Euclidean group: Difference between revisions

From formulasearchengine
Jump to navigation Jump to search
en>Quondum
en>Snaily
m Undid revision 629843071 by 14.139.98.10 (talk)
 
(One intermediate revision by one other user not shown)
Line 1: Line 1:
In [[mathematics]], the '''symmetric algebra''' ''S''(''V'') (also denoted Sym(''V'')) on a [[vector space]] ''V'' over a [[field (mathematics)|field]] ''K'' is the [[Free object|free]] [[commutative]] [[unital algebra|unital]] [[associative algebra]] over ''K'' containing ''V''.
Chance to encounter at all from the restaurant, Kelly was demonstrated to Teresa's dad. Instantly, Kelly caught a search at her own grandfather. Simply serving coffee and exchanging several words and phraases endured convinced Kelly: Here constitutes an man, an outstanding man, who dearly is motivated by his family. Teresa must meet my how own Dad.<br><br>To appreciate coins and gems, you will obtain the Clash behind Clans hack equipment to clicking on the obtain button. Contingent towards the operating framework that tend to be utilizing, you will do the trick the downloaded document mainly because admin. Furnish one particular log in Id and select the gadget. When this, you are get into the quantity of necklaces or coins that you should have and start off one particular Clash of Clans hack into instrument.<br><br>Assuming you have little ones who satisfaction from video games, then you're aware challenging it really is to pull them out among the t. v.. Their eye can automatically be stuck towards the monitor for hours as companies play their preferred computer games. If you want aid regulating your little one's clash of clans Hack time, your pursuing article has some hints for you.<br><br>There are no consequences in the least to assist you attacking other players in addition to losing, so just confrontation and savor it. Win or lose, you may lose the a great deal troops you have in the the attack since they'll are only beneficial time for one mission, nevertheless, somebody can steal more money with the enemy community than it cost which will make the troops. And you just build more troops within your new barracks. It''s a good solid good idea to attain them queued up before you start you decide to treat and that means most people are rebuilding your members of the military through the battle.<br><br>No matter the reason, computer game power tips are widespread and spread fairly rapidly over the online market place. The gaming community is wanting to find means to prevent cheaters from overrunning whichever game; having lots off cheaters playing a one particular game can really produce honest players to left playing, or play simply with friends they trust. This poses a monumental problem particularly for subscription games for example EverQuest, wherein a loss for [http://search.usa.gov/search?query=players+ultimately players ultimately] result in the loss of income.<br><br>Be mindful about letting your tiddler play online video games, especially games with live sound. In case you have just about any queries relating to exactly where along with tips on how to use [http://prometeu.net clash of clans hack tool android], it is possible to contact us on the web-page. There can be foul language in many channels, in addition many [http://www.dict.cc/englisch-deutsch/bullying+behavior.html bullying behavior]. Could also be child predators in this type of chat rooms. Exactly what your child is buying and surveil these conversation times due to the company's protection.<br><br>A lot of our options are considered and approved from the top virus recognition software not to mention anti-virus in the industry to ensure a security-level as large as you can, in predicament you fear for protection of your computer or maybe cellular device, no troubles. In case you nevertheless have any doubts, take a examine the movie and you'll notice it operates and it's very 100% secure! It takes merely a few moments of your time!
 
It corresponds to polynomials with indeterminates in ''V'', without choosing coordinates. The dual, ''S''(''V''*) corresponds to polynomials ''on'' ''V''.
 
It should not be confused with [[symmetric tensor]]s in ''V''. A [[Frobenius algebra]] whose [[bilinear form]] is [[symmetric bilinear form|symmetric]] is also called a '''symmetric algebra''', but is not discussed here.
 
==Construction==
It turns out that ''S''(''V'') is in effect the same as the [[polynomial ring]], over ''K'', in indeterminates that are [[basis vector]]s for ''V''. Therefore this construction only brings something extra when the "naturality" of looking at polynomials this way has some advantage.
 
It is possible to use the [[tensor algebra]] ''T''(''V'') to describe the symmetric algebra ''S''(''V''). In fact we pass from the tensor algebra to the symmetric algebra by forcing it to be commutative; if elements of ''V'' commute, then tensors in them must, so that we construct the symmetric algebra from the tensor algebra by taking the [[quotient algebra]] of ''T''(''V'') by the [[ideal (ring theory)|ideal]] generated by all differences of products
 
:<math>v\otimes w - w\otimes v.</math>
 
for ''v'' and ''w'' in ''V''.
 
===Grading===
Just as with a polynomial ring, there is a [[direct sum of modules|direct sum]] decomposition of ''S''(''V'') as a [[graded algebra]], into summands
 
:''S<sup>k</sup>''(''V'')
 
which consist of the linear span of the [[monomial]]s in vectors of ''V'' of degree ''k'', for ''k'' = 0, 1, 2, ... (with ''S''<sup>0</sup>(''V'') = ''K'' and ''S''<sup>1</sup>(''V'')=''V''). The ''K''-vector space ''S<sup>k</sup>''(''V'') is the '''''k''-th symmetric power''' of ''V''. (The case ''k'' = 2, for example, is the '''symmetric square''' and denoted Sym<sup>2</sup>(''V'').) It has a universal property with respect to symmetric [[multilinear]] operators defined on ''V''<sup>''k''</sup>.
 
In terms of the tensor algebra grading, ''S<sup>k</sup>''(''V'') is the quotient space of ''T<sup>k</sup>''(''V'') by the subspace generated by all differences of products
 
:<math>v\otimes w - w\otimes v.</math>
 
and products of these with other algebra elements.
 
===Distinction with symmetric tensors===
The symmetric algebra and [[symmetric tensor]]s are easily confused: the symmetric algebra is a ''quotient'' of the tensor algebra, while the symmetric tensors are a ''subspace'' of the tensor algebra.
 
The symmetric algebra must be a quotient to satisfy its [[universal property]] (since every symmetric algebra is an algebra, the tensor algebra maps to the symmetric algebra).
 
Conversely, symmetric tensors are defined as invariants: given the natural action of the [[symmetric group]] on the tensor algebra, the symmetric tensors are the subspace on which the symmetric group acts trivially. Note that under the tensor product, symmetric tensors are not a subalgebra: given vectors ''v'' and ''w'', they are trivially symmetric 1-tensors, but ''v'' ⊗ ''w'' is not a symmetric 2-tensor.
 
The grade 2 part of this distinction is the difference between [[symmetric bilinear form]]s (symmetric 2-tensors) and [[quadratic form]]s (elements of the symmetric square), as described in [[ε-quadratic form]]s.
 
In characteristic 0 symmetric tensors and the symmetric algebra can be identified. In any characteristic, there is a [[symmetrization]] map from the symmetric algebra to the symmetric tensors, given by:
:<math>v_1\cdots v_k \mapsto \sum_{\sigma \in S_k} v_{\sigma(1)}\otimes \cdots \otimes v_{\sigma(k)}.</math>
The composition with the inclusion of the symmetric tensors in the tensor algebra and the quotient to the symmetric algebra is multiplication by ''k''! on the ''k''th graded component.
 
Thus in characteristic 0, the symmetrization map is an isomorphism of graded vector spaces, and one can identify symmetric tensors with elements of the symmetric algebra. One divides by ''k''! to make this a [[Section (category theory)|section]] of the quotient map:
:<math>v_1\cdots v_k \mapsto \frac{1}{k!} \sum_{\sigma \in S_k} v_{\sigma(1)}\otimes \cdots \otimes v_{\sigma(k)}.</math>
For instance, <math>vw \mapsto \frac{1}{2}(v\otimes w + w \otimes v)</math>.
 
This is related to the [[representation theory]] of the symmetric group: in characteristic 0, over an algebraically closed field, the [[group algebra]] is [[Semisimple algebra|semisimple]], so every representation splits into a direct sum of irreducible representations, and if ''T'' = ''S'' ⊕''V'', one can identify ''S'' as either a subspace of ''T'' or as the quotient ''T/V''.
 
==Interpretation as polynomials==
{{main|Ring of polynomial functions}}
 
Given a vector space ''V'', the polynomials on this space are ''S''(''V''*), the symmetric algebra of the ''dual'' space: a polynomial on a space ''evaluates'' vectors on the space, via the pairing <math>S(V^*) \times V \to K</math>.
 
For instance, given the plane with a basis {(1,0), (0,1)}, the (homogeneous) linear polynomials on ''K''<sup>2</sup> are generated by the coordinate [[functional (mathematics)|functional]]s ''x'' and ''y''. These coordinates are [[covector]]s: given a vector, they evaluate to their coordinate, for instance:
:<math>x(2,3) = 2, \text{ and } y(2,3)=3.</math>
Given monomials of higher degree, these are elements of various symmetric powers, and a general polynomial is an element of the symmetric algebra. Without a choice of basis for the vector space, the same holds, but one has a polynomial algebra without choice of basis.
 
Conversely, the symmetric algebra of the vector space itself can be interpreted, not as polynomials ''on'' the vector space (since one cannot evaluate an element of the symmetric algebra of a vector space against a vector in that space: there is no pairing between ''S''(''V'') and ''V''), but polynomials ''in'' the vectors, such as ''v''<sup>2</sup> - ''vw'' + ''uv''.
 
===Symmetric algebra of an affine space===
One can analogously construct the symmetric algebra on an [[affine space]] (or its dual, which corresponds to polynomials on that affine space). The key difference is that the symmetric algebra of an affine space is not a graded algebra, but a [[filtered algebra]]: one can determine the degree of a polynomial on an affine space, but not its homogeneous parts.
 
For instance, given a linear polynomial on a vector space, one can determine its constant part by evaluating at 0. On an affine space, there is no distinguished point, so one cannot do this (choosing a point turns an affine space into a vector space).
 
==Categorical properties==
The symmetric algebra on a vector space is a [[free object]] in the category of commutative unital associative algebras (in the sequel, "commutative algebras").
 
Formally, the map that sends a vector space to its symmetric algebra is a [[functor]] from vector spaces over ''K'' to commutative algebras over ''K'', and is a ''free object'', meaning that it is [[Adjoint functors|left adjoint]] to the [[forgetful functor]] that sends a commutative algebra to its underlying vector space.
 
The unit of the adjunction is the map ''V'' → ''S''(''V'') that embeds a vector space in its symmetric algebra.
 
Commutative algebras are a [[reflective subcategory]] of algebras; given an algebra ''A'', one can quotient out by its commutator ideal generated by ''ab'' - ''ba'', obtaining a commutative algebra, analogously to [[abelianization]] of a group. The construction of the symmetric algebra as a quotient of the tensor algebra is, as functors, a composition of the free algebra functor with this reflection.
 
==Analogy with exterior algebra==
The ''S''<sup>''k''</sup> are [[functor]]s comparable to the [[exterior power]]s; here, though, the [[dimension (linear algebra)|dimension]] grows with ''k''; it is given by
:<math>\operatorname{dim}(S^k(V)) = \binom{n+k-1}{k}</math>
where ''n'' is the dimension of ''V''.  This binomial coefficient is the number of ''n''-variable monomials of degree ''k''.
 
==Module analog==
The construction of the symmetric algebra generalizes to the symmetric algebra ''S''(''M'') of a [[module (mathematics)|module]] ''M'' over a [[commutative ring]]. If ''M'' is a [[free module]] over the ring ''R'', then its symmetric algebra is isomorphic to the polynomial algebra over ''R'' whose indeterminates are a basis of ''M'', just like the symmetric algebra of a vector space. However, that is not true if ''M'' is not free; then ''S''(''M'') is more complicated.
 
==As a universal enveloping algebra==
The symmetric algebra ''S''(''V'') is the [[universal enveloping algebra]] of an  [[abelian Lie algebra]], i.e. one in which the Lie bracket is identically 0.
 
==See also==
* [[exterior algebra]], the anti-symmetric analog
* [[Weyl algebra]], a [[:Category:Mathematical quantization|quantum deformation]] of the symmetric algebra by a [[symplectic form]]
* [[Clifford algebra]], a [[quantization (physics)|quantum deformation]] of the exterior algebra by a [[quadratic form]]
 
==References==
* {{citation|first = Nicolas|last=Bourbaki|authorlink=Nicolas Bourbaki | title = Elements of mathematics, Algebra I| publisher = Springer-Verlag | year = 1989|isbn=3-540-64243-9}}
 
[[Category:Algebras]]
[[Category:Multilinear algebra]]
[[Category:Polynomials]]
[[Category:Ring theory]]

Latest revision as of 14:39, 16 October 2014

Chance to encounter at all from the restaurant, Kelly was demonstrated to Teresa's dad. Instantly, Kelly caught a search at her own grandfather. Simply serving coffee and exchanging several words and phraases endured convinced Kelly: Here constitutes an man, an outstanding man, who dearly is motivated by his family. Teresa must meet my how own Dad.

To appreciate coins and gems, you will obtain the Clash behind Clans hack equipment to clicking on the obtain button. Contingent towards the operating framework that tend to be utilizing, you will do the trick the downloaded document mainly because admin. Furnish one particular log in Id and select the gadget. When this, you are get into the quantity of necklaces or coins that you should have and start off one particular Clash of Clans hack into instrument.

Assuming you have little ones who satisfaction from video games, then you're aware challenging it really is to pull them out among the t. v.. Their eye can automatically be stuck towards the monitor for hours as companies play their preferred computer games. If you want aid regulating your little one's clash of clans Hack time, your pursuing article has some hints for you.

There are no consequences in the least to assist you attacking other players in addition to losing, so just confrontation and savor it. Win or lose, you may lose the a great deal troops you have in the the attack since they'll are only beneficial time for one mission, nevertheless, somebody can steal more money with the enemy community than it cost which will make the troops. And you just build more troops within your new barracks. Its a good solid good idea to attain them queued up before you start you decide to treat and that means most people are rebuilding your members of the military through the battle.

No matter the reason, computer game power tips are widespread and spread fairly rapidly over the online market place. The gaming community is wanting to find means to prevent cheaters from overrunning whichever game; having lots off cheaters playing a one particular game can really produce honest players to left playing, or play simply with friends they trust. This poses a monumental problem particularly for subscription games for example EverQuest, wherein a loss for players ultimately result in the loss of income.

Be mindful about letting your tiddler play online video games, especially games with live sound. In case you have just about any queries relating to exactly where along with tips on how to use clash of clans hack tool android, it is possible to contact us on the web-page. There can be foul language in many channels, in addition many bullying behavior. Could also be child predators in this type of chat rooms. Exactly what your child is buying and surveil these conversation times due to the company's protection.

A lot of our options are considered and approved from the top virus recognition software not to mention anti-virus in the industry to ensure a security-level as large as you can, in predicament you fear for protection of your computer or maybe cellular device, no troubles. In case you nevertheless have any doubts, take a examine the movie and you'll notice it operates and it's very 100% secure! It takes merely a few moments of your time!