## About Summit

# Mathematics - Theses, Dissertations, and other Required Graduate Degree Essays

Receive updates for this collection## The combinatorial RNA design problem for binary trees

The nucleotides adenine, uracil, guanine, and cytosine are the building blocks of ribonucleic acid (RNA). Certain nucleotides can pair, creating folds in the RNA sequence known as the secondary structure. The stability of the secondary structure increases with the number of pairings, but there are typically many foldings that achieve the maximum number of pairings. The combinatorial RNA design problem is to find a design for a target secondary structure (a sequence which can achieve its maximum number of pairings only by folding into this structure), or else to show that no design exists for this structure. A design is known for a class of secondary structures in which all nucleotides are paired, but a structure in which even one nucleotide is unpaired need not admit a design. We prove constructively that there is an infinite class of secondary structures containing unpaired nucleotides and admitting a design.

## Graph Invariants with Connections to the Feynman Period in phi-4 Theory.

Feynman diagrams in scalar phi-4 theory have as their underlying structure 4-regular graphs. In particular, any 4-point phi-4 graph can be uniquely derived from a 4-regular graph by deleting a single vertex. The Feynman integral is encoded by the structure of the graph and is used to determine amplitudes of particle interactions. The Feynman period is a simplified version of the Feynman integral. The period is of special interest, as it maintains much of the important number theoretic information from the Feynman integral. It is also of structural interest, as it is known to be preserved by a number of graph theoretic operations. In particular, the vertex deleted in constructing the 4-point graph does not affect the Feynman period, and it is invariant under planar duality and the Schnetz twist, an operation that redirects edges incident to a 4-vertex cut. Further, a 4-regular graph may be produced by identifying triangles in two 4-regular graphs and then deleting these edges. The Feynman period of this graph with a vertex deleted is equal to the product of the Feynman periods of the two smaller graphs with one vertex deleted each. These operations currently explain all known instances of non-isomorphic 4-point phi-4 graphs with equal periods.With this in mind, other graph invariants that are preserved by these operations for 4-point phi-4 graphs are of interest, as they may provide insight into the Feynman period and potentially the integral. In this thesis the extended graph permanent is introduced; an infinite sequence of residues from prime order finite fields. It is shown that this sequence is preserved by these three operations, and has a product property. Additionally, computational techniques will be established, and an alternate interpretation will be presented as the point count of a novel graph polynomial.Further, the previously existing c2 invariant and Hepp bound are examined, two graph invariants that are conjectured to be preserved by these graph operations. A combinatorial approach to the c2 invariant is introduced.

## Odd disjoint trails and totally odd graph immersions

The odd edge-connectivity between two vertices in a graph is the maximum number λ_o(u,v) of edge-disjoint (u, v)-trails of odd length. In this thesis, we define the perimeter of a vertex- set, a natural upper bound for the odd edge-connectivity between some of its constituent pairs. Our central result is an approximate characterization of odd edge-connectivity: λ_o(u, v) is bounded above and below by constant factors of the usual edge-connectivity λ_o(u, v) and/or the minimum perimeter among vertex-sets containing u and v. The relationship between odd edge-connectivity and perimeter has many implications, most notably a loose packing–covering duality for odd trails. (In contrast, odd paths do not obey any such duality.) For Eulerian graphs, we obtain a second, independent proof of the packing–covering duality with a significantly better constant factor. Both proofs can be implemented as polynomial-time approximation algorithms for λ_o(u,v). After observing that perimeter satisfies a submodular inequality, we are able to prove an analogue of the Gomory–Hu Theorem for sets of minimum perimeter and, consequently, to construct an efficient data structure for storing approximate odd edge-connectivities for all vertex pairs in a graph. The last part of the thesis studies more complicated systems of odd trails. A totally odd immersion of a graph H in another graph G is a representation in which vertices in H correspond to vertices in G and edges in H correspond to edge-disjoint odd trails in G. Using our perimeter version of the Gomory–Hu Theorem, we describe the rough structure of graphs with no totally odd immersion of the complete graph K_t. Finally, we suggest a totally odd immersion variant of Hadwiger’s Conjecture and show that it is true for almost all graphs.

## Three Problems Involving Permutations

We study three problems involving permutations: the n-card problem, inv-Wilf-equivalence, and suitable sets of permutations. The n-card problem is to determine the minimal intervals [u, v] such that for every n times n stochastic matrix A there is an n times n permutation matrix P (depending on A) such that tr(PA) belongs to [u, v]. The minimal intervals for the n-card problem are known only for n <= 4. We answer a question posed by Sands, by showing that [1, 2] is a solution to the n-card problem for all n >= 2. We also show that each closed interval of length n/(n−1) contained in [0, 2) is a solution to the n-card problem for all n >= 2. Wilf-equivalence is one of the central concepts of pattern-avoiding permutations. The two known infinite families of Wilf-equivalent permutation pairs both satisfy the stronger condition of shape-Wilf-equivalence. Dokos et al. studied a different strengthening of Wilf-equivalence called inv-Wilf-equivalence. They conjectured that all inv-Wilf-equivalent permutation pairs arise from trivial symmetries. We disprove this conjecture with an infinite family of counterexamples, obtained by generalizing simultaneously the concepts of shape-Wilf-equivalence and inv-Wilf-equivalence. We also prove the Baxter-Jaggard conjecture on even-shape-Wilf-equivalent permutation pairs. A set of N permutations of {1, 2, . . . , v} is (N, v, t)-suitable if each symbol precedes each subset of t − 1 others in at least one permutation. We give examples of suitable sets of permutations for new parameter triples (N, v, t). We relate certain suitable sets of permutations with parameter t to others with parameter t + 1, thereby showing that one of the two infinite families presented by Colbourn can be constructed directly from the other. We prove an exact nonexistence result for suitable sets of permutations using elementary combinatorial arguments. We then establish an asymptotic nonexistence result using Ramsey’s theorem.

## Linearly stabilized schemes for the time integration of stiff nonlinear PDEs

In many applications, the governing PDE to be solved numerically will contain a stiff component. When this component is linear, an implicit time stepping method that is unencumbered by stability restrictions is preferred. On the other hand, if the stiff component is nonlinear, the complexity and cost per step of using an implicit method is heightened, and explicit methods may be preferred for their simplicity and ease of implementation. In this thesis, we analyze new and existing linearly stabilized schemes for the purpose of integrating stiff nonlinear PDEs in time. These schemes compute the nonlinear term explicitly and, at the cost of solving a linear system with a matrix that is fixed throughout, are unconditionally stable, thus combining the advantages of explicit and implicit methods. Applications are presented to illustrate the use of these methods.

## The closest point method for the numerical solution of partial differential equations on moving surfaces

Partial differential equations (PDEs) on surfaces arise in a wide range of applications. The closest point method is a recent embedding method that has been used to solve a variety of PDEs on smooth surfaces using a closest point representation of the surface and standard Cartesian grid methods in the embedding space. The original closest point method (CPM) was designed for problems posed on static surfaces, however the solution of PDEs on moving surfaces is of considerable interest as well. Here we propose two different approaches for solving PDEs on moving surfaces using a combination of the CPM and a grid based particle method. The grid based particle method (GBPM) represents and tracks surfaces using meshless particles and an Eulerian reference grid. In our first approach, a modification of the GBPM is introduced to ensure that all the grid points within a computational tube surrounding the surface are active. The modified GBPM is tested in geometric motions of surfaces to verify the correctness of the new algorithm. A coupled method is proposed combining the modified GBPM and the CPM and tested on a number of numerical examples. Our second approach uses generalized finite difference schemes derived from radial basis functions (RBF-FD) in the implementation of the closest point method. An explicit and an implicit formulation of the CPM using RBF-FD are presented along with numerical experiments for the convergence of the method, including the approximation of the solution of reaction-diffusion equations and the Cahn-Hilliard equation on a variety of surfaces. Finally, a coupled method of the CPM that uses RBF-FD and the original GBPM is proposed and used to solve PDEs on moving surfaces.

## Interfacial numerics for the mathematical modeling of cloud edge dynamics

In this thesis we present a two-dimensional thermodynamic model for cloud edge dynamics. We use the incompressible Euler equations to describe the atmospheric fluid dynamics and link these to the theory of moist thermodynamics through a constitutive law. This leads to a free boundary model for the interface separating clear and cloudy air. The model is further specialized to linearized disturbance equations about conditions that are critically saturated with zero liquid cloud water. Due to the presence of discontinuous derivatives induced by the clear/cloudy interface we adapt the immersed interface method (IIM) for computing the pressure in the system to second order accuracy. In addition, we investigate the unforeseen second order convergence of a "naive" method without the IIM. We conduct an analysis of local and global errors for the naive method leveraging off our analysis of the IIM and present numerical verification of the results when necessary.

## Arithmetic aspects of the Burkhardt quartic threefold

The Burkhardt quartic is a 3-dimensional projective hypersurface defined over the rational numbers. It is known that sufficiently general points on the Burkhardt quartic parameterize abelian surfaces with a full level 3 structure. Furthermore, it is classical that the Burkhardt quartic is birational to 3-dimensional projective space after adjoining a cube root of unity. In this thesis we will show that the Burkhardt quartic is birational to 3-dimensional projective space over the rational numbers, and describe a geometric method of constructing a generic family of hyperelliptic curves corresponding to points on the Burkhardt quartic, whose Jacobians have a full level 3 structure. Specifically, we give an explicit family of hyperelliptic curves which contain almost all complex genus 2 curves with a full level 3 structure.

## Robust Chaos in Two-Dimensional Discontinuous Maps with One and Two Switching Manifolds

This dissertation concerns a new approach to determining the structure of robust chaos in two-dimensional (2D) piecewise smooth discontinuous maps and an extension to the case of two switching manifolds. The study of chaotic dynamics has found many applications in various disciplines in science and engineering. Extensive research has been carried out to identify and analyze the dynamical behaviour of chaos. This dissertation centres on those chaotic attractors which are robust to small parameter changes and do not contain periodic windows or coexisting attractors. This behaviour is termed robust chaos. In recent years, the problem of understanding and predicting robust chaos in the real world has attracted many researchers. In this dissertation, we focus on hyperbolic dissipative piecewise smooth discontinuous maps in the plane. First, we consider a 2D piecewise linear discontinuous normal form map with one switching manifold, restricting to real eigenvalues, and determine regions of parameter space where a bifurcation leading to robust chaos might occur. We study the intricate structure of the chaotic attractors and present detailed analytical heuristics for determining parameter values for boundary crises leading the onset or termination of robust chaos. We also show the existence of unusual basins of attraction for some chaotic attractors and provide a strategy to determine the basin boundaries.Next, we propose an extension to a new map with an added second switching manifold and three linear branches. This map has application to a simple financial market model. We discuss our normal form map, under the assumption that the outer branches are the same, and present a systematic analysis of bifurcations leading to robust chaos. We develop analytical procedures to identify the underlying generating mechanism of robust chaos in the vicinity of each of the switching manifolds and determine associated parameter space regimes. We also illustrate conditions under which robust chaos occurs near both the switching manifolds simultaneously.

## On Chudnovsky-Ramanujan Type Formulae

In his well-known 1914 paper, Ramanujan gave a number of rapidly converging series for $1/\pi$ which involve modular functions of higher level. D. V. and G. V. Chudnovsky have derived an analogous series representing $1/\pi$ using the modular function $J$ of level 1, which results in highly convergent series for $1/\pi$, often used in practice. In 2013, $12.1 \times 10^{12}$ digits of $\pi$ were calculated by A. J. Yee and S. Kondo using the Chudnovsky series for $\pi$. The purpose of this work is to explain the method of D. V. and G. V. Chudnovsky and show how it can be generalised to derive formulae for transcendental constants starting from a one-parameter family of elliptic curves. We find all such closed-form Chudnovsky-Ramanujan type formulae for the family of elliptic curves parameterised by $J$ of level 1, where $J$ is the absolute $j$-invariant.