neiu permutation algebra

57
Introduction Permutation Representation Conjectures Results and Conclusions Using Permutations to Study a Classification Problem on the Solid Torus NEIU 18 th Annual Student Research Symposium Kelly Hirschbeck Christopher Toni Dr. Tanya Cofer * April 16, 2010 Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 1 / 30

Upload: chrislt521

Post on 18-Dec-2014

253 views

Category:

Documents


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Using Permutations to Study a ClassificationProblem on the Solid Torus

NEIU 18th Annual Student Research Symposium

Kelly Hirschbeck Christopher Toni Dr. Tanya Cofer∗

April 16, 2010

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 1 / 30

Page 2: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Outline

1 Introduction

2 Permutation RepresentationArcs and ArclistsTightness CheckingBypasses

3 Conjectures

4 Results and Conclusions

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 2 / 30

Page 3: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Formulating Our Problem

On surfaces inside the solid torus (defined by S1×D2), dividingcurves are located where twisting planes switch from positive tonegative.

These dividing curves keep track of and allow for investigationof certain topological properties in the neighborhood of asurface.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 3 / 30

Page 4: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Formulating Our Problem

On surfaces inside the solid torus (defined by S1×D2), dividingcurves are located where twisting planes switch from positive tonegative.

These dividing curves keep track of and allow for investigationof certain topological properties in the neighborhood of asurface.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 3 / 30

Page 5: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Formulating Our Problem

On surfaces inside the solid torus (defined by S1×D2), dividingcurves are located where twisting planes switch from positive tonegative.

These dividing curves keep track of and allow for investigationof certain topological properties in the neighborhood of asurface.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 3 / 30

Page 6: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Formulating Our Problem (cont.)

.

n is the number of dividing curves

p is the number of longitudinal wraps

q is the number of meridinal wraps

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 4 / 30

Page 7: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

Outline

1 Introduction

2 Permutation RepresentationArcs and ArclistsTightness CheckingBypasses

3 Conjectures

4 Results and Conclusions

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 5 / 30

Page 8: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

Overview

The first computational task is to generate arclists for a givennumber of vertices np.

DefinitionAn arc is a path between vertices subject to the conditions thatall vertices must be paired and arcs cannot intersect. An arclistis a set (list) of legal pairs of arcs.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 6 / 30

Page 9: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

Overview

The first computational task is to generate arclists for a givennumber of vertices np.

DefinitionAn arc is a path between vertices subject to the conditions thatall vertices must be paired and arcs cannot intersect. An arclistis a set (list) of legal pairs of arcs.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 6 / 30

Page 10: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

How Do Permutations Apply Here?

Recall that a permutation is a bijective mapping of elementsfrom a set S to itself.

Let S = {0,1,2, . . . ,np−1} be the set of vertex values on acutting disk. We can define a permutation α on S that satisfiesthe definition of an arc/arclist.

Example: Consider the case np = 8. The set of vertex valueswould be S = {0,1,2, . . . ,6,7} and α = (01)(25)(34)(67) is apermutation on the set S.

There are 14 different permutations on this set that satisfy thedefinitions of an arc/arclist. �

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 7 / 30

Page 11: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

How Do Permutations Apply Here?

Recall that a permutation is a bijective mapping of elementsfrom a set S to itself.

Let S = {0,1,2, . . . ,np−1} be the set of vertex values on acutting disk. We can define a permutation α on S that satisfiesthe definition of an arc/arclist.

Example: Consider the case np = 8. The set of vertex valueswould be S = {0,1,2, . . . ,6,7} and α = (01)(25)(34)(67) is apermutation on the set S.

There are 14 different permutations on this set that satisfy thedefinitions of an arc/arclist. �

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 7 / 30

Page 12: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

How Do Permutations Apply Here?

Recall that a permutation is a bijective mapping of elementsfrom a set S to itself.

Let S = {0,1,2, . . . ,np−1} be the set of vertex values on acutting disk. We can define a permutation α on S that satisfiesthe definition of an arc/arclist.

Example: Consider the case np = 8. The set of vertex valueswould be S = {0,1,2, . . . ,6,7} and α = (01)(25)(34)(67) is apermutation on the set S.

There are 14 different permutations on this set that satisfy thedefinitions of an arc/arclist. �

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 7 / 30

Page 13: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

How Do Permutations Apply Here?

Recall that a permutation is a bijective mapping of elementsfrom a set S to itself.

Let S = {0,1,2, . . . ,np−1} be the set of vertex values on acutting disk. We can define a permutation α on S that satisfiesthe definition of an arc/arclist.

Example: Consider the case np = 8. The set of vertex valueswould be S = {0,1,2, . . . ,6,7} and α = (01)(25)(34)(67) is apermutation on the set S.

There are 14 different permutations on this set that satisfy thedefinitions of an arc/arclist. �

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 7 / 30

Page 14: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

How Do Permutations Apply Here? (Cont.)

Consider the example mentioned on the previous slide.

2

10

7

6

5 4

3

For this cutting disk, the arclist is {(0,1),(2,5),(3,4),(6,7)}.

We can easily rewrite this as the permutationα = (01)(25)(34)(67).

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 8 / 30

Page 15: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

How Do Permutations Apply Here? (Cont.)

Consider the example mentioned on the previous slide.

2

10

7

6

5 4

3

For this cutting disk, the arclist is {(0,1),(2,5),(3,4),(6,7)}.

We can easily rewrite this as the permutationα = (01)(25)(34)(67).

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 8 / 30

Page 16: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

How Do Permutations Apply Here? (Cont.)

Consider the example mentioned on the previous slide.

2

10

7

6

5 4

3

For this cutting disk, the arclist is {(0,1),(2,5),(3,4),(6,7)}.

We can easily rewrite this as the permutationα = (01)(25)(34)(67).

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 8 / 30

Page 17: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

Outline

1 Introduction

2 Permutation RepresentationArcs and ArclistsTightness CheckingBypasses

3 Conjectures

4 Results and Conclusions

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 9 / 30

Page 18: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

Overview - Tightness Checking

Potentially Tight Overtwisted

x→ x−nq+1 mod np

This maps the dividing curves on the surface from left to rightcutting disk.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 10 / 30

Page 19: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

Using Permutations to Determine Tightness

Let β be a permutation that represents the mapping rulex→ x−nq+1 mod np and let A be the arclist permutation.

The permutation formula to check for tightness is β−1AβA.Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 11 / 30

Page 20: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

Permutation Example

Given: n = 2, p = 4 ,q = 3

The mapping rule tells us x→ x−5 mod 8.

Therefore, β = (03614725)

β−1 = (05274163)

A = (01)(27)(36)(45) A = (07)(14)(23)(56)β−1AβA = (0246) β−1AβA = (0)

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 12 / 30

Page 21: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

Permutation Example

Given: n = 2, p = 4 ,q = 3

The mapping rule tells us x→ x−5 mod 8.

Therefore, β = (03614725)

β−1 = (05274163)

A = (01)(27)(36)(45) A = (07)(14)(23)(56)β−1AβA = (0246) β−1AβA = (0)

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 12 / 30

Page 22: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

Permutation Example

Given: n = 2, p = 4 ,q = 3

The mapping rule tells us x→ x−5 mod 8.

Therefore, β = (03614725)

β−1 = (05274163)

A = (01)(27)(36)(45) A = (07)(14)(23)(56)β−1AβA = (0246) β−1AβA = (0)

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 12 / 30

Page 23: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

Outline

1 Introduction

2 Permutation RepresentationArcs and ArclistsTightness CheckingBypasses

3 Conjectures

4 Results and Conclusions

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 13 / 30

Page 24: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

Abstract Bypasses

An abstract bypass exists when a line can be drawn throughthree arcs on a cutting disk.

Two Abstract Bypasses. . No Abstract Bypasses.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 14 / 30

Page 25: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

Abstract Bypasses

An abstract bypass exists when a line can be drawn throughthree arcs on a cutting disk.

Two Abstract Bypasses. . No Abstract Bypasses.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 14 / 30

Page 26: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

Abstract Bypasses

An abstract bypass exists when a line can be drawn throughthree arcs on a cutting disk.

Two Abstract Bypasses. . No Abstract Bypasses.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 14 / 30

Page 27: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

Abstract Bypasses (Cont.)

(01)(25)(34)(67)

α

β

α

β

(05)(14)(23)(67)

(01)(23)(47)(56)

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 15 / 30

Page 28: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

Existence of Bypasses

The existence of actual bypasses is checked in a similarfashion as tightness.

Given: An arclist A and an abstract bypass C.

The formula: β−1AβC

A = (01)(25)(34)(67)β = (03614725)

β−1 = (05274163)

C1 = (05)(14)(23)(67) C2 = (01)(23)(47)(56)β−1AβC1 = (0624) β−1AβC2 = (0)

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 16 / 30

Page 29: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

Existence of Bypasses

The existence of actual bypasses is checked in a similarfashion as tightness.

Given: An arclist A and an abstract bypass C.

The formula: β−1AβC

A = (01)(25)(34)(67)β = (03614725)

β−1 = (05274163)

C1 = (05)(14)(23)(67) C2 = (01)(23)(47)(56)β−1AβC1 = (0624) β−1AβC2 = (0)

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 16 / 30

Page 30: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

Existence of Bypasses

The existence of actual bypasses is checked in a similarfashion as tightness.

Given: An arclist A and an abstract bypass C.

The formula: β−1AβC

A = (01)(25)(34)(67)β = (03614725)

β−1 = (05274163)

C1 = (05)(14)(23)(67) C2 = (01)(23)(47)(56)β−1AβC1 = (0624) β−1AβC2 = (0)

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 16 / 30

Page 31: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

Existence of Bypasses

The existence of actual bypasses is checked in a similarfashion as tightness.

Given: An arclist A and an abstract bypass C.

The formula: β−1AβC

A = (01)(25)(34)(67)β = (03614725)

β−1 = (05274163)

C1 = (05)(14)(23)(67) C2 = (01)(23)(47)(56)β−1AβC1 = (0624) β−1AβC2 = (0)

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 16 / 30

Page 32: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

Abstract Bypass Generators

Question: How do we identify abstract bypassesalgorithmically without the luxury of pictures?

TheoremFor every set of np vertices, there are special permutations thatdetect abstract bypasses.

TheoremGiven np, we can generate all abstract bypass generators.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 17 / 30

Page 33: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

Abstract Bypass Generators

Question: How do we identify abstract bypassesalgorithmically without the luxury of pictures?

TheoremFor every set of np vertices, there are special permutations thatdetect abstract bypasses.

TheoremGiven np, we can generate all abstract bypass generators.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 17 / 30

Page 34: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

Abstract Bypass Generators

Question: How do we identify abstract bypassesalgorithmically without the luxury of pictures?

TheoremFor every set of np vertices, there are special permutations thatdetect abstract bypasses.

TheoremGiven np, we can generate all abstract bypass generators.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 17 / 30

Page 35: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

Abstract Bypass Generators (cont.)

In the case of np = 8, we have the following bypass generators:

γ1 = (042)(153)

γ2 = (064)(175)

γ3 = (062)(173)

γ4 = (246)(375)

γ5 = (062)(175)

γ6 = (153)(264)

γ7 = (064)(375)

γ8 = (042)(173)

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 18 / 30

Page 36: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Arcs and ArclistsTightness CheckingBypasses

Abstract Bypass Generators (cont.)

Consider the arclist α = (01)(25)(34)(67). Applying theabstract bypass generators on the previous slide, we get:

γ1 ◦α = (05)(14)(23)(67)

γ2 ◦α = (0743)(1652)

γ3 ◦α = (0725)(1634)

γ4 ◦α = (01)(23)(47)(56)

γ5 ◦α = (072165)(34)

γ6 ◦α = (056741)(23)

γ7 ◦α = (016523)(47)

γ8 ◦α = (076325)(14)

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 19 / 30

Page 37: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

“Star Wars” Graphs

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 20 / 30

Page 38: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Tori for (2,4,1) and (8,1,1) Cases

.(2,4,1) torus (8,1,1) torus

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 21 / 30

Page 39: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Comparing the (2, p,1) and (n,1,1) Cases

(2, p,1) (n,1,1)

x→ x−nq+1 mod np x→ x−nq+1 mod np

x→ x−1 mod np x→ x+1 mod np

β = (0(np−1)(np−2) . . .321) β = (0123 . . .(np−2)(np−1))

β−1 = (01 . . .(np−2)(np−1)) β−1 = (0(np−1)(np−2) . . .1)

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 22 / 30

Page 40: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Example of (2, p,1) Example of (n,1,1)

.A = (01)(25)(34)(67)

(2,4,1)β = (07654321)

β−1 = (01234567)

β−1Aβ = (07)(12)(36)(45)

(8,1,1)β = (01234567)

β−1 = (07654321)

β−1Aβ = (07)(14)(23)(56)

2

10

76

5 4

3

2

10

76

5 4

3

2

10

76

5 4

3

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 23 / 30

Page 41: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Torus diagrams

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 24 / 30

Page 42: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Torus diagrams

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 25 / 30

Page 43: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Torus diagrams

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 26 / 30

Page 44: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Torus diagrams

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 27 / 30

Page 45: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Conjectures for the (2, p,1) and (n,1,1) cases

.

(2, p,1)

Every possible arc configurationis potentially tight

Every abstract bypass isan actual bypass

All arcs are actually tight

p equivalence classesand tight structures

(n,1,1)

Every possible arc configurationis potentially tight

All abstract bypasses are notactual bypasses

All arcs are actually tight

Every arc list is its ownequivalence class

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 28 / 30

Page 46: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Future Research

Future goals include, but not limited to:

Publication of Findings in Undergraduate Journal

Proving our Current Conjectures.

Extension of Algorithm to the two-holed torus

Searching for a formula for the case of four dividing curves.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 29 / 30

Page 47: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Future Research

Future goals include, but not limited to:

Publication of Findings in Undergraduate Journal

Proving our Current Conjectures.

Extension of Algorithm to the two-holed torus

Searching for a formula for the case of four dividing curves.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 29 / 30

Page 48: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Future Research

Future goals include, but not limited to:

Publication of Findings in Undergraduate Journal

Proving our Current Conjectures.

Extension of Algorithm to the two-holed torus

Searching for a formula for the case of four dividing curves.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 29 / 30

Page 49: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Future Research

Future goals include, but not limited to:

Publication of Findings in Undergraduate Journal

Proving our Current Conjectures.

Extension of Algorithm to the two-holed torus

Searching for a formula for the case of four dividing curves.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 29 / 30

Page 50: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Future Research

Future goals include, but not limited to:

Publication of Findings in Undergraduate Journal

Proving our Current Conjectures.

Extension of Algorithm to the two-holed torus

Searching for a formula for the case of four dividing curves.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 29 / 30

Page 51: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Acknowledgements

We would like to thank:

Dr. Tanya Cofer for:

Giving us the opportunity to conduct graduate levelresearch as undergraduates.

Being an amazing person to work with.

Being supportive in every way possible.

Believing in us!!!!

NEIU for giving us the opportunity to present our research.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 30 / 30

Page 52: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Acknowledgements

We would like to thank:

Dr. Tanya Cofer for:

Giving us the opportunity to conduct graduate levelresearch as undergraduates.

Being an amazing person to work with.

Being supportive in every way possible.

Believing in us!!!!

NEIU for giving us the opportunity to present our research.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 30 / 30

Page 53: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Acknowledgements

We would like to thank:

Dr. Tanya Cofer for:

Giving us the opportunity to conduct graduate levelresearch as undergraduates.

Being an amazing person to work with.

Being supportive in every way possible.

Believing in us!!!!

NEIU for giving us the opportunity to present our research.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 30 / 30

Page 54: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Acknowledgements

We would like to thank:

Dr. Tanya Cofer for:

Giving us the opportunity to conduct graduate levelresearch as undergraduates.

Being an amazing person to work with.

Being supportive in every way possible.

Believing in us!!!!

NEIU for giving us the opportunity to present our research.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 30 / 30

Page 55: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Acknowledgements

We would like to thank:

Dr. Tanya Cofer for:

Giving us the opportunity to conduct graduate levelresearch as undergraduates.

Being an amazing person to work with.

Being supportive in every way possible.

Believing in us!!!!

NEIU for giving us the opportunity to present our research.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 30 / 30

Page 56: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Acknowledgements

We would like to thank:

Dr. Tanya Cofer for:

Giving us the opportunity to conduct graduate levelresearch as undergraduates.

Being an amazing person to work with.

Being supportive in every way possible.

Believing in us!!!!

NEIU for giving us the opportunity to present our research.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 30 / 30

Page 57: NEIU Permutation Algebra

IntroductionPermutation Representation

ConjecturesResults and Conclusions

Acknowledgements

We would like to thank:

Dr. Tanya Cofer for:

Giving us the opportunity to conduct graduate levelresearch as undergraduates.

Being an amazing person to work with.

Being supportive in every way possible.

Believing in us!!!!

NEIU for giving us the opportunity to present our research.

Kelly Hirschbeck, Christopher Toni Computational Contact Topology - NEIU Symposium 30 / 30