191 |
Generalized Navier-Stokes equations for active turbulenceSłomka, Jonasz January 2018 (has links)
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Mathematics, 2018. / Cataloged from PDF version of thesis. / Includes bibliographical references (pages 211-227). / Recent experiments show that active fluids stirred by swimming bacteria or ATPpowered microtubule networks can exhibit complex flow dynamics and emergent pattern scale selection. Here, I will investigate a simplified phenomenological approach to 'active turbulence', a chaotic non-equilibrium steady-state in which the solvent flow develops a dominant vortex size. This approach generalizes the incompressible Navier-Stokes equations by accounting for active stresses through a linear instability mechanism, in contrast to externally driven classical turbulence. This minimal model can reproduce experimentally observed velocity statistics and is analytically tractable in planar and curved geometry. Exact stationary bulk solutions include Abrikosovtype vortex lattices in 2D and chiral Beltrami fields in 3D. Numerical simulations for a plane Couette shear geometry predict a low viscosity phase mediated by stress defects, in qualitative agreement with recent experiments on bacterial suspensions. Considering the active analog of Stokes' second problem, our numerical analysis predicts that a periodically rotating ring will oscillate at a higher frequency in an active fluid than in a passive fluid, due to an activity-induced reduction of the fluid inertia. The model readily generalizes to curved geometries. On a two-sphere, we present exact stationary solutions and predict a new type of upward energy transfer mechanism realized through the formation of vortex chains, rather than the merging of vortices, as expected from classical 2D turbulence. In 3D simulations on periodic domains, we observe spontaneous mirror-symmetry breaking realized through Beltrami-like flows, which give rise to upward energy transfer, in contrast to the classical direct Richardson cascade. Our analysis of triadic interactions supports this numerical prediction by establishing an analogy with forced rigid body dynamics and reveals a previously unknown triad invariant for classical turbulence. / by Jonasz Słomka. / Ph. D.
|
192 |
Specht modules and Schubert varieties for general diagramsLiu, Ricky Ini January 2010 (has links)
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2010. / Cataloged from PDF version of thesis. / Includes bibliographical references (p. 87-88). / The algebra of symmetric functions, the representation theory of the symmetric group, and the geometry of the Grassmannian are related to each other via Schur functions, Specht modules, and Schubert varieties, all of which are indexed by partitions and their Young diagrams. We will generalize these objects to allow for not just Young diagrams but arbitrary collections of boxes or, equally well, bipartite graphs. We will then provide evidence for a conjecture that the relation between the areas described above can be extended to these general diagrams. In particular, we will prove the conjecture for forests. Along the way, we will use a novel geometric approach to show that the dimension of the Specht module of a forest is the same as the normalized volume of its matching polytope. We will also demonstrate a new Littlewood-Richardson rule and provide combinatorial, algebraic, and geometric interpretations of it. / by Ricky Ini Liu. / Ph.D.
|
193 |
Pattern avoidance for alternating permutations and reading words of tableauxLewis, Joel Brewster January 2012 (has links)
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2012. / This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections. / Cataloged from student submitted PDF version of thesis. / Includes bibliographical references (p. 67-69). / We consider a variety of questions related to pattern avoidance in alternating permutations and generalizations thereof. We give bijective enumerations of alternating permutations avoiding patterns of length 3 and 4, of permutations that are the reading words of a "thickened staircase" shape (or equivalently of permutations with descent set {k, 2k, 3k, . . .}) avoiding a monotone pattern, and of the reading words of Young tableaux of any skew shape avoiding any of the patterns 132, 213, 312, or 231. Our bijections include a simple bijection involving binary trees, variations on the Robinson-Schensted-Knuth correspondence, and recursive bijections established via isomorphisms of generating trees. / by Joel Brewster Lewis. / Ph.D.
|
194 |
Wavelets and PDEs : the improvement of computational performance using multi-resolution analysis / Wavelets and partial differential equationsBetaneli, Dmitri, 1970- January 1998 (has links)
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 1998. / Includes bibliographical references (p. 119-125). / by Dmitri Betaneli. / Ph.D.
|
195 |
Unimodal, log-concave and Pólya frequency sequences in combinatoricsBrenti, Francesco, 1960- January 1988 (has links)
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 1988. / Includes bibliographical references. / by Francesco Brenti. / Ph.D.
|
196 |
Rigidity and invariance properties of certain geometric frameworksZhang, Lizhao, 1973- January 2002 (has links)
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2002. / Includes bibliographical references (leaves 59-60). / Given a degenerate (n + 1)-simplex in a n-dimensional Euclidean space Rn, which is embedded in a (n + 1)-dimensional Euclidean space Rn+l. We allow all its vertices to have continuous motion in the space, either in Rn+l or restricted in Rn. For a given k, based on certain rules, we separate all its k-faces into 2 groups. During the motion, we give the following restriction: the volume of the k-faces in the 1st group can not increase (these faces are called "k-cables"); the volume of the k-faces in the 2nd group can not decrease ("k-struts"). We will prove that, under more conditions, all the volumes of the k-faces will be preserved for any sufficiently small motion. We also partially generalize the above result to spherical space Sn and hyperbolic space Hn. / by Lizhao Zhang. / Ph.D.
|
197 |
Banach categories with conjugation.Recht, Lázaro January 1969 (has links)
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 1969. / Vita. / Bibliography: leaf 102. / Ph.D.
|
198 |
Fields of division points of elliptic curves related to Coates-WilesGupta, Rajiv January 1983 (has links)
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 1983. / MICROFICHE COPY AVAILABLE IN ARCHIVES AND SCIENCE / Bibliography: leaves 57-58. / by Rajiv Gupta. / Ph.D.
|
199 |
Algorithms in Elliptic Curve CryptographyHutchinson, Aaron 23 February 2019 (has links)
<p> Elliptic curves have played a large role in modern cryptography. Most notably, the Elliptic Curve Digital Signature Algorithm (ECDSA) and the Elliptic Curve Diffie-Hellman (ECDH) key exchange algorithm are widely used in practice today for their efficiency and small key sizes. More recently, the Supersingular Isogeny-based Diffie-Hellman (SIDH) algorithm provides a method of exchanging keys which is conjectured to be secure in the post-quantum setting. For ECDSA and ECDH, efficient and secure algorithms for scalar multiplication of points are necessary for modern use of these protocols. Likewise, in SIDH it is necessary to be able to compute an isogeny from a given finite subgroup of an elliptic curve in a fast and secure fashion. </p><p> We therefore find strong motivation to study and improve the algorithms used in elliptic curve cryptography, and to develop new algorithms to be deployed within these protocols. In this thesis we design and develop <i>d</i>-MUL, a multidimensional scalar multiplication algorithm which is uniform in its operations and generalizes the well known 1-dimensional Montgomery ladder addition chain and the 2-dimensional addition chain due to Dan J. Bernstein. We analyze the construction and derive many optimizations, implement the algorithm in software, and prove many theoretical and practical results. In the final chapter of the thesis we analyze the operations carried out in the construction of an isogeny from a given subgroup, as performed in SIDH. We detail how to efficiently make use of parallel processing when constructing this isogeny. </p><p>
|
200 |
A Hodge-theoretic Study of Augmentation Varieties Associated to Legendrian Knots/TanglesSu, Tao 10 April 2019 (has links)
<p> In this article, we give a tangle approach in the study of Legendrian knots in the standard contact three-space. On the one hand, we define and construct Legenrian isotopy invariants including ruling polynomials and Legendrian contact homology differential graded algebras (LCH DGAs) for Legendrian tangles, generalizing those of Legendrian knots. Ruling polynomials are the Legendrian analogues of Jones polynomials in topological knot theory, in the sense that they satisfy the composition axiom. </p><p> On the other hand, we study certain aspects of the Hodge theory of the "representation varieties (of rank 1)" of the LCH DGAs, called augmentation varieties, associated to Legendrian tangles. The augmentation variety (with fixed boundary conditions), hence its mixed Hodge structure on the compactly supported cohomology, is a Legendrian isotopy invariant up to a normalization. This gives a generalization of ruling polynomials in the following sense: the point-counting/weight (or E-) polynomial of the variety, up to a normalized factor, is the ruling polynomial. This tangle approach in particular provides a generalization and a more natural proof to the previous known results of M.Henry and D.Rutherford. It also leads naturally to a ruling decomposition of this variety, which then induces a spectral sequence converging to the MHS. As some applications, we show that the variety is of Hodge-Tate type, show a vanishing result on its cohomology, and provide an example-computation of the MHSs.</p><p>
|
Page generated in 0.0788 seconds