computability theory and algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue...
TRANSCRIPT
![Page 1: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/1.jpg)
Computability Theory and Algebra
Wu Huishan
School of Physical and Mathematical Sciences
A thesis submitted to the Nanyang Technological Universityin partial fulfilment of the requirement for the degree of
Doctor of Philosophy
2017
![Page 2: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/2.jpg)
![Page 3: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/3.jpg)
Acknowledgments
I would like to thank my supervisor, Prof. Wu Guohua, for teaching me com-
putability theory and guiding my research in the past few years. His knowledge,
suggestions, and discussions inspire me a lot, and I appreciate him for sharing me
with his ideas. His style of teaching, writing of papers and presentations influence
me a lot. I am grateful to him for all his efforts for guiding me to be a teacher and
to be a researcher. I also want to thank him for supporting my PhD study by his
research fund from MOE of Singapore.
I would like to thank Prof. Ng Keng Meng, for teaching me a course on first-
order logic. I also want to thank my peers and friends, Wang Shaoyi, Ru Junren,
Yu Hongyuan, Yuan Bowen for many inspiring discussion and various seminars on
logic and computability theory.
Last, but not the least, I want to thank my parents for their love and support.
i
![Page 4: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/4.jpg)
ii
![Page 5: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/5.jpg)
Contents
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i
Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
1 Introduction 1
1.1 Basics of computability theory . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Part I: Bounded-jump operator and the high/low hierarchy . . . . . . 8
1.3 Part II: Degrees of orders on torsion-free abelian groups . . . . . . . . 11
1.4 Part III: Reverse mathematics, abelian groups and modules . . . . . . 17
I Bounded-jump operator and the high/low hierarchy 26
2 A bounded-low c.e. set which is low, but not superlow 27
2.1 Requirements and strategies . . . . . . . . . . . . . . . . . . . . . . . 28
2.2 Construction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.3 Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.4 A bounded-low set with Turing degree 0′ . . . . . . . . . . . . . . . . 35
3 A bounded-high set which is high, but not superhigh 37
3.1 Pseudo-jump inversion via bounded-high sets . . . . . . . . . . . . . . 38
3.1.1 A Re-strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
3.1.2 A Pe-strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
3.1.3 A Qe-strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
3.1.4 Define the computable function gr . . . . . . . . . . . . . . . . 48
3.1.5 Construction . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
3.1.6 Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
3.2 Pseudo-jump inversion via bounded-low c.e. sets . . . . . . . . . . . . 60
iii
![Page 6: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/6.jpg)
II Degrees of orders on torsion-free abelian groups 63
4 Group-order-computable degrees and PA degrees 64
4.1 Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
4.2 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.3 The P-strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
4.4 The Q-strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
4.5 The R-strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
4.5.1 Background on PA-complete sets . . . . . . . . . . . . . . . . 73
4.5.2 The R′-strategy . . . . . . . . . . . . . . . . . . . . . . . . . . 75
4.6 Construction and verification . . . . . . . . . . . . . . . . . . . . . . 82
4.6.1 Construction . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
4.6.2 G is a computable group possessing computable orders . . . . 82
4.6.3 A-computable orders on G which are not computable . . . . . 84
4.6.4 Orders on G which are computable from PA-complete sets . . 90
5 Group orders and c.e. degrees 91
5.1 Requirements and strategies . . . . . . . . . . . . . . . . . . . . . . . 91
5.1.1 A Pe-strategy with permitting . . . . . . . . . . . . . . . . . . 92
5.1.2 The Q0-strategy . . . . . . . . . . . . . . . . . . . . . . . . . . 93
5.1.3 The Q1-strategy . . . . . . . . . . . . . . . . . . . . . . . . . . 97
5.1.4 The Q-strategy . . . . . . . . . . . . . . . . . . . . . . . . . . 99
5.1.5 A Ne-strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
5.2 Construction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
5.3 Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
III Reverse mathematics, abelian groups and modules 113
6 Reverse mathematics and divisible abelian groups 114
6.1 Divisible subgroups . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
6.2 Two decomposition theorems . . . . . . . . . . . . . . . . . . . . . . 118
iv
![Page 7: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/7.jpg)
7 Reverse mathematics and modules 124
7.1 Projective modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
7.1.1 Direct sums of projective modules . . . . . . . . . . . . . . . . 124
7.1.2 Free modules and projective modules over Σ01-PIDs . . . . . . 127
7.2 Injective modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
7.2.1 Baer’s criterion for injective modules . . . . . . . . . . . . . . 129
7.2.2 Divisible modules and injective modules over Σ01-PIDs . . . . . 132
References 135
v
![Page 8: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/8.jpg)
Abstract
This thesis mainly focuses on classical computability theory and effective aspects
of algebra. In particular, we will work on bounded low/high sets, degrees of orders
on torsion-free abelian groups, and reverse mathematics of several classic results in
modules.
In Part I, we will study bounded-low sets and bounded-high sets in terms of the
high/low hierarchy. Anderson and Csima proposed in [1] the notion of bounded-
jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-
rem. In [2], Anderson, Csima and Lange compared the bounded jump with Turing
jump and proved the existence of high bounded-low sets and low bounded-high sets.
Observing that superlow sets are all bounded-low, Anderson, Csima and Lange asked
in [2] whether there exist bounded-low c.e. sets which are low but not superlow,
and whether there exist superhigh sets which are not bounded-high. In Part I, we
will provide positive answers to these questions. We will also prove that there are
bounded-high sets which are high but not superhigh, and that there are bounded-low
c.e. sets which are high but not superhigh.
In Part II, we study Turing degrees of orders on computable torsion-free abelian
groups with infinite rank. Recently, Kach, Lange and Solomon [3] built a noncom-
putable c.e. set C and a computable torsion-free abelian group G with computable
orders such that every C-computable order on the constructed group is computable.
Motivated by this result, we call a degree a group-order-computable if there is a com-
putable torsion-free abelian group G with infinite rank which admits computable
orders such that every a-computable order on G is computable; in this case, say a is
group-order-computable via G . Following this definition, we call a degree a weakly
group-order-computable if there is a computable torsion-free abelian group G with
vi
![Page 9: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/9.jpg)
infinite rank such that every a-computable group order on G is computable. We
will prove that a Turing degree a is group-order-computable iff a is weakly group-
order-computable iff a is not a PA degree. In particular, all c.e. degrees except 0′
are group-order-computable.
The objective to study group-order-computable degrees is indeed to explore de-
grees of orders on computable torsion-free abelian groups, because for a nonzero
degree a, if it is group-order-computable via G , then G has no orders of degree
a. We show that for any nonzero c.e. degree a, there is a computable torsion-
free abelian group G and a nonzero c.e. degree c < a such that G has orders of
degree ≥ a and c is group-order-computable via G , which means that G has no
incomputable orders of degree ≤ c.
In Part III, we study the reverse mathematics of classic results of divisible abelian
groups and modules. We will prove that over RCA0, the decomposition theorem of
divisible abelian groups and the decomposition theorem of torsion abelian groups
are both equivalent to ACA0. We then consider projective modules and injective
modules over Σ01-principal ideal domains (Σ0
1-PIDs). We will also show that ACA0
proves the following theorems:
• every projective module over a Σ01-PID is free;
• every submodule of a projective module over a Σ01-PID is projective;
• every divisible module over a Σ01-PID is injective;
• every quotient of an injective module over a Σ01-PID is injective.
vii
![Page 10: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/10.jpg)
viii
![Page 11: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/11.jpg)
Chapter 1
Introduction
1.1 Basics of computability theory
We first give a brief introduction of basic concepts and theorems in computability
theory. Say that a function f with domain X ⊆ N is partial computable if there
is a Turing program P such that for x ∈ X, P running on input x stops after
finitely many steps, with output f(x); and for x ∈ X, P running on input x never
stops. A subset of natural numbers is computably enumerable (c.e. for short) if it
is the domain of a partial computable function. A subset A of natural numbers is
computable if both A and its complement are computably enumerable.
Turing programs can be effectively listed, i.e. via their Godel numbers, as Pe :e ∈ N. Let φe be the partial computable function computed by the e-th Turing
program Pe, and We be the domain of φe. Then φe : e ∈ N and We : e ∈ Nare effective enumerations of partial computable functions and c.e. sets respectively.
Similarly, we have an effective listing φke : e ∈ N of all k-ary partial computable
functions with k ≥ 2.
Lemma 1.1 (Padding Lemma) For each partial computable function φe, we can
effectively find an index e′ > e such that φe′ = φe.
Theorem 1.1 (Parameter Theorem) For a partial computable binary function, say
g, there is an injective computable function s such that for all x, y, φs(x)(y) = g(x, y).
Theorem 1.2 (Kleene’s Recursion Theorem) For any total computable function
f : N → N, there is an e0 such that We0 = Wf(e0).
1
![Page 12: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/12.jpg)
Chapter 1. Introduction
Theorem 1.3 (Recursion Theorem with parameters, Kleene) For any total com-
putable function f : N2 → N, there is a computable function g : N → N such that
for any n, Wg(n) =Wf(n,g(n)).
Similar to Turing programs, all Turing programs with oracles can be effectively
listed, and we have a standard enumeration Φe : e ∈ N of partial computable
Turing functionals. For any set X and number x, we write ΦXe (x) ↓= y if y is the
output of the program Φe with oracle X and input x. The use of this computation
ΦXe (x), denoted by ϕXe (x), is defined as the greatest number z such that the question
z ∈ X or not is queried.
Theorem 1.4 (Parameter Theorem for functionals) For any partial computable bi-
nary functional, say Θ, there is an injective computable function s such that for any
oracle Y , and for all x, y, ΦYs(x)(y) ≃ ΘY (x, y).
Theorem 1.5 (Recursion Theorem for functionals) For any total computable func-
tion f : N2 → N, there is a computable function g : N → N such that for any oracle
Y and number n, ΦYg(n) = ΦY
f(n,g(n)).
Say that a set A is Turing reducible to B, written as A ≤T B, if there is a
Turing program with oracle B that outputs membership of A, and that A is Turing
equivalent to B, written as A ≡T B, if A ≤T B and B ≤T A. ≡T is an equivalence
relation over subsets of N, and we call the equivalence class of A the Turing degree
of A, denoted by deg(A). That is, deg(A) = B ⊆ N : B ≡T A. We also use a to
denote the Turing degree of A. ≤T gives rise to a natural order ≤ among Turing
degrees, i.e., a ≤ b if there are sets A ∈ a and B ∈ b such that A ≤T B. 0 denotes
the Turing degree of computable sets. If a degree a contains c.e. sets, then we call
this degree a c.e. degree.
In computability theory, we also consider strong reducibilities, like one-one re-
ducibility (≤1), many-one reducibility (≤m), truth-table reducibility (≤tt) and weak-
truth-table reducibility (≤wtt). Under thse strong reducibilities, we can define cor-
responding degrees:
2
![Page 13: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/13.jpg)
Chapter 1. Introduction
• many-one degree (m-degree, for short) of A is defined as X ⊆ N : X ≡m
A. Here, X is many-one reducible to Y , denoted by X ≤m Y , if there is a
computable function f such that for all x, x ∈ X iff f(x) ∈ Y . Moreover, if f
is one-to-one, X is said to be one-one reducible to Y , denoted by X ≤1 Y .
• truth-table degree (tt-degree, for short) of A is defined as X ⊆ N : X ≡tt A.Let σn : n ∈ N be an effective list of all truth tables, i.e., propositional
formals obtained from atomic formals n ∈ X with n ∈ N. X is truth-table
reducible to Y , denoted by X ≤tt Y , if there is a computable function f such
that for all x, x ∈ X ⇔ Y σf(x).
• weak-truth-table degree (wtt-degree, for short) of A is defined as X ⊆ N :
X ≡wtt A. Here, X is weak-truth-table reducible to Y , denoted by X ≤wtt Y ,
if there is an oracle Turing program, say Φe, such that X = ΦYe with use ϕYe
recursively bounded (i.e., there is a computable function f such that f(x) ≥ϕYe (x) for all x). Weak-truth-table reducibility is also called bounded-Turing
reducibility.
Turing’s halting problem is one of the most fundamental results in computability
theory and has played a great role in the further development of this area.
Theorem 1.6 (Halting problem) K = e ∈ N : φe(e) ↓ is computably enumerable,
but not computable.
It is known that all c.e. sets are one-one reducible to K and Shoenfield’s limit
lemma shows that all sets Turing reducible to K have effective approximations.
The definition of Turing jump operator is based on a relativization of the Halting
problem. For a given set A, define A′ as the set e ∈ N : ΦAe (e) ↓, and we call A′ the
Turing jump of A. The Jump Theorem says that A ≤T B iff A′ ≤1 B′, so A ≡T B
implies A′ ≡T B′, and hence the jump operator defined above is well-defined. If a
is the degree of A, the degree of A′ is called the jump of a, and is denoted by a′.
The degree of Halting problem is just the Turing jump of 0, and denoted by 0′.
Obviously, if a is a c.e. degree, then a ≤ 0′. Friedberg’s jump inversion theorem
says that the Turing jump, as a mapping on Turing degrees, is surjective over 0′.
3
![Page 14: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/14.jpg)
Chapter 1. Introduction
Let A(0) = A and A(1) = A′, the first jump of A. We then define by induction
the n-th jump of A, A(n), as the Turing jump of A(n−1). Let ∅ denote the empty
set. Below is the well-known high/low hierarchy in computability theory.
Definition 1.1 A set A ≤T ∅′ is called lown if A(n) ≡T ∅(n), and highn if A(n) ≡T
∅(n+1).
Definition 1.2 A degree c ≤ 0′ is lown if c(n) = 0(n), and highn if c(n) = 0(n+1).
low1, high1 are also called low, high respectively. So A ≤T ∅′ is low if A′ ≤T ∅′,
and high if A′ ≥T ∅′′. Mohrherr [4] named superlow sets and superhigh sets via the
tt-reducibility as: A ≤T ∅′ is superlow if A′ ≤tt ∅′, and superhigh if A′ ≥tt ∅′′.
Another hierarchy which is popular in computability theory is the Ershov hier-
archy, or the difference hierarchy.
Definition 1.3 For n ∈ N, a set A is called n-c.e., if there is a computable function
f(x, s) such that for all x,
• f(x, 0) = 0,
• A(x) = lims→∞
f(x, s),
• |s ∈ N : f(x, s) = f(x, s+ 1)| ≤ n.
A degree is n-c.e. with n ≥ 1 if it contains a n-c.e. set, and properly n-c.e. with
n ≥ 2 if it is n-c.e. but not (n − 1)-c.e. 1-c.e. sets (or degrees) are just c.e. sets
(or degrees), and 2-c.e. sets (or degrees) are often called d.c.e. sets (or degrees).
Cooper constructed a properly d.c.e. degree in 1971 in his PhD thesis [5], and his
constructions can be modified to show the existence of properly n-c.e. degrees for
n ≥ 2.
The set of all degrees is denoted by D, while the set of all c.e. degrees is denoted
by E . The following Figure 1.1 (from Cooper [6]) provides some basic information
of these two hierarchies.
Definition 1.4 A set A is called ω-c.e., if there is a computable function f(x, s)
and a computable function g such that
4
![Page 15: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/15.jpg)
Chapter 1. Introduction
Figure 1.1: High/low hierarchy and Ershov hierarchy
• for all x, A(x) = limsf(x, s),
• for all x, |s ∈ N : f(x, s) = f(x, s+ 1)| ≤ g(x).
The following relations between ω-c.e. sets and strong reducibilities are well-
known:
Proposition 1.1 A set A is ω-c.e. iff A ≤tt ∅′ iff A ≤wtt ∅′.
The study of the structure of c.e. degrees stems from a question of Post, now
known as the Post’s problem:
Question 1.1 (Post (1944)) Does there exist c.e. degrees different from 0 and 0′?
In order to solve his problem, Post himself developed many important concepts
like simple sets, hypersimple sets and hyperhypersimple sets, with the attempt of
making the complements of the constructed c.e. sets not c.e., by making them
sparser and sparser. These concepts are closely related to strong reducibilities, in
the sense that even though these sets can be Turing complete, simple sets can never
be m-complete, and hypersimple sets can never be tt-complete.
Post’s problem was eventually solved by Friedberg in 1957 and Muchnik in 1956,
independently, where they introduced the injury method for the first time.
5
![Page 16: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/16.jpg)
Chapter 1. Introduction
Theorem 1.7 (Friedberg (1957), Muchnik (1956)) There exist c.e. sets A and B
such that A T B and B T A.
A solution for Post’s problem, along Post’s original idea of making the comple-
ments sparse, was found in the 1970s, after Ershov’s work on η-maximal sets.
Friedberg and Muchnik’s construction has a feature that the injuries from higher
priority requirements are recursively bounded. In 1963, Sacks proved that any
nonzero c.e. degree splits and this construction has an inherited feature that the
injuries from higher priority requirements are finite, but cannot be bounded by any
computable function.
Theorem 1.8 (Sacks Splitting Theorem (1963)) Let B be a noncomputable c.e. set.
For any c.e. set A, there are low c.e. sets C and D such that
(1) C ∩D = ∅, A = C ∪D;
(2) B T C and B T D.
Theorem 1.8 says that any nonzero c.e. degree splits above 0. Robinson gener-
alized Sacks splitting theorem to the splitting of a given c.e. degree above a low c.e.
degree, which indicated that low c.e. degrees resemble degree 0.
Theorem 1.9 (Robinson Splitting Theorem (1971) [7]) Let L be a low c.e. set. For
any c.e. set A >T L, there are c.e. sets C and D such that
(1) C ∩D = ∅, A = C ∪D;
(2) A T C ⊕ L and A T D ⊕ L.
In 1964, Sacks proved that the c.e. degrees are dense, and the method used in
the proof is an infinite injury argument. That is, the injuries from higher priority
requirements can be infinite.
Theorem 1.10 (Sacks Density Theorem (1964)) For any two c.e. degrees a < b,
there is a c.e. degree c such that c ∈ (a,b).
6
![Page 17: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/17.jpg)
Chapter 1. Introduction
The same style of construction was used by Sacks to prove the existence of
incomplete high c.e. degrees. In 1966, Lachlan introduced another kind of infinite
injury arguments in his proof of the existence of minimal pairs. Here, a pair of
nonzero c.e. degrees a and b form a minimal pair, denoted as a ∩ b = 0, if 0 the
infimum of a and b, i.e., is the only c.e. degree below both a and b.
Theorem 1.11 (Lachlan (1966), Yates (1966)) There are c.e. degrees forming a
minimal pair.
Cooper proved in 1974 that any high c.e. degree bounds a minimal pair, and in
this sense, high c.e. degrees resemble 0′.
Theorem 1.12 (Cooper (1974) [8]) Any high c.e. degree bounds a minimal pair of
c.e. degrees.
Miller proved in 1981 in his thesis [9] that any high c.e. degree bounds a minimal
pair of high c.e. degrees. This work was published by Slaman and Shore in their
paper [10], where a new construction was provided.
Definition 1.5 A c.e. degree c is cappable if it is zero or a half of a minimal pair,
that is, there is a c.e. degree a > 0 such that c∩a = 0; otherwise, c is noncappable.
It is easy to prove that every nonzero c.e. degree bounds a nonzero cappable
degree, which needs a nonuniform proof. The dual of cappable degrees is called
cuppable degrees.
Definition 1.6 (1) A c.e. degree c is cuppable if there is a c.e. degree a < 0′
such that c∪a = 0′; otherwise, c is called noncuppable, i.e., for any c.e. degree
a < 0′, c ∪ a < 0′.
(2) A c.e. degree c is called low-cuppable if there is a low c.e. a with c ∪ a = 0′.
Theorem 1.13 (Harrington (1976)) Any high c.e. degree bounds a high noncup-
pable degree.
7
![Page 18: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/18.jpg)
Chapter 1. Introduction
Ambos-Spies, Jockusch, Shore and Soare proved in [11] that cappable degrees
form an ideal and noncappable degrees form a strong filter, providing a dichotomy
of c.e. degrees.
Theorem 1.14 (Ambos-Spies, Jockusch, Shore and Soare [11]) A c.e. degree is
noncappable iff it is low-cuppable (i.e., cups to 0′ via a low c.e. degree).
Lachlan proved in 1975 that Sacks splitting theorem and Sacks density the-
orem cannot be combined, where he developed a new technique, now known as
0′′′-arguments, a quite complicated construction of degrees.
Theorem 1.15 (Lachlan Nonsplitting Theorem (1975)) There are two c.e. degrees
a < b such that for any two c.e. degrees c,d, if b = c ∪ d, then b ≤ a ∪ c or
b ≤ a ∪ d.
Harrington later proved in his paper Understanding Lachlan’s monster paper
that Lachlan’s nonsplitting theorem can be strengthened as follows:
Theorem 1.16 (Harrington Nonsplitting Theorem (1980)) There exists a c.e. de-
gree a < 0′ such that 0′ cannot split above a.
1.2 Part I: Bounded-jump operator and the high/low
hierarchy
The notion of bounded-jump operator † was proposed by Anderson and Csima in
paper [1], where they tried to find an appropriate jump operator on wtt-degrees1.
For a set A, the bounded-jump of A is defined as the set
A† = e ∈ N : ∃i ≤ e[φi(e) ↓ & ΦAφi(e)e (e) ↓],
where A z:= x ∈ A : x ≤ z. Note that A† ≤T A ⊕ ∅′. In [1], Anderson and
Csima pointed out this bounded-jump operator † for wtt-reducibility behaves like
the Turing jump ′ for Turing reducibility, i.e., (1) ∅† and ∅′ are 1-equivalent, (2)
for any set A, A <wtt A†, and (3) for any sets A,B, if A ≤wtt B, then A† ≤wtt B
†.
1In paper [1], Anderson and Csima used b for the bounded-jump operator †.
8
![Page 19: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/19.jpg)
Chapter 1. Introduction
(2) implies that A† ≡T A when A ≥T ∅′. In the same paper, Anderson and Csima
proved an analogue of Shoenfield’s jump inversion theorem for this bounded-jump
operator †.
Say that a set A is bounded-low if A† ≤wtt ∅†, and bounded-high if A ≤wtt ∅†
and ∅†† ≤wtt A†. There are several immediate consequences: bounded-low sets
and bounded-high sets are all ω-c.e.; bounded-low sets are closed downwards under
wtt-reducibility; and bounded-high sets are closed upwards under wtt-reducibility
on ω-c.e. sets. Furthermore, bounded-low sets cannot be bounded-high because
A† ≤wtt ∅† implies A† <wtt A†† ≤wtt ∅††.
It is easy to see that A is bounded-low if and only if A† is ω-c.e. Thus, all superlow
sets are bounded-low, because for all superlow sets A, A† ≤1 A′ ≤tt ∅′ ≡1 ∅†. Also
note that ∅′ ≡1 ∅† is bounded-high, because ∅†† ≤wtt (∅′)†.
Proposition 1.2 (Bickford and Mills (1982) [12]) There are two superlow c.e. sets
A,B such that A⊕B ≡T ∅′.
The proposition above shows that there are two bounded-low sets whose join is
bounded-high, thus not bounded-low. One natural question is:
Question 1.2 (1) Whether bounded-low sets are closed downwards under Turing
reducibility?
(2) Similarly, whether bounded-high sets are closed upwards under Turing re-
ducibility on ω-c.e. sets?
For a superlow A, if B ≤T A, then B′ ≤1 A
′ ≤tt ∅′. Thus B is also superlow.
Superlow sets are closed downwards under Turing reducibility. Similarly, superhigh
sets are closed upwards under Turing reducibility.
In Chapter 2, we will give negative answer to Question 1.2 by constructing a
bounded low c.e. set which Turing computes ∅′. This tells us that the greatest c.e.
Turing degree 0′ contains both bounded-low c.e. sets and bounded-high c.e. sets,
and one easy consequence is:
Proposition 1.3 (1) There are bounded-low c.e. sets which are superhigh.
9
![Page 20: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/20.jpg)
Chapter 1. Introduction
(2) There are bounded-high c.e. sets which are superhigh.
Recently, in [2], Anderson, Csima and Lange initiated the study of comparing
the bounded-jump and the Turing jump, where they constructed high bounded-low
sets, and low bounded-high sets, showing that there is no direct relation between
these two jumps. Motivated by the fact that superlowness implies bounded-lowness,
they asked the following related questions:
Question 1.3 (Anderson, Csima and Lange [2])
(1) Does there exist a bounded-low set which is low but not superlow?
(2) Does there exist a bounded-high set which is high but not superhigh?
(3) Does there exist a superhigh set which is not bounded-high?
Question 1.3.(3) has positive answer because of the existence of bounded-low c.e.
sets which are superhigh.
Figure 1.2: Turing degrees of bounded-low sets
We will also provide positive answers to the other two questions. In chapter 2,
we will construct a bounded-low c.e. set which is low but not superlow directly.
In chapter 3, we show the existence of bounded-high sets which are high but not
superhigh by proving a pseudo-jump inversion theorem for bounded-high sets; we
will then prove a pseudo-jump inversion theorem for bounded-low c.e. sets, and this
implies the existence of bounded-low c.e. sets which are high but not superhigh.
10
![Page 21: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/21.jpg)
Chapter 1. Introduction
Figure 1.3: Turing degrees of bounded-high sets
Finally, we point out here that all bounded-high sets we constructed are ω-c.e.,
and that∅′ is the only bounded-high c.e. set we know. It seems not easy to construct
bounded-high c.e. sets, the questions related to constructions of bounded-high c.e.
sets are still open as far as we know. For example, the following two questions still
open.
Question 1.4 (Anderson and Csima [1]) Whether the analogue of Sacks’s jump
inversion is true or not? That is, for any set A with ∅† ≤wtt A ≤wtt ∅††, does there
exist a c.e. set C ≤wtt ∅† such that C† ≡wtt A?
Question 1.5 (Anderson, Csima and Lange [2]) Does there exist a low c.e. set
which is bounded-high?
1.3 Part II: Degrees of orders on torsion-free abelian
groups
An abelian group G = (G,+G , 0G ) is orderable if there is a linear order ≤G on G
such that for all x, y, z in G, x ≤G y implies x +G z ≤G y +G z; say ≤G is a group
order (or simply order) on G . It is known that an abelian group is orderable iff it
is torsion-free (Levi’s theorem). So we will restrict ourselves to torsion-free abelian
groups.
From an order ≤G on G , one can form the set P≤G:= g ∈ G : g ≥G 0G of all
positive elements under ≤G . P≤Gis a positive cone of ≤G . On the other hand, if
11
![Page 22: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/22.jpg)
Chapter 1. Introduction
X ⊆ G satisfies the following conditions: (1) X is a semigroup, (2) X∩−X = 0G ,
(3) X ∪ −X = G, where −X = −g : g ∈ X, then we can define an order ≤X by
x ≤X y ⇔ y − x ∈ X
and X is the positive cone of the order ≤X . Indeed, this entails a one-to-one
correspondence between orders and positive cones on G .
An abelian group G = (G,+G , 0G ) is computable if its domain G and addition
+G are both computable. Note that under this definition, the inverse function on G
is computable. If G is a computable torsion-free abelian group, we will use X(G ) to
denote the set of positive cones of G , and we will study Turing degrees of members
of X(G ). Note that for such a group G , P≤Gand ≤G are Turing equivalent.
Definition 1.7 A class C of sets is called a Π01 class if it can be represented as the
set of all infinite paths of some computable binary tree.
For a computable torsion-free abelian group G , the positive cones of G are defined
via Π01 conditions, and one can show that X(G ) can be represented as the set of all
infinite paths of a computable binary tree, which means that X(G ) is a Π01 class.
We are mainly interested in the degrees of members of X(G ), i.e., the degrees
of orders on G . Classical results on degrees of members of Π01 classes are due to
Jockusch and Soare [13] in 1972, where the low basis theorem and the hyperimmune-
free basis theorem are provided. These two basis theorems imply that every com-
putable torsion-free abelian group has orders of low degree, and of hyperimmune-free
degree, respectively.
Definition 1.8 For a torsion-free abelian group (G,+, 0G), g0, · · · gn ∈ G are lin-
early independent if for any a0, · · · an ∈ Z,
a0g0 + · · ·+ angn = 0G → a0 = · · · = an = 0.
An infinite subset B of G is linearly independent if any finite subset of B is linearly
independent. A maximal linearly independent set is called a basis of G.
12
![Page 23: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/23.jpg)
Chapter 1. Introduction
For 1 ≤ k ≤ ∞, let Qk denote the direct sum of k many copies of additive
group Q. In particular, Q∞ = ⊕i∈N
Q, its elements are just finite Q-linear sums over a
computable basis ei : i ∈ N, where ei = (· · · , 1, 0, · · · ) is the sequence whose i-th
column is 1 and all other columns are 0.
The rank of G, rank(G), is defined as the size of a basis which is the least number
k ≤ ∞ such that G embeds into Qk. Here are some easy examples:
• rank(Z) = rank(Q) = 1.
• rank(Z⊕ Z) = rank(Q⊕Q) = 2.
• Let G be the subgroup ofQ⊕Q generated by (1, 0), (0, 1), (12, 12). Elements of
G are of the form m(1, 0)+n(0, 1)+k(12, 12) with m,n, k ∈ Z. Then rank(G) =
2.
We use O(G ) to denote the set of all degrees of orders on a computable torsion-
free abelian group G . Solomon [14] proved the following results about O(G ):
(1) if rank(G ) = 1, then O(G ) contains exactly one degree 0;
(2) if 2 ≤ rank(G ) <∞, then O(G ) contains all degrees;
(3) if rank(G ) = ∞, then O(G ) contains all degrees ≥ 0′.
For a computable torsion-free abelian group G and a Π01 class C, we say X(G )
degree represents C if
O(G ) = deg(C) : C ∈ C,
where deg(C) is the Turing degree of C. Jockusch and Soare in [13] constructed an
infinite Π01 class, say S, in which any two distinct elements are Turing incomparable.
Then for any computable torsion-free abelian group G , O(G ) = deg(C) : C ∈ S,because either O(G ) = 0 or O(G ) ⊇ d : d ≥ 0′.
It turns out that the Π01 class of positive cones on computable torsion-free abelian
groups cannot degree represent all Π01 classes. However, an earlier result of Metakides
and Nerode [15] in 1979 showed that any Π01 class can be degree represented by the
Π01 class of positive cones on some computably formally real field in a much stronger
manner.
13
![Page 24: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/24.jpg)
Chapter 1. Introduction
For a computable torsion-free abelian group G with finite rank, we know that
O(G ) is either 0 or D, the set of all degrees. However, for a computable torsion-
free abelian group G with infinite rank, although O(G ) ⊇ d : d ≥ 0′, we don’t
know what the set O(G ) exactly is. Here are two related results:
• (Solomon [14]) If B is a basis of G , then d : d ≥ deg(B) ⊆ O(G ).
• (Kach, Lange, Solomon and Turetsky [3]) O(G ) must contain infinitely many
low degrees as well as infinitely many hyperimmune-free degrees.
In [3], Kach, Lange and Solomon considered the question whether O(G ) is up-
wards closed for a computable torsion-free abelian group G with infinite rank, and
provided a negative answer to it.
Theorem 1.17 (Kach, Lange and Solomon [3]) There is a computable torsion-free
abelian group G with infinite rank, and a noncomputable c.e. set C such that G has
exactly two computable orders and every C-computable order on G is computable.
G in Theorem 1.17 has no orders in deg(C), but has orders in 0. By deg(C) > 0,
O(G ) is not upwards closed.
Definition 1.9 A set C is called group-order-computable via G if G is a computable
torsion-free abelian group with infinite rank which admits computable orders, and
every C-computable order on G is computable. C is group-order-computable if it is
group-order-computable via some G .
Definition 1.10 A Turing degree c is called group-order-computable if it contains
a set C which is group-order-computable.
0 is obviously group-order-computable, and group-order-computable degrees are
downwards closed. On the one hand, Kach, Lange and Solomon’s theorem above
implies the existence of nonzero c.e. group-order-computable degrees, and hence
can be low. In his thesis [16], C. J. Martin showed the existence of high c.e. degrees
which are group-order-computable. On the other hand, any a ≥ 0′ cannot be group-
order-computable because every computable torsion-free abelian group with infinite
rank has an order of degree a.
Our main objective in chapter 4 is to investigate the characterization of group-
order-computable degrees.
14
![Page 25: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/25.jpg)
Chapter 1. Introduction
Definition 1.11 A set C is said to be weakly group-order-computable via a com-
putable torsion-free abelian group G with infinite rank if every C-computable order
on G is computable. C is weakly group-order-computable if C is weakly group-order-
computable via some G .
A Turing degree is weakly group-order-computable if it contains a weakly group-
order-computable set. Clearly, group-order-computable degrees are weakly group-
order-computable. We will show that these two families of degrees, and also non-
PA-degrees, coincide.
A set is called PA-complete if it computes a complete extension of Peano Arith-
metic. An equivalent definition of PA-complete sets is that:
• a set A is PA-complete iff it computes a 0, 1-valued diagonally nonrecursive
function,
where a function f is diagonally nonrecursive if ∀x[φx(x) ↓→ f(x) = φx(x)]. A
degree is PA if it contains a PA-complete set. The notion of PA-degrees plays a
vital role in the study of randomness. For example, Stephan [17] proved that a PA
degree a is Martin-Lof random iff a ≥ 0′.
The following facts for PA-degrees are well-known:
Proposition 1.4 (Scott and Solovay [18]) Let a be a Turing degree. The following
are equivalent:
(1) a computes a complete extension of Peano Arithmetic.
(2) a computes a consistent extension of Peano Arithmetic.
(3) Each Π01 class contains an a-computable element.
We first characterize weakly group-order-computable degrees in terms of PA-
degrees.
Proposition 1.5 Let a be a Turing degree. The following are equivalent.
(1) a is a PA degree.
15
![Page 26: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/26.jpg)
Chapter 1. Introduction
(2) a is not weakly group-order-computable.
Proof: (1) ⇒ (2). Let a be a PA degree, and G be a computable torsion-free
abelian group with infinite rank (not necessarily possessing computable orders). We
only need to show that G has an a-computable order which is not computable.
Martin proved in [16] that X(G ) has a Π01 subclass, say C(G ), containing no
computable orders. As a computes a positive cone in C(G ), G has an a-computable
order which is not computable.
(2) ⇒ (1). We first mention a result of Hatzikiriakou and Simpson [19] in reverse
mathematics: the statement “every countable torsion-free abelian group is orderable”
is equivalent to WKL0 over RCA0. This result has a consequence that there is a
computable torsion-free abelian group, say G0, with a property that all orders of it
are of PA degree. So G0 has no computable orders, hence the rank of G0 is infinite.
By definition, a degree a is not weakly group-order-computable, if any com-
putable torsion-free abelian group with infinite rank has an a-computable order
which is not computable. In particular, G0 has an a-computable order, and hence a
computes an order on G0, which is of PA degree. This implies that a itself is a PA
degree.
By Proposition 1.5, all PA-degrees are not group-order-computable. We will
construct in chapter 4 a computable torsion-free abelian group G with infinite rank
such that for any set A, G admits exactly two A-computable orders iff A is not
PA-complete.
As computable sets are not PA-complete, G above admits exactly two com-
putable orders. Then for any set A which is not PA-complete, every A-computable
order on G is computable; for any set A which is PA-complete, A computes a
noncomputable order on G . This shows that for any degree a, if it is now not
group-order-computable, then it is a PA degree. Hence, a degree is PA iff it is not
weakly group-order-computable iff it is not group-order-computable.
At the end of [3], by applying the low basis theorem of Π01 classes infinitely many
times, Kach, Lange, Solomon and Turetsky showed that every computable torsion-
free abelian group of infinite rank has orders of infinitely many low degrees. We
would like to know whether G in Theorem 1.17 has orders of other degrees:
16
![Page 27: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/27.jpg)
Chapter 1. Introduction
Question 1.6 Given a nonzero c.e. degree a, can we build a group G such that:
(1) it has exactly two computable orders, (2) G has an order of degree a, and (3)
there is a noncomputable c.e. C such that every C-computable group order on G is
computable?
We will give a positive answer to Question 1.6 in chapter 5. Our results show
that for any nonzero c.e. degree a, there is a nonzero c.e. degree c < a, and a
computable torsion-free abelian group G such that G has orders of degree ≥ a but
has no incomputable orders of degree ≤ c.
1.4 Part III: Reverse mathematics, abelian groups
and modules
In this part, we study reverse mathematics of some classic theorems in module
theory. We first briefly introduce common subsystems of second order arithmetic
studied in reverse mathematics. L2, the language of second order arithmetic, con-
tains two-sorted variables, namely, number variables and set variables. The full
system Z2 of second order arithmetic contains basic axioms of ordered semiring of
natural numbers, induction axioms of sets, i.e., for any set X,
(0 ∈ X ∧ (n ∈ X → n+ 1 ∈ X)) → ∀n(n ∈ X),
and comprehension axioms of formulas φ(n) in L2, i.e.,
∃X∀n(n ∈ X ↔ φ(n)),
where X does not occur freely in φ.
Many theorems in non-set-theoretic mathematics are classified by five big sub-
systems of Z2, i.e., RCA0, WKL0, ACA0, ATR0 and Π11-CA0. Simpson’s book [20]
provides a comprehensive introduction of these five subsystems. We introduce RCA0
and ACA0 in detail here, as we will mainly work with these two subsystems.
RCA0 contains basic axioms of ordered semiring of natural numbers, Σ01-induction
and ∆01-comprehension. Σ0
1-induction is the axiom of the following form with φ re-
stricted to Σ01 formulas:
(φ(0) ∧ (φ(n) → φ(n+ 1))) → ∀nφ(n).
17
![Page 28: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/28.jpg)
Chapter 1. Introduction
∆01-comprehension is the axiom of the following form with φ restricted to ∆0
1 for-
mulas:
∃X∀n(n ∈ X ↔ φ(n)),
where X does not occur freely in φ.
ACA0 contains basic axioms of ordered semiring of natural numbers, induction
axioms of sets, and Σ0k-comprehension for all k. Σ0
k-comprehension axioms say
∃X∀n(n ∈ X ↔ φ(n)),
where φ is a Σ0k-formula and X does not occur freely in φ(n).
The following theorem is widely used in reverse mathematics when proving a
theorem in ordinary mathematics implies ACA0.
Theorem 1.18 The following are equivalent over RCA0.
(1) ACA0;
(2) Let f : N → N be a one-to-one function, then the range of f exists.
We now define basic concepts of module theory using the language L2 of second
order arithmetic.
Definition 1.12 (RCA0) Let R be a commutative ring with identity 1R, a module
M over R is an abelian group together with a scalar operation from R×M to M ,
satisfying for all m,m1,m2 ∈M and r, r1, r2 ∈ R,
M1. (r1 + r2) m = r1 m+ r2 m;
M2. (r1r2) m = r1 (r2 m);
M3. 1R m = m;
M4. r (m1 +m2) = r m1 + r m2.
For convenience, we write rm for r m.
Definition 1.13 (RCA0) Let M1 and M2 be two R-modules. A map φ :M1 →M2
is a R-module homomorphism if for any x, y ∈M1 and r ∈ R, φ(x+y) = φ(x)+φ(y),
φ(rx) = rφ(x).
18
![Page 29: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/29.jpg)
Chapter 1. Introduction
Definition 1.14 (RCA0) Let φ : A → B and ψ : B → C be two R-module homo-
morphisms. The sequence Aφ→ B
ψ→ C is exact at B if ker(ψ) = im(φ). Moreover,
if φ is a monomorphism and ψ is a surjective homomorphism, then the sequence
0 → Aφ→ B
ψ→ C → 0
is also exact at A, C, and often called a short exact sequence.
We only consider countable modules over a commutative ring with identity and
mainly deal with infinite modules whose domain are subsets of N. Within RCA0,
the set N<N of all codes of finite sequences of natural numbers exists (see [20] for
more details). The symbol ⟨x0, x1, · · · , xn⟩ denotes the unique code of a sequence
of natural numbers of length n+ 1, we often identify a sequence with its code.
For a sequence σ, lh(σ) denotes the length of σ. We use λ to denote the empty
sequence, and lh(λ) = 0. For a nonempty sequence σ, lh(σ) ≥ 1, and we often write
σ = ⟨σ(0), σ(1), · · · , σ(lh(σ)−1)⟩. For two sequences σ, τ , the concatenation σaτ of
them is just the sequence ⟨σ(0), σ(1), · · · , σ(lh(σ)−1), τ(0), τ(1), · · · , τ(lh(τ)−1)⟩.
Definition 1.15 (RCA0) For 0 ≤ i ≤ n, let (Mi,+Mi, Mi, 0Mi
) be a R-module.
The direct sum⊕
0≤i≤nMi of modules Mi(0 ≤ i ≤ n) is a R-module containing finite
sequences of length n+1 of the form ⟨m0,m1, · · · ,mn⟩ with each mi ∈Mi, together
with componentwise addition
⟨m0, · · · ,mn⟩+ ⟨m′0, · · · ,m′
n⟩ = ⟨m0 +M0 m′0, · · · ,mn +Mn m
′n⟩
for abelian groups and componentwise scalar multiplication
r⟨m0, · · · ,mn⟩ = ⟨r M0 m0, · · · , r Mn mn⟩
for modules. The zero of⊕
0≤i≤nMi is ⟨0M0 , 0M1 , · · · , 0Mn⟩. If Mi =M for all 0 ≤ i ≤
n, we often use Mn+1 to denote⊕
0≤i≤nM .
In general, as in Solomon [21], we can define the direct sum of countably many R-
modules as a module whose nonzero elements are finite sequences with last column
nonzero, and zero element is just the empty sequence.
19
![Page 30: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/30.jpg)
Chapter 1. Introduction
Definition 1.16 (RCA0) Let Mi(i ∈ N) be R-modules. The direct sum⊕i∈NMi is
a R-module containing finite sequences of the form ⟨m0,m1, · · · ,mn⟩ with n ∈ N,mi ∈ Mi for 0 ≤ i ≤ n, mn = 0Mn, and the empty sequence, together with compo-
nentwise addition and componentwise scalar multiplication. Empty sequence is the
zero element of⊕i∈NMi. We simply write
⊕i∈NM (or M∞) for
⊕i∈NMi when Mi = M
for all i ∈ N.
Definition 1.17 (RCA0) A short exact sequence 0 → Aµ→ B
ε→ C → 0 splits if
there exists a homomorphism σ : C → B such that εσ is the identity homomorphism
on C. σ is called a splitting for this short exact sequence.
Lemma 1.2 (RCA0) If the short exact sequence 0 → Aµ→ B
ε→ C → 0 splits with
a splitting σ : C → B, then B ∼= A⊕ C. Moreover, B = µ(A)⊕ σ(C).
Proof: Define a map ψ : A⊕ C → B; ⟨a, c⟩ 7→ µ(a) + σ(c). We now show that ψ
is an isomorphism between A⊕ C and B.
For any a, a′ ∈ A, c, c′ ∈ C, and r ∈ R,
ψ(⟨a, c⟩+ ⟨a′, c′⟩) = ψ(⟨a+ a′, c+ c′⟩)
= µ(a+ a′) + σ(c+ c′)
= µ(a) + µ(a′) + σ(c) + σ(c′)
= ψ(⟨a, c⟩) + ψ(⟨a′, c′⟩)
and
ψ(r⟨a, c⟩) = ψ(⟨ra, rc⟩) = µ(ra) + σ(rc) = rµ(a) + rσ(c) = rψ(⟨a, c⟩).
So ψ is a R-module homomorphism.
ψ is injective. First, ψ(⟨a, c⟩) = µ(a) + σ(c) = 0 implies 0 = ε(µ(a) + σ(c)) =
0 + εσ(c) = c. Then µ(a) = 0, and this implies a = 0. So ⟨a, c⟩ = 0.
ψ is surjective. For any b ∈ B, ε(b) ∈ C and ψ(⟨0, ε(b)⟩) = σε(b), εσε(b) = ε(b).
So σε(b)−b ∈ ker(ε) = im(µ). Then there exists an a ∈ A such that µ(a) = σε(b)−b,and then b = µ(a) + σε(b) = ψ(⟨a, ε(b)⟩). This also implies that B = µ(A) + σ(C).
Now we show B = µ(A)⊕ σ(C). It is enough to prove µ(A) ∩ σ(C) = 0. Letb ∈ B. Assume b = µ(a) = σ(c) for some a ∈ A and c ∈ C. Then ψ(⟨a,−c⟩) =
20
![Page 31: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/31.jpg)
Chapter 1. Introduction
µ(a)− σ(c) = 0. Similarly, 0 = ε(µ(a)− σ(c)) = 0− εσ(c) = −c. Then c = 0, and
thus b = 0.
In Chapter 6, we first consider reverse mathematics of divisible abelian groups.
Definition 1.18 (RCA0) Let G be an abelian group, and g ∈ G.
(1) g is torsion if there is a natural number n ≥ 1 such that ng = 0G.
(2) The order o(g) of an element g ∈ G is the least natural number n ≥ 1 such
that ng = 0G if g is torsion, and ∞ otherwise.
An abelian group G is torsion if any element of G has a finite order, and torsion-
free if any nonzero element of G has an infinite order. Notions like torsion groups,
torsion-free groups are all definable within RCA0.
Definition 1.19 (RCA0) An abelian group G is divisible if for every g ∈ G and for
every nonzero n ∈ N, there is a g′ ∈ G such that g = ng′.
For a prime number p, Z(p∞) = npm
: m,n ∈ Z/Z exists in RCA0.
We will prove that over RCA0, the following are equivalent:
(1) ACA0.
(2) Every divisible subgroup of an abelian group is a direct summand.
(3) Every torsion-free abelian group has the largest divisible subgroup.
(4) Every divisible abelian group is isomorphic to a direct sum of the form⊕n∈I
(Z(p∞n ))ln ⊕⊕n∈J
Q for some I, J ⊆ N, and if I = ∅, for each n ∈ I,
1 ≤ ln ≤ ∞.
For an R-module M and a subset A of M , the set
⟨A⟩ = r0a0 + · · ·+ rnan : n ∈ N, 0 ≤ i ≤ n, ri ∈ R, ai ∈ A
of R-linear combinations of elements of A forms a submodule of M . If M = ⟨A⟩,we say A generates M or A is a set of generators of M .
A finite set m0,m1, · · · ,mn of M is linearly independent if for any ri ∈ R, 0 ≤i ≤ n, r0m0 + · · · + rnmn = 0 implies ri = 0 for all 0 ≤ i ≤ n. An infinite subset
A of M is linearly independent if any finite subset of A is linearly independent. A
R-module M has a basis B if B is linearly independent and B generates M .
21
![Page 32: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/32.jpg)
Chapter 1. Introduction
Definition 1.20 (RCA0) A R-module is free if it has a basis.
Proposition 1.6 (RCA0) Let F be a free R-module with an infinite basis, say B =
bi : i ∈ N. Then F is isomorphic to⊕i∈NR.
Proof: Let ci = ⟨0, · · · , 0, 1R⟩ ∈⊕i∈NR of length i + 1. That is, the j-th column is
the zero element of R for j ≤ i− 1 and the i-th column is the identity of R. Then
ci : i ∈ N is a basis of⊕i∈NR. Define φ : F →
⊕i∈NR by φ(
∑0≤i≤n
ribi) =∑
0≤i≤nrici for
any n ∈ N and ri ∈ R with 0 ≤ i ≤ n.
Proposition 1.7 (RCA0) Let M be a R-module. Then M is isomorphic to a quo-
tient of the free module F =⊕i∈NR.
Proof: List M as m0,m1, · · · . Define a map φ : F →M as follows: first, for all i,
φ(ci) = mi, where ci = ⟨0, · · · , 0, 1R⟩ of length i+1; second, extend φ linearly to all
elements of F . That is, φ(∑
0≤i≤nrici) =
∑0≤i≤n
rimi. As φ is surjective,M ∼= F/ker(φ),
where ker(φ) = x ∈ F : φ(x) = 0.
Proposition 1.8 (RCA0) Let F =⊕i∈NR. For every surjective homomorphism
ε : B → C of R-modules and every homomorphism φ : F → C, there exists a
homomorphism ψ : F → B such that φ = εψ.
Proof: Let c0, c1, · · · be a basis of F . For each φ(ci) ∈ C, find an element di of B
such that ε(di) = φ(ci). Define for all i ∈ N, ψ(ci) = di.
Definition 1.21 (RCA0) Let P be a R-module. P is called projective if for every
surjective homomorphism ε : B → C of R-modules and every homomorphism φ :
P → C, there exists a homomorphism ψ : P → B such that φ = εψ.
The following proposition is an immediate consequence of Proposition 1.8.
Proposition 1.9 (Yamazaki [22])(RCA0) A free R-module is projective.
Theorem 1.19 (Yamazaki [22]) Over RCA0, a R-module is projective iff it is iso-
morphic to a direct summand of a free R-module.
22
![Page 33: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/33.jpg)
Chapter 1. Introduction
A free R-module is projective, but the converse fails in general. However, clas-
sically, for a principal ideal domain R, projective R-modules are always free.
Definition 1.22 (RCA0) A commutative ring R with identity 1R is an integral
domain if it has no zero divisors, that is, for any a, b ∈ R− 0, ab = 0.
Downey, Lempp and Mileti in [23] showed that there is a computable integral
domain, say S, which is not a field such that S has no computable non-trivial proper
ideals which are finitely generated. In particular, S has no computable non-trivial
proper ideals which are principal. Hence, within RCA0, one cannot show that any
integral domain which is not a field has a principal non-trivial proper ideal. Indeed,
Downey, Lempp, and Mileti [23] proved that the statement that “every commutative
ring which is not a field has a finitely generated nontrivial proper ideal” is equivalent
to ACA0 over RCA0. This result of Downey, Lempp, and Mileti also implies that
“every commutative ring which is not a field has a principal non-trivial proper ideal”
is equivalent to ACA0 over RCA0, refer to Sato’s thesis [24] (Theorem 6.11).
In reverse mathematics, to prove basic properties on principal ideal domains
(PIDs) even within weak systems like RCA0, we had better to define a PID as an
integral ideal domain whose Σ01-ideals are generated by one element. Such PIDs are
known as Σ01-PIDs, refer to Simpson [25] and Sato [24] for more details.
Definition 1.23 (RCA0)
(1) Let R be a commutative ring with 1R. A sequence ⟨rn : n ∈ N⟩ ⊆ R is a
Σ01-ideal if for any i, j ∈ N, there is a k ∈ N such that rk = ri+ rj and for any
i ∈ N and s ∈ R, there is a j ∈ N such that rj = ris.
(2) An integral domain R is a Σ01-PID, if for any Σ0
1-ideal I of R, there is an
element r ∈ I such that I = (r), the ideal generated by r.
We will prove in Section 7.1 some results related to projective modules within
ACA0. In particular, we will show that ACA0 proves:
(1) every projective module over a Σ01-PID is free;
(2) every submodule of a projective module over a Σ01-PID is projective.
23
![Page 34: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/34.jpg)
Chapter 1. Introduction
As a dual to projective modules, we have the following definition for injective
modules.
Definition 1.24 (RCA0) Let I be a R-module. I is injective if for any monomor-
phism µ : A→ B and any homomorphism φ : A→ I, there exists a homomorphism
ψ : B → I such that φ = ψµ.
The following classical lemma for injective modules is known as Baer’s criterion.
Lemma 1.3 (Baer’s Criterion) A module I over a commutative ring R with 1R is
injective iff for every ideal J of R and every R-module homomorphism f : J → I,
there is a homomorphism g : R → I such that g J= f .
Proposition 1.10 (RCA0) A module I over a commutative ring R with 1R is in-
jective implies for every ideal J of R and every R-module homomorphism f : J → I,
there is a homomorphism g : R → I such that g J= f .
Theorem 1.20 (Yamazaki [22]) The following are equivalent over RCA0.
(1) ACA0.
(2) If for every ideal J of R and every R-module homomorphism f : J → I, there
is a homomorphism g : R → I such that g J= f , then I is injective.
Definition 1.25 (RCA0) Let R be an integral domain. A R-module D is divisible
if for every d ∈ D and nonzero r ∈ R, there is a c ∈ D such that d = rc.
Classically, a module over a principal ideal domain is injective iff it is divisible.
Proposition 1.11 (RCA0) An injective module I over an integral domain R is
divisible.
Proof: For any nonzero r ∈ R and d ∈ I, let µ : R → R; 1R 7→ r and φ : R →I; 1R 7→ d. As µ(r′) = r′r = 0 implies r′ = 0, µ is a monomorphism. As I is an
injective R-module, there is a homomorphism ψ : R → I such that φ = ψµ. Now
d = φ(1R) = ψµ(1R) = ψ(r) = rψ(1R) with ψ(1R) ∈ I.
The following theorem about reverse mathematics of divisible abelian groups is
due to Friedman, Simpson and Smith [26] and can be found in Simpson’s book [20].
24
![Page 35: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/35.jpg)
Chapter 1. Introduction
Theorem 1.21 [26] The following are equivalent over RCA0.
(1) ACA0.
(2) Every divisible abelian group is injective.
In Section 7.2, we will extend Theorem 1.21 to modules, and show that the
statement that “every divisible module over a Σ01-PID is injective” is equivalent to
ACA0 over RCA0. We will also show that ACA0 proves the statement that “every
quotient of an injective module over a Σ01-PID is injective”.
25
![Page 36: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/36.jpg)
Part I
Bounded-jump operator and thehigh/low hierarchy
26
![Page 37: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/37.jpg)
Chapter 2
A bounded-low c.e. set which islow, but not superlow
In this chapter, we will answer two questions raised by Anderson, Csima and Lange
in [2] by proving: (1) there is a bounded-low c.e. set which is low, but not superlow;
(2) 0′ contains a bounded-low c.e. set.
Anderson, Csima and Lange considered in [2] the interaction between the bounded-
jump operator and the Turing jump, and constructed a high bounded-low set. They
asked whether bounded-lowness and superlowness agree with each other on low c.e.
sets. We will give a negative answer to this question by showing the existence of
bounded-low c.e. sets which are low, but not superlow.
Theorem 2.1 There are low c.e. sets which are bounded-low but not superlow.
After seeing that superlow sets are always bounded-low, Anderson, Csima and
Lange [2] asked whether any superhigh set is also bounded-high. Our second result
in this chapter will provide a negative answer to this question. That is, we show the
existence of bounded-low c.e. sets which are of degree 0′. Thus, such bounded-low
c.e. sets are superhigh.
Theorem 2.2 0′ contains a bounded-low c.e. set.
We will give a proof of Theorem 2.1 first, and then prove Theorem 2.2 in Section
2.4.
To prove Theorem 2.1, we will construct a low c.e. set A such that A† is ω-c.e.
(so A is bounded-low), and A′ is not ω-c.e. (so A is not superlow). One approach
27
![Page 38: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/38.jpg)
Chapter 2. A bounded-low c.e. set which is low, but not superlow
of constructing a set low, but not superlow, is to apply Sacks splitting theorem, to
split ∅′ into two low c.e. sets A and B. A and B cannot both be superlow, as if A is
superlow, then ∅′ is wtt-reducible to B [by a theorem of Bickford and Mills in [12]].
In same paper [12], Bickford and Mills also pointed out that there are superlow c.e.
sets A and B such that A⊕B computes ∅′. Most of the results in [12] can be found
in Nies’ book [27].
One feature of Sacks splitting is that there is no effective bound on the number of
injuries from a strategy with higher priority, and hence we cannot have a recursive
bound on the number of changes of A′(e) in advance. It also turns out to be an
obstacle for us to obtain a bounded-low c.e. set which is low, but not superlow, by
using Sacks splitting. Instead, we will construct a low, but not superlow, c.e. set
directly.
2.1 Requirements and strategies
We will construct a c.e. set A meeting the following requirements:
Le : If there are infinitely many stages s such that ΦAe (e)[s] ↓, then ΦA
e (e) ↓.
Re : The number of changes of A† at e is bounded by 2(e+ 1)2.
P⟨i,j⟩ : If φi and φ2j are both total, then there is some x such that either
A′(x) = limt→∞
φ2j(x, t)
or
|t ∈ N : φ2j(x, t) = φ2
j(x, t+ 1)| ≥ φi(x).
Here, φi : i ∈ N and φ2j : j ∈ N are standard enumerations of all partial
computable functions in one variable and two variables respectively, Φe : e ∈ N is
a standard enumeration of all partial computable functionals, and ⟨·, ·⟩ is an effective
bijection between N2 and N.
We assign the priority of requirements in our finite injury construction as
L0 ≺ R0 ≺ P0 ≺ L1 ≺ R1 ≺ P1 ≺ · · · ≺ Le ≺ Re ≺ Pe ≺ · · · .
28
![Page 39: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/39.jpg)
Chapter 2. A bounded-low c.e. set which is low, but not superlow
If all the L-requirements are satisfied, then A is low. If all the R-requirements are
satisfied, then the whole construction will ensure that A† is ω-c.e., which ensures
that A is bounded-low. If all the P-requirements are satisfied, then A′ is not ω-c.e.,
and hence, A is not superlow.
The strategy of satisfying one Le is standard, i.e., we will set restraints to preservethe desired computations we have seen and this strategy can only be injured by P-
strategies with higher priority, which will happen at most finitely many times. Thus,
after a stage large enough, after which no P-strategies with higher priority act, if
the strategy sets restraints to preserve computations, these computations will be
preserved forever, and Le is satisfied.
The strategy for satisfying one Re is also to set restraints to preserve compu-
tations. At each stage s, when we see that φi(e) converges, where i ≤ e, we set a
restraint to protect A φi(e). Note that P-strategy with higher priority can injure
Re by enumerating small numbers x into A. But as φi(e) will be fixed, once Penumerates x into A, P selects a new number, x′ say, bigger than φi(e), and the
further enumeration of x′ will not injure Re [as this enumeration will not affect
the computation ΦAφi(e)e (e) if Φ
Aφi(e)e (e) converges]. Note that there are at most
e+1 many such restraints, and each P-strategy with higher priority can enumerate
numbers less than φi(e) at most once, the total number of such enumerations is at
most (e + 1)2. As one such an enumeration entails at most two changes of A†(e),
the number of changes of A†(e) is bounded by 2(e+ 1)2.
We now describe how to satisfy a P⟨i,j⟩-requirement. As in [27] for the construc-
tion of nonsuperlow sets, we will apply the recursion theorem for the construction.
That is, our construction will be uniform in parameters, r say, and in the r-th con-
struction, we will build a partial computable functional Γr, a c.e. set of axioms
⟨σ, n,m⟩, where if ⟨σ, n,m⟩ is enumerated into Γr at stage s, ΓAr (n)[s] is defined as
m with use As γAr (n)[s]= σ. From Γr, if Γr =Wr, we can have a computable function
pr such that
∀X ∀x[ ΓXr (x) ≃ ΦXpr(x)(pr(x)) ].
This will ensure that ΓAr (x) ↓⇐⇒ pr(x) ∈ A′. Hence, by controlling ΓAr , we can
defeat φ2j being an approximation of A′ with number of changes bounded by φi.
29
![Page 40: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/40.jpg)
Chapter 2. A bounded-low c.e. set which is low, but not superlow
Since the construction is uniform in r, there is a computable function g such
that Γr = Wg(r). By recursion theorem, there is a r0 such that Wg(r0) = Wr0 , i.e.,
Γr0 = Wr0 . In the following, assume that we are in the r0-th construction, just fix
the computable function pr0 in advance.
A P⟨i,j⟩-strategy proceeds as follows:
(i) Choose a fresh witness x, let z = pr0(x).
(ii) Wait for φi(z) ↓ at some stage s.
(If we wait at (2) forever, then φi(z) ↑, and φi is partial and P⟨i,j⟩ is satisfied.)
(iii) Set N = φi(z) + 1, and run the following modules C(n) and D(n) for n ≤N . We start with C(0) in which case φ2
j(z, 0) ↓= 1 or D(0) in which case
φ2j(z, 0) ↓= 0, and let ℓ(−1) = 0. We will end when reaching C(N) or D(N),
because this shows that φi(z) cannot bound the number of changes of φ2j(z, q),
showing that P⟨i,j⟩ is satisfied.
C(n): There is a q1 > ℓ(n − 1) such that φ2j converges (at stage s) to 1 on all
(z, q) with ℓ(n−1) < q ≤ q1, and for those q2 with q1 < q2 ≤ s, if φ2j(z, q2)
converges at stage s, then φ2j(z, q2) = 1.
If such a q1 does not exist, then do nothing.
– If this is because of the fact that φ2j(z, ℓ(n− 1)+ 1) never converges,
then φ2j is partial and P⟨i,j⟩ is satisfied.
– If it is because of the existence of q2 with φ2j(z, q2) = 0, then wait for
a bigger stage at which φ2j(z, q) converges for all q ≤ q2, leave C(n)
with no actions and switch to D(n+ 1) with ℓ(n) = q2.
(Again, if φ2j(z, q) never converges for some q < q2 , then φ
2j is partial
and P⟨i,j⟩ is satisfied.)
That is, at stage s, we guess that φ2j(z, q) has limit 1, and we should not
keep such a guess if we see φ2j(z, q) converges to 0 after ℓ(n− 1).
Action for C(n): If ΓAr0(x) has definition at stage s− 1, then enumerate
γr0(x) into A, to undefine ΓAr0(x). Otherwise, do nothing.
30
![Page 41: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/41.jpg)
Chapter 2. A bounded-low c.e. set which is low, but not superlow
– Wait for a stage t > s such that ΦAz (z)[t] diverges.
(For r0-th construction, such a stage t exists, because otherwise, we
would have ΓAr0(x) diverges, but ΦAz (z) converges.)
– Wait for a bigger stage at which we see that φ2j(z, q3) converges to
0, where q3 ≥ q1, and φ2j(z, q) converges for all q ≤ q3. Let ℓ(n) = q3
and switch to D(n+ 1).
(Again, if φ2j(z, q) never converges for some q < q3 , then φ
2j is partial
and P⟨i,j⟩ is satisfied. Or, if φ2j(z, q) converges to 1 for all q ≥ q1,
then limx→∞
φ2j(z, q) = 1, while z ∈ A′, meaning that lim
x→∞φ2j(z, q) is not
the characteristic function of A′, and P⟨i,j⟩ is satisfied.)
D(n): There is a q1 > ℓ(n − 1) such that φ2j converges (at stage s) to 0 on all
(z, q) with ℓ(n−1) < q ≤ q1, and for those q2 with q1 < q2 ≤ s, if φ2j(z, q2)
converges at stage s, then φ2j(z, q2) = 0.
If there is no such a q1, then do nothing.
– If this is because of the fact that φ2j(z, ℓ(n− 1)+ 1) never converges,
then φ2j is partial and P⟨i,j⟩ is satisfied.
– If it is because of the existence of q2 with φ2j(z, q2) = 1, then wait
for a bigger stage at which φ2j(z, q) converges for all q ≤ q2, leave
D(n) with no actions and switch to C(n+1) with ℓ(n) = q2. (Again,
if φ2j(z, q) never converges for some q < q2 , then φ2
j is partial and
P⟨i,j⟩ is satisfied.)
That is, at stage s, we guess that φ2j(z, q) has limit 0, and we should not
keep such a guess if we see φ2j(z, q) converges to 1 after ℓ(n− 1).
Action for D(n): If ΓAr0(x) has no definition at stage s− 1, define ΓAr0(x)
with use γr0(x) big.
– Wait for a stage t > s such that ΦAz (z)[t] converges.
(For r0-th construction, such a stage t exists, because otherwise, we
would have ΓAr0(x) converges, but ΦAz (z) diverges.)
31
![Page 42: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/42.jpg)
Chapter 2. A bounded-low c.e. set which is low, but not superlow
– Wait for a bigger stage at which we see that φ2j(z, q3) converges to
1, where q3 ≥ q1, and φ2j(z, q) converges for all q ≤ q3. Let ℓ(n) = q3
and switch to C(n+ 1).
(Again, if φ2j(z, q) never converges for some q < q3 , then φ
2j is partial
and P⟨i,j⟩ is satisfied. Or, if φ2j(z, q) converges to 0 for all q ≥ q1,
then limx→∞
φ2j(z, q) = 0, while z ∈ A′, meaning that lim
x→∞φ2j(z, q) is not
the characteristic function of A′, and P⟨i,j⟩ is satisfied.)
Thus, a P⟨i,j⟩-strategy either waits at some C(n) or D(n) for some n < N , or
reaches C(N) or D(N), both of which will show that P⟨i,j⟩ is satisfied, as explained
above. Thus, in the construction, a P⟨i,j⟩-strategy can injure those strategies with
lower priority at most finitely often.
2.2 Construction
Construction of A.
Stage 0: Let A0 = ∅, and initialize all strategies.
Stage s > 0: Find a requirement with the highest priority, Q say, among
L0 ≺ R0 ≺ P0 ≺ · · · Ls ≺ Rs ≺ Ps
that requires attention at stage s, and act accordingly.
Say that Le requires attention at stage s if ΦAe (e)[s − 1] ↑ and ΦA
e (e)[s] ↓. Say
Re requires attention at stage s if there is a n ≤ e ≤ s such that φn(e) ↓ at stage s
and Re has not set A-restraint φn(e) yet.
For both cases, we act as follows:
Action: Set A-restraint as s, and initialize all strategies with lower priority.
Say that P⟨i,j⟩ requires attention at stage s if one of the following applies:
(i) P⟨i,j⟩ has no witness currently.
Action: Pick a fresh number x as a witness for P⟨i,j⟩.
32
![Page 43: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/43.jpg)
Chapter 2. A bounded-low c.e. set which is low, but not superlow
(ii) x is selected, pr0(x) converges to z, φi(z)[s] ↓ and N is not defined yet.
Action: Definite N as φi(z) + 1.
(iii) N is defined, P⟨i,j⟩ is not in C(n) or D(n) for any n ≤ N , and φ2j(z, 0)[s]
converges.
Action: Let P⟨i,j⟩ start by running C(0), if φ2j(z, 0)[s] ↓= 1, or D(0), if
φ2j(z, 0)[s] ↓= 0. Here we let ℓ(−1) = 0.
(iv) P⟨i,j⟩ switches from C(n) to D(n+ 1), where n+ 1 < N .
Action: If ΓA(x) has no definition at stage s−1, then define ΓA(x)[s] = 0 with
use γ(x)[s] larger than all numbers used before.
(v) P⟨i,j⟩ switches from D(n) to C(n+ 1), where n+ 1 < N .
Action: If ΓA(x) has definition at stage s − 1, then enumerate γ(x) into A,
undefining ΓA(x).
(vi) P⟨i,j⟩ switches from C(N − 1) to D(N) or from D(N − 1) to C(N).
Action: Declare that φi(z) cannot bound the number of changes of φ2j(z, q),
and that P⟨i,j⟩ is satisfied.
If P⟨i,j⟩ acts as above, then all strategies with lower priority are initialized.
This ends the construction of A at stage s.
2.3 Verification
Lemma 2.1 For each requirement, Q say,
(1) Q can be initialized at most finitely often;
(2) Q acts at most finitely often and is satisfied;
(3) The restraint set by Q is finite, and Q can initialize all strategies with lower
priority finitely often.
33
![Page 44: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/44.jpg)
Chapter 2. A bounded-low c.e. set which is low, but not superlow
Proof: We will show that for each e, (1)-(3) are true for all Le,Re,P⟨i,j⟩, where
⟨i, j⟩ = e. We prove it by induction.
When e = 0, L0 can never be initialized, due to its highest priority. (1) holds.
L0 acts and sets a restraint only when ΦA0 (0) converges, and once we set such a
restraint, ΦA0 (0) converges at any further stage, and (2) holds. In the construction,
L0 sets a restraint only when ΦA0 (0) converges, and after it acts, it will never act
again. (3) holds.
Note that R0 can be initialized by L0 at most once. (1) holds for R0. Note that
R0 acts only when φ0(0) converges, and after this, if ΦAφ0(0)0 (0) converges, then it
will converge forever, as no P can enumerate numbers less than φ0(0) into A. So
if ΦAφ0(0)0 (0) converges again, then it converges forever, which means that R0 is
satisfied. (2) holds. The restraint set by R0 is φ0(0), if it converges, and after it
acts, it will never act again. (3) holds.
For P⟨0,0⟩, it can be initialized by L0 and R0, so P⟨0,0⟩ can be initialized by L0
and R0 at most three times. (1) holds. Let s0 be the least stage after which P⟨0,0⟩
can not be initialized again, and suppose that P⟨0,0⟩ selects a witness x as a big
number at stage s1 > s0. Then x cannot be canceled later. Then after stage s1,
P⟨0,0⟩ acts only when
(i) it selects N ; or
(ii) it starts module C(0) or D(0); or
(iii) it switches from C(n− 1) to D(n), or from D(n− 1) to C(n); or
(iv) it reaches C(N) or D(N),
which can happen at most N+2 many times. If it reaches C(N) orD(N), then φ0(z)
cannot be a bound of the number of changes of φ20(z, q), and P⟨0,0⟩ is satisfied. If it
never selects N , then φ0(z) never converges (recall that pr0 is assumed to be total,
by the relativized smn -theorem). Here z = pr0(x). If it never starts module C(0) or
D(0), then φ20(z, 0) diverges. If it stays at some module C(n) or D(n) forever, then
either φ20(z, q) diverges for some q, or we will have lim
q→∞φ20(z, q) = A′(z). P⟨0,0⟩ is
satisfied for all cases. (2) holds for P⟨0,0⟩. Thus, after a stage s3 large enough, P⟨0,0⟩
34
![Page 45: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/45.jpg)
Chapter 2. A bounded-low c.e. set which is low, but not superlow
will have no actions, and hence the restraint set by P⟨0,0⟩ is finite, and it will not
initialize strategies with lower priority. (3) holds.
For e > 0, we assume that the lemma is true for e′ < e. The proof that the
lemma is true for e is very similar to the proof for the basic case, i.e. e = 0, and
we will assume that after a stage s big enough, no strategies Le′ , Re′ , and Pe′ canact. Then we can show that after stage s, Le, Re, and Pe will behave exactly like
L0, R0, and P0 above, and hence the lemma is true for e.
This completes the proof of Lemma 2.1.
By Lemma 2.1, A is low but not superlow. Lemma 2.2 below shows that A is
bounded-low.
Lemma 2.2 A† is ω-c.e., and hence A is bounded-low.
Proof: To show that A† is ω-c.e., we need to show that there is a computable
function bounding the changes of e in A† for all e.
Fix e, and n ≤ e. Then in the construction, whenever we see φn(e) converges,
at stage s say, Re acts and initializes all strategies with lower priority. Thus, no
strategy with lower priority can put a number less that φn(e) into A later. So if
ΦAφn(e)e converges later (e enters A†), this computation can only be changed by Pe′-
strategies (where e′ < e, which have higher priority) by enumerating γAr0(y)[t] into
A. After this, if γAr0(y) is defined later, then it will be defined as a number bigger
than φn(e). Thus, because of this, ΦAφn(e)e is injured at most e + 1 many times,
then A†(e) can change at most 2(e+ 1) many times, for this particular n. Thus, in
total, A†(e) can change at most 2(e+ 1)2 many times, and A† is ω-c.e.
This completes the proof of Theorem 2.1.
2.4 A bounded-low set with Turing degree 0′
In this section, we give a sketchy proof of Theorem 2.2. That is, we will construct
a bounded-low c.e. set A Turing computing ∅′. We have seen how to construct
a bounded-low c.e. set in the proof of Theorem 2.1, so to prove Theorem 2.2, we
only need to show how to make A Turing complete. We will construct a partial
computable functional Γ such that ∅′ = ΓA. Of course, the construction of Γ will
be consistent with the R-strategies of making A bounded-low.
35
![Page 46: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/46.jpg)
Chapter 2. A bounded-low c.e. set which is low, but not superlow
For the construction of Γ, we will make sure that for each e, ΓA(e) is defined
and computes ∅′(e) correctly. The idea of constructing Γ is quite standard. That
is, in the construction, at stage s, we find the least x with ΓA(x) not defined and
define ΓA(x)[s] = ∅′(x)[s] with use γ(x) big, like s. If later, at stage t > s, x enters
∅′, then at this stage, we enumerate γ(x) into A, undefining ΓA(x). In general, the
construction of Γ satisfies the following rules:
(i) For any x1, x2 with x1 < x2, if ΓA(x2) has definition at stage s, then ΓA(x1)
also has definition at this stage, with uses γ(x1) < γ(x2).
(ii) For any x1, x2 with x1 < x2, if ΓA(x1) is undefined at stage s, then ΓA(x2) is
also undefined at this stage, due to a number less than γ(x1) enters A.
(iii) For any x, if ΓA(x) has definition at stage s1 and s2, then γ(x)[s1] ≤ γ(x)[s2],
and if γ(x)[s1] < γ(x)[s2], ΓA(x) must have been undefined between these two
stages.
(iv) For any x, ΓA(x) can be undefined at most finitely often during the construc-
tion.
(v) For any x, ΓA(x) = ∅′(x).
We now show how to modify a Re-strategy in the proof of Theorem 2.1 so that it
is consistent with the rules above. Recall that the Re-strategy can act finitely many
times, and each time when it acts, because of φi(e) ↓ for some i ≤ e, it initializes
all strategies with lower priority. To make it consistent with the construction of Γ,
it needs to have an additional action: enumerate γ(e)[s] into A. This enumeration
undefines ΓA(e), so when it is defined again, the use will be defined as a big number,
which is bigger than the value φi(e). Thus, for a fixed e, the membership of e in
A† can be changed by Re′-strategies with e′ ≤ e, i.e., by further enumerations of
the γ-uses, or by rectifying ΓA(x) = 1 when some x < e enumerating into ∅′. Then
A†(e) changes at most 2(e+ 1)2 many times, which guarantees that A† is ω-c.e.
The construction and verification parts are standard finite injury arguments.
36
![Page 47: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/47.jpg)
Chapter 3
A bounded-high set which is high,but not superhigh
Note that ∅′ is a bounded-high set which is also superhigh. In [2], Anderson, Csima
and Lange further asked whether there are bounded-high sets which are high but
not superhigh. Similarly, based on the existence of superhigh bounded-low sets, we
can also ask whether there are high but not superhigh bounded-low sets. In sections
3.1 and 3.2, we will provide two pseudo-jump inversion theorems for bounded-high
sets and bounded-low sets, which will provide positive answers to these questions.
Let We be a c.e. operator, the corresponding pseudo-jump operator Ve is defined
as V Ae = A ⊕WA
e for any set A. One way to obtain high, but not superhigh, c.e.
sets is through the pseudo-jump inversion theorem of Jockusch and Shore [28] which
says: for any c.e. operator We, there is a c.e. set C such that V Ce ≡T ∅′. This idea
was first used by Mohrherr in her paper [4].
The procedure to obtain high but not superhigh c.e. sets are:
(1) Through the construction of low but not superlow c.e. sets, one can obtain
a c.e. operator W such that for any set A, A ⊕WA is low over A, but not
superlow over A, i.e., (A⊕WA)′ ≤T A′, but (A⊕WA)′ tt A
′.
(2) By applying the pseudo-jump inversion theorem to this operator W , there
exists a c.e. set C such that C ⊕WC ≡T ∅′.
Then ∅′′ ≡1 (C ⊕WC)′ ≤T C′ (C is high), and ∅′′ ≡1 (C ⊕WC)′ tt C
′ (C is not
superhigh).
37
![Page 48: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/48.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
In this chapter, we will provide two strengthened versions of Jockusch and Shore’s
pseudo-jump inversion theorem. That is, C in Jockusch and Shore’s theorem can
be bounded-high (section 3.1) or bounded-low (section 3.2).
Theorem 3.1 (1) For any c.e. operator W , there is a bounded-high set C such
that C ⊕WC ≡T ∅′.
(2) For any c.e. operator W , there is a bounded-low c.e. set C such that C ⊕WC ≡T ∅′.
The following two results follow Theorem 3.1 immediately:
Corollary 3.1 (1) There are bounded-high sets which are high but not superhigh.
(2) There are bounded-low c.e. sets which are high but not superhigh.
Proof: LetW be the c.e. operator such that for any set A, A⊕WA is low but not
superlow over A, then any C satisfying C ⊕WC ≡T ∅′ is high but not superhigh.
By Theorem 3.1, there are a bounded-high set C1 and a bounded-low c.e. set C2
such that C1 ⊕WC1 ≡T ∅′ and C2 ⊕WC2 ≡T ∅′. Thus C1 is a bounded-high set
which is high but not superhigh, while C2 is a bounded-low c.e. set which is high
but not superhigh.
We will prove Theorem 3.1.(1) in Section 3.1, and then prove Theorem 3.1.(2)
in Section 3.2.
For a c.e. operatorW , let Ψ be the corresponding partial computable functional.
That is, for any oracle A, e ∈ WA[s] ⇔ ΨA(e)[s] ↓. We view the use ψA(e)[s] of
ΨA(e)[s] as the use for e ∈ WA[s]. That is, if A ψA(e)[s] does not change later,
e will stay in WA. Ψ-uses satisfy the following usual use rules: if ΨA(e)[s] ↓ and
ΨA(e′)[s] ↓ with e < e′, then ψA(e)[s] < ψA(e′)[s]; if ΨA(e)[s] ↓, then ψA(e)[s] ≤ s;
and if ΨA(e)[s] ↑, then ψA(e)[s] = 0.
3.1 Pseudo-jump inversion via bounded-high sets
We will construct a ω-c.e. set C (so C ≤wtt ∅†) such that C ⊕ WC ≡T ∅′ and
∅†† ≤wtt C†. C will meet the following requirements:
38
![Page 49: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/49.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
Pe : ∅′(e) = ΓC⊕WC(e), where Γ is a computable functional built by us.
Qe : ∅††(e) = ∆C†g(e)(e), where ∆ is a computable functional built by us and g is
a computable function such that the use δC†(e) ≤ g(e) for all e.
Re : If there are infinitely many stages s with e ∈ WC [s], then e ∈ WC .
If all the R-requirements are satisfied, then WC is ∆02. By construction, C will
be ω-c.e., and hence C ⊕WC ≤T ∅′. If all the P-requirements are satisfied, then
∅′ ≤T C ⊕WC . Thus, ∅′ ≡T C ⊕WC . If all the Q-requirements are satisfied, then
∅†† ≤wtt C†, and C will be bounded-high.
We will apply the bounded-high strategy developed by Anderson, Csima and
Lange in [2], and combine it with Jockusch and Shore’s pseudo-jump inversion theo-
rem. Our construction is a finite injury argument, where the priority of requirements
is
R0 ≺ P0 ≺ Q0 ≺ R1 ≺ P1 ≺ Q1 ≺ · · ·Re ≺ Pe ≺ Qe ≺ · · · .
3.1.1 A Re-strategy
The original Re-strategy is just setting a C-restraint ψC(e)[s] when e ∈ WC [s] −WC [s− 1] (i.e., ΨC(e)[s] ↓ and ΨC(e)[s− 1] ↑).
We first define C-restraint
r(e, s) = maxψC(e)[s′] : s′ ≤ s ∧ΨC(e)[s′] ↓.
Then r(e, s) ≤ r(e, s+ 1). Suppose that e ∈ WC [s]−WC [s− 1]. e will be removed
out of WC [t] at some least stage t > s only if
Ct ψC(e)[s] = Cs ψC(e)[s] .
So if e ∈ WC [s] and Cs r(e,s)= Ct r(e,s) for all t ≥ s, then e ∈ WC [t] for all stages
t ≥ s, and thus e ∈ WC .
We say that Re is injured at stage s if either some Pi enumerates the Γ-use
γC⊕WC(i)[s] ≤ r(e, s) into C when i ∈ ∅′[s]−∅′[s− 1]; or some Qi enumerates its
coding indicator c ≤ r(e, s) into C or extracts its coding indicator c ≤ r(e, s) out of
C when redefining ∆C†g(i)(i)[s] = ∅††[s](i) (the definition of coding indicators will
be clarified in the following basic Q-strategy).
39
![Page 50: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/50.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
During the construction, we do not allow positive requirements with lower prior-
ity, namely Pj,Qj with j ≥ e, to enumerate elements ≤ r(e, s) into C or to extract
elements ≤ r(e, s) out of C, at any stage s (this will be clear in Case 1 for Pj andCase 2 for Qj), and hence these requirements cannot injure Re later.
Assume that e ∈ WC [s] − WC [s − 1] with C-restraint r(e, s). Since we have
appointed a C-restraint r(e, s − 1), we only need to consider the case r(e, s) >
r(e, s− 1). So we assume that at stage s, r(e, s) > r(e, s− 1).
Case 1. At stage s with r(e, s) > r(e, s − 1), for Pj with j ≥ e, we will show
that ΓC⊕WC(e)[s] ↑. That is, for all stages s′ < s at which ΓC⊕WC
(e)[s′] ↓, either
(a) : WC [s] γC⊕WC (e)[s′] =WC [s′] γC⊕WC (e)[s′]
or
(b) : Cs γC⊕WC (e)[s′] = Cs′ γC⊕WC (e)[s′]
holds.
Indeed, for stages s′ < s, if ΓC⊕WC(e)[s′] ↓ with ΨC(e)[s′] ↑, then e /∈ WC [s′].
As e ∈ WC [s],
WC [s] e =WC [s′] e
(recall that the symbol X z denotes the set x ∈ X : x ≤ z). As we will choose
γC⊕WC(e)[s′] > e, (a) holds.
If ΓC⊕WC(e)[s′] ↓ with ΨC(e)[s′] ↓. By the assumption that e ∈ WC [s]−WC [s−1]
with new computation ΨC(e)[s] ↓, we have
Cs ψC(e)[s′] = Cs′ ψC(e)[s′] .
Claim γC⊕WC(e)[s′] > ψC(e)[s′], then (b) holds.
We now prove
γC⊕WC
(e)[s′] > ψC(e)[s′]
for all s′ < s with ΓC⊕WC(e)[s′] ↓ and ΨC(e)[s′] ↓. Suppose that the computation
ΓC⊕WC(e)[s′] is first defined at stage t′ ≤ s′ and returns back at stage s′. This means
that
Cs′ γC⊕WC (e)[t′]= Ct′ γC⊕WC (e)[t′] ∧ WC [s′] γC⊕WC (e)[t′]= WC [t′] γC⊕WC (e)[t′] .
There are two cases:
40
![Page 51: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/51.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
(1) ΨC(e)[t′] ↓. As γC⊕WC(e)[t′] is defined to be bigger than all used numbers,
γC⊕WC
(e)[t′] > ψC(e)[t′].
Then ΨC(e)[t′] also comes back at stage s′, we have
γC⊕WC
(e)[s′] = γC⊕WC
(e)[t′] > ψC(e)[t′] = ψC(e)[s′].
(2) ΨC(e)[t′] ↑. Then e /∈ WC [t′], but by assumption, e ∈ WC [s′]. As γC⊕WC(e)[t′] >
e,
WC [t′] γC⊕WC(e)[t′] = WC [s′] γC⊕WC
(e)[t′] .
This contradicts with the assumption that the old computation ΓC⊕WC(e)[t′] ↓
returns back at stage s′, so this case is indeed impossible.
In construction, at each stage t, if ΓC⊕WC(e)[t] ↓ and ΓC⊕WC
(j)[t] ↓ with e < j,
we will make the corresponding uses satisfying γC⊕WC(e)[t] < γC⊕WC
(j)[t]. So when
ΓC⊕WC(e)[s] is undefined, then all ΓC⊕WC
(j) with j > e are also undefined at stage
s.
Hence, when the C-restraint r(e, s) moves to a higher level, all the previous
ΓC⊕WC(j)-computations with j ≥ e are undefined, we will define new computations
ΓC⊕WC(j) with use > r(e, s). Then the enumerations of such uses into C can not
injure Re as long as r(e, s) does not increase later.
Case 2. At stage s with r(e, s) > r(e, s−1), for Qj with j ≥ e, we first consider
Qe. Say that Qe is injured at stage s if there is an i ≤ e such that the C-restraint
r(i, s) on Ri is larger than or equal to the coding indicator of Qe.
The strategy of Qe to deal with this injury from Ri is still to undefine previ-
ously defined ∆C†g(e)(e)-computations and then define ∆C†g(e)(e) via new coding
indicators > r(i, s). Then Qe will not injure Ri as long as r(i, s) does not increase
later.
To undefine ∆C†g(e)(e)-computations, we need to change C† below g(e). In
order to enumerate elements into or extract elements out of C†, we will build a
partial computable function q and a partial computable functional Θ, and assume
that the recursion theorem provides us the graph of q and the c.e. relation of Θ.
41
![Page 52: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/52.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
Then by controlling q and Θ, we can move elements (i.e., indices of Θ obtained
by smn -theorem) into or out of C† (this will be much clear in the following basic
Qe-strategy).
Hence, during the construction, Re can only be injured by positive requirements
with higher priority. Each Pi(i < e) can injure Re at most once, and each Qi(i < e)
can injure Re finitely often by enumerating coding indicators. So Re can be injured
finitely often, and thus limsr(e, s) <∞.
3.1.2 A Pe-strategy
We will build a functional Γ such that ∅′ = ΓC⊕WC. At each stage s, when e ∈
∅′[s+ 1]−∅′[s] and ΓC⊕WC(e)[s] ↓, we will enumerate the use γC⊕WC
(e)[s] into C
to undefine ΓC⊕WC(e), and then redefine ΓC⊕WC
(e) = 1 with big use.
When the C-restraints r(i, s + 1) on Ri with i ≤ e move up, i.e. r(i, s + 1) >
r(i, s), as in a basic Ri-strategy, we see ΓC⊕WC(i) is undefined at the beginning of
stage s+1. Thus, ΓC⊕WC(j) ↑ for all j ≥ i, and such ΓC⊕WC
(j) will be defined later
with new use > r(i, s+ 1).
During the construction, we will define at most one ΓC⊕WC(y) at each stage. At
the last step of stage s+ 1, we find the least y with ΓC⊕WC(y) ↑ currently.
If ΓC⊕WC(y) is never defined before, or there is a largest stage w < s+1 at which
ΓC⊕WC(y)[w] ↓ and also at least one of the following three conditions holds:
(1) y ∈ ∅′[w + 1]−∅′[w];
(2) y ∈ WC [t+ 1]−WC [t] with r(y, t+ 1) > r(y, t) for some t ∈ [w, s];
(3) γC⊕WC(y)[w] ≤ γC⊕WC
(y − 1)[s].
Then define ΓC⊕WC(y)[s + 1] = ∅′[s + 1](y) with use γC⊕WC
(y)[s + 1] bigger than
all numbers used before.
Otherwise, there is a largest stage w < s+ 1 at which ΓC⊕WC(y)[w] ↓ and none
of three conditions above holds, just define ΓC⊕WC(y)[s+1] = ∅′[s+1](y) with use
γC⊕WC(y)[s+ 1] = γC⊕WC
(y)[w].
We now show that limsγC⊕WC
(e)[s] <∞. Assume that limsγC⊕WC
(e−1)[s] <∞,
and that limsr(i, s) <∞ for all i ≤ e. We can find a stage s0 such that for all i ≤ e,
42
![Page 53: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/53.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
• limsr(i, s) = r(i, s0),
• i ∈ ∅′ ⇔ i ∈ ∅′[s0].
Let s1 ≥ s0 + 1 be the least stage such that ΓC⊕WC(e)[s1] ↓. Then after stage s1,
γC⊕WC(e)[s] will not move up, so lim
sγC⊕WC
(e)[s] = γC⊕WC(e)[s1].
3.1.3 A Qe-strategy
Fix the canonical notation for ω2. That is, for each β = ω · i+ j, we view β coded as
⟨i, j⟩, and the corresponding order on the set of all ordered pairs of natural numbers
is just the lexicographic order, i.e., ⟨i, j⟩ < ⟨k, l⟩ iff i < k or i = k with j < l.
Anderson and Csima proved in [1] that ∅†† is ω2-c.e. under this notation, i.e., there
is a partial computable function χ : ω × ω2 → 0, 1 such that
• for each e, there is a least ordinal βe < ω2 such that χ(e, βe) ↓= ∅††(e).
Then
• for each e, there is a first stage se and a least ordinal βe,se = ω · ise + jse such
that χ(e, βe,se)[se] ↓;
• for each e and stage s ≥ se, there is a least ordinal βe,s = ω · ie,s + je,s such
that χ(e, βe,s)[s] ↓.
Now βe = limsβe,s, and ∅††(e) = χ(e, βe) = lim
sχ(e, βe,s). As χ is partial computable,
ise and jse are computable functions on e; ie,s and je,s are computable functions on
e, s.
For convenience, we can also choose χ such that
• for each e and stage s ≥ se, if βe,s = βe,s+1, then χ(e, βe,s+1) = χ(e, βe,s).
In this case, βe,s+1 < βe,s, that is, either ie,s+1 < ie,s, or ie,s+1 = ie,s with
je,s+1 < je,s.
43
![Page 54: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/54.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
Fix a partial computable function χ : ω× ω2 → 0, 1 which satisfies conditions
above. At stage s ≥ se, we view ∅††[s](e) = χ(e, βe,s).
Consider the requirement Qe : ∅††(e) = ∆C†g(e)(e). At stage s′ ≥ se, we define
∆C†g(e)(e)[s′] = χ(e, βe,s′). If there is a least stage s > s′ at which βe,s < βe,s−1 or Qe
is injured by R-strategies with higher priority (i.e., the current coding indicator of
Qe is less than or equal to the C-restraint on R), then we need to rectify functional
∆C†g(e)(e) at stage s by enumerating some x ≤ g(e) into C† or extracting some
y ≤ g(e) out of C†.
In order to enumerate elements into or extract elements out of C†, we will build
additional partial computable functions and partial computable functionals. By us-
ing the recursion theorem, we can change C† on indices of such partial computable
functionals. The construction indeed relies on parameters, say r. In the r-th con-
struction, we will build an auxiliary partial computable function qr, an auxiliary
partial computable functional Θr, and also an auxiliary c.e. set Qr, where Qr en-
codes the graph of qr as well as the c.e. relation of Θr.
Assume that we are in the r-th construction. To encode ∅††(e) into ∆C†(e), we
will reserve three types of markers of Qe, namely injury markers, location markers
and coding markers [such markers will be defined in Case 1 and Case 2 below].
We build the functional ∆ such that ∆C†(e) only depends on the membership of
such markers in C†. Let Ue,r be the set of all injury markers, location markers
and coding markers defined during the r-th construction. Then the use function
δC†(e) = maxUe,r. We will determine a strictly increasing computable function gr
(in section 3.1.4) such that gr(e) ≥ maxUe,r. Then ∅††(e) = ∆C†gr(e)(e).
Case 1. We first consider the situation when Qe is injured from negative re-
quirements with higher priority.
Injury markers. When the C-restraint r(i, s) on Ri(i ≤ e) increases to a new
level at stage s with r(i, s) ≥ c, the coding indicator of Qe [the definition of cod-
ing indicators will be given in the following Case 2.1], we will enumerate an injury
marker < gr(e) into C† and never remove it out. This enumeration injures all old
convergence ∆C†gr(e)(e)-computations, and ∆C†gr(e)(e) will arrive at new computa-
tions. In this case, just cancel existed coding indicators and coding markers of Qj
with j ≥ e.
44
![Page 55: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/55.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
In order to define injury markers, we first choose a fresh witness, x say. Now
qr(x) and ΘYr (x) (for any oracle Y ) are undefined currently. Define qr(x) = 0 and
ΘYr (x) = 0 for all oracles Y at stage s, and then enumerate ⟨⟨x, 0⟩, ⟨λ, x, 0⟩⟩ into
Qr,s (note we also enumerate other elements of the form ⟨⟨y, c⟩, ⟨σ, y, 0⟩⟩ with σ a
binary string into Qr when defining location markers and coding markers), where
⟨·, ·⟩ : N2 → N and ⟨·, ·, ·⟩ : N3 → N are fixed effective one-to-one functions; λ stands
for the empty string [we indeed fix an effective coding of 2<ω (the set of binary
strings) into N and view a binary string σ in ⟨σ, y, 0⟩ as its code].
We now provide more details for the use of recursion theorem.
The application of recursion theorem.
First, by smn -theorem, there are computable functions f1 and f2 such that for
each x, Wf1(x) = z : ∃y[⟨z, y⟩ ∈ Wx], and Wf2(x) = y : ∃z[⟨z, y⟩ ∈ Wx], whereWx is the x-th c.e. set of natural numbers.
In the r-th construction, if Qr =Wr, then
Wf1(r) = z : ∃y[⟨z, y⟩ ∈ Qr]
and
Wf2(r) = y : ∃z[⟨z, y⟩ ∈ Qr].
So the graph of qr is Wf1(r), and the c.e. relation of Θr is just Wf2(r). Then again,
we can use smn -theorem as well as the relativized smn -theorem to obtain the injective
computable functions kr and hr such that for n,m and Y ,
φkr(n)(m) = qr(n), ΦYhr(n)(m) ≃ ΘY
r (n).
Moreover, by Padding Lemma, we can further choose kr and hr such that kr(n) <
hr(n) for all n. Such kr and hr will be used to define injury markers, location
markers as well as coding markers.
However, the assumption that Qr = Wr may be incorrect. Then our guess
on qr and Θr are wrong, and hence kr and hr are also incorrect. Thus, the r-th
construction does not work in general.
Observe that the c.e. sets Qr(r ∈ N) are uniform in r, then Qr = Wf(r) for
some computable function f . By recursion theorem, there is at least one r0 (indeed
45
![Page 56: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/56.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
infinitely many) such that Qr0 =Wf(r0) =Wr0 . Then in the r0-th construction, our
guess on qr0 and Θr0 are both correct, and thus, the injective functions kr0 and hr0
really satisfy for all n,m and Y ,
φkr0 (n)(m) = qr0(n), ΦYhr0(n)
(m) ≃ ΘYr0(n).
Then Qe can be satisfied via the r0-th construction.
This ends the description of applying recursion theorem.
Now return back to the fresh witness x above which devotes to define injury
markers. At stage s, after defining qr(x) = 0 and ΘYr (x) = 0 for all oracles Y , we
view Φ∅hr(x)
(hr(x)) ↓= Θ∅r (hr(x)) ↓= 0, and for all m, φkr(x)(m) ↓= qr(x) ↓= 0.
Then
ΦCφkr(x)
(hr(x))
hr(x)(hr(x)) ↓ ∧ kr(x) < hr(x).
This means that hr(x) enumerates into C† forever. Call hr(x) an injury marker of
Qe.
As we will determine an increasing computable function gr with gr(e) bigger than
all injury markers of Qe, ∆C†gr(j)(j) ↑ for all j ≥ e. We can omit such Qj’s coding
indicators and coding markers, and Qj will obtain new coding indicators larger than
the C-restraint r(i, s).
Case 2. We now consider the situation when βe,s < βe,s−1. There are two
subcases.
Case 2.1. If the approximation of ∅††(e) changes at stage s via ie,s < ie,s−1, then
we will undefine all old definitions and then define ∆C†gr(e)(e) via new computations.
Location markers. To undefine old computations, we will enumerate a new num-
ber < gr(e) into C† and never remove it out. Such a number is called a location
marker at level ie,s, which indicates that approximations of ∅††(e) move to new level
ie,s and that ∆C†gr(e)(e) will be defined at that new level.
To define location markers, we choose a big number, say y, and then define
qr(y) = 0, ΘYr (y) = 0 for all oracles Y , and enumerate ⟨⟨y, 0⟩, ⟨λ, y, 0⟩⟩ into Qr,s.
Then we view
ΦCφkr(y)
(hr(y))
hr(y)(hr(y)) ↓ ∧ kr(y) < hr(y);
46
![Page 57: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/57.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
by φkr(y)(hr(y)) = 0, hr(y) ∈ C†[t] for all t ≥ s. Say that hr(y) is a location marker
at level ie,s. Now ∆C†gr(e)(e) is undefined, because we will define gr(e) bigger than
all location markers of Qe.
Coding markers and coding indicators. After obtaining location markers above,
we immediately define coding markers by picking a new number, say c, and then
define a coding marker via c as follows. Again, choose a number z larger than all
used numbers. Define
qr(z) = c
and
ΘYr (z) :=
0, if c /∈ Y↑, otherwise.
We enumerate all elements of the form ⟨⟨z, c⟩, ⟨σ, z, 0⟩⟩ with σ ∈ 2<ω, |σ| = c + 1
and σ(c) = 0 into Qr,s, where |σ| is the length of σ.
We think for all m,
φkr(z)(m) ↓= qr(z) ↓= c, ΦYhr(z)(m) ≃ ΘY
r (z).
So for all stages t ≥ s,
ΦCchr(z)
(hr(z))[t] ↓⇔ ΘCcr (z)[t] ↓⇔ c /∈ Ct.
Then we view hr(z) ∈ C†[t] ⇔ c /∈ Ct. Such a hr(z) is called a coding marker at
level ie,s, and such a witness c is called the coding indicator of hr(z).
We will define ∆C†gr(e)(e) via the coding marker hr(z) and the coding indicator
c at level ie,s. If χ(e, βe,s) = 1, then keep c /∈ Cs and define
∆C†gr(e)(e)[s] = C†[s](hr(z)) = 1.
Otherwise, χ(e, βe,s) = 0, to undefine ΘCsr (z), just enumerate the coding indicator
c into Cs. Then ΦCs
hr(z)(m) ↑ for all m; in particular, ΦCs
hr(z)(hr(z)) ↑, and thus
hr(z) /∈ C†[s]. Define
∆C†gr(e)(e)[s] = C†[s](hr(z)) = 0.
47
![Page 58: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/58.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
Case 2.2. If ie,s = ie,s−1, but the approximation χ(e, βe,s) of ∅††(e) changes at
stage s via je,s < je,s−1. As the approximation stays in the previous level, we have
defined the coding indicator c and the coding marker hr(z) at level ie,s, and defined
∆C†gr(e)(e) via c and hr(z). At stage s− 1, we have
∆C†gr(e)(e)[s− 1] = χ(e, βe,s−1) = C†[s− 1](hr(z)) = 1− Cs−1(c).
If χ(e, βe,s) = 0, then χ(e, βe,s−1) = 1, so c /∈ Cs−1. Just enumerate c into Cs.
If our construction is the r0-th construction provided by recursion theorem, this
enumeration undefines ΦCs
hr0 (z)(hr0(z)), so hr0(z) /∈ C†[s]. We can define
∆C†gr0 (e)(e)[s] = 0 = χ(e, βe,s) = C†[s](hr0(z)) = 1− Cs(c).
If χ(e, βe,s) = 1, then χ(e, βe,s−1) = 0, so c ∈ Cs−1. Now extract c out of
C. Similarly, if we are in the r0-th construction, then ΦCchr0 (z)
(hr0(z))[s] ↓ with
φkr0 (z)(hr0(z)) = c and kr0(z) < hr0(z), and hence hr0(z) ∈ C†[s]. We can define
∆C†gr0 (e)(e)[s] = 1 = χ(e, βe,s) = C†[s](hr0(z)) = 1− Cs(c).
3.1.4 Define the computable function gr
We now specify a computable function gr in the r-th construction such that for all
e, gr(e) is bigger than maxUe,r, where Ue,r is the set of injury markers, location
markers and coding markers of Qe defined in the r-th construction.
We first determine a recursive upper bound for the size |Ue,r| of Ue,r. For injurymarkers, we define them only if someRi(i ≤ e) has its C-restraint r(i, s) increase. So
we also determine a number µ(i) which exceeds the number of times r(i, s) increases.
As R0 has the highest priority, when 0 is enumerated into WC [s] for first time,
we set C-restraint r(0, s) = ψC(0)[s] and preserve it forever. Thus, r(0, s) increases
at most once, and let µ(0) = 1.
Now consider |U0,r|. Q0 is injured at most once when r(0, s) increases, so it
has at most one injury marker. For location markers, we define them when the
approximation of ∅††(0) decreases to a new level. Recall that s0 is the first stage at
which there is a least ordinal β0,s0 = ω · is0 + js0 such that χ(0, β0,s0)[s0] ↓, so there
are at most is0 + 1 many levels for Q0. Thus, the number of location markers of
48
![Page 59: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/59.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
Q0 is at most is0 . For coding markers, we change them when Q0 is injured or the
approximation of ∅††(0) arrives at a new level, then the number of coding markers
of Q0 (= the number of coding indicators of Q0) is at most µ(0) + is0 + 1. Hence,
|U0,r| ≤ µ(0) + is0 + (µ(0) + is0 + 1).
In order to find an upper bound for general |Ue,r|, we also determine a number
ν(e) which bounds the number of coding markers of Qe. Set ν(0) = µ(0) + is0 + 1.
Assume that we have already obtained µ(e′) and ν(e′) for all e′ < e.
Now determine µ(e) which bounds the number of times C-restraints r(e, s) on
Re increases. Re is injured at stage s if some Pi(i < e) enumerates Γ-uses ≤ r(e, s)
into C, or some Qi(i < e) enumerates coding indicators ≤ r(e, s) into C or removes
coding indicators ≤ r(e, s) out of C. Note that each Pi(i < e) will enumerate at
most one use into C. Re will be injured by P-requirements at most 2e many times.
For a sequence of fixed coding indicators, say ci, of Qi with i < e, the number of
configurations of C at this sequence is 2e, and there are at most ν(i) many coding
indicators of Qi(i < e). Re will be injured by Q-requirements for at most 2e∏
0≤i<eν(i)
many times.
In total, Re will be injured by positive requirements at most 22e∏
0≤i<eν(i) many
times. Moreover, r(e, s) can move up before or after each injury, hence, r(e, s) will
increase at most 22e+1∏
0≤i<eν(i) times. Just set µ(e) = 22e+1
∏0≤i<e
ν(i).
Now we can define ν(e) which bounds the number of coding markers of Qe. We
define coding markers for Qe when it is injured by Ri(i ≤ e) in which case r(i, s)
increases, or the approximation of ∅††(e) arrives at a new level. Recall that se is the
first stage at which there is a least ordinal βe,se = ω·ise+jse such that χ(e, βe,se)[se] ↓.Qe has at most ise + 1 many levels. Then we can set ν(e) = ise + 1 +
∑0≤i≤e
µ(i).
Now we are ready to determine a recursive upper bound for |Ue,r|. Qe has at
most ise many location markers; and Qe is injured byRi with i ≤ e at most∑
0≤i≤eµ(i)
many times, so it has at most∑
0≤i≤eµ(i) many injury markers; and Qe has at most
ν(e) many coding markers. Thus in total,
|Ue,r| ≤ ise +∑0≤i≤e
µ(i) + ν(e) ≤ 2ν(e).
49
![Page 60: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/60.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
This ends the description of bounding the size of Ue,r.
Our initial target is to bound maxUe,r, the use of ∆C†(e). In order to recur-
sively bound maxUe,r, during the r-th construction, we will choose Γ-uses for P-
requirements and the witnesses at which we define qr and Θr for Q-requirements in
a neat way. Fix an effective injection ⟨, ⟩ : N × N → N such that for all i, j ∈ N,⟨i, j⟩ is strictly bigger than both i and j, and if i < k and j < l, then ⟨i, j⟩ is strictlyless than ⟨k, l⟩. Let ⟨i,N⟩ := ⟨i, j⟩ : j ∈ N.
All Γ(e)-uses for Pe are chosen from ⟨3e,N⟩. Γ(e)-uses will be moved up only if
some i ≤ e enumerates into ∅′, or the C-restraints on some Ri with i ≤ e increases.
The witnesses for defining injury markers, location markers, and coding markers
of Qe are chosen from ⟨3e+1,N⟩, and there are at most 2ν(e) many such witnesses.
Then during the construction, we choose such witnesses of Q0 from
⟨1, x⟩ : x ≤ 2ν(0)
one by one in increasing order, and choose such witnesses of Qe from
⟨3e+ 1, x⟩ : e+ 2∑
0≤i≤e−1
ν(i) ≤ x ≤ e+ 2∑0≤i≤e
ν(i)
one by one in increasing order.
The coding indicators for coding markers of Qe are chosen from ⟨3e + 2,N⟩,and there are at most ν(e) many such coding indicators. During the construction,
when the C-restraint on some Ri(i ≤ e) exceeds the coding indicators of Qe or the
approximations of ∅††(e) decrease into a new level, we omit old coding indicators
of Qe, and appoint new coding indicators form ⟨3e+ 2,N⟩.During the r-th construction:
(1) When defining injury markers or location markers for Qe, we first pick a least
unused witness, say ⟨3e+ 1, y⟩, with y satisfying:
– e+ 2∑
0≤i≤e−1
ν(i) ≤ y ≤ e+ 2∑
0≤i≤eν(i),
– qr(⟨3e+ 1, y⟩) ↑,
50
![Page 61: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/61.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
– ΘYr (⟨3e+ 1, y⟩) ↑.
By |Ue,r| ≤ 2ν(e), during the r-th construction, we will define qr and ΘYr on
no more than 2ν(e) many arguments inside ⟨3e+1,N⟩, so such a y exists. We
then define
qr(⟨3e+ 1, y⟩) = 0
and
ΘYr (⟨3e+ 1, y⟩) = 0
for all oracles Y , and view
Φ∅hr(⟨3e+1,y⟩)(hr(⟨3e+ 1, y⟩)) ↓= 0 ∧ φqr(⟨3e+1,y⟩) ↓= 0
with qr(⟨3e+1, y⟩) < hr(⟨3e+1, y⟩). That is, the injury marker or the location
marker hr(⟨3e+ 1, y⟩) is enumerated into C† forever.
(2) When defining coding markers of Qe, we first choose a new coding indicator,
say ⟨3e + 2, x⟩, with x bigger than all numbers used before, and then pick a
least unused witness, say ⟨3e+ 1, z⟩, with z satisfying:
– e+ 2∑
0≤i≤e−1
ν(i) ≤ z ≤ e+ 2∑
0≤i≤eν(i),
– qr(⟨3e+ 1, z⟩) ↑,
– ΘYr (⟨3e+ 1, z⟩) ↑.
Similarly, such a z exists. Then we define
qr(⟨3e+ 1, z⟩) = ⟨3e+ 2, x⟩,
and for all oracles Y , define
ΘYr (⟨3e+ 1, z⟩) ↓⇔ ⟨3e+ 2, x⟩ /∈ Y.
We view the coding marker hr(⟨3e+1, z⟩) is enumerated into C† iff its coding
indicator ⟨3e+ 2, x⟩ is outside C.
51
![Page 62: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/62.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
Hence, all markers of Qe are of the form hr(⟨3e+ 1, y⟩) for some
e+ 2∑
0≤i≤e−1
ν(i) ≤ y ≤ e+ 2∑0≤i≤e
ν(i).
As hr is a computable function, we can define
gr(0) =∑
0≤y≤2ν(0)
hr(⟨1, y⟩).
For e > 0, define gr(e) by induction as
gr(e) = 1 + gr(e− 1) +∑
e+2∑
0≤i≤e−1
ν(i)≤ y ≤ e+2∑
0≤i≤e
ν(i)
hr(⟨3e+ 1, y⟩).
Then gr is a strictly increasing computable function such that for all e, maxUe,r <
gr(e).
In the r-th construction, fix such a gr first, and for each e, we try to ensure
∅††(e) = ∆C†gr(e)(e) with the actual use δC†(e) = maxUe,r.
In the following formal construction and verification, assume that we are in
the r0-th construction, which is provided by recursion theorem. Then the injective
computable functions kr0 , hr0 , gr0 are all correct, we denote them respectively as
k, h, g for simplicity.
3.1.5 Construction
Recall that se is the first stage at which there is an ordinal α < ω2 such that
χ(e, α)[se] ↓. Assume se ≥ e, and let βe,se = ω · ise + jse be the least such an α. At
stage s ≥ se, let βe,s = ω · ie,s+ je,s be the least ordinal such that χ(e, βe,s)[s] ↓, and
we assume ie,s, je,s ≤ s.
Assume that there is at most one element ≤ s enumerating into ∅′ at each stage
s.
Construction of C.
Let C0 := ∅, and all functionals are totally undefined at stage 0.
52
![Page 63: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/63.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
Stage s+ 1:
(1) Coding ∅′. If there is an i ≤ s + 1 such that i ∈ ∅′[s + 1] − ∅′[s] with
ΓC⊕WC(i)[s] ↓, then put γC⊕WC
(i)[s] into C. Thus, ΓC⊕WC(i) is undefined.
(2) Coding ∅††. Say Qe requires attention at stage s + 1 if s+ 1 ≥ se and one of
the following conditions holds.
(Q0) Qe has no coding indicators at the end of stage s.
(Q1) (Q0) fails and Qe has an uncanceled coding indicator c, and some Ri
with i ≤ e has its C-restraint r(i, s) ≥ c.
(Q2) (Q0) and (Q1) both fail, and βe,s+1 < βe,s with s + 1 > se, in this case
χ(e, βe,s+1) = χ(e, βe,s).
Find all Qe(e ≤ s + 1) which require attention at stage s + 1, and consider
them in order of priority.
Now assume that we arrive at Qe which requires attention.
(2.1) When (Q0) holds.
– If there are no location markers at level ie,s+1, first define a location
marker at level ie,s+1 as in (⋆) of (2.3.1).
– Define coding indicator and coding marker as in (⋆⋆) of (2.3.1).
– Define computation ∆C†g(e)(e) via the new coding indicator and coding
marker as in (⋆ ⋆ ⋆) of (2.3.1).
Check whether there is a requirement Qj(e < j ≤ s + 1) which requires
attention at stage s + 1. If there is such a Qj, find the highest priority one,
act correspondingly. Otherwise, go to step (3).
53
![Page 64: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/64.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
(2.2) When (Q1) holds.
First define an injury marker to undefine all old convergence computations of
∆C†g(e)(e) as follows:
– pick the least unused number z in
⟨3e+ 1, y⟩ : e+ 2∑
0≤i≤e−1
ν(i) ≤ y ≤ e+ 2∑0≤i≤e
ν(i);
– define qr0(z) = 0 and ΘYr0(z) = 0 for all oracles Y .
By recursion theorem, for all m, φk(z)(m) ↓= 0, Φ∅h(z)(m) ↓= 0, we also choose
k(z) < h(z). So h(z) ∈ C†[t] for all t ≥ s + 1. h(z) is the desired injury
marker.
As we choose g such that h(z) < g(e), ∆C†g(e)(e) ↑, thus all ∆C†g(j)(j) ↑ with
j ≥ e. Say Qj(j ≥ e) is injured at stage s + 1. Cancel all existed coding
indicators and coding markers of Qj(j ≥ e), go to step (3).
(2.3) When (Q2) holds, βe,s+1 < βe,s. There are two subcases (2.3.1) and (2.3.2).
(2.3.1) ie,s+1 < ie,s, the approximation of ∅††(e) now moves to a new level. Cancel
the coding indicator and coding marker at level ie,s. Define a location marker
at level ie,s+1 to undefine all old definitions of ∆C†g(e)(e), and then define a
coding marker to encode ∅††[s+ 1](e), which is χ(e, βe,s+1).
(⋆) Define the location marker. Pick the least unused number z in
⟨3e+ 1, y⟩ : e+ 2∑
0≤i≤e−1
ν(i) ≤ y ≤ e+ 2∑0≤i≤e
ν(i),
define qr0(z) = 0 and ΘYr0(z) = 0 for all oracles Y . By recursion theorem,
h(z) ∈ C†[t] for all t ≥ s+ 1, and h(z) is the desired location marker.
54
![Page 65: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/65.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
(⋆⋆) Define the coding indicator and the coding marker. First choose a coding
indicator c ∈ ⟨3e+2,N⟩ which is larger than all numbers used so far, and
then pick the least unused number x in
⟨3e+ 1, y⟩ : e+ 2∑
0≤i≤e−1
ν(i) ≤ y ≤ e+ 2∑0≤i≤e
ν(i).
Define qr0(x) = c and ΘYr0(x) ↓⇔ c /∈ Y for all oracles Y . By recursion
theorem, h(x) ∈ C†[t] iff c /∈ Ct for all t ≥ s + 1. h(x) is the desired
coding marker with the coding indicator c.
(⋆ ⋆ ⋆) Define ∆C†g(e)(e). If χ(e, βe,s+1) = 1, define
∆C†g(e)(e)[s+ 1] = C†[s+ 1](h(x)) = 1− Cs+1(c) = 1.
Otherwise, χ(e, βe,s+1) = 0. First enumerate the coding indicator c into
Cs+1, so C†[s+ 1](h(x)) = 0, and then define
∆C†g(e)(e)[s+ 1] = C†[s+ 1](h(x)) = 1− Cs+1(c) = 0.
(2.3.2) ie,s+1 = ie,s and je,s+1 < je,s, the approximation of ∅††(e) changes at same
level. Let c be the uncanceled coding indicator at level ie,s, and h(x) be the
corresponding coding marker.
If χ(e, βe,s+1) = 1, then χ(e, βe,s) = 0. As
∆C†g(e)(e)[s] = C†[s](h(x)) = 1− Cs(c) = 0,
c ∈ Cs. Now remove c out of C, then
∆C†g(e)(e)[s+ 1] = C†[s+ 1](h(x)) = 1− Cs+1(c) = 1.
If χ(e, βe,s+1) = 0, then χ(e, βe,s) = 1, and
∆C†g(e)(e)[s] = C†[s](h(x)) = 1− Cs(c) = 1,
So c /∈ Cs. Now enumerate c into C. Then
∆C†g(e)(e)[s+ 1] = C†[s+ 1](h(x)) = 1− Cs+1(c) = 0.
55
![Page 66: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/66.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
Check whether there is a requirement Qj(e < j ≤ s + 1) which requires
attention at stage s + 1. If there is such a Qj, find the highest priority one,
act correspondingly. Otherwise, go to step (3).
(3) Defining ΓC⊕WC. Now we obtain Cs+1. Calculate C-restraints
r(i, s+ 1) = maxψC(i)[t] : t ≤ s+ 1 ∧ΨC(i)[t] ↓
on each Ri with i ≤ s+ 1.
– If there is a r(i, s+ 1) such that r(i, s+ 1) > r(i, s), then
i ∈ WC [s+ 1]−WC [s]
and ΨC(i)[s + 1] is defined with a new computation. If ΓC⊕WC(i)[s] ↓,
then according to a basic Pi-strategy, ΓC⊕WC(i) is undefined currently.
When we define ΓC⊕WC(i) at stage t ≥ s+ 1, its use γC⊕WC
(i)[t] will be
of the form ⟨3e, x⟩ with x larger than all numbers used so far, especially,
γC⊕WC(i)[t] > r(i, s+ 1).
Find the least y with ΓC⊕WC(y) ↑ currently.
If ΓC⊕WC(y) is never defined before,
– define ΓC⊕WC(y)[s+1] = ∅′[s+1](y) with use ⟨3e, x+1⟩, where x is the
least number larger than all numbers used so far.
Otherwise, let w < s+ 1 be the largest stage at which ΓC⊕WC(y)[w] ↓.
– If y ∈ ∅′[w + 1]−∅′[w], or
∃t ∈ [w, s] such that y ∈ WC [t+ 1]−WC [t] with r(y, t+ 1) > r(y, t), or
γC⊕WC(y)[w] ≤ γC⊕WC
(y − 1)[s],
then define ΓC⊕WC(y)[s+ 1] = ∅′[s+ 1](y) with use ⟨3e, x+ 1⟩, where x
is the least number larger than all numbers used so far.
56
![Page 67: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/67.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
– Otherwise, γC⊕WC(y)[w] > γC⊕WC
(y−1)[s], just define ΓC⊕WC(y)[s+1] =
∅′[s+ 1](y) with use γC⊕WC(y)[w].
This ends the construction of C at stage s+ 1.
3.1.6 Verification
Here, we verify the r0-th construction which is provided by the recursion theorem.
Recall that we have already defined computable function g(e), which is gr0(e), in
a basic Qe-strategy with g(e) ≥ δC†(e) = maxUe,r0 , where Ue,r0 is the set of injury
markers, location markers and coding markers of Qe defined in the r0-th construc-
tion.
Lemma 3.1 For each requirement, Q say,
(1) Q is injured at most finitely often;
(2) Q acts at most finitely often and is satisfied;
(3) Q injures all lower priority strategies finitely often.
Proof: We will prove the lemma by induction on e that all Re, Pe, and Qe are
true.
For e = 0. R0 has the highest priority, it is not injured. (1) holds. If 0 ∈WC [s]−WC [s−1] at some first stage s, then r(0, s) = ψC(0)[s] and the computation
ΨC(0)[s] is never destroyed later [indeed, after stage s, all Pj and Qj with j ≥ 0 can
only deal with witnesses larger than r(0, s)]. Then 0 ∈ WC [t] for all t ≥ s. So R0
is satisfied, (2) holds. R0 acts at most once by setting C-restraints, thus initializes
lower priority strategies at most once. (3) holds.
For P0. P0 is injured by R0 at most once when 0 ∈ WC [s] − WC [s − 1] at
some first stage s, (1) holds. In this case, ΓC⊕WC(0) ↑, we will define it with a
big use later. Let w0 be the least stage such that P0 is not injured after stage w0.
After stage w0, P0 acts at most once if 0 ∈ ∅′[t] − ∅′[t − 1] at some stage t with
ΓC⊕WC(0)[t− 1] ↓. In this case, γC⊕WC
(0)[t− 1] is enumerated into Ct, and we will
define ΓC⊕WC(0) = 1 with a large use later. So γC⊕WC
(0) increases at most twice
57
![Page 68: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/68.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
after its first definition, there is a stage w1 ≥ w0 such that ΓC⊕WC(0)[w1] is defined
and is never undefined later. (2) holds. P0 never acts after stage w1. (3) holds.
For Q0. Recall that we use s0 to denote the first stage at which there is an
ordinal α < ω2 such that χ(0, α)[s0] ↓, and let β0,s0 = ω · is0 + js0 be the least
such ordinals. We will appoint a coding indicator c at level is0 , and then define
corresponding coding marker h(z). Define
∆C†g(0)(0)[s0] = C†[s0](h(z)) = 1− Cs0(c) = χ(0, β0,s0)
for first time.
When 0 ∈ WC [s]−WC [s− 1] at some first stage s ≥ s0 with r(0, s) bigger than
coding indicators of Q0, Q0 is injured. We will enumerate an injury marker into
C† to undefine all old definitions of ∆C†g(0)(0). Note P0 may act at most once by
enumerating γC⊕WC(0) into C, but this enumeration has no essential influences to
the definition of ∆C†g(0)(0) by the choice of Γ-uses and coding indicators. So Q0 is
injured at most once by R0. (1) holds.
Let t0 ≥ s0 be the least stage such that Q0 is not initialized after stage t0, and
let β0,t = ω · i0,t + j0,t be the least ordinal such that χ(0, β0,t)[t] ↓ at stage t ≥ s0.
After stage t0, if β0,s < β0,s−1 via i0,s < i0,s−1, then all the previous definitions of
∆C†g(0)(0) are injured at stage s, because we enumerate a location marker at level
i0,s into C†. Now assume that after stage t1 ≥ t0, i0,t never decreases, i.e., i0,t = i0,t1
for all t ≥ t1 (such a t1 exists since limsβ0,s exists).
Let c′ be the coding indicator at level i0,t1 and h(z′) be the corresponding coding
marker. We define h(z′) such that h(z′) ∈ C†[s] ⇔ c′ /∈ Cs for all stage s ≥ t1. At
stage t1, we maintain
∆C†g(0)(0)[t1] = C†[t1](h(z′)) = 1− Ct1(c
′) = χ(0, β0,t1).
When j0,t < j0,t−1 at some stage t > t1, we will enumerate c′ into Ct if χ(0, β0,t−1) =
1, and extract c′ out of Ct−1 if χ(0, β0,t−1) = 0, keeping
∆C†g(0)(0)[t] = C†[t](h(z′)) = 1− Ct(c′) = χ(0, β0,t).
Let t2 ≥ t1 be the least stage such that j0,t = j0,t2 for all t ≥ t2 (again, such a
t2 exists since limsβ0,s = β0; in this case, β0 = ω · i0,t1 + j0,t2). Then for all t ≥ t2,
58
![Page 69: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/69.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
β0,t = β0,t2 and ∅††(0) = χ(0, β0,t). So Q0 never acts after stage t2. Hence,
∆C†g(0)(0) = C†[t2](h(z′)) = 1− Ct2(c
′) = χ(0, β0,t2) = ∅††(0).
We have showed that Q0 is satisfied after finitely many actions, and thus injures
lower priority strategies finitely often. (2) and (3) hold.
Recall that sl is the first stage at which there is an ordinal α < ω2 such that
χ(l, α)[sl] ↓. Let βl,s = ω · il,s + jl,s be the least ordinal such that χ(l, βl,s)[s] ↓ at
stage s ≥ sl.
Assume that the lemma is true for Ri, Pi and Qi with i < e. Let ve > maxsi :i ≤ e be the least stage such that for i < e,
• limsr(i, s) = r(i, ve),
• ΓC⊕WC(i)[ve] is defined and is never undefined after stage ve,
• ∆C†g(i)(i)[ve] is defined with value χ(i, βi,ve) and is never changed later.
Then noRi with i < e has C-restraints r(i, s) increase after stage ve, limsγC⊕WC
(i)[s] =
γC⊕WC(i)[ve] for all i < e, and lim
sβi,s = βi,ve for all i < e.
For Re. As no Γ-uses or coding indicators of positive requirements are enumer-
ated into or removed out of C after stage ve, Re is not injured after stage ve. (1)
holds. After stage ve, there are two cases.
(i) r(e, s) never increases after stage ve. Then limsr(e, s) = r(e, ve), Re is satisfied
and never acts after stage ve.
(ii) There is a least stage t > ve at which e ∈ WC [t] − WC [t − 1] with new
computation. Then r(e, t) > r(e, s′) for all s′ ≤ t−1. During the construction,
no positive requirements with lower priority will enumerate numbers ≤ r(e, t)
into C or extract numbers ≤ r(e, t) from C after stage t, so ΨC(0)[t] is never
injured after stage t. Hence, e ∈ WC [s′] for all s′ ≥ t. Re acts at most once
after stage ve and is satisfied.
59
![Page 70: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/70.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
Hence, (2) and (3) hold.
Similar to P0 and Q0 below R0. After stage ve, for Pe and Qe below Re, Pe is
injured at most once, and acts at most once by enumerating γC⊕WC(e) into C when
e goes into ∅′; Qe is injured at most once, and will be satisfied after finitely many
actions. So the lemma holds for Pe and Qe.
Lemma 3.2 For all x, |s : Cs(x) = Cs+1(x)| ≤ x+ 1. Thus C is ω-c.e.
Proof: We can effectively check whether x is a Γ-use or a coding indicator or
not. If no, Cs(x) = 0 for all stages s.
Assume that x is a Γ(i)-use for some i. It enumerates into C at most once when
i goes into ∅′, so |s : Cs(x) = Cs+1(x)| ≤ 1.
Assume that x is a coding indicator of some Qe appointed at stage s. Consider
the least ordinal βe,s = ω ·ie,s+je,s such that χ(e, βe,s)[s] ↓. Then x > je,s, and x may
be enumerated into Cs. At stage t > s, Ct(x) = Ct−1(x) only if je,t < je,t−1 ≤ je,s.
So |s : Cs(x) = Cs+1(x)| ≤ 1 + je,s ≤ x.
By Lemma 3.1, ∅†† ≤wtt C†, ∅′ ≤T C ⊕WC , and WC ≤T ∅′. By Lemma 3.2,
C is ω-c.e. So C is a bounded-high set with C ⊕WC ≡T ∅′.
This completes the proof of Theorem 3.1.(1).
3.2 Pseudo-jump inversion via bounded-low c.e.
sets
To prove Theorem 3.1.(2), for the c.e. operator W , we need to build a bounded-low
c.e. set C (i.e., C† is ω-c.e.) such that C ⊕WC ≡T ∅′. As C will be c.e., C† has
the following natural computable approximations:
fC†(x, s) :=
1, if ∃n ≤ x[φn(x)[s] ↓ ∧ Φ
Cφn(x)x (x)[s] ↓];
0, otherwise.
We only need to add negative requirements of the form
Ne : |s : fC†(e, s) = fC†(e, s+ 1)| ≤ 2(e+ 1)2 + 1
60
![Page 71: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/71.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
to the standard pseudo-jump inversion theorem. Then C will be bounded-low.
We will build a functional Γ such that ΓC⊕WC= ∅′. If e enumerates into ∅′,
then rectify ΓC⊕WC(e) = 1 by enumerating γC⊕WC
(e) into C. To make WC ≤T ∅′
(i.e., WC is ∆02), as usual, we will preserve e ∈ WC by setting a C-restraint ψC(e)
if ΨC(e) ↓.When defining ΓC⊕WC
, the Γ-uses satisfy the following rules.
(i) For each e, and stage s, if ΓC⊕WC(e) is newly defined at stage s, its use
γC⊕WC(e)[s] is defined to be larger than all numbers used before, especially,
γC⊕WC(e)[s] > e.
(ii) For each e, and stage s, if ΓC⊕WC(e)[s] ↓, then ΓC⊕WC
(e)[t] is undefined at
some stage t > s only if
Ct γC⊕WC(e)[s] = Cs γC⊕WC
(e)[s] ∨ WC [t] γC⊕WC(e)[s] = WC [s] γC⊕WC
(e)[s] .
(iii) For e < e′ and stage s, if ΓC⊕WC(e)[s] and ΓC⊕WC
(e′)[s] are both defined, then
γC⊕WC
(e)[s] < γC⊕WC
(e′)[s].
(iv) For each e, there is a stage se such that for all s ≥ se, ΓC⊕WC
(e)[s] ↓= ∅′[s](e)
with use γC⊕WC(e)[s] = γC⊕WC
(e)[se].
This ensures that ∅′ = ΓC⊕WC, and thus ∅′ ≤T C ⊕WC.
As in the standard pseudo-jump inversion theorem, the definition of ΓC⊕WC(e)
is compatible with preserving WC(e).
Now consider the bounded-low requirement Ne. In order to preserve C†(e), at
each stage s, we need to preserve a C-restraint
rN (e, s) = maxφn(e)[s] : n ≤ e ∧ φn(e)[s] ↓.
If ΓC⊕WC(e)[s] ↓ with γC⊕WC
(e)[s] ≤ rN (e, s), Ne will act to enumerate γC⊕WC(e)[s]
into C, thus making ΓC⊕WC(e) undefined; in this case, ΓC⊕WC
(e) will be redefined
61
![Page 72: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/72.jpg)
Chapter 3. A bounded-high set which is high, but not superhigh
with a new use > rN (e, s). Since rN (e, s) can move up at most e+ 1 times, Ne will
enumerate at most e+ 1 many such uses.
Now computations of the form ΦCφn(e)e (e)[s] ↓ (of course, φn(e)[s] ↓) for some n ≤
e are injured at stage s+1 only if there is some i ≤ e such that γC⊕WC(i)[s] ≤ φn(e)
is enumerated into Cs+1. Now ΓC⊕WC(i) ↑ currently, it will be defined with new use
> φn(e). So the enumeration of γC⊕WC(i) later will not injure a new computation
of the form ΦCφn(e)e (e), and the enumeration of γC⊕WC
(i)-uses can injure ΦCφn(e)e (e)
at most once for fixed i and n. Thus, approximations for C†(e) are injured at most
(e+ 1)2 many times. Note that each such an injury entails at most two changes of
fC†(e, s). So
|s : fC†(e, s) = fC†(e, s+ 1)| ≤ 2(e+ 1)2 + 1.
Hence, C† is ω-c.e., i.e., C is bounded-low.
This completes the description of basic strategies and possible interactions be-
tween them. We omit the remaining construction and verification, which are finite
injury arguments.
This completes the proof of Theorem 3.1.(2).
62
![Page 73: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/73.jpg)
Part II
Degrees of orders on torsion-freeabelian groups
63
![Page 74: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/74.jpg)
Chapter 4
Group-order-computable degreesand PA degrees
In Proposition 1.5, we have proved that PA degrees and degrees which are not
weakly group-order-computable coincide. Then all PA degrees are not group-order-
computable. In this chapter, we will show that the converse is also true, that is,
degrees which are not PA are group-order-computable.
Theorem 4.1 There is a computable torsion-free abelian group G with infinite rank
such that for any set A, G admits exactly two A-computable orders iff A is not PA-
complete.
For G above, as any computable set is not PA-complete, G admits exactly two
computable orders. Then for a set A which is not PA-complete, every A-computable
order on G is computable; for a set A which is PA-complete, A computes a noncom-
putable order on G .
Let a be a degree which is not group-order-computable. Then for the group G
in Theorem 4.1, a computes a noncomputable order on G . Thus, a is a PA degree.
Now we obtain the following characterizations of PA degrees.
Proposition 4.1 Let a be a Turing degree. The following are equivalent.
(1) a is a PA degree.
(2) a is not weakly group-order-computable.
(3) a is not group-order-computable.
64
![Page 75: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/75.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
Note that 0′ is the only c.e. degree which is PA. An immediate corollary of
Theorem 4.1 is:
Corollary 4.1 There is a computable torsion-free abelian group G with infinite rank
such that
(1) G has exactly two computable orders;
(2) for any c.e. degree a < 0′, every a-computable order on G is computable.
The following sections are devoted to prove Theorem 4.1.
4.1 Requirements
To prove Theorem 4.1, we will build a computable group G and a computable order
≤G on G to meet the following requirements.
P : G ∼= Q∞.
Q : ≤G and ≤∗G are exactly two computable orders on G .
R : For any set A,
(1) if ≤A is an A-computable order on G , then either ≤A=≤G , or ≤A=≤∗G ,
or A is PA-complete;
(2) if A is PA-complete, then there is an A-computable order on G which is
not computable.
Here, Q∞ is the direct sum of infinitely many copies of Q. ≤∗G denotes the reversal
order of ≤G , that is, for x, y ∈ G , x ≤∗G y ⇔ y ≤G x.
If three requirements above are satisfied, then G is a computable group with
exactly two computable orders. Moreover, for any set A, if A is not PA-complete,
then every A-computable order on G is computable, so there are exactly two A-
computable orders on G ; if A is PA-complete, then there are A-computable orders
which are not computable, so there are more than two A-computable orders on G .
65
![Page 76: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/76.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
4.2 Background
We now review a few concepts on binary strings which are needed for constructing
G . Let 2<ω be the set of binary strings. For each binary string σ, the symbol |σ|denotes the length of σ. For the empty string λ, |λ| = 0. For a nonempty string
σ, |σ| ≥ 1; in this case, write σ := σ(0) · · ·σ(|σ| − 1) and for 1 ≤ i ≤ |σ|, letσ i:= σ(0) · · · σ(i− 1). Set σ 0:= λ.
2<ω has a natural lexicographical order ≤lex defined as follows: 0 <lex 1, and
for σ, τ ∈ 2<ω, σ ≤lex τ if either there is an i < min(|σ|, |τ |) with σ i= τ i andσ(i) <lex τ(i); or σ ⊆ τ . Another well-known order, the length-lexicographical order
≤len−lex, on 2<ω is defined like this: for σ, τ ∈ 2<ω,
σ ≤len−lex τ ⇔ |σ| < |τ | ∨ (|σ| = |τ | ∧ σ ≤lex τ).
Figure 4.1: 2<ω ∪ 2<ω@
Let 2<ω@ be the set of symbols σ@ with σ a binary string. Define a lexicograph-
ical order ≤lex on 2<ω ∪ 2<ω@ based on 0 <lex @ <lex 1. In particular, for each
σ ∈ 2<ω, σ0 <lex σ@ <lex σ1. We can view 2<ω ∪2<ω@ as a ternary tree, where each
node σ ∈ 2<ω has three immediate extensions, namely σ0 <lex σ@ <lex σ1, while
each σ@ with σ ∈ 2<ω has no extensions. The ternary tree is roughly pictured in
Figure 4.1.
Now define a length-lexicographical order, say ≤len−lex, on 2<ω@ based on the
lexicographical order on 2<ω@. That is, for σ@ and τ@ in 2<ω@,
σ@ ≤len−lex τ@ ⇔ |σ| < |τ | ∨ (|σ| = |τ | ∧ σ@ ≤lex τ@).
66
![Page 77: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/77.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
4.3 The P-strategy
We will build a computable group G stage by stage such that G is isomorphic to
Q∞ via a ∆02-isomorphism. During the construction, we maintain a finite set Bs at
each stage s which serves as an approximation of an infinite basis B of G . Then
G ∼= ⊕b∈B
Qb ∼= Q∞.
Now we start to define G . For each σ@ ∈ 2<ω@, we introduce a base-element
qσ@ for G . qσ@ will be enumerated into the constructed group at stage |σ|. qσ@ has
two totally different fates.
(1) If the R-strategy adds a dependence relation of the form qσ@ = rqτ@ for some
positive rational r and some qτ@ with τ@ <len−lex σ@ at some stage t > |σ|,then qσ@ is said to be non-active at stage t. In this case, qσ@ /∈ Bt′ for all
t′ ≥ t.
(2) If no dependence relations of the form qσ@ = rqτ@ are added during stages in
[|σ|, t], qσ@ is said to be active at stage t. In this case, qσ@ ∈ Bt.
Hence, either qσ@ is active forever in which case qσ@ ∈ B, or qσ@ becomes non-active
at some stage > |σ| in which case qσ@ /∈ B.
Let H be the computable additive group ⊕σ∈2<ω
Qqσ@. Elements of H are just
finite Q-linear sums of elements in qσ@ : σ ∈ 2<ω. The constructed group G is
indeed a quotient group of H .
Fix a computable enumeration Hs of H such that at most one element is enu-
merated into Hs at stage s, and for each nonzero x0qσ0@ + · · · + xmqσm@ in Hs, it
satisfies xm = 0, and for each i ≤ m, |σi| ≤ s. Assume that H0 = 0H .
Construction of G = (G,+, 0G ).
At stage 0.
G0 = 0G , q@, where 0G is the zero element of G and q@ is the active base-
element at stage 0. B0 = q@.
At the end of stage s, Gs is the set containing all elements of G enumerated by
stage s. Bs is the set of active base-elements at stage s. Each nonzero g ∈ Gs can
67
![Page 78: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/78.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
be expressed as a unique Q-linear sum of the form
r0qσ0@ + · · ·+ rnqσn@
of active base-elements at stage s with rn = 0 and σ0@ <lex σ1@ · · · <lex σn@ (this
restriction is clear in next paragraph about computable orders). By convention, the
unique Q-linear sum of 0G is the empty sum.
We require σ0@ <lex σ1@ · · · <lex σn@ in the expression g = r0qσ0@+ · · ·+rnqσn@because we build the computable order ≤G such that the sign of g under ≤G is just
the sign of the nonzero rm with m least if such a rm exists, and 0 otherwise. That
is, ≤G is indeed a kind of lexicographical order (the construction of ≤G is clear in
the following Q-strategy).
At stage s+ 1.
Define domain Gs+1. There are two cases depending on whether the R-strategy
adds dependence relations.
Case 1. If no dependence relations are added among active base-elements in Bs
by the R-strategy at stage s+1, then each base-element in Bs is still active at stage
s+1. For each σ with length s+1, add a new base-element qσ@ into Bs+1. That is,
Bs+1 = Bs ∪ qσ@ : |σ| = s+ 1.
If Hs+1 = Hs, let Gs+1 = Gs∪Bs+1. If there is an element, x0qσ0@+· · ·+xmqσm@
say, in Hs+1 − Hs. Note that xm = 0, and for each i ≤ m, |σi| ≤ s+ 1.
(1) If there are qσi@s such that qσi@ is non-active at stage s + 1, just update the
Q-linear sum by replacing such qσi@s by active base-elements at stage s + 1
with corresponding scaling.
(2) Otherwise, each qσi@ in the Q-linear sum is active at stage s+ 1.
In both cases, the Q-linear sum has a new expression, say a0qτ0@ + · · ·+ anqτn@, as
a Q-linear sum of elements in Bs+1. If all ai with i ≤ n are 0, then the Q-linear
sum is indeed the zero element of G , just let Gs+1 = Gs ∪Bs+1. Otherwise, find the
largest m ≤ n with am = 0, there are two cases:
68
![Page 79: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/79.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
(1) If a0qτ0@ + · · · + amqτm@ is not an expression of elements enumerated into G
before, then let Gs+1 = Gs ∪Bs+1 ∪ a0qτ0@ + · · ·+ amqτm@.
(2) Otherwise, let Gs+1 = Gs ∪Bs+1.
Case 2. If there are two active base-elements, say qσ@, qτ@ in Bs, such that the
pair (σ@, τ@) is enumerated into link at stage s+ 1, i.e., the relation link(σ@, τ@)
holds at stage s+ 1 [here, link is a c.e. equivalence relation on 2<ω@ which will be
defined in the basic R-strategy].
We will add dependence relations of the form qη@ = rqρ@ with r > 0, ρ@ <len−lex
η@, i.e., |ρ@| < |η@| or |ρ@| = |η@| with ρ@ <lex η@ (the method for adding
dependence relations will be provided in the following R-strategy). In this case, qη@
is non-active at stage s + 1. Once such a dependence relation is added, we update
the expression of elements in Gs. The added relations ensure that for any g, h ∈ Gs,
if the expression of g, h at stage s is different, then the new expression of g, h at
stage s+ 1 is still different.
Now add new active base-elements qσ@ with |σ| = s+1 at stage s+1. Let Bs+1
be the set of active base-elements at stage s+ 1 (the concert definition of Bs+1 will
be clear in the following R-strategy).
If there is a new x enumerating into Hs+1, first update x as a Q-linear sum of
active base-elements at stage s+ 1, and then add this Q-linear sum into Gs+1 as in
case 1.
This ends the construction of Gs+1.
Define the partial addition +s+1 on Gs+1. Note that each element of Gs+1 has
a unique Q-linear sum of active base-elements in Bs+1. For x, y, z ∈ Gs+1, if the
addition of the unique Q-linear sum of x and y is the same as that of z, then let
x+s+1 y = z.
If we already defined x +s y = z at stage s, then x +s+1 y = z. Indeed, after
substituting one dependence relation of the form qη@ = rqρ@ into the old expression
of x, y, z, we obtain the new expression of them as a unique Q-linear sum of current
active base-elements respectively. It is a direct checking that the new expression
69
![Page 80: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/80.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
of them also satisfies the condition that the addition of the new expression of x, y
equals that of z.
This ends the construction of +s+1.
4.4 The Q-strategy
Due to the one-to-one correspondence between orders and positive cones on com-
putable groups, when building an order on a group, it is enough to specify the set of
positive elements or alternatively to specify the sign of elements in the group. We
build ≤G by specifying the sign of elements in G under ≤G . That is, for each g ∈ G ,
the sign of g is
sign≤G(g) :=
+1, if g >G 0G
0, if g = 0G
−1, if g <G 0G
Then the positive cone of ≤G is just g ∈ G : sign≤G(g) = +1 ∪ 0G .
At each stage s, we approximate ≤G through a type of lexicographical order on
Gs in the following sense. The sign of 0G is always 0. Now assign the sign of nonzero
elements in Gs. First, each nonzero element g ∈ Gs has a unique Q-linear sum of
active base-elements of the form
r0qσ0@ + r1qσ1@ + · · ·+ rnqσn@
with rn = 0 and σ0@ <lex σ1@ · · · <lex σn@. Second, for each such a nonzero g,
find the least m with rm = 0 in the expression, and then define the sign of g to be
the usual sign of rm as rational numbers (i.e., for r ∈ Q, if r > 0, it has sign +1; if
r = 0, it has sign 0; if r < 0, it has sign -1). During the construction, we maintain
the sign of elements unchanged.
Construction of sign≤G.
At stage 0.
G0 = 0G , q@. Let the sign of 0G be 0 and the sign of q@ be +1.
At the end of stage s, we have already appointed the sign of elements in Gs.
Now define the sign of elements in Gs+1.
70
![Page 81: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/81.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
At stage s+ 1.
Case 1. If no dependence relations are added via the R-strategy, then the set of
active base-elements at stage s+ 1 is Bs ∪ qσ@ : |σ| = s+ 1. The sign of elements
in Gs is unchanged at stage s+ 1.
For each new added active base-element qσ@ with |σ| = s+1, let sign≤G(qσ@) =
+1. If there is one more added element, x say, in Gs+1. Then x is of the form
a0qσ0@ + a1qσ1@ + · · · + amqσm@ with am = 0 and σ0@ <lex σ1@ · · · <lex σn@ as a
unique Q-linear sum of active base-elements at stage s + 1. Find the least i ≤ m
such that ai = 0, and then let sign≤G(x) be +1 if ai is positive, and −1 otherwise.
Case 2. If there are two active base-elements, say qσ@, qτ@ in Bs, such that the
pair (σ@, τ@) is enumerated into link at stage s+ 1, i.e., the relation link(σ@, τ@)
holds at stage s+ 1, we will add dependence relations to satisfy the R-strategy. To
make sign≤Gcomputable, we will ensure that such dependence relations added at
stage s+ 1 will not change the sign of elements in Gs.
Without loss of generality, let σ@ <lex τ@. In order to preserve signs of elements
in Gs, the R-strategy first finds all qη@ ∈ Bs such that
(1) σ@ ≤lex η@ ≤lex τ@;
(2) there is an element g ∈ Gs and a nonzero coefficient r such that rqη@ appears
in the unique expression of g as a Q-linear sum of elements in Bs.
Now list all such η@s under the lexicographical order as
σ@ = ξ0@ <lex ξ1@ · · · <lex ξn−1@ <lex ξn@ = τ@.
By the definition of link, link(σ@, τ@) holds implies for all i, j ≤ n, link(ξi@, ξj@)
holds.
In the following R-strategy, we will add dependence relations of the form
qη@ = rqρ@
with proper r > 0 and ρ@ <len−lex η@, i.e., |ρ| < |η| or (|ρ| = |η| ∧ ρ@ <lex η@).
We start with qξ0@ and qξ1@. Now each g ∈ Gs has an expression of the form
g = · · ·+ rξ0qξ0@ + rξ1qξ1@ + · · · .
71
![Page 82: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/82.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
Let
δ0@ :=
ξ0@, if ξ0@ <len−lex ξ1@ξ1@, if ξ1@ <len−lex ξ0@
and γ0@ ∈ ξ0@, ξ1@ − δ0@. We first add relations of the form
qγ0@ = c0qδ0@
with proper c0 > 0 such that the sign of elements in Gs does not change after
substituting this relation.
When ξ0@ <len−lex ξ1@, we add qξ1@ = c0qξ0@. Then g has a new expression
· · ·+ (rξ0 + rξ1c0)qξ0@ + 0qξ1@ + · · · .
(1) If rξ0 = 0, then the sign of rξ1 equals the sign of rξ1c0.
(2) If rξ0 = 0, then we will choose c0 such that the sign of rξ0 equals the sign of
rξ0 + rξ1c0.
Then the sign of g computed according to the new expression is the same as before.
When ξ1@ <len−lex ξ0@, we add qξ0@ = c0qξ1@. Now g has a new expression
· · ·+ 0qξ0@ + (rξ0c0 + rξ1)qξ1@ + · · · .
(1) If rξ0 = 0, then the expression of g does not change.
(2) If rξ0 = 0, then we will choose c0 such that the sign of rξ0 equals the sign of
rξ0c0 + rξ1 .
So the sign of g does not change after substituting the relation.
Now each element in Gs has a unique expression as a Q-linear sum of elements
in Bs−qγ0@ and there are no active base-elements qζ@ with δ0@ <lex ζ@ <lex ξ2@
in the expression.
We then deal with qδ0@ and qξ2@ in a similar manner as dealing with qξ0@ and
qξ1@. Continue this process until all qξi@ with i ≤ n are considered. Once adding a
dependence relation, we preserve the sign of elements in Gs. So the whole process
does not change the sign of elements in Gs.
72
![Page 83: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/83.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
In general, for 1 ≤ i ≤ n − 1, define by induction that δi@ is the length-
lexicographically smaller element in δi−1@, ξi+1@ and that γi@ is the other element
in δi−1@, ξ[email protected] the set of active base-elements is
Bs+1 = (Bs − qγi@ : 0 ≤ i ≤ n− 1) ∪ qσ@ : |σ| = s+ 1.
The sign of each new active base-element qσ@ is +1, and the sign of the new added
element (if such an element exists) is determined as in case 1.
4.5 The R-strategy
The R-requirement says that for any set A,
(1) if the constructed group G has an A-computable order, say ≤A, with ≤A =≤G
and ≤A =≤∗G , then A is PA-complete;
(2) if A is PA-complete, then G has an A-computable order which is neither ≤G
nor ≤∗G .
4.5.1 Background on PA-complete sets
We will use an equivalent definition for a set being PA-complete that A is PA-
complete iff it computes a 0, 1-valued diagonally nonrecursive function, i.e., a
0, 1-valued function f such that for all x, if φx(x) ↓, then f(x) = φx(x).
For a binary tree T , an infinite binary string f is an infinite path on T if for all
n, its prefix f(0)f(1) · · · f(n), denoted by f n+1, is in T ; set f 0:= λ, the empty
string. We view f as a 0, 1-valued function (i.e., the characteristic function of
n ∈ N : f(n) = 1). We use [T ] to denote the set of infinite paths of T .
One can build a co-c.e. binary tree T (i.e., the complement of T is c.e.) such
that [T ] is just the set of 0, 1-valued diagonally nonrecursive functions. Then for
a set A, A is PA-complete iff it computes an infinite path of T . Now based on this
T , to satisfy R, we only need to meet the following R′:
R′: For any set A, if ≤A is an A-computable order on G which is neither ≤G nor
≤∗G , then A computes an infinite path on T . If f ∈ [T ], then f computes an
order on G which is not computable.
73
![Page 84: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/84.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
We now construct the co-c.e. tree T by stages.
The construction of T .
At stage 0. T0 = 2<ω, the full binary tree. F0 = ∅, the complement of T0.
At the end of stage s, we already obtained approximations Ts and Fs such that
Ts ∪ Fs = 2<ω.
At stage s+1. For each σ ∈ Ts of length ≤ s + 1, if there is a x < |σ| suchthat φx,s+1(x) is defined with value σ(x), then enumerate σ into Fs+1. Let Ts+1 =
2<ω − Fs+1.
This ends the construction of T at stage s+ 1.
Clearly, T = ∩s∈N
Ts is a co-c.e. set. For any binary string σ, σ ∈ T iff it satisfies
∀x < |σ| [ φx(x) ↓→ φx(x) = σ(x) ], then any initial segment of σ is also in T . So
T is a tree. Furthermore, f ∈ [T ] iff f is a 0, 1-valued diagonally nonrecursive
function.
By using infinite paths on T , we will define an equivalence relation on 2<ω@
(recall that 2<ω@ = σ@ : σ ∈ 2<ω). The lexicographical order ≤lex on 2<ω ∪2<ω@
is already defined in section 4.2, where for any binary string σ, σ0 <lex σ@ <lex σ1.
Now for f ∈ [2<ω] and σ@ ∈ 2<ω@,
• say that f is lexicographically less than σ@, denoted by f <lex σ@, if there
is an i < |σ| + 1 such that f i= σ@ i and f(i) <lex σ@(i); and σ@ is
lexicographically less than f , denoted by σ@ <lex f , otherwise.
Hence, if f <lex σ@, then for all n, f n<lex σ@; otherwise, there is a m such that
for all n ≥ m, σ@ <lex f n.
Definition 4.1 Let T be the co-c.e. tree, where [T ] is the set of 0, 1-valued diag-
onally nonrecursive functions. For σ@, τ@ ∈ 2<ω@, link(σ@, τ@) holds if there is
no f ∈ [T ] such that f is lexicographically between σ@ and τ@.
We use link to denote the set of pairs (σ@, τ@) such that link(σ@, τ@) holds.
One can directly check that link is an equivalence relation on 2<ω@.
Proposition 4.2 link is a c.e. equivalence relation.
74
![Page 85: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/85.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
Proof: Fix a computable approximation Ts of T (as in the construction of T
above) such that Ts+1 ⊆ Ts and T = ∩s∈N
Ts.
For σ@, τ@ ∈ 2<ω@, assume that σ@ <lex τ@. link(σ@, τ@) holds iff
η ∈ 2<ω : σ@ <lex η <lex τ@ ∩ T is finite iff
∃ n ∃ s ∀ ρ ∈ 2<ω [ (|ρ| = n ∧ σ@ <lex ρ <lex τ@) → ρ /∈ Ts ].
So link is Σ01.
4.5.2 The R′-strategy
The R′-requirement says that:
(1) for any set A, if ≤A is an A-computable order on G which is neither ≤G nor
≤∗G , then A computes an infinite path on T ;
(2) if f ∈ [T ], then f computes an order on G which is not computable.
In order to satisfy (1) of the R′-requirement, we will initiate an A-effective
process for searching nodes in 2<ω@ which approximates an infinite path on T
lexicographically form below and above. Our method is to add dependence relations
of the form qη@ = rqρ@, where r > 0, link(η@, ρ@) holds, and ρ@ <len−lex η@.
In this section, we will develop the method for adding dependence relations. We
will show that this method works (i.e., the R′-requirement is satisfied) in sections
4.6.3 and 4.6.4.
Since the length-lexicographical order on 2<ω@ is a well ordering, for each τ@ ∈2<ω@, there are finitely many ζ@ ∈ 2<ω@ such that ζ@ <len−lex τ@. So there is
a least ζ@ ≤len−lex τ@ such that ζ@ and τ@ are linked, where the least is taking
under ≤len−lex. Then qτ@ has an expression of the form r′qζ@ for some r′ > 0, and
then no new expressions are assigned to qτ@. Since an element, x say, is enumerated
into Gs for first time is always of the form
x0qσ0@ + · · ·+ xmqσm@
of a Q-linear sum of active base-elements at stage s, there is a large enough stage
after which no more expressions are assigned to all qσi@ with 0 ≤ i ≤ m. Then x
will arrive at a final expression as a Q-linear sum of active base-elements.
75
![Page 86: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/86.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
When adding qη@ = rqρ@ at stage s + 1, we need to ensure the following two
conditions:
(1) the assignment of Q-linear sums to elements in Gs remains one-to-one (i.e.,
the dependence relation is compatible with the P-strategy of constructing G );
(2) the sign of elements in Gs does not change (i.e., the dependence relation is
compatible with the Q-strategy of constructing ≤G ).
Adding dependence relations.
Since link is a c.e. equivalence relation on 2<ω@, just fix a computable enumer-
ation links of link such that at each stage s there is at most one pair of the form
(σ@, τ@) with |σ|, |τ | < s enumerating into links.
At stage 0. link0 = ∅. q@ is the only active base-element at stage 0.
Assume that we have already obtained Bs, the set of active base-elements at
stage s. Each element in Bs is of the form qτ@ with |τ | ≤ s. Each g ∈ Gs has a
unique Q-linear sum of elements in Bs. By convention, the unique Q-linear sum for
0G is just the empty sum.
At stage s+1.
Case 1. If links = links+1, or (σ@, τ@) ∈ links+1 − links, where at least one
of qσ@ and qτ@ is non-active at stage s, then no dependence relations are added at
stage s+ 1. Just let Bs+1 = Bs ∪ qσ@ : |σ| = s+ 1.
Case 2. Suppose that there is a pair (σ@, τ@) of active base-elements at stage
s enumerating into links+1. We will add dependence relations between qσ@ and qτ@.
Without loss of generality, we assume that σ@ <lex τ@.
First, find all qη@ ∈ Bs such that
(1) σ@ ≤lex η@ ≤lex τ@;
(2) there is an element g ∈ Gs and a nonzero coefficient r such that rqη@ appears
in the unique expression of g as a Q-linear sum of elements in Bs.
76
![Page 87: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/87.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
Second, list all such η@s under the lexicographical order as follows:
σ@ = ξ0@ <lex ξ1@ · · · <lex ξn−1@ <lex ξn@ = τ@.
Since link(σ@, τ@) holds, for all i, j ≤ n, link(ξi@, ξj@) holds.
We start to add dependence relations between qξ0@ and qξ1@. Now each element
of Gs has a unique Q-linear sum in which no active base-elements qζ@ with ξ0@ <lex
ζ@ <lex ξ1@ appears. That is, each g ∈ Gs has a unique expression of the form
g = · · ·+ rξ0qξ0@ + rξ1qξ1@ + · · · .Let δ0@ be the length-lexicographically less element between ξ0@ and ξ1@, and
γ0@ be the other element. In module D(0), we will add a relation of the form
qγ0@ = c0qδ0@ with proper c0 > 0 such that after substituting this relation, the new
expressions of elements in Gs as Q-linear sums of elements in Bs − qγ0@ remain
one-to-one and the signs of elements in Gs computed according to new expressions
remain unchanged.
Module D(0).
1. List all nonzero r ∈ Q where either rqδ0@ or rqγ0@ occurs in the unique expres-
sion of an element in Gs as a Q-linear combination of active base-elements at
stage s as follows:
r1, r2, · · · , rl.
2. Set r0 := 0. Choose a large enough k ∈ N+ such that for all i, i′, j, j′ ≤ l with
rj − rj′ = 0,
k >|ri − ri′||rj − rj′|
.
2.1. If δ0@ <lex γ0@, each element, say g ∈ Gs, has an expression of the form
g = · · ·+ rδ0qδ0@ + rγ0qγ0@ + · · · .
(1) Add a new dependence relation qγ0@ = 1kqδ0@. Declare qγ0@ is non-active
at stage s+ 1.
77
![Page 88: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/88.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
(2) We now show that adding qγ0@ = 1kqδ0@ does not change the sign of
elements in Gs.
By substituting qγ0@ = 1kqδ0@, g has a new expression
g = · · ·+ (rδ0 +rγ0k)qδ0@ + 0qγ0@ + · · · .
When rδ0 = 0. Since k is positive, the sign of rγ0 equals the sign ofrγ0k.
When rδ0 = 0. We show that the sign of rδ0 equals the sign of rδ0 +rγ0k.
(i) rδ0 > 0. Since k > 0, if rγ0 ≥ 0, then rδ0 +rγ0k> 0. If rγ0 < 0, by the
choice of k, k >−rγ0rδ0
, that is, rδ0 +rγ0k> 0.
(ii) rδ0 < 0. Since k > 0, if rγ0 ≤ 0, then rδ0 +rγ0k< 0. If rγ0 > 0, since
k >rγ0−rδ0
, rδ0 +rγ0k< 0.
By definition, the current sign of nonzero g ∈ Gs is the sign of the first
nonzero rational coefficient in this new expression as a Q-linear sum of
current active base-elements. Hence, after adding the dependence relation
qγ0@ = 1kqδ0@, the current sign of g ∈ Gs is the same as before.
(3) We now show that adding qγ0@ = 1kqδ0@ ensures that the assignment of
Q-linear sums to elements in Gs remains one-to-one.
For x, x′ ∈ Gs, suppose that at stage s, x = · · ·+ aδ0qδ0@ + aγ0qγ0@ + · · · ,and x′ = · · ·+ a′δ0qδ0@ + a′γ0qγ0@ + · · · . If the new expression of x and x′
is the same, then the coefficient of active base-elements at stage s other
than qδ0@, qγ0@ is the same and
aδ0 +aγ0k
= a′δ0 +a′γ0k,
i.e., (aδ0 − a′δ0)k = (a′γ0 − aγ0).
(i) If aδ0 = a′δ0 , then a′γ0
= aγ0 . In this case, the old expression of x, x′
at stage s is the same.
78
![Page 89: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/89.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
(ii) If aδ0 = a′δ0 , then k =a′γ0−aγ0aδ0−a
′δ0
. In this case, the old expression of x, x′
at stage s is different. However, by the choice of k, k >|a′γ0−aγ0 ||aδ0−a
′δ0
| . So
this case is impossible.
Hence, if x, x′ ∈ Gs have different expression as Q-linear sums of active
base-elements at stage s, then the new expression of them as Q-linear
sums of current active base-elements is still different.
2.2. If γ0@ <lex δ0@, each element, say g ∈ Gs, has an expression of the form
g = · · ·+ rγ0qγ0@ + rδ0qδ0@ + · · · .
(1) Add a new dependence relation qγ0@ = kqδ0@. Declare qγ0@ is non-active
at stage s+ 1.
(2) We first show that adding qγ0@ = kqδ0@ does not change the sign of
elements in Gs.
By substituting qγ0@ = kqδ0@, g has a new expression
g = · · ·+ 0qγ0@ + (rδ0 + rγ0k)qδ0@ + · · · .
If rγ0 = 0, then the expression of g does not change.
Suppose rγ0 = 0. There are two cases:
(i) rγ0 > 0. If rδ0 ≥ 0, then rδ0 + rγ0k > 0. If rδ0 < 0, since k >−rδ0rγ0
,
rδ0 + rγ0k > 0.
(ii) rγ0 < 0. If rδ0 ≤ 0, then rδ0 + rγ0k < 0. If rδ0 > 0, since k >rδ0−rγ0
,
rδ0 + rγ0k < 0.
The current sign of g is calculated as the sign of the first nonzero rational
coefficient in this new expression of g if such a nonzero coefficient exists.
Hence, the current sign of g ∈ Gs is the same as before.
79
![Page 90: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/90.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
(3) We now show that adding qγ0@ = kqδ0@ ensures that the assignment of
Q-linear sums to elements in Gs remains one-to-one.
For x, x′ ∈ Gs with different expression x = · · ·+ aγ0qγ0@ + aδ0qδ0@ + · · ·and x′ = · · ·+ a′γ0qγ0@ + a′δ0qδ0@ + · · · . Suppose that the new expression
of x and x′ by substituting qγ0@ = kqδ0@ is the same.
Then the coefficient of active base-elements at stage s other than qγ0@, qδ0@
is the same and
aδ0 + aγ0k = a′δ0 + a′γ0k,
i.e., (aδ0 − a′δ0) = (a′γ0 − aγ0)k.
(i) If aδ0 = a′δ0 , then a′γ0
= aγ0 . In this case, the old expression of x, x′
at stage s is the same, contracting with the assumption on x, x′.
(ii) If aδ0 = a′δ0 , then k =aδ0−a
′δ0
a′γ0−aγ0. However, by the choice of k, k >
|aδ0−a′δ0
||a′γ0−aγ0 |
. So this case is impossible.
Hence, the new expression of x, x′ ∈ Gs as Q-linear sums of elements in
Bs − qγ0@ is different.
3. If n > 1, run module D(1). Otherwise, n = 1 and ξ1 = τ , stop adding
dependence relations.
This completes the description of module D(0).
At the end of module D(0), each element in Gs has a unique Q-linear sum of
elements in Bs − qγ0@. Now there is no current active base-elements of the form
qζ@ with δ0@ <lex ζ@ <lex ξ2@.
In general, when n ≥ i+1 ≥ 2, we will start a new module D(i). Assume that we
have already defined δi−1@ and γi−1@, and added dependence relations qγj@ = cjqδj@
for all j ≤ i − 1. Now each element in Gs has a unique Q-linear sum of elements
in Bs − qγj@ : j ≤ i − 1, and there are no current active base-elements qζ@ with
δi−1@ <lex ζ@ <lex ξi+1@.
80
![Page 91: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/91.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
Let δi@ be the length-lexicographically smaller element in δi−1@, ξi+1@ and γi@be the other element. We will add a dependence relation of the form qγi@ = ciqδi@
in module D(i).
Module D(i) with 1 ≤ i ≤ n− 1.
1. List all nonzero rational numbers which are coefficients of qδi@ or qγi@ in the
unique expression of an element in Gs as a Q-linear sum of elements in Bs −qγj@ : j ≤ i− 1 as follows:
r1, r2, · · · , rl.
2. Set r0 := 0. Choose a large enough k ∈ N+ such that for all i, i′, j, j′ ≤ l with
rj − rj′ = 0,
k >|ri − ri′||rj − rj′|
.
If δi@ <lex γi@, add a new dependence relation qγi@ = 1kqδi@. If γi@ <lex δi@,
add a new dependence relation qγi@ = kqδi@. Declare qγi@ is non-active at
stage s+ 1.
By substituting the added dependence relation in the expression of g ∈ Gs
as a Q-linear sum of elements in Bs − qγj@ : j ≤ i − 1, we obtain a new
expression of g as a Q-linear sum of elements in Bs − qγj@ : j ≤ i. One can
show as in module D(0) that the sign of g determined by this new expression is
unchanged and that the new expression of elements in Gs remains one-to-one.
3. When n = i + 1, ξi+1 = τ , stop adding dependence relations. Otherwise,
n > i+ 1, continue to run module D(i+ 1).
This completes the description of module D(i).
Suppose that we have added dependence relations qγi@ = ciqδi@ in module D(i)
for all i ≤ n− 1. By a direct checking, one can show that qγi@ = aiqδn−1@ for some
ai > 0. Finally, the set of active base-elements at stage s+ 1 is
Bs+1 = (Bs − qγi@ : 0 ≤ i ≤ n− 1) ∪ qσ@ : |σ| = s+ 1.
81
![Page 92: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/92.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
This ends adding dependence relations.
We will show in the following sections 4.6.3 and 4.6.4 that for any set A, G
admits exactly two A-computable orders iff A is not PA-complete.
4.6 Construction and verification
4.6.1 Construction
Fix an effective enumeration links of link (a c.e. equivalence relation defined on
2<ω@) such that at most one pair is enumerated into links at each stage s. Assume
that |σ| < s and |τ | < s when (σ@, τ@) ∈ links.
At stage 0. link0 = ∅. Let G0 = 0G , q@, where 0G is the zero of the constructed
group (its unique Q-linear sum is just the empty sum), q@ is the active base-element
at stage 0. Set sign≤G(0G ) = 0 and sign≤G
(q@) = +1.
At stage s+ 1.
Step 1. If a new pair of active base-elements at stage s is enumerated into
links+1, then add dependence relations according to the basic R-strategy, goto step
2. Otherwise, no dependence relations are added at stage s+ 1, goto step 3.
Step 2. Build Gs+1 and sign≤Gon Gs+1 respectively according to the basic
P-strategy and the basic Q-strategy with dependence relations added.
Step 3. Build Gs+1 and sign≤Gon Gs+1 respectively according to the basic
P-strategy and the basic Q-strategy with no dependence relations added.
This ends the stage s+ 1 of the construction.
In section 4.6.2, we will show that P and Q are both satisfied. In sections 4.6.3
and 4.6.4, we will show that R is satisfied.
4.6.2 G is a computable group possessing computable orders
Fix an effective enumeration Hs of H :=⊕
σ∈2<ω
Qqσ@ such that for all s, |Hs+1 −
Hs| ≤ 1. During the stage s of the construction, we enumerate qσ@ with |σ| = s
into Gs, and obtain active base-elements Bs. We may enumerate one more element,
82
![Page 93: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/93.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
say x, into Gs; in this case, there is an element y in Hs such that x is a unique
Q-linear sum of elements in Bs obtained by replacing non-active base-elements in y
by active ones with corresponding scaling, and no elements enumerated into G so
far has an expression the same as x.
For each g ∈ Gs, it can be expressed as a unique Q-linear combination of active
base-elements at stage s. Now we show that the expressions of g only change finitely
many times after stage s. Then each element in G has a unique Q-linear combination
of active base-elements at end.
We only need to show that each original base-element, say qσ@, has finitely many
expressions (all such expressions are elements of H , they represent the same element
of G ). qσ@ is first enumerated into G as an active base-element at stage |σ|, it has anew expression later only if there is a τ@ <len−lex σ@ such that link(σ@, τ@) holds
(in this case, qσ@ will be non-active forever). Then qσ@ = aqτ@ for some a > 0.
Since ≤len−lex is a well ordering on 2<ω@, there is a length-lexicographically
least element, say ρ@, in 2<ω@ such that link(σ@, ρ@) holds. Then qσ@ has a last
expression of the form bqρ@ for some b > 0. In this case, qρ@ is active forever.
For each g ∈ Gs, we also define the sign sign≤G(g) such that if g has a new
expression later, then the sign computed according to this new expression is the
same as before. Now for each element, g say, in G , it may have several expressions
in terms of elements in H ; however, sign≤G(g) is just the sign computed according
to the first expression of g.
G is computable. For two original elements, say g, h, in H , one can effectively
check whether they represent the same element in G (i.e. g equals h in G ) as follows:
(1) find the stage t such that g − h is first enumerated into H ; (2) at stage t, we
will consider g − h and update it as a Q-linear sum, say x, of elements in Bt; (3)
g − h = 0G iff all coefficients in x are 0. Hence, this equality relation on H is
computable. G can be viewed as the quotient group of H modulo this equality
relation. Thus, G is computable.
≤G is computable. Now sign≤G(g) is a computable function on G . Moreover,
P := g ∈ G : sign≤G(g) = +1 ∪ 0G is a computable set which is closed under
addition, containing exactly one of g and −g when g = 0G . That is, P is a positive
cone on G . So P determines a computable order, namely ≤G , on G .
83
![Page 94: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/94.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
G is ∆02-isomorphic to Q∞. Since there are infinitely many infinite paths on
T , the so defined link-relation on 2<ω@ has infinitely many equivalence classes, that
is, B := qσ@ : σ ∈ 2<ω, qσ@ is active is infinite. Moreover, B forms a Π01-basis for
G , and G is isomorphic to ⊕b∈B
Qb via a ∆02-isomorphism. Hence, G is ∆0
2-isomorphic
to Q∞.
4.6.3 A-computable orders on G which are not computable
Suppose that ≤A is an A-computable order on G such that ≤A =≤G and ≤A =≤∗G .
We will show that A computes an infinite path on the co-c.e. binary tree T which
is PA-complete. Then A is also PA-complete.
Note that G is just H modulo the so defined computable equality relation,
denoted by ∼. For any order on G with corresponding sign function, say φ, we can
indeed extend φ to H by setting φ(h) = φ(g) where g ∈ G such that g ∼ h. In
particular, we will talk about the sign of elements in H under ≤A or ≤G through
this way.
We start by comparing ≤A with ≤G on qσ@ : σ ∈ 2<ω, the set of original
base-elements. The sign of each qσ@ under ≤G is +1. For the sign determined by
≤A or simply called A-sign, either there are two base-elements, say qσ@ and qτ@,
having different A-sign; or all base-elements have the same A-sign.
Case 1. Suppose that there are qσ@ and qτ@ such that their A-sign are different.
Since each base-element is nonzero in G , its A-sign is not 0. Suppose that the A-sign
of qσ@ is -1, and that the A-sign of qτ@ is +1.
Claim. link(σ@, τ@) fails.
Proof. Suppose otherwise. We will add a dependence relation of the form qσ@ =
rqτ@ with r > 0, τ@ <len−lex σ@ or of the form qτ@ = r′qσ@ with r′ > 0, σ@ <len−lex
τ@. In both cases, qτ@ and qσ@ have the same A-sign.
This ends the proof.
Recall that σ@ and τ@ are not linked means that there is at least one infinite
path on T such that it is lexicographically between σ@ and τ@.
With the help of ≤A, we will initiate an A-effective process which approximates
lexicographically form below and above an infinite path of T . Without loss of
generality, assume that τ@ <lex σ@.
84
![Page 95: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/95.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
Let ξ0@ = τ@, ζ0@ = σ@. By assumption, qξ0@ and qζ0@ have A-sign +1 and
-1 respectively. Let δ0 be the longest common initial segment of ξ0, ζ0, denoted
by ξ0 ∩ ζ0. Then any infinite binary string lexicographically between ξ0@ and ζ0@
extends δ0. Start module C(0) below, where one can determine a strictly extension
δ1 of δ0 such that δ1 is a prefix of the desired infinite path (we are searching for) on
T .
In general module C(i) with i ≥ 0, we define δi+1 ⊃ δi such that δi+1 can be
extended into an infinite path on T . C(i) proceeds as follows.
Module C(i) with i ≥ 0.
1. Pick the length-lexicographically least element η ∈ 2<ω with ξi@ <lex η@ <lex
ζi@, denoted by ηi.
2. If qηi@ has A-sign -1, then update ξi+1@ = ξi@, ζi+1@ = ηi@.
If qηi@ has A-sign +1, then update ξi+1@ = ηi@, ζi+1@ = ζi@.
In both cases, qξi+1@ and qζi+1@ have different A-sign. So there is an infinite
path on T which is lexicographically between ξi+1@ and ζi+1@.
3. Now define δi+1 ⊃ δi such that there is an infinite binary string on T extending
δi+1. There are three cases.
3.1. If ξi@ <lex δi@ <lex ζi@, then δi is the length-lexicographically least
element η in 2<ω such that ξi@ <lex η@ <lex ζi@, i.e., ηi = δi.
(i) If ζi+1 = ηi, then any infinite binary string lexicographically between
ξi+1@ and ζi+1@ extends δi0. Just set δi+1 = δi0.
(ii) If ξi+1 = ηi, then any infinite binary string lexicographically between
ξi+1@ and ζi+1@ extends δi1. Just set δi+1 = δi1.
3.2. If δi@ ≤lex ξi@, then δi1 ⊆ ηi. In this case, any infinite binary string
lexicographically between ξi+1@ and ζi+1@ extends δi1. So set δi+1 = δi1.
85
![Page 96: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/96.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
3.3. If ζi@ ≤lex δi@, then δi0 ⊆ ηi. In this case, any infinite binary string
lexicographically between ξi+1@ and ζi+1@ extends δi0. So set δi+1 = δi0.
As link(ξi+1@, ζi+1@) fails, there is an infinite path, say f , on T which is
lexicographically between ξi+1@ and ζi+1@. Since any infinite binary string
lexicographically between ξi+1@ and ζi+1@ extends δi+1, f extends δi+1.
4. Start module C(i+ 1).
This completes module C(i).
We obtain a strictly increasing sequence δi : i ∈ N of binary strings such that
each δi can be extended into an infinite path on T . Let g = ∪i∈Nδi, i.e., g(n) = δn+1(n)
(note that |δn+1| ≥ n + 1). Then g is the desired infinite path on T which is
computable from ≤A, thus g is A-computable. Since g is PA-complete, A is also
PA-complete.
Case 2. Suppose that each original base-element has the same A-sign under
≤A. Suppose that this A-sign is +1, we will show that ≤A can compute an infinite
path of T [otherwise, we can deal with the reversal order of ≤A, and then show that
this reversal order can compute an infinite path of T ].
Now for each qσ@, its A-sign is the same as sign≤G(qσ@). Since ≤A =≤G , there is
an element, say g ∈ G, such that sign≤G(g) = +1, but the A-sign of g is -1. g has
a final Q-linear sum of active base-elements, denoted by g = a0qσ0@ + · · · + anqσn@
with ai = 0 for each i = 0, · · · , n and σ0@ <lex σ1@ · · · <lex σn@.
As sign≤G(g) = +1, a0 > 0. We may assume a0 = 1 [otherwise we deal with
1a0g]. Now write g as
g = [qσ0@ + (a1 − 1)qσ1@] + · · ·+ [qσm−1@ + (am − 1)qσm@] + · · ·+ qσn@.
For each 1 ≤ m ≤ n, sign≤G(qσm−1@+(am−1)qσm@) = +1, and sign≤G
(qσn@) = +1.
Note that qσn@ has A-sign +1. Since the A-sign of g is -1, there is some m ≤ n
such that qσm−1@ + (am − 1)qσm@ has A-sign -1. In this case, am − 1 < 0; otherwise,
am − 1 ≥ 0, then qσm−1@ + (am − 1)qσm@ has A-sign +1, a contradiction.
86
![Page 97: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/97.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
Hence, there are σ@, τ@ with σ@ <lex τ@ and r > 0 such that qσ@ − rqτ@ has
sign +1 under ≤G and -1 under ≤A respectively.
Claim. For such σ@, τ@, link(σ@, τ@) fails.
Proof. Suppose otherwise. There are two cases:
If τ@ <len−lex σ@, then a dependence relation of the form qσ@ = aqτ@ with a > 0
will be added such that 0qσ@ + (a− r)qτ@ has sign +1 under ≤G . So a− r > 0.
In this case, since the A-sign of qτ@ is +1, the A-sign of 0qσ@ + (a− r)qτ@ is +1.
As qσ@−rqτ@ = 0qσ@+(a−r)qτ@ in G , if ≤A is an order on G , by our convention, the
A-sign of qσ@−rqτ@ and 0qσ@+(a−r)qτ@ is the same, contradicting the assumption
that qσ@ − rqτ@ has A-sign -1.
If σ@ <len−lex τ@, then we will add a dependence relation of the form qτ@ = bqσ@
with b > 0 such that sign≤G((1 − rb)qσ@ + 0qτ@) = +1. So 1 − rb > 0. Then
(1− rb)qσ@ + 0qτ@ has A-sign +1, a contradiction.
This ends the proof.
Similar to case 1, we will initiate an A-effective process which approximates an
infinite path on T lexicographically form below and above.
Find (σ@, τ@) with σ@ <lex τ@ and r > 0 such that qσ@−rqτ@ has sign +1 under
≤G and sign -1 under ≤A. Let ξ0@ = σ@, ζ0@ = τ@ and r0 = r. Note that any
infinite binary string lexicographically between ξ0@ and ζ0@ extends δ0 := ξ0 ∩ ζ0.First start module C(0), where we will determine the successor, say j, of δ0 such
that there is an infinite path on T which extends δ0j.
In general, for i ≥ 1, suppose that we have already obtained ξi@ <lex ζi@,
ri > 0, and δi in module C(i− 1), where sign≤G(qξi@ − riqζi@) = +1, the A-sign of
qξi@− riqζi@ is -1, and there is an infinite binary string on T which extends δi. Then
we will start module C(i) to search for longer approximation δi+1 of an infinite path
on T . We point out here that for i ≥ 1, δi may not be ξi ∩ ζi, but the point is that
any infinite binary string lexicographically between ξi@ and ζi@ extends δi.
Module C(i) with i ≥ 0.
1. Pick the length-lexicographically least element η ∈ 2<ω such that ξi@ <lex
η@ <lex ζi@, denoted by ηi.
87
![Page 98: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/98.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
2. Search until a positive r′ is found such that qξi@− r′qηi@ and qηi@− rir′qζi@ have
the same sign +1 under ≤G ; and either qξi@ − r′qηi@ or qηi@ − rir′qζi@ has sign
-1 under ≤A.
We now show that such a r′ exists. Indeed, since link(ξi@, ζi@) fails, there is
an infinite binary string, say f , on T which is lexicographically between ξi@
and ζi@. There are three cases:
2.1. If ξi@ <lex f <lex ηi@ [so link(ξi@, ηi@) fails], and link(ηi@, ζi@) holds.
(i) ηi@ <len−lex ζi@. Then qζi@ = aqηi@ for some a > 0, and
qηi@ − rir′qζi@ = (1− ria
r′)qηi@ + 0qζi@.
One can choose a positive r′ such that 1− riar′> 0.
(ii) ζi@ <len−lex ηi@. Then qηi@ = bqζi@ for some b > 0, and
qηi@ − rir′qζi@ = 0qηi@ + (b− ri
r′)qζi@.
One can choose a positive r′ such that b− rir′> 0.
In both cases, qηi@ − rir′qζi@ has sign +1 under both ≤G and ≤A.
Since link(ξi@, ηi@) fails (no relation will be added between qξi@ and
qηi@), qξi@ − r′qηi@ has sign +1 under ≤G .
As the A-sign of qξi@ − riqηi@ is -1, the A-sign of qηi@ − rir′qζi@ is +1, and
qξi@ − riqηi@ = (qξi@ − r′qηi@) + r′(qηi@ − rir′qζi@),
the A-sign of qξi@ − r′qηi@ is -1.
2.2. If ηi@ <lex f <lex ζi@ [so link(ηi@, ζi@) fails], and link(ξi@, ηi@) holds.
(i) ξi@ <len−lex ηi@. Then qηi@ = aqξi@ for some a > 0, and
qξi@ − r′qηi@ = (1− r′a)qξi@ + 0qηi@.
One can choose a positive r′ such that 1− r′a > 0.
88
![Page 99: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/99.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
(ii) ηi@ <len−lex ξi@. Then qξi@ = bqηi@ for some b > 0, and
qξi@ − r′qηi@ = 0qξi@ + (b− r′)qηi@.
One can choose a positive r′ such that b− r′ > 0.
Similarly, one can show that qξi@ − r′qηi@ and qηi@ − rir′qζi@ have sign +1
under ≤G ; and that qξi@ − r′qηi@ and qηi@ − rir′qζi@ have A-sign +1 and -1
respectively.
2.3. If link(ξi@, ηi@) and link(ηi@, ζi@) both fail. Clearly, qξi@ − qηi@ and
qηi@ − riqζi@ have sign +1 under ≤G . Since the A-sign of qξi@ − riqζi@ is
-1, and
qξi@ − riqζi@ = (qξi@ − qηi@) + (qηi@ − riqζi@),
at least one of qξi@ − qηi@ and qηi@ − riqζi@ has A-sign -1. In this case,
just pick r′ = 1.
3. If the A-sign of qξi@− r′qηi@ is -1, update ξi+1@ = ξi@, ζi+1@ = ηi@, ri+1 = r′.
If the A-sign of qηi@− rir′qζi@ is -1, update ξi+1@ = ηi@, ζi+1@ = ζi@, ri+1 =
rir′.
In both cases, sign≤G(qξi+1@ − ri+1qζi+1@) = +1, but the A-sign of qξi+1@ −
ri+1qζi+1@ is -1. Hence, link(ξi+1@, ζi+1@) fails. There is an infinite path on
T which is lexicographically between ξi+1@ and ζi+1@.
4. Define δi+1 ⊃ δi such that there is an infinite path on T extending δi+1 as in
the step 3 of module C(i) in case 1.
5. Start module C(i+ 1).
This completes module C(i).
After running all modules C(i) with i ≥ 0, we arrive at an increasing sequence
δi : i ∈ N such that there is an infinite path on T extending each δi. Let g = ∪i∈Nδi.
Then g is an A-computable path on T , thus, A is PA-complete.
In sum, we have showed that every order on G is either computable or computable
form a PA-complete set. Hence, if A is not PA-complete, then every A-computable
on G is computable.
89
![Page 100: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/100.jpg)
Chapter 4. Group-order-computable degrees and PA degrees
4.6.4 Orders on G which are computable from PA-completesets
Recall that the set of infinite paths of the co-c.e. tree T is just the set of 0, 1-valued diagonally nonrecursive functions. Let A be any PA-complete set. Then A
computes an infinite path on T . In order to prove that there is an A-computable
order on G which is not computable, we only need to show that any infinite path
on T computes a noncomputable order on G .
Let f ∈ [T ]. Now build a f -sign on G which determines a f -computable order,
≤f say, on G . For each original base-element qσ@,
(1) if σ@ <lex f , then set the f -sign of qσ@ to be +1;
(2) if f <lex σ@, then set the f -sign of qσ@ to be -1.
We then build the f -sign of ≤f by a similar algorithm as in building the sign of ≤G .
For instance, assume that x ∈ Gs has a unique Q-linear sum of active base-
elements at stage s as follows:
x = a0qσ0@ + · · ·+ aiqσi@ + b0qτ0@ + · · ·+ bjqτj@,
where bj = 0, σ0@ <lex · · · <lex σi@ <lex f <lex τ0@ <lex · · · <lex τj@.
(1) If there is a k ≤ i such that ak = 0, then find such a least k, and set the f -sign
of x to be the sign of ak.
(2) Otherwise, let k′ ≤ j be the least number with bk′ = 0, and set the f -sign of
x to be the sign of −bk′ .
Furthermore, if the expression of x changes later because some base-elements become
non-active, then the algorithm preserves the f -sign of x. This ensures that this sign
function is well-defined on G .
Clearly, the sign function is f -computable, so the corresponding order ≤f is f -
computable. Since there are σ@, τ@ ∈ 2<ω@ such that σ@ <lex f <lex τ@, qσ@ and
qτ@ have different sign under ≤f . Then ≤f is neither ≤G nor the reversal of ≤G ,
that is, ≤f is not computable.
We have constructed a computable group G such that for any set A, G admits
exactly two A-computable orders iff A is not PA-complete.
This completes the proof of Theorem 4.1.
90
![Page 101: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/101.jpg)
Chapter 5
Group orders and c.e. degrees
In this chapter, we will show that for any nonzero c.e. degree a, there is a nonzero
c.e. degree c < a and a computable group G such that G has orders of degree ≥ a
and c is group-order-computable via G , which implies that G has no incomputable
orders of degree ≤ c.
Theorem 5.1 For every noncomputable c.e. set A, there is a noncomputable c.e.
set C ≤T A and a computable torsion-free abelian group G with infinite rank such
that
(1) G has exactly two computable orders;
(2) G has an A-computable basis;
(3) every C-computable order on G is computable.
For a computable torsion-free abelian group A with infinite rank, if A has a
basis B, then the set O(A ) of degrees of orders on A contains d : d ≥ deg(B).Hence, our method is to control the degree of the constructed basis B := bi : i ∈ Nof G . If deg(B) ≤ a, then the constructed G also satisfies
d : d ≥ a ⊆ d : d ≥ deg(B) ⊆ O(G ).
5.1 Requirements and strategies
Let Hi : i ∈ N be a uniformly computable sequence of subgroups with rank one,
and let H = ⊕i∈N
Hi be the direct sum of Hi(i ∈ N). As in [3], we will build a
computable group G isomorphic to H which admits computable orders.
91
![Page 102: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/102.jpg)
Chapter 5. Group orders and c.e. degrees
To prove Theorem 5.1, we will build a computable group G , a computable group
order ≤G on G , and a c.e. set C ≤T A to satisfy the following requirements.
Pe : We = C.
Q : G has an A-computable basis B = bi : i ∈ N.
Q0 : G ∼= H .
Q1 : ≤G and ≤∗G are exactly two computable orders on G .
Ne : If ≤Ce is a C-computable group order on G , then either ≤C
e =≤G or ≤Ce =≤∗
G .
Where We : e ∈ N is an enumeration of c.e. subsets of natural numbers, and
Φe : e ∈ N1 is an enumeration of partial computable functionals defined on G ×G ,
C is the complement of C. The symbol ≤Ce stands for the C-computable binary
relation on G computed by ΦCe ; specifically, we view for any x, y ∈ G , x ≤C
e y iff
ΦCe (x, y) ↓= 1. If ΦC
e (x, y) ↓, then let ϕCe (x, y) denote the use for the computation
ΦCe (x, y).
To ensure C ≤T A, we will add an A-permitting to the standard Pe-strategy.The Q-strategy ensures that G has an A-computable basis. The Q0-strategy and
the Q1-strategy are similar to corresponding strategies in Theorem 1.17. We will
develop new N -strategies.
5.1.1 A Pe-strategy with permitting
Pe is a standard Friedberg-Muchnik strategy with permitting. So we use cycles, we
start with cycle 0 and cycle k with k ≥ 0 proceeds as follows (assume y−1 = 0).
(1) Choose a big witness yk > yk−1.
(2) Wait for yk enumerating into We at some stage, say sk.
(3) Open cycle k + 1 and simultaneously, wait for Ask yk = As yk at some stage
s ≥ sk.
1Here, we explain Φe in more detail. We first fix an effective numbering, say ι, of G (i.e.,ι is a computably bijective mapping from N to G ). Let Θe : e ∈ N be an enumeration ofpartial computable functionals defined on N× N. Then for any X ⊆ N, and x, y ∈ G , ΦX
e (x, y) ≃ΘX
e (ι−1(x), ι−1(y)).
92
![Page 103: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/103.jpg)
Chapter 5. Group orders and c.e. degrees
(4) Put yk into Cs, and close all cycles.
Suppose that the Pe-strategy opens infinitely many cycles. Then each cycle k is
waiting at (3) forever, that is, we find witnesses yk ∈ We and stages sk such that
Ask yk= A yk . Then we can compute A as follows: let x ∈ N, to decide whether it
is in A or not, find a least cycle kx such that ykx > x. Then x ∈ A⇔ x ∈ Askx .
Hence, by the noncomputability of A, there are only finitely many cycles opened
during the construction. If there is a first cycle k reaching at (4), then all cycles are
closed and yk ∈ C ∩We. Otherwise, no cycles are closed, and there is a least cycle k
waiting at (2) forever; in this case, cycle k is the largest cycle opened, yk /∈ We and
also yk /∈ C. In both cases, Pe is satisfied.We can compute C by A as follows: let x ∈ N, find a least stage sx such that
Asx x= A x (= y ∈ A : y ≤ x), then x ∈ C ⇔ x ∈ Csx .
5.1.2 The Q0-strategy
The Q0-strategy is a global strategy developed in [3]. To build the group G isomor-
phic to H , we maintain an approximation bs0, · · · , bss of a basis bi = limsbsi : i ∈ N
of G = ⊕i∈N
Gi and an approximation N s0 , · · · , N s
s of a basis Ni = limsN si : i ∈ N
of H = ⊕i∈N
Hi at each stage s such that
(1) bi and Ni is respectively a basis of rank one groups Gi and Hi;
(2) the isomorphism Ω : G = (G, 0G ,+G ) → H of abelian groups is determined
by sending each bi to Ni.
As each computable torsion-free abelian group of rank one can be effectively em-
bedded into Q, we view the subgroup Hi of H as a subgroup of additive group of
rational numbers. So N si ∈ Hi ⊆ Q and Ni ∈ Q.
Construction of G .
At stage 0. G0 = 0G , b00, where 0G is the zero element of G and b00 is the
approximation basis corresponding to N00 = 1.
At the end of stage s, Gs is the set containing all elements of G enumerated by
stage s, and each nonzero g ∈ Gs has assigned a unique Q-linear sum qs0bs0+· · ·+qsnbsn,
93
![Page 104: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/104.jpg)
Chapter 5. Group orders and c.e. degrees
where qsn = 0(n ≤ s), each qsi (i ≤ n) in Q satisfying qsiNsi ∈ Hi at stage s. By
convention, 0G is assigned the empty sum.
At stage s+ 1.
Case 1. If no dependence relations are added among approximation basis ele-
ments by any Ne-strategy (e ≤ s), bs+1i = bsi and N
s+1i = N s
i for all i ≤ s. For each
g ∈ Gs, it has the same expression as before at stage s+1. That is, if qs0bs0+· · ·+qsnbsn
is the Q-linear sum of approximation basis elements at stage s, then let qs+1i = qsi
for all i ≤ n and g has the Q-linear sum qs+10 bs+1
0 + · · ·+ qs+1n bs+1
n at stage s+ 1.
Let N s+1s+1 = 1 and add a new element bs+1
s+1 into approximation basis. Find the
first tuple < x0, · · · , xm > of rationals (under a fixed effective numbering of the set
of all finite sequences of rationals) with xm = 0 and m ≤ s such that for all i ≤ m,
xiNs+1i ∈ Hi at stage s + 1, and the Q-linear sum x0b
s+10 + · · · + xmb
s+1m is not
assigned to elements of the constructed group. If such a tuple exist, then enumerate
x0bs+10 + · · ·+ xmb
s+1m into Gs+1.
Case 2. If some Ne-strategy adds a dependence relation of the form bsl = qbsk at
stage s with l an odd number, k an even number (e < k < l), q a rational number.
To ensure the uniqueness ofQ-linear sums at each stage, q also satisfies additional
conditions. We require that for any two elements in Gs, if their Q-linear sums of
approximation basis elements at stage s are different, then after substituting the
relation bsl = qbsk, their new Q-linear sums are still different.
We only need to consider Q-linear sums involving basis elements bsk and bsl .
• For example, assume that g = xbsk + ybsl , h = x′bsk + y′bsl , and either x = x′
or y = y′. If now after substituting bsl = qbsk, (x + yq)bsk = (x′ + y′q)bsk, i.e.,
x+ yq = x′ + y′q. Then y = y′ and q = x′−xy−y′ .
Thus, for any two different elements f, g in Gs, if after substituting the relation
bsl = qbsk, the new expression of f, g at stage s+1 is the same, then one can compute
a unique q(f, g) such that q = q(f, g). As Gs is a finite set, there are finitely many
such q(f, g). We will choose the desired q different from all q(f, g) with f = g in Gs
but f, g has the same expression at stage s + 1 when adding bsl = q(f, g)bsk. Then
for any two different elements in Gs, their assigned sums remain different at stage
s+ 1.
94
![Page 105: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/105.jpg)
Chapter 5. Group orders and c.e. degrees
Now we update basis approximation elements. Let bs+1i = bsi for all i ≤ s with
i = l, and N s+1i = N s
i for all i ≤ s with i = k. Add two new elements bs+1l and bs+1
s+1
into approximation basis. Set N s+1s+1 = 1. We now define N s+1
k .
Let g ∈ Gs.
• Assume that g = qs0bs0 + · · ·+ qskb
sk + · · ·+ qsl b
sl + · · ·+ qsnb
sn at stage s. Now g
changes to
qs0bs0 + · · ·+ (qsk + qsl q)b
sk + · · ·+ 0bsl + · · ·+ qsnb
sn.
Let qs+1i = qsi for all i ≤ n with i /∈ k, l, qs+1
k = qsk + qsl q, qs+1l = 0. Then at
stage s+ 1, g = qs+10 bs+1
0 + · · ·+ qs+1n bs+1
n .
To ensure the Q-linear sum of g is well-defined after substituting the dependence
relation bsl = qbsk, we need qs+1i N s+1
i ∈ Hi for all i ≤ n. For i /∈ k, l, qs+1i N s+1
i =
qsiNsi ∈ Hi; note that qs+1
l N s+1l = 0 ∈ Hl is already true. So we only require
qs+1k N s+1
k ∈ Hk.
Now define N s+1k = dqdN
sk , where dq is the denominator of q and d is the product
of all dqsl such that dqsl is the denominator of nonzero qsl , and qsl bsl appears in the
Q-linear sum of an element in Gs. Then qdq ∈ Z and qsl d ∈ Z, so
qs+1k N s+1
k = (qsk + qsl q)Ns+1k = dqdq
skN
sk + qsl dqdqN
sk ∈ Hk.
Finally, search the first tuple < x0, · · · , xm > and add the Q-linear sum x0bs+10 +
· · ·+ xmbs+1m into Gs+1 as in case 1.
Case 3. If some Ne-strategy adds a dependence relation of the form bsl =
m1bsj −m2b
sk at stage s with l an odd number, l > j, k an even number (e < k < l),
m1,m2 integers.
The first condition of m1,m2 is to keep the assignment of sums of elements in
Gs remaining one-to-one after substituting the relation bsl = m1bsj −m2b
sk.
• For example, assume that g = xbsj+ybsk+zb
sl , h = x′bsj+y
′bsk+z′bsl , and g = h
in Gs, that is, x = x′ or y = y′ or z = z′. If
(x+ zm1)bsj + (y − zm2)b
sk = (x′ + z′m1)b
sj + (y′ − z′m2)b
sk,
then x+ zm1 = x′+ z′m1 and y− zm2 = y′− z′m2. So z = z′, m1 =x′−xz−z′ , and
m2 =y−y′z−z′ .
95
![Page 106: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/106.jpg)
Chapter 5. Group orders and c.e. degrees
In general, for f = g in Gs, so their expressions as Q-linear sum of approximation
basis elements are different at stage s. If f, g has the same expression at stage s+1
after substituting the relation bsl = m1bsj −m2b
sk, then for i = 1, 2, we can compute
a unique mi(f, g) such that mi = mi(f, g). Note that there are finitely many such
mi(f, g), the desired mi will be different from all those mi(f, g) with f = g in Gs.
Then the Q-linear sum of elements in Gs remains one-to-one at stage s+ 1.
Let bs+1i = bsi for all i ≤ s with i = l and N s+1
i = N si for all i ≤ s. Add two new
elements bs+1l and bs+1
s+1 into approximation basis, and set N s+1s+1 = 1.
The second conditions on m1,m2 are to ensure that the Q-linear sums are well-
defined after substituting the dependence relation bsl = m1bsj − m2b
sk. That is, for
any g ∈ Gs,
• assume that g = qs0bs0 + · · · + qsjb
sj + · · · + qskb
sk + · · · + qsl b
sl + · · · + qsnb
sn. Now
rewrite g as
qs0bs0 + · · ·+ (qsj + qslm1)b
sj + · · ·+ (qsk − qslm2)b
sk + · · ·+ 0bsl + · · ·+ qsnb
sn.
Let qs+1i = qsi for all i ≤ n with i /∈ j, k, l, qs+1
j = qsj+qslm1, q
s+1k = qsk−qslm2,
qs+1l = 0. Then
g = qs+10 bs+1
0 + · · ·+ qs+1n bs+1
n .
We need to ensure qs+1i N s+1
i ∈ Hi for all i ≤ n.
Note that qs+1i N s+1
i ∈ Hi for i /∈ k, j, l and qs+1l N s+1
l = 0 ∈ Hl. We only
require qs+1j N s+1
j ∈ Hj and qs+1k N s+1
k ∈ Hk.
qs+1j N s+1
j = (qsj + qslm1)Ns+1j = qsjN
sj + qslm1N
sj .
Choose m1 to be the multiple of the product d of all dqsl such that dqsl is the denom-
inator of qsl , where qsl = 0 and qsl b
sl appears in the Q-linear sum of an element in Gs.
Then qslm1 ∈ Z and qs+1j N s+1
j ∈ Hj. Similarly, choose m2 with d|m2, we have
qs+1k N s+1
k = (qsk − qslm2)Ns+1k = qskN
sk − qslm2N
sk ∈ Hk.
At last, find the first tuple < x0, · · · , xm > of rational numbers and add the
Q-linear sum x0bs+10 + · · ·+ xmb
s+1m into Gs+1 as in case 1.
96
![Page 107: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/107.jpg)
Chapter 5. Group orders and c.e. degrees
For f, g, h ∈ Gs, define f +s g = h if the addition of Q-linear sums of f and g is
equal to the Q-linear sum of h. By linearity of additions, when updating expressions
of f, g, h at stage s+ 1, we still have f +s+1 g = h.
This completes the construction of G at stage s+ 1.
Let Ωs : Gs → H be the linear extension of mapping which sends each bsi to Nsi .
Then Ω = limsΩs is a ∆0
2-isomorphism from G to H such that Ω(bi) = Ni for all i.
5.1.3 The Q1-strategy
TheQ1-strategy is also a global strategy developed in [3]. Similar to theQ0-strategy,
at each stage s, we maintain approximation elements rs0, · · · , rss in R which is
linearly independent over Q, and map bsi to rsi . We choose each rsi (1 ≤ i ≤ s) as a
positive rational multiple of√pi, where pi is the i-th prime number for i ≥ 1.
For i ≥ 1, ri = limsrsi . r0 = rs0 = 1R for all s.
(1) Let Θ be the linear extension of the map Ψ : G → (R, 0R,+R); bi 7→ ri;
(2) Let Θ(G ) be the image of G under Θ, then G is isomorphic to the subgroup
Θ(G ) of (R, 0R,+R) and ri : i ∈ N is a basis of Θ(G ).
The linear order ≤G will satisfy x ≤G y ⇔ Θ(x) ≤R Θ(y) for any x, y ∈ G , this
definition does not ensure the computability of ≤G . To make ≤G computable, we
will approximate ≤G via ≤s at each stage s, and keep x ≤s y implies x ≤t y for all
stages t ≥ s.
N si ∈ Hi ⊆ Q
bsi ∈ Gi
Ωs
88qqqqqqqqqqq
Θs
&&NNNNNNNNNN
rsi ∈ R
At each stage s, each approximation basis bsi (i ≤ s) will be mapped to rsi in R,
and we have an approximation Θs of Θ which is a linear extension of mapping on
approximation basis elements. Θ = limsΘs is a ∆0
2 map from G to R. Although at
97
![Page 108: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/108.jpg)
Chapter 5. Group orders and c.e. degrees
limit level, the linear order ≤G is defined by Θ which is a linear extension on basis
elements of G , we cannot simply define the approximation ≤s of ≤G at stage s via
Θs as: g ≤s h⇔ Θs(g) ≤R Θs(h).
The obstacle is when some Ne-strategy adding dependence relations of the form
bsl = qbsk or bsl = m1bsj −m2b
sk at stage s+ 1, if ≤s+1 is really defined by Θs+1, note
Θs(bsl ) = rsl , this means that bsl maps to new positions Θs+1(b
sl ) = qrsk or Θs+1(b
sl ) =
m1rsj − m2r
sk in R at stage s + 1 (we will see rs+1
k = rsk and rs+1j = rsj). We may
change the relative positions of two elements in Gs, that is, maybe Θs(x) <R Θs(y)
but Θs+1(y) <R Θs+1(x). So we cannot ensure that ≤G is computable.
The method used in [3] is to assign rational-endpoint interval (asi , asi ) to each basis
element bsi to control the position rsi of bsi , namely, let rsi ∈ (asi , a
si ) and a
si−asi <R
12s,
and then control the position of each g ∈ Gs in R by assigning a rational-endpoint
interval (asg, asg) for g based on the intervals of basis elements. That is, if g =
x0bs0 + · · ·+ xnb
sn, then
(i) asg = x0σ(as0)+ · · ·+xnσ(a
sn) with σ(a
si ) = asi if xi ≥R 0, σ(asi ) = asi if xi <R 0;
(ii) asg = x0τ(as0) + · · ·+ xnτ(a
sn) with τ(a
si ) = asi if xi ≥R 0, τ(asi ) = asi if xi <R 0.
Now define ≤s via assigned intervals as follows.
(1) Let g ≤s g for each g ∈ Gs.
(2) For each g, h ∈ Gs, if (asg, a
sg) ∩ (ash, a
sh) = ∅ and asg <R a
sh, then g <s h.
In order to make ≤G computable, we choose approximation intervals such that
rs+1i ∈ (as+1
i , as+1i ) ⊆ (asi , a
si )
and as+1i − as+1
i <R1
2s+1 . Then for each g ∈ Gs, (as+1g , as+1
g ) ⊂ (asg, asg). Hence, for
all g, h ∈ Gs, g <s h implies g <s+1 h.
Note that bsk never changes for even k, as in [3], we also require that rsk close to
0R and choose ask <R12s
for positive even k. This helps us to deal with witnesses for
N -strategies.
Construction of ≤G .
98
![Page 109: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/109.jpg)
Chapter 5. Group orders and c.e. degrees
At stage 0. G0 = 0G , b00, 0G sends to 0R, and set 0G <0 b
00 by defining r0 = 1R.
Assume that we have defined rs0, · · · , rss by stage s.
At stage s+ 1.
Case 1. If no dependence relations are added via any Ne-strategy. For each
i ≤ s, rs+1i = rsi . Choose rational numbers as+1
i , as+1i such that rs+1
i ∈ (as+1i , as+1
i ) ⊆(asi , a
si ) and a
s+1i − as+1
i <R1
2s+1 . If i is even, we also let as+1i <R
12s+1 .
Add a new element of the form rs+1s+1 = qs+1
√ps+1 with qs+1 a positive rational
number. Choose as+1s+1, a
s+1s+1 such that rs+1
s+1 ∈ (as+1s+1, a
s+1s+1) and a
s+1s+1 − as+1
s+1 <R1
2s+1 . If
s+ 1 is even, we also require as+1s+1 <R
12s+1 .
Case 2. If some Ne-strategy adds a dependence relation of the form bsl = qbsk
with q ∈ Q+ or bsl = m1bsj −m2b
sk with m1,m2 ∈ Z. For each i ≤ s with i = l, set
rs+1i = rsi and assign (as+1
i , as+1i ) as in case 1. For bsl ,
(1) if bsl = qbsk, choose q such that the new interval (qas+1k , qas+1
k ) for bsl at stage
s+ 1 is contained in (asl , asl );
(2) if bsl = m1bsj − m2b
sk with m1,m2 ∈ Z+, choose m1,m2 such that the new
interval (m1as+1j −m2a
s+1k ,m1a
s+1j −m2a
s+1k ) for bsl at stage s+1 is contained
in (asl , asl );
(3) if bsl = m1bsk − m2b
sj with m1,m2 ∈ Z+, choose m1,m2 such that the new
interval (m1as+1k −m2a
s+1j ,m1a
s+1k −m2a
s+1j ) for bsl at stage s+1 is contained
in (asl , asl ).
Let rs+1l =
√pl, corresponding to new bs+1
l . Choose new rational numbers
as+1l , as+1
l such that rs+1l ∈ (as+1
l , as+1l ) and as+1
l − as+1l <R
12s+1 . Choose a new
rs+1s+1 for bs+1
s+1 and assign interval (as+1s+1, a
s+1s+1) as in case 1.
This completes the construction of ≤G at stage s+ 1.
5.1.4 The Q-strategy
In order to satisfy the Q-requirement, we modify the Ne-strategy developed in [3]
through the following way: we add dependence relations of the form bsl = qbsk or
99
![Page 110: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/110.jpg)
Chapter 5. Group orders and c.e. degrees
bsl = mbsk + nbsj for some odd l at stage w only when permitted by A, that is,
Aw−1 l = Aw l. Then for any stage t, At l= A l implies bl = btl .
The main idea is that for same active witness of Ne, we may search for multiple
diagonalization witnesses until permitted by A, and then add dependence relations
[here, active witness and diagonalization witness will be defined in the basic Ne-
strategy]. As A is assumed to be incomputable, such a permitting occurs; otherwise,
we can initiate an effective process for computing A.
Hence, B = bi = limsbsi : i ∈ N ≤T A. Indeed, for an arbitrary g ∈ G , let sg
be the first stage when g enumerates into G . If g is neither bsgsg nor b
sgl with odd
l < sg, then g /∈ B. Otherwise, g = bsgsg or g = b
sgl for some odd l (in this case, we
add dependence relations on bsg−1l , and b
sgl is the new approximation for bl),
(1) if g = bsgsg with sg even or g = b
sgl for some odd l < sg, then g ∈ B;
(2) if g = bsgsg with sg odd, find a least stage t ≥ sg such that At sg= A sg , then
g ∈ B iff g = btsg = bsg .
Ne still acts finitely often, so the whole construction is still a finite injury argu-
ment.
5.1.5 A Ne-strategy
We need to ensure that if ≤Ce =≤G and ≤C
e =≤∗G , then ≤C
e is not a group order on
G . A basic Ne-strategy works as follows.
(A1) Wait for an active witness (bsj , n, bsk) at some stage s, namely, (bsj , n, b
sk) satis-
fying (a1), (a2), (a3) or (a1), (a2), (a4).
(a1) k is an even number larger than e.
(a2) 0G <s nbsk <s b
sj <s (n+ 1)bsk.
(a3) bsk >Ce 0G and either bsj <
Ce nb
sk or bsj >
Ce (n+ 1)bsk.
(a4) bsk>Ce∗0G and either bsj<
Ce∗nbsk or bsj>
Ce∗(n+ 1)bsk.
By Lemma 3.9 [3], as long as ≤Ce is a group order on G satisfying ≤C
e =≤G
and ≤Ce =≤∗
G , we can find active witnesses for ≤Ce . That is, if no active witnesses
appeared during the construction, then either ≤Ce is not a group order on G or
≤Ce =≤G or ≤C
e =≤∗G , and hence Ne is satisfied.
100
![Page 111: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/111.jpg)
Chapter 5. Group orders and c.e. degrees
(A2) We first set a restraint rC2 (bsj , n, b
sk) on C to preserve the computations or-
derings in (a3) or (a4) for ≤Ce at stage s. Say that Ne has active witnesses
(bsj , n, bsk) now.
For the active witness (bsj , n, bsk), assume that we are in case (a3), we deal with (a4)
similarly by considering the reveral order ≤Ce∗.
As long as (bsj , n, bsk) is not initialized, that is, the C-restraint rC2 (b
sj , n, b
sk) still
exist and bsj is not canceled, we use the mechanism of cycles to assign multiple
diagonalization witnesses for (bsj , n, bsk). Cycles can be opened or closed, and cycle
i can open cycle i + 1. Assume that we have opened cycles n < i. During cycle i
with i ≥ 0, proceed as follows:
(D1) At the least odd stage ti > ti−1 ≥ s (set t−1 = s), declare that the new
approximate basis element btiti is a diagonalization witness for (bsj , n, bsk) at
cycle i. Order btiti as in (b1) or (b2) when (b0) holds.
(b0) For all stages v with s ≤ v ≤ ti, bvj = bsj , Cs rC2 (bsj ,n,b
sk)= Cti rC2 (bsj ,n,b
sk).
(b1) If we have bsj <Ce nb
sk in (a3), set nbsk <ti b
titi <ti b
sj , that is,
• define rtiti = qti√pti for some positive rational qti and choose atiti , a
titi such
that natik <R atiti <R r
titi <R a
titi <R a
tij .
(b2) If we have bsj >Ce (n+ 1)bsk in (a3), set bsj <ti b
titi <ti (n+ 1)bsk, that is,
• define rtiti = qti√pti for some positive rational qti and choose atiti , a
titi such
that atij <R atiti <R r
titi <R a
titi <R (n+ 1)atik .
We call (btiti , bsj , n, b
sk) a pre-potentially permanent witness at cycle i of the active
witnesses (bsj , n, bsk) of Ne. Proceed as follows to add dependence relations.
(D2) Wait for a potentially permanent witness (buti , bsj , n, b
sk) at some stage u > ti,
namely, (buti , bsj , n, b
sk) satisfying (c1), (c2) or (c1), (c3) or (c1), (c4).
(c1) For all stages v with ti ≤ v ≤ u, bvti = btiti , for all stages v with s ≤ v ≤ u,
bvj = bsj , and Cs rC2 (bsj ,n,bsk)= Cu rC2 (bsj ,n,b
sk).
101
![Page 112: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/112.jpg)
Chapter 5. Group orders and c.e. degrees
(c2) buti <Ce nb
sk.
(c3) nbsk <Ce b
uti<Ce (n+ 1)bsk.
(c4) (n+ 1)bsk <Ce b
uti.
When (c1) holds, if (c2) or (c3) or (c4) never appears, then ≤Ce does not satisfy
totality of linear orders, we have done.
(D3) We first set a restraint rC4 (buti, n, bsk) ≥ rC2 (b
sj , n, b
sk) on C to preserve ≤C
e -
orderings in (c2) or (c3) or (c4). Now Ne has a potentially permanent witness
(buti , bsj , n, b
sk). Open cycle i + 1 to look for new diagonalization witnesses for
the active witness (bsj , n, bsk).
(D4) Wait for A ti to change.
(D5) Suppose that A ti changes at some least stage w ≥ u > ti. That is, w is the
least stage ≥ u at which some element x ≤ ti enumerates into A. If (d0) holds,
stop all cycles for the active witnesses (bsj , n, bsk), and proceed as in (D5.1) or
(D5.2) to add dependence relations.
(d0) For all stage v with ti ≤ v ≤ w−1, bvti = btiti , for all stage v with s ≤ v ≤ w,
bvj = bsj , and Cu rC4 (buti,n,bsk)
= Cw rC4 (buti,n,bsk)
.
(D5.1) If bw−1ti <C
e nbsk or (n + 1)bsk <Ce bw−1
ti , then add dependence relations of the
form bw−1ti = qbwk , where q is properly chosen to diagonalize group orders and q
also satisfies the conditions asserted by the Q0-strategy and the Q1-strategy.
We now state the conditions of q.
(d1) q ∈ (n, n + 1). Then if ≤Ce is a group order on G , as q ∈ (n, n + 1) and
bk >Ce 0G , we have nbk ≤C
e bw−1ti = qbk ≤C
e (n + 1)bk, contradicting with
the assumption for ≤Ce -orderings on b
w−1ti , nbsk and (n+ 1)bsk.
(d2) If bw−1ti = qbwk , we need to find a rational-endpoint interval (awk , a
wk ) for b
wk
under the Q1-strategy. Then we need to choose q such that (qawk , qawk ) ⊆
(aw−1ti , aw−1
ti ). As nbw−1k <w−1 b
w−1ti <w−1 (n+1)bw−1
k , this means nrw−1k <R
aw−1ti <R a
w−1ti <R (n + 1)rw−1
k . Hence, we can find infinitely many q in
(n, n + 1) with aw−1ti <R qrw−1
k <R aw−1ti , and for each such a q, we can
choose proper awk , awk satisfying the conditions in the Q1-strategy.
102
![Page 113: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/113.jpg)
Chapter 5. Group orders and c.e. degrees
(d3) q satisfies the conditions under the Q0-strategy, that is, q = q(f, g) for
any f, g ∈ Gw−1, such a q(f, g) turns an inequality f = g in Gw−1 to be
an equality f = g in Gw when adding bw−1ti = q(f, g)bwk . Note that there
are only finitely many such q(f, g) as Gw−1 is a finite set.
(d4) Now we have showed that there are infinitely many q satisfying (d1), (d2),
(d3). Our final q will be the least one of them such that the numbering
of q (we fix an effective numbering of Q) is larger than the current stage
w.
(D5.2) If nbsk <Ce bw−1
ti <Ce (n + 1)bsk, then we add dependence relations according to
whether bw−1ti <w−1 b
w−1j [i.e., we are in (b1)], or bw−1
ti >w−1 bw−1j [i.e., we are in
(b2)]. Remember that our target is still to diagonalize axioms of group orders
and to make the diagonalization to be compatible with the Q0-strategy and
the Q1-strategy.
(D5.2.1) If bw−1ti <w−1 b
w−1j . Our environment for ≤G and ≤C
e is
≤G : nbw−1k <w−1 b
w−1ti
<w−1 bw−1j <w−1 (n+ 1)bw−1
k
≤Ce : bw−1
j <Ce nb
w−1k <C
e bw−1ti
<Ce (n+ 1)bw−1
k
Add dependence relations of the form bw−1ti = m1b
wj − m2b
wk with m1 >N 1.
On the one hand, in order to be compatible with ≤G , (note that bwj = bw−1j ,
bwk = bw−1k ), we need
nbw−1k <w−1 m1b
w−1j −m2b
w−1k <w−1 b
w−1j <w−1 (n+ 1)bw−1
k
Note that bw−1k >G 0G . Then
(m1 − 1)nbw−1k <G (m1 − 1)bw−1
j <G m2bw−1k
and thus (m1 − 1)n <N m2.
On the other hand, if we want the dependence relation to be compatible with
≤Ce , then similarly, we have
bw−1j <C
e nbw−1k <C
e m1bw−1j −m2b
w−1k <C
e (n+ 1)bw−1k
103
![Page 114: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/114.jpg)
Chapter 5. Group orders and c.e. degrees
Note that bw−1k >C
e 0G . Then
m2bw−1k <C
e (m1 − 1)bw−1j <C
e (m1 − 1)nbw−1k
and thus m2 <N (m1 − 1)n.
Before looking for additional conditions on m1,m2, we recall the following
important lemma which will be used.
Lemma 5.1 [3] If r1, r2 ⊆ R+ is linearly independent over Q, then for any
two rational numbers q1 < q2, and any integer n ≥ 1, there are infinitely many
positive integers m1,m2 such that n|m1, n|m2 and m1r1 −m2r2 ∈ (q1, q2).
The desired m1,m2 ∈ N+ will satisfy the following conditions:
(f1) Choose m1,m2 ∈ N such that nd|m1, nd|m2 and 1 <N m1 ≤Nm2
n, where
d is the product of all denominators of nonzero qw−1ti with qw−1
ti bw−1ti ap-
pearing in the Q-linear sum of some element of Gw−1. Then ≤Ce cannot
be a group order on G .
(f2) If bw−1ti = m1b
wj −m2b
wk , under the Q1-strategy, we need to find awk , a
wk ,
awj and awj such that
rwk = rw−1k ∈ (awk , a
wk ) ⊆ (aw−1
k , aw−1k ), rwj = rw−1
j ∈ (awj , awj ) ⊆ (aw−1
j , aw−1j )
where awk − awk <R12w, awj − awj <R
12w
and
(♣) m1rwj −m2r
wk ∈ (m1a
wj −m2a
wk ,m1a
wj −m2a
wk ) ⊆ (aw−1
ti, aw−1
ti)
By Lemma 5.1, there are infinitely many natural numbers m1, m2 with
nd|m1, nd|m2 such that m1rwj − m2r
wk ∈ (aw−1
ti , aw−1ti ). Then for such
m1,m2, we can find proper awk , awk , a
wj and awj satisfying (♣). Moreover,
the calculation above shows that m1 ≤Nm2
n.
(f3) To make sure the Q-linear sums of elements in Gw−1 remaining one-to-
one, we also require that for i = 1, 2, mi = mi(f, g) for any f, g ∈ Gw−1,
where adding bw−1ti = m1(f, g)b
wj −m2(f, g)b
wk entails f = g at stage w,
but f = g at stage w − 1. There are only finitely many such mi(f, g), so
we can find infinitely many desired m1,m2 satisfying (f1), (f2), (f3).
104
![Page 115: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/115.jpg)
Chapter 5. Group orders and c.e. degrees
(f4) The finalm1,m2 will satisfy (f1), (f2), (f3) withm1,m2 > w and ⟨m1,m2⟩least.
(D5.2.2) If bw−1ti >w−1 b
w−1j . Our environment for ≤G and ≤C
e is
≤G : nbw−1k <w−1 b
w−1j <w−1 b
w−1ti
<w−1 (n+ 1)bw−1k
≤Ce : nbw−1
k <Ce b
w−1ti
<Ce (n+ 1)bw−1
k <Ce b
w−1j
Add dependence relations of the form bw−1ti = m1b
wk −m2b
wj . We choose m1,m2
such that substituting the relation into ≤G holds, that is,
nbw−1k <w−1 b
w−1j <w−1 m1b
w−1k −m2b
w−1j <w−1 (n+ 1)bw−1
k
Then
(m2 + 1)[m1 − (n+ 1)]bw−1k <w−1 (m2 + 1)m2b
w−1j
<w−1 m2m1bw−1k
So (m2 + 1)[m1 − (n+ 1)] <N m2m1, and thus m1 <N (n+ 1)(m2 + 1).
Now under the conditions m1 <N (n + 1)(m2 + 1) and (n + 1)|m1,m1
(n+1)<N
m2 + 1, that is, m1
(n+1)≤N m2. Then ≤C
e is not a group order on G . Indeed,
suppose that ≤Ce is a group order on G , then
0G <Ce nb
w−1k <C
e bw−1ti
= m1bw−1k −m2b
w−1j
≤Ce m1b
w−1k − m1
n+ 1bw−1j
=m1
n+ 1((n+ 1)bw−1
k − bw−1j ) <C
e 0G
We now determine m1,m2:
(g1) Choose m1,m2 ∈ N such that (n+1)d|m1, (n+1)d|m2 andm1
(n+1)≤N m2,
where d is the same as in (f1).
(g2) Assume that bw−1ti = m1b
wk −m2b
wj . We need to assign rational-endpoint
intervals for bw−1ti at stage w, that is, find awk , a
wk , a
wj and awj the same as
in (f2) but with the condition (♣) changed to
(♠) m1rwk −m2r
wj ∈ (m1a
wk −m2a
wj ,m1a
wk −m2a
wj ) ⊆ (aw−1
ti, aw−1
ti)
105
![Page 116: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/116.jpg)
Chapter 5. Group orders and c.e. degrees
According to Lemma 5.1, there are infinitely many natural numbers
m1,m2 with (n+1)d|m1, (n+1)d|m2 such thatm1rwk−m2r
wj ∈ (aw−1
ti , aw−1ti ).
Then we can choose proper (awk , awk ) ⊆ (aw−1
k , aw−1k ), and proper (awj , a
wj ) ⊆
(aw−1j , aw−1
j ) satisfying (♠). Then m1
(n+1)≤N m2 automatically holds.
(g3) The same as in (f3), we require that the choice of m1 and m2 preserves
the one-to-one assignment of Q-linear sums to elements in Gw−1.
(g4) The final m1 and m2 satisfy (g1), (g2), (g3), m1 > w, m2 > w with
⟨m1,m2⟩ least.
This ends the description of the basic Ne-strategy.
The interactions between two N -strategies are finite as in [3]. They both set
C-restraints, so there is no confliction in building C; the confliction is in choosing
witnesses.
Suppose that Ne choose an active witness (bsj , n, bsk) at stage s, and then add a
diagonalization witness btt at an odd stage t > s. To diagonalize axioms of group
orders, Ne may add dependence relations to change btt at stages > t. However, some
Ni may find an active witness (buj′ , n′, buk′) at stage u > t with buj′ = btt, and then add
a diagonalization witness bww at an odd stage w > u. To preserve its active witness,
Ni requires btt keeping the same at stages > u.
The solution is a priority argument. When e < i,
(1) if Ne acts first to add dependence relations, it changes btt to initialize Ni’s
active witnesses (Ne is satisfied and cannot injure Ni later, Ni will choose new
active witnesses at later stages);
(2) if Ni acts first, it adds dependence relations on bww and hence does not change
buj′(= btt), so no confliction occurs.
When i < e,
• if Ni finds its active witness, say (buj′ , n′, buk′), at stage u > t with buj′ = btt, it
cancels Ne’s diagonalization witness btt to avoid potential conflictions (Ne will
find its diagonalization witness bt′
t′ with t′ big at later odd stages).
106
![Page 117: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/117.jpg)
Chapter 5. Group orders and c.e. degrees
P-requirements are purely set-theoretic requirements to ensure the noncom-
putability of C. Each Pe is positive on C and acts at most once to enumerate
a permitted witness y ∈ We into C. So Pe injures negative requirements with lower
priority which may set restraints on C finitely often.
5.2 Construction
Q, Q0 and Q1 are global requirements. The priority of other requirements is as
follows:
N0 ≺ P0 ≺ · · ·Ne ≺ Pe ≺ · · · .
The construction mainly splits into two parts. One is set-theoretic construc-
tions, that is, building set C. The other is algebraic constructions, that is, adding
dependence relations to defeat ≤Ce to be a group order on G , and then constructing
G and ≤G according to whether some dependence relations are added or not.
Construction.
Stage 0. Let C0 = ∅. Build G0 and ≤0 by the Q0-strategy in Section 5.1.2 and
the Q1-strategy in Section 5.1.3 respectively.
Stage s > 0.
Step 1. Find the highest priority requirement, say Q, among
N0 ≺ P0 ≺ · · ·Ns ≺ Ps
which requires attention (such a requirement exists since Ps requires attention at
stage s). Act correspondingly and initialize all strategies ≻ Q. Goto Step 2 if no
dependence relations are added; goto Step 3 otherwise.
Say that Pe is satisfied at stage s if We,s ∩ Cs = ∅, where We,s is the set of all
elements enumerated into We by stage s. Say that Pe requires attention at stage s
if it is unsatisfied and one of the following (P1) and (P2) happens. Act accordingly.
(P1) Pe has no cycles opened at stage s.
Action: Open cycle 0 by appointing a large witness y0, and start to wait for
y0 enumerating into We. Proceed as in the basic Pe-strategy.
107
![Page 118: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/118.jpg)
Chapter 5. Group orders and c.e. degrees
(P2) Pe has a previous witnesses yk ∈ We,sk , cycle k + 1 is opened at stage sk
and cycle k started to wait for Ask yk-changes at stage sk. Now Ask yk=As−1 yk = As yk and stage s ≥ sk is the first stage at which some cycles of Pereach (4) of the basic Pe-strategy, and this cycle is just cycle k.
Action: Put yk into Cs, close all opened cycles of Pe. Declare that Pe is
satisfied.
Say that Ne is satisfied if we add dependence relations between some active
witness and some diagonalization witness. That is, we have finished the following
actions.
(1) We find some active witness, say (bsj , n, bsk), and assign C-restraints to protect
this active witness.
(2) We arrive at some cycle i for (bsj , n, bsk) with some diagonalization witness btiti
and set C-restraints to protect potentially permanent witness (buti , bsj , n, b
sk) at
some stage u ≥ ti.
(3) A ti changes after stage u, and we add dependence relations between diago-
nalization witness and active witness.
In this case, ≤Ce is not an order on G .
Say that Ne requires attention at stage s if it is not satisfied at stage s, and one
of the following holds at stage s. Act correspondingly.
(N1) Some active witness appears at stage s.
Action: First, set C-restraints to protect this active witness. Second, if some
Ni-strategy (i > e) has a diagonalization witness in some cycle, cycle j say, of
some active witness which occurs in the active witness of Ne, then cancel the
diagonalization witness at cycle k, where k ≥ j, of Ni’s active witness.
(N2) Ne has an active witness and no cycles opened for this active witness at stage
s.
Action: Open cycle 0 of the active witness to find diagonalization witnesses.
108
![Page 119: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/119.jpg)
Chapter 5. Group orders and c.e. degrees
(N3) Ne has some active witness, and some cycle i is opened for this active witness.
No diagonalization witness is found in cycle i at stage s, and s is odd.
Action: Set the diagonalization witness btiti = bss at cycle i of the active witness,
and order bss with the active witness in (b1) or (b2) as in the basic Ne-strategy.
(N4) Ne has some active witness, and some cycle i with uncanceled diagonalization
witness btiti is opened for this active witness. Now one of the ordering relations
between the active witness and btiti in (c2) or (c3) or (c4) appears at stage s.
Action: Set C-restraints to protect the potentially permanent witnesses at
cycle i. Open cycle i+1 for the active witness to seek for new diagonalization
witnesses and simultaneously, wait for A ti to change.
(N5) Ne has a potentially permanent witnesses with diagonalization witness btiti in
cycle i, and some x ≤ ti first enumerates into A at stage s.
Action: For such a least cycle i, add dependence relations on btiti according
to the basic Ne-strategy, and then stop all cycles of Ne. Declare that Ne is
satisfied.
Step 2. Build Gs and ≤s respectively according to the Q0-strategy in Section
5.1.2 and the Q1-strategy in Section 5.1.3 with no dependence relations added.
Step 3. Build Gs and ≤s respectively according to the Q0-strategy in Section
5.1.2 and the Q1-strategy in Section 5.1.3 with the added dependence relation.
This ends the stage s of the construction.
5.3 Verification
Lemma 5.2 For each requirement, Q say,
(1) Q can be initialized at most finitely often;
(2) Q acts at most finitely often and is satisfied;
(3) Q initializes strategies with lower priority finitely often.
109
![Page 120: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/120.jpg)
Chapter 5. Group orders and c.e. degrees
Proof: We will show that for each e, (1)-(3) hold for all Ne,Pe. We will prove the
lemma by induction. For e = 0. N0 has the highest priority, it cannot be initialized.
(1) holds. We now show that it acts finitely often and is satisfied.
If ≤C0 has no active witnesses during the construction, then by Lemma 3.9 in [3],
either ≤C0 is not a group order, or ≤C
0 =≤G or ≤C0 =≤∗
G . N0 is satisfied.
Suppose that there is some active witness (bsj , n, bsk) for N0 at stage s. Then N0
acts to protect (bsj , n, bsk) by setting C-restraints, and initializes all strategies with
lower priority.
Under the basic N0-strategy, it starts by opening cycle 0, that is, by waiting for
a diagonalization witness bt0t0 at some odd stage t0 > s and then waiting for
(♠0) : bt0t0 <C0 nb
sk ∨ nbsk <C
0 bt0t0 <
C0 (n+ 1)bsk ∨ (n+ 1)bsk <
C0 b
t0t0 .
In general, cycle i > 0 works as follows.
(i) Wait for a diagonalization witness btiti at some odd stage ti > ui−1 > ti−1 and
then wait for
(♠i) : btiti <C0 nb
sk ∨ nbsk <C
0 btiti <
C0 (n+ 1)bsk ∨ (n+ 1)bsk <
C0 b
titi .
If (♠i) never happens, then N0 is satisfied because ≤C0 does not satisfy the
axioms of linear orders.
(ii) If (♠i) happens at some stage ui > ti. Open cycle i + 1 and simultaneously
wait for A ti to change.
– If A ti changes at some stage wi > ui, add dependence relations between
btiti and (bsj , n, bsk). Close all cycles of (bsj , n, b
sk), and N0 is satisfied.
If there is a cycle i which waits at (♠i) forever, then cycle i+1 is never opened.
In this case, ≤C0 is not a linear order and thus N0 is satisfied. So assume that no
cycles i wait at (♠i) forever.
Suppose that each cycle i is not closed, then each cycle i waits for A ti to change
forever, that is, Aui ti= A ti . Note that s ≤ ti < ui < ti+1 for all i. Now we can
compute A as follows: for any x, find the least ti with x < ti, then x ∈ A iff x ∈ Aui .
110
![Page 121: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/121.jpg)
Chapter 5. Group orders and c.e. degrees
As A is assumed to be noncomputable, there is a cycle i which provides a diag-
onalization witness btiti , and Aui ti changes later, say at stage t′ ≥ ui. Then we add
dependence relations between btiti and (bsj , n, bsk) at stage t
′, and N0 is satisfied.
Hence, in all cases above, N0 acts finitely many times and is satisfied at end. (2)
and (3) hold.
Let s0 be the least stage such that N0 never acts later, then P0 is not injured
after stage s0. Let t0 ≥ s0 be the least stage such that cycle 0 of P0 is opened. As
long as P0 is not satisfied, the basic P0-strategy will open cycles, say k, by picking
a new witness yk at cycle k and starting to wait for yk ∈ W0; when yk ∈ W0, yk is
enumerated into C at some stage s only if As yk = As−1 yk . As A is noncomputable,
if such witnesses eventually enumerate into W0, then this A-permitting happens at
certain cycles. So P0-strategy can only open finitely many cycles. That is, P0 acts
finitely often after stage s0.
As long as P0 is not satisfied automatically, there is a cycle k such that either yk
is never put into C in which case yk /∈ W0 or yk is put into C in which case yk ∈ W0.
In both cases, W0 = C. So P0 is satisfied after finitely many actions, thus (2) and
(3) hold.
Now assume that the lemma holds for all Ni,Pi with i < e. By induction
hypothesis, there is a stage se such that Ni,Pi with i < e are satisfied at stage se.
Then Ne has the highest priority after stage se. Similar to case e = 0, (1)-(3) hold
for Ne and Pe.
Lemma 5.3 C ≤T A.
Proof: During the construction, only permitted elements can be enumerated into
C. That is, x ∈ Cs only if there is some small element z ≤ x such that z ∈ As−As−1.
To decide whether x ∈ C or not, by using A, find a least stage s such that for all
z ≤ x, z ∈ A⇔ z ∈ As. Then x ∈ C ⇔ x ∈ Cs.
The differences between Theorem 5.1 and Theorem 1.17 are that elements enu-
merated into C are permitted by A and that the diagonalization witnesses are per-
mitted by A. We now show that for each i, the approximation basis element bsi only
changes finitely often. Then limsbsi exists, and thus we can satisfy Q0 and Q1 the
same as in Theorem 1.17.
111
![Page 122: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/122.jpg)
Chapter 5. Group orders and c.e. degrees
Lemma 5.4 For each i, bi = limsbsi exists.
Proof: For each i, consider bii. It may change at later stages only if bii is chosen
as a diagonalization witness in some cycle of some active witnesses for some N -
requirements. When bii is not a diagonalization witness, it never changes. So bi = bsi
for all s ≥ i.
Assume that bii is a diagonalization witness. bii may be changed at most once when
adding dependence relations on bs−1i = bii at some large stage s with As−1 i = As i.
Then we will define a new basis approximation element bsi , and bi = bsi never changes
later since bsi is not a diagonalization witness any more. So the approximations
bsi (s ∈ N) of bi change at most once. Thus, bi = limsbsi exists.
Lemma 5.5 B = bi : i ∈ N ≤T A.
Proof: For any g ∈ G = ∪sGs, the domain of G . If it is not bsi with s ≥ i when
first added into G, then g /∈ B. Otherwise, assume that g = bsi is first added at
stage s.
Case 1. i = s. If i is even, then bii never changes later and g = bi = bii ∈ B. If i
is odd and g = bii is not a diagonalization witness for N -requirements, then g ∈ B.
If g is a diagonalization witness: first, by using A, find the least stage t0 such that
At0 i= A i; second, check whether we add dependence relations on bii during stages
in (i, t0]. If we add dependence relations and redefine approximations for bi, then
g = bi and g /∈ B. If no dependence relations are added on bii, that is, bt0i = bii, then
g = bi ∈ B.
Case 2. i < s. Then i is odd and we change bs−1i at stage s; in this case, g = bsi
is never changed later. So g = bi ∈ B.
By Lemma 5.2, all Pe, Ne hold. Then C is not computable; and for all e, either
≤Ce is not a group order on G or ≤C
e =≤G or ≤Ce =≤∗
G , that is, every C-computable
order on G is computable. So G has no incomputable orders of degree ≤ deg(C).
By Lemma 5.3, C ≤T A. By Lemma 5.5, G has an A-computable basis, so G has
an order of degree ≥ deg(A). Moreover, as G has no orders of degree C, C <T A.
This completes the proof of Theorem 5.1.
112
![Page 123: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/123.jpg)
Part III
Reverse mathematics, abeliangroups and modules
113
![Page 124: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/124.jpg)
Chapter 6
Reverse mathematics and divisibleabelian groups
In this chapter, we will examine the proof-theoretic strength of several classical
theorems related to countable divisible abelian groups in the program of reverse
mathematics. For more background on abelian groups, refer to [29].
Definition 6.1 (RCA0) Let G be an abelian group. G is divisible if for any g ∈ G
and nonzero n ∈ N, there is a g′ ∈ G such that g = ng′, and we say g is divisible by
n in G.
In this chapter, groups always mean abelian groups.
6.1 Divisible subgroups
Definition 6.2 (RCA0) Let I be an abelian group. I is called injective if for any
monomorphism µ : A → B and any homomorphism φ : A → I, there exists a
homomorphism ψ : B → I such that φ = ψµ.
We now state a theorem related to injective abelian groups in reverse mathe-
matics, as we will use it later to prove Theorem 6.2.
Theorem 6.1 [26] The following are equivalent over RCA0.
(1) ACA0.
(2) Every divisible abelian group is injective.
114
![Page 125: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/125.jpg)
Chapter 6. Reverse mathematics and divisible abelian groups
Friedman, Simpson and Smith [26] showed that ACA0 proves the statement that
“every divisible subgroup of an abelian group G is a direct summand of G”. We are
interested in the reversal part of this statement. We will complete the work above
of Friedman, Simpson and Smith, by proving the following theorem.
Theorem 6.2 Over RCA0, the following are equivalent:
(1) ACA0.
(2) Every divisible subgroup of an abelian group is a direct summand.
Proof: (1) ⇒ (2) was proved by Friedman, Simpson and Smith in their paper [26]
(Lemma 6.2). For completeness, we provide a proof here.
Let G be an abelian group and D be a divisible subgroup of G. As ACA0
proves that every divisible group is injective, D is injective. Consider the following
diagram with 1D : D → D the identity homomorphism and µ : D → G the identical
embedding:
0 // D
1D
µ // G
ψ
D
Then there is surjective homomorphism ψ with 1D = ψµ, and the kernel of ψ,
ker(ψ), is g ∈ G : ψ(g) = 0, and G = ker(ψ) ⊕ im(ψ) = ker(ψ) ⊕ D. This
completes the proof of (1) ⇒ (2).
(2) ⇒ (1). Fix a one-to-one function f : N → N. Let G be the divisible
abelian group⊕n∈N
Qxn, where elements of G are finite Q-linear sums of elements
from xn : n ∈ N. For m ∈ N, let x′m = x2f(m) + mx2f(m)+1. Then⊕m∈N
Qx′m is a
divisible subgroup of G, denoted by D. D exists in RCA0.
By our assumption (2), D is a direct summand of G. So there is a subgroup K
of G such that G = D ⊕K. For any n, x2n and x2n+1 now can be uniquely written
as
• x2n = y2n + z2n,
• x2n+1 = y2n+1 + z2n+1,
115
![Page 126: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/126.jpg)
Chapter 6. Reverse mathematics and divisible abelian groups
where y2n, y2n+1 ∈ D and z2n, z2n+1 ∈ K.
Recall that any element in D can be expressed as a unique Q-linear sum of
elements in x′m : m ∈ N. Let In be the finite set consisting of all indices m where
x′m appears in the expression of y2n or y2n+1. Then
n ∈ range(f) ⇔ ∃m ∈ In[f(m) = n].
We only need to show that if n = f(m0), then m0 ∈ In. As
x′m0= x2n +m0x2n+1 = (y2n +m0y2n+1) + (z2n +m0z2n+1)
and the expressions of elements inD as linear combinations of elements in x′m : m ∈N are unique, we have x′m0
= y2n +m0y2n+1. Then x′m0appears in the expression
of y2n or y2n+1, i.e., m0 ∈ In.
Now range(f) exists, by the ∆01-comprehension.
Classically, every abelian group has the unique largest divisible subgroup which
is the union of all divisible subgroups. This definition is Σ11. We will show that
the existence of the largest divisible subgroup of an abelian group is equivalent to
Π11-CA0 over RCA0. In order to prove the reversal part, we need the following well-
known theorem of Friedman, Simpson and Smith. Recall that an abelian group is
reduced if it has no nontrivial divisible subgroups.
Theorem 6.3 [26] Over RCA0, the following are equivalent.
(1) Π11-CA0.
(2) Every abelian group is a direct sum of a divisible subgroup and a reduced sub-
group.
However, for the special case of torsion-free abelian groups, as shown in Theorem
6.4 below, we show that the existence of the largest divisible subgroup is equivalent
to the arithmetical comprehension.
Theorem 6.4 Over RCA0, the following are equivalent:
(1) ACA0.
116
![Page 127: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/127.jpg)
Chapter 6. Reverse mathematics and divisible abelian groups
(2) Every torsion-free abelian group has the largest divisible subgroup.
Proof: (1) ⇒ (2). Let G be a countable abelian group. Let
D = g ∈ G : ∀n > 0∃g′ ∈ G[g = ng′].
D exists by arithmetical comprehension.
We will show that D is the largest divisible subgroup of G. Clearly, the zero 0G
of G is in D. For any m, if m divides gn1 and gn2 in G, then m divides gn1 − gn2 in
G. Thus, D is a subgroup of G.
We now show that D is divisible. For any g ∈ D, g is divisible by all nonzero
natural numbers in G. So for any m ≥ 1, there is a hm ∈ G such that g = mhm.
We claim that hm ∈ D. Then g is also divisible by all nonzero natural numbers in
D. Thus, D is a divisible subgroup of G.
Claim. hm ∈ D.
Proof of the claim.
Fix k ≥ 1. As g = mhm = mkhmk, m(hm − khmk) = 0G. Here, the index
mk of hmk is the multiplication of m and k. As m = 0 and G is torsion-free,
hm − khmk = 0G, i.e., hm = khmk. So hm is divisible by k in G. We have showed
that hm is divisible by all nonzero natural numbers in G. By definition, hm ∈ D.
This ends the proof of the claim.
Now we show that D is the largest divisible subgroup of G. Take any divisible
subgroup A of G. For any a ∈ A and n > 0, there is an a′ ∈ A such that a = na′.
Since a′ ∈ G, a ∈ D. Thus A ⊆ D.
(2) ⇒ (1). Let f : N → N be a one-to-one function. Consider the torsion-free
abelian group⊕n∈N
Qxn, denoted by G. Again, elements of G are just finite Q-linear
sums of elements in xn : n ∈ N.
Let H be the set of all elements∑n<m
anxn of G such that for each n, if the
denominator of an has a prime factor pl, then f(l) = n. One can check that H is a
subgroup of G and that H exists in RCA0.
By (2), H has the largest divisible subgroup, say D. Let
D′ = g ∈ H : ∀n > 0∃g′ ∈ H[g = ng′].
117
![Page 128: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/128.jpg)
Chapter 6. Reverse mathematics and divisible abelian groups
From the proof of the direction (1) ⇒ (2), we see that D′ is a divisible subgroup of
H and that D ⊆ D′. Then by the choice of D, D′ = D.
We now show n ∈ range(f) ⇔ xn /∈ D.
• If n = f(m), then 1pmxn /∈ H. Note that the only element y in G with xn = pmy
is 1pmxn. Thus no elements y in H satisfy xn = pmy, and xn /∈ D.
• If n /∈ range(f), then 1kxn ∈ H for any k ≥ 1. Thus xn ∈ D.
By ∆01-comprehension, range(f) exists.
Corollary 6.1 Over RCA0, the following are equivalent:
(1) Π11-CA0.
(2) Every abelian group has the largest divisible subgroup.
(3) Every abelian group is a direct sum of a divisible subgroup and a reduced sub-
group.
Proof: By definition, (1) ⇒ (2). By Theorem 6.3 of Friedman, Simpson and
Smith, (3) ⇒ (1). We now show (2) ⇒ (3).
Assume (2). Then every torsion-free abelian group has the largest divisible
subgroup. By Theorem 6.4, this implies ACA0. Now let G be an abelian group.
Again, by (2), it has the largest divisible subgroup, say D. By Theorem 6.2, ACA0
proves G = D ⊕ R for some subgroup R. As D is the largest divisible subgroup, R
is reduced. Hence, (3) holds.
6.2 Two decomposition theorems
Definition 6.3 (RCA0) An abelian group is primary if there is a prime p such that
its elements have orders a power of p.
For each i ∈ N, pi is the i-th prime number, starting with p0 = 2. Let P be the set
of all prime numbers.
Theorem 6.5 Over RCA0, the following are equivalent:
118
![Page 129: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/129.jpg)
Chapter 6. Reverse mathematics and divisible abelian groups
(1) ACA0.
(2) Every nontrivial torsion group, say T , is a direct sum of primary subgroups.
That is, there is a set I ⊆ P such that T =⊕p∈ITp, where for each p ∈ P ,
Tp = g ∈ T : ∃n[o(g) = pn], and for p ∈ I, Tp = 0T.
Proof: (1) ⇒ (2). We use classical proof in [29]. Let T be a countable nontrivial
torsion group, i.e., T = 0T. Let o(g) be the order of g in T . Because T is torsion,
o(g) is the least nonzero natural number n such that ng = 0T . The function o exists
in RCA0 (o is indeed Σ00).
For every prime p, Tp = g ∈ T : ∃n[o(g) = pn] exists in RCA0. As g ∈ Tp iff
o(g) = pn for some n ≤ o(g). Tp is also Σ00.
We now show that any element of T can be uniquely written as a Z-linear sum
of elements in Tp for various primes p.
Let g ∈ T with order o(g). Factorize o(g) = qr11 · · · qrkk as prime powers. Let
ni =o(g)
qrii
for all i = 1, · · · , k. Then ni, 1 ≤ i ≤ k, are coprime, so there are integers
ai for all 1 ≤ i ≤ k such that a1n1 + · · ·+ aknk = 1. Then,
g = (a1n1 + · · ·+ aknk)g = a1n1g + · · ·+ aknkg.
Because o(nig) =o(g)ni
= qrii , each nig ∈ Tqi . Thus, g ∈∑
1≤i≤kTqi .
We now show that the sum of g is unique. Suppose that there are xi, yi ∈ Tqi
such that g = x1 + · · ·+ xk = y1 + · · ·+ yk. Then xi− yi ∈ Tqi for all 1 ≤ i ≤ k, and
x1 − y1 = (y2 − x2) + · · ·+ (yk − xk).
The order of x1 − y1 is a power of q1, but the order of right hand side is a multipli-
cation of powers of qi with 2 ≤ i ≤ k. Hence, x1 − y1 = 0. Now consider
x2 + · · ·+ xk = y2 + · · ·+ yk.
In a similar way, we can show that x2 = y2, · · · , xi = yi. Thus, xi = yi for all
i = 1, · · · , k. This proves the uniqueness of sums.
Hence, T =⊕p∈P
Tp, and we may have Tp = 0T for some primes p.
119
![Page 130: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/130.jpg)
Chapter 6. Reverse mathematics and divisible abelian groups
Now let I = p ∈ P : ∃ g ∈ T − 0T ∃n [o(g) = pn]. Then I is Σ01, so it
exists in ACA0. Moreover, Tp = 0T ⇔ p ∈ I. Hence, I is the desired set such that
T =⊕p∈ITp with Tp = 0T for each p ∈ I.
(2) ⇒ (1). Let f : N → N be a one-to-one function. Let G be an abelian group
generated by xn : n ∈ N with relations pf(m)xm = 0 for each m ∈ N. Then
G =⊕m∈N
Zpf(m)xm, where for any n ∈ N+, Zn = Z/nZ. We view elements of Zn as
the least nonnegative representatives under relation x ∼ y ⇔ x − y ∈ nZ = nk :
k ∈ Z, i.e., for n ≥ 1, Zn = i ∈ N : i ≤ n− 1.Elements of G are of the form
∑i≤naixi for some ai ∈ Zpf(i) with each i ≤ n. So G
exists in RCA0. Clearly, G is torsion.
By assumption (2), there is a set I ⊆ P such that G =⊕p∈IGp, where for each
prime p, Gp = g ∈ G : ∃n[o(g) = pn], and for each p ∈ I, Gp = 0G.By definition of G, each element has order a product of pf(m) for various m. If
n /∈ range(f), Gpn = 0G. If n = f(m) for some m, then pnxm = 0G, so xm ∈ Gpn ,
and thus Gpn = 0G. SoG =
⊕n∈range(f)
Gpn .
Then n ∈ range(f) ⇔ pn ∈ I. By ∆01-comprehension, range(f) exists.
We will consider the decomposition theorem of divisible abelian groups. Before
proving that, we recall a few reverse mathematical results about countable algebra.
Theorem 6.6 [26] Over RCA0, the following are equivalent:
(1) ACA0.
(2) Every abelian group has a torsion subgroup T containing all torsion elements.
(3) Every vector space has a basis.
Definition 6.4 (RCA0)
(1) For 1 ≤ k <∞, Gk denotes the direct sum of k many Gs, that is, Gk =⊕
1≤i≤kG.
(2) G∞ denotes the direct sum of infinitely many Gs, i.e., G∞ =⊕k∈N
G.
120
![Page 131: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/131.jpg)
Chapter 6. Reverse mathematics and divisible abelian groups
Proposition 6.1 (RCA0)
(1) For 1 ≤ k < ∞, a direct sum⊕
1≤i≤kGi of abelian groups is divisible iff for all
1 ≤ i ≤ k, Gi is divisible.
(2) A direct sum⊕i∈NGi of abelian groups is divisible iff for all i ∈ N, Gi is divisible.
For a prime number p, the p-quasicyclic group Z(p∞) =
n
pm: n,m ∈ Z
/Z
exists in RCA0.
Theorem 6.7 Over RCA0, the following are equivalent:
(1) ACA0.
(2) Every divisible abelian group is isomorphic to a direct sum of the form⊕n∈I
(Z(p∞n ))ln ⊕⊕n∈J
Q
for some I, J ⊆ N, and if I = ∅, then for each n ∈ I, 1 ≤ ln ≤ ∞.
Proof: (1) ⇒ (2). This was already mentioned by Friedman, Simpson and Smith
in paper [26], we now provide a complete proof. Let G be a countable divisible
abelian group. ACA0 proves the existence of torsion subgroup T of G.
We first show that T is a divisible subgroup of G. For g ∈ T and n ≥ 1, as G
is divisible, there is a g′ ∈ G such that g = ng′. Let the order of g be m. Then
mng′ = 0, so the order of g′ is also finite. Thus g′ ∈ T .
By Theorem 6.2, ACA0 proves T is a direct summand of G. Let G = T ⊕ F .
F is a divisible torsion-free subgroup of G. For each x ∈ F and nonzero n ∈ Z,
there is a unique y ∈ F with x = ny and we write y = 1nx. F is a vector space over
the rational field. As ACA0 proves that every vector space has a basis, let X ⊆ F
be a basis of F . Then F =⊕x∈X
Qx, and each Qx ∼= Q as abelian groups.
Now consider the torsion subgroup T . Suppose that T is nontrivial (otherwise,
we have done). By Theorem 6.5, ACA0 proves that T is a direct sum of nontrivial
primary subgroups. That is, there is some Z ⊆ P such that T =⊕p∈Z
Tp, where
121
![Page 132: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/132.jpg)
Chapter 6. Reverse mathematics and divisible abelian groups
for each p ∈ Z, Tp = g ∈ T : ∃n[o(g) = pn] = 0G. Since T is divisible, by
Proposition 6.1 in this section, each Tp is divisible.
Fix p ∈ Z, we now decompose Tp.
Let P0 = g ∈ Tp : pg = 0. g ∈ P0 iff g = 0 or o(g) = p, where o(g) is the order
of g in Tp. P0 is Σ00 with parameter Tp, and thus exists in ACA0. Another view is
that P0 = g ∈ Tp : pg = 0 is a Zp-module, where Zp is the finite field of size p.
Similarly, ACA0 proves P0 has a basis Y0 as vector spaces over Zp. So P0 =⊕y∈Y0
Zpy.
List Y0 as y0,1, y0,2, · · · without repetitions. Let Kp = i ∈ N : y0,i ∈ Y0.
For each y0,i ∈ Y0, since Tp is divisible, for each n ≥ 1, there are yn,i ∈ Tp such
that y0,i = pnyn,i. Let Yn := yn,i : i ∈ Kp.
Consider P1 = g ∈ Tp : o(g) = p2. Then pP1 = pg : g ∈ P1 ⊆ P0. We now
show that any element in P1 is a unique sum of elements in Y0 ∪ Y1. Let g ∈ P1,
then pg ∈ P0. There are y0,i1 , · · · , y0,ik ∈ Y0, a1, · · · , ak ∈ Zp such that
pg = a1y0,i1 + · · ·+ aky0,ik
in P0 and the expression of Zp-linear sums is unique.
As y0,il = py1,il for each l = 1, · · · , k and y1,il ∈ Y1, we have
pg = p(a1y1,i1 + · · ·+ aky1,ik).
So g− (a1y1,i1 + · · ·+ aky1,ik) ∈ P0. Then g− (a1y1,i1 + · · ·+ aky1,ik) can be written
as a unique Zp-linear combination of elements in Y0, and thus, g can be written as
a unique Zp-linear combination of elements in Y0 ∪ Y1. So P0 ∪ P1 ⊆⊕
y∈Y0∪Y1Zpy.
In general, let Pn = g ∈ Tp : o(g) = pn+1. Any element in Pn is a unique
Zp-linear sum of elements in∪
0≤j≤nYj. Thus P0 ∪ · · · ∪ Pn ⊆
⊕y∈Y0∪···∪Yn
Zpy. Then
Tp ⊆∪n∈N
Pn ⊆⊕n∈N
⊕y∈Yn
Zpy
=⊕n∈N
⊕i∈Kp
Zpyn,i ⊆ Tp
Now Tp =⊕n∈N
⊕i∈Kp
Zpyn,i ∼=⊕i∈Kp
⊕n∈N
Zpyn,i.
122
![Page 133: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/133.jpg)
Chapter 6. Reverse mathematics and divisible abelian groups
For each i ∈ Kp, the subgroup generated by yn,i : n ∈ N is isomorphic to
Z(p∞). Hence, Tp ∼=⊕i∈Kp
⊕n∈N
Zpyn,i ∼=⊕i∈Kp
Z(p∞) = (Z(p∞))|Kp|, where |Kp| is the
size of Kp if Kp is finite, and ∞ otherwise.
This completes the decomposition of Tp for a fixed p ∈ Z.
Finally, we have
G ∼= T ⊕ F ∼=⊕p∈Z
Tp ⊕ F
∼=⊕p∈Z
(Z(p∞))|Kp| ⊕⊕x∈X
Q
Now let I = n ∈ N : pn ∈ Z, J = X, and for each n ∈ I, ln = |Kpn|. Then
G ∼=⊕n∈I
(Z(p∞n ))ln ⊕⊕n∈J
Q.
(2) ⇒ (1). Let f : N → N be a one-to-one function. Consider abelian group⊕m∈N
Z(p∞f(m))xm, denoted by G. Elements of G are of the form∑i≤naixi for some
ai ∈ Z(p∞f(i)) with each i ≤ n. G exists in RCA0, and is divisible.
By (2), G is a direct sum of subgroups isomorphic to Q or Z(p∞) for various
primes p. Let G ∼=⊕n∈I
(Z(p∞n ))ln ⊕⊕n∈J
Q for some I, J ⊆ N, and when I = ∅,
for each n ∈ I, 1 ≤ ln ≤ ∞.
Then I = range(f), J = ∅, and ln = 1 for each n ∈ I. Hence, n ∈ range(f) iff
n ∈ I, so range(f) exists.
123
![Page 134: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/134.jpg)
Chapter 7
Reverse mathematics and modules
7.1 Projective modules
Recall that a R-module P is projective if for every surjective homomorphism ε : B →C of R-modules and every homomorphism g : P → C, there exists a homomorphism
f : P → B such that g = εf .
7.1.1 Direct sums of projective modules
Proposition 7.1 (RCA0) A direct sum⊕
0≤i≤nPi is projective iff Pi is projective for
all 0 ≤ i ≤ n.
However, for the infinite case, we have the following theorem.
Theorem 7.1 (1) (RCA0) If a direct sum P =⊕i∈NPi is projective, then Pi is
projective for all i ∈ N.
(2) (Π11-CA0) If for all i ∈ N, Pi is projective, then the direct sum P =
⊕i∈NPi is
projective.
Proof: We first prove (1) within RCA0. Suppose that P is projective. We will
prove that each Pi is projective. Given any diagram of the form
Pi
gi
Bε // C // 0
124
![Page 135: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/135.jpg)
Chapter 7. Reverse mathematics and modules
Define g : P → C as g(x) = gi(xi) where xi is the i-th column of x ∈ P . As P is
projective, there is a f : P → B such that g = εf . For each z ∈ Pi, we have
εf(⟨0, · · · , 0, z, 0, · · · ⟩) = g(⟨0, · · · , 0, z, 0, · · · ⟩) = gi(z).
So there is a homomorphism fi : Pi → B with fi(z) = f(⟨0, · · · , 0, z, 0, · · · ⟩) such
that εfi = gi.
We now prove (2) within Π11-CA0. Suppose that Pi is projective for all i, and
we will prove that P is also projective. Give a surjective homomorphism ε : B → C
and a homomorphism g : P → C, we need to find a homomorphism f : P → B such
that εf = g.
P
g
f
Bε // C // 0
For each i, let gi : Pi → C be a homomorphism with fi(z) = g(⟨0, · · · , 0, z, 0, · · · ⟩).As Pi is projective, there is a homomorphism fi : Pi → B such that
εfi(z) = gi(z) = g(⟨0, · · · , 0, z, 0, · · · ⟩).
Then for any x = ⟨x0, · · · , xn⟩ ∈ P , set f(x) = f0(x0) + · · ·+ fn(xn), which is in B,
and we have
εf(x) =∑
0≤i≤n
εfi(xi) =∑
0≤i≤n
g(⟨0, · · · , 0, xi, 0, · · · ⟩) = g(x).
So f exists in Π11-CA0. Note that to define f , we use ⟨fi : i ∈ N⟩.
The following theorem has already been studied by Yamazaki in [22]. It provides
several equivalence characterizations of projective modules, and such equivalence are
provable over RCA0. For completeness, we provide a proof here.
Theorem 7.2 (Yamazaki [22]) (RCA0) For a R-module P , the following are equiv-
alent:
(1) P is projective.
(2) If ε : B → P is a surjective homomorphism, then there exists a homomorphism
f : P → B such that εf = 1P , the identity homomorphism on P .
125
![Page 136: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/136.jpg)
Chapter 7. Reverse mathematics and modules
(3) If P ∼= B/A, then P is isomorphic to a direct summand of B.
(4) P is isomorphic to a direct summand of a free module F .
Proof: (1) ⇒ (2). As P is projective, there is a homomorphism f : P → B such
that εf = 1P . That is, the diagram
P
1P
f
Bε // P // 0
commutes.
(2) ⇒ (3). Let π : B → B/A be the canonical surjective homomorphism, and
g : B/A→ P be an isomorphism. Then ε = gπ is a surjective homomorphism from
B to P . Let µ : A→ B be the identical embedding, i.e., for any x ∈ A, µ(x) = x.
Consider the short exact sequence 0 → Aµ→ B
ε→ P → 0. By (2), it splits with
a splitting f . Then by Lemma 1.2, B = A ⊕ f(P ). As f is one-to-one, P ∼= f(P ),
which is a direct summand of B.
(3) ⇒ (4). By Proposition 1.7, P ∼= F/A for some free module F . By (3), P is
isomorphic to a direct summand of F .
(4) ⇒ (1). By (4), P is isomorphic to a submodule Q of F via some isomorphism
f , and F = Q ⊕ A for some submodule A. As free modules are projective, F is
projective, and hence, by Proposition 7.1, Q is projective.
Now we show that P is projective. Give a surjective homomorphism ε : B → C
and a homomorphism g : P → C, we need to find a homomorphism h : P → B such
that the diagram
P
g
h
Bε // C // 0
commutes. Consider the homomorphism gf−1 : Q→ C. Since Q is projective, there
is a homomorphism h′ : Q→ B such that gf−1 = εh′. Let h = h′f . Then
εh = ε(h′f) = (εh′)f = (gf−1)f = g(f−1f) = g.
126
![Page 137: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/137.jpg)
Chapter 7. Reverse mathematics and modules
7.1.2 Free modules and projective modules over Σ01-PIDs
Free modules are projective, but generally, projective modules may not be free.
Now we restrict to Σ01-PIDs, because over such special rings, projective modules are
always free. Within RCA0, define an integral domain R to be a Σ01-PID if every
Σ01-ideal of R is generated by one element.
Lemma 7.1 (ACA0) Let R be a Σ01-PID. A submodule of a free R-module is free.
Proof: We reason in ACA0. As we only consider countable modules, we assume
that a free R-module F is either⊕
0≤i≤nR for some n ∈ N, or
⊕i∈NR. We prove it for
the case F =⊕i∈NR. The following proof adopts ideas of a classical proof in [30].
Let N be a submodule of F . Fix a code for N . Now elements of N are coded as
natural numbers. For all i, let Ni = N ∩⊕
0≤j≤iR, and define a map fi : Ni → R with
fi(⟨x0, · · · , xi−1, xi⟩) = xi. Then fi is a R-homomorphism, and im(fi) = Ni/Ni−1 is
an ideal of R. Again, we view elements in im(fi) as representatives of equivalence
classes under the equivalence relation x ∼ y ⇔ x − y ∈ Ni−1 such that their codes
are least as natural numbers. im(fi) exists in RCA0.
As R is a Σ01-PID, for each i, there exists a bi such that (bi) = im(fi). Define a
function g by setting g(i) = bi. Since g(i) = bi if bi ∈ im(fi) and
∀a ∈ im(fi)∃c ∈ R[a = cbi],
g is Π02, thus exists in ACA0.
Let J = j ∈ N : g(j) = 0. List J as j0 < · · · jn < jn+1 < · · · . For each jn ∈ J ,
define cjn by primitive recursion as follows. Let cj0 ∈ Nj0 be the element with least
code such that fj0(cj0) = bj0 . Assume that we have defined cjl for all l ≤ k − 1, to
define cjk , we let rjk ∈ Njk be the element with least code such that fjk(rjk) = bjk ,
and check whether the code of rjk is bigger than or equal to the code of cjk−1or not.
If yes, just let cjk = rjk ; otherwise, we can have m big enough such that the code
of mcjk−1+ rjk is bigger than the code of cjk−1
, and we let cjk = mcjk−1+ rjk . This
ensures that the sequence cjk , k ∈ N, has increasing codes, and we still have
fjk(cjk) = fjk(mcjk−1+ rjk) = fjk(rjk) = bjk .
127
![Page 138: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/138.jpg)
Chapter 7. Reverse mathematics and modules
C = cj : j ∈ J is ∆01 in J and hence exists in ACA0.
Claim 1. C = cj : j ∈ J is linearly independent.
Proof of claim 1: For any finite subset A ⊆ C, let A = ci1 , ci2 , · · · , cin with
i1 < i2 < · · · < in. If∑
0≤k≤ndikcik = 0 for some dik ∈ R, then
0 = fin(∑
0≤k≤n
dikcik) =∑
0≤k≤n
dikfin(cik) = dinbin .
As bin = 0, din = 0, then∑
0≤k≤n−1
dikcik = 0. By applying fin−1 , we obtain din−1 = 0.
Continue this process, we arrive at din = din−1 = · · · = di1 = 0. So A is linearly
independent.
This completes the proof of claim 1.
Claim 2. C generates N .
Proof of claim 2: We prove it by contradiction. Assume that there is a least
n ∈ N such that some x = ⟨x0, · · · , xn⟩ ∈ Nn that cannot be written as linear
combinations of elements of C.
By the minimality of n, xn = 0. Then fn(x) = xn ∈ (bn) = 0, thus, bn = 0,
and n ∈ J . Let xn = dnbn for some dn ∈ R− 0. Then
fn(x) = xn = dnbn = dnfn(cn) = fn(dncn),
so x− dncn ∈ ker(fn) = Nn−1.
As x cannot be written as linear combinations of elements of C and cn ∈ C, so
does x− dncn. But x− dncn ∈ Nn−1, contradicting the minimality of n.
This completes the proof of claim 2.
By claims 1 and 2, C is a basis of N , and thus N is free.
Theorem 7.3 (ACA0) Let R be a Σ01-PID. A projective R-module is free.
Proof: Since RCA0 proves that every projective module is isomorphic to a direct
summand of a free module, it proves that every projective module is isomorphic
to a submodule of a free module. Let M be a projective R-module. There is an
isomorphism f :M →M ′, whereM ′ is a submodule of a free R-module. By Lemma
7.1, ACA0 proves M′ is free. Let C be a basis of M ′. Then f−1(C) := f−1(c) : c ∈
C is a basis of M , i.e., M is free.
128
![Page 139: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/139.jpg)
Chapter 7. Reverse mathematics and modules
Corollary 7.1 (ACA0) Let R be a Σ01-PID. A submodule of a projective R-module
is projective.
7.2 Injective modules
The notion of injective modules is the dual of projective modules. A R-module I is
injective if for any monomorphism µ : A → B and any homomorphism g : A → I,
there exists a homomorphism f : B → I such that g = fµ.
7.2.1 Baer’s criterion for injective modules
The following classical lemma is known as Baer’s criterion for injective modules.
Lemma 7.2 (Baer’s Criterion) A module I over a commutative ring R with identity
is injective iff for every ideal J of R and every R-module homomorphism g : J → I,
there is a homomorphism f : R → I such that f J= g.
By definition, it is easy to see that RCA0 proves one direction: a module I
over a ring R is injective implies that for every ideal J of R and every R-module
homomorphism g : J → I, there is a homomorphism f : R → I such that f J= g.
The other direction is equivalent to ACA0, due to Yamazaki in [22]. For com-
pleteness, we will provide a proof.
Theorem 7.4 (Yamazaki [22]) The following are equivalent over RCA0.
(1) ACA0.
(2) If for every ideal J of R and every R-module homomorphism g : J → I, there
is a homomorphism f : R → I such that f J= g, then I is injective.
Proof: (1) ⇒ (2). We reason in ACA0. Assume that for an ideal J of R, and a
R-module homomorphism g : J → I, there is a homomorphism f : R → I such that
the diagram
0 // J
g
µ // R
f
I
129
![Page 140: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/140.jpg)
Chapter 7. Reverse mathematics and modules
commutes, where µ(x) = x for x ∈ J . We need to show that for any submodule A of
a R-module B, the identical embedding µ : A→ B, and a R-module homomorphism
g : A → I, there is a homomorphism f : B → I making the following diagram
commutative.
0 // A
g
µ // B
f
I
List B as b0, b1, · · · , and let An be the R-module generated by A ∪ b0, · · · , bn.We extend g : A→ I to B by stages.
Stage 0. If A0 = A, then let f0 : A0 → I be the same as g. Otherwise, let
S0 = r ∈ R : rb0 ∈ A. Since A is a R-module, S0 is an ideal of R. Define a
homomorphism h0 : S0 → I by letting h0(r) = g(rb0). By assumption, there is a
homomorphism g0 : R → I with g0 S0= h0, g0(1R) ∈ I, and for r ∈ S0,
rg0(1R) = g0(r) = h0(r) = g(rb0).
0 // S0
h0
// R
g0
I
So we define f0 : A0 → I by letting f0(b0) = g0(1R), and for any x = a+rb0 ∈ A0
with a ∈ A, r ∈ R, f0(x) = g(a) + rf0(b0). We claim that f0 is a R-homomorphism
from A0 to I. Let x = a+ rb0 and x′ = a′ + r′b0 be two elements in A0, and r
′′ ∈ R.
Then
f0(x+ x′) = g(a+ a′) + (r + r′)f0(b0)
= g(a) + g(a′) + rf0(b0) + r′f0(b0)
= f0(x) + f0(x′),
and
f0(r′′x) = g(r′′a) + r′′rf0(b0)
= r′′g(a) + r′′rf0(b0)
= r′′f0(x).
130
![Page 141: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/141.jpg)
Chapter 7. Reverse mathematics and modules
Moreover, f0 A= g. In fact, if rb0 ∈ A with r = 0, then r ∈ S0, and
f0(rb0) = rf0(b0) = rg0(1R) = g0(r) = h0(r) = g(rb0).
Stage n + 1. Assume that we have fn : An → I extending fn−1. If bn+1 ∈ An,
do nothing, let fn+1 = fn. Otherwise, let Sn+1 = r ∈ R : rbn+1 ∈ An, which is
a proper ideal of R. Let hn+1 : Sn+1 → I by hn+1(r) = fn(rbn+1). Then there is a
R-module homomorphism gn+1 : R → I such that the diagram
0 // Sn+1
hn+1
// R
gn+1
I
commutes. So for any nonzero rbn+1 ∈ An,
fn(rbn+1) = hn+1(r) = gn+1(r) = rgn+1(1R).
Now define fn+1 : An+1 → I by choosing
fn+1(bn+1) = gn+1(1R)
and extending it linearly to all An+1. That is, for x = a + rbn+1 ∈ An+1 with
a ∈ An, r ∈ R, define
fn+1(x) = fn(a) + rfn+1(bn+1).
It is easy to check that fn+1 is the homomorphism from An+1 to I with fn+1 An= fn.
This provides a mapping from B to I by having f(x) = fn(x) for x ∈ An. It is
obvious that f is well-defined and is a homomorphism, and that f is the limit of fn.
(2) ⇒ (1). We prove the reversal direction by showing that (2) implies the
statement “every divisible abelian group is injective” which is equivalent to ACA0
over RCA0.
Let D be a divisible abelian group, (n) be an ideal of Z, and g : (n) → D be
a Z-module homomorphism. We will extend g to Z, i.e., define a homomorphism
f : Z → D such that
f (n)= g.
131
![Page 142: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/142.jpg)
Chapter 7. Reverse mathematics and modules
• If n = 0, just define f : Z → D to be the zero homomorphism.
• If n = 0, g(n) ∈ D. By divisibility of D, there is a c ∈ D such that g(n) = nc.
Then define a Z-module homomorphism f : Z → D by letting f(1) = c, and
f(n) = nf(1) = nc = g(n).
So for any x ∈ (n), let x = mxn, then
f(x) = mxf(n) = mxg(n) = g(mxn) = g(x).
Thus, the assumption of (2) is true for R = Z and I = D. Now by applying (2)
to R = Z and I = D, D is injective.
7.2.2 Divisible modules and injective modules over Σ01-PIDs
Let R be an integral domain. Recall that a R-module D is divisible if for every
d ∈ D and every nonzero r ∈ R, there is a c ∈ D such that d = rc. Classically, a
module over a principal ideal domain is injective iff it is divisible. By Proposition
1.11, RCA0 proves that injective modules over an integral domain are divisible.
However, to show the other direction, we require ACA0.
Lemma 7.3 (ACA0) Let R be a Σ01-PID. A divisible R-module D is injective.
Proof: We reason in ACA0. The proof is similar to the one for abelian groups.
Let µ : A → B be a given monomorphism. Without loss of generality, we assume
that A is a submodule of B. For a given homomorphism g : A → D, we need to
find a homomorphism f : B → D such that g = fµ.
0 // A
g
µ // B
f
D
List B as b0, b1, · · · , and let An be the submodule of B generated by A ∪b0, · · · , bn for n ∈ N. An exists by Σ0
1-comprehension. We will extend g to B
by stages.
132
![Page 143: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/143.jpg)
Chapter 7. Reverse mathematics and modules
Stage 0. If b0 ∈ A, then A = A0, let g0 = g with domain A0. Otherwise, consider
set
S0 = r ∈ R : rb0 ∈ A.
As A is a R-module, S0 is an ideal of R. Obviously, S0 is ∆01, so by assumption
that R is a Σ01-PID, there is a t0 ∈ R such that S0 = (t0). If t0 = 0, just choose
g0(b0) as 0. If t0 = 0, g(t0b0) ∈ D; by divisibility of D, there is a c0 ∈ D such that
g(t0b0) = t0c0, and define
g0(b0) = c0.
Then for any x ∈ A0, x = a+ rb0 for some a ∈ A and r ∈ R, set
g0(x) = g(a) + rg0(b0).
We can check g0 is a R-module homomorphism from A0 to D, as in Theorem
7.4. We now show that g0 extends g. If rb0 ∈ A with r = 0, then g0(rb0) = rc0. As
r ∈ S0, there is a r′ ∈ R such that r = r′t0. Then
g0(rb0) = rc0 = r′t0c0 = r′g(t0b0) = g(r′t0b0) = g(rb0).
Stage n + 1. Assume that we have already defined gn : An → D extending gn−1.
Now consider bn+1.
If bn+1 ∈ An, then An+1 = An and we let gn+1 = gn. Otherwise, let
Sn+1 = r ∈ R : rbn+1 ∈ An.
Again, Sn+1 is an ideal of R, and Sn+1 is Σ1. By assumption that R is a Σ01-PID,
Sn+1 is a PID and we let Sn+1 = (tn+1). If tn+1 = 0, define gn+1(bn+1) = 0. If
tn+1 = 0, as tn+1bn+1 ∈ An, and hence gn(tn+1bn+1) ∈ D. As D is divisible, there is
a cn+1 ∈ D such that
gn(tn+1bn+1) = tn+1cn+1.
We now define gn+1(bn+1) = cn+1, and extend it linearly to An+1 by letting
gn+1(a+ rbn+1) = gn(a) + rgn+1(bn+1)
for a ∈ An and r ∈ R. We can check that gn+1 is a R-module homomorphism with
domain An+1 and that gn+1 An= gn.
133
![Page 144: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/144.jpg)
Chapter 7. Reverse mathematics and modules
Then B =∪n∈N
An, and for all n, gn+1 extends gn. f : B → D defined by
f(x) = gn(x)
for some n with x ∈ An is well-defined and is a R-module homomorphism extending
g. f is the desired homomorphism.
In [26], it was proved that the statement “every divisible abelian group is injec-
tive” is equivalent to ACA0 over RCA0. Together with Lemma 7.3, we obtain:
Theorem 7.5 The following are equivalent over RCA0:
(1) ACA0.
(2) Every divisible module over a Σ01-PID is injective.
(3) Every divisible abelian group is injective.
Proposition 7.2 (RCA0)
(1) Every quotient of a divisible module over a Σ01-PID is divisible.
(2) Every quotient of an injective module over a Σ01-PID is divisible.
Proof: (1). Let D be a divisible R-module, and ε : D → B a surjective homo-
morphism. We show that B is divisible. For any nonzero b ∈ B, find a d ∈ D with
ε(d) = b. By divisibility of D, for any nonzero r ∈ R, there is a d′ ∈ D such that
d = rd′. Then b = ε(d) = rε(d′) with ε(d′) ∈ B.
(2). Let M be an injective module over a Σ01-PID. RCA0 proves that M is
divisible and that every quotient of a divisible module over a Σ01-PID is divisible.
Hence, RCA0 proves that every quotient of M is divisible.
By Lemma 7.3, ACA0 proves that every divisible module over a Σ01-PID is injec-
tive, and we obtain the following corollary.
Corollary 7.2 (ACA0) Every quotient of an injective module over a Σ01-PID is
injective.
134
![Page 145: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/145.jpg)
References
[1] B. Anderson and B. Csima, “A bounded jump for the bounded Turing degrees,”
Notre Dame J. Formal Logic, vol. 55, pp. 245–264, 2014.
[2] B. Anderson, B. Csima, and K. lange, “Bounded low and high sets,” Arch.
Math. Logic, vol. 56, pp. 507–521, 2017.
[3] A. M. Kach, K. Lange, and R. Solomon, “Degrees of orders on torsion-free
abelian groups,” Ann. Pure Appl. Logic, vol. 164, pp. 822–836, 2013.
[4] J. Mohrherr, “A refinement of lown and highn for r.e. degrees,” Z. Math. Logik
Grundlag. Math., vol. 32, pp. 5–12, 1986.
[5] S. B. Cooper, Degrees of Unsolvability. PhD thesis, Leicester University, 1971.
[6] S. B. Cooper, Computability Theory. Chapman and Hall/CRC, 2004.
[7] R. W. Robinson, “Interpolation and embedding in the recursively enumerable
degrees,” Annals of Mathematics, vol. 93, pp. 285–314, 1971.
[8] S. B. Cooper, “Minimal pairs and high recursively enumerable degrees,” J.
Symbolic Logic, vol. 39, pp. 655–660, 1974.
[9] D. Miller, The Relationship between the Structure and the Degrees of Recursively
Enumerable Sets. PhD thesis, University of Chicago, Chicago, Illinois, 1981.
[10] R. A. Shore and T. A. Slaman, “Working below a high recursively enumerable
degree,” J. Symbolic Logic, vol. 58, pp. 824–859, 1993.
135
![Page 146: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/146.jpg)
REFERENCES
[11] Ambos-Spies, Jockusch, Shore, and Soare, “An algebraic decomposition of the
recursively enumerable degrees and the coincidence of several degree classes
with the promptly degrees,” Trans. Amer. Math. Soc., vol. 281, pp. 109–128,
1984.
[12] M. Bickford and C. Mills, “Lowness properties of r.e. sets,” Typewritten unpub-
lished manuscript, 1982.
[13] J. C. G. Jockusch and R. I. Soare, “Π01 classes and degrees of theories,” Trans.
Amer. Math. Soc., vol. 173, pp. 33–56, 1972.
[14] R. Solomon, “Π01 classes and ordered groups,” Ann. Pure Appl. Logic, vol. 115,
pp. 279–302, 2002.
[15] G. Metakides and A. Nerode, “Effective content of field theory,” Ann. Pure
Appl. Logic, vol. 17, pp. 289–320, 1979.
[16] C. J. Martin, Computability Theory and Ordered Groups. PhD thesis, Univer-
sity of Connecticut, Storrs, CT, 2015.
[17] F. Stephan, “Martin-lof random and PA-complete sets,” Logic Colloquium,
2002, Proceedings of the Annual European Summer Meeting of the Association
for Symbolic Logic and the Colloquium Logicum, held in Munster, Germany,
August 3C11, 2002. Lecture Notes in Logic, vol. 27, pp. 342–348, 2006.
[18] P. Odifreddi, Classical Recursion Theory. Volumes I and II, North Holland-
Elsevier, Amsterdam, New York, Oxford, Tokyo, 1989 and 1999.
[19] K. Hatzikiriakou and S. G. Simpson, “WKL0 and orderings of countable abelian
groups,” Contemporary Mathematics, vol. 106, pp. 177–180, 1990.
[20] S. G. Simpon, Subsystems of Second Order Arithmetic. Springer-Verlag, 1999.
[21] R. Solomon, “Reverse mathematics and fully ordered groups,” Notre Dame J.
Formal Logic, vol. 39, pp. 157–189, 1998.
136
![Page 147: Computability Theory and Algebra · 2020. 10. 28. · jump on wtt-degrees, and proved an analogue of Shoenfield’s jump inversion theo-rem. In [2], Anderson, Csima and Lange compared](https://reader035.vdocuments.us/reader035/viewer/2022071605/6141a765d64cc55ff0754ebd/html5/thumbnails/147.jpg)
REFERENCES
[22] T. Yamazaki, “Reverse mathematics and commutative ring theory (slides),”
Conference on “Computability Theory and Foundations of Mathematics”,
Tokyo Institute Of Technology, February 18-20, 2013.
[23] R. G. Downey, S. Lempp, and J. R. Mileti, “Ideals in computable rings,” J.
Algebra, vol. 314, pp. 872–887, 2007.
[24] T. Sato, Reverse Mathematics and Countable Algebraic Systems. PhD thesis,
Tohoku University, Sendai, Japan, 2016.
[25] S. G. Simpson, “Ordinal numbers and the Hilbert basis theorem,” J. Symbolic
Logic, vol. 53, pp. 961–974, 1988.
[26] H. M. Friedman, S. G. Simpson, and R. L. Smith, “Countable algebra and set
existence axioms,” Ann. Pure Appl. Logic, vol. 25, pp. 141–181, 1983.
[27] A. Nies, Computability and Randomness. Oxford University Press, Inc. New
York, 2009.
[28] J. C. G. Jockusch and R. A. Shore, “Pseudo-jump operators. I: the r. e. case,”
Trans. Amer. Math. Soc., vol. 275, pp. 599–609, 1983.
[29] I. Kaplansky, Infinite Abelian Groups. University of Michigan, Michigan, 1954.
[30] R. J. Hilton and U. Stammbach, A Course in Homological Algebra. Second
edition, Graduate Texts in Mathematics, 4. Springer-Verlag, New York, 1997.
137