-
Approximation of rogue waves using Malmquist-Takenaka functions
Authors:
Justin T. Cole,
Troy I. Johnson
Abstract:
Rogue waves are fascinating large amplitude coherent structures that abruptly appear and then disappear soon after. In certain partial differential equations these waves are modeled by rational solutions. In this work we discuss approximating rogue wave solutions in a basis of orthogonal functions known as the Malmquist-Takenaka (MT) functions. This family of rational functions can be directly map…
▽ More
Rogue waves are fascinating large amplitude coherent structures that abruptly appear and then disappear soon after. In certain partial differential equations these waves are modeled by rational solutions. In this work we discuss approximating rogue wave solutions in a basis of orthogonal functions known as the Malmquist-Takenaka (MT) functions. This family of rational functions can be directly mapped to a modified Fourier series, allowing the fast Fourier transform computation of the spectral MT coefficients. Spectral differentiation matrices are derived. The approximation of the various rogue wave solutions in the nonlinear Schrodinger (NLS) equation is explored. The unstable nature of the NLS equation on a constant background and its effect on destabilizing and generating rogue waves is studied. Perturbing the constant solution with certain localized functions is found to generate rogue wave-like structures.
△ Less
Submitted 4 July, 2024;
originally announced July 2024.
-
Optimal Control of a Power Storage Facility with Variable Payoffs
Authors:
Fraser J W O'Brien,
Timothy C Johnson
Abstract:
We present a methodology for determining the relationship between the optimal control points of a power storage facility and a number of different factors including storage level and temperature. The interaction between different factors is considered to allow for the identification of a precise optimal control strategy to maximise the profits of a power storage facility under a variety of differe…
▽ More
We present a methodology for determining the relationship between the optimal control points of a power storage facility and a number of different factors including storage level and temperature. The interaction between different factors is considered to allow for the identification of a precise optimal control strategy to maximise the profits of a power storage facility under a variety of different conditions. The methodology is based upon traditional stochastic techniques, however by working directly with excess demand data is model independent and does not require identification of the underlying process.
△ Less
Submitted 3 July, 2024; v1 submitted 1 July, 2024;
originally announced July 2024.
-
The density conjecture for activated random walk
Authors:
Christopher Hoffman,
Tobias Johnson,
Matthew Junge
Abstract:
Bak, Tang, and Wiesenfeld developed their theory of self-organized criticality in the late 1980s to explain why many real-life processes exhibit signs of critical behavior despite the absence of a tuning parameter. A decade later, Dickman, Muñoz, Vespignani, and Zapperi explained self-organized criticality as an external force pushing a hidden parameter toward the critical value of a traditional a…
▽ More
Bak, Tang, and Wiesenfeld developed their theory of self-organized criticality in the late 1980s to explain why many real-life processes exhibit signs of critical behavior despite the absence of a tuning parameter. A decade later, Dickman, Muñoz, Vespignani, and Zapperi explained self-organized criticality as an external force pushing a hidden parameter toward the critical value of a traditional absorbing-state phase transition. As evidence, they observed empirically that for various sandpile models, the particle density in a finite box under driven-dissipative dynamics converges to the critical density of an infinite-volume version of the model. We give the first proof of this well-known density conjecture in any setting by establishing it for activated random walk in one dimension. We prove that two other natural versions of the model have the same critical value, further establishing activated random walk as a universal model of self-organized criticality.
△ Less
Submitted 10 July, 2024; v1 submitted 3 June, 2024;
originally announced June 2024.
-
A Fast PC Algorithm with Reversed-order Pruning and A Parallelization Strategy
Authors:
Kai Zhang,
Chao Tian,
Kun Zhang,
Todd Johnson,
Xiaoqian Jiang
Abstract:
The PC algorithm is the state-of-the-art algorithm for causal structure discovery on observational data. It can be computationally expensive in the worst case due to the conditional independence tests are performed in an exhaustive-searching manner. This makes the algorithm computationally intractable when the task contains several hundred or thousand nodes, particularly when the true underlying c…
▽ More
The PC algorithm is the state-of-the-art algorithm for causal structure discovery on observational data. It can be computationally expensive in the worst case due to the conditional independence tests are performed in an exhaustive-searching manner. This makes the algorithm computationally intractable when the task contains several hundred or thousand nodes, particularly when the true underlying causal graph is dense. We propose a critical observation that the conditional set rendering two nodes independent is non-unique, and including certain redundant nodes do not sacrifice result accuracy. Based on this finding, the innovations of our work are two-folds. First, we innovate on a reserve order linkage pruning PC algorithm which significantly increases the algorithm's efficiency. Second, we propose a parallel computing strategy for statistical independence tests by leveraging tensor computation, which brings further speedup. We also prove the proposed algorithm does not induce statistical power loss under mild graph and data dimensionality assumptions. Experimental results show that the single-threaded version of the proposed algorithm can achieve a 6-fold speedup compared to the PC algorithm on a dense 95-node graph, and the parallel version can make a 825-fold speed-up. We also provide proof that the proposed algorithm is consistent under the same set of conditions with conventional PC algorithm.
△ Less
Submitted 9 September, 2021;
originally announced September 2021.
-
Concentration inequalities from monotone couplings for graphs, walks, trees and branching processes
Authors:
Tobias Johnson,
Erol Peköz
Abstract:
Generalized gamma distributions arise as limits in many settings involving random graphs, walks, trees, and branching processes. Peköz, Röllin, and Ross (2016, arXiv:1309.4183 [math.PR]) exploited characterizing distributional fixed point equations to obtain uniform error bounds for generalized gamma approximations using Stein's method. Here we show how monotone couplings arising with these fixed…
▽ More
Generalized gamma distributions arise as limits in many settings involving random graphs, walks, trees, and branching processes. Peköz, Röllin, and Ross (2016, arXiv:1309.4183 [math.PR]) exploited characterizing distributional fixed point equations to obtain uniform error bounds for generalized gamma approximations using Stein's method. Here we show how monotone couplings arising with these fixed point equations can be used to obtain sharper tail bounds that, in many cases, outperform competing moment-based bounds and the uniform bounds obtainable with Stein's method. Applications are given to concentration inequalities for preferential attachment random graphs, branching processes, random walk local time statistics and the size of random subtrees of uniformly random binary rooted plane trees.
△ Less
Submitted 14 April, 2022; v1 submitted 4 August, 2021;
originally announced August 2021.
-
Diffusion-limited annihilating systems and the increasing convex order
Authors:
Riti Bahl,
Philip Barnet,
Tobias Johnson,
Matthew Junge
Abstract:
We consider diffusion-limited annihilating systems with mobile $A$-particles and stationary $B$-particles placed throughout a graph. Mutual annihilation occurs whenever an $A$-particle meets a $B$-particle. Such systems, when ran in discrete time, are also referred to as parking processes. We show for a broad family of graphs and random walk kernels that augmenting either the size or variability o…
▽ More
We consider diffusion-limited annihilating systems with mobile $A$-particles and stationary $B$-particles placed throughout a graph. Mutual annihilation occurs whenever an $A$-particle meets a $B$-particle. Such systems, when ran in discrete time, are also referred to as parking processes. We show for a broad family of graphs and random walk kernels that augmenting either the size or variability of the initial placements of particles increases the total occupation time by $A$-particles of a given subset of the graph. A corollary is that the same phenomenon occurs with the total lifespan of all particles in internal diffusion-limited aggregation.
△ Less
Submitted 4 August, 2022; v1 submitted 26 April, 2021;
originally announced April 2021.
-
Continuous phase transitions on Galton-Watson trees
Authors:
Tobias Johnson
Abstract:
Distinguishing between continuous and first-order phase transitions is a major challenge in random discrete systems. We study the topic for events with recursive structure on Galton-Watson trees. For example, let $\mathcal{T}_1$ be the event that a Galton-Watson tree is infinite, and let $\mathcal{T}_2$ be the event that it contains an infinite binary tree starting from its root. These events sati…
▽ More
Distinguishing between continuous and first-order phase transitions is a major challenge in random discrete systems. We study the topic for events with recursive structure on Galton-Watson trees. For example, let $\mathcal{T}_1$ be the event that a Galton-Watson tree is infinite, and let $\mathcal{T}_2$ be the event that it contains an infinite binary tree starting from its root. These events satisfy similar recursive properties: $\mathcal{T}_1$ holds if and only if $\mathcal{T}_1$ holds for at least one of the trees initiated by children of the root, and $\mathcal{T}_2$ holds if and only if $\mathcal{T}_2$ holds for at least two of these trees. The probability of $\mathcal{T}_1$ has a continuous phase transition, increasing from 0 when the mean of the child distribution increases above 1. On the other hand, the probability of $\mathcal{T}_2$ has a first-order phase transition, jum** discontinuously to a nonzero value at criticality. Given the recursive property satisfied by the event, we describe the critical child distributions where a continuous phase transition takes place. In many cases, we also characterize the event undergoing the phase transition.
△ Less
Submitted 22 June, 2021; v1 submitted 27 July, 2020;
originally announced July 2020.
-
A Kuratowski closure-complement variant whose solution is independent of ZF
Authors:
Michael P. Cohen,
Todd Johnson,
Adam Kral,
Aaron Li,
Justin Soll
Abstract:
We pose the following new variant of the Kuratowski closure-complement problem: How many distinct sets may be obtained by starting with a set $A$ of a Polish space $X$, and applying only closure, complementation, and the $d$ operator, as often as desired, in any order? The set operator $d$ was studied by Kuratowski in his foundational text \textit{Topology: Volume I}; it assigns to $A$ the collect…
▽ More
We pose the following new variant of the Kuratowski closure-complement problem: How many distinct sets may be obtained by starting with a set $A$ of a Polish space $X$, and applying only closure, complementation, and the $d$ operator, as often as desired, in any order? The set operator $d$ was studied by Kuratowski in his foundational text \textit{Topology: Volume I}; it assigns to $A$ the collection $dA$ of all points of second category for $A$. We show that in ZFC set theory, the answer to this variant problem is $22$. In a distinct system equiconsistent with ZFC, namely ZF+DC+PB, the answer is only $18$.
△ Less
Submitted 26 May, 2020;
originally announced May 2020.
-
Characterization of the lengths of binary circular words containing no squares other than 00, 11, and 0101
Authors:
James D. Currie,
Jesse T. Johnson
Abstract:
We characterize exactly the lengths of binary circular words containing no squares other than 00, 11, and 0101. Key words: combinatorics on words, circular words, necklaces, square-free words, non-repetitive sequences
We characterize exactly the lengths of binary circular words containing no squares other than 00, 11, and 0101. Key words: combinatorics on words, circular words, necklaces, square-free words, non-repetitive sequences
△ Less
Submitted 19 May, 2020;
originally announced May 2020.
-
There are level ternary circular square-free words of length $n$ for $n\ne 5,7,9,10,14,17.$
Authors:
James D. Currie,
Jesse T. Johnson
Abstract:
A word is level if each letter appears in it the same number of times, plus or minus 1. We give a complete characterization of the lengths for which level ternary circular square-free words exist. Key words: combinatorics on words, circular words, necklaces, square-free words, non-repetitive sequences
A word is level if each letter appears in it the same number of times, plus or minus 1. We give a complete characterization of the lengths for which level ternary circular square-free words exist. Key words: combinatorics on words, circular words, necklaces, square-free words, non-repetitive sequences
△ Less
Submitted 19 May, 2020; v1 submitted 13 May, 2020;
originally announced May 2020.
-
Particle density in diffusion-limited annihilating systems
Authors:
Tobias Johnson,
Matthew Junge,
Hanbaek Lyu,
David Sivakoff
Abstract:
Place an $A$-particle at each site of a graph independently with probability $p$ and otherwise place a $B$-particle. $A$- and $B$-particles perform independent continuous time random walks at rates $λ_A$ and $λ_B$, respectively, and annihilate upon colliding with a particle of opposite type. Bramson and Lebowitz studied the setting $λ_A = λ_B$ in the early 1990s. Despite recent progress, many basi…
▽ More
Place an $A$-particle at each site of a graph independently with probability $p$ and otherwise place a $B$-particle. $A$- and $B$-particles perform independent continuous time random walks at rates $λ_A$ and $λ_B$, respectively, and annihilate upon colliding with a particle of opposite type. Bramson and Lebowitz studied the setting $λ_A = λ_B$ in the early 1990s. Despite recent progress, many basic questions remain unanswered for when $λ_A \neq λ_B$. For the critical case $p=1/2$ on low-dimensional integer lattices, we give a lower bound on the expected number of particles at the origin that matches physicists' predictions. For the process with $λ_B=0$ on the integers and the bidirected regular tree, we give sharp upper and lower bounds for the expected total occupation time of the root at and approaching criticality.
△ Less
Submitted 1 August, 2023; v1 submitted 12 May, 2020;
originally announced May 2020.
-
Reachable Set Estimation for Neural Network Control Systems: A Simulation-Guided Approach
Authors:
Weiming Xiang,
Hoang-Dung Tran,
Xiaodong Yang,
Taylor T. Johnson
Abstract:
The vulnerability of artificial intelligence (AI) and machine learning (ML) against adversarial disturbances and attacks significantly restricts their applicability in safety-critical systems including cyber-physical systems (CPS) equipped with neural network components at various stages of sensing and control. This paper addresses the reachable set estimation and safety verification problems for…
▽ More
The vulnerability of artificial intelligence (AI) and machine learning (ML) against adversarial disturbances and attacks significantly restricts their applicability in safety-critical systems including cyber-physical systems (CPS) equipped with neural network components at various stages of sensing and control. This paper addresses the reachable set estimation and safety verification problems for dynamical systems embedded with neural network components serving as feedback controllers. The closed-loop system can be abstracted in the form of a continuous-time sampled-data system under the control of a neural network controller. First, a novel reachable set computation method in adaptation to simulations generated out of neural networks is developed. The reachability analysis of a class of feedforward neural networks called multilayer perceptrons (MLP) with general activation functions is performed in the framework of interval arithmetic. Then, in combination with reachability methods developed for various dynamical system classes modeled by ordinary differential equations, a recursive algorithm is developed for over-approximating the reachable set of the closed-loop system. The safety verification for neural network control systems can be performed by examining the emptiness of the intersection between the over-approximation of reachable sets and unsafe sets. The effectiveness of the proposed approach has been validated with evaluations on a robotic arm model and an adaptive cruise control system.
△ Less
Submitted 25 April, 2020;
originally announced April 2020.
-
Moment-Preserving and Mesh-Adaptive Reweighting Method for Rare-Event Sampling in Monte-Carlo Algorithms
Authors:
C. U. Schuster,
T. Johnson,
G. Papp,
R. Bilato,
S. Sipilä,
J. Varje,
M. Hasenöhrl
Abstract:
We present novel roulette schemes for rare-event sampling that are both structure-preserving and unbiased. The boundaries where Monte Carlo markers are split and deleted are placed automatically and adapted during runtime. Extending existing codes with the new schemes is possible without severe changes because the equation of motion for the markers is not altered. These schemes can also be applied…
▽ More
We present novel roulette schemes for rare-event sampling that are both structure-preserving and unbiased. The boundaries where Monte Carlo markers are split and deleted are placed automatically and adapted during runtime. Extending existing codes with the new schemes is possible without severe changes because the equation of motion for the markers is not altered. These schemes can also be applied in the presence of nonlinear and nonlocal coupling between markers. As an illustrative application, we have implemented this method in the ASCOT-RFOF code, used to simulate fast-ion generation by radio-frequency waves in fusion plasmas. In this application, with this method the Monte-Carlo noise level for typical fast-ion energies can be reduced at least of one order of magnitude without increasing the computational effort.
△ Less
Submitted 19 February, 2021; v1 submitted 31 March, 2020;
originally announced March 2020.
-
Dynamic Mode Decomposition for Continuous Time Systems with the Liouville Operator
Authors:
Joel A. Rosenfeld,
Rushikesh Kamalapurkar,
L. Forest Gruss,
Taylor T. Johnson
Abstract:
Dynamic Mode Decomposition (DMD) has become synonymous with the Koopman operator, where continuous time dynamics are examined through a discrete time proxy determined by a fixed timestep using Koopman (i.e. composition) operators. Using the newly introduced "occupation kernels," the present manuscript develops an approach to DMD that treats continuous time dynamics directly through the Liouville o…
▽ More
Dynamic Mode Decomposition (DMD) has become synonymous with the Koopman operator, where continuous time dynamics are examined through a discrete time proxy determined by a fixed timestep using Koopman (i.e. composition) operators. Using the newly introduced "occupation kernels," the present manuscript develops an approach to DMD that treats continuous time dynamics directly through the Liouville operator, which can include Koopman generators. This manuscript outlines the technical and theoretical differences between Koopman based DMD for discrete time systems and Liouville based DMD for continuous time systems, which includes an examination of these operators over several reproducing kernel Hilbert spaces (RKHSs). While Liouville operators are modally unbounded, this manuscript introduces the concept of a scaled Liouville operator, which for many dynamical systems yields a compact operator over the exponential dot product kernel's native space. Hence, norm convergence of the DMD procedure is established when using scaled Liouville operators, which is a decided advantage over Koopman based DMD methods.
△ Less
Submitted 28 May, 2021; v1 submitted 9 October, 2019;
originally announced October 2019.
-
The Occupation Kernel Method for Nonlinear System Identification
Authors:
Joel A. Rosenfeld,
Benjamin Russo,
Rushikesh Kamalapurkar,
Taylor T. Johnson
Abstract:
This manuscript presents a novel approach to nonlinear system identification leveraging densely defined Liouville operators and a new "kernel" function that represents an integration functional over a reproducing kernel Hilbert space (RKHS) dubbed an occupation kernel. The manuscript thoroughly explores the concept of occupation kernels in the contexts of RKHSs of continuous functions, and establi…
▽ More
This manuscript presents a novel approach to nonlinear system identification leveraging densely defined Liouville operators and a new "kernel" function that represents an integration functional over a reproducing kernel Hilbert space (RKHS) dubbed an occupation kernel. The manuscript thoroughly explores the concept of occupation kernels in the contexts of RKHSs of continuous functions, and establishes Liouville operators over RKHS where several dense domains are found for specific examples of this unbounded operator. The combination of these two concepts allow for the embedding of a dynamical system into a RKHS, where function theoretic tools may be leveraged for the examination of such systems. This framework allows for trajectories of a nonlinear dynamical system to be treated as a fundamental unit of data for nonlinear system identification routine. The approach to nonlinear system identification is demonstrated to identify parameters of a dynamical system accurately, while also exhibiting a certain robustness to noise.
△ Less
Submitted 15 June, 2021; v1 submitted 25 September, 2019;
originally announced September 2019.
-
On oscillation of difference equations with continuous time and variable delays
Authors:
Elena Braverman,
William T. Johnson
Abstract:
We consider existence of positive solutions for a difference equation with continuous time, variable coefficients and delays $$ x(t+1)-x(t)+ \sum_{k=1}^m a_k(t)x(h_k(t))=0, \quad a_k(t) \geq 0, ~~h_k(t) \leq t, \quad t \geq 0, \quad k=1, \dots, m. $$ We prove that for a fixed $h(t)\not\equiv t$, a positive solution may exist for $a_k$ exceeding any prescribed $M>0$, as well as for constant positiv…
▽ More
We consider existence of positive solutions for a difference equation with continuous time, variable coefficients and delays $$ x(t+1)-x(t)+ \sum_{k=1}^m a_k(t)x(h_k(t))=0, \quad a_k(t) \geq 0, ~~h_k(t) \leq t, \quad t \geq 0, \quad k=1, \dots, m. $$ We prove that for a fixed $h(t)\not\equiv t$, a positive solution may exist for $a_k$ exceeding any prescribed $M>0$, as well as for constant positive $a_k$ with $h_k(t) \leq t-n$, where $n \in {\mathbb N}$ is arbitrary and fixed. The point is that for equations with continuous time, non-existence of positive solutions with $\inf x(t)>0$ on any bounded interval should be considered rather than oscillation. Sufficient conditions when such solutions exist or do not exist are obtained. We also present an analogue of the Grönwall-Bellman inequality for equations with continuous time, and examine the question when the equation has no positive non-increasing solutions. Counterexamples illustrate the role of variable delays.
△ Less
Submitted 29 April, 2019;
originally announced April 2019.
-
The linear stability of the Schwarzschild solution to gravitational perturbations in the generalised wave gauge
Authors:
Thomas William Johnson
Abstract:
We prove in this paper that the Schwarzschild famiily of black holes are linearly stable as a family of solutions to the system of equations that result from expressing the Einstein vacuum equations in a generalised wave gauge. In particular we improve on our recent work \cite{Johnsonlinstabschwarzold} by modifying the generalised wave gauge employed therein so as to establish asymptotic flatness…
▽ More
We prove in this paper that the Schwarzschild famiily of black holes are linearly stable as a family of solutions to the system of equations that result from expressing the Einstein vacuum equations in a generalised wave gauge. In particular we improve on our recent work \cite{Johnsonlinstabschwarzold} by modifying the generalised wave gauge employed therein so as to establish asymptotic flatness of the associated linearised system. The result thus complements the seminal work \cite{DHRlinstabschwarz} of Dafermos-Holzegel-Rodnianski in a similar vein as to how the work \cite{LRstabmink} of Lindblad-Rodnianski complemented that of Christodoulou-Klainerman \cite{CKstabmink} in establishing the nonlinear stability of the Minkowski space.
This paper is the content of the authors PhD thesis.
△ Less
Submitted 3 October, 2018; v1 submitted 2 October, 2018;
originally announced October 2018.
-
Sensitivity of the frog model to initial conditions
Authors:
Tobias Johnson,
Leonardo T. Rolla
Abstract:
The frog model is an interacting particle system on a graph. Active particles perform independent simple random walks, while slee** particles remain inert until visited by an active particle. Some number of slee** particles are placed at each site sampled independently from a certain distribution, and then one particle is activated to begin the process. We show that the recurrence or transienc…
▽ More
The frog model is an interacting particle system on a graph. Active particles perform independent simple random walks, while slee** particles remain inert until visited by an active particle. Some number of slee** particles are placed at each site sampled independently from a certain distribution, and then one particle is activated to begin the process. We show that the recurrence or transience of the model is sensitive not just to the expectation but to the entire distribution. This is in contrast to closely related models like branching random walk and activated random walk.
△ Less
Submitted 10 June, 2019; v1 submitted 9 September, 2018;
originally announced September 2018.
-
Random tree recursions: which fixed points correspond to tangible sets of trees?
Authors:
Tobias Johnson,
Moumanti Podder,
Fiona Skerman
Abstract:
Let $\mathcal{B}$ be the set of rooted trees containing an infinite binary subtree starting at the root. This set satisfies the metaproperty that a tree belongs to it if and only if its root has children $u$ and $v$ such that the subtrees rooted at $u$ and $v$ belong to it. Let $p$ be the probability that a Galton-Watson tree falls in $\mathcal{B}$. The metaproperty makes $p$ satisfy a fixed-point…
▽ More
Let $\mathcal{B}$ be the set of rooted trees containing an infinite binary subtree starting at the root. This set satisfies the metaproperty that a tree belongs to it if and only if its root has children $u$ and $v$ such that the subtrees rooted at $u$ and $v$ belong to it. Let $p$ be the probability that a Galton-Watson tree falls in $\mathcal{B}$. The metaproperty makes $p$ satisfy a fixed-point equation, which can have multiple solutions. One of these solutions is $p$, but what is the meaning of the others? In particular, are they probabilities of the Galton-Watson tree falling into other sets satisfying the same metaproperty? We create a framework for posing questions of this sort, and we classify solutions to fixed-point equations according to whether they admit probabilistic interpretations. Our proofs use spine decompositions of Galton-Watson trees and the analysis of Boolean functions.
△ Less
Submitted 12 September, 2019; v1 submitted 9 August, 2018;
originally announced August 2018.
-
Numerical Verification of Affine Systems with up to a Billion Dimensions
Authors:
Stanley Bak,
Hoang-Dung Tran,
Taylor T. Johnson
Abstract:
Affine systems reachability is the basis of many verification methods. With further computation, methods exist to reason about richer models with inputs, nonlinear differential equations, and hybrid dynamics. As such, the scalability of affine systems verification is a prerequisite to scalable analysis for more complex systems. In this paper, we improve the scalability of affine systems verificati…
▽ More
Affine systems reachability is the basis of many verification methods. With further computation, methods exist to reason about richer models with inputs, nonlinear differential equations, and hybrid dynamics. As such, the scalability of affine systems verification is a prerequisite to scalable analysis for more complex systems. In this paper, we improve the scalability of affine systems verification, in terms of the number of dimensions (variables) in the system.
The reachable states of affine systems can be written in terms of the matrix exponential, and safety checking can be performed at specific time steps with linear programming. Unfortunately, for large systems with many state variables, this direct approach requires an intractable amount of memory while using an intractable amount of computation time. We overcome these challenges by combining several methods that leverage common problem structure. Memory is reduced by exploiting initial states that are not full-dimensional and safety properties (outputs) over a few linear projections of the state variables. Computation time is saved by using numerical simulations to compute only projections of the matrix exponential relevant for the verification problem. Since large systems often have sparse dynamics, we use Krylov-subspace simulation approaches based on the Arnoldi or Lanczos iterations. Our method produces accurate counter-examples when properties are violated and, in the extreme case with sufficient problem structure, can analyze a system with one billion real-valued state variables.
△ Less
Submitted 5 March, 2019; v1 submitted 4 April, 2018;
originally announced April 2018.
-
On the linear stability of the Schwarzschild solution to gravitational perturbations in the generalised wave gauge
Authors:
Thomas Johnson
Abstract:
In a recent seminal paper \cite{D-H-R} of Dafermos, Holzegel and Rodnianski the linear stability of the Schwarzschild family of black hole solutions to the Einstein vacuum equations was established by imposing a double null gauge. In this paper we shall prove that the Schwarzschild family is linearly stable as solutions to the Einstein vacuum equations by imposing instead a generalised wave gaug…
▽ More
In a recent seminal paper \cite{D-H-R} of Dafermos, Holzegel and Rodnianski the linear stability of the Schwarzschild family of black hole solutions to the Einstein vacuum equations was established by imposing a double null gauge. In this paper we shall prove that the Schwarzschild family is linearly stable as solutions to the Einstein vacuum equations by imposing instead a generalised wave gauge: all sufficiently regular solutions to the system of equations that result from linearising the Einstein vacuum equations, as expressed in a generalised wave gauge, about a fixed Schwarzschild solution remain uniformly bounded on the Schwarzschild exterior region and in fact decay to a member of the linearised Kerr family. The dispersion is at an inverse polynomial rate and therefore in principle sufficient for future nonlinear applications. The result thus fits into the wider goal of establishing the full nonlinear stability of the exterior Kerr family as solutions to the Einstein vacuum equations by employing a generalised wave gauge and therefore complements \cite{D-H-R} in a similar vein as the pioneering work \cite{L-R} of Lindblad and Rodnianski complemented the monumental achievement of Christodoulou and Klainerman in \cite{C-K} whereby the global nonlinear stability of the Minkowski space was established.
△ Less
Submitted 2 October, 2018; v1 submitted 11 March, 2018;
originally announced March 2018.
-
Chain Posets
Authors:
Ian T. Johnson
Abstract:
A chain poset, by definition, consists of chains of ordered elements in a poset. We study the chain posets associated to two posets: the Boolean algebra and the poset of isotropic flags. We prove that, in both cases, the chain posets satisfy the strong Sperner property and are rank-log concave.
A chain poset, by definition, consists of chains of ordered elements in a poset. We study the chain posets associated to two posets: the Boolean algebra and the poset of isotropic flags. We prove that, in both cases, the chain posets satisfy the strong Sperner property and are rank-log concave.
△ Less
Submitted 15 February, 2018;
originally announced February 2018.
-
Cover time for the frog model on trees
Authors:
Christopher Hoffman,
Tobias Johnson,
Matthew Junge
Abstract:
The frog model is a branching random walk on a graph in which particles branch only at unvisited sites. Consider an initial particle density of $μ$ on the full $d$-ary tree of height $n$. If $μ= Ω( d^2)$, all of the vertices are visited in time $Θ(n\log n)$ with high probability. Conversely, if $μ= O(d)$ the cover time is $\exp(Θ(\sqrt n))$ with high probability.
The frog model is a branching random walk on a graph in which particles branch only at unvisited sites. Consider an initial particle density of $μ$ on the full $d$-ary tree of height $n$. If $μ= Ω( d^2)$, all of the vertices are visited in time $Θ(n\log n)$ with high probability. Conversely, if $μ= O(d)$ the cover time is $\exp(Θ(\sqrt n))$ with high probability.
△ Less
Submitted 24 September, 2019; v1 submitted 7 February, 2018;
originally announced February 2018.
-
Infection spread for the frog model on trees
Authors:
Christopher Hoffman,
Tobias Johnson,
Matthew Junge
Abstract:
The frog model is an infection process in which dormant particles begin moving and infecting others once they become infected. We show that on the rooted $d$-ary tree with particle density $Ω(d^2)$, the set of visited sites contains a linearly expanding ball and the number of visits to the root grows linearly with high probability.
The frog model is an infection process in which dormant particles begin moving and infecting others once they become infected. We show that on the rooted $d$-ary tree with particle density $Ω(d^2)$, the set of visited sites contains a linearly expanding ball and the number of visits to the root grows linearly with high probability.
△ Less
Submitted 10 October, 2019; v1 submitted 16 October, 2017;
originally announced October 2017.
-
The critical density for the frog model is the degree of the tree
Authors:
Tobias Johnson,
Matthew Junge
Abstract:
The frog model on the rooted d-ary tree changes from transient to recurrent as the number of frogs per site is increased. We prove that the location of this transition is on the same order as the degree of the tree.
The frog model on the rooted d-ary tree changes from transient to recurrent as the number of frogs per site is increased. We prove that the location of this transition is on the same order as the degree of the tree.
△ Less
Submitted 27 December, 2016; v1 submitted 26 July, 2016;
originally announced July 2016.
-
Local limit of the fixed point forest
Authors:
Tobias Johnson,
Anne Schilling,
Erik Slivken
Abstract:
Consider the following partial "sorting algorithm" on permutations: take the first entry of the permutation in one-line notation and insert it into the position of its own value. Continue until the first entry is 1. This process imposes a forest structure on the set of all permutations of size $n$, where the roots are the permutations starting with 1 and the leaves are derangements. Viewing the pr…
▽ More
Consider the following partial "sorting algorithm" on permutations: take the first entry of the permutation in one-line notation and insert it into the position of its own value. Continue until the first entry is 1. This process imposes a forest structure on the set of all permutations of size $n$, where the roots are the permutations starting with 1 and the leaves are derangements. Viewing the process in the opposite direction towards the leaves, one picks a fixed point and moves it to the beginning. Despite its simplicity, this "fixed point forest" exhibits a rich structure. In this paper, we consider the fixed point forest in the limit $n\to \infty$ and show using Stein's method that at a random permutation the local structure weakly converges to a tree defined in terms of independent Poisson point processes. We also show that the distribution of the length of the longest path to a leaf converges to the geometric distribution with mean $e-1$, and the length of the shortest path converges to the Poisson distribution with mean 1. In addition, the higher moments are bounded and hence the expectations converge as well.
△ Less
Submitted 15 February, 2017; v1 submitted 31 May, 2016;
originally announced May 2016.
-
The Dynamics of Vector-Borne Relapsing Diseases
Authors:
Cody Palmer,
Erin Landguth,
Emily Stone,
Tammi Johnson
Abstract:
In this paper we describe the dynamics of a vector-borne relapsing disease, such as tick-borne relapsing fever, using the methods of compartmental models. After some motivation, model description, and a brief overview of the theory of compartmental models, we compute a general form of the reproductive ratio $R_0$, which is the average number of new infections produced by a single infected individu…
▽ More
In this paper we describe the dynamics of a vector-borne relapsing disease, such as tick-borne relapsing fever, using the methods of compartmental models. After some motivation, model description, and a brief overview of the theory of compartmental models, we compute a general form of the reproductive ratio $R_0$, which is the average number of new infections produced by a single infected individual. A disease free equilibrium undergoes a bifurcation at $R_0 =1$ and we show that for an arbitrary number of relapses it is a transcritical bifurcation with a single branch of endemic equilibria that is locally asymptotically stable for $R_0$ sufficiently close to 1. We close with some discussion and directions for future research.
△ Less
Submitted 23 August, 2016; v1 submitted 24 May, 2016;
originally announced May 2016.
-
Stochastic orders and the frog model
Authors:
Tobias Johnson,
Matthew Junge
Abstract:
The frog model starts with one active particle at the root of a graph and some number of dormant particles at all nonroot vertices. Active particles follow independent random paths, waking all inactive particles they encounter. We prove that certain frog model statistics are monotone in the initial configuration for two nonstandard stochastic dominance relations: the increasing concave and the pro…
▽ More
The frog model starts with one active particle at the root of a graph and some number of dormant particles at all nonroot vertices. Active particles follow independent random paths, waking all inactive particles they encounter. We prove that certain frog model statistics are monotone in the initial configuration for two nonstandard stochastic dominance relations: the increasing concave and the probability generating function orders.
This extends many canonical theorems. We connect recurrence for random initial configurations to recurrence for deterministic configurations. Also, the limiting shape of activated sites on the integer lattice respects both of these orders. Other implications include monotonicity results on transience of the frog model where the number of frogs per vertex decays away from the origin, on survival of the frog model with death, and on the time to visit a given vertex in any frog model.
△ Less
Submitted 10 April, 2017; v1 submitted 13 February, 2016;
originally announced February 2016.
-
Bounds to the normal for proximity region graphs
Authors:
Larry Goldstein,
Tobias Johnson,
Raphaël Lachièze-Rey
Abstract:
In a proximity region graph ${\cal G}$ in $\mathbb{R}^d$, two distinct points $x,y$ of a point process $μ$ are connected when the 'forbidden region' $S(x,y)$ these points determine has empty intersection with $μ$. The Gabriel graph, where $S(x,y)$ is the open disc with diameter the line segment connecting $x$ and $y$, is one canonical example. When $μ$ is a Poisson or binomial process, under broad…
▽ More
In a proximity region graph ${\cal G}$ in $\mathbb{R}^d$, two distinct points $x,y$ of a point process $μ$ are connected when the 'forbidden region' $S(x,y)$ these points determine has empty intersection with $μ$. The Gabriel graph, where $S(x,y)$ is the open disc with diameter the line segment connecting $x$ and $y$, is one canonical example. When $μ$ is a Poisson or binomial process, under broad conditions on the regions $S(x,y)$, bounds on the Kolmogorov and Wasserstein distances to the normal are produced for functionals of ${\cal G}$, including the total number of edges and the total length. Variance lower bounds, not requiring strong stabilization, are also proven to hold for a class of such functionals.
△ Less
Submitted 10 April, 2017; v1 submitted 30 October, 2015;
originally announced October 2015.
-
Size biased couplings and the spectral gap for random regular graphs
Authors:
Nicholas A. Cook,
Larry Goldstein,
Tobias Johnson
Abstract:
Let $λ$ be the second largest eigenvalue in absolute value of a uniform random $d$-regular graph on $n$ vertices. It was famously conjectured by Alon and proved by Friedman that if $d$ is fixed independent of $n$, then $λ=2\sqrt{d-1} +o(1)$ with high probability. In the present work we show that $λ=O(\sqrt{d})$ continues to hold with high probability as long as $d=O(n^{2/3})$, making progress towa…
▽ More
Let $λ$ be the second largest eigenvalue in absolute value of a uniform random $d$-regular graph on $n$ vertices. It was famously conjectured by Alon and proved by Friedman that if $d$ is fixed independent of $n$, then $λ=2\sqrt{d-1} +o(1)$ with high probability. In the present work we show that $λ=O(\sqrt{d})$ continues to hold with high probability as long as $d=O(n^{2/3})$, making progress towards a conjecture of Vu that the bound holds for all $1\le d\le n/2$. Prior to this work the best result was obtained by Broder, Frieze, Suen and Upfal (1999) using the configuration model, which hits a barrier at $d=o(n^{1/2})$. We are able to go beyond this barrier by proving concentration of measure results directly for the uniform distribution on $d$-regular graphs. These come as consequences of advances we make in the theory of concentration by size biased couplings. Specifically, we obtain Bennett-type tail estimates for random variables admitting certain unbounded size biased couplings.
△ Less
Submitted 8 March, 2017; v1 submitted 20 October, 2015;
originally announced October 2015.
-
Excluding A Grid Minor In Planar Digraphs
Authors:
Thor Johnson,
Neil Robertson,
Paul Seymour,
Robin Thomas
Abstract:
In [Directed tree-width, J. Combin. Theory Ser. B 82 (2001), 138-154] we introduced the notion of tree-width of directed graphs and presented a conjecture, formulated during discussions with Noga Alon and Bruce Reed, stating that a digraph of huge tree-width has a large "cylindrical grid" minor. Here we prove the conjecture for planar digraphs, but many steps of the proof work in general.
This i…
▽ More
In [Directed tree-width, J. Combin. Theory Ser. B 82 (2001), 138-154] we introduced the notion of tree-width of directed graphs and presented a conjecture, formulated during discussions with Noga Alon and Bruce Reed, stating that a digraph of huge tree-width has a large "cylindrical grid" minor. Here we prove the conjecture for planar digraphs, but many steps of the proof work in general.
This is an unedited and unpolished manuscript from October 2001. Since many people asked for copies we are making it available in the hope that it may be useful. The conjecture was proved by Kawarabayashi and Kreutzer in arXiv:1411.5681.
△ Less
Submitted 1 October, 2015;
originally announced October 2015.
-
From transience to recurrence with Poisson tree frogs
Authors:
Christopher Hoffman,
Tobias Johnson,
Matthew Junge
Abstract:
Consider the following interacting particle system on the $d$-ary tree, known as the frog model: Initially, one particle is awake at the root and i.i.d. Poisson many particles are slee** at every other vertex. Particles that are awake perform simple random walks, awakening any slee** particles they encounter. We prove that there is a phase transition between transience and recurrence as the in…
▽ More
Consider the following interacting particle system on the $d$-ary tree, known as the frog model: Initially, one particle is awake at the root and i.i.d. Poisson many particles are slee** at every other vertex. Particles that are awake perform simple random walks, awakening any slee** particles they encounter. We prove that there is a phase transition between transience and recurrence as the initial density of particles increases, and we give the order of the transition up to a logarithmic factor.
△ Less
Submitted 22 June, 2016; v1 submitted 23 January, 2015;
originally announced January 2015.
-
Spectral properties of renormalization for area-preserving maps
Authors:
Denis Gaidashev,
Tomas Johnson
Abstract:
Area-preserving maps have been observed to undergo a universal period-doubling cascade, analogous to the famous Feigenbaum-Coullet-Tresser period doubling cascade in one-dimensional dynamics. A renormalization approach has been used by Eckmann, Koch and Wittwer in a computer-assisted proof of existence of a conservative renormalization fixed point. Furthermore, it has been shown by Gaidashev, John…
▽ More
Area-preserving maps have been observed to undergo a universal period-doubling cascade, analogous to the famous Feigenbaum-Coullet-Tresser period doubling cascade in one-dimensional dynamics. A renormalization approach has been used by Eckmann, Koch and Wittwer in a computer-assisted proof of existence of a conservative renormalization fixed point. Furthermore, it has been shown by Gaidashev, Johnson and Martens that infinitely renormalizable maps in a neighborhood of this fixed point admit invariant Cantor sets with vanishing Lyapunov exponents on which dynamics for any two maps is smoothly conjugate. This rigidity is a consequence of an interplay between the decay of geometry and the convergence rate of renormalization towards the fixed point. In this paper we prove a result which is crucial for a demonstration of rigidity: that an upper bound on this convergence rate of renormalizations of infinitely renormalizable maps is sufficiently small.
△ Less
Submitted 16 December, 2014;
originally announced December 2014.
-
Eigenvalue fluctuations for random regular graphs
Authors:
Tobias Johnson
Abstract:
One of the major themes of random matrix theory is that many asymptotic properties of traditionally studied distributions of random matrices are universal. We probe the edges of universality by studying the spectral properties of random regular graphs. Specifically, we prove limit theorems for the fluctuations of linear spectral statistics of random regular graphs. We find both universal and non-u…
▽ More
One of the major themes of random matrix theory is that many asymptotic properties of traditionally studied distributions of random matrices are universal. We probe the edges of universality by studying the spectral properties of random regular graphs. Specifically, we prove limit theorems for the fluctuations of linear spectral statistics of random regular graphs. We find both universal and non-universal behavior. Our most important tool is Stein's method for Poisson approximation, which we develop for use on random regular graphs.
This is my Ph.D. thesis, based on joint work with Ioana Dumitriu, Elliot Paquette, and Soumik Pal. For the most part, it's a mashed up version of arXiv:1109.4094, arXiv:1112.0704, and arXiv:1203.1113, but some things in here are improved or new. In particular, Chapter 4 goes into more detail on some of the proofs than arXiv:1203.1113 and includes a new section. See Section 1.3 for more discussion on what's new and who contributed to what.
△ Less
Submitted 26 June, 2014;
originally announced June 2014.
-
Recurrence and transience for the frog model on trees
Authors:
Christopher Hoffman,
Tobias Johnson,
Matthew Junge
Abstract:
The frog model is a growing system of random walks where a particle is added whenever a new site is visited. A longstanding open question is how often the root is visited on the infinite $d$-ary tree. We prove the model undergoes a phase transition, finding it recurrent for $d=2$ and transient for $d\geq 5$. Simulations suggest strong recurrence for $d=2$, weak recurrence for $d=3$, and transience…
▽ More
The frog model is a growing system of random walks where a particle is added whenever a new site is visited. A longstanding open question is how often the root is visited on the infinite $d$-ary tree. We prove the model undergoes a phase transition, finding it recurrent for $d=2$ and transient for $d\geq 5$. Simulations suggest strong recurrence for $d=2$, weak recurrence for $d=3$, and transience for $d\geq 4$. Additionally, we prove a 0-1 law for all $d$-ary trees, and we exhibit a graph on which a 0-1 law does not hold.
To prove recurrence when $d=2$, we construct a recursive distributional equation for the number of visits to the root in a smaller process and show the unique solution must be infinity a.s. The proof of transience when $d=5$ relies on computer calculations for the transition probabilities of a large Markov chain. We also include the proof for $d \geq 6$, which uses similar techniques but does not require computer assistance.
△ Less
Submitted 17 May, 2016; v1 submitted 24 April, 2014;
originally announced April 2014.
-
Reciprocity as the foundation of Financial Economics
Authors:
Timothy C. Johnson
Abstract:
This paper argues that the fundamental principle of contemporary financial economics is balanced reciprocity, not the principle of utility maximisation that is important in economics more generally. The argument is developed by analysing the mathematical Fundamental Theory of Asset Pricing with reference to the emergence of mathematical probability in the seventeenth century in the context of the…
▽ More
This paper argues that the fundamental principle of contemporary financial economics is balanced reciprocity, not the principle of utility maximisation that is important in economics more generally. The argument is developed by analysing the mathematical Fundamental Theory of Asset Pricing with reference to the emergence of mathematical probability in the seventeenth century in the context of the ethical assessment of commercial contracts. This analysis is undertaken within a framework of Pragmatic philosophy and Virtue Ethics. The purpose of the paper is to mitigate future financial crises by reorienting financial economics to emphasise the objectives of market stability and social cohesion rather than individual utility maximisation.
△ Less
Submitted 10 October, 2013;
originally announced October 2013.
-
Quantitative Small Subgraph Conditioning
Authors:
Tobias Johnson,
Elliot Paquette
Abstract:
We revisit the method of small subgraph conditioning, used to establish that random regular graphs are Hamiltonian a.a.s. We refine this method using new technical machinery for random $d$-regular graphs on $n$ vertices that hold not just asymptotically, but for any values of $d$ and $n$. This lets us estimate how quickly the probability of containing a Hamiltonian cycle converges to 1, and it pro…
▽ More
We revisit the method of small subgraph conditioning, used to establish that random regular graphs are Hamiltonian a.a.s. We refine this method using new technical machinery for random $d$-regular graphs on $n$ vertices that hold not just asymptotically, but for any values of $d$ and $n$. This lets us estimate how quickly the probability of containing a Hamiltonian cycle converges to 1, and it produces quantitative contiguity results between different models of random regular graphs. These results hold with $d$ held fixed or growing to infinity with $n$. As additional applications, we establish the distributional convergence of the number of Hamiltonian cycles when $d$ grows slowly to infinity, and we prove that the number of Hamiltonian cycles can be approximately computed from the graph's eigenvalues for almost all regular graphs.
△ Less
Submitted 22 May, 2015; v1 submitted 18 July, 2013;
originally announced July 2013.
-
The Structure of Z-related sets
Authors:
Franck Jedrzejewski,
Tom Johnson
Abstract:
The paper presents some new results on Z-related sets obtained by computational methods. We give a complete enumeration of all Z-related sets in $\mathbb{Z}_{N}$ for small $N$. Furthermore, we establish that there is a reasonable permutation group action representing the Z-relation.
The paper presents some new results on Z-related sets obtained by computational methods. We give a complete enumeration of all Z-related sets in $\mathbb{Z}_{N}$ for small $N$. Furthermore, we establish that there is a reasonable permutation group action representing the Z-relation.
△ Less
Submitted 23 April, 2013;
originally announced April 2013.
-
The Marčenko-Pastur law for sparse random bipartite biregular graphs
Authors:
Ioana Dumitriu,
Tobias Johnson
Abstract:
We prove that the empirical spectral distribution of a (d_L, d_R)-biregular, bipartite random graph, under certain conditions, converges to a symmetrization of the Marčenko-Pastur distribution of random matrix theory. This convergence is not only global (on fixed-length intervals) but also local (on intervals of increasingly smaller length). Our method parallels the one used previously by Dumitriu…
▽ More
We prove that the empirical spectral distribution of a (d_L, d_R)-biregular, bipartite random graph, under certain conditions, converges to a symmetrization of the Marčenko-Pastur distribution of random matrix theory. This convergence is not only global (on fixed-length intervals) but also local (on intervals of increasingly smaller length). Our method parallels the one used previously by Dumitriu and Pal (2012).
△ Less
Submitted 11 September, 2014; v1 submitted 17 April, 2013;
originally announced April 2013.
-
Variable transformation to obtain geometric ergodicity in the random-walk Metropolis algorithm
Authors:
Leif T. Johnson,
Charles J. Geyer
Abstract:
A random-walk Metropolis sampler is geometrically ergodic if its equilibrium density is super-exponentially light and satisfies a curvature condition [Stochastic Process. Appl. 85 (2000) 341-361]. Many applications, including Bayesian analysis with conjugate priors of logistic and Poisson regression and of log-linear models for categorical data result in posterior distributions that are not super-…
▽ More
A random-walk Metropolis sampler is geometrically ergodic if its equilibrium density is super-exponentially light and satisfies a curvature condition [Stochastic Process. Appl. 85 (2000) 341-361]. Many applications, including Bayesian analysis with conjugate priors of logistic and Poisson regression and of log-linear models for categorical data result in posterior distributions that are not super-exponentially light. We show how to apply the change-of-variable formula for diffeomorphisms to obtain new densities that do satisfy the conditions for geometric ergodicity. Sampling the new variable and map** the results back to the old gives a geometrically ergodic sampler for the original variable. This method of obtaining geometric ergodicity has very wide applicability.
△ Less
Submitted 11 December, 2013; v1 submitted 27 February, 2013;
originally announced February 2013.
-
Ethics and Finance: the role of mathematics
Authors:
Timothy C. Johnson
Abstract:
This paper presents the contemporary Fundamental Theorem of Asset Pricing as being equivalent to approaches to pricing that emerged before 1700 in the context of Virtue Ethics. This is done by considering the history of science and mathematics in the thirteenth and seventeenth century. An explanation as to why these approaches to pricing were forgotten between 1700 and 2000 is given, along with so…
▽ More
This paper presents the contemporary Fundamental Theorem of Asset Pricing as being equivalent to approaches to pricing that emerged before 1700 in the context of Virtue Ethics. This is done by considering the history of science and mathematics in the thirteenth and seventeenth century. An explanation as to why these approaches to pricing were forgotten between 1700 and 2000 is given, along with some of the implications on economics of viewing the Fundamental Theorem as a product of Virtue Ethics.
The Fundamental Theorem was developed in mathematics to establish a `theory' that underpinned the Black-Scholes-Merton approach to pricing derivatives. In doing this, the Fundamental Theorem unified a number of different approaches in financial economics, this strengthened the status of neo-classical economics based on Consequentialist Ethics. We present an alternative to this narrative.
△ Less
Submitted 19 October, 2012;
originally announced October 2012.
-
The solution of discretionary stop** problems with applications to the optimal timing of investment decisions
Authors:
Timothy C. Johnson
Abstract:
We present a methodology for obtaining explicit solutions to infinite time horizon optimal stop** problems involving general, one-dimensional, Itô diffusions, payoff functions that need not be smooth and state-dependent discounting. This is done within a framework based on dynamic programming techniques employing variational inequalities and links to the probabilistic approaches employing $r$-ex…
▽ More
We present a methodology for obtaining explicit solutions to infinite time horizon optimal stop** problems involving general, one-dimensional, Itô diffusions, payoff functions that need not be smooth and state-dependent discounting. This is done within a framework based on dynamic programming techniques employing variational inequalities and links to the probabilistic approaches employing $r$-excessive functions and martingale theory. The aim of this paper is to facilitate the the solution of a wide variety of problems, particularly in finance or economics.
△ Less
Submitted 9 October, 2012;
originally announced October 2012.
-
Rigidity for infinitely renormalizable area-preserving maps
Authors:
Denis Gaidashev,
Tomas Johnson,
Marco Martens
Abstract:
The period doubling Cantor sets of strongly dissipative Henon-like maps with different average Jacobian are not smoothly conjugated. The Jacobian Rigidity Conjecture says that the period doubling Cantor sets of two-dimensional Henon-like maps with the same average Jacobian are smoothly conjugated. This conjecture is true for average Jacobian zero, e.g. the one-dimensional case. The other extreme c…
▽ More
The period doubling Cantor sets of strongly dissipative Henon-like maps with different average Jacobian are not smoothly conjugated. The Jacobian Rigidity Conjecture says that the period doubling Cantor sets of two-dimensional Henon-like maps with the same average Jacobian are smoothly conjugated. This conjecture is true for average Jacobian zero, e.g. the one-dimensional case. The other extreme case is when the maps preserve area, e.g. the average Jacobian is one. Indeed, the period doubling Cantor set of area-preserving maps in the universality class of the Eckmann-Koch-Wittwer renormalization fixed point are smoothly conjugated.
△ Less
Submitted 17 December, 2014; v1 submitted 3 May, 2012;
originally announced May 2012.
-
Cycles and eigenvalues of sequentially growing random regular graphs
Authors:
Tobias Johnson,
Soumik Pal
Abstract:
Consider the sum of $d$ many i.i.d. random permutation matrices on $n$ labels along with their transposes. The resulting matrix is the adjacency matrix of a random regular (multi)-graph of degree $2d$ on $n$ vertices. It is known that the distribution of smooth linear eigenvalue statistics of this matrix is given asymptotically by sums of Poisson random variables. This is in contrast with Gaussian…
▽ More
Consider the sum of $d$ many i.i.d. random permutation matrices on $n$ labels along with their transposes. The resulting matrix is the adjacency matrix of a random regular (multi)-graph of degree $2d$ on $n$ vertices. It is known that the distribution of smooth linear eigenvalue statistics of this matrix is given asymptotically by sums of Poisson random variables. This is in contrast with Gaussian fluctuation of similar quantities in the case of Wigner matrices. It is also known that for Wigner matrices the joint fluctuation of linear eigenvalue statistics across minors of growing sizes can be expressed in terms of the Gaussian Free Field (GFF). In this article, we explore joint asymptotic (in $n$) fluctuation for a coupling of all random regular graphs of various degrees obtained by growing each component permutation according to the Chinese Restaurant Process. Our primary result is that the corresponding eigenvalue statistics can be expressed in terms of a family of independent Yule processes with immigration. These processes track the evolution of short cycles in the graph. If we now take $d$ to infinity, certain GFF-like properties emerge.
△ Less
Submitted 28 July, 2014; v1 submitted 6 March, 2012;
originally announced March 2012.
-
Rigorous Enclosures of a Slow Manifold
Authors:
John Guckenheimer,
Tomas Johnson,
Philipp Meerkamp
Abstract:
Slow-fast dynamical systems have two time scales and an explicit parameter representing the ratio of these time scales. Locally invariant slow manifolds along which motion occurs on the slow time scale are a prominent feature of slow-fast systems. This paper introduces a rigorous numerical method to compute enclosures of the slow manifold of a slow-fast system with one fast and two slow variables.…
▽ More
Slow-fast dynamical systems have two time scales and an explicit parameter representing the ratio of these time scales. Locally invariant slow manifolds along which motion occurs on the slow time scale are a prominent feature of slow-fast systems. This paper introduces a rigorous numerical method to compute enclosures of the slow manifold of a slow-fast system with one fast and two slow variables. A triangulated first order approximation to the two dimensional invariant manifold is computed "algebraically". Two translations of the computed manifold in the fast direction that are transverse to the vector field are computed as the boundaries of an initial enclosure. The enclosures are refined to bring them closer to each other by moving vertices of the enclosure boundaries one at a time. As an application we use it to prove the existence of tangencies of invariant manifolds in the problem of singular Hopf bifurcation and to give bounds on the location of one such tangency.
△ Less
Submitted 19 September, 2012; v1 submitted 9 January, 2012;
originally announced January 2012.
-
Exchangeable pairs, switchings, and random regular graphs
Authors:
Tobias Johnson
Abstract:
We consider the distribution of cycle counts in a random regular graph, which is closely linked to the graph's spectral properties. We broaden the asymptotic regime in which the cycle counts are known to be approximately Poisson, and we give an explicit bound in total variation distance for the approximation. Using this result, we calculate limiting distributions of linear eigenvalue functionals f…
▽ More
We consider the distribution of cycle counts in a random regular graph, which is closely linked to the graph's spectral properties. We broaden the asymptotic regime in which the cycle counts are known to be approximately Poisson, and we give an explicit bound in total variation distance for the approximation. Using this result, we calculate limiting distributions of linear eigenvalue functionals for random regular graphs.
Previous results on the distribution of cycle counts by McKay, Wormald, and Wysocka (2004) used the method of switchings, a combinatorial technique for asymptotic enumeration. Our proof uses Stein's method of exchangeable pairs and demonstrates an interesting connection between the two techniques.
△ Less
Submitted 17 February, 2015; v1 submitted 3 December, 2011;
originally announced December 2011.
-
Functional limit theorems for random regular graphs
Authors:
Ioana Dumitriu,
Tobias Johnson,
Soumik Pal,
Elliot Paquette
Abstract:
Consider d uniformly random permutation matrices on n labels. Consider the sum of these matrices along with their transposes. The total can be interpreted as the adjacency matrix of a random regular graph of degree 2d on n vertices. We consider limit theorems for various combinatorial and analytical properties of this graph (or the matrix) as n grows to infinity, either when d is kept fixed or gro…
▽ More
Consider d uniformly random permutation matrices on n labels. Consider the sum of these matrices along with their transposes. The total can be interpreted as the adjacency matrix of a random regular graph of degree 2d on n vertices. We consider limit theorems for various combinatorial and analytical properties of this graph (or the matrix) as n grows to infinity, either when d is kept fixed or grows slowly with n. In a suitable weak convergence framework, we prove that the (finite but growing in length) sequences of the number of short cycles and of cyclically non-backtracking walks converge to distributional limits. We estimate the total variation distance from the limit using Stein's method. As an application of these results we derive limits of linear functionals of the eigenvalues of the adjacency matrix. A key step in this latter derivation is an extension of the Kahn-Szemerédi argument for estimating the second largest eigenvalue for all values of d and n.
△ Less
Submitted 30 June, 2012; v1 submitted 19 September, 2011;
originally announced September 2011.
-
A numerical study of infinitely renormalizable area-preserving maps
Authors:
Denis Gaidashev,
Tomas Johnson
Abstract:
It has been shown in (Gaidashev et al, 2010) and (Gaidashev et al, 2011) that infinitely renormalizable area-preserving maps admit invariant Cantor sets with a maximal Lyapunov exponent equal to zero. Furthermore, the dynamics on these Cantor sets for any two infinitely renormalizable maps is conjugated by a transformation that extends to a differentiable function whose derivative is Holder contin…
▽ More
It has been shown in (Gaidashev et al, 2010) and (Gaidashev et al, 2011) that infinitely renormalizable area-preserving maps admit invariant Cantor sets with a maximal Lyapunov exponent equal to zero. Furthermore, the dynamics on these Cantor sets for any two infinitely renormalizable maps is conjugated by a transformation that extends to a differentiable function whose derivative is Holder continuous of exponent alpha>0.
In this paper we investigate numerically the specific value of alpha. We also present numerical evidence that the normalized derivative cocycle with the base dynamics in the Cantor set is ergodic. Finally, we compute renormalization eigenvalues to a high accuracy to support a conjecture that the renormalization spectrum is real.
△ Less
Submitted 18 July, 2011;
originally announced July 2011.
-
No elliptic islands for the universal area-preserving map
Authors:
Tomas Johnson
Abstract:
A renormalization approach has been used in \cite{EKW1} and \cite{EKW2} to prove the existence of a \textit{universal area-preserving map}, a map with hyperbolic orbits of all binary periods. The existence of a horseshoe, with positive Hausdorff dimension, in its domain was demonstrated in \cite{GJ1}. In this paper the coexistence problem is studied, and a computer-aided proof is given that no ell…
▽ More
A renormalization approach has been used in \cite{EKW1} and \cite{EKW2} to prove the existence of a \textit{universal area-preserving map}, a map with hyperbolic orbits of all binary periods. The existence of a horseshoe, with positive Hausdorff dimension, in its domain was demonstrated in \cite{GJ1}. In this paper the coexistence problem is studied, and a computer-aided proof is given that no elliptic islands with period less than 20 exist in the domain. It is also shown that less than 1.5% of the measure of the domain consists of elliptic islands. This is proven by showing that the measure of initial conditions that escape to infinity is at least 98.5% of the measure of the domain, and we conjecture that the esca** set has full measure. This is highly unexpected, since generically it is believed that for conservative systems hyperbolicity and ellipticity coexist.
△ Less
Submitted 2 June, 2011; v1 submitted 10 December, 2010;
originally announced December 2010.
-
Tree polymers in the infinite volume limit at critical strong disorder
Authors:
Torrey Johnson,
Edward C Waymire
Abstract:
The a.s. existence of a polymer probability in the infinite volume limit is readily obtained under general conditions of weak disorder from standard theory on multiplicative cascades or branching random walk. However, speculations in the case of strong disorder have been mixed. In this note existence of an infinite volume probability is established at critical strong disorder for which one has con…
▽ More
The a.s. existence of a polymer probability in the infinite volume limit is readily obtained under general conditions of weak disorder from standard theory on multiplicative cascades or branching random walk. However, speculations in the case of strong disorder have been mixed. In this note existence of an infinite volume probability is established at critical strong disorder for which one has convergence in probability. Some calculations in support of a specific formula for the a.s. asymptotic variance of the polymer path under strong disorder are also provided.
△ Less
Submitted 16 March, 2011; v1 submitted 12 July, 2010;
originally announced July 2010.