SlideShare una empresa de Scribd logo
1 de 35
Descargar para leer sin conexión
Lattices, sphere packings, spherical codes and
             energy minimization


                Abhinav Kumar

                     MIT


               November 10, 2009
Sphere packings



  Definition
  A sphere packing in Rn is a collection of spheres/balls of equal size
  which do not overlap (except for touching). The density of a sphere
  packing is the volume fraction of space occupied by the balls.

                 ~       ~       ~
                     ~       ~
                 ~       ~       ~
                     ~       ~
                 ~       ~       ~
Lattices



  Definition
  A lattice Λ in Rn is a discrete subgroup of rank n, i.e. generated
  by n linearly independent vectors of Rn .

  Examples: integer lattice Zn , checkerboard lattice Dn , simplex
  lattice An , special root lattices E6 , E7 , E8 , Leech lattice Λ24 , and so
  on.
  Associated sphere packing: if m(Λ) is the length of a smallest
  non-zero vector of Λ, then we can put balls of radius m(Λ)/2
  around each point of Λ so that they don’t overlap.
Spherical codes



  A spherical code C on S n−1 is a finite subset of the sphere.
  Example: The kissing configuration of a lattice Λ is the set of
  minimal non-zero vectors of Λ, rescaled to the unit sphere.
  The minimal angle θ(C) of the code is the smallest radial angle
  between distinct elements of C.


                     cos(θ(C)) =     max        x, y .
                                   x,y ∈C,x=y
Sphere packing problem


  Problem: Find a/the densest sphere packing(s) in R n .
  In dimension 1, we can achieve density 1 by laying intervals end to
  end.
  In dimension 2, the best possible is by using the hexagonal lattice.
  [Fejes T´th 1940]
          o
Sphere packing problem II

  In dimension 3, the best possible way is to stack layers of the
  solution in 2 dimensions. This is Kepler’s conjecture, now a
  theorem of Hales.
mmmm
m
mmm
There are infinitely (in fact, uncountably) many ways of doing this!
  These are the Barlow packings.
  In higher dimensions, we have some guesses for the densest sphere
  packing. But no proofs yet.
Lattices packing



  The packing problem for lattices asks for the densest lattice(s) in
  Rn for every n. This is equivalent to the determination of the
  Hermite constant γn , which arises in the geometry of numbers.
  The known answers are:

         n    1    2    3     4    5     6    7    8      24
         Λ    A1   A2   A3    D4   D5    E6   E7   E8    Leech

  In low dimensions, lattices provide good candidates for the densest
  sphere packings. But in high dimensions, it is expected that the
  densest packings will not be lattices.
Spherical code problem




  The spherical code problem asks:

    1   Given an angle θ0 ∈ (0, π] and a dimension n, what is the
        maximum number of points N for which there is a spherical
        code on S n−1 with minimal angle at least θ0 ?
    2   Given n and N, what is the maximum possible angle of an
        N-point code on S n−1 ?

  An optimal spherical code is one which solves the second problem.
Kissing problem



  The kissing problem is the spherical code problem for angle π/3. It
  can be rephrased as: how many non-overlapping unit spheres can
  be arranged around a central unit sphere in Rn ?
  Answers
      n = 1: Two intervals around a central interval.
      n = 2: Six circles around a central circle.
      n = 3 (Newton-Gregory problem): Twelve spheres, but the
      configuration is not rigid or unique. Proof by Sch¨tte and van
                                                       u
      der Waerden, 1953.
Kissing problem II



      n = 4: Twenty-four, coming from kissing arrangement of the
      D4 lattice. Proof by Musin, 2003. Believed to be unique, but
      unproven.
      n = 8: Kissing configuration of E8 of 240 points.
      n = 24: Kissing configuration of Λ24 of 196560 points.

  The last two are due to Odlyzko and Sloane and (independently)
  Levenshtein.
  No other answers known.
LP bounds


  How do we prove optimality/uniqueness of any of these?
  One idea: linear programming bounds. Invented by Delsarte to
  deal with association schemes, binary codes etc.
  Levenshtein used these to prove optimality and uniqueness of a
  number of codes or families of codes.
  For instance, the 240-point kissing configuration in R 8 and the
  196560-point kissing configuration in R 24 are sharp for the linear
  programming bound, and therefore optimal. This even enables one
  to prove uniqueness.
  Application of the linear programming bound also allowed the
  resolution of the lattice packing problem in 24 dimensions [Cohn-K
  2003].
Positive definite kernels



  Fix n ≥ 2. We say f : [−1, 1] → R is a positive definite kernel if for
  every code C ⊂ S n−1 , the |C | × |C | matrix f ( x, y ) x,y ∈C is
  positive semidefinite.
  In particular,   x,y ∈C   f ( x, y ) ≥ 0.
  Sch¨nberg (1930s) classified all the positive definite kernels. He
       o
  showed that the ultraspherical or Gegenbauer polynomials
  Ciλ (t), i = 0, 1, 2, . . . are PDKs and that any PDK is a
  non-negative linear combination of them. Here λ = n/2 − 1.
Gegenbauer polynomials


  The Gegenbauer polynomials arise from representation
  theory/harmonic analysis. They are given by the generating
  function
                                            ∞
                     (1 − 2tz + z 2 )−λ =          Ciλ (t)z i
                                            i =0

  So we have

    1   C0 (t) = 1
    2   C1 (t) = (n − 2)t
    3   C2 (t) = (n − 2)(nt 2 − 1)/2

  and so on.
Linear programming bound for codes
  Theorem
  Let f (t) = i fi Ciλ (t) be a positive definite kernel (i.e. all fi ≥ 0),
  such that f0  0 and f (t) ≤ 0 for t ∈ [−1, cos θ0 ]. Then any code
  C with minimal angle at least θ0 has at most f (1)/f0 points.

  Proof.
  We have

                    |C |f (1) ≥             f ( x, y )
                                  x,y ∈C

                             =                   fi Ciλ ( x, y )
                                  x,y ∈C     i

                             =         fi          Ciλ ( x, y )
                                   i     x,y ∈C
                                        2
                             ≥ f0 |C | .
LP bounds II


  Why are these called linear programming bounds?
  Write f = 1 +     i 0 fi Ci .

      Variables: fi .
      Constraints: fi ≥ 0
      Constraints: 1 +         fi Ci (t) ≤ 0 for every t ∈ [−1, cos(θ0 )].
      Objective function: minimize 1 +           fi Ci (1).

  This is a convex optimization program, and we can approximate it
  by a linear program by discretizing the interval [−1, 1], and
  restrinting to finitely many nonzero fi .
Potential energy minimization



  One way to find good spherical codes: potential energy. Put N
  points on a sphere with a repulsive force law (e.g. electrostatic
  repulsion), and let the system evolve. They will tend to separate
  themselves to minimize potential energy.
  For S 2 , this is called the Thomson problem after the physicist
  J. J. Thomson, who asked it in connection with the plum-pudding
  model of the atom.
Potential energy minimization II


  Definition
  Let f : (0, 4] → R be a function. We define the f -potential energy
  of a code C ⊂ S n−1 to be

                      Ef (C) =                f (|x − y |2 )
                                 x,y ∈C,x=y


  Note:

    1   Each pair of points counted twice, so the potential energy is
        double that of the physicists.
    2   We let f be a function of squared distance, rather than
        distance. This makes the formulas nicer.
Potential energy minimization III




  The problem is: given n, N and a potential function f , find a
  spherical code of N points on S n−1 that minimizes f -potential
  energy.
Examples of potential functions



      Inverse power law: Ik (r ) = 1/r k for k ∈ R0 . For
      k = n/2 − 1, this gives the harmonic potential.
      Gaussian: Gc (r ) = exp(−cr ) for some c  0 (note that this
      is Gaussian as a function of distance).
      Aℓ (r ) = (4 − r )ℓ for nonnegative integers ℓ.

  All these functins are completely monotonic, i.e.
  (−1)m f (m) (r ) ≥ 0.
  The functions Aℓ span the cone of completely monotonic functions
  on (0, 4].
Universal optimality


  Note: As k  0, the potential energy minimization problem for
  1/r k becomes the spherical code problem (maximize the minimal
  angle). Similarly, the spherical code problem is a limit of the
  energy minimization problems for Gaussians as well.
  We say a spherical code is universally optimal if it minimizes
  f -potential energy (among codes of its size) for all completely
  monotonic f .
  There are examples of universally optimal codes, though their
  existence is very uncommon. The typical situation is that we have
  one or more families of N-point configurations, each being optimal
  for Aℓ in a certain range of ℓ.
Examples



  N points in S 1 : regular N-gon.
  2 points in S 2 : antipodal points, universally optimal.
  3 points in S 2 : equilateral triangle, universally optimal.
  4 points in S 2 : regular tetrahedron, universally optimal.
  In general, k ≤ n + 1 points on S n−1 ⊂ Rn always gives a regular
  simplex in a k − 1 dimensional “equatorial” subspace, under any
  completely monotonic function.
Examples II



  5 points in S 2 : two competing configurations.
  Consider the configuration A of two antipodal points with three
  points on the equator forming an equilateral triangle.
                         t
                        
                       ƒ
                       ƒ
                   t h ƒ
                   
                   h h
                          h ƒt
                            h
                            @
                   t @@@ 
                   @
                   
                   t       
                      t 
                       tt
Examples III



  The configuration Bθ consists of a pyramid with one point on the
  north pole, and four points in the southern hemisphere at latitude
  θ = α − π/2, forming a square.
                        t
                       ¡t
                       e
                      ¡ t
                      e
                    ¡    et
                 t¡ q et t
                       α t
                   ¡      e
                 ¡
                 t           e
                            t
Examples IV




  For inverse power laws, some Bθ wins for steep power laws 1/r k for
  k  7.524+, but A wins for smaller k.
  Note that A maximizes angular distance, as does B0 .
  For the function Aℓ , the configuration A wins for 1 ≤ ℓ ≤ 6,
  whereas some Bθ wins for ℓ ≥ 7.
LP bounds for potential energy


  The linear programming bounds of Delsarte for the spherical code
  problem (maximize N for a given θ), were adapted by Yudin to
  give LP bounds for potential energy.
  Theorem (Yudin)
  Let f : (0, 4] → R be any function. Suppose h : [−1, 1] → R is a
  polynomial such that h(t) ≤ f (2 − 2t) for all t ∈ [−1, 1], and
  suppose there are nonnegative coefficients α0 , . . . , αd such that
            d
  h(t) =          αi Ciλ (t) in terms of the Gegenbauer polynomials. Then
           i =0
  every set of N points on S n−1 has potential energy at least
  N 2 α0 − Nh(1).
Examples

  Known universally optimal configurations of N points on S n−1 :

              n             N                        Name
              2             N                        N-gon
              n           n+1                       simplex
              n            2n                   cross polytope
              3            12                    icosahedron
              4            120                     600-cell
              8            240                 E8 root system
              7            56                 spherical kissing
              6            27             spherical kissing/Schl¨fli
                                                                a
              5            16             spherical kissing/Clebsch
              24         196560         Leech lattice minimal vectors
              23          4600                spherical kissing
              22           891                spherical kissing
              23           552                 regular 2-graph
              22           275                   McLaughlin
              21           162                       Smith
              22           100                   Higman-Sims
               3
            q q +1
              q+1
                     (q + 1)(q 3 + 1)     Cameron-Goethals-Seidel



  They are all sharp for LP bounds [Cohn-K, 2005].
Other conjectured universal optima




  Work of Ballinger, Blekherman, Cohn, Giansiracusa, Kelly,
  Sch¨rmann.
     u
  40 points in R10 , inner products 1, 1/6, 0, −1/3, −1/2.
  64 points in R14 , inner products 1, 1/7, −1/7, −3/7.
  Not sharp for linear programming bounds but perhaps still
  universally optimal.
Other spaces




  We can also define potential energy for finite subsets of other
  compact metric spaces, and sometimes for infinite subsets of
  noncompact spaces.
  For example, for compact two-point homogeneous spaces such as
  RPn , CPn , HPn , we can define the notion of universal optimality
  (for completely monotonic functions of squared chordal distance)
  and find examples of universally optimal codes (joint work with
  Cohn, Elkies, Khatirinejad).
Euclidean space


  Let P be a periodic point configuration in Euclidean space. Let
  f : R≥0 → R a sufficiently rapidly decaying function. Define the
  f -potential energy of a point x ∈ P to be

                                      f (|x − y |2 )
                          y ∈P,y =x

  and the f -potential energy of P to be the (finite) average over all
  points x ∈ P of their potential energies.
  The energy minimization problem asks: given n, f and a fixed point
  density δ (usually 1), which periodic point configuration of density
  δ minimizes the f -potential energy over all periodic configurations
  in Rn (the number of translates N is allowed to vary).
Gradient descent


  Recently, with Cohn and Sch¨rmann, we wrote a computer
                                u
  program to carry out gradient descent on spaces of periodic
  configurations, to search for optima for the Gaussian potential
  functions exp(−cr 2 ), and obtained some interesting results for the
  minimum energy configurations observed experimentally.
  In particular, we found families of formally dual periodic
  configurations, i.e. configurations whose average theta functions
  are related by the generalized Jacobi formula, which replaces z by
  −1/z and multiplies by an appropriate constant.
  The exp(−cπr 2 )-potential energy of P should be related to the
  exp(−πr 2 /c)-potential energy of its dual by a factor depending on
  the density of P, for every c.
Formal duality


  Every lattice has a formal dual (namely, its dual lattice). But we
  do not know of any other formally dual configurations recorded
  previously in the literature.
  Example
         +
  Let Dn be the union of Dn and its translate by the all-halves
                   +
  vector. Then Dn is always formally self-dual (it is a lattice exactly
  when 4 divides n).
                            +
  In addition, if we let Dn (α) be the configuration obtained by
                                                  +              +
  scaling the last coordinate of all vectors in Dn by α, then Dn (α)
  is formally dual to Dn + (1/α), so we in fact have a family of

  formally dual configurations.

Más contenido relacionado

La actualidad más candente

Cs229 cvxopt
Cs229 cvxoptCs229 cvxopt
Cs229 cvxoptcerezaso
 
some thoughts on divergent series
some thoughts on divergent seriessome thoughts on divergent series
some thoughts on divergent seriesgenius98
 
Toxic Release And Dispersion Models
Toxic Release And Dispersion ModelsToxic Release And Dispersion Models
Toxic Release And Dispersion Modelsleksonobangun
 
Lesson 27: Evaluating Definite Integrals
Lesson 27: Evaluating Definite IntegralsLesson 27: Evaluating Definite Integrals
Lesson 27: Evaluating Definite IntegralsMatthew Leingang
 
Practical computation of Hecke operators
Practical computation of Hecke operatorsPractical computation of Hecke operators
Practical computation of Hecke operatorsMathieu Dutour Sikiric
 
Some notes on Tight Frames
Some notes on Tight FramesSome notes on Tight Frames
Some notes on Tight FramesShailesh Kumar
 
Lesson 26: The Fundamental Theorem of Calculus (slides)
Lesson 26: The Fundamental Theorem of Calculus (slides)Lesson 26: The Fundamental Theorem of Calculus (slides)
Lesson 26: The Fundamental Theorem of Calculus (slides)Matthew Leingang
 
Hecke Curves and Moduli spcaes of Vector Bundles
Hecke Curves and Moduli spcaes of Vector BundlesHecke Curves and Moduli spcaes of Vector Bundles
Hecke Curves and Moduli spcaes of Vector BundlesHeinrich Hartmann
 
On Extendable Sets in the Reals (R) With Application to the Lyapunov Stabilit...
On Extendable Sets in the Reals (R) With Application to the Lyapunov Stabilit...On Extendable Sets in the Reals (R) With Application to the Lyapunov Stabilit...
On Extendable Sets in the Reals (R) With Application to the Lyapunov Stabilit...BRNSS Publication Hub
 
Lesson 15: Exponential Growth and Decay (slides)
Lesson 15: Exponential Growth and Decay (slides)Lesson 15: Exponential Growth and Decay (slides)
Lesson 15: Exponential Growth and Decay (slides)Matthew Leingang
 
Local Volatility 1
Local Volatility 1Local Volatility 1
Local Volatility 1Ilya Gikhman
 
Lesson 20: Derivatives and the Shapes of Curves (slides)
Lesson 20: Derivatives and the Shapes of Curves (slides)Lesson 20: Derivatives and the Shapes of Curves (slides)
Lesson 20: Derivatives and the Shapes of Curves (slides)Matthew Leingang
 
On Some Geometrical Properties of Proximal Sets and Existence of Best Proximi...
On Some Geometrical Properties of Proximal Sets and Existence of Best Proximi...On Some Geometrical Properties of Proximal Sets and Existence of Best Proximi...
On Some Geometrical Properties of Proximal Sets and Existence of Best Proximi...BRNSS Publication Hub
 
Pushforward of Differential Forms
Pushforward of Differential FormsPushforward of Differential Forms
Pushforward of Differential FormsHeinrich Hartmann
 
Functional analysis in mechanics
Functional analysis in mechanicsFunctional analysis in mechanics
Functional analysis in mechanicsSpringer
 
Functional analysis in mechanics 2e
Functional analysis in mechanics  2eFunctional analysis in mechanics  2e
Functional analysis in mechanics 2eSpringer
 

La actualidad más candente (19)

Cs229 cvxopt
Cs229 cvxoptCs229 cvxopt
Cs229 cvxopt
 
Michigan U.
Michigan U.Michigan U.
Michigan U.
 
some thoughts on divergent series
some thoughts on divergent seriessome thoughts on divergent series
some thoughts on divergent series
 
Lesson 5: Continuity
Lesson 5: ContinuityLesson 5: Continuity
Lesson 5: Continuity
 
Toxic Release And Dispersion Models
Toxic Release And Dispersion ModelsToxic Release And Dispersion Models
Toxic Release And Dispersion Models
 
Lesson 27: Evaluating Definite Integrals
Lesson 27: Evaluating Definite IntegralsLesson 27: Evaluating Definite Integrals
Lesson 27: Evaluating Definite Integrals
 
Practical computation of Hecke operators
Practical computation of Hecke operatorsPractical computation of Hecke operators
Practical computation of Hecke operators
 
Some notes on Tight Frames
Some notes on Tight FramesSome notes on Tight Frames
Some notes on Tight Frames
 
Lesson 26: The Fundamental Theorem of Calculus (slides)
Lesson 26: The Fundamental Theorem of Calculus (slides)Lesson 26: The Fundamental Theorem of Calculus (slides)
Lesson 26: The Fundamental Theorem of Calculus (slides)
 
Hecke Curves and Moduli spcaes of Vector Bundles
Hecke Curves and Moduli spcaes of Vector BundlesHecke Curves and Moduli spcaes of Vector Bundles
Hecke Curves and Moduli spcaes of Vector Bundles
 
On Extendable Sets in the Reals (R) With Application to the Lyapunov Stabilit...
On Extendable Sets in the Reals (R) With Application to the Lyapunov Stabilit...On Extendable Sets in the Reals (R) With Application to the Lyapunov Stabilit...
On Extendable Sets in the Reals (R) With Application to the Lyapunov Stabilit...
 
Lesson 15: Exponential Growth and Decay (slides)
Lesson 15: Exponential Growth and Decay (slides)Lesson 15: Exponential Growth and Decay (slides)
Lesson 15: Exponential Growth and Decay (slides)
 
Number theory
Number theoryNumber theory
Number theory
 
Local Volatility 1
Local Volatility 1Local Volatility 1
Local Volatility 1
 
Lesson 20: Derivatives and the Shapes of Curves (slides)
Lesson 20: Derivatives and the Shapes of Curves (slides)Lesson 20: Derivatives and the Shapes of Curves (slides)
Lesson 20: Derivatives and the Shapes of Curves (slides)
 
On Some Geometrical Properties of Proximal Sets and Existence of Best Proximi...
On Some Geometrical Properties of Proximal Sets and Existence of Best Proximi...On Some Geometrical Properties of Proximal Sets and Existence of Best Proximi...
On Some Geometrical Properties of Proximal Sets and Existence of Best Proximi...
 
Pushforward of Differential Forms
Pushforward of Differential FormsPushforward of Differential Forms
Pushforward of Differential Forms
 
Functional analysis in mechanics
Functional analysis in mechanicsFunctional analysis in mechanics
Functional analysis in mechanics
 
Functional analysis in mechanics 2e
Functional analysis in mechanics  2eFunctional analysis in mechanics  2e
Functional analysis in mechanics 2e
 

Similar a Lattices, sphere packings, spherical codes

The Inverse Smoluchowski Problem, Particles In Turbulence 2011, Potsdam, Marc...
The Inverse Smoluchowski Problem, Particles In Turbulence 2011, Potsdam, Marc...The Inverse Smoluchowski Problem, Particles In Turbulence 2011, Potsdam, Marc...
The Inverse Smoluchowski Problem, Particles In Turbulence 2011, Potsdam, Marc...Colm Connaughton
 
The Probability that a Matrix of Integers Is Diagonalizable
The Probability that a Matrix of Integers Is DiagonalizableThe Probability that a Matrix of Integers Is Diagonalizable
The Probability that a Matrix of Integers Is DiagonalizableJay Liew
 
Density theorems for Euclidean point configurations
Density theorems for Euclidean point configurationsDensity theorems for Euclidean point configurations
Density theorems for Euclidean point configurationsVjekoslavKovac1
 
Numerical Analysis Assignment Help
Numerical Analysis Assignment HelpNumerical Analysis Assignment Help
Numerical Analysis Assignment HelpMath Homework Solver
 
Solutions modern particlephysics
Solutions modern particlephysicsSolutions modern particlephysics
Solutions modern particlephysicsitachikaleido
 
Problems and solutions statistical physics 1
Problems and solutions   statistical physics 1Problems and solutions   statistical physics 1
Problems and solutions statistical physics 1Alberto de Mesquita
 
Las funciones L en teoría de números
Las funciones L en teoría de númerosLas funciones L en teoría de números
Las funciones L en teoría de númerosmmasdeu
 
Single Variable Calculus Assignment Help
Single Variable Calculus Assignment HelpSingle Variable Calculus Assignment Help
Single Variable Calculus Assignment HelpMath Homework Solver
 
Many electrons atoms_2012.12.04 (PDF with links
Many electrons atoms_2012.12.04 (PDF with linksMany electrons atoms_2012.12.04 (PDF with links
Many electrons atoms_2012.12.04 (PDF with linksLadislav Kocbach
 
Topological Strings Invariants
Topological Strings InvariantsTopological Strings Invariants
Topological Strings InvariantsImran Parvez Khan
 
Minimum enclosingdisk
Minimum enclosingdiskMinimum enclosingdisk
Minimum enclosingdiskAnirban Mitra
 
Topological Inference via Meshing
Topological Inference via MeshingTopological Inference via Meshing
Topological Inference via MeshingDon Sheehy
 
Proportional and decentralized rule mcst games
Proportional and decentralized rule mcst gamesProportional and decentralized rule mcst games
Proportional and decentralized rule mcst gamesvinnief
 

Similar a Lattices, sphere packings, spherical codes (20)

The Inverse Smoluchowski Problem, Particles In Turbulence 2011, Potsdam, Marc...
The Inverse Smoluchowski Problem, Particles In Turbulence 2011, Potsdam, Marc...The Inverse Smoluchowski Problem, Particles In Turbulence 2011, Potsdam, Marc...
The Inverse Smoluchowski Problem, Particles In Turbulence 2011, Potsdam, Marc...
 
The Probability that a Matrix of Integers Is Diagonalizable
The Probability that a Matrix of Integers Is DiagonalizableThe Probability that a Matrix of Integers Is Diagonalizable
The Probability that a Matrix of Integers Is Diagonalizable
 
Berans qm overview
Berans qm overviewBerans qm overview
Berans qm overview
 
plucker
pluckerplucker
plucker
 
Number theory
Number theoryNumber theory
Number theory
 
Density theorems for Euclidean point configurations
Density theorems for Euclidean point configurationsDensity theorems for Euclidean point configurations
Density theorems for Euclidean point configurations
 
Lattice coverings
Lattice coveringsLattice coverings
Lattice coverings
 
Numerical Analysis Assignment Help
Numerical Analysis Assignment HelpNumerical Analysis Assignment Help
Numerical Analysis Assignment Help
 
Solutions modern particlephysics
Solutions modern particlephysicsSolutions modern particlephysics
Solutions modern particlephysics
 
Problems and solutions statistical physics 1
Problems and solutions   statistical physics 1Problems and solutions   statistical physics 1
Problems and solutions statistical physics 1
 
Las funciones L en teoría de números
Las funciones L en teoría de númerosLas funciones L en teoría de números
Las funciones L en teoría de números
 
Single Variable Calculus Assignment Help
Single Variable Calculus Assignment HelpSingle Variable Calculus Assignment Help
Single Variable Calculus Assignment Help
 
Many electrons atoms_2012.12.04 (PDF with links
Many electrons atoms_2012.12.04 (PDF with linksMany electrons atoms_2012.12.04 (PDF with links
Many electrons atoms_2012.12.04 (PDF with links
 
Topological Strings Invariants
Topological Strings InvariantsTopological Strings Invariants
Topological Strings Invariants
 
Unit 3
Unit 3Unit 3
Unit 3
 
Unit 3
Unit 3Unit 3
Unit 3
 
Minimum enclosingdisk
Minimum enclosingdiskMinimum enclosingdisk
Minimum enclosingdisk
 
Topological Inference via Meshing
Topological Inference via MeshingTopological Inference via Meshing
Topological Inference via Meshing
 
Proportional and decentralized rule mcst games
Proportional and decentralized rule mcst gamesProportional and decentralized rule mcst games
Proportional and decentralized rule mcst games
 
Jee main questions
Jee main questionsJee main questions
Jee main questions
 

Más de wtyru1989

Quantum optical measurement
Quantum optical measurementQuantum optical measurement
Quantum optical measurementwtyru1989
 
Gaussian discord imperial
Gaussian discord imperialGaussian discord imperial
Gaussian discord imperialwtyru1989
 
Entropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemEntropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemwtyru1989
 
Manipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementManipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementwtyru1989
 
The gaussian minimum entropy conjecture
The gaussian minimum entropy conjectureThe gaussian minimum entropy conjecture
The gaussian minimum entropy conjecturewtyru1989
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptographywtyru1989
 
Entanglement of formation
Entanglement of formationEntanglement of formation
Entanglement of formationwtyru1989
 
Bound entanglement is not rare
Bound entanglement is not rareBound entanglement is not rare
Bound entanglement is not rarewtyru1989
 
Continuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationsContinuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationswtyru1989
 
Relative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementRelative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementwtyru1989
 
Lect12 photodiode detectors
Lect12 photodiode detectorsLect12 photodiode detectors
Lect12 photodiode detectorswtyru1989
 
Towards a one shot entanglement theory
Towards a one shot entanglement theoryTowards a one shot entanglement theory
Towards a one shot entanglement theorywtyru1989
 
Postselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdPostselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdwtyru1989
 
Encrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandlEncrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandlwtyru1989
 
Qkd and de finetti theorem
Qkd and de finetti theoremQkd and de finetti theorem
Qkd and de finetti theoremwtyru1989
 
Dic rd theory_quantization_07
Dic rd theory_quantization_07Dic rd theory_quantization_07
Dic rd theory_quantization_07wtyru1989
 
标量量化
标量量化标量量化
标量量化wtyru1989
 
Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012wtyru1989
 
Op amp tutorial-1
Op amp tutorial-1Op amp tutorial-1
Op amp tutorial-1wtyru1989
 

Más de wtyru1989 (20)

Quantum optical measurement
Quantum optical measurementQuantum optical measurement
Quantum optical measurement
 
Gaussian discord imperial
Gaussian discord imperialGaussian discord imperial
Gaussian discord imperial
 
Entropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemEntropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problem
 
Manipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementManipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglement
 
The gaussian minimum entropy conjecture
The gaussian minimum entropy conjectureThe gaussian minimum entropy conjecture
The gaussian minimum entropy conjecture
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
 
Entanglement of formation
Entanglement of formationEntanglement of formation
Entanglement of formation
 
Bound entanglement is not rare
Bound entanglement is not rareBound entanglement is not rare
Bound entanglement is not rare
 
Continuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationsContinuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applications
 
Relative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementRelative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglement
 
Lect12 photodiode detectors
Lect12 photodiode detectorsLect12 photodiode detectors
Lect12 photodiode detectors
 
Towards a one shot entanglement theory
Towards a one shot entanglement theoryTowards a one shot entanglement theory
Towards a one shot entanglement theory
 
Postselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdPostselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkd
 
Encrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandlEncrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandl
 
Qkd and de finetti theorem
Qkd and de finetti theoremQkd and de finetti theorem
Qkd and de finetti theorem
 
Dic rd theory_quantization_07
Dic rd theory_quantization_07Dic rd theory_quantization_07
Dic rd theory_quantization_07
 
Em method
Em methodEm method
Em method
 
标量量化
标量量化标量量化
标量量化
 
Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012
 
Op amp tutorial-1
Op amp tutorial-1Op amp tutorial-1
Op amp tutorial-1
 

Último

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Lattices, sphere packings, spherical codes

  • 1. Lattices, sphere packings, spherical codes and energy minimization Abhinav Kumar MIT November 10, 2009
  • 2. Sphere packings Definition A sphere packing in Rn is a collection of spheres/balls of equal size which do not overlap (except for touching). The density of a sphere packing is the volume fraction of space occupied by the balls. ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
  • 3. Lattices Definition A lattice Λ in Rn is a discrete subgroup of rank n, i.e. generated by n linearly independent vectors of Rn . Examples: integer lattice Zn , checkerboard lattice Dn , simplex lattice An , special root lattices E6 , E7 , E8 , Leech lattice Λ24 , and so on. Associated sphere packing: if m(Λ) is the length of a smallest non-zero vector of Λ, then we can put balls of radius m(Λ)/2 around each point of Λ so that they don’t overlap.
  • 4. Spherical codes A spherical code C on S n−1 is a finite subset of the sphere. Example: The kissing configuration of a lattice Λ is the set of minimal non-zero vectors of Λ, rescaled to the unit sphere. The minimal angle θ(C) of the code is the smallest radial angle between distinct elements of C. cos(θ(C)) = max x, y . x,y ∈C,x=y
  • 5. Sphere packing problem Problem: Find a/the densest sphere packing(s) in R n . In dimension 1, we can achieve density 1 by laying intervals end to end. In dimension 2, the best possible is by using the hexagonal lattice. [Fejes T´th 1940] o
  • 6. Sphere packing problem II In dimension 3, the best possible way is to stack layers of the solution in 2 dimensions. This is Kepler’s conjecture, now a theorem of Hales.
  • 8. m
  • 9. mmm
  • 10. There are infinitely (in fact, uncountably) many ways of doing this! These are the Barlow packings. In higher dimensions, we have some guesses for the densest sphere packing. But no proofs yet.
  • 11. Lattices packing The packing problem for lattices asks for the densest lattice(s) in Rn for every n. This is equivalent to the determination of the Hermite constant γn , which arises in the geometry of numbers. The known answers are: n 1 2 3 4 5 6 7 8 24 Λ A1 A2 A3 D4 D5 E6 E7 E8 Leech In low dimensions, lattices provide good candidates for the densest sphere packings. But in high dimensions, it is expected that the densest packings will not be lattices.
  • 12. Spherical code problem The spherical code problem asks: 1 Given an angle θ0 ∈ (0, π] and a dimension n, what is the maximum number of points N for which there is a spherical code on S n−1 with minimal angle at least θ0 ? 2 Given n and N, what is the maximum possible angle of an N-point code on S n−1 ? An optimal spherical code is one which solves the second problem.
  • 13. Kissing problem The kissing problem is the spherical code problem for angle π/3. It can be rephrased as: how many non-overlapping unit spheres can be arranged around a central unit sphere in Rn ? Answers n = 1: Two intervals around a central interval. n = 2: Six circles around a central circle. n = 3 (Newton-Gregory problem): Twelve spheres, but the configuration is not rigid or unique. Proof by Sch¨tte and van u der Waerden, 1953.
  • 14. Kissing problem II n = 4: Twenty-four, coming from kissing arrangement of the D4 lattice. Proof by Musin, 2003. Believed to be unique, but unproven. n = 8: Kissing configuration of E8 of 240 points. n = 24: Kissing configuration of Λ24 of 196560 points. The last two are due to Odlyzko and Sloane and (independently) Levenshtein. No other answers known.
  • 15. LP bounds How do we prove optimality/uniqueness of any of these? One idea: linear programming bounds. Invented by Delsarte to deal with association schemes, binary codes etc. Levenshtein used these to prove optimality and uniqueness of a number of codes or families of codes. For instance, the 240-point kissing configuration in R 8 and the 196560-point kissing configuration in R 24 are sharp for the linear programming bound, and therefore optimal. This even enables one to prove uniqueness. Application of the linear programming bound also allowed the resolution of the lattice packing problem in 24 dimensions [Cohn-K 2003].
  • 16. Positive definite kernels Fix n ≥ 2. We say f : [−1, 1] → R is a positive definite kernel if for every code C ⊂ S n−1 , the |C | × |C | matrix f ( x, y ) x,y ∈C is positive semidefinite. In particular, x,y ∈C f ( x, y ) ≥ 0. Sch¨nberg (1930s) classified all the positive definite kernels. He o showed that the ultraspherical or Gegenbauer polynomials Ciλ (t), i = 0, 1, 2, . . . are PDKs and that any PDK is a non-negative linear combination of them. Here λ = n/2 − 1.
  • 17. Gegenbauer polynomials The Gegenbauer polynomials arise from representation theory/harmonic analysis. They are given by the generating function ∞ (1 − 2tz + z 2 )−λ = Ciλ (t)z i i =0 So we have 1 C0 (t) = 1 2 C1 (t) = (n − 2)t 3 C2 (t) = (n − 2)(nt 2 − 1)/2 and so on.
  • 18. Linear programming bound for codes Theorem Let f (t) = i fi Ciλ (t) be a positive definite kernel (i.e. all fi ≥ 0), such that f0 0 and f (t) ≤ 0 for t ∈ [−1, cos θ0 ]. Then any code C with minimal angle at least θ0 has at most f (1)/f0 points. Proof. We have |C |f (1) ≥ f ( x, y ) x,y ∈C = fi Ciλ ( x, y ) x,y ∈C i = fi Ciλ ( x, y ) i x,y ∈C 2 ≥ f0 |C | .
  • 19. LP bounds II Why are these called linear programming bounds? Write f = 1 + i 0 fi Ci . Variables: fi . Constraints: fi ≥ 0 Constraints: 1 + fi Ci (t) ≤ 0 for every t ∈ [−1, cos(θ0 )]. Objective function: minimize 1 + fi Ci (1). This is a convex optimization program, and we can approximate it by a linear program by discretizing the interval [−1, 1], and restrinting to finitely many nonzero fi .
  • 20. Potential energy minimization One way to find good spherical codes: potential energy. Put N points on a sphere with a repulsive force law (e.g. electrostatic repulsion), and let the system evolve. They will tend to separate themselves to minimize potential energy. For S 2 , this is called the Thomson problem after the physicist J. J. Thomson, who asked it in connection with the plum-pudding model of the atom.
  • 21. Potential energy minimization II Definition Let f : (0, 4] → R be a function. We define the f -potential energy of a code C ⊂ S n−1 to be Ef (C) = f (|x − y |2 ) x,y ∈C,x=y Note: 1 Each pair of points counted twice, so the potential energy is double that of the physicists. 2 We let f be a function of squared distance, rather than distance. This makes the formulas nicer.
  • 22. Potential energy minimization III The problem is: given n, N and a potential function f , find a spherical code of N points on S n−1 that minimizes f -potential energy.
  • 23. Examples of potential functions Inverse power law: Ik (r ) = 1/r k for k ∈ R0 . For k = n/2 − 1, this gives the harmonic potential. Gaussian: Gc (r ) = exp(−cr ) for some c 0 (note that this is Gaussian as a function of distance). Aℓ (r ) = (4 − r )ℓ for nonnegative integers ℓ. All these functins are completely monotonic, i.e. (−1)m f (m) (r ) ≥ 0. The functions Aℓ span the cone of completely monotonic functions on (0, 4].
  • 24. Universal optimality Note: As k 0, the potential energy minimization problem for 1/r k becomes the spherical code problem (maximize the minimal angle). Similarly, the spherical code problem is a limit of the energy minimization problems for Gaussians as well. We say a spherical code is universally optimal if it minimizes f -potential energy (among codes of its size) for all completely monotonic f . There are examples of universally optimal codes, though their existence is very uncommon. The typical situation is that we have one or more families of N-point configurations, each being optimal for Aℓ in a certain range of ℓ.
  • 25. Examples N points in S 1 : regular N-gon. 2 points in S 2 : antipodal points, universally optimal. 3 points in S 2 : equilateral triangle, universally optimal. 4 points in S 2 : regular tetrahedron, universally optimal. In general, k ≤ n + 1 points on S n−1 ⊂ Rn always gives a regular simplex in a k − 1 dimensional “equatorial” subspace, under any completely monotonic function.
  • 26. Examples II 5 points in S 2 : two competing configurations. Consider the configuration A of two antipodal points with three points on the equator forming an equilateral triangle. t ƒ ƒ t h ƒ h h h ƒt h @ t @@@ @ t t tt
  • 27. Examples III The configuration Bθ consists of a pyramid with one point on the north pole, and four points in the southern hemisphere at latitude θ = α − π/2, forming a square. t ¡t e ¡ t e ¡ et t¡ q et t α t ¡ e ¡ t e t
  • 28. Examples IV For inverse power laws, some Bθ wins for steep power laws 1/r k for k 7.524+, but A wins for smaller k. Note that A maximizes angular distance, as does B0 . For the function Aℓ , the configuration A wins for 1 ≤ ℓ ≤ 6, whereas some Bθ wins for ℓ ≥ 7.
  • 29. LP bounds for potential energy The linear programming bounds of Delsarte for the spherical code problem (maximize N for a given θ), were adapted by Yudin to give LP bounds for potential energy. Theorem (Yudin) Let f : (0, 4] → R be any function. Suppose h : [−1, 1] → R is a polynomial such that h(t) ≤ f (2 − 2t) for all t ∈ [−1, 1], and suppose there are nonnegative coefficients α0 , . . . , αd such that d h(t) = αi Ciλ (t) in terms of the Gegenbauer polynomials. Then i =0 every set of N points on S n−1 has potential energy at least N 2 α0 − Nh(1).
  • 30. Examples Known universally optimal configurations of N points on S n−1 : n N Name 2 N N-gon n n+1 simplex n 2n cross polytope 3 12 icosahedron 4 120 600-cell 8 240 E8 root system 7 56 spherical kissing 6 27 spherical kissing/Schl¨fli a 5 16 spherical kissing/Clebsch 24 196560 Leech lattice minimal vectors 23 4600 spherical kissing 22 891 spherical kissing 23 552 regular 2-graph 22 275 McLaughlin 21 162 Smith 22 100 Higman-Sims 3 q q +1 q+1 (q + 1)(q 3 + 1) Cameron-Goethals-Seidel They are all sharp for LP bounds [Cohn-K, 2005].
  • 31. Other conjectured universal optima Work of Ballinger, Blekherman, Cohn, Giansiracusa, Kelly, Sch¨rmann. u 40 points in R10 , inner products 1, 1/6, 0, −1/3, −1/2. 64 points in R14 , inner products 1, 1/7, −1/7, −3/7. Not sharp for linear programming bounds but perhaps still universally optimal.
  • 32. Other spaces We can also define potential energy for finite subsets of other compact metric spaces, and sometimes for infinite subsets of noncompact spaces. For example, for compact two-point homogeneous spaces such as RPn , CPn , HPn , we can define the notion of universal optimality (for completely monotonic functions of squared chordal distance) and find examples of universally optimal codes (joint work with Cohn, Elkies, Khatirinejad).
  • 33. Euclidean space Let P be a periodic point configuration in Euclidean space. Let f : R≥0 → R a sufficiently rapidly decaying function. Define the f -potential energy of a point x ∈ P to be f (|x − y |2 ) y ∈P,y =x and the f -potential energy of P to be the (finite) average over all points x ∈ P of their potential energies. The energy minimization problem asks: given n, f and a fixed point density δ (usually 1), which periodic point configuration of density δ minimizes the f -potential energy over all periodic configurations in Rn (the number of translates N is allowed to vary).
  • 34. Gradient descent Recently, with Cohn and Sch¨rmann, we wrote a computer u program to carry out gradient descent on spaces of periodic configurations, to search for optima for the Gaussian potential functions exp(−cr 2 ), and obtained some interesting results for the minimum energy configurations observed experimentally. In particular, we found families of formally dual periodic configurations, i.e. configurations whose average theta functions are related by the generalized Jacobi formula, which replaces z by −1/z and multiplies by an appropriate constant. The exp(−cπr 2 )-potential energy of P should be related to the exp(−πr 2 /c)-potential energy of its dual by a factor depending on the density of P, for every c.
  • 35. Formal duality Every lattice has a formal dual (namely, its dual lattice). But we do not know of any other formally dual configurations recorded previously in the literature. Example + Let Dn be the union of Dn and its translate by the all-halves + vector. Then Dn is always formally self-dual (it is a lattice exactly when 4 divides n). + In addition, if we let Dn (α) be the configuration obtained by + + scaling the last coordinate of all vectors in Dn by α, then Dn (α) is formally dual to Dn + (1/α), so we in fact have a family of formally dual configurations.
  • 36. Inverse problem What happens if we evolve 8 points on S 2 under a 1/r k potential? The minimum for energy is not a cube! It’s a skew cube (antiprism), where the distance between the two square faces varies as k varies. Similarly, 20 points on S 2 don’t settle down to a regular dodecahedron under the inverse power laws or Gaussians. Can we design a potential function which is minimized by the cube? Can do it with potential wells, but we want a nicer function.
  • 37. Inverse problem II Theorem Let f (r ) = 1/r + r /3 − 8r 2 /11 + 2r 3 /9 − r 4 /50. The cube is the unique global minimum for f -potential energy among 8-point codes in S 2 . Proof. Linear programming bounds! We engineer f so that it’s easy to come up with an h that works and gives a sharp bound for the cube. But note that f is in fact decreasing and convex as a function of distance (even though not completely monotonic).
  • 38. Some questions Are there only finitely many universal optima in a given dimension? How many local optima are there? Systematic upper/lower bounds? What are good ways to ”walk” the configuration space to find good codes (other than gradient descent for potential energy)? Is it possible to beat the D4 lattice for energy, among periodic configurations or among lattices?
  • 39. Papers and References Ballinger-Blekherman-Cohn-Giansiracusa-Kelly-Sch¨rmann, u Experimental study of energy-minimizing point configurations on spheres Cohn-K, Optimality and uniqueness of the Leech lattice among lattices Cohn-K, Universally optimal distribution of points on spheres Cohn-K, Algorithmic design of self-assembling structures Cohn-K, Counterintuitive ground states in soft-core models Cohn-K-Sch¨rmann, Ground states and formal duality u relations in the Gaussian core model