SlideShare a Scribd company logo
1 of 75
Download to read offline
Introduction
                         Arcs and Arclists
                      Tightness Checking
                                 Bypasses
               Final Results and Thoughts




Improving on an Existing Program That Checks
 for Tight Contact Structures on the Solid Torus
Northeastern Illinois University SCSE Research Symposium


  Christopher L. Toni Kelly Hirschbeck Nathan Walter
    William Krepelin Donald Barkley William Byrd
  John Wallin Mayra Bravo-Gonzalez Banlieman Kolani
                     Dr. Tanya Cofer



                               October 2, 2009

        Christopher L. Toni, Donald Barkley   Computational Contact Topology   1 / 20
Introduction
                              Arcs and Arclists
                           Tightness Checking
                                      Bypasses
                    Final Results and Thoughts


Outline


  1   Introduction

  2   Arcs and Arclists

  3   Tightness Checking

  4   Bypasses

  5   Final Results and Thoughts



             Christopher L. Toni, Donald Barkley   Computational Contact Topology   2 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


What is Topology?


  Topology is a field of mathematics that does not focus on an
  object’s shape, but the properties that remain consistent
  through deformations like:




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   3 / 20
Introduction
                              Arcs and Arclists
                           Tightness Checking
                                      Bypasses
                    Final Results and Thoughts


What is Topology?


  Topology is a field of mathematics that does not focus on an
  object’s shape, but the properties that remain consistent
  through deformations like:

   1   twisting




             Christopher L. Toni, Donald Barkley   Computational Contact Topology   3 / 20
Introduction
                              Arcs and Arclists
                           Tightness Checking
                                      Bypasses
                    Final Results and Thoughts


What is Topology?


  Topology is a field of mathematics that does not focus on an
  object’s shape, but the properties that remain consistent
  through deformations like:

   1   twisting
   2   bending




             Christopher L. Toni, Donald Barkley   Computational Contact Topology   3 / 20
Introduction
                              Arcs and Arclists
                           Tightness Checking
                                      Bypasses
                    Final Results and Thoughts


What is Topology?


  Topology is a field of mathematics that does not focus on an
  object’s shape, but the properties that remain consistent
  through deformations like:

   1   twisting
   2   bending
   3   stretching




             Christopher L. Toni, Donald Barkley   Computational Contact Topology   3 / 20
Introduction
                              Arcs and Arclists
                           Tightness Checking
                                      Bypasses
                    Final Results and Thoughts


What is Topology?


  Topology is a field of mathematics that does not focus on an
  object’s shape, but the properties that remain consistent
  through deformations like:

   1   twisting
   2   bending
   3   stretching
  To illustrate this, visualize a coffee cup and a doughnut (torus).



             Christopher L. Toni, Donald Barkley   Computational Contact Topology   3 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


What is Topology? (cont.)




  The torus and the coffee cup are topologically equivalent
  objects. We see above that through bending and stretching, the
  torus can be morphed into a coffee cup and vice versa.
            Christopher L. Toni, Donald Barkley   Computational Contact Topology   4 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Formulating the Problem
  On the solid torus (defined by 1     2 ), dividing curves are

  located where twisting planes switch from positive to negative.




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   5 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Formulating the Problem
  On the solid torus (defined by 1     2 ), dividing curves are

  located where twisting planes switch from positive to negative.




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   5 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Formulating the Problem
  On the solid torus (defined by 1     2 ), dividing curves are

  located where twisting planes switch from positive to negative.




  These dividing curves keep track of and allow for investigation
  of certain topological properties in the neighborhood of a
  surface.
            Christopher L. Toni, Donald Barkley   Computational Contact Topology   5 / 20
Introduction
                           Arcs and Arclists
                        Tightness Checking
                                   Bypasses
                 Final Results and Thoughts


Formulating the Problem (cont.)




          Christopher L. Toni, Donald Barkley   Computational Contact Topology   6 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Formulating the Problem (cont.)




  We define n to be the number of dividing curves, p to be the
  number of times the dividing curves are wrapped about the
  longitudinal section of the torus, and q to be the number of
  times the dividing curves are wrapped about the meridinal
  section of the torus.
            Christopher L. Toni, Donald Barkley   Computational Contact Topology   6 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Overview
  The first computational task is to generate arclists for a given
  number of vertices M, where M np.




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   7 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Overview
  The first computational task is to generate arclists for a given
  number of vertices M, where M np.

  Definition
  An arc is a path between vertices subject to:




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   7 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Overview
  The first computational task is to generate arclists for a given
  number of vertices M, where M np.

  Definition
  An arc is a path between vertices subject to:
   1   All M vertices in a configuration must be paired




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   7 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Overview
  The first computational task is to generate arclists for a given
  number of vertices M, where M np.

  Definition
  An arc is a path between vertices subject to:
   1   All M vertices in a configuration must be paired
   2   Paths cannot cross




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   7 / 20
Introduction
                              Arcs and Arclists
                           Tightness Checking
                                      Bypasses
                    Final Results and Thoughts


Overview
  The first computational task is to generate arclists for a given
  number of vertices M, where M np.

  Definition
  An arc is a path between vertices subject to:
    1   All M vertices in a configuration must be paired
    2   Paths cannot cross

  An arclist is a set (list) of legal pairs of arcs.




             Christopher L. Toni, Donald Barkley   Computational Contact Topology   7 / 20
Introduction
                              Arcs and Arclists
                           Tightness Checking
                                      Bypasses
                    Final Results and Thoughts


Overview
  The first computational task is to generate arclists for a given
  number of vertices M, where M np.

  Definition
  An arc is a path between vertices subject to:
    1   All M vertices in a configuration must be paired
    2   Paths cannot cross

  An arclist is a set (list) of legal pairs of arcs.

  We can think of arclists for M vertices as certain permutations
  of M objects.


             Christopher L. Toni, Donald Barkley   Computational Contact Topology   7 / 20
Introduction
                              Arcs and Arclists
                           Tightness Checking
                                      Bypasses
                    Final Results and Thoughts


Overview
  The first computational task is to generate arclists for a given
  number of vertices M, where M np.

  Definition
  An arc is a path between vertices subject to:
    1   All M vertices in a configuration must be paired
    2   Paths cannot cross

  An arclist is a set (list) of legal pairs of arcs.

  We can think of arclists for M vertices as certain permutations
  of M objects.The solution is to “walk” a new element through
  the solution set for a smaller problem.

             Christopher L. Toni, Donald Barkley   Computational Contact Topology   7 / 20
Introduction
                              Arcs and Arclists
                           Tightness Checking
                                      Bypasses
                    Final Results and Thoughts


Overview
  The first computational task is to generate arclists for a given
  number of vertices M, where M np.

  Definition
  An arc is a path between vertices subject to:
    1   All M vertices in a configuration must be paired
    2   Paths cannot cross

  An arclist is a set (list) of legal pairs of arcs.

  We can think of arclists for M vertices as certain permutations
  of M objects.The solution is to “walk” a new element through
  the solution set for a smaller problem. There is one challenge:
  the algorithm is space and time intensive!
             Christopher L. Toni, Donald Barkley   Computational Contact Topology   7 / 20
Introduction
                           Arcs and Arclists
                        Tightness Checking
                                   Bypasses
                 Final Results and Thoughts


Algorithm - Arcs and Arclist




          Christopher L. Toni, Donald Barkley   Computational Contact Topology   8 / 20
Introduction
                           Arcs and Arclists
                        Tightness Checking
                                   Bypasses
                 Final Results and Thoughts


Algorithm - Arcs and Arclist




          Christopher L. Toni, Donald Barkley   Computational Contact Topology   8 / 20
Introduction
                            Arcs and Arclists
                         Tightness Checking
                                    Bypasses
                  Final Results and Thoughts


Algorithm Output - Arcs and Arclists
  For the case of n 2, p               4, q      3, we have
  M np       2 4    8.




           Christopher L. Toni, Donald Barkley   Computational Contact Topology   9 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Algorithm Output - Arcs and Arclists
  For the case of n 2, p                4, q      3, we have
  M np       2 4    8.
  The arclists for M         8 vertices are:




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   9 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Algorithm Output - Arcs and Arclists
  For the case of n 2, p                4, q      3, we have
  M np       2 4    8.
  The arclists for M         8 vertices are:
        (0 1)(2 5)(3 4)(6 7)
        (0 1)(2 7)(3 4)(5 6)
        (0 3)(1 2)(4 5)(6 7)
        (0 1)(2 3)(4 5)(6 7)
        (0 1)(2 7)(3 6)(4 5)
        (0 3)(1 2)(4 7)(5 6)
        (0 7)(1 2)(3 4)(5 6)


            Christopher L. Toni, Donald Barkley   Computational Contact Topology   9 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Algorithm Output - Arcs and Arclists
  For the case of n 2, p                4, q      3, we have
  M np       2 4    8.
  The arclists for M         8 vertices are:
        (0 1)(2 5)(3 4)(6 7)                              (0 5)(1 2)(3 4)(6 7)
        (0 1)(2 7)(3 4)(5 6)                              (0 7)(1 4)(2 3)(5 6)
        (0 3)(1 2)(4 5)(6 7)                              (0 1)(2 3)(4 7)(5 6)
        (0 1)(2 3)(4 5)(6 7)                              (0 5)(1 4)(2 3)(6 7)
        (0 1)(2 7)(3 6)(4 5)                              (0 7)(1 2)(3 6)(4 5)
        (0 3)(1 2)(4 7)(5 6)                              (0 7)(1 6)(2 5)(3 4)
        (0 7)(1 2)(3 4)(5 6)                              (0 7)(1 6)(2 3)(4 5)


            Christopher L. Toni, Donald Barkley   Computational Contact Topology   9 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Algorithm Output - Arcs and Arclists
  For the case of n 2, p                4, q      3, we have
  M np       2 4    8.
  The arclists for M         8 vertices are:
        (0 1)(2 5)(3 4)(6 7)                              (0 5)(1 2)(3 4)(6 7)
        (0 1)(2 7)(3 4)(5 6)                              (0 7)(1 4)(2 3)(5 6)
        (0 3)(1 2)(4 5)(6 7)                              (0 1)(2 3)(4 7)(5 6)
        (0 1)(2 3)(4 5)(6 7)                              (0 5)(1 4)(2 3)(6 7)
        (0 1)(2 7)(3 6)(4 5)                              (0 7)(1 2)(3 6)(4 5)
        (0 3)(1 2)(4 7)(5 6)                              (0 7)(1 6)(2 5)(3 4)
        (0 7)(1 2)(3 4)(5 6)                              (0 7)(1 6)(2 3)(4 5)
  Data files for required values of M were produced and saved.
  These files were then used as input to the Tightness Checking
            Christopher L. Toni, Donald Barkley   Computational Contact Topology   9 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Overview - Tightness Checker

  Once the arclists are found, it is possible to determine how the
  vertices on the left and right cutting disks match up.




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   10 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Overview - Tightness Checker

  Once the arclists are found, it is possible to determine how the
  vertices on the left and right cutting disks match up.

  The formula x       x nq 1 mod np maps the vertices on the
  left cutting disk to the right cutting disk.




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   10 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Overview - Tightness Checker

  Once the arclists are found, it is possible to determine how the
  vertices on the left and right cutting disks match up.

  The formula x       x nq 1 mod np maps the vertices on the
  left cutting disk to the right cutting disk.

  The formula x      x nq 1 mod np maps the vertices on the
  right cutting disk to the left cutting disk.




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   10 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Overview - Tightness Checker

  Once the arclists are found, it is possible to determine how the
  vertices on the left and right cutting disks match up.

  The formula x       x nq 1 mod np maps the vertices on the
  left cutting disk to the right cutting disk.

  The formula x      x nq 1 mod np maps the vertices on the
  right cutting disk to the left cutting disk.

  To determine if the torus admits a tight or overtwisted contact
  structure, the dividing curves and arcs need to be analyzed.


            Christopher L. Toni, Donald Barkley   Computational Contact Topology   10 / 20
Introduction
                           Arcs and Arclists
                        Tightness Checking
                                   Bypasses
                 Final Results and Thoughts


Overview - Tightness Checker (cont.)




          Christopher L. Toni, Donald Barkley   Computational Contact Topology   11 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Overview - Tightness Checker (cont.)




  If a single closed curve can be
  traced on the torus, it is
  considered to be a potentially
  tight contact structure.

            Christopher L. Toni, Donald Barkley   Computational Contact Topology   11 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Overview - Tightness Checker (cont.)




  If a single closed curve can be                 If more than one closed curve
  traced on the torus, it is                      can be traced on the torus, it
  considered to be a potentially                  is considered to be an
  tight contact structure.                        overtwisted structure.

            Christopher L. Toni, Donald Barkley   Computational Contact Topology   11 / 20
Introduction
                          Arcs and Arclists
                       Tightness Checking
                                  Bypasses
                Final Results and Thoughts


Algorithm - Tightness Checker




         Christopher L. Toni, Donald Barkley   Computational Contact Topology   12 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Algorithm - Tightness Checker




  All vertices hook up to a single
   curve. Thus, the structure is
           potentially tight.

            Christopher L. Toni, Donald Barkley   Computational Contact Topology   12 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Algorithm - Tightness Checker




  All vertices hook up to a single                Only a few vertices hook up to
   curve. Thus, the structure is                  a curve. Thus, the structure is
           potentially tight.                              overtwisted.

            Christopher L. Toni, Donald Barkley   Computational Contact Topology    12 / 20
Introduction
                            Arcs and Arclists
                         Tightness Checking
                                    Bypasses
                  Final Results and Thoughts


Algorithm Output - Tightness Checker
  Consider M      np       8.




           Christopher L. Toni, Donald Barkley   Computational Contact Topology   13 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Algorithm Output - Tightness Checker
  Consider M np 8. Given the arclist (0 1)(2 7)(3 6)(4 5) ,
  the left cutting disk hooks up with the right cutting disk as
  follows:




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   13 / 20
Introduction
                               Arcs and Arclists
                            Tightness Checking
                                       Bypasses
                     Final Results and Thoughts


Algorithm Output - Tightness Checker
  Consider M np 8. Given the arclist (0 1)(2 7)(3 6)(4 5) ,
  the left cutting disk hooks up with the right cutting disk as
  follows:

      0   0      5 mod 8               3                   4      4     5     mod 8   7
      1   1      5 mod 8               4                   5      5     5     mod 8   0
      2   2      5 mod 8               5                   6      6     5     mod 8   1
      3   3      5 mod 8               6                   7      7     5     mod 8   2




              Christopher L. Toni, Donald Barkley   Computational Contact Topology        13 / 20
Introduction
                               Arcs and Arclists
                            Tightness Checking
                                       Bypasses
                     Final Results and Thoughts


Algorithm Output - Tightness Checker
  Consider M np 8. Given the arclist (0 1)(2 7)(3 6)(4 5) ,
  the left cutting disk hooks up with the right cutting disk as
  follows:

      0   0      5 mod 8               3                   4      4     5     mod 8   7
      1   1      5 mod 8               4                   5      5     5     mod 8   0
      2   2      5 mod 8               5                   6      6     5     mod 8   1
      3 3 5 mod 8 6                      7 7 5 mod 8 2
  Using the arclist as a guide, the output be a list of numbers




              Christopher L. Toni, Donald Barkley   Computational Contact Topology        13 / 20
Introduction
                               Arcs and Arclists
                            Tightness Checking
                                       Bypasses
                     Final Results and Thoughts


Algorithm Output - Tightness Checker
  Consider M np 8. Given the arclist (0 1)(2 7)(3 6)(4 5) ,
  the left cutting disk hooks up with the right cutting disk as
  follows:

      0   0      5 mod 8               3                   4      4     5     mod 8   7
      1   1      5 mod 8               4                   5      5     5     mod 8   0
      2   2      5 mod 8               5                   6      6     5     mod 8   1
      3 3 5 mod 8 6                      7 7 5 mod 8 2
  Using the arclist as a guide, the output be a list of numbers

                 03636105472725410



              Christopher L. Toni, Donald Barkley   Computational Contact Topology        13 / 20
Introduction
                                Arcs and Arclists
                             Tightness Checking
                                        Bypasses
                      Final Results and Thoughts


Algorithm Output - Tightness Checker
  Consider M np 8. Given the arclist (0 1)(2 7)(3 6)(4 5) ,
  the left cutting disk hooks up with the right cutting disk as
  follows:

      0    0      5 mod 8               3                   4      4     5     mod 8   7
      1    1      5 mod 8               4                   5      5     5     mod 8   0
      2    2      5 mod 8               5                   6      6     5     mod 8   1
      3 3 5 mod 8 6                      7 7 5 mod 8 2
  Using the arclist as a guide, the output be a list of numbers

                  03636105472725410

          0 36         36        10         54       72     72       54        10

               Christopher L. Toni, Donald Barkley   Computational Contact Topology        13 / 20
Introduction
                            Arcs and Arclists
                         Tightness Checking
                                    Bypasses
                  Final Results and Thoughts


Algorithm Output - Tightness Checker (cont.)
  Consider M      np       8.




           Christopher L. Toni, Donald Barkley   Computational Contact Topology   14 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Algorithm Output - Tightness Checker (cont.)
  Consider M np 8. Given the arclist (0 7)(1 4)(2 3)(5 6) ,
  the left cutting disk hooks up with the right cutting disk as
  follows:




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   14 / 20
Introduction
                               Arcs and Arclists
                            Tightness Checking
                                       Bypasses
                     Final Results and Thoughts


Algorithm Output - Tightness Checker (cont.)
  Consider M np 8. Given the arclist (0 7)(1 4)(2 3)(5 6) ,
  the left cutting disk hooks up with the right cutting disk as
  follows:

      0   0      5 mod 8               3                   4      4     5     mod 8   7
      1   1      5 mod 8               4                   5      5     5     mod 8   0
      2   2      5 mod 8               5                   6      6     5     mod 8   1
      3   3      5 mod 8               6                   7      7     5     mod 8   2




              Christopher L. Toni, Donald Barkley   Computational Contact Topology        14 / 20
Introduction
                               Arcs and Arclists
                            Tightness Checking
                                       Bypasses
                     Final Results and Thoughts


Algorithm Output - Tightness Checker (cont.)
  Consider M np 8. Given the arclist (0 7)(1 4)(2 3)(5 6) ,
  the left cutting disk hooks up with the right cutting disk as
  follows:

      0   0      5 mod 8               3                   4      4     5     mod 8   7
      1   1      5 mod 8               4                   5      5     5     mod 8   0
      2   2      5 mod 8               5                   6      6     5     mod 8   1
      3   3      5 mod 8               6                   7      7     5     mod 8   2
  Using the arclist as a guide, the output be a list of numbers




              Christopher L. Toni, Donald Barkley   Computational Contact Topology        14 / 20
Introduction
                               Arcs and Arclists
                            Tightness Checking
                                       Bypasses
                     Final Results and Thoughts


Algorithm Output - Tightness Checker (cont.)
  Consider M np 8. Given the arclist (0 7)(1 4)(2 3)(5 6) ,
  the left cutting disk hooks up with the right cutting disk as
  follows:

      0   0      5 mod 8               3                   4      4     5     mod 8   7
      1   1      5 mod 8               4                   5      5     5     mod 8   0
      2   2      5 mod 8               5                   6      6     5     mod 8   1
      3   3      5 mod 8               6                   7      7     5     mod 8   2
  Using the arclist as a guide, the output be a list of numbers

                         0327032703270



              Christopher L. Toni, Donald Barkley   Computational Contact Topology        14 / 20
Introduction
                               Arcs and Arclists
                            Tightness Checking
                                       Bypasses
                     Final Results and Thoughts


Algorithm Output - Tightness Checker (cont.)
  Consider M np 8. Given the arclist (0 7)(1 4)(2 3)(5 6) ,
  the left cutting disk hooks up with the right cutting disk as
  follows:

      0   0      5 mod 8               3                   4      4     5     mod 8   7
      1   1      5 mod 8               4                   5      5     5     mod 8   0
      2   2      5 mod 8               5                   6      6     5     mod 8   1
      3   3      5 mod 8               6                   7      7     5     mod 8   2
  Using the arclist as a guide, the output be a list of numbers

                         0327032703270

                 0 32           70         32       70     32       70

              Christopher L. Toni, Donald Barkley   Computational Contact Topology        14 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Brief Overview - Bypasses
  A bypass exists when a line can be drawn through three arcs
  on a cutting disk.




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   15 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Brief Overview - Bypasses
  A bypass exists when a line can be drawn through three arcs
  on a cutting disk.




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   15 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Brief Overview - Bypasses
  A bypass exists when a line can be drawn through three arcs
  on a cutting disk.




  There are two possible
  bypasses on this cutting disk.
            Christopher L. Toni, Donald Barkley   Computational Contact Topology   15 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Brief Overview - Bypasses
  A bypass exists when a line can be drawn through three arcs
  on a cutting disk.




  There are two possible                          There are no possible
  bypasses on this cutting disk.                  bypasses on this cutting disk.
            Christopher L. Toni, Donald Barkley   Computational Contact Topology   15 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Brief Overview - Bypasses (cont.)

  When a bypass is performed, it produces an already existing
  arclist!




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   16 / 20
Introduction
                              Arcs and Arclists
                           Tightness Checking
                                      Bypasses
                    Final Results and Thoughts


Brief Overview - Bypasses (cont.)

  When a bypass is performed, it produces an already existing
  arclist!

  This is crucial in determining if these arclists form a tight
  contact structure on the torus.




             Christopher L. Toni, Donald Barkley   Computational Contact Topology   16 / 20
Introduction
                              Arcs and Arclists
                           Tightness Checking
                                      Bypasses
                    Final Results and Thoughts


Brief Overview - Bypasses (cont.)

  When a bypass is performed, it produces an already existing
  arclist!

  This is crucial in determining if these arclists form a tight
  contact structure on the torus.

  The bypass can be viewed as an equivalence relation
  between arclists.




             Christopher L. Toni, Donald Barkley   Computational Contact Topology   16 / 20
Introduction
                              Arcs and Arclists
                           Tightness Checking
                                      Bypasses
                    Final Results and Thoughts


Brief Overview - Bypasses (cont.)

  When a bypass is performed, it produces an already existing
  arclist!

  This is crucial in determining if these arclists form a tight
  contact structure on the torus.

  The bypass can be viewed as an equivalence relation
  between arclists.

  If one arclist is overtwisted in an equivalence class, the entire
  equivalence class is associated to an overtwisted structure.



             Christopher L. Toni, Donald Barkley   Computational Contact Topology   16 / 20
Introduction
                              Arcs and Arclists
                           Tightness Checking
                                      Bypasses
                    Final Results and Thoughts


Brief Overview - Bypasses (cont.)

  When a bypass is performed, it produces an already existing
  arclist!

  This is crucial in determining if these arclists form a tight
  contact structure on the torus.

  The bypass can be viewed as an equivalence relation
  between arclists.

  If one arclist is overtwisted in an equivalence class, the entire
  equivalence class is associated to an overtwisted structure.This
  saves time in the calculation process.


             Christopher L. Toni, Donald Barkley   Computational Contact Topology   16 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Results and Conclusions


   1   Formula for computing the number of arclists for a given
       number of vertices and web implementation of this formula.




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   17 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Results and Conclusions


   1   Formula for computing the number of arclists for a given
       number of vertices and web implementation of this formula.
   2   Software module to produce arclists For various number of
       vertices.




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   17 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Results and Conclusions


   1   Formula for computing the number of arclists for a given
       number of vertices and web implementation of this formula.
   2   Software module to produce arclists For various number of
       vertices.
   3   Modification of succeeding software modules (bypass and
       tightness checking) to read these arclists as input.




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   17 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Results and Conclusions


   1   Formula for computing the number of arclists for a given
       number of vertices and web implementation of this formula.
   2   Software module to produce arclists For various number of
       vertices.
   3   Modification of succeeding software modules (bypass and
       tightness checking) to read these arclists as input.
   4   Manually produced algorithms and results sets for various
       values of n, p, q to be used for software testing.




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   17 / 20
Introduction
                           Arcs and Arclists
                        Tightness Checking
                                   Bypasses
                 Final Results and Thoughts


Results and Conclusions (cont.)
           N2          1                        N 22         58786
           N4          2                        N 24         208012
           N6          5                        N 26         742900
           N8          14                       N 28         2674440
         N 10          42                       N 30         9694845
         N 12          132                      N 32         35357670
         N 14          429                      N 34         129644790
         N 16          1430                     N 36         477638700
         N 18          4862                     N 38         1767263190
         N 20          16796                    N 40         6564120420


          Christopher L. Toni, Donald Barkley   Computational Contact Topology   18 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Results and Conclusions (cont.)
             N2          1                        N 22         58786
             N4          2                        N 24         208012
             N6          5                        N 26         742900
             N8          14                       N 28         2674440
           N 10          42                       N 30         9694845
           N 12          132                      N 32         35357670
           N 14          429                      N 34         129644790
           N 16          1430                     N 36         477638700
           N 18          4862                     N 38         1767263190
             N 20     16796         N 40     6564120420
  Note that the number of arclists increase rapidly as the number
  of vertices get larger. At M 28, its well over a million!
            Christopher L. Toni, Donald Barkley   Computational Contact Topology   18 / 20
Introduction
                              Arcs and Arclists
                           Tightness Checking
                                      Bypasses
                    Final Results and Thoughts


Future Research


  Future goals include, but not limited to:




             Christopher L. Toni, Donald Barkley   Computational Contact Topology   19 / 20
Introduction
                              Arcs and Arclists
                           Tightness Checking
                                      Bypasses
                    Final Results and Thoughts


Future Research


  Future goals include, but not limited to:

   1   Publication of Findings in Undergraduate Journal




             Christopher L. Toni, Donald Barkley   Computational Contact Topology   19 / 20
Introduction
                              Arcs and Arclists
                           Tightness Checking
                                      Bypasses
                    Final Results and Thoughts


Future Research


  Future goals include, but not limited to:

   1   Publication of Findings in Undergraduate Journal

   2   Extension of Algorithm to the two-holed torus




             Christopher L. Toni, Donald Barkley   Computational Contact Topology   19 / 20
Introduction
                              Arcs and Arclists
                           Tightness Checking
                                      Bypasses
                    Final Results and Thoughts


Future Research


  Future goals include, but not limited to:

   1   Publication of Findings in Undergraduate Journal

   2   Extension of Algorithm to the two-holed torus

   3   Enhance software (requiring a reduced memory footprint)
       to produce results for larger number of vertices.




             Christopher L. Toni, Donald Barkley   Computational Contact Topology   19 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Acknowledgements

  We would like to thank:




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   20 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Acknowledgements

  We would like to thank:

      The SCSE (Dept. of Education) for funding the research
      over summer.




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   20 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Acknowledgements

  We would like to thank:

      The SCSE (Dept. of Education) for funding the research
      over summer.




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   20 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Acknowledgements

  We would like to thank:

      The SCSE (Dept. of Education) for funding the research
      over summer.

      Dr. Tanya Cofer for leading us through tough concepts and
      tedious calculations.




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   20 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Acknowledgements

  We would like to thank:

      The SCSE (Dept. of Education) for funding the research
      over summer.

      Dr. Tanya Cofer for leading us through tough concepts and
      tedious calculations.

      Donald Barkley for helping us program the algorithms in
      Java.




            Christopher L. Toni, Donald Barkley   Computational Contact Topology   20 / 20
Introduction
                             Arcs and Arclists
                          Tightness Checking
                                     Bypasses
                   Final Results and Thoughts


Acknowledgements

  We would like to thank:

      The SCSE (Dept. of Education) for funding the research
      over summer.

      Dr. Tanya Cofer for leading us through tough concepts and
      tedious calculations.

      Donald Barkley for helping us program the algorithms in
      Java.

  Donald Barkley will now talk about the programming part of the
  project.

            Christopher L. Toni, Donald Barkley   Computational Contact Topology   20 / 20

More Related Content

Similar to SCSE Symposium Presentation

Contact Topology Argonne
Contact Topology ArgonneContact Topology Argonne
Contact Topology Argonnechrislt521
 
ISMAA Permutation Algebra
ISMAA Permutation AlgebraISMAA Permutation Algebra
ISMAA Permutation Algebrachrislt521
 
NEIU Permutation Algebra
NEIU Permutation AlgebraNEIU Permutation Algebra
NEIU Permutation Algebrachrislt521
 
ILSAMP Contact Topology
ILSAMP Contact TopologyILSAMP Contact Topology
ILSAMP Contact Topologychrislt521
 
Argonne Presentation
Argonne PresentationArgonne Presentation
Argonne Presentationchrislt521
 

Similar to SCSE Symposium Presentation (6)

Contact Topology Argonne
Contact Topology ArgonneContact Topology Argonne
Contact Topology Argonne
 
ISMAA Permutation Algebra
ISMAA Permutation AlgebraISMAA Permutation Algebra
ISMAA Permutation Algebra
 
NEIU Permutation Algebra
NEIU Permutation AlgebraNEIU Permutation Algebra
NEIU Permutation Algebra
 
ILSAMP Contact Topology
ILSAMP Contact TopologyILSAMP Contact Topology
ILSAMP Contact Topology
 
Argonne Presentation
Argonne PresentationArgonne Presentation
Argonne Presentation
 
Burakh 040816
Burakh 040816Burakh 040816
Burakh 040816
 

SCSE Symposium Presentation

  • 1. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Improving on an Existing Program That Checks for Tight Contact Structures on the Solid Torus Northeastern Illinois University SCSE Research Symposium Christopher L. Toni Kelly Hirschbeck Nathan Walter William Krepelin Donald Barkley William Byrd John Wallin Mayra Bravo-Gonzalez Banlieman Kolani Dr. Tanya Cofer October 2, 2009 Christopher L. Toni, Donald Barkley Computational Contact Topology 1 / 20
  • 2. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Outline 1 Introduction 2 Arcs and Arclists 3 Tightness Checking 4 Bypasses 5 Final Results and Thoughts Christopher L. Toni, Donald Barkley Computational Contact Topology 2 / 20
  • 3. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts What is Topology? Topology is a field of mathematics that does not focus on an object’s shape, but the properties that remain consistent through deformations like: Christopher L. Toni, Donald Barkley Computational Contact Topology 3 / 20
  • 4. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts What is Topology? Topology is a field of mathematics that does not focus on an object’s shape, but the properties that remain consistent through deformations like: 1 twisting Christopher L. Toni, Donald Barkley Computational Contact Topology 3 / 20
  • 5. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts What is Topology? Topology is a field of mathematics that does not focus on an object’s shape, but the properties that remain consistent through deformations like: 1 twisting 2 bending Christopher L. Toni, Donald Barkley Computational Contact Topology 3 / 20
  • 6. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts What is Topology? Topology is a field of mathematics that does not focus on an object’s shape, but the properties that remain consistent through deformations like: 1 twisting 2 bending 3 stretching Christopher L. Toni, Donald Barkley Computational Contact Topology 3 / 20
  • 7. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts What is Topology? Topology is a field of mathematics that does not focus on an object’s shape, but the properties that remain consistent through deformations like: 1 twisting 2 bending 3 stretching To illustrate this, visualize a coffee cup and a doughnut (torus). Christopher L. Toni, Donald Barkley Computational Contact Topology 3 / 20
  • 8. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts What is Topology? (cont.) The torus and the coffee cup are topologically equivalent objects. We see above that through bending and stretching, the torus can be morphed into a coffee cup and vice versa. Christopher L. Toni, Donald Barkley Computational Contact Topology 4 / 20
  • 9. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Formulating the Problem On the solid torus (defined by 1 2 ), dividing curves are located where twisting planes switch from positive to negative. Christopher L. Toni, Donald Barkley Computational Contact Topology 5 / 20
  • 10. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Formulating the Problem On the solid torus (defined by 1 2 ), dividing curves are located where twisting planes switch from positive to negative. Christopher L. Toni, Donald Barkley Computational Contact Topology 5 / 20
  • 11. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Formulating the Problem On the solid torus (defined by 1 2 ), dividing curves are located where twisting planes switch from positive to negative. These dividing curves keep track of and allow for investigation of certain topological properties in the neighborhood of a surface. Christopher L. Toni, Donald Barkley Computational Contact Topology 5 / 20
  • 12. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Formulating the Problem (cont.) Christopher L. Toni, Donald Barkley Computational Contact Topology 6 / 20
  • 13. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Formulating the Problem (cont.) We define n to be the number of dividing curves, p to be the number of times the dividing curves are wrapped about the longitudinal section of the torus, and q to be the number of times the dividing curves are wrapped about the meridinal section of the torus. Christopher L. Toni, Donald Barkley Computational Contact Topology 6 / 20
  • 14. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Overview The first computational task is to generate arclists for a given number of vertices M, where M np. Christopher L. Toni, Donald Barkley Computational Contact Topology 7 / 20
  • 15. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Overview The first computational task is to generate arclists for a given number of vertices M, where M np. Definition An arc is a path between vertices subject to: Christopher L. Toni, Donald Barkley Computational Contact Topology 7 / 20
  • 16. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Overview The first computational task is to generate arclists for a given number of vertices M, where M np. Definition An arc is a path between vertices subject to: 1 All M vertices in a configuration must be paired Christopher L. Toni, Donald Barkley Computational Contact Topology 7 / 20
  • 17. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Overview The first computational task is to generate arclists for a given number of vertices M, where M np. Definition An arc is a path between vertices subject to: 1 All M vertices in a configuration must be paired 2 Paths cannot cross Christopher L. Toni, Donald Barkley Computational Contact Topology 7 / 20
  • 18. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Overview The first computational task is to generate arclists for a given number of vertices M, where M np. Definition An arc is a path between vertices subject to: 1 All M vertices in a configuration must be paired 2 Paths cannot cross An arclist is a set (list) of legal pairs of arcs. Christopher L. Toni, Donald Barkley Computational Contact Topology 7 / 20
  • 19. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Overview The first computational task is to generate arclists for a given number of vertices M, where M np. Definition An arc is a path between vertices subject to: 1 All M vertices in a configuration must be paired 2 Paths cannot cross An arclist is a set (list) of legal pairs of arcs. We can think of arclists for M vertices as certain permutations of M objects. Christopher L. Toni, Donald Barkley Computational Contact Topology 7 / 20
  • 20. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Overview The first computational task is to generate arclists for a given number of vertices M, where M np. Definition An arc is a path between vertices subject to: 1 All M vertices in a configuration must be paired 2 Paths cannot cross An arclist is a set (list) of legal pairs of arcs. We can think of arclists for M vertices as certain permutations of M objects.The solution is to “walk” a new element through the solution set for a smaller problem. Christopher L. Toni, Donald Barkley Computational Contact Topology 7 / 20
  • 21. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Overview The first computational task is to generate arclists for a given number of vertices M, where M np. Definition An arc is a path between vertices subject to: 1 All M vertices in a configuration must be paired 2 Paths cannot cross An arclist is a set (list) of legal pairs of arcs. We can think of arclists for M vertices as certain permutations of M objects.The solution is to “walk” a new element through the solution set for a smaller problem. There is one challenge: the algorithm is space and time intensive! Christopher L. Toni, Donald Barkley Computational Contact Topology 7 / 20
  • 22. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Algorithm - Arcs and Arclist Christopher L. Toni, Donald Barkley Computational Contact Topology 8 / 20
  • 23. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Algorithm - Arcs and Arclist Christopher L. Toni, Donald Barkley Computational Contact Topology 8 / 20
  • 24. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Algorithm Output - Arcs and Arclists For the case of n 2, p 4, q 3, we have M np 2 4 8. Christopher L. Toni, Donald Barkley Computational Contact Topology 9 / 20
  • 25. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Algorithm Output - Arcs and Arclists For the case of n 2, p 4, q 3, we have M np 2 4 8. The arclists for M 8 vertices are: Christopher L. Toni, Donald Barkley Computational Contact Topology 9 / 20
  • 26. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Algorithm Output - Arcs and Arclists For the case of n 2, p 4, q 3, we have M np 2 4 8. The arclists for M 8 vertices are: (0 1)(2 5)(3 4)(6 7) (0 1)(2 7)(3 4)(5 6) (0 3)(1 2)(4 5)(6 7) (0 1)(2 3)(4 5)(6 7) (0 1)(2 7)(3 6)(4 5) (0 3)(1 2)(4 7)(5 6) (0 7)(1 2)(3 4)(5 6) Christopher L. Toni, Donald Barkley Computational Contact Topology 9 / 20
  • 27. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Algorithm Output - Arcs and Arclists For the case of n 2, p 4, q 3, we have M np 2 4 8. The arclists for M 8 vertices are: (0 1)(2 5)(3 4)(6 7) (0 5)(1 2)(3 4)(6 7) (0 1)(2 7)(3 4)(5 6) (0 7)(1 4)(2 3)(5 6) (0 3)(1 2)(4 5)(6 7) (0 1)(2 3)(4 7)(5 6) (0 1)(2 3)(4 5)(6 7) (0 5)(1 4)(2 3)(6 7) (0 1)(2 7)(3 6)(4 5) (0 7)(1 2)(3 6)(4 5) (0 3)(1 2)(4 7)(5 6) (0 7)(1 6)(2 5)(3 4) (0 7)(1 2)(3 4)(5 6) (0 7)(1 6)(2 3)(4 5) Christopher L. Toni, Donald Barkley Computational Contact Topology 9 / 20
  • 28. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Algorithm Output - Arcs and Arclists For the case of n 2, p 4, q 3, we have M np 2 4 8. The arclists for M 8 vertices are: (0 1)(2 5)(3 4)(6 7) (0 5)(1 2)(3 4)(6 7) (0 1)(2 7)(3 4)(5 6) (0 7)(1 4)(2 3)(5 6) (0 3)(1 2)(4 5)(6 7) (0 1)(2 3)(4 7)(5 6) (0 1)(2 3)(4 5)(6 7) (0 5)(1 4)(2 3)(6 7) (0 1)(2 7)(3 6)(4 5) (0 7)(1 2)(3 6)(4 5) (0 3)(1 2)(4 7)(5 6) (0 7)(1 6)(2 5)(3 4) (0 7)(1 2)(3 4)(5 6) (0 7)(1 6)(2 3)(4 5) Data files for required values of M were produced and saved. These files were then used as input to the Tightness Checking Christopher L. Toni, Donald Barkley Computational Contact Topology 9 / 20
  • 29. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Overview - Tightness Checker Once the arclists are found, it is possible to determine how the vertices on the left and right cutting disks match up. Christopher L. Toni, Donald Barkley Computational Contact Topology 10 / 20
  • 30. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Overview - Tightness Checker Once the arclists are found, it is possible to determine how the vertices on the left and right cutting disks match up. The formula x x nq 1 mod np maps the vertices on the left cutting disk to the right cutting disk. Christopher L. Toni, Donald Barkley Computational Contact Topology 10 / 20
  • 31. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Overview - Tightness Checker Once the arclists are found, it is possible to determine how the vertices on the left and right cutting disks match up. The formula x x nq 1 mod np maps the vertices on the left cutting disk to the right cutting disk. The formula x x nq 1 mod np maps the vertices on the right cutting disk to the left cutting disk. Christopher L. Toni, Donald Barkley Computational Contact Topology 10 / 20
  • 32. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Overview - Tightness Checker Once the arclists are found, it is possible to determine how the vertices on the left and right cutting disks match up. The formula x x nq 1 mod np maps the vertices on the left cutting disk to the right cutting disk. The formula x x nq 1 mod np maps the vertices on the right cutting disk to the left cutting disk. To determine if the torus admits a tight or overtwisted contact structure, the dividing curves and arcs need to be analyzed. Christopher L. Toni, Donald Barkley Computational Contact Topology 10 / 20
  • 33. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Overview - Tightness Checker (cont.) Christopher L. Toni, Donald Barkley Computational Contact Topology 11 / 20
  • 34. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Overview - Tightness Checker (cont.) If a single closed curve can be traced on the torus, it is considered to be a potentially tight contact structure. Christopher L. Toni, Donald Barkley Computational Contact Topology 11 / 20
  • 35. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Overview - Tightness Checker (cont.) If a single closed curve can be If more than one closed curve traced on the torus, it is can be traced on the torus, it considered to be a potentially is considered to be an tight contact structure. overtwisted structure. Christopher L. Toni, Donald Barkley Computational Contact Topology 11 / 20
  • 36. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Algorithm - Tightness Checker Christopher L. Toni, Donald Barkley Computational Contact Topology 12 / 20
  • 37. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Algorithm - Tightness Checker All vertices hook up to a single curve. Thus, the structure is potentially tight. Christopher L. Toni, Donald Barkley Computational Contact Topology 12 / 20
  • 38. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Algorithm - Tightness Checker All vertices hook up to a single Only a few vertices hook up to curve. Thus, the structure is a curve. Thus, the structure is potentially tight. overtwisted. Christopher L. Toni, Donald Barkley Computational Contact Topology 12 / 20
  • 39. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Algorithm Output - Tightness Checker Consider M np 8. Christopher L. Toni, Donald Barkley Computational Contact Topology 13 / 20
  • 40. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Algorithm Output - Tightness Checker Consider M np 8. Given the arclist (0 1)(2 7)(3 6)(4 5) , the left cutting disk hooks up with the right cutting disk as follows: Christopher L. Toni, Donald Barkley Computational Contact Topology 13 / 20
  • 41. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Algorithm Output - Tightness Checker Consider M np 8. Given the arclist (0 1)(2 7)(3 6)(4 5) , the left cutting disk hooks up with the right cutting disk as follows: 0 0 5 mod 8 3 4 4 5 mod 8 7 1 1 5 mod 8 4 5 5 5 mod 8 0 2 2 5 mod 8 5 6 6 5 mod 8 1 3 3 5 mod 8 6 7 7 5 mod 8 2 Christopher L. Toni, Donald Barkley Computational Contact Topology 13 / 20
  • 42. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Algorithm Output - Tightness Checker Consider M np 8. Given the arclist (0 1)(2 7)(3 6)(4 5) , the left cutting disk hooks up with the right cutting disk as follows: 0 0 5 mod 8 3 4 4 5 mod 8 7 1 1 5 mod 8 4 5 5 5 mod 8 0 2 2 5 mod 8 5 6 6 5 mod 8 1 3 3 5 mod 8 6 7 7 5 mod 8 2 Using the arclist as a guide, the output be a list of numbers Christopher L. Toni, Donald Barkley Computational Contact Topology 13 / 20
  • 43. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Algorithm Output - Tightness Checker Consider M np 8. Given the arclist (0 1)(2 7)(3 6)(4 5) , the left cutting disk hooks up with the right cutting disk as follows: 0 0 5 mod 8 3 4 4 5 mod 8 7 1 1 5 mod 8 4 5 5 5 mod 8 0 2 2 5 mod 8 5 6 6 5 mod 8 1 3 3 5 mod 8 6 7 7 5 mod 8 2 Using the arclist as a guide, the output be a list of numbers 03636105472725410 Christopher L. Toni, Donald Barkley Computational Contact Topology 13 / 20
  • 44. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Algorithm Output - Tightness Checker Consider M np 8. Given the arclist (0 1)(2 7)(3 6)(4 5) , the left cutting disk hooks up with the right cutting disk as follows: 0 0 5 mod 8 3 4 4 5 mod 8 7 1 1 5 mod 8 4 5 5 5 mod 8 0 2 2 5 mod 8 5 6 6 5 mod 8 1 3 3 5 mod 8 6 7 7 5 mod 8 2 Using the arclist as a guide, the output be a list of numbers 03636105472725410 0 36 36 10 54 72 72 54 10 Christopher L. Toni, Donald Barkley Computational Contact Topology 13 / 20
  • 45. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Algorithm Output - Tightness Checker (cont.) Consider M np 8. Christopher L. Toni, Donald Barkley Computational Contact Topology 14 / 20
  • 46. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Algorithm Output - Tightness Checker (cont.) Consider M np 8. Given the arclist (0 7)(1 4)(2 3)(5 6) , the left cutting disk hooks up with the right cutting disk as follows: Christopher L. Toni, Donald Barkley Computational Contact Topology 14 / 20
  • 47. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Algorithm Output - Tightness Checker (cont.) Consider M np 8. Given the arclist (0 7)(1 4)(2 3)(5 6) , the left cutting disk hooks up with the right cutting disk as follows: 0 0 5 mod 8 3 4 4 5 mod 8 7 1 1 5 mod 8 4 5 5 5 mod 8 0 2 2 5 mod 8 5 6 6 5 mod 8 1 3 3 5 mod 8 6 7 7 5 mod 8 2 Christopher L. Toni, Donald Barkley Computational Contact Topology 14 / 20
  • 48. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Algorithm Output - Tightness Checker (cont.) Consider M np 8. Given the arclist (0 7)(1 4)(2 3)(5 6) , the left cutting disk hooks up with the right cutting disk as follows: 0 0 5 mod 8 3 4 4 5 mod 8 7 1 1 5 mod 8 4 5 5 5 mod 8 0 2 2 5 mod 8 5 6 6 5 mod 8 1 3 3 5 mod 8 6 7 7 5 mod 8 2 Using the arclist as a guide, the output be a list of numbers Christopher L. Toni, Donald Barkley Computational Contact Topology 14 / 20
  • 49. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Algorithm Output - Tightness Checker (cont.) Consider M np 8. Given the arclist (0 7)(1 4)(2 3)(5 6) , the left cutting disk hooks up with the right cutting disk as follows: 0 0 5 mod 8 3 4 4 5 mod 8 7 1 1 5 mod 8 4 5 5 5 mod 8 0 2 2 5 mod 8 5 6 6 5 mod 8 1 3 3 5 mod 8 6 7 7 5 mod 8 2 Using the arclist as a guide, the output be a list of numbers 0327032703270 Christopher L. Toni, Donald Barkley Computational Contact Topology 14 / 20
  • 50. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Algorithm Output - Tightness Checker (cont.) Consider M np 8. Given the arclist (0 7)(1 4)(2 3)(5 6) , the left cutting disk hooks up with the right cutting disk as follows: 0 0 5 mod 8 3 4 4 5 mod 8 7 1 1 5 mod 8 4 5 5 5 mod 8 0 2 2 5 mod 8 5 6 6 5 mod 8 1 3 3 5 mod 8 6 7 7 5 mod 8 2 Using the arclist as a guide, the output be a list of numbers 0327032703270 0 32 70 32 70 32 70 Christopher L. Toni, Donald Barkley Computational Contact Topology 14 / 20
  • 51. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Brief Overview - Bypasses A bypass exists when a line can be drawn through three arcs on a cutting disk. Christopher L. Toni, Donald Barkley Computational Contact Topology 15 / 20
  • 52. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Brief Overview - Bypasses A bypass exists when a line can be drawn through three arcs on a cutting disk. Christopher L. Toni, Donald Barkley Computational Contact Topology 15 / 20
  • 53. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Brief Overview - Bypasses A bypass exists when a line can be drawn through three arcs on a cutting disk. There are two possible bypasses on this cutting disk. Christopher L. Toni, Donald Barkley Computational Contact Topology 15 / 20
  • 54. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Brief Overview - Bypasses A bypass exists when a line can be drawn through three arcs on a cutting disk. There are two possible There are no possible bypasses on this cutting disk. bypasses on this cutting disk. Christopher L. Toni, Donald Barkley Computational Contact Topology 15 / 20
  • 55. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Brief Overview - Bypasses (cont.) When a bypass is performed, it produces an already existing arclist! Christopher L. Toni, Donald Barkley Computational Contact Topology 16 / 20
  • 56. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Brief Overview - Bypasses (cont.) When a bypass is performed, it produces an already existing arclist! This is crucial in determining if these arclists form a tight contact structure on the torus. Christopher L. Toni, Donald Barkley Computational Contact Topology 16 / 20
  • 57. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Brief Overview - Bypasses (cont.) When a bypass is performed, it produces an already existing arclist! This is crucial in determining if these arclists form a tight contact structure on the torus. The bypass can be viewed as an equivalence relation between arclists. Christopher L. Toni, Donald Barkley Computational Contact Topology 16 / 20
  • 58. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Brief Overview - Bypasses (cont.) When a bypass is performed, it produces an already existing arclist! This is crucial in determining if these arclists form a tight contact structure on the torus. The bypass can be viewed as an equivalence relation between arclists. If one arclist is overtwisted in an equivalence class, the entire equivalence class is associated to an overtwisted structure. Christopher L. Toni, Donald Barkley Computational Contact Topology 16 / 20
  • 59. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Brief Overview - Bypasses (cont.) When a bypass is performed, it produces an already existing arclist! This is crucial in determining if these arclists form a tight contact structure on the torus. The bypass can be viewed as an equivalence relation between arclists. If one arclist is overtwisted in an equivalence class, the entire equivalence class is associated to an overtwisted structure.This saves time in the calculation process. Christopher L. Toni, Donald Barkley Computational Contact Topology 16 / 20
  • 60. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Results and Conclusions 1 Formula for computing the number of arclists for a given number of vertices and web implementation of this formula. Christopher L. Toni, Donald Barkley Computational Contact Topology 17 / 20
  • 61. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Results and Conclusions 1 Formula for computing the number of arclists for a given number of vertices and web implementation of this formula. 2 Software module to produce arclists For various number of vertices. Christopher L. Toni, Donald Barkley Computational Contact Topology 17 / 20
  • 62. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Results and Conclusions 1 Formula for computing the number of arclists for a given number of vertices and web implementation of this formula. 2 Software module to produce arclists For various number of vertices. 3 Modification of succeeding software modules (bypass and tightness checking) to read these arclists as input. Christopher L. Toni, Donald Barkley Computational Contact Topology 17 / 20
  • 63. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Results and Conclusions 1 Formula for computing the number of arclists for a given number of vertices and web implementation of this formula. 2 Software module to produce arclists For various number of vertices. 3 Modification of succeeding software modules (bypass and tightness checking) to read these arclists as input. 4 Manually produced algorithms and results sets for various values of n, p, q to be used for software testing. Christopher L. Toni, Donald Barkley Computational Contact Topology 17 / 20
  • 64. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Results and Conclusions (cont.) N2 1 N 22 58786 N4 2 N 24 208012 N6 5 N 26 742900 N8 14 N 28 2674440 N 10 42 N 30 9694845 N 12 132 N 32 35357670 N 14 429 N 34 129644790 N 16 1430 N 36 477638700 N 18 4862 N 38 1767263190 N 20 16796 N 40 6564120420 Christopher L. Toni, Donald Barkley Computational Contact Topology 18 / 20
  • 65. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Results and Conclusions (cont.) N2 1 N 22 58786 N4 2 N 24 208012 N6 5 N 26 742900 N8 14 N 28 2674440 N 10 42 N 30 9694845 N 12 132 N 32 35357670 N 14 429 N 34 129644790 N 16 1430 N 36 477638700 N 18 4862 N 38 1767263190 N 20 16796 N 40 6564120420 Note that the number of arclists increase rapidly as the number of vertices get larger. At M 28, its well over a million! Christopher L. Toni, Donald Barkley Computational Contact Topology 18 / 20
  • 66. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Future Research Future goals include, but not limited to: Christopher L. Toni, Donald Barkley Computational Contact Topology 19 / 20
  • 67. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Future Research Future goals include, but not limited to: 1 Publication of Findings in Undergraduate Journal Christopher L. Toni, Donald Barkley Computational Contact Topology 19 / 20
  • 68. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Future Research Future goals include, but not limited to: 1 Publication of Findings in Undergraduate Journal 2 Extension of Algorithm to the two-holed torus Christopher L. Toni, Donald Barkley Computational Contact Topology 19 / 20
  • 69. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Future Research Future goals include, but not limited to: 1 Publication of Findings in Undergraduate Journal 2 Extension of Algorithm to the two-holed torus 3 Enhance software (requiring a reduced memory footprint) to produce results for larger number of vertices. Christopher L. Toni, Donald Barkley Computational Contact Topology 19 / 20
  • 70. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Acknowledgements We would like to thank: Christopher L. Toni, Donald Barkley Computational Contact Topology 20 / 20
  • 71. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Acknowledgements We would like to thank: The SCSE (Dept. of Education) for funding the research over summer. Christopher L. Toni, Donald Barkley Computational Contact Topology 20 / 20
  • 72. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Acknowledgements We would like to thank: The SCSE (Dept. of Education) for funding the research over summer. Christopher L. Toni, Donald Barkley Computational Contact Topology 20 / 20
  • 73. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Acknowledgements We would like to thank: The SCSE (Dept. of Education) for funding the research over summer. Dr. Tanya Cofer for leading us through tough concepts and tedious calculations. Christopher L. Toni, Donald Barkley Computational Contact Topology 20 / 20
  • 74. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Acknowledgements We would like to thank: The SCSE (Dept. of Education) for funding the research over summer. Dr. Tanya Cofer for leading us through tough concepts and tedious calculations. Donald Barkley for helping us program the algorithms in Java. Christopher L. Toni, Donald Barkley Computational Contact Topology 20 / 20
  • 75. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts Acknowledgements We would like to thank: The SCSE (Dept. of Education) for funding the research over summer. Dr. Tanya Cofer for leading us through tough concepts and tedious calculations. Donald Barkley for helping us program the algorithms in Java. Donald Barkley will now talk about the programming part of the project. Christopher L. Toni, Donald Barkley Computational Contact Topology 20 / 20