This file was handbuilt from CS202/Notes on 20051117, and may since have become out of date.
Contents
 WhyYouShouldKnowAboutMath
 So why do I need to learn all this nasty mathematics?
 But isn't math hard?
 Thinking about math with your heart
 WhatYouShouldKnowAboutMath
 Foundations and logic
 Fundamental mathematical objects
 Modular arithmetic and polynomials
 Linear algebra
 Graphs
 Counting
 Probability
 Tools
 PropositionalLogic
 PredicateLogic
 InferenceRules
 ProofTechniques
 SetTheory
 Naive set theory
 Operations on sets
 Axiomatic set theory
 Cartesian products, relations, and functions
 Constructing the universe
 Sizes and arithmetic
 Further reading
 NaturalNumbers
 Axioms
 Order properties
 PeanoAxioms
 InductionProofs
 Simple induction
 Strong induction
 Recursion
 Structural induction
 SummationNotation
 Summations
 Computing sums
 Products
 Other big operators
 RelationsAndFunctions
 StructuralInduction
 SolvingRecurrences
 The problem
 Guess but verify
 Converting to a sum
 The Master Theorem
 PigeonholePrinciple
 HowToCount
 What counting is
 Basic counting techniques
 Applying the rules
 An elaborate counting problem
 Further reading
 BinomialCoefficients
 Recursive definition
 Vandermonde's identity
 Sums of binomial coefficients
 Application: the inclusionexclusion formula
 Negative binomial coefficients
 Fractional binomial coefficients
 Further reading
 GeneratingFunctions
 Basics
 Some standard generating functions
 More operations on formal power series and generating functions
 Counting with generating functions
 Generating functions and recurrences
 Recovering coefficients from generating functions
 Asymptotic estimates
 Recovering the sum of all coefficients
 A recursive generating function
 Summary of operations on generating functions
 Variants
 Further reading
 ProbabilityTheory
 History and interpretation
 Probability axioms
 Probability as counting
 Independence and the intersection of two events
 Union of two events
 Conditional probability
 Random variables
 RandomVariables
 Random variables
 The distribution of a random variable
 The expectation of a random variable
 The variance of a random variable
 Probability generating functions
 Summary: effects of operations on expectation and variance of random variables
 The general case
 Relations
 Relations, digraphs, and matrices
 Operations on relations
 Classifying relations
 Equivalence relations
 Partial orders
 Closure
 GraphTheory
 Types of graphs
 Examples of graphs
 Graph terminology
 Some standard graphs
 Operations on graphs
 Paths and connectivity
 Cycles
 Proving things about graphs
 BipartiteGraphs
 Bipartite matching
 NumberTheory
 Divisibility and division
 Greatest common divisors
 The Fundamental Theorem of Arithmetic
 Modular arithmetic and residue classes
 DivisionAlgorithm
 ModularArithmetic
 ChineseRemainderTheorem
 GroupTheory
 Some common groups
 Arithmetic in groups
 Subgroups
 Homomorphisms and isomorphisms
 Cartesian products
 How to understand a group
 Subgroups, cosets, and quotients
 Homomorphisms, kernels, and the First Isomorphism Theorem
 Generators and relations
 Decomposition of abelian groups
 SymmetricGroup
 Why it's a group
 Cycle notation
 The role of the symmetric group
 Permutation types, conjugacy classes, and automorphisms
 Odd and even permutations
 AlgebraicStructures
 What algebras are
 Why we care
 Cheat sheet: axioms for algebras (and some notquite algebras)
 Classification of algebras with a single binary operation (with perhaps some other operations sneaking in later)
 Operations on algebras
 Algebraic structures with more binary operations
 Polynomials
 Division of polynomials
 Divisors and greatest common divisors
 Factoring polynomials
 The ideal generated by an irreducible polynomial
 FiniteFields
 A magic trick
 Fields and rings
 Polynomials over a field
 Algebraic field extensions
 Applications
 LinearAlgebra
 Matrices
 Vectors
 Linear combinations and subspaces
 Linear transformations
 Further reading
1. WhyYouShouldKnowAboutMath
2. So why do I need to learn all this nasty mathematics?
Why you should know about mathematics, if you are interested in ComputerScience: or, more specifically, why you should take CS202 or a comparable course:
 Computation is something that you can't see and can't touch, and yet (thanks to the efforts of generations of hardware engineers) it obeys strict, welldefined rules with astonishing accuracy over long periods of time.
 Computations are too big for you to comprehend all at once. Imagine printing out an execution trace that showed every operation a typical $500 desktop computer executed in one (1) second. If you could read one operation per second, for eight hours every day, you would die of old age before you got halfway through. Now imagine letting the computer run overnight.
So in order to understand computations, we need a language that allows us to reason about things we can't see and can't touch, that are too big for us to understand, but that nonetheless follow strict, simple, welldefined rules. We'd like our reasoning to be consistent: any two people using the language should (barring errors) obtain the same conclusions from the same information. Computer scientists are good at inventing languages, so we could invent a new one for this particular purpose, but we don't have to: the exact same problem has been vexing philosophers, theologians, and mathematicians for much longer than computers have been around, and they've had a lot of time to think about how to make such a language work. Philosophers and theologians are still working on the consistency part, but mathematicians (mostly) got it in the early 20thcentury. Because the first virtue of a computer scientist is laziness, we are going to steal their code.
3. But isn't math hard?
Yes and no. The human brain is not really designed to do formal mathematical reasoning, which is why most mathematics was invented in the last few centuries and why even apparently simple things like learning how to count or add require years of training, usually done at an early age so the pain will be forgotten later. But mathematical reasoning is very close to legal reasoning, which we do seem to be unusually good at. There is very little structural difference between the sentences
 "If x is in S, then x+1 is in S." (1)
and
 "If x is of royal blood, then x's child is of royal blood." (2)
but because the first is about boring numbers and the second is about fascinating social relationships and rules, most people have a much easier time deducing that to show somebody is royal we need to start with some known royal and follow a chain of descendants than they have deducing that to show that some number is in the set S. we need to start with some known element of S and show that repeatedly adding 1 gets us to the number we want. And yet to a logician these are the same processes of reasoning.
So why is statement (1) trickier to think about than statement (2)? Part of the difference is familiarity—we are all taught from an early age what it means to be somebody's child, to take on a particular social role, etc. For mathematical concepts, this familiarity comes with exposure and practice, just as with learning any other language. But part of the difference is that we humans are wired to understand and appreciate social and legal rules: we are very good at figuring out the implications of a (hypothetical) rule that says that any contract to sell a good to a consumer for $100 or more can be cancelled by the consumer within 72 hours of signing it provided the good has not yet been delivered, but we are not so good at figuring out the implications of a rule that says that a number is composite if and only if it is the product of two integer factors neither of which is 1. It's a lot easier to imagine having to cancel a contract to buy swampland in Florida that you signed last night while drunk than having to prove that 82 is composite. But again: there is nothing more natural about contracts than about numbers, and if anything the conditions for our contract to be breakable are more complicated than the conditions for a number to be composite.
4. Thinking about math with your heart
There are two things you need to be able to do to get good at mathematics (the creative kind that involves writing proofs, not the mechanical kind that involves grinding out answers according to formulas). One of them is to learn the language: to attain what mathematicians call mathematical maturity. You'll do that in CS202, if you pay attention. But the other is to learn how to activate the parts of your brain that are good at mathematicalstyle reasoning when you do math—the parts evolved to detect when the other primates in your primitive band of huntergatherers are cheating.
To do this it helps to get a little angry, and imagine that finishing a proof or unraveling a definition is the only thing that will stop your worst enemy from taking some valuable prize that you deserve. (If you don't have a worst enemy, there is always the UniversalQuantifier.) But whatever motivation you choose, you need to be fully engaged in what you are doing. Your brain is smart enough to know when you don't care about something, and if you don't believe that thinking about math is important, it will think about something else.
5. WhatYouShouldKnowAboutMath
List of things you should know about if you want to do ComputerScience.
6. Foundations and logic
Why: This is the assembly language of mathematics—the stuff at the bottom that everything else complies to.
 Propositional logic.
 Predicate logic.
 Axioms, theories, and models.
 Proofs.
 Induction and recursion.
7. Fundamental mathematical objects
Why: These are the mathematical equivalent of data structures, the way that more complex objects are represented.
 Naive set theory.
 Predicates vs sets.
 Set operations.
 Set comprehension.
 Russell's paradox and axiomatic set theory.
 Functions.
 Functions as sets.
 Injections, surjections, and bijections.
 Cardinality.
 Finite vs infinite sets.
 Sequences.
 Relations.
 Equivalence relations, equivalence classes, and quotients.
 Orders.
 The basic number tower.
 Countable universes: ℕ, ℤ, ℚ. (Can be represented in a computer.)
 Uncountable universes: ℝ, ℂ. (Can only be approximated in a computer.)
 Other algebras.
 The string monoid.
 ℤ/m and ℤ/p.
 Polynomials over various rings and fields.
8. Modular arithmetic and polynomials
Why: Basis of modern cryptography.
 Arithmetic in ℤ/m.
 Primes and divisibility.
 Euclid's algorithm and inverses.
 The Chinese Remainder Theorem.
 Fermat's Little Theorem and Euler's Theorem.
 RSA encryption.
 Galois fields and applications.
9. Linear algebra
Why: Shows up everywhere.
 Vectors and matrices.
 Matrix operations and matrix algebra.
 Geometric interpretations.
 Inverse matrices and Gaussian elimination.
10. Graphs
Why: Good for modeling interactions. Basic tool for algorithm design.
 Definitions: graphs, digraphs, multigraphs, etc.
 Paths, connected components, and stronglyconnected components.
 Special kinds of graphs: paths, cycles, trees, cliques, bipartite graphs.
 Subgraphs, induced subgraphs, minors.
11. Counting
Why: Basic tool for knowing how much resources your program is going to consume.
 Basic combinatorial counting: sums, products, exponents, differences, and quotients.
 Combinatorial functions.
 Factorials.
 Binomial coefficients.
 The 12fold way.
 Advanced counting techniques.
 Inclusionexclusion.
 Recurrences.
 Generating functions.
12. Probability
Why: Can't understand randomized algorithms or averagecase analysis without it. Handy if you go to Vegas.
 Discrete probability spaces.
 Events.
 Independence.
 Random variables.
 Expectation and variance.
 Probabilistic inequalities.
 Markov's inequality.
 Chebyshev's inequality.
 Chernoff bounds.
 Stochastic processes.
 Markov chains.
 Martingales.
 Branching processes.
13. Tools
Why: Basic computational stuff that comes up, but doesn't fit in any of the broad categories above. These topics will probably end up being mixed in with the topics above.
These you will have seen before:
 How to differentiate and integrate simple functions.
 Things you may have forgotten about exponents and logarithms.
These may be somewhat new:
 Inequalities and approximations.
 ∑ and ∏ notation.
 Computing or approximating the value of a sum.
 Asymptotics.
14. PropositionalLogic
15. PredicateLogic
16. InferenceRules
17. ProofTechniques
18. SetTheory
Set theory is the dominant foundation for mathematics. The idea is that everything else in mathematics—numbers, functions, etc.—can be written in terms of sets, so that if you have a consistent description of how sets behave, then you have a consistent description of how everything built on top of them behaves. If predicate logic is the machine code of mathematics, set theory would be assembly language.
Contents
19. Naive set theory
Naive set theory is the informal version of set theory that corresponds to our intuitions about sets as unordered collections of objects (called elements) with no duplicates. A set can be written explicitly by listing its elements using curly braces:
{ } = the empty set ∅, which has no elements.
{ Moe, Curly, Larry } = the Three Stooges.
 { 0, 1, 2, ... } = ℕ, the natural numbers. Note that we are relying on the reader guessing correctly how to continue the sequence here.
 { { }, { 0 }, { 1 }, { 0, 1 }, { 0, 1, 2 }, 7 } = a set of sets of natural numbers, plus a stray natural number that is directly an element of the outer set.
Membership in a set is written using the ∈ symbol (pronounced "is an element of" or "is in"). So we can write Moe ∈ The Three Stooges or 4 ∈ ℕ. We can also write ∉ for "is not an element of", as in Moe ∉ ℕ.
A fundamental axiom in set theory is that the only distinguishing property of a set is its list of members: if two sets have the same members, they are the same set.
For nested sets like { { 1 } }, ∈ represents only direct membership: the set { { 1 } } only has one element, { 1 }, so 1 ∉ { { 1 } }. This can be confusing if you think of ∈ as representing the English "is in," because if I put my lunch in my lunchbox and put my lunchbox in my backpack, then my lunch is in my backpack. But my lunch is not an element of { { my lunch }, my textbook, my slingshot }. In general, ∈ is not transitive (see Relations)—it doesn't behave like < unless there is something very unusual about the set you are applying it to—and there is no particular notation for being a deeplyburied element of an element of an element (etc.) of some set.
In addition to listing the elements of a set explicitly, we can also define a set by set comprehension, where we give a rule for how to generate all of its elements. This is pretty much the only way to define an infinite set without relying on guessing, but can be used for sets of any size. Set comprehension is usually written using setbuilder notation, as in the following examples:
{ x  x∈ℕ ∧ x > 1 ∧ ∀y∈ℕ∀z∈ℕ yz = x ⇒ y = 1 ∨ z = 1 } = the prime numbers.
 { 2x  x∈ℕ } = the even numbers.
{ x  x∈ℕ ∧ x < 12 } = { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11 }.
Sometimes the original set that an element has to be drawn from is put on the lefthand side of the pipe:
{ n∈ℕ  ∃x,y,z∈ℕ x > 0 ∧ y > 0 ∧ x^{n} + y^{n} = z^{n} }. (This is a fancy name for the twoelement set { 1, 2 }; see Fermat's Last Theorem.)
Using set comprehension, we can see that every set in naive set theory is equivalent to some predicate. Given a set S, the corresponding predicate is x∈S, and given a predicate P, the corresponding set is { x  Px }. But beware of Russell's paradox: what is { S  S∉S }?
20. Operations on sets
If we think of sets as representing predicates, each logical connective gives rise to a corresponding operation on sets:
A∪B = { x  x∈A ∨ x∈B }. The union of A and B.
A∩B = { x  x∈A ∧ x∈B }. The intersection of A and B.
A∖B = { x  x∈A ∧ x∉B }. The set difference of A and B.
A∆B = { x  x∈A ⊕ x∈B }. The symmetric difference of A and B.
(Of these, union and intersection are the most important in practice.)
Corresponding to implication is the notion of a subset:
 A⊆B ("A is a subset of B") if and only if ∀x x∈A ⇒ x∈B.
Sometimes one says A is contained in B if A⊆B. This is one of two senses in which A can be "in" B—it is also possible that A is in fact an element of B (A∈B). For example, the set A = { 12 } is an element of the set B = { Moe, Larry, Curly, { 12 } } but A is not a subset of B, because A's element 12 is not an element of B. Usually we will try to reserve "is in" for ∈ and "is contained in" for ⊆, but it's safest to use the symbols to avoid any possibility of ambiguity.
Finally we have the settheoretic equivalent of negation:
Ā = { x  x∉A }. The set Ā is known as the complement of A.
If we allow complements, we are necessarily working inside some fixed universe: the complement of the empty set contains all possible objects. This raises the issue of where the universe comes from. One approach is to assume that we've already fixed some universe that we understand (e.g. ℕ), but then we run into trouble if we want to work with different classes of objects at the same time. Modern set theory is defined in terms of a collection of axioms that allow us to construct, essentially from scratch, a universe big enough to hold all of mathematics without apparent contradictions while avoiding the paradoxes that may arise in naive set theory.
21. Axiomatic set theory
The problem with naive set theory is that unrestricted set comprehension is too strong, leading to contradictions. Axiomatic set theory fixes this problem by being more restrictive about what sets one can form. The axioms most commonly used are known as ZermeloFraenkel set theory with choice or ZFC. The page AxiomaticSetTheory covers these axioms in painful detail, but in practice you mostly just need to know what constructions you can get away with.
The short version is that you can construct sets by (a) listing their members, (b) taking the union of other sets, or (c) using some predicate to pick out elements or subsets of some set. The starting points for this process are the empty set ∅ and the set ℕ of all natural numbers (suitably encoded as sets). If you can't construct a set in this way (like the Russell's Paradox set), odds are that it isn't a set.
These properties follow from the more useful axioms of ZFC:
 Extensionality
 Any two sets with the same members are equal.
 Existence
 ∅ is a set.
 Pairing
 For any given list of sets x, y, z, ..., { x, y, z, ... } is a set. (Strictly speaking, pairing only gives the existence of { x, y }, and the more general result requires the next axiom as well.)
 Union
 For any given set of sets { x, y, z, ... }, the set x ∪ y ∪ z ∪ ... exists.
 Power set
 For any set S, the power set ℘(S) = { A  A ⊆ S } exists.
 Specification
For any set S and any predicate P, the set { x∈S  P(x) } exists. This is called restricted comprehension. Limiting ourselves to constructing subsets of existing sets avoids Russell's Paradox, because we can't construct S = { x  x ∉ x }. Instead, we can try to construct S = { x∈T  x∉x }, but we'll find that S isn't an element of T, so it doesn't contain itself without creating a contradiction.
 Infinity
 ℕ exists, where ℕ is defined as the set containing ∅ and containing x∪{x} whenever it contains x. Here ∅ represents 0 and x∪{x} represents the successor operation. This effectively defines each number as the set of all smaller numbers, e.g. 3 = { 0, 1, 2 } = { ∅, { ∅ }, { ∅, { ∅ } } }. Without this axiom, we only get finite sets.
There are three other axioms that don't come up much in computer science:
 Foundation
Every nonempty set A contains a set B with A∩B=∅. This rather technical axiom prevents various weird sets, such as sets that contain themselves or infinite descending chains A_{0} ∋ A_{1} ∋ A_{2} ∋ ... .
 Replacement
 If S is a set, and R(x,y) is a predicate with the property that ∀x ∃!y R(x,y), then { y  ∃x∈S R(x,y) } is a set. Mostly used to construct astonishingly huge infinite sets.
 Choice
 For any set of nonempty sets S there is a function f that assigns to each x in S some f(x) ∈ x.
22. Cartesian products, relations, and functions
Sets are unordered: the set { a, b } is the same as the set { b, a }. Sometimes it is useful to consider ordered pairs (a, b), where we can tell which element comes first and which comes second. These can be encoded as sets using the rule (a, b) = { {a}, {a, b} }.
Given sets a and b, their Cartesian product a × b is the set { (x,y)  x ∈ a ∧ y ∈ b }, or in other words the set of all ordered pairs that can be constructed by taking the first element from a and the second from b. If a has n elements and b has m, then a × b has nm elements. For example, { 1, 2 } × { 3, 4 } = { (1,3), (1,4), (2,3), (2,4) }.
Because of the ordering, Cartesian product is not commutative in general. We usually have A×B ≠ B×A (exercise: when are they equal?).
The existence of the Cartesian product of any two sets can be proved using the axioms we already have: if (x,y) is defined as { {x}, {x,y} }, then ℘(a ∪ b) contains all the necessary sets {x} and {x,y}, and ℘℘(a ∪ b) contains all the pairs { {x}, {x,y} }. It also contains a lot of other sets we don't want, but we can get rid of them using Specification.
A subset of the Cartesian product of two sets is called a relation. An example would be the < relation on the natural numbers: { (0, 1), (0, 2), ...; (1, 2), (1, 3), ...; (2, 3), ... }. Just as sets can act like predicates of one argument (where Px corresponds to x ∈ P), relations act like predicates of two arguments. Relations are often written between their arguments, so xRy is shorthand for (x,y) ∈ R.
A special class of relations are functions. A function from a domain A to a codomain (or range) B is a relation on A and B (i.e., a subset of A × B) such that every element of A appears on the lefthand side of exactly one ordered pair. We write f: A⇒B as a short way of saying that f is a function from A to B, and for each x ∈ A write f(x) for the unique y ∈ B with (x,y) ∈ f. (Technically, knowing f alone does not tell you what the codomain is, since some elements of B may not show up at all; this can be fixed by representing a function as a pair (f,B), but it's generally not useful unless you are doing CategoryTheory.) Most of the time a function is specified by giving a rule for computing f(x), e.g. f(x) = x^{2}.
Functions let us define sequences of arbitrary length: for example, the infinite sequence x_{0}, x_{1}, x_{2}, ... of elements of some set A is represented by a function x:ℕ→A, while a shorter sequence (a_{0}, a_{1}, a_{2}) would be represented by a function a:{0,1,2}→A. In both cases the subscript takes the place of a function argument: we treat x_{n} as syntactic sugar for x(n). Finite sequences are often called tuples, and we think of the result of taking the Cartesian product of a finite number of sets A×B×C as a set of tuples (a,b,c) (even though the actual structure may be ((a,b),c) or (a,(b,c)) depending on which product operation we do first).
A function f:A→B that covers every element of B is called onto, surjective, or a surjection. If it maps distinct elements of A to distinct elements of B (i.e., if x≠y implies f(x)≠f(y)), it is called onetoone, injective, or an injection. A function that is both surjective and injective is called a onetoone correspondence, bijective, or a bijection. (The terms onto, onetoone, and bijection are probably the most common, although injective and surjective are often used as well, as they avoid the confusion between onetoone and onetoone correspondence.) Any bijection f has an inverse f^{1}; this is the function { (y,x)  (x,y) ∈ f }. Two functions f:A→B and g:B→C can be composed to give a composition g∘f; g∘f is a function from A to C defined by (g∘f)(x) = g(f(x)).
Bijections let us define the size of arbitrary sets without having some special means to count elements. We say two sets A and B have the same size or cardinality if there exists a bijection f:A↔B. We can also define A formally as the (unique) smallest ordinal B such that there exists a bijection f:A↔B. This is exactly what we do when we do counting: to know that there are 3 stooges, we count them off 0 → Moe, 1 → Larry, 2 → Curly, giving a bijection between the set of stooges and 3 = { 0, 1, 2 }.
More on functions and relations can be found on the pages Functions and Relations.
23. Constructing the universe
With power set, Cartesian product, the notion of a sequence, etc., we can construct all of the standard objects of mathematics. For example:
 Integers
 The integers are the set ℤ = { ..., 2, 1, 0, 1, 2, ... }. We represent each integer z as an ordered pair (x,y), where x=0 ∨ y=0; formally, ℤ = { (x,y) ∈ ℕ×ℕ  x=0 ∨ y=0 }. The interpretation of (x,y) is xy; so positive integers z are represented as (z,0) while negative integers are represented as (0,z). It's not hard to define addition, subtraction, multiplication, etc. using this representation.
 Rationals
 The rational numbers ℚ are all fractions of the form p/q where p is an integer, q is a natural number not equal to 0, and p and q have no common factors.
 Reals
The real numbers ℝ can be defined in a number of ways, all of which turn out to be equivalent. The simplest to describe is that a real number x is represented by the set { y∈ℚ  y≤x }. Formally, we consider any subset of x of ℚ with the property y∈x ∧ z<y ⇒ z∈x to be a distinct real number (this is known as a Dedekind cut). Note that real numbers in this representation may be hard to write down.
We can also represent standard objects of computer science:
 Deterministic finite state machines
A deterministic finite state machine is a tuple (Σ,Q,q_{0},δ,Q_{accept}) where Σ is an alphabet (some finite set), Q is a state space (another finite set), q_{0}∈Q is an initial state, δ:Q×Σ→Q is a transition function specifying which state to move to when processing some symbol in Σ, and Q_{accept}⊆Q is the set of accepting states. If we represent symbols and states as natural numbers, the set of all deterministic finite state machines is then just a subset of ℘ℕ×℘ℕ×ℕ×(ℕ^{ℕ×ℕ})×℘ℕ satisfying some consistency constraints.
24. Sizes and arithmetic
We can compute the size of a set by explicitly counting its elements; for example, ∅ = 0,  { Larry, Moe, Curly }  = 3, and  { x∈ℕ  x < 100 ∧ x is prime }  = 25. But sometimes it is easier to compute sizes by doing arithmetic. We can do this because many operations on sets correspond in a natural way to arithmetic operations on their sizes. (For much more on this, see HowToCount.)
Two sets A and B that have no elements in common are said to be disjoint; in settheoretic notation, this means A∩B = ∅. In this case we have A∪B = A+B. The operation of disjoint union acts like addition for sets. For example, the disjoint union of 2element set { 0, 1 } and the 3element set { Wakko, Jakko, Dot } is the 5element set { 0, 1, Wakko, Jakko, Dot }.
The size of a Cartesian product is obtained by multiplication: A×B = A⋅B. An example would be the product of the 2element set { a, b } with the 3element set { 0, 1, 2 }: this gives the 6element set { (a,0), (a,1), (a,2), (b,0), (b,1), (b,2) }. Even though Cartesian product is not generally commutative, since ordinary natural number multiplication is, we always have A×B = B×A.
For power set, it is not hard to show that ℘(S) = 2^{S}. This is a special case of the size of A^{B}, the set of all functions from B to A, which is A^{B}; for the power set we can encode P(S) using 2^{S}, where 2 is the special set {0,1}.
24.1. Infinite sets
For infinite sets, we take the above properties as definitions of addition, multiplication, and exponentiation of their sizes. The resulting system is known as cardinal arithmetic, and the sizes that sets (finite or infinite) might have are known as cardinal numbers.
The finite cardinal numbers are just the natural numbers: 0, 1, 2, 3, ... . The first infinite cardinal number is the size of the set of natural numbers, and is written as ℵ_{0} ("alephzero," "alephnull," or "alephnought"). The next infinite cardinal number is ℵ_{1} ("alephone"): it might or might not be the size of the set of real numbers, depending on whether you include the Generalized Continuum Hypothesis in your axiom system or not.
Infinite cardinals can behave very strangely. For example:
ℵ_{0}+ℵ_{0}=ℵ_{0}. In other words, it is possible to have two sets A and B that both have the same size as ℕ, take their disjoint union, and get another set A+B that has the same size as ℕ. To give a specific example, let A = { 2x  x∈ℕ } and B = { 2x+1  x∈ℕ }. These have A=B=ℕ because there is a bijection between each of them and ℕ built directly into their definitions. It's also not hard to see that A and B are disjoint, and A∪B = ℕ. So A=B=A+B in this case.
ℵ_{0}⋅ℵ_{0}=ℵ_{0}. Example: A bijection between ℕ×ℕ and ℕ using the Cantor pairing function <x,y> = (x+y+1)(x+y)/2 + y. The first few values of this are <0,0> = 0, <1,0> = 2⋅1/2+0 = 1, <0,1> = 2⋅1/2+1 = 1, <2,0> = 3⋅2/2 + 0 = 3, <1,1> = 3⋅2/2 + 1 = 4, <0,2> = 3⋅2/2 + 2 = 5, etc. The basic idea is to order all the pairs by increasing x+y, and then order pairs with the same value of x+y by increasing y; eventually every pair is reached.
ℕ^{*} = { all finite sequences of elements of ℕ } has size ℵ_{0}. One way to do this to define a function recursively by setting f([]) = 0 and f([first, rest]) = 1+<first,f(rest)>, where first is the first element of the sequence and rest is all the other elements. In class, we did the example f(0,1,2) = 1+<0,f(1,2)> = 1+<0,1+<1,f(2)>> = 1+<0,1+<1,1+<2,0>>> = 1+<0,1+<1,1+3>> = 1+<0,1+<1,4>> = 1+<0,1+19> = 1+<0,20> = 1+230 = 231. This assigns a unique element of ℕ to each finite sequence, which is enough to show ℕ^{*} ≤ ℕ; in fact, with some effort one can show that f is a bijection.
24.2. Countable sets
All of these sets have the property of being countable, which means that they can be put into a bijection with ℕ or one of its subsets. The general principle is that any sum or product of infinite cardinal numbers turns into taking the maximum of its arguments. The last case implies that anything you can write down using finitely many symbols (even if they are drawn from an infinite but countable alphabet) is countable. This has a lot of applications in computer science: one of them is that the set of all computer programs in any particular programming language is countable.
24.3. Uncountable sets
Exponentiation is different. We can easily show that 2^{ℵ₀} ≠ ℵ_{0}, or equivalently that there is no bijection between ℘ℕ and ℕ. This is done using Cantor's diagonalization argument.
 Theorem
 Let S be any set. Then there is no surjection f:S→℘S.
 Proof
 Let f:S→℘S be some function from S to subsets of S. We'll construct a subset of S that f misses. Let A = { x∈S  x∉f(x) }. Suppose A = f(y). Then y∈A ↔ y∉A, a contradiction. (Exercise: Why does A exist even though the Russell's Paradox set doesn't?)
Since any bijection is also a surjection, this means that there's no bijection between S and ℘S either, implying, for example, that ℕ is strictly less than ℘ℕ.
(On the other hand, it is the case that ℕ^{ℕ} = 2^{ℕ}, so things are still weird up here.)
Sets that are larger than ℕ are called uncountable. A quick way to show that there is no surjection from A to B is to show that A is countable but B is uncountable. For example:
 Corollary
 There are functions f:ℕ→{0,1} that are not computed by any computer program.
 Proof
Let P be the set of all computer programs that take a natural number as input and always produce 0 or 1 as output (assume some fixed language), and for each program p ∈ P, let f_{p} be the function that p computes. We've already argued that P is countable (each program is a finite sequence drawn from a countable alphabet), and since the set of all functions f:ℕ→{0,1} = 2^{ℕ} has the same size as ℘ℕ, it's uncountable. So some f gets missed: there is at least one function from ℕ to {0,1} that is not equal to f_{p} for any program p.
The fact that there are more functions from ℕ to ℕ than there are elements of ℕ is one of the reasons why set theory (slogan: "everything is a set") beat out lambda calculus (slogan: "everything is a function from functions to functions") in the battle over the foundations of mathematics. And this is why we do set theory in CS202 and lambda calculus gets put in CS201.
25. Further reading
See RosenBook §§2.1–2.2, BiggsBook Chapter 2, or Naive set theory.
26. NaturalNumbers
The natural numbers are the set ℕ = { 0, 1, 2, 3, .... }. These correspond to all possible sizes of finite sets; in a sense, the natural numbers are precisely those numbers that occur in nature: one can have a field with 0, 1, 2, 3, etc. sheep in it, but it's hard to have a field with 12 or 22/7 sheep in it.
Warning: While this is definition of ℕ is almost universally used in computer science, and is used in RosenBook, some mathematicians—including the author of BiggsBook—leave zero out of the natural numbers. There are several possible reasons why you might do this:
 You were born well before the invention of zero approximately two millenia back by the ancient Indians, Babylonians, and/or Mayans.
 You were taught by extremely conservative schoolmasters who still hadn't got a handle on this newfangled zero thing.
 You live in a country that is so rich in sheep that the thought of a field with no sheep in it seems unnatural.
 You are a number theorist, and you don't want to have follow "Let n be a natural number..." with "(except zero)" in every theorem you write.
My suspicion is that Biggs falls into the last category (and might fall into some of the earlier ones). For the purposes of CS202 we will adopt the usual convention in ComputerScience and start the naturals at zero. However, you should keep an eye out for assumptions that the natural numbers don't include zero. The terms positive integers (for {1, 2, 3, ...}) and nonnegative integers (for {0, 1, 2, 3, ...}) can also be helpful for avoiding confusion.
27. Axioms
There are several different ways to define the naturals. That these definitions all yield the same object is one of the reasons why they are so natural.
27.1. Peano axioms
The PeanoAxioms define the natural numbers directly from logic. It is not hard to show that the usual natural numbers satisfy these axioms (whether or not you throw out zero). Unfortunately, the Peano axioms by themselves don't give us many of the usual operations (like addition and multiplication) that we expect to be able to do to numbers.
27.2. Settheoretic definition
In SetTheory, a natural number is defined as a finite^{1} set x such that (a) every element y of x is also a subset of x, and (b) every element y of x is also a natural number. The existence of the set of natural numbers is asserted by the Axiom of Infinity. The smallest natural number is the empty set, which we take as representing 0. Next is 1 = { 0 }, 2 = { 0, 1 }, 3 = { 0, 1, 2 }, etc. It can easily be verified that each natural number defined in this way is indeed a subset of the next. It's not hard to show that these settheoretic natural numbers satisfy the Peano axioms, and it's possible to define addition and multiplication operations on them that satisfy the arithmetic and order axioms below (we'll see more of this in HowToCount). Ordering is by inclusion: for the settheoretic definition, n < m just in case n is an element of m.
27.3. Arithmetic and order axioms
Axioms for arithmetic in ℕ{0} are given in Section 4.1 of BiggsBook. RosenBook doesn't spend much time on axiomatizing the naturals, relying instead on the deep intuition about natural numbers that most of us had trained into us from early childhood.
You've probably already seen all of the usual axioms early in your mathematical education, with the possible exception of mz = nz implies m = n. Note that unlike the other axioms, this one does not extend to ℕ, since m⋅0 = n⋅0 = 0 for any m and n. An extended list of axioms for ℕ including zero might look like
 a+b is in ℕ. [Closure under addition]
 a⋅b is in ℕ. [Closure under multiplication]
 a+b = b+a. [Commutativity of addition]
 (a+b)+c = a+(b+c). [Associativity of addition]
 ab = ba. [Commutativity of multiplication]
 (ab)c = a(bc). [Associativity of multiplication]
 There is an element 1 of ℕ such that n1 = n for all n. [Multiplicative identity]
 mz = nz implies m = n when z ≠ 0 (see below for 0). [Multiplicative cancellation]
 a(b+c) = ab+ac. [Distributivity of multiplication over addition]
For any m and n, exactly one of n < m, n = m, or n > m is true. [Trichotomy]
 There is an element 0 of ℕ such that n+0 = n for all n. [Additive identity]
 0a = 0. [Multiplicative annihilator]
The numbering follows BiggsBook, except for the last two axioms, which don't appear in BiggsBook outside of Exercise 4.1.3.
Note that < is defined in terms of +. In our terms, n < m means that there exists some x such that x is not equal to 0 and n+x = m.
One problem with these axioms (as compared to the Peano axioms) is that they are not very restrictive: they work equally well for e.g. the nonnegative reals or the nonnegative rationals, and extend to all of the reals or the rationals if we adjust the definition of <. So the arithmetic axioms can't be used as a definition of the naturals, even though they are much more convenient for doing actual arithmetic than the more basic definitions.
Much of the work in logic in the early 20th century involved showing that addition, multiplication, etc. could be defined in terms of much more primitive operations like successor, and that the operations so defined behaved the way we'd expect. This program was not always popular with nonlogicians: as Henri_Poincaré put it (quoted in Bell and Machover's A Course in Mathematical Logic, NorthHolland, 1977): "On the contrary, I find nothing in logistic for the discoverer but shackles. It does not help us at all in the direction of conciseness, far from it: and if it requires 27 equations to establish that 1 is a number, how many will it requires to demonstrate a real theorem?" Thankfully, we get to build on these efforts, and can treat the arithmetic axioms as our own convenient library of lemmas rather than having to reach down into the raw logical swamps.
27.3.1. Formal definition of arithmetic operations in terms of successor
Here's a formal definition of + in terms of successor:
 ∀x 0+x = x.
 ∀x ∀y Sx+y = x+Sy.
This defines the sum of two natural numbers uniquely because we can use the second rule to move all the S's off of the first addend onto the second one, until we get down to zero (recall that under the PeanoAxioms a natural number like 37 is really just a convenient shorthand for SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS0).
Here's multiplication:
 ∀x 0x = 0.
 ∀x ∀y (Sx)y = xy + y.
With the above rules for addition, this lets us multiply any two numbers very slowly: SS0⋅SS0 = (S0⋅SS0) + SS0 = ((0⋅SS0) + SS0) + SS0 = (0 + SS0) + SS0 = SS0 + SS0 = S0 + SSS0 = 0 + SSSS0 = SSSS0. Normal people write this as 2⋅2 = 4 and skip all the S's.
Here's <:
x < y ⇔ ∃z (z ≠ 0 ∧ x+z = y).
Note that this fails badly if z ranges over a larger set, like the integers.
With enough time on your hands, it is in principle possible to prove all of the arithmetic axioms given earlier hold for these definitions of +, ⋅, and <.
28. Order properties
The < relation is a total order (see Relations). This means that in addition to trichotomy, transitivity holds: a < b and b < c implies a < c. Transitivity can be proved from the definition of < and axioms 112; see Exercise 4.2.1 in BiggsBook.
However, < is even stronger than this: it is also a well order. This means that any subset of the natural numbers has a least element, which is the key to carrying out InductionProofs.
29. PeanoAxioms
30. InductionProofs
31. Simple induction
Most of the ProofTechniques we've talked about so far are only really useful for proving a property of a single object (although we can sometimes use generalization to show that the same property is true of all objects in some set if we weren't too picky about which single object we started with). Mathematical induction (which mathematicians just call induction) is a powerful technique for showing that some property is true for many objects, where you can use the fact that it is true for small objects as part of the proof that it is true for large objects.
The basic framework for induction is as follows: given a sequence of statements P(0), P(1), P(2), we'll prove that P(0) is true (the base case), and then prove that for all k, P(k) ⇒ P(k+1) (the induction step). We then conclude that P(n) is in fact true for all n.
31.1. Why induction works
There are three ways to show that induction works, depending on where you got your natural numbers from.
 Peano axioms
If you start with the PeanoAxioms, induction is one of them. Nothing more needs to be said.
 Wellordering of the naturals
A set is wellordered if every subset has a smallest element. (An example of a set that is not wellordered is the integers ℤ.) If you build the natural numbers using 0 = { } and x+1 = x ∪ {x}, it is possible to prove that the resulting set is wellordered. Because it is wellordered, if P(n) does not hold for all n, there is a smallest n for which P(n) is false. But then either this n = 0, contradicting the base case, or P(n1) is true (because otherwise n would not be the smallest) and P(n) is false, contradicting the induction step.
 Method of infinite descent
The original version, due to Fermat, goes like this: Suppose P(n) is false for some n > 0. Since P(n1) ⇒ P(n) is logically equivalent to ¬P(n) ⇒ ¬P(n1), we can conclude (using the induction step) ¬P(n1). Repeat until you reach 0. The problem with this version is that the "repeat" step is in effect using an induction argument. The modern solution to this problem is to recast the argument to look like the wellordering argument above, by assuming that n is the smallest n for which P(n) is false and asserting a contradiction once you prove ¬P(n1). Historical note: Fermat may have used this technique to construct a plausible but invalid proof of his famous "Last Theorem" that a^{n}+b^{n}=c^{n} has no nontrivial integer solutions for n > 2.
31.2. Examples
The PigeonholePrinciple.
The number of subsets of an nelement set is 2^{n}.
1+3+5+7+...+(2n+1) = (n+1)^{2}.
2^{n} > n^{2} for n ≥ 5.
32. Strong induction
Sometimes when proving that the induction hypothesis holds for n+1, it helps to use the fact that it holds for all n' < n+1, not just for n. This sort of argument is called strong induction. Formally, it's equivalent to simple induction: the only difference is that instead of proving ∀k P(k) ⇒ P(k+1), we prove ∀k (∀m≤k Q(m)) ⇒ Q(k+1). But this is exactly the same thing if we let P(k) ≡ ∀m≤k Q(m), since if ∀m≤k Q(m) implies Q(k+1), it also implies ∀m≤k+1 Q(m), giving us the original induction formula ∀k P(k) ⇒ P(k+1).
32.1. Examples
Every n > 1 can be factored into a product of one or more prime numbers. Proof: By induction on n. The base case is n = 2, which factors as 2 = 2 (one prime factor). For n > 2, either (a) n is prime itself, in which case n = n is a prime factorization; or (b) n is not prime, in which case n = ab for some a and b, both greater than 1. Since a and b are both less than n, by the induction hypothesis we have a = p_{1}p_{2}...p_{k} for some sequence of one or more primes and similarly b = p'_{1}p'_{2}...p'_{k'}. Then n = p_{1}p_{2}...p_{k}p'_{1}p'_{2}...p'_{k'} is a prime factorization of n.
Every deterministic bounded twoplayer perfectinformation game that can't end in a draw has a winning strategy for one of the players. A perfectinformation game is one in which both players know the entire state of the game at each decision point (like Chess or Go, but unlike Poker or Bridge); it is deterministic if there is no randomness that affects the outcome (this excludes Backgammon and Monopoly, some variants of Poker, and multiple hands of Bridge), and it's bounded if the game is guaranteed to end in at most a fixed number of moves starting from any reachable position (this also excludes Backgammon and Monopoly). Proof: For each position x, let b(x) be the bound on the number of moves made starting from x. Then if y is some position reached from x in one move, we have b(y) < b(x) (because we just used up a move). Let f(x) = 1 if the first player wins starting from position x and f(x) = 0 otherwise. We claim that f is welldefined. Proof: If b(x) = 0, the game is over, and so f(x) is either 0 or 1, depending on who just won. If b(x) > 0, then f(x) = max { f(y)  y is a successor to x } if it's the first player's turn to move and f(x) = min { f(y)  y is a successor to x } if it's the second player's turn to move. In either case each f(y) is welldefined (by the induction hypothesis) and so f(x) is also welldefined.
The DivisionAlgorithm: for each n,m ∈ ℕ there is a unique q∈ℕ and a unique r∈ℕ such that n = qm+r and0≤r<m. Proof: Fix m then proceed by induction on n. If n < m, then if q > 0 we have n = qm+r ≥ 1⋅m ≥ m, a contradiction. So in this case q = 0 is the only solution, and since n = qm + r = r we have a unique choice of r = n. If n ≥ m, by the induction hypothesis there is a unique q' and r' such that nm = q'm+r' where 0≤r'<m. But then q = q'+1 and r = r' satisfies qm+r = (q'1+1)m+r = (q'm+r') + m = (nm) + m = n. To show that this solution is unique, if there is some other q'' and r'' such that q''m+r'' = n, then (q''1)m + r'' = nm = q'm+r', and by the uniqueness of q' and r' (ind. hyp. again), we have q''1 = q' = q1 and r'' = r' = r, giving that q'' = q and r'' = r. So q and r are unique.
33. Recursion
A definition with the structure of an inductive proof (give a base case and a rule for building bigger structures from smaller ones) Structures defined in this way are recursivelydefined.
Examples of recursivelydefined structures:
 Finite Von Neumann ordinals
 A finite von Neumann ordinal is either (a) the empty set ∅, or (b) x ∪ { x }, where x is a finite von Neumann ordinal.
 Complete binary trees
A complete binary tree consists of either (a) a leaf node, or (b) an internal node (the root) with two complete binary trees as children (or subtrees).
 Boolean formulas
 A boolean formula consists of either (a) a variable, (b) the negation operator applied to a Boolean formula, (c) the AND of two Boolean formulas, or (d) the OR of two Boolean formulas. A monotone Boolean formula is defined similarly, except that negations are forbidden.
 Finite sequences, recursive version
Before we defined a finite sequence as a function from some natural number (in its set form: n = { 0, 1, 2, ..., n1 }) to some range. We could also define a finite sequence over some set S recursively, by the rule: [ ] (the empty sequence) is a finite sequence, and if a is a finite sequence and x∈S, then (x,a) is a finite sequence. (Fans of LISP will recognize this method immediately.)
Key point is that in each case the definition of an object is recursivethe object itself may appear as part of a larger object. Usually we assume that this recursion eventually bottoms out: there are some base cases (e.g. leaves of complete binary trees or variables in Boolean formulas) that do not lead to further recursion. If a definition doesn't bottom out in this way, the class of structures it describes might not be welldefined (i.e., we can't tell if some structure is an element of the class or not).
33.1. Recursivelydefined functions
We can also define functions on recursive structures recursively:
 The depth of a binary tree
For a leaf, 0. For a tree consisting of a root with two subtrees, 1+max(d_{1}, d_{2}), where d_{1} and d_{2} are the depths of the two subtrees.
 The value of a Boolean formula given a particular variable assignment
 For a variable, the value (true or false) assigned to that variable. For a negation, the negation of the value of its argument. For an AND or OR, the AND or OR of the values of its arguments. (This definition is not quite as trivial as it looks, but it's still pretty trivial.)
Or we can define ordinary functions recursively:
 The Fibonacci series
Let F(0) = F(1) = 1. For n > 1, let F(n) = F(n1) + F(n2).
 Factorial
Let 0! = 1. For n > 0, let n! = n × (n1)!.
33.2. Recursive definitions and induction
Recursive definitions have the same form as an induction proof. There are one or more base cases, and one or more recursion steps that correspond to the induction step in an induction proof. The connection is not surprising if you think of a definition of some class of objects as a predicate that identifies members of the class: a recursive definition is just a formula for writing induction proofs that say that certain objects are members.
Recursivelydefined objects and functions also lend themselves easily to induction proofs about their properties; on general structures, such induction arguments go by the name of structural induction.
34. Structural induction
For finite structures, we can do induction over the structure. Formally we can think of this as doing induction on the size of the structure or part of the structure we are looking at.
Examples:
 Every complete binary tree with n leaves has n1 internal nodes
Base case is a tree consisting of just a leaf; here n = 1 and there are n  1 = 0 internal nodes. The induction step considers a tree consisting of a root and two subtrees. Let n_{1} and n_{2} be the number of leaves in the two subtrees; we have n_{1}+n_{2} = n; and the number of internal nodes, counting the nodes in the two subtrees plus one more for the root, is (n_{1}1)+(n_{2}1)+1 = n_{1}+n_{2}  1 = n1.
 Monotone Boolean formulas generate monotone functions
 What this means is that changing a variable from false to true can never change the value of the formula from true to false. Proof is by induction on the structure of the formula: for a naked variable, it's immediate. For an AND or OR, observe that changing a variable from false to true can only leave the values of the arguments unchanged, or change one or both from false to true (induction hypothesis); the rest follows by staring carefully at the truth table for AND or OR.
 Bounding the size of a binary tree with depth d
We'll show that it has at most 2^{d+1}1 nodes. Base case: the tree consists of one leaf, d = 0, and there are 2^{0+1}1 = 21 = 1 nodes. Induction step: Given a tree of depth d > 1, it consists of a root (1 node), plus two subtrees of depth at most d1. The two subtrees each have at most 2^{d1+1}1 = 2^{d}1 nodes (induction hypothesis), so the total number of nodes is at most 2(2^{d}1)+1 = 2^{d+1}+21 = 2^{d+1}1.
35. SummationNotation
36. Summations
Summations are the discrete versions of integrals; given a sequence x_{a}, x_{a+1}, ..., x_{b}, its sum x_{a} + x_{a+1} + ... + x_{b} is written as
The large jagged symbol is a stretchedout version of a capital Greek letter sigma. The variable i is called the index of summation, a is the lower bound or lower limit, and b is the upper bound or upper limit. Mathematicians invented this notation centuries ago because they didn't have for loops; the intent is that you loop through all values of i from a to b (including both endpoints), summing up the argument of the ∑ for each i.
If b < a, then the sum is zero. For example,
This rule mostly shows up as an extreme case of a more general formula, e.g.
which still works even when n=0 or n=1 (but not for n=2).
Summation notation is used both for laziness (it's more compact to write
than 1 + 3 + 5 + 7 + ... + (2n+1)) and precision (it's also more clear exactly what you mean).
36.1. Formal definition
For finite sums, we can formally define the value by either of two recurrences:
In English, we can compute a sum recursively by computing either the sum of the last n1 values or the first n1 values, and then adding in the value we left out. (For infinite sums we need a different definition; see below.)
36.2. Choosing and replacing index variables
When writing a summation, you can generally pick any index variable you like, although i, j, k, etc. are popular choices. Usually it's a good idea to pick an index that isn't used outside the sum. Though
has a welldefined meaning, the version on the righthand side is a lot less confusing.
In addition to renaming indices, you can also shift them, provided you shift the bounds to match. For example, rewriting
as
(by substituting j for i1) makes the sum more convenient to work with.
36.3. Scope
The scope of a summation extends to the first addition or subtraction symbol that is not enclosed in parentheses or part of some larger term (e.g., in the numerator of a fraction). So
Since this can be confusing, it is generally safest to wrap the sum in parentheses (as in the second form) or move any trailing terms to the beginning. An exception is when adding together two sums, as in
Here the looming bulk of the second Sigma warns the reader that the first sum is ending; it is much harder to miss than the relatively tiny plus symbol in the first example.
36.4. Sums over given index sets
Sometimes we'd like to sum an expression over values that aren't consecutive integers, or may not even be integers at all. This can be done using a sum over all indices that are members of a given index set, or in the most general form satisfy some given predicate (with the usual settheoretic caveat that the objects that satisfy the predicate must form a set). Such a sum is written by replacing the lower and upper limits with a single subscript that gives the predicate that the indices must obey.
For example, we could sum i^{2} for i in the set {3,5,7}:
Or we could sum the sizes of all subsets of a given set S:
Or we could sum the inverses of all prime numbers less than 1000:
Sometimes when writing a sum in this form it can be confusing exactly which variable or variables are the indices. The usual convention is that a variable is always an index if it doesn't have any meaning outside the sum, and if possible the index variable is put first in the expression under the Sigma if possible. If it is not obvious what a complicated sum means, it is generally best to try to rewrite it to make it more clear; still, you may see sums that look like
or
where the first sum sums over all pairs of values (i,j) that satisfy the predicate, with each pair appearing exactly once, and the second sums over all sets A that are subsets of S and contain x (assuming x and S are defined outside the summation). Hopefully, you will not run into too many sums that look like this, but it's worth being able to decode them if you do.
Sums over a given set are guaranteed to be welldefined only if the set is finite. In this case we can use the fact that there is a bijection between any finite set S and the ordinal S to rewrite the sum as a sum over indices in S. For example, if S = n, then there exists a bijection f:{0..n1}↔S, so we can define
If S is infinite, this is trickier. For countable S, where there is a bijection f:ℕ↔S, we can sometimes rewrite
and use the definition of an infinite sum (given below). Note that if the x_{i} have different signs the result we get may depend on which bijection we choose. For this reason such infinite sums are probably best avoided unless you can explicitly use ℕ as the index set.
36.5. Sums without explicit bounds
When the index set is understood from context, it is often dropped, leaving only the index, as in ∑_{i} i^{2}. This will generally happen only if the index spans all possible values in some obvious range, and can be a mark of sloppiness in formal mathematical writing. Theoretical physicists adopt a still more lazy approach, and leave out the ∑_{i} part entirely in certain special types of sums: this is known as the Einstein summation convention after the notoriously lazy physicist who proposed it.
36.6. Infinite sums
Sometimes you may see an expression where the upper limit is infinite, as in
The meaning of this expression is the limit of the series s obtained by taking the sum of the first term, the sum of the first two terms, the sum of the first three terms, etc. The limit converges to a particular value x if for any ε>0, there exists an N such that for all n > N, the value of s_{n} is within ε of x (formally, s_{n}x < ε). We will see some examples of infinite sums when we look at GeneratingFunctions.
36.7. Double sums
Nothing says that the expression inside a summation can't be another summation. This gives double sums, such as in this rather painful definition of multiplication for nonnegative integers:
If you think of a sum as a for loop, a double sum is two nested for loops. The effect is to sum the innermost expression over all pairs of values of the two indices.
Here's a more complicated double sum where the limits on the inner sum depend on the index of the outer sum:
When n=1, this will compute (0+1)(0+1) + (1+1)(0+1) + (1+1)(1+1) = 7. For larger n the number of terms grows quickly.
There are also triple sums, quadruple sums, etc.
37. Computing sums
When confronted with some nasty sum, it is nice to be able to convert into a simpler expression that doesn't contain any Sigmas. It is not always possible to do this, and the problem of finding a simpler expression for a sum is very similar to the problem of computing an integral (see HowToIntegrate): in both cases the techniques available are mostly limited to massaging the summation until it turns into something whose simpler expression you remember. To do this, it helps to both (a) have a big toolbox of sums with known values, and (b) have some rules for manipulating summations to get them into a more convenient form. We'll start with the toolbox.
37.1. Some standard sums
Here are the three formula you should either memorize or remember how to derive:
Rigorous proofs of these can be obtained by induction on n.
For not so rigorous proofs, the second identity can be shown (using a trick alleged to have been invented by the legendary 18thcentury mathematician Carl_Friedrich_Gauss at a frighteningly early age; see here for more details on this legend) by adding up two copies of the sequence running in opposite directions, one term at a time:
S = 1 + 2 + 3 + .... + n S = n + n1 + n2 + .... + 1  2S = (n+1) + (n+1) + (n+1) + .... + (n+1) = n(n+1),
and from 2S=n(n+1) we get S = n(n+1)/2.
For the last identity, start with
which holds when r < 1. The proof is that if
then
and so
Solving for S then gives S = 1/(1r).
We can now get the sum up to n by subtracting off the extra terms starting with r^{n+1}:
Amazingly enough, this formula works even when r is greater than 1. If r is equal to 1, then the formula doesn't work (it requires dividing zero by zero), but there is an easier way to get the solution.
Other useful sums can be found in various places. RosenBook and ConcreteMathematics both provide tables of sums in their chapters on GeneratingFunctions. But it is usually better to be able to reconstruct the solution of a sum rather than trying to memorize such tables.
37.2. Summation identities
The summation operator is linear. This means that constant factors can be pulled out of sums:
and sums inside sums can be split:
With multiple sums, the order of summation is not important, provided the bounds on the inner sum don't depend on the index of the outer sum:
Products of sums can be turned into double sums of products and vice versa:
These identities can often be used to transform a sum you can't solve into something simpler.
37.3. What to do if nothing else works
If nothing else works, you can try using the guess but verify method, which is a variant on the same method for identifying sequences. Here we write out the values of the sum for the first few values of the upper limit (for example), and hope that we recognize the sequence. If we do, we can then try to prove that a formula for the sequence of sums is correct by induction.
Example: Suppose we want to compute
but that it doesn't occur to us to split it up and use the ∑k and ∑1 formulas. Instead, we can write down a table of values:
n 
S(n) 
0 
0 
1 
1 
2 
1+3=4 
3 
1+3+5=9 
4 
1+3+5+7=16 
5 
1+3+5+7+9=25 
At this point we might guess that S(n) = n^{2}. To verify this, observe that it holds for n=0, and for larger n we have S(n) = S(n1) + (2n1) = (n1)^{2} + 2n  1 = n^{2}  2n + 1  2n  1 = n^{2}. So we can conclude that our guess was correct.
If this doesn't work, you could always try using GeneratingFunctions.
37.4. Strategies for asymptotic estimates
Mostly in AlgorithmAnalysis we do not need to compute sums exactly, because we are just going to wrap the result up in some asymptotic expression anyway (see AsymptoticNotation). This makes our life much easier, because we only need an approximate solution.
Here's my general strategy for computing sums:
37.4.1. Pull out constant factors
Pull as many constant factors out as you can (where constant in this case means anything that does not involve the summation index). Example:
37.4.2. Bound using a known sum
See if it's bounded above or below by some other sum whose solution you already know. Good sums to try (you should memorize all of these):
37.4.2.1. Geometric series
The way to recognize a geometric series is that the ratio between adjacent terms is constant. If you memorize the second formula, you can rederive the first one. If you're Carl_Friedrich_Gauss, you can skip memorizing the second formula.
A useful trick to remember for geometric series is that if x is a constant that is not exactly 1, the sum is always bigTheta of its largest term. So for example
(the exact value is 2^{n+1}2), and
(the exact value is 12^{n}). This fact is the basis of the Master Theorem, described in SolvingRecurrences. If the ratio between terms equals 1, the formula doesn't work; instead, we have a constant series (see below).
37.4.2.2. Constant series
37.4.2.3. Arithmetic series
The simplest arithmetic series is
The way to remember this formula is that it's just n times the average value (n+1)/2. The way to recognize an arithmetic series is that the difference between adjacent terms is constant. The general arithmetic series is of the form
Because the general series expands so easily to the simplest series, it's usually not worth memorizing the general formula.
37.4.2.4. Harmonic series
Can be rederived using the integral technique given below or by summing the last half of the series, so this is mostly useful to remember in case you run across H_{n} (the nth harmonic number).
37.4.3. Bound part of the sum
See if there's some part of the sum that you can bound. For example,
has a (painful) exact solution, or can be approximated by the integral trick described below, but it can very quickly be solved to within a constant factor by observing that
and
37.4.4. Integrate
Integrate. If f(n) is nondecreasing and you know how to integrate it, then
which is enough to get a bigTheta bound for almost all functions you are likely to encounter in algorithm analysis. If you don't remember how to integrate, see HowToIntegrate.
37.4.5. Grouping terms
Try grouping terms together. For example, the standard trick for showing that the harmonic series is unbounded in the limit is to argue that 1 + 1/2 + 1/3 + 1/4 + 1/5 + 1/6 + 1/7 + 1/8 + ... ≥ 1 + 1/2 + (1/4 + 1/4) + (1/8 + 1/8 + 1/8 + 1/8) + ... ≥ 1 + 1/2 + 1/2 + 1/2 + ... . I usually try everything else first, but sometimes this works if you get stuck.
37.4.6. Oddities
One oddball sum that shows up occasionally but is hard to solve using any of the above techniques is
If a < 1, this is Θ(1) (the exact formula for
when a < 1 is a/(1a)^{2}, which gives a constant upper bound for the sum stopping at n); if a = 1, it's just an arithmetic series; if a > 1, the largest term dominates and the sum is Θ(a^{n}n) (there is an exact formula, but it's ugly—if you just want to show it's O(a^{n}n), the simplest approach is to bound the series
by the geometric series
I wouldn't bother memorizing this one provided you bookmark this page.
37.4.7. Final notes
In practice, almost every sum you are likely to encounter in AlgorithmAnalysis will be of the form
where f(n) is exponential (so that it's bounded by a geometric series and the largest term dominates) or polynomial (so that f(n/2) = Θ(f(n)) and the sum is Θ(n f(n)) using the
lower bound).
ConcreteMathematics spends a lot of time on computing sums exactly. The most useful technique for doing this is to use GeneratingFunctions.
38. Products
What if you want to multiple a series of values instead of add them? The notation is the same as for a sum, except that you replace the Sigma with a Pi, as in this definition of the factorial function for nonnegative n.
The other difference is that while an empty sum is defined to have the value 0, an empty product is defined to have the value 1. The reason for this rule (in both cases) is that an empty sum or product should return the identity element for the corresponding operation—the value that when added to or multiplied by some other value x doesn't change x. This allows writing general rules like:
which holds as long as A∩B=Ø. Without the rule that the sum of an empty set was 0 and the product 1, we'd have to put in a special case for when one or both of A and B were empty.
Note that a consequence of this definition is that 0! = 1.
39. Other big operators
Some more obscure operators also allow you to compute some aggregate over a series, with the same rules for indices, lower and upper limits, etc., as ∑ and ∏. These include:
 Big AND:
 Big OR:
 Big Intersection:
 Big Union:
These all behave pretty much the way one would expect. One issue that is not obvious from the definition is what happens with an empty index set. Here the rule as with sums and products is to return the identity element for the operation. This will be True for AND, False for OR, and the empty set for union; for intersection, there is no identity element in general, so the intersection over an empty collection of sets is undefined.
40. RelationsAndFunctions
41. StructuralInduction
42. SolvingRecurrences
Notes on solving recurrences. These are originally from CS365, and emphasize asymptotic solutions; for CS202 we recommend also looking at GeneratingFunctions.
43. The problem
A recurrence or recurrence relation defines an infinite sequence by describing how to calculate the nth element of the sequence given the values of smaller elements, as in:
 T(n) = T(n/2) + n, T(0) = T(1) = 1.
In principle such a relation allows us to calculate T(n) for any n by applying the first equation until we reach the base case. To solve a recurrence, we will find a formula that calculates T(n) directly from n, without this recursive computation.
Not all recurrences are solvable exactly, but in most of the cases that arises in analyzing recursive algorithms, we can usually get at least an asymptotic (i.e. bigTheta) solution (see AsymptoticNotation).
By convention we only define T by a recurrence like this for integer arguments, so the T(n/2) by convention represents either T(floor(n/2)) or T(ceiling(n/2)). If we want an exact solution for values of n that are not powers of 2, then we have to be precise about this, but if we only care about a bigTheta solution we will usually get the same answer no matter how we do the rounding.^{2} From this point on we will assume that we only consider values of n for which the recurrence relation does not produce any noninteger intermediate values.
44. Guess but verify
As when solving any other mathematical problem, we are not required to explain where our solution came from as long as we can prove that it is correct. So the most general method for solving recurrences can be called "guess but verify". Naturally, unless you are very good friends with the existential quantifier you may find it had to come up with good guesses. But sometimes it is possible to make a good guess by iterating the recurrence a few times and seeing what happens.
44.1. Forward substitution
Let's consider the recurrence
 T(n) = T(n1) + 2n  1
 T(0) = 0
The method of forward substitution proceeds by generating the first halfdozen or so terms in the sequence described by the recurrence, in the hope that it will turn out to be a sequence we recognize. In this case, we can calculate
n
T(n)
0
0
1
1
2
4
3
9
4
16
5
25
and at this point we can shout "Aha! This example was carefully rigged to give T(n)=n²!". Unfortunately, there are infinitely many sequences that start with these six numbers, so we can't be fully sure that this is the right answer until we prove it. So let's do so.
We will show that T(n) = n² satisfies the above recurrence for all n, by induction on n. The base case is n = 0; here T(0) = 0 = 0². For n > 0, we have
 T(n) = T(n1) + 2n  1 = (n1)² + 2n  1 = n²  2n + 1 + 2n  1 = n²,
and we are done.
(Here we used the induction hypothesis where we replace T(n1) by (n1)². We will usually not be very explicit about this.)
Here's a less rigged example:
 T(n) = T(floor(n/2)) + n, T(0) = 0.
Computing small cases gives
n
T(n)
0
0
1
1
2
3
3
4
4
7
5
8
6
10
7
11
8
15
which doesn't really tell us much about the behavior for large values. We can easily add a few powers of 2 to get an idea of what happens later:
16
31
32
63
64
127
From this we might guess that the solution satisfies T(n) <= 2n (or perhaps T(n) <= 2n  1 for n > 0). So let's see if we can prove it:
 Base case
T(0) = 0 <= 2n.
 Induction step
For n > 0, T(n) = T(floor(n/2) + n <= 2 floor(n/2) + n <= 2(n/2) + n = 2n.
We might be able to prove a slightly tighter bound with more work, but this is enough to sho T(n) = O(n). Showing that T(n) = Omega(n) is trivial (since T(n) >= n), so we get T(n) = Θ(n) and we are done.
Applying the method of forward substitution requires a talent for recognizing sequences from their first few elements. If you are not born with this talent, you can borrow it from the mathematician Neal J. A. Sloane, or at least from his online Encyclopedia of Integer Sequences.
44.2. Backward substitution
Backward substitution, like forward substitution, tries to find a pattern from which we can guess a solution that we then prove using other techniquesbut now we start with T(n) and expand it recursively using the recurrence.
For example, if we consider the same T(n) = T(n/2) + n recurrence from above, and assume for simplicity that n is a power of 2, then we get
 T(n) = n + T(n/2) = n + n/2 + T(n/4) = n + n/2 + n/4 + T(n/8) = n + n/2 + n/4 + n/8 + T(n/16) = ...
From this we might reasonably guess that T(n) is bounded by
(See ComputingSums for how to compute this sum.) This is the same guess that we got from the method of forward substitution, so we prove that it works in the same way.
Note that in both methods we can omit how we got the guess from the final proof, though some readers might consider a refusal to explain a particularly good guess a form of teasing.
45. Converting to a sum
Some common recurrences appear often enough in AlgorithmAnalysis that it makes sense solve them once in general form, and then just apply the general solution as needed. You can either memorize these solutions, or, better yet, remember enough of how they are derived to be able to reconstruct them.
45.1. When T(n) = T(n1) + f(n)
This is the easiest case, which usually appears in DecreaseAndConquer algorithms. Here it is easy to see (and can be proved by induction) that
Example: for T(n) = T(n1) + n², we immediately have
which we can quickly show is Θ(n³) in any number of ways (see ComputingSums).
45.2. When T(n) = aT(n1) + f(n)
This is a little trickier, because as the arguments to the f's drop, they are multiplied by more and more a's. After some backward substitution it is not hard to recognize the pattern
Example: T(n) = 2T(n1) + n. Then from the formula
This turns out to be a rather painful sum to solve exactly, but we can reasonably guess that it's somewhere between 2^{n} and 2^{n}n, and try guessbutverify to whittle the range down further.
45.3. When T(n) = aT(n/b) + f(n)
This form of recurrence tends to arise from DivideAndConquer algorithms. For n = b^{k}, n/b = b^{k1}, which makes this recurrence a thinlydisguised version of the last one. We thus have
where log_{b} x = log x / log b, the baseb logarithm of x.
These sums can get ugly fast. Here's an unusually clean case:
 T(n) = 2T(n/2) + n.
Then
provided, of course, that n is a power of 2. For values of n that are not powers of 2, or for less conveniently constructed recurrences of this form, it is often better to skip directly to the Master Theorem.
46. The Master Theorem
The Master Theorem provides instant asymptotic solutions for many recurrences of the form T(n) = aT(n/b) + f(n), that apply for all values of n (not just powers of b). It is based on applying the analysis of the preceding section to various broad families of functions f, and then extending the results using a monotonicity argument to values of n that are not powers of b. Here we sketch out the proof; see LevitinBook Appendix B for a more detailed argument.
If f(n) = 0, then the recurrence is simply T(n) = aT(n/b). This has solution T(n) = n^{log[b] a} T(1) = Θ(n^{log[b] a}). (Example: T(n) = 4T(n/2) has solution Θ(n^{lg 4}) = Θ(n²).) We classify different cases of the Master Theorem based on how f(n) compares to this default solution.
Recall that the general solution is
T(n) = Sigma,,i=0 to log[b] n  1 a^{i} f(n/b^{i}) + n^{log[b] a} T(1).
We assume that T(1) = Θ(1) throughout.
Suppose that f(x) = x^{c}. Then a^{i} f(n/b^{i}) = a^{i} n^{c} / b^{ic} = n^{c} (a/b^{c})^{i}. The sum is then a geometric series with ratio (a/b^{c}), and its behavior depends critically on whether (a/b^{c}) is less than 1, equal to 1, or greater than 1.
If (a/b^{c}) is less than 1, then Sigma_{i=0 to infinity} n^{c} (a/b^{c})^{i} = n^{c}/(1(a/b^{c})) = O(n^{c}). This case arises when log(a/b^{c}) = log a  c log b is less than zero, which occurs precisely when c > log a / log b = log_{b} a. So if f(n) = n^{c}, the f(n) term in the sum dominates both the rest of the sum and the n^{log[b] a} term, and we get T(n) = Θ(f(n)). If f(n) is Omega(n^{c}), but satisfies the additional technical requirement that af(n/b) <= (1delta) f(n) for all n and some fixed delta > 0, then the geometric series argument still works with factor (1delta), and we still get T(n) = Θ(f(n)). This covers the case where f(n) = Omega(n^{log[b] a + epsilon}).
If (a/b^{c}) is equal to 1, then every term in the sum is the same, and the total is f(n) log_{b} n. In this case c = log_{b} a, so f(n) = n^{log[b] a} and f(n) log_{b} n dominates (barely) the T(1) term. An extended version of this analysis shows that the solution is T(n) = Θ(f(n) log n) when f(n) = Θ(n^{log[b] a}).
Finally, if (a/b^{c}) is greater than 1, we have a geometric series whose sum is proportional to its last term, which can be shown to be asymptotically smaller than the T(1) term. This case gives T(n) = Θ(n^{log[b] a}) for any f(n) = O(n^{log[b] a  epsilon}).
Summarizing, we have
If f(n) = O(n^{log[b] a  epsilon}), then T(n) = Θ(n^{log[b] a}).
If f(n) = Θ(n^{log[b] a}), then T(n) = Θ(f(n) log n).
If f(n) = Omega(n^{log[b] a + epsilon}), and there exists c < 1 such that a f(n/b) <= c f(n), then T(n) = Θ(f(n)).
These three cases do not cover all possibilities (consider T(n) = 2T(n/2) + n log n), but they will handle most recurrences of this form you are likely to encounter.
47. PigeonholePrinciple
48. HowToCount
Contents
49. What counting is
Recall that in SetTheory we formally defined each natural number as the set of all smaller natural numbers, so that n = { 0, 1, 2, ..., n1 }. Call a set finite if it can be put in onetoone correspondence with some natural number n. For example, the set S = { Larry, Moe, Curly } is finite because we can map Larry to 0, Moe to 1, and Curly to 2, and get a bijection between S and the set 3 = { 0, 1, 2 }. The size or cardinality of a finite set S, written S or #S, is just the natural number it can be put in onetoone correspondence with; that this is welldefined (gives a unique size for each finite set) follows from the Pigeonhole Principle (see below). In general, a cardinal number is a representative of some class of sets that can all put connected to each other by bijections; these include infinite cardinal numbers, discussed below.
Usually we will not provide an explicit bijection to compute the size of a set, but instead will rely on standard counting principles (see below). A proof that a set has a certain size (or that two sets have the same size) that does provide an explicit bijection is called a combinatorial proof. For sets of complicated objects, such proofs often provide additional insight into the structure of the objects.
49.1. Countable and uncountable sets
A set S is infinite if there is a bijection between S and some proper subset of S (proper subset means a subset that isn't equal to S), or equivalently if it can't be put in onetoone correspondence with any natural number. One of the smallest infinite sets is just the set of all naturals ℕ. Any infinite set also has a cardinality; as for finite sets, the cardinality of an infinite set is defined based on what other sets it can be put into onetoone correspondence with, and different infinite sets may have different cardinalities.
The smallest cardinality is ℵ_{0} (pronounced alephnought), the cardinality of ℕ. Any set S for which there exists a bijection f:S↔ℕ has cardinality ℵ_{0}. Examples include the set of all pairs of natural numbers (which can be mapped to single natural numbers using various encodings), the set of integers ℤ, the set of rationals ℚ, the set of all finite sequences of natural numbers (using more sophisticated encodings), the set of all computer programs (represent them as sequences of natural numbers, e.g., using ASCII encoding), the set of all possible finitelength texts in any language with a countable output, or the set of all mathematical objects that can be explicitly defined (each such definition is a finite text).
Sets with cardinality ℵ_{0} or less are called countable; sets with cardinality exactly ℵ_{0} are countably infinite.
That there are larger cardinalities is a consequence of a famous proof due to Georg Cantor, the diagonalization argument:
 Theorem
 Let S be any set. Then there is no surjection f:S→℘S.
 Proof
 Let f:S→℘S. We will show that f is not surjective, by constructing a subset A of S such that A≠f(x) for any x in S. Let A = { x  x∉f(x) }. Now choose some x and consider f(x). We have x∈A if and only if x∉f(x); so x is in exactly one of A and f(x), and in particular A≠f(x). It follows that A≠f(x) for all x, and thus that A isn't in the range of f.
Since any bijection is also a surjection, this means that S ≠ ℘S. For finite sets, this is pretty easy to show directly: it just says that n<2^{n} for all natural numbers n. For infinite sets, it means, for example, that ℕ ≠ ℘ℕ, or equivalently that ℘ℕ > ℵ_{0}. This means that ℘ℕ is uncountable.
The next largest cardinal after ℵ_{0} is called ℵ_{1} (alephone). The standard axioms of SetTheory provably can't tell us whether ℘ℕ = ℵ_{1} or not, but if we assume the Continuum hypothesis we can assert that ℘ℕ = ℵ_{1}. In this case ℵ_{1} not only gives the cardinality of the power set of the naturals, but also the cardinality of the set of real numbers ℝ, the set of complex numbers ℂ, the set of finite sequences of reals, etc. It does not give the cardinality of ℘ℝ or the set of functions f:ℝ→ℝ; these live (assuming a strengthened version of the Continuum hypothesis) up at ℵ_{2}.
Because Cantor's theorem applies even to these bigger sets, there is an infinite sequence of increasingly large cardinalities ℵ_{0}, ℵ_{1}, ℵ_{2}, ℵ_{3}, ... . Pretty much anything past about ℵ_{1} falls into the category of incomprehensibly large (not an actual mathematical term).
50. Basic counting techniques
Our goal here is to compute the size of some set of objects, e.g. the number of subsets of a set of size n, the number of ways to put k cats into n boxes so that no box gets more than one cat, etc.
In rare cases we can use the definition of the size of a set directly, by constructing a bijection between the set we care about and some natural number. For example, the set S_{n} = { x ∈ ℕ  x < n^{2} /\ ∃y: x = y^{2} } has exactly n members, because we can generate it by applying the onetoone correspondence f(y) = y^{2} to the set { 0, 1, 2, 3, ..., n1 } = n. But most of the time constructing an explicit onetoone correspondence is too timeconsuming or too hard, so having a few lemmas around that tell us what the size of a set will be can be handy.
50.1. Reducing to a previouslysolved case
If we can produce a bijection between a set A whose size we don't know and a set B whose size we do, then we get A=B. Pretty much all of our proofs of cardinality will end up looking like this.
50.2. Showing A ≤ B and B ≤ A
We write A ≤ B if there is an injection f:A→B, and similarly B ≤ A if there is an injection g:B→A. If both conditions hold, then there is a bijection between A and B, showing A = B. This fact is trivial for finite sets (it is a consequence of the Pigeonhole Principle), but for infinite sets—even though it is still true—the actual construction of the bijection is a little trickier. See CantorBernsteinSchroeder theorem if you really want the gory details.
Similarly, if we write A ≥ B to indicate that there is a surjection from A to B, then A ≥ B and B ≥ A implies A = B. The easiest way to show this is to observe that if there is a surjection f:A→B, then we can get an injection f':B→A by letting f'(y) be any element of { x  f(x) = y } (this requires the Axiom of Choice, but pretty much everybody assumes the Axiom of Choice).
Examples:
ℚ = ℕ. Proof: ℕ ≤ ℚ because we can map any n in ℕ to the same value in ℚ; this is clearly an injection. To show ℚ ≤ ℕ, observe that we can encode any element ±p/q of ℚ, where p and q are both natural numbers, as a triple <sign, p, q> where sign ∈ {0,1} indicates + (0) or  (1); this encoding is clearly injective. Then use the bijection from ℕ×ℕ to ℕ twice to crunch this triple down to a single natural number, getting an injection from ℚ to ℕ.
50.3. Sum rule
The sum rule says
 If A∩B=Ø, then A∪B = A + B.
Proof: Let f:A→A and g:B→B be bijections. Define h:A∪B→(A+B) by the rule h(x) = f(x) for x∈A, h(x) = A+g(x) for x∈B. We need to show that h is a bijection; we will do so by first showing that it is injective, then that it is surjective. Let x and y be distinct elements of A∪B. If x and y are both in A, then h(x) = f(x) ≠ f(y) = h(y); similarly if x and y are both in B, h(x) = A+g(x) ≠ A + g(y) = h(y). If x is in A and y in B, then h(x) = f(x) < A, and h(y) = g(y) + A ≥ A; it follows that h(x) ≠ h(y). The remaining case is symmetric. To show h is surjective, let m∈(A+B). If m < A, there exists some x∈A such that h(x) = f(x) = m. Otherwise, we have A ≤ m < A+B, so 0 ≤ m  A < B, and there exists some y∈B such that g(y) = mA. But then h(y) = g(y)+A = mA+A = m.
Generalizations: If A_{1}, A_{2}, A_{3} ... A_{k} are pairwise disjoint (i.e. A_{i} ∩ A_{j} = Ø for all i ≠j), then
The proof is by induction on k.
50.3.1. Examples
 As I was going to Saint Ives, I met a man with 7 wives, 28 children, 56 grandchildren, and 122 greatgrandchildren. Assuming these sets do not overlap, how many people did I meet? Answer: 1+7+28+56+122=214.
50.3.2. For infinite sets
The sum rule works for infinite sets, too; technically, the sum rule is used to define A+B as A∪B when A and B are disjoint. This makes cardinal arithmetic a bit wonky: if at least one of A and B is infinite, then A + B = max(A,B), since we can space out the elements of the larger of A and B and shoehorn the other into the gaps.
50.3.3. The Pigeonhole Principle
A consequence of the sum rule is that if A and B are both finite and A > B, you can't have an injection from A to B. The proof is by contraposition. Suppose f:A→B is an injection. Write A as the union of f^{1}(x) for each x∈B, where f^{1}(x) is the set of y in A that map to x. Because each f^{1}(x) is disjoint, the sum rule applies; but because f is an injection there is at most one element in each f^{1}(x). It follows that . (Question: Why doesn't this work for infinite sets?)
The Pigeonhole Principle generalizes in an obvious way to functions with larger domains; if f:A→B, then there is some x in B such that f^{1}(x) ≥ A/B.
50.4. Inclusionexclusion (with two sets)
What if A and B are not disjoint, i.e., if A∩B is not Ø? In this case adding A to B will count any element that appears in both sets twice. We can get the size of A∪B by subtracting off the overcount, obtaining this formula, which works for all A and B:
 A∪B = A + B  A∩B
To prove that the formula works, we use the sum rule. Observe that A = (A∩B) ∪ (BA) and that the union in this case is disjoint (recall that AB is the set of all elements that are in A but not in B). A similar decomposition works for B, so we have
 A + B = A∩B + BA + B∩A + AB = A∪B + A∩B.
Here we are again using the sum rule: A∪B is the disjoint union of AB, BA, and A∩B. Subtracting the A∩B term from both sides gives the formula we originally wanted.
This is a special case of the inclusionexclusion formula, which can be used to compute the size of the union of many sets using the size of pairwise, triplewise, etc. intersections of the sets.
50.4.1. For infinite sets
Subtraction doesn't work very well for infinite quantities (while ℵ_{0}+ℵ_{0}=ℵ_{0}, that doesn't mean ℵ_{0}=0). So the closest we can get to the inclusionexclusion formula is that A + B = A∪B + A∩B. If at least one of A or B is infinite, then A∪B is also infinite, and since A∩B ≤ A∪B we have A∪B + A∩B = A∪B by the usual but bizarre rules of cardinal arithmetic. So for infinite sets we have the rather odd result that A∪B = A + B = max(A,B) whether the sets overlap or not.
50.4.2. Combinatorial proof
We can prove A + B = A∪B + A∩B combinatorially, by turning both sides of the equation into disjoint unions (so the sum rule works) and then providing an explicit bijection between the resulting sets. The trick is that we can always force a union to be disjoint by tagging the elements with extra information; so on the lefthand side we construct L = {1}×A ∪ {2}×B, and on the righthand side we construct R = {1}×(A∪B) ∪ {2}×(A∩B). It is easy to see that both unions are disjoint, because we are always taking the union of a set of ordered pairs that start with 1 with a set of ordered pairs that start with 2, and no ordered pair can start with both tags; it follows that L = A + B and R = A∪B + A∩B. Now define the function f:L→R by the rule
 f((1,x)) = (1,x).
 f((2,x)) = (2,x) if x∈B∩A
 f((2,x)) = (1,x) if x∈B\A.
Observe that f is surjective, because for any (1,x) in {1}×(A∪B), either x is in A and (1,x) = f((1,x)) where (1,x) ∈ L, or x is in B\A and (1,x) = f((2,x)) where (2,x) ∈ L. It is also true that f is injective; the only way for it not to be is if f((1,x)) = f((2,x)) = (1,x) for some x. Suppose this occurs. Then x ∈ A (because of the 1 tag) and x ∈ B\A (because (2,x) is only mapped to (1,x) if x∈B\A). But x can't be in both A and B\A, so we get a contradiction.
50.5. Product rule
The product rule says that for any sets A and B
 A×B = A·B.
Recall that A×B is the Cartesian product of A and B, the set of all ordered pairs whose first element comes from A and whose second comes from B.
Proof (for finite sets): Let f:A→A and g:B→B be bijections. Construct a new function h:A×B→(A·B) by the rule h(<a,b>) = a·B + b. Showing that h is a bijection is left as an exercise to the reader (hint: use the DivisionAlgorithm).
The general form is
where the product on the left is a Cartesian product and the product on the right is an ordinary integer product.
50.5.1. Examples
As I was going to Saint Ives, I met a man with seven sacks, and every sack had seven cats. How many cats total? Answer: Label the sacks 0,1,2,...,6, and label the cats in each sack 0,1,2,...,6. Then each cat can be specified uniquely by giving a pair <sack number, cat number>, giving a bijection between the set of cats and the set 7×7. Since the 7×7=7·7=49, we have 49 cats.
Dr Frankenstein's trusty assistant Igor has brought him 6 torsos, 4 brains, 8 pairs of matching arms, and 4 pairs of legs. How many different monsters can Dr Frankenstein build? Answer: there is a onetoone correspondence between possible monsters and 4tuples of the form <torso, brain, pair of arms, pair of legs>; the set of such 4tuples has 6·4·8·4=728 members.
How many different ways can you order n items? Call this quantity n! (i.e., n factorial). With 0 or 1 items, there is only one way; so we have 0!=1!=1. For n > 1, there are n choices for the first item, leaving n1 items to be ordered. From the product rule we thus have n! = n·(n1)!, which we could also expand out as
As a generalization of the previous example, we can count the number of ways P(n,k) we can pick an ordered subset of k of n items without replacement, also known as picking a kpermutation. There are n ways to pick the first item, n1 to pick the second, and so forth, giving a total of
such kpermutations by the product rule.
Among combinatorialists, the notation (n)_{k} (pronounced "n lowerfactorial k") is more common than P(n,k) for n·(n1)·(n2)·...·(nk+1). As an extreme case we have (n)_{n} = n·(n1)·(n2)·...·(nn+1) = n·(n1)·(n2)·...·1 = n!.
50.5.2. For infinite sets
The product rule also works for infinite sets, becasue we again use it as a definition: for any A and B, A⋅B is defined to be A×B. One oddity for infinite sets is that this definition gives A⋅B = A+B = max(A,B), because if at least one of A and B is infinite, it is possible to construct a bijection between A×B and the larger of A and B. (Infinite sets are strange.)
50.6. Exponent rule
Given sets A and B, let A^{B} be the set of functions f:B→A. Then A^{B} = A^{B}.
If B is finite, this is just a Bfold application of the product rule: we can write any function f:B→A as a sequence of length B that gives the value in A for each input in B. Since each element of the sequence contributes A possible choices, we get A^B choices total.
For infinite sets, the exponent rule is a definition of A^{B}. The behavior of exponentiation for infinite cardinals is very strange indeed; see here for some properties of cardinal exponentiation if you are really interested.
To give a flavor of how exponentiation works for arbitrary sets, here's a combinatorial proof of the usual arithmetic fact that x^{a}x^{b} = x^{a+b}, for any cardinal numbers x, a, and b. Let x = X and let a = A and b = B where A and B are disjoint (we can always use the tagging trick that we used for inclusionexclusion to make A and B be disjoint). Then x^{a}x^{b} = X^{A}×X^{B} and x^{a+b} = X^{A∪B}. We will now construct an explicit bijection f:X^{A∪B}→X^{A}×X^{B}. The input to f is a function g:A∪B→X; the output is a pair of functions (g_{A}:A→X,g_{B}:B→X). We define g_{A} by g_{A}(x) = g(x) for all x in A (this makes g_{A} the restriction of g to A, usually written as gA or g⇂A); similarly g_{B} = gB. This is easily seen to be a bijection; if g = h, then f(g) = (gA,gB) = f(h) = (hA,hB), and if g≠h there is some x for which g(x)≠h(x), implying gA≠hA (if x is in A) or gB≠hB (if x is in B).
50.7. Counting the same thing in two different ways
An old farm joke:
 Q: How do you count a herd of cattle? A: Count the legs and divide by four.
Sometimes we can compute the size of a set S by using it (as an unknown variable) to compute the size of another set T (as a function of S), and then using some other way to count T to find its size, finally solving for S. This is known as counting two ways and is surprisingly useful when it works. We will assume that all the sets we are dealing with are finite, so we can expect things like subtraction and division to work properly.
Example: Let S be an nelement set, and consider the set S_{k} = { A⊆S  A = k }. What is S_{k}? Answer: First we'll count the number m of sequences of k elements of S with no repetitions. We can get such a sequence in two ways:
By picking a sizek subset A and then choosing one of k! ways to order the elements. This gives m = S_{k}·k!.
By choosing the first element in one of n ways, the second in one of n1, the third in one of n2 ways, and so on until the kth element, which can be chosen in one of nk+1 ways. This gives m = (n)_{k} = n·(n1)·(n2)·...(nk+1), which can be written as n!/(nk)!. (Here we are using the factors in (nk)! to cancel out the factors in n! that we don't want.)
So we have m = S_{k}·k! = n!/(nk)!, from which we get
This quantity turns out to be so useful that it has a special notation:
where the lefthand side is known as a binomial coefficient and is pronounced "n choose k." We discuss BinomialCoefficients at length on their own page. The secret of why it's called a binomial coefficient will be revealed when we talk about GeneratingFunctions.
Example: Here's a generalization of binomial coefficients: let the multinomial coefficient
be the number of different ways to distribute n items among k bins where the ith bin gets exactly n_{i} of the items and we don't care what order the items appear in each bin. (Obviously this only makes sense if n_{1}+n_{2}+...+n_{k}=n.) Can we find a simple formula for the multinomial coefficient?
Here are two ways to count the number of permutations of the nelement set:
 Pick the first element, then the second, etc. to get n! permuations.
 Generate a permutation in three steps:
Pick a partition of the n elements into groups of size n_{1}, n_{2}, ... n_{k}.
 Order the elements of each group.
 Paste the groups together into a single ordered list.
There are
ways to pick the partition and
ways to order the elements of all the groups, so we have
which we can solve to get
This also gives another way to derive the formula for a binomial coefficient, since
51. Applying the rules
If you're given some strange set to count, look at the structure of its description:
If it's given by a rule of the form x is in S if either P(x) or Q(x) is true, use the sum rule (if P and Q are mutually exclusive) or inclusionexclusion. This includes sets given by recursive definitions, e.g. x is a tree of depth at most k if it is either (a) a single leaf node (provided k > 0) or (b) a root node with two subtrees of depth at most k1. The two classes are disjoint so we have T(k) = 1 + T(k1)^{2} with T(0) = 0.^{3}
For objects made out of many small components or resulting from many small decisions, try to reduce the description of the object to something previously known, e.g. (a) a word of length k of letters from an alphabet of size n allowing repetition (there are n^{k} of them, by the product rule); (b) a word of length k not allowing repetition (there are (n)_{k} of them—or n! if n = k); (c) a subset of k distinct things from a set of size n, where we don't care about the order (there are of them); any subset of a set of n things (there are 2^{n} of them—this is a special case of (a), where the alphabet encodes nonmembership as 0 and membership as 1, and the position in the word specifies the element). Some examples:
The number of games of TicTacToe assuming both players keep playing until the board is filled is obtained by observing that each such game can be specified by listing which of the 9 squares are filled in order, giving 9! = 362,880 distinct games. Note that we don't have to worry about which of the 9 moves are made by X and which by O, since the rules of the game enforce it. (If we only consider games that end when one player wins, this doesn't work: probably the easiest way to count such games is to send a computer off to generate all of them. This horrible program says there are 255168 possible games and 958 distinct final positions.)
The number of completelyfilledin TicTacToe boards can be obtained by observing that any such board has 5 X's and 4 O's. So there are = 126 such positions. (Question: Why would this be smaller than the actual number of final positions?)
Sometimes reducing to a previous case requires creativity. For example, suppose you win n identical cars on a game show and want to divide them among your k greedy relatives. Assuming that you don't care about fairness, how many ways are there to do this?
If it's ok if some people don't get a car at all, then you can imagine putting n cars and k1 dividers in a line, where relative 1 gets all the cars up to the first divider, relative 2 gets all the cars between the first and second dividers, and so forth up to relative k who gets all the cars after the (k1)th divider. Assume that each car—and each divider—takes one parking space. Then you have n+k1 parking spaces with k1 dividers in them (and cars in the rest). There are exactly ways to do this.
Alternatively, suppose each relative demands at least 1 car. Then you can just hand out one car to each relative to start with, leaving nk cars to divide as in the previous case. There are ways to do this.
Finding such correspondences is a central part of enumerative combinatorics, the branch of mathematics that deals with counting things.
52. An elaborate counting problem
Suppose you have the numbers { 1, 2, .., 2n }, and you want to count how many sequences of k of these numbers you can have that are (a) increasing (a[i] < a[i+1] for all i), (b) decreasing (a[i] ≥ a[i+1] for all i), or (c) made up only of even numbers.
This is the union of three sets A, B, and C, corresponding to the three cases. The first step is to count each set individually; then we can start thinking about applying inclusionexclusion to get the size of the union.
For A, any increasing sequence can be specified by choosing its elements (the order is determined by the assumption it is increasing). So we have .
For B, by symmetry we have .
For C, we are just looking at n^{k} possible sequences, since there are n even numbers we can put in each position.
Inclusionexclusion says that A∪B∪C = A + B + C  A∩B  A∩C  B∩C + A∪B∪C. It's not hard to see that A∩B = ∅ when k is at least 2^{4}, so we can reduce this to A + B + C  A∩C  B∩C. To count A∩C, observe that we are now looking at increasing sequences chosen from the n possible even numbers; so there are exactly of them, and similarly for B∩C. Summing up gives a total of
sequences satisfying at least one of the criteria.
Note that we had to assume k = 2 to get A∩B=∅, so this formula might require some adjustment for k<2. In fact we can observe immediately that the unique empty sequence for k=1 fits in all of A, B, and C, so in this case we get 1 winning sequence (which happens to be equal to the value in the formula, because here A∩B=∅ for other reasons), and for k=1 we get 2n winning sequences (which is less than the value 3n given by the formula).
To test that the formula works for at least some larger values, let n=3 and k=2. Then the formula predicts total sequences.^{5} And here they are (generated by seqs.py run as python seqs.py 6 2):
[1, 2] [1, 3] [1, 4] [1, 5] [1, 6] [2, 1] [2, 2] [2, 3] [2, 4] [2, 5] [2, 6] [3, 1] [3, 2] [3, 4] [3, 5] [3, 6] [4, 1] [4, 2] [4, 3] [4, 4] [4, 5] [4, 6] [5, 1] [5, 2] [5, 3] [5, 4] [5, 6] [6, 1] [6, 2] [6, 3] [6, 4] [6, 5] [6, 6]
53. Further reading
RosenBook does basic counting in chapter 5 and more advanced counting (including SolvingRecurrences and using GeneratingFunctions) in chapter 7. BiggsBook chapters 6 and 10 give a basic introduction to counting, with more esoteric topics in chapters 11 and 12. ConcreteMathematics has quite a bit on counting various things.
54. BinomialCoefficients
Contents
The binomial coefficient "n choose k", written
counts the number of kelement subsets of an nelement set.
The name arises from the binomial theorem, which says that
For integer n, we can limit ourselves to letting k range from 0 to n. The most general version of the theorem lets k range over all of ℕ, and relies on the binomial coefficient to zero out the extra terms. It holds for any integer n ≥ 0 or (with a suitable definition of binomial coefficients) for any n if x/y < 1 (which guarantees that the sum converges).
The connection to counting subsets is straightforward: expanding (x+y)^{n} using the distributive law gives 2^{n} terms, each of which is a unique sequence of n x's and y's. If we think of the x's in each term as labeling a subset of the n positions in the term, the terms that get added together to get x^{k}y^{nk} correspond onetoone to subsets of size k. So there are
such terms, accounting for the coefficient on the righthand side.
55. Recursive definition
If we don't like computing factorials, we can also compute binomial coefficients recursively.
Base cases:
 If k = 0, then there is exactly one zeroelement set of our nelement set—it's the empty set—and we have
If k > n, then there are no kelement subsets, and we have
Recursive step: We'll use Pascal's identity, which says that
The proof of this identity is combinatorial, which means that we will construct an explicit bijection between a set counted by the lefthand side and a set counted by the righthand side. This is often one of the best ways of understanding simple binomial coefficient identities.
On the lefthand side, we are counting all the kelement subsets of an nelement set S. On the right hand side, we are counting two different collections of sets: the (k1)element and kelement subsets of an (n1)element set. The trick is to recognize that we get an (n1)element set S' from our original set by removing one of the elements x. When we do this, we affect the subsets in one of two ways:
 If the subset doesn't contain x, it doesn't change. So there is a onetoone correspondence (the identity function) between ksubsets of S that don't contain x and ksubsets of S'. This bijection accounts for the first term on the righthand side.
 If the subset does contain x, then we get a (k1)element subset of S' when we remove it. Since we can go back the other way by reinserting x, we get a bijection between ksubsets of S that contain x and (k1)subsets of S'. This bijection accounts for the second term on the righthand side.
Adding the two cases together (using the sum rule), we conclude that the identity holds.
Using the base case and Pascal's identity, we can construct Pascal's triangle, a table of values of binomial coefficients:
1 1 1 1 2 1 1 3 3 1 1 4 6 4 1 ...
Each row corresponds to increasing values of n, and each column to increasing values of k, with
in the upper lefthand corner. To compute each entry, we add together the entry directly above it and the entry diagonally to the left.
55.1. Pascal's identity: algebraic proof
Using the binomial theorem plus a little bit of algebra, we can prove Pascal's identity without using a combinatorial argument (this is not necessarily an improvement). The additional fact we need is that if we have two equal series
then a_{i} = b_{i} for all i.
Here's the proof:
and now we equate matching coefficients to get
as advertised.
56. Vandermonde's identity
Vandermonde's identity says that, provided r does not exceed m or n,
56.1. Combinatorial proof
To pick r elements of an m+n element set, we have to pick some of them from the first m elements and some from the second n elements. Suppose we choose k elements from the last n; there are
different ways to do this, and
different ways to choose the remaining rk from the first m. This gives (by the product rule)
ways to choose r elements from the whole set if we limit ourselves to choosing exactly k from the last n. The identity follow by summing over all possible values of k.
56.2. Algebraic proof
Here we use the fact that, for any sequences of coefficients {a_{i}} and {b_{i}},
So now consider
and now equate terms with matching exponents.
Is this more enlightening than the combinatorial version? It depends on what kind of enlightnment you are looking for. In this case the combinatorial and algebraic arguments are counting essentially the same things in the same way, so it's not clear what if any advantage either has over the other. But in many cases it's easier to construct an algebraic argument than a combinatorial one, in the same way that it's easier to do arithmetic using standard gradeschool algorithms than by constructing explicit bijections. On the other hand, a combinatorial argument may let you carry other things you know about some structure besides just its size across the bijection, giving you more insight into the things you are counting. The best course is probably to have both techniques in your toolbox.
57. Sums of binomial coefficients
What is the sum of all binomial coefficients for a given n? We can show
combinatorially, by observing that adding up all subsets of an nelement set of all sizes is the same as counting all subsets. Alternatively, apply the binomial theorem to (1+1)^{n}.
Here's another sum, with alternating sign. This is useful if you want to know how the evenk binomial coefficients compare to the oddk binomial coefficients.
Proof: (11)^{n} = 0^{n} = 0 when n is nonzero. (When n is zero, the 0^{n} part still works, since 0^{0} = 1 = (0 choose 0)(1)^{0}.)
By now it should be obvious that
It's not hard to construct more examples of this phenomenon.
58. Application: the inclusionexclusion formula
We've previously seen that A∪B = A + B  A∩B. The generalization of this fact from two to many sets is called the inclusionexclusion formula and says
This rather horrible expression means that to count the elements in the union of n sets A_{1} through A_{n}, we start by adding up all the individual sets A_{1} + A_{2} + ... A_{n}, then subtract off the overcount from elements that appear in two sets A_{1} ∩ A_{2}  A_{1} ∩ A_{3}  ..., then add back the resulting undercount from elements that appear in three sets, and so on.
Why does this work? Consider a single element x that appears in k of the sets. We'll count it as +1 in (k choose 1) individual sets, as 1 in (k choose 2) pairs, +1 in (k choose 3) triples, and so on, adding up to
59. Negative binomial coefficients
Though it doesn't make sense to talk about the number of ksubsets of a (1)element set, the binomial coefficient (n choose k) has a meaningful value for negative n, which works in the binomial theorem. We'll use the lowerfactorial version of the definition:
Note we still demand that k∈ℕ; we are only allowed to do funny things with the upper index n.
So for example:
This means, for example, that
In computing this sum, we had to be careful which of 1 and z got the n exponent and which got 1n. If we do it the other way, we get
This turns out to actually be correct: applying the geometric series formula turns the last line into
but it's a lot less useful.
What happens for a larger upper index? One way to think about (n)_{k} is that we are really computing (n+k1)_{k} and then negating all the factors (which corresponds to multiplying the whole expression by (1)^{k}. So this gives us the identity
So, for example,
These facts are useful when we look at GeneratingFunctions.
60. Fractional binomial coefficients
Yes, we can do fractional binomial coefficients, too. Exercise: Find the value of
61. Further reading
ConcreteMathematics §5.1–5.3 is an excellent source for information about all sorts of facts about binomial coefficients.
62. GeneratingFunctions
Contents
 Basics
 Some standard generating functions
 More operations on formal power series and generating functions
 Counting with generating functions
 Generating functions and recurrences
 Recovering coefficients from generating functions
 Asymptotic estimates
 Recovering the sum of all coefficients
 A recursive generating function
 Summary of operations on generating functions
 Variants
 Further reading
63. Basics
The short version: A generating function represents objects of weight n with z^{n}, and adds all the objects you have up to get a sum a_{0}z^{0} + a_{1}z^{1} + a_{2}z^{2} + ..., where each a_{n} counts the number of different objects of weight n. If you are very lucky (or constructed your set of objects by combining simpler sets of objects in certain straightforward ways) there will be some compact expression that is expands to this horrible sum but is easier to right down. Such compact expressions are called generating functions, and manipulating them algebraically gives an alternative to actually knowing HowToCount.
63.1. A simple example
We are given some initial prefixes for words: qu, s, and t; some vowels to put in the middle: a, i, and oi; and some suffixes: d, ff, and ck, and we want to calculate the number of words we can build of each length.
One way is to generate all 27 words^{6} and sort them by length:
sad sid tad tid quad quid sack saff sick siff soid tack taff tick tiff toid quack quaff quick quiff quoid soick soiff toick toiff quoick quoiff
This gives us 4 length3 words, 12 length4 words, 9 length5 words, and 2 length6 words. This is probably best done using a computer, and becomes expensive if we start looking at much larger lists.
An alternative is to solve the problem by judicious use of algebra. Pretend that each of our letters is actually a variable, and that when we concatenate qu, oi, and ck to make quoick, we are really multiplying the variables using our usual notation. Then we can express all 27 words as the product (qu+s+t)(a+i+oi)(d+ff+ck). But we don't care about the exact set of words, we just want to know how many we get of each length.
So now we do the magic trick: we replace every variable we've got with a single variable z. For example, this turns quoick into zzzzzz = z^{6}, so we can still find the length of a word by reading off the exponent on z. But we can also do this before we multiply everything out, getting
We can now read off the number of words of each length directly off the coefficients of this polynomial.
63.2. Why this works
In general, what we do is replace any object of weight 1 with z. If we have an object with weight n, we think of it as n weight1 objects stuck together, i.e., z^{n}. Disjoint unions are done using addition as in simple counting: z+z^{2} represents the choice between a weight1 object and a weight2 object (which may have been built out of 2 weight1 objects), while 12z^{4} represents a choice between 12 different weight4 objects. The trick is that when we multiply two expressions like this, whenever two values z^{k} and z^{l} collide, the exponents add to give a new value z^{k+l} representing a new object with total weight k+l, and if we have something more complex like (nz^{k})(mz^{l}), then the coefficient multiply to give (nm)z^{k+l} different weight (k+l) objects.
For example, suppose we want to count the number of robots we can build given 5 choices of heads, each of weight 2, and 6 choices of bodies, each of weight 5. We represent the heads by 5z^{2} and the bodies by 6z^{5}. When we multiply these expressions together, the coefficients multiply (which we want, by the product rule) and the exponents add: we get 5z^{2}⋅6z^{5} = 30z^{7} or 30 robots of weight 7 each.
The real power comes in when we consider objects of different weights. If we add to our 5 weight2 robot heads two extrafancy heads of weight 3, and compensate on the body side with three new lightweight weight4 bodies, our new expression is (5z^{2}+2z^{3})(3z^{4}+6z^{5}) = 15z^{6}+36z^{7}+12z^{8}, giving a possible 15 weight6 robots, 36 weight7 robots, and 12 weight8 robots. The rules for multiplying polynomials automatically tally up all the different cases for us.
This trick even works for infinitelylong polynomials that represent infinite series (such "polynomials" are called formal power series). Even though there might be infinitely many ways to pick three natural numbers, there are only finitely many ways to pick three natural numbers whose sum is 37. By computing an appropriate formal power series and extracting the coefficient from the z^{37} term, we can figure out exactly how many ways there are. This works best, of course, when we don't have to haul around an entire infinite series, but can instead represent it by some more compact function whose expansion gives the desired series. Such a function is called a generating function, and manipulating generating functions can be a powerful alternative to creativity in making combinatorial arguments.
63.3. Formal definition
Given a sequence a_{0},a_{1},a_{2},..., its generating function F(z) is given by the sum
A sum in this form is called a formal power series. It is "formal" in the sense that we don't necessarily plan to actually compute the sum, and are instead using the string of z^{i} terms as a long rack to store coefficients on.
In some cases, the sum has a more compact representation. For example, we have
so 1/(1z) is the generating function for the sequence 1,1,1,.... This may let us manipulate this sequence conveniently by manipulating the generating function.
Here's a simple case. If F(z) generates some sequence a_{i}, what does sequence b_{i} does F(2z) generate? The ith term in the expansion of F(2z) will be a_{i}(2z)^{i} = a_{i} 2^{i} z^{i}, so we have b_{i} = 2^{i} a_{i}. This means that the sequence 1,2,4,8,16,... has generating function 1/(12z). In general, if F(z) represents a_{i}, then F(cz) represents c^{i}a_{i}.
What else can we do to F? One useful operation is to take its derivative with respect to z. We then have
This almost gets us the representation for the series i a_{i}, but the exponents on the z's are off by one. But that's easily fixed:
So the sequence 0,1,2,3,4,... has generating function
and the sequence of squares 0,1,4,9,16,... has generating function
As you can see, some generating functions are prettier than others.
(We can also use integration to divide each term by i, but the details are messier.)
Another way to get the sequence 0,1,2,3,4,... is to observe that it satisfies the recurrence:
a_{0} = 0
a_{n+1} = a_{n} + 1 (∀n∈ℕ)
A standard trick in this case is to multiply each of the ∀i bits by z^{n}, sum over all n, and see what happens. This gives ∑ a_{n+1}z^{n} = ∑ a_{n}z^{n} + ∑ z^{n} = ∑ a_{n}z^{n} + 1/(1z). The first term on the righthand side is the generating function for a_{n}, which we can call F(z) so we don't have to keep writing it out. The second term is just the generating function for 1,1,1,1,1,... . But what about the lefthand side? This is almost the same as F(z), except the coefficients don't match up with the exponents. We can fix this by dividing F(z) by z, after carefully subtracting off the a_{0} term:
So this gives the equation (F(z)  a_{0})/z = F(z) + 1/(1z). Since a_{0} = 0, we can rewrite this as F(z)/z = F(z) + 1/(1z). A little bit of algebra turns this into F(z)  zF(z) = z/(1z) or F(z) = z/(1z)^{2}.
Yet another way to get this sequence is construct a collection of objects with a simple structure such that there are exactly n objects with weight n. One way to do this is to consider strings of the form a^{+}b^{*} where we have at least one a followed by zero or more b's. This gives n strings of length n, because we get one string for each of 1..n a's we can put in (an example would be abb, aab, and aaa for n=3). We can compute the generating function for this set because to generate each string we must pick in order:
 One initial a. Generating function = z.
 Zero or more a's. Generating function = 1/(1z).
 Zero or more b's. Generating function = 1/(1z).
Taking the product of these gives z/(1z)^{2}, as before.
This trick is useful in general; if you are given a generating function F(z) for a_{n}, but want a generating function for b_{n} = ∑_{k≤n} a_{k}, allow yourself to pad each weightk object out to weight n in exactly one way using nk junk objects, i.e. multiply F(z) by 1/(1z).
64. Some standard generating functions
Here is a table of some of the most useful generating functions.
Of these, the first is the most useful to remember (it's also handy for remembering how to sum geometric series). All of these equations can be proven using the binomial theorem.
65. More operations on formal power series and generating functions
Let F(z) = ∑_{i} a_{i}z^{i} and G(z) = ∑_{i} b_{i}z^{i}. Then their sum F(z)+G(z) = ∑_{i} (a_{i}+b_{i})z^{i} is the generating function for the sequence (a_{i}+b_{i}). What is their product F(z)G(z)?
To compute the ith term of F(z)G(z), we have to sum over all pairs of terms, one from F and one from G, that produce a z^{i} factor. Such pairs of terms are precisely those that have exponents that sum to i. So we have
As we've seen, this equation has a natural combinatorial interpretation. If we interpret the coefficient a_{i} on the ith term of F(z) as counting the number of "athings" of weight i, and the coefficient b_{i} as the number of "bthings" of weight i, then the ith coefficient of F(z)G(z) counts the number of ways to make a combined thing of total weight i by gluing together an athing and a bthing.
As a special case, if F(z)=G(z), then the ith coefficient of F(z)G(z) = F^{2}(z) counts how many ways to make a thing of total weight i using two "athings", and F^{n}(z) counts how many ways (for each i) to make a thing of total weight i using n "athings". This gives us an easy combinatorial proof of a special case of the binomial theorem:
Think of the lefthand side as the generating function F(x) = 1+x raised to the nth power. F by itself says that you have a choice between one weight0 object or one weight1 object. On the righthand side the ith coefficient counts how many ways you can put together a total of i weight1 objects given n to choose from—so it's n choose i.
66. Counting with generating functions
The product formula above suggests that generating functions can be used to count combinatorial objects that are built up out of other objects, where our goal is to count the number of objects of each possible nonnegative integer "weight" (we put "weight" in scare quotes because we can make the "weight" be any property of the object we like, as long as it's a nonnegative integer—a typical choice might be the size of a set, as in the binomial theorem example above). There are five basic operations involved in this process; we've seen two of them already, but will restate them here with the others.
Throughout this section, we assume that F(z) is the generating function counting objects in some set A and G(z) the generating function counting objects in some set B.
66.1. Disjoint union
Suppose C = A∪B and A and B are disjoint. Then the generating function for objects in C is F(z)+G(z).
Example: Suppose that A is the set of all strings of zero or more letters x, where the weight of a string is just its length. Then F(z) = 1/(1z), since there is exactly one string of each length and the coefficient a_{i} on each z^{i} is always 1. Suppose that B is the set of all strings of zero or more letters y and/or z, so that G(z) = 1/(12z) (since there are now 2^{i} choices of lengthi strings). The set C of strings that are either (a) all x's or (b) made up of y's, z's, or both, has generating function F(z)+G(z) = 1/(1z) + 1/(12z).
66.2. Cartesian product
Now let C = A×B, and let the weight of a pair (a,b)∈C be the sum of the weights of a and b. Then the generating function for objects in C is F(z)G(z).
Example: Let A be allx strings and B be all y or z strings, as in the previous example. Let C be the set of all strings that consist of zero or more x's followed by zero or more y's and/or z's. Then the generating function for C is F(z)G(z) = 1/((1z)(12z)).
66.3. Repetition
Now let C consists of all finite sequences of objects in A, with the weight of each sequence equal to the sum of the weights of its elements (0 for an empty sequence). Let H(z) be the generating function for C. From the preceding rules we have
H = 1 + F + F^{2} + F^{3} + ... = 1/(1F).
This works best when H(0) = 0; otherwise we get infinitely many weight0 sequences. It's also worth noting that this is just a special case of substitution (see below), where our "outer" generating function is 1/(1z).
66.3.1. Example: (011)*
Let A = { 0, 11 }, and let C be the set of all sequences of zeroes and ones where ones occur only in evenlength runs. Then the generating function for A is z+z^{2} and the generating function for C is 1/(1zz^{2}). We can extract exact coefficients from this generating function using the techniques below.
66.3.2. Example: sequences of positive integers
Suppose we want to know how many different ways there are to generate a particular integer as a sum of positive integers. For example, we can express 4 as 4, 3+1, 2+2, 2+1+1, 1+1+1+1, 1+1+2, 1+2+1, or 1+3, giving 8 different ways.
We can solve this problem using the repetition rule. Let F = z/(1z) generate all the positive integers. Then
We can get exact coefficients by observing that
This means that there is 1 way to express 0 (the empty sum), and 2^{n1} ways to express any larger value n (e.g. 2^{41} = 8 ways to express 4).
Once we know what the right answer is, it's not terribly hard to come up with a combinatorial explanation. The quantity 2^{n1} counts the number of subsets of an (n1)element set. So imagine that we have n1 places and we mark some subset of them, plus add an extra mark at the end; this might give us a pattern like XXX. Now for each sequence of places ending with a mark we replace it with the number of places (e.g. XXX = 1,1,2, XXXX = 1,3,2,4). Then the sum of the numbers we get is equal to n, because it's just counting the total length of the sequence by dividing it up at the marks and the adding the pieces back together. The value 0 doesn't fit this pattern (we can't put in the extra mark without getting a sequence of length 1), so we have 0 as a special case again.
If we are very clever, we might come up with this combinatorial explanation from the beginning. But the generating function approach saves us from having to be clever.
66.4. Pointing
This operation is a little tricky to describe. Suppose that we can think of each weightk object in A as consisting of k items, and that we want to count not only how many weightk objects there are, but how many ways we can produce a weightk object where one of its k items has a special mark on it. Since there are k different items to choose for each weightk object, we are effectively multiplying the count of weightk objects by k. In generating function terms, we have
 H(z) = z d/dz F(z).
Repeating this operation allows us to mark more items (with some items possibly getting more than one mark). If we want to mark n distinct items in each object (with distinguishable marks), we can compute
H(z) = z^{n} d^{n}/dz^{n} F(z),
where the repeated derivative turns each term a_{i} z^{i} into a_{i}i(i1)(i2)...(in+1) z^{in} and the z^{n} factor fixes up the exponents. To make the marks indistinguishable (i.e., we don't care what order the values are marked in), divide by n! to turn the extra factor into (i choose n).
(If you are not sure how to take a derivative, look at HowToDifferentiate.)
Example: Count the number of finite sequences of zeroes and ones where exactly two digits are underlined. The generating function for { 0, 1 } is 2z, so the generating function for sequences of zeros and ones is F = 1/(12z) by the repetition rule. To mark two digits with indistinguishable marks, we need to compute
66.5. Substitution
Suppose that the way to make a Cthing is to take a weightk Athing and attach to each its k items a Bthing, where the weight of the new Cthing is the sum of the weights of the Bthings. Then the generating function for C is the composition F(G(z)).
Why this works: suppose we just want to compute the number of Cthings of each weight that are made from some single specific weightk Athing. Then the generating function for this quantity is just (G(z))^{k}. If we expand our horizons to include all a_{k} weightk Athings, we have to multiply by a_{k} to get a_{k} (G(z))^{k}. If we further expand our horizons to include Athings of all different weights, we have to sum over all k:
But this is just what we get if we start with F(z) and substitute G(z) for each occurrence of z, i.e. if we compute F(G(z)).
66.5.1. Example: bitstrings with primes
Suppose we let A be all sequences of zeroes and ones, with generating function F(z) = 1/(12z). Now suppose we can attach a single or double prime to each 0 or 1, giving 0' or 0'' or 1' or 1'', and we want a generating function for the number of distinct primed bitstrings with n attached primes. The set { prime, primeprime } has generating function G(z)=z+z^{2}, so the composite set has generating function F(z) = 1/(12(z+z^{2})) = 1/(12z2z^{2}).
66.5.2. Example: (011)* again
The previous example is a bit contrived. Here's one that's a little more practical, although it involves a brief digression into multivariate generating functions. A multivariate generating function F(x,y) generates a series ∑_{ij} a_{ij} x^{i}y^{j}, where a_{ij} counts the number of things that have i x's and j y's. (There is also the obvious generalization to more than two variables). Consider the multivariate generating function for the set { 0, 1 }, where x counts zeroes and y counts ones: this is just x+y. The multivariate generating function for sequences of zeroes and ones is 1/(1xy) by the repetition rule. Now suppose that each 0 is left intact but each 1 is replaced by 11, and we want to count the total number of strings by length, using z as our series variable. So we substitute z for x and z^{2} (since each one turns into a string of length 2) for y, giving 1/(1zz^{2}). This gives another way to get the generating function for strings built by repeating 0 and 11.
67. Generating functions and recurrences
What makes generating functions particularly useful for algorithm analysis is that they directly solve recurrences of the form T(n) = a T(n1) + b T(n2) + f(n) (or similar recurrences with more T terms on the righthand side), provided we have a generating function F(z) for f(n). The idea is that there exists some generating function G(z) that describes the entire sequence of values T(0),T(1),T(2),..., and we just need to solve for it by restating the recurrence as an equation about G. The lefthand side will just turn into G. For the righthand side, we need to shift T(n1) and T(n2) to line up right, so that the righthand side will correctly represent the sequence T(0),T(1),aT(0)+aT(1)+F(2), etc. It's not hard to see that the generating function for the sequence 0,T(0),T(1),T(2),... (corresponding to the T(n1) term) is just zG(z), and similarly the sequence 0,0,T(1),T(2),T(3),... (corresponding to the T(n2) term) is z^{2}G(z). So we have (being very careful to subtract out extraneous terms at for i=0 and i=1):
G = az(G  T(0)) + bz^{2}G + (F  f(0)  zf(1)) + T(0) + zT(1),
and after expanding F we can in principle solve this for G as a function of z.
67.1. Example: A Fibonaccilike recurrence
Let's take a concrete example. The Fibonaccilike recurrence
 T(n) = T(n1) + T(n2), T(0) = 1, T(1) = 1,
becomes
G = (zG  z) + z^{2}G + 1 + z.
(here F = 0).
Solving for G gives
G = 1/(1  z  z^{2}).
Unfortunately this is not something we recognize from our table, although it has shown up in a couple of examples. (Exercise: Why does the recurrence T(n) = T(n1) + T(n2) count the number of strings built from 0 and 11 of length n?) In the next section we show how to recover a closedform expression for the coefficients of the resulting series.
68. Recovering coefficients from generating functions
There are basically three ways to recover coefficients from generating functions:
 Recognize the generating function from a table of known generating functions, or as a simple combination of such known generating functions. This doesn't work very often but it is possible to get lucky.
To find the kth coefficient of F(z), compute the kth derivative d^{k}/dz^{k} F(z) and divide by k! to shift a_{k} to the z^{0} term. Then substitute 0 for z. For example, if F(z) = 1/(1z) then a_{0} = 1 (no differentiating), a_{1} = 1/(10)^{2} = 1, a_{2} = 1/(10)^{3} = 1, etc. This usually only works if the derivatives have a particularly nice form or if you only care about the first couple of coefficients (it's particularly effective if you only want a_{0}).
If the generating function is of the form 1/Q(z), where Q is a polynomial with Q(0)≠0, then it is generally possible to expand the generating function out as a sum of terms of the form P_{c}/(1z/c) where c is a root of Q (i.e. a value such that Q(c) = 0). Each denominator P_{c} will be a constant if c is not a repeated root; if c is a repeated root, then P_{c} can be a polynomial of degree up to one less than the multiplicity of c. We like these expanded solutions because we recognize 1/(1z/c) = ∑_{i} c^{i} z^{i}, and so we can read off the coefficients a_{i} generated by 1/Q(z) as an appropriately weighted some of c_{1}^{i}, c_{2}^{i}, etc., where the c_{j} range over the roots of Q.
Example: Take the generating function G = 1/(1zz^{2}). We can simplify it by factoring the denominator: 1zz^{2} = (1az)(1bz) where 1/a and 1/b are the solutions to the equation 1zz^{2}=0; in this case a = (1+√5)/2, which is approximately 1.618 and b = (1√5)/2, which is approximately 0.618. It happens to be the case that we can always expand 1/P(z) as A/(1az) + B(1bz) for some constants A and B whenever P is a degree 2 polynomial with constant coefficient 1 and distinct roots a and b, so
 G = A/(1az) + B/(1bz),
and here we can recognize the righthand side as the sum of the generating functions for the sequences A⋅a^{i} and B⋅b^{i}. The A⋅a^{i} term dominates, so we have that T(n) = Theta(a^{n}), where a is approximately 1.618. We can also solve for A and B exactly to find an exact solution if desired.
A rule of thumb that applies to recurrences of the form T(n) = a_{1}T(n1) + a_{2}T(n2) + ... a_{k} T(nk) + f(n) is that unless f is particularly large, the solution is usually exponential in 1/x, where x is the smallest root of the polynomial 1  a_{1}z  a_{2}z^{2} ...  a_{k} z^{k}. This can be used to get very quick estimates of the solutions to such recurrences (which can then be proved without fooling around with generating functions).
Exercise: What is the exact solution if T(n) = T(n1) + T(n2) + 1? Or if T(n) = T(n1) + T(n2) + n?
68.1. Partial fraction expansion and Heaviside's coverup method
There is a nice trick for finding the numerators in a partial fraction expansion. Suppose we have
Multiply both sides by 1az to get
Now plug in z = 1/a to get
We can immediately read off A. Similarly, multiplying by 1bz and then setting 1bz to zero gets B. The method is known as the "coverup method" because multiplication by (1az) can be simulated by covering up (1az) in the denominator of the lefthand side and all the terms that don't have (1az) in the denominator in the right hand side.
The coverup method will work in general whenever there are no repeated roots, even if there are many of them; the idea is that setting 1qz to zero knocks out all the terms on the righthand side but one. With repeated roots we have to worry about getting numerators that aren't just a constant, so things get more complicated. We'll come back to this case below.
68.1.1. Example: A simple recurrence
Suppose f(0) = 0, f(1) = 1, and for n≥2, f(n) = f(n1) + 2f(n2). Multiplying these equations by z^{n} and summing over all n gives a generating function
With a bit of tweaking, we can get rid of the sums on the RHS by converting them into copies of F:
Now solve for F(z) to get , where we need to solve for A and B.
We can do this directly, or we can use the coverup method. The coverup method is easier. Setting z = 1 and covering up 1+z gives A = 1/(12(1)) = 1/3. Setting z = 1/2 and covering up 12z gives B = 1/(1+z) = 1/(1+1/2) = 2/3. So we have
So we have f(0) = 0 and, for n≥1, . It's not hard to check that this gives the same answer as the recurrence.
68.1.2. Example: Coughing cows
Let's count the number of strings of each length of the form (M)*(OU)*(GHK)* where (xy) means we can use x or y and * means we can repeat the previous parenthesized expression 0 or more times (see Regular_expression).
We start with a sequence of 0 or more M's. The generating function for this part is our old friend 1/(1z). For the second part, we have two choices for each letter, giving 1/(12z). For the third part, we have 1/(13z). Since each part can be chosen independently of the other two, the generating function for all three parts together is just the product:
Let's use the coverup method to convert this to a sum of partial fractions. We have
So the exact number of lengthn sequences is (1/2)  4⋅2^{n} + (9/2)⋅3^{n}. We can check this for small n:
n 
Formula 
Strings 
0 
1/2  4 + 9/2 = 1 
() 
1 
1/2  8 + 27/2 = 6 
M, O, U, G, H, K 
2 
1/2  16 + 81/2 = 25 
MM, MO, MU, MG, MH, MK, OO, OU, OG, OH, OK, UO, UU, UG, UH, UK, GG, GH, GK, HG, HH, HK, KG, KH, KK 
3 
1/2  32 + 243/2 = 90 
(exercise) ☺ 
68.1.3. Example: A messy recurrence
Let's try to solve the recurrence T(n) = 4T(n1) + 12T(n2) + 1 with T(0) = 0 and T(1) = 1.
Let F = ∑ T(n)z^{n}.
Summing over all n gives
Solving for F then gives
We want to solve this using partial fractions, so we need to factor (14z12z²) = (1+2z)(16z). This gives
From this we can immediately read off the value of T(n) for n≥2:
Let's check this against the solutions we get from the recurrence itself:
n 
T(n) 
0 
0 
1 
1 
2 
1+4⋅1+12⋅0 = 5 
3 
1+4⋅5+12⋅1 = 33 
4 
1+4⋅33+12⋅5 = 193 
We'll try n=3, and get T(3) = (3/20)⋅216 + 8/12  1/15 = (3⋅3⋅216 + 40  4)/60 = (1944 + 40  4)/60 = 1980/60 = 33.
To be extra safe, let's try T(2) = (3/20)⋅36  4/12  1/15 = (3⋅3⋅36  20  4)/60 = (324  20  4)/60 = 300/60 = 5. This looks good too.
The moral of this exercise? Generating functions can solve uglylooking recurrences exactly, but you have to be very very careful in doing the math.
68.2. Partial fraction expansion with repeated roots
Let a_{n} = 2a_{n1} + n, with some constant a_{0}. Find a closedform formula for a_{n}.
As a test, let's figure out the first few terms of the sequence:
a_{0} = a_{0} 
a_{1} = 2a_{0} + 1 
a_{2} = 4a_{0} + 2 + 2 = 4a_{0}+4 
a_{3} = 8a_{0} + 8 + 3 = 8a_{0}+11 
a_{4} = 16a_{0} + 22 + 4 = 16a_{0}+26 
The a_{0} terms look nice (they're 2^{n}a_{0}), but the 0, 1, 4, 11, 26 sequence doesn't look like anything familiar. So we'll find the formula the hard way.
First we convert the recurrence into an equation over generating functions and solve for the generating function F:
Observe that the righthand term gives us exactly the 2^{n}a_{0} terms we expected, since 1/(12z) generates the sequence 2^{n}. But what about the lefthand term? Here we need to apply a partialfraction expansion, which is simplified because we already know how to factor the denominator but is complicated because there is a repeated root.
We can now proceed in one of two ways: we can solve directly for the partial fraction expansion, or we can use an extended version of Heaviside's coverup method that handles repeated roots using differentiation. We'll start with the direct method.
68.2.1. Solving for the PFE directly
Write
We expect B to be a constant and A to be of the form A_{1}z + A_{0}.
To find B, use the technique of multiplying by 12z and setting z=1/2:
so B = 1/(11/2)^{2} = 1/(1/4) = 4.
We can't do this for A, but we can solve for it after substituting in B = 4:
So we have the expansion
from which we get
If we remember that 1/(1z)^{2} generates the sequence x_{n} = n+1 and 1/(12z) generates x_{n} = 2^{n}, then we can quickly read off the solution (for large n):
which we can check by plugging in particular values of n and comparing it to the values we got by iterating the recurrence before.
The reason for the "large n" caveat is that z^{2}/(1z)^{2} doesn't generate precisely the sequence x_{n} = n1, since it takes on the values 0, 0, 1, 2, 3, 4, ... instead of 1, 0, 1, 2, 3, 4, ... . Similarly, the power series for z/(12z) does not have the coefficient 2^{n1} = 1/2 when n = 0. Miraculously, in this particular example the formula works for n = 0, even though it shouldn't: 2(n1) is 2 instead of 0, but 4·2^{n1} is 2 instead of 0, and the two errors cancel each other out.
68.2.2. Solving for the PFE using the extended coverup method
It is also possible to extend the coverup method to handle repeated roots. Here we choose a slightly different form of the partial fraction expansion:
Here A, B, and C are all constants. We can get A and C by the coverup method, where for A we multiply both sides by (1z)² before setting z=1; this gives A = 1/(12) = 1 and C = 1/(1½)² = 4. For B, if we multiply both sides by (1z) we are left with A/(1z) on the righthand side and a (1z) in the denominator on the lefthand side. Clearly setting z = 1 in this case will not help us.
The solution is to first multiply by (1z)² as before but then take a derivative:
Now if we set z = 1, every term on the righthand side except B becomes 0, and we get B = 2/(12)² or B = 2.
Plugging A, B, and C into our original formula then gives
and thus
From this we can read off (for large n):
We believe this because it looks like the solution we already got.
69. Asymptotic estimates
We can simplify our life considerably if we only want an asymptotic estimate of a_{n} (see AsymptoticNotation). The basic idea is that if a_{n} is nonnegative for sufficiently large n and ∑ a_{n}z^{n} converges for some fixed value z, then a_{n} must be o(z^{n}) in the limit. (Proof: otherwise, a_{n}z^{n} is at least a constant for infinitely many n, giving a divergent sum.) So we can use the radius of convergence of a generating function F(z), defined as the largest value r such that F(z) is defined for all (complex) z with z < r, to get a quick estimate of the growth rate of F's coefficients: whatever they do, we have a_{n} = O(r^{n}).
For generating functions that are rational functions (ratios of polynomials), we can use the partial fraction expansion to do even better. First observe that for F(z) = ∑ f_{i}z^{n} = 1/(1az)^{k}, we have f_{n} = (k+n1 choose n) a^{n} = ((n+k1),,(k1)/(k1)!) a^{n} = Θ(a^{n} n^{k1}). Second, observe that the denominator is irrelevant: if 1/(1az)^{k} = Θ(a^{n} n^{k1}) then bz^{m}/(1az)^{k1} = b Θ(a^{nm} (nm)^{k1}) = b a^{m} (1m/n)^{k1} Θ(a^{n} n^{k1}) = Θ(a^{n} n^{k1}), because everything outside the Θ disappears into the constant for sufficiently large n. Finally, observe that in a partial fraction expansion, the term 1/(1az)^{k} with the largest coefficient a (if there is one) wins in the resulting asymptotic sum: Θ(a^{n}) + Θ(b^{n}) = Θ(a^{n}) if a > b. So we have:
 Theorem
Let F(z) = ∑ f_{n}z^{n} = P(z)/Q(z) where P and Q are polynomials in z. If Q has a root r with multiplicity k, and all other roots s of Q satisfy r < s, then f_{n} = Θ((1/r)^{n} n^{k1}).
The requirement that r is a unique minimal root of Q is necessary; for example, F(z) = 2/(1z²) = 1/(1z) + 1/(1+z) generates the sequence 0, 2, 0, 2, ..., which is not Θ(1) because of all the zeros; here the problem is that 1z² has two roots with the same absolute value, so for some values of n it is possible for them to cancel each other out.
A root in the denominator of a rational function F is called a pole. So another way to state the theorem is that the asymptotic value of the coefficients of a rational generating function is determined by the smallest pole.
More examples:
F(z) 
Smallest pole 
Asymptotic value 
1/(1z) 
1 
Θ(1) 
1/(1z)² 
1, multiplicity 2 
Θ(n) 
1/(1zz²) 
(√51)/2 = 2/(1+√5) 
Θ(((1+√5)/2)^{n}) 
1/((1z)(12z)(13z)) 
1/3 
Θ(3^{n}) 
(z+z²(1z))/(14z12z²) 
1/6 
Θ(6^{n}) 
1/((1z)²(12z)) 
1/2 
Θ(2^{n}) 
In each case it may be instructive to compare the asymptotic values to the exact values obtained earlier on this page.
70. Recovering the sum of all coefficients
Given a generating function for a convergent series ∑_{i} a_{i}z^{i}, we can compute the sum of all the a_{i} by setting z to 1. Unfortunately, for many common generating functions setting z=1 yields 0/0 (if it yields something else divided by zero then the series diverges). In this case we can recover the correct sum by taking the limit as z goes to 1 using L'Hôpital's_rule, which says that lim_{x→c} f(x)/g(x) = lim_{x→c} f'(x)/g'(x) when the latter limit exists and either f(c) = g(c) = 0 or f(c) = g(c) = infinity.^{7}
70.1. Example
Let's derive the formula for 1+2+...+n. We'll start with the generating function for the series ∑_{i=0}^{n} z^{i}, which is (1z^n+1)/(1z). Applying the z d/dz method gives us
Plugging z=1 into this expression gives (1(n+1)+n)/(11) = 0/0, which does not make us happy. So we go to the hospital—twice, since one application of L'Hôpital's rule doesn't get rid of our 0/0 problem:
which is our usual formula. Gauss's childhood proof is a lot quicker, but the generatingfunction proof is something that we could in principle automate most of the work using a computer_algebra_system, and it doesn't require much creativity or intelligence. So it might be the weapon of choice for nastier problems where no clever proof comes to mind.
More examples of this technique can be found on the BinomialCoefficients page, where the binomial theorem applied to (1+x)^{n} (which is really just a generating function for ∑ (n choose i) z^{i}) is used to add up various sums of binomial coefficients.
71. A recursive generating function
Let's suppose we want to count binary trees with n internal nodes. We can obtain such a tree either by (a) choosing an empty tree (g.f.: z^{0} = 1); or (b) choosing a root with weight 1 (g.f. 1⋅z^{1} = z, since we can choose it in exactly one way), and two subtrees (g.f. = F^{2} where F is the g.f. for trees). This gives us a recursive definition
F = 1 + zF^{2}.
Solving for F using the quadratic formula gives
That 2z in the denominator may cause us trouble later, but let's worry about that when the time comes. First we need to figure out how to extract coefficients from the square root term.
The binomial theorem says
For n ≥ 1, we can expand out the (1/2 choose n) terms as
For n=0, the switch from the big product of odd terms to (2n2)! divided by the even terms doesn't work, because (2n2)! is undefined. So here we just use the special case (1/2 choose 0) = 1.
Now plug this nasty expression back into F to get
Here we choose minus for the plusorminus to get the right answer and then do a little bit of tidying up of the binomial coefficient.
We can check the first few values of f(n):
n 
f(n) 
0 
(0 choose 0) = 1 
1 
(1/2)(2 choose 1) = 1 
2 
(1/3)(4 choose 2) = 6/3 = 2 
3 
(1/4)(6 choose 3) = 20/4 = 5 
and these are consistent with what we get if we draw all the small binary trees by hand.
The numbers (1/(n+1))(2n choose n) show up in a lot of places in combinatorics, and are known as the Catalan_numbers.
72. Summary of operations on generating functions
The following table describes all the nasty things we can do to a generating function. Throughout, we assume F = ∑ f_{k}z^{k}, G = ∑ g_{k}z^{k}, etc.
Operation 
Effect on generating functions 
Effect on coefficients 
Combinatorial interpretation 
Coefficient extraction 
f_{k} = (1/k!) d^{k}/dz^{k} F(z) _{z=0} 

Find the number of weight k objects. Easy case: f_{0} = F(0). 
Sum of all coefficients 
F(1) 
Computes ∑ f_{k} 
Count the total number of objects, ignoring weights. 
Shift right 
G = zF 
g_{k} = f_{k1} 
Add 1 to the weight of all objects. 
Shift left 
G = z^{1}(FF(0)) 
g_{k} = f_{k+1} 
Subtract 1 from the weight of all objects. 
Pointing 
G = z d/dz F 
g_{k} = k f_{k} 
A Gthing is an Fthing plus a label pointing to one of its units. 
Sum 
H = F+G 
h_{k}=f_{k}+g_{k} 
Every Hthing is either an Fthing or a Gthing (think union) 
Product 
H=FG 
h_{k} = ∑_{i} f_{i}g_{ki} 
Every Hthing consists of an Fthing a Gthing (think cartesian product), with the weight of the Hthing equal to the sum of the weights of the F and G things. 
Composition 
H=F∘G 
H = ∑ f_{k}G^{k} 
To make an Hthing, first choose an Fthing of weight m, then bolt onto it m Gthings. The weight of the Hthing is the sum of the weights of the Gthings. 
Repetition 
G=1/(1F) 
G = ∑ F^{k} 
A Gthing is a sequence of zero or more Fthings. Note: this is just a special case of composition. 
73. Variants
The exponential generating function or egf for a sequence a_{0}, ... is given by F(z) = ∑ a_{n}z^{n}/n!. For example, the egf for the sequence 1, 1, 1, ... is e^{z} = ∑ z^n/n!. Exponential generating functions admit a slightly different set of operations from ordinary generating functions: differentation gives left shift (since the factorials compensate for the exponents coming down), multiplying by z gives b_{n} = na_{n+1}, etc. The main application is that the product F(z)G(z) of two egf's gives the sequence whose nth term is ∑ (n choose k) a_{k}b_{nk}; so for problems where we want that binomial coefficient in the convolution (e.g. when we are building weight n objects not only by choosing a weightk object plus a weight(nk) object but also by arbitrarily rearranging their unitweight pieces) we want to use an egf rather than an ogf. We won't use these in CS202, but it's worth knowing they exist.
A probability generating function or pgf is essentially an ordinary generating function where each coefficient a_{n} is the probability that some random variable equals n. See RandomVariables for more details.
74. Further reading
RosenBook discusses some basic facts about generating functions in §7.4. ConcreteMathematics gives a more thorough introduction. Herbert Wilf's book generatingfunctionology, which can be downloaded from the web, will tell you more about the subject than you probably want to know.
See http://www.swarthmore.edu/NatSci/echeeve1/Ref/LPSA/PartialFraction/PartialFraction.html for very detailed notes on partial fraction expansion.
75. ProbabilityTheory
Contents
76. History and interpretation
 Gambling: I throw two sixsided dice, what are my chances of seeing a 7?
 Insurance: I insure a typical resident of SmurfingtonUponTyne against premature baldness. How likely is it that I have to pay a claim?
Answers to these questions are summarized by a probability, a number in the range 0 to 1 that represents the likelihood that some event occurs. There are two dominant interpretations of this likelihood:
 Frequentist interpretation
 If an event occurs with probability p, then in the limit as I accumulate many examples of similar events, I will see the number of occurrences divided by the number of samples converging to p. For example, if I flip a fair coin over and over again many times, I expect that heads will come up roughly half of the times I flip it, because the probability of coming up heads is 1/2.
 Bayesian interpretation
 When I say that an event occurs with probability p, that means my subjective beliefs about the event would lead me to take a bet that would be profitable on average if this were the real probability. So a Bayesian would take a doubleornothing bet on a coin coming up heads if they believed that the probability it came up heads was at least 1/2.
Frequentists and Bayesians have historically spent a lot of time arguing with each other over which interpretation makes sense. The usual argument against frequentist probability is that it only works for repeatable experiments, and doesn't allow for statements like "the probability that it will rain tomorrow is 50%" or the even more problematic "based on what I know, there is a 50% probability that it rained yesterday". The usual argument against Bayesian probability is that it's hopelessly subjective—it's possible (even likely) that my subjective guesses about the probability that it will rain tomorrow are not the same as yours. As mathematicians, we can ignore such arguments, and treat probability axiomatically as just another form of counting, where we normalize everything so that we always end up counting to exactly 1.
(Note: This caricature of the debate over interpreting probability is thoroughly incomplete. For a thoroughly complete discussion, see Probability, Interpretations Of at the Stanford Encyclopedia of Philosophy.)
77. Probability axioms
Coming up with axioms for probabilities that work in all the cases we want to consider took much longer than anybody expected, and the current set in common use only go back to the 1930's. Before presenting these, let's talk a bit about the basic ideas of probability.
An event A is something that might happen, or might not; it acts like a predicate over possible outcomes. The probability Pr[A] of an event A is a real number in the range 0 to 1, that must satisfy certain consistency rules like Pr[¬A] = 1Pr[A].
In discrete probability, there is a finite set of atoms, each with an assigned probability, and every event is a union of atoms. The probability assigned to an event is the sum of the probabilities assigned to the atoms it contains. For example, we could consider rolling two sixsided dice. The atoms are the pairs (i,j) that give the value on the first and second die, and we assign a probability of 1/36 to each pair. The probability that we roll a 7 is the sum of the cases (1,6), (2,5), (3,4), (4,3), (5,2), and (6,1), or 6/36 = 1/6.
Discrete probability doesn't work if we have infinitely many atoms. Suppose we roll a pair of dice infinitely many times (e.g., because we want to know the probability that we never accumulate more 6's than 7's in this infinite sequence). Now there are infinitely many possible outcomes: all the sequences of pairs (i,j). If we make all these outcomes equally likely, we have to assign each a probability of zero. But then how do we get back to a probability of 1/6 that the first roll comes up 7?
77.1. The Kolmogorov axioms
A triple (S,F,P) is a probability space if S is a set of outcomes (where each outcome specifies everything that ever happens, in complete detail); F is a sigmaalgebra, which is a family of subsets of S, called measurable sets, that is closed under complement (i.e., if A is in F then SA is in F) and countable union (union of A_{1}, A_{2}, ... is in F if each set is); and P is a probability measure that assigns a number in [0,1] to each set in F. The measure P must satisfy three axioms:
 P(S) = 1.
 P(Ø) = 0.
For any sequence of pairwise disjoint events A_{1}, A_{2}, A_{3}, ..., P(∪A_{i}) = ∑P(A_{i}).
From these one can derive rules like P(SA) = 1P(A) etc.
Most of the time, S is finite, and we can just make F include all subsets of S, and define Pr[A] to be the sum of Pr[{x}] over all x in A; this gets us back to the discrete probability model we had before.
77.2. Examples of probability spaces
 S = {H,T}, F = ℘S, Pr[A] = A/2. This represents a fair coin with two outcomes H and T that each occur with probability 1/2.
 S = {H,T}, F = ℘S, Pr[{H}] = p, Pr[{T}] = 1p. This represents a biased coin, where H comes up with probability p.
 S = { (i,j): i,j∈{1,2,3,4,5,6} }, F = ℘S, Pr[A] = A/36. Roll of two fair dice. A typical event might be "the total roll is 4", which is the set { (1,3), (2,2), (3,1) } with probability 3/36 = 1/12.
S = ℕ, F = ℘S, Pr[A] = ∑_{n∈A} 2^{n1}. This is an infinite probability space; a realworld process that might generate it is to flip a fair coin repeatedly and count how many times it comes up tails before the first time it comes up heads. Note that even though it is infinite, we can still define all probabilities by summing over atoms: Pr[0] = 1/2, Pr[1] = 1/4, Pr[2] = 1/8, etc.
It's unusual for anybody doing probability to actually write out the details of the probability space like this. Much more often, a writer will just assert the probabilities of a few basic events (e.g. Pr[H] = 1/2), and claim that any other probability that can be deduced from these initial probabilities from the axioms also holds (e.g. Pr[T] = 1Pr[H] = 1/2). The main reason Kolmogorov gets his name attached to the axioms is that he was responsible for Kolmogorov's existence theorem, which says (speaking very informally) that as long as your initial assertions are consistent, there exists a probability space that makes them and all their consequences true.
78. Probability as counting
The easiest probability space to work with is a uniform discrete probability space, which has N outcomes each of which occurs with probability 1/N. If someone announces that some quantity is "random" without specifying probabilities (especially if that someone is a computer scientist), the odds are that what they mean is that each possible value of the quantity is equally likely. If that someone is being more careful, they would say that the quantity is "drawn uniformly at random" from a particular set.
Such spaces are among the oldest studied in probability, and go back to the very early days of probability theory where randomness was almost always expressed in terms of pulling tokens out of wellmixed urns, because such urn models where one of the few situtations where everybody agreed on what the probabilities should be.
78.1. Examples
A random bit has two outcomes, 0 and 1, and each occurs with probability 1/2.
A die roll has six outcomes, 1 through 6, and each occurs with probability 1/6.
 A roll of two dice has 36 outcomes (order of the dice matters); each occurs with probability 1/36.
A random nbit string of length n has 2^{n} outcomes; each occurs with probability 2^{n}. The probability that exactly 1 bit is a 1 is obtained by counting all strings with a single 1 and dividing by 2^{n}: n2^{n}.
A poker hand consists of a subset of 5 cards drawn uniformly at random from a deck of 52 cards. Depending on whether the order of the 5 cards is considered important (usually it isn't), there are either or (52)_{5} possible hands. The probability of getting a flush (all 5 cards in the hand drawn from the same suit of 13 cards) is ; there are 4 choices of suits, and ways to draw 5 cards from each suit.
A random permutation on n items has n! outcomes, one for each possible permutation. A typical event might be that the first element of a random permutation of 1..n is 1; this occurs with probability (n1)!/n! = 1/n. Another example of a random permutation might be a uniform shuffling of a 52card deck (difficult to achieve in practice!): here the probability that we get a particular set of 5 cards as the first 5 in the deck is obtained by counting all the permutations that have those 5 cards in the first 5 positions (there are 5!×47! of them) divided by 52!. The result is the same that we get from the uniform poker hands.
79. Independence and the intersection of two events
Events A and B are independent if Pr[A∩B] = Pr[A]·Pr[B]. In general, a group of events {A_{i}} is independent if each A_{i} is independent of any event defined only in terms of the other events.
It can be dangerous to assume that events are independent when they aren't, but quite often when describing a probability space we will explicitly state that certain events are independent. For example, one typically describes the space of random nbit strings (or n coin flips) by saying that one has n independent random bits and then deriving that each particular sequence occurs with probability 2^{n} rather than starting with each sequence occuring with probability 2^{n} and then calculating that each particular bit is 1 with independent probability 1/2; the first description makes much more of the structure of the probability space explicitly, and so is more directly useful in calculation.
79.1. Examples
What is the probability of getting two heads on independent coin flips? Pr[H_{1}∩H_{2}] = (1/2)(1/2) = 1/4.
Suppose the coinflips are not independent (maybe the two coins are glued together). What is the probability of getting two heads? This can range anywhere from zero (coin 2 always comes up the opposite of coin 1) to 1/2 (if coin 1 comes up heads, so does coin 2).
What is the probability that both you and I draw a flush (all 5 cards the same suit) from the same poker deck? Since we are fighting over the same collection of samesuit subsets, we'd expect Pr[A∩B] < Pr[A] Pr[B]—the event that you get a flush (A) is not independent of the event that I get a flush (B), and we'd have to calculate the probability of both by counting all ways to draw two hands that are both flushes. But if we put your cards back and then shuffle the deck again, the events in this new case are independent, and we can just square the Pr[flush] we calculated before.
Suppose the Red Sox play the Yankees. What is the probability that the final score is exactly 44? Amazingly, it appears that it is equal to Pr[Red Sox score 4 runs against the Yankees]*Pr[Yankees score 4 runs against the Red Sox] (see http://arXiv.org/abs/math/0509698 for a paper discussing this issue)—to the extent we can measure the underlying probability distribution, the score of each team in a professional baseball game appears to be independent of the score of the other team.
80. Union of two events
What is the probability of A∪B? If A and B are disjoint, then the axioms give Pr[A∪B] = Pr[A] + Pr[B]. But what if A and B are not disjoint?
By analogy to inclusionexclusion in counting we would expect that
 Pr[A∪B] = Pr[A] + Pr[B]  Pr[A∩B].
Intuitively, when we sum the probabilities of A and B we doublecount the event that both occur, and must subtract it off to compensate. To prove this formally, consider the events A∩B, A∩¬B, and ¬A∩B. These are disjoint, so the probability of the union of any subset of this set of events is equal to the sum of its components. So in particular we have
 Pr[A] + Pr[B]  Pr[A∩B] = (Pr[A∩B] + Pr[A∩¬B]) + (Pr[A∩B] + Pr[¬A∩B])  Pr[A∩B] = Pr[A∩B] + Pr[A∩¬B] + Pr[¬A∩B] = Pr[A∪B].
80.1. Examples
What is the probability of getting at least one head out of two independent coinflips? Pr[H_{1}∩H_{2}] = 1/2 + 1/2  (1/2)(1/2) = 3/4.
What is the probability of getting at least one head out of two coinflips, when the coinflips are not independent? Here again we can get any probability from 0 to 1, depending on what 1Pr[H_{1}H_{2}] is.
81. Conditional probability
Suppose I want to answer the question "What is the probability that my dice add up to 6 if I know that the first one is an odd number?" This question involves conditional probability, where we calculate a probability subject to some conditions. The probability of an event A conditioned on an event B, written Pr(AB), is defined by the formula
One way to think about this is that when we assert that B occurs we are in effect replacing the entire probability space with just the part that sits in B. So we have to divide all of our probabilities by Pr[B] in order to make Pr[BB] = 1, and we have to replace A with A∩B to exclude the part of A that can't happen any more.
Note also that conditioning on B only makes sense if Pr[B] > 0. If Pr[B] = 0, Pr[AB] is undefined.
81.1. Conditional probabilities and intersections of nonindependent events
Simple algebraic manipulation gives
So one of the ways to compute the probability of two events occurring is to compute the probability of one of them, and the multiply by the probability that the second occurs conditioned on the first. For example, if my attempt to reach the summit of Mount Everest requires that I first learn how to climb mountains (Pr[B] = 10%) and then make it to the top safely (Pr[AB] = 90%), then my chances of getting to the top are Pr[A∩B] = (90%)(10%) = 9%.
We can do this for sequences of events as well. Suppose that I have an urn that starts with k black balls and 1 red ball. In each of n trials I draw one ball uniformly at random from the urn. If it is red, I give up. If it is black, I put the ball back and add another black ball, thus increasing the number of balls by 1. What is the probability that on every trial I get a black ball?
Let A_{i} be the event that I get a black ball on the first i trials. Then Pr[A_{0}] = 1, and for larger i we have Pr[A_{i}] = Pr[A_{i}A_{i1}] Pr[A_{i1}]. If A_{i1} holds, then at the time of the ith trial we have k+i total balls in the urn of which one is red. So the probability that we draw a black ball is 11/(k+i) = (k+i1)/(k+i). By induction we can then show that
This is an example of a collapsing product, where the denominator of each fraction cancels out the numerator of the next; we are left only with the denominator k+i of the last term and the numerator k of the first, giving Pr[A_{i}] = k/(k+i). It follows that we make it through all n trials with probability Pr[A_{n}] = k/(k+n).
81.2. The law of total probability
We can use the fact that A is the disjoint union of A∧B and A∧¬B to get Pr[A] by case analysis:
So, for example, there is a 20% chance I can make it to the top of Mt Everest safely without learning how to climb first, my chances of getting there go up to (90%)(10%) + (20%)(90%) = 27%.
This method is sometimes given the rather grandiose name of the law of total probability. The most general version is that if B_{1}..B_{n} are all disjoint events, then
81.3. Bayes's formula
If one knows Pr[AB], Pr[A¬B], and Pr[B], it's possible to compute Pr[BA]:
This formula is used heavily in statistics, where it goes by the name of Bayes's formula. Say that you have an Airport Terrorist Detector that lights up 75% of the time when inserted into the nostrils of a Terrorist, but lights up 0.1% of the time when inserted into the nostrils of a nonTerrorist. Suppose that for other reasons you know that Granny has only a 0.01% chance of being a Terrorist. What is the probability that Granny is a Terrorist if the detector lights up?
Let B be the event "Granny is a terrorist" and A the event "Detector lights up". Then Pr[BA] = (75% * 0.01%)/(75% * 0.01% + 0.1% * 99.99%) ≅ 0.07495%. This examples show how even a small "false negative" rate can make it difficult to interpret the results of tests for rare conditions.
82. Random variables
A random variable X is a function from a probability space to some codomain; for more details see RandomVariables.
83. RandomVariables
Contents
84. Random variables
A random variable X is a variable that takes on particular values randomly. This means that for each possible value x, there is an event [X=x] with some probability of occurring that corresponds to X (the random variable, usually written as an uppercase letter) taking on the value x (some fixed value).
Examples of random variables:
Indicator variables: The indicator variable for an event A is a variable X that is 1 if A occurs and 0 if it doesn't (i.e., X(ω) = 1 if ω∈A and 0 otherwise). Indicator variables are often written using the Greek letter chi (e.g. χ_{A}) or using bracket notation (e.g., [A], [Y^{2} > 3], [all six coins come up heads]).
 Functions of random variables: Any function you are likely to run across of a random variable or random variables is a random variable, e.g. X+Y, XY, log X, etc.
 Counts: Flip a fair coin n times and let X be the number of times it comes up heads. Then X is an integervalued random variable.
Random sets and structures: Suppose that we have a set T of n elements, and we pick out a subset U by flipping an independent fair coin for each element to decide whether to include it. Then U is a setvalued random variable. Or we could consider the infinite sequence X_{0}, X_{1}, X_{2}, ..., where X_{0} = 0 and X_{n+1} is either X_{n}+1 or X_{n}1, which being chosen by an independent fair coin flip. Then we can think of the entire sequence X as a sequencevalued random variable.
85. The distribution of a random variable
The distribution of a random variable describes the probability that it takes on various values. For discrete random variables (variables that take on only countably many values, each with nonzero probability), the distribution is most easily described by just giving the probability Pr[X=x] for each value x.^{8}
Often if we know the distribution of a random variable, we don't bother worrying about what the underlying probability space is. The reason for this is we can just take Ω to be the range of the random variable, and define Pr[ω] for each ω∈Ω to be Pr[X=ω]. For example, a sixsided die corresponds to taking Ω = {1,2,3,4,5,6}, assigning Pr[ω] = 1/6 for all ω∈Ω, and letting X(ω) = ω.
The same thing works if we have multiple random variables, but now we let each point in the space be a tuple that gives the values of all of the variables. Specifying the probability in this case is done using a joint distribution (see below).
85.1. Some standard distributions
Here are some common distributions for a random variable X:
 Bernoulli distribution
 Pr[X = 1] = p, Pr[X = 0] = q, where p is a parameter of the distribution and q = 1p. This corresponds to a single biased coinflip.
 Binomial distribution
Pr[X = k] = (n choose k) p^{k} q^{(nk)}, where n and p are parameters of the distribution and q = 1p. This corresponds to the sum of n biased coinflips.
 Geometric distribution
Pr[X = k] = q^{k}p, where p is a parameter of the distribution and q is again equal to 1p. This corresponds to number of tails we flip before we get the first head in a sequence of biased coinflips.
 Poisson distribution
Pr[X = k] = e^{λ}λ^{k}/k!. This is what happens to a binomial distribution when we fix p = λ/n and then take the limit as n goes to infinity; we can think of it as counting the number of events that occur in one time unit if the events occur at a constant continuous rate that averages λ events per time unit. The canonical example is radioactive decay.
 Uniform distribution
 The distribution function F of X is given by F(x) = 0 when x ≤ a, (xa)/(ba) when a ≤ x ≤ b, and 1 when b ≤ x, where a and b are parameters of the distribution. This is a continuous random variable that has equal probability of landing anywhere in the [a,b] interval.
Another very important distribution is the normal distribution, but it's not discrete so we would need more machinery to talk about it.
85.2. Joint distributions
Two or more random variables can be described using a joint distribution. For discrete random variables, this just gives Pr[X=x ∧ Y=y] for all fixed values x and y, or in general gives Pr[∀i X_{i}=x_{i}].
Given a joint distribution on X and Y, we can recover the distribution on X or Y individually by summing up cases: Pr[X=x] = ∑_{y} Pr[X=x ∧ Y=y]. The distribution of X obtained in this way is called a marginal distribution of the original joint distribution. In general we can't go in the other direction, because just knowing the marginal distributions doesn't tell us how the random variables might be related to each other.
Examples:
 Let X and Y be sixsided dice. Then Pr[X=x ∧ Y=y] = 1/36 for all values of x and y in the right range. The underlying probability space consists of all pairs (x,y) in {1,2,3,4,6}×{1,2,3,4,5,6}.
 Let X be a sixsided die and let Y = 7  X. Then Pr[X=x ∧ Y=y] = 1/6 if 1 ≤ x ≤ 6 and y = 7x, and 0 otherwise, with the underlying probability space most easily described by including just six points for the X values (although we could also do {1,2,3,4,5,6}×{1,2,3,4,5,6} as in the previous case, just assigning probability 0 to most of the points). However, even though the joint distribution is very different from the previous case, the marginal distributions of X and Y are exactly the same as before: each of X and Y takes on all values in {1,2,3,4,5,6} with equal probability.
85.3. Independence of random variables
The difference between the two preceding examples is that in the first case, X and Y are independent, and in the second case, they aren't.
Two random variables X and Y are independent if any pair of events of the form X∈A, Y∈B are independent. For discrete random variables, it is enough to show that Pr[X=x ∧ Y=y] = Pr[X=x]⋅Pr[Y=y], or in other words that the events [X=x] and [Y=y] are independent for all values x and y. In practice, we will typically either be told that two random variables are independent or deduce it from how they are generated.
Examples:
Roll two sixsided dice, and let X and Y be the values of the dice. By convention we assume that these values are independent. This means for example that Pr[X∈{1,2,3} ∧ Y∈{1,2,3}] = [Pr[X∈{1,2,3}]⋅Pr[Y∈{1,2,3}] = (1/2)(1/2) = 1/4, which is a slightly easier computation than counting up the 9 cases (and then argue that each occurs with probability (1/6)^{2}, which requires knowing that X and Y are independent).
 Take the same X and Y, and let Z = X+Y. Now Z and X are not independent, because Pr[X=1 ∧ Z=12] = 0, which is not equal to Pr[X=1]⋅Pr[Z=12] = (1/6)(1/36) = 1/216.
 Place two radioactive sources on opposite sides of the Earth, and let X and Y be the number of radioactive decay events in each source during some 10ms interval. Since the sources are 42ms away from each other at the speed of light, we can assert that either X and Y are independent, or the world doesn't behave the way the physicists think it does. This is an example of variables being independent because they are physically independent.
 Roll one sixsided die X, and let Y = ⌈X/2⌉ and Z = X mod 2. Then Y and Z are independent, even though they are generated using the same physical process.
In general, if we have a collection of random variables X_{i}, we say that they are all independent if the joint distribution is the product of the marginal distributions, i.e. if Pr[∀i X_{i}=x_{i}] = ∏_{i} Pr[X_{i}=x_{i}]. It may be that a collection of random variables is not independent even though all subcollections are.
 Let X and Y be fair coinflips, and let Z = X⊕Y. Then any two of X, Y, and Z are independent, but the three variables X, Y, and Z are not independent, because (for example) Pr[X = 0 ∧ Y = 0 ∧ Z = 0] = 1/4 instead of 1/8 as one would get by taking the product of the marginal distributions.
Since we can compute the joint distribution from the marginal distributions for independent variables, we will often just specify the marginal distributions and declare that a collection of random variables are independent. This implicitly gives us an underlying probability space consisting of all sequences of values for the variables.
86. The expectation of a random variable
For a realvalued random variable X, its expectation E[X] (sometimes just EX) is its average value, weighted by probability.^{9}> For discrete random variables, the expectation is defined by
 Example (discrete variable)
 Let X be the number rolled with a fair sixsided die. Then E[X] = (1/6) (1+2+3+4+5+6) = 3½.
 Example (unbounded discrete variable)
Let X be a geometric random variable with parameter p, i.e., let Pr[X = k] = q^{k}p, where q = 1p. Then E[X] = .
Expectation is a way to summarize the distribution of a random variable without giving all the details. If you take the average of many independent copies of a random variable, you will be likely to get a value close to the expectation. Expectations are also used in decision theory to compare different choices. For example, given a choice between a 50% chance of winning $100 (expected value: $50) and a 20% chance of winning $1000 (expected value: $200), a rational decision maker would take the second option. Whether ordinary human beings correspond to an economist's notion of a rational decision maker often depends on other details of the situation.
Terminology note: If you hear somebody say that some random variable X takes on the value z on average, this usually means that E[X] = z.
86.1. Variables without expectations
If a random variable has a particularly annoying distribution, it may not have a finite expectation, even thought the variable itself takes on only finite values. This happens if the sum for the expectation diverges.
For example, suppose I start with a dollar, and double my money every time a fair coinflip comes up heads. If the coin comes up tails, I keep whatever I have at that point. What is my expected wealth at the end of this process?
Let X be the number of times I get heads. Then X is just a geometric random variable with p = 1/2, so Pr[X=k] = (1(1/2))^{k}(1/2)^{k} = 2^{k1}. My wealth is also a random variable: 2^{X}. If we try to compute E[2^{X}], we get
which diverges. Typically we say that a random variable like this has no expected value, although sometimes you will see people writing E[2^{X}] = ∞.
(For an even nastier case, consider what happens with E[(2)^{X}].)
86.2. Expectation of a sum
The expectation operator is linear: this means that E(X+Y) = E(X)+E(Y) and E(aX) = aE(X) when a is a constant. This fact holds for all random variables X and Y, whether they are independent or not, and is not hard to prove for discrete probability spaces:
Linearity of expectation makes computing many expectations easy. Example: Flip a fair coin n times, and let X be the number of heads. What is E[X]? We can solve this problem by letting X_{i} be the indicator variable for the event "coin i came up heads". Then X = ∑_{i} X_{i} and EX = E[∑_{i} X_{i}] = ∑_{i} EX_{i} = n(½) = n/2. In principle it is possible to calculate the same value from the distribution of X (which involves a lot of binomial coefficients), but linearity of expectation is much easier.
 Example
 Choose a random permutation f, i.e. a random bijection from 1..n → 1..n. What is the expected number of values i for which f(i) = i?
 Solution
Let X_{i} be the indicator variable for the event that f(i) = i. Then we are looking for E[X_{1} + X_{2} + ... X_{n}] = E[X_{1}] + E[X_{2}] + ... E[X_{n}]. But E[X_{i}] is just 1/n for each i, so the sum is n(1/n) = 1. (Calculating this by computing Pr[∑X_{i}] = x first would be very painful.)
86.3. Expectation of a product
For products of random variables, the situation is more complicated. Here the rule is that E[XY] = E[X]⋅E[Y] if X and Y are independent. But if X and Y are not independent, their expectation can be arbitrary.
 Example
 Roll 2 dice and take their product. What value do we get on average? The product formula gives E[XY] = E[X]E[Y] = (7/2)² = (49/4) = 12¼. We could also calculate this directly by summing over all 36 cases, but it would take a while.
 Example
 Roll 1 die and multiply it by itself. What value do we get on average? Here we are no longer dealing with independent random variables, so we have to do it the hard way: E[X²] = (1²+2²+3²+4²+5²+6²)/6 = 91/6 = 15⅙. This is substantially higher than when the dice are uncorrelated. (Exercise: How can you rig the second die so it still comes up with each value ⅙ of the time but minimizes E[XY]?)
We can prove the product rule without too much trouble for discrete random variables. The easiest way is to start from the righthand side.
Here we use independence in going from Pr[X=x] Pr[Y=y] to Pr[X=x ∧ Y=y] and use the union rule to convert the x,y sum into Pr[XY=z].
86.4. Conditional expectation
Like conditional probability, there is also a notion of conditional expectation. The simplest version of conditional expectation conditions on a single event A, is written E[XA], and is defined for discrete random variables by
This is exactly the same as unconditioned expectation except that the probabilities are now conditioned on A.
 Example
 What is the expected value of a sixsided die conditioned on not rolling a 1? The conditional probability of getting 1 is now 0, and the conditional probability of each of the remaining 5 values is 1/5, so we get (1/5)(2+3+4+5+6) = 4.
Conditional expectation acts very much like regular expectation, so for example we have E[aX+bYA] = aE[XA] + bE[YA].
One of the most useful applications of conditional expectation is that it allows computing (unconditional) expectations by case analysis, using the fact that
 E[X] = E[XA]Pr[A] + E[X¬A]Pr[¬A].
86.4.1. Examples
86.4.1.1. The Treasure on Mt Everest
I have a 50% chance of reaching the top of Mt Everest, where Sir Edmund Hilary and Tenzing Norgay hid somewhere between 0 and 10 kilograms of gold (a random variable with uniform distribution). How much gold do I expect to bring home? Compute E[X] = E[Xreached the top]Pr[reached the top] + E[Xdidn't make it]Pr[didn't make it] = 5⋅0.5 + 0⋅0.5 = 2.5.
86.4.1.2. Waiting times
Suppose I flip a coin that comes up heads with probability p until I get heads. How many times on average do I flip the coin?
We'll let X be the number of coin flips. Conditioning on whether the coin comes up heads on the first flip gives E[X] = 1⋅p + (1+E[X'])⋅(1p), where X' is random variable counting the number of coinflips needed to get heads ignoring the first coinflip. But since X' has the same distribution as X, we get EX = p + (1p) (1+EX) or EX = (p+(1p))/p = 1/p. So a fair coin must be flipped twice on average to get a head, which is about what we'd expect if we hadn't thought about it much.
86.4.1.3. Rewarding success and punishing failure
Suppose I have my experimental test subjects complete a task that gets scored on a scale of 0 to 100. I decide to test whether rewarding success is a better strategy for improving outcomes than punishing failure. So for any subject that scores high than 50, I give them a chocolate bar. For any subject that scores lower than 50, I give them an electric shock. (Students who score exactly 50 get nothing.) I then have them each perform the task a second time and measure the average change in their scores. What happens?
Let's suppose that there is no effect whatsoever of my rewards and punishments, and that each test subject obtains each possible score with equal probability 1/101. Now let's calculate the average improvement for test subjects who initially score less than 50 or greater than 50. Call the outcome on the first test X and the outcome on the second test Y.
In the first case, we are computing E[YX  X < 50]. This is the same as E[Y  X < 50]  E[X  X<50] = E[Y]  E[XX<50] = 50  24.5 = +25.5. So punishing failure produces a 25.5 point improvement on average.
In the second case, we are computing E[YX  X > 50]. This is the same as E[Y  X > 50]  E[X  X>50] = E[Y]  E[XX>50] = 50  75.5 = 25.5. So rewarding success produces a 25.5 point decline on average.
Clearly this suggests that we punish failure if we want improvements and reward success if we want backsliding. This is intuitively correct: punishing failure encourages our slacker test subjects to do better next time, while rewarding success just makes them lazy and complacent. But since the test outcomes don't depend on anything we are doing, we get exactly the same answer if we reward failure and punish success: in the former case, a +25.5 point average change, in the later a 25.5 point average change. This is also intuitively correct: rewarding failure makes our subjects like the test so that they will try to do better next time, while punishing success makes them feel that it isn't worth it. From this we learn that our intuitions^{10} provide powerful tools for rationalizing almost any outcome in terms of the good or bad behavior of our test subjects. A more careful analysis shows that we performed the wrong comparison, and we are the victim of regression to the mean.
For a realworld example of how similar problems can arise in processing data, the United States Bureau of Labor Statistics defines a small business as any company with 500 or fewer employees. So if a company has 400 employees in 2007, 600 in 2008, and 400 in 2009, then we just saw a net creation of 200 new jobs by a small business in 2007, followed by the destruction of 200 jobs by a large business in 2008. This effect alone accounts for most of the observation that small businesses generate more new jobs than large ones.
86.4.2. Conditioning on a random variable
There is a more general notion of conditional expectation for random variables, where the conditioning is done on some other random variable Y. Unlike E[XA], which is a constant, the expected value of X conditioned on Y, written E[XY], is itself a random variable: when Y = y, it takes on the value E[XY=y].
 Example
 Let us compute E[X+YX] where X and Y are the values of independent sixsided dice. When X = x, E[X+YX] = E[X+YX=x] = x+E[Y] = x + 7/2. For the full random variable we can write E[X+YX] = X + 7/2.
Another way to get the result in the preceding example is to use some general facts about conditional expectation:
 E[aX+bYZ] = aE[XZ] + bE[YZ]. This is the conditionalexpectation version of linearity of expectation.
 E[XX] = X. This is immediate from the definition, since E[XX=x] = x.
 If X and Y are independent, then E[YX] = E[Y]. The intuition is that knowing the value of X gives no information about Y, so E[YX=x] = E[Y] for any x in the range of X. (To do this formally requires using the fact that Pr[Y=yX=x] = Pr[Y=y /\ X=x] / Pr[X=x] = Pr[Y=y]Pr[X=x]/Pr[X=x] = Pr[Y=y], provided X and Y are independent.)
 Also useful: E[E[XY]] = E[X]. Averaging a second time removes all dependence on Y.
These in principle allow us to do very complicated calculations involving conditional expectation. For example:
 Example
 Let X and Y be the values of independent sixsided dice. What is E[X  X+Y]? Here we observe that X+Y = E[X+Y  X+Y] = E[X  X+Y] + E[Y  X+Y] = 2E[X  X+Y] by symmetry. So E[X  X+Y] = (X+Y)/2. This is pretty much what we'd expect: on average, half the total value is supplied by one of the dice. (It also works well for extreme cases like X+Y = 12 or X+Y = 2, giving a quick check on the formula.)
 Example
What is E[(X+Y)^{2}  X] when X and Y are independent? Compute E[(X+Y)^{2}  X] = E[X^{2}  X] + 2E[XY  X] + E[Y^{2}  X] = X^{2} + 2X E[Y] + E[Y^{2}]. For example, if X and Y are independent sixsided dice we have E[(X+Y)^{2}  X] = X^{2} + 7X + 91/6, so if you are rolling the dice one at a time and the first one comes up 5, you can expect on average to get a squared total of 25 + 35 + 91/6 = 75 1/6. But if the first one comes up 1, you only get 1 + 7 + 91/6 = 23 1/6 on average.
86.5. Markov's inequality
Knowing the expectation of a random variable gives you some information about it, but different random variables may have the same expectation but very different behavior: consider, for example, the random variable X that is 0 with probability 1/2 and 1 with probability 1/2 and the random variable Y that is 1/2 with probability 1. In some cases we don't care about the average value of a variable so much as its likelihood of reaching some extreme value: for example, if my feet are encased in cement blocks at the beach, knowing that the average high tide is only 1 meter is not as important as knowing whether it ever gets above 2 meters. Markov's inequality lets us bound the probability of unusually high values of nonnegative random variables as a function of their expectation. It says that, for any a > 0,
Pr[X > aEX] < 1/a.
This can be proved easily using conditional expectations. We have:
EX = E[XX > aEX] Pr[X > aEX] + E[XX ≤ aEX] Pr[X > aEX].
Since X is nonnegative, E[XX ≤ aEX] ≥ 0, so subtracting out the last term on the righthand side can only make it smaller. This gives:
EX ≥ E[XX > aEX] Pr[X > aEX] > aEX Pr[X > aEX]
and dividing both side by aEX gives the desired result.
Another version of Markov's inequality replaces > with ≥:
 E[X ≥ aEX] ≤ 1/a.
The proof is essentially the same.
 Example
Suppose that that all you know about high tide is that EX = 1 meter and X ≥ 0. What can we say about the probability that X > 2 meters? Using Markov's inequality, we get Pr[X > 2 meters] = Pr[X > 2EX] < 1/2.
There is, of course, a conditional version of Markov's inequality:
Pr[X > aE[XA]  A] < 1/a.
This version doesn't get anywhere near as much use as the unconditioned version, but it may be worth remembering that it exists.
87. The variance of a random variable
Expectation tells you the average value of a random variable but it doesn't tell you how far from the average the random variable typically gets: the random variable X = 0 and Y = ±1,000,000,000,000 with equal probability both have expectation 0, though their distributions are very different. Though it is impossible to summarize everything about the spread of a distribution in a single number, a useful approximation for many purposes is the variance Var(X) of a random variable X, which is defined as the expected square of the deviation from the expectation, or E((XEX)^{2}).
 Example
Let X = 0 or 1 with equal probability. Then EX = 1/2, and (XEX)^{2} is always 1/4. So Var(X) = 1/4.
 Example
Let X be the value of a fair sixsided die. Then EX = 7/2, and E((EEX)^{2}) = (1/6)((17/2)^{2} + (27/2)^{2} + (37/2)^{2} + ... + (6  7/2)^{2}) = 35/12.
Computing variance directly from the definition can be tedious. Often it is easier to compute it from E(X^{2}) and EX:
Var[X] = E[(XEX)^{2}] = E[X^{2}  2 X EX + (EX)^{2}] = E[X^{2}]  2 EX EX + (EX)^{2} = E[X^{2}] = (EX)^{2}.
(The secondtolast step uses linearity of expectation and the fact that EX is a constant.)
 Example
For X = 0 or 1 with equal probability, we have E[X^{2}] = 1/2 and (EX)^{2} = 1/4, so Var[X] = 1/4.
 Example
 Let's try the sixsided die again, except this time we'll use an nsided die. We have
When n = 6, this gives 7⋅13/6  49/4 = 35/12. (Ok, maybe it isn't always easier).
87.1. Multiplication by constants
Suppose we are asked to compute the variance of aX, where a is a constant. We have
 Var[aX] = E[(aX)²]  E[aX]² = a²E[X²]  (aE[X])² = a² Var[X].
So, for example, if X = 0 or 2 with equal probability, Var[X] = 4⋅(1/4) = 1. This is exactly what we expect given that XEX is always ±1.
Another consequence is that Var[X] = (1)²Var[X] = Var[X]. So variance is not affected by negation.
87.2. The variance of a sum
What is Var[X+Y]? Write
The quantity E[XY]  EX EY is called the covariance of X and Y and is written Cov(X,Y). So we have just shown that
 Var[X+Y] = Var[X] + Var[Y] + 2 Cov(X,Y).
When Cov(X,Y) = 0, or equivalently when E[XY] = EX EY, X and Y are said to be uncorrelated and their variances add. This occurs when X and Y are independent, but may also occur without X and Y being independent.
For larger sums the corresponding formula is
This simplifies to Var(∑X_{i}) = ∑Var(X_{i}) when the X_{i} are pairwise independent, so that each pair of distinct X_{i} and X_{j} are independent. (This is implied by independence but is not equivalent to it.)
 Example
What is the variance of the number of heads in n independent fair coinflips? Let X_{i} be the indicator variable for the event that the ith flip comes up heads and let X be the sum of the X_{i}. We have already seen that Var[X_{i}] = 1/4, so Var[X] = n Var[X_{i}] = n/4.
 Example
 Let a be a constant. What is the variance of X+a? We have Var[X+a] = Var[X] + Var[a] = Var[X], since (1) E[aX] = aE[X] = E[a]E[X] means that a (considered as a random variable) and X are uncorrelated, and (2) Var[a] = E[aEa] = E[aa] = 0. So shifting a random variable up or down doesn't change its variance.
87.3. Chebyshev's inequality
Variance is an expectation, so we can use Markov's inequality on it. The result is Chebyshev's inequality:
Pr[X  EX > r) < Var[X] / r^{2}.
Proof: The event X  EX > r is the same as the event (XEX)^{2} > r^{2}. By Markov's inequality, the probability that this occurs is at most E[(EEX)^{2}]/r^{2} = Var[X]/r^{2}.
87.3.1. Application: showing that a random variable is close to its expectation
This is the usual statistical application.
 Example
Flip a fair coin n times, and let X be the number of heads. What is the probability that Xn/2 > r? Recall that Var[X] = n/4, so Pr[Xn/2 > r] < (n/4)/r^{2} = n/(4r^{2}). So, for example, the chances of deviating from the average by more than 1000 after 1000000 coinflips is less than 1/4.
 Example
Out of n voters in Saskaloosa County, m plan to vote for Smith for County Dogcatcher. A polling firm samples k voters (with replacement) and asks them who they plan to vote for. Suppose that m < n/2; compute a bound on the probability that the polling firm incorrectly polls a majority for Smith.
Solution: Let X_{i} be the indicator variable for a Smith vote when the ith voter is polled and let X = ∑X_{i} be the total number of pollees who say they will vote for Smith. Let p = EX_{i} = m/n. Then Var[X_{i}] = p  p^{2}, EX = kp, and Var[X] = k(pp^{2}). To get a majority in the poll, we need X > k/2 or XEX > k/2  kp. Using Chebyshev's inequality, this event occurs with probability at most
Note that the bound decreases as k grows and (for fixed p) does not depend on n.
In practice, statisticians will use a stronger result called the Central limit theorem, which describes the shape of the distribution of the sum of many independent random variables much more accurately than the bound from Chebyshev's inequality. Designers of randomized algorithms are more likely to use Chernoff bounds.
87.3.2. Application: lower bounds on random variables
Unlike Markov's inequality, which can only show that a random variable can't be too big too often, Chebyshev's inequality can be used to show that a random variable can't be too small, by showing first that its expectation is high and then that its variance is low. For example, suppose that each of the 10^{30} oxygen molecules in the room is close enough to your mouth to inhale with pairwise independent probability 10^{4} (it's a big room). Then the expected number of oxygen molecules near your mouth is a healthy 10^{30} * 10^{4} = 10^{26}. What is the probability that all 10^{26} of them escape your grasp?
Let X_{i} be the indicator variable for the event that the ith molecule is close enough to inhale. We've effectively already used the fact that E[X_{i}] = 10^{4}. To use Chebyshev's inequality, we also need Var[X_{i}] = E[X_{i}^{2}]  E[X_{i}]^{2} = 10^{4}  10^{8} ~= 10^{4}. So the total variance is about 10^{30}*10^{4} = 10^{26} and Chebyshev's inequality says we have Pr[X  EX ≥ 10^{26}] ≤ 10^{26}/(10^{26})^{2} = 10^{26}. So death by failure of statistical mechanics is unlikely (and the real probability is much much smaller).
But wait! Even a mere 90% drop in O_{2} levels is going to be enough to cause problems. What is the probability that this happens? Again we can calculate Pr[90% drop] ≤ Pr[XEX ≥ 0.9*10^{26}] ≤ 10^{26}/(0.9*10^{26})^{2} ~= 1.23*10^{26}. So even temporary asphyxiation by statistical mechanics is not something to worry about.
88. Probability generating functions
For a discrete random variable X taking on only values in ℕ, we can express its distribution using a probability generating function or pgf:
F(z) = ∑ Pr[X=n] z^{n}.
These are essentially standardissue GeneratingFunctions with the additional requirement that all coefficients are nonnegative and F(1) = 1.
A trivial example is the pgf for a Bernoulli random variable (1 with probability p, 0 with probability q=1p). Here the pgf is just q+pz.
A more complicated example is the pgf for a geometric random variable. Now we have ∑ q^{k} p z^{k} = p ∑ (qz)^{k} = p/(1qz).
88.1. Sums
A very useful property of pgf's is that the pgf of a sum of independent random variables is just the product of the pgf's of the individual random variables. The reason for this is essentially the same as for ordinary GeneratingFunctions: when we multiply together two terms (Pr[X=n] z^{n})(Pr[Y=m] z^{m}), we get Pr[X=n ∧ Y=m] z^{n+m}, and the sum over all the different ways of decomposing n+m gives all the different ways to get this sum.
So, for example, the pgf of a binomial random variable equal to the sum of n independent Bernoulli random variables is (q+pz)^{n} (hence the name "binomial").
88.2. Expectation and variance
One nice thing about pgf's is that the can be used to quickly compute expectation and variance. For expectation, we have
F'(z) = ∑ n Pr[X=n] z^{n1}.
So
 F'(1) = ∑ n Pr[X=n] = E[X].
If we take the second derivative, we get
F''(z) = ∑ n(n1) Pr[X=n] z^{n1}
or
F''(1) = ∑ n(n1) Pr[X=n] = E[X(X1)] = E[X²]  E[X].
So we can recover E[X²] as F''(1) + F'(1) and get Var[X] as F''(1) + F'(1)  (F'(1))².
 Example
If X is a Bernoulli random variable with pgf F = (q+pz), then F' = p and F'' = 0, giving E[X] = F'(1) = p and Var[X] = F''(1) + F'(1)  (F'(1))² = 0 + p  p² = p(1p) = pq.
 Example
If X is a binomial random variable with pgf F = (q+pz)^{n}, then F' = n(q+pz)^{n1}p and F'' = n(n1)(q+pz)^{n2}p², giving E[X] = F'(1) = np and Var[X] = F''(1) + F'(1)  (F'(1))² = n(n1)p² + np  n²p² = np  np² = npq. (These values would, of course, be a lot faster to compute using the formulas for sums of independent random variables, but it's nice to see that they work.)
 Example
If X is a geometric random variable with pgf p/(1qz), then F' = pq/(1qz)² and F'' = 2pq²/(1qz)^{3}. E[X] = F'(1) = pq/(1q)² = pq/p² = q/p. Var[X] = F''(1) + F'(1)  (F'(1))² = 2pq²/(1q)^{3} + q/p  q²/p² = 2q²/p² + q/p  q²/p² = q²/p² + q/p. This would probably be a pain to calculate by hand.
 Example
Let X be a Poisson random variable with rate λ. We claimed earlier that a Poisson random variable is the limit of a sequence of binomial random variables where p = λ/n and n goes to infinity, so (cheating quite a bit) we expect that X's pgf F = lim[n⇒∞] ((1λ/n) + (λ/n)z)^{n} = (1+(λ+λz)/n)^{n} = exp(λ+λz) = exp(λ) ∑ λ^{n}z^{n}/n!. We can check that the total probability F(1) = exp(λ+λ) = exp(0) = 1, that the expectation F'(1) = λ exp(λ+λ) = λ, and that the variance F''(1) + F'(1)  (F'(1))² = λ²exp(λ+λ) + λ  λ² = λ. These last two quantities are what we'd expect if we calculated the expectation and the variance directly as the limit of taking n Bernoulli random variables with expectation λ/n and variance (λ/n)(1λ/n) each.
89. Summary: effects of operations on expectation and variance of random variables
Operation 
Effect on expectation 
Effect on variance 
Multiplication by a constant 
E[aX] = aE[X] 
Var[aX] = a^{2} Var[X] 
Addition 
E[X+Y] = E[X] + E[Y]. Does not require independence. 
Var[X+Y] = Var[X] + Var[Y] + 2 Cov(X,Y). Note that Cov(X,Y)=0 if X and Y are independent. 
Product 
E[XY] = E[X]E[Y] + Cov(X,Y). (Or just E[X]E[Y] if X and Y are independent.) 
(No simple formula.) 
90. The general case
So far we have only considered discrete random variables, which avoids a lot of nasty technical issues. In general, a random variable on a probability space (Ω,F,P) is a function whose domain is Ω, which satisfies some extra conditions on its values that make interesting events involving the random variable elements of F. Typically the codomain will be the reals or the integers, although any set is possible. Random variables are generally written as capital letters with their arguments suppressed: rather than writing X(ω), where ω∈Ω, we write just X.
A technical condition on random variables is that the inverse image of any measurable subset of the codomain must be in F—in simple terms, if you can't nail down ω exactly, being able to tell which element of F you land in should be enough to determine the value of X(ω). For a discrete random variables, this just means that X^{1}(x)∈F for each possible value x. For realvalued random variables the requirement is that the event [X ≤ x] is in F for any fixed x. In each case we say that X is measurable with respect to F (or just "measurable F").^{11} Usually we will not worry about this issue too much, but it may come up if we are varying F to represent different amounts of information available to different observers (e.g., if X and Y are the values of two dice, X is measurable to somebody who can see both dice but not to somebody who can only see the sum of the dice).
The distribution function of a realvalued random variable describes the probability that it takes on each of its possible values; it is specified by giving a function F(x) = Pr[X ≤ x]. The reason for using Pr[X ≤ x] instead of Pr[X = x] is that it allows specifying continuous random variables such as a random variable that is uniform in the range [0,1]; this random variable has a distribution function given by F(x) = x when 0 ≤ x ≤ 1, F(x) = 0 for x < 0, and F(x) = 1 for x > 1. For discrete random variables the distribution function will have discontinuous jumps at each possible value of the variable; for example, the distribution function of a variable X that is 0 or 1 with equal probability is F(x) = 0 for x < 0, 1/2 for 0 ≤ x < 1, and 1 for x ≥ 1.
Knowing the distribution of a random variable tells you what that variable might do by itself, but doesn't tell you how it interacts with other random variables: for example, if X is 0 or 1 with equal probability then X and 1X both have the same distribution, but they are connected in a way that is not true for X and some independent variable Y with the same distribution. For multiple variables, a joint distribution gives the probability that each variable takes on a particular value; for example, if X and Y are two independent uniform samples from the range [0,1], their distribution function F(x,y) = Pr[X ≤ x ∧ Y ≤ y] = xy (when 0 ≤ x,y ≤ 1). If instead Y = 1X, we get the distribution function F(x,y) = Pr[X ≤ x ∧ Y ≤ y] equal to x when y ≥ 1x and 0 when y < 1x (assuming 0 ≤ x,y ≤ 1).
We've seen that for discrete random variables, it is more useful to look at the function f(x) = Pr[X=x]. We will often treat such a function as specifying the distribution of X even if it is not technically a distribution function.
90.1. Densities
If a realvalued random variable is continuous in the sense of having a distribution function with no jumps (which means that it has probability 0 of landing on any particular value), we may be able to describe its distribution by giving a density instead. The density is the derivative of the distribution function. We can also think of it as a probability at each point defined in the limit, by taking smaller and smaller regions around the point and dividing the probability of landing in the region by the size of the region.
For example, the density of a uniform [0,1] random variable is f(x) = 1 for x∈[0,1], f(x) = 0 otherwise. For a uniform [0,2] random variable, we get a density of ½ throughout the [0,2] interval. The density always integrates to 1.
Some distributions are easier to describe using densities than using distribution functions. The normal distribution, which is of central importance in statistics, has density
Its distribution function is the integral of this quantity, which has no closedform expression.
Joint densities also exist; the joint density of a pair of random variables with joint distribution function F(x,y) is given by the partial derivative f(x,y) = ∂²/∂x∂y F(x,y). The intuition here again is that we are approximating the (zero) probability at a point by taking the probability of a small region around the point and dividing by the area of the region.
90.2. Independence
Independence is the same as for discrete random variables: Two random variables X and Y are independent if any pair of events of the form X∈A, Y∈B are independent. For realvalued random variables it is enough to show that their joint distribution F(x,y) is equal to the product of their individual distributions F_{X}(x)F_{Y}(y). For realvalued random variables with densities, showing the densities multiply also works. Both methods generalize in the obvious way to sets of three or more random variables.
90.3. Expectation
If a continuous random variable has a density f(x), the formula is
For continuous random variables without densities we land in a rather swampy end of integration theory. We will not talk about this case if we can help it. But in each case the expectation depends only on the distribution of X and not on its relationship to other random variables.
 Example (continuous variable with density)
Let X be a uniform random variable in the range [a,b]. Then E[X] = ∫[a,b] x 1/(ba) dx = (1/(ba))(x²/2)_{x=a..b} = (1/(ba))(b²/2  a²/2) = (b+a)/2.
91. Relations
Contents
92. Relations, digraphs, and matrices
A binary relation from a set A to a set B is a subset of A×B. In general, an nary relation on sets A_{1}, A_{2}, ..., A_{n} is a subset of A_{1}×A_{2}×...×A_{n}. We will mostly be interested in binary relations, although nary relations are important in databases; unless otherwise specified, a relation will be a binary relation. A relation from A to A is called a relation on A; many of the interesting classes of relations we will consider are of this form. Some simple examples are the relations =, <, and ≤ on the integers.
You may recall that functions are a special case of relations (see Functions), but most of the relations we will consider now will not be functions.
Binary relations are often written in infix notation: instead of writing (x,y)∈R, we write xRy. This should be pretty familiar for standard relations like < but might look a little odd at first for relations named with capital letters.
92.1. Directed graphs
Relations are one of several structures over pairs of objects. Another such structure is a directed graph, consisting of a set of vertices V and a set of edges E, where each edge E has an initial vertex init(e) and a terminal vertex term(E). A simple directed graph has no "parallel edges": there are no edges e_{1} and e_{2} with init(e_{1}) = init(e_{2}) and term(e_{1}) = term(e_{2}).
If we don't care about the labels of the edges, a simple directed graph can be described by giving E as a subset of V×V; this gives a onetoone correspondence between relations on a set V and (simple) directed graphs. For relations from A to B, we get a bipartite directed graph, where all edges go from vertices in A to vertices in B.
Directed graphs are drawn using a dot for each vertex and an arrow for each edge, like so:
This also gives a way to draw relations. For example, the relation on { 1, 2, 3 } given by { (1,2), (1,3), (2,3), (3,1) } would look like this:
92.2. Matrices
A matrix is a twodimensional analog of a sequence: in full generality, it is a function A:S×T→U, where S and T are the index sets of the matrix (typically { 1..n } and {1..m} for some n and m). As with sequences, we write A_{ij} for A(i,j). Matrices are typically drawn inside square brackets like this:
The first index of an entry gives the row it appears in and the second one the column, so in this example A_{1 2} = 2 and A_{3 4} = 1. The dimensions of a matrix are the numbers of rows and columns; in the example, A is a 3×4 (pronounced "3 by 4") matrix.
Matrices are used heavily in LinearAlgebra, but for the moment we will use them to represent relations from { 1..n } to { 1..m }, by setting A_{ij} = 0 if (i,j) is not in the relation and A_{ij} = 1 if (i,j) is. So for example, the relation on { 1..3 } given by { (i,j)  i < j } would appear in matrix form as
93. Operations on relations
93.1. Composition
Just like functions, relations can be composed: given R:A→B and S:B→C we define (S∘R):A→C by the rule (x,z)∈(S∘R) if and only if there exists some y∈B such that (x,y)∈R and (y,z)∈S. (In infix notation: x(S∘R)z ⇔ ∃y xRy ∧ ySz.) It's not hard to see that ordinary function composition is just a special case of relation composition.
In matrix terms, composition acts like matrix multiplication, where we replace scalar multiplication with AND and scalar addition with OR: (S∘R)_{ij} = ∨_{k} (R_{ik}∧S_{kj}). Note that if we use the convention that R_{ij} = 1 if iRj the order of the product is reversed from the order of composition.
For relations on a single set, we can iterate composition: R^{n} is defined by R^{0} = (=) and R^{n+1} = R∘R^{n}. (This also works for functions.) In directed graph terms, xR^{n}y iff there is a path of exactly n edges from x to y (possibly using the same edge more than once).
93.2. Inverses
Relations also have inverses: xR^{1}y ⇔ yRx. Unlike functions, every relation has an inverse.
94. Classifying relations
Certain properties of relations on a set are important enough to be given names that you should remember.
 Reflexive
A relation R on a set A is reflexive if (a,a) is in R for all a in A. The relations = and ≤ are both reflexive. The equality relation is in a sense particularly reflexive: a relation R is reflexive if and only if it is a superset of =.
 Symmetric
A relation R is symmetric if (a,b) is in R whenever (b,a) is. Equality is symmetric, but ≤ is not. Another way to state symmetry is that R = R^{1}.
 Antisymmetric
A relation R is antisymmetric if the only way that both (a,b) and (b,a) can be in R is if a=b. (More formally: aRb ∧ bRa ⇒ a=b.) The "less than" relation < is antisymmetric: if a is less than b, b is not less than a, so the premise of the definition is never satisfied. The "less than or equal to" relation ≤ is also antisymmetric; here it is possible for a≤b and b≤a to both hold, but only if a=b. The settheoretic statement is R is symmetric iff R∩R^{1}⊆(=). This is probably not as useful as the simple definition.
 Transitive
A relation R is transitive if (a,b) in R and (b,c) in R implies (a,c) in R. The relations =, <, and ≤ are all transitive. The relation { (x,x+1)  x in ℕ } is not. The settheoretic form is that R is transitive if R²⊆R, or in general if R^{n}⊆R for all n > 0.
95. Equivalence relations
An equivalence relation is a relation that is reflexive, symmetric, and transitive. Equality is the model of equivalence relations, but some other examples are:
 Equality mod m: The relation x = y (mod m) that holds when x and y have the same remainder when divided by m is an equivalence relation.
Equality after applying a function: Let f:A→B be any function, and define x ~_{f} y if f(x) = f(y). Then ~_{f} is an equivalence relation.
Membership in the same block of a partition: Let A be the union of a collection of sets A_{i} where the A_{i} are all disjoint. The set { A_{i} } is called a partition of A and each individual set A_{i} is called a block of the partition. Let x ~ y if x and y appear in the same block A_{i} for some i. Then ~ is an equivalence relation.
Directed graph isomorphism: Suppose that G=(V,E) and G'=(V',E') are directed graphs, and there exists a bijection f:V→V' such that (u,v) is in E if and only if (f(u), f(v)) is in E'. Then G and G' are said to be isomorphic (from Greek "same shape"). The relation G ≅ G' that holds when G and G' are isomorphic is easily seen to be reflexive (let f by the identity function), symmetric (replaced f by f^{1}), and transitive (compose f:G→G' and g:G'→G''); thus it is an equivalence relation.
Partitioning a plane: draw a curve in a plane (i.e., pick a continuous function f:[0,1]→R^{2}). Let x~y if there is a curve from x to y (i.e., a curve g with g(0) = x and g(1) = y) that doesn't intersect the first curve. Then x~y is an equivalence relation on points in the plane excluding the curve itself. Proof: To show x~x, let g be the constant function g(t) = x. To show x~y ↔ y~x, consider some function g with g(0) = x and g(1) = y and let g'(t) = g(1t). To show x~y and y~z ⇒ x~z, let g be a curve from x to y and g' a curve from y to z, and define a new curve (g+g') by (g+g')(t) = g(2t) when t ≤ 1/2 and (g+g')(t) = g'(2t1) when t ≥ 1/2.
Any equivalence relation ~ on a set A gives rise to a set of equivalence classes, where the equivalence class of an element a is the set of all b such that a ~ b. Because of transitivity, the equivalence classes form a partition of the set A, usually written A/~ (prounounced "A slash ~" or sometimes "A modulo ~"). A member of a particular equivalence class is said to be a representative of that class. For example, the equivalence classes of equality mod m are the sets A_{i} = { i + km } with representatives { 0, 1, 2, 3, ..., m  1 }. A more complicated case are the equivalence classes of the plane partitioning example; here the equivalence classes are essentially the pieces we get after cutting out the curve f, and any point on a piece can act as a representative for that piece.
95.1. Why we like equivalence relations
Equivalence relations are the way that mathematicians say "I don't care." If you don't care about which integer you've got except for its remainder when divided by m, then you define two integers that don't differ in any way that you care about to be equivalent and work in ℤ/~ (ℤ/(= mod m) in this case). This turns out to be incredibly useful for defining new kinds of things: for example, we can define multisets (sets where elements can appear more than once) by starting with sequences, declaring x~y if there is a permutation of x that reorders it into y, and then defining a multiset as an equivalence class with respect to this relation.
This can also be used informally: "I've always thought that brocolli, spinach, and kale are in the same equivalence class."^{12}
96. Partial orders
A partial order is a relation ≤ that is reflexive and transitive, and antisymmetric: the last means that if x ≤ y and y ≤ x, then x = y. A set S together with a partial order ≤ is called a partially ordered set or poset. A strict partial order is a relation < that is irreflexive and transitive (which implies antisymmetry as well). Any partial order ≤ can be converted into a strict partial order and vice versa by deleting/including the pairs (x,x) for all x.
Examples:
 (ℕ, ≤) is a poset.
(ℕ, ≥) is also a poset. In general, if R is a partial order, then R^{1} is also a partial order.
The divisibility relation ab on natural numbers, where ab if and only if there is some k in ℕ such that b = ak, is reflexive (let k = 1), antisymmetric (if ab then a≤b so if ab and bc then a≤b and b≤c implying a=b) and transitive (if b = ak and c = bk' then c = akk'). Thus it is a partial order.
Let (A,≤_{A}) and (B,≤_{B}) be posets. Then the relation ≤ on A×B defined by (a,b) ≤ (a',b') iff a ≤ a' and b ≤ b' is a partial order. The poset (A×B,≤) defined in this way is called the product poset of A and B.
Again let (A,≤_{A}) and (B,≤_{B}) be posets. The relation ≤ on A×B defined by (a,b) ≤ (a',b') if a < a' or a = a' and b ≤ b' is called lexicographic order on A×B and is a partial order. The useful property of lexicographic order (lex order for short) is that if the original partial orders are total, so is the lex order: this is why dictionarymakers use it. This also gives a source of very difficulttovisualize total orders, like lex order on ℝ×ℝ, which looks like the classic real number line where every point is replaced by an entire copy of the reals.
Let Σ be some alphabet and consider the set Σ^{*} = Σ^{0}∪Σ^{1}∪Σ^{2}... of all finite words drawn from Σ. Given two words x and y, let x≤y if x is a prefix of y, i.e. if there is some word z such that xz=y. Then (Σ^{*},≤) is a poset.
Using the same set Σ^{*}, let x⊑y if x is a subsequence of y, i.e., if there is a sequence of increasing positions i1, i2, ... ik such that x_{j} = y_{ij}. (For example, bd⊑abcde.) Then (Σ^{*},⊑) is a poset.
There are also some common relations that are not partial orders or strict partial orders but come close. For example, the elementof relation (∈) is irreflexive and antisymmetric (this ultimately follows from the Axiom of Foundation) but not transitive; if x∈y and y∈z we do not generally expect x∈z. The "is at least as rich as" relation is reflexive and transitive but not antisymmetric: if you and I have a net worth of 0, we are each as rich as the other, and yet we are not the same person. Relations that are reflexive and transitive (but not necessarily antisymmetric) are called quasiorders or preorders and can be turned into partial orders by replacing each set of elements for which x≤y and y≤x for all elements in the set by a single element. (As far as I know there is no standard term for relations that are irreflexive and antisymmetric but not necessarily transitive.)
96.1. Drawing partial orders
Since partial orders are relations, we can draw them as directed graphs. But for many partial orders, this produces a graph with a lot of edges whose existence is implied by transitivity, and it can be easier to see what is going on if we leave the extra edges out. If we go further and line the elements up so that x is lower than y when x < y, we get a Hasse diagram: a representation of a partially ordered set as a graph where there is an edge from x to y if x < y and there is no z such that x < z < y. (There is special terminology for this situation: such an x is called a predecessor or sometimes immediate predecessor of y; y in turn is the successor or sometimes immediate successor of x.)
Here is an example of a Hasse diagram on a partiallyordered set with 5 elements. Observe that the full relation (depicted on the right) is much more tangled than the Hasse diagram. The red edges are those whose existence is implied by transitivity.
96.2. Comparability
In a partial order, two elements x and y are comparable if x≤y or y≤x. Elements that are not comparable are called incomparable. In a Hasse diagram, comparable elements are connected by a path that only goes up. For example, in the partial order whose Hasse diagram was given earlier, all elements are comparable to each other except the two elements at the top.
96.3. Minimal and maximal elements
If for some x there is no y < x, x is minimal. A partial order may have any number of minimal elements: e.g. the integers have no minimal element, the naturals have one minimal element, a set with k elements none of which are comparable to each other has k minimal elements. If an element x is not only minimal but also satisfies x < y for all y not equal to x, then x is a minimum. A partial order may have at most one minimum (e.g. 0 in the naturals), but may have no minimum, either because it has no minimal elements to begin with or because it has more than one.
The corresponding terms for elements that are not less than any other element or greater than all other elements are maximal and maximum, respectively.
Here is an example of the difference between a maximal and a maximum element: consider the family of all subsets of ℕ with at most three elements, ordered by ⊆. Then {0,1,2} (or any other threeelement set) is a maximal element of this family (it's not a subset of any larger set), but it's not a maximum because it's not a superset of e.g. {3}.
96.4. Total orders
If any two elements of a partial order are comparable (i.e., if at least one of x≤y or y≤x holds for all x,y), then the partial order is a total order. Total orders include many of the familiar orders on the naturals, the reals, etc.
Any partial order (S,<) can be extended to a total order (generally more than one, if the partial order is not total itself). The essential idea is to break ties between incomparable elements in a way that is consistent with maintaining transitivity. For finite partial orders this can be done by starting with some minimal element and declaring it to be the minimum, and then repeating with the elements that are left. (This process is called a TopologicalSort, and there are fast algorithms for it.)
For infinite partial orders the situation is more complicated. The intuition is that we can always pick some pair of incomparable elements and declare one less than the other, fill in any other relations implied by transitivity, and repeat. Unfortunately this process may take infinitely long, so we have to argue that it converges in the limit to a genuine total order using a tool called Zorn's lemma, which itself is a theorem about partial orders.^{13}
96.5. Well orders
A well order is a particularly restricted kind of total order. A partial order is a well order if it is a total order and, for every nonempty subset S, S contains some minimum element x: one that is less than or equal to all elements of S. An example of a well order is the usual order on ℕ.^{14}
An equivalent definition is that a total order is a well order if it contains no infinite descending chains, which are infinite sequences x_{1}, x_{2}, ... with x_{1} > x_{2} > x_{3} > ... . To show that this is implied by every set having a least element, suppose that a given total order has the leastelement property. Then given a wouldbe infinite descending chain x_{1}, x_{2}, ..., let x_{i} be its least element. But then x_{i} is not greater than x_{i+1}. For the converse, suppose that some set S does not have a least element. Then we can construct an infinite descending chain by choosing any x_{1} in S, then for each x_{i+1} choose some element less than the smallest of x_{1}...x_{i}. (Note: iterating this process forever requires using the Axiom of Choice. Bizarre things happen in order theory without the Axiom of Choice.)
The useful property of wellorders is that we can do induction on them. If it is the case that (a) P(m) holds, where m is the smallest element in some set S, and (b) P(x') for all x < x' implies P(x); then P(x) holds for all x in S. The proof is that if P(x) doesn't hold, there is a least element y in S for which it doesn't hold. But this contradicts (a) if y=m and (b) otherwise. This assumes, of course, that the < relation is a wellorder, because otherwise m may not exist. (For example, we can't do induction on the integers because there is no number negative enough to be the base case).
It is possible in an infinite set to have a wellordering in which some elements do not have predecessors. For example, the order on S = ℕ ∪ { ω } defined by x ≤ y if either (a) x and y are both in ℕ and x ≤ y by the usual ordering on ℕ or (b) y = ω is a total order that is also a well order, but ω has no immediate predecessor. In this case we can still do induction proofs, but since ω is not n+1 for any n we need a special case in the proof to handle it. For a more complicated example, the set ω+ω = { 0, 1, 2, ...; ω, ω+1, ω+2, ... } is also wellordered, so we can do induction on it if we can show P(0), P(x) ⇒ P(x+1), and P(ω) (possibly using P(x) for all x < ω in the last case).
96.6. Lattices
A lattice is a partial order in which (a) each pair of elements x and y has a unique greatest lower bound or meet, written x∧y, with the property that (x∧y)≤x, (x∧y)≤y, and z≤(x∧y) for any z with z≤x and z≤y; and (b) each pair of elements x and y has a unique least upper bound or join, written x∨y, with the property that (x∨y)≥x, (x∨y)≥y, and z≥(x∨y) for any z with z≥x and z≥y.
Examples of lattices are any total order (x∧y is min(x,y), x∨y is max(x,y)), the subsets of a fixed set ordered by inclusion (x∧y is x∩y, x∨y is x∪y), and the divisibility relation on the positive integers (x∧y is the greatest common divisor, x∨y is the least common multiple—see NumberTheory). Products of lattices with the product order^{15} are also lattices: (x₁,x₂)∧(y₁,y₂) = (x₁∧₁y₁,x₂∧y₂) and (x₁,x₂)∨(y₁,y₂) = (x₁∨₁y₁,x₂∨y₂).
97. Closure
In general, the closure of some mathematical object with respect to a given property is the smallest larger object that has the property. Usually "smaller" and "larger" are taken to mean subset or superset, so we are really looking at the intersection of all larger objects with the property. Such a closure always exists if the property is preserved by intersection (i.e., if (∀i P(S_{i})) ⇒ P(∩S_{i})) and every object has at least one larger object with the property.
This rather abstract definition can be made more explicit for certain kinds of closures of relations. The reflexive closure of a relation R (whose domain and codomain are equal) is the smallest superrelation of R that is reflexive; it is obtained by adding (x,x) to R for all x in R's domain. The symmetric closure is the smallest symmetric superrelation of R; it is obtained by adding (y,x) to R whenever (x,y) is in R, or equivalently by taking R∪R^{1}. The transitive closure is obtained by adding (x,z) to R whenever (x,y) and (y,z) are both in R for some y—and continuing to do so until no new pairs of this form remain. The transitive closure can also be computed as R^{1}∪R^{2}∪R^{3}...; for reflexive R, this is equal to R^{0}∪R^{1}∪R^{2}..., which is often written as R^{*}.
In digraph terms, the reflexive closure adds selfloops to all nodes, the symmetric closure adds a reverse edge for each edge, and the transitive closure adds an edge for each directed path through the graph. One can also take the closure with respect to multiple properties, such as the reflexive symmetric transitive closure of R which will be the smallest equivalence relation in which any elements that are related by R are equivalent.
Closures provide a way of turning things that aren't equivalence relations or partial orders into equivalence relations and partial orders. For equivalence relations this is easy: take the reflexive symmetric transitive closure, and you get a reflexive symmetric transitive relation. For partial orders it's trickier: antisymmetry isn't a closure property (even though it's preserved by intersection, a nonantisymmetric R can't be made antisymmetric by adding more pairs). Given a relation R on some set S, the best we can do is take the reflexive transitive closure R^{*} and hope that it's antisymmetric. If it is, we are done. If it isn't, we can observe that the relation ~ defined by x~y if xR^{*}y and yR^{*}x is an equivalence relation (proof: x~x because R^{*} is reflexive, x~y ⇒ y~x from the symmetry of the definition, and x~y ∧ y~z ⇒ x~z because transitivity of R^{*} gives xR^{*}y ∧ yR^{*}z ⇒ xR^{*}z and yR^{*x} and zR^{*}y ⇒ zR^{*}x). So we can take the quotient S/~, which smashes all the equivalence classes of ~ into single points, define a quotient relation R^{*}/~ in the obvious way, and this quotient relation will be a partial order.
97.1. Examples
Let R be the relation on subsets of ℕ given by xRy if there exists some n∉x such that y = x∪{n}. The transitive closure of R is the proper subset relation ⊂, where x⊂y if x⊆y but x≠y; the reflexive transitive closure R^{*} of R is just the ordinary subset relation ⊆. The reflexive symmetric transitive closure of R is the complete relation; given any two sets x and y, we can get from x to ∅ via (R^{*})^{1} and then to y via R^{*}. So in this case the reflexive symmetric transitive closure is not very interesting.
Let R be the relation on ℕ given by xRy if x=2y. Then the reflexive transitive closure R^{*} is the relation given by xR^{*}y if x=2^{n}y for some n∈ℕ, and the reflexive symmetric transitive closure is the relation given by x~y if x=2^{n}y or y=2^{n}x for some n∈ℕ. For this R not all elements of the underlying set are equivalent in the reflexive symmetric transitive closure; instead, we get a separate equivalence class { k, 2k, 4k, 8k, ... } for each odd number k.
98. GraphTheory
A graph is a structure in which pairs of vertices are connected by edges. Each edge may act like an ordered pair (in a directed graph) or an unordered pair (in an undirected graph). We've already seen directed graphs as a representation for Relations; but most work in graph theory concentrates instead on undirected graphs.
Because graph theory has been studied for many centuries in many languages, it has accumulated a bewildering variety of terminology, with multiple terms for the same concept (e.g. node for vertex or arc for edge) and ambiguous definitions of certain terms (e.g., a "graph" without qualification might be either a directed or undirected graph, depending on who is using the term: graph theorists tend to mean undirected graphs, but you can't always tell without looking at the context). We will try to stick with consistent terminology to the extent that we can. In particular, unless otherwise specified, a graph will refer to a simple undirected graph: an undirected graph where each edge connects two distinct vertices (thus no selfloops) and there is at most one edge between each pair of vertices (no parallel edges).
Reasonably complete glossaries of graph theory can be found at http://wwwleibniz.imag.fr/GRAPH/english/definitions.html or Glossary of graph theory. See also RosenBook Chapter 9, or BiggsBook Chapter 15 (for undirected graphs) and 18 (for directed graphs).
If you want to get a sense of the full scope of graph theory, Reinhard Diestel's (graduate) textbook Graph Theory can be downloaded from http://www.math.unihamburg.de/home/diestel/books/graph.theory/download.html.
99. Types of graphs
Graphs are represented as ordered pairs G = (V,E), where V is a set of vertices and E a set of edges. The differences between different types of graphs depends on what can go in E. When not otherwise specified, we usually think of a graph as an undirected graph (see below), but there are other variants.
99.1. Directed graphs
In a directed graph or digraph, each element of E is an ordered pair, and we think of edges as arrows from a source, head, or initial vertex to a sink, tail, or terminal vertex; each of these two vertices is called an endpoint of the edge. A directed graph is simple if there is at most one edge from one vertex to another. A directed graph that has multiple edges from some vertex u to some other vertex v is called a directed multigraph.
As we saw in Relations, there is a onetoone correspondence between simple directed graphs with vertex set V and relations on V.
99.2. Undirected graphs
In an undirected graph, each edge is a twoelement subset of V. A simple undirected graph contains no duplicate edges and no loops (an edge from some vertex u back to itself). A graph with more than one edge between the same two vertices is called a multigraph. Most of the time, when we say graph, we mean a simple undirected graph.
Some authors make a distinction between pseudographs (with loops) and multigraphs (without loops), but we'll use multigraph for both.
Simple undirected graphs also correspond to relations, with the restriction that the relation must be irreflexive (no loops) and symmetric (undirected edges). This also gives a representation of undirected graphs as directed graphs, where the edges of the directed graph always appear in pairs going in opposite directions.
99.3. Hypergraphs
In a hypergraph, the edges (called hyperedges) are arbitrary nonempty sets of vertices. A khypergraph is one in which all such hyperedges connected exactly k vertices; an ordinary graph is thus a 2hypergraph.
Hypergraphs are usually drawn by representing each hyperedge as a closed curve containing its members, like so:
Hypergraphs aren't used very much, because it is always possible (though not always convenient) to represent a hypergraph by a bipartite graph. In a bipartite graph, the vertex set can be partitioned into two subsets S and T, such that every edge connects a vertex in S with a vertex in T. To represent a hypergraph H as a bipartite graph, we simply represent the vertices of H as vertices in S and the hyperedges of H as vertices in T, and put in an edge (s,t) whenever s is a member of the hyperedge t in H. (See also BipartiteGraphs.)
100. Examples of graphs
Any relation produces a graph, which is directed for an arbitrary relation and undirected for a symmetric relation. Examples are graphs of parenthood (directed), siblinghood (undirected), handshakes (undirected), etc.
Graphs often arise in transportation and communication networks. Here's a (now somewhat outofdate) route map for Jet Blue airlines, taken from http://www.jetblue.com/travelinfo/routemap.html:
Such graphs are often labeled with edge lengths, prices, etc. In computer networking, the design of network graphs that permit efficient routing of data without congestion, roundabout paths, or excessively large routing tables is a central problem.
The web graph is a directed multigraph with web pages for vertices and hyperlinks for edges. Though it changes constantly, its properties have been fanatically studied both by academic graph theorists and employees of search engine companies, many of which are still in business. Companies such as Google base their search rankings largely on structural properties of the web graph.
Peertopeer systems for data sharing often have a graph structure, where each peer is a node and connections between peers are edges. The problem of designing efficient peertopeer systems is similar in many ways to the problem of designing efficient networks; in both cases, the structure (or lack thereof) of the underlying graph strongly affects efficiency.
101. Graph terminology
Incidence: a vertex is incident to any edge of which it is an endpoint (and vice versa).
Adjacency, neighborhood: two vertices are adjacent if they are the endpoints of some edge. The neighborhood of a vertex v is the set of all vertices that are adjacent to v.
Degree, indegree, outdegree: the degree of v counts the number edges incident to v. In a directed graph, indegree counts only incoming edges and outdegree counts only outgoing edges (so that the degree is always the indegree plus the outdegree). The degree of a vertex v is often abbreviated as d(v) or δ(v); indegree and outdegree are sometimes abbreviated as d^{}(v) and d^{+}(v), respectively (or δ^{}(v) and δ^{+}(v) by people who prefer Greek).
102. Some standard graphs
Complete graph K_{n}. This has n vertices, and every pair of vertices has an edge between them.
Cycle graph C_{n}. This has vertices {0, 1, ... n1} and an edge from i to i+1 for each i, plus an edge from n1 to 0. Here n must be at least 3 to get a simple graph.
Path P_{n}. This has vertices {0, 1, 2, ... n} and an edge from i to i+1 for each i. Note that n counts the number of edges rather than the number of vertices; we call the number of edges the length of the path.
Complete bipartite graph K_{mn}. This has a set A of m vertices and a set B of n vertices, with an edge between every vertex in A and every vertex in B, but no edges within A or B.
Star graphs. These have a single central vertex that is connected to n outer vertices, and are the same as K_{1n}.
The cube Q_{n}. This is defined by letting the vertex set consist of all nbit strings, and putting an edge between u and u' if u and u' differ in exactly one place. It can also be defined by taking the nfold square product of an edge with itself (see below).
Cayley graphs. The Cayley graph of a group G with a given set of generators is a labeled directed graph. The vertices of this graph are the group elements, and for each g in G and s in S there is a directed edge from g to gs labeled with s. Many common graphs are Cayley graphs with the labels (and possibly edge orientations) removed; for example, a directed cycle on m elements is the Cayley graph of ℤ_{m}, an n×m torus is the Cayley graph of ℤ_{n}×ℤ_{m}, and the cube Q_{n} is the Cayley graph of (ℤ_{2})^{n}.
Graphs may not always be drawn in a way that makes their structure obvious. For example, here are two different presentations of Q_{3}, only one of which looks much like a cube:
103. Operations on graphs
 Setlike operations
Subgraphs: G is a subgraph of H, written G ⊆ H, if V_{G} ⊆ V_{H} and E_{G} ⊆ E_{H}.
 One can get subgraphs by deleting edges or vertices or both. Note that deleting a vertex also requires deleting any edges incident to the vertex (since we can't have an edge with a missing endpoint).
The maximal subgraph of a graph H whose vertex set is S is called the induced subgraph of H with vertices S. The intuition is that all edges are left in whose endpoints lie in S.
 We will sometimes say that G is a subgraph of H if it is isomorphic to a subgraph of H, which is equivalent to having an injective homomorphism from G to H.
 Intersections and unions are defined in the obvious way. The only tricky part is that with intersections we need to think a bit to realize this doesn't produce edges with missing endpoints.
 Products. There are at least five different definitions of the product of two graphs used by serious graph theorists. In each case the vertex set of the product is the Cartesian product of the vertex sets, but the different definitions throw in different sets of edges. Two of them are used most often:
Square product (graph Cartesian product) G ◻ H. An edge (u,u')(v,v') is in G ◻ H if and only if (a) u=v and u'v' is an edge in H, or (b) uv is an edge in G and v=v'. Called the square product because the product of two (undirected) edges looks like a square. The intuition is that each vertex in G is replaced by a copy of H, and then corresponding vertices in the different copies of H are linked whenever the original vertices in G are adjacent. For algebraists, square products are popular because they behave correctly for Cayley graphs: if C_{1} and C_{2} are the Cayley graphs of G_{1} and G_{2} (for particular choices of generators), then C_{1} ◻ C_{2} is the Cayley graph of G_{1}×G_{2}.
The cube Q_{n} can be defined recursively by Q_{1} = P_{1} and Q_{n} = Q_{n1}◻Q_{1}. It is also the case that Q_{n}=Q_{k}◻Q_{nk}.
An nbym mesh is given by P_{n1}◻P_{m1}.
 Cross product (categorical graph product) G × H. Now (u,u')(v,v') is in G × H if and only if uv is in G and u'v' is in H. In the cross product, the product of two (again undirected) edges is a cross: an edge from (u,u') to (v,v') and one from (u,v') to (v,u'). The cross product is not as useful as the square product for defining nicelooking graphs, but it can arise in some other situations. An example is when G and H describe the positions (vertices) and moves (directed edges) of two solitaire games; then the cross product G × H describes the combined game in which at each step the player must make a move in both games. (In contrast, the square product G ◻ H describes a game where the player can choose at each step to make a move in either game.)
Graph powers, transitive closures: see Connectivity below.
 Minors.
A minor of a graph G is some other graph H obtained from G by deleting edges and/or vertices (as in a subgraph) and contracting edges, where two adjacent vertices u and v are merged together into a single vertex that is connected to all of the previous neighbors of both vertices.
Minors are useful for recognizing certain classes of graphs. For example, a graph can be drawn in the plane without any crossing edges if and only if it doesn't contain K_{5} or K_{3,3} as a minor (this is known as Wagner's theorem).
 Functions from one graph to another.
Isomorphisms: If f:V_{G}→V_{H} is a bijection and uv ∈ E_{G} if and only if f(u)f(v) ∈ E_{G}, then G and H are said to be isomorphic and f is an isomorphism. Isomorphism is an equivalence relation—using it, we can divide graphs into equivalence classes and effectively forget the identities of the vertices. We don't currently know how to test whether two graphs are isomorphic (the Graph isomorphism problem); at the same time, we also don't know that testing isomorphism is hard, even assuming P≠NP. Graph isomorphism is a rare example of a natural problem for which we have neither a good algorithm nor a hardness proof.
Automorphism: An isomorphism from G to G is called an automorphism of G. Automorphisms correspond to internal symmetries of a graph. For example, the cycle C_{n} has 2n different automorphisms (to count them, observe there are n places we can send vertex 0 to, and having picked a place to send vertex 0 to, there are only 2 places to send vertex 1; so we have essentially n rotations times 2 for flipping or not flipping the graph). A path P_{n} has only 2 automorphisms (reverse the direction or not). Many graphs have no automorphisms except the identity map.
Homomorphisms: a homomorphism f from a graph G = (V_{G}, E_{G}) to a graph H = (V_{H}, E_{H}) is a function f:V_{G}→V_{H} such that, for all uv in E_{G}, f(u)f(v) is in E_{H}. (This definition assumes no parallel edges, but otherwise works for both directed and undirected graphs.) These are probably only of interest to category theorists.
 Intuition: a homomorphism is a function from vertices of G to vertices of H that also maps edges to edges.
 Example: There is a unique homomorphism from the empty graph (Ø,Ø) to any graph.
Example: Let G = (V,E) be an undirected graph. Then there are exactly 2 homomorphisms from P_{1} to G for each edge in G.
Example: There is a homomorphism from G to P_{1} if and only if G is bipartite. In general, there is a homomorphism from G to K_{n} if and only if G is npartite (recall P_{1} = K_{2}).
Comment: For multigraphs, one must define a homomorphism as a pair of functions f_{V}:V_{G}→V_{H} and f_{E}:E_{G}→E_{H} with appropriate consistency conditions.
104. Paths and connectivity
A fundamental property of graphs is connectivity: whether the graph can be divided into two or more pieces with no edges between them. Often it makes sense to talk about this in terms of reachability, or whether you can get from one vertex to another along some path.
A path of length n in a graph is the image of a homomorphism from P_{n}.
In ordinary speech, it's a sequence of n+1 vertices v_{0}, v_{1}, ..., v_{n} such that v_{i}v_{i+1} is an edge in the graph for each i.
A path is simple if the same vertex never appears twice (i.e. if the homomorphism is injective). If there is a path from u to v, there is a simple path from u to v obtained by removing cycles.
If there is a path from u to v, then v is reachable from u: u →^{*} v. We also say that u is connected to v.
 Easy to see that connectivity is reflexive (take a path of length 0) and transitive (paste a path from u to v together with a path from v to w to get a path from u to w). But it's not necessarily symmetric if we have a directed graph.
 Connected components
In an undirected graph, connectivity is symmetric, so it's an equivalence relation.
Equivalence classes of →^{*} are called the connected components of G.
G itself is connected iff it has a single connected component, i.e. if every vertex is reachable from every other vertex.
 Note that isolated vertices count as (separate) connected components.
 In a directed graph, we can make connectivity symmetric in one of two different ways:
Define u to be strongly connected to v if u →^{*} v and v →^{*} u. I.e. u and v are strongly connected if you can go from u to v and back again (not necessarily through the same vertices).
 Easy to see that strong connectivity is an equivalence relation.
Equivalence class are called stronglyconnected components.
G is strongly connected if it has one stronglyconnected component, i.e. if every vertex is reachable from every other vertex.
Define u to be weakly connected to v if u →^{*} v in the undirected graph obtained by ignoring edge orientation.
 Intuition is that u is weakly connected to v if there is a path from u to v if you are allowed to cross edges backwards.
 Weaklyconnected components are defined by equivalence classes; graph is weaklyconnected if it has one component.
 Weak connectivity is a "weaker" property that strong connectivity in the sense that if u is strongly connected to v, then u is weakly connected to v; but the converse does not necessarily hold.
Power of a directed graph: kth power G^{k} has same vertices as G, but uv is an edge in G^{k} if and only if there is a path of length k from u to v in G.
Transitive closure of a directed graph: <>. I.e. there is an edge uv in G^{*} iff there is a path (of any length, including zero) from u to v in G, or in other words if u →^{*} v.
Application of powers and transitive closure of a relation, defined by R^{k} = R ∘ R ∘ ... R (k times) and R^{*} = union of R^{k} for all k. So →^{*} is the transitive closure of the directed adjacency relation →.
105. Cycles
The standard cycle graph C_{n} has vertices {0, 1, ..., n1} with an edge from i to i+1 for each i and from n1 to 0. A cycle of length n in a graph G is an image of C_{n} under homomorphism which includes each edge at most once. A simple cycle is a cycle that includes each vertex at most once. Cycles are often written by giving their sequence of vertices v_{0}v_{1}v_{2}...v_{k}v_{0}, where there is an edge from each vertex in the sequence to the following vertex. Unlike paths, which have endpoints, no vertex in a cycle has a special role.
A graph with no cycles is acyclic. Directed acyclic graphs or DAGs have the property that their reachability relation →^{*} is a partial order; this is easily proven by showing that if →^{*} is not antisymmetric, then there is a cycle consisting of the paths between two nonantisymmetric vertices u →^{*} v and v →^{*} u. Directed acyclic graphs may also be topologically sorted: their vertices ordered as v_{0}, v_{1}, ..., v_{n1}, so that if there is an edge from v_{i} to v_{j}, then i < j. The proof is by induction on V, with the induction step setting v_{n1} to equal some vertex with outdegree 0 and ordering the remaining vertices recursively. (See also TopologicalSort.)
Connected acyclic undirected graphs are called trees. A connected graph G = (V,E) is a tree if and only if E=V1; we'll prove this below.
A cycle that includes every edge exactly once is called an Eulerian cycle or Eulerian tour, after Leonhard Euler, whose study of the Seven bridges of Königsberg problem led to the development of graph theory. A cycle that includes ever vertex exactly once is called a Hamiltonian cycle or Hamiltonian tour, after William Rowan Hamilton, another historical graphtheory heavyweight (although he is more famous for inventing quaternions and the Hamiltonian). Graphs with Eulerian cycles have a simple characterization: a graph has an Eulerian cycle if and only if every vertex has even degree. Graphs with Hamiltonian cycles are harder to recognize.
106. Proving things about graphs
Suppose we want to show that all graphs or perhaps all graphs satisfying certain criteria have some property. How do we do this? In the ideal case, we can decompose the graph into pieces somehow and use induction on the number of vertices or the number of edges. If this doesn't work, we may have to look for some properties of the graph we can exploit to construct an explicit proof of what we want.
106.1. The Handshaking Lemma
This lemma relates the total degree of a graph to the number of edges. Observe that δ(v) = #{u: uv ∈ E} = ∑_{uv ∈ E} 1. So ∑_{v} δ(v) = ∑_{v}∑_{uv ∈ E} 1 = 2E since each edge uv is counted both as uv and as vu.
One application of the lemma is that the number of odddegree vertices in a graph is always even.
106.2. Trees
A tree is an acyclic connected graph. We can show by induction on the number of vertices in G that G is a tree if and only if it is connected and has exactly V1 edges.
We'll start with a lemma that states that G is connected only if it has at least V1 edges. This avoids having to reprove this fact in the main theorem.
 Lemma
 Any connected graph G = (V,E) has E ≥ V1.
 Proof
 By induction on V. The base cases are V = 0 and V = 1; in either case we have E ≥ 0 ≥ V1.
For a larger graph G = (V,E), suppose that E < V1; we will show that in this case G is not connected. From the handshaking lemma we have ∑_{v∈V} δ(v) = 2E < 2V2. It follows that there is at least one vertex u with δ(u) ≤ 1. If δ(u) = 0, we are done: G is not connected. If δ(u) = 1, consider the graph G{u} obtained by removing u and its incident edge. This has E_{G{u} = E  1 < V}G{u}  1 = V  2; by the induction hypothesis, G{u} is not connected. But since G{u} is not connected, neither is G: if v and w are nodes with no path between them in G{u}, then adding u doesn't help.
Now we can prove the full result:
 Theorem
 Let G be a nonempty connected graph. Then G is acyclic if and only if it has exactly V1 edges.
 Proof

We'll prove that a nonempty connected graph with V1 edges is a tree by induction on V. The base case is V = 1 and E = 0; this singlevertex graph is easily seen to be acyclic. For larger V, from the Handshaking Lemma we have that ∑ d(v) = 2E = 2V2. So from the Pigeonhole Principle there exists a vertex v with d(v) < 2. We can't have d(v) = 0, or G wouldn't be connected, so d(v) = 1. Now consider the graph Gv; it has V1 vertices and E1 = V2 edges, and by the induction hypothesis, it's acyclic. Adding back v can't create any new cycles because any cycle that enters v has no edge to leave on. So G is also acyclic.
Now we need to show that if we have more than V1 edges, some cycle exists. We'll do this by showing that an acyclic connected graph has at most V1 edges, by induction on V. For V = 1 we have at most V1 = 0 edges whether we are acyclic or not; this gives us the base case for free. Now consider an acyclic connected graph with V > 1 vertices. Choosing some vertex v_{0} and construct a path v_{1}, v_{2}, ... by choosing at each step a node v_{i+1} that is a neighbor of v_{i} and that is not already in the path. Eventually this process terminates (we only have V vertices to work with) with some vertex v_{k}. If v_{k} is adjacent to some vertex v_{j} already in the path, where j≠k1, then we have a cycle v_{j}...v_{k}. If v_{k} has a neighbor that's not in the path, then we could have added it. So it follows that v_{k} is adjacent only to v_{k1} and has degree 1. Delete v_{k} to get Gv_{k} an acyclic graph with V1 vertices and E1 edges. From the induction hypothesis we have E1=V2 implying E=V1 for G.
For an alternative proof based on removing edges, see BiggsBook Theorem 15.5. This also gives the useful fact that removing one edge from a tree gives exactly 2 components.
106.3. Spanning trees
Here's another induction proof on graphs. A spanning tree of a nonempty connected graph G is a subgraph of G that includes all vertices and is a tree (i.e. is connected and acyclic).
 Theorem
 Every nonempty connected graph has a spanning tree.
 Proof
 Let G = (V,E) be a nonempty connected graph. We'll show by induction on E that G has a spanning tree. The base case is E = V1 (the least value for which G can be connected); then G itself is a tree (by the theorem above). For larger E, the same theorem gives that G contains a cycle. Let uv be any edge on the cycle, and consider the graph Guv; this graph is connected (since we can route any path that used to go through uv around the other edges of the cycle) and has fewer edges than G, so by the induction hypothesis there is some spanning tree T of Guv. But then T also spans G, so we are done.
106.4. Eulerian cycles
Let's prove the vertex degree characterization of graphs with Eulerian cycles. As in the previous proofs, we'll take the approach of looking for something to pull out of the graph to get a smaller case.
 Theorem
 Let G be a connected graph. Then G has an Eulerian cycle if and only if all nodes have even degree.
 Proof

(Only if part). Fix some cycle, and orient the edges by the direction that the cycle traverses them. Then in the resulting directed graph we must have δ^{}(u) = δ^{+}(u) for all u, since every time we enter a vertex we have to leave it again. But then δ(u) = 2δ^{+}(u) is even.
(If part). Suppose now that δ(u) is even for all u. We will construct an Eulerian cycle on all nodes by induction on E. The base case is when E = 2V and G = C_{V}. For a larger graph, choose some starting node u_{1}, and construct a path u_{1}u_{2}... by choosing an arbitrary unused edge leaving each u_{i}; this is always possible for u_{i}≠u_{1} since whenever we reach u_{i} we have always consumed an even number of edges on previous visits plus one to get to it this time, leaving at least one remaining edge to leave on. Since there are only finitely many edges and we can only use each one once, eventually we must get stuck, and this must occur with u_{k} = u_{1} for some k. Now delete all the edges in u_{1}...u_{k} from G, and consider the connected components of G(u_{1}...u_{k}). Removing the cycle reduces δ(v) by an even number, so within each such connected component the degree of all vertices is even. It follows from the induction hypothesis that each connected component has an Eulerian cycle. We'll now string these percomponent cycles together using our original cycle: while traversing u_{1}...,u_{k} when we encounter some component for the first time, we take a detour around the component's cycle. The resulting merged cycle gives an Eulerian cycle for the entire graph.
Why doesn't this work for Hamiltonian cycles? The problem is that in a Hamiltonian cycle we have too many choices: out of the δ(u) edges incident to u, we will only use two of them. If we pick the wrong two early on, this may prevent us from ever fitting u into a Hamiltonian cycle. So we would need some stronger property of our graph to get Hamiltonicity.
107. BipartiteGraphs
A graph (see GraphTheory) is a bipartite graph if its vertex set can be written as X∪Y and every edge is an element of X×Y. Alternatively, a graph is bipartite if it can be 2colored (the vertices in the two color sets give X and Y). Yet another criterion is that a graph is bipartite if and only if it does not contain a cycle with an odd number of edges.
108. Bipartite matching
Bipartite graphs are often used to model assignment problems, where the vertices of the lefthand side X represent things that need to be assigned, the vertices of the righthand side Y represent places to put them, and an edge indicates compatibility. A complete bipartite matching is a subset of the edges of a bipartite graph such that every node is the endpoint of exactly one edge: such a matching corresponds to an assignment that assigns every object and fills every niche (it also implies X=Y). This is a special case of a matching, which is a subset of the edges of an arbitrary graph that hits each vertex at most once, and a maximal matching, a matching that is maximal under inclusioni.e., one where you can't add any more edges without making it no longer be a matching.
Because of the application to assignment, much is known about bipartite matching. In particular, there is a characterization of exactly which bipartite graphs have a complete matching.
 Hall's Theorem
 Let G = (X∪Y, E) be a bipartite graph, and for each A⊆X define ∂A = {y∈Y: ∃x∈A such that xy∈E}. Then G has a complete matching if and only if ∂A ≥ A for all A⊆X.
 Proof
If there is some A with ∂A < A we are clearly in trouble, so the main thing is to show that ∂A ≥ A is sufficient. We do so by showing that when the condition holds, any matching M with M < X can be extended to a matching of size M+1. The procedure is as follows: Let x_{1} be an unmatched node in M and let X_{1} = {x_{1}}. We will construct two sequences of nodes x_{1}, x_{2} ..., x_{k} and y_{1}, y_{2} ..., y_{k} such that y_{i} is matched to x_{i+1} when i < k, y_{k} is unmatched, and y_{i} is adjacent to at least one node x_{j} with j ≤ i. The construction proceeds as follows: given x_{1}..x_{i} and y_{1}..y_{i1} (i = 1 is the special case where we start with just x_{1} and no y's), we have ∂{x_{1}...x_{i}} ≥ i > {y_{1}..y_{i1}}. So there is at least one node in ∂{x_{1}...x_{i}}  {y_{1}..y_{i1}}; pick that node and call it y_{i}. If y_{i} is unmatched, we are done. Otherwise, let x_{i+1} be y_{i}'s match in M and repeat. Now we have that each y_{i} is adjacent to some x_{j} with j ≤ i, and that that x_{j} is either x_{1} or is matched with y_{j1}. So working backwards from y_{k} we construct a sequence of nodes y_{k} = y'_{m}x'_{m}y'_{m1}x'_{m1}...y'_{1}x'_{1} = x_{1} where each y'_{m} is adjacent to x'_{m} but not matched to it in M and each y' or x' except y_{k} and x_{1} is matched in M (such a sequence is called an augmenting path. So by deleting all of the edges in M between some y' and x' and replacing them with edges between y'_{i} and x'_{i} for each i, we remove m1 edges and add m, increasing the size of the matching by 1.
A useful corollary of Hall's Theorem is that even if there is no complete matching, there is still a matching that matches all but max_{A} A∂A nodes in X. The essential idea is that we can make Hall's condition hold by adding exactly that many new nodes to Y that can be matched with any node in X. The nodes that are matched with the new nodes in the resulting complete matching become the unmatched losers in the original graph.
109. NumberTheory
Contents
Number theory is the study of the natural numbers, particularly their divisibility properties. Throughout this page, when we say number, we mean an element of ℕ.
110. Divisibility and division
A number m divides n, written mn, if there is some number k such that km=n. In this case m is said to be a factor or divisor of n. A number greater than 1 whose only factors are 1 and itself is called prime. Nonprimes that are greater than 1 are called composite. The remaining numbers 0 and 1 are by convention neither prime nor composite; this allows us to avoid writing "except 0 or 1" in a lot of places later.
Some useful facts about divisibility:
 If dm and dn, then d(m+n). Proof: Let m = ad and n = bd, then (m+n) = (a+b)d. ∎
 If dn and n≠0, then d ≤ n. Proof: n = kd ≠ 0 implies k ≥ 1 implies n = kd ≥ d. ∎
 d0 for all d. Proof: 0d = 0. ∎
 If p is prime, then pab if an only if pa or pb. Proof: follows from the extended Euclidean algorithm (see below). ∎
If n is not divisible by m, then any attempt to divide n things into m piles will leave some things left over.
The division algorithm yields for integers (which might or might not be natural numbers) n and m≠0 unique integers q, r such that n = qm+r and 0≤r<m. The number q = ⌊n/m⌋ is called the quotient of n divided by m and r = n mod m is called the remainder of n divided by m. The number m is called the divisor or (when we are mostly interested in remainders) the modulus.
The quotient is often written as ⌊n/m⌋, the floor of n/m, to make it clear that we want the integer version of the quotient and not some nasty fraction. The remainder is often written as (n mod m), pronounced "the remainder of n modulo m" when paid by the word but usually just "n mod m." Saying that n mod m = 0 is that same as saying that m divides n.
That a unique quotient and remainder exist can be proved any number of ways, e.g. by induction on n, but the easiest is probably this method taken from BiggsBook §8.2. Let's assume for the moment that n and m are both nonnegative. Consider the set R = { r  r ≥ 0 and there exists some q such that n = qm+r }. Observe that R is nonempty since it contains n. Since this is a nonempty subset of the naturals, it has a least element—call it r. We already have r ≥ 0 by definition, and if r ≮ m we have r = n  qm implies the existence of r' = n(q+1)m ≥ 0 with n = (q+1)m + r' and thus r is not the minimum (note we need m≠0 here so that r'≠r). So for the minimum r we have 0 ≤ r < m.
Note that this r is unique (since R only has one minimum), but we haven't proved that it's the only element of R less than m (BiggsBook cheats a bit on this point). To do so, consider any r' with r' ≥ r and corresponding quotient q' such that n = qm+r = q'm+r'. Then r'  r = m(qq'). If qq' = 0, r' = r and we are happy. If qq' ≥ 1, then r'  r ≥ m and thus r' ≥ m + r ≥ m.
So far we have only proved the result when n and m are both nonnegative. If m is negative, use the existence and uniqueness of q and r such that n = q(m)+r with 0 ≤ r < m to get n = (q)(m) + r with 0 ≤ r < m. If n is negative, first compute n = q'm + r' and then let either (a) q = q' and r = 0 if r' = 0 or (b) q = q'1 and r = mr' if r' > 0. In the first case we then have n = qm+r = (q')m + 0 = (q'm+r') as expected, and in the second we have n = qm+r = (q'1)m + (mr') = q'm  m + m  r' = (q'm+r').
Note that quotients of negative numbers always round down. For example, ⌊(3)/17⌋ = 1 even though 3 is much closer to 0 than 17. This is so that the remainder is always nonnegative (14 in this case).
111. Greatest common divisors
Let m and n be numbers, where at least one of m and n is nonzero, and let k be the largest number for which km and kn. Then k is called the greatest common divisor of m and n, written gcd(m,n) or sometimes just (m,n). A similar concept is the least common multiple lcm(m,n), which is the smallest k such that mk and nk. If divisibility is considered as a partial order, the naturals form a lattice (see Relations), which is a partial order in which every pair of elements x and y has both a unique greatest element that is less than or equal to both (the meet x∧y, equal to gcd(x,y) in this case) and a unique smallest element that is greater than or equal to both (the join x∨y, equal to lcm(x,y) in this case). Two numbers m and n whose gcd is 1 are said to be relatively prime or coprime, or simply to have no common factors.
111.1. The Euclidean algorithm for computing gcd(m,n)
Euclid described 23 centuries ago what is now known as the Euclidean_algorithm for computing the gcd of two numbers (his original version was for finding the largest square you could use to tile a given rectangle, but the idea is the same). Euclid's algorithm is based on the recurrence
 gcd(0,n) = n. (This holds because k0 for all k.)
gcd(m,n) = gcd(n mod m, m), when m > 0. (If k divides both n and m, then k divides n mod m = n  ⌊n/m⌋m; and conversely if k divides m and n mod m, then k divides n = m + ⌊n/m⌋. So (m,n) and (n mod m, m) have the same set of common factors and the greatest of these is the same.)
The algorithm simply takes the remainder of the larger number by the smaller recursively until it gets a zero, and returns whatever number is left.
111.2. The extended Euclidean algorithm
The Extended Euclidean algorithm not only computes gcd(m,n), but also computes integer coefficients m' and n' such that
 m'm + n'n = gcd(m,n).
It has the same structure as the Euclidean algorithm, but keeps track of more information in the recurrence. Specifically:
 For m = 0, gcd(m,n) = n with n' = 1 and m' = 0.
For m > 0, let r = n mod m and use the algorithm recursively to compute a and b such that am + br = gcd(m,r) = gcd(m,n). Substituting r = n  ⌊n/m⌋m gives am + b(n  ⌊n/m⌋m) = gcd(m,n); this can be rewritten as bn + (ab⌊n/m⌋)m = gcd(m,n), giving both the gcd and the coefficients n' = b and m' = (ab⌊n/m⌋).
111.2.1. Example
Here's a computation of the gcd of 402 and 176, together with the extra coefficients:
 Finding gcd(402,176)
 Finding gcd(176,50)
 Finding gcd(50,26)
 Finding gcd(26,24)
 Finding gcd(24,2)
 Finding gcd(2,0)
 Base case!
 Returning 1⋅2 + 0⋅0 = 2
 Computing m' = a  b⌊n/m⌋ = 1  0⋅12 = 1
 Returning 0⋅24 + 1⋅2 = 2
 Finding gcd(24,2)
 Computing m' = a  b⌊n/m⌋ = 0  1⋅1 = 1
 Returning 1⋅26 + 1⋅24 = 2
 Finding gcd(26,24)
 Computing m' = a  b⌊n/m⌋ = 1  1⋅1 = 2
 Returning 1⋅50 + 2⋅26 = 2
 Finding gcd(50,26)
 Computing m' = a  b⌊n/m⌋ = 1  2⋅3 = 7
 Returning 2⋅176 + 7⋅50 = 2
 Finding gcd(176,50)
 Computing m' = a  b⌊n/m⌋ = 2  7⋅2 = 16
 Returning 7⋅402 + 16⋅176 = 2
(Code that generated this: euclid.py.)
111.2.2. Applications
If gcd(n,m) = 1, then there is a number n' such that nn' + mm' = 1. This number n' is called the multiplicative inverse of n mod m and acts much like 1/n in ModularArithmetic.
 If p is prime and pab, then either pa or pb. Proof: suppose p∤a; since p is prime we have gcd(p,a) = 1. So there exist r and s such that rp+sa=1. Multiply both sides by b to get rpb + sab = b. Observe that prpb and psab (the latter because pab), so p divides their sum and thus pb. ∎
112. The Fundamental Theorem of Arithmetic
Let n be a number greater than 0. Then there is a unique sequence of primes p_{1}≤p_{2}≤...≤p_{k} such that n = p_{1}p_{2}...p_{k}. This fact is known as the Fundamental Theorem of Arithmetic, and the sequence {p_{i}} is called the prime factorization of n.
Showing that there is at least one such sequence is an easy induction argument. If n=1, take the empty sequence; by convention, the product of the empty sequence is the multiplicative identity, i.e. 1. If n is prime, take p_{1} = n; otherwise, let n = ab where a and b are both greater than 1. Then n = p_{1}...p_{k}q_{1}...q_{m} where the p_{i} are the prime factors of a and the q_{i} are the prime factors of b. Unfortunately, this simple argument does not guarantee uniqueness of the sequence: it may be that there is some n with two or more distinct prime factorizations.
We can show that the prime factorization is unique by an induction argument that uses the fact that pab implies pa or pb (which we proved using the extended Euclidean algorithm). If n=1, then any nonempty sequence of primes has a product greater than 1; it follows that the empty sequence is the unique factorization of 1. If n is prime, any factorization other than n alone would show that it isn't; this provides a base case of n=2 and n=3 as well as covering larger values of n that are prime. So suppose that n is composite, and that n = p_{1}...p_{k} = q_{1}...q_{m}, where {p_{i}} and {q_{i}} are nondecreasing sequences of primes. Suppose also (by the induction hypothesis) that any n' < n has a unique prime factorization.
If p_{1} = q_{1}, then p_{2}...p_{k} = q_{2}...q_{m} and so the two sequences are identical by the induction hypothesis. Alternatively, suppose that p_{1} < q_{1}; note that this also implies p_{1} < q_{i} for all i, so that p_{1} doesn't appear anywhere in the second factorization of n. But then p∤q_{1}...q_{m} = n, a contradiction.
112.1. Applications
Some consequences of unique factorization:
 We can compute gcd(a,b) by factoring both a and b and retaining all the common factors, which is the algorithm favored by grade school teachers who deal with small numbers. Without unique factorization, this wouldn't work: we might get unlucky and factor a or b the wrong way so that the common factors didn't line up. For very large numbers, computing prime factorizations becomes impractical, so Euclid's algorithm is a better choice.
Similarly, for every a, b, there is a least common multiple lcm(a,b) with the property that alcm(a,b), blcm(a,b), and for any x with ax and bx, lcm(a,b)x. The least common multiple is obtained by taking the maximum of the exponents on each prime that appears in the factorization of a or b. It can also be found by computing lcm(a,b) = ab/gcd(a,b).
The natural numbers without zero, partially ordered by divisibility, form a lattice that is isomorphic to the lattice obtained by taking all infinite sequences of natural numbers whose sum is nonzero and finite, and letting x ≤ y if x_{i} ≤ y_{i} for all i. The isomorphism maps n to x where x_{i} is the exponent in the prime factorization of n on the ith largest of all primes (e.g. 24 = 2^{3}×3^{1} → 3,1,0,0,0,...). If we throw in 0, it becomes a new element at the top of the lattice.
113. Modular arithmetic and residue classes
From the division algorithm, we have that for each n, m there is a unique remainder r with 0≤r<m and n = qm+r for some q; this unique r is written as (n mod m). Define n ≡_{m} n' (read "n is congruent to n' mod m") if (n mod m) = (n' mod m) or equivalently if there is some q ∈ ℤ such that n = n' + qm. Because congruence is a relation defined by pulling equality back through a function, it's an equivalence relation (see Relations), and we can partition the integers into equivalence classes (called residue classes, where residue is an old synonym for remainder) [0]_{m}, [1]_{m}, [2]_{m}, ..., [m1]_{m}. These equivalence classes ℤ/≡_{m} form the integers mod m, written as ℤ_{m}. Usually we will drop the brackets and just write 0, 1, 2, ..., m1; sometimes a (mod m) will be tacked on the end of any equation we write to remind ourselves that we are working in ℤ_{m}.
The most wellknown instance of ℤ_{m} is ℤ_{2}, the integers mod 2: the class [0]_{2} is known as the even numbers and the class [1]_{2} as the odd numbers.
113.1. Arithmetic on residue classes
We can define arithmetic operations on residue classes in ℤ_{m} just as we defined arithmetic operations on integers (defined as equivalence classes of pairs of naturals). Given residue classes [x]_{m} and [y]_{m}, define [x]_{m} + [y]_{m} = [x+y]_{m}, where the addition in the RHS is the usual integer addition in ℤ. So, for example, in ℤ_{2} we have 0+0 = 0, 0+1 = 1, 1+0 = 1, and 1+1 = 0 (since 1+1 = 2 ∈ [0]_{m}). Note that as with the integers, we must verify that this definition of addition is welldefined: in particular, it doesn't matter which representatives x and y we pick.
 Theorem
If x ≡_{m} x' and y ≡_{m} y', then x+y ≡_{m} x'+y'.
 Proof
Choose q_{x}, q_{x'}, r, q_{y}, q_{y'} and s such that x = q_{x}m+r, x' = q_{x'}m+r, y = q_{y}m+s, and y'=q_{y'}m+s. Then x+x' = (q_{x}+q_{y})m+(r+s) and y+y'=(q_{x'}+q_{y'})m+(r+s). It follows that (x+y) mod m = (r+s) mod m = (x'+y') mod m and x+y ≡_{m} x'+y' as claimed. ∎
Similarly, we can define [x]_{m} = [x]_{m} and [x]_{m}×[y]_{m} = [x×y]_{m}. A similar argument to the proof above shows that these definitions also give welldefined operations on residue classes. All of the usual properties of addition, subtraction, and multiplication are inherited from ℤ: addition and multiplication are commutative and associative, the distributive law applies, etc.
For example, here is an addition table for ℤ_{3}:
+ 
0 
1 
2 
0 
0 
1 
2 
1 
1 
2 
0 
2 
2 
0 
1 
and here is the multiplication table:
× 
0 
1 
2 
0 
0 
0 
0 
1 
0 
1 
2 
2 
0 
2 
1 
It may help to think of 2 as 1; so it's not surprising that 2×2 =4 ≡_{m} 1 = 1×1.
Using these tables, we can do arbitrarily horrible calculations in ℤ_{3} using the same rules as in ℤ, e.g. 2(1+2)2 = 2(0)2 = 2 = 1 (mod 2). Note we tack on the "(mod 2)" at then end so that the reader won't think we've gone nuts.
Comment: the fact that [x]_{m} + [y]_{m} = [x+y]_{m} and [x]_{m} × [y]_{m} = [xy]_{m} for all x and y means that the remainder operation x ↦ x mod m is a homomorphism from ℤ to ℤ_{m}: it preserves the operations + and × on ℤ. We'll see more examples of homomorphisms between sets with attached operations (called algebras) in AlgebraicStructures.
113.2. Structure of ℤm for composite m: the Chinese Remainder Theorem
The Chinese Remainder Theorem, in the form typically used today, says that if m_{1} and m_{2} are relatively prime (i.e. gcd(m_{1},m_{2}) = 1), then for each pair of equations n mod m_{1} = n_{1}, n mod m_{2} = n_{2}, there is a unique solution n with 0≤n<m_{1}m_{2}. (Chinese Remainder Theorem gives more history of this result.)
Example: let m_{1} = 3 and m_{2} = 4. Then the integers m from 0 to 11 can be represented as pairs (m_{1}, m_{2}) as follows:
m 
m_{1} 
m_{2} 
0 
0 
0 
1 
1 
1 
2 
2 
2 
3 
0 
3 
4 
1 
0 
5 
2 
1 
6 
0 
2 
7 
1 
3 
8 
2 
0 
9 
0 
1 
10 
1 
2 
11 
2 
3 
Proof: We will prove something stronger and show an isomorphism between ℤ_{m} and ℤ_{m1}×ℤ_{m2}, where ℤ_{m1}×ℤ_{m2} is the set of pairs of elements (x,y) with addition defined by (x,y)+(x',y') = (x+x',y+y') and multiplication by (x,y)(x,y')=(xx',yy'). To go from ℤ_{m} to ℤ_{m1}×ℤ_{m2}, define f(n) = (n mod m_{1}, n mod m_{2}). Showing that f is an isomorphism requires showing it preserves addition and multiplication (i.e., that it is a homomorphism: f(a+b) = f(a)+f(b) and f(ab) = f(a)f(b)) and that it is bijective. For addition, observe that if a = k_{a}m_{1}+a' and b = k_{b}m_{1}+b', then a+b mod m = a+b  xm for some x, which equals (k_{a}+k_{b}xm/m_{1})m_{1}+(a'+b')xm=km_{1}+(a'+b' mod m) for some k; thus, a+b mod m = (a mod m) + (b mod m) mod m. By symmetry, the same holds if we replace m_{1} by m_{2}. For multiplication, perform the similar calculation ab mod m = ab  xm for some x, which equals (k_{a}m_{1}+a')(k_{b}m_{1}+b')xm = m_{1}(k_{a}k_{b}+k_{a}b'+k_{b}a'xm/m_{1}) + a'b' ≡_{m1} a'b' (and similarly for m_{2}).
Now we must show that f is invertible. Let c_{1} = m_{2}(m_{2}^{1} (mod m_{1})) and c_{2} = m_{1}(m_{1}^{1} (mod m_{2})). (The inverses exist because gcd(m_{1},m_{2})=1.) These coefficients correspond to the pairs (1,0) and (0,1), because c_{1} = m_{2}m_{2}^{1} = 1 (mod m_{1}) and c_{1} = 0 (mod m_{2}), and similarly for c_{1}. So given (n_{1},n_{2}), we can compute n = (n_{1}c_{1}+n_{2}c_{2}) mod m and have n mod m_{1} = n_{1}*1 + n_{2}*0 = n_{1} and n mod m_{2} = n_{1}*0 + n_{2}*1 = n_{2}. We have just shown f is invertible, which implies it is an isomorphism. ∎
113.3. Division in ℤm
One thing we don't get general in ℤ_{m} is the ability to divide. This is not terribly surprising, since we don't get to divide (without remainders) in ℤ either. But for some values of x and some values of m we can in fact do division: for these x and m there exists a multiplicative inverse x^{1} (mod m) such that xx^{1} = 1 (mod m). We can see the winning x's for ℤ_{9} by looking for ones in the multiplication table below:^{16}
× 
0 
1 
2 
3 
4 
5 
6 
7 
8 
0 
0 
0 
0 
0 
0 
0 
0 
0 
0 
1 
0 
1 
2 
3 
4 
5 
6 
7 
8 
2 
0 
2 
4 
6 
8 
1 
3 
5 
7 
3 
0 
3 
6 
0 
3 
6 
0 
3 
6 
4 
0 
4 
8 
3 
7 
2 
6 
1 
5 
5 
0 
5 
1 
6 
2 
7 
3 
8 
4 
6 
0 
6 
3 
0 
6 
3 
0 
6 
3 
7 
0 
7 
5 
3 
1 
8 
6 
4 
2 
8 
0 
8 
7 
6 
5 
4 
3 
2 
1 
Here we see that 1^{1} = 1, as we'd expect, but that we also have 2^{1} = 5, 4^{1} = 7, 5^{1} = 2, 7^{1} = 4, and 8^{1} = 8. There are no inverses for 0, 3, or 6.
What 1, 2, 4, 5, 7, and 8 have in common is that they are all relatively prime to 9. This is not an accident: when gcd(x,m) = 1 we can use the extended Euclidean algorithm (see NumberTheory) to find x^{1} (mod m). Observe that what we want is some x' such that xx' ≡_{m} 1, or equivalently such that x'x + qm = 1. But the extended Euclidean algorithm finds such an x' (and q) whenever 1 = gcd(x,m).
If gcd(x,m) ≠ 1, then x has no multiplicative inverse in ℤ_{m}. The reason is that if some d>1 divides both x and m, it continues to divide xx' and m for any x'≠0. So in particular xx' can't be congruent to 1 mod m since qm+1 and m don't share any common factors for any value of q.
The set of of residue classes [x]_{m} where gcd(x,m) = 1 is written as ℤ^{*}_{m}. For a prime p, ℤ^{*}_{p} includes all nonzero elements of ℤ_{p}, since gcd(x,p) = 1 for any x that is not 0 or a multiple of p.
113.3.1. The size of ℤ*m and Euler's Theorem
The size of ℤ^{*}_{m}, or equivalently the number of numbers less than m whose gcd with m is 1, is written φ(m) and is called Euler's totient function or just the totient of m. When p is prime, gcd(n,p) = 1 for all n with 0<n<p, so φ(p) = ℤ^{*}_{p} = p1. For a prime power p^{k}, we similarly have gcd(n,p^{k}) = 1 unless pn. There are exactly p^{k1} numbers less than p^{k} that are divisible by p (they are 0, p, 2p, ... (p^{k}1)p), so φ(p^{k}) = p^{k}  p^{k1} = p^{k1}(p1). For composite numbers m that are not prime powers, finding the value of φ(m) is more complicated; but we can show using the ChineseRemainderTheorem that in general
One reason φ(m) is important is that it plays a central role in Euler's Theorem, which says that a^{φ(m)} = 1 (mod m) when gcd(a,m) = 1.
We can prove this using an argument adapted from the proof of BiggsBook Theorem 13.3.2: Let z_{1}, z_{2}, ..., z_{φ(m)} be the elements of ℤ^{*}_{m}. For any y ∈ ℤ^{*}_{m}, define yℤ^{*}_{m} = { yz_{1}, yz_{2}, ..., yz_{φ(m)} }. Since y has a multiplicative inverse mod m, the mapping z ↦ yz (mod m) is a bijection, and so yℤ^{*}_{m} = ℤ^{*}_{m} (mod m). It follows that ∏_{i} z_{i} = ∏_{i} yz_{i} = y^{φ(m)} ∏_{i} z_{i} (mod m). But now multiply both sides by (∏_{i} z_{i})^{1} to get 1 = y^{φ(m)} (mod m) as claimed.
For the special case that m is a prime, Euler's Theorem is known as Fermat's Little Theorem, and says a^{p1} = 1 (mod p) for all primes p and all a such that p∤a.^{17}
Euler's Theorem is popular in cryptography; for example, the RSA encryption system is based on the fact that (x^{e})^{d} = x (mod m) when de = 1 (mod φ(m)). Here x is encrypted by raising it to the eth power mod m, and decrypted by raising the result to the dth power. It is widely believed that publishing e and m reveals no useful information about d provided e and m are chosen carefully.
113.4. Group structure of ℤm and ℤ*m
Assumes previous knowledge of GroupTheory.
The set of residue classes [x]_{m} where gcd(x,m) = 1 form an abelian group (see GroupTheory).
We will now show that ℤ^{*}_{m} = { x  0 < x < m, gcd(x,m) } also forms an abelian group, whose operation is multiplication mod m (i.e. x*y = xy mod m), provided m is at least 2.
To show that ℤ^{*}_{m} is an abelian group, we need to show closure, commutativity, associativity, existence of an identity (1), and existence of inverses.
 Closure
Let x and y be in ℤ^{*}_{m} so that gcd(x,m) = 1 and gcd(y,m) = 1. z = xy mod m = xy  km where k = ⌊xy/m⌋. Let p be any prime factor of m. If pxy, then px or py; since x and y have no common factors with m, neither does xy. Subtracting km can't create a common factor with m, so gcd(z,m)=1. We also have 0≤z<m (true of all remainders), and z can't equal zero because gcd(0,m)=m≠0.
 Commutativity
 Trivial: xy mod m = yx mod m because xy = yx.
 Associativity
 The only tricky thing here is that taking mods in between multiplications might break associativity. We'll argue though that xyz mod m = (xy mod m) z mod m; by symmetry this will also show xyz mod m = (yz mod m) x mod m = (xy mod m) z mod m. To prove the claim, observe that xy = (xy mod m) + km for some k. Then xyz = (xy mod m) z + kzm, and xyz mod m = (xy mod m) z mod m + (kzm mod m) = (xy mod m) z mod m since kzm mod m = 0.
 Identity
 1.
 Inverses
Let gcd(x,m) = 1. Then the extended Euclidean algorithm returns x',m' such that x'x+m'm=1. So (x'x + m'm) mod m = 1 mod m or x'x mod m = 1. So let x^{1} = x' mod m. We can easily show that x^{1} has gcd(x^{1},m)=1: if p divides m, then xx^{1} = km+1 = kk'p+1 which can't be divisible by p because it has remainder 1 when divided by p. But if p does not divide xx^{1}, it can't divided either of x or x^{1}, and so x^{1} in particular has no common factors with m.
Note that we could define the additive group ℤ_{m} as a quotient group of (ℤ,+) by the congruence x~y if x mod m = y mod m. This almost works for ℤ^{*}_{m}—but the problem is that ℤ with multiplication is not a group, because it doesn't have inverses. The best that we can do is construct the quotient monoid (ℤ,×)/~, which will contain at least one element with no inverse (0), and possibly many others.
114. DivisionAlgorithm
115. ModularArithmetic
116. ChineseRemainderTheorem
117. GroupTheory
A group is an algebra (see AlgebraicStructures) with an associative binary operation (usually written as either multiplication or addition), a constant identity element e such that ex = xe = x for all x, and an inverse operation x > x^{1} such that xx^{1} = x^{1}x = e for all x. If it is also the case that xy=yx for all x and y, the group is abelian. Group theory is the study of the structure of groups.
More formally, a group is a set G together with an operation *:S×S→S that satisfies:
 Closure
 ∀x,y ∈ G, x*y ∈ G. (This is implicit in the fact that *:S×S→S.)
 Associativity
 ∀x,y,z ∈ G, (x*y)*z = x*(y*z)
 Identity
 ∃e∈G ∀x∈G e*x = x*e = x.
 Inverses
∀x∈G ∃x^{1}∈G x*x^{1} = x^{1}*x = e.
An abelian group also satisfies:
 Commutativity
 ∀x,y∈G xy=yx.
Abelian groups are often written using + for the group operation to emphasize their abelianness, with x for the inverse of x. So in an abelian group we might write the inverses axiom as ∀x∈G ∃(x)∈G x+(x) = (x)+x = e.
There are also words for algebras that satisfy only some of these axioms: if we take away inverses, we get a monoid; if we take away inverses and the identity, we get a semigroup, and if we take away associativity as well, we get a magma. These structures are discussed in more detail in AlgebraicStructures, but for now we will content ourselves with groups.
118. Some common groups
The symmetric group on n letters, written S_{n}, has as its elements the n! distinct bijections from an nelement set (often taken to be {1...n}) to itself, with composition as the binary operation.^{18} Each element of S_{n} is called a permutation for obvious reasons. For compactness, permutations are often written in cycle notation: this is a sequence of cycles grouped by parentheses, where the interpretation of (x_{1}x_{2}...x_{k}) is that the permutation maps x_{1} to x_{2}, x_{2} to x_{3}, and so on, with x_{n} mapping to x_{1}. Cycles that consist of a single element only are omitted. So for example the permutation that shifts each element of S_{5} up by one would be written (12345) (or (34512) or somethingthere is no requirement that a particular element appear first in the cycle) and the permutation that swaps 2 with 4 and 1 with 5 while leaving 3 alone would be written as (24)(15). Multiplying permutations consists of tracking the individual elements through the various cycles. So for example, in S_{5}, (24)(15) * (12345) = (14)(23). (To see this, follow each number through the two permutations: 1>2>4, 4>5>1, 2>3>3, 3>4>2, and 5>1>5.) The cyclic decomposition of a permutation is a form of factoring: the permutation is obtained by multiplying the individual cycles together (since they don't move any common elements, the order doesn't matter). See SymmetricGroup.
The free group on a set S consists of all sequences of terms x and x^{1} (where x ranges over the elements of S) in which xx^{1} and x^{1}x do not appear.
The cyclic group of order n, isomorphic to ℤ_{n}, has elements {p^{0}, p^{1}, ..., p^{n1}}, with p^{i}p^{j}= p^{(i+j) mod n}. Here p^{k} is defined formally for any k∈ℤ as a product of k copies of p (if k is positive), k copies of p^{1} (if k is negative), or the empty product and group identity e (if k is zero). For additive groups, p^{k} is written as kp.
For any m, the set ℤ^{*}_{m} of elements of ℤ_{m} that are relatively prime to m forms a group under multiplication. It is isomorphic to ℤ_{p1} when p is prime.
The symmetry group of a geometric object consists of all ways of rotating and/or flipping the figure so that the resulting figure is congruent to the original. Each such transformation is called a symmetry of the object. Some examples:
The symmetry group of an equilateral triangle is isomorphic to S_{3} (label the corners 1, 2, 3 and observe that we can move corner one to any position by rotation and then swap the other two as needed by a flip).
The symmetry group of an isosceles triangle is isomorphic to P_{2} (we can flip the two endpoints of the unequal edge)
 The symmetry group of a general triangle is the trivial group consisting only of the identity (we can't do anything).
The symmetry group D_{n} of an ngon (an nsided polygon) has is called the dihedral group on n points and has 2n elements: to specify a particular symmetry, we pick a particular vertex and say where it goes (n choices) and then say which of its two neighbors ends up on its left or right (2 choices). If a is the operation that rotates the vertices one position clockwise and b is the operation that flips the ngon about vertex #1, then we have b^{2}=a^{n}=e and ab = ba^{1}. Note that this group is not abelian.
The symmetry group of a (nonsquare) rectangle is isomorphic to ℤ_{2}×ℤ_{2}, since we can flip it independently either the short way or the long way.
The alternating subgroup A_{n} of S_{n} consists of all permutations that can be carried out by an even number of twoelement swaps. (See below for a definition of a subgroup.)
The general linear group GL_{n}(ℝ) (or just GL(n)) of invertible realvalued n×n matrices. The group operation is standard matrix multiplication, inverse in matrix inverse, and the identity element is the identity matrix. Also works if we replace ℝ with any other ring. It's not hard to show that S_{n} is a subgroup of GL_{n}(R) for any ring (it maps to the permutation matrices, which have exactly one 1 in each row and column), so any finite group can be represented as a subgroup of GL(n) for some n. Some groups have more compact representations: for example, for any m the group ℤ_{m} can be represented in GL_{n}(ℂ) by the 1×1 matrices in the set { [ exp(2πin/m) ]  n∈ℤ }, since exp(2πi) = 1. Expressing finite groups as subgroups of GL(n) is a common way to analyze the structure of groups and is the central tool in representation_theory.
119. Arithmetic in groups
Here are some useful facts that apply in any group:
(xy)^{1} = y^{1}x^{1}. Proof: (xy)(y^{1}x^{1}) = x(yy^{1)x}1^{ = (xe)x}1^{ = xx}1^ = e.
xy = xz ⇒ y = z. Proof: Multiply both sides on the left by x^{1} to get x^{1}xy = x^{1}xz ⇒ ey = ez ⇒ y = z.
yx = zx ⇒ y = z. Proof: Multiply both sides on the right by x^{1} to get yxx^{1} = zxx^{1} ⇒ y = z.
The functions f_{x}(y) = xy and g_{x}(y) = x are both bijections. Proof: That they are injective is immediate from the previous two facts. That they are surjective follows from f^{1}(z) = x^{1}z (as can be verified by computing f(f^{1}(z)) = xx^{1}z = z) and g^{1}(z) = zx^{1}.
The equations ax = b and xc = d both have unique solutions. Proof: immediate from bijectivitity of f_{x} and g_{x} above.
 The identity e is unique. This follows from the preceding, but I've always liked this proof: Suppose there are e and e' such that ∀x, ex = xe = e'x = xe' = x. Then observe that ee' = e (letting x = e) and ee' = e' (letting x = e'), from which e = e'.
120. Subgroups
A subgroup is a subalgebra of a group. In English, H is a subgroup of G if H is a subset of G that is closed under G's group operation, i.e. such that for all x,y∈H, x*y ∈ H. For example, the even integers are a subgroup of the integers (with addition as the group operation). The statement that H is a subgroup of G is sometimes abbreviated as H < G.
The subgroup of G generated by an element x, written <x>, is the smallest subgroup of G that contains x, where subgroups are ordered by inclusion. The existence of <x> is immediate from the fact that (a) there is at least one subgroup of G that contains xG itself, and (b) the intersection of any number of subgroups that contain x is itself a subgroup containing x. So we can take the intersection of all the subgroups that contain x and get <x>.
There is a simpler way to write <x>. If we define x^{0} = e, x^{n} for n > 0 as xx^{n1}, and x^{n} for n > 0 as x^{1}x^{(n1)}, then <x> is precisely { x^{n}  n ∈ ℤ }, the set of all powers of x. Note that it is possible that this set contains duplicates: for example, in ℤ_{6}, 3+3 = 0 and so <3> consists only of the elements 0 and 3. The size of the subgroup generated by x is equal to the smallest n such that x^{n} = e (if such an n exists); this quantity is called the order or index of x in G. A subgroup generated by a single element is called a cyclic subgroup; we'll talk more about these below.
121. Homomorphisms and isomorphisms
A homomorphism f:G→H is a function from the elements of G to the elements of H such that f(xy) = f(x)f(y) for all x,y in G. For example, the function n↦(n mod m) is a homomorphism from ℤ to ℤ_{m}, since taking remainders preserves addition. It is not hard to show that homomorphisms preserve the identity (if f(e_{G}) ≠ e_{H}, we are in trouble when we compute f(xe_{G}) = f(x)f(e_{G}) ≠ f(x)) and inverses (since f(x)f(x^{1}) = f(e_{G}) = f(x^{1})f(x) implies f(x^{1}) = f(x)^{1}). A homomorphism that is bijective is called an isomorphism.
122. Cartesian products
Given G and H, the product group G×H has elements of the form (x,y) where x∈G and y∈H and the product rule (x,y)(x',y') = (xx',yy').
Isomorphisms between various products of cyclic groups are discussed in BiggsBook §20.6.
123. How to understand a group
Groups in general can be very complex, and it may be difficult to wrap your mind around an arbitrary group unless you can find some way to break up its structure into brainsized pieces. Here are four basic strategies that group theorists have come up with for doing this:
By looking at it as a subgroup of S_{n}, i.e. as a collection of bijections (called actions) on some set. This works for any finite group: we can always take the group itself as the set, and for each group element a the function f:G>G defined by f(x) = xa is a bijection (the inverse is f^{1}(x) = xa^{1}). Other examples of groups constructed in this way are the symmetry groups of various figures described above, or the automorphism group of a graph (or any structure that has automorphisms).
By giving a set of generators a, b, c, etc. and relations that describe when various products of the generators and their inverses are equal. An example of this was the description of the dihedral group D_{n} as being generated by elements a and b (generators) with a^{n} = e and ab = ba^{1} (relations). Formally, this approach is equivalent to taking a quotient of the free group by a congruence generated by one of its subgroups, as we will describe in more detail below.
 By looking at what subgroups the group has. Even if the original group itself is hard to grasp, it may have simpler structures buried within it.
By expressing the group as a product of simpler groups. This is particularly useful for abelian groups, as all abelian groups are isomorphic to a product of cyclic groups ℤ_{m}, where m is a power of a prime.
We will start by looking at how subgroups relate to a group, and in particular how subgroups can sometimes generate congruences that can be used to construct quotient groups.
124. Subgroups, cosets, and quotients
Let G be a group, and let H be a subgroup of G. For each element a of G, define Ha = { xa  x in H }. Such a set is called a right coset. We can similarly define aH = { ax  x in H }, a left coset; everything we say about right cosets will also be true of left cosets, after reversing the group operation throughout.
The right cosets of a subgroup have the same size (sometimes called order by group theorists) as the subgroup itself:
 Lemma 1
 H = Ha for all a.
 Proof
Let f:H>Ha be the function f(x) = xa. Observe that f has an inverse f^{1}(y) = ya^{1}; it follows that f is a bijection.
It is also not hard to show that the cosets partition G:
 Lemma 2
 For any a, b, either Ha = Hb or Ha∩Hb = Ø.
 Proof
Suppose y appears in both Ha and Hb; we will show that any z in Ha is also in Hb. We have y = xa = wb for some x, w in H. It follows that a = x^{1}wb. Let z = qa where q is in H. Then z = qx^{1}wb. But q, x, and w are all in H, so qx^{1}w is as well, and z is in Hb. A symmetric argument shows that any z'∈Hb is also in Ha, so Ha = Hb.
Combining the two lemmas gives:
 Theorem 3
 If H is a subgroup of G, then H divides G.
This is not true in general for e.g. monoidsthe important difference is that the existence of a^{1} means that multiplying by a is invertible and creates a bijection. Though one can define right cosets for any subalgebra and binary operation, both the equalsize lemma and the partition lemma depend on the existence of inverses.
An immediate consequence of the Theorem is that any group whose size is a prime (e.g. ℤ_{p}) has no nontrivial^{19} proper^{20} subgroups.
124.1. Normal subgroups
Partitioning all elements of G into right cosets of a subgroup H creates an equivalence relation: a is right congruent to b, written a ≡_{r} b (mod H), if Ha = Hb, or equivalently if ab^{1} is in H. For nonabelian groups, right congruence is not in general a congruence in the algebraic sense. We can see this by observing that if it were a congruence, then then we could construct a quotient group G/≡_{r} in which H (as the equivalence class containing e) acted as the identity. But since the identity commutes, we would need aH = Ha for all a. Though this equation is true for many subgroups, it is not true for all.
A subgroup H of G for which aH = Ha for all a is called a normal subgroup. If H is a normal subgroup of, we write H ⊲ G. Any subgroup of an abelian group is normal. A group is called simple if it has no normal subgroups; an example is the dihedral group D_{n}. This group has a subgroup of order n (the rotations that don't flip) and many subgroups of order 2 (the flips around particular vertices), but none of them are normal.
Given a subset S of G, the intersection of all normal subgroups of G that are supersets of S is a also normal subgroup, called the normal subgroup generated by S. In general the normal subgroup generated by S will be larger than the subgroup generated by S.
If N is a normal subgroup of G, then ≡_{r} (mod N) is a congruence: (Ha)(Hb) = HaHb = HHab = Hab. We write G/H for the quotient group obtained from G and this congruence. Group theorists have historically approached the understanding of groups by trying to dividing them into quotients over subgroups, ultimately leading to towers of simple groups that cannot be divided further. This doesn't entirely identify the group: for example, the distinct groups ℤ_{4} and ℤ_{2}×ℤ_{2} both have ℤ_{2} as a normal subgroup and in both cases ℤ_{4}/ℤ_{2} = ℤ_{2}×ℤ_{2}/ℤ_{2} = ℤ_{2}, but it gives some information.
The problem of identifying the simple groups, at which this process stops, is known as the problem of classification of finite simple groups and was a major outstanding problem in group theory from the mid19th century until its final completion in 1985.
124.2. Cyclic subgroups
Let G be a group and let a be an element of G. Then the set <a> = { a^{k}  k in ℤ } is a subgroup of G, called the cyclic subgroup generated by a. (Proof that it's a subgroup: <a> contains the identity e = a^{0}, and for any a^{i} and a^{j} in <a>, a^{i}a^{j} = a^{i+j} is in <a>.) This is an easy way to generate subgroups of a group; for example, the nonnormal subgroups of the dihedral group consisting of all nonflipping rotations or particular nonrotating flips are just the cyclic groups generated by particular operations.
Some other examples of cyclic subgroups of a group:
In ℤ, the subgroup <2> generated by 2 consists of all the even integers. This is often written as 2ℤ. Every subgroup of ℤ turns out to be of this form: it is dℤ where d is the greatest common divisor of the elements in the group.
ℤ itself is a cyclic subgroup of Q or R, the additive groups of the rationals or reals, generated by 1 in each case.
The index of an element a is the least positive integer k for which a^{k} = e, or 0 if there is no such integer (this only happens in infinite groups: the proof is that in a finite group, as we generate the sequence a^{0}, a^{1}, a^{2}, ... we must eventually get a^{i} = a^{j} for some i, j; but then a^{ij} = e). When the index is nonzero, it is also the size of <a>, as any element a^{m} where m is less than 0 or greater than or equal to k will be equal to some element in the set { a^{0}, a^{1}, ..., a^{k1} }. It follows from the theorem in the previous section that the index of any element of a finite group (if nonzero) divides the order of the group that contains it.
For permutations, the index can be calculated directly from the cyclic decomposition; it's the least common multiple of the cycle lengths. A wellknown application of this is the answer to the problem "how many perfect shuffles does it take to restore a 52card deck of playing cards to its original state?" Here we define a "perfect shuffle" as a permutation that interleaves the top and bottom halves of the deck, which (if we number the cards from 0 to 51) sends card 0 to position 0, 26 to position 1, 1 to position 2, 27 to position 3, and so on, ultimately leaving card 51 in place. Formally, we can think of this as the function f(x) = 2x mod 51 for x < 51, and we want to know how many iterations of f are needed to get the identity.
If we try writing down the cyclic decomposition of f, we get (0)(1 2 4 8 16 32 13 26)(3 6 12 24 48 45 39 27)(5 10 20 40 29 7 14 28)(9 18 36 21 42 33 15 30)(11 22 44 37 23 46 41 31)(17 34)(19 38 25 50 49 47 43 35)(51). This is the product of many 8element cycles, one 2element cycle, and two 1element cycles; so the LCM is 8 and 8 perfect shuffles equals the identity. (A quicker way to see this is to observe that f^{(k)}(x) = 2^{k} x mod 51 when x < 51, and 2^{8} mod 51 = 256 mod 51 = 1.)
124.3. Finding the subgroups of a group
Given a group, how do we find subgroups? For finite groups, it's often enough to pick a few elements and ask "what subgroup is generated by these elements?" The more difficult problem is knowing when you've gotten all the subgroups. Here facts like Theorem 3 (H divides G when H is a subgroup of G) can be handy for excluding possibilities we might have missed.
For example, let's find all the subgroups of D_{p} where p is a prime. The order of D_{p} is 2p, and the only subgroup orders we are interested in that divide 2p are 2 and p, so any nontrivial proper subgroup either has size 2 (i.e., it consists of the identity and one other element that is its own inverse) or p. It's not hard to see where we can get size 2 subgroups (any flip generates one) and a size p subgroup (all the rotations). But are these all the subgroups?
First observe that the subgroup of nonflipping rotations is generated by any nontrivial rotation. The proof is that any such rotation is of the form x=a^{k} for some k (where a is our rotateonepositiontotheright generator), and if the index of x is some m < p we have a^{km} = e which implies km is a multiple of p. But then km contains a factor of p and p is not prime.
It follows that as soon as we have a single rotation, we have all the rotations. So we can't get any more subgroups using just rotations.
Can we get another subgroup using, say, two flips? Suppose we flip around 1 and then around some other position c. Then after both flips 1 is moved to position 2c1 and the polygon is not flippedin other words, the product of these two flips is a nontrivial rotation. So we have a subgroup that contains a nontrivial rotation, which means that it contains all p rotations, and it also contains at least two flips. This means the subgroup has at least p+2 elements; but the only number greater than or equal to p+2 that divides 2p is 2p itself. So as soon as we have two flips (or a rotation and a flip), we have the entire group.
We have just shown that the nontrivial proper subgroups of D_{p} consist precisely of (a) p 2element subgroups generated by flips around particular vertices of the polygon, and (b) one pelement subgroup containing all rotations. Note that we used the fact that p was prime; for general D_{n} we might get more subgroups.
125. Homomorphisms, kernels, and the First Isomorphism Theorem
Let f:G→H be a homomorphism. Define the kernel of f as the set Ker(f) = f^{1}(e_{H}) = { x∈G  f(x) = e_{H} }.
It is easy to show that the kernel is always a normal subgroup of G. To show that it is a subgroup, first observe that if x, y are in Ker(f), then f(xy) = f(x)f(y) = e_{H}e_{H} = e_{H} implies xy is also in Ker(f). Similarly if f(x) = e_{H} then f(x^{1}) = e_{H}^{1} = e_{H} and thus Ker(f) is closed under inverses. To show that Ker(f) is normal, we need to show that for any a, the coset a Ker(f) = Ker(f) a. We can do so by observing that for any b in Ker(f), f(ab) = f(a)f(b) = f(a), and similarly f(ba) = f(b)f(a) = f(a). So a Ker(f) = Ker(f) a = f^{1}(f(a)), or equivalently a' is in a Ker(f) = Ker(f) a precisely when f(a') = f(a). This latter equation defines the kernel relation of f, which does not depend on G being a group and has useful properties for more general algebraic structures; but for groups it is enough to track the kernel as a subgroup.
It is also the case that the image of f, defined as Im(f) = { y∈H  y = f(x) for some x∈G } is a subgroup of H. The proof is that if y and y' are both in Im(f), then y=f(x) and y'=f(y') for some x, x' in G, and so yy' = f(x)f(x') = f(xx') ∈ Im(f). (For a surjective homomorphism, Im(f) = H, but not all homomorphisms are surjective.) The image of f is not necessarily normal; for example, the image of f:ℤ_{2}→S_{3} given by f(0) = () and f(1) = (1 2) is a subgroup { (), (1 2) } of S_{3}, but this subgroup is not normal.
We can use the fact that the image of a homomorphism is a subgroup to rule out certain homomorphisms between groups. For example, if there is an injective homomorphism f from ℤ_{m} to ℤ_{n}, then Im(f) is a subgroup of ℤ_{n} of size m, and we must have mn.
Because the kernel is normal, we can take a quotient G/Ker(f). The First Isomorphism Theorem says that G/Ker(f) is always isomorphic to Im(f). This is a special case of an even more general theorem for arbitrary algebras, but for groups we can prove it quickly. Observe first that the elements of G/Ker(f) are precisely the inverse images of elements of Im(f), i.e. the sets f^{1}(y) = { x∈G  f(x) = y } for each y in Im(f). We will show that this map f^{1} from elements if Im(f) to elements of G/Ker(f) is the desired isomorphism. Given two elements f^{1}(y) and f^{1}(y') of G/Ker(f), their product is obtained by taking representatives x and x', multiplying them, and taking the equivalence class that contains them. But then we have f(xx') = f(x)f(x') = yy' and so f^{1}(y)f^{1}(y') = f^{1}(yy'). By a similar argument, we have (f^{1}(y))^{1} = f^{1}(y^{1}), and so f^{1} is a homomorphism. But it is also an isomorphism: it's surjective (easy) and injective (since f is a function) and thus a bijection.
For example, the homomorphism f from S_{n} to ℤ_{2} based on whether a permutation is the product of an even or odd number of transpositions (see SymmetricGroup) has as its kernel the alternating group A_{n} of even permutations, and the quotient group S_{n}/A_{n} consists of the set of even permutations and the set of odd permutations and is isomorphic to ℤ_{2}.
On the other hand, we can use the First Isomorphism Theorem to rule out the existence of certain homomorphisms. For example, there is no nontrivial homomorphism^{21} from S_{n} to ℤ_{p} when p > n, since ℤ_{p} has no nontrivial proper subgroups, and if f were a surjective homomorphism from S_{n} to ℤ_{p}, we'd have a subgroup Ker(f) of S_{n} such that S_{n} = n! would be a multiple of S_{n}/Ker(f) = p, but n isn't big enough for this to happen. Or for a homomorphism f from ℤ_{m} to ℤ_{n}, we can show that Im(f) divides both n (because Im(f) is a subgroup of ℤ_{n}) and m (because Im(f) ≈ ℤ_{m}/Ker(f) implies that Im(f) = ℤ_{m}/Ker(f) divides m); it follows that any such homomorphism has Im(f) ≤ gcd(m, n).
126. Generators and relations
One way to define a group is to specific a set of generators, and to give relations between them. Such groups are written as (SR) where S is the set of generators and R is the set of relations. In principle any group can be defined in this way: we let the set of generators be all the elements of the group, and let the relations be all equations of the form xy=z that are true in the group. In practice this approach is only useful when a group is generated by a small number of generators and relations, as with ℤ = (a), ℤ_{m} = (1m1 = 0), D_{n} = (a,ba^{n}=e,b=b^{1},ab=ba^{1}), or ℤ_{2}×ℤ_{2} = (a,ba^{2}=e,b^{2}=e,ab=ba). The notation can be further simplified by converting each relation to the form w=e where w is some word and dropping the "=e" part; this gives ℤ = (a), ℤ_{m} = (1m1), D_{n} = (a,ba^{n},b^{2},abab), and ℤ_{2}×ℤ_{2} = (a,ba^{2},b^{2},aba^{1}b^{1}) for the examples. A definition of a group in this form is called a presentation of the group.
The intuition behind a presentation is that the resulting group is just big enough to contain all the generators and everything that can be generated from them, but not so big that the relations stop being true. This intuition should remind you of free algebras, and in fact the formal definition of (SR) takes a quotient of the free group F(S) on S:
 Definition
 Let S be a set of elements and R a set of words (i.e., elements of F(S)) over S. Then (SR) = F(S)/N, where N is the normal subgroup of F(S) generated by the elements of R.
As before, the normal subgroup generated by R is just the intersection of all normal subgroups of F(S) that contains R. This will consist in particular of all words of the form r_{0}s_{1}r_{1}s_{2}r_{2}...s_{k}r_{k} where each r_{i} is the product of elements of R and their inverses and s_{1}...s_{k} = e in F(S).
Note that the same group may have multiple presentations; the S part will be the same, but different sets of relations might generate the same subgroup of F(S).
One consequence of the definition of (SR) is that (SR) inherits some of the properties of the free group. In particular, any homomorphism from G=(SR) to some group H is completely determined by where it sends the generators:
 Theorem 4
Let G=(SR) and let f:G>H and g:G>H be homomorphisms. Then if f(x)=g(x) for all x in S, f(x)=g(x) for all x in G.
 Proof
Because G is a quotient group of F(S), there exists a homomorphism h:F(S)>G with h(x) = x for all x in S. Now consider the homomorphisms (f∘h) and (g∘h) from F(S) to H. If x is in S, we have (f∘h)(x) = f(x) = g(x) = (g∘h)(x). Using the definition of a free algebra, there is a unique homomorphism that maps each x in S to f(x) = g(x), so we have (f∘h) = (g∘h). Now take some y in G, and let z be such that h(z) = y. Then f(y) = f(h(z)) = g(h(z)) = g(y).
127. Decomposition of abelian groups
Finite abelian groups have a particularly simple structure:
 Theorem (Kronecker Decomposition Theorem)
Let G be a finitely abelian group of size n > 1. Then G is isomorphic to a product of cyclic groups of prime power order, i.e. there are prime numbers p_{1}, p_{2}, ... p_{m} and positive integers k_{1}, k_{2}, ... k_{m} such that
Note that the product of the sizes of the groups in the product must equal the size of the product group. This allows us to quickly identify all the isomorphism classes of abelian groups of a given size. For example, there is one (up to isomorphism) 6element group, isomorphic to ℤ_{2}×ℤ_{3}, because 2×3 is the only way to factor 6 into prime powers. In contrast, there are two 4element groups: ℤ_{2}×ℤ_{2} and ℤ_{4}; and five 16element groups: ℤ_{2}×ℤ_{2}×ℤ_{2}×ℤ_{2}, ℤ_{2}×ℤ_{2}×ℤ_{4}, ℤ_{2}×ℤ_{8}, ℤ_{4}×ℤ_{4}, and ℤ_{16}.
The proof of the Theorem was hard enough to get Kronecker's name attached to it, so we will not attempt it here.
128. SymmetricGroup
The symmetric group on n letters, written S_{n}, has as its elements the n! distinct bijections from an nelement set (often taken to be {1...n}) to itself, with composition as the binary operation.^{18} Each element of S_{n} is called a permutation for obvious reasons.
129. Why it's a group
To be a group, S_{n} requires closure (trivial), associativity (follows from associativity of function composition), an identity (the identity permutation 1→1, 2→2, ..., n→n) and inverses (follows from the fact that any bijection has an inverse). So S_{n} is a group.
130. Cycle notation
For compactness, permutations are often written in cycle notation: this is a sequence of cycles grouped by parentheses, where the interpretation of (x_{1}x_{2}...x_{k}) is that the permutation maps x_{1} to x_{2}, x_{2} to x_{3}, and so on, with x_{n} mapping to x_{1}. Cycles that consist of a single element only are omitted. So for example the permutation that shifts each element of S_{5} up by one would be written (12345) (or (34512) or somethingthere is no requirement that a particular element appear first in the cycle) and the permutation that swaps 2 with 4 and 1 with 5 while leaving 3 alone would be written as (24)(15).
To obtain the cycle notation for a permutation, pick any element of the set and follow its orbitthe elements it is sent to by applying the permutation over and over againuntil you get back to the original element. This gives one of the cycles of the permutation. For example, in the permutation { 1→2, 2→4, 3→5, 4→1, 5→3 } the orbit of 1 is 1, 2, 4, 1, ... and the corresponding cycle would be written as (124). We always get a cycle that returns to the first element because (a) the set is finite, so we must eventually repeat an element in the orbit, and (b) if we don't return to the initial element, i.e. we get an orbit of the form x_{0}x_{1}...x_{i1}x_{i}...x_{j}x_{i} where x_{i} is the first repeated element, then the alleged permutation isn't injective, a contradiction. Continuing with our example, there is a second cycle starting a 3 consisting of 3 and 5, so the whole permutation could be written as (124)(35).
Multiplying permutations consists of tracking the individual elements through the various cycles. So for example, in S_{5}, (24)(15) * (12345) = (14)(23). To see this, follow each number through the two permutations: 1>2>4, 4>5>1, 2>3>3, 3>4>2, and 5>1>5. The cyclic decomposition of a permutation is a form of factoring: the permutation is obtained by multiplying the individual cycles together. Note that since the cycles in the cycle decomposition don't move any common elements, the order doesn't matter: in general this is not true.
131. The role of the symmetric group
The reason the symmetric groups are important is that they embed all other finite groups. Specifically, we have
 Theorem
Let G be a group with n elements. Then G is isomorphic to a subgroup of S_{n}.
 Proof
Let a_{1}, a_{2}, ..., a_{n} be the elements of G. For each a in G define a function f_{a}:G→G by f_{a}(b) = ab. Each such f_{a} is a bijection (f_{a^1^ is it inverse), and the set of such functions is closed under composition (since f}a_{(f}b_{(c)) = abc = f}ab_{(c)); thus it's a subgroup of the group of all bijections from the elements of G to the elements of G, which is isomorphic to S}n_{ (relabel a}1_{...a}n,, as 1...n).
For example, the cyclic group ℤ_{m} is isomorphic to the subgroup of S_{m} generated by (1 2 3 ... m). Many symmetry groups can easily be shown to be isomorphic to subgroups of S_{n} for some n by labeling the vertices of the geometrical figure and describing group operations in terms of how they permute these vertices.
(See BiggsBook §21.5 for more on this.)
132. Permutation types, conjugacy classes, and automorphisms
An automorphism of a group is an isomorphism between the group and itself. Automorphisms of S_{n} are obtained by conjugating by some group element σ; this is the operation that sends τ to στσ^{1}. Intuitively, conjugation corresponds to relabeling the elements being permuted: σ^{1} undoes the relabeling, τ permutes the original elements, and σ restores the relabeling. It is easy to see that conjugation by σ is an isomorphism: its inverse is conjugation by σ^{1} (since σ^{1}(στσ^{1})σ = τ) and it preserves multiplication: (στσ^{1})(σρσ^{1})=στ(σ^{1}σ)ρσ^{1}=σ(τρ)σ^{1}.
Conjugation can be used to define an equivalence relation on permutations: two permutations τ and ρ are conjugate if there is some σ such that ρ = στσ^{1}. The simplest way to detect if two permutations are conjugate is to look at their cycle decompositions: τ and ρ are conjugate if and only if they have the same number of cycles of each length (see BiggsBook Theorem 12.5). The number of cycles of each length is summarized as the type of a permutation, which is writen as a sequence of cycle lengths, possibly with counts as exponents, in brackets. For example, the permutation (124)(35) on S_{5} has type [23], while the permutation (12)(34) has type [1 2^{2}] (the 1 is for the omitted (5) cycle of length 1). It's not at all clear what this is useful for, but BiggsBook makes a big deal about it in §12.5.
133. Odd and even permutations
There is a homomorphism from S_{n} to ℤ_{2} that classifies all permutations as odd (those mapped to 1) or even (those mapped to 0). The essential idea is that a permutation is odd or even depending on whether the number of cycles in its cycle decomposition (including the length1 cycles that we usually don't bother to write down) is odd or even, except that for odd n the correspondence is reversed, as otherwise the identity permutation (with an odd number of cycles) wouldn't map to the identity element 0 of ℤ_{2}. The surprising fact is that oddness and evenness adds as in ℤ_{2} when permutations are multiplied. The oddness or evenness of a permutation σ is often encoded as 1 for odd and 1 for even, and is called the sign of the permutation, written sgn(σ) and equal to (1)^{k}(1)^{n} where k is the number of cycles and n is the size of the underlying set. The reason for this encoding is that we can map multiplication of permutations directly to multiplication of integers: sgn(στ) = sgn(σ)sgn(τ). This avoids dealing with ℤ_{2} directly, which was a popular dodge back in the early days of group theory when this notation was invented.
Note that we still haven't proved that sgn is indeed a homomorphism. The easiest way to do this is to reduce all permutations to products of a smaller basis of odd permutations, and show that if σ = τ_{1}τ_{2}...τ_{k} where each τ_{i} is in the basis, then sgn(σ) = ∏_{i} sgn(τ_{i}). The basis we will use consists of all transpositions, permutations of type [1^{n2}2], or alternatively permutations that exchange two elements with each other while leaving the others untouched. Since each transposition consists of exactly n1 cycles, it has sign (1)^{n1}(1)^{n} = 1. If we can show that sgn(σ) = ∏_{i} sgn(τ_{i}), we get an alternate (and more standard) definition of sgn(σ) as the parity number of transpositions needed to generate σ, which we can then use to argue that sgn(στ) = sgn(σ)sgn(τ) since we can express στ as just the product of the two sequences of transpositions that generate σ and τ.
First we must show that any permutation σ can be written as a product of transpositions. There are a couple of ways to prove this. A computer programmer will probably swap the correct value to position 1, then the correct value to position 2, and so on. This works, but it is not quite as clean a proof as the observation that any cycle (x_{1} x_{2} ... x_{k}) = (x_{1} x_{k}) (x_{1} x_{k1}) (x_{1} x_{k2}) ... (x_{1} x_{3}) (x_{1} x_{2}), in which each x_{i} for i < k is first swapped into position x_{1} and then back into position x_{i+1} (remember that permutations are applied right to left). Since any permutation is a product of cycles, and each cycle can be represented as a product of transpositions, we get that any permutation is a product of transpositions.
Now, we can do transpositions all afternoon, and after a while we won't be generating any more permutations. So in general the same permutation may arise as the product of different sequences of transpositionsand even sequences of different length. But what we will show is that the number of transpositions in each sequence generating σ is always odd or even depending on the sign of σ. The proof of this is to show that while a transposition may have unpredictable effects on the number of cycles in σ, it always increases or decreases this number by exactly 1. So the parity of the number of cycles in the product of an even number of transpositions is always the same, and since σ has a unique cycle decomposition (up to reordering the cycles), the number of cycles in the decomposition determines whether there are an even or an odd number of transpositions in any decomposition into transpositions.
 Lemma 1
(x y)(a_{1} ... a_{k} x b_{1} ... b_{m} y) = (a_{1} ... a_{k} y) (b_{1} ... b_{m} x).
 Proof
Walk the elements through both cycles on the LHS. Each a_{i} except a_{k} is still sent to a_{i+1}, since a_{i+1} is not affected by (x y). The element a_{k} is sent first to x and then y. The element y is sent to a_{1} by the righthand cycle and then is unaffected by (x y). This gives us our first cycle on the RHS. A similar argument shows that (b_{1} ... b_{m} x) forms the second cycle.
 Corollary 2
(x y)(a_{1} ... a_{k} y) (b_{1} ... b_{m} x) = (a_{1} ... a_{k} x b_{1} ... b_{m} y)
 Proof
Multiply both sides of the equation in the lemma by (x y); since (x y)^{2} = e this gives the equation in the corollary (after swapping the LHS with the RHS).
So now we have:
 Lemma 3
 If σ is a permutation with k cycles and τ a transposition, then τσ has either k1 or k+1 cycles.
 Proof
 Either τ swaps two elements of the same cycle in σ, Lemma 1 applies, and τσ has k+1 cycles, or τ swaps two elements of different cycles, Corollary 2 applies, and τσ has k1 cycles.
which gives:
 Corollary 4
 If σ is a permutation and τ a transposition, then sgn(τσ) = sgn(τ)sgn(σ) = sgn(σ).
 Proof
(1)^{(k1)} = (1)^{k+1} = ((1)^{k}).
and finally:
 Theorem
 For any permutations σ and ρ, sgn(σρ) = sgn(σ)sgn(ρ).
 Proof
 Rewrite σ as a product of transpositions, and then apply Corollary 4 once for each transposition in the expansion of σ.
One consequence of the classification into odd and even permutations is that the even permutations form a subgroup of S_{n}, called the alternating subgroup A_{n}: the inverse of an even permutation is even (expand it into transpositions and then invert the product) and the product of two even permutations is even. The size of A_{n} is exactly n!/2, or half the size of S_{n}. We can prove this by observing that multiplication by any transposition τ gives a bijection between the even permutations and the odd permutations, an observation that is a special case of the proof of Lagrange's Theorem (see GroupTheory or BiggsBook §20.8).
134. AlgebraicStructures
Contents
135. What algebras are
An algebra is a set S (called the carrier) together with zero or more operations, each of which is a function from S^{k}→S for some k. The value k is the number of arguments to the operation, and is called the arity of the operation. Most operations that one encounters are either unary (one argument) or binary (two arguments); examples are negation (unary) and addition (binary). Some programming languages provide ternary operation with three arguments, like C's notorious ?: operation. Some algebras also include 0ary operations: most people call these constants. The collection of operations provided by an algebra is called the algebra's signature.
For example, the integers with addition and negation have as carrier the set ℤ and signature (+, 0, ), where + is a binary operation, 0 is a 0ary operation (i.e., constant), and  is a unary operation. Other operations (e.g. binary ) can be defined using operations in the signature.
Often we use the same letter to refer to both an algebra and its carrier when this will not cause confusion.
136. Why we care
The various standard algebras are abstractions that allow us to reason about lots of different situations at the same time. From the perspective of computer science, they are like base classes high up in an objectoriented type hierarchy, that provide minimal features common to all the classes that inherit from them without specifying the details. So for example in a monoid, where the single operation is associative and there is an identity e that satisfies the equations ae = a and ea = a, we can prove that there can't be a second identity e', since if ae' = a for all a we have ee' = e (from ea = a) and ee' = e' (from ae' = a), giving e = e'. This tells use that we can't extend ℤ by adding a second copy of 0 or the set of n×n matrices by adding a second copy of I; but we didn't need to know anything specific about either structure to know this.
Similarly we can sometimes recognize that our proofs (or later, our algorithms) don't require the detailed structure of ℚ, or ℝ, or ℤ, but in fact work in any algebra of the appropriate type. For example, in computing the length of a path through a graph, we take the sum of the edge weights, and in computing the shortest path, we take the min over all such paths. If we know a lot about semirings, we might recognize this as a sum over products in the (min,+) semiring, and realize that many of our shortestpath algorithms might work equally well in any other semiring.
137. Cheat sheet: axioms for algebras (and some notquite algebras)
Axioms 
Name 
Anything that satisfies this and above is a 
0 binary operations 



set 
1 binary operation + 



magma 
x+(y+z)=(x+y)+z 
Associativity 
semigroup 
0+x=x+0=x 
Identity 
monoid 
x+(x)=(x)+x=0 
Inverse 
group 
x+y=y+x 
Commutativity 
abelian group 
2 binary operations + and ⋅ 

x(y+z)=xy+xz, (y+z)x=yx+yz 
Distributivity 

x(yz)=(xy)z 
Associativity (multiplicative) 
rng (ring without the multiplicative identity)^{22} 
1x=x1=x 
Identity (multiplicative) 
ring 
xy=yx 
Commutativity (multiplicative) 
commutative ring 
xx^{1}=x^{1}x=1 when x≠0 
Inverse (multiplicative) 
field 
Semirings don't quite fit into this progression; they act like rings, but the + operation gives a commutative monoid instead of an abelian group. An example is the (max,+) semiring, where max acts as the addition operator and + (which distributes over max) acts as multiplication.
See below for examples.
138. Classification of algebras with a single binary operation (with perhaps some other operations sneaking in later)
The simplest interesting algebras consist of a set together with a single binary operation (*, say). These algebras are classified depending on what axioms * satisfies. Each of the classes below adds an additional constraint to the previous one.
138.1. Magmas
If * satisfies closure (which just says that its codomain is S), then (S,*) is a magma (or sometimes groupoid, but groupoid is more often used to mean something else that is more useful: see Groupoid). There really isn't very much to say about magmas, but we can define one interesting magma: the free magma on a set A has as its elements (1) all the elements of A, and (2) (x*y) for any x and y in the magma. This effectively generates all binary trees whose leaves are elements of A.
138.2. Semigroups
A magma (S,*) becomes a semigroup if its operator is associative, that is, if (x*y)*z = x*(y*z) for all x, y, and z in S. Semigroups show up quite often in ComputerScience. Examples are:
 Let A be a set, and S be a set of functions from A to A. Then (S,∘) is a semigroup, where ∘ is the composition operation defined by (f∘g)(x) = f(g(x)).
Let A^{+} be the set of nonempty finite sequences of elements of some alphabet A. Then (A^{+},+) is a semigroup, where + is the concatenation operation: abc+def = abcdef. This semigroup is called the free semigroup on A.
Let ℤ^{+} be the positive integers. Then (ℤ^{+},+) is a semigroup, which is isomorphic (see below) to (A^{+},+) if A has only one element.
The empty set Ø and the empty function from Ø^{2}→Ø together make the empty semigroup.
 Let S be a set and let x be an element of S. Define for each y, z in S y*z = x. Then (S,*) is a semigroup.
Most magmas are not semigroups and can't easily be turned into semigroups without destroying information.
138.3. Monoids
A semigroup (S,*) is a monoid if it has an identity element e, that is, if there is an element e such that e*x = x and x*e = x for all x. In algebraic terms, we usually think of the identity element as being provided by a 0ary operation, also known as a constant.
If there is an identity element, it is easy to prove that it is unique: Let e and e' be identities. Then e*e' = e' (by the e*x=x rule) and e*e' = e (by the x*e'=e' rule). Thus e=e'.
 The semigroup (S,∘) from the previous section is a monoid if S contains the identity function f (for which f(x)=x for all x).
Let A^{*} be the set of all finite sequences of elements of some alphabet A. Then (A^{*},+) is a monoid (the free monoid on A), whose identity is the empty string <>.
(ℕ,+) and (ℕ,*), where + and * are the usual addition and multiplication operations, are both monoids. Note that (ℤ^{+},+) is not a monoid, because it doesn't contain the required identity element 0.
 Let A be a set and let S be the power set of A. Then (S,∪) and (S,∩) are both monoids (with identity elements Ø and A, respectively).
 Let S = { x } and let x*x=x. Then (S,*) is a monoid.
 Any semigroup can be turned into a monoid by adding a new identity element (if it doesn't have one already).
138.4. Groups
A monoid (S,*) is a group if for each a and b in S, there are solutions x and y to the equations ax=b and ya=b. This fact is equivalent to the existence of a unary inverse operation taking x to x^{1} (or x when the binary operation is written as +), where x^{1}x=xx^{1}=e. The existence of an inverse operation can be derived from the more fundamental definition by proving a sequence of properties of groups that are interesting in their own right:
 Let y∈S. If there exists any x∈S such that xy=x or yx=x, then y=e. (In other words, any y that ever acts like the identity is the identity; this is not true in general in monoids.) Proof: Suppose xy=x; the other case is symmetric. We will show that y = ey = e. Let q be a solution to qx=e. Then y = ey = (qx)y = q(xy) = qx = e.
If xy = e, then yx = e. (This says that if y is a right inverse of x, it is also a left inverse.) Proof: Let xy = e, and observe that yxy = ye = y. Now let q be a solution to yq=e. Then (yxy)q = yq, but (yxy)q = (yx)(yq) = yx and yq = e, so we have yx = e.
 If xy = e and xy' = e, then y = y'. (I.e., right inverses are unique.) Proof: Consider yxy'. Grouping the operations as y(xy') we get yxy' = y(xy') = ye = y. Grouping them the other way gives yxy' = (yx)y' = ey' = y'. So we have y = y'.
It follows that if xy=e, then yx=e and y is uniquely defined by x. Thus the inverse operation x^{1} is welldefined (it identifies a unique element of S satisfying the required property xx^{1} = x^{1}x = e). The inverse of the identity is always the identity, since e^{1} = e^{1}e = e.
Note that if we start with an inverse operation, we can easily solve ax=b or ya=b by computing a = axx^{1} = bx^{1} or a = y^{1}ya = y^{1}b.
Examples of groups:
ℤ, ℚ, and ℝ are all groups with the binary operation +, but not with the binary operation * (0 has no inverse). ℚ{0} and ℝ{0} (sometimes written ℚ^{*} and ℝ^{*} in this context) are groups with respect to *; ℤ{0} with multiplication is still not a group (only 1 and 1 have inverses). This is a special case of a general method for extracting a group from a monoid (see below).
Let ℤ_{m} be the quotient set of the equivalence relation a~b if a=b (mod m), and define an addition operation on ℤ_{m} by the rule <a> + <b> = <a+b>. Then ℤ_{m} is a group, called the integers mod m.
Let ℤ^{*}_{m} be the elements of ℤ_{m} whose representatives are relatively prime to m. Then (ℤ^{*}_{m},*) is a group.
Let A be a set, and let S be the set of all bijections from A to A. Then (S,∘) is a group, called the permutation group on A.
Let A be a set of symbols, and let S consist of all finite sequences s in which each position has the value x for some x in A, or x^{1} for some x in A, and neither x,x^{1} nor x^{1},x appear consecutively in s. Define a group operation by concatenation followed by the removal of consecutive xx^{1} and x^{1}x pairs. The resulting algebra is a group, called the free group on A.
Let S = {x} and let x*x=x. Then (S,*) is a group, with identity x and x^{1}=x.
The set of n×m matrices over ℝ (in general, over any field—see below for the definition of a field) is a group under addition. The set of invertible n×n matrices is a group under multiplication. If we don't require invertibility, we only get a monoid.
Given any monoid M, the set M^{*} of invertible elements of M is a group, where an element x is invertible if there exists some element x^{1} such that xx^{1} = x^{1}x = e. Examples include ℚ^{*} = ℚ  { 0 }, ℝ^{*} = ℝ  { 0 }, and, for each n, the group of invertible n×n matrices. A less interesting example is ℤ^{*} = { 1, 1 }. The proof that the invertible elements form a group depends on the fact that if a and b are both invertible, so is ab, since ab(b^{1}a^{1}) = (b^{1}a^{1})ab = e. This doesn't work in general in semigroups, because without associativity we can't necessarily regroup ab(b^{1}a^{1}) = a(bb^{1})a^{1} = (ae)a^{1} = aa^{1} = e. Note that we didn't need to use anything in the proof that ab has an inverse beside the group axioms; so this is an example of the sort of very general proof that can be done by using powerful enough abstractions.
Groups are about the weakest algebraic structure that allow calculations similar to what we expect with ordinary arithmetic: we can add and subtract, solve for unknown variables, etc. Note that the operation in a group does not have to be commutative: it may be that xy ≠ yx for some x and y. For example, in the permutation group on three elements, the function that swaps the first two elements and the function that swaps the last two elements do not commute: 123 → 213 → 231 does not give the same result as 123 → 132 → 312. Similarly, matrix multiplication is in general not commutative.
138.5. Abelian groups
If a group is commutative, which means that xy=yx for all x and y, then it is an abelian group (after Niels Henrik Abel, a 19thcentury Norwegian mathematicianbut by convention spelled with a lowercase "a" despite its etymology).
All of the groups listed previously except the permutation group (on three or more elements) and the free group are abelian. By convention, the binary operation in an abelian group is often (but not always) written as +.
For more on the structure of groups and abelian groups, see GroupTheory.
139. Operations on algebras
Like sets or graphs, we can define operations that connect one algebra to another or allow us to construct new algebras. When considering multiple algebras, we generally assume that all share the same set of operations (or at least operations with the same names and arities). Most operations on an algebra are defined in terms of operations on the carrier (the set of elements of the algebra).
139.1. Subalgebras
A subalgebra of an algebra A is obtained by taking a subset S' of the carrier that is closed under all operations of the algebra; i.e. for any nary operation f, f(x_{1}, ..., x_{n}) is in S' if all the x_{i} are. If B is a subalgebra of A, we write B⊆A, as with subsets.
For specific classes of algebras (such as semigroups, monoids, groups, or abelian groups), any axioms satisfied by the parent algebra are inherited by its subalgebras: e.g., if xy = yx in A, then xy = yx in B⊆A.
One important way to get a subalgebra is the subalgebra generated by a particular element or set of elements. This is the smallest subalgebra of a given algebra that includes the specified elements (which are called generators); formally, this is defined by taking the intersection of all subalgebras that contain the generators. (The proof that taking the intersection of subalgebras gives a subalgebra is left as an exercise.)
Examples:
 Let A and B be sets, which we can think of as algebras with no operations. The B is a subalgebra of A iff B is a subset of A.
Let A be the semigroup (ℕ,+), and let B = { x  x > 137 and x = 3k for some k in ℕ }. Then B is a subsemigroup of A.
Let A be the monoid (ℤ,*), and let B be the monoid (ℤ^{+},*). Then B is a submonoid of A. Note that 1 has to be present in B for it to be a submonoid, or else B is not closed under the (0ary) identity operation.
 Let A be the group (ℤ,+), and let S' be the set of all even integers. Then B = (S',+) is a subgroup of A.
 Let A be the group (ℤ,+), and let B be the subalgebra of A generated by 2. Then B is precisely the subgroup described in the previous example.
 Let A be the free monoid over { a, b, c }, and let B be the subalgebra generated by aaa. Then B consists of all strings of k a's where k is a nonnegative multiple of 3.
139.2. Homomorphisms
A function from the carrier of A to the carrier of B is a homomorphism, written f:A→B, if for any nary operation g, g(f(x_{1}), ..., f(x_{n})) = f(g(x_{1}, ..., x_{n})). Note that the g on the lefthand side is B's version of g and the g on the righthand side is A's. If this equation holds for a particular operation g, f is said to preserve g. A homomorphism preserves all operations.
Examples:
 Any function f:A→B on sets is a homomorphism, since it preserves all none of the operations on sets.
 The composition g∘f of two homomorphisms f:A→B and g:B→C is a homomorphism from A to C.
 Let A be the free magma over a set S and let B be the free semigroup over the same set S. Define f:A→B by f(x) = x whenever x is in S, and f(xy) = f(x)f(y) otherwise. Then f is a homomorphism (immediately from the definition). The effect of f is to "flatten" trees into an ordered list of their leaves.
Let A be the free semigroup over S and let f(x) = 1 for x in S and f(xy) = f(x)+f(y) otherwise. Then f is a homomorphism from A to (ℤ^{+},+).
Consider the function ℤ → ℤ_{m} defined by f(x) = x mod m. Then f is a homomorphism from the additive group of the integers (ℤ, +, 0, ) to ℤ_{m}.
 Consider the function f:ℤ→ℤ defined by f(x)=cx for some constant c. Then f(x+y) = c(x+y) = cx + cy = f(x) + f(y), f(0) = c*0 = 0, and f(x) = c*(x) = (cx) = f(x): f is a group homomorphism from ℤ to ℤ.
In the last case the image of f, defined as f(A) = { f(x)  x in A }, is a subgroup of the codomain ℤ. This turns out always to be the case for images of algebra homomorphisms:
 Theorem 1
 Let f:A→B be an algebra homomorphism. Then f(A) is a subalgebra of B.
 Proof
To show that f(A) = { f(x)  x in A } is a subalgebra of B, we need to show that it is closed under every operation of B. Let g be an nary operation of B, and consider g(y_{1}, ..., y_{n}) where each y_{i} is in f(A). Because each y_{i} is in f(A), there exists some x_{i} such that y_{i} = f(x_{i}). So we can rewrite g(y_{1}, ..., y_{n}) as g(f(x_{1}), ..., f(x_{n,)) = f(g(x}1_{, ..., x}n)) ∈ f(A). (The equality holds because f is a homomorphism.)
As with graphs, homomorphisms on algebras give rise to isomorphisms (bijective homomorphisms, the inverses of which will also be homomorphisms) and automorphisms (isomorphisms between an algebra and itself). Every algebra has at least one automorphism, the identity homomorphism that maps every element to itself. An injective homomorphism is called an embedding (sometimes imbedding); any embedding f of A into B gives an isomorphism between A and B's subalgebra f(A).
More examples:
Recall that the free magma on S consists of all binary trees with leaves in S. Let's call this free magma T (for tree). Consider the magma of nonempty LISP lists with atoms in S and the cons operation, defined by x cons (y_{1} ... y_{k}) = (x y_{1} ... y_{k}); we'll call this one L (for LISP). Define f:T→L by the rule f(s) = (s) when s∈S and f(T_{1}T_{2}) = f(T_{1}) cons f(T_{2}). Then f is clearly a homomorphism. But we can show that it is in fact and isomorphism, by defining f^{1}((x)) = x (for length1 lists) and f^{1}((x y_{1} ... y_{k})) = f^{1}(x)f^{1}((y_{1} ... y_{k})) (for length2 and longer lists). It's not hard to verify that that f^{1}(f(t)) = t for any tree t. If we allow empty binary trees and empty lists, we similarly get an isomorphism between two slightly larger magmas.
Let A be the free monoid on a singleelement set S, and define f(a^{n}) = n. Then f is a monoid isomorphism between A and (ℕ,+); its inverse is f^{1}(n) = a^{n}. Conversely, if M is a free monoid and g(n) = a^{n} for any element a of M, then g is an embedding of (ℕ,+) into M.
Let f:ℕ→ℕ be defined by f(n) = 3^{n}. Then f is a monoid embedding of (ℕ,+) into (ℕ,*), since (a) f is a homomorphism: f(a+b) = 3^{a+b} = 3^{a}3^{b} = f(a)f(b) and f(0) = 3^{0} = 1; and (b) f is injective. It's not an isomorphism because it doesn't have an inverse.
Let f:ℝ→ℝ^{+} be defined by f(x) = 3^{x}, where ℝ^{+} = { x∈ℝ  x > 0 }. Now f is an isomorphism between the groups (ℝ,+) and (ℝ^{+},*). Proof: f(a+b) = 3^{a+b} = 3^{a}3^{b} = f(a)f(b), f(0) = 3^{0} = 1, f(a) = 3^{a} = (3^{a})^{1} = f(a)^{1}, and log_{3}(3^{x}) = x shows that log_{3} gives an inverse for f.
139.3. Free algebras
We've seen examples of various kinds of algebras that have been called "free", such as free magmas, free semigroups, etc. There is in fact a single definition of a free algebra (from a particular class of algebras) that produces each of these specific free algebras.
The essential idea of a free algebra A over a set S is that (a) it contains all the elements of S, (b) it contains g(x_{1}, ..., x_{n}) for any nary operation g whenever x_{1},...,x_{n} are in A (which is just the closure requirement), and (c) for particular x_{i} and x'_{i}, g(x_{1},....,x_{n}) = g(x'_{1},...,x_{n}) only if required by the axioms.
So in a free magma, x(yz) is never equal to (xy)z, no matter what values x, y, and z have. In a free semigroup, x(yz) = (xy)z, always, because of the associativity axiom, but xy is never equal to x for any x and y, xy is never equal to yx, etc. In a free monoid, xe = ex = x, but xy is never equal to x unless y = e, and so forth.
The formal definition that yields these properties is this:
Let C be a class of algebras, where the names and arities of the operations are the same for all algebras in the class, and let S be a set. Then a free algebra in C over S, written F(S) or F_{C}(S), is an algebra in C such that (a) S is a subset of the carrier of F(S), and (b) for any algebra B in C, and any function from S to the carrier of B, there is a unique homomorphism f^{*} from F(S) to B such that f^{*}(x) = f(x) for any x in S. (In this case f is said to lift to f^{*}; another way of expressing this is that f is a subset of f^{*} when both are viewed as sets of ordered pairs.)
How does this definition yield all the specific cases of free algebras? Let's take free monoids as an example. Recall that a free monoid F(S) over S consists of all finite sequences of elements of S, with + = concatenation and 0 = the empty sequence. It's trivially the case that S is a subset of the carrier of F(S) (assuming we identify single elements with oneelement sequences). Now let's show that any function f from S to the carrier of some semigroup B lifts to a unique f^{*} from F(S) to S.
Define f^{*}(x_{1}...x_{k}) = f(x_{1})f(x_{2})...f(x_{k}). It is easy to see that f^{*} is a (monoid) homomorphism, and that f^{*}(x) = f(x) when x is in S. Now let g be any other monoid homomorphism from F(S) to B such that g(x) = f(x) for any x in S. We'll show that for sequence s=x_{1}...x_{k} in F(S), g(s) = f^{*}(s), by induction on the length k of s. The cases k=0 and k=1 are the base cases. For k=0, g(<>) = f^{*}(<>) = the identity of B because both g and f^{*} are monoid homomorphisms (and therefore must preserve the identity). For k=1, we have g(x_{1}) = f(x_{1}) = f^{*}(x_{1}) by the requirement that g(x) = f(x) when x in S. For k > 1, we have g(x_{1}...x_{k1}x_{k}) = g(x_{1}...x_{k1})g(x_{k}) = f^{*}(x_{1}...x_{k1})f^{*}(x_{k}) = f^{*}(x_{1}...x_{k1}x_{k}).
Note that there may be more than one way to define a free algebra. For example, we could define the free monoid over S by setting + to be reverse concatenation: xyz+abc = abcxyz. This again gives sequences of elements of S, but to translate them back to the previous definition we have to reverse the sequences. Fortunately this reversal operation is an isomorphism between the two monoids, and in general we can show that any free algebra for a given class with a given base set is unique up to isomorphism, which means that while there may be more than one such algebra, there is only one isomorphism equivalence class.
 Theorem 2
 If F and G are free algebras over S in a class C, then F and G are isomorphic.
 Proof
The proof is by repeated application of the uniqueness of f^{*}:F(S)→A for any f:S→A.
Let f:S→G be defined by f(x)=x. Then there is a unique homomorphism f^{*}:F→G.
Similarly, let g:S→F be defined by g(x) = x. Then there is a unique homomorphism g^{*}:G→F.
We will now show that g^{*}=(f^{*})^{1}. Consider the homomorphism h=g^{*}∘f^{*}. For any x in S, we have h(x) = g^{*}(f^{*}(x)) = g(f(x)) = x. So h is a homomorphism from F to F, such that for any x in S, h(x)=x. Since F is a free algebra, h is unique among all such homomorphisms: if somebody shows up with another homomorphism h':F→F with h'(x) = x for all x in S, then h'=h. Now out of the box let us pull I_{F}:F→F, the identity homomorphism on F defined by I_{F}(x)=x for all x in F. Clearly I_{F}(x)=x for all x in S, so I_{F}=h. It follows that g^{*}∘f^{*} is the identityi.e., that g^{*} = (f^{*})^{1}. Since f^{*} is invertible and thus bijective, it's an isomorphism, and F and G are isomorphic.
The nice thing about this proof is that at no time did we have to talk about specific operations of the algebras; everything follows from the definition of a free algebra in terms of homomorphisms.
139.3.1. Applications of free algebras
The selling point for free algebras is that we can define homomorphisms just by defining what happens to elements of the underlying set S. This operation is done all the time. Some examples:
Simple Roman numerals (without the IV = VI rule). Define f(I) = 1, f(V) = 5, f(X) = 10, etc., and assert f is a homomorphism from the free semigroup on {I,V,X,...,M} to (ℤ^{+},+).
Flattening trees (homomorphism from the free magma to the free semigroup mapping each element of S to itself), counting the number of leaves in a tree (homomorphism from the free magma on S to (ℤ^{+},+) mapping each element of S to 1), or counting the total weight of the leaves of a tree (homomorphism from the free magma on S to (ℝ,+) mapping each element of S to its weight). Indeed, just about any recursive function on binary trees is an example of a magma homomorphism.
139.4. Product algebras
Let F and G be algebras with the same signatures. Then F×G is an algebra whose elements consist of a pair of one element from F and one from G (i.e., is the usual cartesian product F×G), and an operation f on (F×G)^{k} carries out the corresponding F and G operations on both sides of the ordered pairs.
Examples:
 Consider the monoids F=(ℤ,+,0) and G=(ℤ,*,1). Then elements of F×G are pairs of integers, and the binary operation (which we'll call *) adds the first elements of each pair and multiples the second: (2,3)*(6,7) = (4,21). The algebra F×G is a monoid with identity (0,1), which is itself the product of the identities of F and G.
139.5. Congruences and quotient algebras
A congruence is an equivalence relation on elements of an algebra that respects the structure of the algebra. In particular, a relation ~ is a congruence on A if
 It is an equivalence relation on elements of A, and
for any nary operation g of A, if x_{1} ~ y_{1}, x_{2} ~ y_{2}, ..., x_{n} ~ y_{n}, then g(x_{1}, x_{2}, ... x_{n}) ~ g(y_{1}, y_{2}, ... y_{n}).
An example of a congruence is the relation x~y if x and y are both even or x and y are both odd, where x and y are elements of additive group of the integers (ℤ,+,0,).
Given a congruence ~ on an algebra A, we can define a quotient algebra A/~ whose elements are the equivalence classes C of ~, and whose operations are defined by letting g(C_{1}...C_{n}) be the equivalence class of g(x_{1}...x_{n}) where each x_{i} is some element of the corresponding C_{i}. The requirements for ~ to be a congruence guarantee that this defines a unique equivalence class no matter which representatives x_{i} we pick.
For example, the oddeven congruence defined previously yields a quotient group ℤ/~ = ℤ_{2}, the integers mod 2. Associated with this congruence is a homomorphism that maps each integer to one of the two elements 0 or 1 of ℤ_{2}, depending on whether it is even (0) or odd (1). This is not surprising; in fact, there is always such a homomorphism from any algebra to any of its quotient algebras.
 Theorem 3
 If ~ is a congruence on A, then the function f mapping each x in A to its equivalence class in A/~ is a homomorphism.
 Proof
We need to show that g(f(x_{1})...f(x_{n})) = f(g(x_{1}...g_{n})) for each nary operation g and sequence of arguments {x_{i}}. For each i let C_{i} = f(x_{i}) be the equivalence class of i under ~; by the definition of operations in A/~ we have g(C_{1}...C_{n}) is the equivalence class of g(x_{1}...g_{n}) = f(g(x_{1}...g_{n})).
The preceding theorem tells us we can map A onto A/~ via a homomorphism. There is a sense in which we can go the other way: given any homomorphism f:A→B, we can define a congruence ~ on A by x~y if f(x)=f(y). This congruence is called the kernel of f. (Note: in GroupTheory, the kernel is defined differently, as the subgroup Ker f of A given by f^{1}(e). The relation between the kernelassubgroup and the kernelascongruence is that in a group we can define a congruence a~b iff ab^{1} is in Ker f, which turns out to be equivalent to the definition f(a)=f(b) for algebras in general.)
 Theorem 4
 Let f:A→B be a homomorphism, and let ~ be the kernel of f. Then ~ is a congruence.
 Proof
It is easy to see that ~ is an equivalence relation, so we will concentrate on showing that x_{i}~y_{i} implies g(x_{1}...x_{n})~g(y_{1}...y_{n}) for any {x_{i}}, {y_{i}}, and g. Pick some particular x_{i}, y_{i}, and g; then we have f(x_{i})=f(y_{i}) (from the definition of the kernel) and so f(g(x_{1}...x_{n}))=g(f(x_{1})...f(x_{n}))=g(f(y_{1})...f(y_{n}))=f(g(y_{1})...g(y_{n})), which implies g(x_{1}...x_{n})~g(y_{1})...g(y_{n}).
We have previously observed that the image of a homomorphism is a subalgebra of its codomain. This subalgebra turns out to be isomorphic to the quotient algebra of the domain by the kernel of the homomorphism:
 Theorem 5 (First Isomorphism Theorem)
 Let f:A→B be a homomorphism, and let ~ be the kernel of f. Then A/~ is isomorphic to f(A).
 Proof
Define h:(A/~)→B by setting h(C) = f(x), where x is any element of C. Note that h is welldefined because each C consists precisely of all x for which f(x) is some particular element y of B. We can also define an inverse h^{1} by letting h^{1}(y) = { x  f(x) = y }, so h is a bijection. It remains only to show that it is a homomorphism. Let g be an nary operation of A/~, and let x_{1}...x_{n} be representatives of equivalence classes C_{1}...C_{n}. Then h(g(C_{1}...C_{n})) = f(g(x_{1}...x_{n})) = g(f(x_{1})...f(x_{n})) = g(h(C_{1})...h(C_{n}).
In the case that f is surjective, the theorem gives an isomorphism between A/~ and B. This is a fundamental tool in many branches of algebra.
140. Algebraic structures with more binary operations
All of the structures we have considered so far had only a single binary operation, which we usually wrote as either multiplication or addition. We now consider structures that have more binary operations. The simplest of these, rings and fields, are the natural generalization of the ways that real numbers, integers, etc. support both an addition and a multiplication operation.
140.1. Rings
A ring is a set S together with two binary operations, + and ×, called addition and multiplication (as elsewhere, they are called this because of the symbol used, even if they really do something else). Considering each of the operations separately, we require:
That (S,+) is an abelian group. In particular, there is an additive identity (usually written 0) such that x+0=0+x=x for all x in S, and for each x in S, there is an additive inverse x such that x + x = 0.
That (S,×) is a monoid. The multiplication operation is associative, and there is a multiplicative identity (usually written 1) such that x×1=1×x=x for all x in S.
In addition, a distributive law relates the two operations. For all x, y, and z, we have:
 x×(y+z) = (x×y)+(x×z) and (y+z)×x = (y×x)+(z×x).
Note the need for both equations since multiplication is not necessarily commutative.
In writing about rings, we adopt the usual convention that multiplication binds more tightly that addition and drop the multiplication operator, so that we can w, for example, yx+zx for (y×x)+(z×x).
140.1.1. Examples of rings
The integers with the usual addition and multiplication operations. These form a commutative ring, in which multiplication is commutative.
 The integers mod m, with addition and multiplication mod m
The dyadic numbersrational numbers like 27/1, 53/2, or 91/128 where the denominator is a power of two.
 The rationals.
 The reals.
The ring of polynomials in some variable x with coefficients in some commutative ring R, which is written R[x]. Addition is the usual polynomial addition, e.g. (x+3) + (x^{2}+12) = (x^{2}+x+12), and multiplication is the usual polynomial multiplication, e.g. (x+3) × (x^{2}+12) = (x^{3}+3x^{2}+12x+36). See Polynomials.
Square matrices of fixed size with coefficients in some field. We'll see more of these in AbstractLinearAlgebra, but for the moment let us just observe that they are an example of a noncommutative ring.
Formal power series of the form ∑_{i} a_{i}x^{i}, as used in the theory of GeneratingFunctions, where addition and multiplication are as defined there. These differ from ordinary polynomials in that ordinary polynomials can only have a finite number of terms.
140.1.2. Properties of rings
Though rings vary widely in their properties, some properties follow from the definition and thus hold in all rings. Two important theorems about rings are that multiplying by 0 has the effect we expect from our experience with the integers, rationals, etc., and that negation commutes with multiplication.
 Theorem
 Let R be a ring and let x be any element of R. Then 0×x=x×0=0.
 Proof
 We'll prove that 0×x=0; the other case is symmetric. The proof uses both the distributive law and the existence of 1, the multiplicative identity. Compute 0x+x = 0x+1x = (0+1)x = 1x = x = 0+x. But since addition in a ring is a group, if 0x+x = 0+x then 0x = 0.
The familiar rule that (x)y = (xy), (x)(y) = xy, etc. follows immediately from the preceding theorem:
 Corollary
 Let R be a ring and x and y any elements of R. Then (x)y = x(y) = (xy).
 Proof
 Again we will prove only the first case (x)y = (xy). It is enough for this to show that (x)y + xy = 0. Compute (x)y + xy = (x + x)y = 0y = 0. Here the first step uses the distributive law, the second uses the definition of the additive inverse, and the last uses the theoremjust provedthat 0x = 0 for all x.
140.1.3. Invertible elements and zero divisors
An element of a ring is invertible if it has a multiplicative inverse. The element 1 is always invertible, since 1*1=1, and so is 1 (although 1 may be the same element as 1, as in ℤ_{2}). The set of invertible elements is closed under multiplication: if a is invertible and b is invertible, then so is ab (its inverse is b^{1}a^{1}). Since it also contains the multiplicative identity and inverses, it's a group, called the multiplicative group of the ring. So the multiplicative groups ℤ^{*}_{m} of integers relatively prime to m are just a special case of this definition.
One way to show that an element is not invertible is to show that it's a zero divisor. An element x is a zero divisor if it divides 0, i.e. if there is some element y≠0 such that xy = 0 or yx=0. For example, in ℤ_{6}, the element 2 is a zero divisor (2*3=0). A zero divisor can't be invertible because if xy=0 and x^{1} existed, then y=x^{1}xy=x^{1}0=0. However, in many rings there are elements that are not invertible without being zero divisors, e.g. 2 in ℤ or x in ℤ[x].
140.1.4. Subrings
A subring S of a ring R is just a subset of R that is also a ring. The main thing we need to prove in order to show that this is true is that S is closed under all the ring operations.
Examples:
 ℤ is a subring of ℚ, which is a subring of ℝ, which is a subring of ℂ. Proof: 0 and 1 are in all of them; a+b is an integer if a and b are both integers, a rational if a and b are both rationals (proof: m/n + m'/n' = (mn'+nm')/(nn')), and a real if and and b are both reals; ab is similarly an integer/rational/real if a and b both are.
 The even integers (more generally, any set of the form mℤ = { mn  n∈ℤ }) is a subring of ℤ.
 The dyadics are a subring of ℚ.
 For any set of primes P, the set ℚ  { m/n  (m,n) = 1 and pn for some p∈P } is a subring of ℚ. Proof: It contains 0 and 1; and given m/n and m'/n', if p divides nn' in either their sum (mn'+m'n)/(nn') or their product (mm')/(nn') then p divides one of n or n', so it's closed under addition and multiplication.
140.1.5. Ideals and quotient rings
An ideal of a ring R is a subring S such that whenever x is in S, xy and yx are in S for any y in R. An example is the even integers, which are an ideal of the ring of integers. An example of a subring that is not and ideal is the dyadics; (1/2)(1/3) = (1/6), which is not a dyadic.
The main reason for looking at ideals is that they have the same role in rings that normal subgroups have in groups: the additive cosets in R of an ideal I yield a quotient ring R/I. This follows from the fact that as an additive subgroup, an ideal is always a normal subgroup (since addition is commutative), so (I+a)+(I+b)=I+(a+b) is welldefined; and that when we multiply (I+a)(I+b), we get II + Ib + aI + ab = I + ab since the first three terms all collapse into I. One way to remember the required properties of an ideal is that the ideal must act like 0 in the quotient ring it yields: it's an additive identity (normal subgroup) but a multiplicative annihilator (drags products into itself).
Some examples of quotient rings:
ℤ/mℤ is isomorphic to ℤ_{m}.
ℚ/ℤ, the rationals mod 1, is obtained from the rationals by keeping only the fractional part after each operation. For example, in ℚ/ℤ, 3/5 + 4/7 = (21+20)/35 = 41/35 = 1 + 6/35 = 6/35.
 ℤ₂[x]/(1+x+x²) as given below in the construction of a finite field of order 4. This is shorthand for ℤ₂[x]/(1+x+x²)ℤ₂[x], where the ideal is the set of all multiples of the polynomial (1+x+x²); the second ℤ₂[x] disappears because of the usual notational laziness.
140.1.6. Ring homomorphisms
A ring homomorphism is a function that preserves all the ring operations (this is just a special case of the usual definition of an algebra homomorphism). So in particular, given a function f:R→S, we need f(0_{R}) = 0_{S}, f(1_{R}) = 1_{S}, f(a+b) = f(a)+f(b), and f(ab) = f(a)f(b). These are pretty strong requirements, so ring homomorphisms are much rarer than, say, group homomorphisms.
Some examples of ring homomorphisms:
If R/S is a quotient ring, there is a homomorphism from R to R/S (this is true for all quotient algebras). So for example, the map f(x) = x mod m is a homomorphism from ℤ to ℤ_{m} ≈ ℤ/mℤ.
There is a homomorphism from ℚ  { m/n  (m,n) = 1 and pn } to ℤ_{p}, given by f(m/n) = (m mod p)(n mod p)^{1} when m/n is expressed in lowest terms. The tricky part here is showing that addition and multiplication are preserved. For convenience, it may help to show that reducing to lowest terms is only needed to get rid of extraneous copies of p; if a∤p, then (am mod p)(an mod p)^{1} = ama^{1}n^{1} = mn^{1} = f(am/an) [with all computations in ℤ_{p}]. So f(m/n+m'/n') = f((mn'+nm')/nn') = (mn'+nm')(nn')^{1} = mn'n^{1}(n')^{1} + nm'n^{1}(n')^{1} = mn^{1} + m'(n')^{1} = f(m/n) + f(m'/n') and f((m/n)(m'/n')) = f(mm'/nn') = mm'n^{1}(n')^{1} = (mn^{1})(m'(n')^{1}) = f(m/n)f(m'/n'), as desired.
140.2. Semirings
A semiring is like a ring, except that the addition group is replaced by a commutative monoid; alternatively, we can think of a semiring as a ring without additive inverses. The theorem in rings that 0*x=x*0=0 becomes an additional axiom (the annihilation axiom) for semirings—without inverses it is impossible to prove it from the other axioms.
An example of a semiring is the tropical semiring or maxplus semiring on ℝ∪{∞} where addition is max, multiplication is +, the additive identity is ∞, and the multiplicative identity is 0. This gives a commutative monoid for both addition (max) and multiplication (+), since max and + both commute and max(x,∞) = x, but neither operation yields a group (for the multiplication operation +, ∞ has no inverse). It also satisfies the distributive law: x+max(y,z) = max(x,y) + max(x,z); and the annihilation axiom: ∞ + x = ∞. The tropical semiring is useful for studying scheduling problems: for example, if it takes 2 years to graduate after taking CPSC 202 and 3 more years after taking MATH 112, then my graudation time is at least max(t_{202} + 2, t_{112} + 3), and the ability to manipulate complicated expressions involving max and + may help me plan out more difficult tasks.
For more examples of semirings see Semiring.
140.3. Fields
If the nonzero elements of a commutative ring form an abelian group, the ring is a field. An equivalent definition is that 1≠0 (so the group is nonempty) and every nonzero element is invertible. The most common examples in ordinary mathematics are ℚ, ℝ, and ℂ, with ℤ_{p} showing up in NumberTheory. A more exotic example is the field of rational functions F(x_{1},...x_{n},): functions of the form p/q where p and q are both polynomials with variables x_{1} through x_{n} and coefficients in F, with q≠0.
For ComputerScience, the most useful fields are the finite fields, since (being finite) they fit inside computers. There is a unique (up to isomorphism) finite field of size p^{k} for every prime p and every positive integer k. These fields are known as the Galois fields after Evariste_Galois (the guy who died from staying up all night doing his homework) and are written as GF(p^{k}). When k=1, they have a particularly simple construction; for larger values of k the Galois fields are more complicated.
The field GF(p) is just ℤ_{p} with multiplication defined mod p. We've already seen (in NumberTheory) that every nonzero element of ℤ_{p} has a multiplicative inverse; everything else follows from ℤ_{p} being a ring.
For n > 0, there is a standard construction of GF(p^{n}) based on polynomials. The idea is to start with all polynomials over ℤ_{p}, and then take remainders mod some particular polynomial to get rid of any highdegree terms. We'll do GF(2^{2}) as an example.
Step 1: Consider all polynomials in ℤ_{2}[x]: 0, 1, x, 1+x, 1+x+x^{3}, etc. Note that the only coefficients are 0 and 1, since those are the only elements we have in ℤ_{2}.
Step 2: Choose an irreducible polynomial r, one for which the equation r(x) = 0 has no solutions in ℤ_{2}. The degree (highest exponent) of this polynomial will determine the n in GF(p^{n}). We'll pick r(x) = 1+x+x^{2}. It is easy to check that r(0) = 1+0+0 = 1 and r(1) = 1+1+1 = 1, so it's irreducible.
Step 3: Let the elements of GF(p^{n}) be the residue classes mod r, i.e. the equivalence classes of polynomials where p_{1}~p_{2} if there is some polynomial q such that p_{1} = p_{2} + qr. In GF(2^{2}) this means that whenever we multiply two polynomials together and get a polynomial with an x^{2} in it, we subtract r to get rid of the x^{2}. In this way we take as representatives of the classes the polynomials that have degree at most n1; in GF(2^{2}) this will be the four polynomials 0, 1, x, and 1+x.
Addition of elements of GF(2^{2}) is done term by term, e.g. (1+x) + (x) = 1. (The x's cancel since 1+1=0 in ℤ_{2}). Multiplication is more complicated. Here's the full multiplication table:

0 
1 
x 
1+x 
0 
0 
0 
0 
0 
1 
0 
1 
x 
1+x 
x 
0 
x 
1+x 
1 
1+x 
0 
1+x 
1 
x 
Most of the entries in the table are straightforward (we know, for example, that 0*y = 0 for all y). The tricky ones are in the bottom right corner. Let's look at x*x first. This is x^{2}, which is too big, so we'll take the remainder mod x^{2}+x+1, which in this case means computing x^{2}(x^{2}+x+1)=x+1 (remember we are in ℤ_{2} where 01=1). Similarly we can compute (1+x)*(1+x) = 1 + 2x + x^{2} = 1+x^{2} = 1+x^{2}(1+x+x^{2}) = x. For x(1+x) we have x(1+x) = x+x^{2} = x+x^{2}(1+x+x^{2}) = 1.
This construction is a special case of a more general technique called field extension, where one makes an existing field (ℤ_{2} in this case) bigger by tacking on an extra member (x) that satisfies some polynomial equation not satisfied by any element of the old field (1+x+x^{2}=0). Another example of the same technique is the construction of the complex numbers from the reals by taking ℝ and adding a new element i that satisfies 1+i^{2}=0. Our operation of replacing x^{2} with x+1 in GF(2^{2}) is the equivalent in that field of replacing i^{2} with 1 in the complex numbers. The fact that we can get away with this in each case can be justified formally by sufficient handwaving about free rings and quotients.
Note that the structure of GF(2^{2}) is very different from ℤ_{4}, which isn't a field (since 2*2 = 0 mod 4). Even the additive group of GF(2^{2}) is not the same as ℤ_{4}; there is no single element, for example, that generates the entire additive group. This is typical of GF(p^{n}), whose additive group in general will look like the product of n copies of ℤ_{p}, and whose multiplicative group will be terribly tangled up.
For more on finite fields see http://mathworld.wolfram.com/FiniteField.html or Chapter 23 of BiggsBook.
 Exercise
 Which of the examples of rings given previously are also fields?
140.3.1. Subfields and homomorphisms
Subfields are fairly common. For example, ℚ is a subfield of ℝ which is in turn a subfield of ℂ. Among finite fields, GF(p) is a subfield of GF(p^{n}) for any n (consider the set of polynomials with only a constant term).
Field homomorphisms are much less common; indeed, we can prove that all homomorphisms between fields are injective (giving an embedding—a bijection between the domain and some subfield of the codomain). Proof: Let f:X→Y be a field homomorphism and suppose that f is not injective; i.e., that f(x)=f(y) for some x≠y. Then f(xy) = f(x)f(y) = 0. But since x≠y, xy has an inverse (xy)^{1}, and so f(1) = f((xy)(xy)^{1}) = f(xy)f((xy)^{1}) = 0⋅f((xy)^{1}) = 0 ≠ 1, contradicting the requirement that f maps 1 to 1. It follows that any homomorphic f is injective.
140.4. Vector spaces
A vector space is not, strictly speaking, an algebraic structure of the sort we have defined previously, as it involves two classes of objects: scalars, which are elements of some field, and vectors, which are elements of some abelian group, written additively. In addition to their own field and group operations, scalars and vectors are connected by an operation called (rather confusingly) scalar multiplication that multiplies a scalar by a vector to produce another vector. Scalar multiplication must satisfy the following axioms, where normal letters represent scalars and boldfaced letters represent vectors:
a(bx) = (ab)x: scalar multiplication is associative with multiplication of scalars.
1x = x: the multiplicative identity 1 in the scalar field is also an identity for scalar multiplication.
a(x+y) = ax+ay: scalar multiplication distributes over vector addition.
(a+b)x = ax+bx: scalar multiplication distributes over scalar addition.
The distributive laws imply further properties like 0x = 0 or (1)x = x; the proofs are essentially the same as in a field. Note that the two zeroes and the two negations in these formulas are different; on the lefthand side we are in the scalar field (or its additive group), and on the righthand side we are in the vector space (thinking of it as a group).
When writing about vector spaces, the vectors have the starring role, and we think of a vector space V as consisting of the set of vectors, with the field of scalars often assumed to be some standard field like the reals or the complex numbers. (If we want to emphasize that the scalar field for some particular vector space V is F, we say that V is a vector space over F.) The original motivation for vectors was directions in (real, Euclidean, physical) space: in pirate terms, vector x might representing walking one pace North, vector y might represent walking three paces East, and vector 9x+12y might represent walking 9 paces north then 12*3=36 paces East in order to find the buried treasure. The assumption that vector addition is abelian says that it doesn't matter if we walk the 9x vector or the 12y vector firstthis assumption may or may not world in the real world of treasure islands full of traps and pitfalls, but we should get to the same place either way in an idealized space without obstacles. The properties of vector multiplication follow from the intuition that multiplying by a scalar is "scaling" the vectorstretching it or shrinking it in its original direction by some factor determined by the particular scalar we choose.
If we replace the scalar field with a scalar ring, we get a more general structure called a module. We won't talk about these much.
For calculational purposes, we often think of vectors as sequences of coordinates, where each coordinate is an element of the field the vector space is defined over. Adding two vectors involves adding their coordinates componentwise, e.g. (1,2,3) + (30,20,10) = (31,22,13), and scalar multiplication also multiplies componentwise, e.g. 3(1,2,3) = (3,6,9). The length of each sequence is the dimension of the vector space. This approach can be taken in any vector space that has a finite basis: details are given in AbstractLinearAlgebra.
Some other examples of vector spaces:
 Any field F is a vector space over itself. The vectors are identical to the scalars, and vector multiplication is just the usual multiplication operation in the field.
 The set of functions from some fixed set S to a field F is a vector space over F, with f+g defined by (f+g)(x) = f(x)+g(x), af by (af)(x) = a*f(x), etc. Special cases of this for restricted classes of functions include random variables with values in F, continuous functions from the reals to the reals, etc.
 The ring of polynomials F[x], where F is a field, is a vector space over F with the obvious interpretation of scalar multiplication.
140.4.1. Homomorphisms of vector spaces
A homomorphism between two vector spaces over the same field is a homomorphism between the groups of vectors that also preserves scalar multiplication. In particular, this means that
For any x and y, f(x+y) = f(x)+f(y).
For any x, f(x) = f(x).
f(0) = 0.
For any x and scalar a, f(ax) = a*f(x).
Such homomorphisms are called linear transformations or linear maps. Linear transformations between finitedimensional vector spaces can be represented by matrices (more on this in AbstractLinearAlgebra).
140.4.2. Subspaces
A subspace of a vector space is just a subgroup of the group of vectors that is closed under scalar multiplication, i.e. a set V'⊆V such that x+y, x, and ax are in V' whenever x and y are, where a is any scalar. Subspaces also have an important role in AbstractLinearAlgebra and will be discussed further there.
141. Polynomials
A polynomial in a variable x over a commutative ring R is an expression of the form
Note that a polynomial only has finitely many terms—with infinitely many terms, we get a formal power series (see GeneratingFunctions).
In any polynomial, the values a_{i} are called the coefficients of the polynomial and each a_{i} in particular is the coefficient of x^{i}. The variable x generally has no role except to act as a hatrack for exponents, although we can evaluate a polynomial by substituting a particular element of R for x. Evaluation turns a polynomial into a function from R to R, but we consider polynomials with different coefficients to be different even if they yield the same function (this usually only happens when R is finite, e.g. in ℤ_{2}[x] the polynomials x, x^{2}, x^{3}, x + x^{2} + x^{37}, etc. all give the same function but are still treated as distinct polynomials).
The set of all polynomials in x over R is written R[x]. It satisfies all the axioms of a commutative ring, where addition is defined by (p+q)_{i} = p_{i} + q_{i} and multiplication is defined by
an operation on sequences known as convolution. The intuition behind this definition is that we can obtain a term x^{i} as the product of terms x^{j} x^{ij} for any j with 0 ≤ j ≤ i since the exponents add, and the sum just collects the coefficients of all such terms.
Given a polynomial p(x), the largest exponent of any term with a nonzero coefficient is called the degree of a polynomial; this is often abrreviated as deg(p(x)). The nonzero coefficient in question is called the leading coefficient of the polynomial. A nonzero constant polynomial has degree 0. It is sometimes convenient to assign the zero polynomial degree 1 or ∞, but as the behavior of the zero polynomial is messy it is usually safer just to leave its degree undefined.
It is not hard to show that for nonzero p and q, deg(p+q) ≤ max(deg(p), deg(q)) and deg(pq) ≤ deg(p) + deg(q). The second inequality becomes an equality if R is a field. The reason is that the leading coefficient of pq is the product of the leading coefficients of p and q, and in a field a product can't be zero unless one of its factors is zero. It follows that polynomials over a field do not form a field, as multiplying any polynomial p of degree 1 or higher by any other polynomial q gives a product pq with deg(pq) ≥ 1, implying pq ≠ 1: p has no multiplicative inverse. However, we will be able to construct fields as quotient rings of rings of polynomials.
142. Division of polynomials
Just like we can divide integers to get a quotient and remainder, we can also divide polynomials over a field. The division algorithm looks suspiciously like long division, which is not terribly surprising if we realize that the usual base10 representation of a number is just a polynomial over 10 instead of x. That the division algorithm for polynomials works and gives unique results follows from a simple induction argument on the degree.
Let a and b be polynomials in F[x], where F is some field. We want to find q and r such that a = bq + r and deg(r) < deg(b) (or r = 0 if deg(b) = 0—this is where it is convenient to define deg(0) as some negative quantity). It's not hard to see that deg(q) will be exactly deg(a)  deg(b) if this quantity is nonnegative, since deg(bq) = deg(q) + deg(b) and deg(r) is less, preventing it from knocking out the leading coefficient of bq. On the other hand, if deg(a) < deg(b), then q = 0 and r = a is the unique solution to a = bq+r, as for any nonzero q we would get deg(a) ≥ deg(b). This forms the basis of an inductive argument on deg(a) that there is always a unique q and r for any a and b.
Suppose deg(a) ≥ deg(b), and let the leading term of a be a_{n}x^{n} and b be b_{m}x^{m}. Then a_{n} = q_{mn}b_{m} since the sum defining a_{n} will contain only the product of the leading terms of b and q. We can thus solve for the unique leading coefficient q_{mn} = a_{n}(b_{m})^{1}. To obtain the rest of q, let a' = a  b q_{mn} x^{mn}; this new polynomial a' has degree less than a, so by the induction hypothesis there is a unique q' and r' with deg(r') < deg(b) such that a' = bq' + r'. But then a = b(q_{mn}x^{mn} + q') + r' gives the desired unique solution to a = bq+r.
Example: Let F = ℤ_{5} and let a = 4x^{2} + 2x + 1 and b = 3x + 4. What are q and r? We have q_{1} = 4⋅3^{1} = 4⋅2 = 3. Subtracting q_{1}x^{1}b = 3xb from a gives a' = (4x^{2} + 2x + 1)  3x(3x + 4) = (4x^{2} + 2x + 1)  (4x^{2} + 2x) = 1. This has degree less than deg(b), so we are done: 4x^{2} + 2x + 1 = (3x + 4)(3x) + 1, which we can verify by multiplying out 3x⋅3x + 4⋅3x + 1 = 9x^{2} + 12x + 1 = 4x^{2} + 2x + 1.
143. Divisors and greatest common divisors
A polynomial d(x) is a divisor of a polynomial p(x) if there exists some polynomial q(x) such that d(x)q(x) = p(x). A greatest common divisor of two polynomial p(x) and p'(x) is a common divisor d(x) such that any other d'(x) that divides both p(x) and p'(x) also divides d(x). Outside of ℤ_{2}[x], a greatest common divisor of two polynomials is not unique, as the fact that our coefficients are all in a field means that if d(x)p(x) then ad(x)p(x) for any nonzero field element a (compute from p(x) = d(x)q(x) that p(x) = (ad(x))(a^{1}q(x))). However, it is possible to show using a version of the Euclidean algorithm (see NumberTheory) that a greatest common divisor of any two polynomials p(x) and p'(x) exists and is unique up to multiplication by nonzero constants (see BiggsBook §22.6). We can go one step further: the extended Euclidean algorithm also works for polynomials, and yields for each p(x), p'(x), and gcd d(x) of p(x) and p'(x) polynomials a(x) and a'(x) such that d(x) = a(x)p(x) + a'(x)p'(x).
144. Factoring polynomials
As with integers, to factor a polynomial p is to find polynomials p_{1}, p_{2}, ... p_{k} such that p = p_{1}p_{2}⋯p_{k}. For polynomials, the role of primes in integer factorization is taken by irreducible polynomials, where a polynomial p is irreducible if p(x) = a(x)b(x) holds only if at lest one of a(x) or b(x) has degree zero. Because the extended Euclidean algorithm works for polynomials, the same proof used to prove unique factorization for integers also works for polynomials except for the messy detail of being able to multiply factors by nonzero constants. But if we restrict our attention to monic polynomials—those whose leading coefficient is 1—then we do in fact get a unique factorization (up to reordering of factors) of each monic polynomial into monic irreducible polynomials.
Which polynomials are irreducible and how polynomials factor depends on the underlying field. In ℤ_{2}, the polynomial x^{2}+x+1 is irreducible: it's not equal to x(x+1) = x^{2}+x or x⋅x = x^{2}, and there are no other degree1 polynomials to work with. It's also irreducible over both ℚ and ℝ, since if it factors as (x+a)(x+b), then a and b are both solutions to x^{2}+x+1 = 0, and the quadratic formula gives solutions
and there is no √(3) in ℚ or ℝ. But it ceases to be irreducible in the field of complex numbers ℂ, since ℂ contains √(3) = i√3. In fact, no polynomial of degree greater than 1 is irreducible in ℂ: this is why mathematicians invented the complex numbers.
To take a different example, x^{2} + 1 is not irreducible over ℤ_{2}, since (x+1)(x+1) = x^{2} + 2x + 1 = x^{2}+1 (mod 2). But it is irreducible in ℚ and ℝ since neither contains i = √(1), and it factors differently as (x+i)(xi) in ℂ.
One familiar fact about polynomials that we've been implicitly using is the following handy theorem, which holds no matter what field we are working in:
 Theorem
 Let p(x) be a nonzero polynomial over a field F. Then p(x) has a divisor (xa) if and only if p(a) = 0.
 Proof
 The only if direction is easy: if p(x) = (xa)q(x), then p(a) = (aa)q(a) = 0⋅q(a) = 0. For the if direction, suppose p(a) = 0, and apply the division algorithm to obtain q(x) (a polynomial) and r (a constant) such that p(x) = (xa)q(x) + r. Then 0 = p(a) = (aa)q(x) + r = 0⋅q(x) + r = r. In other words, r = 0 and p(x) = (xa)q(x) as claimed.
This can quickly be used to show that a polynomial is not irreducible: e.g. p(x) = x^{4} + 3x^{2} + 3x + 1 is not irreducible in ℤ_{5} because p(2) = 0 (check it and see). It follows from the theorem that (x2) = (x+3) divides p(x). However, it is possible for a polynomial to never evaluate to zero and still not be irreducible: a simple example in ℤ_{2}[x] would be x^{4 + x}2^{ + 1 = (x}2+x+1)(x^{2}+x+1) and in ℝ[x] would be x^{4} + 2x^{2} + 1 = (x^{2}+1)(x^{2}+1). In both cases the big polynomial never evaluates to zero because none of its factors ever do. However, this can only happen to polynomials that have no degree1 factors, so looking for zeros is a good test of irreducibility for polynomials of degree 3 or less.
145. The ideal generated by an irreducible polynomial
Suppose p(x) is a polynomial in F[x] for some field F. Then I(p(x)) = { a(x)p(x)  a(x) ∈ F[x] } is an ideal of the ring F[x]. (Recall from AlgebraicStructures that I(p(x)) is an ideal of F[x] if it's a subring of F[x] such that for all b(x) in I(p(x)) and c(x) in F[x], b(x)c(x) is in I(p(x)).) Clearly I(p(x)) is a subring, since a(x)p(x) + a'(x)(x) = (a(x)+a'(x))p(x) is a multiple of p(x) and a(x)p(x)⋅a'(x)p(x) is also a multiple of p(x). But it's also an ideal, since multiplying any b(x) by some a(x)p(x) yields b(x)a(x)⋅p(x) ∈ I(p(x)). It follows that there is a quotient ring F[x]/I(p(x)), usually written simply as F[x]/p(x), in which the elements are the residue classes of polynomials modulo p(x) and two polynomials are in the same residue class if and only if they differ by a multiple of p(x).
Another way of describing these residue classes is that each consists of all polynomial a(x) that yield the same remainder r(x) when divided by p(x)just like what happens in ℤ_{m} = ℤ/mℤ, another quotient ring obtained from an ideal generated by a single element. It follows that we can represent each one by a distinct r(x) with deg(r(x)) < deg(p(x)).
If p is irreducible, something very exciting happens in this quotient ring—analogous to what happens in ℤ_{p} = ℤ/pℤ when p is prime. Each nonzero r(x) with deg(r) < deg(p) has 1 as a greatest common divisor with p, for any constant divides 1 (1 = cc^{1}) and any nonconstant can't divide both p and r since p is irreducible. It follows from the extended Euclidean algorithm for polynomials that there exist r' and p' such that rr' + pp' = 1, or in other words that rr' is congruent to 1 mod p. It follows that every nonzero element of F[x]/p has a multiplicative inverse: F[x]/p is a field. Since we can specify an element of F[x]/p when deg(p) = n by giving the n coefficients r_{0}, r_{1}, ..., r_{n1} of r, this field has exactly F^{n} elements.
Thus to find a finite field of p^{n} elements we can start with F = ℤ_{p} and take a quotient of F[x] with respect to some irreducible polynomial of degree n. Amazingly enough, such polynomials exist for any n. We won't prove this here but a proof is given in BiggsBook Chapter 23, which contains an extensive discussion of the construction and properties of finite fields.
We can also apply the technique of taking a quotient of F[x] with respect to an irreducible polynomials (known as field extension) to infinite fields. The most famous example is the field ℂ = ℝ[x]/(x^{2}+1); the fact that x^{2}+1 has degree 2 explains why all complex numbers can be written as twoterm polynomials a+bx (i.e. a+bi). But we can construct other fields from other irreducible polynomials, such as the field ℚ[√2] = ℚ[x]/(x^{2}2), which consists of all expressions of the form a+b√2 where a and b are rational. This is a bigger field that ℚ, but it's still much smaller than ℝ: for example, it doesn't include π or even √3.
146. FiniteFields
Our goal here is to find computationallyuseful structures that act enough like the rational numbers ℚ or the real numbers ℝ that we can do arithmetic in them that are small enough that we can describe any element of the structure uniquely with a finite number of bits. Such structures are called finite fields.
An example of a finite field is ℤ_{p}, the integers mod p (see ModularArithmetic). These finite fields are inconvenient for computers, which like to count in bits and prefer numbers that look like 2^{n} to horrible nasty primes. So we'd really like finite fields of size 2^{n} for various n, particularly if the operations of addition, multiplication, etc. have a cheap implementation in terms of sequences of bits. To get these, we will show how to construct a finite filed of size p^{n} for any prime p and positive integer n, and then let p=2.
Contents
147. A magic trick
We will start with a magic trick. Suppose we want to generate a long sequence of bits that are hard to predict. One way to do this is using a mechanism known as a linearfeedback shift register (LFSR). There are many variants of LFSRs. Here is one that generates a sequence that repeats every 15 bits by keeping track of 4 bits of state, which we think of as a binary number r_{3}r_{2}r_{1}r_{0}.
To generate each new bit, we execute the following algorithm:
Rotate the bits of r left, to get a new number r_{2}r_{1}r_{0}r_{3}.
 If the former leftmost bit was 1, flip the new leftmost bit.
 Output the rightmost bit.
Here is the algorithm in action, starting with r = 0001:
r 
rotated r 
rotated r after flip 
output 
0001 
0010 
0010 
0 
0010 
0100 
0100 
0 
0100 
1000 
1000 
0 
1000 
0001 
1001 
1 
1001 
0011 
1011 
1 
1011 
0111 
1111 
1 
1111 
1111 
0111 
1 
0111 
1110 
1110 
0 
1110 
1101 
0101 
1 
0101 
1010 
1010 
0 
1010 
0101 
1101 
1 
1101 
1011 
0011 
1 
0011 
0110 
0110 
0 
0110 
1100 
1100 
0 
1100 
1001 
0001 
1 
0001 
0010 
0010 
0 
After 15 steps, we get back to 0001, having passed through all possible 4bit values except 0000. The output sequence 000111101011001... has the property that every 4bit sequence except 0000 appears starting at one of the 15 positions, meaning that after seeing any 3 bits (except 000), both bits are equally likely to be the next bit in the sequence. We thus get a sequence that is almost as long as possible given we have only 2^{4} possible states, that is highly unpredictable, and that is cheap to generate. So unpredictable and cheap, in fact, that the governments of both the United States and Russia operate networks of orbital satellites that beam microwaves into our brains carrying signals generated by linearfeedback shift registers very much like this one. Similar devices are embedded at the heart of every modern computer, scrambling all communications between the motherboard and PCI cards to reduce the likelihood of accidental eavesdropping.
What horrifying deep voodoo makes this work?
148. Fields and rings
A field is a set F together with two operations + and ⋅ that behave like addition and multiplication in the rationals or real numbers. Formally, this means that:
Addition is associative: (x+y)+z = x+(y+z) for all x, y, z F.
There is an additive identity 0 such that 0+x = x+0 = x for all x in F.
Every x in F has an additive inverse x such that x+(x) = (x)+x = 0.
Addition is commutative: x+y = y+x for all x, y in F.
Multiplication distributes over addition: x⋅(y+z) = (x⋅y + x⋅z) and (y+z)⋅x = (y⋅x + z⋅x) for all x,y, z, in F.
 Multiplication is associative: (x⋅y)⋅z = x⋅(y⋅z) for all x, y, z in F.
There is a multiplicative identity 1 such that 1⋅x = x⋅1 = x for all x in F{0}.
 Multiplication is commutative: x⋅y = y⋅x for all x, y in F.
Every x in F{0} has a multiplicative inverse x^{1} such that x⋅x^{1} = x^{1}⋅x = 1.
Some structures fail to satisfy all of these axioms but are still interesting enough to be given names. A structure that satisfies 1–3 is called a group; 1–4 is an abelian group; 1–7 is a ring; 1–8 is a commutative ring. In the case of groups and abelian groups there is only one operation +. There are also more exotic names for structures satisfying other subsets of the axioms; see AbstractAlgebra.
Some examples of fields: ℝ, ℚ, ℂ, ℤ_{p} where p is prime. We will be particularly interested in ℤ_{p}, since we are looking for finite fields that can fit inside a computer.
If (F,+,⋅) looks like a field except that multiplication isn't necessarily commutative and some nonzero elements might not have inverses, then it's a ring (or a commutative ring if multiplication is commutatitive). The integers ℤ are an example of a commutative ring, as is ℤ_{m} for m > 1. Square matrices of fixed dimension > 1 are an example of a noncommutative ring.
149. Polynomials over a field
Any field F generates a polynomial ring F[x] consisting of all polynomials in the variable x with coefficients in F. For example, if F = ℚ, some elements of ℚ[x] are 3/5, (22/7)x^{2} + 12, 9003x^{417}  (32/3)x^{4} + x^{2}, etc. Addition and multiplication are done exactly as you'd expect, by applying the distributive law and combining like terms: (x+1)⋅(x^{2}+3/5) = x⋅x^{2}+x⋅(3/5)+x^{2}+(3/5) = x^{3} + x^{2} + (3/5)x + (3/5).
The degree deg(p) of a polynomial p in F[x] is the exponent on the leading term, the term with a nonzero coefficient that has the largest exponent. Examples: deg(x^{2}+1) = 2, deg(17) = 0. For 0, which doesn't have any terms with nonzero coefficients, the degree is taken to be ∞. Degrees add when multiplying polynomials: deg((x^{2}+1)(x+5)) = deg(x^{2}+1)+deg(x+5) = 2+1 = 3; this is just a consequence of the product leading terms producing the leading term of the new polynomial. For addition, we have deg(p+q) max(deg(p),deg(q)), but we can't guarantee equality (maybe the leading terms cancel).
Because F[x] is a ring, we can't do division the way we do it in a field like ℝ, but we can do division the way we do it in a ring like ℤ, leaving a remainder. The equivalent of the integer division algorithm for ℤ is:
 Division algorithm for polynomials
Given a polynomial f and a nonzero polynomial g in F[x], there are unique polynomials q and r such that f = q⋅g + r and deg(r) < deg(g).
The essential idea is that we can find q and r using the same process of long division as we use for integers. For example, in ℚ[x]:
x  1 ______________ x+2 ) x² + x + 5 x² + 2x  x + 5 x + 5 ======= 10
From this we get x^{2} + x + 5 = (x+2)(x1) + 10, with deg(10) = 0 < deg(x+2) = 1. We are going to use this later to define finite fields by taking F[x] modulo some wellchosen polynomial, analogously to the way we can turn ℤ (a ring) into a field ℤ_{p} by taking quotients mod p.
150. Algebraic field extensions
Given a field F, we can make a bigger field by adding in extra elements that behave in a welldefined and consistent way. An example of this is the extension of the real numbers ℝ to the complex numbers ℂ by adding i.
The general name for this trick is algebraic field extension and it works by first constructing the ring of polynomials F[x] and then smashing it down into a field by taking remainders modulo some fixed polynomial p(x). For this to work, the polynomial has to to be irreducible, which mean that p(x) = 0 if and only if x = 0, or equivalently that p can't be factored as (x+a)p' for some a and p' (which makes irreducibility sort of like being prime, and makes this construction sort of like the construction of ℤ_{p}).
The fact that the resulting object is a field follows from inheriting all the commutative ring properties from F[x], plus getting multiplicative inverses for essentially the same reason as in ℤ_{p}: we can find them using the extended Euclidean algorithm applied to polynomials instead of integers (we won't prove this).
In the case of the complex numbers ℂ, the construction is ℂ = ℝ[i]/(i^{2}+1). Because i^{2}+1 = 0 has no solution i∈ℝ, this makes i^{2}+1 an irreducible polynomial. An element of ℂ is then a degree1 or less polynomial in ℝ[i], because these are the only polynomials that survive taking the remainder mod i^{2}+1 intact.
If you've used complex numbers before, you were probably taught to multiply them using the rule i^{2} = 1, which is a rewriting of i^{2} + 1 = 0. This is equivalent to taking remainders: (i + 1)(i + 2) = (i^{2} + 3i + 2) = 1⋅(i^2+1) + (3i + 1) = 3i + 1.
The same thing works for other fields and other irreducible polynomials. For example, in ℤ_{2}, the polynomial x^{2}+x+1 is irreducible, because x^{2}+x+1=0 has no solution (try plugging in 0 and 1 to see). So we can construct a new finite field ℤ_{2}[x]/(x^{2}+x+1) whose elements are polynomials with coefficients in ℤ_{2} modulo x^{2}+x+1.
Addition in ℤ_{2}[x]/(x^{2}+x+1) looks like vector addition<<FootNote(This is not an accident; it can be shown that that any extension field acts like a vector space over its base field.): (x+1) + (x+1) = 0⋅x + 0 = 0, (x+1) + x = 1, (1) + (x) = (x+1). Multiplication in ℤ_{2}[x]/(x^{2}+x+1) works by first multiplying the polynomials and taking the remainder mod (x^{2}+x+1): (x+1)⋅(x+1) = x^{2}+1 = 1⋅(x^{2}+x+1) + x = x. If you don't want to take remainders, you can instead substitute x+1 for any occurrence of x^{2} (just like substituting 1 for i^{2} in ℂ), since x^{2}+x+1 = 0 implies x^{2} = x1 = x+1 (since 1 = 1 in ℤ_{2}).
The full multiplication table for this field looks like this:
0 
1 
x 
x+1 

0 
0 
0 
0 
0 
1 
0 
1 
x 
x+1 
x 
0 
x 
x+1 
1 
x+1 
0 
x+1 
1 
x 
We can see that every nonzero element has an inverse by looking for ones in the table; e.g. 1⋅1 = 1 means 1 is its own inverse and x⋅(x+1) = x^{2}+x = 1 means that x and x+1 are inverses of each other.
Here's the same thing for ℤ_{2}[x]/(x^{3}+x+1):

0 
1 
x 
x + 1 
x^{2} 
x^{2} + 1 
x^{2} + x 
x^{2} + x + 1 
0 
0 
0 
0 
0 
0 
0 
0 
0 
1 
0 
1 
x 
x + 1 
x^{2} 
x^{2} + 1 
x^{2} + x 
x^{2} + x + 1 
x 
0 
x 
x^{2} 
x^{2} + x 
x + 1 
1 
x^{2} + x + 1 
x^{2} + 1 
x + 1 
0 
x + 1 
x^{2} + x 
x^{2} + 1 
x^{2} + x + 1 
x^{2} 
1 
x 
x^{2} 
0 
x^{2} 
x + 1 
x^{2} + x + 1 
x^{2} + x 
x 
x^{2} + 1 
1 
x^{2} + 1 
0 
x^{2} + 1 
1 
x^{2} 
x 
x^{2} + x + 1 
x + 1 
x^{2} + x 
x^{2} + x 
0 
x^{2} + x 
x^{2} + x + 1 
1 
x^{2} + 1 
x + 1 
x 
x^{2} 
x^{2} + x + 1 
0 
x^{2} + x + 1 
x^{2} + 1 
x 
1 
x^{2} + x 
x^{2} 
x + 1 
Note that we now have 2^{3} = 8 elements. In general, if we take ℤ_{p}[x] modulo a degreen polynomial, we will get a field with p^{n} elements. These turn out to be all the possible finite fields, with exactly one finite field for each number of the form p^{n} (up to isomorphism, which means that we consider two fields equivalent if there is a bijection between them that preserves + and ⋅). We can refer to a finite field of size p^{n} abstractly as GF(p^{n}), which is an abbreviation for the Galois field of order p^{n}.
151. Applications
So what are these things good for?
On the one hand, given an irreducible polynomial p(x) of degree n over ℤ_{2}(x), it's easy to implement arithmetic in ℤ_{2}[x]/p(x) GF(2^{n}) using standardissue binary integers. The trick is to represent each polynomial ∑ a_{i} x^{i} by the integer value a = ∑ a_{i} 2^{i}, so that each coefficient a_{i} is just the ith bit of a. Adding two polynomials a+b represented in this way corresponds to computing the bitwise exclusive or of a and b: a^b in programming languages that inherit their arithmetic syntax from C (i.e., almost everything except Scheme). Multiplying polynomials is more involved, although it's easy for some special cases like multiplying by x, which becomes a leftshift (a<<1) followed by XORing with the representation of our modulus if we get a 1 in the nth place. (The general case is like this but involves doing XORs of a lot of leftshifted values, depending on the bits in the polynomial we are multiplying by.)
On the other hand, knowing that we can multiply 7 x^{2}+x+1 by 5 x^{2}+1 and get 6 x^{2}+x quickly using C bit operations doesn't help us much if this product doesn't mean anything. For ModularArithmetic, we at least have the consolation that 7⋅5 = 6 (mod 29) tells us something about remainders. In GF(2^{3}), what this means is much more mysterious. This makes it useful—not in contexts where we want multiplication to make sense—but in contexts where we don't. These mostly come up in random number generation and cryptography.
151.1. Linearfeedback shift registers
Let's suppose we generate x^{0}, x^{1}, x^{2}, ... in ℤ_{2}/(x^{4}+x^{3}+1), which happens to be one of the finite fields isomorphic to GF(2^{4}). Since there are only 2^{4}1 = 15 nonzero elements in GF(2^{4}), we can predict that eventually this sequence will repeat, and in fact we can show that p^{15} = 1 for any nonzero p using essentially the same argument as for Fermat's Little Theorem (see ModularArithmetic). So we will have x^{0} = x^{15} = x^{30} etc. and thus will expect our sequence to repeat every 15 steps (or possibly some factor of 15, if we are unlucky).
To compute the actual sequence, we could write out full polynomials: 1, x, x^{2}, x^{3}, x^{3}+1, x^{3}+x+1, ..., but this gets tiresome fast. So instead we'd like to exploit our representation of ∑ a_{i}x^{i} as ∑ a_{i}2^{i}.
Now multiplying by x is equivalent to shifting left (i.e. multiplying by 2) followed by XORing with 11001, the binary representation of x^{4} + x^{3} + 1, if we get a bit in the x^{4} place that we need to get rid of. For example, we might do:
1101 (initial value) 11010 (after shift) 0011 (after XOR with 11001)
or
0110 (initial value) 01100 (after shift) 1100 (no XOR needed)
If we write our initial value as r_{3}r_{2}r_{1}r_{0}, the shift produces a new value r_{3}r_{2}r_{1}r_{0}0. XORing with 11001 has three effects: (a) it removes a leading 1 if present; (b) it sets the rightmost bit to r_{3}; and (c) it flips the new leftmost bit if r_{3} = 1. Steps (a) and (b) turn the shift into a rotation. Step (c) is the mysterious flip from our sequence generator. So in fact what our magic sequence generator was doing was just computing all the powers of x in a particular finite field.
As in ℤ_{p}, these powers of an element bounce around unpredictably, which makes them a useful (though cryptographically very weak) pseudorandom number generator. Because highspeed linearfeedback shift registers are very cheap to implement in hardware, they are used in applications where a preprogrammed, statistically smooth sequence of bits is needed, as in the Global Positioning System and to scramble electrical signals in computers to reduce radiofrequency interference.
151.2. Checksums
Shifting an LFSR corresponds to multiplying by x. If we also add 1 from time to time, we can build any polynomial we like, and get the remainder mod m; for example, to compute the remainder of 100101 mod 11001 we do
0000 (start with 0) 00001 (shift in 1) 0001 (no XOR) 00010 (shift in 0) 0010 (no XOR) 00100 (shift in 0) 0100 (no XOR) 01001 (shift in 1) 1001 (no XOR) 10010 (shift in 0) 1011 (XOR with 11001) 10111 (shift in 1) 1110 (XOR with 11001)
and we have computed that the remainder of x^{5} + x^{3} + 1 mod x^{4} + x^{3} + 1 is x^{3} + x^{2} + x.
This is the basis for Cyclic redundancy check checksums, which are used to detect accidental corruption of data. The idea is that we feed our data stream into the LFSR as the coefficients of some gigantic polynomial, and the checksum summarizing the data is the state when we are done. Since it's unlikely that a random sequence of flipped or otherwise damaged bits would equal 0 mod m, most nonmalicious changes to the data will be visible by producing an incorrect checksum.
151.3. Cryptography
GF(2^{n}) can also substitute for ℤ_{p} in some cryptographic protocols. An example would be the function f(s) = x^{s} (mod m), which is fairly easy to compute in ℤ_{p} and even easier to compute in GF(2^{n}), but which seems to be hard to invert in both cases. Here we can take advantage of the fast remainder operation provided by LFSRs to avoid having to do expensive division in ℤ.
152. LinearAlgebra
153. Matrices
We've seen that a sequence a_{1}, a_{2}, ..., a_{n} is really just a function from some index set ({1..n} in this case) to some codomain, where a_{i} = a(i) for each i. What if we have two index sets? Then we have a twodimensional structure:
where A_{ij} = a(i,j) and the domain of the function is just the crossproduct of the two index sets. Such a structure is called a matrix. The values A_{ij} are called the elements or entries of the matrix. A sequence of elements with the same first index is called a row of the matrix; similarly, a sequence of elements with the same second index is called a column. The dimension of the matrix specifies the number of rows and the number of columns: the matrix above has dimension (3,2), or, less formally, it is a 3×2 matrix.^{23} A matrix is square if it has the same number of rows and columns.
Note: The convention in matrix indices is to count from 1 rather than 0. In ComputerScience terms, matrices are written in FORTRAN.
By convention, variables representing matrices are usually written with capital letters. (This is to distinguish them from lowercase scalars, which are single numbers.)
153.1. Interpretation
We can use a matrix any time we want to depict a function of two arguments (over small finite sets if we want it to fit on one page). A typical example (that predates the formal notion of a matrix by centuries) is a table of distances between cities or towns, such as this example from 1807:^{24}
Because distance matrices are symmetric (see below), usually only half of the matrix is actually printed.
Another example would be a matrix of counts. Suppose we have a set of destinations D and a set of origins O. For each pair (i,j) ∈ D×O, let C_{ij} be the number of different ways to travel from j to i. For example, let origin 1 be Bass Library, origin 2 be AKW, and let destinations 1, 2, and 3 be Bass, AKW, and SML. Then there is 1 way to travel between Bass and AKW (walk), 1 way to travel from AKW to SML (walk), and 2 ways to travel from Bass to SML (walk aboveground or belowground). If we assume that we are not allowed to stay put, there are 0 ways to go from Bass to Bass or AKW to AKW, giving the matrix
Wherever we have counts, we can also have probabilities. Suppose we have a particle that moves between positions 1..n by flipping a coin, and moving up with probability ½ and down with probability ½ (staying put if it would otherwise move past the endpoints). We can describe this process by a transition matrix P whose entry P_{ij} gives the probability of moving to i starting from j. For example, for n = 4, the transition matrix is
Finally, the most common use of matrices in linear algebra is to represent the coefficients of a linear transformation, which we will describe later.
153.2. Operations on matrices
153.2.1. Transpose of a matrix
The transpose of a matrix A, written A' or A^{T}, is obtained by reversing the indices of the original matrix; (A')_{ij} = A_{ji} for each i and j. This has the effect of turning rows into columns and vice versa:
If a matrix is equal to its own transpose (i.e., if A_{ij} = A_{ji} for all i and j), it is said to be symmetric. The transpose of an n×m matrix is an m×n matrix, so only square matrices can be symmetric.
153.2.2. Sum of two matrices
If we have two matrices A and B with the same dimension, we can compute their sum A+B by the rule (A+B)_{ij} = A_{ij}+B_{ij}. Another way to say this is that matrix sums are done termbyterm: there is no interaction between entries with different indices.
For example, suppose we have the matrix of counts C above of ways of getting between two destinations on the Yale campus. Suppose that upperclassmen are allowed to also take the secret Science Hill Monorail from the subbasement of Bass Library to the subbasement of AKW. We can get the total number of ways an upperclassman can get from each origin to each destination by adding to C a second matrix M giving the paths involving monorail travel:
153.2.3. Product of two matrices
Suppose we are not content to travel once, but have a plan once we reach our destination in D to travel again to a final destination in some set F. Just as we constructed the matrix C (or C+M, for monorailusing upperclassmen) counting the number of ways to go from each point in O to each point in D, we can construct a matrix Q counting the number of ways to go from each point in D to each point in F. Can we combine these two matrices to compute the number of ways to travel O→D→F?
The resulting matrix is known as the product QC. We can compute each entry in QC by taking a sum of products of entries in Q and C. Observe that the number of ways to get from k to i via some single intermediate point j is just Q_{ij}C_{jk}. To get all possible routes, we have to sum over all possible intermediate points, giving (QC)_{ik} = ∑_{j} Q_{ij}C_{jk}.
This gives the rule for multiplying matrices in general: to get (AB)_{ik}, sum A_{ij}B_{jk} over all intermediate values j. This works only when the number of columns in A is the same as the number of rows in B (since j has to vary over the same range in both matrices), i.e. when A is an n×m matrix and B is an m×s matrix for some n, m, and s. If the dimensions of the matrices don't match up like this, the matrix product is undefined. If the dimensions do match, they are said to be compatible.
For example, let B = (C+M) from the sum example and let A be the number of ways of getting from each of destinations 1 = Bass, 2 = AKW, and 3 = SML to final destinations 1 = Heaven and 2 = Hell. After consulting with appropriate representatives of the Divinity School, we determine that one can get to either Heaven or Hell from any intermediate destination in one way by dying (in a state of grace or sin, respectively), but that Bass Library provides the additional option of getting to Hell by digging. This gives a matrix
We can now compute the product
One special matrix I (for each dimension n×n) has the property that IA = A and BI = B for all matrices A and B with compatible dimension. This matrix is known as the identity matrix, and is defined by the rule I_{ii} = 1 and I_{ij} = 0 for i≠j. It is not hard to see that in this case (IA)_{ij} = ∑_{k} I_{ik}A_{kj} = I_{ii}A_{ij} = A_{ij}, giving IA = A; a similar computation shows that BI = B. With a little more effort (omitted here) we can show that I is the unique matrix with this identity property.
153.2.4. The inverse of a matrix
A matrix A is invertible if there exists a matrix A^{1} such that AA^{1} = A^{1}A = 1. This is only possible if A is square (because otherwise the dimensions don't work) and may not be possible even then. Note that it is enough to find a matrix such that A^{1}A = I.
To try to invert a matrix, we start with the pair of matrices A, I (where I is the identity matrix defined above) and multiply both sides of the pair from the left by a sequence of transformation matrices B_{1}, B_{2}, ... B_{k} until B_{k}B_{k1}⋯B_{1}A = I. At this point the righthand matrix will be B_{k}B_{k1}⋯B_{1} = A^{1}. (We could just keep track of all the B_{i}, but it's easier to keep track of their product.)
How do we pick the B_{i}? These will be matrices that (a) multiply some row by a scalar, (b) add a multiple of one row to another row, or (c) swap two rows. We'll use the first kind to make all the diagonal entries equal one, and the second kind to get zeroes in all the offdiagonal entries. The third kind will be saved for emergencies, like getting a zero on the diagonal.
That the operations (a), (b), and (c) correspond to multiplying by a matrix is provable but tedious.^{25} Given these operations, we can turn any invertible matrix A into I by working from the top down, rescaling each row i using a type (a) operation to make A_{ii} = 1, then using a type (b) operation to subtract A_{ji} times row i from each row j > i to zero out A_{ji}, then finally repeating the same process starting at the bottom to zero out all the entries above the diagonal. The only way this can fail is if we hit some A_{ii} = 0, which we can swap with a nonzero A_{ji} if one exists (using a type (c) operation). If all the rows from i on down have a zero in the i column, then the original matrix A is not invertible. This entire process is known as GaussJordan elimination.
This procedure can be used to solve matrix equations: if AX = B, and we know A and B, we can compute X by first computing A^{1} and then multiplying X = A^{1}AX = A^{1}B. If we are not interested in A^{1} for its own sake, we can simplify things by substituting B for I during the GaussJordan elimination procedure; at the end, it will be transformed to X.
153.2.4.1. Example
Original A is on the left, I on the right.
and we're done. (It's probably worth multiplying the original A by the alleged A^{1} to make sure that we didn't make a mistake.)
153.2.5. Scalar multiplication
Suppose we have a matrix A and some constant c. The scalar product cA is given by the rule (cA)_{ij} = cA_{ij}; in other words, we multiply (or scale) each entry in A by c. The quantity c in this context is called a scalar; the term scalar is also used to refer to any other single number that might happen to be floating around.
Note that if we only have scalars, we can pretend that they are 1×1 matrices; a+b = a_{11} + b_{1} and ab = a_{11}b_{11}. But this doesn't work if we multiply a scalar by a matrix, since cA (where c is considered to be a matrix) is only defined if A has only one row. Hence the distinction between matrices and scalars.
153.3. Matrix identities
For the most part, matrix operations behave like scalar operations, with a few important exceptions:
 Matrix multiplication is only defined for matrices with compatible dimensions.
Matrix multiplication is not commutative: in general, we do not expect that AB = BA. This is obvious when one or both of A and B is not square (one of the products is undefined because the dimensions aren't compatible), but it's also true even if A and B are both square. For a simple example of a noncommutative pair of matrices, consider
On the other hand, matrix multiplication is associative: A(BC) = (AB)C. The proof is by expansion of the definition. First compute (A(BC))_{ij} = ∑_{k} A_{ik}(BC)_{kj} = ∑_{k}∑_{m} A_{ik}B_{km}C_{mj}. Then compute ((AB)C)_{ij} = ∑_{m} (AB)_{im}C_{mj} = ∑_{m}∑_{k} A_{ik}B_{km}C_{mj} = ∑_{k}∑_{m} A_{ik}B_{km}C_{mj} = (A(BC))_{ij}.
So despite the limitations due to noncompatibility and noncommutativity, we still have:
 Associative laws
 A+(B+C) = (A+B)+C (easy), (AB)C = A(BC) (see above). Also works for scalars: c(AB) = (cA)B = A(cB) and (cd)A = c(dA) = d(cA).
 Distributive laws
 A(B+C) = AB+BC, A(B+C) = AB+AC. Also works for scalars: c(A+B) = cA+cB, (c+d)A = cA+dA.
 Additive identity
 A+0 = 0+A = A, where 0 is the allzero matrix of the same dimension as A.
 Multiplicative identity
 AI = A, IA = A, 1A = A, A1 = A, where I is the identity matrix of appropriate dimension in each case and 1 is the scalar value 1.
 Inverse of a product
(AB)^{1} = B^{1}A^{1}. Proof: (B^{1}A^{1})(AB) = B^{1}(A^{1}A)B = B^{1}(IB) = B^{1}B = I, and similarly for (AB)(B^{1}A^{1}).
 Transposes
(A+B)' = A'+B' (easy), (AB)' = B'A' (a little trickier). (A^{1})' = (A')^{1}, provided A^{1} exists (proof: A'(A^{1})' = (A^{1}A)' = I' = I).
Using these identities, we can do arithmetic on matrices without knowing what their actual entries are, so long as we are careful about noncommutativity. So for example we can compute
(A+B)^{2} = (A+B)(A+B) = A^{2}+AB+BA+B^{2}.
Similarly, if for square A we have
S = ∑_{n∈ℕ} A^{n},
(where A^{0}=I) we can solve the equation
 S = I + AS
by first subtracting AS from both sides to get
 IS  AS = I
then applying the distributive law:
 (IA)S = I
and finally multiplying both sides from the left by (IA)^{1} to get
S = (IA)^{1},
assuming IA is invertible.
154. Vectors
A 1×n or n×1 matrix is called a vector. A 1×n matrix is called a row vector for obvious reasons; similarly, an n×1 matrix is called a column vector.
Vectors behave exactly like matrices in every respect; however, they are often written with lowercase letters to distinguish them from their taller and wider cousins. If this will cause confusion with scalars, we can disambiguate by writing vectors with a little arrow on top:
or in boldface: x. Often we will just hope it will be obvious from context which variables represent vectors and which represent scalars, since writing all the little arrows can take a lot of time.
When extracting individual coordinates from a vector, we omit the boring index and just write x_{1}, x_{2}, etc. This is done for both row and column vectors, so rather than write x'_{i} we can just write x_{i}.
154.1. Geometric interpretation
We can use a vector to represent the coordinates of a point in space. In general, given some point in the ndimensional Euclidean space ℝ^{n}, we consider it as an n×1 column vector (row vectors work too, but the convention is to use column vectors because it makes the matrixvector product Ax look like function application). The set of all such vectors for a given fixed dimension form a vector space.
For example, we could represent the latitude and longitude of the major world landmarks Greenwich Observatory, Mecca, and Arthur K. Watson Hall by the column vectors
Pedantic note: The surface of the Earth is not really a Euclidean space, despite the claims of the Flat Earth Society.
In running text, we can represent these column vectors as transposed row vectors, e.g. [21.45 39.82]' for the coordinates of Mecca. Quite often we will forget whether we are dealing with a column vector or a row vector specifically and just write the sequence of entries, e.g. (21.54 39.82) or (21.54, 39.82).
We can use vectors to represent any quantities that can be expressed as a sequence of coordinates in ℝ (or more generally, over any field: see AlgebraicStructures and AbstractLinearAlgebra). A common use is to represent offsets—the difference between the coordinates of two locations—and velocities—the rate at which the coordinates of a moving object change over time. So, for example, we might write the velocity of a car that is moving due northeast at 100 km/h as the vector (100/√2 100/√2)', where each entry corresponds to the speed if we look only at the change in the northsouth or westeast position. We can also think of coordinates of points as themselves offsets from some origin at position 0—Greenwich Observatory in the case of latitude and longitude.
154.2. Sums of vectors
We can add vectors termbyterm just as we can add any other matrices. For vectors representing offsets (or velocities) the geometric interpretation of x+y is that we attach y to the end of x (or vice versa, since addition is commutative) and take the combined offset, as in this picture:
* /^ /  /  x+y/ y /  /  /  0——————>* x
This can be used to reduce the complexity of piratetreasure instructions:
Yargh! Start at the olde hollow tree on Dead Man's Isle, if ye dare.
 Walk 10 paces north.
 Walk 5 paces east.
 Walk 20 paces south.
 Walk 6√2 paces northwest.
 Dig 8 paces down.
 Climb back up 6 paces. There be the treasure, argh!
In vector notation, this becomes:
 (0 0 0)'
 + (10 0 0)'
 + (0 5 0)'
 + (20 0 0)'
 + (6 6 0)'
 + (0 0 8)'
 + (0 0 6)
which sums to (4 1 2)'. So we can make our life easier by walking 4 paces south, 1 pace west, and digging only 2 paces down.
154.3. Length
The length of a vector x, usually written as ‖x‖ or sometimes just x, is defined as √(∑_{i} x_{i}); the definition follows from the Pythagorean theorem (length)^{2} = ∑ (coordinates)^{2}. Because the coordinates are squared, all vectors have nonnegative length, and only the zero vector has length 0.
Length interacts with scalar multiplication exactly as you would expect: ‖cx‖ = c‖x‖. The length of the sum of two vectors depends on how the are aligned with each other, but the triangle inequality ‖x+y‖ ≤ ‖x‖+‖y‖ always holds.
A special class of vectors are the unit vectors, those vectors x for which ‖x‖ = 1. In geometric terms, these correspond to all the points on the surface of a radius1 sphere centered at the origin. Any vector x can be turned into a unit vector x/‖x‖ by dividing by its length. In two dimensions, the unit vectors are all of the form (x y)' = (cos Θ, sin Θ)', where by convention Θ is the angle from due east measured counterclockwise; this is why traveling 9 units northwest corresponds to the vector 9(cos 135°, sin 135°)' = (9/√2, 9/√2)'. In one dimension, the unit vectors are (±1). (There are no unit vectors in zero dimensions: the unique zerodimensional vector has length 0.)
154.4. Dot products and orthogonality
Suppose we have some column vector x, and we want to know how far x sends us in a particular direction, where the direction is represented by a unit column vector e. We can compute this distance (a scalar) by taking the dot product
e⋅x = e'x = ∑ e_{i}x_{i}.
For example, x = (3 4)' and e = (1 0)', then the dot product is
In this case we see that the (1 0)' vector conveniently extracts the first coordinate, which is about what we'd expect. But we can also find out how far x takes us in the (1/√2 1/√2)' direction: this is (1/√2 1/√2)x = 7/√2.
By convention, we are allowed to take the dot product of two row vectors or of a row vector times a column vector or vice versa, provided of course that the nonboring dimensions match. In each case we transpose as appropriate to end up with a scalar when we take the matrix product.
Nothing in the definition of the dot product restricts either vector to be a unit vector. If we compute x⋅y where x = ce and ‖e‖ = 1, then we are effectively multiplying e⋅y by c. It follows that the dot product is proportional to the length of both of its arguments. This often is expressed in terms of the geometric formulation, memorized by vector calculus students since time immemorial:
The dot product of x and y is equal to the product of their lengths times the cosine of the angle between them.
This formulation is a little misleading, since modern geometers will often define the angle between two vectors x and y as cos^{1}(x⋅y/(‖x‖⋅‖y‖)), but it gives a good picture of what is going on. One can also define the dotproduct as the area of the parallelogram with sides x and y, with the complication that if the parallelogram is flipped upsidedown we treat the area as negative. The simple version in terms of coordinates is harder to get confused about, so we'll generally stick with that.
Two vectors are orthogonal if their dot product is zero. In geometric terms, this occurs when either one or both vectors is the zero vector or when the angle between them is ±90° (since cos(±90°) = 0). In other words, two nonzero vectors are orthogonal if and only if they are perpendicular to each other.
Orthogonal vectors satisfy the Pythagorean theorem: If x⋅y = 0, then ‖x+y‖^{2} = (x+y)⋅(x+y) = x⋅x + x⋅y + y⋅x + y⋅y = x⋅x + y⋅y = ‖x‖^{2} + ‖y‖^{2}. It is not hard to see that the converse is also true: any pair of vectors for which ‖x+y‖^{2} = ‖x‖^{2} + ‖y‖^{2} must be orthogonal (at least in ℝ^{n}).
Orthogonality is also an important property of vectors used to define coordinate systems, as we will see below.
155. Linear combinations and subspaces
A linear combination of a set of vectors x_{1}...x_{n} is any vector that can be expressed as ∑ c_{i}x_{i} for some coefficients c_{i}. The span of the vectors, written <x_{1}...x_{n}>, is the set of all linear combinations of the x_{i}.^{26}
The span of a set of vectors forms a subspace of the vector space, where a subspace is a set of vectors that is closed under linear combinations. This is a succinct way of saying that if x and y are in the subspace, so is ax+by for any scalars a and b. We can prove this fact easily: if x = ∑ c_{i}x_{i} and y = ∑ d_{i}x_{i}, then ax+by = ∑ (ac_{i}+bd_{i})x_{i}.
A set of vectors x_{1}, x_{2}, ..., x_{n} is linearly independent if there is no way to write one of the vectors as a linear combination of the others, i.e. if there is no choice of coefficients that makes some x_{i} = ∑_{j≠i} c_{j}x_{j}. An equivalent definition is that there is no choice of coefficients c_{i} such that ∑ c_{i}x_{i} = 0 and at least one c_{i} is nonzero (to see the equivalence, subtract x_{i} from both sides of the x_{i} = ∑ c_{j}x_{j} equation).
155.1. Bases
If a set of vectors is both (a) linearly independent, and (b) spans the entire vector space, then we call that set of vectors a basis of the vector space. An example of a basis is the standard basis consisting of the vectors (0 0 ... 0 1)', (0 0 ... 1 0)', ..., (0 1 ... 0 0)', (1 0 ... 0 0)'. This has the additional nice property of being made of of vectors that are all orthogonal to each other (making it an orthogonal basis) and of unit length (making it a normal basis).
A basis that is both orthogonal and normal is called orthonormal. We like orthonormal bases because we can recover the coefficients of some arbitrary vector v by taking dotproducts. If v = ∑ a_{i}x_{i}, then v⋅x_{j} = ∑ a_{i}(x_{i}⋅x_{j}) = a_{i}, since orthogonality means that x_{i}⋅x_{j}=0 when i≠j, and normality means x_{i}⋅x_{i} = ‖x_{i}‖^{2} = 1.
However, even for nonorthonormal bases it is still the case that any vector can be written as a unique linear combination of basis elements. This fact is so useful we will state it as a theorem:
 Theorem
If {x_{i}} is a basis for some vector space V, then every vector y has a unique representation y = a_{1}x_{1} + a_{2}x_{2} + ... + a_{n}x_{n}.
 Proof
Suppose there is some y with more than one representation, i.e. there are sequences of coefficients a_{i} and b_{i} such that y = a_{1}x_{1} + a_{2}x_{2} + ... + a_{n}x_{n} = b_{1}x_{1} + b_{2}x_{2} + ... + b_{n}x_{n}. Then 0 = yy = a_{1}x_{1} + a_{2}x_{2} + ... + a_{n}x_{n}  b_{1}x_{1} + b_{2}x_{2} + ... + b_{n}x_{n} = (a_{1}b_{1})x_{1} + (a_{2}b_{2})x_{2} + ... + (a_{n}b_{n})x_{n}. But since the x_{i} are independent, the only way a linear combination of the x_{i} can equal 0 is if all coefficients are 0, i.e. if a_{i} = b_{i} for all i.
Even better, we can do all of our usual vector space arithmetic in terms of the coefficients a_{i}. For example, if a = ∑a_{i}x_{i} and b = ∑b_{i}x_{i}, then it can easily be verified that a+b = ∑(a_{i}+b_{i})x_{i} and ca = ∑(ca_{i})x_{i}.
However, it may be the case that the same vector will have different representations in different bases. For example, in ℝ^{2}, we could have a basis B_{1} = { (1,0), (0,1) } and a basis B_{2} = { (1,0), (1,2) }. The vector (2,3) would be represented as (2,3) using basis B_{1} but would be represented as (5/2,3/2) in basis B_{2}. In the standard basis { (1,0), (0,1) }, the representation of (2,3) is just (2,3).
Both bases above have the same size. This is not an accident; if a vector space has a finite basis, then all bases have the same size. We'll state this as a theorem, too:
 Theorem
Let x_{1}...x_{n} and y_{1}...y_{m} be two finite bases of the same vector space V. Then n=m.
 Proof
Assume without loss of generality that n ≤ m. We will show how to replace elements of the x_{i} basis with elements of the y_{i} basis to produce a new basis consisting only of y_{1}...y_{n}. Start by considering the sequence y_{1},x_{1}...x_{n}. This sequence is not independent since y_{1} can be expressed as a linear combination of the x_{i} (they're a basis). So from Theorem 1 there is some x_{i} that can be expressed as a linear combination of y_{1},x_{1}...x_{i1}. Swap this x_{i} out to get a new sequence y_{1},x_{1}...x_{i1},x_{i+1},...x_{n}. This new sequence is also a basis, because (a) any z can be expressed as a linear combination of these vectors by substituting the expansion of x_{i} into the expansion of z in the original basis, and (b) it's independent, because if there is some nonzero linear combination that produces 0 we can substitute the expansion of x_{i} to get a nonzero linear combination of the original basis that produces 0 as well. Now continue by constructing the sequence y_{2},y_{1},x_{1}...x_{i1},x_{i+1},...x_{n}, and arguing that some x_{i'} in this sequence must be expressible as a combination of earlier terms by Theorem 1 (it can't be y_{1} because then y_{2}y_{1} is not independent), and drop this x_{i'}. By repeating this process we can eventually eliminate all the x_{i}, leaving the basis y_{n},...,y_{1}. But then any y_{k} for k > n would be a linear combination of this basis, so we must have m = n.
The size of any basis of a vector space is called the dimension of the space.
156. Linear transformations
When we multiply a column vector by a matrix, we transform the vector into a new vector. This transformation is linear in the sense that A(x+y) = Ax + Ay and A(cx) = cAx; thus we call it a linear transformation. Conversely, any linear function f from column vectors to column vectors can be written as a matrix M such that f(x) = Mx. We can prove this by decomposing each x using the standard basis.
 Theorem
Let f:ℝ^{n}→ℝ^{m} be a linear transformation. Then there is a unique n×m matrix M such that f(x) = Mx for all column vectors x.
 Proof
We'll use the following trick for extracting entries of a matrix by multiplication. Let M be an n×m matrix, and let e^{i} be a column vector with e^{i}_{j} = 1 if i=j and 0 otherwise.^{27} Now observe that (e^{i})'Me^{j} = ∑_{k} e^{i}_{k} (Me^{j})_{k} = (Me^{j})_{i} = ∑_{k} M_{ik}e^{j}_{k} = M_{ij}. So given a particular linear f, we will now define M by the rule M_{ij} = (e^{i})'f(e^{j}). It is not hard to see that this gives f(e^{j}) = Me^{j} for each basis vector j, since multiplying by (e^{i})' grabs the ith coordinate in each case. To show that Mx = f(x) for all x, decompose each x as ∑_{k} c_{k}e^{k}. Now compute f(x) = f(∑_{k} c_{k}e^{k}) = ∑_{k} c_{k}f(e^{k}) = ∑_{k} c_{k}M(e^{k}) = M(∑_{k} c_{k}e^{k}) = Mx.
156.1. Composition
What happens if we compose two linear transformations? We multiply the corresponding matrices:
(g∘f)(x) = g(f(x)) = g(M_{f}x) = M_{g}(M_{f}x) = (M_{g}M_{f})x.
This gives us another reason why the dimensions have to be compatible to take a matrix product: If multiplying by an n×m matrix A gives a map g:ℝ^{m}→ℝ^{n}, and multiplying by a k×l matrix B gives a map f:ℝ^{l}→ℝ^{k}, then the composition g∘f corresponding to AB only works if m = k.
156.2. Role of rows and columns of M in the product Mx
When we multiply a matrix and a column vector, we can think of the matrix as a sequence of row or column vectors and look at how the column vector operates on these sequences.
Let M_{i⋅} be the ith row of the matrix (the "⋅" is a standin for the missing column index). Then we have
(Mx)_{i} = ∑_{k} M_{ik}x_{k} = M_{i⋅}⋅x.
So we can think of Mx as a vector of dotproducts between the rows of M and x:
Alternatively, we can work with the columns M_{⋅j} of M. Now we have
(Mx)_{i} = ∑_{k} M_{ik}x_{k} = ∑_{k} (M_{⋅k})_{i}x_{k}.
From this we can conclude that Mx is a linear combination of columns of M: Mx = ∑_{k} x_{k}M_{⋅k}. Example:
The set {Mx} for all x is thus equal to the span of the columns of M; it is called the column space of M.
For yM, where y is a row vector, similar properties hold: we can think of yM either as a row vector of dotproducts of y with columns of M or as a weighted sum of rows of M; the proof follows immediately from the above facts about a product of a matrix and a column vector and the fact that yM = (M'y')'. The span of the rows of M is called the row space of M, and equals the set {yM} of all results of multiplying a row vector by M.
156.3. Geometric interpretation
Geometrically, linear transformations can be thought of as changing the basis vectors for a space: they keep the origin in the same place, move the basis vectors, and rearrange all the other vectors so that they have the same coordinates in terms of the new basis vectors. These new basis vectors are easily read off of the matrix representing the linear transformation, since they are just the columns of the matrix. So in this sense all linear transformations are transformations from some vector space to the column space of some matrix.^{28}
This property makes linear transformations popular in graphics, where they can be used to represent a wide variety of transformations of images. Below is a picture of an untransformed image (top left) together with two standard basis vectors labeled x and y. In each of the other images, we have shifted the basis vectors using a linear transformation, and carried the image along with it.^{29}
Note that in all of these transformations, the origin stays in the same place. If you want to move an image, you need to add a vector to everything. This gives an affine transformation, which is any transformation that can be written as f(x) = Ax+b for some matrix A and column vector b.
Many twodimensional linear transformations have standard names. The simplest transformation is scaling, where each axis is scaled by a constant, but the overall orientation of the image is preserved. In the picture above, the top right image is scaled by the same constant in both directions and the secondfromthebottom image is scaled differently in each direction.
Recall that the product Mx corresponds to taking a weighted sum of the columns of M, with the weights supplied by the coordinates of x. So in terms of our basis vectors x and y, we can think of a linear transformation as specified by a matrix whose columns tell us what vectors for replace x and y with. In particular, a scaling transformation is represented by a matrix of the form