Bel Criteria
Given a metric on a Lorentzian manifold, the Weyl tensor for this metric may be computed. If the Weyl tensor is algebraically special at some, there is a useful set of conditions, found by Lluis (or Louis) Bel and Robert Debever, for determining precisely the Petrov type at . Denoting the Weyl tensor components at by (assumed non-zero, i.e., not of type O), the Bel criteria may be stated as:
- is type N if and only if there exists a vector satisfying
where is necessarily null and unique (up to scaling).
- If is not type N, then is of type III if and only if there exists a vector satisfying
where is necessarily null and unique (up to scaling).
- is of type II if and only if there exists a vector satisfying
- and
where is necessarily null and unique (up to scaling).
- is of type D if and only if there exists two linearly independent vectors, satisfying the conditions
- ,
and
- , .
where is the dual of the Weyl tensor at .
In fact, for each criterion above, there are equivalent conditions for the Weyl tensor to have that type. These equivalent conditions are stated in terms of the dual and self-dual of the Weyl tensor and certain bivectors and are collected together in Hall (2004).
The Bel criteria find application in general relativity where determining the Petrov type of algebraically special Weyl tensors is accomplished by searching for null vectors.
Read more about this topic: Petrov Classification
Famous quotes containing the words bel and/or criteria:
“Cependant, ce fut jadis un bel homme, de haute taille.”
—T.S. (Thomas Stearns)
“The Hacker Ethic: Access to computersand anything which might teach you something about the way the world worksshould be unlimited and total.
Always yield to the Hands-On Imperative!
All information should be free.
Mistrust authoritypromote decentralization.
Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
You can create art and beauty on a computer.
Computers can change your life for the better.”
—Steven Levy, U.S. writer. Hackers, ch. 2, The Hacker Ethic, pp. 27-33, Anchor Press, Doubleday (1984)