Introduction Permutation Representation Results and Conclusions Using Permutations to Study a Classification Problem on the Solid Torus Illinois Sectional MAA Meeting Christopher L. Toni Dr. Tanya Cofer * April 10, 2010 Christopher L. Toni Computational Contact Topology - ISMAA Meeting 1 / 19
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
IntroductionPermutation Representation
Results and Conclusions
Using Permutations to Study a ClassificationProblem on the Solid Torus
Illinois Sectional MAA Meeting
Christopher L. Toni Dr. Tanya Cofer∗
April 10, 2010
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 1 / 19
IntroductionPermutation Representation
Results and Conclusions
Outline
1 Introduction
2 Permutation RepresentationArcs and ArclistsTightness CheckingBypasses
3 Results and Conclusions
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 2 / 19
IntroductionPermutation Representation
Results and Conclusions
Formulating Our Problem
On surfaces inside the solid torus (defined by S1×D2), dividingcurves are located where twisting planes switch from positive tonegative.
These dividing curves keep track of and allow for investigationof certain topological properties in the neighborhood of asurface.
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 3 / 19
IntroductionPermutation Representation
Results and Conclusions
Formulating Our Problem
On surfaces inside the solid torus (defined by S1×D2), dividingcurves are located where twisting planes switch from positive tonegative.
These dividing curves keep track of and allow for investigationof certain topological properties in the neighborhood of asurface.
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 3 / 19
IntroductionPermutation Representation
Results and Conclusions
Formulating Our Problem
On surfaces inside the solid torus (defined by S1×D2), dividingcurves are located where twisting planes switch from positive tonegative.
These dividing curves keep track of and allow for investigationof certain topological properties in the neighborhood of asurface.
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 3 / 19
IntroductionPermutation Representation
Results and Conclusions
Arcs and ArclistsTightness CheckingBypasses
Outline
1 Introduction
2 Permutation RepresentationArcs and ArclistsTightness CheckingBypasses
3 Results and Conclusions
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 4 / 19
IntroductionPermutation Representation
Results and Conclusions
Arcs and ArclistsTightness CheckingBypasses
Overview
The first computational task is to generate arclists for a givennumber of vertices np.
DefinitionAn arc is a path between vertices subject to the conditions thatall vertices must be paired and arcs cannot intersect. An arclistis a set (list) of legal pairs of arcs.
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 5 / 19
IntroductionPermutation Representation
Results and Conclusions
Arcs and ArclistsTightness CheckingBypasses
Overview
The first computational task is to generate arclists for a givennumber of vertices np.
DefinitionAn arc is a path between vertices subject to the conditions thatall vertices must be paired and arcs cannot intersect. An arclistis a set (list) of legal pairs of arcs.
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 5 / 19
IntroductionPermutation Representation
Results and Conclusions
Arcs and ArclistsTightness CheckingBypasses
How Do Permutations Apply Here?
Recall that a permutation is a bijective mapping of elementsfrom a set S to itself.
Let S = {0,1,2, . . . ,np−1} be the set of vertex values on acutting disk. We can define a permutation α on S that satisfiesthe definition of an arc/arclist.
Example: Consider the case np = 8. The set of vertex valueswould be S = {0,1,2, . . . ,6,7} and α = (01)(25)(34)(67) is apermutation on the set S.
There are 14 different permutations on this set that satisfy thedefinitions of an arc/arclist. �
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 6 / 19
IntroductionPermutation Representation
Results and Conclusions
Arcs and ArclistsTightness CheckingBypasses
How Do Permutations Apply Here?
Recall that a permutation is a bijective mapping of elementsfrom a set S to itself.
Let S = {0,1,2, . . . ,np−1} be the set of vertex values on acutting disk. We can define a permutation α on S that satisfiesthe definition of an arc/arclist.
Example: Consider the case np = 8. The set of vertex valueswould be S = {0,1,2, . . . ,6,7} and α = (01)(25)(34)(67) is apermutation on the set S.
There are 14 different permutations on this set that satisfy thedefinitions of an arc/arclist. �
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 6 / 19
IntroductionPermutation Representation
Results and Conclusions
Arcs and ArclistsTightness CheckingBypasses
How Do Permutations Apply Here?
Recall that a permutation is a bijective mapping of elementsfrom a set S to itself.
Let S = {0,1,2, . . . ,np−1} be the set of vertex values on acutting disk. We can define a permutation α on S that satisfiesthe definition of an arc/arclist.
Example: Consider the case np = 8. The set of vertex valueswould be S = {0,1,2, . . . ,6,7} and α = (01)(25)(34)(67) is apermutation on the set S.
There are 14 different permutations on this set that satisfy thedefinitions of an arc/arclist. �
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 6 / 19
IntroductionPermutation Representation
Results and Conclusions
Arcs and ArclistsTightness CheckingBypasses
How Do Permutations Apply Here?
Recall that a permutation is a bijective mapping of elementsfrom a set S to itself.
Let S = {0,1,2, . . . ,np−1} be the set of vertex values on acutting disk. We can define a permutation α on S that satisfiesthe definition of an arc/arclist.
Example: Consider the case np = 8. The set of vertex valueswould be S = {0,1,2, . . . ,6,7} and α = (01)(25)(34)(67) is apermutation on the set S.
There are 14 different permutations on this set that satisfy thedefinitions of an arc/arclist. �
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 6 / 19
IntroductionPermutation Representation
Results and Conclusions
Arcs and ArclistsTightness CheckingBypasses
How Do Permutations Apply Here? (Cont.)
Consider the example mentioned on the previous slide.
2
10
7
6
5 4
3
For this cutting disk, the arclist is {(0,1),(2,5),(3,4),(6,7)}.
We can easily rewrite this as the permutationα = (01)(25)(34)(67).
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 7 / 19
IntroductionPermutation Representation
Results and Conclusions
Arcs and ArclistsTightness CheckingBypasses
How Do Permutations Apply Here? (Cont.)
Consider the example mentioned on the previous slide.
2
10
7
6
5 4
3
For this cutting disk, the arclist is {(0,1),(2,5),(3,4),(6,7)}.
We can easily rewrite this as the permutationα = (01)(25)(34)(67).
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 7 / 19
IntroductionPermutation Representation
Results and Conclusions
Arcs and ArclistsTightness CheckingBypasses
How Do Permutations Apply Here? (Cont.)
Consider the example mentioned on the previous slide.
2
10
7
6
5 4
3
For this cutting disk, the arclist is {(0,1),(2,5),(3,4),(6,7)}.
We can easily rewrite this as the permutationα = (01)(25)(34)(67).
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 7 / 19
IntroductionPermutation Representation
Results and Conclusions
Arcs and ArclistsTightness CheckingBypasses
Outline
1 Introduction
2 Permutation RepresentationArcs and ArclistsTightness CheckingBypasses
3 Results and Conclusions
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 8 / 19
IntroductionPermutation Representation
Results and Conclusions
Arcs and ArclistsTightness CheckingBypasses
Overview - Tightness Checker
Potentially Tight Overtwisted
x→ x−nq+1 mod np
This maps the dividing curves on the surface from left to rightcutting disk.
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 9 / 19
IntroductionPermutation Representation
Results and Conclusions
Arcs and ArclistsTightness CheckingBypasses
Using Permutations to Determine Tightness
Let β be a permutation that represents the mapping rulex→ x−nq+1 mod np and let A be the arclist permutation.
The permutation formula to check for tightness is β−1AβA.Christopher L. Toni Computational Contact Topology - ISMAA Meeting 10 / 19
IntroductionPermutation Representation
Results and Conclusions
Arcs and ArclistsTightness CheckingBypasses
Permutation Example
Given: n = 2, p = 4 ,q = 3
The mapping rule tells us x→ x−5 mod 8.
Therefore, β = (03614725)
β−1 = (05274163)
A = (01)(27)(36)(45) A = (07)(14)(23)(56)β−1AβA = (0246) β−1AβA = (0)
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 11 / 19
IntroductionPermutation Representation
Results and Conclusions
Arcs and ArclistsTightness CheckingBypasses
Permutation Example
Given: n = 2, p = 4 ,q = 3
The mapping rule tells us x→ x−5 mod 8.
Therefore, β = (03614725)
β−1 = (05274163)
A = (01)(27)(36)(45) A = (07)(14)(23)(56)β−1AβA = (0246) β−1AβA = (0)
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 11 / 19
IntroductionPermutation Representation
Results and Conclusions
Arcs and ArclistsTightness CheckingBypasses
Permutation Example
Given: n = 2, p = 4 ,q = 3
The mapping rule tells us x→ x−5 mod 8.
Therefore, β = (03614725)
β−1 = (05274163)
A = (01)(27)(36)(45) A = (07)(14)(23)(56)β−1AβA = (0246) β−1AβA = (0)
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 11 / 19
IntroductionPermutation Representation
Results and Conclusions
Arcs and ArclistsTightness CheckingBypasses
Outline
1 Introduction
2 Permutation RepresentationArcs and ArclistsTightness CheckingBypasses
3 Results and Conclusions
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 12 / 19
IntroductionPermutation Representation
Results and Conclusions
Arcs and ArclistsTightness CheckingBypasses
Abstract Bypasses
An abstract bypass exists when a line can be drawn throughthree arcs on a cutting disk.
Two Abstract Bypasses. . No Abstract Bypasses.
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 13 / 19
IntroductionPermutation Representation
Results and Conclusions
Arcs and ArclistsTightness CheckingBypasses
Abstract Bypasses
An abstract bypass exists when a line can be drawn throughthree arcs on a cutting disk.
Two Abstract Bypasses. . No Abstract Bypasses.
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 13 / 19
IntroductionPermutation Representation
Results and Conclusions
Arcs and ArclistsTightness CheckingBypasses
Abstract Bypasses
An abstract bypass exists when a line can be drawn throughthree arcs on a cutting disk.
Two Abstract Bypasses. . No Abstract Bypasses.
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 13 / 19
IntroductionPermutation Representation
Results and Conclusions
Arcs and ArclistsTightness CheckingBypasses
Abstract Bypasses (Cont.)
(01)(25)(34)(67)
α
β
α
β
(05)(14)(23)(67)
(01)(23)(47)(56)
Christopher L. Toni Computational Contact Topology - ISMAA Meeting 14 / 19
IntroductionPermutation Representation
Results and Conclusions
Arcs and ArclistsTightness CheckingBypasses
Existence of Bypasses
The existence of actual bypasses is checked in a similarfashion as tightness.