307 research outputs found

    A Self-Linking Invariant of Virtual Knots

    Full text link
    In this paper we introduce a new invariant of virtual knots and links that is non-trivial for infinitely many virtuals, but is trivial on classical knots and links. The invariant is initially be expressed in terms of a relative of the bracket polynomial and then extracted from this polynomial in terms of its exponents, particularly for the case of knots. This analog of the bracket polynomial will be denoted {K} (with curly brackets) and called the binary bracket polynomial. The key to the combinatorics of the invariant is an interpretation of the state sum in terms of 2-colorings of the associated diagrams. For virtual knots, the new invariant, J(K), is a restriction of the writhe to the odd crossings of the diagram (A crossing is odd if it links an odd number of crossings in the Gauss code of the knot. The set of odd crossings is empty for a classical knot.) For K a virtual knot, J(K) non-zero implies that K is non-trivial, non-classical and inequivalent to its planar mirror image. The paper also condsiders generalizations of the two-fold coloring of the states of the binary bracket to cases of three and more colors. Relationships with graph coloring and the Four Color Theorem are discussed.Comment: 36 pages, 22 figures, LaTeX documen

    Virtual Knot Theory --Unsolved Problems

    Full text link
    This paper is an introduction to the theory of virtual knots and links and it gives a list of unsolved problems in this subject.Comment: 33 pages, 7 figures, LaTeX documen

    The Clifford group, stabilizer states, and linear and quadratic operations over GF(2)

    Full text link
    We describe stabilizer states and Clifford group operations using linear operations and quadratic forms over binary vector spaces. We show how the n-qubit Clifford group is isomorphic to a group with an operation that is defined in terms of a (2n+1)x(2n+1) binary matrix product and binary quadratic forms. As an application we give two schemes to efficiently decompose Clifford group operations into one and two-qubit operations. We also show how the coefficients of stabilizer states and Clifford group operations in a standard basis expansion can be described by binary quadratic forms. Our results are useful for quantum error correction, entanglement distillation and possibly quantum computing.Comment: 9 page

    Combining the Band-Limited Parameterization and Semi-Lagrangian Runge–Kutta Integration for Efficient PDE-Constrained LDDMM

    Get PDF
    The family of PDE-constrained Large Deformation Diffeomorphic Metric Mapping (LDDMM) methods is emerging as a particularly interesting approach for physically meaningful diffeomorphic transformations. The original combination of Gauss–Newton–Krylov optimization and Runge–Kutta integration shows excellent numerical accuracy and fast convergence rate. However, its most significant limitation is the huge computational complexity, hindering its extensive use in Computational Anatomy applied studies. This limitation has been treated independently by the problem formulation in the space of band-limited vector fields and semi-Lagrangian integration. The purpose of this work is to combine both in three variants of band-limited PDE-constrained LDDMM for further increasing their computational efficiency. The accuracy of the resulting methods is evaluated extensively. For all the variants, the proposed combined approach shows a significant increment of the computational efficiency. In addition, the variant based on the deformation state equation is positioned consistently as the best performing method across all the evaluation frameworks in terms of accuracy and efficiency

    Modern Cryptography Volume 2

    Get PDF
    This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research
    • …
    corecore