Sizes of spaces of triangulations of 4-manifold and balanced presentations of the trivial group

2019 ◽  
Vol 11 (02) ◽  
pp. 311-347 ◽  
Author(s):  
Boris Lishak ◽  
Alexander Nabutovsky

Let [Formula: see text] be any compact four-dimensional PL-manifold with or without boundary (e.g. the four-dimensional sphere or ball). Consider the space [Formula: see text] of all simplicial isomorphism classes of triangulations of [Formula: see text] endowed with the metric defined as follows: the distance between a pair of triangulations is the minimal number of bistellar transformations required to transform one of the triangulations into the other. Our main result is the existence of an absolute constant [Formula: see text] such that for every [Formula: see text] and all sufficiently large [Formula: see text] there exist more than [Formula: see text] triangulations of [Formula: see text] with at most [Formula: see text] simplices such that pairwise distances between them are greater than [Formula: see text] ([Formula: see text] times). This result follows from a similar result for the space of all balanced presentations of the trivial group. (“Balanced” means that the number of generators equals to the number of relations). This space is endowed with the metric defined as the minimal number of Tietze transformations between finite presentations. We prove a similar exponential lower bound for the number of balanced presentations of length [Formula: see text] with four generators that are pairwise [Formula: see text]-far from each other. If one does not fix the number of generators, then we establish a super-exponential lower bound [Formula: see text] for the number of balanced presentations of length [Formula: see text] that are [Formula: see text]-far from each other.

2021 ◽  
Vol 15 (5) ◽  
pp. 1-32
Author(s):  
Quang-huy Duong ◽  
Heri Ramampiaro ◽  
Kjetil Nørvåg ◽  
Thu-lan Dam

Dense subregion (subgraph & subtensor) detection is a well-studied area, with a wide range of applications, and numerous efficient approaches and algorithms have been proposed. Approximation approaches are commonly used for detecting dense subregions due to the complexity of the exact methods. Existing algorithms are generally efficient for dense subtensor and subgraph detection, and can perform well in many applications. However, most of the existing works utilize the state-or-the-art greedy 2-approximation algorithm to capably provide solutions with a loose theoretical density guarantee. The main drawback of most of these algorithms is that they can estimate only one subtensor, or subgraph, at a time, with a low guarantee on its density. While some methods can, on the other hand, estimate multiple subtensors, they can give a guarantee on the density with respect to the input tensor for the first estimated subsensor only. We address these drawbacks by providing both theoretical and practical solution for estimating multiple dense subtensors in tensor data and giving a higher lower bound of the density. In particular, we guarantee and prove a higher bound of the lower-bound density of the estimated subgraph and subtensors. We also propose a novel approach to show that there are multiple dense subtensors with a guarantee on its density that is greater than the lower bound used in the state-of-the-art algorithms. We evaluate our approach with extensive experiments on several real-world datasets, which demonstrates its efficiency and feasibility.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
R. A. Abdelghany ◽  
A.-B. A. Mohamed ◽  
M. Tammam ◽  
Watson Kuo ◽  
H. Eleuch

AbstractWe formulate the tripartite entropic uncertainty relation and predict its lower bound in a three-qubit Heisenberg XXZ spin chain when measuring an arbitrary pair of incompatible observables on one qubit while the other two are served as quantum memories. Our study reveals that the entanglement between the nearest neighbors plays an important role in reducing the uncertainty in measurement outcomes. In addition we have shown that the Dolatkhah’s lower bound (Phys Rev A 102(5):052227, 2020) is tighter than that of Ming (Phys Rev A 102(01):012206, 2020) and their dynamics under phase decoherence depends on the choice of the observable pair. In the absence of phase decoherence, Ming’s lower bound is time-invariant regardless the chosen observable pair, while Dolatkhah’s lower bound is perfectly identical with the tripartite uncertainty with a specific choice of pair.


1970 ◽  
Vol 37 (2) ◽  
pp. 267-270 ◽  
Author(s):  
D. Pnueli

A method is presented to obtain both upper and lower bound to eigenvalues when a variational formulation of the problem exists. The method consists of a systematic shift in the weight function. A detailed procedure is offered for one-dimensional problems, which makes improvement of the bounds possible, and which involves the same order of detailed computation as the Rayleigh-Ritz method. The main contribution of this method is that it yields the “other bound;” i.e., the one which cannot be obtained by the Rayleigh-Ritz method.


2021 ◽  
Vol 12 (3) ◽  
pp. 150-156
Author(s):  
A. V. Galatenko ◽  
◽  
V. A. Kuzovikhina ◽  

We propose an automata model of computer system security. A system is represented by a finite automaton with states partitioned into two subsets: "secure" and "insecure". System functioning is secure if the number of consecutive insecure states is not greater than some nonnegative integer k. This definition allows one to formally reflect responsiveness to security breaches. The number of all input sequences that preserve security for the given value of k is referred to as a k-secure language. We prove that if a language is k-secure for some natural and automaton V, then it is also k-secure for any 0 < k < k and some automaton V = V (k). Reduction of the value of k is performed at the cost of amplification of the number of states. On the other hand, for any non-negative integer k there exists a k-secure language that is not k"-secure for any natural k" > k. The problem of reconstruction of a k-secure language using a conditional experiment is split into two subcases. If the cardinality of an input alphabet is bound by some constant, then the order of Shannon function of experiment complexity is the same for al k; otherwise there emerges a lower bound of the order nk.


10.37236/4656 ◽  
2015 ◽  
Vol 22 (1) ◽  
Author(s):  
Mark Lewko
Keyword(s):  

Let $D(n)$ denote the cardinality of the largest subset of the set $\{1,2,\ldots,n\}$ such that the difference of no pair of distinct elements is a square. A well-known theorem of Furstenberg and Sárközy states that $D(n)=o(n)$. In the other direction, Ruzsa has proven that $D(n) \gtrsim n^{\gamma}$ for $\gamma = \frac{1}{2}\left( 1 + \frac{\log 7}{\log 65} \right) \approx 0.733077$. We improve this to $\gamma = \frac{1}{2}\left( 1 + \frac{\log 12}{\log 205} \right)  \approx 0.733412$.


1997 ◽  
Vol 62 (3) ◽  
pp. 708-728 ◽  
Author(s):  
Maria Bonet ◽  
Toniann Pitassi ◽  
Ran Raz

AbstractWe consider small-weight Cutting Planes (CP*) proofs; that is, Cutting Planes (CP) proofs with coefficients up to Poly(n). We use the well known lower bounds for monotone complexity to prove an exponential lower bound for the length of CP* proofs, for a family of tautologies based on the clique function. Because Resolution is a special case of small-weight CP, our method also gives a new and simpler exponential lower bound for Resolution.We also prove the following two theorems: (1) Tree-like CP* proofs cannot polynomially simulate non-tree-like CP* proofs. (2) Tree-like CP* proofs and Bounded-depth-Frege proofs cannot polynomially simulate each other.Our proofs also work for some generalizations of the CP* proof system. In particular, they work for CP* with a deduction rule, and also for any proof system that allows any formula with small communication complexity, and any set of sound rules of inference.


1995 ◽  
Vol 05 (04) ◽  
pp. 635-646 ◽  
Author(s):  
MICHAEL A. PALIS ◽  
JING-CHIOU LIOU ◽  
SANGUTHEVAR RAJASEKARAN ◽  
SUNIL SHENDE ◽  
DAVID S.L. WEI

The scheduling problem for dynamic tree-structured task graphs is studied and is shown to be inherently more difficult than the static case. It is shown that any online scheduling algorithm, deterministic or randomized, has competitive ratio Ω((1/g)/ log d(1/g)) for trees with granularity g and degree at most d. On the other hand, it is known that static trees with arbitrary granularity can be scheduled to within twice the optimal schedule. It is also shown that the lower bound is tight: there is a deterministic online tree scheduling algorithm that has competitive ratio O((1/g)/ log d(1/g)). Thus, randomization does not help.


2007 ◽  
Vol 22 (35) ◽  
pp. 2675-2687 ◽  
Author(s):  
LUIS F. BARRAGÁN-GIL ◽  
ABEL CAMACHO

In this work the conditions appearing in the so-called WKB approximation formalism of quantum mechanics are analyzed. It is shown that, in general, a careful definition of an approximation method requires the introduction of two length parameters, one of them always considered in the textbooks on quantum mechanics, whereas the other is usually neglected. Afterwards we define a particular family of potentials and prove, resorting to the aforementioned length parameters, that we may find an energy which is a lower bound to the ground energy of the system. The idea is applied to the case of a harmonic oscillator and also to a particle freely falling in a homogeneous gravitational field, and in both cases the consistency of our method is corroborated. This approach, together with the so-called Rayleigh–Ritz formalism, allows us to define an energy interval in which the ground energy of any potential, belonging to our family, must lie.


Sign in / Sign up

Export Citation Format

Share Document