This document outlines research on calculating the number of tight contact structures on a solid torus using computational topology. It discusses generating arc and arclist data structures to represent dividing curves on the torus for given values of n, p, and q. It then describes using a tightness checking algorithm to determine how the dividing curves match up between the left and right cutting disks of the torus based on a mapping formula. The results are used to identify tight contact structures for different parameter values.
This document discusses using permutations to study dividing curves on surfaces inside a solid torus. It introduces arcs and arclists, which are represented by permutations. Permutations are used to algorithmically check for tightness and the existence of bypasses by applying mapping rules. Conjectures are made regarding dividing curves and bypasses are identified through permutation formulas.
B. Nikolic/ B. Sazdovic: Hamiltonian Approach to Dp-brane NoncommutativitySEENET-MTP
This document summarizes a talk on Hamiltonian approaches to Dp-brane noncommutativity in string theory. It discusses:
1) Basic facts about strings and superstrings, including open and closed strings, Dp-branes, and the 5 consistent superstring theories.
2) Boundary conditions for strings ending on Dp-branes and their treatment as canonical constraints. This leads to noncommutativity on the Dp-brane.
3) Details of the Type IIB superstring theory in 10 dimensions and the model considered, which involves graviton, gravitinos, and R-R fields but no dilatinos or dilaton.
1) The motion of a rigid body can be described by tracking the position of a reference trihedron attached to the body over time.
2) At each instant, the orientation of the mobile trihedron relative to a fixed reference frame is defined by a rotation dyadic with a rotation axis and angle.
3) The rotation dyadic transforms the fixed frame vectors into the mobile frame vectors, allowing the position and orientation of any point on the rigid body to be determined as a function of time.
Devine Tech Ltd provides customer contact solutions such as outbound calling, response handling, customer satisfaction research, and virtual assistant services. They offer customized solutions tailored to each client's unique needs with expertise in areas like software development, IT infrastructure, data management, and content development. Devine Tech enhances customer experiences through services like customer research, response handling, database solutions, and virtual assistants to free up clients' time.
The TOOL fox range of hand tools offers processing and measuring tools for all electrical engineering applications.
The ergonomically designed tools for cutting, stripping, crimping, screwing, and testing impress with their optimum handling and quality. Specially hardened tool steels ensure maximum durability.
This document outlines research on improving an existing program that checks for tight contact structures on the solid torus. It discusses formulating the problem by defining dividing curves on the torus, and an overview of the computational tasks which include generating arclists pairing all vertices for a given number and ensuring paths do not cross. The research aims to enhance tightness checking algorithms and identify bypass structures on the torus.
The document discusses using permutations to study a classification problem on dividing curves in the solid torus. It introduces representing arclists on cutting disks as permutations and using permutations to check for tightness and the existence of bypasses. Permutations allow an algorithmic approach to identifying abstract bypasses without visualizing the geometry. The talk outlines representing arcs and arclists with permutations, using permutations to check for tightness and bypasses, and generating abstract bypass permutations.
The document outlines an algorithm for calculating the number of tight contact structures on a solid torus. It first generates lists of possible arcs (connections between vertices) and then uses a tightness checker to analyze the arcs and determine if they allow a single closed curve or multiple curves. If a single curve is possible, the structure is potentially tight, while multiple curves mean it is overtwisted. The algorithm outputs the results of this checking for different numbers of vertices. It also briefly discusses checking for bypass curves between three arcs.
This document discusses using permutations to study dividing curves on surfaces inside a solid torus. It introduces arcs and arclists, which are represented by permutations. Permutations are used to algorithmically check for tightness and the existence of bypasses by applying mapping rules. Conjectures are made regarding dividing curves and bypasses are identified through permutation formulas.
B. Nikolic/ B. Sazdovic: Hamiltonian Approach to Dp-brane NoncommutativitySEENET-MTP
This document summarizes a talk on Hamiltonian approaches to Dp-brane noncommutativity in string theory. It discusses:
1) Basic facts about strings and superstrings, including open and closed strings, Dp-branes, and the 5 consistent superstring theories.
2) Boundary conditions for strings ending on Dp-branes and their treatment as canonical constraints. This leads to noncommutativity on the Dp-brane.
3) Details of the Type IIB superstring theory in 10 dimensions and the model considered, which involves graviton, gravitinos, and R-R fields but no dilatinos or dilaton.
1) The motion of a rigid body can be described by tracking the position of a reference trihedron attached to the body over time.
2) At each instant, the orientation of the mobile trihedron relative to a fixed reference frame is defined by a rotation dyadic with a rotation axis and angle.
3) The rotation dyadic transforms the fixed frame vectors into the mobile frame vectors, allowing the position and orientation of any point on the rigid body to be determined as a function of time.
Devine Tech Ltd provides customer contact solutions such as outbound calling, response handling, customer satisfaction research, and virtual assistant services. They offer customized solutions tailored to each client's unique needs with expertise in areas like software development, IT infrastructure, data management, and content development. Devine Tech enhances customer experiences through services like customer research, response handling, database solutions, and virtual assistants to free up clients' time.
The TOOL fox range of hand tools offers processing and measuring tools for all electrical engineering applications.
The ergonomically designed tools for cutting, stripping, crimping, screwing, and testing impress with their optimum handling and quality. Specially hardened tool steels ensure maximum durability.
This document outlines research on improving an existing program that checks for tight contact structures on the solid torus. It discusses formulating the problem by defining dividing curves on the torus, and an overview of the computational tasks which include generating arclists pairing all vertices for a given number and ensuring paths do not cross. The research aims to enhance tightness checking algorithms and identify bypass structures on the torus.
The document discusses using permutations to study a classification problem on dividing curves in the solid torus. It introduces representing arclists on cutting disks as permutations and using permutations to check for tightness and the existence of bypasses. Permutations allow an algorithmic approach to identifying abstract bypasses without visualizing the geometry. The talk outlines representing arcs and arclists with permutations, using permutations to check for tightness and bypasses, and generating abstract bypass permutations.
The document outlines an algorithm for calculating the number of tight contact structures on a solid torus. It first generates lists of possible arcs (connections between vertices) and then uses a tightness checker to analyze the arcs and determine if they allow a single closed curve or multiple curves. If a single curve is possible, the structure is potentially tight, while multiple curves mean it is overtwisted. The algorithm outputs the results of this checking for different numbers of vertices. It also briefly discusses checking for bypass curves between three arcs.
The document compares two methods for checking tight contact structures on the solid torus: hand calculations and permutations. It outlines generating arcs and arclists, checking for tightness and bypasses, and applying each method. Future work includes publishing the findings, extending the algorithm to more complex surfaces, and searching for formulas to handle additional dividing curves.
This document contains various sections on geometry topics including working warm-up problems about writing equations involving angle pairs formed by parallel lines cut by a transversal. It also lists common core standards about transformations of geometric figures and using properties of parallel lines cut by transversals to establish facts about angles. Finally, it reminds students that their exam is on Thursday and includes a study guide they should complete without talking.
This lecture discusses nanocarbon materials including C60 buckyballs, carbon nanotubes (CNTs), and graphene. Methods for synthesizing and studying these materials using techniques like chemical vapor deposition and electron beam lithography are presented. The key properties of graphene like its relativistic quantum mechanical behavior and electron transport are examined. The structure and band structure of carbon nanotubes are defined and their relationship to the graphene sheet is explored.
This document summarizes a research paper that develops a mathematical model for analyzing the three-dimensional shape of a long twisted rod hanging under gravity, such as a pipeline being laid from a barge. The model uses the geometrically exact theory of linear elastic rods and formulates the problem as a boundary value problem that is solved using matched asymptotic expansions. The truncated analytical solution is compared to results from a numerical scheme and shows good agreement. The method is then applied to consider the near-catenary shape of a clamped pipeline during the laying process.
This document provides an overview of crystallography. It defines key terms like crystalline solids, unit cell, space lattice, and basis. Crystalline solids have long-range order of atoms while amorphous solids do not. There are 7 crystal systems based on lattice parameters. Miller indices (hkl) are used to describe planes in a crystal lattice. Bragg's law relates the wavelength of X-rays to the diffraction pattern produced by the crystal structure. Common defects in crystal structures are discussed like vacancies, interstitials, and Frenkel and Schottky defects. Methods for determining crystal structures include X-ray crystallography and powder diffraction.
Ch-27.1 Basic concepts on structure of solids.pptxksysbaysyag
The document discusses various topics related to materials science including:
1. Common crystal structures of metals such as FCC, BCC, and HCP and how some metals can change structure with temperature.
2. Plastic deformation in metals occurs through slip and twinning which involve the movement of atoms along crystallographic planes.
3. Atomic structure consists of electrons surrounding the nucleus in shells and the number of valence electrons influence material properties and bonding.
4. Primary bonding types are ionic, covalent, and metallic which influence properties like strength, conductivity, and deformation behavior.
The document discusses several topics related to the electronic structures of atoms and electromagnetic radiation:
1. It defines wavelength and frequency of electromagnetic radiation and describes the relationship between them.
2. It discusses Max Planck's realization that energy is quantized and light has particle characteristics based on his study of blackbody radiation.
3. It explains Bohr's model of the hydrogen atom which incorporated Planck's quantum theory and correctly explained hydrogen's emission spectrum using discrete energy levels. However, the model failed for other elements.
The document discusses several topics related to electronic properties of materials including:
1. Insulators, charge transport theory, localized and delocalized wave functions, and excitons.
2. Energy bands in semiconductors, doping, holes, and band structure diagrams.
3. Density functional theory, the Hohenberg-Kohn theorem, Kohn-Sham scheme, and applications to molecular dynamics.
4. Additional sections cover amorphous semiconductors, transport between isolated molecules, and excitons. One-dimensional systems and the Peierls distortion are also mentioned.
This document contains information about angles and geometry concepts including:
1) Common Core standards related to congruence, similarity, rotations, reflections, and translations of geometric figures.
2) Questions about the definitions of vertical angles, corresponding angles, and supplementary angles.
3) A diagram labeling different angles and instructions for students to complete an assessment on related geometry topics.
1. A crystal structure consists of a periodic arrangement of atoms or molecules in three dimensions. The periodic positions of the atoms form a lattice known as the space or crystal lattice. (2)
2. There are two main types of crystal defects - point defects which involve missing or additional atoms at lattice sites, and line defects which involve misalignment or disruption of planes of atoms like dislocations. Point defects include vacancies, interstitials, and impurities while line defects include edge and screw dislocations. (3)
3. Different techniques can be used to determine crystal structures including X-ray diffraction methods like the Laue method which uses polychromatic radiation on a stationary crystal, the rotating crystal method
Attacking the TEKS: Focus on Atomic Theory presented by Jane Smith, ACT2 2010
This session will expose you to the new TEKS and College Readiness Standards. Ideas for sequencing and planning the unit will be shared along with tips for appropriate demos, labs, and assessments. The intended audience is for teachers with 3 or less years of experience or anyone who wants to delve deeper into the new standards.
The document discusses the basics of finite element analysis (FEA). It explains that FEA involves breaking a physical object down into small pieces or elements, then using a numerical technique to analyze them. Key steps in FEA include preprocessing like meshing the geometry, applying boundary conditions and material properties, solving the system of equations generated, and postprocessing to view results like displacements and stresses. An example problem of analyzing a plate under load is presented to illustrate the FEA formulation and solution process.
The document summarizes key concepts from Chapter 6 of the textbook, including:
1) Modern atomic theory arose from studies of radiation interacting with matter, and electromagnetic radiation has characteristic wavelengths and frequencies.
2) Planck proposed that atoms can only absorb or emit energy in discrete quanta, proportional to frequency via Planck's constant.
3) Einstein assumed light is composed of discrete energy packets called photons, helping explain the photoelectric effect.
4) Bohr incorporated Planck's quantization idea into his atomic model, where electrons orbit in distinct energy levels corresponding to line spectra wavelengths.
5) Later models including de Broglie's matter waves, Heisenberg's uncertainty principle, and
Random walks on graphs - link prediction by Rouhollah Nabatinabati
This document provides an overview of random walks on graphs and their applications. It begins with basic definitions such as adjacency matrix, transition matrix, and Laplacian matrix. It then discusses properties like the stationary distribution and Perron-Frobenius theorem. Random walks are related to electrical networks, where hitting times correspond to voltages. Commute times and Laplacians are also connected. Applications include PageRank and recommender systems that use proximity measures from random walks. The document outlines key topics and provides examples to explain random walk concepts and their significance.
Theoretical picture: magnetic impurities, Zener model, mean-field theoryABDERRAHMANE REGGAD
The document summarizes the theoretical picture of dilute magnetic semiconductors (DMS). It describes the Zener model where magnetic impurities interact with charge carriers via exchange interaction. It then discusses the mean field approximation used to calculate the Curie temperature. For higher doping concentrations, a virtual crystal approximation is used to replace impurity spins with a smooth spin density. The model explains several experimental observations but cannot explain some properties like the shape of magnetization curves. At very low doping, a bound magnetic polaron model applies where carriers hop between localized acceptor levels aligned with impurity spins.
The document discusses using CT scanning and 3D shape analysis to classify carbonate rock pores. It introduces CT scanning workflow and principles, showing how it provides 3D quantitative and qualitative pore structure data. Pore shapes are mathematically described using ellipsoid fitting of principal moments of inertia to calculate dimensions L, I, and S. Shape classes are then defined based on ratios of these dimensions. The analysis aims to better characterize carbonate reservoir heterogeneity at different scales.
Point defects such as vacancies and self-interstitials are common imperfections in crystalline solids that occur during processing or from applied stresses. Vacancy concentration can be calculated using statistical mechanics and is proportional to exp(-ΔHf/kT), where ΔHf is the enthalpy of vacancy formation. Dislocations are linear defects that enable plastic deformation through slip processes. They allow metals to deform with only minor bond breaking, providing both strength and ductility. Grain boundaries introduce discontinuities that impede dislocation motion, strengthening materials according to the Hall-Petch relationship as grain size decreases.
Monte Carlo simulations are used in measurement dosimetry to determine correction factors for detectors. The kQ factors in TG-51 are calculated using Monte Carlo techniques. Monte Carlo codes must use accurate cross sections and geometry descriptions to accurately calculate detector responses. Variance reduction techniques are needed to efficiently simulate rare events and reduce uncertainties when using Monte Carlo for dosimetry calculations.
The document compares two methods for checking tight contact structures on the solid torus: hand calculations and permutations. It outlines generating arcs and arclists, checking for tightness and bypasses, and applying each method. Future work includes publishing the findings, extending the algorithm to more complex surfaces, and searching for formulas to handle additional dividing curves.
This document contains various sections on geometry topics including working warm-up problems about writing equations involving angle pairs formed by parallel lines cut by a transversal. It also lists common core standards about transformations of geometric figures and using properties of parallel lines cut by transversals to establish facts about angles. Finally, it reminds students that their exam is on Thursday and includes a study guide they should complete without talking.
This lecture discusses nanocarbon materials including C60 buckyballs, carbon nanotubes (CNTs), and graphene. Methods for synthesizing and studying these materials using techniques like chemical vapor deposition and electron beam lithography are presented. The key properties of graphene like its relativistic quantum mechanical behavior and electron transport are examined. The structure and band structure of carbon nanotubes are defined and their relationship to the graphene sheet is explored.
This document summarizes a research paper that develops a mathematical model for analyzing the three-dimensional shape of a long twisted rod hanging under gravity, such as a pipeline being laid from a barge. The model uses the geometrically exact theory of linear elastic rods and formulates the problem as a boundary value problem that is solved using matched asymptotic expansions. The truncated analytical solution is compared to results from a numerical scheme and shows good agreement. The method is then applied to consider the near-catenary shape of a clamped pipeline during the laying process.
This document provides an overview of crystallography. It defines key terms like crystalline solids, unit cell, space lattice, and basis. Crystalline solids have long-range order of atoms while amorphous solids do not. There are 7 crystal systems based on lattice parameters. Miller indices (hkl) are used to describe planes in a crystal lattice. Bragg's law relates the wavelength of X-rays to the diffraction pattern produced by the crystal structure. Common defects in crystal structures are discussed like vacancies, interstitials, and Frenkel and Schottky defects. Methods for determining crystal structures include X-ray crystallography and powder diffraction.
Ch-27.1 Basic concepts on structure of solids.pptxksysbaysyag
The document discusses various topics related to materials science including:
1. Common crystal structures of metals such as FCC, BCC, and HCP and how some metals can change structure with temperature.
2. Plastic deformation in metals occurs through slip and twinning which involve the movement of atoms along crystallographic planes.
3. Atomic structure consists of electrons surrounding the nucleus in shells and the number of valence electrons influence material properties and bonding.
4. Primary bonding types are ionic, covalent, and metallic which influence properties like strength, conductivity, and deformation behavior.
The document discusses several topics related to the electronic structures of atoms and electromagnetic radiation:
1. It defines wavelength and frequency of electromagnetic radiation and describes the relationship between them.
2. It discusses Max Planck's realization that energy is quantized and light has particle characteristics based on his study of blackbody radiation.
3. It explains Bohr's model of the hydrogen atom which incorporated Planck's quantum theory and correctly explained hydrogen's emission spectrum using discrete energy levels. However, the model failed for other elements.
The document discusses several topics related to electronic properties of materials including:
1. Insulators, charge transport theory, localized and delocalized wave functions, and excitons.
2. Energy bands in semiconductors, doping, holes, and band structure diagrams.
3. Density functional theory, the Hohenberg-Kohn theorem, Kohn-Sham scheme, and applications to molecular dynamics.
4. Additional sections cover amorphous semiconductors, transport between isolated molecules, and excitons. One-dimensional systems and the Peierls distortion are also mentioned.
This document contains information about angles and geometry concepts including:
1) Common Core standards related to congruence, similarity, rotations, reflections, and translations of geometric figures.
2) Questions about the definitions of vertical angles, corresponding angles, and supplementary angles.
3) A diagram labeling different angles and instructions for students to complete an assessment on related geometry topics.
1. A crystal structure consists of a periodic arrangement of atoms or molecules in three dimensions. The periodic positions of the atoms form a lattice known as the space or crystal lattice. (2)
2. There are two main types of crystal defects - point defects which involve missing or additional atoms at lattice sites, and line defects which involve misalignment or disruption of planes of atoms like dislocations. Point defects include vacancies, interstitials, and impurities while line defects include edge and screw dislocations. (3)
3. Different techniques can be used to determine crystal structures including X-ray diffraction methods like the Laue method which uses polychromatic radiation on a stationary crystal, the rotating crystal method
Attacking the TEKS: Focus on Atomic Theory presented by Jane Smith, ACT2 2010
This session will expose you to the new TEKS and College Readiness Standards. Ideas for sequencing and planning the unit will be shared along with tips for appropriate demos, labs, and assessments. The intended audience is for teachers with 3 or less years of experience or anyone who wants to delve deeper into the new standards.
The document discusses the basics of finite element analysis (FEA). It explains that FEA involves breaking a physical object down into small pieces or elements, then using a numerical technique to analyze them. Key steps in FEA include preprocessing like meshing the geometry, applying boundary conditions and material properties, solving the system of equations generated, and postprocessing to view results like displacements and stresses. An example problem of analyzing a plate under load is presented to illustrate the FEA formulation and solution process.
The document summarizes key concepts from Chapter 6 of the textbook, including:
1) Modern atomic theory arose from studies of radiation interacting with matter, and electromagnetic radiation has characteristic wavelengths and frequencies.
2) Planck proposed that atoms can only absorb or emit energy in discrete quanta, proportional to frequency via Planck's constant.
3) Einstein assumed light is composed of discrete energy packets called photons, helping explain the photoelectric effect.
4) Bohr incorporated Planck's quantization idea into his atomic model, where electrons orbit in distinct energy levels corresponding to line spectra wavelengths.
5) Later models including de Broglie's matter waves, Heisenberg's uncertainty principle, and
Random walks on graphs - link prediction by Rouhollah Nabatinabati
This document provides an overview of random walks on graphs and their applications. It begins with basic definitions such as adjacency matrix, transition matrix, and Laplacian matrix. It then discusses properties like the stationary distribution and Perron-Frobenius theorem. Random walks are related to electrical networks, where hitting times correspond to voltages. Commute times and Laplacians are also connected. Applications include PageRank and recommender systems that use proximity measures from random walks. The document outlines key topics and provides examples to explain random walk concepts and their significance.
Theoretical picture: magnetic impurities, Zener model, mean-field theoryABDERRAHMANE REGGAD
The document summarizes the theoretical picture of dilute magnetic semiconductors (DMS). It describes the Zener model where magnetic impurities interact with charge carriers via exchange interaction. It then discusses the mean field approximation used to calculate the Curie temperature. For higher doping concentrations, a virtual crystal approximation is used to replace impurity spins with a smooth spin density. The model explains several experimental observations but cannot explain some properties like the shape of magnetization curves. At very low doping, a bound magnetic polaron model applies where carriers hop between localized acceptor levels aligned with impurity spins.
The document discusses using CT scanning and 3D shape analysis to classify carbonate rock pores. It introduces CT scanning workflow and principles, showing how it provides 3D quantitative and qualitative pore structure data. Pore shapes are mathematically described using ellipsoid fitting of principal moments of inertia to calculate dimensions L, I, and S. Shape classes are then defined based on ratios of these dimensions. The analysis aims to better characterize carbonate reservoir heterogeneity at different scales.
Point defects such as vacancies and self-interstitials are common imperfections in crystalline solids that occur during processing or from applied stresses. Vacancy concentration can be calculated using statistical mechanics and is proportional to exp(-ΔHf/kT), where ΔHf is the enthalpy of vacancy formation. Dislocations are linear defects that enable plastic deformation through slip processes. They allow metals to deform with only minor bond breaking, providing both strength and ductility. Grain boundaries introduce discontinuities that impede dislocation motion, strengthening materials according to the Hall-Petch relationship as grain size decreases.
Monte Carlo simulations are used in measurement dosimetry to determine correction factors for detectors. The kQ factors in TG-51 are calculated using Monte Carlo techniques. Monte Carlo codes must use accurate cross sections and geometry descriptions to accurately calculate detector responses. Variance reduction techniques are needed to efficiently simulate rare events and reduce uncertainties when using Monte Carlo for dosimetry calculations.
THE LATTICE BOLTZMANN METHOD IN SOLVING RADIATIVE HEAT TRANSFER IN A PARTICIP...
Contact Topology Argonne
1. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Programming an Algorithm on Calculating the
Number of Tight Contact Structures on the
Solid Torus
Argonne Symposium – Argonne National Laboratory
Christopher L. Toni Kelly Hirschbeck Nathan Walter
William Krepelin Donald Barkley William Byrd
John Wallin Mayra Bravo-Gonzalez Banlieman Kolani
Dr. Tanya Cofer
November 13, 2009
Christopher L. Toni
Computational Contact Topology 1 / 21
2. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Outline
Introduction
Arcs and Arclists
Tightness Checking
Bypasses
Final Results and Thoughts
Christopher L. Toni
Computational Contact Topology 2 / 21
3. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
What is Topology?
Topology is a field of mathematics that does not focus on an
object’s shape, but the properties that remain consistent
through deformations like:
Christopher L. Toni
Computational Contact Topology 3 / 21
4. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
What is Topology?
Topology is a field of mathematics that does not focus on an
object’s shape, but the properties that remain consistent
through deformations like:
1. twisting
Christopher L. Toni
Computational Contact Topology 3 / 21
5. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
What is Topology?
Topology is a field of mathematics that does not focus on an
object’s shape, but the properties that remain consistent
through deformations like:
1. twisting
2. bending
Christopher L. Toni
Computational Contact Topology 3 / 21
6. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
What is Topology?
Topology is a field of mathematics that does not focus on an
object’s shape, but the properties that remain consistent
through deformations like:
1. twisting
2. bending
3. stretching
Christopher L. Toni
Computational Contact Topology 3 / 21
7. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
What is Topology?
Topology is a field of mathematics that does not focus on an
object’s shape, but the properties that remain consistent
through deformations like:
1. twisting
2. bending
3. stretching
To illustrate this, visualize a coffee cup and a doughnut (torus).
Christopher L. Toni
Computational Contact Topology 3 / 21
8. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
What is Topology? (cont.)
The torus and the coffee cup are topologically equivalent
objects. We see above that through bending and stretching, the
torus can be morphed into a coffee cup and vice versa.
Christopher L. Toni
Computational Contact Topology 4 / 21
9. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Formulating the Problem
On the solid torus (defined by 1 2 ), dividing curves are
located where twisting planes switch from positive to negative.
Christopher L. Toni
Computational Contact Topology 5 / 21
10. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Formulating the Problem
On the solid torus (defined by 1 2 ), dividing curves are
located where twisting planes switch from positive to negative.
Christopher L. Toni
Computational Contact Topology 5 / 21
11. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Formulating the Problem
On the solid torus (defined by 1 2 ), dividing curves are
located where twisting planes switch from positive to negative.
These dividing curves keep track of and allow for investigation
of certain topological properties in the neighborhood of a
surface.
Christopher L. Toni
Computational Contact Topology 5 / 21
12. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Formulating the Problem (cont.)
Christopher L. Toni
Computational Contact Topology 6 / 21
13. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Formulating the Problem (cont.)
We define n to be the number of dividing curves, p to be the
number of times the dividing curves are wrapped about the
longitudinal section of the torus, and q to be the number of
times the dividing curves are wrapped about the meridinal
section of the torus.
Christopher L. Toni
Computational Contact Topology 6 / 21
14. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Overview
The first computational task is to generate arclists for a given
number of vertices M, where M np.
Christopher L. Toni
Computational Contact Topology 7 / 21
15. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Overview
The first computational task is to generate arclists for a given
number of vertices M, where M np.
Definition
An arc is a path between vertices subject to:
Christopher L. Toni
Computational Contact Topology 7 / 21
16. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Overview
The first computational task is to generate arclists for a given
number of vertices M, where M np.
Definition
An arc is a path between vertices subject to:
1. All M vertices in a configuration must be paired
Christopher L. Toni
Computational Contact Topology 7 / 21
17. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Overview
The first computational task is to generate arclists for a given
number of vertices M, where M np.
Definition
An arc is a path between vertices subject to:
1. All M vertices in a configuration must be paired
2. Paths cannot cross
Christopher L. Toni
Computational Contact Topology 7 / 21
18. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Overview
The first computational task is to generate arclists for a given
number of vertices M, where M np.
Definition
An arc is a path between vertices subject to:
1. All M vertices in a configuration must be paired
2. Paths cannot cross
An arclist is a set (list) of legal pairs of arcs.
Christopher L. Toni
Computational Contact Topology 7 / 21
19. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Overview
The first computational task is to generate arclists for a given
number of vertices M, where M np.
Definition
An arc is a path between vertices subject to:
1. All M vertices in a configuration must be paired
2. Paths cannot cross
An arclist is a set (list) of legal pairs of arcs.
We can think of arclists for M vertices as certain permutations
of M objects.
Christopher L. Toni
Computational Contact Topology 7 / 21
20. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Overview
The first computational task is to generate arclists for a given
number of vertices M, where M np.
Definition
An arc is a path between vertices subject to:
1. All M vertices in a configuration must be paired
2. Paths cannot cross
An arclist is a set (list) of legal pairs of arcs.
We can think of arclists for M vertices as certain permutations
of M objects.The solution is to “walk” a new element through
the solution set for a smaller problem.
Christopher L. Toni
Computational Contact Topology 7 / 21
21. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Overview
The first computational task is to generate arclists for a given
number of vertices M, where M np.
Definition
An arc is a path between vertices subject to:
1. All M vertices in a configuration must be paired
2. Paths cannot cross
An arclist is a set (list) of legal pairs of arcs.
We can think of arclists for M vertices as certain permutations
of M objects.The solution is to “walk” a new element through
the solution set for a smaller problem. There is one challenge:
the algorithm is space and time intensive!
Christopher L. Toni
Computational Contact Topology 7 / 21
22. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Algorithm - Arcs and Arclist
Christopher L. Toni
Computational Contact Topology 8 / 21
23. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Algorithm - Arcs and Arclist
Christopher L. Toni
Computational Contact Topology 8 / 21
24. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Algorithm Output - Arcs and Arclists
For the case of n 2, p 4, q 3, we have M np 2 4 8.
Christopher L. Toni
Computational Contact Topology 9 / 21
25. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Algorithm Output - Arcs and Arclists
For the case of n 2, p 4, q 3, we have M np 2 4 8.
The arclists for M 8 vertices are:
Christopher L. Toni
Computational Contact Topology 9 / 21
26. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Algorithm Output - Arcs and Arclists
For the case of n 2, p 4, q 3, we have M np 2 4 8.
The arclists for M 8 vertices are:
(0 1)(2 5)(3 4)(6 7)
(0 1)(2 7)(3 4)(5 6)
(0 3)(1 2)(4 5)(6 7)
(0 1)(2 3)(4 5)(6 7)
(0 1)(2 7)(3 6)(4 5)
(0 3)(1 2)(4 7)(5 6)
(0 7)(1 2)(3 4)(5 6)
Christopher L. Toni
Computational Contact Topology 9 / 21
27. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Algorithm Output - Arcs and Arclists
For the case of n 2, p 4, q 3, we have M np 2 4 8.
The arclists for M 8 vertices are:
(0 1)(2 5)(3 4)(6 7) (0 5)(1 2)(3 4)(6 7)
(0 1)(2 7)(3 4)(5 6) (0 7)(1 4)(2 3)(5 6)
(0 3)(1 2)(4 5)(6 7) (0 1)(2 3)(4 7)(5 6)
(0 1)(2 3)(4 5)(6 7) (0 5)(1 4)(2 3)(6 7)
(0 1)(2 7)(3 6)(4 5) (0 7)(1 2)(3 6)(4 5)
(0 3)(1 2)(4 7)(5 6) (0 7)(1 6)(2 5)(3 4)
(0 7)(1 2)(3 4)(5 6) (0 7)(1 6)(2 3)(4 5)
Christopher L. Toni
Computational Contact Topology 9 / 21
28. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Algorithm Output - Arcs and Arclists
For the case of n 2, p 4, q 3, we have M np 2 4 8.
The arclists for M 8 vertices are:
(0 1)(2 5)(3 4)(6 7) (0 5)(1 2)(3 4)(6 7)
(0 1)(2 7)(3 4)(5 6) (0 7)(1 4)(2 3)(5 6)
(0 3)(1 2)(4 5)(6 7) (0 1)(2 3)(4 7)(5 6)
(0 1)(2 3)(4 5)(6 7) (0 5)(1 4)(2 3)(6 7)
(0 1)(2 7)(3 6)(4 5) (0 7)(1 2)(3 6)(4 5)
(0 3)(1 2)(4 7)(5 6) (0 7)(1 6)(2 5)(3 4)
(0 7)(1 2)(3 4)(5 6) (0 7)(1 6)(2 3)(4 5)
Data files for required values of M were produced and saved.
These files were then used as input to the Tightness Checking
module.
Christopher L. Toni
Computational Contact Topology 9 / 21
29. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Overview - Tightness Checker
Once the arclists are found, it is possible to determine how the
vertices on the left and right cutting disks match up.
Christopher L. Toni
Computational Contact Topology 10 / 21
30. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Overview - Tightness Checker
Once the arclists are found, it is possible to determine how the
vertices on the left and right cutting disks match up.
The formula x x nq 1 mod np maps the vertices on the left
cutting disk to the right cutting disk.
Christopher L. Toni
Computational Contact Topology 10 / 21
31. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Overview - Tightness Checker
Once the arclists are found, it is possible to determine how the
vertices on the left and right cutting disks match up.
The formula x x nq 1 mod np maps the vertices on the left
cutting disk to the right cutting disk.
The formula x x nq 1 mod np maps the vertices on the
right cutting disk to the left cutting disk.
Christopher L. Toni
Computational Contact Topology 10 / 21
32. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Overview - Tightness Checker
Once the arclists are found, it is possible to determine how the
vertices on the left and right cutting disks match up.
The formula x x nq 1 mod np maps the vertices on the left
cutting disk to the right cutting disk.
The formula x x nq 1 mod np maps the vertices on the
right cutting disk to the left cutting disk.
To determine if the torus admits a tight or overtwisted contact
structure, the dividing curves and arcs need to be analyzed.
Christopher L. Toni
Computational Contact Topology 10 / 21
33. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Overview - Tightness Checker (cont.)
Christopher L. Toni
Computational Contact Topology 11 / 21
34. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Overview - Tightness Checker (cont.)
If a single closed curve can be
traced on the torus, it is
considered to be a potentially
tight contact structure.
Christopher L. Toni
Computational Contact Topology 11 / 21
35. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Overview - Tightness Checker (cont.)
If a single closed curve can be If more than one closed curve
traced on the torus, it is can be traced on the torus, it
considered to be a potentially is considered to be an
tight contact structure. overtwisted structure.
Christopher L. Toni
Computational Contact Topology 11 / 21
36. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Algorithm - Tightness Checker
Christopher L. Toni
Computational Contact Topology 12 / 21
37. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Algorithm - Tightness Checker
All vertices hook up to a single
curve. Thus, the structure is
potentially tight.
Christopher L. Toni
Computational Contact Topology 12 / 21
38. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Algorithm - Tightness Checker
All vertices hook up to a single Only a few vertices hook up to
curve. Thus, the structure is a curve. Thus, the structure is
potentially tight. overtwisted.
Christopher L. Toni
Computational Contact Topology 12 / 21
39. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Algorithm Output - Tightness Checker
Consider M np 8.
Christopher L. Toni
Computational Contact Topology 13 / 21
40. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Algorithm Output - Tightness Checker
Consider M np 8. Given the arclist (0 1)(2 7)(3 6)(4 5) ,
the left cutting disk hooks up with the right cutting disk as
follows:
Christopher L. Toni
Computational Contact Topology 13 / 21
41. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Algorithm Output - Tightness Checker
Consider M np 8. Given the arclist (0 1)(2 7)(3 6)(4 5) ,
the left cutting disk hooks up with the right cutting disk as
follows:
0 0 5 mod 8 3 4 4 5 mod 8 7
1 1 5 mod 8 4 5 5 5 mod 8 0
2 2 5 mod 8 5 6 6 5 mod 8 1
3 3 5 mod 8 6 7 7 5 mod 8 2
Christopher L. Toni
Computational Contact Topology 13 / 21
42. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Algorithm Output - Tightness Checker
Consider M np 8. Given the arclist (0 1)(2 7)(3 6)(4 5) ,
the left cutting disk hooks up with the right cutting disk as
follows:
0 0 5 mod 8 3 4 4 5 mod 8 7
1 1 5 mod 8 4 5 5 5 mod 8 0
2 2 5 mod 8 5 6 6 5 mod 8 1
3 3 5 mod 8 6 7 7 5 mod 8 2
Using the arclist as a guide, the output be a list of numbers
Christopher L. Toni
Computational Contact Topology 13 / 21
43. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Algorithm Output - Tightness Checker
Consider M np 8. Given the arclist (0 1)(2 7)(3 6)(4 5) ,
the left cutting disk hooks up with the right cutting disk as
follows:
0 0 5 mod 8 3 4 4 5 mod 8 7
1 1 5 mod 8 4 5 5 5 mod 8 0
2 2 5 mod 8 5 6 6 5 mod 8 1
3 3 5 mod 8 6 7 7 5 mod 8 2
Using the arclist as a guide, the output be a list of numbers
03636105472725410
Christopher L. Toni
Computational Contact Topology 13 / 21
44. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Algorithm Output - Tightness Checker
Consider M np 8. Given the arclist (0 1)(2 7)(3 6)(4 5) ,
the left cutting disk hooks up with the right cutting disk as
follows:
0 0 5 mod 8 3 4 4 5 mod 8 7
1 1 5 mod 8 4 5 5 5 mod 8 0
2 2 5 mod 8 5 6 6 5 mod 8 1
3 3 5 mod 8 6 7 7 5 mod 8 2
Using the arclist as a guide, the output be a list of numbers
03636105472725410
0 36 36 10 54 72 72 54 10
Christopher L. Toni
Computational Contact Topology 13 / 21
45. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Algorithm Output - Tightness Checker (cont.)
Consider M np 8.
Christopher L. Toni
Computational Contact Topology 14 / 21
46. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Algorithm Output - Tightness Checker (cont.)
Consider M np 8. Given the arclist (0 7)(1 4)(2 3)(5 6) ,
the left cutting disk hooks up with the right cutting disk as
follows:
Christopher L. Toni
Computational Contact Topology 14 / 21
47. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Algorithm Output - Tightness Checker (cont.)
Consider M np 8. Given the arclist (0 7)(1 4)(2 3)(5 6) ,
the left cutting disk hooks up with the right cutting disk as
follows:
0 0 5 mod 8 3 4 4 5 mod 8 7
1 1 5 mod 8 4 5 5 5 mod 8 0
2 2 5 mod 8 5 6 6 5 mod 8 1
3 3 5 mod 8 6 7 7 5 mod 8 2
Christopher L. Toni
Computational Contact Topology 14 / 21
48. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Algorithm Output - Tightness Checker (cont.)
Consider M np 8. Given the arclist (0 7)(1 4)(2 3)(5 6) ,
the left cutting disk hooks up with the right cutting disk as
follows:
0 0 5 mod 8 3 4 4 5 mod 8 7
1 1 5 mod 8 4 5 5 5 mod 8 0
2 2 5 mod 8 5 6 6 5 mod 8 1
3 3 5 mod 8 6 7 7 5 mod 8 2
Using the arclist as a guide, the output be a list of numbers
Christopher L. Toni
Computational Contact Topology 14 / 21
49. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Algorithm Output - Tightness Checker (cont.)
Consider M np 8. Given the arclist (0 7)(1 4)(2 3)(5 6) ,
the left cutting disk hooks up with the right cutting disk as
follows:
0 0 5 mod 8 3 4 4 5 mod 8 7
1 1 5 mod 8 4 5 5 5 mod 8 0
2 2 5 mod 8 5 6 6 5 mod 8 1
3 3 5 mod 8 6 7 7 5 mod 8 2
Using the arclist as a guide, the output be a list of numbers
0327032703270
Christopher L. Toni
Computational Contact Topology 14 / 21
50. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Algorithm Output - Tightness Checker (cont.)
Consider M np 8. Given the arclist (0 7)(1 4)(2 3)(5 6) ,
the left cutting disk hooks up with the right cutting disk as
follows:
0 0 5 mod 8 3 4 4 5 mod 8 7
1 1 5 mod 8 4 5 5 5 mod 8 0
2 2 5 mod 8 5 6 6 5 mod 8 1
3 3 5 mod 8 6 7 7 5 mod 8 2
Using the arclist as a guide, the output be a list of numbers
0327032703270
0 32 70 32 70 32 70
Christopher L. Toni
Computational Contact Topology 14 / 21
51. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Brief Overview - Bypasses
A bypass exists when a line can be drawn through three arcs
on a cutting disk.
Christopher L. Toni
Computational Contact Topology 15 / 21
52. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Brief Overview - Bypasses
A bypass exists when a line can be drawn through three arcs
on a cutting disk.
Christopher L. Toni
Computational Contact Topology 15 / 21
53. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Brief Overview - Bypasses
A bypass exists when a line can be drawn through three arcs
on a cutting disk.
There are two possible
bypasses on this cutting disk.
Christopher L. Toni
Computational Contact Topology 15 / 21
54. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Brief Overview - Bypasses
A bypass exists when a line can be drawn through three arcs
on a cutting disk.
There are two possible There are no possible
bypasses on this cutting disk. bypasses on this cutting disk.
Christopher L. Toni
Computational Contact Topology 15 / 21
55. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Brief Overview - Bypasses (cont.)
When a bypass is performed, it produces an already existing
arclist!
Christopher L. Toni
Computational Contact Topology 16 / 21
56. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Brief Overview - Bypasses (cont.)
When a bypass is performed, it produces an already existing
arclist!
This is crucial in determining if these arclists form a tight
contact structure on the torus.
Christopher L. Toni
Computational Contact Topology 16 / 21
57. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Brief Overview - Bypasses (cont.)
When a bypass is performed, it produces an already existing
arclist!
This is crucial in determining if these arclists form a tight
contact structure on the torus.
The bypass can be viewed as an equivalence relation
between arclists.
Christopher L. Toni
Computational Contact Topology 16 / 21
58. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Brief Overview - Bypasses (cont.)
When a bypass is performed, it produces an already existing
arclist!
This is crucial in determining if these arclists form a tight
contact structure on the torus.
The bypass can be viewed as an equivalence relation
between arclists.
If one arclist is overtwisted in an equivalence class, the entire
equivalence class is associated to an overtwisted structure.
Christopher L. Toni
Computational Contact Topology 16 / 21
59. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Brief Overview - Bypasses (cont.)
When a bypass is performed, it produces an already existing
arclist!
This is crucial in determining if these arclists form a tight
contact structure on the torus.
The bypass can be viewed as an equivalence relation
between arclists.
If one arclist is overtwisted in an equivalence class, the entire
equivalence class is associated to an overtwisted structure.This
saves time in the calculation process.
Christopher L. Toni
Computational Contact Topology 16 / 21
60. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Results and Conclusions
1. Formula for computing the number of arclists for a given
number of vertices and web implementation of this formula.
Christopher L. Toni
Computational Contact Topology 17 / 21
61. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Results and Conclusions
1. Formula for computing the number of arclists for a given
number of vertices and web implementation of this formula.
2. Software module to produce arclists For various number of
vertices.
Christopher L. Toni
Computational Contact Topology 17 / 21
62. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Results and Conclusions
1. Formula for computing the number of arclists for a given
number of vertices and web implementation of this formula.
2. Software module to produce arclists For various number of
vertices.
3. Modification of succeeding software modules (bypass and
tightness checking) to read these arclists as input.
Christopher L. Toni
Computational Contact Topology 17 / 21
63. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Results and Conclusions
1. Formula for computing the number of arclists for a given
number of vertices and web implementation of this formula.
2. Software module to produce arclists For various number of
vertices.
3. Modification of succeeding software modules (bypass and
tightness checking) to read these arclists as input.
4. Manually produced algorithms and results sets for various
values of n, p, q to be used for software testing.
Christopher L. Toni
Computational Contact Topology 17 / 21
64. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Results and Conclusions (cont.)
N2 1 N 22 58786
N4 2 N 24 208012
N6 5 N 26 742900
N8 14 N 28 2674440
N 10 42 N 30 9694845
N 12 132 N 32 35357670
N 14 429 N 34 129644790
N 16 1430 N 36 477638700
N 18 4862 N 38 1767263190
N 20 16796 N 40 6564120420
Christopher L. Toni
Computational Contact Topology 18 / 21
65. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Results and Conclusions (cont.)
N2 1 N 22 58786
N4 2 N 24 208012
N6 5 N 26 742900
N8 14 N 28 2674440
N 10 42 N 30 9694845
N 12 132 N 32 35357670
N 14 429 N 34 129644790
N 16 1430 N 36 477638700
N 18 4862 N 38 1767263190
N 20 16796 N 40 6564120420
Note that the number of arclists increase rapidly as the number
of vertices get larger. At M 28, its well over a million!
Christopher L. Toni
Computational Contact Topology 18 / 21
66. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Recent Findings
Instead of approching this problem from a combinatorial
standpoint, we now introduce a “simpler” way of generating
arclists, bypasses, and checking for tightness.
Christopher L. Toni
Computational Contact Topology 19 / 21
67. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Recent Findings
Instead of approching this problem from a combinatorial
standpoint, we now introduce a “simpler” way of generating
arclists, bypasses, and checking for tightness.
The problem can be tackled using permutation matrices!!!
Christopher L. Toni
Computational Contact Topology 19 / 21
68. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Future Research
Future goals include, but not limited to:
Christopher L. Toni
Computational Contact Topology 20 / 21
69. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Future Research
Future goals include, but not limited to:
1. Publication of Findings in Undergraduate Journal
Christopher L. Toni
Computational Contact Topology 20 / 21
70. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Future Research
Future goals include, but not limited to:
1. Publication of Findings in Undergraduate Journal
2. Extension of Algorithm to the two-holed torus
Christopher L. Toni
Computational Contact Topology 20 / 21
71. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Future Research
Future goals include, but not limited to:
1. Publication of Findings in Undergraduate Journal
2. Extension of Algorithm to the two-holed torus
3. Enhance software (requiring a reduced memory footprint)
to produce results for larger number of vertices.
Christopher L. Toni
Computational Contact Topology 20 / 21
72. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Acknowledgements
We would like to thank:
Christopher L. Toni
Computational Contact Topology 21 / 21
73. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Acknowledgements
We would like to thank:
The SCSE (Dept. of Education) for funding the research
over summer.
Christopher L. Toni
Computational Contact Topology 21 / 21
74. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Acknowledgements
We would like to thank:
The SCSE (Dept. of Education) for funding the research
over summer.
Christopher L. Toni
Computational Contact Topology 21 / 21
75. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Acknowledgements
We would like to thank:
The SCSE (Dept. of Education) for funding the research
over summer.
Dr. Tanya Cofer for leading us through tough concepts and
tedious calculations.
Christopher L. Toni
Computational Contact Topology 21 / 21
76. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Acknowledgements
We would like to thank:
The SCSE (Dept. of Education) for funding the research
over summer.
Dr. Tanya Cofer for leading us through tough concepts and
tedious calculations.
Donald Barkley for helping us program the algorithms in
Java.
Christopher L. Toni
Computational Contact Topology 21 / 21
77. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Acknowledgements
We would like to thank:
The SCSE (Dept. of Education) for funding the research
over summer.
Dr. Tanya Cofer for leading us through tough concepts and
tedious calculations.
Donald Barkley for helping us program the algorithms in
Java.
Argonne National Laboratory for giving me the opportunity
of presenting my group’s summer research.
Christopher L. Toni
Computational Contact Topology 21 / 21
78. Introduction Arcs and Arclists Tightness Checking Bypasses Final Results and Thoughts
Acknowledgements
We would like to thank:
The SCSE (Dept. of Education) for funding the research
over summer.
Dr. Tanya Cofer for leading us through tough concepts and
tedious calculations.
Donald Barkley for helping us program the algorithms in
Java.
Argonne National Laboratory for giving me the opportunity
of presenting my group’s summer research.
Christopher L. Toni
Computational Contact Topology 21 / 21