computational application of a transfer algorithm to the...

73
Introduction Transfer Algorithm Implementation Examples Conclusions Computational Application of a Transfer Algorithm to the Borromean Rings Merv Fansler Millersville University of Pennsylvania 29 June 2016 Advised by Ron Umble Merv Fansler Transfer Algorithm on BR3

Upload: others

Post on 16-Oct-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Computational Application of a Transfer Algorithmto the Borromean Rings

Merv Fansler

Millersville University of Pennsylvania

29 June 2016

Advised by Ron Umble

Merv Fansler Transfer Algorithm on BR3

Page 2: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Background

started as summer (2015) project proposed by Ron Umble

algorithm to possibly detect linkage in Brunnian links

requires some algebraic topology and probably a lot ofcomputation

Merv Fansler Transfer Algorithm on BR3

Page 3: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Background

started as summer (2015) project proposed by Ron Umble

algorithm to possibly detect linkage in Brunnian links

requires some algebraic topology and probably a lot ofcomputation

Merv Fansler Transfer Algorithm on BR3

Page 4: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Background

started as summer (2015) project proposed by Ron Umble

algorithm to possibly detect linkage in Brunnian links

requires some algebraic topology and probably a lot ofcomputation

Merv Fansler Transfer Algorithm on BR3

Page 5: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

1 Introduction

2 Transfer Algorithm

3 Implementation

4 Examples

5 Conclusions

Merv Fansler Transfer Algorithm on BR3

Page 6: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Table of Contents

1 Introduction

2 Transfer Algorithm

3 Implementation

4 Examples

5 Conclusions

Merv Fansler Transfer Algorithm on BR3

Page 7: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Cellular Decomposition

Let X denote a connected network, surface, solid or unionthereof embedded in R3 or S3

A cellular decomposition of X is a finite collection of

discrete points (vertices or 0-cells)closed intervals (edges or 1-cells)closed disks (faces or 2-cells)closed balls (solids or 3-cells)

glued together so that the

non-empty boundary of a k-cell is a union of (k − 1)-cellsnon-empty intersection of cells is a cellunion of all cells is X

Merv Fansler Transfer Algorithm on BR3

Page 8: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Cellular Decomposition

Let X denote a connected network, surface, solid or unionthereof embedded in R3 or S3

A cellular decomposition of X is a finite collection of

discrete points (vertices or 0-cells)closed intervals (edges or 1-cells)closed disks (faces or 2-cells)closed balls (solids or 3-cells)

glued together so that the

non-empty boundary of a k-cell is a union of (k − 1)-cellsnon-empty intersection of cells is a cellunion of all cells is X

Merv Fansler Transfer Algorithm on BR3

Page 9: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Cellular Decomposition

Let X denote a connected network, surface, solid or unionthereof embedded in R3 or S3

A cellular decomposition of X is a finite collection of

discrete points (vertices or 0-cells)

closed intervals (edges or 1-cells)closed disks (faces or 2-cells)closed balls (solids or 3-cells)

glued together so that the

non-empty boundary of a k-cell is a union of (k − 1)-cellsnon-empty intersection of cells is a cellunion of all cells is X

Merv Fansler Transfer Algorithm on BR3

Page 10: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Cellular Decomposition

Let X denote a connected network, surface, solid or unionthereof embedded in R3 or S3

A cellular decomposition of X is a finite collection of

discrete points (vertices or 0-cells)closed intervals (edges or 1-cells)

closed disks (faces or 2-cells)closed balls (solids or 3-cells)

glued together so that the

non-empty boundary of a k-cell is a union of (k − 1)-cellsnon-empty intersection of cells is a cellunion of all cells is X

Merv Fansler Transfer Algorithm on BR3

Page 11: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Cellular Decomposition

Let X denote a connected network, surface, solid or unionthereof embedded in R3 or S3

A cellular decomposition of X is a finite collection of

discrete points (vertices or 0-cells)closed intervals (edges or 1-cells)closed disks (faces or 2-cells)

closed balls (solids or 3-cells)

glued together so that the

non-empty boundary of a k-cell is a union of (k − 1)-cellsnon-empty intersection of cells is a cellunion of all cells is X

Merv Fansler Transfer Algorithm on BR3

Page 12: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Cellular Decomposition

Let X denote a connected network, surface, solid or unionthereof embedded in R3 or S3

A cellular decomposition of X is a finite collection of

discrete points (vertices or 0-cells)closed intervals (edges or 1-cells)closed disks (faces or 2-cells)closed balls (solids or 3-cells)

glued together so that the

non-empty boundary of a k-cell is a union of (k − 1)-cellsnon-empty intersection of cells is a cellunion of all cells is X

Merv Fansler Transfer Algorithm on BR3

Page 13: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Cellular Decomposition

Let X denote a connected network, surface, solid or unionthereof embedded in R3 or S3

A cellular decomposition of X is a finite collection of

discrete points (vertices or 0-cells)closed intervals (edges or 1-cells)closed disks (faces or 2-cells)closed balls (solids or 3-cells)

glued together so that the

non-empty boundary of a k-cell is a union of (k − 1)-cellsnon-empty intersection of cells is a cellunion of all cells is X

Merv Fansler Transfer Algorithm on BR3

Page 14: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Cellular Decomposition

Let X denote a connected network, surface, solid or unionthereof embedded in R3 or S3

A cellular decomposition of X is a finite collection of

discrete points (vertices or 0-cells)closed intervals (edges or 1-cells)closed disks (faces or 2-cells)closed balls (solids or 3-cells)

glued together so that the

non-empty boundary of a k-cell is a union of (k − 1)-cells

non-empty intersection of cells is a cellunion of all cells is X

Merv Fansler Transfer Algorithm on BR3

Page 15: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Cellular Decomposition

Let X denote a connected network, surface, solid or unionthereof embedded in R3 or S3

A cellular decomposition of X is a finite collection of

discrete points (vertices or 0-cells)closed intervals (edges or 1-cells)closed disks (faces or 2-cells)closed balls (solids or 3-cells)

glued together so that the

non-empty boundary of a k-cell is a union of (k − 1)-cellsnon-empty intersection of cells is a cell

union of all cells is X

Merv Fansler Transfer Algorithm on BR3

Page 16: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Cellular Decomposition

Let X denote a connected network, surface, solid or unionthereof embedded in R3 or S3

A cellular decomposition of X is a finite collection of

discrete points (vertices or 0-cells)closed intervals (edges or 1-cells)closed disks (faces or 2-cells)closed balls (solids or 3-cells)

glued together so that the

non-empty boundary of a k-cell is a union of (k − 1)-cellsnon-empty intersection of cells is a cellunion of all cells is X

Merv Fansler Transfer Algorithm on BR3

Page 17: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Chain Complex

A chain complex is

a vector space C (X ) with basis {cells of X}, and

a boundary operator ∂ : C (X )→ C (X ) that is

zero on verticeslinear on chainsa derivation of Cartesian product

Merv Fansler Transfer Algorithm on BR3

Page 18: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Chain Complex

A chain complex is

a vector space C (X ) with basis {cells of X}, and

a boundary operator ∂ : C (X )→ C (X ) that is

zero on verticeslinear on chainsa derivation of Cartesian product

Merv Fansler Transfer Algorithm on BR3

Page 19: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Chain Complex

A chain complex is

a vector space C (X ) with basis {cells of X}, and

a boundary operator ∂ : C (X )→ C (X ) that is

zero on vertices

linear on chainsa derivation of Cartesian product

Merv Fansler Transfer Algorithm on BR3

Page 20: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Chain Complex

A chain complex is

a vector space C (X ) with basis {cells of X}, and

a boundary operator ∂ : C (X )→ C (X ) that is

zero on verticeslinear on chains

a derivation of Cartesian product

Merv Fansler Transfer Algorithm on BR3

Page 21: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Chain Complex

A chain complex is

a vector space C (X ) with basis {cells of X}, and

a boundary operator ∂ : C (X )→ C (X ) that is

zero on verticeslinear on chainsa derivation of Cartesian product

Merv Fansler Transfer Algorithm on BR3

Page 22: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Homology

H∗(C ) = ker∂/Im∂

Elements of H∗(C ) are cosets [c] = c + Im∂

equivalence classes of nonbounding cycles that differ only by aboundary

Note: Homology alone does not detect linkage!

Merv Fansler Transfer Algorithm on BR3

Page 23: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Homology

H∗(C ) = ker∂/Im∂

Elements of H∗(C ) are cosets [c] = c + Im∂

equivalence classes of nonbounding cycles that differ only by aboundary

Note: Homology alone does not detect linkage!

Merv Fansler Transfer Algorithm on BR3

Page 24: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Homology

H∗(C ) = ker∂/Im∂

Elements of H∗(C ) are cosets [c] = c + Im∂

equivalence classes of nonbounding cycles that differ only by aboundary

Note: Homology alone does not detect linkage!

Merv Fansler Transfer Algorithm on BR3

Page 25: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Homology

H∗(C ) = ker∂/Im∂

Elements of H∗(C ) are cosets [c] = c + Im∂

equivalence classes of nonbounding cycles that differ only by aboundary

Note: Homology alone does not detect linkage!

Merv Fansler Transfer Algorithm on BR3

Page 26: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Diagonal Approximation

A map ∆ : X → X × X is a diagonal approximation if

1 ∆ is homotopic to ∆G

2 ∆(c) is a subcomplex of c × c

3 ∂ is a coderivation of ∆, i.e., ∆∂ = (∂ × Id + Id× ∂)∆

Merv Fansler Transfer Algorithm on BR3

Page 27: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Diagonal Approximation

A map ∆ : X → X × X is a diagonal approximation if

1 ∆ is homotopic to ∆G

2 ∆(c) is a subcomplex of c × c

3 ∂ is a coderivation of ∆, i.e., ∆∂ = (∂ × Id + Id× ∂)∆

Merv Fansler Transfer Algorithm on BR3

Page 28: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Diagonal Approximation

A map ∆ : X → X × X is a diagonal approximation if

1 ∆ is homotopic to ∆G

2 ∆(c) is a subcomplex of c × c

3 ∂ is a coderivation of ∆, i.e., ∆∂ = (∂ × Id + Id× ∂)∆

Merv Fansler Transfer Algorithm on BR3

Page 29: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Coproduct Notation

Some notation:

We will denote the diagonal approximation on chains by ∆2

Higher coproducts on chains will be denoted by subscripts,e.g., ∆3,∆4, . . .

Coproducts transferred to homology will be denoted bysuperscripts, e.g., ∆2,∆3, . . .

Merv Fansler Transfer Algorithm on BR3

Page 30: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Coproduct Notation

Some notation:

We will denote the diagonal approximation on chains by ∆2

Higher coproducts on chains will be denoted by subscripts,e.g., ∆3,∆4, . . .

Coproducts transferred to homology will be denoted bysuperscripts, e.g., ∆2,∆3, . . .

Merv Fansler Transfer Algorithm on BR3

Page 31: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Coproduct Notation

Some notation:

We will denote the diagonal approximation on chains by ∆2

Higher coproducts on chains will be denoted by subscripts,e.g., ∆3,∆4, . . .

Coproducts transferred to homology will be denoted bysuperscripts, e.g., ∆2,∆3, . . .

Merv Fansler Transfer Algorithm on BR3

Page 32: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Brunnian Links

A Brunnian link is a nontrivial link such that the removal ofany component results in an unlink.

Example: Borromean rings (3-component Brunnian link)

We will denote the link complement in S3 of an n-componentBrunnian link by BRn, n ≥ 3.

Merv Fansler Transfer Algorithm on BR3

Page 33: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Brunnian Links

A Brunnian link is a nontrivial link such that the removal ofany component results in an unlink.

Example: Borromean rings (3-component Brunnian link)

We will denote the link complement in S3 of an n-componentBrunnian link by BRn, n ≥ 3.

Merv Fansler Transfer Algorithm on BR3

Page 34: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Brunnian Links

A Brunnian link is a nontrivial link such that the removal ofany component results in an unlink.

Example: Borromean rings (3-component Brunnian link)

We will denote the link complement in S3 of an n-componentBrunnian link by BRn, n ≥ 3.

Merv Fansler Transfer Algorithm on BR3

Page 35: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Conjecture

Conjecture

A diagonal approximation ∆2 on C (BRn) induces

a primitive diagonal ∆2 : H(BRn)⊗ H(BRn),

trivial k-ary operations ∆k : H(BRn)⊗k for 3 ≤ k < n, and

a non-trivial n-ary operation ∆n : H(BR)→ H(BR)⊗n.

Merv Fansler Transfer Algorithm on BR3

Page 36: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Predictions

Hence, for the Borromean rings we are expected to find:

a primitive ∆2

a non-trivial ∆3

These coproducts will be induced through the Transfer Algorithm.

Merv Fansler Transfer Algorithm on BR3

Page 37: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Table of Contents

1 Introduction

2 Transfer Algorithm

3 Implementation

4 Examples

5 Conclusions

Merv Fansler Transfer Algorithm on BR3

Page 38: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Transferring Coproducts

Goal:

A∞-coalgebra on chains(C , ∂,∆2,∆3, ...)

↓(H, 0,∆2,∆3, ...)

A∞-coalgebra in homology

Merv Fansler Transfer Algorithm on BR3

Page 39: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Transferring Coproducts

Required input:

Coalgebra on chains (C , ∂,∆2,∆3, ...) and

a cycle-selecting map g : H → Z (C ), where Z (C ) denotes thesubspace of cycles in C .

Note: In practice we only required ∆2 at the outset and computedthe rest as needed.

Merv Fansler Transfer Algorithm on BR3

Page 40: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

How Does It Work?

Strategy: Construct a chain map from the top dimension andcodim-1 cells of the (n − 1)-dimensional multiplihedron, denotedJn, to maps between H and C⊗n.

Merv Fansler Transfer Algorithm on BR3

Page 41: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Beginning Steps

Jn is a polytope that captures the combinatiorial structure ofmapping between two A∞-coalgebras.

Consider J1 and J2.

Merv Fansler Transfer Algorithm on BR3

Page 42: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Beginning Steps

Jn is a polytope that captures the combinatiorial structure ofmapping between two A∞-coalgebras.

Consider J1 and J2.

Merv Fansler Transfer Algorithm on BR3

Page 43: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Extending to J3

7→

g⊗3(∆2 ⊗ 1

)∆2 g⊗3

(1⊗∆2

)∆2

(g2 ⊗ g

)∆2

(g ⊗ g2

)∆2

(∆2g ⊗ g) ∆2 (g ⊗∆2g) ∆2

(∆2 ⊗ 1) g2 (1⊗∆2) g2

(∆2 ⊗ 1) ∆2g ∆3g (1⊗∆2) ∆2g

Merv Fansler Transfer Algorithm on BR3

Page 44: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Table of Contents

1 Introduction

2 Transfer Algorithm

3 Implementation

4 Examples

5 Conclusions

Merv Fansler Transfer Algorithm on BR3

Page 45: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Linear Algebraic Methods

Good News

Linear algebra provides robustand theoretically correct methodsfor solving the various inductionsteps of the transfer algorithm.

Merv Fansler Transfer Algorithm on BR3

Page 46: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Linear Algebraic Methods

Good News

Linear algebra provides robustand theoretically correct methodsfor solving the various inductionsteps of the transfer algorithm.

Bad News

The matrices are too large to besolved within a reasonableamount of storage space andtime.

Merv Fansler Transfer Algorithm on BR3

Page 47: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Two Problems

Problem (Preboundary)

Given a cycle x ∈ C⊗n of degree k , find a chain y ∈ C⊗n of degreek + 1, such that ∂(y) = x .

Problem (Factorization)

Given a cycle c ∈ Z (C⊗n), find all subcycles of c of the formZ (C )⊗n.

Merv Fansler Transfer Algorithm on BR3

Page 48: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Preboundary Problem: ∆3

First problem arose in computing ∆3

It is the preboundary of (∆2 ⊗ 1 + 1⊗∆2)∆2

Brute force linear algebra approach entails 1.8 mil row × 4 milcolumn matrix

Instead, solved with a best-first search algorithm

Merv Fansler Transfer Algorithm on BR3

Page 49: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Preboundary Problem: ∆3

First problem arose in computing ∆3

It is the preboundary of (∆2 ⊗ 1 + 1⊗∆2)∆2

Brute force linear algebra approach entails 1.8 mil row × 4 milcolumn matrix

Instead, solved with a best-first search algorithm

Merv Fansler Transfer Algorithm on BR3

Page 50: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Preboundary Problem: ∆3

First problem arose in computing ∆3

It is the preboundary of (∆2 ⊗ 1 + 1⊗∆2)∆2

Brute force linear algebra approach entails 1.8 mil row × 4 milcolumn matrix

Instead, solved with a best-first search algorithm

Merv Fansler Transfer Algorithm on BR3

Page 51: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Preboundary Problem: ∆3

First problem arose in computing ∆3

It is the preboundary of (∆2 ⊗ 1 + 1⊗∆2)∆2

Brute force linear algebra approach entails 1.8 mil row × 4 milcolumn matrix

Instead, solved with a best-first search algorithm

Merv Fansler Transfer Algorithm on BR3

Page 52: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Factorization Problem

Second problem comes from deriving ∆n

Transfer Algorithm specifies computing [φn], i.e.,H∗(Hom(H,Z (C⊗(n+2))))

However, Kunneth Theorem tells us that H∗(C⊗n) ∼= H∗(C )⊗n

Hence, non-boundary cycles in φn in should be of the formZ (C )⊗(n+2)

Again, an algorithmic approach appears to be a feasiblealternative

Merv Fansler Transfer Algorithm on BR3

Page 53: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Factorization Problem

Second problem comes from deriving ∆n

Transfer Algorithm specifies computing [φn], i.e.,H∗(Hom(H,Z (C⊗(n+2))))

However, Kunneth Theorem tells us that H∗(C⊗n) ∼= H∗(C )⊗n

Hence, non-boundary cycles in φn in should be of the formZ (C )⊗(n+2)

Again, an algorithmic approach appears to be a feasiblealternative

Merv Fansler Transfer Algorithm on BR3

Page 54: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Factorization Problem

Second problem comes from deriving ∆n

Transfer Algorithm specifies computing [φn], i.e.,H∗(Hom(H,Z (C⊗(n+2))))

However, Kunneth Theorem tells us that H∗(C⊗n) ∼= H∗(C )⊗n

Hence, non-boundary cycles in φn in should be of the formZ (C )⊗(n+2)

Again, an algorithmic approach appears to be a feasiblealternative

Merv Fansler Transfer Algorithm on BR3

Page 55: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Factorization Problem

Second problem comes from deriving ∆n

Transfer Algorithm specifies computing [φn], i.e.,H∗(Hom(H,Z (C⊗(n+2))))

However, Kunneth Theorem tells us that H∗(C⊗n) ∼= H∗(C )⊗n

Hence, non-boundary cycles in φn in should be of the formZ (C )⊗(n+2)

Again, an algorithmic approach appears to be a feasiblealternative

Merv Fansler Transfer Algorithm on BR3

Page 56: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Factorization Problem

Second problem comes from deriving ∆n

Transfer Algorithm specifies computing [φn], i.e.,H∗(Hom(H,Z (C⊗(n+2))))

However, Kunneth Theorem tells us that H∗(C⊗n) ∼= H∗(C )⊗n

Hence, non-boundary cycles in φn in should be of the formZ (C )⊗(n+2)

Again, an algorithmic approach appears to be a feasiblealternative

Merv Fansler Transfer Algorithm on BR3

Page 57: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Table of Contents

1 Introduction

2 Transfer Algorithm

3 Implementation

4 Examples

5 Conclusions

Merv Fansler Transfer Algorithm on BR3

Page 58: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Unlink vs. Hopf Link

v

a b

t1

t2

2-Component Unlink

v

at1

v

t2

v

b

Hopf Link

Merv Fansler Transfer Algorithm on BR3

Page 59: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

2-Component Unlink

v

a b

t1

t2

Merv Fansler Transfer Algorithm on BR3

Page 60: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Hopf Link

v

at1

v

t2

v

b

Merv Fansler Transfer Algorithm on BR3

Page 61: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Table of Contents

1 Introduction

2 Transfer Algorithm

3 Implementation

4 Examples

5 Conclusions

Merv Fansler Transfer Algorithm on BR3

Page 62: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Results

Transfer algorithm yields

a primitive ∆2 for unlink

a non-primitive ∆2 for the Hopf

for the Borromean rings

a primitive ∆2

a non-trivial ∆3

all of which are consistent with the conjecture!

Merv Fansler Transfer Algorithm on BR3

Page 63: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Results

Transfer algorithm yields

a primitive ∆2 for unlink

a non-primitive ∆2 for the Hopf

for the Borromean rings

a primitive ∆2

a non-trivial ∆3

all of which are consistent with the conjecture!

Merv Fansler Transfer Algorithm on BR3

Page 64: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Results

Transfer algorithm yields

a primitive ∆2 for unlink

a non-primitive ∆2 for the Hopf

for the Borromean rings

a primitive ∆2

a non-trivial ∆3

all of which are consistent with the conjecture!

Merv Fansler Transfer Algorithm on BR3

Page 65: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Results

Transfer algorithm yields

a primitive ∆2 for unlink

a non-primitive ∆2 for the Hopf

for the Borromean rings

a primitive ∆2

a non-trivial ∆3

all of which are consistent with the conjecture!

Merv Fansler Transfer Algorithm on BR3

Page 66: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Results

Transfer algorithm yields

a primitive ∆2 for unlink

a non-primitive ∆2 for the Hopf

for the Borromean rings

a primitive ∆2

a non-trivial ∆3

all of which are consistent with the conjecture!

Merv Fansler Transfer Algorithm on BR3

Page 67: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Results

Transfer algorithm yields

a primitive ∆2 for unlink

a non-primitive ∆2 for the Hopf

for the Borromean rings

a primitive ∆2

a non-trivial ∆3

all of which are consistent with the conjecture!

Merv Fansler Transfer Algorithm on BR3

Page 68: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Future Work

φ2 was non-trivial in BR3, so either ∆4 or g4 is non-trivial (orboth)

the 4-component Brunnian link is a natural next step, BUT...

∆3 appears significantly harder to computethe last steps of BR3 were actually done by hand, and BR4 willonly be worse

both the preboundary and factorization algorithms needimprovement

Merv Fansler Transfer Algorithm on BR3

Page 69: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Future Work

φ2 was non-trivial in BR3, so either ∆4 or g4 is non-trivial (orboth)

the 4-component Brunnian link is a natural next step, BUT...

∆3 appears significantly harder to computethe last steps of BR3 were actually done by hand, and BR4 willonly be worse

both the preboundary and factorization algorithms needimprovement

Merv Fansler Transfer Algorithm on BR3

Page 70: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Future Work

φ2 was non-trivial in BR3, so either ∆4 or g4 is non-trivial (orboth)

the 4-component Brunnian link is a natural next step, BUT...

∆3 appears significantly harder to compute

the last steps of BR3 were actually done by hand, and BR4 willonly be worse

both the preboundary and factorization algorithms needimprovement

Merv Fansler Transfer Algorithm on BR3

Page 71: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Future Work

φ2 was non-trivial in BR3, so either ∆4 or g4 is non-trivial (orboth)

the 4-component Brunnian link is a natural next step, BUT...

∆3 appears significantly harder to computethe last steps of BR3 were actually done by hand, and BR4 willonly be worse

both the preboundary and factorization algorithms needimprovement

Merv Fansler Transfer Algorithm on BR3

Page 72: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Future Work

φ2 was non-trivial in BR3, so either ∆4 or g4 is non-trivial (orboth)

the 4-component Brunnian link is a natural next step, BUT...

∆3 appears significantly harder to computethe last steps of BR3 were actually done by hand, and BR4 willonly be worse

both the preboundary and factorization algorithms needimprovement

Merv Fansler Transfer Algorithm on BR3

Page 73: Computational Application of a Transfer Algorithm to the ...sites.millersville.edu/rumble/StudentProjects/Fansler/defensebeam.pdf · Examples Conclusions Cellular Decomposition Let

IntroductionTransfer Algorithm

ImplementationExamples

Conclusions

Thank You

Thank You!

Merv Fansler Transfer Algorithm on BR3