This post summarises different ways of constructing continuous functions, which are introduced in Section 18 of James Munkres “Topology”.

  1. Constant function.
  2. Inclusion function.

    N.B. The function domain should have the subspace topology relative to the range.

  3. Composition of continuous functions. Specifically, composition of continuous real-valued functions via simple arithmetic, i.e. sum, difference, product and quotient. For the case of quotient, the function as the denominator should never be evaluated to 0.

  4. Restricting the domain of a continuous function.

    N.B. The reduced domain should be assigned the subspace topology with respect to the original domain.

  5. Restricting or expanding the range of a continuous function.

    N.B. The smaller range should have the subspace topology with respect to the larger range.

  6. Local formulation of continuity,i.e. the function is continuous if it is still continuous after restricting its domain to each open set in an open covering of the original domain.

  7. Pasting continuous functions with their domains on patches of closed sets which cover the whole domain.

    Comment: In the overlapping subdomain, the functions on different patches should be defined consistently. This condition is not required in “local formulation of continuity”, where the covering of the whole domain is made from open sets instead of closed sets. From this difference, we can sense the difference between open set and closed set. The former is intrinsically related to continuity, which can be phenomenologically construed as that the open sets can infiltrate into one another infinitely, even though the amount of infiltration is often infinitesimal if a metric is also assigned to the space. On the contrary, the latter has a clearly set demarcation or buffer zone between the functions on different patches without further penetration or interaction. Therefore, it does not intrinsically imply continuity and the function values in the overlapping subdomain must be consistent to ensure the continuity of the fully assembled function.

  8. Maps into products, which ensures the equivalence between the continuity of the original function and that of its coordinate functions.

  9. Uniform limit of a sequence of continuous functions.

    N.B. The range space of these functions should have a metric.

Constructing continuous functions的更多相关文章

  1. Summary of continuous function spaces

    In general differential calculus, we have learned the definitions of function continuity, such as fu ...

  2. 神经网络可以拟合任意函数的视觉证明A visual proof that neural nets can compute any function

    One of the most striking facts about neural networks is that they can compute any function at all. T ...

  3. ural 1346. Intervals of Monotonicity

    1346. Intervals of Monotonicity Time limit: 1.0 secondMemory limit: 64 MB It’s well known that a dom ...

  4. [转]Neural Networks, Manifolds, and Topology

    colah's blog Blog About Contact Neural Networks, Manifolds, and Topology Posted on April 6, 2014 top ...

  5. [家里蹲大学数学杂志]第269期韩青编《A Basic Course in Partial Differential Equations》 前五章习题解答

    1.Introduction 2.First-order Differential Equations Exercise2.1. Find solutons of the following inti ...

  6. Understanding Convolution in Deep Learning

    Understanding Convolution in Deep Learning Convolution is probably the most important concept in dee ...

  7. Python数据结构应用4——搜索(search)

    Search是数据结构中最基础的应用之一了,在python中,search有一个非常简单的方法如下: 15 in [3,5,4,1,76] False 不过这只是search的一种形式,下面列出多种形 ...

  8. James Munkres《拓扑学》笔记前言

    许久以前,我读到了侯捷先生于<深入浅出MFC>一书中所写的“勿在浮砂筑高台”这句话,颇受警醒与启发.如今在工科领域已摸索多年,亦逐渐真切而深刻地认识到,若没有坚实.完整.细致的数学理论作为 ...

  9. James Munkres Topology: Sec 22 Example 1

    Example 1 Let \(X\) be the subspace \([0,1]\cup[2,3]\) of \(\mathbb{R}\), and let \(Y\) be the subsp ...

随机推荐

  1. Lodop某个电脑打印内容大小有问题

    可能原因分析:本地设置放大比例问题,是真实的放大或缩小,1.查看比例应在100%, 2.控制面板设置显示应在100%(win7 win10中) 3.超文本样式问题,分析样式中不同浏览器版本下显示不一致 ...

  2. python之MRO和垃圾回收机制

    一.MOR 1.C3算法简介 为了解决原来基于深度优先搜索算法不满足本地优先级,和单调性的问题. python2.3版本之后不管是新式类还是经典类,查找继承顺序都采用C3算法 2.算法原理 C3算法的 ...

  3. 【设计模式】【应用】使用模板方法设计模式、策略模式 处理DAO中的增删改查

    原文:使用模板方法设计模式.策略模式 处理DAO中的增删改查 关于模板模式和策略模式参考前面的文章. 分析 在dao中,我们经常要做增删改查操作,如果每个对每个业务对象的操作都写一遍,代码量非常庞大. ...

  4. Lua语法基础(二)

    1. 函数 1.1 函数声明 默认为全局 局部函数使用local关键字声明 1.2 参数 ...等同于Python中*args三个点表示可变参数 1.3 获取参数长度的两种方式 (1)将传入的参数.. ...

  5. OSU! on tree

    dsu on tree 好吧,这个毒瘤...... 树剖和启发式合并的杂合体. 用于解决静态子树问题,复杂度O(nlogn * insert时间) 因为dsu是并查集的意思所以算法名字大概就是什么树上 ...

  6. Springboot 5.Springboot 返回cookies信息的post接口开发

    首先创建一个类,类里面首先登陆获取到cookie,然后带着cookie去发送请求 package com.course.server; import com.course.bean.User; imp ...

  7. pillow的用法

    这是原图 from PIL import Image im=Image.open('C:/Users/history/Desktop/微信图片_20190408110611.jpg') r,g,b=i ...

  8. Mathematica 求出解后代入变量

    Solve[2 x - 3 == 0, x] x = x //. %[[1]]

  9. [物理学与PDEs]第1章习题14 求解 rot 方程

    设向量函数 ${\bf B}(x,y,z)=(B_x,B_y,B_z)$ 在 $z\neq 0$ 时具有一阶连续偏导数, 在 $z=0$ 时具有第一类间断, 且 $$\bex \Div{\bf B}= ...

  10. .net实现md5加密 sha1加密 sha256加密 sha384加密 sha512加密 des加密解密

    写项目时,后台一直用md5加密,一天群里人问,除了MD5还有其它的加密方法吗?当时只知道还有个SHA,但怎么实现什么的都不清楚,于是当网上找了下,把几种常见的加密方法都整理了下,用winform写了个 ...