New Trends and Advanced Methods in Interdisciplinary Mathematical Sciences
New Trends and Advanced Methods in Interdisciplinary Mathematical Sciences
New Trends and Advanced Methods in Interdisciplinary Mathematical Sciences
Series Editor
Bourama Toni
Department of Mathematics & Economics
Virginia State University
Petersburg, VA, USA
The goal of this interdisciplinary series is to highlight the wealth of recent advances
in the pure and applied sciences made by researchers collaborating between fields
of study where mathematics is a core focus. As we continue to make fundamental
advances in various scientific disciplines, the most powerful applications will
increasingly be revealed by an interdisciplinary approach. This series will serve
as a catalyst for these researchers, to develop novel applications of, and approaches
to, the mathematical sciences. As such, we expect this series to become a national
and international reference in STEAM-H education and research. Because the
series will be interdisciplinary by design, a major focus will be on scientists and
mathematicians developing novel methodologies and research techniques that have
benefits beyond a single research community.
This approach seeks to connect researchers from across the globe, united in the
common language of the mathematical sciences. Thus, volumes in this series will
be suitable for both students and researchers in a variety of interdisciplinary fields,
such as: mathematics as it applies to engineering; physical chemistry and material
sciences; environmental, health, behavioral and life sciences; nanotechnology and
robotics; computer science, signal/image processing, and machine learning; as well
as finance, economics, operations research, and game theory.
Originating from the STEAM-H Lecture Series at Virginia State University, all
talks are given by invited researchers only, recognized as experts in their respective
fields. The weekly yearlong seminar is a dynamic forum for the best faculty to
present contributions reflecting the most recent advances in scientific knowledge,
delivered in a standardized, self-contained and pedagogically-oriented manner, to a
multidisciplinary audience of faculty and students, with the objective of fostering
student interest and participation in the STEAM-H disciplines as well as genuine
interdisciplinary collaborative research. Plenary talks are followed by a one-hour
discussion post-presentation on research collaboration and visits, mentorships,
internships, and grant proposals.
123
Editor
Bourama Toni
Department of Mathematics & Economics
Virginia State University
Petersburg, VA, USA
v
vi Preface
This volume, as the previous ones, strongly advocates multidisciplinarity with the
goal to generate new interdisciplinary approaches, instruments, and models includ-
ing new knowledge, transcending scientific boundaries to adopt a more holistic
approach. For instance, it should be acknowledged, following Nobel laureate and
president of the UK’s Royal Society of Chemistry, Professor Harry Kroto, “that the
traditional chemistry, physics, biology departmentalised university infrastructures—
which are now clearly out-of-date and a serious hindrance to progress—must be
replaced by new ones which actively foster the synergy inherent in multidisci-
plinarity.” The National Institutes of Health and the Howard Hughes Medical
Institute have strongly recommended that undergraduate biology education should
incorporate mathematics, physics, chemistry, computer science, and engineering
until “interdisciplinary thinking and work become second nature.” Young physicists
and chemists are encouraged to think about the opportunities waiting for them at
the interface with the life sciences. Mathematics is playing an ever more important
role in the physical and life sciences, engineering, and technology, blurring the
boundaries between scientific disciplines.
The series is to be a reference of choice for established interdisciplinary scientists
and mathematicians and a source of inspiration for a broad spectrum of researchers
and research students, graduates, and postdoctoral fellows; the shared emphasis of
these carefully selected and refereed contributed chapters is on important methods,
research directions, and applications of analysis including within and beyond
mathematics. As such the volume promotes mathematical sciences, physical and
life sciences, engineering, and technology education, as well as interdisciplinary,
industrial, and academic genuine cooperation.
Toward such goals the following chapters are featured in the current volume.
Chapters 1, 2, 3, and 4 by Raymond Fletcher extensively study perfect polygons,
geometric triple systems, and geometric ramifications in the ternary hypercom-
mutative variety.
Chapter 5 by Larry Keen investigates the psychoneuroimmunological influences of
cannabinoids, offering an opportunity for mathematical modeling techniques in
this area of neuropsychology.
In Chapter 6 by Andrei Khrennikov et al., the authors propose a methodology for
image segmentation with the aid of p-adic metrics.
Chapter 7 by Klaudia Oleschko et al. shows that primes are everywhere but nowhere.
In Chapter 8 by Martha Ortiz-Posadas, the author presents a logical combinatorial
approach for pattern recognition in medicine.
Chapter 9 by Rana Parshad and Brian Ewald is on the uniqueness of invariant
measures for the stochastic infinite Darcy-Prandtl number model.
Chapter 10 by K.C. Patidar et al. is concerned with pricing barrier options using
integral transform.
In Chapter 11 Matti Pitkänen discusses at length the philosophy of adelic physics.
Chapter 12 by Bourama Toni proposes a game-theoretical analysis of cultural
integration and assimilation in America as a way of understanding the evolution
of American social dynamics.
Preface vii
The book as a whole certainly enhances the overall objective of the series, that
is, to foster the readership interest and enthusiasm in the STEAM-H disciplines
(science, technology, engineering, agriculture, mathematics, and health), stimulate
graduate and undergraduate research, and generate collaboration among researchers
on a genuine interdisciplinary basis.
The STEAM-H series is hosted at Virginia State University, Petersburg, Virginia,
USA, an area that is socially, economically, intellectually very dynamic and
home to some of the most important research centers in the USA, including
NASA Langley Research Center, manufacturing companies (Rolls-Royce, Canon,
Chromalloy, Sandvik, Siemens, Sulzer Metco, NN Shipbuilding, Aerojet), and
their academic consortium (CCAM), the University of Virginia, Virginia Tech, the
Virginia Logistics Research Center (CCAL), Virginia Nanotechnology Center, The
Aerospace Corporation, C3I Research and Development Center, Defense Advanced
Research Projects Agency, Naval Surface Warfare Center, National Accelerator
Facility, and the Homeland Security Institute.
The STEAM-H series, by now well established with a high impact through its
intensive seminars and books published by Springer, a world-renowned publisher,
is expected to become a national and international reference in interdisciplinary
education and research.
We would like to express our sincere appreciation to all the contributors and to
all the anonymous referees for their professionalism. They all made this volume a
reality for the greater benefit of the community of science, technology, engineering,
agriculture, mathematics, and health.
ix
Contents
xi
xii Contents
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
Contributors
xiii
xiv Contributors
1 Introduction
Let P be a set of n 5 points in the real projective plane, no three of which are
collinear, labeled with the integers mod n (Zn ). For each k 2 Zn let Wk denote the set
of lines f[x,y] : x ¤ y, xCy D k(mod n)g. If for each k the lines in Wk are concurrent,
then we call P a perfect n-gon. We denote by Xk the point of concurrence of the lines
in Wk . We insist that n5 so that each set Wk contains at least two lines and thus
each perspective point is defined. The n labeled points are the vertices of P and the
set fXk : k 2 Zn g are the perspective points of P. We also require that no point is
simultaneously a vertex and a perspective point. A regular polygon with its vertices
labeled consecutively with elements from Zn is an example of a perfect n-gon. In
this case the vertices of P are equally spaced around a circle and the perspective
points all lie on the line at infinity in the projective plane. If the vertices of P lie
on a circle or any conic and the perspective points lie on a line, we call P a cyclic
perfect polygon. We will demonstrate, as our Main Theorem, that the vertices and
perspective points of any perfect polygon P lie on a cubic curve ˛ which we call the
cubic envelope of P. If ’ is reducible, then P may have all its vertices and perspective
points on three lines, or P is cyclic and all perspective points must be collinear.
The vertices of a perfect polygon will be referred to by their labels (from Zn ),
and the notation [A,B], where A,B 2 Zn will be used to represent the line containing
points A,B. The notation [A1 , A2 , : : : , An ] will be used to indicate a line containing
points A1 , A2 , : : : , An , or as an abbreviation for the phrase: “the points A1 , A2 ,
: : : , An are collinear.” We will make reference to the following two theorems from
Euclidean geometry. These can be found in many places, e.g., [1, 2].
E1: (Pascal’s Theorem) Let (A,B,C,D,E) be a hexagon inscribed on a conic. Then
the points [A,B]\ [D,E], [B,C]\[E,F], [C,D]\[F,A] are collinear.
E2: (Converse of Pascal’s Theorem) If A,B,C,D,E are six points in the projective
plane such that the points [A,B]\ [D,E], [B,C]\[E,F], [C,D]\[F,A] are collinear,
then the six points lie on the same conic.
Some preliminary results regarding cubic curves are also needed. A cubic curve
has the general form:
(1) f(x,y) D ax3 C bx2 y C cxy2 C dy3 C ex2 C fxy C gy2 C hx C jy C k D 0.
The cubic f(x,y) is reducible if it factors as the product of two nonconstant
real polynomials, and we call it irreducible if no such factorization exists. When
a cubic is reducible it consists either of three lines or a line and a conic. A curve
is nonsingular if it has tangents at all of its points. The following property of
nonsingular irreducible cubics can be found in [3].
P1: Let j be a line which intersects a nonsingular irreducible cubic curve ˛ at
least twice counting multiplicities. Then j intersects ˛ exactly three times counting
multiplicities.
Property P1 allows us to define a binary operation * on the nonsingular points of
an irreducible cubic curve ’ by setting x*y equal to the unique third point on [x,y]
and on ’. The expression x*x denotes the point besides x which lies on ’ and on the
tangent to ’ at x. If a tangent to ’ intersects ’ at a point x with multiplicity three,
then x is called a flex of ’. In this case x *x D x, i.e., x is idempotent in the algebra
(’,*). Three identities are satisfied by *:
A1: x*y D y*x
A2: x*(x*y) D y
A3: (x*y)*(z*w) D (x*z)*(y*w).
The first two identities are clear, but A3 is a remarkable, (and well known),
property of nonsingular irreducible cubic curves. An algebra satisfying A1, A2,
A3 is called a thirdpoint groupoid in [4] and a binary hypercommutative algebra
(BHA) in [5]. We call A3 the hypercommutative axiom and illustrate it on a typical
irreducible cubic curve in Fig. 1. The cancellation property:
A4: x*y D x*z ! y D z
Perfect Polygons and Geometric Triple Systems 3
c*d
b
c
a*b
a x
b*d
a*c
We shall consider first a special type of perfect polygon which contains two
perspective points and a vertex on the same line. Suppose [Xs , Xt , k] where s ¤t.
Then we must have [Xs , Xt , k, t-k, s-k]. We are not allowed three collinear vertices,
so we must have either t-k D k or s-k D k. Without loss of generality, assume s-k
D k, so we have [X2k , Xt , k, t-k], or replacing t-k by m, we have [X2k , XmCk ,
k, m] with m ¤ k. The point 2k – m must also lie on this line, in which case we
must have 2k D 2m (mod n). If n is odd, then 2k D 2m (mod n) implies m D k.
We conclude that no perfect polygon with an odd number of vertices can have two
perspective points and a vertex on the same line. There does exist a perfect hexagon
with such a line, as we show in our first theorem.
4 R.R. Fletcher III
X0
0 4
X4
X1 X2
3 5
X5
X3 1 2
X2s(0, j)
2q-s Xs+q
2s-q
t(0,k)
points and a vertex contains the points s, t, XsCt ,X2s where s ¤ t but 2s D 2t.
This actually requires that t D s C (n/2). Since n 8 we can find vertex q of P
such that the points fs,t,q,sCt-q,s-tCq,2s-q,2q-sg are distinct. For example, if we
set q D sC1, then this set becomes fs, sC(n/2), sC1, s-1C(n/2), sC1C(n/2), s1,
sC2g which is easily seen to be a set of seven distinct points (provided n is even and
n 8 ). We transform, similar to Theorem 1, so that the points XsCt , s, s-t, s-tCq,
q become the vertices of a unit square, i.e., XsCt D (0,0); s D (0,1); s-tCq D (1,1),
and q D (1,0). We let X2s D (0,j) and t D (0,k) so that the required line [s,t, XsCt ,
X2s ] is the y-axis (see Fig. 3). We then obtain the following coordinates for points
of interest:
sCt-q D[XsCt , q]\[X2s , s-tCq] D (j/(j-1),0),
2s-q D [XsCt, , s-tCq]\[X2s , q] D (j/(jC1), j/(jC1)),
XsCq D [s,q]\[t, s-tCq] D ((k-1)/(k-2), -1/(k-2)),
XqCt D [s, s-tCq]\[q,t],
2q-s D [XqCt , sCt-q]\[XsCq , 2s-q] D (0, jk/(jCk-1)).
The x-coordinate of the vertex 2q-s indicates that it lies on the y-axis along with
vertices s,t. Since we chose q so that the vertices s,t, 2q-s are distinct, we find that
P contains three collinear vertices. Since this is not allowed, we conclude that no
perfect n-gon with n >6 exists which has two perspective points and a vertex on the
same line.
3 Some Constructions
In Fig. 4 we have constructed a perfect hexagon using the following procedure: (1)
put vertices 0,1,2 in the plane so that they are noncollinear; (2) put X1 on [0,1], X2 on
[0,2], and X3 on [1, 2]; (3) put vertex 3 on [X3 , 0]; (4) let vertex 5 D [X1 ,2]\[X2 ,3];
(5) let X5 D [0,5]\[2, 3]; (6) let vertex 4 D [X1 ,3]\[X5 ,1]; (7) let X4 D [0,4]\[1, 3]
and X0 D [1, 5]\[2, 4]. Let P denote the resulting configuration of six vertices
and six perspective points. To show P is a perfect hexagon it remains only to show
6 R.R. Fletcher III
X0
X5
2
X4 1
3
X3 0
X2 5
4
X1
X6
3
2
X5
1
X4
0
4
6
X3 5
X2
X1
X0
Fig. 5 Perfect 7-gon
D 4 lies on ’. One of the two points X5 , 4 must be different from the point P9
stipulated in property P4, so by property P5 we can conclude that ’ is unique. To
show that vertex 5 of P lies on ’, consider: 4 * X2 D (X5 *1)*(2*0) D (X5 *2)*(1*0)
D 3*X1 and thus 4 * X2 D 3*X1 D [4,X2 ]\[3,X1 ] D 5 which must then lie on ’.
We have shown that every vertex of P lies on ’. Consider: 1*6 D (X5 *4)*(3*X2 )
D (X5 *3)*(4*X2 ) D 2*5 and thus 1*6 D 2*5 D [1, 6]\[2, 5] D X0 lies on ’.
Consider: 2*4 D (X3 *1)*(2*X6 ) D (X3 *2)*(1*X6 ) D 1*5 and thus 2*4 D 1*5 D
X6 lies on ’. Consider: 3*4 D (X3 *0)*(1*X5 ) D (X3 *1)*(0*X5 ) D 2*5 D X0 . This
proves [3,4,X0 ]. Consider: 0*6 D (X2 *2)*(4*X3 ) D (X2 *4)*(2*X3 ) D 5*1 D X6 .
This proves [0,6,X6 ]. We have now shown that all the perspective points of P lie
on ’ and we have shown two of the required collinearities. It remains only to show
[5,6,X4 ]. Consider: 5*6 D (X1 *3)*(1*X0 ) D (X1 *1)*(3*X0 ) D 0*4 D X4 , and thus
[5,6,X4 ].
We call the construction of Theorem 3 a one-point slide construction since, once
vertex 4, in step (7), is shifted to the right spot on line [X3 ,6], the positions of the
remaining vertices and perspective points are all forced and the result is the desired
perfect polygon. We claim that for every positive integer n > 6 a perfect n-gon can
be constructed, as in Theorem 3, by a one-point slide. Instead of attempting to prove
8 R.R. Fletcher III
this, we shall, in the next section, show that the vertices and perspective points of
every perfect polygon must lie on a cubic curve. We will then construct perfect
polygons on a given cubic curve.
s can be added to the vertices of P and 2s to the subscripts of the perspective points
of P and that with this relabeling P remains a perfect n-gon. It then follows that s*s
D X2s for any s in Zn .
Now suppose ’ is reducible so the vertices of P lie on a conic “ and the
perspective points lie on a line j. Let k D [0,0] denote the tangent to “ at vertex
0. In this case it suffices to show that k contains the perspective point X0 . Consider
the degenerate hexagon (0,0,-2,-1,1,-3) which is inscribed in “. By Pascal’s Theorem
(E1) the points k \[-1,1], X-2 D [0,-2]\[1,-3], and X-3 D [-2,-1]\[0,-3] are collinear.
This means that k \[-1,1] lies on line j, but j\[-1,1] D X0 and it follows that k
contains X0 .
As a consequence of Theorem 4, perfect polygons can be put into three Classes: (i)
those whose cubic envelope consists of three lines; (ii) those whose cubic envelope
consists of a line which contains all the perspective points and a conic which
contains all the vertices, and (iii) those whose cubic envelope is irreducible. In
Section 2 we have discussed perfect polygons, (the special perfect hexagons), which
constitute Class (i). In this section we consider perfect polygons in Class (ii). Let
P be such a perfect polygon with cubic envelope consisting of line j containing the
perspective points of P, (we call j the perspective axis of P), and conic “ containing
the vertices of P. In accordance with [3], there exists an invertible transformation
T which sends j to another line k and “ to a circle, so to prove the existence of P,
it suffices to show that P can be constructed with vertices on a given circle and
perspective points on a given line. We call such a perfect polygon circular. To
analyze perfect circular polygons the following basic geometric results are needed,
all of which can be found in [1] or [2].
E3: (Theorem of Desargues) Two triangles are in perspective from a line iff they
are in perspective from a point.
The power of a point P with respect to a circle ! is given by d2 – r2 where d is
the length of the line segment joining P to the center of ¨, and r is the radius of ¨.
E4: If P lies outside of a circle ! with center O and l is a line through P which
meets ! in two points A, B, then (PA)(PB) D d2 – r2 where r is the radius of ! and
d is the length of segment PO. If T is the point of contact of a tangent to ! from P,
then (PT)2 D d2 – r2 . If P lies in the interior of ! and l is a line through P which
meets ! at A, B, then (PA)(PB) D r2 – d2 .
E5: (Radical axis of two circles) Let !, be two nonconcentric circles. Then the
locus of points with equal powers with respect to !, is a lone perpendicular to the
line of centers of !,. This line is called the radical axis of !,. In case !, meet in
two points then the radical axis is the line containing these points.
E6: (Radical center) Let ,,! be three circles whose centers form a triangle.
Then the radical axes of these three circles taken in pairs concur at a point called
the radical center of ,,!.
12 R.R. Fletcher III
Some basic properties from inversive geometry will also be useful. Let ¨ be a
circle with center O and radius r and let P ¤ O be a point in the plane of ¨. The
inverse of P with respect to ¨ is the point P0 lying on [O,P] such that [O,P][O,P0 ]
D r2 . If P lies in the exterior of ¨, then the inverse of P with respect to ¨ can be
constructed as follows. Let A,B be the contact points on ¨ of the tangents from
P, then P0 D [A,B]\[O,P]. If P lies in the interior of ¨, then let [A,B] be the chord
through P and perpendicular to [O,P], then P0 is the intersection point of the tangents
to ¨ at A,B. If P lies on ¨, then P0 D P and if P D O, then P0 is not defined. Note
that inversion through ¨ is an involutory transformation of the inversive plane.
E7: If a line k meets a circle ! in two points A, B, then the inverse of k wrt ! is
the circle through A, B and the center O of !.
E8: All circles orthogonal to two given circles ˛,ˇ cross the line of centers of
˛,ˇ in the same two points.
E9: The inverse of a circle which does not contain the center of the circle of
inversion is a circle.
E10: Inversion preserves angles.
In what follows we assume that Zn is the vertex set of a perfect cyclic polygon
P and fXk : k 2 Zn g is the perspective set of P. Any line [x,y] where x,y 2 Zn is
a diagonal of P. If n is even, then the lines f[x, xC(n/2)]: x 2 Zn g are the long
diagonals of P.
Theorem 6 Let P be an even cyclic perfect n-gon. Then the long diagonals of P
concur at a point Z which we call the center of P.
Proof Let t 2 Zn and consider the triangles (t, tC1, tC2), (tC(n/2),
tC1C(n/2), tC2C(n/2)). Since [t,tC1]\[tC(n/2),tC1C(n/2)] D X2tC1 ; [tC1,
tC2]\[tC1C(n/2), tC2C(n/2)] D X2tC3 ; [t, tC2)]\[tC(n/2), tC2C(n/2)] D X2tC2 ,
and X2tC1 , X2tC2 , X2tC3 lie on the perspective axis j of P, these triangles are in
perspective from j (see Fig. 6). By Desargue’s Theorem (E3), these triangles are in
perspective from a point, i.e., the lines [t, tC(n/2)], [tC1, tC1C(n/2)], and [tC2,
X2t+3
X2t+1 X2t+2 X2t+2 X2t+4
X2t
j
t+2 t+(n/2)
t+1+(n/2)
Z
t+1
t t+2+(n/2)
X2q
U
X2p
p+(n/2)
q
Z α
β O q+(n/2)
p
w
tC2C(n/2)] are concurrent. Since t 2 Zn is arbitrary, we have shown that any three
consecutive long diagonals of P are concurrent. It follows that there is a point Z
which lies on each of the long diagonals of P.
Theorem 7 Let P be an even perfect circular polygon with center Z and perspective
axis j. Let ! denote the circle which contains the vertices of P; let O denote the
center of ! and let Q denote the foot of the perpendicular from O to j. Then Z is the
inverse of Q wrt !. (Thus OZ is perpendicular to j.)
Proof Let X2p , X2q be any two distinct even perspective points of P (see Fig. 7). By
Theorem 5, the tangent lines to ¨ from X2p touch ¨ at the points p, pC(n/2), and
similarly the tangent lines from X2q touch ¨ at q, qC(n/2). Let ’ denote the circle
(X2q , q, qC(n/2)) and let “ denote the circle (X2p , p, pC(n/2)). The long diagonal
(p, pC(n/2)) is the radical axis of the circle pair f¨, “g, and the long diagonal (q,
qC(n/2)) is the radical axis of the circle pair f¨, ’g and thus Z D [p, pC(n/2)] \[q,
qC(n/2)] is the radical center of the circles ’,“,¨ by (E6). Both circles ’, “ pass
through the center O of ¨. Let U denote the second point of intersection of ’, “.
The line OU is the radical axis of f’,“g by (E4) and thus Z lies on the line OU.
By (E7) the inverse of line (p, pC(n/2)) wrt ¨ is the circle “ and the inverse of (q,
qC(n/2)) wrt ¨ is the circle ’. As a consequence, the inverse of Z wrt ¨ is the point
U. Since U lies on “ and segment [O, X2p ] is a diameter of “, it must be that ∠OUX2p
D 90ı . Similarly, ∠OUX2q D 90ı , and so U lies on j and OU is perpendicular to j.
Then U D Q and the theorem is proved.
In order to achieve our final description of perfect circular n-gons, we need to
show how a given perfect circular n-gon can be doubled to obtain a perfect circular
2n-gon. For this the following three Lemmas are required.
Lemma 8 Let A,B,C,D be four points on a circle ! and let P D [A,D]\[B,C]; Q
D [A,B]\[C,D]; R D [B,D]\[A,C] and E,F the contact points of the tangent lines
to ! from P. Then [E,R,F,Q].
Proof Let J D [A,E]\[B,F]; K D [A,F]\[B,E]; L D [E,C]\[F,D], and M
D [E,D]\[F,C], then the inscribed hexagons (E,A,F,F,B,E), (A,D,F,B,C,E),
14 R.R. Fletcher III
Fig. 8 Collinearity of P
E,F,R,Q
D M
E
L
C
A
R
K
P
T
Q
R V
D F
S C
A
R
E
k
E B
A R
F
D
Fig. 10 Collinearity of P, E, F
on the vertices and doubling the subscripts on the perspective points fXk : k 2 Zn g.
These constitute the even vertices and perspective points of P0 . If n is odd, then the
tangents from the perspective points of P will meet ! each at one nonvertex of P.
Include these points as vertices of P0 and label them with the odd values in Z2n so
that all members of Z2n occur consecutively on !. If n is even, then draw the two
tangents from each odd perspective point of P, include the contact points as vertices
of P0 , and label these with the odd values in Z2n so that, again, all the vertices of P0
are labeled consecutively around !. Then P0 is a perfect circular 2n-gon on ! with
perspective axis j.
Proof The perspective point Xk of P becomes the even perspective point X2k of P0 .
We start by demonstrating the required concurrences at the even perspective points
of P0 . If a,b 2 Zn are both even and aCb D 2k, then [a,b, X2k ] by virtue of our
construction. Suppose a, b are odd and aCb D 2k. Consider the set of vertices fa-1,
a, aC1, b-1, b, bC1g. The lines [a-1, bC1], [aC1, b-1] since they are pairs of even
vertices which sum to 2k contain the point X2k . The lines [a,a] and [b,b] pass through
the points X2a , X2b , respectively, by virtue of our construction. The line [aC1, a-1]
joins two even vertices, so we know it contains X2a , and similarly the line [bC1,
b-1] contains X2b . Since X2a , X2b , and X2k lie on j, we may apply Lemma 10 to
conclude [a,b, X2k ]. If n is even, then it may be that X2a D X2b . In this case [a,b,
X2k ] follows directly from Lemma 8.
It remains to show for each odd m 2 Z2n that the lines f[a,b]: aCb D m g concur
at a point Xm . Let p, q, r be three distinct odd members of Z2n and let W D [m-p,
p]\ [m-q,q]. By Pascal’s Theorem, (E1), the inscribed hexagon (m-q, q, -q, p, m-p,
p-m) implies that the points W, X0 D [q, -q] \ [m-p, p-m] and Xp-q D [p-m, m-q] \
[p, -q)] are collinear. (Note that, by the first paragraph, we have shown the required
concurrences at the even perspective points X0 , Xp-q .) The point W thus lies on the
perspective axis j. Now let W0 D [m-p, p]\[m-r, r], then similarly the points W0 ,
X0 , Xp-r are collinear and so W0 also lies on j. But W D j \ [m-p, p] D W0 and so
the diagonals [p, m-p], [q, m-q], and [r, m-r] concur at the same point (W D W0 ) on
j. Since p, q, r were chosen freely from among the odd values in Z2n , this implies
that all the diagonals f[k, m-k]: k is oddg meet at the same point on j (which we
designate by Xm ).
With Theorem 11 in hand, we can now define the center of an odd perfect circular
n-gon P by first doubling P to obtain an even perfect circular 2n-gon P0 and then
taking the center of P0 to be the center of P. The following is our intended description
of perfect circular n-gons.
Theorem 12 Every perfect circular n-gon is the inverse of a regular n-gon.
Proof Let P be a perfect cyclic n-gon with circular envelope ¨, vertex set Zn ,
perspective set X D fXk : k 2 Zn g, and perspective axis j (see Fig. 11). For each
k 2 Zn let ¨k denote the circle with center Xk which is orthogonal to ¨. We regard
j as a circle with in finite radius and the line of centers for circles ¨, j is the line k
through the center O of ¨ and perpendicular to j. The circles ¨k are orthogonal to
Perfect Polygons and Geometric Triple Systems 17
X0
0' 1'
7'
2'
X7 6' U
X6 3'
5' 4'
X5 X4
X3
5 X2
6 4
Z 3
7
M'
O
2
0
1
both j and ¨, and so by (E8) cross k in the same two points M, M0 . We suppose that
M lies in the exterior and M0 in the interior of ¨. For each k 2 Zn let ¥k denote the
mapping which inverts the plane through ¨k .
Claim 1 For each k 2 Zn we have ¥k (¨k-1 ) D ¨kC1 .
Proof of Claim 1 Suppose k is odd, then [Xk , (k-1)/2, (kC1)/2] where vertex (k-1)/2
lies on ¨k-1 and vertex (kC1)/2 lies on ¨kC1 . Since ¨k is orthogonal to ¨ we must
have ¥k ((k-1)/2) D (kC1)/2. Also we have ¥k (M) D M and ¥k (M0 )D M0 since
M, M0 lie on ¨k , thus the three points M, M0 , (k-1)/2 of ¨k-1 are inverted to the
three points M, M0 , (kC1)/2 of ¨kC1 . By (E9) we must have ¥k (¨k-1 ) D ¨kC1 .
Now suppose k is even and mark on ¨ the contact points of the two tangents from
each odd perspective point. If such a point lies between vertices k, kC1 mark it as
vertex kC(1/2). In accordance with Theorem 11, these points along with the original
vertices of P form a perfect 2n-gon on ¨, and for each k the lines f[x,y] : xCy D kg
concur at Xk . We have [Xk , (k-1)/2, (kC1)/2] where (k-1)/2 lies on ¨k-1 and (kC1)/2
lies on ¨kC1 , and it follows again that ¥k (¨k-1 ) D ¨kC1 . This completes the proof
of Claim 1.
Claim 2 The n circles ¨k meet at 2n equal angles at M and M0 .
Proof of Claim 2 Let ™k denote the angle at M (and M0 ) between ¨k-1 and ¨k .
By Claim 1, ¨k is a midcircle for ¨k-1 , ¨kC1 and so the angle at M, M0 between
¨k-1 and ¨kC1 is bisected by ¨k . Thus the angle at M, M0 between ¨k and ¨kC1 is
also ™k . Let ™kC1 denote the angle at M, M0 between ¨kC1 and ¨kC2 . By Claim 1,
¨kC1 is a midcircle for ¨k and ¨kC2 and it follows similarly that the angle at M,
M0 between ¨k and ¨kC1 equals the angle between ¨kC1 and ¨kC2 , i.e., ™k D ™kC1 .
Since k 2 Zn is arbitrary, Claim 2 follows. As a consequence of Claim 2, we call
M, M0 the equiangular points of P. If ™ is the common angle at M, M0 between
consecutive circles ¨k , then we observe also that ™ D ∠Xk MXkC1 for each k 2 Zn .
18 R.R. Fletcher III
Now let ’ be a circle centered at M and let ¥’ denote the mapping of the plane
which inverts through ’. Since the circles ¨k all contain the center M of ’, they
invert to lines Jk , i.e., ¥’ (¨k ) D Jk . Since M0 lies on each circle ¨k , the point
U D ¥’ (M0 ) is a concurrence point of all the lines Jk , and since the circles ¨k meet
at equal angles ™ at M0 , the lines lk meet at equal angles ™ at U (by (E10). Let ¨0
D ¥’ (¨), let k0 D ¥’ (k), and let P0 denote the n-gon with vertices fk0 :k 2 Zn g. If
n is even, then the lines fJk : k is eveng join points (k/2)0 , ((kCn)/2)0 and thus form
the long diagonals of P0 . Since these lines meet at equal angles at U, we must have
that P0 is a regular n-gon. If n is odd, then we construct the double Q D f0, 0.5, 1,
1.5, 2, 2.5, : : : , n-1, n-0.5g of P where the point kC0.5 is defined to be the contact
point on ¨ of the tangent from X2kC1 which lies between k and kC1. Each circle ¨k
meets ¨ at the points k/2, (kCn)/2 and the inverses Jk meet ¨0 at the points (k/2)0 ,
((kCn)/2)0 . Each Jk is thus a long diagonal of Q0 D ft0 : t 2 Qg. Since the circles
¨k meet at equal angles ™ D 360ı /2n at M0 , the lines Jk meet at equal angles at U.
Thus Q0 is a regular 2n-gon and P0 D f k0 : k 2 Zn g is a regular n-gon which inverts
onto P.
Corollary 13 Let be any conic; let m be a line which does not meet , and let Q
be a point on . Then there exists a unique perfect n-gon on with perspective axis
m and vertex Q.
Proof There exists an invertible transformation T which takes ” to a circle ¨; m
to another line j, and point Q to a point 0. Construct a circle “ with center on j
and which is orthogonal to ¨. Let k denote the line through the center of ¨ which
is perpendicular to j. The circle “ meets k at the equiangular points M, M0 . Let
00 D [M,0]\¨ and construct the unique regular n-gon inscribed in ¨ which contains
the vertex 00 . Let P0 denote this regular n-gon and label its vertices 00 , 10 , : : : , (n-1)0
consecutively around ¨. Let ’ denote the circle with center M which is orthogonal
to ¨, and let ¥’ denote the inversion through ’. For each k 2 Zn let vertex k be given
by k D ¥’ (k0 ). Since ’ is orthogonal to ¨, the points k form an n-gon P on ¨. By
Theorem 12, P is a perfect n-gon with perspective axis j. Also P contains the vertex
0 since 0 D ¥’ (00 ). Now apply the inverse transformation T-1 to obtain the desired
perfect n-gon on the conic ”.
To X4
4
3'
X2
2
3 4'
5' X3
2' X1
X0
0 5 1
X5
0' q
1'
when regarded in the projective plane, and Type IV cubics consist of two connected
components which we call the bell and the oval. If ” is a Type IV cubic, then the bell
of ” is a subalgebra of the BHA (”,*), and the oval is anticlosed, i.e., if a,b 2 oval,
then a*b lies in the bell. The unique singularity of a Type III cubic is an isolated
point; otherwise Type III cubics are like Type V. Type III, IV, V cubics each contain
three collinear flex points; Type I, II each have only one flex point. We shall say
that two triple systems on a cubic ” are equivalent in case they consist of precisely
the same set of points on ”, but may have different labels. For example, adding 1 to
each vertex of a (Zn ,0) triple system creates an equivalent (Zn ,3) triple system. Here
are the useful results from [5]:
(R1) If gcd(n,3) D 1, then every triple system with base Zn is equivalent to a (Zn ,0)
geometric triple system. If 3jn, then every triple system with base Zn is equivalent to
either a (Zn ,0) or a (Zn ,1) triple system. Moreover, if 3jn the (Zn ,0) triple system is
not equivalent, or even isomorphic, to the (Zn ,1) triple system.
(R2) Let T be a triple system with base Zn . If n 10, then the vertices of T lie on
an irreducible cubic curve of Type III,IV, or V.
(R3) For each positive integer n, a triple system with base Zn and any sum can
be constructed on any Type III, IV, or V cubic curve.
(R4) Let be a Type III, Type V, or bell of a Type IV cubic curve and let f be a
flex point of . Then for each positive integer n there exists a unique (Zn ,0) triple
system on with f as vertex 0.
(R5) Let be a Type III, Type V, or bell of a Type IV cubic curve. If 3jn then, up to
equivalence, there exists a unique (Zn ,0) triple system on which contains all three
flex points of , and there exist exactly two nonequivalent (Zn ,1) triple systems on
which are translates of each other. If gcd(n,3) D 1, then there exist exactly three
mutually nonequivalent (Zn ,0) triple systems on , each containing a different flex
point of .
(R6) If gcd(m,3) D 1, then every triple system with base Z2 Z2m is equivalent to
a (Z2 Z2m , (0,0)) triple system. If 3jm, then every triple system with base Z2 Z2m
is equivalent to either a (Z2 Z2m , (0,0)) or a (Z2 Z2m , (0,1)) triple system.
In the presence of an irreducible cubic curve ”, we can define perfect polygons
with fewer than five points. If we choose any nonflex point of ” for vertex 0, and let
X0 D 0*0, we have a perfect 1-gon. If ” is Type III or V, then for each nonsingular
point y on ” there exist exactly two points on p ” which satisfy the equation x*x D y.
We denote the solutions to this equation by y. So if 0 is any nonflex point of ”, then
there exist two points which we label 0,1 such that 0*0 D 1*1 D X0 . We thus obtain
a perfect polygon with base Z2 . A (Z3 ,0) triple system T consists of the three flex
points of ”. It is unique by (R5). If q is any nonflex point of ” then, in accordance
with Theorem 16, q*T is a perfect polygon, (i.e., a perfect triangle), with base Z3 .
First we consider triple systems with a Type III or Type V cubic envelope.
Theorem 17 Let T be a (Zn ,0) triple system whose vertices lie on a Type V, Type
III, or bell of a Type IV cubic curve . Let S be the unique (Z3n ,0) triple system on
, and let q 2 . Then q*T is a geometric triple system with base Zn iff q 2 S. If q is
not in S, then q*T is a perfect n-gon.
22 R.R. Fletcher III
Proof By (R5) the vertices of S are uniquely determined. Vertices 0,n,2n correspond
to the three collinear flex points of ”. The vertices of S can be partitioned into three
subsets: U D f0,3,6, : : : , 3n-3g, W D f1,4,7, : : : , 3n-2g, and V D f2,5,8, : : : ,3n-
1g each of which form a subalgebra of (S,*). Also V*W D fv*w : v 2 V, w 2 Wg
D U; V*U D W, and V*W D U. The relabeling of U given by 3k ! k turns U into
a (Zn ,0) triple system; the relabeling of W given by 3k-2 ! k turns V into a (Zn ,2)
triple system, and the relabeling of V given by 3k-1 ! k turns V into a (Zn ,1) triple
system. By (R5), U,V,W constitute the full set of distinct triple systems on ” with
base Zn . In case gcd(3,n) D 1, each of U,V,W is equivalent to a (Zn ,0) triple system,
and if 3jn, then U is a (Zn ,0) triple system and V,W are (Zn , 1) triple systems. In
Figs. 13 and 14 we illustrate these cases with n D 6 and n D 5. In either case we
can identify T with U, and so we have V*T D W and W*T D V. If q 2 ”, and q*T
is a geometric triple system with base Zn , then we must have either q*T D T; q*T
D V or q*T D W. If q 2 T, then q*T T since T is a subalgebra of (”,*). Since the
mapping ¥: T ! q*T defined by ¥(t) D q*t is a bijection, we must have jq*Tj D
jTj and thus q*T D T. We have shown that q*T D T iff q 2 T. If q 2 W, then q*T
V, since W*T D V, and since q*T and V each has n elements, we can conclude that
q*T D V. On the other hand, if q*T D V, then q*t D v for some t 2 T and some v 2
V. But then q D t*v and so belongs to W. We have shown that q*T D V iff q 2 W.
15
14 13 12 11
10
3 4 5
2 6
7 9
8
1
17
Perfect Polygons and Geometric Triple Systems 23
12 11 10
9
3 4
2 8
5
6
7
1
To vertex 14
X4
X1
X6
X3
0
X0 5 3
2
X5 7
6
X2 4
1
X7
We observe that a Type (iii) perfect polygon can be obtained from a Type (ii) perfect
polygon by adding 1 to each vertex and 2 to the subscript of each perspective point,
so it is unnecessary to consider both Types. Also, we observe that a perfect polygon
of either of these types must be realized, in accordance with Theorem 16, as the
translate of a split geometric triple system.
Theorem 18 Let T be a split (Zn ,0) triple system with Type IV cubic envelope .
and suppose that n D 2m with m even. Let q 2 . If gcd(n,3) D 1, let S be the unique
split (Z3n ,0) triple system on , then q*T is a (split) triple system on iff q 2 S. If q
62 S, then q*T is a Type (iii) split perfect polygon. If 3jn, then there is only one split
(Zn ,0) triple system T on , and q*T is a triple system iff q 2 T.
Proof Suppose first that gcd(n,3) D 1. The vertices of S can be partitioned into
three subalgebras U,V,W of (”,*) given by: U D f0,3,6, : : : , 3n-3g; V D f2,5,8,
: : : , 3n-1g, and W D f1,4,7, : : : , 3n-2g. By (R5) each of these is equivalent to a
(Zn ,0) triple system, and U,V,W constitute the full set of split (Zn ,0) triple systems
on ”. As in the proof of Theorem 17, we may identify T with U, and we then have
T*V D W; T*W D V, and V*W D T. It follows similarly that q*T D T iff q 2 T;
q*T D V iff q2 W, and q*T D W iff q 2 V. In short, q*T is a triple system on ”
iff q2 S, and if q62S then, in accordance with Theorem 16, q*T is a Type (iii) split
perfect polygon. If 3jn, then by (R5) T is unique and q*T must equal T in order to
be a triple system. But q*T D T iff q 2 T.
Perfect Polygons and Geometric Triple Systems 25
1
X6
7
0
X5 X7
X0
2
5 X3
6
4
X2
X1
In Fig. 17 we illustrate Theorem 18 using the unique split (Z24 ,0) triple system,
(for S), on a typical Type IV cubic curve. In the next section we consider the case in
which n is twice an odd number. In case T is a (Zn ,1) triple system, then by (R1) T
is equivalent to a (Zn ,0) triple system if gcd(n,3) D 1. But also by (R1) if 3jn, then
T is not equivalent to a (Zn ,0) triple system. Suppose 3jn and the cubic envelope ”
of T is Type III or Type V. Then by (R5) there are exactly two distinct (Zn ,1) triple
systems V, W on the cubic envelope ”. These occur as subalgebras of the unique
(Z3n ,0) triple system S on ”. In fact we can define U,V,W as in Theorem 16, where
U is a (Zn ,0) triple system, and we can conclude as in Theorem 16 that q*T is a
triple system iff q 2 S. In case T is split a similar result holds. Similar to (R5) there
are exactly two split (Zn ,1) triple systems V,W on a Type IV cubic ” and these occur
as subalgebras of the unique split (Z3n ,0) triple system S on ” along with the unique
split (Zn ,0) triple system U. Again we find that q*T is a triple system iff q 2 S.
7 Twins
16
14
12
10
6 8
11 9
4 13 7
15
2 5
17
0 19
21
22 23 3
1
20
To Vertex 18
Fig. 17 Three split (Z8 ,0) triple systems occur as subalgebras of the split (Z24 ,0) triple system
p 0
and two onp the oval. If a2 p and a lies
p on the oval, let a denote the0 remaining
element of p on the p oval, and if b 2 p and b lies on the bell, let b denote the
remaining element of p on the bell. In either case we refer to the points x, x0 as
twin points.
Lemma 19 Let a,b be points on any irreducible nonsingular cubic curve . Then
a*b D a0 *b0 and a*b0 D a0 *b D (a*b)0
Proof Let p D a*ap D a0 *a0 , and let q D b*b D b0 *b0 . Then 0 0
p the points a*b , a *b,
0 0
a*b, a *b all lie in (p q). If ” is a Type V cubic, then (p q) contains only two
points so two pairs among these four points must be equal. The point a*b0 cannot be
equal to a*b or a0 *b0 since cancellation would then require b D b0 or a D a0 which
is impossible since no point on ” is equal to its twin. We must then have a*b0 D
a0 *b and a*b D a0 *b0 . The same argument can be used in case a,b lie on the bell of
a Type IV cubic. Now suppose ” is Type IV and a,b lie on the oval. Then the four
points a*b0 , a0 *b, a*b, a0 *b0 all lie on the bell and we can employ the same argument.
p on the bell and b lies on the oval of ”, then the four points all lie on
Finally, if a lies
the oval. But (p q) also contains only two points on the oval with the same result.
Perfect Polygons and Geometric Triple Systems 27
4
2 5 9' 3
1'
7 7'
0 3'
9
5' 1
p
Since ((a*b)0 )* ((a*b)0 ) D (a*b)*(a*b) D p*q, the point (a*b)0 also lies in (p q).
No point of ” is equal to its own twin, so we cannot have (a*b)0 D a*b; so we must
have (a*b)0 D a*b0 D a0 *b.
Now let T be a split (Zn ,0) triple system on a Type IV cubic curve ” with n D
2m. If S is any subset of ”, we let S0 D fx0 : x 2 Sg. Let Q denote the set of even
vertices of T which must lie on the bell, and let W denote the set of odd vertices of
T which must all lie on the oval. Let W’ D fx0 : x 2 Wg and let Tˆ D Q[ W0 . It is
shown in [6] that Tˆ is a split (Zn ,0) triple system. If m is even, then x, x0 both lie in
T for each point x in the oval and thus T D Tˆ . But if m is odd, then T, Tˆ constitute
two distinct extensions of Q, (which we call twin extensions), and the extending sets
W, W0 are disjoint. In Fig. 18 we illustrate a split (Z10 ,0) triple system T along with
its twin Tˆ . Also in [6] the following theorem is proved.
Theorem 20 Let T be a split (Zn ,0) triple system with n D 2m, m odd. Then the
points in T*Tˆ form a (Z2 Zn , (0,0)) triple system.
In Fig. 19 we illustrate a (Z2 Z10 , (0,0)) triple system on a typical Type IV
cubic. The twin subalgebras T, Tˆ of Fig. 18 are emphasized. Now suppose T is a
split (Zn ,0) triple system with n D 2m, m odd as in Theorem 20, and suppose also
28 R.R. Fletcher III
To (0,3)
(0,4)
(0,6) (0,5)
(0,7)
(0,8) (1,0) (1,1) (1,2)
(1,9)
(0,9) (1,3)
(1,8)
(0,0) (1,7)
(0,1) (1,6)
(1,5) (1,4)
(0,2)
that gcd(n,3) D 1. Then T is an extension of a (Zm ,0) triple system on the bell of
a Type IV cubic ” and, in accordance (R5), there are exactly three distinct (Zm ,0)
triple systems on ”. Each of these, in turn, has two twin extensions yielding a total
of six distinct split (Zn ,0) triple systems on ”. If q 2 ” and q*T is a triple system,
then q*T must be one of these six split (Zn ,0) triple systems. In our next theorem
we determine for which point q this is the case.
Theorem 21 Let T be a split (Zn ,0) triple system on a Type IV cubic with n D 2m,
m odd and gcd(n,3) D 1. Let e,f,g denote the three flex points of and suppose vertex
0 of T coincides with e. If q2 , then q*T is a triple system iff q 2 T[(f*T)[(g*T).
Moreover, f *Tˆ D (f *T)ˆ and g * Tˆ D (g * T)ˆ .
Proof Let Q denote the set of even vertices of T which all lie on the bell of ”, and
let W denote the set of odd points of T which all lie on the oval. Let b 2 f * Tˆ , then
b 2 f * t0 for some t 2T. By Lemma 19, b D (f *t)0 and thus b 2 (f *T)ˆ . It follows
that f *Tˆ D (f *T)ˆ and similarly g * Tˆ D (g * T)ˆ . Now let S denote the unique
(Z2 Z3n, (0,0)) triple system on ”. We shall see that S contains all six of the split
(Zn ,0) triple systems as subalgebras. It will then follow that if q*T is a triple system,
Perfect Polygons and Geometric Triple Systems 29
then q must lie in S. Without loss of generality we let e D (0,0); f D (0,n), and g
D (0,2n). These are the three flex points of ” which all lie in S. Then T D Q[W
where Q D f(0,6t) : t D 1,2, : : : ,mg and W D f(1,6t) : t D 1,2, : : : , mg, and Tˆ D
Q[W0 where W0 D f(1,6tC3m) : t D 1,2, : : : ,mg. Consider: f * T D (f * Q)[(f *
W) where f * Q D f(0, 2n – 6t) : t D 1,2, : : : ,mg and f * W D f(1, 2n – 6t) : t D
1,2, : : : ,mg; f * T0 D (f * Q)[(f * W0 ) where f * W0 D f(1, m – 6t) : t D 1,2, : : : ,mg
; g * T D ( g * Q)[(g * W) where g * Q D f(0,n – 6t) : t D 1,2, : : : ,mg and g * W
D f(1, n -6t) : t D 1,2, : : : ,mg; g * T0 D (g * Q)[(g * W0 ) where g * W0 D f(1, 5m –
6t) : t D 1,2, : : : ,mg. The mutually disjoint sets Q, W, W0 , f * Q, f * W, f * W0 , g *
Q, g * W, g * W0 account for all the elements of S except for those in the set M D
f(0,t) : t 2 Z3n is oddg. The sets T, T0 , f * T, f * T0 , g * T, g * T0 are subalgebras of
(S,*) equivalent to each of the six split (Zn ,0) triple systems on ”. We have already
remarked that q*T can be a triple system iff q 2 S, i.e., q lies in one of the sets Q,
W, W0 , f * Q, f * W, f * W0 , g * Q, g * W, g * W0 , M. Note that Q *W D W and
Q*W0 D W0 . If q 2 T D Q[W, then q * T D T is of course a triple system. Suppose
q 2 W0 , then q * T D q *( Q[W) contains points in q * W. These points have the
form (1, 6tC3m)*(1, 6s) D (0, -6s – 6t -3m) which lies in M since m is odd and not
a multiple of 3. None of the six split (Zn ,0) triple systems contain any of the points
of M, so q*T cannot be a triple system. If q2 M, then q * T contains points in q *
Q which have the form (0,k)*(0,6t) D (0,-k – 6t) D (0,3n – k – 6t). But this element
lies in M since k is odd and 3n is even. Again we can deduce that q * T is not a triple
system. Now suppose q 2 f * Q, then q D f *q0 for some q0 2 Q and q * T D (f *
q0 )* (Q[W) D f(f * q0 )* Qg[f(f * q0 )*Wg where f(f * q0 )*(e*Q)g D (e*f)*(q0 *Q)
D g * Q, and (f * q0 )*W D (f * q0 )*(e*W) D (f*e)*(q0 *W) D g*W. Thus q*T D
g*T is a triple system. Similarly, if q 2 g*Q, then q*T D f*T is a triple system. Now
suppose q 2f*W, then q D f *w0 and q*T D (f *w0 )*(Q[W) D f(f *w0 )*Qg[f(f
*w0 )*Wg D f(f *w0 )*(e*Q )g[f(f *w0 )*(e*W)g D fg * Wg[fg*Qg D g*T. So q*T
is a triple system. Similarly, if q2 g*W, then q*T D f*T is a triple system. We have
shown that if q 2 T[(f*T)[(g*T), then q*T is a triple system. If q 2 f * W0 , then q
D (1, m – 6t) for some t 2 f1,2, : : : ,mg, and points in q*W have the form (1, m –
6t)*(1,6s) D (0, 5m C 6t – 6s) and so lie in M. We can conclude that q * T is not a
triple system. Finally, if q 2 g*W0 , then q D (1, 5m-6t) for some t 2 f1,2, : : : ,mg,
and points in q*W have the form (1,5m-6t)*(1,6s) D (0, m C 6t – 6s) which also lie
in M, so again, q*T is not a triple system. This completes the proof.
Theorem 22 Let T be a split (Zn , 0) triple system on a Type IV cubic curve with
n D 2m, and m an odd multiple of 3. If q 2 , then q*T is a triple system iff q 2 T.
Proof If m D 3p, then the points 0, 2p, 4p are idempotent and all occur as vertices
of T. The triple systems T, Tˆ are the only split (Zn , 0) triple systems on ”. If q*T is
a triple system, then it must be that either q*T D T or q*T D Tˆ . So we must have
either q2 T or q2 T*Tˆ . Since T is contained in T*Tˆ , we can say just q2 T*Tˆ . By
Theorem 20, T*Tˆ is equivalent to the unique (Z2 Zn , (0,0)) triple system S on ”.
Let Q, M, W, W0 denote the partition of S given by Q D f(0,t): t is eveng; M D f(0,t):
t is oddg; W D f(1,s): s is eveng and W0 D f(1,s): s is oddg. We can take T equivalent
to Q[W and Tˆ equivalent to Q[W0 . If q*T is to be a triple system, then it must be
30 R.R. Fletcher III
To X0
X5
1 2 3
3
X4 X5
0 Z 1
4
5
X4
X1 0
X2 4
X3
5
X2
X0 X3 X1
To vertex 1
(0,5)
(1,2)
(1,1) (1,3) 4 6
(0,4) 3
(1,0) Z 2
(1,4)
(1,5)
5
0
(0,1)
(0,3) (0,2) 8
10
9
(0,0) 7 11
Desargue’s Theorem (E3) the lines [(0,1),(1,4)], [(1,0),(0,3)], and [(0,5),(1,2)] are
concurrent (compare with Theorem 6). This little result we might say belongs to
the external geometry of P along with any concurrence of lines joining vertices
of P or any collinearity of points formed by such lines. In Fig. 21 the vertices
and perspective points of the two closed perfect hexagons of Fig. 20 have been
relabeled to illustrate the equivalence of these perfect polygons with (Z2 Z6 , (0,0))
and (Z12 , 1) triple systems, respectively. In the following perfect construction the
external geometry comes into play in a much more complicated way.
Theorem 23 There exists a perfect construction of a closed perfect octagon which
is equivalent to a (Z2 Z8 , (0,0)) triple system.
Proof The construction of a closed perfect octagon P is achieved as follows:
(i) Let vertices 0,1,2 be any three collinear points in the real projective plane and
put perspective point X1 on [0,1] and X2 on [0,2].
(ii) Let X3 D [X1 , X2 ]\[1, 2] and put vertex 3 on [X3 ,0].
(iii) Let vertex 7 D [X1 ,2]\[X2 ,3].
(iv) Let A D [2, 7]\[0,3]; B D [X2 ,3]\[1,A]; D D [1, 7]\[0,2].
(v) Let X5 D [B,D]\[2, 3] and let X7 D [X2 ,X5 ]\[0,7].
(vi) Let vertex 5 D [X7 ,2]\[X5 ,0] and let X6 D [X3 ,X5 ]\[1, 5].
(vii) Let vertex 6 D [X1 ,3]\[X7 ,1] and let vertex 4 D [X6 ,2]\[X1 ,5] shows that P.
(viii) Let X4 D [0,4]\[1, 3] and let X0 D [1, 7]\[2, 6].
This construction is illustrated in Fig. 22 where the dashed lines must all be
proved. We found the proof of these collinearities too difficult to accomplish by
repeated use of the theorems of Desargues or Pappus, and even too difficult to
accomplish using cubic curve theory. We could find a proof by analytic means;
first transforming vertices 0,1,2,3 to points with coordinates (0,0), (0,1), (1,1), and
(1,0) respectively, and then determining coordinates for the remaining vertices, the
perspective points, and the points A, B, D given in the construction. The resulting
32 R.R. Fletcher III
X7
X6
X4 X5
X3
5 6
4
X2
3
B
7
A
2
X1
D
1
To X0
0
demonstration is not particularly informative so we shall omit the details. The fact
that points B,D, and X5 are collinear is a problem involving the external geometry
of P. Finally, the relabeling of P given by k (1, kC3); Xk (0, -kC2) for k2 Z8
shows that P is equivalent to a (Z2 Z8 , (0,0)) triple system.
In the last result of this section we show that every closed perfect polygon P is
equivalent to a geometric triple system.
Theorem 24 Let P be a closed perfect n-gon and let T denote the set of perspective
points of P which form a (Zn , m) triple system. If m is odd, then the relabeling of P
given by Xk 2k (mod 2n) and k m – 2k (mod 2n) turns P into a (Z2n , 2m) triple
system. If m D 2g is even, then the relabeling of P given by Xk (0,k) and k (1,
g-k) turns P into a (Z2 Zn , (0,m)) triple system.
Proof Let P0 denote the figure resulting from the relabelings. Note that the
stipulation that m is odd means that the perspective points of P are relabeled by
even vertices of P0 and the vertices of P become the odd vertices of P0 . The line [s,t,
XsCt ] in P corresponds to the line [m-2s, m-2t, 2(sCt)] in P0 whose components sum
to 2m (mod 2n), and the line [Xs , Xt , Xq ] in P corresponds to the line [2s,2t,2q] in P0
whose components also sum to 2m. These are the only two types of lines in P, so we
can conclude that P0 is a (Z2n , 2m) triple system. Now suppose m is even and make
the stipulated relabelings. Then the line [s,t, XsCt ] in P corresponds to the triple
[(1,g-s), (1, g-t), (0, sCt)] in P0 , whose components sum to (0,m), and the line [Xs ,
Xt , Xq ] in P corresponds to the triple [(0,s), (0,t), (0,q)] in P0 , whose components
also sum to (0,m).
Perfect Polygons and Geometric Triple Systems 33
X4
2 3
X5
4
5 X6
X7
1 6
X8
7
8
0
9
X2
X9
X1 To X0
X3
14
13 15
12
17
19 10
8
11 1
6
3
5
9
7
18
0
16 To vertex 2
Fig. 24 Closed perfect decagon with perspective sum 3 relabeled to create a (Z20 ,0) triple system
Let ” be a nonsingular irreducible cubic curve and (”,*) the associated BHA. If
e is one of the three idempotent elements of (”,*), i.e., one of the flex points of
”, we define a binary operation (C) on ” by aCb D e*(a*b). It is well known
that the resulting algebra (”,C) is an abelian group with e as identity and a*e the
inverse of a. The associative law for groups is easily demonstrated: if a,b,c 2 ”,
then aC(bCc) D e*fa*(e*(b*c))g, and (aCb)Cc D e*f(e*(a*b))*cg, so it suffices to
show that a*(e*(b*c)) D (e*(a*b))*c. Consider: a*(e*(b*c)) D fb*(b*a)g*fe*(b*c)g
D fb*(b*c)g*fe*(a*b)g D (e*(a*b))*c. If instead we are given an abelian group
(G,C), we obtain a BHA on the elements of G by setting a*b D -a – b. These two
operations are inverses in the sense that if (G,*) is a BHA with associated group
(G,C), then the operation a*b D -a –b recovers (G,*) from (G,C). In what follows
we shall use the fact that (”,C) is isomorphic to the group U of complex numbers
with modulus 1 in case ” is Type V, and is isomorphic to Z2 U in case ” is Type
IV (see [7]). Also the following result regarding the extension of an idempotent free
subalgebra of (”,*) to one containing an idempotent will prove useful.
Theorem 28 Let be an irreducible nonsingular cubic curve, let e be a flex point
of , and let T be an idempotent free subalgebra of ( ,*). Then T, e*T, and T*(e*T)
are mutually disjoint subalgebras of ( ,*), and S D T [ (e*T) [ (T*(e*T)) is a
subalgebra of ( ,*) which contains the idempotent element e. Moreover, T and e*T
are isomorphic idempotent free translates of T*(e*T).
Proof If q 2 T \(e*T), then q D t D e*t0 for some t,t0 2T. But then e D t*t0 2 T
contradicting the stipulated idempotent free character of T. If q 2 T \(T*(e*T)),
then q D t D t0 * (e*t1 ) for some t,t0 ,t1 2 T. But then e D t1 * (t0 * t) with the same
contradiction. Finally suppose q 2 (e*T) \(T*(e*T)), then q D e*t D t0 * (e*t1 ) for
some t,t0 ,t1 2 T. Consider: e*t D t0 * (e*t1 ) implies (e*t1 )*(e*t) D t0 , (e*e)*(t1 *t)
D t0 , e D t0 *(t1 *t) 2 T, again contradicting the idempotent free character of T.
That e*T and T*(e*T) are subalgebras follows immediately from the fact that the
product of any two subalgebra of (”,*) is again a subalgebra of (”,*). Let Q D
T*(e*T) and let t be any element of T. We show next that Q D t *(e*T). It is clear
that t*(e*T)Q; to show the reverse containment, let t0 * (e*t1 ) denote a typical
element of Q. Consider: t * f t0 * (e*t1 )g D ft1 *(t * t1 )g * f t0 * (e*t1 )g D ft1 * (e*t1 )g
* f t0 *(t1 *t)g D e * f t0 *(t1 *t)g 2 e * T, and thus t0 * (e*t1 )g 2 t * (e*T). From the
just established equation it follows immediately that t*Q D e*T and thus e*T is a
translate of Q. To show that T is a translate of Q, again let t be any element of T. We
will show that (e*t)*Q D T. If t0 2 T, then t0 D (e*t)*ft0 * (e* t)g lies in (e*t)*Q. For
the reverse containment, suppose (e*t)* ft0 * (e* t1 )g is a typical element of (e*t)*Q.
Then we see immediately that (e*t)* ft0 * (e* t1 )g D (t0 * t) * fe * (e* t1 )g D (t0 *
t) * t1 is an element of T. The mapping ¥: T ! e*T given by ¥(t) D e*t is easily
seen to be an isomorphism. Suppose e*T contains an idempotent element e*t, then
(e*t)*(e*t) D e*t, (e*e)*(t*t) D e*t, and t*t D t by cancellation. But then t is an
Perfect Polygons and Geometric Triple Systems 35
idempotent element of T which we have not allowed. Note that any translate a*W
of a subalgebra W of (”,*) certainly has the same cardinality as W, but is usually
not isomorphic to W, for example, T cannot be isomorphic to Q since Q contains
the idempotent element e, and T is idempotent free.
It remains only to show that S D T [ (e*T) [ (T*(e*T)) is a subalgebra of
(”,*). Since each of the three mutually disjoint components of S are themselves
subalgebras, it suffices to verify the equations T*fT*(e*T)g D e*T and (e*T)*
fT*(e*T)g D T. We will leave this straightforward verification to the reader.
A more general result than Theorem 28 is given in [4] where it is shown that
an arbitrary idempotent free algebra in the variety of binary hypercommutative
algebras can be embedded in a member of the same variety which does contain
an idempotent.
Let T be a subalgebra of (”,*) with finite order n, which contains an idempotent
element e of (”,*). We will argue that T is a triple system. The corresponding abelian
group (T,C) is a finite subgroup of (”,C). If ” is Type V, then it is known that (”,C)
is isomorphic to the group U of complex numbers with modulus 1, and since every
finite subgroup of U is cyclic, we can conclude that (T,C) is a cyclic group hence
isomorphic to Zn . Now using the above given formula for converting (Zn ,C) back
into a BHA, we obtain a*b D -a – b which clearly realizes T as a (Zn ,0) triple
system. In case ” is Type IV we have that (”,C) is isomorphic to Z2 U and thus
(T,C) is isomorphic to either Zn or Z2 Zn/2 with the consequence that T is either
a (Zn ,0) triple system or a (Z2 Zn ,(0,0)) triple system. Next suppose T is a finite
idempotent free subalgebra of (”,*) with order n. By Theorem 28, T occurs as a
subalgebra of S D T [ (e*T) [ (T*(e*T)) which contains the idempotent element
e of (”,*). If Q D T*(e*T) , then Q is a subalgebra of S which contains e, and
consequently both (S,C) and (Q,C) are abelian groups. If t is any element of T, then
we have seen that T D (e*t)*Q. The corresponding group expression is T D (-e – t) *
Q D eCt – Q D eCt CQ, so we see that T is a coset of Q. If ” is Type V, then (S,C)
is cyclic with order 3n, and thus isomorphic to Z3n . We can then represent Q by Q D
f0,3,6, : : : , 3n-3g and the cosets of Q by f1,4,7, : : : , 3n-2g and f2,5,8, : : : , 3n-1g.
T must be one of these cosets each of which correspond to a (Zn ,1) triple system.
If ” is Type IV, then (S,C) is isomorphic to either Z3n or Z2 Z3m where n must be
even and m D n/2. In the first cast T is again a (Zn ,1) triple system, and in the second
case (Q,C) is a subgroup of Z2 Z3m with order 2m D n. We must have Q D Z2
f0,3,6, : : : , 3m-3g and (T,C) must be one of the cosets of Q, namely (0,1)CQ or
(0,2)CQ. If T D (0,1)CQ, then the mapping ¥:T !Z2 Zm given by ¥(0,3k-2) D
k and ¥(1, 3k-2) D (1,k) turns (T,*) into a (Z2 Zm , (0,2)) triple system, and if T D
(0,2)CQ, the mapping §: T !Z2 Zm defined by §(0,3k-1) D (0,k) and §(1,3k-1)
D (1,k) turns (T,*) into a (Z2 Zm , (0,1)) triple system. If T is (Z2 Zm , (0,2)), then
by relabeling each vertex of T with its inverse we obtain a (Z2 Zm , (0,-2)) triple
system. If to this triple system we add (0,1) to each vertex, we obtain a (Z2 Zm ,
(0,1)) triple system equivalent to T. We have proved:
36 R.R. Fletcher III
10 Conclusion
The notion of perfect polygon Qcan be generalized by allowing the base to be any
abelian group G. Let ¥ :G ! be an injective mapping from G into the projective
plane such that no three points in ¥(G) are collinear. For each g 2 G let Wg denote
the set of lines f[a,b] : aCb D gg. If for each g 2 G the lines in Wg are concurrent,
then we call the set of points ¥(G) a perfect G-gon. Let Xg denote the point of
concurrence of the lines in Wg . The set of points fXg : g 2 Gg is the perspective
set of the perfect G-gon. We have seen that (Z2 Zn , (0,0)) triple systems exist with
cubic envelope ”. A translate of such a system can produce a perfect Z2 Zn - gon
on ”. If Z denotes the group of integers, then there exists a perfect construction of a
perfect Z-gon which we illustrate in Fig. 25. The relabeling of this diagram by Xk
(0,k) and k (1,-k) yields a (Z2 Z, (0,0)) triple system.
The vertices and perspective points of a perfect Z-gon must lie on a cubic curve,
and it seems likely that every perfect G-gon lies on a cubic curve, thus yielding a
generalization of Theorem 4.
It is an interesting open question as to which perfect polygons and geometric
triple systems have perfect constructions. Note that our definition of perfect
construction must be slightly extended to claim that our perfect Z-gon has a perfect
construction: the construction is perfect if we can perfectly construct, in principle,
any finite number of the vertices and perspective points.
Another further direction for research involves the above-mentioned external
geometry associated with a perfect polygon. It sometimes happens that lines joining
the vertices of a perfect polygon P (or tangents to the cubic envelope at a vertex)
concur at points different from perspective points. We call these diagonal points
and classify theorems involving the existence of these points, or collinearities among
them, as belonging to the external geometry of P. A basic result in this direction is
the following.
Theorem 30 Let P be a perfect closed n-gon with Type IV cubic envelope and
perspective sum m. Suppose n is even and there exists a 2 Zn such that 3a D m (mod
n). If a is even, i.e., a D 2b, then all points of the form [Xs , Xt ]\[ Xm-a-s , Xm-a-t ] or
[s,t]\[a-s, a-t] lie on the line [b, bC(n/2)].
Proof If ” is Type IV, then there exists a transformation which takes ” to a curve
of the form y2 D x(x-1)(x-w) with w>1. The envelope ” is transformed to a curve
” 0 which is symmetric with respect to the x-axis, and P is transformed to a perfect
polygon P0 with ” 0 as its cubic envelope. Since 3a D m, the perspective point Xa
Perfect Polygons and Geometric Triple Systems 37
X4
X-4
-6
2
X3 1
X-5 0
-5
X2 -1 3
X-6 6
-2
5 -4
X1 -3 4
X-7 X0
X7 X-1
X6
X-2
of P is an idempotent element of the BHA (”,*) , and thus its image Xa 0 under the
transformation is an idempotent element of (” 0 ,*). If 3jn, then P contains all three
flex points of ” and hence P0 contains all three flex points of ” 0 . These will have
labels Xa 0 , XaC(n/3) 0 , XaC(2n/3) 0 one of which is the point at infinity on vertical lines,
and the other two are reflections of each other across the x-axis. Without loss of
generality, we can suppose that Xa 0 is the point at infinity on vertical lines. Besides
Xa 0 itself, the only three points of ” 0 which square to Xa 0 are b0 , (bC(n/2))0 and
X(aC(n/2))0 all of which lie on the x-axis, so the line [b0 , (bC(n/2))0 ] is the x-axis. If s0 ,
t0 are any two vertices of P0 , then vertices (a-s)0 , (a-t)0 are their reflections across the
x-axis, and it follows immediately that the point [s0 ,t0 ]\[(a-s)0 , (a-t)0 ] must lie on [b0 ,
(bC(n/2))0 ]. Since our original transformation is a collineation, it follows that the
corresponding diagonals of P, namely [s,t]. [a-s, a-t] and [b, bC(n/2)] are concurrent.
Similarly the points Xa 0 , Xs 0 and Xm-a-s 0 are collinear since their subscripts sum to
m, and they lie on a vertical line since Xa 0 is the point on ” 0 at infinity on vertical
lines. Since ” 0 is symmetric with respect to the x-axis, the pairs of points Xs 0 , Xm-a-s 0 ,
and Xt 0 , Xm-a-t 0 are reflections of each other across the x-axis. As a consequence we
also have that the lines [Xs , Xt ],[Xm-a-s , Xm-a-t ] and [b, bC(n/2)] are concurrent as
stipulated.
38 R.R. Fletcher III
Let e,f,g denote the three flex points of ” 0 . In [8] it is shown that there exist
three collineations of the projective plane, ˆe , ˆf , ˆf whose restrictions to ” agree,
respectively, with the mappings ¥e , ¥f , ¥g defined by ¥e (x) D e*x, ¥f (x) D f*x,
¥g (x) D g*x. These last three mappings are easily seen to be automorphisms of
(” 0 ,*) and automorphisms of (P0 ,*) by a further restriction. Say the idempotent
e is the point at infinity on ” 0 , and thus has label Xa 0 , and suppose f has label
XaC(n/3) 0 and g has label XaC(2n/3) 0 . Then the collineation ˆg maps XaC(n/3) 0 to Xa 0 .
Now ˆg (P0 ) is a perfect polygon equivalent to P0 , but with XaC(n/3) 0 as the point
at infinity on vertical lines. Since ˆg is a collineation, the images under ˆg of
the concurrent diagonals [s0 ,t0 ], [(a-s)0 , (a-t)0 ], and [b0 , (bC(n/2))0 ] of P0 are again
concurrent lines in ˆg (P0 ) D P0 . Similarly the images of these diagonals under the
collineation ˆf produce corresponding concurrent diagonals in P0 . We call the lines
[b0 , (bC(n/2))0 ], ˆg ([b0 , (bC(n/2))0 ]), and ˆf ([b0 , (bC(n/2))0 ]) the meridians of P0 ,
and the corresponding lines of P, the meridians of P. In [8] it is shown that these
meridians are actually intrinsic to any nonsingular irreducible curve ”. For our Type
IV p cubic ”, the meridians can be defined as follows. Let e1 , e2 denote p the two points
in e which lie on the bell; p f 1 , f 2 the two points on the bell in f, and g1 , g2 the
two points on the bell in g. Then the lines [e1 , e2 ], [f1 , f2 ], and [g1 , g2 ] are the
meridians of ”. Also, in [8] it is shown that the three meridians concur at a point Z
called the center of ”. In Fig. 26 we illustrate a closed perfect 12-gon with diagonal
points on three concurrent meridians.
In case n is not a multiple of 3, then 3a D m (mod n) has at most one solution
and thus P contains at most one flex point of ”. In Fig. 27 we have a perfect closed
octagon P with perspective sum m D 6. The perspective point X2 is the only flex
To X11 To X11
X10
X9
X8
4
3
X7 2
5
1
X6
0 Z
X5 11
X4 10 6
X3 9
8
X2 7
X1 To X0
X6
To X7
X5
X4
X3 5 6
4
X2
3
7
X1 2
L 0
X0
point on P and the line [1, 5] is the only meridian of ” which contains the full
complement of diagonal points stipulated by the theorem.
There are several interesting analogs of geometric triple systems which involve
circles, conics, and planes. If G Q
is an abelian group, then a G-circle system can be
defined as follows. Let ¥:G ! be an injective map from G into the projective
plane such that no 5 points in ¥(G) are collinear, and let g be a fixed element of
G. If for every four element subset fa,b,c,dg of G such that aCbCcCd D g, the
corresponding points f¥(a), ˆ(b), ¥(c), ˆ(d)g are cocyclic or possibly collinear, we
call the points in ¥(G) and the associated circles or four point lines a (G,g) circle
system. These circle systems have already been studied in [9, 10]. In [10] the (Z,0)
circle system is used to gain general structural information for an irreducible self-
inversive cubic curve.
Suppose §: G!ƒ is an injective map from the abelian group G into
3-dimensional projective space such that no four points in §(G) are coplanar,
and let g be a fixed element of G. If for every four element subset fa,b,c,dg of G
such that aCbCcCd D g, the corresponding points f§(a), §(b), §(c), §(d)g are
coplanar or possibly collinear, we call the points in §(G) and the associated planes
a (G,g) plane system. Does a (Z,0) plane system exist? If so does there exist a space
curve which contains its points?
40 R.R. Fletcher III
00
03
11
13
02
10
05 12
01
14 15 04
Q
Finally, let Let ¥:G ! be an injective map from G into the projective plane
such that no four points in ¥(G) are collinear, and let g be a fixed element of G. If
for every six element subset fa,b,c,d,e,fg of G such that aCbCcCdCeCf D g, the
corresponding points f¥(a), ˆ(b), ¥(c), ˆ(d), ¥(e), ˆ(f)g lie together on the same
conic, or form a pair of collinear triples, then we call the points in ¥(G) a (G,g)
conic system. One interesting result which relates to geometric triple systems is the
following.
Theorem 31 Every geometric triple system is a conic system.
In Fig. 28 we depict a (Z2 Z6 , (0,1)) triple system which is equivalent to a
(Z2 Z6 , (0,2)) conic system. All 6-tuples which sum to (0,2) lie either on a conic or
form two sets of collinear triples. We reserve the proof of Theorem 31 for a future
work.
References
1. Coxeter, H.S.M., Greitzer, S.L.: Geometry Revisited. MAA, Washington, D.C. (1967)
2. Eves, H.: Fundamentals of Modern Geometry. Jones and Bartlett, Boston (1992)
3. Bix, R.: Conics and Cubics, a Concrete Introduction to Algebraic Curves, 2nd edn. Springer
Sci. and Business Media, LLC, New York (2006)
4. Harris, M.: Thirdpoint Groupoids. Master’s Thesis, Virginia State University (2008)
5. Fletcher, R.: Geometric Triple Systems with Base Z and Zn , submitted for publication in
Springer Proceedings in Mathematics and Statistics (2015)
6. Fletcher, R.: Geometric Triple Systems with Base Z2 Zn , unpublished
7. Walker, W.: Algebraic Curves. Springer Verlag, New York (1949)
Perfect Polygons and Geometric Triple Systems 41
8. Fletcher, R.: Perfect Hexagons, Elementary Triangles and the Center of a Cubic Curve. In:
Springer Proceeding in Mathematics and Statistics, vol. 24. Bridging Mathematics, Statistics,
Engineering and Technology, Springer Science C Business Media, New York (2012)
9. Robinson, D.: Group Circle Systems. Master’s Thesis, Virginia State University (2015)
10. Fletcher, R.: Self-inversive Cubic Curves, Accepted for publication in Springer Proceedings in
Mathematics and Statistics (2016)
Geometric Triple Systems with Base Z and Zn
Abstract In this paper we discuss triple systems whose elements come from an
abelian group G. Every triple of elements with the same sum in G will correspond
to three collinear points in the projective plane. We will show that the set of all points
in such a triple system must lie on a cubic curve ” which we call the envelope of
the system. We will determine the number and location of equivalent triple systems
which have the same cubic envelope. These results will be used to determine exactly
which finite abelian groups can be used to construct a geometric triple system.
1 Introduction
5 B
1
7
2
A
0 3 6
7 2 1
0 6
4
a relabeling of the points of G. Two equivalent triple systems must have the same
order and the same size, so we see that the triple systems in Figs. 1 and 2 are not
equivalent. We will show in the next section, that up to equivalence, the illustrated
triple systems are the only ones with base Z9 . It is convenient to represent the points
of a triple system by the labels assigned to them from the base group. If a, b are two
elements from the base group then [a,b] denotes either the line through a, b or the
segment with endpoints a,b. We use the notation [a,b,c] for a triple. The (Z9 , 0) triple
system was constructed starting with the triangle (0,4,6), then putting 5, 8, 3 on the
appropriate sides. Then vertex 1 is put at the intersection of segments [3,5] and [0,8]
and vertex 7 is put at the intersection of [5,6] and [3,8]. Finally vertex 2 is put at
the intersection of [3,4] and [0,7]. When this is done the remaining triple [1,2,6],
indicated by the dashed line, is automatically obtained. The dashed line is proved
Geometric Triple Systems with Base Z and Zn 45
as follows. Let A D Œ1; 5 \ Œ2; 7; B D Œ1; 8 \ Œ2; 4 and C D Œ0; 5 \ Œ3; 7. The
triangles (0,A,3), (8,C,4) are in perspective from line [5,7,6] and so, by Desargues
Theorem, are in perspective from a point. Since Œ0; 8 \ Œ3; 4 D B, it must be that
B is the point, and it then follows that points A,B,C are collinear. Then triangles
(3,2,7), (0,1,5) are in perspective from line [A,B,C] and so, by Desargues Theorem
again, these triangles are in perspective from a point. Since Œ5; 7 \ Œ0; 3 D 6, we
can conclude that points 1, 2, 6 are collinear. We thus have what we call a perfect
construction of a (Z9 ,0) triple system, i.e., a construction that can be accomplished,
in principle, by straightedge and compass alone. The independent points 0,4,6 can
be put anywhere in the plane, so long as they are not collinear, then vertices 3,5,8 can
be put anywhere on the sides of triangle (0,4,6), and the positions of the remaining
vertices are forced. Interestingly no such perfect construction is available for the
(Z9 ,1) system in Fig. 2. The triangle (0,3,6) is chosen freely and the points 7,1,4 can
be placed anywhere on the sides, but vertex 2 must be slid along segment [1,7] until
the line [6,5,8] is achieved. It can easily be proved that this is possible, but it is not
a perfect construction.
Perfect constructions also exist for (Z10 ,0) and (Z12 ,0) triple systems which we
illustrate in Figs. 3 and 4. In each case only the dashed lines need to be proved.
The reader may try to prove these using the Theorem of Desargues repeatedly. The
remaining single line in the (Z10 ,0) construction is not difficult to prove, but the
four dashed lines in the (Z12 ,0) triple system are quite difficult to prove in this
manner, and the difficulty increases in unmanageable proportions as the order of
the triple system increases. It is clear then, that the general existence of geometric
triple systems cannot be proved in this ad hoc manner, even if we insist that the
base group be Zn . A clue to a general procedure is afforded by the (not perfect)
construction of a (Z18 ,0) triple system illustrated in Fig. 5. (Vertex 14 is constructed
as the intersection of the red segment with line [5,17]. The red segment is a lever
which allows us to move vertex 14 by very small increments until it obtains the
position required.) It begins to be clear that the vertices all lie on a curve which has
6 5 9
1 8
2
0 7
3
46 R.R. Fletcher III
8 5 11
7 6
10
1
2
0 3 9
7 17
12
8
11 10 9 16
15
1 2 3 14
0 13
5
the general shape of a certain species of cubic. In our construction in Fig. 5 we even
observe that the vertices occur along the supposed cubic curve in consecutive order
as the curve is traversed in one direction: starting at vertex 0 we travel consecutively
to vertex 5 then follow the cubic to infinity and then back from infinity to vertex 6,
Geometric Triple Systems with Base Z and Zn 47
then we follow to vertex 12 and go off to infinity again and coming back to vertex
13. Then we continue along the conjectured cubic to vertex 17 and off to infinity
once again and back from infinity to the starting point at vertex 0. We will show that
all geometric triple systems with base Z or Zn lie on irreducible cubic curves.
2 Equivalence
The simplest of all groups is the cyclic group and every cyclic group of order n is
isomorphic to Zn , so it is natural to begin our investigation by considering geometric
triple systems with base Zn . Our first Theorem allows us to focus our research on Zn
triple systems with sum 0 or 1.
Theorem 1 If gcd(n,3) D 1, then every Zn triple system is equivalent to a (Zn ,0)
geometric triple system. If 3jn then a Zn triple system is equivalent to a (Zn ,0) or
(Zn ,1) triple system. Moreover, if 3jn then the (Zn ,0) system is not equivalent to the
(Zn ,1) triple system.
Proof The bijection ¥ W Zn ! Zn defined by ¥ .x/ D x C k is an equivalence
between a (Zn ,m) and a (Zn ; m C 3k) triple system, and the bijection § W Zn !
Zn defined by § .x/ D x is an equivalence between a (Zn ,m) and a .Zn ; m/
triple system. Thus a (Zn ,3k) triple system is equivalent to a (Zn ,0) system, and a
.Zn ; 3k C 1/ triple system is equivalent to a (Zn ,1) system. Finally, a (Zn ; 3k 1)
is equivalent to a (Zn ; 1) system, which is equivalent, in turn, to a (Zn ,1) system
by means of the equivalence §. Suppose 3jn and Ÿ W Zn ! Zn is an equivalence
between a (Zn ,0) triple system T and a (Zn ,1) triple system S, then 0 C 0 C 0 D 0 in
T would imply Ÿ.0/ C Ÿ.0/ C Ÿ.0/ D 1 in S which is not possible.
If 3jn we can also prove nonequivalence of a (Zn ,0) triple system T, and a (Zn ,1)
triple system S by determining the sizes of these triple systems. Let p denote the
size of T and let q denote the size of S. There are n/3 multiples of 3 in Zn and
so pn/3 is the count of three element subsets of Zn which sum to a multiple of 3.
There are 2n/3 nonmultiples of 3 in Zn , so 2qn/3 counts the number of three element
subsets of Zn which sum to a nonmultiple of 3. The total number of 3 element
subsets of Zn is given by .n .n 1/ .n 2// =6, so we have .pn=3/ C .2qn=3/ D
.n .n 1/ .n 2// =6 which simplifies to pC2q D .n 1/ .n 2/ =2. Now if p D q
this would imply that 3 j .n 1/ .n 2/ which is impossible since n is a multiple
of 3. We conclude that p ¤ q, and thus that S is not equivalent to T.
In the next section we prove the existence of geometric triple systems with base
the full set of integers Z. These are equivalent to a (Z,0) or a (Z,1) triple system. We
omit the proof which is similar to the proof used in Theorem 1.
Theorem 2 Let Z denote the group of integers under addition. Then every triple
system on Z is equivalent to a (Z,0) or a (Z,1) triple system and these two triple
systems are nonequivalent.
48 R.R. Fletcher III
If G is a finite abelian group, x 2 G, and T is a (G,g) triple system, let •(x) denote
the number of triples of T which contain x. Then:
P
size .T/ D .1=3/ x2G ı.x/ (1)
Now for x 2 G, let ¡ .x/ denote the number of two element subsets of G which
sum to x, and let Ÿ .x/ denote the cardinality of the set fg 2 G W g C g D xg. Then:
The explanation of (2) is as follows. In the Cayley table for G, the element x
occurs exactly once in each row and column. The expression Ÿ .x/ counts the number
of times that x occurs on the main diagonal of the table. So x occupies j G j Ÿ .x/
nondiagonal locations. Each pair of unequal elements a,b which sum to x yield two
x entries, one in row a and column b, and one in row b and column a. Thus there
are .1=2/ .jGj Ÿ .x// two element subsets of G which sum to x. Let © .x/ D 0 if
3x D g and © .x/ D 1 otherwise, then:
and finally:
P 1 P
Size .T/ D .1=6/ jGj2 .1=6/ x2G .x/ 3 x2G ".x/: (4)
We saw in Figs. 1 and 2 that a (Z9 ,0) triple system and a (Z9 ,1) triple system have
different size. In our next result we determine precisely the size of triple systems
with base Zn .
Theorem 3 The size of a (Zn , 0) triple system is .n 1/ .n 2/ =6 if gcd .n; 3/ D 1.
If 3jn then the size of a (Zn , 0)triple system is n2 3n C 6 =6 and the size of a
(Zn , 1) triple system is n2 3n =6.
Proof Suppose gcd .n; 3/ D 1 and let p denote the size of a (Zn , 0) triple system.
By Theorem 1, every triple system in S D f.Zn ; k/ W k 2 Zn g has size p, and so there
Geometric Triple Systems with Base Z and Zn 49
are np distinct three element subsets which constitute the triples belonging to the
systems in S. Since every three element subset
of Zn is represented among the triples
in the systems in S, it must be that np D n3 . This yields p D .n 1/ .n 2/ =6.
P system. The equation 3x D 0 has
Now suppose 3jn and let T be a (Zn , 0) triple
exactly three solutions: f0; n=3;
P 2n=3g, so x2G ".x/ D n 3. If n is odd, then
Ÿ .x/ D 1 for all x 2 G, so x2G .x/ Dj G jD n. Then (4) yields: size .T/ D
.1=6/ n2 .1=6/ n .1=3/ .n 3/ D n2 P 3n C 6 =6. If n is even then Ÿ .x/ D 0
if x is odd, and Ÿ .x/ D 2 if x is even, so x2G .x/ D 2 .n=2/ D n, so we obtain
the same value for size(T). If q denotes the size of a (Zn ,1) triple system, then we
have:
p C 2q D .n 1/ .n 2/ =2 (5)
2
from the discussion following Theorem
2 Substituting p D n 3n C 6 =6 into
1.
(5) and solving for q yields q D n 3n =6 as stipulated.
In this section we provide perfect constructions of triple systems with base Z and
show that the vertices of such systems must all lie on a cubic curve. We find that
certain properties of irreducible cubic curves greatly facilitate the proof of existence
for these triple systems. If ” is an irreducible cubic curve, then a binary operation *
can be defined on the nonsingular points of ” by setting a*b equal to the third point
on the line [a,b] and on ”. Here we use the fact that every line which meets ” in two
points, also meets ” in a third point, counting multiplicities. The product a*a refers
to the point besides a on ” and on the tangent to ” at a. If a a D a, then a is called a
flex point of ”. The tangent to ” at a flex point a, intersects ” with multiplicity 3 at
a. If ” is nonsingular then it is known that ” has exactly three collinear flex points
in the projective plane [1]. The following identities are satisfied by *:
(i) a*b D b*a
(ii) a*(a*b) D b
(iii) (a*b)*(c*d) D (a*c)*(b*d)
Identities (i), (ii) are clear from our definition of *. Identity (iii), which we
call the hypercommutative identity is a remarkable property of irreducible cubic
curves which we illustrate in Fig. 6. An algebra which satisfies identities (i), (ii),
(iii) we call a hypercommutative groupoid; thus the nonsingular points on any
irreducible cubic curve ” form a hypercommutative groupoid which we denote by
(”,*). If a*b D a*c then b D a*(a*b) D a*(a*c) D c, so cancellation holds in
any hypercommutative groupoid. If T is a (G,t) triple system then a t-square for
T is 3 3 matrix of elements from G arranged so that each row and each column
represents a triple belonging to T.
50 R.R. Fletcher III
c*d
b
c
a*b
a
x
a*c b*d
Lemma 4 Let T be a (G,t) triple system. If eight of the entries of a t-square for T
lie on an irreducible cubic curve , then so does the ninth.
2 3
abc
Proof Let 4 d e f 5 be a t-square for T. Since the rows and columns of a t-square
ghk
can be permuted independently without affecting the row or column sums, we can
assume that vertex a is the only element of G not known to lie on ”. Then the second
two rows and columns represent collinear triples each point of which lies on ”. Thus
the product of any two members of these triples is the third member of the triple.
Then we have:
b c D e h f k D e f h k D d g
Consequently b*c D d*g is a point q on ” which must lie on both lines [b,c],
[d,g]. But then q D Œb; c \ Œd; g D a lies on ”.
Theorem 5 There exists a perfect construction of a (Z,0) triple system. The vertices
of such a system must lie on an irreducible cubic curve.
Proof The starting configuration S for our construction involves the nine points
f0; ˙1; ˙2; ˙3; 4; 5g and is illustrated by the bold lines in Fig. 7. Any nine points
in the projective plane lie on some cubic curve, so let ” denote a cubic which
contains these nine points. No three lines cover all the points in S so ” cannot
consist of three lines. The removal of any line from S, except for Œ3; 0; 3 leaves a
configuration which still contains three collinear points. This configuration cannot
be covered by any conic since no line can meet a conic in more than two points.
There is a unique conic which contains the five points f˙1; ˙2; 5g. If we select
Geometric Triple Systems with Base Z and Zn 51
2 9
-5
-6
10 1
3 8
-4
-7
7 0
-8 -3 4
-10
-1
6
5
-2
-9
vertex 4 on line Œ1; 3 so that it does not lie on this conic, then also in case we
cover f3; 0; 3g with a line, the remaining six points of S cannot be covered by
a conic. So we can suppose that ” is irreducible, and since every point in S lies
on a line with two other points of S, we can also suppose that each of the nine
points in S is a nonsingular point of ”. (A line through a singular point of a cubic
cannot meet the cubic in two additional points.) Define 4 D Œ1; 3 [ 0; 4 and
5 D Œ0; 5 [ Œ2; 3. The 0-squares:
2 3 2 3
4 1 3 5 2 3
4 4 3 1 5 ; 4 5 3 2 5
0 2 2 0 1 1
Note that j kC1 j, j p1 j, j pk j and j kp j are all less than k so this equation
is hypothesis. So we have k D p q. For negative values of k we can proceed as
follows. Consider: 0 0 D .1 1/ .2 2/ D .1 2/ .1 2/ D .3 3/ D 0.
We will use this result to show that k D 0 k for every positive integer k. Assume
inductively that this holds for all positive integers less than k. Consider: k D
.1 .k 1// D .0 1/ .0 k C 1/ D .0 0/ .1 .k C 1/ D 0 k. Again
suppose 0 < p < q < k and p C q D k. Now we want to show that k D p q.
Consider: k D 0 k D .0 0/ .p q/ D .0 p/ .0 q/ D p q. We can
now conclude that a b D a b for all a, b 2 Z with a; b; a b distinct, and thus
our construction results in a (Z,0) triple system.
Theorem 6 There exists a perfect construction of a (Z,1) triple system. The vertices
of such a system must lie on an irreducible cubic curve.
Proof The starting configuration S for our construction involves the nine points
f0; ˙1; ˙2; ˙3; ˙4g and is illustrated by the bold lines in Fig. 8. Let ” denote a
-4
7
9
-10
1 2
-2
-5 -9
6 8
4
0
-3
-7
-6
10 5
-1
Along with: 0 0 D .2 1/ .3 2/ D .2 3/ .1 2/ D 4 4 D 1 imply
that the points 5 and 5 lie on ”. For k 6 we define the points recursively by:
k D Œ1; k C 2 [ Œ2; k C 3 and k D Œ1; k [ Œ2; k 1. Assume inductively
that the points f0; ˙1; ˙2; : : : ; ˙ .k 1/g as defined have been shown to lie on ”.
Suppose k 6, then the 1-squares:
2 3 2 3
k 1 k C 2 k 1 k
6 7 6 7
4 2 2 1 5 4 2 0 1 5
kC3 0 k2 k 1 0 k C 2
-3
2
7
-4
1 0 5
6 -6
-5 -1
4
-7
-2
2
-5
6 13 -12
-1 20 -19
-8
-15
-22
18
17 -14 -21 11
4
0 -7
10 3 -3
-10
-4 7
-11 14 -17
22
12 19
5 -20 15
-13
-2 -6 1 8
-9
Fig. 10 Z4C7k ; 0 triple system generator
in Theorem 5. Of these we will hold the points f0, ˙1, ˙2, ˙3g as fixed and allow
vertex 4 to move along line Œ1; 3. In accordance with Theorem 5, any position of
vertex 4 on this line which does not result in the same point being assigned more than
one integer label, will yield a (Z,0) triple system T. An example of a possible starting
configuration is given in Fig. 10. In the construction of T we note that as vertex 4
is shifted towards vertex 3, all points which are congruent to k mod 7 converge
towards vertex k, i.e., to one of the eight points in Q. When vertex 4 is made to
coincide with vertex 3, we obtain a (Z7 ,0) triple system. If k 2 Q we call the set
of points of T which are congruent to k mod 7, a k – sequence. Each k-sequence
has an increment ˜ D 7 as the cubic envelope ” of T is traversed in one direction
which we shall call the positive direction. By shifting vertex 4 along line Œ1; 3
away from 3 and towards vertex 1 we may cause points in the adjacent 0- sequence
and 3 – sequence to coincide, i.e., any of the points f7; 14; 21; 28; : : : g can
be made to coincide with any of the points in f: : : ; 25; 18; 11; 4g resulting in triple
systems of the form f.Z4C7k ; 0/ W k D 1; 2; 3; : : : g. In Fig. 11 a (Z39 ,0) triple system
is illustrated which was created by shifting vertex 4 along line Œ1; 3 until the
points 18 and 21 coincide. By further varying the position of vertex 4 on line
Œ1; 3 or by varying the starting configuration many more such triple systems
with base Zn can be obtained. It may be that all triple systems with base Zn , .n 7/,
can be constructed in this fashion, but this we leave as an open question.
Geometric Triple Systems with Base Z and Zn 57
34
38 6 13 27
20
31
24
17
18 11
25 4
32
10 0 36
3 29
35 7
28 14
22
15
5 12 19
26
37 33 8
1
30
According to Bix [1] there are three types of singular irreducible cubic curves: those
which can be transformed into:
(I) y2 D x3 ,
(II) y2 D x2 (x C 1), or
(III) y2 D x2 .x 1/.
These are illustrated in Figs. 12, 13 and 14 Each has one singular point at the
origin and one flex point at infinity on vertical lines. Again, in accordance with
Bix, there are two types of nonsingular irreducible cubic curves; those which can be
transformed into:
(IV) y2 D x .x
1/ .x w/;
w > 1, or
(V) y2 D x x2 C kx C 1 ; 2 < k < 2.
These are illustrated in Figs. 15 and 16. Each of these has three collinear flex
points, one of which is the point at infinity on vertical lines. Type V cubics consist
of one connected component when regarded in the projective plane, and Type IV
cubics have two connected components which we call the bell and the oval. If ” is a
58 R.R. Fletcher III
”; note that the singularity at the self-crossing point is an accumulation point for the
vertex set of the triple system. The loop portion of the curve is anticlosed and the
remainder of the curve is a subalgebra. For this reason, if x is any nonsingular point
of ”, then x*x must lie in the subalgebra and thus all even vertices 2m D m m
must lie in the subalgebra and only odd vertices can lie on the loop. Similarly, if
T is a (Z,0) triple system with a Type IV cubic envelope ”, then it may be that all
the vertices of T lie on the bell of ”, or it may be that all the odd vertices lie on the
oval and all the even vertices lie on the bell of ” as in Fig. 18. In either case, since
0 0 D 0 vertex 0 must be a flex point of ”. If S is a (Z,1) triple system with Type
IV cubic envelope then all the vertices of S may lie on the bell of or it may be
that all the even vertices of S lie on the oval and all the odd vertices on the bell of
as in Fig. 19. No flex point of is a vertex of S.
60 R.R. Fletcher III
Fig. 16 Type V cubic y2 D x x2 1:98x C 1
1 3
-4
5
7 -6
-7
6
-5
-1 -3 4
The constructions given in Theorems 8, 9 provide the basis for our general
construction of triple systems on Zn . First we assume the existence of such triple
systems and show that they must lie on an irreducible cubic curve of Type III, IV
or V.
Theorem 10 Let T be a triple system with base Zn . If n 10 then the vertices of T
lie on an irreducible cubic curve of Type III, IV or V.
Geometric Triple Systems with Base Z and Zn 61
-8
-6
10 1 3
-4 -1
5
12
-3
-2 -5 -9
9 -7 7
0
2
-12
2 -12
10
-11
-6 -4
11
-3 0
5 14 4
-9 6 -2 -10
12
-1
-15
7
-7 15
Fig. 19 (Z,1) triple system with odd vertices on bell and even vertices on oval
Proof First suppose T is a (Zn ,0) triple system and let S D f0; 1; 1; 2; 2; 3; 3;
4; 5g. Any set of nine points lies on some cubic so let ’ denote a cubic curve which
contains these nine vertices of T. No three triples of T contain all nine vertices of S
so ’ cannot consist of three lines. If any triple of T in S is removed there remains at
least one triple of T among the remaining vertices of S. No conic can contain three
collinear points so ’ cannot consist of a line and a conic.
62 R.R. Fletcher III
To conclude that vertex 4 must also lie on ’. If n D 10 then we have all ten
vertices of T on ’. If n 11 then the 0-square:
2 3
5 5 0
4 1 4 3 5
4 1 3
The first 0-square shows that vertex 6 lies on ’, and if n D 12 we are done. If
n 13, then the second 0-square shows that 6 lies on ’. Now assume inductively
that the points fk; : : : ; 0; : : : ; kg have been shown to lie on ’ with k 6 and n
2k C 2, and consider the 0-square:
2 3
k C 1 3 k C 2
4 1 1 0 5
k 2 k2
Since n 2k C 2 and k 6, the entries in this square are all distinct and all are
known to lie on ’ by the inductive hypothesis except for vertex k C 1. But then, by
Lemma 4, k C 1 also lies on ’. If n D 2k C 2 then we are done, else n 2k C 3 and
we consider the 0-square formed by the inverses of the entries in the above square:
2 3
k 1 3 k 2
4 1 1 0 5
k 2 k C 2
The entries in this square are all distinct and all except for k 1 lie on ’ by
the inductive hypothesis. By Lemma 4 vertex k 1 must also lie on ’ and so the
induction is complete.
Geometric Triple Systems with Base Z and Zn 63
The first of these shows that vertex 5 lies on “, and then the second shows that
vertex 5 lies on “. The 1-square:
2 3
6 5 0
4 1 4 2 5
4 2 3
are all distinct and all lie on “ by the inductive hypothesis, except for vertex k which
by Lemma 4 must also lie on “. If n D 2k C 2 we are done, otherwise n 2k C 3
and the entries in the 1-square:
2 3
k C 1 k 1 1
4 1 k 1 k C 3 5
kC1 3 k3
are all distinct and show that k 1 also lies on “. This completes the induction and
so we have shown that a geometric triple system with base Zn has all its vertices on
an irreducible cubic curve.
64 R.R. Fletcher III
It remains to show that Type I and Type II cubics cannot contain triple systems
with base Zn . Consider the generic Type II cubic ” illustrated in Figs. 13 and 17
and suppose A is a nonsingular, nonflex point on this curve. The curve has three
sections: the loop in the second and third quadrants; the section in the first quadrant
and the section in the fourth quadrant. If A lies on the loop then A*A lies either in
the first or the fourth quadrant section, since the loop is anticlosed. The combined
first and fourth quadrant sections form a subalgebra of (”,*). The first as well as the
fourth quadrant sections are anticlosed: if A lies in the first quadrant then A*A lies
in the fourth, and if A lies in the fourth then A*A lies in the first. More significantly,
if A lies in either the first or fourth section, and A is not the point 1 at infinity on
origin. If we let ¥ .x/ D x x, then
”, then A*A ˚lies closer to the singularity at the
2 3
the sequence A; ¥ .A/ ; ¥ .A/ ; ¥ .A/ ; : : : : is infinite. We conclude that f1g and
f1; .1; 0/g are the only finite subalgebras of .”; /. If n > 2 then a triple system
with base Zn on ” would be a finite nontrivial subalgebra of .”; / which as we
see is not possible. If ” is a Type I cubic, a similar analysis shows that f1g is the
unique finite subalgebra of .”; /, and thus no nontrivial finite triple systems can be
constructed on ”.
Having shown that triple systems with base Zn must lie on irreducible cubic
curves, we now start with an irreducible cubic and construct the triple system on it.
A triple system as defined does not have much meaning when n D 1 or 2 since three
points are required to make even a single triple. But in the context of an irreducible
cubic curve ”, the three collinear flex points count as, (trivial), Z1 triple systems,
and a two element set fa,eg where e is a flex point of ” and a a D e, is a Z2 triple
system. The three flex points of ” form a Z3 triple system. Ultimately it will be
important for us to describe exactly how many distinct but equivalent triple systems
with base Zn can be accommodated on a given Type IV or Type V cubic curve, but
first we give the constructions:
Theorem 11 For each positive integer n, a triple system with base Zn can be
constructed on an irreducible cubic curve.
Proof First suppose n is odd and let ” denote the Type V cubic with equation:
xy2 C x3 C x2 y C 2y D 0 illustrated in Fig. 9. We will construct a (Z2n , 0) triple
system on ” by following the procedure given in Theorem 8 and then shifting the
generating vertex, (vertex 1), so that the points f.n 1/ =2; .n C 1/ =2g lie on a
vertical line. Let 1 denote the point at infinity on vertical lines and let 0 denote
the flex point of ” at the origin. Let A, B denote the two points on ” which satisfy
A A D B B D 1. (We call A,B the square-roots of 1.) Choose vertex 1 in section
(0,A) of ” and near vertex 0. Following the construction given in Theorem 8, we
find that the points f1; 2; 3; : : : g occur sequentially on ” as we traverse ” from 0 in
a positive direction. The reflections f1; 2; 3; : : : g occur sequentially on ” as ”
is traversed from 0 in a negative direction. By choosing vertex 1 sufficiently close
to vertex 0 we can arrange for the section (0,A) of ” to contain precisely the points
f1; 2; 3; : : : ; .n 1/ =2g. Then the first point of section (A,1) will be (n C 1)/2. By
further shifting of vertex 1 we can arrange for the points f.n 1/ =2; .n C 1/ =2g to
Geometric Triple Systems with Base Z and Zn 65
lie on a vertical line. In case n is even we follow the same procedure, but shift vertex
n1
1 until point n/2 coincides with A. If n is odd then 1 D nC1 2 2
D n and if n
is even then n D n2 n2 D A A D 1, so in either case 0 D 1 1 D n n.
But also n n D 0, so we have n D n D 1. The coincidence of the points
n; n forces any two points of the (Z,0) triple system which are congruent mod 2n
to coincide: if a 2 Z then a n D a n D a C n implies a D a C 2n. Thus the (Z,0)
triple system constructed in accordance with Theorem 8 collapses to a (Z2n ,0) triple
system T on ”. Now let S D f0; 2; 4; : : : ; 2n 2g denote the set of even vertices of
T and relabel them by the mapping ¥ W S ! Zn defined by ¥ .2k/ D k. Then the
points ¥ .S/ form a (Zn , 0) triple system on ”.
To construct a (Zn , 1) triple system on ” we first construct a (Z3n , 0) triple system
T on ” using the method in the first paragraph. Let S D f3k 1 W k D 1; 2; : : : ; ng,
then S is easily seen to be a subalgebra of (T,*) and, in fact, a coset subsystem. The
relabeling ¥ W S ! Zn given by: ¥ .3k 1/ D k (mod n) turns S into a (Zn , 1) triple
system.
Note that a geometric triple system is a pure incidence structure and so is
preserved by transformations of the projective plane. Our construction of Zn triple
systems on a particular Type V cubic therefore means that such triple systems can
be constructed on any Type V cubic. Similar procedures can be used to construct Zn
triple systems on a Type IV cubic curve ”. If the generating vertex lies on the bell
then the entire triple system will lie on the bell. If the generating vertex (vertex 1) is
chosen on the oval then we have the following possibilities. If n is even and T is a
(Z,0) triple system on ” then every even vertex 2k of T is equivalent to k k and
must lie on the bell since the oval is anticlosed and so cannot contain the square of
any of its vertices, and the bell is a subalgebra which consequently contains the
square of any of its vertices. The oval must then be populated with all the odd
vertices of T. In Fig. 31, (see Appendix) we illustrate
a (Z18 ,0) triple system on
the Type IV cubic with equation: xy2 D .x 1/ 16 x2 . This curve is symmetric
with respect to the x-axis and has a flex point at the point at infinity on vertical
lines. We let vertex 0 be this point at infinity, then as a consequence vertices k; k
are reflections of each other across the x-axis for each integer k. Let A,B denote
the two points on the oval and on the x-axis as in Fig. 31, and select the generating
vertex, (vertex 1) on the oval near point A. As the construction proceeds, the odd
vertices form consecutively on the oval with increment 2 and the even vertices fall
consecutively on the bell also with increment 2. By shifting vertex 1 on the oval
we can arrange for vertex n/2 to coincide with point B, resulting in a (Zn ,0) triple
system on ”. If a is a vertex of T on the oval, (and vertex 1 lies on the oval), then
the mapping ¥ .a/ D 1 a is a bijection between the points of T on the oval and the
points of T on the bell. And so T must have an even number of vertices. From this
we have:
Theorem 12 For any positive integer n, a (Zn ,0) triple system T can be constructed
on the bell of a Type IV cubic curve. If n is odd then every vertex of T must lie on the
bell. If n is even then T can be constructed with its odd vertices on the oval and its
even vertices on the bell.
66 R.R. Fletcher III
The situation is reversed for a (Zn ,1) triple system T with vertices on the oval of a
type IV cubic curve ”. T must again have an even number n of vertices but this time
every odd vertex is a square and so must lie on the bell. The even vertices must all
lie on the oval along with the generating vertex (vertex 0). That such a triple system
exists can be argued by first constructing a (Z3n ,0) triple system T0 according to the
above prescription and then taking points of the form 3k-1 from T0 and relabeling
by the mapping ¥ .3k 1/ D k. A (Z18 ,1) triple system of this type with increment
2 is illustrated in Fig. 32, (see Appendix). We thus have:
Theorem 13 For any positive integer n, a (Zn ,1) triple system T can be constructed
on a Type IV cubic curve. If n is odd then every vertex of T must lie on the bell. If
n is even then T can be constructed with its even vertices on the oval and its odd
vertices on the bell.
We shall refer to a triple system which has half of its vertices on the bell and the
other half on the oval of a Type IV cubic as a split triple system.
If T is a triple system with base Zn and 3jn then we have found a beautiful
construction of T using concentric equilateral triangles. The construction will be
accomplished by putting the vertices of T on an irreducible cubic curve which has a
rotational symmetry of order 3. We first determine the formula for such a curve.
Theorem 14 After a suitable rotation an irreducible cubic curve which rotates onto
itself clockwise about the origin through an angle of 120ı has an equation of the
form:
.e 3ax/ y2 C ax3 C ex2 C j D 0: (6)
effect a clockwise rotation of 120ı of the point (x,y) to the point (x0 , y0 ). Now
substituting x0 for x and y0 for y in (7), we obtain:
Geometric Triple Systems with Base Z and Zn 67
( p ! )3 ( p ! )2 ( p ! )
1 3 1 3 3 1
a x y Cb x y x y
2 2 2 2 2 2
( p ! )( p ! )2
1 3 3 1
Cc x y x y
2 2 2 2
( p ! ) 3 ( p ! )2
3 1 1 3
Cd x y Ce x y
2 2 2 2
( p ! )( p ! ) ( p ! )2
1 3 3 1 3 1
Cf x y x y Cg x y
2 2 2 2 2 2
( p ! ) ( p ! )
1 3 3 1
Ch x y Ck x y C j D 0:
2 2 2 2 (9)
Since (7), (9) must represent the same cubic curve ”, we can equate correspond-
ing coefficients. By equating the coefficients of x we obtain:
p
3h D k 3; (10)
The Eqs. (12) and (13) yield e D g, and then from (12) we obtain f D 0. With
these results the Eq. (7) of ” reduces to:
ax3 C bx2 y C cxy2 C dy3 C e x2 C y2 C j D 0: (14)
Solving (15), (16) together yields b D 3d, and substituting this for b in (15)
yields c D 3a. Equating the coefficients of x3 or of x2 y yields only redundant
equations. Equation (14) can then be rewritten:
ax3 3dx2 y 3axy2 C dy3 C e x2 C y2 C j D 0: (17)
To further simplify the equation of ”, we can rotate ” about the origin until it
contains the point (0,1,0) at infinity on vertical lines. The homogenization of (17)
is:
ax3 3dx2 y 3axy2 C dy3 C ez x2 C y2 C jz3 D 0: (18)
Since y can be replaced by y without changing Eq. (19), ” is symmetric wrt the
x-axis. In (19) clearly a cannot be 0, so we can divide by a and rename coefficients
to obtain:
x3 3xy2 C e x2 C y2 C k D 0: (20)
In the next result we develop important algebraic properties pertaining to a cubic
curve with a 120ı rotational symmetry.
Lemma 15 Let be an irreducible cubic curve with rotational symmetry of order
three about the origin. Then (i) is an automorphism of .; / of order 3, and (ii)
b .c/ D .b/ c D 2 .b/ 2 .c/ for any points b, c on ”.
Proof We may assume that the equation of ” is given by (20) and so consists of
three petals each of which have an axial symmetry as in Fig. 20. Let 1v ; 1u ; 1w
denote the three points at infinity on ”. These also are the three flex points of ”
and form a subalgebra I of (”,*). Let b be a point of the Euclidean plane on ”,
and let˚’ denote the circle
with center at the origin and which contains the points
b D b; Ÿ .b/ ; Ÿ2 .b/ . (In Fig. 20 we use the notation b0 D Ÿ .b/, and b00 D Ÿ2 .b/).
This circle meets ” in three more points, counting multiplicities, which are given by
fb 1u ; b 1v ; b 1w g due to the aforementioned symmetry of the petals of ”. We
also see that the following equations hold:
c
b*∞u
a" b a c'
b"
b*∞w
b*∞v
b'
a'
c"
11
2
10 3
5
4
14 13
8 15
γ
16
7
17
14
10
1
5 15
11 16
9
7 2
13 3 γ
17
Fig. 22 (Z18 , 0) triple system on Type 2 cubic: equilateral construction with vertices 0,6,12 at
infinity
13 5
4 1
14
3
2
15
16 10 11
17 9
8
12
0 7
Theorem 17 Let
B D .B; B0 ; B00 / be an equilateral triangle with one vertex on
each side of an equilateral triangle
A D .A; A0 ; A00 /, and let
C D .C; C0 ; C00 /
be an equilateral triangle with one vertex on each side of
B as in Fig. 24. Let
D D ŒA; C0 \ Œ A0 ; C I D0 D ŒA0 ; C00 \ Œ A00 ; C0 ; D00 D ŒA00 ; C \ ŒA; C00 ; E D
ŒB; D00 \ Œ B00 ; D I E0 D ŒB; D0 \ Œ B0 ; D I E00 D ŒB0 ; D00 \ Œ B00 ; D0 ; F D ŒE; A0 \
ŒA; E0 I F 0 D ŒE0 ; A00 \ Œ E00 ; A0 I F 00 D ŒE00 ; A \ ŒE; A00 . Then F lies on ŒC; C0 ; F 0
lies on ŒC0 ; C00 , and F 00 lies on ŒC00 ; C.
72 R.R. Fletcher III
A'
B C'
B'
D
F E' F' D'
E E"
C F" C"
D"
A A"
B"
Proof Note that (17) is the general equation of an irreducible cubic curve ”
with a 120ı rotational symmetry about the origin. In this equation interchanging
the coefficients a,d leaves the equation unchanged, and a,d cannot both be zero
otherwise we no longer have a cubic. So we can suppose without loss of generality
that a ¤ 0, and then divide (17) by a to obtain an equation for ” with only the
three free coefficients d,e,j. Consequently just the three points A,B,C determine ”,
and thus ” contains the nine distinct points belonging to the equilateral triangles
A ; B ; C . Since A,B, A0 are collinear we have A A0 D B; A0 A00 D B0 , etc. By
Lemma 15, all the points D; D0 ; D00 ; E; E0 ; E00 ; F; F0 ; F00 also lie on ”. Then:
˚ ˚ 0 0 00
C C0 D .B B00 / .B B00 / D .A A0 / .A A00 / .A A / .A A /
˚ 0 0 00 ˚ 0 00
D .A A / .A A / . A A/ .A A /
D ŒA .A A/ Œf A .A A0 / .A0 A00 / .A0 A00 / g
Thus F lies on [C, C0 ], and by 120ı rotations we obtain F0 on [C0 , C00 ], and F00 on
[C ,C].
00
Geometric Triple Systems with Base Z and Zn 73
7 Increments
either the odd (even) vertices lie together on the bell and the even (odd) vertices lie
together on the oval. Such triple systems must have an even number of vertices. We
have seen, as in the discussion following Theorem 11, that a (Zn ,0) triple system
can be constructed with clockwise (around the oval) increment 2, (See Appendix
Fig. 31).
Theorem 20 Let T be a (Zn ,0) triple system on a Type IV cubic curve with even
vertices on the bell and odd oval of . Then
˚ vertices on the T can have clockwise
increment 2t for any t 2 1; 2; : : : ; n2 1 with gcd t; n2 D 1. In any case T is
equivalent to a (Zn ,0) triple system on with increment 2.
Proof Let T be a (Zn ,0) triple system as described in the Theorem statement which
has increment 2. Such a triple system exists as per our discussion following Theorem
11 where it is also made clear that T must have an even number of vertices which we
classify as odd and even. The even vertices must lie on the bell and the odd ones on
the oval. This
explains why only even increments are possible. It is also not possible
for gcd t; n2 > 1, since such increments would yield only the points belonging to a
subgroup of Zn . Now suppose first that n/2 is odd and define the following mapping
¥ W Zn ! Zn
n
If t is even let ¥ .x/ D ftx if x is even I C t x if x is oddg
2
If t is odd let¥ .x/ D tx for each x 2 Zn
6
3 5
7
1
8
15 9
13 11
10
12
14
Proof Let T be a split (Z3n ,0) triple system, (n even), with clockwise increment
2 and let S D f3k 1 W k 2 Zn g denote the coset subsystem of T consisting of
points of the form 3k 1. The relabeling of S given by ¥ .3k 1/ D k turns ¥(S)
into a split (Zn ,1) triple system Q on ” with clockwise increment 2. Note that the
relabeling replaces odd vertices with even ones and even vertices with odd ones. Let
t 2 f1; 2; 3; : : : ; n 1g with gcd .t; n/ D 1 and define § W Q ! Zn by § .x/ D tx.
This relabeling turns Q into a (Zn ,t) triple system R on ” with clockwise increment
2t (mod n). Suppose n is not a multiple of 3. Then gcd .t; 3/ D 1, and R is equivalent
by Theorem 1 to a (Zn ,1) triple system by means of relabelings which preserve the
increment. So in this case we obtain a (Zn ,1) triple system with clockwise increment
2t (mod n) which is equivalent to Q. If 3jn and t has the form 3k C 1 then, again
by Theorem 1, R is equivalent to a (Zn ,1) triple system with clockwise increment
2t (mod n). If 3jn and t has the form 3k 1 then R is again equivalent to a (Zn ,1)
triple system but a relabeling is required which replaces each vertex by its inverse
resulting in a counterclockwise increment of 2t. However, gcd .t; n/ D 1 implies
gcd .n t; n/ D 1, and if t has the form 3k 1 and n D 3m, then n t has the form
3 .m k/ C 1 and so we obtain anyway a (Zn ,1) triple system equivalent to Q with
a clockwise increment of 2t.
Our objective in this section is to show that for each integer n, up to equivalence,
there is a unique (Zn ,0) triple system on a Type V, Type III or bell of a Type IV cubic,
which has a given flex point identified with vertex 0. To facilitate this objective we
first determine precise locations for the vertices of such a triple system. In Fig. 33,
(see appendix), we illustrate a typical Type V cubic curve ” with collinear flex points
e,f,g. We shall consider a positive traversal of ” to be the traversal which encounters
76 R.R. Fletcher III
e,f,g consecutively in this order. We use the notation (e,f) to denote the section of ”
covered in a positive traversal of ” from e to f. Similarly sections (f,g) and (g,e) are
defined. In Fig. 33 (g,e) contains the point at infinity.
Theorem 22 Let be a Type V, Type III or bell of a Type IV cubic curve with
collinear flex points e,f,g as in Fig. 33, and let T be a (Zn ,0) triple system with cubic
envelope with vertex 0 identified with the flex point f. Then T is equivalent to a
(Zn ,0) triple system with its vertices located on as follows: (i) if n D 3k then all
three flex points are vertices of T with e D 2k; f D 0 and g D k. Moreover vertices
f2k C 1; : : : ; 3k 1g lie in (e,f); vertices f1; : : : ; k 1g lie in (f,g) and vertices
fk C 1; : : : ; 2k 1g lie in (g,e). (ii) If n D 3k C 1 then f D 0 is the only flex point
of T, and vertices f2k C 1; : : : ; 3kg lie in (e,f); vertices f1, : : : ,kg lie in (f,g) and
vertices fk C 1; : : : ; 2kg lie in (g,e). (iii) If n D 3k C 2 then f D 0 is the only flex
point of T, and vertices f2k C 2; : : : ; 3k C 1g lie in (e,f); vertices f1, : : : ,kg lie in
(f,g) and vertices fk C 1; : : : ; 2k C 1g lie in (g,e).
Proof Let (”,*) be the usual thirdpoint groupoid defined on the points of ”. Then
(T,*) is a subalgebra of (”,*) which satisfies a b D .a C b/. The flex points e,f,g
of ” are precisely the idempotent elements of (”,*). If n D 3k then points f0,k,2kg
satisfy x D x x D 2x and so all three flex points of ” must belong to T. If n is not
a multiple of 3 then vertex 0 is the unique flex point of T. By Theorem 19 we may
regard T as having increment 1 in the positive direction. If n D 3k then we must
have e D 2k, f D 0 and g D k. This immediately forces the vertices of T to align
themselves as indicated in (i) of the Theorem statement. Now suppose n D 3k C 1
and define § W .f; g/ ! .e; f/ by § .x/ D f x D 0 x. This mapping is a bijection
which induces a one to one correspondence between the points of T in (f,g) and the
points of T in (e,f). Note that k k D k C 1 and k is the only point of T which squares
to its successor in the positive direction along T. As a consequence the vertices k,
k C 1 cannot lie together in any of the intervals (e,f), (f,g), (g,e), since these are
anticlosed subsets of ”. Also f D 0 is the only flex point belonging to T so neither
k nor k C 1 can be a boundary point for these intervals. It must then be that k is
the last point of T in one of these intervals, and k C 1 is the first point of T in the
succeeding interval. The points 3k and 1 directly precede and follow f and neither
can k, k C 1 precede and follow the flex point e: If k C 1 follows e on ” then the
2k points fk C 1, : : : . ,3kg must all lie in (e,f). But then due to the bijection §,
the interval (f,g) must contain another 2k points of T, which is impossible since 4k
exceeds the number of vertices in T. So we must have that k immediately precedes
g and vertex k C 1 immediately follows g. As a consequence the vertices f1, : : : ,
kg lie in (f,g) and the images f3k; : : : ; 2k C 1g of these under § must constitute the
points of T which lie in (e,f). The remaining points fk C 1; : : : ; 2kg must then all lie
in (g,e) in accordance with the stipulation of the Theorem. In Fig. 33 we illustrate
a triple system of this type with n D 3.4/ C 1. Finally suppose n D 3k C 2. The
only point of T which satisfies x x D x C 1 is x D 2k C 1. Thus the points 2k C 1,
2k C 2 cannot lie in the same anticlosed set. Since they are adjacent points of T,
2k C 1 must be the last point of T in (g,e) and 2k C 2 must be the first point of T in
(e,f). As a consequence the points f2k C 2, : : : , 3k C 1g must lie in (e,f) and due
Geometric Triple Systems with Base Z and Zn 77
to the bijection §, the points f1, : : : , kg must lie in (f,g). The remaining points of T,
(different from f D 0), namely fk C 1, : : : , 2k C 1g must then lie in (g,e).
In Fig. 34, (see appendix), we illustrate a (Zn , 0) triple system with n D 3(4) C 2.
Now, still focusing on (Zn ,0) triple systems we will consider the question of
uniqueness. Let ” be a Type V, Type III or bell of a Type IV cubic curve. We may
consider any one of the three flex points of ” to be a (Z1 ,0) triple system with the
unique element 0 identified with the flex point. For any point a on ” the equation
x*x D a has exactly two solutions for x, we may call these the square-roots of a.
Each flex point has itself and one other point as a square root. These two points form
a subalgebra of (”,*) which we may consider to be a (Z2 ,0) triple system. Thus there
are exactly three (Z1 ,0) triple systems and exactly three (Z2 ,0) triple systems on ”.
The three flex points fe,f,gg constitute the unique (Z3 ,0) triple system on ”. A (Z4 ,0)
triple system T must contain a flex point of ” for vertex 0, the remaining square-root
of this flex point for vertex 2, and since 1*1 D 3*3 D 2, the remaining two points of
T must be the square-roots of 2. The three flex points of ” yield three distinct (Z4 ,0)
triple systems. Thus we see that for n D 1,2,3,4 there is a unique (Zn ,0) triple system
on ” which contains a given flex point. To consider the general case it is useful to
establish some motion principles for points on ”:
M1: Let a be a fixed point of and x a moving point of . If x moves along in
one direction then a*x moves in the opposite direction.
M2: If a, b move in the same direction along , then a*b moves in the opposite
direction.
Let T be a (Zn ,0) triple system with n > 4 and suppose first n D 3k C 1. We can
assume that T has increment 1 in the positive direction along its cubic envelope ”
and that the vertices of T lie in the intervals specified by Theorem 22. As vertex
1 is shifted along ” from f D 0 in the positive direction towards g the vertices
2, : : : , k C 1 move ahead of it. This is a consequence of M1. By Theorem 22
vertex k is confined to the interval (f,g) and by M2, as k moves from f to g in the
positive direction, point k*k moves from f to g in the negative direction. Vertex
k C 1 is the first point of T in (g,e) and it moves in a positive direction ahead
of vertex k in this interval. Since points k C 1, k*k move in opposite directions,
there is a unique position for vertex 1 at which these points coincide. They must
coincide in a triple system with sum 3k C 1, so we conclude that T is uniquely
determined. If n D 3k C 2 we argue similarly: as vertex 1 moves in the positive
direction from f to g, vertex k C 1 also moves in a positive direction from f. By M2
point (k C 1)*(k C 1) moves in the negative direction from f to g. Since points k
and (k C 1)*(k C 1) move in opposite directions there is a unique position on ”
for which these points coincide, and once again T is uniquely determined. The final
case is when n D 3k. In this case we must have f D 0; g D k and e D 2k since 0, k,
2k are idempotent in (T,*). As vertex 1 is shifted in the positive direction starting at
f, vertex k also moves in the positive direction starting at f. By M2 point k*k moves
in the negative direction along ”, starting at f. Again, since the points k and k*k
move in opposite directions, there is a unique position for vertex 1 in (f,g) for which
points k and k*k coincide and thus T is uniquely determined. In this case we must
have k D k*k D g. We have proved:
78 R.R. Fletcher III
Theorem 23 Let be Type V, Type III or bell of a Type IV cubic curve and let f be
a flex point of . Then for each positive integer n there exists, up to equivalence, a
unique (Zn ,0) triple system on with f D 0.
This result will ultimately be very useful in the determination of exactly which
finite abelian groups can serve as bases for triple systems. If n is a multiple of 3
then a (Zn ,0) triple system must contain all three flex points of its cubic envelope ”.
Since there is a unique such triple system containing any one of the flex points, we
conclude that, up to equivalence only one such triple system exists on ”. If n is not
a multiple of 3 then a (Zn ,0) triple system contains only one of the flex points of ”.
Since ” contains three flex points, we conclude that there exist exactly three distinct
but equivalent triple systems of this type on ”. Thus we have:
Corollary 24 Let be a Type V, Type III or bell of a Type IV cubic curve. If n is a
multiple of 3 then, up to equivalence, there exists a unique (Zn ,0) triple system on .
If n is not a multiple of 3 then there exist exactly three distinct (Zn ,0) triple systems
on .
Next we would like to obtain a similar determination for (Zn ,1) triple systems. In
accordance with Theorem 1, we may assume that n is a multiple of 3. In the proof
of Theorem 11 we saw that a (Z3n ,0) triple system T contains a coset subsystem
equivalent to a (Zn ,1) triple system. The equivalence was obtained by first taking
vertices U D f3k 1 W k D 1; 2; : : : ; ng and then relabeling by ¥ .3k 1/ D k. The
subset W D f3k C 1 W k D 0; 1; : : : ; n 1g of T yields a second coset subsystem
of T equivalent to a (Zn ,1) triple system under the relabeling § .3k C 1/ D k
(mod n). In Fig. 26 we depict two distinct (Z12 ,1) triple systems, one with bold and
the other with dashed lines, as subalgebras of a (Z36 ,0) triple system. It should be
observed that W D 0 U D f0 u W u 2 Ug,i.e., W,U are translates of each other.
By Corollary 24, there is a unique (Z3n ,0) triple system with a given cubic envelope
11'
6
3
9'
12
5
10' 9 4 8'
7' 2 15
18 0' 6
0
6'
7 2' 21
10 27 4' 8
5'
24
9
3'
30
11
Fig. 26 Two split (Z12 ,1) triple system as subalgebras of a split (Z36 ,0) triple system
Geometric Triple Systems with Base Z and Zn 79
” of Type V, Type III or bell of Type IV. So it would appear that for each n there
are exactly two distinct (Zn ,1) triple systems on ”. It must, however, be shown that
every (Zn ,1) triple system on ” arises in this way, i.e., as a subsystem of a (Z3n ,0)
triple system. For this purpose the next Theorem will suffice:
Theorem 25 Let be a nonsingular irreducible cubic curve, and let T be a (Zn ,1)
triple system on . Then T can be extended to a (Z3n ,0) triple system on .
Proof If gcd .n; 3/ D 1 then T is equivalent to a (Zn ,0) triple system by Theorem
1. So we may as well regard T as a (Zn ,0) triple system. The vertex 0 must label
one of the flex points, say f, of ”. By Theorem 23, T is uniquely determined.
Now let Q be a (Z3n ,0) triple system on ” with vertex 0 identified with f. Let
R D f0; 3; 6; : : : :; 3n 3g denote the subgroup of Z3n consisting of the multiples
of 3. The points of Q with labels in R form a subsystem of Q equivalent to a
(Zn ,0) triple system. By Theorem 23, the triple system R is uniquely determined
and must therefore be equivalent to T. Thus Q is the required extension of T.
Now suppose 3jn. Then T is not equivalent to a (Zn ,0) triple system, and in fact,
contains none of the three flex points of ”. We will build a (Z3n ,0) triple system
W which contains the points of T. Relabel each point of T by ¥ W T ! Z3n
defined by ¥ .k/ D 3k 1 (mod 3n) and select a flex point, say f for vertex 0.
Let W1 D ¥ .T/. Let W1 D fs 0 W s 2 W1 g, and for each s 2 W1 let s*0 have
label s. Since 1 2 W1 , we now have a point with label 1 in W1 . Finally let
W0 D f s 1 W s 2 W1 g, and for each s 2 W1 label the point s*1 with s 1. Let
W D W1 [W1 [W0 . For i D 0; 1; 1 the points in Wi are congruent to i mod 3 and
the elements of Z3n constitute precisely the set of labels assigned to points in W. We
will show that the points of W, as labeled, form a (Z3n ,0) triple system. Let a; b 2 W
and consider the following cases. In each case we must show that a b D a b.
Case (i): a; b 2 W1 . We have a D 3s 1 and b D 3t 1 for some s; t 2 Zn .
The points s; t; s t C 1 are collinear in T and so the points ¥ .s/ D a; ¥ .t/ D b
and ¥ .s t C 1/ D 3 .s t C 1/ 1 D 3s 3t C 2 D a b are collinear in
W and consequently a b D a b. Note that W1 is a relabeling of the points of T
and thus is a subalgebra of .”; /.
Case (ii): a; b 2 W1 . In this Case we have a D s 0 D s and b D q 0 D q for
some s; q 2 W1 . So a b D .s 0/ .q 0/ D .s q/ .0 0/ D .s q/ 0 D s C q D
ab. Since s 1 mod 3 and q 1 mod 3, we have a b D sCq 2 1
mod 3:So a b 2 W1 and thus W1 is also a subalgebra of .”; /.
Case (iii): a 2 W1 ; b 2 W0 . Here we have a D 0 s D s for some s 2 W1 ,
and b D 1 t D 1 t for some t 2 W1 . Then a b D .0 s/ .1 t/ D .0 1/ .s t/.
Now since 0 .1/ D 1, we have 0 1 D 1, and by Case (i) we have s t D s t,
and thus a b D 1 .s t/ D 1 C s C t. The last equality follows also from Case
(i). Since 1 C s C t D a b we have the desired result.
Case (iv): a 2 W1 , b 2 W0 . In this case b D 1 s D 1 s for some s 2 W1 ,
so: a b D .0 .a// .1 s/ D .a 1/ .0 s/. Since a D 0 a we have a 2 W1 .
Also 1 D 0 .1/ 2 W1 , so by Case(ii) a 1 D a 1. So a b D .a 1/ .s/ D
a C 1 C s. The last equality holds again by Case(ii) since both a 1 and s lie in
W1 . Then since a C 1 C s D a b we have the desired result.
80 R.R. Fletcher III
Now for the case n D 2m where m is odd we will find the following Lemma
useful. If p is a point on a Type IV cubic ” then p has exactly four square-roots on
”, two on the bell and two on the oval. If a is a square- root of p on the oval, let
a0 denote the remaining square –root of p on the oval, and if b is a square-root of p
on the bell, let b0 denote the remaining square-root of p on the bell. In any case we
refer to the points x, x0 as twin points.
Lemma 28 Let a, b be points on the oval of a Type IV cubic curve . Then a *
b D a0 * b0 and a * b0 D a0 * b.0
Proof Let p D a * a D a0 * a0 , and q D b * b D b0 * b0 . Then the points a * b0 ,
a0 * b, a * b, a0 * b0 all lie on the bell and all square to p * q. There are only two
square-roots of p * q on the bell, so two pairs from among these four points must be
equal. The point a * b0 cannot be equal to a * b or a0 * b0 since cancellation would
then require b D b0 or a D a0 which is impossible since no point on ” is equal to its
twin. We must then have a * b0 D a0 * b and similarly a * b D a0 * b0 .
The result of Lemma 28 is illustrated in Fig. 27.
Theorem 29 Let n D 2m with m odd and let be Type IV cubic curve. If
gcd(n,3) D 1 then there are exactly six distinct split (Zn ,0) triple systems on which
occur in three twin pairs. If 3jn then there are exactly two distinct split (Zn ,0) triple
systems on and these are twins.
Proof Let T be a split (Zn ,0) triple system on a Type IV cubic curve ” with n D 2m.
Let Q denote the set of even vertices of T which must lie on the bell, and let W
denote the set of odd vertices of T which must lie on the oval. Let W0 D fx0 W x 2 Wg
0
and let T0 D Q \ W0 . We claim that T is a split (Zn ,0) triple system. There are
essentially only two kinds of triples to check: those which contain two points in the
bell, and those which contain two points in the oval. If a; b 2 Q, then a b D a b
as in T. If a; b 2 W0 , then a0 ; b0 2 W and thus a0 ; b0 2 T and a0 b0 D a b as in T.
p*q
b'
a'
a*b' = a' * b
Fig. 27 a * b D a0 * b
82 R.R. Fletcher III
0
Then by Lemma 28, a b D a0 b0 D a b as desired. We call T the twin of T. If
0
m is even then x, x both lie in T for each point x in the oval. In this case we can say
that T is self-twin and we obtain the result of Theorem 27. But if m is odd as in our
0
current Theorem, then T, T constitute two distinct extensions of the set Q of even
0
points. In fact, the extending sets W, W are disjoint. (If 2s is any point of Q, then
the points, s, s C m are the only two square-roots of 2s in T or T0 . Since m is
odd, exactly one of these square-roots is odd and lies on the oval. If b is the unique
odd point of W such that b*b D 2s, then b0 cannot lie in W since b0 * b0 is also equal
to 2s. It follows that W \ W0 is empty.) If gcd .n; 3/ D 1 then the subsystem Q
can occur in three different locations on the bell, each containing a different one of
the three flex points on the bell. Each of these has two distinct extensions and thus
there are a total of six distinct split (Zn ,0) triple systems on ”. In case 3jn, then, in
accordance with Corollary 24, the set Q of points is uniquely determined. Its two
twin extensions then account for all possible split (Zn ,0) triple systems on ”.
Similar results hold for split (Zn ,1) triple systems:
Theorem 30 Let n D 2m with m even and let be a Type IV cubic curve. If
gcd(3,n) D 1 then there are exactly three distinct split (Zn ,1) triple systems on .
If 3jn then there are exactly two distinct split (Zn ,1) triple systems on .
Proof Let T be a split (Zn ,1) triple system with n D 2m and m even and let ” denote
the Type IV cubic envelope of T. Let Q denote the set of odd vertices of T which all
lie on the bell, and let W denote the set of even vertices of T which all lie on the oval
of ”. If gcd(3,n) D 1 then by Theorem 1, T is equivalent to a (Zn ,0) triple system,
and by Theorem 29 we can deduce that there are exactly three distinct split (Zn ,1)
triple systems on ”. Now suppose 3jn. The relabeling given by Ÿ .2k C 1/ D k
turns Q into a (Zm ,1) triple system. Since 3jn, we also have 3jm, so by Theorem
26 there are exactly two distinct (Zm ,1) triple systems on the bell. Thus there are
0
exactly two ways to arrange the odd vertices of T on the bell. Let W denote the
0
set of twins of points in W. Since m is even we have W D W and thus each of the
two choices for Q has, up to equivalence, a unique extension to a split (Zn ,1) triple
system.
Theorem 31 Let n D 2m with m odd and let be a Type IV cubic curve. If
gcd(3,n) D 1 then there are exactly six distinct split (Zn ,1) triple systems on ,
which occur in three twin pairs. If 3jn then, there are exactly four distinct (Zn ,1)
triple systems on , which occur in two twin pairs.
Proof Let T be a split (Zn ,1) triple system with n D 2m and m odd. Let Q denote the
set of odd points of T which all lie on the bell of the cubic envelope ” of T, and let
W denote the set of even points all of which lie on the oval. If gcd(3,n) D 1, then by
Theorem 1, T is equivalent to a split (Zn ,0) triple system, and so by Theorem 29 there
are exactly six mutually nonequivalent split (Zn ,1) triple systems on ”. Now suppose
3jn and apply the relabeling Ÿ .2k C 1/ D k to the odd points of T to obtain a
(Zm ,1) triple system on the bell. Since 3jn we must have 3jm, and by Theorem 26
Geometric Triple Systems with Base Z and Zn 83
there are exactly two nonequivalent (Zm ,1) triple systems on the bell. There are thus
exactly two nonequivalent ways to arrange the odd vertices of T on the bell of ”.
Each of these has two dual extensions: T D Q \ W and T0 D Q \ W0 , where W0
denotes the set of twins of points in W.
Now suppose T is a .Zn Zn ; .0; 0// triple system with n 3. We will assume
that the vertices of T must lie on an irreducible cubic curve . If n is odd, i.e.,
T has an odd number of vertices, then T cannot be split, and so must have all its
vertices on a Type V, Type III, or bell of a Type IV cubic curve ”. The subsets S D
f.0; x/ W x 2 Zn g; R D f.x; 0/ W x 2 Zn g; Q D f.x; x/ W x 2 Zn g are each subalgebras
of (T,*) equivalent to (Zn ,0) triple systems. These distinct (Zn ,0) triple systems all
share the flex point (0,0). But by Theorem 23, only one such triple system exists
on ”. We conclude that no such triple system T can exist. Now suppose n is a
multiple of 4, say n D 4m. Then the points f.0; 0/ ; .0; 2m/ ; .2m; 0/ ; .2m; 2m/g
are all square-roots of (0,0), so ” must be a Type IV cubic curve. But these
four points are also squares: .0; 0/ ..0; 0/ D .0; 0/ I .0; m/ .0; m/ D .0; 2m/;
.m; 0/ .m; 0/ D .2m; 0/ and .m; m/ .m; m/ D .2m; 2m/ so they must all lie on
the bell of ”, since the oval is anticlosed. But the bell can only support two square-
roots of any point, so in this case also we can conclude that T cannot exist. Finally
suppose n D 2m where m is odd. Since n 3, we must also have m 3. In this
case T contains a subsystem equivalent to a .Zm Zm ; .0; 0// triple system which
we have shown not to exist. With the proviso indicated by the second sentence of
this paragraph we have proved:
Theorem 32 If n 3, then no .Zn Zn ; .0; 0// triple system exists.
In [4] the existence of various triple systems with base Z2 Zn is proved. Every
finite abelian group is isomorphic to a direct product of cyclic groups. Any such
group which contains a subgroup isomorphic to Zn Zn for n 3, cannot, by
Theorem 32, serve as the base of a zero-sum triple system. On the other hand, if
n,m have no common nontrivial factors, then Zn Zm is isomorphic to Znm . Also,
evidently no triple system with base Z2 Z2 Z2 and sum (0, 0, 0) exists. With
these considerations, we can deduce that among finite abelian groups, only Zn and
Z2 Zn can serve as the base for a geometric triple system with sum zero.
Let ” be an irreducible cubic curve and let ” 0 denote the set of nonsingular
points of ”. Any of the five basic types of cubics, illustrated in Figs. 12, 13, 14,
15, 16 contains at least one flex point, say e, and (” 0 ,*) is a hypercommutative
groupoid. By a well known construction, see for example [1], we can convert
this groupoid into an abelian group (” 0 ,C) by defining a C b D e .a b/.
Then a C e D e .a e/ D a, so e is the identity element of (” 0 ,C), and
84 R.R. Fletcher III
and .a C b/ C c D Œe .a b/ C c D e .e .a b// c D .e e/ .e .a b// c D
.e c/ Œe .e .a b// D .e c/ .a b/ D .e a/ .b c/. A geometric triple system
T with its vertices on ” 0 is a subalgebra of (” 0 ,*). If T contains the flex point e
of ” 0 , then (T,C) is a subgroup of (” 0 ,C). In fact if S is any subalgebra of (” 0 ,*)
which contains e, then (S,C) is a subgroup of (” 0 ,C). The determination of the
group (” 0 ,C) is therefore important in order to describe its subalgebras and hence
to determine the triple systems on ” 0 which contain a flex point. We can also gain
information about the subalgebras of (” 0 ,*) which do not contain a flex point of ”,
since any such subalgebra can be extended to a subalgebra of (” 0 ,*) which does
contain a flex point as follows.
Lemma 33 Let be an irreducible cubic curve, and let 0 denote the set of nonsin-
gular points of . If S, T are subalgebras of ( 0 ,*), then S T D fs t W s 2 S; t 2 Tg
is also a subalgebra of ( 0 ,*). Moreover S S D S.
Proof Let s1 ; s2 2 S, and t1 ; t2 2 T. Then .s1 t1 / .s2 t2 / D .s1 s2 / .t1 t2 / 2 S T,
so S*T is a subalgebra of (” 0 ,*). It is clearly true that S S S. On the other hand,
if s 2 S, then s D s .s s/, and thus s 2 S S.
Theorem 34 Let be an irreducible cubic curve with flex point e, and let 0 denote
the set of nonsingular points of . If S is a subalgebra of ( 0 ,*) which does not
contain any flex point of , then the subalgebra hS [ ei of ( 0 ,*) generated by S[feg
is given by S [ e S [ S .e S/ where this is a disjoint union. If S is finite then
jhS [ eij D 3jSj.
Proof Certainly S [ e S [ S .e S/ contains S [ feg, since e D s .e s/ S .e S/
for any s 2 S. Since e is a flex point we have e e D e, and so feg is a one point
subalgebra of (” 0 ,*). It then follows from Lemma 33 that each of e S; S .e S/ is a
subalgebra of (” 0 ,*). We claim that the multiplication table for S [ e S [ S .e S/
is given by:
. / S e S S .e S/
S S S .e S/ e S
e S S .e S/ e S S
S .e S/ e S S S .e S/
The diagonal entries follow from Lemma 33, so we need only prove the
following:
(i) S ŒS .e S/ D e S. Proof. Let q 2 S ŒS .e S/, then q D s1 Œs2 .e s3 /
for some s1 ; s2 ; s3 2
S. Then q D
Œs3 .s1 s3 / Œs2 .e s3 / D
Œs3 .e s3 / .s1 s3 / s2 D e .s1 s3 / s2 e S. Conversely, suppose
q 2 e S, then q D e s D s Œs .e s/ S ŒS .e S/, where s is any element
of S.
Geometric Triple Systems with Base Z and Zn 85
(ii) .e S/ ŒS .e S/ D S. Proof. Let q 2 .e S/ ŒS .e S/, then q D
.e s1 / Œs2 .e s3 / for some s1 ; s2 ; s3 2 S. Then q D Œe .e s3 / .s1 s2 / D
s3 .s1 s2 / 2 S. Conversely, suppose q 2 S, then q D .e q/ Œq .e q/ 2
.e S/ ŒS .e S/.
From the completion of the table, we obtain that S[e S[S .e S/ is a subalgebra
of (” 0 ,*). Now to show that the subalgebras S; e S; S .e S/ are mutually disjoint,
suppose s 2 S \ e S, then s D e s1 for some s1 2 S. But then e D s s1 2 S, a
contradiction. If s 2 S \ S .e S/, then s D s1 .e s2 / for some s1 ; s2 2 S. But
then e D s2 .s s1 / 2 S, a contradiction. Finally suppose q 2 .e S/ \ ŒS .e S/,
then q D e s1 D s2 .e s3 / for some s1 ; s2 ; s3 2 S. Then s2 D .e s1 / .e s3 / D
.e e/ .s1 s3 / D e .s1 s3 /, and consequently e D s2 .s1 s3 / 2 S, again
contradicting the idempotent free character of S.
(1) The mapping § W S ! e S defined by § .s/ D e s is easily seen to be a
bijection, so jSj D je*Sj. Now define a mapping ¥ W S ! S .e S/ by ¥ .s/ D
s0 .e s/, where s0 is any fixed element of S. Again, it is easily seen that
¥ is injective. To show ¥ is onto, let s1 *(e*s2 ) be a typical element
of
S*(e*S), and let s D (s2 *s
0 )*s1 , then ¥ .s/ D s0
e .s2 s0 / s1 D
Œs2 .s0 s2 / e .s2 s0 / s1 D s1 .e s2 /. So we have j S jDj S .e S/ j
as well. If S is finite then jhS [ eij D jSj C je*Sj C jS*(e*S)j D 3jSj.
In Theorem 34, if we let W D S*(e*S), we saw that W D s0 *(e*S), where s0 is
any element of S. It follows immediately that e*S D s0 *W, and from this it follows
immediately that S D e .s0 W/ D .e e/ .s0 W/ D .e s0 / .e W/ D .e s0 / W.
The last equality follows from the fact that e 2 W. Thus we can say:
Corollary 35 Every idempotent-free subalgebra of ( 0 ,*) is a translate of a
subalgebra of ( 0 ,*) which does contain an idempotent element.
The results of Theorem 34 and Corollary 35 should be compared with Theo-
rem 25 which describes the extension of a (Zn ,1) triple system, possibly with no flex
point, to a (Z3n ,0) triple system.
If (S,*) is any hypercommutative groupoid which contains an idempotent element
e, and we define an addition on the elements of S, as above, we obtain an abelian
group which we denote by ˆe (S). If (G,C) is an abelian group and we define
a binary operation * on the elements of G by a b D a b, then we obtain
a hypercommutative groupoid with 0 as idempotent element. In case the abelian
group G is presented multiplicatively, then we define a b D a1 b1 . In either
case we denote the resulting hypercommutative groupoid by ‰(G). It is then easily
seen that ‰ˆe .S/ D S for every hypercommutative groupoid S which contains an
idempotent element e. Conversely, if G is any abelian group with identity e, then
ˆe .‰ .G/ D G. The mappings ˆe , ‰ are thus inverses, and provide a one to one
correspondence between members of the variety of abelian groups and members of
the variety of hypercommutative groupoids with idempotent e. This correspondence
easily extends to subalgebras: If W is a subalgebra of a hypercommutative groupoid
(S,*,e), and W contains the idempotent element e, then ˆe .W/ is a subgroup of
86 R.R. Fletcher III
1/2
9/16
5/8
3/4
7/8
1
9/8
2
-3/2 -1
-9/8
-7/8
-3/4
-5/8
-1/2
the coordinates of f(2p) satisfy (24) so our contention is proved. Now we are
prepared to show that f: .R; C/ ! ˆ1 .W/ is an isomorphism. The mapping is a
bijection, so it remains only to show that it is a group homomorphism.
Consider:
f .p C q/ D 1 .1 f .p C q// D 1 f .p q/ D 1 f.p/ f .q/ . The last
equality holds if p ¤ q, since we have shown that f(p), f(q) and f .p q/ are
collinear points of W, and it holds if p D q since we have shown that f .2p/ lies on
the tangent to ” at f(p), and thus f.p/ f .p/ D f .2p/. Finally, 1 f.p/ f .q/ D
f .p/ C f .q/ in accordance with the way addition is defined in ˆ1 (W).
Theorem 37 allows us to construct an (R,0) triple system on a Type I cubic by
identifying the point f(p) with p. This construction is illustrated in Fig. 28. The only
finite subgroup of (R,C) is the trivial subgroup f0g. This corresponds to f1g which
is thus the only finite subalgebra of (” 0 ,*). This agrees with the result mentioned
in Theorem 10 which was arrived at by other considerations. Next we do a similar
analysis for a Type II cubic, (Fig. 13).
Theorem 38 Let be a Type II cubic with equation y2 D x3 C x2 as illustrated in
Fig. 13 and let W D .0 / denote the hypercommutative groupoid defined on the
nonsingular points of . Then ˚1 .W/ is isomorphic to the group (R,•) of nonzero
real numbers under multiplication.
Proof The Type II curve ” has one singularity at the origin and one flex point (1)
at2infinity3 on vertical lines. The mapping g: Rn f˙1g ! ”0 n1 defined by g .t/ D
t 1; t t is easily seen to be bijective. Then the mapping f: Rn f0g ! ”0
defined by:
( )
g pC1
p1
if p ¤ 1
f .p/ D (25)
1 if p D 1
88 R.R. Fletcher III
is a bijection. We will show that f is a group isomorphism from (R,•) onto ˆ1 .W/.
Suppose p is a nonzero real number, and let q D pC1 : Then f .1=p/ D g .q/ D
2 p1
q 1; q3 C q D 1 q2 1; q3 q D 1 f .p/ D f .p/. Now we will show
that f(1/p2 ) lies on the tangent to ” at f(p). If p D 1 then f(1/p2 ) D f(p) D f(1) D 1,
and since 1 is a flex we have 1*1 D 1. So the tangent at f(p) D 1
point
contains the point f 1=p2 D 1: If p D 1, then f(1/p2 ) D 1, and f .p/ D g.0/ D
.1; 0/. The point .1; 0/ of ” lies on the
x-axis and has a vertical tangent, so
.1; 0/ .1; 0/ D 1. So, again, f 1=p2 D 1 lies on the tangent to ” at f .p/ D
.1; 0/. If p ¤ ˙ 1, then f(p) D g(q). Using implicit differentiation we obtain that
the slope of the tangent T to ” at f(p) is given by:
3q2 1
mT D : (26)
2q
3q2 1
T W y q q2 1 D x q2 C 1 : (27)
2q
1Cp2
We need to show that f(1/p2 ) satisfies (27). Let w D 1p2
, then f 1=p2 D
g .w/ D w2 1; w3 w , so we must show:
3q2 1 2
w3 w q q2 1 D w q2 : (28)
2q
This can be shown after some considerable algebraic manipulation which we will
spare the reader. Next, let a; b 2 R and suppose f(a), f(b) and f(1/ab) are distinct. We
will show that these three points are collinear. Let q D aC1 I s D bC1 I r D 1Cab , then
2 2 a1 b1 1ab
f .a/ D q 1; q q I f .b/ D s 1; s s , and f .1=ab/ D r2 1; r3 r .
3 3
Let mL denote the slope of the line L through f(a) and f(1/ab), and let mK denote the
slope of the line K through f(b) and f(1/ab). We then obtain:
r2 C q2 C qr 1 r2 C s2 C sr 1
mL D I mK D : (29)
rCq rCs
With a little algebra it is easily shown that mL D mK , and thus the points f(a),
2ˆ
f(b), f(1/ab) are collinear. Now to complete the proof that f W .R; / 1 .W/ is
an isomorphism, suppose a; b 2 Rnf0g. If a D b, then f .ab/ D f a which lies
on the tangent to ” at f(1/a). Thus f a2 D f.1=a/ f .1=a/ D f .1=a/ f .1=a/ D
Geometric Triple Systems with Base Z and Zn 89
10
-1/4 -1/5 14
-1/2 -1/7
-1/12
-1/20 20
-1
-40 1/40
-20 1/20
-2 -10
1/14
-20/7 -4 -5 -7
1/10
1/8
1/7
f .a/ C f .a/. If a ¤ b, then f(ab) D f(1/a)*f(1/b) since the points f(ab), f(1/a) and
f(1/b) are collinear. Then f .ab/ D f .1=a/ f .1=b/ D f .a/ C f .b/.
Theorem 38 allows us to construct an (R,1) triple system on a Type II cubic by
identifying the point f(p) with p. This construction is illustrated in Fig. 29. The only
finite subgroups of (R,1) are f1g and f1; 1g, and thus the only finite subalgebras
of (” 0 ,*) which contain the idempotent element 1 are f1g, and f1; .1; 0/g. By
Theorem 34 a subalgebra S of (” 0 ,*) which does not contain 1 would have an
extension to a subalgebra Q of (” 0 ,*) which does contain 1. If S is finite than
jQj D 3jSj. But there are no such finite subalgebras Q, so we can conclude that f1g
and f1; .1; 0/g are the only finite subalgebras of (” 0 ,*). This is also in agreement
with the result mentioned in Theorem 10.
Theorem 39 Let ” be a Type III cubic with equation y2 D x3 x2 . Let 0
denote the set of nonsingular points of ; let W D ( 0 ,*) denote the corresponding
hypercommutative groupoid and let U denote the group of complex numbers with
modulus 1. Then ˆ1 .W/ is isomorphic to U.
Proof Define g W R ! ”0 n1 by g .t/ D t2 C 1; t3 C t and f W U ! ”0 by:
g cot 2 if z D cos C i sin ¤ 1
f .z/ D : (30)
1 if z D 1
1/PQ P
L
f(Q)
(0,0)
(1,0)
PQ
K
f(1/PQ)
f(P)
sin
y D : Solving together the equations of K and ”, we find that the
cos 1
2 2 sin
coordinates of the point K [ ” are given by 1cos ;
.cos 2 . On the other hand:
1/
™ ™ ™
f .P/ D 1 C cot2 ; cot3 cot : (31)
2 2 2
Now 1=z2 D cos .2™/ C i sin .2™/, so f 1=z2 D g cot 2 D
2 3
1 cos 2
g .cot ™/ D cot ™ C 1; cot ™ C cot ™ D sin2 ; sin3 . We leave it to the reader
to determine that these coordinates do satisfy (32). In the next step we show that
if w; z 2 U and f .w/ ; f .z/ ; f .1=wz/ are distinct, then these three points are
collinear. Suppose first that one of w, z equals 1. Without loss of generality suppose
w D 1. Then f(w) D 1, so we have the points 1, f(z), f(1/z). We have shown
that f .1=z/ D f .z/ D 1 f .z/, so the three points are collinear. If wz D 1 we
obtain the same collinear points f(1/z), f(z), 1, so we can suppose that w, z, wz
are not equal to 1. Let z D cos ’ C i sin ’, and let w D cos “ C i sin “, then
1
wz D cos .’ C “/ C i sin .’ C “/ ; and wz D cos .’ “/ C i sin .’ “/, and:
2 2 sin ˛
f .z/ D ; (33)
1 cos ˛ .cos ˛ 1/2
2 2 sin ˇ
f .w/ D ; and (34)
1 cos ˇ .cos ˇ 1/2
2 2 sin .˛ C ˇ/
f .1=wz/ D ; : (35)
1 cos .˛ C ˇ/ .cos .˛ C ˇ/ 1/2
Let L denote the line through f(z) and f(1/wz), and let K denote the line through
f(w) and f(1/wz). For ease of notation we let a D cos ’; b D sin ’; c D cos “
and d D sin “, then a2 C b2 D 1 D c2 C d2 . Further we let M D 1 cos ’;
N D 1 cos “; Q D 1 cos .’ C “/ and R D sin .’ C “/. Then the slopes of K, L
are then given by:
RM 2 C bQ2 RN 2 C dQ2
mL D 2
m K D (36)
M 2 Q MQ N 2 Q NQ2
3acd bd2 2ad 2a2 cd C 2abcd2 b2 d3 bc C 2bc2 bc3 adc2 C 2a2 d a3 cd C a2 bd2
3abcb2 d2bcC2ab2 cdb3 dadC2a2 da3 dbca2 2abc2 C2bc2 abc3 Cb2 c2 d
After making the substitutions d2 D1c2 and b2 D 1a2 , the expressions in (38),
(39) both simplify to:
Thus mL D mK , and so the points f(z), f(w), f(1/wz) are collinear. Now suppose
w; z 2 U and f(w), f(z), f(1/wz) are distinct.
Then f.wz/ D 1 .1 f .wz// D
1 .f .wz// D 1 f .1=wz/ D 1 f.w/ f .z/ D f .w/ C f .z/. If w D
2 2 2 2
z then
f .wz/ D f z D 1 1 f z D 1 .f z D 1 f 1=z D
1 f.z/
f .z/ D f .z/ C f .z/ :If z D .1=wz/, then w D (1/z2 ) so f .w/ D
f 1=z2 D f.z/ f.z/, and f .wz/ D f .1=z/ D f .z/ D 1 f .z/ D
1 .f.z/ f.z/ f .z/ D 1 f.z/ f .w/ D f .z/ C f .w/. In all cases the mapping
f W U ! ˆ1 .W/ is a homomorphism, and thus an isomorphism.
The finite subgroups of U are all cyclic, so if ” is a Type III cubic, the finite
subalgebras of .”0 / which contain 1 correspond to finite cyclic groups and thus
form (Zn ,0) triple systems with vertex 0 at 1. Suppose S is a finite subalgebra of
.”0 / which does not contain 1. By Theorem 34, S has an extension to a subalgebra
Q of (” 0 ,*) which does contain 1. Q contains a subalgebra M which contains 1
and ˆ1 .M/ is a subgroup of the cyclic group ˆ1 .Q/ with index 3. The points in
S form a coset of ˆ1 .M/ and thus (S,*) is a (Zn ,1) triple system where 3n D jQj.
We summarize these observations in:
Theorem 40 If is a Type III cubic curve, then every subalgebra of .0 / is a
(Zn ,0) or a (Zn ,1) triple system.
Note that the existence of (Zn ,0) and (Zn ,1) triple systems proved in Theorems
11,12,13 is also proved by Theorem 38. It is evidently known, see [3], that if ” is
a Type V cubic, and W D .”; / then ˆ1 .W/ is isomorphic to U, although in this
case we have no explicit formula for the isomorphism. Theorem 40 then applies
also if ” is Type V. In case ” is Type IV, then ˆ1 .W/ is isomorphic to Z2 U, and
besides the (Zn ,0) and (Zn ,1) triple systems, triple systems with base Z2 Zn can
be constructed on ”. The discussion of this last kind of triple system can be found
in [4].
Geometric Triple Systems with Base Z and Zn 93
Figure Appendix
5
3 7
8
1
A B= 9
17
10
15 11
13
12
14
Fig. 31 (Z18 ,0) triple system on Type IV cubic curve with incrementD2
13
17
3
8
4
12
0
14 16
7
10
2
6
11
15
To vertex 5
Fig. 32 (Z18 ,1) triple system on Type IV cubic curve with increment 4
94 R.R. Fletcher III
To vertex 6
5
g
4
1 f=0
2
12 11
10
9
e
8
5
g
4
3
2 f = 0 13
1 12
11
10
e
9
Fig. 34 (Z14 ,0) triple system on Type V cubic with vertex 7 at infinity
References
1. Bix, R.: Conics and Cubics. Springer ScienceCBusiness Media, LLC, New York (2006)
2. Harris, M: Thirdpoint groupoids. Master’s thesis, Virginia State University, (2008)
3. Knapp, A.: Eliptic Curves. Princeton University Press, (1992)
4. Fletcher, R: Geometric Triple Systems with Base Z2 Zn , submitted for publication in Springer
Proceedings in Mathematics and Statistics, (2016)
Geometric Ramifications of Invariant
Expressions in the Binary Hypercommutative
Variety
1 Introduction
x y u v D x u y v (3)
c*d
b
c
a*b
a x
b*d
a*c
γ d
e*d
q
c
b
f
b*c
question then is can we find an eight variable invariant expression which yields
the ninth point of intersection of two cubics ? Consider the seven variable
monotone expression (c*d)*fb *f(e*f)*(g*h)gg whose principal subwords are
invariant, and note that (c*d)*fb * f(e*f)*(g*h)gg D (c*b)*fd*f(e*f)*(g*h)gg
by axiom (3). We have interchanged two variables, one from each invariant
principal subword, and obtained an equivalent expression. We can immediately
conclude that (c*d)*fb * f(e*f)*(g*h)gg is invariant. Now consider the
eight variable expression a * f(c*d)*fb * ((e*f)*(g*h))gg whose principal
subwords are invariant, and note that a*f(c*d)*fb*((e*f)*(g*h))ggDfc*(c*a)g*
f(c*d)*fb*((e*f)*(g*h))ggDfc*(c*d)g*f(c*a) * ((e*f)*(g*h))gg D d* f(c*a) *
((e*f)*(g*h))gg. We have interchanged the a with the d from the second principal
subword to obtain an equivalent expression, and so we can conclude that
a * f(c*d)*fb * ((e*f)*(g*h))gg is invariant. Observe also that a *f(c*d)*fb
* ((e*f)*(g*h)g D fb*(a*b)g* f(c*d)* fb * ((e*f)*(g*h))ggD f(a*b)*(c*d)g*
f(e*f)*(g*h)g so we can conclude that this latter expression is also invariant. In
Fig. 3 we illustrate two cubic curves which meet in nine points, a,b,c,d,e,f,g,h,x
where h is the point at infinity on vertical lines. The figure indicates that x D
f(a*b)*(c*d)g* f(e*f)*(g*h)g, so we have evidence that the invariant expression
f(a*b)*(c*d)g* f(e*f)*(g*h)g yields the ninth point of intersection of two irreducible
cubics which meet in the eight points a,b,c,d,e,f,g,h.
Geometric Ramifications of Invariant Expressions in the Binary. . . 99
a*b d
g (a*b)*(c*d) e*f
a
c*d
x
g*h e
(e*f)*(g*h)
b
The observations of the previous section suggest that invariant expressions in the BH
variety may have significant geometric ramifications regarding the intersections of
cubic curves with algebraic curves of various degrees. It is important then to answer
the following questions: (1) Do invariant expressions exist of any given length ?
(2) Are invariant expressions of the same length equivalent ? The constructions
in Section 2 provide a clue to a general procedure for constructing invariant
expressions.
Theorem 5 Let w be a word in the BH variety and suppose w D (b*c)*v and
v D a*u where u,v are words, v is invariant, and u does not contain the variables
b,c. Then w is invariant.
Proof Consider: w D (b*c)*(a*u) D (b*a)*(c*u). We have interchanged two
variables of w, one from the invariant principal subword b*c and the other from the
invariant principle subword a*u, without changing the value of w. We can conclude
that w is invariant.
Theorem 6 Let w be a word in the BH variety and suppose w D a*v and
v D (b*c)*u where u,v are words, v is invariant, and u does not contain the
variable a. Then w is invariant.
Proof Consider: w D a*f(b*c)*ug D fb*(a*b)g* f(b*c)*ugD fb*(b*c)g*f(a*b)*ug
D c* f(a*b)*ug. We have interchanged the variable a from the first principal
invariant subword (which is just the single variable a) with the variable c from
100 R.R. Fletcher III
the second invariant principal subword, without changing the value of w. We can
conclude that w is invariant.
Theorems 5 and 6 allow us to build the following infinite sequence of invariant
expressions:
E1 D a; E2 D a*b; E4 D (a*b)*(c*d); E5 D e*f(a*b)*(c*d)gD e*E4 ; E7 D
(f*g)*E5 ; E8 D h*E7 ; etc. The subscripts represent the length, i.e., the number of
variables, in the expression. So our sequence contains an invariant expression of
length p precisely when p 1 (mod 3) or p 2 (mod 3). We shall see that no
invariant word can have a length which is a multiple of 3. When we write the word
Ep *Eq we really mean for Ep and Eq to be represented with disjoint variable sets. So,
for example, the notation E4 *E4 represents the word f(a*b)*(c*d)g*f(e*f)*(g*h)g
which we have seen to be invariant, and which we have shown to be equivalent
to a*f(c*d)*fb*((e*f)*(g*h))gg D E1 *E7 D E8 . This observation leads to our next
result.
Theorem 7 If p, q are both congruent to 1 (mod 3) or both congruent to 2 (mod 3),
then Ep *Eq D EpCq , and EpCq is invariant.
Proof Note that when p 2 (mod 3) we have Ep D E1 *Ep-1 , and when p 1
(mod 3) we have Ep D E2 *Ep-2 . Clearly the theorem holds if pCq < 5. Let k
5 and assume inductively that the theorem holds whenever pCq < k. Sup-
pose pCq D k, and p2(mod 3) and q2(mod 3). Then Ep *Eq D (E1 *Ep-1 )*
(E1 *Eq-1 ) D (E1 *E1 )*( Ep-1 *Eq-1 ) D E2 *EpCq-2 D EpCq . In the last equality we
use the fact that pCq 1(mod 3), and in the second to last equality we use
the inductive hypothesis. Now suppose pCq D k, and p 1(mod 3) and q
1(mod 3). Without loss of generality we can assume that q4. Then Ep *Eq D
Ep *( E2 *Eq-2 ) D Ep *(E2 *(E1 *Eq-3 ) since q-2 2(mod 3). Then Ep *(E2 *(E1 *Eq-3 )
D Ep *f(x*y)*(w*Eq-3 )gDfy*(x*y)g*f(y*Ep )*(w*Eq-3 )g D x * f(y*Ep )*( w*Eq-3 )g
D x*(EpC1 *Eq-2 ) D x*EpCq-1 D EpCq . Since pCq 2 (mod 3) or pCq 1 (mod 3),
the word EpCq is invariant.
Let (G,C) be an abelian group with identity 0, and let g be a fixed element of G.
If we define a binary operation * on the elements of G by a*b D g – a – b, then it
is readily seen that (G,*) is a BH algebra. If we take the group of integers (Z,C) for
the abelian group and set g D 0 we obtain a*b D -a – b; (a*b)*(c*d) D aCbCcCd;
e*f(a*b)*(c*d)g D -e – a – b – c – d, etc., and we find that if p 1 (mod 3), then
the valuation of Ep in this model is a sum of the variables which comprise the word
Ep , and if p2(mod 3), then the valuation of Ep is a sum of the inverses of the
variables in Ep . In the former case we say that Ep is positive, and in the latter case
we say Ep is negative. The product of two positive expressions is negative, and the
product of two negative expressions is positive. If a word w D u*v is the product of
a positive expression u and a negative expression v, then w cannot be invariant since
it is not invariant in the integer model. For example, if we take u D (a*b)*(c*d) and
v D (e*f), then u*v D f(a*b)*(c*d)g*(e*f) D (aCbCcCd)*(-e –f) D -a –b – c – d
Ce Cf. This last expression is not invariant in the integer model, for example, if a D
e D f D 1 and b D c D d D 0, then -a – b – c – d C e C f D 0, but -e – f – c – d C a
C b D -1, and thus u*v cannot be invariant. We can conclude that the word Ep *Eq is
Geometric Ramifications of Invariant Expressions in the Binary. . . 101
not invariant if p 1(mod 3) and q 2 (mod 3). In our final theorem of this section
we give a complete determination of invariant expressions in the BH variety.
Theorem 8 A word w is invariant in the BH variety iff w D Ep for some positive
integer p which is not a multiple of 3.
Proof We have shown in Theorems 5 and 6 that Ep is invariant whenever p is not a
multiple of 3. So suppose w is an invariant BH word, and let jwj denote its length.
We proceed by induction on jwj. If jwj D 1 or 2, then w D E1 or w D E2 . If jwj D 3,
then w D E1 *E2 is not invariant since E1 is positive and E2 is negative. Assume
inductively that if an invariant BH word y has 3 jyj<p and jyj not a multiple of 3,
then y D Ejyj . Suppose jwj D p and let u, v denote the principal subwords of w, so
w D u*v. If 3 divides jwj, then it must be that either 3 divides juj or 3 divides jvj.
Suppose without loss of generality that 3 divides juj, but then u is not invariant by
our inductive hypothesis, and as u is a subword of w, the word w also cannot be
invariant. Now suppose p 1 (mod 3), then it must be that juj 2 (mod 3) and
jvj 2 (mod 3). Since w is invariant, the subwords u, v must also be invariant,
and since juj<p and jvj<p, we obtain by the inductive hypothesis that u D Ejuj and
v D Ejvj . Then by Theorem 7, w D Ejuj * Ejvj D EjujCjvj D Ejwj D Ep . If p 2
(mod 3), then juj 1(mod 3) and jvj 1(mod 3), and by the same argument we
obtain w D Ep .
4 Conclusion
m
k L
j
g f*E7
h
j*g
(k*e)*(d*E4) = E7
f
c*m
Q
k*e
(a*b)*( f *E7) = E10
e ( j*g)*(c*m) = E4
d
d*E4 c
x = h*E10
b
a*b a
The high power term in f(t) arises from the term zn in F(x,y,z), and is given
by t3n . The term in f(t) with the next highest power arises from the term xzn-1
in F(x,y,z), and is given by t3n-2 , thus f(t) has no term of degree 3n-1. Since the
parameters t1 , : : : , t3n are roots of f(t), f(t) must also be given by
Since (8) and (9) must be identical, their constant terms must be identical and
thus D -(t1 t2 t3 ).
We conclude that the product of the parameters of three collinear points on
is 1.
This much is given as an exercise in [3]. We will now generalize this result by
replacing the line with an arbitrary algebraic curve Ÿ of degree n. Let F(x,y,z) D 0
be the equation of Ÿ and let P1 , : : : , P3n be the points of ”\Ÿ with parameters t1 ,
: : : , t3n , respectively. These parameters must be roots of the polynomial
g .t/ D F 3t; 3t2 ; 1 C t3 D 0: (10)
The term czn in the equation of Ÿ gives rise to the high power term of g(t),
namely ct3n . The parameters must then also be roots of the equation
The term czn D c(1Ct3 )n also gives rise to the constant term of (10), namely c.
The constant terms in (10), (11) must be identical so we have c D c(-1)3n (t1 t2 : : :
t3n ) which yields
Using the above shown fact that the product of parameters of three collinear
points on ” is -1, we obtain the following results: if s 1 mod 6, then the parameter
of Es is t1 t2 : : : ts ; if s 2 mod 6, then the parameter of Es is (-1)/t1 t2 : : : ts ; if s 4
mod 6, then the parameter of Es is -t1 t2 : : : ts ; if s 5 mod 6, then the parameter of
Es is 1/ t1 t2 : : : ts . If n is odd, then 3n-1 2 mod 6 and E3n-1 has parameter (-1)/t1 t2
: : : t3n-1 D (-1)3n / t1 t2 : : : t3n-1 D t3n in accordance with (12). As a consequence
E3n-1 D P3n as stipulated by Conjecture 9. If n is even, then 3n-1 5 mod 6 and
E3n-1 has parameter 1/t1 t2 : : : t3n-1 D (-1)3n / t1 t2 : : : t3n-1 D t3n , and again we obtain
E3n-1 D P3n .
According to [3] an acnodal cubic can be put in the form z(x2 C y2 ) D y(3x2 –
2
y ) and can then be parameterized by x D cos ¥; y D sin ¥, and z D sin 3¥. It is
then shown that three points on this cubic with parameters ¥1 , ¥2 , ¥3 are collinear
iff ¥1 C ¥2 C ¥3 0 mod , and then it is claimed, without proof, that if six points
with parameters ¥1 , ¥2 , ¥3 , ¥4 , ¥5 , ¥6 lie on a conic, then ¥1 C ¥2 C ¥3 C ¥4 C
¥5 C ¥6 0 mod , and conversely. This last result as well as similar results for
nonsingular cubics we are unable to obtain.
Geometric Ramifications of Invariant Expressions in the Binary. . . 105
References
1. Bix, R.: Conics and Cubics, a Concrete Introduction to Algebraic Curves, 2nd edn. Springer Sci.
and Business Media, LLC, New York (2006)
2. Harris, M.: Thirdpoint groupoids, Masters thesis, Virginia State University, (2008)
3. Hilton, H.: Plane Algebraic Curves. Oxford University Press, Oxford (1920)
Geometric Ramifications of Invariant
Expressions in the Ternary Hypercommutative
Variety
1 Introduction
This article is a sequel to and follows the same format as [2] where geometric
ramifications of invariant expressions in the binary hypercommutative (BH) variety
are examined. The BH variety is an equational class of algebras which satisfies the
identities:
a b D b a (1)
a a b D b (2)
a b c d D a c b d (3)
This variety can also be defined by saying a*b and (a*b)*(c*d) are invariant and
keeping (2) as stated. It can thus be seen that the TH algebra is a ternary version
of the BH variety. As explained in [2], the BH variety has its application in the
study of cubic curves. If ” is an irreducible cubic curve and a,b are nonsingular
points on ”, we define a*b to be the third point, counting multiplicities which lies
on the line ab and on ”. In this interpretation identities (1), (2) are clear. Identity (3)
requires some proof which can be found in [3]. In [2] it is shown that the expression
a*((b*c)*(d*e)) is invariant in the BH variety and in fact yields the 6th point of
intersection of a conic which meets ” in the 5 points a,b,c,d,e. Also in [2] all the
invariant BH words are determined and conjectured to yield points of intersection
of a cubic curve with an arbitrary algebraic curve. We follow a similar procedure
here: we will determine all invariant words in the TH variety with the hope that
similar geometric results may obtain.
[c,e, f ]
b
x
e
[a,b,c]
d c
[a,b,d]
[d,e, f ]
f
D
C
E [A,B,D]
[A,B,C]
X
B
[D,E,F]
A
[C,E,F]
F
Q
3 Protocubic Curves
(2) are satisfied by *. To check identity (3), let a0 , b0 , c0 , d0 be any four points on Ÿ.
Then (a0 * b0 )* (c0 *d0 ) D (a ıb)0 * (c ıd)0 D ((a ıb) ı (c ıd))0 D ([q,a,b]ı[q,c,d])0 D [
[q, [q,a,b],[q,c,d] ]0 D [ [q, [q,a,c],[q,b,d] ]0 D ([q,a,c]ı[q,b,d])0 D (a ı c)0 * (b ı d)0
D (a0 * c0 )* (b0 * d0 ) D ((a ı c) ı (b ı d))0 D (a0 * c0 )* (b0 * d0 ).
Theorem 2 Every protocubic curve is an irreducible cubic curve.
Proof Let Ÿ be protocubic and let p be a nonsingular nonflex point of Ÿ. We
construct a (Z,1) triple system on Ÿ as follows. Choose point p as vertex 0 and let
vertex 1 be the point 0*0. Let vertex -1 D 1*1; let 2 D 0*-1 and -2 D 1*2. If k 3
and vertices f0, ˙ 1, ˙ 2, : : : , ˙ (k-1)g have been assigned to points on Ÿ, let (i)
k D 0*(-kC1), and (ii) -k D 1*k. We assume that vertex 0 (the generating vertex) is
chosen so that no point on Ÿ is assigned more than one integer label. In [5] it is shown
that this construction produces a (Z,1) triple system on Ÿ in case Ÿ is an irreducible
cubic curve, but the proof only employs the identity (3) which characterizes a BH
algebra. Thus the proof given in [5] is equally valid if we assume only that Ÿ is
protocubic. It is also shown in [5] that the vertices of a (Z,1) triple system must lie
on an irreducible cubic curve. Let ˜ denote the irreducible cubic which contains the
vertices of the (Z,1) triple system we have constructed on Ÿ. Then the irreducible
algebraic curve Ÿ intersects the cubic ˜ in infinitely many points. This can only
happen if ˜ is a factor of Ÿ, but since Ÿ is irreducible we must have that the two
curves are identical, and thus Ÿ is an irreducible cubic.
Now putting Theorems 1 and 2 together we have:
Corollary 3 Every supercyclic curve is the inverse of an irreducible cubic
curve.
Irreducible cubic curves belong to five Types in accordance with the classification
given in [3]. Type I are those cubics which can be transformed into y2 D x3 ; Type
II are cubics which can be transformed into y2 D x2 (xC1); Type III are those which
can be transformed into y2 D x2 (x-1). These three types are singular, each with a
single singularity; Type I curves have a cusp; Type II curves have a self-crossing
point known as a crunode, and Type III curves contain an isolated point called an
acnode. Type IV curves are those which can be transformed into y2 D x(x-1)(x-w);
w>1, and Type V are those which can be transformed into y2 D x(x2 C kx C 1); -2
< k < 2. Types IV and V are nonsingular; Type V cubics consist of one connected
component when regarded in the projective plane, and Type IV cubics have two
connected components: the bell and the oval. If Ÿ is Type IV, then the bell of Ÿ is
a subalgebra of (Ÿ,*). Now suppose Ÿ is the inverse of a supercyclic curve ” by a
circle ¨ with center q on ”. By Corollary 3, Ÿ is an irreducible cubic, but also as the
inverse of a supercyclic curve, it is supercyclic. It is shown in [6] that Ÿ contains a
single point at infinity which we denote by 1. From the collinear triple fa,b,a*bg
112 R.R. Fletcher III
In (5) we must have at least one of a, b nonzero, else we no longer have a cubic.
Also we assume that the coefficients are chosen so that (5) remains irreducible. In
this section we would like to show that every irreducible self-inversive cubic curve
is supercyclic. In case (5) represents a nonsingular cubic Ÿ, it is shown in [6] that
Ÿ is supercyclic, so we need only consider here the singular case. Suppose Ÿ is an
irreducible singular cubic which inverts onto itself via the unit circle ¨. A singular
cubic has a unique singularity. For the curve Ÿ, this singularity must invert onto
itself and so must lie on ¨. By rotating Ÿ about the origin, we may assume that
this singularity occurs at the point (1,0). Starting with (5) as the equation for Ÿ, and
assuming Ÿ has its unique singularity at (1,0), we will develop a formula for Ÿ. Since
(1,0) lies on (5), we immediately obtain 2a C e D 0. Since (1,0) is a singular point
we must have I(1,0) (L, F(x,y)) 2 for all lines L through (1,0). (The notation I(1,0) (L,
F(x,y)) denotes the intersection multiplicity of L and F at (1,0).) If L has slope m,
then the equation of L is given by G(x,y) D y – m(x-1) D 0. Translating so that the
singularity lies at the origin, we obtain:
This, in accordance with [3], is given by the smallest positive degree of H(x,mx),
where H(x,y) is the underlined portion of (6), Consider:
H .x; mx/ D .axCaCbmx/ x2 C2xC2Cm2 x2 –2a x2 C2xC1 Cfmx .xC1/
(7)
Cg m2 x2
For the smallest positive degree of (7) to be larger than or equal to 2, we must
arrange for the coefficient of x in (7) to be 0. This yields m(2b C f) D 0, so either
f D -2b or m D 0. In case m D 0, (7) becomes H(x,0) D ax3 C ax2 which already
has a zero coefficient for x. Making the substitutions e D -2a and f D -2b in (5) we
obtain:
F .x; y/ D .ax C by/ x2 C y2 C 1 2ax2 2bxy C gy2 D 0 point at .1; 0/ (8)
114 R.R. Fletcher III
As the equation of an irreducible cubic curve which inverts onto itself through
the unit circle, and which contains a singular point at (1,0). To be complete we must
also consider the possibility that L is vertical. For this we need to insure that I(0,0) (x,
H(x,y)) 2. The following Properties given in [3] will be needed to compute the
desired intersection multiplicity.
P1: I(0,0) (x,y) D 1,
P2: I(0,0) (F,G) D I(0,0) (F, G C FH)
P3: I(0,0) (F,GH) D I(0,0) (F,G) C I(0,0) (F,H)
P4: If the curve g does not contain the origin, then I(0,0) (F,G) D 0.
Now consider: I(0,0) (x, H(x,y)) D I(0,0) (x, (a(xC1)Cby)(x2 C 2x C 2 C y2 ) -
2a(xC1)2 C f(xC1)y C gy2 )D I(0,0) (x, (aCby)(2 C y2 ) – 2a Cfy C gy2 C xK(x)
where K(x) is a polynomial in x only. In Property P2 we let FD x; GD (aCby)(2 C
y2 ) – 2a Cfy C gy2 C xK(x), and H D -K(x) to obtain:
I.0;0/ .x; H .x; y// D I.0;0/ x; .a C by/ 2 C y2 –2a
C fy C gy2 D
I.0;0/ x; .a C g/ y2 C .2b C f/ y C by3 D I.0;0/ x; y by2 C .a C g/ y C .2b C f/ :
(9)
Now using Properties P1, P3 we obtain: I(0,0) (x, H(x,y))D I(0,0) (x, y) C I(0,0) (x,
by2 C (aCg)y C (2bCf)) D 1 C I(0,0) (x, by2 C (aCg)y C (2bCf)). If by2 C (aCg)y
C (2bCf)) does not contain the origin, then by Property P4, I(0,0) (x, by2 C (aCg)y C
(2bCf)) D 0 and thus I(0,0) (x, H(x,y))D 1. Since we require I(0,0) (x, H(x,y)) 2, it
must be that by2 C (aCg)y C (2bCf)) contains the origin, and thus 2b C f D 0. We
again obtain f D -2b and thus confirm (8) as the general equation of an irreducible
cubic curve Ÿ which inverts onto itself via the unit circle, and which contains its
unique singularity at (1,0).
We will invert (8) by a unit circle with center at the singular point (0,1). To do
this we will translate (8) so that the singularity lies at the origin, and then invert
through the unit circle. The desired translation is given by:
In the equation:
ax C by C ax2 C .a C g/ y2 D 0; (12)
aCg 2 b
x2 C x C y C y D 0: (13)
a a
By taking (10) for M(x,y) in (14) the reader may wish to verify the above-
mentioned results. Since x2 C y2 is a factor of the high power terms in (5), this
is an example of a circular cubic. In [8] it is shown that a circular cubic Ÿ is self-
inversive with respect to four mutually orthogonal circles. If Ÿ is Type IV, then three
of the circles with respect to which it is self-inversive are real. These real circles
are also described in [6]. The fourth circle is unreal but has a real center on Ÿ at the
radical center of the three real circles. In [6] this point is described as the center of a
circle which antiinverts Ÿ onto itself. (The antiinverse of a point P with respect to a
real circle ¨ with center O is the reflection through O of the inverse of P with respect
to ¨.) If Ÿ is Type V, then only two of the four self-inverting circles are real and these
are orthogonal. If Ÿ is Type I, then it is the inverse of a parabola by a point on the
parabola. The axis of symmetry of the parabola inverts into a circle which inverts
Ÿ onto itself. If the center of inversion is taken as the intersection of the axis of the
parabola with the parabola, then Ÿ reflects onto itself via the same axis. Thus Ÿ either
inverts onto itself via one real circle, or has a single axis of symmetry. If Ÿ is Type
II, then Ÿ is the inverse of a hyperbola. The two axes of symmetry of the hyperbola
invert either to two orthogonal circles which invert Ÿ onto itself or possibly to two
perpendicular axes of symmetry of Ÿ, or even to one axis of symmetry and to one
self-inverting circle with center on this axis. Similar conditions occur in case Ÿ is
Type III and thus the inverse of an ellipse. In light of Theorem 4, these same self-
inversive or reflective properties also apply to supercyclic curves. So we have:
116 R.R. Fletcher III
6 Bicircular Quartics
Our Eq. (5) represents a circular cubic. It is given in [8] that the inverse of a circular
cubic with respect to a circle with center on the cubic is again a circular cubic,
and the inverse with respect to a circle with center not on the cubic is a bicircular
quartic. A bicircular quartic is an algebraic curve of degree 4 which can be put into
the form
2
x2 C y2 C ax2 C by2 C 2gx C 2fy C c D 0: (15)
δ
δ'
β
α = α'
β' w
α = α'
γ'
w δ
δ'
β
δ β'
δ'
7 Invariant Expressions
This is all that is needed to show that N11 is invariant. It suffices, in general,
to show that two variables can be interchanged between each pair among the
three principal subwords of a TH word, provided each principal subword is itself
invariant. Let k 2 and assume inductively that the expressions N8tC3 and P8tC1 are
invariant when t < k. Consider:
Œ Œ a; b; c ; Œ d; e; f ; Œ g; h; P8.k1/C1 D Œ Œ g; b; c ; Œ d; e; f ; Œ a; h; P8.k1/C1 ;
We have interchanged the variable a with the variable e from the invariant word
P8kC1 , which suffices to show N8kC3 is invariant. By induction we have proved
Theorem 8 The expressions N8kC3 D [P1 , P1 , P8kC1 ] and P8kC1 D [N3 , N3 , N8k-5 ]
are invariant in the TH variety for each positive integer k.
Geometric Ramifications of Invariant Expressions in the Ternary. . . 119
Theorem 9 If q,r,s are positive integers each congruent to 1 (mod 8), then [Pq , Pr ,
Ps ] D NqCrCs and if t,u,v are positive integers each congruent to 3 (mod 8) , then
[Nt , Nu , Nv ] D PtCuCv .
Proof We can suppose qr9 with q,r 1 (mod 8). The theorem is clearly true if
qDrDsD1 or if t D u D v D 3. It is also true by definition in case two from among
fq,r,sg equal 1, or if two from among ft,u,vg equal 3. Assume inductively that [Px ,
Py , Pz ] D NxCyCz and [Nx , Ny , Nz ] D PxCyCz if xCyCz < qCrCs. We can suppose
q r 9. Consider:
Pq ; Pr ; P1 D Pq ; Pr ; y D Pq ; N3 ; N3 ; Nr-6 ; y
i
D Œ Œ Pq ; w; z ; w; z ; ŒŒx; w; z ; N3 ; Nr-6 ; y
D Œ Œ x; w; z ; w; z ; Pq ; w; z ; N3 ; Nr-6 ;
i
y DŒ x; y; NqC2 ; N3 ; Nr-6 DŒ P1 ; P1 ; PqCr-1 D NqCrC1 :
Note that in the last step we have used the inductive hypothesis since (qC2) C 3
C (r-6) D rC q – 1 < qCrCs.
We have shown
Now suppose s, q, r are positive integers, each congruent to 1 (mod 8), and with
qr9. Consider:
i
Pq ; Pr ; Ps D Pq ; N3 ; N3 ; Nr-6 ; Ps D Œ Œ Pq ; w; z ; w; z ; ŒŒx; w; z ; N3 ; Nr-6 ; Ps
D Œ Œ Œx; w; z ; w;
z ; Œ Pq ; w; z ; N3 ; Nr-6 ; Ps D Œ x; Œ NqC2 ; N3 ; Nr-6 ; Ps
D PqCr-1 ; Ps ; P1 D NqCrCs :
The last equality is due to (16). Finally suppose t,u,v are positive integers each
congruent to 3 (mod 8). Consider:
We have shown
Now suppose t,u,v are positive integers each congruent to 3 (mod 8). Consider:
120 R.R. Fletcher III
8 Conclusion
Our main purpose is to present the following Conjecture involving the intersection
of certain supercyclic curves with certain algebraic curves.
Conjecture Let ” be a bicircular quartic curve and let Ÿ be an arbitrary algebraic
curve with odd degree n D 2tC1. Suppose ” and Ÿ meet in 4n real points A1 , A2
, : : : , A4n , then the valuation of the word E4n-1 D E8tC3 at A1 , A2 , : : : , A4n-1
equals A4n .
In Figs. 5 and 6 we present evidence for the Conjecture. In Fig. 5 the quartic ”
meets the cubic L in the 12 points A,B,C,D,E,F,G,H,J,K,L. The invariant expression
E11 is evaluated in the form
F P9
[A,I,K] D
E
G H
I
[B,D,J]
[C,F,L]
L
K J
J I
γ D L
E
[C,G,L]
[I,E,F]
C
H
E9
K
[J,D,K]
It can be seen that the valuation of E11 yields the remaining point of intersec-
tion G.
In Fig. 6 the quartic ” is the inverse of a hyperbola by a point not on the
hyperbola. The three pronged curve Ÿ is a typical cubic designed so that its
intersection with ” contains the maximum number (12) of real points. The points
of intersection are labeled A,B,C,D,E,F,G,H,I,J,K,L and the invariant word E11 is
evaluated in the form
From the figure we see again that E11 evaluates to H, the remaining point of
intersection of ” and Ÿ.
Interestingly, the Conjecture seems to apply only to bicircular quartics and not
two the other two categories of supercyclic curves, namely noncircular conics and
circular cubics. It cannot be expected to work in the case of conics if, for example,
we let our algebraic curve Ÿ consist of an odd number of lines. Since we can
freely change the second point of intersection of one of the lines, it is clearly
impossible to use all but one of the intersection points to predict the remaining
point of intersection. It is not clear why the Conjecture fails in case ” is a circular
cubic.
References
1. Fletcher, R.: Group Circle Systems on Conics, New Frontiers of Multidisciplinary Research in
STEAM-H, vol. 90. Springer International Publishing (2014)
2. Fletcher, R.: Geometric Ramifications of Invariant Expressions in the Binary Hypercommutative
Variety, submitted for publication, Springer (2016)
3. Bix, R.: Conics and Cubics. Springer, New York (2006)
4. Pedoe, D.: Geometry, a Comprehensive Course. Cambridge University Press, Cambridge (1970)
5. Fletcher, R.: Geometric Triple Systems with Base Z and Zn , submitted for publication, Springer
(2016)
6. Fletcher, R.: Self-Inversive Cubic Curves. In: Mathematical Sciences with Multidisciplinary
Applications, vol. 157, Springer Proceedings in Mathematics and Statistics (2016)
7. Robinson, D.: Self-inversive properties of group circle systems, Masters thesis, Virginia State
University Library (2015)
8. Hilton, H.: Plane Algebraic Curves. Oxford University Press, Oxford (1920)
The Psychoneuroimmunological Influences
of Recreational Marijuana
Abstract Background: Marijuana is the most widely used illicit substance in the
USA and self-reported use has remained steady over the past decade. Numer-
ous publications examine the influence of marijuana use on various facets of
human physiology including neurocognitive function, immune function, and illness
symptom control, each discussing marijuana’s influence in a narrow or compart-
mentalized fashion. However, there is a scant literature discussing the empirical and
clinical implications of the intersection of these constructs. The primary objective
of this review is to review and synthesize this disparate literature and propose
future research directions. Thus, this review examines the literature that relates the
influence of marijuana to: (1) neurocognitive function; (2) immune function; (3)
treatment uses; and (4) propose future directions.
Methods: Clinical and nonclinical empirical studies were collected and utilized
to inform this review. The authors used PubMed search engine as the primary
mechanism used to identify relevant articles.
L. Keen II ()
Department of Psychology, Virginia State University, 1 Hayden Drive, PO Box 9079,
Petersburg, VA, 23806, USA
e-mail: [email protected]
A.D. Turner
Department of Behavioral Sciences, Rush University Medical Center, 1653 W Congress Pkwy,
Chicago, IL, USA
e-mail: [email protected]
D. Pereira
Department of Clinical and Health Psychology, University of Florida, 1225 Center Drive,
Gainesville, FL, USA
e-mail: [email protected]
C. Callender
College of Medicine, Howard University Hospital, 520 W St NW, Washington, DC, USA
e-mail: [email protected]
A. Campbell
Department of Psychology, Howard University, 2400 Sixth St NW, Washington, DC, USA
e-mail: [email protected]
1 Introduction
Marijuana is the most widely used illicit drug in the USA, with approximately 5.7
million people above the age of 12 reporting daily marijuana use over the past year
[1]. Approximately 19 million individuals report using marijuana in the past 30 days
[1] and nearly 9% of individuals who use marijuana meet the criteria for dependence
or abuse [2]. Marijuana has been used for various recreational and medicinal reasons
for over 200 years [3]. In fact, it is possible that the cannabis plant has been used for
medical purposes since 2737 BC [4] and may be the oldest psychotropic drug [5].
Given the recent movement for the legalization of marijuana in the USA over
the last decade, 23 states and the District of Columbia have legalized marijuana in
some form, which portends an increase in marijuana users in the coming years. This
forecast is based on the idea that marijuana use is directly related to changes in the
risk of legal punishment [6]. With decreases in legal ramifications for marijuana use
or possession, more individuals may report using. As the routes of administration
expand from smoking marijuana to utilizing edibles and vaporizing butane hash
oil, marijuana use is becoming widely more acceptable than in previous decades.
Additionally, the National Institute on Drug Abuse has suggested that given the
evolution of marijuana growth, marijuana may actually be increasing in Delta 9-
tetrahydrocannabinol (THC), the main psychoactive compound in marijuana [2].
This idea has not been well examined in the epidemiological or psychopharmaco-
logical literature, as many studies are focusing on any use of marijuana and not
examining the specified types used recreationally. This suggests that individuals
who are newly initiated into marijuana use may be at higher risk for any negative
effects of the drug [2].
In general, marijuana is seen as a “gateway” drug, leading to subjectively more
harmful drugs [7]. However, this position has become more controversial, given
competing theories [8, 9]. Empirically, there have been many studies examining
marijuana’s influence on various physiological states [10], pathological conditions
[11], and neurocognitive outcomes [12]. However, to date, researchers have not
examined the intersection among these constructs and their subsequent potential
influences on health outcomes. This notion is substantiated by a PubMed search
The Psychoneuroimmunological Influences of Recreational Marijuana 125
Overall, there is a large amount of research that examines marijuana use with
decision-making processes [13], a cellular literature that examines marijuana use
and disease susceptibility [14], but the authors are unaware of any current studies
that incorporate each of these components in the same statistical or theoretical
model. Historically, previous research have attempted to provide interdisciplinary
models, such as the psychoimmunological model, which calls for an integration of
psychological factors in addition to immune factors to elucidate the mechanisms
involved in disease conditions [15]. There are models that include the physiological
systems needed for a comprehensive view of marijuana’s influence on the human
body, such as Maier and Watkins [16] posited bidirectional pathway that connects
the immune system to the brain. The authors suggest that through this bidirectional
pathway, much of the complex interplay between psychological phenomena and
adaptive immune response can be examined. Unfortunately, these authors did
not include an environmental or behavioral component that could account for
substance use. There are conceptual models that would fit this paradigm, such as the
biopsychosocial model, which attempts to integrate various mechanisms in order
to mitigate disease or identify primary vectors [17]. The current review looks to
present different components in the empirical literature in hopes of substantiating
a psychoneuroimmunological model of recreational marijuana use and infectious
disease susceptibility.
Marijuana contains over 60 different cannabinoids, but only two constituents are
currently the main focus of research: THC and cannabidiol (CBD). Previous
research suggests that this is due to the role of THC as the main psychoactive
constituent and CBD’s role as the most abundant naturally occurring constituent [18,
19]. While CBD does not appear to impair cognition [20, 21], THC is thought to be
126 L. Keen II et al.
the primary constituent that influences neurocognitive performance [22, 23]. THC
binds to the Cannabinoid-1 (CB1) receptors, which are distributed in various areas
of the central nervous system. Generally, CB1 receptors are found presynaptically,
in cortical areas that are responsible for the behavioral and pharmacological effects
of marijuana use. These areas include the dorsolateral prefrontal and orbitofrontal
regions, motor areas, hippocampus, amygdala, the striatum, and the cerebellum
[19, 24]. The preponderance of CB1 receptors in the central nervous system
suggests that the introduction of exogenous cannabinoids in the human body would
interfere with normal neurocognitive processes governed by these brain regions
when levels of this substance exceeded values required for normal functioning of the
cannabinergic system [22, 25]. For example, due to the high densities of the CB1
in the cerebral cortex, the hippocampus, and the basal ganglia, previous research
suggests that cannabinoids are involved in attentional and memory processes, as
well as in executive functions as these areas are the neural substrates for these
specific neurocognitive domains [12, 26–28]. Much of the early research into the
neurocognitive consequences of marijuana use focused on acute intoxication with
the inference that it leads to impairments in memory and attention (see [29, 30] for
review). However, later examinations, as with this review, focus more on the non-
acute effects, which are less clear cut but show more diffuse deficits.
Neuroimaging studies have begun to examine the neural substrates underlying the
neurocognitive consequences of marijuana use, with varying results. Specifically,
resting state examinations using positron emission tomography (PET) during acute
intoxication have shown an increase in global metabolism and regional metabolic
increases in the orbitofrontal cortex, prefrontal cortex (PFC), and basal ganglia in
long-term marijuana users which was not seen in nonusers [31–35]. Moreover, while
there were minimal to no differences between groups on task performance, PET and
functional magnetic resonance imaging (fMRI) studies involving neurocognitive
challenge have reported differential activation during executive functioning and
memory tasks between recently abstinent marijuana users and nondrug using
controls. For example, PET examinations have indicated that chronic marijuana
users show decreased blood flow in the PFC, increased blood flow in the cerebellum,
and altered lateralization of the hippocampus for memory tasks when compared
to nondrug using controls [36]. Previous research utilizing PET also suggests
hypoactivity in the anterior cingulate and prefrontal cortices, and hyperactivity in the
hippocampus during executive functioning tasks [37]. Interestingly, neither Block
et al. [36] nor Eldreth et al. [37] found differences in the actual performance on the
neurocognitive tasks, despite the differential activation in different cortical regions.
Examinations of brain activation in recently abstinent chronic marijuana users using
fMRI indicate increased activation in the PFC, anterior cingulate, and basal ganglia
when compared to controls [38–40]. This line of research posits that both resting
The Psychoneuroimmunological Influences of Recreational Marijuana 127
use on cognition is temporary and reversible [60–62], while others indicate that
impairments are still seen 28 days to 3 months after last marijuana use and that
deficits may increase as years of regular marijuana use increase [37, 45, 63].
These inconsistencies may stem from differences in methodology. For example,
it has been indicated that examinations of non-acute effects of marijuana on
cognition suffer from possible methodological issues surrounding the parameters
of marijuana use. The specific parameters mentioned were frequency of marijuana
use, duration of marijuana use, and age of onset of marijuana use [64]. Each of
these parameters is associated with neurocognitive dysfunction when examined
separately; therefore, examining a population that is heterogeneous on any of
these parameters could confound results. However, the more likely culprit in these
inconsistencies may be the subtlety of deficits shown by marijuana users, especially
given that neuroimaging research indicates that marijuana users show metabolic and
activation differences even in the absence of performance differences. Moreover,
adult marijuana users who initiated use before 16 years of age have been associated
with increased cortical activation possibly reflecting more effort due to suboptimal
cortical efficiency during neurocognitive challenge [65]. These results coupled with
findings that memory deficits are more pronounced in younger marijuana samples
suggest that the maturing brains of teenagers may be more vulnerable to the harmful
effects of marijuana use on the brain and show lasting effects [22]. Overall, the
considerable variability among the findings presented in the literature regarding the
long-term effects of marijuana use on cognition sets a solid foundation to begin
exploring the potential moderators or more proximal factors in this relationship.
Numerous researchers have explored the relationship between marijuana (or its’
constituents) and immune function over the past 35 years. Most of the literature is
based on experimental research in laboratory settings that involve in human and
murine vitro studies (for review, see [14, 66]). Previous research points to the
inhibitory influence of cannabinoids anti-inflammatory or modulatory properties
on the cytokine network. The endocannabinoid system has been suggested to be
associated with the modulation of the cytokine network. However, the literature
also points to the exogenous cannabinoids as the potential immunosuppressant [67].
Very few studies have examined the acute effects for marijuana smoking on immune
cells, but there is also a dearth of literature examining long-term effects of marijuana
use on immune system cells or function [68]. This is imperative to examine, given
that marijuana is used recreationally by many with age of initiation of use as
early as 12 years old [1]. With so many individuals using marijuana recreationally,
even inconsistent use or sporadic use, researchers should explore marijuana use
in the context of subsequent immunological effects. Differences in patterns of use
The Psychoneuroimmunological Influences of Recreational Marijuana 129
Fig. 1 The influence of marijuana on the peripheral and central nervous systems. This figure
details cortical immune functions in each region or area
CB2 are in close relation to various cells of the immune system and are typically
seen in the pancreas and the lymphoid system [73]. CB2 are suggested to act as
a function of immunosuppressant or modulation [74]. In both animal and human
models, the majority of the literature suggests CB2 as anti-inflammatory based on
various types of immune cells and health conditions [19]. Though THC is known
to activate the CB1 and CB2 receptors and use them to signal throughout the
endocannabinoid network, CBD, the non-psychoactive component in marijuana,
does not typically activate these receptors. Interestingly, CBD is suggested to have
anti-inflammatory effects [75].
Marijuana and its’ biologically active constituents have been associated with various
types of immune cells (for review, see [76]). Overall, marijuana is associated with
decreases in lymphocyte function [77], lung alveolar macrophage function, and
granulocyte-macrophage colony-stimulating factor [78], TNF-alpha [78, 79], IL-6
[78, 80, 81], IL-8 and neutrophils [82], Natural Killer (NK) cells function [83–
85], IL-2 [83, 84], and IL-10 [83], Transforming Growth Factor B-1 [84], and
IL-17 [81]. Interestingly, Monnet-Tschudi et al. [86] reported an upregulation of
IL-6 48 h after a single administration of THC within a murine model. CBD and
THC both have been suggested to have immunosuppressive effects as constituents
of marijuana. However, the literature suggests that immune cells, or systems they
directly influence, may be slightly different [87].
THC, the psychoactive constituent of marijuana, is associated with various agents
within the immune system (for review, see [88]). THC is associated with suppressed
Natural Killer (NK) cells function [89], CD40 ligand [90], IL-8, TNF, IFN [91], T
cells, IFN, and mRNA related to Th1 cytokine production [92], IL-12 [93, 94], TNF
[95, 96], T cells, and mRNA related to Th1 cytokine production [92]. In murine
models, researchers have reported an inverse relationship between THC and IL-
2 [97], natural killer cells [98], increases in Th2 antibodies and decreases in Th1
antibodies [99], NK cells, IFN, IL-2, T and B lymphocytes [100], IL-12 and IFN
[101, 102], IFN [103, 104], IL-6 [105], and Th1 related dendritic cells [106].
Verhoeckx et al. [107] discussed the potential damage done by THC through
marijuana use and suggested exploring THC-acid as it may be metabolized via a
different pathway. THC-acid is a chemical, when burned, converts to THC. These
researchers reported that THC-acid not only inhibited TNF levels but did so for a
longer period of time than THC.
THC was not associated with IL-2 function [77]. THC and CBD have also been
shown to increase the expression of IL-10, an anti-inflammatory cytokine [81].
Moreover, THC was reported to increase mRNA levels for Th2 cytokine levels [92].
In murine models, THC is reported to upregulate IL-4 and IL-10 [108, 109], IL-4
[101], IL-10, and TGF-“ [104]. See Table 2 for a listing of the cells influenced by
marijuana.
The Psychoneuroimmunological Influences of Recreational Marijuana 131
To date, very few published studies have explored this relationship at the
epidemiological level. Among these studies, self-reported lifetime use of marijuana
use was found to be associated with lower levels of IL-6 [80] and TNF [79].
In addition, there are very few epidemiological studies that have explored the
relationship between marijuana use and inflammatory markers, specifically [79, 80,
132 L. Keen II et al.
110–112]. Of these, Alshaarawy and Anthony [110] have the largest sample, uti-
lizing a population-based sample. These researchers reported that recent marijuana
use was associated with lower C-Reactive Protein (CRP) levels in a nonclinical,
predominately White sample. In contrast to Alshaarawy and Anthony [110],
Costello et al. [112] reported a positive association between CRP and marijuana use
in the past 3 months among children aged 9–21 years in a longitudinal examination.
However, these researchers also reported that this association did not survive
correction for covariates. Additionally, Rajavashisth et al. [113] found that higher
levels of CRP were associated with non-marijuana users in comparison to former
and frequent users in a sample of predominately White, middle-aged population-
based study. In contrast to these inverse associations between marijuana use and
inflammatory markers, Muniyappa et al. [111] reported that chronic marijuana
users have higher CRP levels than their non-marijuana using counterparts in a
small sample matched on age, sex, and BMI. Taken together, these studies begin a
foundation for epidemiological exploration of marijuana and immune function. This
line of research will allow for the examination of incidence of infectious disease
conditions associated with various patterns of marijuana use. Potential findings
could inform clinical trials and subsequent prevention or intervention programs that
are based on biobehavioral processes and not just pure epidemiological constructs.
In 1964, THC was isolated and utilized to control nausea during chemotherapy [3].
After the discovery of the endocannabinoid system [120], clinicians and researchers
began to elucidate the therapeutic nature of marijuana and its constituents [72].
Moreover, with the budding exploration of marijuana as a therapeutic agent, few
regions of the USA have begun employing medical marijuana programs to distribute
marijuana for medicinal purposes. Medicinal marijuana users who are approved for
these programs: (1) are individuals with more severe symptomatology or diseases;
(2) may be individuals with a history of substance use; (3) may potentially develop
dependence or have negative health outcomes based on the medicinal marijuana use
[121]. In addition to the decreases in physiological symptomatology, improving the
quality of life for patients with severe or chronic conditions may also play a critical
role in the rise of medicinal marijuana usage. In the alleviation of pain, palliative
care looks to improve the quality of life for the patient as much as possible. This
raises a very interesting discussion, as there are two clear sides to the conversation
regarding medicinal marijuana use. One side cites various side effects and the
potential harmful effects of marijuana use in any capacity. While the other speaks to
the quality of life for the truly suffering patients and weight the alleviation of disease
symptomatology more than the short-term effects of marijuana use. Philipsen et al.
[122] coin this debate Nonmalfeasance (“First, do no harm”) versus Beneficence
(“Do all the good you can”).
Overall, the literature exploring the therapeutic potential for marijuana and its
constituents is growing. Such conditions include but are not limited to neurodegen-
eration, irritable bowel syndrome, brain injury, arthritis, and vascular inflammation
(for review, see [123, 124]). The underlying theme for the relationship between
marijuana’s therapeutic utility and these conditions is the inflammatory function
proximal to each condition.
Endocannabinoids control various central nervous system and peripheral nervous
system functions, such as movement, memory, cognitive function, neuroendocrine
secretion, and immune system modulation [72]. Endocannabinoids also have the
ability to regulate neurotransmission, which may be the key in neurological diseases
such as multiple sclerosis or Parkinson’s disease where you have overactive
neurotransmission. Previous research posits that marijuana does not present harmful
or negative outcomes, as long as it is used in moderation [125]. Much of the focus
has been on marijuana’s mitigating influence on various disease symptoms (nausea,
appetite, etc.); however, there is a growing literature examining the antitumoral
function of THC within cancer [126].
Given the anti-inflammatory effects of THC, various medical fields have begun
exploring the treatment usages. For example, Gaffal et al. [103] reported that topi-
cally applied THC may attenuate inflammation related to allergy in an experimental
murine sample in the field of dermatology. Previous research has reported that
marijuana use may improve Hepatitis C virus treatment adherence and reduce the
likelihood of virologic relapse after treatments [125]. Marijuana has been reported
134 L. Keen II et al.
to decrease disease activity and even reduce the need for prescribed medication
in individuals with Crohn’s disease [127]. Further, within the Naftali et al. [127]
examination of marijuana’s influence on Crohn’s disease, researchers posited that
it was not only the anti-inflammatory effects of marijuana that aided in disease
symptoms amelioration, but the gastrointestinal effects (i.e., reduction in diarrhea)
as well. Interestingly, a recent study reveals that an ultralow dose of THC may
reduce myocardial damage if administered before or up to 24 h after induced
myocardial infarction in mice [128]. This finding suggests a potential cardiopro-
tective component of marijuana use, seemingly in dose–response relationship.
Utilizing smoking marijuana as the primary route of administration may deter
various health professionals from promoting its health benefits. In the addiction
literature, one commonly sees the use of marijuana paired with other illicit drugs
or legal substances such as alcohol. However, smoking may be the preferred route
of administration due to the efficiency in receiving the desired effect. Specifically,
smoking introduces the exogenous cannabinoids to the bloodstream faster, yielding
the sought anti-inflammatory effect. Nevertheless, some researchers suggest that
consuming marijuana orally may have the same potent influence as smoking [127].
This may be critical if the goal is to alleviate pain, nausea, or any other symptoms
in the gut.
5 Conclusions
for consumption, the dosage of THC and other chemicals must be regulated and
studied further. As individuals are gaining freedom to access/use marijuana legally
in various forms, policy makers and individuals involved in regulating marijuana
in the USA may need to examine if there are increases in polysubstance uses.
Marijuana use is associated with the constructs reported in this review; however, the
literature does not discuss how polysubstance users immune, neurocognitive, and
disease susceptibility vary by substance grouping. Recreational use of marijuana
has varied effects on the human anatomy. Identifying different mechanisms from
various fields of research may elucidate the nexus of influence that surrounds
recreational marijuana use. This identification may work through models such as the
biopsychosocial model, which incorporates physiological, psychological, and social
factors that may be applied to the examination of marijuana and potential disease
effects or development. At a cellular level, marijuana has both immunosuppressive
and anti-inflammatory effects. However, negative effects of marijuana use include
risk of opportunistic infections among individuals with impaired cell-mediated
immunity as well as impaired neurocognitive functioning across recreational and
chronic users. Although there is a growing body of literature highlighting these
cellular, clinical, and population-based effects, there is an extremely scant amount
of research, to our knowledge, that examines the psychoneuroimmunological effects
of marijuana use.
There is a large literature on the influence of marijuana uniquely on immunosup-
pression at the cellular level, neuropsychological processes, and potential treatment
and disease utilities. However, much of this literature does not empirically intersect.
Future research should begin to discuss marijuana use from a psychoneuroim-
munological perspective in order to provide comprehensive understanding of data
and performance from various samples. Moreover, negative data reporting is a
phenomenon that has limited the progression of the literature. Researchers must
attempt to report null findings as well as significant findings in order to provide
a more complete picture of the influence of recreational marijuana use. Having
a comprehensive literature that intersects multiple fields would allow for a clear
presentation of marijuana’s effects, further informing policy and legalization efforts.
Role of Funding Source This project was supported by grant #P20 MD000512
from National Center on Minority Health and Health Disparities.
Conflict of Interest No conflict declared.
Contributors Drs. Keen II, Turner, Pereira, Callender, and Campbell contributed
to the literature search and writing/editing of this article and have approved the final
article.
136 L. Keen II et al.
References
1. Substance Abuse and Mental Health Services Administration: Substance Abuse and Mental
Health Services Administration, Results from the 2013 National Survey on Drug Use and
Health: Summary of National Findings, NSDUH Series H-48, HHS Publication No. (SMA)
14-4863. Rockville, MD (2014)
2. National Institute on Drug Abuse: Marijuana Retrieved from http://www.drugabuse.gov/
publications/drugfacts/marijuana on August 6, 2015
3. Vincent, B.J., McQuiston, D.J., Einhorn, L.H., Nagy, C.M., Brames, M.J.: Review of
cannabinoids and their antiemetic effectiveness. Drugs. 25, 52–62 (1983)
4. Li, H.L.: An archaeological and historical account of cannabis in China. Econ. Bot. 28(4),
437–448 (1973)
5. Ben Amar, M.: Cannabinoids in medicine: a review of their therapeutic potential. J.
Ethnopharmacol. 105(1), 1–25 (2006)
6. Pacula, R.L.: Marijuana use and policy: What we know and have yet to learn. NBER Reporter
Online, (Winter 2004/05), 22–24 (2004)
7. Hall, W., Degenhardt, L.: Adverse health effects of non-medical cannabis use. Lancet.
374(9698), L1383–L1391 (2009)
8. Hall, W.D., Lynskey, M.: Is cannabis a gateway drug? Testing hypotheses about the
relationship between cannabis use and the use of other illicit drugs. Drug Alcohol Rev. 24(1),
39–48 (2005)
9. Morral, A.R., McCaffrey, D.F., Paddock, S.M.: Reassessing the marijuana gateway effect.
Addiction. 97(12), 1493–1504 (2002)
10. Raphael, B., Wooding, S., Stevens, G., Connor, J.: Comorbidity: cannabis and complexity. J.
Psychiatr. Pract. 11(3), 161–176 (2005)
11. Tan, W.C., Lo, C., Jong, A., Xing, L., FitzGerald, M.J., Vollmer, W.M., Buist, S.A., Sin,
D.D., Vancouver Burden of Obstructive Lung Disease (BOLD) Research Group: Marijuana
and chronic obstructive lung disease: a population-based study. Can. Med. Assoc. J. 180(8),
814–820 (2009)
12. Lundvquist, T.: Cognitive consequences of cannabis use: comparison with abuse of stimulants
and heroin with regard to attention, memory and executive functions. Pharmacol. Biochem.
Behav. 81, 319–330 (2005)
13. Cousijn, J., Wiers, R.W., Ridderinkhof, K.R., Brink, W., Veltman, D.J., Porrino, L.J.,
Goudriaan, A.E.: Individual differences in decision making and reward processing predict
changes in cannabis use: a prospective functional magnetic resonance imaging study. Addict.
Biol. 18(6), 1013–1023 (2013)
14. Klein, T.W., Friedman, H., Specter, S.: Marijuana, immunity and infection. J. Neuroimmunol.
83(1), 102–115 (1998)
15. Jemmott, J.B., Locke, S.E.: Psychosocial factors, immunologic mediation, and human
susceptibility to infectious diseases: how much do we know? Psychol. Bull. 95(1), 78 (1984)
16. Maier, S.F., Watkins, L.R.: Cytokines for psychologists: implications of bidirectional
immune-to-brain communication for understanding behavior, mood, and cognition. Psychol.
Rev. 105(1), 83 (1998)
17. Suls, J., Rothman, A.: Evolution of the biopsychosocial model: prospects and challenges for
health psychology. Health Psychol. 23(2), 119 (2004)
18. ElSohly, M.A.: Marijuana and The Cannabinoids. Humana Press, Totowa, New Jersey (2007)
19. Rom, S., Persidsky, Y.: Cannabinoid receptor 2: potential role in immunomodulation and
neuroinflammation. J. NeuroImmune Pharmacol. 8(3), 608–620 (2013)
20. Bhattacharyya, S., Fusar-Poli, P., Borgwardt, S., et al.: Modulation of mediotemporal and
ventrostriatal function in humans by Delta9-tetrahydrocannabinol: a neural basis for the
effects of Cannabis sativa on learning and psychosis. Arch. Gen. Psychiatry. 66(4), 442–451
(2009)
The Psychoneuroimmunological Influences of Recreational Marijuana 137
21. Schoeler, T., Bhattacharyya, S.: The effect of cannabis use on memory function: an update.
Subst. abuse Rehabil. 4, 11–27 (2013)
22. Crane, N.A., Schuster, R.M., Fusar-Poli, P., Gonzalez, R.: Effects of cannabis on neurocog-
nitive functioning: recent advances, neurodevelopmental influences, and sex differences.
Neuropsychol. Rev. 23(2), 117–137 (2013)
23. Fernández-Serrano, M.J., Pérez-García, M., Verdejo-García, A.: What are the specific
vs. generalized effects of drugs of abuse on neuropsychological performance? Neurosci.
Biobehav. Rev. 35(3), 377–406 (2011)
24. Wright, M.J., Vandewater, S.A., Taffe, M.A.: Cannabidiol attenuates deficits of visuospatial
associative memory induced by 9tetrahydrocannabinol. Br. J. Pharmacol. 170(7), 1365–
1373 (2013)
25. Thames, A.D., Arbid, N., Sayegh, P.: Cannabis use and neurocognitive functioning in a non-
clinical sample of users. Addict. Behav. 39(5), 994–999 (2014)
26. Behan, B., Connolly, C.G., Datwani, S., Doucet, M., Ivanovic, J., Morioka, R., Stone, A.,
Watts, R., Smyth, B., Garavan, H.: Response inhibition and elevated parietal-cerrebellar
correlations in chronic adolescent cannabis users. Neuropharmacology. 84, 131–137 (2014)
27. Herkenham, M., Lynn, A.B., Little, M.D., Johnson, M.R., Melvin, L.S., de Costa, B.R., Rice,
K.C.: Cannabinoid receptor localization in brain. Proc. Natl. Acad. Sci. U. S. A. 87(5), 1932–
1936 (1990)
28. Vik, P.W., Cellucci, T., Jarchow, A., Hedt, J.: Cognitive impairment in substance abuse.
Psychiatr. Clin. N. Am. 27(1), 97–109 (2004)
29. Gonzalez, R.: Acute and non-acute effects of cannabis on brain functioning and neuropsycho-
logical performance. Neuropsychol. Rev. 17, 347–361 (2007)
30. Ranganathan, M., D’Souza, D.C.: The acute effects of cannabinoids on memory in humans:
a review. Psychopharmacology. 188, 425–444 (2006)
31. Mathew, R.J., Wilson, W.H.: Substance abuse and cerebral blood flow. Am. J. Psychiatry. 148,
292–305 (1991)
32. Mathew, R.J., Wilson, W.H., Coleman, R.E., Turkington, T.G., DeGrado, T.R.: Marijuana
intoxication and brain activation in marijuana smokers. Life Sci. 60(23), 2075–2089 (1997)
33. Mathew, R.J., Wilson, W.H., Chiu, N.Y., Turkington, T.G., Coleman, R.E.: Regional cerebral
blood flow and depersonalization after tetrahydrocannabinol adminstration. Acta Psychiatr.
Scand. 100, 67–75 (1999a)
34. Mathew, R.J., Wilson, W.H., Turkington, T.G., Coleman, R.E.: Cerebellar activity and
disturbed time sense after THC. Brain Res. 797, 183–189 (1999b)
35. Volkow, N.D., Gillespie, H., Mullani, N., Tancredi, L., Grant, C., Valentine, A., Holister, L.:
Brain glucose metabolism in chronic marijuana users at baseline and during intoxication.
Psychiatr. Res. Neuroimaging. 67, 29–38 (1996)
36. Block, R.I., O’Leary, D.S., Hichwa, R.D., Augustinack, J.C., Boles Ponto, L.L., Ghoneim,
M.M., Arndt, S., Hurtig, R.R., Watkins, G.L., Hall, J.A., Nathan, P.E.: Effects of frequent
marijuana use on memory-related regional cerebral blood flow. Pharmacol. Biochem. Behav.
72, 237–250 (2002)
37. Eldreth, D.A., Matochik, J.A., Cadet, J.L., Bolla, K.I.: Abnormal brain activity in prefrontal
brain regions in abstinent marijuana users. NeuroImage. 23(3), 914–920 (2004)
38. Jager, G., Block, R.I., Luijten, M., Ramsey, N.F.: Cannabis use and memory brain function in
adolescent boys: a cross-sectional multicenter functional magnetic resonance imaging study.
J. Am. Acad. Child Adolesc. Psychiatry. 49, 561–572 (2010)
39. Kanayama, G., Rogowska, J., Pope, H.G., Gruber, S.A., Yurgelynn-Todd, D.A.: Spatial
working memory in heavy cannabis users: a functional magnetic resonance imaging study.
Psychopharmacology. 176, 239–247 (2004)
40. Tapert, S.F., Schweinsburg, A.D., Drummond, S.P., Paulus, M.P., Brown, S.A., Yang, T.T.,
Frank, L.R.: Functional MRI of inhibitory processing in abstinent adolescent marijuana users.
Psychopharmacology. 194, 173–183 (2007)
138 L. Keen II et al.
41. Bossong, M.G., Jager, G., Bhattacharyya, S., Allen, P.: Acute and non-acute effects of
Cannabis on human memory function: a critical review of neuroimaging studies. Curr. Pharm.
Des. 20(13), 2114–2125 (2014)
42. Abdullaez, Y., Posner, M.I., Nunnally, R., Dishion, T.J.: Functional MRI evidence for
inefficient attentional control in adolescent chronic cannabis abuse. Behav. Brain Res. 215,
45–47 (2010)
43. Medina, K.L., Schweinsburg, A.D., Cohen-Zion, M., Nagel, B.J., Tapert, S.F.: Effects of
alcohol and combined marijuana and alcohol use during adolescence on hippocampal volume
and asymmetry. Neurotoxicol. Teratol. 29, 141–152 (2007)
44. Solowij, N., Michie, P.T., Fox, A.M.: Differential impairments of selective attention due to
frequency and duration of cannabis use. Biol. Psychiatry. 15, 731–739 (1995)
45. Solowij, N., Stephens, R., Roffman, R., Babor, T., Kadden, R., Miller, M., Christiansen,
K., McRee, B., Vendetti, J., The Marijuana Project Research Group: Cognitive functioning
of long-term heavy cannabis users seeking treatment. J. Am. Med. Assoc. 287, 1123–1131
(2002)
46. Dougherty, D.M., Mathias, C.W., Dawes, M.A., Furr, R.M., Charles, N.E., Liguori, A.,
Shannon, E.E., Acheson, A.: Impulsivity, attention, memory, and decision-making among
adolescent marijuana users. Psychopharmacology. 226(2), 307–319 (2013)
47. Hanson, K.L., Winward, J.L., Schweinsburg, A.D., Medina, K.L., Brown, S.A., Tapert, S.F.:
Longitudinal study of cognition among adolescent marijuana users over three weeks of
abstinence. Addict. Behav. 35, 970–976 (2010)
48. Harvey, M.A., Sellman, J.D., Porter, R.J., Frampton, C.M.: The relationship between non-
acute adolescent cannabis use and cognition. Drug Alcohol Rev. 26, 309–319 (2007)
49. Lisdahl, K.M., Price, J.S.: Increased marijuana use and gender predict poorer cognitive
functioning in adolescents and emerging adults. J. Int. Neuropsychol. Soc. 18, 678–688
(2012)
50. Mathias, C.W., Blumenthal, T.D., Dawes, M.A., Liguori, A., Richard, D.M., Bray, B., Tong,
W., Dougherty, D.M.: Failure to sustain prepulse inhibition in adolescent marijuana users.
Drug Alcohol Depend. 116, 110–116 (2011)
51. McHale, S., Hunt, N.: Executive function deficits in short-term abstinent cannabis users. Hum.
Psychopharmacol. Clin. Exp. 23, 409–415 (2008)
52. Tapert, S.F., Granholm, E., Leedy, N.G., Brown, S.A.: Substance use and withdrawal:
neuropsychological functioning over 8 years in youth. J. Int. Neuropsychol. Soc. 8, 873–883
(2002)
53. Battisti, R.A., Roodenrys, S., Johnstone, S.J., Pesa, N., Hermens, D.F., Solowij, N.: Chronic
cannabis user show altered neurophysiological functioning on Stroop task conflict resolution.
Psychopharmacology. 212, 613–624 (2010)
54. Day, A.M., Metrik, J., Spillane, N.S., Kahler, C.W.: Working memory and impulsivity predict
marijuana-related problems among frequent users. Drug Alcohol Depend. 131(1), 171–174
(2013)
55. Gonzalez, R., Schuster, R.M., Mermelstein, R.J., Vassileva, J., Martin, E.M., Diviak, K.R.:
Performance of young adult cannabis users on neurocognitive measures of impulsive behavior
and their relationship to symptoms of cannabis use disorders. J. Clin. Exp. Neuropsychol. 34,
962–976 (2012)
56. Grant, J.E., Chamberlain, S.R., Schreiber, L., Odlaug, B.L.: Neuropsychological deficits
associated with cannabis use in young adults. Drug Alcohol Depend. 121, 159–162 (2012)
57. Pope, H.G., Yurgelun-Todd, D.: The residual cognitive effects of heavy marijuana use in
college students. J. Am. Med. Assoc. 275, 521–527 (1996)
58. Schuster, R.M., Crane, N.A., Mermelstein, R., Gonzalez, R.: The influence of inhibitory
control and episodic memory on the risky sexual behavior of young adult cannabis users.
J. Int. Neuropsychol. Soc. 18, 827–833 (2012)
59. Solowij, N., Jones, K.A., Rozman, M.E., Davis, S.M., Ciarrochi, J., Heaven, P.C., Pesa,
N., Lubman, D.I., Yücel, M.: Reflection impulsivity in adolescent cannabis users: a com-
parison with alcohol-using and non-substance-using adolescents. Psychopharmacology. 219,
575–586 (2012)
The Psychoneuroimmunological Influences of Recreational Marijuana 139
60. Kalant, H.: Adverse effects of cannabis on health: an update of the literature since 1996. Prog.
Neuro-Psychopharmacol. Biol. Psychiatry. 28(5), 849–863 (2004)
61. Lyketsos, C.G., Garrett, E., Liang, K.Y., Anthony, J.C.: Cannabis use and cognitive decline in
persons under 65 years of age. Am. J. Epidemiol. 149(9), 749–800 (1999)
62. Pope Jr., H.G., Gruber, A.J., Hudson, J.I., Huestis, M.A., Yurgelun-Todd, D.: Neurpsycho-
logical performance in long-term cannabis users. Arch. Gen. Psychiatry. 58(10), 909–915
(2001)
63. Bolla, K.I., Brown, K., Eldreth, D., Tate, K., Cadet, J.L.: Dose-related neurocognitive effects
of marijuana use. Neurology. 59(9), 1337–1343 (2002)
64. Wagner, D., Becker, B., Gouzoulis-Mayfrank, E., Daumann, J.: Interactions between specific
parameters of cannabis use and verbal memory. Prog. Neuro-Psychopharmacol. Biol. Psychi-
atry. 34, 871–876 (2010)
65. Becker, B., Wagner, D., Gouzoulis-Mayfrank, E.S., Daumann, J.: The impact of early-
onset cannabis use on functional brain correlates of working memory. Prog. Neuro-
Psychopharmacol. Biol. Psychiatry. 34, 837–845 (2010)
66. Rieder, S.A., Chauhan, A., Singh, U., Nagarkatti, M., Nagarkatti, P.: Cannabinoid-induced
apoptosis in immune cells as a pathway to immunosuppression. Immunobiology. 215(8), 598–
605 (2010)
67. Suárez-Pinilla, P., López-Gil, J., Crespo-Facorro, B.: Immune system: a possible nexus
between cannabinoids and psychosis. Brain Behav. Immun. 40, 269–282 (2014)
68. Klein, T.W., Newton, C., Larsen, K., Lu, L., Perkins, I., Nong, L., Friedman, H.: The
cannabinoid system and immune modulation. J. Leukoc. Biol. 74(4), 486–496 (2003)
69. Crowe, M.S., Nass, S.R., Gabella, K.M., Kinsey, S.G.: The endocannabinoid system modu-
lates stress, emotionality, and inflammation. Brain Behav. Immun. 42, 1–5 (2014)
70. Herbert, T.B., Cohen, S.: Stress and immunity in humans: a meta-analytic review. Psychosom.
Med. 55(4), 364–379 (1993)
71. Pestonjamasp, V.K., Burstein, S.H.: Anandamide synthesis is induced by arachidonate
mobilizing agonists in cells of the immune system. Biochim. Biophys. Acta (BBA) Lipids
Lipid Metab. 1394(2), 249–260 (1998)
72. Croxford, J.L., Yamamura, T.: Cannabinids and the immune system: potential for the
treatment of inflammatory diseases? J. Neuroimmunol. 165, 3–18 (2005)
73. Munro, S., Thomas, K.L., Abu-Shaar, M.: Molecular characterization of a peripheral receptor
for cannabinoids. Nature. 365, 61–65 (1993)
74. Miller, A.M., Stella, N.: CB2 receptor mediated migration of immune cells: it can go either
way. Br. J. Pharmacol. 153(2), 299–308 (2008)
75. Malfait, A.M., Gallily, R., Sumariwalla, P.F., Malik, A.S., Andreakos, E., Mechoulam, R.,
Feldmann, M.: The nonpsychoactive cannabis constituent cannabidiol is an oral anti-arthritic
therapeutic in murine collagen-induced arthritis. Proc. Natl. Acad. Sci. 97(17), 9561–9566
(2000)
76. Klein, T.W., Newton, C., Friedman, H.: Cannabinoid receptors and immunity. Immunol.
Today. 19(8), 373–381 (1998)
77. Specter, S., Lancz, G., Hazelden, J.: Marijuana and immunity: tetrahydrocannabinol mediated
inhibition of lymphocyte blastogenesis. Int. J. Immunopharmacol. 12(3), 261–267 (1990)
78. Baldwin, G.C., Tashkin, D.P., Buckley, D.M., Park, A.N., Dubinett, S.M., Roth, M.D.:
Marijuana and cocaine impair alveolar macrophage function and cytokine production. Am.
J. Respir. Crit. Care Med. 156(5), 1606–1613 (1997)
79. Keen II, L., Turner, A.D.: Differential effects of self-reported lifetime marijuana use on
interleukin-1 alpha and tumor necrosis factor in African American adults. J. Behav. Med.
38, 527–534 (2015)
80. Keen, L., Pereira, D., Latimer, W.: Self-reported lifetime marijuana use and interleukin-6
levels in middle-aged African Americans. Drug Alcohol Depend. 140, 156–160 (2014)
81. Kozela, E., Juknat, A., Kaushansky, N., Rimmerman, N., Ben-Nun, A., Vogel, Z.: Cannabi-
noids decrease the 17th inflammatory autoimmune phenotype. J. NeuroImmune Pharmacol.
8(5), 1265–1276 (2013)
140 L. Keen II et al.
82. Roth, M.D., Arora, A., Barsky, S.H., Kleerup, E.C., Simmons, M., Tashkin, D.P.: Airway
inflammation in young marijuana and tobacco smokers. Am. J. Respir. Crit. Care Med. 157(3),
928–937 (1998)
83. Pacifici, R., Zuccaro, P., Pichini, S., Roset, P.N., Poudevida, S., Farré, M., Segura, J., de la
Torre, R.: Modulation of the immune system in cannabis users. JAMA. 289(15), 1929–1931
(2003)
84. Pacifici, R., Zuccaro, P., Farré, M., Poudevida, S., Abanades, S., Pichini, S., Langohr,
K., Segura, J., De La Torre, R.: Combined immunomodulating properties of 3, 4-
methylenedioxymethamphetamine (MDMA) and cannabis in humans. Addiction. 102(6),
931–936 (2007)
85. Roth, M.D., Whittaker, K., Salehi, K., Tashkin, D.P., Baldwin, G.C.: Mechanisms for
impaired effector function in alveolar macrophages from marijuana and cocaine smokers.
J. Neuroimmunol. 147(1), 82–86 (2004)
86. Monnet-Tschudi, F., Hazekamp, A., Perret, N., Zurich, M.G., Mangin, P., Giroud, C.,
Honegger, P.: Delta-9-tetrahydrocannabinol accumulation, metabolism and cell-type-specific
adverse effects in aggregating brain cell cultures. Toxicol. Appl. Pharmacol. 228(1), 8–16
(2008)
87. Kozela, E., Pietr, M., Juknat, A., Rimmerman, N., Levy, R., Vogel, Z.: Cannabinoids 9-
tetrahydrocannabinol and cannabidiol differentially inhibit the lipopolysaccharide-activated
NF-›B and interferon-“/STAT proinflammatory pathways in BV-2 microglial cells. J. Biol.
Chem. 285(3), 1616–1626 (2010)
88. Roth, M.D., Baldwin, G.C., Tashkin, D.P.: Effects of delta-9-tetrahydrocannabinol on human
immune function and host defense. Chem. Phys. Lipids. 121(1), 229–239 (2002)
89. Ongrandi, J., Spector, S., Horvath, A., Friedman, H.: Combined in vitro effect of marijuana
and retrovirus on the activity of mouse natural killer cells. Pathol. Oncol. Res. 4(3), 191–199
(1998)
90. Ngaotepprutaram, T., Kaplan, B.L., Kaminski, N.E.: Impaired NFAT and NF›B activation are
involved in suppression of CD40 ligand expression by 9-tetrahydrocannabinol in human
CD4C T cells. Toxicol. Appl. Pharmacol. 273(1), 209–218 (2013)
91. Srivastava, M.D., Srivastava, B.I.S., Brouhard, B.: 9 Tetrahydrocannabinol and cannabidiol
alter cytokine production by human immune cells. Immunopharmacology. 40(3), 179–185
(1998)
92. Yuan, M., Kiertscher, S.M., Cheng, Q., Zoumalan, R., Tashkin, D.P., Roth, M.D.: 9-
Tetrahydrocannabinol regulates Th1/Th2 cytokine balance in activated human T cells. J.
Neuroimmunol. 133(1), 124–131 (2002)
93. Klein, T.W., Newton, C., Larsen, K., Chou, J., Perkins, I., Lu, L., Nong, L., Friedman, H.:
Cannabinoid receptors and T helper cells. J. Neuroimmunol. 147(1), 91–94 (2004)
94. Roth, M.D., Castaneda, J.T., Kiertscher, S.M.: Exposure to 9-tetrahydrocannabinol impairs
the differentiation of human monocyte-derived dendritic cells and their capacity for T cell
activation. J. NeuroImmune Pharmacol. 10(2), 333–343 (2015)
95. Fischer-Stenger, K., Pettit, D.D., Cabral, G.A.: Delta 9-tetrahydrocannabinol inhibition of
tumor necrosis factor-alpha: suppression of post-translational events. J. Pharmacol. Exp. Ther.
267(3), 1558–1565 (1993)
96. Kusher, D.I., Dawson, L.O., Taylor, A.C., Djeu, J.Y.: Effect of the psychoactive metabolite
of marijuana delta9 -tetrahydrocannabinol (thc), on the synthesis of tumor necrosis factor by
human large granular lymphocites. Cell. Immunol. 154, 99–108 (1994)
97. Snella, E., Pross, S., Friedman, H.: Relationship of aging and cytokines to the immunomod-
ulation by delta-9-tetrahydrocannabinol on murine lymphoid cells. Int. J. Immunopharmacol.
17(12), 1045–1054 (1995)
98. Wang, M., Richards, A.L., Friedman, H., Djeu, J.Y.: Selective inhibition of natural killer but
not natural cytotoxic activity in a cloned cell line by delta-9-tetrahydrocannabinol. J. Leukoc.
Biol. 50(2), 192–197 (1991)
The Psychoneuroimmunological Influences of Recreational Marijuana 141
99. Newton, C.A., Klein, T.W., Friedman, H.: Secondary immunity to Legionella pneumophila
and Th1 activity are suppressed by delta-9-tetrahydrocannabinol injection. Infect. Immun.
62(9), 4015–4020 (1994)
100. Massi, P., Sacerdote, P., Ponti, W., Fuzio, D., Manfredi, B., Viganó, D., Rubino, T., Bardotti,
M., Parolaro, D.: Immune function alterations in mice tolerant to 9-tetrahydrocannabinol:
functional and biochemical parameters. J. Neuroimmunol. 92(1), 60–66 (1998)
101. Klein, T.W., Newton, C.A., Nakachi, N., Friedman, H.: 9-tetrahydrocannabinol treatment
suppresses immunity and early IFN-”, IL-12, and IL-12 receptor “2 responses to Legionella
pneumophila infection. J. Immunol. 164(12), 6461–6466 (2000)
102. Newton, C.A., Lu, T., Nazian, S.J., Perkins, I., Friedman, H., Klein, T.W.: The THC-induced
suppression of Th1 polarization in response to Legionella pneumophila infection is not
mediated by increases in corticosterone and PGE2. J. Leukoc. Biol. 76(4), 854–861 (2004)
103. Gaffal, E., Cron, M., Glodde, N., Tüting, T.: Anti-inflammatory activity of topical THC in
DNFB-mediated mouse allergic contact dermatitis independent of CB1 and CB2 receptors.
Allergy. 68(8), 994–1000 (2013)
104. Zhu, L.X., Sharma, S., Stolina, M., Gardner, B., Roth, M.D., Tashkin, D.P., Dubinett, S.M.: -
9-Tetrahydrocannabinol inhibits antitumor immunity by a CB2 receptor-mediated, cytokine-
dependent pathway. J. Immunol. 165(1), 373–380 (2000)
105. Chang, Y.H., Lee, S.T., Lin, W.W.: Effects of cannabinoids on LPS-stimulated inflammatory
mediator release from macrophages: involvement of eicosanoids. J. Cell. Biochem. 81(4),
715–723 (2001)
106. Lu, T., Newton, C., Perkins, I., Friedman, H., Klein, T.W.: Cannabinoid treatment suppresses
the T-helper cell-polarizing function of mouse dendritic cells stimulated with Legionella
pneumophila infection. J. Pharmacol. Exp. Ther. 319(1), 269–276 (2006)
107. Verhoeckx, K.C., Korthout, H.A., van Meeteren-Kreikamp, A.P., Ehlert, K.A., Wang, M.,
van der Greef, J., Rodenburg, R.J., Witkamp, R.F.: Unheated Cannabis sativa extracts and its
major compound THC-acid have potential immuno-modulating properties not mediated by
CB 1 and CB 2 receptor coupled pathways. Int. Immunopharmacol. 6(4), 656–665 (2006)
108. McKallip, R.J., Nagarkatti, M., Nagarkatti, P.S.: -9-Tetrahydrocannabinol enhances breast
cancer growth and metastasis by suppression of the antitumor immune response. J. Immunol.
174(6), 3281–3289 (2005)
109. Ramarathinam, L., Pross, S., Plescia, O., Newton, C., Widen, R., Friedman, H.: Differential
immunologic modulatory effects of tetrahydrocannabinol as a function of age. Mech. Ageing
Dev. 96(1), 117–126 (1997)
110. Alshaarawy, O., Anthony, J.C.: Cannabis smoking and serum C-reactive protein: a quantile
regressions approach based on NHANES 2005–2010. Drug Alcohol Depend. 147, 203–207
(2015)
111. Muniyappa, R., Sable, S., Ouwerkerk, R., Mari, A., Gharib, A.M., Walter, M., Courville,
A., Hall, G., Chen, K.Y., Volkow, N.D., Kunos, G.: Metabolic effects of chronic cannabis
smoking. Diabetes Care. 36(8), 2415–2422 (2013)
112. Costello, E.J., Copeland, W.E., Shanahan, L., Worthman, M., Angold, A.: C-reactive protein
and substance use disorders in adolescence and early adulthood: a prospective analysis. Drug
Alcohol Depend. 133(2), 712–717 (2013)
113. Rajavashisth, T.B., Shaheen, M., Norris, K.C., Pan, D., Sinha, S.K., Ortega, J., Friedman,
T.C.: Decreased prevalence of diabetes in marijuana users: cross-sectional data from the
National Health and Nutrition Examination Survey (NHANES) III. BMJ Open. 2(1), e000494
(2012)
114. Ugen, K.E., Nyland, S.B.: Injecting drugs of abuse and immunity: implications for HIV
vaccine testing and efficacy. Semin. Immunopathol. 28(3), 281–287 (2006)
115. Cescon, D.W., Page, A.V., Richardson, S., Moore, M.J., Boerner, S., Gold, W.L.: Invasive
pulmonary aspergillosis associated with marijuana use in a man with colorectal cancer. J.
Clin. Oncol. 26(13), 2214–2215 (2008)
116. Ruchlemer, R., Amit-Kohn, M., Raveh, D., Hanuš, L.: Inhaled medicinal cannabis and the
immunocompromised patient. Support. Care Cancer. 23(3), 819–822 (2015)
142 L. Keen II et al.
117. Szyper-Kravitz, M., Lang, R., Manor, Y., Lahav, M.: Early invasive pulmonary aspergillosis in
a leukemia patient linked to aspergillus contaminated marijuana smoking. Leuk. Lymphoma.
42(6), 1433–1437 (2001)
118. Cabral, G.A., Pettit, D.A.D.: Drugs and immunity: cannabinoids and their role in decreased
resistance to infectious disease. J. Neuroimmunol. 83(1), 116–123 (1998)
119. Huemer, H.P., Lassnig, C., Bernhard, D., Sturm, S., Nowotny, N., Kitchen, M., Pavlic,
M.: Cannabinoids lead to enhanced virulence of the smallpox vaccine (vaccinia) virus.
Immunobiology. 216(6), 670–677 (2011)
120. Lee, M.A.: The Discovery of the Endocannabinoid system. Retrieved from http://
www.beyondthc.com/wp-content/uploads/2012/07/eCBSystemLee.pdf (2010)
121. Fischer, B., Murphy, Y., Kurdyak, P., Goldner, E., Rehm, J.: Medical Marijuana Programs-
why might they matter for public health and why should we better understand their impacts?
Prev. Med. Rep. 2, 53–56 (2015)
122. Philipsen, N., Butler, R.D., Simon-Waterman, C., Artis, J.: Medical marijuana: a primer on
ethics, evidence, and politics. J. Nurse Pract. 10(9), 633–640 (2014)
123. Klein, T.W.: Cannabinoid-based drugs as anti-inflammatory therapeutics. Nat. Rev. Immunol.
5(5), 400–411 (2005)
124. Klein, T.W., Cabral, G.A.: Cannabinoid-induced immune suppression and modulation of
antigen-presenting cells. J. NeuroImmune Pharmacol. 1(1), 50–64 (2006)
125. Sylvestre, D.L., Clements, B.J., Malibu, Y.: Cannabis use improves retention and virological
outcomes in patients treated for hepatitis C. Eur. J. Gastroenterol. Hepatol. 18(10), 1057–1063
(2006)
126. Lorente, M., Torres, S., Salazar, M., Carracedo, A., Hernández-Tiedra, S., Rodríguez-
Fornés, F., Garcia-Taboada, E., Meléndez, B., Mollejo, M., Campos-Martin, Y., Lakatosh,
S.A.: Stimulation of the midkine/ALK axis renders glioma cells resistant to cannabinoid
antitumoral action. Cell Death Differ. 18(6), 959–973 (2011)
127. Naftali, T., Lev, L.B., Yablecovitch, D., Half, E., Konikoff, F.M.: Treatment of Crohn’s disease
with cannabis: an observational study. Isr. Med. Assoc. J. 13(8), 455–458 (2011)
128. Waldman, M., Hochhauser, E., Fishbein, M., Aravot, D., Shainberg, A., Sarne, Y.: An ultra-
low dose of tetrahydrocannabinol provides cardioprotection. Biochem. Pharmacol. 85(11),
1626–1633 (2013)
129. Maier, S.F., Watkins, L.R., Fleshner, M.: Psychoneuroimmunology: the interface between
behavior, brain, and immunity. Am. Psychol. 49(12), 1004 (1994)
130. Schreiner, A.M., Dunn, M.E.: Residual effects of cannabis use on neurocognitive performance
after prolonged abstinence: a meta-analysis. Exp. Clin. Psychopharmacol. 20, 420–429 (2012)
Image Segmentation with the Aid
of the p-Adic Metrics
1 Introduction
N
[ Ri D I;
iD1
A. Khrennikov ()
International Center for Mathematical Modelling, Physics, Engineering, Economics, and
Cognitive Science, Linnaeus University, 35195, Växjö, Sweden
e-mail: [email protected]
N. Kotovich
Institute of System Analysis of Russian Academy of Science, 117218, Moscow, Russia
Ri \ Rj D ∅ for i; j D 1; 2; : : : ; NI i ¤ j;
P Ri [ Rj D FALSE for neighboring domains Ri and Ri ;
where P(Ri ) is the predicate of homogeneity on the set of pixels composing the
domain Ri.
Segmentation is one of the most important stages of the analysis of images char-
acteristics. Permanently increasing interest in this topic is expressed in particular
in a huge number of publications devoted to different aspects of segmentation of
images, development and improvement of various algorithms of segmentation, see,
e.g., [1–5]. And the number of publications is growing rapidly, IEEE statistics [6]: in
1970–1979: 11 publications; in 1980–1989: 314 publications; in 1990–1999: 3066
publications; in 2000–2009: 9938 publications.
In different studies segmentation of images was based on the use of various
types of distances, e.g., Euclidean metric or its square, Hamming metric, Chebyshov
metric, and so on. In particular, we point to the theoretical and experimental studies
based on the use of p-adic metrics and more generally ultrametrics [7–10]. For
instance, in works [7, 8] there were presented results of numerical experiments on
segmentation of images presented as JPEG, MPEG images with the aid of the p-adic
metric in the spectral domain (the Fourier transform of the image).
In this paper we present the result of numerical experiments on segmentation of
images with the aid of chain clustering algorithms with fixed threshold based on
the use of the p-adic metric for comparing the levels of brightness associated with
pixels. This is a kind of “direct clustering,” i.e., without preparatory transformations
of images such as based on the spectral methods (methods based on the use of the
Fourier transform).
The main distinguishing feature of the p-adic metric is that it reflects the
hierarchic structure of information presented in an image. Different classes of
images match with in general different prime p (although the choice p D 2
works in average). Therefore the presented image segmentation procedure has to
be combined with a kind of learning to select the prime p corresponding to the
class of images under consideration. In the numerical experiments from which
results are presented here, the “p-learning” was done manually. In future it can be
done automatically, either with the aid of the direct selection of various primes,
p D 2,3, : : : , or with the aid of more advanced learning procedures.
Coupling of the p-adic metric and more generally ultrametric to cognition and
in particular its role in recognition and processing of images by a human brain
was enlightened in a series of works [11–18]. In this approach hierarchy of mental
information is encoded in hierarchy on a branch of the p-adic tree: further from
the root is associated with less importance. P-adics and generally ultrametrics
provide a possibility to encode the information into topology. Then processing
Image Segmentation with the Aid of the p-Adic Metrics 145
x D ’0 C ’1 p C : : : :: C ’N-1 pN-1 C : : : :
One can extend this ring by using sums including finite numbers of terms with
negative powers of p. This is the field Qp of p-adic numbers, i.e., the operation of
division is also well defined [11].
In this section we present the basic definitions which will be used in further
considerations on chain segmentation algorithms.
A sequence of points a D x0 , x1 , : : : , xn-1 , xn D b in a metric space (X,) is called
an "-chain joining a and b if (xk , xkC1 ) " for any k n. If there exists an "-chain
joining a and b they are said to be "-linkable.
We recall that ultrametric spaces are characterized by the following result:
Theorem A metric space is ultrametric if and only if no two points a ¤ b in it are
"-linkable for any " < (a,b).
Thus by this theorem, for arbitrary two points of an ultrametric space, there is
no "-chain joining a and b for " < (a,b) which is strictly less than the distance
between these points. This property also implies that a metric space is in fact an
ultrametric space.
Let now (X,) be an arbitrary metric space. We set
(x,y) D Inf f":x and y are "-linkableg, x,y2 X.
This function has all properties of an ultrametric, besides non-degeneration (it
can be that
(x,y) D 0 for some x ¤ y). It is the so-called pseudo-ultrametric.
It is called the chain distance between points x and y. We remark that theorem
implies that in an ultrametric space (X,) the original metric coincides with the
corresponding chain distance.
We use an algorithm of chain clustering. This algorithm belongs to the group
of AH-methods (agglomerative hierarchical clustering), see, e.g., [26, 27] for the
general references.1 The crucial specialty of our approach is the use of the special
metric, the p-adic one.
Step 0 Any object of the set of objects under study can be chosen as the generator
of the process of clustering. This object gets two labels, n D 1 (its number) and
D 0 (distances).
Step 1 Then we consider all other objects and take the object such that the distance
0 between this object and the object with n D 1 is minimal. This new object gets
n D 2 and D 0 .
::: :::
1
This is the nearest neighbor chain algorithm, that, with the reciprocal or mutual nearest neighbor;
this is the standard efficient implementation for all standard agglomerative hierarchical clustering
algorithms.
Image Segmentation with the Aid of the p-Adic Metrics 147
Step N Then we consider all other objects and take the object such that the distance
00 between this object and the set of previously chosen objects is minimal.
It is easy to see that thus defined the distance is the chain distance. At each step
we take the object such that the distance between this object and the set of objects
that have been already enumerated is minimal. This procedure is repeated until all
objects are enumerated. Finally, all objects are ordered (enumerated) in a so-called
chain and each object in it has the label —the distance to the set of previous objects.
In more detailed presentation we have:
1. There is given nonempty set A and a metric on it.
2. Take an arbitrary x from A; assign to it n D 1 and distance D 0. We define the
set M as containing this point x.
3. If all elements of A have been used, then go to the end—to step 8.
4. Take one of the elements of A, say y, having the minimal distance to M.
5. Assign y this minimal distance.
6. Add y to M and enumerate it, n D n C 1.
7. Got to step 3.
8. End: all elements of A have been enumerated and to each of them there were
assigned the corresponding distance.
Splitting of the set of objects into clusters is based on the following procedure.
Let r0 > 0 be some constant (the parameter of clustering). We would like to build
clusters in such a way that the chain distance between objects inside one cluster
will be r0 and at the same time the chain distance between objects belonging to
different clusters will > r0 . To do this, we consider labels of all objects and find
objects such that > r0 . Suppose that there are objects with numbers n1 , : : : , nK .
The first cluster consists of all objects with 1 n < n1 ; the second one –
n1 n < n2 , and so on.
By varying the parameter r0 we can analyze different variants of clustering.2
Here consider the following fast version of the chain clustering method, namely
chain clustering with a fixed threshold.
Let us fix a distance between clusters, r0 > 0. Any object can be taken as the
initial object. It gets the label as belonging to the first cluster. The first cluster is
constructed by grouping all objects such that the distance from them to the initial
object is less than the threshold r0 . Then, for each of these new objects that were
taken into the first cluster, the procedure is repeated (by considering only the objects
2
This (thresholding chains or relation representations, from, e.g., single link clustering, or the
minimal spanning tree) has been used for image segmentation in some previous work. A review
that includes some of this work is available, e.g., in [28].
148 A. Khrennikov and N. Kotovich
that do not already belong to the cluster). When there are no more objects that could
be collected to the first cluster, some object that does not belong to the first cluster
is taken as the base of the second cluster and so on. If we have N objects, then in the
worst case we need N (N1)/2 operations of distance computation, but in the best
case only N operations.
In this section we present the results of segmentation of images with the aid of the
p-adic metric by chain clustering method with fixed threshold r0 . The neighboring
pixels are unified in a cluster if the distance between their levels of brightness is less
than the fixed threshold. To be more precise, we remark that, as always for colored
pictures, we consider three components: (R) red, (G) green, (B) blue, and each of
them is quantized by using 256 levels.3 For each color, we use the p-adic distance
and finally unify colors by using the max-metric with respect to colors. We note that
by taking max of a family of ultrametrics one again obtains an ultrametric.
The crucial point of our study was the use of the p-adic distance. Here, see Figs.
1, 2, 3, and 4, we proceeded with the value p D 3 and the threshold r0 D 1/3. As was
already remarked in the introduction, in average, i.e., without specification of the
class of images, the simulation with value p D 3 produces reasonably good outputs.
Heuristically it is clear why it happens. Roughly speaking the value p D 2 is too
small, the levels of brightness are too often considered (from the 2-adic viewpoint)
as close to each other; the value p D 5 is too big, the levels of brightness are too
often considered (from the 5-adic viewpoint) as far from each other. Of course, this
is pure heuristics. In general some classes of symbols are better adapted to, e.g.,
3
We noted that future work would consider other color encoding beyond RGB (YUV, etc.); also
dynamic range, here 256, to be extended.
Image Segmentation with the Aid of the p-Adic Metrics 149
The following three pictures are outputs of the Euclidean distance clustering with
different thresholds for the original picture at the left-hand side of Fig. 2. For
r0 D 20, Fig. 6, large segments are absent, for r0 D 28, Fig. 7a, segmentation
is reasonable, but the sky started to merge with parts of the land surface, further
increasing of the threshold, r0 D 30, Fig. 7b, implies further merging of sky with
parts of the land surface. The same happens for the picture represent at the left-
hand side of Fig. 3, for relatively small thresholds, large segments are absent, too
many small details; however, increasing of the threshold leads to disappearance of
segments corresponding to penguins, see Fig. 8, where r0 D 28. Thus clustering
based on the Euclidean distance leads to merging of important structures which are
clearly visible in images obtained as outputs of p-adic clustering.
Fig. 7 (a, b) Land, river, and sky, Euclidean distance clustering, with increasing threshold, r0 D 28
and r0 D 30
152 A. Khrennikov and N. Kotovich
7 Concluding Remarks
This pilot study demonstrated that the p-adic metric can serve as a useful tool for
image segmentation. The hierarchical structure encoded with the aid of this metric
matches well with hierarchic presentation of information and, in particular, images
of human brain. An important advantage of the algorithm explored in this paper is
its simplicity. And in spite of simplicity, it produces reasonably good segmentation,
at least comparing with segmentation produced by the similar algorithm, but based
on the Euclidean distance.
We plan to extend our studies and apply this p-adic method of image segmen-
tation to concrete problems of image analysis. In particular, we plan to use it
in geology for recognition of special oil-related structures, cf. [24, 29]. Here oil
flows in porous disordered media which has the tree-like structure. We remark that
geometrically p-adic numbers are represented by homogeneous trees. Therefore
p-adic distance can be explored to model clustering of geological structures.
However, the straightforward application of the p-adics is not possible. Geological
structures are more complex geometrically than simply the homogeneous p-adic
trees. They can be represented as ultrametric space. The computer representation of
such general ultrametric trees is a separate problem for study.
Finally, we make a remark on the speed of the presented clustering algorithm
based on the use of the p-adic metric comparing with the speed of the similar
clustering algorithms based on the use of the Euclidean metric. The presented p-adic
distance algorithm does not provide speed up in image clustering. Thus from this
viewpoint it is not more effective than ones exploring the Euclidean distance.4
4
However, the following comment can be useful to clarify the situation with computational speed
up. Clustering that uses a p-adic distance can be considered by analogy with (1) creating a
hierarchical clustering, and then (2) cutting the hierarchy to produce a partition. This analogy
is more the case if the hierarchy is a contiguity-constrained one. The computational requirements
that are referred to quite negatively as regards this work may not be all that bad, especially if
one makes comparison relative to straightforward, Euclidean distance or related, segmentation.
Image Segmentation with the Aid of the p-Adic Metrics 153
The main issue is that the use of p-adic distances leads to extraction of new
clusters which are “not visible” for other distances. For some classes of images,
p-adic clustering is more appropriate than the standard clustering.
Ideologically we propose to look at the same image from different viewpoints:
from Euclidean and from p-adic. Some classes of images have the intrinsic
hierarchic structure which can be adequately encoded by p-adics. In the original
Euclidean representation this intrinsic hierarchy is shadowed and it becomes visible
only in the p-adic representation.
As was pointed out, p-adic clustering matches well with the tree-like structures in
images. Such structures are very common in geology, as tree-like capillary networks
in porous random media. Therefore we hope that p-adic clustering would be applied
oil industry (and plan to realize these expectations in further works, cf. [29–31]).
This paper was financially supported by the grant “Math Modelling of Complex
Hierarchic Systems,” Linnaeus University.
References
1. Ilea, D.E., Whelan, P.F.: Image segmentation based on the integration of colour–texture
descriptors—a review. Pattern Recogn. 44(N10–11), 2479–2501 (2011)
2. Hill, J., Corona, E., Ao, J., Mitra, S., Nutter, B.: Information theoretic clustering for medical
image segmentation. In: Advanced Computational Approaches to Biomedical Engineering,
pp. 47–70. Springer, Berlin-Heidelberg (2014)
3. Arbelaez, P., Maire, M., Fowlkes, C., Malik, J.: Contour detection and hierarchical image
segmentation. IEEE Trans. Pattern Anal. Mach. Intell. 33(5), 898–916 (2011)
4. Vieux, R., Benois-Pineau, J., Domenger, J.-P., Braquelair, A.: Segmentation-based multi-class
semantic object detection. Multimedia Tools and Applications, pp. 1–22. Springer Verlag
(2011)
5. Rossi, E., Benini, S., Leonardi, R., Mansencal, B., Benois-Pineau, J., Clustering of scene
repeats for essential rushes preview. International Workshop on Image Analysis for Multimedia
Interactive Services (WIAMIS), pp. 234–237, London, United Kingdom (2009)
6. IEEE Explore Digital Library. http://ieeexplore.ieee.org.
7. Benois-Pineau, J., Khrennikov, A.Y., Kotovich, N.V.: Segmentation of images in p-adic and
Euclidean metrics. Dokl. Math. 64, 450–455 (2001)
8. Benois-Pineau, J., Khrennikov, A. (2002). Image segmentation in compressed domain by clus-
tering methods with Euclidean and p-adic metrics. In: Proceedings in Interational Conference
in Management of Uncertainty in Knowledge-based Systems (IPMU-2), pp. 969–976, Annecy,
France
9. Khrennikov, A.Y., Kotovich, N.V.: Representation and compression of images with the aid of
the m-adic coordinate system. Dokl. Akad. Nauk. 387, 159–163 (2002)
10. Khrennikov, A., Kotovich, N., Borzistaya, E.: Compression of images with the aid of
representation by p-adic maps and approximation by Mahler’s polynomials. Dokl. Math.
69(N3), 373–377 (2004)
11. Khrennikov, A.Y.: Non-Archimedean analysis: quantum paradoxes, dynamical systems and
biological models. Kluwer, Dordrecht (1997)
A further comparison in future work is likely to be beneficial too: the use of wavelet transforms—
hierarchical and hence ideally represented p-adically for image and signal segmentation.
154 A. Khrennikov and N. Kotovich
12. Albeverio, S., Khrennikov, A.Y., Kloeden, P.: Memory retrieval as a p-adic dynamical system.
Biosystems. 49, 105–115 (1997)
13. Dubischar, D., Gundlach, V.M., Steinkamp, O., Khrennikov, A.Y.: A p-adic model for the
process of thinking disturbed by physiological and information noise. J. Theor. Biol. 197,
451–467 (1999)
14. Khrennikov, A.Y.: Toward an adequate mathematical model of mental space: con-
scious/unconscious dynamics on m-adic trees. Biosystems. 90, 656–675 (2007)
15. Murtagh, F.: Ultrametric model of mind, I: review. P-adic Numbers Ultrametr. Anal. Appl. 4,
193–206 (2012)
16. Murtagh, F.: Ultrametric model of mind, II: application to text content analysis. P-adic
Numbers Ultrametr. Anal. Appl. 4, 207–221 (2012)
17. Lauro-Grotto, R.: The unconscious as an ultrametric set. Am. Imago. 64, 535–543 (2007)
18. Khrennikov, A., Kotovich, N.: Towards ultrametric modeling of unconscious creativity. Int. J.
Cogn. Inform. Nat. Intell. 8(4), 12 (2014)
19. Murtagh, F.: On ultrametricity, data coding, and computation. J. Classif. 21, 167–184 (2004)
20. Murtagh, F., Contreras, P.: Fast, linear time, m-adic hierarchical clustering for search and
retrieval using the baire metric, with linkages to generalized ultrametrics, hashing, formal
concept analysis, and precision of data measurement. P-Adic Numbers Ultrametr. Anal. Appl.
4, 45–56 (2012)
21. Bradley, P.: Degenerating families of dendrograms. J. Classif. 25, 27–42 (2008)
22. Bradley, P.: From image processing to topological modelling with p-adic numbers. P-Adic
Numbers Ultrametr. Anal. Appl. 2, 293–304 (2010)
23. Bradley, P.: Mumford dendrograms. Comput. J. 53, 393–404 (2010)
24. Bradley, P.: Comparing G-maps with other topological data structures. GeoInformatica. 18,
595–620 (2014)
25. Benois-Pineau, J., Khrennikov, A.: Significance delta reasoning with p-adic neural networks:
application to shot change detection in video. Comput. J. 53, 417–431 (2010)
26. Kaufman, L., Rousseeuw, P.J.: Finding groups in data: an introduction to cluster analysis, 1st
edn. John Wiley, New York (1990)
27. Hastie, T., Tibshirani, R., Friedman, J.: Hierarchical clustering. The elements of statistical
learning, 2nd edn, pp. 520–528. Springer, New York (2009)
28. Murtagh, F.: Algorithms for contiguity-constrained clustering. Comput. J. 28, 82–88 (1985)
29. Khrennikov, A., Kozyrev, S.V., Oleschko, K., Jaramillo, A.G., de Jesus Correa Lopez, M.:
Application of p-adic analysis to time series. Infinite Dimens. Anal. Quantum Probab. Relat.
Top. 16, 1350030 (2013)
30. Khrennikov, A., Oleschko, K., de Jesús Correa Lopez, M.: Modeling fluid’s dynamics with
master equations in ultrametric spaces representing the treelike structure of capillary networks.
Entropy. 18(7), 249 (2016)
31. Khrennikov, A., Oleschko, K., de Jesús Correa Lopez, M.: Application of p-adic wavelets
to model reaction-diffusion dynamics in random porous media. J. Fourier Anal. Appl. 22,
809–822 (2016)
The Primes are Everywhere, but Nowhere : : :
Abstract In this note we present the Prime Number Paradigm: “Nature encodes
its laws with the aid of prime numbers.” We claim that prime number skeletons of
data-sets contain the basic structures represented them. This paradigm is illustrated
by a variety of data: from astrophysics to geophysics (including petroleum data),
and reading comprehension. We remark that the ideas about the fundamental (and
even mystical) role played by primes in mathematics and in physics were discussed
by many scientists during the last 2000 years. The main advantage of our approach
is its close connection with real experimental data. To present deeper patterns in
data, the prime skeletons can be extended to p-adic skeletons. P-adic numbers play
the important role number theory and recently they started to be widely used in
theoretical physics, form string theory and theory of complex disordered systems to
geophysics.
K. Oleschko
Centro de Geociencias, Universidad Nacional Autonoma de Mexico (UNAM), Campus UNAM
Juriquilla, Blvd. Juriquilla 3001, C.P. 76230, Queretaro, Qro., México
e-mail: [email protected]
A. Khrennikov ()
International Center for Mathematical Modelling, Physics, Engineering, Economics, and
Cognitive Science, Linnaeus University, 35195, Växjö, Sweden
e-mail: [email protected]
B.F. Oleshko
Universidad Autonoma de México (UNAM), Centro de Ciencias de la Complejidad (C3),
Cuerpo B, Nivel 1, Circuito Mario de la Cueva 20, Cd. Universitaria, Delegación Coyoacán,
C.P. 04510, Cd. Mx., México
e-mail: [email protected]
J.-F. Parrot ()
Instituto de Geografía, Universidad Autonoma de México (UNAM), Cd. Universitaria,
Delegación Coyoacán, 04510 Ciudad de México, México
e-mail: [email protected]
1 Introduction
Fig. 1 (a) The original position of the Observer during the moonrise imaging. Note: the size of (a)
and (b) images is 960 by 720 pixels. The original photograph size is 3072 by 2304 pixels. (b) Rings
around the sun observed on the selected prime numbers map, extracted from the corresponding
grayscale photograph. The primes corresponding to 18% of more than seven millions of numbers
on the original 3072 by 2304 matrix. For this example, only some primes are colored, but for each
number only one color is used. The moon is corresponding to the small black point distinguished
with difficulty on the down part of the map between the seventh and eighth rings. (c) The rings
around the sun have disappeared at the critical point, when the moon can be distinguished. (d) The
prime numbers rings have appeared around the moon, while the rest of primes corresponding to
the sun ring have disappeared step by step
158 K. Oleschko et al.
Fig. 1 (continued)
It is well known that prime numbers play the exceptional role not only
in mathematics but also in physics, from quantum physics (see above-cited
reference) to theory of complex disordered systems and geophysics, information
processing, biology, and cognitive science. These numbers are considered
as the most fundamental blocks (sometimes called elemental particles or
“periodic table of mathematics,” 6) of the quantitative representation of natural
phenomena. This was recognized already in the Ancient times; for example,
in one of the earliest texts mentioning prime numbers, Nicomachus of Gerasa
(c.60–c.120 CE), see ([5], [Book 1, chapter XII]), we can find the following
statement, p. 222: “the prime and incomposite [ : : : ] has received this name because
it can be measured only by the number which is first and common to all, unity,
The Primes are Everywhere, but Nowhere : : : 159
Fig. 2 (a) The original graph of the pressure curve. (b) The prime number skeleton of the original
graph of the pressure curve. (c) Shape coincidence of the graphs of the original pressure curve and
its prime skeleton
160 K. Oleschko et al.
and by no other. [ : : : ] To be sure, when they are combined with themselves, other
numbers might be produced, originating from them as from a fountain and a root,
wherefore they are called “prime”, because they exist beforehand as the beginnings
of the others. For every origin is elementary and incomposite, into which everything
is resolved and out of which everything is made, but the origin itself cannot be
resolved into anything or constituted out of anything.” Crandall and Pomerance [2]
have underlined that the information encoded in primes is always more important
than that of the composite numbers.
Later, after creation of atomic physics and quantum mechanics, comparison
of prime numbers to “the atoms of number theory” became very popular. This
comparison can be rooted to the work of [6]:
It remains unresolved but, if true, the Riemann Hypothesis will go to the heart of what
makes so much of mathematics tick: the prime numbers. These indivisible numbers are the
atoms of arithmetic.
This analogy of prime numbers to atoms and more generally to quanta played
the important role in establishing foundations of the information viewpoint on
the modern physics, especially quantum mechanics. This viewpoint on physics
celebrated in the famous statement of Wheeler [7]:
It from bit. Otherwise put, every ‘it’—every particle, every field of force, even the space-
time continuum itself—derives its function, its meaning, its very existence entirely even if
in some contexts indirectly—from the apparatus-elicited answers to yes-or-no questions,
binary choices, bits. ‘It from bit’ symbolizes the idea that every item of the physical
world has at bottom - a very deep bottom, in most instances - an immaterial source and
explanation; that which we call reality arises in the last analysis from the posing of yes–
no questions and the registering of equipment-evoked responses; in short, that all things
physical are information-theoretic in origin and that this is a participatory universe.
The distribution of prime numbers was one the basic problems which led to creation
of number theory, especially analytic number theory. We recall that this is trivially
formulated problem of accounting the number of primes (x) in the segment [0, x].
One of the first contributions to solution of this problem was due to [33]. He derived
the approximate integral formula distribution function (x):
Z N
1
Li.N/ D dtI (1)
2 ln t
.x/
x= ln x: (2)
Nowadays, after development of fractal theory, a lot attention was paid to the
fractal structure of prime numbers and its applications to data analysis, see,
for example, Cattani [19], Cloitre [20], and Batchko [21]. This (random) fractal
structure of the set of prime numbers P is encoded not directly in the distribution of
primes, but in the distribution of gaps between the successive primes:
gn D pnC1 pn :
c ln n ln ln nln ln ln ln n
gn D : (3)
.ln ln ln n/2
holds for infinitely many values n. However, for applications, one is interested
in the probability distribution of these gaps and its features. This is a very
complicated mathematical problem; its theoretical study has not yet led to rigorous
mathematical results; the main achievements were approached with the aid of
numerical simulation, see papers of Wolf [22, 23] and Scafetta et al. [24].
Denote by hN (d) the number of gaps of the length d between successive primes
less than N.
162 K. Oleschko et al.
The results of computer simulation obtained [22] shows that hN (d) is distributed
exponentially:
hN .d/
exp fd.N/=Ng : (4)
We note that this quantity determines the probability of randomly selecting a pair
of consecutive primes separated by a gap of size d.
Some authors, e.g., Julia [25] and Wolf [26], proposed statistical physics models
in which prime numbers played the role of particles. In particular, in Wolf [26] there
was constructed a statistical model of “prime gas,” cf. with above discussion on
prime atoms and information physics. Here the prime numbers acted as particles;
in this model, the nth prime pn has the energy gn D pnC1 - pn , i.e., the gap between
successive primes. By taking into account the asymptotic of the prime counting
function, the quantity hN (d) can be represented as:
hN .d/
exp fd=ln Ng : (5)
In Wolf [26], the quantity TDln N was interpreted as temperature of the prime
gas, so hN (d) was interpreted as the Boltzmann factor.
Recently prime numbers found novel applications to geophysics. Here the prime
number structure of data is closely related with the fractal geometry of capillary
networks in random porous media [27, 28]. Prime numbers provide compact and
informationally rich representation of the underlying fractal structure. By taking into
account data which is encoded not only by prime numbers but even their powers, we
improve richness of representation. Mathematically the latter is realized in the fields
of p-adic numbers. Recently this approach was actively explored to model diffusion
of fluids, e.g., oil, oil-in-water, and water-in-oil emulsions in capillary networks
[15–18].
As we emphasized in the title of this paper, prime numbers are everywhere; they
determine the basic number-theoretic structure of various natural phenomena. At the
same time, it is not easy to extract the prime number structure from real data. The
components of some data-set corresponding to different primes (and their powers
generating p-adic fields) “interfere” resulting in the standard real number structure
of graphs and images.
Consider, as the important illustration, p-adic physics [12–18]; it is about the
p-adic components (for all primes, p>1) of physical quantities; for example, string
The Primes are Everywhere, but Nowhere : : : 163
amplitudes. These components are unified with the aid of the adele ring. The integral
effect of these components corresponds to the real physical quantity. However, to
decompose the latter in its p-adic components, for pD2,3, : : : , 1997, 1999, : : : .,
is the very difficult problem which has not yet been solved. This problem can be
compared with the problem of factorization of a natural number n into the prime
factors. Up to now, nobody was able to design algorithm that can factor all integers
in polynomial time.
In theory of complex disordered systems (spin glasses), the p-adic structure
is encoded [29] in the Parisi matrix. However, it is merely the exhibition of the
ultrametric structure corresponding to the internal hierarchy inside spin glasses and
not their number-theoretic features. We also point to a series of works to detect the
ultrametric structure in variety of data-sets [30, 31].
We have designed two computer programs in order to extract the prime numbers
and corresponding p-adic structure from multiscale and multiphysics images and
time series. In the following examples, we will show some more interesting
examples of contrasting natural systems analysis.
The first example refers to the quantification of some optical effects by primes.
The coronae and diffraction were chosen as optical effects which, in words of [34]
“teach much about physics and especially optics.” The images of moonrise were
taken by the Observer (Fig. 1a) during the sunset. The Observer was sitting on
the beach taking images of moonrise during around two hours, when the sunset
has occurred behind her. This was the Full Moon day in Los Cabos, Mexico,
when the moon and sun were perfectly aligned. The primes were extracted directly
from these photographic images, showing, first, the clear ring-like patterns of sun
light diffraction on the water saturated atmosphere, and, then, the moon rings. The
contrasting images of critical phenomena (Fig. 1c) occurred during the change of
sun rings pattern (Fig. 1b) to moon pattern (Fig. 1d), which were documented not
only visually but also by prime numbers statistics.
We present a few images of primes distribution across the sunset/moonset
transition (Fig. 1a–d). Only prime numbers were mapped and colored. In fact,
in the pure atmosphere (without clouds) saturated with water vapor the primes
follow the real number line in very strong order. This ring-like structure is not
only straightforwardly visible (with very small “interference” of the consecutive
primes, without any noisy counterparts of images. Notwithstanding, any original
164 K. Oleschko et al.
4 Conclusions
There are two main questions we are trying to answer now. First of all, we are
looking for the distribution of gaps between the primes extracted from the natural
scenes under contrasting physical conditions, as well as from the corresponding
time series (for instance, the radar and laser data matrices). The other question is:
from where the primes came to the real physical word and where these numbers
disappeared?
In order to answer the last question, we have analyzed a set of NASA images,
taken from the cosmic space. On the prime numbers map (Fig. 3b) extracted from
the NASA original image (Fig. 3a), the prime numbers disappeared on the bound of
atmosphere. We conclude that the prime number distribution is closely related with
the nature of energy source.
Fig. 3 (a) NASA image taken from the cosmic space. (b) Prime number skeleton corresponding
to the image of (a)
References
1. Merkle, R., Hellman, M.: Hiding information and signatures in trapdoor knapsacks. IEEE
Trans. Inf. Theory. 24, 525–530 (1978)
2. Crandall, R., Pomerance, C.: Prime Numbers: A Computational Perspective. Springer, New
York (2005)
3. Shankar, S., Udupi, V.R.: A dynamic security protocol for face recognition systems using
seismic waves. Int. J. Image Graph. Signal Process. 7(4), 28–34 (2015)
4. Lamb, E.: Peculiar pattern found in ‘random’ prime numbers: last digits of nearby primes
have ‘anti-sameness’ bias. Nature News. http://www.nature.com/news/peculiar-pattern-found-
in-random-prime-numbers-1.19550 (2016)
166 K. Oleschko et al.
29. Kozyrev, S.V.: Dynamics on rugged landscapes of energy and ultrametric diffusion. P-Adic
Numbers Ultrametric Anal. Appl. 2, 122–132 (2010)
30. Murtagh, F.: On ultrametric algorithmic information. Comput. J. 53, 405–416 (2010)
31. Murtagh, F.: The new science of complex systems through ultrametric analysis: application to
search and discovery, to narrative and to thinking. P-Adic Numbers Ultrametric Anal. Appl. 5,
326–337 (2013)
32. Kornei, K.: Synopsis: quantum cryptography goes a long way. Physics. (2016)
33. Malachovskiy, V.C.: The Known and Unknown Numbers, p. 182. FGUIPP, Yantarniy Skaz,
Kaliningrad (2004)
34. Cowley, L., Laven, P., Vollmer, M.: Rings around the sun and moon: coronae and diffraction.
Phys. Educ. 40, 51–59 (2005)
The Logical Combinatorial Approach Applied
to Pattern Recognition in Medicine
Martha R. Ortiz-Posadas
1 Introduction
The logical combinatorial approach of pattern recognition theory [1] works with the
descriptions of the objects in terms of a combination of quantitative and qualitative
variables. These variables can be processed by numeric functions in a differential
manner, depending on their nature. Furthermore, this approach gives the possibility
to consider absent information for the values of some variables in the object
descriptions. For classifying objects, there are algorithms based on the concept of
partial precedence, that is, partial analogies. An object can be similar to another
object but not in its totality; those parts which do look, although not of the same
magnitude, can give information about possible regularities. All these characteristics
are suitable to model classification problems in soft sciences such as Medicine.
The logical combinatorial approach has been applied to several medical prob-
lems. For example, a new approach for the differential medical diagnosis was
proposed; based on the change in the characterization of the disease period, it
offered k-admissible values for patient signs and symptoms in order to represent
different degrees in symptom manifestation, and this provides more flexibility in
making differential diagnosis for physicians [2]. Later, a new method for a complete
description of the primary and secondary cleft palates was proposed, incorporating
elements related to the palate, lip, and nose, that were also reflecting the surgical
complexity of this medical problem. Using this method, it is possible to incorporate
elements that are not considered in other approaches and to describe all possible
clefts that may exist [3]. Other work shows a similarity function modeled by this
approach for comparing the condition of patients with this kind of malformations.
The function includes the importance of every variable as well as a weight which
reflects the surgical complexity of the cleft [4], and a computational tool for the
prognosis of the rehabilitation of these patients was developed [5]. It is important
to say that these kinds of congenital malformations are treated by a Cleft Palate
Team encompassing four medical specialties: reconstructive surgery, orthodontics,
speech therapy, and psychology. In this sense, there are some works applying the
logical combinatorial approach for modeling each aspect. There is a work [6]
that shows how a similarity function modeled by this approach can be used to
compare the orthodontic condition of patients with cleft lip and/or palate; and how
this function allows to assess the effect of treatment in a single patient, hence
providing valuable auxiliary criteria for medical decision-making as to the patient’s
rehabilitation. There is also a method to evaluate the speaking quality of patients
with cleft palate [7] by a similarity function modeled by this approach. This method
allows the specialists to know the speaking quality of their patients performed
during rehabilitation and they can modify or continue with their planned therapeutic
strategy.
There are other biological fields where this approach has been applied. Such is
the case for the cytogenetic analysis. Cytogenetics is a branch of genetics that is
concerned with the study of the structure and function of the cell, especially the
chromosomes. The identification of chromosomes must be performed in the process
of cellular division (metaphase). Related with this topic, there is a mathematical
model that considers three characteristics related to the chromosome form: size,
centromere position, and secondary constrictions; and a computational tool was
developed based in such model. This tool helps in the development of new
techniques applied in automated systems for the identification of chromosomes
allowing better precision in this task [8].
Health technology management is another field where the logical combinatorial
approach has been applied. For example, due to the wide variety of medical equip-
ments existing in clinical areas, there is an important question: which and how often
electrical safety tests must be applied to the medical equipment. There are important
differences about the electrical safety, such as the electrical insulation or the hazard
The Logical Combinatorial Approach Applied to Pattern Recognition in Medicine 171
2 Mathematical Model
Remark There is no norm or algebraic operation over Mi defined a priori. But this
does not mean that they cannot be present in ISR. Sometimes one can consider a
function which does not satisfy the norm properties over Mi (over ISR).
Definition 2 Let C D fC1 , : : : , Cn g be a set of functions called comparison criteria
for each variable xi 2X such as: Ci : Mi Mi !
i ; iD1, : : : , n where
i can be of any
nature; it is an ordered set and can be finite or infinite.
Remark Comparison criteria can denote similarity or difference. For the sake of
illustration, we present the following examples of an ordered set
i :
• If
i D [0, 1], the value 1 represents maximum similarity/difference and
the value zero the minimum. Any intermediate value represents a grade of
similarity/difference between compared values.
• If the comparison criterion is finite valued, that is:
i D f0, 1, 2, : : : , mg, it is not
difficult to transform i into: i D f0, 1/m, 2/m, : : : , (m 1)/m, 1g. Obviously,
this is a subset of the interval [0,1]. Then, in this case, the intermediate values i
also represent a grade of similarity/difference between compared values.
The characteristics of each comparison criterion (Ci ) depend on the problem
being modeled. However, it is important to remark that every Ci is designed
individually to reflect the nature and interpretation of each feature xi . In this sense,
the set C allows the differentiation and nonuniform treatment of the features that
describe the objects. Furthermore, it also gives the possibility to consider “absent
information” in some feature values in the objects descriptions. It is important to
mention that all comparison criteria must be defined jointly with the experts, in order
to incorporate his/her expertise. In the context of medical problems, the experts
will be the physicians, surgeons, etc. with knowledge, expertise, and the ability to
provide criteria about medical problem being modeled.
3 Supervised Classification
The problem is to find the membership relations of a new object from U (outside the
given samples) with r classes. This relationship does not have to be all or nothing.
The logical combinatorial approach deals with spaces without algebraic (or any
other kind of) structure. The representation space is simply a Cartesian product,
which also has the peculiarity of being heterogeneous, that is, each of the sets
forming it can be of different nature: a set of real numbers, a set of labels, a set of
truth values, etc. [11]. An example of this appears in medical diagnosis problems,
where patients descriptions take the form I(O) D (female, 45, 38.6, *, slight, 2).
In soft sciences such as Medicine, objects are described in terms of qualitative and
quantitative variables. In the logical combinatorial approach, most algorithms of
supervised classification are based on partial precedence as the Voting algorithm,
described below.
This algorithm comprises six steps [1]: (1) defining the system of support sets; (2)
defining the similarity function; (3) row evaluation, given a fixed support set; (4)
class evaluation for a fixed support set; (5) class evaluation for all the system of
support sets, and (6) resolution rule. Thus, to define a voting algorithm is to define
a set of parameters for each of the above six steps.
(1) Defining the system of support sets. A support set is a nonempty subset of
features which shall be used to analyze the objects, defined as:
Definition 3 Let ¨X be a support set, where ¨ ¤ ∅. A system of support sets
is defined as D ¨1 , : : : , ¨s . By ¨O, we denote the ¨-part of O formed by the
variables xj 2 ¨m , mD1, : : : , s.
The system of support sets will allow analysis of the objects to be classified,
by paying attention to different parts or sub-descriptions of the objects, and not
analyzing the complete descriptions. Examples of systems of support sets are
combinations with a fixed cardinality, combinations with variable cardinality, the
power set of features, etc.
(2) Defining the similarity function. The analogy between two objects is formal-
ized by the concept of similarity function. This function is based on the comparison
criterion Ci generated for each variable xi . It is important to mention that the
similarity function can evaluate the similarity or difference between two objects,
i.e., between their descriptions.
Definition 4 Let ˇ:(Mi Mi )2 !
be the similarity function, where
(as in the
comparison criterion function) can be of any nature; it is an ordered set and can be
finite or infinite. For I(Oi ) and I(Oj ) being two object descriptions in the domain
(M1 . . .Mn ), ˇ(I(Oi), I(Oj )) is defined by:
• ˇ((C1 (x1 (Oi ), x1 (Oj )), : : : , Cn (xn (Oi ), xn (Oj )))), if Ci denotes similarity
• 1 ˇ((C1 (x1 (Oi ), x1 (Oj )), : : : , Cn (xn (Oi ), xn (Oj )))), if Ci denotes difference
174 M.R. Ortiz-Posadas
Remark Both, the comparison criterion and the similarity function, are not neces-
sarily symmetric and, in general, these functions are not defined as positive, they do
not have to satisfy the triangle inequality, and there is no a priori metric considered.
Definition 5 Let Ҭ be a partial similarity function defined by:
X
ˇ! .I .Oi / ; I.O// D 1 i Ci .xi .Oi / ; xi .O//
xi 2!
1 X j
j .O/ D .O/
jj !2 !
Glaucoma is a set of ocular disorders that leads to optic’s nerve damage, character-
ized by abnormally high intraocular fluid pressure, damaged optic disk, hardening
of the eyeball, and partial to complete loss of vision. It is the main cause for
The Logical Combinatorial Approach Applied to Pattern Recognition in Medicine 175
irreversible blindness around the world. The World Health Organization estimates
37 million affected people, prognosticating 80 million by 2020 [12]. Accurate
diagnosis of glaucoma allows initiating drug and surgical treatment to avoid vision
loss. In the case of congenital glaucoma (incorrect or incomplete development of the
eye’s drainage canals during the prenatal period), its differential diagnosis is very
important because prescription of corticoids in young people is contraindicated,
because it interferes with normal child development. The objective of this work
was to develop a method for the differential diagnosis of glaucoma using the logical
combinatorial approach.
Six variables were defined: intraocular pressure (IOP), optic nerve/disc ratio (DR),
iridocorneal angle (ICA), visual acuity (VA), presence of scotomas (a partially
diminished or entirely degenerated visual acuity which is surrounded by a field of
normal—or relatively well-preserved—vision) (S), and age (A) [13]. Likewise, six
comparison criteria of difference were modeled considering Definition 2 (Section 2).
The zero value means that compared values are equal (there is no difference), and
the 1 value means that compared values have the greatest difference. The variables,
their domain, and their comparison criterion are shown in Table 1. Observe that the
comparison criterion function considers the absence of information denoted as (*).
The comparison between the descriptions of two eyes was determined consider-
ing Definition 4 (Section 3.1) by the Glaucoma similarity function “Glaucoma as:
6 6
!
X X
ˇGlaucoma .I .P1 / ; I .P2 // D 1 i Ci .xi .P1 / ; xi .P2 // = i (1)
iD1 iD1
4.1.2 Classification
The method was tested with a sample of 58 different clinical cases of glaucoma
diagnosis, reported in the medical literature [13]. Some cases were about bilateral
glaucoma, so the information was considered for both eyes. The learning matrix
(LM) was constructed with 48 eyes, and the control matrix (CM) with 10 eyes. The
following five classes were defined:
K1 : Open-angle Glaucoma (OAG); 12 eyes in LM and 2 in CM.
K2 : Close-angle Glaucoma (CAG); 14 eyes in LM and 2 in CM.
K3 : Congenital Glaucoma (CG); 7 eyes in LM and 2 in CM.
176 M.R. Ortiz-Posadas
4.1.3 Conclusion
This method provides a new approach for the diagnosis of glaucoma, because it
allows the absence of information in the values of some variables, and this is a
common situation in patient’s description. Sometimes, the patient does not take
all the required studies and all the information needed to do the diagnosis is not
available.
The method proposed here is useful in making the diagnosis of glaucoma at an
earlier stage and is also useful to determine the progression of damage at an earlier
stage than the traditional tests, because the similarity function allows evaluating the
likelihood not only of different eyes, but of the same eye in different points in time.
The term somatotype is defined as the quantification of the present shape or physical
structure and composition of a human body and is one of the most frequent tasks
of Kineanthropometry, the discipline that studies the human body through the
measurements and assessments of their size, shape, proportionality, composition,
biological maturation, and body functions. The technique of somatotyping is used
to appraise body shape and composition. Somatotype concept is very useful in
different areas of healthcare, such as diet monitoring, effect of ergogenic aids, eating
disorders, and/or sport sciences, in order to compare an athlete somatotype with
his/her team, or with a standard reference, or with a normal population, or itself
at different stages of the training [14]. It is expressed in a three-number rating,
always in the same order, representing the components endomorphy, mesomorphy,
and ectomorphy, respectively. Endomorphy is the relative fatness, mesomorphy is
the relative muscle-skeletal robustness, and ectomorphy is the relative linearity or
slenderness of a physique [15] (Fig. 1).
178 M.R. Ortiz-Posadas
mesomorphy
rugby player
male basketballer
female basketballer
en
hy
do
orp
mo
tom
rph
ec
y
Fig. 2 Scheme of the somatochart used in Heath–Carter Method (Adapted from [17])
X Ct xt .Oi / ; xt Oj
ˇendo I .Oi / ; I Oj D 1 (7)
tD1;2;3;10
4
8
X Ct xt .Oi / ; xt Oj
ˇmeso I .Oi / ; I Oj D 1 (8)
tD3
6
10
X Ct xt .Oi / ; xt Oj
ˇecto I .Oi / ; I Oj D 1 (9)
tD9
2
Finally, the total similarity function was composed by the three partial similari-
ties as follows:
ˇendo C ˇmeso C ˇecto
ˇtotal I Oi ; I Oj D (10)
3
The Logical Combinatorial Approach Applied to Pattern Recognition in Medicine 181
All similarity functions were bounded in the interval [0, 1], where 0 means
that there is no similarity (greatest difference) and 1 corresponds to identical
somatotypes.
The procedure to calculate the similarity between two somatotypes using the
similarity function is described as follows: First, the partial similarity between the
three components (“endo , “meso , and “ecto ) of each pair of somatotypes is calculated
using Eqs. (7), (8), and (9) respectively; and second, the overall similarity between
both somatotypes is calculated using Eq. (10).
4.2.2 Classification
For testing the classification method, there was a sample of 38 subjects previously
classified by the Heath–Carter Method into the three classes mentioned [16].
The LM was performed with 29 subjects: 10 in the endomorph class, 11 in the
mesomorph class, and 8 in the ectomorph class. The CM was constructed with
the 9 remaining subjects, 3 in each class mentioned. The classification results are
shown in Table 4. Note that the values highlighted in bold correspond to the higher
values obtained by the Voting algorithm for the classification. Subjects O1 , O2 , and
O3 obtained the major voting (similarity) for the endomorph class, and according
to the general solution rule these were classified into this class. In the same way,
subjects O4 , O5 , O6 were included in the mesomorph class and finally, subjects O7 ,
O8 , O9 were classified in the ectomorph class. In this way, 100% of the subjects
were correctly classified.
4.2.3 Conclusion
component in separate way by defining the support sets and the partial similarity
function. Finally we have shown that our method is effective for comparing
somatotypes and estimates the similarity between them, and all these characteristics
make it simpler than the traditional methods.
Cleft lip and palate consist of congenital malformations in the lip and/or palate,
which are called cleft-primary palate and/or cleft-secondary palate, respectively
(Fig. 3). Primary palate is formed by the prolabium, the premaxilla, and columella
[18]. This is the “visible” part of these kinds of malformations. The secondary
palate begins at the incisive foramen and extends posteriorly. It includes the
horizontal portion of the premaxilla, horizontal portion of the palatine bones, and
soft palate [18]. The worldwide incidence of these congenital abnormalities is 1.7
per 1000 live born babies [19]. In Mexico, the incidence is 0.81 per 1000 live born
babies [20], meaning more than 90,000 actual cases.
Surgical complexity for cleft reconstruction will depend on fissure complexity
involving lip, nose, and/or palate. Cleft correction translates into a very slow and
complex process; because it is related to the growth and development of the patient
and it requires at least one surgical procedure. The importance of prognosis of
the patient’s rehabilitation, and subsequent evaluation of the surgical result, is the
physician’s self-feedback during all the rehabilitation process. The physician will
learn if the work for patient rehabilitation is adequate, or if it can be improved. This
has a direct consequence in the future quality of patient’s life.
The objective of this work was to develop a method to help physicians to
assess and prognosticate the rehabilitation of patients with this kind of congenital
malformations.
2
X
ˇcleft .I .P1 / ; I .P2 // D 1 t Ct .xt .P1 / ; xt .P2 // (11)
tD1
11
X
ˇlip .I .P1 / ; I .P2 // D 1 t Ct .xt .P1 / ; xt .P2 // (12)
tD3
184 M.R. Ortiz-Posadas
where: ¡t D f0.16, 0.15, 0.14, 0.15, 0.08, 0.12, 0.10, 0.05, 0.05g
18
X
ˇnose .I .P1 / ; I .P2 // D 1 t Ct .xt .P1 / ; xt .P2 // (13)
tD12
ˇTC .I .P1 / ; I .P2 // D 0:60 ˇcleft .I .P1 / ; I .P2 // C 0:20 ˇlip .I .P1 / ; I .P2 //
C 0:20 Œˇnose .I .P1 / ; I .P2 // (14)
where “cleft , “lip , and “nose are the similarity functions corresponding to the
affected structures cleft, lip, and nose, with a relevance parameter of 0.60, 0.20,
and 0.20, respectively.
4.3.2 Classification
The rehabilitation prognosis of patients with cleft palate is carried out by con-
sidering the original condition of the patient and taking into account the degree
of rehabilitation attained by previous patients cared for in the hospital. Prognosis
is conceived as a result from a supervised classification problem and uses a
learning matrix (LM) made from cleft descriptions from patients who already
finished their rehabilitation, and the voting classification algorithm. The LM was
divided into three postsurgical classes: excellent (E), very good (VG), and good
(G), determined from the evaluation of the surgical result of each patient. These
classes provide the expert with a criterion for the evaluation (classification) of the
degree of rehabilitation accomplished by the patient. Each patient is prognosticated
(classified) by comparing his/her initial description with the initial descriptions of
patients already included in the LM. The most relevant patients for the prognosis
will be those who are the most similar to the patient one is about to classify. This
means that the prognosis corresponds to the class that includes the patients most
similar to the subject that will be classified. In this way, a patient will be predicted
as VG if his/her description is most similar to patients from the LM included in the
“very good” class. In the same way, evaluation of rehabilitation advance is made
using the patient’s postsurgical description, and applying the expert criteria which
defined the postsurgical classes mentioned above. The classification will correspond
to the patient’s rehabilitation advance.
The method was tested with a sample of 95 patients attended by the cleft palate
team at the reconstructive surgery service of the Pediatric Hospital of Tacubaya,
which belongs to the Health Institute of the Federal District in Mexico City.
For acquiring patient data, we designed a patient’s registration form given to the
surgeons, in order to fill it out with the cleft description by the variables defined for.
The LM was constructed with 32 patients, distributed as follows: 10 in E class, 14
The Logical Combinatorial Approach Applied to Pattern Recognition in Medicine 185
4.3.3 Conclusion
5 Conclusion
In this work, it is shown how the logical combinatorial approach is very useful
in the mathematical modeling and supervised classification of medical problems.
This is because this approach allows objects description including both qualitative
and quantitative variables simultaneously, and it can process them depending on the
variable type in an individual differential way by the comparison criterion function.
Furthermore, it is also possible to compare partial (or total) object description to
186 M.R. Ortiz-Posadas
include both support set concept and the partial (or total) similarity function. As
well as the use of the Voting classification algorithm based on the concept of partial
precedence.
This paper serves as an illustration of the application of the logical combinatorial
approach to pattern recognition in three medical problems conceived as a supervised
classification one, in order to show that this approach is adequate for problem
modeling in soft sciences.
6 Future Work
It is important to say that even though there are more and better available health
technologies, physicians sometimes require specific information about a particular
diagnosis or treatment that commercial equipment does not provide. Hence, the
importance of developing knowledge-based computational tools to aid in medical
decision-making. In this sense, the logical combinatorial approach of pattern
recognition theory is currently being applied in two medical diagnostic problems:
liver fibrosis and cervical cancer.
Cervical Cancer (CC) worldwide is the second most prevalent neoplasm and the
fourth leading cause of cancer death in women [22]. Annually about 530,000 new
cases are detected, approximately half of which will end with the death of the patient
[23]. Most CC cases occur in underdeveloped or developing countries such as Latin
American and Caribbean countries. Particularly in Mexico, an incidence of 23.3
cases per 100,000 women and a mortality rate of 8.1 cases per 100,000 women are
estimated [24].
At present, there are technologies that can make a high resolution scan of the
slides that have the biopsies, to obtain a digital image. These technologies allow
to share the digital images with other pathologists around the world, in order to be
trained by an expert pathologist for training how to evaluate positive patterns of
immunohistochemistry with respect to the pixels of the image. However, there is no
mathematical tool that allows the analysis of biopsy images which can differentiate
types of epithelia and assign a diagnosis itself. Therefore, the development of
a computational tool for the analysis of cellular patterns in preneoplastic and
neoplastic cervical lesions, which provides an accurate and opportunistic diagnosis
itself, would be very useful to decongest the reading system of biopsies, to do
objective diagnosis, and deliver a correct result to the patient. This is the purpose of
this research.
On the other hand, liver fibrosis is the essential component of chronic liver
diseases and its final stage leads to cirrhosis. This is a condition with a high rate
of morbidity and mortality and it constitutes one of the main health problems in the
world. In some Latin American countries, cirrhosis of the liver occupies between 5ı
and 6ı place as a general cause of death [25]. In Mexico, liver cirrhosis morbidity in
2005 was 11.7 cases per 100,000 inhabitants and 12.4% in 2006, which represents
an increase of 6% [26].
The Logical Combinatorial Approach Applied to Pattern Recognition in Medicine 187
In order to evaluate the progression of fibrosis, the most common test is the
invasive one, percutaneous liver biopsy; however, it will be better for patients to
have a noninvasive technique with high sensitivity and repeatability, which allows
the characterization of biological tissue and makes a truthful and timely fibrosis
diagnostic. That is why an initial study of the thermal characteristics of hepatic
tissue with different degrees of disease progression was made [27], and now the
combinatorial logic approach is currently being applied to classify tissue in the
different stages of progression of liver fibrosis to cirrhosis. In this way, it will
be possible to deepen the understanding of liver fibrosis and its development.
References
15. Shepherd, M.A.J.: Body type training – are we slaves to our ‘body type’ genes? [cited July
2011]. Available at http://www.pponline.co.uk/encyc/body-type-training-are-we-slaves-to-our-
body-type-genes-39798 (2011)
16. Acosta-Pineda, I., Ortiz-Posadas, M.R.: Somatotype classification using the logical combina-
torial approach of pattern recognition. In: Proceedings IFMBE V Latin-American Congress on
Biomedical Engineering. (In Spanish) (2011)
17. Wood, R.: Somatotype and sport. [cited July 2011]. Available at http://www.topendsports.com/
testing/somatotype.htm (2001)
18. Kernahan, D.A., Stark, R.B.: A new classification for cleft lip and cleft palate. Plast. Reconstr.
Surg. 22, 435 (1958)
19. Mossey, P.A.: Cleft lip and palate. Lancet. 374(9703), 1773–1785 (2009)
20. Health Ministry of Mexico: Cleft lip and palate incidence by age. Unique Information System
for Epidemiology Vigilance. Dirección General de Epidemiología. [cited may 2011]. Available
at: http://www.dgepi.salud.gob.mx/anuario/html/anuarios.html
21. Children’s Hospital of Wisconsin: Cleft lip and/or palate. [cited February 2009]. Available at
http://www.chw.org/display/PPF/DocID/35472/Nav/1/router.asp
22. Ault, K.A.: Epidemiology and natural history of human papillomavirus infections in the female
genital tract. Infect. Dis. Obstet. Gynecol. 2006(40470), 1–5 (2006)
23. World Health Organization: Comprehensive cervical cancer control. In: A guide to essential
practice. 2n edn. Geneve. WHO Library Cataloguing-in-Publication Data. [Cited may 2016].
Available at: http://apps.who.int/iris/bitstream/10665/144785/1/9789241548953_eng.pdf
(2014)
24. Ferlay, J., et al.: Cancer incidence and mortality worldwide: sources, methods and major
patterns in GLOBOCAN 2012. Int. J. Cancer. 136, E359–E386 (2015)
25. Narro, J., et al.: Mortality by liver cirrhosis in Mexico: relevant epidemiologic characteristics.
Salud Publica Mex. 34(4), 378–387 (1992). (In Spanish)
26. Health Ministry: Health: Mexico 2006. Technical report, pp. 46–48. [cited April 2015]. Avail-
able at: http://www.salud.gob.mx/unidades/evaluacion/saludmex2006/SM06.pdf. (In Spanish)
27. Alemán-García, N., et al.: Fibrosis evaluation of animal liver tissue by thermal conduction. In:
Proceedings IFMBE VII Latin American Congress on Biomedical Engineering, 60, 674–677
(2016)
On the Uniqueness of Invariant Measures
for the Stochastic Infinite Darcy–Prandtl
Number Model
1 Introduction
Applied analysts are often interested in the analysis and modeling of physical
phenomenon. Many of the models they investigate consist of a system of partial
differential equations, with appropriate initial and boundary conditions. The equa-
tions depend on initial data intrinsic to the physical process, as well as parameters,
which change according to physical situations. Varying these parameters, and taking
appropriate limits with respect to them, sometimes leads to a simplification of the
original model. This “reduced” model so to speak may be more tractable from
an analysis and/or computational point of view, than the original model. It might
also lend valuable insight into the properties of the physical process. One might
then ask, what information is lost concerning the original model in the limiting
process, or alternatively what is preserved? Also, in what sense are the original
and reduced models close, if indeed they are so? A program to investigate such
questions, in the context of convective fluid flow, modeled by the Boussinesq
system, was initiated by Wang in [22–24]. We then continued this program in
[15, 16], for convective fluid flow in porous media, where we considered the Darcy–
Boussinesq system, and its “reduced” variant, the infinite Darcy–Prandtl number
model. Both of these models have generated considerable interest lately. They find
diverse applications in the fields of geothermal engineering, construction of thermal
insulators, nuclear waste management, thermal enhanced oil recovery, groundwater
flow, and hydraulic fracturing [2, 18, 19, 21]. Thus there is good reason to further
investigate the aforementioned systems. However, for chaotic systems such as these,
it is meaningless to talk of one single trajectory, or any information therein. This is
due to sensitive dependence on initial data, as well as on parameters. Alternatively,
one might focus on statistical properties, or “averages” of the system, such as
invariant measures [24]. For the deterministic Darcy–Boussinesq system, there is no
unique invariant measure. This is seen by constructing measures consisting of point
masses centered at various steady states [25]. These multiple steady states then
will give rise to multiple invariant measures. Our goal in the current manuscript is
to show the existence of a unique invariant measure, for the deterministic Infinite
Darcy–Prandtl number model, forced by a white noise. Although much of the
forthcoming analysis involves stochastics, for the benefit of the reader, we will
recap certain physical details of fluid flow in porous media, as well as details of
the Darcy–Boussinesq system and infinite Darcy–Prandtl number model, before we
proceed with the stochastic preliminaries.
Recall, a porous medium is a solid structure often called a matrix which consists
of interconnected void spaces called pores. In many physical situations, there is fluid
flow through such mediums [14], making it an important class of flows for physical
applications. It is impossible to know a priori the exact physical structure of porous
media at a local level. Hence, we consider averaging the flow over a representative
pore scale. The point of this is to build a continuum on which we can then apply the
regular principles of fluid mechanics. A porous medium has two important defining
features: the porosity and the permeability K. The porosity is defined as the ratio
of the void space to the whole space. The permeability K describes how easy or
difficult it is for the fluid to flow through a medium. The literature on modeling
convective flow in porous media is very extensive and dates back to the work of
Horton and Rogers [7] and Lapwood [8].
An effective model for convection in a porous medium is the Darcy–Boussinesq
system [14]. The physical space for the problem consists of a fluid-saturated porous
medium, confined between two plates, a distance of h units apart. The bottom plate
is heated to a temperature say T2 and the top plate is cooled to a temperature say T1
where T2 > T1 . In order to non-dimensionalize the problem, we measure length in
2
units of the layer thickness h, and time in units of the thermal diffusion timescale h .
Thus the fluid occupies the non-dimensional region
Uniqueness of Invariant Measures 191
1 @u
C u C rp D RaD kT; r u D 0; u3 jzD0;1 D 0; ujtD0 D u0 ; (2)
PrD @t
@T
C u rT D T; TjzD0 D 1; TjzD1 D 0; TjtD0 D T0 : (3)
@t
On the sidewalls, periodic boundary conditions are imposed for convenience.
Here u is the seepage velocity, T is the temperature field, and k is the upward
pointing unit vector. The first parameter in the system is the Darcy–Rayleigh number
defined as
g˛.T2 T1 /Kh
RaD D : (4)
where is the kinematic fluid viscosity, is the coefficient of thermal diffusion, ˛
is the volume expansion coefficient of the fluid, g is the gravitational constant, and
K is the Darcy permeability coefficient. The second parameter in the system is the
Darcy–Prandtl number defined as
h2
PrD D : (5)
K
As mentioned earlier, K measures the ability of the porous medium to transport
fluid and can vary quite drastically within different materials. We illustrate with a
table providing ranges in permeability of some common rocks [9],
Thus we see that when the porous medium is say certain limestone or sandstone,
the permeability K is extremely small, in comparison to the thickness h of the
medium, which is of order 1. This situation leads to a very large PrD or Darcy–
Prandtl number. Under a large Darcy–Prandtl number assumption, this system can
be reduced to the infinite Darcy–Prandtl number model [5], via formally taking the
limit as PrD ! 1 in the Darcy–Boussinesq system [5]. Thus we can interpret
the physical meaning of an infinite Darcy–Prandtl number, as a situation where
192 R.D. Parshad and B. Ewald
the ratio of the layer thickness to the permeability of the medium is very large, or
h
K
>> 1, which results in PrD >> 1, so PrD ! 1 is a reasonable approximation.
The resulting reduced model is described by the following set of coupled partial
differential equations along with a free-slip set of boundary conditions:
On the sidewalls, periodic boundary conditions are imposed for convenience. There
are a number of works in the literature, on the infinite Darcy–Prandtl number model
[11, 17]. The model possesses strong solutions which are C1 in space. In fact, the
solutions are actually Gevrey regular in space, and analytic in time. For a detailed
proof of global existence of strong solution, as well as Gevrey regularity of solution,
the reader is referred to [11].
Note that the infinite Darcy–Prandtl number model is not equipped with homo-
geneous boundary conditions. This is circumvented by introducing a change of
variable
T D C .z/: (11)
jzD0;1 D 0: (13)
rp C u D RaD k; (14)
r u D 0; (15)
@
C u r C u3 0 .z/ D C 00 .z/; (16)
@t
jzD0;1 D 0: (17)
also
00 .z/ D 0: (19)
Notice from (14), the velocity is completely determined by the temperature field
modulo the pressure. We will use this to our advantage and convert (14)–(16) to a
single equation. We apply the Leray–Hopf projector, denoted P, [20], to (14) and
insert the result into (16) to yield the following equation
@
D RaD P.k / r RaD 0 .z/ .P.k //3 ; (20)
@t
jzD0;1 D 0: (21)
Note that using the 3D Helmholtz decomposition [6], one can show that
.P.k//3 D , as long as is sufficiently regular. This is not an issue here, as the
solutions to the infinite Darcy–Prandtl number model are very regular [11]. Thus
using the abovementioned decomposition, and adding an appropriate white noise
to (20), we obtain the stochastic infinite Darcy–Prandtl number model
Heuristically, the noise will connect the various branches of the attractor, which
would not be able to interact without the presence of the noise. Essentially, the
stochastic forcing introduces a probability of being “kicked” from one steady state
to another, an impossibility without the noise. The noise will thus connect all
disconnected branches of the attractor to yield an invariant measure. We pay the
price however by having to work in a probabilistic setting on a Hilbert space.
Techniques of adding noise to deterministic partial differential equations have
become quite popular. There is a vast literature on these so-called stochastic partial
differential equations. See [3] for a detailed treatment of such techniques. The
breadth of techniques covered in [3] is of a very technical nature. The authors treat
the case of infinite-dimensional noise. For our case however, a finite-dimensional
noise will suffice. Although there is no general theory to treat equations forced
by degenerate or finite-dimensional noise, there are various results that provide us
with valuable insight into the existence and uniqueness of invariant measures for
dissipative stochastic systems. We recall certain prominent results relevant in our
setting.
Mattingly, in his PhD dissertation, considered the 2D stochastic Navier–Stokes
equations forced by degenerate white noise [12]. He proved uniqueness of the
invariant measure for this equation. Later, along with E and Sinai he studied this
problem further, deriving various results that were reported in [13]. The methodol-
ogy developed by them was extended to a host of other stochastic partial differential
equations such as the stochastic Ginzburg–Landau and stochastic Cahn–Hilliard.
194 R.D. Parshad and B. Ewald
These equations were considered by E and Liu [10]. Recently these techniques were
also applied to the 3D truncated stochastic Boussinesq system by Wu and Lee [26].
Inspired by the above results, we rigorously investigate the stochastic infinite
Darcy–Prandtl number model (22). We primarily ask the following question. Does
there exist a unique invariant measure for (22)? Our contribution in the current
manuscript is to apply results directly from [10] to the stochastic infinite Darcy–
Prandtl number model, in order to answer the above question in the affirmative.
E and Liu in [10] prove the existence of a unique invariant measure for a general
dissipative stochastic PDE, under certain suitable conditions. We will systematically
check that the stochastic infinite Darcy–Prandtl number model satisfies each one of
these. We have organized our manuscript as follows. In Section 2, we describe the
mathematical formulation of the problem. Section 3 is aimed at validating the first
two conditions as posed in [10]: see the appendix. In Section 4, we make various
probabilistic estimates aimed at validating the remaining conditions. The results of
these sections are brought together in Section 5, where we state our main result via
Theorem 2. We then offer some concluding remarks in Section 6. In all estimates
made henceforth, C is a generic constant that can change in its value from line to
line, and sometimes within the same line, if so required.
where the !k ’s are independent standard Brownian motions which generate the
filtered probability space .; F; Ft ; P/. The k 2 R are coordinate-wise standard
deviations, and the ek .x/ are as described earlier, and form a basis for L2 .X/.
Expectations are taken with respect to P. Defining noise with this structure facilitates
taking inner products. This becomes important in the energy estimates performed
henceforth. We will assume that (24) possesses a unique strong solution for almost
all ! 2 . Here we pause and define the notions of strong and weak solution.
Definition 2.1. A D. / valued predictable process .t/, t 2 Œ0; T, is called an
analytically strong solution of (24) if
Z t
.t/ D 0 C . .s/ C R. //ds C W.t/; P a:s (27)
0
Definition 2.2. An H valued predictable process .t/, t 2 Œ0; T, is called a mild
solution of (24) if
Z t Z t
.t/ D S.t/0 C S.t s/R. //ds C S.t s/dW.s/; P a:s (28)
0 0
where t0 < t1 < t2 < . . . < tn < 0, and the Ai are Borel subsets of H. Define
B H by
˚
B D .; w/; 2 A0 ; t!0 ;ti 2 Ai ; i D 1; 2; ::n ; (32)
and define p .A/ D . P/.A/. Then p is consistent on cylinder sets and can be
extended to the natural -algebra by Kolmogorov’s extension theorem.
We also briefly recount the concept of Gibbsian dynamics of the low modes. We
partition the phase space H D L2 .X/ into a space of high modes and low modes:
Furthermore,
Z
K. / d. / ˇ; (38)
H
Condition 41 : For all L0 2 P, a 2 .0; 1/, and T 0, there exists K 0 such that
Z T
P jG.l.s/; h.s//j2H ds < K 1 a > 0: (40)
0
Here
1
For the notation in conditions 3 and 4, please refer to Section 2.3 of [10].
198 R.D. Parshad and B. Ewald
Thus we have a closed form for the dynamics of the low modes given an initial
past. The following difference operator also appears often:
Remark 3. We only consider the case of finite-dimensional noise, that is when only
the low modes are forced. This facilitates making the energy estimates. However,
the arguments we make here apply when the high modes are also randomly forced.
All we require is that the forcing amplitudes on the high modes decay fast enough.
We now proceed systematically to verify conditions 1–4, via (36), (37), (39),
and (40), from [10]. Essentially, we want to follow the ideas in [10] and reduce
the infinite-dimensional dynamics of the stochastic infinite Darcy–Prandtl number
model to the finite-dimensional Gibbsian dynamics. This will facilitate the use of
Girsanov’s Theorem to yield a unique invariant measure. In this section, we state
and prove two Lemmas, of which the first two conditions (36) and (37) will be a
direct consequence.
Lemma 3.1. For the infinite Darcy–Prandtl number model, there exist constants
> 0 and k0 0 such that
˝ ˛
h ; i2 C RaD P.k / r RaD 0 .z/; 2 j.t/j22 C k0 : (45)
0
Proof. From the form of (20), and the choice of .z/, that yields .z/ D 1, we
have
h ; i2 C hR. /; i2
D 0
E
D h ; i2 C RaD P.k / r RaD .z/;
2
and the estimates on the L2 norm of via (63), and Lemma 4.2. Here C1 D j.0/j22 C
0
C2
. Thus the lemma is proved for, say, D C1 and k0 D RaD C1 . t
u
Thus condition 1 (36) [10] is satisfied.
Uniqueness of Invariant Measures 199
This follows via integration by parts and using the regularity of so that
P.k/3 D . We next use Holders inequality and adopt the Ladyzhenskaya
inequality, along with Young’s inequality with to yield
200 R.D. Parshad and B. Ewald
Z Z
RaD
1 z C RaD jj2 dx
2 H H
Our goal in this section is to derive estimates for the energy EŒj j22 and the enstrophy
EŒjr j22 . This is necessary to derive certain lemmas which are crucial for proving
the next set of conditions.
We begin with estimates on the energy. We apply Itô’s lemma on the map
1 2
.t/ 7! jj : (52)
2 2
This yields
Z
1
dj.t/j22 D ŒRaD 0 .z/P.k.t//.t/ dx jr.t/j22 hu r; i2 dt
2
1
h; dWi2 C 0 dt: (53)
2
Uniqueness of Invariant Measures 201
P
Here 0 D jk j2 . Via the appropriate choice for .z/, we obtain
1 2 1 2 2
dj.t/j2 j.t/j2 jr.t/j2 dt C 0 dt h; dWi2 : (54)
2 2C
We can show that the quadratic variation of MtT is finite, implying that MtT is a
martingale and so
EŒMtT D 0: (58)
Thus we have
Z t
1 1 1
EŒj.t/j22 C EŒj.s/j22 ds EŒj.0/j22 C 0 t; (62)
2 2C 0 2
and an application of Gronwall’s lemma yields
0
EŒj.t/j22 e2C2 t EŒj.0/j22 C .1 e2C2 t /: (63)
C2
1
Here C2 D 2C .
We now state a lemma that enables us to derive a uniform bound on the L2 -norm
of .
Lemma 4.1. Consider a that is a solution to the stochastic infinite Darcy–Prandtl
number model. For an invariant measure on H, there exists a constant C such that
the following estimate holds uniformly in the time parameter:
Z
jj22 d. / C: (64)
H
˚
Proof. For any > 0, there is a b such that W j j22 b 1 . We define
the set
˚
B D W jj22 b : (65)
This follows via the estimates derived in (63). We now let t ! 1 and H ! 1 and
obtain the result, as was arbitrary. This proves the Lemma. t
u
We will now derive estimates for EŒjr.t/j22 . We apply Itô’s lemma on the map
1
.t/ 7! jrj22 : (66)
2
Uniqueness of Invariant Measures 203
This yields
Z
1
djr.t/j22 D Œj .t/j22 C RaD 0 .z/ dx dt
2 X
This can easily be done via readjusting the temperature profile .z/, to still be linear
but decay at a sharper rate. Thus we obtain
1 1
djr.t/j22 Œj .t/j22 C RaD jj1 jr j2 j j2 C jr j22 dt
2 8C3
h ; dWi2 C 1 dt: (71)
Cjj1 jr j2 j j2
1 1
Cjj1 j C1 j j 24 jj42 C C2 jj22 j j2
3
3 1
Cj j2 jj4 C C2 jj22 j j2
2 2
204 R.D. Parshad and B. Ewald
1 21 3 1
C j j2 j j C j j22 C 4.C2 /2 j j42
2
4 4
43
3 1 21 4 1
C j j22 C j j4 C j j22 C 4.C2 /2 j j42
4
1 1
j j22 C C5 jj24 C j j22 C 4.C2 /2 j j24
4 4
4
This follows via the Sobolev embedding of L2 ,! L 3 , Cauchy–Schwartz inequality,
1 43
and Young’s inequality with , where D 4C . Thus we obtain
djrj22
2 1 2 1 2 2 2 2
2 j j2 C j j2 C jr j2 C C5 j j4 C 4C2 j j4 dt
2 8C3
h ; dWi2 C 1 dt: (74)
Ejr.t ^ T/j22
Z t^T Z t^T
1
Ej .s/j22 ds C EŒjr.s/j22 ds
0 4C 3 0
Z t^T
C C5 Ej.s/j24 C 4.C2 /2 Ej.s/j42 ds
0
Z t^T
E h ; dWi2 C 1 .t ^ T/: (75)
0
and we can show that the quadratic variation of MtT is finite, implying that MtT is a
martingale and therefore EŒMtT D 0 . Then the optional sampling Theorem yields
EŒMt^T
T
D 0. Hence, we can take H ! 1, so T ! 1 and thus t ^ T ! t. Again
incorporating these limits in (75) gives
Z t Z t
1
EŒjr.t/j2
2
EŒjr.s/j2 ds C
2
EŒj .s/j22 ds
4C3 0 0
Z t^T
EŒjr.0/j22 C C5 Ej.s/j24 C 4.C2 /2 Ej.s/j42 ds C 1 t: (77)
0
Uniqueness of Invariant Measures 205
and so
Z t
EŒjr.t/j22 C4 EŒjr.s/j22 ds C EŒjr.0/j22 C .C5 C 1 /t: (80)
0
Here C4 D 4C3 3 and C5 is the uniform estimate on the sum of EŒj.s/j22 via (63),
and EŒj.s/j4 , via the L1 boundedness of . Hence, an application of Gronwall’s
lemma yields
1 C C5
EŒjr.t/j22 eC4 t .EŒjr.0/j22 / C .1 eC4 t /: (81)
C4
We now state a lemma that enables us to derive a uniform bound on the L2 -norm
of r .
Lemma 4.2. Consider a which is a solution to the stochastic infinite Darcy–
Prandtl number model. For an invariant measure on H, there exists a constant
C such that if jr.0/j22 C, then the following estimate holds uniformly in the time
parameter:
Z
jr j22 d. / C: (82)
H
Proof. The proof could follow via mimicking the methods for the L2 -norm of .
However, we provide an alternate proof. It follows from the a priori estimates on
EŒjr j22 that
Z t Z t
1 1 1
EŒj.t/j22 C EŒjr.s/j22 ds EŒj.t0 /j22 C EŒj.s/j22 ds C 0 .t t0 /:
2 t0 2 2C t0
(83)
206 R.D. Parshad and B. Ewald
C;
using the uniform estimates on EŒj.s/j22 . Thus, from ergodicity, it follows that
Z t Z
1
lim EŒjr.s/j22 ds D EŒjr.s/j22 d. / C: (84)
t0 !1 t t0 t0 H
The following lemma gives a probabilistic estimate of the growth rate of j j22 and
jr j22 .
Lemma 4.3. For all a 2 .0; 1/, ı > 1, there exists a K1 such that if j0 j22 Cjr0 j22
C0 , then, for any t 0,
Rt Rt
j.t/j22 C jr.t/j22 C C. 0 jr.s/j22 ds C 0 j .s/j22 ds/
P 1 a: (87)
C1 C C2 t C K1 .t C 1/ı
Z t Z t
C.j.0/j22 C jr.0/j22 / C .0 C C5 C 1 /t C h; dWi2 h ; dWi2
0 0
Z t Z t
C1 C C2 t C h; dWi2 h ; dWi2 :
0 0
and
Z t
Mt1 D h ; dWi2 : (89)
0
and
Z t
ŒM 1 ; M 1 t . max /2 j.s/j22 ds; (92)
0
where
.max /2 D sup jk j2 (93)
and
. max /2 D sup jk2 k j2 : (94)
Here the k are the standard deviations of the kth components of the noise. This is
not to be confused with the subscript k we use next to indicate an index in time. Note
that we have obtained estimates on the L2 -norm of . We thus proceed by defining
the following events
( )
K1 ı
Bk D sup jMs j .k C 1/ : (95)
s2Œ0;k 4
208 R.D. Parshad and B. Ewald
42
P fBk g EŒjMs j2 .Doob0 sinequalityappliedto Bk /
.K1 /2 .k
C 1/2ı
" #
42
E sup jMs j 2
.K1 /2 .k C 1/2ı s2Œ0;k
42
EŒ.ŒM; Mk / (Burkholder–Davis–Gundy inequality)
.K1 /2 .k C 1/2ı
Z t
42
E .max / 2
j.s/j 2 ds .estimateon EŒ.ŒM; Mjk //
2
.K1 /2 .k C 1/2ı 0
Z k
42
. / 2
EŒj.s/j22 ds
.K1 /2 .k C 1/2ı max 0
42
. /2 Ck .estimateon EŒj.s/j22 /:
.K1 /2 .k C 1/2ı max
We note that
( )
K1 ı [ X
P Mt .t/ D 1 P Bk 1 P fBk g : (97)
4 k k
We see that these sums are finite for sufficiently large ı. In particular, ı > 1 suffices.
We note
X
K1 ı
P Mt .t/ 1 P fBk g : (98)
4 k
P
We can make the sum k P fBk g arbitrarily small by increasing K1 , since
X 1 X Ck 1 X 1 C
P fBk g 2 2ı
2 p
2: (99)
k
K1 k .k C 1/ K1 k k K1
q
2C
Here p > 1. Thus, given a 2 .0; 1/, if we choose K1 D a
, we obtain
K1 ı a
P Mt > t : (100)
4 2
Uniqueness of Invariant Measures 209
The same argument applies to the process Mt1 . Similar estimates can be made on
P fAk g where
( )
K1
Ak D sup jMs1 j .k C 1/ı : (101)
s2Œ0;k 4
Thus after performing a similar analysis as above, we can choose K1 large enough
to have
K1 ı a
P Mt >
1
.t/ ; (102)
4 2
and then combining (100) and (102) yields
K1
P Mt C Mt1 ı
.t C 1/ 1 a; (103)
2
Let
\
UT D Ak : (109)
kT
Then
!c
\ [
UTc D Ak D Ack ; (110)
kT kT
We will now estimate each of the quantities on the right-hand side of the above
inequality. We proceed with the first one. Chebyshev’s inequality yields
K0 16
p ..s// W j.k/j22 jK 1jı 2 .Ej.k/j22 /: (113)
2 K0 jk 1j2ı
Here C absorbs the uniform bounds of the energy estimates derived earlier. If we
choose ı > 12 , then
X C
< 1: (115)
k
jk 1j2ı
We have that
1
Fk .s/ C1 Mk /2
ŒMk ; Mk : (117)
.max
Recall the exponential martingale inequality for any positive constants ˛ and ˇ:
( )
˛
P sup Mk .s/ ŒMk ; Mk ˇ e˛ˇ : (118)
s2Œk;0 2
Hence, we arrive at
X X C X ı
p .Ack / 2ı
C C1 eC2 jk1j < 1: (121)
kT k
jk 1j k
This tells us that for large values of k the complement of Ak would p -almost never
occur. Hence, Ak would p -almost certainly occur. Hence, there must exist a time
T1 such that
We now state a lemma which gives an estimate on the difference of high modes
of two different solutions to (22). This lemma is crucial for a proof of the third
condition that follows subsequently.
Lemma 5.1. Suppose there exist two solutions to the stochastic infinite Darcy–
Prandtl number model:
and
Then there exists a positive constant C such that when N is chosen so that
then 1 D 2 , i.e., h1 .t/ D h2 .t/. Furthermore, given a solution .t/, any h0 , and
t 0, the limit exists:
Note that the ˛ and ˇ referred to in the Lemma above are introduced in condition
2, via (37) in [10]. The ˆ is the same as introduced earlier.
Proof. Let .t/ D h1 .t/ h2 .t/. Then subtracting the requisite equations yields
d
D A C Ph ŒR.1 2 /: (129)
dt
We multiply the above equation by , integrate by parts, and use condition 2 to yield
djj22
D hA; i C hŒR.1 2 /; i
dt
1
hA; i C hA; i C .C C K.1 /jj22 /
4
3N 2 2
jj2 C .C C K.1 //jj22 :
4
Then there exists T2 depending on t and 1 such that for t0 T2 , we have that
Z t
3N 2
.t t0 / C .C C K.1 // ; ds .t t0 /: (130)
4 t0
Uniqueness of Invariant Measures 213
It follows then that for any time t0R min.T1 ; T2 /, we have, as t0 ! 1,
4 t
exponential decay when N 2 3.tt 0 / t0
.C C K.1 // ds.
For the second part of the lemma, let the high mode of the given solution .t/ be
h1 , and the solution to the high-mode equation starting from t0 and h0 be h2 . Then
we have
( ! Z )
t
2 2 3N 2
jj2 jh.t0 / h0 j2 exp C K.1 .s// ds : (131)
4 t0
By the argument made before, .t/ decays to 0 as t0 ! 1, and the limit equals
h.t/. This proves the lemma. t
u
We are now in a position to verify the third condition, via (39) from [10]. We
N
fix L0 2 P and h.0/, which is an initial value for the high mode at time 0. Let
Ls D Ss! L0 define Ss! , and l.s/ D Lt .s/ for s t. Then we know that with probability
1, h.s/ D ˆs .Ls / where .s/ D .l.s/; h.s//, by Lemma 4.3. Fix a constant C0 such
that j.0/j22 C jr.0/j22 C0 . For any positive C, we define
Z t
D.C/ D f 2 C.Œ0; 1/; Ll2 / W jj22 C jrj22 C .jrj22 C j j22 / ds C1 C C2 t C C tı :
0
(132)
N
Therefore if we set h.s/ N
D ˆs .Ls ; h.0// N
and .s/ D h.s/ h.s/, then D l C h D
N
l C h C . We state the following Lemma.
214 R.D. Parshad and B. Ewald
Lemma 5.2. For the set D.C/ as defined in (132), the following estimate holds
Z 1
sup N
jD.l.t/; h.t/; h.t//j 2
dt < 1; (134)
f !WSt! L0 2D.C/ g 0
N 22
jD.l.t/; h.t/; h.t/j
˝ ˛
D sup N r.l C h///;
jRaD Pl .P.k.l C h/ r.l C h// P.k.l C h/ N w j2
fw2L2 ;jwj2 1g
sup jRaD hPl .P.k.l C h/ r//; wi j2
fw2L2 ;jwj2 1g
C sup j hRaD Pl .P.kr.l C h///; wi j2
f w2L2 ;jwj2 1 g
sup jRaD hPl .P.k.l C h/ //; rwi j2
fw2L2 ;jwj2 1 g
C sup j hRaD Pl .P.k.l C h///; rwi j2
fw2L2 ;jwj2 1g
sup Ra2D jPl .rw/j21 jP.k.l C h//j22 jj22
fw2L2 ;jwj2 1 g
C sup Ra2D jPl .rw/j21 jP.k.l C h//j22 jj22
fw2L2 ;jwj2 1g
sup Ra2D .jwj2H 3 /jj22 jj22
fw2L2 ;jwj2 1 g
C.N/ Ra2D j j22 jj22 :
and
Note that if Lt 2 D.C/, we can use the estimates on j j22 in Lemma 4.2, and on jj22
in Lemma 5.1 to yield
2 C 1 CC/t
N 22 j.0/j22 C.N/e.N
jD.l.t/; h.t/; h.t/j 2 .C1 C C2 t/: (137)
Uniqueness of Invariant Measures 215
1
If N is chosen such that N 2 > 2
C C as t ! 1, the right-hand side decays
exponentially. This yields
Z 1
sup N
jD.l.t/; h.t/; h.t//j 2
2 dt
f!WSt! L0 2D.C/g 0
Z 1
2 C 1 CC/t
sup tı C.N/e.N 2 .C1 C C2 t/ dt
!WSt! L0 2D.C/
f g 0
<K
< 1:
The following Lemma will be useful in proving the last condition from [10]. This
gives an estimate on the high modes of a solution to the stochastic infinite Darcy–
Prandtl number model.
Lemma 5.3. If h.t/ is the high-mode component of the solution to the stochastic
Darcy–Boussinesq equation with low-mode forcing l 2 RC.Œ0; t; Ll2 /, then jh.t/j22 is
t
bounded by a constant that depends only on jh.0/j22 and 0 jl.s/j22 ds.
Proof. We start with the equations for the high modes of the system, multiply them
by the high-mode component, and integrate the result by parts to yield
ddt 2
hj 2jrhj22 2RaD Ph .P.k.l C h// r.l C h/h C 2RaD 0 .z/Ph Œl C hh
j 2
2jrhj22 2RaD hP.k.l C h/ rl; hi hP.k.l C h/ rh; hi C C jhj22
Z
2jrhj2 2RaD .llz h C hlz h/ dx C 2RaD jhj22
2
H
RaD jlz j1 jlj22 C RaD jlz j1 jhj22 C 2RaD jlz j1 jhj22 C C jhj22
RaD j lz j2 jlj22 C RaD j lz j2 jhj22 C 2RaD j lz j2 jhj22 C C jhj22
RaD C.N/jlj22 C .3C.N/RaD C C/jhj22
RaD C.N/jlj22 C C.N/RaD jhj22 :
216 R.D. Parshad and B. Ewald
These follow via integration by parts, the embedding H 2 .X/ ,! L1 .X/, and the
uniform estimate on jj2 . Thus, via the Gronwall inequality, we obtain
Z t Z s
2 2 2 2
jhj2 jh.0/j2 C C.N/RaD jlj2 exp C jl. /j2 d C C.N/RaD s ds: (138)
0 0
Let us assume that jl.0/j2 M. We define, for f 2 C.Œ0; 1/; Ll2 / and 0 s T,
.s/ D f .s/ C ˆs .f ; ˆ0 .L0 //. Set
Z t
DT .C/ D f 2 C.Œ0; 1/; Ll2 / W jj22 ds < CT; 0 t T : (139)
0
Proof. We know h.s/ D ˆs .Ls ; ˆ0 .L0 // with probability 1, from Lemma 5.1. Thus
we have
Here C.N/ absorbs various constants. Therefore we have that for l 2 DT .C /
Z t Z s
jhj22 jh.0/j22 C C.N/RaD jlj22 exp C jl. /j22 d C .C.N/RaD /s ds
0 0
Z T Z s
jh.0/j22 C C.N/RaD jlj22 exp C jl. /j22 d C .C.N/RaD /s ds:
0 0
Uniqueness of Invariant Measures 217
This is less than some C by Lemma 5.3, as we are on a finite time interval Œ0; T.
Here C depends only on jh0 j2 and the C and T used to define DT .C/. Therefore
Z T
sup jG.l.s/; ˆs .Ls ; ˆ0 .L0 //j22 ds
Lt 2DT 0
Z T
C.N/.jlj22 C jhj22 / ds
0
Z T Z t
C.N/CT C C.N/RaD jlj22 exp C 2
jl.s/j2 ds C .C.N/RaD /t dt
0 0
C14 T
C12 T C C13 e
K
< 1:
6 Conclusion
In conclusion, we have shown the uniqueness of invariant measure for the stochastic
infinite Darcy–Prandtl number model, under stochastic forcing of low modes.
Various questions remain open at this point, for example, the uniqueness of an
invariant measure for the stochastic Darcy–Boussinesq system. In this case, we
would have to add noise to both the velocity and temperature equations. This is
conceivably a harder question to tackle as the Darcy–Boussinesq system is only
weakly dissipative.
We have shown in [16] that the stationary statistical properties for the determin-
istic Darcy–Boussinesq system are upper semicontinuous after lifting in the singular
limit, i.e., for 2 IM , 0 0 , there exists a weakly convergent subsequence,
denoted , and 0 2 IM0 such that
* L.0 /: (142)
218 R.D. Parshad and B. Ewald
Hence, we would have a unique invariant measure for each fixed ı. What can be
said about the limit of these as ı goes to zero, the “zero-noise limit”? Some work
has been done in this regard for axiom A systems [27]. However, these are difficult
to verify pragmatically for most physical systems we deal with.
Acknowledgements The first author would like to sincerely acknowledge the suggestions and
guidance provided by his PhD advisor Dr. Xiaoming Wang. These greatly helped in completing
the current work.
References
12. Mattingly, J.: The stochastically forced Navier-Stokes equations: energy estimates and phase
space contractions. Ph.d thesis, Princeton University (1998)
13. Mattingly, J., Weinan, E., Sinai, Y.: Gibbsian dynamics and ergodicity for the stochastically
forced Navier-Stokes equations. Commun. Math. Phys. 224, 83–106 (2001)
14. Nield, D., Bejan, A.: Convection in Porous Media. 2nd edn. Springer, New York (1999)
15. Parshad, R.D.: Asymptotic behaviour of convection in porous media. PhD Thesis, Florida State
University (2009)
16. Parshad, R.D.: Asymptotic behaviour of the Darcy–Boussinesq system at large Darcy–Prandtl
number. Discrete Contin. Dyn. Syst A. Special issue 18. 26(4), 1441–1469 ( 2010)
17. Saad, M.: Ensembles inertiels pour un modele de convection naturelle dissipatif, en milieu
poreux. C.R. Acad. Sci Paris Serie I 316, 1277–1280 (1993)
18. Saling, J.: Radioactive Waste Management. Taylor and Francis, New York (2001)
19. Speight, J.: Enhanced Oil Recovery Handbook. Gulf Publishing Company, Houston (2009)
20. Temam, R.: Infinite-Dimensional Dynamical Systems in Mechanics and Physics, 2nd edn.
Applied Mathematical Sciences, vol. 68. Springer, New York (1997)
21. Vafai, K.: Handbook of Porous Media. Marcel Dekker, New York (2000)
22. Wang, X.: Infinite Prandtl number limit of Rayleigh-Benard convection. Commun. Pure Appl.
Math. 57, 1265–1282 (2004)
23. Wang, X.: Asymptotic behavior of global attractors to the Boussinesq system for Rayleigh-
Benard convection at large Prandtl number. Commun. Pure Appl. Math. 60, 1293–1318 (2007)
24. Wang, X.: Upper semi-continuity of stationary statistical properties of dissipative systems.
Discrete Contin. Dyn. Syst. A 23, 521–540 (2009) [special issue dedicated to Prof. Li
Ta-Tsien]
25. Wang, X.: Lecture notes on elementary statistical theories with applications to fluid systems.
2007 Shanghai Mathematics Summer School in Fudan University. To be published by Higher
Education Press, Beijing (2009)
26. Wu, M., Lee, J.: Ergodicity for the dissipative Boussinesq equations with random forcing. J.
Stat. Phys. 117, 929–957 (2004)
27. Young, L.S.: What are SRB measures and which dynamical systems have them? J. Stat. Phys.
108, 733–754 (2002)
Pricing Barrier Options Using Integral
Transforms
Abstract Barrier options are a class of exotic options that are traded in over-the-
counter markets worldwide. These options are particularly attractive for their lower
cost compared to vanilla options. However, the closed form analytical solutions
for the partial differential equations modeling these options are not easy to obtain
and therefore one usually seeks numerical approaches to find them. In this paper,
we consider two types of exotic options, namely a single barrier European down-
and-out call and a double barrier European knock-out call options. Like some
other standard and nonstandard options, these barrier options also have non-smooth
payoffs at the exercise price. This non-smooth payoff is the main cause of the
reduction in accuracy when the classical numerical methods, for example, lattice
method, Monte Carlo method, or other methods based on finite difference and finite
elements are used to solve such problems. In fact, the same happens when one uses
the spectral method which is known to preserve the exponential accuracy. In order
to retain this high-order accuracy, in this paper we propose a spectral decomposition
method which approximates the unknown solution by rational interpolants on each
sub-domain. The resulting semi-discrete problem is solved by a contour integral
method. Our numerical results affirm that the proposed approach is very robust and
gives very reliable results.
1 Introduction
The market for barrier options has been expanding rapidly over the last two decades
[20]. They are characterized by the dependence of their payoffs on the path of the
underlying asset throughout their lifetime. When the asset price reaches a specified
barrier level, these options are either exercisable (activated) in which case they are
called knock-in options or they expire (extinguish) in which case they are called
knock-out options.
Both knock-in and knock-out options are divided into down and up options
depending on the level of the asset price compared to the barrier level. On one hand,
knock-out options are either up-and-out or down-and-out. The up-and-out options
can be exercised unless the asset price reaches the barrier level from below and the
down-and-out options are exercisable until the asset price reaches the barrier level
from above. Knock-in options are also classified as the up-and-in and down-and-
in knock-in options. The up-and-in options are exercisable if the asset reaches the
barrier level from below whereas the down-and-in options can be exercised only if
the asset price reaches the barrier from above the barrier level.
An important issue of pricing barrier options is whether the barrier crossing is
monitored in continuous time or in discrete time. A continuously monitored option
is an option which is monitored constantly between the current and the final time
T at maturity of the option. A discretely monitored option is only monitored at
discrete time t t1 < t2 <; : : : ; < tN < T: On the market, barrier options are
mostly discretely monitored. Analytical solutions of these options are expressed
in terms of an m-dimensional integral over the m-dimensional multivariate normal
distribution. However, the computation of the multivariate normal distribution is
compromised when m > 5 (where m is the number of monitored points) [16], and
thus one has to resort to numerical methods for practical implementation [4, 8, 12].
We prefer to solve the options that are monitored continuously under the Black–
Scholes framework because they give their holders more flexibility in exercising.
As far as numerical methods for barrier options valuation are concerned, lattice
methods have been used quite extensively despite their low level of accuracy.
However, the implementation of these methods presents a computational challenge.
Numerous techniques have been developed to improve their computational cost
[11], still the improvement is not fully satisfying. Recently, Monte Carlo methods
have emerged as a viable alternative to lattice methods. In this context, Barraquand
and Martineau [1] obtained some promising results for multi-asset American
options.
Finite-difference methods appear to be cost effective and flexible, compared to
lattice and Monte Carlo methods, for pricing barrier options. In [3], the authors
considered an explicit finite-difference approach. They constructed a grid which
lies right on the barrier and applied interpolation to find the values of the option.
Following on the same principle, Figlewski et al. [9] used an adaptive method to
refine the mesh in regions of interest (around a barrier) and obtained very efficient
results.
Pricing Barrier Options Using Integral Transforms 223
In [22], Zvan et al. took advantage of the higher order implicit methods to
successfully price a variety of barrier option problems. Their approach used a fine
grid around the location of the barrier. Fang and Oosterlee [6] considered the
Fourier-based numerical method for American and barrier options. They obtained
exponential results. This approach was extended in [7] to Bermudan and Barrier
options under the Heston stochastic volatility model. The two-dimensional pricing
problem was dealt with by a combination of a Fourier cosine series expansion in one
dimension and high-order quadrature rules in the other dimension. Error analysis
and experiments confirmed a fast error convergence.
A radial basis approach with Crank-Nicolson’s discretization in time was
proposed in [10] for pricing barrier, European, and Asian options. Recently a high-
order accurate implicit finite-difference method to price various types of barrier
options was applied in [14]. This approach was used for both the discretely and
continuously monitored options. The scheme was also applied to the analysis of
Greeks such as and of the option.
In [14], Ndogmo and Ntwiga used a fourth-order -method for the continuously
and discretely monitored options. To refine grid points in regions of interest,
they used a coordinate transformation. The strength of their approach lies on a
probability-based optimal determination of the boundary conditions, along with the
option values. The authors in [5] developed a robust method for both continuously
and discretely monitored barrier options. The method is based on the method-of-
line and can evaluate the solution of the option price problem and its Greeks very
accurately. Furthermore, this approach efficiently handles standard barrier options
and barrier options with early exercise feature.
In this paper, we propose the use of a multi-domain spectral method and
the Laplace transformed method. The multi-domain method uses spectral method
directly in each sub-domain. Appropriate matching conditions are imposed at the
interface of the sub-domains to ensure the continuity of the solution and that of its
first derivative. After the spatial discretization, the resulting semi-discrete problem
is solved by a contour integral method.
The remainder of the paper is structured as follows. Section 2 outlines the model
problem. In Section 3, we discuss the basic idea of spectral domain decomposition
method and its implementation to the model problem. In Section 4, we describe the
application of the Laplace transform to solve the semi-discrete problem. Numerical
results are presented in Section 5. In Section 6, we draw some concluding remarks
and present the scope for future research.
We assume that the asset satisfies the following stochastic differential equation
dS
D dt C dWt ; (1)
S
224 E. Ngounda et al.
where is a constant representing the drift rate, is the volatility of the underlying
asset, and dWt is a Wiener process with mean zero and variance of dt. Under the Itô
process, (1) gives the following Black–Scholes partial differential equation for the
valuation of an option V:
@V 1 @2 V @V
C 2 S2 2 C rS rV D 0: (2)
@t 2 @S @S
Here, t is the current time at which the option V.S; t/ is valued before the expiration
of the option at time T. For numerical computation, we set D T t and rewrite (2)
to a convenient form as follows
@V 1 @2 V @V
D 2 S2 2 C rS rV; (3)
@ 2 @S @S
with the boundary, initial, and barrier conditions given as follows:
• For single barrier down-and-out call, the boundary conditions are
Here, X is barrier level, K is the strike price, and Smax is chosen sufficiently large.
Here, X1 and X2 represent the lower and upper level barriers, respectively, K is
the strike price, and Smax is chosen sufficiently large.
We use the spectral domain decomposition approach for discretization of (3) in
the next section.
N
X wk
u.k /
kD0
k
uN ./ D N
; (10)
X wk
kD0
k
0 1
N
X
wk
B u.k / C
dm B C
N
.m/
X B kD0 k C
uN .k / D m B C (11)
d B X N
wk C
kD0 @ A
kD0
k
N
X .m/
D Djk u.k /; (12)
kD0
.m/
where Djk are the entries of the differentiation matrix of order m. Formula to
.m/
construct DN are given by Schneider and Werner in [17] for m D 1 and m D 2
and later generalized for any order by Tee in [19]. The first- and second-order
differentiation matrices are given by the following formulas
8 wk
ˆ
ˆ ; j¤k
ˆ wj .j k /
<
.1/
Djk D X .1/ (13)
ˆ
ˆ Dji ; j D k;
:̂
i¤k
and
8
ˆ
ˆ 2D
.1/
D
.1/
1 ; j ¤ k;
ˆ
ˆ
< jk jj j k
.2/
Djk D X .2/ (14)
ˆ
ˆ
ˆ Dji ; j D k:
:̂
i¤k
The above expression will be used when we approximate the first and second
derivative terms in (3).
From our earlier discussion in this section, we know that the direct application
of spectral method to the Black–Scholes problem leads to low-order convergence
results. This poor convergence is attributed due to the non-smoothness of the initial
condition at the strike price. This motivates our attempt to recover the spectral
accuracy. To this end, we consider decomposing the domain into different sub-
domains. We split the domain at the point of discontinuity and apply the Chebyshev
spatial discretization in each sub-domain to reduce the problem to a set of coupled
ordinary differential equations in time. Since the function is analytic on each
subinterval including the point of discontinuity (strike K), spectral accuracy can
be obtained provided that appropriate matching conditions are set across this point
of discontinuity.
To begin with this, we consider the domain decomposition approach for (3).
Since the initial condition is non-smooth at the strike price K, we split the interval
Pricing Barrier Options Using Integral Transforms 227
Œ0; Smax into two subintervals, # D Œ0; K and D ŒK; Smax , of lengths d# D K and
d D Smax K, respectively. To apply the Chebyshev discretization, we map each of
these subintervals to the reference interval Œ1; 1 by using the linear transformation
8 #
ˆ
< d2 . C 1/; S 2 Œ0; K;
S#; ./ D (15)
:̂ d . C 1/ C K; S 2 ŒK; Smax :
2
which implies
8
2 @
ˆ
< d# @
; S 2 Œ0; K;
@ @ @
(17)
@S @ @S :̂ 2 @
d @
; S 2 ŒK; Smax :
From Eqs. (16) and (17), we can rewrite (3) into each sub-domain as follows
@V # 2 @2 V # 2r # @V #
D # 2 2 S# ./2 C S ./ rV # ; (18)
@ .d / @ 2 d# @
and
@V 2 @2 V 2r @V
D 2 2 S ./2 C S ./ rV : (19)
@ .d / @ 2 d @
2 2r
VP # D 2 .W # /2 D.2/ V # C # W # D.1/ V # rV # ; (20)
.d# /2 d
and
2 2r
VP D 2 .W /2 D.2/ V W D.1/ V rV ; (21)
.d /2 d
where ‘’ denotes the differentiation w.r.t. , and W #; D diag .2=d#; /S#; ./ .
228 E. Ngounda et al.
Defining
2
B# WD 2 .W # /2 D.2/ ; (22)
.d# /2
2r # .1/
C# WD W D ; (23)
d#
we can rewrite (20) and (21) as
and
To impose the boundary conditions, we substitute the first and last equations from
the first and second sub-domains, respectively, by the corresponding boundary
conditions in (7). Two additional equations are enforced to ensure that the boundary
conditions are satisfied. To ensure the continuity of the solution and that of its first
derivative at the interface, we impose the following matching conditions across the
point of discontinuity, i.e., at the strike price K. Defining
V ˘ D VN# D V0 ; (26)
and
@VN# @V0
D ; (27)
@ @
2 .1/ # 2
#
D V N D.2/ V 0 D 0: (29)
d d
The solution vector V is obtained from the system of 2N C 2 equations
from (24), (25), (28), (29), and the boundary conditions. We combine the
approximations from the two sub-domains with boundary and matching conditions
included into the following global system.
VP D AV: (30)
Pricing Barrier Options Using Integral Transforms 229
and
A D B C C rI;
where I is the identity, B and C are block diagonal matrices of B#; and C#; ,
respectively. After the discretization, the resulting semi-discrete problem is solved
using Laplace method as discussed in the next section.
Following our approach, presented in our recent work [15], on a Talbot contour
[18] of hyperbolic type, we can analyze the error by decomposing it into three parts:
Discretization error, Truncation error, and Conditioning error; based on which we
can derive optimal contour parameters. We have also shown in that work that the
optimal error while using the Laplace transform method is exponentially small. In
what follows, we discuss its application to solve the problem under consideration.
A direct application of the Laplace transform to (30) leads to
.zI A/b
V D V0 ; (31)
where
z0 .`/ D b
i cos .i` ˛/ :
For h > 0 such that `k D kh, where k is an integer, the trapezoidal rule can then
be expressed by
1
h X z.`k /t b
V.; t/
e V .; z.`k // z0 .`k /: (35)
2i kD1
where ‘ı’ indicates that the first term is divided by 2. The benefit of using (36) is
that it reduces by half the summation (35) and subsequently the number of linear
system to be evaluated in (31).
Now to analyze the error, we note that in our approximation, we encounter three
types of errors: (1) The application of the trapezoidal rule (35) to the unbounded
integral (34) introduces discretization error; (2) a truncation of the infinite series (35)
produces a truncation error, and (3) the evaluation of (35) done in floating point
environment introduces a roundoff error. Estimates on these errors are as follows:
The discretization error is the difference between the continuous formula (34) and
the corresponding trapezoidal formula (35), i.e.,
Z 1
1 1
z.`/t b 0 h X z.`k /t b
Ed D e V .; z.`// z .`/d` e V .; z.`k // z0 .`k /: (37)
2i 1 2i kD1
Following estimate on the discrete error (37) can be obtained by using contour
integral to represent Ed (see [15] for further details):
2e2d=h C
jEd j !0 as h ! 0: (38)
1 e2d=h
Pricing Barrier Options Using Integral Transforms 231
Because of the exponential factor ez.`k /t , the terms in the sum decrease exponentially
as k ! 1.
We note that in (35), the approximation fQ .t/ requires the evaluation of the trans-
formed F.zk / D F.z.`k //, for k D M; M C 1; : : : ; M 1; M. In reality,
these evaluations are affected by roundoff errors which means that the actual
Q k/ D e
approximation that takes place is F.z V.; zk / C k ; k D M; M C 1; : : : ; M
1; M; where k > 0 is a small value such that jk j , with given by the machine
precision. As a result, (35) implies
h X zk t e
M
fLM .t/ D e V.; zk / C k z0k
2i kDM
M
h X zk t 0
D VM .t/ C e k z k :
2i kDM
Setting
M
h X zk t 0
f .t/ D e k z k :
2i kDM
In summary, we can see that the total error is fully controllable as long as we
choose the optimal values of the associated parameters. The derivation of these
parameters is described below.
To derive optimal parameters of the contour when solving barrier options pricing
problems, we note that the computational effort in the evaluation of VM .; t/ in (35)
comes from the evaluation of the Laplace transform e V.; z/ in (31) for each z.`k /.
Furthermore, we note that this evaluation of e V.; t/ is independent of time t and thus
can be carried out once and subsequently use the same evaluation to approximate
VM .; t/ at different time level over an interval Œt0 ; ƒt0 for an integer ƒ. Note also
that various methods for finding an optimal contour were developed in [13, 21]. In
[21], the following convergence estimate for the family of hyperbolic contours was
derived
Er D Ed C Ed :
Et D O.ee
t.1sin ˛ cosh.hM//
/; M ! 1: (42)
To obtain an optimal contour parameter, we argue as follows: first note that only
the second equation in (41) and Eq. (42) are time dependent. On one hand, the
error Et decreases when t increases and thus is maximumpat t0 . To see this, we
consider ˛ 2 .=4; =2/ whichimpliesthattheinequality 1= 2 < sin ˛ < 1 holds:
For M ! 1, multiplication of both sides of the inequality by cosh.hM/ yields
cosh.hM/
p < sin ˛ cosh.hM/ < cosh.hM/:
2
p
Since cosh.hM/= 2 > 1 for sufficiently large M, we get
On the other hand, the discretization error Ed increases with t and so is maximum
at t D ƒt0 .
Pricing Barrier Options Using Integral Transforms 233
ƒt0 2 ˛=h D e
2 .=2 ˛/ =h D e t0 .1 sin ˛ cosh.hM// : (43)
4˛ 2
e
h D : (44)
ƒt0
. 2˛/ ƒ C 4˛
cosh.hM/ D ;
.4˛ / sin ˛
Therefore, we obtain
A.˛/
hD (46)
M
and
4˛ 2 4˛ 2 M
e
D D : (47)
hƒt0 A.˛/ ƒt0
The contour parameters (47) and (46) are fixed and time independent. As a
result, the corresponding contour is also fixed over the interval Œt0 ; ƒt0 . From the
parameters derived above, the error is
EM D O.eB.˛/M /; (48)
where
2 2 ˛
B.˛/ D : (49)
.2˛/ƒC4˛
cosh1 .4˛/ sin ˛
The optimal error is obtained when B.˛/ attains its maximum for each value of ƒ.
In our computation, we choose ƒ D 50 and obtained optimal parameters as listed
in Table 1. Below we discuss the numerical results obtained by using the proposed
approach.
234 E. Ngounda et al.
Table 2 Values of the European single barrier down-and-out options using the CN, ILT-FDM,
and our ILT-SDDM
Error Error
S Exact sol. CN ILT-FDM ILT-SDDM Error (CN) (ILT-FDM) (ILT-SDDM)
7 0.0000 0.0000 0.0000 0.0000 0.000 0.000 0.000
8 0.0000 0.0000 0.0000 0.0000 0.000 0.000 0.000
9 0.0000 0.0000 0.0000 0.0000 0.000 0.000 0.000
11 1.294595 1.293735 1.294598 1.294595 8.6E-4 1.9E-5 2.2E-13
13 3.116046 3.116054 3.116043 3.116046 7.0E-5 1.8E-5 1.8E-13
15 5.100318 5.100347 5.100310 5.100318 2.8E-5 5.1E-5 3.8E-13
17 7.099529 7.099532 7.099529 7.099529 3.3E-5 5.6E-6 6.7E-13
19 9.099502 9.099502 9.099502 9.099502 8.8E-5 3.3E-7 5.8E-13
5 Numerical Results
In this section, we present some numerical results which show the performance of
our approach for single and double barrier options. As an example of a single barrier
option, we consider the European down-and-out options whereas for double barrier
option, we consider the knock-out call options.
In Table 2, we present the values of a down-and-out call option obtained by using
the inverse Laplace transform combined with the finite-difference method (ILT-
FDM), Crank-Nicolson method (CN), and our Laplace transform method combined
with spectral decomposition method (ILT-SDDM). Furthermore, we list the errors in
the solutions obtained by these three methods. The first column gives the values of
the asset whereas the second column contains the values of the exact solution. Next
three columns represent the solutions obtained by above three methods and then the
remaining columns show the errors. The other parameters used in the simulations
are K D 10, D 0:2, r D 0:02, D 0:5, and X D 9. We see that the errors obtained
by the proposed approach are very small.
Figure 1 (top) shows the graphs of the exact and numerical solution of the
European down-and-out option price and that of the computed solution using the
ILT-SDDM. We have also computed the and as shown in the bottom left and
bottom right plots of this figure. The convergence results obtained by CN, ILT-FDM,
and ILT-SDDM methods are presented in Fig. 2 (top). In this figure, we also present
errors for (bottom left) and (bottom right) obtained by using our ILT-SDDM.
We use the same parameters as those used for the results presented in Table 2.
In Table 3, we show the results obtained for two barriers X1 and X2 . In this
experiment, we solve the problem for asset price ranging from Smin D 90 to
Smax D 115. The barriers are applied at X1 D 95 and X2 D 110. Other parameters
are K D 100, D 0:25, r D 0:05, and D 0:25. The table includes results obtained
Pricing Barrier Options Using Integral Transforms 235
12
ILT−SDDM
exact solution
10
−2
0 5 10 15 20
Asset price (S)
1.2 0.3
ILT−SDDM
solution exact
1 0.25
0.6 0.15
Delta (Δ)
0.4 0.1
0.2 0.05
ILT−SDDM
solution exact
0 0
−0.2 −0.05
0 5 10 15 20 25 30 0 5 10 15 20 25 30
Asset price (S) Asset price (S)
Fig. 1 Values of the European single barrier down-out call option (top) and its (bottom left) and
(bottom right) using K D 10; D 0:20; r D 0:05; T D 0:50, and X D 9
ILT−SDDM
ILT−FDM
CN
−5
10
5 10 15 20 25 30
Asset
−9
10
−10 10
−10
10
Absolute errors for Δ
−13 −13
10 10
−14
10
5 10 15 20 25 30 5 10 15 20 25
Asset price (S) Asset price (S)
Fig. 2 Convergence of CN method, ILT-FDM, and ILT-SDDM for the single barrier European
down-out call options (top), (bottom left) and (bottom right) using K D 10; D 0:20;
r D 0:05; T D 0:50, and X D 9. We took N D 50 in each of the two sub-domains
closed form analytical solutions for the partial differential equations modeling these
options are not easy to obtain and therefore one usually seeks numerical approaches
to find them. We described the spectral domain decomposition and the Laplace
transform methods for valuing single and double barriers option prices. As can
be seen from Tables 2, 3 and Figs. 2, 3, the proposed approach gave very accurate
results for the down-and-out call and the double barrier options.
With regard to the extension of the proposed approach for multi-asset problems,
we would like to point out that there are significant technicalities involved with
derivation of optimal contour parameters as whole of the analysis has to be extended
for multiple dimensions.
Acknowledgements The two authors Edgard Ngounda and Edson Pindza acknowledge the
Agence Nationale des Bourses du Gabon for the financial support. Kailash C. Patidar’s research
was supported by the South African National Research Foundation.
Table 3 Values of the European double barrier knock-out options using the CN, CN-improved, and our ILT-SDDM
Valueat Reference sol. CN [20] CN-improved [20] ILT-SDDM Error (CN) Error (CN-improved) Error (ILT-SDDM)
X1 0.096979 0.094017 0.097002 0.096979 1.90E-1 3.10E-5 9.20E-8
Pricing Barrier Options Using Integral Transforms
0.16
0.14
0.3 0.05
0
0.2
−0.05
0.1
−0.1
Gamma (Γ)
0
Delta (Δ)
−0.15
−0.1 −0.2
−0.25
−0.2
−0.3
−0.3
−0.35
−0.4 −0.4
90 95 100 105 110 115 90 95 100 105 110 115
Asset price (S) Asset price (S)
Fig. 3 Values of the European double barrier knock-out call option (top) and its (bottom left)
and (bottom right) using K D 100; D 0:25; r D 0:05; T D 0:5; X1 D 95, and X2 D 110
References
1. Barraquand, J., Martineau, D.: Numerical valuation of high dimensional multivariate American
securities. J. Financ. Quant. Anal. 30, 383–405 (1995)
2. Berrut, J.P., Mittelmann, H.D.: Rational interpolation through the optimal attachment of poles
to the interpolating polynomial. Numer. Algorithms 23(4), 315–328 (2000)
3. Boyle, P.P., Tian, Y.S.: An explicit finite difference approach to the pricing of barrier options.
Appl. Math. Financ. 5, 17–43 (1998)
4. Broadie, M., Glasserman, P., Kou, S.G.: A continuity correction for discrete barrier options.
Math. Financ. 7, 325–349 (1997)
5. Chiarella, C., Kang, B., Meyer, G.: The evaluation of barrier option prices under stochastic
volatility. Comput. Math. Appl. 64(6), 2034–2048 (2012)
6. Fang, F., Oosterlee, C.W.: Pricing early-exercise and discrete barrier options by Fourier-Cosine
series expansions. Numer. Math. 114(1), 27–62 (2009)
7. Fang, F., Oosterlee, C.W.: A Fourier-based valuation method for Bermudan and barrier options
under Heston0 s model. SIAM J. Financ. Math. 2, 439–463 (2011)
8. Feng, L., Linetsky, V.: Pricing discretely monitored barrier options and defaultable bonds in
Lévy process models: a fast Hilbert transform approach. Math. Financ. 18(3), 337–384 (2008)
9. Figlewski, S., Gao, B.: The adaptive mesh model: a new approach to efficient option pricing.
J. Financ. Econ. 53, 313–351 (1999)
Pricing Barrier Options Using Integral Transforms 239
10. Goto, Y., Fei, Z., Kan, S., Kita, E.: Options valuation by using radial basis function
approximation. Eng. Anal. Bound. Elem. 31, 836–843 (2007)
11. Haug, E.: Closed form valuation of American barrier options. Int. J. Theor. Appl. Financ. 4,
355–359 (2001)
12. Kou, S.G., Wang, H.: First passage times of a jump-diffusion process. Adv. Appl. Probab. 35,
504–531 (2003)
13. López-Fernández, M., Palencia, C.: On the numerical inversion of the Laplace transform of
certain holomorphic mappings. Appl. Numer. Math. 51(2–3), 289–303 (2004)
14. Ndogmo, J.C., Ntwiga, D.B.: High-order accurate implicit methods for barrier option pricing.
Appl. Math. Comput. 218, 2210–2224 (2011)
15. Ngounda, E., Patidar, K.C., Pindza, E.: Contour integral method for European options with
jumps. Commun. Nonlinear Sci. Numer. Simul. 18, 478–492 (2013)
16. Petralla, G., Kou, S.: Numerical pricing of discrete barrier and lookback options via Laplace
transforms. J. Comput. Financ. 8(1), 1–37 (2004)
17. Schneider, C., Werner, W.: Some new aspect of rational interpolation. Math. Comput. 47(175),
285–299 (1986)
18. Talbot, A.: The accurate numerical inversion of Laplace transforms. IMA J. Appl. Math. 23(1),
97–120 (1979)
19. Tee, W.: A rational collocation with adaptively transformed Chebyshev grid points. SIAM J.
Sci. Comput. 28(5), 1798–1811 (2006)
20. Wade, B.A., Khaliq, A.Q.M., Yousuf, M., Vigo-Aguiar, J., Deininger, R.: On smooth of the
Crank-Nicolson scheme and higher order scheme for pricing barrier options. J. Comput. Appl.
Math. 204, 144–158 (2007)
21. Weideman, J.A.C., Trefethen, L.N.: Parabolic and hyperbolic contours for computing the
Bromwich integral. Math. Comput. 76(259), 1341–1356 (2007)
22. Zvan, R., Vetzal, K.R., Forsyth, P.A.: PDE methods for pricing barrier options. J. Econ. Dyn.
Control 24, 1563–1590 (2000)
Philosophy of Adelic Physics
Matti Pitkänen
M. Pitkänen ()
Karkinkatu 3 I 3, 03600 Karkkila, Finland
e-mail: [email protected]; http://tgdtheory.com/public_html/
between real and p-adic space-time surfaces induced by algebraic continuation from
common string world sheets and partonic 2-surfaces. Also local correspondence
seems intuitively plausible and is based on number theoretic discretization as
intersection of real and p-adic surfaces providing automatically finite “cognitive”
resolution. The existence of p-adic variants of Kähler geometry of WCW is a
challenge, and NTU might allow to realize it.
I will also sum up the role of p-adic physics in TGD inspired theory of
consciousness. Negentropic entanglement (NE) characterized by number theoretical
entanglement negentropy (NEN) plays a key role. Negentropy Maximization Prin-
ciple (NMP) forces the generation of NE. The interpretation is in terms of evolution
as increase of negentropy resources.
1 Introduction
I have developed during last 39 years a proposal for unifying fundamental interac-
tions which I call “Topological Geometrodynamics” (TGD). During last 20 years
TGD has expanded to a theory of consciousness and quantum biology and also
p-adic and adelic physics have emerged as one thread in the number theoretical
vision about TGD.
Since quantum TGD and physical arguments have served as basic guidelines in
the development of p-adic ideas, the best manner to introduce the subject of p-adic
physics is by describing first TGD briefly.
In this article I will consider the p-adic aspects of TGD—the first thread of the
number theoretic vision—as I see them at this moment.
1. I will describe p-adic mass calculations based on p-adic generalization of
thermodynamics and super-conformal invariance [27, 34] with number theoret-
ical existence constrains leading to highly non-trivial and successful physical
predictions. Here the notion of canonical identification mapping p-adic mass
squared to real mass squared emerges and is expected to be key player of adelic
physics and allow to map various invariants from p-adics to reals and vice versa.
2. I will propose the formulation of p-adicization of real physics and adelization
meaning the fusion of real physics and various p-adic physics to single coherent
whole by a generalization of number concept fusing reals and p-adics to larger
structure having algebraic extension of rationals as a kind of intersection.
The existence of p-adic variants of definite integral, Fourier analysis, Hilbert
space, and Riemann geometry is far from obvious, and various constraints lead to
the idea of NTU and finite measurement resolution realized in terms of number
theory. Maybe the only manner to overcome the problems relies on the idea that
various angles and their hyperbolic analogs are replaced with their exponentials
Philosophy of Adelic Physics 243
2 TGD Briefly
This section gives a brief summary of classical and quantum TGD, which to my
opinion is necessary for understanding the number theoretic vision.
244 M. Pitkänen
TGD forces a new view about space-time as 4-surface of 8-D imbedding space.
This view is extremely simple locally but by its many-sheetedness topologically
much more complex than GRT space-time.
The physical motivation for TGD was what I have christened the energy problem of
general relativity [61, 68].
1. The notion of energy is ill-defined because the basic symmetries of empty space-
time are lost in the presence of gravity. The presence of matter curves empty
Minkowski space M 4 so that its isometries realized as transformations leaving
the distances between points and thus shapes of 4-D objects invariant are lost.
Noether’s theorem states that symmetries and conservation laws correspond to
each other. Hence conservation laws are lost and conserved quantities are ill-
defined. Usually this is not seen a practical problem since gravitation is so weak
interaction.
2. The proposed way out of the problem is based on the assumption that space-
times are imbeddable as 4-surfaces to some 8-dimensional space H D M 4
S by replacing the points of 4-D empty Minkowski space with 4-D very small
internal space S. The space S is unique from the requirement that the theory has
the symmetries of standard model: S D CP2 , where CP2 is complex projective
space with four real dimensions [61]. Isometries of space-time are replaced with
those of imbedding space. Noether’s theorem predicts the classical conserved
charges for given general coordinate invariant (GCI ) action principle.
Also now the curvature of space-time codes for gravitation. Equivalence principle
(EP) and general coordinate invariance (GCI) of GRT augmented with relativity
principle (RT) of SRT remain the basic principles. Now, however, the number of
solutions to field equations—preferred extremals (PEs)—is dramatically smaller
than in Einstein’s theory [25, 67].
1. An unexpected bonus was geometrization classical fields of standard model for
S D CP2 . Also the space-time counterparts for field quanta emerge naturally
but this requires a profound generalization of the notion of space-time: the
topological inhomogeneities of space-time surface are identified as particles.
This means a further huge reduction for dynamical field like variables at the level
of single space-time sheet. By general coordinate invariance (GCI) only four
imbedding space coordinates appear as variables analogous to classical fields: in
a typical GUT their number is hundreds.
2. CP2 also codes for the standard model quantum numbers in its geometry in the
sense that electromagnetic charge and weak isospin emerge from CP2 geometry:
the corresponding symmetries are not isometries so that electroweak symmetry
Philosophy of Adelic Physics 245
against TGD looks rather obvious in the light of after-wisdom. One loses linear
superposition of fields, which holds in good approximation in ordinary field
theories, which are almost linear. The solution of the problem to be discussed later
relies on the notion many-sheeted space-time [68].
The replacement of the abstract manifold geometry of general relativity with the
geometry of 4-surfaces brings in the shape of surface as seen from the perspective of
8-D space-time as additional degrees of freedom giving excellent hopes of realizing
the dream of Einstein about geometrization of fundamental interactions.
The work with the generic solutions of the field equations assignable to almost
any variational principle satisfying GCI led soon to the realization that the topolog-
ical structure of space-time in this framework is much more richer than in GRT.
1. Space-time decomposes into space-time sheets of finite size. This led to the
identification of physical objects that we perceive around us as space-time sheets.
The original identification of space-time sheet was as a surface of H with outer
boundary. For instance, the outer boundary of the table would be where that
particular space-time sheet ends (what “ends” means is not, however, quite
obvious!). We would directly see the complex topology of many-sheeted space-
time! Besides sheets also string like objects and elementary particle like objects
appear so that TGD can be regarded also as a generalization of string models
obtained by replacing strings with 3-D surfaces.
It turned that boundaries are probably excluded by boundary conditions.
Rather, two sheets with boundaries must be glued along their boundaries together
to get double covering. Sphere can be seen as simplest example of this kind of
covering: northern and southern hemispheres are glued along equator together.
2. The original vision was that elementary particles are topological inhomogeneities
glued to these space-time sheets using topological sum contacts. This means
drilling a hole to both sheets and connecting with a very short cylinder. Two-
dimensional illustration should give the idea. In this conceptual framework
material structures and shapes would not be due to some mysterious substance
in slightly curved space-time but reduce to space-time topology just as energy-
momentum currents reduce to space-time curvature in GRT.
This view has gradually evolved to much more detailed picture. Elementary
particles have wormhole contacts as basic building bricks. Wormhole contact is
very small region with Euclidian (!) signature of the induced metric connecting
two Minkowskian space-time sheets with light-like boundaries carrying spinor
fields and there particle quantum numbers. Wormhole contact carries magnetic
monopole flux through it and there must be second wormhole contact in order
to have closed lines of magnetic flux. Particle world lines are replaced with 3-D
light-like surfaces—orbits of partonic 2-surfaces—at which the signature of the
induced metric changes.
Philosophy of Adelic Physics 247
implication is that topological with over-critical mass density are not globally
imbeddable. This would explain why the mass density in cosmology can be at
most critical. This solves one of the mysteries of GRT based cosmology [45].
Quite generally, the field patterns are extremely restricted: not only due to
imbeddability constraint but also due to the fact that by SH only very restricted
set of space-time surfaces can appear solutions of field equations: I speak of
preferred extremals (PEs) [25, 67, 68]. One might speak about archetypes at
the level of physics: they are in quite strict sense analogies of Bohr orbits in
atomic physics: this implies by the realization of GCI. This kind of simplicity
does not conform with what we observed. The way out is many-sheeted space-
time. Although fields do not superpose, particles experience the superposition of
effects from the archetypal field configurations (superposition is replaced with
set theoretic union).
3. The important implication is that one can assign to each material system a
field identity since electromagnetic and other fields decompose to topological
field quanta. Examples are magnetic and electric flux tubes and flux sheets and
topological light rays representing light propagating along tube like structure
without dispersion and dissipation making em ideal tool for communications
[41]. One can speak about field body or magnetic body of the system.
Field body indeed becomes the key notion distinguishing TGD inspired model
of quantum biology from competitors but having applications also in particle
physics since also leptons and quarks possess field bodies. The is evidence for
the Lamb shift anomaly of muonic hydrogen [9] and the color magnetic body
of u quark whose size is somewhat larger than the Bohr radius could explain the
anomaly [37]. The magnetic flux tubes of magnetic body carry monopole fluxes
existing without generating currents. In cosmology the flux tubes assignable to
the remnants of cosmic strings make possible long range magnetic fields in all
scales impossible in standard cosmology. Also super-conductivity is proposed to
rely on dark heff D n h Cooper pairs at pairs of flux tubes carrying monopole
flux.
GRT and gauge theory limit of TGD is obtained as an approximation.
1. GRT/gauge theory type description is an approximation obtained by lumping
together the space-time sheets to single region of M 4 , with gravitational fields and
gauge potentials as sums of corresponding induced field quantities at space-time
surface geometrized in terms of geometry of H. Gravitational field corresponds to
the deviation of the induced metric from Minkowski metric using M 4 coordinates
for space-time surface so that the description applies only in long length scale
limit.
Space-time surface has both Minkowskian and Euclidian regions. Euclidian
regions are identified in terms of what I call generalized scattering/twistor
diagrams. The 3-D boundaries between Euclidian and Minkowskian regions
have degenerate induced 4-metric and I call them light-like orbits of partonic
2-surfaces or light-like wormhole throats analogous to blackhole horizons. The
interiors of blackholes are replaced with the Euclidian regions and every physical
system is characterized by this kind of region.
Philosophy of Adelic Physics 249
Lumping of sheets together implies that global conservation laws cannot hold
exactly true for the resulting GRT type space-time. Equivalence principle (EP) as
Einstein’s equations stating conservation laws locally follows as a local remnant
of Poincare invariance.
2. Euclidian regions are identified as slightly deformed pieces of CP2 connecting
two Minkowskian space-time regions. Partonic 2-surfaces defining their bound-
aries are connected to each other by magnetic flux tubes carrying monopole flux.
Wormhole contacts connect two Minkowskian space-time sheets already at
elementary particle level, and appear in pairs by the conservation of the monopole
flux. Flux tube can be visualized as a highly flattened square traversing along
and between the space-time sheets involved. Flux tubes are accompanied by
fermionic strings carrying fermion number. Fermionic strings give rise to string
world sheets carrying vanishing induced em charged weak fields (otherwise em
charge would not be well-defined for spinor modes). String theory in space-time
surface becomes part of TGD. Fermions at the ends of strings can get entangled
and entanglement can carry information.
3. Strong form of GCI (SGCI) states that light-like orbits of partonic 2-surfaces on
one hand and space-like 3-surfaces at the ends of causal diamonds on the other
hand provide equivalent descriptions of physics. The outcome is that partonic
2-surfaces and string world sheets at the ends of CD can be regarded as basic
dynamical objects.
Strong form of holography (SH) states the correspondence between quantum
description based on these 2-surfaces and 4-D classical space-time description,
and generalizes AdS/CFT correspondence. One has huge super-symplectic
symmetry algebra acting as isometries of WCW with conformal structure
[28, 53, 65], conformal algebra of light-cone boundary extending the ordinary
conformal algebra, and ordinary Kac-Moody and conformal symmetries of string
world sheets. This explains why 10-D space-time can be replaced with ordinary
space-time and 4-D Minkowski space can be replaced with partonic 2-surfaces
and string world sheets. This holography looks very much like the one we are
accustomed with!
ZEO is consistent with the crossing symmetry of QFTs meaning that the final states
of the quantum scattering event can be described formally as negative energy states.
As long as one can restrict the consideration to either positive or negative energy
part of the state ZEO is consistent with positive energy ontology. This is the case
when the observer characterized by a particular CD studies the physics in the time
scale of much larger CD containing observer’s CD as a sub-CD. When the time
scale sub-CD of the studied system is much shorter that the time scale of sub-CD
characterizing the observer, the interpretation of states associated with sub-CD is in
terms of quantum fluctuations.
ZEO solves the problem, which emerges in any theory assuming symmetries
giving rise to conservation laws. The problem is that the theory itself is not able to
characterize the values of conserved quantum numbers of the initial state of say
cosmology. In ZEO this problem disappears since in principle any zero energy
state is obtained from any other state by a sequence of quantum jumps without
breaking of conservation laws. The fact that energy is not conserved in GRT based
cosmologies can be also understood since each CD is characterized by its own
conserved quantities. As a matter of fact, one must speak about average values of
conserved quantities since one can have a quantum superposition of zero energy
states with the quantum numbers of the positive energy part varying over some
range.
At the level of principle the implications are quite dramatic. In quantum jump as
recreation replacing the quantum Universe with a new one it is possible to create
entire sub-Universes from vacuum without breaking the fundamental conservation
laws. From the point of view of consciousness theory the important implication is
that “free will” is consistent with the laws of physics. This makes obsolete the basic
arguments in favor of materialistic and deterministic world view.
By quantum classical correspondence zero energy states must have space-time and
imbedding space correlates.
1. Positive and negative energy parts of zero energy state reside at future and past
light-like boundaries of causal diamond (CD) identified as intersection of future
and past directed light-cones and visualizable as double cone. The analog of CD
in cosmology is big bang followed by big crunch. Penrose diagrams provide an
excellent 2-D visualization of the notion. CDs form a fractal hierarchy containing
CDs within CDs. Disjoint CDs are possible and CDs could also intersect.
The interpretation of CD in TGD inspired theory of consciousness is an
imbedding space correlate for perceptive field of conscious entity: the contents of
conscious experience are about the region defined by CD. At the level of space-
time sheets the experience come from space-time sheets in the interior of CD.
Whether the sheets can be assumed to continue outside CD is still unclear.
Philosophy of Adelic Physics 251
The notions of Kähler geometry of “world of classical worlds” (WCW) and WCW
spinor structure are inspired by the vision about the geometrization of the entire
quantum theory.
The notion of “world of classical worlds” (WCW) [28, 33, 65] was forced by
the failure of both path integral approach and canonical quantization in TGD
framework. The idea is that the Kähler function defining WCW Kähler geometry
is determined by the real part of an action S determining space-time dynamics and
receiving contributions from both Minkowskian and Euclidian regions of space-
p
time surface X 4 (note that g4 is proportional to imaginary unit in Minkowskian
regions).
1. If S is space-time volume both canonical quantization and path integral would
make sense at least formally since in principle one could solve the time deriva-
tives of four imbedding space coordinates as functions of canonical momentum
densities (general coordinate invariance allows to eliminate four coordinates).
The calculation of path integral is, however, more or less hopeless challenge in
practice.
252 M. Pitkänen
2. A mere space-time volume as action is, however, not physically attractive. This
was thought to leave under consideration only Kähler action SK —Maxwell action
for the induced Kähler form expressible in terms of gauge potential defined by
the induced Kähler gauge potential of CP2 . This action has, however, a huge
vacuum degeneracy. Any space-time surface with at most 2-D CP2 projection,
which is Lagrangian sub-manifold of CP2 , is vacuum extremal. Symplectic
transformations acting like U(1) gauge transformations generate new vacuum
extremals. They, however, fail to act as symmetries of non-vacuum extremals so
that gauge invariance is not in question: the deviation of the induced metric from
flat metric is the reason for the failure. This degeneracy is assumed to give rise to
what might be called 4-D spin glass degeneracy meaning that the landscape for
the maxima of Kähler function is fractal.
3. Canonical quantization fails because by the extreme non-linearity of the action
principle making it is impossible to solve time derivatives explicitly in terms of
canonical momentum densities. The problem is especially acute for the canonical
imbedding of empty Minkowski space to M 4 CP2 . The action is vanishing
up to fourth order in imbedding space coordinates so that canonical momentum
densities vanish identically and there is no hope of defining propagator in path
integral approach. The mechanical analog would be criticality around where the
potential reduces to V / x4 . Quantum criticality is indeed a basic aspect of TGD
Universe.
The hope held for a long time was that WCW geometry allowing to get rid of
path integral would solve the problems. One could, however, worry about vacuum
degeneracy implying that WCW metric becomes extremely degenerate for vacuum
extremals and also holography becomes extremely non-unique for them. Also the
expected failure of perturbative approach around M 4 is troublesome.
During last year this picture has indeed changed, thanks to what might be called
twistor lift of TGD [49, 69, 70] inspired by twistor Grassmann approach to super-
symmetric gauge theories [7]. Remarkably, twistor lift would provide automatically
the fundamental couplings of standard model and GRT and also the scale assigned
to GUTs as CP2 radius. PEs would be both extremals of Kähler action and minimal
surfaces.
1. The basic observation is E4 , and its Euclidian compactification S4 and CP2 are
completely unique in that they allow twistor space with Kähler structure [3].
This was discovered by Hitchin at roughly the same time as I discovered TGD!
This generalizes to M 4 having a generalization of ordinary Kähler structure to
what I have called Hamilton–Jacobi structure by decomposition M 4 D M 2
E2 , where M 2 allows hypercomplex structure [49, 69]. One can consider also
integral distributions of tangent decompositions M 4 D M 2 .x/ E2 .x/, depending
on position. The twistor space has a double fibration by S2 with base spaces
Philosophy of Adelic Physics 253
The analog of decoupling of Kähler action and volume term should take place
also for induced spinors. This is expected if mere analyticity properties make
spinor modes solutions of modified Dirac equations. This is true in 2-D case
Hamilton–Jacobi structure should guarantee this in 4-D case [53, 69].
PEs depend on coupling parameters only via boundary conditions stating the
vanishing of Noether charges for a sub-algebra of super-symplectic algebra and
its commutator with entire algebra. Also the conservation conditions at 3-D light-
like surfaces at which the signature of metric changes imply dependence on
coupling parameters. These conditions allow the transfer of classical charges
between Minkowskian and Euclidian regions necessary to understand momen-
tum exchange between particles and environment classically only if Kähler
couplings strength is complex—otherwise there is no exchange of conserved
quantities since their real resp. imaginary at the two sides [30]. Interestingly, also
in twistor Grassmann approach the massless poles in propagators are complex.
This picture conforms with the conjecture that discrete p-adic evolution
of the Kähler coupling strength in subset of primes near prime powers of
two corresponds to complex zeros of zeta [30]. This conforms also with
the conjectured discreteness of p-adic coupling constant evolution by phase
transitions changing the values of coupling parameters. One implication is that
all loop corrections in functional integral vanish.
5. In path integral approach quantum TGD would be extremely non-perturbative
around extremals for which Kähler action vanishes. Same is true also in WCW
approach. The cure would be provided by the hierarchy of Planck constants
heff =h D n, which effectively scales ƒ down to ƒ=n. n would be the number
sheets of the M 4 covering defined by the space-time surface: the action of Galois
group for the number theoretic discretization of space-time surface could give
rise to this covering. The finiteness of the volume term in turn forces ZEO: the
volume of space-time surface is indeed finite due to the finite size of CD.
Consider now the delicacies of this picture.
1. Should assign also to M 4 the analog of symplectic structure giving an additional
contribution to the induced Kähler form? The symmetry between M 4 and CP2
suggests this, and this term could be highly relevant for the understanding of
the observed CP breaking and matter antimatter asymmetry [79]. Poincare
invariance is not lost since the needed moduli space for M 4 Kähler forms would
be the moduli space of CDs forced by ZEO in any case, and M 4 Kähler form
would serve as the correlate for fixing rest system and spin quantization axis in
quantum measurement.
2. Also induced spinor fields are present. The well-definedness of electromagnetic
charge for the spinor modes forces in the generic case the localization of the
modes of induced spinor fields at string world sheets (and possibly to partonic
2-surfaces) at which the induced charged weak gauge fields and possibly also
neutral Z 0 gauge field vanish. The analogy with branes and super-symmetry force
to consider two options.
Philosophy of Adelic Physics 255
reduces to an orthogonal direct sum of string world sheet metric and metric
acting in normal space, the flow defined by 4-D canonical momentum currents
is parallel to string world sheet. These conditions could define the “boundary”
conditions at string world sheets for SH.
This admittedly speculative picture has revolutionized the understanding of
both classical and quantum TGD during last year [68–70]. In particular, the
construction of single-sheeted PEs as minimal surfaces allows a kind of lego
like engineering of more complex PEs [74]. The minimal surface equations
generalize Laplace equation of Newton’s gravitational theory to non-linear massless
d’Alembert equation with gravitational self-coupling. One obtains the analog of
Schwartschild solution and radiative solutions describing also gravitational radiation
[68]. An open question is whether classical theory makes sense if also the analog of
Kähler form in M 4 is allowed.
The notion of WCW [28, 33, 65] was inspired by the super-space approach of
Wheeler in which three-geometries are the basic geometric entities.
1. In TGD framework 3-surfaces take this role. Einstein’s program for geometriz-
ing classical physics is generalized to a geometrization of entire quantum
physics. Hermitian conjugation corresponds to complex conjugation in infinite-
dimensional context so that WCW must have Kähler geometry. The geometriza-
tion of fermionic statistics/oscillator operators is in terms of gamma matrices
of WCW expressible as linear combinations of oscillator operators for second
quantized induced spinor field. Formally purely classical spinor modes of WCW
represent many-fermion states as functionals of 3-surface. One can also interpret
gamma matrices as generators of super-conformal symmetries in accordance
with the fact that also SUSY involves Clifford algebra.
In ZEO the entanglement coefficients between positive and negative energy
parts of zero energy states determine the S-matrix so that S-matrix would be
coded by the modes of WCW spinor fields. Twistor approach to TGD [69]
suggests that the S-matrix reduces completely to the symmetries defined by the
multi-local (locus corresponds to partonic 2-surface) generators of the Yangian
associated with the super-symplectic algebra.
2. ZEO forces to identify 3-surfaces as pairs of 3-surfaces with members at the
opposite boundaries of CD. SH reduces them to a collection of partonic 2-
surfaces at boundaries of CD plus number theoretic discretization in space-time
interior. Basic geometric objects are pairs of initial and final states (coordinates
for both in mechanical analogy) rather than initial states with initial value
conditions (coordinates and velocities in mechanical analogy) and initial value
problem transforms to boundary value problem. Processes rather than states
become the basic elements of ontology: this has far reaching consequences in
biology and neuroscience.
Philosophy of Adelic Physics 257
3. The realization of GCI requires that the definition of WCW Kähler function
assigns to a “physically” 3-surface a unique 4-surface for 4-D general coordinate
transformations to act: “physically” could mean “apart from transformations
acting as gauge transformations” not affecting the action and conserved classical
charges. The outcome is holography.
4. Strong form of holography (SH) would emerge as follows. The condition that
light-like 3-surfaces defining boundaries between Euclidian and Minkowskian
regions are basic geometric entities equivalent with pairs of space-like 3-surfaces
at the ends of given causal diamond CD implies SH: partonic 2-surfaces and their
4-D tangent space data should code the physics. One could also speak about
almost/effective two-dimensionality. Tangent space data could in turn be coded
by string world sheets. Number theoretical discretization of space-time interior
with preferred coordinates in the extension of rationals could give meaning for
“almost.”
5. Kähler metric is expressible both in terms of second derivatives of Kähler
function K [33] and as anticommutators of WCW gamma matrices expressible
as linear combinations of fermionic oscillator operators. This suggests a close
relationship between space-time dynamics and spinor dynamics.
Super-symplectic symmetry between the action defining space-time surfaces
(Kähler action plus volume term) and modified Dirac action would realize this
relationship. This is achieved if the modified gamma matrices are defined by
the canonical momentum currents of 2-D action associated with string world
sheets. These currents are parallel to the string world sheets. This implies the
analog of AdS/CFT correspondence requiring only that induced spinor modes at
string world sheets determine them in space-time interior (this is like analytic
continuation). The localization of spinor modes at string world sheets is not
required as I believed first.
The geometry of loop spaces developed by Freed [2] serves as a model in the
construction of WCW Kähler geometry [65].
1. The existence of loop space Riemann connection requires maximal isometry
group identifiable as Kac-Moody group so that Killing vector fields span the
entire tangent space of the loop space.
2. In TGD framework the properties of Kähler action lead to the idea that WCW is
union of homogenous or even symmetric spaces of symplectic algebra acting at
4
the boundary of ıCD ıCDC [ ıCD , ıCD˙ ıM˙ CP2 . ZEO requires that
the conserved quantum numbers for physical states are opposite for the positive
and negative energy parts of the states at the two opposite boundary parts of
CD. The symmetric spaces G=H in the union are labelled by zero modes, which
do not appear in the line element as differentials but only as parameters of the
metric. Conserved Noether charges of isometries and symplectic invariants of
examples of zero modes as also the super-symplectic Noether charges invariant
under complex conjugation of WCW coordinates.
3. Homogenous spaces of the symplectic group G are obtained by dividing a
subgroup H. An especially attractive option is suggested by the fractal structure
258 M. Pitkänen
The notions of quantum criticality (QC), finite measurement resolution, and hierar-
chy of Planck constants proposed to give rise to dark matter as phases of ordinary
matter are central for TGD [31, 52, 62].
These notions relate closely to the strong form of holography (SH) implied by
strong form of general coordinate invariance (SGCI). In adelic physics all this would
relate closely to the hierarchy of extensions of rationals serving as a correlate for
number theoretical evolution.
260 M. Pitkänen
D. Da Rocha and Laurent Nottale [11] have proposed that Schrödinger equation
with Planck constant replaced with what might be called gravitational Planck
constant gr D GmM v0
( D c D 1). v0 is a velocity parameter having the value
v0 D 144:7˙:7 km/s giving v0 =c D 4:6104 . This is rather near to the peak orbital
velocity of stars in galactic halos. Also subharmonics and harmonics of v0 seem to
appear. The support for the hypothesis coming from empirical data is impressive
[42, 44].
262 M. Pitkänen
The condition heff D hgr implies that the integer n in heff is proportional to
the mass of the particle. The implication is that particles with different masses
reside at flux tubes with different Planck constant and separation of phases indeed
occurs.
5. What is remarkable is that neither gravitational Compton length nor cyclotron
energy spectrum depends on the mass of the particle. This universality could play
key role in living matter. One can assign Planck constant also to other interactions
such as electromagnetic interaction so that one would have hem D Z1 Z2 e2 =v0 .
The phase transition could take place when the perturbation series based on
the coupling strength ˛ D Z1 Z2 e2 = ceases to converge. In the new phase
perturbation series would converge since the coupling strength is proportional
to 1=heff . Hence criticality and separation into phases serve as criteria as one
tries to see whether the earlier proposals for the mechanisms giving rise to large
heff phases make sense. One can also check whether the systems to which large
heff has been assigned are indeed critical.
One example of criticality is super-fluidity. Superfluids exhibit rather mysterious
looking effects such as fountain effect [6] and what looks like quantum coherence of
superfluid containers, which should be classically isolated. These findings serve as a
motivation for the proposal that genuine superfluid portion of superfluid corresponds
to a large heff phase near criticality at least and that also in other phase transition like
phenomena a phase transition to dark phase occurs near the vicinity [62].
But how does quantum criticality relate to number theory and adelic physics?
heff =h D n has been identified as the number of sheets of space-time surface
identified as a covering space of some kind. Number theoretic discretization defining
the “spine” for a monadic space-time surface. Pitkänen [77] defines also a covering
space with Galois group for an extension of rationals acting as covering group.
Could n be identifiable as the order for a sub-group of Galois group? If this is
the case, the proposed rule for heff changing phase transitions stating that the
reduction of n occurs to its factor would translate to spontaneous symmetry breaking
for Galois group and spontaneous—symmetry breakings indeed accompany phase
transitions.
4
symmetry in ıM˙ CP2 , whose Lie-algebra has the structure of conformal algebra.
Also ordinary super-conformal symmetries associated with string world sheets are
present as well as generalization of 2-D conformal symmetries to their analogs at
light-cone boundary and light-like orbits of partonic 2-surfaces. In this framework
AdS/CFT duality is expected to be modified.
The matrix elements GKL of Kähler metric of WCW can be expressed in two
manners. As contractions of the derivatives @K @L K of the Kähler function of WCW
with isometry generators or as anticommutators fK ; L g of WCW gamma matrices
identified as super-symplectic Noether super charges assignable to fermionic strings
connecting partonic 2-surfaces. Kähler function is identified as real part of the
action: if coupling parameters are real it reduces to the action for the Euclidian
space-time regions with 4-D CP2 projection and otherwise contains contributions
from both Minkowskian and Euclidian regions. The action defines the modified
gamma matrices appearing in modified Dirac action as contractions of canonical
momentum currents with imbedding space gamma matrices.
This observation suggests that there is a super-symmetry between action and
modified Dirac action. The problem is that induced spinor fields naive of SH and
also well-definedness of em charge demand the localization of induced spinor modes
at 2-D string world sheets. This simply cannot be true. On the other hand, SH only
requires that the data about induced spinor fields and space-time surface at the string
world sheets is enough to construct the modes in space-time interior.
This leaves two options if one assumes that SH is exact (recall, however, that
the number theoretic interpretation for the hierarchy of Planck constants suggests
that the number theoretic spin of monadic space-time surface represents additional
discrete data needed besides that assignable to string world sheets to describe dark
matter). As found in the Section 2.3.2, there are two options.
Option I: The analog of brane hierarchy is realized at the level of funda-
mental action. There is a separate fundamental 2-D action assignable with string
world sheets—area and topological magnetic flux term—as also world line action
assignable to the boundaries of string world sheets. By previous argument string
tension should be determined by the value of the cosmological constant ƒ obeying
p-adic coupling constant evolution rather than by G: otherwise there is no hope
about gravitationally bound states above Planck scale. String tension would appear
as an additional fundamental coupling parameter (perhaps fixed by quantum
criticality). This option does not quite conform with the spirit of SH.
Option II: 4-D space-time action and corresponding modified Dirac action
defining fundamental actions are expressible as effective actions assignable to string
world sheets and their boundaries. String world sheet effective action could be
expressible as string area for the effective metric defined by the anticommutators
of modified gamma matrices at string world sheet. If the sum of the induced Kähler
forms of M 4 and CP2 vanishes at string world sheets the effective metric would be
the induced 2-D metric: this together with the observed CP breaking could provide
a justification for the introduction of the analog of Kähler form in M 4 . String tension
would be dynamical rather than determined by lP and depend on ƒ, lP , R, and ˛K .
This representation of Kähler action would be one aspect of the analog of AdS/CFT
duality in TGD framework.
266 M. Pitkänen
For Planckian cosmic strings only quantum gravitational bound states of length of
order Planck length are possible. There must be a mechanism reducing the string
tension. The effective string tension assignable to magnetic flux tubes must be
inversely proportional to 1=h2eff , heff D nh D hgr D 2GMm=v0 in order to obtain
gravitationally bound states in macroscopic length scales identified as structures for
which partonic 2-surfaces are connected by flux tubes accompanied by fermionic
strings.
The reason is that the size scale of (quantum) gravitationally bound states of
masses M and m is given by gravitational Compton length ƒgr D GM=v0 [44, 62,
64] assignable to the gravitational flux tubes connecting the masses M and m. If the
string tension is of order ƒ2gr this is achieved since the typical length of string would
be ƒgr . Gravitational string tension must be therefore of order Tgr
1=ƒ2gr . How
could this be achieved? One can imagine several options and here only the option
based on the assumptions
1. Twistor lift makes sense.
2. Fundamental action is 4-D for both space-time and fermionic degrees of freedom
and 2-D string world sheet action is an effective action realizing SH. Note
effective action makes also possible braid statistics, which does not make sense
at fundamental level.
Philosophy of Adelic Physics 267
3. Also M 4 carries the analog of Kähler form and the sum of induced Kähler forms
from M 4 and CP2 vanishes at string world sheets and also weak gauge fields
vanishes at string world sheets leaving only em field.
is considered since it avoids all the objections that I have been able to invent.
For the twistor lift of TGD [70] predicting cosmological constant ƒ depending
on p-adic length scale ƒ / 1=p the gravitational strings would be naturally
homologically trivial cosmic strings. These vacuum extremals of Kähler action
transform to minimal surface extremals with string tension given by vac S, where
vac the density of dark energy assignable to the volume term of the action and S
the transverse area of the flux tube. One should have vac S D 8ƒS=G D 1=ƒ2gr so
that one would have
G
8ƒS D :
ƒ2gr
ƒ for flux tubes (characterizing the size of CDs containing them) would depend on
the gravitational coupling Mm.
p-Adic mass calculations carried for the first time around 1995 were the stimulus
eventually leading to the number theoretical vision as a kind dual for the geometric
vision about TGD. In this section I will roughly describe the calculations [27, 34]
and the questions and challenges raised by them.
(Max(a, b) denotes maximum of a and b) rather than the usual triangle inequality
and the number of terms in the expansion can be infinite so that p-adic number
need not be finite as a real number. The norm of the p-adic number (counterpart
of jxj for real numbers) is defined as
X
Np .x/ D xn pn D pn0 ;
n0
and depends only very weakly on p-adic number. The ultra-metric distance
function can be defined as dp .x; y/ D Np .x y/.
5. p-Adic numbers allow a generalization of the differential calculus. The basic
rules of the p-adic differential calculus are the same as those of the ordinary
differential calculus. There is, however, one important new element: the set of
the functions having vanishing p-adic derivative consists of the so-called pseudo-
constants, which are analogs of real valued piecewise constant functions. In
the real case only constant functions have vanishing derivative. This implies
that p-adic differential equations are non-deterministic. This non-determinism is
identified as a counterpart of the non-determinism of cognition and imagination
[40].
p-Adic mass calculations [27, 34] rely heavily on a topological model for elemen-
tary particle and it is appropriate to describe it before going to the summary of
calculations.
270 M. Pitkänen
One of the basic ideas of TGD approach to particle physics has been genus-
generation correspondence: boundary components of the 3-surface should be
carriers of elementary particle numbers and the observed particle families should
correspond to various boundary topologies.
With the advent of zero energy ontology (ZEO) this picture has changed
somewhat.
1. The wormhole throats identified as light-like 3-surfaces at which the induced
metric of the space-time surface changes its signature from Minkowskian to
Euclidian correspond to the light-like orbits of partonic 2-surfaces. One cannot
of course exclude the possibility that also boundary components allow to satisfy
boundary conditions without assuming vacuum extremal property of nearby
space-time surface.
The intersections of the wormhole throats with the light-like boundaries of
causal diamonds (CDs) identified as intersections of future and past directed light
cones (CDCP2 is actually in question but I will speak about CDs) define special
partonic 2-surfaces and the conformal moduli of these partonic 2-surfaces appear
in the elementary particle vacuum functionals [27] naturally. A modification of
the original simple picture came from the proposed identification of physical
particles as bound states of two wormhole contacts connected by tubes carrying
monopole fluxes.
2. For generalized scattering diagrams stringy trouser vertices are replaced with
vertices at which the ends of light-like wormhole throats meet. This vertex is the
analog of 3-vertex for Feynman diagrams in particle physics lengths scales and
for the biological replication (DNA and even cell) in macroscopic length scales.
In this picture the interpretation of the analog of trouser vertex is in terms
of propagation of same particle along two different paths. This interpretation
is mathematically natural since vertices correspond to 2-manifolds rather than
singular 2-manifolds, which are just splitting to two disjoint components. Second
complication comes from the weak form of electric-magnetic duality forcing
to identify physical particles as weak strings with magnetic monopoles at their
ends and one should understand also the possible complications caused by this
generalization.
These modifications force to consider several options concerning the identifica-
tion of light fermions and bosons and one can end up with a unique identification
only by making some assumptions. Masslessness of all wormhole throats—also
those appearing in internal lines—and dynamical SU.3/ symmetry for particle
generations are attractive general enough assumptions of this kind. Bosons and
their possible spartners would correspond to wormhole contacts with fermion and
anti-fermion at the throats of the contact. The expectation was that free fermions
and their possible spartners correspond to CP2 type vacuum extremals with single
wormhole throat. It turned, however, that dynamical SU.3/ symmetry forces to
identify massive (and possibly topologically condensed) fermions as pairs of .g; g/
Philosophy of Adelic Physics 271
type wormhole contacts. The existence of higher boson families would mean
breaking of quark and lepton universality and there are indications for this kind
of anomaly [36] .
Obviously one must know something about the dependence of the elementary
particle state functionals on the geometric properties of the boundary component
and in the sequel an attempt to construct what might be called elementary particle
vacuum functionals (EPVFs) is made. The basic assumptions underlying the
construction are the following ones [27]:
1. EPVFs depend on the geometric properties of the two-surface X 2 representing
elementary particle.
2. EPVFs possess extended Diff invariance: all 2-surfaces on the orbit of the 2-
surface X 2 correspond to the same value of the vacuum functional. This condition
is satisfied if vacuum functionals have as their argument, not X 2 as such, but some
2- surface Y 2 belonging to the unique orbit of X 2 (determined by the principle
selecting PE as a generalized Bohr orbit [25, 33, 67]) and determined in general
coordinate invariant manner.
3. ZEO allows to select uniquely the partonic 2-surface as the intersection of the
wormhole throat at which the signature of the induced four-metric changes with
either the upper or lower boundary of CDCP2 . This is essential since otherwise
one could not specify the vacuum functional uniquely.
4. Vacuum functionals possess conformal invariance and therefore for a given genus
depend on a finite number of variables specifying the conformal equivalence
class of Y 2 .
5. Vacuum functionals satisfy the cluster decomposition property: when the surface
Y 2 degenerates to a union of two disjoint surfaces (particle decay in string model
inspired picture), vacuum functional decomposes into a product of the vacuum
functionals associated with disjoint surfaces.
6. EPVFs are stable against the decay g ! g1 Cg2 and one particle decay g ! g1.
This process corresponds to genuine particle decay only for stringy diagrams.
For generalized scattering diagrams the interpretation is in terms of propagation
along two different paths simultaneously.
In [27] the construction of EPVFs is described in detail. This requires some basic
concepts related to the description of the space of the conformal equivalence classes
of Riemann surfaces and the concept of hyper-ellipticity. Since theta functions will
play a central role in the construction of the vacuum functionals, also their basic
properties are needed. Also possible explanations for the experimental absence of
the higher fermion families are considered. Concerning p-adic mass calculations,
the key question is how to construct p-adic variants of EPVFs.
272 M. Pitkänen
3.3.2 Symmetries
There are several contributions to the p-adic thermal mass squared come from the
degrees of freedom, which are thermalized.
Super-conformal degrees of freedom associated with string world sheets are
certainly thermalized. p-Adic mass calculations strongly suggest that the number
of super-conformal tensor factors is N D 5 but also N D 4 and N D 6 can be
considered marginally.
I have considered several identifications of tensor factors and not found a
compelling alternative. If one assumes that super-symplectic degrees of freedom
do not contribute to the thermal mass, string world sheets should explain masses
of elementary fermions. Here charged lepton masses are the test bench. On the
other hand, if super-symplectic degrees of freedom contribute one obtains additional
tensor factor assignable to h D s=2, s trivial zero of zeta. Only one tensor
factor emerges since Hamiltonians correspond to the products of functions of the
coordinates of light-cone boundary and CP2 .
1. SU.2/L U.1/ gives two tensor factors. SU.3/ gives one tensor factor. The
two transversal degrees of freedom for string world sheet suggest 2 degrees of
freedom corresponding to Abelian group E2 . Rotations, however, transform these
degrees to each other so that 1 tensor factor should emerge. This gives four tensor
factors. Could it correspond to the degrees of freedom parallel to string at its end
assignable to wormhole throat? Could normal vibrations of partonic 2-surface?
This would N D 5 tensor factors. Another possibility is that the fifth tensor
factor comes from super-symplectic Super-Virasoro algebra defined by trivial
conformal weights.
Philosophy of Adelic Physics 275
building brick partition functions apart from overall multiplicative constant and
gives a nice agreement with the observed charged lepton mass ratios. The basic
feature of the formula is exponential dependence on g.
5. The super-symplectic stringy contribution assignable to the magnetic flux tube
dominates for weak bosons and is analogous to the stringy contribution to the
hadron masses.
p-Adic mass calculations leave open several questions. What is the precise origin
of preferred p-adic primes and of p-adic length scale hypothesis? How to understand
the preferred number N D 5 of Super-Kac-Moody tensor factors? How to calculate
the contribution of super-symplectic degrees of freedom—are they thermalized?
Why only three lowest genera are light and what are the masses of the predicted
bosonic higher genera implying breaking of fermion universality.
p-Adic length scale hypothesis [38, 39] has served as a basic hypothesis of p-
p
adic TGD for several years. This hypothesis states that the scales Lp D pl,
4
p
l D 1:376 10 G are fundamental length scale at p-adic condensate level p. The
original interpretation of the hypothesis was following:
1. Above the length scale Lp p-adicity sets on and effective course grained space-
time or imbedding space topology is p-adic rather than ordinary real topology.
Imbedding space topology seems to be more appropriate identification.
2. The length scale Lp serves as a p-adic length scale cutoff for the quantum field
theory description of particles. This means that space-time begins to look like
Minkowski space so that the QFT M 4 ! CP2 becomes a realistic approximation.
Below this length scale string like objects and other particle like 3-surfaces are
important.
3. It is un-natural to assume that just single p-adic field would be chosen from
the infinite number of possibilities. Rather, there is an infinite number of cutoff
length scales. To each prime p there corresponds a cutoff length scale Lp above
which p-adic quantum field theory M 4 ! CP2 makes sense and one has a
hierarchy of p-adic QFTs. These different p-adic field theories correspond to
different hierarchically levels possibly present in the topological condensate.
Hierarchical ordering < p1 < p2 < : : : means that only the surface p1 < p2 can
condense on the surface p2 . The condensed surface can in practice be regarded
as a point-like particle at level p2 described by the p-adic conformal field theory
below length scale Lp2 .
The recent view inspired by adelic physics is that preferred p-adic primes
correspond to the so-called ramified primes for the algebraic extension of ratio-
nals defining the adele [66]. Weak form of Negentropy Maximization Principle
(WNMP) [35] in turn allows to conclude that the length scales corresponding to
Philosophy of Adelic Physics 277
powers of primes are preferred. Therefore p-adic length scale hypothesis general-
izes. There is evidence for 3-adic time scales in biology [16, 17] and 3-adic time
scales can be also assigned with Pythagorean scale in geometric theory of harmony
[43, 71].
One can also consider the milder requirement that the exponent D 2L0 represents
trivial scaling represented by unit in good approximation for some p-adic topology.
Not surprisingly, this is the case for L0 D mpk since by Fermat’s theorem
ap mod p D 1 for any integer a, in particular a D 2. This is also the case for L0 D mk
such that 2k mod p D 1 for p prime. This occurs if 2k 1 is Mersenne prime: in
this case one has 2L0 D 1 modulo p so that the sizes of the fractal sub-algebras are
exponentially larger than the sizes of L0 / pn algebras. Note that all scalings aL0
are near to unity for L0 D pn whereas now only a D 2 gives scalings near unity
for Mersenne primes. Perhaps this extended fractality provides the fundamental
explanation for the special importance of Mersenne primes.
In this case integrated scalings 2L0 leave the states almost invariant so that even a
stronger form of the breaking of the exact conformal invariance would be in question
in the super-symplectic case. The representation would be defined by the generators
for which conformal weights are odd multiples of n (Mn D 2n 1) and Lkn , k > 0
would generate zero norm states only in order O.1=Mn /.
Especially interesting is the hierarchy of primes defined by the so-called
Combinatorial Hierarchy resulting from TGD based model for abstraction process.
The primes are given by 2; 3; 7 D 23 1; 127 D 27 1; 2127 1, ..: L0 D n 127
would correspond to M127 -adicity crucial for the memetic code.
If one allows also Gaussian primes, then the notion of Mersenne prime generalizes:
Gaussian Mersennes are of form .1 ˙ i/n 1. In this case one could replace the
p by scaling combined with a twist of =4 around some symmetry
scaling operations
axis: 1 C i D 2exp.i=4/ and generalized p-adic fractality would mean that for
certain values of n the exponentiated operation consisting of n basic operations
would be very near to unity.
278 M. Pitkänen
1. The integers k associated with the lowest Gaussian Mersennes are following:
2; 3; 5; 7; 11; 19; 29; 47; 73; 79; 113. k D 113 corresponds to the p-adic length
scale associated with the atomic nucleus and muon. Thus all known charged
leptons, rather than only e and , as well as nuclear physics length scale,
correspond to Mersenne primes in the generalized sense.
2. The primes k D 151; 157; 163; 167 define perhaps the most fundamental
biological length scales: k D 151 corresponds to the thickness of the cell
membrane of about ten nanometers and k D 167 to cell size about 2:56 m.
This observation also suggests that cellular organisms have evolved to their
present form p through four basic evolutionary stages. This also encourages to
think that 2exp.i=4/ operation giving rise to logarithmic spirals abundant in
living matter is fundamental dynamical symmetry in bio-matter.
Logarithmic spiral provides p the simplest model for biological growth as a
repetition of the basic operation 2exp.i=4/. The naive interpretation would be
thatpgrowth processes consist of k D 151; 157; 163; 167 steps involving scaling
by 2. This, however, requires the strange looking assumption that growth starts
from a structure of size of order CP2 length. Perhaps this exotic growth process
is associated with pair of MEs or magnetic flux tubes of opposite time orientation
and energy emerging CP2 sized region in a mini big bang type process and that
the resulting structure serves as a template for the biological growth.
3. k D 239; 241; 283; 353; 367; 379; 457 associated with the next Gaussian
Mersennes define astronomical length scales. k D 239 and k D 241 correspond
to the p-adic time scales 0:55 ms and 1:1 ms: basic time scales associated with
nerve pulse transmission are in question. k D 283 corresponds to the time
scale of 38:6 min. An interesting question is whether this period could define a
fundamental biological rhythm. The length scale L.353/ corresponds to about
2:6 106 light years, roughly the size scale of galaxies. The length scale
L.367/ ' 3:3 108 light years is of same order of magnitude as the size
scale of the large voids containing galaxies on their boundaries (note the analogy
with cells). T.379/ ' 2:1 1010 years corresponds to the lower bound for the
order of the age of the Universe. T.457/
1022 years defines a completely
superastronomical time and length scale.
3.6 Questions
4.1 Challenges
The basic challenges encountered are construction of the p-adic variants of real
number based physics, understanding their relationship to real physics, and the
fusion of various physics to single coherent whole.
The p-adicization of real physics is not just a straightforward formal generaliza-
tion of scattering amplitudes of existing theories but requires a deeper understanding
280 M. Pitkänen
phases defined by the angles between vectors assignable with the tangent spaces
of discretized geometric structures and thus respecting NTU? Of should one apply
conformal symmetry at Lie algebra level only?
The following vision seems to be the most feasible one found hitherto.
1. Preservation of symmetries and continuity compete. Lorenz transformations
do not commute with canonical identification. This suggests that canonical
identification applies only to Lorentz invariants formed from quantum numbers.
This is enough in the case of scattering amplitudes. Canonical identification
applies only to isometry invariants at the level of WCW and the phases/exponents
of ordinary/hyperbolic angles correspond to numbers in the algebraic extension
common to extensions of rationals and various p-adics.
2. Canonical identification applies at the level of momentum space and maps p-
adic Lorentz invariants of scattering amplitudes to their real counterparts. Phases
of angles and their hyperbolic counterparts should correspond to parameters
defining extension and should be mapped as such to their p-adic counterparts.
3. The constraints coming from GCI and symmetries do not allow local correspon-
dence but allow to consider its discretized version at space-time level induced by
the correspondence at the level of imbedding space.
This requires the restriction of isometries and other symmetries to algebraic
subgroups defined by the extension of rationals. This would imply reduction
of symmetry due to finite cognitive/measurement resolution and should be
acceptable. If one wants to realize the ideas about imagination, discretization
Philosophy of Adelic Physics 283
must be applied also for the space-time interior meaning partial breaking of SH
and giving rise to dark matter degrees freedom in TGD sense. SH could apply
in real sector for realizable imaginations only. Note that the number of algebraic
points of space-time surface is expected to be relatively small.
The correspondence must be considered at the level of imbedding space, space-
time, and WCW.
1. At the level of imbedding space p-adic–real correspondence is induced by points
in extension of rationals and is totally discontinuous. This requires that space-
time dimension is smaller than imbedding space dimension.
2. At space-time level the correspondence involves field equations derivable from
a local variational principle make sense also p-adically although the action itself
is ill-defined as 4-D integral. The notion of p-adic PE makes sense by strong
form of holography applied to 2-surfaces in the intersection. p-Adically, however,
only the vanishing of Noether currents for a sub-algebra of the super-symplectic
algebra might make sense. This condition is stronger than the vanishing of
Noether charges defined by 3-D integrals.
3. Correspondence at the level of WCW can make sense and reduces to that
for string world sheets and partonic 2-surfaces by SH. Real and p-adic 4-
surfaces would be obtained by algebraic continuation as PEs from 2-surfaces
by assuming that the space-time surface contains subset of points of imbedding
space belonging to the extension of rationals [77]. p-Adic pseudo-constants
make p-adic continuation easy. Real continuation need not exist always. p-
Adic WCW would be considerably larger than real WCW and make possible
a predictive quantum theory of imagination and cognition.
What I have called intersection of realities and p-adicities can be identified
as the set of 2-surfaces plus algebraic discretization of space-time interior. Also
the values of induced spinor fields at the points of discretization must be given.
The parameters characterizing the extremals (say coefficients of polynomials)—
WCW coordinates—would be in extension of rationals inducing a finite-D
extension of p-adic number fields.
The hierarchy of algebraic extensions induces an evolutionary hierarchy of
adeles. The interpretation could be as a mathematical correlate for cosmic
evolution realized at the level of the core of WCW defined by the intersection?
2-surfaces could be called space-time genes.
4. Also the p-adic variant Kähler action or at least the exponent of Kähler action
defining vacuum functional should be obtainable by algebraic continuation. The
weakest condition states that the ratios of action exponents for the maxima
of Kähler function to the sum of action exponents for maxima belong to the
extension. Without this condition the hopes of satisfying NTU seem rather
meager.
284 M. Pitkänen
What about NTU at space-time level? NTU requires a correspondence between real
and p-adic numbers and the details of this corresponds have been a long standing
problem.
1. The recent view about the correspondence between real PEs to their p-adic
counterparts does not demand discrete local correspondence assumed in the
earlier proposal [60]. The most abstract approach would give up the local cor-
respondence at space-time level altogether, and restrict the preferred coordinates
of WCW (having maximal group of isometries) to numbers in the extension of
rationals considered. WCW would be discretized.
Intuitively a more realistic view is a correspondence at space-time level in the
sense that real and p-adic space-time sheets intersect at points belonging to the
extension of rationals and defining “cognitive representations.” Only some p-adic
space-time surfaces would have real counterpart.
2. The strongest form of NTU would require that the allowed points of imbedding
space belonging an extension of rationals are mapped as such to corresponding
extensions of p-adic number fields (no canonical identification). At imbedding
space level this correspondence would be extremely discontinuous. The “spines”
of space-time surfaces would, however, contain only a subset of points of
extension, and a natural resolution length scale could emerge and prevent the
fluctuation. This could be also seen as a reason for why space-times surfaces
must be 4-D. The fact that the curve xn C yn D zn has no rational points for n > 2
raises the hope that the resolution scale could emerge spontaneously.
3. The notion of monadic geometry discussed in detail in [77] would realize this
idea. Define first a number theoretic discretization of imbedding space in terms
of points, whose coordinates in group theoretically preferred coordinate system
belong to the extension of rationals considered. One can say that these algebraic
points are in the intersection of reality and various p-adicities. Overlapping open
sets assigned with this discretization define in the real sector a covering by
open sets. In p-adic sector compact-open-topology allows to assign with each
point eighth Cartesian power of algebraic extension of p-adic numbers. These
compact-open sets define analogs for the monads of Leibniz and p-adic variants
of field equations make sense inside them.
The monadic manifold structure of H is induced to space-time surfaces
containing discrete subset of points in the algebraic discretization with field
equations defining a continuation to space-time surface in given number field,
and unique only in finite measurement resolution. This approach would resolve
the tension between continuity and symmetries in p-adic–real correspondence:
isometry groups would be replaced by their sub-groups with parameters in
extension of rationals considered and acting in the intersection of reality and
p-adicities.
The Galois group of extension acts non-trivially on the “spines” of space-time
surfaces. Hence the number theoretical symmetries act as physical symmetries
Philosophy of Adelic Physics 285
and define the orbit of given space-time surface as a kind of covering space. The
coverings assigned to the hierarchy of Planck constants would naturally corre-
spond to Galois coverings and dark matter would represent number theoretical
physics.
This would give rise to a kind of algebraic hierarchy of adelic 4-surfaces
identifiable as evolutionary hierarchy: the higher the dimension of the extension,
the higher the evolutionary level.
It has not been obvious whether one should perform p-adicization and adelization
at the level of WCW. Minimalist could argue that scattering amplitudes are all we
want and that their p-adicization and adelization by algebraic continuation can be
tolerated only if it can give powerful enough constraints on the amplitudes.
1. The anti-commutations for fermionic oscillator operators are number theoret-
ically universal. Supersymmetry suggests that also WCW bosonic degrees of
freedom satisfy NTU. This could mean that the coordinates of p-adic WCW
consist of super-symplectic invariants mappable by canonical identification to
their real counterparts plus phases and their hyperbolic counterparts expressible
as genuinely algebraic numbers common to all number fields. This kind of
coordinates are naturally assignable to symmetric spaces [77].
2. Kähler structure should be mapped from p-adic to real sector and vice versa.
Vacuum functional identified as exponent of action should be NTU. Algebraic
continuation defined by SH involves p-adic pseudo-constants. All p-adic continu-
ations by SH should correspond to the same value of exponent of action obtained
by algebraic continuation from its real value. The degeneracy associated with p-
adic pseudo-constants would be analogous to gauge invariance—imagination in
TGD inspired theory of consciousness.
3. Is it possible to have NTU for WCW functional integration? Or is it enough to
realize NTU for scattering amplitudes only. What seems clear that functional
integral must reduce to a discrete sum. Physical intuition suggests a sum over
maxima of Kähler function forming a subset of PEs representing stationary
points. One cannot even exclude the possibility that the set of PEs is discrete
and that one can sum over all of them.
Restriction to maximum/stationary phase approximation gives rise to sum
over exponents multiplied with Gaussian determinants. The determinant of
Kähler metric, however, cancels the Gaussian determinants, and one obtains only
a sum over the exponents of action.
286 M. Pitkänen
The breaking of strong NTU could happen: consider only p-adic mass
calculations. This breaking is, however, associated with the parts of quantum
states assignable to the boundaries of CD, not with the vacuum functional.
Key Observations
The definition of functional integral in WCW is one of the key technical problems of
quantum TGD [66]. NTU states that the integral should be defined simultaneously
in all number fields in the intersection of real and p-adic worlds defined by string
world sheets and partonic 2-surfaces with WCW coordinates in algebraic extension
of rationals and allowing by strong holography continuation to 4-D space-time
surface. NTU is powerful constraint and could help in this respect.
1. Path integral is not in question. Rather, the functional integral is analogous to
Wiener integral and perhaps allows identification as a genuine integral in the real
sector. In p-adic sectors algebraic continuation should give the integral and here
number theoretical universality gives excellent hopes. The integral would have
exactly the same form in real and p-adic sector and expressible solely in terms
of algebraic numbers characterizing algebraic extension and finite roots of e and
roots of unity Un D exp.i2=n/ in algebraic extension of p-adic numbers.
Since vacuum functional exp.S/ is exponential of complex action S, the
natural idea is that only rational powers eq and roots of unity and phases
exp.i2q/ are involved and there is no dependence on p-adic prime p! This is true
in the integer part of q and is smaller than p so that one does not obtain ekp , which
is ordinary p-adic number and would spoil the number theoretic universality.
This condition is not possible to satisfy for all values of p unless the value of
Kähler function is smaller than 2. One might consider the possibility that the
allow primes are above some minimum value.
The minimal solution to NTU conditions is that the ratios of action exponen-
tials for maxima of Kähler function to the sum of these exponentials belong to
the extension of rationals considered.
2. What does one mean with functional integral? TGD is expected to be an
integrable in some sense. In integrable QFTs functional integral reduces to a sum
over stationary points of the action: typically only single point contributes—at
least in good approximation.
For real ˛K and ƒ vacuum functional decomposes to a product of exponents of
p
real contribution from Euclidian regions ( g4 real) and imaginary contribution
p
Minkowskian regions ( g4 imaginary). There would be no exchange of momen-
tum between Minkowskian and Euclidian regions. For complex values of ˛K [30]
situation changes and Kähler function as real part of action receives contributions
from both Euclidian and Minkowskian regions. The imaginary part of action has
interpretation as analog of Morse function and action as it appears in QFTs. Now
saddle points must be considered.
288 M. Pitkänen
PEs satisfy extremely strong conditions [67, 70]. All classical Noether
charges for a sub-algebra associated with super-symplectic algebra and isomor-
phic to the algebra itself vanish at both ends of CD. The conformal weights of
this algebra are n > 0-ples of those for the entire algebra. What is fascinating
that the condition that the preferred extremals are minimal surface extremals of
Kähler action could solve these conditions and guarantee also NTU at the level
of space-time surfaces. Super-symplectic boundary conditions at the ends of CD
would, however, pose number theoretic conditions on the coupling parameters. In
p-adic case the conditions should reduce to purely local conditions since p-adic
charges are not well-defined as integrals.
3. In TGD framework one is constructing zero energy states rather calculating the
matrix elements of S-matrix in terms of path integral. This gives certain liberties
but a natural expectation is that functional integral as a formal tool at least is
involved.
Could one define the functional integral as a discrete sum of contributions
of standard form for the preferred extremals, which correspond to maxima
in Euclidian regions and associated stationary phase points in Minkowskian
regions? Could one assume that WCW spinor field is concentrated along single
maximum/stationary point.
Quantum classical correspondence suggests that in Cartan algebra isometry
charges are equal to the quantal charges for quantum states expressible in number
theoretically universal manner in terms of fermionic oscillator operators or WCW
gamma matrices? Even stronger condition would be that classical correlation
functions are identical with quantal ones for allowed space-time surfaces in the
quantum superposition. Could the reduction to a discrete sum be interpreted in
terms of a finite measurement resolution?
4. In QFT Gaussian determinants produce problems because they are often poorly
defined. In the recent case they could also spoil the NTU based on the exceptional
properties of e. In the recent case, however, Gaussian determinant and metric
determinant for Kähler metric cancel each other and this problem disappears.
One could obtain just a sum over products of roots of e and roots of unity. Thus
also Kähler structure seems to be crucial for the dream about NTU.
NTU in strong sense could be broken at the level of scattering amplitudes. At space-
time level the breaking does not look natural in the recent framework. Consider only
p-adic mass calculations predicting that mass scale depends on p-adic prime. Also
for the action strong form of NTU might fail for small p-adic primes since the value
of the real part of action would be larger than p. Should one allow this? What does
one actually mean with NTU in the case of action?
Canonical identification is an important element of p-adic mass calculations and
might also be needed to map p-adic variants of scattering amplitudes to their real
Philosophy of Adelic Physics 289
counterparts. The breaking of NTU would take place, when the canonical real
valued image of the p-adic scattering amplitude differs from the real scattering
amplitude. The interpretation would be in terms of finite measurement resolution.
By the finite measurement/cognitive resolution characterized by p one cannot detect
the difference. P P
The simplest form of the canonical identification is x D n xn pn ! xn pn .
Product xy and sum x C y do not in general map to product and sum in canonical
identification. The interpretation would be in terms of a finite measurement reso-
lution: .xy/R D xR yR and .x C y/R D xR C yR only modulo finite measurement
resolution. p-Adic scattering amplitudes are obtained by algebraic continuation
from the intersection by replacing algebraic number valued parameters (such as
momenta) by general p-adic numbers. The real images of these amplitudes under
canonical identification are in general not identical with real scattering amplitudes
the interpretation being in terms of a finite measurement resolution.
In p-adic thermodynamics NTU in the strong sense fails since thermal masses
depend on p-adic mass scale. NTU can be broken by the fermionic matrix elements
in the functional integral so that the real scattering amplitudes differ from the
canonical images of the p-adic scattering amplitudes. For instance, the elementary
particle vacuum functionals in the space of Teichmueller parameters for the partonic
2-surfaces and string world sheets should break NTU [27].
During years I have made several attempts to understand coupling evolution in TGD
framework. The most convincing proposal has emerged rather recently and relates
the spectrum of 1=˛K to that for the zeros of Riemann zeta [30] and to the evolution
of the electroweak U(1) couplings strength.
1. The first idea dates back to the discovery of WCW Kähler geometry defined by
Kähler function defined by Kähler action (this happened around 1990) [33]. The
only free parameter of the theory is Kähler coupling strength ˛K analogous to
temperature parameter ˛K postulated to be is analogous to critical temperature.
Whether only single value or entire spectrum of values ˛K is possible remained
an open question.
About decade ago I realized that Kähler action is complex receiving a real
contribution from space-time regions of Euclidian signature of metric and imag-
inary contribution from the Minkowskian regions. Euclidian region would give
Kähler function and Minkowskian regions analog of QFT action of path integral
approach defining also Morse function. Zero energy ontology (ZEO) [61] led to
the interpretation of quantum TGD as complex square root of thermodynamics
so that the vacuum functional as exponent of Kähler action could be identified
as a complex square root of the ordinary partition function. Kähler function
would correspond to the real contribution Kähler action from Euclidian space-
290 M. Pitkänen
time regions. This led to ask whether also Kähler coupling strength might be
complex: in analogy with the complexification of gauge coupling strength in
theories allowing magnetic monopoles. Complex ˛K could allow to explain CP
breaking. I proposed that instanton term also reducing to Chern–Simons term
could be behind CP breaking.
The problem is that the dynamics in Minkowskian and Euclidian regions
decouple completely and if Euclidian regions serve as space-time correlates
for physical objects, there would be no exchanges of classical charges between
physical objects. Should one conclude that ˛K must be complex?
2. p-Adic mass calculations for two decades ago [34] inspired the idea that length
scale evolution is discretized so that the real version of p-adic coupling constant
would have discrete set of values labelled by p-adic primes. The simple working
hypothesis was that Kähler coupling strength is renormalization group (RG)
invariant and only the weak and color coupling strengths depend on the p-adic
length scale. The alternative ad hoc hypothesis considered was that gravitational
constant is RG invariant. I made several number theoretically motivated ad
hoc guesses about coupling constant evolution, in particular a guess for the
formula for gravitational coupling in terms of Kähler coupling strength, action
for CP2 type vacuum extremal, p-adic length scale as dimensional quantity [22].
Needless to say these attempts were premature and ad hoc.
3. The vision about hierarchy of Planck constants heff D n h and the connection
heff D hgr D GMm=v0 , where v0 < c D 1 has dimensions of velocity
[62] forced to consider very seriously the hypothesis that Kähler coupling
strength has a spectrum of values in one-one correspondence with p-adic length
scales. A separate coupling constant evolution associated with heff induced by
˛K / 1=eff / 1=n looks natural and was motivated by the idea that Nature
is theoretician friendly: when the situation becomes non-perturbative, Mother
Nature comes in rescue and an heff increasing phase transition makes the situation
perturbative again.
Quite recently the number theoretic interpretation of coupling constant evolu-
tion [66, 72] in terms of a hierarchy of algebraic extensions of rational numbers
inducing those of p-adic number fields encouraged to think that 1=˛K has
spectrum labelled by primes and values of heff . Two coupling constant evolutions
suggest themselves: they could be assigned to length scales and angles which
are in p-adic sectors necessarily discretized and describable using only algebraic
extensions involve roots of unity replacing angles with discrete phases.
4. Few years ago the relationship of TGD and GRT was finally understood [50].
GRT space-time is obtained as an approximation as the sheets of the many-
sheeted space-time of TGD are replaced with single region of space-time.
The gravitational and gauge potential of sheets add together so that linear
superposition corresponds to set theoretic union geometrically. This forced to
consider the possibility that gauge coupling evolution takes place only at the
level of the QFT approximation and ˛K has only single value. This is nice but
if true, one does not have much to say about the evolution of gauge coupling
strengths.
Philosophy of Adelic Physics 291
5. The analogy of Riemann zeta function with the partition function of complex
square root of thermodynamics suggests that the zeros of zeta have interpretation
as inverses of complex temperatures s D 1=ˇ. Also 1=˛K is analogous to
temperature. This led to a radical idea to be discussed in detail in the sequel.
Could the spectrum of 1=˛K reduce to that for the zeros of Riemann zeta
or—more plausibly—to the spectrum of poles of fermionic zeta F .ks/ D
.ks/=.2ks/ giving for k D 1=2 poles as zeros of zeta and as point s D 2?
F is motivated by the fact that fermions are the only fundamental particles in
TGD and by the fact that poles of the partition function are naturally associated
with quantum criticality whereas the vanishing of and varying sign allow no
natural physical interpretation.
The poles of F .s=2/ define the spectrum of 1=˛K and correspond to zeros of
.s/ and to the pole of .s=2/ at s D 2. The trivial poles for s D 2n, n D 1; 2; ::
correspond naturally to the values of 1=˛K for different values of heff D n h
with n even integer. Complex poles would correspond to ordinary QFT coupling
constant evolution. The zeros of zeta in increasing order would correspond to p-
adic primes in increasing order and UV limit to smallest value of poles at critical
line. One can distinguish the pole s D 2 as extreme UV limit at which QFT
approximation fails totally. CP2 length scale indeed corresponds to GUT scale.
6. One can test this hypothesis. 1=˛K corresponds to the electroweak U(1) coupling
strength so that the identification 1=˛K D 1=˛U.1/ makes sense. One also knows
a lot about the evolutions of 1=˛U.1/ and of electromagnetic coupling strength
1=˛em D 1=Œcos2 .W /˛U.1/ . What does this predict?
It turns out that at p-adic length scale k D 131 (p ' 2k by p-adic length
scale hypothesis, which now can be understood number theoretically [66]) fine
structure constant is predicted with 0.7% accuracy if Weinberg angle is assumed
to have its value at atomic scale! It is difficult to believe that this could be a mere
accident because also the prediction evolution of ˛U.1/ is correct qualitatively.
Note, however, that for k D 127 labelling electron one can reproduce fine
structure constant with Weinberg angle deviating about 10% from the measured
value of Weinberg angle. Both models will be considered.
7. What about the evolution of weak, color, and gravitational coupling strengths?
Quantum criticality suggests that the evolution of these couplings strengths
is universal and independent of the details of the dynamics. Since one must
be able to compare various evolutions and combine them together, the only
possibility seems to be that the spectra of gauge coupling strengths are given
by the poles of F .w/ but with argument w D w.s/ obtained by a global
conformal transformation of upper half plane—that is Möbius transformation
(see http://tinyurl.com/gwjs85b) with real coefficients (element of GL.2; R/) so
that one as F ..as C b/=.cs C d//. Rather general arguments force it to be and
element of GL.2; Q/, GL.2; Z/ or maybe even SL.2; Z/ (ad bc D 1) satisfying
additional constraints. Since TGD predicts several scaled variants of weak and
color interactions, these copies could be perhaps parameterized by some elements
of SL.2; Z/ and by a scaling factor K.
292 M. Pitkänen
Could one understand the general qualitative features of color and weak
coupling constant evolutions from the properties of corresponding Möbius
transformation? At the critical line there can be no poles or zeros but could
asymptotic freedom be assigned with a pole of cs C d and color confinement
with the zero of as C b at real axes? Pole makes sense only if Kähler action for
the preferred extremal vanishes. Vanishing can occur and does so for massless
extremals characterizing conformally invariant phase. For zero of as C b vacuum
function would be equal to one unless Kähler action is allowed to be infinite:
does this make sense? One can, however, hope that the values of parameters
allow to distinguish between weak and color interactions. It is certainly possible
to get an idea about the values of the parameters of the transformation and one
ends up with a general model predicting the entire electroweak coupling constant
evolution successfully.
To sum up, the big idea is the identification of the spectra of coupling constant
strengths as poles of F ..as C b=/.cs C d// identified as a complex square root
of partition function with motivation coming from ZEO, quantum criticality, and
super-conformal symmetry; the discretization of the RG flow made possible by the
p-adic length scale hypothesis p ' kk , k prime; and the assignment of complex zeros
of with p-adic primes in increasing order. These assumptions reduce the coupling
constant evolution to four real rational or integer valued parameters .a; b; c; d/. In
the sequel this vision is discussed in more detail.
NTU in the strongest form says that all numbers involved at “basic level” (whatever
this means!) of adelic TGD are products of roots of unity and of power of a root of
e. This is extremely powerful physics inspired by conjecture with a wide range of
possible mathematical applications.
1. For instance, vacuum functional defined as an exponent of action for preferred
externals would be number of this kind. One could define functional integral
as adelic operation in all number fields: essentially as sum of exponents of
action for stationary preferred extremals since Gaussian and metric determinants
potentially spoiling NTU would cancel each other leaving only the exponent.
2. The implications of NTU for the zeros of Riemann zeta [72] will be discussed in
more detail in the Appendix. Suffice it to say that the observations about Fourier
transform for the distribution of loci of non-trivial zeros of zeta together with
NTU lead to explicit proposal for the algebraic form of zeros of zeta. The testable
proposal is that zeros decompose to disjoint classes C.p/ labelled by primes p and
the condition that piy is root of unity in given class C.p/.
3. NTU generalizes to all Lie groups. Exponents exp.ini Ji =n/ of lie-algebra genera-
tors define generalizations of number theoretically universal group elements and
generate a discrete subgroup of compact Lie group. Also hyperbolic “phases”
based on the roots em=n are possible and make possible discretized NTU versions
of all Lie-groups expected to play a key role in adelization of TGD.
Philosophy of Adelic Physics 293
NTU generalizes also to quaternions and octonions and allows to define them
as number theoretically universal entities. Note that ordinary p-adic variants
of quaternions and octonions do not give rise to a number field: inverse
of
P quaternion can have vanishing p-adic variant of norm squared satisfying
2
n xn D 0.
NTU allows to define also the notion of Hilbert space as an adelic notion. The
exponents of angles characterizing unit vector of Hilbert space would correspond
to roots of unity.
The basic questions raised by the p-adic mass calculations concern the origin of
preferred p-adic primes and of p-adic length scale hypothesis. One can also ask
whether there might be a natural origin for p-adicity at the level of WCW.
The intuitive feeling is that the notion of preferred prime is something extremely
deep and to me the deepest thing I know is number theory. Does one end up with
preferred primes in number theory? This question brought to my mind the notion of
ramification of primes (http://tinyurl.com/hddljlf) (more precisely, of prime ideals
of number field in its extension), which happens only for special primes in a given
extension of number field, say rationals. Ramification is completely analogous
to the degeneracy of some roots of polynomial and corresponds to criticality
if the polynomial corresponds to criticality (catastrophe theory of Thom is one
application). Could this be the mechanism assigning preferred prime(s) to a given
elementary system, such as elementary particle? I have not considered their role
earlier also their hierarchy is highly relevant in the number theoretical vision about
TGD.
1. Stating it very roughly (I hope that mathematicians tolerate this sloppy language
of physicist): as one goes from number field K, say rationals Q, to its algebraic
extension L, the original prime ideals in the so-called integral closure (http://
tinyurl.com/js6fpvr) over integers of K decompose to products of prime ideals
of L (prime ideal is a more rigorous manner to express primeness). Note that the
general ideal is analog of integer.
Integral closure for integers of number field K is defined as the set of elements
of K, which are roots of some monic polynomial with coefficients, which are
integers of K having the form xn C an1 xn1 C : : : C a0 . The integral closures of
both K and L are considered. For instance, integral closure of algebraic extension
of K over K is the extension itself. The integral closure of complex numbers over
ordinary integers is the set of algebraic numbers.
294 M. Pitkänen
Prime
Q ideals of K can be decomposed to products of prime ideals of L:
P D Pei i , where ei is the ramification index. If ei > 1 is true for some i,
ramification occurs. Pi :s in question are like co-inciding roots of polynomial,
which for in thermodynamics and Thom’s catastrophe theory corresponds to
criticality. Ramification could therefore be a natural aspect of quantum criticality
and ramified primes P are good candidates for preferred primes for a given
extension of rationals. Note that the ramification make sense also for extensions
of given extension of rationals.
2. A physical analogy for the decomposition of ideals to ideals of extension is
provided by decomposition of hadrons to valence quarks. Elementary particles
become composite of more elementary particles in the extension. The decom-
Q e.i/
position to these more elementary primes is of form P D Pi , the physical
analog would be the number of elementary particles of type i in the state (http://
tinyurl.com/h9528pl). Unramified prime P would be analogous a state with
e fermions. Maximally ramified prime would be analogous to Bose–Einstein
condensate of e bosons. General ramified prime would be analogous to an e-
particle state containing both fermions and condensed bosons. This is of course
just a formal analogy.
3. There are two further basic notions related to ramification and characterizing it.
Relative discriminant is the ideal divided by all ramified ideals in K (integer of
K having no ramified prime factors) and relative different for P is the ideal of
L divided by all ramified Pi :s (product of prime factors of P in L). These ideals
represent the analogs of product of preferred primes P of K and primes Pi of L
dividing them. These two integers ideals would characterize the ramification.
In TGD framework the extensions of rationals (http://tinyurl.com/h9528pl) and
p-adic number fields (http://tinyurl.com/zq22tvb) are unavoidable and interpreted as
an evolutionary hierarchy physically and cosmological evolution would gradually
proceed to more and more complex extensions. One can say that string world
sheets and partonic 2-surfaces with parameters of defining functions in increasingly
complex extensions of prime emerge during evolution. Therefore ramifications and
the preferred primes defined by them are unavoidable. For p-adic number fields the
number of extensions is much smaller, for instance, for p > 2 there are only three
quadratic extensions.
How could ramification relate to p-adic and adelic physics and could it explain
preferred primes?
1. Ramified p-adic prime P D Pei would be replaced with its e:th root Pi in p-
adicization. Same would apply to general ramified primes. Each unramified
prime of K is replaced with e D K W L primes of L and ramified primes P
with #fPi g < e primes of L: the increase of algebraic dimension is smaller.
An interesting question relates to p-adic length scale. What happens to p-adic
length scales. Is p-adic prime effectively replaced with e:th root of p-adic prime:
Lp / p1=2 L1 ! p1=2e L1 ? The only physical option is that the p-adic temperature
for P would be scaled down Tp D 1=n ! 1=ne for its e:th root (for fermions
Philosophy of Adelic Physics 295
p-Adic length scale hypothesis emerged from p-adic length scale hypothesis. A
possible generalization of this hypothesis is that p-adic primes near powers of
prime are physically favored. There indeed exists evidence for the realization of
3-adic time scale hierarchies in living matter [17] (http://tinyurl.com/jbh9m27) and
in music both 2-adicity and 3-adicity could be present: this is discussed in TGD
inspired theory of music harmony and genetic code [43]. See also [75, 78].
One explanation would be that for preferred primes the number of p-adic space-
time sheets representable also as real space-time sheets is maximal. Imagined
worlds would be maximally realizable. Preferred p-adic primes would correspond
Philosophy of Adelic Physics 297
to ramified primes for extensions with the property that the number of realizable
imaginations is especially large for them. Why primes satisfying p-adic length scale
hypothesis or its generalization would appear as ramified primes for extensions,
which are winners in number theoretical evolution?
Also the weak form of NMP (WNMP) applying also to the purely number
theoretic form of NMP [35] might come in rescue here.
1. Entanglement negentropy for a NE [35] characterized by n-dimensional projec-
tion operator is the log.Np .n// for some p whose power divides n. The maximum
negentropy is obtained if the power of p is the largest power of prime divisor
of p, and this can be taken as definition of number theoretical entanglement
negentropy (NEN). If the largest divisor is pk , one has N D k log.p/. The
entanglement negentropy per entangled state is N=n D klog.p/=n and is maximal
for n D pk . Hence powers of prime are favored, which means that p-adic length
scale hierarchies with scales coming as powers of p are negentropically favored
and should be generated by NMP. Note that n D pk would define a hierarchy of
heff =h D pk . During the first years of heff hypothesis I believe that the preferred
values obey heff D rk , r integer not far from r D 211 . It seems that this belief was
not totally wrong.
2. If one accepts this argument, the remaining challenge is to explain why primes
near powers of two (or more generally p) are favored. n D 2k gives large
entanglement negentropy for the final state. Why primes p D n2 D 2k r would
be favored? The reason could be following. n D 2k corresponds to p D 2, which
corresponds to the lowest level in p-adic evolution since it is the simplest p-
adic topology and farthest from the real topology and therefore gives the poorest
cognitive representation of real PE as p-adic PE (Note that p D 1 makes formally
sense but for it the topology is discrete).
3. WNMP [35, 51] suggests a more feasible explanation. The density matrix
of the state to be reduced is a direct sum over contributions proportional to
projection operators. Suppose that the projection operator with largest dimension
has dimension n. Strong form of NMP would say that final state is characterized
by n-dimensional projection operator. WNMP allows “free will” so that all
dimensions nk, k D 0; 1; : : :n1 for final state projection operator are possible.
One-dimensional case corresponds to vanishing entanglement negentropy and
ordinary state function reduction isolating the measured system from external
world.
4. The negentropy of the final state per state depends on the value of k. It is maximal
if n k is power of prime. For n D 2k D Mk C 1, where Mk is Mersenne prime
n 1 gives the maximum negentropy and also maximal p-adic prime available so
that this reduction is favored by NMP. Mersenne primes would be indeed special.
Also the primes n D 2k r near 2k produce large entanglement negentropy and
would be favored by NMP.
5. This argument suggests a generalization of p-adic length scale hypothesis so that
p D 2 can be replaced by any prime.
298 M. Pitkänen
The notion of self can be seen as a generalization of the poorly defined definition of
the notion of observer in quantum physics. In the following I take the role of skeptic
trying to be as critical as possible.
The original definition of self was a subsystem able to remain unentangled
under state function reductions associated with subsequent quantum jumps. The
density matrix was assumed to define the universal observable. Note that a density
matrix, which is power series of a product of matrices representing commuting
observables has in the generic case eigenstates, which are simultaneous eigenstates
of all observables. Second aspect of self was assumed to be the integration of
subsequent quantum jumps to coherent whole giving rise to the experienced flow
of time.
The precise identification of self allowing to understand both of these aspects
turned out to be difficult problem. I became aware of the solution of the problem in
terms of ZEO (ZEO) only rather recently (2014).
1. Self corresponds to a sequence of quantum jumps integrating to single unit as
in the original proposal, but these quantum jumps correspond to state function
reductions to a fixed boundary of causal diamond CD leaving the corresponding
parts of zero energy states invariant—“small” state function reductions. The parts
of zero energy states at second boundary of CD change and even the position of
the tip of the opposite boundary changes: one actually has wave function over
positions of second boundary (CD sizes roughly) and this wave function changes.
In positive energy ontology these repeated state function reductions would have
no effect on the state (Zeno effect) but in TGD framework there occurs a change
for the second boundary and gives rise to the experienced flow of time and its
arrow and self: self is generalized Zeno effect.
Philosophy of Adelic Physics 299
2. The first quantum jump to the opposite boundary corresponds to the act of “free
will” or birth of re-incarnated self. Hence the act of “free will” changes the arrow
of psychological time at some level of hierarchy of CDs. The first reduction to
the opposite boundary of CD means “death” of self and “re-incarnation” of time-
reversed self at opposite boundary at which the temporal distance between the
tips of CD increases in opposite direction. The sequence of selves and time-
reversed selves is analogous to a cosmic expansion for CD. The repeated birth
and death of mental images could correspond to this sequence at the level of
sub-selves.
3. This allows to understand the relationship between subjective and geometric time
and how the arrow of and flow of clock time (psychological time) emerge. The
average distance between the tips of CD increases on the average as along as state
function functions occur repeatedly at the fixed boundary: situation is analogous
to that in diffusion. The localization of contents of conscious experience to
boundary of CD gives rise to the illusion that universe is three-dimensional. The
possibility of memories made possibly by hierarchy of CDs demonstrates that
this is not the case. Self is simply the sequence of state function reductions at
same boundary of CD remaining fixed and the lifetime of self is the total growth
of the average temporal distance between the tips of CD.
One can identify several rather abstract state function reductions selecting a
sector of WCW.
1. There are quantum measurements inducing localization in the moduli space of
CDs with passive boundary and states at it fixed. In particular, a localization in
the moduli characterizing the Lorentz transform of the upper tip of CD would be
measured. The measured moduli characterize also the analog of symplectic form
in M 4 strongly suggested by twistor lift of TGD—that is the rest system (time
axis) and spin quantization axes. Of course, also other kinds of reductions are
possible.
2. Also a localization to an extension of rationals defining the adeles should occur.
Could the value of n D heff =h be observable? The value of n for given space-
time surface at the active boundary of CD could be identified as the order of the
smallest Galois group containing all Galois groups assignable to 3-surfaces at
the boundary. The superposition of space-time surface would not be eigenstate
of n at active boundary unless localization occurs. It is not obvious whether this
is consistent with a fixed value of n at passive boundary.
The measured value of n could be larger or smaller than the value of n at the
passive boundary of CD but in statistical sense n would increase by the analogy
with diffusion on half line defined by non-negative integers. The distance from
the origin unavoidably increases in statistical sense. This would imply evolution
as increase of maximal value of negentropy and generation of quantum coherence
in increasingly longer scales.
3. A further abstract choice corresponds to the replacement of the roles of active
and passive boundary of CD changing the arrow of clock time and correspond to
a death of self and re-incarnation as time-reversed self.
300 M. Pitkänen
Self as a generalized Zeno effect makes sense only if there are active
commuting with passive observables. If the passive observables form a maximal
set, the new active observables commuting with them must emerge. The increase
of the size of extension of rationals might generate them by expanding the state
space so that self would survive only as long at it evolves.
Otherwise there would be only single unitary time evolution followed by a
reduction to opposite boundary. This makes sense only if the sequence of “big”
reductions for sub-selves can give rise to the time flow experienced by self: the
birth and death of mental images would give rise to flow of time of self.
A hierarchical process starting from given CD and proceeding downwards to
shorter scales and stopping when the entanglement is stable is highly suggestive and
favors self-measurements. What stability could mean will be discussed in the next
section. CDs would be a correlate for self-hierarchy. One can say also something
about the anatomy and correlates of self-hierarchy.
1. Self experiences its sub-selves as mental images and even we would represent
mental images of some higher level collective self. Everything is conscious but
consciousness can be lost or at least it is not possible to have memory about it.
The flow of consciousness for a given self could be due to the quantum jump
sequences performed by its sub-selves giving rise to mental images.
2. By quantum classical correspondence self has also space-time correlates. One
can visualize sub-self as a space-time sheet “glued” by topological sum to the
space-time sheet of self. Subsystem is not described as a tensor factor as in
the standard description of subsystems. Also sub-selves of selves can entangle
negentropically and this gives rise to a sharing of mental images about which
stereo vision would be basic example. Quite generally, one could speak of
stereo consciousness. Also the experiences of sensed presence [19] could be
understood as a sharing of mental images between brain hemispheres, which are
not themselves entangled. This is possible also between different brains. In the
normal situation brain hemispheres are entangled.
3. At the level of eight-dimensional imbedding space the natural correlate of self
would be CD (causal diamond). At the level of space-time the correlate would
be space-time sheet or light-like 3-surface. The contents of consciousness of self
would be determined by the space-time sheets in the interior of CD. Without
further restrictions the experience of self would be essentially four-dimensional.
Memories would be like sensory experiences except that they would be about the
geometric past and for some reason are not usually colored by sensory qualia. For
instance, 0.1 s time scale defining sensory chronon corresponds to the secondary
p-adic time scale characterizing the size of electron’s CD (Mersenne prime M127 ),
which suggests that Cooper pairs of electrons are essential for the sensory qualia.
302 M. Pitkänen
The view about Negentropy Maximization Principle (NMP) [35] has co-evolved
with the notion of self and I have considered many variants of NMP.
1. The original formulation of NMP was in positive energy ontology and made
same predictions as standard quantum measurement theory. The new element
was that the density matrix of sub-system defines the fundamental observable
and the system goes to its eigenstate in state function reduction. As found, the
localizations at to WCW sectors define what might be called self-measurements
and identifiable as active volitions rather than reactions.
2. In p-adic physics one can assign with rational and even algebraic entanglement
probabilities number theoretical entanglement negentropy (NEN) satisfying the
same basic axioms as the ordinary Shannon entropy but having negative values
and therefore having interpretation as information.
P The definition of p-adic
negentropy (real valued) reads as Sp D Pk log.jPk jp /, where j:jp denotes p-
adic norm. The news is that Np D Sp can be positive and is positive for rational
entanglement probabilities. Real entanglement entropy S is always non-negative.
NMP would force the generation of negentropic entanglement (NE) and
stabilize it. NNE resources of the Universe—one might call them Akashic
records—would steadily increase.
3. A decisive step of progress was the realization is that NTU forces all states in
adelic physics to have entanglement coefficients in some extension of rationals
inducing finite-D extension of p-adic numbers. The same entanglement can
be characterized by real entropy S and p-adic negentropiesPNp , which can be
positive. One can define also total p-adic negentropy: N D p Np for all p and
total negentropy Ntot D N S.
For rational entanglement probabilities it is easy to demonstrate that the
generalization of adelic theorem holds true: Ntot D N S D 0. NMP based
on Ntot rather than N would not say anything about rational entanglement. For
extensions of rationals it is easy to find that N S > 0 is possible if entanglement
probabilities are of form Xi =n with jXi jp D 1 and n integer [76]. Should one
identify the total negentropy as difference Ntot D N S or as Ntot D N?
Irrespective of answer, large p-adic negentropy seems to force large real
entropy: this nicely correlates with the paradoxical finding that living systems
tend to be entropic although one would expect just the oppositecite [76]: this
relates in very interesting manner to the work of biologists Jeremy England
[15]. The negentropy would be cognitive negentropy and not visible for ordinary
physics.
4. The latest step in the evolution of ideas NMP was the question whether NMP
follows from number theory alone just as second law follows form probability
theory! This irritates theoretician’s ego but is victory for theory. The dimension n
of extension is positive integer and cannot grow in statistical sense in evolution!
Since one expects that the maximal value of negentropy (define as N S) must
increase with n. Negentropy must increase in long run.
Philosophy of Adelic Physics 303
Number theoretical Shannon entropy can serve as a measure for genuine information
assignable to a pair of entanglement systems [35]. Entanglement with coefficients
in the extension is always negentropic if entanglement negentropy comes from p-
adic sectors only. It can be negentropic if negentropy is defined as the difference of
p-adic negentropy and real entropy.
The diagonalized density matrix need not belong to the algebraic extension since
the probabilities defining its diagonal elements are eigenvalues of the density matrix
as roots of N:th order polynomial, which in the generic case requires n-dimensional
algebraic extension of rationals. One can argue that since diagonalization is not
possible, also state function reduction selecting one of the eigenstates is impossible
unless a phase transition increasing the dimension of algebraic extension used
occurs simultaneously. This kind of NE could give rise to cognitive entanglement.
There is also a special kind of NE, which can result if one requires that density
matrix serves a universal observable in state function reduction. The outcome of
reduction must be an eigenspace of density matrix, which is projector to this sub-
space acting as identity matrix inside it. This kind of NE allows all unitarily related
basis as eigenstate basis (unitary transformations must belong to the algebraic
extension). This kind of NE could serve as a correlate for “enlightened” states of
consciousness. Schrödingers cat is in this kind of state stably in superposition of
dead and alive and state basis obtained by unitary rotation from this basis is equally
good. One can say that there are no discriminations in this state, and this is what is
claimed about “enlightened” states too.
The vision about number theoretical evolution suggests that NMP forces the
generation of NE resources as NE assignable to the “passive” boundary of CD
for which no changes occur during sequence of state function reductions defining
self. It would define the unchanging self as negentropy resources, which could be
regarded as kind of Akashic records. During the next “re-incarnation” after the first
reduction to opposite boundary of CD the NE associated with the reduced state
would serve as new Akashic records for the time-reversed self. If NMP reduces to
the statistical increase of heff =h D n the consciousness information contents of the
Universe increases in statistical sense. In the best possible world of SNMP it would
increase steadily.
The heretic question that emerged quite recently is whether NMP is actually needed
at all! Is NMP a separate principle or could NMP reduced to mere number theory
[35]? Consider first the possibility that NMP is not needed at all as a separate
principle.
1. The value of heff =h D n should increase in the evolution by the phase transitions
increasing the dimension of the extension of rationals. heff =h D n has been
304 M. Pitkänen
identified as the number of sheets of some kind of covering space. The Galois
group of extension acts on number theoretic discretizations of the monadic
surface and the orbit defines a covering space. Suppose n is the number of sheets
of this covering and thus the dimension of the Galois group for the extension of
rationals or factor of it.
2. It has been already noticed that the “big” state function reductions giving rise to
death and re-incarnation of self could correspond to a measurement of n D heff
implied by the measurement of the extension of the rationals defining the adeles.
The statistical increase of n follows automatically and implies statistical increase
of maximal entanglement negentropy. Entanglement negentropy increases in
statistical sense.
The resulting world would not be the best possible one unlike for a strong
form of NMP demanding that negentropy does increase in “big” state function
reductions. n also decreases temporarily and they seem to be needed. In TGD
inspired model of bio-catalysis the phase transition reducing the value of n for the
magnetic flux tubes connecting reacting bio-molecules allows them to find each
other in the molecular soup. This would be crucial for understanding processes
like DNA replication and transcription.
3. State function reduction corresponding to the measurement of density matrix
could occur to an eigenstate/eigenspace of density matrix only if the correspond-
ing eigenvalue and eigenstate/eigenspace is expressible using numbers in the
extension of rationals defining the adele considered. In the generic case these
numbers belong to N-dimensional extension of the original extension. This can
make the entanglement stable with respect to state the measurements of density
matrix.
A phase transition to an extension of an extension containing these coefficients
would be required to make possible reduction. A step in number theoretic
evolution would occur. Also an entanglement of measured state pairs with those
of measuring system in containing the extension of extension would make
possible the reduction. Negentropy could be reduced but higher-D extension
would provide potential for more negentropic entanglement and NMP would
hold true in the statistical sense.
4. If one has higher-D eigenspace of density matrix, p-adic negentropy is largest
for the entire sub-space and the sum of real and p-adic negentropies vanishes for
all of them. For negentropy identified as total p-adic negentropy SNMP would
select the entire sub-space and NMP would indeed say something explicit about
negentropy.
Hitherto I have postulated NMP as a separate principle [35]. Strong form of NMP
(SNMP) states that Negentropy does not decrease in “big” state function reductions
corresponding to death and re-incarnations of self.
Philosophy of Adelic Physics 305
One can, however, argue that SNMP is not realistic. SNMP would force the
Universe to be the best possible one, and this does not seem to be the case. Also
ethically responsible free will would be very restricted since self would be forced
always to do the best deed that is increase maximally the negentropy serving as
information resources of the Universe. Giving up separate NMP altogether would
allow to have also “Good” and “Evil.”
This forces to consider what I christened weak form of NMP (WNMP). Instead
of maximal dimension corresponding to N-dimensional projector self can choose
also lower-dimensional sub-spaces and 1-D sub-space corresponds to the vanishing
entanglement and negentropy assumed in standard quantum measurement theory.
As a matter of fact, this can also lead to larger negentropy gain since negentropy
depends strongly on what is the large power of p in the dimension of the resulting
eigen sub-space of density matrix. This could apply also to the purely number
theoretical reduction of NMP.
WNMP suggests how to understand the notions of Good and Evil. Various
choices in the state function reduction would correspond to Boolean algebra, which
suggests an interpretation in terms of what might be called emotional intelligence
[51]. Also it turns out that one can understand how p-adic length scale hypothesis—
actually its generalization—emerges from WNMP [66].
1. One can start from ordinary quantum entanglement. It corresponds to a super-
position of pairs of states. Second state corresponds to the internal state of the
self and second state to a state of external world or biological body of self. In
negentropic quantum entanglement each is replaced with a pair of sub-spaces of
state spaces of self and external world. The dimension of the sub-space depends
on which pair is in question. In state function reduction one of these pairs is
selected and deed is done. How to make some of these deeds good and some
bad? Recall that WNMP allows only the possibility to generate NNE but does
not force it. WNMP would be like God allowing the possibility to do good but
not forcing good deeds.
Self can choose any sub-space of the sub-space defined by k N-dimensional
projector and 1-D sub-space corresponds to the standard quantum measurement.
For k D 1 the state function reduction leads to vanishing negentropy, and
separation of self and the target of the action. Negentropy does not increase in
this action and self is isolated from the target: kind of price for sin.
For the maximal dimension of this sub-space the negentropy gain is maximal.
This deed would be good and by the proposed criterion NE corresponds to
conscious experience with positive emotional coloring. Interestingly, there are
2k 1 possible choices, which is almost the dimension of Boolean algebra con-
sisting of k independent bits. The excluded option corresponds to 0-dimensional
sub-space—empty set in set theoretic realization of Boolean algebra. This
could relate directly to fermionic oscillator operators defining basis of Boolean
algebra—here Fock vacuum would be the excluded state. The deed in this
sense would be a choice of how loving the attention towards system of external
world is.
306 M. Pitkänen
The items in the following list give motivations for the proposal that p-adic physics
could serve as a correlate for cognition and imagination.
1. By the total disconnectedness of the p-adic topology, p-adic world decomposes
naturally into blobs, objects. This happens also in sensory perception. The pinary
digits of p-adic number can be assigned to a p-tree. Parisi proposed in the
model of spin glass [12] that p-adic numbers could relate to the mathematical
description of cognition and also Khrennikov [18] has developed this idea. In
TGD framework that idea is taken to space-time level: p-adic space-time sheets
represent thought bubbles and they correlate with the real ones since they form
cognitive representations of the real world. SH allows a concrete realization of
this.
2. p-Adic non-determinism due to p-adic pseudo-constants suggests interpretation
in terms of imagination. Given 2-surfaces could allow completion to p-adic
preferred extremal but not to a real one so that pure “non-realizable” imagination
is in question.
3. Number theoretic negentropy has interpretation as negentropy characterizing
information content of entanglement. The superposition of state pairs could
be interpreted as a quantum representation for a rule or abstracted association
Philosophy of Adelic Physics 307
Since fermions are the only fundamental particles in TGD one could argue that the
conformal weight of the generating elements of supersymplectic algebra could be
negatives for the poles of fermionic zeta F . This demands n > 0 as does also the
fractal hierarchy of super-symplectic symmetry breakings. NTU of Riemann zeta in
some sense is strongly suggested if adelic physics is to make sense.
For ordinary conformal algebras there are only finite number of generating
elements (2 n 2). If the radial conformal weights for the generators of g
consist of poles of F , the situation changes. F is suggested by the observation that
fermions are the only fundamental particles in TGD.
Q
1. Riemann Zeta .s/ D p .1=.1ps / identifiable formally as a partition function
B .s/ of arithmetic boson gas with bosons with energy log.p/ and temperature
1=s D 1=.1=2 C iy/ should be replaced with Q that of arithmetic fermionic gas
given in the product representation by F .s/ D p .1 C ps / so that the identity
B .s//=F .s/ D B .2s/ follows. This gives
B .s/
:
B .2s/
F .s/ has zeros at zeros sn of .s/ and at the pole s D 1=2 of zeta.2s/. F .s/ has
poles at zeros sn =2 of .2s/ and at pole s D 1 of .s/.
The spectrum of 1=T would be for the generators of algebra f.1=2 C
iy/=2; n > 0; 1g. In p-adic thermodynamics the p-adic temperature is 1=T D
1=n and corresponds to “trivial” poles of F . Complex values of temperature
do not make sense in ordinary thermodynamics. In ZEO quantum theory can be
regarded as a square root of thermodynamics and complex temperature parameter
makes sense.
Philosophy of Adelic Physics 309
2. Powers pn label the points of quasicrystal defined by points log.pn / and Riemann
zeta has interpretation as partition function for boson case with this spectrum.
Could pn label also the points of the dual lattice defined by iy.
3. The existence of Fourier transform for points log.pni / for any vector ya in class
iy
C.p/ of zeros labelled by p requires pi a to be a root of unity inside C.p/. This
could define the sense in which zeros of zeta are universal. This condition also
guarantees that the factor n1=2iy appearing in zeta at critical line are number
theoretically universal (p1=2 is problematic for Qp : the problem might be solved
by eliminating from p-adic analog of zeta the factor 1 ps ).
(a) One obtains for the pair .pi ; sa / the condition log.pi /ya D qia 2, where qia
is a rational number. Dividing the conditions for .i; a/ and .j; a/ gives
q =qja
pi D pj ia
for every zero sa so that the ratios qia =qja do not depend on sa . From this one
N
easily deduce pMi D pj , where M and N are integers so that one ends up with
a contradiction.
(b) Dividing the conditions for .i; a/ and .i; b/ one obtains
ya qia
D
yb qib
so that the ratios qia =qib do not depend on pi . The ratios of the imaginary parts
of zeta would be therefore rational number which is very strong prediction
and zeros could be mapped by scaling ya =y1 where y1 is the zero which
smallest imaginary part to rationals.
(c) The impossible consistency conditions for .i; a/ and .j; a/ can be avoided
if each prime and its powers correspond to its own subset of zeros and
these subsets of zeros are disjoint: one would have infinite union of
sub-quasicrystals labelled by primes and each p-adic number field would
correspond to its own subset of zeros: this might be seen as an abstract analog
for the decomposition of rational to powers of primes. This decomposition
would be natural if for ordinary complex numbers the contribution in the
complement of this set to the Fourier transform vanishes. The conditions
.i; a/and .i; b/ require now that the ratios of zeros are rationals only in the
subset associated with pi .
For the general option the Fourier transform can be delta function for x D
log.pk / and the set fya .p/g contains Np zeros. The following argument inspires the
conjecture that for each p there is an infinite number Np of zeros ya .p/ in class C.p/
satisfying
r.p/
piya .p/ D u.p/ D e m.p/ i2 ;
Philosophy of Adelic Physics 311
where u.p/ is a root of unity that is ya .p/ D 2.m.a/ C r.p//=log.p/ and forming a
subset of a lattice with a lattice constant y0 D 2=log.p/, which itself need not be a
zero.
In terms of stationary phase approximation the zeros ya .p/ associated with p
would have constant stationary phase whereas for ya .pi ¤ p/ the phase piya .pi / would
fail to be stationary. The phase eixy would be non-stationary also for x ¤ log.pk / as
function of y.
1. Assume that for x D qlog.p/, where q not a rational, the phases eixy fail to be
roots of unity and are random implying the vanishing/smallness of F.x/ .
2. Assume that for a given p all powers piy for y … fya .p/g fail to be roots of
unity and are also random so that the contribution of the set y … fya .p/g to F.p/
vanishes/is small.
3. For x D log.pk=m / the Fourier transform should vanish or be small for m ¤
1 (rational roots of primes) and give a non-vanishing contribution for m D 1.
One has
P M.a;p/
F.x D log.pk=m / D 1aN.p/ ek mN.p/ i2 u.p/ ;
r.p/
u.p/ D e m.p/ i2 :
Obviously one can always choose N.a; p/ D N.p/.
4. For the simplest option N.p/ D 1 one would obtain delta function distribution
for x D log.pk /. The sum of the phases associated with ya .p/ and ya .p/ from
the half axes of the critical line would give
r.p/
F.x D log.pn // / X.pn / 2cos.n 2/ :
m.p/
The sign of F would vary.
5. For x D log.pk=m / the value of Fourier transform is expected to be small by
interference effects if M.a; p/ is random integer, and negligible as compared with
the value at x D log.pk /. This option is highly attractive. For N.p/ > 1 and
M.a; p/ a random integer also F.x D log.pk / is small by interference effects.
Hence it seems that this option is the most natural one.
6. The rational r.p/=m.p/ would characterize given prime (one can require that r.p/
and m.p/ have no common divisors). F.x/ is non-vanishing for all powers x D
log.pn / for m.p/ odd. For p D 2, also m.2/ D 2 allows to have jX.2n /j D 2.
An interesting ad hoc ansatz is m.p/ D p or ps.p/ . One has periodicity in n with
period m.p/ that is logarithmic wave. This periodicity serves as a test and in
principle allows to deduce the value of r.p/=m.p/ from the Fourier transform.
What could one conclude from the data (http://tinyurl.com/hjbfsuv)?
1. The first graph gives jF.x D log.pk /j and second graph displays a zoomed up part
of jF.x D log.pk /j for small powers of primes in the range Œ2; 19. For the first
graph the eighth peak (p D 11) is the largest one but in the zoomed graphs this
is not the case. Hence something is wrong or the graphs correspond to different
approximations suggesting that one should not take them too seriously.
312 M. Pitkänen
In any case, the modulus is not constant as function of pk . For small values of
k
p the envelope of the curve decreases and seems to approach constant for large
values of pk (one has x < 15 (e15 ' 3:3 106 ).
2. According to the first graph jF.x/j decreases for x D klog.p/ < 8, is largest for
small primes, and remains below a fixed maximum for 8 < x < 15. According
to the second graph the amplitude decreases for powers of a given prime (say
p D 2). Clearly, the small primes and their powers have much larger jF.x/j than
large primes.
There are many possible reasons for this behavior. Most plausible reason is that
the sums involved converge slowly and the approximation used is not good. The
inclusion of only 104 zeros would show the positions of peaks but would not allow
reliable estimate for their intensities.
1. The distribution of zeros could be such that for small primes and their powers
the number of zeros is large in the set of 104 zeros considered. This would be the
case if the distribution of zeros ya .p/ is fractal and gets “thinner” with p so that
the number of contributing zeros scales down with p as a power of p, say 1=p, as
suggested by the envelope in the first figure.
2. The infinite sum, which should vanish, converges only very slowly to zero.
k
P F.p ;k p1 / of zeros not belonging to the class p1k ¤ p
Consider the contribution
k
to F.x D log.p // D pi F.p ; pi /, which includes also pi D p. F.p ; pi /,
p ¤ p1 should vanish in exact calculation.
(a) By the proposed hypothesis this contribution reads as
P h i
r.p1 /
F.p; p1 / D a cos X.pk ; p1 /.M.a; p1 / C m.p 1/
/2/ :
log.pk /
X.pk ; p1 / D log.p1 /
:
(d) Also twin primes are problematic since in this case one has factor X.p D
1 C2/
p1 C 2; p1 / D log.p
log.p1 /
. The region of small primes contains many twin
prime pairs: (3,5), (5,7), (11,13), (17,19), (29,31),. . . .
These observations suggest that the problems might be understood as resulting
from including too small number of zeros.
3. The predicted periodicity of the distribution with respect to the exponent k of pk is
not consistent with the graph for small values of prime unless the periodic m.p/
for small primes is large enough. The above-mentioned effects can quite well
mask the periodicity. If the first graph is taken at face value for small primes,
r.p/=m.p/ is near zero, and m.p/ is so large that the periodicity does not become
manifest for small primes. For p D 2 this would require m.2/ > 21 since the
largest power 2n ' e15 corresponds to n
21.
To summarize, the prediction is that for zeros of zeta should divide into disjoint
classes fya .p/g labelled by primes such that within the class labelled by p one has
piya .p/ D e.r.p/=m.p//i2 so that has ya .p/ D ŒM.a; p/ C r.p/=m.p//2=log.p/.
where p denotes prime and sk a non-trivial zero of zeta. The left-hand side represents
the distribution associated with powers of primes. The right-hand side contains sum
over cosines
P
X cos.log.x/yk /
xsk 1 D 2 k ;
k
x1=2
where yk is the imaginary part of non-trivial zero. Apart from the factor x1=2 this is
just the Fourier transform over the distribution of zeros.
There is also a slowly varying term 1 x.x211/ , which has interpretation as the
analog of the Fourier transform term but sum over trivial zeros of zeta at s D 2n,
n > 0. The entire expression is analogous to a “Fourier transform” over the
distribution of all zeros. Quasicrystal is replaced with union on 1-D quasicrystals.
314 M. Pitkänen
log.x/
in the sense of distribution. The number of zeros along critical line goes like
t
#.zeros < t/ D .t=2/ log. /
2
in the same sense. If the real axis and critical line have same metric measure, then
one can say that the number of zeros in interval T per number of primes in interval
T behaves roughly like
so that at the limit of T ! 1 the number of zeros associated with given prime is
infinite. This assumption of course makes the argument a poor man’s argument only.
1. A possible formulation for NTU for the poles of fermionic Riemann zeta
F D .s/=.2s/ could be as a condition that is that the exponents pksa .p/=2 D
pk=4 pikya .p/=2 exist in a number theoretically universal manner for the zeros sa .p/
for given p-adic prime p and for some subset of integers k. If the proposed
conditions hold true, exponent reduces pk=4 ek.r.p=m.p/i2 requiring that k is a
multiple of 4. The number of the non-trivial generating elements of super-
symplectic algebra in the monomial creating physical state would be a multiple
of 4. These monomials would have real part of conformal weight 1. Conformal
confinement suggests that these monomials are products of pairs of generators
for which imaginary parts cancel.
2. Quasicrystal property might have an application to TGD. The functions of light-
like radial coordinate appearing in the generators of super-symplectic algebra
could be of form rs , s zero of zeta or rather, its imaginary part. The eigenstate
property with respect to the radial scaling rd=dr is natural by radial conformal
invariance.
The idea that arithmetic QFT assignable to infinite primes is behind the
scenes in turn suggests light-like momenta assignable to the radial coordinate
have energies with the dual spectrum log.pn /. This is also suggested by the
interpretation of as square root of thermodynamical partition function for boson
gas with momentum log.p/ and analogous interpretation of F .
The two spectra would be associated with radial scalings and with light-like
translations of light-cone boundary respecting the direction and light-likeness
of the light-like radial vector. log.pn / spectrum would be associated with light-
like momenta whereas p-adic mass scales would characterize states with thermal
mass. Note that generalization of p-adic length scale hypothesis raises the scales
defined by pn to a special physical position: this might relate to ideal structure of
adeles.
3. Finite measurement resolution suggests that the approximations of Fourier trans-
forms over the distribution of zeros taking into account only a finite number of
zeros might have a physical meaning. This might provide additional understand
about the origins of generalized p-adic length scale hypothesis stating that primes
p ' pk1 , p1 small prime—say Mersenne primes—have a special physical role.
References
Mathematics
1. Baez, J.: Quasicrystals and the Riemann Hypothesis. The n-Category Cafe. Available at:
https://golem.ph.utexas.edu/category/2013/06/quasicrystals_and_the_riemann.html (2013)
2. Freed, D.S.: The Geometry of Loop Groups (1985)
3. Hitchin, N.: Kählerian twistor spaces. Proc. Lond. Math. Soc. 8(43), 133–151 (1981). Available
at: http://tinyurl.com/pb8zpqo
4. Reid, M.: McKay correspondence. Available at: http://arxiv.org/abs/alg-geom/9702016
316 M. Pitkänen
Physics
5. Arkani-Hamed, N., et al.: Scattering amplitudes and the positive Grassmannian. Available at:
http://arxiv.org/pdf/1212.5605v1.pdf
6. Golovko, V.A.: Why does superfluid helium leak out of an open container? Available at: http://
arxiv.org/pdf/1103.0517.pdf (2012)
7. Huang, Y.-T., Elvang, H.: Scattering amplitudes. Available at: http://arxiv.org/pdf/1308.
1697v1.pdf (2013)
8. Klebanov, I.R.: TASI Lectures: Introduction to the AdS/CFT Correspondence. Available at:
http://arxiv.org/abs/hep-th/0009139 (2000)
9. Lamb Shift: Available at: http://en.wikipedia.org/wiki/Lamb_shift.
10. Matos de, C.J., Tajmar, M.: Local Photon and Graviton Mass and Its Consequences. Available
at: http://arxiv.org/abs/gr-gc0603032 (2006)
11. Nottale, L., Da Rocha, D.: Gravitational Structure Formation in Scale Relativity. Available at:
http://arxiv.org/abs/astro-ph/0310036 (2003)
12. Parisi, G.: Field Theory, Disorder and Simulations. World Scientific, Singapore (1992)
13. Penrose, R.: The central programme of twistor theory. Chaos Solitons Fractals 10, 581–611
(1999)
14. Tajmar, M., et al.: Experimental Detection of Gravimagnetic London Moment. Available at:
http://arxiv.org/abs/gr-gc0603033 (2006)
15. England, J., Perunov, N., Marsland, R.: Statistical Physics of Adaptation. Available at: http://
arxiv.org/pdf/1412.1875v1.pdf (2014)
16. Fiaxat, J.D.: A hypothesis on the rhythm of becoming. World Futur. 36, 31–36 (1993)
17. Fiaxat, J.D.: The hidden rhythm of evolution. Available at: http://byebyedarwin.blogspot.fi/p/
english-version_01.html (2014)
18. Khrennikov, A.Y.: Classical and quantum mechanics on information spaces with applications
to cognitive, psychological, social, and anomalous phenomena. Found. Phys. 29, 1065–2098
(1999)
19. Lavallee, F.C., Persinger, M.A.: Theoretical and experimental evidence of macroscopic
entanglement between human brain activity and photon emissions: implications for quantum
consciousness and future applications. J. Conscious. Explor. Res. 1(7), 785–807 (2010)
24. Pitkänen, M.: About the new physics behind qualia. In: Quantum Hardware of Living Matter.
In online book. Available at: http://tgdtheory.fi/public_html/bioware/bioware.html#newphys
(2006)
25. Pitkänen, M.: Basic extremals of Kähler action. In: Physics in Many-Sheeted Space-Time. In
online book. Available at: http://tgdtheory.fi/public_html/tgdclass/tgdclass.html#class (2006)
26. Pitkänen, M.: Conscious information and intelligence. In: TGD Inspired Theory of Con-
sciousness. In online book. Available at: http://tgdtheory.fi/public_html/tgdconsc/tgdconsc.
html#intsysc (2006)
27. Pitkänen, M.: Construction of elementary particle vacuum functionals. In: p-Adic Physics. In
online book. Available at: http://tgdtheory.fi/public_html/padphys/padphys.html#elvafu (2006)
28. Pitkänen, M.: Construction of WCW Kähler geometry from symmetry principles. In: Quantum
Physics as Infinite-Dimensional Geometry. In online book. Available at: http://tgdtheory.fi/
public_html/tgdgeom/tgdgeom.html#compl1 (2006)
29. Pitkänen, M.: Cosmic strings. In: Physics in Many-Sheeted Space-Time. In online book.
Available at: http://tgdtheory.fi/public_html/tgdclass/tgdclass.html#cstrings (2006)
30. Pitkänen, M.: Does Riemann zeta code for generic coupling constant evolution? In:
Towards M-Matrix. In online book. Available at: http://tgdtheory.fi/public_html/tgdquantum/
tgdquantum.html#fermizeta (2006)
31. Pitkänen, M.: Does TGD predict the spectrum of Planck constants? In: Hyper-Finite
Factors and Dark Matter Hierarchy. In online book. Available at: http://tgdtheory.fi/public_
html/neuplanck/neuplanck.html#Planck (2006)
32. Pitkänen, M.: Fusion of p-adic and real variants of quantum TGD to a more general theory. In:
TGD as a Generalized Number Theory. In online book. Available at: http://tgdtheory.fi/public_
html/tgdnumber/tgdnumber.html#mblocks (2006)
33. Pitkänen, M.: Identification of the WCW Kähler function. In: Quantum Physics as Infinite-
Dimensional Geometry. In online book. Available at: http://tgdtheory.fi/public_html/tgdgeom/
tgdgeom.html#kahler (2006)
34. Pitkänen, M.: Massless states and particle massivation. In: p-Adic Physics. In online book.
Available at: http://tgdtheory.fi/public_html/padphys/padphys.html#mless (2006)
35. Pitkänen, M.: Negentropy maximization principle. In: TGD Inspired Theory of Consciousness.
In online book. Available at: http://tgdtheory.fi/public_html/tgdconsc/tgdconsc.html#nmpc
(2006)
36. Pitkänen, M.: New particle physics predicted by TGD: part I. In: p-Adic Physics. In online
book. Available at: http://tgdtheory.fi/public_html/padphys/padphys.html#mass4 (2006)
37. Pitkänen, M.: New particle physics predicted by TGD: part II. In: p-Adic Physics. In online
book. Available at: http://tgdtheory.fi/public_html/padphys/padphys.html#mass5 (2006)
38. Pitkänen, M.: Overall view about TGD from particle physics perspective. In: p-Adic
Physics. In online book. Available at: http://tgdtheory.fi/public_html/padphys/padphys.html#
TGDoverall (2006)
39. Pitkänen, M.: p-Adic numbers and generalization of number concept. In: TGD as a
Generalized Number Theory. In online book. Available at: http://tgdtheory.fi/public_html/
tgdnumber/tgdnumber.html#padmat (2006)
40. Pitkänen, M.: p-Adic physics as physics of cognition and intention. In: TGD Inspired The-
ory of Consciousness. In online book. Available at: http://tgdtheory.fi/public_html/tgdconsc/
tgdconsc.html#cognic (2006)
41. Pitkänen, M.: Quantum antenna hypothesis. In: Quantum Hardware of Living Matter. In online
book. Available at: http://tgdtheory.fi/public_html/bioware/bioware.html#tubuc (2006)
42. Pitkänen, M.: Quantum astrophysics. In: Physics in Many-Sheeted Space-Time. In online
book. Available at: http://tgdtheory.fi/public_html/tgdclass/tgdclass.html#qastro (2006)
43. Pitkänen, M.: Quantum model for hearing. In: TGD and EEG. In online book. Available at:
http://tgdtheory.fi/public_html/tgdeeg/tgdeeg.html#hearing (2006)
44. Pitkänen, M.: TGD and astrophysics. In: Physics in Many-Sheeted Space-Time. In online
book. Available at: http://tgdtheory.fi/public_html/tgdclass/tgdclass.html#astro (2006)
318 M. Pitkänen
45. Pitkänen, M.: TGD and cosmology. In: Physics in Many-Sheeted Space-Time. In online book.
Available at: http://tgdtheory.fi/public_html/tgdclass/tgdclass.html#cosmo (2006)
46. Pitkänen, M.: TGD as a generalized number theory: infinite primes. In: TGD as a
Generalized Number Theory. In online book. Available at: http://tgdtheory.fi/public_html/
tgdnumber/tgdnumber.html#visionc (2006)
47. Pitkänen, M.: TGD as a generalized number theory: p-adicization program. In: TGD as
a Generalized Number Theory. In online book. Available at: http://tgdtheory.fi/public_html/
tgdnumber/tgdnumber.html#visiona (2006)
48. Pitkänen, M.: TGD as a generalized number theory: quaternions, octonions, and their hyper
counterparts. In: TGD as a Generalized Number Theory. In online book. Available at: http://
tgdtheory.fi/public_html/tgdnumber/tgdnumber.html#visionb (2006)
49. Pitkänen, M.: The classical part of the twistor story. In: Towards M-Matrix. In online book.
Available at: http://tgdtheory.fi/public_html/tgdquantum/tgdquantum.html#twistorstory (2006)
50. Pitkänen, M.: The relationship between TGD and GRT. In: Physics in Many-Sheeted
Space-Time. In online book. Available at: http://tgdtheory.fi/public_html/tgdclass/tgdclass.
html#tgdgrt (2006)
51. Pitkänen, M.: Time and consciousness. In: TGD Inspired Theory of Consciousness. In online
book. Available at: http://tgdtheory.fi/public_html/tgdconsc/tgdconsc.html#timesc (2006)
52. Pitkänen, M.: Was von Neumann right after all? In: Hyper-Finite Factors and Dark Matter
Hierarchy. In online book. Available at: http://tgdtheory.fi/public_html/neuplanck/neuplanck.
html#vNeumann (2006)
53. Pitkänen, M.: WCW spinor structure. In: Quantum Physics as Infinite-Dimensional Geome-
try. In online book. Available at: http://tgdtheory.fi/public_html/tgdgeom/tgdgeom.html#cspin
(2006)
54. Pitkänen, M.: Construction of quantum theory: more about matrices. In: Towards M-
Matrix. In online book. Available at: http://tgdtheory.fi/public_html/tgdquantum/tgdquantum.
html#UandM (2012)
55. Pitkänen, M.: Quantum mind, magnetic body, and biological body. In: TGD Based View About
Living Matter and Remote Mental Interactions. In online book. Available at: http://tgdtheory.
fi/public_html/tgdlian/tgdlian.html#lianPB (2012)
56. Pitkänen, M.: SUSY in TGD Universe. In: p-Adic Physics. In online book. Available at: http://
tgdtheory.fi/public_html/padphys/padphys.html#susychap (2012)
57. Pitkänen, M.: TGD based view about classical fields in relation to consciousness theory and
quantum biology. In: TGD and EEG. In online book. Available at: http://tgdtheory.fi/public_
html/tgdeeg/tgdeeg.html#maxtgdc (2012)
58. Pitkänen, M.: Are dark photons behind biophotons. In: TGD Based View About Living Matter
and Remote Mental Interactions. In online book. Available at: http://tgdtheory.fi/public_html/
tgdlian/tgdlian.html#biophotonslian (2013)
59. Pitkänen, M.: Comments on the recent experiments by the group of Michael Persinger. In:
TGD Based View About Living Matter and Remote Mental Interactions. In online book.
Available at: http://tgdtheory.fi/public_html/tgdlian/tgdlian.html#persconsc (2013)
60. Pitkänen, M.: What p-adic icosahedron could mean? And what about p-adic manifold? In:
TGD as a Generalized Number Theory. In online book. Available at: http://tgdtheory.fi/public_
html/tgdnumber/tgdnumber.html#picosahedron (2013)
61. Pitkänen, M.: Why TGD and what TGD is? In: Topological Geometrodynamics: An Overview.
In online book. Available at: http://tgdtheory.fi/public_html/tgdview/tgdview.html#WhyTGD
(2013)
62. Pitkänen, M.: Criticality and dark matter. In: Hyper-Finite Factors and Dark Matter
Hierarchy. In online book. Available at: http://tgdtheory.fi/public_html/neuplanck/neuplanck.
html#qcritdark (2014)
63. Pitkänen, M.: More about TGD inspired cosmology. In: Physics in Many-Sheeted Space-
Time. In online book. Available at: http://tgdtheory.fi/public_html/tgdclass/tgdclass.html#
cosmomore (2014)
Philosophy of Adelic Physics 319
64. Pitkänen, M.: Quantum gravity, dark matter, and prebiotic evolution. In: Genes and
Memes. In online book. Available at: http://tgdtheory.fi/public_html/genememe/genememe.
html#hgrprebio (2014)
65. Pitkänen, M.: Recent view about Kähler geometry and spin structure of WCW . In: Quantum
Physics as Infinite-Dimensional Geometry. In online book. Available at: http://tgdtheory.fi/
public_html/tgdgeom/tgdgeom.html#wcwnew (2014)
66. Pitkänen, M.: Unified number theoretical vision. In: TGD as a Generalized Number
Theory. In online book. Available at: http://tgdtheory.fi/public_html/tgdnumber/tgdnumber.
html#numbervision (2014)
67. Pitkänen, M.: About preferred extremals of Kähler action. In: Physics in Many-Sheeted Space-
Time. In online book. Available at: http://tgdtheory.fi/public_html/tgdclass/tgdclass.html#prext
(2015)
68. Pitkänen, M.: Can One Apply Occam’s Razor as a General Purpose Debunking Argument
to TGD? In online book.Available at: http://tgdtheory.fi/public_html/tgdquantum/tgdquantum.
html#simplicity (2016)
69. Pitkänen, M.: From Principles to Diagrams. In online book.Available at: http://tgdtheory.fi/
public_html/tgdquantum/tgdquantum.html#diagrams (2016)
70. Pitkänen, M.: How the Hierarchy of Planck Constants Might Relate to the Almost Vacuum
Degeneracy for Twistor Lift of TGD? Available at: http://tgdtheory.fi/public_html/tgdquantum/
tgdquantum.html#hgrtwistor (2016)
Bourama Toni
B. Toni ()
Department of Mathematics & Economics, Virginia State University, 1 Hayden Drive, Petersburg,
VA 23806, USA
e-mail: [email protected]
1 Overview
1
Game theory is the theme of the 2001 Best Picture and Best Director, Beautiful Mind, featuring
Russell Crowe playing John Nash, the nerdy Princeton student who’s life and dating experience led
him to the Nash Equilibrium solution concept that ultimately ended in a 1994 Noble Price Award
in Economics. The underlying ideas of game theory transpired throughout history from the Bible
Talmud, the works of Descartes and Sun Tzu to the writings of Darwin. A very hot topic today,
game theory is used for Stock Markets, Portfolios, Military War Games, Bridge games, Hunting
Party, Marketing, and Politics.
2
Vilfredo Pareto, Italian mathematician, defines the efficiency as “A situation where there is no
way to rearrange things to make at least one person better off without making anyone else worse
off.”
Nash Limit Cycles: A Game-Theoretical Analysis of Cultural Integration in America 323
conjectured scenario for stability and progress for the society. Section 5 concludes
with perspectives for future research, in particular to extend the mathematical
analysis into the much richer p-adic and non-Archimedean simplex to fully account
for all the hierarchical “nuances” in human preferences and behaviors.
Our premise is that culture3 consists of preference distribution along with equilib-
rium behavior distribution, but also individuals in any given culture are multidi-
mensional. Immigration has been a major driving and defining factor of American
culture. The behavior and choices of immigrants are influenced by many factors,
e.g., home country traditions, in interaction with other American, while the prefer-
ences and equilibrium behaviors are shaped by socialization and self-persuasion and
vary continuously, impacted by cross-cultural contacts, leading as a result, to some
type of cultural hybridization. Discrepancies between the ideal and actual choices
increase with time and fuel discontent. One would like to make choices in agreement
with personal preferences, but the gains and payoffs are dependent upon the degree
of choice coordination. The interactions, while seemingly random, are enhanced by
factors such as common language, shared symbols and meanings, communication
rules, down to culinary habits, family size.
America, as a social entity, has been experiencing rapidly changing demograph-
ics, with varying cultural norms and values. An American culture distinctly emerged
as a compromise, a modus vivendi, and modus operandi out of multiple early
immigrant cultures, behaviors, and preferences. These cross-cultural interactions
generate a single hybrid culture, with its own peculiar language and rules of laws.
The basic beliefs, assumptions, and values by which most American live could
be comprehensively described by some ten core values deeply ingrained in most
American [15].
1. Individualism and Privacy. .A1 / W Each person is seen as unique, special, and
independent. Such belief put a premium on individual initiative, expression,
orientation, and values privacy. Other cultures emphasize group orientation,
conformity as a way to societal harmony. American believe they control their
own destiny. Other cultures’ focus is on extended family, and its corollary of
loyalty and responsibility to family, with age given status and respect.
2. Equality/Egalitarianism. .A2 / W Each person expects to be treat equally, with
a minimum sense of hierarchy, leading to a directness in relations with others,
informal sense of self and space. One by-product is to allow the challenging
of authority as opposed to respect for authority and social order at all cost
3
Some view culture as a vehicle for providing generally accepted solutions to problems. Others
define it as part of the knowledge owned by a substantial segment of a group but not necessarily
by the general population.
326 B. Toni
prevalent in other cultures. Gender equity rather than different roles for men and
women. In other countries people seem to draw a sense of security and certainty
from Class and Authority, Rank and Status, considering it reassuring to know,
from birth, who you are and where you fit in the complex social system.
3. Materialism. .A3 / W Each person enjoys the right to be “well off” and to
“pursuit material happiness.” People are often judged by their possessions. An
undesirable by-product is the well-documented American Greed. It is a higher
priority to obtain, maintain, and protect material objects rather than developing
and enjoying interpersonal relationships, for instance.
4. Science and Technology. .A4 / W This value is seen as the driving force
for changes and the primary source of goods. Scientific and technological
approaches are highly valued, and lead to a problem-solving focus, with a
mental process and learning style that are linear, logical, and sequential.
5. Progress and Change. .A5 / W This leads to a great national optimism and
the so-called “Manifest Destiny”: nothing is impossible and greatness is ours,
as opposed to just accepting life’s difficulties. Other societies value stability,
tradition, continuity, and rich and ancient heritage, seeing change as disruptive
and potentially destructive.
6. Work and Leisure. .A6 / W This refers to a strong work ethic, and work for its
intrinsic values and as the basis of recognition and power. Idleness is seen as a
threat to society while leisure should be a reward for hard work and individual
achievement. In other cultures, work is seen as a necessity of life, and rewards
are based on seniority and relationships.
7. Competition. .A7 / W That is, the “Be always First” mentality, encouraging an
aggressive and competitive nature. It has led to Free Enterprise as an economic
system, in the belief that competition fosters rapid progress. Cooperation is
instead promoted in other cultures.
8. Mobility. .A8 / W This refers to a vertical social, economic, and physical
mobility, in a society with people on the move to better self.
9. Volunteerism. .A9 / W Philanthropy is highly valued as a personal choice not
a communal expectation, involving associations or denominations rather than
kin-groups as in other cultures.
10. Action and Achievement Oriented. .A10 / W That is, a practical mind-set
with emphasis on getting things done, a focus of function and pragmatism,
and a tendency to be brief and business-like through an explicit and direct
communication style, with emphasis on content and meaning found in the
choice of words. In other cultures the emphasis is on context, meaning is
found around the words, and communication is implicit and indirect. Formal
handshakes rather than hugs and bows! Dress for success rather than as a sign
of position, wealth, prestige, or religious rules.
These core values are perceived sometimes by individuals from other cultural
identities, at least during an initial period, with a negative and derogatory conno-
tation. However, a requirement for a complete cultural integration in America is for
newcomers to be familiarized as quickly and efficient as possible with these values.
Nash Limit Cycles: A Game-Theoretical Analysis of Cultural Integration in America 327
We consider the cultural evolution strategies to be associated with these ten core
values, and define a probability distribution for each strategy Ai ; i D 1; : : : ; 10:
We are interested in determining the conditions for social stability and progress in
providing a mathematical framework to understand the American social dynamics.
Our analysis could also help clarify the challenges of the two most common
social objectives of multiculturalism and social integration. The former, aiming at
preserving the multiplicity of existing cultures, has been consistently set in policies
in countries such as Canada, while the latter appears to be the preference for many
others countries including America and seeks to favor interactions across boundaries
of class, ethnicity, religion, and national origin. Social conflicts (friction and even
violence) result in both cases, in particular when immigrant lifestyles are perceived
to threaten these core American values.
Our approach will help understand how groups differ in their resistance to
cultural integration, as well as the necessity of cultural adaptations/adjustments in
America and the consequences of immigration. Indeed in reference to the ten values,
individuals optimal contributions to a so-called public good in modern economics
are tightly dependent on their interactions with others, and require oftentimes
behavioral adjustments, e.g., speaking one language at home and another at work.
Cultural and social integration is accelerated by the need to interact efficiently with
individuals belonging to other cultures or holding different core values with varied
probabilities. It is believed that an integrated society results in economic efficiency,
increased productivity, and a fair distribution of income. Such a belief partially
justifies Civil Rights Laws and Anti-discrimination Statutes in the United States.
Our work amounts indeed to the study of the dynamics of cultural integration in
America with respect to ten American core values defining who we are as American,
proposing a game-theoretical approach both as a modeling and a design tool. We
first next describe the basics of the theory.
When all players in a game act simultaneously and without knowledge of others’
actions, the game model is called a strategic form game we denote SFG [8, 12, 13].
Definition 3.1. A strategic form game is described by a triplet G D<
P; .Si /i2In ; .ui /i2In >; where In D f1; : : : ; ng; and with
1. P is a finite set of the n players PiD1;:::;n
2. Si is the non-empty
Q set of pure strategies or available actions for player Pi
3. ui W S D Si2P ! R is the utility or payoff function for player Pi
4. The vector s D .s1 ; : : : ; sn / denotes the strategy/ action profile or outcome
328 B. Toni
profitable site, which indicates a Nash equilibrium has been reached: Switching
unilaterally to another site for a duck would result in getting less food. Indeed the
amount of food a duck gets does not depend on its choice but also on others’ choice.
During a transient period, behaving as a typical optimizer most of the ducks rushed
to the most profitable site, for some to realize they could get more food at the least
profitable site, and therefore switched site. After switching a few times the ducks
stick to a given choice. Repeated interactions have led to a Nash Equilibrium in a
game where the entities, the duck, could hardly qualify as rational players. Such a
process has been termed tâtonnement.
The Nash Equilibrium may computed through a so-called Best Response correspon-
dence as follows.
Definition 3.7. For every si 2 Si the best response of player Pi is given
4
First studied by the French mathematician Poincaré and Picard in relation to differential equations,
the general case has been proved by Jacques Hadamard and Jan Brouwer who allegedly derived it
from the observation of motion in a cup of coffee upon stirring to dissolve a lump of sugar.
330 B. Toni
5
The shape of the unit ball depends on the chosen norm in the metric space: it is the usual round
ball with the usual Euclidean norm; but it has “corners” with the taxicab norm (squared shape) and
with max norm (diamond shape) similar to Œ1; 1n :
6
It is said as an anecdote that a puzzled Kakutani once asked an attendee to his talk what is
Kakutani’s fixed point theorem.
Nash Limit Cycles: A Game-Theoretical Analysis of Cultural Integration in America 331
Example 3.14 (Prisoner’s Dilemma [9, 13, 20, 25]). Following the story discussed
by Melcin Dresher, Meriil Flood, and Albert Tucker, two criminal suspects in
separate Police custody are offered a deal: If both testify (strategy D of Defection)
they get a sentence reduction of 1 year; if both do not testify (strategy C of
Cooperation), their sentence is reduced by 3 years for lack of hard evidence. If
one testifies (strategy D) against the other who does not (strategy C), the sentence is
reduced by 5 years. The game has therefore the payoff matrix
0 1
CD
A D @C 3 0 A (3)
D5 1
So the closer the PoA is to 1, the higher the efficiency of the Nash Equilibrium. One
way of improving the efficiency of Nash Equilibrium in a game design is to keep
the Nash equilibrium and transform the game into a game with different structure
such as supermodular game; potential game; repeated game; stochastic game, and
Bayesian game. See more details in [1, 6–8].
332 B. Toni
ˆWXI !X (5)
ˆ.x; 0/ D s; (6)
That is, the states of the system, when the time t evolves in the real semigroup I; are
elements of the metric space X: Here we consider an Archimedean metric with the
triangle inequality, i.e.,
In the case where the space X is endowed with an ultrametric d with a strong or
ultrametric inequality replacing the triangle inequality, i.e.,
7
A semigroup is an algebraic structure endowed with an associative closed binary operation.
Nash Limit Cycles: A Game-Theoretical Analysis of Cultural Integration in America 333
where xP .0/ is the initial velocity of x.t/ with Tx X denoting the tangent space to X at
x: By the fundamental theorem on flows, x.t/ is the unique solution to the first order
dynamical system
xP D X .x.t//; t 2 R: (12)
By a recursive formula the nth order dynamical systems takes the form
x.n/ D X n : (13)
corresponding to a flow on the phase space D [x;disjoint .Tx X/n1 representing all
possible states of the system, with X called the configuration space of the system.
The asymptotic behavior of the first order system is determined by defining the
!.resp:˛/-limit set for every x 2 X as
!.x/ D lim .x/ Dfy 2 Xjy D lim ˆ.x; tn /; for a sequence .tn /n0 R0 with tn ! 1g
! n!1
Note that the omega (alpha) limit set is closed and invariant; for X compact, it is
non-empty, compact, and connected.
Definition 3.17. 1. A point x0 2 X is a rest point or an equilibrium point of the
flow ˆ if ˆ.x0 ; t/ D x0 ; 8t 2 R:
2. Define the orbit mapping or movement through x 2 X as the mapping
4. The point x0 is asymptotically stable if it is stable and 9ı0 > 0; such that
limt!1 ˆ.y; t/ D x; for all y 2 X with d.x; y/ ı0 :
Stability is also investigated using the classic method of Lyapunov. Given an
autonomous system
xP D f .x/ (17)
Definition 3.18. A Lyapunov function for the system is any function V 2 C 1 .X/
such that
P
V.x/ D rV.x/:f .x/ 0 x 2 X; (18)
If in addition
P 0 / D dV .x0 / D 0
V.x
dt (20)
P
V.x/ < 0; x ¤ x0
xP D Ax; x 2 Rn ; (21)
The function
V.x/ D xT Bx (23)
Limit Cycles are isolated periodic orbits, forward or backward limit cycles of
neighboring trajectories; they model self-sustained oscillations in the phase space
of the dynamical system. They appear in an attempt to detect stable cyclic behavior.
The main bifurcation route towards periodicity remains the Hopf Bifurcation, and
for a one-parameter family of continuous-time systems the non-degenerate Hopf
bifurcation is the only generic bifurcation in which a limit cycle emerges and
disappears. See [3, 17]. Given the planar parameter-dependent system
with
.˛/ < 0; for ˛ < 0; .0/ D 0; .˛/ > 0; for ˛ > 0; (26)
we have
Theorem 3.22 ( [17]). Assume the genericity conditions8 hold, i.e.,
1.
@.˛/
Œ ˛D0 ¤ 0; .Transversality/ (27)
@˛
2.
8
Genericity conditions ensure the existence of smooth invertible coordinate transformation depend-
ing smoothly on parameters together with parameter changes and (possibly) time reparametriza-
tions reducing the system to the normal form.
336 B. Toni
The existence of limit cycles can be also detected using the Poincaré–Bendixon
theorem together with the Dulac criterion, based on trajectories trapping regions.
This has been used by Hofbauer and Sigmund for some 3-strategy games such as the
classical game of cyclical competition, Rock-Scissor-Paper. All Hopf bifurcations
were found to be degenerate, i.e., l1 .0/ D 0 [11–14, 23].
4 Evolutionary Games
Evolutionary game theory [2, 12–14, 18, 23, 24, 26] is concerned with strategic
interactions in large populations of players, where changes over time in behavior are
driven by factors such as natural selection, “pursuit of happiness,” and economical
success of the individuals. Maynard Smith [18] in a series of pioneering papers
adapted methods of traditional game theory to the context of biological natural
selection, to explain, for instance, the existence of ritualized animal conflicts.
ˆ1 .x; y/ D xT Ay
(30)
ˆ2 .x; y/ D xT By;
Remark 4.2. The game is symmetric for X D Y and A D BT : The Nash equilibrium
is determined accordingly. If x D y , then the conditions for equilibrium are
equivalent to
Nash Limit Cycles: A Game-Theoretical Analysis of Cultural Integration in America 337
The two players are thus identical, with only symmetric pairs .x ; y / being of
interests [16].
compact and convex spanned by the set of vectors ei of the standard basis
However, our evolution game here is played by the American society as a single
player whose individuals dispose of a finite number of strategies, ten core values,
in their “pursuit of happiness.” Immigrants strive to integrate such a population
with actions and strategies based on these values. The ultimate outcome is the
stability and prosperity of America. We study the evolution dynamics over time in
terms of time-continuous dynamical models. Similar models have been introduced
earlier by Taylor and Jonker [23] as the Replicator Dynamics with application in
biological, genetic, and chemical systems where organisms, genes, and molecules
evolve over time through replication. In [12–14, 23, 26–28] Hofbauer et al. and
Zeeman studied 3-strategy games under the replicator dynamics to conclude on the
occurrence of only “simple” dynamical behaviors such as sinks, sources, centers,
and saddles. Many interesting results were obtained using analytical and numerical
tools from non-linear dynamical system theory with respect to changes in the payoff
and behavioral parameters.
The strategies are given by the ten American core values described above. Let
pi 2 Œ0; 1; i D 1; : : : ; 10 be the probability for the core value Ai to be chosen by
American at any given moment. Therefore the state of population is determined by
the vector of probabilities
338 B. Toni
10
X
p D .p1 ; : : : ; p10 /; pi D 1: (35)
iD1
This forms the space of population states in the form of a 9-simplex9 ; that is
10
X
10 10
D fp D .p1 ; : : : ; p10 / 2 Œ0; 1 R j pi D 1g: (36)
iD1
Remark 4.3. 1. Pure populations states are given by the corners vectors of the
standard Euclidean basis ei D .0; : : : ; 0; 1i ; 0; : : : ; 0/; i D 1; : : : ; 10: The
interpretation is that in such a state all American choose the single core value
Ai with a probability pi giving any other value a zero probability. These states
are also called homogeneous. For instance, American choose to value only
Individualism disregarding the other nine core values. No doubt such a state
would be of concern.
2. Note that the probability si for the core strategic value Ai changes with respect to
payoffs by learning, copying, inheriting, etc. And in turn payoffs are function of
the probabilities yielding a feedback loop dynamic. The difference hi .s/ has been
identified in certain “game dynamics” with a relative increase of the frequency
[23, 24].
3. Strategies with higher payoffs reproduce faster. Consequently individuals have a
tendency to vary the probability assigned to a core value based on some perceived
relative advantage.
4. Subscribing to competing strategic values lead to the emergence of mutant
subgroups, with the by-products of the appearance of a variety of life forms,
beliefs, cultures, languages, practices, or techniques.
5. The standard population is a mixed state of a probability vector p: That is,
each core value has been given a probability pi 2 Œ0; 1 by each American in
interaction with others. The value of the probability pi depends upon personal
preferences and behaviors, and certainly influenced by cultural identities, social
class, upbringing, etc. The resulting behavior is therefore stochastic: playing the
core value Ai with probability pi :
6. In contrast to other types of dynamics such as Replicator, Replicator-Mutator, or
Logit Dynamics, [12, 13] any kind of revision protocol is described by changes
in the values of the probability assigned to each core value, not by switching
of strategy. Successful strategies are represented by “successful individuals” and
could be learned (imitated), possibly inherited.
9
Simplex generalizes the concept of triangle in arbitrary dimension, with an n-simplex being the
convex hull of its (n + 1) vertices.
Nash Limit Cycles: A Game-Theoretical Analysis of Cultural Integration in America 339
defining the game as an evolution matrix game. According to the context, the real
entries of this 10 10 matrix could be assumed to satisfy various properties of
matrices. That is, the matrix A could be symmetric, i.e., A D AT I skew-symmetric,
A D AT I cyclic symmetric (Toeplitz circulant with indices counted cyclically
modulo n); or a banded matrix (sparse with nonzero entries confined to a diagonal
band).
Accordingly we define a payoff or utility function u D .u1 ; : : : ; u10 / W
Œ0; 110 ! R10 ; also called the payoff vector field.
Definition 4.4. 1. Given a population state determined by the probability vector
p D .p1 ; : : : ; p10 / 2 ; the expected payoff of an Ai American is defined as
10
X
ui .p/ D ei ApT D aij pj D .Ap/i : (38)
jD1
3. We denote by
that is, the excess payoff between the individual expected payoff and the average
payoff in the population state actually impacts the frequency and the probability
value of a core value.
Note that the sign of excess payoff hi .p/ for the core value Ai in the population
state p determines its variation in frequency as well as its corresponding probability.
The standard or regular population state p is a mixed state in which each core value
receives a nonzero probability, that is, pi 2 .0; 1/: We denote for a general n the
support of a state p by
Equivalently we have
where again
Remark 4.6 (Interpretation). In the Nash Equilibrium state p the unilateral change
of the probability of a single core value does not lead to a higher payoff. Under the
rationality assumption of the game one would expect such a state to be maintained.
That is not in general the case because individuals do not always behave rationally.
Deviations are expected dictated by changes in preferences, and the stability of the
Nash Equilibrium state p is not guaranteed. We are therefore interested in dynamic
conditions that could ensure the evolutionary stability of that equilibrium as defined
next.
Definition 4.7 (Evolutionary Stability). A Nash Equilibrium state p 2 is
evolutionarily stable if
implies
That is, if the same payoff of the NE state p could be achieved in some other
state p0 ; then this other state cannot be an NE state. Conditions are needed to
characterize dynamically both states, necessary and/or sufficient conditions. First
we note
Proposition 4.8. Let p 2 be an NE state with support supp.p /. Then we get
In an NE state, the individual expected payoff is the same as the average in the state
for the nonzero probabilities making the NE state.
Proof. From the definition of NE, for i 2 supp.p /, and
Such a sequence converges to the fixed point p given by p D f .p /: Along the
same lines as Nash’s original proof, the fixed point p 2 is shown to be a Nash
Equilibrium as defined above. That is,
Theorem 4.10 (Existence of an NE State). Under the above conditions, the
population game admits a Nash Equilibrium state p 2 :
Proof. We here outline the proof as an adaptation of the Nash’s proof by now readily
available in the game theory literature [18–20]. The NE state p is indeed the fixed
point of the above function f whose existence is ensured by the fixed point theorems.
We recall, denoting In D f1; : : : ; ng;
hQ i .p / D 0; 8i D 1; : : : ; n:
Therefore
d.logpi .t// pP i
D (53)
dt pi
determined by the difference between the expected payoff to the core value Ai and
the average payoff to the population state, leading to the time-continuous dynamical
system .A /
pP i .t/
D hi .p/ D ui .p/ uN .p/; (54)
pi
Nash Limit Cycles: A Game-Theoretical Analysis of Cultural Integration in America 343
or equivalently
5. The frequency of a core value in the society as given by the probability increases
when it has above average utility/payoff. Individuals have limited and localized
knowledge of the whole system, according to the distribution of information.
Some core values could become extinct as time goes to infinity. Indeed whenever
a core value Ai is recursively strongly dominated as defined above, it will not
survive the America Evolution equation .A /. That is, for the assigned probability
pi , we have limt!1 pi .t/ D 0: The corresponding core value therefore goes
extinct. This process might explain the steady variation of cultural values and
norms [1, 7, 9, 22].
6. Another outcome is that, if for a core value Ai ; there is no Ai player in the
society at one point in time, then it can never appear in the future. Therefore
the population states given by pi D 1; and pj D 0; for j ¤ i; are fixed points of
the dynamic.
7. Finally stochastic effects are not considered here in our evolution equation; they
can lead to the elimination of core values in subpopulations.
Fundamentally we have
Proposition 4.13. The mean average payoff or utility of a population state
increases along any trajectory of the evolution equation .A /; giving by the equation
n
X
uPN D 2 pi .ui .p/ uN /2 : (56)
iD1
10
A replicator is an entity with the means to make accurate copies of itself. It can be a gene, an
organism, a belief, a technique, a convention, a cultural norm.
344 B. Toni
Therefore
X n
X
uPN D 2 pj aij pP i D 2 pi .ui uN /2 : (58)
iD1
t
u
We analyze the system on the unit 9-simplex subset of R10 ; and the state space
of the vectors of probabilities. It is actually a cubic polynomial dynamic, whose
class has been extensively investigated. We denoted P D int. / the interior of the
simplex given by the set
Remark 4.17. The converse is not true in the Folk Theorem of Evolutionary Game
Theory.
For a boundary rest point pO the difference hi .Op/ D .AOp/i pO AOpT is also an
eigenvalue pO for the Jacobian J.Op/ with an eigenvector transversal to the face
pO i D 0: That entails
Lemma 4.18. A rest point pO for the evolution equation .A / is a Nash Equilibrium
if and only if its transversal eigenvalues are nonpositive.
Consequently one derives the existence of Nash Equilibria for the evolution
dynamics .A /: That is,
Theorem 4.19. Every population game or subgame has at least one Nash Equilib-
rium
Following [13] consider indeed the perturbation A" of the evolution equation
.A / following (Hofbauer)
Remark 4.20 (Interpretation). For the evolution of America with respect to the ten
core values, there is always at least one Nash Equilibrium, Pareto efficient or not. It
is therefore important to study the conditions of its stability and efficiency. Moreover
the American society been stratified according to communities preferences and
behaviors there are several communities subgames reflected in cultural differences.
These subgames are determined by the number nc of core values receiving nonzero
probabilities. For instance, a community might settle on the three core values of
Individualism, Freedom, and Mobility which receive a nonzero probability while
giving a zero probability to the remaining core values. The subgame played by
such a community has at least a Nash Equilibrium. It is therefore interesting to
analyze the relationship between the local community Nash Equilibrium NEc and
the National Nash Equilibrium NEA :
We are therefore interesting in the overall dynamics of the national population
game for the entire American society as well as in the dynamics of the community
subgame as it relates to the overall evolution of America. This indeed amounts to
uncover all possible dynamics on a 9-simplex embedded into the ten-dimensional
Euclidean/Archimedean11 metric space R10 : Such a metric space has its own
intrinsic limitations to handle efficiently the inherent complexity of the America
social evolution. This prompts the need and search of a better and richer space,
possibly a non-Archimedean space such as the p-adic spaces and their extension to
Berkovich spaces.
Another important question is the following: These ten American core values
are currently present in the America society ensuring the status of the country as
a powerful and rich society. Are these values permanent and resistant to shocks of
any nature and size, random or otherwise? It amounts to the notion of permanence
for the replicator dynamics which we adapt to our context preferring the term self-
sustained.
Definition 4.21. The evolution equation .A / is self-sustained if 9 a compact set
K int. / such that 8x 2 int. / 9 a real time T such that p.t/ 2 K 8t > T:
In other words all the core values ultimately probabilistically settle in a compact set
in the interior of the 9-simplex where all the probabilities are nonzero; they become
in a sense the “laws of the land” or ingrained social norms further defining what is
meant to be an American. Following [13, 23] we have
Theorem 4.22. If the evolution equation .A / is self-sustained, then it has a unique
P which is therefore the unique national Nash Equilibrium
rest p in the interior
NEA .
11
Archimedes of Syracuse is an ancient Greek geometer and physicist. An algebraic structure is
Archimedean when, given any two nonzero elements, neither is infinitesimal with respect to the
other. That is, for x and y positive elements for a linearly ordered group, x is infinitesimal with
respect to y if 8n 2 N; nx D x C C x < y:
Nash Limit Cycles: A Game-Theoretical Analysis of Cultural Integration in America 347
Moreover along each interior orbit p.t/ the time averages converge to p
Z T
1
aN i WD pi .t/dt ! pi ; (65)
T 0
as T ! 1; and i D 1; : : : ; n:
The system is said to be ergodic. Consequently
Remark 4.23. If an interior orbit p.t/ has a boundary !-limit point the time average
need not converge. And every orbit converges to the boundary @ in the absence of
an interior rest point.
Consequently we also have
Theorem 4.24. Assume that 9 an interior point p such that
satisfies
P / > 0:
V.p (68)
Immigration has always been a driving force for the American cultural dynamics
generating a diversity of well-defined cultural identities, resulting sometimes in
cultural enclaves in contrast to the cultural integration efforts, e.g., New York,
Chinatown, or the many Little Italys.
which can also be rewritten under the invariance modulo addition of constants to
column entries
yielding
1. There is a unique NE and it is located in the interior. It has been proved in [26, 27]
that for det.A/ > 0 or equivalently p ApT > 0; p is globally asymptotically
stable.
2. For det.A/ D 0 all orbits are interior closed centered at p : That is the classic
equilibrium of center type.
3. For det.A/ < 0 all interior orbits converge to the boundary @ : That is, the !-
limit set of an interior point p 2 int. / is the heteroclinic cycle of the three
corners saddle points ei :
Remark 4.25. Zeeman has classified all possible phase portraits of the n D 3
evolution dynamics to 33 generic phase portraits (up to flow reversal), proving as
well the absence of isolated periodic orbits, i.e., no limit cycles [26–28]. One could
interpret this as follows: in the subpopulation selecting three core values, there is no
self-sustained oscillations in the community evolution.
There exists the possibility of a continua of periodic orbits evolving into many
coexisting limit cycles. Indeed Hofbauer proved in [13] that the n-dimensional
Lotka–Volterra equation admits stable limit cycles if and only if n 3:
population state features nonzero probabilities. Social stability is thus ensured and
the core values remain ingrained in the social fabric for the greater good of the
American society. This process generates the national Nash Limit Cycle, semi-
stable and connecting the boundary pure population state equilibria described by the
nine corners of the 9-simplex. It accounts for the sustained oscillations in decision-
making. Such a scenario is represented by Fig. 2.
The national equilibrium NEA is asymptotically stable (ESS) and is the !-limit
point of all trajectories inside the simplex. Of course one may assume circumstances
in which the NEA is unstable becoming the ˛-limit point of trajectories converging
to the boundary. This amounts to culturally uncertain times, with the potential of
generating attractive local community equilibria NEc :
Fig. 8 Improved
Conjectured Game Scenario:
Asymptotically Stable NEA
and semi-stable
outside-repulsive and
inside-attractive Nash Limit
Cycle around unstable NEc W
Transient oscillatory period
around community cultural
preferences and behaviors for
cultural identities adjustment
to the American ten core
values with ultimately most
converging asymptotically to
the national Nash
Equilibrium NEA
The scenario could be greatly improved into the more realistic and conducive for
cultural integration and assimilation of diverse cultural identities into the American
social fabric. See Fig. 8.
We also note the existence of what we call Nash Isochrons to describe these
groups of individuals associated with trajectories evolving with the same phase as
the Nash Limit Cycles.
The challenge is twofold: first a mathematical framework in terms of designing
a game with these desirable dynamical features. Second a social and cultural design
through possibly social laws and incentives to practically realize such a scenario.
Nash Limit Cycles: A Game-Theoretical Analysis of Cultural Integration in America 355
5 Concluding Remarks
Game theory, a modeling tool, could also be seen as a design tool, in particular in
the context of our study. Policies could help design admissible utility or payoffs in
the continuous interactions of the individuals so that the resulting game or subgame
possesses the desirable properties to enforce and sustain the evolution of the ten core
values. Adaptation rules could also be designed to lead to the desirable nation-wide
behavior. The Nash Limit Cycles around the local Nash Equilibria should be all
unstable surrounding asymptotically stable local equilibria. Trajectories outside the
narrow basin of attraction converge to the national Nash Equilibrium. Individuals
in a given community hold a given set of preferences and behaviors but subscribe
positively to the national set of core values. Of course these preferences mostly
driven by behavioral compromises produce inter and intra-personal stresses. Most
individuals maintain two types of equilibrium behavior, one for their communities
where there are expected to fit in, and the other for the greater society in which
they do not want to experience their original cultural lifestyles being negatively
stigmatized. It is expected that such a process of socialization could be distorted
whenever publicly expressed preferences with respect to the ten American core
values come at odd with privately held preferences from one’s cultural background.
However through these cross-cultural interactions, an American culture emerges
hybrid in its components. (See also [1, 4, 9, 21, 22].)
We have proposed a dynamic theoretical framework based on individual choice
to understand and predict the evolution of America. We intend to uncover the full
spectrum of dynamical possibilities in a 9-simplex, in particular for dimensions
4 n 10: The results could be extended to other societies holding less than
ten core values. Future work will also involve a type of revision protocol for the
core values. Though our evolution equation appears replicator-like dynamics in
biological context, one could also design an evolution game with different dynamics
such as best reply-like dynamics, the logit-like dynamics, or Brown–Nash–von
Neumann-like dynamics. See more details in [8, 12–14, 23, 24, 26]. Note that in
our model we recognize neither replication nor mutation nor “switching” of values.
The dynamical possibilities are driven only by the variation of the probabilities each
individual assigns to the core values in their random interactions with others.
Now in order to account rigorously for all the “nuances” in decisions and
selections of the core values, such as the distinction between negligible and zero
probability one should consider p-adic probability. Individuals, recent immigrants
or otherwise, do not actually assign zero probability, rather negligible probability.
Moreover the selection of these ten core values presumes some hierarchy structure
among these values, best described in the non-Archimedean/p-adic context.
356 B. Toni
References
1. Axelrod, R.: The Evolution of Cooperation. Basic Books, New York (1984)
2. Balkenborg, D., Schlag, K.: Evolutionarily stable sets. Int. J. Game Theory 29, 571–595 (2000)
3. Benaim, M., Hirsch, M.W.: Mixed equilibria and dynamical systems arising from repeated
games. Games Econ. Behav. 29, 36–72 (1999)
4. Bisin, A., Verdier, T.: The economics of cultural transmission and the dynamics of preferences.
J. Econ. Theory 97, 298–319 (2001)
5. Bomze, I.M.: Lotka-Volterra equation and replicator dynamics: a two-dimensional classifica-
tion. Biol. Cybern. 48, 201–211 (1983)
6. Farell, J., Ware, R.: Evolutionary stability in the repeated prisoner’s dilemma. Theor. Popul.
Biol. 36, 161–166 (1989)
7. Fisher, R.A.: On the dominance ratio. Proc. R. Soc. Edinb. 42, 321–341 (1922)
8. Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge (1991)
9. Gilboa, I., Matsui, A.: Social stability and equilibrium. Econometrica 59, 859–867 (1991)
10. Harper, D.G.: Competitive foraging in mallards: “Ideal free” ducks. Anim. Behav. 30(2),
575–584 (1982)
11. Hofbauer, J.: On the occurrence of limit cycles in the Lotka-Volterra differential equation.
J. Nonlinear Anal. 5, 1003–1007 (1981)
12. Hofbauer, J., Sigmund, K.: Evolutionary Games and Replicator Dynamics. Cambridge Univer-
sity Press, Cambridge (1998)
13. Hofbauer, J., Sigmund, K.: Evolutionary game dynamics. Bull. Am. Math. Soc. 40, 479–519
(2003)
14. Hofbauer, J., Schuster, P., Sigmund, K.: A note on evolutionary stable strategies and game
dynamics. J. Theor. Biol. 81, 609–612 (1979)
15. IBR: American Ten Core Values. https://www.andrews.edu/~tidwell/bsad560/USValues.html
16. Krabs, W., Pickl, S.: Dynamical Systems, Stability, Controllability and Chaotic Behavior.
Springer, Berlin (2010)
17. Kuznetsov, Y.: Elements of Applied Bifurcation Theory. Springer, Berlin (1998)
18. Maynard Smith, J.: Evolution and the Theory of Games. Cambridge University Press,
Cambridge (1982)
19. Nash, J.: Equilibrium points in n-person games. Proc. Natl. Acad. Sci. U. S. A. 36, 48–49
(1950)
20. Nash, J.: Non-cooperative games. Ann. Math. 54, 287–295 (1951)
21. Nowak, M.A.: Evolutionary Dynamics. Harvard University Press, Cambridge (2006)
22. Sandholm, W.H.: Preference evolution, two-speed dynamics, and rapid social change. Rev.
Econ. Dyn. 4, 637–679 (2001)
23. Schuster, P., Sigmund, K.: Replicator dynamics. J. Theor. Biol. 100, 533–538 (1983)
24. Taylor, P.D., Jonker, L.B.: Evolutionary stable strategies and game dynamics. Math. Biosci. 40,
145–156 (1978)
25. von Neumann, J., Morgenstern, O.: Theory of Games and Economic Behaviour. Princeton
University Press, Princeton (1947)
26. Weibull, J.: Evolutionary Game Theory. MIT Press, Cambridge (1995)
27. Zeeman, E.: Population dynamics from game theory. In: Global Theory of Dynamical Systems.
Lecture Notes in Mathematics, vol. 819. Springer, New York (1980)
28. Zeeman, E.: Dynamics of the evolution of animal conflicts. J. Theor. Biol. 89, 248–270 (1981)
Index
A E
Abelian group, 19, 34–36, 39, 43, 48, 78, 83, Equational variety, 96, 99, 101, 108
85, 86, 100, 110, 112, 274 Equilateral triangle, 66, 69–72
Adelic physics, 241–315 Evolution matrix game, 337–347
Algebraic curve, 97, 99, 101, 103, 104,
108–111, 116, 120, 122
American core values, 324, 327, 337, 346, 348, F
350, 352 Flex, 2, 19, 21, 22, 28, 29, 34, 37, 38, 49,
54, 55, 57–59, 64, 65, 68, 70, 75–80,
82–88, 96
B
Barriers options, 222, 223, 232, 234–236
G
Game theory, 321–355
C Groupoid, 2, 76, 83
Cannabinoids, 125, 126, 128–130, 132, 134
Clustering, 145–148, 150–153, 271, 339
Clustering algorithm, 144, 146–147, 150, 152 H
Cognitive function, 133 Hypercommutative, 3, 69, 95–104, 107–122
Conic, 2, 3, 6, 8, 9, 11, 18, 39, 40, 50, 51, Hypercommutative groupoid, 49, 54, 85–87,
61, 97–98, 104, 108–109, 114, 116, 89
122
Convection in porous media, 190
Cubic curve, 2, 3, 6, 8, 10, 20, 21, 23, 25–27, I
29, 31, 34, 36, 39, 46, 47, 49, 50, Image analysis, 152, 163–164
52–55, 57–61, 63–70, 72–84, 86, 92, Image segmentation, 143–153, 323
93, 96–99, 101, 108–116 Imaging, 126–128, 157, 171
Culture integration, 321–355 Immune function, 125, 128, 129, 132, 134
Cytokine, 128–130 Intersections of algebraic curves, 108, 111,
120, 122
Invariant expressions, 95–104, 107–122
D Invariant measures, 189–218
Domain decomposition, 223, 225–229, 236 Inversion, 12, 18, 109, 110, 112, 115, 116, 229