ILSAMP Contact Topology

Preview:

Citation preview

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Comparison of Methods That Check for TightContact Structures on the Solid Torus

ILSAMP Student Research Symposium

Kelly Hirschbeck Christopher L. Toni Donald BarkleySteven Jerome Dr. Tanya Cofer∗

February 13, 2009

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 1 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

OutlineIntroduction

Overview of the ProcessArcs and ArclistsTightness CheckingBypasses

Method 1: Hand CalculationsTightness CheckingBypasses

Method 2: PermutationsTightness CheckingBypasses

Results and Conclusions

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 2 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

What is Topology?

Topology is a field of mathematics that does not focus on anobject’s shape, but the properties that remain consistentthrough deformations like:

I twistingI bendingI stretching

To illustrate this, imagine a coffee mug and a doughnut (torus).

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 3 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

What is Topology?

Topology is a field of mathematics that does not focus on anobject’s shape, but the properties that remain consistentthrough deformations like:

I twistingI bendingI stretching

To illustrate this, imagine a coffee mug and a doughnut (torus).

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 3 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

What is Topology?

Topology is a field of mathematics that does not focus on anobject’s shape, but the properties that remain consistentthrough deformations like:

I twistingI bendingI stretching

To illustrate this, imagine a coffee mug and a doughnut (torus).

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 3 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

What is Topology? (cont.)

The torus and the coffee cup are topologically equivalentobjects. We see above that through bending and stretching, thetorus can be morphed into a coffee cup and vice versa.

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 4 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Formulating the ProblemOn the solid torus (defined by S1×D2), dividing curves arelocated where twisting planes switch from positive to negative.

These dividing curves keep track of and allow for investigationof certain topological properties in the neighborhood of asurface.

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 5 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Formulating the ProblemOn the solid torus (defined by S1×D2), dividing curves arelocated where twisting planes switch from positive to negative.

These dividing curves keep track of and allow for investigationof certain topological properties in the neighborhood of asurface.

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 5 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Formulating the ProblemOn the solid torus (defined by S1×D2), dividing curves arelocated where twisting planes switch from positive to negative.

These dividing curves keep track of and allow for investigationof certain topological properties in the neighborhood of asurface.

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 5 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Arcs and Arclists

Overview

The first computational task is to generate arclists for a givennumber of vertices np.

DefinitionAn arc is a path between vertices subject to:

I All vertices must be paired and arcs cannot intersect

An arclist is a set (list) of legal pairs of arcs.

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 6 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Arcs and Arclists

Overview

The first computational task is to generate arclists for a givennumber of vertices np.

DefinitionAn arc is a path between vertices subject to:

I All vertices must be paired and arcs cannot intersect

An arclist is a set (list) of legal pairs of arcs.

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 6 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Arcs and Arclists

Algorithm Output - Arcs and Arclists

When np = 8, there are 8 vertices. The arclists that aregenerated are:

(0 1)(2 5)(3 4)(6 7)(0 1)(2 7)(3 4)(5 6)(0 3)(1 2)(4 5)(6 7)(0 1)(2 3)(4 5)(6 7)(0 1)(2 7)(3 6)(4 5)(0 3)(1 2)(4 7)(5 6)(0 7)(1 2)(3 4)(5 6)

(0 5)(1 2)(3 4)(6 7)(0 7)(1 4)(2 3)(5 6)(0 1)(2 3)(4 7)(5 6)(0 5)(1 4)(2 3)(6 7)(0 7)(1 2)(3 6)(4 5)(0 7)(1 6)(2 5)(3 4)(0 7)(1 6)(2 3)(4 5)

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 7 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Arcs and Arclists

Algorithm Output - Arcs and Arclists

When np = 8, there are 8 vertices. The arclists that aregenerated are:

(0 1)(2 5)(3 4)(6 7)(0 1)(2 7)(3 4)(5 6)(0 3)(1 2)(4 5)(6 7)(0 1)(2 3)(4 5)(6 7)(0 1)(2 7)(3 6)(4 5)(0 3)(1 2)(4 7)(5 6)(0 7)(1 2)(3 4)(5 6)

(0 5)(1 2)(3 4)(6 7)(0 7)(1 4)(2 3)(5 6)(0 1)(2 3)(4 7)(5 6)(0 5)(1 4)(2 3)(6 7)(0 7)(1 2)(3 6)(4 5)(0 7)(1 6)(2 5)(3 4)(0 7)(1 6)(2 3)(4 5)

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 7 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Tightness Checking

Overview - Tightness Checker

Potentially Tight Overtwisted

x→ x−nq+1 mod np

This maps the dividing curves on the surface from left to rightcutting disk.

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 8 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Bypasses

Brief Overview - Bypasses

An abstract bypass exists when a line can be drawn throughthree arcs on a cutting disk.

Two Abstract Bypasses. Zero Abstract Bypasses.

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 9 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Bypasses

Brief Overview - Bypasses

An abstract bypass exists when a line can be drawn throughthree arcs on a cutting disk.

Two Abstract Bypasses. Zero Abstract Bypasses.

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 9 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Bypasses

Brief Overview - Bypasses

An abstract bypass exists when a line can be drawn throughthree arcs on a cutting disk.

Two Abstract Bypasses. Zero Abstract Bypasses.

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 9 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Tightness Checking

Checking for Tightness(01)(27)(36)(45) (07)(14)(23)(56)

All vertices hook up to a singlecurve.

It takes more than one curveto hook up all the vertices.

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 10 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Bypasses

Abstract Bypasses

(01)(25)(34)(67)

α

β

α

β

(05)(14)(23)(67)

(01)(23)(47)(56)

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 11 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Bypasses

Checking for Actual Bypasses

(05)(14)(23)(67) (01)(23)(47)(56)

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 12 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Tightness Checking

Revisiting Method One (Developed by Dr. Cofer)Recall the mapping rule: x→ x−nq+1 mod np.

Therefore, the formula to check for tightness: β−1AβA.Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 13 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Tightness Checking

Permutation Example

Given: n = 2, p = 4 ,q = 3

The mapping rule tells us x→ x−5 mod 8.

Therefore, β = (03614725)

β−1 = (05274163)

A = (01)(27)(36)(45) A = (07)(14)(23)(56)β−1AβA = (0246) β−1AβA = (0)

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 14 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Tightness Checking

Permutation Example

Given: n = 2, p = 4 ,q = 3

The mapping rule tells us x→ x−5 mod 8.

Therefore, β = (03614725)

β−1 = (05274163)

A = (01)(27)(36)(45) A = (07)(14)(23)(56)β−1AβA = (0246) β−1AβA = (0)

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 14 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Tightness Checking

Permutation Example

Given: n = 2, p = 4 ,q = 3

The mapping rule tells us x→ x−5 mod 8.

Therefore, β = (03614725)

β−1 = (05274163)

A = (01)(27)(36)(45) A = (07)(14)(23)(56)β−1AβA = (0246) β−1AβA = (0)

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 14 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Bypasses

Existence of BypassesThe existence of actual bypasses is checked in a similarfashion as tightness.

Given: An arclist A and an abstract bypass C.

The formula: β−1AβC

A = (01)(25)(34)(67)β = (03614725)

β−1 = (05274163)

C1 = (05)(14)(23)(67) C2 = (01)(23)(47)(56)β−1AβC1 = (0624) β−1AβC2 = (0)

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 15 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Bypasses

Existence of BypassesThe existence of actual bypasses is checked in a similarfashion as tightness.

Given: An arclist A and an abstract bypass C.

The formula: β−1AβC

A = (01)(25)(34)(67)β = (03614725)

β−1 = (05274163)

C1 = (05)(14)(23)(67) C2 = (01)(23)(47)(56)β−1AβC1 = (0624) β−1AβC2 = (0)

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 15 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Bypasses

Existence of BypassesThe existence of actual bypasses is checked in a similarfashion as tightness.

Given: An arclist A and an abstract bypass C.

The formula: β−1AβC

A = (01)(25)(34)(67)β = (03614725)

β−1 = (05274163)

C1 = (05)(14)(23)(67) C2 = (01)(23)(47)(56)β−1AβC1 = (0624) β−1AβC2 = (0)

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 15 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Bypasses

Existence of BypassesThe existence of actual bypasses is checked in a similarfashion as tightness.

Given: An arclist A and an abstract bypass C.

The formula: β−1AβC

A = (01)(25)(34)(67)β = (03614725)

β−1 = (05274163)

C1 = (05)(14)(23)(67) C2 = (01)(23)(47)(56)β−1AβC1 = (0624) β−1AβC2 = (0)

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 15 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Future Research

Future goals include, but not limited to:

I Publication of Findings in Undergraduate Journal

I Extension of Algorithm to the two-holed torus

I Searching for a formula for the case of four dividing curves.

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 16 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Future Research

Future goals include, but not limited to:

I Publication of Findings in Undergraduate Journal

I Extension of Algorithm to the two-holed torus

I Searching for a formula for the case of four dividing curves.

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 16 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Future Research

Future goals include, but not limited to:

I Publication of Findings in Undergraduate Journal

I Extension of Algorithm to the two-holed torus

I Searching for a formula for the case of four dividing curves.

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 16 / 16

Introduction Overview of the Process Method 1: Hand Calculations Method 2: Permutations Results and Conclusions

Future Research

Future goals include, but not limited to:

I Publication of Findings in Undergraduate Journal

I Extension of Algorithm to the two-holed torus

I Searching for a formula for the case of four dividing curves.

Kelly Hirschbeck, Christopher L. Toni

Computational Contact Topology - ILSAMP Symposium 16 / 16

Recommended