c 2010 Jason C. Harrington - University of...

64
TOPOLOGICAL EFFICIENCY OF STIRRING WITH OBSTACLES By JASON C. HARRINGTON A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY UNIVERSITY OF FLORIDA 2010

Transcript of c 2010 Jason C. Harrington - University of...

TOPOLOGICAL EFFICIENCY OF STIRRING WITH OBSTACLES

By

JASON C. HARRINGTON

A DISSERTATION PRESENTED TO THE GRADUATE SCHOOLOF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT

OF THE REQUIREMENTS FOR THE DEGREE OFDOCTOR OF PHILOSOPHY

UNIVERSITY OF FLORIDA

2010

c⃝ 2010 Jason C. Harrington

2

To my wife and my family who supported me throughout the whole process

3

ACKNOWLEDGMENTS

I am indebted to my PhD advisor, Professor Boyland, for his patience and guidance

throughout the whole PhD process. Without his help, this dissertation would not be

possible. I would like to express my gratitude to the committee members. I would like to

thank Professor Keesling and Professor Block for introducing me to dynamics and for

their excellent teaching. I would also like to express my gratitude to Professor Robinson

for his insightful comments on the dissertation and his general guidance while I was a

student in graduate school. Lastly, I would like to thank Professor Peters for serving as

the external committee member.

4

TABLE OF CONTENTS

page

ACKNOWLEDGMENTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

LIST OF FIGURES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

ABSTRACT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

CHAPTER

1 INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101.2 Stirring Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121.3 Stirring as a Braid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131.4 Mapping Class Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151.5 Topological Entropy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161.6 Thurston’s Analysis of Mapping Classes . . . . . . . . . . . . . . . . . . . 161.7 Fluid Mechanics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

2 BURAU REPRESENTATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

2.1 Burau Representation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192.1.1 Burau as the Action on Homology . . . . . . . . . . . . . . . . . . . 192.1.2 Right Automorphism . . . . . . . . . . . . . . . . . . . . . . . . . . 20

2.2 Reduced Burau Representation . . . . . . . . . . . . . . . . . . . . . . . . 232.3 Burau Representation and Entropy . . . . . . . . . . . . . . . . . . . . . . 242.4 Convention and Notation . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

3 FUNDAMENTAL STIRRING PROTOCOLS . . . . . . . . . . . . . . . . . . . . 26

3.1 Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263.2 Configuration Spaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

4 NUMERICAL EXPERIMENTS . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

4.1 Group Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294.2 Burau Representation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304.3 Mousifir Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304.4 Results of Experimentation . . . . . . . . . . . . . . . . . . . . . . . . . . 30

5 PROPERTIES OF HSP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

5.1 Entropy Lower Bound for HSP . . . . . . . . . . . . . . . . . . . . . . . . . 335.2 Gearability of HSP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

5

6 UPPER BOUNDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

6.1 Construction of Upper Bound . . . . . . . . . . . . . . . . . . . . . . . . . 456.2 Spectral Radius of incidence Matrices . . . . . . . . . . . . . . . . . . . . 51

APPENDIX: SOME GENERAL MATRIX LEMMAS . . . . . . . . . . . . . . . . . . . 59

A.1 General Matrix Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59A.2 Spectral Radius Properties . . . . . . . . . . . . . . . . . . . . . . . . . . 60

REFERENCES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

BIOGRAPHICAL SKETCH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

6

LIST OF FIGURES

Figure page

1-1 Particle Dance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

1-2 Geometric Braid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

1-3 Sigma Generators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

2-1 π1 Generators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

2-2 σi Acting on π1 Generators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

2-3 Z cover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

2-4 Lift of a path in M2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

2-5 1-Skeleton of M2 and its lift . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

2-6 Induced action of σ1 on Z-cover . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

3-1 α4 Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

4-1 Two versions of HSP6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

4-2 Comparison between two stirring protocols . . . . . . . . . . . . . . . . . . . . 31

5-1 Efficiency of HSP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

5-2 Train Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

5-3 Constructing HSP(8) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

6-1 New Generators for π1(M2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

6-2 New Alpha Generators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

7

Abstract of dissertation Presented to the Graduate Schoolof the University of Florida in Partial Fulfillment of theRequirements for the Degree of Doctor of Philosophy

TOPOLOGICAL EFFICIENCY OF STIRRING WITH OBSTACLES

By

Jason C. Harrington

December 2010

Chair: Phillip BoylandMajor: Mathematics

We investigate the two-dimensional problem of stirring by a single stirrer moving

around a finite number of obstacles. The goal is to find the stirring protocol which yields

the maximum topological efficiency. Topological efficiency is defined to be the entropy

associated with the stirring protocol divided by the number of stirrer motions around

each obstacle, and we denote the maximum efficiency with m obstacles as E(m).

Our investigation begins with numerical simulations of the topological efficiency

for a variety of paths and number of obstacles. Since we seek the maximum efficiency,

the topological efficiency of any specific stirring protocol yields a lower bound for E(m).

To the degree possible computationally we find that the maximum efficiency seems to

be realized by a specific protocol which is essentially “looping around each obstacle

once,” and we denote it HSPm. Using techniques from Thurston-Nielsen theory we can

rigorously compute the efficiency of HSPm, use it as a lower bound for E(m), and show it

converges to log(3) as m → ∞.

For an upper bound, we will use Bowen’s Theorem that entropy is bounded

below by the growth rate of the action of the map on the fundamental group. We use

non-standard generators for our space, the disk with m + 1 holes. The stirring path

induces an action on these generators. The growth rate on π1 is overestimated by

ignoring cancellations. This allows us to use the incidence matrices of the action and

thus get an entropy upper bound using the generalized spectral radius of the incidence

8

matrices of the fundamental motions of the stirrer. We prove that this generalized

spectral radius is actually achieved by a finite product of incidence matrices which are

closely related to the protocol HSPm. Finally, we show that the upper bound for the

topological efficiency converges to log(3) as m → ∞, and so, E(m) is log(3) in the

asymptotic limit.

9

CHAPTER 1INTRODUCTION

1.1 Introduction

We investigate the two-dimensional problem of stirring by a single stirrer moving

around a finite number of obstacles. We call such a stirring motion as a fundamental

stirring protocol. The goal is to find the fundamental stirring protocol which yields the

maximum topological efficiency. Topological efficiency is defined to be the entropy

associated with the stirring protocol divided by the number of stirrer motions around

each obstacle, and we denote the maximum efficiency with m obstacles as E(m). In

other words,

E(m) = sup{E� (β) : β is a fundamental stirring protocol with n − 1 fixed holes }

where E� denotes the topological efficiency of the fundamental stirring protocol.

Theorem 1.1 (Main Theorem). Consider a disk with m − 1 obstacles, and one funda-

mental stirrer. Then

log((3m−1 − 3m + 2)/(m − 1))

m − 1≤ E(m) ≤ log(3).

We begin by looking at two-dimensional stirring from different points of view. First,

we will consider a stirring protocol as a particle dance, where the stirrers move around

as points in two-dimensions. This will describe the possible paths of the stirrers. Next,

we consider a stirring protocol as a braid. Since braids have generators, this enables us

to have a group structure on stirring protocols. We will use αj ’s to denote the elements

of a fundamental stirring protocol.

Next, we will consider a stirring protocol as an element of the mapping class group,

which enables us to use Thurston-Nielsen theory. When a stirrer moves around an

obstacle, it will “pull” and “stretch” the fluid around. However, given a specific stirring

protocol, different fluids may behave differently. For example, stirring coffee with cream

10

is rather effortless and can be done with a flick of a spoon, whereas this motion will

not mix thicker fluids like cement. If we consider a fluid as a surface homeomorphism,

then Thurston-Nielsen theory gives us the a surface homeomorphism called φ that

has the smallest entropy associated with the stirring protocol. We will use the Burau

representation for braids which gives a lower bound for the entropy of φ.

Since any stirring protocol gives a lower bound for E(m), we used several numerical

techniques for finding one that appeared to be most efficient and then rigorously

computed its efficiency. Three different different numerical techniques for approximating

the entropy of a fundamental stirring protocol with n − 1 fixed holes were used. Several

thousand different stirring protocols were generated and tested with these techniques.

1. The first technique uses the Burau representation of the fundamental stirringprotocol. The matrix generated at t = −1 gives a lower bound for the entropy ofthe braid.

2. The next technique considers the action of the fundamental stirring protocol on thefundamental group of the disk with n holes by allowing the fundamental stirrer tobe one the holes. The stirring protocol was then iterated up to 10 times. This wasused to approximate the exponential growth on π1 and thus the entropy.

3. The last technique uses a program called trains.exe created by Toby Hall thatuses train tracks to compute the entropy of a braid. A random fundamental stirringprotocol was generated and then converted into the generators for the Artin braidgroup and inputed that word into the program.

After considering several thousand different stirring protocols that were produced

randomly, the one that was most efficient out of tested protocols was found to be a

protocol which loops exactly once around each obstacle in succession. This stirring

protocol was used to compute a lower bound.

In order to compute the upper bound, we used the action that is induced on the

fundamental group by the α generators for the fundamental stirring protocols. By not

considering cancellation, we were able to find an upper bound for the exponential growth

on π1 and thus the entropy.

11

Putting both of these ideas together, we are able to show that

log((3m−1 − 3m + 2)/(m − 1))

m − 1≤ log(ρ(HSPm))

m − 1≤ E(m) ≤ log(3).

This means that limm→∞ E(m) = log(3) and that limm→∞ log(ρ(HSPm))/(m − 1) = log(3).

The process of computing the upper bound produced a matrix, named the incidence

matrix, for each generator of the fundamental stirring protocol. Let Aj denote the

incidence matrix for αj . The generalized spectral radius of the set of incidence matrices

is computed. The generalized spectral radius of the set of matrices is realized by the

matrix A2 ...An which is exactly the same order as in the lower bound. This supports the

conjecture that E(n) is actually achieved by the HSP.

1.2 Stirring Protocol

We now discuss the set-up to study fluid mixing from a topological point of view.

This branch of mathematics is called Topological Fluid Mechanics. First we will define

what is meant by a general stirring protocol. Let D2 be the unit disk in R2 and let n be a

positive integer.

Definition 1 (Stirring Protocol). Consider n distinct points x1, x2, ... , xn in the interior of

D2. We define a stirring protocol SP by SP = (f1(t), ... , fn(t)) where fi : [0, 1] → D2 such

that:

1. fi is continuous for each i ,2. fi(t) = fj(t) if i = j , for all t ∈ [0, 1],3. fi(0) = xi for each i ,4. fi(1) ∈ {x1, x2, ... , xn} for each i .

Each fi corresponds to the motion of a stirrer. Some people prefer that the path of

the stirrer be differentiable, however, differentiability is not needed for this discussion.

Condition 2 implies that the stirrers do not hit each other at each time t, i.e. {f1(t), ... , fn(t)}

are n distinct points. Condition 3 merely tells us the starting position of the stirring

protocol. Condition 4 implies the stirrers must end back on the set {x1, x2, ... , xn}.

This definition of a stirring protocol is sometimes referred to as a ”particle dance” as

12

discussed by Rolfsen [1]. Figure 1-1 gives an example of a stirring protocol, where

there are initially four stirrers and the arrow shows the path of each stirrer back to

the ”base” position. Note that it is possible for fi(1) = fi(0) for some i . If we replace

Figure 1-1. The stirrers act as particles moving in the fluid.

condition 4 with “fi(1) = fi(0) for all i ” then we have a special case called a pure stirring

protocol.

1.3 Stirring as a Braid

We will now show that the construction of a stirring protocol can be described in

terms of the Artin Braid group. The rigorous proofs of the claims in the section can be

found in the classic Birman book [2].

Let SP be a stirring protocol as defined above. Let I = [0, 1] and Ai : I → I × D2

be defined by Ai(t) = (t, fi(t)) for each i . By construction, each Ai is a continuous arc.

We will call each Ai a braid string. Let A = {A1,A2, ... ,An} be a family of arcs that start

at the points {(0, x1), (0, x2), ... , (0, xn)} and end up at {(1, f1(1)), (1, f2(1)), ... (1, fn(1))}.

By construction, each Ai intersects each intermediate parallel plane exactly once, and

A intersects each intermediate parallel plane at exactly n distinct points. We call A a

geometric n-braid.

13

Definition 2 (Pure Braid). If all the arcs of a geometric n-braid, A, have the property that

fk(1) = xk for all k , where f is a stirring protocol and xk is the starting point as defined

previously, then we call this braid a pure braid.

Figure 1-2. A stirring protocol as a Geometric Braid.

Next, we will discuss the equivalence of two geometric n-braids. The idea is that

we should be able to “deform a braid” without changing the structure, i.e. a braid string

can not pass through other braid strings but can “wiggle” around. We make this concept

more precise by the following definition.

Definition 3 (Equivalence of Geometric Braids). Let X = I × D2. We say that two

geometric braids β and β′ are equivalent if there is an isotopic deformation Hs : X × I →

X where the image set βs is a geometric braid for all s ∈ I and β0 = β and β1 = β′.

Let B(n) denote the set of all equivalence classes of the geometric n-braids. Let

β1, β2 ∈ B(n), we define the product (composition), denoted as β1 · β2 as follows.

Let β1 = [B1] where [B1] denotes the equivalence class for the geometric braid B1,

similarly, β2 = [B2]. So B2 is a family of arcs that start at {(0, x1), (0, x2), ... , (0, xn)} and

end at {(1, x1), (1, x2), ... , (1, xn)}. Shift B1 up so that B1 is a family of arcs that start at

{(1, x1), (1, x2), ... , (1, xn)} and end at {(2, x1), (2, x2), ... , (2, xn)}. We concatenate the

braids together with B1 on top and B2 below. Together, we have a braid in [0, 2] × D2.

We may rescale time, so that the concatenated braid fits in I × D2. The equivalence

class of this newly formed braid is β1 · β2. There is also an identity element, namely, the

braid where each string is simply a straight line and does not cross other strings. Given

14

a braid β1, there exists a braid β3 that will “undo” β1 in the sense that β1 · β3 is the identity

braid.

The Artin Braid group is the group formed from (B(n), ·). Artin identified a set of

generators and relations, i.e. a presentation for the Artin Braid group. Let σi denote the

braid whose i th and i + 1th braid string change places as shown in Figure 1-3. In Artin’s

Figure 1-3. σi and σ−1i

first paper on braid groups from 1925 [3], he gave a presentation of the braid group in

terms of the σi ’s and their relations, namely:

Theorem 1.2 (Artin). The group B(n) of geometric braids on n-strings admits a presen-

tation with generators σ1,σ2, ... ,σn−1 with the defining relations;

1. σi · σj = σj · σi for |i − j | > 2,2. σi · σi+1 · σi = σi+1 · σi · σi+1 for 1 ≤ i ≤ n − 2.

By convention, we will have time going down and will think of the σ’s as composition,

so we will read them from right to left. For example, from the braid in the figure 1-2

the braid presentation is σ2σ−11 . We will describe the stirring protocol in terms of the

generators of the Artin braid group.

1.4 Mapping Class Groups

We have another way we may describe a stirring protocol. The description will help

us understand the dynamics given by a stirring protocol.

Let M2 be an orientable, compact surface with negative Euler characteristic,

possibly with boundary. We will allow a finite number of points that act like obstacles.

15

Definition 4. The mapping class group on M2 is

MCG(M2) = {[f ] where f : M2 → M2is a homeomorphism and

f |∂M2 = id and [f ] is the isotopy class for f }

where isotopies are taken to fix the boundary, ∂M2, point wise. MCG has a natural group

operation, namely composition.

Let M2 = D2 − {n − pts}. Imagine that the points removed are stirrers in a “fluid”

and the points pull their surroundings with them as they move about. Topologically, the

motion of the points extends (not uniquely) to a continuous family of homeomorphisms

of M2. This isotopy class describes an equivalence between B(n) and MCG(M2).

1.5 Topological Entropy

Let γ : M2 → M2 where γ is a homeomorphism and γ∗ : π1(M2) → π1(M

2) be the

group action induced by γ. In other words, as γ moves the points of the space around,

then γ∗ will also move the elements of the fundamental group in M2 in the same manner.

There is a nice geometrical description in figure 2-2 when γ = σi .

Let L denote the word length. By Bowen [4] with a theorem in [5] the topological

entropy of a pseudo-Anosov map γ is given by

h(γ) = supg∈π1(M2)

limm→∞

log(L (γm∗ g))

m.

Entropy can be used to determine the asymptotic behavior of iterating an induced

action. For example, if h(γ) > 0, then we know that the word length of γm∗ g is growing

exponentially for all g ∈ π1(M2) as m increases. Furthermore, if h(γ1) > h(γ2) for some

induced actions on π1(M2), then (γ1)

m∗ g is growing exponentially faster than (γ2)

m∗ g for

all g as m increases This gives a measure of the complexity of the action.

1.6 Thurston’s Analysis of Mapping Classes

We would like to discuss the dynamics of the stirring protocol. We will make use of

the following theorem:

16

Theorem 1.3 (Thurston-Nielsen Classification). If f is a homeomorphism of a compact

surface, S , with perhaps a finite number of punctures, then f is isotopic to a homeomor-

phism, φ, of one of the following types:

1. Finite order: φm = id for some integer m ≥ 1;

2. Pseudo-Anosov: φ preserves a pair of transverse, measured foliations, Fu and Fs

and there is a λ > 1 such that φ stretches Fu by a factor of λ and contracts Fs by1/λ;

3. Reducible: φ fixes a family of reducing curves, and on the complementary surfaceφ satisfies (1) or (2).

This theory was developed by Thurston [6]. Letting f ∈ MCG(M2), we have three

cases for the Thurston representative φf . The finite order case states that after a finite

number of iterations of ϕf , we will end up back where we started. The pseudo-Anosov

case, abbreviated pA, tells us that the topological entropy of φf is log(λ) where λ is

the value stated in the theorem [5]. The third case, the reducible case, implies that the

space can be divided into invariant pieces where φf has either finite order or is pA on

the pieces.

1.7 Fluid Mechanics

In this section, we will explain how a stirring protocol relates to the physical

application of fluid mixing. By the following theorem of Handel [7], we see that a pA

map gives us a lower bound for the dynamics induced by a stirring protocol.

Theorem 1.4 (Handel’s Istopy Stability). If φ is a pA and f is isotopic to φ, then there

is a compact, f -invariant set, Y , and a continuous, onto mapping α : Y → M2, so that

αf = φα.

Thus, we have the commutative diagram,

Y

�

f // Y

�

M2φ

// M2

17

This theorem states that the dynamics of f are at least as complicated as the

dynamics of φ. In the case with fluid mixing, the fluid moves continuously on the surface

D2 −{n− pts}. Let f denote the fluid flow. So if we have a pA map called, φf , associated

to f , then the topological entropy log(λ) = h(φf ) ≤ h(f ) where λ is the value from

Thurston’s theorem. So the pA gives the lower bound for the topological entropy of any

fluid, regardless of its physical properties.

So with each braid, there is a Thurston representative. These representatives give

us a lower bound for the entropy of the actual fluid flow. The idea is to maximize the

amount of entropy associated with stirring, while minimizing the number of motions

needed for the stirrer to move.

Historically, fluid mixing was solved on a case-by-case basis. The fluid flow

would be a solution to a specific set of partial differential equations, and a computer

experiment was run with various stirring protocols. Then to determine the best stirring

protocol, one would use a specific mixing measure and compare. Finn, Cox and Burns

[8], list a few various measures that are still used today. Also, Ottino [9] and Chorin [10]

are good references for traditional fluid mechanics.

18

CHAPTER 2BURAU REPRESENTATION

2.1 Burau Representation

A representation of a group G on a module M over a ring R is a group homomorphism

from G to GL(M). We define a homomorphism

b : B(n) → GLn(Z[t, t−1])

called the Burau representation, by the images of the generators of B(n).

b(σi) =

Ii−1 0 0 0

0 1− t t 0

0 1 0 0

0 0 0 In−i−1

i th row

where Ik denotes the k × k identity matrix. This representation is named after its

discoverer Burau in 1936 [11].

We see by direct computation that

1. b(σi) · b(σj) = b(σj) · b(σi) for |i − j | > 2,2. b(σi) · b(σi+1) · b(σi) = b(σi+1) · b(σi) · b(σi+1) for 1 ≤ i ≤ n − 2.

The Burau representation for n = 2, 3 is faithful and the proof can be found in

Birman’s book [2]. In 1999, Bigelow [12] showed that the representation is not faithful for

n = 5. For n ≥ 6, Long and Paton showed in 1993 that the Burau representation is not

faithful [13]. However, it is still unknown whether or not it is faithful when n = 4.

2.1.1 Burau as the Action on Homology

We will show that this representation can be interpreted as the induced action on

homology in Z-covers by a braid β. References for this section are [14] and [15]. First

we must introduce another action.

19

2.1.2 Right Automorphism

We need to compute the action of the braid generators on the fundamental group

of our disk minus n points, M2. Let Fn denote a free group on n symbols. Recall the

σ notation for the braid generators from 1.2. We will define a right automorphism of

Fn =< x1, ... , xn >. Let σi ∈ B(n) and we will define σ ∈ Aut(Fn) by

xi σi = xixi+1x−1i (2–1)

xi+1σi = xi (2–2)

xj σi = xj when j = i and j = i + 1. (2–3)

Recall that σi switches the braid i th hole. There is a graphical interpretation for this

action. Let xi be a generator for M2 = D2 − {n − pts}, i.e. We determine how the σi

x1 x2 x3 xn

p

Figure 2-1. π1 Generators

generators act on π1(M2, p). We think of σi as twisting the loops xi and xi+1. Notice that

the other loops, xj do not move, i.e. xj σi = xj for all j = i and j = i + 1.

x1 xi xi+1 xn

p

x1 xn

p

Figure 2-2. σi Acting on π1 Generators

20

Now, we can construct a covering space ~M2 of M2 by making cuts from each

puncture to the boundary and connecting copies of M2. For example, when n = 3 we

have the following figure. Thus, the deck transformations mapping from one copy to

Figure 2-3. Cover of a disk with 3 holes

the next are given by the group < t >, the cyclic group of infinite order. This process of

passing from homotopy to homology is known as Abelianization.

For example, when n = 3 we have the following figure.

p

p

tp

Figure 2-4. Loop in M2 lifts to a path from ~p to t~p

21

By the homotopy lifting property, we know after fixing a base point in the cover that

a loop lifts uniquely to a path in the cover. We will now consider the action on ~M2 by

looking at a 1-skeleton of M2 and its lift, as we see below:

a

b

c

a b c~ ~ ~pp

tp

~

~

t

Figure 2-5. 1-Skeleton of M2 and its lift

Next, we consider a specific example, with σ1 we have that a 7→ aba−1 from 2–1

where a ∈ π1(M2) from 2-5 and a is in the lift of a. Let ~σ1 denote the lift of the action σ1

in the 1-skeleton. Thus, a~σ1 = (1 − t)a + b and similarly a~σ1 = a and c~σ1 = c . We

p

tp

~

~

a~

σ p

tp

~

~

a~

1

ta~ tb~

~

Figure 2-6. Induced action on Z-cover

can repeat the process to compute the action of the other generators. We will write the

22

action ~σi by a matrix. This is the action of ~σ1,

~x1 7→ ~x1 − t ~x1 + t ~x2,

~x2 7→ ~x1,

~x3 7→ ~x3.

We can write ~σ1 as matrix by observing that

~σ1 :

~x1

~x2

~x3

7→

1− t t 0

1 0 0

0 0 1

~x1

~x2

~x3

.

We have now arrived at the Burau representation for σ1, and similarly we can construct

matrix representation for the other generators.

From our example in which n = 3 and ~σ1 we may choose a different basis,

( ~x1 + t ~x2 + t2 ~x3, ~x2 − ~x1, ~x2 − ~x3)

This yields

b(σi)

~x1 + t ~x2 + t2 ~x3

~x2 − ~x1

~x2 − ~x3

=

1 0 0

0 −t 0

0 −1 1

x1 + tx2 + t2x3

x2 − x1

x2 − x3

The matrix in the block is called the reduced Burau representation. For a braid group

B(n), we only need to consider the reduced Burau representations in GLn−1(Z[t, t−1]) to

compute the lower bound for entropy.

2.2 Reduced Burau Representation

We define a homomorphism

rb : B(n) → GLn−1(Z[t, t−1])

23

called the reduced Burau representation, by the images of the generators of B(n).

rb(σ1) =

−t 1 ... 0

0 I

rb(σj) =

1

. . .

1 0 0

t −t 1

0 0 1

. . .

1

where (0, ... , 0, t,−t, 1, 0, ... , 0) occurs on the j th row for r(σj) and 1 < j < n.

2.3 Burau Representation and Entropy

Let MSP(t) be a reduced Burau matrix representation of a stirring protocol SP.

Let ρ(M) denote the spectral radius of M. Let h(SP) denote the entropy of the stirring

protocol. Fried [16] has shown that

Theorem 2.1 (Fried).

h(SP) ≥ sup{ρ(MSP(t)) : t ∈ C |t| = 1} (2–4)

as a corollary of results using twisted cohomology. Later Kolev in [17] showed this

inequality using only the definition of the Burau representation and Fox free differential

calculus. We will call equation 2–4 the Burau estimate. Then the question was asked,

“under what conditions is this inequality sharp”? Band and Boyland tackled this problem

[18], and here is the main result of that paper:

24

Theorem 2.2 (Band and Boyland). For a pA braid β, the Burau estimate is sharp for the

entropy at some root of unity if and only if it is sharp at −1.

2.4 Convention and Notation

The Braid group on (n + 1)-strings {σ1, ...,σn} is traditionally thought of as a

composition of functions, i.e. the braid σ1σ2 is read from right to left so we would perform

σ2 first. However, matrix multiplication is performed from left to the right.

For ease of notation, we would like the order of the Braid group and the Burau

representation to be read in the same way. We are only interested in the spectral radius

of the Burau matrices and a matrix and its transpose have the same spectral radius.

ρ(rb(σ1σ2)) = ρ(rb(σ2) · rb(σ1)) = ρ((rb(σ2) · r(σ1))T ) = ρ(rb(σ1)T · rb(σ2)T )

Notice that the order on the left hand side matches the order on the right hand side. It is

because of this that we will use

r : B(n) → GLn−1(Z[t, t−1])

where r(σi) = rb(σi)T .

25

CHAPTER 3FUNDAMENTAL STIRRING PROTOCOLS

3.1 Definition

For the rest of this paper, we only consider the very special case where we have

n obstacles and a single stirrer. In this specific case, we call stirring protocols the

fundamental stirring protocols. In other words, a fundamental stirring protocol can be

thought of as a pure braid, where only one braid string is allowed to “move” around the

other stationary braid strings.

Definition 5 (Fundamental Stirring Protocol). Consider n distinct points x1, x2, ... , xn

in the interior of D2. We will define a fundamental stirring protocol FSP, by FSP =

(f1(t), ... , fn(t)) where fi : [0, 1] → D2 such that:

1. f1 is continuous,2. fi is constant for each i > 1,3. fi(t) = fj(t) if i = j , for all t ∈ [0, 1],4. fi(0) = xi for each i ,5. f1(1) = f1(0).

The first stirrer associated with f1 will be called a π−stirrer, while the other stirrers

will be referred to as obstacles.

3.2 Configuration Spaces

The fundamental group of the configuration space will give an alternate definition of

the stirring protocol. This new way at looking at a stirring protocol will give insight on the

generators needed to describe the fundamental stirring protocol.

Let M be a manifold of dimension greater than or equal to 2, let∏n

i=1M denote the

n-fold product space, and let F0,n denote the space

F0,n(M) = {(z1, ... , zn) ∈n∏

i=1

M|zi = zj if i = j} (3–1)

Let Qm = {q1, ... qm} be a set of fixed distinguished points of M. Now define Fm,n(M) =

F0,n(M −Qm).

26

Let M = D2 be the disk with the usual Euclidean metric. From Birman, [19] we see

that the fundamental group π1(F0,n(D2)) = Pn where Pn is the pure braid group.

The points {z1, ... , zn} in equation 3–1 are ordered and we can permute them by

acting with the symmetric group,∑

n. The right action µ : F0,n(M) ×∑

n → F0,n is

defined by µ((x0, ... , xn), a) = (xa(0), · · · , xa(n)).∑

n acts freely on F0,n. In general, we

have π1(F0,n(D2))/

∑n = Bn, where

∑n is the symmetric group and Bn is the full braid

group.

Consider the braid group Cn = π1(Fn−1,1), which is a subgroup of Pn (and thus a

subgroup of Bn) describing the case where there are n − 1 obstacles and one stir. We

have the following theorem.

Theorem 3.1. The group formed by the braids generated by a single stirrer with n − 1

obstacles in the disk D2 is isomorphic to Fn−1, the free group on n − 1 letters.

Proof.

Cn(D2) = π1(Fn,1(D

2)) = π1(D2 −Qn−1) = Fn−1

where Fm is the free group generated by m elements.

We can represent braids by a finite number of σj ’s. In our specific case, the first

braid string, (the string to far-left), is allowed to move around the other n − 1 obstacles.

In Figure 3-1, we see an example. Let αk denote the braid, where the first braid string

loops clockwise around the j th string passing in front of the other strings. We can

represent αk in terms of σ’s, as:

αk = σ−11 σ−1

2 σ−13 ...σ−1

k−2σ−1k−1σ

−1k−1σk−2 ...σ2σ1

where, 1 < k ≤ n. Figure 3-1 shows the case where n = 5 and we consider α4.

The fundamental stirring protocol is described by a finite product of αi ’s. If there are

n − 1 obstacles and one fundamental stirrer, then there are 2(n − 1) different αi ’s that

can describe possible paths of the stirrer, namely, {α2,α3, ... ,αn,α−12 , ... ,α−1

n }. There

27

Figure 3-1. The the left stirrer moves around the 4th obstacle

are no relations among the α generators. They form the free group Fn as mentioned in

Theorem 3.1.

Example 1. Consider the case with 4 obstacles and a fundamental stirrer. Let γ be the

stirring protocol where γ = α2α2α3α−14 α5.

Let # denote the number of α’s in the stirring protocol. So for our previous example,

we see that #γ = 5.

We define what is meant by topological efficiency.

Definition 6 (Topological Efficiency). Let γ be a fundamental stirring protocol. Let ϕγ

be the map from the Thurston’s Classification in the isotopy class of the protocol. Let h

denote the topological entropy of ϕγ, then the topological efficiency is

E� (γ) =h(ϕγ)

A way to think about this definition is the entropy per generator. The entropy will

usually increase with more α’s, however, the efficiency may lower.

28

CHAPTER 4NUMERICAL EXPERIMENTS

To help with the investigation, there were three types of numerical experiments that

were done. The results will be discussed last. From each experiment, we were looking

for patterns and trends with the overall efficiency of the fundamental mixing protocols. In

a paper by Boyland, Aref, and Stremler [20] stated that at least 3 stirrers are needed to

induce a mixing protocol. So we will assume that n is greater than or equal to three.

4.1 Group Actions

We will assume that we have a n−1 obstacles and a fundamental stirrer. Recall that

the group formed by a single stirrer with n − 1 obstacles is π1(D2 − Qn−1) = Fn−1. The

stirrer induces an action on the fundamental group of the disk minus n points, namely,

αk : Fn−1 → Aut(Fn). A direct calculation shows that

αk(xj) =

xj if j < k

(xnxk)−1xj(xnxk) if j = k[

x−1n , x−1

k

]−1xj[x−1n , x−1

k

]if k < j < n − 1

x−1k xjxk j = n

(4–1)

where [a, b] denotes the commutator and 1 ≤ j ≤ n and 1 ≤ k ≤ n − 1. Let L denote the

word length. For example, L (x1x2x−11 x3) = 4. Given a stirring protocol, SP =

∏m

k=1 αnk ,

we can look at the word growth under iteration on an element of Fn−1. One method of

finding the most efficient stirring protocol is to find the stirring protocol that will produce

the largest word in Fn per αi in the protocol. We want to maximize efficiency, not just

entropy.

Let SP =∏m

k=1 αnk be a fundamental stirring protocol. Then we pick an element of

the fundamental group, say xj , and we let SP act on xj by the equations in 4–1. Then we

let SP act on the results and we repeat. Let SPm denote iterating the stirring protocol m

times.

29

Bowen [4] with a theorem in [5] tells us how to compute the entropy of a pseudo-Anosov

map using word growth. Namely,

h(SP) = supxj∈π1(M2)

limm→∞

log(L (SPmxj))/m.

For the experiment, various xj ’s were picked.

If the protocol is truly mixing, i.e. has positive entropy, then the word length will

grow exponentially. A scripting computer language, Perl, was used to test the topological

efficiency of different stirring protocols. However, the program would run out of memory

(2 gigs) after 10 iterations for any protocol that had positive entropy.

4.2 Burau Representation

The second experiment was to compute the Burau representation for the αj ’s

generators with the substitution t = −1 as stated above. Then randomly generated

stirring protocols of different lengths. The entropy was approximated by the logarithm of

the spectral radius. This program was written in Mathematica.

4.3 Mousifir Algorithm

The previous two methods only gave approximations. The next one gives the exact

entropy. The two programs were written by Toby Hall [21].

The first program trains.exe computes the entropy of a braid by using the Bestvina-Handel

algorithm. The second program dynn.exe computes the entropy of a braid by using the

Mousifir Algorithm.

Random fundamental stirring protocols were created and were turned into

braids as described above by a C++ program and then inputed that word into Toby

Hall’s programs. The output was analyzed by Excel where topological efficiency was

computed.

4.4 Results of Experimentation

Every experiment yielded the same result, namely the protocol αn−1αn−2 · · ·α2 has

the largest efficiency for n − 1 obstacles with a single stirrer. We will call this protocol

30

HSPn. Remember that the fundamental stirrer can also be considered as a braid string,

so HSPn has a total of n braid strings or in other words, the n − 1 obstacles and the

fundamental stirrer.

If we change the positions of the open holes, we see that HSP has a lot symmetry.

In Figure 4-1 we see the case for HSP6.

Figure 4-1. Two versions of HSP6

Another interesting fact that came out, is that the efficiency does not depend on

essential crossings, the minimal number of times the fundamental stirrer crosses its own

path, of the stirring protocol.

Let us compare the two following stirring protocols in Figure 4-2. The stirring

protocol on the left is HSP6, while the stirring protocol on the right uses the same alpha’s

as the left but in a different order. The protocol on the left has three times the amount of

topological entropy as the one on the right.

Figure 4-2. The left stirring protocol is more efficient.

In a paper by Finn, Cox and Bryne [8], a numerical experiment was run on random

stirring protocols, without obstacles. Specifically, HSP8’s path was studied but minus any

31

obstacles. Their experiment focused on specific fluids whereas the HSP was derived

without specific fluid properties in mind. The authors made a note in their paper, that

HSP8 protocol did not traverse through the center of the fluid, while their other protocols

did, and yet HSP8 still performed remarkably well. They also used different measures to

determine mixing, like diffusion, which is not considered here.

32

CHAPTER 5PROPERTIES OF HSP

From the experiments we conjecture the following:

Conjecture 1. The most efficient fundamental stirring protocol with n − 1 obstacles is

HSPn = α2 ...αn.

5.1 Entropy Lower Bound for HSP

In this section we give some of the properties of HSPn. In Figure 5-1 we see the

behavior of the efficiency of HSP over n where n is the number of obstacles.

Figure 5-1. Efficiency of HSP

We will denote HSPn as the Burau representation of HSPn evaluated at t = −1.

Theorem 5.1. Let HSPn be the stirring protocol defined in the previous chapter. Then

the trace of HSPn is −3n−1 + 3n − 2.

Proof. First we will introduce notation. Recall the σi notation from the Artin Braid in

section 1.2. We will now keep track of the total number of strings. So for σi in a braid

group with a total of n-strings, we will denote as σi ,n. Also, for simplicity, we will use a hat

over a braid to denote the reduced Burau representation evaluated at t = −1.

Consider the reduced Burau representation for the braid generators for n braids

{σ1,n, σ2,n, ... , σn−1,n} and compare that to the generators for n + 1 braids

{σ1,n+1, σ2,n+1, ... , σn−1,n+1, σn,n+1}.

33

By the definition of the reduced Burau representation and 1 ≤ i ≤ n − 1 we have,

σi ,n+1 =

0

σi ,n...

0

0 ... 0 1

Now, we will also define αi ,n in a similar manner as the σi ,n, where the additional k tells

us the total number of strings. For 2 ≤ k ≤ n we have the following:

αk,n = σ−11,n · σ−1

2,n · σ−13,n ...σ

−1k−2,n · σ

−1k−1,nσ

−1k−1,n · σk−2,n ...σ2,n · σ1,n

For 2 ≤ j ≤ n − 1 we have

αj ,n+1 =

0

αj ,n

...

0

0 ... 0 1

34

Now, we just have to find αn,n+1 and αn+1,n+1. These cases are different because the last

row of αn,n+1 and αn+1,n+1 have more nonzero entries. First we will compute, αn,n+1.

αn,n+1

= (σ1,n+1 · σ2,n+1 ... σn−2,n+1)σ−2n−1,n+1(σ1,n+1 · σ2,n+1 ... σn−2,n+1)

−1

= (σ1,n+1 · σ2,n+1 ... σn−2,n+1)

0

In−1

...

0

0 ... 0 2 1 −2

0 ... 0 1

(σ1,n+1 · σ2,n+1 ... σn−2,n+1)

−1

=

0 0 0 ... 0 1 1

1 0 0 ... 0 1 1

0 1 0 ... 0 1 1

0 0 1 ... 0 1 1

...

0 0 ... 0 1 1 1

0 0 0 ... 0 0 1

1 0 0 ... 0 0 0

0 1 0 ... 0 0 0

0 0 1 ... 0 0 0

...

0 0 0 ... 1 0 0

0 0 ... 0 2 1 −2

0 0 0 ... 0 0 1

0 0 0 ... 0 1 1

1 0 0 ... 0 1 1

0 1 0 ... 0 1 1

0 0 1 ... 0 1 1

...

0 0 ... 0 1 1 1

0 0 0 ... 0 0 1

−1

=

−2

αn,n

...

−2

0 ... 0 1

35

Since the HSPn = αn,n · αn−1,n · αn−2,n · · · α2,n, we have that

HSPn+1 = αn+1,n+1 ·

−2

HSPn

...

−2

0 ... 0 1

where

αn+1,n+1 =

3 0 · · · 0 −2

2 −2

... In−2

...

2 −2

2 0 · · · 0 −1

and In−2 denotes the n − 2 by n − 2 identity matrix.

Then by construction,

HSPn+1 = αn+1 ·

−2

HSPn

...

−2

0 ... 0 1

HSPn(i , j) =

3HSPn−1(1, j) i = 1 and 1 ≤ j ≤ n − 2

−8 i = n − 1 and 1 ≤ j ≤ n − 2

2HSPn−1(1, j) + HSPn−1(i , j) 2 ≤ i ≤ n − 2 and 2 ≤ j ≤ n − 2

2HSPn−1(1, j) 1 ≤ i ≤ n − 2 and j = n − 1

−5 i = n − 1 and j = n − 1

From this complicated description, we can see a formula for the trace Tr(HSPn).

For convenience, let An = HSPn and let Tn = Tr(An).

36

Tn = An(1, 1) + · · ·An(n, n)

= 3An−1(1, 1) + 2

n−2∑k=2

An−1(1, k) +

n−2∑k=2

An−1(k , k)− 5

= 2An−1(1, 1) + 2

n−2∑k=2

An−1(1, k) +

n−1∑k=1

An−1(k , k)

= 2An−1(1, 1) + 2

n−2∑k=2

An−1(1, k) + Tn−1

Thus, we have the following equation for the trace,

Tn = 2An−1(1, 1) + 2

n−2∑k=2

An−1(1, k) + Tn−1 (5–1)

Let Dn−1 =∑n−2

k=2 An−1(1, k). Note that the subscript is used to indicate the sum of the

top row for An−1. By the inductive construction, we see that

D3 = −8 (5–2)

D4 = −8− 3 · 8 (5–3)

D5 = −8− 3 · 8− 32 · 8 (5–4)

... (5–5)

Dn−1 = −8

n−4∑k=0

3k =−4(3(n−1) − 9)

9(5–6)

Also, the first term of 5–1 has a pattern. Again, we start with n = 3.

A3(1, 1) = 3 (5–7)

A4(1, 1) = 32 (5–8)

... (5–9)

An−1(1, 1) = 3n−3 (5–10)

37

When we substitute, 5–10 and 5–6 back into 5–1 we have the following equation:

Tn = −2 · 3n−2 + 3 + Tn−1 (5–11)

When n = 3, we know that T3 = −2, our initial condition. Building from our initial

condition and 5–11, we have,

Tn = −3n−1 + 3n − 2 (5–12)

From this theorem we have a corollary about the efficiency of HSPn. This corollary

uses the concept of train tracks in order to invoke a theorem by Band and Boyland [18].

A good source for train tracks include [15], [22] and [23]. Suppose f : M2 → M2, then

the idea of a train track for f is an embedded graph on the surface M2 that satisfies

several conditions and is invariant under f .

Corollary 1. Let HSP be the stirring protocol defined as above. Then

lim supn→∞

E� (HSPn) ≥ ln(3)

Proof. By a direct calculation the train track of each HSPn has a singularity structure

which consists of just one-prongs at the punctures and the usual singularity at infinity.

By the paper by Band and Boyland [18] (theorem 5.1 in the paper), we see that this

implies the Burau estimate for HSPn is sharp for the substitution t = −1.

Figure 5-2. Train Track for the case n = 5. The red disk denotes the stirrer.

As before, let HSPn be the Burau representation evaluated at t = −1. Let ρ(HSPn)

denote the spectral radius of HSPn. Let λ1, · · · ,λn−1 denote the eigenvalues of HSPn.

38

Note that there are only n − 1 eigenvalues since we are using the reduced Burau

representation. Without loss of generality, assume that ρ(HSPn) = |λ1|.

|Tr(HSPn)| = |λ1 + λ2 + · · ·λn−1|

≤ |λ1|+ |λ2|+ · · · |λn−1|

≤ (n − 1)|λ1|

Thus by the previous theorem 5.1 we have,

ρ(HSPn) = |λ1| ≥|Tr(HSPn)|

n − 1=

∣∣∣∣−3n−1 + 3n − 2

n − 1

∣∣∣∣ = 3n−1 − 3n + 2

n − 1

Now we have a bound for the efficiency.

lim supn→∞

E� (HSPn) = lim supn→∞

log(ρ(HSPn))

n − 1

≥ limn→∞

log

(3n−1 − 3n + 2

n − 1

)n − 1

= limn→∞

log(3n−1 − 3n + 2)− log(n − 1)

n − 1

= log(3)

To obtain equality in the corollary, we need to know more about the eigenvalues.

For example, if knew that the sum over all the eigenvalues, except the one that is

the spectral radius, grew linearly, then we would know that the asymptotic limit of

the efficiency of HSPn is exactly log(3). It turns out that the first few characteristic

polynomials of HSPn are palindromic/anti-palindromic Salem polynomials. A good

reference for Salem polynomials is [24]

Definition 7 (palindromic/anti-palindromic polynomials). A polynomial p(x) ∈ Z[x ] is said

to palindromic if it satisfies

p(x) = xmp(1/x)

39

where m is the degree of p(x). If the polynomial satisfies

p(x) = −xmp(1/x)

where m is the degree of p(x) then p(x) is said to be anti-palindromic.

In other words, if the polynomial is in standard form and the coefficients are the

same when read frontwards as well as backwards we say the polynomial is palindromic.

Anti-palindromic is the same as palindromic, except that the coefficients differ by a

negative sign.

Definition 8 (Salem number). A Salem number is a real algebraic integer, greater than

1, with the property that all its Galois conjugates lie on or within the unit circle, and at

least one Galois conjugate lies on the unit circle. An irreducible polynomial that has a

root that is a Salem number is called a Salem Polynomial.

Let fn(x) be the characteristic polynomial for HSPn. Here are just the first few

polynomials:

f3(x) = 1 + 17x − 17x2 − x3 = −(x − 1)(1 + 18x + x2)

f4(x) = 1 + 68x − 122x2 + 68x3 + x4

f5(x) = 1 + 227x − 542x2 + 542x3 − 227x4 − x5

= −(x − 1)(1 + 228− 314x2 + 228x3 + x4)

It appears that the characteristic polynomials are either palindromic or anti-palindromic

based on their parity. It turns out that any Burau matrix with t = −1 enjoys this property.

Let Bn(t) be a n by n matrix and Burau representation. Let �Bn(t) = Bn(1/t), and

B∗n(t) = �Bn(t)

T where T is the transpose. Thus, �Bn(−1) = Bn(−1) We may assume that

B is the reduced Burau representation (n − 1) by (n − 1).

40

Theorem 5.2 (Squire). The Burau Representation is Unitary, i.e. There exists a non-

singular matrix J ∈ GL(n − 1,Z) such that

B∗JB = J

The proof may be found in the paper by Squier [19]

Theorem 5.3. The characteristic polynomial of B when t = −1 is either palindromic or

anti-palindromic depending on the parity of n − 1.

Proof.

char(B)(x) = det(B − xI)

= det(J−1(B∗)−1J − xI) = det((B∗)−1 − xI)

= det((B∗)−1 − B∗xI(B∗)−1)

= det(I− xB∗) det((B∗)−1)

= det(B∗)−1 det(I− xB∗)

= det(B∗)−1 det(−x(B∗ − x−1I))

=(−x)n−1

det(B∗)det(B∗ − x−1I)

So det(B∗) = det(�BT ) = det(�B) = det(�σk1�σk2 ... �σkm) = det(�σk1) · · · det(�σkm) When

t = −1, then det(σki ) = 1, so det(B∗) = 1. Let B−1 denote B with t = −1.

Thus,

41

char(B−1)(x) = (−x)n−1 det(B∗−1 − x−1I)

= (−x)n−1 det(�BT−1 − x−1I)

= (−x)n−1 det

((�B−1 − x−1I)T

)= (−x)n−1 det(B−1 − x−1I)

= (−x)n−1 det(B−1 − x−1I)

= (−x)n−1char(B−1)(1/x)

Let p(x) = char(B)(x), then we have two cases.

1.If n − 1 is even, then p(x) = xn−1p(1/x) and p is palindromic.2.If n − 1 is odd, then p(x) = −xn−1p(1/x) and p is anti-palindromic.

We should note that if p(x) is an anti-palindromic polynomial, then p(1) = −p(1)

implies that p(1) = 0. Thus, if n − 1 is odd, then char(B)(x) = (x − 1)q(x) for some

polynomial q(x).

Theorem 5.4. Suppose B is a Burau Matrix with t = −1 that is (n − 1) × (n − 1) where

n − 1 is odd. Then char(B)(x) = (x − 1)q(x) where q(x) is palindromic.

Proof. First, we see that char(B)(x) = (x −1)q(x) and that the degree of q is n−2, thus,

char(B)(x) = −xn−1char(B)(1/x)

(x − 1)q(x) = −xn−1(1/x − 1)q(1/x)

x(x − 1)q(x) = −xn−1(1− x)q(1/x)

x(x − 1)q(x) = xn−1(x − 1)q(1/x)

(x − 1)q(x) = xn−2(x − 1)q(1/x)

q(x) = xn−2q(1/x)

42

Thus, every stirring protocol will have a Burau representation with t = −1 whose

characteristic polynomials are palindromic/anti-palindromic polynomials. However, the

first few characteristic polynomials for HSP are nicer still. They are Salem polynomials.

Using the technique from [24], we see that a direct computation shows that the

first few characteristic polynomials of the Burau representation with t = −1 for HSP are

Salem polynomials.

Conjecture 2. The characteristic polynomial of the Burau representation with t = −1 of

HSPn is a Salem polynomial.

If HSPn has a characteristic polynomial that is a Salem polynomial then we would

have sharpness in corollary 1. Since HSP is constructed inductively, as seen above, it

would be nice if the characteristic polynomials also enjoyed that property.

Conjecture 3. Let gn(x) be the characteristic polynomial for HSP(n), then

gn+1(x) = gn(x)q(x) + gn−1(x)p(x)

where q(x) = −4(x − 1) and p(x) = −(3x2 − 10x + 3).

This conjecture was based on the assumption that the characteristic polynomials

were inductive and has been verified for the first 20 polynomials.

5.2 Gearability of HSP

One concern about fluid mixing and stirring protocols is the practicality of the stirring

device itself. For example, a stirring protocol would be useless if the machine used

to stir the fluid was too complicated. To quote Kobayashi and Umeda in [25] “...from

the viewpoint of practical mixing, realizing such a device via simple mechanism, or

mechanism requiring less energy is an important issue.”

Definition 9 (Gearable). A stirring protocol is called gearable if a device using a finite

set of gears can move a stirring rod along the path of said stirring protocol.

43

We will now show that HSPn is in fact gearable by showing that the path of the stirrer

follows that of a hypotrochoid.

Suppose we have two circles c1 and c2 where c2 is centered at the origin and the

radius of c1 is r and c2 is R where R > r . We suppose that c1 goes along the inside of

c2 in a counter clockwise direction without slipping. A point p is the d distance from the

center of c1. As c1 travels around c2, the path of p is the path of the hypotrochoid. Below

are the parametric equations where θ goes from 0 to 2π.

x(θ) = (R − r) cos(θ) + d cos

(R − r

)y(θ) = (R − r) sin(θ)− d sin

(R − r

)In the case of HSPn+1, we have R = 1, r = 1/n and d = 2/n. The figure 5-3 is an

example of HSP8 as a hypotrochoid. Now we can explain the encrypted letters in the

-1.0 -0.5 0.5 1.0

-1.0

-0.5

0.5

1.0

Figure 5-3. HSP(8): The 7 obstacles are the blue dots and the path of the fundamentalstirrer is red.

HSP which stand for Hypotrochoid Stirring Protocol. In fact, Kobayashi and Umeda

in [25] actually studied different types of hypotrochoid stirring protocols specifically

because of the practicality.

44

CHAPTER 6UPPER BOUNDS

6.1 Construction of Upper Bound

Given a fundamental stirring protocol with n − 1 obstacles and a stirrer, we will now

give an explicit upper bound for the efficiency which we defined above as

E(n) = sup{E� (β) : β is a fundamental stirring protocol with n − 1 fixed holes }.

Even though there are n − 1 fixed holes or obstacles, the stirrer also counts an obstacle.

So the n in E(n) is counting all the obstacles in the fluid.

We computed a lower bound in the previous chapter, namely,

log((3n−1 − 3n + 2)/(n − 1))

n − 1≤ log(ρ(HSPn))

n − 1≤ E(n).

The construction of the upper bound uses the definition of the generalized spectral

radius. Let M be a finite set of matrices and ρ denote the spectral radius of a matrix, i.e.

the magnitude of the largest eigenvalue. Define

ρk(M ) = maxM1,...,Mk∈M

ρ(M1 · · ·Mk)1/k

In other words, for a fixed k value, we consider all products that use k matrices from the

set M . Since M is a finite set, then the set of all products of length k is also finite. From

this new set of matrices, take the spectral radius of each matrix and find the maximum.

That maximum value is ρk(M ).

Definition 10 (Generalized Spectral Radius).

ρ(M ) = lim supk→∞

ρk(M )

This definition first appears in [26]. For properties of matrices that are used in this

section, please refer to the appendix A.1.

45

We will also need the following property of logarithms. This property is commonly

used in dealing with topological entropy and a good reference is [27].

Lemma 1. Suppose {an} and {bn} are two sequences of positive real numbers such

that limn→∞(log an)/n = a and limn→∞(log bn) = b exist. Then

limn→∞

log(an + bn)/n = max(a, b).

Proof. Since an and bn are positive real numbers we have that log(an + bn)/n ≥ log(an)/n

and log(an + bn)/n ≥ log(bn)/n for each n. Thus limn→∞ log(an + bn)/n ≥ max(a, b).

To show the reverse inequality, fix c > max(a, b). Thus, c > log(an)/n and

c > log(an)/n for each n implies that an < ecn and bn < ecn for each n. Now we have

log(an + bn)

n<

log(2ecn)

n= c +

log(2)

n

Taking limits, we see that limn→∞ log(an + bn)/n ≤ c . This inequality holds for any

c > max(a, b). We must have limn→∞ log(an + bn)/n ≤ max(a, b).

Theorem 6.1. E(n) ≤ log(3)

Proof. To obtain this upper bound, it is convenient to replace the generators of the

fundamental group of the (n+1) punctured disk. The new generators δi in the case n = 6

are shown in the figure 6-1. In figure 6-2 we show α4 acting on the new generators.

Recall that α4 sends the fundamental stirrer around the 4th obstacle. In general, we

have two cases:

(αj)∗(δj) = (δj−1δj−2 ... δ2δ−11 δn ... δj+1)

−1δj(δj−1δj−2 ... δ2δ−11 δn ... δj+1) (6–1)

(αj)∗(δk) = δk , when k = j (6–2)

46

Figure 6-1. The new generators for π1(M2) with n = 6; the square is the fundamentalstirrer and the circles are the obstacles

Figure 6-2. The α4 acting on the new generating set with n = 6

47

If β∗ : π1(M2) → π1(M

2) is the induced action of the pseudo-Anosov braid β on π1(M2),

then by Bowen [4] and Fathi [5] we have

h(β) = supg∈π1(M2)

limk→∞

log(L (βk∗g))

k

where L (βk∗g) denotes the number of generators in the reduced word of βk

∗g.

Define ni(g) : π1(M2) → N where ni(g) is the number of occurrences of the

generators δi and δ−1i in the reduced word for g. Let n(g) = (n1(g), ... , nn(g)). Thus,

L (g) = ∥n(g)∥1.

We will use a simpler form of h(β) from the formula in 6.1 namely,

µ(β) = maxδ1,...,δn

limk→∞

log(∥n(βk∗ δi)∥1)

k.

We will now show that µ(β) = h(β), i.e. we can take the maximum over the generators

instead of the supremum over all words.

It is obvious that µ(β) ≤ h(β) since δ1, ... , δn ∈ π1(M2). Now we will use lemma

6.1 to show the reverse inequality. Let g ∈ π1(M2) be an arbitrary element where

g = δϵi1i1

... δϵijij

where ϵn ∈ {±1}. We also need to point out that L (βk∗ (δi)) = L (βk

∗ (δ−1i ))

for each i because the β∗(δi) has the same number of occurrences of the generators as

β∗(δ−1i ) for each i . Thus, ∥n(βk

∗ (δi))∥1 = ∥n(βk∗ (δ

−1i ))∥1 for each i .

limk→∞

log(L (βk∗ (g)))

k= lim

k→∞

log(L (βk∗ (δ

ϵi1i1

... δϵijij)))

k

≤ limk→∞

log(L (βk∗ (δ

ϵi1i1) + · · ·+ L (βk

∗ (δϵijij))))

k

= limk→∞

log(L (βk∗ (δi1) + · · ·+ L (βk

∗ (δij ))))

k

≤ maxδi1 ,...,δij

limk→∞

logL (βk∗ (δi))

k(By lemma 6.1.)

≤ maxδ1,...,δn

limk→∞

log(∥n(βk∗ δi)∥1)

k(Maximum over all generators.)

= µ(β)

48

Since β was arbitrary, we see that h(β) ≤ µ(β).

So we have that h(β) = µ(β), i.e.

h(β) = maxδ1,...,δn

limk→∞

log(∥n(βk∗ δi)∥1)

k.

Definition 11 (Incidence Matrix). Using the specified set of generators for π1 as in 6-1

and for any homomorphism α∗ : π1(M2) → π1(M

2) define the incidence matrix A by

Ai ,j = nj(α∗δi).

Let A be the incidence matrix for α∗. Notice that the j th component of n(g)A is the

number of occurrences of δj and δ−1j before any cancellations are done. Thus,

n(g)A ≥ n(α∗g)

where [a1, ... , am] ≥ [b1, ... , bn] means ai ≥ bi for all i . When we iterate, we get for all

k > 0,

n(g)Ak ≥ n(αk∗g).

Taking one-norms (everything is positive) we have

∥n(αk∗g)∥1 ≤ ∥n(g)Ak∥1 ≤ ∥n(g)∥1∥Ak∥1.

Hence,

limk→∞

∥n(αkg)∥1/k1 ≤ limk→∞

∥n(g)∥1/k1 ∥Ak∥1/k1 = ρ(A)

where ρ is the spectral radius of the matrix A.

Thus, for any β from a fundamental stirring protocol, if its incidence matrix is Aβ then

h(β) ≤ log(ρ(Aβ)).

Recall that the fundamental stirrer is counted as the first hole, and αi denotes braid

the element sending the first string around the i th string and i ∈ {2, ... , n}. Using (6–1)

49

and (6–2) we have that corresponding incidence matrix is:

Aαi=

1 0 ... 0 0 0 ... 0

0 1 0 ... 0 0 ... 0

...

2 2 ... 2 1 2 ... 2

0 0 ... 0 0 1 ... 0

...

0 0 ... 0 0 0 ... 1

(i − 1)th row

Also note that αi and α−1i have the same incidence matrices since nj(αiδi) = nj(α

−1i δi)

for every i and j .

For ease of notation, let Ai = Aαi−1 so A1 = Aα2, for example. Let M =

{A1, ... ,An−1}. Let β be a fundamental stirring protocol with word length m so β =

αk1 ...αkm and let Aβ denote the incidence matrix for β. Then for each i and j we have,

(Aβ)ij = nj(βδi)

= nj(αk1 ...αkm(δi))

≤ nj(αk1δi) · · · nj(αkmδi) Since n is counting before cancellations

= (Ak1)ij · · · (Akm)ij .

In other words, Aβ ≤ Ak1 · · ·Akm where ≤ means for each ij-th position. Then

ρ(Aβ) ≤ ∥Aβ∥1 ≤ ∥Aαi1∥1 ... ∥Aαim

∥1 ≤ 3m

Since β was an arbitrary fundamental stirring protocol with length m then,

ρm(M ) = maxA1,...,Am∈M

ρ(Am · · ·A1)1/m ≤ (3m)1/m = 3

and

ρ(M ) = lim supk→∞

ρk(M ) ≤ 3.

50

We now have an upper bound for the topological efficiency (recall the definition of

topological efficiency from section 3.2) of any arbitrary stirring protocol β, namely,

E� (β) =h(β)

#β≤ log(ρ(Aβ))

#β.

Since #β is number of alpha generators used to construct β, then #β is also the

number of incidence matrices used to construct Aβ. Thus,

E� (β) ≤ log(ρ(Aβ)1#β ) ≤ log(ρ(M )) ≤ log(3)

This is true for every fundamental stirring protocol and by taking the sup over every

fundamental stirring protocol we have, E(n) ≤ log(3).

6.2 Spectral Radius of incidence Matrices

Let HSPn = Aαn...Aα2. So HSPn is the product of the incidence matrices of the α

stirrers in the same order as the HSP(n). We will explore some properties of HSPn.

HSPn =

1 2 ... 2

0 1 ... 0

0 0 1 ... 0

... ......

0 0 0 ... 1

1 0 ... 0

0 1 0 ... 0

0 0 1 ... 0

... ......

0 0 0 ... 1

· · ·

1 0 ... 0

2 1 2 ... 2

0 0 1 ... 0

... ......

2 2 2 ... 1

HSPn =

2 · 3n−1 − 1 2 · 3n−1 − 22 · 30 2 · 3n−1 − 22 · 31 ... 2 · 3n−1 − 22 · 3n−2 2 · 3n−2

2 · 3n−2 ... 2 · 3n−3

2 · 3n−3 ... 2 · 3n−4

... ......

2 · 3 ... 2 · 30

2 2 2 2 ... 1

We will let ρ(HSPn) denote the spectral radius of HSPn and we let {λ1,λ2, ... ,λn}

denote the eigenvalues of HSPn and λ1 is the Perron-Frobenius value, i.e. ρ(HSPn) = λ1

51

First, we will compute the column sums. Let Ci denote the column sum for the i th

column. We notice that

C1 = 2 · 3n−1 − 1 + 2 · 3n−2 + · · ·+ 2 · 3 + 2 = −1 + 2

n−1∑j=0

3j = 3n − 2 (6–3)

Cn = 2 · 3n−2 + 2 · 3n−3 + · · ·+ 2 · 30 + 1 = 1 + 2

n−2∑j=0

3j = 3n−1 (6–4)

The thing to note is that column sums are decreasing. So C1 ≥ C2 ≥ · · ·Cn. Next,

we consider that ρ(HSPn) = ρ(HSPn

T) where HSPn

Tdenotes the transpose of HSPn.

From [28] and definition 17 from the appendix and , we have

Theorem 6.2. Suppose that M is an n × n non-negative primitive matrix. Then,

mini

n∑j=1

mij ≤ ρ(M) ≤ maxi

n∑j=1

mij

with equality on either side implying equality throughout. A similar proposition holds for

column sums.

So in our case, this implies

minj

n∑i=1

(HSPn

T)i ,j ≤ ρ(HSPn

T) ≤ max

j

n∑i=1

(HSPn

T)i ,j

which implies that

Cn ≤ ρ(HSPn) ≤ C1

3n−2 ≤ ρ(HSPn) ≤ 3n − 2.

Definition 12 (Pisot number). A Pisot number is a real algebraic integer, greater than

1, with the property that all its Galois conjugates lie within the unit circle. An irreducible

polynomial that has a root that is a Pisot number is called a Pisot Polynomial.

Conjecture 4. The matrix HSPn has a characteristic polynomial whose roots are Pisot.

We see that (HSPn)j ,j ≥ 0 for each j . Thus, we have

|2 · 3n−1| = |(HSPn)1,1| ≤ |Tr(HSPn)| = |λ1 + λ2 + · · ·+ λn| ≤ |λ1|+ |λ2|+ · · ·+ |λn|

52

Supposing that the conjecture is true, then |λi | ≤ 1 for each i ≥ 2. So we have

2 · 3n−1 ≤ |λ1|+ (n − 1)

Thus, 2 · 3n−1 − n − 1 ≤ ρ(HSPn).

Let M be the set of the incidence matrices for the fundamental stirring protocols αi

where i ∈ {2, ... , n}, i.e.

M = {Aα2, ... ,Aαm}.

For ease of notation, we will use Aαi= Ai−1 and An = Aαm

, so M = {A1, ... ,An}. We

have already seen that ρ(M ) ≤ 3.

We would like to compute ρ(M ) directly. In order to prove this we need to setup

some machinery. The main idea for computing ρ(M ) is that for any positive matrix N, Ai

acts very simply on the vector of columns sums of N for each i .

We use the joint spectral radius which we will define now. Recall the definition of an

induced matrix norm from definition 19 in the appendix. Let M be a finite set of matrices

and ∥ · ∥ denote an induced matrix norm. Define

�ρk(M , ∥ · ∥) = maxA1,...,Ak∈M

∥M1 · · ·Mk∥1/k

Definition 13 (Joint Spectral Radius).

�ρ(M , ∥ · ∥) = lim supk→∞

�ρk(M )

The Joint Spectral Radius is independent of the norm that we choose [29]. So for

simplicity we will use �ρ(M ) for the Joint Spectral Radius for the set M . Also, if M is a

finite set of matrices, then ρ(M ) = �ρ(M ) which was first proved in [30].

Define c : GLn(Z) → Zn where c(M) is the column sums of M.

Example 2. By direct calculation we have, c(Ai) = (3, 3, ... , 3, 1, 3, ... , 3) where the 1 is

in the i th place.

Lemma 2. Let M ∈ GLn(Z) be an arbitrary matrix, and Ai ∈ M , then c(MAi) = c(M)Ai .

53

Proof. Fix i ∈ {1, ... , n} and consider MAi .

MAi =

m11 m12 ... m1n

......

mi1 min

......

mn1 mn2 mnn

1 0 ... 0

......

2 2 · · · 2 1 2 · · · 2...

...

0 0 1

=

m11 + 2m1i ... m1i ...m1n + 2m1i

......

mi1 + 2mii mii min + 2mii

......

mn1 + 2mni ... mni ...mnn + 2mni

By computing the column sums, we have

c(MAi) = (c1(M) + 2ci(M), ... , ci−1(M) + 2ci(M), ci , ci+1(M) + 2ci(M), ...

... , cn(M) + 2ci(M)). (6–5)

Next, we will compute the c(M)Ai .

c(M)Ai = (c1(M), ... cn(M))

1 0 ... 0

......

2 2 · · · 2 1 2 · · · 2...

...

0 0 1

= (c1(M) + 2ci(M), ... , ci−1(M) + 2ci(M), ci , cj+1(M) + 2ci(M), ...

... , cn(M) + 2ci(M)). (6–6)

Thus, (6–5) and (6–6) are the same so c(MAi) = c(M)Ai and since i was arbitrary, our

lemma is true.

54

Fix n ≥ 3 and let On be all lists of n positive integers given in decreasing order, so

On = {a ∈ (Z+)n : a1 ≥ a2 ≥ ... an > 0}

Definition 14 (Sorting Function). Let S : (Z+)n → On be the sorting function, i.e. it sends

a vector of positive integers to the list of its entries sorted in non increasing order.

Example 3. Let a = (1, 2, 3) then S (a) = (3, 2, 1).

Let a ∈ (Z+)n, then Ai · aT ⊂ (Z+)n. Now, we define

Wj : On → On where Wj (a) := S ◦ Aj (aT ).

We will also need the standard order on On, namely,

a ≤ b ⇐⇒ aj ≤ bj for all j

a < b ⇐⇒ aj < bj for all j

Next, we will have a lemma that will go with this ordering.

Lemma 3. Assume that a = (a1, a2, ... , am) and b = (b1, b2, ... , bm) where a > 0 and

b > 0. Then the following are true.

(a) a ≥ b ⇒ Wj (a) ≤ Wj(b) for all j(b) a > b ⇒ Wj (a) > Wj(b) for all j(c) j < k and aj = ak ⇒ Wj (a) = Wk(b)

(d) j < k and aj > ak ⇒ Wj (a) > Wk(b)

(e) j ≤ k and a > b ⇒ Wj (a) > Wk(b)

Proof. Assume that a = (a1, a2, ... , am) and b = (b1, b2, ... , bm) and ai > 0 and bi > 0.

55

For part a) suppose a ≥ b, then ai ≥ bi for each i .

Wj (a) = S ◦ Aj (aT ) = S(a1 + 2aj , ... , aj−1 + 2aj , aj , aj+1 + 2aj , ... , am + 2aj)

= (a1 + 2aj , ... , aj−1 + 2aj , aj+1 + 2aj , am + 2aj , ... , aj)

Wj(b) = S ◦ Aj(bT ) = S(b1 + 2bj , ... , bj−1 + 2bj , aj , bj+1 + 2bj , ... , bm + 2bj)

= (b1 + 2bj , ... , bj−1 + 2bj , bj+1 + 2bj , bm + 2bj , ... , bj)

Since ai ≥ bi for each i , then ai + 2aj ≥ bi + 2bj for each i . Thus, Wj (a) ≥ Wj(b).

Part b) is similar to part a).

For part c) suppose we have a where j < k and aj = ak . Then,

Wj (a) = S ◦ Aj (aT ) = S(a1 + 2aj , ... , aj−1 + 2aj , aj , aj+1 + 2aj , ... , ak + 2aj , ... , am + 2aj)

= (a1 + 2aj , ... , aj−1 + 2aj , aj+1 + 2aj , am + 2aj , ... , ak + 2aj , ... , aj)

Wk (a) = S ◦ Ak (aT ) = S(a1 + 2ak , ... , aj−1 + 2ak , ak , aj+1 + 2bk , ... , am + 2ak)

= (a1 + 2ak , ... , aj + 2bk , ... ak−1 + 2bk , ak+1 + 2bk , am + 2ak , ... , bk)

Since aj = ak , then ai + 2aj = ai + 2ak for all i . Thus, Wj (a) ≥ Wk (a).

Part e) is similar to part c).

Definition 15 (Length-k Strategy). A length k strategy is a list �s = (j1, j2, ... , jk) with

1 ≤ ji ≤ n for all i where each �s defines a map W�s := Wjk ◦ · · · ◦Wj1 so W�s : On → On.

Definition 16 (Standard with respect a). Fix an a ∈ On and say �s is standard with

respect to a if for each i we have

b = Wji−1 ◦ · · · ◦Wj1 (a)

where either ji = 1 or bji−1 > bji .

Proposition 6.1. Given a ∈ On, if �s is a length-k strategy and is standard for a and

�s = �1, then

W�1(a) > W�s (a).

56

Proof. Let �s = (j1, ... , jk) and let i be the first index where ji > 1. Let

b = Wji−1,...,j1.

Since s is standard for a, then bji < bji−1 ≤ b1. Thus, by lemma 3 d, W1(b) > Wji (b), i.e.

W1,...,1(a) > Wji ,...,j1(b).

Since jn ≥ 1 for all n > i , then by lemma 3 e, then W1,...,1(a) > W�s , as required.

Corollary 2. If �s is any length k strategy for a then W�1 ≥ W�s .

Proof. If �1 is the standard strategy derived from �s, then W�1(a) = W�s (a) by lemma 3 a.

Otherwise use the previous proposition.

Theorem 6.3. Let M = {A1, ... ,An} be as defined above. Then the joint spectral radius

�ρ(M ) = �ρ(HSPn), i.e. the spectral radius of M is realized by HSPn.

Proof. Fix w > 0. We consider an arbitrary number w of matrices from the set M . Let

N = Ai1 · · ·Aiw . By the division algorithm, we have w = m _n + j where 0 ≤ j < n. The

theorem follows from two observations.

First, for the matrix N, there is a standard strategy �s for a = (1, 1, ... , 1), so that

W�s (a) = c (aN) = c (aAi1, ... ,Aiw ) = ∥N∥1.

Second,

c (a A1, ...An,A1, ... ,An, ... ,A1, ... ,Aj︸ ︷︷ ︸m _n+j elements

) = W�1(a)

of length mn + j .

Then, by corollary 2, we have

c (aA1, ...An,A1, ... ,An, ... ,A1, ... ,Aj) ≥ c (aAi1, ... ,Aiw )

57

where w = mn + j . In particular, since for a positive matrix, c(A) = ∥A∥1 and c (aA) =

c(IA) = c(A), we have that

∥A1 · · ·AnA1 · · ·An · · ·A1 · · ·Aj∥ ≥ ∥Ai1Aiw∥1.

Since, Ai1 · · ·Aiw is constructed from w = mn + j elements and was arbitrary, then by

definition,

�ρw(M ) = maxAj1

,...,Ajw

∥Aj1, ... ,Ajw∥1 = ∥A1, ...An,A1, ... ,An, ... ,A1, ... ,Aj∥1/w1 .

Thus,

�ρ(M ) = limk→∞

�ρk(M ) = limk→∞

∥(A1, ...An)k∥1/k1 = ρ(A1, ... ,An).

By Berger and Wang in [30], it was shown that the generalized spectral radius and

the joint spectral radius are equal for bounded sets of matrices. In our case, we have

that,

ρ(M ) = �ρ(M ).

Corollary 3.log(ρ(HSPn))

n − 1≤ E(n) ≤ log(ρ(HSPn)).

58

APPENDIX: SOME GENERAL MATRIX LEMMAS

A.1 General Matrix Theory

Most of the theorems discussed are classical theorems and can be found in the

books [28], [31], and [32]. Let M be a square matrix where M = {mij}. We will write

M ≥ 0 when mij ≥ 0 for each i and j and likewise M > 0 when mij > 0 for each i and j .

Definition 17 (Primitive Matrix). A square non-negative matrix M is said to be primitive if

there exists a positive integer k such that Mk > 0.

Definition 18 (Vector Norm). A norm ∥ · ∥ in a vector space V over a field F is a function

∥ · ∥ : V → R that satisfies the following for all x , y ∈ V and c ∈ F :

1. ∥cx∥ = |c |∥x∥,2. ∥x∥ = 0 if and only if x = 0,3. ∥x∥ ≥ 0, and4. ∥x + y∥ ≤ ∥x∥+ ∥y∥ (Triangle Inequality).

Definition 19 (Induced Matrix Norm). A vector norm that is defined on Cm, induces a

matrix norm on Cm×n by

∥M∥ = sup∥x∥=0

∥Mx∥∥x∥

where M ∈ Cm×n.

Definition 20 (Spectrum). The set {λ1, · · · ,λn} of eigenvalues of a square matrix M is

called the spectrum of M.

Definition 21 (Spectral Radius). Let M be a square matrix with eigenvalues {λ1, · · · ,λn},

then the spectral radius ρ(M) is given by

ρ(M) = max1≤i≤n

|λi |.

Theorem A.4. Suppose M is a square matrix and ∥ · ∥ is an induced matrix norm, then

ρ(M) ≤ ∥M∥

59

Proof. Suppose M has an eigenvalue λj with a corresponding eigenvector vj , so that

Mvj = λjvj . Then we have

∥M∥ = sup∥x∥=0

∥Mx∥∥x∥

≥ ∥Mvj∥∥vj∥

=∥λjvj∥∥vj∥

= |λj |.

Since this is true for all eigenvalues of M, then ∥M∥ ≥ ρ(M).

The following theorem can be found in [33], Corollary 5.6.14.

Theorem A.5 (Gelfand’s formula). Suppose M is a square matrix with real entries and

∥ · ∥ is a matrix norm, then

limn→∞

∥Mn∥1/n = ρ(M)

A.2 Spectral Radius Properties

These next set of definitions and theorems can be found by [29]. Let M be a finite

set of square matrices and ρ denote the spectral radius of a matrix, i.e. the magnitude of

the largest eigenvalue. Define

ρk(M ) = maxA1,...,Ak∈M

ρ(A1 · · ·Ak)1/k

Definition 22 (generalized spectral radius).

ρ(M ) = lim supk→∞

ρk(M )

Theorem A.6. Let M = {M1, · · · ,Mn} be a set of square matrices with non negative

entries. Let S be the matrix whose entries are the componentwise maximum of the

entries of the matrices M . Then

ρ(S)

n≤ ρ(M ) ≤ ρ(S).

Corollary 4. Let M = {M1, · · · ,Mn} be a set of square matrices with non negative

entries. Then 0≤ρ(M ) < ∞.

60

REFERENCES

[1] D. Rolfsen, New developments in the theory of Artin’s braid groups, in: Proceedingsof the Pacific Institute for the Mathematical Sciences Workshop “Invariants ofThree-Manifolds” (Calgary, AB, 1999), Vol. 127, 2003, pp. 77–90.

URL http://dx.doi.org/10.1016/S0166-8641(02)00054-8

[2] J. S. Birman, Braids, links, and mapping class groups, Princeton University Press,Princeton, N.J., 1974, annals of Mathematics Studies, No. 82.

[3] E. Artin, Theorie der zopfe, in: Abhandlungen aus dem Mathematischen Seminarder Universitat Hamburg, Vol. 4, Springer, 1925, pp. 47–72.

[4] R. Bowen, Entropy for group endomorphisms and homogeneous spaces, Trans.Amer. Math. Soc. 153 (1971) 401–414.

[5] Travaux de Thurston sur les surfaces, Vol. 66 of Asterisque, Societe Mathematiquede France, Paris, 1979, seminaire Orsay, With an English summary.

[6] W. P. Thurston, On the geometry and dynamics of diffeomorphisms of surfaces,Bull. Amer. Math. Soc. (N.S.) 19 (2) (1988) 417–431.

URL http://dx.doi.org/10.1090/S0273-0979-1988-15685-6

[7] M. Handel, Global shadowing of pseudo-Anosov homeomorphisms, Ergodic TheoryDynam. Systems 5 (3) (1985) 373–377.

URL http://dx.doi.org/10.1017/S0143385700003011

[8] M. D. Finn, S. M. Cox, H. M. Byrne, Mixing measures for a two-dimensional chaoticStokes flow, J. Engrg. Math. 48 (2) (2004) 129–155.

URL http://dx.doi.org/10.1023/B:ENGI.0000011930.55539.69

[9] J. M. Ottino, The kinematics of mixing: stretching, chaos, and transport, CambridgeTexts in Applied Mathematics, Cambridge University Press, Cambridge, 1989.

[10] A. J. Chorin, J. E. Marsden, A mathematical introduction to fluid mechanics, 3rdEdition, Vol. 4 of Texts in Applied Mathematics, Springer-Verlag, New York, 1993.

[11] W. Burau, Uber Zopfgruppen und gleichsinnig verdrilte Verkettungen, Abh, Math.Sem. Hanischen Univ 11 (1936) 171–178.

[12] S. Bigelow, The Burau representation is not faithful for n = 5, Geom. Topol. 3 (1999)397–404 (electronic).

URL http://dx.doi.org/10.2140/gt.1999.3.397

61

[13] D. D. Long, M. Paton, The Burau representation is not faithful for n ≥ 6, Topology32 (2) (1993) 439–447.

URL http://dx.doi.org/10.1016/0040-9383(93)90030-Y

[14] P. Boyland, J. Franks, in: Notes on dynamics of surface homeomorphisms,Warwick, 1989, pp. 1–48.

[15] J.-L. Thiffeault, University of wisconsin classnotes (2008).

[16] D. Fried, Entropy and twisted cohomology, Topology 25 (4) (1986) 455–470.

URL http://dx.doi.org/10.1016/0040-9383(86)90024-8

[17] B. Kolev, Entropie topologique et representation de Burau, C. R. Acad. Sci. ParisSer. I Math. 309 (13) (1989) 835–838.

[18] G. Band, P. Boyland, The Burau estimate for the entropy of a braid, Algebr. Geom.Topol. 7 (2007) 1345–1378.

URL http://dx.doi.org/10.2140/agt.2007.7.1345

[19] C. C. Squier, The Burau representation is unitary, Proc. Amer. Math. Soc. 90 (2)(1984) 199–202.

URL http://dx.doi.org/10.2307/2045338

[20] P. L. Boyland, H. Aref, M. A. Stremler, Topological fluid mechanics of stirring, J.Fluid Mech. 403 (2000) 277–304.

URL http://dx.doi.org/10.1017/S0022112099007107

[21] T. Hall, Software to compute train tracks of surface homeomorphisms, Retrievedfrom http://www.liv.ac.uk/maths/PURE/MIN_SET/CONTENT/members/T_Hall.

html.

[22] R. C. Penner, J. L. Harer, Combinatorics of train tracks, Vol. 125 of Annals ofMathematics Studies, Princeton University Press, Princeton, NJ, 1992.

[23] A. J. Casson, S. A. Bleiler, Automorphisms of surfaces after Nielsen and Thurston,Vol. 9 of London Mathematical Society Student Texts, Cambridge University Press,Cambridge, 1988.

[24] E. Ghate, E. Hironaka, The arithmetic and geometry of Salem numbers, Bull. Amer.Math. Soc. (N.S.) 38 (3) (2001) 293–314 (electronic).

URL http://dx.doi.org/10.1090/S0273-0979-01-00902-8

62

[25] T. Kobayashi, S. Umeda, A design for pseudo-Anosov braids using hypotrochoidcurves, Topology Appl. 157 (1) (2010) 280–289.

URL http://dx.doi.org/10.1016/j.topol.2009.04.061

[26] I. Daubechies, J. C. Lagarias, Sets of matrices all infinite products of whichconverge, Linear Algebra Appl. 161 (1992) 227–263.

URL http://dx.doi.org/10.1016/0024-3795(92)90012-Y

[27] L. S. Block, W. A. Coppel, Dynamics in one dimension, Vol. 1513 of Lecture Notesin Mathematics, Springer-Verlag, Berlin, 1992.

[28] E. Seneta, Non-negative matrices and Markov chains, Springer Series inStatistics, Springer, New York, 2006, revised reprint of the second (1981) edition[Springer-Verlag, New York; MR0719544].

[29] V. D. Blondel, Y. Nesterov, J. Theys, On the accuracy of the ellipsoid normapproximation of the joint spectral radius, Linear Algebra Appl. 394 (2005) 91–107.

URL http://dx.doi.org/10.1016/j.laa.2004.06.024

[30] M. A. Berger, Y. Wang, Bounded semigroups of matrices, Linear Algebra Appl. 166(1992) 21–27.

URL http://dx.doi.org/10.1016/0024-3795(92)90267-E

[31] F. R. Gantmacher, The theory of matrices. Vol. 1, AMS Chelsea Publishing,Providence, RI, 1998, translated from the Russian by K. A. Hirsch, Reprint of the1959 translation.

[32] S. H. Friedberg, A. J. Insel, L. E. Spence, Linear algebra, 3rd Edition, Prentice HallInc., Upper Saddle River, NJ, 1997.

[33] R. A. Horn, C. R. Johnson, Matrix analysis, Cambridge University Press,Cambridge, 1985.

63

BIOGRAPHICAL SKETCH

Jason Harrington was born in Louisville, Kentucky. He earned his B.A. at Western

Kentucky University where he met his beautiful wife Leslie. While working on this

dissertation at the University of Florida they had their first son Daniel. In addition to

mathematics, he also enjoys computer programming and reading.

64