Restriction (mathematics)

From The Right Wiki
(Redirected from )
Jump to navigationJump to search
File:Inverse square graph.svg
The function x2 with domain does not have an inverse function. If we restrict x2 to the non-negative real numbers, then it does have an inverse function, known as the square root of x.

In mathematics, the restriction of a function f is a new function, denoted f|A or fA, obtained by choosing a smaller domain A for the original function f. The function f is then said to extend f|A.

Formal definition

Let f:EF be a function from a set E to a set F. If a set A is a subset of E, then the restriction of f to A is the function[1] f|A:AF given by f|A(x)=f(x) for xA. Informally, the restriction of f to A is the same function as f, but is only defined on A. If the function f is thought of as a relation (x,f(x)) on the Cartesian product E×F, then the restriction of f to A can be represented by its graph,

G(f|A)={(x,f(x))G(f):xA}=G(f)(A×F),

where the pairs (x,f(x)) represent ordered pairs in the graph G.

Extensions

A function F is said to be an extension of another function f if whenever x is in the domain of f then x is also in the domain of F and f(x)=F(x). That is, if domainfdomainF and F|domainf=f. A linear extension (respectively, continuous extension, etc.) of a function f is an extension of f that is also a linear map (respectively, a continuous map, etc.).

Examples

  1. The restriction of the non-injective functionf:,xx2 to the domain +=[0,) is the injectionf:+,xx2.
  2. The factorial function is the restriction of the gamma function to the positive integers, with the argument shifted by one: Γ|+(n)=(n1)!

Properties of restrictions

  • Restricting a function f:XY to its entire domain X gives back the original function, that is, f|X=f.
  • Restricting a function twice is the same as restricting it once, that is, if ABdomf, then (f|B)|A=f|A.
  • The restriction of the identity function on a set X to a subset A of X is just the inclusion map from A into X.[2]
  • The restriction of a continuous function is continuous.[3][4]

Applications

Inverse functions

For a function to have an inverse, it must be one-to-one. If a function f is not one-to-one, it may be possible to define a partial inverse of f by restricting the domain. For example, the function f(x)=x2 defined on the whole of is not one-to-one since x2=(x)2 for any x. However, the function becomes one-to-one if we restrict to the domain 0=[0,), in which case f1(y)=y. (If we instead restrict to the domain (,0], then the inverse is the negative of the square root of y.) Alternatively, there is no need to restrict the domain if we allow the inverse to be a multivalued function.

Selection operators

In relational algebra, a selection (sometimes called a restriction to avoid confusion with SQL's use of SELECT) is a unary operation written as σaθb(R) or σaθv(R) where:

  • a and b are attribute names,
  • θ is a binary operation in the set {<,,=,,,>},
  • v is a value constant,
  • R is a relation.

The selection σaθb(R) selects all those tuples in R for which θ holds between the a and the b attribute. The selection σaθv(R) selects all those tuples in R for which θ holds between the a attribute and the value v. Thus, the selection operator restricts to a subset of the entire database.

The pasting lemma

The pasting lemma is a result in topology that relates the continuity of a function with the continuity of its restrictions to subsets. Let X,Y be two closed subsets (or two open subsets) of a topological space A such that A=XY, and let B also be a topological space. If f:AB is continuous when restricted to both X and Y, then f is continuous. This result allows one to take two continuous functions defined on closed (or open) subsets of a topological space and create a new one.

Sheaves

Sheaves provide a way of generalizing restrictions to objects besides functions. In sheaf theory, one assigns an object F(U) in a category to each open set U of a topological space, and requires that the objects satisfy certain conditions. The most important condition is that there are restriction morphisms between every pair of objects associated to nested open sets; that is, if VU, then there is a morphism resV,U:F(U)F(V) satisfying the following properties, which are designed to mimic the restriction of a function:

  • For every open set U of X, the restriction morphism resU,U:F(U)F(U) is the identity morphism on F(U).
  • If we have three open sets WVU, then the composite resW,VresV,U=resW,U.
  • (Locality) If (Ui) is an open covering of an open set U, and if s,tF(U) are such that s|Ui=t|Ui for each set Ui of the covering, then s=t; and
  • (Gluing) If (Ui) is an open covering of an open set U, and if for each i a section xiF(Ui) is given such that for each pair Ui,Uj of the covering sets the restrictions of si and sj agree on the overlaps: si|UiUj=sj|UiUj, then there is a section sF(U) such that s|Ui=si for each i.

The collection of all such objects is called a sheaf. If only the first two properties are satisfied, it is a pre-sheaf.

Left- and right-restriction

More generally, the restriction (or domain restriction or left-restriction) AR of a binary relation R between E and F may be defined as a relation having domain A, codomain F and graph G(AR)={(x,y)F(R):xA}. Similarly, one can define a right-restriction or range restriction RB. Indeed, one could define a restriction to n-ary relations, as well as to subsets understood as relations, such as ones of the Cartesian product E×F for binary relations. These cases do not fit into the scheme of sheaves.[clarification needed]

Anti-restriction

The domain anti-restriction (or domain subtraction) of a function or binary relation R (with domain E and codomain F) by a set A may be defined as (EA)R; it removes all elements of A from the domain E. It is sometimes denoted A ⩤ R.[5] Similarly, the range anti-restriction (or range subtraction) of a function or binary relation R by a set B is defined as R(FB); it removes all elements of B from the codomain F. It is sometimes denoted R ⩥ B.

See also

References

  1. Stoll, Robert (1974). Sets, Logic and Axiomatic Theories (2nd ed.). San Francisco: W. H. Freeman and Company. pp. [36]. ISBN 0-7167-0457-9.
  2. Halmos, Paul (1960). Naive Set Theory. Princeton, NJ: D. Van Nostrand. Reprinted by Springer-Verlag, New York, 1974. ISBN 0-387-90092-6 (Springer-Verlag edition). Reprinted by Martino Fine Books, 2011. ISBN 978-1-61427-131-4 (Paperback edition).
  3. Munkres, James R. (2000). Topology (2nd ed.). Upper Saddle River: Prentice Hall. ISBN 0-13-181629-2.
  4. Adams, Colin Conrad; Franzosa, Robert David (2008). Introduction to Topology: Pure and Applied. Pearson Prentice Hall. ISBN 978-0-13-184869-6.
  5. Dunne, S. and Stoddart, Bill Unifying Theories of Programming: First International Symposium, UTP 2006, Walworth Castle, County Durham, UK, February 5–7, 2006, Revised Selected ... Computer Science and General Issues). Springer (2006)