On loop identities that can be obtained by a nuclear identification

نویسندگان

  • Ales Drápal
  • Premysl Jedlicka
چکیده

We start by describing all the varieties of loops Q that can be defined by autotopisms αx, x ∈ Q, where αx is a composition of two triples, each of which becomes an autotopism when the element x belongs to one of the nuclei. In this way we obtain a unifying approach to Bol, Moufang, extra, Buchsteiner and conjugacy closed loops. We reprove some classical facts in a new way and show how Buchsteiner loops fit into the traditional context. In Section 6 we describe a new class of loops with coincinding left and right nuclei. These loops have remarkable properties and do not belong to any of the classical classes. We start this paper by investigating interactions of loop nuclei and loop identities via loop autotopisms. We shall observe that this is a natural way how to obtain nearly all loop varieties that have been studied in the past. To be more exact, we shall get in this way Moufang loops, left Bol loops, right Bol loops, extra loops, left conjugacy closed (LCC) loops, RCC loops and Buchsteiner loops. No other class of loops can be obtained by the method. In all these varieties the middle nucleus has to coincide with the left or the right nucleus. Furthermore, there exists no finite loop with trivial right nucleus and coinciding left and middle nuclei that would be of index two. However, there exist finite loops with coinciding left and middle nuclei that are of index two, in which the right nucleus is of order two. All such loops have to be left conjugacy closed. In Section 6 we shall construct a class of finite loops in which the left and right nuclei are coinciding and of index two, and the middle nucleus is of order two. Such loops clearly belong to none of the varieties mentioned above. After computing their multiplication groups we shall see that in many cases the inner mapping group is of order pq. Loops of this kind have been studied intensively in the past from the point of solvability of the multiplication group. This paper seems to describe the first known examples of such loops in which the nuclei do not coincide. The construction of Section 6 can be also used to present a new infinite series of finite G-loops. In Section 1 we explicitly describe the method of nuclear identification. This leads to a dozen of identities (cf. Table 1). By investigating them from the standpoint of the weak inverse property (WIP ) we obtain new conceptual proofs for a number of classical results. In Corollary 1.7 we point out that many of the investigated varieties can be described by normalizing properties involving the left 2000 Mathematics Subject Classification. Primary 20N05; Secondary 08A05.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Rapid detection of infectious bursal disease by loop-mediated isothermal amplification for field analysis

Infectious bursal disease (IBD) is an immunosuppressive, acute and highly contagious illness of growing-poultry stock infected with infectious bursal disease virus (IBDV). It is common in Pakistan, causing potential economic losses throughout the year. The objective of the study is to propose a rapid, sensitive and specific diagnostic tool, and compare it with existing commonly used reverse tra...

متن کامل

Nation, Ethnicity and Religion: Second Generation Muslims’ Social Identity in Scotland

Existing evidence seems to indicate that Muslims in Scotland have constructed hyphenated or hybrid identities that draw on religion, ethnicity and nationality. However, minor attention has been given to the differences in importance, meanings, and strengths of these identities, or the significance of their identity markers. Ethnic minority people can be identified with both their ethnic groups ...

متن کامل

Sectional anatomy quiz

This mage based series comprises of a quiz pertaining to the identification of salient anatomical structures expected to be seen at a given level on the computed tomography (CT) followed by examples of multiple representative pathologies that can be seen at the same level in a routine clinical setting. It is expected that this will improve confidence of nuclear physicians in interpretation of t...

متن کامل

Random Key Pre-Distribution Techniques against Sybil Attacks

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

متن کامل

REVERSE LOOP SUBDIVISION FOR GEOMETRY AND TEXTURES

Reverse subdivision aims at constructing a coarser representation of an object given by a fine polygon mesh. In this paper, we first derive a mask for reverse Loop subdivision that can be applied to both regular and extraordinary vertices. The mask is parameterized, and thus can also be used in reversing variants of Loop subdivision, such as those proposed by Warren and Litke. We apply this mas...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Eur. J. Comb.

دوره 31  شماره 

صفحات  -

تاریخ انتشار 2010