kE
r1,r2 = kI
r2,r1 = −11 Hz, kI
r1,sa = kE
r2,r1 = 0, and kI
method. For simplicity, and without loss of generality, all oscillators were as-
sumed to have the same frequency of 11 Hz, as this would allow the use of the
couplings given by (35) -- (40) and (48) without having to invoke learning equa-
tions, as in (Suppes et al., 2012). For our system, the parameters utilized were
the following: ∆tr = 0.2 s, σϕ = pπ/4, kE
r2,sa =
sa,r2 = −kI
−0.011 Hz, kE
r2,sa = 1,
sa,r1 = −kI
sa,r1 = −kE
kE
r1,sa =
kI
r2,sa = 1, kI
sa,sa = −0.011, where ∆tr is
the time of response after the onset of stimulus, and σϕ is the variance of the
initial conditions for the phase oscillators. We ran 1,000 trials with the above
parameter values, for the Win/Lost Version we obtained X as response 63%
when the Lost oscillator was used and 58% with the Win oscillator. However,
for the Disjunctive Version, when the two oscillators were active, we obtained
X as a response 36% of the runs, clearly showing a violation of Savage's STP
and an interference effect, as expected.
sa,r1 = −kI
r2,sa = −0.017 Hz, kI
sa,sa = kI
r1,sa = kI
sa,r2 = −kI
4. Conclusions
In this paper we presented a neural oscillator model based on reasonable
assumptions about the behavior of coupled neurons. We then showed that
the predictions of such model presents interference effects between incompat-
ible stimulus oscillators. Such interference leads to computation of responses
which are inconsistent with standard probability laws, but are consistent with
quantum-like effects in decision making processes Busemeyer et al. (2009). Of
course, the fact that we get interference from s1 and s2 does not preclude us from
necessarily making rational decisions. We could, for example, modify the above
model, and include an extra oscillator, such that after reinforcement we could
eliminate interference, therefore satisfying the STP. But our model suggests that
a plausible mechanism for quantum effects in the brain may not need to rely on
actual quantum processes, as advocated by Penrose (1989), but instead can be
a consequence of neuronal "interference."
One interesting feature of the oscillator model is that the amount of inter-
ference between the oscillators is determined by the couplings between s1 and
s2. The stronger the incompatibility between the two stimulus, the more we
should see interference between the responses. Furthermore, because interfer-
ence is a consequence of inhibitory couplings, we could in principle design exper-
iments where pharmacological interventions could suppress inhibitory synapses,
destroying such interference effects.
An attentive reader may question the possibility of modeling decision-making
processes from neurons.
In particular, how can we account for what Pattee
claims are non-holonomic constraints not internalized by the dynamics (Pattee,
1972, 2001, 2012). To address this issue, let us examine this claim in more
detail. First, we should notice that there are many examples of non-holonomic
constraints in physical systems that are determined by an underlying and well-
understood dynamics. For example, a ball rolling without slipping on a flat
24
surface satisfies such type of constraint. But most physicists would not think
that such an example presents fundamental difficulties to the description of the
system ball-surface. In this case, what is a constraint and what is a physical
system is just a matter of computational convenience. As a trained physicists
himself, we believe this is not what Pattee meant.
For Pattee, decision making processes require the type of discontinuous jump
that cannot be associated to classical dynamical systems, but can be thought
of as determined by non-holonomic constraints in a classical dynamics. Since
the fundamental laws of physics do not have such characteristics, he reasons,
it remains a mystery how they emerge from complex systems. He goes on to
propose that the jumps come from the emergence of quantum decoherence (using
the modern parlance).
Going back to the model presented here, the question remains on how we can
derive such emergent characteristics. First, we emphasize that we are not mod-
eling decision making processes from basic physics, but instead from emerging
properties of collections of neurons. In other words, we are assuming an emerg-
ing dynamics with the necessary features described by Pattee (1972): nonlin-
earity and time-dependent dynamics (Guckenheimer and Holmes, 1983). For
instance, overall dynamics of a highly complex system of interacting neurons
is modeled mathematically with nonlinear equations describing the behavior
of phases (which adds to the nonlinearity). Furthermore, the decision-making
dynamics changes in time by reinforcements which are outside of the dynami-
cal system itself (Suppes et al., 2012). Such reinforcements are not only time-
dependent, but can also be viewed as non-holonomic constraints to the dynam-
ics. Thus, in a certain sense, we are not addressing the fundamental problem
posed by Pattee, but we do push it to another level in the description of neural
interactions.
It is also important to clarify the relationship between our model and quan-
tum mechanics. We are not claiming that we derive quantum mechanics from
neuronal dynamics. We are showing that certain quantum-like features (but not
all; see de Barros and Suppes, 2009, for details) are present in our model. In
other words, we start with a classical stochastic description and obtain some
quantum-like results. This is to be contrasted with Pattee, who argues that
classical-like dynamics emerges from a quantum world, and such emergence
happens with the appearance of life itself11.
We end this paper with a comparison between our model and the one pro-
posed by Khrennikov (2011). Whereas in Khrennikov's model the interference
of electromagnetic fields account for quantum-like effects in the brain, in our
model we use Kuramoto oscillators to describe the evolution of coupled sets of
dynamical oscillators close to Andronov-Hopf bifurcations. Because such os-
cillators obey a wave equation, they are subject to interference. So, in some
11In an earlier paper (Suppes and de Barros, 2007), we actually discussed the limits of quan-
tum effects in decision-making processes, and proposed an experiment where the entanglement
of photons could be used to condition an insect.
25
sense, we may say that the oscillator and the field models are equivalent repre-
sentations of quantum-like interference in the brain. However, though we can
think of the weak couplings between oscillators originating from the synapses
between neurons, it is also conceivable that the weak oscillating electric fields
generated by sets of oscillators provide sufficient additional coupling to account
for their synchronization and interference. Thus, we believe that there are
not only equivalencies between the models, but also that our oscillator model
might provide an underlying neurophysiological justification for Khrennikov's
quantum-like field processing. It would be interesting to prove some representa-
tion theorem between neural oscillators and Khrennikov's field model. However,
this seems implausible, since it was shown in de Barros (2012) that oscillators
may generate processes that are not representable in terms of observables in a
Hilbert space, and Khrennikov's model relies on a quantum representation of
states in terms of Hilbert spaces.
Acknowledgments. The author wishes to thank Dr. Gary Oas for critical reading
and discussion on the contents of this manuscript, as well as the anonymous
referee for useful comments and suggestions.
References
Aerts, D., 2009. Quantum structure in cognition. Journal of Mathematical
Psychology 53, 314 -- 348.
Asano, M., Ohya, M., Khrennikov, A., 2010. Quantum-like model for decision
making process in two players game. Foundations of Physics 41, 538 -- 548.
Baaquie, B.E., 1997. A path integral approach to option pricing with stochastic
volatility: Some exact results. Journal de Physique I 7, 1733 -- 1753.
de Barros, J.A., 2011. Comments on "There is no axiomatic system for the quan-
tum theory". International Journal of Theoretical Physics 50, 1828 -- 1830.
de Barros, J.A., 2012. Joint probabilities and quantum cognition, in: Khren-
nikov, A. (Ed.), Proceedings of Quantum Theory: Reconsiderations of Foun-
dations - 6, Institute of Physics, Växjö, Sweden. To appear.
de Barros, J.A., de Mendonça, J.P.R.F., Pinto-Neto, N., 2007. Realism in
energy transition processes: an example from Bohmian quantum mechanics.
Synthese 154, 349 -- 370.
de Barros, J.A., Oas, G., Suppes, P., 2012. Response selection using neural
phase oscillators. arXiv:1208.6041 Submitted to the Festschrift in Honor of
Patrick Suppes's 90th Birthday.
de Barros, J.A., Suppes, P., 2000. Inequalities for dealing with detector inef-
ficiencies in Greenberger-Horne-Zeilinger type experiments. Physical Review
Letters 84, 793 -- 797.
26
de Barros, J.A., Suppes, P., 2001. Probabilistic results for six detectors in a
three-particle GHZ experiment, in: Bricmont, J., Dürr, D., Galavotti, M.C.,
Ghirardi, G., Petruccione, F., Zanghi, N. (Eds.), Chance in Physics, p. 213.
de Barros, J.A., Suppes, P., 2009. Quantum mechanics, interference, and the
brain. Journal of Mathematical Psychology 53, 306 -- 313.
de Barros, J.A., Suppes, P., 2010. Probabilistic inequalities and upper proba-
bilities in quantum mechanical entanglement. Manuscrito 33, 55 -- 71.
Bell, J.S., 1964. On the Einstein-Podolsky-Rosen paradox. Physics 1, 195 -- 200.
Bell, J.S., 1966. On the problem of hidden variables in quantum mechanics.
Rev. Mod. Phys. 38, 447 -- 452.
Billock, V.A., Tsou, B.H., 2005. Sensory recoding via neural synchronization:
integrating hue and luminance into chromatic brightness and saturation. J.
Opt. Soc. Am. A 22, 2289 -- 2298.
Billock, V.A., Tsou, B.H., 2011. To honor Fechner and obey Stevens: rela-
tionships between psychophysical and neural nonlinearities. Psychological
Bulletin 137, 1 -- 18.
Bruza, P., Busemeyer, J.R., Gabora, L., 2009. Introduction to the special issue
on quantum cognition. Journal of Mathematical Psychology 53, 303 -- 305.
Busemeyer, J., Wang, Z., 2007. Quantum information processing explanation for
interactions between inferences and decisions, in: Proceedings of the Quantum
Interaction Symposium AAAI Press, AAAI Press, Menlo Park, CA. pp. 91 --
97.
Busemeyer, J., Wang, Z., Lambert-Mogiliansky, A., 2009. Empirical comparison
of markov and quantum models of decision making. Journal of Mathematical
Psychology 53, 423 -- 433.
Busemeyer, J.R., Diederich, A., 2010. Cognitive modeling. SAGE.
Busemeyer, J.R., Wang, Z., Townsend, J.T., 2006. Quantum dynamics of human
decision-making. Journal of Mathematical Psychology 50, 220 -- 241.
Ford, J., 1983. How random is a coin toss? Physics Today 36, 40.
Galavotti, M.C., 2005. Philosophical introduction to probability. volume 167 of
CSLI Lecture Notes. CSLI Publications, Stanford, CA.
Guckenheimer, J., Holmes, P., 1983. Nonlinear oscillations, dynamical systems,
and bifurcations of vector fields. volume 42. Springer-Verlag New York.
Haven, E., 2002. A discussion on embedding the Black -- Scholes option pricing
model in a quantum physics setting. Physica A: Statistical Mechanics and its
Applications 304, 507 -- 524.
27
Hoppensteadt, F.C., Izhikevich, E.M., 1996a. Synaptic organizations and dy-
namical properties of weakly connected neural oscillators i. analysis of a
canonical model. Biological Cybernetics 75, 117 -- 127.
Hoppensteadt, F.C., Izhikevich, E.M., 1996b. Synaptic organizations and dy-
namical properties of weakly connected neural oscillators II. learning phase
information. Biological Cybernetics 75, 129 -- 135.
Izhikevich, E.M., 2007. Dynamical Systems in Neuroscience: The Geometry of
Excitability and Bursting. The MIT Press, Cambridge, Massachusetts.
Jaynes, E.T., 2003. Probability theory: the logic of science. Cambridge Univ
Press, Cambridge, Great Britain.
Josić, K., Rubin, J., Matias, M., 2009. Coherent Behavior in Neuronal Networks.
Springer Verlag, Dordrecht, Holland.
Khrennikov, A., 2009. Quantum-like model of cognitive decision making and
information processing. Biosystems 95, 179 -- 187.
Khrennikov, A., 2010. Ubiquitous Quantum Structure. Springer Verlag, Hei-
delberg.
Khrennikov, A., 2011. Quantum-like model of processing of information in the
brain based on classical electromagnetic field. Biosystems 105, 250 -- 262.
Khrennikov, A., Haven, E., 2009. Quantum mechanics and violations of the
sure-thing principle: The use of probability interference and other concepts.
Journal of Mathematical Psychology 53, 378 -- 388.
Kochen, S., Specker, E.P., 1975. The problem of hidden variables in quantum
mechanics, in: Hooker, C.A. (Ed.), The Logico-Algebraic Approach to Quan-
tum Mechanics. D. Reidel Publishing Co., Dordrecht, Holland, p. 293 -- 328.
Kuramoto, Y., 1984. Chemical Oscillations, Waves, and Turbulence. Dover
Publications, Inc., Mineola, New York.
Mackintosh, N.J., 1983. Conditioning and associative learning. Clarendon Press
Oxford.
Nelson, D.L., McEvoy, C.L., Pointer, L., 2003. Spreading activation or spooky
action at a distance? Journal of Experimental Psychology: Learning, Mem-
ory, and Cognition 29, 42 -- 51.
von Neumann, J., 1996. Mathematical Foundations of Quantum Mechanics.
Princeton University Press, Princeton, NJ.
Nunez, P., Srinivasan, R., 2006. Electric Fields of the Brain: The Neurophysics
of EEG, 2nd Ed. Oxford University Press, New York, NY. 2nd edition.
28
Pattee, H., 2012. Epistemic, evolutionary, and physical conditions for biological
information. Biosemiotics , 1 -- 23.
Pattee, H.H., 1972. Physical problems of decision-making constraints. Interna-
tional Journal of Neuroscience 3, 99 -- 105.
Pattee, H.H., 2001. The physics of symbols: bridging the epistemic cut. Biosys-
tems 60, 5 -- 21.
Penrose, R., 1989. Emperor's New Mind. Oxford University Press, New York,
NY.
Savage, L.J., 1972. The foundations of statistics. Dover Publications Inc.,
Mineola, New York. 2nd edition.
Seliger, P., Young, S.C., Tsimring, L.S., 2002. Plasticity and learning in a
network of coupled phase oscillators. Physical Review E 65, 041906 -- 1 -- 7.
Shafir, E., Tversky, A., 1992. Thinking through uncertainty: Nonconsequential
reasoning and choice. Cognitive Psychology 24, 449 -- 474.
Suppes, P., 1959. A linear learning model for a continuum of responses, in:
Bush, R.R., Estes, W.K. (Eds.), Studies in Mathematical Leaning Theory.
Stanford University Press, Stanford, CA, pp. 400 -- 414.
Suppes, P., 1970. A probabilistic theory of causality. volume 24 of Acta Philo-
sophica Fennica. North-Holland Publishing Company, Amsterdam, Holland.
Suppes, P., 2002. Representation and Invariance of Scientific Structures. CSLI
Publications, Stanford, California.
Suppes, P., Atkinson, R.C., 1960. Markov learning models for multiperson
interactions. Stanford University Press, Stanford, California.
Suppes, P., de Barros, J.A., 1994a. Diffraction with well-defined photon trajec-
tories: A foundational analysis. Foundations of Physics Letters 7, 501 -- 514.
Suppes, P., de Barros, J.A., 1994b. A random-walk approach to interference.
International Journal of Theoretical Physics 33, 179 -- 189.
Suppes, P., de Barros, J.A., 1996. Photons, billiards and chaos, in: Weingartner,
P., Schurz, G. (Eds.), Law and Prediction in the Light of Chaos Research.
Springer Berlin Heidelberg. volume 473, pp. 189 -- 201.
Suppes, P., de Barros, J.A., 2007. Quantum mechanics and the brain, in: Quan-
tum Interaction: Papers from the AAAI Spring Symposium, AAAI Press,
Menlo Park, CA. p. 75 -- 82.
29
Suppes, P., de Barros, J.A., Oas, G., 1996a. A collection of probabilistic
hidden-variable theorems and counterexamples, in: Pratesi, R., Ronchi, L.
(Eds.), Waves, Information, and Foundations of Physics: a tribute to Giuliano
Toraldo di Francia on his 80th birthday, Italian Physical Society, Florence,
Italy.
Suppes, P., de Barros, J.A., Oas, G., 2012. Phase-oscillator computations as
neural models of stimulus -- response conditioning and response selection. Jour-
nal of Mathematical Psychology 56, 95 -- 117.
Suppes, P., de Barros, J.A., Sant'Anna, A.S., 1996b. A proposed experi-
ment showing that classical fields can violate bell's inequalities. arXiv:quant-
ph/9606019 .
Suppes, P., de Barros, J.A., Sant'Anna, A.S., 1996c. Violation of bell's in-
equalities with a local theory of photons. Foundations of Physics Letters 9,
551 -- 560.
Suppes, P., Sant'Anna, A., Barros, J., 1996d. A particle theory of the casimir
effect. Foundations of Physics Letters 9, 213 -- 223.
Suppes, P., Zanotti, M., 1981. When are probabilistic explanations possible?
Synthese 48, 191 -- 199.
Trevisan, M.A., Bouzat, S., Samengo, I., Mindlin, G.B., 2005. Dynamics of
learning in coupled oscillators tutored with delayed reinforcements. Physical
Review E 72, 011907.
Tversky, A., Shafir, E., 1992. The disjunction effect in choice under uncertainty.
Psychological Science 3, 305 -- 309.
Vassilieva, E., Pinto, G., de Barros, J.A., Suppes, P., 2011. Learning pattern
recognition through quasi-synchronization of phase oscillators. IEEE Trans-
actions on Neural Networks 22, 84 -- 95.
Vulović, V.Z., Prange, R.E., 1986. Randomness of a true coin toss. Physical
Review A 33, 576 -- 582.
Werndl, C., 2009. Are deterministic descriptions and indeterministic descrip-
tions observationally equivalent? Studies in history and philosophy of science
part B: studies in history and philosophy of modern physics 40, 232 -- 242.
30
|
1705.09205 | 3 | 1705 | 2018-01-05T14:10:07 | Firing rate equations require a spike synchrony mechanism to correctly describe fast oscillations in inhibitory networks | [
"q-bio.NC",
"nlin.AO"
] | Recurrently coupled networks of inhibitory neurons robustly generate oscillations in the gamma band. Nonetheless, the corresponding Wilson-Cowan type firing rate equation for such an inhibitory population does not generate such oscillations without an explicit time delay. We show that this discrepancy is due to a voltage-dependent spike-synchronization mechanism inherent in networks of spiking neurons which is not captured by standard firing rate equations. Here we investigate an exact low-dimensional description for a network of heterogeneous canonical type-I inhibitory neurons which includes the sub-threshold dynamics crucial for generating synchronous states. In the limit of slow synaptic kinetics the spike-synchrony mechanism is suppressed and the standard Wilson-Cowan equations are formally recovered as long as external inputs are also slow. However, even in this limit synchronous spiking can be elicited by inputs which fluctuate on a time-scale of the membrane time-constant of the neurons. Our meanfield equations therefore represent an extension of the standard Wilson-Cowan equations in which spike synchrony is also correctly described. | q-bio.NC | q-bio | Firing rate equations require a spike synchrony mechanism to correctly
describe fast oscillations in inhibitory networks
Federico Devalle,1, 2 Alex Roxin,3 and Ernest Montbri´o1
1Center for Brain and Cognition. Department of Information and Communication Technologies,
Universitat Pompeu Fabra, 08018 Barcelona, Spain
2Department of Physics, Lancaster University,
Lancaster LA1 4YB, United Kingdom
3Centre de Recerca Matem`atica, Campus de Bellaterra,
Edifici C, 08193 Bellaterra, Barcelona, Spain.
Abstract
Recurrently coupled networks of inhibitory neurons robustly generate oscillations in the gamma band.
Nonetheless, the corresponding Wilson-Cowan type firing rate equation for such an inhibitory population
does not generate such oscillations without an explicit time delay. We show that this discrepancy is due
to a voltage-dependent spike-synchronization mechanism inherent in networks of spiking neurons which is
not captured by standard firing rate equations. Here we investigate an exact low-dimensional description
for a network of heterogeneous canonical Class 1 inhibitory neurons which includes the sub-threshold dy-
namics crucial for generating synchronous states. In the limit of slow synaptic kinetics the spike-synchrony
mechanism is suppressed and the standard Wilson-Cowan equations are formally recovered as long as ex-
ternal inputs are also slow. However, even in this limit synchronous spiking can be elicited by inputs which
fluctuate on a time-scale of the membrane time-constant of the neurons. Our meanfield equations therefore
represent an extension of the standard Wilson-Cowan equations in which spike synchrony is also correctly
described.
8
1
0
2
n
a
J
5
]
.
C
N
o
i
b
-
q
[
3
v
5
0
2
9
0
.
5
0
7
1
:
v
i
X
r
a
1
I.
INTRODUCTION
Since the seminal work of Wilson and Cowan [1], population models of neuronal activity have
become a standard tool of analysis in computational neuroscience. Rather than focus on the micro-
scopic dynamics of neurons, these models describe the collective properties of large numbers of
neurons, typically in terms of the mean firing rate of a neuronal ensemble. In general, such popu-
lation models, often called firing rate equations, cannot be exactly derived from the equations of a
network of spiking neurons, but are obtained using heuristic mean-field arguments, see e.g. [2–6].
Despite their heuristic nature, heuristic firing rate equations (which we call H-FRE) often show
remarkable qualitative agreement with the dynamics in equivalent networks of spiking neurons
[7–10], and constitute an extremely useful modeling tool, see e.g.
[11–28]. Nonetheless, this
agreement can break down once a significant fraction of the neurons in the population fires spikes
synchronously, see e.g. [29]. Such synchronous firing may come about due to external drive, but
also occurs to some degree during spontaneously generated network states.
As a case in point, here we focus on partially synchronized states in networks of heteroge-
neous inhibitory neurons. Inhibitory networks are able to generate robust macroscopic oscillations
due to the interplay of external excitatory inputs with the inhibitory mean field produced by the
population itself. Fast synaptic processing coupled with subthreshold integration of inputs intro-
duces an effective delay in the negative feedback facilitating the emergence of what is often called
Inter-Neuronal Gamma (ING) oscillations [30–38]. Modeling studies with networks of spiking
neurons demonstrate that, in heterogeneous inhibitory networks, large fractions of neurons be-
come frequency-entrained during these oscillatory episodes, and that the oscillations persist for
weak levels of heterogeneity [30, 32, 34]. Traditional H-FRE (also referred to as Wilson-Cowan
equations) fail to describe such fast oscillations. To overcome this limitation, explicit fixed time
delays have been considered in H-FRE as a heuristic proxy for the combined effects of synaptic
and subthreshold integration [9, 10, 36, 39].
Here we show that fast oscillations in inhibitory networks are correctly described by a recently
derived set of exact macroscopic equations for quadratic integrate-and-fire neurons (that we call
QIF-FRE) which explicitly take into account subthreshold integration [40]. Specifically, the QIF-
FRE reveal how oscillations arise via a voltage-dependent spike synchronization mechanism, miss-
ing in H-FRE, as long as the recurrent synaptic kinetics are sufficiently fast. In the limit of slow
recurrent synaptic kinetics intrinsically generated oscillations are suppressed, and the QIF-FRE re-
2
duce to an equation formally identical to the Wilson-Cowan equation for an inhibitory population.
However, even in this limit, fast fluctuations in external inputs can drive transient spike synchrony
in the network, and the slow synaptic approximation of the QIF-FRE breaks down. This suggests
that, in general, a correct macroscopic description of spiking networks requires keeping track of
the mean subthreshold voltage along with the mean firing rate.
Additionally, the QIF-FRE describe the disappearance of oscillations for sufficiently strong
heterogeneity which is robustly observed in simulations of spiking networks. Finally, we also
show that the phase diagrams of oscillatory states found in the QIF-FRE qualitatively match those
observed in simulations of populations of more biophysically inspired Wang-Buzs´aki neurons
[30]. This shows that not only are the QIF-FRE an exact mean-field description of networks
of heterogeneous QIF neurons, but that they also provide a qualitatively accurate description of
dynamical states in networks of spiking neurons more generally, including states with significant
spike synchrony.
II. RESULTS
Recurrent networks of spiking neurons with inhibitory interactions readily generate fast os-
cillations. Figure 1 shows an illustration of such oscillations in a network of globally coupled
Wang-Buzs´aki (WB) neurons [30]. Panels (a,c) show the results of a numerical simulation of the
network for fast synapses (time constant τd = 5 ms), compared to the membrane time constant of
the neuron model (τm = 10 ms). Although the neurons have different intrinsic frequencies due
to a distribution in external input currents, the raster plot reveals that fast inhibitory coupling pro-
duces the frequency entrainment of a large fraction of the neurons in the ensemble. This collective
synchronization is reflected at the macroscopic scale as an oscillation with the frequency of the
synchronous cluster of neurons [41, 42]. Indeed, panel (a) shows the time series of both the mean
synaptic activation variable S, and the mean firing rate R, which display ING oscillations. Panels
(b,d) of Fig. 1 show the disappearance of the synchronous state when the synaptic kinetics is slow
(τd = 50 ms).
3
FIG. 1. Networks of heterogeneous inhibitory neurons with fast synaptic kinetics (τd = 5 ms) display
macroscopic oscillations in the gamma range (ING oscillations) due to collective synchronization. Panels
(a) and (c) show the time series of the synaptic variable S (red) and mean firing rate R (blue), and the
raster plot of a population of N = 1000 inhibitory Wang-Buzs´aki neurons [30] with first order fast synaptic
kinetics. The oscillations are suppressed considering slow inhibitory synapses (τd = 50 ms), as shown in
Panels (b) and (d). See Materials and Methods for details on the numerical simulations.
A. A heuristic firing rate equation
A heuristic firing rate description of the spiking network simulated in Fig. 1 takes the form [1, 5]
R = −R + Φ(−JτmS + Θ),
S = −S + R.
τm
τd
(1a)
(1b)
where R represents the mean firing rate in the population, S is the synaptic activation, and the
time constants τm and τd are the neuronal and synaptic time constants respectively [39, 43]. The
input-output function Φ, also known as the f-I curve, is a nonlinear function, the form of which
depends on the details of the neuronal model and on network parameters. Finally, J ≥ 0 is the
synaptic strength and Θ is the mean external input current compared to threshold. In contrast with
the network model, the H-FRE Eqs. (1) cannot generate sustained oscillations. In fact, a linear
stability analysis of steady state solutions in Eqs. (1) shows that the resulting eigenvalues are
λ = −α(1 ±(cid:112)1 − β),
(2)
where the parameter α = (τm + τd)/(2τmτd) is always positive. Additionally, the parameter
β = [4τmτd(1 + JτmΦ(cid:48))]/(τm + τd)2 is also positive, since the f-I curve Φ(x) is an increasing
4
function, and its derivative evaluated at the steady state is then Φ(cid:48) > 0. Therefore the real part of
the eigenvalue λ is always negative and hence steady states are always stable, although damped
oscillations are possible, e.g. for strong enough coupling J. Introducing an explicit fixed time
delay in Eqs. (1) can lead to the generation of oscillations with a period on the order of about
twice the delay [9, 10, 36]. Nonetheless, inhibitory networks of spiking neurons robustly show
oscillations even in the absence of explicit delays, as seen in Fig. 1. This suggests that there is
an additional mechanism in the network dynamics, key for driving oscillatory behavior, which
H-FRE do not capture.
B. An exact firing rate equation which captures spike synchrony
Here we show that the mechanism responsible for the generation of the oscillations shown
in Fig. 1 is the interplay between the mean firing rate and membrane potential, the dynamics of
which reflect the degree of spike synchrony in the network. To do this, we use a set of exact macro-
scopic equations which have been recently derived from a population of heterogeneous quadratic
integrate-and-fire (QIF) neurons [40]. We refer to these equations as the QIF-FRE. The QIF-FRE
with exponential synapses have the form
∆
πτm
+ 2RV,
R =
V = V 2 − (πτmR)2 − JτmS + Θ,
S = −S + R.
τm
τm
τd
(3a)
(3b)
(3c)
where ∆ is a parameter measuring the degree of heterogeneity in the network and the other param-
eters are as in the H-FRE Eqs. (1). Eqs. (3) are an exact macroscopic description of the dynamics
in a large network of heterogeneous QIF neurons with inhibitory coupling. In contrast with the
traditional firing rate equations Eqs. (1), they contain an explicit dependence on the subthreshold
state of the network, and hence capture not only macroscopic variations in firing rate, but also in
spike synchrony. Specifically, a transient depolarizing input which drives the voltage to positive
values (the voltage has been normalized such that positive values are suprathrehsold, see Materials
and Methods) will lead to a sharp growth in the firing rate through the bilinear term in Eq. (3a).
Simulations in the corresponding network model reveal that this increase is due to the synchronous
spiking of a subset of neurons [40]. This increase in firing rate leads to a hyperpolarization of the
mean voltage through the quadratic term in R in Eq. (3b). This term describes the effect of the
5
neuronal reset. This decrease in voltage in turn drives down the mean firing rate, and the process
can repeat. Therefore the interplay between mean firing rate and mean voltage in Eqs. (3) can
generate oscillatory behavior; this behavior corresponds to transient bouts of spike synchrony in
the spiking network model.
It is precisely the latency inherent in this interplay which provides the effective delay, which
when coupled with synaptic kinetics, generates self-sustained fast oscillations. In fact, in the limit
of instantaneous synapses (τd → 0), Eqs. (3) robustly display damped oscillations due to the spike
generation and reset mechanism described in the preceding paragraph [40]. Contrast this with the
dynamics in Eqs.(1) in the same limit: the resulting H-FRE is one dimensional and hence cannot
oscillate.
On the face of things the Eqs. (3) appear to have an utterly distinct functional form from the
traditional Wilson-Cowan Eqs.(1). In particular, the f-I curve in H-FRE traditionally exhibits an
expansive nonlinearity at low rates and a linearization or saturation at high rates, e.g. a sigmoid.
There is no such function visible in the QIF-FRE which have only quadratic nonlinearities. How-
ever, this seeming inconsistency is simply due to the explicit dependence of the steady-state f-I
curve on the subthreshold voltage in Eqs. (3). In fact, the steady-state f-I curve in the QIF-FRE is
"typical" in the qualitative sense described above. Specifically, solving for the steady state value
of the firing rate in Eqs. (3) yields
where
R∗ = Φ(−JτmR∗ + Θ),
(cid:113)
I +
√
I 2 + ∆2.
Φ(I) =
1√
2πτm
(4)
(5)
The f-I curve Eq. (5) is shown in Fig. 2 for several values of the parameter ∆, which measures the
degree of heterogeneity in the network. Therefore, the steady-state firing rate in Eqs. (3), which
corresponds exactly to that in a network of heterogeneous QIF neurons, could easily be captured
in a heuristic model such as Eqs. (1) by taking the function Φ to have the form as in Eq. (5). On
the other hand, the non-steady behavior in Eqs. (3), and hence in spiking networks as well, can be
quite different from that in the heuristic Eqs. (1).
6
FIG. 2. The f-I curve Φ(I), Eq. (5), for several values of the heterogeneity parameter ∆. The membrane
time constant is τm = 10ms.
1. Fast oscillations in the QIF-FRE
We have seen that decreasing the time constant of synaptic decay τd in a network of inhibitory
spiking neurons lead to sustained fast oscillations, while such a transition to oscillations is not
found in the heuristic rate equations, in which the synaptic dynamics are taken into account
Eqs. (1). The exact QIF-FRE, on the other hand, do generate oscillations in this regime. Fig-
ure 3 shows a comparison of the firing rate R and synaptic variable S from simulations of the
QIF-FRE Eqs.(3), with that of the H-FRE Eqs. (1), for two different values of the synaptic time
constants. Additionally, we also performed simulations of a network of N = 5× 104 QIF neurons.
The mean firing rate of the network is shown in red, and perfectly agrees with the firing rate of the
low dimensional QIF-FRE (solid black lines). The function Φ in Eqs. (1) is chosen to be that from
Eq. (5), which is why the firing rate from both models converges to the same steady state value
when oscillations are not present (panels (b,d) for τd = 50 ms). We will study the transition to fast
oscillations in Eqs.(3) in greater details in the following sections.
C. Linear stability analysis of the QIF-FRE
We can investigate the emergence of sustained oscillations in Eqs. (3) by considering small
amplitude perturbations of the steady-state solution. If we take R = R∗ + δReλt, V = V∗ + δV eλt
and S = S∗ + δSeλt, where δR, δV , δS (cid:28) 1, then the sign of the real part of the eigenvalue
λ determines whether the perturbation grows or not. Plugging this ansatz into Eqs. (3) yields
7
FIG. 3. Heuristic FRE Eqs. (1) do not display inhibition-based fast oscillations. In contrast, networks of
QIF neurons (red) and their corresponding QIF-FRE Eqs. (3) (solid black) do show ING oscillations for fast
synaptic kinetics (τd = 5 ms). These oscillations are suppressed for slow synaptic kinetics (τd = 50 ms), as
in the Wang-Buzs´aki model shown in Fig. 1. Panels (a,b) show the times series of the Firing Rate variable
R of the FRE models, as well as the mean firing rate of a population of N = 5 × 104 QIF neurons (red).
Panels (c,d) show the time series of the synaptic S variables for the H-FRE (dashed line) and QIF-FRE
(solid line). Parameters: τm = 10 ms, J = 21, Θ = 4, ∆ = 0.3. Initial values: R(0) = S(0) = 5 Hz,
V (0) = 0.
three coupled linear equations which are solvable if the following characteristic equation also has
a solution
− 2JτmR∗ = (1 + τdλ)
(2πτmR∗)2 +
τmλ +
.
(6)
(cid:34)
(cid:18)
(cid:19)2(cid:35)
∆
πτmR∗
The left hand side of Eq. (6) is always negative and, for τd = 0, this implies that the solutions λ are
necessarily complex. Hence, for instantaneous synapses, the fixed point of the QIF-FRE is always
of focus type, reflecting transient episodes of spike synchrony in the neuronal ensemble [40]. In
contrast, setting τd = 0 in the H-FRE, the system becomes first order and oscillations are not
possible. This is the critical difference between the two firing rate models. In fact, and in contrast
with the eigenvalues Eq. (2) corresponding to the growth rate of small perturbations in the H-FRE,
here oscillatory instabilities may occur for nonvanishing values of τd. Figure 4 shows the Hopf
√
boundaries obtained from Eq. (6), as a function of the normalized synaptic strength j = J/
Θ
8
FIG. 4. The ratio of the width to the center of the distribution of currents Eq. (14), δ = ∆/Θ, determines
the presence of fast oscillations in the QIF-FRE. Oscillations disappear above the critical value given by
Eq. (8). The panels show the Hopf boundaries of QIF-FRE with first-order synapses, for different values of
δ, obtained solving the characteristic Eq. (6) with Re(λ) = 0, see Materials and Methods. Shaded regions
are regions of oscillations. Symbols in the right panel correspond to the parameters used in Fig 3.
Θτd/τm, and for different values
and the ratio of the synaptic and neuronal time constants τ =
of the ratio δ = ∆/Θ -see Materials and Methods, Eqs.(19-21). The shaded regions correspond
to parameter values where the QIF-FRE display oscillatory solutions.
√
1.
Identical neurons
In the simplest case of identical neurons we find the boundaries of oscillatory instabilities
explicitly. Indeed, substituting λ = ν + iω in Eq. (6) we find that, near criticality (ν (cid:28) 1), the
real part of the eigenvalue is
ν ≈ Jτ
R∗
1 + (2πτdR∗)2 .
(7)
Thus, the fixed point (4) is unstable for Jτ > 0, and changes its stability for either J = 0, or τ = 0.
In particular, given a non-zero synaptic time constant there is an oscillatory instability as the sign
of the synaptic coupling J changes from positive to negative. Therefore oscillations occur only
for inhibitory coupling [44–46]. The frequency along this Hopf bifurcation line is determined
entirely by the intrinsic firing rate of individual cells ωc = 2πR∗.
On the other hand, in the limit of fast synaptic kinetics, i.e. τd = 0 in Eq. (6), we find another
(cid:112)2τmR∗(J + 2π2τmR∗). This reflects the fact that oscillations
Hopf bifurcation with ωc = 1
τm
cannot be induced if the synaptic interactions are instantaneous. The left panel of Figure 4 shows
the phase diagram with the Hopf boundaries depicted in red, reflecting that oscillations are found
for all values of inhibitory coupling and for non-instantaneous synaptic kinetics.
9
2. Heterogeneous neurons
Once heterogeneity is added to the network the region of sustained oscillatory behavior shrinks,
see Fig.4, center and right. The red closed curves correspond to the Hopf bifurcations, which have
been obtained in parametric form from the characteristic equation (6), see Materials and Methods.
Note that for small levels of δ, oscillations are present in a closed region of the phase diagram,
and disappear for large enough values of τ (the synaptic time constant relative to the neuronal time
constant). Further increases in δ gradually reduce the region of oscillations until it fully disappears
at the critical value
(cid:18)∆
(cid:19)
(cid:113)
(8)
δc =
=
1
5
Θ
c
√
5 − 2
5 = 0.1453 . . . ,
which has been obtained analytically from the characteristic Eq. (6), see Materials and Meth-
ods. This result is consistent with numerical studies investigating oscillations in heterogeneous
inhibitory networks which indicate that gamma oscillations are fragile against the presence of
quenched heterogeneity [30, 32, 34].
In the following, we compare the phase diagrams of Fig. 4 with numerical results using het-
erogeneous ensembles of Wang-Buzs´aki neurons with first order synapses. Instead of using the
population mean firing rate or mean synaptic activation, in Fig. 5 we computed the amplitude of
the population mean membrane potential. This variable is less affected by finite-size fluctuations
and hence the regions of oscillations are more easily distinguishable. The results are summarized
in Fig. 5 for different values of δ and have been obtained by systematically increasing the cou-
pling strength k for fixed values of τd. The resulting phase diagrams qualitatively agree with those
shown in Fig. 4 . As predicted by the QIF-FRE, oscillations are found in a closed region in the
(τd, k) parameter space, and disappear for large enough values of δ. Here, the critical value of
δ = σ/ ¯I is about 6%, smaller than the critical value given by Eq. (8). This is due to the steep f-I
curve of the WB model, which implies a larger dispersion in the firing rates of the neurons even
for small heterogeneities in the input currents.
Additionally, for small τd (fast synaptic kinetics) and strong coupling k, we observed small
regions where the oscillations coexist with the asynchronous state -not shown. Numerical sim-
ulations indicate that this bistability is not present in the QIF-FRE. For strong coupling, and co-
existing with the asynchronous state, we also observed various clustering states, already reported
in the original paper of Wang & Buzs´aki [30]. Clustering in inhibitory networks has also been
observed in populations of conductance-based neurons with spike adaptation [47] or time delays
10
FIG. 5. Amplitude of the oscillations of the mean membrane potential for a population of N = 1000 WB
neurons. From left to right: δ = σ/ ¯I = 0, 0.05 and 0.06. Central and Right panels have σ = 0.01 µA/cm2.
See Materials and Methods for details.
[48]. The fact that such states do not emerge in the model Eqs. (12) may be due to the purely
sinusoidal shape of the phase resetting curve of the QIF model [49–54].
D. Firing Rate Equations in the limit of slow synapses
We have seen that the oscillations which emerge in inhibitory networks for sufficiently fast
synaptic kinetics are correctly described by the firing rate equations Eqs. (3), but not by the heuris-
tic Eqs. (1). The reason for this is that the oscillations crucially depend on the interaction between
the population firing rate and the subthreshold membrane potential during spike initiation and re-
set; this interaction manifests itself at the network level through spike synchrony. Therefore, if
one could suppress the spike synchrony mechanism, and hence the dependence on the subthresh-
old membrane potential, in Eqs. (3), the resulting equations ought to bear resemblance to Eqs. (1).
In fact, as we saw in Fig. 3, the two firing rate models become more similar when the synaptic
kinetics become slower.
Next we show that the two models become identical, formally, in the limit of slow synaptic
kinetics. To show this, we assume the synaptic time constant is slow, namely τd = ¯τd/ where
0 < (cid:28) 1, and rescale time as ¯t = t. In this limit we are tracking the slow synaptic dynamics in
while the neuronal dynamics are stationary to leading order, i.e.
R∗ = Φ(−JτmS + Θ).
Therefore, the dynamics reduce to the first order equation
S = −S + Φ(−JτmS + Θ).
τd
11
(9)
(10)
FIG. 6. The reduction of the QIF-FRE to Eq.(10) breaks down when neurons receive time-varying inputs.
Panels (a-c): S-variable time series for QIF-FRE (solid Black), H-FRE (dashed Black) and Eq. (10) (Blue),
for decreasing values of the period TΘ of the external periodic forcing Θ(t) = 4 + [1 + sin(2πt/Tθ)]3
-shown in panels (g-i). In all cases, the synaptic time constant is slow τd = 100 ms, compared to the
membrane time constant τm = 10 ms. Panels (d-f): R-variable time series. In the case of model Eq. (10),
the firing rate has been evaluated using Eq.(9). Other parameters are J = 21, ∆ = 0.3.
Notably, this shows that the QIF-FRE Eqs. (3), and the H-FRE (1), do actually have the same
dynamics in the limit of slow synapses. In other words, Eq. (10) is formally equivalent to the
Wilson-Cowan equations for a single inhibitory population, and this establishes a mathematical
link between the QIF-FRE and Heuristic firing rate descriptions. Additionally, considering slow
second order synaptic kinetics (not shown), allows one to reduce the QIF-FRE with either alpha or
double exponential synapses to a second-order system that formally corresponds to the so-called
neural mass models largely used for modeling EEG data, see e.g. [6, 55–58].
1. External inputs and breakdown of the slow-synaptic limit Eq. (10)
It is important to note that, in the derivation of Eq. (10) we considered external inputs Θ to be
constant. Then, if synapses are slow, the neuronal variables (R in the case of Eqs. (1) and R and
12
V in the case of Eqs. (3)) decay rapidly to their fixed point values. However even in the limit of
slow synapses, such reduction can break down if external inputs are time-varying Θ = Θ(t), with
a time-scale which itself is not sufficiently slow.
To demonstrate this, in Fig. 6, we compared the dynamics of the QIF-FRE and H-FRE with
the approximation Eq. (10), for periodic stimuli of various periods -panels (g-i)-, and always
considering slow synapses, τd = 100 ms. As expected, the models show good agreement for
very slow external inputs -see panels (a,d)-, but this discrepancy is strongly magnified for fast
external inputs Specifically, for fast inputs -see panels (c,f)-, the dynamics of the S and R
variables of the QIF-FRE are clearly different form those of the other models. This illustrates
that even in the limit of slow synapses, the response of spiking networks to arbitrary time-varying
inputs will always generate some degree of spike synchrony.
III. DISCUSSION
Firing rate models, describing the average activity of large neuronal ensembles are broadly used
in computational neuroscience. However, these models fail to describe inhibition-based rhythms,
typically observed in networks of inhibitory neurons with synaptic kinetics [30–38]. To overcome
this limitation, some authors heuristically included explicit delays in traditional FRE, and found
qualitative agreement with the oscillatory dynamics observed in simulations of spiking neurons
with both synaptic kinetics and fixed time delays [9, 10, 36, 39]. Nonetheless it remains unclear
why traditional H-FRE with first order synaptic kinetics do not generate inhibition-based oscilla-
tions.
Here we have investigated a novel class of FRE which can be rigorously derived from popu-
lations of spiking (QIF) neurons [40]. Networks of globally coupled QIF neurons with fast in-
hibitory synapses readily generate fast self-sustained oscillations. The corresponding exact FRE,
which we call the QIF-FRE, therefore also generates oscillations. The benefit of having a simple
macroscopic description for the network dynamics is its amenability to analysis. In particular,
the nonlinearities in Eqs.(3), which arise due to the spike initiation and reset mechanism in the
QIF model, conspire to generate damped oscillations which reflect transient spike synchrony in
the network. This oscillatory mode can be driven by sufficiently fast recurrent inhibitory synaptic
activation, leading to sustained oscillations. This suggests that any mean-field description of net-
work activity which neglects subthreshold integration will not properly capture spike-synchrony-
13
dependent dynamical behaviors, including fast inhibitory oscillations.
The QIF-FRE have also allowed us to generate a phase diagram for oscillatory behavior in a
network of QIF neurons with ease via a standard linear stability analysis, see Fig.4. This phase dia-
gram agrees qualitatively with that of an equivalent network of Wang-Buzs´aki neurons, suggesting
that the QIF-FRE not only provide an exact description of QIF networks, but also a qualitatively
accurate description of macroscopic behaviors in networks of Class I neurons in general. In par-
ticular, the QIF-FRE capture the fragility of oscillations to quenched variability in the network, a
feature that seems to be particularly pronounced for Class 1 neuronal models compared to neural
models with so-called Class 2 excitability [59].
Finally we have shown that the QIF-FRE and the heuristic H-FRE are formally equivalent in
the limit of slow synapses. In this limit the neuronal dynamics is slaved to the synaptic activation
and well-described by Eq. (10), as long as external inputs are stationary. In fact, in the absence
of quenched heterogeneity (∆ = 0), the approximation for slow synapses Eq. (10) is also fully
equivalent to the reduction for slow synapses in networks of Class 1 neurons derived by Ermentrout
in [60]. This further indicates that the QIF-FRE are likely valid for networks of Class 1 neurons in
general. However, we also show that in the more biologically plausible scenario of time-varying
external drive some degree of neuronal synchronization is generically observed, as in Fig. (6), and
the slow-synapse reduction Eq. (10) is not valid.
The results presented here are obtained under two important assumptions that need to be taken
into account when comparing our work to the existing literature on fast oscillations in inhibitory
networks. (i) A derivation of an exact firing rate model for a spiking neuron network is only possi-
ble for ensembles of QIF neurons, which are the canonical model for Class 1 excitability [45, 61].
Although many relevant computational studies on fast inhibitory oscillations also consider Class
1 neurons [30, 32, 34, 39, 62–64], experimental evidence indicates that fast spiking interneurons
are highly heterogeneous in their minimal firing rates in response to steady currents, and that a
significant fraction of them are Class 2 [65–68] -but see also [69]. (ii) Our derivation of the QIF-
FRE is valid for networks of globally coupled QIF neurons, with Lorentzian-distributed currents.
In this system inhibition-based oscillations are only possible when the majority of the neurons are
self-sustained oscillators, i.e. for Θ > 0 in Eq. (14), and are due to the frequency locking of a frac-
tion of the oscillators in the population [41, 42] -as it can be seen in the raster plot of Fig. 1(c).
In this state, the frequency of the cluster of synchronized oscillators coincides with the frequency
of the mean field. The value of the frequency itself is determined through an interplay between
14
single-cell resonance and network effects. Specifically, the synchronized neurons have intrinsic
spiking frequencies near that of the mean-field oscillation and hence are driven resonantly. This
collective synchronization differs from the so-called sparse synchronization observed in inhibitory
networks of identical Class 1 neurons under the influence of noise [34, 36, 62, 63]. In the sparsely
synchronized state neurons fire stochastically at very low rates, while the population firing rate
displays the fast oscillations as the ones reported here.
Oscillatory phenomena arising from single-cell resonances, and which reflect spike synchrony
at the population level, are ubiquitous in networks of spiking neurons. Mean-field theory for noise-
driven networks leading to a Fokker-Planck formalism, allows for a linear analysis of the response
of the network to weak stimuli when the network is in an asynchronous state [43, 70]. Reso-
nances can appear in the linear response when firing rates are sufficiently high or noise strength
sufficiently low. Recent work has sought to extend H-FRE in this regime by extracting the com-
plex eigenvalue corresponding to the resonance and using it to construct the linear operator of a
complex-valued differential equation, the real part of which is the firing rate [29]. Other work
has developed an expression for the response of spiking networks to external drive, which of-
ten generates resonance-related damped oscillations, through an eigenfunction expansion of the
Fokker-Planck equation [71]. Our approach is similar in spirit to such studies in that we also
work with a low dimensional description of the network response. In contrast to previous work
our equations are an exact description of the macroscopic behavior, although they are only valid
for networks of heterogeneous QIF neurons. Nonetheless, the QIF-FRE are simple enough to al-
low for an intuitive understanding of the origin of fast oscillations in inhibitory networks, and in
particular, of why these oscillations are not properly captured by H-FRE.
IV. ACKNOWLEDGMENTS
F.D. and E.M acknowledge support by the European Union's Horizon 2020 research and in-
novation programme under the Marie Skłodowska-Curie grant agreement No. 642563. A.R. ac-
knowledges a project grant from the Spanish ministry of Economics and Competitiveness, Grant
No. BFU2012-33413. A.R. has been partially funded by the CERCA progam of the Generalitat de
Catalunya. E.M. acknowledges the projects grants from the Spanish ministry of Economics and
Competitiveness, Grants No. PSI2016-75688-P and No. PCIN-2015-127.
15
V. MATERIALS AND METHODS
A. Populations of inhibitory Quadratic Integrate and Fire neurons
We model fast-spiking interneurons, the dynamics of which are well-described by the Hodgkin-
Huxley equations with only standard spiking currents. Many models of inhibitory neurons are
Class 1 excitable [72], including for example the Wang-Busz´aki (WB) [30], and the Morris-Lecar
models [73]. Class 1 models are characterized by the presence of a saddle-node bifurcation on an
invariant circle at the transition from quiescence to spiking. One consequence of this bifurcation
structure is the fact the spiking frequency can be arbitrarily low near threshold. Additionally, near
threshold the spiking dynamics are dominated by the time spent in the vicinity of the saddle-node
itself, allowing for a formal reduction in dimensionality from the full neuron model to a reduced
normal form equation for a saddle-node bifurcation [2, 45, 61]. This normal form, which is valid
for any Class 1 model near threshold, is known as the quadratic integrate-and-fire model (QIF).
Using a change of variables, the QIF model can be transformed to a phase model, called Theta-
Neuron model [74], which has an strictly positive Phase Resetting Curve (PRC). Neuron models
with strictly positive PRC are called Type 1 neurons, indicating that perturbations always produce
an advance (and not a delay) of their phase. In general, Class 1 neurons have a Type 1 PRC [45],
but see [75, 76].
In a network of QIF neurons, the neuronal membrane potentials are { Vi}i=1,...,N, which obey
the following ordinary differential equations [7, 64, 74]:
C
d Vi
dt
= gL
( Vi − Vt)( Vi − Vr)
(Vt − Vr)
+ I0,i
(11)
where C is the cell capacitance, gL is the leak conductance and I0,i are external currents. Addi-
tionally, Vr and Vt represent the resting potential and threshold of the neuron, respectively. Us-
i = Vi − (Vt + Vr)/2, and then rescaling the shifted voltages as
ing the change of variables V (cid:48)
Vi = V (cid:48)
i /(Vt − Vr), the QIF model (11) reduces to
τm
Vi = V 2
i + Ii
(12)
where τm = C/gL is the membrane time constant, Ii = I0,i/(gL(Vt − Vr)) − 1/4 and the overdot
represents derivation with respect to time t. Note that in the model (12) the voltage variables Vi
and the inputs Ii do not have dimensions. Thereafter we work with QIF model its simplest form
16
Eq. (12). We assume that the inputs are
Ii = ηi − JτmS,
(13)
where J is the inhibitory synaptic strength, and S is the synaptic gating variable. Finally, the
currents ηi are constants taken from some prescribed distribution that here we consider it is a
Lorentzian of half-width ∆, centered at Θ
g(η) =
1
π
∆
(η − Θ)2 + ∆2 .
(14)
In numerical simulations the currents were selected deterministically to represent the Lorentzian
distribution as: ηi = Θ + ∆ tan(π/2(2i − N − 1)/(N + 1)), for i = 1, . . . , N. In the absence
of synaptic input, the QIF model Eqs.(12,13) exhibits two possible dynamical regimes, depend-
√−ηi,
ing on the sign of ηi. If ηi < 0, the neuron is excitable, and an initial condition Vi(0) <
asymptotically approaches the resting potential −√−ηi. For initial conditions above the excitabil-
√−ηi, the membrane potential grows without bound. In this case, once the
ity threshold, Vi(0) >
neuron reaches a certain threshold value Vθ (cid:29) 1, it is reset to a new value −Vθ after a refractory
period 2τm/Vθ (in numerical simulations, we choose Vθ = 100). On the other hand, if ηj > 0, the
√
neuron behaves as an oscillator and, if Vθ → ∞, it fires regularly with a period T = πτm/
ηi.
The instantaneous population mean firing rate is
N(cid:88)
(cid:88)
(cid:90) t
R = lim
τs→0
1
N
1
τs
j=1
k
t−τs
dt(cid:48)δ(t(cid:48) − tk
j ),
(15)
j is the time of the kth spike of jth neuron, and δ(t) is the Dirac delta function. Finally,
where tk
the dynamics of the synaptic variable obeys the first order ordinary differential equation
S = −S + R.
τd
(16)
For the numerical implementation of Eqs. (15,16), we set τs = 10−2τm. To obtain a smoother time
series, the firing rate plotted in Fig. 3 was computed according to Eq. (15) with τs = 3 · 10−2τm.
B. Firing Rate Equations for populations of Quadratic Integrate and Fire neurons
Recently Luke et al. derived the exact macroscopic equations for a pulse-coupled ensemble
of Theta-Neurons [77], and this has motivated a considerable number of recent papers [78–86,
88]. This work applies the so-called Ott-Antonsen theory [89–91] to obtain a low-dimensional
17
description of the network in terms of the complex Kuramoto order parameter. Nevertheless, it is
is not obvious how these macroscopic descriptions relate to traditional H-FRE.
As we already mentioned, the Theta-neuron model exactly transforms to the Quadratic Inte-
grate and Fire (QIF) model by a nonlinear change of variables [45, 61, 74]. This transformation
establishes a map between the phase variable θi ∈ (−π, π] of a Theta neuron i, and the mem-
brane potential variable Vi ∈ (−∞, +∞) of the QIF model Eq. (12). Recently it was shown that,
under some circumstances, a change of variables also exists at the population level [40]. In this
case, the complex Kuramoto order parameter transforms into a novel order parameter, composed
of two macroscopic variables: The population-mean membrane potential V , and the population-
mean firing rate R. As a consequence of that, the Ott-Antonsen theory becomes a unique method
for deriving exact firing rate equations for ensembles of heterogeneous spiking neurons -see
also [92–94] for recent alternative approaches.
Thus far, the FRE for QIF neurons (QIF-FRE) have been successfully applied to investigate
the collective dynamics of populations of QIF neurons with instantaneous [40, 86, 87], time de-
layed [95] and excitatory synapses with fast synaptic kinetics [96]. However, to date the QIF-FRE
have not been used to explore the dynamics of populations of inhibitory neurons with synaptic
kinetics -but see [83] for a numerical investigation using the low-dimensional Kuramoto order
parameter description. The method for deriving the QIF-FRE corresponding to a population of
QIF neurons Eq. (12) is exact in the thermodynamic limit N → ∞, and, under the assumption
that neurons are all-to-all coupled. Additionally, if the parameters ηi in Eq. (13) (which in the
thermodynamic limit become a continuous variable) are assumed to be distributed according to
the Lorentzian distribution Eq. (14), the resulting QIF-FRE become two dimensional. For instan-
taneous synapses, the macroscopic dynamics of the population of QIF neurons (12) is exactly
described by the system of QIF-FRE [40]
∆
πτm
+ 2RV,
R =
V = V 2 − (πτmR)2 − JτmR + Θ,
τm
τm
(17a)
(17b)
where R is the mean firing rate and V the mean membrane potential in the network. With ex-
ponentially decaying synaptic kinetics the QIF-FRE Eqs. (17) become Eqs.(3). In our study, we
consider Θ > 0, so that the majority of the neurons are oscillatory -see Eq.(14).
18
1. Fixed points
The fixed points of the QIF-FRE (3) are obtained imposing R = V = S = 0. Substituting
this into Eqs. (3), we obtain the fixed point equation V ∗ = −∆/(2πτmR∗), the firing rate given
by Eq. (4) and S∗ = R∗. Note that for homogeneous populations, ∆ = 0, the f-I curve Eq. (5)
reduces to
(cid:112)I+,
1
π
Φ(I) =
which displays a clear threshold at I = 0 (Here, I+ = I if I ≥ 0, and vanishes for I < 0.) This
function coincides with the squashing function found by Ermentrout for homogeneous networks
of Class 1 neurons [60]. As expected, for heterogeneous networks, the well-defined threshold of
Φ(I) for ∆ = 0 is lost and the transfer function becomes increasingly smoother.
2. Nondimensionalized QIF-FRE
The QIF-FRE (3) have five parameters. It is possible to non-dimensionalize the equations so
that the system can be written solely in terms of 3 parameters. Generally, we adopt the following
notation: we use capital letters to refer to the original variables and parameters of the QIF-FRE,
and lower case letters for non-dimensional quantities. A possible non-dimensionalization, valid
for Θ > 0, is
r = δ/π + 2rv,
v = v2 − π2r2 − js + 1,
τ s = −s + r,
where the overdot here means differentiation with respect to the non-dimensional time
√
Θ
τm
t.
t =
The other variables are defined as
r =
τm√
Θ
R,
v =
V√
Θ
,
s =
τm√
Θ
S.
On the other hand, the new coupling parameter is defined as
j =
J√
Θ
.
19
(18a)
(18b)
(18c)
(19)
and the parameter
δ =
∆
Θ
,
(20)
describes the effect of the Lorentzian heterogeneity (14) into the collective dynamics of the
FRE (17). Though the Lorentzian distribution does not have finite moments, for the sake of com-
parison of our results with those of studies investigating the dynamics of heterogeneous networks
of inhibitory neurons, e.g.[30, 32], the quantity δ can be compared to the coefficient of variation,
which measures the ratio of the standard deviation to the mean of a probability density function.
Finally, the non-dimensional time
τ =
τd,
(21)
√
Θ
τm
measures the ratio of the synaptic time constant to the most-likely period of the neurons (times π),
¯T = π
τm√
Θ
.
In numerical simulations we will use the original QIF-FRE (3), with Θ = 4, and τm = 10ms.
Thus ¯T = 10π/3 ≈ 15.71ms, so that the most likely value of the neurons' intrinsic frequency
is ¯f ≈ 63.66 Hz. However, our results are expressed in a more compact form in terms of the
quantities j, δ, τ, and we will use them in some of our calculations and figures.
C. Parametric formula for the Hopf boundaries
To investigate the existence of oscillatory instabilities we use Eq. (6) written in terms of the
non-dimensional variables and parameters defined previously, which is
(cid:34)
(cid:18)
(cid:19)2(cid:35)
− 2jr∗ = (1 + λτ )
(2πr∗)2 +
λ +
δ
πr∗
.
(22)
Imposing the condition of marginal stability λ = iω in Eq. (22) gives the system of equations
0 = 2jr∗ + 4π2r2∗ + 4v2∗ − (1 − 4v∗τ )ω2
0 = ω(4v∗ − 4π2r2∗τ − 4v2∗τ + τ ω2)
where the fixed points are obtained from Eq. (4) solving
0 = v2∗ − π2r2∗ − jr∗ + 1,
(23a)
(23b)
(24)
with
v∗ = − δ
2πr∗
20
Eq. (23b) gives the critical frequency
ω =
2
τ
(cid:112)(πτ r∗)2 + τ v∗(τ v∗ − 1).
The Hopf boundaries can be plotted in parametric form solving Eq. (24) for j, and substituting j
and ω into Eq. (23a). Then solving Eq. (23a) for τ gives the Hopf bifurcation boundaries
τ±(r∗) =
Using the parametric formula
π2r2∗ − 1 + 7v2∗ ±(cid:112)(π2r2∗ − 1)2 − (14 + 50π2r2∗)v2∗ − 15v4∗
(cid:0)j(r∗), τ±(r∗)(cid:1)±
=(cid:0)v2∗/r∗ + 1/r∗ − π2r∗, τ±(r∗)(cid:1) .
16v∗(π2r2∗ + v2∗)
.
(25)
we can be plot the Hopf boundaries for particular values of the parameter δ, as r∗ is changed.
Figure 4 shows these curves in red, for δ = 0.05 and δ = 0.075. They define a closed region in
parameter space (shaded region) where oscillations are observed.
1. Calculation of the critical value δc, Eq (8)
The functions τ± meet at two points, when the argument of the square root in Eq. (25) is zero.
This gives four different roots for δ, and only one of them is positive and real
(cid:113)
8(cid:112)1 + 5π2r2∗ + 10π4r4∗ − 7 − 25π2r2∗.
δ∗(r∗) =
2πr∗√
15
This function has two positive zeros, one at r∗min = 0, and one at r∗max = 1/π, corresponding,
respectively, to the minimal (j → ∞) and maximal (j = 0) values of the firing rate for identical
neurons (δ = 0). Between these two points the function attains a maximum, where r∗min =
r∗max = r∗c, with
1(cid:112)
√
2
5π
r∗c =
= 0.1505 . . .
The function δ∗(r∗) evaluated at its local maximum r∗ = r∗c gives Eq. (8).
D. Populations of Wang-Buzski neurons
We perform numerical simulations using the the Wang-Buzs´aki (WB) neuron [30], and com-
pare them with our results using networks of QIF neurons. The onset of oscillatory behavior in
the WB model is via a saddle node on the invariant circle (SNIC) bifurcation. Therefore, the
21
populations of WB neurons near this bifurcation are expected to be well described by the theta-
neuron/QIF model, the canonical model for Class 1 neural excitability [45, 74].
We numerically simulated a network of N all-to-all coupled WB neurons, where the dynamics
of each neuron is described by the time evolution of its membrane potential [30]
Vi = −INa,i − IK,i − IL,i − Isyn + Iapp,i + I0.
Cm
The cell capacitance is Cm = 1 µF/cm2. The inputs Iapp (in µA/cm2) are distributed accord-
ing to a Lorentzian distribution with half width σ and center ¯I. In numerical simulations these
currents were selected deterministically to represent the Lorentzian distribution as Iapp,i = ¯I +
σ tan(π/2(2i− N − 1)/(N + 1)), for i = 1, . . . , N. The constant input I0 = 0.1601 µA/cm2 sets
the neuron at the SNIC bifurcation when Iapp = 0. The leak current is
IL,i = gL (Vi − EL) ,
with gL = 0.1 mS/cm2, so that the passive time constant τm = Cm/gL = 10 ms. The sodium
current is
INa,i = gNam3∞h (Vi − ENa) ,
where gNa = 35 mS/cm2, ENa = 55 mV, m∞ = αm/ (αm + βm) with αm (Vi) = −0.1 (Vi + 35) / (exp (−0.1 (Vi + 35) − 1)),
βm (Vi) =4 exp (− (Vi+60) /18). The inactivation variable h obeys the differential equation
h = φ (αh (1 − h) − βhh) ,
with φ = 5, αh (Vi) = 0.07 exp (− (Vi + 58) /20) and βh (Vi) = 1/ (exp (−0.1 (Vi + 28)) + 1).
The potassium current follows
IK,i = gKn4 (Vi − EK) ,
with gK = 9 mS/cm2, EK = −90 mV. The activation variable n obeys
n = φ (αn (1 − n) − βnn) ,
where αn (Vi) = −0.01 (Vi + 34) / (exp (−0.1 (Vi + 34)) − 1) and βn (Vi) = 0.125 exp (− (Vi + 44) /80).
The synaptic current is Isyn = kCmS, where the synaptic activation variable S obeys the first
order kinetics Eq. (16) and k is the coupling strength (expressed in mV). The factor Cm ensures
that the effect of an incoming spike to the neuron is independent from its passive time constant.
The neuron is defined to emit a spike when its membrane potential crosses 0 mV. The population
22
firing rate is then computed according to Eq. (15), with τs = 10−2 ms. In numerical simulations
we considered N = 1000 all-to-all coupled WB neurons, using the Euler method with time step
dt = 0.001 ms. In Fig. 1, the membrane potentials were initially randomly distributed according
to a Lorentzian function with half width 5 mV and center −62 mV. Close to the bifurcation
point, this is equivalent to uniformly distribute the phases of the corresponding Theta-Neurons in
[−π, π][2, 7, 61, 74]. The parameters were chosen as ¯I = 0.5 µA/cm2, σ = 0.01 µA/cm2 and
k = 6 mV. The population firing rate was smoothed setting τs = 2 ms in Eq.(15).
In Fig. 5, we systematically varied the coupling strength and the synaptic time decay constant
to determine the range of parameters displaying oscillatory behavior. For each fixed value of τd
we varied the coupling strength k; we performed two series of simulations, for increasing and
decreasing coupling strength. In Fig. 5 we only show results for increasing k.
All quantities were measured after a transient of 1000 ms. To obtain the amplitude of the
oscillations of the mean membrane potential, we computed the maximal amplitude ¯Vmax − ¯Vmin
over time windows of 200 ms for 1000 ms, and then averaged over the five windows.
23
[1] Wilson HR, Cowan JD. Excitatory and inhibitory interactions in localized populations of model neu-
rons. Biophys J. 1972;12(1):1–24.
[2] Ermentrout GB, Terman DH. Mathematical foundations of neuroscience. vol. 64. Springer; 2010.
[3] Gerstner W, Kistler WM, Naud R, Paninski L. Neuronal dynamics: From single neurons to networks
and models of cognition. Cambridge University Press; 2014.
[4] Dayan P, Abbott LF. Theoretical neuroscience. Cambridge, MA: MIT Press; 2001.
[5] Cowan J. A personal account of the development of the field theory of large-scale brain activity from
1945 onward. In: Neural fields. Springer; 2014. p. 47–96.
[6] Coombes S, beim Graben P, Potthast R. Tutorial on neural field theory. In: Neural fields. Springer;
2014. p. 1–43.
[7] Latham P, Richmond B, Nelson P, Nirenberg S. Intrinsic dynamics in neuronal networks. I. Theory.
Journal of Neurophysiology. 2000;83(2):808–827.
[8] Shriki O, Hansel D, Sompolinsky H. Rate models for conductance-based cortical neuronal networks.
Neural Comput. 2003;15(8):1809–1841.
[9] Roxin A, Brunel N, Hansel D. Role of delays in shaping spatiotemporal dynamics of neuronal activity
in large networks. Phys Rev Lett. 2005;94(23):238103.
[10] Roxin A, Montbri´o E. How effective delays shape oscillatory dynamics in neuronal networks. Physica
D. 2011;240(3):323–345.
[11] Wilson HR, Cowan JD. A mathematical theory of the functional dynamics of cortical and thalamic
nervous tissue. Kybernetik. 1973;13(2):55–80. doi:10.1007/BF00288786.
[12] Amari Si.
A method of
statistical neurodynamics.
Kybernetik. 1974;14(4):201–215.
doi:10.1007/BF00274806.
[13] Nunez PL. The brain wave equation: a model for the EEG. Mathematical Biosciences. 1974;21(3):279
– 297. doi:http://dx.doi.org/10.1016/0025-5564(74)90020-0.
[14] Ermentrout GB, Cowan JD. A mathematical theory of visual hallucination patterns. Biological Cy-
bernetics. 1979;34(3):137–150. doi:10.1007/BF00336965.
[15] Ben-Yishai R, Bar-Or RL, Sompolinsky H. Theory of orientation tuning in visual cortex. Proc Nat
Acad Sci. 1995;92(9):3844–3848.
[16] Pinto DJ, Brumberg JC, Simons DJ, Ermentrout GB, Traub R. A quantitative population model of
24
whisker barrels: Re-examining the Wilson-Cowan equations. Journal of Computational Neuroscience.
1996;3(3):247–264. doi:10.1007/BF00161134.
[17] Hansel D, Sompolinsky H. Modeling Feature Selectivity in Local Cortical Circuits. In: Koch C, Segev
I, editors. Methods in Neuronal Modelling: From Ions to Networks. Cambridge: MIT Press; 1998. p.
499–567.
[18] Tsodyks M MH Pawelzik K. Neural networks with dynamic synapses. Neural Comput. 1998;10:821.
[19] Wilson HR. Spikes, decisions, and actions: the dynamical foundations of neurosciences. 1999;.
[20] Tabak J, Senn W, ODonovan MJ, Rinzel J. Modeling of spontaneous activity in developing spinal
cord using activity-dependent depression in an excitatory network. J Neurosci. 2000;20:3041–3056.
[21] Bressloff PC, Cowan JD, Golubitsky M, Thomas PJ, Wiener MC. Geometric visual halluci-
nations, Euclidean symmetry and the functional architecture of striate cortex.
Philosophical
Transactions of the Royal Society of London B: Biological Sciences. 2001;356(1407):299–330.
doi:10.1098/rstb.2000.0769.
[22] Laing CR, Troy WC, Gutkin B, Ermentrout GB. Multiple bumps in a neuronal model of working
memory. SIAM Journal on Applied Mathematics. 2002;63(1):62–97.
[23] Holcman D, Tsodyks M. The emergence of up and down states in cortical networks. PLoS Comput
Biol. 2006;2(3):e23.
[24] Moreno-Bote R, Rinzel J, Rubin N. Noise-induced alternations in an attractor network model of
perceptual bistability. J Neurophysiol. 2007;98(3):1125–1139.
[25] Mongillo G, Barak O, Tsodyks M.
Synaptic theory of working memory.
Science.
2008;319(5869):1543–1546.
[26] Touboul J, Wendling F, Chauvel P, Faugeras O. Neural mass activity, bifurcations, and epilepsy.
Neural computation. 2011;23(12):3232–3286.
[27] Mart´ı D, Rinzel J. Dynamics of feature categorization. Neural computation. 2013;25(1):1–45.
[28] Ton R, Deco G, Daffertshofer A. Structure-function discrepancy: inhomogeneity and delays in syn-
chronized neural networks. PLOS Comput Biol. 2014;10(7):e1003736.
[29] Schaffer ES, Ostojic S, Abbott L. A Complex-Valued Firing-Rate Model That Approximates the
Dynamics of Spiking Networks. PLoS Comput Biol. 2013;9(10):e1003301.
[30] Wang XJ, Buzs´aki G. Gamma oscillation by synaptic inhibition in a hippocampal interneuronal net-
work model. The journal of Neuroscience. 1996;16(20):6402–6413.
[31] Whittington MA, Traub RD, Jefferys JG. Synchronized oscillations in interneuron networks driven
25
by metabotropic glutamate receptor activation. Nature. 1995;373:612–615.
[32] White JA, Chow CC, Rit J, Soto-Trevino C, Kopell N. Synchronization and oscillatory dynamics in
heterogeneous, mutually inhibited neurons. Journal of computational neuroscience. 1998;5(1):5–16.
[33] Whittington MA, Traub RD, Kopell N, Ermentrout B, Buhl EH.
Inhibition-based rhythms: ex-
perimental and mathematical observations on network dynamics.
Int Journal of Psychophysiol.
2000;38(3):315 – 336. doi:http://dx.doi.org/10.1016/S0167-8760(00)00173-2.
[34] Tiesinga P, Jos´e JV. Robust gamma oscillations in networks of inhibitory hippocampal interneurons.
Network: Computation in Neural Systems. 2000;11(1):1–23.
[35] Brunel N, Hansel D. How noise affects the synchronization properties of recurrent networks of in-
hibitory neurons. Neural Comput. 2006;18(5):1066–1110.
[36] Brunel N, Hakim V. Sparsely synchronized neuronal oscillations. Chaos: An Interdisciplinary Journal
of Nonlinear Science. 2008;18(1):015113.
[37] Bartos M, Vida I, Jonas P. Synaptic mechanisms of synchronized gamma oscillations in inhibitory
interneuron networks. Nature reviews neuroscience. 2007;8(1):45–56.
[38] Wang XJ. Neurophysiological and computational principles of cortical rhythms in cognition. Physio-
logical reviews. 2010;90(3):1195–1268.
[39] Keeley S, Fenton AA, Rinzel J. Modeling fast and slow gamma oscillations with interneurons of
different subtype. Journal of Neurophysiology. 2017;117(3):950–965. doi:10.1152/jn.00490.2016.
[40] Montbri´o E, Paz´o D, Roxin A. Macroscopic Description for Networks of Spiking Neurons. Phys Rev
X. 2015;5:021028. doi:10.1103/PhysRevX.5.021028.
[41] Winfree AT. Biological rhythms and the behavior of populations of coupled oscillators. J Theor Biol.
1967;16:15–42.
[42] Kuramoto Y. Chemical Oscillations, Waves, and Turbulence. Berlin: Springer-Verlag; 1984.
[43] Ledoux E, Brunel N. Dynamics of networks of excitatory and inhibitory neurons in response to time-
dependent inputs. Frontiers Comp Neurosci. 2011;5:25.
[44] Van Vreeswijk C, Abbott LF, Bard Ermentrout G. When inhibition not excitation synchronizes neural
firing. Journal of Computational Neuroscience. 1994;1(4):313–321. doi:10.1007/BF00961879.
[45] Ermentrout B. Type I membranes, phase resetting curves, and synchrony. Neural Comp. 1996;8:979–
1001.
[46] Hansel D, Mato G, Meunier C. Synchrony in excitatory neural networks. Neural Comput. 1995;7:307–
337.
26
[47] Kilpatrick ZP, Ermentrout B. Sparse Gamma Rhythms Arising through Clustering in Adapting Neu-
ronal Networks. PLoS Comput Biol. 2011;7(11):e1002281. doi:10.1371/journal.pcbi.1002281.
[48] Ernst U, Pawelzik K, Geisel T. Delay-induced multistable synchronization of biological oscillators.
Physical review E. 1998;57(2):2150.
[49] Okuda K. Variety and generality of clustering in globally coupled oscillators. Physica D: Nonlinear
Phenomena. 1993;63(3-4):424–436.
[50] Hansel D, Mato G, Meunier C. Clustering and slow switching in globally coupled phase oscillators.
Phys Rev E. 1993;48:3470–3477. doi:10.1103/PhysRevE.48.3470.
[51] Kori H, Kuramoto Y. Slow switching in globally coupled oscillators: robustness and occurrence
through delayed coupling. Phys Rev E. 2001;63:046214. doi:10.1103/PhysRevE.63.046214.
[52] Kori H. Slow switching and broken cluster state in a population of neuronal oscillators. Int J Mod
Phys B. 2003;17:4238–4241. doi:10.1142/S0217979203022246.
[53] Politi A, Rosenblum M. Equivalence of phase-oscillator and integrate-and-fire models. Phys Rev E.
2015;91:042916. doi:10.1103/PhysRevE.91.042916.
[54] Clusella P, Politi A, Rosenblum M. A minimal model of self-consistent partial synchrony. New J
Phys. 2016;18(9):093037.
[55] Freeman WJ. Mass action in the nervous system. Academic Press, New York; 1975.
[56] Jansen BH, Rit VG. Electroencephalogram and visual evoked potential generation in a math-
ematical model of coupled cortical columns.
Biological Cybernetics. 1995;73(4):357–366.
doi:10.1007/BF00199471.
[57] Robinson PA, Rennie CJ, Wright JJ. Propagation and stability of waves of electrical activity in the
cerebral cortex. Phys Rev E. 1997;56:826–840. doi:10.1103/PhysRevE.56.826.
[58] Ashwin P, Coombes S, Nicks R. Mathematical Frameworks for Oscillatory Network Dynamics in
Neuroscience. The Journal of Mathematical Neuroscience. 2016;6(1):1–92. doi:10.1186/s13408-015-
0033-6.
[59] Tikidji-Hamburyan RA, Mart´ınez JJ, White JA, Canavier CC. Resonant Interneurons Can In-
crease Robustness of Gamma Oscillations.
Journal of Neuroscience. 2015;35(47):15682–15695.
doi:10.1523/JNEUROSCI.2601-15.2015.
[60] Ermentrout B. Reduction of conductance-based models with slow synapses to neural nets. Neural
Comput. 1994;6(4):679–695.
[61] Izhikevich EM. Dynamical Systems in Neuroscience. Cambridge, Massachusetts: The MIT Press;
27
2007.
[62] Brunel N, Hakim V. Fast global oscillations in networks of integrate-and-fire neurons with low firing
rates. Neural Comput. 1999;11(7):1621–1671.
[63] Brunel N, Wang XJ. What determines the frequency of fast network oscillations with irregular neural
discharges? I. Synaptic dynamics and excitation-inhibition balance.
Journal of neurophysiology.
2003;90(1):415–430.
[64] Hansel D, Mato G. Asynchronous states and the emergence of synchrony in large networks of inter-
acting excitatory and inhibitory neurons. Neural Computation. 2003;15(1):1–56.
[65] Golomb D, Donner K, Shacham L, Shlosberg D, Amitai Y, Hansel D. Mechanisms of firing patterns
in fast-spiking cortical interneurons. PLoS Computational Biology. 2007;3(8):e156.
[66] Tateno T, Harsch A, Robinson HPC. Threshold Firing Frequency–Current Relationships of Neu-
rons in Rat Somatosensory Cortex: Type 1 and Type 2 Dynamics.
Journal of Neurophysiology.
2004;92(4):2283–2294. doi:10.1152/jn.00109.2004.
[67] Tateno T, Robinson HPC. Phase Resetting Curves and Oscillatory Stability in Interneurons of Rat
Somatosensory Cortex. Biophys J. 2007;92(2):683–695. doi:10.1529/biophysj.106.088021.
[68] Mancilla JG, Lewis TJ, Pinto DJ, Rinzel J, Connors BW. Synchronization of Electrically Cou-
pled Pairs of Inhibitory Interneurons in Neocortex. Journal of Neuroscience. 2007;27(8):2058–2073.
doi:10.1523/JNEUROSCI.2715-06.2007.
[69] La Camera G, Rauch A, Thurbon D, Luscher HR, Senn W, Fusi S. Multiple Time Scales of
Temporal Response in Pyramidal and Fast Spiking Cortical Neurons. Journal of Neurophysiology.
2006;96(6):3448–3464. doi:10.1152/jn.00453.2006.
[70] Ostojic S, Brunel N. From spiking neuron models to linear-nonlinear models. PLoS Comput Biol.
2011;7(1):e1001056.
[71] Mattia M, Del Giudice P. Population dynamics of interacting spiking neurons. Phys Rev E.
2002;66:051917. doi:10.1103/PhysRevE.66.051917.
[72] Rinzel J, Ermentrout B. Analysis of neural excitability and oscillations. In: Koch C, Segev I, editors.
Methods in Neuronal Modelling: From Ions to Networks. Cambridge: MIT Press; 1989. p. 135–171.
[73] Morris C, Lecar H. Voltage oscillations in the barnacle giant muscle fiber. Biophysical journal.
1981;35(1):193–213.
[74] Ermentrout B, Kopell N. Parabolic bursting in an excitable system coupled with a slow oscillation.
SIAM J Appl Math. 1986;46:233–253.
28
[75] Achuthan S, Butera RJ, Canavier CC.
Synaptic and intrinsic determinants of the phase re-
setting curve for weak coupling.
Journal of Computational Neuroscience. 2011;30(2):373–390.
doi:10.1007/s10827-010-0264-1.
[76] Ermentrout GB, Glass L, Oldeman BE. The Shape of Phase-Resetting Curves in Oscillators with
a Saddle Node on an Invariant Circle Bifurcation. Neural Computation. 2012;24(12):3111–3125.
doi:10.1162/NECO a 00370.
[77] Luke TB, Barreto E, So P. Complete classification of the macroscopic behavior of a heterogeneous
network of theta neurons. Neural Comput. 2013;25(12):3207–3234.
[78] So P, Luke TB, Barreto E.
Networks of
theta neurons with time-varying excitability:
Macroscopic chaos, multistability, and final-state uncertainty.
Physica D. 2014;267(0):16–26.
doi:http://dx.doi.org/10.1016/j.physd.2013.04.009.
[79] Laing CR. Derivation of a neural field model from a network of theta neurons. Phys Rev E.
2014;90:010901. doi:10.1103/PhysRevE.90.010901.
[80] Laing CR. Exact Neural Fields Incorporating Gap Junctions. SIAM Journal on Applied Dynamical
Systems. 2015;14(4):1899–1929.
[81] Laing CR. Travelling waves in arrays of delay-coupled phase oscillators. Chaos. 2016;26(9).
doi:http://dx.doi.org/10.1063/1.4953663.
[82] Laing CR. Bumps in Small-World Networks. Frontiers in Computational Neuroscience. 2016;10:53.
doi:10.3389/fncom.2016.00053.
[83] Coombes S, Byrne ´A. Next generation neural mass models. in Lecture Notes in Nonlinear Dynamics
in Computational Neuroscience: from Physics and Biology to ICT Springer (In Press).
[84] Roulet J, Mindlin GB. Average activity of excitatory and inhibitory neural populations. Chaos: An
Interdisciplinary Journal of Nonlinear Science. 2016;26(9):093104. doi:10.1063/1.4962326.
[85] O'Keeffe KP, Strogatz SH. Dynamics of a population of oscillatory and excitable elements. Phys Rev
E. 2016;93:062203. doi:10.1103/PhysRevE.93.062203.
[86] Pietras B, Daffertshofer A.
Ott-Antonsen attractiveness for parameter-dependent oscillatory
systems.
Chaos: An Interdisciplinary Journal of Nonlinear Science. 2016;26(10):103101.
doi:10.1063/1.4963371.
[87] Esnaola-Acebes JM, Roxin A, Avitabile D, Montbri´o E. Synchrony-induced modes of oscillation of a
neural field model. Phys Rev E. 2017;96:052407. doi:10.1103/PhysRevE.96.052407.
[88] Chandra S, Hathcock D, Crain K, Antonsen TM, Girvan M, Ott E. Modeling the network dy-
29
namics of pulse-coupled neurons. Chaos: An Interdisciplinary Journal of Nonlinear Science.
2017;27(3):033102. doi:10.1063/1.4977514.
[89] Ott E, Antonsen TM. Low dimensional behavior of large systems of globally coupled oscillators.
Chaos. 2008;18(3):037113. doi:10.1063/1.2930766.
[90] Ott E, Antonsen TM. Long time evolution of phase oscillator systems. Chaos. 2009;19(2):023117.
doi:10.1063/1.3136851.
[91] Ott E, Hunt BR, Antonsen TM. Comment on "Long time evolution of phase oscillators systems".
Chaos. 2011;21:025112.
[92] Mattia M. Low-dimensional firing rate dynamics of spiking neuron networks.
arXiv preprint
arXiv:160908855. 2016;.
[93] Augustin M, Ladenbauer J, Baumann F, Obermayer K. Low-dimensional spike rate models derived
from networks of adaptive integrate-and-fire neurons: comparison and implementation. PLOS Com-
putational Biology. 2017;13(6). doi:10.1371/journal.pcbi.1005545.
[94] Schwalger T, Deger M, Gerstner W. Towards a theory of cortical columns: From spiking neurons
to interacting neural populations of finite size. PLOS Computational Biology. 2017;13(4):1–63.
doi:10.1371/journal.pcbi.1005507.
[95] Paz´o D, Montbri´o E.
From Quasiperiodic Partial Synchronization to Collective Chaos
in Populations of
Inhibitory Neurons with Delay.
Phys Rev Lett. 2016;116:238101.
doi:10.1103/PhysRevLett.116.238101.
[96] Ratas I, Pyragas K. Macroscopic self-oscillations and aging transition in a network of
synaptically coupled quadratic integrate-and-fire neurons.
Phys Rev E. 2016;94:032215.
doi:10.1103/PhysRevE.94.032215.
30
|
1907.13046 | 1 | 1907 | 2019-07-30T16:08:29 | Visual Information flow in Wilson-Cowan networks | [
"q-bio.NC"
] | In this work we study the communication efficiency of a psychophysically-tuned cascade of Wilson-Cowan and Divisive Normalization layers that simulate the retina-V1 pathway. This is the first analysis of Wilson-Cowan networks in terms of multivariate total correlation. The parameters of the cortical model have been derived through the relation between the steady state of the Wilson-Cowan model and the Divisive Normalization model.
The communication efficiency has been analyzed in two ways: First, we provide an analytical expression for the reduction of the total correlation among the responses of a V1-like population after the application of the Wilson-Cowan interaction. Second, we empirically study the efficiency with visual stimuli and statistical tools that were not available before: (1) we use a recent, radiometrically calibrated, set of natural scenes, and (2) we use a recent technique to estimate the multivariate total correlation in bits from sets of visual responses which only involves univariate operations, thus giving better estimates of the redundancy.
The theoretical and the empirical results show that although this cascade of layers was not optimized for statistical independence in any way, the redundancy between the responses gets substantially reduced along the neural pathway. Specifically, we show that (1)~the efficiency of a Wilson-Cowan network is similar to its equivalent Divisive Normalization model, (2) while initial layers (Von-Kries adaptation and Weber-like brightness) contribute to univariate equalization, the bigger contributions to the reduction in total correlation come from the computation of nonlinear local contrast and the application of local oriented filters, and (3)~psychophysically-tuned models are more efficient (reduce more total correlation) in the more populated regions of the luminance-contrast plane. | q-bio.NC | q-bio | Visual Information flow in Wilson-Cowan networks
A. Gomez-Villa,a M. Bertalmío,a J. Malob,1
aDept. Inf. Comm. Tech. Universitat Pompeu Fabra, Barcelona, Spain
bImage Processing Lab, Universitat de València, Valencia, Spain
E-mail: [email protected], [email protected],
[email protected]
Abstract:
In this work we study the communication efficiency of a psychophysically-tuned cascade of
Wilson-Cowan and Divisive Normalization layers that simulate the retina-V1 pathway. This
is the first analysis of Wilson-Cowan networks in terms of multivariate total correlation.
The parameters of the cortical model have been derived through the relation between the
steady state of the Wilson-Cowan model and the Divisive Normalization model.
The communication efficiency has been analyzed in two ways: First, we provide an ana-
lytical expression for the reduction of the total correlation among the responses of a V1-like
population after the application of the Wilson-Cowan interaction. Second, we empirically
study the efficiency with visual stimuli and statistical tools that were not available before:
(1) we use a recent, radiometrically calibrated, set of natural scenes, and (2) we use a recent
technique to estimate the multivariate total correlation in bits from sets of visual responses
which only involves univariate operations, thus giving better estimates of the redundancy.
The theoretical and the empirical results show that although this cascade of layers was
not optimized for statistical independence in any way, the redundancy between the responses
gets substantially reduced along the neural pathway. Specifically, we show that (1) the
efficiency of a Wilson-Cowan network is similar to its equivalent Divisive Normalization
model, (2) while initial layers (Von-Kries adaptation and Weber-like brightness) contribute
to univariate equalization, the bigger contributions to the reduction in total correlation come
from the computation of nonlinear local contrast and the application of local oriented filters,
and (3) psychophysically-tuned models are more efficient (reduce more total correlation) in
the more populated regions of the luminance-contrast plane. These results are an alternative
confirmation of the Efficient Coding Hypothesis for the Wilson-Cowan systems. And from
an applied perspective, they suggest that neural field models could be an option in image
coding to perform image compression.
9
1
0
2
l
u
J
0
3
]
.
C
N
o
i
b
-
q
[
1
v
6
4
0
3
1
.
7
0
9
1
:
v
i
X
r
a
1Corresponding author
Contents
1 Introduction
2 Models, materials and methods
2.1 Model: A psychophysically-tuned Wilson-Cowan network
2.2 Material: radiometrically calibrated stimuli and color adaptation
2.3 Method: measuring Total Correlation with Gaussianization transforms
3 Results: Redundancy reduction via the Wilson-Cowan interaction
3.1 Theoretical analysis
3.1.1 Expression for Total Correlation in Wilson-Cowan systems.
3.1.2 Experiment in a reduced-scale system.
3.2 Empirical analysis of the full-scale model
3.2.1 Marginal equalization
3.2.2 Mutual Information along the network
3.2.3 Total Correlation along the network
4 Discussion
A Appendix: Psychophysically inspired reduced-scale model
1
2
2
8
10
11
11
11
12
16
16
18
21
24
26
1
Introduction
The Wilson-Cowan equations [1] and Divisive Normalization [2] are alternative influential
models of interaction between cortical neurons. While the Divisive Normalization compu-
tation has been extensively studied from an information theoretic perspective [3 -- 7], the
efficiency of Wilson-Cowan networks has not been analyzed in such detail through accurate
redundancy measures.
Such analysis is interesting not only because of the classical Efficient Coding Hypothe-
sis [8 -- 10], which is the information-theoretic version of the free-energy principle [11], but
also because of practical applications. Note that equivalent analysis in the Divisive Nor-
malization case led to substantial improvements in image compression using brain inspired
architectures [12, 13]. In a low noise context [14 -- 16] optimal systems are those that mini-
mize the redundancy among the components of the signal representation [5, 17, 18].
In this paper we quantify how effective is each layer of the considered network in
achieving the density factorization goal. This information theoretic analysis is applied to a
recent psychophysically-tuned Wilson-Cowan model [19, 20], using a recent radiometrically
calibrated database of visual scenes [21, 22], and using a recent accurate statistical tool to
measure redundancy [23, 24].
-- 1 --
The appropriate (multivariate) concept to describe the redundancy in vectors (or neu-
ral populations) is the total correlation [25, 26]. Direct computation of total correlation
from its definition is not straightforward because it involves multivariate probability den-
sity estimation. That is why, in the past, different computationally convenient (bivariate)
surrogates of the total correlation have been used. For instance, the conditional proba-
bility between pairs of responses [3, 4, 27 -- 29], the correlation between the energies of the
responses [30 -- 34], or the mutual information between pairs of responses [5, 12, 35].
Now, by using a recent multivariate Gaussianization technique [23, 24], total correlation
can be estimated from (easy to compute) marginal equalizations, so we can use the proper
measure of communication efficiency in psychophysically-tuned networks. This study, which
measures total correlation on Wilson-Cowan responses for the first time, generalizes previous
analysis that used total correlation but were restricted to linear models to avoid estimation
problems [17], or addressed simpler (just-one-layer) linear+nonlinear models with bivariate
mutual information measures [5].
2 Models, materials and methods
In this section we first describe the considered model for the retina-V1 pathway that consists
of a cascade of equivalent Divisive Normalization and Wilson-Cowan modules. Then, we
present the visual stimuli over which the considered model will be applied. And finally, we
will review the statistical methods to assess the communication efficiency of the model.
2.1 Model: A psychophysically-tuned Wilson-Cowan network
In this work the theory is illustrated in the context of models of the retina-cortex pathway.
The considered framework follows the program suggested in [36] and implemented in [7]: a
cascade of four isomorphic linear+nonlinear modules. These modules address brightness,
contrast, frequency filtered contrast masked in the spatial domain, and orientation/scale
masking. An example of the transforms of the input in such models is shown in Fig. 1.
In this illustration the input is the spatial distribution of the spectral irradiance at the
retina. This input undergoes the following transforms: (1) The linear part of the first layer
consist of three positive LMS spectral sensitivities and a linear recombination of the LMS
values with positive/negative weights. This leads to three tristimulus values in each spatial
location: one of them is proportional to the luminance, and the other two have opponent
chromatic meaning (red-green and yellow-blue). The linear tristimulus values are normal-
ized by the corresponding values of the white in the scene (Von-Kries adaptation), and then,
the normalized opponent responses undergo parallel saturation transforms. Perception of
brightness is mediated by an adaptive Weber-like nonlinearity applied to the luminance at
each location. This nonlinearity enhances the response in the regions with small linear in-
put (low luminance). (2) The linear part of the second layer computes the deviation of the
brightness at each location from the local brightness. Then, this deviation is nonlinearly
normalized by the local brightness to give the local nonlinear contrast. (3) The responses to
local contrast are convolved by center surround receptive fields (or filtered by the Contrast
Sensitivity Function). Then the linearly filtered contrast is nonlinearly normalized by the
-- 2 --
Figure 1: Cascade of Linear+Nonlinear layers.
The network addresses in turn
(1) tristimulus-from-irradiance integrals and color opponency + Von-Kries adaptation together with
Weber-like brightness and nonlinear opponent channels, (2) local contrast (subtraction of local mean
+ division by local mean), (3) CSF filter + masking in the spatial domain, and (4) Wavelet filters
+ masking in the wavelet domain. See details on the formulation of each Divisive Normalization
layer in [7]. In this work we substitute the last nonlinearity by the equivalent Wilson-Cowan model.
-- 3 --
local contrast. Again normalization increases the response in the regions with small input
(low contrast). (4) After a linear wavelet transform modelling the response of simple cells
in V1, each response is normalized by the activity of the neurons in the surround. Again,
the activity relatively increases in the regions with low input. As shown in the marginal
and joint PDFs below, the common effect of the nonlinear modules throughout the network
is response equalization.
Divisive Normalization is the conventional model used to describe the nonlinearities
in contrast perception psychophysics [37, 38], but here we will also explore the equivalent
Wilson-Cowan model in the last layer.
Below we introduce the notation of both interaction models (the Divisive Normaliza-
tion and the Wilson-Cowan models), and the relation between them so that we can infer
psychophysically plausible parameters for the Wilson-Cowan model from the parameters
already tuned for Divisive Normalization.
In the case of the V1 cortex, we refer to the set of
Modelling cortical interactions.
responses of a population of simple cells as the vector r. The considered models (Divisive
Normalization and Wilson-Cowan) define a nonlinear mapping, N , that transforms the
input vector r (before the interaction among neurons) into the output vector x (after the
interaction),
N '
r
x
(2.1)
In this setting, responses are called excitatory or inhibitory, depending on the corresponding
sign of the signal: r = sign(r)r, and x = sign(x)x. The map N is an adaptive saturating
transform, but it preserves the sign of the responses (i.e. sign(x) = sign(r)). Therefore,
the models care about cell activation (the modulus · ) but not about the excitatory or
inhibitory nature of the sensors (the sign(·) = ±).
We will refer to as the energy of the input responses to the vector e = rγ, where this
is an element-wise exponentiation of the amplitudes ri. Given the sign-preserving nature
of the nonlinear mapping, for the sake of simplicity in notation, in the rest of the paper the
variables r and x refer to the activations r and x.
The Divisive Normalization model. Forward transform: The input-output transform
in the Divisive Normalization is (in matrix notation [7]),
x = Dk · D−1
(b+H·e) · e
(2.2)
where the output vector of nonlinear activations in V1, x, depends on the energy of the
input linear wavelet responses, e, which are dimension-wise normalized by a sum of neighbor
energies. Note that in this matrix notation, Dv, stands for a diagonal matrix with the
vector, v, in the diagonal. The non-diagonal nature of the interaction kernel H in the
denominator, b + H · e, implies that the i-th element of the response may be attenuated
if the activity of the neighbor sensors, ej with j (cid:54)= i, is high. Each row of the kernel H
describes how the energies of the neighbor simple cells attenuate the activity of each simple
-- 4 --
'
cell after the interaction. The each element of the vectors b and k respectively determine
the semisaturation and the dynamic range of the nonlinear response of each sensor.
Inverse transform: The relation between the two models is easier to obtain by iden-
tifying the corresponding decoding transforms in both models. In the case of the Divisive
Normalization, the analytical inverse is [7, 12],
(2.3)
e =(cid:0)I − D−1
k · Dx · H(cid:1)−1 · Db · D−1
k · x
The Wilson-Cowan model. Dynamical system: In the Wilson-Cowan model the vari-
ation of the activation vector, x, increases with the energy of the input, e, but, for each
sensor, this variation is also moderated by its own activity and by a linear combination of
the activities of the neighbor sensors,
x = e − Dα · x − W · f (x)
(2.4)
where W is the matrix that describes the damping factor between sensors, and f (x) is a
dimension-wise saturating nonlinearity (see Fig. 2). Note that in Eq. 2.4 both the inhibitory
and the excitatory responses are considered just as negative and positive components of the
same vector. Therefore, following [39], the two equations in the traditional Wilson-Cowan
formulation are represented here by a single expression.
Steady state and inverse. The stationary solution of the above differential equation,
x = 0 in Eq. 2.4, leads to the following decoding (input-from-output) relation:
e = Dα · x + W · f (x)
(2.5)
The identification of the decoding equations in both models, Eq. 2.3 and Eq. 2.5, is the
key to obtain simple analytical relations between their parameters.
Equivalence of models. The analytical relation between the steady state of the Wilson-
Cowan model and the Divisive Normalization was originally proposed at the Conference
Figure 2: Saturation in the Wilson-Cowan model. Left: Illustrative saturating function
in blue and linear approximation around the origin in green. Right: Derivative of the saturating
function decreases with amplitude.
-- 5 --
celebrating the 50th anniversary of Prof. Cowan at the University of Chicago [19], but
detailed demonstration and discussion of the properties are given in [20].
In summary, just to get a simpler analytical relation between the parameters, in [20],
an assumption was done in each model: (1) a first order approximation of the nonlinear
saturation of the Wilson-Cowan system (green line in Fig. 2), and (2) a first order expansion
of the inverse in decoding the Divisive Normalization (in Eq. 2.3). In this way, it is easy to
see that the parameters of both models introduced above are related as:
b
α =
k
W = D
k ) · H · D−1
( x
b (cid:12) df
( k
dx )
(2.6)
where the (cid:12) stands for the dimension-wise Hadamard product, and the divisions are also
Hadamard quotients. This expression allows us to obtain the interaction kernel and the
attenuation of a Wilson-Cowan model which leads to a steady state compatible with the
Divisive Normalization response.
In this
The considered Wilson-Cowan model: parameters and performance.
work we take an architecture as the one considered in Fig. 1, in which different Divisive
Normalization layers were obtained through different experimental methods. For instance,
Maximum Differentiation psychophysics was used to get the 2nd and 3rd layers [40], the
1st layer was obtained by fitting human opinion in subjective image distortion [7], and the
last layer was tuned to reproduce contrast response curves [41].
In this psychophysically-tuned network, the nonlinearity in the cortical layer (the 4th
layer consisting of a linear wavelet transform followed by Divisive Normalization) was substi-
tuted by the equivalent Wilson-Cowan interaction. Following [1, 42] we assumed a Gaussian
interaction between the sensors tuned to different locations, scales and orientations, and
it makes sense to have different attenuation coefficients per subband. However, instead
of performing additional psychophysics to determine these parameters, here we took the
Divisive Normalization layer optimized in [7, 41], and we applied the relation proposed in
[19, 20], i.e. Eq. 2.6. The resulting kernel and attenuation for the Wilson-Cowan interaction
are shown in Fig. 3.
Using these parameters, simple Euler integration from an initial output given by the
input energy converges to the Divisive Normalization solution, see Fig. 4. A more detailed
discussion on the Divisive Normalization as a stable node of this Wilson-Cowan system
(theoretical stability, phase diagrams) is given in [20], together with evidences of their
perceptual equivalence beyond the mathematical equivalence.
Perceptual evidences in [20] were only focused on the visual consistence between the
original psychophysically-tuned kernel, H, and the signal-dependent kernel obtained from
Eq. 2.6, but always within the Divisive Normalization context. Specifically, it was shown
that Divisive Normalization with these two different kernels has similar contrast response
curves, and achieves similar correlation with human opinion in subjective image quality.
In this introductory section we present a new (more direct) evidence of the perceptual
plausibility of the Wilson-Cowan model derived from the psychophysically-tuned Divisive
-- 6 --
Figure 3: Parameters in the Wilson-Cowan cortical layer derived from the Divisive
Normalization cortical layer. Left: The wavelet diagram represents the auto-attenuation val-
ues, αi, for each sensor of the V1-like population. Gray values are linearly scaled to represent
attenuation values from the minimum (black, for low frequencies) to the maximum (white, for high
frequencies). Right: Illustrative interaction kernel for a specific coefficient (the one highlighted in
red). Here lighter gray represents stronger interaction between the considered sensor and the rest
of the sensors in the wavelet-like structure. Darker gray represents zero interaction. This diagram
represents the corresponding row of W arranged as a wavelet vector. In both cases, α and W , were
computed from the average response, x, in a large image database using the equivalence relation
in Eq. 2.6. The width of the Gaussian kernel in space is 0.08 deg, in scale is 1.1 octave, and in
orientation is π/6 rad, and the values of the attenuation vector are in the range [3 × 103, 1 × 105].
Figure 4: Convergence of the Wilson-Cowan model to the Divisive Normalization
solution. Left: evolution of the relative energy of the update of the solution along the integration.
Right: evolution of the relative energy of the difference between the Wilson-Cowan solution and the
Divisive Normalization response along the integration. The curves in blue are the average of the
update and difference over 35 natural images of the Van Hateren database [43], and the intervals
in red represent 3 standard deviations below and above the mean.
-- 7 --
Figure 5: Wilson-Cowan improves the description of image distortion. Left: Alignment
between subjective opinion and distance in the input representation. Right: Alignment between
subjective opinion and distance in after the proposed Wilson-Cowan interaction. Stimuli and ground
truth were taken from the subjectively rated image quality database TID [44].
Normalization. In the image quality context, here we explicitly compute the response of the
dynamic Wilson-Cowan model (integrating the equation until the steady state is achieved)
for the original and the distorted images. And then we check if the proposed Wilson-Cowan
representation is more perceptually Euclidean than the input representation (the response
after the three initial layers plus the linear wavelet transform).
In Fig. 5 we compare the correlation between the experimental subjective visibility
of distortions and the Euclidean distance between responses computed in the wavelet do-
main, r, and after the convergence of the Wilson-Cowan network, i.e. in the representation
x. In our implementation (restricted to patches subtending 0.63 degrees of visual angle),
this illustration including 68 distortions applied to one full-size image of the database, im-
plied the integration of the Wilson-Cowan equation in 8970 image regions. The result shows
that the considered Wilson-Cowan model does improve the description of the perceived dis-
tortion in naturalistic environments with regard to the previous layer of the model.
In summary, the proposed Wilson-Cowan model, with parameters obtained according
to Eq. 2.6, has the proper mathematical and perceptual behavior: (a) it converges to the
Divisive Normalization solution (Fig. 4), and (b) it describes the visibility of distortions
better than the image representation given by the linear simple cells (Fig. 5).
2.2 Material: radiometrically calibrated stimuli and color adaptation
In this work we use stimuli from the databases of Foster and Nascimento [21,
Scenes.
22] because (a) the scenes consist of radiometrically calibrated spectra in each pixel, and
(b) they also include information about the illumination through gray spheres of controlled
reflectance. While the spectral nature of the scenes is useful to simulate the perception
process from the initial integration over wavelengths [45, 46], the information about the
-- 8 --
Figure 6: Examples of Von-Kries adaptation. Top: Representative scenes from [21, 22]
under the original illumination. Spectral integration and tristimulus to digital counts rendering
was done with Colorlab [52]. Note that (in the common illumination setting of the figure) the
appearance of the reference gray is quite variable in the different scenes (different brightness, hue,
and even saturation). Right: Same scenes after Von-Kries adaptation. All the gray references are
normalized so their appearance is more stable and also the gamut of colors in the scenes.
illumination allows a straightforward implementation of Von-Kries adaptation with no extra
gray-world assumptions [47].
Alternative possibilities to perform Von-Kries adaptation in sensible LMS spaces in-
clude the Barcelona database [48], in which CIE XYZ images also include gray spheres;
and the IPL database [49, 50], in which CIE XYZ scenes were illuminated using standard
CIE D65 and CIE A spectra.
Standard chromatic adaptation transforms. We applied the Stockman and Sharpe
LMS fundamentals [51] to 5700 spectral image patches of size 40 × 40 × 33 (including 33
wavelegths in the [380,700] nm range). In this way we got 5700 tristimulus image patches
of size 40 × 40 × 3. We assumed that these patches subtend 0.625 degrees of visual angle.
This implies assuming certain observation distance and spatial sampling frequency (in our
case 64 cycles/deg), which is important to apply spatially calibrated models. Each of these
patches was associated to a specific scene, and the white point of each scene was computed
from the average LMS tristimulus values in the gray spheres of the scene (segmented by
hand). Each patch in the original LMS representation was Von-Kries normalized [47] by
the tristimulus values of the corresponding white point leading to 5700 Von-Kries-adapted
LMS images of size 40× 40× 3. Fig. 6 shows the transform of different scenes to a common
(Von-Kries adapted) canonical chromatic representation.
Information-theoretic considerations on the color manifold. The above chromatic
adaptation stage reduces the variability and simplifies the structure of the color manifold
in the LMS space because tristimulus measurements corresponding to objects seen under
different illuminations are aligned and represented in a common scale [18, 49, 53, 54]. As
a result, Von-Kries necessarily reduces the entropy of the color manifold. Additionally, the
-- 9 --
considered linear opponent transform [55] is similar to PCA [56], so it strongly reduces the
redundancy between the color components. Even though the actual nonlinearities applied
to the linear opponent spaces involve the three chromatic channels [47, 49], here we took
a simplified (dimension-wise) approximation [46]: we applied saturating nonlinearities only
depending on the average tristimulus value in the scene in each separated channel to get
the brightness and the corresponding nonlinear RG and YB values. These additional non-
linearities should not modify the redundancy shared among the linear opponent tristimulus
values because the total correlation is invariant under dimension-wise transforms [26, 57].
Despite the deep impact of these transforms on the redundancy among the compo-
nents of the spectra and the components of the colors, in this work we restrict ourselves
to the effects of the transforms on the spatial information since the Wilson-Cowan inter-
action considered above acts on spatial features. Further work may use the data available
in the supplementary material and the statistical methods reviewed below to compare the
efficiency of the (relatively simple) chromatic transforms used here with regard to more so-
phisticated color appearance models [47], or other color representations specifically designed
for information maximization or error minimization [18, 49, 58].
2.3 Method: measuring Total Correlation with Gaussianization transforms
Information transference from stimuli to response is maximized if the components of the
inner representation are statistically independent [14, 15, 59]. Therefore, the appropriate
description of the communication efficiency of a perception system consist of tracking the
amount of information shared by the different components of the signal along the neural
pathway. This redundancy (or shared information) is the total correlation [25] or multi-
information [26]. The total correlation, T , is the Kullback-Leibler divergence between the
joint PDF and the product of its marginal PDFs. Unfortunately, direct computation of T
from its definition is not straightforward because it involves multivariate PDF estimation
in spaces with a huge number of dimensions.
The problems for direct computation of T imply that the quantification of the efficiency
of image representations, x = N (r), is done using the variations ∆T from the input, r, to
the output, x [26]:
d(cid:88)
∆T = T (r) − T (x) =
(h(ri) − h(xi)) + E (log∇r N (r))
(2.7)
i=1
where the term with the sum over the dimensions is easy to compute because the marginal
entropies, h(·), only depend on univariate PDF estimations, but the expected value of the
Jacobian of the transform is required. This second term complicates the estimation and,
as a result, sometimes the analysis is restricted to linear transforms [17], where this second
term is just a constant; or surrogates of total correlation have to be used, as for instance
multiple measures of mutual information between pairs of responses [4, 5, 12], which only
involve bivariate PDF estimations.
In this work we solve the above problems by using a novel estimator of T which only
relies on univariate estimations: the Rotation-Based Iterative Gaussianization (RBIG) [24].
-- 10 --
The RBIG is a cascade of nonlinear+linear layers, each one made of (easy) marginal Gaus-
sianizations followed by an (easy) rotation. This invertible architecture is able to transform
any input PDF into a zero-mean unit-covariance multivariate Gaussian even if the chosen
rotations are random [23]. This ability to completely remove the structure of any PDF is
useful to estimate T of arbitrary vectors x: as the redundancy of a Gaussianized signal is
zero, T (x) corresponds to the sum of the individual variations, ∆Tl, that take place along
the layers of RBIG while Gaussianizing x. Interestingly, the individual variation in each
RBIG layer only depends on (easy to compute) marginal negentropies [23]:
L(cid:88)
L(cid:88)
T RBIG(x) =
∆Tl =
Jm(x(l))
(2.8)
l=1
l=1
because the marginal negentropies, Jm(x(l)), are just the sum of divergences between the
marginal PDFs of the signal that is being Gaussianized at each layer (the vectors x(l)) and
a univariate Gaussian.
In the Results section the theoretical predictions on efficiency (obtained from the ana-
lytical Jacobian of a Wilson-Cowan system plugged into Eq. 2.7) are empirically confirmed
by the computationally-convenient RBIG total correlation estimate, Eq. 2.8.
3 Results: Redundancy reduction via the Wilson-Cowan interaction
Here we study the evolution of the statistical dependence between the responses along the
psychophysically-tuned neural pathway described in Models, Materials and Methods.
First, we present an analytical result for the reduction of total correlation due to a
Wilson-Cowan interaction. We check the validity of this theoretical result with an illus-
trative reduced-scale system. This reduced-scale example is useful not only to confirm the
theory but also to illustrate the accuracy of the RBIG estimates of total correlation.
Then, we empirically analyze the behavior of the full-scale model in different ways:
(1) by analyzing the shape of the marginal PDFs for different kinds of sensors at different
layers of the network, (2) by computing the mutual information, I, between the responses
of multiple pairs of sensors at different layers, and finally, (3) by computing the (more
appropriate) total correlation, T , among the responses at the different layers.
3.1 Theoretical analysis
Here, we first present an analytical expression for the most interesting (multivariate) term
in the reduction of total correlation for the specific case of the Wilson-Cowan interaction.
Afterwards, we exhaustively check the validity of this expression in a reduced-scale exam-
ple, and we compare the efficiency of the Wilson-Cowan system with the efficiency of the
equivalent Divisive Normalization system.
3.1.1 Expression for Total Correlation in Wilson-Cowan systems.
The problem in estimating the variation of total correlation under arbitrary transforms
(Eq. 2.7) is the term depending on the Jacobian. The determinant ∇rN (r) represents
-- 11 --
the compression or expansion of the response space at the point r. Therefore, the last
term is the average variation of the volume of the response space over the PDF of natural
signals. As shown in the experiments below, this term determines the basic trends of the
redundancy reduction.
In this section we give an analytical expression for this Jacobian-dependent term for
a Wilson-Cowan interaction. We use this expression to predict how the efficiency of the
system is going to be for natural images of different luminance/contrast.
Note that in the steady state of the Wilson-Cowan system there is a straightforward
expression for the inverse (eq. 2.5). Taking into account that ∇rN (r0) = (∇xN −1(x0))−1,
∀r0, where x0 = N (r0), the critical term of Eq. 2.7 is:
E (log∇rN) = log(γ)− E(cid:16)
log(Dα + W · D df
dx
)
E (log(αixi + vi)) (3.1)
(cid:17)− (γ−1 − 1)
d(cid:88)
i=1
where D df
of the diagonal, and v = W · f (x).
dx
is a diagonal matrix with the derivative of the sigmoidal functions in each element
Eq. 3.1 is interesting because one can infer the redundancy reduction as a function
of relevant visual features such as luminance and contrast. First, note that the activity
of cortical sensors tuned to DC (flat patterns) increase with luminance and the activity of
those tuned to AC (textured patterns) increase with contrast. Then, note that the first
term in Eq. 3.1 is a constant, but the derivative in the second term decreases with contrast
(see Fig. 2), so this negative term subtracts less for bigger contrasts. On the contrary, the
last term (also negative because typically γ−1 > 1) quickly increases with luminance and
contrast, note that both components of this term increase with x.
The above considerations suggest that, for constant contribution of the marginal en-
tropies (which is the case, as shown below), the efficiency of a Wilson-Cowan network should
be bigger in the low-luminance / low-contrast region of the image space. This trend sug-
gested by the analysis of the terms in Eq. 3.1 is interesting because natural images typically
have low luminance and low contrast [16, 28, 60, 61].
3.1.2 Experiment in a reduced-scale system.
Here we consider a simplified example with the basic elements of the considered network
but in a reduced-scale scenario: 3-pixel images. In this situation the Jacobian matrices are
small so the theory can be visualized and systematically checked. The structure of this
reduced-scale perception system is as follows: first, 3-pixel luminance images are trans-
formed into brightness through a pixel-wise (dimension-wise) Weber-like saturation [47].
Then, 3 Fourier-like analyzers extract the DC, the low-frequency, and the high-frequency
components of the brightness simulating frequency-selective cortical filters [62]. This fre-
quency representation is weighted by a low-pass transfer function that simulates contrast
sensitivity [63]. Finally, this set of responses interact either according to a static Divisive
Normalization transform, or dynamically through the equivalent Wilson-Cowan equation.
The specific parameters of this reduced-scale system are given in Appendix A.
Figure 7 shows how this system transforms the manifold of 3-pixel luminance images of
the considered database. First, note how the frequency sensors (second scatter plot) look
-- 12 --
Figure 7: Natural images through the reduced-scale system. The scatter plots (2 × 103
samples randomly chosen from a set of 5 × 106 samples used in the experiments) display the
changes on the PDF of the responses of the system to 3-pixel natural images at different layers
of the network. From left to right: (1) linear responses to luminance at the retina, (2) responses
of frequency analyzers applied to brightness (saturated luminance), and (3) two versions of the
nonlinear interaction at the cortex: the Divisive Normalization and the Wilson-Cowan responses.
Absolute luminance (in cd/m2) has been normalized by the 95th percentile luminance value.
for the axes of symmetry of the manifold of natural images in the input domain, similarly
to PCA [64]. However, the luminance-to-brightness saturating transform (scatter plot not
shown) expands the low-luminance region and compresses the high-luminance region so the
tail of brighter stimuli (high values in r2
1 in the second scatter plot) is shorter. This will be
discussed in further detail in analyzing the behavior of the full-scale model. Finally, note
how the two interaction schemes considered here lead to a sort of factorization of the PDF
in four separate blobs in the AC frequency components. This effect is also discussed in the
next section with the marginal PDFs of the full-scale model in the wavelet domain.
The deformation of the manifolds shown in Fig. 7 is an interesting illustration of the
multivariate equalization/factorization effect of the model. This suggests the model(s)
are actually operating under an information maximization goal. However, this qualitative
intuition has to be quantified. To do so, we computed the average luminance and the RMSE
contrast of 5× 106 three-dimensional samples extracted from the considered natural scenes,
and we estimated their distribution in the luminance/contrast plane. Then, these images
were injected through the model: on the one hand the static Divisive Normalization response
was computed, and, on the other hand, the equivalent Wilson-Cowan system was stimulated
with the linear frequency representation of the brightness of each sample until it converged
to a steady state (after 500 Euler integration steps). Then, we computed the reduction in
total correlation for the stimuli at different locations of the luminance/contrast plane. We
did this in two ways: (1) theoretically, through the proposed analytical expression, Eq. 3.1,
and (2) empirically, by using the RBIG method reviewed above, Eq. 2.8. In each case, we
considered up to 2.5 × 104 samples per location in the luminance/contrast plane to do the
estimations.
Fig. 8 shows the elements of the theoretical computation: the final result comes from
(i) a Jacobian-dependent term (Eq. 3.1 in the Wilson-Cowan case, and Eqs. 42 and 43 in
-- 13 --
Figure 8: Theoretical efficiency of Wilson-Cowan and Divisive Normalization. The
theoretical reduction of total correlation for natural images of different luminance/contrast (surfaces
at the left) is computed from a term that depends on the Jacobian of the transform (surfaces at
the center), and a term that depends on the sum of marginal entropies of the input and output
(surfaces at the right). The dark surfaces at the left are the (small) standard deviations of the
estimates over 10 different realizations.
[7] in the case of Divisive Normalization), and (ii) and a term that depends on the marginal
entropies. As discussed above, the Jacobian-dependent term decreases with luminance and
contrast, while the variation of the entropy-dependent term is smaller across the image
space. Therefore, the Jacobian determines the general behavior of the system.
Results of the theoretical and the empirical descriptions of the efficiency are compared
in Fig. 9 together with the estimated PDF in the luminance/contrast plane. The general
trend of the efficiency surfaces for Divisive Normalization and for the Wilson-Cowan model
are the same (with both estimation approaches): first, the redundancy is reduced all over
the image space (the reduction of total correlation is positive almost everywhere), but more
importantly, the efficiency is clearly bigger for the low-luminance / low-contrast region,
-- 14 --
Figure 9: Efficiency is consistent with natural image statistics. The general trend of the
efficiency surfaces in the luminance/contrast plane for Divisive Normalization and Wilson-Cowan
are the same. Moreover, both are consistent with natural image statistics since efficiency is bigger in
the most populated region of the image space. The dark surfaces are the (small) standard deviations
of the estimates over 10 different realizations.
which also is the most populated region (see the PDF of the same calibrated training set
at the left).
These results confirm the accuracy of the empirical estimation of T and the correctness
of the theoretical expression for the Wilson-Cowan nonlinearity (or more precisely, they
show the consistency between the theoretical and the empirical estimation). Moreover, re-
sults show the equivalent behavior of Divisive Normalization and Wilson-Cowan in coding
efficiency: both models focus on the same region of the image space. And, more interest-
ingly, they show that psychophysically-inspired nonlinearities have their peak performance
in the proper region of the image space even though they were not optimized in any way
to that end.
-- 15 --
3.2 Empirical analysis of the full-scale model
In this section we study the efficiency of the full-scale model using a purely empirical ap-
proach. This is because the size of the Jacobian for each sample is huge and it is difficult
to collect a big enough set for a reliable estimation of Eq. 3.1. For instance, in the cur-
rent implementation of the model (using a 3-scale, 4-orientation, steerable transform [65]),
discrete luminance patches of size 40 × 40 turn into response vectors x ∈ R10025, so the
Jacobian matrices are 10025 × 10025. One could restrict the interest to a selected set of
sensors (as done in some empirical analysis below). However, note that this restriction does
not imply a reduced-size Jacobian in the theoretical expression. No rows/columns in the
Jacobian can be neglected since the evolution of a subset of responses in the Wilson-Cowan
integration depends on all the responses because, in principle, the matrix W is dense. And
this dense nature makes perceptual sense because (stronger or weaker) there is interaction
between all scales/orientations/positions [37, 38].
Here we analyze the behavior of the full-scale model in three different empirical ways:
(1) by discussing the shape of the marginal PDFs for the responses of sensors at different
layers of the network, (2) by computing the mutual information, I, between the responses
of multiple pairs of sensors at different layers (as in [5]), and finally, and more interestingly,
(3) by computing the total correlation, T , among the responses at the different layers. In the
latter, different spatial sampling schemes are explored to capture how visual information
depends on the field of view.
In all the experiments in this section we start from the responses of the considered
model to the 5700 spectral image patches described in the Materials section. In each case,
the responses at the different layers are further subsampled according to the goal of the
specific experiment and to get a representative set for the considered estimation.
3.2.1 Marginal equalization
Descriptions of natural image statistics usually start from the marginal PDFs because they
show the basic complexity of the signal (e.g. naive coding would only consider zero-order
entropy [57]). Marginal PDFs are relevant because once 2nd order correlation has been
removed, marginal non-Gaussianity (or sparsity) is an appropriate description of the total
correlation in certain cases [66]. It is also interesting to see how a perception system modifies
the marginal PDFs (e.g. eventual equalization, increased sparsity, Gaussianization [16, 28,
60, 67, 68]) because these changes may reveal an information maximization goal [67, 68] and
the general multivariate factorization goal [16] may be achieved through more complicated
marginal PDFs [5].
The initial layers of the system we are considering (1st to 3rd layer) consist of sensors
tuned to specific spatial locations, while the 4th layer is formed by sensors with wavelet-
like receptive fields.
In the marginal approach considered here we assume the signal is
stationary across space and orientation. Therefore we pool together samples from different
spatial locations and (in the case of wavelets) also corresponding to different orientations.
In all the results in this section we collected 1 × 107 randomly chosen samples to estimate
each marginal PDF.
-- 16 --
Figure 10: Marginal PDFs of responses of sensors tuned to spatial locations. Left: PDFs
for the original luminance, Von-Kries luminance, and Brightness. Center: Adaptive luminance to
brightness transform. Right: PDF of nonlinear contrast. See [7] for details on specific Divisive
Normalization expressions of the transforms.
Figure 10 shows the effect of the layers of sensors tuned to spatial locations over the
original PDF of luminance at the retina. We see that the linear luminance representation
(blue line in Fig. 10-left) is strongly biased and has several peaks in the high-luminance tail.
These different peaks correspond to high reflectance objects seen in different illumination
conditions. Note how these peaks disappear after the Von-Kries normalization that puts
every scene in the same relative-luminance range. Then, the brightness transform that
depends on the background luminance (Fig. 10-center) tends to expand the low-luminance
range so that the resulting marginal PDF is relatively more flat.
All the above transforms make no use of spatial or contextual information (appart from
the global scaling factors in Von-Kries obtained from average illumination). The variation
of the PDFs in these point-wise layers is consistent with equalization goals [67]. This com-
pletely changes in the 2nd and 3rd layers that compute contrast from local normalizations of
brightness and apply linear center-surround receptive fields whose response is subsequently
normalized by the local activity.
After contrast computation the mean is removed (see that the peak in Fig. 10-right is
in zero). The distribution is not symmetric around zero because darker regions (now below
zero) are more frequent in natural images.
Interestingly, the contrast masking through
Divisive Normalization in the third layer generates a bimodal distribution above and below
zero. This effect in Divisive Normalization has been interpreted as predictive coding, where
the numerator is predicted from the neighbors in the denominator leading to peaks above
and below zero where this prediction is successful. The predictive coding interpretation has
been suggested many times [12, 27, 33, 69], and peaks of this kind have been consistently
found in [5, 7] using different models and scenes.
Figure 11 shows the marginal PDFs of the responses of sensors tuned to oriented features
-- 17 --
Figure 11: Marginal PDFs of responses of sensors tuned to local oriented fea-
tures.Left: PDFs of the responses to distributions of nonlinear contrast of V1-like linear sensors.
Center: PDFs after Divisive Normalization. Right: PDFs after Wilson-Cowan interaction.
of different scales. These sensors are the linear wavelet-like filters at the 4th layer that
simulate V1 simple cells, and the corresponding mechanisms after the nonlinear interactions
(either Divisive Normalization or Wilson-Cowan). The linear wavelet-like sensors at the
4th layer display heavy tailed PDFs with decreasing variance for finer scales. However the
sparsity of these responses is lower than the sparsity of the same filterbank applied on
luminance images (results not shown). This lower sparsity maybe because wavelet filters
certainly lead to highly sparse (non-Gaussian) responses when applied to luminance images,
but the nonlinear-contrast images are substantially different from luminance images (see
for example the output of 3rd layer at Fig. 1).
More interestingly, these (moderately) sparse response distributions turn into bimodal
distributions after the nonlinear interactions, both for Divisive Normalization and Wilson-
Cowan. Again (as in Fig. 10-right) the masking interaction generates bimodal PDFs. How-
ever, this is not a exclusive feature of Divisive Normalization:
it happens in equivalent
Wilson-Cowan systems as well. Note that this marginal behavior (two modes around a
depression in zero) can be understood in multivariate terms using the visualization of the
reduced-scale example in Fig. 7: the projection of the blobs on the different axes leads to
the peaks in the marginals.
3.2.2 Mutual Information along the network
Criticisms to linear Independent Component Analysis (ICA) pointed out that sparsity max-
imization in the marginal PDFs does not guarantee complete statistical independence [16,
70]. This is obvious from the mathematical point of view [66], however, in practice, a
substantial amount of work was devoted to point out the existence of residual statistical
relations after ICA-like filters had been applied to images. The problems for direct estima-
tion of total correlation mentioned in the Methods section, impled a variety of surrogates to
measure this remaining redundancy, as for instance the analysis of conditional probabilities
-- 18 --
Figure 12: Mutual information between a spatial sensor and its neighbors. Different
layers along the network are considered from left to right. The value of auto-mutual information
has been set to zero for better visualization. We did that because this value is arbitrarily large
(every response contains arbitrarily large amount of information about itself), and it should not be
considered in describing the interaction with the neighbors.
of neighbor responses, the so-called bow-ties [3 -- 5, 27 -- 29], the analysis of the correlation
between the energies of pairs of responses as a way to identify subspaces with residual rela-
tions [30 -- 34], or the measure of mutual information between pairs of responses [5, 12, 35].
Here we quantify the relation between pairs of responses using mutual information, I,
as a function of the separation between the sensors in the corresponding feature space
(spatial departure for the first three layers and departure in space, scale and orientation
for the wavelet-like layer). We applied the straightforward definition of mutual information
because each computation reduces to the estimation of a joint (bivariate) PDF and two
marginal PDFs. We did that by gathering neighbors from sliding windows of size smaller
than the available visual field. In that way we got 8 × 104 samples for each pair of sensors.
We computed 10 estimations of I using a randomly chosen subset with 80% of those samples
in each estimation. We chose the bin size according to the Silverman rule of thumb [71].
The results in the plots are the average of those estimations.
Figure 12 shows the evolution of the interactions as the signal goes through the three
initial layers. In every case, the relation is higher with closer neighbors and decays with
distance. However, in the explored spatial range (which is limited, about 0.5 degrees) these
pair-wise relations do not drop to zero in layers before contrast computation. The I would
eventually arrive to zero for sufficiently large separation, but we didn't have access to big
enough distances. Von-Kries adaptation and brightness computation reduce the amount of
paired relations about 0.5 bits, but the substantial change again comes with the introduction
of spatial processing in the third layer: the relations with the closer neighbors are smaller,
they drop faster, and actually arrive to zero for small departures. The division by the local
activity removes the relation with the spatial neighborhood:
it seems that the predictive
coding interpretation of normalization mentioned above [12, 27, 33, 69] also applies here.
Figure 13 shows the mutual information values for the responses of two sensors (those
highlighted in red) with all their neighbors in the response vector at the V1 layer before
-- 19 --
Figure 13: Mutual information between two wavelet-like sensors and all their neigh-
bors. Left: interactions of a sensor tuned to vertical patterns of middle frequency (highlighted in
red). Right: interactions of a sensor tuned to diagonal patterns of middle frequency (highlighted in
red). Top: interactions between the linear sensors. Top: interactions between the sensors after the
Wilson-Cowan recurrence. Lighter gray indicate higher mutual information. All figures are scaled
in the same way. Comparing top and bottom one can see that the Wilson-Cowan recurrence reduces
the statistical relations a little bit (darker diagrams at the bottom).
and after the application of the Wilson-Cowan interaction. Finally, Fig. 14 shows a subset
of the results shown in Fig. 13 represented as a surface as in Fig. 12. As previously reported
for linear wavelet domains [5, 35, 72], here mutual information also decays with distance
in space scale and orientation. After the nonlinear interactions (we only show the Wilson-
Cowan result) the relations between the coefficients seem to be reduced.
However, the reduction obtained here is substantially smaller than the one obtained
with previous Divisive Normalization models where I was computed in the same way [5].
It is not a specific matter of Wilson-Cowan, but it is related to the multi-layer architecture:
results with the current architecture with Divisive Normalization (not shown) are similar
-- 20 --
Figure 14: Mutual information between a wavelet-like sensor and its neighbors in
space and orientation. The considered sensor is at the center of the domains represented at the
left column. Left: Decay of the interaction in space (for the same orientation -or subband-). Right:
Decay of the relation in space for a different orientation. Top: result before the Wilson-Cowan
recurrence. Bottom: result after the Wilson-Cowan recurrence.
to the Wilson-Cowan results in Figs. 13 and 14, i.e. only moderate gain in I. It is not
the database either: we made preliminary experiments with the current architecture and
Divisive Normalization using the Van Hateren stimuli [43] (the data used in [5]), and the
results (not shown) are similar: also a very moderate gain.
The difference in the architecture explored here with regard to the one in [5] is that
the current one is deeper: the current wavelet-like layer comes after previous layers that
already are doing spatially significant Divisive Normalization (in our case the 3rd layer).
The presence of previous layers which already reduce the redundancy, may limit the ability
of the considered nonlinearities at this later stage. Nevertheless, note that the set of mutual
information measures is only a surrogate of the conceptually appropriate measure, the total
correlation, which is addressed in the next section.
3.2.3 Total Correlation along the network
In this section we measure the shared information (total correlation) in the responses of
sensors covering progressively bigger portions of the visual field, and we see how this shared
information modifies along the neural pathway. We take two different spatial sampling
strategies: (1) no-subsampling, i.e. considering all the sensors tuned to the spatial region,
so bigger regions imply a bigger number of sensors, and (2) subsampling, i.e. taking a fixed
number of sensors progressively more separated, so the bigger the visual field, the poorer
the sampling of the visual patterns.
An illustration of the dimensions of the response vector considered at the wavelet-like
layer in both experiements is shown in Fig. 15. The corresponding selection for the layers
-- 21 --
where sensors have spatial meaning is straightforward.
Taking such subsets of responses (or sensors) keeps the dimension small and makes
the empirical estimation easier. This specific sampling schemes were proposed to allow
gathering response vectors by sliding windows like those in Fig. 15. Collecting big datasets
is particularly important since the dimensions of the considered vectors range from 5 (in
the subsampling experiment in the layers with spatial meaning) up to 321 (in the no-
subsampling experiment with bigger field of view in the wavelet-like layers). In every case,
the total correlation is reported by coefficient. All the total correlation measures in this
section were computed using 2.5 × 104 samples and RBIG with 600 layers to ensure the
convergence to the Gaussian. In each case, 10 realizations of the estimates were computed
using 80% of the samples.
The sampling strategies were selected because they lead to a clear pattern in the total
correlation in the input representation. This pattern is a safety check in this full-scale
situation where the theoretical computation is not feasible due to the size of the Jacobians.
Note that given the smoothness of objects in natural scenes, the consideration of bigger
visual fields in the no-subsampling experiment should include more coherent structures
(e.g. bigger portions of objects in the images). As a result, one would expect increased
redundancy given the bigger coherence of the visual structures. On the other hand, if a
fixed number of sensors is progressively separated covering bigger visual fields, as in the
subsampling experiment, the statistical relation between the sensors in the extremes of the
visual field should decrease with separation.
This is exactly the pattern that is found in the results, see Fig. 16: (1) in luminance
Figure 15: Wavelet sensors in total correlation experiments. Visual angle and spatial
sampling strategy. From left to right:
increasing visual angle covered by the sensors. Top and
bottom: no sub-sampling, versus sparse sampling.
-- 22 --
images in the no-subsampling experiment, total correlation increases with the size of the
visual field, and (2) in luminance images in the subsampling experiment, total correlation
decreases with the size of the visual field. Note also that the stimuli that can be properly
called images are those of the no-subsampling experiment. In the subsampling experiment
we just take samples at the corners and at the center of the visual field.
Regarding the efficiency of the signal representations, Fig. 16-left shows how the total
correlation is reduced for images (note that the signals in the subsampling experiment are
not strictly images). Results show that the initial layers (Von-Kries chromatic adaptation,
and Weber-like adaptive brightness) do not contribute to redundancy reduction in images.
This is because these operations introduce no fundamental spatial information, so the re-
dundancy between neighbor spatial locations is basically preserved. Redundancy starts to
be removed in the third layer (Nonlinear Contrast) where the Contrast Sensitivity Function
is applied to the local contrast and then the result is nonlinearly transformed using Divisive
Normalization. In this layer, bigger reductions are obtained in smaller visual fields due to
the (relatively small) size of the masking kernel of Divisive Normalization in the spatial
domain (about 0.02 degrees). On the contrary, the bigger the visual field (which involves
more complicated visual structures), the more effective is the linear filterbank of wavelet-
like receptive fields (Linear V1 layer). Finally, the nonlinear interaction at the cortical level
(after all the previous stages) does not imply substantial reductions of redundancy in terms
of total correlation. The values at the Nonlinear V1 layer in Fig. 16 display the specific
result for the Wilson-Cowan interaction, but Table 1 shows that the removed redundancy
for the equivalent Divisive Normalization model is virtually the same: in the biggest visual
Figure 16: Reduction of Total Correlation along the layers of the network. Visual
signals of different spatial size are considered. Left: no spatial subsampling (actual images). Right:
with spatial subsampling (samples at the corners and the center of the visual field).
-- 23 --
Table 1: Removed Redundancy (in %). Percentage of Total Correlation removed at the inner
representation with regard to the values at the input representation. Visual fields of different size
(in degrees) with no subsampling (left) and with subsampling (right).
NO-SUBSAMPL.
Divisive Norm.
Wilson-Cowan
∆x = 0.24
84 ± 3
85 ± 4
∆x = 0.12
67 ± 3
67 ± 3
∆x = 0.06 ∆x = 0.44
54 ± 2
54 ± 1
87 ± 2
86 ± 3
SUBSAMPL.
∆x = 0.32
84 ± 4
84 ± 3
∆x = 0.18
79 ± 3
79 ± 3
field explored for images the inner representation removes about 85% of the total correlation
in the input representation.
Fig. 16-right shows the equivalent results for visual fields in which spatial samples
were taken from the corners and the center of the considered regions. In this configuration
the inner representation also removes about 85% of the total correlation at the input.
However, in this case, most of the redundancy reduction comes from the nonlinear contrast
computation.
Similarly to what was found in the mutual information analysis, in this cascade (for
images) the biggest reduction in redundancy comes from the wavelet-like transform and the
contribution of the nonlinear interaction between simple cells is relatively small.
4 Discussion
In
Alternative confirmation of Barlow's hypothesis for Wilson-Cowan systems.
this work we performed the first analysis of the communication efficiency of Wilson-Cowan
networks in accurate information theoretic terms using the appropriate (multivariate) de-
scription of redundancy: the total correlation. Pointing out the efficiency of a psychophys-
ically tuned system is an alternative confirmation of Barlow's Efficient Coding Hypothesis.
This hypothesis states that natural perception systems evolved to efficiently encode
natural signals [8 -- 10]. The conventional way to check this hypothesis is training artificial
systems with natural scenes assuming some communication efficiency goal (as for instance
redundancy reduction), and see the emergence of natural properties from the statistical
learning. This logic (from-statistics-to-perception) has been applied to explain the linear
image representation in V1 [32, 50, 73], the nonlinear interactions [3, 4, 49, 58], and even
the origin of visual illusions [18, 74].
However, note that here we reasoned in the opposite direction: we took a psychophys-
ically plausible network and analyzed its behavior in information-theoretic terms after no
statistical learning whatsoever. We found that the considered systems have bigger efficiency
(bigger reductions in T ) in the most populated regions of the image space, see Fig. 9, and
they remove about 85% of the total correlation of natural scenes in the input representa-
tion, see Fig. 16 and Table 1. The approach used here (from-perception-to-statistics) is an
alternative way to confirm the Efficient Coding Hypothesis, as suggested in [5].
Efficiency of Wilson-Cowan is similar to Divisive Normalization. Several evi-
dences suggest that the Wilson-Cowan interaction can be as effective in information theo-
-- 24 --
retic terms as the Divisive Normalization model. First, consider that the interaction kernel
W derived here from the relation proposed in [19, 20], roughly decays with space, orienta-
tion, and scale. The similarity between the interaction kernel and the mutual information
in the linear wavelet-like representation (compare Figs. 3-right and 13-left) has been related
to the effectiveness of this kind of interactions to capture the structure of the signal [5, 72].
Second, recurrent subtraction of the activity of the neighbors weighted in this way in the
integration of the Wilson-Cowan equation lead to similar bimodal marginal PDFs, and to
similar clusters in the joint PDF as the Divisive normalization (see Figs. 11 and 7). Third,
the Jacobian of the Wilson-Cowan nonlinearity induces similar trends in the reduction of
total correlation as the Divisive Normalization (see Figs. 8 and 9): both models have better
efficiency in the low-luminance / low-contrast region. And finally, note that the redundancy
reduction in the full-scale model is roughly the same using the Wilson-Cowan interaction
and the Divisive Normalization (see Table 1).
The above statistical similarities between the Wilson-Cowan and the Divisive Normal-
ization models are consistent with the ability of Wilson-Cowan interaction to improve the
explanation of pattern visibility, which is similar to Divisive Normalization. Note that the
results in Fig. 5 with Wilson-Cowan are consistent with better explanations of subjective
image quality reported for Divisive Normalization [7, 75, 76]. These information theoretic
and perceptual similarities suggest the Divisive Normalization actually is the steady state
of the Wilson-Cowan dynamics, as assumed in [20].
Accuracy of total correlation estimates. A side technical benefit of the theory pre-
sented here (the expression of the reduction of total correlation for Wilson-Cowan systems,
Eqs. 2.7 and 3.1) is that this kind of theoretical results can be used to check the accuracy
of empirical estimates of total correlation in neuroscience applications. This is also true for
the equivalent result for Divisive Normalization presented in [7]. Here we directly compare
these theoretical results with empirical estimates (in Fig. 9), which was not done in [7].
These ground truth results are relevant because information measures using Gaussian-
ization [23, 24] had been used to identify interesting patterns in other spatio-spectral and
spatio-temporal data [77, 78], but in those cases there was no theoretical bound to compare
with.
The success of the empirical measure of total correlation [23, 24] shown in this work
suggests that it can be used as a goal function or as an analysis tool to optimize artificial
systems, or to check natural systems according to the information bottleneck principle [79].
Differences with shallower networks. Despite here we quantify redundancy through a
more appropriate concept, the analysis presented in this work is similar to the one done in [5]
for a shallower network based on another phychophysically tuned Divisive Normalization.
The model consisted of a single linear+nonlinear layer: a wavelet transform plus a linear
weighting to simulate the contrast sensitivity followed by a Divisive Normalization of the
energies of the weighted wavelet.
However, as noted in section 3.2, the results obtained here differ from those reported
in [5]: the reduction of the mutual information with regard to the linear wavelet represen-
tation obtained here is substantially smaller. This is consistent with the small reduction in
-- 25 --
total correlation with regard to the linear wavelet representation shown in Fig. 16, which
was not measured in [5] because the statistical tool was not available. This could mean
that the efficiency of this interaction (either implemented through Wilson-Cowan or Divisive
Normalization) is not as big as suggested in [5].
On the contrary, we argue that the small gain with regard to the linear wavelet is not
a fundamental limitation of the Divisive Normalization or the Wilson-Cowan models, but
a simple consequence of the fact that we are looking at a deeper layer: the presence of
previous layers which already reduce the redundancy limits the ability of the considered
nonlinearities a later stage. In fact, the reduced sparsity displayed by our linear wavelet
representation in Fig. 11-left has the same origin: the modified effect of wavelets on contrast
images (instead of the conventional luminance images).
Reproducible results. Code to reproduce all the empirical results on the behavior of
the full-scale model as well as the experiment of the reduced-scale model that includes the
theoretical result are available at https://github.com/alviur/information_wc.git
In summary, the considered psychophysically tuned 4-layer network re-
Final remarks.
moves 85% of the total correlation from achromatic (luminance) images subtending 0.24 de-
grees. For this field of view the Wilson-Cowan model has the same communication efficiency
as the equivalent Divisive Normalization model. In a reduced-scale scenario, the theoretical
and the empirical results on redundancy reduction are consistent, and both show that the
psychophysically inspired Wilson-Cowan and Divisive Normalization networks are more ef-
ficient in the regions of the image space where natural scenes are more frequent. The above
results represent a confirmation of Barlow's Efficient Coding Hypothesis for Wilson-Cowan
models in the perception-to-statistics direction (alternative to the conventional statistics-
to-perception approach).
The similarities in the statistical effect of the Wilson-Cowan and the Divisive Normal-
ization suggest that recurrent neural field models could be an alternative in image coding
applications where Divisive Normalization has beaten both JPEG and JPEG2000 [12, 13].
From a more fundamental point of view, future work should use the proposed analysis
before the stationary state is reached. This will show how the information efficiency may
evolve while adaptation takes place.
A Appendix: Psychophysically inspired reduced-scale model
Overview. The reduced-scale model consist of two linear+nonlinear layers: (1) a linear
radiance-to-luminance transform using a standard Spectral Sensitivity Function, Vλ, in the
spectral integration [45], followed by a simple exponential for the luminance-to-brightness
nonliniearity applied pixel-wise in the spatial domain, that simulates the Weber-Fechner
response to luminance [47], and (2) a linear+nonlinear layer in which the linear transform
is a discrete cosine transform (a orthonormal rotation) followed by a low-pass weighting
function that simulate frequency-tuned sensors and the Contrast Sensitivity Function (CSF)
[63]. Then, the outputs of the frequency sensors undergo a nonlinear interaction that may be
-- 26 --
a Divisive Normalization [2, 7, 41], or its equivalent Wilson-Cowan network, with parameters
computed according to Eq. 2.6 [20].
L(1)
N (1)
L(2)
N (2)
x0
r1
x1
r2
x2
(A.1)
Transform. The actual inputs of our code are the responses of the linear photoreceptors:
3-pixel image vectors with normalized luminance values, i.e. r1 ∈ R3. The normalized lumi-
nance was computing dividing the absolute luminance in cd/m2 by the value corresponding
to the 95% percentile of the luminance, in our case 260 cd/m2.
• The luminance-to-brightness transform, N (1), is just:
x1 = (r1)γ
where γ = 0.6
• The linear transform of frequency-tuned sensors with CSF gain, L(2), is:
r2 = GCSF · F · x1
where
3
(cid:113) 1
(cid:113) 1
−(cid:113) 1
1
2
6
0
0
3
(cid:113) 1
(cid:113) 1
0 −(cid:113) 1
(cid:113) 2
3 −(cid:113) 1
6
3
2
0
0.5
0
0
0
0.3
F =
GCSF =
(A.2)
(A.3)
• The Divisive Normalization of the frequency-tuned sensors, N (2)
(b+H·r2γ ) · r2γ where γ = 0.7,
x2 = sign(x2) (cid:12) Dk · D−1
DN, is:
and,
(A.4)
0.18
0
0
Dk =
H = Dl · W · Dr =
0.03
0
0
0
0
0.01
0.06
0
0
0
0.35
0
0
0
0.27
and the vector of semisaturations, b, is:
b =
·
0.95
0
0
0.06
0.93
0.02
0.01
0.05
0.98
0
0.27
0
0
0
0.13
0.04
·
0.93
0.08
0
0.03
0.01
-- 27 --
$
$
%
%
$
$
%
%
• The equivalent Wilson-Cowan interaction, N (2)
WC, is defined by the differential equation
2.4, where the auto-attenuation, α, and the interaction matrix, W , are:
α =
W =
and the saturation function is:
0.06
0.93
0.02
0.01
0.05
0.98
(A.5)
(A.6)
0.41
0.93
1.10
1.30
0.04
0
1.12
0.02
0.01
x =
(A.7)
the scaling constant is, c = x1−γ, and x is the average response over natural images
(for the Divisive Normalization transform):
f (x) = c xγ where γ = 0.4,
and,
This exponent is also used for the definition of energy in Wilson-Cowan, e = rγ.
Note that the interaction neighborhoods have unit volume, (cid:80)
j Wij = 1 ∀j, as sug-
gested in [38], and then, the Divisive Normalization kernel is given by the product of this
unit-volume neighborhood and two left and right filters in the diagonal matrices, Dl and
Dr [41]. The values for the semisaturation, b, and the diagonal matrices Dl and Dr were
inspired by the contrast response results in [41]: we set the semisaturation according to
the average response of natural images (low-pass in nature), and we initialized the left and
right filters to high-pass. However, afterwards, in order to make NDN and NWC consistent,
we applied the Divisive Normalization over natural images and we iteratively updated the
values of the right and left filters according to Eq. 2.6. In the end, we arrived to the values
in the above expressions (where the filter at the left is high-pass, but the filter at the right
is not). Note that the attenuation in Wilson-Cowan is computed using Eq. 2.6.
Jacobian. The information theoretic computations strongly depend on how the system
(locally) deforms the signal representation (e.g. Eq. 3.1). This is described by the Jacobian
of the transform with regard to the signal, ∇r1S = ∇r2N (2) · ∇x1L(2) · ∇r1N (1). In this
reduced-scale model, this Jacobian (for the Wilson-Cowan case) is:
(cid:16)Dα + W · D df
(cid:17)−1 ·(cid:0)D(Dα·x2+W·f (x2))
(cid:1)1− 1
dx
∇r1S = γ2
γ2 · GCSF · F · D
γ1(r1)γ1−1
(A.8)
Acknowledgments
This work was partially funded by the Spanish Government and EU FEDER fund through
the MINECO grants TIN2015-71537-P and DPI2017-89867-C2-2-R; and by the European
Union's Horizon 2020 research and innovation programme under grant agreement number
761544 (project HDR4EU) and under grant agreement number 780470 (project SAUCE).
-- 28 --
References
[1] H. R. Wilson and J. D. Cowan, A mathematical theory of the functional dynamics of cortical
and thalamic nervous tissue, Kybernetik 13 (1973), no. 2 55 -- 80.
[2] M. Carandini and D. Heeger, Summation and division by neurons in visual cortex, Science
264 (1994), no. 5163 1333 -- 6.
[3] O. Schwartz and E. Simoncelli, Natural signal statistics and sensory gain control, Nature
Neurosci. 4 (2001), no. 8 819 -- 825.
[4] J. Malo and J. Gutiérrez, V1 non-linear properties emerge from local-to-global non-linear
ICA, Network: Computation in Neural Systems 17 (2006), no. 1 85 -- 102.
[5] J. Malo and V. Laparra, Psychophysically tuned divisive normalization approximately
factorizes the pdf of natural images, Neural computation 22 (2010), no. 12 3179 -- 3206.
[6] R. Coen-Cagli, P. Dayan, and O. Schwartz, Cortical surround interactions and perceptual
salience via natural scene statistics, PLOS Computational Biology 8 (03, 2012) 1 -- 18.
[7] M. Martinez-Garcia, P. Cyriac, T. Batard, M. Bertalmío, and J. Malo, Derivatives and
inverse of cascaded linear+nonlinear neural models, PLOS ONE 13 (10, 2018) 1 -- 49.
[8] H. Barlow, Sensory mechanisms, the reduction of redundancy, and intelligence, Proc. of the
Nat. Phys. Lab. Symposium on the Mechanization of Thought Process (1959), no. 10 535 -- 539.
[9] H. Barlow, Possible principles underlying the transformation of sensory messages, in Sensory
Communication (W. Rosenblith, ed.), pp. 217 -- 234. MIT Press, Cambridge, MA, 1961.
[10] H. Barlow, Redundancy reduction revisited, Network: Comp. Neur. Syst. 12 (2001), no. 3
241 -- 253.
[11] K. Friston, The free-energy principle: a rough guide to the brain?, Trends in cognitive
sciences 13 (2009), no. 7 293 -- 301.
[12] J. Malo, I. Epifanio, R. Navarro, and E. P. Simoncelli, Nonlinear image representation for
efficient perceptual coding, IEEE Transactions on Image Processing 15 (2006), no. 1 68 -- 80.
[13] J. Ballé, V. Laparra, and E. P. Simoncelli, End-to-end optimized image compression, in 5th
Int. Conf. Learn. Repres., ICLR 2017, 2017.
[14] A. J. Bell and T. J. Sejnowski, An information maximization approach to blind separation
and blind deconvolution., Neural Computation 7 (1995) 1129 -- 1159.
[15] A. J. Bell and T. J. Sejnowski, The independent components of natural scenes are edge
filters, Vision Research 37 (1997), no. 23 3327 -- 3338.
[16] E. P. Simoncelli and B. A. Olshausen, Natural image statistics and neural representation,
Annual Review of Neuroscience 24 (2001), no. 1 1193 -- 1216.
[17] M. Bethge, Factorial coding of natural images: how effective are linear models in removing
higher-order dependencies?, JOSA A 23 (2006), no. 6 1253 -- 1268.
[18] V. Laparra and J. Malo, Visual aftereffects and sensory nonlinearities from a single
statistical framework, Frontiers in Human Neuroscience 9 (2015) 557.
[19] J. Malo and M. Bertalmio, Appropriate kernels for divisive normalization explained by
Wilson-Cowan equations, Celebration of Cowan's 50th anniv. at Univ. Chicago. ArXiv:
Quant. Biol. https://arxiv.org/abs/1804.05964 (2018).
-- 29 --
[20] J. Malo, J. Esteve-Taboada, and M. Bertalmío, Divisive normalization from Wilson-Cowan
dynamics, ArXiv: Quant. Biol. https://arxiv.org/abs/1906.08246 (2019).
[21] D. H. Foster, K. Amano, and S. M. Nascimento, Time-lapse ratios of cone excitations in
natural scenes, Vision research 120 (2016) 45 -- 60.
[22] S. M. Nascimento, K. Amano, and D. H. Foster, Spatial distributions of local illumination
color in natural scenes, Vision Research 120 (2016) 39 -- 44.
[23] V. Laparra, G. Camps-Valls, and J. Malo, Iterative gaussianization: from ICA to random
rotations, IEEE Trans. Neural Networks 22 (2011), no. 4 537 -- 549.
[24] J. Johnson, V. Laparra, R. Santos, G. Camps, and J. Malo, Information theory in density
destructors, in 7th Int. Conf. Learn. Repres., ICLR 2019, Workshop on Invertible
Normalization Flows, 2019.
[25] S. Watanabe, Information theoretical analysis of multivariate correlation, IBM Journal of
research and development 4 (1960), no. 1 66 -- 82.
[26] M. Studeny and J. Vejnarova, The Multi-information function as a tool for measuring
stochastic dependence, pp. 261 -- 298. Kluwer, January, 1998.
[27] R. W. Buccigrossi and E. P. Simoncelli, Image compression via joint statistical
characterization in the wavelet domain, IEEE Transactions on Image Processing 8 (Dec,
1999) 1688 -- 1701.
[28] Jinggang Huang and D. Mumford, Statistics of natural images and models, in Proceedings.
1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat.
No PR00149), vol. 1, pp. 541 -- 547 Vol. 1, June, 1999.
[29] A. Hyvärinen, J. Hurri, and J. Väyrynen, Bubbles: a unifying framework for low-level
statistical properties of natural image sequences, JOSA A 20 (2003), no. 7 1237 -- 1252.
[30] A. Hyvärinen and P. O. Hoyer, A two-layer sparse coding model learns simple and complex
cell receptive fields and topography from natural images, Vision Research 41 (2001), no. 18
2413 -- 2423.
[31] A. Hyvärinen and P. Hoyer, Emergence of phase- and shift-invariant features by
decomposition of natural images into independent feature subspaces, Neural Computation 12
(2000), no. 7 1705 -- 1720.
[32] A. Hyvärinen, J. Hurri, and P. Hoyer, Natural Image Statistics: A probabilistic approach to
early computational vision. Springer, 2009.
[33] J. Malo, R. Navarro, I. Epifanio, F. Ferri, and J. Artigas, Non-linear invertible representation
for joint statistical and perceptual feature decorrelation, Lect. Not. Comp. Sci. 1876 (2000)
658 -- 667.
[34] I. Epifanio, J. Gutierrez, and J. Malo, Linear transform for simultaneous diagonalization of
covariance and perceptual metric matrix in image coding, Pattern Recognition 36 (2003),
no. 8 1799 -- 1811.
[35] J. Liu and P. Moulin, Information-theoretic analysis of interscale and intrascale dependencies
between image wavelet coefficients, IEEE Trans. Im. Proc. 10 (2001), no. 11 1647 -- 1658.
[36] M. Carandini and D. J. Heeger, Normalization as a canonical neural computation, Nature
Rev. Neurosci. 13 (2012), no. 1 51 -- 62.
-- 30 --
[37] J. Foley, Human luminance pattern mechanisms: Masking experiments require a new model,
Journal of the Optical Society of America A 11 (1994), no. 6 1710 -- 1719.
[38] A. B. Watson and J. A. Solomon, Model of visual contrast gain control and pattern masking,
JOSA A 14 (1997), no. 9 2379 -- 2391.
[39] P. C. Bressloff and J. D. Cowan, The functional geometry of local and horizontal connections
in a model of v1, Journal of Physiology-Paris 97 (2003), no. 2 221 -- 236. Neurogeometry and
visual perception.
[40] J. Malo and E. Simoncelli, Geometrical and statistical properties of vision models obtained
via maximum differentiation, in SPIE Electronic Imaging, pp. 93940L -- 93940L, International
Society for Optics and Photonics, 2015.
[41] M. Martinez, M. Bertalmío, and J. Malo, In praise of artifice reloaded: Caution with natural
image databases in modeling vision, Front. Neurosci. doi: 10.3389/fnins.2019.00008 (2019).
[42] P. Chossat and O. Faugeras, Hyperbolic planforms in relation to visual edges and textures
perception, PLoS Computational Biology 5 (12, 2009) e1000625.
[43] J. H. v. Hateren and A. v. d. Schaaf, Independent component filters of natural images
compared with simple cells in primary visual cortex, Proceedings: Biological Sciences 265
(Mar, 1998) 359 -- 366.
[44] N. Ponomarenko, M. Carli, V. Lukin, K. Egiazarian, J. Astola, and F. Battisti, Color image
database for evaluation of image quality metrics, Proc. Int. Workshop on Multimedia Signal
Processing (Oct., 2008) 403 -- 408.
[45] G. Wyszecki and W. Stiles, Color Science: Concepts and Methods, Quantitative Data and
Formulae. John Wiley & Sons, New York, 1982.
[46] A. Stockman and D. Brainard, OSA Handbook of Optics (3rd. Ed.), ch. Color vision
mechanisms, pp. 147 -- 152. McGraw-Hill, NY, 2010.
[47] M. Fairchild, Color Appearance Models. The Wiley-IS&T Series in Imaging Science and
Technology. Wiley, 2013.
[48] J. Vazquez-Corral, C. Párraga, R. Baldrich, and M. Vanrell, Color constancy algorithms:
Psychophysical evaluation on a new dataset, Journal of Imaging Science and Technology 53
(2009), no. 3 31105 -- 1 -- 31105 -- 9.
[49] V. Laparra, S. Jiménez, G. Camps-Valls, and J. Malo, Nonlinearities and adaptation of color
vision from sequential principal curves analysis, Neural Computation 24 (2012), no. 10
2751 -- 2788.
[50] M. U. Gutmann, V. Laparra, A. Hyvärinen, and J. Malo, Spatio-chromatic adaptation via
higher-order canonical correlation analysis of natural images, PloS ONE 9 (2014), no. 2
e86481.
[51] A. Stockman and L. T. Sharpe, The spectral sensitivities of the middle- and
long-wavelength-sensitive cones derived from measurements in observers of known genotype,
Vision Research 40 (2000), no. 13 1711 -- 1737.
[52] J. Malo and M. Luque, "ColorLab: A Matlab Toolbox for Color Science and Calibrated
Color Image Processing." http://isp.uv.es/code/visioncolor/colorlab.html, 2002.
[53] M. A. Webster and J. D. Mollon, Colour constancy influenced by contrast adaptation, Nature
373 (1995) 694 -- 698.
-- 31 --
[54] M. A. Webster and J. Mollon, Adaptation and the color statistics of natural images, Vision
Research 37 (1997), no. 23 3283 -- 3298.
[55] C. R. Ingling Jr and B. H.-P. Tsou, Orthogonal combination of the three visual channels,
Vision research 17 (1977), no. 9 1075 -- 1082.
[56] G. Buchsbaum and A. Gottschalk, Trichromacy, opponent colours coding and optimum
colour information transmission in the retina, Proc. Roy. Soc. Lond. B Biol. Sci. 220 (1983),
no. 1218 89 -- 113.
[57] T. M. Cover and J. A. Thomas, Elements of Information Theory, 2nd Edition.
Wiley-Interscience, 2 ed., July, 2006.
[58] D. MacLeod and T. von der Twer, The pleistochrome: optimal opponent codes for natural
colors, in Color Perception: From Light to Object (D. Heyer and R. Mausfeld, eds.). Oxford
Univ. Press, Oxford, UK, 2003.
[59] A. Hyvärinen and E. Oja, Independent component analysis: algorithms and applications,
Neural networks 13 (2000), no. 4-5 411 -- 430.
[60] E. Simoncelli, Statistical models for images: Compression, restoration and synthesis, in
Conference Record of the Asilomar Conference on Signals, Systems and Computers
(M. Farques and R. Hippenstiel, eds.), vol. 1, pp. 673 -- 678, IEEE Comp Soc, 1998.
[61] J. Malo, F. Ferri, J. Albert, J. Soret, and J. Artigas, The role of perceptual contrast
non-linearities in image transform quantization, Image and Vision Computing 18 (2000),
no. 3 233 -- 246.
[62] A. Watson, The cortex transform: Rapid computation of simulated neural images, Computer
Vision, Graphics and Image Processing 39 (1987) 311 -- 327.
[63] F. Campbell and J. Robson, Application of Fourier analysis to the visibility of gratings,
Journal of Physiology 197 (1968) 551 -- 566.
[64] P. Hancock, R. Baddeley, and L. Smith, The principal components of natural images,
Network 3 (1991) 61 -- 70.
[65] E. P. Simoncelli, W. T. Freeman, E. H. Adelson, and D. J. Heeger, Shiftable multi-scale
transforms, IEEE Trans Information Theory 38 (Mar, 1992) 587 -- 607. Special Issue on
Wavelets.
[66] J. Cardoso, Dependence, correlation and gaussianity in independent component analysis, J.
Mach. Learn. Res. 4 (2003) 1177 -- 1203.
[67] S. B. Laughlin, Matching coding to scenes to enhance efficiency, in In Braddick, O.J. &
Sleigh, A.C. (Eds) Physical and Biological Processing of Images, pp. 42 -- 52, Springer, 1983.
[68] D. L. Ruderman, The statistics of natural images, Network: computation in neural systems 5
(1994), no. 4 517 -- 548.
[69] J. Ballé, V. Laparra, and E. P. Simoncelli, Density modeling of images using a generalized
normalization transformation, in Int. Conf. Learn. Rep. (ICLR 16'), 2016.
[70] S. Lyu and E. P. Simoncelli, Nonlinear extraction of independent components of natural
images using radial gaussianization, Neural Comp. 21 (2009), no. 6 1485 -- 1519.
[71] B. W. Silverman, Density Estimation for Statistics and Data Analysis. Chapman & Hall,
London, 1986.
-- 32 --
[72] V. Laparra, J. Gutiérrez, G. Camps-Valls, and J. Malo, Image denoising with kernels based
on natural image relations, J. Mach. Learn. Res. 11 (2010) 873 -- 903.
[73] B. Olshausen and D. Field, Emergence of simple-cell receptive field properties by learning a
sparse code for natural images, Nature 281 (1996) 607 -- 609.
[74] H. Barlow, Vision: Coding and Efficiency, ch. A theory about the functional role and
synaptic mechanism of visual aftereffects. Cambridge Univ. Press, Cambridge, UK, 1990.
[75] V. Laparra, J. Muñoz-Marí, and J. Malo, Divisive normalization image quality metric
revisited, JOSA A 27 (2010), no. 4 852 -- 864.
[76] A. Berardino, J. Balle, V. Laparra, and E. Simoncelli, Eigen-distortion of hierarchical
representations, Adv. Neur. Inf. Proc. NIPS-17 (2017).
[77] J. E. Johnson, E. Diaz, V. Laparra, M. Mahecha, D. Miralles, and G. Camps-Valls,
Estimating information in Earth data cubes, Geophysical Research Abstracts Vol. 20 (2018)
12702.
[78] V. Laparra and R. Santos-Rodríguez, Spatial/spectral information trade-off in hyperspectral
images, in 2015 IEEE Int. Geosci. Rem. Sens. Symp. (IGARSS), pp. 1124 -- 1127, July, 2015.
[79] A. Painsky and N. Tishby, Gaussian lower bound for the information bottleneck limit,
Journal of Machine Learning Research 18 (2018), no. 213 1 -- 29.
-- 33 --
|
1710.02563 | 2 | 1710 | 2018-11-02T17:53:21 | Expectation-induced modulation of metastable activity underlies faster coding of sensory stimuli | [
"q-bio.NC"
] | Sensory stimuli can be recognized more rapidly when they are expected. This phenomenon depends on expectation affecting the cortical processing of sensory information. However, virtually nothing is known on the mechanisms responsible for the effects of expectation on sensory networks. Here, we report a novel computational mechanism underlying the expectation-dependent acceleration of coding observed in the gustatory cortex (GC) of alert rats. We use a recurrent spiking network model with a clustered architecture capturing essential features of cortical activity, including the metastable activity observed in GC before and after gustatory stimulation. Relying both on network theory and computer simulations, we propose that expectation exerts its function by modulating the intrinsically generated dynamics preceding taste delivery. Our model, whose predictions are confirmed in the experimental data, demonstrates how the modulation of intrinsic metastable activity can shape sensory coding and mediate cognitive processes such as the expectation of relevant events. Altogether, these results provide a biologically plausible theory of expectation and ascribe a new functional role to intrinsically generated, metastable activity. | q-bio.NC | q-bio | Expectation-induced modulation of metastable activity underlies
faster coding of sensory stimuli
L. Mazzucato1,2, G. La Camera1,3,*, A. Fontanini1,3,*
1 Department of Neurobiology and Behavior, State University of New York at Stony Brook,
Stony Brook, NY 11794
2 Departments of Biology and Mathematics and Institute of Neuroscience, University of Oregon,
Eugene, OR 97403
3 Graduate Program in Neuroscience, State University of New York at Stony Brook, Stony
Brook, NY 11794
* Co-senior authors
Running Title: Metastable activity mediates expectation
Contact:
Alfredo Fontaninia and Giancarlo La Camerab
a Department of Neurobiology & Behavior, Life Sciences Building 516
State University of New York at Stony Brook, Stony Brook, NY 11794
[email protected]
b Department of Neurobiology & Behavior, Life Sciences Building 513
State University of New York at Stony Brook, Stony Brook, NY 11794
[email protected]
Abstract
Sensory stimuli can be recognized more rapidly when they are expected. This
phenomenon depends on expectation affecting the cortical processing of sensory
information. However, virtually nothing is known on the mechanisms responsible for
the effects of expectation on sensory networks. Here, we report a novel computational
mechanism underlying the expectation-dependent acceleration of coding observed in
the gustatory cortex (GC) of alert rats. We use a recurrent spiking network model with a
clustered architecture capturing essential features of cortical activity, including the
metastable activity observed in GC before and after gustatory stimulation. Relying both
on network theory and computer simulations, we propose that expectation exerts its
function by modulating the intrinsically generated dynamics preceding taste delivery.
Our model, whose predictions are confirmed in the experimental data, demonstrates
how the modulation of intrinsic metastable activity can shape sensory coding and
mediate cognitive processes such as the expectation of relevant events. Altogether, these
results provide a biologically plausible theory of expectation and ascribe a new
functional role to intrinsically generated, metastable activity.
Introduction
Expectation exerts a strong influence on sensory processing. It improves stimulus
detection, enhances discrimination between multiple stimuli and biases perception
towards an anticipated stimulus1-3. These effects, demonstrated experimentally for
various sensory modalities and in different species2,4-7, can be attributed to changes in
sensory processing occurring in primary sensory cortices. However, despite decades of
investigations, little is known regarding how expectation shapes the cortical processing
of sensory information.
While different forms of expectation likely rely on a variety of neural mechanisms,
modulation of pre-stimulus activity is believed to be a common underlying feature8-10.
Here, we investigate the link between pre-stimulus activity and the phenomenon of
general expectation in a recent set of experiments performed in gustatory cortex (GC) of
alert rats6. In those experiments, rats were trained to expect the intraoral delivery of one
of four possible tastants following an anticipatory cue. The use of a single cue allowed
the animal to predict the availability of gustatory stimuli, without forming expectations
on which specific taste was being delivered. Cues predicting the general availability of
taste modulated the firing rates of GC neurons. Tastants delivered after the cue were
encoded more
improvement was
phenomenologically attributed to the activity evoked by the preparatory cue. However,
tastants, and
this
rapidly
than uncued
2
the precise computational mechanism linking faster coding of taste and cue responses
remains unknown.
Here we propose a mechanism whereby an anticipatory cue modulates the timescale of
temporal dynamics in a recurrent population model of spiking neurons. In the model
proposed here, neurons are organized in strongly connected clusters and produce
sequences of metastable states similar to those observed during both pre-stimulus and
evoked activity periods11-17. A metastable state is a vector of firing rates across
simultaneously recorded neurons that can last for several hundred milliseconds before
giving way to the next state in a sequence. The ubiquitous presence of state sequences
in many cortical areas and behavioral contexts18-24 has raised the issue of their role in
sensory and cognitive processing. Here, we elucidate the central role played by pre-
stimulus metastable states in processing forthcoming stimuli, and show how cue-
induced modulations of state sequences drive anticipatory coding. Specifically, we
show that an anticipatory cue affects sensory coding by decreasing the duration of
metastable states and accelerating the pace of state sequences. This phenomenon, which
results from a reduction in the effective energy barriers separating the metastable states,
accelerates the onset of specific states coding for the presented stimulus, thus mediating
the effects of general expectation. The predictions of our model were confirmed in a
new analysis of the experimental data, also reported here.
Altogether, our results provide a model for general expectation, based on the
modulation of pre-stimulus ongoing cortical dynamics by anticipatory cues, leading to
acceleration of sensory coding.
Results
Anticipatory cue accelerates stimulus coding in a clustered population of neurons
To uncover the computational mechanism linking cue-evoked activity with coding
speed, we modeled the gustatory cortex (GC) as a population of recurrently connected
excitatory and inhibitory spiking neurons. In this model, excitatory neurons are
arranged in clusters12,25,26 (Fig. 1a), reflecting the existence of assemblies of functionally
correlated neurons in GC and other cortical areas27,28. Recurrent synaptic weights
between neurons in the same cluster are potentiated compared to neurons in different
clusters, to account for metastability in GC11,16 and in keeping with evidence from
electrophysiological and imaging experiments27,28 29,30. This spiking network also has
bidirectional random and homogeneous (i.e., non-clustered) connections among
inhibitory neurons and between inhibitory and excitatory neurons. Such connections
stabilize network activity by preventing runaway excitation and play a role in inducing
the observed metastability11,12,15.
3
The model was probed by sensory inputs modeled as depolarizing currents injected
into randomly selected neurons. We used four sets of simulated stimuli, wired to
produce gustatory responses reminiscent of those observed in the experiments in the
presence of sucrose, sodium chloride, citric acid, and quinine (see Supplementary
Methods for details). The specific connectivity pattern used was inferred by the
presence of both broadly and narrowly tuned responses in GC31,32, and the temporal
dynamics of the inputs were varied to determine the robustness of the model
(Supplementary Results, Sec. 1.3).
In addition to input gustatory stimuli, we included anticipatory inputs designed to
produce cue-responses analogous to those seen experimentally in the case of general
expectation. To simulate general expectation, we connected anticipatory inputs with
random neuronal targets in the network. The peak value of the cue-induced current for
each neuron was sampled from a normal distribution with zero mean and fixed
variance (see Fig. S1-S2 and Supplementary Results for details), thus introducing a
spatial variance in the afferent currents. This choice reflected the large heterogeneity of
cue responses observed in the empirical data, where excited and inhibited neural
responses occurred in similar proportions10 and overlapped partially with taste
responses6,10. Fig 1b shows two representative cue-responsive neurons in the model: one
inhibited by the cue and one excited by the cue (more details and examples are reported
in the Supplementary Results).
Given these conditions, we simulated the experimental paradigm adopted in awake-
behaving rats to demonstrate the effects of general expectation6,10. In the original
experiment, rats were trained to self-administer into an intra-oral cannula one of four
possible tastants following an anticipatory cue. At random trials and time during the
inter-trial interval, tastants were unexpectedly delivered in the absence of a cue. To
match this experiment, the simulated paradigm interleaves two conditions: in expected
trials, a stimulus (out of 4) is delivered at t=0 after an anticipatory cue (the same for all
stimuli) delivered at t=-0.5s (Fig. 1b); in unexpected trials the same stimuli are presented
in the absence of the cue. Importantly, in the general expectation paradigm adopted
here, the anticipatory cue is identical for all stimuli in the expected condition. Therefore,
it does not convey any information regarding the identity of the stimulus being
delivered.
We tested whether cue presentation affected stimulus coding. A multi-class classifier
(see Methods and Fig. S3) was used to assess the information about the stimuli encoded
in the neural activity, where the four class labels correspond to the four tastants.
Stimulus identity was encoded well in both conditions, reaching perfect average
accuracy across the four tastants after a few hundred milliseconds (Fig. 1c, across-taste
average decoding accuracy). However, comparing the time course of the decoding
accuracy between conditions, we found that the increase in decoding accuracy was
4
significantly faster in expected than in unexpected trials (Fig. 1c, pink and blue curves
represent expected and unexpected conditions, respectively). Indeed, the onset time of a
significant decoding occurred earlier in the expected vs. the unexpected condition
(decoding latency was 0.13±0.01 s [mean±s.e.m.] for expected compared to 0.21±
0.02 s for unexpected, across 20 independent sessions; p=0.002, signed-rank=14,
d.o.f.=39; inset in Fig. 1c). Similar decoding accuracies were obtained for each individual
tastant separately (see Supplementary Results and Fig. S3). Thus, in the model network,
the interaction of cue response and activity evoked by the stimuli results in faster
encoding of the stimuli themselves, mediating the expectation effect.
To clarify the role of neural clusters in mediating expectation, we simulated the same
experiments in a homogeneous network (i.e., without clusters) operating in the
balanced asynchronous regime25,26 (Fig. 1d, intra- and inter-cluster weights were set
equal, all other network parameters and inputs were the same as for the clustered
network). Even though single neurons' responses to the anticipatory cue were
comparable to the ones observed in the clustered network (Fig. 1e, Fig. S2 and
Supplementary Results), stimulus encoding was not affected by cue presentation (Fig.
1f). In particular, the onset of a significant decoding was similar in the two conditions
(latency of significant decoding was 0.17±0.01 s for expected and 0.16±0.01 s for
unexpected tastes averaged across 20 sessions; p=0.31, signed-rank=131, d.o.f.=39; inset
in Fig. 1f).
The anticipatory activity observed in the clustered network was robust to variations in
key parameters related to the sensory and anticipatory inputs, as well as network
connectivity, size and architecture (Fig. S4-6 and Supplementary Results). Furthermore,
acceleration of coding depended on the patterns of connectivity of anticipatory inputs,
specifically on the fact that it increased the spatial variance in the cue afferent currents
(Fig. S6). In a model where the cue recruited the recurrent inhibition (by increasing the
input currents to the inhibitory population), stimulus coding was decelerated (Fig. S7),
suggesting a potential mechanism mediating the effect of distractors.
Overall, these results demonstrate that a clustered network of spiking neurons can
successfully reproduce the acceleration of sensory coding induced by expectation and
that removing clustering impairs this function.
Anticipatory cue speeds up the network's dynamics
Having established that a clustered architecture mediates the effects of expectation on
coding, we investigated the underlying mechanism.
Clustered networks spontaneously generate highly structured activity characterized by
coordinated patterns of ensemble firing. This activity results from the network hopping
5
between metastable states
in which different combinations of clusters are
simultaneously activated11,14,15. To understand how anticipatory inputs affected network
dynamics, we analyzed the effects of cue presentation for a prolonged period of 5
seconds in the absence of stimuli. Activating anticipatory inputs led to changes in
network dynamics, with clusters turning on and off more frequently in the presence of
the cue (Fig. 2a). We quantified this effect by showing that a cue-induced increase in
input spatial variance (𝜎*) led to a shortened cluster activation lifetime (top panel in
Fig. 2b; Kruskal-Wallis one-way ANOVA: p<10-17, 𝜒*(5)=91.2), and a shorter cluster
𝜒*(5)=98.6).
inter-activation interval (i.e., quiescent intervals between consecutive activations of the
same cluster, bottom panel in Fig. 2b, kruskal-wallis one-way ANOVA: p<10-18,
Previous work has demonstrated that metastable states of co-activated clusters result
from attractor dynamics11,14,15. Hence, the shortening of cluster activations and inter-
activation intervals observed in the model could be due to modifications in the
network's attractor dynamics. To test this hypothesis, we performed a mean field
theory analysis33-36 of a simplified network with only two clusters, therefore producing a
reduced repertoire of configurations. Those include two configurations in which either
cluster is active and the other inactive ('A' and 'B' in Fig. 2c), and a configuration where
both clusters are moderately active ('C'). The dynamics of this network can be analyzed
using a reduced, self-consistent theory of a single excitatory cluster, said to be in focus33
(see Methods for details), based on the effective transfer function relating the input and
output firing rates of the cluster (r and rout, Fig. 2c). The latter are equal in the A, B and C
network configurations described above -- also called 'fixed points' since these are the
points where the transfer function intersects the identity line, 𝑟012=Φ(𝑟56).
Configurations A and B would be stable in an infinitely large network, but they are only
metastable in networks of finite size, due to intrinsically generated variability15.
Transitions between metastable states can be modeled as a diffusion process and
analyzed with Kramers' theory37, according to which the transition rates depend on the
height D of an effective energy barrier separating them15,37. In our theory, the effective
energy barriers (Fig. 2c, bottom row) are obtained as the area of the region between the
identity line and the transfer function (shaded areas in top row of Fig. 2c; see Methods
for details). The effective energy is constructed so that its local minima correspond to
stable fixed points (here, A and B) while local maxima correspond to unstable fixed
points (C). Larger barriers correspond to less frequent transitions between stable
configurations, whereas lower barriers increase the transition rates and therefore
accelerate the network's metastable dynamics.
This picture provides the substrate for understanding the role of the anticipatory cue in
the expectation effect. Basically, the presentation of the cue modulates the shape of the
effective transfer function, which results in the reduction of the effective energy
6
barriers. More specifically, the cue-induced increase in the spatial variance, s2, of the
afferent current flattens the transfer function along the identity line, reducing the area
between the two (shaded regions in Fig. 2c). In turn, this reduces the effective energy
barrier separating the two configurations (Fig. 2c, bottom row), resulting in faster
dynamics. The larger the cue-induced spatial variance s2 in the afferent currents, the
faster the dynamics (Fig. 2d; lighter shades represent larger ss).
In summary, this analysis shows that the anticipatory cue increases the spontaneous
transition rates between the network's metastable configurations by reducing the
effective energy barrier necessary to hop among configurations. In the following we
uncover an important consequence of this phenomenon for sensory processing.
Anticipatory cue induces faster onset of taste-coding states
The cue-induced modulation of attractor dynamics led us to formulate a hypothesis for
the mechanism underlying the acceleration of coding: The activation of anticipatory
inputs prior to sensory stimulation may allow the network to enter more easily
configurations encoding stimuli while exiting more easily non-coding configurations.
Fig. 3a shows simulated population rasters in response to the same stimulus presented
in the absence of a cue or after a cue. Spikes in red hue represent activity in taste-
selective clusters and show a faster activation latency in response to the stimulus
preceded by the cue compared to the uncued condition. A systematic analysis revealed
that in the cued condition, the clusters activated by the subsequent stimulus had a
significantly faster activation latency than in the uncued condition (Fig. 3b, 0.22±0.01 s
(mean±s.e.m.) during cued compared to 0.32±0.01 s for uncued stimuli; p<10-5, rank
sum test R(39)=232).
We elucidated this effect using mean field theory. In the simplified two-cluster network
of Fig. 3c (the same network as in Fig. 2d), the configuration where the taste-selective
cluster is active ("coding state") and the nonselective cluster is active ("non-coding
state") have initially the same effective potential energy, in the absence of stimulation
(local minima of the black line in Fig. 3c), separated by an effective energy barrier
whose height is reduced by the anticipatory cue (dashed vs. full line). When the taste
stimulus is presented, it activates the stimulus-selective cluster, so that the coding state
will now sit in a deeper well (lighter lines) compared to non-coding state. Stronger
stimuli (lighter shades in Fig. 3c) increase the difference between the wells' depths
breaking their initial symmetry, so that now a transition from the non-coding to the
coding state is more likely than a transition from the coding to the non-coding state37,
(also in the absence of the cue; full lines). The anticipatory cue reduces further the
existing barrier and thereby increases the transition rate into coding configurations.
This results into faster coding, on average, of the stimuli encoded by those states.
7
We tested this model prediction on the data from Samuelsen et al. (Fig 4)6. To compare
the data to the model simulations, we randomly sampled ensembles of model neurons
so as to match the sizes of the empirical datasets. Since we only have access to a subset
of neurons in the experiments, rather than the full network configuration, we
segmented the ensemble activity in sequences of metastable states via a Hidden Markov
Model (HMM) analysis (see Methods). Previous work has demonstrated that HMM
states, i.e. patterns of coordinated ensemble firing activity, can be treated as proxies of
metastable network configurations11.
taste-coding
configurations for a particular stimulus results in HMM states containing information
about that stimulus (i.e., taste-coding HMM states). If the hypothesis originating from
the model is correct, transitions from non-coding HMM states to taste-coding HMM
states should be faster in the presence of the cue compared to uncued trials. We indeed
found faster transitions to HMM coding states in cued trials for both model and data
(Fig. 4a and 4c, respectively; color-coded horizontal bars overlay coding states). The
latency of coding states was significantly faster during cued compared to uncued trials
in both the model (Fig. 4b, mean latency of the first coding state was 0.32±0.02 s for
expected vs 0.38±0.01 s for unexpected trials; rank sum test R(39)=319, p=0.014) and
the empirical data (Fig. 4d: 0.46±0.02 s for expected vs 0.56±0.03 s for unexpected
In particular, activation of
trials; rank sum test R(37)=385, p=0.026).
Altogether, these results demonstrate that anticipatory inputs speed up sensory coding
by reducing the effective energy barriers from non-coding to coding metastable states
(i.e., the transitions facilitated by the stimulus).
Discussion
Expectations modulate perception and sensory processing. Typically, expected stimuli
are recognized more accurately and rapidly than unexpected ones 1-3. In the gustatory
cortex, acceleration of taste coding has been related to changes in firing activity evoked
by cues predicting the general availability of tastants6. However, the computational
mechanisms linking pre-stimulus activity with changes in the latency of sensory coding
are still unknown. Here we propose a novel mechanism that explains the effects of
expectation through the modulation of the dynamics intrinsically generated by the
cortex. Our results provide a new functional interpretation for the intrinsically
generated activity that is ubiquitously observed in cortical circuits11,18-21,24,38-42.
The proposed mechanism requires a recurrent spiking network where excitatory
neurons are arranged in clusters, which has been demonstrated to capture essential
features of the dynamics of neural activity in sensory circuits11,16. In such a model,
network activity during both spontaneous and stimulus-evoked periods unfolds
through state sequences, each state representing a metastable network attractor. In
8
response to an anticipatory cue, the pace of state sequences speeds up, accelerated by a
higher transition probability among states. The latter is caused by lowering the
potential barrier separating metastable states in the attractor landscape. This anticipates
the offset of states not conveying taste information and the onset of states containing the
most information about the delivered stimulus ('coding states'), causing the faster
decoding observed by Samuelsen et al6 (see Fig. 1c).
Notably, this novel mechanism for anticipation is unrelated to increases in network
excitability which would lead to unidirectional changes in taste-evoked firing rates. It
relies instead on an increase in the spatial variance of the cue afferent currents to the
sensory network brought about by the anticipatory cue. This increase in the input's
variance is observed experimentally after training10, and is therefore the consequence of
having learned the anticipatory meaning of the cue. The acceleration of the dynamics of
state sequences predicted by the model was also confirmed in the data from ensembles
of simultaneously recorded neurons in awake-behaving rats.
These results provide a precise explanatory link between the intrinsic dynamics of
neural activity in a sensory circuit and a specific cognitive process, that of general
expectation6 (see also 43,44).
Clustered connectivity and metastable states
A key feature of our model is the clustered architecture of the excitatory population.
Removing excitatory clusters eliminates the cue-induced anticipatory effect (Fig. 1d-f).
Theoretical work in recurrent networks had previously shown that a clustered
architecture can produce stable patterns of population activity called attractors12. Noise
(either externally14,45 or internally generated11,15) may destabilize those states, driving the
emergence of temporal dynamics based on the progression through metastable states.
Network models with clustered architecture provide a parsimonious explanation for the
state sequences that have been observed ubiquitously in alert mammalian cortex,
during both task engagement17,18,46,47 and inter-trial periods.11,39,40 In addition, this type of
models accounts for various physiological observations such as stimulus-induced
reduction of trial-to-trial variability11,14,15,48, neural dimensionality16, and firing rate
multistability11 (see also49,50). In particular, models with metastable attractors have been
used to explain the state sequences observed in rodent gustatory cortex during taste
processing and decision making11,45,51.
In this work, we propose that clustered networks have the ability to modulate coding
latency, and demonstrate one specific mechanism for modulation that can underlie the
phenomenon of general expectation. Changes in the depth of attractor wells, induced by
a non-stimulus specific anticipatory cue (which in turn may depend on the activation of
top-down and neuromodulatory afferents6,52), can accelerate or slow down network
9
dynamics. The acceleration resulting from shallower wells leads to a reshaping of
ongoing activity and to a quicker recruitment of states coding for sensory information.
To our knowledge, the link between generic anticipatory cues, network metastability,
and coding speed as presented here is novel and represents the main innovation of our
work.
Functional role of heterogeneity in cue responses
As stated in the previous section, the presence of clusters is a necessary ingredient to
obtain a faster latency of coding. Here we discuss the second necessary ingredient, i.e.,
the presence of heterogeneous neural responses to the anticipatory cue (Fig. 1b).
Responses to anticipatory cues have been extensively studied in cortical and subcortical
areas in alert rodents6,10,53,54. Cues evoke heterogeneous patterns of activity, either
exciting or inhibiting single neurons. The proportion of cue responses and their
heterogeneity develops with associative learning,10,54 suggesting a fundamental function
of these patterns. In the generic expectation paradigm considered here, the anticipatory
cue does not convey any information about the identity of the forthcoming tastant,
rather it just signals the availability of a stimulus. Experimental evidence suggests that
the cue may induce a state of arousal, which was previously described as "priming" the
sensory cortex6,55,56. Here, we propose an underlying mechanism in which the cue is
responsible for acceleration of coding by increasing the spatial variance of pre-stimulus
activity. In turn, this modulates the shape of the neuronal current-to-rate transfer
function and
the effective energy barriers between metastable
configurations.
We note that the presence of both excited and inhibited cue responses poses a challenge
to simple models of neuromodulation. The presence of cue-evoked suppression of
firing10 suggests that cues do not improve coding by simply increasing the excitability of
cortical areas. Additional mechanisms and complex patterns of connectivity may be
required to explain the suppression effects induced by the cue. However, here we
provide a parsimonious explanation of how heterogeneous responses can improve
coding without postulating any specific pattern of connectivity other than i) random
projections from thalamic and anticipatory cue afferents and ii) the clustered
organization of the intra-cortical circuitry. Notice that the latter contains wide
distributions of synaptic weights and can be understood as the consequence of Hebb-
like re-organization of the circuitry during training57,58.
It is also worth noting that our model incorporates excited and inhibited cue responses
in such a manner to affect only the spatial variance of the activity across neurons, while
leaving the mean input to the network unaffected. As a result, the anticipatory cue
leaves average firing rates unchanged in the clustered network (Fig. S10), and only
lowers
thus
10
modulates the network temporal dynamics. Our model thus provides a mechanism
whereby increasing the spatial variance of top-down inputs has, paradoxically, a
beneficial effect on sensory coding.
Specificity of the anticipatory mechanism
Our model of anticipation relies on gain reduction in clustered excitatory neurons due
to a larger spatial variance of the afferent currents. This model is robust to variations in
parameters and architecture (Fig. S1, S4-S6). A priori, this effect might be achieved
through different means, such as: increasing the strength of feedforward couplings;
decreasing the strength of recurrent couplings; or modulating background synaptic
inputs59. However, when scoring those models on the criteria of coding anticipation and
heterogeneous cue responses, we found that they failed to simultaneously match both
criteria, although for some range of parameters they could reproduce either one (see
Fig. S8-9 and Supplementary Results for a detailed analysis). Thus, we concluded that
only the main mechanism proposed here (Fig. 1a) captures the plurality of experimental
observations pertaining anticipatory activity in a robust and biologically plausible way.
Cortical timescales, state transitions, and cognitive function
In populations of spiking neurons, a clustered architecture can generate reverberating
activity and sequences of metastable states. Transitions from state to state can be
typically caused by external inputs11,15. For instance, in frontal cortices, sequences of
states are related to specific epochs within a task, with transitions evoked by behavioral
events18,19,22. In sensory cortex, progressions through state sequences can be triggered by
sensory stimuli and reflect the dynamics of sensory processing23,46. Importantly, state
sequences have been observed also in the absence of any external stimulation,
promoted by intrinsic fluctuations in neural activity11,41. However, the potential
functional role, if any, of this type of ongoing activity has remained unexplored.
Recent work has started to uncover the link between ensemble dynamics and sensory
and cognitive processes. State transitions in various cortical areas have been linked to
decision making45,60, choice representation22, rule-switching behavior24, and the level of
task difficulty23. However, no theoretical or mechanistic explanations have been given
for these phenomena.
Here we provide a mechanistic link between state sequences and expectation, by
showing that intrinsically generated sequences can be accelerated, or slowed down,
thus affecting sensory coding. Moreover, we show that the interaction between external
stimuli and intrinsic dynamics does not result in the simple triggering of state
transitions, but rather in the modulation of the intrinsic transition probabilities. The
11
modulation of intrinsic activity can dial the duration of states, producing either shorter
or longer timescales. A shorter timescale leads to faster state sequences and coding
anticipation after stimulus presentation (Fig. 1 and 4). Other external perturbations may
induce different effects: for example, recruiting the network's inhibitory population
slows down the timescale, leading to a slower coding (Fig. S7).
The interplay between intrinsic dynamics and anticipatory influences presented here is
a novel mechanism for generating diverse timescales, and may have rich computational
consequences. We demonstrated its function in increasing coding speed, but its role in
mediating cognition is likely to be broader and calls for further explorations.
Author Contributions
LM, GLC, and AF designed the project, discussed the models and the data analyses,
and wrote the manuscript; LM performed the data analysis, model simulations and
theoretical analyses.
Acknowledgements
This work was supported by a National Institute of Deafness and Other
Communication Disorders Grant K25-DC013557 (LM), by the Swartz Foundation
Award 66438 (LM), by National Institute of Deafness and Other Communication
Disorders Grants NIDCD R01DC012543 and R01DC015234 (AF), and partly by a
National Science Foundation Grant IIS-1161852 (GLC). The authors would like to thank
Drs. S. Fusi, A. Maffei, G. Mongillo, and C. van Vreeswijk for useful discussions.
Competing Financial Interests
The authors declare no competing financial interests.
References
•
Gilbert, C. D. & Sigman, M. Brain states: top-down influences in sensory
1
processing. Neuron 54, 677-696 (2007).
Jaramillo, S. & Zador, A. M. The auditory cortex mediates the perceptual effects
2
of acoustic temporal expectation. Nature neuroscience 14, 246-251, doi:10.1038/nn.2688
(2011).
3
synchrony in top -- down processing. Nature Reviews Neuroscience 2, 704-716 (2001).
4
neurobiology 17, 465-470 (2007).
Nobre, A. C., Correa, A. & Coull, J. T. The hazards of time. Current opinion in
Engel, A. K., Fries, P. & Singer, W. Dynamic predictions: oscillations and
•
•
•
12
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
on
cortical
to discriminate
learning changes cross-modal
Vincis, R. & Fontanini, A. Associative
Samuelsen, C. L., Gardner, M. P. & Fontanini, A. Effects of cue-triggered
410-422,
taste. Neuron
Niwa, M., Johnson, J. S., O'Connor, K. N. & Sutter, M. L. Active engagement
temporal
Mazzucato, L., Fontanini, A. & La Camera, G. Dynamics of Multistable States
J Neurosci 35, 8214-8231,
5
Doherty, J. R., Rao, A., Mesulam, M. M. & Nobre, A. C. Synergistic effect of
combined temporal and spatial expectations on visual attention. Journal of Neuroscience
25, 8259-8266 (2005).
6
expectation
doi:10.1016/j.neuron.2012.02.031 (2012).
7
improves primary auditory cortical neurons' ability
modulation. Journal of Neuroscience 32, 9323-9334 (2012).
8
Yoshida, T. & Katz, D. B. Control of prestimulus activity related to improved
sensory coding within a discrimination task. The Journal of neuroscience : the official journal
of the Society for Neuroscience 31, 4101-4112, doi:10.1523/jneurosci.4380-10.2011 (2011).
9
Gardner, M. P. & Fontanini, A. Encoding and tracking of outcome-specific
expectancy in the gustatory cortex of alert rats. The Journal of neuroscience : the official
journal of the Society for Neuroscience 34, 13000-13017, doi:10.1523/jneurosci.1820-14.2014
(2014).
10
representations in the gustatory cortex. eLife 5, doi:10.7554/eLife.16420 (2016).
11
during Ongoing and Evoked Cortical Activity.
doi:10.1523/JNEUROSCI.4819-14.2015 (2015).
12
Amit, D. J. & Brunel, N. Model of global spontaneous activity and local
structured activity during delay periods in the cerebral cortex. Cerebral cortex (New York,
N.Y. : 1991) 7, 237-252 (1997).
13
Renart, A., Moreno-Bote, R., Wang, X. J. & Parga, N. Mean-driven and
fluctuation-driven persistent activity in recurrent networks. Neural computation 19, 1-46,
doi:10.1162/neco.2007.19.1.1 (2007).
14
variability
doi:10.1371/journal.pcbi.1002395 (2012).
Litwin-Kumar, A. & Doiron, B. Slow dynamics and high variability in balanced
15
cortical networks with clustered connections. Nature neuroscience 15, 1498-1505,
doi:10.1038/nn.3220 (2012).
16
of cortical activity. Front Sys Neurosci 10, 11 (2016).
17
cortex
doi:10.1038/nature10918 (2012).
18
Acad Sci USA 92, 8616-8620 (1995).
I., Abeles, M., Bergman, H. & Vaadia, E.
19
Simultaneously recorded single units in the frontal cortex go through sequences of
Harvey, C. D., Coen, P. & Tank, D. W. Choice-specific sequences in parietal
62-68,
virtual-navigation
Abeles, M. et al. Cortical activity flips among quasi-stationary states. Proc Natl
Mazzucato, L., Fontanini, A. & La Camera, G. Stimuli reduce the dimensionality
Deco, G. & Hugues, E. Neural network mechanisms underlying stimulus driven
e1002395,
computational
reduction.
biology
PLoS
8,
Seidemann, E., Meilijson,
decision
task. Nature
484,
during
a
processing
of
74,
13
Rich, E. L. & Wallis, J. D. Decoding subjective decisions from orbitofrontal cortex.
Renart, A. et al. The asynchronous state in cortical circuits. Science 327, 587-590,
discrete and stable states in monkeys performing a delayed localization task. The Journal
of neuroscience : the official journal of the Society for Neuroscience 16, 752-768 (1996).
20
Arieli, A., Shoham, D., Hildesheim, R. & Grinvald, A. Coherent spatiotemporal
patterns of ongoing activity revealed by real-time optical imaging coupled with single-
unit recording in the cat visual cortex. Journal of neurophysiology 73, 2072-2093 (1995).
21
Arieli, A., Sterkin, A., Grinvald, A. & Aertsen, A. Dynamics of ongoing activity:
explanation of the large variability in evoked cortical responses. Science 273, 1868-1871
(1996).
22
Nature neuroscience 19, 973-980, doi:10.1038/nn.4320 (2016).
23
Ponce-Alvarez, A., Nacher, V., Luna, R., Riehle, A. & Romo, R. Dynamics of
cortical neuronal ensembles transit from decision making to storage for later report. The
Journal of neuroscience : the official journal of the Society for Neuroscience 32, 11956-11969,
doi:10.1523/jneurosci.6176-11.2012 (2012).
24
Durstewitz, D., Vittoz, N. M., Floresco, S. B. & Seamans, J. K. Abrupt transitions
between prefrontal neural ensemble states accompany behavioral transitions during rule
learning. Neuron 66, 438-448, doi:10.1016/j.neuron.2010.03.029 (2010).
25
excitatory and inhibitory activity. Science 274, 1724-1726 (1996).
26
doi:10.1126/science.1179850 (2010).
27
Chen, X., Gabitto, M., Peng, Y., Ryba, N. J. & Zuker, C. S. A gustotopic map of
taste qualities in the mammalian brain. Science (New York, N.Y.) 333, 1262-1266,
doi:10.1126/science.1204076 (2011).
28
Fletcher, M. L., Ogg, M. C., Lu, L., Ogg, R. J. & Boughter, J. D., Jr. Overlapping
Representation of Primary Tastes in a Defined Region of the Gustatory Cortex. The
Journal of neuroscience : the official journal of the Society for Neuroscience 37, 7595-7605,
doi:10.1523/jneurosci.0649-17.2017 (2017).
Kiani, R. et al. Natural Grouping of Neural Responses Reveals Spatially
29
Segregated Clusters in Prearcuate Cortex. Neuron, doi:10.1016/j.neuron.2015.02.014
(2015).
30
Miller, J. E., Ayzenshtat, I., Carrillo-Reid, L. & Yuste, R. Visual stimuli recruit
intrinsically generated cortical ensembles. Proceedings of the National Academy of Sciences
of the United States of America 111, E4053-4061, doi:10.1073/pnas.1406077111 (2014).
31
Katz, D. B., Simon, S. A. & Nicolelis, M. A. Dynamic and multimodal responses
of gustatory cortical neurons in awake rats. The Journal of neuroscience : the official journal
of the Society for Neuroscience 21, 4478-4489 (2001).
32
Jezzini, A., Mazzucato, L., La Camera, G. & Fontanini, A. Processing of hedonic
and chemosensory features of taste in medial prefrontal and insular networks. The
Journal of neuroscience : the official journal of the Society for Neuroscience 33, 18966-18978,
doi:10.1523/JNEUROSCI.2974-13.2013 (2013).
33
population states. Network (Bristol, England) 10, 351-373 (1999).
van Vreeswijk, C. & Sompolinsky, H. Chaos in neuronal networks with balanced
Mascaro, M. & Amit, D. J. Effective neural response function for collective
14
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Hänggi, P., Talkner, P. & Borkovec, M. Reaction-rate theory: fifty years after
Kenet, T., Bibitchkov, D., Tsodyks, M., Grinvald, A. & Arieli, A. Spontaneously
representations of visual attributes. Nature 425, 954-956,
34
premotor cortex. Journal of Neuroscience 33, 11155-11168 (2013).
35
La Camera, G., Giugliano, M., Senn, W. & Fusi, S. The response of cortical
neurons to in vivo-like input current: theory and experiment : I. Noisy inputs with
stationary statistics. Biological cybernetics 99, 279-301, doi:10.1007/s00422-008-0272-7
(2008).
36
Curti, E., Mongillo, G., La Camera, G. & Amit, D. J. Mean field and capacity in
realistic networks of spiking neurons storing sparsely coded random memories. Neural
computation 16, 2597-2637, doi:10.1162/0899766042321805 (2004).
37
Kramers. Reviews of modern physics 62, 251 (1990).
38
emerging cortical
doi:10.1038/nature02078 (2003).
39
Pastalkova, E., Itskov, V., Amarasingham, A. & Buzsaki, G. Internally generated
cell assembly sequences in the rat hippocampus. Science (New York, N.Y.) 321, 1322-1327,
doi:10.1126/science.1159775 (2008).
40
Euston, D. R., Tatsuno, M. & McNaughton, B. L. Fast-forward playback of recent
memory sequences in prefrontal cortex during sleep. Science (New York, N.Y.) 318, 1147-
1150, doi:10.1126/science.1148979 (2007).
41
possible
doi:10.1016/j.neuron.2009.03.014 (2009).
42
Based Probabilistic Representations
doi:10.1016/j.neuron.2016.09.038 (2016).
43
Lee, J. H., Whittington, M. A. & Kopell, N. J. Top-down beta rhythms support
selective attention via interlaminar interaction: a model. PLoS computational biology 9,
e1003164, doi:10.1371/journal.pcbi.1003164 (2013).
44
Puccini, G. D., Sanchez-Vives, M. V. & Compte, A. Integrated mechanisms of
anticipation and rate-of-change computations in cortical circuits. PLoS computational
biology 3, e82, doi:10.1371/journal.pcbi.0030082 (2007).
45
Miller, P. & Katz, D. B. Stochastic transitions between neural states in taste
processing and decision-making. J Neurosci 30, 2559-2570, doi:10.1523/jneurosci.3047-
09.2010 (2010).
46
Jones, L. M., Fontanini, A., Sadacca, B. F., Miller, P. & Katz, D. B. Natural stimuli
evoke dynamic sequences of states in sensory cortical ensembles. Proceedings of the
National Academy of Sciences of the United States of America 104, 18772-18777,
doi:0705546104 [pii]
10.1073/pnas.0705546104 (2007).
47
population coding across cortex. Nature, doi:10.1038/nature23020 (2017).
Orban, G., Berkes, P., Fiser, J. & Lengyel, M. Neural Variability and Sampling-
in the Visual Cortex. Neuron 92, 530-543,
Luczak, A., Bartho, P. & Harris, K. D. Spontaneous events outline the realm of
in neocortical populations. Neuron 62, 413-425,
responses
sensory
Mattia, M. et al. Heterogeneous attractor cell assemblies for motor planning in
Runyan, C. A., Piasini, E., Panzeri, S. & Harvey, C. D. Distinct timescales of
15
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Churchland, M. M. et al. Stimulus onset quenches neural variability: a
Murray, J. M. & Escola, G. S. Learning multiple variable-speed sequences in
Grewe, B. F. et al. Neural ensemble dynamics underlying a long-term associative
48
widespread cortical phenomenon. Nature neuroscience 13, 369-378, doi:nn.2501 [pii]
10.1038/nn.2501 (2010).
49
striatum via cortical tutoring. eLife 6, doi:10.7554/eLife.26084 (2017).
50
Stern, M., Bolding, K., Abbott, L. & Franks, K. A Transformation From Latency
To Ensemble Coding In A Model Of Piriform Cortex. bioRxiv, doi:10.1101/118364 (2017).
Sadacca, B. F. et al. The Behavioral Relevance of Cortical Neural Ensemble
51
Responses Emerges Suddenly. The Journal of neuroscience : the official journal of the Society
for Neuroscience 36, 655-669, doi:10.1523/jneurosci.2265-15.2016 (2016).
52
Linster, C. & Fontanini, A. Functional neuromodulation of chemosensation in
vertebrates. Current opinion in neurobiology 29, 82-87, doi:10.1016/j.conb.2014.05.010
(2014).
Liu, H. & Fontanini, A. State Dependency of Chemosensory Coding in the
53
Gustatory Thalamus (VPMpc) of Alert Rats. The Journal of neuroscience : the official journal
of the Society for Neuroscience 35, 15479-15491, doi:10.1523/jneurosci.0839-15.2015 (2015).
54
memory. Nature 543, 670-675, doi:10.1038/nature21682 (2017).
55
47, doi:10.1186/1471-2202-5-47 (2004).
Chow, S. S., Romo, R. & Brody, C. D. Context-dependent modulation of
56
functional connectivity: secondary somatosensory cortex
to prefrontal cortex
connections in two-stimulus-interval discrimination tasks. The Journal of neuroscience : the
official journal of the Society for Neuroscience 29, 7238-7245, doi:10.1523/jneurosci.4856-
08.2009 (2009).
57
Zenke, F., Agnes, E. J. & Gerstner, W. Diverse synaptic plasticity mechanisms
orchestrated to form and retrieve memories in spiking neural networks. Nat Commun 6,
6922, doi:10.1038/ncomms7922 (2015).
58
assemblies
doi:10.1038/ncomms6319 (2014).
59
synaptic input. Neuron 35, 773-782 (2002).
60
Science 354, 1140-1144 (2016).
Litwin-Kumar, A. & Doiron, B. Formation and maintenance of neuronal
5319,
Salinas, E. Context-dependent selection of visuomotor maps. BMC neuroscience 5,
Engel, T. A. et al. Selective modulation of cortical state during spatial attention.
through
synaptic
plasticity. Nature
communications
5,
Chance, F. S., Abbott, L. F. & Reyes, A. D. Gain modulation from background
16
Figures
Fig. 1
Fig. 1: Anticipatory activity requires a clustered network architecture. Effects of
anticipatory cue on stimulus coding in the clustered (a-c) and homogeneous (d-f)
network. a: Schematics of the clustered network architecture and stimulation paradigm.
A recurrent network of inhibitory (red circles) and excitatory neurons (triangles)
arranged in clusters (ellipsoids) with stronger intra-cluster recurrent connectivity. The
network receives bottom-up sensory stimuli targeting random, overlapping subsets of
clusters (selectivity to 4 stimuli is color-coded), and one top-down anticipatory cue
inducing a spatial variance in the cue afferent currents to excitatory neurons. b:
Representative single neuron responses to cue and one stimulus in expected trials in the
clustered network of a). Black tick marks represent spike times (rasters), with PSTH
(mean±s.e.m.) overlaid in pink. Activity marked by horizontal bars was significantly
areas represent mean±s.e.m. across four tastes in 20 simulated sessions; color-dotted
different from baseline (pre-cue activity) and could either be excited (top panel) or
inhibited (bottom) by the cue. c: Time course of cross-validated stimulus-decoding
accuracy in the clustered network. Decoding accuracy increases faster during expected
(pink) than unexpected (blue) trials in clustered networks (curves and color-shaded
17
lines around gray shaded areas represent 95% C.I. from shuffled datasets). A separate
classifier was used for each time bin, and decoding accuracy was assessed via a cross-
validation procedure, yielding a confusion matrix whose diagonal represents the
accuracy of classification for each of four tastes in that time bin (see text and Fig. S3 for
details). Inset: aggregate analysis across simulated sessions of the onset times of
significant decoding in expected (pink) vs. unexpected trials (blue). d: Schematics of the
homogenous network architecture. Sensory stimuli modeled as in a). e: Representative
single neuron responses to cue and one stimulus in expected trials in the homogeneous
network of d), same conventions as in b). f: Cross-validated decoding accuracy in the
homogeneous network (same analysis as in c). The latency of significant decoding in
expected vs. unexpected trials is not significantly different. Inset: aggregate analysis of
onset times of significant decoding (same as inset of c). Panels b, c, e, f: pink and black
horizontal bars, p < 0.05, t-test with multiple-bin Bonferroni correction. Panel c: ** = p <
0.01, t-test. Panel f: n.s.: non-significant.
18
Fig. 2
Fig. 2: Anticipatory cue speeds up network dynamics. a: Raster plots of the clustered
network activity in the absence (left) and in the presence of the anticipatory cue (right),
with no stimulus presentation in either case. The dynamics of cluster activation and
deactivation accelerated proportionally to the increase in afferent currents' variance s2
induced by the cue. Top panels: distribution of cue peak values across excitatory
neurons: left, no cue; right, distribution with S.D. 𝜎=10% in units of baseline current.
decrease when increasing 𝜎. c: Schematics of the effect of the anticipatory cue on
19
Bottom panels: raster plots of representative trials in each condition (black: excitatory
neurons, arranged according to cluster membership; red: inhibitory neurons). b: The
average cluster activation lifetime (left) and inter-activation interval (right) significantly
network dynamics. Top row: the increase in the spatial variance of cue afferent currents
(insets: left: no cue; stronger cues towards the right) flattens the "effective f-I curve"
(sigmoidal curve) around the diagonal representing the identity line (straight line). The
case for a simplified two-cluster network is depicted (see text). States A and B
correspond to stable configurations with only one cluster active; state C corresponds to
an unstable configuration with 2 clusters active. Bottom row: shape of the effective
potential energy corresponding to the f-I curves shown in the top row. The effective
potential energy is defined as the area between the identity line and the effective f-I
curve (shaded areas in top row; see formula). The f-I curve flattening due to the
anticipatory cue shrinks the height D of the effective energy barrier, making cluster
transitions more likely and hence more frequent. d: Effect of the anticipatory cue (in
units of the baseline current) on the height of the effective energy barrier D, calculated
via mean field theory in a reduced two-cluster network of LIF neurons (see Methods).
20
Fig. 3
Fig. 3: Anticipatory cue induces faster onset of stimulus-coding states. a: Raster plots
of representative trials in the expected (left) and unexpected (right) conditions in
response to the same stimulus at t=0. Stimulus-selective clusters (red tick marks, spikes)
activate earlier than non-selective clusters (black tick marks, spikes) in response to the
stimulus when the cue precedes the stimulus. b: Comparison of activation latency of
selective clusters after stimulus presentation during expected (pink) and unexpected
(blue) trials (mean±s.e.m. across 20 simulated sessions). Latency in expected trials is
significantly reduced. c: The effective energy landscape and the modulation induced by
stimulus and anticipatory cue on two-clustered networks, computed via mean field
theory (see Methods). Left panel: after stimulus presentation the stimulus-coding state
(left well in left panel) is more likely to occur than the non-coding state (right well).
Right panel: barrier heights as a function of stimulus strength in expected (`cue ON') and
unexpected trials (`cue OFF'). Stronger stimuli (lighter shades of cyan) decrease the
barrier height D separating the non-coding and the coding state. In expected trials
21
trials (for stimulus ≥4% the barrier vanishes leaving just the coding state). Panel b: ***
(dashed lines), the barrier D is smaller than in unexpected ones (full lines), leading to a
faster transition probability from non-coding to coding states compared to unexpected
= p < 0.001, t-test.
22
Fig. 4
Fig. 4: Anticipation of coding states: model vs. data. a: Representative trials from one
ensemble of 9 simultaneously recorded neurons from clustered network simulations
during expected (left) and unexpected (right) conditions. Top panels: spike rasters with
latent states extracted via a HMM analysis (colored curves represent time course of state
probabilities; colored areas indicate intervals where the probability of a state exceeds
80%; thick horizontal bars atop the rasters mark the presence of a stimulus-coding
state). Bottom panels: Firing rate vectors for each latent state shown in the corresponding
top panel. b: Latency of stimulus-coding states in expected (pink) vs. unexpected (blue)
trials (mean±s.e.m. across 20 simulated datasets). Faster coding latency during expected
trials is observed compared to unexpected trials. c-d: Same as a)-b) for the empirical
datasets. * = p < 0.05, ***= p < 0.001, t-test.
23
Methods
Experimental dataset. The experimental data come from a previously published dataset
Ref.1 (for details, see Supplementary Methods). Experimental procedures were
approved by the Institutional Animal Care and Use Committee of Stony Brook
University and complied with university, state, and federal regulations on the care and
use of laboratory animals.
Ensemble states detection. A Hidden Markov Model (HMM) analysis was used to detect
ensemble states in both the empirical data and model simulations. Here, we give a brief
description of the method used and we refer the reader to Refs. 2-5 for more detailed
information.
The HMM assumes that an ensemble of N simultaneously recorded neurons is in one of
M hidden states at each given time bin. States are firing rate vectors 𝑟5(𝑚), where 𝑖=
1,...,𝑁 is the neuron index and 𝑚=1,...,𝑀 identifies the state. In each state, neurons
were assumed to discharge as stationary Poisson processes (Poisson-HMM) conditional
on the state's firing rates. Trials were segmented in 2 ms bins, and the value of either 1
(spike) or 0 (no spike) was assigned to each bin for each given neuron (Bernoulli
approximation for short time bins); if more than one neuron fired in a given bin (a rare
event), a single spike was randomly assigned to one of the firing neurons. A single
HMM was used to fit all trials in each recording session, resulting in the emission
probabilities 𝑟5(𝑚) and in a set of transition probabilities between the states. Emission
and transition probabilities were calculated with the Baum-Welch algorithm6 with a
fixed number of hidden states M, yielding a maximum likelihood estimate of the
parameters given the observed spike trains. Since the model log-likelihood LL increases
with M, we repeated the HMM fits for increasing values of M until we hit a minimum
of the Bayesian Information Criterion (BIC, see below and Ref.6). For each M, the LL
used in the BIC was the sum over 10 independent HMM fits with random initial
guesses for emission and transition probabilities. This step was needed since the Baum-
Welch algorithm only guarantees reaching a local rather than global maximum of the
likelihood. The model with the lowest BIC (having M* states) was selected as the
winning model, where 𝐵𝐼𝐶=−2𝐿𝐿+[𝑀(𝑀−1)+𝑀𝑁]∙ln 𝑇, T being the number of
observations in each session (= number of trials × number of bins per trials). Finally, the
winning HMM model was used to "decode" the states from the data according to their
posterior probability given the data. During decoding, only those states with
probability exceeding 80% in at least 25 consecutive 2ms-bins were retained (henceforth
denoted simply as "states")3,5. This procedure eliminates states that appear only very
transiently and with low probability, also reducing the chance of overfitting. A median
of 6 states per ensemble was found, varying from 3 to 9 across ensembles.
24
Coding states. In each condition (i.e., expected vs. unexpected), the frequencies of
occurrence of a given state across taste stimuli were compared with a test of proportions
(chi-square, p<0.001 with Bonferroni correction to account for multiple states). When a
significant difference was found across stimuli, a post-hoc Marascuilo test was
performed7. A state whose frequency of occurrence was significantly higher in the
presence of one taste stimulus compared to all other tastes was deemed a 'coding state'
for that stimulus (Fig. 4).
Spiking network model. We modeled the local neural circuit as a recurrent network of N
Networks of different architectures were considered: i) networks with segregated
clusters (referred to as "clustered network," parameters as in Tables 1 and 2); ii)
networks with overlapping clusters (see Suppl. Table S2 and Suppl. Methods for
details), iii) homogeneous networks (parameters as in Table 1). In the clustered network,
leaky-integrate-and-fire (LIF) neurons, with a fraction 𝑛O=80% of excitatory (E) and
𝑛P=20% of inhibitory (I) neurons.8 Connectivity was random with probability 𝑝OO=
0.2 for E to E connections and 𝑝OP=𝑝PO=𝑝PP=0.5 otherwise. Synaptic weights 𝐽5S from
pre-synaptic neuron 𝑗∈𝐸,𝐼 to post-synaptic neuron 𝑖∈𝐸,𝐼 scaled as 𝐽5S=𝑗5S/ 𝑁, with
𝑗5S drawn from normal distributions with mean 𝑗XY (for 𝛼,𝛽=𝐸,𝐼) and 1% SD.
E neurons were arranged in Q clusters with 𝑁\=100 neurons per clusters on average
(1% SD), the remaining fraction 𝑛]^ of E neurons belonging to an unstructured
cluster had intra-cluster synaptic weights potentiated by a factor 𝐽_; synaptic weights
between neurons belonging to different clusters were depressed by a factor 𝐽'=1−
𝛾𝑓(𝐽_−1) <1 with 𝛾=0.5; 𝑓=(1−𝑛]^)/𝑄 is the average number of neurons in each
cluster.8 When changing the network size N, all synaptic weights 𝐽5S were scaled by 𝑁,
the intra-cluster potentiation values were 𝐽_=5, 10, 20, 30, 40 for 𝑁=1,2,4,6,8 ×10e
parameters were kept fixed. In the homogeneous network, there were no clusters (𝐽_=
𝐽'=1).
"background" population. In the clustered network, neurons belonging to the same
neurons, respectively, and cluster size remained unchanged (see also Table 1); all other
𝑑𝑑𝑡𝑉=−𝑉𝜏j +𝐼kl\+𝐼lm2 ,
Model neuron dynamics. Below threshold the LIF neuron membrane potential evolved in
time as
where 𝜏j is the membrane time constant and the input currents I are a sum of a
recurrent contribution 𝐼kl\ coming from the other network neurons and an external
current 𝐼lm2= 𝐼n+𝐼o25j+𝐼\1l (units of Volt/s). Here, 𝐼n is a constant term representing
25
𝐽5S
sStu
𝛿(𝑡−𝑡wS)
,
w
𝜏or6𝑑𝑑𝑡𝐼kl\=−𝐼kl\+
th neuron was a low-pass filter of the incoming spike trains
input from other brain areas; 𝐼o25j and 𝐼\1l represent the incoming stimuli and cue,
respectively (see Stimulation protocols below). When 𝑉 hits threshold 𝑉2pk , a spike is
emitted and 𝑉 is then clamped to the rest value 𝑉klol2 for a refractory period 𝜏klq .
Thresholds were chosen so that the homogeneous network neurons fired at rates 𝑟O=5
spks/s and 𝑟P=7 spks/s. The recurrent contribution to the postsynaptic current to the i-
where 𝜏or6 is the synaptic time constant; 𝐽5S is the recurrent synaptic weights from
presynaptic neuron j to postsynaptic neuron i, and 𝑡wS is the k-th spike time from the j-th
presynaptic neuron. The constant external current was 𝐼n=𝑁lm2𝑝5n𝐽5n𝜈lm2, with 𝑁lm2=
𝑛O𝑁, 𝑝5n=0.2, 𝐽5n=𝑗5n/ 𝑁 with 𝑗On for excitatory and 𝑗Pn for inhibitory neurons (see
Table 1), and 𝑟lm2=7 spks/s. For a detailed mean field theory analysis of the clustered
targeting 50% of neurons in stimulus-selective clusters 𝐼o25j(𝑡)=𝐼n∙𝑟o25j(𝑡), where
𝑟o25j(𝑡) was expressed as a fraction of the baseline external current 𝐼n. Each cluster had a
(expressed as fraction of the baseline current 𝐼n; s=20% unless otherwise specified). The
In both the unexpected and the unexpected conditions, stimulus onset at 𝑡=0 was
followed by a linear increase 𝑟o25j(𝑡) in the stimulus afferent current to stimulus-
selective neurons reaching a value 𝑟jym at 𝑡=1 s (𝑟jym=20% , unless otherwise
𝑟\1l(𝑡) with onset at 𝑡=−0.5s before stimulus presentation.
50% probability of being selective to a given stimulus, thus different stimuli targeted
overlapping sets of clusters. The anticipatory cue, targeting a random 50% subset of E
neurons, was modeled as a double exponential with rise and decay times of 0.2 s and 1
s, respectively, unless otherwise specified; its peak value for each selective neuron was
sampled from a normal distribution with zero mean and standard deviation s
network and a comparison between simulations and mean field theory during ongoing
and stimulus-evoked periods we refer the reader to the Suppl. Methods and Refs.5,9.
Stimulation protocols. Stimuli were modeled as time-varying stimulus afferent currents
cue did not change the mean afferent current but only its spatial (quenched) variance
across neurons.
specified). In the expected condition, stimuli were preceded by the anticipatory cue
Network simulations. All data analyses, model simulations and mean field theory
calculations were performed using custom software written in MATLAB (MathWorks),
and C. Simulations comprised 20 realizations of each network (each one representing a
different experimental session), with 20 trials per stimulus in each of the 2 conditions
26
equations8
'u,
the population and the condition. In the absence of the anticipatory cue, the LIF current-
(1)
is the population firing rate vector (boldface represents
𝑟X=𝐹X𝜇X(𝒓),𝜎X*(𝒓) ,
(unexpected and expected); or 40 trials per session in the condition with "cue-on" and
no stimuli (Fig. 2). Dynamical equations for the LIF neurons were integrated with the
Euler method with 0.1 ms step.
Mean field theory. Mean field theory was used in a simplified network with 2 excitatory
clusters (parameters as in Table 2) using the population density approach10-12: the input
to each neuron was completely characterized by the infinitesimal mean 𝜇X and variance
𝜎X* of the post-synaptic current (see Sec. 2.3 of Supplementary Methods for their
expressions). The network fixed points satisfied the 𝑄+2 self-consistent mean field
where 𝒓= 𝑟u,…,𝑟~,𝑟O]^,𝑟P
vectors). 𝐹X is the current-to-rate function for population 𝛼, which varied depending on
to-rate function 𝐹Xn was used
𝐹Xn𝜇X,𝜎X = 𝜏klq+𝜏j,X 𝜋
𝑒1(cid:129) 1+erf𝑢
(cid:134)(cid:135)(cid:136)(cid:136),(cid:137)
(cid:138)(cid:135)(cid:136)(cid:136),(cid:137)
+𝑎𝑘X , 𝐻lqq,X=(cid:140)(cid:143)(cid:135)(cid:149)(cid:135)(cid:141),(cid:137)'(cid:144)(cid:137)
where 𝛩lqq,X=(cid:140)(cid:141)(cid:142)(cid:143),(cid:137)'(cid:144)(cid:137)
+𝑎𝑘X . Here, 𝑘X= 𝜏or6,X 𝜏j,X , 𝑎=
(cid:150)u ** ~1.03.13,14 In the presence of the anticipatory cue, a modified current-to-rate
(cid:145)(cid:137)
(cid:145)(cid:137)
function 𝐹X\1l was used to capture the cue-induced Gaussian noise in the cue afferent
currents to the cue-selective populations (𝛼=1,…,𝑄):
𝐹X\1l𝜇X,𝜎X = 𝐷𝑧 𝐹Xn𝜇X+ 𝑧 𝜎 𝜇lm2,𝜎X,
where 𝐷𝑧=𝑑𝑧 exp (−(cid:156)(cid:129)*)/ 2𝜋 is the Gaussian measure with zero mean and unit
variance, 𝜇lm2=𝐼n is the baseline afferent current and 𝜎 is the anticipatory cue's SD as
fraction of 𝜇lm2 (Fig. 3d; in Fig. 3c, for illustration purposes we used 𝐹On=0.5(1+tanh).
Fixed points 𝒓∗ of equation (1) were found with Newton's method; the fixed points
evaluated at 𝒓∗ was negative definite. Stability was defined with respect to an
approximate linearized dynamics of the mean 𝑚X and SD 𝑠X of the input currents15
−¥ƒ(cid:137)(cid:144)(cid:137)(𝒓),(cid:145)(cid:137)(cid:129)(𝒓)
¥(cid:145)(cid:137)(cid:129)
27
𝑆XY= u¢(cid:149)£⁄,(cid:137) ¥ƒ(cid:137)(cid:144)(cid:137)(𝒓),(cid:145)(cid:137)(cid:129)(𝒓)
¥k§
were stable (attractors) when the stability matrix
¥(cid:145)(cid:137)(cid:129)¥k§−𝛿XY ,
(2)
𝜏or6,X'j(cid:137)'2 =− 𝑚X+𝜇X(𝒓) ,
'o(cid:137)(cid:129)'2=− 𝑠X*+𝜎X*(𝒓) ,
¢(cid:149)£⁄,(cid:137)*
𝑟X𝑡 =𝐹X𝑚X(𝒓),𝑠X*(𝒓) ,
where 𝜇X and 𝜎X* are the stationary values given in the Suppl. Methods.
(3)
out-of-focus populations
𝑟Y𝑟u,…,𝑟" =𝐹Y[𝜇Y(𝑟u,…,𝑟",𝑟"_u,…,𝑟«),𝜎Y*(𝑟u,…,𝑟",𝑟"_u,…,𝑟«)] ,
Effective mean field theory for the reduced network. The mean field equations (1) for the
P=Q+2 populations may be reduced to a set of effective equations governing the
dynamics of a smaller subset of q<P of populations, henceforth referred to as
populations in focus16. The reduction is achieved by integrating out the remaining P-q
out-of-focus populations. This procedure was used to estimate the energy barrier
separating the two network attractors in Fig. 2d and Fig. 3c. Given a fixed set of values
𝒓=[𝑟u,…,𝑟"] for the in-focus populations, one solves the mean field equations for P-q
for 𝛽=𝑞+1,…,𝑃 to obtain the stable fixed point 𝒓fi𝒓 ≐[𝑟"_u𝒓,…,𝑟«𝒓] of the out-
of-focus populations as functions of the in-focus firing rates 𝒓. Stability of the solution
𝒓fi𝒓 is computed with respect to the stability matrix (2) of the reduced system of P-q
out-of-focus populations. Substituting the values 𝒓fi𝒓 into the fixed-point equations for
the q populations in focus yields a new set of equations relating input rates 𝒓 to
"output" rates 𝒓012:
for 𝛼=1,…,𝑞. The input 𝒓 and output 𝒓012 firing rates of the in-focus populations will
for 𝛼=1,…,𝑞 in-focus populations at the point 𝒓. The fixed points 𝑟X012𝒓∗ =𝑟X∗ of the
the out-of-focus populations attain multiple attractors for a given value of 𝒓, in which
case the set of effective transfer functions 𝐹Xlqq is labeled by the chosen attractor; in our
of 𝒓.
𝑟X012𝒓 =𝐹X[𝜇X(𝒓,𝒓fi𝒓),𝜎X*(𝒓,𝒓fi𝒓)] ,
𝑟X012𝒓 =𝐹Xlqq𝜇X𝒓,𝜎X*𝒓 ,
be different, except at a fixed point of the full system where they coincide. The
correspondence between input and output rates of in-focus populations defines the
effective current-to-rate transfer functions
analysis of the two-clustered network, only one attractor was present for a given value
in-focus equations (4) are fixed points of the entire system. It may occur, in general, that
28
(4)
so that the dynamics can be understood as a motion in an effective potential energy
𝛥=
†
‡
(𝑟−𝑟012𝑟)𝑑𝑟
,
dynamics, while its maxima represent the effective energy barriers between two
minima, as illustrated in Fig. 2c. The one-cluster network has 3 fixed points, two stable
Energy potential. In a network with Q=2 clusters, one can integrate out all populations
(out-of-focus) except one (in-focus) to obtain the effective transfer functions for the in-
Network dynamics can be visualized on a one-dimensional curve, where it is well
approximated by the first-order dynamics (see ref. 16 for details):
𝜏or6,X𝑑 𝑟𝑑𝑡 =−𝑟+𝑟012𝑟.
𝜏or6,X𝑑 𝑟𝑑𝑡 =−𝜕𝐸𝑟𝜕𝑟 ,
focus population representing a single cluster, with firing rate 𝑟 (equation (4) for q=1).
These dynamics can be expressed in terms of an effective energy function 𝐸𝑟 as
landscape, as if driven by an effective force −¥Ok¥k =−(𝑟−𝑟012𝑟). The minima of the
energy with respect to 𝑟 are the stable fixed points of the effective 1-dimensional
attractors ('A' and 'B' in Fig. 2c) and a saddle point ('C'). We estimated the height 𝛥 of
which represents the area between the identity line (𝑦=𝑟) and the effective transfer
function (𝑦=𝑟012(𝑟)) (see Fig. 2c). In the finite network, where the dynamics comprise
frequency that depends on the effective energy barrier Δ, as explained in the main text.
homogeneous networks). Spike counts from all trials of 𝑛o25j taste stimuli in each
Population decoding. The amount of stimulus-related information carried by spike trains
was assessed through a decoding analysis17 (see Fig. S3a for illustration). A multiclass
classifier was constructed from Q neurons sampled from the population (one neuron
from each of the Q clusters for clustered networks, or Q random excitatory neurons for
the potential energy barrier on the trajectory from A to B through C as minus the
integral of the force from the first attractor A to C:
stochastic transitions among the states, switching between A and B would occur with a
condition (expected vs. unexpected) were split into training and test sets for cross-
validation. A "template" was created for the population PSTH for each stimulus,
condition and time bin (200 ms, sliding over in 50 ms steps) in the training set. The
PSTH contained the trial-averaged spike counts of each neuron in each bin (the same
number of trials across stimuli and conditions were used). Population spike counts for
each test trial were classified according to the smallest Euclidean distance from the
templates across 10 training sets ('bagging' or bootstrap aggregating procedure18).
Specifically, from each training set L, we created bootstrapped training sets 𝐿], for 𝑏=
1,..,𝐵=10, by sampling with replacement from L. In each bin, each test trial was then
classified B times using the B classifiers, obtaining B different "votes", and the most
29
frequent vote was chosen as the bagged classification of the test trial. Cross-validated
decoding accuracy in a given bin was defined as the fraction of correctly classified test
trials in that bin.
Significance of decoding accuracy was established via a permutation test: 1000 shuffled
datasets were created by randomly permuting stimulus labels among trials, and a
'shuffled distribution' of 1000 decoding accuracies was obtained. In each bin, decoding
accuracy of the original dataset was deemed significant if it exceeded the upper bound,
𝛼n.n•, of the 95% confidence interval of the shuffled accuracy distribution in that bin
(this included a Bonferroni correction for multiple bins, so that 𝛼n.n•=1−0.05/𝑁],
with 𝑁] the number of bins). Decoding latency (insets in Figs. 1c and 1f) was estimated
interval, and latency; see Figs. 2 and 3), cluster spike count vectors 𝑟5 (for 𝑖=1,...,𝑄) in
as the earliest bin with significant decoding accuracy.
Cluster dynamics. To analyze the dynamics of neural clusters (lifetime, inter-activation
5 ms bins were obtained by averaging spike counts of neurons belonging to a given
cluster. A cluster was deemed active if its firing rate exceeded 10 spks/s. This threshold
was chosen so as to lie between the inactive and active clusters' firing rates, which were
obtained from a mean field solution of the network5.
Code and data availability statement. Experimental datasets are available from the
corresponding authors upon request. All data analysis and network simulation scripts
are available from the authors upon request.
Symbol
𝑗OO
𝑗OP
𝑗PO
𝑗PP
𝑗On
𝑗Pn
𝐽_
𝑟lm2O
𝑟lm2P
𝑉2pkO
𝑉2pkP
𝑉klol2
tm
tref
tsyn
nbg
Nc
Description
Mean EàE synaptic weight × 𝑁
Mean IàE synaptic weight × 𝑁
Mean EàI synaptic weight × 𝑁
Mean IàI synaptic weight × 𝑁
Mean afferent synaptic weights to E neurons × 𝑁
Mean afferent synaptic weights to I neurons × 𝑁
Potentiated intra-cluster EàE weights factor
Average afferent rate to E neurons (baseline)
Average afferent rate to I neurons (baseline)
E neuron threshold potential
I neuron threshold potential
E and I neurons reset potential
E and I membrane time constant
Absolute refractory period
E and I synaptic time constant
Background neurons fraction
Average cluster size
30
Value
1.1 mV
5.0 mV
1.4 mV
6.7 mV
5.8 mV
5.2 mV
7 spks/s
7 spks/s
3.9 mV
4.0 mV
0 mV
see caption
20 ms
5 ms
4 ms
10%
100 neurons
Symbol
Description
Table 1: Parameters for the clustered and homogeneous networks with N LIF neurons.
In the clustered network, the intra-cluster potentiation parameter values were 𝐽_= 5, 10,
20, 30, 40 for networks with 𝑁=1,2,4,6,8 ×10e neurons, respectively. In the
homogeneous network, 𝐽_=1.
𝑗OO
𝑗OP
𝑗PO
𝑗PP
𝑗On
𝑗Pn
𝐽_
𝑉2pkO
𝑉2pkP
Mean EàE synaptic weight × 𝑁
Mean IàE synaptic weight × 𝑁
Mean EàI synaptic weight × 𝑁
Mean IàI synaptic weight × 𝑁
Mean afferent synaptic weights to E neurons × 𝑁
Mean afferent synaptic weights to I neurons × 𝑁
0.8 mV
10.6 mV
2.5 mV
9.7 mV
14.5 mV
12.9 mV
4.6 mV
8.7 mV
Potentiated intra-cluster EàE weights factor
E neuron threshold potential
I neuron threshold potential
Background neurons fraction
Value
65%
nbg
9
Table 2: Parameters for the simplified 2-cluster network with N=800 LIF neurons (the
remaining parameters were as in Table 1).
of
on
74,
cortical
processing
taste. Neuron
Abeles, M. et al. Cortical activity flips among quasi-stationary states. Proc Natl
Samuelsen, C. L., Gardner, M. P. & Fontanini, A. Effects of cue-triggered
410-422,
1
expectation
doi:10.1016/j.neuron.2012.02.031 (2012).
2
Acad Sci USA 92, 8616-8620 (1995).
3
Jones, L. M., Fontanini, A., Sadacca, B. F., Miller, P. & Katz, D. B. Natural stimuli
evoke dynamic sequences of states in sensory cortical ensembles. Proceedings of the
National Academy of Sciences of the United States of America 104, 18772-18777 (2007).
4
Ponce-Alvarez, A., Nacher, V., Luna, R., Riehle, A. & Romo, R. Dynamics of
cortical neuronal ensembles transit from decision making to storage for later report. The
Journal of neuroscience : the official journal of the Society for Neuroscience 32, 11956-11969,
doi:10.1523/jneurosci.6176-11.2012 (2012).
5
during Ongoing and Evoked Cortical Activity.
doi:10.1523/JNEUROSCI.4819-14.2015 (2015).
Mazzucato, L., Fontanini, A. & La Camera, G. Dynamics of Multistable States
J Neurosci 35, 8214-8231,
31
References
•
•
•
•
•
Lansky, P. & Sato, S. The stochastic diffusion models of nerve membrane
Zucchini, W. & MacDonald, I. L. Hidden Markov models for time series: an
Tuckwell, H. C. Introduction to theoretical neurobiology. Vol. 2 (Cambridge
6
introduction using R. (CRC Press, 2009).
7
La Camera, G. & Richmond, B. J. Modeling the violation of reward maximization
and invariance in reinforcement schedules. PLoS computational biology 4, e1000131,
doi:10.1371/journal.pcbi.1000131 (2008).
8
Amit, D. J. & Brunel, N. Model of global spontaneous activity and local
structured activity during delay periods in the cerebral cortex. Cerebral cortex (New York,
N.Y. : 1991) 7, 237-252 (1997).
9
Mazzucato, L., Fontanini, A. & La Camera, G. Stimuli Reduce the Dimensionality
of Cortical Activity. Frontiers in systems neuroscience 10, 11, doi:10.3389/fnsys.2016.00011
(2016).
10
University Press, 1988).
11
depolarization and interspike interval generation. J Peripher Nerv Syst 4, 27-42 (1999).
12
Richardson, M. J. The effects of synaptic conductance on the voltage distribution
and firing rate of spiking neurons. Physical review. E, Statistical, nonlinear, and soft matter
physics 69, 051,918 (2004).
13
synaptic
dynamics.
doi:10.1006/jtbi.1998.0782 (1998).
14
Fourcaud, N. & Brunel, N. Dynamics of the firing probability of noisy integrate-
and-fire neurons. Neural computation 14, 2057-2110, doi:10.1162/089976602320264015
(2002).
15
La Camera, G., Rauch, A., Luscher, H. R., Senn, W. & Fusi, S. Minimal models of
adapted neuronal response to in vivo-like input currents. Neural Comput 16, 2101-2124
(2004).
16
population states. Network (Bristol, England) 10, 351-373 (1999).
17
Nature 497, 585-590, doi:10.1038/nature12160 (2013).
18
Brunel, N. & Sergi, S. Firing frequency of leaky intergrate-and-fire neurons with
87-95,
Rigotti, M. et al. The importance of mixed selectivity in complex cognitive tasks.
Mascaro, M. & Amit, D. J. Effective neural response function for collective
Breiman, L. Bagging predictors. Machine learning 24, 123-140 (1996).
current
Journal
of
theoretical
biology
195,
•
•
•
•
•
•
•
•
•
•
•
•
•
32
Expectation-induced modulation of metastable
activity underlies faster coding of sensory stimuli
Supplementary Material
Luca Mazzucato1,2 Giancarlo La Camera*1,3 and Alfredo Fontanini*1,3
1Department of Neurobiology and Behavior, State University of New York at Stony Brook, Stony Brook, NY 11794
2Departments of Biology and Mathematics and Institute of Neuroscience, University of Oregon, Eugene, OR 97403
3Graduate Program in Neuroscience, State University of New York at Stony Brook, Stony Brook, NY 11794
1 Supplementary Results
1.1 Cue responses in data vs. model
1.2 Anticipation of stimulus decoding
1.3 Robustness of anticipatory activity
1.4 Distracting cue model
1.5 Specificity of anticipatory mechanism (alternative models)
1.6 Firing rate coding of expectation
2 Supplementary Methods
2.1 Behavioral training and electrophysiology
2.2 Cue responsiveness
2.3
2.4 Network with overlapping clusters
Infinitesimal moments for mean field theory
1
1
2
3
6
6
10
11
11
11
12
13
Supplementary Results
1.1 Cue responses in data vs. model
We compared the cue responses of the clustered network to those in the dataset published in Ref. [1]. The
entity of the response was estimated by the ∆PSTH with the procedure described in the Suppl. Methods,
Sec. 2.2. In the data [1], the PSTH modulation in cue-responsive neurons was consistent across modalities
(excited responses peaked at 12±1.0 spks/s, inhibited responses peaked at −4.8 ± 0.3 spks/s; see Fig. S1a).
In the model, modulation of cue responses depended on the cue-induced modulation of the spatial variance
σ2 of the afferent currents (expressed in percent of baseline in Fig. S1b). As shown in the figure, the PSTH
modulation of cue-responsive neurons slightly increased with σ, however, over a wide range of parameters, was
in quantitative agreement with the data shown in Fig. S1a.
In Fig. 1a -- c of the main text we chose σ = 20%, giving peak firing rate modulations of 11.1 ± 0.8 spks/s
(excited) and −6.2 ± 0.3 spks/s (inhibited). Single neurons' responses thus reflected responses observed in the
empirical data (Fig. S1a and refs. [1, 2]). In the homogeneous network of Fig. 1d -- f, single neurons' responses
were comparable to the ones observed in the clustered network. With σ = 20%, peak firing rate modulations
were 11.2±1.2 spks/s (excited) and −3.9±0.2 spks/s (inhibited). Both in the clustered and in the homogeneous
networks, neurons could be nonresponsive to the cue (Fig. S2).
-- 1 --
Fig. S1. Cue responses in data
and model.
Peak firing rate re-
sponses of cue-excited (green) and
cue-inhibited (red) neurons. a: Data
from different sensory modalities to-
gether with across-modalities aver-
age (rightmost bar), adapted from
[1]. b: Clustered network model
peak firing rate responses for dif-
ferent values of cue-induced spatial
variance. Peak responses (∆PSTH,
mean±s.e.m.) were computed in
both panels as the difference between
the activity post-cue and the activity
pre-cue. All panels: t-test, n.s.=non-
significant. "Data" in panel b is the
same as "Average" in panel a.
Fig.
S2. Model neurons
with no cue response. Raster
plots of representative single
neuron responses to cue and
one stimulus in expected tri-
als in the clustered (a) and ho-
mogeneous (b) networks (pink
curve: PSTH (mean±s.e.m.).
Top row: non-responsive neu-
rons. Bottom row: neurons
that are stimulus-responsive
but not cue-responsive accord-
ing to whether or not
the
PSTH was significantly differ-
ent from baseline (pink hori-
zontal bars: p < 0.05, t-test
with multiple-bin correction).
1.2 Anticipation of stimulus decoding
In the main text we have shown that stimulus decoding is accelerated in the presence of the anticipatory cue (for
example, in Fig. 1c). As a measure of performance we used the decoding accuracy averaged across all tastes.
Here we show that similar results are obtained when considering the decoding performance for single tastes
separately. In either case, the decoding procedure is described in Methods (Sec. Population decoding) and is
summarized in Fig. S3a.
As shown in figure, decoding was performed using a multi-class classifier where each class corresponded
to one of the four taste stimuli. A separate classifier was used for each time bin, and decoding performance
in each bin was assessed via a cross-validation procedure (see Methods for details). This procedure yields a
confusion matrix whose diagonal elements represent the accuracy of classification for each taste in that time
bin (Fig. S3a). The performance for each time bin can be averaged across instances of the same taste (as in the
-- 2 --
Fig. S3. Multi-class classifier for stimulus decoding. a: Schematics of the classification algorithm used for population
decoding. The colored curves represent the temporal evolution of neural activity across N simultaneously recorded neurons.
The four colors label trajectories obtained with four different stimuli (tastants). Hues help visualize the time course within
each trajectory. Each time bin of activity (black dots) was decoded using an independent classifier. Decoding performance
was assessed via a cross-validation procedure, yielding a confusion matrix whose diagonal represents the accuracy of
classification for each taste in that time bin. b: Time course of decoding accuracy in expected vs. unexpected conditions
for each individual tastant (left) and for the across-taste average (right). The left panel demonstrates coding anticipation for
each tastant separately. Color-coded horizontal bar represents significant difference between decoding accuracy in expected
vs. unexpected trials, p < 0.05, t-test with multiple bin Bonferroni correction (notations as in Fig. 1c of the main text).
left panel of Fig. S3b) or across all tastes simultaneously (right panel of Fig. S3b). In either case, significant
decoding accuracy is anticipated in expected trials compared to unexpected trials.
1.3 Robustness of anticipatory activity
To test the robustness of anticipatory activity in the clustered network, we systematically varied key parameters
related to the sensory and anticipatory inputs, as well as network connectivity and architecture (Fig. S4-5).
Increasing stimulus intensity led to a faster encoding of the stimulus in both conditions (Fig. S4a). Stimuli were
always decoded faster when preceded by the cue (Fig. S4a; two -- way ANOVA with factors 'stimulus slope',
p< 10−18, F (4) = 30.4, and 'condition' (expected vs. unexpected), p< 10−15, F (1) = 79.8). The amount
of anticipatory activity induced by the cue depended on stimulus intensity only weakly (p(interaction)= 0.05,
F (4) = 2.4), and was present even in the case of step -- like stimulus (Fig. S4b). Moreover, we found that
anticipatory activity was maintained when we increased the number of presented stimuli, while keeping a fixed
50% probability that each cluster be selective to a given stimulus (Fig. S4c; two-way ANOVA with factors
'number of stimuli' (p = 0.57, F (3) = 0.67) and 'condition' (p < 10−7, F (1) = 35.3; p(interaction)= 0.66,
F (3) = 0.54). Anticipatory activity was present also when the stimulus selectivity targeted both E and I
neurons, rather than E neurons only (Fig. S4d; 50% of both E and I neurons were targeted by the cue).
We then tested robustness of anticipatory activity to variations in network size and architecture. We esti-
mated the decoding accuracy in ensembles of constant size (20 neurons) sampled from networks of increasing
size (Fig. S5a). When scaling the network size we kept fixed both the clusters' size and the probability that
each cluster was selective to a given stimulus (50%). Network synaptic weights scaled as reported in Table 1
and 2 of Methods. Cue-induced anticipation was even more pronounced in larger networks (Fig. S5a, two --
way ANOVA with factors 'network size' (p < 10−20, F (3) = 49.5), 'condition' (p < 10−16, F (1) = 90;
p(interaction)= 10−10, F (3) = 20).
-- 3 --
Fig. S4. Robustness of anticipation
effects to variations in stimulus
model. a: Stimulus intensity (slope).
Latency of significant decoding in-
creased with stimulus intensity in
both conditions (top, darker shades
represent stronger stimuli; bottom,
decoding latency, mean±s.e.m.), and
it is faster in expected (pink) than
unexpected trials (blue). b: Step-
like stimuli. Anticipatory activity is
present in the case of step-like stim-
uli. Bottom panel: time course of
decoding accuracy (notations as in
Fig. 1c of the main text). c: Number
of stimuli. Anticipatory activity dis
not depend on the number of stimuli
presented to the network. d: Stim-
uli targeting inhibitory neurons. An-
ticipatory activity was present when
stimuli targeted both E and I neu-
rons. Notations as in bottom row of
panel a. Panels a-d: ∗ = p < 0.05,
∗∗ = p < 0.01, ∗∗∗ = p < 0.001,
post-hoc multiple -- comparison t -- test
with Bonferroni correction. Hori-
zontal black bar, p < 0.05, t -- test
with multiple -- bin Bonferroni correc-
Insets: ∗∗∗ = p < 0.001,
tion.
signed -- rank test.
In our main model the neural clusters were segregated in disjoint groups. In Fig. S5b, we investigated an
alternative scenario where neurons may belong to multiple clusters, resulting in an architecture with overlapping
Fig. S5. Robustness of anticipatory activity to variations in network architecture. a: Variations in network size.
Anticipatory activity was present for a large range of network sizes (J+ = 5, 10, 20, 30, 40 for N = 1, 2, 4, 6, 8 × 103
neurons, respectively). b: Network with overlapping clusters. Anticipatory activity was present also when neurons were
shared among multiple clusters (see the text for detail, notations as in Fig. 1c of the main text). Panels a-b: ∗∗ = p < 0.01,
∗∗∗ = p < 0.001, post-hoc multiple -- comparison t -- test with Bonferroni correction. Horizontal black bar, p < 0.05, t -- test
with multiple -- bin Bonferroni correction. Inset: ∗∗ = p < 0.01, signed -- rank test.
-- 4 --
Fig. S6. Robustness of anticipatory activity to variations in cue model. a: Robustness to variations in spatial variance.
Increasing the cue-induced spatial variance in the afferent currents σ (top: distribution of peak afferent currents across
neurons) leads to more pronounced anticipatory activity (bottom, latency in unexpected (red) and expected (pink) trials).
b: Robustness to variations in kinetics (time course of cue stimulation). Anticipatory activity is present for a large range
of cue time courses (top, double exponential cue profile with rise and decay times [τ1, τ2] = g × [0.1, 0.5] s, for g in
the range from 1 to 3; bottom, decoding latency during unexpected, red, and unexpected, pink, trials). c: Robustness to
step -- like kinetics. This example shows the case of step -- like time course for the cue with spatial variance σ = 20%. d:
Robustness to inclusion of inhibitory neurons as targets. Anticipatory activity was also present when the cue targets 50%
of E and I neurons (σ = 20% in baseline units). Panels a-d: ∗ = p < 0.05, ∗∗ = p < 0.01, ∗∗∗ = p < 0.001, post-hoc
multiple -- comparison t -- test with Bonferroni correction. Horizontal black bar, p < 0.05, t -- test with multiple -- bin Bonferroni
correction; Insets: ∗∗ = p < 0.01, ∗∗∗ = p < 0.001, signed -- rank test. Panels c-d: notations as in Fig. 1c of the main text.
cluster membership [3]. We found that anticipatory activity was present also in networks with overlapping
clusters (Fig. S5b; see Sec. 2.4 of Supplementary Methods below for details of this model).
-- 5 --
The results so far show that anticipatory activity was robust to changes in network architecture. Next, we
show that anticipatory activity was robust to variations in cue parameters -- specifically, (i) variations in the
spatial variance σ2 of the cue-induced afferent currents, (ii) variations in the kinetics of cue stimulation, and
(iii) variations in the type of neurons targeted by the cue.
(i) We found that coding anticipation was present for all values of σ above 10% (Fig. S6a, two -- way
ANOVA with factors 'cue variance' (p = 0.09, F (7) = 1.8) and 'condition' (p < 10−7, F (1) = 31);
p(interaction)= 0.07, F (7) = 1.9).
(ii) Anticipatory activity was also robust to variations in the time course of the cue-evoked currents (Fig.
S6b, two -- way ANOVA with factors 'time course' (p = 0.03, F (4) = 2.8) and 'condition' (p < 10−15,
F (1) = 72.7; p(interaction)= 0.12, F (4) = 1.8). We also considered a model with constant cue-evoked
currents (step-like model), to further investigate a potential role (if any) of the cue's variable time course on
anticipatory activity (Fig. S6c). Again, we found anticipatory coding also in this case (Fig. S6c, bottom panel).
(iii) Finally, we tested whether or not anticipation was present if I neurons, in addition to E neurons, were
targeted by the cue (while maintaining stimulus selectivity for E neurons only). We assumed that 50% of both
E and I neurons were targeted by the cue, and found robust anticipatory activity also in that case (Fig. S6d).
We did not find any anticipatory coding in the homogeneous network model as a result of the same manip-
ulations of Fig. S4-S5 (not shown).
1.4 Distracting cue model
To show that the anticipatory effect of our model cue is specific, we give here an example of a manipulation
leading to the opposite effect. Specifically, if the cue is modeled as recruiting recurrent inhibition rather than
excitation (we refer to such a cue as a 'distractor'), stimulus decoding is slowed down rather than accelerated,
as shown in Fig. S7a-b. The coding delay following such 'distracting cue' is due to a phenomenon of delayed
dynamics which mirrors the anticipatory dynamics of the main model, as shown next.
First, from the analysis of model simulations we found that the activation latency of stimulus-selective
clusters after stimulus presentation was longer during distracted trials (Fig. S7c), which resulted in the delayed
onset of the coding states (see the main text for the definition of coding state in section Anticipatory cue induces
faster onset of taste-coding states). This, in turn, was the result of higher energy barriers between coding and
non-coding states, as confirmed in a mean field analysis of a simplified 2-cluster network (Fig. S7d). Except
for the different cue targets, the 2-cluster network is the same as used to study anticipatory coding (main text,
Anticipatory cue speeds up the networks dynamics). The distracting cue increased the energy barriers for a
range of stimulus intensities (Fig. S7d, right panel).
1.5 Specificity of anticipatory mechanism (alternative models)
How specific is our model of anticipatory activity? To answer this question, we compared our model to several
alternative models where the anticipatory cue modulates, respectively: the feedforward couplings Jext; the
recurrent couplings JEE; and the background synaptic input.
All models had the same architecture of the main clustered network model and the same cue temporal
profile, which was modeled as a double exponential with rise and decay times of 0.2s and 1s, respectively. In
the alternative models, the cue targeted all clustered E neurons, rather than just 50% as in the main model of
Fig. 1a, to avoid the introduction of spatial variance across neurons (this could confound the results with those
-- 6 --
Fig. S7. A "distracting" cue slows down stimulus coding (model). a: Schematics of clustered network architecture and
stimulation (notations as in Fig. 1a of the main text). Unlike the main model, here the cue targets the inhibitory neurons.
b: Time course of cross -- validated population decoding during distracted (brown) trials was slower than during unexpected
(red) trials (notations as in Fig. 1c). Inset: aggregate analysis across 20 simulated sessions (mean±s.e.m.). c: Activation
latency of stimulus-selective clusters after stimulus presentation was delayed during distracted trials (latency, mean±s.e.m.).
d: Mean field theory of simplified 2-cluster network (notations as in Fig. 3c, lighter brown denotes stronger stimuli). Left
panel: the transition probability from the non-coding (right well) to the coding state (left well) increased with larger stimuli.
In distracted trials (dashed curves) the barrier height ∆ from the non-coding to the coding state is larger than in unexpected
trials (full curves), leading to slower coding in the distracted condition. Right panel: effective energy barriers as a function
of stimulus intensity, with (full lines) and without the cue (dashed). Panels b and c: ∗∗ = p < 0.01, ∗∗∗ = p < 0.001,
t-test.
of the main model). All models were scored on the ability to match the experimental data on the ∆PSTH of
cue responses and coding anticipation (see Fig. S8 and Table 1). The performance of the model of the main
text is reported in Fig. S8a for comparison.
Feedforward coupling model (Fig. S8b). In this model, The cue was a time dependent modulation of the
external synaptic coupling Jext = JE0, identical for all clustered excitatory neurons. Coding anticipation was
absent for either moderate or strong positive modulations varying from 10% to 20% above baseline. Cue re-
sponses were heterogeneous but to a different degree than the experimental data. For negative cue modulations,
only inhibited cue responses were observed and no coding anticipation was present (not shown).
Recurrent coupling model (Fig. S8c).
In this model, the cue was a time-dependent modulation of the
recurrent coupling strength JEE between E neurons. For negative modulation of the recurrent couplings (the
more likely to produce a faster dynamics), coding anticipation was present, however, peak cue responses were
-- 7 --
Fig. S8. Alternative models. a: Performance results of the main model ('spatial variance model' of the main text, see Fig.
1a-c), reported here for comparison. Top row: Temporal profile modeling the presentation of the cue (targeting excitatory
neurons). Bottom row, left: ∆PSTH, defined as the peak cue response minus baseline rate, in data and model (excitatory
responses in green, inhibited responses in red). Bottom row, right: Decoding performance in expected (pink) and unexpected
(blue) conditions averaged across 20 simulated sessions. b: Feedforward coupling model. In this model, the cue elicited
a modulation of the feedforward couplings Jext (see text). Same notations as in a. c: Recurrent coupling model. In this
model, the cue elicited a modulation of all excitatory recurrent couplings JEE (see text). Same notations as in a. All panels:
Network parameters as in Table 1. t-test, ∗ = p < 0.05, ∗∗ = p < 0.01, ∗∗∗ = p < 0.001.
strongly inhibited over a wide range of parameters, and thus incompatible with the empirical data. For positive
modulation (not shown), coding anticipation was absent and cue responses were mostly excited.
ext → Xσ2
Background synaptic input model (Fig. S9). In this model, the cue induced an increase in the background
synaptic input, which in turn drove a simultaneous increase in background noise and shunting inhibition as
in ref.
[4]. The baseline noise level was modeled after an Ornstein-Uhlenbeck process with zero mean and
variance σext = 0.5rext, where rext was the mean afferent current. The cue increased the background noise
ext while shunting the membrane time constant by a factor 1/X: τm → τm/X
by a factor X: σ2
(we refer to [4] for details). Both modulations followed the same double exponential time course of the spatial
variance model of the main text. With even a moderate factor of X = 1.5, the cue induced mostly inhibited cue
responses and no anticipation (Fig. S9a), due to the strong shunting effect on the network dynamics, leading to
a strong reduction of excitability in the clusters. At X = 2, excitatory neurons were transiently silenced (not
shown). In an effort to obtain a fair comparison with the spatial variance model, we reduced the shunting effect
(using peak value τm/X , with = 1/2, 1/4) while keeping the same amount of background noise (Fig. S9b).
In this case, the cue induced heterogeneous cue responses more similar to the data, but still no anticipation
of coding. We explored the parameter space by independently scaling background noise, shunting, and mean
afferent current rext (transiently increased with the same time course as the other quantities -- to counteract the
shunting effect), but found that coding anticipation was never present (Fig. S9c, bottom row). We concluded
that a model cue inducing an increase in background synaptic activity did not lead to anticipatory activity.
In summary, while our spatial variance model produces robust coding anticipation and quantitatively
matches cue responses in a wide range of parameters and architectures (Fig. S1, S4, S5, S6), all the poten-
tially alternative models above failed to capture the empirical results and reproduce key features of the data (see
Table 1 for a summary).
-- 8 --
Fig. S9. Background synaptic
input model. a: Main findings for
the alternative model wherein the
cue elicits a change in background
synaptic input to E neurons (see
the text for details). Same nota-
tions as in Fig. 8a, with X: amount
of cue-induced modulation ('scal-
ing parameter'); rext: mean affer-
ent current to the network; σext:
background noise input to the net-
work; τm: E neurons membrane
time constant. b: Model with re-
duced shunting inhibition. Same
as a, with the membrane time con-
stant scaled by a lower power of
c: Effect of different scal-
X.
ing regimes on the performance
of the background synaptic in-
put model of panel a. Top row:
ext →
∆PSTH. Key: Black, σ2
ext, rext → rext, τm →
Xσ2
τm/X (same as panel a); Dark
ext, rext →
grey, σ2
X 1/2rext, τm → τm/X; Light
ext, rext →
grey, σ2
Xrext, τm → τm/X; Dark
ext, rext →
brown: σ2
rext, τm → τm/X 1/2; Light
ext, rext →
brown: σ2
rext, τm → τm/X 1/4. Right-
most bar: ∆PSTH of data. Bottom
row: decoding latency as a func-
tion of the scaling parameter X for
the 5 scaling regimes shown in top
row (same color code). Dashed
line: coding latency in the absence
of the cue. All panels: t-test, ∗ =
p < 0.05, ∗∗ = p < 0.01, ∗∗∗ =
p < 0.001.
ext → Xσ2
ext → Xσ2
ext → Xσ2
ext → Xσ2
Model
Fwd. Jext Rec. JEE Backgr. Syn. Input
Yes (fine tuned)
No
S9
Modulation
Anticipation
Cue responses
Figure
Spatial Var.
Yes (robust)
Yes (robust)
S1, S4, S5, S6
No
No
S8b
Yes
No
S8c
Table. S1. Comparison of the performance of alternative models of the anticipatory cue (see Figs. S8, S9). First row ('Mod-
ulation') reports type of modulation due to the cue (feature defining the model; see the text). Second row ('Anticipation')
reports the presence (Yes) or absence (No) of coding anticipation. Third row ('Cue responses') reports whether the ∆PSTH
is compatible (Yes) or not (No) with the empirical data. Last row: figure where the corresponding result is shown.
-- 9 --
1.6 Firing rate coding of expectation
Stimulus coding could accelerate if the cue increased the firing rate of the stimulus-selective neurons compared
to the non-selective neurons. Here we show that coding anticipation in the clustered network is not driven by
such cue-induced changes in firing rate selectivity. To prove this point, we estimated the firing rate difference
∆r between stimulus-selective and nonselective neurons in the expected and unexpected conditions in the
clustered network, and found no difference in ∆r (Fig. 10a).
Similarly, the finding that no coding acceleration is found in the homogeneous network (Fig. 1f of main
text), suggests either no difference in ∆r, or a difference in the opposite direction (i.e., larger ∆r in non-
expected trials). An analysis of ∆r in the homogeneous network (Fig. 10b) confirmed that ∆r was larger in the
unexpected condition, in agreement with the reversed trend in coding speed found in Fig. 1f.
Fig. S10. Time course of the firing rate difference ∆r between stimulus-selective and nonselective clusters in the expected
(pink) and unexpected (blue) conditions. a: Clustered network of Fig. 1a of main text. ∆r is not significantly different be-
tween expected and unexpected trials. b: Homogeneous network (Fig. 1d of main text). In this network, ∆r is significantly
larger in the unexpected condition compared to the expected one (black horizontal bar: p< 0.05, t-test with multiple bin
Bonferroni correction). Both panels: main curves represent means of ∆r over 20 sessions; shaded area represents s.e.m..
-- 10 --
Supplementary Methods
2.1 Behavioral training and electrophysiology
Adult female Long -- Evans rats were used in the experiment. Movable bundles of 16 microwires attached to a
"mini -- microdrive" were implanted bilaterally in the gustatory cortex and intraoral cannulae (IOC) were inserted
bilaterally and cemented. All experimental procedures were approved by the Institutional Animal Care and Use
Committee of Stony Brook University and complied with university, state, and federal regulations on the care
and use of laboratory animals (for more details, see [2]). After postsurgical recovery, rats were trained to self --
administer fluids through IOCs by pressing a lever under head-restraint within 3s presentation of an auditory
cue ("expected trials"; a 75 dB pure tone at a frequency of 5 kHz). The inter-trial interval was progressively
increased to 40 ± 3s. Early presses were discouraged by the addition of a 2s delay to the inter-trial interval.
During training and electrophysiology sessions, additional tastants were automatically delivered through the
IOC at random times near the middle of the inter -- trial interval and in the absence of the anticipatory cue
("unexpected trials"). The following tastants were delivered: 100 mM NaCl, 100 mM sucrose, 100 mM citric
acid, and 1 mM quinine HCl. Water (50 µl) was delivered to rinse the mouth clean through a second IOC, 5s
after the delivery of each tastant.
Multiple single -- unit action potentials were amplified, bandpass filtered, and digitally recorded. Single
units were isolated using a template algorithm, clustering techniques, and examination of inter -- spike interval
plots (Offline Sorter, Plexon). Starting from a pool of 299 single neurons in 37 sessions, neurons with peak
firing rate lower than 1 spks/s (defined as silent) were excluded from further analysis, as well as neurons with
a large peak around the 6 -- 10 Hz in the spike power spectrum, which were classified as somatosensory [5 -- 7].
Only ensembles with 5 or more simultaneously recorded neurons were included in the rest of the analyses.
Ongoing and evoked activity were defined as occurring in the 5 seconds-long interval before or after taste
delivery, respectively.
2.2 Cue responsiveness
A neuron was deemed responsive to the cue if a sudden change in its firing rate was observed during the post-cue
interval. To detect changes in firing rates we used the 'change-point' (CP) procedure described in ref. [6] (an
adaptation of a method presented in ref. [8]). Briefly, we built the cumulative distribution function of the spike
count (CumSC) across all trials in each session, in the interval starting 0.5s before and ending 1 s after the cue
delivery. We then ran the CP detection algorithm on CumSC record with a given tolerance level corresponding
to a desired confidence level of p = 0.05 for a two-sample problem in spike counts. This algorithm looks for
putative CPs as those points xC such that CumSC(xC) is located at the maximal distance from the straight
line joining the first and any subsequent point xn along the record. If the spike counts before xC and between
xC and xn are significantly different (according to the chosen tolerance level), xC is accepted as a legitimate
change point. Normally, one would at this point repeat the procedure considering xC as the new start of the
record, to look for additional CPs; however, we stopped the procedure after finding the first CP (if any), as this
was sufficient to claim responsiveness. If, with this method, a CP was detected before cue presentation, the
whole algorithm was repeated with lower tolerance (lower p-value) to enforce a more stringent criterion. If a
legitimate CP was found anywhere within 1s after cue presentation, the neuron was deemed responsive. If no
CP was found, the neuron was deemed not responsive. For neurons with excited (inhibited) cue responses, the
positive (negative) peak response was estimated as the difference between the post-cue activity and the mean
-- 11 --
baseline activity in the 0.5s preceding cue presentation. This measure is reported as the ∆PSTH in e.g. Sec. 1.1
and Fig. S1.
2.3
Infinitesimal moments for mean field theory
Here we report the formulae for the infinitesimal mean and variance of the input current needed for mean field
theory (see Methods, section Mean field theory).
We need the infinitesimal moments for Q + 2 neural populations: the first Q populations representing the
Q excitatory clusters; the (Q + 1) -- th population representing the "background" unstructured excitatory popu-
lation; and the (Q + 2) -- th population representing the inhibitory population. The theory can be derived from a
population density approach where the input to each neuron in population α is completely characterized by the
infinitesimal mean µα and variance σ2
α of the post-synaptic current (see Table 1 of Methods for parameter val-
ues). The mean and variance of the infinitesimal moments of the input current to the αth excitatory population
is
+ nE(1 − f )pEEJ−jEEr(bg)
E
pEEJ−jEErβ
√
N
µα = τm,E
Q
pEEJ+jEErα +
(cid:16) nEf
Q−1(cid:88)
(cid:17)
pEE(J+jEE)2(1 + δ2)rα +
β=1
,
(cid:16) nEf
Q
−nI pEI jEI rI + nEpE0jE0rext
σ2
α = τm,E
Q−1(cid:88)
β=1
pEE(J−jEE)2(1 + δ2)rβ
(cid:17)
+nE(1 − f )pEE(J−jEE)2(1 + δ2)r(bg)
E + nI pEI j2
EI (1 + δ2)rI
,
where rα, rβ, with α, β = 1, ..., Q, are the firing rates of the excitatory clusters; r(bg)
is the firing rate of the
background E population; rI is the firing rate of the I population; nE = 4/5 and nI = 1/5 are the fractions
of excitatory and inhibitory neurons in the network, respectively, and δ = 1% is the SD of the distribution of
synaptic weights. The infinitesimal moments of the afferent current to a neuron belonging to the background E
population read
E
µ(bg)
E = τm,E
√
N
(cid:16) nEf
Q(cid:88)
Q
β=1
pEEJ−jEErβ + nE(1 − f )pEEjEEr(bg)
E
(cid:17)
(σ(bg)
E )2 = τm,E
pEE(J−jEE)2(1 + δ2)rβ + nE(1 − f )pEEj2
EE(1 + δ2)r(bg)
E
−nI pEI jEI rI + nEpE0jE0rext
,
(cid:16) nEf
Q(cid:88)
Q
β=1
(cid:17)
+nI pEI j2
EI (1 + δ2)rI
,
-- 12 --
and, similarly, for the current to a neuron of the inhibitory population we have
pIEjIErβ + nE(1 − f )pIEjIEr(bg)
E
(cid:17)
−nI pII jII rI + nEpI0jI0rext
,
√
N
µI = τm,I
(cid:16) nEf
Q(cid:88)
Q
β=1
(cid:16) nEf
Q(cid:88)
Q
β=1
σ2
I = τm,I
+nI pII j2
II (1 + δ2)rI
.
pIEj2
IE(1 + δ2)rβ + nE(1 − f )pIEj2
(cid:17)
IE(1 + δ2)r(bg)
E
(2.1)
These expressions enter the mean field equations as described in Methods (section Mean field theory).
2.4 Network with overlapping clusters
In the spiking network with overlapping clusters of Fig. S5b, each neuron (network size: N = 2000) had a
probability f = 0.06 of belonging to one of the Q = 14 clusters [3]. Hence, the fraction of neurons in a
population shared by a set of k specific clusters (a population of 'rank' k) was f k(1 − f )Q−k (there are(cid:0)Q
(cid:1)
such populations); and the fraction of neurons in the unstructured background population (rank 0) was (1−f )Q.
Synaptic weights Jij between pre- and post-synaptic excitatory neurons j and i respectively, were given by the
stochastic variable
k
Jij = pEE (ijξ+ + (1 − ij)ξ−) ,
where pEE = 0.2 is the E → E connection probability, ξ± are the two possible values of the synaptic weights
(see below), and ij and 1−ij are the potentiation and depression probabilities, P (Jij = ξ+) and P (Jij = ξ−),
respectively. Weights were potentiated or depressed according to the rule [3, 9]
where Pij =(cid:80)Q
ij =
,
(2.2)
Pij
Pij + ρf Dij
i = 0 otherwise), while Dij =(cid:80)Q
j is the number of clusters in common between neurons i and j (ηk
i = 1 if cluster k
i ηk
k=1 ηk
contains neuron i and ηk
j ), and ρ = 2.75. To motivate Eq. 2.2,
we note that this is the asymptotic value of the potentiation probability obtained from the stochastic Hebbian
learning rule of ref. [9] in the limit of slow learning. Finally, ξ+ and ξ− were random variables sampled from
+ and δ2J 2−, respectively (δ = 0.01). The E
normal distributions with means J+ and J− and variances δ2J 2
→ I, I → E, and I → I connection probability was the same as for the homogeneous and clustered networks
described (Table 1 in the main text); the stimuli and the anticipatory cue targeted the excitatory neurons as in
the main model with segregated clusters. The remaining parameters of the network are reported in Table S2.
i (1 − ηk
k=1 ηk
References
[1] R. Vincis and A. Fontanini, Associative learning changes cross-modal representations in the gustatory cortex, Elife 5
(2016) e16420.
[2] C. L. Samuelsen, M. P. Gardner, and A. Fontanini, Effects of cue-triggered expectation on cortical processing of taste,
Neuron 74 (2012), no. 2 410 -- 422.
-- 13 --
Symbol Description
N.
jEE
jEI
jIE
jII
jE0
jI0
J+
rE
ext
rI
ext
V thr
E
V thr
I
V reset
τm
τref
τsyn
N.
N.
N.
Mean E→E weights ×√
Mean I→E weight ×√
Mean E→I weight ×√
Mean I→I weight ×√
Mean afferent synaptic weights to E neurons ×√
Mean afferent synaptic weights to I neurons ×√
Potentiated intra-cluster E→E weights factor.
Average afferent rate to E neurons (baseline).
Average afferent rate to I neurons (baseline).
E neuron threshold potential.
I neuron threshold potential.
E and I neurons reset potential.
E and I membrane time constant.
Absolute refractory period.
E and I synaptic time constant.
N.
N.
Value
1.4 mV
5.0 mV
2.5 mV
6.1 mV
7.3 mV
6.5 mV
10.5
5 spks/s
7 spks/s
3.6 mV
5.7 mV
0 mV
20 ms
5 ms
4 ms
Table. S2. Parameters for the network with overlapping clusters with N = 2000 LIF neurons. See Sec. 2.4 for details.
[3] E. Curti, G. Mongillo, G. La Camera, and D. J. Amit, Mean field and capacity in realistic networks of spiking neurons
storing sparsely coded random memories, Neural computation 16 (2004), no. 12 2597 -- 2637.
[4] F. S. Chance, L. F. Abbott, and A. D. Reyes, Gain modulation from background synaptic input, Neuron 35 (2002),
no. 4 773 -- 782.
[5] D. B. Katz, S. A. Simon, and M. A. Nicolelis, Dynamic and multimodal responses of gustatory cortical neurons in
awake rats, J Neurosci 21 (2001), no. 12 4478 -- 89.
[6] A. Jezzini, L. Mazzucato, G. La Camera, and A. Fontanini, Processing of hedonic and chemosensory features of taste
in medial prefrontal and insular networks, The Journal of Neuroscience 33 (2013), no. 48 18966 -- 18978.
[7] N. K. Horst and M. Laubach, Reward-related activity in the medial prefrontal cortex is driven by consumption, Front
Neurosci 7 (2013) 56.
[8] C. R. Gallistel, S. Fairhurst, and P. Balsam, The learning curve: implications of a quantitative analysis, Proc Natl
Acad Sci U S A 101 (2004), no. 36 13124 -- 31.
[9] N. Brunel, F. Carusi, and S. Fusi, Slow stochastic hebbian learning of classes of stimuli in a recurrent neural network,
Network: Computation in Neural Systems 9 (1998), no. 1 123 -- 152.
-- 14 --
|
1306.3285 | 1 | 1306 | 2013-06-14T03:36:08 | Third-Order Edge Statistics: Contour Continuation, Curvature, and Cortical Connections | [
"q-bio.NC"
] | Association field models have attempted to explain human contour grouping performance, and to explain the mean frequency of long-range horizontal connections across cortical columns in V1. However, association fields only depend on the pairwise statistics of edges in natural scenes. We develop a spectral test of the sufficiency of pairwise statistics and show there is significant higher order structure. An analysis using a probabilistic spectral embedding reveals curvature-dependent components. | q-bio.NC | q-bio |
Third-Order Edge Statistics: Contour Continuation,
Curvature, and Cortical Connections
Matthew Lawlor
Applied Mathematics
Yale University
New Haven, CT 06520
[email protected]
Steven W. Zucker
Computer Science
Yale University
New Haven, CT 06520
[email protected]
Abstract
Association field models have attempted to explain human contour grouping per-
formance, and to explain the mean frequency of long-range horizontal connections
across cortical columns in V1. However, association fields only depend on the
pairwise statistics of edges in natural scenes. We develop a spectral test of the suf-
ficiency of pairwise statistics and show there is significant higher order structure.
An analysis using a probabilistic spectral embedding reveals curvature-dependent
components.
1
Introduction
Natural scene statistics have been used to explain a variety of neural structures. Driven by the
hypothesis that early layers of visual processing seek an efficient representation of natural scene
structure, decorrelating or reducing statistical dependencies between subunits provides insight into
retinal ganglion cells [16], cortical simple cells [13, 2], and the firing patterns of larger ensembles
[17]. In contrast to these statistical models, the role of neural circuits can be characterized function-
ally [3, 14] by positing roles such as denoising, structure enhancement, and geometric computations.
Such models are based on evidence of excitatory connections among co-linear and co-circular neu-
rons [5], as well as the presence of co-linearity and co-circularity of edges in natural images [8],
[7]. The fact that statistical relationships have a geometric structure is not surprising: To the extent
that the natural world consists largely of piecewise smooth objects, the boundaries of those objects
should consist of piecewise smooth curves.
Common patterns between excitatory neural connections, co-occurrence statistics, and the geometry
of smooth surfaces suggests that the functional and statistical approaches can be linked. Statistical
questions about edge distributions in natural images have differential geometric analogues, such as
the distribution of intrinsic derivatives in natural objects. From this perspective, previous studies
of natural image statistics have primarily examined "second-order" differential properties of curves;
i.e., the average change in orientation along curve segments in natural scenes. The pairwise statistics
suggest that curves tend toward co-linearity, in that the (average) change in orientation is small.
Similarly, for long-range horizontal connections, cells with similar orientation preference tend to be
connected to each other.
Is this all there is? From a geometric perspective, do curves in natural scenes exhibit continuity in
curvatures, or just in orientation? Are edge statistics well characterized at second-order? Does the
same hold for textures?
To answer these questions one needs to examine higher-order statistics of natural scenes, but this
is extremely difficult computationally. One possibility is to design specialized patterns, such as in-
tensity textures [15], but it is difficult to generalize such results into visual cortex. We make use
of natural invariances in image statistics to develop a novel spectral technique based on preserving
1
a probabilistic distance. This distance characterizes what is beyond association field models (dis-
cussed next) to reveal the "third-oder" structure in edge distributions. It has different implications
for contours and textures and, more generally, for learning.
2 Edge Co-occurrence Statistics
Edge co-occurrence probabilities are well studied [1, 8, 6, 11]. Following them, we use random
variables indicating edges at given locations and orientations. More precisely, an edge at position,
orientation (xi, yi, θi), denoted Ei, is a {0, 1} valued random variable. Co-occurrence statistics
examine various aspects of pairwise marginal distributions, which we denote by P (Ei, Ej).
The image formation process endows scene statistics with a natural translation invariance. If the
camera were allowed to rotate randomly about the focal axis, natural scene statistics would also
have a rotational invariance. For computational convenience, we enforce this rotational invariance
by randomly rotating our images. Thus,
P (E(xi,yi,θi), ..., E(xj ,yj ,θj )) = P (E(xi+δx,yi+δy,θi+δθ), ..., E(xj +δx,yj +δy,θj +δθ))
We can then estimate joint distributions of nearby edges by looking at patches of edges centered at
a (position, orientation) location (xi, yi, θi) and rotating the patch into a canonical orientation and
position that we denote E0 = E(x0,y0,θ0).
P (E(xi,yi,θi), ..., E(xj ,yj ,θj )) = P (E(xi−xj ,yi−yj ,θi−θj ), ..., E(x0,y0,θ0))
August and Zucker, 2000
Geisler et al, 2001
Elder & Goldberg, 2002
Figure 1: Association fields derive from image co-occurrence statistics. We interpret them as illus-
trating the probability (likelihood) of an edge near a horizontal edge at the center position.
Several examples of statistics derived from the distribution of P (Ei, E0) are shown in Fig. 1. These
are pairwise statistics of oriented edges in natural images. The most important visible feature of
these pairwise statistics is that of good continuation: Conditioned on the presence of an edge at the
center, edges of similar orientation and horizontally aligned with the edge at the center have high
probability. Note that all of the above implicitly or explicit enforced rotation invariance, either by
only examining relative orientation with respect to a reference orientation or by explicit rotation of
the images.
It is critical to estimate the degree to which these pairwise statistics characterize the full joint dis-
tribution of edges (Fig. 2). Many models for neural firing patterns imply relatively low order joint
statistics. For example, spin-glass models imply pairwise statistics are sufficient, while Markov
random fields have an order determined by the size of neighborhood cliques.
3 Contingency Table Analysis
To test whether the joint distribution of edges can be well described by pairwise statistics, we per-
formed a contingency table analysis of edge triples at two different threshold levels. We computed
estimated joint distributions for each triple of edges in an 11× 11× 8 patch, not constructed to have
an edge at the center. Using a χ2 test, we computed the probability that each edge triple distribution
could occur under hypothesis H0 : {No three way interaction}. This is a test of the hypothesis that
log P (Ei, Ej, Ek) = f (Ei, Ej) + g(Ej, Ek) + h(Ei, Ek)
2
Figure 2: Two approximately equally likely triples of edges under the pairwise independence as-
sumption of Elder et. al. Conditional independence is one of several possible pairwise distributional
assumptions. Intuitively, however, the second triple is much more likely. We examine third-order
statistics to demonstrate that this is in fact the case.
for each triple (Ei, Ej, Ek), and includes the cases of independent edges, conditionally independent
edges, and other pairwise interactions. For almost all triples, this probability was extremely small.
(The few edge triples for which the null hypothesis cannot be rejected consisted of edges that were
spaced very far apart, which are far more likely to be nearly statistically independent of one another.)
n = 150705016
percentage of triples where pH0 > .05
threshold = .05
0.0082%
threshold = .1
0.0067%
4 Counting Triple Probabilities
We chose a random sampling of black and white images from the van Hataren image dataset[10].
They were randomly rotated and then filtered using oriented Gabor filters covering 8 angles from
[0, π). Each Gabor has a carrier period of 1.5 pixels per radian and an envelope standard deviation of
5 pixels. The filters were convolved in near quadrature pairs, squared and summed. To restrict anal-
ysis to the statistics of curves, we applied local non-maxima suppression across orientation columns
in a direction normal to the given orientation. This removes effects of filter blurring and oriented tex-
ture patterns (considered shortly). The resulting edge maps were subsampled to eliminate statistical
dependence due to overlapping filters.
Thresholding the edge map yields E : U → {0, 1}, where U ⊂ R2 × S is a discretization of R2 × S.
We treat E as a function or a binary vector as convenient. We randomly select 21 × 21 × 8 image
patches with an oriented edge at the center, and denote these characteristic patches by Vi
(a)
(b)
Figure 3: Example image (a) and edges (b) for statistical analysis. Note: color corresponds to
orientation
3
Since edges are significantly less frequent than their absence, we focus on (positive) edge co-
occurance statistics. For simplicity, we denote P (Ei = 1, Ej = 1, Ek = 1) by P (i, j, k) (A
small orientation anisotropy has been reported in natural scenes (e.g., [9]), but does not appear in
our data because we effectively averaged over orientations by randomly rotating the images.)
We compute the matrix P (i, j0) where
P (i, j0) = P (Ei = 1, Ej = 1E0 = 1)
n(cid:88)
i=1
∼ 1
n
ViV T
i
where Vi is a (vectorized) random patch of edges centered around an edge with orientation θi = 0.
5 Visualizing Triples of Edges
By analogy with the pairwise analysis above, we seek to find those edge triples that frequently co-
occur. But this is significantly more challenging. For pairwise statistics, one simply fixes an edge to
lie in the center and "colors" the other edge by the joint probability of the co-occurring pair (Fig. 1).
No such plot exists for triples of edges. Even after conditioning, there are over 12 million edge
triples to consider.
Our trick: Embed edges in a low dimensional space such that the distance between the edges rep-
resents the relative likelihood of co-occurrence. We shall do this in a manner such that distance in
Embedded Space ∼ Relative Probability.
As before, let Ei be a binary random variable, where Ei = 1 means there is an edge at location
vi = (xi, yi, θi). We define a distance between edges
+(vi, vj) = P (i, i0) − 2P (i, j0) + P (j, j0)
D2
The first and the last terms represent pairwise co-occurrence probabilities; i.e., these are the asso-
ciation field. The middle term represents the interaction between Ei and Ej conditioned on the
presence of E0. Thus this distance is zero if the edges always co-occur in images, given the hori-
zontal edge at the origin, and is large if the pair of edges frequently occur with the horizontal edge
but rarely together. (The relevance to learning is discussed below.)
We will now show how, for natural images, edges can be placed in a low dimensional space where
the distance in that space will be proportional to this probabilistic distance.
6 Dimensionality Reduction via Spectral Theorem
Exploiting the fact that P (i, j0) is a positive semi-definite matrix, we introduce the spectral expan-
sion
P (i, j0) =
λlφl(i)φl(j)
l=1
n(cid:88)
(cid:32) xi
(cid:112)
yi
θi
(cid:33)
→ Rn
where φl is an eigenvector of the K matrix.
Define the SPECTRAL EMBEDDING Φ :
Φ(vi) = {(cid:112)
λ1φ1(i),
λ2φ2(i), ...,
(cid:112)
λnφn(i)}
(1)
The Euclidean distance between embedded points is then
(cid:107)Φ(vi) − Φ(vj)(cid:107)2 = (cid:104)Φ(vi), Φ(vi)(cid:105) − 2(cid:104)Φ(vi), Φ(vj)(cid:105) + (cid:104)Φ(vj), Φ(vj)(cid:105)
= P+(i, i0) − 2P+(i, j0) + P+(j, j0)
= D2
+(vi, vj)
4
Figure 4: Spectrum of P (i, j0). Other spectra are similar. Note rapid decay of the spectrum indi-
cating the diffusion distance is well captured by embedding using only the first few eigenfunctions.
Φ maps edges to points in an embedded space where squared distance is equal to relative probability;
we refer to this as diffusion distance.
The usefulness of this embedding comes from the fact that the spectrum of P (i, j, 0) decays rapidly
(Fig. 6). Therefore we truncate Φ, including only dimensions with high eigenvalues. This gives a
dramatic reduction in dimensionality, and allows us to visualize the relationship between triples of
edges (Fig. 6).
φ2
φ3
φ4
Figure 5: Display of third-order edge structure showing how oriented edges are related to their
spectral embeddings. (top) Spectral embeddings. Note clusters of co-occuring edges. (bottom) Edge
distributions. The eigenvectors of P (i, j, 0) are used to color both the edges and the embedding.
Clusters of edges in this embedding have a high probability of co-occurring along with the edge in
the center. Compare with Fig. 1 where red edges all have high probability of occurring with the
center, but no information is known about their co-occurrence probability.
To highlight information not contained in the association field, we normalized our probability matrix
by its row sums, and removed all low-probability edges. Embedding the mapping from R2 × S →
Rm reveals the cocircular structure of edge triples in the image data (Fig. 5. The colors along each
column correspond, so similar colors map to nearby points along the dimension corresponding to
the row. Under this dimensionality reduction, each small cluster in diffusion space corresponds to
half of a cocircular field. In effect, the coloring by φ2 shows good continuation in orientation (with
our crude quantization) while the coloring by φ4 shows co-circular connections. In effect, then, the
association field is the union of co-circular connections, which also follows from marginalizing the
third-order structure away. We used 40,000 (21 × 21 × 8) patches.
5
051015202530354000.20.40.60.811.2lambdaSpectrum of co−occurance kernel−0.2−0.15−0.1−0.0500.050.10.15−0.2−0.15−0.1−0.0500.050.10.15phi2(x)phi4(x)Diffusion map colored by phi2−0.2−0.15−0.1−0.0500.050.10.15−0.2−0.15−0.1−0.0500.050.10.15phi2(x)phi4(x)Diffusion Map colored by phi3−0.2−0.15−0.1−0.0500.050.10.15−0.2−0.15−0.1−0.0500.050.10.15phi2(x)phi4(x)Diffusion Map colored by phi47
Implications: "Cells that fire together wire together"
Shown above are low dimensional projections of the diffusion map and their corresponding color-
ings in R2 × S. To provide a neural interpretation of these results, let each point in R2 × S represent
a neuron with a receptive field centered at the point (x, y) with preferred orientation θ. Each cluster
then signifies those neurons that have a high probability of co-firing given that the central neuron
fires, so clusters in diffusion coordinates should be "wired" together by the Hebbian postulate. Such
curvature-based facilitation can explain the non-monotonic variance in excitatory long-range hori-
zontal connections in V1 [3, 4]. It may also have implications for the receptive fields of V2 neurons.
As clusters of co-circular V1 complex cells are correlated in their firing, it may be efficient to rep-
resent them with a single cell with excitatory feedforward connections. This predicts that efficient
coding models that take high order interactions into account should exhibit cells tuned to curved
boundaries.
Our approach also has implications beyond excitatory connections for boundary facilitation. We
repeated our conditional spectral embedding, but now conditioned on the absence of an edge at the
center (Fig. 6). This could provide a model for inhibition, as clusters of edges in this embedding are
likely to co-occur conditioned on the absence of an edge at the center. We find that the embedding is
only one dimensional, with the significant eigenvector a monotonic function of orientation difference
from the center orientation. Compared to excitatory connections, this suggests that inhibition is
relatively unstructured, and agrees with many neurobiological studies.
Figure 6: Embeddings conditioned on the absence of an edge at the center location. Note how
less structured it is, compared to the positive embeddings. As such it could serve as a model for
inhibitory connections, which span many orientations.
Finally, we repeated this third-order analysis (but without local non-maxima supression) on a struc-
tured model for isotropic textures on 3D surfaces and again found a curvature dependency (Fig. 7).
Every 3-D surface has a pair of associated dense texture flows in the image plane that correspond to
the slant and tilt directions of the surface. For isotropic textures, the slant direction corresponds to
the most likely orientation signalled by oriented filters. Hence, the distribution of these directions in
3-D shape are an excellent proxy for measuring the response of orientation filters to dense textured
objects.
As this is a representation of a dense vector field, it is more difficult to interpret than the edge map.
We therefore applied k-means clustering in the embedded space and segmented the resulting vector
field. The resulting clusters show two-sided continuation of the texture flow with a fixed tangential
curvature (Fig. 8).
In summary, then, we have developed a method for revealing third-order orientation structure by
spectral methods. It is based on a diffusion metric that makes third-order terms explicit, and yields
a Euclidean distance measure by which edges can be clustered. Given that long-range horizontal
connections are consistent with these clusters, how biological learning algorithms converge to them
remains an open question. Given that research in computational neuroscience is turning to third-
order [12] and specialized interactions, this question now becomes more pressing.
6
(cid:239)10(cid:239)50510(cid:239)1001012345678−0.2−0.15−0.1−0.0500.050.10.15−0.2−0.15−0.1−0.0500.050.10.15(a)
(b)
φ2
φ3
φ4
Figure 7: (top) Oriented textures provide information about surface shape.
(bottom) As before,
we looked at the conditional co-occurrence matrices of edge orientations over a series of randomly
generated shapes. Slant orientations and embedding colored by each eigenvector. The edge map is
thresholded to contain only orientations of high probability. The resulting embedding φ(vi) of those
orientations is shown below. The eigenvectors of P (i, j, 0) are used to color both the orientations and
the embedding. Clusters of orientations in this embedding have a high probability of co-occurring
along with the edge in the center.
Figure 8: Clustering of dense texture flows. Color corresponds to the cluster index. Clusters were
separated into different figures so as to minimize the x, y overlap of the orientations. Embedding on
the right is identical to the embeddings above, but viewed along the φ3, φ4 axes.
References
[1] Jonas August and Steven W Zucker. The curve indicator random field: Curve organization
via edge correlation. In Perceptual organization for artificial vision systems, pages 265 -- 288.
Springer, 2000.
7
−0.06−0.04−0.0200.02−0.1−0.0500.050.1−0.1−0.0500.050.1−0.06−0.04−0.0200.02−0.1−0.0500.050.1−0.1−0.0500.050.1−0.06−0.04−0.0200.02−0.1−0.0500.050.1−0.1−0.0500.050.1−0.0500.05−0.06−0.04−0.0200.020.040.060.08−0.08−0.06−0.04−0.0200.020.040.060.080.1[2] A.J. Bell and T.J. Sejnowski. The independent components of natural scenes are edge filters.
Vision research, 37(23):3327 -- 3338, 1997.
[3] O. Ben-Shahar and S. Zucker. Geometrical computations explain projection patterns of long-
range horizontal connections in visual cortex. Neural Computation, 16(3):445 -- 476, 2004.
[4] William H Bosking, Ying Zhang, Brett Schofield, and David Fitzpatrick. Orientation selectivity
and the arrangement of horizontal connections in tree shrew striate cortex. The Journal of
Neuroscience, 17(6):2112 -- 2127, 1997.
[5] Heather J. Chisum, Franois Mooser, and David Fitzpatrick. Emergent properties of layer 2/3
neurons reflect the collinear arrangement of horizontal connections in tree shrew visual cortex.
The Journal of Neuroscience, 23(7):2947 -- 2960, 2003.
[6] James H Elder and Richard M Goldberg. Ecological statistics of gestalt laws for the perceptual
organization of contours. Journal of Vision, 2(4), 2002.
[7] J.H. Elder and RM Goldberg. The statistics of natural image contours. In Proceedings of the
IEEE Workshop on Perceptual Organisation in Computer Vision. Citeseer, 1998.
[8] WS Geisler, JS Perry, BJ Super, and DP Gallogly. Edge co-occurrence in natural images
predicts contour grouping performance. Vision research, 41(6):711 -- 724, 2001.
[9] Bruce C Hansen and Edward A Essock. A horizontal bias in human visual processing of
orientation and its correspondence to the structural components of natural scenes. Journal of
Vision, 4(12), 2004.
[10] J. H. van Hateren and A. van der Schaaf.
Independent component filters of natural images
compared with simple cells in primary visual cortex. Proceedings: Biological Sciences,
265(1394):359 -- 366, Mar 1998.
[11] Norbert Kruger. Collinearity and parallelism are statistically significant second-order relations
of complex cell responses. Neural Processing Letters, 8(2):117 -- 129, 1998.
[12] Ifije E Ohiorhenuan and Jonathan D Victor. Information-geometric measure of 3-neuron fir-
ing patterns characterizes scale-dependence in cortical networks. Journal of computational
neuroscience, 30(1):125 -- 141, 2011.
[13] Bruno A Olshausen et al. Emergence of simple-cell receptive field properties by learning a
sparse code for natural images. Nature, 381(6583):607 -- 609, 1996.
[14] T.K. Sato, I. Nauhaus, and M. Carandini. Traveling waves in visual cortex. Neuron, 75(2):218 --
229, 2012.
[15] Gasper Tkacik, Jason S Prentice, Jonathan D Victor, and Vijay Balasubramanian. Local statis-
tics in natural scenes predict the saliency of synthetic textures. Proceedings of the National
Academy of Sciences, 107(42):18149 -- 18154, 2010.
[16] JH Van Hateren. A theory of maximizing sensory information. Biological cybernetics,
68(1):23 -- 29, 1992.
[17] William E Vinje and Jack L Gallant. Sparse coding and decorrelation in primary visual cortex
during natural vision. Science, 287(5456):1273 -- 1276, 2000.
8
|
1210.6989 | 1 | 1210 | 2012-10-25T20:01:51 | The impact of short term synaptic depression and stochastic vesicle dynamics on neural variability | [
"q-bio.NC"
] | Neural variability plays a central role in neural coding and neuronal network dynamics. Unreliability of synaptic transmission is a major source of neural variability: synaptic neurotransmitter vesicles are released probabilistically in response to presynaptic spikes and are recovered stochastically in time. The stochastic dynamics of this process interacts with variability in the arrival times of presynaptic spikes to shape the variability of the postsynaptic response. We use continuous time Markov chain methods to analyze a model of short term synaptic depression with stochastic vesicle dynamics coupled with three different models of presynaptic spiking: one model in which the timing of presynaptic spikes are modeled as a Poisson process, one in which spikes occur more regularly than a Poisson process and one in which spikes occur more irregularly. We use this analysis to investigate how variability in a presynaptic spike train is transformed by short term synaptic depression and stochastic vesicle dynamics to determine the variability of the postsynaptic response to a presynaptic spike train. We find that regular presynaptic spiking increases the average rate at which vesicles are released, that the number of vesicles released over a time window is more variable for smaller time windows than for larger time windows, and that fast presynaptic spiking gives rise to Poisson-like variability of the postsynaptic response even when presynaptic spike times are highly non-Poisson. Our results complement and extend previously reported theoretical results and provide possible explanations for some trends observed in recorded data. | q-bio.NC | q-bio | The impact of short term synaptic depression and
stochastic vesicle dynamics on neuronal variability
Steven Reich · Robert Rosenbaum
2
1
0
2
t
c
O
5
2
]
.
C
N
o
i
b
-
q
[
1
v
9
8
9
6
.
0
1
2
1
:
v
i
X
r
a
Abstract Neuronal variability plays a central role in
neural coding and impacts the dynamics of neuronal
networks. Unreliability of synaptic transmission is a
major source of neural variability: synaptic neurotrans-
mitter vesicles are released probabilistically in response
to presynaptic action potentials and are recovered stochas-
tically in time. The dynamics of this process of vesicle
release and recovery interacts with variability in the
arrival times of presynaptic spikes to shape the vari-
ability of the postsynaptic response. We use continuous
time Markov chain methods to analyze a model of short
term synaptic depression with stochastic vesicle dynam-
ics coupled with three different models of presynaptic
spiking: one model in which the timing of presynaptic
action potentials are modeled as a Poisson process, one
in which action potentials occur more regularly than a
Poisson process and one in which action potentials oc-
cur more irregularly. We use this analysis to investigate
how variability in a presynaptic spike train is trans-
formed by short term depression and stochastic vesicle
dynamics to determine the variability of the postsynap-
tic response. We find that regular presynaptic spiking
increases the average rate at which vesicles are released,
that the number of vesicles released over a time win-
This work supported by National Foundation of Science grant
NSF-EMSW21-RTG0739261 and National Institute of Health
grant NIH-1R01NS070865-01A1.
Steven Reich
Department of Mathematics, University of Pittsburgh, Pitts-
burgh PA, USA
Robert Rosenbaum (corresponding author)
Department of Mathematics and Center for the Neural Basis
of Cognition, University of Pittsburgh, Pittsburgh PA, USA
Tel.: +1412-624-8375
Fax: +1412-624-83970
E-mail: [email protected]
dow is more variable for smaller time windows than
larger time windows and that fast presynaptic spiking
gives rise to Poisson-like variability of the postsynaptic
response even when presynaptic spike times are non-
Poisson. Our results complement and extend previously
reported theoretical results and provide possible expla-
nations for some trends observed in recorded data.
Keywords Short term depression · Synaptic variabil-
ity · Fano factor
1 Introduction
Variability of neural activity plays an important role in
population coding and network dynamics [21]. Random
fluctuations in the number of action potentials emitted
by a population of neurons affects the firing rate of
downstream cells [50,49]. In addition, spike count vari-
ability over both short and long timescales can impact
the reliability of a rate-coded signal [16]. It is therefore
important to understand how this variability is shaped
by synaptic and neuronal dynamics.
Several studies examine the question of how intrin-
sic neuronal dynamics interact with variability in presy-
naptic spike timing to determine the statistics of a post-
synaptic neuron's spiking response, but many of these
studies do not account for dynamics and variability in-
troduced at the synaptic level by short term synaptic
depression and stochastic vesicle dynamics. Synapses
release neurotransmitter vesicles probabilistically in re-
sponse to presynaptic spikes and recover released vesi-
cles stochastically over a timescale of several hundred
milliseconds [65,22]. The dynamics and variability in-
troduced by short term depression and stochastic vesi-
cle dynamics alter the response properties of a postsy-
naptic neuron [60,2,10,34,26,48,25,28,17,19,44,6,43]
and therefore play an important role in information
2
Steven Reich, Robert Rosenbaum
transfer [63,18,24,36,45], neural coding [57,12,1,27,20,
32,40] and network dynamics [55,23,7,62,56,5]. Under-
standing how variability in presynaptic spike times in-
teract with short term depression and stochastic vesicle
dynamics to determine the statistics of the postsynaptic
response is therefore an important goal.
In this study, we use a model of short term synap-
tic depression with stochastic vesicle dynamics to ex-
amine how variability in a presynaptic input is trans-
ferred to variability in the synaptic response it pro-
duces. We use the theory of continuous-time Markov
chains to construct exact analytical methods for calcu-
lating the the statistics of the postsynaptic response to
three different presynaptic spiking models: one model
with Poisson spike arrival times, one with more regular
spike arrival times, and one with more irregular spike
arrival times. We find that depressing synapses shape
the timescale over which neuronal variability occurs:
the number of neurotransmitter vesicles released over
a time interval is highly variable for shorter time win-
dows, but less variable for longer time windows when
variability is quantified using Fano factors. Addition-
ally, we find that when presynaptic inputs are highly ir-
regular (Fano factor greater than 1), synaptic dynamics
cause a reduction in Fano factor, consistent with pre-
vious studies [26,25,18,19]. On the other hand, when
presynaptic input is more regular (Fano factor less than
1), synaptic dynamics often cause an increase in Fano
factor. This observation suggests a mechanism through
which irregular and Poisson-like variability can be sus-
tained in spontaneously spiking neuronal networks [54,
51,8,9,35,11], which complements previously proposed
mechanisms [58,61,52,29,33].
2 Methods
We begin by introducing the synapse model used through-
out this study. We then proceed by analyzing the statis-
tics of the synaptic response to three different input
models.
2.1 Synapse model
A widely used model of depressing synapses [57,2,55,
34,48] does not capture stochasticity in vesicle recovery
and release. As a result, this model underestimates the
variability of the synaptic response [19,43]. For this rea-
son, we use a more detailed synapse model that takes
stochastic recovery times and probabilistic release into
account [60,62,22,43].
We consider a presynaptic neuron with spike train
I(t) = Pj δ(t − tj) that makes M functional contacts
onto a postsynaptic cell. Here, tj is the time of the
jth presynaptic action potential. Define m(t) to be the
number of contacts with a readily releasable neuro-
transmitter vesicle at time t (so that 0 ≤ m(t) ≤ M ).
For simplicity, we assume that each contact can release
at most one neurotransmitter vesicle in response to a
presynaptic spike. When a presynaptic spike arrives,
each contact with a releasable vesicle releases its vesi-
cle independently with probability pr. After releasing
a vesicle, a synaptic contact enters a refractory period
during which it is unavailable to release a vesicle again
until it recovers by replacing the released vesicle. The
recovery time at a single contact is modeled as a Pois-
son process with rate 1/τu. Equivalently, the duration of
the refractory period is exponentially distributed with
mean τu.
Define wj to be the number of contacts that release
a vesicle in response to the presynaptic spike at time
tj (so that 0 ≤ wj ≤ m(t−
j ) =
m(t)). The synaptic response is quantified by
limt→t−
the marked point process
j ) ≤ M where m(t−
j
x(t) =Xj
wjδ(t − tj).
Since the signal observed by the postsynaptic cell is de-
termined by x(t), we quantify synaptic response statis-
tics in terms of the statistics of x(t) in our analysis. The
process x(t) can be convolved with a post-synaptic re-
sponse kernel to obtain the conductance induced on the
postsynaptic cell [43]. The effects of this convolution on
response statistics is well understood [53], so we do not
consider it here.
This model can be described more precisely using
the equation [43]
dm(t) = −dNx(t) + dNu(t)
where dNu(t) = u(t)dt is the increment of an inhomo-
geneous Poisson process with instantaneous rate that
depends on m(t) through hdNu(t)i m(t)i = dt(M −
m(t))/τu (here, h· ·i denotes conditional expectation),
0 x(s)ds is the number of vesicles released up
to time t, and each wj is a binomial random variable
with mean prm(tj) and variance m(tj)pr(1 − pr).
Nx(t) =R t
2.2 Statistical measures of the presynaptic spike train
and the synaptic response
We focus on steady state statistics in this article, and
therefore assume that the presynaptic spike trains are
stationary and that the synapses have reached statis-
tical equilibrium. The intensity of a presynaptic spike
train is quantified by the mean presynaptic firing rate,
rin = hI(t)i = hNI (T )/T i
Short term depression and neuronal variability
3
where h·i denotes the expected value and
2.3 Model analysis with Poisson presynaptic inputs
NI (T ) =Z T
0
I(s)ds
represents the number of spikes in the time interval
[0, T ]. Temporal correlations in the presynaptic spike
times are quantified by the auto-covariance,
Rin(τ ) = cov(I(t), I(t + τ )),
and the variability in the presynaptic spike train is
quantified by its Fano factor,
Fin(T ) =
var(NI (T ))
T rin
.
For much of this work, we will focus on Fano factors
over large time windows which, through a slight abuse
of notation, we denote by Fin = limT →∞ Fin(T ). To
compute Fano factors, we will often exploit their rela-
tionship to auto-covariance functions,
Fin(T ) =
1
rin Z T
−T
Rin(τ )(1 − τ /T )dτ
and
Fin =
1
rin Z ∞
−∞
Rin(τ )dτ.
(1)
(2)
The statistics of the synaptic response, x(t), are de-
fined analogously to the statistics of I(t). The steady
state rate of vesicle release is defined as
rx = hx(t)i = hNx(T )/T i
where Nx(T ) = R T
0 x(s)ds represents the number of
vesicles released in the time interval [0, T ]. Temporal
correlations in the synaptic response are quantified by
the auto-covariance,
We first consider a homogeneous Poisson input, I(t),
with rate rin. The input auto-covariance for this model
is given by Rin(τ ) = rinδ(τ ) and the Fano factor is given
by Fin(T ) = 1 for any T > 0. The mean rate of vesicle
release for this model is given by
rx =
M prrin
prrinτu + 1
which saturates to M/τu for large presynaptic rates, rin.
A closed form approximations to the auto-covariance
function of the response for this Poisson input model
are derived in [43,36] (see also [17]) and consist of a
sum of a delta function and an exponential,
Rx(τ ) = Drxδ(τ ) − Erxe−τ /τ0,
(4)
where the mass of the delta function is given by
D =
2pr (rinτu + M − 1) + 2 − pr
2rinτu
(2 − pr)prrinτu + 2
> 0,
(5)
the timescale of the exponential decay is given by
τ0 =
τu
1 + prrinτu
,
and the peak of the exponential is given by
E =
prrin((M − 2)pr + 2)τu + 2(M − 1)pr + 2
M (2 − pr)prrinτu + 2M
rx. (6)
It can easily be checked that E > 0 whenever M ≥ 1,
0 ≤ pr ≤ 1, rin > 0, and τu > 0 so that the peak of the
exponential in (4) is negative. For finite T , the Fano
factor, Fx(T ), is given by
Fx(T ) = D − 2Eτ0 −(cid:16)e− T
and, in the limit of large T ,
τ0 − 1(cid:17) 2Eτ 2
T
0
(7)
(8)
Rx(τ ) = cov(x(t), x(t + τ ))
Fx = D − 2Eτ0.
and response variability is quantified by the Fano factor
of the number of vesicles released,
Fx(T ) =
var(Nx(T ))
T rx
.
As above, we define Fx = limT →∞ Fx(T ) and note that
Fx(T ) =
1
rin Z T
−T
Rx(τ )(1)dτ and Fx =Z ∞
−∞
Rx(τ )dτ.
(3)
To test the accuracy of these approximations, ex-
act solutions can be found numerically using standard
methods for the analysis of continuous-time Markov
chains, as described for alternate input models below.
This analysis is a special case of the analysis for the
"regular" input model described below that is achieved
by taking θ = 1. Alternatively, exact numerical results
can be achieved by taking rs = rf for the "irregular"
input model. In figures showing results for the Poisson
input model, we plot the closed form approximations
described above along with exact numerical results ob-
tained using the regular input model with θ = 1.
4
Steven Reich, Robert Rosenbaum
2.4 Model analysis with irregular presynaptic inputs
then calculated explicitly to obtain
Spike trains measured in vivo often exhibit irregular
spiking statistics indicated by Fano factors larger than
1 [4,15,3,11]. To describe the synaptic response to ir-
regular inputs, we use a model of presynaptic spiking in
which the instantaneous rate of the presynaptic spike
train, I(t), randomly switches between two values, rs
and rf > rs, representing a slow spiking state and a
fast spiking state. The time spent in the slow state
before transitioning to the fast state is exponentially
distributed with mean τs. Likewise, the amount of time
spent in the fast state before switching to the slow state
is exponentially distributed with mean τf . Transition
times are independent from one another and from the
spiking activity. Between transitions, spikes occur as a
Poisson process.
To find rin, Rin(τ ), and Fin, we represent this model
as a doubly stochastic Poisson process. Define r(t) ∈
{rs, rf } to be the instantaneous firing rate at time t.
Then r(t) is a continuous time Markov chain [31] on
the state space Γ = (rs, rf ) with infinitesimal generator
matrix
A =(cid:20) −1/τs 1/τs
1/τf −1/τf(cid:21) .
Clearly, r(t) spends a proportion τs/(τs + τf ) of its
time in the slow state (defined by r(t) = rs) and a pro-
portion τf /(τs + τf ) of its time in the fast state (defined
by r(t) = rf ). This gives a steady-state mean firing rate
of
rin =
rsτs + rf τf
τs + τf
.
At non-zero lags (τ 6= 0), the auto-covariance of a
doubly stochastic Poisson process is the same as the
auto-covariance of r(t) [43], which we can compute us-
ing techniques for analyzing continuous time Markov
chains. For τ > 0, we have
hr(t)r(t + τ )i = rs Pr(r(t) = rs)hr(t + τ ) r(t) = rsi
+ rf Pr(r(t) = rf )hr(t + τ ) r(t) = rf i
=
+
rsτs
τs + τf
rf τf
τs + τf
hr(t + τ ) r(t) = rsi
(9)
hr(t + τ ) r(t) = rf i
where h··i denotes conditional expectation and
hr(t + τ ) r(t) = rsi = rs Pr(r(t + τ ) = rs r(t) = rs)
+ rf (1 − Pr(r(t + τ ) = rs r(t) = rs)).
The probability in this expression can be written in
terms of an exponential of the generator matrix, A, and
Pr(r(t + τ ) = rs r(t) = rs) =(cid:20)eAT τ(cid:18) 1
0(cid:19)(cid:21)1
τf e
=
− τ
τf
− τ
τs + τs
τf + τs
where [v]k denotes the kth component of a vector, v.
An identical calculation can be performed to obtain an
analogous expression for hr(t + τ ) r(t) = rf i. Combin-
ing these with Eq. (9) gives
hr(t)r(t + τ )i =
τf τs (rf − rs)2
(τf + τs)2
− τ
τs
e
− τ
τf + r2
in.
For positive τ , we have Rin(τ ) = hr(t)r(t + τ )i − r2
in . As
with all stationary point processes Rin(τ ) = Rin(−τ )
and Rin(τ ) has a Dirac delta function with mass rin
at the origin [14]. Thus, the auto-covariance of I(t) is
given by
Rin(τ ) = rinδ(τ ) +
τf τs (rf − rs)2
(τf + τs)2
− τ
τs
− τ
τf .
e
(10)
For finite T , the Fano factor, Fin(T ), can be computed
using Eqs. (1) and (10). In the limit of large T , we can
use Eqs. (2) and (10) to obtain a closed form expression,
Fin = 1 +
2τ 2
f τ 2
s (rf − rs)2
(τf + τs)2 (rf τf + rsτs)
.
(11)
Poisson spiking is recovered by setting rf = rs,
τf = 0, or τs = 0. For any other parameter values (i.e.,
when rf 6= rs and τf , τs > 0), it follows from Eq. (11)
that Fin(T ) > 1 for any T . Therefore this input model,
hereafter referred to as the "irregular spiking" model,
represents spiking that is more irregular than a Poisson
process.
The analysis in [43] used to derive closed form ex-
pressions for the response statistics with Poisson in-
puts cannot easily be generalized to derive expressions
with non-Poisson inputs like those considered here. In-
stead, we analyze the synaptic response for the irregu-
lar input model using techniques for analyzing contin-
uous time Markov chains. First note that the process
b(t) = (m(t), r(t)) is a continuous-time Markov chain on
the discrete state space {0, 1, . . . , M } × {rs, rf }. Here,
m(t) denotes the size of readily releasable pool and r(t)
represents the instantaneous presynaptic rate (which
switches between rs and rf ). We enumerate all 2(M +1)
elements of this state space and denote the jth ele-
ment of this enumeration as Γj = (mj, rj) for j =
1, . . . , 2(M + 1).
Short term depression and neuronal variability
5
The infinitesimal generator, B, of b(t) is a 2(M +
1) × 2(M + 1) matrix with off-diagonal terms defined
by the instantaneous transition rates,
Bj,k = lim
h→0
1
h
Pr(b(t + h) = Γk b(t) = Γj), j 6= k (12)
and with diagonal terms chosen so that the rows sum
to zero: Bj,j = −Pk6=j Bj,k [31].
To fill the matrix B, we consider each type of tran-
sition that the process b(t) undergoes. Vesicle recovery
events occur at the instantaneous rate (M − m(t))/τu
and increment the value of m(t) by one vesicle. There-
fore
lim
h→0
1
h
Pr(b(t+h) = (m+1, r) b(t) = (m, r)) =
M − m
τu
for m ∈ {0, . . . , M − 1} and r ∈ {rs, rf }. Vesicle release
events occur at the instantaneous rate r(t) and decre-
ment the value of m(t) by a random amount k with a
binomial distribution so that
lim
h→0
1
h
r
Pr(b(t + h) = (m − k, r) b(t) = (m, r)) =
m!
(m − k)!
pr
k(1 − pr)m−k
for m ∈ {1, . . . , M }, k ∈ {0, . . . , m}, and r ∈ {rs, rf }.
The value of r(t) switches from rs to rf with instanta-
neous rate 1/τs so that
lim
h→0
1
h
Pr(b(t + h) = (m, rf ) b(t) = (m, rs)) =
and, similarly,
lim
h→0
1
h
Pr(b(t + h) = (m, rs) b(t) = (m, rf )) =
1
τs
1
τf
.
These four transition types account for all of the tran-
sitions that b(t) undergoes. They can be used to fill
the off-diagonal terms of the matrix B. The diagonal
terms are then filled to make the rows sum to zero, as
discussed above.
Once a the infinitesimal generator matrix, B, is ob-
tained, the probability distribution of b(t) given an ini-
tial distribution p(0) is given by
p(t) = etBT
p(0).
The stationary distribution, p0, of b(t) is given by the
vector in the one-dimensional null space of B with ele-
ments that sum to one [31].
The instantaneous rate of vesicle release, conditioned
on the current state of r(t) and m(t), is given by
hx(t) r(t) = r, m(t) = mi = rprm.
Averaging over r and m in the steady state gives
rx =
2(M+1)
Xj=1
[p0]jrj prmj
where [·]j denotes the jth element. The auto-covariance,
Rx(τ ), has a Dirac delta function at τ = 0. We separate
this delta function from the continuous part by writing
Rx(τ ) = Axδ(τ ) + R+
x (τ ) is a continuous
function. The area of the delta function can be found by
conditioning on the current state of r(t) in the steady
state to get
x (τ ) where R+
Ax = lim
t→∞
= lim
t→∞
hx(t)2dti
hdN 2
x (t)/dti
2(M+1)
=
Xj=1
rj[p0]j lim
k→∞
hw2
k m(t−
k ) = mji
(13)
where wk is the number of vesicles released by the
kth presynaptic spike. Conditioned on the size, m(t−
k ),
of the readily releasable pool immediately before the
presynaptic spike arrives, wk has a binomial distribu-
tion with second moment,
lim
k→∞
hw2
k m(t−
k ) = mji = mjpr(1 − pr) + m2
j pr
2
which can be substituted into Eq. (13) to calculate Ax.
All that remains is to calculate the continuous part,
R+
x (τ ), of Rx(τ ). First note that, for τ > 0,
lim
t→∞
hx(t)x(t + τ )i
2(M+1)
=
[p0]i Pr(b(t + τ ) = Γj b(t) = Γi)
(14)
Xi,j=1
× hdNx(t)dNx(t + τ ) b(t) = Γi, b(t + τ ) = Γji/dt2.
The second term in Eq. (14) can be computed as
Pr(b(t + τ ) = Γj b(t) = Γi) = [eτ BT
ei]j = [eτ BT
]j,i
where ei is the 2(M + 1) × 1 vector whose ith element is
1 and all other elements are zero, which represents an
initial distribution concentrated at Γi. The last term in
Eq. (14) is given by
hdNx(t)dNx(t + τ ) b(t) = Γi, b(t + τ ) = Γji/dt2 =
rirjpr
2mimj.
Finally, R+
so that
x (τ ) = limt→∞hx(t)x(t + τ )i − r2
x for τ 6= 0
Rx(τ ) =
Axδ(τ ) − r2
x +
2(M+1)
Xi,j=1
[p0]iheτ BTij,i
rirjpr
2mimj
6
Steven Reich, Robert Rosenbaum
which can be computed efficiently using matrix multi-
plication. The response Fano factor, Fx, can then be
found by integrating Rx(τ ) according to Eqs. (1) and
(2).
2.5 Model analysis with regular presynaptic inputs
We now consider a spiking model that gives Fano fac-
tors smaller than 1 and therefore spike trains that are
more regular than Poisson processes. We achieve this by
defining a renewal process with gamma-distributed in-
terspike intervals (ISIs). Such a process can be obtained
by first generating a Poisson process,Pk δ(t − sk) with
rate r = θ rin for some positive integer θ, then keep-
ing only every θth spike to build the spike train I(t).
More precisely, the first spike of the gamma process is
obtained by choosing an integer, k, uniformly from the
set {1, . . . , θ} and defining defining t1 = sk. The re-
maining spikes are defined by tj+1 = sjθ+k to obtain
the stationary renewal process, I(t) =Pj δ(t − tj) [13].
Clearly, this process has rate rin since the original
Poisson process has rate θrin and a proportion 1/θ of
these spikes appear in I(t). The auto-covariance is given
by [42]
Rin(τ ) = rinδ(τ ) + rin ∞
Xk=1
fk(τ ) − rin! .
(15)
where
fk(t) =
tkθ−1(θrin)kθe−θrint
(kθ − 1)!
is the density of the waiting time between the first spike
and the (k + 1)st spike (i.e., the duration of k consecu-
tive ISIs).
For finite T , the Fano factor, Fin(T ), can be com-
puted using Eqs. (1) and (15). In the limit of large T ,
we can use Eq. (2) or use the fact that, for renewal pro-
cesses, Fin = var(ISI)/hISIi2 where var(ISI) = 1/(r2
inθ)
is the variance and hISIi = 1/rin is the mean of the
gamma distributed ISIs [13]. This gives
Fin =
1
θ
.
Poisson spiking is recovered by setting θ = 1. When
θ > 1, we have that Fin(T ) < 1 for any T . Therefore
this model, hereafter referred to as the "regular" input
model, represents spiking that is more regular than a
Poisson process.
The synaptic response with the regular input model
can be analyzed using methods similar to those used for
the irregular model. We introduce an auxiliary process,
q(t), that transitions sequentially through the state space
{1, . . . , θ}. Once reaching θ, q(t) transitions back to
state 1. Transitions occur as a Poisson process with
rate θrin. The waiting times between transitions from
q = θ to q = 1 are gamma distributed. Thus, to recover
the regular input model, we specify that each transi-
tion from 1 = θ to q = 1 represents a single presynaptic
spike. The process g(t) = (m(t), q(t)) is then a con-
tinuous time Markov chain on the discrete state space
{1, . . . , θ} × {0, . . . , M }. We enumerate all θ(M + 1)
elements of this space and denote the jth element as
Γj = (mj , qj) for j = 1, . . . , θ(M + 1).
The infinitesimal generator, G, which is a θ(M +
1) × θ(M + 1) matrix is defined analogously to the ma-
trix B in Eq. (12) above. The elements of G can be
filled using the following transition probabilities. As for
the irregular input model, vesicle recovery occurs as a
Poisson process with rate (M − m(t))/τu so that
lim
h→0
1
h
Pr(g(t+h) = (m+1, q) g(t) = (m, q)) =
M − m
τu
for m = 0, . . . , M and q = 1, . . . , θ. Transitions that
increment q(t) occur with instantaneous rate, θrin so
that
lim
h→0
1
h
Pr(g(t + h) = (m, q + 1) g(t) = (m, q)) = θrin
for q = 1, . . . , θ − 1 and m = 0, . . . , M . The only other
transitions are those from q(t) = θ to q(t) = 1, which
represent a presynaptic spike and are therefore accom-
panied by a release of vesicles. The transitions con-
tribute the following,
lim
h→0
1
h
Pr(g(t + h) = (1, m − k) g(t) = (θ, m)) =
θrin
m!
(m − k)!
pr
k(1 − pr)m−k
for m ∈ {0, 1, . . . , M } and k ∈ {0, . . . , m}. These tran-
sition rates can be used to fill the off-diagonal terms
of the matrix G. The diagonal terms are then filled so
that the rows sum to zero. The stationary distribution,
p0, of g(t) = (m(t), q(t)) is given by the vector in the
one-dimensional null space of G with elements that sum
to one.
A proportion [p0]γ(k) of time is spent in state (m(t), q(t)) =
(k, θ) where γ(k) represents the index of the element
(k, θ) in the enumeration chosen for Γ (i.e., the index,
j, at which Γj = (k, θ)). In that state, the transition
to q(t) = 1 occurs with instantaneous rate θrin and re-
leases average of prm(t) vesicles. Thus, the mean rate
of vesicle release is given by
rx =
M
Xk=1
θrinprk [p0]γ(k).
As above, we separate the auto-covariance into a
delta function and a continuous part by writing Rx(τ ) =
Short term depression and neuronal variability
Axδ(τ ) + R+
x (τ ) is a continuous function.
The area of the delta function at the origin is given by
x (τ ) where R+
Ax =
M
Xk=1
θrin[p0]γ(k)(cid:0)kpr(1 − pr) + k2pr
2(cid:1)
by an argument identical to that used for the irregular
input model above. Also by a similar argument used for
the irregular input model, we have that
Rx(τ ) =
Axδ(τ ) − r2
x + θ2r2
in
M
Xk,l=1
[p0]γ(k)heτ GTiγ(l),γ(k)
pr
2kl.
2.6 Parameters used in figures
Theoretical results are obtained for arbitrary parameter
values, but for all figures we use a set of parameter val-
ues that are consistent with experimental studies. For
synaptic parameters, we use τu = 700 ms and pr = 0.5
consistent with measurements of short term depression
in pyramidal-to-pyramidal synapses in the rat neocor-
tex [57,22]. We also choose M = 5 which is within the
range observed in several cortical areas [6].
The Poisson presynaptic input model is determined
completely by its firing rate and the regular input model
is determined completely by its firing rate and Fano
factor. Presynaptic firing rates and Fano factors are
reported on the axes or captions of each figure. The
irregular input model has four parameters that deter-
mine the firing rate and Fano factor. In all figures, we
set τb = τs = 1.315/c, rb = 37c, and rs = 3c which
gives a Fano factor of Fin = 20.0017 ≈ 20 for any value
of c (from Eq. (11)). Changing c effectively scales the
timescale of presynaptic spiking, hence scaling rin, with-
out changing Fin.
3 Results
We analyze the synaptic response to different patterns
of presynaptic inputs using a stochastic model of short
term synaptic depression in which a presynaptic neuron
makes M functional contacts onto a postsynaptic neu-
ron [60,22,24,19]. The input to the presynaptic neuron
is a spike train denoted by I(t). Neurotransmitter vesi-
cles are released probabilistically in response to each
presynaptic spike. Specifically, a contact with a readily
available vesicle releases this vesicle with probability pr
in response to a single presynaptic spike. After a synap-
tic contact has released its neurotransmitter vesicle, it
enters a refractory state where it is unable to release
again until the vesicle is replaced. The duration of this
7
in
F = 20
F = 1
F = 0.1
in
in
)
c
e
s
/
s
e
c
s
e
v
(
i
l
x
r
7
6
5
4
3
2
1
0
−1
10
0
10
1
10
r
in
(spikes/sec)
2
10
Fig. 1 Rate of vesicle release as a function of presynaptic
firing rate for various presynaptic Fano factors. The rate
of vesicle release, rx, is an increasing function of presynap-
tic firing rate, rin. Vesicle release is slower for the irregular
spiking model than for the Poisson and regular spiking model.
refractory period is an exponentially distributed ran-
dom variable with mean τu, so that vesicle recovery is
Poisson in nature.
We are interested in how the statistics of the presy-
naptic spike train determine the statistics of the synap-
tic response. The presynaptic statistics are quantified
using the presynaptic firing rate, rin, the presynaptic
auto-covariance function, Rin(τ ), and the Fano factor,
Fin(T ), of the number of presynaptic spikes during a
window of length T . Similarly, we quantify the statistics
of the synaptic response using the mean rate of vesicle
release, rx, the auto-covariance of vesicle release, Rx(τ ),
and the Fano factor, Fx(T ), of the number of vesicles
released during a window of length T . We will espe-
cially focus on Fano factors over large time windows
and define Fin = limT →∞ Fin(T ), Fx = limT →∞ Fx(T )
accordingly. See Methods for more details.
We begin by considering the effect of Fin on the
mean rate of vesicle release, rx. We then examine the
dependence of Fx(T ) on the length, T , of the time win-
dow over which vesicle release events are counted. Fi-
nally, we show that short term synaptic depression pro-
motes Poisson-like responses to non-Poisson presynap-
tic inputs.
3.1 Irregular presynaptic spiking reduces the rate at
which neurotransmitter vesicles are released
We first briefly investigate the dependence of the rate
of vesicle release, rx, on the rate and variability of the
presynaptic spike train, as measured by rin and Fin re-
Steven Reich, Robert Rosenbaum
8
A
)
t
(
I
)
t
(
m
)
t
(
x
3
2
1
0
2
1
0
B
3
2
1
0
2
1
0
0
0.5
1
0
0.5
t (sec)
1
Fig. 2 Synaptic response to an irregular and a regular presynaptic spike train. A) An irregular spike train, I(t), drives
a depressing synapse. Each vesicle release event is indicated by a vertical bar with height indicating the number of vesicles
released (here, all events release just one vesicle). Each time a vesicle is released, the number of available vesicles, m(t), is
decremented accordingly. Vesicle recovery increments m(t) and occurs randomly in time (vesicle recovery events indicated by
filled triangles). B) Same as (A) except for a more regular presynaptic spike train. Note that, even though the same number of
spikes occur in (A) and (B), the irregular spike train is less effective in releasing vesicles. This occurs because all vesicles are
depleted by the first few spikes in a burst and subsequent spikes in that burst are unable to release vesicles. For illustrative
purposes, we set M = 3 in this figure.
spectively. Vesicle release rate generally increases with
rin, but saturates to rx = M/τu whenever prrin ≫ 1/τu
since synapses are depleted in this regime (Fig. 1).
When presynaptic spike times occur as a Poisson
process (so that Fin = 1), the mean rate of vesicle
release is given by rx = M prrin/(prrinτu + 1) [22,19,
43]. Interestingly, vesicle release is slower for more ir-
regular presynaptic spiking and faster for more regular
presynaptic spiking even when presynaptic spikes ar-
rive at the same mean rate (Fig. 1, also see [18]). This
can be understood by noting that, for the irregular in-
put model, spikes arrive in bursts of higher firing rate
followed by durations of lower firing rate. Vesicles are
depleted by the first few spikes in a burst and subse-
quent spikes in that burst are ineffective and therefore
essentially "wasted" spikes (Fig. 2A). When presynap-
tic spikes arrive more regularly, more vesicles are re-
leased on average (Fig. 2B).
3.2 Variability in the number of vesicles released in a
time window decreases with window size
We now consider how the the variability of the synap-
tic response to a presynaptic input depends on the
timescale over which this variability is measured. We
quantify the variability of the synaptic response us-
ing the Fano factor, Fx(T ), which is defined to be the
variance-to-mean ratio of the number of vesicles re-
leased in a time window of length T (see Methods)
and can be calculated from an integral of the auto-
covariance function, Rx(τ ), using Eq. (3).
The auto-covariance of a Poisson presynaptic spike
train is simply a delta function at the origin, Rin(τ ) =
rinδ(τ ), and the Fano factor over any window size is
therefore equal to one, Fin(T ) = 1 (Figs. 3C and 4C).
The auto-covariance of the synaptic response when presy-
naptic inputs are Poisson consists of a delta function
at the origin surrounded by a double-sided exponential
with a negative peak (see Eq. (4) and Fig. 3D) that de-
cays with timescale τ0 = τu/(1 + prrinτu). The fact that
the auto-covariance is negative away from τ = 0 implies
that the Fano factor, Fx(T ), is monotonically decreas-
ing in the window size, T (see Eq. (7) and Fig. 4D).
For small T , the mass of the delta function at the ori-
gin dominates the integral in Eq. (3) so that the Fano
factor is approximately equal to the ratio of this mass
to the mean rate, rx, at which vesicles are released. As
T increases, the negative mass of the exponential peak
subtracts from the positive contribution of the delta
function and decreases the Fano factor. In particular,
Fx(T ) ≈ D − ET + O(T 2) where Drx is the mass of
the delta function in Rx(τ ) and −Erx is the peak of
the exponential in Rx(τ ) (see Eqs. (5) and (6)). As T
continues to increase, Fx(T ) monotonically decreases
towards its limit, Fx := limT →∞ Fx(T ) = D − 2Eτ0.
Thus, short term synaptic depression converts a Fano
factor that is constant with respect to window size into
one that decreases with window size (Fig. 4C,D).
Short term depression and neuronal variability
A
300
)
τ
(
n
i
R
200
100
= 20
F
in
C
= 1
F
in
1
0
−1
9
= 0. 1
F
in
E
0
−200
−400
−2
−1
0
1
2
−0.5
0
0.5
−0.2
0
0.2
B
)
τ
(
x
R
0
−2
−4
−2
−1
0
1
2
τ (sec)
D
0
−10
−20
−0.5
F
0
−20
−40
0
0.5
−0.2
0
0.2
τ
(sec)
τ
(sec)
Fig. 3 Presynaptic auto-covariance functions and auto-covariance of vesicle release for three input models. Auto-
covariance functions of presynaptic spike trains (top row) and the synaptic response they evoke (bottom row) for three
different presynaptic input models: A,B)irregular (Fin = 20), C,D) Poisson (Fin = 1) and E,F) regular (Fin = 0.1). Each
auto-covariance function has a Dirac delta function at the origin that is not depicted here. Dotted line in (D) is from the
approximation in Eq. (4) and solid line is from exact calculation obtained using numerics for the regular input model with
θ = 1 (see Methods), but the two are nearly indistinguishable. Rin(τ ) has units (spikes/sec)2 and Rx(τ ) has units (vesicles/sec)2.
Short term depression introduces negative temporal correlations even when presynaptic spike trains are temporally uncorrelated
(C,D) or positively correlated (A,B).
When presynaptic spike times are not Poisson, the
statistics of the postsynaptic response cannot be de-
rived analytically using the methods utilized for the
Poisson input model. Instead, we use the fact that the
synapse model can be represented using a continuous
time Markov chain, which can be analyzed to derive
expressions for the response statistics in terms of an
infinitesimal generator matrix (see Methods).
Irregular presynaptic spiking (i.e., inputs with Fin >
1) is achieved by varying the rate of presynaptic spik-
ing randomly in time to produce a doubly stochas-
tic Poisson process (see Methods). For this model, the
input auto-covariance is a delta function at the ori-
gin surrounded by an exponential peak (see Eq. 10
and Fig. 3A). The input Fano factor therefore increases
with window size (see Eq. 11 and Fig. 4A). The posi-
tive temporal correlations exhibited in the input auto-
covariance function are canceled by the temporal de-
correlating effects of short term synaptic depression [26,
25,24]. For the parameters chosen in this study, this
de-correlation outweighs the positive presynaptic cor-
relations so that the auto-covariance function of the
response is negative away from τ = 0 (Fig. 3B), al-
though parameters can also be chosen so that temporal
correlations in the response are small and positive [25].
As with the Poisson input model, negative temporal
correlations cause the response Fano factor to decrease
with window size (Fig. 4B). Thus short term synaptic
depression and stochastic vesicle dynamics can convert
a presynaptic Fano factor that increases with window
size into one that decreases.
Regular presynaptic spiking is achieved by generat-
ing a renewal process with gamma-distributed interspike-
intervals. The input auto-covariance function for this
model exhibits temporal oscillations (Eq. (15) and Fig. 3E)
and the Fano factor generally decreases with window
size (Fig. 4E). Perhaps unsurprisingly, the auto-covariance
function of the synaptic response exhibits oscillations
and the response Fano factor decreases with window
size (Figs. 3F and 4F).
For all three input models, the variability of the
synaptic response is larger over shorter time windows
and smaller over larger time windows. A postsynap-
tic neuron that is in an excitable regime will generally
respond most effectively to inputs that exhibit more
variability over short time windows [46,47,39,38]. In
addition, rate coding is often more efficient when spike
counts over larger time windows are less variable [64].
Thus, the dependence of Fx(T ) on window size is espe-
cially efficient for the neural transmission of rate-coded
information [24].
In addition to the temporal dependence of Fx(T )
introduced by short term depression, note that the re-
sponse Fano factor for the irregular input model is sub-
10
A
)
T
(
n
Fi
20
15
10
5
B
1.5
1.4
)
T
(
Fx
1.3
0
=20
F
in
C
=1
F
in
2
1
0
Steven Reich, Robert Rosenbaum
= 0. 1
F
in
E
1
0.8
0.6
0.4
0.2
0
5
10
15
0
1
2
0
0.5
1
D
1.2
1
0.8
F
1.2
1.1
1
0.9
10
5
T (sec)
15
0
1
T (sec)
2
0
0.5
T (sec)
1
Fig. 4 Presynaptic and response Fano factor as a function of window size for three input models. Presynaptic and
response Fano factors, Fin(T ) and Fx(T ), as a function of the window size over which inputs or vesicles are counted (see
Methods), obtained by applying Eq. (1) to the auto-covariance functions in Fig. 3. Short term depression causes response Fano
factor to decrease with window size even when presynaptic Fano factor increases with window size (A,B) or is independent of
window size (C,D). Also, response Fano factors are near 1 even when presynaptic Fano factors are not (B and F).
stantially smaller than the input Fano factor (Fig. 4).
Conversely, the response Fano factor for the regular in-
put model is larger than the input Fano factor (Fig. 4).
For both models, the response Fano factor is substan-
tially nearer to 1 than the input Fano factor. We explain
this phenomenon next.
3.3 Depleted synapses exhibit Poisson-like variability
even when presynaptic inputs are highly non-Poisson
We now investigate the dependence of the variability
in synaptic response on the rate and variability of the
presynaptic input. Since we have already discussed the
dependence of Fx(T ) on T above, we will focus here
on the Fano factor calculated over long time windows,
Fx = limT →∞ Fx(T ).
We first consider parameter regimes where the ef-
fective rate of presynaptic inputs is much slower than
the rate of vesicle recovery (prrin ≪ 1/τu). In such
a regime, each contact is likely to recover between two
consecutive presynaptic spikes and therefore all M con-
tacts are likely to have a vesicle ready to release when
each spike arrives (Fig. 6A). In this limit, the number
of vesicles released by each spike is an independent bi-
nomial variable with mean hwj i = prM and variance
var(wj ) = M pr(1 − pr). The number, Nx(T ), of vesi-
cles released in a time window of length T can then be
represented as a sum of Nin(T ) independent binomial
random variables (i.e., a random sum). The mean of
this sum is given by hNx(T )i = hNin(T )ihwji, which
implies that rx = M prrin in this limit. Similarly, the
variance of this sum is given by [31] var(Nx(T )) =
hNin(T )ivar(wj ) + hwj i2var(Nin(T )), which implies
lim
rin→0
Fx(T ) = hwj iFin(T ) + var(wj )/hwj i
(16)
= 1 + pr(M Fin(T ) − 1).
Eq. (16) is verified for the Poisson input model by tak-
ing rin → 0 in Eqs. (7). For the irregular and regular
input models, Eq. (16) should be interpreted heuristi-
cally, as it was derived heuristically. A counterexample
to Eq. (16) for the irregular input model can be con-
structed by fixing rf and τf , then letting τs → ∞ and
rs → 0 to achieve the rin → 0 limit. In this case, our
assumption that each contact is increasingly likely to
recover between two consecutive spikes is violated and
Eq. (16) is not valid (not pictured). Regardless, we ver-
ify numerically that Eq. (16) is accurate when rin is
decreased toward zero while keeping Fin fixed (Fig. 5).
We now discuss the statistics of the postsynaptic re-
sponse when the effective presynaptic spiking is much
faster than vesicle recovery (prrin ≫ 1/τu). In such a
regime, incoming spikes occur much more frequently
than recovery events and synapses becomes depleted.
As a result, the number of vesicles released over a long
time window is determined predominantly by the num-
ber of recovery events in that time window and largely
independent from the number of presynaptic spikes (Fig. 6B)
Short term depression and neuronal variability
11
A
)
t
(
I
)
t
(
m
)
t
(
x
3
2
1
0
3
2
1
0
B
3
2
1
0
2
1
0
0
1
2
3
4
5
0
0.5
t (sec)
1
Fig. 6 Vesicle release dynamics at low and high presynaptic firing rates. A) At low presynaptic rates, vesicles are
recovered (i.e., m(t) returns to M = 3) between presynaptic spikes. Thus, the number of vesicles released by each presynaptic
spike is approximately an independent binomial random variable with mean prM and variance prM (1 − M ). B) At high
presynaptic rates, vesicles are released almost immediately after they are recovered. Thus, the number of vesicles released over
a time window of length T is approximately a Poisson random variable with mean and variance T M/τu.
[19,43]. The synaptic response therefore inherits the
Poisson statistics of the recovery events so that
lim
rin→∞
Fx(T ) = 1.
For the Poisson input model, this limit can be made
more precise in the T → ∞ limit by expanding Eq. (8)
in terms of the parameter α = 1/(prrinτu) to obtain
Fx = 1 − 2α + 4α2 + O(α3)
(17)
which converges to 1 as rinτu → ∞. For the irregular
and regular input models, we verify in Fig. 5 that Fx →
1 when rin is increased while keeping Fin fixed.
The time constant, τu, at which a synapse recov-
ers from short term depression has been measured in a
number of experimental studies and is often found to
be several hundred milliseconds [57,59,34,23,22,28,41].
Therefore, for even moderate presynaptic firing rates,
synapses are often in a highly depleted state. As dis-
cussed above, this promotes Poisson-like variability in
the synaptic response. This provides one possible mech-
anism through which irregular Poisson-like firing can be
sustained in neuronal populations [11].
4 Discussion
We used continuous time Markov chain methods to de-
rive the response statistics of a stochastic model of short
term synaptic depression with three different presynap-
tic input models. We then used this analysis to un-
derstand how the mean presynaptic firing rate and the
variability of presynaptic spiking interact with synaptic
dynamics to determine the mean rate of vesicle release
and variability in the number of vesicles released. This
analysis revealed a number of fundamental, qualitative
dependencies of response statistics on presynaptic spik-
ing statistics. Some of the dependencies have been pre-
viously noted in the literature and some have not.
The number of vesicles released over a time win-
dow is smaller for irregular inputs than for more reg-
ular inputs (Figs. 1 and 2) given the same number of
presynaptic spikes. Thus, regular presynaptic spiking
is more efficient at driving synapses. This mechanism
competes with a well-known property of excitable cells:
that they are driven more effectively by irregular, posi-
tively correlated synaptic input currents [46,47,39,38].
In addition, a population of presynaptic spike trains
drives a postsynaptic neuron more efficiently when the
population-level activity is more irregular, for example
due to pairwise correlations [19]. Together, these results
suggest that a postsynaptic neuron is most efficiently
driven by presynaptic populations that exhibit small or
negative auto-correlations, but positive pairwise cross-
correlations.
Our model predicts that the de-correlating effects
of short term depression and stochastic vesicle dynam-
ics can produce negative temporal auto-correlations in
the synaptic response even when presynaptic spiking
is temporally uncorrelated or positively correlated, in
agreement with previous studies [25,19]. This yields a
response Fano factor that decreases with window size,
as observed in some recorded data [30]. We note, though,
F
= 20
in
−1
10
0
10
1
10
2
10
F
= 1
in
−1
10
0
10
1
10
2
10
F
= 0.1
in
12
A
Fx
B
64
16
4
1
3
1.75
Fx
1
0.6
1
C
Fx
0.75
0.56
−1
10
0
10
1
10
2
10
r
in
(spikes/sec)
Fig. 5 Response Fano factor as a function of presynap-
tic firing rate for three input models. Response Fano fac-
tors calculated over large windows for A) the irregular input
model B) Poisson input model and C) regular input model.
Fano factors approach 1 at high presynaptic firing rates re-
gardless of the presynaptic Fano factor (triangle on right is
placed at Fx = 1). At low presynaptic firing rates, response
Fano factors approach the value given in Eq. (16) (indicated
by triangle on left). Dotted line in (B) is from closed form ap-
proximation in Eq. (8) and dashed line is from the expansion
given in Eq. (17).
Steven Reich, Robert Rosenbaum
that some parameter choices can yield positively a cor-
related synaptic response when presynaptic inputs are
positively correlated [25] and neuronal membrane dy-
namics can introduce positive correlations to a post-
synaptic spiking response even when synaptic currents
are not positively correlated in time [37]. This is con-
sistent with several studies showing positive temporal
correlations in recorded spike trains [4,15,3,11].
We predict that moderate or high firing rates can in-
duce a Poisson-like synaptic response even when presy-
naptic inputs are non-Poisson (Fig. 5 and [18]). This is
because even moderate firing rates can deplete synapses
and depleted synapses inherit the Poisson-like variabil-
ity of synaptic vesicle recovery (Fig. 6B and [19,43]).
At lower firing rates, short term depression and synap-
tic variability can increase or decrease Fano factor. For
example, in Fig. 5B, the response Fano factor is larger
than the presynaptic Fano factor (Fin = 1) at low firing
rates, decreases at higher firing rates, then approaches
Fx = 1 at higher firing rates. This complex dependence
of firing rate on Fano factor might be related to the
stimulus dependence of Fano factors observed in sev-
eral cortical brain regions [11].
Our conclusion that fast presynaptic spiking causes
Poisson-like variability in the synaptic response relied
on the assumption that vesicle recovery times are ex-
ponentially distributed. The exponential distribution
is a justifiable choice for recovery times only if recov-
ery times obey a memoryless property: having already
waited t units of time for a recovery event, the proba-
bility of waiting an additional s units of time does not
depend on t. The precise mechanics of vesicle re-uptake
and docking determine whether this is an appropriate
assumption. If recovery times have a different probabil-
ity distribution, then the synaptic response will inherit
the properties of this distribution at high presynaptic
firing rates instead of inheriting the Poisson-like nature
of exponentially distributed recovery times.
Previous methods have been developed to analyze
the synaptic response of the model used here. In [18,
24], the model restricted to the M = 1 case is ana-
lyzed for presynaptic spike trains that are renewal pro-
cesses. This includes the Poisson and the regular input
model discussed here, but excludes the irregular input
model in which the spike train is a non-renewal inho-
mogeneous Poisson process. In [43] approximations are
obtained for the case where the presynaptic spike train
is an inhomogeneous Poisson process, but the approx-
imation is only valid when the rate-modulation of the
Poisson process is small compared to the average fir-
ing rate. Thus, these approximations are only valid for
the irregular input model when rf − rs ≪ rs. Other
studies [32,36] use a deterministic synapse model that
Short term depression and neuronal variability
13
implicitly treats the number of available vesicles as a
continuous rather than a discrete quantity. This deter-
ministic model represents the trial average of the model
considered here and can vastly underestimate the vari-
ability of a synaptic response [43].
A more detailed synapse model allows for multiple
docking sites at a single contact [62,19]. This model can
yield different response properties than the model used
here in certain parameter regimes [19]. Even though this
more detailed model can be represented as a continuous-
time Markov chain, the analysis of this model would be
significantly more complex than the analysis considered
here since it would be necessary to keep track of the
number of readily releasable vesicles at each contact
separately. This would result in a Markov chain with
K × N M states where M is the number of contacts, N
is the number of docking sites per contact and K is the
number of states used for the presynaptic input model
(K = 1 for the Poisson input model, K = 2 for the
irregular input model, and K = θ for the regular input
model).
To quantify the synaptic response to a presynaptic
spike train, we focused on the statistics of the num-
ber of vesicles released in a time window. Postsynaptic
neurons observe changes in synaptic conductance in re-
sponse to presynaptic spikes. The synaptic conductance
are often modeled in such a way that they can be easily
derived from our process x(t) through a convolution:
0 x(t − s)α(s)ds where g(t) is the synaptic con-
ductance elicited by a presynaptic spike train and α(s)
is a kernel representing the characteristic postsynaptic
conductance elicited by the release of a single neuro-
transmitter vesicle. Since this mapping is linear, the
statistics of g(t) can easily be derived in terms of the
statistics of x(t) [53,43].
g(t) =R t
References
1. L F Abbott and Wade G Regehr. Synaptic computation.
Nature, 431(7010):796–803, October 2004.
2. L F Abbott, J A Varela, K Sen, and S B Nelson.
Synaptic depression and cortical gain control. Science,
275(5297):220–224, January 1997.
3. R. Baddeley, L.F. Abbott, M.C.A. Booth, F. Sengpiel,
T. Freeman, E.A. Wakeman, and E.T. Rolls. Responses
of neurons in primary and inferior temporal visual cor-
tices to natural scenes. Proceedings of the Royal Society
of London. Series B: Biological Sciences, 264(1389):1775–
1783, 1997.
4. W. Bair, C. Koch, W. Newsome, and K. Britten. Power
spectrum analysis of bursting cells in area mt in the be-
having monkey. The Journal of neuroscience, 14(5):2870–
2892, 1994.
5. F. Barbieri and N. Brunel. Can attractor network mod-
els account for the statistics of firing during persistent
activity in prefrontal cortex? Front in Neurosci, 2(1):114,
2008.
6. Tiago Branco and Kevin Staras. The probability of neu-
rotransmitter release: variability and feedback control at
single synapses. Nature Rev Neurosci, 10(5):373–383, May
2009.
7. P. C. Bressloff. Mean-field theory of globally cou-
pled integrate-and-fire neural oscillators with dynamic
synapses. Phys. Rev. E, 60:2160–2170, Aug 1999.
8. K.H. Britten, M.N. Shadlen, W.T. Newsome, J.A.
Movshon, et al. Responses of neurons in macaque mt to
stochastic motion signals. Visual neuroscience, 10:1157–
1157, 1993.
9. G.T. Buracas, A.M. Zador, M.R. DeWeese, and T.D. Al-
bright. Efficient discrimination of temporal patterns by
motion-sensitive neurons in primate visual cortex. Neu-
ron, 20(5):959–969, 1998.
10. F.S. Chance, S.B. Nelson, and L.F. Abbott. Synaptic
depression and the temporal response characteristics of
v1 cells. J Neurosci, 18(12):4785, 1998.
11. M.M. Churchland, M.Y. Byron, J.P. Cunningham, L.P.
Sugrue, M.R. Cohen, G.S. Corrado, W.T. Newsome,
A.M. Clark, P. Hosseini, B.B. Scott, et al. Stimulus onset
quenches neural variability: a widespread cortical phe-
nomenon. Nature neuroscience, 13(3):369–378, 2010.
12. Daniel L Cook, Peter C Schwindt, Lucinda A Grande,
and William J Spain. Synaptic depression in the local-
ization of sound. Nature, 421(6918):66–70, January 2003.
13. D Cox. Renewal Theory. London: Methuen and Co, 1962.
14. D Cox and V Isham. Point processes. London: Chapman
and Hall, 1980.
15. Y. Dan, J.J. Atick, and R.C. Reid. Efficient coding of
natural scenes in the lateral geniculate nucleus: experi-
mental test of a computational theory. The Journal of
Neuroscience, 16(10):3351–3362, 1996.
16. P. Dayan and L.F. Abbott. Theoretical Neurosci: Compu-
tational and mathematical modeling of neural systems. Tay-
lor & Francis, 2001.
17. J de la Rocha and R Moreno. Correlations modulate
the non-monotonic response of a neuron with short-term
plasticity. Neurocomputing, 2004.
18. J de la Rocha and A Nevado. Information transmission
by stochastic synapses with short-term depression: neural
coding and optimization. Neurocomputing, 2002.
19. Jaime de la Rocha and N´estor Parga. Short-term synaptic
depression causes a non-monotonic response to correlated
stimuli. J Neurosci, 25(37):8416–8431, September 2005.
20. Jaime de la Rocha and N´estor Parga. Thalamocortical
transformations of periodic stimuli: the effect of stimu-
lus velocity and synaptic short-term depression in the
vibrissa-barrel system. J Comput Neurosci, 25(1):122–
140, August 2008.
21. A.A. Faisal, L.P.J. Selen, and D.M. Wolpert. Noise in
the nervous system. Nature Rev Neurosci, 9(4):292–303,
2008.
22. G. Fuhrmann, I. Segev, H. Markram, and M. Tsodyks.
Coding of temporal information by activity-dependent
synapses. J Neurophys, 87(1):140, 2002.
23. M. Galarreta and S. Hestrin.
Frequency-dependent
synaptic depression and the balance of excitation and
inhibition in the neocortex. Nature Neurosci, 1:587–594,
1998.
24. M.S. Goldman. Enhancement of information transmis-
sion efficiency by synaptic failures. Neural Comput,
16(6):1137–1162, 2004.
25. M.S. Goldman, P. Maldonado, and LF Abbott. Re-
dundancy reduction and sustained firing with stochas-
tic depressing synapses. The Journal of Neuroscience,
22(2):584–591, 2002.
14
Steven Reich, Robert Rosenbaum
26. M.S. Goldman, S.B. Nelson, and LF Abbott. Decorrela-
tion of spike trains by synaptic depression. Neurocomput-
ing, 26:147–153, 1999.
27. Lucinda A Grande and William J Spain. Synaptic de-
pression as a timing device. J Physiol, 20:201–210, June
2005.
28. Jesse E Hanson and Dieter Jaeger. Short-term plasticity
shapes the response to simulated normal and parkinso-
nian input patterns in the globus pallidus. J Neurosci,
22(12):5164–5172, June 2002.
29. A. Harsch and H.P.C. Robinson. Postsynaptic variability
of firing in rat cortical neurons: the roles of input synchro-
nization and synaptic nmda receptor conductance. The
Journal of Neuroscience, 20(16):6181–6192, 2000.
30. P. Kara, P. Reinagel, and R.C. Reid. Low response vari-
ability in simultaneously recorded retinal, thalamic, and
cortical neurons. Neuron, 27(3):635–646, 2000.
31. S. Karlin and H.M. Taylor. A first course in stocastic
processes. Academic press, 1975.
32. B Lindner, D Gangloff, A Longtin, and J E Lewis.
Broadband Coding with Dynamic Synapses. J Neurosci,
29(7):2076–2087, February 2009.
33. A Litwin-Kumar and B Doiron. Slow dynamics and high
variability in balanced cortical networks with clustered
connections. Nat Neurosci, 2012.
34. H. Markram, Y. Wang, and M. Tsodyks. Differential sig-
naling via the same axon of neocortical pyramidal neu-
rons. Proc Natl Acad Sci USA, 95(9):5323, 1998.
35. C.J. McAdams and J.H.R. Maunsell. Effects of attention
on the reliability of individual neurons in monkey visual
cortex. Neuron, 23(4):765–773, 1999.
36. Matthias Merkel and Benjamin Lindner. Synaptic filter-
ing of rate-coded information. Phys Rev E, 81(4), April
2010.
37. R. Moreno-Bote and N. Parga. Auto-and crosscorrel-
ograms for the spike response of leaky integrate-and-
fire neurons with slow synapses. Physical review letters,
96(2):28101, 2006.
38. R. Moreno-Bote and N. Parga. Response of integrate-
and-fire neurons to noisy inputs filtered by synapses with
arbitrary timescales: Firing rate and correlations. Neural
Computation, 22(6):1528–1572, 2010.
39. R. Moreno-Bote, A. Renart, and N. Parga. Theory of
input spike auto- and cross-correlations and their effect
on the response of spiking neurons. Neural Computation,
20(7):1651–1705, 2008.
41. M Rav-Acha, N Sagiv,
40. AM Oswald and NN Urban.
Interactions between be-
haviorally relevant rhythms and synaptic plasticity alter
coding in the piriform cortex. J Neurosci (In Press), 2012.
I Segev, H Bergman, and
Y Yarom. Dynamic and spatial features of the inhibitory
pallidal GABAergic synapses. J Neurosci, 135(3):791–
802, 2005.
42. R Rosenbaum. The transfer and propagation of correlated
neuronal activity. PhD thesis, University of Houston,
2011.
43. R Rosenbaum, J Rubin, and B Doiron. Short term synap-
tic depression imposes a frequency dependent filter on
synaptic information transfer. Public Library of Sci Com-
put Biol, 8(6), 2012.
44. Jason S Rothman, Laurence Cathala, Volker Steuber,
and R Angus Silver. Synaptic depression enables neu-
ronal gain control. Nature, 457(7232):1015–1018, Febru-
ary 2009.
45. Z Rotman, P Y Deng, and V A Klyachko. Short-Term
Plasticity Optimizes Synaptic Information Transmission.
J Neurosci, 31(41):14800–14809, October 2011.
46. E. Salinas and T.J. Sejnowski.
Impact of correlated
synaptic input on output firing rate and variability
in simple neuronal models.
Journal of Neuroscience,
20(16):6193, 2000.
47. E. Salinas and T.J. Sejnowski. Integrate-and-fire neurons
driven by correlated stochastic input. Neural computation,
14(9):2111–2155, 2002.
48. W Senn, H Markram, and M Tsodyks. An algorithm
for modifying neurotransmitter release probability based
on pre- and postsynaptic spike timing. Neural Comput,
13(1):35–67, January 2001.
49. M.N. Shadlen and W.T. Newsome. Noise, neural codes
and cortical organization. Findings and Current Opinion
in Cognitive Neuroscience, 4:569–579, 1998.
50. M.N. Shadlen and W.T. Newsome. The variable dis-
charge of cortical neurons: implications for connectivity,
computation, and information coding. Journal of Neuro-
science, 18(10):3870–3896, 1998.
51. W.R. Softky and C. Koch. The highly irregular firing of
cortical cells is inconsistent with temporal integration of
random EPSPs. Journal of Neuroscience, 13(1):334–350,
1993.
52. C.F. Stevens, A.M. Zador, et al. Input synchrony and the
irregular firing of cortical neurons. Nature neuroscience,
1(3):210–217, 1998.
53. T. Tetzlaff, S. Rotter, E. Stark, M. Abeles, A. Aertsen,
and M. Diesmann. Dependence of neuronal correlations
on filter characteristics and marginal spike train statis-
tics. Neural Comput, 20(9):2133–2184, 2008.
54. DJ Tolhurst, JA Movshon, and AF Dean. The statistical
reliability of signals in single neurons in cat and monkey
visual cortex. Vision research, 23(8):775–785, 1983.
55. M Tsodyks, K Pawelzik, and H Markram. Neural net-
works with dynamic synapses. Neural Comput, 10(4):821–
835, May 1998.
56. M. Tsodyks, A. Uziel, H. Markram, et al. Synchrony gen-
eration in recurrent networks with frequency-dependent
synapses. J Neurosci, 20(1):825–835, 2000.
57. M V Tsodyks and H Markram. The neural code be-
tween neocortical pyramidal neurons depends on neuro-
transmitter release probability. Proc Natl Acad Sci USA,
94(2):719–723, January 1997.
58. C. Van Vreeswijk and H. Sompolinsky. Chaos in neu-
ronal networks with balanced excitatory and inhibitory
activity. Science, 274(5293):1724–1726, 1996.
59. J A Varela, K Sen, J Gibson, J Fost, L F Abbott, and S B
Nelson. A quantitative description of short-term plastic-
ity at excitatory synapses in layer 2/3 of rat primary vi-
sual cortex. J Neurosci, 17(20):7926–7940, October 1997.
60. D. Vere-Jones. Simple stochastic models for the release of
quanta of transmitter from a nerve terminal. Australian
& New Zealand Journal of Statistics, 8(2):53–63, 1966.
61. C. Vreeswijk and H. Sompolinsky. Chaotic balanced
state in a model of cortical circuits. Neural Computation,
10(6):1321–1371, 1998.
62. X J Wang. Fast burst firing and short-term synaptic
plasticity: a model of neocortical chattering neurons. J
Neurosci, 89(2):347–362, 1999.
63. A. Zador.
Impact of synaptic unreliability on the in-
formation transmitted by spiking neurons. J Neurophys,
79(3):1219, 1998.
64. E Zohary, MN Shadlen, and WT Newsome. Correlated
neuronal discharge rate and its implications for psy-
chophysical performance. Nature, 370(6485):140–3, Jul
1994.
65. R.S. Zucker and W.G. Regehr. Short-term synaptic plas-
ticity. Annual Rev of Phys, 64(1):355–405, 2002.
|
1610.05872 | 1 | 1610 | 2016-10-19T05:32:32 | Making brain-machine interfaces robust to future neural variability | [
"q-bio.NC",
"stat.ML"
] | A major hurdle to clinical translation of brain-machine interfaces (BMIs) is that current decoders, which are trained from a small quantity of recent data, become ineffective when neural recording conditions subsequently change. We tested whether a decoder could be made more robust to future neural variability by training it to handle a variety of recording conditions sampled from months of previously collected data as well as synthetic training data perturbations. We developed a new multiplicative recurrent neural network BMI decoder that successfully learned a large variety of neural-to- kinematic mappings and became more robust with larger training datasets. When tested with a non-human primate preclinical BMI model, this decoder was robust under conditions that disabled a state-of-the-art Kalman filter based decoder. These results validate a new BMI strategy in which accumulated data history is effectively harnessed, and may facilitate reliable daily BMI use by reducing decoder retraining downtime. | q-bio.NC | q-bio | Making brain-machine interfaces robust to future neural variability
David Sussillo1,5,*, Sergey D. Stavisky2,*, Jonathan C. Kao1,*, Stephen I Ryu1,7,
Krishna V. Shenoy1,2,3,4,5,6
*Equal Contribution
1Electrical Engineering Department
2Neurosciences Graduate Program
3Neurobiology and Bioengineering Departments
4Bio-X Program
5Stanford Neurosciences Institute
6Howard Hughes Medical Institute at Stanford University
Stanford University, Stanford, 94305 CA, USA.
7Palo Alto Medical Foundation
Palo Alto, 94301 CA, USA
Contact: [email protected]
arXiv pre-print, 18 October 2016
ABSTRACT
A major hurdle to clinical translation of brain-machine interfaces (BMIs) is that current
decoders, which are trained from a small quantity of recent data, become ineffective
when neural recording conditions subsequently change. We tested whether a decoder
could be made more robust to future neural variability by training it to handle a variety of
recording conditions sampled from months of previously collected data as well as
synthetic training data perturbations. We developed a new multiplicative recurrent
neural network BMI decoder that successfully learned a large variety of neural-to-
kinematic mappings and became more robust with larger training datasets. When tested
with a non-human primate preclinical BMI model, this decoder was robust under
conditions that disabled a state-of-the-art Kalman filter based decoder. These results
validate a new BMI strategy in which accumulated data history is effectively harnessed,
and may facilitate reliable daily BMI use by reducing decoder retraining downtime.
Page 1
Brain-machine interfaces (BMIs) can restore motor function and communication to
people with paralysis1,2. Progress has been particularly strong towards enabling two-
dimensional computer cursor control, which may allow versatile communications
prostheses3–5. Cursor control performance has approached that of the native hand in
recent macaque studies6,7, but this was done under favorable laboratory conditions
where neural recordings are often stable both during and across BMI sessions8–11. In
contrast to these pre-clinical studies, one of the major challenges impeding BMI use by
human clinical trial participants is the high degree of within- and across-day variability in
neural recording conditions (Fig. 1a)12–16. We use the term "recording condition" to
broadly encompass the combination of factors which together determine the relationship
between observed neural activity and intended kinematics. These factors include the
relative position of the electrodes and surrounding neurons (diagrammed in Fig 1b),
variability in sensor properties such as impedance or wiring quality, noise sources, and
biological factors such as cognitive state or medications. Existing neural decoding
algorithms are poorly suited to handle variability in recording condition, resulting in
intermittent performance and a need for frequent decoder retraining4,5,13,17.
The clinical viability of BMIs would be much improved by making decoders robust to
recording condition changes18,19, and several recent studies have begun to focus on this
problem. We can broadly divide the conditions that a BMI will encounter into one of two
types: 1) conditions that are completely different from what has been previously
encountered, and 2) conditions that share some commonality with ones previously
encountered. For existing BMI methods, both of these situations necessitate some
Page 2
interruption of function while the decoder is updated to handle the new condition. One
strategy for minimizing this interruption is to use adaptive decoders, which update their
parameters based on new data collected during the BMI's use (rather than collecting
new training data for a de novo decoder) to try to better match the new recording
condition 4,10,20–29. In the first case, this is likely the best that can be done. But in the
second case, BMI interruption could in principle be avoided altogether by a decoder
capable of exploiting the similarities between the current and previously encountered
conditions (Fig. 1c).
We were motivated to try this complimentary strategy because chronic BMI systems do
typically encounter recording conditions in which there is some commonality with past
recording conditions8,10,13,14,27,28,30–32. Furthermore, these systems generate and store
months, or even years, of neural and kinematic data as part of their routine use. Almost
all of this past data is left unused in existing BMI systems: decoders are trained using
the most recently available data, typically from a block of calibration trials at the start of
that day's experiment, or from a recent previous experiment33. Using this historical data
would be difficult for most BMI decoders, as they are linear (e.g.,2,6). Linear decoders
are prone to underfitting heterogeneous training sets, such as those that might be
sampled from months of data. To overcome this limitation, an essential aspect of our
approach is to use a nonlinear and computationally 'powerful' decoder (i.e. one capable
of approximating any complex, nonlinear dynamical systems), which should be capable
of learning a diverse set of neural-to-kinematic mappings.
Page 3
Specifically, we tested whether one could gain traction on the decoder robustness
problem by exploiting this idle wealth of stored data using an artificial recurrent neural
network (RNN). We did this with a three-pronged approach. The first was the use of the
nonlinear RNN. The second was to train the decoder from many months of previously
recorded data. Third, to 'harden' the decoder against being too reliant on any given
pattern of inputs, we artificially injected additional variability into the data during decoder
training.
The fact that conventional state-of-the-art decoding methods, which tend to be linear or
at least of limited computational complexity34, work well for closed-loop BMI control of
2D cursors demonstrates that the model mismatch of assuming linear neural-to-
kinematic mappings is well tolerated for a given recording condition. Nevertheless, when
neural-to-kinematic mappings change over time, a conventional decoder trained on
many days' data is almost certainly not going to fully benefit from this abundance of
data. This is because it requires a powerful nonlinear algorithm to learn a set of different
context-dependent mappings, even if these individual mappings from neural firing rates
to kinematics were entirely linear (which they are not). Methods such as linear Kalman
filters can at best only learn an average mapping, 'splitting the difference' to reduce
error across the training set. This approach is not well-suited for most of the recording
conditions. We therefore developed a new BMI decoder using a nonlinear RNN variant
called the multiplicative recurrent neural network (MRNN) developed by Sutskever and
colleagues35 using their Hessian-free technique for training RNNs36. Several properties
of the MRNN architecture, which was originally used for character-level language
Page 4
modeling, make it attractive for this neural prosthetic application. First, it is recurrent,
and can therefore 'remember' state across time (e.g. during the course of a movement),
potentially better matching the time-varying, complex relationships between neural firing
rates and kinematics37,38. Second, its 'multiplicative' architecture increases
computational power by allowing the neural inputs to influence the internal dynamics of
the RNN by changing the recurrent weights (Fig. 2a). Loosely speaking, this allows the
MRNN to learn a 'library' of different neural-to-kinematic mappings that are appropriate
to different recording conditions. The MRNN was our specific choice of non-linear
method for learning a variety of neural-to-kinematic mappings, but this general approach
is likely to work well with many out-of-the-box RNN variants, such as a standard RNN
(e.g. 38) or LSTM39. It is also completely complementary to adaptive decoding.
We evaluated decoders using two non-human primates implanted with chronic
multielectrode arrays similar to those used in ongoing clinical trials. We first show that
training the MRNN with more data from previous recording sessions improves accuracy
when decoding new neural data, and that a single MRNN can be trained to accurately
decode hand reach velocities across hundreds of days. We next present closed-loop
results showing that an MRNN trained with many days' worth of data is much more
robust than a state-of-the-art Kalman filter based decoder (the Feedback Intention
Trained Kalman filter "FIT-KF"40) to two types of recording condition changes likely to be
encountered in clinical BMI use: the unexpected loss of signals from highly-informative
electrodes, and day-to-day changes. Finally, we show that this robustness does not
come at the cost of reduced performance under more ideal (unperturbed) conditions: in
Page 5
the absence of artificial challenges, the MRNN provides excellent closed-loop BMI
performance and slightly outperforms the FIT-KF. To our knowledge, this is the first
attempt to improve robustness by using a large and heterogeneous training dataset: we
used roughly two orders of magnitude more data than in previous closed-loop studies.
RESULTS
An MRNN can leverage large amounts of training data to improve decoder
performance
We first tested whether training the MRNN with many days' worth of data can improve
offline decoder performance across a range of recording conditions. This strategy was
motivated by our observation that the neural correlates of reaching – as recorded with
chronic arrays – showed day-to-day similarities (Supplementary Fig. 1). For a typical
recording session, the most similar recording came from a chronologically close day, but
occasionally the most similar recording condition was found in chronologically distant
data. MRNN decoders were able to exploit these similarities: Fig. 2b shows that as more
days' data (each consisting of ~500 point to point reaches) were used to train the
decoder, the accuracy of reconstructing reach velocities of test datasets increased
(positive correlation between number of training days and decoded velocity, r2 = 0.24 for
monkey R, r2 = 0.20 for monkey L, p < 0.001 for both). Two results from this analysis
were particularly encouraging. First, using more training data substantially increased the
decode accuracy for the 'hard' days that challenged decoders trained with only a few
days' data (e.g., test day 51 for monkey R). Second, this improvement did not come at
the cost of worse performance on the initially 'easy' test days. These results
demonstrate that larger training datasets better prepare the MRNN for a variety of
recording conditions, and that learning to decode additional recording conditions did not
Page 6
diminish the MRNN's capability to reconstruct kinematics under recording conditions
that it had already 'mastered'. There was not a performance versus robustness trade-
off.
We then tested whether the MRNN's computational capacity could be pushed even
further by training it using data from 154 (250) different days' recording sessions from
monkey R (L), which spanned 22 (34) months (Fig. 2c). Across all these recording
sessions' held-out test trials, the MRNN's offline decode accuracy was r2 = 0.81 ± 0.04
(mean ± s.d., monkey R) and r2 = 0.84 ± 0.03 (monkey L). For comparison, we tested
the decode accuracy of the FIT-KF trained in two ways: either specifically using
reaching data from that particular day ("FIT Sameday"), or trained on the same large
multiday training dataset ("FIT Long"). Despite the multitude of recording conditions that
the MRNN had to learn, on every test day each monkey's single MRNN outperformed
that day's FIT Sameday filter (monkey R: FIT-Sameday r2 = 0.57 ± 0.05, p < 0.001
signed-rank test comparing all days' FIT-Sameday and MRNN r2; monkey L: r2 = 0.52 ±
0.05, p < 0.001). Unsurprisingly, a linear FIT-KF did not benefit from being trained with
the same large multiday training set and also performed worse than the MRNN (monkey
R: FIT Long r2 = 0.56, p< 0.001 comparing all days' FIT Long to MRNN r2; monkey L: r2
= 0.46 ± 0.05, p < 0.001).
We note that, while these offline results demonstrate that the MRNN can learn a variety
of recording conditions, experiments are required to evaluate whether this type of
training leads to increased decoder robustness under closed-loop BMI cursor control. In
Page 7
closed-loop BMI cursor control, the BMI user updates his or her motor commands as a
result of visual feedback, resulting in distributions of neural activity that are different than
that of the training set. Thus, results from offline simulation and closed-loop BMI control
may differ 32,41–43. To this end, we next report closed-loop experiments that demonstrate
the benefit of this training approach.
Robustness to unexpected loss of the most informative electrodes
We next performed closed-loop BMI cursor control experiments to test the MRNN's
robustness to recording condition changes. The first set of experiments challenged the
decoder with an unexpected loss of inputs from multiple electrodes. The MRNN was
trained with a large corpus of hand reaching training data up through the previous day's
session (119 - 129 training days for monkey R, 212 - 230 days for monkey L). Then, its
closed-loop performance was evaluated on a Radial 8 Task while the selected
electrodes' input firing rates were artificially set to zero. By changing how many of the
most informative electrodes were dropped ('informative' as determined by their mutual
information with reach direction; see Methods), we could systematically vary the severity
of the challenge. Since this experiment was meant to simulate sudden failure of
electrodes during BMI use (after the decoder had already been trained), we did not
retrain or otherwise modify the decoder based on knowledge of which electrodes were
dropped. There were no prior instances of these dropped electrode sets having zero
firing rates in the repository of previously collected training data (Supplementary Fig. 2).
Thus, this scenario is an example of an unfamiliar recording condition (zero firing rates
on the dropped electrodes) having commonality with a previously encountered condition
(the patterns of activity on the remaining electrodes).
Page 8
We found that the MRNN was robust to severe electrode dropping challenges. It
suffered only a modest loss of performance after losing up to the best 3 (monkey R) or 5
(monkey L) electrodes (Fig. 3). We compared this to the electrode-dropped performance
of a FIT-KF decoder trained with hand reaching calibration data from the beginning of
that day's experiment6,40 ("FIT Sameday") by alternating blocks of MRNN and FIT
Sameday control in an "ABAB" interleaved experiment design. FIT Sameday decoder's
performance worsened dramatically when faced with this challenge. Across all
electrodes-dropped conditions, Monkey R acquired 52% more targets per minute using
the MRNN, while Monkey L acquired 92% more targets. Supplementary Video 2 shows
a side-by-side comparison of the MRNN and FIT-KF decoders with the 3 most
informative electrodes dropped.
Although the past datasets used to train the MRNN never had these specific sets of
highly important electrodes disabled, our technique of artificially perturbing the true
neural activity during MRNN training did generate training examples with reduced firing
rates on various electrodes (as well as examples with increased firing rates). The
MRNN had therefore been broadly trained to be robust to firing rate reduction on
subsets of its inputs. Subsequent closed-loop comparisons of MRNN electrode dropping
performance with and without this training data augmentation confirmed its importance
(Supplementary Fig. 3a). An additional offline decoding simulation, in which MRNN
decoders were trained with varying dataset sizes with and without training data
augmentation, further shows that both the MRNN architecture and its training data
Page 9
augmentation are important for robustness to electrode dropping (Supplementary Fig.
4). These analyses also suggest that large training dataset size does not impart
robustness to these particular recording condition changes, which is not surprising given
that the previous datasets did not include examples of these electrodes being dropped.
Robustness to naturally occurring recording condition changes
The second set of closed-loop robustness experiments challenged the MRNN with
naturally occurring day-to-day recording condition changes. In contrast to the highly
variable recording conditions encountered in human BMI clinical trials, neural recordings
in our laboratory setup are stable within a day and typically quite stable on the timescale
of days (Supplementary Fig. 1 and 10). Therefore, in order to challenge the MRNN and
FIT-KF decoders with greater recording condition variability, we evaluated them after
withholding the most recent several months of recordings from the training data. We
refer to this many month interval between the most recent training data day and the first
test day as the training data "gap" in these "stale training data" experiments. The gaps
were chosen arbitrarily within the available data, but to reduce the chance of outlier
results, we repeated the experiment with two different gaps for each monkey.
For each gap, we trained the MRNN with a large dataset consisting of many months of
recordings preceding the gap and compared it to two different types of FIT-KF
decoders. The "FIT Old" decoder was trained from the most recent available training
day (i.e. the day immediately preceding the gap); this approach was motivated under
the assumption that the most recent data were most likely to be similar to the current
day's recording condition. The "FIT Long" decoder was trained from the same multiday
Page 10
dataset used to train the MRNN and served as a comparison in which a conventional
decoder is provided with the same quantity of data as the MRNN. The logic underlying
this FIT Long approach was that despite the Kalman filter being ill-suited for fitting
multiple heterogeneous datasets, this 'averaged' decoder might still perform better than
the FIT-KF Old trained using a single distant day.
We found that the MRNN was the only decoder that was reliably usable when trained
with stale data (Fig. 4). FIT Old performed very poorly in both monkeys, failing
completely (defined as the monkey being unable to complete a block using the decoder,
see Methods) in 4/6 monkey R experimental sessions and 6/6 monkey L sessions. FIT
Long performed better than FIT Old, but its performance was highly variable – it was
usable on some test days but failed on others. In Monkey R, the across-days average
acquisition rate was 105% higher for the MRNN than FIT Long (p < 0.01, paired t-test).
Monkey L's MRNN did not perform as consistently well as Monkey R's, but nevertheless
demonstrated a trend of outperforming FIT Long (32% improvement, p = 0.45), in
addition to decidedly outperforming FIT Old, which failed every session. Although
monkey L's FIT Long outperformed the MRNN on one test day, on all other test days
FIT Long was either similar to, or substantially worse than, MRNN. Moreover, whereas
the MRNN could be used to control the cursor every day, FIT Long was not even
capable of acquiring targets on some days. Further tests of additional FIT Old decoders
confirmed that they generally perform poorly (Supplementary Fig. 5). The lack of
consistent usability by any of the FIT-KF decoders (Old or Long) demonstrates that
having access to a large repository of stale training data does not enable training a
Page 11
single Kalman filter that is robust to day-to-day variability in recording conditions. In
contrast, an MRNN trained with this large dataset was consistently usable.
To further demonstrate the consistency of these results, we performed offline
simulations in which we tested MRNN decoders on additional sets of training and test
datasets separated by a gap. Each set was non-overlapping with the others, and
together they spanned a wide range of each animal's research career. We observed the
same trends in these offline simulations: MRNNs trained with many previous days of
training data outperformed FIT Old and FIT Long decoders (Supplementary Fig. 6). In
these analyses we also dissected which components of our decoding strategy
contributed to the MRNN's robustness. We did this by comparing MRNNs trained with
varying numbers of days preceding the gap, with or without training data spike rate
perturbations. The results show that training using more data, and to a lesser extent
incorporating data augmentation (see also closed-loop comparisons in Supplementary
Fig. 3b), contributed to the MRNN's robustness to naturally occurring recording
condition changes.
High performance BMI using the MRNN decoder
Finally, we note that the MRNN's robustness to challenging recording conditions did not
come at the cost of reduced performance under more 'ideal' conditions, i.e. without
electrode dropping or stale training data. During the electrode dropping experiments, we
also evaluated the MRNN's closed-loop performance after being trained using several
months' data up through the previous day. In this scenario, the MRNN enabled both
monkeys to accurately and quickly control the cursor. Supplementary Movie 1 shows
Page 12
example cursor control using the MRNN. This data also allowed us to compare the
MRNN's performance to that of a FIT Sameday decoder in back-to-back "ABAB" tests.
Figure 5a shows representative cursor trajectories using each decoder, as well as under
hand control. Figure 5b shows that across nine experimental sessions and 4,000+ trials
with each decoder, Monkey R acquired targets 7.3% faster with the MRNN (619 ± 324
ms mean ± s.d. vs. 668 ± 469 ms, p < 0.01, rank-sum test). Monkey L acquired targets
10.8% faster with the MRNN (743 ± 390 ms vs. 833 ± 532 ms, p < 0.01, rank-sum test)
across 8 sessions and 2,500+ trials using each decoder. These online results
corroborate the offline results presented in Fig. 2c; both show that an MRNN trained
from many days' recording conditions outperforms the FIT Kalman filter trained from
training data collected at the start of the experimental session.
A potential risk inherent to a computationally powerful decoder such as the MRNN is
that it will overtrain to the task structure of the training data and fail to generalize to
other tasks. Most of our MRNN training data were from arm reaches on a Radial 8 Task
similar to the task used for evaluation (albeit with 50% further target distance). We
therefore also tested whether the MRNN enabled good cursor control on the Random
Target Task, in which the target could appear in any location in a 20 x 20 cm workspace
(Supplementary Fig. 7). Monkey R performed the Random Target Task on two
experimental sessions and averaged a 99.4% success rate, with mean distance-
normalized time to target of 0.068 s/cm. Monkey L performed one session of this task at
a 100% success rate with mean normalized time to target of 0.075 s/cm. To provide
context for these metrics, we also measured Random Target Task performance using
Page 13
arm control. Monkey R's arm control success rate was 100%, with 0.055 s/cm mean
normalized time to target, during the same experimental sessions as his MRNN
Random Target Task data. Monkey L's arm control success rate was 97.7%, with 0.055
s/cm mean normalized time to target, during one session several days following his
MRNN test.
DISCUSSION
We developed the MRNN decoder to help address a major problem hindering the
clinical translation of BMIs: once trained, decoders can be quickly rendered ineffective
due to recording condition changes. A number of complementary lines of research are
aimed at making BMIs more robust, including improving sensors to record from more
neurons more reliably (e.g.,44); decoding multiunit spikes10,30,45 or local field
potentials31,32,46 which appear to be more stable control signals than single unit activity;
and using adaptive decoders that update their parameters to follow changing neural-to-
kinematic mappings 4,10,20–29,47. Here we present the MRNN as a proof-of-principle of a
new and different approach: build a fixed decoder whose architecture allows it to be
trained to be inherently robust to recording condition changes it has previously
encountered as well as to new conditions that have some similarity to a previously
encountered condition.
We stress that all of these approaches are complementary in several respects. For
example, a decoder that is inherently more robust to neural signal changes, such as the
MRNN, would still benefit from improved sensors, could operate on a mix of input signal
types including single- and multiunit spikes and field potentials, and is especially well
Page 14
positioned to benefit from decoder adaptation. When performance degrades due to
recording condition changes, both supervised10,21–23,25,27,29 and unsupervised4,20,24,26
adaptive decoders need a period of time in which control is at least good enough that
the algorithm can eventually infer the user's intentions and use these to update its
neural-to-kinematic model. Improved robustness may "buy enough time" to allow the
decoder's adaptive component to rescue performance without interrupting prosthesis
use. Here we've demonstrated the MRNN's advantages over a state-of-the-art static
decoder, but comparing this strategy both against and together with adaptive decoding
remains a future direction.
We demonstrated the MRNN's robustness to two types of recording condition changes.
These changes were chosen because they capture key aspects of the changes that
commonly challenge BMI decoders during clinical use. The stale training data
experiments showed that the MRNN was usable under conditions where the passage of
time would typically require recalibration of conventional decoders such as the FIT-KF.
We do not mean to suggest that in a clinical setting one would want to – or would often
have to – use a BMI without any training data from the past several months. Rather, we
used this experimental design to model recording condition changes that can happen on
the timescale of hours in human BMI clinical trials13. Possible reasons for the greater
recording condition variability observed in human participants compared to non-human
primates include: more movement of the array relative to the human brain due to larger
cardiovascular pulsations and epidural space; greater variability in the state of the BMI
user (health, medications, fatigue, cognitive state); and more electromagnetic
Page 15
interference from the environment. The MRNN can take advantage of having seen the
effects of these sources of variability in previously accumulated data; it can therefore be
expected to become more robust over time as it builds up a "library" of neural-to-
kinematic mappings under different recording conditions.
The electrode dropping experiments, which demonstrated the MRNN's robustness to an
unexpected loss of high-importance electrodes, are important for two reasons. Firstly,
sudden loss of input signals (e.g., due to a electrode connection failure48,49), is a
common BMI failure mode that can be particularly deleterious to conventional BMI
decoders50. The MRNN demonstrates considerable progress in addressing this so-
called "errant unit" problem. Secondly, these results demonstrate that the MRNN trained
with artificially perturbed neural data can be relatively robust even to a recording
condition change that has not been encountered in past recordings.
The MRNN's robustness did not come at the cost of diminished performance under
more ideal conditions. This result is nontrivial given the robustness-focused decisions
that went into its design (e.g. perturbing the input spike trains in the training set).
Instead, we found that the MRNN was excellent under favorable conditions, slightly
outperforming a state-of-the-art same day trained FIT-KF decoder. Taken together,
these results demonstrate that the MRNN exhibits robustness to a variety of clinically
relevant recording condition changes, without sacrificing peak performance. These
advances may help to reduce the onerous need for clinical BMI users to collect frequent
retraining data.
Page 16
One disadvantage of this class of nonlinear decoders trained from large datasets, when
compared to traditional linear decoders trained on smaller datasets, is the longer
training time required to fit their more numerous parameters. In the present study, which
we did not optimize for fast training, this took multiple hours. This could be substantially
sped up by iteratively updating the decoder with new data instead of retraining de novo
and by leveraging faster computation available with graphics processing units, parallel
computing, or custom hardware. A second disadvantage of the MRNN is that it appears
to require more training data to saturate its performance (Fig. 2b) compared to
conventional methods, such as FIT-KF, that are trained from sameday calibration data.
We do not view this as a major limitation because the motivation for using the MRNN is
to take advantage of accumulated previous recordings. Nonetheless, it will be valuable
to compare the present approach with other decoder architectures and training
strategies, which may yield similar performance and robustness while requiring less
training data.
The MRNN decoder's robustness was due to the combination of a large training data
corpus, deliberate perturbation of the training data, and a computationally powerful
architecture that was able to effectively learn this diverse training data. While it may
seem obvious that successfully learning more training data is better, this is not
necessarily true. Older data only helps a decoder if some of these past recordings
capture neural-to-kinematic relationships that are similar to that of the current recording
condition. Our offline and closed-loop MRNN robustness results suggest that this was
Page 17
indeed the case for the two monkeys used in this study. While there are indications that
this will also be true in human BMI studies14, validating this remains an important future
question. The relevance of old data to present recording conditions also enables a
different robustness-enhancing approach: store a library of different past decoders and
evaluate each to find a decoder well-suited for the current conditions (e.g.,10). However,
since offline analyses are poor predictors of closed-loop performance32,42,45,51, this
approach necessitates a potentially lengthy decoder selection process. Using a single
decoder (such as the MRNN) that works across many recording conditions avoids
switching-related downtime.
In addition to training with months of previous data, we improved the MRNN's
robustness by intentionally perturbing the training neural data. In the present study we
applied random Gaussian firing rate scaling based on a general assumption that the
decoder should be broadly robust to both global and private shifts in observed firing
rates. This perturbation type proved effective, but we believe that this approach (called
data augmentation in the machine learning community) can potentially be much more
powerful when combined with specific modeling of recording condition changes that the
experimenter wants to train robustness against. For example, data augmentation could
incorporate synthetic examples of losing a particularly error-prone set of electrodes;
recording changes predicted by models of array micro-movement or degradation; and
perhaps even the predicted interaction between kinematics and changes in cognitive
state or task context. We believe this is an important avenue for future research.
Page 18
We view the success of our specific MRNN decoder implementation as a validation of
the more general BMI decoder strategy of training a computationally powerful nonlinear
decoder to a large quantity of data representing many different recording conditions.
This past data need not have been collected explicitly for the purpose of training as was
done in this study; neural data and corresponding kinematics from past closed-loop BMI
use can also serve as training data4,10. It is likely that other nonlinear decoding
algorithms will also benefit from this strategy, and that there are further opportunities to
advance the reliability and performance of BMIs by starting to take advantage of these
devices' ability to generate large quantities of data as part of their regular use.
Page 19
METHODS
Animal model and neural recordings
All procedures and experiments were approved by the Stanford University Institutional
Animal Care and Use Committee. Experiments were conducted with adult male rhesus
macaques (R and L, ages 8 and 18, respectively), implanted with 96-electrode Utah
arrays (Blackrock Microsystems Inc., Salt Lake City, UT) using standard neurosurgical
techniques. Monkeys R and L were implanted 30 months and 74 months prior to the
primary experiments, respectively. Monkey R had two electrode arrays implanted, one
in caudal dorsal premotor cortex (PMd) and the other in primary motor cortex (M1), as
estimated visually from anatomical landmarks. Monkey L had one array implanted on
the border of PMd and M1. Within the context of the simple point-to-point arm and BMI
reach behavior of this study, we observed qualitatively similar response properties
between these motor cortical areas; this is consistent with previous reports of a gradient
of increasing preparatory activity, rather than stark qualitative differences, as one moves
more rostral from M1 52–56. Therefore, and in keeping with standard BMI decoding
practices 6,8,10,24,38,40,46, we did not distinguish between M1 and PMd electrodes.
Behavioral control and neural decode were run on separate PCs using the xPC Target
platform (Mathworks, Natick, MA), enabling millisecond-timing precision for all
computations. Neural data were initially processed by Cerebus recording system(s)
(Blackrock Microsystems Inc., Salt Lake City, UT) and were available to the behavioral
control system within 5 ±
1 ms. Spike counts were collected by applying a single
negative threshold, set to -4.5 times the root mean square of the spike band of each
electrode. We decoded "threshold crossings", which contain spikes from one or more
Page 20
neurons in the electrode's vicinity, as per standard practice for intracortical BMIs
1,4,6,7,10,15,16,31,38,40 because threshold crossings provide roughly comparable population-
level velocity decode performance to sorted single-unit activity, without time-consuming
sorting30,45,57–59, and may be more stable over time30,45. To orient the reader to the
quality of the neural signals available during this study, Supplementary Data 1 provides
statistics of several measures of electrodes' 'tuning' and cross-talk.
Behavioral tasks
We trained the monkeys to acquire targets with a virtual cursor controlled by either the
position of the hand contralateral to the arrays or directly from neural activity. Reaches
to virtual targets were made in a 2D fronto-parallel plane presented within a 3D
environment (MSMS, MDDF, USC, Los Angeles, CA) generated using a Wheatstone
stereograph fused from two LCD monitors with refresh rates at 120 Hz, yielding frame
updates within 7 ±
4 ms 43. Hand position was measured with an infrared reflective
bead tracking system at 60 Hz (Polaris, Northern Digital, Ontario, Canada). During BMI
control, we allowed the monkey's reaching arm to be unrestrained47,60 so as to not
impose a constraint upon the monkey that during BMI control he must generate neural
activity that does not produce overt movement61.
In the Radial 8 Task the monkey was required to acquire targets alternating between a
center target and one of eight peripheral targets equidistantly spaced on the
circumference of a circle. For our closed-loop BMI experiments, the peripheral targets
were positioned 8 cm from the center target. In hand reaching datasets used for
decoder training and offline decode, the targets were either 8 cm or 12 cm (the majority
of datasets) from the center. In much of Monkey L's training data, the three targets
Page 21
forming the upper quadrant were placed slightly further (13 and 14 cm) based on
previous experience that this led to decoders with improved ability to acquire targets in
that quadrant. To acquire a target, the monkey had to hold the cursor within a 4 cm × 4
cm acceptance window centered on the target for 500 ms. If the target was acquired
successfully, the monkey received a liquid reward. If the target was not acquired within
5 s (BMI control) or 2 s (hand control) of target presentation, the trial was a failure and
no reward was given.
Although the data included in this study's decoder training datasets and offline analyses
span many months of each animal's research career, these data start after each animal
was well-trained in performing point-to-point planar reaches; day-to-day variability when
making the same reaching movements was modest. To quantify behavioral similarity
across the study, we took advantage of having collected the same "Baseline Block" task
data at the start of most experimental sessions: 171/185 monkey R days, 398/452
monkey L days. This consisted of ~200 trials of arm-controlled Radial 8 Task reaches,
with targets 8 cm from the center. For each of these recording sessions, we calculated
the mean hand x- and y-velocities (averaged over trials to/from a given radial target)
throughout a 700 ms epoch following radial target onset for outward reaches and 600
ms following center target onset for inward reaches (inward reaches were slightly
faster). We concatenated these velocity time series across the 8 different targets,
producing 10,400 ms x-velocity and y-velocity vectors from each recording session.
Behavioral similarity between any two recording sessions was then measured by the
Pearson correlation between the datasets' respective x- and y- velocity vectors. Then,
Page 22
the two dimensions' correlations were averaged to produce a single correlation value
between each pair of sessions. These hand velocity correlations were 0.90 ± 0.04
(mean ± s.d. across days) for monkey R, and 0.91 ± 04 for monkey L.
We measured closed-loop BMI performance on the Radial 8 Task using two metrics.
Target acquisition rate is the number of peripheral targets acquired divided by the
duration of the task. This metric holistically reflects cursor control ability because, unlike
time to target, it is negatively affected by failed trials and directly relates to the animal's
rate of liquid reward. Targets per minute is calculated over all trials of an experimental
condition (i.e., which decoder was used) and therefore yields a single measurement
datum per day/experimental condition. Across-days distributions of a given decoder's
targets per minute performance were consistent with a normal distribution (Kolmogorov-
Smirnov test), justifying our use of paired t-tests statistics when comparing this metric.
This is consistent with the measure reflecting the accumulated outcome of many
hundreds of random processes (individual trials). As a second measure of performance
that is more sensitive when success rates are high and similar between decoders (such
as the "ideal" conditions where we presented no challenges to the decoders), we
compared times to target. This measure consists of the time between when the target
appeared and when the cursor entered the target acceptance window prior to
successfully acquiring the target, but does not include the 500 ms hold time (which is
constant across all trials). Times to target are only measured for successful trials to
peripheral targets, and were only compared when success rates were not significantly
different (otherwise, a poor decoder with a low success rate that occasionally acquired a
Page 23
target quickly by chance could nonsensically "outperform" a good decoder with 100%
success rate but slower times to target). Because these distributions were not normal,
we used the Mann–Whitney–Wilcoxon rank-sum tests when comparing two decoders'
times to target.
In the Random Target Task each trial's target appeared at a random location within a 20
cm × 20 cm region centered within a larger workspace that was 40 x 30 cm. A new
random target appeared after each trial regardless of whether this trial was a success or
a failure due to exceeding the 5 s time limit. The target location randomization enforced
a rule that the new target's acceptance area could not overlap with that of the previous
target. Performance on the Random Target Task was measured by success rate (the
number of successfully acquired targets divided by the total number of presented
targets) and the normalized time to target. Normalized time to target is calculated for
successful trials following another successful trial, and is the duration between target
presentation and target acquisition (not including the 500 ms hold time), divided by the
straight-line distance between this target's center and the previously acquired target's
center 62.
Decoder comparison experiment design
All offline decoding comparisons between MRNN and FIT-KF were performed using test
data that was held out from the data used to train the decoders. Thus, although the
MRNN has many more parameters than FIT-KF, both of these fundamentally different
Page 24
algorithm types were trained according to best practices with matched training data.
This allows their performance to be fairly compared.
When comparing online decoder performance using BMI-controlled Radial 8 Target or
Random Target Tasks, the decoders were tested in using an interleaved "block-set"
design in which contiguous ~200 trial blocks of each decoder were run followed by
blocks of the next decoder, until the block-set comprising all tested decoders was
complete and the next block-set began. For example, in the electrode dropping
experiments (Figure 3), this meant an "AB AB" design where A could be a block of
MRNN trials and B could be a block of FIT Sameday trials. For the stale training data
experiments (Figure 4), an "ABCD ABCD ABCD… " design was used to test the four
different decoders. When switching decoders, we gave the monkey ~20 trials to
transition to the new decoder before starting 'counting' performance in the block; we
found this to be more than sufficient for both animals to adjust. For electrode dropping
experiments, the order of decoders within each block-set was randomized across days.
For stale training data experiments, where several decoders often performed very
poorly, we manually adjusted the order of decoders within block-sets so as to keep the
monkeys motivated by alternating what appeared to be more and less frustrating
decoders. All completed blocks were included in the analysis. Throughout the study, the
experimenters knew which decoder was in use, but all comparisons were quantitative
and performed by the same automated computer program using all trials from
completed blocks. The monkeys were not given an overt cue to the decoder being used.
Page 25
During online experiments, we observed that when a decoder performed extremely
poorly, such that the monkey could not reliably acquire targets within the 5 second time
limit, the animal stopped performing the task before the end of the decoder evaluation
block. To avoid frustrating the monkeys, we stopped a block if the success rate fell
below 50% after at least 10 trials. This criterion was chosen based on pilot studies in
which we found that below this success rate, the monkey would soon thereafter stop
performing the task and would frequently refuse to re-engage for a prolonged period of
time. Our interleaved block design meant that each decoder was tested multiple times
on a given experimental session, which in principle provides the monkey multiple
attempts to finish a block with each decoder. In practice, we found that monkeys could
either complete every block or no blocks with a given decoder, and we refer to decoders
that could not be used to complete a block as having "failed". These decoders'
performance was recorded as 0 targets per minute for that experimental session. The
exception to the above was that during an electrode dropping experiment session, we
declared both FIT-KF Sameday and MRNN as having failed for a certain number of
electrodes dropped if the monkey could not complete a block with either decoder. That
is, we did not continue with a second test of both (unusable) decoders as per the
interleaved block design, because this would have unduly frustrated the animal.
We performed this study with two monkeys, which is the conventional standard for
systems neuroscience and BMI experiments using a non-human primate model. No
monkeys were excluded from the study. We determined how many experimental
sessions to perform as follows. For all offline analyses, we examined the dates of
Page 26
previous experimental sessions with suitable arm reaching data and selected sets of
sessions with spacing most appropriate for each analysis (e.g., closely spaced sessions
for Figure 2b, all of the available data for Figure 2c, two clusters with a gap for stale
training analyses). All these pre-determined sessions were then included in the
analysis. For the stale training data experiments (Figure 4), the choice of two gaps with
three test days each was pre-established. For the electrode dropping experiments
(Figure 3), we did not know a priori how electrode dropping would affect performance
and when each decoder would fail. We therefore determined the maximum number of
electrodes to drop during the experiment and adjusted the number of sessions testing
each drop condition during the course of experiments to comprehensively explore the
"dynamic range" across which decoder robustness appeared to differ. For both of these
experiments, during an experimental session additional block-sets were run until the
animal became satiated and disengaged from the task. We did not use formal effect
size calculations to make data sample size decisions, but did perform a variety of
experiments with large numbers of decoder comparison trials (many tens of thousands)
so as to be able to detect substantial decoder performance differences. For secondary
online experiments (Supplementary Figures 3 and 7), which served to support offline
analyses (Supplementary Figure 3) or demonstrate that the MRNN could acquire other
target locations (Supplementary Figure 7), we chose to perform only 1-3 sessions per
animal in the interest of conserving experimental time.
At a high level, the MRNN decoder transforms inputs 𝐮𝑡 , the observed spike counts on
Neural decoding using a Multiplicative Recurrent Neural Network (MRNN)
each electrode at a particular time, into a cursor position and velocity output. This is
Page 27
accomplished by having first trained the weights of an artificial recurrent neural network
such that when the network is provided a time series of training neural data inputs, the
training data kinematic outputs can be accurately 'read out' from this neural network's
state. The rest of this section will describe the architecture, training, and use of the
MRNN for the purpose of driving a BMI.
The generic recurrent network model is defined by an 𝑁-dimensional vector of activation
variables, 𝐱, and a vector of corresponding "firing rates'', 𝐫=tanh𝐱. Both 𝐱 and 𝐫 are
continuous in time and take continuous values. In the standard RNN model, the input
affects the dynamics as an additive time-dependent bias in each dimension. In the
MRNN model, the input instead directly parameterizes the artificial neural network's
recurrent weight matrix, allowing for a multiplicative interaction between the input and
the hidden state. One view of this multiplicative interaction is that the hidden state of the
recurrent network is selecting an appropriate decoder for the statistics of the current
dataset. The equation governing the dynamics of the activation vector is of the form
suggested in 35, but adapted in this study to continuous time in order to control the
smoothness to MRNN outputs, 𝜏 𝐱𝑡 =−𝐱𝑡 +𝐉𝐮!𝐫𝑡 +𝐛!.
The 𝑁×𝑁×𝐮 tensor 𝐉𝐮! describes the weights of the recurrent connections of the
network, which are dependent on the 𝐸-dimensional input, 𝐮𝑡 . The symbol 𝐮 denotes
the number of unique values 𝐮𝑡 can take. Such a tensor is unusable for continuous
valued 𝐮(𝑡) or even discrete valued 𝐮(𝑡) with prohibitively many values. To make these
computations tractable, the input is linearly combined into 𝐹 factors and 𝐉𝐮! is
factorized 35 according to the following formula:
Page 28
∙𝐉!",
𝐉𝐮! =𝐉!"∙diag 𝐉!"𝐮𝑡
where 𝐉!" has dimension 𝑁×𝐹, 𝐉!" has dimension 𝐹×𝐸, 𝐉!" has dimension 𝐹×𝑁, and
diag(𝐯) takes a vector, 𝐯, and returns a diagonal matrix with 𝐯 along the diagonal. One
can directly control the complexity of interactions by choosing 𝐹. Additionally, the
network units receive a bias 𝐛! . The constant 𝜏 sets the time scale of the network, so
we set 𝜏 on the order of hundreds of milliseconds to allow meaningful interactions. The
output of the network is read out from a weighted sum of the network firing rates plus a
σtrial
σelectrode
𝐳𝑡 =𝐖𝐎𝐫𝑡 +𝐛!,
bias, defined by the equation
Monkey R Monkey L
20-30 ms
20 ms
100 ms
100-150 ms
50
100
50
100
0.045
0.045
0.3
0.3
1.0
1.0
1.0
1.0
1.0
1.0
96
192
where 𝐖𝐎 is an 𝑀×𝑁 matrix, and 𝐛! is an M-dimensional bias.
𝛥𝑡
𝜏
𝑁
𝐹
𝑔!"
𝑔!"
𝑔!"
𝐸
#
params
in
each
MRNN
𝛽
We began decoder training by instantiating MRNNs of network size 𝑁=100 (monkey
R) and 𝑁=50 (monkey L) with 𝐹=𝑁 in both cases (see Table 1 for all key
parameters). For monkey R, who was implanted with two multielectrode arrays, 𝐸=
Table 1. Network and training parameters used for the closed-loop MRNN BMI decoder
MRNN training
days of
training data
years
spanned
82-129
189-230
1.59
39502
0.99
2.77
9952
0.99
Page 29
192, while for monkey L with one array, 𝐸=96. The non-zero elements of the non-
sparse matrices 𝐉!",𝐉!",𝐉!" are drawn independently from a Gaussian distribution with
zero mean and variance 𝑔!"/𝐹,𝑔!"/𝐸, and 𝑔!"/𝑁, with 𝑔!",𝑔!", and 𝑔!" set to 1.0 in
this study. The elements of 𝐖𝐎 are initialized to zero, and the bias vectors 𝐛! and 𝐛! are
The input 𝐮(𝑡) to the MRNN (through the matrix 𝐉𝐮(!)) is the vector of binned spikes at
each time step. Concatenating across time in a trial yields training data matrix, 𝐔!, of
binned spikes of size 𝐸×𝑇!, where 𝑇! is the number of times steps for the 𝑗!" trial. Data
also initialized to 0.
from five consecutive actual monkey-reaching trials are then concatenated together to
make one "MRNN training" trial. The first two actual trials in an MRNN training trial were
used for seeding the hidden state of the MRNN (i.e., not used for learning), whereas the
next three actual trials were used for learning. With the exception of the first two actual
trials from a given recording day, the entire set of actual trials are used for MRNN
learning by incrementing the actual trial index that begins each training trial by one.
The parameters of the network were trained offline to reduce the averaged squared
error between the measured kinematic training data and the output of the network, 𝐳(𝑡).
Specifically, we used the Hessian-Free (HF) optimization method36,63 for RNNs (but
adapted to the continuous-time MRNN architecture). HF is an exact 2nd order method
that uses back-propagation through time to compute the gradient of the error with
respect to the network parameters. The set of trained parameters is
{𝐉!",𝐉!",𝐉!",𝐛!,𝐖𝐎,𝐛!}. The HF algorithm has three critical parameters: the minibatch
size, the initial lambda setting, and the max number of conjugate gradient iterations. We
Page 30
set these parameters to one-fifth the total number of trials, 0.1, and 50, respectively.
The optimizations were run for 200 steps and a snapshot of the network was saved
every 10 steps. Among these snapshots, the network with the lowest cross-validation
error on held-out data was used in the experiment.
We independently trained two separate MRNN networks to each output a 2-dimensional
(𝑀=2) signal, 𝐳(𝑡). The first network learned to output the normalized hand position
through time in both the horizontal (𝑥) and vertical (𝑦) spatial dimensions. The second
MRNN learned to output the hand velocity through time, also in the 𝑥 and 𝑦 dimensions.
We calculated hand velocities from the positions numerically using central differences.
In this study we trained a new MRNN whenever adding new training data; this allowed
us to verify that the training optimization consistently converged to a high-quality
decoder. However, it is easy to iteratively update an MRNN decoder with new data
without training from scratch. By adding the new data to the training corpus and using
the existing decoder weights as the training optimization's initial conditions, the MRNN
will more rapidly converge to a new high-quality decoder.
Improving the MRNN by training with many datasets and intentionally perturbed
inputs
A critical element of achieving both high performance and robustness in the MRNN
decoder was training the decoder using data from many previous recording days
spanning many months. When training datasets included data from more than one day,
we randomly selected a small number of trials from each day for a given minibatch. In
this way, every minibatch of training data sampled the input distributions from all training
days.
Page 31
𝑛!!=𝜂!𝜂!𝑛!!,
A second key element of training robustness to recording condition changes was a form
of data augmentation in which we intentionally introduced perturbations to the neural
spike trains that were used to train the MRNN. The concatenated input,
𝐔=[𝐔!,…,𝐔!!!] was perturbed by adding and removing spikes from each electrode.
We focus on electrode c of the 𝑗!" training trial, i.e., a row vector of data 𝐔!,:! . Let the
number of actual observed spikes in 𝐔!,:! be 𝑛!!. This number was perturbed according to
where both 𝜂! and 𝜂! are Gaussian variables with a mean of one and standard
deviations of 𝜎!"#$% and 𝜎!"!#$%&'!, respectively. Conceptually, 𝜂! models a global firing
𝜂! models electrode by electrode perturbations such as electrode dropping or moving
baselines in individual neurons. If 𝑛!! was less than zero or greater than 2𝑛!!, it was
same electrode and training trial. Otherwise, if 𝑛!! was greater than 𝑛!!, then 𝑛!!−𝑛!!
spikes were added to random time bins of the training trial. If 𝑛!! was less than 𝑛!!, then
𝑛!!−𝑛!! spikes were randomly removed from time bins of the training trial that already
had spikes. Finally, if 𝑛!!=𝑛!!, nothing was changed.
the optimization algorithm, i.e. in the HF algorithm, the perturbation 𝑛!!=𝜂!𝜂!𝑛!! occurs
The process of perturbing the binned spiking data occurred anew on every iteration of
rate modulation across all electrodes of the array (e.g., array movement, arousal), while
resampled, which kept the average number of perturbed spikes in a given electrode and
training trial roughly equal to the average number of true (unperturbed) spikes in the
after each update of the network parameters. Note that these input data perturbations
were only applied during MRNN training; when the MRNN was used for closed-loop BMI
Page 32
control, true neural spike counts were provided as inputs. Supplementary Figure 3
shows the closed-loop control quality difference between the MRNN trained with and
without this data augmentation.
Controlling a BMI cursor with MRNN network output
Once trained, the MRNNs were compiled into the embedded real-time operating system
and run in closed-loop to provide online BMI cursor control. The decoded velocity and
position were initialized to 0, as was the MRNN hidden state. Thereafter, at each
decode time step the parallel pair of MRNNs received binned spike counts as input and
had their position and velocity outputs blended to yield a position estimate. This was
used to update the drawn cursor position. The on-screen position that the cursor moves
to during BMI control, 𝑑!𝑡,𝑑!𝑡, is defined by
where 𝑣!, 𝑣!, 𝑝!, 𝑝! are the normalized velocity and positions in the x and y dimensions
and 𝛾!,𝛾! are factors that convert from the normalized velocity and position,
respectively, to the coordinates of the virtual-reality workspace. The parameter 𝛽 sets
𝑑!𝑡 =𝛽𝑑!𝑡−𝛥𝑡 +𝛾!𝑣!𝑡−𝛥𝑡𝛥𝑡 + 1−𝛽𝛾!𝑝!𝑡
𝑑!𝑡 =𝛽𝑑!𝑡−𝛥𝑡 +𝛾!𝑣!𝑡−𝛥𝑡𝛥𝑡 +(1−𝛽)𝛾!𝑝!(𝑡)
the amount of position versus velocity decoding and was set to 0.99. In effect, the
decode was almost entirely dominated by velocity, with a slight position contribution to
stabilize the cursor in the workplace (i.e., offset accumulated drift). Note that when
calculating offline decode accuracy (Fig. 2), we set 𝛽 to 1 to more fairly compare the
MRNN to the FIT-KF decoder, which decodes velocity only.
We note that although 1) the MRNN's recurrent connections mean that previous inputs
affect how subsequent near-term inputs are processed, and 2) our standard procedure
Page 33
was to retrain the MRNN with additional data after each experimental session, the
MRNN is not an "adaptive" decoder in the traditional meaning of the term. Its
parameters are fixed during closed-loop use, and therefore when encountering
recording condition changes, the MRNN cannot "learn" from this new data to update its
neural-to-kinematic mappings in the way that adaptive decoders do (e.g., 4,24,27). Insofar
as its architecture and training regime make the MRNN robust to input changes, this
robustness is "inherent" rather than "adaptive."
Neural decoding using a Feedback Intention Trained Kalman Filter (FIT-KF)
We compared the performance of the MRNN to FIT-KF 40. The FIT-KF is a Kalman filter
where the underlying kinematic state, 𝐳(𝑡), comprises the position and velocity of the
cursor as well as a bias term. Observations of the neural binned spike counts, 𝐲(𝑡), are
used to update the kinematic state estimate. With 𝛥𝑡 denoting bin width (25 ms in this
study), the FIT-KF assumes the kinematic state gives rise to the neural observations
according to the following linear dynamical system:
𝐳𝑡+𝛥𝑡 = 𝐀𝐳𝑡 +𝐰𝑡
𝐲𝑡 =𝐂𝐳𝑡 +𝐪(𝑡)
where 𝐰(𝑡) and 𝐪𝑡 are zero-mean Gaussian noise with covariance matrices 𝐖 and 𝐐
respectively. The Kalman filter is a recursive algorithm that estimates the state 𝐳(𝑡)
using the current observation 𝐲(𝑡) and the previous state estimate 𝐳(𝑡−𝛥𝑡). Previous
The parameters of this linear dynamical system, 𝐀,𝐖,𝐂,𝐐, are learned in a supervised
studies have used such decoders to drive neural cursors (e.g. 5,38,64).
fashion from hand reach training data as previously reported6,65. The FIT-KF then
incorporates two additional innovations. First, it performs a rotation of the training
kinematics using the assumption that at every moment in time, the monkey intends to
Page 34
move the cursor directly towards the target. Second, it assumes that at every time step,
the monkey has perfect knowledge of the decoded position via visual feedback. This
affects Kalman filter inference in two ways: first, the covariance of the position estimate
in Kalman filtering is set to 0, and secondly, the neural activity that is explainable by the
cursor position is subtracted from the observed binned spike counts. These innovations
are further described in 6,40.
Mutual information for determining electrode dropping order
When testing the decoders' robustness to unexpected electrode loss, we determined
which electrodes to drop by calculating the mutual information between each electrode's
binned spike counts and the reach direction. This metric produced a ranking of
electrodes in terms of how statistically informative they were of the reach direction;
importantly, this metric is independent of the decoder being used. Let 𝑝 denote the
distribution of an electrode's binned firing rates, 𝑦 denote the binned spike counts lying
in a finite set 𝛶 of possible binned spike counts, 𝑀 denote the number of reach
directions, and 𝑥! denote reach direction j. The set 𝛶 comprised {0,1,2,3,4,5+} spike
counts, where any spike counts greater than or equal to 5 were counted towards the
same bin ("5+", corresponding to an instantaneous firing rate of 250 Hz in a 20 ms bin).
We calculated the entropy of each electrode,
as well as its entropy conditioned on the reach direction
!∈!
𝐻𝑌 =−
𝑝𝑥!
𝐻𝑌𝑋 =−
!
!!!
𝑝𝑦 log𝑝(𝑦),
𝑝𝑦𝑥!
!∈!
log𝑝𝑦𝑥!
.
Page 35
From these quantities, we calculated the mutual information between the neural activity
and the reach direction as 𝐼!"#$𝑋;𝑌 =𝐻𝑌 −𝐻(𝑌𝑋). We dropped electrodes in
order from highest to lowest mutual information.
Principal angles of neural subspaces analysis
For a parsimonious scalar metric of how similar patterns of neural activity during
reaching were between a given pair of recording days (used in Supplementary Fig. 1),
we calculated the minimum principal angle between the neural subspaces of each
recording day. We defined the neural subspace on a recording day as the top 𝐾
similar day 𝑖 and day 𝑗's motifs of covariance between electrodes' activity were during
arm reaching. Specifically, we started with a matrix 𝒀! from each day 𝑖 consisting of
principal components of the neural coactivations. Put more simply, we asked how
the number of non-overlapping 20 ms bins comprising the duration of this task. We next
neural activity collected while the monkey performed ~200 trials of a Radial 8 Task (8
cm distance to targets) using arm control; this task has been run at the start of almost
every experimental session conducted using both monkeys R and L since array
implantation. 𝒀! is of dimensionality 𝐸×𝑇, where E is the number of electrodes and T is
subtracted from each row of 𝒀! that electrode's across-days mean firing rate (we also
eigenvalue decomposition on the covariance matrix 𝒀!𝒀!! (note, 𝒀! is zero mean), and
defined the matrix 𝑽! as the first 𝐾 eigenvectors. 𝑽! had dimensions 𝐸×𝐾, where each
column 𝑘 is the vector of principal component coefficients (eigenvector) corresponding
to the 𝑘!! largest eigenvalue of the decomposition. Supplementary Fig. 1 was generated
repeated this analysis without across-days mean subtraction and observed qualitatively
similar results, not shown). To obtain the principal components, we performed
Page 36
using 𝐾=10, i.e., keeping the first 10 PCs, but the qualitative appearance of the data
was similar when 𝐾 was varied from 2 to 30 (not shown). Finally, the difference metric
between days 𝑖 and 𝑗 was computed as the minimum of the 𝐾 subspace angles
between matrices 𝑽! and 𝑽!. Subspace angles were computed using the subspacea
MATLAB function66.
Data and code availability
All relevant data and analysis code can be made available from the authors upon
request.
Acknowledgments
We thank Mackenzie Risch, Michelle Wechsler, Liana Yates, Shannon Smith, and Rosie
Steinbach for surgical assistance and veterinary care; Evelyn Castaneda and Beverly
Davis for administrative support; Boris Oskotsky for information technology support.
This work was supported by the National Science Foundation Graduate Research
Fellowship (J.C.K., S.D.S.); NSF IGERT 0734683 (S.D.S.); Christopher and Dana
Reeve Paralysis Foundation (S.I.R. and K.V.S.); and the following to K.V.S.: Burroughs
Welcome Fund Career Awards in the Biomedical Sciences, Defense Advanced
Research Projects Agency Reorganization and Plasticity to Accelerate Injury Recovery
N66001-10-C-2010, US National Institutes of Health Institute of Neurological Disorders
and Stroke Transformative Research Award R01NS076460, US National Institutes of
Health Director's Pioneer Award 8DP1HD075623-04, US National Institutes of Health
Director's Transformative Research Award (TR01) from the NIMH #5R01MH09964703,
Page 37
and Defense Advanced Research Projects Agency NeuroFAST award from BTO
#W911NF-14-2-0013.
Author contributions
D.S., S.D.S., and J.C.K. designed the experiments. D.S. trained the MRNN decoders.
S.D.S. and J.C.K. conducted the experiments and data analysis. S.D.S. wrote the
manuscript. J.C.K., D.S., and S.I.R. assisted in manuscript preparation. S.I.R. was
responsible for surgical implantation. K.V.S. was involved in all aspects of
experimentation, data review, and manuscript preparation.
Competing financial interests
The authors declare no competing financial interests.
Page 38
REFERENCES
1.
Hochberg,
L.
R.
et
al.
Reach
and
grasp
by
people
with
tetraplegia
using
a
neurally
controlled
robotic
arm.
Nature
485,
372–5
(2012).
2.
Collinger
et
al.
High--‐performance
neuroprosthetic
control
by
an
individual
with
tetraplegia.
Lancet
381,
557–64
(2013).
3.
Gilja,
V.
et
al.
Clinical
translation
of
a
high--‐performance
neural
prosthesis.
Nat.
Med.
21,
1142–1145
(2015).
4.
Jarosiewicz,
B.
et
al.
Virtual
typing
by
people
with
tetraplegia
using
a
self--‐calibrating
intracortical
brain--‐computer
interface.
Sci.
Transl.
Med.
7,
313ra179--‐313ra179
(2015).
5.
Bacher,
D.
et
al.
Neural
Point--‐and--‐Click
Communication
by
a
Person
With
Incomplete
Locked--‐In
Syndrome.
Neurorehabil.
Neural
Repair
29,
462–471
(2015).
6.
Gilja,
V.
et
al.
A
high--‐performance
neural
prosthesis
enabled
by
control
algorithm
design.
Nat.
Neurosci.
15,
1752–7
(2012).
7.
Nuyujukian,
P.,
Fan,
J.
M.,
Kao,
J.
C.,
Ryu,
S.
I.
&
Shenoy,
K.
V.
A
High--‐Performance
Keyboard
Neural
Prosthesis
Enabled
by
Task
Optimization.
IEEE
Trans.
Biomed.
Eng.
62,
21–29
(2015).
8.
Ganguly,
K.
&
Carmena,
J.
M.
Emergence
of
a
stable
cortical
map
for
neuroprosthetic
control.
PLoS
Biol.
7,
e1000153
(2009).
Flint,
R.
D.,
Ethier,
C.,
Oby,
E.
R.,
Miller,
L.
E.
&
Slutzky,
M.
W.
Local
field
potentials
9.
allow
accurate
decoding
of
muscle
activity.
Journal
of
Neurophysiology
108,
18–24
(2012).
10.
Nuyujukian,
P.
et
al.
Performance
sustaining
intracortical
neural
prostheses.
J.
Neural
Eng.
11,
66003
(2014).
11.
Chestek,
C.
a
et
al.
Single--‐neuron
stability
during
repeated
reaching
in
macaque
premotor
cortex.
J.
Neurosci.
27,
10742–50
(2007).
Simeral,
J.
D.,
Kim,
S.--‐P.,
Black,
M.
J.,
Donoghue,
J.
P.
&
Hochberg,
L.
R.
Neural
control
of
12.
cursor
trajectory
and
click
by
a
human
with
tetraplegia
1000
days
after
implant
of
an
intracortical
microelectrode
array.
J.
Neural
Eng.
8,
25027
(2011).
13.
Perge,
J.
A.
et
al.
Intra--‐day
signal
instabilities
affect
decoding
performance
in
an
intracortical
neural
interface
system.
J.
Neural
Eng.
10,
36004
(2013).
14.
Perge,
J.
A.
et
al.
Reliability
of
directional
information
in
unsorted
spikes
and
local
field
potentials
recorded
in
human
motor
cortex.
J.
Neural
Eng.
11,
46007
(2014).
15.
Wodlinger,
B.
et
al.
Ten--‐dimensional
anthropomorphic
arm
control
in
a
human
brain−machine
interface:
difficulties,
solutions,
and
limitations.
J.
Neural
Eng.
12,
16011
(2015).
16.
Aflalo,
T.
et
al.
Decoding
motor
imagery
from
the
posterior
parietal
cortex
of
a
tetraplegic
human.
Science
(80--‐.
).
348,
906–910
(2015).
17.
Jarosiewicz,
B.
et
al.
Advantages
of
closed--‐loop
calibration
in
intracortical
brain--‐
computer
interfaces
for
people
with
tetraplegia.
J.
Neural
Eng.
10,
46012
(2013).
18.
Huggins,
J.
E.,
Wren,
P.
A.
&
Gruis,
K.
L.
What
would
brain--‐computer
interface
users
want?
Opinions
and
priorities
of
potential
users
with
amyotrophic
lateral
sclerosis.
Amyotroph.
Lateral
Scler.
12,
318–324
(2011).
19.
Collinger
et
al.
Functional
priorities,
assistive
technology,
and
brain--‐computer
interfaces
after
spinal
cord
injury.
J.
Rehabil.
Res.
Dev.
50,
145
(2013).
20.
Srinivasan,
L.,
Eden,
U.
T.,
Mitter,
S.
K.
&
Brown,
E.
N.
General--‐Purpose
Filter
Design
for
Neural
Prosthetic
Devices.
J.
Neurophysiol.
98,
2456–2475
(2007).
Page 39
21.
Wu,
W.
&
Hatsopoulos,
N.
G.
Real--‐time
decoding
of
nonstationary
neural
activity
in
motor
cortex.
IEEE
Trans.
Neural
Syst.
Rehabil.
Eng.
16,
213–222
(2008).
Shpigelman,
L.,
Lalazar,
H.
&
Vaadia,
E.
Kernel--‐ARMA
for
Hand
Tracking
and
Brain--‐
22.
Machine
Interfacing
During
3D
Motor
Control.
Neural
Inf.
Process.
Syst.
1489–1496
(2008).
doi:citeulike--‐article--‐id:6002127
23.
DiGiovanna,
J.,
Mahmoudi,
B.,
Fortes,
J.,
Principe,
J.
C.
&
Sanchez,
J.
C.
Coadaptive
Brain
--‐
Machine
Interface
via
Reinforcement
Learning.
IEEE
Trans.
Biomed.
Eng.
56,
54–64
(2009).
24.
Li,
Z.,
O'Doherty,
J.
E.,
Lebedev,
M.
A.
&
Nicolelis,
M.
A.
L.
Adaptive
Decoding
for
Brain--‐
Machine
Interfaces
Through
Bayesian
Parameter
Updates.
Neural
Comput.
23,
3162–
3204
(2011).
25.
Dangi,
S.,
Gowda,
S.,
Heliot,
R.
&
Carmena,
J.
M.
Adaptive
Kalman
filtering
for
closed--‐
loop
Brain--‐Machine
Interface
systems.
2011
5th
Int.
IEEE/EMBS
Conf.
Neural
Eng.
NER
2011
609–612
(2011).
doi:10.1109/NER.2011.5910622
26.
Mahmoudi,
B.
&
Sanchez,
J.
C.
A
symbiotic
brain--‐machine
interface
through
value--‐
based
decision
making.
PLoS
One
6,
(2011).
27.
Orsborn,
A.
L.
et
al.
Closed--‐Loop
Decoder
Adaptation
Shapes
Neural
Plasticity
for
Skillful
Neuroprosthetic
Control.
Neuron
82,
1380–1393
(2014).
28.
Bishop,
W.
et
al.
Self--‐recalibrating
classifiers
for
intracortical
brain--‐computer
interfaces.
J.
Neural
Eng.
11,
26001
(2014).
29.
Pohlmeyer,
E.
A.,
Mahmoudi,
B.,
Geng,
S.,
Prins,
N.
W.
&
Sanchez,
J.
C.
Using
reinforcement
learning
to
provide
stable
brain--‐machine
interface
control
despite
neural
input
reorganization.
PLoS
One
9,
e87253
(2014).
Chestek,
C.
A.
et
al.
Long--‐term
stability
of
neural
prosthetic
control
signals
from
30.
silicon
cortical
arrays
in
rhesus
macaque
motor
cortex.
J.
Neural
Eng.
8,
45005
(2011).
Flint,
R.
D.,
Wright,
Z.
A.,
Scheid,
M.
R.
&
Slutzky,
M.
W.
Long
term,
stable
brain
31.
machine
interface
performance
using
local
field
potentials
and
multiunit
spikes.
J.
Neural
Eng.
10,
56005
(2013).
32.
Stavisky,
S.
D.,
Kao,
J.
C.,
Nuyujukian,
P.,
Ryu,
S.
I.
&
Shenoy,
K.
V.
A
high
performing
brain–machine
interface
driven
by
low--‐frequency
local
field
potentials
alone
and
together
with
spikes.
J.
Neural
Eng.
12,
36009
(2015).
33.
Homer,
M.
L.,
Nurmikko,
A.
V,
Donoghue,
J.
P.
&
Hochberg,
L.
R.
Sensors
and
decoding
for
intracortical
brain
computer
interfaces.
Annu.
Rev.
Biomed.
Eng.
15,
383–405
(2013).
34.
Kao,
J.
C.,
Stavisky,
S.
D.,
Sussillo,
D.,
Nuyujukian,
P.
&
Shenoy,
K.
V.
Information
Systems
Opportunities
in
Brain--‐Machine
Interface
Decoders.
Proc.
IEEE
102,
666–
682
(2014).
35.
Sutskever,
I.,
Martens,
J.
&
Hinton,
G.
Generating
text
with
recurrent
neural
networks.
in
Proceedings
of
the
28th
International
Conference
on
Machine
Learning
(2011).
36.
Martens,
J.
&
Sutskever,
I.
Learning
recurrent
neural
networks
with
Hessian--‐free
optimization.
Proc.
28th
Int.
Conf.
Mach.
Learn.
ICML
2011
1033–1040
(2011).
37.
Churchland,
M.
M.
&
Shenoy,
K.
V.
Temporal
complexity
and
heterogeneity
of
single--‐
neuron
activity
in
premotor
and
motor
cortex.
J.
Neurophysiol.
97,
4235–57
(2007).
Sussillo,
D.
et
al.
A
recurrent
neural
network
for
closed--‐loop
intracortical
brain–
38.
machine
interface
decoders.
J.
Neural
Eng.
9,
26027
(2012).
39.
Hochreiter,
S.
&
Schmidhuber,
J.
Long
Short--‐Term
Memory.
Neural
Comput.
9,
1735–
1780
(1997).
Page 40
40.
Fan,
J.
M.
et
al.
Intention
estimation
in
brain–machine
interfaces.
J.
Neural
Eng.
11,
16004
(2014).
Chase,
S.
M.,
Schwartz,
A.
B.
&
Kass,
R.
E.
Bias,
optimal
linear
estimation,
and
the
41.
differences
between
open--‐loop
simulation
and
closed--‐loop
performance
of
spiking--‐
based
brain--‐computer
interface
algorithms.
Neural
networks
22,
1203–13
(2009).
42.
Koyama,
S.
et
al.
Comparison
of
brain--‐computer
interface
decoding
algorithms
in
open--‐loop
and
closed--‐loop
control.
J.
Comput.
Neurosci.
29,
73–87
(2010).
43.
Cunningham,
J.
P.
et
al.
A
closed--‐loop
human
simulator
for
investigating
the
role
of
feedback
control
in
brain--‐machine
interfaces.
J.
Neurophysiol.
105,
1932–1949
(2011).
44.
Seo,
D.
et
al.
Wireless
Recording
in
the
Peripheral
Nervous
System
with
Ultrasonic
Neural
Dust
Neuron
NeuroResource
Wireless
Recording
in
the
Peripheral
Nervous
System
with
Ultrasonic
Neural
Dust.
Neuron
91,
1–11
(2016).
Fraser,
G.
W.,
Chase,
S.
M.,
Whitford,
A.
&
Schwartz,
A.
B.
Control
of
a
brain--‐computer
45.
interface
without
spike
sorting.
J.
Neural
Eng.
6,
55004
(2009).
So,
K.,
Dangi,
S.,
Orsborn,
A.
L.,
Gastpar,
M.
C.
&
Carmena,
J.
M.
Subject--‐specific
46.
modulation
of
local
field
potential
spectral
power
during
brain–machine
interface
control
in
primates.
J.
Neural
Eng.
11,
26002
(2014).
47.
Shenoy,
K.
V.
&
Carmena,
J.
M.
Combining
Decoder
Design
and
Neural
Adaptation
in
Brain--‐Machine
Interfaces.
Neuron
84,
665–680
(2014).
48.
Barrese,
J.
C.
et
al.
Failure
mode
analysis
of
silicon--‐based
intracortical
microelectrode
arrays
in
non--‐human
primates.
J.
Neural
Eng.
10,
66014
(2013).
49.
Gold,
C.,
Henze,
D.
a,
Koch,
C.
&
Buzsáki,
G.
On
the
origin
of
the
extracellular
action
potential
waveform:
A
modeling
study.
J.
Neurophysiol.
95,
3113–3128
(2006).
50.
Kao,
J.
C.
et
al.
Investigating
the
role
of
firing--‐rate
normalization
and
dimensionality
reduction
in
brain--‐machine
interface
robustness.
in
2013
35th
Annual
International
Conference
of
the
IEEE
Engineering
in
Medicine
and
Biology
Society
(EMBC)
2013,
293–298
(IEEE,
2013).
51.
Cunningham,
J.
P.
et
al.
A
Closed--‐Loop
Human
Simulator
for
Investigating
the
Role
of
Feedback--‐Control
in
Brain--‐Machine
Interfaces.
J.
Neurophysiol.
(2010).
doi:10.1152/jn.00503.2010
52.
Schwartz,
A.,
Ketter,
R.
&
Georgopoulos,
A.
Primate
motor
cortex
and
free
arm
movements
to
visual
targets
in
three--‐dimensional
space.
I.
Relations
between
single
cell
discharge
and
direction
of
movement.
J.
Neurosci.
8,
2913–2927
(1988).
53.
Riehle,
A.
&
Requin,
J.
Monkey
primary
motor
and
premotor
cortex:
single--‐cell
activity
related
to
prior
information
about
direction
and
extent
of
an
intended
movement.
J.
Neurophysiol.
61,
534–549
(1989).
54.
Wise,
S.
P.,
Moody,
S.
L.,
Blomstrom,
K.
J.
&
Mitz,
A.
R.
Changes
in
motor
cortical
activity
during
visuomotor
adaptation.
Exp.
brain
Res.
121,
285–99
(1998).
Crammond,
D.
&
Kalaska,
J.
Differential
relation
of
discharge
in
primary
motor
cortex
55.
and
premotor
cortex
to
movements
versus
actively
maintained
postures
during
a
reaching
task.
Exp.
Brain
Res.
108,
45–61
(1996).
56.
Messier,
J.
&
Kalaska,
J.
F.
Covariation
of
primate
dorsal
premotor
cell
activity
with
direction
and
amplitude
during
a
memorized--‐delay
reaching
task.
J.
Neurophysiol.
84,
152–165
(2000).
57.
Stark,
E.
&
Abeles,
M.
Predicting
movement
from
multiunit
activity.
J.
Neurosci.
27,
8387–94
(2007).
58.
Perel,
S.
et
al.
Single--‐unit
activity,
threshold
crossings,
and
local
field
potentials
in
Page 41
motor
cortex
differentially
encode
reach
kinematics.
J.
Neurophysiol.
114,
1500–1512
(2015).
Christie,
B.
P.
et
al.
Comparison
of
spike
sorting
and
thresholding
of
voltage
59.
waveforms
for
intracortical
brain–machine
interface
performance.
J.
Neural
Eng.
12,
16009
(2015).
60.
Nuyujukian,
P.
et
al.
Monkey
Models
for
Brain--‐Machine
Interfaces:
The
Need
for
Maintaining
Diversity.
in
33rd
Annual
International
Conference
of
the
IEEE
Engineering
in
Medicine
and
Biology
Society
(2011).
61.
Kaufman,
M.
T.,
Churchland,
M.
M.,
Ryu,
S.
I.
&
Shenoy,
K.
V.
Cortical
activity
in
the
null
space:
permitting
preparation
without
movement.
Nat.
Neurosci.
17,
440–8
(2014).
62.
Suminski,
A.
J.,
Tkach,
D.
C.,
Fagg,
A.
H.
&
Hatsopoulos,
N.
G.
Incorporating
Feedback
from
Multiple
Sensory
Modalities
Enhances
Brain--‐Machine
Interface
Control.
J.
Neurosci.
30,
16777–16787
(2010).
63.
Martens,
J.
Deep
learning
via
Hessian--‐free
optimization.
27th
Int.
Conf.
Mach.
Learn.
951,
735–742
(2010).
64.
Kim,
S.--‐P.,
Simeral,
J.
D.,
Hochberg,
L.
R.,
Donoghue,
J.
P.
&
Black,
M.
J.
Neural
control
of
computer
cursor
velocity
by
decoding
motor
cortical
spiking
activity
in
humans
with
tetraplegia.
J.
Neural
Eng.
5,
455–476
(2008).
65.
Wu,
W.
et
al.
Neural
Decoding
of
Cursor
Motion
Using
a
Kalman
Filter.
Adv.
Neural
Inf.
Process.
Syst.
15
Proc.
2002
Conf.
133–140
(2003).
doi:10.1.1.6.8776
66.
Knyazev,
A.
V
&
Argentati,
M.
E.
Principal
Angles
Between
Subspaces
in
An
A--‐Based
Scalar
Product:
Algorithms
and
Perturbation
Estimates.
SIAM
J.
Sci.
Comput.
23,
2008–2040
(2002).
Page 42
FIGURES (with legends below)
a
100
20
)
z
h
(
e
t
a
R
g
n
i
r
i
F
0
100
l
t
c
e
r
r
o
C
s
a
i
r
T
%
0
20
40
60 80
Time (min)
b
Recording Condition 1
Electrodes
c
Decoder Trained
From Chronic
Recordings
Traditional
Decoding
Dall
D1 D2 D1 D3 D4 D1 D5 D5 D1 D1 D2 D2 D3 D1 D3 D6
D5 D1
Recording Condition 2
Recording Condition 1
day 2
day 1
Time
…
?
previous day now
Recording Condition 3
(broken)
(lost)
(added)
Figure 1. Our strategy for training a decoder robust to recording condition
changes
(a) Example data from a BMI clinical trial showing sudden decoder failure caused by a
recording condition change. The black trace shows the participant's closed-loop
performance over the course of an experiment using a fixed Kalman filter. An abrupt
drop in performance coincides with a reduction in the observed firing rate (red trace) of
a neuron with a high decoder weight. Both the neuron's firing rate and decoder
performance spontaneously recover ~40 minutes later. Adapted from figure 7 of 13. (b) A
cartoon depicting one hypothetical cause of the aforementioned change: micro-motion
of the electrodes leads to Recording Condition 2, in which spikes from the red-shaded
neuron are lost. BMI recovery corresponds to a shift back to Condition 1. Over time,
further changes will result in additional recording conditions; for example, Condition 3 is
shown caused by a disconnected electrode and an additional neuron entering recording
range. (c) Recording conditions (schematized by the colored rectangles) will vary over
the course of chronic intracortical BMI use. We hypothesize that oftentimes new
conditions are similar to ones previously encountered (repeated colors). Typically,
decoders are fit from short blocks of training data and are only effective under that
recording condition (decoders D1, D2, …). Consider the goal of training a decoder for
use at time "now" (black rectangle on right). Standard practice is to use decoder D1
trained from the most recently available data (e.g. from the previous day or the start of
the current experiment). D1 will perform poorly if the recording condition encountered
differs from its training data. To increase the likelihood of having a decoder that will
perform well given the current recording condition, we tested a new class of decoder,
Dall, trained using a large collection of previous recording conditions.
Page 43
a
b
)
2
r
(
y
c
a
r
u
c
c
A
e
d
o
c
e
D
c
)
2
r
(
y
c
a
r
u
c
c
A
e
d
o
c
e
D
vy(t)
vx(t)
px(t)
py(t)
1
Training Days
Monkey R
1
Training Days
Monkey L
37 Training Days
25 Training Days
17 Training Days
11 Training Days
7 Training Days
5 Training Days
3 Training Days
2 Training Days
1 Training Day
7
)
2
r
(
y
c
a
r
u
c
c
A
e
d
o
c
e
D
1
51
Test Day
50 Training Days
38 Training Days
25 Training Days
17 Training Days
11 Training Days
7 Training Days
5 Training Days
3 Training Days
2 Training Days
1 Training Day
1
14
34
Test Day
1
0
r2 = 0.20
47
55
1
0
r2 = 0.24
59
0
1
MRNN
FIT Sameday
FIT Long
1
Recording Day
***
1
0
663
0
1
***
1
0
Recording Day
1024
0
1
0
Figure 2. An MRNN decoder can harness large training datasets
(a) Schematic of the experimental setup and MRNN decoder. A monkey performed a
target acquisition task using his hand while multiunit spikes were recorded from
multielectrode arrays in motor cortex. Data from many days of this task were used to
train two MRNNs such that velocity and position could be read out from the state of their
respective internal dynamics. These internal dynamics are a function of the binned spike
counts; thus, the MRNN can conceptually be thought of as selecting which internal
dynamics rules are active at any given time based on the input signals. During closed-
loop use, the decoded velocity and position outputs were blended together to
continuously update the on-screen cursor. (b) The MRNN was better prepared for future
days' recording conditions after being trained with more previously collected data. We
evaluated its ability to reconstruct offline hand velocity on 12 (16) monkey R (L) test
days after training with increasing numbers of previous days' datasets. Training data
Page 44
were added by looking further back in time so as to not conflate training data recency
with data corpus size. In monkey R the early test days also contributed training data
(with the test trials held out). In monkey L, from whom more suitable data was available,
the training datasets start with the day prior to the first test day. Thus, except for the few
monkey R overlap days, all training data comes chronologically before the test days.
More training data (darker colored traces) improved decode accuracy, especially when
decoding more chronologically distant recording conditions (later test days). For
comparison, we also plotted performance of a traditional decoder (FIT Kalman filter)
trained from each individual day's training data ("FIT Sameday", light blue). (Insets)
show the same MRNN data in a scatter plot of decode accuracy versus number of
training days (99 data points for monkey R, 160 for L), with linear fit trend lines revealing
a significant positive correlation. (c) An MRNN could successfully learn even larger
datasets spanning many more recording days. An MRNN (red trace) was trained with
data from 154 (250) monkey R (L) recording days spanning many months. Its offline
decoding accuracy on held-out trials from each of these same days was compared to
that of the FIT Sameday (light blue). We also tested a single FIT-KF trained using the
same large dataset as the MRNN ("FIT Long", dark blue). Gaps in the connecting lines
denote recording gaps of more than ten days. (Insets) mean ± s.d. decode accuracy
across all recording days. Stars denote p < 0.001 differences (signed-rank test). The
MRNN outperformed both types of FIT-KF decoders on every day's dataset.
Page 45
30
e
t
u
n
M
i
r
e
P
s
t
e
g
r
a
T
0
Monkey R
*
*
*
30
*
Monkey L
*
*
5/9 6/7 6/7
0/9
1/7
0
1/7
1/7
0/7
2 3
10
Top N Electrodes Dropped
1/7
1/7
7
2/7
2/7
5
0
7/11
3/11
3
1/4
2/8
0/4
0/8
0
10
Top N Electrodes Dropped
5/7
0/7
5
5/5
0/5
7
Figure 3. Robustness to unexpected loss of the most important electrodes
Closed-loop BMI performance using the MRNN (red) and FIT Sameday (blue) decoders
while simulating an unexpected loss of up to 10 electrodes by setting the firing rates of
these electrodes to zero. The mean and s.e.m. across experimental sessions' targets
per minute performance is shown for each decoder as a function of how many
electrodes were removed. Stars denote conditions for which the MRNN significantly
outperformed FIT Sameday across sessions (p < 0.05, paired t-test). The text above
each condition's horizontal axis tick specifies for how many of the individual evaluation
days MRNN (red fraction) or FIT Sameday (blue fraction) performed significantly better
according to single-session metrics of success rate and time to target. Electrode-
dropping order was determined by the mutual information between that electrode's
spike count and target direction during arm-controlled reaches.
Page 46
Monkey R
Decoder Set 2 Training Data
MRNN
FIT Long
FIT Old
Arm Control
FIT Sameday
Decoder Set 1 Training Data
MRNN
FIT Long
FIT Old
384
Day 1
30
e
t
u
n
M
i
r
e
P
s
t
e
g
r
a
T
0
Monkey L
Decoder Set 2 Training Data
MRNN
FIT Long
FIT Old
Decoder Set 1 Training Data
MRNN
FIT Long
FIT Old
706
Day 1
810
30
e
t
u
n
M
i
r
e
P
s
t
e
g
r
a
T
0
964
447
558
Set 1 Test{{Set 2 Test
Set 1 Test{{Set 2 Test
Figure 4. Robustness to naturally occurring recording condition changes
Robustness to a natural sampling of neural input variability. We created decoder
evaluation conditions in which the neural inputs were likely to be different from much of
the training data by withholding access to the most recent several months of data. Each
circle corresponds to the mean closed-loop BMI performance using these "stale" MRNN
(red), FIT Long (dark blue), and FIT Old (teal) decoders when evaluated on six different
experiment days spanning 7 (13) days in monkey R (L). Each test day, these three
decoders, as well as a FIT Sameday decoder trained from that day's arm reaches, were
evaluated in an interleaved block design. The legend bars also denote the time periods
from which training data for each stale decoder came from. We repeated the
experiments for a second set of decoders to reduce the chance that the results were
particular to the specific training data gap chosen. The training data periods contained
82 and 92 datasets (monkey R), and 189 and 200 training datasets (monkey L). The
only decoder that was consistently usable, i.e. did not fail on any test days, was the
MRNN. To aid the interpretation of these stale decoder performances, we show the
average performance across the six experiment days using arm control (gray dashed
line) or a FIT Sameday decoder (blue dashed line).
Page 47
3
6
2
6
4 cm
7
Monkey R
5
1
b
)
8
m
c
(
t
e
g
r
a
T
o
4
t
e
c
n
a
t
s
0
D
i
0
250
500
Trial Time (ms)
a
7
Arm Control
8
4
MRNN
1
3
FIT Sameday
2
6
8
2
4
8
4
0
0
750
3
1
4
8
5
7
5
Monkey L
250
500
Trial Time (ms)
750
Figure 5. MRNN has high performance under "ideal" conditions
(a) We compared cursor control using the MRNN (red) trained from many datasets up
through the previous day to the FIT Sameday (blue) trained from data collected earlier
the same day, without any artificial challenges (i.e. no electrodes dropped or stale
training data). Cursor trajectories are shown for eight representative and consecutive
center-out-and-back trials of the Radial 8 Task. Gray boxes show the target acquisition
area boundaries, and the order of target presentation is denoted with green numbers.
For comparison, cursor trajectories under arm control are shown in gray. From dataset
R.2014.04.03.
(b) Mean distance to target, across all Radial 8 Task trials under these favorable
conditions, as a function of trial time using each cursor control mode. Thickened
portions of each trace correspond to "dial-in time", i.e. the mean time between the first
target acquisition and the final target acquisition. These MRNN and FIT Sameday data
correspond to the drop 0 electrodes condition data in Figure 3, and include 4,094
(3,278) MRNN trials and 4119 (3,305) FIT Sameday trials over 9 (8) experimental days
in Monkey R (L).
Page 48
Supplementary Information
a
Monkey R
Session # 1
8
16
24
32
40
48
56
64
71
Monkey L
1
14
28
42
56
70
84
98
112
125
b
1 1
Recording Session #
71
20
1
1
Recording Session #
125
30
)
°
(
e
g
n
A
l
i
l
a
p
c
n
i
r
P
.
n
M
i
i
#
n
o
s
s
e
S
g
n
d
r
o
c
e
R
i
2
#
i
n
o
s
s
e
s
4
2
#
i
n
o
s
s
e
s
2
8
4
#
i
n
o
s
s
e
s
0
7
#
i
n
o
s
s
e
s
125
32
2
#
i
n
o
s
s
e
s
2
4
#
i
n
o
s
s
e
s
4
8
#
i
n
o
s
s
e
s
5
4
2
1
#
i
n
o
s
s
e
s
Recording Day
658
3
1
34%
Recording Day
1003
i
#
n
o
s
s
e
S
g
n
d
r
o
c
e
R
i
70
c
20
e
c
a
p
s
b
u
S
.
i
n
M
)
°
(
l
e
g
n
A
2
d
y
c
n
e
u
q
e
r
F
e
c
n
e
r
u
c
c
O
1
35%
1
10
20
Number of Recording Sessions Apart
30
1
10
20
30
40
Number of Recording Sessions Apart
Supplementary Figure 1. For a given day, similar neural recording conditions can be
found on some other day(s). Chronologically close days tend to have more similar neural
recordings, but for a given day there are occasional similar recordings from more distant days.
(a) To minimize the potential effect of behavioral variability on neural variability, we restricted
this analysis to recording sessions with very consistent Radial 8 Target task behavior. Hand
velocity correlations between all pairs of sessions within the included set were at least 0.9.
Representative hand position traces (mean over trials towards each target) are shown for ten
sessions spanning the months analyzed. (b) Between-day variability of the structure of neural
activity recorded during reaches over the course of many months (71 recording sessions over a
658 day period in monkey R, and 125 sessions spanning 1003 days in monkey L; these
correspond to a subset of the days included in Fig. 2c). The color at the intersection of row i
Page 49
and column j corresponds to how differently the observed neural activity covaried during
recording sessions i and j. Specifically, we have plotted the minimum principal angle between
subspaces spanned by the top 10 eigenvectors of each day's mean-activity-subtracted
covariance matrix (see Methods). These 10 eigenvectors captured on average 51 (46)% of
single-trial variance for monkeys R (L). Sharp "block" structure transitions typically correspond
to a long (many weeks') interval between consecutive recording sessions. (c) Four slices
through each monkey's principal angle matrix show that for these example days, there were
similar recording conditions on other days both near and far in time. Each color series shows
the minimum principal angle between every recording day's data and the reference day
marked with this color's arrow in panel b. Note that the horizontal axis, which spans the same
time range as in panel b, is now in units of (calendar) days rather than session number. Each
series' reference day is marked with a vertical line. (d) Histograms showing the distribution,
across each monkey's recordings, of how many recording sessions apart (either forward or
back in time) we observed the most similar neural correlates of reaching as measured by
minimum principal angle.
Monkey R
Dropped
Electrode
192
160
140
120
100
80
60
40
20
e
d
o
r
t
c
e
E
l
)
z
H
(
e
t
a
R
g
n
i
r
i
F
e
g
a
r
e
v
A
e
d
o
r
t
c
e
E
l
96
80
60
40
20
40
30
20
10
0
Monkey L
)
z
H
(
e
t
a
R
g
n
i
r
i
F
e
g
a
r
e
v
A
20 40 60 80 100 120 140 160 180
1
Previous Training Data
212 231
Experiments
60
50
40
30
20
10
0
20
1
Previous Training Data
40
60
80 100
119
129
Experiments
Recording Session #
Recording Session #
Supplementary Figure 2. Artificially dropped electrodes were active in the training data.
These plots show each electrode's average firing rate during each dataset used to train the
MRNN; electrodes are ordered by descending average firing rate across all recording sessions.
Recording sessions numbered in gray were only used for training data. The electrode dropping
experiments (Fig. 3) were conducted during the sessions numbered in black. Zero firing rates
(i.e. non-functional electrodes) are shown in purple for emphasis, while electrodes selected for
dropping on a particular day are shown in red (note that although on a given test session we
evaluated different numbers of electrodes dropped, this plot shows each day's broadest
dropped set). These dropped electrodes rarely recorded zero firing rates in the training data
sessions, and the specific sets of dropped electrodes used to challenge the decoders never all
had zero firing rates in the training data.
Page 50
a
30
e
t
Monkey R
30
Monkey L
u
n
M
i
r
e
P
s
t
e
g
r
a
T
0
b
800
600
)
s
m
(
t
e
g
r
a
T
o
400
t
e
m
T
i
200
0
2/2
0/2
7
1/1
0/1
5
2/2
0/1
0/1
0/2
2 3
2/2
0/2
0/2
0/2
10
0
Top N Electrodes Dropped
Monkey R
Training Set 1
Training Set 2
0
not
1/3
tested
0/3
0
10
Top N Electrodes Dropped
1/1
0/1
7
2/2
0/2
5
1/1
0/1
3
Monkey L
Training Set 1
800
600
400
200
0
l
s
a
i
r
t
5
1
2
=
n
4
1
2
=
n
4
2
2
=
n
6
2
2
=
n
8
6
2
=
n
9
2
2
=
n
Block
1600
1200
800
400
0
6
0
2
=
n
5
1
2
=
n
0
1
2
=
n
9
0
2
=
n
8
1
2
=
n
5
3
2
=
n
Block
0
8
1
=
n
3
9
1
=
n
6
8
1
=
n
7
9
1
=
n
3
7
1
=
n
6
9
1
=
n
Block
Supplementary Figure 3. Training data spike rate perturbations improve closed-loop
MRNN robustness.
(a) Robustness to electrode dropping. We evaluated the closed-loop BMI performance of the
MRNN decoder trained with (red) and without (brown) the spike rate perturbations training data
augmentation. Both decoders were evaluated on the same day with firing rates on varying
numbers of the most informative electrodes set to zero (similar to Fig. 3). Each circle
corresponds to a decoder's targets per minute performance on a given evaluation day. In total
there were 3 sessions per monkey. Filled circles denote conditions where there was a
significant within-session performance difference between the two decoders tested according
to: p < 0.05 binomial test on success rate, followed, if success rate was not significantly
different, by a more sensitive comparison of times to target (p < 0.05, rank-sum test). Fractions
above the horizontal axis specify for how many of the individual evaluation days each decoder
performed significantly better. Trend lines show the across-sessions mean targets per minute
performance for each decoder. The MRNN trained with perturbed firing rates outperformed the
MRNN trained without data augmentation when encountering electrode-dropped neural input.
(b) Robustness to naturally occurring neural recording condition changes. MRNNs were trained
without access to recent training data, as in the Fig. 4 stale training data experiments, either
with (red) or without (brown) training data spike rate perturbations. We trained decoders from
both of monkey R's stale training data periods and from monkey L's longer stale training data
period. Closed-loop BMI performance using these decoders was then compared on the same
evaluation day in alternating blocks. Bars show mean ± s.e.m. time to target for each block of
trials (success rates using both training paradigms were close to 100%). The MRNN with spike
rate perturbations had significantly faster times to target in monkey R (p < 0.05, rank-sum test
aggregating trials across blocks) and showed a trend of faster times to target in monkey L (p =
0.066). Datasets R.2014.03.21 & L.2014.04.04.
Page 51
Monkey R
)
2
r
(
y
c
a
r
u
c
c
A
e
d
o
c
e
D
0.8
0.6
0.4
0.2
0
MRNN Big w/ SP
MRNN Big no SP
MRNN Small w/SP
MRNN Small no SP
MRNN 1 day w/SP
MRNN 1 day no SP
FIT Sameday
FIT Long
0
1
2
3
7
Top N Electrodes Dropped
4
5
6
0.8
0.6
0.4
0.2
0
8
9
0
1
2
Monkey L
3
4
Top N Electrodes Dropped
5
6
7
8
9
Supplementary Figure 4. Offline decode experiments testing various training paradigms'
robustness to unexpected loss of electrodes
We performed offline decoding analyses to test how each of the three main components of our
method – the use of an MRNN architecture instead of a linear Kalman filter, the use of large
training datasets, and the spike count perturbation data augmentation – contributed to
improved robustness to unexpected loss of the most important electrodes, similar to the online
tests shown in Figure 3. The results suggest that both the use of the MRNN architecture and
training data augmentation contributed to the complete system's improved robustness to a
novel recording condition consisting of electrode dropping.
We trained MRNNs with different quantities of data: 1 day of (held out) data from the
test day, a 'Small' dataset consisting 10-13 days up to and including the test day, or a "Big"
dataset of 40 – 100 days up to and including the test day, with ("w/SP") or without ("no SP")
additional spike count perturbations during training. We also trained a FIT-KF Sameday
decoder and a FIT-KF Long which used the same datasets as the MRNN Big datasets. We
compared the offline decoding accuracy of each decoder as a function of the number of
electrodes dropped, using the same electrode dropping order determination method as in the
Figure 3 online experiments. Three decoders were trained for each training paradigm using
data from different periods of each monkey's research career; these decoders' training dates
correspond to exactly the same as those in Supplementary Figure 6, and each decoder was
tested on held out data from its last day of training. We averaged offline hand velocity
reconstruction accuracy across each monkey's three testing days. We found that applying the
spike count perturbation always increased MRNN robustness to electrode dropping (compiling
r2 across all SP vs all no SP decoders across all three test days, SP decoders performed better
than no SP decoders, p < 0.001, signed-rank test). Note that, as expected, training with larger
dataset sizes did not strongly affect performance or robustness to electrode dropping, since all
MRNN's have 'seen' data collected on the same day as the withheld testing data.
Page 52
35
e
t
u
n
M
i
r
e
P
s
t
e
g
r
a
T
0
Monkey R
35
Monkey L
FIT Old from 2013-09-19
FIT Old from 2014-02-03
FIT Old from 2013-04-16
FIT Old from 2013-11-21
FIT Old from 2012-09-21
0
FIT Old from 2013-10-22
FIT Old from 2013-10-09
FIT Old from 2013-07-10
FIT Old from 2011-08-04
Days Between Training Data and Decoder Test
272
965 978
31
Days Between Training Data and Decoder Test
559
155
Supplementary Figure 5. Additional tests showing that FIT Old typically performs poorly.
We investigated whether our result that three of the four different FIT Old decoders tested in
the main stale training data experiments (Fig. 4) failed was due to a particularly unlucky choice
of FIT Olds. To better sample the closed-loop performance of FIT-KF decoders trained using
old training data, we trained FIT Old decoders from 3 (monkey R) and 2 (Monkey L) additional
arbitrarily chosen arm reaching datasets from the monkey's prior experiments. We evaluated all
5 (4) FIT Old decoders on a number of additional days over the course of the current study (8
total test days for monkey R, 13 total test days for monkey L). Each point shows the
performance of a particular FIT Old decoder on one test day. Different days' evaluations of the
same FIT Old decoder are shown in the same color. Black borders denote data points and
black underlines denote decoders that are shared with Fig. 4.
Page 53
)
2
r
(
y
c
a
r
u
c
c
A
e
d
o
c
e
D
1
0.8
0.6
0.4
0.2
0
Monkey R
w/SP
no SP
w/SP
MRNN 1 day MRNN Small MRNN Big
no SP
no SP
w/SP
1
0.8
0.6
0.4
0.2
0
FIT
Old
FIT
Long
Monkey L
w/SP
no SP
w/SP
MRNN 1 day MRNN Small MRNN Big
no SP
no SP
w/SP
FIT
Old
FIT
Long
Supplementary Figure 6. Offline decode experiments testing various training paradigms'
robustness to naturally occurring recording condition changes
We performed offline decoding analyses to test how each of the three main components of our
method – the use of an MRNN architecture instead of a linear Kalman filter, the use of large
training datasets, and the spike count perturbation data augmentation – contributed to
improved robustness to naturally occurring recording condition changes similar to the online
'stale' training data tests shown in Figure 4. We performed offline decoding evaluations across
three different training data gaps and found that using more previously collected data and
incorporating data augmentation both improved the MRNN's performance on the future test
data. MRNNs trained with many datasets outperformed FIT-KFs trained using the same data
("FIT Long") or just the most recent data ("Fit Old"). These results suggest that all three
components of the method contributed to the complete system's improved robustness.
(Left) Offline decode results for Monkey R. We performed an offline decode for 8 different types
of decoders and aggregated each decoder's performance over the three gaps. The MRNN
decoders were either trained with 1 day of data "1 day," a "Small" dataset (gap 1: 13 datasets,
gaps 2 and 3: 10 datasets) or a "Big" dataset (gap 1: 40 datasets, gap 2: 44 datasets, gap 3:
37 datasets). The MRNN decoders were also either trained with no spike rate perturbations
("no SP") or with spike rate perturbations ("w/SP"). We also trained a FIT Old using the most
recent dataset and a FIT Long which used the same datasets as the MRNN Big datasets. Gap
1 comprised training data from 2012-10-22 (YYYY-MM-DD) to 2013-04-19 and testing data
from 2013-07-29 to 2013-11-21 (44 testing days). Gap 2 comprised training data from 2013-
07-29 to 2013-11-21 and testing data from 2014-02-03 to 2014-04-07 (37 testing days). Gap 3
comprised training data from 2014-02-03 to 2014-04-07 and testing data from 2014-06-16 to
2014-08-19 (33 testing days). The bars show the mean ± s.d. performance of each training
approach across all 3 gaps. We observed the same trends across individual gaps, with the
MRNN Big w/SP decoder always achieving the best performance (p < 0.01, signed-rank test
with every other decoder, all gaps).
(Right) Same for Monkey L. The Small datasets comprised 10 datasets (gap 1 and 2) or 11
datasets (gap 3), while the Big datasets comprised 103 datasets (gap 1), 105 datasets (gap 2),
and 77 datasets (gap 3). Gap 1 comprised training data from 2010-03-04 to 2010-10-26 and
testing data from 2011-01-17 to 2011-04-28 (51 testing days). Gap 2 comprised training data
from 2011-01-18 to 2011-10-04 and testing data from 2012-04-02 to 2012-07-19 (51 testing
days). Gap 3 comprised training data from 2012-04-02 to 2012-10-12 and testing data from
2013-01-26 to 2013-07-10 (37 testing days). Across individual gaps, the same trends showed
were displayed, with the MRNN Big w/SP decoder always achieving the best performance (p <
0.01, signed-rank test with every other decoder, all gaps, except in Gap 2 when comparing to
MRNN Small w/SP, p = 0.1, and Gap 3 where it on average achieved a lower r2 than MRNN
Small w/SP and MRNN Big no SP).
Page 54
a
0.4
l
s
a
i
r
T
Monkey R
474 ms median Arm Control (n = 1,018)
562 ms median MRNN (n = 649)
0.4
Monkey L
557 ms (n = 519)
692 ms (n = 207)
f
o
n
o
i
t
c
a
r
F
b
0
0
1000 2000 3000 4000
Time to Target (ms)
fail
0
0
1000 2000 3000 4000
Time to Target (ms)
fail
4 cm
fail
2001-5000
2000
)
s
m
(
t
1100
e
g
r
a
t
o
t
e
m
T
i
200
Page 55
Supplementary Figure 7. Closed-loop MRNN decoder performance on the Random
Target Task.
Both monkeys were able to use the MRNN decoder to acquire targets across a broad
workspace in which targets often appeared at locations that differed from the target locations
dominating the training datasets.
(a) Histograms of Random Target Task times to target (time of final target entry minus target
onset time, not including the 500 ms target hold period) using the MRNN decoder are shown in
red. For comparison, histograms of performance on the same task using arm control are
shown in gray.
(b) Task workspace plots showing the location of each Random Target Task trial's target
during MRNN decoder evaluation. Each point corresponds to the center of one trial's target,
and its color represents the time it took the monkey to acquire this target. The location of the
one failed trial (for monkey R) is shown with a black 'x'. The acquisition area boundaries of the
nine Radial 8 Task targets used for the majority of the training data are shown as black
squares. Monkey R's data are aggregated across the two experimental sessions in which he
performed this task. Monkey L's data are from one session.
Supplementary Video 1. Example closed-loop performance of the MRNN
The MRNN was trained using reaching data from 125 recording sessions up through
the previous day. The video shows a continuous 90 seconds of monkey R using this
decoder to perform the Radial 8 Task. He controls the white cursor and acquires the
green target (which turns blue during the 500 ms target hold period). Dataset
R.2014.04.03. This is a portion of the data used to generate the drop 0 electrodes
condition of Fig. 3.
Supplementary Video 2. Side-by-side comparison of the MRNN and FIT Sameday
decoders after electrode dropping
During the experiment, the two decoders were evaluated in alternating blocks after the
same 3 most important electrodes were dropped. Here we show a continuous 60
seconds of each decoder's closed-loop performance from consecutive blocks. The
MRNN (right side) was trained using reaching data from 125 recording sessions up
through the previous day, while the FIT Kalman filter (left side) was trained using
reaching data from earlier that same day. Dataset monkey R.2014.04.03. This is a
portion of the data used to generate the drop 3 electrodes condition of Fig. 3.
Page 56
Supplementary Data 1. Array recording quality measurements across this study's
recording days
For task consistency, these analyses were restricted to those recording days when
Baseline Block data was collected. Reach direction tuning was calculated as in 32: for
each recording day, we calculated each electrode's average firing rate over the course
of each trial (analysis epoch: 200 to 600 ms after target onset) to yield a single data
point per trial, and then grouped trials by target location. 69.0 ± 7.7 of monkey R's
electrodes (mean ± s.d. across recording days) and 66.3 ± 12.3 of monkey L's
electrodes exhibited significantly different firing rates when reaching to at least one of
the eight different targets (p < 0.01, one-way ANOVA). These tuned electrodes'
modulation range, defined here as the trial-averaged rates firing rate difference
between reaches to the two targets evoking the highest and lowest rates, was 26.4 ±
5.9 Hz in monkey R monkey (mean ± s.d., averaged first across all electrode pairs in a
given recording day, and then over days) and 23.8 ± 5.6 Hz in monkey L. We did not
observe cross-talk between electrodes' threshold crossings, consistent with recording
spiking activity from electrodes at least 400 μm apart: pairwise electrode cross-
correlations, computed using the time-series of firing rates in consecutive non-
overlapping 20 ms bins spanning a given day's Baseline Block, was 0.0089 ± 0.0021 in
monkey R (mean ± s.d., averaged first across all electrode pairs in a given recording
day, and then over days) and 0.0150 ± 0.0058 in monkey L.
Page 57
|
1309.3535 | 1 | 1309 | 2013-09-13T18:33:55 | Identification of criticality in neuronal avalanches: II. A theoretical and empirical investigation of the driven case | [
"q-bio.NC",
"math-ph",
"math-ph"
] | The observation of apparent power-laws in neuronal systems has led to the suggestion that the brain is at, or close to, a critical state and may be a self-organised critical system. Within the framework of self-organised criticality a separation of timescales is thought to be crucial for the observation of power-law dynamics and computational models are often constructed with this property. However, this is not necessarily a characteristic of physiological neural networks - external input does not only occur when the network is at rest/a steady state. In this paper we study a simple neuronal network model driven by a continuous external input (i.e.\ the model does not have a separation of timescales) and analytically tuned to operate in the region of a critical state (it reaches the critical regime exactly in the absence of input - the case studied in the companion paper to this article). The system displays avalanche dynamics in the form of cascades of neuronal firing separated by periods of silence. We observe partial scale-free behaviour in the distribution of avalanche size for low levels of external input. We analytically derive the distributions of waiting times and investigate their temporal behaviour in relation to different levels of external input, showing that the system's dynamics can exhibit partial long-range temporal correlations. We further show that as the system approaches the critical state by two alternative `routes', different markers of criticality (partial scale-free behaviour and long-range temporal correlations) are displayed. This suggests that signatures of criticality exhibited by a particular system in close proximity to a critical state are dependent on the region in parameter space at which the system (currently) resides. | q-bio.NC | q-bio |
Identification of criticality in neuronal avalanches: II. A the-
oretical and empirical investigation of the driven case
Caroline Hartley1,2, Timothy J Taylor3 , Istvan Z Kiss4 , Simon F Farmer5,6 and Luc Berthouze∗2,3
1 Centre for Mathematics and Physics in the Life Sciences and Experimental Biology, University College London, London, UK.
2 Institute of Child Health, University College London, London, UK.
3 Centre for Computational Neuroscience and Robotics, University of Sussex, Falmer, UK.
4 School of Mathematical and Physical Sciences, Department of Mathematics, University of Sussex, Falmer, UK.
5 National Hospital of Neurology and Neurosurgery, London, UK.
6 Institute of Neurology, University College London, London, UK.
Email: Caroline Hartley - [email protected]; Timothy J Taylor - [email protected]; Istvan Z Kiss - [email protected];
Simon F Farmer - [email protected]; Luc Berthouze - [email protected];
∗Corresponding author
Abstract
The observation of apparent power-laws in neuronal systems has led to the suggestion that the brain is at,
or close to, a critical state and may be a self-organised critical system. Within the framework of self-organised
criticality a separation of timescales is thought to be crucial for the observation of power-law dynamics and
computational models are often constructed with this property. However, this is not necessarily a characteristic of
physiological neural networks - external input does not only occur when the network is at rest/a steady state. In
this paper we study a simple neuronal network model driven by a continuous external input (i.e. the model does
not have a separation of timescales) and analytically tuned to operate in the region of a critical state (it reaches
the critical regime exactly in the absence of input - the case studied in the companion paper to this article). The
system displays avalanche dynamics in the form of cascades of neuronal firing separated by periods of silence.
We observe partial scale-free behaviour in the distribution of avalanche size for low levels of external input. We
analytically derive the distributions of waiting times and investigate their temporal behaviour in relation to different
levels of external input, showing that the system's dynamics can exhibit partial long-range temporal correlations.
We further show that as the system approaches the critical state by two alternative 'routes', different markers
of criticality (partial scale-free behaviour and long-range temporal correlations) are displayed. This suggests that
signatures of criticality exhibited by a particular system in close proximity to a critical state are dependent on the
1
region in parameter space at which the system (currently) resides.
Introduction
In recent years, apparent power-laws (i.e. where a power-law is the best model for the data using a model
selection approach [1,2]) have been observed experimentally in neurophysiological data leading to the sugges-
tion that the brain is a critical system [3, 4]. These observations have included that of neuronal avalanches -
cascades of neuronal firing recorded in vivo and in vitro whose size and duration appear to follow power-law
distributions [5 -- 9]. Recently it has been claimed that equivalent neuronal avalanche behaviour with the same
power-law relationship can be identified in human MEG (magnetoencephalography) recordings [10]. On a
wider scale, fluctuations in oscillation amplitude in human (adult and child) EEG (electroencephalography)
and MEG exhibit a power-law decay of the autocorrelation function of the signal - a property known as
long-range temporal correlations (LRTCs) [4, 11 -- 15]. These observations and the idea that the brain is a
critical system have drawn much attention as critical systems have been shown to exhibit optimal dynamic
range and optimal information processing [16,17]. Moreover, it has led to the hypothesis that brain dynamics
may fit within the framework of self-organised criticality (SOC), i.e. a system that does not require external
tuning of parameters to reach the critical state [4, 18, 19].
While the observation of power-laws within neuronal activity may be attractive we must address the
issue of whether (specifically) a neuronal system in the region of a critical state can produce this type of
dynamics. Propagation of the spiking of neurons within a network has been interpreted within the context
of percolation dynamics and the theory of branching processes [20, 21]. A critical branching process is a
process such that one active node will activate on average one other node at the next time-step and so one
can discern how this would relate to neuronal systems whereby the system is critical if one active neuron
on average activates one other neuron at the next time-step. A critical branching process will display
power-law dynamics, however, a number of assumptions underlying branching processes do not hold true in
neurophysiological systems. Firstly, the theoretical analysis of branching processes relies on full-sampling of
the system. Full-sampling is unlikely to occur in the experimental setting and this can have a profound effect
on the observed distributions [22]. Additionally, re-entrant connections invalidate the standard theory of
branching processes [21] which brings into question the idea that neuronal systems can be modelled as critical
branching processes. Moreover, the strict definition of a critical system is one that operates at a second order
phase transition which applies only to systems with infinite degrees of freedom. Therefore, we may expect
a critical system to exhibit an exact power-law distribution in the case of infinite size but what should we
2
expect if the system is finite? As neuronal systems are necessarily finite this is an important question in the
field but one that has yet to be fully addressed. Within experimental results this fact has been accounted
for by the concept of finite-size effects - where a power-law is observed up to a cut-off value [2, 5, 6, 19]. This
cut-off value has been suggested to coincide with the size of the system and distributions from networks of
different sizes have been shown to exhibit an exact scaling relationship - a phenomenon known as finite-size
scaling [2, 23]. However, the finite-size effect with a cut-off value at system size has been assumed without
analytical derivation (though, see the companion paper to this article [24], as described below) and the
question of how a finite critical system behaves and the types of dynamics possible from such a system
remains open in the field. Whether a finite-size system should display the same signatures of criticality as
the system in the limit of system size is not known.
In the companion paper to this article [24] we examined a computational model of a finite neuronal
system analytically tuned to its critical state, defined as a transcritical bifurcation. There we showed that
the dynamics of the system, which by analogy with experimental neuronal avalanches could be termed
avalanches (discrete cascades of neuronal firing), exhibited scaling which does not follow an exact power-law
but does exhibit partial scale-free behaviour. We were able to show that the cut-off value is approximately
the system size, as suggested experimentally by the finite-size effect, but is analytically related to the lead
eigenvalue of the transition matrix (the matrix of all possible transitions at each simulation step). This is an
important observation given that avalanches in systems with re-entrant connections could in principle be of
infinite size and yet experimental observations have suggested that neuronal avalanches exhibit a finite-size
cut-off [2, 5]. Overall, the results suggested that finite systems at criticality exhibit signatures of critical
systems dynamics but do not (at least in this instance) exhibit exact power-laws as had previously been
suggested.
While the system studied in the companion paper leads us to a greater understanding of the dynamics
displayed by a finite neuronal system, there is still an important difference between the system studied there
and physiological neuronal systems.
In the companion paper the system was seeded by setting a single
neuron in the network into the active state and an avalanche was defined as the firing that occurred until the
network returned to a stable state (the fully quiescent state). After this point no more firing could occur until
the system was reseeded. This imposed a strict separation of timescales, with all avalanches and neuronal
firing occurring on a much faster timescale than the timescale of the 'external input' reseeding the system.
Many other computational models have also taken this approach [18, 25, 26], with a separation of timescales
thought to be necessary for the observation of self-organised critical dynamics [23]. While a separation of
3
timescales is likely to occur in some natural systems such as earthquakes, where friction in the Earth's plates
build up over the course of years but energy is released in a matter of minutes, this is not a physiologically
realistic assumption for a neuronal system. External input (be it from the environment or other areas of
the nervous system) will not arrive only once the neuronal population has returned to a set state. Before
physiological recordings can be interpreted within the field of critical systems we must address the question
of the types of dynamics that should be expected by not only a finite-size system but also a system that is
driven by a physiologically realistic external input. Can a finite-size system without an explicit separation
of timescales in the region of a critical regime exhibit markers of criticality? How might the external input
to the system affect these markers?
Previous authors examining computational neuronal networks with continuous driving (i.e. no explicit
separation of timescales) have observed power-law dynamics [16, 27 -- 29].
In particular, Kinouchi and
Copelli [16] and Larremore et al. [29] analytically determined the parameters required such that the model
they studied was at criticality and displayed peak dynamic range, in fully connected networks and networks
with a range of topologies, respectively. However, these authors did not explicitly examine the firing dy-
namics of the system in the region of the critical regime, concentrating on average activity levels.
In a
SOC system such as the sandpile model [18] the waiting times (periods of inactivity between avalanches)
have been shown to follow an exponential distribution [30]. However, these waiting times are related to the
reseeding of the system - sand is added to cells chosen at random and the next avalanche begins when a cell
exceeds the threshold. In contrast, recent experimental work has shown that waiting times between neuronal
avalanches in cultures have a distribution with two trends - a (short) initial power-law region thought to
relate to neuronal up-states and a bump in the distribution at longer waiting times thought to relate to neu-
ronal down-states [31]. Could this difference in these waiting time distributions (between the SOC sandpile
model and the neuronal avalanches in culture) be explained by the fact that physiological neuronal systems
do not have a separation of timescales?
As mentioned previously, another signature of criticality that has been reported in neural systems is
the presence of LRTCs. In the majority of cases they have been observed in large scale neuronal signals
such as human brain oscillations. Recent endeavours have been made to link these observations of scale-
free behaviour on large scales with neuronal avalanches [32, 33]. Poil and colleagues demonstrated in a
computational neuronal network that power-law distributed avalanches and LRTCs in oscillations emerge
concurrently.
In addition, LRTCs have also been detected in the waiting times of bursts of activity in
cultures [34] and the discontinuous burst activity recorded from extremely preterm human neonates [35].
4
Thus, LRTCs have been demonstrated in discrete neuronal activity yet they have not been examined in the
waiting times of neuronal avalanches themselves. While LRTCs in avalanche activity would not be possible
in a seeded computational system (where the activity is initiated 'by hand' and there is no memory within
the system's dynamics) it is conceivable that a driven system, which is more akin to physiological networks
which can display LRTCs, might display this type of dynamics in the waiting times of neuronal avalanches.
In summary, in this paper we aim to address the following questions:
1. Assuming that the brain, or population of neurons under study, operates in the region of a critical
regime can it be expected to display power-law statistics given that it is a finite-size system? If not
what distribution should we expect? As discussed, this question was also addressed in the companion
paper [24], where we studied a system without an external input. However, here we specifically
consider this question in the context of a driven system, i.e. with a non-zero external input and no
explicit separation of timescales.
2. Can we expect a finite-size neuronal system in the region of a critical regime to exhibit other markers
of criticality, and specifically the presence of LRTCs? Does the presence of LRTCs relate to that of
power-law distributions? As described above, LRTCs have been observed in neurophysiological data
sets. However, a systematic examination of how LRTCs may relate to other markers of criticality in
neuronal systems is lacking.
3. How are signatures of criticality (power-law distributions and LRTCs) affected by proximity to the
critical regime? One might assume that a system which is closer to a critical regime may exhibit
signatures of criticality, whereas a system that is further from the critical regime will not. Importantly,
our analysis shows that this assumption is in fact not (always) true.
In this paper, as in the companion paper, we examine a purely excitatory stochastic neuronal model. As
in the companion paper, a number of assumptions are made to simplify the model with the outcome that it is
analytically tractable and therefore can be tuned to operate in the region of a critical regime. This approach
is taken as it allows direct exploration of the above questions, which would not be possible with a more
complex system. We begin by examining the distributions of avalanche size and duration, investigating the
presence of scale-free behaviour. We also show that as the system approaches the theoretical critical regime
by decreasing the external input, there is a change in the distributions of avalanche characteristics with
the appearance of partial scale-free behaviour in avalanche size. It is important to note that the definition
5
of avalanches strongly depends on the choice of binning method. In the literature different definitions of
avalanches are used in models with seeded systems and with systems where the dynamics are continuous
(including physiological recordings). We will return to this in the discussion.
Unlike in the companion paper where the system was seeded after each avalanche, the system studied
here does not have an explicit separation of timescales. This allows us to additionally assess the waiting
times, which are intrinsic to the system, and we are able to analytically derive the distribution of waiting
times. We then investigate the presence of partial LRTCs in the empirically derived waiting times. Finally,
we show that as the system size increases (and the system approaches the theoretical critical regime from a
different route) the range over which the correlations extend also increases. Overall we find that the system
displays different signatures of criticality depending on the region of the parameter space around the critical
regime.
The model
As in the companion paper, we study a stochastic model based on that of Benayoun et al. [36]. Though
greatly simplified from a physiological neural network, the model is chosen as it is analytically tractable and
thus enables direct derivation of the parameters such that there is a critical regime. With this approach it
is therefore possible to assess the dynamics of a neuronal system in the region of (or at) a critical regime.
While Benayoun et al. considered a network with both excitatory and inhibitory connections, we simplify
the system further (as in the companion paper), considering a network with purely excitatory synaptic
connections. As will be discussed later, this type of network can be set within the context of early brain
development.
We consider a system of N fully connected neurons, with each neuron in one of two states - active (A)
or quiescent (Q). For a small time step dt → 0 the probability of transition for a neuron between the two
states is given by:
where si(t) =(cid:80)
j
P (Q → A, in time dt) = f (si(t))dt,
P (A → Q, in time dt) = αdt,
wij
N aj(t) + hi(t) is the input to neuron i, f is an activation function, hi(t) is the external
input to neuron i, wij is the connection strength from neuron i to neuron j and aj(t) = 1 if neuron j is
active at time t and zero otherwise. Finally, α is a constant rate at which neurons change from the active to
inactive (quiescent) state.
6
For analytical tractability and characterisation of the critical state we make the following additional
simplifications:
1. The synaptic connection strengths are the same for all connections with wij = w > 0.
2. The external input is constant to all neurons and at all simulation steps so that hi(t) = h > 0.
3. The activation function is linear with f (x) = x.
While the first and third assumptions are the same as in the companion paper, we make the additional
assumption of constant positive external input here as opposed to the companion paper where we examined
the system with no external input (h = 0). As the network is fully connected, and the system is closed so
that A + Q = N (where A is the number of active neurons and Q is the number of quiescent neurons), the
system can be described by the mean field equation:
(cid:18) wA
(cid:19)
dA
dt
=
+ h
(N − A) − αA.
N
As stated in the companion paper, we can use this equation to analyse the stability of the system about the
fixed point and determine the parameters for which the system is at the threshold of stability, i.e. when the
fixed point is critical. This threshold occurs when the eigenvalue (λ) of the fixed point is zero, which can
alternatively be stated, borrowing terms from the epidemiology literature, as R0 = 1 (the basic reproductive
ratio). Moreover, this is also equivalent to a branching parameter of one. In the companion paper it was
shown that with h = 0, R0 = w
α and so for R0 = w
α = 1 ⇒ α = w the system is critical.
Here we study the system in the presence of a positive external input, h > 0. In this case the fixed point
of the system is given by:
w
N
−
A2 + wA + h(N − A) − αA = 0,
and the eigenvalue at the fixed point is:
λ = −2
w
N
A + w − h − α.
For a fixed point to be critical we require that both these equations be satisfied. However, solving them
simultaneously we find that there are no real roots when w, h, N > 0. This implies that there is no
parameter region such that the system (with this activation function and positive external input) has a
critical fixed point. However, considering again the case with no external input (h = 0) for which the critical
state occurred with parameters α = w, if this system is driven by a 'sufficiently low' level of external input
7
it should still be within the region of the critical state. There has been some suggestion that the brain is
not directly at a critical point but is in fact just very close to the critical regime and it has been speculated
that the brain may actually be slightly supercritical [32]. Additionally, it been shown that a computational
model of neuronal avalanches which follows a SOC approach [25] is actually a system that 'hovers' close to
the critical state [23]. Therefore, the question of how a finite driven system behaves in the region of a critical
regime is pertinent to the neuroscience field.
An additional motivation for considering a non-zero external input is the dynamic range (∆) of the
system. Larremore and colleagues [29] describe the dynamic range as "the range of stimuli over which
there is significant variation in the collective response of the network". Kinouchi and Copelli [16] examined
dynamic range in models of networks with uniform connectivity operating with discrete time dynamics where
multiple firings can occur within each time step. They found that the dynamic range was maximised when
the local branching ratio was equal to one. Larremore and colleagues [29] considered a version of this model
but with the introduction of heterogeneity in connections, showing that it is the lead eigenvalue, λ, of the
connectivity matrix that governs the dynamic range and that the dynamic range is maximised when λ = 1.
In Appendix 1 we provide an analytic calculation for the dynamic range of our continuous model. Analogous
to the results described above [16, 29] the dynamic range is maximised when R0 = 1 (w/α = 1 when h = 0).
This is illustrated in Fig. 1 where results from simulations are compared with the analytic solution. It is
important to emphasise that the parameterisation of the dynamic range is in terms of the value R0 calculated
for networks when there is no external input. When this parameterisation is such that R0 = 1 ⇒ α = w
(and therefore when the system is tuned to the critical state) external input to the system will give rise to
dynamics for which the dynamic range is maximised. This point will be considered further in the discussion.
Throughout this study we will examine the system in the presence of an external input of h = 1/N
or less. This level of the external input is equivalent to setting a single neuron to the active state and so
corresponds to seeding the system in the zero input case. We therefore deem this level of external input to
be sufficiently low such that we could expect the system to remain within the region of the critical regime.
As in the companion paper we set w = α = 1. With these parameters and with positive external input we
find that the fixed point of the system is given by
A = −
hN
2 ±
N 2h2
4
+ N 2h,
(cid:114)
8
Figure 1: R0 versus ∆. Plot of R0 versus ∆ (the dynamic range - see Appendix 1) for both the analytic result
(black line) and simulations (red dots). For the comparable simulated result we average 10, 000 realisations
that have run until time t = 200. To obtain a reasonable spread of h we used the conjugation of the intervals
[0 : 0.002 : 0.2] and [0.4 : 0.2 : 18].
and the eigenvalue of this fixed point is given by
λ = −
(cid:112)
h2 + 4h.
With lower levels of external input the system approaches the critical regime (see Fig. 2). Note that this
approach is in fact from a slightly subcritical state given these values of α and w and with positive external
input. Under these conditions it is not possible to consider an approach from a supercritical regime with a
positive eigenvalue.
As described above, we (initially) set h = 1/N . With this level of external input:
and the eigenvalue of the fixed point is given by
A = −
+ N ,
1
2 ±
(cid:114) 1
(cid:114) 1
4
λ = −
N 2 +
4
N
.
As N → ∞, λ → 0 (see Fig. 2). Thus, for this level of the external input (h = 1/N ), as the system size
(N ) increases the system approaches the critical state (as the system reaches the critical state exactly when
the eigenvalue λ = 0). We will examine the effect on the dynamics of decreasing the external input, thereby
9
00.20.40.60.811.21.41.61.820100200300400500600700800R0∆ Figure 2: The eigenvalue of the system compared with the level of external input and system
size. (a) With w = α the eigenvalue decreases with lower levels of external input h, with the system reaching
the critical regime in the absence of external input (λ = 0 i.e. R0 = 1, the case studied in the companion
paper). (b) With h = 1/N and w = α the eigenvalue of the fixed point λ → 0 as N → ∞. Thus, the system
approaches the critical state as the system size increases.
allowing the system to approach the critical regime. We will also investigate an alternative route to the
critical regime by increasing system size at constant (overall) level of external input.
Model simulations and burst analysis
As in the companion paper and in Benayoun et al. [36], simulations of the network dynamics were carried
out using the Gillespie algorithm for stochastic simulations [37]. Briefly, at each step in the simulation
• The total transition rate r for all the neurons within the network is calculated, with r = raq + rqa
where raq is the total rate of active → quiescent transitions and is given by raq = αA and rqa is the
total rate of all quiescent → active transitions which is given by rqa = f (si)(N − A).
• The time to the next transition dt is selected at random from an exponential distribution of rate r.
• The type of transition is selected by generating a random number n ∈ [0, 1]. If n < raq
then a randomly
r
chosen active neuron becomes quiescent, otherwise a (randomly chosen) quiescent neuron switches to
the active state.
At each step in the simulation a single neuron makes a transition, though the rate at which transitions occur
changes and so the simulation step changes. If the network is in a fully quiescent state (Q = N ) then, with
positive external input, raq = 0 but rqa = hN and consequently there will necessarily be a transition of a
10
-0.07-0.04-0.01hλ(a)00.58001800050000100000150000-0.07-0.05-0.03-0.01Nλ(b)neuron from the quiescent to the active state. Similarly, when the network is in the fully active state (A = N )
rqa = 0 but raq = αN and so there will necessarily be a transition of a randomly chosen neuron from the
active to the quiescent state. From all other starting points transitions from the active to the quiescent or
from the quiescent to the active state are possible. Thus, from all network states one neuron will change
state. This is unlike the companion paper where with no external input the network must be seeded when in
the fully quiescent state. Instead in this case network dynamics are continuous (i.e. no re-seeding is required)
and are of finite length only in-so-far as they are restricted by simulation lengths.
We define a neuron as firing at the first time step at which the neuron switches from the quiescent to
the active state. Fig. 3 shows raster plots of network firings for the first 1 second of simulations with three
different levels of the external input. As was described above, unlike in the companion paper where there was
no external input, the dynamics continue even if the system reaches the fully quiescent state. Interestingly,
we can also notice that the network dynamics appear to exhibit burst-like behaviour, with periods of high
neuronal firing interspersed with periods without network firing. It is important to realise that these bursts
are intrinsic to the system and are not directly related to the dynamics of the external input (the input
is constant to all neurons in each of the simulations) nor due to a saturation of the network - the bursts
themselves consist of different numbers of neuronal firing. In all three cases the parameters are set to the
critical state (with no external input). With lower levels of the external input the system approaches the
critical regime and we see that the bursts become further apart and more distinct. We will characterise
these dynamics below. (See also Appendix 2 where we examine driving the system from subcritical and
supercritical states.)
These burst dynamics are analogous to the neuronal avalanches observed experimentally in that they are
discrete cascades of firing. Neuronal avalanches observed experimentally in physiological networks are so
called because they have sizes which are distributed according to a power-law and while the size distribution
of the burst activity in this network has yet to be presented we will refer to the activity throughout the rest of
this paper as avalanches due to their discrete burst behaviour. To determine the distribution of the avalanches
we divided the activity into individual avalanches using the approach of Benayoun et al. [36]. This method
divides consecutive neuronal spiking between any two neurons within the network into separate avalanches if
the time difference between the spikes is greater than the average difference (δt) between consecutive spikes
within the simulation. This approach (referred to later in the text as the binning method) is similar to the
method used to define neuronal avalanches within physiological data [5, 6] - though the choice of binning
method will be discussed later in the paper. It is important to note that no binning approach was needed in
11
Figure 3: Raster plots of the network dynamics for different levels of the external input. Neuronal
firing across 1 second of a simulation with an external input of (a) h = 1/N , (b) h = 0.1/N and (c)
h = 0.01/N . For all three simulations N = 800, α = w = 1 and the red line indicates the rate of firing in
1 ms bins. As can be observed, as the level of the external input decreases the firing rate decreases and the
time between avalanches increases.
the companion paper since an avalanche was naturally defined as all firing that occurred before the network
reached the fully quiescent state and was reseeded. This has been used as a standard classification for
discontinuous data, stemming from the sandpile model of criticality [18]. However, as the firing dynamics
here continue for the entire simulation it was instead appropriate to use an approach that had been used
previously for continuous dynamics.
Throughout the remainder of this paper we examine characteristics of these avalanches: namely the size
and duration of avalanches as well as the inter-avalanche intervals (IAIs). The size of an avalanche is defined
(in the standard way) as the number of firings within the avalanche. If a single neuron fires more than once
within a single avalanche it is also counted more than once. The duration of an avalanche is defined as the
time between the start of the avalanche (the first neuron firing) and the end of the avalanche. Note that if
the avalanche consists of a single neuron firing then the duration of the avalanche is 0 (and the size of the
avalanche is 1). Similarly, an IAI is defined as the time between the end of one avalanche and the start of
the next avalanche, i.e. the waiting time between avalanches. Note that the minimum IAI is bounded below
by δt as a separation between two consecutive spikes of greater than δt defines separate avalanches.
12
020040060080010000400800Time (ms)Neuron Index(a)020040060080010000400800Time (ms)Neuron Index(b)20040060080010000400800Time (ms)Neuron Index(c)Figure 4: Distributions of avalanche size and duration for varying levels of the external input.
The distributions of avalanche size (a,b,c) and duration (d,e,f) from simulations with h = 1/N (a,d), h =
0.1/N (b,e) and h = 0.01/N (c,f). As the level of the external input is decreased the system approaches
the critical regime. For all simulations N = 800, α = w = 1 and the distributions are pooled from 10
simulations each of length 104 seconds. The red lines indicates linear fits on the double logarithmic scale
(where appropriate), i.e. fitted power-laws with exponents of (b) 1.68, (c) 1.48, (e) 1.88 and (f) 1.64.
Distributions of avalanche size and duration
Fig. 4 shows the distributions of avalanche size and duration from example simulations for the three different
levels of external input investigated -- this can be compared with Fig. 3 of the companion paper [24] which
shows the avalanche size distribution in the absence of external input. With lower levels of external input
the system approaches the critical regime and the distributions of avalanche size appear scale-free across a
range of scales. The distribution approaches the distribution found in the companion paper for the system
exactly tuned to the critical state. With h = 0.01/N (i.e. the lowest level of eternal input) the exponent
of the fitted power-law is approximately 1.5, see Fig. 4(c), which is consistent with experimentally observed
neuronal avalanche sizes [5, 6]. However, for higher levels of the external input this scale-freeness of the
distribution is lost which coincides with moving away from the critical regime.
In the case of avalanche
duration a similar relationship with the critical regime is seen with a scale-free portion in the middle ranges
of the distribution (between approximately 2 and 50 ms) with lower levels of external input. Thus, for lower
levels of external input, when the system approaches the critical regime, the distributions, in particular that
of avalanche size, exhibit partial scale-free behaviour.
13
Avalanche sizeProbability10−710−410−1110100500(a)11010010000Avalanche sizeProbability10−510−310−111010010000(b)Avalanche sizeProbability10−510−310−111010010000(c)0.10.52.05.0Avalanche durationProbability10−710−410−1(d)Avalanche durationProbability10−710−410−10.1110100(e)Avalanche durationProbability10−510−310−10.1110100(f)It is worth considering what leads to the changes seen in the distributions as the level of external input
is varied. As stated, as the level of external input decreases, the system approaches the critical regime
and so it is perhaps not surprising that signatures of criticality (i.e. scale-free behaviour) emerge in the
distribution of avalanche size. Examining the raster plots of firing for the different levels of external input,
see Fig. 3, we see that at lower levels the avalanches are further apart and more distinct. While the external
input itself is continuous, at lower levels of external input there is a separation of timescales, where one
avalanche always finishes well before the next avalanche begins. The distribution therefore appears to
follow similar characteristics to a system with a built-in separation of timescales and we confirm that the
distribution is similar to that found in the companion paper (in which the model had an explicit separation
of timescales) where an exponent close to 1.5 was also observed for the distribution of avalanche size. As
the external input is increased there are no longer such distinct periods between avalanches. This leads to
a superposition effect, with the next (actual) avalanche starting before the previous avalanche has finished
(i.e. a new network cascade is initiated before the previous one has finished). This leads to these 'avalanches'
being defined using the binning approach as a single avalanche (see discussion). The scale-free behaviour in
the distributions of avalanche size and duration is therefore lost.
Theoretical derivation of the distribution of the IAIs and comparison with simulated data
The temporal patterning of activity within networks of neurons has long been investigated as a property of
key importance, with rate and temporal coding suggested as potential substrates for information propagation.
As it remains to be fully determined how different neuronal firing properties may lead to information transfer
we suggest that in addition to the distribution of avalanches sizes the intervals between avalanches need to
be considered as a functional entity in their own right. In this section we derive the theoretical distribution
of IAIs and compare it with results from simulations.
We begin by noting that a single IAI is a period during which there is no neuronal firing, i.e. neurons can
only be switching from the active to the quiescent states or an IAI may be a period with a single quiescent to
active transition which is preceded by another quiescent to active transition. Let us initially ignore the fact
that there is a minimum duration (δt) of an IAI and first consider the distribution of all consecutive active
to quiescent transitions (we will return to the distribution of single quiescent to active transitions later).
14
Distribution of consecutive active to quiescent transitions
Let N0 be the number of active neurons at a time point in the simulation. After a single simulation step
the number of active neurons will be N0 + 1 or N0 − 1, as at every simulation step only one neuron makes a
transition. Let qi be the probability that an active neuron goes back to the quiescent state given that there
are i active neurons. Note that from the transition rates:
qi =
αi
( w
N i + h)(N − i) + αi
=
αiN
(wi + hN )(N − i) + αiN
.
Starting with N0 active neurons the probability that there are N0− 1 active neurons after a single simulation
step is qN0 and the probability that there are N0 + 1 active neurons is 1 − qN0. Given these probabilities
we can construct a probability tree, shown in Fig. 5, particularly concentrating on the portion of the tree
corresponding to active to quiescent transitions, i.e. those transitions that form a period of consecutive active
to quiescent transitions. (Note that this probability tree focuses on different aspects of the model to that of
the probability tree in the companion paper.)
Figure 5: Probability tree of consecutive active to quiescent transitions. Starting from a state with
N0 active neurons the probability tree diagram indicates the possible transitions from each state specifically
concentrating on the active to quiescent transitions. The probability qi of each transition is as indicated in
the main text and is dependent on the number of active neurons, i.
From this tree approach we can calculate that the probability of exactly k consecutive active to quiescent
transitions (note that to consist of exactly k active to quiescent transitions the transition sequence must be
ended by a quiescent to active transition):
P (IAIk) = p(N0, k) = (1 − qN0−k)
15
k−1(cid:89)
j=0
qN0−j.
(1)
N0 @@@@@R1 qN0qN0N0+1N0 1 @@@@@R1 qN0 1qN0 1N0N0 21 @@@@@R1 q1q120 111The duration of this period of consecutive active to quiescent transitions is given by the sum of the times
for each of these k transitions (plus the time for the quiescent to active transition). As the Gillespie algorithm
is used for simulations, at each simulation step the time to the next transition is drawn randomly from an
exponential distribution with rate r (see above), where r is dependent on the number of active neurons and so
changes at each simulation step. The duration of consecutive active to quiescent transitions is therefore the
sum of exponentially distributed variables drawn from distributions of different rates, i.e. the distribution of
consecutive active to quiescent transitions is a hypoexponential. Thus, the duration distribution, f (x, N0, k),
of consecutive active to quiescent transitions of length x, consisting of k transitions, ending with an additional
quiescent to active transition and starting from N0 active neurons is [38]:
f (x, N0, k) =
rN0−je−rN0−j x
k(cid:88)
j=0
k(cid:89)
i=0,i(cid:54)=j
rN0−i
rN0−i − rN0−j
,
(2)
when rN0−i (cid:54)= rN0−j and where rm is the total transition rate for all neurons within a network with m
active neurons and is the rate of the exponential distribution from which the time to the next transition is
randomly drawn. This equation holds provided that rN0−i (cid:54)= rN0−j ∀i, j. If this is not the case and there
exists A, B ∈ {1, . . . N} such that (α + w − h)/w = A + B ⇒ rA = rB then we use the more general form --
assuming there are a distinct rates, which we label β1, β2, . . . , βa that occur c1, c2, . . . , ca times respectively
(i.e. c1 + c2 + . . . ca = k + 1) -- given by [39]:
f (x, N0, k) = B
a(cid:88)
ck(cid:88)
k=1
l=1
where
a(cid:89)
j=1
B =
βcj
j and φk,l(t) =
φk,l(−βk)xck−le−βkx
(ck − l)!(l − 1)!
,
a(cid:89)
j=1,j(cid:54)=k
dt−1
dtt−1
(βj + t)−cj .
(3)
Whilst this involves higher order derivatives a closed-form solution is provided by Amari and Misra [40].
From equation 1 we know the probability of k consecutive active to quiescent transitions. This equation
holds true for any k up to k = N0, which is the maximum number of consecutive active to quiescent
transitions as the fully quiescent state is then reached. Therefore, the distribution, F (x, N0), of consecutive
active to quiescent transitions of duration x starting with N0 active neurons but consisting of any number
of transitions is a weighted sum of hypoexponentials:
F (x, N0) =
f (x, N0, k)p(N0, k).
(4)
N0(cid:88)
k=1
16
Probability distribution of the initial number of active neurons
Finally, to calculate the full probability distribution of consecutive active to quiescent transitions for a
network of set system size, N , we must combine equation 4 with the probability of the initial number of
active neurons being equal to N0 ∈ {1, 2, ...N} (note that N0 = 0 is not considered as the next transition
will necessarily be an activation). To determine this probability, let us first consider the simple case of
N = 3. We assume that the simulation starts from a state with no active neurons. Fig. 6 shows all possible
transitions between the number of active neurons in a network of this size.
Figure 6: Probability tree of all possible transitions in a network of size N = 3. Simulations start
from a state with no active neurons: N0 = 0. The diagram shows the possible transitions at each step,
along with the probability of making that transition. The probabilities are as defined in the main text with
qi being the probability of a neuron switching from the active to the quiescent state given i initially active
neurons. Dotted lines indicate transitions that are already shown elsewhere in the tree and so the tree shown
here completely describes all possible transitions in a network of this size.
From this probability tree the probabilities, P (i), of the number of active neurons being equal to i, where
i ∈ {0, 1, 2, 3} are given by:
P (0) = q1P (1),
P (1) = P (0) + q2P (2),
P (2) = (1 − q1)P (1) + P (3),
P (3) = (1 − q2)P (2),
17
(5)
0❄11\x{FFFF}\x{FFFF}\x{FFFF}\x{FFFF}\x{FFFF}✠❅❅❅❅❅❘q11−q102\x{FFFF}\x{FFFF}\x{FFFF}\x{FFFF}\x{FFFF}✠❅❅❅❅❅❘q21−q213❄121(assuming a steady state has been reached such that the probabilities are time independent). Rearranging
and substituting to write the equations in terms of P (1):
P (0) = q1P (1),
(1 − q1)
P (2) =
q2
P (1),
P (3) =
(1 − q1)(1 − q2)
q2
P (1).
Furthermore, the sum of all the probabilities must equal 1 and so
(cid:18)
q1 + 1 +
(1 − q1)
q2
+
(1 − q1)(1 − q2)
q2
(cid:19)
P (1) = 1.
Therefore,
P (1) =
q2
q1q2 + q2 + (1 − q1) + (1 − q1)(1 − q2)
.
(6)
(7)
(8)
By substituting this value back into the set of equations 6 the probabilities for the full system can be
calculated.
Generalisation to a system of any size N
From considering this simple example we can generalise to derive the probabilities of the number of active
neurons for a system of any size N . Firstly, as in equation 4 the probabilities can be written as (again
assuming a steady state):
P (0) = q1P (1),
P (1) = P (0) + q2P (2),
P (2) = (1 − q1)P (1) + q3P (3),
...
P (k) = (1 − qk−1)P (k − 1) + qk+1P (k + 1),
...
P (N − 1) = (1 − qN−2)P (N − 2) + qN P (N ),
P (N ) = (1 − qN−1)P (N − 1),
(9)
where qN = 1 but it will remain in the equations so as to aid notation. Rearranging gives
P (2) =
(1 − q1)
q2
P (1),
18
and by induction:
P (k + 1) =
=
1
(P (k) − (1 − qk−1)P (k − 1))
qk+1
(1 − q1)(1 − q2) . . . (1 − qk)
q2q3 . . . qk+1
P (1).
(10)
Summing all the probabilities and setting this equal to 1:
P (1) =
q1q2 . . . qN + q2q3 . . . qN + (1 − q1)q3 . . . qN + . . . + (1 − q1)(1 − q2) . . . (1 − qN )
q2q3 . . . qN
.
(11)
Having determined these probabilities we then need to take into account the fact that the consecutive
active to quiescent transitions must be preceded by a quiescent to active transition, i.e. they must be preceded
by a neuron firing (otherwise they would be a chain of k + 1 consecutive active to quiescent transitions and
so included elsewhere in the distribution). We are therefore only interested in the probability PA(N0) of the
number of active neurons being equal to N0 given that a quiescent to active transition has just occurred.
Considering again the probability tree, Fig 6, we find that these probabilities, are given by:
PA(0) = 0,
PA(1) = P (0),
...
PA(k) = (1 − qk−1)P (k − 1),
...
PA(N ) = (1 − qN−1)P (N − 1),
(12)
where we make use of the previously defined probabilities P (k). From these probabilities the full probability
distribution of the duration of consecutive active to quiescent transitions can be calculated. As was shown
above, for a set initial number of active neurons N0, the probability distribution of consecutive active to
quiescent transitions is given by a weighted sum of hypoexponentials, see equation 4. This can then be
further weighted by the probability PA(N0) that the initial (at the start of the sequence of transitions)
number of active neurons is equal to N0 and the previous transition was quiescent to active. Thus, the
℘(x) =
PA(i)
f (x, i, m)p(i, m)
.
(13)
To confirm that this theoretically derived distribution compares with results from simulations, we de-
termined the distribution of the lengths of periods of any consecutive active to quiescent transitions from
i=0
m=1
19
overall probability distribution of consecutive active to quiescent transitions is given by:
(cid:32)
N(cid:88)
i(cid:88)
(cid:33)
Figure 7: Theoretical and simulated distributions of periods of consecutive active to quiescent
transitions. The simulated distribution (black) is compared with the theoretically derived probability
density function (shown in red, see equation 13). For both distributions α = 1, w = 1, N = 50 and h = 1/N .
The mean difference between consecutive spikes (δt) within the simulation (green) is used to define avalanches
through the binning approach described in the main text. Thus, the portion of the distribution for which
the length of active to quiescent transitions are greater than this average time between consecutive spikes
form the distribution of IAIs when combined with the distribution of single quiescent to active transitions.
simulations. Fig. 7 shows the good agreement between the distribution of consecutive active to quiescent
transitions from a simulation with N = 50 and the theoretical distribution.
Distribution of single quiescent to active transitions
As was described above, a single period in between two neurons firing can also be an IAI, provided that the
duration of this IAI is longer than the average time between spikes as accounted for below. Note, however,
that only single periods are considered, as consecutive periods necessarily include neurons switching to the
active state and therefore cannot form part of an IAI. Thus, the distribution of IAIs should also take into
account the distribution of single quiescent to active transitions. As we make use of the Gillespie algorithm,
the duration distribution of these single transitions is an exponential with rate given by the total transition
rate, which is dependent on the number of active neurons, N0. This is then weighted by the probability of
a quiescent to active transition given N0 active neurons (i.e. by 1 − qN0 ) and additionally weighted by the
probability of starting with N0 active neurons following a quiescent to active transition as calculated above.
Thus, the probability distribution of single quiescent to active transitions of length x is given by:
(14)
(cid:0)PA(i)(1 − qi)rie−rix(cid:1) .
ρ =
N(cid:88)
i=0
Fig. 8(a) shows the good agreement between simulated distribution of single quiescent to active transitions
and theoretical distribution.
20
00.511.5200.020.040.06PeriodProbability SimulationTheoretical PDFδ tFigure 8: Theoretical distributions of single quiescent to active transitions and the combined
distributions. Theoretical (red) and simulated (black) probability distributions for (a) single quiescent to
active transitions and (b) this distribution combined with the distribution of consecutive active to quiescent
transitions (see Fig. 7). In both cases α = 1, w = 1, N = 50 and h = 1/N . The green line indicates the
average time between consecutive spikes (δt) within the simulations. Thresholding the combined distribution
(b) at this level determines the IAI distribution.
The IAI distribution
As discussed above, the IAI distribution combines these two distributions - the distribution of consecutive
active to quiescent transitions and the distribution of single quiescent to active transitions. This combined
distribution, along with simulated values, is shown in Fig. 8(b). As was described above, avalanches are
defined from the network firing pattern as consecutive spikes where the time difference between them is
no greater than the average time difference between consecutive spikes, δt, within the network. Thus, the
minimum IAI is bounded below by δt and all consecutive active to quiescent transitions or single quiescent
to active transitions whose total duration is greater than δt will be an IAI. Thresholding the combined dis-
tribution at δt determines the IAI distribution. Fig. 9(a) shows theoretical and simulated IAI distributions
displayed on a double logarithmic scale. Despite the fact that the distribution is not a power-law (theoret-
ically we know that it is a weighted sum of hypoexponentials), it appears scale-free over a range of scales
on this double logarithmic scaling. As we will show below, the distribution can also pass statistical tests for
power-law distributions, suggesting partial scale-free behaviour of the system close to the critical regime.
Fig. 9 also shows the theoretical and simulated distributions for lower levels of external input. With
lower levels of external input (as the system approaches the critical regime) the average IAI increases and
21
00.10.20.30.40.50.60.70.800.10.2PeriodProbability(a) SimulationTheoretical PDFδ t00.20.40.60.811.21.41.61.8200.050.10.15PeriodProbability(b) SimulationTheoretical PDFδ tFigure 9: Distribution of IAIs for varying levels of the external input. The theoretical (red) and
simulated (black) IAI distributions with (a) h = 1/N , (b) h = 0.1/N and (c) h = 0.01/N . These distributions
were for N = 800 with α = w = 1, with a simulation length of 104 seconds. The distributions from the
simulated data are pooled from 10 simulations. The theoretical distributions were calculated up to the level
of active neurons which occur with a cumulative probability of 0.9 (see main text). The blue line in plot (a)
indicates a linear fit, i.e. a fitted power-law with an exponent of 2.71.
the distribution changes, no longer exhibiting scale-free behaviour. Even when considering the same scale for
all levels of the external input (IAIs in the region of 0.05-5 ms) it is only for h = 1/N that the distribution
is scale-free.
Indeed, at the lowest level of input h = 0.01/N the distribution is in fact best fit by an
exponential, in this case y = 0.028e−0.01x as seen in Fig. 10, indicating the loss of the scale-free behaviour
in the distribution. Thus, scale-free behaviour in the case of the IAI distribution does not increase with
proximity to the critical regime.
As an aside, note that due to the product in the hypoexponential (see equation 2) determination of the
probabilities for large N can become computationally intractable. For simulations larger than with N = 50
we therefore only determined the theoretical distribution up to a set level of the number of active neurons.
We set the threshold level of the number of active neurons according to the probability distribution of
starting from a particular number of active neurons (calculating the cumulative probability from zero active
neurons), and sufficiently low so that the calculations were computationally viable. However, the theoretical
distributions calculated using this threshold are still a good fit to the simulated data - Fig. 9.
Distributions of avalanche size and duration
As we have shown, the theoretical distribution of IAIs can be calculated by assessing periods of consecutive
active to quiescent transitions and single quiescent to active transitions. It is also possible to derive the
distribution of consecutive quiescent to active transitions. However, if a period of active to quiescent transi-
22
0.050.505.00IAIProbability10−710−410−1(a)0.55.050.0IAIProbability10−910−510−1(b)5201001000IAIProbability10−810−510−2(c)Figure 10: The IAI distribution with h = 0.01/N is well fitted by an exponential distribution. The
theoretical IAI distribution at the lowest level of the external input (shown in red, see also Fig. 9c) compared
with the fitted exponential distribution (black dashed). The exponential is given by y = 0.028e−0.01x. This
indicates that as the external input is decreased and the system approaches the critical regime the IAI
distribution loses the scale-free behaviour seen at higher levels of the external input and is dominated by an
exponential.
tions (a period without firing) has a duration less than the average time difference between two spikes then
this interval does not separate an avalanche into two. Therefore, the distributions of number and length of
consecutive quiescent to active transitions does not describe the distributions of avalanche size and duration
- these distributions can also contain periods of active to quiescent transitions within two or more periods of
quiescent to active transitions. Note that a period of active to quiescent transitions having a duration less
than the average difference between consecutive spikes is not dependent on the number of active to quiescent
transitions within the interval, as the length of each transition is drawn at random from an exponential
distribution. It was therefore not possible for us to determine a theoretical distribution of avalanche size
and duration using this approach.
Statistical comparison with a power-law distribution
The influential paper by Clauset et al. [1] developed a model selection based methodology to determine
whether empirical data are likely to be power-law distributed. This method has been used to assess physio-
logical neuronal avalanches and the results have shown that the power-law hypothesis is not rejected for this
data [2]. It is therefore of interest to determine whether this is also the case for the data from the model
studied here. Briefly, this method finds the best fit to a power-law of the distribution under study. The
empirical data are then compared to distributions of the same size that are generated by randomly drawing
values to follow the best-fit power-law distribution. A p-value is calculated as the proportion of times that
the empirical data are a better fit to the power-law than the generated data (using the Kolmogorov-Smirnov
test). As per Clauset et al. [1] the hypothesis (that the data come from a power-law) is rejected if the p-
23
IAIProbability10−810−510−25201001000value is less than 0.1. As we have observed (Figs. 4, 9), the distribution of avalanche sizes appears to exhibit
partial scale-free behaviour for low levels of external input (h = 0.1/N, 0.01/N ) and the IAI distribution
appears scale-free over a range of scales for h = 1/N . As in the companion paper [24], we fit a truncated
power-law distribution up to an avalanche size of xmax = 9
10 N in the case of avalanche size distributions.
We fit a power-law distribution without truncation to the IAI distribution. Testing the entire avalanche
size distributions (consisting of over 900,000 avalanches) yielded p = 0 indicating that the hypothesis that
the distribution follows a power-law should be rejected. Similarly, taking the IAI distribution for h = 1/N ,
testing the whole distribution of over 6,000,000 IAIs (note that there are more avalanches and therefore IAIs
with larger h due to the higher firing rate) yielded p = 0. Testing instead the first 100,000 avalanches (a
similar order of magnitude to the number of neuronal avalanches tested experimentally) with h = 0.1/N
yielded p = 0.46 indicating instead that the power-law hypothesis should not be rejected. Similarly, for
h = 0.01/N testing the first 10,000 avalanches yielded p = 0.13. These results are similar to those of the
companion paper, where the power-law hypothesis was not rejected when the number of avalanches included
in the distribution was of the same order as those tested experimentally, and are indicative of the partial
scale-free behaviour of the system in proximity of the critical regime.
In the case of the IAI distribution testing the first 100,000 IAIs yielded p = 0.44 indicating that a power-
law is a good fit to the data. Given that in this case we know that the IAI distribution is not a power-law
(but is in fact a weighted sum of hypoexponentials), it is interesting to note that the hypothesis that the data
follow a power-law is not rejected when the number of data points is of the same order as that which have
been tested experimentally, an observation that will be explained in the discussion. When the power-law
hypothesis is not rejected, Clauset et al. [1] employ a model selection process to determine the best model
for the data. We did not carry out this testing here (as, at least in the case of the IAI distribution, we
already know what the distribution is) and it may be that such a process would suggest that a power-law is
not the best fit to the data. However, the results here (and those of the companion paper) are indicative of
the partial scale-free behaviour exhibited by the system in the region of the critical regime.
Long-range temporal correlations
As mentioned in the introduction, long-range temporal correlations are another possible signature of a system
at (or near) a critical state and have also been observed in neurophysiological data [4, 11 -- 15]. It is therefore
of interest to determine whether this finite-size neuronal system with external input displays LRTCs - given
that it is in the region of a critical regime - and whether LRTCs relate to other signatures of criticality, i.e.
24
the presence of partial scale-free behaviour in the data distributions themselves. The latter is of particular
interest given that we have seen a change in distributions as the system approaches the critical regime. As
with all simulations the level of external input is constant, i.e., it does not itself display LRTCs, and therefore
we stress at the outset that any LRTCs present in the dynamics of the system would have to be intrinsic to
the system. Furthermore, it is useful to remember that a power-law distribution of any data set does not
imply that the data will exhibit LRTCs and vice-versa -- consider points drawn at random from a power-law
distribution - such a data set would not exhibit LRTCs.
In neurophysiological data, LRTCs have been observed in fluctuations of oscillation amplitude (i.e. within
continuous data) [4,11 -- 15] and also in discrete burst activity in our recent analysis of the inter-event intervals
of bursts of nested oscillations in EEG recordings of extremely preterm human neonates [35]. Moreover,
LRTCs in discrete data have previously been investigated by Peng et al. [41] and a number of other authors,
for example [42 -- 44], in their analysis of inter-heartbeat intervals. As the data from the model analysed
here result in discrete avalanche activity, we adopt the approach used in these previous studies of LRTCs in
discrete data and examine LRTCs in waiting times, i.e.
in IAIs.
We assessed the presence of LRTCs in IAIs through estimating the Hurst exponent, H, which describes
the degree of self-similarity within the data. A Hurst exponent of H ≈ 0.5 indicates that there are no
correlations in the data or short-range correlations only, for example a white noise process, whereas a Hurst
exponent of 0.5 < H < 1.0 indicates LRTCs in the data. Additionally, an exponent of 1 corresponds to 1/f
noise [41]. We estimated the Hurst exponent using detrended fluctuation analysis (DFA) -- an approach that
has been shown to produce more accurate estimates of the Hurst exponent than some other approaches [45]
and has been used previously to assess the presence of LRTCs in neurophysiological data sets [4, 11, 15, 35].
DFA is a graphical method whereby the average root mean square fluctuations at a given box size are
compared across different box sizes and the gradient of the line of best-fit is the estimate of the Hurst
exponent (for more detail see Peng et al. [41, 46]). We used a minimum box size of 5, with 50 box sizes
linearly spaced on a logarithmic scale up to a maximum box size of 1/10 of the length of the IAI sequence [47].
Calculations were carried out using the MATLAB code of McSharry [48].
Fig. 11 shows example DFA plots for IAIs from three simulations with α = w = 1, h = 1/N .
It is
important to notice from these plots that there is not a single linear trend across all box sizes. Hu et al. [47]
discussed the importance of identifying crossover points - box sizes at which there is a change in the linear
fit of the data - within DFA plots. Failure to examine these trends leads to erroneous estimates of the Hurst
exponents. A single linear fit across all the points would give an estimate of the Hurst exponent for that
25
Figure 11: DFA plot examining the presence of temporal correlations in IAIs. Plot of the average
fluctuations F (n) against box size n for IAIs from simulations with α = w = 1, h = 1/N and (a) N = 800,
(b) N = 3200 and (c) N = 172800. The data is best fit not by a single linear trend but by three lines (red,
green, blue) between two crossover points (dashed black lines). For smaller box sizes the Hurst exponents
(slope of the line - as annotated next to the individual lines: the DFA exponent α) indicates that correlations
extend across these regions. However, for larger box sizes the exponents are closer to 0.5 suggesting that the
correlations do not extend across these larger box sizes. With a larger system size (c) the upper crossover
point increases to larger box sizes. With increasing system size the system approaches the critical regime -
(a) λ = −0.07, (b) λ = −0.04 and (c) λ = −0.005.
sequence. However, crossover points indicate that the same correlations (i.e. temporal behaviour) do not
extend across the whole sequence. In the DFA plots here there are in fact three regions, each with a different
linear trend, between two crossover points. The best-fit to the data by three linear regions was found using
the nonlinear regression function 'nlinfit' in the MATLAB environment, therefore determining the crossover
points. In Fig. 11(a), the Hurst exponent (slope of the line) of the first two regions (at smaller box sizes)
are 0.83 and 0.62 respectively - exponents which indicate the presence of LRTCs within the data. However,
the third region across the largest box sizes has an exponent of 0.51 indicating that there are no correlations
in the data. This change in the exponents therefore suggests that the correlations observed in the data at
small box sizes do not extend across the entire sequence length.
When examining the presence of LRTCs it is standard practice to compare the exponent of the actual data
to the exponent of the data randomly shuffled [4]. Shuffling the data should destroy any correlations present
and therefore the exponent of the shuffled data is expected to be approximately 0.5. We compared the original
sequence (whose DFA plot is shown in Fig. 11) with 500 shuffled sequences. As expected, the DFA plots for
the shuffled sequences (data not shown) did not exhibit crossover points and showed a mean exponent for
the shuffled sequences of 0.50 with a range of 0.48-0.52. The fact that the exponents of the original sequence
(at smaller box sizes) do not fall within the distribution of exponents for the shuffled sequences therefore
26
12345−2−10123log10(n)log10(F(n))(cid:95)=0.83(cid:95)=0.62(cid:95)=0.51(a)12345−2−10123log10(n)log10(F(n))(cid:95)=0.75(cid:95)=0.89(cid:95)=0.56(b)12345−2−10123log10(n)log10(F(n))(cid:95)=0.72(cid:95)=0.95(cid:95)=0.56(c)demonstrates that the original sequence exhibits complex temporal ordering with correlations that extend
across a range of box sizes (up to the upper crossover).
Increasing the system size
As noted previously (see Fig. 2), as N → ∞ the eigenvalue of the system λ → 0, i.e., the system approaches
the critical regime with increasing system size. We might expect that as the system approaches the critical
regime it is more likely to exhibit signatures of criticality and therefore that LRTCs would extend to larger
box sizes as the system size is increased. We therefore investigated whether there was a change in the temporal
correlations of the IAIs with system size, while maintaining all other parameters including h = 1/N . For all
system sizes investigated the DFA plots displayed three regions with different linear trends, as was discussed
above. Fig. 11 shows example DFA plots for the IAIs of three simulations with the smallest and largest
system sizes examined. It was observed that the pattern of the exponents in each of the cases remained
the same - with the two lower regions having exponents indicative of LRTCs, while the exponent across the
largest box sizes is closer to 0.5. Additionally, we found that the location of the upper crossover increased
with system size. Fig. 12 shows the location of the upper crossover (the crossover at the higher box regions)
for different system sizes (from N=3200 to N=172800) normalised with respect to the largest box size. We
did not find a change, other than small fluctuations, in the exponents themselves for any of the three regions
for all system sizes. Namely, across all system sizes considered, the mean exponent across the smallest box
sizes (up to the first crossover point) was 0.73 with a range of 0.70 - 0.76.
It was 0.95 with a range of
0.89 - 0.99 (close to an exponent of 1 which would indicate 1/f noise) between the first and second crossover
points. The largest variation in exponents was for the region above the upper crossover point with an average
exponent of 0.59 and a range of 0.46 - 0.73; on average this indicates that temporal correlations do not extend
beyond the upper crossover. Thus, overall, as the system size is increased the temporal correlations extend
across larger box sizes. This is consistent with the idea that, when the system reaches the critical regime,
LRTCs could extend to infinite length (i.e., all possible box sizes) in the limit of system size.
Next we considered whether the distributions of IAIs and avalanche size themselves changed with system
size and whether the change in the correlation length observed above was reflected in a change in the
distributions. Fig. 12 also shows the IAI and avalanche size distributions for different network sizes.
In
both cases, the distributions for different system sizes show only small changes which can be accounted for
by noise. Thus, as the system approaches the critical regime through increasing the system size there does
not appear to be a change in the distributions despite the change in the temporal correlations. Moreover,
27
Figure 12: Changes with increasing system size.
(a) The normalised (with respect to the largest
box size) upper crossover box size increases with system size. The plot shows the average value across 10
simulations at the same system size and error bars indicate the standard deviation. (b) The IAI distributions
and (c) the distributions of avalanche size for 6 different system sizes, scaled with respect to the mean IAI
or avalanche size of each distribution respectively. For all simulations α = w = 1, h = 1/N .
LRTCs are present in the data but the distribution of avalanche sizes does not exhibit scale-free behaviour,
i.e., these markers of criticality do not occur simultaneously in this case. By contrast, through approaching
the critical regime by lowering the external input we have shown that the avalanches are more distinct and
the distribution of avalanche sizes exhibits partial scale-free behaviour.
The effect on LRTCs of decreasing the level of external input
We also examined the DFA exponents at lower levels of external input (h = 0.1/N and h = 0.01/N ). In both
cases there were no crossover points with a single linear trend across all box sizes (data not shown). The
exponents were 0.50 (range 0.49-0.51, across 10 simulations with N = 800) and 0.56 (range 0.55-0.57) for
h = 0.01/N and h = 0.1/N respectively. Thus, at the lowest level of external input the IAIs do not exhibit
LRTCs and there is a slight increase in the exponent as the external input increases. This suggests that as
the system approaches the critical regime through a decrease in the external input the temporal correlations
are lost. Thus, the existence of LRTCs as the system approaches the critical regime is dependent on how
the critical regime is approached, namely, approaching the critical regime through increasing the system
size extends the temporal correlations whereas decreasing the external input leads to a loss of long-range
correlations. In addition, this signature of criticality is independent from the other marker we investigated
-- the presence of scale-free behaviour in the avalanche size distribution. Considering avalanche size and
duration, scale-free behaviour is present at the lowest level of external input, when LRTCs are lost. Thus,
28
00.511.52x 1050.020.040.060.080.1NNormalised Upper Crossover(a) 10010110210310−810−610−410−2100X=Scaled IAIProbability(b) N=3200N=16000N=32000N=48000N=64000N=17280010010110210−810−610−410−2100X=Scaled avalanche sizeProbability(c) N=3200N=16000N=32000N=48000N=64000N=172800we find that markers of criticality are not only dependent on the region around the critical regime but also
may not be present for the same parameter set.
Discussion
This paper specifically examined a finite-size neuronal system without a separation of timescales between
external input and the avalanches themselves. By analytically tuning the system to be in the region of a
critical regime we were able to examine the type of dynamics displayed by such a system and to investigate
whether the dynamics display signatures of criticality. In summary, we have shown that:
1. As the system approaches the critical regime through a reduction in the external input the avalanches
become more distinct and the distribution of avalanche sizes displays scale-free behaviour.
2. With h = 1/N the IAIs exhibit temporal correlations which extend across a range of bin sizes to an
upper crossover. As the system approaches the critical regime through increasing the system size the
length of the temporal correlations is extended across a wider range of bin widths. These correlations
(one noted signature of a critical system) are observed despite the fact that the distribution of avalanche
sizes does not exhibit scale-free behaviour and does not change with the increase in system size. These
temporal correlations are lost if the critical regime is instead approached through reducing the external
input.
3. The distribution of IAIs was theoretically derived and was shown to be a weighted sum of hypoex-
ponentials. However, for h = 1/N (when the number of avalanches considered was of the same order
as those tested experimentally) the hypothesis that the IAI distribution follows a power-law was not
rejected by statistical testing indicating the scale-free nature of the distribution at this level of the
external input.
Validity of the model
The model considered in this paper was a highly simplified neuronal system with a number of assumptions,
such as equally weighted synapses and continuous constant external input. These assumptions were necessary
in order to analytically tune the system to be in the region of a critical regime. Therefore, while this should
not be taken as an accurate model of a real neuronal system it is important that we first consider models
such as this, examining markers of criticality, which will then aid our understanding when building on this
work with more complex models. This paper opens the way for future work examining the role of external
29
input on signatures of criticality and the importance of the region of parameter space on network dynamics.
Future work should also investigate the effect of topology on the dynamics [29, 49] and the effect of external
input with different temporal and spatial characteristics.
A purely excitatory network
The synaptic connections investigated in this model were purely excitatory. This not only simplifies the
model for analytical investigations but is also of interest from a neurological perspective in terms of early
brain development. Before birth, GABA is thought to have a depolarising effect on postsynaptic neurons
and it is not until the nervous system reaches a more mature state that this neurotransmitter becomes
inhibitory [50,51]. While presynaptic inhibition is thought to be present at all developmental stages [52] this
effect can be considered to be taken into account in the model by the fact that neurons cannot re-fire until
they have returned to the quiescent state. We have recently shown that EEG recordings from very preterm
infants (when GABA is still thought to be purely excitatory) exhibit LRTCs in the temporal occurrence
of bursts of activity [35]. The model studied here may be a candidate mechanism for the generation of
this temporal patterning in the discontinuous activity of the developing brain. Moreover, it is interesting
to note that despite the fact that the system has purely excitatory postsynaptic connections and input, for
these parameter regions, the model does not exhibit runaway excitation (saturation) but is able to maintain
stable dynamics through the 'balance' of individual neuronal dynamics resulting from a trade-off between
the rates at which neurons become active and quiescent. Indeed, while a number of authors have suggested
that a balance of excitation and inhibition in neuronal networks leads to critical behaviour [53], the work
here and in the companion paper shows that excitatory networks can display the same behaviour. It can be
speculated that this type of balanced activity in the region of a critical regime might be a way in which the
brain avoids (for the most part) epileptic behaviour during early development.
The activation function
Here we used a linear activation function for the transition of neurons from the quiescent to the active states.
However, physiologically neurons behave more like a saturating function. The linear activation function used
here was chosen so as to be analytically tractable and is also equivalent to a saturating function at low input
levels. However, considering instead a saturating function (see Appendix 3) we found the dynamics in the
region of the critical regime to show similar behaviour to the system with the linear activation function.
With both the linear and saturating activation functions, the critical regime can only be reached exactly
30
in the absence of external input. A positive external input therefore drives the system away from the critical
regime. However, with a quadratic activation function (see Appendix 3) the system does have a critical
fixed point even with a positive external input and it can be tuned directly to this regime. With such an
activation function the dynamics do not appear to exhibit burst like behaviour, however, analysis shows
that the activity fluctuates about the critical regime in an 'avalanche-like' manner. Thus, while a quadratic
function does not best describe activation in a neuronal network, we can emphasise our conclusion that
signatures of criticality are not universal and can be examined only in relation to the specific critical regime
of the system (see Appendix 3).
The binning approach
As described previously, the binning method separated avalanches where the time difference between con-
secutive spikes was greater than the average time difference between consecutive spikes across the entire
simulation. This was the approach taken by Benayoun et al. [36]. However, it is worth noting that this is
a slightly different approach to the method first proposed by Beggs and Plenz [5, 6] to separate neuronal
avalanches. In their analysis neuronal firing is distributed into bins of width of the average time difference
between consecutive spikes (δt) and firing is separated into avalanches by bins in which no firing occurs.
Thus, two spikes may be separated by more than the average time difference δt but still be considered part
of the same avalanche if they fell within consecutive bins. Our theoretical derivation of the IAI distribution
relied on the fact that all consecutive active to quiescent transitions or single quiescent to active transitions
with a length greater than the average time between two spikes is an IAI. This would not be the case if
the alternative (Beggs and Plenz) binning approach was used to determine avalanches. If this alternative
approach was used the distributions of consecutive active to quiescent transitions and single quiescent to
active transitions would be the same, but transitions of length slightly greater than or equal to the average
time between consecutive spikes (in fact up to twice this average) may or may not form part of the IAI
distribution depending on the exact binning. It is also important to note that with the binning method used
here, even with dense neuronal firing (which occurs if the external input is increased from the levels studied
here), it is always possible to separate the dynamics into 'avalanches' since there is always an average time
between consecutive spikes.
Additionally, both these binning approaches differ from that used in non-driven systems such as the
classical sand-pile model [18] and the system investigated in the companion paper to this article [24]. In
those models an avalanche consists of all firings until the system returns to the fully quiescent state. This
31
means that although the system may have a long period without firing -- during which neurons switch to the
inactive state -- activity before and after this period will not be considered as separate avalanches even if the
period in-between exceeds the average difference between consecutive spikes. Future work is needed to fully
investigate how differences in the definitions of avalanche affect the distributions of size, duration and IAIs
and care needs to be taken when interpreting the results from these different approaches.
Validity of DFA and the investigation of LRTCs
DFA is one method by which to estimate the Hurst exponent and was chosen here as it has been shown to
be an accurate estimate [45]. Moreover, it is a graphical approach and so can be used to check for crossover
points [47] -- see also the recently proposed ML-DFA [54] whereby the existence of crossover behaviour can
be rigorously tested. As the Hurst exponent can only be estimated it is is considered best practice to check
the consistency of the exponents using two methods [55]. However, as non-graphical methods only give
single numerical values they cannot be interpreted when crossover behaviour exists. Given that there were
crossover points we only considered DFA with this analysis.
Crossover points within a DFA plot have been shown to exist when the same correlations do not extend
across the whole data sequence in analytically constructed data [47]. It is important to correctly interpret
these crossover points. Being box sizes, they define sequence lengths, e.g., a box size of 10 indicates detrending
across a sequence of 10 consecutive IAIs. Note that as the IAIs are of variable length the box size does not
specify a particular simulation time but merely a number of events. Future investigation is therefore needed
to determine the relationship between the model and its crossover points.
Correlations extended only across a range of box sizes, with this range extending as the system size
increased and the system approached the critical regime. It appears that correlations could potentially extend
across an arbitrarily large box size in the limit of system size. Thus, as the critical regime is approached in
this way, this signature of a critical system emerges. LRTCs have been demonstrated previously in discrete
neurophysiological data, in the waiting times of burst activity in cultures [34] and in the bursts of activity
recorded using EEG in very preterm human neonates [35]. To our knowledge, waiting times of neuronal
avalanches have yet to be examined in this manner. However, such a study would provide an additional
link between studies on the neuronal scale and studies on a wider network scale for which LRTCs have been
observed in the fluctuations of oscillation amplitude. Palva and colleagues demonstrated strong correlations
between power-law exponents of avalanche size distributions and exponents of LRTCs in fluctuations of
oscillation amplitude in human MEG recordings [33]. Recent computational work also demonstrated a link
32
between neuronal avalanches on the one scale and LRTCs on a wider temporal scale and the authors called
for future work in this area [32]. However, these authors did not investigate LRTCs in the waiting times of
the avalanches themselves. Interestingly, in our model, LRTCs were observed when h = 1/N but not for
lower levels of external input. Thus, they were not observed when the avalanche size distribution exhibited
scale-free behaviour -- the type of distribution observed for avalanches recorded in vivo and in vitro [5, 6, 9].
It would therefore also be interesting to assess whether altering the driving force experimentally in vitro
would lead to the types of dynamics (LRTCs) observed here.
Partial scale-free behaviour in avalanche size
Statistical testing of the avalanche size distribution (with h = 0.1/N, 0.01/N ) did not reject the hypothesis
that the distribution followed a power-law when the number of points within the distribution was of the order
of the number of avalanches recorded in the experimental setting. Only with larger numbers of avalanches
was the hypothesis that the distribution is a power-law rejected. This is to be expected, as has been discussed
by Klaus and Plenz [2]. When a distribution deviates from the expected distribution by more than noise from
sampling then given a large enough number of samples the power-law hypothesis will eventually be rejected.
The fact that the power-law hypothesis was not rejected for lower numbers of avalanches demonstrates the
partial scale-free behaviour of the system in the region of the critical regime. Further, it highlights the
fact that stringent statistical testing, such as this, with high sampling may lead to rejecting the power-law
hypothesis and so rejecting the criticality hypothesis even when the system is critical.
Waiting times
In addition to increasing the physiological realism of the model, investigating the system with continuous
external input also has the advantage of producing waiting times (termed IAIs throughout). In the companion
paper the simple reseeding of the network with a neuron set to the active state implied that there was no
waiting times between avalanches. Other authors have reseeded by increasing the membrane potential
but stipulated that neurons must reach a threshold for them to become active (and a new avalanche to
start) [18, 25]. This does lead to waiting times, however, these are not the same as the waiting times
investigated in this model which are intrinsic to the network dynamics rather than as a result of an explicit
separation of timescales.
Recent work by Lombardi and colleagues [31] showed that the waiting times between neuronal avalanches
recorded in vitro have a distribution with an initial power-law regime. The authors suggest that the shape
33
of the distribution relates to up and down states within the network (which exhibit critical and subcritical
dynamics respectively) and are able to reproduce the non-monotonic waiting time distribution in a compu-
tational model in which neurons switch between up and down states depending on short-term firing history.
Interestingly, the distribution they observe is similar to the IAI distribution for the system with h = 0.1/N ,
see Fig. 9(b), which also has a scale-free initial regime albeit over a shorter range to that presented by
Lombardi et al. It is therefore possible that the waiting time distribution observed experimentally fits with
the model constructed here. It would be interesting to investigate whether a change in input to the network
in vitro alters the distribution in a similar way to those distributions seen in Fig. 9.
Additionally, for different parameter ranges different distributions were observed, in the IAI distribution
as well as the distributions of avalanche size and duration. This leads us to the important conclusion
that power-law distributions will not necessarily be displayed by systems in the region of a critical regime.
Therefore, this work suggests that the absence of a power-law in experimental data should not necessarily
be taken to conclude that the system does not lie in the region of a critical regime. This was also seen in the
companion paper where it was shown that despite being analytically tuned to the critical state (in absence of
external input) the avalanche size distribution was not a power-law although it did exhibit partial scale-free
behaviour. The fact that the system may not exhibit power-laws when close to (or at) the critical regime is
an important finding given that the system is finite-size as will be the case in an experimental setting. This
highlights the necessity of examining other markers of criticality before conclusions about the critical nature
of a system can be drawn.
Dynamic range and power-laws
Coinciding with results from previous authors [16, 29] we showed that the system exhibits optimal dynamic
range when the branching parameter is equal to one. When calculating the dynamic range of a system, we
emphasised that this value was dependent on the critical state of the system calculated when there was no
external input. We have shown that tuning a system to this critical point but then driving it with different
levels of external input has considerable effect on the distribution of avalanche sizes. For non-zero h the
corresponding ODE would, in the strictest sense, not be considered critical. Importantly, however, tuning
to the critical point of the system with zero external input, maximises the dynamic range.
Dehghani and colleagues [56] showed that in vivo (against the results of Petermann et al. [9] and Hahn et
al. [8]) avalanches were not well approximated by power-laws, but were more likely to approach exponential
distributions. They contrast this with the evidence that the brain is operating at criticality from in vitro
34
studies [5,57] where avalanches are well approximated by power-laws. Here we argue that external input and
functional benefits [17] such as dynamic range, information transmission and information capacity, provide
an interesting possibility as to the reason why in vivo and in vitro studies could potentially give different
results. The critical brain hypothesis demands that in isolation from its natural surroundings (in vitro)
and whilst having no external influences acting upon it (akin to the model with h = 0 we studied in the
companion paper [24]), a culture should exhibit signs that it is tuned to criticality (i.e. avalanches that are
well approximated by power-laws). However, when observed in vivo, and thus with external inputs acting
upon it, a critical brain may no longer exhibit avalanches approximated by power-laws but still optimise
functional benefits such as the dynamic range and information transmission [17]. In our model we have shown
that tuning the parameters to the critical regime does indeed maximise the dynamic range, but it is the level
of external input that dictates whether the avalanche distributions exhibit partial scale-free behaviour. For
this reason, avalanches recorded in vivo that lacked a power-law distribution would not be in contradiction
with the criticality hypothesis but rather an expected result. This further supports our suggestion in the
companion paper [24] that future work should shift its focus away from characterising avalanche distributions
and towards more appropriate metrics.
Two routes to criticality
In this paper we examined two different parameter changes such that the system approaches the critical
state: increasing the system size and lowering the overall level of the external input. Despite the fact that
in both cases the critical regime is approached, the dynamics and the signatures of criticality observed are
different. With increasing system size the temporal correlations extend across a wider range. However, the
distributions of the avalanche characteristics remain the same and the distribution of avalanche size does
not exhibit scale-free behaviour. By contrast, for lower overall levels of the external input the distributions
of avalanche size and duration do exhibit partial scale-free behaviour. However, in this case as the critical
regime is approached the temporal correlations in the avalanches are lost. At these lower levels of the
external input we also observe a greater separation of the avalanches suggesting that the avalanches have
less of an influence on each other which would explain this loss of LRTCs. Thus, as the system approaches
the critical state in two different regions of the parameter space the dynamical properties of the system are
very different. Significantly, this implies that not just the critical state alone but the region around the
critical regime is an important factor in the system's dynamics.
In conclusion, we have shown here and in the companion paper that in a finite-size neuronal system
35
in the region of a critical regime the distributions of avalanche attributes need not be a power-law. The
current assumption in the literature is that power-law dynamics imply criticality and vice versa that systems
without power-law dynamics are not in the region of a critical regime, however, the results here suggest that
this assumption need not be true. Moreover, we found that long-range temporal correlations and scale-free
distributions are not dependent on proximity to the critical regime alone but on the region of the parameter
space. The results further highlight the need for future work examining the type of dynamics we might
expect from such systems.
Appendix 1: Dynamic range
Whilst [16] and [29] consider a discrete model where multiple events can happen per time step, here we
show analytically that our continuous model will exhibit the same maximisation of the dynamic range when
R0 = 1. We use the calculation of R0 for a system where there is no external input (h = 0) and thus
R0 = w/α.
We begin by defining (as in Kinouchi and Copelli [16]) Fmax(R0) as the saturation level of neurons in a
network assuming a large external input h. For our model Fmax(R0) = N for all R0. Similarly we define
F0(R0) as the steady state solution of the mean field ODE for the system when there is zero external input,
i.e.
dA
dt
=
=
Therefore, solving this we have that
(cid:19)
+ h
(N − A) − αA
(N − A) − αA.
(cid:18) wA
N
wA
N
(cid:40)
0
Additionally let Fx(R0) = F0(R0) + x [Fmax(R0) − F0(R0)] giving
F0(R0) =
if R0 ≤ 1
if R0 > 1.
w
N(cid:0)1 − α
(cid:1)
N(cid:2)1 − α
w (1 − x)(cid:3)
N x
(cid:40)
Fx(R0) =
if R0 ≤ 1
if R0 > 1.
Finally, let A(σ, y) be the number of active neurons at the steady state in a regime where R0 = σ and h = y
(where σ and y are dummy variables and h is the external input), then the dynamic range ∆(R0) is defined
(similarly to [16]) as:
∆(R0) =
h0.9
h0.1
,
36
where
h0.1 is the level of external input such that A(R0, h0.1) = F0.1(R0) = F0.1
and h0.9 is the level of the external input such that A(R0, h0.9) = F0.9(R0) = F0.9.
We note that in [16, 29], the logarithm of this is taken but as the logarithm is an increasing function it is
unnecessary to scale in this way for the result we obtain. Whilst using F0.1 and F0.9 is the standard for
calculating the dynamic range these values are somewhat arbitrary [16] and can be generalised to k1 and k2
respectively. To calculate the dynamic range analytically we consider the two regimes of R0, firstly R0 ≤ 1
and secondly R0 > 1.
R0 ≤ 1
Here the steady state is given by
(cid:18) wFk
(cid:19)
N
+ hk
(N − Fk) − αFk = 0
⇒ (wk + hk) (N − N k) − αN k = 0
⇒hk =
1 − k − wk,
αk
∆ =
hk2
hk1
=
=
[αk2 − wk2(1 − k2)] (1 − k1)
[αk1 − wk1(1 − k1)] (1 − k2)
k2(1 − k1) [1 − R0(1 − k2)]
k1(1 − k2) [1 − R0(1 − k1)]
(w − α + αk)
∆ =
hk2
hk1
=
=
k2(1 − k1)(w − α + αk2)
k1(1 − k2)(w − α + αk1)
k2(1 − k1)(R0 − 1 + k2)
k1(1 − k2)(R0 − 1 + k1)
37
thus
R0 > 1
(cid:19)
(cid:18) wFk
(cid:16)
(cid:104)
N
w
α
w
1 −
k
1 − k
⇒hk =
thus
Here the steady state is given by
+ hk
(N − Fk) − αFk = 0
(cid:17)
(cid:105)(cid:20) N α
(cid:21)
⇒
(1 − k)
+ hk
(1 − k)
− αN
w
(cid:104)
1 −
(cid:105)
= 0
α
w
(1 − k)
Maximum of ∆(R0)
Calculating the derivative of ∆(R0) we find that if 0 < k1 < k2 < 1, then for R0 ≤ 1, d∆
R0 > 1, d∆
dR0
< 0. Thus the maximum of ∆(R0) is achieved for R0 = 1. It is worth noting that ∆(R0) is
> 0, whilst for
dR0
independent of N and only depends on the choice of k1 and k2.
Appendix 2: Driving the system from a subcritical and supercritical state
Throughout the paper we have examined parameters such that the system is critical when there is no external
input. In the presence of a small external input we therefore investigate driving the system in the region of
this critical state. In the companion paper [24], with no external input, we also investigated the system with
subcritical and supercritical parameters. In this appendix we briefly examine the dynamics of the system as
it is driven from these states by an external input.
Fig. 13 shows raster plots of network firings when the system is driven from a subcritical and supercritical
state with h = 1/N . Compared with the critical case, see Fig. 3(a), with the subcritical parameter set the
bursts appear to be shorter and consist of fewer neurons firing. Conversely, in the supercritical case the bursts
appear longer and consist of denser network firing. Fig. 14 shows the IAI distributions for the subcritical
and supercritical parameters. As expected from the raster plots, the IAIs are longer in the subcritical case
compared with the critical (Fig. 9(a)) and the supercritical. While the subcritical distribution appears
to exhibit partial scale-free behaviour similar to the critical case, the supercritical distribution loses this
appearance. The distributions from simulations are shown with the theoretical distribution calculated as
previously described as a weighted sum of hypoexpontials.
Fig. 15 shows the distributions of avalanche size and duration in the subcritical and supercritical cases.
Contradicting what we would expect from the raster plots we find that the avalanche sizes are smaller (on
average) in the supercritical system. In the companion paper we showed that the supercritical distribution
(without the presence of external input) had an increased number of large avalanches compared with the
distribution for the system at criticality. However, we do not find this here. As the firing with the supercritical
parameters is relatively dense we believe that this highlights a limitation with the binning method in this
case. We suggest that future research should focus on how binning can influence avalanche distributions.
Appendix 3: Altering the activation function
Throughout this paper we considered a linear activation function. What happens if a different activation
function is chosen? Do we observe the same type of dynamics? In this appendix we briefly investigate two
38
Figure 13: Raster plots of neuronal firing for the network driven from subcritical and super-
critical states. The network firing for (a) subcritical, α = 1.1, w = 1 ⇒ λ < 0 and (b) supercritical,
α = 0.9, w = 1 ⇒ λ > 0 parameter sets. Here we investigate the system with a small external input
(h = 1/N ) which drives the system slightly away from these fixed points. The red line indicates the level
of firing in 1 ms bins. The subcritical case appears to give rise to smaller bursts and the supercritical case
leads to a greater level of firing and longer burst activity compared with the critical system (see Fig. 3).
Figure 14: Distribution of IAIs for the system driven from subcritical and supercritical states.
The theoretical (red) and simulated (black) IAI distributions with (a) α = 1.1 (subcritical) and (b) α = 0.9
(supercritical) parameters. The blue line in (a) indicates a linear fit, i.e. a fitted power-law with an exponent
of 2.37. These distributions are with N = 800, w = 1, h = 1/N and the theoretical distributions were
calculated up to a level of initial active neurons which occur with a cumulative probability of 0.9 and 0.13
respectively (see main text).
39
0.10.52.05.0IAIProbability10−810−510−1(a)0.020.100.502.00IAIProbability10−810−510−1(b)Figure 15: Distributions of avalanche size and duration for the system driven from subcritical
and supercritical regimes. Avalanche size and duration distributions for the system driven from (a,c)
subcritical (α = 1.1) and (b,d) supercritical (α = 0.9) states. Simulations were run with N = 800, w =
1, h = 1/N . The red line in (a) shows the linear fit with a slope of -2.66.
40
1550500Avalanche sizeProbability(a)10−610−410−1Avalanche sizeProbability(b)10−710−410−11520500.10.52.010.0Avalanche durationProbability(c)10−610−410−10.010.050.200.50Avalanche durationProbability(d)10−710−410−1other activation functions: an exponential and a quadratic.
First let us consider the system with an exponential activation function such that:
(cid:18)
(cid:19)
dA
dt
=
1
N A+h) −
1 + e−( w
1
2
(N − A) − αA.
This function saturates and so is somewhat more realistic than the linear function considered previously.
Also, note that the function is set such that when A and h are both zero we also have f (x) = 0, i.e. without
any external input and with no active neurons the network will remain in this state. With this activation
function the eigenvalues of the fixed points are given by:
We have that
f(cid:48)(x) =
w
N e−( w
(1 + e−( w
N A+h)
N A+h))2
=
w
N
f (x) +
1
2
2 − f (x)
λ = f(cid:48)(x)(N − A) − f (x) − α.
(cid:18)
(cid:19)(cid:18) 1
(cid:19)
(cid:18) 1
4 − f 2(x)
(cid:19)
,
=
w
N
and so this could be used to find a critical fixed point along with the fact that at the fixed point of the
system we have that:
f (x) =
αA
,
(N − A)
which defines the level of the external input at the critical fixed point.
As before, consider initially the case where there is no external input (h = 0). In this case A = 0 is a
fixed point, which is critical (with λ = 0) if and only if α = w/4 by the above equations. What happens
to this system in the presence of small external input? Fig. 16 shows the raster plot for the three different
levels of the external input considered previously: h = 0.01/N, 0.1/N, 1/N . Comparing with Fig. 3, the
firing rate is lower with the saturating function studied here, however, the overall pattern of firing is the
same. For all three levels of the external input we continue to observe avalanche dynamics and for lower
levels of the external input (as the system approaches the critical regime) these avalanches become more
distinct. Fig. 17 shows the avalanche size, duration and IAI distributions for each of these three levels of the
external input. Comparing with Figures 4 and 9 we find that a similar relationship with the critical regime
emerges. With h = 1/N the IAI distribution shows scale-free behaviour (note that by the same derivation
as previously, theoretically the distribution is a weighted sum of hypoexponentials). For lower levels of the
external input the scale-free behaviour in the IAI distribution is lost but the distribution of avalanche sizes
appears scale-free. As was shown previously for the system with a linear activation function, we also found
that when h = 1/N the IAIs exhibited LRTCs up to a crossover point (data not shown). For lower levels of
the external input these correlations were lost.
41
Figure 16: Raster plots for different levels of the external input with the saturating activation
function. Neuronal firing during the first 2 seconds of example simulations with (a) h = 1/N , (b) h = 0.1/N
and (c) h = 0.01/N . For all three simulations w = 1, α = 0.25 and N = 800. Comparing with Figure 3 we
find that while in this case the firing rate is lower (note the longer time scale over which the raster plot is
displayed) the overall pattern is the same, with the avalanches becoming more distinct with lower levels of
the external input.
Figure 17: IAI, avalanche size and duration distributions for the system with the saturating
activation function. The distributions are for simulations with h = 1/N (a,d,g), h = 0.1/N (b,e,h) and
h = 0.01/N (c,f,i). For all simulations N = 800, α = 0.25, w = 1 and the distributions are pooled from 10
simulations each of length 104 seconds. The red lines indicates linear fits on the double logarithmic scale,
i.e. fitted power-laws with exponents of (a) 2.65, (e) 1.81, (f) 1.49 and (h) 1.84.
42
0500100020000400800Time (ms)Neuron Index(a)0500100020000400800Time (ms)Neuron Index(b)0500100020000400800Time (ms)Neuron Index(c)0.21.05.050.0IAIProbability10−710−410−1(a)IAIProbability10−510−310−11550500(b)10505005000IAIProbability10−510−3(c)1520100Avalanche sizeProbability10−710−410−1(d)Avalanche sizeProbability10−510−310−111010010000(e)Avalanche sizeProbability10−510−310−111010010000(f)Avalanche durationProbability10−810−410−10.11520(g)Avalanche durationProbability10−710−410−10.51050500(h)Avalanche durationProbability(i)10−510−310−10.1110500With both the linear and saturating activation function we considered the system in the region of the
critical regime, with the system driven from the critical regime by the positive external input. Consider the
system instead with a quadratic activation function:
(cid:16) w
N
dA
dt
=
(cid:17)
A2 + h
(N − A) − αA,
With this activation function the fixed points are given by:
with eigenvalues:
g(A) =
dA
dt
w
N
= −
+ wA2 − (h + α)A + hN = 0,
λ = g(cid:48)(A) = −3
w
N
A2 + 2wA − h − α.
Solving these simultaneously we find:
w
N
A2 + 2wA − h,
α = −3
2wA3 − wN A2 + hN 2 = 0,
which define the parameter space and the value of the fixed point for which a critical fixed point can be
obtained. Thus, we find that unlike the model with the linear (and saturating) activation function, here
with a non-zero external input it is possible to tune the system so that it is directly at the critical regime.
Upon examining this parameter space one can note that in many cases there also exists a stable (positive)
fixed point as well as the critical fixed point. From simulating such a system we found (data not shown)
that the dynamics of the system are quickly attracted to the stable fixed point and so the critical fixed
point has little affect on the dynamics. Therefore, to have a system which is affected by a critical fixed
point in the presence of a non-zero external input (in the case of this activation function and where positive
parameters are required) the critical regime must be the only fixed point of the system. Given that g(A) is
a cubic equation, to achieve a single fixed point which is critical this point must be an inflection point with
g(cid:48)(A) = 0 and g(cid:48)(cid:48)(A) = 0. From these equalities we find that the critical fixed point is A = N/3 and we
must also have h = wN
27 and α = 8wN
27 .
Fig. 18 shows a raster firing plot and the number of active neurons throughout a simulation for the system
with a single critical fixed point. As would be expected, the number of active neurons fluctuates about the
critical point. Previously when considering avalanche dynamics we have binned the firing. However, as
noted in the discussion the binning method will always separate firing into avalanches and as there are no
clear periods of inactivity this does not seem appropriate here. Recall that in the zero input case (see the
43
companion paper) we seeded the system so perturbing it away from the fully quiescent state (which was
the critical fixed point) and defined an avalanche as the firing that occurred before the system returned to
the fully quiescent state. In a similar approach here it is possible to define an avalanche as the number of
neurons that fire in a single excursion from the critical fixed point. We therefore counted the number of
neurons that fired from when the system was deflected (either in a positive or negative direction) from the
fixed point (A = N/3) until the next time at which the system had exactly N/3 active neurons. Fig. 18
shows the probability distribution of the size of the avalanches defined in this way. The distribution appears
to be scale-free over a range of scales.
Thus, while critical dynamics may not be apparent initially when examining data (for example if we were
to look at the overall dynamics from the simulations with quadratic activation function), we can observe
signatures of criticality when the dynamics are examined in relation to the known critical regime. Here we
can note that the network firing fluctuates about the critical regime - that is the number of active neurons
fluctuates about this regime and so the average number of active neurons across the course of a simulation is
approximately equal to the critical state of N/3. It might therefore be interesting to examine the fluctuations
about the mean activity level in experimental settings where activity is continuous (i.e. cannot be described
as intermittent avalanche-like activity) to determine whether signatures of criticality are present. Indeed,
such an approach has been taken previously to examine MEG data, thresholding at the median level [58].
Acknowledgements
Caroline Hartley is funded through CoMPLEX (Centre for Mathematics and Physics in the Life Sciences
and Experimental Biology), University College London. Timothy Taylor is funded by a PGR studentship
from MRC, and the Departments of Informatics and Mathematics at University of Sussex. Istvan Z. Kiss ac-
knowledges support from EPSRC (EP/H001085/1). Simon Farmer acknowledges support from the National
Institute for Health Research University College London Hospitals Biomedical Research Centre.
44
Figure 18: Dynamics of the network with a quadratic activation function. (a) Raster plot of network
firing for simulation with N = 800, h = wN
27 , w = 0.01. (b) For the same simulation this plot
shows the number of active neurons (A) at each simulation step. The distribution of avalanches (c) and
positive avalanches only (d) - as described in the main text - pooled from 20 simulations of 1000 seconds in
length. The red lines indicate linear fits, i.e. fitted power-laws, both with exponents of 1.48.
27 , α = 8wN
45
References
1. Clauset A, Shalizi CR, Newman MEJ: Power-Law Distributions in Empirical Data. Siam Review 2009,
51(4):661 -- 703.
2. Klaus A, Yu S, Plenz D: Statistical analyses support power law distributions found in neuronal
avalanches. PLoS One 2011, 6(5):e19779.
3. Chialvo DR: Emergent complex neural dynamics. Nature Physics 2010, 6(10):744 -- 750.
4. Linkenkaer-Hansen K, Nikouline VV, Palva JM, Ilmoniemi RJ: Long-range temporal correlations and scal-
ing behavior in human brain oscillations. J Neurosci 2001, 21(4):1370 -- 7.
5. Beggs JM, Plenz D: Neuronal avalanches in neocortical circuits. J Neurosci 2003, 23(35):11167 -- 77.
6. Beggs JM, Plenz D: Neuronal avalanches are diverse and precise activity patterns that are stable for
many hours in cortical slice cultures. J Neurosci 2004, 24(22):5216 -- 29.
7. Gireesh ED, Plenz D: Neuronal avalanches organize as nested theta- and beta/gamma-oscillations
during development of cortical layer 2/3. Proc Natl Acad Sci U S A 2008, 105(21):7576 -- 81.
8. Hahn G, Petermann T, Havenith MN, Yu S, Singer W, Plenz D, Nikolic D: Neuronal avalanches in sponta-
neous activity in vivo. J Neurophysiol 2010, 104(6):3312 -- 22.
9. Petermann T, Thiagarajan TC, Lebedev MA, Nicolelis MAL, Chialvo DR, Plenz D: Spontaneous corti-
cal activity in awake monkeys composed of neuronal avalanches. Proc Natl Acad Sci U S A 2009,
106(37):15921 -- 6.
10. Shriki O, Alstott J, Carver F, Holroyd T, Henson RNA, Smith ML, Coppola R, Bullmore E, Plenz D: Neuronal
avalanches in the resting MEG of the human brain. J Neurosci 2013, 33(16):7079 -- 90.
11. Linkenkaer-Hansen K, Nikulin VV, Palva JM, Kaila K, Ilmoniemi RJ: Stimulus-induced change in long-
range temporal correlations and scaling behaviour of sensorimotor oscillations. Eur J Neurosci 2004,
19:203 -- 11.
12. Nikulin VV, Brismar T: Long-range temporal correlations in alpha and beta oscillations: effect of
arousal level and test-retest reliability. Clin Neurophysiol 2004, 115(8):1896 -- 908.
13. Nikulin VV, Brismar T: Long-range temporal correlations in electroencephalographic oscillations:
Relation to topography, frequency band, age and gender. Neuroscience 2005, 130(2):549 -- 58.
14. Smit DJA, de Geus EJC, van de Nieuwenhuijzen ME, van Beijsterveldt CEM, van Baal GCM, Mansvelder HD,
Boomsma DI, Linkenkaer-Hansen K: Scale-free modulation of resting-state neuronal oscillations reflects
prolonged brain maturation in humans. J Neurosci 2011, 31(37):13128 -- 36.
15. Berthouze L, James LM, Farmer SF: Human EEG shows long-range temporal correlations of oscilla-
tion amplitude in Theta, Alpha and Beta bands across a wide age range. Clin Neurophysiol 2010,
121(8):1187 -- 97.
16. Kinouchi O, Copelli M: Optimal dynamical range of excitable networks at criticality. Nature Physics
2006, 2(5):348 -- 352.
17. Shew WL, Plenz D: The Functional Benefits of Criticality in the Cortex. Neuroscientist 2013, 19:88 -- 100.
18. Bak P, Tang C, Wiesenfeld K: Self-organized criticality: An explanation of the 1/f noise. Phys Rev Lett
1987, 59(4):381 -- 384.
19. Jensen HJ: Self-organized criticality: emergent complex behaviour in physical and biological systems. Cambridge
University Press 1998.
20. Essam J: Percolation Theory. Rep Prog Phys 1980, 43:833 -- 912.
21. Harris TE: The theory of branching processes. Die Grundlehren der mathematischen Wissenschaften in Einzel-
darstellungen, Berlin: Springer 1963.
22. Priesemann V, Munk MHJ, Wibral M: Subsampling effects in neuronal avalanche distributions recorded
in vivo. BMC Neurosci 2009, 10:40.
23. Bonachela JA, Munoz MA: Self-organization without conservation:
true or just apparent scale-
invariance? J. Stat. Mech. 2009, :P09009.
46
24. Taylor TJ, Hartley C, Simon PL, Kiss IZ, Berthouze L: Identification of criticality in neuronal avalanches:
I. A theoretical investigation of the non-driven case. J Math Neurosci 2013, 3:5.
25. Levina A, Herrmann JM, Geisel T: Dynamical synapses causing self-organized criticality in neural
networks. Nature Physics 2007, 3:857 -- 860.
26. Olami Z, Feder H, Christensen K: Self-organized criticality in a continuous, nonconservative cellular
automaton modeling earthquakes. Phys Rev Lett 1992, 68(8):1244 -- 1247.
27. Ribeiro TL, Copelli M: Deterministic excitable media under Poisson drive: power law responses,
spiral waves, and dynamic range. Phys Rev E Stat Nonlin Soft Matter Phys 2008, 77(5 Pt 1):051911.
28. Rubinov M, Sporns O, Thivierge JP, Breakspear M: Neurobiologically realistic determinants of self-
organized criticality in networks of spiking neurons. PLoS Comput Biol 2011, 7(6):e1002038.
29. Larremore DB, Shew WL, Restrepo JG: Predicting criticality and dynamic range in complex networks:
effects of topology. Phys Rev Lett 2011, 106(5):058101.
30. Boffetta G, Carbone V, Giuliani P, Veltri P, Vulpiani A: Power laws in solar flares: Self-organized criti-
cality or turbulence? Physical Review Letters 1999, 83(22):4662 -- 4665.
31. Lombardi F, Herrmann HJ, Perrone-Capano C, Plenz D, de Arcangelis L: Balance between Excitation
and Inhibition Controls the Temporal Organization of Neuronal Avalanches. Phys Rev Lett 2012,
108(22):228703.
32. Poil SS, Hardstone R, Mansvelder HD, Linkenkaer-Hansen K: Critical-state dynamics of avalanches and
oscillations jointly emerge from balanced excitation/inhibition in neuronal networks. J Neurosci
2012, 32(29):9817 -- 23.
33. Palva JM, Zhigalov A, Hirvonen J, Korhonen O, Linkenkaer-Hansen K, Palva S: Neuronal long-range tem-
poral correlations and avalanche dynamics are correlated with behavioral scaling laws. Proc Natl
Acad Sci U S A 2013, 110(9):3585 -- 90.
34. Segev R, Benveniste M, Hulata E, Cohen N, Palevski A, Kapon E, Shapira Y, Ben-Jacob E: Long term behavior
of lithographically prepared in vitro neuronal networks. Phys Rev Lett 2002, 88(11):118102.
35. Hartley C, Berthouze L, Mathieson SR, Boylan GB, Rennie JM, Marlow N, Farmer SF: Long-range temporal
correlations in the EEG bursts of human preterm babies. PLoS One 2012, 7(2):e31543.
36. Benayoun M, Cowan JD, van Drongelen W, Wallace E: Avalanches in a stochastic model of spiking
neurons. PLoS Comput Biol 2010, 6(7):e1000846.
37. Gillespie D: Exact stochastic simulation of coupled chemical reactions. Journal of Physical Chemistry
1977, 81(25):2340 -- 2361.
38. Ross SM: Introduction to probability models. Amsterdam: Academic Press, 10th ed edition 2010.
39. Scheuer E: Reliability of an m-out of-n system when component failure induces higher failure rates
in survivors. IEEE Transactions On Reliability 1988, 37:73 -- 74.
40. Amari S, Misra R: Closed-form expressions for distribution of sum of exponential random variables.
IEEE Transactions On Reliability 1997, 46:519 -- 522.
41. Peng CK, Havlin S, Stanley HE, Goldberger AL: Quantification of scaling exponents and crossover phe-
nomena in nonstationary heartbeat time series. Chaos 1995, 5:82 -- 7.
42. Toweill DL, Kovarik WD, Carr R, Kaplan D, Lai S, Bratton S, Goldstein B: Linear and nonlinear analysis of
heart rate variability during propofol anesthesia for short-duration procedures in children. Pediatr
Crit Care Med 2003, 4(3):308 -- 14.
43. Castiglioni P, Parati G, Di Rienzo M, Carabalona R, Cividjian A, Quintin L: Scale exponents of blood
pressure and heart rate during autonomic blockade as assessed by detrended fluctuation analysis.
J Physiol 2011, 589(Pt 2):355 -- 69.
44. Ho KK, Moody GB, Peng CK, Mietus JE, Larson MG, Levy D, Goldberger AL: Predicting survival in heart
failure case and control subjects by use of fully automated methods for deriving nonlinear and
conventional indices of heart rate dynamics. Circulation 1997, 96(3):842 -- 8.
45. Taqqu M, Teverovsky V, Willinger W: Estimators for long-range dependence: An empirical study.
Fractals 1995, 3(4):785 -- 798.
47
46. Peng CK, Buldyrev SV, Havlin S, Simons M, Stanley HE, Goldberger AL: Mosaic organization of DNA
nucleotides. Phys Rev E Stat Phys Plasmas Fluids Relat Interdiscip Topics 1994, 49(2):1685 -- 9.
47. Hu K, Ivanov PC, Chen Z, Carpena P, Stanley HE: Effect of trends on detrended fluctuation analysis.
Phys Rev E Stat Nonlin Soft Matter Phys 2001, 64(1 Pt 1):011114.
48. McSharry P: DFA Matlab code found on the website of the Systems analysis, modelling
and prediction group, Department of Engineering Sciences, University of Oxford. Available:
http://www.eng.ox.ac.uk/samp/software/ cardiodynamics/dfa.m. DFA Matlab code found on the web-
site of the Systems analysis, modelling and prediction group, Department of Engineering Sciences, University
of Oxford. Available: http://www.eng.ox.ac.uk/samp/software/ cardiodynamics/dfa.m 2005, Last checked: 11
January 2011.
49. Sporns O: The non-random brain: efficiency, economy, and complex dynamics. Front Comput Neurosci
2011, 5:5.
50. Cherubini E, Gaiarsa JL, Ben-Ari Y: GABA: an excitatory transmitter in early postnatal life. Trends
Neurosci 1991, 14(12):515 -- 9.
51. Ben-Ari Y: Excitatory actions of gaba during development: the nature of the nurture. Nat Rev
Neurosci 2002, 3(9):728 -- 39.
52. Holmes GL, Khazipov R, Ben-Ari Y: New concepts in neonatal seizures. Neuroreport 2002, 13:A3 -- 8.
53. Shew WL, Yang H, Petermann T, Roy R, Plenz D: Neuronal avalanches imply maximum dynamic range
in cortical networks at criticality. J Neurosci 2009, 29(49):15595 -- 600.
54. Botcharova M, Farmer SF, Berthouze L: A maximum likelihood based technique for validating de-
trended fluctuation analysis (ML-DFA). arXiv:1306.5075 2013.
55. Gao J, Hu J, Tung WW, Cao Y, Sarshar N, Roychowdhury VP: Assessment of long-range correlation in
time series: how to avoid pitfalls. Phys Rev E Stat Nonlin Soft Matter Phys 2006, 73(1 Pt 2):016117.
56. Dehghani N, Hatsopoulos NG, Haga ZD, Parker R, Greger B, Halgren E, Cash SS, Destexhe A: Avalanche
analysis from multi-electrode ensemble recordings in cat, monkey and human cerebral cortex
during wakefulness and sleep. Frontiers in Physiology 2012, 3(302).
57. Friedman N, Ito S, Brinkman BAW, Shimono M, DeVille REL, Dahmen KA, Beggs JM, Butler TC: Universal
Critical Dynamics in High Resolution Neuronal Avalanche Data. Phys. Rev. Lett. 2012, 108:208102.
58. Poil SS, van Ooyen A, Linkenkaer-Hansen K: Avalanche dynamics of human brain oscillations: relation
to critical branching processes and temporal correlations. Hum Brain Mapp 2008, 29(7):770 -- 7.
48
|
1706.03836 | 1 | 1706 | 2017-06-12T20:16:42 | The interplay between long- and short-range temporal correlations shapes cortex dynamics across vigilance states | [
"q-bio.NC",
"nlin.AO"
] | Increasing evidence suggests that cortical dynamics during wake exhibits long-range temporal correlations suitable to integrate inputs over extended periods of time to increase the signal-to-noise ratio in decision-making and working memory tasks. Accordingly, sleep has been suggested as a state characterized by a breakdown of long-range correlations; detailed measurements of neuronal timescales that support this view, however, have so far been lacking. Here we show that the long timescales measured at the individual neuron level in freely-behaving rats during the awake state are abrogated during non-REM (NREM) sleep. We provide evidence for the existence of two distinct states in terms of timescale dynamics in cortex: one which is characterized by long timescales which dominate during wake and REM sleep, and a second one characterized by the absence of long-range temporal correlations which characterizes NREM sleep. We observe that both timescale regimes can co-exist and, in combination, lead to an apparent gradual decline of long timescales during extended wake which is restored after sleep. Our results provide a missing link between the observed long timescales in individual neuron fluctuations during wake and the reported absence of long-term correlations during deep sleep in EEG and fMRI studies. They furthermore suggest a network-level function of sleep, to reorganize cortical networks towards states governed by slow cortex dynamics to ensure optimal function for the time awake. | q-bio.NC | q-bio | The interplay between long- and short-range temporal
correlations shapes cortex dynamics across vigilance
states
Christian Meisel1∗, Andreas Klaus1, Vladyslav V. Vyazovskiy2 and Dietmar
Plenz1
1 Section on Critical Brain Dynamics, National Institute of Mental Health, Bethesda, Maryland
20892, USA
2 Department of Physiology, Anatomy and Genetics, University of Oxford, Parks Road, Oxford
OX1 3PT, UK
∗ corresponding author email address: [email protected]
Short title: Cortical timescales in different vigilance states
Number of pages: 31
Number of figures: 4
Number of words for Abstract: 248
Number of words Introduction: 390
Number of words Discussion: 600
Conflict of Interest: N/A
Acknowledgements: This study was supported by the Intramural Research Program of the
NIMH. This study utilized the high-performance computational capabilities of the Biowulf
Linux cluster at the National Institutes of Health, Bethesda, Md.
7
1
0
2
n
u
J
2
1
]
.
C
N
o
i
b
-
q
[
1
v
6
3
8
3
0
.
6
0
7
1
:
v
i
X
r
a
1
Increasing evidence suggests that cortical dynamics during wake exhibits long-
range temporal correlations suitable to integrate inputs over extended periods
of time to increase the signal-to-noise ratio in decision-making and working
memory tasks. Accordingly, sleep has been suggested as a state character-
ized by a breakdown of long-range correlations; detailed measurements of
neuronal timescales that support this view, however, have so far been lack-
ing. Here we show that the long timescales measured at the individual neuron
level in freely-behaving rats during the awake state are abrogated during non-
REM (NREM) sleep. We provide evidence for the existence of two distinct
states in terms of timescale dynamics in cortex: one which is characterized by
long timescales which dominate during wake and REM sleep, and a second one
characterized by the absence of long-range temporal correlations which char-
acterizes NREM sleep. We observe that both timescale regimes can co-exist
and, in combination, lead to an apparent gradual decline of long timescales
during extended wake which is restored after sleep. Our results provide a
missing link between the observed long timescales in individual neuron fluctu-
ations during wake and the reported absence of long-term correlations during
deep sleep in EEG and fMRI studies. They furthermore suggest a network-
level function of sleep, to reorganize cortical networks towards states governed
by slow cortex dynamics to ensure optimal function for the time awake.
2
Significance Statement
The lack of sleep deteriorates several key cognitive functions, yet the neuronal underpinnings
of these deficits have remained elusive. Cognitive capabilities are generally believed to bene-
fit from a neural circuit's ability to reliably integrate information. Persistent network activity
characterized by long timescales may provide the basis for this integration in cortex. Here we
show that long-range temporal correlations indicated by slowly decaying autocorrelation func-
tions in neuronal activity are dependent on vigilance states. While wake and REM sleep exhibit
long timescales, these long-range correlations break down during NREM sleep. Our findings
thus suggest two distinct states in terms of timescale dynamics. During extended wake, the
intermittency of short timescales can lead to an overall decline in cortical timescales.
3
Introduction
The ability to integrate information over time is a pre-requisite for brain function during wake.
Accumulating evidence suggests that the brain integrates information in a distinct progression
of increasingly longer temporal timescales that closely follows the hierarchy of cortical organi-
zation (Chaudhuri et al., 2015). Evidence for such a hierarchical ordering and the existence of
long timescales in higher order cortical areas has come from various experimental modalities in-
cluding studies on non-human primates (Ogawa and Komatsu, 2010; Murray et al., 2014), hu-
man electrocorticography (Honey et al., 2012) as well as fMRI (Stephens et al., 2013). Func-
tionally, these differentially expressed timescales provide an intriguing perspective on tem-
poral information integration in the brain: by setting the duration over which a neural cir-
cuit integrates its inputs, longer times allow to increase the signal-to-noise ratio in decision-
making and working memory (Kiebel et al., 2008; Friston et al., 2012; Chaudhuri et al., 2015;
Kringelbach et al., 2015).
While these long timescales associated with long-range temporal correlations in the history
of neural activity may provide a plausible mechanism for temporal integration during wake,
their dependence on vigilance levels is currently less well understood. It has been suggested that
during sleep the brain loses its ability to effectively integrate information across different corti-
cal areas and across time, a functional loss that has also been proposed a potential mechanism
for the concomitant loss of consciousness (Tononi, 2008). Indeed, a decrease in information
integration during nonrapid eye movement (NREM) sleep has been observed in space, quan-
tified by the effective connectivity between different cortical regions (Massimini et al., 2005),
and time (Tagliazucchi et al., 2013). However, these studies have focused on large-scale brain
signals measured by EEG and fMRI; their link to the long timescales governing individual
neuron activity is missing. Apart from the effect of sleep on cortical timescales, it is conceiv-
4
able that also more subtle vigilance changes may impact the timescales of cortical dynamics.
For example, cognitive capabilities and the ability to process information are known to be af-
fected by extended waking (Van Dongen et al., 2003; Banks and Dinges, 2007; Mignot, 2008;
Killgore, 2010). The impact of extended wakefulness on cortical timescales, however, is cur-
rently unknown.
Here, we sought to systematically characterize the timescales governing cortical dynam-
ics during wake, extended waking, and its dependency on sleep. We hypothesized that the
breakdown in long-range temporal correlations during sleep will be visible at the level of indi-
vidual neuron spiking activity. For this purpose, we analyzed neuron activity at the individual
and multi-unit level along with local field potentials (LFPs) across different cortical regions in
freely-behaving rats.
Materials and Methods
We investigated two datasets where cortical activity was monitored across different vigilance
states in rats. In the first dataset, local field potentials (LFP) and multi-unit activity (MUA)
were recorded from frontal cortex during 6 hours of sleep deprivation and after a consecutive
recovery period (n=7 animals; dataset 1). In the second dataset, LFP and single-unit activity
were recorded from frontal and parietal cortex areas during 4 hours of sleep deprivation and
during consecutive recovery sleep (n=13 animals; dataset 2).
Dataset 1
Adult male rats (Spraque Dawley, total n=7) were used in this dataset. All rats were housed
individually in transparent Plexiglas cages. Lighting and temperature (21 ± 0.5C) were kept
constant (LD 12:12, light on at 6 am, food and water available ad libitum).
5
Implantation of microelectrode arrays
Procedures were in accordance with National Institutes of Health guidelines. Animal proce-
dures were approved by the National Institute of Mental Health Animal Care and Use Commit-
tee. At age 4-6 weeks, multichannel microelectrode arrays were implanted in the right frontal
cortex (B: +1-2 mm, L: 2.5-3.5 mm) under deep isoflurane anesthesia (1.5 − 2% volume) and
presence of the analgesic ketoprofen (5 mg/kg, subcutaneous). Ketoprofen was given for up
to two days post-surgery and animals were allowed to recover for 5 days before recordings.
The arrays had 32 channels (8x4, 200µm inter-electrode spacing; 23µm electrode diameter;
Neuronexus, Ann Arbor, MI, USA). The surgical procedure was performed in sterile conditions
where, first, a ∼ 2x2 mm craniotomy was made using a high-speed surgical drill. After an inci-
sion in the dura the electrode array was then lowered into the brain tissue by penetrating the pia
mater. Electrodes were slowly advanced further into brain tissue until all rows of the array were
at the level of superficial cortical layers (layers 2/3) and most channels showed robust single-
or multiunit activity. After application of silicon gel to seal the craniotomy and to protect the
surface of the brain, dental acrylic was placed around the electrode array to fix it to the skull.
The ground wire was connected to a scull screw located 1 mm posterior to bregma.
Experimental design
At least 5 days were allowed for recovery after surgery. Sleep deprivation began at light onset
(6 am) and involved continuous observation of the animal and its LFP recording. Animals
were sleep deprived for a total of 6 hours after which an undisturbed recovery period of 5-6
hours duration followed. Prolonged wakefulness was achieved by providing rats with novel
objects and/or delivering low-level auditory or visual stimuli. Prior to the experiment, rats
were habituated to the experimenter and to the exposure to novel objects (including nesting and
bedding material from other rat cages, tubes of different shape and color, little colored blocks,
6
rubber balls and boxes of different shapes and colors). Care was taken not to stress animals;
they never appeared to engage in freezing or aggressive behavior, and exhibited no signs of
discomfort.
LFP and MUA recording during prolonged wakefulness
Neuronal activity including LFP and extracellular unit activity was recorded at 30 kHz and
stored for offline analysis (Cerebus, Blackrock Microsystems). At least 20 minutes of continu-
ous LFP and MUA were recorded for each hour and experiment during prolonged wakefulness
(from 0 to 6 hours, corresponding to SD0 to SD6, respectively) as well as after the recovery
period (REC). It has previously been pointed out that wake is not a homogenous state, and that
it is therefore important to perform analyses within substates (quiet and active wake) as similar
as possible (Fisher et al., 2016). We here, similar to previous work (Vyazovskiy et al., 2011),
focused on "quiet wake" (Q) episodes, i.e. periods when the animal is alert and has its eyes
open, readily responds to stimuli while maintaining vigilance and posture, but is immobile. To
find these episodes, we first marked periods when the animal behaviorally appeared to be in a
Q state, i.e. had its eyes open, readily responded to stimuli, maintained vigilance and posture,
but was immobile. This included the removal of episodes with rearing, grooming, eating or
drinking. Channels containing artifacts or noise were removed from further analysis of LFP
and MUA. We then carefully selected time periods of at least 4 s duration that showed LFP
signals characterized by typical wake activity, i.e. LFP signals characterized by mainly low
voltage activity with theta waves and no extended periods of slow waves typical for sleep (≥∼
1 s).
Similar to previous reports (Vyazovskiy et al., 2011) we observed occasional large-amplitude
activity in these select periods of Q, which typically presented as single positive half-waves in
the frequency range from 2-6 Hz, but could occasionally also appear in succession of 2 or more
7
waves (Fig. 1). Events like these are often not detectable in EEG (Vyazovskiy et al., 2011) and
are therefore part of what is traditionally considered the wake state. To test if or to what extent
our results depended on the occurrence of these events, all analyses were repeated on data where
segments with this kind of slow wave activity had been eliminated (see below). As a further
control, such large-amplitude segments were carefully removed from analyses in dataset 2 (see
below).
Multi-unit spikes were extracted from the high-pass filtered signal (≥ 250Hz) by applying
a threshold at negative 5 times the root mean square of the signal using the Cerebus Central
software (Blackrock Microsystems). Thresholded waveforms were subsequently offline-sorted
using the Offline Spike Sorter (Plexon Inc., Dallas, TX, USA) to eliminate artifactual wave-
forms caused by electrical or mechanical noise. Principal components (PCs, set to 3) were
extracted and automatic cluster selection was performed using the T-Distribution Expectation-
Maximization (E-M) method (Shoham et al., 2003). Only electrodes and units were used for
analysis for which the typical biphasic waveform was evident. LFPs were first downsampled
to 500 Hz and band-pass filtered (1-40 Hz) using a phase neutral filter by applying a second
order Butterworth filter in both directions. A notch filter to eliminate line noise was applied
subsequently.
Dataset 2
For dataset 2, we used recordings from a previous study described in detail in (Vyazovskiy et al., 2011).
In short, data consisted of male WKY rats from which LFP and unit activity were recorded in
frontal (n=11) and/or parietal (n=9) cortex with 16-channel micro-arrays. Similar to dataset
1, rats were housed individually in transparent Plexiglas cages (light:dark 12:12 h, light on at
10:00; food and water ad libitum and replaced daily at 10:00). Data recording and online spike
sorting were done with the Multichannel Neurophysiology Recording and Stimulation System
8
(Tucker-Davis Technologies Inc). Unit activity was collected continuously (25 kHz, 300 -- 5,000
Hz), concomitantly with the LFPs from the same electrodes and epidural EEGs (both 256Hz,
0.1 -- 100 Hz). Data consisted of 4 hours of sleep deprivation and 6 hours of consecutive recov-
ery. In each animal, two to four experiments with 4 h of sleep deprivation were performed (at
least 5 days apart). Sleep stages were scored offline by visual inspection of 4-s epochs. Spike
sorting was performed by principal component analysis (PCA) followed by split and merge ex-
pectation maximization (SMEM) clustering algorithm. Individual unit activity was binned in
2-ms bins and stored for further offline analysis. All analyses in this study were performed on
artifact-free 4s-intervals classified as vigilance stages pertaining to either quiet wake (Q), REM
sleep (R) and NREM sleep (N). Quiet wake epochs were defined as in dataset 1 (see above)
while, additionally, carefully excluding also short epochs with large-amplitude LFP activity.
For further details regarding these data, see (Vyazovskiy et al., 2011).
Spike-count autocorrelation
The temporal autocorrelation of spike counts was computed for MUA (dataset 1) and putative
single units (dataset 2) similar to previous work (Ogawa and Komatsu, 2010; Murray et al., 2014).
The 4s-intervals were divided into separate, successive time bins of duration ∆ which we set to
∆ = 100ms. Across different 4s-intervals within the same animal and hour during sleep depri-
vation (datasets 1 and 2), during recovery sleep (dataset 2) and after recovery sleep (dataset 1),
we calculated the correlation between spike counts N in two time bins, indexed by their onset
times i∆ and j∆, using the Pearsons correlation coefficient R:
R(i∆, j∆) =
Cov(N(i∆), N(j∆))
qVar(N(i∆)) × Var(N(j∆))
(1)
where covariance (Cov) and variance (Var) are computed across 4s-intervals for those time
bins. To allow reliable computation of spike-count autocorrelation, we required that each (multi-
9
)unit fired at least 8 times during the 4s-interval and that at least 10 4s-intervals within each ani-
mal and hour were available (Ogawa and Komatsu, 2010); similar to previous work this thresh-
old level was not essential to observe our main findings. One rat of dataset 1 did not exhibit
MUA at all time points during the sleep deprivation period and was thus excluded from the
analysis, so that spike-autocorrelation was derived from a total of n=6 rats in dataset 1. The
decay of autocorrelation was fit by an exponential decay to the population of neurons, i.e. the
mean across autocorrelation functions from all units, for each time point and rat:
R(k∆) = A(e−λk∆ + B),
(2)
where λ is the decay rate. Fitting was done using the PYTHON (Python Software Foun-
dation, version 2.7) function SCIPY.OPTIMIZE.CURVE FIT. As a minimal goodness of fit we
required R2 ≥ 0.5 which excluded some rare outliers due to poor fits.
Recovery from large-activity events
MUA activity increased with negative LFP (nLFP) excursions (Fig. 2). To analyze how MUA
and LFP activity recovered from such large-activity events in dataset 1, we identified these
events of increased MUA activity in each channel and for each 4s-interval as nLFP excursions
greater or equal -2 standard deviations (SD) after z-transformation (Fig. 2 a). For each such
nLFP event, both the LFP as well as the MUA in this channel for the time ±100ms around
the most negative LFP excursion was then saved for further analysis. We required the next
consecutive nLFP event to be at least 200 ms away. Next, the recovery from these nLFP was
analyzed. nLFP segments were averaged for each time point (hour during sleep deprivation or
after recovery period) and animal (Fig. 2 b) and fit by an exponential decay to derive recovery
rates for each time point and each animal. The recovery rates λ were derived by fitting an
exponential function to the nLFP:
10
S(t) = Ae−λt + B
(3)
using the PYTHON (Python Software Foundation, version 2.7) function SCIPY.OPTIMIZE.CURVE
FIT. The recovery was fit from 30 ms after the most-negative LFP deflection to the local max-
imum within 100 ms after the most-negative LFP deflection since LFP sometimes exhibited a
bleed-through of the spike trace in the vicinity of the most negative excursion (Ray et al., 2008;
Ray and Maunsell, 2011; Nauhaus et al., 2009; Nauhaus et al., 2012). To avoid distortion by
this distinct wave, we chose to fit the LFP recovery from large-activity events at 30 ms after the
most-negative deflection.
Detection of bimodality in 2-6 Hz half-waves
For this analysis, LFP signals were further band-pass filtered (2-6 Hz) using a phase neutral
filter by applying a second order Butterworth filter in both directions in each 4s-interval. The
histogram of positive 2-6 Hz half-waves exhibited a clear bimodality in double-logarithmic
plot when the occasional brief large-amplitude activity events were not removed (dataset1; see
above; Fig. 1 c).
In dataset 1, to test the dependence of our results on the occurrence of these events, all
analyses were repeated for segments with or without this kind of large-amplitude slow wave
activity. Specifically, we determined whether the maximum of the 2-6 Hz filtered LFP signal in
each channel and 4-s segment was larger than a given threshold, and then separately analyzed
spike autocorrelation and nLFP recovery for units and LFP data based on whether there was an
event larger than this threshold or not. We set the threshold individually for each channel and
each 4-s segment as the median plus one standard deviation of the positive 2-6 Hz half-waves
(Fig. 1 c, vertical magenta line). This threshold reliably removed all large-amplitude events (i.e.
the bimodality in the LFP amplitude distribution) while maintaining a large-enough number of
11
data segments for analysis both above and below threshold.
In dataset 2, segments during quiet-wake (Q) were carefully chosen not to contain any of
these high-amplitude LFP events. This is evidenced by the 2-6 Hz LFP amplitude distribution
which did not exhibit a prominent bimodality (Fig. 3 d).
Computational model
To develop better insights into the determinants of timescale changes in cortical network ac-
itivty, we studied a neuron network model that could exhibit long timescales associated with
long-range temporal correlations. The neuron network model consisted of N=100 all-to-all
coupled, binary-state neurons with the following dynamical rules: If neuron j spiked at time t
(i.e., sj(t) = 1) as part of an active set of neurons J(t), a postsynaptic neuron i will spike at
time t + 1 according to
si(t + 1) = Θ[1 − Y
j∈J(t)
(1 − pij) − ζ(t)]
(4)
where Θ[x] is the unit step function and ζ(t) is a random number from a uniform distribution
on [0,1] to account for the probabilistic nature and variability of unitary synaptic efficacy. pij
are the asymmetric synaptic coupling strengths between each pair of neurons which are first
drawn from a uniform distribution on [0,1] and then multiplied by N · K/ P pij. The parameter
K is consequently related to the average connectivity and is therefore a control parameter for
the dynamics of the network: at K = 1 each spiking neuron excites, on average, exactly one
postsynaptic neuron meaning the network is critical. Conversely, at K < 1 activity dies out
prematurely and the system is subcritical; at K > 1 each neuron excites on average more than
on postsynaptic neuron and the system is supercritical (Shew et al., 2009). We instantiated the
model at different average connectivies K = 1 to study the spike autocorrelation and recovery
from large-activity events in similar ways as in the experimental data. Network activity was
12
introduced by randomly setting one neuron to active at each time step.
The temporal autocorrelation of neurons was studied by simulating network activity for
5050 timesteps. After the initial 50 timesteps during which network activity typically reached a
stable level, neuron activity was binned in 50-timestep bins, resulting in spike-count timeseries
of length 100 for each neuron. This process was repeated for 100 network simulation runs which
allowed the calculation of Pearsons correlation coefficients R (eq. 1) for different time bins and
across simulation runs analogously to the experimental data. The population autocorrelation
function was, also analogously to experimental data, derived by averaging across all neurons
and consequently fit by an exponential decay (eq. 2) to derive a recovery rate λ.
To study the recovery from large-activity network events relevant to our experimental anal-
ysis, the recovery from large, intrinsic fluctuations in network activity was monitored. We
simulated network activity for 5050 timesteps. Network activity typically reached a stable level
after about 50 timesteps. From the following 5000 timesteps, we identified large intrinsic fluc-
tuations in the spike histogram greater than a threshold T which we set to T = 2 standard
deviations. Once a large fluctuation of network activity, i.e. in the spike histogram, had been
identified, we required the following fluctuation event to be at least 50 timesteps apart. We av-
eraged over all fluctuation events from a total of 100 network simulation. We fit an exponential
decay (eq. 3) to these averages to derive a recovery rate λ.
To implement offline periods of spiking similar to those observed during sleep deprivation,
the activity of an individual neurons was set to zero with a probability pOFFLINE at each time
step during the simulation.
Results
We first assessed the timescales governing cortical dynamics at the individual neuron level in
three different vigilance states: REM sleep, NREM sleep and quiet wake. For each vigilance
13
state, the spike-count autocorrelation was calculated as the correlation coefficient between the
number of putative single-unit spikes in pairs of time bins across all artifact-free 4s-segments.
Following previous work (Ogawa and Komatsu, 2010; Murray et al., 2014), we derived an au-
tocorrelation function reflective of the population- or network-level activity in each animal by
averaging functions across units (Fig. 1 a). We observed slow autocorrelation decays indicative
of long-range temporal correlations during quiet wake in frontal cortex. While REM sleep ex-
hibited a similar, slowly decaying autocorrelation function, NREM sleep differed profoundly,
exhibiting a fast decaying autocorrelation function at significantly higher rate (ANOVA and post
hoc unpaired t-test; Fig. 1 a, b). To assure that these timescale differences were independent of
firing rates, we repeated the analyses using only neurons with average firing rates between 3 and
5 Hz in all vigilance states. While this selection abolished all firing rate differences between
vigilance states, the autocorrelation decay differences were maintained (Fig. 1 c; ANOVA,
F=29, p=4e-13).
Next, we extended our analysis to recordings from parietal cortex to investigate how univer-
sal the vigilance-dependent timescale differences were across cortex. No statistically significant
difference between frontal and parietal areas was observed when all quiet wake segments were
compared (frontal: 0.0017 ± 0.0002; parietal: 0.0015 ± 0.0002; p=0.39; unpaired t-test). In
absolute terms, these values correspond to timescales of about 400 ms, which is in the or-
der of magnitude also observed in areas of higher cortical hierarchy in non-human primates
(Murray et al., 2014). Similar to frontal cortex, we observed a much more rapid spike-count au-
tocorrelation decay during NREM sleep in comparison to quiet wake and REM sleep indicative
of a loss of long-range temporal correlations (Fig. 1 d -- f).
These results indicate distinct timescales in different vigilance states: long timescales asso-
ciated with a slow autocorrelation decay during quiet wake and REM sleep, and short timescales
during NREM sleep. We next investigated the persistence of timescales within vigilance states
14
and across time. Previous work has shown that wake is not a homogeneous state. Sponta-
neous waking is associated with more pronounced slow rhythms in the EEG (Finelli et al., 2000;
Strijkstra et al., 2003), changes in firing rates (Fisher et al., 2016) and the occurrence of local
OFF periods where neurons stop firing and go "offline" (Poulet and Petersen, 2008; Vyazovskiy et al., 2011;
McGinley et al., 2015). Some of these changes, like local offline periods, may not show in scalp
EEG (Vyazovskiy et al., 2011); the underlying state may thus still be considered wake in the
traditional sense. We therefore studied neuron timescale dynamics in wake by systematically
taking the effect of offline periods into consideration.
We first analyzed multi-unit activity of frontal cortex in freely-behaving rats during 6 hours
of sleep deprivation and after a consecutive recovery period (dataset 1). In these data, the spike
autocorrelation analysis revealed a progressive increase of decay rates during sleep deprivation
reflective of the faster autocorrelation decay (ANOVA, F=2.91, p=0.015; Fig. 2 a, b). Consecu-
tive sleep, conversely, recovered the slower rates. Post hoc statistical comparison of beginning
(SD0) to end of sleep deprivation (SD6), and end of sleep deprivation (SD6) to post recov-
ery sleep (REC) revealed both changes to be significant (p=0.002 and p=0.01, respectively;
two-tailed paired t-test). Similar to previous work (Vyazovskiy et al., 2011), we observed oc-
casional large positive LFP half-waves in the 2-6 Hz frequency band that were accompanied by
pauses in the MUA (Fig. 2 c). When plotted in double logarithmic coordinates, the amplitude of
positive half-waves in this frequency band exhibited a distinct bimodality in its density distribu-
tion (Fig. 2 c). Such a bimodality has also been observed in other frequency bands, where it was
taken as indication for the existence of two co-existing different states between which dynam-
ics can switch (Freyer et al., 2011). In our case, the observed bimodality may similarly suggest
two distinct states characterized by different low-frequency power levels. We hypothesized that
large-amplitude LFP events might correspond to a more sleep-like state and thus potentially im-
print shorter timescales. We thus repeated our analysis in select data with or without any such
15
events. Specifically, we defined a threshold for each animal and channel individually, that sep-
arated the two peaks in the LFP amplitude distribution (Fig. 2 c right, magenta line). We then
separately analyzed spike-count autocorrelations in all channels where amplitudes in the 2-6 Hz
frequency band either exceeded this threshold at least once or stayed below it throughout a 4-s
segment. The separation of sleep deprivation data along these two peaks in the LFP distribution
revealed that timescale changes were only apparent in segments that contained high-amplitude
LFP events. Timescales did not change during sleep deprivation in the low-amplitude regime
(ANOVA; Fig. 2 d, e). These observations indicate distinct dynamics with respect to the two
peaks in the LFP distribution. The intermittency of both dynamical states leads to the appar-
ent shortening of intrinsic timescales characterizing spontaneous fluctuations of neuron activity
during sustained wakefulness.
To confirm the causal role of intermittent large-amplitude LFP events for the apparent
timescale decline during extended wake, we repeated our analysis in dataset 2 where such
large-amplitude LFP events had been excluded altogether in the selection of quiet wake data
(as confirmed by the absence of a distinct bimodality in the LFP amplitude distribution; Fig.
2 f, blue). Consequently, autocorrelation decays obtained from quiet wake exhibited no sta-
tistically significant change during sleep deprivation in this dataset (frontal and parietal; SD0
compared to SD4; unpaired t-test; Fig. 2 g). During extended wake, the occurrence of shorter
timescales is thus linked to the presence of intermittent large-amplitude LFP events. Over the
course of NREM sleep, autocorrelation decays became significantly less steep in frontal cortex
(ANOVA, F=3.84, p=0.003; Fig. 2 i). A similar trend was visible in parietal cortex although
it did not reach significance level there. REM sleep, conversely, did not exhibit a significant
change in any region (Fig. 2 h). The differential changes observed over the course of NREM
sleep but not REM sleep thus provide further evidence for the relevance of low frequency large-
amplitude events as the essential mechanism for the apparent timescale change. Low frequency
16
large-amplitude events were present during NREM but not REM sleep (Fig. 2 f, brown vs.
green line), and are known to decrease over the course of NREM sleep (Borbely et al., 1981;
Finelli et al., 2000; Vyazovskiy et al., 2011) which can account for the less steep spike autocor-
relation decays observed.
There exists an intimate relationship between the autocorrelation function governing sponta-
neous fluctuations and the time it takes a signal to recover from small perturbations (Wissel, 1984;
Ives, 1995; Scheffer et al., 2009). From this dynamical systems perspective, a slow autocorre-
lation decay also implies a slow recovery from perturbations or intrinsic fluctuations. We hy-
pothesized that equivalent wake-time dependent changes quantified by autocorrelation decays
should also manifest in recovery rates from intrinsic fluctuations. We first identified sizeable
negative excursions from the mean in each LFP channel (Fig. 3 a). Next, we averaged across
all these LFP segments for each rat and at each time point (dataset 1) to quantify the return to
baseline activity during sleep deprivation and after consecutive recovery sleep. Negative LFP
averages typically coincided with increased spiking activity (Fig. 3 b, c). To quantify the re-
covery rate by which LFPs returned to baseline after a negative excursion, we fit the return
with an exponential function. Recovery rates obtained from these fits increased during sleep
deprivation and reversed to lower values after consecutive sleep (ANOVA, F=3.5, p=0.004; Fig.
3 d, e). Post hoc statistical comparison between the beginning (SD0) and the end of sleep
deprivation (SD6), and between the end of sleep deprivation (SD6) and after recovery sleep
(REC) revealed both changes to be significant (p=0.002 and p=0.01, respectively; two-tailed
paired t-test). We hypothesized that large-amplitude LFP events would again drive the observed
timescale decline. As with spike-count autocorrelation, we thus repeated our analysis for both
the low-amplitude and the high-amplitude regimes separately. In agreement with our obser-
vations from spike-count autocorrelations, timescales changes were only apparent in segments
also containing high-amplitude LFP events, while timescales did not change during sleep de-
17
privation in the low-amplitude regime (ANOVA; Fig. 3 f, g).
Together, results indicated that intermittent periods of large-amplitude LFP can lead to an
apparent decline of long cortical timescales during wake. Our observations also suggested
that these LFP events are characterized by pauses in neuron spiking. To test whether these
intermittent offline periods were sufficient to account for timescale changes, we studied a neu-
ron network model exhibiting long timescales associated with long-range temporal correlations
analogous to experiment. Specifically, the network's average connectivity was set so that net-
work dynamics was located right at the transition between an inactive and an active network
phase (Shew et al., 2009). At this transition state, the network exhibited long timescales associ-
ated with both the autocorrelation decay and the recovery from intrinsic fluctuations. We then
implemented the possibility that neurons go "offline" for a short amount of time with a certain
probability. We observed that this ability to go offline was sufficient to reproduce our exper-
imental findings during wake. In particular, with higher probability for neurons to go offline,
faster declines in spike-count autocorrelation and recovery from intrinsic fluctuations were ob-
served (Fig. 4). These modeling results thus suggest that an increasing tendency for neurons
to go offline by themselves (e.g. during sleep deprivation) or in synchrony (e.g. during NREM
sleep) is sufficient to account for the shortened timescales.
Discussion
The ability to integrate information over time is a pre-requisite for brain function during wake.
Information integration is believed to be supported by long timescales associated with long-
range temporal correlations in neuron spiking activity. We here provide first-time evidence at the
neuronal level that these timescales are abrogated during NREM sleep. In contrast, quiet wake
and REM sleep are characterized by similar, long timescales. Our results provide indication for
the existence of distinct states in terms of timescale dynamics: one, which is characterized by
18
long timescales that dominate during wake and REM sleep, and a second one characterized by
the absence of long timescales predominantly observed in NREM sleep. Our sleep deprivation
results suggest that transitions between these two states can occur rapidly and intermittently
which, on average, can lead to an apparent progressive decline of timescales.
The present work provides a missing link between long cortical timescales (Ogawa and Komatsu, 2010;
Honey et al., 2012; Stephens et al., 2013; Murray et al., 2014; Chaudhuri et al., 2015) to obser-
vations indicating disrupted long-range correlations during NREM sleep (Massimini et al., 2005;
Tagliazucchi et al., 2013). The observed breakdown of long timescales in ongoing spiking ac-
tivity here provides insights that complements these reports based on large-scale signals mea-
sured by EEG and fMRI. From a theory point of view, the timescales quantified by the autocor-
relation of intrinsic fluctuations are intimately linked to the timescales that control the response
to external perturbations (Wissel, 1984; Ives, 1995; Scheffer et al., 2009; Meisel et al., 2015).
The fast autocorrelation decay observed in our data during NREM sleep thus links to observa-
tions of reduced stimulation responses using TMS in the same vigilance state (Massimini et al., 2005).
In detailed analyses of the apparent gradual timescale decline during extended wake, we
identified intermittent transitions between two different states. We found that the state charac-
terized by a fast decaying autocorrelation increasingly dominated the overall dynamics, while
autocorrelation decay rates did not change for the low-amplitude state during sleep depriva-
tion. The two peaks visible in the LFP amplitude distribution thus point to distinct dynamical
states, governed by long timescales in the low amplitude regime, and shorter timescales in
the high amplitude regime. The identification of two different states being at play relied on
the ability to record data at high temporal and spatial resolution in our data. It is therefore
possible that the gradual decline in timescales observed during the transition into NREM sleep
(Tagliazucchi et al., 2013) is similarly the result of two different co-existing states which a more
coarse method such as fMRI may not be able to resolve in the temporal domain. Several sub-
19
cortical structures in the brainstem, hypothalamus and basal forebrain are known to regulate
the maintenance of waking and sleep states through neuro-modulatory action (Jones, 2005). It
is conceivable that these subcortical structures control the transient occurrences of the large-
amplitude LFP epochs observed in some of our data during wake.
Functionally, the shorter timescales during NREM sleep indicate a severely reduced ability
to integrate information. During sleep deprivation, shorter timescales induced by intermittent,
sleep-like, high-amplitude LFP events may be similarly detrimental for cortical networks to pro-
cess information. As such, this decline may provide a perspective on several cognitive capabili-
ties known to decrease during extended wake (Van Dongen et al., 2003; Banks and Dinges, 2007;
Mignot, 2008; Killgore, 2010; Lo et al., 2012). In fact, a two-state dynamics, as observed here,
may help to explain some at times controversial findings with respect to the specifics perfor-
mance impairments. Although it is well-established that performance, for example quantified
in the psychomotor vigilance test (PVT), decreases, on average, as a function of time awake,
a subject may still perform almost normally even after extended periods of sleep deprivation
during individual trials in the PVT (Banks and Dinges, 2007).
It is conceivable that normal
performance could still be achieved at times when dynamics is not compromised by intermit-
tent high-amplitude events, while performance will decrease on average due to the growing
dominance of intermittent epochs with disrupted timescales during sleep deprivation.
Long-range temporal correlations are generic features that arise when a system is in the
vicinity of a critical state (Bak et al., 1987). Mounting evidence from computational and ex-
perimental studies indicates that cortical neural networks operate at some sort of critical state
(Bornholdt and Rohlf, 2000; Beggs and Plenz, 2003; Haldeman and Beggs, 2005; Shew et al., 2009;
Meisel et al., 2012; Markram et al., 2015). The observation of long timescales during wake is
in agreement with this criticality hypothesis (Linkenkaer-Hansen et al., 2001). Conversely, fast
decaying autocorrelation functions such as during NREM sleep and also during sleep depriva-
20
tion may be seen as indication for a dynamical state where critical dynamics is disrupted. In a
previous study based on EEG, we reported fading signatures of critical dynamics during sleep
deprivation (Meisel et al., 2013). Our results here demonstrate an increasing disruption of long
timescales during sleep deprivation at the individual neuron level which complements these
earlier findings. From this perspective, our observations support an intriguing hypothesis for
a function of sleep, to re-organize cortical networks towards critical dynamics with long-range
temporal correlations for optimal functioning during wake.
References
Bak P, Tang C, Wiesenfeld K (1987) Self-organized criticality: An explanation of the 1/f
noise. Phys Rev Lett 59:381 -- 384.
Banks S, Dinges DF (2007) Behavioral and physiological consequences of sleep restriction. J
Clin Sleep Med 3:519 -- 528.
Beggs JM, Plenz D (2003)
Neuronal avalanches in neocortical circuits.
J Neu-
rosci 23:11167 -- 11177.
Borbely AA, Baumann F, Brandeis D, Strauch I, Lehmann D (1981) Sleep deprivation: ef-
fect on sleep stages and EEG power density in man. Electroencephalogr Clin Neurophys-
iol 51:483 -- 495.
Bornholdt S, Rohlf T (2000) Topological evolution of dynamical networks: Global criticality
from local dynamics. Phys Rev Lett 84:6114 -- 6117.
Chaudhuri R, Knoblauch K, Gariel MA, Kennedy H, Wang XJ (2015) A Large-Scale
Circuit Mechanism for Hierarchical Dynamical Processing in the Primate Cortex. Neu-
ron 88:419 -- 431.
21
Finelli LA, Bauman H, Borb´ely AA, Achermann P (2000) Dual electroencephalogram mark-
ers of human sleep homeostasis: correlation between theta activity in waking and slow-wave
activity in sleep. Neuroscience 101:523 -- 529.
Fisher SP, Cui N, McKillop LE, Gemignani J, Bannerman DM, Oliver PL, Peirson SN, Vya-
zovskiy VV (2016) Stereotypic wheel running decreases cortical activity in mice. Nat Com-
mun 7:13138.
Freyer F, Roberts JA, Becker R, Robinson PA, Ritter P, Breakspear M (2011) Biophysical
mechanisms of multistability in resting-state cortical rhythms. J. Neurosci. 31:6353 -- 6361.
Friston K, Breakspear M, Deco G (2012) Perception and self-organized instability. Front
Comput Neurosci 6:44.
Haldeman C, Beggs J (2005) Critical branching captures activity in living neural networks and
maximizes the number of metastable states. Phys Rev Lett 94:058101.
Honey CJ, Thesen T, Donner TH, Silbert LJ, Carlson CE, Devinsky O, Doyle WK, Rubin N,
Heeger DJ, Hasson U (2012) Slow cortical dynamics and the accumulation of information
over long timescales. Neuron 76:423 -- 434.
Ives AR (1995) Measuring resilience in stochastic systems. Ecol Monogr 65:217233.
Jones BE (2005) From waking to sleeping: neuronal and chemical substrates. Trends Phar-
macol. Sci. 26:578 -- 586.
Kiebel SJ, Daunizeau J, Friston KJ (2008) A hierarchy of time-scales and the brain. PLoS
Comput. Biol. 4:e1000209.
Killgore WD (2010) Effects of sleep deprivation on cognition. Prog. Brain Res. 185:105 -- 129.
22
Kringelbach ML, McIntosh AR, Ritter P, Jirsa VK, Deco G (2015) The Rediscovery of Slow-
ness: Exploring the Timing of Cognition. Trends Cogn. Sci. (Regul. Ed.) 19:616 -- 628.
Linkenkaer-Hansen K, Nikouline VV, Palva JM, Ilmoniemi RJ (2001) Long-range temporal
correlations and scaling behavior in human brain oscillations. J Neurosci 21:13701377.
Lo JC, Groeger JA, Santhi N, Arbon EL, Lazar AS, Hasan S, von Schantz M, Archer SN, Dijk
DJ (2012) Effects of partial and acute total sleep deprivation on performance across cognitive
domains, individuals and circadian phase. PLoS ONE 7:e45987.
Markram H, Muller E, Ramaswamy S, Reimann MW, Abdellah M, Sanchez CA, Ailamaki
A, Alonso-Nanclares L, Antille N, Arsever S, Kahou GA, Berger TK, Bilgili A, Buncic N,
Chalimourda A, Chindemi G, Courcol JD, Delalondre F, Delattre V, Druckmann S, Dumusc R,
Dynes J, Eilemann S, Gal E, Gevaert ME, Ghobril JP, Gidon A, Graham JW, Gupta A, Haenel
V, Hay E, Heinis T, Hernando JB, Hines M, Kanari L, Keller D, Kenyon J, Khazen G, Kim Y,
King JG, Kisvarday Z, Kumbhar P, Lasserre S, Le Be JV, Magalhaes BR, Merchan-Perez A,
Meystre J, Morrice BR, Muller J, Munoz-Cespedes A, Muralidhar S, Muthurasa K, Nachbaur
D, Newton TH, Nolte M, Ovcharenko A, Palacios J, Pastor L, Perin R, Ranjan R, Riachi I,
Rodriguez JR, Riquelme JL, Rossert C, Sfyrakis K, Shi Y, Shillcock JC, Silberberg G, Silva
R, Tauheed F, Telefont M, Toledo-Rodriguez M, Trankler T, Van Geit W, Diaz JV, Walker R,
Wang Y, Zaninetta SM, DeFelipe J, Hill SL, Segev I, Schurmann F (2015) Reconstruction and
Simulation of Neocortical Microcircuitry. Cell 163:456 -- 492.
Massimini M, Ferrarelli F, Huber R, Esser SK, Singh H, Tononi G (2005) Breakdown of
cortical effective connectivity during sleep. Science 309:2228 -- 2232.
23
McGinley MJ, Vinck M, Reimer J, Batista-Brito R, Zagha E, Cadwell CR, Tolias AS, Cardin
JA, McCormick DA (2015) Waking State: Rapid Variations Modulate Neural and Behavioral
Responses. Neuron 87:1143 -- 1161.
Meisel C, Klaus A, Kuehn C, Plenz D (2015) Critical slowing down governs the transition to
neuron spiking. PLoS Comput. Biol. 11:e1004097.
Meisel C, Olbrich E, Shriki O, Achermann P (2013) Fading signatures of critical brain dy-
namics during sustained wakefulness in humans. J. Neurosci. 33:17363 -- 17372.
Meisel C, Storch A, Hallmeyer-Elgner S, Bullmore E, Gross T (2012) Failure of adaptive
self-organized criticality during epileptic seizure attacks. PLoS Comput Biol 8:e1002312.
Mignot E (2008) Why we sleep: the temporal organization of recovery. PLoS Biol. 6:e106.
Murray JD, Bernacchia A, Freedman DJ, Romo R, Wallis JD, Cai X, Padoa-Schioppa C,
Pasternak T, Seo H, Lee D, Wang XJ (2014) A hierarchy of intrinsic timescales across primate
cortex. Nat. Neurosci. 17:1661 -- 1663.
Nauhaus I, Busse L, Carandini M, Ringach DL (2009) Stimulus contrast modulates functional
connectivity in visual cortex. Nat. Neurosci. 12:70 -- 76.
Nauhaus I, Busse L, Ringach DL, Carandini M (2012) Robustness of traveling waves in
ongoing activity of visual cortex. J. Neurosci. 32:3088 -- 3094.
Ogawa T, Komatsu H (2010) Differential temporal storage capacity in the baseline activity of
neurons in macaque frontal eye field and area V4. J. Neurophysiol. 103:2433 -- 2445.
Poulet JF, Petersen CC (2008) Internal brain state regulates membrane potential synchrony in
barrel cortex of behaving mice. Nature 454:881 -- 885.
24
Ray S, Hsiao SS, Crone NE, Franaszczuk PJ, Niebur E (2008) Effect of stimulus intensity
on the spike-local field potential relationship in the secondary somatosensory cortex. J. Neu-
rosci. 28:7334 -- 7343.
Ray S, Maunsell JH (2011) Different origins of gamma rhythm and high-gamma activity in
macaque visual cortex. PLoS Biol. 9:e1000610.
Scheffer M, Bascompte J, Brock WA, Brovkin V, Carpenter SR, Dakos V, Held H, van Nes EH,
Rietkerk M, Sugihara G (2009) Early-warning signals for critical transitions. Nature 461:5359.
Shew WL, Yang H, Petermann T, Roy R, Plenz D (2009) Neuronal avalanches imply maximum
dynamic range in cortical networks at criticality. J Neurosci 9:15595 -- 15600.
Shoham S, Fellows MR, Normann RA (2003) Robust, automatic spike sorting using mixtures
of multivariate t-distributions. J. Neurosci. Methods 127:111 -- 122.
Stephens GJ, Honey CJ, Hasson U (2013) A place for time: the spatiotemporal structure of
neural dynamics during natural audition. J. Neurophysiol. 110:2019 -- 2026.
Strijkstra AM, Beersma DGM, Drayer B, Halbesma N, Daan S (2003) Subjective sleepiness
correlates negatively with global alpha (8-12 Hz) and positively with frontal theta (4-8 Hz)
frequencies in the human resting awake electroencenphalogram. Neurosci Lett 340:17 -- 20.
Tagliazucchi E, von Wegner F, Morzelewski A, Brodbeck V, Jahnke K, Laufs H (2013) Break-
down of long-range temporal dependence in default mode and attention networks during deep
sleep. Proc. Natl. Acad. Sci. U.S.A. 110:15419 -- 15424.
Tononi G (2008) Consciousness as integrated information: a provisional manifesto. Biol.
Bull. 215:216 -- 242.
25
Van Dongen HP, Maislin G, Mullington JM, Dinges DF, Van Dongen HP, Mullington JM,
Dinges DF (2003) The cumulative cost of additional wakefulness: dose-response effects on
neurobehavioral functions and sleep physiology from chronic sleep restriction and total sleep
deprivation. Sleep 26:117 -- 126.
Vyazovskiy VV, Olcese U, Hanlon EC, Nir Y, Cirelli C, Tononi G (2011) Local sleep in awake
rats. Nature 472:443 -- 447.
Wissel C (1984) A universal law of the characteristic return time near thresholds. Oecolo-
gia 65:101 -- 107.
26
Acknowledgements
This study was supported by the Intramural Research Program of the NIMH. This study utilized
the high-performance computational capabilities of the Biowulf Linux cluster at the National
Institutes of Health, Bethesda, Md.
27
Figure 1: Breakdown of long-range temporal spiking correlations during NREM sleep. a,
Spike-count autocorrelation (AC) decays rapidly in NREM sleep while other vigilance states
have similar slow decays. Mean AC over animals (n=13; s.e.m.; single-unit activity; frontal
cortex; quiet wake, Q, REM sleep, R, NREM sleep N). b, Summary of decay rates. Decay
rates obtained from exponential fits over the whole autocorrelation function. c, Changes in
autocorrelation decays are independent of differences in spiking rate between vigilance states.
d -- f, Breakdown of long-range temporal spiking correlation in NREM sleep in parietal cortex.
Equivalent analysis as in a -- c.
Figure 2: Two-state dynamics underlies the decline in long-range temporal correlations during
sleep deprivation. a, Decay in spike-count autocorrelation (AC) accelerates as a function of time
awake and recovers after sleep (multi-unit activity; quiet wake; 6 hours of sleep deprivation
SD0 to SD6 followed by 5 -- 6 hr recovery sleep, REC). Mean AC over all multi-units (n=26;
1 rat; s.e.m.). Solid lines: exponential fit. Left: linear plot. Right: double-logarithmic plot.
SD3 line slightly shifted upwards for visibility. b, Summary of decline in decay rates and
recovery for all n=6 animals (s.e.m). c, Identification of two-state dynamics underlying decay
in long-range temporal correlations with sleep deprivation. Large-amplitude LFP events are
intermittently observed and typically coincide with pauses in multi-unit activity (top; offline
periods marked as gray areas in zoomed inset). These LFP events typically present as one
or more positive half-waves predominantly in the frequency range 2-6 Hz (bottom, wavelet
spectrogram and positive LFP trace bandpass filtered between 2-6 Hz). Right: Bimodality
in the histogram of positive 2-6 Hz waves. The bimodality was used to separate the large-
amplitude LFP containing putative offline periods from other activity for each rat individually
(magenta line). d, e, Decline in long-range temporal correlations is restricted to data segments
containing large-amplitude LFP events. f, Histogram of positive LFP 2-6 Hz waves sorted by
vigilance states (dataset 2; top row frontal, bottom row parietal). g, Autocorrelation decays
remains unchanged (right) in data without large-amplitude LFP events during sleep deprivation
(quiet wake; 4 hours of sleep deprivation SD0, SD4). h, Autocorrelation decay rates during
REM sleep remain unchanged (dataset 2; 6 hour recovery sleep; R1-R6).
i, Autocorrelation
decay rates in NREM sleep decrease over the 6 hour recovery sleep (dataset 2; N1-N6).
28
Figure 3: Two-state dynamics underlies the accelerated recovery from large-activity events
during sleep deprivation. a, Identification of large-activity events from LFP. Negative LFP
(nLFP; ¡-2 standard deviations) deflections were averaged over each time point during the sleep
deprivation experiment (SD0 to SD6, REC) and for each rat. b, Mean nLFP over all events and
channels (1 rat; s.e.m.). c, Corresponding nLFP-triggered spike histogram. The histogram is
normalized to mean activity from -150 to -100 ms. d, Recovery from intrinsic nLFP excursions
accelerates as a function of time awake and recovers after sleep. Mean nLFP traces from the
beginning and end of sleep deprivation from one rat. e, Summary of nLFP recovery rates for all
n=7 animals (s.e.m.). f, g, More rapid recovery from large-activity events is restricted to data
segments containing large-amplitude LFP events.
Figure 4: Neuron network model with the ability of neurons to go offline captures the differ-
ential decline of long-range temporal correlations. The network was instantiated at a connec-
tivity K=1 and with different probablities pOFFLINE for neurons to go offline for a brief amount
of time. a, Raster plot without the presence of offline periods. b, Raster plot with offline
periods(pOFFLINE = 0.1, grey shaded areas). c, Autocorrelation functions for spiking activity
in a network without offline periods (pOFFLINE = 0, blue) and in a network with offline pe-
riods (pOFFLINE = 0.3, red) in neuron activity. d, Autocorrelation decay rates increase with
higher probability for offline periods. e, Recovery from intrinsic fluctuations (pOFFLINE = 0,
blue; pOFFLINE = 0.3, red). f, Recovery rates from intrinsic fluctuations increase with higher
probability for offline periods.
29
|
1411.7635 | 3 | 1411 | 2015-10-23T13:13:20 | A statistical model for in vivo neuronal dynamics | [
"q-bio.NC"
] | Single neuron models have a long tradition in computational neuroscience. Detailed biophysical models such as the Hodgkin-Huxley model as well as simplified neuron models such as the class of integrate-and-fire models relate the input current to the membrane potential of the neuron. Those types of models have been extensively fitted to in vitro data where the input current is controlled. Those models are however of little use when it comes to characterize intracellular in vivo recordings since the input to the neuron is not known. Here we propose a novel single neuron model that characterizes the statistical properties of in vivo recordings. More specifically, we propose a stochastic process where the subthreshold membrane potential follows a Gaussian process and the spike emission intensity depends nonlinearly on the membrane potential as well as the spiking history. We first show that the model has a rich dynamical repertoire since it can capture arbitrary subthreshold autocovariance functions, firing-rate adaptations as well as arbitrary shapes of the action potential. We then show that this model can be efficiently fitted to data without overfitting. Finally, we show that this model can be used to characterize and therefore precisely compare various intracellular in vivo recordings from different animals and experimental conditions. | q-bio.NC | q-bio |
1
A statistical model for in vivo neuronal dynamics
Simone Carlo Surace1,2,∗, Jean-Pascal Pfister2
1 Department of Physiology, University of Bern, Bern, Switzerland
2 Institute of Neuroinformatics, University of Zurich and ETH Zurich, Zurich, Switzerland
∗ E-mail: [email protected]
Abstract
Single neuron models have a long tradition in computational neuroscience. Detailed biophysical models
such as the Hodgkin-Huxley model as well as simplified neuron models such as the class of integrate-and-
fire models relate the input current to the membrane potential of the neuron. Those types of models have
been extensively fitted to in vitro data where the input current is controlled. Those models are however
of little use when it comes to characterize intracellular in vivo recordings since the input to the neuron is
not known. Here we propose a novel single neuron model that characterizes the statistical properties of in
vivo recordings. More specifically, we propose a stochastic process where the subthreshold membrane po-
tential follows a Gaussian process and the spike emission intensity depends nonlinearly on the membrane
potential as well as the spiking history. We first show that the model has a rich dynamical repertoire
since it can capture arbitrary subthreshold autocovariance functions, firing-rate adaptations as well as
arbitrary shapes of the action potential. We then show that this model can be efficiently fitted to data
without overfitting. Finally, we show that this model can be used to characterize and therefore precisely
compare various intracellular in vivo recordings from different animals and experimental conditions.
1
Introduction
During the last decade, there has been an increasing number of studies providing intracellular in vivo
recordings. From the first intracellular recordings performed in awake cats [1, 2] to more recent recording
in cats [3], monkeys [4], mice [5], and even in freely behaving rats [6], it has been shown that the
membrane potential displays large fluctuations and is very rarely at the resting potential. Some recent
findings in the cat visual cortex have also suggested that the statistical properties of spontaneous activity
is comparable to the neuronal dynamics when the animal is exposed to natural images [7]. Similar results
have been found in extracellular recordings in the ferret [8]. Those data are typically characterized by
simple quantifications such as the firing rate or the mean subthreshold membrane potential [5], but a more
comprehensive quantification is often missing. So the increasing amount of intracellular data of awake
animals as well as the need to compare in a rigorous way the data under various recording conditions call
for a model of spontaneous activity in single neurons.
Single neuron models have been studied for more than a century. Simple models such as the integrate-
and-fire model [9, 10] and its more recent nonlinear versions [11, 12, 13] describe the relationship between
the input current and the membrane potential in terms of a small number of parameters and are therefore
convenient for analytical treatment, but do not provide much insight about the underlying biophysical
processes. On the other end of the spectrum, biophysical models such as the Hodgkin-Huxley model
[14, 15] relate the input current to the membrane potential through a detailed description of the various
transmembrane ion channels, but estimating the model parameters remains challenging [16, 17]. Despite
the success of those types of models, none of them can be directly applied to intracellular in vivo recordings
for the simple reason that the input current is not known.
Another reason why a precise model of spontaneous activity is needed is that there are several theories
that have been proposed that critically depend on statistical properties of spontaneous activity. For ex-
2
ample Berkes et al. validate their Bayesian treatment of the visual system by comparing the spontaneous
activity and the averaged evoked activity [8]. Another Bayesian theory proposed the idea that short-term
plasticity acts as a Bayesian estimator of the presynaptic membrane potential [18]. To validate this the-
ory, it is also necessary to characterize spontaneous activity with a statistical model that describes the
subthreshold as well as the spiking dynamics.
The last motivation for a model that describes both the subthreshold and the suprathreshold dynamics
is the possibility to separate those two dynamics in a principled way. Indeed, it is interesting to know
from the recordings what reflects the input dynamics and what aspect comes from the neuron itself (or
rather what is associated with the spiking dynamics). Of course a simple voltage threshold can separate
the sub- and a suprathreshold dynamics, but the value of the threshold is somewhat arbitrary and could
lead to undesirable artifacts. Therefore a computationally sound model that decides itself what belongs
to the subthreshold and what belongs to the suprathreshold dynamics is highly desirable.
Here, we propose a single neuron model that describes intracellular in vivo recordings as a sum of a
sub- and suprathreshold dynamics. This model is flexible enough in order to capture the large diversity
of neuronal dynamics while remaining tractable, i.e. the model can be fitted to data in a reasonable time.
More precisely, we propose a stochastic process where the subthreshold membrane potential follows a
Gaussian process and the firing intensity is expressed as a non-linear function of the membrane potential.
Since we further include refractoriness and adaptation mechanisms, our model, which we call the Adaptive
Gaussian Point Emission process (AGAPE), can be seen as an extension of both the log Gaussian Cox
process [19] and the generalized linear model [20, 21, 22].
2 Results
Here we present a statistical model of the subthreshold membrane potential and firing pattern of a single
neuron in vivo. See Fig. 1A for such an in vivo membrane potential recording. We first provide a formal
definition of the model and then show a range of different results. 1) The model is flexible and supports
arbitrary autocorrelation structures and adaptation kernels. Therefore, the range of possible statistical
features is very large. 2) The model is efficiently fittable and the learning procedure is validated on
synthetic data. 3) The model can be fitted to in vivo datasets. 4) All the features included in the model
are required to provide a good description of in vivo data.
2.1 Definition of the AGAPE model
The AGAPE model is a single neuron model where the input to the neuron is not known, which is
typically the case under in vivo conditions. The acronym AGAPE stands for Adaptive GAussian Point
Emission process since the subthreshold membrane potential follows a Gaussian process and since the
spike emission process is adaptive.
membrane voltage trace usom(t) and the spike train s(t) =Pns
More formally, the AGAPE process defines a probability distribution p(usom, s) over the somatic
i=1 δ(t − ti) where ti, i = 1, ..., ns are the
nominal spike times (decision times), which occur a certain fixed time period δ > 0 before the peak
of the action potential. From this probability distribution (or generative model) it is possible to draw
samples that look like intracellular in vivo activity (for practical purposes, the samples will be compared
to the preprocessed recordings, see explanations below). The AGAPE model assumes that the somatic
membrane voltage as a function of time usom(t) is given by (see Fig. 1)
usom(t) = ur + u(t) + uspike(t),
(1)
where ur is a constant (the reference potential), u(t) describes the subthreshold membrane potential as
a stochastic function drawn from a stationary Gaussian process (GP) [23]
u ∼ GP [0, k(t − t′)]
(2)
A
V
m
0
1
100 ms
B
3
u
usom
s
Figure 1. (A) A sample in vivo membrane potential trace from an intracellular recording of a neuron
in HVC of a Zebra Finch. (B) The generative AGAPE model can generate a trace of subthreshold
membrane potential u (top trace). Based on this potential, a spike train s is generated (middle, dashed
vertical lines). Finally, a stereotypic spike-related kernel is convolved with the spike train and added to
u, giving rise to usom (bottom, thick line). This quantity is the synthetic analog of the recorded,
preprocessed in vivo membrane potential.
with covariance function k(t − t′) (which can be parametrized by a weighted sum of exponential decays
with weights σ2
i and inverse time constants θi, see Materials and Methods). For small values of δ (e.g.
1-3 ms), u(t) can be seen as the net contribution from the unobserved synaptic inputs and uspike(t) is
the spike-related contribution (see Fig. 1B) which consists of the causal convolution of a stereotypical
spike-related kernel α with the spike train s(t), i.e.
uspike(t) =Z ∞
0
α(t′)s(t − t′)dt′.
(3)
where α can be parametrized by a weighted sum of basis functions with weights ai, see Materials and
Methods. Here, we have made a separation of subthreshold and suprathreshold layers, in that whatever
is stereotypic and triggered by the point-like spikes s(t) is attributed to uspike(t), and the rest belongs to
the fluctuating signal u(t). This separation need not correspond to the biophysical distinction between
synaptic inputs and active processes of the recorded cell (i.e. the positive feedback loop of the spiking
Indeed, especially for a choice of large δ (e.g. ∼ 20 ms), uspike(t) also contains large
mechanism).
depolarizations due to strong synaptic input which cannot be explained by the GP signal u(t).
Note that this model could easily be extended by including an additional term in Eq. (1) which
depends on an external input, e.g. a linear filter of the input (see also Discussion). However, since this
input current was not accessible in our recordings, its contribution was assumed to be part of u(t) or
uspike(t).
Now we proceed to the coupling between the subthreshold potential u(t) and the spiking output, as well
as adaptive effects associated with spike generation. These effects are summarized by an instantaneous
firing rate r(t) -- as in the generalized linear model (GLM) [20, 21, 22] or escape-rate models [24] -- which
is computed from the value of the subthreshold membrane potential at time t, u(t), and the spike history
as
where β ≥ 0 is the coupling strength between u and the spikes, and A(t) is the adaptation variable which is
the convolution of an adaptation kernel η (which can be parametrized by a weighted sum of basis functions
with weights wi, see Materials and Methods) with the past spike train. Also note that we choose not
r(t) = g [A(t) + βu(t)] , A(t) =Z ∞
0
η(t′)s(t − t′)dt′,
(4)
4
to model adaptation currents explicitly, since they would simultaneously impact the membrane potential
and the firing probability (see Discussion). The function g is called gain function, and here we use an
exponential one, i.e. g [A(t) + βu(t)] = elog r0+A(t)+βu(t). Other functional forms such as rectified linear
or sigmoidal could be used depending on the structure of the data. However, this choice has important
implications on the efficiency of learning of the model parameters [25]. We define the probability density
for s on an interval [0, T ] conditioned on u as
p(su) = exp −Z T
0
r(t) dt! nsYi=1
r(ti),
s(t) =
nsXi=1
δ(t − ti),
0 ≤ t1 < ... < tns ≤ T, ns ∈ N0.
(5)
The parameter β connects the subthreshold membrane potential u to the rate fluctuations. The magnitude
of the rate fluctuations depend on the variance σ2 of u, and therefore we use βσ as a measure of the
effective coupling strength. When β > 0 the quantity θ(t) = −A(t)/β can be regarded as a soft threshold
variable which is modulated after a spike, and u(t) − θ(t) is the effective membrane potential relevant
for the spike generation. This spiking process is a point process which generalizes the log Gaussian Cox
process. Indeed, when A = 0, Eq. (5) describes an inhomogeneous Poisson process with rate g [βu(t)].
Practically, if we want to draw a sample from the AGAPE process, we first draw a sample u from
the Gaussian Process (see S1 Text for how to do this efficiently), then for each time t we draw spikes s(t)
with probability density r(t) and update the adaptation variable A(t). Finally, the somatic membrane
potential is calculated using Eq. 1.
It is important to emphasize at this point that while the model may be directly fitted to the raw
membrane potential uraw as recorded by an intracellular electrode, we median filter the data in order to
avoid artifacts and downsample for computational efficiency (see 'Materials and Methods'). In this study
the model is always fitted to the preprocessed recordings u∗som and this is reflected e.g. in the shape of
α which is most strongly affected by the preprocessing. It is important to keep in mind this point while
interpreting the results of model fitting. The details of the preprocessing steps which were used are given
in the 'Materials and Methods' section.
2.2 The model has a rich dynamical repertoire
The AGAPE provides a flexible framework which can be adjusted in complexity to model a wide range
of dynamics. While for the datasets presented here a covariance function was used which consists of
a sum of Ornstein-Uhlenbeck (OU) kernels, the Gaussian Process (GP) allows for arbitrary covariance
functions to be used. This includes simple exponential decay (as produced by a leaky integrate-and-fire
neuron driven by white noise current), but it can produce also more interesting covariance functions such
as power-law covariances, which are reported in [26, 7], or subthreshold oscillations, as reported in [27].
The model is also able to reproduce a wide range of firing statistics. A common measure of firing
irregularity is the coefficient of variation (CV , i.e. the ratio of standard deviation and mean) of the inter-
spike interval distribution. In the absence of adaptation, the AGAPE is a Cox process and therefore has
a coefficient of variation CV ≥ 1 [28]. The precise value of the CV is a function of the coupling strength
(βσ) as well as the autocorrelation of the GP. To illustrate this, we sampled synthetic data from a simple
version of the AGAPE where the subthreshold potential u is an OU process with time-constant τ . As
shown in Fig. 2A, the CV is an increasing function of the membrane time-constant τ , baseline firing rate
r0, and dimensionless coupling parameter between membrane potential and firing rate βσ. Moreover, the
range of the CV extends from 1 to ≈ 8 within a range of βσ ∈ [0, 2] and r0τ ∈ [2−2, 28]. In the presence
of adaptation, firing statistics are markedly different and can produce values of CV < 1 [24, 29]. To
illustrate this point, we considered an exponential adaptation kernel, i.e. η(t) = −η0e−t/τr . While the
CV increases as a function of βσ and r0τ as before, the range of values of the CV now also covers the
interval (0, 1) which is not accessible by the Cox process but which is observed in many neurons across
the brain [30]. In order to study the influence of the parameters of the adaptation mechanism, we fix
5
βσ = r0τ = 1 and plot the CV as a function of r0τr and η0 (see Fig. 2B). Within the parameter region
explored in Fig. 2B, the CV spans values from 0.1 up to 1.6.
2.3 The model can be learned efficiently
The parameters of the AGAPE model are learned through a maximum likelihood approach. More pre-
cisely, we fit the model to an in vivo sample (highlighted by a '∗') of preprocessed somatic membrane
potential u∗som and spike train s∗,δ by maximizing the log likelihood applied to the joint data set (u∗som, s∗,δ)
over the parameter space of the model (i.e. ur, log r0, β, the coefficients of the kernels k, η, and α, and
the delay parameter δ). The empirical spike train s∗,δ depends on the parameter δ because the formal
spike times ti are assigned to be a time period δ before the recorded peak of the action potential. The
joint probability of the data can be expressed as a product
p(u∗som, s∗,δ) =Z p(u)p(s∗,δu)p(u∗somu, s∗,δ)Du
=Z p(u)p(s∗,δu)δ(u∗som − u − ur − uspike)Du
= p(u = u∗som − ur − uspike)p(s∗,δu = u∗som − ur − uspike)
≡ ps∗,δ (u∗som)p(s∗,δu∗som).
(6)
The subscript s∗,δ of the first factor denotes the explicit dependence on the spike train. The individual
terms on the r.h.s. will be given below. The function we are optimizing is the logarithm of the above
joint probability which we can write as
L(ur, k, α, log r0, β, η, δ) = log ps∗,δ (u∗som; ur, k, α) + log p(s∗,δu∗som; ur, α, log r0, β, η).
(7)
It should be noted that the presence of the spike-related kernel α in both terms produces a trade-off
situation: removing the spike-related trajectory improves the Gaussianity of the membrane potential
u (and therefore boosts the first term) at the cost of the of the second term by removing the short
upward fluctuation that leads to the spike. This trade-off situation makes maximum likelihood parameter
estimation a non-concave optimization problem. Moreover, the evaluation of the GP likelihood of n
samples, where n = O(105), comes at a high computational cost. Two important techniques make the
parameter learning both tractable and fast: the first is the use of the circulant approximation of the GP
covariance matrix which makes the evaluation of the likelihood function fast. The second is the use of an
alternating fitting algorithm which (under an appropriate parametrization, see 'Materials and Methods')
replaces the non-concave optimization in the full parameter space with two concave optimizations and a
non-concave one in suitable parameter subspaces. Those two techniques are further described in the next
section.
2.3.1 Efficient likelihood computation
The log-likelihood function is evaluated in its discrete-time form with n time points separated by a time-
step ∆t. The GP variable u (which leads to usom through Eq. (1)) is multivariate Gaussian distributed
with a covariance matrix Kij = k(ti − tj), where ti = i∆t. The matrix K is symmetric and, by virtue of
stationarity, Toeplitz. Evaluation of the GP likelihood requires inversion of K, which is computationally
expensive (the time required to invert a matrix typically scales with n3). For this reason we approximate
this Toeplitz matrix by the circulant matrix C which minimizes the Kullback-Leibler divergence (see
[31, 32, 33] and S1 Text5)
C = argmin
D circulant
DKL [N (m, K)N (m, D)]
(8)
6
E
α(t)
V
m
3
0
4
ms
10
t [ms]
0
5
10
15
20
δ [ms]
F
ground truth
synth. data
η(t)
ML fit
0
t [ms]
1
20
ms
C
-0.63
n
b
i
r
e
p
d
o
o
h
i
l
e
k
i
l
g
o
l
-0.65
-0.67
-0.69
D
20
10
2
1
]
2
V
m
[
)
t
(
k
1
10
100
1000
t [ms]
2
A
σ
β
1
0
1
100
10
r0τ
B
10
0
η
−
8
6
4
2
0
1
10
r0τr
100
8
7
6
5
4
3
2
1
V
C
1.6
1.4
1.2
1
.8
.6
.4
.2
0
V
C
Figure 2. The model has a rich dynamical repertoire (A,B) and can be correctly fitted to synthetic
data (C-F). (A,B) The coefficient of variation (CV ) of the inter-spike interval distribution is computed
for parameter values shown as black dots and then linearly interpolated. (A) The CV of a simple
version of the AGAPE (k(t) = σ2e−t/τ , α = η = 0) as a function of the model parameters (membrane
time-constant τ , baseline firing rate r0 and coupling strength βσ). (B) CV of the AGAPE model with
an exponentially adaptive process with fixed membrane time-constant, firing rate and coupling
(βσ = r0τ = 1) as a function of the parameters describing adaptation, namely adaptation strength η0
and time-constant τr. (C,D,E,F) Synthetic data is sampled from the AGAPE model with GP (D),
spike-related (E), and adaptation (F) kernels as depicted in black, and δ = 4 ms, r0 = 4.15 Hz,
β = 0.374 mV−1. Then the AGAPE is fitted to the synthetic data by maximum likelihood (ML). (C)
The maximum log likelihood per bin as a function of the parameter δ has its maximum at the ground
truth value δ = 4 ms. (D,E,F) The ML estimates (red) of the GP, spike-related and adaptation kernels
lie within two standard deviations (red shaded regions, estimated by means of the observed Fisher
information) from the ground truth.
7
between the two multivariate Gaussian distributions with the same mean but different covariance matrices.
This optimization problem can be solved by calculating the derivative of DKL [N (m, K)N (m, D)] with
respect to D and using the diagonalization of D by a Fourier transform matrix [33]. After a bit of
algebra (see S1 Text5), denoting ki = K1i and kn+1 ≡ 0, the optimal circulant matrix can be written as
Cij = c(i−j mod n)+1, where i, j = 1, ..., n and
ci =
1
n
[(n − i + 1)ki + (i − 1)kn−i+2] .
(9)
The replacement of K by C is equivalent to having periodic boundary conditions on u, which has a small
effect under the assumption that the time interval spanned by the data is much longer than the largest
temporal autocorrelation length of k. So the first term on the r.h.s. of Eq. (6) is a multivariate Gaussian
density N (0, C). The determinant of the covariance matrix C is the product of eigenvalues, which for a
circulant matrix are conveniently given by the entries of c, the discrete Fourier transform of c (see the S1
Text5 for our conventions regarding discrete Fourier transforms). Also the scalar product uT C−1u can
be written in terms of c. Together, the first term on the r.h.s. of Eq. (6) takes the simple form
log ps∗,δ (u∗som) = −
1
2
nXi=1 log(2πci) +
ui2
ci ! ,
1
n
(10)
where ui are the components of the discrete Fourier transform of u∗. The Gaussian component of the
membrane potential u is implicitly given by the discretized somatic voltage modified by a discrete-time
version of the spike-related kernel convolution,
u∗i = u∗som,i − ur −
i−1Xj=1
αjs∗,δ
i−j,
(11)
i
where s∗,δ
is the binned spike train (see below), αi is a discretized version of the spike-related kernel. The
time required to compute log ps(u∗som) is determined by the complexity of the Fourier transform, which is
of the order of n log n. This dramatic reduction in complexity (compared to n3) allows a fast evaluation
of the log-likelihood.
The spiking distribution p(s∗,δu∗som) is approximated by a Poisson distribution with constant rate
counts the number of spikes that occur in that bin, and the
within one time bin. For each bin, s∗,δ
conditional likelihood of the spikes therefore reads
i
log p(s∗,δu∗som) =
nXi=1ns∗,δ
i
log [ri∆t] − ri∆t − loghs∗,δ
i
!io ,
(12)
where ri = g[βu∗i +Pi−1
i−j] and u∗i as defined in Eq. (11). If s∗,δ
can be accomplished given small enough bins), the last term log s∗,δ
j=1 ηjs∗,δ
contains only zeros and ones (which
! vanishes.
i
i
2.3.2 Efficient parameter estimation
Except for the parameter δ, which takes discrete values of multiples of the discretization step ∆t, it is
possible to analytically calculate the first and second partial derivatives of the likelihood function defined
in Eq. (6) with respect to the model parameters (ur, k, α, log r0, β, η) (see S1 Text5) to facilitate the
use of gradient ascent, Newton, and pseudo-Newton optimization algorithms. A desirable feature of an
optimization problem is concavity of the objective function (in our case, the log-likelihood function).
Even though the problem of finding optimal parameters for the AGAPE process is not concave, the
optimization can be done in three alternating subspaces (see Fig. 3). The full set of parameters Θ is
8
divided into three parts: θGP for the GP parameters (ur, parameters of k), θspike kernel for the spike-related
kernel parameters, and θspiking for the parameters controlling spike emission (log r0, β and parameters of
η). The optimization then proceeds according to the following cycle: (1) the GP parameters are learned,
(2) the spike-related kernel parameters are learned, and lastly (3) the spiking parameters are learned. In
each step the remaining parameters are held fixed. The cycle is repeated until the parameters reach a
region where the log likelihood is locally concave in the full parameter space, after which the optimization
can be run in the full parameter space until it converges. Joint concavity of the log likelihood holds if
all the eigenvalues of the Hessian matrix are strictly negative. As shown in [25], step (3) is concave for a
certain class of gain functions g, including the exponential function, and linear parametrizations of the
adaptation kernel. The same holds for the spiking term of the log-likelihood in step (2). The voltage
term of the log likelihood of step (2) is concave by numerical inspection in the cases we considered. To
summarize, steps (2) and (3) are concave and Newton's method can be used in these steps as well as for
the final concave optimization in the full space. Step (1) is non-concave and therefore a simple gradient
ascent algorithm is used.
The optimization over (ur, k, α, log r0, β, η) is repeated for every δ = 0, ∆t, 2∆t, ..., δmax in order to
select the one δ that maximizes the log-likelihood L(ur, k, α, log r0, β, η, δ). The value of δmax is chosen
such that it is less than the least upper bound of the support of the basis of the spike-related kernel α.
Since the parameters ur, k, α, log r0, β, η are expected to change only a little when going from one δ to
the next, δ + ∆t, learned parameters for δ can be used as initial guesses for nearby δ + ∆t or δ − ∆t. We
thus get two different initializations, which we can exploit by starting e.g. with δ = 0, ascending through
the sequence of candidate δ's up to the maximum δ, and descending back to zero.
non-concave
concave
Optimize over
θGP = (ur, k)
Optimize over
θspike shape = (α)
concave
Optimize over
θspiking =
(log r0, β, η)
neg.
Check concavity
pos.
Optimize over
Θ =(ur, k, α,
log r0, β, η)
Figure 3. This schematic shows the optimization scheme that is used to learn the parameters of the
AGAPE model when it is fitted to the data (for a given δ). As long as the current parameter estimate
sits in a non-concave region of the likelihood function, the top cycle optimizes over different subspaces
of the parameter space. If and when a concave point is reached, the optimization proceeds in the full
parameter space. This whole scheme is repeated for each value of δ in order to find the optimal one.
2.4 Validation with synthetic data
Despite this improvement in speed and tractability, the optimization is still riddled with multiple local
minima which require the use of multiple random initializations. In order to demonstrate the validity of
9
the fitting method, synthetic data of length 270.112 seconds (n = 270112, the same as in vivo dataset
D1, see below) was generated with known parameters (δ = 4 ms, r0 = 4.15 Hz, β = 0.374 mV−1 and
GP, spike-related kernel and adaptation kernels as depicted in Fig. 2D-F). The learning algorithm was
initialized with least-squares estimates of the covariance function parameters σ2
i based on the empirical
autocorrelation function of usom and spike-related kernel and adaptation kernels set to zero. The true
underlying δ can be recovered from the synthetic data (Fig. 2C). Moreover, the algorithm converges after
a few dozen iterations (taking only three minutes on an ordinary portable computer) and -- with δ set
to 4 ms -- recovers the correct GP, spike-related, and adaptation kernels (Fig. 2D-F). All ML estimates
lie within a region of two standard deviations around the ground truth, where standard deviations are
estimated from the observed Fisher information [34].
2.5 The model can fit in vivo data
We fitted the model to a number of in vivo traces from different animals and conditions (see 'Materials
and Methods' for a detailed description of the data sets). We would like to remind the reader at this point
that the model is never fitted to the raw membrane potential, but to a preprocessed, i.e. median-filtered
and downsampled dataset (see Materials and Methods). Because of this preprocessing stage, the model
only sees the truncated action potentials which emerge from the median filter. This is reflected in the
extracted spike-related kernel α, which is characterized by a smaller amplitude than the original action
potential in the raw membrane potential data.
We show the detailed results of the model fitting for the example songbird HVC dataset D1. The
optimal value of δ for this dataset was δ = 18 ms (see S3 Fig), with which the model captures the
subthreshold and suprathreshold statistics (smaller values of δ compromise both the subthreshold and
suprathreshold description because the large upward fluctuations which preceed spikes in this dataset are
unlikely to arise from a GP). In particular, the stationary distribution of the membrane potential u is
well approximated by a Gaussian (Fig. 4B) and pronounced after-hyperpolarization is seen in the spike-
related kernel (Fig. 4D). The subthreshold autocorrelation structure is well reproduced by the parametric
autocorrelation function k (Fig. 4C). The adaptation kernel reveals an interesting structure in the way
the spiking statistics deviates from a Poisson process (Fig. 4E). This feature of the spiking statistics is
also reflected in the inter-spike interval (ISI) distribution (Fig. 4F). Both the data and the fitted model
first show an increased, and then a significantly decreased probability density when compared to a pure
Poisson process. The remaining parameters are listed in Tab. 1 (errors denote two standard deviations,
estimated from Fisher information, see Materials and Methods). The model can be used to generate
synthetic data, which is shown in Fig. 4H.
In order to show the generality of the model, we fitted the model on two more datasets, D3 from another
HVC neuron and D4 from mouse visual cortex. The parameter δ was found to take the optimal value of 12
ms for D3 and 32 ms for D4 (to see how fitted parameters change as a function of δ, see S4 Fig and S5 Fig).
The comparison of the GP, spike-related and adaptation kernels is shown in Fig. 5, and the remaining
parameters are listed in Tab. 1. The three cells show pronounced differences in autocorrelation structure,
In particular the two datasets D1 and D4 show rather
spike-related kernel and spike-history effects.
long autocorrelation lengths of the membrane potential and asymmetric spike-related kernels, whereas
the cell in D3 has comparatively short autocorrelation length and very pronounced hyperpolarization.
Adaptation is much stronger in D3 than in D1, balancing the much higher baseline firing rate r0, see
Tab. 1. The error bars on the adaptation kernel are small for datasets D1 and D3 due to the abundance
of spikes. On the other hand, the adaptation kernel of dataset D4 is poorly constrained by the available
data. This is due to the fact that dataset D4 consists of very short trials with very few spikes. Despite
this fact, good agreement is achieved between the distribution of inter-spike intervals of the in vivo data
and ISI statistics sampled from the AGAPE (see Fig. 5, bottom row) for all datasets.
10
data
A = 0
A 6= 0
A
V
m
5
50
ms
uraw
u + ur
C
data
ML fit
10
5
1
]
2
V
m
[
)
t
(
k
B
)
u
(
p
D
10
5
0
]
V
m
[
)
t
(
α
STA
ML fit
F
data
ML fit
E
]
1
[
)
t
(
η
-
30
0
18
50
t [ms]
)
τ
(
ρ
ML fit
1
0
-
1
-
2
-
10
mV
0
10
u [mV]
1
10
100
1000
0
50
100
0
100
t [ms]
t [ms]
200
τ [ms]
300
400
G
data
simulation
H
V
m
0
1
150 ms
Figure 4. The results of maximum likelihood (ML) parameter fitting to dataset D1. After fitting, we
see (A) the removal of the spike-related kernel through the difference between the recorded trace u∗som
and the subthreshold membrane potential u + ur; (B) the match of the stationary distribution of the
subthreshold potential u and a Gaussian. We also observe that (C) the autocorrelation function of the
data, Eq. (14), is well reproduced by k(t) in Eq. (15); (D) the spike-related kernel α(t) starts at
−δ = −18 ms relative to the peak of the action potential. The difference between the spike-triggered
average (STA) and the spike-related kernel is attributed to the GP; and (E) that the adaptation kernel
η(t) shows distinct modulation of firing rate which produces firing statistics significantly different from
a Poisson process. This is also reflected in the inter-spike interval density ρ(τ ) (F) of the data, which
shows good qualitative agreement with a simulated AGAPE with adaptive kernel as in (E) (thick red
line), but not by a non-adaptive (i.e. Poisson) process (thin red line). After fitting, a two second sample
of synthetic data (H) looks similar as the in vivo data (G). In (G,H) vertical lines are drawn at the
spiking times. All red shaded regions denote ± 2 standard deviations, estimated from the observed
Fisher information.
11
D4
10
102
103
D3
10
102
103
D1
15
10
5
]
2
V
m
[
)
t
(
k
0
1
10
102
103
]
V
m
[
)
t
(
α
10
5
0
-
5
15
10
5
0
1
10
5
0
-
5
15
10
5
0
1
10
5
0
-
5
-
50
-
18
0
50
-
50
-
12
0
50
-
50
-
32
0
50
200
100
0
-
100
-
200
-
300
50
100
0
50
100
0
-
2
-
4
-
6
-
8
-
10
0
50
100
0.5
0.0
-
0.5
-
1.0
]
1
[
)
t
(
η
-
1.5
-
2.0
0
)
t
(
ρ
0
100
200
300
400
0
t [ms]
100
t [ms]
200
0
1000
2000
3000
t [ms]
Figure 5. Fitting results for three different datasets. Dataset D1 is the same as in Fig. 4, i.e. an HVC
neuron from anesthetized Zebra Finch. D3 is from HVC in awake Zebra Finch, and D4 is from mouse
visual cortex in awake mouse. The different panels show the results after fitting; in the first line the GP
covariance function k(t) (red) and the empirical autocorrelation (black), Eq. (14), in the second line the
spike-related kernel α(t), in the third line the adaptation kernel η(t), and in the fourth line the
inter-spike interval density ρ(t) (data ISI histogram in gray, simulated ISI distribution from AGAPE in
red). There are pronounced differences between datasets in all three kernels, showing the flexibility of
the AGAPE model in describing a wide range of statistics. All red shaded regions denote ± 2 standard
deviations, estimated from the observed Fisher information.
12
Dataset
D1
D3
D4
δ [ms]
ur [mV]
r0 [Hz]
β [mV−1]
18
-52.9±0.2
11.7±0.6
0.12±0.01
12
-66.6±0.1
71±5
0.24±0.02
32
-51.5±0.5
0.15±0.05
0.46±0.05
βσ [1]
0.45±0.03
0.67±0.04
1.3±0.1
Table 1. The values (p.m. two standard deviations, estimated from the observed Fisher information)
of the fitted parameters not shown in Fig. 5 for the in vivo datasets described in the main text. The
last row shows the effective coupling strength between the membrane potential and the firing rate, given
by β times the standard deviation σ of the membrane potential.
2.6 The model does not overfit in vivo data
The AGAPE process has a fairly large number of parameters. Therefore it is important to check whether
the model overfits the data, compromising its generalization performance. In short, when a model has
too many parameters, it tends to be poorly constrained by the data and therefore when the model is
first trained on one part of the data and then tested on another part on which it is not trained, the test
performance will be significantly worse than the training performance.
Here, we use cross-validation to perform a factorial model comparison on an exemplary dataset in
order to validate the different structural parts of the model. The procedure is described in detail in the
Materials and Methods.
Model comparison is performed on the dataset D2 and the results are shown in Fig. 6, where the
mean difference of per-bin log-likelihood (see 'Materials and Methods')
∆pvalid
i
= h∆pvalid
ij
ij , ∆ptest
i = h∆ptest
ij ij ,
∆pvalid,test
ij
= pvalid,test
i,j
− pvalid,test
Gαβη,j
(13)
is shown for all models i ∈ {0, ..., Gαβη} (here, h·ij denote averages over chunks j of the cross-validation).
The results are very similar for both validation data (which was left-out during training, but appeared in
other training runs) and the test data which was never seen during training. The most complex model
(MGαβη) performs significantly better than any one of the simpler models on validation data except
MGαη where the difference is too small and lies inside a region of two standard errors of the mean.
This confirms that most of the model features are required to provide an accurate description of the
experimental data.
3 Discussion
In this study, we introduced the AGAPE generative model for single-neuron statistics in order to describe
the spontaneous dynamics of the somatic potential without reference to an input current. We showed
that this model has a rich dynamical repertoire and can be fitted to data efficiently. By fitting a het-
erogeneous set of data, we finally demonstrated that the AGAPE model can be used for the systematic
characterization and comparison of in vivo intracellular recordings.
3.1 Flexibility and tractability of the model
The AGAPE model provides a unified description of intracellular dynamics, offering a large degree of
flexibility in accounting for the distinct statistical features of a neuron. As the example datasets demon-
strate, the model readily teases apart the differences in the statistics which exist between different cells
13
models
®
r
e
t
t
e
b
e
c
n
a
m
r
o
f
r
e
p
l
e
d
o
m
.
l
e
r
e
s
r
o
w
¬
0.
-0.1
-0.2
-1.2
-1.3
-1.4
-1.5
Η
Β
Α
G
MMMMMMMM
Β
Α
G
Η
Α
G
Α
G
Η
Β
Α
Η
Α
Α
Β
Α
Dpvalid
Dptest
G: multiple OUs
Α: spike shape
Β: coupling
Η: adaptation
Α
h
t
i
w
s
l
e
d
o
m
Α
t
u
o
h
t
i
w
Β
G
Η
Β
G
Η
Β
Β
MMMMM
models
Η
G
Η G 0
MMM
Figure 6. Comparison of the different models on dataset D2. The relative measure of model
performance, i.e. the per-bin log-likelihood ∆p (see Eq. (13)) between any model and the most complex
model (MGαβη) are significantly negative (with exception of MGαη, and trivially MGαβη) , implying
that the added complexity improves the model fit without overfitting. This holds for both validation
scores ∆pvalid (black) and scores from unseen test data ∆ptest (red). Error bars denote one standard
error of the mean (S.E.M.). The biggest improvement of fit quality is achieved by including the
spike-related kernel (upper vs. lower part of the figure).
14
in different animals (see Fig. 5). This shows that the model is sensitive enough to distinguish between
datasets which are in fact very similar.
We used a set of approximations and techniques to make the model fitting tractable, despite the non-
concavity of the log likelihood function. It is still the case that multiple local maxima of the likelihood
function can make the fitting somewhat hard, especially if the quantity of data available for fitting is quite
low. However, since one run of the fitting itself takes only a few minutes even on a portable computer,
multiple initializations can be tried out in a relatively short amount of time.
3.2 Comparison with existing models
From an operational perspective, existing spiking neuron models can be divided into three main categories:
stimulus-driven, current-driven and input-free spiking neurons. The first category contains phenomenolog-
ical models that relate sensory stimuli to the spiking output of the neuron. The linear-nonlinear-Poisson
model (LNP) [35], the generalized linear model (GLM) [20, 21, 22] or the GLM with additional latent
variables [36] are typical examples in this category. Even though the spike generation of the AGAPE
shares some similarities with those models, there is an important distinction to make. In those models
the convolved input (i.e. the output of the 'L' step of the LNP or the input filter of the GLM) is an
internal variable that does not need to be mapped to the somatic membrane potential whereas in our
case, the detailed modeling of the membrane potential dynamics is an important part of the AGAPE.
Consequently, those phenomenological models are descriptions of extracellular spiking recordings whereas
the AGAPE models the dynamics of the full membrane potential accessible with intracellular methods.
The second class of spiking models aims at bridging the gap between the input current and the spiking
output. The rather simple integrate-and-fire types of models such as the exponential integrate-and-fire
[13] or the spike-response model [24, 37] as well as the more biophysical models such as the Hodgkin-
Huxley model [15] fall within this category.
In contrast to those models where the action potentials
are caused by the input current, the AGAPE produces a fluctuating membrane potential and stochastic
spikes without a reference to an input current.
The last category of models aims at producing spontaneous spiking activity without an explicit de-
pendence to a given input [38, 18, 39]. For example, Cunningham et al. propose a doubly stochastic
process where the spiking generation is given by a gamma interval process and the firing intensity by
a rectified Gaussian process, which provides a flexible description of the firing statistics [38]. However,
the membrane potential dynamics is not modeled.
In opposition, the neuronal dynamics assumed by
Pfister et al.
[18] models explicitly the membrane potential (as a simple Ornstein-Uhlenbeck process)
but is not flexible enough to capture the dynamics of in vivo recordings. Also any of the current-driven
spiking neuron models mentioned above can be turned into an input-independent model by assuming
some additional input noise. So why is there a need to go beyond stochastic versions of those models?
An integrate-and-fire model with additive Gaussian white noise is certainly fittable, but does not have
the flexibility to model arbitrary autocorrelation for the membrane potential. At the other end of the
spectrum, a Hodgkin-Huxley model with some colored noise would certainly be able to model a richer
dynamical repertoire, but the fitting of it remains challenging [16] (but see [17]). The main advantage of
the AGAPE is that it is at the same time very flexible and easily fittable. The flexibility mostly comes
from the fact that any covariance function can be assumed for the GP process. The relative ease of
fitting comes from the circulant approximation as well as from the presence of concave subspaces in the
full parameter space.
Another distinct feature of our model with respect to other existing models is the explicit modeling
of the spike-related trajectory instead of the spike-triggered average (as e.g. in [40]). Even though both
concepts share similarities - both would capture a sudden and strong input that lead to a spike - there
is an important distinction. The spike-triggered average also captures the (possibly smaller) upward
fluctuations of the membrane potential which causes the spike while the spike-related kernel α precisely
avoids capturing those fluctuations, letting the GP kernel explain them.
15
So if we removed the spike-triggered average e.g. in synthetic data where the true coupling parameter
β is large, we would also remove the characteristic upward fluctuation of the membrane potential which
causes the spike. By doing so, the fitting procedure would not find the correct relation between the
values of the membrane potential and the observed spike patterns and therefore choose a β close to
zero. Thus, if something has to be removed around an action potential (and our model comparison,
Fig. 6, demonstrates convincingly that this is necessary), the formulation of the model demands that it
is parametrically adjustable. This is the main reason why in our model framework the spike-triggered
average has to be rejected as a viable extraction method. Note that if the true coupling parameter β is
close to zero, the spike-triggered average is close to the extracted spike-related kernel α. For data where
the action potential shape shows considerable variability, the model could be generalized to include a
stochastic or a history-dependent spike-related kernel.
3.3 Extensions and future directions
Despite the focus of the present work on single-neuron spontaneous dynamics, the AGAPE model admits
a straightforward inclusion of both stimulus-driven input and recurrent input. The inclusion of stimulus-
driven input is similar as for the GLM model and allows the model to capture the neuronal correlate
of stimulus-specific computation. The recurrent input makes the framework adaptable to multi-neuron
recordings in vivo. While intracellular recordings from many neurons in vivo are very hard to perform,
the rapid development of new recording techniques (e.g. voltage-sensitive dyes) makes the future avail-
ability of subthreshold data with sufficient time-resolution at least conceivable. The full-fledged model
would allow questions regarding the relative importance of background activity, recurrent activity due to
computation in the circuit, and activity directly evoked by sensory stimuli to be answered in a systematic
way. In this setup, the contribution of the GP-distributed membrane potential to the overall fluctuations
would be reduced (since it has to capture less unrecorded neurons) while the contribution of the recorded
neurons would increase. This modified model can be seen as a generalization of the stochastic spike-
response model [24] or a generalization of the GLM (if the internal variable of the GLM is interpreted as
the membrane potential).
So far, we assumed that weak synaptic inputs are captured by the Gaussian process while the strong
inputs that lead to the spikes are captured by the spike-related kernel α. A straightforward extension
of the model would be to consider additional intermediate inputs that cannot be captured by the GP
nor by the spike-related kernel α but that can drive the neuron to emit (with a given probability) an
action potential. Those intermediate input could be modeled as filtered Poisson events. The inclusion
of those latent events would increase the complexity of the model and at the same time change some
of the fitted parameters.
In particular, we expect that it would increase the coupling β between the
membrane potential and the firing rate and reduce the optimal delay δ between the decision time and the
peak of the action potential. This could also provide a better way to separate the subthreshold dynamics
(which depends on the input activity) from the suprathreshold dynamics (which would depend only on
the neuron dynamics, and not on the strong inputs that it receives, as it is the case now).
A central assumption of our model is that of a Gaussian marginal distribution of the subthreshold
potential. Although it is remarkably valid for the dataset considered here (i.e. the HVC dataset D1 see
also Fig. 4B), datasets characterized by a distinctly non-Gaussian voltage distribution even after spike-
related kernel removal are beyond the scope of the current model. In order to address this limitation, the
Gaussian process could be extended to a different stochastic process, e.g. a nonlinear diffusion process,
permitting non-Gaussian and in fact arbitrary marginal distributions. Moreover, a reset behavior similar
to the one exhibited by an integrate-and-fire model [13] could be achieved with a non-stationary GP
which features a mean which is reset after a spike. Both modifications would have a severe impacton
the technical difficulty of model fitting. Therefore, the Gaussian assumption can be regarded as a useful
compromise which is preferable over a perfect account for the skewness of the marginal distribution.
The spike-related kernel method to separate subthreshold and suprathreshold dynamics is an impor-
16
tant feature of the model which is used to rid the membrane potential recording of stereotypic waveforms
associated with a spike. The spike related kernel as modeled in the AGAPE has no bearing on the
probability of the spikes, whereas the adaptation kernel η which modulates the firing rate after a spike is
not visible in the somatic membrane potential dynamics. A simple extension of the model could include
spike-triggered adaptation currents which affect both the somatic membrane potential as well as the firing
intensity. Another possible extension is to allow the firing probability to depend on a filtered version of
the subthreshold potential u instead of the instantaneous value of u at a time δ before the peak of the
action potential. Both of the mentioned extensions would improve the biophysical interpretability of the
AGAPE, but they would also vastly increase the number of parameters. Therefore, a model comparison
would be required to determine what level of model complexity is required in order to characterize the
statistics of the recording.
In the present study, the AGAPE was fit to different datasets of two different animals and brain
regions. A systematic fitting to in vivo intracellular data from a wide range of animals and brain regions
would constitute a classification scheme which does not only complement existing classifications of neurons
which are based on electrophysiological, morphological, histological, and biochemical data; such as the
one in [41], but which is in direct relationship with the computational tasks the brain is facing in vivo.
Another application of the AGAPE could be in the context of a normative theory of short-term plas-
ticity. Indeed, it has been recently hypothesized that short-term plasticity performs Bayesian inference
of the presynaptic membrane potential based on the observed spike-timing [18, 42]. According to this
theory, short-term plasticity properties have to match the in vivo statistics of the presynaptic neuron.
Since the AGAPE provides a realistic generative model of presynaptic activity under which inference is
supposedly performed, our model can be used to make testable predictions on the dynamical properties
of downstream synapses.
4 Materials and Methods
4.1 Description of the datasets used
1. Dataset D1 is a recording from a HVC neuron of an anesthetized Zebra Finch (Ondracek and
Hahnloser, unpublished recordings). The recording has a total length of 270 seconds at 32 kHz (see
Fig. 1A for a snippet of this recording) and contains 2281 action potentials.
2. Dataset D2 is another recording from a projection cell in HVC of Zebra Finch, but this time the
animal is awake (Vallentin and Long, unpublished recordings). It consists of 6 individual recordings
which together have a length of 152.5 seconds at 40 kHz. This dataset is used for model comparison
(see below).
3. Dataset D3 is from similar conditions as D2 (Vallentin and Long, unpublished recordings, see
[43, 44, 45] for similar recordings) and has a length of 60 seconds.
4. Dataset D4 consists of 19 individual trials of 4.95s duration at 20 kHz. The recording was obtained
from a pyramidal neuron in layer 2/3 of awake mouse visual cortex [46].
4.2 Preprocessing
Intracellular voltage traces are often recorded at a rate between 20 and 40 kHz. This allows the action
potentials to be resolved very clearly and precise spike timings to be extracted. However, for the study
of the subthreshold regime, this high sampling rate is not required, and therefore the data may be down-
sampled to roughly 1 kHz after obtaining the precise spike timings. Prior to down-sampling, we smooth
with a median filter of 1ms width in order to truncate the sharp action potential peaks and avoid artifacts
(see details below).
17
We define the spike peak times ti,peak operationally as the time where the local maximum of the
action potential is reached. This means that ti,peak occurs after action potential onset, and hence the
spike-related kernel has to extend to the past of ti,peak. The spike-related kernel starts at the nominal
spike time ti which is shifted from the peak time by a fixed amount δ, i.e. ti,peak = ti + δ. The nominal
spike times ti are then binned to 1 ms, yielding a binary spike train si = 0, 1.
For usom(t) we use a preprocessed version of the recorded trace which has been median-filtered with
a width of the filter of 1 ms and then down-sampled to 1 kHz, making it the same length as the binary
spike train. This procedure preserves the relevant correlation structure of the membrane potential while
reducing the computational demands of fitting as much as possible. In the data we examined, the median-
filtered membrane potential has a dip after ti,peak, but unless down-sampling is done carefully, this dip
sometimes occurs one timestep after ti,peak and sometimes right at ti,peak in the downsampled usom.
Since this dip will have to be captured by the spike-related kernel which has a fixed shape for all action
potentials, the down-sampling procedure has to ensure that the dip occurs always in the first time-step.
We solved this problem by setting the down-sampled value of usom at ti,peak (rounded to 1 ms) to the
value of usom at ti,peak before down-sampling.
While applying the model to the raw recording uraw directly (without first filtering and downsampling
it) is possible in principle, it comes at a massively increased computational cost. In the interest of time
required to fit the model and amount of data having to be handled, it is therefore sensible to include that
pre-processing stage.
4.3 Parametrizations and initializations
We already introduced the parameters ur, r0 and β. Additional parameters are needed to describe the
autocorrelation k(t), the spike-related kernel α(t) and the adaptation kernel η(t).
The covariance function of the GP has to be parametrized such that it can explain the autocorrelation
structure of the data. Therefore, an initial examination of the empirical autocovariance of usom, i.e.
kemp(j∆t) =
1
n − j − 1
n−jXi=1 usom,i −
1
n − j
n−jXk=1
usom,k! usom,i+j −
1
n − j
usom,k+j! ,
n−jXk=1
(14)
for j = 0, ..., jmax, is done in order to determine a suitable basis. Here, we used a sum of Ornstein-
Uhlenbeck (OU) kernels, i.e.
k(t) =
σ2
i e−θit,
(15)
nkXi=1
nkXj=1
where nk = 10 and θi = 2−i ms−1. The autocovariance has to remain positive definite. This induces the
following linear constraints:
ci =
j c(j)
σ2
i > 0,
∀i = 1, ..., n,
(16)
i
i , where c(j)
on σ2
are the discrete Fourier transforms of the circulant basis vectors. The optimization
problem is non-concave in the subspace of σ2
i and multiple local maxima and saddle points can occur.
Therefore, multiple initializations have to be made in order to find a potential global optimum. In general,
the least-squares fit of k(t) to the empirical autocovariance function (14) yields a good starting point for
the optimization.
The spike-rate adaptation kernel is chosen to be a linear combination of ten different alpha shapes
η(t) =(Pnη
0,
i=1 wi [exp(−νit) − exp(−ωit)] ,
t > 0,
t ≤ 0,
(17)
18
where we chose nη = 10, νi = 2ωi and νi = 2−i ms−1.
Since the median filter time constant is short, the voltage change around the spike can be fast, requiring
flexible spike-related kernel basis. Most of this flexibility is required around t = δ. Because δ is adapted,
we choose a discrete parametrization which has equal flexibility from t = 0 up to a maximum t. In our
case, this maximum is at t = 60 ms, and therefore our parametrization of the spike-related kernel reads
α(t) =(ai,
0,
if
else
t ∈ [i∆t, (i + 1)∆t)
(18)
where ai ∈ R, i = 1, ..., 60 are the free parameters. Since the spike-related kernel fitting is concave, the
large number of parameters does not lead to a dramatic increase of computational time. It also does not
lead to overfitting, as is evidenced by the smoothness of the fitted kernels (see updated Figs.4,5 in the
main text and the new S3-S5) and by the new model comparison results (see updated Fig.6 in the main
text).
4.4 Model validation
We performed a factorial model comparison (see Fig. 6) where the four factors were the presence/absence
of each of the following: multiple OU components in the GP autocorrelation function (see Eq. (15),
as opposed to only one OU kernel with variable time-constant), the spike-related kernel α, coupling
between u and s (through β) and adaptation η, which gives a total of 16 different models. We use the
nomenclature that M0 is the simplest model, e.g. α = β = η = 0 and only one OU component, having
only four parameters (ur, θ, σ and r0). A subscript G (for GP) indicates that we use the multiple OU
basis and any other subscript indicates that the corresponding parameter is adjustable in addition to the
parameters already present in M0 and the parameters that are associated with the subscribed ones. E.g.
MGα indicates that we use the multiple OU basis and allow a non-zero spike-related kernel and that
there are now 73 parameters (δ, ur, θi, ai for i = 1, ..., 60, and log r0). The parameter δ is optimized only
for the 12 out of 16 models which depend on this parameter, i.e. that have at least β 6= 0 or α 6= 0.
For each of the models M ∈ {M0, ..., MGαβη}, we performed eight-fold cross-validation [47] on dataset
D2 in order to assess the models' generalization performance. The entire dataset was cut into eight equally-
sized chunks dj , where j = 1, ..., 8, each of length 15s (n = 15000), and six chunks of 3s d′j , j = 1, ..., 6
set aside as a test set (n′ = 3000). Each model was then trained on seven out of eight chunks (treating
them as independent samples) giving an optimal set of parameters Θi
j = argmaxΘ p({dk, k 6= j} Mi, Θ)
and training per-bin log-likelihood ptrain
7n log p({dk, k 6= j} Mi, Θi
j). Then the validation likelihood
ij = 1
j) of the left-out chunk #j was evaluated. The unseen data d′j is used for a
pvalid
final benchmark of model performance, where the best set of parameters is selected for each model, i.e.
ij = 1
ptest
n′ maxk=1,...,8 log p(d′jMi, Θi
n log p(djMi, Θi
ij = 1
k).
5 Acknowledgments
We would like to thank Janie Ondracek and Richard Hahnloser in Zurich, Switzerland, Daniela Vallentin
and Michael Long at NYU, Bilal Haider and Matteo Carandini at UCL for kindly providing the data for
this study. We also thank M´at´e Lengyel, Christian Pozzorini and Johanni Brea for helpful discussions.
19
References
1. Woody CD, Gruen E. Characterization of electrophysiological properties of intracellularly recorded
neurons in the neocortex of awake cats: a comparison of the response to injected current in spike
overshoot and undershoot neurons. Brain Research; 1978;158(2):343 -- 357.
2. Baranyi A, Szente MB, Woody CD. Electrophysiological characterization of different types of
neurons recorded in vivo in the motor cortex of the cat. ii. membrane parameters, action poten-
tials, current-induced voltage responses and electrotonic structures. Journal of Neurophysiology;
1993;69(6):1865 -- 1879.
3. Steriade M, Timofeev I, Grenier F. Natural waking and sleep states: a view from inside neocortical
neurons. Journal of Neurophysiology; 2001;85(5):1969 -- 1985.
4. Matsumura M, Cope T, Fetz EE. Sustained excitatory synaptic input to motor cortex neurons
in awake animals revealed by intracellular recording of membrane potentials. Experimental Brain
Research; 1988;70(3):463 -- 469.
5. Poulet JFA, Petersen CCH. Internal brain state regulates membrane potential synchrony in barrel
cortex of behaving mice. Nature; 2008;454(7206):881 -- 885.
6. Lee AK, Manns ID, Sakmann B, Brecht M. Whole-cell recordings in freely moving rats. Neuron;
2006;51(4):399 -- 407.
7. El Boustani S, Marre O, B´ehuret S, Baudot P, Yger P, Bal T, et al. Network-state modu-
lation of power-law frequency-scaling in visual cortical neurons. PLoS Computational Biology;
2009;5(9):e1000519.
8. Berkes P, Orb´an G, Lengyel M, Fiser J. Spontaneous cortical activity reveals hallmarks of an
optimal internal model of the environment. Science; 2011;331(6013):83 -- 87.
9. Lapicque L. Recherches quantitatives sur l'excitation ´electrique des nerfs trait´ee comme une polar-
isation. Journal de Physiologie et de Pathologie G´en´erale; 1907;9(1):620 -- 635.
10. Stein RB. The information capacity of nerve cells using a frequency code. Biophysical journal;
1967;7(6):797 -- 826.
11. Latham PE, Richmond BJ, Nelson PG, Nirenberg S. Intrinsic dynamics in neuronal networks. i.
theory. Journal of Neurophysiology; 2000;83(2):808 -- 827.
12. Fourcaud-Trocm´e N, Hansel D, van Vreeswijk C, Brunel N. How spike generation mechanisms deter-
mine the neuronal response to fluctuating inputs. The Journal of Neuroscience; 2003;23(37):11628 --
11640.
13. Brette R, Gerstner W. Adaptive exponential integrate-and-fire model as an effective description
of neuronal activity. Journal of Neurophysiology; 2005;94(5):3637 -- 3642.
14. Hille B. Ion channels of excitable membranes. Sinauer Associates Incorporated; 2001.
15. Hodgkin AL, Huxley AF. A quantitative description of membrane current and its application to
conduction and excitation in nerve. The Journal of Physiology; 1952;117(4):500.
16. Gerstner W, Naud R. How good are neuron models? Science; 2009;326(5951):379 -- 380.
20
17. Druckmann S, Banitt Y, Gidon A, Schurmann F, Markram H, Segev I. A novel multiple objective
optimization framework for constraining conductance-based neuron models by experimental data.
Frontiers in Neuroscience; 2007;1(1):7 -- 18.
18. Pfister JP, Dayan P, Lengyel M. Synapses with short-term plasticity are optimal estimators of
presynaptic membrane potentials. Nature Neuroscience; 2010;13(10):1271 -- 1275.
19. Møller J, Syversveen AR, Waagepetersen RP. Log gaussian cox processes. Scandinavian Journal
of Statistics; 1998;25(3):451 -- 482.
20. Truccolo W, Eden UT, Fellows MR, Donoghue JP, Brown EN. A point process framework for
relating neural spiking activity to spiking history, neural ensemble, and extrinsic covariate effects.
Journal of Neurophysiology; 2005;93(2):1074 -- 1089.
21. Pillow J, Shlens J, Paninski L, Sher A, Litke AM, Chichilnisky EJ, et al. Spatio-temporal correla-
tions and visual signalling in a complete neuronal population. Nature; 2008;454(7207):995 -- 999.
22. Paninski L, Ahmadian Y, Ferreira DG, Koyama S, Rahnama Rad K, Vidne M, et al. A new look at
state-space models for neural data. Journal of Computational Neuroscience; 2009;29(1-2):107 -- 126.
23. Rasmussen CE, Williams CKI. Gaussian processes for machine learning. The MIT Press; 2006.
24. Gerstner W, Kistler WM. Spiking neuron models. Single Neurons, Populations, Plasticity. Cam-
bridge University Press; 2002.
25. Paninski L. Maximum likelihood estimation of cascade point-process neural encoding models.
Network: Computation in Neural Systems; 2004;15(4):243 -- 262.
26. Pozzorini C, Naud R, Mensi S, Gerstner W. Temporal whitening by power-law adaptation in
neocortical neurons. Nature Neuroscience; 2013;16(7):942 -- 948.
27. Buzs´aki G. Theta oscillations in the hippocampus. Neuron; 2002;33(3):325 -- 340.
28. Shinomoto S, Tsubo Y. Modeling spiking behavior of neurons with time-dependent poisson pro-
cesses. Physical Review E; 2001;64(4):041910.
29. Lindner B, Schimansky-Geier L, Longtin A. Maximizing spike train coherence or incoherence in
the leaky integrate-and-fire model. Physical Review E; 2002;66(3):031916.
30. Softky WR, Koch C. The highly irregular firing of cortical cells is inconsistent with temporal
integration of random epsps. The Journal of Neuroscience; 1993;13(1):334 -- 350.
31. Katsaggelos AK, Lay KT. Maximum likelihood blur identification and image restoration using the
em algorithm. IEEE Transactions on Signal Processing; 1991;39(3):729 -- 733.
32. Bach FR, Jordan MI. Learning graphical models for stationary time series. IEEE Transactions on
Signal Processing; 2004;52(8):2189 -- 2199.
33. Gray RM. Toeplitz and circulant matrices: A review. Foundations and Trends in Communications
and Information Theory; 2006;2(3):155 -- 239.
34. Efron B, Hinkley DV. Assessing the accuracy of the maximum likelihood estimator: observed
versus expected fisher information. Biometrika; 1978;65(3):457 -- 487.
35. Chichilnisky EJ. A simple white noise analysis of neuronal light responses. Network: Computation
in Neural Systems; 2001;12(2):199 -- 213.
21
36. Vidne M, Ahmadian Y, Shlens J, Pillow J, Kulkarni JE, Litke AM, et al. Modeling the impact of
common noise inputs on the network activity of retinal ganglion cells. Journal of Computational
Neuroscience; 2012;33(1):97 -- 121.
37. Jolivet R, Rauch A, Luscher HR, Gerstner W. Predicting spike timing of neocortical pyramidal
neurons by simple threshold models. Journal of Computational Neuroscience; 2006;21(1):35 -- 49.
38. Cunningham JP, Byron MY, Shenoy KV, Sahani M. Inferring neural firing rates from spike trains
using gaussian processes. In: Advances in neural information processing systems; 2007. p. 329 -- 336.
39. Macke JH, Buesing L, Cunningham JP. Empirical models of spiking in neural populations. Ad-
vances in Neural Information Processing Systems; 2011;24:1350 -- 1358.
40. Mensi S, Naud R, Pozzorini C, Avermann M, Petersen CCH, Gerstner W. Parameter extraction and
classification of three cortical neuron types reveals two distinct adaptation mechanisms. Journal
of Neurophysiology; 2012;107(6):1756 -- 1775.
41. Markram H, Toledo-Rodriguez M, Wang Y, Gupta A, Silberberg G, Wu C. Interneurons of the
neocortical inhibitory system. Nature Reviews Neuroscience; 2004;5(10):793 -- 807.
42. Pfister JP, Dayan P, Lengyel M. Know thy neighbour: A normative theory of synaptic depression.
Advances in Neural Information Processing Systems; 2009;22:1464 -- 1472.
43. Long MA, Jin DZ, Fee MS. Support for a synaptic chain model of neuronal sequence generation.
Nature; 2010;468(7322):394 -- 399.
44. Hamaguchi K, Tschida KA, Yoon I, Donald BR, Mooney R. Auditory synapses to song premotor
neurons are gated off during vocalization in zebra finches. eLife; 2014;3:e01833.
45. Vallentin D, Long MA. Motor origin of precise synaptic inputs onto forebrain neurons driving a
skilled behavior. The Journal of Neuroscience; 2015;35(1):299 -- 307.
46. Haider B, Hausser M, Carandini M. Inhibition dominates sensory responses in the awake cortex.
Nature; 2013;493(7430):97 -- 100.
47. Arlot S, Celisse A. A survey of cross-validation procedures for model selection. Statistics surveys;
2010;4:40 -- 79.
22
Supplementary Text
A statistical model for in vivo neuronal dynamics
Simone Carlo Surace1,2,∗, Jean-Pascal Pfister2
1 Department of Physiology, University of Bern, Bern, Switzerland
2 Institute of Neuroinformatics, University of Zurich and ETH Zurich, Zurich, Switzerland
∗ E-mail: [email protected]
Discrete Fourier Transform
In the following and in the main text, we denote discrete Fourier transforms of vectors of length n by a
hat. The Fourier transformed vector is again of length n and can be formally expressed as
v = Fv,
(Fn)ij = e
2πI(i−1)(j−1)
n
,
i, j = 1, ..., n,
(19)
where I denotes the imaginary unit. In practice, discrete Fourier transforms are not actually computed
by matrix multiplication, but by means of a Fast Fourier Transform (FFT) algorithm.
Circulant matrices
In order to reduce the computational complexity of the likelihood estimation, we approximate the auto-
covariance matrix K (which is a Toeplitz matrix K) with a circulant matrix C. By definition a circulant
matrix can be expressed as
we write C = Cn(c). All circulant matrices of dimension n can be diagonalized by the unitary discrete
Fourier transform matrix U = 1√n
Fn:
Cij = c(i−j mod n)+1
(20)
Cn(c) = U†ndiag(Fnc)Un = U†ndiag(c)Un,
(21)
where † is the conjugate transpose. This implies that c is the vector of eigenvalues of C, and it is a
vector with real entries. This makes calculation of inverse and determinant of C extremely cheap, as is
multiplication of C−1 by a vector x ∈ Rn, which simplifies to
C−1
n (c)x =
1
n
c(cid:19)
F†n(cid:18) x
(22)
where the vector in brackets is the component-wise quotient of the vectors Unx and Fnc.
Circulant approximation
The task is now to find a circulant matrix which is as close as possible to the covariance matrix K. This
can be formalized as the following minimization problem:
C = argmin
D circulant
DKL (N (m, K)N (m, D)) ,
∀m
(23)
where N denotes a multivariate Gaussian with specified mean vector and covariance matrix. This problem
has the unique solution
ci =
1
n
{(n − i + 1)ki + (i − 1)kn−i+2} ,
1 ≤ i ≤ n,
kn+1 ≡ 0
(24)
Proof: The Kullback-Leibler divergence between two Gaussians is given by
1
1
2
n
2
1
ci
det C−1 =
2(cid:2)tr(C−1K) − log det(C−1K)(cid:3) −
c(cid:19) Un,
nXi=1(cid:20) (UnKU†n)ii
2ci(cid:20)1 −
nYi=1
+ log ci(cid:21) + const.
(cid:21) = 0
(UnKU†n)ii
ci
ci
We have
and hence
DKL (N (m, K)N (m, C)) =
C−1 = U†ndiag(cid:18) 1
DKL (N (m, K)N (m, C)) =
where the constant does not depend on c. We obtain the derivative
DKL (N (m, K)N (m, C)) =
1
∂
∂ci
and therefore, at the stationary point we have
ci = (UnKU†n)ii
(F†n)ij (Fn)jlKlm(F†n)mj
23
(25)
(26)
(27)
(28)
(29)
(30)
ci =
=
=
1
n2
1
n2
1
n2
nXj,l,m=1
nXj,l,m=1
nXj,l,m=1
n
Klm exp(cid:20) 2πI
kl−m+1 exp(cid:20) 2πI
(−(i − 1)(j − 1) + (j − 1)(l − 1) − (m − 1)(j − 1))(cid:21)
(j − 1)(l − m + 1 − i)(cid:21)
n
The sum of roots of unity over j only gives a non-zero value if the integer q = l − m + 1 − i is a multiple
of n. Since q has a maximum of q = n − 1 when l = n, m = i = 1 and a minimum of q = 2 − 2n when
l = 1, m = i = n, only q = 0 and q = −n are eligible. Hence,
nXl,m=1
n−1Xr=−n+1
ci =
1
n2
=
=
1
n
1
n
nkl−m+1 (δ0,l−m+1−i + δ−n,l−m+1−i)
(n − r)kr+1 (δi−1,r + δi−1,n+r)
{(n − i + 1)ki + (i − 1)kn−i+2} ,
kn+1 ≡ 0
The second equality is obtained by reparametrizing r = l − m. (cid:3)
Sampling using FFTs
In order generate a sample u of length n from a multivariate Gaussian with mean vector m and circulant
covariance matrix C = Cn(c), one generates a zero-mean white noise vector x with unit variance and
then uses FFTs to compute u, i.e.
u = m +
1
n
F†nh(c)1/2 xi = m +
1
n
Cn(cid:16)F†n (c)1/2(cid:17) x
(31)
as the following calculation shows, the covariance comes out correctly
D(u − m)(u − m)TE =
=
Optimization method
1
n2 Cn(cid:16)F†n (c)1/2(cid:17)DxxTECn(cid:16)F†n (c)1/2(cid:17)T
Cn(cid:0)F†nc(cid:1) = Cn(c) = C
1
n
24
(32)
The optimization scheme used is a quasi-Newton method, where the vector of parameters Θ is updated
according to
where f is the function to be minimized (e.g. − log p(usom, s)), ∇f is the gradient, and the matrix B is
chosen to be
Θ(k+1) = Θ(k) − B(k)∇f(cid:16)Θ(k)(cid:17)
(cid:0)Θ(k)(cid:1) ,
if Hf(cid:0)Θ(k)(cid:1) positive definite
else
γ(k)G−1,
B(k) =(H−1
f
Where Hf is the Hessian of f , γ(k) denotes a learning rate, and G is a metric tensor on the parameter space
which is used to rescale the parameters to lie in similar ranges. The learning rate γ(k) < 0 is increased
when the previous step was successful (typically, by 10 percent), and reduced when the optimizer either
runs into boundaries of the admissible parameter region or increases the value of the function (we used
a reduction by a factor of 2).
Below, we derive the formulae for the gradient and Hessian required for the optimization. The
derivations hold for the case where the GP covariance function k is parametrized arbitrarily by θi and
the spike-shape kernel and adaptation kernel are given by linear combinations of basis functions α(k),
k = 1, ..., na and η(k), k = 1, ..., nw respectively.
Gradient
The likelihood function has the form
log p(usom, s) =
where
nXi=1"−
1
2
log(2πci) −
1
2n
ui2
ci
+ si log qi + (1 − si) log [1 − qi]# ,
qi = ∆teβui+Ai+log r0
is the probability of a spike in bin i and depends on all parameters except the ones that parametrize the
covariance function k. The membrane potential is given implicitly by
It is worthwhile to write the derivatives of log p in the following form:
u = usom − ur − α ∗ s.
d log p(usom, s) =
nXi=1"−
1
2 1
ci
i ! dci −
ui2
c2
1
n
1
nci
−
ℜ {u∗i dui} +
si − qi
qi(1 − qi)
dqi# ,
Now, let us evaluate all the terms one by one. The Fourier transform of the circulant covariance c only
depends on the GP kernel parameters θ, i.e.
(33)
(34)
(35)
(36)
(37)
(38)
dci =
∂ci
∂θk
dθk =
∂θk!i
nkXk=1 d∂c
dθk.
(39)
Let us turn to the q terms next. Their differential is
dqi =
∂qi
∂ui
dui +
∂qi
∂Ai
dAi +
∂qi
∂r0
dr0 +
∂qi
∂β
dβ = qi(βdui + dAi + d log r0 + uidβ),
(40)
25
where by (37) and using the fact that α is a linear combination of basis kernelsPnα
k=1 akα(k)
dui = −dur −
i dak, S(k)
S(k)
i = (α(k) ∗ s)i.
nαXk=1
Moreover, Ai is also a linear combination, so
i dwk, A(k)
A(k)
i = (η(k) ∗ s)i.
S(k)
i dak +
i dwk + d log r0 + uidβ! ,
A(k)
dui = −nδ1idur −
S(k)
i dak.
nηXk=1
nαXk=1
vi =
si − qi
1 − qi
,
Therefore (40) can be written as
dAi =
nηXk=1
dqi = qi −βdur − β
nαXk=1
Lastly, by (41) we also have
Using
all the previous results can be regrouped to yield
d log p(usom, s) =
ci
1
nXi=1"−
2 1
nαXk=1(cid:18) 1
+
nci
(41)
(42)
(43)
(44)
(45)
(46)
−
1
n
ui2
c2
ℜnu∗i
S(k)
dθk
∂θk!i
i ! nkXk=1 d∂ci
i vi(cid:19) dak
i o − βS(k)
nηXk=1
i vidwk
A(k)
+
+vid log r0
+uividβ
ℜ {ui} − βvi(cid:19) dur#,
+(cid:18) δ1i
ci
Hessian
For the Hessian, we mainly need the following
d 1
ci
1
2
i ! = −
ui2
c2
1
n
−
−
1
2 1
c2
i
i ! dci +
ui2
c3
2
n
1
nc2
i
−
ℜ {u∗i dui} ,
(47)
d(cid:18) 1
nci
ℜnu∗i
S(k)
1
nc2
i
i o(cid:19) = −
dvi = d(cid:18) si − qi
ℜnu∗i
1 − qi(cid:19) =
S(k)
i o dci +
1
nci
ℜn S∗(k)
i
duio ,
si − 1
(1 − qi)2 dqi =
ξi
qi
dqi,
where
ξi
qi
=
si − 1
(1 − qi)2 .
The components of the Hessian matrix are computed as follows
∂ci
∂θl" 1
c2
i
i #) ,
ui2
c3
2
n
−
ui
2# −
ci(cid:12)(cid:12)(cid:12)(cid:12)
∂ci
∂θk
1
2
1
n
∂2 log p(usom, s)
∂θk∂θl
∂2 log p(usom, s)
∂θk∂al
∂2 log p(usom, s)
∂θk∂ur
= −
= −
= −
∂c1
∂θk
1
ci
−
n(cid:12)(cid:12)(cid:12)(cid:12)
i ) ,
S(l)
i
c2
nXi=1( ∂2ci
∂θk∂θl" 1
ℜ( u∗i
nXi=1
1(cid:27) ,
ℜ(cid:26) u1
∂ci
∂θk
c2
∂2 log p(usom, s)
∂θk∂wk
=
∂2 log p(usom, s)
∂2 log p(usom, s)
=
= 0,
∂θk∂r0
∂θk∂β
ℜ( S∗(k)
ci
i
S(l)
i
) + β2S(k)
i S(l)
i ξi# ,
∂2 log p(usom, s)
∂ak∂al
∂2 log p(usom, s)
∂ak∂wl
∂2 log p(usom, s)
∂ak∂ur
∂2 log p(usom, s)
∂ak∂ log r0
∂2 log p(usom, s)
∂ak∂β
=
1
n
= −β
nXi=1"−
nXi=1
= −ℜ( S(k)
nXi=1
nXi=1
= −β
= −β
1
i A(l)
S(k)
i ξi,
c1 ) + β2
S(k)
i
S(k)
i
ξi,
ξiui,
S(k)
i
ξi,
nXi=1
∂2 log p(usom, s)
∂wk∂wl
∂2 log p(usom, s)
∂wk∂ur
∂2 log p(usom, s)
∂wk∂ log r0
∂2 log p(usom, s)
∂wk∂β
=
nXi=1
= −β
=
=
nXi=1
nXi=1
i A(l)
A(k)
i ξi,
A(k)
i ξi,
nXi=1
A(k)
i ξi,
A(k)
i ξiui,
26
(48)
(49)
(50)
(51)
(52)
(53)
(54)
(55)
(56)
(57)
(58)
(59)
(60)
(61)
(62)
(63)
∂2 log p(usom, s)
∂u2
r
= −
n
c1
+ β2
ξi,
nXi=1
∂2 log p(usom, s)
∂ur∂ log r0
∂2 log p(usom, s)
∂ur∂β
= −β
ξi,
= −
[vi + βuiξi] ,
=
nXi=1
nXi=1
nXi=1
nXi=1
nXi=1
=
=
ξi,
uiξi,
u2
i ξi.
∂2 log p(usom, s)
∂(log r0)2
∂2 log p(usom, s)
∂ log r0∂β
∂2 log p(usom, s)
∂β2
27
(64)
(65)
(66)
(67)
(68)
(69)
The components as given by equations (33-51) are then combined to form the Hessian matrix Hf , which
is used in Eq. (34).
28
Figure 7. S2 Fig. Supplementary Figure. Comparison of in vivo and artificial data snippets for
datasets D3 and D4, analogous to Fig. 3G,H. The scale (shown on panel D) is the same for all four
panels. Vertical lines are drawn at the spiking times. (A) A 2-second sample of in vivo activity from
dataset D3 (Zebra Finch HVC). (B) Artificial data sampled from AGAPE with parameters learned from
dataset D3. (C) A 2-second sample of in vivo activity from dataset D4 (mouse visual cortex). (D)
Artificial data sampled from AGAPE with parameters learned from dataset D4.
29
Figure 8. S3 Fig. Supplementary Figure. The fitting result as a function of the parameter δ for
dataset D1, see color code next to the plot of the marginal distribution of u in the second row of the left
column. The top left panel shows that the log likelihood peaks at δ = 18 ms, and the bottom right
panel shows the decrease of the effective coupling stength as δ increases.
30
Figure 9. S4 Fig. Supplementary Figure. The fitting result as a function of the parameter δ for
dataset D3, see color code next to the plot of the marginal distribution of u in the second row of the left
column. The top left panel shows that the log likelihood peaks at δ = 12 ms, and the bottom right
panel shows the decrease of the effective coupling stength as δ increases.
31
Figure 10. S5 Fig. Supplementary Figure. The fitting result as a function of the parameter δ for
dataset D4, see color code next to the plot of the marginal distribution of u in the second row of the left
column. The top left panel shows that the log likelihood peaks at δ = 32 ms, and the bottom right
panel shows the decrease of the effective coupling stength as δ increases.
|
1505.04432 | 1 | 1505 | 2015-05-17T18:34:12 | Coupled Hebbian learning and evolutionary dynamics in a formal model for structural synaptic plasticity | [
"q-bio.NC"
] | Theoretical models of neuronal function consider different mechanisms through which networks learn, classify and discern inputs. A central focus of these models is to understand how associations are established amongst neurons, in order to predict spiking patterns that are compatible with empirical observations. Although these models have led to major insights and advances, they still do not account for the astonishing velocity with which the brain solves certain problems and what lies behind its creativity, amongst others features. We examine two important components that may crucially aid comprehensive understanding of said neurodynamical processes. First, we argue that once presented with a problem, different putative solutions are generated in parallel by different groups or local neuronal complexes, with the subsequent stabilization and spread of the best solutions. Using mathematical models we show that this mechanism accelerates finding the right solutions. This formalism is analogous to standard replicator-mutator models of evolution where mutation is analogous to the probability of neuron state switching (on/off). The second factor that we incorporate is structural synaptic plasticity, i.e. the making of new and disbanding of old synapses, which we apply as a dynamical reorganization of synaptic connections. We show that Hebbian learning alone does not suffice to reach optimal solutions. However, combining it with parallel evaluation and structural plasticity opens up possibilities for efficient problem solving. In the resulting networks, topologies converge to subsets of fully connected components. Imposing costs on synapses reduces the connectivity, although the number of connected components remains robust. The average lifetime of synapses is longer for connections that are established early, and diminishes with synaptic cost. | q-bio.NC | q-bio |
Coupled Hebbian learning and evolutionary
dynamics in a formal model for structural
synaptic plasticity
H.P. Vladar and E. Szathm´ary
Parmenides Foundation
Pullach/Munich, Germany
November 18, 2018
Abstract
Theoretical models of neuronal function consider different mech-
anisms through which networks learn, classify and discern inputs. A
central focus of these models is to understand how associations are
established amongst neurons, in order to predict spiking patterns that
are compatible with empirical observations. Although these models
have led to major insights and advances, they still do not account for
the astonishing velocity with which the brain solves certain problems
and what lies behind its creativity, amongst others features. We ex-
amine two important components that may crucially aid comprehen-
sive understanding of said neurodynamical processes. First, we argue
that once presented with a problem, different putative solutions are
generated in parallel by different groups or local neuronal complexes,
with the subsequent stabilization and spread of the best solutions.
Using mathematical models we show that this mechanism accelerates
finding the right solutions. This formalism is analogous to standard
1
replicator-mutator models of evolution where mutation is analogous
to the probability of neuron state switching (on/off). Although in evo-
lution mutation rates are constant, we show that neuronal switching
probability is determined by neuronal activity and their associative
weights, described by the network of synaptic connections. The sec-
ond factor that we incorporate is structural synaptic plasticity, i.e.
the making of new and disbanding of old synapses, which we apply
as a dynamical reorganization of synaptic connections. We show that
Hebbian learning alone does not suffice to reach optimal solutions.
However, combining it with parallel evaluation and structural plastic-
ity opens up possibilities for efficient problem solving. In the resulting
networks, topologies converge to subsets of fully connected compo-
nents. Imposing costs on synapses reduces the connectivity, although
the number of connected components remains robust. The average
lifetime of synapses is longer for connections that are established early,
and diminishes with synaptic cost.
1
Introduction
Many mechanisms of cognition, memory and other aspects of brain function
remain unclear.
It is acknowledged that associations build up by updat-
ing synapses between neurons that spike (nearly) synchronously to a given
stimulus.
In this way some neuronal circuits can predispose or anticipate
a response to similar stimuli by retrieving information stored in synaptic
weights. Synaptic weights may in turn be systematically altered by success-
ful anticipation or recognition activity. At the same time, given the mul-
tidimensional space of alternative neuronal circuits and spiking sequences,
undirected random variation in circuitry and spiking are extremely unlikely
to produce better solutions for each new problem.
The connectivity overall of the human brain is sparse where, roughly, 1011
neurons are estimated to connect through some 1015 synapses. Learning and
2
cognition have been understood in terms of changes in associative weights
on networks of fixed topology. However, the discovery that rewiring this
network is not uncommon even in adult brains challenges the former views
regarding the mechanisms of learning. This rewiring, known as structural
synaptic plasticity (SSP), has been well documented experimentally [1, 2].
However, neither the full consequences nor the central role of SSP have been
fully clarified. Yet, it is not only reasonable, but also supporting evidence
exists, that SSP can encode information [3]. Thus, associative weights and
SSP are two mechanisms that have an effect on learning. These need not
be mutually exclusive; rather, as we show in this article, they both seem to
be necessary for different stages of learning, such as short and long term,
respectively.
Our knowledge about what determines the establishment of new synapses
is still limited, especially taking into account the sparseness and dimensions
of the brain. Neither synaptic weights nor SSP explain on their own vari-
ability in circuitry associated with a particular stimulus. As such, they only
show variability in time.
If trial solutions to a problem (such as learning
or recognizing a pattern) rely on serial evaluations, SSP is a poor candidate
mechanism, even for long-term learning. Under serial evaluations the time
for establishing new synapses would be prohibitively large to account for
randomly testing connections amongst pairs of neurons.
Changeux [4, 5] and Edelman [6] proposed a selectionist [7] framework
for brain function. They noted that selection acts, through preferentially
reinforcing and stabilizing some synaptic patterns over others, and through
the elimination of dysfunctional neurons and neuronal connections. Although
these ideas are correct, they are incomplete because they only consider the
fate of initial topological variability in circuitry, thought to occur only during
development. In their framework, selection acts on this standing variation,
stabilizing functional circuits that remain unchanged throughout life, with
later learning and problem solving resulting only from changing synaptic
3
weights. In this sense, the role of selection is limited to establishing functional
neuronal network at early stages. The ideas that we investigate in this article
go beyond this view: we consider that selection of novel variation plays an
active role in learning through life.
Kilgard proposed a verbal model that accounts for circuitry variation
during learning periods [8]. In his 'expansion-renormalization model' he en-
visions that SSP accounts for such variation. The mechanism is as follows.
When a cortical subnetwork is challenged by a novel task, new synapses are
being generated in response, out of which only the functionally important
ones are kept, while the obsolete ones are eliminated. This is like an iterated
Changeux-type overproduction-selective stabilisation mechanism, and is be-
ing explicitly regarded as a Darwinian mechanism by the author. However,
he fails to discuss particulars such as: what are the true units of variation,
and how this mechanism quantitatively acts. Our ideas are conceptually
similar, but we pin them down to specific 'learning' units and develop quan-
titative models to understand how this variability is generated and how it
affects learning.
We note that there are at least two other sources of neuronal variabil-
ity. The first one is the variance in spiking patterns and is due only to the
stochastic behaviour of neurons (cf. [9, 10]). The second one, which is more
fundamental, is due to SSP, which acts by rewiring the set of neurons in a
complex. Selection is then able to act on the variation that is generated by
the three mechanisms. We point out that the crucial one is SSP, but as we
will explain throughout this article, the three mechanisms play different roles
in learning.
We assume that circuits that result in a sub-optimal solution relative to
the rest of the circuits not only receive less reward, but also are more likely
to be 'overwritten' by transmitting the information in the form of synaptic
weights and structure from other local complexes. During this transmission
process, small variations are introduced to the new circuit through SSP.
4
Iterating this mechanism results in the increase in the representation of the
circuit that gives the best solution, gradually replacing other circuits until
no better variants are further produced, and finally (and ideally) a solution
is found. Our central aim is to understand how different neuronal complexes
might evaluate possible solutions in parallel and thus compete to converge
to an optimal result during learning (Fig. 1). For this, we put together all
these verbal ideas into a quantitative framework.
We study the properties that need to be sought in order to understand
more accurately how learning occurs. For this reason we build up from lo-
cal mechanisms of neural learning. That is, we set our problem at a time
scale that allows us follow whether neurons are found to be on or off. Each
neuron is assumed to fire stochastically, but with a probability given by the
input activity of other neurons in the complex. We will assume reinforcement
learning, and as other works, employ simple measures such as distance be-
tween the output and the target. We emphasize that this is analogous to the
gradient of a fitness landscape in evolution [11]. This analogy will allow us
to tackle the problem with full force, partly by employing the mathematical
models developed in evolutionary biology.
Despite the high level of abstraction of our approach, we acknowledge
that an ultimate verification of our hypothesis needs to come from experimen-
tal neuroscience. However at the moment we intentionally avoid discussing
molecular or physiological aspects, which although essential to understand
the problem experimentally, at this point would simply obscure understand-
ing what we propose are the strategic means through which the brain works
at the level we aim to describe.
1.1 Analogy with Darwinian Evolution
As stated above, so-called Neural Darwinism does not account for the gener-
ation of post-developmental variation repeatedly in circuitry, on which selec-
tive mechanisms could act. However, this is still not enough for a complete
5
Figure 1: Replicative neurodynamics.
(A) The input is fed into several local neuronal groups. (B) Each of these
groups evaluate the input independently, thus trying in parallel distinct spik-
ing patterns (represented by neurons in white and grey states), and (C) pro-
ducing distinct outputs with corresponding reward/fitness values W .
(D)
Groups that result in higher fitness transmit their synaptic weights to other
groups that performed poorly (connections amongst groups are assumed to
exist but are not displayed on the figure, and not explicitly modelled). This
parallel evaluation is repeated until an optimal solution spreads across all
groups.
6
implementation of adaptive evolution in the functioning of the brain. What
is missing is an interpretation of heredity in terms of neurophysiology, so
that the selected variants can be expanded and, from them further variants
be generated. In this way the interaction between selection, variability and
heredity can find the right spiking patterns to solve a problem [7].
The mechanisms for generating variability of neural spiking patterns are
relatively simple to rationalize, and there are many works in the literature
that take this aspect as modelling objective [12]. But it is less obvious,
of deeper implications and of far-reaching consequences, to realise that a
mechanism of 'neuronal heredity' between local complexes might exist.
As explained above, for neuronal heredity to occur it is necessary that
several local networks can act in parallel; stochastic variation in spiking is
not enough. Heredity occurs when circuits that have reached satisfactory so-
lutions transmit their contents to some other circuits that did not perform as
well (Fig. 1). Although there is no replication of the population of neurons
per se (as in a biological population), these repeated rounds of evaluation
and replacement implement a mechanism of heredity [7,13] that is analogous
to genetic inheritance. Admittedly, models of 'neuronal replication' thus far
have relied too much on accurate topographic mapping between local net-
works.
In general this assumption is unjustified. We hasten to note that
a neurobiologically realistic solution to this problem is already in our hands
and will be subject of forthcoming publications. We regard our present paper
a 'formal' one partly because we treat the component process of replication
as a black box of which the content will be revealed later. Thus we perform
an abstract analysis of evolutionary neurodynamics by linking basic theory
in neuroscience and evolutionary biology under the assumption that neuronal
heredity is solved. Note that the discussions on two mechanisms of accumu-
lating knowledge (by evolution and by learning) have been largely isolated
from each other. These two sides of the discussion are not exclusive. We of
course recognize that spiking neurons, Hebbian learning and SSP exist, and
7
are central components of cognition, but we argue that on their own, they
do not suffice for explaining how complex tasks are solved.
In this paper we merge these concepts formally and investigate how learn-
ing and Darwinian selection can work together to drive the system to optimal
solutions. Our approach is akin to models coupling learning and selection
by directly rewarding over stimuli (cf. the direct actor; [14], pp. 344-346),
which, as in our evolutionary approach, results in maximising the average
reward (i.e. fitness). However, our work has a wider scope since it also
merges other ideas such as neuronal copying and structural synaptic plas-
ticity (though see Discussion). We take a mathematical and computational
approach to understand the principal factors that are relevant and isolate
aspects that are in principle falsifiable. We show that for eyes educated in
evolutionary biology, the equations that describe the whole process are as-
tonishingly similar to the mutation-selection equations, albeit with a twist.
The quantity that is analogous to mutation rates is not constant since it
depends on the state of the whole system. The relevance of this difference
is that such 'mutation rates' derive from the associative (Hebbian) learning
mechanism, where the synaptic weights represent the strength of the associ-
ations, effectively represented by a graph with weighted edges. (This would
be equivalent to mutation rates that depend on the extant population diver-
sity.) When coupled to selection, the learning system is more efficient than
simple hill-climbing. This is our first central result. Second, we will consider
asymmetric landscapes and show that the learning weights correlate with the
fitness gradient. That is, the neuronal complexes learn the local properties
of the fitness landscape, resulting in the generation of variability directed to-
wards the direction of fitness increase, as if mutations in a genetic pool were
drawn such that they would increase reproductive success. Third, we study
how this mechanism is efficient in reaching optimal solutions in rugged land-
scapes. We show that the system often reaches sub-optimal solutions when
we assume random networks of synaptic connections. We identify these as
8
impasse states. That is, the network reaches a sub-optimal state where each
possible modification of the synaptic and spiking activity only decreases the
quality of the solution. However, when synaptic plasticity is considered, these
states are easily overcome. For this dynamics, we characterize the distribu-
tion of lifetimes of synaptic connections. This is a central aspect because it
is a quantity that can be measured experimentally. Although at this stage
we are not concerned with parameter estimation or inference, we do point
out that our results are in principle falsifiable.
2 Models
We note that on short time scales (milliseconds) spikes take place and the
selective dynamics can act by rewarding different sub-networks of the neu-
ronal circuit. Yet, variation in spiking can be produced due to changes in
synaptic weights. On a larger time scale, SSP generates novel circuitry. For
simplicity we separate these two time scales. We first describe the joint ac-
tion of selection in several groups and learning. For now we assume that all
groups have the same topology of connections, but each one has a different
spiking pattern; we describe SSP below.
2.1 Learning in parallel groups
In the spiking models, learning occurs by updating the weights that determine
the probability that a neuron fires. This update follows Hebb's rule, verbally
stated as 'neurons that fire together, wire together'. Hebb's rule has been
modelled with fixed connection topology where the weights are allowed to
change according to the covariance amongst neurons, as for example [15]:
∆φij = λXiYj
(1)
9
Table 1: Analogy between the concepts in evolutionary genetics
and neurodynamics.
Evolutionary genetics Neurodynamics
Loci/genes
Nr. of loci
Alleles
Allele frequency
Population
Adaptive landscape
Mutation rate
−
−
−
Neurons
Nr. of Neurons in a group
Neuron state (on/off)
Firing probability
Groups of neurons
Rewarding mechanism, score W
Switching probability
Hebbian weights
Learning rate
Synaptic cost
Symbol
i, j, k
n
X
ρ
N (= ∞)
A, M
φ
λ
k
does not (off), Yk =(cid:80)
where λ is the learning rate, X = 1 if the neuron fires (on) and X = −1 if it
i φkiXi is the output of neuron k, and φijis the weight
between neuron i and j. (Note: in the neuroscience literature, weights are
denoted by w, however this notation is potentially confusing in the context
of evolutionary analyses because a similar symbol is employed for fitness; see
Table 1).
Hebb's rule is problematic because it allows weights to increase unbound-
edly. Thus, for computational convenience, we employ Oja's rule, which is a
version of Hebb's rule with normalised weights:
∆φij = λYj(Xi − φijYj) .
(2)
Oja's rule ensures that the weights are normalised, in this case with Eucledian
norm, so that(cid:80)
i φ2
ik = 1.
Whether any one neuron spikes or not is assumed to be a random event.
The probability with which neurons change state (switch on or off) is given
by an update rule A that depends on the state of the input neurons and their
weights. Thus, the probability that a neuron i is on, P [Xi = 1] ≡ ρi is given
10
by the master equation
dρi
dt
= Aon
i = Pr[Xi : 0 → 1] and Aoff
i (1 − ρi) − Aoff
i ρi
i = Pr[Xi : 1 → 0] are the probabilities
where Aon
that inactive neurons spike and spiking neurons shut dow, respectively. We
assume that the update rule takes into consideration the state of both the fo-
cal neuron and the rest of the neurons in the group at the previous evaluation
round. We also assume a time scale that is larger than the refractory period,
so that that spiking is only affected by the previous state of the network.
(3)
Some models, such as Boltzmann machines (see [14]), assume that the
neuron itself has no memory, and its spiking probability is independent from
i = Pr[Xi = 1X] = 1 − Pr[X =
previous neuronal states. In this case Aon
0X]; the master equation gives
= Aon
i − ρi
dρi
dt
and the 'on' probability is given by
i = [1 + exp(−Yi)]
Aon
−1 .
(4)
(5)
For firing neurons the weights φ increase, so Aon
i
tends to grow to 1.
Hence, co-spiking neurons become more likely to fire in each evaluation
round.
However, we take a different approach by assuming that learning can
be modulated more efficiently by allowing Aon
to have an effect
i
on the network. Note that this description of learning is coarse-grained: it
only tracks how often a neuron tends to be on as learning proceeds. This
is a different view than that of machine learning, where neural networks are
trained by a set of examples from which the weights are inferred. Then, from
this inference the model can be used to predict or classify data that were not
and Aoff
i
11
included in the training set. Our goal in this paper is different: we consider
parallel networks that try to solve a specific problem.
Solving a particular problem requires some comparison between the tar-
get, T and the output or solution Ω. For this purpose, we can employ the
square deviation, ∆2 = (Ω − T )2 which we want to minimize. We assume
that T is a given parameter and Ω is the output evaluation of the network.
Each network presents an alternative solution, thus having a different devia-
tion ∆ from the target. Hence, we minimize the mean value of the deviation,
¯∆2 = E [(Ω − T )2]. Under a proper scheme of neuronal network replication,
this minimization amounts to Darwinian selection. This selective scheme is
the following: First, each local network is weighted according to its fitness,
given by W = exp(−β∆2]. Second, groups that have larger fitness are kept.
Third, networks with lower fitness are overwritten with the content (spiking
and/or weight states) of the groups with large fitness. (There are several
ways in which this copying can be implemented: this is the black box part
as explained above.). Since in the present model we assume that there are
infinitely many groups, replacement need not be done explicitly: we simply
consider the proportions of groups (this in order to have a direct link to clas-
sical population genetics models that assume infinite population size). Since
we assume that copying is random across different neuronal loci, then the
proportion of a group with a specific configuration is simply the product of
the probability of the state of each neuronal locus (this is analogous to the
Hardy-Weinberg assumption of population genetics; [11] pp. 34-39). Mathe-
matically, we track the proportions, ρ, of active neurons and the distribution
of weights across groups. For the former:
= ρi(1 − ρi)
where Wi is the fitness, and ¯W =(cid:80)
dρi
dt
i ρiWi the mean fitness. The first term
is well known to evolutionary biologists and computer scientists: it describes
∂ log( ¯W )
∂ρi
+ Mi(2ρi − 1)
(6)
12
the process of hill-climbing in the direction of fitness increase [11]. Note that
we can approximate log ¯W = ¯∆2 + var(∆). The second term represents the
variability that is generated throughout learning. For simplicity, we assumed
that the switching probability is symmetric (Mi = Aoff
i ), and which
is given by the activity rule
i = 1−Aon
where Yi =(cid:80)
Mi =
1
1 + eYi
(7)
j φijXj is the activity or current of the the input neurons, and
φijare the weights determining the associations amongst neurons, and which
evolve according to Oja's rule. As more spiking neurons are connected the
activity of the focal neuron increases and its switching probability decreases
asymptotically to zero. Whether a neuron stays on or off however depends
non-trivially on the collective success of reaching the target T .
each network has, on average, input activity ¯Yi =(cid:80)
Appendix A shows that to first-order approximation we can track only
the mean weight at every synapse and apply a general learning rule to all the
average activities of the ensemble of groups. That is, we approximate that
¯φij(2ρj − 1). This still
allows each network to have a different spiking pattern from those of other
groups. We will see below that even under these simplifying assumptions,
evolution has a dramatic effect by accelerating convergence to maximum
fitness (or minimum ¯∆2). We will assume small initial values of the synaptic
weights. Moreover, the variance of these becomes increasingly small as the
neuronal complexes converge to a solution. Thus, we will make no further
distinction between ¯φ and φ.
j
Summarizing, for n neurons and k synapses amongst them we work with
n + k ordinary differential equations. Initial conditions are assumed to be
random and the topology of the network is assumed to be fixed during each
learning round.
13
2.2
Information content of a synapse
How to measure the information content of a synapse is not obvious. First,
we point out that it is important to discern between local measures, such
information in a particular synapse, or global information in the whole cir-
cuitry of a complex, or even across complexes [16]. Different choices depend
on the specific purpose, and can be made according to distinct epistemologi-
cal views and/or experimental purposes. For the aim of this article we choose
one of the simplest measures, mutual information, H, because it describes
the interdependency amongst two specific neurons in the context of a specific
complex. Mutual information is defined as
(cid:88)
Hij =
r,s∈{0,1}
Pr[Xi = rXj = s]ρj log
(cid:20)Pr[Xi = rXj = s]
(cid:21)
ρi
A.
(8)
To calculate the conditional probabilities we first evaluate the input ac-
tivity Eij of neuron i by fixing the value of neuron j to ρj = 0 or 1. This gives
a conditioned value of the switching probability, Mij. Then, the solution to
Eq. 6, using the conditioned switching probability Mij, gives the desired
conditioned probabilities. In this case we keep the weights constant because
we are only assessing the information capacity of the specific synapse and not
the information capacity of the whole network. The exact expression of H is
derived in the Appendix B, where we also show that for Gaussian selective
landscapes information is approximately:
Hij = 6φ2
ijMiMj .
(9)
Mutual information quantifies how likely it is that, if one neuron spikes,
the other one will also do so.
If the neurons are not connected, φij = 0
implying Hij = 0. If the focal neuron i spikes randomly (large M ) then the
information content is low (in that case φij is expected to be close to zero).
Since 0 < φij < 1, the quadratic term dominates over M , which makes Hij
14
proportional to φ2
ij. Hence, the information of a synapse increases as the
weight increases. Note that for a given switching probability, the learning
weights are higher in sparse networks than in fully connected ones. Thus, to
an extent, the former encode more information than the later.
2.3 Structural synaptic plasticity
We implement SSP on a time scale different from that of associative learning.
The system described above is in terms of statistical averages, and can be
regarded as conditioned on a given network of connections. We assume that
synaptic connectivity changes occur in one arbitrary group (below we explain
how changes are introduced). If the new topology improves fitness, it spreads
across all groups. However, we allow for a random component to avoid
trapping in local optima, where the network is stranded in a state of impasse.
For simplicity this is implemented through a Metropolis-Hastings algorithm.
That is, if fitness increases with the new topology, this spreads to all groups.
If fitness remains unchanged or decreases, then the layer might spread with
probability exp(Wnew − Wold). Allowing for this fitness decrease facilitates
the escape from states of impasse.
We assume that changes in synaptic structure follow two heuristic rules
inspired from neuroscience. First, if two neurons are unconnected but they
are highly likely to spike, then a new synapse amongst them can be intro-
duced. There is evidence that synaptic rearrangements result from circuit
rewiring upon (e.g.
in neocortical pyramidal neurons) stimulation [17 -- 19].
Algorithmically, we randomly choose pairs of neurons with probability ρiρj
amongst the set of unconnected pairs of neurons. Second, we allow existing
synapses to be disconnected randomly with probability
R = exp[−αH] ,
(10)
where H is the synaptic information (Eq. 9. That is, if a synapse is in-
15
formative, then it is unlikely to be disconnected, whereas if it contains no
information, it is likely to be disconnected [3, 20, 21].
In addition, we perform a Metropolis acceptance/rejection system: if the
change in the network structure results in fitness increase, it is accepted. If
on the contrary, the change results in fitness decrease, it is accepted with a
probability proportional to the fitness ratio between that of the new network
to that of the old one.
3 Results
3.1 Selection and learning together speed up finding
solutions
W = exp[S(cid:80)
To understand how learning and selection jointly act we first assume an el-
ementary scenario, i.e. a simple hill climbing process where we target for
all neurons to be on. This situation results from a fitness function given by
i ρi], which has a constant gradient, ∂ρ log ¯W = S for every
neuron. (This can be seen as a limit where T is far from the current state,
thus S = 2βT ). We assume that Hebbian learning is slower than selection;
i.e. λ < S. This regime describes the coupling of rounds of learning with
copying across groups. Otherwise, learning would be completed indepen-
dently in each group, associating random spikes and would not be able to
learn the relevant features of the landscape. The associations that the net-
work makes would relate back to previous states, effectively acting against
hill climbing. However, in the regime where learning is slower than selection,
fitness increases the representation of solutions, and once these are stabilised,
learning can create meaningful associations. Figure 2 presents a typical out-
come where the process is characterized by three stages. We first observe an
initial exponential increase in the proportion of active neurons. Compared
with systems that do not learn the dynamics are similar on short time scales.
16
Figure 2: Example of selection-learning dynamics.
(A) Selection-learning dynamics
(black lines) compared to standard
mutation-selection with naıve transition rates (M ∼ 1/2; blue) and to the
run with the transition rates already learnt (red). Inset: evolution of fitness.
(B) Evolution of the transition rates. Inset: evolution of Hebbian weights.
n = 20, S = 5, λ = 0.001.
Initial conditions for allele frequencies and for
initial weights are randomly sampled from a uniform distribution U [0, 0.01].
The learning network is fully connected. Note the log-time scale.
This is because selection increases the representation of groups that provide
better solutions, but these are initially in very low proportions. These fitter
solutions are simply products of lucky stochastic events.
Initially there is
hardly any learning, indicated by light weights, and selective expansion sim-
ply amplifies those groups that have higher activity. This amplification takes
on the order of 1/S rounds of evaluation. As groups become selected learn-
ing takes over, entering an incubation period where associations are built up
because a good proportion of neurons fire correctly. After a learning period,
associations are fully strengthened and the solution is finally reached whereby
switching probabilities reach a minimum (Fig. 2B). The width of the plateau
has a duration of roughly 1
S . This regime is noticeable on a log-scale.
Although in absolute time the selective process is so quick that it might pass
unnoticed, this selection stage is crucial to explore configurations that can
be fixed through learning. We emphasize that this early stage corresponds
to the selective stabilization in the Neural Darwinism theory.
λ − 1
17
(A)�/��/λ0.010.1011010010001040.00.20.40.60.81.0TimeSpikingfrequencies0.010.1011010010001040.00.20.40.60.81.0Fitness0.010.1011010010001040.00.20.40.60.8TimeSwitchingprobability(B)0.010.101101001000104-0.20.00.20.4Associativeweights,ϕmaking W = exp[(cid:80)
Instead of favouring equally all neurons to spike, the landscape can be
set to favour distinct neurons to fire preferentially over others. For instance,
i Siρi] and allowing Si to take any arbitrary value intro-
duces asymmetries to the landscape. Crucially, if the dynamics are re-run
with the learnt weights, the equilibrium is reached order of magnitudes faster.
We stress that this is true even if initial spiking probabilities are randomised
(Appendix C).
Importantly, the switching probabilities become strongly correlated with
the fitness gradient, meaning that the associative weights learn the local
properties of the landscape. Figure 3 shows that scaling the relative switching
probabilities as Mi = Mi/Mm, where Mm is the largest M of all the neuronal
n − 1S/Mi of the form:
loci, then there is a universal behaviour with S =
√
M = e
− 1
S .
(11)
This is an approximate form which breaks down at very low values of S (see
Appendix D). Intuitively, we would expect that larger values of S would result
in small switching probabilities. What happens is that the coupling of the
system is sensitive to the distribution of S. For example, if all the selective
values are similar (i.e. the variance is low) then the corresponding M 's are
all low (e.g. red curves in the inset of Fig. 3). If the S's are distributed in a
wider range, then the M 's are also distributed more widely, but have, overall
larger values (e.g. black curves in the inset of Fig. 3). In other words, for a
given mean value of S, the average M increases with var(S). In fact, there
is a positive correlation between the variance of S and the mean switching
probability (data not shown). In turn, for a given variance of S, M decrease
with the mean of S. This means that most efficient complexes are composed
by neurons that are required to fire more specifically.
For a given system, the associative weights increase (asymptotically) with
the strenght of selection (data not shown). We performed performed Spear-
man's ranked correlation test to measure the strength of the dependency.
18
Figure 3: Relationship between selection intensity and associative
weights.
By scaling the switching probabilities with the maximum M of a network,
n − 1S/M , we obtain a universal
and scaling selection intensity as S =
behaviour (black line). The distinct symbols represent runs with (squares)
n = 5, (circles) n = 10 and (diamonds) n = 15 neuronal loci. For each n we
report 300 independent runs. The selective values at each locus are chosen
independently from a U [0, 10]. λ = 0.01, ρ0 U [0, 0.1], φ0 U [0, 0.01].
√
(Because of the non-linearity, 'standard' Pearson's correlation is not a good
measure for the dependency between S and φ.) In absolutely all cases the p-
values were numerically zero, indicating strong dependence amongst S and φ
(data not shown). This strong statistical support indicates that the synapses
encode the fitness gradient, directing variant spiking patterns accordingly:
strong selection results in strong weights, which in turn decrease the switch-
ing probability. This leads in minimal variability of spiking, which maximises
speed of fitness increase. Conversely, weak selection leads to poor associa-
tions resulting in large spiking variability, which allows exploration of the
landscape.
We note the learnt equilibrium point is independent of the learning rate
19
□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□□○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○○◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇02004006008000.750.800.850.900.951.00Scaledselectionstrength,n-1S/MScaledswitchingprob.M/M*●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●2468100.02400.02450.0250Selectivevalue,SSwitchingprob.λ. This turns out to be generally true, regardless of the fitness landscape.
We also note that under these 'directional landscapes' the initial conditions
(of both weights and allele frequencies) do not affect the equilibrium state
of the system. (However, later we will see that under more complex fitness
landscapes this is not true.)
3.2 Formal analogy between evolutionary dynamics and
neurodynamics
At this point we formalise further the analogy with evolutionary biology, and
more specifically with population genetics. First we realise that the bimodal
neuron model is analogous to a biallelic genetic system. We start by clarifying
a small but crucial difference in the notation. While in the models considered
in this paper neurons take states {−1, +1}, in population genetics alleles are
typically denoted as {0, 1}. The +/- notation is convenient mathematically
in order to describe Hebb's rules, thus in our evolutionary analogy we also
require this property. Hence if G is the value of a gene or allele, then we
define X = 2G − 1. In this way we can readily apply the machinery from
evolution to neuronal networks.
Second, we consider the spiking probability of a neuronal locus (node)
across all groups (Fig. 1). This average, which is the probability Pr(Xi) that
a neuronal locus i fires in some of the groups, is thus analogous to the average
E[2Gi − 1] = 2ρi − 1, where ρi are allele frequencies at locus i. Note that
allele frequencies are interpreted as the probability of sampling a particular
allele in the population. Thus, for the analogy to be consistent, population
size needs to be analogous to the number of groups involved in the learning.
Although in both populations of individuals and of neuronal groups numbers
are in fact finite, in this work we consider, as a first approximation, an
infinite number. In this way we do not need to worry about stochastic effects
that complicate the analyses. However, we recognise that randomness due
to finite population size (a.k.a. genetic drift) can play a crucial role in both
20
evolution and in learning. This is because randomness facilitates escaping
local peaks and exploring the landscape in a less constrained manner. But
before taking stochastic factors into consideration we want to focus on the
interaction between selection and learning in the infinite population model.
Third, upon reproduction a population generates a new set of individuals,
which sooner or later replaces the parental population. However, in neuro-
dynamics, reproduction has to be interpreted in a particular way, because
there is no generation of a new set of neuronal groups. However, the selec-
tive copying into groups with inferior performance effectively corresponds to
a new population of groups (Fig. 1D).
Given the analogies above, we can ask the converse question: what is the
interpretation of the learning process in evolutionary dynamics?
Equation 3 describes the activity changes of neural networks across it-
erations, leading to an update rule of the spiking frequency of each neuron.
In population genetics, this transition probability corresponds to a mutation
rate. In molecular evolution mutation rates are normally state-independent,
dictated by, for example, copying errors of the polymerases that replicate
DNA, repair mechanisms, or other molecular processes that do not depend
on the genetic states of the individual or population. (Although there are
genetic models that consider evolvable mutation rates; see Discussion.) The
switching probability Mi = 1/(1 + exp[Yi]) is dependent on the state of the
system, and follows directly from the update rule. Apart from this depen-
dency, the equations (Eq. 6) are analogous to a selection-mutation equation.
The resemblance is a natural outcome from the analogy laid out above.
But beyond the cosmetic similarity between the replicator-mutator equa-
tion and neural dynamics, the crucial difference is that the update rule is
able to learn the local properties of the fitness landscape. By doing so, hill
climbing towards a fitness peak is facilitated by generating variation directed
towards the fitness increase.
21
Figure 4: Neurodynamics in a stabilizing rugged landscape.
Model parameters: T = 15, otherwise as in Fig. 2.
3.3 Learning in rugged landscapes
We now consider the more complex adaptive landscape, given by W =
exp [−β∆2]. In evolution this kind of landscapes are known as 'stabilizing se-
lection'. The complexity of this landscape results from the non-linear effects
(known as epistasis in genetics and evolution). These are hard landscapes
to explore because there are many local peaks or solutions, some equally
optimal, some sub-optimal, and simple hill-climbing algorithms often fail to
converge to an absolute maximum of fitness.
Figure 4 shows the neurodynamics. We find that exactly 15 neurons fire
(with probability ρ = 0.995) and the remaining five remain off. In this case
the uninformative neurons are shut down. Which neurons spike and which do
not is contingent on the initial conditions, but in this landscape the identity
of each neuronal locus is meaningless. Different initial conditions can lead to
different but equivalent solutions (data not shown).
3.4 Random and sparse topologies of the neuronal con-
nections impair learning
So far we assumed that there are synapses amongst all pairs of neurons. Re-
laxing that assumption corresponds mathematically to fixing certain weights
22
0.010.1011010010001040.00.20.40.60.81.0TimeSpikingprobability(A)0.010.1011010010001040.00.20.40.60.81.0Fitness0.010.1011010010001040.00.20.40.60.8TimeSwitchingprobability(B)0.010.101101001000104-0.20.00.20.4Associativeweights,ϕφij to zero, indicating that no synapse exists among neurons i and j. Un-
der these circumstances the equilibrium switching and spiking probabilities
are more variable, with the spread determined by the connectivity of the
underlying learning network. Appendix E presents some neurodynamic out-
comes using different random topologies under directional and stabilising
landscapes. These topologies are drawn from different random graph models
with various degrees (see Methods). We tried Erdos-R´enyi, Barab´asi-Albert
(scale free) and Watts-Strogatz small world topologies. Each of these mod-
els has different statistical properties.
Irrespective of these, there are two
central conclusions. First, random networks lead to unfit solutions, where
the systems cannot reach the target. This is true regardless the target value,
number of neurons and type of topology. The systems typically converge to a
suboptimal solution where no further learning can happen and cannot escape
local optima. We regard this as a situation where a network that was previ-
ously functional for another task is repurposed for a new task, and the initial
topology is, regarding to the new task, arbitrary. Thus, the initial circuit is
not expected to be adapted to the new task. Consequently, what the system
can learn is only limited, and in the vast majority of cases, suboptimal. We
identify these solutions as states of impasse, which means there is no further
progress possible, because any small modification to the synaptic weights or
spiking patterns leads to a state with lower fitness score.
The second central conclusion is that poorly connected neurons have very
low input activity, leading to high switching probabilities. Highly connected
nodes have small switching probabilities with spiking frequencies close to
unity. Hence, only highly connected nodes (the less frequent) can learn ef-
ficiently. Since random topologies give suboptimal results, we consider that
details regarding specific network distributions are secondary and discuss
them only in the Appendix E.
Our choice of network distributions is arbitrary, motivated by mathemat-
ical convenience and scientific hype. Hence, the results above do not nec-
23
essarily imply that brains are suboptimal unless fully connected. However,
they reveal that in sparse networks, as in real neuronal complexes, Hebbian
learning does not suffice to solve complex problems because it too often leads
to impasses.
3.5 Structural Synaptic Plasticity
Structural synaptic plasticity is a mechanism that goes beyond the update of
existing synaptic weights (i.e. Hebbian learning) by allowing new synapses to
be established and old ones eliminated. This dynamical restructuring of the
topology of the neuronal networks as the system learns has been shown to be
important for the transfer of short-term to long-term memory [8]. However,
we test the role of SSP in the more general scenario of problem and impasse
solving.
Above we found that network topology impairs problem solving on com-
plex learning landscapes. This is paradoxical because there is clear evidence
that the brain is not fully connected, even though the type of connectivity
is disputed and tissue-dependent. But our negative results do not rule out
that there might be specific topologies that facilitate or optimize learning.
We now show that under synaptic plasticity, the neuronal complexes form
particular structures, which are unlikely to be recovered randomly, and thus
accounts for the negative results above.
A mechanistic description of SSP rooted in neurophysiological processes
is beyond the scope of this article, in part because much is unknown. Instead,
we propose a simple phenomenological model to show that SSP can not only
affect the outcome of the learning process fundamentally, but also that this
mechanism can resolve impasses. Further specific aspects keep the essential
features unchanged, even though some of these might be crucial for the actual
implementation of the cellular mechanisms that we explain using a simple
model.
A central feature of SSP in the neurodynamics is that, by modifying the
24
distribution of synapses, it provides new pathways to explore the space of
solutions. This is why SPP can be an efficient mechanism to escape impasses.
3.6 Dependency on the number of neurons
This random mechanism allows the neuronal networks to explore the space
of configurations, leading, on average, to an increase of fitness. Figure 5
shows that systems with few neurons evolve good solutions more easily than
larger systems. This is clear: finding an optimal configuration with a few
neurons requires fewer evaluations than larger networks simply because the
search space of the former is much smaller than that of the latter. The
number of possible configurations increases with n2, thus on the basis of
trying one modification at a time the convergence time increases non-linearly
with the number of neurons. However, although this holds true for our
model, there is no reason to think that there cannot be parallel evaluations
of different topologies in different complexes, dramatically alleviating this
inefficiency. However, in this paper we restrict ourselves to evaluating one
modification per iteration. Note that one step in the iteration does not
correspond to a physiological time unit because the Metropolis algorithm only
ensures convergence to the equilibrium distribution as dictated by detailed
balance and considers no information regarding the diffusion leading to said
equilibrium.
In each round of learning (i.e. after the system converged to equilibrium
with a newly tested network) the current weights are being kept, and new
connections are assigned to new random initial values. Alternatively, we can
simply reset all weights to random values. The second strategy proves to be
more efficient than the first. Whether spiking probabilities are reset or not,
proved irrelevant (data not shown).
25
Figure 5: Dynamics of structural synaptic plasticity.
Example of a random realization with n = 30 neuronal loci (fitness is scaled
to the maximum value). Inset: Absolute fitness as a function of neuronal
loci. Parameters: T = 7; otherwise as in Fig. 2. Synapses are assumed to
have no cost.
3.7 Structural plasticity leads to maximal connected-
ness
The resulting synaptic networks are straightforward. Recall that our test
problem chooses for a target number T of spiking neurons. Thus, the optimal
state has exactly T neurons on and the rest are off. Ideally, these T neurons
are fully connected amongst them. We find that the complexes correctly
converge to solve the problems, and, thanks to SSP, the networks that evolve
fully connect these active neurons (Fig. 6).
In other words, the systems
converge to networks that fully connect the required components to solve
the problem.
The convergence to fully connected networks is due to two factors. The
26
0501001502002500.650.700.750.800.850.900.951.00IterationRelativefitness●●●●●●101520253010-710-50.0010.100Numberofneurons,nAbsolutefitnessFigure 6: Evolved learning networks.
Example of evolved networks with n = 15 (left) and n = 20 (right) neuronal
loci. The colors indicate the frequency of active neurons. In both cases the
particular node labels are irrelevant, and the proportion of active neurons
depend on the initial conditions and the history of the process. Note that
irrespective of the number of neuronal loci, the number of active components
is correct. Parameters as in Fig. 5
first is the need to switch on the right number of neurons, which requires
strong synapses amongst them. The second is to switch off the unneeded com-
ponents; this also requires connected components because negative weights
between active and inactive decrease the probability of firing.
If negative
weights are not allowed, the system can only maximise fitness by ensuring
the right neurons are on, and the networks converge to fully connect these
components (Fig. 6).
3.8 Neuronal networks are robust to small costs of
synaptic connections
Now we penalize for the amount of connections that the networks have (Fig.
7). There are various reasons to assume this constraint. First, there are costs
associated to synaptogenesis. Second, there are higher metabolic costs due to
the transmission of action potentials, which increases at least proportionally
27
123456789101112131415123456789101112131415161718192010(if not allometrically) with wiring. Third, there are major spatial constraints
in the brain, limiting the amount of white matter that can be packed. In
order to take into account these and other reasons for limiting the amount
of neurons, we include a fitness cost to the system, exp[−kd], where k is the
cost per synapse, and d is the number of synapses (number of edges in the
learning network).
In Fig. 7 we observe that finding the solution to a problem is impaired
as the cost of establishing synapses is increased.
(In these examples we
target T = 7, but the particular choice of the target value is unimportant; in
the Appendix F we present results for other target values.) Clearly, this is
because the number of connections decreases with increasing cost, which in
turn compromises spiking specificity.
It might be unsurprising that the number of synaptic connections de-
creases with their cost, and naturally, the networks become less discrimi-
native as they lose connections. However, it is also true that they show a
notable level of resilience (graceful degradation), in the sense that even if
performance is somewhat impaired as synapses are eliminated the required
number of connected neurons is robust to the cost. In other words as the
cost increases the networks still converge to structures that connect (even
if sparsely) the necessary neurons (see Figs. 7B). The networks lose perfor-
mance as they lose synapses because neurons receive less input and therefore
their switching probability becomes higher. Nevertheless, they tend to re-
main connected with as many components as possible.
In the stationary state the distribution of networks is broad. As indicated
in Fig. 7B, the average number of synapses decreases with the cost; this is also
true for its variance (in Appendix G we present the degree distributions). The
meaning is that as the cost increases, each neuron establishes fewer synapses
with other ones. Also note that some of the components tend to have only
few connections. This is indicated by the notion of connectivity (Fig. 7B),
which is the number of synapses that we need to remove to separate the
28
network into two unconnected subsets. Typically in the evolved networks
this is due to a single poorly connected network, rather than to connected
sub-complexes interconnected by a few synapses. As costs are very high
(k ∼ 1), the networks are sparse and have several unconnected components.
We point out two important differences between random networks and
the evolved distribution of networks. First, taking the random network as
a null model (the Erdos-R´enyi, is the one that best matches the evolved
distributions, Appendix G) we expect a binomial distribution B[n−1, p]. The
observed distributions are reminiscent of the binomial using the empirical p's.
However in all cases we rejected the null hypothesis (χ2 tests, all p-values
numerically zero); the expected variances are too low.
Second, despite the variability in the distribution of the evolved networks,
these solutions are not in states of impasse. With fewer synapses, the input
activities of the neurons are lower, translating into larger switching proba-
bilities (Fig. 7C). This does not reduce specificity of firing: still the correct
neurons are more likely to fire in an idiosyncratic manner. However, there
is more 'background' noise due to fluctuations. We could say that for larger
costs, neurons are still accurate, albeit less precise.
3.9 Distribution of synaptic lifetimes
Part of the reason why our model shows a large variance in synaptic network
topologies is that we allow for synapses to continuously be established and
disbanded. We still ignore the quantitative and dynamical extent of these
processes, reason why we can only make arbitrary assumptions. Precisely
this, however, is an important point of falsification of our ideas. Irrespective
on the details regarding the assumed synaptic distribution, the observable
distribution can lead us to refine our model. Yet, the relevant aspect here is
not the details of the predicted distribution (since, as argued above we present
a simplified model), but the fact that we predict that there is a distribution
of synaptic lifetimes at all. For instance, Fig. 8 presents the timelines of
29
synapses. We note that many are short lived and a few live long. This result is
expected to hold regardless of the specific problem being solved, in as long as
we do not trace the identity of the neurons that the synapses are connecting.
Clearly, the number of long-lived synapses must increase with the number
of neurons in a complex. However, the lifetime distribution should hold
relatively robust. This is expected because what determines the lifetime of a
synapse is essentially its local information, and this is independent of other
properties of the network. For example, increasing the parameter α, which
controls how weaker connections are penalised, modifies the probability R
of synaptic disbanding so that the average synaptic lifetime become shorter.
If however the target or intensity of selection is changed, the effect on the
distribution of synaptic lifetimes is minimal (Appendix H).
Our results show that synapses that are established early tend to last
longer than synapses established in later developmental stages (Fig. 9A).
This is a natural outcome of the model; we have not imposed any mecha-
nism that presupposes this behaviour purposely. This happens due to his-
torical contingencies. Some of the synapses that are initially established lead
the network close to a local peak. Afterwards other synapses fine-tune the
network, increasing fitness in smaller amounts. Only after the network has
been populated, new connections can substitute the original ones. Figure
9B reveals how synaptic lifetime increases with the cost. For newly formed
synapses, low costs do not show a central trend, implying a certain degree
of resilience or robustness. In the long run, in the small cost range, synapses
established later live shorter as the cost increases. For larger cost range,
synaptic lifetimes tend to increase with cost. However, recall that for costs
k (cid:38) 0.5 the networks have low or no connectivity. As the cost increases, the
network starts to dispense with inhibitory connections. Recall that shutting
unwanted neurons down only decreases the background noise, but does not
affect the result of the 'good' neurons. Thus, synapses amongst these 'good'
neurons tend to live longer, as they are essential for the system's performance.
30
Due to the redundancy of optimal solutions occasional major restruc-
turing of the networks are expected to occur during lifetime for two reasons.
First, once a peak has been found, disbanding the principal connections leads
to major function impairment (fitness decrease). Second, establishing new
synapses that are potentially as good as the existing central ones is unlikely
due to the costs of synaptic connections. However, we do find occasional ma-
jor network restructuration. Because of the strong coupling amongst several
neurons and synapses, once a major connection is destroyed this can cause
further impairments by subsequent changes that result in even worse fitness.
At some point there is a restitution of the system when a new fitness peak is
approached. This has the qualities of self-organised criticality. However, it
might also be that the stochastic behaviour allows a few groups to shift from
sub-optimal solutions to better ones, effectively jumping across fitness peaks.
The subsequent replication of these successful solutions to other groups can
result on a full escape from impasse states.
(In evolution this process is
known as shifting balance; [22, 23].
4 Discussion
4.1 Relationship to previous models
Using a Bayesian framework, [12] proposed a model that explains aspects
of cognitive learning in children.
In their model, the brain implements a
Bayesian update algorithm to form theories based on observed data. They
stress that in contrast to a more reductionist 'connectionist' view, Bayesian
learners explain neuropsychological aspects of the dynamics of learning. In
their framework, theories map to a multidimensional landscape where well-
formed theories lie at peaks. The dynamics include learning, but only at as
a local process. They argue that learning cannot account for the invention of
new theories, but rather, only modify the degree to which we believe in any
given theory. That is, learning acts to fine tune the theory around a peak.
31
The proposal of new theories does not happen through learning, but through
stochastic modification of the existing theories (in a data-independent man-
ner, that is, there is random variation). If a new theory scores better than
the previous ones, it is adopted with certain probability [24].
This model is similar to ours, particularly in the implementation. How-
ever, there is nothing mystical about this coincidence. What Ullman et al..
and we describe belongs to the Markov Chain Monte Carlo class of mod-
els, which is a popular methodological toolbox in stochastic processes. One
important common aspect is that learning alone does not produce any new
configurations (networks in our case, theories in theirs), but only improves lo-
cal adaptation given the current configuration. Whilst their model describes
processes occurring at high level of cognition, we describe simpler processes
at the neurophysiological scale. However, we reach similar conclusions re-
garding the need and limitations of learning in relation to other processes
that can generate variant configurations that lead to a better performance.
This coincidence and its consequences (see discussion in Ullman's paper) are
preliminary evidence supporting our proposed physiological mechanisms.
Although Ullman et al.. do not discuss the states of impasse these are
implicit in their models. Also, the explanations they give in terms of 'theory
formation' are to a large extent equivalent to those of our model's. That
is, learning a local peak restricted to a given configuration results in weight
values that always lead to lower scores if any modification is introduced.
They resort to stochasticity (see below) as a mean to jump across peaks. In
our case this stochasticity is introduced via synaptic plasticity. There can
be other sources of stochasticity, which we address below. However, synaptic
plasticity is a component accounting not only for the necessary randomness to
escape peaks, but is also known to be an important component of learning.
The question of what generates circuit diversity remains so far open: we
propose that SSP can account for this diversity.
Note also the crucial difference in the search mechanisms in the two mod-
32
els. Kemp and Tenenbum [24] use a greedy search algorithm on stochastically
generated variation, whereas we adhere to the view of the Darwinian neu-
rodynamics, also known as the neuronal replicator hypothesis [25, 26]. The
point is that on vast combinatorial landscapes, evolutionary search is known
to produce impressive results. The greedy algorithm works for relatively
small spaces but for larger spaces more efficient search is needed, as Kemp
and Tenenbaum [24] acknowledge. It is remarkable that although Ullmann
et al. [12] explicitly draw a rugged conceptual landscape, the possibility of
evolutionary search is not mentioned. Interestingly, this can lead to predic-
tions. That is, we expect an inverse correlation between the rate of synaptic
turnover and the capacity to overcome impasses. For instance, the rate of
synaptic turnover tends to be slower in adults, who are often less able (or do
it at a slower rate) to overcome impasses in certain neuropsychological test
problems than children. It has not escaped our attention that this can also
be addressed through experimentation in animal models from several points
of view, from behavioural to neurophysiological.
Besides stochasticity in circuitry, as addressed in this paper, we iden-
tify at least two more stochastic sources. One has been addressed already
in the first part of or work. That is, the stochastic nature of neuron firing.
Particularly in our infinite layer model, the solution to any posed problem ex-
ists a priori, because possible spiking patterns combinations are represented.
Clearly, any arbitrary configuration will occur in an infinitesimally low pro-
portion. However, any random spiking pattern that is not causally supported
by a synaptic network is extremely unlikely to be repeated in the following
rounds of evaluation. Therefore even though it might be selected for one
round, this layer will be overwritten at a later stage. Thus the stochastic-
ity from neural spiking is not a source of heritable variation across groups.
Since neurons spike with probabilities given by their input activity the only
meaningful variation that can be produced is that which follows from mod-
ification of synaptic weights. However, as we have extensively argued, only
33
this provides the substrate for selection to act on a local basis.
We call attention to a partly related model by Seung [9] invoking 'he-
donistic synapses' that would release neurotransmitters stochastically, and
an immediate reward would either strengthen or weaken them according to
whether vesicle release of failure preceded reward, respectively. It was noted
that such randomness in synaptic transmission would play the role of muta-
tions in a Darwinian analogy. Seung also notes that stochasticity in action
potentials could play a similar role, and that mechanism would be faster [27].
But since ultimately these mechanisms operate on a fixed topology, the lim-
itations without structural plasticity remain. Note that 'copying' in our
mechanism is a fast component, intermediate between spikes and Hebbian
synaptic plasticity. This is a valid assumption if we assume that copying is
aided by dedicated adaptations (cf. Adams, 1998).
Another source of stochasticity can result from the competition amongst
not an infinite but a relatively small number of groups. In this case the de-
tails of how neuronal copying occurs can be important. Some of the N groups
that have a solution with superior fitness score have to overwrite some groups
that have lower score. This cannot be done in a proportional way, as in the
infinite layer model, partly due to the topographic, rather than merely topo-
logical structure of neuronal networks. Therefore, there is some randomness
of which groups are overwritten and which ones not. Naturally, the ones
with higher fitness are more likely to be transcribed to other groups, but
ultimately the process introduces fluctuations due to finite size. The nature
of these fluctuations is simply binomial on each neuronal locus (assuming
that each one is copied independently), introducing a variance of the order
of ρ(1 − ρ)/N . Thus if there are relatively few groups, the stochasticity is
strong, allowing for a shift in configurations, avoiding impasses and facilitat-
ing the convergence to the optimum. This might lead us to think that fewer
groups would be advantageous for this purpose. However, with very few
groups, this sampling effect overrides selection, no hill climbing can occur,
34
and thus no learning can happen. Hence, it becomes clear that there must be
a compromise between these factors, or even an optimal layer number that
ensures learning but facilitate impasses. (However we are of the opinion that
what limits number of groups are physiological costs, not this trade-off.)
Summarising, there are three central sources of stochasticity: in spiking,
in circuitry and random sampling. The first one is important for short-term
learning, whilst the second and third are important for long-term learning.
4.2 Gating can act as a selective mechanism
It could be argued that we do not require invoking layer copying in order
to solve problems or even impasses. For instance, gating mechanisms could
account for the selective amplification simply by overweighting the outcome
of solutions with larger score. In other words, gating can implement selection
as efficiently as a more complex network to network transmission mechanism.
This is because instead of increasing the number of groups that produce good
solutions, a single group with such a solution is rewarded preferentially.
To visualise the difference we make an analogy. Suppose we are mixing
several paint colours to reach a given tonality. For this purpose we have a
stock of basic colours and a set of pipes to a recipient where the colours are
mixed. Thus we need to pour a given amount a% of base paint A, b% of base
paint B, etc. Suppose that a > b. We can increase the flow of A over B (i)
through a single pipe, by adjusting the tap or (ii) we can use identical pipes
all of which have the same flow, just that for A we use more pipes than for
B. The former case is analogous to a gating mechanism, whereas the second
case is analogous to increasing the representation of the groups.
The direct actor models [14] describe a hill-climbing situation that is most
consistent with this gating mechanism. This is because the rewards, being di-
rected to neuronal activity, do not require a mechanism of neuronal copying.
Rather, it is enough for two (or more) competing agents to adjust output
voltage. This effectively implements hill climbing.
In the case of the di-
35
rect actor, gating mechanisms are conspicuously clear: learning acts directly
on the strength of selection, and the closer a complex is to a solution, the
stronger selection for it becomes, and the weaker the competing complexes
become. Although invoking gating seemingly renders the assumption of neu-
ronal replication obsolete, it also poses some issues. First of all, selection
through gating remains a local learning mechanism that can lead to local fit-
ness peaks resulting on impasses. In fact, if we assume that during copying
the whole content (not just one or few neuronal loci) is transferred to a new
layer, the equations that describe gating or copying are the same. Second, if
we want to consider SSP for long-term learning, then we require invoking a
mechanism that creates and tests novel circuitry, rather than acting on the
standing variation of the available strategies. In essence this mechanism has
to include copying of the group in order to evaluate which circuit is better,
and then discard the worse. Thus in any case, processes of neuronal copying
must exist.
However this criticism does not mean we are rejecting gating as a selec-
tive mean; we just point out that it is not enough to implement the complete
procedure of evolution-enhanced learning. In fact we embrace the possibility
that both mechanisms, namely gating and copying, can act together. This
is not only plausible for finite number of groups, but also an efficient way to
modulate the signal between selection and random sampling [13, 28], poten-
tially facilitating overcoming impasses.
4.3 Size of the neuronal complexes
The complexity of the brain is reflected by the dimension of its constituent
cells (billions of neurons) and by the intricate number of synapses (on the
order of trillions). In some way this accounts for the cognitive capacities of
humans, although how, it is not fully clear. We have presented a hypothesis
that serves as an organising principle for this complexity. However, we have
considered systems that employ as few as 10 neuronal loci on each layer.
36
Although this small number is partly motivated by computational easiness,
there are reasons to think that each layer might not require excessive number
of neurons. First of all, it is well known that the brain is highly modular,
with different neuronal complexes allocated to specific functions. We believe
that some of these modules might be specialized for processing information
in the way we propose, and thus, are expected to be sub-structured into
smaller functional complexes, each of which is constituted by a system of
interconnected groups acting in parallel and competing to solve tasks. Thus,
the actual number of neurons dedicated to any given task depends on the
number of groups that are recruited for processing a given input, not just
on the number of neuronal loci. Second, modular networks also facilitate
rewiring because finding the right network configuration becomes increasingly
harder for larger numbers of neurons. Hence, for an efficient implementation
of SSP, brains might work on a modular way to facilitate rewiring of small
complexes. Third, most complex tasks are likely to be split into subtasks,
each of lower complexity employing relatively small circuits. In this divide
& conquer strategy, these smaller circuits can in turn be included on larger
complexes to accomplish more elaborate tasks.
We may additionally argue that neuronal systems can show invariant
properties, so that larger networks behave in a way similar to smaller net-
works. For instance, distribution of synaptic lifetimes does not depend on
the size of the system, and is therefore invariant. Although we expect the
time required to reach a given solution increases with the size of the system,
we expect this time to scale in a particular way. This scaling may also imply
that more complex problems need to recruit more groups, although this is
not a straightforward requirement.
4.4 The expansion-renormalisation model
Kilgard proposed a verbal theory based on Darwinian dynamics that ac-
counts also for circuitry variation and stabilization, which he termed the
37
expansion-renormalisation model [8]. As mentioned in the introduction, the
ERM assumes the generation of variant circuitry, which results in accelerated
learning. He correctly points out that previous Darwinian frameworks do not
take into consideration mechanisms of variation. Kilgard accounts for such
variation in a verbal model; we have a similar stance regarding these ideas,
but our approach is a formal one. More specifically, unlike Kilgard's work,
we assume specific neuronal rules that account for circuit variability. SSP
constitutes the basic process that allows circuits to be modified. However,
resorting to SSP also demands understanding or assuming factors that drive
SSP with the purpose of circuitry modification. We have assumed two prin-
cipal means for variation of the network structures, namely establishment of
new synapses and disbanding of old synapses. The former follows a higher
instance of Hebb's rule, which simply means that unconnected neurons that
co-spike can become connected. The specific neurophysiological processes
that facilitate rewiring amongst two arbitrary neurons are unknown. Re-
garding the second factor of SSP, the disbanding of existing synapses, we
have introduced a novel idea. That is, we assume that the disbanding prob-
ability decreases with the amount of local information. Moreover, we have
shown that synaptic information is proportional to the square of the synap-
tic weights. This is an interesting result because it relates the mechanistic
aspects to the intuitive notion of neuronal function. Together, these two
mechanisms determine the dynamics of variation after layer replication.
On this line, Fauth et al. [20] propose and analyse a model for the distri-
bution of synapses between two neurons, by studying the interplay between
Hebbian learning and SSP in a similar way we have done. They assume a
constant rate of synaptogenesis for unconnected neurons, unlike the Hebbian-
like mechanism we employ. Synaptic disbanding occurs with probability
P r = po exp(−αφa
ij), where po, a and α are positive constants, which is of
similar form to our's, R (Eqns. 9 and 10). Although in their case this form
is not motivated by information content, they do point out that the topology
38
of the network might constitute the basis of information storage, and that
the role of this storage in memory. The topology, in turn, is determined by
the balance between synaptogenesis and disbanding. Thus, although they do
not explicitly assume that disbanding decreases with information capacity of
a synapse, in the context of our model their model comes down to precisely
that.
Kilgard's ERM hypothesizes that there must be a transient increase of
circuitry variability (expansion) with a subsequent pruning of sub-optimal
synapses, reducing the variation (renormalization). We have not seen evi-
dence for this. Rather, we find an increase of circuitry variability, with an
eventual stabilization. The Monte Carlo implementation allows for persis-
tent fluctuations and occasional 'avalanches', which afterwards recover and
re-establish the network functionality. Although the behaviour of Kilgard's
model and ours is different, we think that the disparity is superficial. The
expansion that creates a standing variation that is later reduced might occur
under specific fitness landscapes and might thus be problem-dependent. In
our case, since the fitness landscape has many equivalent maxima allowing
for equally good solutions, there is no force that generates excess variabil-
ity. However, certain types of non-linarites in the fitness landscape can cer-
tainly lead to that behaviour. It maybe that the 'expansion' phase of the
ERM is not a pervasive feature of neurodynamics, but rather, a context and
stimulus-dependent attribute. However, we must also point out that in our
implementation we only allow for circuit modifications in one layer at a time
(coincidentally, as Fauth et al. [20] do). This circuit might be either copied
to all groups, or discarded altogether. By assuming that many groups can
develop different circuits in the same evaluation round we might neverthe-
less find the expansion phase. (In fact in evolutionary models that allow for
high mutation rates there can be a transient increase of genetic variability,
which is equivalent to the expansion phase of the ERM; e.g. [29]). Finally,
it may well be true that new synapse formation is adaptive in that its rate
39
is increased by the appearance of novel tasks, for which there is some evi-
dence [1,30 -- 32]. This provocation-based mechanism would easily lead to the
expansion phase.
4.5 Towards replicative neurodynamics
In this article we theoretically test a novel mechanism for neural function. We
have found a crucial synergy between learning and fitness climbing, strength-
ening previous, related findings [13]. We have used simple models to show
that the combination of selection and learning is an extremely efficient one.
Moreover, we also showed the relevance of SSP in this context: modifications
of the learning topology of networks. However, there is another open possibil-
ity that can result from a combination of learning and plasticity. We showed
that certain networks are in general terms more efficient learners. Thus, the
recruitment of an existing, efficient network could in principle lead through
synaptic plasticity to the copying of its structure in the current network. In
an analogous way in which DNA is copied, an existing network could replicate
and such a structure would spread, allowing for problem solving. This has
been previously proposed as the neuronal replicator hypothesis [13,25,26,28].
The idea is very recent, reason why there has still been no experimental ver-
ification. But in this article we advanced the mechanisms that justify the
neural replicators. It remains open to study how the copying of the network
topologies can occur.
Related to the issue of exponential strengthening versus exponential repli-
cation, the path evolution algorithm by Fernando et al.. [33] is a remarkable
suggestion.
In that model, neurons along a path are assumed to code for
some behaviour. Whilst neuronal activity is fixed, paths grow collaterals
and thus recruit new nodes. Neuronal activity can spread along different
paths probabilistically that can be evaluated and compared according to
some performance (fitness) measure. Good paths become strengthened by
reward, whereas bad ones are weakened. Various paths can have few or many
40
common neurons. This algorithm explicitly incorporates structural plasticity
and selection and, despite the differences, is thus the closest precedent to our
model. We improve on that model in two respects: we present a mathemat-
ical framework (as opposed to mere simulations) that takes the first steps
to unite theory of learning with that of natural selection, and we consider
recurrent networks that posed a special problem for path evolution.
4.6 Mutations and recombination as creative sources
We should call attention to two possible usage of the term 'mutation' in the
neuronal context. One we have seen before: stochasticity in firing or trans-
mitter release. Another one structural plasticity itself: the term 'synaptic
mutation' was coined by Adams [34] in this latter sense, who by the way fore-
saw the potential importance of the phenomenon for the performance of the
nervous system. Note that [33] in their path evolution model use structural
plasticity to implement 'crossover' between different paths.
Although visually reminiscent to genetic recombination, the synaptic mu-
tations and the path crossovers are not formally equivalent to DNA crossover.
In genetics, recombination does not create new allelic variability (on/off prob-
abilities). Instead, it reshuffles the existing variants at any given locus. This
certainly results in a 'macromutation' at the phenotypic level, but the genetic
variability of the population remains intact. Thus, recombination does not
increase allelic variation, but it does increase variation across groups. The
distinction is important in the context of our work: we assume the equivalent
to high recombination. Namely, at any given neuronal locus, the copying can
occur from any other group, irrespective of the state of the other neuronal
loci. This provides the highest rate of reshuffling, and is thus 'creative'. The
contrary limit is when only the complete content of a selected group can
overwrite an out-selected group. This is an 'asexual' limit in that there is no
recombination. The latter provides the fastest selective response, but is less
creative because it has no combinatorial power.
41
4.7 Relationship to evolvability
Adam's synaptic mutations and Fernando's path-crossover are analogous to
modifications in the architecture of traits. This is a more powerful type of
macro-mutation because it truly modifies the decoding of the information
stored in neuronal states, in an equivalent way as development decodes the
genetic information into a trait, which is one of the fundamental aspects of
evolvability.
Evolvability is understood as the potential of a population to respond to
selection. How fast the response to selection is depends on the amount of
genetic (or heritable) variation that can be produced. This can be given by
standing variation, cryptic variation (due to epistasis, for example), or due
to mutational variance. Although high mutation rates will provide source
'material' to respond to selection, these will also create load that keeps the
population maladapted. However, the optimal scenario is achieved if muta-
tion rates can be increased as selection is started, and tuned down once the
population approaches adaptation.
As we saw above, this is precisely what happens with the neurodynamics
we have described. Of course, genetic systems do not have a learning mecha-
nism as the brain does. Nevertheless, these are analogous. We want to bring
the analogy further and interpret that the input current E as a quantitative
trait, with the weights φ taking the role of additive effects.
A previous model in quantitative genetics has taken an approach reminis-
cent of ours [35]. They did not apply a learning mechanism, but considered
modifier alleles for the mutational effects. These are selected indirectly, in-
creasing the transition rate in the direction of the highest increase in fitness,
in a way that is analogous to our switching probability, which generates
variability in order to improve fitness increase.
42
4.8
Information storage in neuronal circuits
Understanding the relationship between information capacity and synaptic
changes is central in order to understand learning, memory and other aspects
of cognition [3,17]. Under Hebbian learning, information storage relies solely
on the modification of synaptic weights and is contingent on the existing
connections. In the SSP scenario, the information capacity of neuronal com-
plexes is adjusted through modification of the connections [21]. Despite the
advantages of this mechanism in learning, it poses a challenge because of all
possible synapses that can exist between every pair of neurons, only a small
fraction is realised, even within a complex.
Even granting that SPP is a mechanism for the exploration of alternative
circuits, discovering the right synaptic configurations in this vast combina-
torial space is a major problem. Merely grasping the efficiency of the brain
in managing multiple tasks of combinatorial complexity demands an under-
standing of the mechanisms behind such capabilities. In other words, how is
the brain implementing algorithms for searching the combinatorial space of
solutions?
Our model introduces means to explore the combinatorial space, imple-
menting mechanisms that are analogous to biological evolution. From this
perspective, understanding the algorithmic means used by the brain comes
down to understanding and identifying what constitutes the units of selec-
tion and, crucially, what are the units of variability. This has been one of
the central questions of our research, which we have clarified by employing
our analogy with genetic systems.
Understanding the physiological basis of learning and cognition requires
the identification of the modifications that occur during learning, and which
result on specific circuitries directed by different stimuli and experiences.
However, we point out that there is a fundamental relationship between
units of learning and units of variability, which we must consider in order
to understand and identify which are the units of learning.
43
In our model information content is stored not in the activity of neurons,
but in the synaptic weights and switching probabilities. This has two impor-
tant implications. First, this suggests that the loci of memory are circuits
(not neurons), even though the mapping between memory loci and cognitive
functioning might be mediated through the coordinated spiking if individual
neurons (cf. [10]).
However, most importantly, we have shown that SSP is the process that
directly mediates establishment and disbanding of synapses resulting in cir-
cuits that represent solutions to specific problems. Previous findings also
support the notion that information is stored in circuits, not neurons [21,36].
Furthermore, at a higher cognitive level, it has been proposed that conscious-
ness can be gauged through information integration measures between neu-
ronal complexes [16]. At a phenomenological level it is well-known that the
SSP at the level of both spine growth and modifications of the synaptic net-
works is directly inflected by sensory experience [17, 18], or by manipulating
neuromodulators [19]. Despite these lines of evidence, which are compelling
for our theory, we still require and lack direct experimental verification re-
garding the minimal complexity in the circuit distribution that results from
solving particular tasks.
The second important implication is the procedural relationship between
learning and variability. Even when these two are not the same and they
constitute fundamentally two different processes, we have shown how learn-
ing fine-tunes the generation of variability. At the synaptic level, Hebbian
learning modifies switching probabilities, which are the mechanism for gener-
ating variability in spiking. At the level of circuitry, SSP dictates longer-term
changes, where informative synapses persist and uninformative synapses are
disbanded. Altogether these two processes mediate the exploration of the
complex combinatorial space by generating the required variability, guided by
learning. These are the 'fuel' for the motor that results in effective changes,
which are, ultimately, selection mechanisms.
44
Although the question of neuronal and circuit information storage has
been extensively discussed, to our knowledge, we are the first to consider
informational aspects as mechanisms that direct synaptic 'survival' and life-
times (see below). By showing that synaptic information between two neu-
rons is proportional to the learning weight and to the switching probabilities,
we identified a plausible and verifiable mechanism through which SPP can be
directed. This is crucial because we still ignore the causes and consequences
of structural plasticity at a cognitive level. Still our hypothesis is supported
by known facts, chiefly the experiences-driven SSP, where dendritic spine
growth is observed in vivo in the neocortex of adult rats [18, 21, 36].
4.9 The lifetime of synapses
Despite the known potential of neuronal complexes to undergo experience-
driven synaptic network restructuration [37,38], we still ignore how frequently
synaptic connections are modified in adult brains [17]. On the basis that the
number of synapses remains practically constant during adulthood, it has
been long argued that the rates of synapse establishment and disbanding
balance each other. Our result indicates that the length of synaptic lifetimes
follows a statistical distribution, and the question of synaptic stability is a
quantitative one rather than a yes/no statement. Once a stationary state has
been reached, the number of connections remains more or less constant with
an unchanging distribution of synaptic lifetimes. Even then, circuits are by
no mean fixed but, rather, show quite a degree of dynamism.
The SPP model of Fauth et al. [20] studies the equilibrium distribution
of synaptic connections between two neurons. In their work, as in ours, the
general shape of the distribution of synapses is robust to model parame-
ters. However, they analyse synaptic stability between two neurons, not the
general distribution of synapses of a network (whereas they allow multiple
synapses between neuron pairs, we do not take into account this possibility).
Through three-dimensional reconstruction of cultured neocortical cells it
45
was determined that 75% of the connections can be explained by assuming
that pairs of neurons connect randomly. However, the remaining 25% of the
connections requires invoking function, anatomic differences and positioning,
amongst others factors that facilitate chemical mechanisms for attraction or
repulsion in order to complete or avoid the establishment of new synapses
[39].
Direct experimental information regarding the rates of structural plastic-
ity comes from murine models. Although dendritic spines in the cortex of
adult brains tend to be rather stable, a proportion of them show considerable
variation, and experience can induce not only their growth or shrinkage [40]
but also de novo formation or elimination of spines, which, importantly, occur
at balanced rates. Importantly, these structural spine dynamics are known
to be similar in distinct parts of the brain [40 -- 42]. Consequently, it is safe
to assume that the physio-anatomical principles, if not the rates, that main-
tain the distribution of spine size and numbers are similar in distinct cortical
regions .
Although direct observation of synaptogenesis is more elusive (mostly due
to technical limitations), it is known that dendritic spines sometimes result
in new synapses [43]. Changes in axon terminals occur over several weeks in
young brains [44]. A compelling example is that of the visual cortex at early
ages, where synapses established during he developmental critical period are
stable for more than 13 months [45].
5 Numerical and Simulation Methods
5.1 Neuronal dynamics
To simulate the time evolution of a complex of multiple groups (effectively
infinite in number), where each has a fixed number of n of neurons, we solve
a system of coupled ordinary differential equations where n of them represent
the change in spiking probability, and, along with it, a set of differential equa-
46
tions that describe the change in learning weight (i.e. Oja's rule for Hebbian
learning). The number of learning equations depends on the connectivity of
the learning network, which we assume undirected. The initial conditions
for the spiking equations are random deviates from a uniform distribution
between zero and one (unless otherwise stated). The initial conditions for the
learning equations are random deviates from a uniform distribution between
(0, 0.01], unless otherwise stated. The system of equations are solved numer-
ically for t = 10000 time units. (This number ensures convergence of the
system for all parameters used, and overall is considered to be on the order
of ∼ 10 ms. Although we could choose S and other parameters such that the
system is measured in the relevant units, numerically it is more convenient to
employ the mentioned scale). All simulations were implemented and solved
in Mathematica 9.0 and/or 10.0.
5.2 Random networks
To explore learning network topologies, we generated random graphs from
three classes of distributions. The first one is the Erdos-R´enyi model (ER),
where nodes are connected randomly. This model assumes a fixed number of
nodes n and certain probability r that each node is connected to any other
node. The second model is the Barab´asi-Albert (BA), famous for its scale-
free properties. The BA model also employs two parameters that control
the network topology: the fixed number of nodes n and number k of vertices
that are preferentially attached to each node. The third model is the Watts-
Strogratz (WS), or so called small-world networks, which takes as parameters
n nodes and a probability r of rewiring a vertex amongst two nodes in such
a way as to avoid loops.
In all cases we forbid multiple edges and self-
connections. These network models are built-in Mathematica, and employed
as indicated in the software's Documentation Centre.
47
5.3 Structural synaptic plasticity
We assume that Hebbian learning happens faster than SSP, leading to a
separation of time scales. Consequently, we allow the learning equations to
reach equilibrium, and only then modify the learning network. We consider
the three modifications of a network indicated in the Model section. First,
we allow synapses to be formed by adding an edge amongst two unconnected
nodes i and j with a probability qij ∝ ρiρj. In this way, neurons that co-
fire tend to be wired together. Second, we allow synapses to be eliminated
by randomly removing edges between two connected neurons i and j with
probability Rij = exp[−αHij], so that neurons that do not co-fire tend to
be disconnected. Third, we also allow random rewiring (irrespective of firing
probabilities) with a small probability u = 0.01: we randomly and uniformly
choose a connected pair i, j and eliminate the edge, and at the same time
choose an unconnected pair l,m and establish an edge.
In each time step
any (including all) of the above events are allowed to happen. Once the
networks have been rewired, a new round of learning is performed. Initial
conditions may or may not be modified (see Results section). After a new
equilibrium is reached, the new fitness is compared to the fitness before the
rewiring. This is implemented through a Metropolis algorithm: if the fitness
is increased, the change is accepted, but if the fitness decreases, the change
is accepted with probability proportional to the ratio of new to old fitness.
We additionally impose a multiplicative fitness cost per synapse of exp[−kd],
where k is the penalty of each edge in the network, and d is the number of
edges of a given network. We typically run the simulations for at least 250
steps, to ensure convergence. However, in different experiments larger step
numbers are used, as indicated in the figures.
48
6 Acknowledgments
This work was financially supported by the EU FET-open project 'INSIGHT',
agreement number no 308943, by the European Research Council project
'EvoEvo', grant agreement no 294332 and by the Templeton Foundation
project 'Darwin and Hebb', FQEB Grant #RFP-12-19.
7 References
References
[1] Butz M, Worgotter F, Van Ooyen A. Activity-dependent structural
plasticity. Brain Res Rev. 2009;60:287 -- 305.
[2] Holtmaat A, Sovoboda K. Experience-dependent structural plasticity in
the mammalian brain. Nature Reviews Neurosicence. 2009;10:647 -- 658.
[3] Chklovskii DB, Mel BW, Svoboda K. Cortical rewiring and information
storage. Nature. 2004 Oct;431(7010):782 -- 788.
[4] Changeux JP, Courrege P, Danchin A. A Theory of the Epigenesis of
Neuronal Networks by Selective Stabilization of Synapses. Proc Natl
Acad Sci USA. 1973;20:2974 -- 2978.
[5] Changeux JP. Neuronal Man: The Biology of Mind. Princeton, NJ:
Princeton University Press; 1973.
[6] Edelman GM. Neural Darwinism. the theory of neuronal group selection.
Arizona: Basic Books; 1987.
[7] Fernando C, Szathm´ary E, Husbands P. Selectionist and evolutionary
approaches to brain function: a critical appraisal. Front Comput Neu-
rosci. 2012;6(24).
49
[8] Kilgard MP. Harnessing plasticity to understand learning and treat
disease. Trends Neurosci. 2012 Dec;35(12):715 -- 722.
[9] Seung HS. Learning in spiking neural networks by reinforcement of
stochastic synaptic transmission. Neuron. 2003 Dec;40(6):1063 -- 1073.
[10] Rolls ET. Advantages of dilution in the connectivity of attractor net-
works in the brain. Biologically Inspired Cognitive Architectures. 2012
Jul;1(C):44 -- 54.
[11] Crow JF, Kimura M. An Introduction to Population Genetics Theory.
Harper & Row; 1970.
[12] Ullman TD, Goodman ND, Tenenbaum JB. Theory learning as
stochastic search in the language of thought. Cognitive Development.
2012;27(4):455 -- 480.
[13] Fernando C, Goldstein R, Szathm´ary E. The neuronal replicator hy-
pothesis. Neural Comput. 2010 Nov;22(11):2809 -- 2857.
[14] Dayan P, Abbott LF. Theoretical Neuroscience. Cambridge, MA: MIT
Press; 2005.
[15] MacKay DJC. Information theory, inference, and learning algorithms.
Cambridge Univ. Press; 2003.
[16] Tononi G. An information integration theory of consciousness. BMC
Neurosci. 2004 Nov;5(42).
[17] Caroni P, Chowdhury A, Lahr M.
Synapse rearrangements upon
learning: from divergent -- sparse connectivity to dedicated sub-circuits.
Trends Neurosci. 2014 Oct;37(10):604 -- 614.
[18] Trachtenberg JT, Chen BE, Knott GW, Feng GP, Sanes JR, Welker
E, et al. Long-term in vivo imaging of experience-dependent synaptic
plasticity in adult cortex. Nature. 2002;420(6917):788 -- 794.
50
[19] Le B´e JV, Markram H. Spontaneous and evoked synaptic rewiring in
the neonatal neocortex. P Natl Acad Sci USA. 2006 Aug;103(35):13214 --
13219.
[20] Fauth M, Worgotter F, Tetzlaff C. The Formation of Multi-synaptic
Connections by the Interaction of Synaptic and Structural Plastic-
ity and Their Functional Consequences.
PLoS Comp Biol. 2015
Jan;11(1):e1004031.
[21] Poirazi P, Mel BW. Impact of active dendrites and structural plasticity
on the memory capacity of neural tissue. Neuron. 2001 Mar;29(3):779 --
796.
[22] Wright S. Evolution in Mendelian populations. Genetics. 1931;16:97 --
159.
[23] Wright S. The shifting balance theory and macroevolution. Annu Rev
Genet. 1982;16:1 -- 19.
[24] Kemp C, Tenenbaum JB. The discovery of structural form. Proc Natl
Acad Sci USA. 2008 Aug;105(31):10687 -- 10692.
[25] Fernando C, Szathm´ary E. Natural selection in the brain. In: Glatzeder
B, Goel V, von Muller A, editors. Toward a Theory of Thinking. Berlin:
Springer; 2010. p. 291 -- 340.
[26] Fernando C, Szathm´ary E. Chemical, neuronal and linguistic replicators.
In: Pigliucci M, Muller G, editors. Towards an Extended Evolutionary
Synthesis. Cambridge, MA: MIT Press; 2010. p. 209 -- 249.
[27] Werfel JK, Xie X, Seung HS. Learning curves for stochastic gradient
descent in linear feedforward networks. Adv Neural Info Proc Syst.
2004;in press.
51
[28] Fernando C, Karishma KK, Szathm´ary E. Copying and Evolution of
Neuronal Topology. PLoS ONE. 2008;3(11):e3775.
[29] Burger R. The mathematical theory of selection, recombination, and
mutation. Chichester: Wiley; 2000.
[30] Levy WB. Contrasting rules for synaptogenesis, modification of existing
synapses, and synaptic removal as a function of neuronal computation.
Neurocomputing. 2004;5860:343 -- 350.
[31] Butz M, Steenbuck ID, Van Ooyen A. Homeostatic structural plasticity
increases the efficiency of small-world networks. Front Synaptic Neu-
rosci. 2014;6:7.
[32] Butz M, Steenbuck ID, Van Ooyen A. Homeostatic structural plasticity
can account for topology changes following deafferentation and focal
stroke. Front Neuroanat. 2014;8:115.
[33] Fernando C, Vasas V, Szathm´ary E, Husbands P. Evolvable Neuronal
Paths: A Novel Basis for Information and Search in the Brain. PLoS
ONE. 2011 Aug;6(8):e23534.
[34] Adams P. Hebb and Darwin. J Theor Biol. 1998;195(4):419 -- 38.
[35] Jones AG, Arnold S, Burger R. The mutation matrix and the evolution
of evolvability. Evolution. 2007;61(4):727 -- 745.
[36] Stepanyants A, Hof PR, Chklovskii DB. Geometry and structural plas-
ticity of synaptic connectivity. Neuron. 2002 Apr;34(2):275 -- 288.
[37] Buonomano DV, Merzenich MM. ortical plasticity:
from synapses to
maps. Annu Rev Neurosci. 1998;21:149 -- 186.
[38] Knott GW, Quairiaux C, Genoud C, Welker E. Formation of den-
dritic spines with GABAergic synapses induced by whisker stimulation
in adult mice. Neuron. 2002;34:265 -- 273.
52
[39] Hill SL, Wang Y, Riachi I, Schurmann F, Markram H. Statistical con-
nectivity provides a sufficient foundation for specific functional connec-
tivity in neocortical neural microcircuits. Proc Natl Acad Sci USA. 2012
Oct;109(42):E2885 -- 94.
[40] Boothe RG, Greenough WT, Lund JS, Wrege K. A quantitative inves-
tigation of spine and dendrite development of neurons in visual cortex
(area 17) of Macaca nemestrina monkeys. J Comp Neurol. 1979;186:473 --
489.
[41] Bourgeois JP, Goldman-Rakic PS, Rakic P. Synaptogenesis in the pre-
frontal cortex of rhesus monkeys. Cereb Cortex. 1994;4:78 -- 96.
[42] Rakic P, Bourgeois JP, Eckenhoff MF, Zecevic N, Goldman-Rakic PS.
Concurrent overproduction of synapses in diverse regions of the primate
cerebral cortex. Science. 1986;11:232 -- 235.
[43] Toni N, Buchs PA, Nikonenko I, Bron CR, Muller D. LTP promotes
formation of multiple spine synapses between a single axon terminal
and a dendrite. Nature. 1999;402:421 -- 425.
[44] Purves D, Hadley RD. Changes in the dendritic branching of adult
mammalian neurons revealed by repeated imaging in situ. Nature.
1985;315:404 -- 406.
[45] Grutzendler J, Kasthuri N, Gan WB. Long-term dendritic spine stability
in the adult cortex. Nature. 2002 Dec;420(6917):812 -- 816.
53
Figure 7: Neuronal systems under costly synapses
(A) Dynamics of the fitness (relative to the maximum) of neuronal systems
under different cost per connection. Black curves on top:
low costs (k <
0.05). Colour curves:
intermediate costs increasing from k = 0.05 (red) to
k = 0.5 (blue). Grey curves at the bottom: high costs (k > 0.5). Each
curve is a replica of 77 independent simulations. (B) Equilibrium fitness as
a function of the synaptic costs. Inset: Average number of synapses of each
neuron (network degree) against the cost per synapse. (C) Mean switching
probabilities of the connected nodes against synaptic cost. Each point is
an average at the stationary values (last 50 time points) and over the 77
simulations. Parameters: n = 10, T = 7, S = 10, λ = 0.01.
54
0501001502000.000.050.100.150.20IterationMeanfitnessA●●●●●●●●●●●●●●●●0.010.050.100.5010.020.050.10SynapticcostEq.meanfitness●●●●●●●●●●●●●●●●0.010.050.100.5010.00.51.01.52.02.53.03.5MeandegreeB●●●●●●●●●●●●●●●●0.010.050.100.5010.300.320.340.360.380.40CostpersynapseMeanswitchingprobability,〈M〉AFigure 8: Timeline of synapses.
Each row corresponds to a particular synapse between a given pair of neurons.
Colors reflect the synapse length (only for visualization): blue: short lasting
synapses; red: short lasting synapses. In this case the cost of synapses is
k = 0; otherwise as in Fig. 7.
55
02004006008001000TimeSynapseFigure 9: Average lifetime of synapses, measured over one history.
(A) Relationship between average and standard deviation of the synaptic
lifetimes for 14 independent realisations. Colors indicate the synaptic costs
k as in the inset legend. (B) Average lifetime as a function of the cost per
synapse k. Different colors represent 14 different (independent) realisations.
In both panels: squares indicate synapses established at early stages (before
200 iterations) and the bullets: synapses established after reaching stationary
states (later than 200 generations). Parameters as in Fig. 7.
56
40608010012050100150200MeansynapticlifetimeStd.Dev.lifetimeAα=0.01α=0.02α=0.03α=0.06α=0.12α=0.22α=0.40α=0.740.010.050.100.501406080100120140Synapticcost,kSynapticlifetimeBLearningperiodPost-learningstationaryperiodA Hebb's and Oja's rule on the group ensem-
ble
In this appendix we want to show that we can approximate the ensemble of
weights by their mean. We will show that under certain assumptions, Hebb's
and Oja's rules apply on the average, plus some variance terms. We argue
that the variance terms are small and thus the average learning is enough.
This approximation allows a tractable analysis of the neurodynamics without
needing to follow the full distribution of associative weights in the ensemble.
We first work out the simpler case of Hebb's rule (Eq. 1 in the main text)
and then Oja's rule (Eq. 2 in the main text). We interpret the change in the
average weight as the average weight change, i.e.
(cid:28) dφij
(cid:29)
d(cid:104)φij(cid:105)
dt
(cid:39)
dt
,
(12)
where (cid:104). . .(cid:105) denotes average on the ensemble population (for simplicity we will
also use the 'bar' notation, e.g. φ to denote the same quantity. The average
is in principle taken on a joint distribution P[ψ, X], where the bolds indicate
the vector of values (weights and neuronal states). However, we will make
the simplifying approximation that all these quantities are independent. In
population genetics this corresponds to the 'Hardy-Weinberg' equilibrium,
which we take throughout this article.
Mean-field Hebb's rule From Eq. 1 in the main text we have that
dφji
dt
= λ(cid:104)XiYj(cid:105) .
(13)
57
Using the definition of the activity, Yj =(cid:80)n
k(cid:54)=j φjkXk we have that
(cid:104)XiφjkXk(cid:105) +(cid:10)φjiX 2
i
(cid:11)(cid:33)
(cid:32) n(cid:88)
k(cid:54)=j
dφji
dt
= λ
.
(14)
We now use the independency assumption to further develop the two
averages. The first term is
(cid:104)XiφjkXk(cid:105) = (cid:104)Xi(cid:105)(cid:104)φjk(cid:105)(cid:104)Xk(cid:105) = φjk(2ρk − 1)(2ρi − 1)
(15)
(in as long as i (cid:54)= j). The second term is
(cid:10)φjiX 2
i
(cid:11) = (cid:104)φji(cid:105)(cid:10)X 2
i
(cid:11) = φij.
(16)
Now we put together the two expressions, complete the sum to include
terms i and some algebra gives that
(cid:32)
dφji
dt
= λ
(2ρi − 1)
(cid:33)
φjk(2ρk − 1) + φji4ρi(1 − ρi)
n(cid:88)
k(cid:54)=j
(17)
Note that (2ρ − 1) is the average input activity and that 4ρi(1 − ρi) is its
variance. Then
dφji
dt
= λ ¯Xi
¯Yi + λφjivar(Xi),
(18)
where the notation ¯Y is a shorthand for the output of the average activity
(and not the average output, which is a correlation between X and φ).
The last expression shows that, to a first order approximation, Hebb's
rule can be applied to the average. In most cases var(Xi) is small. Moreover,
once the system has substantially or fully learned, then ρ = 0, 1 making the
second term vanish.
(cid:4)
58
Mean-field Oja's rule We proceed in a similar way as above, averaging
over Oja's rule (Eq. 2 in the main text). First note that there are two terms:
= λ(cid:0)(cid:104)XiYj(cid:105) −(cid:10)φjiY 2
(cid:11)(cid:1) ;
j
dφji
dt
(19)
(21)
(22)
(23)
the first terms is given by the right-hand side of Eq. 18. Thus we concentrate
in working out the second term. We begin by expanding the Y 2:
(cid:10)φjiY 2
j
(cid:11) = 2
(cid:88)
k(cid:54)=l(cid:54)=j
(cid:104)φjiφjkφjlXkXl(cid:105) +
jkX 2
k
(20)
(cid:10)φjiφ2
(cid:88)
k(cid:54)=j
(cid:11) .
Now we use the assumption of independency. However, we must note that
not all the terms on the first sum are independent, bacause some symbols
can repeat. We first write
(cid:104)φjiφjkφjl(cid:105) (2ρk − 1)(2ρi − 1) +
(cid:10)φjiφ2
jk
(cid:11)
(cid:88)
k(cid:54)=j
(cid:10)φjiY 2
j
(cid:11) = 2
(cid:88)
k(cid:54)=l(cid:54)=j
Now consider that
(cid:104)φjiφjkφjl(cid:105) =
ji
if k (cid:54)= l (cid:54)= i
if l (cid:54)= k = i
if k (cid:54)= l = i
φjiφjkφjl
(cid:10)φ2
(cid:11) φjl
(cid:11) φjk
(cid:10)φ2
(cid:40)
(cid:10)φ2
(cid:11) if k (cid:54)= i
(cid:11) =
(cid:10)φ3
(cid:11)
if k = i
φji
jk
ji
ji
and in the second sum(cid:10)φjiφ2
jk
This separates the two sums into five sums. The rest of the derivation
It continues by completing the
is somewhat lengthy but straightforward.
59
missing terms of sums and then simply rearranging, and it leads to
j
(cid:10)φjiY 2
where(cid:10)∆φ3
(cid:11) = φjiY
(cid:11) =(cid:10)φ3
ji
ji
2
j + var(φji)X iY j + φji
(cid:11) − φji
(cid:10)φ2
ji
(cid:11).
(cid:88)
(cid:10)φ2
(cid:11) (var(Xk) − 1)
+ φjivar(φji)(var(Xi) − 1) +(cid:10)∆φ3
k(cid:54)=j
jk
(cid:11) (24)
ji
Finally, we note that altogether we can write the mean field on Oja's rule
as the rule of the average activity:
dφji
dt
= λY j(X i − φjiY j) + λ × variance terms.
(25)
(cid:4)
B Mutual information contained in a synapse
Mutual Information is defined as
(cid:88)
r,s∈{0,1}
(cid:20)Pr [Xi = r Xj = s]
(cid:21)
Pr [Xi = r]
H[I, J] =
Pr [Xi = r Xj = s] Pr [Xj = s] log
(26)
The unconditioned probabilities are simply the 'allele' frequencies. Namely,
Pr [Xj = 1] = ρj
Pr [Xj = 0] = 1 − ρj
(27)
(28)
Conditional spiking and switching probabilities. To compute the
conditional probabilities we evaluate the activity of the neuron i with the
60
conditioned value for the neuron j, namely
Yij =
φki (2ρk − 1) + φji (2Xj − 1) .
(cid:88)
k(cid:54)=i,j
This leads to a conditioned switching probability Mij
Mij =(cid:0)1 + exp(cid:2)Yij
(cid:3)(cid:1)−1
(29)
(30)
This conditional switching probability leads to a dynamical equation with the
new activity, whose equilibrium frequencies are Pr [Xi = 1Xj = s] = ρij and
Pr [Xi = 0Xj = s] = 1−ρij. The conditional frequency is by the equilibrium
of
(cid:0)1 − ρij
(cid:1) ∂ρi log(cid:2) ¯W(cid:3) + Mij
(cid:0)1 − 2ρij
(cid:1)
(31)
d ρij
d t
= ρij
For the directional selection case the solution is
ρij =
and for stabilising selection
(cid:113)
S − 2Mij +
2S
4M 2
ij + S2
(cid:32)
1 +
(cid:114)
1 − 4Mij
S
(cid:33)
.
ρij =
1
2
,
(32)
(33)
We evaluate on the evolved weights because we want to measure how one
neuron is dependend on one other. Clearly another possible mutual infor-
mation measure is to allow the whole network to relax with the constraint
(including weights). However, this global measure asseses the capacity of the
whole neuronal complex. By evaluating only the local mutual information
we measure directly the information content contained in it.
61
Note that Yij can be written as
Yij =
φki (2ρk − 1) + φji (2Xj − 1) =
(cid:88)
k(cid:54)=i,j
(cid:88)
k(cid:54)=i
φki (2ρk − 1) + φji (2Xj − 1) − φji (2ρj − 1)
(cid:88)
k(cid:54)=i
=
φki (2ρk − 1) + 2φjiδρ(Xk)
(34)
with δρ(Xk) = Xk − ρk. Consequently, we can express the conditional switch-
ing probability as
Mij = (1 + exp [Yi] exp [2φjiδρj]) −1.
(35)
We assume that both φji and δρ(Xk) are small and expand Mij in series of
δρ, to get
Mij = Mi − 2Mi (1 − Mi) φijδρj + 2Mi (1 − Mi) (1 − 2Mi) φ2
ijδρ2
j
(36)
Since this last expression does not depend explicitly on ρi, the equilibrium
value of ρij is algebraically the same as that of ρi but with Mi → Mij (Eqns.
32 and 33).
62
Approximating mutual information. The sum in Eq. 26 resumes four
terms that we can write explicitly:
H[I, J] = (1 − ρi0) (1 − ρj) log
(cid:20)(1 − ρi0)
(1 − ρi)
+ ρi0 (1 − ρj) log
(cid:21)
(cid:21)
(cid:20)ρi0
(cid:20)(1 − ρi1)
ρi
(1 − ρi)
+ (1 − ρi1)ρj log
(cid:21)
(cid:20)ρi1
(cid:21)
ρi
(37)
+ ρi1ρj log
Substituting Eqns. 32/33 and 36 into the last formula gives the exact
expression for H[I, J], which is lengthy and complicated. Using automated
algebra software (Mathematica 10.0) we perform a series expansion on φij to
second order. Using the fact that S >> M we get that, in both selective
scenarios:
+ O(cid:0)M 2(cid:1)
2MiMjφ2
ij
S2
(38)
H[I, J] =
(cid:4)
C Dependency of the dynamics on the initial
conditions of neuronal spiking
In this appendix we present results that show that once a system learns the
landscape, the retrieval of the information is much quicker than learning, and
it is independent of the initial conditions of the spiking probabilities.
The way we assess this quick retrieval effect is by first solving the full
dynamics. Once in equilibrium, we fix the Hebbian weights and compute the
corresponding switching probabilities Mi at each neuronal locus.
After the learning phase has been completed, we run the dynamics for
63
the neuronal probabilities ρi with this fixed Mi's but by choosing random
initial spiking frequencies (uniformly in the interval (0, 1)). We measure the
state of the system relative to the fixed point of the learning neurodynamics,
ρ∗, and calculate the euclidian distance from this state:
(cid:118)(cid:117)(cid:117)(cid:116) n(cid:88)
Df p =
i − ρi(τ )]2.
[ρ∗
i
Because by time 1/S the ρi have increased in representation, by time τ = S
(1/S < S << 1/λ) they are very close to the fixed point, and we expect Df p
to be very close to zero.
Figure 10A presents the results form simulations where we randomise
initial conditions after learning. The figure shows how the average and the
variance of the distance (over multiple realisations) to the fixed point quickly
decays to zero, and by time τ = S it is already negligible. Figure 10B
shows the mean and variance of a set of ensembles under number of different
neuronal loci n and different fitness landscapes.
D Scaling of selection intensity and associa-
tive weights
We show here the scaling of Fig. 3 in the main text.
First, consider that of all neuronal loci there is one that has the maximum
switching probability, which we denote with the subscript m. We denote the
relative switching probability as Mi, which by the definition of M is
Mi =
Mi
Mm
=
1 + eEm
1 + eEi
.
(39)
64
Figure 10: Effect of initial conditions on the dynamics of learning.
(A) Eucledian distance to the fixed point Df p of the learning dynamics
(red) and the average on an ensemble (100 samples) of dynamics with learnt
weights (black) with random initial conditions for the spiking probabilities.
The shadowed region in grey covers the standard deviation.
In this ex-
ample n = 10 ; the landscape is asymmetric with gradients Si given by
{3.1, 3.2, 4.6, 4.8, 4.8, 4.9, 6.2, 7.8, 8.1, 9.9}. (B) Mean and variance of the dis-
tance to the fixed point Df p of an ensemble of simulations under different
numbers of neuronal loci n (see inset legend) at time τ = S = 10. Each
point is an average over 30 runs with learnt weights and randomised initial
conditions for the spiking probabilities with distribution U (0, 1). For each
of these ensembles the landscape is a random vector with each component
distributed as U (0, S]. Other parameters as in Fig. 3 in the main text.
65
0.010.101101000.00.51.01.52.02.53.0TimeDfpA01.×10-102.×10-103.×10-104.×10-105.×10-106.×10-1001.×10-202.×10-203.×10-204.×10-205.×10-206.×10-20\.08〈Dfp〉\.08Var(Dfp)n=5n=6n=7n=8n=9n=10n=11n=12n=13n=14n=15BAs a first approximation we note that for large activity values
Mi (cid:39) exp(Em − Ei) .
(40)
The activity difference ∆i = Em − Ei is:
(cid:88)
j(cid:54)=m
φmj(2ρj − 1) −(cid:88)
k(cid:54)=i
∆i = Em − Ei =
φik(2ρk − 1) .
(41)
The two sums overlap at all but two indices: j = i and k = m, respectively.
Hence
∆i = φmi(2ρi − 1) − φim(2ρm − 1) +
(φmj − φij)(2ρj − 1) .
(42)
(cid:88)
j(cid:54)=m,i
As a second approximation we assume that weights are of the order φ ∼
(n − 1)− 1
2 . Consequently the sum is negligible and
∆i (cid:39) 2
ρi − ρm√
n − 1
.
The equilibrium condition of the neurodynamical equation gives
(cid:16)(cid:112)
ρ =
1
2
4µ2 + 1 − 2µ + 1
(cid:17)
(43)
(44)
where µ = M/S. Assuming that S >> M we have that to first order in µ,
ρ (cid:39) 1 − µ. Thus,
∆i (cid:39) 2
µm − µi
√
n − 1
.
(45)
A third approximation follows: since µm is the term with the largest S,
√
then, compared to most µi, it is negligible. Therefore ∆i (cid:39) −2µi/
n − 1.
Summarising, the relative switching probability is:
Mi (cid:39) exp
− 2µi√
n − 1
.
(46)
(cid:21)
(cid:20)
66
Now, simply call S =
√
(cid:4)
n − 1S/M , so we get the scaled relationship
(cid:104)−1/ S
(cid:105)
Mi (cid:39) exp
.
(47)
E Effect of the topology of the network
The number of neurons in the brain is vast; yet it is very sparsely connected,
with a modular nature. Empirical measurements suggest small world topolo-
gies. However, what lies behind this distribution, and how truly 'random'
it is, remains unclear. From the point of view of our framework, we can
evaluate what effect different topologies have on the neurodynamics.
We can interpret the random topologies in two ways. First, under the
Changeux selective (but not evolvable) scenario where neuronal circuits are
fixed, we can think that from the point of view of an arbitrary cognitive task,
any pre-established circuitry is essentially random. Second, under the 'neu-
ronal replicator hypothesis' , we can think that once some neuronal groups
allocated for a new task, has a current state of the circuitry optimised for a
previous task. However from the point of view of the new task, the current
configuration is random and potentially uninformative.
In this supporting text, we study how random topologies affect the neu-
rodynamics. We consider learning networks that have topologies drawn from
random network distributions, but which remain constant during the learning
process. For any given random topology we run the selection-learning system
on a stabilising landscape with a randomly placed optimum value (which also
remains constant during a run). We consider systems with between 5 to 30
neuronal loci.
We first evaluate the effect of Erdos-Renyi (ER) topologies. These are
random networks built simply by placing random connections amongst two
nodes with a probability p. Although we do not have any reason to believe
67
Figure 11: Distribution of switching probabilities of neuronal circuits
with Erdos-Renyi topologies.
(A) Empirical probability function on the outcome of the selection-learning
process. (B) Relationship between switching probability and the degree of
each neuronal locus. In each simulation we randomise the initial conditions
(as in the figures in the main text), the position of the optimum (uniformly
in the real interval [1, n − 1]) and the learning network (using a random p).
For each n we perform 1000 simulations. λ = 0.01.
that this ER network distribution is realised in neuronal circuits, it is the
most basic pattern of random networks, providing a baseline of uncertainty.
Figure 11A shows the distribution of the equilibrium switching probabilities
M under ER distributions for different number of neuronal loci. The pattern
is clear: most neurons spike in a random, unspecified way. This is reflecting
the fact that the systems are unable to find solutions. Figure 11B shows the
dependency of the switching probabilities against the degree of each neutron
(numbers of synaptic connections with other neurons). Only as the degree
increases some neurons can be more specific. However, generally speaking
the spread the spread of the values is high.
We can compare these patterns with that of fully connected neuronal
circuits (Fig. 12). In this case the switching probabilities are bimodal with
peaks close to M = 0 and M= 1, indicating highly specific firing, as argued
in the main text.
We also perform a similar analysis with Watts-Strogats (WS) 'small
world' topologies. These kinds of networks have become popularised through
68
0.00.20.40.60.81.00.00.20.40.60.81.0Switchingprobability,MCumulativeprobabilityn=5n=10n=15n=20n=25n=30AFigure 12: Distribution of switching probabilities for fully connected
neuronal circuits.
As in figure 11, but with using fully connected networks. n as in the inset of
Fig. 11A.
the "six degrees of separation" motto. The key property of small world net-
works is that any node can be reached from any other by connecting through
a small number of intermediary nodes. Unlike the ER networks which often
have disconnected nodes, the WS networks are very well connected. Some
works have reported that neuronal networks have this kind of properties [].
Figure 13A shows that under this random network models, there is an
almost uniform distribution of switching probabilities M , although there are
almost no circuits with neurons that fire specifically. This occurs because
although the circuits as a whole are well connected, each neuron has only
very few connections (Fig. 13B), which in turn, results in low activities at
most neurons.
Figures 14-15 and shows the neurodynamics assuming a random networks
for the circuit topology. These examples show that in both cases the systems
are unable to learn do to the constraints imposed by the network topology.
We see that most neurons reach a state where they do not fire specifically.
We see this learning process that is unable to learn on an existing circuitry
as a state of impasse as defined in cognitive psychology: any alternative that
can be reached under the current configuration or representation leads to an
even worse 'solution'. Algorithmically, this corresponds to a local optimum
69
0.00.20.40.60.81.00.00.10.20.30.40.50.6Switchingprobability,MCumulativeprobabilityFigure 13: Distribution of switching probabilities of neuronal circuits
with Watts-Strogatz small world topologies.
As in figure 11, but with Watts-Strogatz deviates with a random rewiring
probability. n as in the inset of Fig. 11A.
on the fitness landscape.1
F Dynamics of structural plasticity under synap-
tic costs
Figure 16 shows the evolution of fitness for neuronal systems targeting dif-
ferent values T . Although the mean fitness decreases with T , this has no
consequences on the outcome of the system. This is because the success of
neuronal group only depends on the relative advantage to other neuronal
groups with different configuration. The relevant pattern is the decrease of
performance as the synaptic costs increase.
G Distribution of the evolved networks
As reported in the main text, the neuronal circuits become less connected
as the cost per synapse k increases. Figure 17 shows that the distribution of
degrees (number of synapses per neuron) becomes more skewed as k becomes
larger.
70
0.00.20.40.60.81.00.00.20.40.60.81.0SwitchingprobabilityCumulativeprobabilityAFigure 14: Neurodynamics under random (Erdos-Renyi) circuit
topologies.
(A) Neurodynamics (inset: fitness) (B) Switching probability (inset: associa-
tive weights). (C) Topology of the neuronal circuit. Parameters as in Figs.
2,4 of the main text.
Figure 15: Neurodynamics under random (Watts-Strogatz) circuit
topologies.
(A) Neurodynamics (inset: fitness) (B) Switching probability (inset: associa-
tive weights). (C) Topology of the neuronal circuit. Parameters as in Figs.
2,4 of the main text.
71
0.010.1011010010001040.00.20.40.60.81.0TimeSpikingprobabilityA0.010.10110100100010400.000010.000020.000030.00004Fitness0.010.1011010010001040.00.20.40.60.81.0TimeSwitchingprobabilityB0.010.101101001000104-0.50.00.51.0Associativeweights,ϕC0.010.1011010010001040.00.20.40.60.81.0TimeSpikingprobabilityA0.010.10110100100010405.×10-60.000010.0000150.000020.000025Fitness0.010.1011010010001040.00.20.40.60.81.0TimeSwitchingprobabilityB0.010.101101001000104-0.50.00.51.0Associativeweights,ϕCFigure 16: Neuronal systems under costly synapses
(A-D) Dynamics of the fitness (relative to the maximum) of neuronal systems
under different cost per connection (see legend in A) and different target val-
ues (A: 4; B: 5; C:10). Each curve is a replica of 16 independent simulations.
(D) Equilibrium fitness as a function of the synaptic costs. Each point is an
average at the stationary values (last 50 time points) and over 16 simula-
tions (except for T = 7 which is the data in Fig 7 int he main text). Filled
diamonds T = 4; open diamonds T = 5; filled bullets T = 7; open bullets
T = 10. Parameters as in Fig. 7 in the main text.
72
0501001502000.010.050.100.501IterationMeanfitnessAα=0.01α=0.02α=0.03α=0.06α=0.12α=0.22α=0.40α=0.740501001502000.010.050.100.501IterationMeanfitnessB0501001502000.010.050.100.501IterationMeanfitnessC◆◆◆◆◆◆◆◆◇◇◇◇◇◇◇◇○○○○○○○○●●●●●●●●●●●●●●●●0.010.050.100.5010.020.050.100.200.50SynapticcostEq.meanfitnessDFigure 17: Degree distribution of the evolved neuronal circuits.
The data corresponds to the simulations of Fig.
in the main text. The
histograms are constructed by taking the last 50 points of 112 simulations
and pooling the degrees of all networks. Since each circuit consists of n = 10
neuronal loci, there are in total 55000 data points in each histogram.
Note that there are always zero classes because the target value T deter-
mines that the optimal circuit consist of T neurons that are fully connected
(particularly with high in-degree) and n − T that are either disconnected or
have zero in-degree. Consequently, because this sets a lower bound for the
number of unconnected neurons. The distribution of degrees is dependent
on both the synaptic cost and the target values (Fig. 18) .
We tried fitting several distributions: Erdos-Renyi, Watts-Strogatz, Pois-
son, Binomial, and scale free networks, and none fits well the empirical dis-
tributions.
73
DegreeProbability02468100.00.20.40.60.81.0k=0.0102468100.00.20.40.60.81.0k=0.01402468100.00.20.40.60.81.0k=0.01802468100.00.20.40.60.81.0k=0.02502468100.00.20.40.60.81.0k=0.03402468100.00.20.40.60.81.0k=0.04602468100.00.20.40.60.81.0k=0.06302468100.00.20.40.60.81.0k=0.08602468100.00.20.40.60.81.0k=0.1202468100.00.20.40.60.81.0k=0.1602468100.00.20.40.60.81.0k=0.2202468100.00.20.40.60.81.0k=0.2902468100.00.20.40.60.81.0k=0.402468100.00.20.40.60.81.0k=0.5402468100.00.20.40.60.81.0k=0.7402468100.00.20.40.60.81.0k=1.Figure 18: Mean degree of the evolved neuronal circuits for different
targets and synaptic costs.
Each point is an average at the stationary values (last 50 time points) and
over 16 simulations (except for T = 7 which is the data in Fig. 7 int he main
text). Filled diamonds T = 4; open diamonds T = 5; filled bullets T = 7;
open bullets T = 10. Parameters as in Fig. 7 in the main text.
74
◆◆◆◆◆◆◆◆◇◇◇◇◇◇◇◇○○○○○○○○●●●●●●●●●●●●●●●●0.010.050.100.50101234Synapticcost,kMeandegreeH Distribution of synaptic lifetimes
In this Appendix we present further results on the distribution of synaptic
lifetimes. We ran extensive simulations with an alternative target values
from that on the text, T = 4. (Due to prohibitively long computation times
we chose to sacrifice analysing more target values in order to focus on one
value, but with sufficient statistical power.)
Figure 19 shows results for pooled samples of synaptic lifetimes of 14
simulations each lasting 1000 steps. We partition the synaptic lifetimes into
'early (learning) period', and 'late (post-learning) period'. At the learning
period, there seems to be no relationship between the average lifetime and
the standard deviation of the synaptic lifetimes, whereas for the pos-learning
stationary period there is a clear trend (Fig. 19). This trend seems to be
independent of the target values. The average synaptic lifetimes seem to be
largely independent of the synaptic costs (Fig. 19B).
Despite the fact that there is a clear difference between the synapses
established early and those established late, Mann-Whitney tests on the each
of the different simulations give p−values that are largely variable, and very
often fail to reject the null hypothesis that the distributions of early and late
synapses are distinct (Fig. 20). However, pooling the replicate simulations
leads, in all cases to reject the null hypothesis (Table 2).
75
Figure 19: Synaptic lifetimes for different costs and targets
(A) Relationship between the average and standard deviation of the synaptic
lifetimes. (B) In both panels: blue T = 4, red T = 7; rectangles: synapses
established during early, learning periods (before 200 iterations); bullets:
synapses established in post-learning periods (at or after 200 iterations).
The data is pooled from 14 independent runs each with of 1000 iterations.
Other parameters as in Fig. 9 in the main text.
Cost \Target T = 4
k = 0.010
k = 0.018
k = 0.034
k = 0.063
k = 0.117
k = 0.215
k = 0.398
k = 0.736
Table 2: p−values of pooled simulations
1. × 10−2
4. × 10−5
4. × 10−4
3. × 10−5
3. × 10−9
2. × 10−11
2. × 10−15
5. × 10−12
T = 7
4. × 10−4
2. × 10−2
3. × 10−5
8. × 10−5
5. × 10−8
5. × 10−6
1. × 10−8
1. × 10−6
Test as in Fig. 20 but with pooled samples.
76
40608010012050100150200250MeansynapticlifetimeSTDevsynapticlifetimeA0.010.050.100.501406080100120Synapticcost,kSynapticlifetimeBFigure 20: Significance of the difference of synaptic lifetimes during
and after learning
The plots show the p−values for Mann-Whitney tests (note the log-scale);
all with confidence 0.05. Null hypothesis H0: the mean of the distributions
of synaptic lifetimes during learning and post-learning periods are different.
Alternative hypothesis: Ha the mean of the distributions are different. Marks
at p = 0.01 actually indicate that p ≤ 0.01. The data corresponds to the
simulations of the previous figure (and also Fig. 9 of the main text).
77
|
1805.09999 | 1 | 1805 | 2018-05-25T06:30:50 | Subdivisions of the posteromedial cortex in disorders of consciousness | [
"q-bio.NC"
] | Evidence suggests that disruptions of the posteromedial cortex (PMC) and posteromedial corticothalamic connectivity contribute to disorders of consciousness (DOCs). While most previous studies treated the PMC as a whole, this structure is functionally heterogeneous. The present study investigated whether particular subdivisions of the PMC are specifically associated with DOCs. Participants were DOC patients, 21 vegetative state/unresponsive wakefulness syndrome (VS/UWS), 12 minimally conscious state (MCS), and 29 healthy controls. Individual PMC and thalamus were divided into distinct subdivisions by their fiber tractograpy to each other and default mode regions, and white matter integrity and brain activity between/within subdivisions were assessed. The thalamus was represented mainly in the dorsal and posterior portions of the PMC, and the white matter tracts connecting these subdivisions to the thalamus had less integrity in VS/UWS patients than in MCS patients and healthy controls, as well as in patients who did not recover after 12 months than in patients who did. The structural substrates were validated by finding impaired functional fluctuations within this PMC subdivision. This study is the first to show that tracts from dorsal and posterior subdivisions of the PMC to the thalamus contribute to DOCs. | q-bio.NC | q-bio | Subdivisions of the posteromedial cortex in disorders of consciousness
Running head: Posteromedial cortex subdivision and consciousness
Yue Cui, PhD1,2,3,*, Ming Song, PhD1,2,3,*, Darren M. Lipnicki, PhD4, Yi Yang, MD5,
Chuyang Ye, PhD1,2,3, Lingzhong Fan, MD1,2,3, Jing Sui, PhD1,2,3,6,9, Tianzi Jiang,
PhD1,2,3,7,8,9,#, Jianghong He, MD5,#
1 Brainnetome Center, Institute of Automation, Chinese Academy of Sciences, Beijing
100190, China
2 National Laboratory of Pattern Recognition, Institute of Automation, Chinese
Academy of Sciences, Beijing 100190, China
3 University of Chinese Academy of Sciences, Beijing, China
4 CHeBA (Centre for Healthy Brain Ageing), School of Psychiatry, University of New
South Wales, Randwick, NSW 2031, Australia
5 Department of Neurosurgery, PLA Army General Hospital, Beijing, China
6 The Mind Research Network and Lovelace Biomedical and Environmental Research
Institute, Albuquerque, NM 87106, USA
7 Key Laboratory for NeuroInformation of Ministry of Education, School of Life
Science and Technology, University of Electronic Science and Technology of China,
Chengdu 610054, China
8 Queensland Brain Institute, University of Queensland, Brisbane, QLD 4072,
Australia
1
9 CAS Center for Excellence in Brain Science and Intelligence Technology, Institute
of Automation, Chinese Academy of Sciences, Beijing 100190, China
Corresponding authors:
# Jianghong He, MD, Department of Neurosurgery, PLA Army General Hospital,
Beijing, China (Phone: +86-1-66721961; Fax: +86-1-64057752; E-mail:
[email protected])
# Tianzi Jiang, PhD, Brainnetome Center, Institute of Automation, Chinese Academy
of Sciences, Beijing 100190, China (Phone: +86-1-82544778; Fax: +86-1-82544777;
E-mail: [email protected])
* These authors contributed equally to the manuscript.
2
Abstract
Evidence suggests that disruptions of the posteromedial cortex (PMC) and
posteromedial corticothalamic connectivity contribute to disorders of consciousness
(DOCs). While most previous studies treated the PMC as a whole, this structure is
functionally heterogeneous. The present study investigated whether particular
subdivisions of the PMC are specifically associated with DOCs. Participants were
DOC patients, 21 vegetative state/unresponsive wakefulness syndrome (VS/UWS), 12
minimally conscious state (MCS), and 29 healthy controls. Individual PMC and
thalamus were divided into distinct subdivisions by their fiber tractograpy to each
other and default mode regions, and white matter integrity and brain activity
between/within subdivisions were assessed. The thalamus was represented mainly in
the dorsal and posterior portions of the PMC, and the white matter tracts connecting
these subdivisions to the thalamus had less integrity in VS/UWS patients than in MCS
patients and healthy controls, as well as in patients who did not recover after 12
months than in patients who did. The structural substrates were validated by finding
impaired functional fluctuations within this PMC subdivision. This study is the first to
show that tracts from dorsal and posterior subdivisions of the PMC to the thalamus
contribute to DOCs.
3
Key words: default mode network; diffusion tensor imaging; disorders of
consciousness; parcellation; parietal cortex; persistent vegetative state
4
1. Introduction
Patients surviving severe brain damage may develop a long-term disorder of
consciousness (DOC), such as vegetative state/unresponsive wakefulness syndrome
(VS/UWS) or minimally conscious state (MCS). Evidence from brain imaging studies
suggests that disconnections within thalamocortical areas of the default mode network
(DMN) are implicated in DOCs (Boly et al., 2009; Fernández-Espejo et al., 2011;
Fernandez-Espejo et al., 2012; He et al., 2015; Rosazza et al., 2016; Soddu et al.,
2012; Vanhaudenhuyse et al., 2010). The posteromedial cortex (PMC, i.e.,
precuneus/posterior cingulate cortex) is the structural (Hagmann et al., 2008) and
functional (Utevsky et al., 2014) core of the DMN, and diffusion magnetic resonance
imaging (dMRI) of DOC patients has revealed white matter damage in connections
between the PMC and thalamus (Fernandez-Espejo et al., 2012). A resting state
functional magnetic resonance imaging (fMRI) study found reduced PMC-thalamic
fluctuations in DOC patients compared with healthy controls (Boly et al., 2009),
which accords well with our previous findings of disrupted functional connectivity
between the PMC and thalamus in DOC patients (He et al., 2015). These findings
suggest that the PMC and thalamus play important roles in determining levels of
consciousness. Other studies have shown fMRI or PET can help in predicting
recovery from a DOC. For example, functional connectivity strength discriminated
between DOC patients who regained consciousness within 3 months and those who
did not, with the most discriminative region being the PMC (Wu et al., 2015), and
5
PET predicted long-term recovery (i.e., 12 months after baseline assessment) of
patients with VS/UWS (Stender et al., 2014).
Previous studies of the PMC in DOC patients have investigated this large region as a
whole (Boly et al., 2009; Fernandez-Espejo et al., 2012; He et al., 2015; Laureys et
al., 1999a; Vanhaudenhuyse et al., 2010). However, recent work provides strong
evidence of anatomical diversity and functional heterogeneity in the PMC (Margulies
et al., 2009; Zhang et al., 2014). We previously used whole brain white matter
tractography in healthy participants to reveal particularly strong connections between
dorsal parts of the PMC and the thalamus (Zhang et al., 2014). Dorsal parts of the
PMC are reported to have fundamental roles in self-awareness (Den Ouden et al.,
2005; Kjaer et al., 2002) and in altered state of consciousness (Maquet et al., 1999),
which suggests that, rather than the structure as a whole, particular parts of the PMC
may be specifically involved in determining levels of consciousness. If so, this could
have implications for using neuroimaging to facilitate more accurate diagnoses of
DOCs and more reliably predict patient outcomes. The aim of the present study was
to identify subdivisions of the PMC that may be specifically implicated in DOCs. We
first used fiber tractography within regions of the DMN to identify subdivisions of the
PMC and thalamus. White matter integrity between PMC and thalamus subdivisions,
and brain activity within PMC subdivisions, was then compared across VS/UWS
patients, MCS patients, and healthy controls, and between DOC patients who
recovered after 12 months and those who did not.
6
2. Materials and methods
2.1 Participants
We recruited 79 patients with a DOC (VS/UWS, n = 62; MCS, n = 17) from the PLA
Army General Hospital in Beijing between January 2014 and May 2016. All patients
had received a severe brain injury caused by trauma, anoxia or stroke/cerebrovascular
accident more than one month prior to recruitment. Patients were evaluated at least
twice weekly within the two weeks before baseline, and their diagnosis of either
VS/UWS or MCS was based on the Coma Recovery Scale-Revised (CRS-R)
assessment with the highest diagnostic level during this time, as per Giacino et al.
(2004). Exclusion criteria were having brain damage exceeding 30% of total brain
volume, any contraindications to MRI scanning, being sedated or anesthetized during
MRI acquisition, or having died during follow-up. The duration of follow-up was at
least 12 months after baseline, with clinical examinations using the CRS-R and
Glasgow Outcome Scale (GOS) (Jennett and Bond, 1975). Patients with a GOS level
of 3-5 were considered to have recovered from their DOC (levels 1 and 2 represent
dead and VS/UWS or MCS, respectively) The GOS has good inter-rater reliability of
92% (Wilson et al., 1998) and is commonly used to assess recovery from DOCs (e.g.,
Norton et al., 2012; Perlbarg et al., 2009; Qin et al., 2015; Van Der Eerden et al.,
2014; Wu et al., 2015). The GOS has the advantage of being easy to administer and
has a good inter-rater reliability of 92% (Wilson et al., 1998) that suggests the
7
potential for bias across multiple raters is minimal. Most patients were evaluated at
follow-up as outpatients, with those outside Beijing evaluated by local health care
physicians. After excluding patients with incomplete follow-up assessments (n = 6),
severe motion artifacts and poor quality MRI (n = 27), or failed registration or
preprocessing because of severe structural deformations (n = 13), our study sample
comprised 21 VS/UWS and 12 MCS patients. A group of 29 gender-matched healthy
controls (HCs) were recruited. None of the HCs had a history of psychiatric or
neurological illness, head injury, or drug or alcohol abuse. The study was approved by
the Ethics Committee of the PLA Army General Hospital. All HCs and surrogates for
the DOC patients provided written informed consent.
2.2 MRI data acquisition
All participants underwent dMRI, resting state fMRI and T1-weighted MRI scanning
on a 3 T GE Discovery MR750 scanner (GE Medical Systems). The major acquisition
parameters for dMRI data included: repetition time (TR)/echo time (TE) = 9000/81.9
ms, thickness/gap = 2.0/0 mm, flip angle = 90°, matrix size = 128 × 128 × 75, voxel
size = 2 × 2 × 2 mm3. For each participant, a total of 67 volumes were acquired,
including 3 non-diffusion-weighted volumes (b = 0 s mm-2) and 64 non-collinear
gradient directions (b = 1000 s mm-2). Resting state fMRI data were acquired axially
using an echo-planar imaging sequence sensitive to blood oxygen level-dependent
contrast. The acquisition parameters were TR/TE = 2000/30 ms, thickness/gap =
4.0/0.6 mm, flip angle = 90°, matrix size = 64 × 64 × 39, voxel size = 3.75 × 3.75 × 4
8
mm3, 210 volumes were obtained for each participant. Sagittal T1-weighted structural
MRI scans were obtained using the following optimized acquisition parameters:
TR/TE = 8.16/3.18 ms, thickness/gap = 1.0/0 mm, flip angle = 7°, matrix size = 256 ×
256 × 188; and voxel size = 1 × 1 × 1 mm3.
2.3 MRI data preprocessing
The diffusion MR data were preprocessed using the FSL Diffusion Toolbox (FMRIB
Software Library, http://fsl.fmrib.ox.ac.uk/fsl/fslwiki/FSL). First, corrections for eddy
current distortions and head motion were performed by aligning all diffusion-
weighted images to the non-diffusion-weighted image (the b0 volume). To ensure
accurate brain masks and anatomical registration, T1-weighted images were processed
with the Computational Anatomy Toolbox (CAT12, Structural Brain Mapping Group,
http://dbm.neuro.uni-jena.de/cat/). The brain mask in diffusion space was then
separated from the skull using the binarized skull-stripped T1-weighted images. Next,
the skull-stripped T1-weighted image was aligned with b0 volume and diffusion
images. In addition, each coregistered T1-weighted image was first linearly then
nonlinearly warped to the Montreal Neurological Institute (MNI) template. The
derived transformation parameters were then inverted and used to warp the seed and
target masks from MNI space to the native dMRI space using a nearest neighbor
interpolation. The registration procedures were performed using Aladin and F3D tools
from the NiftyReg package (https://sourceforge.net/projects/niftyreg/). The diffusion-
9
weighted data for each participant were visually inspected to ensure there were no
apparent artifacts arising from acquisition or data processing procedures.
Resting state fMRI data were preprocessed in the native space of each participant
using Data Processing & Analysis for Brain Imaging toolbox (DPABI) (Yan et al.,
2016). Of the 210 volumes for each participant, the first 10 were discarded and the
remainders underwent slice timing and motion correction, and were resampled to a
stereoscopic 3 mm3. In order to retain the temporal structures of patients with large
head displacement, images with maximum displacement in the cardinal direction > 3
mm, or maximum spin > 3° from the previous frame were treated as outliers and
included as nuisance regressors (Demertzi et al., 2015). In subsequent functional
statistical analysis, we included head motion indexed by mean framewise
displacement (Power et al., 2012) as a confounding factor in the statistical models.
Linear regression was performed to remove the influence of head motion, linear
trends, white matter and CSF signals. Finally, data were temporally filtered to keep
frequencies of 0.01-0.08 Hz, to reduce low-frequency drift and high-frequency noise.
Images were smoothed with a Gaussian filter of full width at half maximum value of
6 mm.
2.4 Structural connectivity-based parcellation of the PMC and thalamus to the
DMN
We investigated 6 ROIs: the PMC, thalamus, superior frontal gyrus (SFG), angular
gyrus, hippocampus, and medial prefrontal cortex (MPFC). Our connectivity-based
10
parcellation scheme is similar to that previously reported by Cunningham et al
(Cunningham et al., 2017). The mask for the PMC was manually drawn on a template
of standard MNI152 space, with a detailed definition of the boundaries described
elsewhere (Zhang et al., 2014). Other masks were obtained either from FSL's
Harvard-Oxford Cortical and Subcortical Structural probabilistic atlases, including
those for the thalamus, hippocampus, SFG and angular gyrus, or from the Stanford
FIND Lab functional ROI database, for the MPFC (Shirer et al., 2012).
In our structural connectivity-based parcellation, either the PMC or thalamus was the
seed, and the remaining 5 ROIs were targets. Probabilistic tractography in FSL was
used to determine the number of streamlines (out of 5000) from each voxel of the
seed region that had a 50% or greater chance of reaching each target ROI. Each voxel
in the seed was assigned to the target ROI that received the highest number of
streamlines from that voxel.
2.5 Structural and functional analysis of consciousness levels at baseline
Probabilistic tractography was performed in each participant's diffusion space to
define pathways between distinct PMC subdivisions to corresponding thalamic
subdivision and DMN regions. Voxels comprising PMC subdivisions were set as
probabilistic tractography seed points (i.e., head region), with the corresponding
thalamic subdivision and other DMN ROIs set as the waypoint, termination, and
classification target (i.e., tail region, and vice versa). To minimize the effect of
spurious connections, mean weighted fractional anisotropy (FA) values for the
11
obtained path connecting head and tail were used to quantify path integrity. A voxel's
weighted FA was calculated as the voxel's FA multiplied by the ratio of streamlines
through the voxel to all streamlines in the path. Tractography is dependent on the
seeding location, and the probability from the head to tail region is not necessarily
equivalent to the probability from the tail to head region (Cao et al., 2013). For this
reason, fiber tracking was performed in both directions between the ROIs, and the
mean weighted FA is the average across these. For the resting state fMRI, we
extracted the voxel-wise fractional amplitude of low-frequency fluctuations (fALFF)
to generate a map for each subject as per Zou et al. (2008) using DPARSFA software.
Individual fALFF maps were then registered into MNI standard space.
We analyzed main effects of group (i.e., VS/UWS, MCS, and HC) for mean weighted
FA, with age and gender as statistical covariates. Functional validation was performed
by comparing fALFF signals from the whole PMC between the VS/UWS and MCS
groups. An AlphaSim approach (Ward, 2000) was used to correct for multiple
comparisons. Potentially confounding factors controlled for in the functional analysis
included age, gender, etiology, duration of illness, and mean framewise displacement
movement factor.
2.6 Structural and functional analysis in the prediction of recovery
To investigate the prognostic capacity of our findings, we compared the non-
recovered (GOS < 3) and recovered (GOS >= 3) groups on the structural integrity of
tracts from the identified PMC subdivisions to the thalamus and other ROIs, and on
12
PMC activity. For this we used general linear models that included age, gender,
etiology and duration of illness as covariates. Statistical significance was set as a two-
tailed p < 0.05.
3. Results
3.1 Demographic and clinical characteristics
Demographic and clinical characteristics of the participants are presented in Table 1
(with individual-level details for the patients in the Supplementary Table). There were
no statistically significant differences in age, gender, or etiology between VS/UWS
and MCS patients, though the VS/UWS patients had a shorter mean illness duration.
At follow-up, 2 of 21 VS/UWS patients and 10 of 12 MCS patients were considered
to have recovered (GOS >= 3).
3.2 Individual parcellation of the PMC and thalamus
The fine-grained architecture of the PMC and thalamus are shown by maximum
probability maps (MPMs) and spaces for representative HC, MCS and VS/UWS
individuals in Figure 1. We observed the thalamus to be represented mainly in the
dorsal and posterior portions of the PMC (dpPMC), including the mesial extent of
Brodmann areas 7 and 31, as well as area v23. The MPFC was represented mainly in
the ventral and anterior parts of the PMC, and the PMC was represented mainly in
regions of the thalamus that included the ventral posterior lateral nucleus (VPL),
pulvinar (Pu) and parts of the centromedian nucleus (CM). The average streamlines
13
from each subregion to corresponding target ROIs showed that structural connections
decreased across the groups from HC to MCS to VS/UWS.
3.3 Structural and functional analysis of consciousness levels at baseline
As shown in Figure 2A, the tract between the dpPMC and VPL/Pu/CM mainly
includes the splenium (posterior) and body of the corpus callosum, the posterior
corona radiata, and retrolenticular part of the internal capsule. The mean weighted FA
between the dpPMC and VPL/Pu/CM was significantly different among VS/UWS,
MCS, and HC groups after controlling for age and gender (F = 56.64, p < 0.001,
Figure 3B), with post hoc analyses showing that both the VS/UWS and MCS patient
groups had less FA than the HC group (p < 0.001), and that VS/UWS patients had less
FA than MCS patients (p = 0.017, Bonferroni corrected value). In addition, we found
VS/UWS patients continued to have less FA than MCS patients (p = 0.036) when
etiology and duration of illness were included as covariates in addition to age and
gender. We also investigated whether the tracts between the ventral and anterior
subdivisions of the PMC and the MPFC differed between groups. These tracts showed
a significant group effect, with post-hoc analyses revealing differences between both
patient groups and the HC group (p < 0.05), but not between the VS/UWS and MCS
groups. Results of fMRI analyses revealed that VS/UWS patients had significantly
lower fALFF values than MCS patients in the dorsal and ventral posterior PMC
(AlphaSim corrected p < 0.05), with the peak location comprising 68.5% of all voxels
being in the dpPMC (Figure 3). The remaining voxels were located in PMC
subdivisions connecting to the MPFC (22.3%) and hippocampus (9.2%).
14
3.4 Structural and functional analysis in the prediction of recovery
Compared to the recovered group (GOS >= 3), the non-recovered group (GOS < 3)
had less mean FA between the dpPMC and VPL/Pu/CM (p = 0.031). No significant
effects were found for tracts between the ventral and anterior PMC and MPFC. The
fALFF values were significantly decreased in the non-recovered group (AlphaSim
corrected p < 0.05, Figure 4B); the peak voxel and 81.4% of the voxels showed
reduced fALFF in the dpPMC. The remaining voxels were located in PMC
subdivisions connecting to the MPFC (11.8%) and hippocampus (6.8%). Specifically,
the fALFF values were significantly greater in recovered than in non-recovered
VS/UWS patients (Figure 4C). To further validate our individual-level parcellation
scheme, we used the MPM derived from our HCs, and a publicly available
Brainnetome Atlas (Fan et al., 2016) with corresponding subregions of the dpPMC,
and projected this into individual space. The results were unchanged from those found
using our individualized parcellation scheme.
4. Discussion
To the best of our knowledge, this is the first study to show that tracts connecting
specific PMC and thalamic subdivisions are implicated in DOCs. We found that
dorsal and posterior portions of the PMC had pathways to the thalamus (VPL, Pu, and
CM) with less white matter integrity, and had less resting state brain activity, in
VS/UWS patients than in MCS patients, as well as in patients who did not recover
after 12 months than in patients who did.
15
There being less PMC activity in VS/UWS patients than in MCS patients is consistent
with previous work (Vanhaudenhuyse et al., 2010), and with evidence suggesting that
the PMC plays a central role in mediating activity within the DMN (Fransson and
Marrelec, 2008). The PMC has been previously reported as the region where activity
is most predictive of whether coma and VS/UWS patients wake within 3 months (Wu
et al., 2015), and seems to have a crucial role in the recovery of consciousness
(Laureys et al., 1999b; Voss et al., 2006) that includes being the first cerebral region
to increase activity in conscious waking from a vegetative state (Andreasen et al.,
1995; Laureys et al., 1999a). A mesocircuit model of consciousness posits that
cortico-thalamic-cortical loop systems involving the precuneus/posterior medial
parietal complex are particularly vulnerable to injury (Giacino et al., 2014; Schiff,
2010) and that a progressive increase in neural activity within these networks leads to
regaining consciousness (Laureys and Schiff, 2012). Our findings support the notion
that disruptions within the corticothalamic system, particularly involving distinct
subdivisions of the PMC and thalamus, underpin DOCs and the emerging from these.
The PMC subdivisions we identified include the dorsal and posterior precuneus and
ventral posterior cingulate cortex (PCC) posterior to the splenium of the corpus
callosum. Previous research has shown important roles for these regions in various
states of consciousness and conscious experience (Kjaer et al., 2002; Northoff and
Bermpohl, 2004), and functional connectivity between the ventral PMC and MPFC is
reported to predict recovery from coma (Silva et al., 2015). Our study extends the
16
known roles of these regions in consciousness, by showing their involvement in
DOCs.
The presence of dense connections between dorsal and posterior parts of the PMC and
the thalamus in HCs has been previously reported (Behrens et al., 2003; Cunningham
et al., 2017), and suggests the capacity of these tracts to convey rich information flow
consistent with a role in the neural network subserving consciousness (Boly et al.,
2009; Fernandez-Espejo et al., 2012). It is thus not surprising that we found disrupted
connectivity between the PMC and thalamus in DOC patients and that this was
greater for those with VS/UWS than with MCS, supporting previous reports of the
structural integrity of these tracts being correlated with CRS-R scores
(Vanhaudenhuyse et al., 2010; Wu et al., 2015), DOC categories (Fernandez-Espejo et
al., 2012), and the recovery of consciousness from VS/UWS (Laureys et al., 2004).
Others have also implicated tracts between the PMC and thalamus in the
pathophysiologic basis of DOCs (Laureys and Schiff, 2012), and in the recovery from
these (Koenig et al., 2014; Norton et al., 2012; Wu et al., 2015). Recovery from a
vegetative state is also more likely with less damage to the corpus callosum (Kampfl
et al., 1998), through which many of the PMC to thalamus tracts pass. These previous
reports on recovery from DOCs fit with our finding of less PMC-thalamic disruption
in DOC patients who recovered within 12 months than in those who did not. Some of
our patients had traumatic head injuries, to which tracts between the PMC and
thalamus are vulnerable (Leclercq et al., 2001) because of mechanical shearing forces
17
(Gennarelli et al., 1982). However, while other of our DOC patients did not have a
traumatic etiology, such cases have been previously reported to nevertheless have
damage in white matter bundles including the corpus callosum (Molteni et al., 2017;
Newcombe et al., 2010; Van Der Eerden et al., 2014) and thalamus (Newcombe et al.,
2010).
We found that the tracts from specific subdivisions of the PMC targeted specific
subdivisions of the thalamus, including the VPL/Pu/CM. Previous evidence also
implicates the thalamus in DOCs. Thalamic lesions are common in VS/UWS patients
(Adams et al., 1999), and more prevalent than in MCS patients (Jennett et al., 2001) in
whom the relative preservation of corticothalamic connections might support
consciousness (Fernández-Espejo et al., 2011) and residual cognitive functions
(Giacino et al., 2014). It is also reported that deep brain stimulation of the bilateral
centromedian-parafascicular complex can improve behavioral responsiveness and
awareness in DOC patients (Chudy et al., 2017), and that a circuit-level mechanism
involving the central thalamus and parietal regions helps regulate awareness (Giacino
et al., 2014). Additionally, the thalamic subdivision we identified includes higher
order nuclei rich in widely projecting matrix cells (Jones, 1998), the activity of which
is thought to represent content-specific neural correlates of consciousness (Koch et
al., 2016).
There are some limitations to the present study. The number of patients included in
18
the analysis is relatively small, and the validity of our findings remains uncertain
without replication in larger samples. A greater ratio of MCS patients to VS/UWS
patients is also needed. It should also be noted that the generalizability of our study
can apply only to patients able to be scanned without head movement artifacts, which
can be especially present in DOC patients (Stender et al., 2014) because of limited or
absent body control. We also did not study patients with severe structural deformation
or damage in regions selected as ROIs. With only one follow-up we were not able to
investigate relationships between neuroimaging markers and signs of transition from
VS/UWS to MCS, and from MCS to normal consciousness. Having more follow-ups
would also facilitate the development of an index or model for predicting the course
and time to recovery.
The present study has shown the fine-grained architecture of the PMC and thalamus
using diffusion tensor tractography, and revealed an involvement of dorsal and
posterior sections of the posteromedial cortex, and the tracts between dpPMC and the
VPL/Pu/CM region of the thalamus, in DOCs. This furthers our understanding of the
neural basis of DOC, and offer potential avenues for treating these. Our findings may
also casts light on the neurological mechanisms underpinning consciousness.
19
References
Adams, J.H., Jennett, B., McLellan, D., Murray, L., Graham, D., 1999. The neuropathology of the
vegetative state after head injury. Journal of clinical pathology 52, 804.
Andreasen, N.C., Leary, D.S., Cizadlo, T., Arndt, S., 1995. Remembering the past: two facets of episodic
memory explored with positron emission tomography. The American Journal of Psychiatry 152, 1576.
Behrens, T.E., Johansen-Berg, H., Woolrich, M.W., Smith, S.M., Wheeler-Kingshott, C.A., Boulby, P.A.,
Barker, G.J., Sillery, E.L., Sheehan, K., Ciccarelli, O., Thompson, A.J., Brady, J.M., Matthews, P.M., 2003.
Non-invasive mapping of connections between human thalamus and cortex using diffusion imaging.
Nature neuroscience 6, 750-757.
Boly, M., Tshibanda, L., Vanhaudenhuyse, A., Noirhomme, Q., Schnakers, C., Ledoux, D., Boveroux, P.,
Garweg, C., Lambermont, B., Phillips, C., Luxen, A., Moonen, G., Bassetti, C., Maquet, P., Laureys, S.,
2009. Functional connectivity in the default network during resting state is preserved in a vegetative
but not in a brain dead patient. Human Brain Mapping 30, 2393-2400.
Cao, Q., Shu, N., An, L., Wang, P., Sun, L., Xia, M.-R., Wang, J.-H., Gong, G.-L., Zang, Y.-F., Wang, Y.-F.,
2013. Probabilistic diffusion tractography and graph theory analysis reveal abnormal white matter
structural connectivity networks in drug-naive boys with attention deficit/hyperactivity disorder. Journal
of Neuroscience 33, 10676-10687.
Chudy, D., Deletis, V., Almahariq, F., Marčinković, P., Škrlin, J., Paradžik, V., 2017. Deep brain stimulation
for the early treatment of the minimally conscious state and vegetative state: experience in 14 patients.
Journal of Neurosurgery, 1-10.
Cunningham, S.I., Tomasi, D., Volkow, N.D., 2017. Structural and functional connectivity of the
precuneus and thalamus to the default mode network. Human Brain Mapping 38, 938-956.
Demertzi, A., Antonopoulos, G., Heine, L., Voss, H.U., Crone, J.S., de Los Angeles, C., Bahri, M.A., Di Perri,
C., Vanhaudenhuyse, A., Charland-Verville, V., 2015. Intrinsic functional connectivity differentiates
minimally conscious from unresponsive patients. Brain 138, 2619-2631.
Den Ouden, H.E., Frith, U., Frith, C., Blakemore, S.-J., 2005. Thinking about intentions. NeuroImage 28,
787-796.
Fan, L., Li, H., Zhuo, J., Zhang, Y., Wang, J., Chen, L., Yang, Z., Chu, C., Xie, S., Laird, A.R., 2016. The human
brainnetome atlas: a new brain atlas based on connectional architecture. Cerebral Cortex 26, 3508-3526.
Fernández-Espejo, D., Bekinschtein, T., Monti, M.M., Pickard, J.D., Junque, C., Coleman, M.R., Owen,
A.M., 2011. Diffusion weighted imaging distinguishes the vegetative state from the minimally conscious
state. NeuroImage 54, 103-112.
Fernandez-Espejo, D., Soddu, A., Cruse, D., Palacios, E.M., Junque, C., Vanhaudenhuyse, A., Rivas, E.,
Newcombe, V., Menon, D.K., Pickard, J.D., Laureys, S., Owen, A.M., 2012. A role for the default mode
network in the bases of disorders of consciousness. Annals of Neurology 72, 335-343.
Fransson, P., Marrelec, G., 2008. The precuneus/posterior cingulate cortex plays a pivotal role in the
default mode network: Evidence from a partial correlation network analysis. NeuroImage 42, 1178-1184.
Gennarelli, T.A., Thibault, L.E., Adams, J.H., Graham, D.I., Thompson, C.J., Marcincin, R.P., 1982. Diffuse
axonal injury and traumatic coma in the primate. Annals of Neurology 12, 564-574.
20
Giacino, J.T., Fins, J.J., Laureys, S., Schiff, N.D., 2014. Disorders of consciousness after acquired brain
injury: the state of the science. Nature Reviews Neurology 10, 99-114.
Giacino, J.T., Kalmar, K., Whyte, J., 2004. The JFK Coma Recovery Scale-Revised: measurement
characteristics and diagnostic utility. Archives of physical medicine and rehabilitation 85, 2020-2029.
Hagmann, P., Cammoun, L., Gigandet, X., Meuli, R., Honey, C.J., Wedeen, V.J., Sporns, O., 2008. Mapping
the structural core of human cerebral cortex. PLoS biology 6, e159.
He, J., Cui, Y., Song, M., Yang, Y., Dang, Y., Jiang, T., Xu, R., 2015. Decreased functional connectivity
between the mediodorsal thalamus and default mode network in patients with disorders of
consciousness. Acta Neurologica Scandinavica 131, 145-151.
Jennett, B., Adams, J.H., Murray, L.S., Graham, D.I., 2001. Neuropathology in vegetative and severely
disabled patients after head injury. Neurology 56, 486-490.
Jennett, B., Bond, M., 1975. Assessment of outcome after severe brain damage: a practical scale. The
Lancet 305, 480-484.
Jones, E.G., 1998. A new view of specific and nonspecific thalamocortical connections. Advances in
neurology 77, 49-71; discussion 72-43.
Kampfl, A., Schmutzhard, E., Franz, G., Pfausler, B., Haring, H.-P., Ulmer, H., Felber, S., Golaszewski, S.,
Aichner, F., 1998. Prediction of recovery from post-traumatic vegetative state with cerebral magnetic-
resonance imaging. The Lancet 351, 1763-1767.
Kjaer, T.W., Nowak, M., Lou, H.C., 2002. Reflective self-awareness and conscious states: PET evidence for
a common midline parietofrontal core. NeuroImage 17, 1080-1086.
Koch, C., Massimini, M., Boly, M., Tononi, G., 2016. Neural correlates of consciousness: progress and
problems. Nature Reviews Neuroscience 17, 307-321.
Koenig, M.A., Holt, J.L., Ernst, T., Buchthal, S.D., Nakagawa, K., Stenger, V.A., Chang, L., 2014. MRI default
mode network connectivity is associated with functional outcome after cardiopulmonary arrest.
Neurocritical care 20, 348-357.
Laureys, S., Goldman, S., Phillips, C., Van Bogaert, P., Aerts, J., Luxen, A., Franck, G., Maquet, P., 1999a.
Impaired effective cortical connectivity in vegetative state: preliminary investigation using PET.
NeuroImage 9, 377-382.
Laureys, S., Lemaire, C., Maquet, P., Phillips, C., Franck, G., 1999b. Cerebral metabolism during
vegetative state and after recovery to consciousness. Journal of Neurology, Neurosurgery & Psychiatry
67, 121-122.
Laureys, S., Owen, A.M., Schiff, N.D., 2004. Brain function in coma, vegetative state, and related
disorders. The Lancet Neurology 3, 537-546.
Laureys, S., Schiff, N.D., 2012. Coma and consciousness: paradigms (re) framed by neuroimaging.
NeuroImage 61, 478-491.
Leclercq, P.D., McKenzie, J.E., Graham, D.I., Gentleman, S.M., 2001. Axonal injury is accentuated in the
caudal corpus callosum of head-injured patients. Journal of Neurotrauma 18, 1-9.
Maquet, P., Faymonville, M.E., Degueldre, C., Delfiore, G., Franck, G., Luxen, A., Lamy, M., 1999.
Functional neuroanatomy of hypnotic state. Biological Psychiatry 45, 327-333.
Margulies, D.S., Vincent, J.L., Kelly, C., Lohmann, G., Uddin, L.Q., Biswal, B.B., Villringer, A., Castellanos,
F.X., Milham, M.P., Petrides, M., 2009. Precuneus shares intrinsic functional architecture in humans and
monkeys. Proceedings of the National Academy of Sciences 106, 20069-20074.
Molteni, E., Rocca, M.A., Strazzer, S., Pagani, E., Colombo, K., Arrigoni, F., Boffa, G., Copetti, M., Pastore,
V., Filippi, M., 2017. A diffusion tensor magnetic resonance imaging study of paediatric patients with
21
severe non‐traumatic brain injury. Developmental Medicine & Child Neurology 59, 199-206.
Newcombe, V.F., Williams, G.B., Scoffings, D., Cross, J., Carpenter, T.A., Pickard, J.D., Menon, D.K., 2010.
Aetiological differences in neuroanatomy of the vegetative state: insights from diffusion tensor imaging
and functional implications. Journal of Neurology, Neurosurgery & Psychiatry 81, 552-561.
Northoff, G., Bermpohl, F., 2004. Cortical midline structures and the self. Trends in cognitive sciences 8,
102-107.
Norton, L., Hutchison, R., Young, G., Lee, D., Sharpe, M., Mirsattari, S., 2012. Disruptions of functional
connectivity in the default mode network of comatose patients. Neurology 78, 175-181.
Perlbarg, V., Puybasset, L., Tollard, E., Lehericy, S., Benali, H., Galanaud, D., 2009. Relation between brain
lesion location and clinical outcome in patients with severe traumatic brain injury: a diffusion tensor
imaging study using voxel‐based approaches. Human Brain Mapping 30, 3924-3933.
Power, J.D., Barnes, K.A., Snyder, A.Z., Schlaggar, B.L., Petersen, S.E., 2012. Spurious but systematic
correlations in functional connectivity MRI networks arise from subject motion. NeuroImage 59, 2142-
2154.
Qin, P., Wu, X., Huang, Z., Duncan, N.W., Tang, W., Wolff, A., Hu, J., Gao, L., Jin, Y., Wu, X., 2015. How are
different neural networks related to consciousness? Annals of Neurology 78, 594-605.
Rosazza, C., Andronache, A., Sattin, D., Bruzzone, M.G., Marotta, G., Nigri, A., Ferraro, S., Rossi
Sebastiano, D., Porcu, L., Bersano, A., 2016. Multimodal study of default‐mode network integrity in
disorders of consciousness. Annals of Neurology 79, 841-853.
Schiff, N.D., 2010. Recovery of consciousness after brain injury: a mesocircuit hypothesis. Trends in
neurosciences 33, 1-9.
Shirer, W., Ryali, S., Rykhlevskaia, E., Menon, V., Greicius, M., 2012. Decoding subject-driven cognitive
states with whole-brain connectivity patterns. Cerebral Cortex 22, 158-165.
Silva, S., De Pasquale, F., Vuillaume, C., Riu, B., Loubinoux, I., Geeraerts, T., Seguin, T., Bounes, V.,
Fourcade, O., Demonet, J.-F., 2015. Disruption of posteromedial large-scale neural communication
predicts recovery from coma. Neurology 85, 2036-2044.
Soddu, A., Vanhaudenhuyse, A., Bahri, M.A., Bruno, M.A., Boly, M., Demertzi, A., Tshibanda, J.F., Phillips,
C., Stanziano, M., Ovadia-Caro, S., Nir, Y., Maquet, P., Papa, M., Malach, R., Laureys, S., Noirhomme, Q.,
2012. Identifying the default-mode component in spatial IC analyses of patients with disorders of
consciousness. Human Brain Mapping 33, 778-796.
Stender, J., Gosseries, O., Bruno, M.-A., Charland-Verville, V., Vanhaudenhuyse, A., Demertzi, A.,
Chatelle, C., Thonnard, M., Thibaut, A., Heine, L., 2014. Diagnostic precision of PET imaging and
functional MRI in disorders of consciousness: a clinical validation study. The Lancet 384, 514-522.
Utevsky, A.V., Smith, D.V., Huettel, S.A., 2014. Precuneus is a functional core of the default-mode
network. Journal of Neuroscience 34, 932-940.
Van Der Eerden, A.W., Khalilzadeh, O., Perlbarg, V., Dinkel, J., Sanchez, P., Vos, P.E., Luyt, C.-E., Stevens,
R.D., Menjot de Champfleur, N., Delmaire, C., 2014. White matter changes in comatose survivors of
anoxic ischemic encephalopathy and traumatic brain injury: comparative diffusion-tensor imaging study.
Radiology 270, 506-516.
Vanhaudenhuyse, A., Noirhomme, Q., Tshibanda, L.J., Bruno, M.A., Boveroux, P., Schnakers, C., Soddu,
A., Perlbarg, V., Ledoux, D., Brichant, J.F., Moonen, G., Maquet, P., Greicius, M.D., Laureys, S., Boly, M.,
2010. Default network connectivity reflects the level of consciousness in non-communicative brain-
damaged patients. Brain : a journal of neurology 133, 161-171.
Voss, H.U., Uluç, A.M., Dyke, J.P., Watts, R., Kobylarz, E.J., McCandliss, B.D., Heier, L.A., Beattie, B.J.,
22
Hamacher, K.A., Vallabhajosula, S., 2006. Possible axonal regrowth in late recovery from the minimally
conscious state. Journal of Clinical Investigation 116, 2005.
Ward, B.D., 2000. Simultaneous inference for fMRI data.
Wilson, J.L., Pettigrew, L.E., Teasdale, G.M., 1998. Structured interviews for the Glasgow Outcome Scale
and the extended Glasgow Outcome Scale: guidelines for their use. Journal of Neurotrauma 15, 573-
585.
Wu, X., Zou, Q., Hu, J., Tang, W., Mao, Y., Gao, L., Zhu, J., Jin, Y., Wu, X., Lu, L., 2015. Intrinsic functional
connectivity patterns predict consciousness level and recovery outcome in acquired brain injury. Journal
of Neuroscience 35, 12932-12946.
Yan, C.-G., Wang, X.-D., Zuo, X.-N., Zang, Y.-F., 2016. DPABI: data processing & analysis for (resting-state)
brain imaging. Neuroinformatics 14, 339-351.
Zhang, Y., Fan, L., Wang, J., Zhu, M., Yu, C., Jiang, T., 2014. Connectivity-based parcellation of the human
posteromedial cortex. Cerebral Cortex 24, 719-727.
Zou, Q.-H., Zhu, C.-Z., Yang, Y., Zuo, X.-N., Long, X.-Y., Cao, Q.-J., Wang, Y.-F., Zang, Y.-F., 2008. An
improved approach to detection of amplitude of low-frequency fluctuation (ALFF) for resting-state fMRI:
fractional ALFF. Journal of neuroscience methods 172, 137-141.
23
Funding
This work was partially supported by the Natural Science Foundation of China (Grant
Nos. 31771076, 81771128, 91432302, 31620103905), the Science Frontier Program
of the Chinese Academy of Sciences (Grant No. QYZDJ-SSW-SMC019), National
Key R&D Program of China (Grant No. 2017YFA0105203), Beijing Municipal
Science & Technology Commission (Grant Nos. Z141107002514111,
Z161100000216152, Z161100000216139), and the Guangdong Pearl River Talents
Plan (2016ZT06S220).
Declaration of interest:
All of the authors declare nothing to report.
24
Figure legends
Figure 1. The seeds and targets for the parcellation of the posteromedial cortex
(PMC, A), and parcellation maps of the PMC (B) and the thalamus (C). First row
shows the maximum probabilistic map for PMC and thalamic subdivisions and ROIs
from a group of healthy controls (HCs) registered to Montreal Neurological Institute
space. Second to fourth rows show parcellation maps and ROIs in individual space for
a representative HC, minimally conscious state (MCS) patient, and a vegetative state /
unresponsive wakefulness syndrome (VS/UWS) patient. Each voxel of the PMC (or
thalamus) was assigned to 1 of 5 target DMN ROIs, which include the thalamus (or
PMC), MPFC, hippocampus, superior frontal gyrus, and angular gyrus, based on the
number of white matter connections to that region. Right column in B and C show
structural connectivity fingerprints of all participants from HC, MCS, and VS/UWS
groups showing the average number of streamlines from subregions connecting to
corresponding targets. Red lines are the average number of streamlines for each
group. DMN, default mode network; dpPMC, dorsal and posterior portions of the
posteromedial cortex; MPFC, medial prefrontal cortex; SFG, superior frontal gyrus;
VPL/Pu/CM, ventral posterior lateral nucleus, pulvinar and centromedian nucleus.
25
26
Figure 2. Structural connectivity analysis of consciousness levels at baseline. A,
group probability maps of reconstructed tracts in healthy controls (HCs) between
dpPMC (dorsal and posterior parts of the posteromedial cortex) and VPL/Pu/CM
(ventral posterior lateral nucleus, pulvinar and center median nucleus). Maps are
thresholded at presence in at least 25% of the participants. B, The mean weighted
fractional anisotropy (FA) between dpPMC and VPL/Pu/CM was significantly
different among VS/UWS, MCS and HC groups, controlling for the effects of age and
gender, and with Bonferroni correction for multiple comparisons. ***, p < 0.001; *, p
< 0.05.
27
Figure 3. Functional activity analysis between vegetative state / unresponsive
wakefulness syndrome (VS/UWS) and minimally conscious state (MCS) patients at
baseline. A, Patients with VS/UWS showed significantly lower fractional amplitude
of low-frequency fluctuations (fALFF) signal values than MCS patients (corrected p <
0.05), with the peak abnormal voxel and 68.5% of abnormal voxels in the subregion
connecting to the thalamus (i.e., dorsal and posterior portions of the PMC, B and C).
28
Figure 4. Structural and functional analysis in the prediction of recovery. A, The
mean weighted fractional anisotropy (FA) was significantly lower in the non-
recovered group (GOS < 3) than the recovered group (GOS >= 3). B, The fractional
amplitude of low-frequency fluctuations (fALFF) signal values were significantly
lower in the non-recovered group than the recovered group, with the peak abnormal
voxel and 81.4% of abnormal voxels in the subregion connecting to the thalamus. C,
The fALFF values were significantly greater in recovered than in non-recovered
VS/UWS groups. Error bars represent SD. *, p < 0.05.
29
Table 1: Demographic and clinical characteristics of the participants
VS/UWS
MCS
HC
Statistics
N = 21
N = 12
N = 29
F/𝜒2/t
p
Age, years
45.43 (14.33) 37.25 (12.76) 37.24 (11.27) F = 2.9
n.s.
Gender (male : female)
8 : 13
8 : 4
15 : 14
Etiology (TBI : CVA : ABI)
7 : 5 : 9
6 : 5 : 1
𝜒2= 1.27 n.s.
𝜒2= 1.73 n.s.
Duration of illness, months
3.38 (1.72)
14.42 (23.36)
t = -2.18
0.04
Baseline CRS-R total
6.05 (1.12)
10.92 (3.85)
t = -5.47 < 0.001
Time interval between baseline
and follow-up, months
21.14 (8.37)
18.42 (12.83)
t = 0.74
n.s.
Follow-up CRS-R total
8.76 (4.40)
17.42 (4.21)
Recovered
Yes (GOS >= 3), N
No (GOS < 3), N
2
19
10
2
t = -5.52 < 0.001
ABI, Anoxic brain injury; CRS-R, Coma Recovery Scale-Revised; CVA,
stroke/cerebrovascular accident; GOS, Glasgow Outcome Scale; HC, healthy
controls; MCS, minimally conscious state; MRI, magnetic resonance imaging; n.s.,
not significant; TBI, traumatic brain injury; VS/UWS, vegetative state/unresponsive
wakefulness syndrome.
Mean and SD are reported unless otherwise specified.
30
Supplementary Table. Detailed demographic and clinical characteristics of patients
Structural lesions
(caudate)
Patient Gender
Age,
y
Group Etiology
time prior to
Duration,
MRI, m
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
M
M
39 MCS
ABI
23 MCS
TBI
M
23 MCS
CVA
M
23 MCS
TBI
M
M
M
M
F
F
F
F
F
F
F
M
M
F
F
F
F
61 MCS
ABI
29 MCS
42 MCS
TBI
ABI
53 MCS
ABI
46 MCS
47 MCS
28 MCS
TBI
ABI
TBI
33 MCS
TBI
64 VS/UWS ABI
26 VS/UWS ABI
60 VS/UWS CVA
61 VS/UWS
TBI
51 VS/UWS CVA
38 VS/UWS CVA
30 VS/UWS CVA
58 VS/UWS
TBI
25 VS/UWS CVA
22
M
39 VS/UWS ABI
23
M
41 VS/UWS CVA
F
F
53 VS/UWS ABI
35 VS/UWS CVA
24
25
1
5
3
6
2
9
3
7
77
47
1
12
1
4
4
9
3
2
2
2
3
3
2
3
3
31
Follow-up,
m
12
12
13
13
12
39
12
14
51
12
19
12
17
12
13
16
28
19
38
14
36
12
13
28
19
temporo-parietal
lobe
thalamus, basal ganglia
Brainstem damage
Right basal ganglia
damage
Diffuse cortical & subcortical
atrophy
Diffuse cortical & subcortical
atrophy
Bilateral
damage
Bilateral temporo-parietal damage
Left basal ganglia damage
Diffuse cortical & basal ganglia
(caudate) damage
Diffuse axonal injury
Right basal ganglia damage
Left frontotemporal lobe damage
Bilateral frontal lobe damage and
atrophy
Left
lesions
Left basal ganglia damage
Diffuse
cortical lesions
Right frontotemporal lobe damage
Diffuse cortical & subcortical
atrophy
Diffuse cortical & subcortical
atrophy
Bilateral basal ganglia damage
Diffuse cortical & subcortical
atrophy
Diffuse cortical & subcortical
atrophy
Right basal ganglia damage and
atrophy
Diffuse cortical & subcortical
atrophy
Bilateral brainstem and midbrain
damage
Diffuse cortical & subcortical
hyperintense
anoxic
26
27
28
29
30
31
32
33
M
M
M
M
F
F
F
F
46 VS/UWS
TBI
39 VS/UWS
TBI
22 VS/UWS
TBI
51 VS/UWS
TBI
69 VS/UWS ABI
68 VS/UWS
TBI
35 VS/UWS CVA
43 VS/UWS CVA
4
5
3
3
4
6
3
2
(caudate)
atrophy
Right temporo-parietal damage
Right basal ganglia
damage
Left fronto-temporo-parietal lobe
damage
Right frontotemporal lobe damage
Diffuse cortical & subcortical
atrophy
Diffuse axonal injury
Bilateral basal ganglia damage
Diffuse cortical & subcortical
atrophy
13
16
27
17
33
17
27
29
32
Supplementary Table. Continued
Baseline
Patient
CRS-R
Auditory
Function
Visual
Motor
Function
Function
Scale
Scale
Scale
Oromotor/Verbal
Communication
Arousal
Function Scale
Scale
Scale
4
0
3
3
3
5
0
3
2
1
3
0
1
0
0
0
1
1
0
0
0
1
0
1
0
0
1
1
1
0
1
1
1
3
1
2
1
1
3
1
3
2
1
3
1
1
1
1
1
1
1
0
0
1
1
0
1
1
1
1
1
1
1
1
2
1
17
7
10
9
11
18
7
11
11
8
15
7
7
6
6
6
7
6
4
3
5
7
5
5
6
6
7
7
7
6
7
7
7
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
1
1
1
1
1
1
1
1
2
1
1
2
1
1
1
1
1
1
0
1
0
1
1
1
1
2
1
1
1
1
1
1
1
5
3
2
2
4
5
3
2
2
3
5
2
2
2
2
2
2
1
2
2
2
2
2
2
2
1
2
2
2
2
2
1
2
33
1
0
0
0
0
1
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
3
2
2
2
2
3
2
2
2
2
3
2
2
2
2
2
2
2
2
0
2
2
2
0
2
2
2
2
2
2
2
2
2
Supplementary Table. Continued
Follow-up
Oromoto
Patient
CRS-R
Auditory
Function
Visual
Motor
r/
Function
Function
Verbal
Scale
Scale
Scale
Function
Communic
ation Scale
Arousal
Scale
GOS
Recov
ered
Scale
4
2
4
4
2
4
4
3
3
2
4
4
2
1
1
1
1
4
0
0
1
1
0
1
1
1
3
3
3
1
1
2
2
4
2
5
4
2
5
1
3
3
2
5
5
3
0
0
2
1
5
2
0
1
1
0
1
1
0
2
3
3
0
3
3
0
19
11
21
19
16
22
19
12
13
13
22
22
11
6
6
8
7
23
7
3
6
7
5
7
8
6
11
15
16
7
9
9
8
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
5
3
5
4
3
6
6
2
2
2
6
5
3
2
2
2
2
6
2
2
2
2
2
2
2
1
2
4
5
2
2
1
2
1
2
2
2
1
2
3
1
2
2
2
3
1
1
1
1
1
3
1
1
0
1
1
1
2
2
1
1
1
2
1
1
1
34
2
0
2
2
1
2
2
2
1
1
2
2
0
0
0
0
0
2
0
0
0
0
0
0
0
0
1
2
1
0
0
0
1
3
2
3
3
2
3
3
3
2
2
3
3
2
2
2
2
2
3
2
1
2
2
2
2
2
2
2
2
3
2
2
2
2
3
2
4
3
3
4
3
3
2
3
4
4
2
2
2
2
2
5
2
2
2
2
2
2
2
2
2
2
3
2
2
2
2
Yes
No
Yes
Yes
Yes
Yes
Yes
Yes
No
Yes
Yes
Yes
No
No
No
No
No
Yes
No
No
No
No
No
No
No
No
No
No
Yes
No
No
No
No
ABI, Anoxic brain injury; CRS-R, Coma Recovery Scale-Revised; CVA, stroke/cerebrovascular accident;
GOS, Glasgow Outcome Scale; MCS, minimally conscious state; TBI, traumatic brain injury; VS/UWS,
vegetative state/unresponsive wakefulness syndrome.
35
|
1804.08513 | 2 | 1804 | 2018-04-24T09:16:36 | An accumulator model for primes and targets with independent response activation rates: Basic equations for average response times | [
"q-bio.NC"
] | In response priming tasks, speeded responses are performed toward target stimuli preceded by prime stimuli. Responses are slower and error rates are higher when prime and target are assigned to different responses, compared to assignment to the same response, and those priming effects increase with prime-target SOA. Here, we generalize Vorberg et al.'s (2003) accumulator model of response priming, where response activation is first controlled exclusively by the prime and then taken over by the actual target. Priming thus occurs by motor conflict because a response-inconsistent prime can temporarily drive the process towards the incorrect response. While the original model assumed prime and target signals to be identical in strength, we allow different rates of response activation (cf. Mattler & Palmer, 2012; Schubert et al., 2012). Our model predicts that stronger primes mainly increase priming effects in response times and error rates, whereas stronger targets mainly diminish response times and priming effects. | q-bio.NC | q-bio | Cite as: Schmidt, T., & Schmidt, F. (2018). An accumulator model for primes and targets with
independent response activation rates: Basic equations for average response times.
arXiv:1804.08513 [q-bio.NC]
1
An accumulator model for primes and targets with independent response
activation rates: Basic equations for average response times
arXiv.com/1804.08513 [q-bio.NC]
Thomas Schmidt
Experimental Psychology Unit
University of Kaiserslautern
Kaiserslautern, Germany
Department of General and Experimental Psychology
Filipp Schmidt
University of Giessen
Giessen, Germany
Abstract
In response priming tasks, speeded responses are performed toward target stimuli
preceded by prime stimuli. Responses are slower and error rates are higher when
prime and target are assigned to different responses, compared to assignment to
the same response, and those priming effects increase with prime-target SOA.
Here, we generalize Vorberg et al.'s (2003) accumulator model of response priming,
where response activation is first controlled exclusively by the prime and then
taken over by the actual target. Priming thus occurs by motor conflict because a
response-inconsistent prime can temporarily drive the process towards the
incorrect response. While the original model assumed prime and target signals to
be identical in strength, we allow different rates of response activation (cf. Mattler
& Palmer, 2012; Schubert et al., 2012). Our model predicts that stronger primes
mainly increase priming effects in response times and error rates, whereas stronger
targets mainly diminish response times and priming effects.
1. Introduction
Response priming (Klotz & Neumann, 1999; Klotz & Wolff, 1995; Vorberg,
Mattler, Heinecke, Schmidt, & Schwarzbach, 2003) is a response-conflict paradigm
that serves to study the time-course of sequential response activation (Schmidt et al.,
2011). On each trial, observers respond to a target stimulus by pressing a left or right
key (e.g., to indicate whether the target is red or green; Schmidt, 2000). The target is
preceded by a prime stimulus which is either mapped to the same response as the
target (consistent prime; e.g., red target preceded by red prime) or to the alternative
response (inconsistent prime; e.g., red target preceded by green prime). Typically,
consistent primes will speed responses to the target and produce fewer errors while
inconsistent primes will slow responses and produce more errors. This difference
between response times or error rates in consistent versus inconsistent trials is
labeled the priming effect.
The magnitude of this priming effect critically depends on the stimulus-onset
asynchrony (SOA), that is, the time between the onsets of prime and target.
Generally, response priming occurs for SOAs up to about 100 ms and increases
approximately linearly with SOA (Vorberg et al., 2003). Accumulator models of
response priming (Vorberg et al., 2003; cf. Mattler & Palmer, 2012; Schubert,
Palazova, & Hutt, 2013) assume that the prime starts activating the response assigned
Cite as: Schmidt, T., & Schmidt, F. (2018). An accumulator model for primes and targets with
independent response activation rates: Basic equations for average response times.
arXiv:1804.08513 [q-bio.NC]
2
to it, followed by response activation by the target after the SOA. Depending on
whether the prime is consistent or inconsistent with the target, it will drive the
response process into either the correct or incorrect direction, and may even cause a
response error. The longer the SOA, the more time is available for the prime to
activate the response, and the larger the priming effect in both response times and
error rates (e.g., Vorberg et al., 2003; Klotz, Heumann, Ansorge, & Neumann, 2007;
Leuthold & Kopp, 1998; Schmidt, 2002; Vath & Schmidt, 2007).
Furthermore, the magnitude of response priming depends on the strength of
the prime and the target in activating the response. Prime and target strength can be
controlled by luminance or color contrast (Vath & Schmidt, 2007), familiarity (Kiefer,
Sim, & Wentura, 2015; Pfister, Pohl, Kiesel, & Kunde, 2012), stimulus eccentricity
(Lingnau & Vorberg, 2005), similarity of stimulus alternatives (Schmidt & Schmidt,
2013, 2014), by spatial attention to the prime (Kiefer & Brendel, 2006; Schmidt &
Seydell, 2008), or by feature-based attention to the prime (Schmidt & Schmidt, 2010;
Tapia, Breitmeyer, & Shooner, 2010). Reversely, the prime can be weakened by
degradation of its response-defining features (Schmidt, Weber, & Schmidt, 2014).
Generally, stronger primes lead to larger priming effects, and stronger targets lead to
faster overall responses but smaller priming effects (Schmidt, Haberkamp, &
Schmidt, 2011).
In the following, we will describe our generalization of Vorberg et al.'s (2003)
accumulator model of response priming, and describe the basic behavior of the
model.
2. The free-rate accumulator model
We define two counters, n1(t) and n2(t), gathering evidence for leftward or
rightward responses to a prime followed by a target (Fig. 1). Counters are defined
such that n1(t) gathers information for the response afforded by the prime, and n2(t)
for the opposite response. Therefore, when the prime affords a leftward response,
n1(t) is the leftward counter and n2(t) is the rightward counter. To follow the
accumulation process through time, we distinguish two time periods. Let t = 0 mark
the time when the accumulation process for prime-related information starts, and let
s be the prime-target SOA. Then, for 0 ≤ t < s the process is entirely controlled by the
prime. When the target arrives at time s, it takes over the accumulation process from
the state that it was in at time t = s.
Cite as: Schmidt, T., & Schmidt, F. (2018). An accumulator model for primes and targets with
independent response activation rates: Basic equations for average response times.
arXiv:1804.08513 [q-bio.NC]
3
Fig. 1A: In consistent trials, counter n1 (blue) starts gathering evidence for the response afforded by the
prime. When the target arrives at time s, it proceeds in the same direction at a new rate. Counter n2
(pink) remains inactive because there is no input to which it is tuned. Three different SOAs are shown.
B: In inconsistent trials, the initial activation of n1 decays after time s because there is no further input,
while n2 starts getting active after delay s. C: Responses are registered when the difference between the
counters crosses the threshold ±c. D: Response time effects as a continuous function of SOA, now
relative to target onset. We have to subtract a constant containing all the slack due to conduction
times, nonmotor processing time, mechanical inertia etc. E: Priming function, P(s). F: Response-speed
function, R(s), also defined up to the slack constant.
A counter is incremented by a stimulus to which it is tuned; it is decremented
by random decay. Accumulation and decay occur in discrete counts, and each
increment or decrement is a Poisson event. The resulting behavior is an immigration-
death process, where the count at time t is distributed as a Poisson variable with mean
and variance ni(t). Therefore, when a counter is activated by relevant information, the
expectancy of the accumulated evidence for its respective response is
ni(t)= 1
ν λ(1−e−ν t)
,
where λ (read: lambda) is the rate at which evidence accumulates and ν (read: nu) is
the rate at which it decays. If the counter is no longer activated by any relevant
information after time s, its current activation level ni(s) decays passively to zero
according to
ni(t−s)=ni(s)e−ν(t−s)
.
Cite as: Schmidt, T., & Schmidt, F. (2018). An accumulator model for primes and targets with
independent response activation rates: Basic equations for average response times.
arXiv:1804.08513 [q-bio.NC]
4
(Read t – s as "time since target started to accumulate".) In fact, this is all the
mathematical arsenal we need, and everything else follows from these basic
equations. The logic of the model is the following (Vorberg et al., 2003). Each counter
gathers evidence for its respective response over time. The time when the difference
n1(t) - n2(t) between the counters crosses a threshold c, the response afforded by the
prime is given; when it crosses the threshold –c, the opposite response is given.
In a consistent trial, the prime will first activate n1 at rate λP until time t = s, the
point in time when the prime is replaced by the target in the accumulation process.
Then, starting from time t = s, n1 is further activated, but now at rate λT. Because n2 is
not activated by any stimulus, it remains at resting level, n2(t) = 0. Therefore, for t < s:
ν λP(1−e−ν t)
n1(t)= 1
n2(t)=0 ;
;
and for
t⩾s:
ν λT (1−e−ν(t−s))
n1(t)=n1(s)+ 1
ν λP(1−e−νs)+ 1
= 1
ν λT (1−e−ν(t−s))
= 1
ν [λP(1−e−νs)+λT (1−e−ν(t−s))]
;
n2(t)=0 .
The response is given as soon as the difference n1(t) - n2(t) crosses the threshold
c. To find this crossing time, we just have to set set n1(t) equal to c and solve for time.
Assuming the response time is longer than the prime-target SOA, this time is:
t⩾s:
dcon(t ')=n1(t ')−n2(t ')=c
1
ν [λP(1−e−ν s)+λT (1−e−ν(t'−s))]−0=c
⇒t '=t'con= 1
ν log
λT eνs
λP(1−e−ν s)+λT−νc
,
(Eq. 1a)
where the log symbol denotes the natural logarithm, and the prime in t'
indicates that we are now looking at a particular value of the variable t.
The inconsistent case is more involved. In an inconsistent trial, the prime will
again activate n1 at rate λP until time t = s. However, because the prime is inconsistent
with the target, it activates the wrong counter. When the target arrives at time t = s, it
starts activating the correct counter, n2, at rate λT, while activation in n1 starts to decay
at rate ν. Therefore, for t < s:
Cite as: Schmidt, T., & Schmidt, F. (2018). An accumulator model for primes and targets with
independent response activation rates: Basic equations for average response times.
arXiv:1804.08513 [q-bio.NC]
5
ν λP(1−e−ν t)
n1(t)= 1
n2(t)=0 ;
and for
t⩾s:
n1(t)=n1(s)e−ν(t−s)= 1
= 1
ν λP(eν s−1)e−ν t
;
ν λP(1−e−ν s)e−ν(t−s)
.
ν λT (1−e−ν(t−s))
n2(t)= 1
Because the difference n1(t) - n2(t) starts into the wrong direction, when the
inconsistent target takes over the process, it has to start from state n1(s), which is way
positive, and then move the process all the way down towards the opposite threshold,
–c. It is this time loss that generates the priming effect. Again assuming that the
response time is longer than the prime-target SOA:
t⩾s:
dincon(t')=n1(t ')−n2(t')=−c
1
ν λP(eν s−1)e−νt '− 1
1
ν {[(λP+λT)eνs−λP]e−ν t−λT}=−c
ν λT (1−e−ν(t '−s))=−c
⇒t '=t'incon= 1
ν log
(λP+λT)eνs−λP
λT−νc
.
(Eq. 1b)
Note that t'con and t'incon are defined relative to the onset of the counting process
triggered by the prime. To define them relative to target onset, as is common in
response time research, we have to subtract the SOA, s. Further note that response
times as measured in the experiment involve some additional processing time due to
conduction delays, mechanical slack, and other factors, which we assume to be
constant. Therefore, empirical response times tcon and tincon are related to the model
values by ti = t'i – s + const.
If we define response time as a function of SOA in consistent and inconsistent
trials as C(s) and I(s), respectively, we can decompose the entire response time
pattern into two effects. First, the priming function is defined as
P(s)=I(s)−C (s)=t'incon(s)−t 'con(s)
Cite as: Schmidt, T., & Schmidt, F. (2018). An accumulator model for primes and targets with
independent response activation rates: Basic equations for average response times.
arXiv:1804.08513 [q-bio.NC]
6
= 1
ν log
[(λP+λT)eνs−λP][λP(1−e−νs)+λT−νc]
λT(λT−ν c)eν s
.
(Eq. 2a)
Second, the response speed function is defined as
R(s)= 1
2
[I (s)+C(s)]= 1
2
[t'incon(s)+tcon(s)]
= 1
2 ν
log
λT (λP+λT )e2 ν s−λP λT eνs
(λT−νc)λP(1−e−ν s)+(λT−νc)2
.
(Eq. 2b)
The decomposition can be helpful because λT and λP have separable effects on
response speed and priming. Note that both functions depend on all four
parameters. The functions are related by:
I(s)=R(s)+ 1
2
P(s)
;
C (s)=R(s)− 1
2
P (s)
.
Note that priming effects are symmetric about R(s) simply because R(s) is
defined as the average of I(s) and C(s). This does not imply that inconsistent and
consistent primes induce symmetric costs and benefits in absolute time, which is
generally not the case. Also remember that, just as t'con and t'incon, R(s) is only defined
up to a constant. This assumption of constant residual time may be violated by
several factors, like foreperiod or attentional effects.
3. Basic behavior of the model
•
•
•
•
The four free parameters of the model all have separable effects on the data.
λP (evidence accumulation by the prime) mainly controls the magnitude of
priming effects in both response times and error rates. The larger λP, the
deeper the motor conflict induced by inconsistent primes, and the larger the
priming effect in response times and error rates.
λT (evidence accumulation by the target) both controls the magnitude of
priming effects and the overall speed of responses. The larger λT, the faster the
overall response and the smaller the priming effect (because stronger targets
are quicker in counteracting the effect of an inconsistent prime).
ν (decay rate) controls the curvature of all functions. If response times for
consistent and inconsistent trials depend linearly on SOA, so that the
curvature is low, then ν can be assumed to be small relative to λP and λT.
Larger ν leads to negatively accelerating functions for response times and
priming, and it can also increases overall response times.
c (response threshold) affects the overall response time and the error rate. It is
intuitively clear that a lower response threshold allows inconsistent primes to
induce more errors, and at shorter SOAs.
Cite as: Schmidt, T., & Schmidt, F. (2018). An accumulator model for primes and targets with
independent response activation rates: Basic equations for average response times.
arXiv:1804.08513 [q-bio.NC]
7
Unfortunately, it is quite difficult to model error rates in closed form, and we
did not attempt it here. Instead, we are currently running simulations of the
underlying Poisson process to simulate not only error rates but also response time
distributions. It turns out that if c is set to a high value (e.g., 100 counts, as is
customary in the literature), the stochastic process is so fine-grained that errors at
short SOAs become very unlikely. To have a smooth, linear increase in error rate
with SOA, a very low response threshold is needed (10 counts or even less).
It is important to consider the special case of simultaneous presentation of
primes and targets, because this is the standard setting in some response conflict
paradigms closely related to response priming (like the Eriksen and the Stroop
effect). In our model, setting s to 0 yields identical predictions for consistent and
inconsistent response times that do no longer depend on prime strength:
t'con(s=0)=t'incon(s=0)= 1
ν log (
λT
(λT−νc)
)
,
so that P(s = 0) = 0. (Setting s = 0 in Eq. 3a gives the same result, P(s = 0) = [log
(λT / λT)]/ν = 0.) Simultaneous presentation of primes and targets (e.g., arranged as
flankers) is thus predicted to generate no response priming, contrary to empirical
findings from flanker tasks. In general, temporally overlapping primes and targets
may require explicit modeling of joint response activation, such as a prime and target
that together activate a response at rate λT + λP (consistent trials) or λT – λP
(inconsistent trials) for the time period in question.
4. Recommendations for model fitting
The model has four free parameters: λP, λT, ν, and c. The full power of the
model can be harnessed in a parametric research design where priming functions are
traced through variations in prime or target strength. If only a single priming
function has to be predicted, the full four-parameter model will probably overfit the
data. For that purpose, we recommend restricting the parameter space. First, the
response threshold c can be set to a low, constant value (e.g., 10 counts). Second, if
the response-time and priming functions have little curvature, ν can be set to a small
constant value as well (e.g., 0.001). For this range of values, plausible initial values
for λP and λT are between 0 and 1.
Keep in mind that the parameters have to obey the condition that λT>νc .
Otherwise, the priming function is undefined either because of division by zero or
because of taking the log of a negative value. This side condition makes sense
because νc is an upper limit of how many counts can potentially decay (namely, if the
process is very close to the response threshold). If λT is smaller than that value, then
the rate of decay exceeds the rate of accumulation, and the threshold cannot be
reached.
Consistent and inconsistent response times should always be estimated jointly,
not separately. To do this, observe that t'incon = t'con + P, where P is the priming effect.
Let D be a dummy variable that equals 1 for inconsistent trials and 0 otherwise. Then,
functions can be fitted to t'con + DP(s) in a single step. A similar trick can be used to
test the difference of accumulation between two conditions, for example, two
Cite as: Schmidt, T., & Schmidt, F. (2018). An accumulator model for primes and targets with
independent response activation rates: Basic equations for average response times.
arXiv:1804.08513 [q-bio.NC]
8
different primes or targets. Let D be a dummy variable that equals 1 for condition 1
and 0 otherwise. Then, replacing λ with λ + D(λ + δ) enables us to estimate δ, the
difference in processing rates.
Remember that model fitting and model testing should be separated. One
straightforward technique to cross-validate the fit is to estimate parameters with one
half of the data set (e.g., odd-numbered trials) and then fit it to the other half to do
the statistical test. An even more elegant technique is bootstrapping. Generally,
model parameters should be estimated separately for each participant.
5. Relation to previous models
Our model is based on the general principle of direct parameter specification
(Neumann, 1990), which states that single stimulus parameters can trigger
preprogrammed choice responses without the need for awareness. More specifically,
it is an instance of our chase theory of response priming (Schmidt et al., 2011), which
states that prime and target activate their response as a sequence of neuronal
feedforward sweeps (Lamme & Roelfsema, 2000) independent of visual awareness of
the prime (Schmidt & Vorberg, 2006; Schmidt, 2007). Please keep in mind that our
model only describes the response conflict that occurs for prime-target SOAs up to
about 100 ms. For longer SOAs, additional processes come into play, especially
processes of response inhibition (Panis & Schmidt, 2016; Schmidt, Hauch, & Schmidt,
2015). Response inhibition can lead to reversal of the priming effect, with faster
responses in inconsistent than in consistent trials (negative compatibility effect; Eimer &
Schlaghecken, 1998; Lingnau & Vorberg, 2005).
The response-time model we describe here is a straightforward generalization
of Vorberg et al.'s (2003) accumulator model to arbitrary, independent processing
rates of prime and target. Vorberg et al. (2003) assume that prime and target are
processed by the same rate, λ = λP = λT, and that the system does not distinguish
between primes and targets: When a consistent target appears, it does not refresh the
accumulation process, but the process simply continues at the same rate of
deceleration as if the prime had never changed. This simplification leads to an
extremely economical model: The priming function depends only on ν but is
independent of c and λ. However, since the decay parameter ν is a system constant
that does not depend on the stimulus, the model cannot explain how priming
functions depend on stimulus parameters.
Mattler and Palmer (2012) published a simulation model that makes the same
generalization as ours but assumes that response thresholds become narrower
during the trial. Our explicit model of the response times should basically
correspond to their simulations, but there may be details in their simulation that do
not exactly fit our modeling here. Schubert, Palazova, and Hutt (2013) have
presented a model that makes the exact same generalization we attempt here, but
additionally proposes that the prime processing rate depends on the prime-target
interval. To facilitate comparisons between those models, we use the same
mathematical notation as previous papers.
Cite as: Schmidt, T., & Schmidt, F. (2018). An accumulator model for primes and targets with
independent response activation rates: Basic equations for average response times.
arXiv:1804.08513 [q-bio.NC]
9
References
Eimer, M., & Schlaghecken, F. (1998). Effects of masked stimuli on motor
activation: Behavioral and electrophysiological evidence. Journal of
Experimental Psychology: Human Perception & Performance, 24, 1737-
1747.
Kiefer, M., & Brendel, D. (2006). Attentional modulation of unconscious "automatic"
processes: Evidence from event-related potentials in a masked priming
paradigm. Journal of Cognitive Neuroscience, 18(2), 184-198.
Kiefer, M., Sim, E. J., & Wentura, D. (2015). Boundary conditions for the influence of
unfamiliar non-target primes in unconscious evaluative priming: The
moderating role of attentional task sets. Consciousness and Cognition, 35, 342-
356.
Klotz, W., Heumann, M., Ansorge, U., & Neumann, O. (2007). Electrophysiological
activation by masked primes: Independence of prime-related and target-
related activities. Advances in Cognitive Psychology, 3, 449-465.
Klotz, W., & Neumann, O. (1999). Motor activation without conscious discrimination
in metacontrast masking. Journal of Experimental Psychology: Human Perception
and Performance, 25 (4), 976-992.
Klotz, W., & Wolff, P. (1995). The effect of a masked stimulus on the response to the
masking stimulus. Psychological Research, 58, 92-101.
Lamme, V. A. F., & Roelfsema, P. R. (2000). The distinct modes of vision offered by
feedforward and recurrent processing. Trends in Neurosciences, 23, 571-579.
Leuthold, H., & Kopp, B. (1998). Mechanisms of priming by masked stimuli:
Inferences from event-related brain potentials. Psychological Science, 9, 263-
269.
Lingnau, A., & Vorberg, D. (2005). The time course of response inhibition in
masked priming. Perception & Psychophysics, 67, 545-557.
Mattler, U., & Palmer, S. (2012). Time course of free-choice priming effects explained
by a simple accumulator model. Cognition, 123, 347-360.
Neumann, O. (1990). Direct parameter specification and the concept of perception.
Psychological Research, 52, 207-215.
Panis, S., & Schmidt, T. (2016). What is shaping reaction-time and accuracy
distributions? Active and selective response inhibition causes the Negative
Compatibility Effect. Journal of Cognitive Neuroscience, 28, 1651-1671.
Pfister, R., Pohl, C., Kiesel, A., & Kunde, W. (2012). Your unconscious knows your
name. PLoS One, 7(3), e32402.
Schmidt, T. (2000). Visual perception without awareness: Priming responses by color.
In T. Metzinger (Ed.), Neural Correlates of Consciousness: Empirical and
Conceptual Questions (pp. 157-169). Cambridge, MA: MIT Press.
Schmidt, T. (2007). Measuring unconscious cognition: Beyond the zero-awareness
criterion. Advances in Cognitive Psychology, 3, 275-287.
Schmidt, F., Haberkamp, A., & Schmidt, T. (2011). Dos and don'ts in response
priming research. Advances in Cognitive Psychology, 7, 120-131.
Schmidt, T., Haberkamp, A., Veltkamp, G. M., Weber, A., Seydell-Greenwald, A., &
Schmidt, F. (2011). Visual processing in rapid-chase systems: Image
processing, attention, and awareness. Frontiers in Psychology, 2, Article 169.
Cite as: Schmidt, T., & Schmidt, F. (2018). An accumulator model for primes and targets with
independent response activation rates: Basic equations for average response times.
arXiv:1804.08513 [q-bio.NC]
10
Schmidt, T., Hauch, V., & Schmidt, F. (2015). Mask-triggered thrust reversal in the
Negative Compatibility Effect. Attention, Perception, & Psychophysics, 77, 2377-
2398.
Schmidt, F., & Schmidt, T. (2010). Feature-based attention to unconscious shapes and
colors. Attention, Perception & Psychophysics, 72, 1480-1494.
Schmidt, F., & Schmidt, T. (2013). Grouping principles in direct competition. Vision
Research, 88, 9-21.
Schmidt, F., & Schmidt, T. (2014). Rapid processing of closure and viewpoint-
invariant symmetry: Behavioral criteria for feedforward processing.
Psychological Research, 78, 37-54.
Schmidt, T., & Seydell, A. (2008). Visual attention amplifies response priming of
pointing movements to color targets. Perception & Psychophysics, 70, 443-455.
Schmidt, F., Weber, A., & Schmidt, T. (2014). Activation of response force by self-
splitting objects: Where are the limits of feedforward gestalt processing?
Journal of Vision, 14(9):20, 1-14.
Schubert, T., Palazova, M., & Hutt, A. (2013). The time course of temporal attention
Attention, Perception, &
effects on nonconscious prime processing.
Psychophysics, 75, 1667-1686.
Tapia, E., Breitmeyer, B. G., & Shooner, C. R. (2010). Role of task-directed attention in
nonconscious and conscious response priming by form and color. Journal of
Experimental Psychology: Human Perception and Performance, 36(1), 74.
Vath, N., & Schmidt, T. (2007). Tracing sequential waves of rapid visuomotor
activation in lateralized readiness potentials. Neuroscience, 145, 197-208.
Vorberg, D., Mattler, U., Heinecke, A., Schmidt, T., & Schwarzbach, J. (2003).
Different time courses for visual perception and action priming. Proceedings
of the National Academy of Sciences USA, 100, 6275-6280.
|
1812.06594 | 1 | 1812 | 2018-12-02T15:15:44 | Computational EEG in Personalized Medicine: A study in Parkinson's Disease | [
"q-bio.NC",
"cs.LG",
"eess.SP",
"q-bio.QM",
"stat.ML"
] | Recordings of electrical brain activity carry information about a person's cognitive health. For recording EEG signals, a very common setting is for a subject to be at rest with its eyes closed. Analysis of these recordings often involve a dimensionality reduction step in which electrodes are grouped into 10 or more regions (depending on the number of electrodes available). Then an average over each group is taken which serves as a feature in subsequent evaluation. Currently, the most prominent features used in clinical practice are based on spectral power densities. In our work we consider a simplified grouping of electrodes into two regions only. In addition to spectral features we introduce a secondary, non-redundant view on brain activity through the lens of Tsallis Entropy $S_{q=2}$. We further take EEG measurements not only in an eyes closed (ec) but also in an eyes open (eo) state. For our cohort of healthy controls (HC) and individuals suffering from Parkinson's disease (PD), the question we are asking is the following: How well can one discriminate between HC and PD within this simplified, binary grouping? This question is motivated by the commercial availability of inexpensive and easy to use portable EEG devices. If enough information is retained in this binary grouping, then such simple devices could potentially be used as personal monitoring tools, as standard screening tools by general practitioners or as digital biomarkers for easy long term monitoring during neurological studies. | q-bio.NC | q-bio |
Computational EEG in Personalized Medicine:
A study in Parkinson's Disease
Sebastian Mathias Keller1, Maxim Samarin1, Antonia Meyer2, Vitalii Kosak (Cozak)1,2, Ute
Gschwandtner2, Peter Fuhr2, and Volker Roth1
1University of Basel
2Hospital of the University of Basel
Abstract
Recordings of electrical brain activity carry information about a person's cognitive
health. For recording EEG signals, a very common setting is for a subject to be at
rest with its eyes closed. Analysis of these recordings often involve a dimensionality
reduction step in which electrodes are grouped into 10 or more regions (depending
on the number of electrodes available). Then an average over each group is taken
which serves as a feature in subsequent evaluation. Currently, the most prominent
features used in clinical practice are based on spectral power densities. In our work
we consider a simplified grouping of electrodes into two regions only. In addition
to spectral features we introduce a secondary, non-redundant view on brain activity
through the lens of Tsallis Entropy Sq=2. We further take EEG measurements not
only in an eyes closed (ec) but also in an eyes open (eo) state. For our cohort of
healthy controls (HC) and individuals suffering from Parkinson's disease (PD), the
question we are asking is the following: How well can one discriminate between
HC and PD within this simplified, binary grouping? This question is motivated by
the commercial availability of inexpensive and easy to use portable EEG devices.
If enough information is retained in this binary grouping, then such simple devices
could potentially be used as personal monitoring tools, as standard screening tools
by general practitioners or as digital biomarkers for easy long term monitoring
during neurological studies.
1
Introduction
The recording of the first human EEG was performed in 1924 by German physician Hans Berger.
Since then relative band power has become an established measure to quantify deviations from
normal oscillatory brain activity: Several minutes of EEG signal, usually recorded under resting
state condition and in an 'eyes closed' (ec) setting, are filtered into four to seven non-overlapping
frequency bands covering a range from 0.5Hz up to 70Hz. Then, for each of those bands, the relative
signal power is calculated. Based on this signal power, multiple studies have established a statistical
connection between the neurological condition of their subjects (as measured e.g. by psychological
testing) and the distribution of spectral power within these bands [1], [2], [3].
High density EEG machines available today provide up to 256 individual electrodes recording
brain activity at a frequency of 1000Hz or higher. If one is not interested in performing source
reconstruction or spatial filtering such a high number of electrodes is usually not necessary, especially
as electrodes in proximity to each other are very highly correlated. It is thus expected that features
based on a grouping of electrodes into 10 or more regions as shown in fig. 4b are only slightly
more informative as a grouping into only 2 such regions as shown in fig. 4a. In fact a color coded
representation of the mean Tsallis entropy (cid:104) Sq=2(cid:105) per electrode, as shown in fig. 1, indicates that
the simplest viable partitioning is obtained by grouping electrodes into a frontal and an occipital
Machine Learning for Health (ML4H) Workshop at NeurIPS 2018.
Figure 1: Estimated Tsallis entropy during eo state for the 4-8Hz band (averaged over several minutes)
is shown for every electrode. Most but not all subjects of our cohort fall into this "front versus back"
pattern where entropy is higher in the frontal brain regions. As subjects transition into ec state, frontal
entropy is significantly reduced (not shown). CT068 and CT086 are healthy controls whereas CT016
and CT040 have been diagnosed with Parkinson's disease.
Figure 2: A significant change in brain oscillation can be observed when transitioning from an
eyes open to an eyes closed state and vice versa. This change is known as the "Berger effect" or
"α-blockade" as the amplitude of EEG oscillations in the α-band (8-13 Hz) decreases significantly
when subjects open their eyes. Visible are also the three eye blinks during eyes open state.
region. If these two regions still carry enough information about a persons cognitive health it is
potentially possible that two electrodes located at the front and back of the head would capture enough
information to present a simplified alternative to a much denser electrode setting. Consequentially,
as portable, longterm EEG devices with up to five electrodes are already available, these devices
might prove useful as future long term monitoring tools analog to how ECG devices are used today
to monitor heart rate variability.
1.1 Parkinson's Disease and Dementia
According to the American Psychiatric Association [4], Dementia is a syndrome that consists of a
decline in cognitive and intellectual abilities occurring in an awake and alert patient. As a symptom
complex it is known to occur in over 70 disorders [5], among which Parkinson's Disease (PD) is
the second most common age-related neurodegenerative disorder after Alzheimer's disease. It is
estimated to affect nearly 2 percent of those over age 65. According to the National Parkinson
Foundation (NPF), over the entire course of their illness, 50 to 80 percent of those suffering from
Parkinson's disease eventually develop dementia. The average time from onset of movement problems
to the development of dementia is about 10 years. Accurately diagnosing Parkinson's Disease --
especially in its early stages -- requires experienced practitioners. Thus providing tools for detecting
early changes in brain activity that are as easy to use as taking ones own blood pressure is an important
first step.
2 Materials and Methods
In this study, we focus on how to complement and improve existing signal power based classification
methods by (i) introducing additional entropy based features, (ii) including eo and ec states into the
measurement process and (iii) using the Berger effect (see fig. 2) as a potential feature indicative
of abnormal brain activity. At the same time we simplify the grouping of electrodes and investigate
2
whether a measurement of frontal and occipital brain activity might potentially suffice to indicate a
deviation from healthy brain oscillations.
2.1 Sample Description
We recruited participants for this study from the outpatient clinic for movement disorders of the
Department of Neurology and Neurophysiology of the University Hospital of Basel (Universitätsspital
Basel), Switzerland in the period from 2011 to 2012. We selected 46 persons with Parkinson's disease
and labelled them as "PD". Parkinson's disease was diagnosed according to the United Kingdom
Parkinson's Disease Society Brain Bank criteria. The patients who had dementia (Diagnostic and
Statistical Manual of Mental Disorders, 4th Edition), history of stroke, epilepsy, multiple sclerosis
and surgical interventions to the brain, or/and insufficient knowledge of German language, were
excluded. We selected 16 persons without Parkinson's disease, matched to patients according to sex,
age, and education, and labelled them as "HC". For controls, inclusion criteria were a subjective
report of good health and a neuropsychological examination within normal limits. Exclusion criteria
were identical to those for patients. The local ethics committee approved the study protocol. All
participants provided written informed consent.
2.2 Tsallis Entropy Sq=2
1 −(cid:80)W
i=1 pq
i
The q-entropy, also known as the Tsallis entropy, was proposed in [6] and takes the following form
Sq(pi) =
(1)
with probabilities pi and q ∈ R. In the limit q → 1, eq. 1 recovers the standard Shannon entropy.
In analogy to the Normal distribution, which is the maximum entropy distribution of the Shannon
entropy within the class of distributions with E(x) = µ and E((x − µ)2) = σ2, Tsallis entropy Sq is
maximized by a q-Gaussian distribution. The pdf pqg of a q-Gaussian is given by
q − 1
(cid:20)
2(cid:21)1/(1−q)
pqg(x) = p0
1 − (1 − q)
x
x0
,
(2)
for details see section 3 of [7]. Fig. 5b shows the shape of such q-Gaussians for four different values
of q where q = 1 is the Normal distribution. Higher values of q lead to an increased probability in the
tails of the distribution. Random samplings from a heavy tailed Gaussian with q = 2 are shown in fig.
5a and compared to samples obtained for q = 1. When band filtering a Gaussian white noise signal
and a q-Gaussian (q = 2) white noise signal we find that the signal obtained from the q-Gaussians
has more similarities to a band filtered EEG signal for the same band in terms of amplitude variance
than its Gaussian counterpart. This leads to the conclusion that Tsallis entropy might be a more
appropriate entropy measure for EEG signals. This view is supported by several studies achieving
improved classification results in similar settings based on Tsallis entropy, e.g. [8], [9], [10].
For estimating q-Tsallis entropy for q = 2 an estimator Sq=2 has been proposed in [11]. It is
parameter-free, easy to calculate, designed to estimate the entropy of time series and given by
(cid:80)n
(3)
i=1(xi − µ)2. To estimate the entropy of a time series it is first divided into N bins
with s2
where each extreme point of the signal marks the beginning, resp. the end, of a bin. The variance
within each bin is given by s2
i whereas σ2 is the variance of the entire time series.
Sq=2 = 1 − 1
i = 1
n
σ2
N
(cid:80) s2
i
3 Results and Discussion
EEG measurements in ec and eo states were filtered into four frequency bands (1-4Hz, 4-8Hz, 8-13Hz
and 13-45Hz). For each band Tsallis entropy (ts) for q = 2 and relative band power (bp) was
calculated for the frontal (f) and occipital (b) region. PD vs. HC classification was performed with
repeated cross validation on a train/test split of 80/20 using gradient boosting machines (GBM). Due
to class imbalance the loss function was weighted accordingly and classification was measured using
3
(a) HC: ec → eo: for HC the occip-
ital region has a higher increase in
entropy in the eo state than for PD
(b) PD: ec → eo: for PD the increase
in occipital entropy content is less
pronounced
(c) HC and PD group: the front to
back ratio of entropy in the 4Hz-8Hz
band is higher for healthy controls
Figure 3: 4Hz-8Hz band: HC vs. PD in ec and eo state. In each panel the stars mark the means of the
resp. groups. In panel (c) the crosses mark the extremes for HC and PD (during eo state) calculated
using Archetype analysis [12]. They turn out to be the two most important features in table 1, row 4.
Proximity to either extreme is an indicator of a person's neurological status, i.e. PD or HC.
Table 1: Binary classification with repeated cross validation (80/20) using gradient boosting machines
(gbm) on a 2-region frontal vs. occipital setting with target PD vs. HC. BP is band power, TS is
Tsallis Entropy. Measure is area under the ROC curve. Due to the imbalance between HC and
PD group weighted classification and SMOTE were used but no significant difference in ROC was
obtained.
Classification (gbm)
Feature Set
BP
BP
TS
TS
BP + TS
Ratios(BP, TS)
Ratios Modality
no
no
no
no
no
yes
five most important Features (descending order)
bp.b.ec.4-8, bp.b.ec.13-45, bp.b.ec.1-4, bp.f.ec.1-4, bp.f.ec.4-8
EC
bp.b.eo.1-4, bp.b.eo.4-8, bp.b.eo.13-45, bp.f.eo.13-45, bp.f.eo.4-8
EO
ts.f.ec.1-4, ts.f.ec.4-8, ts.b.ec.8-13, ts.b.ec.13-45, ts.b.ec.4-8
EC
EO
ts.b.eo.4-8, ts.f.eo.4-8, ts.b.eo.13-45, ts.f.eo.8-13, ts.b.eo.8-13
EC + EO bp.b.eo.1-4, bp.f.ec.8-13, ts.f.eo.4-8, ts.b.ec.8-13, ts.b.eo.1-4
EC + EO bp.feo.vs.beo.1-4, ts.fec.vs.bec.8-13, bp.feo.vs.beo.4-8,
BP + TS
yes
EC + EO bp.b.eo.1-4, bp.feo.vs.beo.1-4, bp.feo.vs.beo.4-8,
ts.bec.vs.beo.13-45, bp.fec.bs.bec.1-4
ts.fec.vs.bec.8-13, ts.f.eo.4-8
ROC
64.0%
74.8%
65.5%
71.8%
75.7%
67.0%
71.5%
ROC. Our best result in the binary grouping setting is achieved with a combination of ec and eo
measurements using entropy and band power features. Using only the ratios of band power and
entropy in front and back gives only a moderate classification of ROC=67%. Thus the absolute value
of measured quantities in back and front are meaningful -- not only individual ratios. Combining
ratios and absolute values of power and entropy does not improve overall classification: the possible
benefit of additional features is outweighed by the larger search space. The largest increase in ROC
was obtained when switching from "eyes closed" to "eyes open" measurements. We thus recommend
to make it a standard procedure to record EEG measurements during both ec and especially eo state.
Our best classification result compares favourably -- given the reduced dimensionality -- with results
based on 10 region groupings presented in [13], where ROC=80% is achieved on a similar patient
cohort also from the University Hospital Basel.
Acknowledgment
This project is supported by the the Swiss National Science Foundation project CR32I2-159682
References
[1] Justin Dauwels, François-Benoît Vialatte, and Andrzej Cichocki. On the early diagnosis of alzheimer's
disease from eeg signals: A mini-review, 2011.
4
[2] Laura Bonanni, Astrid Thomas, Pietro Tiraboschi, Bernardo Perfetti, Sara Varanese, and Marco Onofrj.
Eeg comparisons in early alzheimer's disease, dementia with lewy bodies and parkinson's disease with
dementia patients with a 2-year follow-up. Brain : a journal of neurology, 131(Pt 3):690 -- 705, Mar 2008.
doi: 10.1093/brain/awm322.
[3] Martin Hardmeier, Florian Hatz, Habib Bousleiman, Christian Schindler, Cornelis Jan Stam, and Peter
Fuhr. Reproducibility of functional connectivity and graph measures based on the phase lag index (pli) and
weighted phase lag index (wpli) derived from high resolution eeg. PloS one, 9(10):e108648, 2014.
[4] Diagnostic and Statistical Manual of Mental Disorders: DSM-IV. American Psychiatric Association,
Washington, DC, 4 edition, 1994. Committee on Nomenclature and Statistics.
[5] Geldmacher D.S. and Whitehouse P.J. Differential diagnosis of alzheimer's disease. Neurology 48(suppl
6):S2-S9, pages 1125 -- 1138, 1997.
[6] Constantino Tsallis. Possible generalization of boltzmann-gibbs statistics. Journal of Statistical Physics,
52(1):479 -- 487, Jul 1988. ISSN 1572-9613. doi: 10.1007/BF01016429.
[7] Jr. S. Picoli, R. S. Mendes, L. C. Malacarne, and R. P. B. Santos. q-distributions in complex systems: a brief
review. Brazilian Journal of Physics, 39(2a):468 -- 474, 2009. doi: 10.1590/S0103-97332009000400023.
[8] J. McBride, X. Zhao, T. Nichols, V. Vagnini, N. Munro, D. Berry, and Y. Jiang. Scalp eeg-based
discrimination of cognitive deficits after traumatic brain injury using event-related tsallis entropy analysis.
IEEE Transactions on Biomedical Engineering, 60(1):90 -- 96, Jan 2013. ISSN 0018-9294. doi: 10.1109/
TBME.2012.2223698.
[9] T. J. De Bock, S. Das, M. Mohsin, N. B. Munro, L. M. Hively, Y. Jiang, C. D. Smith, D. R. Wekstein,
G. A. Jicha, A. Lawson, J. Lianekhammy, E. Walsh, S. Kiser, and C. Black. Early detection of alzheimer's
disease using nonlinear analysis of eeg via tsallis entropy. In 2010 Biomedical Sciences and Engineering
Conference, pages 1 -- 4, May 2010. doi: 10.1109/BSEC.2010.5510813.
[10] Alberto Capurro, Luis Diambra, Daisy Lorenzo, Macadar O, M.T. Martin, Mostaccio C, A Plastino,
Perez J, Rozman E, Maria Eugenia Torres, and Velluti J. Human brain dynamics: The analysis of eeg
signals with tsallis information measure. Physica A Statistical and Theoretical Physics, 265, 1999. doi:
10.1016/S0378-4371.
[11] Robert Sneddon. The tsallis entropy of natural information. Physica A: Statistical Mechanics and its
Applications, 386(1):101 -- 118, 2007. URL https://EconPapers.repec.org/RePEc:eee:phsmap:v:
386:y:2007:i:1:p:101-118.
[12] Adele Cutler and Leo Breiman. Archetypal analysis. Technometrics, 36(4):338 -- 347, 1994.
[13] M. Chaturvedi, F. Hatz, and U. Gschwandtner. Quantitative eeg (qeeg) measures differentiate parkinson's
disease (pd) patients from healthy controls (hc). Frontiers in aging neuroscience, 9(3), 2017. doi:
10.3389/fnagi.2017.00003.
5
A Appendices
A.1 Simplified Partitioning: 10 regions vs. 2 regions
(a) Electrodes partitioned into frontal and occipital
region
(b) A standard partitioning into 10 brain regions as
used in a clinical setting
Figure 4: The observed division into frontal and occipital region shown in fig. 1 motivates the
simplification of the standard partitioning with its 10 regions to a binary "front vs. back" partitioning
of electrodes.
A.2 Family of q-Gaussians
(a) Random samples from a Normal distri-
bution and from a heavy tailed q-Gaussian.
(b) Within the family of q-Gaussian, the Normal distribu-
tion is recovered for q = 1. Any q-Gaussian with q > 1
has tails with higher probabilities.
Figure 5: In the family of q-Gaussians a distribution with lighter or heavier tails than the Normal
distribution (q = 1) is obtained for q < 1 or q > 1.
6
|
1505.02142 | 2 | 1505 | 2016-02-09T13:23:40 | Porting HTM Models to the Heidelberg Neuromorphic Computing Platform | [
"q-bio.NC",
"cs.NE"
] | Hierarchical Temporal Memory (HTM) is a computational theory of machine intelligence based on a detailed study of the neocortex. The Heidelberg Neuromorphic Computing Platform, developed as part of the Human Brain Project (HBP), is a mixed-signal (analog and digital) large-scale platform for modeling networks of spiking neurons. In this paper we present the first effort in porting HTM networks to this platform. We describe a framework for simulating key HTM operations using spiking network models. We then describe specific spatial pooling and temporal memory implementations, as well as simulations demonstrating that the fundamental properties are maintained. We discuss issues in implementing the full set of plasticity rules using Spike-Timing Dependent Plasticity (STDP), and rough place and route calculations. Although further work is required, our initial studies indicate that it should be possible to run large-scale HTM networks (including plasticity rules) efficiently on the Heidelberg platform. More generally the exercise of porting high level HTM algorithms to biophysical neuron models promises to be a fruitful area of investigation for future studies. | q-bio.NC | q-bio | Porting HTM Models to the Heidelberg Neuromorphic
Computing Platform
Sebastian Billaudelle 1,∗, Subutai Ahmad 2,†
1KirchhoU-Institute for Physics, Heidelberg, Germany
2Numenta, Inc., Redwood City, CA
6
1
0
2
b
e
F
9
]
.
C
N
o
i
b
-
q
[
2
v
2
4
1
2
0
.
5
0
5
1
:
v
i
X
r
a
ABSTRACT
Hierarchical Temporal Memory (HTM) is a computational theory
of machine intelligence based on a detailed study of the neocortex.
The Heidelberg Neuromorphic Computing Platform, developed
as part of the Human Brain Project (HBP), is a mixed-signal
(analog and digital) large-scale platform for modeling networks
of spiking neurons. In this paper we present the Vrst eUort in
porting HTM networks to this platform. We describe a framework
for simulating key HTM operations using spiking network models.
We then describe speciVc spatial pooling and temporal memory
implementations, as well as simulations demonstrating that
the fundamental properties are maintained. We discuss issues
in implementing the full set of plasticity rules using Spike-
Timing Dependent Plasticity (STDP), and rough place and route
calculations. Although further work is required, our initial studies
indicate that it should be possible to run large-scale HTM networks
(including plasticity rules) eXciently on the Heidelberg platform.
More generally the exercise of porting high level HTM algorithms
to biophysical neuron models promises to be a fruitful area of
investigation for future studies.
1 INTRODUCTION
The mammalian brain, particularly that of humans, is able to
process diverse sensory input, learn and recognize complex
spatial and temporal patterns, and generate behaviour based
on context and previous experiences. While computers
are eXcient in carrying out numerical calculations, they
fall short in solving cognitive tasks. Studying the brain
and the neocortex in particular is an important step to
develop new algorithms closing the gap between intelligent
organisms and artiVcial systems. Numenta is a company
dedicated to developing such algorithms and at the same
time investigating the principles of the neocortex. Their
Hierarchical Temporal Memory (HTM) models are designed
to solve real world problems based on neuroscience results
and theories.
EXciently simulating large-scale neural networks in
software is still a challenge. The more biophysical details
a model features,
the more computational ressources
it requires. DiUerent techniques for speeding up the
execution of such implementations exist, e.g. by parallelizing
∗email: [email protected]
†email: [email protected]
calculations. Dedicated hardware platforms are also
being developed. Digital neuromorphic hardware like
the SpiNNaker platform often features highly parallelized
processing architectures and optimized signal routing
[Furber et al., 2014]. On the other hand, analog systems
directly emulate the neuron's behavior in electronic
microcircuits. The Hybrid Multi-Scale Facility (HMF) is
a mixed-signal platform developed in the scopes of the
BrainScaleS Project (BSS) and Human Brain Project (HBP).
In this paper we present eUorts in porting HTM networks
to the HMF. A framework for simulating HTMs based on
spiking neural networks is introduced, as well as concrete
network models for the HTM concepts spatial pooling and
the temporal memory. We compare the behavior to software
implementations in order to verify basic properties of the
HTM networks. We discuss the overall applicability of
these models on the target platform, the impact of synaptic
plasticity, and connection routing considerations.
1.1 Hierarchical Temporal Memory
HTM represents a set of concepts and algorithms for machine
intelligence based on neocortical principles [Hawkins et al.,
2011]. It is designed to learn spatial as well as temporal
patterns and generate predictions from previously seen
sequences. It features continuous learning and operates on
streaming data. An HTM network consists of one or multiple
hierarchically arranged regions. The latter contain neurons
organized in columns. The functional principle is captured
in two algorithms which are laid out in detail in the original
whitepaper [Hawkins et al., 2011]. The following paragraphs
are intended as an introductory overview and introduce the
properties relevant to this work.
The spatial pooler is designed to map a binary input
vector to a set of columns. By recognizing previously seen
input data, it increases stability and reduces the system's
susceptibility for noise. Its behaviour can be characterized
by the following properties:
1. The columnar activity is sparse. Typically, 40 out of 2,048
colums are active, which is approximately a sparsity of
2 %. The number of active columns is constant in each
time step and does not depend on the input sparsity.
2. The spatial pooler activates the k columns which receive
the most input. In case of a tie between two columns,
the active column is selected randomly, e.g. through
1
Billaudelle et al.
structural advantages of certain cells compared to its
neighbors.
3. Stimuli with low pairwise overlap counts are mapped
to sparse columnar representations with low pairwise
overlap counts, while high overlaps are projected onto
representations with high overlap. Thus, similar input
vectors lead to a similar columnar activation, while
disjunct stimuli activate distinct columns.
4. A column must receive a minimum input (e.g. 15 bits) to
become active.
The temporal memory operates on single cells within
columns and further processes the spatial pooler's output.
Temporal sequences are learned by the network and can be
used for generating predictions and highlighting anomalies.
Individual cells receive stimuli from other neurons on their
distal dendrites. This lateral input provides a temporal
context. By modifying a cell's distal connectivity, temporal
sequences can be learned and predicted. The temporal
memory's behavior can be summarized by the following:
1. Individual cells receive lateral input on their distal
dendrites. In case a certain threshold is crossed, the
cells enter a predictive (depolarized) state.
2. When a column becomes active due to proximal input,
it activates only those cells that are in predictive state.
3. When a column with no predicted cells becomes active
due to proximal input, all cells in the column become
active. This phenomenon is referred to as columnar
bursting.
1.2 Heidelberg Neuromorphic Computing Platform
The HMF is a hybrid platform consisting of a traditional
high-performance cluster and a neuromorphic system. It is
developed primarily at the KirchhoU-Institute for Physics in
Heidelberg and the TU Dresden while receiving funding from
the BSS and HBP [HBP SP9 partners, 2014]. The platform's
core is the wafer-scale integrated High Input Count Analog
Neural Network (HICANN) chip as shown in Figure 1. Part
of the chip's unique design is its mixed-signal architecture
featuring analog neuron circuits and a digital communication
infrastructure. Due to the short intrinsic time constants of
the hardware neurons, the system operates on an accelerated
timescale with a speed-up factor of 10 × 104 compared to
biological real-time.
HICANN features 512 neurons or dendritic membrane
circuits. Each circuit can be stimulated via 226 synapses on
two synaptic inputs. As a default, the latter are conVgured
for excitatory and inhibitory stimuli, respectively. However,
they can be set up to represent e.g. two excitatory inputs
with diUerent synaptic time constants or reversal potentials.
2
Fig. 1. A wafer containing 384 HICANN chips. The undiced wafer
undergoes a custom post-processing step where additional metal
layers are applied to establish inter-reticle connectivity and power
distribution. (Photo courtesy of the Electronic Vision(s) group,
Heidelberg.)
By connecting multiple dendritic membranes larger neurons
with up to 14 × 103 synapses can be formed.
A single wafer contains 384 chips with 200 × 103 neurons
and 45 × 106 synapses. Multiple wafers can be connected to
form even larger networks. The BSS's infrastructure consists
of six wafers and is being extended to 20 wafers for the Vrst
HBP milestone.
1.3 Spiking Neuron Model
There exist diUerent techniques of varying complexity for
simulating networks of spiking neurons. The reference
implementation we use for HTM networks is based
on Vrst generation, binary neurons with discrete time
steps [Numenta, Inc]. Third generation models, however,
incorporate the concept of dynamic time and implement
inter-neuron communication based individual spikes.
Starting from the original Hodgkin-Huxley equations
[Hodgkin and Huxley, 1952], multiple spiking neuron
models were developed that feature diUerent levels of detail
and abstraction. The HICANN chip implements Adaptive
Exponential Integrate-and-Fire model (AdEx) neurons [Brette
and Gerstner, 2005]. At its core,
it represents a simple
Leaky Integrate-and-Fire (LIF) model but features a detailed
spiking behavior as well as spike-triggered and sub-threshold
adaption. It was found to correctly predict approximately
96 % of the spike times of a Hodgkin-Huxley-type model
neuron and about 90 % of the spikes recorded from a cortical
neuron [Jolivet et al., 2008]. On the HMF and thus also
in the following simulations, the neurons are paired with
conductance-based synapses allowing for a Vne-grained
control of the synaptic currents and the implementation
of e.g. shunting inhibition.
Porting HTM Models to the Heidelberg Neuromorphic Computing Platform
2 SPIKING NETWORK MODELS
Implementing neural network models for a neuromorphic
hardware platform or dynamic software simulations requires
an abstract network description deVning the individual cell
populations as well as the model's connectivity. For this
work, our primary focus was on developing mechanistic
and functional implementations of the software reference
models while staying within the topological and parameter
restrictions imposed by the hardware platform. A more
detailed biophysical approach should begin with simulations
of single HTM neurons and their dendritic properties before
advancing to more complex systems, e.g. full networks.
In the following sections we describe spatial pooler
and temporal memory models that
incorporate basic
HTM properties. These models are able to reproduce the
fundamental behaviour of existing software implementations.
The simulations were set up in Python using the PyNN
library [Davison et al., 2008]. Besides supporting a wide
range of software simulators, this high-level interface is also
supported by the HMF platform [Billaudelle, 2014a]. NEST
was used as a simulation backend [Gewaltig and Diesmann,
2007]. To enable multiple synaptic time constants per neuron,
a custom implementation of the AdEx model was written.
2.1 Spatial Pooler
At its core the spatial pooler resembles a k-Winners-Take-
All (kWTA) network: k out of m columns are chosen to
be active in each time step. In fact, kWTA networks have
often been mentioned as an approximation for circuits
naturally occurring in the neocortex [Felch and Granger,
2008]. Continuous-time and VLSI implementations of such
systems have been discussed in the literature [Erlanson and
Abu-Mostafa, 1991, Tymoshchuk, 2012, Maass, 2000]. In
the implementation below we describe a novel approach to
maintaining stable sparsity levels even with a large number
of inputs.
The network developed for this purpose is presented in
Figure 2. It follows a purely time-based approach and is
designed for LIF neurons. It allows for very fast decision
processes based on a single input event per source. Each
column is represented by a single cell which accumulates
feed-forward input from the spike sources. Here, the rise
time of the membrane voltage decreases with the number
of presynaptic events seen by the cell: cells receiving the
most input will Vre before the others. An inhibitory pool
consisting of a single cell collects the network's activity.
Low membrane and high synaptic time constants lead to
a reliable summation of events. When a certain number of
spikes have been collected – and thus the cell's threshold
has been crossed – the pool strongly inhibits all cells of the
network suppressing subsequent spike events.
The model is extended by adding subtle feed-forward
shunting inhibition. The inhibitory conductance increases
Fig. 2. Timing based implementation of the spatial pooler. Each
column is represented by a single cell C and receives sparse input
from the input vector 11 . The columns become active when the
number of connected active inputs crosses a threshold. The rise
time of the membrane voltage highly depends on the number of
coincident inputs: cells with more presynaptic activity will Vre
before those with less stimuli do. Inhibitory pool I accumulates
the columnar spikes 22 and in doing so acts as a counter. After
a certain number of columns have become active, the pool will
inhibit and shut down all columns preventing any further activity
33 . To stabilize this kWTA model, all columns receive a subsampled
feed-forward inhibition 44 . This eUectively prolongs the decision
period for high input activity.
with the overall
input activity νin. With the reversal
potential set to match the leakage potential, the conductance
contributes to the leakage term
g(cid:48)
l = gl + ginh(νin) .
This eUectively slows down the neurons' responses and
thus prolongs the decision period of the network. With
this inhibition, the resulting system is able to achieve stable
sparsity levels with a large number of inputs, at the cost of
slightly slower response times.
Tie situations between columns receiving the same
number of presynaptic events are resolved by adding slight
gaussian jitter to the weights of the excitatory feed-forward
connections. This gives some columns structural advantages
over other columns resulting in a slightly faster response to
the same stimulus. By increasing the standard deviation σj
of the jitter, the selection criterion can be blurred.
2.2 Temporal Memory
Similar to the spatial pooler,
the temporal memory
implementation was designed for fast reaction times
and spike-timing based response patterns. A complete
network consists of m identical columns with n HTM
cells each. Modelling these cells is a challenge in itself. A
multicompartmental neuron model would represent the best
Vt. While a neuromorphic hardware chip implementing such
3
13IC24Billaudelle et al.
Fig. 3. Implementation of the temporal memory not including
plasticity. Every HTM cell within a column is modeled with
three individual LIF cells modeling diUerent compartments (distal
dendrites D, soma S and a lateral inhibition segment I – which is not
biologically inspired). Per column, there exist multiple cell triples
as well as one "head" cell P which participates in the columnar
competition and collects proximal input for the whole column.
Activity of this cell is forwarded to the individual soma cells of the
column 11 . Without a previous prediction, this results in all soma
cells Vring. However, the distal compartment sums over the input of
the previous time step. When a threshold is reached, the inhibitory
compartment as well as the soma are depolarized 33 44 . Together
with proximal input 22 , the inhibitory partition Vres and inhibits
all other cells in the column 55 .
a model is planned and Vrst steps in that direction have
already been taken [Millner, 2012], the current system does
not provide this feature. Since HTM cells primarily depend
on the active properties of a compartment, it can be modelled
by a triple of individual LIF cells as shown in Figure 3.
A column collects proximal input using a single cell. In fact,
this cell can be part of a spatial pooler network as presented
in section 2.1. When the column becomes active, this cell
emits a spike and excites both the neurons representing the
HTM cells' somae as well as inhibitory cells. The inhibitory
projection, however, is not strong enough to activate the
target compartment alone. Instead, it only leads to a partial
depolarization. The soma neuron, however, reaches the
4
Vring threshold for a single presynaptic event. This suXces
as a columnar bursting mechanism (i.e. temporal memory
property 3): without predictive input, all soma compartments
will Vre as a response to the proximal stimulus.
Distal input is processed for each cell individually by
their dendritic segment compartments. A cell's dendritic
segment receives input from other cells' somae. When its
Vring threshold is crossed, it partly depolarizes the inhibitory
helper cell of the same triplet. This synaptic projection is
set up with a relatively long synaptic time constant and
a reversal potential matching the threshold voltage. This
ensures that the predictive state is carried to the next time
step and prohibits the cell from becoming active due to distal
input alone. On proximal input, the already depolarized
helper cell Vres before the somatic compartments. The latter
are then inhibited instantly, with the exception of the own
triplet's soma. As described, this basic predictive mechanism
fails when multiple cells are predicted, since the inhibitory
compartments laterally inhibit every cell. The solution is
to also depolarize the somatic compartments of predicted
cells. In summary this mechanism satisVes temporal memory
properties 1 and 2.
3 RESULTS
The network models presented in the previous section
were simulated in software to investigate their behavior.
In the following, respective experiments and their results
are shown. Additionally, plasticity rules and topological
requirements are discussed in respect of the HMF.
3.1 Network Simulations
The spatial pooler was analyzed for a network spanning
1,000 columns and an input vector of size 10,000. To speed
up the simulation, the input connectivity was preprocessed
in software by multiplying the stimulus vector to the
connectivity matrix.
A Vrst experiment was designed to verify the basic
kWTA functionality. A random pattern was presented to
the network. The number of active inputs per column – the
input overlap score – can be visualized in a histogram as
shown in Figure 5. By highlighting the columns activated by
that speciVc stimulus, one can investigate the network's
selection criteria. Complying with the requirements for
a spatial pooler, only the rightmost bars – representing
columns with the highest input counts – are highlighted.
Furthermore, the model's capability to resolve ties between
columns receiving the same input counts is demonstrated:
the bar at the decision boundary was not selected as a whole
but only a few columns were picked. This veriVes spatial
pooler property 2.
In a second scenario, input vectors with varying sparsity
were fed into the network, as shown in Figure 6. The number
DIPSsingle predictive element21354Porting HTM Models to the Heidelberg Neuromorphic Computing Platform
80
70
60
50
#
40
30
20
10
0
All Columns
Active Columns
]
%
[
y
t
i
s
r
a
p
S
t
u
p
t
u
O
6
5
4
3
2
1
0
20
30
40
50
60
0
1
2
3
4
5
6
Input Events
Input Sparsity [%]
Fig. 5. Histogram showing the distribution of overlap scores
individual columns receive. Columns activated by the spatial pooler
network are highlighted. This conVrms that only competitors
with the highest input enter an active state. Furthermore, tie
situations between columns with the same overlap score are
resolved correctly.
Fig. 6. The relative number of active columns is plotted against
the input vector's sparsity. After a certain level of input sparsity
is reached, columns start to enter active states. With higher
presynaptic activity, columnar competition increases and the
output sparsity reaches a plateu. The curve's exact course can
be manipulated through the neurons' parameters as can the size of
the plateau. Error bars indicate the standard deviation across Vve
trials.
of active columns stays approximately constant across a
wide range of input sparsity. Additionally the plot shows
that columns must receive a minimum amount of input to
become active at all. This veriVes the underlaying kWTA
approach as well as spatial pooler properties 1 and 4.
To verify the general functionality of a spatial pooler,
expressed in property 3, a third experiment was set up. Input
data sets with a variable overlap were generated starting
from an initial random binary vector. For each stimulus, the
overlap of the columnar activity with the initial dataset was
calculated while sweeping the input's overlap. The resulting
relation of input and output overlap scores is shown in
Figure 7. Also included are the results of a similar experiment
performed with a custom Python implementation of the
spatial pooler directly following the original speciVcation
[Hawkins et al., 2011]. Multiple simulation runs all yielded
results perfectly matching the reference data, thus verifying
property 3.
The experiments have shown that the model presented in
this section does fulVll the requirements for a spatial pooler
and can be considered a solid kWTA implementation. The
speciVc results of course depend on the individual network
size and conVguration. In this case, the network – most
importantly the columnar neurons' time constants – was
conVgured for a relatively short time step of T = 50 ms.
By choosing diUerent parameter sets, the network can be
tuned towards diUerent operational scenarios, e.g. further
increasing the model's stability.
The temporal memory was veriVed in a Vrst sequence
prediction experiment. A reference software implementation
reference data
simulation 1
simulation 2
simulation 3
simulation 4
simulation 5
1.0
0.8
0.6
0.4
0.2
p
a
l
r
e
v
O
t
u
p
t
u
O
0.0
0.0
0.2
0.4
0.6
Input Overlap
0.8
1.0
Fig. 7. Output overlap as a dependency of the input vector's
overlap score. In each of the Vve simulation runs, the stimulus'
was gradually changed starting from a random vector. As required
for a spatial pooler, two similar input stimuli get mapped to similar
output patterns, while disjunct input vectors result in low overlap
scores. The simulations fully reproduce data from an existing
software implementation which is also shown in this Vgure.
was trained with three disjunct sequences of length three.
Consecutive sequences were separated by a random input
pattern. The trained network's lateral connectivity was
dumped and loaded in a simulation. When presented with
the same stimulus, the LIF-based implementation was able
to correctly predict sequences, as shown in Figure 8.
5
Billaudelle et al.
1.0
0.8
0.6
0.4
0.2
p
a
l
r
e
v
O
t
u
p
t
u
O
reference data
simulation 1
simulation 2
simulation 3
simulation 4
simulation 5
0.0
0.0
0.2
0.4
0.6
Input Overlap
0.8
1.0
Fig. 9. Dependency of output and input overlap for a trained spatial
pooler. Results of Vve independent simulation runs are shown as
well as reference data from a custom software implementation.
3.2 Learning Algorithms
Implementing online learning mechanisms in neuromorphic
hardware is a challenge, especially for accelerated systems.
Although the HMF features implementations of nearest-
neighbor Spike-Timing Dependent Plasticity (STDP) and
Short Term Plasticity (STP) [Friedmann, 2013a, Billaudelle,
2014b], more complex update algorithms are hard to
implement. Numenta's networks rely on structural plasticity
rules which go beyond these mechanisms.
The spatial pooler's stimulus changes signiVcantly for
learned input patterns. VeriVcation of its functionality under
these conditions is important. In order to follow the HTM
speciVcation as closely possible, a supervised update rule was
implemented in an outer loop: for each time step, a matrix
containing the connections' permanence values is updated
according to the activity patterns of the previous time step.
This allows us to implement the concepts of structural
plasticity presented in the original whitepaper. For the target
platform, the learning algorithms could be implemented on
the Plasticity Processing Unit (PPU) which is planned for
the next version of the HICANN chip [Friedmann, 2013b].
Simulation results of the implementation described above
are shown in Figure 9.
Experiments to replace the HTM structural plasticity
rules by a classic nearest-neighbor STDP model did not
yield the desired results. The HTM learning rules require
negative modiVcations to inactive synapses in segments that
contribute to cell activity. In contrast, STDP does not aUect
inactive synapses.
3.3 Map and Route
Applying abstract network models to the hardware platform
requires algorithms for placing the neuron populations and
6
routing the synaptic connections. In a best-case scenario,
this processing step results in an isomorphic projection of
the network graph to the hardware topology. For networks
with extreme connectivity requirements, however, synaptic
losses must be expected.
Mapping the simulated networks does not represent a
challenge for the routing algorithms. The temporal memory
can be projected to a single wafer without synaptic loss. The
same still applies with assumed lateral all-to-all connectivity
resulting in approximately 2 million synapses. The latter
network corresponds to a network with a potential pool
of 100 % which would allow the exploration of learning
algorithms even without creating and pruning hardware
synapses.
On the hardware platform, a tradeoU between the number
of aUerent connections per cell and the number of neurons
must be taken into consideration: while it is possible to
connect the dendritic membrane circuits such that a single
neuron can listen on roughly 14 × 103 synases, such a
network could only consist of approximately 3 × 103 neurons
per wafer. With just 226 synapses, just under 200 × 103
neurons can be allocated per wafer.
Scaling up the proof-of-concept models to a size useful
for production purposes, however, challenges the hardware
topology as well as the projection algorithms.
A minimal useful HTM network spans 1024 columns
with 8 cells each. In such a scenario the neurons would
receive lateral input on 32 dendritic segments. Allowing
approximately 1 × 103 aUerent connections per dendritic
segment, this network could be realized on approximately
1 × 106 dendritic membrane circuits, or six wafers. The
existing system set up for the BSS would suXce for this
scenario. Even larger networks could be brought to the HBP's
platform.
4 CONCLUSION AND OUTLOOK
Implementing machine intelligence algorithms as spiking
neural networks and porting them to a neuromorphic
hardware platform presents high demands in terms of
precision and scalability.
We have shown in this paper that HTMs can be
successfully modeled in dynamic simulations. The basic
functionality of spatial pooler and temporal memory
networks could be reproduced based on AdEx neurons.
In theory, the proof of concept networks can be easily
transferred to the HMF, since the high-level software
interfaces are designed to be interchangable. Of course,
emulating the models on the actual hardware platform will
bring up a new set of challenges.
Adapting the HTM's learning rules to the native plasticity
features available on the HMF has turned out to be nontrivial.
The learning rules could not be replicated with the current
Porting HTM Models to the Heidelberg Neuromorphic Computing Platform
implementation of classic STDP. As a freely programmable
microprocessor directly embedded into the neuromorphic
core, the PPU provides the ability to extend the system's
plasticity mechanisms in order to implement the HTM rules.
Further investigation is required to map out a complete
implementation of the HTM update rules on the PPU.
Analog neuromorphic hardware is susceptible to transistor
mismatches due to e.g. dopand Wuctuations in the production
process [Mihai A. Petrovici, 2014]. A careful calibration
of the individual neurons is required to compensate for
these variations. Due to the complexity of the problem
and the high number of interdependent variables, a perfect
calibration is hard to accomplish. Therefore, network models
are required to be tolerant regarding certain spatial, and trial-
to-trial variations on the computing substrate. Carrying out
additional Monte Carlo simulations with slightly randomized
parameters is important to investigate the robustness of the
presented networks.
Finally, a multicompartmental neuron model is planned
for a later version of the neurmorphic platform. Making use
of this extended feature set will signiVcantly increase the
level of biophysical detail. This will account for the detailed
dendritic model used in HTMs and help to stay closer to the
whitepaper as well as the reference implementation.
Besides paving the road towards a highly accelerated
the HMF oUers a high
execution of HTM models,
level of detail in its neuron implementation. With the
multicompartmental extension and a Wexible plasticity
framework, we anticipate the platform will prove valuable
as a tool for further low-level research on HTM theories.
ACKNOWLEDGEMENTS
Special thanks to JeU Hawkins, Prof. Dr. Karlheinz Meier,
Paxon Frady, and the Numenta Team.
REFERENCES
Sebastian Billaudelle. PyHMF – eine PyNN-kompatible
Schnittstelle für das HMF-System, 2014a.
Sebastian Billaudelle. Characterisation and calibration of
short term plasticity on a neuromorphic hardware chip.
Bachelor's thesis, Universität Heidelberg, 2014b.
Romain Brette and Wulfram Gerstner. Adaptive exponential
integrate-and-Vre model as an eUective description of
Journal of neurophysiology, 94(5):
neuronal activity.
3637–3642, 2005.
Andrew P Davison, Daniel Brüderle, Jochen Eppler, Jens
Kremkow, Eilif Muller, Dejan Pecevski, Laurent Perrinet,
and Pierre Yger. Pynn: a common interface for neuronal
network simulators. Frontiers in neuroinformatics, 2, 2008.
Ruth Erlanson and Yaser S Abu-Mostafa. Analog neural
networks as decoders. In Advances in neural information
processing systems, pages 585–588, 1991.
Andrew C Felch and Richard H Granger. The hypergeometric
connectivity hypothesis: Divergent performance of brain
circuits with diUerent synaptic connectivity distributions.
Brain research, 1202:3–13, 2008.
Simon Friedmann.
A new approach to learning in
neuromorphic hardware. PhD thesis, Heidelberg, Univ.,
Diss., 2013, 2013a.
Simon Friedmann.
A new approach to learning in
neuromorphic hardware. PhD thesis, Heidelberg, Univ.,
Diss., 2013, 2013b.
SB Furber, F Galluppi, S Temple, and LA Plana. The spinnaker
project. 0018-9219, (99):1–14, 2014.
Marc-Oliver Gewaltig and Markus Diesmann. Nest (neural
simulation tool). Scholarpedia, 2(4):1430, 2007.
JeU Hawkins, Subutai Ahmad, and Donna Dubinsky.
Cortical Learning Algorithm and Hierarchical Temporal
Memory, 2011. URL http://numenta.org/resources/HTM_
CorticalLearningAlgorithms.pdf.
HBP SP9 partners. Neuromorphic Platform SpeciVcation.
Human Brain Project, March 2014.
A.L. Hodgkin and A.F. Huxley. A quantitative description of
membrane current and its application to conduction and
excitation in nerve. Journal of Physiology, 117:500–544,
1952.
Renaud Jolivet, Felix Schürmann, Thomas K Berger,
Richard Naud, Wulfram Gerstner, and Arnd Roth.
The quantitative single-neuron modeling competition.
Biological cybernetics, 99(4-5):417–426, 2008.
Wolfgang Maass. Neural computation with winner-take-all
as the only nonlinear operation. Citeseer, 2000.
Paul Müller Oliver Breitwieser Mikael Lundqvist Lyle Muller
Matthias Ehrlich Alain Destexhe Anders Lansner RenÃľ
SchüUny Johannes Schemmel Karlheinz Meier Mihai
A. Petrovici, Bernhard Vogginger.
Characterization
and compensation of network-level anomalies in mixed-
signal neuromorphic modeling platforms. PLOS ONE,
October 2014.
doi: dx.doi.org/10.1371/journal.pone.
URL http://www.plosone.org/article/info%
0108590.
3Adoi%2F10.1371%2Fjournal.pone.0108590.
Sebastian Millner. Development of a Multi-Compartment
Neuron Model Emulation. PhD thesis, Heidelberg, Univ.,
Diss., 2013, 2012.
Numenta, Inc. Numenta Platform for Intelligent Computing
(NuPIC). URL http://numenta.org/.
PavloV. Tymoshchuk.
Shigang Yue,
A continuous-time model of
analogue k-winners-take-all neural circuit. In Chrisina
Jayne,
editors,
Engineering Applications of Neural Networks, volume 311
of Communications in Computer and Information Science,
pages 94–103. Springer Berlin Heidelberg, 2012.
ISBN
978-3-642-32908-1.
and Lazaros Iliadis,
7
Billaudelle et al.
Cell 1
]
V
m
[
l
a
t
s
i
d
V
]
V
m
[
h
n
V
i
]
V
m
[
a
m
o
s
V
−50
−55
−60
−65
−70
−50
−55
−60
−65
−70
−50
−55
−60
−65
−70
]
V
m
[
l
a
t
s
i
d
V
]
V
m
[
h
n
V
i
]
V
m
[
a
m
o
s
V
−50
−55
−60
−65
−70
−50
−55
−60
−65
−70
−50
−55
−60
−65
−70
]
V
m
[
l
a
t
s
i
d
V
]
V
m
[
h
n
V
i
]
V
m
[
a
m
o
s
V
−50
−55
−60
−65
−70
−50
−55
−60
−65
−70
−50
−55
−60
−65
−70
Cell 2
Cell 3
0
50
100
150
200
t [ms]
250
300
350
400
Fig. 4. Neuron traces for a temporal memory column containing three HTM cells. Each of these cells is represented by a somatic
compartment, an inhibitory helper cells and two dendritic segments. The column is activated by proximal input in every time step and
receives random distal stimulus predicting none, one or more cells per step. As indicated by the automatic classiVcation algorithm, the
column exhibits a correct response pattern to these predictions.
8
Porting HTM Models to the Heidelberg Neuromorphic Computing Platform
x
e
d
n
I
l
l
e
C
x
e
d
n
I
l
l
e
C
x
e
d
n
I
l
l
e
C
x
e
d
n
I
l
l
e
C
7
6
5
4
3
2
1
0
7
6
5
4
3
2
1
0
7
6
5
4
3
2
1
0
7
6
5
4
3
2
1
0
a1
a2
a3
b1
b2
b3
c1
c2
c3
random
random
random
0 20 40 60 80 100 120
0 20 40 60 80 100 120
0 20 40 60 80 100 120
Column Index
Column Index
Column Index
Fig. 8. A LIF neuron based temporal memory implementation correctly predicting diUerent patterns. Predicted cells are marked blue, active
cells in purple. The network spans 128 columns with each of their eight HTM cells collecting distal stimuli via two dendritic segments.
Connectivity for the distal inputs was conVgured externally. The model was presented three disjunct sequences of size three. The individual
patterns were separated by a random input Sparse Distributed Representation (SDR).
9
|
1304.1565 | 1 | 1304 | 2013-04-04T21:27:40 | Bayesian Odds-Ratio Filters: A Template-Based Method for Online Detection of P300 Evoked Responses | [
"q-bio.NC",
"physics.med-ph",
"stat.AP"
] | Template-based signal detection most often relies on computing a correlation, or a dot product, between an incoming data stream and a signal template. While such a correlation results in an ongoing estimate of the magnitude of the signal in the data stream, it does not directly indicate the presence or absence of a signal. Instead, the problem of signal detection is one of model-selection. Here we explore the use of the Bayesian odds-ratio (OR), which is the ratio of posterior probabilities of a signal-plus-noise model over a noise-only model. We demonstrate this method by applying it to simulated electroencephalographic (EEG) signals based on the P300 response, which is widely used in both Brain Computer Interface (BCI) and Brain Machine Interface (BMI) systems. The efficacy of this algorithm is demonstrated by comparing the receiver operating characteristic (ROC) curves of the OR-based (logOR) filter to the usual correlation method where we find a significant improvement in P300 detection. The logOR filter promises to improve the accuracy and speed of the detection of evoked brain responses in BCI/BMI applications as well the detection of template signals in general. | q-bio.NC | q-bio | 1
Bayesian Odds-Ratio Filters:
A Template-Based Method for Online Detection of
P300 Evoked Responses
Asim M. Mubeena, Kevin H. Knutha,b,c
aKnuth Cyberphysics Lab, Department of Physics, University at Albany, Albany NY, USA
bDepartment of Informatics, University at Albany, Albany NY, USA
cAutonomous Exploration Inc., Andover MA , USA
Abstract: Template-based signal detection most often relies on computing a correlation, or a dot product, between an incoming
data stream and a signal template. While such a correlation results in an ongoing estimate of the magnitude of the signal in the
data stream, it does not directly indicate the presence or absence of a signal. Instead, the problem of signal detection is one of
model-selection. Here we explore the use of the Bayesian odds-ratio (OR), which is the ratio of posterior probabilities of a
signal-plus-noise model over a noise-only model.
We demonstrate
this method by applying
it
to simulated
electroencephalographic (EEG) signals based on the P300 response, which is widely used in both Brain Computer Interface
(BCI) and Brain Machine Interface (BMI) systems. The efficacy of this algorithm is demonstrated by comparing the receiver
operating characteristic (ROC) curves of the OR-based (logOR) filter to the usual correlation method where we find a significant
improvement in P300 detection. The logOR filter promises to improve the accuracy and speed of the detection of evoked brain
responses in BCI/BMI applications as well the detection of template signals in general.
Index Terms— biomedical signal processing, digital signal processing, medical signal detection, Bayesian, Bayesian model testing
I. INTRODUCTION
Neurophysiology in general, and brain machine interface (BMI) in particular, relies on the detection and
characterization of the electric and magnetic field potentials produced by the brain in response to sensory
stimulation or in association with its cognitive and/or motor operations and planning. These potentials
originate from the transmembrane current flow produced by multiple ensembles of hundreds of thousands
of synchronously firing neurons [1], [2]. Human scalp electroencephalographic (EEG) recording has the
advantage of being noninvasive, inexpensive and portable, which make it a very popular technique among
the BCI/BMI community.
Event-related potentials (ERPs) are evoked brain responses synchronized to sensory, cognitive and motor
events [3]. As such, they consist of relatively reproducible waveshapes embedded in background EEG
activity [4], [5]. In particular, the P300 evoked potential [6], [7] is a positive peak that is evoked 300 ms
after stimulus onset. The P300 is widely used in both BCI and BMI applications, but recent studies show
that it is also useful in the diagnosis of neurological disorders and lie detection. Despite its wide use,
detection of the P300 component in single-trial recordings remains challenging. More often, multiple trials
are needed to detect the P300 component in ongoing EEG activity, which decreases the overall speed of
BCI/BMI systems.
In general, the detection of an ERP is made difficult by its low signal-to-noise (SNR) ratio compared to
the ongoing background EEG. The most commonly-used method to estimate the ERP is coherent
averaging, which averages a large number of time-locked epochs of the identical stimuli presented to the
subject. This technique is used in online applications of BCI [8], [9]; however, it suffers from several
drawbacks [10]. One drawback is that coherent averaging implicitly assumes that the ERP waveshape is
identical from trial-to-trial. This is known to be a poor assumption [11], [12] and, in fact, such trial-to-trial
variability is utilized in some advanced source separation methods [4], [13], [14].
2
Several detection methods work by correlating a template signal with the ongoing EEG. For example,
the Woody filter [15], [16], performs a correlation by taking the dot product of the ongoing EEG signal
with the signal template. Other correlation-based classification techniques like Pearson’s correlation
method (PCM), Fisher’s linear discriminant (FLD), stepwise linear discriminant analysis (SWLDA), linear
support vector machine (LSVM), and the Gaussian kernel support vector machine (GSVM) have been
presented and compared [17], [18]. These methods, which convert the problem of detecting P300 into a
binary search problem (P300 present or not-present), have been widely used in BCI applications. In this
paper we present a Bayesian odds ratio-based (OR-based) technique, which relies on a signal template to
detect the P300 response in ongoing EEG. The OR-based detection method is not specific to EEG signals
and can be applied to any kind of template-based signal detection. The technique is demonstrated by
applying it to synthetic P300 responses. We compare our results to the template correlation (dot product /
Woody filter [16]) method and demonstrate efficacy by comparing the resulting receiver operating
characteristic (ROC) curves [19], [20], [21].
II. THE LOG ODDS-RATIO FILTER
A. Bayes’ Theorem
Bayes’ theorem transforms the problem of signal detection into one of model selection where the
probabilities of the considered models can be computed and compared. The posterior probability
gives us the probability of the parameter values, m, of the model M, given the recorded data D
and relevant prior information I
.
(1)
The posterior probability
depends on both the prior probability of the model parameter
and the data-dependent ratio of the likelihood of the data given the model and its specific
values
model parameter values
, which represents the probability that the
to the evidence
data could have resulted from the model irrespective of the specific model parameter values. Since
summing the posterior probability over all possible model parameter values results in unity, we can write
the evidence as
,
(2)
which demonstrates the reason that this quantity is also referred to as the marginal likelihood.
We consider the problem of signal detection as a model selection problem where we compare the
evidence provided by the data given one model to the evidence of the data provided by the data given
another model. As we are trying to detect the P300 signal from ongoing EEG activity, we will refer to the
model as noise-only (background EEG activity)
,
(3)
where is the time series data recorded from the mth electrode and is the time series of ongoing
EEG activity recorded at each channel. We refer to such activity as noise and assume it to be independent
in each channel.
),,(IMDmPIMDPIMmDPIMmPIMDmP,,,,,,),,(IMDmP),(IMmP),,(IMmDP),(IMDPIMmDPIMmPdmIMDP,,,,)()(:ttxMmmN
3
Similarly, we refer to the model as signal (P300) plus noise (background EEG activity) and write the
model as
,
(4)
where is the time series data recorded from the mth electrode, is the coefficient that couples the
signal source to the mth electrode, α is the amplitude of the signal in the given trial. We assume that the
coefficients and the source signal waveshape are both known. The value of the single-trial
amplitude parameter α in the signal-plus-noise model is assumed to be between 0 and some maximum
value a, so that
.
B. Odds Ratio
To compare the two models, we compute the odds ratio (OR), which is the ratio of the marginal
likelihoods, or evidences, of each model. However, in this problem, the noise-only model has no
model parameters. So we compare the marginal likelihood of to the likelihood :
(5)
where
And
(6)
(7)
We assign a Gaussian likelihood to both models, and note that this does not necessarily mean that the noise
is Gaussian, but rather that the expected squared deviation
from the mean is a relevant quantity. We
then have that (6) becomes
and that the likelihood term in (7) becomes
(8)
(9)
We also assume that the distribution of single-trial amplitudes α is Gaussian with mean
so that
and variance
(10)
Applying the probability assignments in (9) and (10) to the integral in (7), we find that
(11)
)()()(:ttsCtxMmmmNSa0NNSNNSZZIMDPIMDPOR),(),()),(,)((),(ItCtxPIMDPZNNaNSNSItCtxPIPdIMDPZ0),),(,)(()(,2MmTtmMTNtxZ11222/2))((21exp)2(MmTtmmmsMTsttsCtxItCtxP11222/2)()()(21exp)2(),),(,)((2222/12)(21exp)2()(IP22222222/122/22)(221exp)2()2(DEerfDEaDerfDFDEZssssMTsNS
4
where the function erf(x) is the error function defined as the integral of a Gaussian with zero mean and unit
variance from zero to x [22].
Also by defining
(12)
we have that
and
,
(13)
(14)
.
(15)
It is often easier to work with the logarithm of the probabilities. Taking the logarithm of the odds ratio (5)
we have that
, (16)
which after some algebraic simplification, including the assumption that
, results in
(17)
Since the log odds ratio compares the evidence of the two models, it can be used as an index for signal
detection. We will refer to this filter as the logOR filter.
The remainder of this paper focuses on evaluating the performance of this proposed method by
comparing and contrasting its receiver operator characteristic (ROC) curves with those produced by the
usual correlation method (dot product). These ROC curves are constructed by applying these techniques to
times-series data consisting of synthetic EEG background signals in which are embedded P300 targets.
The next section discusses the construction of the synthetic EEG data.
III. SYNTHETIC EEG DATA
To analyze the performance of the logOR filter, we generated synthetic EEG data representing both EEG
background and the P300 evoked response. Three channels of synthetic EEG data (Figure 1a) were
generated to simulate recordings from Cz, Pz and Fz, which are commonly used for P300 -based BMI
applications [18]. The dipole model is used to scale the data among different electrodes. The data from
each of these channels consisted of 300 epochs each being 800 ms in length and comprised of 200 samples,
which is consistent with a sampling rate of 250 Hz. Thirty epochs were selected to each host a single P300
response.
222sSTtMmmtsCSD11222)(TtMmmmtstxCSE112)()(TtMmmtxSF11222))(()log()log(loglogNNSNNSZZZZORs22222222222)(2loglog2log2121logDEerfDEaDerfDDEORssss
5
(a)
(c)
(b)
FIGURE 1. (a) An illustration of the synthetic EEG data generated for the filter evaluation. The three panels represent data
recorded from different channels: Cz, Pz, Fz (top to bottom). Two P300s, indicated by arrows are embedded in these traces.
(b) This figure illustrates the mean power spectrum of the synthetic EEG data. (c) The target signal (P300) template is shown
in this figure. Note that we are using a noisy template to simulate a template generated by taking averages of P300 recordin g
epochs.
We randomly generated a sequence of stimulus event times and used these times as latencies at which to
superimpose the P300 template onto the synthetic ongoing background EEG signal, which we refer to as
noise [23]. The stimulus event times were stored and used to identify as true/false-positives and true/false-
negatives during the filter evaluation. The remaining 270 epochs exhibited only ongoing background EEG
(noise).
The synthetic P300 waveform was represented using the classical theory [23], [24] where an ERP
waveform reflects a phasic-burst of activity. The P300 template (Figure 1b) was created with by producing
a peak of width of 100ms starting around 300 ms after onset. To produce a P300 template more similar to
what one would generate in the lab by averaging recorded P300 responses, we added low-level background
noise to the P300 template.
To generate the ongoing EEG background, we used MATLAB code provided online by Yeung and
Bogacz [25]. Fifty different sine waves were superimposed to create the background signal. This was done
by randomly selecting a frequency for each sine wave between 0 and 50 Hz. The phase was selected at
random, and the amplitude was chosen to be consistent with the Human EEG power law spectrum on
which was superimposed two peaks at 10 and 60 Hz [26] (Figure 1c).
To study the effect of the SNR on the filter performance, we created 17 data sets where the SNR,
calculated by the formula
,
(19)
was varied in integral steps from -6 dB to 7 dB as well as 10, 15 and 20 dB. This covers the typical SNR
range seen in BCI EEG applications, which is approximately from -6 dB to 6 dB [27].
210log10NoiseSignaldBAASNR
(a)
(c)
(e)
(g)
6
(b)
(d)
(f)
FIGURE 2. Receiver Operative Characteristic (ROC)
curves for both the Correlation Method (dashed) and logOR
filter (solid). The area under the curve quantifies the
efficacy of the detection method. Each panel shows results
for a different SNR value varying from -5dB to 15 dB. As
the SNR value increases, the area under the curves increases
for both methods. The logOR filter out -performs the
Correlation Method at all SNR levels.
7
IV. RECEIVER OPERATIVE CHARACTERISTICS (ROC) CURVES
ROC curves serve as a performance measure of signal detection [20], [21] by plotting the true positive rate
(also known as sensitivity) versus the false positive rate (1–specificity). Sensitivity is computed by
identifying the fraction of correctly detected targets (P300) and specificity refers to the fraction of non-
targets (non-P300) identified as non-targets. The fractional area under the ROC curve serves to quantify
the performance of the detection methods so that a perfect detection method will result in unity; whereas a
completely failed method will result in zero. The result is such that the more accurate the detection
method, the greater the fractional area under the ROC curve.
V. DETECTION THRESHOLD
The selection of a detection threshold value is a difficult task. As the detection threshold increases, the
sensitivity decreases while the specificity increases, which means that the false positive fraction (1–
specificity) decreases. To produce ROC curves, we calculate sensitivity and (1-specificity) for each
distinct value of the detection measure (i.e logOR / Correlation) to consider it as a candidate for detection
cutoff. By plotting (1–specificity) versus sensitivity, the efficacy of the detection method can be quantified
by the area under the ROC curve. The ROC curve starts from the most strict decision cutoff point where
sensitivity and (1–specificity) values are zero where there will be no positive detection, and ends at most
lenient cutoff point where sensitivity and (1–specificity) values are one and all detection values are taken to
represent a positive detection. The value of the area under the curve for the best detection method should
be one [28], [29]. However, when a method results in an ROC curve where the area under the curve is less
than one; there is always a tradeoff between sensitivity and (1–specificity). So, the detection threshold can
be found by minimizing the distance between sensitivity and specificity. One can also find the threshold
value by plotting the sensitivity and specificity versus the detection criteria, and selecting the decision
threshold value based on the intersection point of sensitivity and specificity curves.
FIGURE 3. SNR vs. Area under ROC curves for the Correlation Method
and the logOR filter. The value of Area under the curve increases as SNR
increases for both methods. For higher values of SNR, the logOR filter
performs much better than the Correlation Method.
VI. RESULTS
8
In this paper we developed and evaluated a template-based detection method that relies on the Bayesian log
odds ratio (logOR filter) to detect the presence or absence of a P300 signal in a synthetic ongoing EEG
dataset representing three commonly-used EEG channels: Cz, Pz and Fz.
We applied the logOR filter to the synthetic EEG data and compared the results to those obtained using
the traditional correlation filter. Using the detections and the sequence of events used to generate the data,
we computed the ROC curves for different SNR ranging from -6 dB to 20 dB to evaluate the performance
of both methods. Figure 2 shows the resulting ROC curves for several SNR values ranging from -5 dB to
15 dB. The area under the ROC curve is consistently greater for the logOR filter indicating that the logOR
filter out-performs the traditional correlation filter. A plot of the area under the ROC curves as a function
of P300 SNR can be seen in Figure 3. Both methods exhibit similar performance at the lowest SNR value,
but as the SNR increases, one can see that the logOR filter out-performs the correlation-based filter.
VII. DISCUSSION
Most template-based methods designed to detect a target signal in a continuous EEG stream rely on the
cross correlation of the incoming data with the template or target signal [15], [16]. Here we present a new
approach in which we recast the problem of signal detection in terms of evidence-based model selection.
By computing the Bayesian log odds-ratio between two models (the signal plus noise model, , and the
noise only model, ), we produce an index, which we refer to as the logOR filter. The value of the
logOR filter index is high when the target signal, for example a P300, is present and low otherwise. We
studied the performance of these two methods by applying them to synthetic EEG signals with P300 targets
exhibiting SNRs ranging from -6 to 20 dB. Performance was quantified by constructing the ROC curves
for each method and computing the area under the ROC curve. We found that the logOR filter out-
performs the correlation method. This suggests that systems aiming to minimize the number of target
trials, such as P300-based BCI/BMI systems, may benefit from employing the logOR filter. However it is
observed that logOR filter performance is very sensitive to differences between the assigned and true
standard deviation values of the background noise and the trial-to-trial amplitude variability of the P300
response. Therefore in a practical application one must choose the values of these parameters very
carefully to calculate the logOR filter value.
ACKNOWLEDGMENTS
The authors would like to thank Dr. Dennis J. McFarland for valuable discussions, access to EEG data and
instruction regarding the BCI2000 system
REFERENCES
[1] M. A. B. Brazier. “Evoked responses recorded from the depths of the human brain,” Annals of the New York Academy of Sciences, 112(1):
pp. 33–59, 1964.
[2] C. C. Duncan, R. J. Barry, J. F. Connolly, C. Fischer, P. T. Michie, R. Näätänen, J. Polich, I. Reinvang, and C. V. Petten. “Event-related
potentials in clinical research: guidelines for eliciting, recording, and quantifying mismatch negativity, P300, and N 400,” Clinical
Neurophysiology, 120(11): pp. 1883–1908, November 2009. PMID: 19796989.
[3] D. Friedman and R. Johnson. “Event-related potential (ERP) studies of memory encoding and retrieval: a selective review,” Microsc Res
Tech, 51(1): pp. 6–28, 2000.
9
[4] K. H. Knuth, A. S. Shah, W. A. Truccolo, M. Ding, S. L. Bressler, and C. E. Schroeder, “Differentially variable component analysis:
Identifying multiple evoked components using trial-to-trial variability,” Journal of Neurophysiology, 95(5): pp. 3257–3276, May 2006.
PMID: 16467431.
technique,”
[5] A. Mouraux and G. D. Iannetti. “Across-trial averaging of event-related EEG responses and beyond,” Magnetic Resonance Imaging,
26(7): pp. 1041–1054, September 2008. PMID: 18479877.
[6] U. Hoffmann. Bayesian machine learning applied in a brain-computer interface for disabled users, PhD thesis, STI, Lausanne, 2007.
[7] Sutton, M. Braren, J. Zubin, and E. R. John. “Evoked-potential correlates of stimulus uncertainty,” Science, 150(700): pp. 1187–1188,
1965.
[8] K. H. Chiappa. Evoked Potentials in Clinical Medicine, 3e. Lippincott Williams & Wilkins, 1997.
[9] E. Donchin, K. M. Spencer, and R. Wijesinghe, “The mental prosthesis: assessing the speed of a P300-based brain-computer interface,”
IEEE Transactions on Rehabilitation Engineering, 8(2): pp. 174 –179, June 2000.
[10] G. Sparacino, S. Milani, E. Arslan, and C. Cobelli, “A Bayesian approach to estimate evoked potentials,” Computer Methods and
Programs in Biomedicine, 68(3): pp. 233–248, June 2002.
[11] G Fein and B Turetsky. “P300
latency variability
in normal elderly: effects of paradigm and measurement
Electroencephalography and clinical neurophysiology, 72(5): pp. 384–394, May 1989. PMID: 2469563.
[12] J. M. Ford, P. White, K. O. Lim, and A. Pfefferbaum, “Schizophrenics have fewer and smaller P300s: a single-trial analysis,” Biological
Psychiatry, 35(2): pp. 96–103, January 1994. PMID: 8167215.
[13] C. D’Avanzo, S. Schiff, P. Amodio, and G. Sparacino, “A Bayesian method to estimate single-trial event-related potentials with
application to the study of the p300 variability,” Journal of Neuroscience Methods, 198(1): pp. 114–124, 2011.
[14] W. Truccolo, K. H. Knuth, A. Shah, S. L. Bressler, C. E. Schroeder, and M. Ding. “Estimation of single-trial multicomponent ERPs:
differentially variable component analysis (dVCA),” Biological Cybernetics, 89(6): pp. 426–438, December 2003. PMID: 14673654.
[15] H. Serby, E. Yom-Tov, and G.F. Inbar. “An improved P300-based brain-computer interface,” IEEE Transactions on Neural Systems and
Rehabilitation Engineering, 13(1): pp. 89–98, 2005.
[16] C. D. Woody. “Characterization of an adaptive filter for the analysis of variable latency neuroelectric signals ,” Medical and Biological
Engineering, 5(6): pp. 539–554, November 1967.
[17] D. J. Krusienski, E. W. Sellers, F. Cabestaing, S. Bayoudh, D. J. McFarland, T. M. Vaughan, and J. R. Wolpaw. “A comparison of
classification techniques for the P300 speller,” Journal of Neural Engineering, 3(4): pp. 299–305, December 2006.
[18] E. W. Sellers, D. J. Krusienski, D. J McFarland, T. M. Vaughan, and J. R. Wolpaw. “A P300 event-related potential brain-computer
interface (BCI): the effects of matrix size and inter stimulus interval on performance ,” Biological Psychology, 73(3): pp. 242–252,
October 2006. PMID: 16860920.
[19] J. T. Bushberg, J. A. Seibert, E. M. Leidholdt, and J. M. Boone. The Essential Physics of Medical Imaging. Lippincott Williams &
Wilkins, December 2011.
[20] S. Schinkel, O. Dimigen, and N. Marwan. “Selection of recurrence threshold for signal detection ,” The European Physical Journal Special
Topics, 164(1): pp. 45–53, November 2008.
[21] M. H. Zweig and G. Campbell. “Receiver-operating characteristic (ROC) plots: a fundamental evaluation tool in clinical medicine ,”
Clinical Chemistry, 39(4): pp. 561–577, April 1993.
[22] M. Abramowitz, I. A. Stegun, Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables, New York:
Dover, 1965, Chapter 7, pp. 297.
[23] N. Yeung, R. Bogacz, C. B. Holroyd, and J. D. Cohen, “Detection of synchronized oscillations in the electroencephalogram: an evaluation
of methods,” Psychophysiology, 41(6): pp. 822–832, Nov. 2004. PMID: 15563335.
[24] A. S. Shah, S. L. Bressler, K. H. Knuth, M. Ding, A. D. Mehta, I. Ulbert, and C. E. Schroeder, “Neural dynamics and the fundamental
mechanisms of event-related brain potentials,” Cerebral Cortex, 14(5): pp. 476–483, May 2004.
[25] N. Yeung, R. Bogacz, C. B. Holroyd, S. Nieuwenhuis and J. D. Cohen Generation of simulated EEG data.
http://www.cs.bris.ac.uk/~rafal/phasereset/
[26] T. C. Ferree and R. C. Hwa. “Power-law scaling in human EEG: relation to Fourier power spectrum,” Neurocomputing, 52-54: pp. 755–
761, June 2003.
[27] J. Kronegg, S. Voloshynovskiy, and T. Pun. “Analysis of bit-rate definitions for brain-computer interfaces,” In Conference on Human-
Computer Interaction (HCI-2005), Las Vegas, 2005.
[28] N. A. Obuchowski. “Receiver operating characteristic curves and their use in radiology,” Radiology, 229(1): pp. 3–8, October 2003.
[29] N. A. Obuchowski. “ROC analysis,” American Journal of Roentgenology, 184(2): pp. 364–372, February 2005.
|
1703.04182 | 7 | 1703 | 2018-08-28T20:42:53 | Optimal control of eye-movements during visual search | [
"q-bio.NC"
] | We study the problem of optimal oculomotor control during the execution of visual search tasks. We introduce a computational model of human eye movements, which takes into account various constraints of the human visual and oculomotor systems. In the model, the choice of the subsequent fixation location is posed as a problem of stochastic optimal control, which relies on reinforcement learning methods. We show that if biological constraints are taken into account, the trajectories simulated under learned policy share both basic statistical properties and scaling behaviour with human eye movements. We validated our model simulations with human psychophysical eye-tracking experiments | q-bio.NC | q-bio |
Optimal control of eye-movements during visual search
A.Y.Vasilyev
Queen Mary University of London, Mile End Road, E1 4NS
Abstract
We study the problem of an optimal oculomotor control during the execution of visual search tasks. We
introduce a computational model of human eye movements, which takes into account various constraints
of the human visual and oculomotor systems. In the model, the choice of the subsequent fixation location
is posed as a problem of a stochastic optimal control, which relies on reinforcement learning methods. We
show that if biological constraints are taken into account, the trajectories simulated under a learned policy
share both basic statistical properties and a scaling behaviour with human eye movements. We validated
our model simulations with human psychophysical eye-tracking experiments.
Keywords:
scaling in biology, visual search, reinforcement learning, multifractal analysis
1. Introduction
The human oculomotor system performs hun-
dreds of thousands of eye-movements per day during
the execution of different behavioral tasks. In order
to find the details of a visual scene related to the
tasks, humans direct foveal vision to the most in-
formative locations via saccades - high-velocity con-
jugate gaze shifts. Saccades are followed by a vi-
sual fixation, during which the human oculomotor
system generates fixational eye movements involun-
tarily. Despite the remarkable achievements in the
modelling of fixational eye movements and the inter-
pretation of their fundamental properties [1, 2, 3],
there is no comprehensive generic model of fixation
selection [4, 5, 6], which takes into account the un-
derlying mechanisms of visual attention [5, 7, 8] and
qualitatively describes the statistical properties of
saccadic eye-movements during the execution of vi-
sual tasks [9, 10, 11, 12].
Previously, the problem of fixation selection was
studied in the framework of control models of eye
movements [13, 11, 9].
In control models the ob-
server gathers information about the world during
each fixation, integrates information over all fixa-
tions into a belief state and makes a choice of the
next location on which to fixate. This choice is gov-
erned by the policy of gaze allocation - a function
that specifies the action of decision-maker in a cer-
tain belief state. It was shown that the policy based
on information maximization criteria [9] generates
trajectories that share basic statistical properties
with human eye movements.
In this research, we
set the goal of developing a control model of fixation
selection that is capable of interpreting the scaling
behaviour of human eye-movements [10, 14, 12, 15]
and provides a human level of performance to a com-
putational agent.
In contrast to the previous research on control
models, we take into account the inherent uncer-
tainty of human oculomotor system and the dura-
tion of saccadic eye movements.
It's well known
that any motor action of humans is executed with
random error, which increases with movement mag-
nitude [16, 17]. Despite the oculomotor system hav-
ing developed a correction mechanism for saccade
Preprint submitted to Example: Nuclear Physics B
August 30, 2018
2.1 World state
2
errors [18], these result in inevitable temporal costs.
Furthermore, the duration of saccades is empirically
correlated with their magnitude as well [19]. These
factors result in situations where the observer has
to choose between more informative remote (and
riskier) locations and those nearby (but less infor-
mative ones). We show that if these constraints
are taken into consideration, the trajectories sim-
ulated under a learned policy share both basic sta-
tistical properties and scaling behavior with human
eye movements, which is not achievable with the
conventional infomax model [9].
On the basis of our results, we argue that we have
made the following contribution:
• The formulation of the biologically plausible
model of gaze allocation in the human observer
from the point of view of stochastic optimal
control. The representation of the model in
the form of partially observable Markov deci-
sion process (PO-MDP) and the proposal of a
heuristic policy.
• The development of robust and high perfor-
mance algorithms of simulation of PO-MDP.
The implementation of reinforcement learning
algorithms of policy optimization and numeri-
cal estimation of the optimal policy of gaze al-
location.
• The comprehensive statistical analysis of sim-
ulated trajectories and data from our psycho-
physical experiments. The policy, which is
learned with the policy gradient REINFORCE
algorithm, shows the highest level of statisti-
cal similarity with human eye-movements.
In
our experiments we discovered the dependency
of the mean saccade length and q-order Hurst
exponent on visibility of the target, which was
explained by our model.
2. Model of the ideal observer
In this section we formulate the model of the ideal
observer, which aims to localize the single target
object on the stationary 2D image. We represent
the model in the form of partially observable Markov
Figure 1:
Flow chart of the model of the ideal observer.
The visual search is a recurrent process that starts after ini-
tialization of the world state. On each consequent step the
observer receives the observation vector Wn, which is then
used for estimation of belief state pn using Bayesian inference
[20]. After the update of the belief state the observer makes
the decision Dn where to fixate next according to the policy
of gaze allocation: Dn = µ(pn). The next fixation location
is defined by execution function: An+1 = α(Dn). If the ob-
server fixates on the location of target An+1 = m the process
of visual search is terminated, otherwise the next step starts
with updated values of variables.
decision process (PO-MDP), which is summarized
by flow chart on Figure 1.
2.1. World state
At the beginning of each episode the target ob-
ject appears randomly at one of L possible locations.
We assume that the target is placed on background
noise or surrounded by distractors, which are placed
on vacant locations. The world state Sn is repre-
sented as a tuple:
Sn = (m, An, tn)
(1)
Initialize world state Extract observation Update belief state Execute saccade YES NO End Visual search Make decision Initialization 2.3 Execution of saccades
where m is a location of the target on the image and
An is gaze fixation location that changes with the
number of step n, and tn is time passed from the
start of a trial and the step n.
If the observer fixates the gaze on the location of
target:
An = m
(2)
the visual task is considered to be accomplished.
This formulation of the terminal state reflects the
necessity to foveate the target in order to extract as
much information about its identity and details as
possible. The location of target m doesn't change
during a trial.
2.2. Update of belief state
The decision-making of the observer is modeled as
PO-MDP with a belief state pn - a discreet probabil-
ity distribution function of target location given all
observations received up to the step n. Because the
observer is instructed that the target appears ran-
domly, the initial belief state p0 is a discrete uniform
distribution.
On each step n observer receives the observation
vector Wn = (W1,n, . . . , WL,n), whose elements rep-
resent the perceptual evidence that the target is at
corresponding locations. The probability distribu-
tion function is updated using Bayesian inference
[20]:
(cid:80)
pn−1 (l )p(Wnl , An )
pn−1 (k )p(Wnk , An )
pn (l ) =
(3)
k
where l is the index of the location and p(Wl, A) is
an observation model. In order to take into account
the uncertainty of the processing of perceptual in-
formation within the neural circuits of the observer,
we follow the "noisy observation" paradigm [9]. In
this paradigm the observation model p(Wl, A) re-
flects the presence of the observer's internal sources
of inefficiency, such as physical neural noise on all
stages of information processing. According to the
perceptual model [11] the observation W may be
represented as a random variable with Gaussian dis-
tribution with mean depending on the location m of
the center of target on the lattice:
(cid:89)
p(Wl, A) =
p(WlA) =
l
Wl; δl,m,
1
F ((cid:107)l − A(cid:107))
(cid:17)
(cid:16)
(cid:89)
l
N
3
(4)
where δi,j is Kronecker delta, N (x, µ, ν) is a value
of Gaussian function with mean µ and variance ν
for argument x; (cid:107)l − A(cid:107) is Euclidean distance be-
tween the locations l and the current fixation A,
and F is a Fovea-Peripheral Operating Character-
istic (FPOC) [13]. FPOC is a function that repre-
sents the dependence of a signal-to-noise ratio on
the eccentricity. Figure 2 demonstrates FPOC cal-
culated for several values of RMS contrast of the
background 1/f noise: en ∈ (0.1, 0.15, 0.2, 0.25) and
a single value of RMS contrast of target et = 0.2.
The calculation are based on the analytical expres-
sions from [11]. The signal-to-noise ratio has a peak
at fovea and decreases rapidly with eccentricity.
In our simulations we consider only the case of the
rotationally symmetric FPOC. This assumption is
not correct for human observers, and better generic
model of FPOC can be found in [21]. The broken
circular symmetry of FPOC inevitably results in the
asymmetry of the visual search process [22]. We sim-
plify the model of FPOC, because in this research
we focus our attention more on the temporal struc-
ture of eye-movements rather than on their spatial
distribution.
2.3. Execution of saccades
The decision of which location to fixate next, Dn,
is made on each step of PO-MDP according to the
policy of gaze allocation µ :
Dn = µ(pn)
(5)
After making the decision, the coordinates of the
next fixation location An+1 are defined by the exe-
cution function:
An+1 = α(Dn) = Dn + Jn
(6)
where Jn is a Gaussian-distributed random error
with zero mean and standard deviation ν defined
in [17]:
2.5 Value function
4
of these time intervals are empirically correlated
with a magnitude of the saccade preceding the fix-
ation [19, 23, 24]. The duration of saccadic eye-
movements Θsac(n) in range of magnitudes from
1.5◦ to 30◦ is possible to approximate as [25]:
Θsac(n) = τsac (cid:107)An − An−1(cid:107)0.4
(9)
where τsac = 21ms · deg
−0.4. Besides the magni-
tude of saccade, the fixation duration Θf ix(n) is in-
fluenced by various factors as a discriminability of
the target [26], its complexity and the visual task
of the observer [24, 27]. However, if the observer
is correctly informed about the targets' properties
before the task execution and performs the visual
task without any interruptions, the contribution of
these factors to the fixation duration (with excep-
tion of magnitude) is constant during each trial. The
eye-tracking experiments with the fixations tasks
[23, 24, 28] found that the dependence of fixation
duration on saccade amplitude is linear:
Θf ix(n) = (cid:107)An − An−1(cid:107) τf ix + Θ0,f ix
(10)
with a slope τf ix = 6ms/ deg. The constant
Θ0,f ix = 250ms is an intercept, averaged from val-
ues from eye-tracking data [29, 30]. Finally, the du-
ration of step n is:
Θ(n) = Θsac(n) + Θf ix(n)
(11)
sac = 20± 3ms· deg
The values of parameters used in simulations are
consistent with our estimates from the eye-tracking
f ix = 5.8±
experiments: τ∗
1.8ms/ deg, Θ0,f ix = 241±42ms. Within this range
of the parameters' values we didn't find a substantial
difference in the estimates of the learned policy of
gaze allocation.
−0.4, τ∗
2.5. Value function
Given the initial world state S0, we define the cost
function for policy µ as an expectation of a random
variable V :
Vµ(S0) = E [V µ, S0]
(12)
Figure 2: Fovea-Peripheral Operating Characteristic was cal-
culated for several values of the RMS contrast of background
noise: en ∈ (0.1, 0.15, 0.2, 0.25) and the single value of RMS
contrast of target et = 0.2. The signal-to-noise ratio has a
peak at fovea and decreases rapidly with eccentricity.
ν = ζ0 + ζ1 (cid:107)Dn − An(cid:107)
(7)
The error of the saccade execution is proportional
to intended saccade amplitude (cid:107)Dn − An(cid:107) given in
degrees, the value of parameters: ζ0 = 0.87 deg,
ζ1 = 0.084 (from[17]).
The next step of PO-MDP starts after the tran-
sition to the location An+1. This decision-making
model may be easily extended in order to take into
account the extraction of visual
information be-
tween the moment of making the decision where to
fixate next and completion of the saccade.
2.4. Duration of the steps
After each consequent step the time variable t of
world state (1) is updated in a deterministic way:
tn = tn−1 + Θ(n)
(8)
where Θ(n) is a duration of step n. The duration of
time step Θ(n) is considered as a total time, which
is required for the relocation of the gaze from a pre-
vious location A(n − 1) to the current one A(n)
and the extraction of visual information from the
location A(n). Therefore, we consider Θ(n) as a
sum of durations of the fixation Θf ix(n) and the
saccade Θsac(n). According to the literature, both
12345eccentricity, deg02468valueFPOC0.10.150.20.253.2 Optimal policy estimation
5
The random variable V denotes the cost and is de-
fined by:
N(cid:88)
V ≡ c
Θ(n) = ctN
(13)
n=0
where N is a total number of steps in the episode,
and c is a time cost constant.
Formulation of the cost function in a real time
sets this study separately from the previous works
[31, 11, 13]. We show below, that the policy µ opti-
mized for the cost function with the reward defined
in (13) generates the sequences of actions with sta-
tistical characteristics close to the human saccadic
eye-movements.
3. Policy of gaze allocation
3.1. Infomax approach
In this section we describe two heuristic policies
related to the model of Entropy Limit Minimization
searcher [9]. We define the information gain on the
step n + 1 as: (cid:52)I(n + 1) = H(pn)− H(pn+1), where
H (·) is Shannon entropy. The heuristic policy π0
is defined as a policy which chooses such decision
Dn that maximizes the expected information gain
(cid:52)I(n + 1):
π0(pn) = Dn = arg max
D
[E [(cid:52)I(n + 1)]]
(14)
The term E [(cid:52)I(n + 1)] is calculated analytically in
[9] for the case of the saccadic eye-movements with-
out uncertainty (An+1 ≡ Dn):
1
2
E [(cid:52)I(n + 1)] =
(15)
where sign ∗ denotes a convolution operator, and
F is FPOC represented as a radially symmetric 2D
function: F (A) ≡ F ((cid:107)A(cid:107)). The expression (15)
gives an approximate value of the expected infor-
mation gain in the case of the stochastic saccadic
placement (6).
The figure 3 illustrates the decision-making pro-
cess, which corresponds to the policy π0. The colour
(cid:0)pn ∗ F 2(cid:1) (Dn)
map (left) represents the function of the expected in-
formation gain (equation (15)). The blue cross cor-
responds to the location of the current fixation on
the step n. The observer makes a decision to fixate
at the location defined by the policy: Dn = π0(pn).
This decision results in a saccadic eye-movements to
location An+1 = α(Dn) marked by the green cross.
After receiving the observation at the step n + 1,
the observer updates the belief state and evaluate
the information gain for the next decision. In this
particular situation, the target was absent at the
vicinity of An+1, and the observation resulted in the
decline of probability pn+1 in the area around the
green cross (figure 3 right). This area is effectively
inhibited from subsequent fixations due to low prob-
ability. The size of this area is defined by values of
FPOC (et = 0.2, en = 0.1 in this case). We call the
policy π0 "infomax greedy" in the text below.
The trajectories generated with infomax greedy
policy match the basic properties of human eye
movements [9]. However, the policy (15) doesn't
consider the correlation between the magnitude of
saccades and the durations of steps of MDP. We
show later that the policy π0 is inferior to the pol-
icy that optimizes the expected rate of information
gain E [(cid:52)I(n + 1)/Θ(n + 1)]:
π1(pn) = arg max
D
[E [(cid:52)I(n + 1)/Θ(n + 1)]]
(16)
Using the expression for E[(cid:52)I(n + 1)] (15), for
the deterministic saccadic placement (An+1 ≡ Dn):
(cid:34)(cid:0)pn ∗ F 2(cid:1) (Dn)
(cid:35)
Θ(n + 1)
(17)
π1(pn) = Dn = arg max
D
The policy π1 is called "infomax rate" in the text
below. The performance of these two heuristic poli-
cies will be compared with a performance of the pol-
icy learned with reinforcement learning algorithms
in the section Appendix A.4.1.
3.2. Optimal policy estimation
In this section we describe the evaluation of the
policy of gaze allocation that optimizes the cost
3.2 Optimal policy estimation
6
Figure 3: The decision-making process under the infomax greedy policy π0 [9]. The colour map (left) represents the function
of the expected information gain (equation (15)). The blue cross corresponds to location of the current fixation on the step
n. The observer makes a decision to fixate at the location defined by the policy: Dn = π0(pn). This decision results in the
saccadic eye-movement to location An+1 = α(Dn) marked by the green cross. After receiving the observation at the step n + 1,
observer updates the belief state and evaluates the information gain for the next decision. In this particular situation, the
target is absent in the vicinity of An+1, and the observation resulted in the decline of probability pn+1 in the area around the
fixation (the green cross). This area is effectively inhibited from the subsequent fixations due to low probability pn+1. The size
of this area is defined by the values of FPOC (in this case et = 0.2, en = 0.1).
function (12) for any starting world state S0. We
start with the representation of the stochastic pol-
icy µ in the on [20]:
µ(D, p) =
exp(f (D, p))
exp(f (l, p))
(18)
(cid:80)
l
(cid:88)
where f (D, p) is a function of expected reward gain
after making the decision D with the belief state
p. In this study we limit the search of f (D, p) to a
convolution [20] of belief state p:
f (D, p) =
K(D − l)p(l)
(19)
l
In supplementary materials Appendix A.1 we jus-
tify this choice of the policy and evaluate the form
of a kernel function K that allows us to effectively
solve the optimization problem with the policy gra-
dient algorithms. Our task is the search of the kernel
function K (A.4), which corresponds to the policy
that optimizes the cost function Vµ:
K∗ = arg min
K
(20)
for any starting world state ∀S0. The policy µ(K∗)
is called the optimal policy of gaze allocation.
Vµ(K)(S0)
We approach the optimization problem (20) with
an algorithm named "REINFORCE with optimal
baseline" [32] according to the procedure described
in Supplementary materialAppendix A. The perfor-
mance of REINFORCE was compared with one of
the optimization algorithms named "policy gradi-
ent parameter exploration" (PGPE) adopted from
[33]. The algorithm of REINFORCE with an op-
timal baseline belongs to the class of the likelihood
ratio methods, whereas PGPE is related to the finite
difference methods. Despite the distinction between
these two approaches, both algorithms give a close
estimation of the optimal policy Appendix A.4.1.
We simulated trajectories for the data analysis in
section 4 using the solution provided by REIN-
FORCE due its better performance comparing to
PGPE. Figure 4 demonstrates the decision-making
process under the policy µ learned for FPOC corre-
Expected information gain on step N, bits03691215X, deg03691215Y, deg00.10.20.30.40.5Expected information gain on step N+1, bits03691215X, deg03691215Y, deg00.10.20.30.40.50.64.1 Performance
7
Figure 4: The decision-making process under the policy learned for FPOC corresponding to conditions et = 0.2, en = 0.1.
At the step n observer fixates the location marked by a blue cross. The policy µ defines a probability density function of a
decision D where to fixate next (A.5). Observer chooses the decision Dn according to the policy, which results in a saccadic
eye-movement to location An+1 = α(Dn) (the green cross). As well as in the case of dynamics under the heuristic policy π0
previously visited locations are inhibited from the subsequent fixations. Note that movements to remote locations are inhibited
by the radial function. This results in co-directed short movements, which are also characteristic of human observer.
sponding to the conditions et = 0.2, en = 0.1 (see
figure A.13 for its kernel function). At the step n the
observer fixates the location marked by a blue cross.
The policy µ defines a probability density function
of the decision D where to fixate next (A.5). The
observer chooses the decision Dn = µ (pn), which
results in a saccadic eye-movement to the location
An+1 = α(Dn) (green cross). As well as in the case
of dynamics under the heuristic policy π0, previously
visited locations are inhibited from the subsequent
fixations.
4. Basic properties of trajectories
In this section we discuss the statistical proper-
ties of trajectories generated with the learned pol-
icy µ and the heuristic policies π0 and π1. The
simulations were performed on the grid with size
128 × 128 that corresponds to the visual field with
size of 15×15 deg in the psychophysical experiment.
In order to justify our computational model, we re-
produced the psychophysical experiments from [9].
The detailed description of the experiments can be
found in AppendixAppendix C.
4.1. Performance
Although this computational model was not de-
signed for an exact prediction of a response time
of human observers, it demonstrates a high level
of consistency in a performance of the visual task
execution with human observers. The performance
was measured as an average time to reach the tar-
get (the mean response time) and as a percentage
of the correct fixations on target's location on an
N-Alternative Forced Choice task (N-AFC). The
unsuccessful trials from the psychophysical exper-
iments were excluded from the consideration. We
found that the number of the unsuccessful trials
grows with the contrast of noise: 2.3%, 5.7%, 9.8%,
16.4% for the corresponding numbers of the contrast
n = (0.1, 0.15, 0.2, 0.25).
Figure 5 (left) demonstrates the percentage of cor-
rect fixations on the target location for the exper-
imental conditions: et = 0.2, en = 0.15. Means
and standard errors of the response time of the hu-
man observers is presented on Figure 5 (right) to-
gether with means of the response time for three
policies estimated from 104 episodes of PO-MDP.
The learned policy outperforms two heuristics and
PDF of decision at step N 03691215X, deg03691215Y, deg012#10-4PDF of decision at step N+1 03691215X, deg03691215Y, deg01234#10-44.2 Amplitude distribution
8
the human observers both in the mean response time
and the percentage of the correct fixations for all
experimental conditions. Human observers signif-
icantly outperformed the infomax rate for the ex-
perimental conditions: en = (0.2, 0.25) (Student's
t-test p < 0.05) and the infomax greedy for the con-
ditions en = (0.15, 0.2, 0.25) (p < 0.05) on the mean
response time, which was previously found in [22, 9].
In the same time the learned policy outperformed
the human observers significantly for the condition
en = 0.25, while for other conditions t-test didn't re-
ject hypothesis that distributions have equal means
at 5% significance level.
4.2. Amplitude distribution
The Figure 6 (left) shows the length distributions
of saccades of the human observers and the simu-
lated agents performing the visual search task corre-
sponding to the experimental conditions: en = 0.2,
et = 0.2.
The distributions for all policies and the human
observers exhibit an ascent between 0 deg and max-
imum around 2 deg. The difference in the behaviour
of the distributions starts from 4 deg. In this exper-
imental conditions the share of the saccades of the
human observer with the length larger than 4 deg
is 18%, whereas this value for π0 is 38%. The
length distribution for π0 stabilizes on the interval
[4.0, 14.0] deg that was observed in the earlier work
[11], and we found that length of this "stability"
interval increases linearly with the grid size. The
reason behind this is an uniform radial ranking of
policy π0 for all locations due to the constant radial
function (15). The decline of probability starts only
at a distance compared to the size of visual field.
On the other hand the length distributions of
trajectories under µ, π1 are concave on an interval
[4.0, 14.0] deg, which is also a characteristic for hu-
man eye-movement [34, 35]. The behaviour of the
radial function of µ reflects the non-uniform radial
ranking (a preference in decision-making, see figure
(4)) of the locations. As a result, the remote lo-
cations have significantly lower probabilities to be
chosen as the next destinations.
We performed Kolmogorov-Smirnov (K-S) test to
check equality of distributions of experimental and
Cases
noise
contrast
0.1
0.15
0.2
0.25
K-S test statistics
infomax
infomax
greedy
0.312
0.256
0.212
0.201
rate
0.121
0.082
0.053
0.095
learned
policy
0.124
0.081
0.04
0.074
critical
value
0.067
0.052
0.047
0.035
Table 1: Statistics for K-S test between the experimental
distribution of saccade length and simulated distributions for
different policies. The first and the second columns show the
values of RMS contrast in the psycho-physical experiment
and corresponding critical values of test statistics for signifi-
cance level α = 0.01. The next three columns show K-S test
statistics for distribution of saccades simulated under differ-
ent policies.
simulated saccades. The results of the test are
summarized in table 1 . The first and the second
columns show the values of RMS contrast in the
psycho-physical experiment and corresponding crit-
ical values of the test statistics at a significance level
α = 0.01. The critical values are different due to the
difference in number of saccades for each experimen-
tal condition. The next three columns show K-S test
statistics for the distributions of the saccades simu-
lated under the different policies. K-S test indicated
a higher statistical similarity between the distribu-
tions of the experimental saccades and the saccades
simulated under the learned policy µ for the cases
en = (0.15, 0.2, 0.25). In the case en = 0.1 the in-
fomax rate and the learned policy explained the ex-
perimental distribution equally well. From this, we
can make a conclusion that simulations under the
learned policy explained the best the length distri-
bution of the human eye-movements.
The mean length of the saccades was estimated
from 104 episodes of PO-MDP for all three policies
and compared with the mean length of the saccades
of the human observers (see figure 6 right). Ac-
cording to our results, the mean length of the sac-
cades decreases with en, which is consistent with
our simulations. It's an immediate consequence of
the decrease of values of FPOC with the increase
of the RMS contrast of noise, which is illustrated
on figure 2. The amplitude of the signal exceeds
4.2 Amplitude distribution
9
Figure 5: The performance of the human observers and the simulated agents. The learned policy outperforms two heuristics
both in the mean completion time and the percentage of correct responses in N-AFC task (left) for the experimental conditions:
et = 0.2, en = 0.15. The dependence of mean completion time (right) for the learned policy resembles one for the human
observer.
Figure 6: The histograms of the length distribution of the saccadic events (left) for trajectories generated under the policies
π0, π1 and µconv and the human eye-movements corresponding to the experimental conditions: en = 0.2, et = 0.2. The data
was binned with the resolution of 0.1 deg. The distribution function for all policies and human observer exhibits an ascent
between 0 deg and maximum around 2 deg. The distribution of length corresponding tothe infomax greedy π0 stabilizes after
4 deg and declines only after 10 deg. It is not consistent with length distribution of human saccadic eye-movements, which is
concave on an interval [4.0◦, 14.0◦]. The mean length of saccades decreases with en (right). It's immediate consequence of the
decrease of the width of FPOC with en, which defines the area of inhibition from the subsequent fixations.
time, sec0123456AFC % Correct020406080100infomax greedyinfomax ratehumanlearned kernel0.10.150.20.25RMS contrast of noise0246810response time, seclength, deg02468101214frequency012345learned kernelinfomax greedyinfomax ratehuman0.10.150.20.25RMS contrast of noise123456Saccade length, deg4.3 Geometrical persistence
10
the amplitude of noise within the circle area with
radius r that satisfies the condition F (r) = 1 (we
call this radius the "width of FPOC"). This circle
area is effectively inhibited from the subsequent fix-
ations (see figures (3) and (4)), because information
is already gathered with a sufficient level of confi-
dence. However, we found that our model provides
close estimates of the mean length only for high val-
ues of the RMS contrast of noise. Our experimental
findings are consistent with previously reported re-
sults [36], where the visual search experiments were
set for several levels of the RMS contrast of back-
ground noise. In future works we plan to incorporate
more complex saccade execution model that takes
into account the bias toward the optimal saccade
length [17] in order to explain a lower variability of
the saccade length in the experiments.
4.3. Geometrical persistence
In this section we analyze the distribution of the
directional angle θd (this notation was introduced in
[10]) of the human saccadic eye-movements and the
simulated trajectories. The directional angle is the
angle between two consequent saccades, and, there-
fore, can be defined as θd = tan−1 (yn+1/xn+1) −
tan−1 (yn/xn), where (yn, xn) are the coordinates of
nth fixation. According to this definition, the move-
ment is related to a persistent one if the directional
angle is close to 0 or 2π. The angles with the values
close to π correspond to anti-persistent movements.
The distributions of the directional angle were cal-
culated for the trajectories generated by Markov de-
cision process with the policies π0, π1 and µ. Figure
(7)(left) demonstrates the distribution of the direc-
tional angle of the saccadic events for the human ob-
servers and the simulated trajectories for en = 0.2
and et = 0.2. The infomax greedy policy π0 gen-
erates the trajectories with stable anti-persistent
movements, because the policy π0 chooses the next
fixation location without taking the current location
into consideration. Due to the inhibitory behavior
of infomax, it's much less likely to choose the nearby
location instead of remote and relatively unexplored
ones. Only geometrical borders limit the choice of
the next fixation, which results in fixations on the
opposite side of the visual field (as the most remote
point, look at the figure (3)).
In contrast, the decision process under the learned
policy µ tends to preserve the direction of the move-
ment. The dynamic of the system under the policy µ
is quite similar to self-avoiding random walk model
described in [1]. Due to the asymptotic behavior of
the kernel function K(x, y), the reward gain from
the remote locations is suppressed, meanwhile, the
locations, which are already visited, are also inhib-
ited (look at the figure (4)). This results in short-
range self-avoiding movements, which demonstrate
the persistent behavior [37, 1], and, therefore, the
probability distribution of the directional angle θd
is biased towards values 0 or 2π. According to the
Figure 7 (left), the dynamics under the heuristics π1
is also characterized as a persistent random walk.
The learned policy µ has, in general, a stronger ra-
dial ranking of locations than π1, which results in
a shorter range of saccades, and a repulsion, caused
by inhibition, becomes more relevant. The distri-
bution of average length of saccades depending on
θd is shown on Figure 7 (right). On average the
co-directed movements are shorter than the reversal
ones for all policies.
In our experiments we discovered that the geo-
metrical persistence depends on the visibility of tar-
get (on FPOC in the simulations). We measured
the share of the saccades, which retain the direction
of the previous movement: cos(θd) > 0. This quan-
tity is called "persistence coefficient". The figure 8
demonstrates the dependency of the persistence co-
efficient on the RMS contrast of background noise
for the human observers and the simulated trajec-
tories. As it was mentioned previously, the aver-
age saccade length is decreasing with the growth of
RMS contrast (6). Therefore, the linear term (10)
in the duration of steps becomes less relevant, and
the decision-making becomes more agnostic about
the temporal costs (closer to the information greedy
π0). The decline of the persistent coefficient is also a
characteristic of human eye movements, which was
not covered in the previous research.
11
Figure 7: The histograms of the directional angle (left) and the distributions of the mean length of the saccades to the
directional angle (right). Data for both histograms was binned with the resolution of 20 deg. The infomax greedy policy π0
generates the trajectories with stable anti-persistent movements (left), with a high degree of separation between large and small
movements (right). In contrast, the decision-making process under the infomax rate policy π1 tends to preserve the direction
of movement. The dynamics under the learned policy µ is also characterized as a persistent random walk.
5. Statistical persistence
In the previous section we have analyzed the ge-
ometrical persistence of the human eye-movements
and the trajectories simulated under three different
policies. However, this statistical property doesn't
give any insight into a long-range correlation in
time-series.
In this section we show that dynam-
ics under the learned policy µ have a multifractal
behavior, which is similar to that of the human
eye-movements during execution of the visual search
task .
In contrast to the previous research [10] in our
analysis we distinguish between two different types
of the multifractality by a calculation of a gener-
alized Hurst exponent for shuffled time series. We
separate the time series on fixational and saccadic
eye-movements, which allows us to demonstrate the
fundamental difference in the temporal structure of
these types of eye-movements. It was shown that the
behaviour of the generalized Hurst exponent is con-
sistent with the basic statistical properties of eye-
movements. After this we demonstrate that the dy-
namics under the optimal policy of gaze allocation
explains the changes in scaling behaviour of eye-
movements with difficulty of the visual task both
on qualitative and quantitative levels.
Figure 8: The share of saccades, which retain the direction
of the previous movement: cos(θd) > 0, is called the "per-
sistence coefficient". This quantity demonstrates the depen-
dence of the persistence on the visibility of the target. As
it was mentioned previously, the average saccade length is
decreasing with the growth of the RMS contrast (6). There-
fore, the linear term (10) in the duration of the steps becomes
less relevant, and the decision-making becomes more agnostic
about temporal costs (closer to the information greedy π0).
The decline of the persistent coefficient is also a characteristic
of the human eye movements, which was not covered in the
previous research.
020406080100120140160180directional angle, deg0.511.522.533.5frequencyinfomax greedylearned kernelhumaninfomax rate020406080100120140160180directional angle, deg1.522.533.54average length, degrms contrast of noise0.10.150.20.25persistence coefficient0.20.30.40.50.60.70.8humaninfomax ratelearned kernelinfomax greedy5.1 Multifractality of human eye movements
12
For statistical analysis of simulated trajectories
we use a multifractal detrended fluctuation analy-
sis (MF-DFA)[38], which is a widely-used method
for detection of long-range correlations in stochastic
time-series. It has found successful applications in
the field of bioinformatics [39, 40], nano and geo-
physics [41]. This method is based on the approxi-
mation of trends in time-series and the subtraction
of detected trends (detrending) from original data
on different scales. The detrending allows deducting
the undesired contribution to long-range correlation,
which is a result of non-stationarities of physical pro-
cesses. We use the package provided by Espen Ihlen
[42] for all our estimations of the generalized Hurst
exponent in this section.
In the appendix Appendix B we thoroughly ex-
plain the details of the multifractal analysis. The
subsection Appendix B.1 presents the details of MF-
DFA algorithm.
In the subsections Appendix B.3
and Appendix B.3 we explain how MF-DFA is per-
formed over the simulated trajectories. The re-
sults of the multifractal analysis of the human eye-
movements are presented in 5.1. The subsection 5.2
summarizes our findings and compares the general-
ized Hurst exponent of the simulated trajectories to
one of human eye-movements for different experi-
mental conditions.
5.1. Multifractality of human eye movements
We perform MF-DFA over the difference of time
series of the human gaze positions and in order to
compare the estimated generalized Hurst exponent
with the simulations. The differentiated time series
was estimated from raw data of coordinates of the
gaze fixations A = {(x1, y1) , ... (xN , yN )}with the
resolution of 7 ms:
∆X = {(x2 − x1) , . . . (xN − xN−1)}
∆Y = {(y2 − y1) , . . . (yN − yN−1)}
(21)
(22)
The time series ∆X and ∆Y were estimated for
each trial with certain experimental conditions and
concatenated over all participants. After this, we
represent the differentiated time series in the fol-
lowing way: ∆X = {F1, S1, ...., Fm−1, Sm−1, Fm},
where Fi and Si correspond to the sequences of the
movements during time interval of i-th fixation and
saccade respectively [10]. We separate the differen-
tiated time series on the fixational and the saccadic
time series:
∆XF = {F1, 0s1, . . . Fm−1, 0sm, Fm}
(cid:9)
∆XS =(cid:8)0f1, S1, . . . 0fm−1 , Sm, 0fm
(23)
(24)
where 0n corresponds to zero array with the length
n, and fm and sm are the lengths of corresponding
sequences Fm and Sm.
The figure 9 demonstrates the scaling of the q-
order fluctuation function Fq(s) (B.4). This graph is
a result of the application of MF-DFA over the hor-
izontal concatenated differentiated time series ∆X
of the human scan-paths for the experimental condi-
tions: et = 0.2, en = 0.25. The red, blue and green
lines correspond to the linear approximation of func-
tion log2 (Fq(s)) for the orders q = {−10; 0; 10}.
The scaling of Fq(s) exhibits the crossover on a time
scale of 256 ms. The crossover separates the "lower"
and "upper" regimes mentioned in [10]. According
to Amor et. al. the crossover is caused by the pres-
ence of two different generative mechanisms of eye-
movements. The lower regime is related to fixational
eye-movements (which is supported by the value of
crossover scale scros being close to the average fixa-
tion duration), and upper regime - to the saccadic
ones. The crossover in the scaling of Fq(s) was ob-
served for all experimental conditions. The value
of generalized Hurst exponent H(q) (Figure 9 right)
is obtained through linear regression of log2 (Fq(s)).
Our estimates of H(q) are consistent with the ones
of Amor et. al. for both directions and all regimes.
In order to distinguish between two different types
of multifractality [38] we calculated the generalized
Hurst exponent Hshuf (q) for the shuffled differen-
tiated time series. The first type of multifractal-
ity is a consequence of a broad probability density
5.1 Multifractality of human eye movements
13
Figure 9: The scaling of the q-order fluctuation function Fq(s) (left), and the generalized Hurst exponent H(q) (right) computed
through a linear regression of log2 (Fq(s)). This graph is a result of application of MF-DFA over the horizontal differentiated
time series ∆X of the concatenated human scan-paths for the experimental conditions: et = 0.2, en = 0.25. The red, blue and
green lines correspond to the linear approximation of function log2 (Fq(s)) for the orders q = {−10; 0; 10}. The scaling of Fq(s)
exhibits the crossover the crossover on a time scale of 256 ms. The crossover separates the "lower" and the "upper" regimes
mentioned in [10]. The lower regime is related to fixational eye-movements (which is supported by the value of crossover scale
scros being close to average fixation duration), and the upper regime - to saccadic ones. The crossover in the scaling of Fq(s)
was observed for all experimental conditions.
function for the values of time series. If only mul-
tifractality of the first type presents in time series:
H(q) = Hshuf (q). The second type of multifractal-
ity is caused by the difference in correlation between
large and small fluctuations, which is a scenario de-
scribed in [10].
In this case Hshuf (q) = 0.5 and
H(q) = 0.5 + Hcorr(q), where Hcorr(q) is (nega-
tive) positive for the long-range (anti-)correlation.
If both types of multifractality present in time se-
ries: H(q) = Hshuf (q) + Hcorr(q).
The figure 10 demonstrates our estimates of the
Hurst exponent of the shuffled time series Hshuf (q)
(top) and the correlational Hurst exponent Hcorr(q)
(bottom) for the horizontal (left) and the vertical
components (right). We estimated both exponents
for the saccades (green dashed line) and FEM (pur-
ple dashed line) in the upper and the lower regimes
of scales respectively. As well as a previous graph
9, this one is a result of an application of MF-DFA
over the concatenated differentiated time series of
the human eye-movements for the experimental con-
ditions: et = 0.2, en = 0.25. The behaviour of
(cid:40)
Hshuf (q) for the full time series and the saccadic
time series in the upper regime corresponds to the
one mentioned in [38] (eq. 27):
H(q) ∼
1/q (q > α)
1/α (q ≤ α)
(25)
with α ∼ 1. The equation 25 was derived for time
series of uncorrelated random values with the power
law distribution:
(cid:26) αx−(α+1) x ≥ 1
0 x < 1
P =
(26)
One can see a similarity of the function (26) with
the distribution of the amplitude of the saccadic
events for humans (see figure 6). The amplitude
distribution of the saccades demonstrates the power
law behavior on the interval [4.0◦, 14.0◦] with α ≈ 1.
The probability distribution function (26) also re-
flects an absence of saccades with the length lower
than minimal one. Therefore, the first type of mul-
tifractality of the saccadic time series is caused by
16326412825651210242048Scale,ms-10123log2(Fq)Scaling function Fq (q-order RMS)q =-10q =0q =10q =-10q =0q =10-10-8-6-4-20246810q00.511.52Hqq-order Hurst exponentdata1Hq(-10) =1.5083Hq(0) =0.83336Hq(10) =0.2485.1 Multifractality of human eye movements
14
Figure 10: The Hurst exponent of the shuffled time series Hshuf (q) (top) and the correlational Hurst exponent Hcorr(q)
(bottom) for the horizontal (left) and the vertical components (right) of the human eye-movements. As well as a previous graph
9, this one is a result of an application of MF-DFA over the concatenated human scan-paths for the experimental conditions:
et = 0.2, en = 0.25. The behaviour of Hshuf (q) for both horizontal and vertical shifts for full scales corresponds to the one
mentioned in [38] (eq. 27). We assume that multifractality of the first type is caused by an asymptotic behaviour of the
amplitude distribution of saccades (see figure 6). The difference in the long-range correlation of large and small fluctuations is
reflected by Hcorr(q) (figure 10 bottom). Due to the properties of the fluctuation function B.4 for positive (negative) q-orders
the main contribution are coming from segments containing small (large) fluctuations [38]. The positive (negative) long range
correlation (Hcorr(q) > 0) is, therefore, a characteristic of small (large) fluctuations in the upper and the full scales regimes for
both directions. In general, these results are consistent with the distribution of the average length of saccades to the directional
angle (see figure 7 right), which also indicates the difference in persistence of large and small saccades.
-10-8-6-4-20246810q00.511.5H(q)H(q), shuffled horizontal shiftssaccadesFEMall scalesupper regimelower regime-10-8-6-4-20246810q00.511.5H(q)H(q), shuffled vertical shifts-10-8-6-4-20246810q-0.4-0.200.20.40.6H(q)correlational H(q), horizontal shifts-10-8-6-4-20246810q-0.200.20.4H(q)correlational H(q), vertical shiftsthe broad probability distribution of saccade mag-
nitude.
The difference in the long-range correlation of
large and small fluctuations is reflected by Hcorr(q)
(figure 10 bottom). Due to the properties of fluc-
tuation function (B.4) for the positive (negative)
q-orders the main contribution are coming from
segments containing the large (small) fluctuations
[38]. The positive (negative) long-range correlation
(Hcorr(q) > 0) is, therefore, a characteristic of the
small (large) fluctuations in the upper regime for
the saccadic and the full time series. These results
are consistent with the distribution of the average
length of saccade to the directional angle (see fig-
ure 7 right), which also indicates the difference in
the persistence of large and small saccades. There-
fore, we confirm here that the small saccadic eye-
movements demonstrate the long-range correlations
as well as fixational eye-movements.
The time series of FEM demonstrates
the
monofractal behaviour and the positive correlations
with H ≈ 0.8 in the lower regime of scales [10]. How-
ever, the behaviour of both Hcorr(q) and Hshuf (q)
for the full time series in the lower regime indicates
the presence of multifractalities of both types. At
the present moment we have no explanation of the
multifractality in the lower regime and leave this
problem for a future work.
5.2. Dependence on visibility
In this section we present a comparison of the
generalized Hurst exponent for the human eye-
movements in the upper regime and the simulated
trajectories under the learned policy. As well as in
the case of the geometrical persistence, we claim the
quantitative properties of the statistical persistence
depend on the visibility of the target.
We estimated the correlational Hurst exponent
Hcorr(q) and the Hurst exponent of the shuffled
time series Hshuf (q) for the differentiated trajec-
tories of the human eye-movements for all
lev-
els of the RMS contrast of background noise:
en ∈ (0.1, 0.15, 0.2, 0.25). Figure 11 (left) shows
Hcorr(q) (left) of simulated trajectories (blue) un-
der the learned policy µ and the correlational
Hurst exponent for the human eye-movements
15
corr(q) + H y
(pink) averaged over two directions: Hcorr(q) =
corr(q)) /2 in the upper regime. The
(H x
correlational Hurst exponents for the negative q-
orders declines with the growth of the RMS con-
trast of background noise both for the human eye-
movements and the simulated trajectories. This in-
dicates the weakening of the correlation between
small fluctuations. For the positive q-orders the
correlational Hurst exponent is less affected by the
change of the visibility of target. The Hcorr(q) for
q = 10 stabilized on values 0.04 and −0.12 for hu-
man eye-movements and the simulated trajectories
correspondingly. In general, the correlations weaken
with the growth of the RMS contrast, which is con-
sistent with the decline of the geometrical persis-
tence 8. The decline of the Hurst exponent with the
increase of difficulty of visual search task was also
observed in the previous work [12].
The Hurst exponent of the shuffled time series
(Figure 11 right), as well as the correlational Hurst
exponent, demonstrates the decline with the growth
of the RMS contrast for the negative q-orders both
for the human eye-movements and the simulated
trajectories.
In the subsection 5.1 we mentioned
that the behaviour of Hshuf (q) resembles the one
related to time series of random values with the
power law distribution 26. The average value of
this time series equals 1/ (α − 1) for α > 1. The
increase of α results both in the decrease of the av-
erage value in time series and the decrease of the
value of Hshuf (q) ∼ 1/α for q < 0. Therefore,
the average value in time series and the values of
Hshuf (q) for the negative q-orders are correlated in
the assumption of the power-law distribution. Pre-
viously we found the decrease of the average saccade
length with the growth of RMS of background noise
6, which is consistent with the decrease of values
of Hshuf (q) for negative q-orders. We assume that
this correlation is caused by the power-law asymp-
totic behaviour of the length distribution of human
eye-movements (26).
6. Conclusion
We have presented a computational model of the
ideal observer that both qualitatively and quantita-
16
tional Hurst exponent for the human eye-movements (pink) averaged over two directions: Hcorr(q) =(cid:0)H x
Figure 11: This figure demonstrates Hcorr(q) (left) of the simulated trajectories (blue) under the learned policy µ and the correla-
in the upper regime. The correlational Hurst exponents for negative q-orders declines with the growth of RMS contrast of noise
both for human eye-movements and the simulated trajectories. For the positive q-orders the correlational Hurst exponent is less
affected by the change of the visibility of the target. In general, the correlations weaken with the growth of the RMS contrast,
which is consistent with the decline of the geometrical persistence 8. The Hurst exponent of the shuffled time series (right), as
well as the correlational Hurst exponent, demonstrates the decline with the growth of the RMS contrast for negative q-orders
both for the human eye-movements and the simulated trajectories. In the subsection (5.1) we mentioned that the behaviour of
Hshuf (q) resembles the one related to time series of random values with power law distribution 26.
corr(q)(cid:1) /2
corr(q) + H y
tively describes the human visual behaviour during
the execution of the visual search task. The basis
of this model is the observer's representation of the
constraints of its own visual and oculomotor sys-
tems. We demonstrated that a consideration of the
temporal costs and uncertainty of the execution of
saccades results in the dramatic change of the basic
statistical properties and the scaling behavior of the
simulated time series.
We performed the multifractal analysis of our
data and discovered the presence of two types of
multifractality both in time series of the human eye-
movements and the model simulations. The multi-
fractality caused by the broad amplitude distribu-
tion of the saccades (the first type of multifractal-
ity) makes a significant contribution to the multi-
fractal behaviour of time series, which was not cov-
ered in the previous work [10]. After the estimation
of the correlational part of the Hurst exponent [38]
we confirmed the presence of the long-range posi-
tive correlations of the small saccades in the upper
regime. On the contrary, the large saccades exhibit
the weak long-range anti-correlations for the model
simulations and the human eye-movements in the
upper regime. As well as in the case of the geomet-
rical persistence, we found that the long-range cor-
relations between eye-movements weaken with the
decline of the target's visibility, which is consistent
with the previous work on this topic [12].
In this research we focused our attention more
on the persistence of eye-movements rather than on
their spatial distribution. That's why we didn't con-
sider the factors that are not directly related to the
trade-off between the temporal costs and the ex-
pected information gain. We estimate the optimal
policy under the assumption that the visual search
process is characterized by shift-rotational symme-
try [20], which was not observed in the previous
work with similar experimental settings [22]. The
symmetry of the visual search can be broken by an-
gular dependency of FPOC in both cases of normal
controls and patients with vision disabilities [43].
We plan to include the angular dependency to radial
and smoothing functions of policy (see eq. (A.4)) in
order to consider the asymmetry of the visual field
in our future works.
-10.25-10-8-6-400.2-2RMS of noiseq0Correlational H(q)H(q)20.1514680.1102humanlearned kernel0-100.25-8-60.5-40.2-2H(q)H(q)of shuffled dataqRMS of noise0120.15461.58100.1humanlearned kernelAppendix A.1 Kernel function
17
To sum up, this framework provides an elegant
explanation of scaling and persistent dynamic of the
voluntary saccades from an optimality point of view.
It clearly demonstrates that control models are able
to describe human eye-movements far beyond their
basic statistical properties.
Appendix A. Implementation of reinforce-
ment learning algorithms
Appendix A.1. Kernel function
We assume that the process of the visual search is
characterized by shift-rotational invariance [13]. In
this research we focus our attention on the persis-
tence of eye-movements rather than on their spatial
distribution. That's why we use the approximation
of the shift-rotational invariance in which we don't
need to consider the factors that are not directly
related to the trade off between the temporal costs
and the expected information gain, such as an asym-
metry of FPOC.
The coefficients in the set of dynamic equations
(4,6,11) are unaltered under any distance preserv-
ing transformations. The last dynamic equation,
which is the policy of gaze allocation (18), should
be shift-rotational invariant as well. The policy (18)
is determined by function of an expected reward
f (D, p). Due to the property of shift invariance we
can represent the function of an expected reward
with Volterra series [44]:
N(cid:88)
L(cid:88)
··· L(cid:88)
f (D, p) = f0+
Kn(D−l1, .., D−ln)
p(lj)
n(cid:89)
n=1
l1=1
ln=1
j=1
(A.1)
Where Kn(l1, .., ln) are called Volterra kernels. The
constant f0 is eliminated in the equation 18, and,
therefore, will not be considered. The dimensional-
ity of Volterra kernels Kn scales with the number
of the potential locations as Ln. The estimation of
Volterra kernel for n ≥ 2 is computationally unfeasi-
ble for the grid size in our simulations: L = 27 × 27.
For this reason we consider only the linear term:
f (D, p) =
K(D − l)p(l)
(A.2)
(cid:88)
l
We do not expect that the estimation of higher order
terms will result in improvement of the performance
of the policy. The current observation model 4 is
based on independent inputs Wl on each individual
location, which results in independence of the values
of the probability distribution pl for a sufficiently
large grid size. Therefore, higher order terms don't
provide additional information on the location of the
target.
f (D, p) = (cid:80)
The function of the expected reward should be
computed taking into account the current location
of the gaze A. Considering its rotational invari-
ance the most general
form of this function is:
K((cid:107)D − l(cid:107) ,(cid:107)D − A(cid:107))p(l). The soft-
max policy (18) for the function of the expected re-
ward is:
l
µ(Dn, pn) ∝
(cid:33)
(cid:32)(cid:88)
exp
pn(l)K ((cid:107)Dn − l(cid:107) ,(cid:107)Dn − An(cid:107))
(A.3)
l
Together with the set of the equations (4,6,11), this
form of the policy keeps the evolution of the system
invariant under any distance-preserving transforma-
tion. The convolution of the probability distribution
with the kernel function K(x, y) in general form A.3
is difficult to optimize, and the problem can be ef-
fectively solved only in a separable approximation:
K((cid:107)Dn − An(cid:107) ,(cid:107)Dn − x(cid:107))
≈ R ((cid:107)Dn − An(cid:107)) S ((cid:107)Dn − x(cid:107))
(A.4)
We call R and S the radial and the smoothing
functions correspondingly. The first one character-
izes the dependence of the expected reward on the
intended saccade length. The motivation behind
the introduction of the radial function R are both
growing uncertainty of the fixation placement (6)
and the duration of the step (11) with the length
of the saccade. We assume that the radial func-
tion R equals zero outside an interval [amin, amax],
where amin and amax are minimal and maximal sac-
cade length correspondingly. The minimal saccade
Appendix A.3 REINFORCE
18
√
length amin = 1 deg [45] is chosen as a magnitude
of the shortest possible voluntary movement. The
2 · 15 deg is equal
maximal saccade length amax =
to the length of the diagonal of the stimulus image
in our experiments. The smoothing function S de-
scribes the relative contribution of the surrounding
locations to the reward. The smoothing function
has the same role as a term F (see eq.
(15)) in
the definition of the information maximization pol-
icy π0, and it basically defines how meaningful the
certain location is without consideration of the time
costs of a relocation.
The form of policy (A.3) in the separable approx-
imation is:
µ(Dn, pn) ∝
exp (R ((cid:107)Dn − An(cid:107)) (pn ∗ S) (Dn))
(A.5)
which is used in the simulation of the trajectories
and the training phase. Two heuristic policies pre-
sented in section 3.1 are both special cases of the
general form of a policy in the separable approxi-
mation(A.5).
Appendix A.2. Parametrization of policy
The radial R(x) and the smoothing S(x) functions
are represented with Fourier-Bessel series:
(cid:40) (cid:80)Ξ
(cid:16) u1:ξ(x−amin)
amax−amin
(cid:17)
0,
else
R(x) =
ξ=1 rξJ1
, amin < x < amax
(cid:40) (cid:80)Ξ
ξ=1 sξJ0
0,
S(x) =
(cid:0) u0:ξx
(cid:1) , x < b
b
else
(A.6)
(A.7)
where ui:ξ are zeros of Bessel function of order i
and b is the radii of the visual field. This repre-
sentation allows us to control the dimensionality
of the kernel and to effectively store the policy in
memory. The choice of orders (i = 0, 1) of Bessel
functions in (A.6,A.7) is caused by boundary con-
ditions for the radial and the smoothing functions:
R(amin) = R(amax) = 0; S(b) = 0. The boundary
conditions on the radial function forbid the model
observer to fixate the same location again R(0) = 0
and to make unlikely large saccades R(amax) = 0.
The condition on the smoothing function S(b) = 0
corresponds to the absence of any information gain
from remote locations, and, therefore, their irrele-
vance to the process of fixation selection. So, the
policy µ(ϑ) is represented by set of parameters:
ϑ ≡ (r0:Ξ, s0:Ξ ).
Appendix A.3. REINFORCE
We solve the optimization problem for the value
function (12) with a policy gradient algorithm
adopted from [32]. This optimization procedure is
represented as an iterative process of a gradient es-
timation and an update of the policy parameters at
the end of each training epoch - the sequence of M
episodes.
Repeat
optimal
each
m
t
element
ξ:
baseline
gradient
2. Estimate
1. Perform a training epoch with M episodes
and get the sequence of observations, ac-
tions and costs for each time step t and
episode m: (pt,m, at,m, Vm).
(cid:18)(cid:80)
(cid:80)
(cid:18)(cid:80)
(cid:80)
(cid:18)(cid:80)
(cid:80)
for
ηξ
=
(bξ − Vm)
4. Update policy parameters: ϑ ← ϑ + αη
∇ξ log µϑ(at,m,pt,m)
∇ξ log µϑ(at,m,pt,m)
∇ξ log µϑ (at,m, pt,m)
the
element:
(cid:19)2
(cid:19)2
3. Estimate
gradient
(cid:19)2
m
t
each
for
=
bξ
m
t
Vm
until gradient η converges.
Appendix A.4. PGPE
The second approach to the optimization prob-
lem (12) is a parameter exploring policy gradient
presented in [33]. As well as in the previous section,
we estimate the gradient and update the policy pa-
rameter at the end of each training epoch. We use
a symmetric sampling of the policy parameters for
gradient estimation. At the beginning of each step
i
j
M(cid:88)
(cid:1)2 − σ2
j=1
i
σi
j
(cid:1)
(cid:0)V −
j − V +
(cid:33)(cid:32)
(cid:104)V (cid:105) − V +
(A.8)
(cid:33)
j + V −
j
2
µi = µi + α
(cid:32)(cid:0)i
j
M(cid:88)
σi = σi + α
j=1
we generate the perturbation from normal distri-
bution N (0, Iσ2) and create the symmetric param-
eter samples ϑ+ = µ + and ϑ+ = µ − , where µ is
the current values of the policy parameters for the
training epoch. Then we simulate one episode for
each parameter sample and denote the cost V + for
the episode generated with ϑ+ , and V − for ϑ− cor-
respondingly. At the end of each training epoch the
policy parameters and the standard deviation of the
distribution of perturbation are updated according
to the equations:
(A.9)
j is the perturbation for the
where for jth episode i
parameter i and V ±
are sampled costs. The cost
baseline is chosen as a mean cost for the training
epoch.
j
Appendix A.4.1. Convergence of policy gradient
The Markov decision process defined by set of
dynamic equations (4,6,11,A.5) was simulated on
N × N grid, which comprises the N 2 possible tar-
get locations, where N=128. At the beginning of
the optimization procedure we pick the policy pa-
rameters ϑ randomly from the uniform distribution
U (−0.5, 0.5) and fix parameter λ = 0.001. For both
algorithms we use the same parametrization of pol-
icy. The training epoch for both PGPE and RE-
INFORCE consists of 400 episodes. Learning rate
α = 0.2 was the same for both algorithms.
Figure A.12 illustrates the performance of two
policy gradient methods we used for search of the
optimal policy for the case of FPOC corresponding
to en = 0.25 and et = 0.2. Both algorithms used
Fourier-Bessel parametrization of policy with a di-
mensionality Ξ = 45 for the radial and the smooth-
ing functions. REINFORCE performed better for
all parameter settings. On average, it takes around
19
Figure A.12: The performance of parameter exploration pol-
icy gradient (PGPE) and episodic REINFORCE with an op-
timal baseline.
50 and 40 learning epochs to converge for REIN-
FORCE and PGPE correspondingly. The choice of
the dimensionality higher than 45 doesn't improve
the performance of both algorithms.
Figure A.13 shows the results of optimization: the
radial R(x) and the smoothing S(x) functions. Both
REINFORCE and PGPE provide close estimates of
the smoothing and the radial functions for eccen-
tricity smaller than < 3◦.
In order to compare
the solution with the heuristic policies (15,17), we
presented FPOC on the same plot with the smooth-
ing function. The smoothing function provided by
REINFORCE is monotonously decreasing as well as
FPOC, whereas for PGPE we have a fluctuating so-
lution with a decreasing amplitude of oscillations.
The behavior of the radial function is similar for
both solutions, with higher amplitude of oscillations
for PGPE solution.
Appendix B. Implementation of MF-DFA
Appendix B.1. Multifractal analysis
In this chapter we present the details of MF-DFA
algorithm used here for calculation of the general-
ized Hurst exponent. All of this section is based on
Kantelhardt et al.[38].
Learning epochs01020304050Response time, sec1.522.533.5PerformancePGPEREINFORCEAppendix B.2
Interpolation of simulated trajectories
20
Figure A.13: The results of the optimization: the smoothing S(x) funtion (left) and the radial R(x) function (right).
The procedure of MF-DFA starts with definition
of a profile for time series X = {x1, ..., xN} with a
compact support:
i(cid:88)
Y (i) =
(xk − (cid:104)x(cid:105))
(B.1)
k=1
The profile Y (i) is divided on Ns ≡ int(N/s) seg-
ments, where s is chosen among some linear space
s ∈ S = {smin,smin + (cid:52)s, ..., smax}. The segmenta-
tion starts from the beginning of time series, there-
fore, there are residual N ÷ s number of the ele-
ments at the end of time-series. In order to process
the residual elements, the segmentation is also per-
formed from the end of time series. So, at the end of
segmentation procedure we have 2Ns segments for
each value of s.
The calculation of the variance is based on an
approximation of local trend for each segment ν =
1, ..., Ns with a polynomial function yv. Then, the
variance on each segment is calculated as:
s(cid:88)
i=1
1
s
F 2(ν, s) =
{Y [(ν − 1) s + i] − yv(i)} (B.2)
for each segment ν = 1, ..., Ns and
s(cid:88)
i=1
1
s
F 2(ν, s) =
{Y [N − (ν − Ns) s + i] − yv(i)}2
(B.3)
for ν = Ns+1, ..., 2Ns. The order m of polynomial
function must satisfy the condition m ≤ s − 2. The
variance over all segments are averaged to obtain
the qth order fluctuation function:
(cid:40)
2Ns(cid:88)
ν=1
1
2Ns
(cid:2)F 2(ν, s)(cid:3)q/2
(cid:41)1/q
Fq(s) =
(B.4)
According to the properties of qth order fluctua-
tion function [46], the scaling behavior of Fq(s) is
governed by the generalized Hurst exponent:
Fq(s) ∼ sH(q)
(B.5)
The value of H(q) is usually obtained through a
linear regression of log2 (Fq(s)).
Appendix B.2. Interpolation of simulated trajecto-
ries
We perform MF-DFA analysis on the magnitude
of the saccadic events simulated by MDP defined
above. Each episode of MDP provides the sequence
of vectors of gaze positions: A1, ..., AN. In order to
01245678910eccentricity, deg-0.500.511.522.5weightSmoothing functionREINFORCEFPOCPGPE012345678910eccentricity, deg01234weightRadial functionREINFORCEPGPEAppendix B.3 Multifractality of simulated trajectories
21
get the time series of the gaze allocation in real time
- ¯A, we follow the simple procedure of an interpola-
tion:
(cid:80)N
• The calculation of the duration of each time
step n with 11, the total time of episode T =
i=1 Θi and start time of each discrete step:
(cid:26)
(cid:80)n−1
Tn =
0, if n = 1
i=1 Θi, if n > 1
(B.6)
• The choice of the length of the real-time se-
quence M = 25 ∗ T , which corresponds to 40
millisecond resolution.
• For each element t of ¯A we define, which dis-
crete time step it belongs: Tn ≤ t
25 < Tn+1.
t
• If time step t of ¯At corresponds to the fixation
25 − Tn <
during the discrete time step n :
Θf ix(n), than ¯At = An. In the other case, if
time t corresponds to the saccadic movement
within the discrete time interval n, we have:
¯At = An +τsac
Therefore, we have defined the function that
maps the discrete sequence A to real-time se-
quence ¯A.
(cid:0) t
25 − Tn − Θf ix(n)(cid:1).
An+1−An
An+1−An
The real-time sequences ¯A from 1000 episode corre-
sponding to each policy are merged, and the result-
ing sequences ¯Aµ, ¯Aπ1, ¯Aπ0 are analyzed with MF-
DFA.
Appendix B.3. Multifractality of simulated trajecto-
ries
We perform MF-DFA over the differentiated tra-
jectories generated with PO-MDP under the heuris-
tic policies π0, π1 and the learned policy µ. Before
differentiation trajectories were represented as real
time sequences with the procedure of the interpola-
tion Appendix B.2.
The model presented here is not devoted to FEM
and can't describe the combined movement of both
FEM and the saccades. The results of our analy-
sis should be compared with the scaling behavior
of Fq(s) for human eye-movements on the scales
s ≥ 256 ms, which corresponds to the upper regime.
Therefore, we set the minimal time scale smin =
256ms. The choice of smax = 2∗ 103ms corresponds
to the average length of episode. We assume that
there is no correlation between the episodes due to a
random location of the first fixation and the location
of the target.
The figure B.14 demonstrates the scaling of the
q-order fluctuation function Fq(s) (B.4) for simu-
lated trajectory under the infomax greedy policy π0
for the conditions: et = 0.2, en = 0.15. The red,
blue and green lines correspond to the linear ap-
proximation of the function log2 (Fq(s)) for the or-
ders q = {−10; 0; 10}. The scaling of Fq(s) doesn't
exhibit the crossover for positive q-orders on an
interval of scales [smin,smax], however the behav-
ior of log2 (Fq(s)) deviates from linear at the large
scales s ∼ smax. The simulations on different grid
sizes, which correspond to different average time of
task execution, have shown that the interval of lin-
ear behavior of log2 (Fq(s)) always coincides with
[smin,smax]. The scaling of Fq(s) on [smin,smax] is
different for different orders q and, therefore, the
trajectories ¯Aπ1 are multifractal time series.
The figure B.15 demonstrates our estimates of the
correlational Hurst exponent Hcorr(q) (left) and the
Hurst exponent of shuffled time series Hshuf (q) of
time series simulated under the different policies.
As well as in the case of the human eye-movements,
two types of multifractality present in the simulated
time series. The behavior of Hshuf (q) resembles the
power-law distribution scenario 25 for all policies,
except the infomax greedy π0. The distribution of
the saccade length doesn't correspond to the power-
law for π0 , which was demonstrated on figure 6 .
On the contrary, the infomax rate π1 and the learned
policy µ generate the movement with the distribu-
tional multifractality that presents in human eye-
movements as well.
For all policies the correlational Hurst exponent
is positive for the negative q-orders. This indicates
the presence of long-range correlations for small fluc-
tuations. The large fluctuations are anticorrelated
for π1 and exhibit weak anti-correlation for µ. We
observe the last scenario for upper regime of hu-
man eye-movements 10, where the large fluctuations
demonstrate a weak anticorrelation in a contrary to
Appendix B.3 Multifractality of simulated trajectories
22
Figure B.14: The scaling of the q-order fluctuation function Fq(s) (left) estimated for the simulated trajectories under the
infomax rate policy π1, and the generalized Hurst exponent H(q) (right) computed through a linear regression of log2 (Fq(s)).
The red, blue and green lines correspond to the linear approximation of function log2 (Fq(s)) for orders q = {−10; 0; 10}. The
scaling of Fq(s) doesn't exhibit the crossover for the positive q-orders on an interval of scales [smin,smax].
Figure B.15: The Hurst exponent of the shuffled time series Hshuf (q) (right) and the correlational Hurst exponent Hcorr(q)
(left) of the trajectories simulated under the different policies. As well as in the case of human eye-movements, two types of
multifractality present in the simulated time series. The behavior of Hshuf (q) resembles the power-law distribution scenario
25 for all policies, except the infomax greedy π0. The distribution of saccade length doesn't correspond to the power-law for
π0 , which was demonstrated on the figure 6 . On the contrary, the infomax rate π1 and the learned policy µ generate the
movement with the distributional multifractality that presents in human eye-movements as well.
25651210282048Scale, ms01234log2(Fq)Scaling function Fq (q-order RMS)q =-10q =0q =10q =-10q =0q =10-10-8-6-4-20246810q0.20.40.60.811.2Hqq-order Hurst exponent-10-8-6-4-20246810q-0.500.511.5H(q)Correlational H(q)infomax ratelearned kernelinfomax greedy-10-8-6-4-20246810q0.450.50.550.60.650.70.750.8H(q)H(q) of shuffled time seriespositively correlated small fluctuations.
Appendix C. Implementation
of
chophysical experiments
psy-
We set a goal to reproduce the eye tracking exper-
iment described in [11]. In this section we provide
the description of the psychophysical experiments.
Appendix C.1. Participants
The group of nine patients with normal to
corrected-to-normal vision participated in the ex-
periment. The group included four postgraduate
students (age 23 ± 7, 4 males) from Queen Mary
University of London. This group was aware of
the experimental settings and passed 10 minutes
of training sessions with four different experimental
conditions, which correspond to the certain value
of the RMS contrast of background noise. The ex-
periments were approved by the ethics committee
of Queen Mary University of London and informed
consent was obtained.
Appendix C.2. Equipment
We used DELL P2210 22" LCD monitor (resolu-
tion 1680 × 1050, refresh rate 60 Hz) driven by a
Dell Precision laptop for all experiments. The eye
movements of the right eye were registered using Eye
Tracker device SMI-500 with a sampling frequency
of 120 Hz. The Eye tracker device was mounted on
the monitor. Matlab Psychtoolbox was used to run
the experiments and generate the stimulus images.
Appendix C.3. Stimulus and procedure
The participants set in front of the monitor with
their heads fixed with a chin rest at a distance of
110 cm from the monitor. The monitor subtended
a visual angle of 21 × 15 deg. Each participant was
shown the examples of the stimulus image before the
experiments and was instructed to fixate the target
object as fast as possible and to press the certain
button on a keyboard to indicate that they found the
target. All four participants completed one practice
session with 40 trials before the experiment.
23
The stimuli were the static images generated be-
fore each session according to the description from
the original experiment [11]. The 1/f noise was gen-
erated on a square region on the screen, which spans
the visual angle of 15 × 15 deg. The target was sine
−1 framed by symmetric raised cosine.
grating 6 deg
The target appeared randomly at any possible loca-
tion on the stimuli image within the square region.
The experiments were provided for one level of RMS
contrast of target et = 0.2 and several levels of 1/f
noise RMS contrast en ∈ (0.1, 0.15, 0.2, 0.25).
The participants completed four experimental ses-
sions with 120 trials. The experimental session
started after inbuilt nine-point grid calibration of
the eye-tracking device. The participants were given
3 minutes of rest between sessions. One of 120 stim-
uli images were shown at the beginning of each trial.
The participants are assumed to perform the vi-
sual search task, which is finished by pressing the
"END" button.
In our experimental settings, the
signal from the participants was blocked for 300 ms
from the start of each trial.
If the gaze position
measured by the eye tracking device is in the vicin-
ity of 2 deg around the location of the target at the
moment participant presses the "END" button, the
task is considered successful. Due to the presence
of a temporal delay between the moments of local-
ization of target and pushing of "END" button we
block the signal from END button for 400 ms. After
a completion of each trial the central fixation cross
was shown for 500 ms, then the next trial started
and new stimulus image was shown to participants.
Appendix D. Influence of saccade latency
According to the literature, the saccade program-
ming is assumed to be the two-stage process that
consists of labile and non-labile stages [17]. The la-
bile stage is the first stage of the saccade program-
ming, during which the initial saccade command can
be cancelled in a favour of saccade to another loca-
tion. The saccade to the next location is executed
after the non-labile stage. The visual input is active
during both labile and non-labile stages and sup-
pressed during the execution of a saccade. There-
REFERENCES
24
Figure C.16: The completion time (left) and the saccade length (right) for the human observers, the simulated agents with the
initial observation model and the extended one.
fore, the decision Dn is made at the end of the labile
stage, and the visual input received at the location
An during non-labile stage of saccade programming
can be used for decision-making only at the next
step n + 1. As a result, the observer receives two
separate observation vectors Wn+1
nlb from
the previous and the current fixation locations. The
observation model 4 doesn't take into account the
duration of the observation. We assume that ob-
servation vector is integrated continuous-time Gaus-
w(t, l, A)dt, which
sian white noise: W (l, A) =(cid:82) t+Θ
and Wn+1
lb
satisfies following:
t
1. E[w(t, l, A)] = δl,m/θ0
2. E[w(t1, l1, A), w(t2, l2, A)] = δt1 ,t2 δl1,l2
θ0F 2((cid:107)l−A(cid:107))
where θ0 = 250 ms is a time interval is the detec-
tion experiment [11], for which the visibility maps
were measured. This model of noise generalizes the
"noisy observation" paradigm for variable fixation
duration. The result of integration of continuous
time noise w is Gaussian white noise W with mean
Θ·E[w] and variance Θ·σ2[w]. Next, we assume that
the duration of the non-labile stage is Θnlb = 41, 6
ms [47] and the rest of fixation duration is allocated
for the labile stage Θlb ≈ 200 ms (the average fix-
ation duration according to our data: Θf ix = 240
ms). Using 1 and 2 we compute mean and variance
of observation inputs Wn+1
nlb , and suc-
cessively apply the equation 3 to evaluate the belief
state pn+1.
and Wn+1
lb
We learned the policy of gaze allocation for the
extended observation model using REINFORCE.
We compared the basic characteristic of trajecto-
ries simulated under this policy with the simulations
for the initial model and data from the human ob-
servers (Look at C.16. The initial model outper-
formed the extended one, but no significant differ-
ence was found. We didn't expect any significant
difference in performance, because the observer re-
ceives the same amount of information on average
in both models.
References
References
[1] R. Engbert, K. Mergenthaler, P. Sinn,
A. Pikovsky, An integrated model of fixational
eye movements and microsaccades, Proceedings
of the National Academy of Sciences 108 (39)
(2011) E765 -- E770.
[2] R. Engbert, K. Mergenthaler, Microsaccades
are triggered by low retinal image slip, Pro-
ceedings of the National Academy of Sciences
103 (18) (2006) 7192 -- 7197.
[3] R. Engbert, R. Kliegl, Microsaccades keep the
eyes' balance during fixation, Psychological Sci-
ence 15 (6) (2004) 431 -- 431.
0;.10.150.20.25RMS contrast of noise0246810complection time, secinitial modelhumanextended model0.10.150.20.25RMS contrast of noise123456Saccade length, degREFERENCES
25
[4] B. W. Tatler, M. M. Hayhoe, M. F. Land,
D. H. Ballard, Eye guidance in natural vision:
Reinterpreting salience, Journal of vision 11 (5)
(2011) 5.
[5] A. Borji, L. Itti, State-of-the-art in visual at-
tention modeling, Pattern Analysis and Ma-
chine Intelligence, IEEE Transactions on 35 (1)
(2013) 185 -- 207.
[6] D. H. Ballard, M. M. Hayhoe, Modelling the
role of task in the control of gaze, Visual cog-
nition 17 (6-7) (2009) 1185 -- 1204.
[7] H.-k. Ko, M. Poletti, M. Rucci, Microsaccades
precisely relocate gaze in a high visual acuity
task, Nature neuroscience 13 (12) (2010) 1549 --
1553.
[15] P. Grigolini, G. Aquino, M. Bologna,
M. Luković, B. J. West, A theory of 1/f
noise in human cognition, Physica A: Statis-
tical Mechanics and its Applications 388 (19)
(2009) 4192 -- 4204.
[16] R. J. van Beers, The sources of variability in
saccadic eye movements, The Journal of Neu-
roscience 27 (33) (2007) 8757 -- 8770.
[17] R. Engbert, A. Nuthmann, E. M. Richter,
R. Kliegl, SWIFT: a dynamical model of sac-
cade generation during reading., Psychological
review 112 (4) (2005) 777.
[18] J. Tian, H. S. Ying, D. S. Zee, Revisiting cor-
rective saccades: role of visual feedback, Vision
research 89 (2013) 54 -- 64.
[8] P. Sinn, R. Engbert, Small saccades versus
microsaccades: Experimental distinction and
model-based unification, Vision research .
[19] S. P. Lee, J. B. Badler, N. I. Badler, Eyes alive,
in: ACM Transactions on Graphics (TOG),
vol. 21, ACM, 637 -- 644, 2002.
[9] J. Najemnik, W. S. Geisler, Simple summa-
tion rule for optimal fixation selection in visual
search, Vision Research 49 (10) (2009) 1286 --
1294.
[20] N. J. Butko, J. R. Movellan, I-POMDP: An
infomax model of eye movement,
2008
7th IEEE International Conference on Devel-
opment and Learning, IEEE, 139 -- 144, 2008.
in:
[10] T. A. Amor, S. D. Reis, D. Campos, H. J. Her-
rmann, J. S. Andrade Jr, Persistence in eye
movement during visual search, Scientific re-
ports 6.
[11] J. Najemnik, W. S. Geisler, Optimal eye
movement strategies in visual search, Nature
434 (7031) (2005) 387 -- 391.
[12] D. G. Stephen, J. Anastas, Fractal fluctuations
in gaze speed visual search, Attention, Percep-
tion, & Psychophysics 73 (3) (2011) 666 -- 677.
[13] N. J. Butko, J. R. Movellan, Infomax control
of eye movements, IEEE Transactions on Au-
tonomous Mental Development 2 (2) (2010) 91 --
107.
[21] C. Bradley, J. Abrams, W. S. Geisler, Retina-
V1 model of detectability across the visual field,
Journal of vision 14 (12) (2014) 22 -- 22.
[22] J. Najemnik, W. S. Geisler, Eye movement
statistics in humans are consistent with an op-
timal search strategy, Journal of Vision 8 (3)
(2008) 4 -- 4.
[23] A. E. Bartz, Eyemovement latency, duration,
and response time as a function of angular dis-
placement., Journal of Experimental Psychol-
ogy 64 (3) (1962) 318.
[24] T. A. Salthouse, C. L. Ellis, Determinants of
eye-fixation duration, The American journal of
psychology (1980) 207 -- 234.
[14] S. Wallot, C. A. Coey, M. J. Richardson, Cue
predictability changes scaling in eye-movement
fluctuations, Attention, Perception, & Psy-
chophysics 77 (7) (2015) 2169 -- 2180.
[25] S. Lebedev, P. Van Gelder, W. H. Tsui, Square-
root relations between main saccadic param-
eters., Investigative Ophthalmology & Visual
Science 37 (13) (1996) 2750 -- 2758.
REFERENCES
26
[26] I. T. C. Hooge, C. J. Erkelens, Control of fix-
ation duration in a simple search task, Percep-
tion & Psychophysics 58 (7) (1996) 969 -- 976.
[27] R. Kliegl, A. Nuthmann, R. Engbert, Track-
ing the mind during reading: the influence of
past, present, and future words on fixation du-
rations., Journal of experimental psychology:
General 135 (1) (2006) 12.
[28] K. Rayner, G. W. McConkie, S. Ehrlich, Eye
movements and integrating information across
fixations., Journal of Experimental Psychol-
ogy: Human Perception and Performance 4 (4)
(1978) 529.
[29] H. H. Greene, The control of fixation duration
in visual search, Perception 35 (3) (2006) 303 --
315.
[30] P. J. Unema, S. Pannasch, M. Joos, B. M.
Velichkovsky, Time course of information pro-
cessing during scene perception: The relation-
ship between saccade amplitude and fixation
duration, Visual cognition 12 (3) (2005) 473 --
494.
[31] V. Navalpakkam, C. Koch, A. Rangel, P. Per-
ona, Optimal reward harvesting in complex
perceptual environments, Proceedings of the
National Academy of Sciences 107 (11) (2010)
5232 -- 5237.
[32] J. Peters, S. Schaal, Policy gradient methods
for robotics, in: 2006 IEEE/RSJ International
Conference on Intelligent Robots and Systems,
IEEE, 2219 -- 2225, 2006.
[33] F. Sehnke, C. Osendorfer, T. Rückstiess,
A. Graves,
J. Schmidhuber,
Parameter-exploring policy gradients, Neural
Networks 23 (4) (2010) 551 -- 559.
J. Peters,
[34] B. W. Tatler, R. J. Baddeley, B. T. Vincent,
The long and the short of it: Spatial statis-
tics at fixation vary with saccade amplitude and
task, Vision research 46 (12) (2006) 1857 -- 1862.
[35] M. S. Castelhano, M. L. Mack, J. M. Hender-
son, Viewing task influences eye movement con-
trol during active scene perception, Journal of
Vision 9 (3) (2009) 6 -- 6.
[36] W. S. Geisler, J. S. Perry, J. Najemnik, Visual
search: The role of peripheral information mea-
sured using gaze-contingent displays, Journal of
Vision 6 (9) (2006) 1 -- 1.
[37] S. Isogami, M. Matsushita, Structural and
statistical properties of self-avoiding fractional
Brownian motion, Journal of the Physical So-
ciety of Japan 61 (5) (1992) 1445 -- 1448.
[38] J. W. Kantelhardt,
S. A. Zschiegner,
E. Koscielny-Bunde, S. Havlin, A. Bunde,
H. E. Stanley, Multifractal detrended fluctu-
ation analysis of nonstationary time series,
Physica A: Statistical Mechanics and its
Applications 316 (1) (2002) 87 -- 114.
[39] A. Rosas, E. Nogueira Jr, J. F. Fontanari,
Multifractal analysis of DNA walks and trails,
Physical Review E 66 (6) (2002) 061906.
[40] S. Dutta, D. Ghosh, S. Chatterjee, Multifractal
detrended fluctuation analysis of human gait
diseases, Frontiers in physiology 4 (2013) 274.
[41] N. Vandewalle, M. Ausloos, M. Houssa,
P. Mertens, M. Heyns, Non-Gaussian behavior
and anticorrelations in ultrathin gate oxides af-
ter soft breakdown, Applied physics letters 74
(1999) 1579.
[42] E. A. F. E. Ihlen, Introduction to multifractal
detrended fluctuation analysis in Matlab, Fron-
tiers in physiology 3 (2012) 141.
[43] S. Van der Stigchel, R. A. Bethlehem, B. P.
Klein, T. T. Berendschot, T. Nijboer, S. O. Du-
moulin, Macular degeneration affects eye move-
ment behavior during visual search, Frontiers in
psychology 4 (2013) 579.
[44] V. Volterra, M. Long, Theory of Function-
als and of
Integral and Integro-differential
Equations, Blackie and Son Limited, URL
REFERENCES
27
https://books.google.co.uk/books?id=
iKUVswEACAAJ, 1944.
[45] J. Otero-Millan, X. G. Troncoso, S. L. Mack-
nik, I. Serrano-Pedraza, S. Martinez-Conde,
Saccades and microsaccades during visual fixa-
tion, exploration, and search: foundations for a
common saccadic generator, Journal of Vision
8 (14) (2008) 21 -- 21.
[46] H.-O. Peitgen, H. Jürgens, D. Saupe, Chaos
and fractals: new frontiers of science, Springer
Science & Business Media, 2006.
[47] R. Engbert, A. Longtin, R. Kliegl, A dynamical
model of saccade generation in reading based
on spatially distributed lexical processing, Vi-
sion research 42 (5) (2002) 621 -- 636.
|
0905.0701 | 3 | 0905 | 2011-05-17T14:56:45 | How effective delays shape oscillatory dynamics in neuronal networks | [
"q-bio.NC",
"nlin.PS",
"q-bio.QM"
] | Synaptic, dendritic and single-cell kinetics generate significant time delays that shape the dynamics of large networks of spiking neurons. Previous work has shown that such effective delays can be taken into account with a rate model through the addition of an explicit, fixed delay [Roxin et al. PRL 238103 (2005)]. Here we extend this work to account for arbitrary symmetric patterns of synaptic connectivity and generic nonlinear transfer functions. Specifically, we conduct a weakly nonlinear analysis of the dynamical states arising via primary instabilities of the asynchronous state. In this way we determine analytically how the nature and stability of these states depend on the choice of transfer function and connectivity. We arrive at two general observations of physiological relevance that could not be explained in previous works. These are: 1 - Fast oscillations are always supercritical for realistic transfer functions. 2 - Traveling waves are preferred over standing waves given plausible patterns of local connectivity. We finally demonstrate that these results show a good agreement with those obtained performing numerical simulations of a network of Hodgkin-Huxley neurons. | q-bio.NC | q-bio |
How effective delays shape oscillatory dynamics in
neuronal networks
Alex Roxina,b, Ernest Montbri´oa,c,1
aComputational Neuroscience, Department of Information and Communication
Technologies, Pompeu Fabra University, Barcelona 08018, Spain.
bCenter for Theoretical Neuroscience, Columbia University, New York, New York, USA.
cCenter for Neural Science, New York University, New York, 10012 New York, USA.
Abstract
Synaptic, dendritic and single-cell kinetics generate significant time delays that
shape the dynamics of large networks of spiking neurons. Previous work has
shown that such effective delays can be taken into account with a rate model
through the addition of an explicit, fixed delay [1, 2]. Here we extend this work
to account for arbitrary symmetric patterns of synaptic connectivity and generic
nonlinear transfer functions. Specifically, we conduct a weakly nonlinear analy-
sis of the dynamical states arising via primary instabilities of the asynchronous
state. In this way we determine analytically how the nature and stability of
these states depend on the choice of transfer function and connectivity. We
arrive at two general observations of physiological relevance that could not be
explained in previous works. These are: 1 - Fast oscillations are always super-
critical for realistic transfer functions. 2 - Traveling waves are preferred over
standing waves given plausible patterns of local connectivity. We finally demon-
strate that these results show a good agreement with those obtained performing
numerical simulations of a network of Hodgkin-Huxley neurons.
Keywords:
delay, neuronal networks, neural field, amplitude equations, Wilson-Cowan
networks, rate models, oscillations
PACS: 87.19.lj, 87.19.lp, 05.45.-a, 84.35.+i, 89.75.-k
1. Introduction
When studying the collective dynamics of cortical neurons computationally,
networks of large numbers of spiking neurons have naturally been the bench-
mark model. Network models incorporate the most fundamental physiological
properties of neurons: sub-threshold voltage dynamics, spiking (via spike gen-
eration dynamics or a fixed threshold), and discontinuous synaptic interactions.
For this reason, networks of spiking neurons are considered to be biologically
realistic. However, with few exceptions, e.g.
[3 -- 5], network models of spiking
neurons are not amenable to analytical work and thus constitute above all a
Preprint submitted to Elsevier
November 5, 2018
computational tool. Rather, researchers use reduced or simplified models which
describe some measure of the mean activity in a population of cells, oftentimes
taken as the firing rate (for reviews, see [6, 7]). Firing-rate models are simple,
phenomenological models of neuronal activity, generally in the form of contin-
uous, first-order ordinary differential equations [8, 9]. Such firing-rate models
can be analyzed using standard techniques for differential equations, allowing
one to understand the qualitative dependence of the dynamics on parameters.
Nonetheless, firing-rate models do not represent, in general, proper mathemati-
cal reductions of the original network dynamics but rather are heuristic, but see
[10]. As such, there is in general no clear relationship between the parameters
in the rate model and those in the full network of spiking neurons, although for
at least some specific cases quasi-analytical approaches may be of value [11]. It
therefore behooves the researcher to study rate models in conjunction with net-
work simulations in order to ensure there is good qualitative agreement between
the two.
Luckily, rate models have proven remarkably accurate in capturing the main
types of qualitative dynamical states seen in networks of large numbers of asyn-
chronously spiking neurons. For example, it is well known that in such networks
the different temporal dynamics of excitatory and inhibitory neurons can lead
to oscillations. These oscillations can be well captured using rate models [8].
When the pattern of synaptic connectivity depends on the distance between
neurons, these differences in the temporal dynamics can also lead to the emer-
gence of waves [9, 12 -- 14]. This is certainly a relevant case for local circuits in
cortical tissue, where the likelihood of finding a connection between any two
neurons decreases as a function of the distance between them, e.g. [15].
When considering the spatial dependence of the patterns of synaptic connec-
tivity between neurons, one must take into account the presence of time delays
due to the finite velocity propagation of action potentials along axons. Such
delays depend depend linearly on the distance between any two neurons. This
has been the topic of much theoretical study using rate models with a space-
dependent time delay e.g. [13, 14, 16 -- 24]. The presence of propagation delays
can cause an oscillatory instability of the unpatterned state leading to homoge-
neous oscillations and waves [17, 20]. The weakly nonlinear dynamics of waves
in spatially extended rate models, i.e. describing large-scale (on the order of
centimeters) activity, is described by the coupled mean-field Ginzburg-Landau
equations [22], and thus exhibits the phenomenology of small amplitude waves
familiar from other pattern forming systems [25]. Also, it is important to note
that discrete fixed delays have been used to model the time delayed interaction
between discrete neuronal regions, as well as to model neuronal feedback, e.g.
[26 -- 30].
Localized solutions of integro-differential equations describing neuronal ac-
tivity, including fronts and pulses, are also affected by distance-dependent ax-
onal delays [13, 14, 17 -- 19]. Specifically, the velocity of propagation of the lo-
calized solution is proportional to the conduction velocity along the axon for
small conduction velocities, while for large conduction velocities it is essentially
constant. This reflects the fact that the propagation of activity in neuronal
2
tissue is driven by local integration in which synaptic and membrane time con-
stants provide the bottleneck. Also, allowing for different conduction velocities
for separate excitatory and inhibitory populations can lead to bifurcations of
localized bump states to breathers and traveling pulses [23].
Although the presence of time delays in the nervous system are most often
associated with axonal propagation, significant time delays are also produced by
the synaptic kinetics and single-cell dynamics (see the next section for a detailed
discussion about the origin of such effective time delays in networks of spiking
neurons). As a relevant example for the present work, it was shown in [1, 2] that
the addition of an explicit, non-space-dependent delay in a rate equation was
sufficient to explain the emergence of fast oscillations prevalent in networks of
spiking neurons with strong inhibition and in the absence of any explicit delays.
Specifically, in [1, 2] the authors studied a rate model with a fixed delay on
a ring geometry with two simplifying assumptions. First they assumed that the
strength of connection between neurons could be expressed as a constant plus
the cosine of the distance between the neurons. Secondly, they assumed a linear
rectified form for the transfer function which relates inputs to outputs. These
assumptions allowed them to construct a detailed phase diagram of dynamical
states, to a large degree analytically. In addition to the stationary bump state
(SB) which had been studied previously [31, 32], the presence of a delay led
to two new states arising from primary instabilities of the stationary uniform
state (SU): an oscillatory uniform state (OU) and a traveling wave state (TW).
Secondary bifurcations of these three states (SB,OU,TW) led to yet more com-
plex states including standing waves (SW) and oscillatory bump states (OB).
Several regions of bistability between primary and secondary states were found,
including OU-TW, OU-SB and OU-OB. They subsequently confirmed these re-
sults through simulations of networks of Hodgkin-Huxley neurons. Despite the
good agreement between the rate equation and network simulations, several
important issues remain unresolved:
• The rate equation predicted that the primary instability of the SU state
to waves should be to traveling waves, while in the network simulations
standing waves were robustly observed.
• The linear-threshold transfer function, albeit amenable to analysis, nonethe-
less leads to degenerate behavior at a bifurcation point. Specifically, any
perturbations with a positive linear growth rate will continue to grow until
the lower threshold of the transfer function is reached. This means that
the amplitude of new solution branches at a bifurcation is always finite,
although the solution itself may not be subcritical. In a practical sense
then, this means that it is not possible to assess whether a particular solu-
tion, for example oscillations or bumps, will emerge continuously from the
SU state as a parameter is changed, or if it will appear at finite amplitude
and therefore be bistable with the SU state over some range.
• The previous work only considered a simplified cosine connectivity. More
realistic patterns of synaptic connectivity such as a Gaussian dependence
3
of connection strength as a function of distance might lead to different
dynamical regimes. It remains to be explored the effect of a general con-
nectivity kernel in the dynamics of both the rate equation and the spiking
neurons network with fixed time delays.
In order to address these issues, and provide a more complete analysis of the
role of fixed delays in neuronal tissue, we here study a rate equation with delay
without imposing any restrictions on the form of the transfer function beyond
smoothness or on the shape of the connectivity kernel beyond being symmetric.
Our approach is similar to that of Curtu and Ermentrout in [33], who extended
a simplified rate model with adaptation for orientation selectivity [32] to include
a nonlinear transfer function and general connectivity kernel. Here we do the
same for a rate model with a fixed time delay.
Thus in what follows we will study a rate equation with fixed delay and spa-
tially modulated connectivity. In conjunction with this analysis we will conduct
numerical simulations of a network of large numbers of spiking neurons in order
to assess the qualitative agreement between the rate model and the network for
the delay-driven instabilities, which are the primary focus of this work.
This article is organized as follows: In section 2 we provide an overview
of the origin of the effective delay. We do this by looking at the dynamics of
synaptically coupled conductance-based neurons. This will motivate the pres-
ence of an explicit fixed delay in a rate-model description of the dynamics in
recurrently coupled networks of neurons.
In section 3 we formulate the rate
model and conduct a linear stability analysis of the SU state. In section 4 we
conduct a weakly nonlinear analysis for the four possible primary instabilities
of the SU state (asynchronous unpatterned state in a network model), thereby
deriving amplitude equations for a steady, Turing (bumps), Hopf (global oscilla-
tions), and Turing-Hopf (waves) bifurcations. We will focus on the delay-driven
instabilities, i.e. Hopf and Turing-Hopf. Finally, in section 5 we will study
the interactions of pairs of solutions: bumps and global oscillations, and global
oscillations and waves, respectively.
2. The origin of effective time delays
This section is intended to provide an intuitive illustration of the origin of
an effective fixed delay in networks of spiking neurons. A detailed, analytical
study of this phenomenon can be found in [3, 34, 35].
Fig.1 illustrates the origin of the effective delay in networks of model neu-
rons.
In this case we look at a single neuron pair: one presynaptic and one
postsynaptic. The single-neuron dynamics are described in detail in Appendix
A. The top panel of Fig.1 shows the membrane potential of an excitatory neu-
ron subjected to a current injection of Iapp = 0.2µA/cm2 which causes it to
fire action potentials. Numerically, an action potential is detected whenever the
membrane voltage exceeds 0mV from below. When this occurs, an excitatory
postsynaptic current (EPSC) is generated in the post-synaptic neuron, as seen
in the second panel. This current is generated by the activation of an excitatory
4
conductance which has the functional form of a difference of exponentials with
rise time τ1 = 1ms and decay time τ2 = 3ms. The different colored curves
correspond to different conductance strengths: black gE = 0.05, red gE = 0.1,
blue gE = 0.2 and orange gE = 0.4 mS·ms/cm2. The resulting excitatory post-
synaptic potential (EPSP) in millivolts is shown in the third panel. At this
point it is already clear that the postsynaptic response, although initiated here
simultaneously with the presynaptic action potential, will nonetheless take a
finite amount of time to bring the postsynaptic cell to threshold, thereby alter-
ing its firing rate. This is shown in the bottom panel. In this case the weakest
input (black) was insufficient to cause the neuron to spike, while the other three
inputs were all strong enough to cause an action potential. The latency until
action potential firing is a function of the synaptic strength, with the latency
going to zero as the synaptic strength goes to infinity. The very long latency for
gE = 0.1 mS·ms/cm2 (red curve) is due in part to the intrinsic action potential
generating mechanism. In fact, an input which brings the neuron sufficiently
close to the bifurcation to spiking can generate arbitrarily long latencies.
Fig.2 illustrates how this effective delay is proportional to both the rise and
decay time of the EPSC. In the top panel, the decay time is fixed at 3ms while
the rise time is varied, while in the bottom panel, the rise time is fixed at 0.1ms
and the decay time is varied. From these figures it is clear that the effective
delay is proportional to both the rise and decay times. Simulations with an
EPSC modeled by a jump followed by a simple exponential decay reveal that
the effective delay is proportional to the decay time in this case (not shown).
It is instructive to note that the effective delay, due to the time course of the
synaptic kinetics in the model neuron, can be captured by modeling the EPSC
as a Dirac delta function with a fixed delay. This is shown in Fig.3. In Fig.3,
the curves shown in black are the same as in Fig. 1 for gE = 0.4 mS·ms/cm2,
while the red EPSC is a Dirac delta function which arrives with a fixed delay of
3.2ms. Note that the decay of the EPSP and the postsynaptic spike time are well
captured here. The fact that a jump in voltage with a fixed delay can capture
the effect of having continuous synaptic kinetics was described already in [3]. In
that work, the authors studied a network of recurrently coupled integrate-and-
fire neurons with inhibitory synapses, the time course of which was modeled
as jump in the voltage at a fixed delay. They showed that the fixed delay led
to the emergence of fast oscillations, the period of which was proportional to
approximately several times the delay. The advantage of using EPSCs modeled
as Dirac delta functions is that the input current is delta-correlated in time,
allowing one to solve the associated Fokker-Planck equation for the distribution
of the membrane voltages in a straightforward way.
Subsequent work studied the emergence of fast oscillations in networks of
integrate-and-fire neurons with continuous synaptic kinetics [34]. There the au-
thors determined the frequency of oscillations analytically and found that it
is proportional to both the rise and decay times of the synaptic response. An
extension of that work showed that for networks of Hogkin-Huxley conductance-
based neurons, the frequency of oscillations also depends on the single cell dy-
namics and specifically the membrane time constant and action potential gener-
5
Figure 1: (Color online) The synaptic time course introduces an effective fixed delay in the
interaction between model neurons. Top panel: The membrane voltage of the presynaptic
neuron which is driven by a steady input current of Iapp = 0.2µA/cm2 causing it to spike
periodically. Here only one action potential is shown. The time of the action potential,
defined as the time at which the membrane potential crosses zero mV from below, is indicated
by the dashed line labeled tpre. Second panel from top: The EPSC in the postsynaptic cell
is initiated at time tpre with no delay. It consists of a difference-of-exponential conductance
change with rise and decay times of 1 and 3 milliseconds respectively, times the voltage
of the postsynaptic cell (the reversal potential for excitatory synapses is 0mV). The colors
indicate different values of the maximum conductance: black gE = 0.05, red gE = 0.1, blue
gE = 0.2 and orange gE = 0.4 mS·ms/cm2. See Appendix A for details of the model and
explanation of units. Third panel from top: The EPSP in the postsynaptic cell. These curves
were generated by eliminating the action potential generating currents from the model, i.e.
Na and K, and subtracting off the rest potential ∼ −64mV. Bottom panel: The membrane
potential of the postsynaptic cell with N a and K currents intact. Note that the time of the
postsynaptic action potential, indicated by the dashed lines, approaches tpre with increasing
synaptic strength. The very long latency at time t3 is due to an input which puts the cell
membrane potential very close to threshold and is therefore due in part to the action potential
generating mechanism of the model. The postsynaptic cell is driven by a steady input current
of Iapp = 0.1µ A/cm2 which is insufficient to cause it to spike.
6
-60-40-20020Vpre (mV)tpre00.020.040.060.08EPSC (µA/cm2)051015EPSP (mV)859095100105110115120125time (ms)-60-40-2002040Vpost (mV)t1t2t3Figure 2: (Color online) The effective delay is affected by both the rise and decay time of the
EPSC. Top: The decay is kept fixed at 3ms and the rise time is varied. Bottom: The rise
time is kept fixed at 0.1ms and the decay time is varied. The parameter values are the same
as in Fig.1 with gE = 0.4 mS· ms/cm2.
7
-60-40-2002040Vpre (mV)00.050.10.15EPSC (µA/cm2)τ1 = 0.1τ1 = 1τ1 = 3859095100105time (ms)-60-40-2002040Vpost (mV)τ2 = 3-60-40-2002040Vpre (mV)00.511.5EPSC (µA/cm2)τ2 = 0.1τ2 = 1τ2 = 10859095100105time (ms)-80-60-40-2002040Vpost (mV)τ1 = 0.1Figure 3: (Color online) Continuous synaptic kinetics can be replaced by a jump in the voltage
which occurs at a fixed delay. The black curves in the four panels are the same as in Fig.1
with gE = 0.4 mS·ms/cm2. The red curves show the effect of an EPSC modeled as a Dirac
delta function which occurs with a delay of 3.2ms after the presynaptic action potential.
ation mechanism [35]. This is consistent with the effect of the synaptic response
and single-cell dynamics on the response latency that we have illustrated above.
Thus the same mechanism which generates an effective delay in the response
of a postsynaptic neuron to a single excitatory presynaptic input, can also gen-
erate coherent oscillations in a network of neurons coupled through inhibitory
synapses. This can be seen in Fig. 4, which shows the results of simulations
of a network of 2000 recurrently coupled inhibitory cells. The single-cell model
is the same conductance based model used in Figs.1 -3, see Appendix A for
details. Synaptic connections are made between neurons with a probability of
p0 = 0.2, leading to a sparse, random connectivity with each cell receiving an
average of 400 connections. Synapses are modeled as the difference of exponen-
tials with a rise time and a decay time of 1ms and 3ms respectively and gI = 0.01
mS·ms/cm2. All cells receive uncorrelated Poisson inputs with a rate of 12000Hz
and gext = 0.0019mS·ms/cm2, and there is no delay in the interactions. Fig.
4A shows a raster plot of the network activity in the top panel. The activity
is noisy although periods of network synchrony are visible. The middle panel
shows the firing rate averaged over all neurons in time bins of 0.1ms (black)
and smoothed by averaging with a sliding window of 10ms (red). The large
fluctuations in the firing rate indicate network synchrony, while the averaged
trace shows clear periodic oscillations. This is even more evident in the bottom
panel which shows the subthreshold input current averaged over all cells. One
can clearly see the ongoing oscillation, the amplitude of which undergoes slow
8
-60-40-20020Vpre (mV)00.020.040.060.08EPSC (µA/cm2)05101520EPSP (mV)859095100105110115120125time (ms)-80-60-40-2002040Vpost (mV)fluctuations due to the noisy dynamics. Fig. 4B shows the smoothed firing rate
(top) and average input current (bottom) from the same simulation, but on a
shorter time scale. Note that the sign of the input current has been inverted
so that downward deflections mean increasing positive currents. Here it is clear
that the input current is a delayed copy of the firing rate, with a delay on the
order of ∼ 2 − 3ms which matches with the time scale of the synaptic kinetics
(τ1 = 1ms, τ2 = 3ms).
Therefore, Fig. 4 provides a clear prescription for developing a rate model
description of fast oscillations in networks in the asynchronous regime. The
input a neuron receives is not simply a nonlinear function of the instantaneous
firing rate, rather it is a function of the delayed firing rate. Thus one should
introduce a fixed delay in the rate model description. This was the underlying
assumption behind the work in [1].
Before presenting the model we would like to emphasize that fixed delays,
which are primarily due to synaptic and dendritic integration, and conduction
delays due to the propagation of action potentials along the axon, are both
present in real neuronal systems.
Importantly, this means that the delay in
neuronal interactions at zero distance is not zero.
In fact, fixed delays are
always observed in paired intracellular recordings in cortical slices. The latency
from the start of the fast rising phase of the action potential to the start of the
post-synaptic current (or potential) has been measured for pairs of pyramidal
cells in rat layers 3 to 6 and is on the order of milliseconds, see [37] for a
recent review. Recordings from cat cortex and between pyramidal cells and
other cells including spiny cells and interneurons in the rat cortex also reveal
fixed delays which are rarely less than a millisecond. These delays are seen
when neurons are spatially adjacent, indicating that axonal propagation is not
an important contributing factor. On the other hand the speed of propagation
of action potentials along unmyelinated axons in mammals is on the order of
10−1 − 101 m/s, which means a delay of 0.1-10 ms for neurons separated by
1 millimeter [38, 39]. Thus fixed delays and conduction delays are of similar
magnitude within a local patch of cortex and both would be expected to shape
the dynamics of non-steady activity, i.e. neither is negligible. Here we have
decided to focus on fixed delays, as in previous work [1, 2], due both to their
physiological relevance and prevalence in networks of spiking neurons.
3. The rate model with fixed time delay
An effective delay roughly proportional to the time scale of the post-synaptic
currents is always present in networks of spiking neurons as we have illustrated
in the previous section and has been shown extensively elsewhere, e.g. [34, 35].
In particular, this is true for networks in the asynchronous regime, for which
a rate-equation description is, in general, appropriate. Given this, we consider
here a rate model with fixed delay. Specifically, we study a heuristic equation
describing the activity of a small patch of neural tissue consisting of two pop-
ulations of recurrently coupled excitatory and inhibitory neurons respectively.
9
Figure 4: (Color Online) The effective delay can lead to oscillations in networks of recurrently
coupled inhibitory neurons. A. Raster plot of the spiking activity in a network of 2000 in-
hibitory cells (top). The average firing rate shows large fluctuations (center, black), which
when smoothed are clearly identifiable as noisy, periodic oscillations (red). Network oscilla-
tions are also clearly visible in the average subthreshold input (bottom). B. A blowup of the
average firing rate (top) and average input current (bottom) from the simulation in A. The
input current is clearly a time-delayed copy of the firing rate. The delay is between 2 and
3ms.
10
8101214161820firing rate (Hz)380385390395400405410time (ms)-0.6-0.4-0.200.20.4-<Isyn> (µA/cm2)effective delayB(cid:21)
(cid:21)
(1a)
. (1b)
Our formulation is equivalent to the Wilson-Cowan equations without refrac-
tory period [8], and with spatially dependent synaptic connectivity which was
studied originally in [40]. Additionally, we consider a fixed delay in the neuronal
interactions. Given these assumptions, the full Wilson-Cowan equations are
τe re = −re + Φe
dy[Jee(x − y)re(y, t − de) − Jei(x − y)ri(y, t − di)] + Ie
,
τi ri = −ri+Φi
dy[Jie(x−y)re(y, t−de)−Jii(x−y)ri(y, t−di)]+Ii
Ω
In the original formulation [8], re(x, t) and ri(x, t) represent the average number
of active cells in the excitatory and inhibitory populations respectively, in this
case at a position x and at a time t. The time constant τe (τi) is roughly the
time it takes for a an excitatory (inhibitory) cell receiving "at least threshold
excitation" [8] to generate a spike. This can reasonably be taken as the mem-
brane time constant which is generally on the order of 10-20 ms. The functions
Φa(x)(a = e, i) are usually taken to be sigmoidal. Specifically, if all neurons in
the population receive equal excitatory drive, and there is heterogeneity in some
parameter across neurons, e.g. the threshold to spiking, which obeys a unimodal
distribution, then the fraction of active neurons is just the integral over the
distribution, up to the given level of excitation. The integral of a unimodal dis-
tribution is sigmoidal. In Eqs.(1a-1b), the functions Jab(x)(a = e, i)(b = e, i)
represent the strength of synaptic connection from a neuron in population b to
a neuron in population a separated by a distance x. Here the neurons are ar-
ranged in one dimension on a domain Ω. Input from excitatory (inhibitory) cells
is furthermore delayed by a fixed amount de (di), which, as we have discussed
in the introduction, is on the order of one millisecond. Finally, the excitatory
and inhibitory populations are subject to an external drive of strength Ie and
Ii respectively.
A general analysis of Eqs.(1a-1b) would be technically arduous although it is
a natural extension of the work presented here. Rather, we choose to study the
dynamics of this system under the simplifying assumption that the excitatory
and inhibitory neurons follow the same dynamics, i.e. τe = τi = τ , de = di = d,
Jee = Jie = Je, Jei = Jii = Ji, Φe = Φi = Φ, Ie = Ii = I. If this the case, then
re = ri = r and the variable r follows the dynamics given by
r(x, t) = −r(x, t) + Φ
dyJ(x − y)r(y, t − D) + I
,
(2)
(cid:20)(cid:90)
(cid:20)(cid:90)
Ω
(cid:20) 1
(cid:90) π
2π
−π
(cid:21)
where we have chosen the domain Ω to be a ring of normalized length L = 2π.
Furthermore, we have re-scaled time by the time constant τ . The normalized
delay is therefore D = d/τ , which is the ratio of the effective delay in neuronal
interactions to the integration time constant and should be much less than one
in general. The synaptic connectivity expressed in terms of the excitatory and
inhibitory contributions is J(x) = Je(x) − Ji(x), and thus represents an
effective mixed coupling which may have both positive and negative regions.
11
Eq.(2) with the choice of Φ(I) = I for x > 0 and 0 otherwise and with
J(x) = J0 + J1 cos (x) is precisely the model studied in [1, 2]. We now wish to
study Eq.(2) for arbitrary choices of Φ(I) and J(x).
In presenting Eq.(2) we have relied on the heuristic physiological motivation
first put forth in [8]. Nonetheless, as a phenomenological model, the terms and
parameters in Eq.(2) may have alternative and equally plausible interpretations.
Indeed, the variable r is often thought of as the firing rate as opposed to the
fraction of active cells, in which case the function Φ(I) can be thought of as the
transfer function or fI curve of a cell.
Experimentally the function Φ(I) has been found to be well approximated
by a power-law nonlinearity with a power greater than one [36, 41]. Modeling
studies show that the same nonlinearity applies to integrate-and-fire neurons
and conductance based neurons driven by noisy inputs [36]. Therefore it may
be that such a choice of Φ leads to better agreement of Eq.(2) with networks of
spiking neurons and hence with actual neuronal activity. More fundamentally,
we may ask if choosing Φ as a sigmoid or a power law qualitatively alters the
dynamical states arising in Eq.(2). This is precisely why we choose here not to
impose restrictions on Φ but rather conduct an analysis valid for any Φ. How
the choice of Φ affects the generation of oscillations and waves is an issue we
will return to in the corresponding sections of this paper.
3.1. Linear stability analysis
Stationary uniform solutions (SU) of Eq.(2) are given by
R = Φ
J0R + I
,
(3)
where R is a constant non-zero rate, J0 is the zeroth order spatial Fourier
coefficient of the symmetric connectivity which can be expressed as
J(x) = J0 +
Jkeikx + c.c.
(4)
(cid:105)
(cid:33)
(cid:104)
(cid:32) ∞(cid:88)
k=1
∞(cid:88)
and k is an integer. Depending on the form of Φ, Eq.(3) may admit one or
several solutions.
We study the linear stability of the SU state with the ansatz
r(x, t) = R +
δrkeikx+α(k)t,
(5)
where δrk (cid:28) 1 and the spatial wavenumber k is an integer due to the periodic
boundary conditions. Plugging Eq.(5) into Eq.(2) leads to an equation for the
complex eigenvalue α(k)
k=0
α(k) = −1 + Φ
(cid:48)
Jke−α(k)D,
(6)
(cid:48)
where the slope Φ
is evaluated at the fixed point given by Eq.(3). The real and
imaginary parts of the eigenvalue α(k) = λ(k)+iω(k) represent the linear growth
12
rate and frequency of perturbations with spatial wavenumber k respectively. At
the bifurcation of a single mode, the growth rate will reach zero at exactly one
point and be negative elsewhere. That is, λ(kcr) = 0 for the critical mode kcr.
Given this, Eq.(6) yields the dispersion relation for the frequency of oscillation
of the critical mode
iω(kcr) = −1 + Φ
(cid:48)
Jkcr e−iω(kcr)D.
(7)
From Eq.(7) it is clear that the wavelength of the critical mode depends crucially
on the synaptic connectivity. In particular, the spatial Fourier coefficients of the
connectivity kernel J(x) depend on the wavenumber k, i.e. Jk = J(k). Thus, the
critical wavenumber is, in effect, selected by the choice of connectivity kernel.
It is in this way that the nature of the instability depends on the synaptic
connectivity at the linear level.
Depending on the values of ω and kcr in Eq.(7) at the bifurcation from the
SU state, four types of instabilities are possible:
• Steady (ω = 0, kcr = 0): The instability leads to a global increase in
activity.
• Turing (ω = 0, kcr (cid:54)= 0): The instability leads to a stationary bump state
(SU).
• Hopf (ω (cid:54)= 0, kcr = 0): The instability leads to an oscillatory uniform
state (OU).
• Turing-Hopf (ω (cid:54)= 0,kcr (cid:54)= 0): The instability leads to waves (SW, TW).
For the non-oscillatory instabilities (i.e. ω = 0), Eq.(7) gives the critical value
¯Jk = 1/Φ(cid:48)
(8)
while for the oscillatory ones Eq.(7) is equivalent to the system of two transcen-
dental equations
Note that we have defined the critical values as Jkcr ≡ ¯Jk and ωcr ≡ ¯ω.
3.1.1. The small delay limit (D → 0)
It is possible to gain some intuition regarding the effect of fixed delays on
the dynamics, by deriving asymptotic results in the limit of small delay. This
limit is a relevant one physiologically, since fixed delays are on the order of a few
milliseconds and the integration time constant is about an order of magnitude
larger. Therefore throughout this work we will present asymptotic results, and
compare them to the full analytical formulas as well as to numerical simulations.
In the limit D → 0, the asymptotic solutions of Eq.(9a) can be easily ob-
tained graphically. Fig.5 shows two curves (black and grey) representing the
13
¯ω = − tan ¯ωD,
¯ω = −Φ
(cid:48) ¯Jk sin ¯ωD.
(9a)
(9b)
Figure 5: The critical frequency at the instability to oscillations is given by the intersection
of the grey (D = 0.1) and black curves, the left and right hand sides of Eq.(9a) respectively.
As D → 0, solutions clearly approach φ = (2n + 1)π/2 (n integer). Eq.(9b) shows that the
first potentially unstable mode corresponds to the solutions φ = ±π/2 (see text).
right and left hand sides of Eq.(9a) respectively, where we defined φ ≡ ¯ωD.
The intersections of these curves correspond to the roots of Eq.(9a). The
plot shows three solutions, the trivial one φ = 0 (corresponding to the non-
oscillatory instabilities), and an infinite number of solutions that clearly ap-
proach φ = (2n + 1)π/2 (n integer) in the small delay limit, since the slope of
the straight line goes to infinity as D → 0. Substituting these solutions into
Eq. (9b), we find that the first potentially unstable solution of the kth spatial
Fourier mode is φ = ±π/2, that occurs at the critical value of the coupling
with a frequency
¯Jk = − π
2DΦ
(cid:48) ,
¯ω =
π
2D
.
(10)
(11)
Fig. (6) shows the critical frequency and coupling as a function of the delay, up
to a delay D = 1. The solution obtained from the dispersion relation Eqs.(9a)
and (9b) are given by solid lines, while the expressions obtained in the small
delay limit are given by dotted lines. Thus the expressions in the small delay
limit agree quite well with the full expressions even for D = 1.
3.2. An illustrative Phase Diagram
Throughout the analysis which follows we will illustrate our results with
a phase diagram of dynamical states. Specifically, we will follow the analysis
in [1, 2] in constructing a phase diagram of dynamical states as a function of
14
-π-π/20π/2πφ=ω D-15015-tan φφ/DFigure 6: Top: The critical frequency of oscillatory instabilities as a function of the delay D
from the dispersion equation Eq.(9a) (solid line) and in the small delay limit (dotted line).
Bottom: The critical coupling as a function of the delay D from Eq.(9b) (solid) and in the
small delay limit (dotted).
J0 and J1, the first two Fourier coefficients of the synaptic connectivity. We
will set the higher order coefficients to zero for this particular phase diagram,
although we will discuss the effect of additional modes in the text. Furthermore,
unless otherwise noted, for simulations we choose a sigmoidal transfer function
Φ(I) = α
1+e−βI with α = 1.5 and β = 3. As we vary the connectivity in the phase
diagram, we also vary the constant input I in order to maintain the same level
of mean activity, i.e. we keep R = 0.1 fixed. For the values of the parameters
we have chosen here this results in I ∼ −0.1J0 − 0.88. We also take D = 0.1
unless noted otherwise
The primary instability lines for the SU state can be seen in the phase
diagram, Fig. (7). The region in (J0, J1) space where the SU state is stable is
shown in gray, while the primary instabilities, listed above, are shown as red
lines.
In Section 4 we will provide a detailed analysis of the bumps, global
oscillations and waves (SB, OU and SW/TW) which arise due to the Turing,
Hopf and Turing-Hopf instabilities respectively. The derivation of the amplitude
equations is given in Appendix B, as well as a brief discussion of the steady,
transcritical bifurcation which occurs for strong excitatory coupling and is not
of primary interest for this study. Finally, in Section 5 we will analyze the
codimension 2 bifurcations: Hopf and Turing-Hopf (OU and waves), and Turing
and Hopf (SU and OU). This analysis will allow us to understand the dynamical
states which appear near the upper and lower left hand corners of the grey
shaded region in Fig. (7), i.e. the SW/OU and OB states.
4. Bifurcations of codimension 1
As we are interested in creating a phase diagram as a function of the con-
nectivity, we will take changes in the connectivity as the bifurcation parameter.
15
110100ωcr0.11D1101001000-JcrFigure 7: (Color online) Phase diagram of the rate model Eq.(2). In each region, the type of
solution seen in numerical simulations is indicated by a letter code: SU - stationary uniform
(grey region), HA - high activity, SB - stationary bump, OB - oscillatory bump, SW - standing
waves, TW - traveling waves. Solid lines indicate analytical expressions. In particular, the four
possible instabilities of the SU state are depicted in red (thick lines correspond to subcritical
bifurcations) and are given by the linear stability criteria Eqs.(8-9b). The four lines emanating
from the upper and lower left corners of the SU region were determined from a weakly nonlinear
analysis at the two corners (codimension two points) [see section IV]. The region marked OB
corresponds to a mixed mode solution of SB-OU, while in the lower left-hand region the OU
and SW solutions are bistable. Parameters: Φ(x) =
1+e−βx where α = 1.5 and β = 3. We
consider the coupling function J(x) = J0 + 2J1 cos x. The time delay is D = 0.1 and the input
current I is varied so as to keep the uniform stationary solution fixed at R = 0.1.
α
16
-100-500J0-100-500J1SUSBHAOUTWOBSB/HATW/HASWSU/HASU/SWSWTW/SWSW/OUTuring-HopfTuringTranscriticalHopfThe small parameter is therefore defined by the expansion
Jk = ¯Jk + 2∆Jk,
(12)
The perturbative method we apply, which makes use of this small parameter, is
called the multiple-scales method and is a standard approach for determining
the weakly nonlinear behavior of pattern-forming instabilities [25]. We choose
the particular scaling of 2 in the foreknowledge that if the amplitudes of the
patterns of interest are scaled as , a solvability condition will arise at order 3.
This solvability condition yields a dynamical equation governing the temporal
evolution of the pattern (see Appendix A for details). Without loss of generality
we will assume that an instability of a nonzero spatial wavenumber is for k = 1.
We will furthermore co-expand the constant input I so as to maintain a fixed
value for the spatially homogeneous steady state solution R
I = ¯I + 2∆I,
r = R + r1 + 2r2 + . . . ,
(13)
(14)
where the small parameter is defined by Eq.(12). Additionally we define the
slow time
T = 2t.
(15)
4.1. Turing Bifurcation
The emergence and nature of stationary bumps in rate equations have been
extensively studied elsewhere, e.g. [40]. We briefly describe this state here for
completeness. The kth spatial Fourier mode of the connectivity is given by
the critical value Eq. (8), while we assume that all other Fourier modes are
sufficiently below their critical values to avoid additional instabilities. Without
loss of generality we assume k = 1 here.
We expand the parameters J1, I and r as in Eqs. (12,13,14), and define
the slow time Eq. (15). The solution of Eq.(2) linearized about the SU state
R is a spatially periodic amplitude which we allow to vary slowly in time, i.e.
r1 = A(T )eix + c.c.. Carrying out a weakly nonlinear analysis to third order in
leads to the amplitude equation
∂T A = η∆J1A + ΓA2A,
with the coefficients
Γ =
¯J 3
1
1 + D
(cid:32)
(cid:48)
Φ
η =
1 + D
,
J2(Φ(cid:48)(cid:48))2
2(1 − J2Φ
(cid:33)
.
(cid:48)(cid:48)(cid:48)
Φ
2
+
(cid:48)
)
(cid:48)(cid:48)
)2
J0(Φ
1 − J0Φ
(cid:48) +
(16)
(17a)
(17b)
The nature of the bifurcation (sub- or supercritical) clearly depends strongly
on the sign and magnitude of mean connectivity J0 and the second spatial
Fourier mode J2. Figure 8 shows a phase diagram of the bump state at the crit-
ical value of ¯J1 = 3.54. The red lines indicate oscillatory and steady instability
17
Figure 8: (Color online) The phase diagram for stationary bumps as a function of the zeroth
and second spatial Fourier modes of the connectivity kernel. The region of bistability between
the unpatterned and the bump state is shaded. Here the critical spatial Fourier coefficient
¯J1 = 3.54. Red lines indicate the boundaries of the SU state (obtained via Eqs.(8-9b). The
functions Φ and J(x) as well as the input current I and the delay D are taken as in Fig. (7).
Insets: example connectivity patterns corresponding to the values of J0 and J2 marked by
the square and triangle respectively. Note that standard Mexican Hat connectivity tends to
favor bistability.
boundaries for the modes J0 and J2. Clearly J0 < 0 and J2 < 0 over most of
the region of allowable values, and the bump is therefore supercritical. There is
only a narrow region of predominantly positive values (shaded region in Fig. 8
for which the cubic coefficient is positive. This indicates that the bifurcating
solution branch is unstable. However, neuronal activity is bounded, which is
captured in Eq.(2) by a saturating transfer function Φ. Thus the instability will
not grow without bound but rather will saturate, producing a finite amplitude
bump solution. This stable, large amplitude branch and the unstable branch
annihilate in a saddle-node bifurcation for values of J1 below the critical value
for the Turing instability. Such finite-amplitude bumps are therefore bistable
with the SU state. In Fig. 8, the two insets show the connectivity kernel J(x)
for parameter values given by the placement of the open triangle (subcritical
bump) and the open square (supercritical bump).
In the phase diagram (7), the Turing instability line (upper horizontal red
line) is shown thin for supercritical, and thick for subcritical bumps (here J2 =
0).
4.2. Hopf Bifurcation
4.2.1. Network simulations
As shown elsewhere previously [1, 3, 4], a network of recurrently coupled
inhibitory neurons can generate fast oscillations due to the effective delay in
the synaptic interactions. Fig.9A shows raster plots of the spiking activity in
18
-60-40-200J2-60-40-200J0SubcriticalSupercritical+++-----Figure 9: Fast oscillations in a sparse, randomly connected network of 2000 randomly con-
nected inhibitory neurons without delay (pI
0 = 0.2). A: Raster plots of spiking activity in four
networks with increasing values of the synaptic weight. From top to bottom: gI = 0, 0.005,
0.008, 0.01mS·ms/cm2. The mean firing rate was kept fixed at approximately 14Hz by varying
the input current. From top to bottom: νext = 2150, 7700, 10000 and 12000Hz. See Appendix
A for additional model details. B: The autocorrelation function of the network-averaged firing
rate for the four networks.
19
020406080100τ (ms)-0.200.20.4AC(τ)Ba network randomly connected inhibitory neurons as the synaptic weight gI is
increased (see Appendix A for a description of the network). The raster plots
clearly show oscillations emerging as the parameter gI increases in strength.
Fig.9B shows the autocorrelation function of the network-averaged firing rate
from four seconds of simulation time. The curve is completely flat for the un-
coupled case as expected, while periodic peaks appear and grow as the synaptic
weights are increased, indicating the presence of coherent network oscillations.
Note that the oscillations appear to emerge continuously, which would indicate
a supercritical bifurcation. This is consistent with the finding in [3], where
fast oscillations in a network of integrate-and-fire neurons were shown to be
supercritical analytically.
We may ask if fast oscillations are in general expected to bifurcate super-
critically, or if a subcritical bifurcation is also possible. To this end we study
the rate equation which allows us to detemine the nature of the bifurcation
analytically as a function of the transfer function and connectivity.
4.2.2. Rate model
In the rate model there is a spatially homogeneous oscillatory instability
with frequency ω given by Eq.(9a). This occurs for a value of the 0th spatial
Fourier mode of the connectivity given by Eq.(9b), while we assume that all
other Fourier modes are sufficiently below their critical values to avoid additional
instabilities. We expand the parameters J0, I and r as in Eqs. (12,13,14), and
define the slow time Eq. (15). The linear solution has an amplitude which we
allow to vary slowly in time, i.e. r1 = H(T )eiωt + c.c.. Carrying out a weakly
nonlinear analysis to third order in leads to the amplitude equation
∂T H = (µ + iΩ)∆J0H + (α + iβ)H2H,
(18)
where the coefficients (µ + iΩ) and (α + iβ) are specified by the Eqs. (B.4) and
(B.5) in the Appendix B.
Figure 10 shows a typical bifurcation diagram (in this case J1 = 0) for the
Hopf bifurcation. Plotted is the amplitude of the limit cycle as a function of J0
where symbols are from numerical simulation of Eq.(2) and the lines are from
the amplitude equation, Eq.(18).
In the small delay limit (D → 0) we can use the asymptotic values (11) to
obtain, to leading order,
(cid:48)
,
2 + i)Φ
1 + π2
4
µ + iΩ = − ( π
(cid:32)
11π − 4
(cid:48)(cid:48)
(cid:20) 11 + π
10
(cid:21)(cid:33)
(19a)
,(19b)
(cid:48)(cid:48)(cid:48)
− Φ
2
α + iβ = − χ
(DΦ(cid:48))3
(Φ
Φ
)2
(cid:48) − πΦ
4
(cid:48)(cid:48)(cid:48)
− i
20
where we have defined the quantity χ ≡ π3/(8 + 2π2). Figure 11 shows a
comparison of the full expressions for the coefficients of the amplitude equation,
20
Figure 10: The bifurcation diagram for a supercritical Hopf bifurcation. Shown is the ampli-
tude of the limit cycle as a function of the 0th order spatial Fourier coefficient of the coupling
J(x). Open circles are from numerical simulation of Eq.(2) and solid lines show the solution
from the amplitude equation, Eq.(16). The functions Φ and J(x) as well as the input current
I and the delay D are taken as in Fig. 7.
Eqs. (B.4-B.5) with the expressions obtained in the limit D → 0, Eqs. (19a-19b).
Again, the agreement is quite good, even up to D = 1, especially for the real
part of the cubic coefficient α, which is of primary interest here.
The asymptotic expression for the cubic coefficient α, Eq.(19b), indicates
)2 > (11π − 4)/(5π).
that a subcritical limit cycle should occur for Φ
This provides a simple criterion for determining whether or not a particular
choice of the transfer function can generate oscillations which are bistable with
the SU state.
In fact, it is a difficult condition to fulfill given a sigmoidal-
like input-output function. For example, given a sigmoid of the form Φ(x) =
α/(1 + e−βx), one finds that
/(Φ
Φ
(cid:48)(cid:48)(cid:48)
(cid:48)(cid:48)
(cid:48)
(cid:48)(cid:48)(cid:48)
(cid:48)
Φ
Φ
(cid:48)(cid:48)
(Φ
)2 = 1 − 2
e−3βx
(e−4βx − 2e−3βx + e−2βx)
.
(20)
It is straightforward to show that the expression of the right hand side of
)2 < 1 < (11 −
Eq.(20) is bounded above by 1.
4π)/(5π) ∼ 1.95. Such a nonlinear transfer function will therefore always gen-
erate supercritical oscillations.
In fact, −∞ ≤ Φ
/(Φ
Φ
(cid:48)(cid:48)(cid:48)
(cid:48)(cid:48)
(cid:48)
If the nonlinear transfer function is interpreted as the single-cell fI curve,
which is common in the literature, then we can use the fact that cortical cells
operate in the fluctuation-driven regime. In particular, the mean input current
to cortical cells is too low to cause spiking. Rather, this occurs at very low rates
due to fluctuations in the membrane voltage. Although the fI curve for spiking
neurons in the supra-threshold regime is concave down and saturates, in the
fluctuation-driven, sub-threshold regime the fI curve exhibits a smoothed out
tail which is concave up. It has been shown that the sub-threshold portion of
the fI curve of actual cells can be well fit by a function of the form Φ(x) = Axγ,
21
-64-62-60-58-56J000.01LC amplitudenumericsamplitude eqs.Figure 11: Top: The real part of the linear coefficient µ. Bottom: Minus the real part of the
cubic coefficient −α. Solid lines are from the full expressions Eq.(B.4-B.5) and dotted lines
are the leading order terms in the small delay limit, Eqs. (19a-19b). The functions Φ and
J(x) as well as the input current I are taken as in Fig. (7).
where γ > 1 (see e.g. [36, 41]). In this case
(cid:48)(cid:48)(cid:48)
(cid:48)
Φ
(Φ
Φ
(cid:48)(cid:48)
)2 = 1 − 1
γ − 1
,
which again is bounded between −∞ and 1. This again rules out subcritical
oscillations in the small delay limit.
Nonetheless, suitable functions Φ for generating subcritical oscillations can
be contrived, as shown in Fig. 12 A. Numerical simulation of Eq.(2) indeed
reveals a subcritical bifurcation in this case (see Fig. 12 B). However, this type
of transfer function does not seem consistent with the interpretation of Φ as a
single-cell fI curve, nor with that of Φ as a cumulative distribution of activation,
i.e. a sigmoid. This strongly suggests that delay-driven oscillations in networks
of spiking neurons will be generically supercritical.
4.3. Turing-Hopf Bifurcation
4.3.1. Network simulations
As shown previously in [1], given an inverted Mexican-hat connectivity for
which inhibition dominates locally, fast waves may emerge in networks of spiking
neurons. This is illustrated in Fig.13A, where raster plots of three networks are
shown with the degree of spatial modulation increasing from top to bottom.
Additionally, Fig. 13B (top) shows a spatial profile of the network activity
averaged over 2500 ms for the three networks, while the bottom panel shows
the autocorrelation function (AC) of the network firing rate for the three cases
(same color scheme). Note that for small inhibitory spatial modulation pI
1 (black
curve) the profile is essentially flat while the AC exhibits an initial peak and
dip, but an absence of multiple peaks which would indicate fast oscillations. As
pI
1 is increased (red curve), the profile remains flat but the AC clearly exhibits
22
-0.16-0.12-0.08η00.20.40.60.81D110001e+06-αFigure 12: A. An example of a function Φ(x) for which subcritical oscillations are possible.
The dotted curve indicates the range of the function Φover which oscillations are subcritical.
B. A bifurcation diagram for subcritical oscillations when the function Φ(x) is the same as in
panel A. Open circles: the limit cycle amplitude computed numerically as a function of J0.
Here D = 0.1 and the critical coupling is ¯J0 = −15.89. The fixed point is held at R = 0.1 and
thus the value of x in panel A is close to 0.1 (x + x3 = 0.1).
periodic peaks indicating that fast oscillations are present in the firing rate.
The corresponding raster plot in the middle panel of Fig. 13 shows intermit-
tent standing wave patterns which emerge and later disappear giving rise to a
new pattern with a different spatial orientation (not shown). This explains why
the time average of this spatial profile becomes flat. Finally, for strong enough
spatial modulation, a stationary standing wave pattern is seen in Fig. 13A (bot-
tom).
In this case the time-averaged spatial profile shown in Fig. 13B (top,
blue) shows two distinct maxima, whereas the AC indicates fast oscillations in
the firing rate.
Extensive simulations with such a cosine connectivity always yielded stand-
ing wave patterns for various choices of synpatic weights and input rates (not
shown). We seek to understand why this is so, and if delay-driven traveling
wave patterns can also be seen in network numerical simulations. To this end
we study the emergence of fast oscillations in the rate equation.
4.3.2. Rate equation
There is a spatially inhomogeneous oscillatory instability with frequency ω
given by Eq.(9a). This occurs for a value of the kth spatial Fourier mode of the
connectivity given by Eq.(9b), while we assume that all other Fourier modes are
sufficiently below their critical values to avoid additional instabilities. Without
loss of generality we assume k = 1.
We expand the parameters J1, I and r as in Eqs. (12,13,14) and define the
slow time Eq. (15). The linear solution consists of leftwards and rightwards
traveling waves with an amplitude which we allow to vary slowly in time, i.e.
r1 = A(T )eiωt+ix+B(T )e−iωt+ix+c.c.. Carrying out a weakly nonlinear analysis
to third order in leads to the coupled amplitude equations
∂T A = (µ + iΩ)∆J1A + (a + ib)A2A + (c + id)B2A,
(21a)
23
00.20.40.60.81x00.511.52Φ(x) = x+x3(A)-17-16.5-16-15.5-15-14.5-14J000.0020.0040.0060.008LC amplitude(B)0 = pI
0 = 0.2, pE
1 = 0 and pE,I
Figure 13: (Color online) Standing waves in a spiking network with inverted Mexican-hat
connectivity with pE
2 = 0 (see Eq.(A.2) in the Appendix A)
and gE = 0.01, gI = 0.028. The rate of the external Poisson inputs is νext = 5000Hz and
gext = 0.001. A: Raster plots of spiking activity for three simulations with increasing spatial
modulation of the connection probability between neurons. From top to bottom: pI
1 = 0.15,
0.17 and 0.20. B: Top: The profile of activity in the three simulations averaged over 2500ms.
The color code is black pI
1 = 0.15, red 0.17 and blue 0.2. Bottom: The autocorrelation function
of the firing rate averaged over all neurons in each simulation. Note that the instantaneous
firing rate itself is not shown here.
24
0500100015002000neuron index010203040506070firing rate (Hz)020406080100τ-0.500.51AC(τ)BFigure 14: Top: The real part of the cubic coefficient a. Bottom: The real part of the cross-
coupling coefficient c. Solid lines are from the full expressions Eq.(B.6-B.7) and dotted lines
are the leading order terms in the small delay limit, Eqs. (22a-22b). The functions Φ and
J(x) as well as the input current I are taken as in Fig. (7).
∂T B = (µ − iΩ)∆J1B + (a − ib)B2B + (c − id)A2B,
(21b)
where the coefficients (a+ib), (c+id) and (µ+iΩ) are given by the Eqs. (B.6,B.7,B.4),
respectively.
In the small delay limit (D → 0) we can use the asymptotic values (11) to
obtain, to leading order,
a + ib =
(cid:33)
,
(cid:48)(cid:48)
J0(Φ
1 − Φ
(cid:48)
)2
J0
(cid:48)(cid:48)(cid:48)
Φ
2
+
(cid:32)
χ( π
(DΦ
2 + i)
)3
(cid:48)
(cid:32)
(cid:33)
,
(22a)
(22b)
c + id =
χ( π
(DΦ
2 + i)
)3
(cid:48)
(cid:48)(cid:48)
J0(Φ
1 − Φ
(cid:48)
)2
J0
(cid:48)(cid:48)(cid:48)
+
+ Φ
(cid:48)(cid:48)
J2(Φ
1 − Φ
(cid:48)
)2
J2
where χ ≡ π3/(8 + 2π2). Figure 14 shows a comparison of the full expressions
(solid lines) for the real parts of the cubic and cross-coupling coefficients a and
c with the asymptotic expressions above (dotted lines).
The equations (21a) and (21b) admit solutions of the form (A, B) = (AeiθA ,BeiθB ),
4.3.3. Wave solutions and their stability.
where the amplitudes A and B obey
A = µ∆J1A + aA3 + cB2A,
B = µ∆J1B + aB3 + cA2B.
(23a)
(23b)
Traveling waves: Leftward and rightward traveling waves in Eqs. (23a)
and (23b) are given by (AT W , 0) and (0,AT W ) respectively, where AT W =
−µ∆J1/a. The stability of traveling waves can be determined with the ansatz
25
1100100001e+06-a00.20.40.60.81D1100100001e+06cFigure 15: The existence and stability of traveling and standing waves as a function of the
cubic and cross-coupling coefficients a and c given by Eqs. (22a,22a) and, in the small delay
limit, by Eq. (24). In each sector of parameter space a representative bifurcation diagram is
shown. Supercritical (subcritical) solutions are shown growing from left to right (right to left).
Stable (unstable) solutions are given by solid (dashed) lines. Also indicated in each sector is
the type of solution which will be seen numerically. A question mark is placed wherever the
type of stable solution cannot be determined through a weakly nonlinear analysis.
(A,B) = (AT W , 0) + (δA, δB)eλt. The resulting eigenvalues are λ1 = −2µ∆J1
and λ2 = −µ∆J1(c/a − 1).
Standing waves: Standing waves in Eqs. (23a) and (23b) are given by (ASW ,ASW ),
where AT W = −µ∆J1/(a + c). The stability of standing waves can be de-
termined with the ansatz (A,B) = (ASW ,ASW ) + (δA, δB)eλt. The resulting
eigenvalues are λ1 = −2µ∆J1 and λ2 = −2µ∆J1(a − c)/(a + c).
The existence and stability of small-amplitude waves as described above is
completely determined by the values of the cubic and cross-coupling coefficients
a and c. This is illustrated in Fig. 15, where the parameter space is divided
into five sectors.
In each sector the type of solution which will be observed
numerically is indicated where known, and otherwise a question mark is placed.
Illustrative bifurcation diagrams are also given. Specifically, in the region la-
beled 1 (red online), the SW solution is supercritical and unstable while the
TW solution is supercritical and stable. TW will therefore be observed. In the
region labeled 2, the SW solution is supercritical and unstable while the TW
solution is subcritical. Finite-amplitude TW are therefore expected to occur
past the bifurcation point. In the region labeled 3, both solution branches are
subcritical, indicating that the analysis up to cubic order is not sufficient to
identify the type of wave which will be observed. In the region labeled 4, TW
are supercritical and unstable while SW are subcritical. Finite amplitude SW
are therefore expected past the bifurcation point. In the region labeled 5, the
TW solution is supercritical and unstable while the SW solution is supercritical
and stable. SW will therefore be observed.
26
-1-0.500.51c-1-0.500.51aTWTWSWSW?12345A
C
time
time
B
D
time
time
Figure 16: Examples of wave solutions from numerical simulation of Eq.(2). The functions Φ
and J(x) as well as the input current I and the delay D are taken as in Fig. 7, with J1 = −120.
A. Supercritical standing waves: J0 = −40 and 5 units of time are shown. B. Supercritical
standing waves: J0 = −9 and 5 units of time are shown. C. Subcritical standing waves:
J0 = −5 and 40 units of time are shown. D. Subcritical traveling waves: J0 = 0 and 5 units
of time are shown.
Performing the small delay limit we find, from Eqs. (22a,22b), that
a = c − π
2
χ
(DΦ)3
(cid:48)(cid:48)(cid:48)
Φ
2
(cid:48)(cid:48)
J2(Φ
1 − Φ
(cid:48)
)2
J2
+
.
(24)
(cid:32)
(cid:33)
From Fig. 15 we can see that the nature of the solution seen will depend crucially
on the sign of the second term of the right-hand side of Eq.(24). In particular,
the diagonal a = c divides the the parameter space into two qualitatively differ-
ent regions. Above this line TWs are favored while below it SWs are favored.
In the small delay limit, Eq.(24) indicates that the balance between the third
derivative of the transfer function Φ
and the second spatial Fourier mode of
the connectivity kernel will determine whether TW or SW are favored.
(cid:48)(cid:48)(cid:48)
For sigmoidal transfer functions, the third derivative changes sign from posi-
tive to negative already below the inflection point, while for expansive power-law
nonlinearities, which fit cortical neuronal responses quite well in the fluctuation-
driven regime, the third derivative is positive if the power is greater than 2
and is negative otherwise. The contribution of this term therefore will depend
on the details of the neuronal response.
In simulations of large networks of
conductance-based neurons in the fluctuation-driven regime in which J2 was
> 0 [1, 2].
zero, the standing wave state was always observed, indicating a Φ
The phase diagram for J2 = 0, Fig. 7, clearly shows the dominance of the
> 0 for the parameter values chosen. Specifically,
SW solution, indicating Φ
(cid:48)(cid:48)(cid:48)
(cid:48)(cid:48)(cid:48)
27
for values of J0 < −6.3, supercritical standing waves are stable (see region 5 in
Fig. 15). Figures 16 A and 16 B show supercritical SW patterns for J0 = −40
and J0 = −9, respectively. For −6.3 < J0 < −2.6, TW are supercritical and
unstable while SW are subcritical [see region 4 in Fig. 15]. An example of
subcritical SW is shown in Fig. 16 C. For −2.6 < J0 < 3.58, both SW and
TW are subcritical (see region 3 in Fig. 15). Numerical simulations reveal TW
patterns in this region (see an example in Fig. 16 D). In the region where SW
are subcritical there is a small sliver in (J0, J1) where the SW state is bistable
with a TW state (TW/SW in the phase diagram). This TW branch most likely
arises in a secondary bifurcation slightly below the Turing-Hopf bifurcation line.
There is also a small region of bistability between large amplitude TW and the
spatially uniform high activity state (TW/HA in the phase diagram Fig. 7).
(cid:48)(cid:48)(cid:48)
Thus for Φ
> 0 and with a simple cosine connectivity, SW arise for most
values of J0. However, adding a non-zero J2 can lead to the TW solution
winning out. The phase diagram of wave states as a function of J0 and J2 is
shown in Fig. 17 A. In Fig. 17 A, the light shaded region indicates values of
J0 and J2 for which TW are expected, whereas SW are expected in the dark
shaded region. In the unshaded region, both TW and SW are subcritical and
the solution type is therefore not determined by the analysis up to cubic order.
These regions, delimited by the solid lines, were determined by numerically
evaluating the real parts of the full expressions for the cubic and cross-coupling
coefficients, Eqs. (B.6-B.7). Each region is furthermore numbered according to
the existence and stability of the TW and SW solution branches as shown in
Fig. 15. The dashed lines show the approximation to the solid lines given by
the asymptotic formulas (22a-22b). The set of allowable values for J0 and J2 is
bounded by the conditions (8-9b) corresponding to steady or oscillatory linear
instabilities. These stability conditions are shown by the horizontal and vertical
bounding lines (red online). All parameter values are as in Fig. 7.
From Fig. 17 we can now understand the discrepancy between the analytical
results in [1] using a rate equation with a linear threshold transfer function,
which predicted TW, and network simulations, which showed SW. Specifically,
given a nonlinear transfer function with Φ
> 0, then with a simple cosine
coupling SW are predicted over almost the entire range of allowable J0 (dark
shaded region for J2 = 0). The nonlinear transformation of inputs into outputs
is thus crucial in determining the type of wave solution. The choice of a threshold
linear transfer function results in the second and all higher order derivatives
being zero. In this sense it produces degenerate behavior at a bifurcation point,
and by continuation of the solution branches, in a finite region of the phase
diagram.
(cid:48)(cid:48)(cid:48)
4.3.4. 'Difference-of-Gaussian' connectivities
We have shown that varying J0 can change the nature of the bifurcation, e.g.
supercritical to subcritical, while varying J2 can switch the solution type, e.g.
from SW to TW. As an example of a functional form of connectivity motivated
by anatomical findings, e.g. [42], we consider a difference of Gaussians, written
28
Figure 17: (Color online) A. Phase diagram for waves as a function of the zeroth and second
spatial Fourier coefficients of the connectivity kernel. The dark-shaded region indicates SW,
whereas the light shaded region indicates TW. Red lines indicate boundaries for primary
instabilities of J0 and J2 given by Eqs. (8-9b). Solid stability lines for waves are from Eqs. (B.6-
B.7) while the dashed line are from the asymptotic expressions (22a-22b). Here ¯J1 = −58.4.
The function Φ as well as the input current I and the delay D are taken as in Fig. 7. Insets:
example connectivity patterns corresponding to the values of J0 and J2 marked by the square
and triangle respectively. B. The same phase diagram as in A, now showing where various
types of 'difference-of-Gaussian' connectivities, Eq. (25), would lie. Each dotted line indicates
the border of a region in which the standard deviations of the excitatory and inhibitory
connectivities are below a certain threshold (0.7, 1.0 and 1.5, respectively). Relatively narrow
connectivities compared to the system size will always generate TW solutions. See text for
details.
29
-60-40-200J2-60-40-200J0TW supercr (1)TW subcr (2)SW subcr (4)SW supercr (5)--++++(A)(3)-60-40-200J2-60-40-200J0σe,i<0.7σe,i<1σe,i<1.5(B)as
J(x) =
Je√
2πσe
− x2
2σ2
e
e − Ji√
2πσi
− x2
2σ2
i .
e
(25)
In this case, one finds that the Fourier coefficients are
Jk = Jee−k2σ2
e /2f (k, σe) − Jie−k2σ2
i /2f (k, σi).
(26)
√
where f (k, σe,i) = Re[Erf((π/σe,i + ik2)/
2)]/π. Once J1 has been fixed at
the critical value for the onset of waves, from Eq.(26) it is straightforward to
show that J0 = −pJ2 + q where both p and q are constants which depend
on σe and σi, the widths of the excitatory and inhibitory axonal projections
respectively. Thus a difference-of-Gaussian connectivity, constrains the possible
values of J0 and J2 to lie along a straight line for fixed connectivity widths.
This is illustrated in Fig. 17B where three dashed lines are superimposed on the
phase diagram, corresponding to the values σe,i = (1.5, 1.49); σe,i = (1, 0.99);
and σe,i = (0.7, 0.69). Each of these lines is bounding a region to the left
where σe and σi are less than 0.7, 1.0 and 1.5 respectively. Given periodic
boundary conditions with a system size of 2π, a Gaussian with σ = 1.5 is already
significantly larger than zero for x = π or −π. Thus, restricting ourselves to
Gaussians which essentially decay to zero at the boundaries means that TW
will always be observed. The same holds true for qualitatively similar types of
connectivity.
4.3.5. Classes of waves in Network Simulations
Our analytical results concerning waves from the rate equation Eq.(2) predict
that a connectivity with a sufficiently strong second Fourier component with
a negative amplitude will lead to traveling waves (see the phase diagram in
Fig. 17(A)).
Here we have confirmed this prediction performing numerical simulations of
the network of spiking neurons described in the Appendix A. Indeed, Fig. 18
shows that the addition of the second spatial Fourier component to the in-
hibitory connections converts standing waves (SW) into travelling waves (TW).
5. Bifurcations of codimension 2
For certain connectivity kernels we may be in the vicinity of two distinct in-
stabilities. This is the case for certain Mexican hat connectivities (OU and SB)
and certain inverted Mexican hat connectivities (OU and SW/TW). Although
two instabilities will co-occur only at a single point in the phase diagram Fig. 7,
i.e. J0 and J1 are both at their critical values, the competition between these
instabilities may lead to solutions which persist over a broad range of connectiv-
ities. This is the case here. We can investigate this competition once again using
a weakly nonlinear approach. The main results of this section are summarized
in table 1.
30
Figure 18: The transition from (A) standing to (B) travelling waves in a network of
conductance-based neurons takes place by increasing the second Fourier mode of the synaptic
connectivity pI
1,2 = 0,
gE = 0.01, gI = 0.028, gext = 0.001mS ms/cm2, and νext = 5000Hz.
2 = 0.1. Remaining parameters: pE,I
1 = 0.2, pE
2. (A) pI
2 = 0, (B) pI
0 = pI
5.1. Hopf and Turing-Hopf bifurcations
Here we consider the co-occurrence a spatially homogeneous oscillation and
a spatially inhomogeneous oscillation (OU and SW/TW), both with frequency
ω given by Eq.(9a). This instability occurs when the zeroth and kth spatial
Fourier mode of the connectivity both satisfy the relation, Eq.(9b), while we
assume that all other Fourier modes are sufficiently below their critical values
to avoid additional instabilities. Without loss of generality we take k = 1 for
the SW/TW state.
We expand the parameters J0, J1, I and r as in Eqs. (12,13,14), and define
the slow time (15). The linear solution consists of homogeneous, global oscilla-
tions, leftwards and rightwards traveling waves with amplitudes which we allow
to vary slowly in time, i.e. r1 = H(T )eiωt + A(T )eiωt+ix + B(T )e−iωt+ix + c.c..
Carrying out a weakly nonlinear analysis to third order in leads to the coupled
amplitude equations
∂T H = (µ + iΩ)∆J0H
+2(α + iβ)[(
+ A2 + B2)H + H∗AB∗],
H2
2
∂T A = (µ + iΩ)∆J1A + (a + ib)A2A + (c + id)B2A
+(α + iβ)[2H2A + H 2B],
∂T B = (µ − iΩ)∆J1B + (a − ib)B2B + (c − id)A2B
+(α − iβ)[2H2B + H∗2A],
(27a)
(27b)
(27c)
where α + iβ, a + ib and c + id are given by Eqs. (B.5,B.6,B.7), respectively.
The overbar in H∗ represents the complex conjugate.
31
9009501000time (ms)010002000neuron index(A)9009501000time (ms)010002000neuron index(B)5.1.1. Solution types and their stability
Eqs. (27a-27c) admit several types of steady state solutions including os-
cillatory uniform solutions (OU), traveling waves (TW), standing waves (SW)
and mixed mode oscillations/standing waves (OU-SW). The stability of these
solutions depends on the values of the coefficients in Eqs. (27a-27c). In addi-
tion, non-stationary solutions are also possible. Here we describe briefly some
stationary solutions and their stability. For details see Appendix B.
Oscillatory Uniform (OU): The oscillatory uniform solution has the form (H, A, B) =
(Heiωt, 0, 0) where
(cid:114)−µ∆J0
(cid:17)
(cid:16)
α
Ω − βµ
α
,
∆J0.
H =
ω =
The OU state undergoes a steady instability along the line
∆J1 = ∆J0.
(28)
This stability line agrees very well with the results of numerical simulations of
Eq.(2) [see the phase diagram Fig. 7].
Traveling Waves (TW): The traveling wave solution has the form (H, A, B) =
(0,AT W eiωt, 0) or (0, 0,AT W e−iωt), where
(cid:114)−µ∆J1
(cid:17)
(cid:16)
a
Ω − bµ
a
,
∆J1.
AT W =
ω =
The TW state undergoes an oscillatory instability along the line
with a frequency
(cid:16)
¯ω =
∆J1 =
a
2α
∆J0,
Ω(1 − a
2α
) + (b − 2β)
µ
2α
(cid:17)
∆J0.
(29)
Standing Waves (SW): The standing wave solution has the form (H, A, B) =
(0,ASW eiωt,ASW e−iωt), where
ASW =
ω =
(cid:17)
µ
∆J1.
(30)
(31)
(cid:115)−µ∆J1
(cid:16)
(a + c)
Ω − (b + d)
(a + c)
,
32
An oscillatory instability occurs along the line
with a frequency
(cid:114)
¯ω =
[Ω(
∆J1 =
(a + c)
4α
∆J0,
a + c
4α
− 1) − µ
b + d − 4β
4α
]2 − µ2 α2 + β2
4α2 ∆J0.
A stationary instability occurs along the line
where
k1 =
(cid:104)
Ψ =
(b + d − 4β)
Ω − µ
∆J1 = Ψ∆J0,
−k2 +(cid:112)k2
2 − 4k1k3
(cid:105)2
2k1
+ µ2 (12α2 − 4β2)
(a + c)2
(b + d − 4β)
(a + c)
− 2Ω2 + 2Ωµ
,
,
,
(a + c)
k2 = −8µ2
α
(a + c)
(32)
(33)
k3 = µ2 + Ω2.
For Eq. (2) with the parameters used to generate the phase diagram Fig. 7,
we find that the stationary instability precedes the oscillatory one and that
Ψ ∼ 0.6. This agrees well with the numerically determined stability line near
the co-dimension 2 point in the diagram 7.
Mixed Mode: We can study the mixed mode solutions in Eqs. (27a-27c) by
assuming an ansatz
(H, A, B) = (Heiθ,AeiψA ,Be−iψB ),
(35)
which leads to four coupled equations [see (Appendix B)]. We do not study the
stability of mixed mode solutions in this work.
5.1.2. A simple example
We now turn to a simple example in order to illustrate the two main types
bifurcation scenarios that can arise when small amplitude waves and oscillations
interact in harmonic resonance.
i. Bistability: Here we take the parameters 1. Given these parameter values
one finds, from the analysis above, that the oscillatory uniform state has an
amplitude H = 1 and destabilizes along the line ∆J1 = −1. The standing wave
1µ = −1, ∆J0 = −1, α = −1, a = −1, b = c = d = β = ω = Ω = 0
33
solution (traveling waves are unstable [see Fig. 15] has an amplitude ASW =
√−∆J1 which undergoes a steady bifurcation to the oscillatory uniform state
at ∆J1 = −1/2. Both solutions are therefore stable in the region −1 < ∆J1 <
−1/2. This analysis is borne out by numerical simulation of Eqs. (27a-27c) [see
Fig. 19a]. Solid and dotted lines are the analytical expressions for the stable and
unstable solution branches respectively (red is OU and black is SW). Circles are
from numerical simulation of the amplitude equations (27a-27c).
Note that this scenario is the relevant one for the phase diagram shown in
Fig. 7. That is, we find there is a region of bistability between the OU and SW
solutions, bounded between two lines with slope ∼ 0.6 and 1 respectively.
an amplitude ASW = (cid:112)−∆J1/8 (traveling waves are again unstable) which
ii. Mixed Mode: Here we consider the parameters 2. Given these parameter
values one finds that the oscillatory uniform state has an amplitude H = 1
and destabilizes along the line ∆J1 = −1. The standing waves solution has
undergoes an oscillatory instability at ∆J1 = −2. The mixed-mode solution is
given by
H =
ASW =
4 + ∆J1(2 − cos φ − sin φ)
4 − (2 − cos φ − sin φ)2
∆J1 + (2 − cos φ − sin φ)
8 − 2(2 − cos φ − sin φ)2 ,
,
(36a)
(36b)
1 = ∆J1(1 − 4 cos φ − 2 sin φ + 2 sin φ cos φ) − 4 cos φ + 8 cos φ2. (36c)
It is easy to show that for ∆J1 → −1 the mixed mode amplitudes approach
(H,ASW ) = (1, 0) and the phase φ → 0. The mixed-mode solution thus bi-
furcates continuously from the oscillatory pure mode. Figure 19b shows the
corresponding bifurcation diagram where solid and dotted lines are the ana-
lytical expressions for the solution branches and symbols are from numerical
simulation of Eqs. (27a-27c). As ∆J1 increase from the left we see that the SW
solution indeed undergoes an oscillatory instability at ∆J1 = −2 leading to an
oscillatory mixed-mode solution indicated by small circles (the maximum and
minimum amplitude achieved on each cycle is shown). This oscillatory solution
disappears in a saddle-node bifurcation, giving rise to a steady mixed-mode
solution whose amplitude is given by Eq.(36a- 36c). This steady mixed-mode
solution bifurcates from the pure oscillatory mode at ∆J1 = −1 as predicted.
5.1.3. Summary
The interaction between the oscillatory uniform state and waves may lead to
mixed mode solutions or bistability. The OU state always destabilizes along the
line J1 = J0, irrespective of parameter values or the choice of Φ or J(x). This
result from the weakly nonlinear analysis, agrees with numerical simulations of
2 µ = −1, ∆J0 − 1, α = −1, a = −8, β = 1, b = c = d = ω = Ω = 0
34
Figure 19: Two typical bifurcation diagrams for the case of harmonic resonance between
small-amplitude oscillations and small-amplitude standing waves. A: Here oscillations and
standing waves are bistable for −1 < ∆J1 < −1/2. ∆J0 = −1, α = −1, a = −1, b = c =
d = β = Ω = 0, µ = −1. B: Here the standing wave solution loses stability to an oscillatory
mixed-mode solution at ∆J1 = −2. At ∆J1 ∼ −1.75 a steady mixed-mode solution arises in
a saddle-node bifurcation and continuously approaches the oscillatory pure-mode solution at
∆J1 = −1. Parameters are a = −8, β = 1, α = −1, µ = −1, b = c = d = Ω = 0. The phase φ
of the mixed-mode solution is not shown.
Eq.(2) over the entire range of values of J0 and J1 used in the phase diagram,
Fig. 7 and appears to be exact. Depending on the value of J2, supercritical TW
or supercritical SW will be stable near the codimension 2 point. In the case of
TW, the slope of the stability line is one half the ratio of the cubic coefficient
of waves to that of oscillations. In the small delay limit this expression can be
simplified to
a
2α
∼ π
4
(37)
(cid:16) (Φ
(cid:16) (11π−4)
Φ
20
(cid:48)(cid:48)
(cid:48)(cid:48)(cid:48)
(cid:48) − Φ
)2
2
)2
(cid:48)(cid:48)
(cid:48) − πΦ
(cid:48)(cid:48)(cid:48)
4
(Φ
Φ
(cid:17)
(cid:17) ,
which depends only on shape of the transfer function Φ. For the parameter
values used in the phase diagram Fig. 7 this yields a line with slope close to
one half. Thus TW and OU are expected to be bistable in the wedge between
∆J1 = ∆J0/2 and ∆J1 = ∆J0. In the case of SW, the slope of the stability line
is a complicated function of the shape of Φ and the second Fourier coefficient
J2. For the parameter values used in the phase diagram Fig. 7 the slope is close
to 0.6. Therefore the OU and SW states are bistable in the wedge between
∆J1 = 0.6∆J0 and ∆J1 = ∆J0.
5.1.4. Network simulations
Given that network simulations robustly reveal standing wave patterns, we
would expect to find either mixed-mode SW-OU or bistability between SW and
OU. As we have shown previously, e.g.
[1], there is a region of bistability be-
tween SW and OU in network simulations for strongly modulated inhibitory
connectivity. Here we show additional network simulations that suggest this
bistable region is in the vicinity of the codimension two point, i.e. it is a bista-
bility between the OU and SW states arising via primary bifurcations of the
unpatterned state.
35
-2-1.5-1-0.50∆J100.511.5amplitudeHASW(A)-3-2-10∆J100.20.40.60.81amplitudeHASWHMMAMMMM osc(B)Figure 20: Bistability between SW and OU states in an inhibitory network with pI (r) = 0.4 +
0.2 cos r, where r is the distance between neurons, νext = 4500Hz, and gI = 0.1mS·ms/cm2.
This is, the only network simulation for which an explicit delay has been added of δ = 0.5ms.
Removing the explicit delay for these parameter values eliminates the bistability. Parameter
values are identical for both simulations.
In the simulation shown in the bottom raster a
hyperpolarizing current of Iapp = −5.0µA/cm2 was injected into cells 1-1000 for 30ms at time
t = 400ms, switching the state from OU to SW.
Figure 20 shows two rasters from simulations of a purely inhibitory network
with strongly spatially modulated connectivity. The top raster shows 300 mil-
liseconds of activity in which homogeneous oscillations are clearly observable.
In the bottom raster, the network is started from the precisely the same initial
condition, but a hyperpolarizing input current is applied to neurons 1 to 1000
from t=400 to t=430ms. The network activity clearly switches to a SW state
in response to this input. The SW state persists for as long as simulations were
carried out (10sec). The network thus exhibits bistability between the OU and
SW states.
In order to determine if this region of bistability is related to the codimension
2 point, we adiabatically increased the recurrent excitatory connectivity in the
network, thereby mimicking an increase in J0 in the rate model. This is done
by generating a network of both inhibitory and excitatory neurons with pI (r) =
0.4 + 0.2 cos r and pE = 0.2. The weights of the inhibitory synapses are taken
as gI = 0.1 while excitatory weights are allowed to vary. Specifically, gE = 0
for the first 500ms of the simulation and are then slowly increased according
to gE(t) = 1.0526 · 10−5(t − 500). At the same time we slowly decrease the
external drive in order to maintain mean firing rates. Thus νext = 4500 for
the first 500ms and is then varied according to νext = 4500 − 0.158(t − 500)
thereafter. This particular functional form was determined empirically to keep
the mean firing rates steady. Therefore, for the first 500ms of simulation time
36
Figure 21: Increasing the strength of recurrent excitatory connections drives the system out
of the bistable regime and into a SW state. A: A raster plot of 3 seconds of simulation.
For the first 500ms the simulation is identical to that shown in the top panel of Fig.20.
Thereafter the weights of the recurrent excitatory synaptic are slowly increased while the
external drive is slowly decreased so as to maintain stable mean firing rates. There is a
spontaneous destabilization of the OU state to a SW state around t = 1500ms. B: The
network firing rate for the simulation shown in A (top), the time course of the excitatory
synaptic weights (middle) and external drive (bottom). C: For the first 500ms the simulation
is identical to that shown in the bottom panel of Fig.20, i.e. there is a hyperpolarizing current
injected at time t = 400ms which switches the state from OU to SW. Thereafter the weights of
recurrent excitatory synapses are slowly increased while the external drive is slowly decreased
so as to maintain stable mean firing rates. D: The network firing rate and time courses of the
excitatory synaptic weights and external drive, as in B.
37
the network is equivalent to that shown in Fig. 20 while at later times the
network is no longer purely inhibitory.
Carrying out such an adiabatic increase in the recurrent excitation should
cause the network to cross the line of instability of the OU state, leading to stable
SW. Thus, if we begin simulations in the OU state, they should destabilize at
some point to SW while if we begin in the SW state they should persist. This is
precisely what occurs. Fig.21A shows a raster plot of three seconds of simulation
time begining in the OU state. A transition to the SW occurs around 1500ms.
Fig.21B shows the network firing rate during these three seconds (top) as well
as the time course of the excitatory synaptic weights and external drive (middle
and bottom respectively). Note that the mean firing rate is relatively steady
in the OU state indicating that the co-variation of the synaptic weights and
external drive balance one another. Fig.21C and D analogously show the raster
and firing rate of a simulation in which the network is switched into a SW state
at t = 400ms. Note that the SW state persists over the whole 3 sec. simulation.
5.2. Hopf and Turing bifurcations
(cid:48)
We consider the co-occurrence of two instabilities: a spatially homogeneous
oscillation and a spatially inhomogeneous steady solution. This occurs when the
zeroth spatial Fourier mode of the connectivity satisfies the relation, Eq.(9b) and
the kth spatial Fourier mode satisfies J1 = 1/Φ
, while we assume that all other
Fourier modes are sufficiently below their critical values to avoid additional
instabilities. Without loss of generality we take k = 1 for the Turing instability.
We expand the parameters J0, J1, I and r as in Eqs. (12,13,14), and define
the slow time (15). The linear solution consists of homogeneous, global oscilla-
tions and stationary, spatially periodic bumps with amplitudes which we allow
to vary slowly in time, i.e. r1 = H(T )eiωt + A(T )eix + c.c.. Carrying out a
weakly nonlinear analysis to third order in leads to the coupled amplitude
equations
∂T H = (µ + iΩ)∆J0H + (α + iβ)H2H + (κ + iΛ)A2H,
∂T A = ¯η∆J1A + ΓA2A + σH2A,
(38a)
(38b)
where µ + iΩ, α + iβ, ¯η, Γ, κ + iΛ and σ are given by Eqs. (B.4,B.5,17a,17b,
B.15,B.16), respectively.
5.2.1. Solution types and their stability
Steady state solutions to Eqs. (38a,38b) include pure mode OU, pure mode
SB and mixed mode solutions (OU-SB). We look at the stability of the OU and
SB solutions in turn for the general case and then look specifically at the case
of small delay in Eq.(2). Since the coupling in Eqs. (38a-38b) is only through
the amplitudes we can simplify the equations by taking (H, A) = (Heiθ,Aeiφ)
which yields
H = µ∆J0H + αH3 + κA2H,
(39a)
38
(39b)
Oscillatory Uniform (OU): The uniform oscillations have the form (H∗, 0) where
A = η∆J1A + ΓA3 + σH2A.
(cid:114)
H =
− µ∆J0
α
.
The linear stability of this solution can be calculated with the ansatz
(H,A) = (H∗ + δHeλt, δAeλt),
which yields the two eigenvalues
λH = −2µ∆J0,
µσ
α
λA = η∆J1 +
∆J0.
If we assume a supercritical uniform oscillatory state then the first eigenvalue
is always negative, while the second becomes positive along the line
∆J1 =
µσ
ηα
∆J0,
(41)
indicating the growth of a bump solution.
For Eq.(2) with the parameters used to generate the phase diagram Fig. 7,
we find from Eq.(41) that the OU state destabilizes along the line ∆J1 ∼
−0.026∆J0.
Stationary Bump (SB): The stationary bump solution has the form (0,A∗)
where
(cid:114)
A =
− η∆J1
Γ
.
The linear stability of this solution can be calculated with the ansatz
(H,A) = (δHeλt,A∗ + δAeλt),
which yields the two eigenvalues
λH = µ∆J0 − ηκ
Γ
λA = −2η∆J1.
∆J1,
If we assume a supercritical stationary bump state then the second eigenvalue
is always negative, while the first becomes positive along the line
∆J1 =
µΓ
ηκ
∆J0,
(43)
indicating the growth of uniform oscillations.
39
Figure 22: Typical bifurcation diagrams for the competition between bumps and global oscil-
lations. µ = −1, ∆J0 = −1, α = −1, η = 1, Γ = −1. A: κ = −2, σ = −2. The limit cycle
and bump solutions are bistable in the range 1/2 < ∆J1 < 2. B: A mixed-mode solution is
stable in the range 1/2 < ∆J1 < 2. κ = −0.5, σ = −0.5. Symbols are from simulation of the
amplitude equations Eqs. (39a-39b) while lines are the analytical expressions.
For Eq.(2) with the parameters used to generate the phase diagram 7, we find
from Eq.(43) that the SB state destabilizes along the line ∆J1 ∼ −0.144∆J0.
Mixed Mode (OU-SB): The mixed-mode solution satisfies the following ma-
trix equation
which yields
(cid:18) α κ
(cid:19)
(cid:19)(cid:18) H2
A2
(cid:18) µ∆J0
η∆J1
(cid:19)
,
= −
σ Γ
H2 =
A2 =
−µΓ∆J0 + ηκ∆J1
αΓ − σκ
µσ∆J0 − ηα∆J1
αΓ − σκ
,
.
We do not study the stability of the mixed-mode solution here.
5.2.2. A simple example
We once again illustrate the scenarios of bistability and mixed-mode solu-
tions with a simple example.
√
i. Bistability 3: In this case, the limit cycle has an amplitude H = 1 and
undergoes an instability at ∆J1 = 2. The bump solution has an amplitude
A =
∆J1 and becomes unstable at ∆J1 = 1/2. The oscillatory and bump
solutions are therefore bistable in the range 1/2 < ∆J1 < 2. This is borne out
in numerical simulations of Eqs. (39a-39b) [see Fig. 22A]. Symbols are from nu-
merical simulation (circles:limit cycle, squares:bump), while lines are analytical
solutions.
3 µ = α = Γ = ∆J0 = −1, σ = κ = −2
40
00.511.522.53∆Jk00.511.52amplitude(A)AH00.511.522.53∆Jk00.511.52amplitude(B)AHHMMAMMCodim.-2 bifurcations
Hopf and Turing-Hopf Oscillatory Uniform
Solution types calculated
Hopf and Turing
Travelling Waves
Standing Waves (osc.)
Standing Waves (stat.)
Mixed-Mode
Oscillatory Uniform
Stationary Bump
Mixed-Mode (OU-SB)
Instability boundaries
∆J1 = ∆J0
∆J1 = a/(2α)∆J0
∆J1 = (a + c)/(4α)∆J0
∆J1 = Ψ∆J0
Not calculated
∆J1 = (µσ)/(ηα)∆J0
∆J1 = (µΓ)/(ηκ)∆J0
Not calculated
Table 1: Some existing dynamical states that are present close to the codimension-2 bifurca-
tions, and their corresponding instability boundaries Eqs. (28,29,32,33,41,43), except for the
Mixed Mode solutions.
ii.Mixed-mode 4: In this case, the limit cycle has an amplitude H = 1 and
√
undergoes an instability at ∆J1 = 1/2. The bump solution has an amplitude
A =
∆J1 and becomes unstable at ∆J1 = 2. The mixed-mode solution is sta-
ble in the range 1/2 < ∆J1 < 2 and has amplitudes HMM = 2(cid:112)(1 − ∆J1/2)/3
and A = 2(cid:112)(∆J1 − 1/2)3. The corresponding bifurcation diagram is shown in
Fig. 22B where symbols are from simulation of Eqs. (39a-39b) and lines are the
analytical results.
5.2.3. Summary
The interaction between the SB and OU states can lead to one of two sce-
narios. Either there is a region of bistability between bumps and oscillations,
or there is a mixed-mode solution which, near the codimension-2 point at least,
will consist of bumps whose amplitude oscillates in time, i.e. oscillating bumps
(OB).
In the limit of small D the instability lines for the OU and SB states in the
vicinity of the codimension 2 point are given by the equations
(cid:48)(cid:48)(cid:48)(cid:17)
Φ
(cid:16) (Φ
(cid:16) (11π−4)
(cid:16) (Φ
(cid:16) (Φ
20
(cid:48)(cid:48)
(cid:48) − Φ
(Φ
Φ
)2
Φ
D
Φ
(cid:48)(cid:48)
(cid:48) − Φ
)2
)2
(cid:17) ∆J0,
(cid:17)
(cid:48)(cid:48)
(cid:48) − π Φ
(cid:48)(cid:48)(cid:48)
4
(cid:48)(cid:48)(cid:48)(cid:17)
2 − J2(Φ
(cid:48) − Φ
(cid:48)(cid:48)
)2
(cid:48)
2(1−J2Φ
(cid:48)(cid:48)(cid:48)
)2
(cid:48)(cid:48)
)
∆J1 = −D
∆J1 = − 2
π
(45)
∆J0.
(46)
respectively. The slope of both of the stability lines is proportional to D, indi-
cating that in the small D limit any region of bistability or mixed mode solution
will be limited to a narrow wedge close to the J0 axis. Which scenario will be
(cid:48)
observed (bistability or mixed-mode) depends on the particular choice of Φ
and the value of the second spatial Fourier mode of the connectivity J2. For
4µ = α = Γ = ∆J0 = −1, σ = κ = −1/2
41
Figure 23: A mixed mode (OU/SB) solution in a network of spiking neurons with pE =
0.2 + 0.1 cos r, pI = 0.2, gE = 0.1, gI = 0.28, νext = 2000 and gext = 0.01. See text for
details.
the parameters values used to generate the phase diagram Fig. 7 the slopes
are ∼ −0.026 and ∼ −0.144 for the OU and SB stability lines respectively,
indicating a mixed mode solution.
5.2.4. Network simulations
As shown in [1], oscillating bump solutions can be found in networks of
spiking neurons with Mexican-hat connectivity and strong inhibition. Here we
have identified such oscillating bumps as arising via a bifurcation to mixed-
mode OU and SB in the vicinity of the codimension-two point for homogeneous
oscillations and Turing patterns. Fig.23 shows a sample raster from a numerical
simulatiom simulation. The top panel shows a mixed-mode solution which drifts
in time. The bottom panel is a blow-up of the raster for 500ms< t < 700ms
where the fast oscillations are clearly visible.
6. Conclusions
Our main objective in this paper was to understand in greater detail the
dynamical states which arise in networks of spiking neurons. Specifically, we
are interested in large networks of irregularly spiking neurons for which a re-
duced, phenomenological description in terms of mean firing rates is a reasonable
approximation. This is the case, for example, if the connectivity is sparse and
cross-correlations of the input currents to different cells are therefore weak. The
42
particular form of the rate equation description is motivated by the observation
of emergent fast oscillations in simulations of networks with dominant inhibi-
tion, e.g.
[3]. The origin of these oscillations has been well studied in model
networks and is due to an effective delay in neuronal interactions generated by
the synaptic kinetics and single-cell dynamics [34, 35]. The dynamics of the
mean firing rate of the resulting oscillatory states can be captured by a rate
equation with an explicit time delay [1].
However, the rate equation considered previously did not agree entirely with
network simulations. Specifically, it predicted a large region of traveling wave
solutions while in the network simulations only standing waves were found to be
stable. Our analysis here has shown that given a more realistic transfer function,
i.e. sigmoidal or expansive power-law nonlinearity, the primary inhomogeneous
oscillatory instability given a cosine connectivity will be to standing waves. This
suggests that the standing wave states robustly observed in network simulations
were due to the nonlinearity in the single cell fI curve, and that the rate model
with threshold linear transfer function studied in [1] was not able to capture
this effect.
We predicted further that altering the connectivity could stabilize the trav-
eling wave state. Specifically, more realistic patterns of connectivity, such as
Gaussian, affect the competition between traveling and standing waves through
the second spatial Fourier mode. In the case of delay-driven waves, where the
primary instability occurs only for strong inhibition, we show that the sign of the
second mode will be negative and that in the limit of small delay this will always
lead to traveling waves. This prediction is borne out in network simulations,
see Fig.18.
We furthermore show that the bifuration to homogeneous oscillations is su-
percritical for standard choices of transfer functions, again sigmoidal and ex-
pansive power-law. This agrees with network simulations of conductance-based
neurons we have conducted, and with the amplitude equation derived for a
network of integrate-and-fire neurons [3].
It is more difficult to draw clear-cut conclusions regarding the dynamical
states seen in the vicinity of the two codimension-two points we have studied:
Hopf/Turing-Hopf and Hopf/Turing. In general there will either be a region of
bistability between the two states which bifurcate via primary instabilities in the
vicinity of the codimension-two point, or there will be one or several mixed-mode
solutions.
In network simulations we have shown examples of both: bistable
OU/SW and mixed mode OU/SB. Many more complex dynamical states can
be observed both in the rate model and the network simulations further from
the primary bifurcations. Here we have chosen an analytical approach which is
powerful enough to allow for arbitrary transfer functions and connectivity, but
which is limited to the parameter space in the vicinity of the primary bifurca-
tions. This is a complementary approach to that taken in [1], where a specific
choice of transfer function and connectivity allowed for an analysis of several
nonlinear states, even far from the primary bifurcations.
The approach we have taken in this paper is similar in spirit to that of Curtu
and Ermentrout [33]. In that work, they study an extension of a rate model
43
with adaptation proposed by Hansel and Sompolinsky [32]. As in our work here,
they allow for a generic transfer function and generic connectivity and derive
amplitude equations for the primary Turing and Turing-Hopf bifurcations which
occur. Thus both adaptation and the effective delay in neuronal interactions
can lead to waves. However, the waves in these two cases arise via distinct
physiological mechanisms and can exhibit very different propagation velocities.
In the case of adaptation, waves arise given patterns of synaptic connectivity
which, in the absence of adaptation would lead to the emergence of bump states,
i.e. a Turing instability. These tend to be Mexican-hat like connectivities.
In the presence of adaptation, stationary bump states may destabilize since
the peak of activity is preferentially suppressed compared to activity at the
edge of the bump. As a result the bump begins to move via a symmetry-
breaking bifurcation, generally leading to traveling waves. This only occurs if
the adaptation is significantly strong, i.e. above a critical threshold. In a two-
population model with adaptation studied in [33], the frequency of the waves
was shown to be proportional to the square root of the difference between the
strength of adaptation and a critical value below which no bifurcation is possible.
Thus the resulting waves can be arbitrarily slow depending on the strength of
adaptation.
In the case of rate equations with delay, a Turing-Hopf instability occurs only
for connectivities which are strongly inhibitory locally, i.e. inverted Mexican-hat
connectivities. A transient perturbation which increases the firing rate locally
will, after a delay, strongly self-inhibit while increasing the firing rate of more
distant neurons. The process then repeats, leading to a propagation of activity.
The frequency of such waves is clearly related to the delay, which itself depends
on the synaptic time constants as well as the spike generation currents [34, 35].
Finally, we have tried to emphasize the importance of fixed delays in shap-
ing the dynamics described by Eq.(2) and by extension in networks of spiking
neurons. Nonetheless both fixed and conduction delays are present in neuronal
systems and are roughly of the same order of magnitude in a small patch of
cortex of ∼ 1mm in extent. It remains to be studied how these delays interact
to shape patterns of spontaneous activity.
Appendix A. The network of spiking neurons
In this appendix we describe the network of conductance-based neurons used
in simulations. The single cell model is taken from [43]. The network consists of
two populations of neurons: one excitatory and one inhibitory. The number of
neurons in each population is NE and NI respectively. The membrane voltage of
the ith neuron in the excitatory population evolves according to the differential
equation
Cm Vi = −IN a,i − IK,i − IL,i − Isyn,i + Iapp,i,
where the membrane capacitance Cm = 1µF/cm2 and the applied current Iapp,i
has the units µA/cm2.
44
(cid:16)
(cid:16)
(cid:17)
,
(cid:17)
The leak current is
IL,i = gL(Vi − EL),
where gL = 0.1mS/cm2. Action potential generation is dependent on a sodium
and a potassium current.
The sodium current is
IN a,i = gN am3∞,ihi(Vi − EN a),
where gN a = 35mS/cm2, EN a = 55mV and the activation variable m is as-
sumed fast and therefore taken at its equilibrium value m∞,i = αm,i/(αm,i +
βm,i), where αm,i = −0.1(Vi+35)/(exp(−0.1(Vi+35))−1) and βm,i = 4exp(−(Vi+
60)/18). The inactivation variable hi follows the first order kinetics
hi = φ
αh,i(1 − hi) − βh,ihi
where φ = 5, αh,i = 0.07exp(−(Vi + 58)/20) and βh,i = (exp(−0.1(Vi + 28)) +
1)−1.
The potassium current is
IK,i = gKn4
i (Vi − Ek),
where gK = 9mS/cm2 and EK = −90mV . The activation variable ni follows
the first order kinetics
ni = φ
αn,i(1 − ni) − βn,ini
where φ = 5, αn,i = −0.01(Vi + 34)/(exp(−0.1(Vi + 34)) − 1) and βn,i =
0.125exp(−(Vi + 44)/80).
The synaptic current is
Isyn,i = gEEsE,i(t)(Vi−Esyn,E)+gEI sI,i(t)(Vi−Esyn,I )+gextsext,i(t)(Vi−Esyn,E),
where the reversal potentials for excitatory and inhibitory synapses are Esyn,E =
0 and Esyn,I = −80 respectively. The conductance change from the activation
of recurrent excitatory connections is given by gEEsE,i(t) where
τE,2 sE,i = −sE,i + xE,i,
τE,1 xE,i = −xE,i +
NE(cid:88)
wij
(cid:88)
δ(t − tk
j ),
(A.1)
j=1
k
where the wijs ∈ {0, 1} indicate the presence or absence of a synaptic contact
from cell j to cell i. The double sum in Eq.(A.1) is over all neurons in the
excitatory population and over all spikes, i.e. tk
j is the time of the kth spike
of neuron j which will cause a jump of amplitude 1/τE,1 in the variable xi of
neuron i if wij = 1. The resulting post-synaptic conductance change in cell i
from a single presynaptic spike at time t∗ is given by
(cid:16)
gEEsE,i(t) =
gEE
τE,2 − τE,1
(cid:17)
,
e−(t−t∗)/τE,2 − e−(t−t∗)/τE,1
45
which has units of mS/cm2. The time course is therefore a difference of expo-
nentials with a rise time given by τE,1 and a decay time τE,2. Note that the
time integral of the response sE,i from t = t∗ to t = ∞ has been normalized to
1 and so gEE has units of mS · ms/cm2. The synaptic current from inhibitory
connections is analogous, with time constants τI,1 and τI,2.
Finally, external inputs have the same functional form as the recurrent
excitatory inputs. External presynaptic spikes to excitatory cells are mod-
eled as a Poisson process with rate νE,ext. The Poisson process is indepen-
dent from cell to cell. Unless otherwise noted, all external inputs have weight
gext = 0.0019mS·ms/cm2, and synpatic time constants are taken to be τ1 = 1ms
and τ2 = 3ms.
Inhibitory neurons are modeled analogously to excitatory ones. For this
work, we take all single cell parameters to be identical to the excitatory cells.
Synaptic time constants are taken to be the same, i.e. τE,1 = τI,1 = τ1 and
τE,2 = τI,2 = τ2. In addition we take gEE = gIE = gE and gII = gEI = gI .
Thus excitatory and inhibitory synapses have identical time courses but may
have different strengths.
Appendix A.1. Connectivity
We choose a prescription for choosing wijs which leads to sparse, random
connectivity which is spatially modulated. We do this by defining a probability
for a connection to be made from cell j in population β ∈ {E, I} to a cell i in
population α ∈ {E, I} of the form
pαβ(i, j) = pαβ
0 + pαβ
1 cos r + pαβ
2 cos 2r,
(A.2)
where r is the distance between cells i and j which are situated on a ring ,
normalized such that r ∈ {−π, π}. In order to compare with the rate model we
choose pEE
l where l ∈ {0, 1, 2}.
l = pIE = pE and pII
l = pEI
l = pI
Appendix B. Amplitude Equations
In this Appendix we outline the calculation of the amplitude equations which
describe the slow temporal evolution of the various instabilities near their re-
spective bifurcations.
Appendix B.1. General framework for the weakly nonlinear calculation: Codi-
mension 1 bifurcations
Here we briefly describe the general framework for the weakly nonlinear
calculation for the Turing, Hopf and Turing-Hopf bifurcations. We use the
standard multiple-scales approach which takes advantage of the fact there is a
near-zero eigenvalue in the vicinity of a bifurcation which is responsible for the
slow temporal evolution of the critical eigenmode (see e.g. [44]).
For simplicity we first rewrite Eq.(2) as
,
(B.1)
(cid:16)(cid:104)Jr(cid:105) + I
(cid:17)
r = −r + Φ
46
(cid:82) π
−π dyf (y− x)g(y, t− D). We study the stability of the steady
n=1 Jn cos nx. We
(cid:17)
, where J(x) = J0 + 2(cid:80)∞
(cid:16)
where (cid:104)f g(cid:105) ≡ 1
state solution R = Φ
expand the rates, the connectivity and the input current as
J0R + I
2π
r(x, t) = R + r1(x, t, T ) + r2(x, t, T ) + . . . ,
J(x) = ¯J(x) + 2∆J(x),
I = ¯I + 2∆I,
where the small parameter is defined by the distance from the critical value of
the connectivity, given by Eqs. (9a,9b). Plugging these expansions into Eq.(B.1)
yields
(L + 2L2)(r1 + 2r2 + ...) = 2N2(r1) + 3N3(r1, r2),
where
Lr = ∂tr + r − (cid:104) ¯Jr(cid:105),
L2r = ∂T(cid:104) ¯Jr(cid:105) − (cid:104)∆Jr(cid:105),
N2 =
N3 = Φ
(cid:48)(cid:48)
(cid:104) ¯Jr1(cid:105)2,
Φ
2
(cid:48)(cid:48)(cid:104) ¯Jr1(cid:105)(cid:104) ¯Jr2(cid:105) +
(cid:48)(cid:48)(cid:48)
Φ
6
(cid:104) ¯Jr1(cid:105)3.
We now collect terms by order in . At first order we have
ϑ() : Lr1 = 0.
This equation gives the linear dispersion relation Eq.(7). The values of the
connectivity and input current for which it is satisfied are J(x) = ¯J(x) and
I = ¯I. At second order we obtain
ϑ(2) : Lr2 = N2(r1).
The second order solution r2 is the particular solution of this linear differential
equation. And finally, at third order
ϑ(3) : Lr3 = N3(r1, r2) − L2r1.
At this order secular terms arise which have the same temporal and/or spatial
frequency as the linear solution. In order for the above equation to have a solu-
tion, these terms must therefore be eliminated, yielding the desired amplitude
equation for the instability.
Appendix B.1.1. Steady Bifurcation: ω = 0, k = 0
For completeness we include here the derivation of the amplitude equation
for the transcritical bifurcation.
47
Figure B.24: (Color online) Bifurcation diagram for the steady instability. Open circles:
numerical simulation of Eq.(2). Red Lines: amplitude equation solution from Eq.(B.3). Black
lines: steady-state solution of Eq.(2) using a Newton-Raphson solver. Solid lines indicate
stable solutions and dotted lines unstable ones. Φ(x) =
1+e−βx where α = 1.5 and β = 3.
J(x) = J0 + J1 cos x where J1 = 0. The input current I is varied so as to keep the uniform
stationary solution fixed at R = 0.1.
α
The 0th spatial Fourier mode of the connectivity is given by the critical value
(cid:48) , while we assume that all other Fourier modes are sufficiently below
¯J0 = 1
Φ
their critical values to avoid additional instabilities. We expand
J0 = ¯J0 + ∆J0,
I = ¯I + ∆I,
r = R + r1 + 2r2 + . . . ,
(B.2)
where the small parameter is defined by Eq.(B.2). We define the slow time
T = t. The linear solution is a spatially homogeneous amplitude which we allow
to vary slowly in time, i.e. r1 = A(T ). Carrying out a weakly nonlinear analysis
to second order in leads to the normal form for a transcritical bifurcation given
by
∂T A = η∆J0A + γA2,
(cid:48)
Φ
η =
γ =
¯J 2
0 .
(B.3)
,
1 + D
(cid:48)(cid:48)
Φ
2(1 + D)
48
012345J001RNumericsNewton-RaphsonAmplitude eqs.Appendix B.1.2. Turing bifurcation
ϑ(): The solution to the linear equation is spatially periodic with slowly varying
amplitude A,
r1 = A(T )eix + c.c.
ϑ(2): The nonlinear forcing and resulting second order solution are
(cid:48)(cid:48)
1 (A2e2ix + c.c. + 2A2)/2,
J 2
N2 = Φ
r2 = r22e2ix + c.c. + r20,
r22 =
r20 =
(cid:48)(cid:48)
A2,
(cid:48)
Φ
J 2
1
2(1 − J2Φ
J 2
Φ
1
1 − J0Φ
(cid:48)(cid:48)
)
(cid:48) A2.
ϑ(3): The nonlinear forcing at cubic order is
J1J2A∗r22 + Φ
(cid:48)(cid:48)
N3 = (Φ
J1J0Ar20 + Φ
(cid:48)(cid:48)
(cid:48)(cid:48)(cid:48)
1A2A/2)eix + c.c. + . . .
J 3
Eliminating all terms of periodicity eix at this order yields the amplitude equa-
tion, Eq.(16).
∂T A = η∆J1A + ΓA2A,
with the coefficients
η =
Γ =
,
(cid:32)
(cid:48)
Φ
1 + D
¯J 3
k
1 + D
(cid:48)(cid:48)
)2
J0(Φ
1 − J0Φ
(cid:48) +
J2(Φ(cid:48)(cid:48))2
2(1 − J2Φ
(cid:48)
)
(cid:48)(cid:48)(cid:48)
Φ
2
+
(cid:33)
.
Appendix B.1.3. Hopf bifurcation
ϑ(): The solution to the linear equation is a time periodic function with slowly
varying amplitude H
r1 = H(T )eiωt + c.c.
ϑ(2): The nonlinear forcing and resulting second order solution are
(cid:48)(cid:48)
N2 = Φ
r2 = r22e2iωt + c.c. + r20,
0 (H 2e2iω(t−D) + c.c. + 2H2)/2,
J 2
e−2iωDH 2,
J0e−2iωD)
r22 =
r20 =
(cid:48)(cid:48)
Φ
J 2
0
2(2iω + 1 − Φ
(cid:48)
J 2
(cid:48) H2.
Φ
0
1 − J0Φ
(cid:48)(cid:48)
ϑ(3): The nonlinear forcing at cubic order is
49
N3 = (Φ
(cid:48)(cid:48)(cid:48)
+ Φ
(cid:48)(cid:48)
(cid:48)(cid:48)
0 H∗r22
J 2
J 2
0 Hr20 + Φ
0A2A/2)eiω(t−D) + c.c. + . . .
J 3
Eliminating all terms of periodicity eiωt at this order yields the amplitude equa-
tion, Eq.(18).
∂T H = (µ + iΩ)∆J0H + (α + iβ)H2H,
with the coefficients
µ + iΩ =
α + iβ =
(cid:48)
e−iωD
Φ
1 + D(1 + iω)
e−iωD
1 + D(1 + iω)
(cid:32) ¯J 4
,
×
(cid:48)(cid:48)
)2
0 (Φ
1 − Φ
(cid:48) ¯J0
(cid:48)(cid:48)
¯J 4
0 (Φ
)2e−2iωD
+
2(2iω + 1 − Φ
(cid:48) ¯J0e−2iωD)
(B.4)
(B.5)
(cid:33)
.
(cid:48)(cid:48)(cid:48)
¯J 3
0 Φ
2
+
Appendix B.1.4. Turing-Hopf bifurcation
ϑ(): The solution to the linear equation are two sets of periodic waves, one
left-traveling with slowly varying amplitude A and the other right-traveling
with slowly varying amplitude B
r1 = A(T )eiωt+ix + B(T )e−iωt+ix + c.c.
= A(T )eψ + B(T )eφ + c.c.
ϑ(2): The nonlinear forcing and resulting second order solution are
r2ψ =
rψφ =
rψφ∗ =
r2φ =
r20 =
(cid:48)(cid:48)
Φ
J 2
1
2(2iω + 1 − Φ
(cid:48)
J 2
Φ
1
1 − Φ
(cid:48)
J2
AB,
(cid:48)(cid:48)
(cid:48)(cid:48)
Φ
J 2
1
2iω + 1 − J0Φ
J 2
Φ
1
(cid:48)(cid:48)
(cid:48)
(cid:48)(cid:48)
2(−2iωD + 1 − J2Φ
1 (A2 + B2)
J 2
Φ
1 − J0Φ
.
(cid:48)
e−2iωDA2,
J2e−2iωD)
e−2iωD e−2iωDAB∗,
e2iωDB2,
(cid:48)
e2iωD)
50
(cid:104)
N2 = Φ
(cid:48)(cid:48)
J 2
1
A2e2ψ−2iωD + 2ABeψ+φ + 2AB∗eψ+φ∗−2iωD +
B2e2φ+2iωD + c.c. + 2(A2 + B2)
/2,
r2 = r2ψe2ψ + rψφeψ+φ + rψφ∗ eψ+φ∗
+ r2φe2φ + c.c. + r20,
(cid:105)
ϑ(3): The nonlinear forcing at cubic order is
(cid:48)(cid:48)
N3 = [Φ
(cid:48)(cid:48)(cid:48)
Φ
(cid:48)(cid:48)
[Φ
(cid:48)(cid:48)(cid:48)
Φ
J1(J0Ar20 + J2A∗r2ψ + J0Brψφ∗ + J2B∗rψφ) +
(A2A/2 + B2A)]eψ−iωD +
J1(J0Ar∗
(B2B/2 + A2B)]eφ+iωD + . . .
ψφ∗ + J2A∗rψφ + J0Br20 + J2B∗r2φ) +
Eliminating all terms with dependencies eiψ and eiφ yields the two coupled
amplitude equations (21a,21b):
∂T A = (µ + iΩ)∆J1A + (a + ib)A2A + (c + id)B2A,
∂T B = (µ − iΩ)∆J1B + (a − ib)B2B + (c − id)A2B,
with the coefficients
a + ib =
c + id =
×
×
(cid:48)
(cid:32)
k e−iωD
¯J 3
(cid:48) ¯Jke−iωD
1 + DΦ
(cid:48)(cid:48)
)2
J0(Φ
1 − Φ
+
J0
k e−iωD
¯J 3
(cid:48) ¯Jke−iωD
1 + DΦ
(cid:48)(cid:48)
)2
J0(Φ
1 − Φ
J0
(cid:32)
+
(cid:48)
(cid:48)(cid:48)
)2e−2iωD
J2(Φ
2(2iω + 1 − Φ
(cid:48)
J2e−2iωD)
(cid:48)(cid:48)
)2e−2iωD
J0(Φ
2iω + 1 − Φ
(cid:48)
J0e−2iωD +
(cid:33)
,
(cid:48)(cid:48)(cid:48)
Φ
2
+
(cid:48)(cid:48)
J2(Φ
1 − Φ
(cid:48)
)2
J2
(cid:48)(cid:48)(cid:48)
+ Φ
(B.6)
(cid:33)
.(B.7)
Appendix B.2. Codimension 2 bifurcations
Appendix B.2.1. Double zero eigenvalue: Hopf, Turing-Hopf
ϑ(): The solution to the linear equation are periodic oscillations and traveling
waves
r1 = H(T )eiωt + A(T )eψ + B(T )eφ + c.c.
where we have defined ψ ≡ i(kx + ωt) and φ ≡ i(kx − ωt).
ϑ(2): The nonlinear forcing and resulting second order solution are
51
N2 = Φ
0 (H 2e2iω(t−D) + c.c. + 2H2)/2 + Φ
J 2
(cid:48)(cid:48)
+2AB∗eψ+φ∗−2iωD + B2e2φ+2iωD + c.c. + 2(A2 + B2)]/2
+Φ
J0J1(HAe2iω(t−D)+ix + H∗Be−2iω(t−D)+ix + AH∗eix + HBeix + c.c.),
1 [A2e2ψ−2iωD + 2ABeψ+φ
J 2
(cid:48)(cid:48)
(cid:48)(cid:48)
r2 = r22e2iωt + r2ψe2ψ + rψφeψ+φ + rψφ∗ eψ+φ∗
rBH∗ e−2iωt+ix + rAH∗ eix + rHBeix + c.c. + r20,
+ r2φe2φ + rHAe2iωt+ix +
J1e−2iωD e−2iωDHA,
J1e2iωD e2iωDBH∗,
(cid:48)(cid:48)
Φ
J0J1
2iω + 1 − Φ
(cid:48)(cid:48)
(cid:48)
(cid:48)
(cid:48)(cid:48)
Φ
J0J1
−2iω + 1 − Φ
(cid:48)
AH∗,
Φ
J0J1
1 − Φ
J1
Φ
J0J1
1 − Φ
J1
0H2 + J 2
(cid:48)(cid:48)
(J 2
Φ
HB,
(cid:48)(cid:48)
(cid:48)
rHA =
rBH∗ =
rAH∗ =
rHB =
r20 =
1A2 + J 2
1B2)
.
1 − J0Φ
(cid:48)
(cid:48)(cid:48)
0 (Hr20 + H∗r22) + Φ
J 2
BH∗ + Ar∗
J1(J0Ar20 + J2A∗r2ψ + J0Brψφ∗ + J2B∗rψφ +
ϑ(3): The nonlinear forcing at cubic order is
1 (Ar∗
J 2
HB + B∗rHB) + Φ
(cid:48)(cid:48)
N3 = [Φ
Br∗
(cid:48)(cid:48)
[Φ
J0(HrAH∗ + HrHB + H∗rHA)) + Φ
[Φ
J0(HrBH∗ + H∗rAH∗ + H∗rHB)) + Φ
ψφ∗ + J2A∗rψφ + J0Br20 + J2B∗r2φ] +
J1(J0Ar∗
(cid:48)(cid:48)(cid:48)
(cid:48)(cid:48)(cid:48)
(cid:48)(cid:48)(cid:48)
(cid:48)(cid:48)
AH∗ + A∗rHA + B∗rAH∗ +
0H2H/2]eiω(t−D) +
J 3
(A2A/2 + B2A)]eψ−iωD +
(B2B/2 + A2B)]eφ+iωD + . . .
Eliminating terms with dependencies eiωt, eiψ and eiφ yields the three coupled
amplitude equations (27a-27c):
(cid:104)
H2
2
+ A2 + B2)H + AH∗B∗(cid:105)
,
∂T H = (µ + iΩ)∆J0H + 2(α + iβ)
∂T A = (µ + iΩ)∆J1A + (a + ib)A2A + (c + id)B2A +
(
∂T B = (µ − iΩ)∆J1B + (a − ib)B2B + (c − id)A2B +
(α + iβ)(2H2A + H 2B),
(α − iβ)(2H2B + H∗2A),
where α + iβ, a + ib and c + id are given by Eqs. (B.5, B.6,B.7), respectively.
In the small delay limit (D → 0) we can use the asymptotic values given by
52
Figure B.25: Top: The real part of the cubic coefficient at the codimension-2 point. The solid
line is the full expression, Eq.(B.6) and the dotted line is the asymptotic result in the D → 0
limit, Eq.(B.8). Bottom: The real part of the cross-coupling coefficient at the codimension-2
point. The solid line in the full expression, Eq.(B.7) and the dotted line is the asymptotic
results in the D → 0 limit, Eq.(B.9).
Eqs. (11) to obtain, to leading order,
(cid:32)
(cid:33)
,
− π
2
2 + i)
(DΦ)3
(cid:32)
a + ib = − χ( π
(cid:34)
c + id = − χ
(cid:48)(cid:48)
(DΦ)3
(cid:48)(cid:48)
(Φ
Φ
(cid:48)(cid:48)(cid:48)
)2
(cid:48) − Φ
2
(3π − 2)
(cid:48)(cid:48)
)2
(cid:48)
(Φ
Φ
5
(B.8)
(cid:48)(cid:48)(cid:48)
− πΦ
2
+
(cid:48)(cid:48)
J2(Φ
1 − Φ
(cid:35)(cid:33)
)2
J2
(cid:48)
i
)2
(cid:48)
(Φ
Φ
(6 + π)
5
(cid:48)(cid:48)
− J2(Φ
1 − Φ
(cid:48)
)2
J2
(cid:48)(cid:48)(cid:48)
− Φ
.
(B.9)
where χ ≡ π3/(8 + 2π2) and α + iβ is given by Eq.(19b).
Solutions and their stability
Oscillatory uniform OU:
This solution can be expressed as (H, A, B) = (Heiωt, 0, 0), where
(cid:114)−µ∆J0
(cid:17)
(cid:16)
α
Ω − βµ
α
,
∆J0.
H =
ω =
The stability of this solution can be studied with the ansatz
(H, A, B) = (MHeiωt(1 + δH+eλt + δH∗−eλ∗t), eiωt(δA+eλt + δA∗−eλ∗t),
e−iωt(δB+eλt + δB∗−eλ∗t)),
53
1100100001e+06-a00.20.40.60.81D1100100001e+06-cwhich leads to three pairs of coupled linear equations which determine the six
eigenvalues λ. The first pair is restricted to the linear subspace of the small
amplitude limit cycle and results in the standard stability problem which yields
one stable eigenvalue λ = −µ∆J0 and one zero eigenvalue corresponding to
a shift in the phase of the oscillation. The other two pairs, which span the
subspaces of (δA+, δB+) and (δA−, δB−) respectively, give
(cid:18)
M
−(α − iβ)H2
−(α + iβ)H2
M∗
(cid:19)(cid:18) δA+
(cid:19)
δB+
= 0,
where M = λ − µ∆J1 − 2αH2 + i(Ω(∆J0 − ∆J1) − βH2), and the complex
conjugate matrix spanning (δA−, δB−). Setting the determinant equal to zero
yields the characteristic equation
0 = λ2 − 2λ(∆J1 − 2∆J0)µ + µ2(∆J1 − 4∆J1∆J0 + 3∆J0) +
Ω2(∆J1 − ∆J0)2 − 2
β
α
µΩ∆J0(∆J1 − ∆J0).
We find an oscillatory instability for ∆J1 = 2∆J2 while a steady instability
occurs for ∆J1 = ∆J0. The steady instability therefore always precedes the
oscillatory one.
Traveling waves (TW):
This solution can be expressed as (H, A, B) = (0,AT W eiωt, 0), where
(cid:114)−µ∆J1
(cid:17)
(cid:16)
a
Ω − bµ
a
,
∆J1.
AT W =
ω =
The stability of this solution can be studied with the ansatz
(H, A, B) = (eiωt(δH+eλt + δH∗−eλ∗t),AT W eiωt(1 + δA+eλt + δA∗−eλ∗t),
e−iωt(δB+eλt + δB∗−eλ∗t)),
which results in four coupled linear equations corresponding to the stability
problem for TW in the competition between SW and TW (see section D, Turing-
Hopf Bifurcation). Here we assume that the TW solution is supercritical and
stable. We then turn our attention to the remaining two linear equations which
describe the growth of the oscillatory uniform mode. These equations are un-
coupled and yield the complex conjugate eigenvalues
(cid:16)
(cid:17) ± i
(cid:16)
λ = −µ
∆J1 − ∆J0
2
α
a
Ω(1 − a
2α
) + (b − 2β)
µ
2α
∆J0,
(cid:17)
from which it is easy to see that an instability occurs for ∆J1 = a
instability will generically occur with non-zero frequency.
2α ∆J0. This
54
Standing waves (SW):
This solution can be expressed as (H, A, B) = (0,ASW eiωt,ASW e−iωt),
where ASW and ω are given by Eqs. (30, 31)
(cid:115)−µ∆J1
(cid:16)
(a + c)
Ω − (b + d)
(a + c)
,
(cid:17)
µ
∆J1.
ASW =
ω =
The stability of this solution can be studied with the ansatz
(H, A, B) = (eiωt(δH+eλt + δH∗−eλ∗t),ASW eiωt(1 + δA+eλt + δA∗−eλ∗t),
ASW e−iωt(1 + δB+eλt + δB∗−eλ∗t)).
This ansatz results in four coupled equations for the stability of SW in the
competition between SW and TW. Here we assume that the SW solution is
supercritical and stable. The remaining two equations describe the growth of
the oscillatory uniform mode.
N
−2ASW (α − iβ)
−2ASW (α + iβ)
N∗
(cid:19)
(cid:19)(cid:18) δH+
δH−
where N = λ + iω − (µ + iΩ)∆J0 − 4ASW (α + iβ). Setting the determinant to
zero yields the characteristic equation for the eigenvalues
0 = µ2
∆J0 − 4α∆J1
(a + c)
1 (α2 + β2)
4µ2∆J 2
(a + c)2
+
∆J1
Ω − (b + d)µ
(a + c)
+
4βµ
(a + c)
(cid:105)
− 2µλ
∆J0 − 4α∆J1
(a + c)
+ λ2.
(B.11)
The conditions for oscillatory and steady instabilities
setting λ equal to i¯ω and 0 respectively.
(32,33), are found by
Mixed Mode:
Mixed mode solutions are found by applying the ansatz Eq.(35) to Eqs. (27a-
27c). This gives
H = µ∆J0H + α(H2 + 2A2 + 2B2)H + 2HAB(α cos φ − β sin φ),
A = µ∆J1A + aA3 + cB2A + 2αH2A + H2B(α cos φ + β sin φ),
B = µ∆J1B + aB3 + cA2B + 2αH2B + H2A(α cos φ + β sin φ),
φ = 2Ω(∆J1 − ∆J0) + 2βH2 + (b + d − 4β)(A2 + B2) −
(cid:16)H2B
B + 4AB(cid:17)
H2A
α sin φ
A +
(cid:16)H2B
B − 4AB(cid:17)
H2A
,(B.12)
+ β cos φ
A +
55
(cid:18)
(cid:18)
(cid:104)
(cid:19)2
(cid:16)
(cid:104)
= 0.
(B.10)
(cid:105) − Ω∆J0
(cid:17)2 −
where φ = ψA − ψB − 2θ. One steady state solution of these equations takes
the form (H,A,B, φ) = ( H, A,− A, φ), where
(cid:0) − 2α + α cos φ − β sin φ(cid:1)
−µ∆J0(a + c) − 2µ∆J1
α(a + c) −(cid:2)4α − 2(α cos φ − β sin φ)(cid:3)(cid:2)2α − α cos φ + β sin φ(cid:3) ,(B.13)
α(a + c) −(cid:2)4α − 2(α cos φ − β sin φ)(cid:3)(cid:2)2α − α cos φ + β sin φ(cid:3) ,(B.14)
−µ∆J0(−2α + α cos φ − β sin φ) − µ∆J1α
H2 =
A2 =
and φ is found by plugging Eqs. (B.13,B.14) into Eq.(B.12) and setting the left
hand side equal to zero. We do not study the stability of the mixed-mode state
here.
Appendix B.2.2. Double zero eigenvalue: Turing, Hopf
ϑ(): The solutions to the linear equation are time periodic oscillations and
spatially periodic functions
r1 = H(T )eiωt + A(T )eix + c.c.
ϑ(2): The nonlinear forcing and resulting second order solution are
(cid:48)(cid:48)
N2 =
Φ
2
(cid:48)(cid:48)
Φ
0 (H 2e2iω(t−D) + c.c. + 2H2) +
J 2
J0J1HAeix+iωt + Φ
(cid:48)(cid:48)
J0J1AH∗e−iωt+ix + c.c.,
Φ
2
(cid:48)(cid:48)
1 (A2e2ix + c.c. + 2A2)
J 2
r2 = r2H e2iωt + r2Ae2ix + rAH eiωt+ix + rAH∗ e−iωt+ix + c.c. + r20,
rAH =
rAH∗ =
r20 =
Φ
(cid:48)(cid:48)
iω + 1 − Φ
(cid:48)(cid:48)
J0J1
(cid:48)
Φ
J0J1
−iω + 1 − Φ
(cid:48)
(cid:48)(cid:48)
Φ
0H2 + J 2
(J 2
1 − J0Φ
(cid:48)
e−iωDAH,
J1e−iωD)
J1eiωD eiωDAH∗,
1A2)
.
(cid:104)
(cid:104)
(cid:48)(cid:48)
Φ
N3 =
ϑ(3): The nonlinear forcing at cubic order is
(cid:105)
0 H∗r2H + J 2
1 Ar∗
1A2A/2)
eiωt +
(cid:105)
0 Hr20 + J 2
(J 2
0 J1H2A + J 3
(J 2
(J0J1HrAH∗ + J0J1H∗rAH + J0J1Ar20 + J1J2A∗r2A) +
(cid:48)(cid:48)
0 J1H2A + J 3
(J 2
1 A∗rAH ) +
1A2A/2)
A H + J 2
eix.
Φ
Φ
Φ
(cid:48)(cid:48)(cid:48)
(cid:48)(cid:48)(cid:48)
Eliminating terms with dependencies eiωt, eix yields the two coupled amplitude
equations, Eqs. (38a-38b),
∂T H = (µ + iΩ)∆J0H + (α + iβ)H2H + (κ + iΛ)A2H,
∂T A = ¯η∆J1A + ΓA2A + σH2A,
56
where µ + iΩ, α + iβ, ¯η and Γ are given by Eqs. (B.4, B.5,17a, 17b) respectively,
and
+ 2
(cid:48)(cid:48)
¯J 3
¯J0(Φ
1
iω + 1 − Φ
)2e−iωD
(cid:48) ¯J1e−iωD
+
(B.15)
κ + iΛ =
σ =
(cid:32) ¯J 2
0
¯J 2
k
1 − Φ
(cid:48) ¯J0
1 + DΦ
(cid:48) ¯J0e−iωD
e−iωD
(cid:33)
(cid:32) ¯J 3
0
(cid:48)(cid:48)
¯J1(Φ
)2
1 − Φ
(cid:48) ¯J0
(cid:48)(cid:48)(cid:48) ¯J0 ¯J 2
1
Φ
,
1
1 + DΦ
(cid:48) ¯J1
(cid:16)
+ Φ
(cid:48)(cid:48)(cid:48) ¯J 2
0
¯J1 + ¯J 2
0
¯J 2
1 (Φ
)2 ×
(cid:48)(cid:48)
(cid:17)(cid:33)
eiωD
−iω + 1 − Φ
(cid:48) ¯J1eiωD
+
e−iωD
iω + 1 − Φ
(cid:48) ¯J1e−iωD
.
(B.16)
In the small delay limit (D → 0) we can use the asymptotic values (11) to
obtain, to leading order,
κ + iΛ = −
(π/2 + i)
(1 + π2/4)
(cid:48)
)3
(cid:48)(cid:48)
(Φ
Φ
)2
(cid:48) − Φ
(cid:48)(cid:48)(cid:48)
(cid:32)
(cid:33)
π
2D(Φ
(cid:48)
(cid:32)
η = Φ
+ ϑ(D),
Γ =
1
(cid:48)
(Φ
)3
(cid:48)(cid:48)
)2
− (Φ
(cid:48) +
Φ
(cid:48)(cid:48)(cid:48)
Φ
2
+
σ = −
π2
4D2(Φ
(cid:48)
)3
(cid:48)(cid:48)
(Φ
Φ
)2
(cid:48) − Φ
(cid:48)(cid:48)(cid:48)
(cid:32)
(cid:48)(cid:48)
J2(Φ
)
2(1 − J2Φ
(cid:33)
+ ϑ(1/D),
+ ϑ(1),
(cid:33)
+ ϑ(D),
(cid:48)
)
and µ + iΩ and α + iβ are given by Eqs. (19a,19b) respectively.
References
[1] A. Roxin, N. Brunel and D. Hansel, Phys. Rev. Lett 94, 238103 (2005).
[2] A. Roxin, N. Brunel, D. Hansel, Prog. Theor. Phys. 161, 68 (2006).
[3] N. Brunel, and V. Hakim, Neural Comp. 11, 1621 (1999).
[4] N. Brunel, J. Comput. Neurosci. 8, 183 (2000).
[5] D. J. Amit, and N. Brunel, Cerebral Cortex 7, 237 (1997).
[6] G. B. Ermentrout, Rep. Prog. Phys. 61, 353 (1998).
[7] S. Coombes, Biol. Cybern. 93, 91 (2005).
[8] H. R. Wilson, and J. D. Cowan, Biophys. J. 12, 1 (1972).
57
[9] S. Amari, Biol. Cybern. 27, 77 (1977).
[10] G. B. Ermentrout, Neural Comp. 6, 679 (1994).
[11] O. Shriki, D. Hansel, and H. Sompolinsky, Neural Comput. 15 1809-1841
(2003)
[12] G. B. Ermentrout, and J. B. McLeod, Proc. R. Soc. Edin. 123A, 461
(1993).
[13] D. J. Pinto, and G. B. Ermentrout, SIAM J. Appl. Math. 62, 206 (2001).
[14] D. J. Pinto, and G. B. Ermentrout, SIAM J. Appl. Math. 62, 226 (2001).
[15] C. Holmgren, T. Harkany, B. Svennenfors, and Y. Zilberter, J. Physiol.
551, 139 (2003).
[16] A. Hutt, M. Bestehorn, and T. Wennekers, Network 14, 351 (2003).
[17] S. Coombes, G. J. Lord and M. R. Owen, Physica D 178, 219 (2003).
[18] A. Hutt, Phys Rev. E 70, 052902 (2004).
[19] A. Hutt, and F. M. Atay, Phys. Rev. E 73, 021906 (2006).
[20] F. M. Atay, and A. Hutt, SIAM J. Appl. Math. 65, 644 (2005).
[21] V. K. Jirsa, and H. Haken, Phys. Rev. Lett. 77, 960 (1996)
[22] N. A. Venkov, S. Coombes, and P. C. Matthews, Physica D 232, 1 (2007).
[23] C. R. Laing, and S. Coombes, Network 17, 151 (2005).
[24] S. Coombes, N. A. Venkov, L. Shiau, I. Bojak, D. T. J. Liley, and
C. R. Laing, Phys. Rev. E 76, 051901 (2007).
[25] M. C. Cross, and P. C. Hohenberg, Rev. Mod. Phys. 65, 851 (1993).
[26] F. M. Atay, and A. Hutt, SIAM J. Appl. Dyn. Syst. 5, 670 (2006).
[27] A. Hutt, C. Sutherland, and A. Longtin, Phys. Rev. E 78, 021911 (2008).
[28] J. A. Roberts, and P. A. Robinson, Phys. Rev. E 78, 051901 (2008).
[29] D. Battaglia, N. Brunel, and D. Hansel, Phys. Rev. Lett. 99, 238106 (2007)
[30] S. Coombes, and C. Laing, Philos. Trans. R. Soc. A 367, 1117 (2009).
[31] R. Ben-Yishai, R. Lev Bar-Or, and H. Sompolinsky, Proc. Natl. Acad. Sci.
USA 92, 3844 (1995).
[32] D. Hansel, and H. Sompolinsky, inMethods in Neuronal Modeling, edited
by C. Koch and I. Segev (MIT press, Cambridge, MA, 1998), 2nd ed.
58
[33] R. Curtu and B. Ermentrout, SIAM J. Applied Dynamical Systems. 3, 191
(2004).
[34] N. Brunel and X. J. Wang, J. Neurophysiol. 90, 415 (2003).
[35] C. Geisler, N. Brunel and X. J. Wang, J. Neurophysiol. 94, 4344 (2005).
[36] D. Hansel, and C. van Vreeswijk, J. Neurosci. 22, 5118 (2002).
[37] A. M. Thomson, and C. Lamy, Fontiers in Neuroscience 1, 19 (2007).
[38] E. Kandel, J. H. Schwartz, and T. M. Jessell, Principles of Neural Science
(Mc.Graw Hill, 1991).
[39] P. Girard, J. M. Hup´e, and J. Bullier, J. Neurophysiol. 85,1328 (2001).
[40] G. B. Ermentrout, and J. D. Cowan, SIAM J. on Appl. Math. 38, 1 (1980).
[41] E. K. Miller, and T. W. Troyer, J. Neurophysiol. 87, 653 (2002).
[42] B. Hellwig, Biol. Cyber. 82, 111 (2000).
[43] X.-J. Wang, and G. Buzs´aki, J. Neurosci. 16, 6402 (1996).
[44] M. H. Holmes, Introduction to Perturbation Methods (Springer, New York,
1995).
59
|
1506.06581 | 1 | 1506 | 2015-06-22T12:58:47 | Macroscopic description for networks of spiking neurons | [
"q-bio.NC",
"cond-mat.dis-nn",
"nlin.AO",
"nlin.CD"
] | A major goal of neuroscience, statistical physics and nonlinear dynamics is to understand how brain function arises from the collective dynamics of networks of spiking neurons. This challenge has been chiefly addressed through large-scale numerical simulations. Alternatively, researchers have formulated mean-field theories to gain insight into macroscopic states of large neuronal networks in terms of the collective firing activity of the neurons, or the firing rate. However, these theories have not succeeded in establishing an exact correspondence between the firing rate of the network and the underlying microscopic state of the spiking neurons. This has largely constrained the range of applicability of such macroscopic descriptions, particularly when trying to describe neuronal synchronization. Here we provide the derivation of a set of exact macroscopic equations for a network of spiking neurons. Our results reveal that the spike generation mechanism of individual neurons introduces an effective coupling between two biophysically relevant macroscopic quantities, the firing rate and the mean membrane potential, which together govern the evolution of the neuronal network. The resulting equations exactly describe all possible macroscopic dynamical states of the network, including states of synchronous spiking activity. Finally we show that the firing rate description is related, via a conformal map, with a low-dimensional description in terms of the Kuramoto order parameter, called Ott-Antonsen theory. We anticipate our results will be an important tool in investigating how large networks of spiking neurons self-organize in time to process and encode information in the brain. | q-bio.NC | q-bio | Macroscopic description for networks of spiking neurons
Ernest Montbri´o,1 Diego Paz´o,2 and Alex Roxin3
1Center for Brain and Cognition. Department of Information and
Communication Technologies, Universitat Pompeu Fabra, 08018 Barcelona, Spain
2Instituto de F´ısica de Cantabria (IFCA), CSIC-Universidad de Cantabria, 39005 Santander, Spain
3Centre de Recerca Matem`atica, Campus de Bellaterra, 08193 Bellaterra (Barcelona), Spain.
5
1
0
2
n
u
J
2
2
]
.
C
N
o
i
b
-
q
[
1
v
1
8
5
6
0
.
6
0
5
1
:
v
i
X
r
a
(Dated: September 10, 2018)
A major goal of neuroscience, statistical physics and nonlinear dynamics is to understand how brain function
arises from the collective dynamics of networks of spiking neurons. This challenge has been chiefly addressed
through large-scale numerical simulations. Alternatively, researchers have formulated mean-field theories to
gain insight into macroscopic states of large neuronal networks in terms of the collective firing activity of the
neurons, or the firing rate. However, these theories have not succeeded in establishing an exact correspondence
between the firing rate of the network and the underlying microscopic state of the spiking neurons. This has
largely constrained the range of applicability of such macroscopic descriptions, particularly when trying to de-
scribe neuronal synchronization. Here we provide the derivation of a set of exact macroscopic equations for
a network of spiking neurons. Our results reveal that the spike generation mechanism of individual neurons
introduces an effective coupling between two biophysically relevant macroscopic quantities, the firing rate and
the mean membrane potential, which together govern the evolution of the neuronal network. The resulting equa-
tions exactly describe all possible macroscopic dynamical states of the network, including states of synchronous
spiking activity. Finally we show that the firing rate description is related, via a conformal map, with a low-
dimensional description in terms of the Kuramoto order parameter, called Ott-Antonsen theory. We anticipate
our results will be an important tool in investigating how large networks of spiking neurons self-organize in time
to process and encode information in the brain.
PACS numbers: 87.19.lj 05.45.Xt 87.10.-Ed 05.65.+b
Processing and coding of information in the brain necessar-
ily imply the coordinated activity of large ensembles of neu-
rons. Within sensory regions of the cortex, many cells show
similar responses to a given stimulus, indicating a high de-
gree of neuronal redundancy at the local level. This suggests
that information is encoded in the population response and
hence can be captured via macroscopic measures of the net-
work activity [1]. Moreover, the collective behavior of large
neuronal networks is particularly relevant given that current
brain measurement techniques, such as electroencephalogra-
phy (EEG) or functional magnetic resonance imaging (fMRI),
provide data which is necessarily averaged over the activity of
a large number of neurons.
The macroscopic dynamics of neuronal ensembles has been
extensively studied through computational models of large
networks of recurrently coupled spiking neurons, including
Hodgkin-Huxley-type conductance-based neurons [2] as well
as simplified neuron models, see e.g. [3 -- 5]. In parallel, re-
searchers have sought to develop statistical descriptions of
neuronal networks, mainly in terms of a macroscopic observ-
able that measures the mean rate at which neurons emit spikes,
the firing rate [6 -- 22]. These descriptions, called firing-rate
equations (FREs), have been proven to be extremely useful
in understanding general computational principles underlying
functions such as memory [23, 24], visual processing [25 -- 27],
motor control [28] or decision making [29].
Despite these efforts, to date there is no exact theory link-
ing the dynamics of a large network of spiking neurons with
that of the firing rate. Specifically, current macroscopic de-
scriptions do not offer a precise correspondence between the
microscopic dynamics of the individual neurons, e.g. individ-
ual membrane potentials, and the firing rate dynamics of the
neuronal network.
Indeed, FREs are generally derived through heuristic ar-
guments which rely on the underlying spiking activity of the
neurons being asynchronous and hence uncorrelated. As such,
firing rate descriptions are not sufficient to describe network
states involving some degree of spike synchronization. Syn-
chronization is, however, an ubiquitous phenomenon in the
brain, and its potential role in neuronal computation is the
subject of intense research [14, 30 -- 36]. Hence, the lack of
firing rate descriptions for synchronous states limits the range
of applicability of mean-field theories to investigate neuronal
dynamics.
Here we propose a method to derive the FREs for networks
of heterogeneous, all-to-all coupled quadratic integrate-and-
fire (QIF) neurons, which is exact in the thermodynamic limit,
i.e. for large numbers of neurons. We consider an ansatz for
the distribution of the neurons' membrane potentials that we
denominate the Lorentzian ansatz (LA). The LA solves the
corresponding continuity equation exactly, making the system
amenable to theoretical analysis. Specifically, for particular
distributions of the heterogeneity, the LA yields a system of
two ordinary differential equations for the firing rate and mean
membrane potential of the neuronal population. These equa-
tions fully describe the macroscopic states of the network --
including synchronized states -- , and represent the first exam-
ple of an exact firing-rate description for a network of recur-
rently connected spiking neurons. We finally show how the
LA transforms, via a conformal mapping, into the so-called
Ott-Antonsen ansatz (OA) that is extensively used to inves-
tigate the low-dimensional dynamics of large populations of
phase oscillators in terms of the Kuramoto order parameter
[37].
I. MODEL DESCRIPTION
Hodgkin-Huxley-type neuronal models can be broadly
classified into two classes, according to the nature of their
transition to spiking in response to an injected current [38, 39].
Neuronal models with so-called Class I excitability, generate
action potentials with arbitrarily low frequency, depending on
the strength of the applied current. This occurs when a resting
state disappears through a saddle-node bifurcation. In con-
trast, in neurons with Class II excitability the action potentials
are generated with a finite frequency. This occurs when the
resting state loses stability via a Hopf bifurcation. The QIF
neuron is the canonical model for Class I neurons, and thus
generically describes their dynamics near the spiking thresh-
old [5, 40, 41]. Our aim here is to derive the FREs correspond-
ing to a heterogeneous all-to-all coupled population of N QIF
neurons. The correspondence is exact in the thermodynamic
limit, i.e. when N → ∞ (this convergence has been recently
studied in [42]).
The microscopic state of the population of QIF neurons is
given by the membrane potentials {Vj}j=1,...,N , which obey
the following ordinary differential equations [5]:
Vj = V 2
j + Ij ,
if Vj ≥ Vp, then Vj ← Vr.
(1)
Here the overdot denotes the time derivative, and Ij represents
an input current. Each time a neuron's membrane potential Vj
reaches the peak value Vp, the neuron emits a spike and its
voltage is reset to the value Vr. In our analysis we consider
the limit Vp = −Vr → ∞. This resetting rule captures the
spike reset as well as the refractoriness of the neuron. Without
loss of generality we have rescaled the time and the voltage in
(1) to absorb any coefficients which would have appeared in
the first two terms. The form for the input currents is:
Ij = ηj + Js(t) + I(t),
(2)
where the external input has a heterogeneous, quenched com-
ponent ηj as well as a common time-varying component I(t),
and the recurrent input is the synaptic weight J times the mean
synaptic activation s(t), which is written:
s(t) =
1
N
N
j <tZ t
Xj=1 Xk\tk
dt′aτ (t − t′)δ(t′ − tk
j ).
(3)
−∞
Here, tk
j is the time of the kth spike of jth neuron, δ(t) is the
Dirac delta function, and aτ (t) is the normalized synaptic ac-
tivation caused by a single pre-synaptic spike with time scale
τ, e.g. aτ (t) = e−t/τ /τ.
A. Continuous formulation
In the thermodynamic limit N → ∞, we drop the indices
in Eqs. (1), (2) and denote ρ(V η, t)dV as the fraction of neu-
rons with membrane potentials between V and V + dV , and
parameter η at time t. Accordingly, parameter η becomes now
2
a continuous random variable distributed according to a prob-
ability distribution function g(η). The total voltage density at
time t is then given byR ∞
lowing continuity equation:
The conservation of the number of neurons leads to the fol-
−∞ ρ(V η, t) g(η) dη.
∂tρ + ∂V (cid:2)(V 2 + η + Js + I)ρ(cid:3) = 0,
where we have explicitly included the velocity given by (1)
and (2).
(4)
II. RESULTS
The continuity equation (4) without
temporal forcing
I(t) = 0 has a trivial stationary solution. For each value
of η, this solution has the form of a Lorentzian function:
ρ0(V η) ∝ (V 2 + η + Js)−1. Physically, the Lorentzian den-
sity means that firing neurons with the same η value will be
scattered with a density inversely proportional to their speed
(1), i.e. they will accumulate at slow places and thin out at
fast places on the V axis. In addition, for those η values cor-
responding to quiescent neurons, the density ρ0 collapses at
the rest state in the form of a Dirac delta function.
Next we assume that, independently of the initial condition,
solutions of (4) generically converge to a Lorentzian-shaped
function, so that all relevant dynamics occur inside that lower
dimensional space. This fact is mathematically expressed by
the following Lorentzian Ansatz (LA) for the conditional den-
sity functions:
ρ(V η, t) =
1
π
x(η, t)
[V − y(η, t)]2 + x(η, t)2
,
(5)
which is a Lorentzian function with time-dependent half-
width x(η, t) and center at y(η, t). In the following we as-
sume that the LA (5) completely describes the macroscopic
dynamics of the network of QIF neurons and postpone the
mathematical justification of its validity to Sec. II E.
A. Macroscopic observables: Firing rate and mean membrane
potential
The half-width x(η, t) of the LA has a particularly simple
relation with the firing rate of the neuronal population (i.e. the
number of spikes per unit time). Indeed, the firing rate for
each η value at time t, r(η, t), can be computed by noting that
neurons fire at a rate given by the probability flux at infinity:
r(η, t) = ρ(V → ∞η, t) V (V → ∞η, t). The limit V → ∞
on the right hand side of this equation can be evaluated within
the LA, and gives the simple identity
x(η, t) = πr(η, t).
The (total) firing rate r(t) is then
r(t) =
1
π Z ∞
−∞
x(η, t)g(η)dη.
(6)
(7)
3
(a)
20
2
/
1
∆
/
J
10
Bistability
Stable
focus
Stable node
(b)
(c)
1
2
/
1
∆
/
r
0
-10
0
2
/
1
∆
/
v
0
-10
-5
η/∆
0
-3
-10
-5
-5
η/∆
(d)
(▲
)
1
0
-1
2
/
1
∆
/
v
-2
0
0
0
0,5
1
r/∆1/2
1,5
2
FIG. 1. (color online). Analysis of the steady states of FREs (12). (a) Phase diagram: In the wedge-shaped cyan-shaded region there is
bistability between a high and a low activity state. The boundary of the bistability region is the locus of a saddle-node bifurcation which is
exactly obtained in parametric form: (¯η, J)SN = [−π2r2 − 3∆2/(2πr)2, 2π2r + ∆2/(2π2r3)]. To the right of the dashed line, defined by
¯ηf = −[J/(2π)]2 − (π∆/J)2, there is a stable focus (shaded regions). (b) r-¯η and (c) v-¯η bifurcation diagrams for J/∆1/2 = 15. Square
symbols: Results obtained from numerical simulations of QIF neurons (see Appendix A for details). (d) Phase portrait of the system in the
bistable region (¯η/∆ = −5, J/∆1/2 = 15, triangle in panel (a)) with three fixed points: a stable focus (with its basin of attraction shaded), a
stable node, and a saddle point.
Additionally, the quantity y(η, t) is, for each value of η, the
mean of the membrane potential:
ρ(V η, t)V dV.
−∞
y(η, t) = P.V.Z ∞
−∞ f (x)dx = limR→∞R R
Here we take the Cauchy principal value, defined as
−R f (x)dx, to avoid the oth-
erwise ill-defined integral. The mean membrane potential is
then
P.V.R ∞
(8)
v(t) =Z ∞
−∞
y(η, t)g(η)dη.
(9)
B. Firing-rate equations
Substituting the LA (5) into the continuity equation (4), we
find that, for each value of η, variables x and y must obey two
coupled equations which can be written in complex form as
(10)
∂tw(η, t) = i(cid:2)η + Js(t) − w(η, t)2 + I(t)(cid:3) .
where w(η, t) ≡ x(η, t) + iy(η, t). Closing this equation re-
quires expressing the mean synaptic activation s(t) as a func-
tion of w(η, t). The simplest choice is to take the limit of in-
finitely fast synapses, τ → 0 in (3), so that we get an equality
with the firing rate: s(t) = r(t). This allows for the system of
QIF neurons (1)-(3) to be exactly described by Eqs. (10) and
(7); an infinite set of integro-differential equations if g(η) is a
continuous distribution.
Equation (10) is useful for general distributions g(η) (see
Appendix B), but a particularly sharp reduction in dimension-
ality is achieved if η is distributed according to a Lorentzian
distribution of half-width ∆ centered at ¯η:
g(η) =
1
π
∆
(η − ¯η)2 + ∆2 .
(11)
Note that this distribution accounts for the quenched variabil-
ity in the external inputs. The fact that it is Lorentzian is
unrelated to the LA for the density of membrane potentials.
Assuming (11) the integrals in (7) and (9) can be evaluated
closing the integral contour in the complex η-plane and using
the residue theorem[43]. Notably, the firing rate and the mean
membrane potential depend only on the value of w at the pole
of g(η) in the lower half η-plane:
πr(t) + iv(t) = w(¯η − i∆, t).
As a result, we only need to evaluate (10) at η = ¯η − i∆, and
thereby obtain a system of FREs composed of two ordinary
differential equations
r = ∆/π + 2rv,
v = v2 + ¯η + Jr + I(t) − π2r2.
(12a)
(12b)
This nonlinear system describes the macroscopic dynamics of
the population of QIF neurons in terms of the population firing
rate r and mean membrane potential v.
It is enlightening to compare mean-field model (12) with
the equations of the spiking neurons. Note that Eq. (12b) re-
sembles equations (1) and (2) for the individual QIF neuron,
but without spike resetting. Indeed, the macroscopic firing-
rate variable r enters as a negative feedback term in Eq. (12b),
and impedes the explosive growth of the mean membrane po-
tential v.
This negative feedback, combined with the coupling term
on the right hand side of (12a), describe the effective interac-
tion between the firing rate and mean membrane potential at
the network level. Therefore, the FREs (12) describe the ef-
fect of the single-cell spike generation and reset mechanism at
the network level.
In the following we examine the dynamics described by
Eq. (12), and show that they fully reproduce the macro-
scopic dynamics of the network of QIF neurons, even during
episodes of strong spike synchrony.
4
(a)
3
r
0
2
0
(c)
v
(e)
-2
0
0
3
x
e
d
n
i
n
o
r
u
e
N
0
(g)
)
t
(
I
3
0
-10
(b)
3
0
2
0
-2
0
0
3
(d)
(f)
(h)
0
3
0
-3
-10
0
10
time
20
30
40
0
10
20
30
time
40
50
60
70
80
FIG. 2. (color online). The transient dynamics of an ensemble of QIF model neurons (1)-(2) are exactly described by the FREs (12). The
instantaneous firing rate (Panels a,b) and mean membrane potential (Panels c,d) of the QIF neurons and the FREs are depicted in black and
orange, respectively. Panels (e,f) show the raster plots of 300 randomly selected QIF neurons of the N = 104 in the ensemble. Left Panels
(a,c,e,g): At time t = 0, a current I = 3 is applied to all neurons, and set to zero again at t = 30; stimulus I(t) shown in panel (g). Right
panels (b,d,f,h): At time t = 0 a sinusoidal current is applied to all neurons I(t) = I0 sin(ωt), with I0 = 3, ω = π/20; stimulus I(t) shown
in panel (h). Parameters: J = 15, ¯η = −5, ∆ = 1.
C. Analysis of the firing-rate equations
To begin with the analysis of Eq. (12), we first note that in
the absence of forcing, I(t) = 0, the only attractors of (12) are
fixed points. Figure 1(a) shows a phase diagram of the system
as a function of the mean external drive ¯η and synaptic weight
J, both normalized by the width of the input distribution [44].
There are three qualitatively distinct regions of the phase dia-
gram: 1 - A single stable node corresponding to a low-activity
state (white), 2 - A single stable focus (spiral) generally cor-
responding to a high-activity state (gray), and 3 - A region of
bistability between low and high firing rate (cyan; see a phase
portrait of this region in Fig. 1(d)). Comparison of a sample
bifurcation diagram of the fixed points from numerical simu-
lation of networks of QIF neurons with that obtained from the
FREs (12) shows an excellent correspondence, see Fig. 1(b,c).
A similar phase diagram can be readily reproduced by tra-
ditional heuristic firing-rate models, with one significant qual-
itative difference: the presence of a stable focus -- and hence
damped oscillations. Specifically, in the gray region of the
phase diagram in Fig. 1(a), the system undergoes oscillatory
decay to the stable fixed point. This oscillatory decay occurs
as well for the high-activity state over a large extent of the
region of bistability (cyan), see e.g. Fig. 1(d).
The presence of damped oscillations at the macroscopic
level reflects the transitory synchronous firing of a fraction
of the neurons in the ensemble. This behavior is common in
spiking neuron models with weak noise, and is not captured
by traditional firing rate models (see e.g. [22]).
D. Analysis of the firing-rate equations: Non-stationary inputs
stimuli (up to finite-size effects), we consider two types of
stimulus I(t): 1 - a step function and 2 - a sinusoidal forcing.
In both cases we simulate the full system of QIF neurons and
the FREs (12).
Figure 2 shows the system's response to the two different
In both cases the system is initially (t < 0) in a
inputs.
bistable regime and set in the low activity state, with parame-
ters corresponding to those of Fig. 1(d). Left panels of Fig. 2
show the response of the system to a step current, applied at
t = 0. The applied current is such that the system abandons
the bistable region -- see Fig. 1(a) -- and approaches the high
activity state, which is a stable focus. This is clearly reflected
in the time series r(t), v(t), where the rate equations (12) ex-
actly predict the damped oscillations exhibited by the mean-
field of the QIF neurons. The raster plot in panel (e) shows
the presence of the oscillations, which is due to the transitory
synchronous firing of a large fraction of neurons in the popula-
tion. Finally, at t = 30, the current is removed and the system
converges -- again, showing damped oscillations -- to the new
location of the (focus) fixed point, which clearly coexists with
the stable node where it was originally placed (t < 0).
The right hand panels of Fig. 2 show the response of the
model to a periodic current, which drives the system from one
side of the bistable region to the other. As a result, we observe
periodic bursting behavior when the system visits the stable
focus region of the phase diagram Fig. 1(a).
To further illustrate the potential of the FREs (12) to pre-
dict and investigate complex dynamics in ensembles of spik-
ing neurons, we present here a simple situation where the sys-
tem of QIF neurons exhibits macroscopic chaos. This is ob-
served by increasing the frequency ω of the sinusoidal driving,
so that the system cannot trivially follow the stable fixed point
at each cycle of the applied current.
To show that the FREs (12) fully describe the macroscopic
response of the population of QIF neurons to time-varying
Figure 3(a) shows a phase diagram obtained using Eq. (12).
The shaded regions indicate parameter values where the rate
(b)
2
v
0
-2
2
(c)
v
0
-2
-2
0
η
r
1
r
2
(a)
20
16
12
J
8
-4
2
(d)
r
1
(e)
0
0
0
3
x
e
d
n
i
n
o
r
u
e
N
0
(f)
0
0
3
x
e
d
n
i
n
o
r
u
e
n
d
e
r
e
d
r
O
0
0
10
20
30
time
40
50
60
FIG. 3. (color online). Firing rate model predicts the existence of
macroscopic chaos in a ensemble QIF neurons (1) with an injected
periodic current I(t) = I0 sin(ωt). (a) Phase diagram with the re-
gions where chaos is found, obtained using the rate model (12). In the
black-shaded region, there is only one chaotic attractor, whereas in
the cyan region the chaotic attractor coexists with a periodic attractor.
Dotted lines correspond to the bistability boundary of Fig. 1(a), de-
picted to facilitate comparison. (b) Chaotic trajectory obtained sim-
ulating the FREs (12); the Lyapunov exponent is λ = 0.183 . . .. (c)
Chaotic trajectory obtained from the QIF neurons -- parameters cor-
responding to the (yellow) triangle symbol in panel (a).
(d) Time
series for the rate model (orange) and QIF model (black). (e) Raster
plot corresponding to 300 randomly selected neurons. (f) Same raster
plot as in (e), ordering neurons according to their intrinsic current ηk.
Parameters: I0 = 3, ω = π; and ¯η = −2.5, J = 10.5 (triangle sym-
bol in (a)).
model has either a single chaotic attractor (in black) or a
chaotic attractor coexisting with a periodic orbit (in cyan). A
trajectory on the chaotic attractor is depicted in Fig. 3(b), and
the clearly irregular time series of the firing rate is shown in
orange in Fig. 3(d). Using the same parameters we performed
numerical simulations of the QIF neurons (1)-(2), finding a
similar attractor and irregular dynamics as in the rate model,
see Figs. 3(c) and (d). To obtain the time series shown in
Figs. 3(d), we ran the QIF neurons numerically and, after a
long transient, at time t = 0, the rate model (12) was initiated
with the values of r and v obtained from the population of
QIF neurons. The time series of the two systems, which are
initially close, rapidly diverge reflecting the chaotic nature of
5
the system.
Finally, to illustrate this chaotic state at the microscopic
level, Fig. 3(e) shows the raster plot for 300 randomly chosen
neurons, corresponding to the time series in Fig. 3(d). The
irregular firing of neurons in Fig. 3(e) has some underlying
structure that may be visualized ordering the same set of neu-
rons according to their intrinsic currents as ηk < ηk+1, with
k ∈ [1, 300], see Fig. 3(f). Clearly, the maxima of the firing
rate coincide with the synchronous firings of clusters of neu-
rons with similar η values. The size of these clusters is highly
irregular in time, in concomitance with the chaotic behavior.
E. Validity of the Lorentzian ansatz
Thus far, we have shown that the LA (5) solves the conti-
nuity equation (4), and confirmed that these solutions agree
with the numerical simulations of the original system of QIF
neurons (1)-(2). Here we further clarify why the LA holds for
ensembles of QIF neurons.
Transforming the voltage of the QIF neuron into a phase via
Vj = tan(θj/2), the system (1)-(2) becomes an ensemble of
'theta neurons' [40]:
θj = (1 − cos θj) + (1 + cos θj)[ηj + Js(t) + I(t)].
In the new phase variable θ ∈ [0, 2π), the LA (5) becomes:
(13)
ρ(θη, t) =
1
2π
Re(cid:20) 1 + α(η, t)eiθ
1 − α(η, t)eiθ(cid:21) ,
(14)
(15)
where the function α(η, t) is related with w(η, t) as
α(η, t) =
1 − w(η, t)
1 + w(η, t)
.
Equations (5) and (14) are two representations of the so-
called Poisson kernel on the half-plane and on the unit disk,
respectively. These representations are related via equation
(15), that establishes a conformal mapping from the half-plane
Re(w) ≥ 0 onto the unit disk α ≤ 1. In the next section we
show that variables r and v can be related, via the same con-
formal map, with the Kuramoto order parameter, which is a
macroscopic measure of phase coherence [45, 46].
The key observation supporting the applicability of the LA
is the fact that equation (14) turns out to be the ansatz dis-
covered in 2008 by Ott and Antonsen [37]. According to the
Ott-Antonsen (OA) theory, in the thermodynamic limit the dy-
namics of the class of systems
(16)
∂tθ(η, t) = Ω(η, t) + Im(cid:2)H(η, t)e−iθ(cid:3) ,
generally converges to the OA manifold (14). In our case, for
equation (13), we have Ω(η, t) = 1+η+Js+I and H(η, t) =
i(−1 + η + Js + I). Thus far, the convergence of (16) to
the OA manifold has been proven only for H(η, t) = H(t).
This includes the well-known Kuramoto and Winfree models
[47, 48], but not system (13). However, there are theoretical
arguments [49] that strongly suggest that the OA manifold is
also attracting for η-dependent H, as numerically confirmed
by a number of recent papers using theta neurons [50 -- 52] and
other phase-oscillator models [53 -- 57].
6
We would like to emphasize that the derivation of the FREs
does not rely on assumptions of weak coupling, separation of
time-scales, averaging, or any other approximation. Rather,
the assumptions underlying the validity of equation (12) are
that i) the QIF neurons be all-to-all connected, ii) heterogene-
ity be quenched, and iii) inputs be distributed according to a
Lorentzian distribution.
The last two assumptions may seem particularly restric-
tive. Concerning (iii), it must be stressed that for arbitrary
distributions of quenched heterogeneity the LA (5) remains
generally valid, and therefore equation (10) can be used to
discern the stability of the network states (see Appendix C).
Furthermore, in Appendix C we also show numerical simu-
lations using uniform- and Gaussian-distributed inputs, that
reveal very similar macroscopic dynamics in response to time
varying inputs. Even relaxing assumption (ii), numerical sim-
ulations with identical QIF neurons driven by external inde-
pendent Gaussian noise sources show qualitative agreement
with the FREs (12) (see Appendix D). In sum, the choice of
a quenched Lorentzian distribution g(η) is thus a mere math-
ematical convenience, whereas the insights gained from the
resulting firing-rate description are valid more generally.
Our derivation represents a sharp departure from, and a ma-
jor advance compared to previous studies in several regards.
Firstly, in the past it has only been possible to calculate the
approximate firing rate of networks of spiking neurons for
stationary states, or for weak deviations of such states [9 --
12, 15, 20, 22]. The equations which result from these deriva-
tions are difficult to solve, and typically require special nu-
merical methods. In contrast, FREs (12) can be easily ana-
lyzed and simulated, and exactly reproduce the behavior of the
spiking network far from any fixed point and for arbitrary ex-
ternal currents. Secondly, firing-rate descriptions traditionally
assume that the activity of a population of neurons is equiva-
lent to a set of uncorrelated stochastic processes with a given
rate, see e.g. [13, 14]. However, in simulations of spiking net-
works it is well known that the response of the network to
non-stationary inputs generally involves some degree of spike
synchrony. Recent theoretical work has sought to improve
on classical rate models, which act as a low-pass filter of in-
puts, by fitting them with linear filters extracted from the cor-
responding Fokker-Planck equation for the network [20, 22].
These filters tend to generate damped oscillations when the
external noise level is not too high, reflecting the presence of
spike synchrony [15, 22]. The FREs (12) also capture this
phenomenon, and reveal that the underlying mechanism is an
interplay between firing rate and subthreshold voltage. Fur-
thermore, because these equations are exact, we can explore
the full nonlinear response of the network, such as the gen-
eration of chaotic states of synchronous bursting as shown in
Fig. 3.
Recently it has been shown that, not only Kuramoto-like
models, but a much wider class of phase-models, evolve in
the OA manifold defined by (14). Specifically, networks of
pulse-coupled oscillators [48] and theta-neurons [50 -- 52] al-
low for an exact, low-dimensional description in terms of the
Kuramoto order parameter (17). Although these later works
use a finite-width phase coupling function that differs from the
FIG. 4. (color online). The conformal map (18) transforms the right
half-plane onto the unit disk. This transformation and its inverse
define a one-to-one mapping between the Kuramoto order parameter
Z and the macroscopic quantities of the population of QIF neurons:
r: firing rate, and v: mean membrane potential. Note that in the limit
Z = eiΨ (full coherence, ρ(θ) = δ(θ − Ψ)) we recover v = i(1 −
eiΨ)/(1+eiΨ) = tan(Ψ/2), as the original mapping V = tan(θ/2)
between QIF- and theta-neurons dictates.
F. Firing rate and Kuramoto order parameter
There exists a mapping between the macroscopic variables
r and v and the so-called Kuramoto order parameter Z. Equa-
tion (15) relates, for each value of η, the firing rate and the
mean membrane potential, both contained in w, with the uni-
formity of the phase density, measured by α -- note that α = 0
in (14) yields a perfectly uniform density. The Kuramoto or-
der parameter is obtained by integrating α over the whole pop-
ulation as
−∞
Z(t) =Z ∞
=Z ∞
−∞
g(η)Z 2π
0
ρ(θη, t)eiθdθ dη
g(η)α∗(η, t) dη,
(17)
where we assumed that the density ρ is the OA ansatz Eq. (14).
The quantity Z can be seen as the center of mass of a popula-
tion of phases distributed across the unit circle eiθ.
For a Lorentzian distribution of currents, g(η), we may de-
rive the exact formula (see Appendix B)
Z =
1 − W ∗
1 + W ∗ .
(18)
relating the Kuramoto order parameter Z with the firing-rate
quantity W ≡ πr + iv. Figure 4 illustrates this conformal
mapping of the right half-plane (r ≥ 0) onto the unit disk
(Z ≤ 1).
III. CONCLUSIONS
We have presented a method for deriving firing rate equa-
tions for a network of heterogeneous QIF neurons, which is
exact in the thermodynamic limit. To our knowledge, the re-
sulting system of ordinary differential equations (12) repre-
sents the first exact FREs of a network of spiking neurons.
synaptic coupling (3), the obtained low-dimensional descrip-
tion in terms of the Kuramoto order parameter is analogous to
ours, but in a different space [58]. Indeed, we showed that the
OA ansatz (14) is related, via the nonlinear transformation of
variables (15), to the LA ansatz (5). Remarkably, this transfor-
mation establishes an exact correspondence between the Ku-
ramoto order parameter and a novel, biophysically maningful
macroscopic observable which describes the firing rate and
mean membrane potential of the neuronal network. Interest-
ingly, the low-dimensional description in terms of firing rates
seems to be a more natural description for networks of spik-
ing neurons, compared to that in terms of the Kuramoto order
parameter. The firing rate equations (12) take a surprisingly
simple form in the LA manifold, what makes them a valuable
tool to explore and and understand the mechanisms governing
the macroscopic dynamics of neuronal networks.
Finally, since the OA ansatz is the asymptotic solution for
systems of the form in equation (16), applying the change of
variables V = tan(θ/2) automatically implies that the LA
should hold for populations governed by:
Vj = A(ηj, t) + B(ηj , t)Vj + C(ηj, t)V 2
j ,
(19)
7
where A, B, and C are related with Ω and H as A =
[Ω + Im(H)]/2, B = −Re(H), C = [Ω − Im(H)]/2. No-
tably, equation (19) defines a wide family of ensembles of QIF
neurons.
Therefore, the LA is actually valid for more general net-
works beyond the one investigated here -- ηj in Eq. (19) may
also be a vector containing several forms of disorder. As par-
ticularly relevant cases, in Appendix E we provide the FREs
governing the dynamics of an excitatory network with both,
heterogeneous inputs η and synaptic weights J, as well as pair
of interacting excitatory and inhibitory populations of QIF
neurons. In addition, according to Eq. (19), the LA is also
valid if synapses are modeled as conductances, in which case
the reversal potentials may be distributed as well. Moreover,
the role of gap-junctions or synaptic kinetics may be consid-
ered within the same framework.
[1] B. B. Averbeck, P. E. Latham, and A. Pouget, "Neural corre-
lations, population coding and computation," Nature Reviews
Neuroscience 7, 358 -- 366 (2006).
[2] A. L. Hodgkin and A. F. Huxley, "A quantitative description of
membrane current and its application to conduction and excita-
tion in nerve," J Physiol. 117, 500 -- 544 (1952).
[3] Romain Brette, Michelle Rudolph, Ted Carnevale, Michael
Hines, David Beeman, James M Bower, Markus Diesmann,
Abigail Morrison, Philip H Goodman, Frederick C Harris Jr,
et al., "Simulation of networks of spiking neurons: a review of
tools and strategies," Journal of computational neuroscience 23,
349 -- 398 (2007).
[4] E. M. Izhikevich and G. M. Edelman, "Large-scale model of
mammalian thalamocortical systems," Proc. Nat. Acad. Sci.
105, 3593 -- 3598 (2008).
[5] E. M. Izhikevich, Dynamical Systems in Neuroscience. (The
MIT Press, Cambridge, Massachusetts, 2007).
[6] Hugh R Wilson and Jack D Cowan, "Excitatory and inhibitory
interactions in localized populations of model neurons," Bio-
phys. J. 12, 1 -- 24 (1972).
[7] Shun-ichi Amari, "A method of statistical neurodynamics," Ky-
bernetik 14, 201 -- 215 (1974).
[8] Walter J Freeman, Mass action in the nervous system (Aca-
demic Press, New York, 1975).
[9] W. Gerstner, "Time structure of the activity in neural network
models," Phys. Rev. E 51, 738 -- 758 (1995).
[10] S. Fusi and M. Mattia, "Collective behavior of networks with
linear (vlsi) integrate-and-fire neurons," Neural Comput. 11,
633 -- 652 (1998).
[11] Daniel J Amit and Nicolas Brunel, "Model of global sponta-
neous activity and local structured activity during delay periods
in the cerebral cortex." Cerebral Cortex 7, 237 -- 252 (1997).
[12] N. Brunel, "Dynamics of sparsely connected networks of ex-
citatory and inhibitory spiking neurons," Journal of computa-
tional neuroscience 8, 183 -- 208 (2000).
[13] P. Dayan and L. F. Abbott, Theoretical neuroscience (Cam-
bridge, MA: MIT Press, 2001).
[14] W. Gerstner and W. M. Kistler, Spiking neuron models: Single
neurons, populations, plasticity (Cambridge university press,
2002).
[15] Oren Shriki, David Hansel,
and Haim Sompolinsky, "Rate
models for conductance-based cortical neuronal networks,"
Neural Comput. 15, 1809 -- 1841 (2003).
[16] Stephen Coombes, "Waves, bumps, and patterns in neural field
theories," Biol. Cybern. 93, 91 -- 108 (2005).
[17] A. Roxin, N. Brunel, and D. Hansel, "Role of delays in shap-
ing spatiotemporal dynamics of neuronal activity in large net-
works," Phys. Rev. Lett. 94, 238103 (2005).
[18] G. Deco, V. K. Jirsa, P. A. Robinson, M. Breakspear,
and
K. Friston, "The dynamic brain: from spiking neurons to neu-
ral masses and cortical fields," PLoS Computational biology 4,
e1000092 (2008).
[19] G. B. Ermentrout and D. H. Terman, Mathematical foundations
of neuroscience, Vol. 64 (Springer, 2010).
[20] S. Ostojic and N. Brunel, "From spiking neuron models to
linear-nonlinear models," PLoS Comput. Biol. 7, e1001056
(2011).
[21] A. Roxin and E. Montbri´o, "How effective delays shape oscilla-
tory dynamics in neuronal networks," Physica D 240, 323 -- 345
(2011).
[22] Evan S Schaffer, Srdjan Ostojic, and LF Abbott, "A complex-
valued firing-rate model that approximates the dynamics of
spiking networks," PLoS Comput. Biol. 9, e1003301 (2013).
[23] J. J. Hopfield, "Neurons with graded response have collective
computational properties like those of two-state neurons," Pro-
ceedings of the national academy of sciences 81, 3088 -- 3092
(1984).
[24] G. Mongillo, O. Barak, and M. Tsodyks, "Synaptic theory of
working memory," Science 319, 1543 -- 1546 (2008).
[25] R Ben-Yishai, R Lev Bar-Or, and H Sompolinsky, "Theory of
orientation tuning in visual cortex." Proc. Nat. Acad. Sci. 92,
3844 -- 3848 (1995).
[26] David Hansel and Haim Sompolinsky, "Modeling feature selec-
tivity in local cortical circuits," in Methods in Neuronal Mod-
elling: From Ions to Networks, edited by C. Koch and I. Segev
(MIT Press, Cambridge, 1998) pp. 499 -- 567.
[27] Rub´en Moreno-Bote, John Rinzel, and Nava Rubin, "Noise-
induced alternations in an attractor network model of perceptual
bistability," J. Neurophysiol. 98, 1125 -- 1139 (2007).
[28] K. Zhang, "Representation of spatial orientation by the intrin-
sic dynamics of the head-direction cell ensemble: a theory," J.
Neurosci. 16, 2112 -- 2126 (1996).
[29] K.-F. Wong and X.-J. Wang, "A recurrent network mechanism
of time integration in perceptual decisions," J. Neurosci. 26,
1314 -- 1328 (2006).
[30] Moshe Abeles, Corticonics: Neural circuits of the cerebral cor-
tex (Cambridge University Press, 1991).
[31] F. Varela, J.-P. Lachaux, E. Rodriguez, and J. Martinerie, "The
brainweb: phase synchronization and large-scale integration,"
Nature reviews neuroscience 2, 229 -- 239 (2001).
[32] Andreas K Engel and Wolf Singer, "Temporal binding and the
neural correlates of sensory awareness," Trends in cognitive sci-
ences 5, 16 -- 25 (2001).
[33] L. M. Ward, "Synchronous neural oscillations and cognitive
processes," Trends in cognitive sciences 7, 553 -- 559 (2003).
[34] P. Fries, "A mechanism for cognitive dynamics: neuronal com-
munication through neuronal coherence," Trends in cognitive
sciences 9, 474 -- 480 (2005).
[35] Gyorgy Buzsaki, Rhythms of the Brain (Oxford University
Press, 2006).
[36] J. Fell and N. Axmacher, "The role of phase synchronization
in memory processes," Nature Reviews Neuroscience 12, 105 --
118 (2011).
[37] E. Ott and T. M. Antonsen, "Low dimensional behavior of large
systems of globally coupled oscillators," Chaos 18, 037113
(2008).
[38] AL Hodgkin, "The local electric changes associated with repet-
itive action in a non-medullated axon," The Journal of physiol-
ogy 107, 165 -- 181 (1948).
[39] J. Rinzel and B. Ermentrout, "Analysis of neural excitability
and oscillations," in Methods in Neuronal Modelling: From
Ions to Networks, edited by C. Koch and I. Segev (MIT Press,
Cambridge, 1998) pp. 251 -- 291.
[40] B. Ermentrout and N. Kopell, "Parabolic bursting in an ex-
citable system coupled with a slow oscillation," SIAM J. Appl.
Math. 46, 233 -- 253 (1986).
[41] PE Latham, BJ Richmond, PG Nelson, and S Nirenberg, "In-
trinsic dynamics in neuronal networks. i. theory," Journal of
Neurophysiology 83, 808 -- 827 (2000).
[42] M. A. Buice and C. C. Chow, "Dynamic finite size effects in
spiking neural networks," PLoS Comput. Biol. 9, e1002872
(2013).
[43] We make an analytic continuation of w(η, t) from real η into
complex-valued η = ηr + iηi. This is possible into the lower
half-plane ηi < 0, since this guarantees the half-width x(η, t)
remains positive zero: ∂tx(η, t) = −ηi > 0 at x = 0. There-
fore we closed the integrals in (7) and (9) with an arc ηeiϑ with
η → ∞ and ϑ ∈ (−π, 0). This contour encloses one pole of
the Lorentzian distribution (11), which written in partial frac-
tions reads: g(η) = (2πi)−1[(η− ¯η−i∆)−1−(η− ¯η+i∆)−1].
[44] The number of effective parameters can be reduced by nondi-
mensionalizing the system as: η = ¯η/∆, J = J/√∆, (r, v) =
(r, v)/√∆, t = √∆t, and I(t) = I(t/√∆)/∆.
8
[45] Y. Kuramoto, Chemical Oscillations, Waves, and Turbulence
(Springer-Verlag, Berlin, 1984).
[46] A. S. Pikovsky, M. G. Rosenblum, and J. Kurths, Synchroniza-
tion, a Universal Concept in Nonlinear Sciences (Cambridge
University Press, Cambridge, 2001).
[47] E. Ott and T. M. Antonsen, "Long time evolution of phase os-
cillator systems," Chaos 19, 023117 (2009); E. Ott, B. R. Hunt,
and T. M. Antonsen, "Comment on "long time evolution of
phase oscillators systems"," ibid. 21, 025112 (2011).
[48] D. Paz´o and E. Montbri´o, "Low-dimensional dynamics of pop-
ulations of pulse-coupled oscillators," Phys. Rev. X 4, 011009
(2014).
[49] A. Pikovsky and M. Rosenblum, "Dynamics of heterogeneous
oscillator ensembles in terms of collective variables," Physica
D 240, 872 -- 881 (2011).
[50] T. B. Luke, E. Barreto, and P. So, "Complete classification of
the macroscopic behavior of a heterogeneous network of theta
neurons," Neural Comput. 25, 3207 -- 3234 (2013).
[51] P. So, T. B. Luke, and E. Barreto, "Networks of theta neurons
with time-varying excitability: Macroscopic chaos, multistabil-
ity, and final-state uncertainty," Physica D 267, 16 -- 26 (2014).
[52] C. R. Laing, "Derivation of a neural field model from a network
of theta neurons," Phys. Rev. E 90, 010901 (2014).
[53] E. Montbri´o and D. Paz´o, "Shear diversity prevents collective
synchronization," Phys. Rev. Lett. 106, 254101 (2011).
[54] D. Paz´o and E. Montbri´o, "The Kuramoto model with dis-
tributed shear," EPL (Europhys. Lett.) 95, 60007 (2011).
[55] E. Montbri´o and D. Paz´o, "Collective synchronization in the
presence of reactive coupling and shear diversity," Phys. Rev. E
84, 046206 (2011).
[56] D. Iatsenko, S. Petkoski, P. V. E. McClintock, and A. Ste-
fanovska, "Stationary and traveling wave states of the Ku-
ramoto model with an arbitrary distribution of frequencies and
coupling strengths," Phys. Rev. Lett. 110, 064101 (2013).
[57] D. Iatsenko, P. V. E. McClintock, and A. Stefanovska, "Oscilla-
tor glass in the generalized Kuramoto model: synchronous dis-
order and two-step relaxation," Nat. Commun. 5, 4188 (2014).
[58] However, note that the phase diagrams in Luke et al. [50] do not
fully agree with ours, and show additional instabilities. These
bifurcations are associated with the finite width of the pulses,
as it accurs in the Winfree model [48].
[59] J.A.G. Roberts and G.R.W. Quispel, "Chaos and time-reversal
symmetry. Order and chaos in reversible dynamical systems,"
Phys. Rep. 216, 63 -- 177 (1992).
[60] S. H. Strogatz and R. E. Mirollo, "Stability of incoherence in
a population of coupled oscillators," J. Stat. Phys. 63, 613 -- 635
(1991).
[61] S. H. Strogatz, R. E. Mirollo, and P. C. Matthews, "Coupled
nonlinear oscillators below the synchronization threshold: Re-
laxation by generalized Landau damping," Phys. Rev. Lett. 68,
2730 -- 2733 (1992).
[62] H. Chiba and I. Nishikawa, "Center manifold reduction for
large populations of globally coupled phase oscillators," Chaos
21, 043103 (2011).
[63] H. Daido, "Onset of cooperative entrainment in limit-cycle os-
cillators with uniform all-to-all interactions: bifurcation of the
order function," Physica D 91, 24 -- 66 (1996).
[64] Equation (10) becomes then a reversible system [59] of ordi-
nary differential equations with the invariance under time re-
versal and w → w∗, e.g. Eq. (12) for ∆ = 0 is reversible,
with invariance under t → −t, v → −v. It is advisable to ap-
proximate Eq. (10) by a set of ODEs (one for each η value)
with additional small terms breaking time-reverisibility. This
is achieved including a small term in each ODE, like ∆ in
Eq. (12a), so that g(η) is actually approximated by a sum of
very sharp Lorentzian functions.
[65] S. Watanabe and S. H. Strogatz, "Constant of motion for super-
conducting Josephson arrays," Physica D 74, 197 -- 253 (1994).
[66] A. Pikovsky and M. Rosenblum, "Partially integrable dynamics
of hierarchical populations of coupled oscillators," Phys. Rev.
Lett. 101, 264103 (2008).
[67] A subtle question is that, as it occurs in the Kuramoto model,
there exists a continuous spectrum of eigenvalues at λ =
−2w0(η)i and the complex conjugate. Indeed, for η values
such that neurons are actively firing (y0(η) = 0), the eigen-
values lie exactly on the imaginary axis. Apparently, this seems
to forbid the exponential stability obtained from Eq. (12) for
the Lorentzian distribution. The same mathematical conundrum
was encountered and solved in the Kuramoto model [60 -- 62],
what suggests similar mechanisms are operating here.
[68] Note that considering stronger forms of heterogeneity for the
synaptic weights may generally not lead to Eq. (19).
9
APPENDIX A: NUMERICAL SIMULATIONS
To numerically simulate the population of QIF neurons (1)
we used the Euler method, with time step dt = 10−4. The
population had N = 104 neurons, and the Lorentzian dis-
tribution (11) was deterministically generated using: ηj =
¯η+∆ arctan[π/2(2j−N−1)/(N +1)], where j = 1, . . . , N ,
and ∆ = 1.
The time it takes for the membrane potential of a QIF neu-
ron (with Ij > 0) to reach infinity from a given positive
value of the membrane potential is arctan(pIj /Vp)/pIj.
ForpIj ≪ Vp, this expression can be approximated as:
1
Vp
.
≈
arctan(cid:0)pIj/Vp(cid:1)
pIj
In simulations we considered Vp = −Vr = 100, and used
the previous approximation. Thus, the time for the neurons to
reach infinity from Vp is 1/Vp ≈ 10−2. Additionally, the time
taken from minus infinity to Vr is 1/Vr ≈ 10−2. Numerically,
once a neuron's membrane potential Vj satisfies Vj ≥ Vp the
neuron is reset to −Vj and held there for a refractory time
2/Vj. The neurons produce a spike when Vj reaches infinity,
i.e. a time interval 1/Vj after crossing Vp. The exact time of
the spike can not be evaluated exactly in numerical simula-
tions, since dt is finite. However, simulations agree very well
with the theory provided that 1/Vp ≫ dt.
To evaluate the mean membrane potential v, the popula-
tion average was computed discarding those neurons in the
refractory period. The choice Vp = −Vr is not needed, but
in this way the observed mean membrane potential v agrees
with the theory, consistent with the definition in (8). The mean
synaptic activation (3) was evaluated using the Heaviside step
function aτ (t) = Θ(τ − t)/τ with τ = 10−3. The instan-
taneous firing rates were obtained binning time and counting
spikes within a sliding time window of size δt = 2 × 10−2
(Figs. 2, C2, C3, D1) and δt = 4 × 10−2 (Fig. 3).
APPENDIX B: PROOF OF EQUATION (18)
The inverse of Eq. (18) reads:
W =
1 − Z ∗
1 + Z ∗
(B1)
Recalling Eqs. (7) and (9), we write the macroscopic field W
as
W (t) =Z ∞
−∞
w(η, t)g(η)dη.
where w ≡ x + iy. Inserting the conformal mapping w =
(1 − α)/(1 + α) -- the inverse of Eq. (15) -- we get
1 + α(η, t)(cid:21) g(η)dη.
−∞(cid:20) 1 − α(η, t)
W (t) =Z ∞
Using the geometric series formula, and grouping the powers
of α, we may evaluate the integrals obtaining
and integration over all the firing neurons, gives the self-
consistent condition for r0:
10
W (t) = 1 − 2Z ∗(t) + 2Z ∗
2 (t) − 2Z ∗
3 (t) + ··· ,
where the Zm are the generalized order parameters [63]:
Zm(t) =Z ∞
=Z ∞
−∞
−∞
g(η)Z 2π
0
ρ(θη, t)eimθdθ dη
g(η)[α∗(η, t)]m dη.
(B2)
r0 =Z ∞
−Jr0
c(η)g(η) dη
(C1)
which is valid for any distribution g(η) (an analogous expres-
sion was obtained in Eq. (45) of [42]). For Lorentzian g(η),
the integral in (C1) can be evaluated, and solving the result-
ing equation for r0 one obtains the steady states in agreement
with the result of setting r = v = 0 in the FREs (12).
Since, for Lorentzian g(η), Zm(t) = [α∗(η = ¯η − i∆, t)]m =
Z(t)m, we can revert the power series in (B2) and obtain the
result in (B1).
APPENDIX C: RESULTS FOR ARBITRARY
DISTRIBUTIONS OF CURRENTS
In this Appendix we compare the results in the main text,
obtained using a Lorentzian distribution of currents g(η), with
other distributions. The results are qualitatively similar as ev-
idenced by Figs. C1, C2 and C3 (cf. Figs. 1, 2, and 3 in the
main text).
Note that if a particular distribution g(η) has 2n poles (all of
them off the real axis) one can readily obtain the FREs con-
sisting of n complex-valued ordinary differential equations.
Even if g(η) does not fulfill this condition, as in the case of
Gaussian or uniform distributions, the Lorentzian Ansatz still
holds (see below).
Moreover, it is possible to efficiently simulate the dynamics
of a population by integrating Eq. (10) for a sample of η val-
ues that approximate a particular g(η) [64]. However, if g(η)
is a discrete distribution (or has a discrete part), -- as in the
case of the Dirac delta function g(η) = δ(η − ¯η) -- , the so-
called Watanabe-Strogatz theory applies [49, 65, 66], and the
'Lorentzian manifold' is no longer attracting since the dynam-
ics is extremely degenerate, akin to a Hamiltonian system.
Steady states
Considering I(t) = 0 in Eqs. (1) and (2), it is possible to
find the solutions with steady firing rate r(t) = r0 for arbitrary
distributions of currents.
As we pointed out in the main text, the stationary solution
of the continuity equation (4) for those neurons that are intrin-
sically active (η > −Jr0) must be is inversely proportional to
their speed, that is
Linear stability analysis of steady states
Assuming that the LA captures the actual dynamics of the
population of QIF neurons, one can also investigate the stabil-
ity of steady states for arbitrary distributions g(η). Indeed, the
evolution of infinitesimal perturbations from a steady state
w0(η) ≡ x0(η) + iy0(η) =(√η + Jr0
−i√−η − Jr0
if η > −Jr0
if η ≤ −Jr0
is determined by the linearization of Eq. (10):
∂tδw(η, t) = i(Jδr − 2w0δw)
(C2)
−∞[δw(η, t) + δw∗(η, t)]g(η)dη.
where δr(t) = (2π)−1R ∞
To find the discrete spectrum of eigenvalues [67], we use
the ansatz δw(η, t) = b(η)eλt in (C2) and obtain
[λ+2w0(η)i]b(η)eλt =
iJ
2π Z ∞
−∞
[b(η)eλt+b∗(η)eλ∗t]g(η)dη.
Solving the equation for beλt, we find
b(η)eλt =
1
2w0(η) − iλ
J
2π Z ∞
−∞
[b(η)eλt+b∗(η)eλ∗t]g(η)dη.
After summing the complex conjugate at each side of the
equation, we multiply by g(η) and integrate over η. This
allows one to cancel out the integrals R (beλt + b∗eλ∗t)gdη.
Then, imposing self-consistency, we find
1 =
J
2π Z ∞
−∞(cid:20)
1
2w0(η) − iλ
+ c.c.(cid:21) g(η)dη.
(C3)
Local bifurcations are associated with marginal stability of the
fixed points: Re(λ) → 0. In correspondence with the results
obtained for a Lorentzian distribution in the main text, we ex-
pect bifurcations of saddle-node type associated with λ = 0.
Therefore, from Eq. (C3) we find that the loci of the saddle-
node bifurcations are located at
ρ0(V η) =
c(η)
V 2 + η + Jr0
,
JSN =
where the normalizing constant is c(η) = √η + Jr0/π. The
firing rate for each value of η is then
r0(η) = ρ0(V → ∞η) V (V → ∞η, t) = c(η),
Since x0 = √η + Jr0 for η > −Jr0, and zero otherwise,
we can restrict the integration over η to the range (−Jr0,∞).
Now multiplying Eq. (C4) by Eq. (C1) we get, after defining
2π
x0(η)
w0(η)2 g(η)dη
.
(C4)
−∞
R ∞
(a)
2
/
1
γ
/
J
20
10
0
-2
(b)
20
2
/
1
σ
/
J
10
-1
η/γ
0
0
-3
-2
η/σ
-1
0
FIG. C1.
(color online). Phase diagrams for (a) uniform and (b)
Gaussian distributions of currents g(η). The cyan-shaded region
represents the bistable region, with the solid lines corresponding to
saddle-node bifurcations analytically obtained from Eqs. (C5) and
(C6). Square symbols are estimations of the bifurcations loci ob-
tained from by direct numerical simulations of N = 104 QIF neu-
rons. Triangle symbols indicate parameter values used in numerical
simulations of Figs. C2 and C3.
ξ = JSN r0, two equations that permit to find the locus of the
saddle-node bifurcations systematically for arbitrary distribu-
tions of currents:
with ξ obtained solving
JSN =
ξ =
2π
R ∞
0 η−1/2g(η − ξ)dη
2R ∞
0 η1/2g(η − ξ)dη
R ∞
0 η−1/2g(η − ξ)dη
.
,
(C5)
(C6)
Bistability region for uniform and Gaussian distributions
Equations (C5) and (C6) are particularly easy to solve for
uniform distributions of currents:
g(η) =( 1
2γ
0
forη − ¯η < γ
otherwise
After defining the rescaled parameters η = ¯η/γ and J =
J/√γ, we find two branches of saddle-node bifurcations em-
anating from the cusp point at η = −1/3:
These functions are plotted in Fig. S1(a). Numerical simula-
tions using the network of QIF neurons confirm the correct-
ness of these boundaries (see the square symbols in Fig. C1).
For Gaussian distributions,
g(η) =
1
√2πσ
e−(η−¯η)2/(2σ2),
the solutions of (C5) and (C6) can be numerically found. The
results are shown in Fig. C1(b). Again, there is a perfect
agreement between Eqs. (C5) and (C6) -- derived assuming
the Lorentzian Ansatz -- and the numerical estimations ob-
tained simulating the network of QIF neurons.
J (1)
SN =
J (2)
SN =
2π
√3η + 3
rη + 1 + 2q 1
2π
3 + η2 −rη − 1 + 2q 1
3 + η2
11
Excitatory networks with external periodic currents
Firing rate equations (12) predict the existence of a stable
focus in the shaded region of Fig. 1. Trajectories attracted to
this fixed point display oscillations in the firing rate and mean
membrane potential due to the transient synchronous firing of
the QIF neurons.
When an external periodic current is injected to all neurons
in the network, the spiral dynamics around the fixed point is
responsible for the bursting behavior observed in Fig. 2, as
well as for the emergence of the macroscopic chaos shown in
Fig. 3. Here we investigate whether similar phenomena oc-
cur when an external periodic current of the same frequency
is injected in an excitatory network with either uniform or
Gaussian-distributed currents.
We introduced a sinusoidal forcing I(t) = I0 sin(ωt) ob-
serving a behavior qualitatively identical to the one reported
in the main text with Lorentzian g(η). Under a low-frequency
forcing the system displays periodic bursting, see Fig. C2,
provided the parameters are set inside the bistable region (see
the black triangles in Fig. C1). Furthermore, note that the
range of firing rates and mean membrane potentials in Fig-
ure C2 are similar to those of Fig. 2 -- for Lorentzian distribu-
tions of currents.
As for the simulations shown in Figure (3), we next increase
the frequency of the injected current up to ω = π to investi-
gate the emergence of macroscopic chaos in a network with
Gaussian-distributed currents. Fig. C3 shows the emergence
of an apparently chaotic state. The observed dynamics is sim-
ilar to that of Fig. 3, which suggests it is chaotic. This type
of chaos persists in the thermodynamic limit N → ∞. On
top of this, highly-dimensional but weakly chaotic dynamics
is probably also present due to 'residual' finite-size effects.
APPENDIX D: IDENTICAL QIF NEURONS DRIVEN BY
INDEPENDENT NOISE TERMS
We compare now the results obtained above and in the main
text for quenched heterogeneity g(η) with the results for iden-
tical neurons g(η) = δ(η − ¯η) driven by noise. Specifically,
the inputs currents are now taken as
Ij = ¯η + Jr(t) + ξj (t),
(D1)
where ξj are independent white noise terms with expected val-
ues hξj (t)i = 0, and hξj (t)ξk(t′)i = 2D δjk δ(t − t′).
Fokker-Planck equation:
In the thermodynamic limit, the density ρ(V, t) obeys the
(D2)
∂tρ + ∂V (cid:2)(V 2 + ¯η + Jr)ρ(cid:3) = D ∂2
V ρ.
The Lorentzian ansatz is not a solution of this equation,
but we demonstrate here that the phenomena observed with
quenched heterogeneity arise also with independent noise
sources. This qualitative similarity at the macroscopic level
between quenched Lorentzian heterogeneity and Gaussian
noise has been noted in previous work [60].
(a)
3
r
(b)
v
0
2
0
-2
-4
-6
(c)
0
0
3
x
e
d
n
i
n
o
r
u
e
N
0
12
(e)
3
(f)
(g)
0
2
0
-2
0
0
3
0
(d)
)
t
(
I
1
0
-1
-10
0
10
20
30
time
40
50
60
70
80
(h)
1.5
0
-1.5
-10
0
10
20
30
time
40
50
60
70
80
FIG. C2. Numerical simulations of the excitatory network of QIF neurons, Eqs. (1), and (2). with (a-d) uniform and (e-h) Gaussian distributions
of currents. As in Fig. 2, at time t = 0, an external sinusoidal current I(t) = I0 sin(ωt) -- shown in panels (d,h) -- is applied to all neurons.
Panels (a,e) show the time series of the firing rate, and (b,f) the mean membrane potential of all cells. In panels (c,g) we depicted the raster
plots of 300 randomly chosen neurons. Parameters correspond to the black triangle symbols in Fig. C1: (a-d) ¯η = −1, J = 8, γ = 1, I0 = 1;
(e-h) ¯η = −2, J = 10, σ = 1, I0 = 1.5.
(a)
r
1
0
(b)
0
0
3
x
e
d
n
i
n
o
r
u
e
N
0
(c)
0
0
3
x
e
d
n
i
n
o
r
u
e
n
d
e
r
e
d
r
O
0
0
to each fixed point (see figure caption for details).
Additionally, in order to investigate and compare the dy-
namical behavior of the identical noise-driven neurons with
that of the FREs (12), an external current of intensity I0 = 3
is injected to all neurons at time t = 0, like in Fig. 2.
In
Fig. D1(b,c) the time series of the firing rate and the mean
membrane potential clearly display damped oscillations after
the injection of the current, confirming the existence of a sta-
ble focus, exactly as observed in the FREs (12). The existence
of a stable focus reflects the presence of transient spike syn-
chrony in the network, as seen by the raster plot in Fig. D1(d).
Remarkably, the raster plot and the time series closely resem-
ble those of Fig. 2. The resemblance is not just qualitative,
but rather there is a near quantitative fit between the network
of QIF neurons driven by Gaussian noise and the FREs (12),
which were derived assuming quenched Lorentzian hetero-
geneity (orange curves).
20
time
40
60
APPENDIX E: MODEL GENERALIZATIONS
FIG. C3. Chaotic state in a network of N = 104 QIF neurons with
Gaussian-distributed currents. Network parameters correspond to the
yellow-triangle symbol in the phase diagram of Fig. S1(b). Like in
Fig. 3, neurons receive a common periodic current I(t) = I0 sin(ωt)
of frequency ω = π. Parameters: ¯η = −1, J = 8, σ = 1, I0 = 1.5.
To illustrate the potential of the LA for investigating more
sophisticated networks, here we provide the low-dimensional
FREs corresponding to an excitatory network of QIF neurons
with independently distributed currents and synaptic weights,
and to two interacting populations of excitatory and inhibitory
QIF neurons with distributed currents.
A subtle point in Eq. (D2) is that its nondimensionalization
entails a different (compared to ∆) rescaling with D: V =
V /D1/3, η = η/D2/3, J = J/D1/3, t = tD1/3 (implying
r = r/D1/3).
Numerical simulations reveal the existence of a region of
bistability, see Fig. D1(a), analogous to the one observed for
quenched heterogeneity, cf. Figs. 1(a) and C1. Obviously, true
bistability only holds in the thermodynamic limit, while what
we observe are rather exceedingly long residence times close
Excitatory population with heterogeneous currents and synaptic
weights
As a first example, let us assume that both the currents η
and the synaptic weights J are distributed -- this type of het-
erogeneity was also considered in [42]. The input currents
read then [68]
Ij = ηj + Jjr(t) + I(t).
(a)
20
15
3
/
1
D
/
J
10
5
0
13
(b)
3
r
(c)
v
0
2
0
-2
0
0
3
0
x
e
d
n
i
n
o
r
u
e
N
(d)
(e)
-10
-5
η/D2/3
0
)
t
(
I
3
0
-10
0
10
time
20
30
40
FIG. D1. (color online). Numerically obtained phase diagram (a) and time series (b-d) for a network of identical QIF neurons driven by
independent white noise terms. The square symbols in panel (a) represent the boundaries that enclose the region of bistability between a
high and a low activity state. The boundaries have been obtained using a network of 104 neurons, and by numerical continuation of a low
activity solution (filled squares) and a high activity solution (empty squares). Specifically, using a noise intensity D = 1 and a particular
value of J, the system was initialized either at ¯η = −5 or at ¯η = 0 and, after t = 10 time units, parameter ¯η was decreased/increased an
amount 0.025/0.1, respectively. This continuation was made until the relative change of two successive values of the averaged firing rate
(time-averaged over the last time unit for each parameter value) was larger than 50%. Other parameters for the numerical simulations are
the same as in all other figures, and are described in the Material and Methods section. The triangle symbol indicates the parameter value,
(¯η/D2/3, J/D1/3) = (−5, 15), corresponding to the numerical simulations shown in black in the right panels -- for the simulations we used
D = 1. To facilitate the comparison with the FREs (12), the orange curves show the time series of the FREs, using the same parameters
(¯η, J) = (−5, 15), but with ∆ = 1
For simplicity, let us additionally assume that η and J are
distributed independently, with a joint distribution p(η, J) =
g(η)h(J).
In the simplest situation of Lorentzian g(η) and
h(J)
g(η) =
∆/π
(η − ¯η)2 + ∆2 ;
h(J) =
Γ/π
(J − ¯J)2 + Γ2 .
the problem is extremely simplified using the Lorentzian
ansatz, which now trivially reads:
ρ(V η, J, t) =
1
π
x(η, J, t)
[V − y(η, J, t)]2 + x(η, J, t)2 .
The firing rate and mean membrane potential are determined
only by the value of w ≡ x + iy at the poles in the lower half
planes:
r(t) + iv(t) =ZZ w(η, J, t)g(η)h(J)dηdJ
= w(¯η − i∆, ¯J − iΓ, t).
Finally, evaluating Eq. (10) in the main text at the poles (η =
¯η − i∆, J = ¯J − iΓ) we get the exact FREs:
r = ∆/π + Γr/π + 2rv,
v = v2 + ¯η + ¯Jr + I(t) − π2r2.
(E1a)
(E1b)
These equations contain simply an extra term '+Γr/π' com-
pared to equations (12). Figure E1 shows the bistability
boundaries obtained from (E1) for different ratios of Γ and
∆, and I(t) = 0. Note that the region of bistability shifts
to lower values of ¯η/∆ and to higher values of ¯J/√∆ as the
level of heterogeneity in the synaptic coupling Γ is increased.
20
15
2
/
1
∆
/
J
10
5
0
-10
Γ/ ∆1/2= 0
Γ/∆1/2= 5
Γ/ ∆1/2= 1
-5
η/∆
0
FIG. E1. (color online). Phase diagram for an excitatory population
with heterogeneous currents and synaptic weights obtained using the
FREs (E1).
Firing-rate equations for a pair of Excitatory-Inhibitory
populations
The microscopic state of each population of QIF neurons is
characterized by the membrane potentials {V (e,i)
}j=1,...,N ,
which obey the following ordinary differential equations:
j
V (e,i)
j
= (V (e,i)
j
)2 + I (e,i)
j
, if V (e,i)
j
≥ Vp, then V (e,i)
j ← Vr.
j
Here, V (e,i)
represents the membrane potential of neuron j in
either the excitatory (e), or in the inhibitory population (i).
The external currents for the excitatory and inhibitory popula-
tions are, respectively:
j = η(e)
I (e)
j = η(i)
I (i)
j + Jees(e)(t) − Jies(i)(t) + I (e)(t),
j + Jeis(e)(t) − Jiis(i)(t) + I (i)(t),
where the synaptic weights are Jee, Jii, Jie, Jei. Finally, the
mean synaptic activation for each population is
s(e,i)(t) =
1
N
N
j )(e,i)<tZ t
Xj=1 Xk\(tk
dt′aτ (t−t′)δ(t′−(tk
j )(e,i)).
−∞
Here, (tk
j )(e,i) is the time of the kth spike of jth neuron in
either the excitatory (e), or in the inhibitory population (i).
Additionally, δ(t) is the Dirac delta function, and aτ (t) is the
normalized synaptic activation caused by a single pre-synaptic
spike with time scale τ, e.g. aτ (t) = e−t/τ /τ.
14
It is straightforward to apply the LA and the method de-
scribed in the main text, to obtain the firing rate equations
corresponding to the two-population model. Considering the
limit of infinitely fast synapses, τ → 0, we get s(e,i)(t) =
r(e,i)(t). Finally, assuming the Lorentzian distributions of
currents for both populations:
ge,i(η) =
1
π
∆e,i
(η − ¯ηe,i)2 + ∆2
e,i
,
we obtain the firing-rate equations:
r(e) = ∆e/π + 2r(e)v(e),
v(e) = (v(e))2 + ¯ηe + Jeer(e) − Jier(i) + I (e)(t) − (πr(e))2,
r(i) = ∆i/π + 2r(i)v(i),
v(i) = (v(i))2 + ¯ηi + Jeir(e) − Jiir(i) + I (i)(t) − (πr(i))2.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.