Braids, Knots and Applications
Patrick D. Bangert
School of Engineering and Science
International University Bremen
Campus Ring 1, 28759 Bremen, Germany.
Email: p.bangert@iu-bremen.de
Internet: http://www.knot-theory.org
Fig. 1. Shells which display a clearly braided pattern (found by the author in
Cetraro, Italy).
Summary. We introduce braids via their historical roots and uses, make connections with knot theory and present the mathematical theory of braids through the
braid group. Several basic mathematical properties of braids are explored and equivalence problems under several conditions defined and partly solved. The connection
with knots is spelled out in detail and translation methods are presented. Finally
a number of applications of braid theory are given. The presentation is pedagogical and principally aimed at interested readers from different fields of mathematics
and natural science. The discussions are as self-contained as can be expected within
the space limits and require very little previous mathematical knowledge. Literature references are given throughout to the original papers and to overview sources
where more can be learned.
A short discussion of the topics presented follows. First, we give a historical
overview of the origins of braid and knot theory (1). Topology as a whole is introduced (2.1) and we proceed to present braids in connection with knots (2.2), braids
as topological objects (2.3), a group structure on braids (2.4) with several presentations (2.5) and two topological invariants arising from the braid group (2.6). Several
2
Patrick D. Bangert
properties of braids are then proven (2.7) and some algorithmic problems presented
(2.8).
Braids in their connection with knots are discussed by first giving a notation
for knots (3.1) and then illustrating how to turn a braid into a knot (3.2) for which
an example is given (3.3). The problem of turning a knot into a braid is approached
in two ways (3.4 and 3.5) and then the a complete invariant for knots is discussed
(3.6) by means of an example.
The classification of knots is at the center of the theory. This problem can be
approached via braid theory in several stages. The word problem is solved in two
ways, Garside’s original (4.1) and a novel method (4.2). Then the conjugacy problem is presented through Garside’s original algorithm (4.3) and a new one (4.4).
Markov’s theorem allows this to be extended to classify knots but an algorithmic solution is still outstanding as will be discussed (4.5). Another important algorithmic
problem, that of finding the shortest equal braid is presented at length (4.6).
Knot theory is very appealing for many reasons but especially because it is
so useful is many areas of research. We present applications in classical dynamics
(5.1), fluid dynamics (5.2), magnetic relaxation (5.3), path integration (5.4), particle
physics (5.5), solid state physics (5.6), quantum field theory (5.7) and the biology
of DNA (5.8). Finally the great push towards ideal knots is briefly discussed (5.9).
Key words: braids, knots, invariants, word problem, conjugacy problem, rewriting
systems, fluid dynamics, path integration, quantum field theory, DNA, ideal knots
Braids, Knots and Applications
3
1
Physical Knots and Braids: A History and Overview . . . . .
4
2
Braids and the Braid Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
The Topological Idea . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
The Origin of Braid Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
The Topological Braid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
The Braid Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Other Presentations of the Braid Group . . . . . . . . . . . . . . . . . . . . . . .
The Alexander and Jones Polynomials . . . . . . . . . . . . . . . . . . . . . . . .
Properties of the Braid Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Algorithmic Problems in the Braid Groups . . . . . . . . . . . . . . . . . . . .
7
9
13
16
19
21
24
27
3
Braids and Knots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.1
3.2
3.3
3.4
3.5
3.6
Notation for knots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Braids to Knots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Example: The Torus Knots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Knots to Braids I: The Vogel Method . . . . . . . . . . . . . . . . . . . . . . . . .
Knots to Braids II: An Axis for the Universal Polyhedron . . . . . . .
Peripheral Group Systems of Closed Braids . . . . . . . . . . . . . . . . . . . .
4
Classification of Braids and Knots . . . . . . . . . . . . . . . . . . . . . . . 50
4.1
4.2
4.3
4.4
4.5
4.6
The Word Problem I: Garside’s Solution . . . . . . . . . . . . . . . . . . . . . .
The Word Problem II: Rewriting Systems . . . . . . . . . . . . . . . . . . . . .
The Conjugacy Problem I: Garside’s Solution . . . . . . . . . . . . . . . . . .
The Conjugacy Problem II: Rewriting Systems . . . . . . . . . . . . . . . . .
Markov’s Theorem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
The Minimal Word Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5
Applications of Braid Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
5.1
5.2
5.3
5.4
5.5
5.6
5.7
5.8
5.9
Topology as a Conserved Quantity in Classical Dynamics . . . . . . . .
Knot Theory in Fluid Dynamics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Braid Relaxation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Feynman Path Integrals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Braids and Particle Physics: Anyons . . . . . . . . . . . . . . . . . . . . . . . . . .
Statistical Mechanics: The Yang-Baxter Equation . . . . . . . . . . . . . .
Anyons to TQFT’s via the Hopf Invariant . . . . . . . . . . . . . . . . . . . . .
Tangles and DNA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Ideal Knots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
29
33
33
34
36
44
50
53
58
60
66
70
78
80
82
88
90
93
97
102
107
4
Patrick D. Bangert
1 Physical Knots and Braids: A History and Overview
Everyone knows about knots.
We use them to tie our shoelaces
and to fasten objects together. For
mountain climbers, they become a
matter of life and death and for
some mathematicians they are the
source of bread on the table. If you
plan to tie a knot into rope and
use it, one of the most vital pieces
of information is how much pulling
force on the rope the knot can hold
before unravelling. Sometimes, the
(a)
(b)
rope will rip before the knot comes
undone. This is ideal for mounFig. 2. (a) The simplest method of con- tain climbers. On the other hand,
structing a braid is to intertwine two if you use a knot to fasten a boat
strings by exchanging their endpoints and
to the pier, you want it to hold but
(b) the result of the simple exchange.
also come undone readily when you
want it to. For this, there exist knots which become tighter if you pull the
string one way and looser if you pull the string another way.
There exists enormous lore on the science of tying knots for various practical purposes (see for example [18]) but very little is known scientifically about
the physical properties of various knots [116]. One exception is an interesting
project investigating the tension required to break a rope with a knot in it.
It has been found that the point of greatest stress is the point of highest
curvature in the rope. That means that if the knot has a sharper bend in
it than another knot, it will cause the rope to break at a lower tension and
indeed at the point of greatest curvature. This was an experimental investigation realized with spaghetti and arose from an inquiry of fishing supplies
manufacturers. The question was how much force a fishing line can hold after
it has become knotted. The answer is that it depends on the knot type but, in
general, much less than if it was unknotted [171]. The investigation of which
knot types have a certain amount of curvature if physically tied is closely
related to the question of what an ideal knot is; a controversial discussion
which we shall go into in section 5.9.
Possibly the most important difference between physical and mathematical knots is that mathematics requires the string to be closed. That means
that after we tie the knot into a rope, we must glue the ends of the rope
together and never undo them. The reason for this is that we are about to
consider knots identical if we can continuously deform them into each other.
If we had a rope with ends, we could untie the knot and thus every knot
would be equal to a segment of straight rope. This would give rise to a use-
1
2
Braids, Knots and Applications
5
less theory and not necessitate a book about it. In order to make this chapter
fundamentally amusing for the reader we shall demand ropes without ends.
1
2
4
3
(a)
(b)
Fig. 3. (a) The points 1 and 3 and the points 2 and 4 form pairs which interchange
their positions in turn, thus generating a braid and (b) the three points exchange
positions with their image points (drawn in dashed circles) in turn.
Knots can be used to tightly compact rope in order to form a bulge which
may be used as a button. Knotted buttons were introduced, for example,
by the samurai in medieval Japan to hold various small objects to their
belts which were made of braided rope (this practise began in the Azuchi
monoyama era, 1574 – 1602). The braiding patterns, known as kumihomi,
invented during that period became, as many things in Japan, a separate art
form practised for its own sake and still exists today.
In the baroque period in Europe, women’s clothing was trimmed with
braids. Many military uniforms in the 19th century (and some present day
dress uniforms) had braids as trimming and decoration and in some cases
(South African military, for example) trefoil knots were used as buttons.
Braids are very popular today. They are used to make rope as it has been
noted that a rope with a braided core has a greater breaking tension while
also retaining flexibility and elasticity. Belts and decorations are made using
braids and many artists make braiding and knot tying their business.
The word “braid” itself comes from a Scottish dialect in the region of
Edinburgh and means “broad.” As there is a broad river near Edinburgh,
this was called the braid burn and the valley through which it runs is called
the braid valley. There are many places in present day Edinburgh named
after braids: Braid Veterinary Hospital and The Braid Pub, for instance.
Braids are represented in sports by James Braid, the famous golf player and
course designer, and in music by the punk band Braid from Urbana, Illinois
(disbanded in 2000).
The “typical” braid is the one we see in people’s hair. It is made of three
strands by alternately taking the left or right strand and passing it over the
6
Patrick D. Bangert
middle strand. This braid is so common that the word “braid” is almost
synonymous with this pattern. It is every mathematician’s aim to generalist
a concept which is already known. In this case, we may increase the number
of strands and pass the outer left and outer right strands over more than
one of the intermediate strands. So, for example, a five string braid can be
made by passing the outer strands over two strands instead of one. Another
variety could be an eight string braid in which the outer left passes over three
strands and the outer right over four. In tenth century England, the braiding
centers used different patterns from each other. London and York opted for
the normal three strand braid and Durham was partial to the five and eight
string varieties described above.
The question of how braids are made is interesting in its own right. Suppose that we have n strings which are fixed at one end (we shall call this
the top end) on a straight line and hang down vertically. The other ends are
free to move in a horizontal plane P (the bottom end) below the top end.
We further label each string by a number from one to n in order from left to
right at the top end. Let the intersection of string i and plane P be labelled
i also. We may now discuss the braid construction as a series of moves of the
points 1 to n in the plane P relative to each other.
Let us begin with two points in P
which interchange positions at every move,
3 2
see figure 2 (a). This generates a braid
1
on two strings which looks like figure 2
3
(b). This braid is so simple that it hardly
2 1
merits drawing attention to it but the
1 3
pattern can be generalized almost indef2
1
initely. The natural next step is to con3 2
sider four points arranged in a square
2 1
which interchange across the diagonals in
3
turn, see figure 3 (a). This construction
2
method is identical to taking the outer
1 3
string of a four strand braid and passing
it over two and under the string just overcrossed. We alternate between using the
Fig. 4. The braid which results
left and the right outer string for doing
from the motion described in figure 3 (b) with the relative positions this. This braid can be rapidly made in
of the points at the bottom of each practise and was used widely in prehistoric Denmark to braid leather thongs.
horizontal section.
Another way to generalist the scheme
of figure 2 (a) is to introduce image points, see figure 3 (b). The image points
differ from real points in that there are no strings attached to them. We
exchange point and image point in numerical order. The way of constructing
a braid shown in figure 3 (b) is one in which each string moves to a point
Braids, Knots and Applications
7
which is its reflected image across the line joining the other two points. This
is how the configuration naturally embeds itself into an equilateral triangle.
It is not easy to see what the resultant braid for the construction in
figure 3 (b) is so we have drawn it together with the relative positions of the
points in figure 4. Note that each exchange of a point with its image point in
this scheme generates two crossings in the braid. What is interesting in this
example is that we require six exchanges before the points in the plane return
to their original relative positions while the braid pattern repeats itself after
only two exchanges. The three dimensional structure is thus simpler than the
two dimensional dynamical system which gives rise to it. This is an interesting
property which can be exploited to classify fundamentally distinct motions
in dynamical systems. It should be mentioned that the braid construction of
figure 3 (b) is the most optimal way to stir a dye into a liquid [43]. The three
points would be rods or paddles of some kind which would be submerged
in the liquid and follow the motion prescribed. If one were to record their
positions over time then one would obtain figure 4 where the time axis runs
vertically upwards.
Constructing braids by exchanging points in a plane as we have done
above for a few examples can be generalized almost indefinitely. Although we
will not undertake this particular generalization, we will develop a number
of other general properties of braids. Much more could be said about making
braids from real string and the purposes they were made for.
2 Braids and the Braid Group
2.1 The Topological Idea
Topology is a branch of mathematics that studies the shape of objects independent of their size or position. If we can deform one object into another
by a continuous transformation, then we shall call these objects topologically
equivalent. In everyday terms this means that we may bend, stretch, dent,
smoothen, move, blow up or deflate an object but we are not allowed to cut
or to glue anything. An example of what we may do is shown in figure 5 in
which it is shown by an explicit deformation that one can get from a linked
structure to an unlinked structure. It is perhaps counter-intuitive that these
two objects be considered the same but it is the beauty of topology that we
can neglect the particular details of the embedding of the object into space
and we must only keep track of certain important global properties.
Take for example the doughnut (also called the torus) and the sphere.
These two objects are topologically inequivalent. This can be seen easily by
observing that the doughnut has a hole while the sphere does not. We can
only get rid of the hole by a discontinuous transformation, i.e. in the process
of transforming the doughnut into the sphere there will be an instant at which
8
Patrick D. Bangert
(1)
(2)
(4)
(3)
(5)
Fig. 5. This sequence of pictures shows how an initially linked structure (1) is
slowly transformed into an unlinked structure (5) by a continuous transformation
three stages of which are shown.
the hole disappears. This is not allowed in topology and so we have motivated
that there are topologically different objects.
It is a popular joke that topologists have chipped teeth because they
mistake coffeecups for doughnuts. To see that these two are topologically
equivalent observe that a coffeecup has a handle. Now imagine making the
floor of the cup thicker until the cup can no longer hold any liquid. Then
distribute the thick part of the cup evenly throughout the cup, it is easy to
see that the result is a doughnut.
In the following we shall be concerned with braids and knots. It will be
made clear what exactly these are in a moment but the idea is very much
the one we are familiar with from everyday use as motivated above by the
physical construction of braids. It will be useful to have a few bits of string
handy throughout the reading of the following sections so that you may try
out some of the results to be presented. This is one of the beauties of knot
theory; one can really interact with it. Note that mathematical knots differ
from ordinary knots in only one important point: After the knot is tied,
the ends of the string are to be glued together and only then is the object
regarded as a topological object. If the knot had free ends, all knots would
be equivalent as all knots, having been tied, can be untied.
Braids, Knots and Applications
9
2.2 The Origin of Braid Theory
Few areas of research can
trace their origins as precisely
as braid theory. Braid theory,
as a mathematical discipline, be(1)
gan in 1925 when Emil Artin
published his Theorie der Zöpfe
(2)
[16]. A few problems in this first
paper were quickly corrected [17]
and the study was made algebraic soon thereafter [41]. As
(3)
we shall see throughout this chapter, braids are closely related to
knots and we need to look at
Fig. 6. The Reidemeister moves.
knots to appreciate braids fully.
Knot theory was started in the 1860’s by Peter Guthrie Tait, a Scottish mathematician, who endeavored to make a list of topologically distinct
knots in response to a request by William Thompson (later Lord Kelvin)
who thought that knotted vortex tubes in the luminiferous ether would make
a good model for the elusive atomic theory. This physical application was
abandoned when it became clear the the ether did not exist through the
Michelson-Morley experiment in 1887. In spite of this, the mathematics was
here to stay. Tait first published his work in 1877 at which time he was able
to present a long list of knots. It was his purpose to construct the list in order
of increasing number of crossings in the knot.
How can we tell if a knot is the same
as another? Reidemeister has provided us
with a convenient way to tell. He proved
that the moves in figure 6 are sufficient
to get from any diagram of a knot to
any equivalent diagram [173]. Reidemeister’s moves are extremely simple, it is
almost obvious that they are sufficient
(a)
(b)
to move between any two equivalent diagrams. Actually producing a sequence of Fig. 7. The (a) trefoil knot and (b)
moves for two particular diagrams how- its mirror image.
ever, is a non-trivial task. As a result, the
moves have found their main use in proofs that certain quantities are identical
for all diagrams of a particular knot. We call such quantities invariants and
they can be integers, real numbers, polynomials, groups, manifolds and other
mathematical objects. For example the number of components or closed loops
of a knot is an integer invariant as the Reidemeister moves do not perform
surgery (cutting or gluing).
(0)
or
10
Patrick D. Bangert
Exercise 2.1. Convince yourself that any topological equivalence move possible on a knot can be reduced to Reidemeister moves.
There is only one knot of no crossings – a simple loop of rope – which
is called the unknot (recall that a mathematical knot exists on rope without
ends). No knot of one crossing can exist as this would simply be a twist of
one end of the unknot and can just as easily be undone. This twist is the
Reidemeister move zero in reverse, see figure 6. The same applies to any
knot of two crossings. Matters become more challenging with three crossings
because we hit the trefoil knot.
The trefoil knot (see figure 7 (a)) is the knot we usually tie into a shoelace
before tying a bow on top of it. Is the trefoil knot the only knot of three
crossings? We investigate this question by drawing three double points in the
plane (do not differentiate between over and undercrossings yet) which are
the intersections of two short line segments each. Then connect the endpoints
of the line segments in all possible ways without causing further crossings in
the plane. You will find that all of these will unravel to give the unknot
by Reidemeister moves of type zero except the trefoil knot. The trefoil knot
comes in two natural flavours: the standard type (figure 7 (a)) and the mirror
image of the standard type (figure 7 (b)). The mirror image of a knot is
obtained by switching all of its crossings (see figure 7 (b)). This method is
essentially the one which Rev. Kirkman used in the 19th century to construct
a list of all knots up to and including ten crossings. The labour involved in
this task is prodigious. To complete the list of all knots of three crossings we
must ask:
Exercise 2.2. Is the trefoil equivalent to its mirror image? [Hint: This means
that you have to find a continuous deformation of the trefoil into its mirror
image if they are equivalent or a proof that it is not possible otherwise. The
typical method is to look for an invariant if you suspect that they are not
equivalent. If you can show that the value of the invariant is different for the
two knots, then you have shown that they are different.]
The answer to exercise 2.2 is that the trefoil is not equivalent to its mirror
image. This is shown by computing an invariant quantity called Alexander
polynomial for both knots. We will compute the polynomials for both trefoils
in section 2.5.
We will motivate the result here by computing a quantity called writhe
which is an invariant of all the Reidemeister moves except the zeroth one.
Imagine you want to hang a painting on the wall and you are putting a screw
into the wall to hold the painting up. You twist the screw clockwise to get it
into the wall and counterclockwise when you’ve made a mistake and wish to
get it out again. We consider progress positive and mistakes negative so that
a crossing in a knot which is achieved by a clockwise rotation of the hands
as they follow the orientation of the knot is assigned a weighting of +1; the
opposite kind is assigned a weight of −1. The writhe w of a knot is the sum
Braids, Knots and Applications
31
41
51
52
61
62
11
63
Fig. 8. The prime knots with fewer than seven crossings and their names from
standard tables. The knot 31 is the trefoil knot of figure 7 (a).
of the weights over all the crossings. Let us pick the orientation in which the
topmost arch on the trefoils in figure 7 points to the left. Then the standard
trefoil has w = 3 and the mirror image w = −3.
Exercise 2.3. Verify that the trefoil has a writhe of 3 and its mirror image
a writhe of -3 if the orientation of the topmost arch is directed to the left in
figure 7.
Exercise 2.4. Prove that writhe is invariant for all Reidemeister moves except move zero.
Using such methods, it is possible to construct a large table of knots.
In figure 8 we show the first seven knots after the unknot. It is understood
that the two ends of the rope must be joined to yield the mathematical
knot. We present them in this fashion for ease of understanding and practical
experimentation.
12
Patrick D. Bangert
Exercise 2.5. Retie all the knots in figure 8 with string and convince yourself that they are truly distinct and that you can not get a knot of fewer than
seven crossings which is not listed.
The question is: Can we find a general method to determine equality or
otherwise for any two knots? The answer is yes, but with qualifications. There
exists a method due to Waldhausen, Hakken, Hemion and others but it is so
inefficient that it is not possible to use for knots for which we do not know
the answer already [103]. There exists a theorem due to Alexander which
states that every knot can be represented by a braid [11] which we prove in
theorem 2.11. This gave the motivation for people to study braids in order
to try to help classify knots. The greatest thrust came from Markov who
proved a result for braids similar to Reidemeister move result for knots [142].
Using Markov’s theorem to classify knots has proven difficult however and
the search continues. In the sections to come we shall review the results and
present the solutions as far as they are known.
Braids have proven tremendously useful in spite of the fact that they have
not lead to a complete knot classification scheme. Many invariant of knots
are naturally defined on braids. The most revolutionary invariant, the Jones
polynomial, was discovered using braid theory. Beyond this, braids have many
applications to various fields as we shall discover in the sections to come.
An operation to combine knots can be defined which we are going to call
knot addition and denote it by #.
Definition 2.6. Given two knots K and L, we define the knot sum K#L as
the knot obtained by cutting both K and L at a random location and gluing
them together with respect to their orientations.
This is a simple operation but it is not at all obvious that it is well defined.
One can show that: (1) The sum is independent of the points on K and L
chosen as cutting points [158], (2) any knot can be uniquely factorized into
a finite length sum of knots [178], (3) this sum may actually be determined
[179]. Property (1) makes the concept well-defined. The second property establishes the existence of prime knots, i.e. knots that may not be decomposed
into the sum of others and also that classifying prime knots will classify all
knots. The third property means that this is, at least in theory, possible to
actually compute. However, the algorithm to find the unique decomposition
is the algorithm alluded to previously and thus this is not a practical method.
It can be shown that there does not, in general, exist an inverse to the operation of addition of knots. As one may show that knot addition is associative,
knots form a semi-group but not a group under the operation of addition
[158].
As we shall find braids to have a group structure and that any knot can
be represented as a braid, braid theory may seem the way to go in order to
classify knots. Much work in this direction has been done and many powerful
results obtained from such a procedure.
Braids, Knots and Applications
13
2.3 The Topological Braid
l1
a1
a2
a3
A
A
C
l2
b1
b2
(a)
b3
C
B
B
(b)
Fig. 9. (a) An example of the definition of a topological braid (see definition 2.7)
and (b) an elementary deformation as defined in definition 2.8.
We know from section 1 what a braid is. Mathematically, we have to be
slightly more careful.
Definition 2.7 (n-braid). Let l1 and l2 be two parallel lines in a plane
P and let A = {a1 , a2 , · · · , an } and B = {b1 , b2 , · · · , bn } be sets of points
on l1 and l2 respectively. An n-braid is a set of (possibly oriented) n nonintersecting polygonal curves which have exactly one endpoint in A and one
in B such that all points in A or B are the endpoints of exactly one of these
curves and such that any line l parallel to l1 and l2 crosses any curve in at
most one point.
An example of a 3-braid, in which we have labelled the lines l1 and l2 as
well as the point sets A and B, is shown in figure 9 (a); note that the plane P
is understood to be the plane of the paper. In this example, we have 3 curves
each of which have two endpoints, one in A and one in B. These curves go
from l1 to l2 monotonically, they do not double back on themselves. This is
the meaning that no line parallel to l1 and l2 may cross any curve in more
than one point. In fact it is this requirement that makes braids substantially
simpler than knots and allows a group structure to be defined on braids. An
n-braid in the form of definition 2.7 is also called an open braid. We shall
drop the n from n-braid when no confusion can arise.
The normal braid which is braided into peoples’ hair fulfills these requirements. One end of all the strings is fixed on the person’s head and others are
held in place by some form of rubber band. The braiding in the middle is done
in a way that each bundle of hairs goes from top to bottom monotonically.
Some Celtic designs used as borders in the Book of Kells or other illuminated
books or more commonly used as trimmings for medieval clothing, necklaces,
pendants and belts are not usually braids conforming to this definition as
their strings often return to a point close to their origin and thus contain a
local maximum or minimum.
14
Patrick D. Bangert
Whenever we define a new mathematical object, we desire an equivalence
relation for the possible instances of this object. As braid theory is a topological pursuit, we will allow ourselves the usual freedom of topology which
means that we will allow the object to be distorted in any way as long as this
can be done continuously. So we may bend, stretch and pull a string but we
may never cut a string or glue two strings together; such actions are called
surgery and are said to change the topology. For braids, it is clear that if
we do not fix the endpoints of the curves, we shall be able to transform any
braid into any other yielding a rather boring theory; thus we also require the
ends to be fixed. We will call the equivalence relation for braids under these
conditions isotopy. Before we can define isotopy, we must define what we
mean by a topological deformation. An elementary deformation is the basis
for all topological deformations.
Definition 2.8 (elementary deformation). Suppose that a braid string
(recall that it was defined as a polygonal curve) has points A and B as vertices.
We may then create a further point C, delete the segment AB and create
the segments AC and CB. This deformation, and its inverse, is called an
elementary deformation if and only if the triangle ABC does not intersect
any other strings and only meets the current string along its side AB. See
figure 9 (b) for an illustration.
Definition 2.9 (braid isotopy). Two braids α and β are called isotopic,
denoted α ≈ β, if and only if α can be transformed into β using a finite
number of elementary deformations.
Suppose we were to label the string which intersects the point bi by i. On
l2 , the string labels from left to right would thus be in numerical order whereas
on l1 they may not be ordered numerically. If we list the numerical labels of
the strings which intersect l1 from left to right, we obtain a permutation
on the set of integers {1, 2, · · · , n}. A braid thus induces a permutation on
the set of the first n integers. For example, the braid in figure 9 induces the
permutation [2, 3, 1]. The fact that the induced permutation is an equivalence
class invariant follows immediately from the requirement that the endpoints
be fixed.
An open braid may be closed to yield a knot. See figure 10 for the closure
of the braid from figure 9. A closed braid, denoted α, is obtained from an
open n-braid α by deleting l1 and l2 and connecting points ai and bi with
non-intersecting polygonal curves in P for all i : 1 ≤ i ≤ n. It is clear that
the closure of any braid yields a knot. Thus some knots may be represented
as closed braids. Unfortunately determining the closed braid, given a knot, is
not so easy. It is however possible and we shall solve this problem in sections
3.4 and 3.5. The proof of the fact that all knots may be represented as closed
braids, Alexander’s theorem, gave the initial momentum for studying braids
in detail [11]. Artin took up the challenge and constructed a theory of braids
with a view to use them to deal with knots.
Braids, Knots and Applications
a1
a2
a3
b1
b2
b3
15
Fig. 10. The braid from figure 9 is closed here. It is immediate upon simple transformation that this knot is the same as the simple loop or the unknot.
Exercise 2.10. A simple knot invariant is the number of components a knot
has. Show that the number of components of the knot α is equal to the number
of cycles in the permutation that the braid α induces.
Alexander’s theorem is usually proved by giving a topological method
with which to deform a knot into a closed braid. There exist several distinct
methods of doing so but most are not suitable for use; they are only employed
to establish the theorem. The proof given here is fundamentally different and
new to the best knowledge of the author. The theorem assumes that the knot
is oriented but if not the transformation is accurate up to orientation change.
Theorem 2.11 (Alexander [11]). Every knot may be represented as a
closed braid.
Proof. Consider an oriented straight line a in R3 which we will call the axis.
Choose a point O on a and construct a cylindrical polar coordinate system
which has O as its origin. The positive z, or upward vertical, direction is
directed parallel to a in the direction of its orientation. The polar angle φ
increases in the counterclockwise direction, as usual. Using this system, the
theorem claims that every knot K can be deformed with respect to a in
such a way that the polar angle of a point P going along any component
of K strictly increases or more simply: As we travel along the knot we will
go around the axis a without ever changing our counterclockwise direction.
Suppose we have n straight line segments si for 1 ≤ i ≤ n with endpoints
Ri and Si such that the polar angle of Si , φ(Si ) is is larger than φ(Ri ).
We may form any knot by subdividing these segments into a finite number
of straight subsegments, moving the endpoints of the subsegments and performing surgery which identifies Ri and Si for all i. Here, we will form the
knot K by keeping Ri fixed and moving the point Si creating new points Qi,j
indexed by j as necessary. Whenever it becomes necessary to move Si to a
16
Patrick D. Bangert
position of lower polar angle than the last Qi,j created, move Si once around
a creating a suitable number of points doing so and then continuing. After
the required knot is formed, we perform the surgery of identifying Ri and Si .
By definition of a knot as a polygonal curve such a construction is always
possible.
Q6
Q5
O
R
Q13
Q4
z
Q9
f
S
S
Q2
R
R
Q12
Q3
Q2
S
Q1
Q7
Q8
O
Q14
O
Q1
Q10
Q11
(a)
(b)
(c)
Fig. 11. Constructing the trefoil knot as a closed braid, see proof of theorem 2.11
for a discussion.
An example of this method applied to forming the trefoil knot is given in
figure 11. This proves the theorem.
⊓
⊔
2.4 The Braid Group
Fig. 12. The generator σi and its inverse σi−1 for the braid group Bn .
Braids, Knots and Applications
17
We note that any braid can be represented by a vertical stack of two types
of crossing, see figure 12. When all strings are vertical apart from strings i
and i + 1, we will denote this crossing by σi or σi−1 depending on whether
string i overcrosses or undercrosses string i + 1 respectively. It is thus clear
that any braid can be specified by a string of these symbols. We agree to
the convention that the left to right direction of the symbols representing
a braid shall correspond to the upward direction of the braid; that is, the
lowest crossing corresponds to the first symbol. This is a convention and
some other authors use the opposite convention. While care is required, no
serious consequences arise from this choice. For example, the braid in figure
2 (b) is σ15 (the power means that the symbol σ1 was repeated five times)
3
and the braid in figure 4 is σ1 σ2−1 σ1−1 σ2 . From now on, we shall denote a
braid by these symbols.
Definition 2.12 (braid word). We will call any sequence of σi±1 a braid
word.
Definition 2.13 (positive and negative braid word). If a braid word
contains only σi (and no σi−1 ) then it will be called positive. However, if it
is contains only σi−1 (and no σi ) then it will be called negative.
5cm
(a)
(b)
(a)
(1)
(b)
(2)
Fig. 13. (1) Two non-interfering crossings can be listed in either order and (2) a
crossing may be moved underneath an arch which overcrosses both strings involved
Consider the braid σ3 σ1 displayed in figure 13 (1a). This braid is clearly
topological equivalent to the braid σ1 σ3 displayed in figure 13 (1b). More
generally, every time two neighboring crossings are on distinct pairs of strings,
the order in which these crossings are listed in the braid word does not
topologically matter. Thus we arrive at the rule that
σi σj ≈ σj σi for |i − j| > 1
(1)
18
Patrick D. Bangert
which is usually called the far commutation relation as it embodies the fact
that generators sufficiently far from each other commute.
It also becomes clear that if we have an arch which over or undercrosses
two strings which then cross (see figure 13 (2a)), this crossing may be moved
onto the other side of the arch (see figure 13 (2b)). Thus the braids σ1 σ2 σ1
and σ2 σ1 σ2 are topologically equivalent. As this can hold anywhere in a braid,
we arrive at the second rule that
σi σi+1 σi ≈ σi+1 σi σi+1
(2)
which is typically called the braid relation. We find this name too vague and
so we will refer to this relation as the bridge relation as it symbolizes that
anything not in conflict with the principal pillars may move freely both below
and above a bridge.
After some experimentation, one notices that all the moves one may make
on a braid while preserving its topology can be reduced to applying the rules
in equations 1 and 2 to the braid word. We would like to prove that this is
always so.
Theorem 2.14. (Artin [16] [17]) The equivalence relation upon braid words
defined by the relations 1 and 2 is identical to the equivalence relation of braid
isotopy (see definition 2.9) upon the braids represented by the braid words.
Proof. Recall that any knot may be represented as a closed braid. The braid
contains all the crossings and Reidemeister’s moves define equivalence of
knots. Thus braid equivalence is Reidemeister equivalence of the braid. Move
zero would create an object which is not a braid but the others apply. Translating these into the σi notation and simplifying yields the given presentation.
From figure 12, it is clear that σi−1 is the inverse of σi . As we represent a
braid by a braid word in the σi from the bottom up, we can easily concatenate
two braids together. The braid αβ is constructed from the braids α and β by
identifying the top ends of α with the bottom ends of β. It is obvious that
concatenation is associative, i.e. (αβ)γ ≈ α(βγ) and that the concatenation
of two braids is a braid. Suppose ι is the braid of n vertical strings and no
crossings. We have ια ≈ αι ≈ α for any n-braid α. The braid ι acts as an
identity. Since we have closure, associativity, inverses and an identity, the set
of n-braids forms a group generated by the generators σi . We will denote this
group by Bn and refer to this family of groups as the braid groups. Because
of theorem 2.14, Bn has the presentation
σi σi+1 σi ≈ σi+1 σi σi+1 ,
Bn = {σ1 , σ2 , · · · , σn−1 } :
(3)
σi σj ≈ σj σi for |i − j| > 1
It is instructive to consider the braid group from another point of view
which curiously leads to the same presentation as given above in equation
3. Consider the space between the two parallel planes which contain l1 and
Braids, Knots and Applications
19
l2 respectively after the braid has been removed from it. This space has a
fundamental group which may be represented by a series of loops beginning
and ending on some randomly chosen base point b and going around the
removed braid strings. There are n distinct such loops which we shall call xi
with i running from 1 to n. The fundamental group is free of rank n with
the xi as generators. x1 is the loop around the first string from the left on
each level and so on for the other xi . From level to level a reassignment
of generators becomes necessary. This is called an automorphism and the
particular one we need here, ai is defined by
ai : xi → xi+1 ; xi+1 → x−1
i+1 xi xi+1 ; xp → xp (p = i, i + 1)
(4)
The map α : σi → ai is a homomorphism of Bn into the automorphism
group of Fn , the free group of rank n. It can be shown that the ai generate
a group with presentation identical to equation 3 under the homomorphism
α. In other words, a braid word may be regarded as an automorphism of Fn .
As the mapping merely consists of a change of symbol for the generators, it
is frequently useful not to make a distinction between a braid word as an
element of Bn and as an automorphism of Fn . In the next section, we will
introduce some other presentations of the braid group.
2.5 Other Presentations of the Braid Group
The presentation of Bn given in equation 3 is called the Artin presentation as
it was Artin who first used it in the paper which founded the field. The fact
that braids admit a group structure simplifies their treatment tremendously.
It can be shown that knots do not admit a group structure and this is one
reason why the problem of deciding if two knots are equal is so different from
the similar question about braids. It is difficult, however to extract useful
information from a presentation of a group. For this reason it is useful to
search for other presentations of the same group with special properties.
The Artin presentation has the appeal that it is very topological. It is easy
to draw the braid given the braid word and it is easy to read off the braid
word from a braid. Furthermore, both the far commutation and the bridge
relations are simple to perform. One disadvantage is that each braid group
has a different number of generators. Consider putting a = σ1 σ2 · · · σn−1 and
σ = σ1 . After some manipulation, we find the presentation
n
(5)
Bn = {a, σ} : an ≈ (aσ)n−1 , σa−j σaj ≈ a−j σaj σ for 2 ≤ j ≤
2
which we call the Coxeter presentation. The Coxeter presentation has the
advantage that all braid groups have just two generators but we have lost
some of the topological correspondence.
It would be nice to have a matrix representation of the braid groups. To
this end, we will represent the identity matrix of n rows and columns by
20
Patrick D. Bangert
In (recall that the identity matrix has unity entries in the leading diagonal
and zeros everywhere else). Then we define the mapping φn (σi ) of an Artin
generator σi to a matrix of n rows and n columns whose entries are Laurent
polynomials in the variable t (Laurent polynomials allow both positive and
negative powers of the variable). Expressed formally, this means
φn : Bn → GL n, Z t±1
(6)
where Z is the ring of polynomials. The mapping is defined by
Ii−1 0 0
0
0 1−t t
0
φn (σi ) =
0
1 0
0
0
0 0 In−i−1
(7)
It can easily be shown that φn is a homomorphism,
i.e. that φn (σi σj ) =
φn (σi )φn (σj ) where multiplication in GL n, Z t±1 is the usual matrix multiplication. A representation is termed faithful when the mapping φ giving
rise to it is injective, i.e. when x = y implies φ(x) = φ(y). This representation
is faithful for n ≤ 3 [139] and not for n ≥ 5 [29]. For n = 4 the answer is
unknown.
It should now be easy to write down a matrix representation for any braid
word. For example, if n = 3, then for φn (σ1 σ2 ) we have
1−t t 0
1 0 0
1 − t t − t 2 t2
0 0 (8)
φn (σ1 )φn (σ2 ) = 1 0 0 0 1 − t t = 1
0
1 0
0 01
0 1 0
This representation is called the Burau representation.
Recently a new presentation was invented by Birman, Ko and Lee [31]
which they used to solve the word and conjugacy problem in a new way. The
generators akl are defined by
−1 −1
−1
akl = (σk−1 σk−2 · · · σl+1 ) σl σl+1
σl+2 · · · σk−1
(9)
Topologically this is a crossing between two arbitrary braid strings k and l.
In akl , string k overcrosses string l and both strings overcross all other string
in between them to be able to cross and then overcross the in between strings
again to return to their original (but now switched) positions. Using these
generators, Bn has the presentation
Bn =
ats asr = atr ats = asr atr ,
{ats ; n ≥ t > s ≥ 1} : ats arq = arq ats for
(t − r)(t − q)(s − r)(s − q) > 0
(10)
which we call the band-generator presentation. In the Artin representation,
we number the strings from left to right on each level. Suppose we were to
Braids, Knots and Applications
21
label each string with a unique label which it would carry throughout the
braid. At the bottom of the braid, we number the strings from one to n as we
go from left to right. Each crossing in which string i overcrosses string j is
labelled with the generator gij . This presentation is called the colored braid
presentation as the string labels act like each string was made of a separate
color. This representation retains the complete information of the braid but
it is not immediately apparent whether a crossing is positive or negative in
the Artin sense. Note that this feature means that the generators gij are self
2
inverse, gij
≈ e the identity. We easily write down the braid group relations
in this presentation to get
Bn =
gij gik gjk = gjk gik gij ,
1 ≤ i, j ≤ n
: gij gkl = gkl gij for
{gij } for
i = j
(i − k)(i − l)(j − k)(j − l) > 0
(11)
We note that in the colored braid presentation, the fundamental braid ∆n
takes the form
∆n = g12 g13 · · · g1n g23 g24 · · · gn−1 n
(12)
gij
(13)
=
n−1
n
i=1 j=i+1
2.6 The Alexander and Jones Polynomials
The Burau representation of the braid group is important in the definition
of a revolutionary knot-invariant called the Alexander polynomial. We begin
with a braid word α, construct its Burau representation φn (α) and take the
determinant of the matrix [φn (α) − In ]1,1 where the subscript indicates that
the first row and column should be deleted. This determinant can be shown
to be a topological invariant of the closure of the braid α and is denoted by
△α such that
(14)
△α (t) = det[φn (α) − In ]1,1
Thus the Alexander polynomial of the braid σ1 σ2 of the above example is
△ = 1 which happens to be the same value as the Alexander polynomial
for the unknot. While σ1 σ2 is actually isotopic to the unknot, we could not
conclude this from its Alexander polynomial. The Alexander polynomial is
an incomplete invariant in that we can only say that if △K = △K ′ , then
K = K ′ . The converse is not true, in general. Nevertheless, the Alexander
polynomial is very important in knot theory. Let us compute the Alexander
polynomial for both trefoils (see figure 7). The ordinary trefoil is the closure
of σ13 and its mirror is the closure of σ1−3 . Now we have
3
−3
(1 − t)3 0
(1 − t)−3 0
φ2 σ 1 =
φ2 σ 1 =
(15)
0
t3
0
t−3
22
Patrick D. Bangert
and thus
△σ 3 = t 3 − 1
1
△σ3 = t−3 − 1
1
(16)
And since the Alexander polynomials of the two trefoils are distinct, the knots
must be distinct.
Many other polynomials invariants have been devised after the Alexander
polynomial, the most important is the Jones polynomial. The Jones polynomial is also an incomplete invariant of knots which was originally constructed
in terms of braids. We shall not prove that it is an invariant, nor that it is
incomplete but we shall give an easy method to obtain it. Even though it is
incomplete, it is a very powerful invariant in that it distinguishes many knots
not distinguished by other invariants such as the Alexander polynomial.
We define the tensor product of a p × q matrix A and a r × s matrix B by
a11 B a12 B · · · a1q B
a21 B a22 B · · · a2q B
(17)
A⊗B = .
.. . .
..
..
. .
.
ap1 B ap2 B · · · apq B
A ⊗ B is clearly a pr × qs matrix. We also define the trace of a n × n matrix
C by
n
cii
(18)
tr(C) =
i=1
Consider the matrix
µ(t) =
10
0t
(19)
and define
µ⊗n = µ ⊗ µ ⊗ · · · ⊗ µ
n times
(20)
then µ⊗n is a 2n × 2n matrix and tr (µ⊗n ) = (1 + t)n . Furthermore let
1 0
0 0
1
0
0
0
0 0 −t1/2 0
0 1 − t−1 −t−1/2 0
−1
;
R=
R
(21)
=
1/2
0 −t
0 −t−1/2
1 − t 0
0
0
0 0
0 1
0
0
0
1
2
where we use the convention that t1/2 = t.
After all these definitions, we are ready to define a map from the braid
2n × 2n
matrices with Laurent polynomial entries (Φn :
group Bn to the
1/2
n
Bn → M 2 , Z t , t−1/2 ) given by
Φn (σiǫ ) = I2 ⊗ I2 ⊗ · · · I2 ⊗Rǫ ⊗ I2 ⊗ I2 ⊗ · · · I2
i − 1 times
n − i − 1 times
(22)
Braids, Knots and Applications
23
where ǫ = ±1 and I2 is the 2 × 2 identity matrix. For some general braid
word β we have
β = σiǫ11 σiǫ22 · · · σiǫkk
(1 ≤ i1 , i2 , · · · , in < n; ǫj = ±1)
ǫ1
ǫ2
Φn (β) = Φn σi1 Φn σi2 · · · Φn σiǫkk
(24)
ǫ(β) = ǫ1 + ǫ2 + · · · + ǫk
(25)
(23)
If we now define
then the Jones polynomial is given by
Vβ (t) =
t
ǫ(β)−n+1
2
tr (Φn (β)µ⊗n )
1+t
(26)
and we have that if β1 ≈ β2 , then Vβ1 (t) = Vβ2 (t) for any two braids β1 and
β2 (not necessarily members of the same braid group).
Exercise 2.15. Compute the Jones polynomial for the 2-braid σ1 , the closure of which is clearly the unknot (solution follows).
We just compute and obtain
1 0
0√ 0
10
1−2+1
0 0 − t 0 0 t
t 2
√
tr
Vσ1 (t) =
1 + t 0 − t 1 − t 0 0 0
00
0 0
0 1
0
0
t2
0
0
0
= 1
0
t3
(27)
It is a well-known conjecture that the Jones polynomial recognizes the unknot, that is to say that the Jones polynomial is equal to 1 if and only if
the knot is isotopic to the unknot. Many people have been searching for a
proof and a counterexample and none has been found thus far. Resolving this
question is one of the more important open problems in knot theory.
Proving that the Jones polynomials is an invariant of closures of braids is
easy. For reasons of space, we simply outline the equations that need to be
checked by straightforward calculations.
Theorem 2.16. The Jones polynomial is a knot invariant.
Proof. By direct calculation, check
1. The mapping Φn is a homomorphism from Bn to M 2n , Z t1/2 , t−1/2 .
This can be done by checking that
Φn (σi σj ) = Φn (σj σi ) ;
(|i−j| > 1)
(28)
2. By Markov’s theorem, two closed braids are isotopic if and only if they
can be reached from each other by conjugacy and stabilization. Thus we
need to check if the Jones polynomial is invariant under these two moves,
Vγβγ −1 (t) = Vβ (t);
Φn (σi σi+1 σi ) = Φn (σi+1 σi σi+1 )
Vβ (t) = Vβσn±1 (t)
(γ, β ∈ Bn )
(29)
24
Patrick D. Bangert
The polynomial invariants can be calculated using so-called skein relations. These relations are expressions relating the polynomials of knots that
are identical except for a single local change. In braid language, the Alexander
polynomial of the closed braid β ∈ Bn , Aβ (z) is given by the relation
Aβσi (z) − Aβσ−1 (z) = zAβ (z)
i
(30)
together with the boundary condition that if the closure of β is the unknot,
A(z) = 1. The Jones polynomial Jβ (z) has the same boundary condition but
takes the skein relation
√
1
Jβσi (z)
− tJβσ−1 (z) =
z − √ Jβ (z)
(31)
i
z
t
Using these skein relations, it is possible to calculate the polynomial invariants straight from the diagram by successively eliminating crossings [116].
2.7 Properties of the Braid Group
In this section we will prove various propositions which enumerate the basic
properties of braids. The Artin presentation will be used for all these as for
most of the rest of the chapter.
Proposition 2.17. The braid group Bn has infinite order; it contains an
infinite number of distinct braids.
Proof. Consider the braid α = σ1 ∈ B2 . Clearly, αi ≈ αj if and only if i = j.
Therefore the family of braids αi ∈ B2 is infinite and thus Bn is of infinite
order.
⊓
⊔
Recall that the center of a group is the set of all those elements which
commute with all other elements in that group. The centre of the braid groups
will become important in many places and so we will construct it.
Definition 2.18 (fundamental word). The fundamental braid word ∆n ∈
Bn is defined by
∆n = σ1 σ2 · · · σn−1 σ1 σ2 · · · σn−2 · · · σ1 σ2 σ1
(32)
It is a simple matter of applying the braid group relations to find that
n
∆2n = (σ1 σ2 · · · σn−1 )
(33)
Exercise 2.19. Show that equation 33 follows from equation 32 by using the
relations in the Artin presentation of the braid group Bn given in equation
3.
Braids, Knots and Applications
25
Proposition 2.20. The center C(Bn ) of the braid group Bn is the set
(34)
C(Bn ) = ∆2i
n
for any (positive, negative or zero) integer i.
Proof. Recall that an element is said to be in the center of a group if and
only if every element of the group commutes with it. We are then claiming
that
2i
σj ∆2i
(35)
n ≈ ∆n σj
for all i and j. We are also claiming that any element which commutes with
all others has is an even multiple of ∆n . Topologically, it is clear that ∆n
commutes with everything by recognizing that ∆2n is a full twist of the entire
braid and thus any other braid must commute with it. Algebraically, the
proof is also simple (just use the braid group relations to move σj through
2
∆2i
n ) but lengthy and thus will be left to the reader. The proof that ∆n not
only is in the center but generates it is complicated and lengthy (a central
part is played by computations related to the Reidemeister-Schreier theorem)
and so the interested reader is referred to the literature [54].
⊓
⊔
Definition 2.21. The ascending braid word aj is defined by aj = σ1 σ2 · · · σj .
Proposition 2.22. In Bn , we have σi aj ≈ aj σi−1 for 1 < i ≤ j < n.
Proof. By use of the defining relations we have
σi aj = σi σ1 σ2 · · · σi−2 σi−1 σi σi+1 · · · σj
≈ σ1 σ2 · · · σi−2 σi σi−1 σi σi+1 · · · σj
≈ σ1 σ2 · · · σi−2 σi−1 σi σi−1 σi+1 · · · σj
≈ σ1 σ2 · · · σi−2 σi−1 σi σi+1 · · · σj σi−1
= aj σi−1
(36)
(37)
(38)
(39)
(40)
⊓
⊔
Proposition 2.23. For all i we have σi ∆n ≈ ∆n σn−i .
Proof. First consider the case i = 1. Then,
σ1 ∆n = σ1 an−1 σ1 σ2 · · · σn−2 ∆n−2
(41)
≈ an−1 an−2 ∆n−2 σn−1
= ∆n σn−1
(44)
(45)
≈ σ1 σ2 σ3 · · · σn−1 an−1 ∆n−2 by prop. 2.22
≈ an−1 an−2 σn−1 ∆n−2
Now consider the cases 1 < i < n,
(42)
(43)
26
Patrick D. Bangert
σi ∆n = σi an−1 an−2 · · · an−i+1 ∆n−i
≈ an−1 an−2 · · · an−i+1 σ1 ∆n−i by prop. 2.22
≈ an−1 an−2 · · · an−i+1 ∆n−i σn−i
= ∆n σn−i
(46)
(47)
(48)
(49)
⊓
⊔
Definition 2.24. Two positive n-braid words a and b are called positively
equal if and only if there exists a sequence of words Wi with 0 ≤ i ≤ p for
some finite p for which W0 = a, Wp = b, Wi is obtained from Wi−1 by a single
application of one of the defining relations of Bn , and all Wi are positive.
In other words, two braids are positively equal if we can transform one
into the other without ever having to use an inverse generator.
Proposition 2.25. Two equal positive braid words are positively equal.
Proof. The statement of the proposition is a trivial corollary to the statement
that the mapping ξ : σi → si for 1 ≤ i < n induces an embedding of the
semigroup Sn into Bn where Sn is defined by
si si+1 si ≈ si+1 si si+1 ,
Sn = {s1 , s2 , · · · , sn−1 } :
(50)
si sj ≈ sj si for |i − j| > 1
To show this statement, by Öre’s theorem [58], it suffices to show that Sn
is both right and left cancellative and is right reversible.
By right and left cancellative we mean that if ax = ay, then x = y
and if xa = ya, then x = y respectively. Right cancellative follows from
left cancellative by the fact that x = y implies R(x) = R(y) where R is
the operator which reverses the order of the generators in the word. Left
cancellative will be shown by induction over the word length l. The result is
trivial for l = 0, 1. Suppose the result is true up to l = k, then
By right reversible we mean that if x, y ∈ Sn , then there exist u, v ∈ Sn
such that ux = vy. Consider
∆n = an−1 an−2 · · · a1
(51)
+
≈ an−1 an−2 · · · at+1 (at−1 at−2 · · · a1 ) at
= yt σ t
(52)
(53)
where the word x+ is obtained from the word x by increasing the indices of
all generators by one. This shows that the fundamental braid is positively
equal to a braid ending in any of the generators. This proof can be trivially
reversed to show that it is also positively equal to a braid beginning with
any of the generators. Putting u = ∆m
n where m is the word length of y and
making use of proposition 2.23 easily shows that ux = vy.
This proves the proposition.
⊓
⊔
Braids, Knots and Applications
27
2.8 Algorithmic Problems in the Braid Groups
We have defined braids, elucidated their connection with knots and found
a group structure on braids. This group structure has certain properties of
which we enumerated a few important ones in the last section. There are
a number of questions which we may readily ask about braids, the most
significant of which we shall describe in this section. Clearly, we wish to
know both necessary and sufficient conditions for equivalence.
Definition 2.26 (word problem). Given two braid words α, β ∈ Bn , the
word problem asks whether α ≈ β.
The question of whether α ≈ β is identical to the question of whether
αβ −1 ≈ e, the identity in Bn . Thus the word problem reduces to recognizing
the identity element.
Recall that two elements a and b of some group G are called conjugate,
denoted a ≈c b, if and only if there exists a c ∈ G such that a ≈ cbc−1 .
The conjugacy condition becomes αγ ≈ γβ for two braid words α, β ∈ Bn
to be conjugate with respect to a third braid word γ ∈ Bn . We are naturally
interested under what conditions such a commutation relation exists.
Definition 2.27 (conjugacy problem). Given two braid words α, β ∈ Bn ,
the conjugacy problem asks whether there exists a third braid word γ ∈ Bn
such that αγ ≈ γβ.
Suppose α ≈ β, then we also have αγ ≈ γβ for γ ≈ e. Thus any equal braid
words are also conjugate but two conjugate braid words are not necessarily
equal and so the conjugacy problem subsumes the word problem.
The most central question in knot theory is that of classification: Given
two knots K1 , K2 are they topologically equivalent K1 ≈ K2 ? Markov has
found it possible to translate this question into a question about braids.
Imagine closing the braid cbc−1 . We may move the subbraid c through the
closure part so that it emerges on top of the rest of the braid, i.e. becomes
bc−1 c ≈ b. In other words, conjugation of a braid preserves closed braid
isotopy: Any two conjugate braids represent equivalent knots. Conjugation
is a sufficient condition but unfortunately not necessary. The braid e ∈ B1
is just a single vertical line segment which closes to the unknot. The braid
σ1 ∈ B2 is the braid of single positive crossings which also closes to the
unknot. As the braids are in different braid groups, they have a different
number of strings and are thus not conjugate to each other. Such braids can
be related through a move called stabilization.
Definition 2.28 (stabilization move). Given a braid α ∈ Bn , the operation α ↔ ασn±1 is called stabilizing the braid and is referred to as the
stabilization move.
28
Patrick D. Bangert
Note that stabilization changes the number of strings in the braid by one
and that we refer to both the addition and removal of a string as stabilizing.
Starting with e ∈ B1 , we stabilize once to obtain σ1 ∈ B2 . In this way, we can
move between two braids in different braid groups. Markov’s theorem states
that conjugacy and stabilization are enough for knot equivalence.
Theorem 2.29 (Markov [142], Birman [30]). Given two braids α ∈ Bn
and β ∈ Bm , we have α ≈ β if and only if β may be obtained from α by a
finite sequence of conjugacy or stabilization moves; we denote this by α ≈M β
and call α and β Markov equivalent.
In [142], Markov stated this theorem but the first complete published
proof appeared in [30]. We shall not prove this theorem here as it is difficult
and lengthy and would distract from the flow of the chapter. It is clear that
we are interested in approaching knot classification from a braid theory point
of view.
Definition 2.30 (Markov problem). Given two braid words α ∈ Bn and
β ∈ Bm , the Markov problem or algebraic link problem asks whether α ≈M
β.
By Markov’s theorem, a solution to the Markov problem would provide
a solution to the knot classification problem. As the Markov problem subsumes the conjugacy problem, we are presented with a hierarchy of three
combinatorial problems in group theory which would have significant weight
if a solution were found. Solutions exist to the word and conjugacy problems
and we shall develop new solutions in later sections. A solution to the Markov
problem only exists in the sense that there exists a knot classification scheme
based on 3-manifold classification. This is an indirect and unusable solution
as it is exponential in the amount of computing time required as a function
of the crossing number of the knots concerned.
As many braid words represent the same braid, we are naturally lead
to ask for a particularly simple representative. A very natural definition of
“simple” in the case of a braid word is the least length possible; the shorter
the word, the simpler it is. As length has an obvious minimum, we formulate
the minimal word problem.
Definition 2.31 (minimal word problem). Given a braid word α ∈ Bn ,
the minimal word problem asks one to find a braid word αm ∈ Bn such that
αm ≈ α and L(αm ) ≤ L(α′ ) for any braid word α′ ≈ α. The word αm is
the minimal word as it is, by definition, the shortest word in its equivalence
class.
The word problem is frequently solved by devising an algorithm which
finds a unique representative for the equivalence class of the element under
consideration. In many groups, this so called normal form is also of minimum length in the equivalence class so that word problem and minimal word
Braids, Knots and Applications
29
problem are solved together. Examples of such groups include free groups,
HNN-extensions and free products. For the braid groups, we shall find that
the minimum word problem is far more complicated to solve than the word
problem. In fact, under some very reasonable assumptions, the minimum
word problem in the braid groups can only be solved by what amounts to
a global search of the equivalence class. We shall outline these assumptions
and the methods by which the global search may be done in later sections.
3 Braids and Knots
3.1 Notation for knots
1
2
4
5
Start
6
3
Fig. 14. The procedure for obtaining the Dowker-Thistlethwaite code for the trefoil.
Dowker-Thistlethwaite Code When he originally invented knot theory,
Tait sought to construct a table of distinct prime knots. Two tasks had to be
undertaken: (1) An exhaustive list of all possible knots had to be constructed
and (2) all duplicates had to be struck from that list. Tait used mainly combinatorial methods to construct an exhaustive list and then tried to eliminate
duplicates by trying to deform knots into each other. Tait labelled each crossing by a letter of the alphabet. He named a knot by starting at some random
point and going along it in the direction of its orientation, writing down the
label of the crossings as he passed them. This string of letters is called the
Tait code of a knot. Clearly a knot with n crossings has a name consisting of
2n letters. There exist a finite, though large, number of possible such names
for any n. Not all possible names can arise from naming a knot, however and
Tait was able to find methods to determine if a specific name was valid.
Dowker and Thistlethwaite improved Tait’s methods and introduced their
own naming convention [78]. Consider a knot of n crossings and start at a
random point going along the knot in the order of its orientation. Name
the crossings in numerical order as you pass them giving each crossing two
30
Patrick D. Bangert
numerical labels (you will pass each crossing twice before returning to the
staring point). Each crossing will have two numbers associated with it, i and
j, say. We can construct an involution a from these by putting a(i) = j and
a(j) = i. Thus we have a(a(k)) = k for any label k. Note that a reverses
parity, that is if i is odd and a(i) = j, then j is even and vice-versa. We
agree to write ai for a(i), S for the sequence a1 , a2 , · · · , a2n and Sodd for the
sequence a1 , a3 , · · · , a2n−1 . The sequence Sodd completely determines both S
and a [78].
There are 2n different possible starting points on the knot and if it has
no orientation, there are two possible orientations. Not all sequences Sodd are
identical. The standard sequence Sstd for a knot will be the lexicographical
minimum over all possible Sodd . Consider, for example, the trefoil knot in
figure 14. The starting point is labelled in the figure and we proceed to name
the three crossings twice each in the order in which we encounter them. This
gives rise to the involution
a1 = 4, a2 = 5, a3 = 6, a4 = 1, a5 = 2, a6 = 3
(54)
which results in Sstd = 4, 6, 2.
Dowker and Thistlethwaite were able to determine both necessary and
sufficient conditions for a sequence of number to be realizable as a knot. This
algorithm is relatively simple and quick to implement and has been used
by them to tabulate knots. This code is very compact and easy to obtain
from a knot, but their tabulation methods focus on enumerating all possible
sequences and so we ask: How may we recover the knot given the code?
We note first of all that a knot of n crossings will get 2n labels (2n being
necessarily even). Suppose Sstd = b1 , b2 , · · · , bn and the original involution is
a. As Sstd is a standard sequence, we have that a2i−1 = bi for i ranging from
one to n. Because of the definition of a, we then have
a(a(2i − 1)) = a(bi ) = 2i − 1
(55)
Since a reverses parity and we list only the ai for i odd in the standard
sequence, all these ai are even. Thus we have recovered the entire involution
a. The crossings of the knot thus get the double names i and bi for i ranging
from one to n. Having gotten the complete labelling information, we can
draw the crossings on our paper as double points and connect them in order
of the labelling and thus retrieve the knot. We may not get the same number
of crossings that we had in the original projection but this does not matter
topologically.
Conway’s Basic Polyhedra We constructed the Alexander polynomial in
section 2.5. Starting from a knot, we must first construct a closed braid isotopic to the knot, then write down its Bureau representation and take its
determinant to obtain the Alexander polynomial. In practise this process,
particularly constructing a closed braid representative, is very complicated
Braids, Knots and Applications
•
•
•
•
•
•
0
∞
•
•
•
•
•
•
•
•
•
•
1
31
−1
Fig. 15. The four elementary tangles.
and time-consuming. When Conway looked for a mechanizable method, he
was lead to construct a new notation for knots. From this notation, he was
able to extract the Alexander polynomial so straightforwardly that he proceeded to calculate them all by hand rather than mechanize the method.
Fig. 16. The universal polyhedron.
A knot diagram has crossings and arcs connecting the crossings. If we
were to draw small circles around the crossings and then ignore what is in the
circles, we would have a template for the knot. Into the circles we could insert
any of the four elementary tangles of figure 15 to generate several knots, one
of which would be the original knot. The numerical names of the elementary
tangles arise from their classification which will not concern us here. Conway’s
notation derived from the observation that many knot diagrams are the same
after the crossings have been so removed. In such a way, we may generate
a large number of different knots starting from one such knot template and
inserting different tangles into different slots. Conway called these templates
basic polyhedra and was able to show that eight basic polyhedra are enough
to generate all the different knots up to and including 11 crossings [61].
The number of different basic polyhedra needed to generate the knots of
higher crossing number n increases sharply with n and as the polyhedra lack
pattern, the next one may not easily be generated from the previous ones.
This problem gave rise to the idea of the universal polyhedron to be discussed
next.
The Universal Polyhedron The universal polyhedron P (i, j) is defined by
figure 16. It has i rows and j columns of vertices which will be filled with
elementary tangles and which are connected by edges. It can be shown that
32
Patrick D. Bangert
any knot can be represented by some P (i, j) and that we may write this down
in a matrix form,
p11 p12 · · · p1j
p21 p22 · · · p2j
(56)
P (i, j) = . . .
.
.. .. . . ..
pi1 pi2 · · · pij
with the elements pkl ∈ {1, −1, 0, ∞}. For example, the knots up to and
including six crossings (see figure 8) are given by
−1 −1
31 =
01 = (∞)
−1 ∞
1 1 1
41 =
51 = 1 1 1 1 1
0
−1
∞
∞ 0 −1 −1
∞ 0 1
(57)
52 = −1 −1 −1 61 = 1 1 0 ∞
0 1 ∞
0 −1 −1
∞
1 1 1 ∞
1 1 1
62 = 0 −1 −1 ∞ 63 = 0 −1 ∞
0 1 ∞ 0
1 1 0
Theorem 3.1. Every regular projection of any knot may be represented by
the universal polyhedron P (i, j) for some i and j all the vertices of which
contain elementary tangles.
Proof. A regular projection of a knot is characterized by a finite number n
of double points and 2n arcs which connect the double points in a specific
manner. For sufficiently large i and j, the polyhedron P (i, j) can accommodate all double points in the form of ±1 tangles and can achieve the desired
connection of these by placement of 0 and ∞ tangles into it. This is obvious
because the 0 and ∞ tangles represent horizontal and vertical connectors in
the polyhedron. Because this connection may be achieved without ±1 tangles, it is clear that no further components, with the possible exception of
unknots, are created. Thus what remains to be shown is that no unwanted
unknots will be created.
There are ij vertices and 2ij edges connecting them in the empty polyhedron P (i, j). Eliminating one vertex by a 0 or ∞ tangle, eliminates two edges.
Apart from the ±1 tangles of which there are n, the final polyhedron will contain ij − n tangles of type 0 and ∞ which will have eliminated 2(ij − n) edges
from the original polyhedron, leaving exactly 2n edges which are needed to
connect the double points. Thus there is no extra edge left over which could
possibly form an extra component. Therefore any knot may be represented
using the basic polyhedron P (i, j) and elementary tangles.
Braids, Knots and Applications
33
3.2 Braids to Knots
Suppose we have a braid b given by a braid word and we want to denote
the knot that is isotopic to its closure in the standard notations. The universal polyhedron (figure 16) turned through π radians becomes a closed braid
template if every vertex is filled with tangles of the types 1, -1 and 0.
The n-braid b will be specified by a function b(t) = σi±1 which gives the
tth Artin generator of b for 1 ≤ t ≤ c where c is the number of crossings in the
braid. The map ξi will map an Artin generator σj±1 to the elementary tangles
1 and -1 if the exponent of the Artin generator is 1 and -1 respectively and
i = j and will map any Artin generator to the elementary tangle 0 otherwise,
ξi (σi ) = 1
ξi σi−1 = −1
ξi σj±1 = 0 for i = j
(58)
(59)
(60)
The closed braid b can be contained in the polyhedron P (n − 1, c) with
pij = ξi (b(j)) with 1 ≤ i < n and 1 ≤ j ≤ c.
For example, b = σ13 . Then b(i) = σ1 for i = 1, 2, 3 and we get
σ13 = 1 1 1
(61)
which correctly represents the trefoil knot. In the next section we will generalise this example to an infinite family of knots known as torus knots.
3.3 Example: The Torus Knots
The torus knots are an infinity family of prime knots which have particularly
simple properties and are frequently used as examples in knot theory texts.
The connection between braids and knots is readily illustrated in the case of
torus knots and this is what we shall do below.
Definition 3.2. Given two co-prime (no common factors apart from unity)
integers p and q, the torus knot Tp,q is constructed by wrapping a closed curve
around the surface of a torus such that it encircles it p times meridionally
and q times longitudinally (respectively the short and the long way around).
Torus knots are completely characterized by the two integers p and q.
They are invertible (isotopic under switching the orientation) and chiral (not
isotopic to their mirror image) [48]. The fundamental group of their complements is given by π1 (Tp,q ) = {a, b} : ap = bq [118] from which we may
recognize the requirement that p and q be co-prime. It may be shown that
Tp,q = Tq,p . The torus knots are among the few knots for which the minimal
number of crossing-switches required to transform the knot into the unknot,
i.e. the unknotting number, is known; it is (p − 1)(q − 1)/2 [1]. They are also
34
Patrick D. Bangert
among the few knots for which the minimal number of crossings in any projection, i.e. the minimal crossing number is known; it is min[p(q −1), q(p−1)]
[211].
Exercise 3.3. Given the above fundamental group show that p and q must
be co-prime to generate a distinct knot and if co-prime completely classify
the torus knots.
Exercise 3.4. Show that Tp,q = Tq,p .
The simplest example of a torus knot is the trefoil. It is not the unknot
even though Tp,1 for any p would be isotopic to the unknot but p and unity
are not coprime. The trefoil knot is T3,2 and the knot 51 is T5,2 . In general,
q
the closed p-braid (σp−1 σp−2 · · · σ1 ) is isotopic to the torus knot Tp,q . This
is easily seen by picturing Tp,q on an actual torus. We cut the torus across
a random meridian (the short way around) and straighten it into a cylinder.
The remainder will be the braid above. Moreover, there exists no closed braid
representative of Tp,q with less than p strings so that p is the braid index of
Tp,q .
Exercise 3.5. Draw T3,4 on a torus and then cut the torus across a meridian
4
and show that T3,4 is isotopic to the closed braid (σ2 σ1 ) .
Exercise 3.6. Show that the Alexander polynomial of Tp,q is given by
△Tp,q =
(1 − tpq )(1 − t)
(1 − tp )(1 − tq )
(62)
As we have seen, any torus knot can be represented as the p-braid b =
q
(σp−1 σp−2 · · · σ1 ) . By using the method of the last section, we can represent
Tp,q in the polyhedron P (p − 1, q(p − 1)).
1
1 ···
1
···
··· ···
···
1
1
···
1
(63)
Tp,q =
1
1
··· 1
1
1
··· 1
The Dowker code may be obtained from a knot represented in our notation by simply walking through the polyhedron and labelling the crossings.
As the polyhedron is structured, this walk is perfectly definite and can be
programmed easily on a computer.
3.4 Knots to Braids I: The Vogel Method
A braid is more structured than a knot and so the transition from knot to
closed braid is harder to effect than the reverse. There exists a simple method
Braids, Knots and Applications
or
35
→
Fig. 17. Both types of crossing have to be reconnected in the shown way in order
to obtain a diagram of Seifert circles from a knot diagram.
due to Vogel [198] which we shall present without proof in this section. Suppose we are faced with a knot diagram D which we want to convert into a
closed braid. For this method, we shall have to view D in a variety of ways.
From the diagram, we can get to the projection P of the knot onto the plane
by viewing each crossing as a double point and thus ignoring over and undercrossing information. From D, we can construct a diagram S by reconnecting
each crossing in D in the manner shown in diagram 17. The diagram S will
contain a number of unknots which we will call Seifert circles. Using these
constructions, we can define the crucial concept in Vogel’s method.
Definition 3.7 (admissible triple). Let f be a face of P and a and b be
two edges of P . The triple (f, a, b) is called an admissible triple if and only
if it satisfies: (i) a and b are contained in different Seifert circles and (ii) a
and b have the same orientation with respect to any orientation of ∂f , the
boundary of f .
It is shown in [198] that the following algorithm will transform any knot
diagram D into a diagram of a closed braid.
Algorithm 3.8 Input: A knot diagram D. Output: A knot diagram D′ ambient isotopic to D and in the form of a closed braid.
Fig. 18. The two types of admissible triples are shown in the solid curves and the
form into which they should be transformed is shown in the dashed curves.
36
Patrick D. Bangert
1. Determine if D has an admissible triple. If yes, continue. If no, D is in
the form of a closed braid and the algorithm is done.
2. Admissible triples can come in the two flavours shown in the solid curves
in figure 18. Each admissible triple detected, is to be transformed (via a
Reidemeister move type 1) from the solid curve to the dashed curve in
figure 18. Such a transformation will be called an elementary transformation. Then go back to step 1 of the algorithm.
It can be shown that algorithm 3.8 always terminates after at most
(s − 1)(s − 2)/2 elementary transformations where s is the number of
Seifert circles in S. The braid which this algorithm generates has at most
n + (s − 1)(s − 2) crossings where n is the number of crossings in D as the
elementary transformation adds two crossings each time it is applied. It is unclear whether algorithm 3.8 is confluent, that is whether the order in which
we perform elementary transformations should two (possibly overlapping)
triples be simultaneously admissible changes the final outcome.
3.5 Knots to Braids II: An Axis for the Universal Polyhedron
Having constructed a new notation for knots, we wish to solve the problem
of how to extract a closed braid from the matrix which is isotopic to the knot
described by the matrix. A few algorithms have been constructed in the past,
which convert a knot into a closed braid but they are difficult to implement
because they depend upon topological deformation of the knot projection
[129] [31]. The best known algorithms have been implemented [198] [219] and
have complexity O(n2 ). We shall present an algorithm which achieves the
conversion with complexity O(n), increases the number of crossings only in a
few cases (and then only by a few crossings) and uses a linearly bounded
number of strings. There exists no algorithm to calculate the number of
strings which are at least necessary to describe a specific knot — the braid
index of the knot. Because of this, it is not possible to say how close to the
minimum the number of strings used by our algorithm is. The number of
crossings is sometimes increased because it has been found that there are
knots for which any closed braid representative has more crossings than the
minimal knot diagram; the knot 5.1 in the standard tables is the simplest
example of this [174]. Our algorithm is valid both for oriented and unoriented
knots.
An Example Alexander’s theoremiAlexander’s theorem was proven by
showing that every knot can be deformed into a form where the knot loops
around an axis a finite number of times without local maxima or minima with
respect to that axis. If we cut the string along the axis in one place, we obtain
a braid. The gluing back of the cut constitutes the canonical closure. Thus as
far as the canonical closure is concerned, the finding of an appropriate axis
is the key. Having obtained a canonically closed braid which is equivalent to
Braids, Knots and Applications
37
a knot, we may obtain a plait from it by considering the closure curves part
of the braid diagram and moving them into the middle of the braid diagram.
The next section gives an example of this.
A
Fig. 19. The trefoil knot with an axis for braiding it.
For the rest of this section, we are going to work through an example
of our method. Consider the trefoil knot in figure 19. We have drawn an
axis through it by the following method: (1) We drew a line through the
projection of the trefoil which intersects every region of the plane at least
once, (2) begins and ends in the infinite region and then (3) assigned the
under and overpasses of the knot under and over the axis by traversing the
knot from a random starting point (point A in the figure) while (4) assigning
the passes alternately as we met the crossings of axis and knot. Next we
perform a coordinate transformation from the knot reference frame (figure
19) to the axis reference frame in figure 20 by pulling the axis straight.
We can easily observe from figure 20 that the axis is valid; i.e. if we traverse
the knot starting at A we will travel around the axis without local maxima
or minima permanently in a clockwise direction. If we now cut the knot at
those points at which it overcrosses the axis and lay out the ends carefully
to either side, we shall obtain the braid σ1−1 σ2−1 σ1−1 σ2−1 shown in figure 21
(a). To get back to the trefoil from this, we perform the canonical closure
which is identical to sealing the cuts made above. This is shown in figure 21
(b). This knot has four crossings and is ambient isotopic to the trefoil thus
there is some inefficiency in our braid representation (note however that there
exist knots for which the most efficient braid representation contains more
crossings than their most efficient knot projection [174]). We note that we
may lift the arc labeled in figure 21 (b) to remove one crossing. This move
also removes a string and so we obtain the braid of figure 21 (c). This braid
has two strings and three crossings, it is thus the most efficient representation
of the trefoil as the trefoil must have at least this many strings and crossings.
38
Patrick D. Bangert
A
Fig. 20. The trefoil knot as it appears after the axis has been straightened from
figure 19. For reference the point A has been labeled here again.
We conclude that the closure of the braid σ1−1 σ1−1 σ1−1 is ambient isotopic
to the trefoil knot. Note that we may turn the entire figure 21 (c) about
a vertical axis through its center and thus obtain the result that the braid
σ1 σ1 σ1 is ambient isotopic to the trefoil also; this, finally, is the well-known
braid representation of the trefoil knot. This is the prototype for a general
method which we shall develop below.
Platting a Knotiplait The diagram of a knot which is expressed as a closed
braid may be naturally divided into two parts: the braid and the closure.
The most important feature of the braid part, for our purpose, is the requirement that all strings be monotonic increasing in the vertical coordinate,
that is they may only go side to side and never double back on themselves.
In this light, consider turning the polyhedron P (i, j) clockwise by π/2. If
the polyhedronipolyhedron does not contain any ∞ tangles, this is already a
canonically closed braid. However, in general, the polyhedron will contain ∞
tangles. Note that the rotation will make the ∞ tangles look like 0 tangles.
In an effort to rid ourselves of the ∞ tangles, we take the top string in the
∞ tangle and move it all the way to the bottom of the knot diagram and
move the bottom string all the way to the top. In this way, we have created
two extra strings in the braid which are closed in the plait manner. If we do
this for all ∞ tangles, we will have a valid braid in the center of the diagram
but the closure mechanism will be a hybrid between the canonical and plait
methods. In order to rectify the situation, we move the strings which are
closed in a canonical manner into the center of the braid diagram, thereby
Braids, Knots and Applications
39
Lift
(a)
(b)
(c)
Fig. 21. The braid which is extracted from figure 20 by cutting the trefoil knot at
its overcrossings over the axis and laying out the ends is displayed in part (a). The
closure of this braid is part (b). If we lift the arc labeled in part (b) we obtain the
braid in part (c). See discussion in the text.
creating more strings and more crossings. Once this has been done, we have
a fully valid braid closed in the plait manner which is ambient isotopic to the
knot we started with. Figure 22 shows the process of converting the unknot
−1 1
(64)
U=
∞ −1
into the braid σ2 σ4−1 σ3 σ4 σ5−1 σ6−1 σ4−1 σ5−1 σ4 σ6 closed in the plait manner. This
procedure is valid generally and clearly represents a readily implementable
algorithm for transforming a knot given in our notation into a plait. If the
original knot is given in the polyhedron P (i, j) and has k tangles of type ∞,
then the number of strings required in the plait is 2(i + k + 1) but the number
of crossings depends upon the exact configuration.
Laying the Axis As mentioned before, the transformation of a knot projection into a canonically closed braid centers around finding an appropriate
axis for the string to wind around. This was the central point of Alexander’s
theoremiAlexander’s theorem which proves that such an axis may always be
found. A ready method for finding an axis is given in the following algorithm.
Algorithm 3.9 Input: A knot projection. Output: A knot projection with an
axis around which the knot winds without local maxima or minima.
1. Begin with enumerating the regions into which the knot projection divides
the plane, suppose there are R of these.
2. Choose two arbitrary points in the infinite region and call them A and
B.
40
Patrick D. Bangert
Fig. 22. The conversion of a knot into a plait.
3. Draw a line L connecting A and B in such a way that the line intersects
every region at least once.
4. Choose a random point on each of the knot’s components and traverse the
knot in the direction of the orientation once for each component starting
at the chosen point. While traversing label each intersection of L with
the knot alternatingly with a + or − sign starting with +.
5. Interpret each + crossing as an overcrossing of L over the knot and each
− crossing as an undercrossing of L under the knot. The line L oriented
from A to B is then a valid axis.
This algorithm may clearly be applied to our polyhedron P (i, j). However
we have the problem of the regions which depends upon the exact configuration of the knot. This can be solved by forcing the line L to intersect every
region in the polyhedron and therefore intersecting some regions of the knot
more than once. This is unfortunate but unavoidable if we are seeking a general solution of the problem. The manner in which this may be done most
economically is illustrated in figure 23. The line L is the dotted line beginning
at point A and finishing at point B. If the polyhedron has an odd number
Braids, Knots and Applications
41
C
A
B
Fig. 23. The axis of the braid through the polyhedron P (i, j)ipolyhedron.
of columns (as the one in figure 23), then the line L is best described by
the dotted line in figure 23. If however, the polyhedron has an even number
of columns, then the line L is best described by the dotted line in figure 23
from point A to point C and then the dashed line from point C to point B.
If algorithm 3.9 is correct then a line drawn in a general polyhedron P (i, j)
according to this example is a valid braiding axis.
We may find an axis which passes through every region exactly once, if
possible, by the following algorithm.
Algorithm 3.10 Input: A matrix describing a knot in our notation. Output: A matrix describing the regions of the knot. Each element of the matrix
receives a label from 1 to R, the number of regions. This gives complete information about which regions of the polyhedron are connected and how many
there are.
1. Begin at the top left of vertex (1, 1) and follow the boundary downwards,
as for counting regions, the orientation of the knot does not matter. Mark
the region (0, 1) with a 1, the current marker, in the region matrix.
2. In following the boundary, one will come to vertex (1, 1); we assess its
value and continue. If we stay in the same region of the polyhedron we
continue, if we enter a new region of the polyhedron, then this new region
of the polyhedron belongs to the same region of the knot as the previous
one and thus we mark it with the current marker in the region matrix.
The whole issue at hand is that the regions of the polyhedron are known
while we wish to gain knowledge of the regions of the knot.
3. We continue to follow the boundary until we reach the point of origin.
4. We search the matrix for an unmarked region. If there exist unmarked
regions, we increment our current marker and choose one of the regions
42
Patrick D. Bangert
as our new starting region and choose a point upon its boundary as our
new starting point. Then, we repeat the algorithm from step 1, marking
the region with the current marker.
5. Once no unmarked region of the polyhedron exists, the algorithm is finished. The largest marker used in the matrix which we have obtained
is clearly the number of regions of the knot. Furthermore, since all connected regions are labeled with the same marker, we have a complete
knowledge of which regions of the polyhedron belong to the same region
of the knot.
Algorithm 3.11 Input: A knot projection given in our notation. Output: An
axis which passes through every region exactly once, if this is possible. If not
the output is an axis which passes through each region at least once.
1. Get the region information as prescribed in algorithm 3.10.
2. Construct a graph in which each region is symbolized by a node and two
nodes are connected by an unweighed edge if they are adjacent in the
plane.
3. A Hamiltonian circuit is then a path which passes through each region,
that is node, exactly once starting in the infinite region and returning
there. If a Hamiltonian circuit exists, so does an optimal axis. If no Hamiltonian circuit exists, we find an axis using algorithm 3.9 which gives an
axis which passes through every region at least once.
The advantage is that we will generate a braid with less strings but the
Hamiltonian circuit problem is NP-completeiNP-complete and so the execution of algorithm 3.11 is exponential (unless we use an approximation algorithm or it is shown that P = NP). This fact lends further weight towards the
usefulness of algorithm 3.9. The primary usefulness of this algorithm originates in the fact that the laying of the axis does not depend upon the exact
knot configuration, only the labelling does. Before we continue, we prove that
algorithm 3.9 always yields a valid axis, this essentially amounts to proving
Alexander’s theoremiAlexander’s theorem.
Theorem 3.12. Given any knot projection, algorithm 3.9 will find an axis
about which the knot is without local maxima or minima.
Proof. Alexander’s theorem [11]iAlexander’s theorem states given a knot
projection, it is possible to deform it with respect to a point P in the projection plane that after the deformation a point A which travels along the
knot in the direction of its orientation will travel around the axis defined by
P (the axis is a line perpendicular to the projection plane intersecting it at
P ) in a constant fashion, either clockwise or counterclockwise, for the entire
circumnavigation of the knot. We wish to do the opposite, namely to deform
the axis around the knot projection to achieve the same ends. We can imagine
the process of laying the axis as akin to sewing in which we move the needle
Braids, Knots and Applications
43
up from and down onto the plane. Morton [157] has constructed a similar
method to ours which he calls “threading.”
The knot divides the plane into several regions. If the axis does not intersect a particular region, the point A will change course during traversing
the knot and so the axis must intersect each region. It is however clearly only
necessary for the axis to intersect the region once. Choose a line in the plane
which intersects the axis. With respect to this line we can define an angular
coordinate θ going around the axis. As point A must travel around the axis
in a constant fashion it must, after it passes θ = 0, reach θ = π before it once
again reaches θ = 0. This shows that the axis, in the projection plane, must
over and undercross the knot alternately with respect to A. This fulfills the
requirements of an axis and these are assured by algorithm 3.9 and thus the
theorem is proven.
✷
Getting the Braid Having obtained the axis, we must now simply put
together all the pieces and construct the braid. This will be done via the
following algorithm.
Algorithm 3.13 Input: An axis L in a knot projection given in P (i, j) using our notation. Output: A braid the canonical closure of which is ambient
isotopic to the given knot.
1. Consider an empty polyhedron P (i, j)ipolyhedron and label each edge by
the row and column index of the vertex out of which it is emerging on
the right side giving it the further label a if it is the top edge and b if it
is the bottom edge. That is the top right hand edge coming out of the
vertex (1, 1) would be (1, 1)a .
2. All edges which intersect the axis L at a positive crossing are to be
numbered in order starting at point A; suppose there are k of these.
3. Starting at the numbered edges, use the traversal algorithm to follow
each edge around the knot until another positive crossing with the axis
L. All edges encountered are to be labelled with the same number as the
original edge.
4. When all edges are numbered, we have identified the individual strings
of the braid and numbered them in order. Assign a distance value of 1 to
each edge in the polyhedron.
5. Traverse the knot again as in step 3 but this time stopping at each double
point and extracting which labelled string passes over which other labelled
string and at which distance value this occurs.
6. When the whole has been traversed, we have a list of crossings specifying
which strings are involved, which string crosses over the other and at
what distance from the bottom of the braid the crossing occurs. This
information may be used readily to construct a colored braid, which may
be converted easily into an Artin braid word.
44
Patrick D. Bangert
7. We assess the string labels around the knot and calculate the permutation
associated with the braid which winds around our axis. If this permutation is different from the permutation of the braid which we obtained in
step 6, the residual permutation must be added to this braid in the form
of extra crossings.
The number of crossings is increased in some circumstances by a small
amount in step 7 of the algorithm. It is a fact that there exist knots of minimal
crossing number n which have closed braid representatives all of which have
crossing numbers greater than n [174]. Hence, step 7 is not a deficiency of
the algorithm 3.13 but a fundamental necessity.
It is clear from Alexander’s theoremiAlexander’s theorem[11] that this
algorithm works. The number of strings used is the number of positive crossings of the axis with the knot which is equal to half the number of crossings.
The number of crossings of the axis with the knot is
" j−2 #
!
j odd
4i + (2i + 2)
2
(65)
Nc =
2i + (2i + 2) j−2
+
2
j
even
2
where ⌊x⌋ is the greatest integer less than x. An analysis of the possibilities
in oddness and evenness of i and j reveals that Nc is always even which is
good since we must have an equal number of positive and negative crossings.
Algorithm 3.13 therefore finds a braid with a number of strings which
scales linearly in the number of rows and columns necessary to represent
the knot. It is conceivable that a more economical way of laying an axis
may be found using algorithm 3.11 but this has an exponential complexity.
The number of strings may be reduced after the braid has been found using
Markov’s theoremiMarkov’s theorem.
The determination of the regions, the laying of the axis, the labelling of
the axis crossings, the labelling of the edges and the extraction of the double
point information all take a time proportional to the number of vertices in
the polyhedron ij. The building of the braid from the crossing information
takes time proportional to ij. Therefore the entire algorithm to proceed from
a knotiknot projection to a canonically closed braid has complexity O(ij).
This algorithm succeeds in being readily implementable and in constructing
a braid which is reasonably small.
3.6 Peripheral Group Systems of Closed Braids
In this section we will investigate the peripheral group system of the closure of
the fundamental braids. The peripheral group system is a complete invariant
of knots and figures largely in knot theory. The fundamental braid words are
very important in braid theory and we choose them for this investigation for
that reason and that the closure of ∆3 is the Hopf Link and the closures of the
other fundamental braids look very similar to Hopf Links. In fact so similar
Braids, Knots and Applications
45
that we can regard the class of knots defined by the closure of fundamental
braids as a generalization of the Hopf Link. Another generalization of the
Hopf link has been investigated in the literature [52]. We shall see that our
methods developed here can be extended beyond fundamental braid words
to all braid words.
The Fundamental Group Consider a space X and a point x0 ∈ X which
we shall call the base point. In the space X, we may construct loops, i.e. paths
from x0 to itself.
Definition 3.14 (fundamental group). The group that consists of the
loops at x0 in the space X with respect to the homotopy equivalence relation
(continuous maps from one set of loops to another) is called the fundamental
group of the space X and is denoted by π1 (X, x0 ).
It can be shown that if X is path connected, the choice of base point does
not matter. All spaces we are about to consider are path connected and so
we shall drop the specification of the base point and denote a fundamental
group by π1 (X).
Definition 3.15 (knot complement). The complement of a knot K with
respect to a space X is the space X − V (K) where V (K) represents a tubular
neighborhood of the knot K.
Definition 3.16 (knot group). The group of a knot K, denoted by π(K)
is the fundamental group of the complement of the knot with respect to the
space X = R3 (sometimes X is taken as S 3 but it can be shown that the two
fundamental groups arising from X = R3 and X = S 3 are isomorphic).
Fig. 24. The labelling of the trefoil knot in order to yield a presentation for the
fundamental group of its complement.
Consider a knot K and its complement R3 − V (K). In this space, choose
a point x0 as the base point (the choice is arbitrary as the space is path
connected). Consider the projecting cylinder Z ∈ R3 which contains all of
46
Patrick D. Bangert
V (K) and is constructed such that the projection of K onto the plane z = 0
in R3 contains at most double points. This projecting cylinder will contain n
self-intersections if K has n crossings. Label these self-intersections by ai and
the sections of Z between the ai by si . Z is to be oriented in order to match
the orientation of K. Denote a loop from the base point to itself which goes
exactly once around si and no other sj by pi . From this construction, it is
clear that all loops (with respect to homotopy equivalence) can be constructed
as products of the loops pi . This can easily be seen by the fact that any path
in the complement can be continuously deformed into a product of loops pi .
Thus π(K) is generated by the loops pi . For an example see figure 24.
Having gotten the generators, we need the relations to obtain a group
presentation. Consider the loops encircling the ai and join them to the base
is contractible (homotopic to
point by a path ci , then it is clear that ci ai c−1
i
the trivial loop). The word in the group corresponding to this loop is then
a relation in the group. The presentation so obtained is called the Wirtinger
presentation of the knot group. This discussion proves that the following
algorithm to obtain it is correct.
•
xl
7•
'
xi
x
' k
•
•
(1)
•
xl
'
w
•
•
xi
x
' k
•
(2)
Fig. 25. The two possible forms of double points in the diagram of an oriented
knot. The crossing of type 1 has characteristic epsilon = 1 and the type 2 has
characteristic ǫ = −1.
Algorithm 3.17 (Wirtinger presentation of the knot group) Input: A
knot projection of a knot K. Output: The Wirtinger presentation of π(K).
1. Label all overcrossing arcs in the projection by gi for 1 ≤ i ≤ n where n
is the number of double points in the projection starting at any point and
then assigning the labels in order corresponding to the orientation of the
knot.
2. For each double point, determine its characteristic sign, see figure 25.
The characteristic can be most easily determined by the “right hand rule”
which says that if you spread your thumb at right angles from your fingers
and point it along the overcrossing arc, and if your finger point along the
undercrossing arc, the characteristic is 1 and -1 otherwise (along being
taken to mean along the orientation of the knot).
3. π(K) = {g1 , g2 , · · · , gn } | {r1 , r2 , · · · , rn } where the relators are given by
ǫ
−ǫ
rj = gj gi j gk−1 gi j and ǫj is the characteristic of the crossing associated
with rj .
Braids, Knots and Applications
47
It can be seen that one relation can be derived from the others and thus
a knot group has deficiency one. The knot group is an invariant of knots as
is trivially seen by definition but it is not complete. Thus if two knots have
isomorphic knot groups they are not necessarily isotopic. However if they
have non-isomorphic groups, the knots are distinct. The unknot U has the
knot group constructed by a single generator and no relations, i.e. π(U ) = Z,
the infinite cyclic group. It is a practical observation that the Wirtinger presentation can often be simplified considerably in that some generators are removable [97]. In particular, π(K) for the torus knot Tp,q , which is a knot that
winds around a torus p times the short way around (meridionally) and q times
the long way around (longitudinally), is given by π(K) = {a, b} : ap = bq
[118].
(a)
(b)
Fig. 26. The construction of the Wirtinger presentation of the fundamental group
of the complement of the (a) square and (b) granny knots.
The Square and Granny Knots The knot group is not a complete invariant. We wish to illustrate this by an example. The knot groups of the
square S and granny G knots are isomorphic but the knots are distinct. The
demonstration of this fact will occupy this section. For a picture of these
knots, see figure 26. We follow algorithm 3.17 to compute the knot groups.
Both knots receive six generators and six relations. All crossings in the granny
knot have characteristic -1 as well as three crossings in the square knot, the
other crossings in the square knot have characteristic 1. We thus write down
the Wirtinger presentations.
48
Patrick D. Bangert
{g1 , g2 , g3 , g4 , g5 , g6 } | g6 g2 = g2 g1 ; g5 g1 = g1 g6 ;
π(G) =
g1 g6 = g6 g2 ; g2 g4 = g4 g3 ; g4 g3 = g3 g5 ; g3 g5 = g5 g4
{g1 , g2 , g3 , g4 , g5 , g6 } | g6 g2 = g2 g1 ; g5 g1 = g1 g6 ;
π(S) =
g1 g6 = g6 g2 ; g3 g2 = g2 g4 ; g2 g4 = g4 g3 ; g4 g3 = g3 g5
(66)
(67)
Three generators may be defined in terms of the other three in both groups
and after some simple manipulation we obtain
{g1 , g2 , g3 } |
π(G) ≈ π(S) =
(68)
g1 g2 g1 = g2 g1 g2 ; g2 g3 g2 = g3 g2 g3
(a)
(b)
Fig. 27. The (a) square and (b) granny knots from figure 26 transformed into
closed braids.
Even though the knot groups are isomorphic, the knots are distinct. This
can seen by deforming the knots into closed braids and computing their Jones
polynomials. The transformation is straightforward and the result is shown
in figure 27. Reading off from the figure, we obtain that
G ≈ σ1−3 σ23 ;
S ≈ σ13 σ23
(69)
Recalling the algorithm to compute the Jones polynomial yields
2
VS (t) = t + t3 − t4
VG t = 3 − t3 + t−3 + t2 + t−2 − t + t−1 ;
(70)
and we see that the knots are distinct proving that the fundamental group is
a incomplete invariant.
Braids, Knots and Applications
49
Peripheral Group System The fundamental group is not a complete invariant but it is possible to refine our methods to construct a complete invariant from the fundamental group, the peripheral group system. This is the
only complete invariant of knots that we can readily compute for all knots.
The problem is that distinguishing knots via the peripheral group system
requires distinguishing groups with respect to isomorphism which is known
to be an undecidable problem [2, 3, 172].
The complement of a knot is uniquely specified (up to isomorphism) by
its peripheral group system which consists of the fundamental group and a
few subgroups thereof (this is Waldhausen’s theorem [201], see [104] for a
more accessible proof). It is however known that the word problem for any
fundamental group of any knot is solvable [202]. If the knot is alternating,
the conjugacy problem is also solvable [12].
We define the linking number of two curves a and b, denoted by lk(a, b)
as the weighted sum of the characteristics ǫ of each crossing. We define a
meridian mi and a longitude li of a knot component Ki by requiring the
following properties: (1) mi and li are oriented, polygonal, simple and closed
curves in ∂V (Ki ), the boundary of the thickened neighborhood of Ki which
we denote by V (Ki ), (2) mi and li intersect in exactly one point, (3) mi is null
homologous (mi ∼ 0) in V (Ki ) and li ∼ Ki in V (Ki ), (4) li ∼ 0 in C (Ki )
and (5) lk (mi , Ki ) = 1 and lk (li , Ki ) = 0 in S 3 . The above five properties
define mi and li uniquely up to isotopy on the boundary of V (K) [48] (see
figure 28 for an illustration). The meridian-longitude system pair M(K) for
a j-component knot K is the pair of sets ({m1 , m2 , · · · , mj }, {l1 , l2 , · · · , lj }).
Interestingly, if the longitude is trivial (equivalent to the identity element)
in the knot group, the group is infinite cyclic; i.e. the group is isomorphic to
the fundamental group of the complement of the unknot. Furthermore, the
meridians and longitudes commute with each other in any knot group [118].
Fig. 28. The thick curve displays the trefoil knot with an orientation. The thin
curve which is parallel to the trefoil knot is the longitude; the orientation of the
longitude is the same as the knot. The thin curve encircling both trefoil and longitude at the top left hand corner is the meridian. Note that the five conditions given
in the text are fulfilled by these curves.
50
Patrick D. Bangert
The meridians can be taken as the Wirtinger generators of the knot group.
The longitude of a knot may be read off the projection very easily. Begin with
the first generator and traverse the knot in the direction of its orientation.
Whenever undercrossing an arc, write down the generator of the undercrossed
arc to the power of the negative of the characteristic of the crossing. After the
full traversal, append as many copies of the initial generator (or its inverse)
to make the total sum of exponents equal to zero.
The meridians and longitudes of M(K) may be considered to be elements
of π(K) by choosing a path pi in C(K) from the base point x0 to the (unique
by definition) point mi ∩li for each i. Then the subgroup mi , li of π(K), generated by mi and li is independent of the choice of pi up to conjugation. The
peripheral group system of a j-component knot K is p(K) = (π(K); M(K)).
By an isomorphism φ between two peripheral group systems p (K) ≈φ p (K ′ ),
we mean π (K) ≈ π (K ′ ) such that φ (mi ) = m′ i and φ (li ) = l′ i for all i. It
can be shown that for any two knots K1 and K2 , p (K1 ) ≈ p (K2 ) if and only if
K1 ≈ K2 [118]. If we restrict attention to prime knots of a single component,
we have π (K1 ) ≈ π (K2 ) if and only if K1 ≈ K2 [118]. Thus the problem of
knot isotopy can be transformed into the problem of peripheral group system
isomorphism. Since it is not possible to determine, in general, if two groups
are isomorphic, this does not solve the knot classification problem.
4 Classification of Braids and Knots
In this section we will discuss the word, conjugacy, Markov and minimal word
problems introduced in section 2.8 in detail. There are a number of distinct
solutions to the word and conjugacy problems in Bn each of which has special
features and gives additional insight into the problem and braids in general.
We shall discuss briefly the solutions due to Garside as they are historically
the most important ones and have had ground-breaking influence on the field.
Then we shall discuss a new solution to both problems. The Markov problem
is unsolved at present but we will discuss some of its features and why it is so
difficult. Lastly, we will present a number of results about the minimal word
problem. It is computationally expensive to solve (NP-Complete) and so we
present a heuristic algorithm and some simulation approaches and interesting
results arising from them.
4.1 The Word Problem I: Garside’s Solution
In the Artin presentation, the word problem asks whether two n-braid words
η
α = σaǫ11 σaǫ22 · · · σaǫoo and β = σbη11 σbη22 · · · σbpp such that 1 ≤ ai , bj < n and
ǫi , ηj = ±1 for 1 ≤ i ≤ o and 1 ≤ j ≤ p are equivalent to each other (denoted
α ≈ β) under the equations σi σj ≈ σj σi for |i − j| > 1 and σi σi+1 σi ≈
σi+1 σi σi + 1. This problem is traditionally approached by trying to find an
Braids, Knots and Applications
51
algorithm which will use the two braid group relations to construct, from any
braid, a unique normal form. A unique normal form α of the braid α and the
corresponding form β of the braid β are exactly equal (α = β) if and only if
α ≈ β.
Artin was the first to describe a normal form to solve the word problem
for braids [17] but the normal form has a exponentially growing number of
crossings in terms of the original number of crossings and so is not as useful as
other methods. Garside constructed another unique normal form which has
many important properties [94]. Garside’s method begins with the crucial
proposition,
Proposition 4.1. For any σi−1 , we have σi−1 ≈ ∆−1
n ∆n−1 dn−1,i+1 di−1,1 .
Proof. Since ∆n = a1,n−1 a1,n−2 · · · a1,2 a1,1 and R (∆n ) ≈ ∆n , we have
−1
−1
−1
−1
−1
∆−1
n ≈ dn−1,1 dn−2,1 · · · d1,1 . Thus dn−1,1 ≈ ∆n d1,1 d2,1 · · · dn−2,1 . From the
definition of di,j , we have
σi−1 ≈ σi−1 σi−2 · · · σ1 d−1
n−1,1 σn−1 σn−2 · · · σi+1
≈
≈
≈
≈
≈
≈
di−1,1 d−1
n−1,1 dn−1,i+1
di−1,1 ∆−1
n d1,1 d2,1 · · · dn−2,1 dn−1,i+1
−1
∆n an−i+1,n−1 d1,1 d2,1 · · · dn−2,1 dn−1,i+1
∆−1
n an−i+1,n−1 ∆n−1 dn−1,i+1
−1
∆n ∆n−1 di−1,1 dn−1,i+1
∆−1
n ∆n−1 dn−1,i+1 di−1,1
for any i, which proves the proposition.
(71)
(72)
(73)
(74)
(75)
(76)
(77)
⊓
⊔
Together with the fact that σi ∆n ≈ ∆n σn−i (see proposition 2.23), this
′
means that we may put any n-braid word α into the form α ≈ ∆−q
n α where
′
α is a positive braid word and q the number of inverse generators present in
α. Next we need to construct the diagram D(α′ ) of the positive braid α′ .
Definition 4.2. The Cayley diagram D(b) (or diagram for short) of a positive braid word b is the set of all braid words equivalent to b.
Because of proposition 2.25 which states that two positive and equal braid
words are positively equal, the following algorithm obviously constructs D(b)
given a positive b.
Algorithm 4.3 Input: A positive braid word b. Output: The diagram D(b)
of b.
1. We define the set D0 (b) by D0 (b) = {b}.
2. The set Di (b) is obtained from the set Di−1 (b) by adding to Di (b) all
the braid words which can be obtained from any member of Di−1 (b) by
applying any braid group relation exactly once and the deleting all those
which are already contained in the sets Dj (b) for 0 ≤ j < j.
52
Patrick D. Bangert
3. Step 2 is recursively applied until an integer m is reached for which
Dm (b) = ∅. It is obvious from the construction of the sets that a finite m
always exists.
4. The set D(b) is then the union of the Di for 0 ≤ i ≤ m.
We note that, in general, D(b) contains a number of elements which grows
exponentially both with the length and number of strings in b. Once D(α) has
been fully enumerated we select from it a word of the form ∆pn α′′ for which
p is maximal. Then we construct D(α′′ ) and choose the braid word α′′′ from
D(α′′ ) which has the lowest integer associated with it, the decimal expansion
of which is given by the concatenation of the generator indices in the braid
word (σ2 σ1 σ3 has associated integer 213). The braid word α′′′ is called the
base of the diagram D(α′′ ). We define the Garside normal form of the braid
α to be αG = ∆np−q α′′′ . We refer to p − q as the Garside exponent and to α′′′
as the Garside remainder. It can be shown that the Garside normal form is a
unique normal form and that thus two n-braid words α and β satisfy α ≈ β
if and only if αG = βG . Executing this method in practise is time-consuming
due to the size of the diagram. There exists an efficient polynomial-time
algorithm to extract the maximal number of ∆n from α′ due to Jacquemard
[108] which we shall not present here.
Exercise 4.4. Find the Garside normal form for the 3-braid α = σ2 σ1−1 σ2 σ1 σ2
(the solution is below).
′
2 2
First we note that σ1−1 ≈ ∆−1
3 σ1 σ2 and so q = 1 and α = σ1 σ2 σ1 σ2 .
Then we have
D0 (α′ ) = {σ1 σ1 σ2 σ2 σ1 σ2 }
D1 (α′ ) = {σ1 σ1 σ2 σ1 σ2 σ1 }
D2 (α′ ) = {σ1 σ2 σ1 σ2 σ2 σ1 , σ1 σ1 σ1 σ2 σ1 σ1 }
D3 (α′ ) = {σ2 σ1 σ2 σ2 σ2 σ1 }
D4 (α′ ) = ∅
(78)
(79)
(80)
(81)
(82)
The word with maximal p is σ1 σ2 σ1 σ2 σ2 σ1 for which p = 1. Thus α′′ =
σ2 σ2 σ1 . Furthermore D(α′′ ) = {σ2 σ2 σ1 } and we have α′′′ = σ2 σ2 σ1 . Finally
we put this together to obtain αG = σ2 σ2 σ1 .
The word problem was first solved by Artin [17] and then by Garside
[94]. Both of these solutions were algorithmic with exponential complexity.
As mentioned above, Garside’s algorithm can be made polynomial time due to
a new algorithm by Jacquemard [108] to extract braids. The word problem for
braids is important enough for many people to have studied it after Garside.
The most efficient algorithm (linear in n and quadratic in L) is given in
[31]. Below we present a new algorithm based on rewriting systems. It is
not as efficient as the best algorithm for the word problem but it is easily
generalizable to the conjugacy case and it is very simple to apply. Because of
these features, we regard it as a competitive algorithm.
Braids, Knots and Applications
53
4.2 The Word Problem II: Rewriting Systems
In this section we will develop a new algorithm based on rewriting systems
which are used as a tool in theoretical computer science. We begin with a
finite alphabet of constants A and a finite set of variables X . A term t is a
finite ordered sequence of constants and variables t = a1 a2 · · · an with n ≥ 0
(i.e. empty terms are allowed) and ai ∈ A ∪ X . A word w is a finite ordered
sequence of constants w = b1 b2 · · · bm with m ≥ 0 and bi ∈ A. A substitution
ρ for a term t is a map which assigns a word to each variable in t; the resultant
word is denoted by ρt. A term rewriting system (TRS) R = {(li , ri )} is a set
of ordered pairs of terms li and ri . Each ordered pair in R is referred to as a
rule or rewrite rule and is often written in the form li → ri ; the whole TRS
is sometimes denoted by →R . A TRS R = {(li , ri )} is applied to a word
w0 by determining if w0 contains the word ρli , for some substitution ρ, as
a subword. If and only if w0 contains ρli is ρli replaced by ρri . If → is a
rewrite rule, then ← is its inverse, ↔ is its symmetric closure (← ∪ →) and
→⋆ is its reflexive-transitive closure (→ ◦ → ◦ · · · ◦ →). Two terms t and s
are said to be joinable if there exists a term r such that t →⋆ r ←⋆ s. Any
li is called a redex and any ri is called a reduct (these are abbreviations of
reducible expression and reduced term).
A word w0 is thus rewritten into a word w1 if and only if R may be applied
to w0 . We may generate a rewrite chain of words w0 →R w1 →R · · · in this
manner. R terminates if and only if there exists no rewrite chain of infinite
length. R is locally confluent if and only if any local divergence ← ◦ → is
contained in the joinability relation →⋆ ◦ ←⋆ . R is confluent if and only if
any divergence ←⋆ ◦ →⋆ is contained in the joinability relation →⋆ ◦ ←⋆ . R
is complete if it is confluent and terminates. If R is complete a unique normal
form exists for each word [19]; the final form obtained by applying R to the
word a maximum number of times.
It should be noted that the computational power of term rewriting systems
is identical to that of Turing machines, i.e. one may be simulated by the
other [192]. According to the Church-Turing thesis [59], this means that any
function which may reasonably be termed computable is computable using a
TRS.
It was proven by Birkhoff [40] that the symmetric-reflexive-transitive
closure ↔⋆R of a TRS R = {(li , ri )} is equivalent to the set of equations
E = {li = ri }. It is an obvious corollary to Birkhoff’s theorem that if there
exists a complete TRS R over the alphabet A = {fi , fi−1 } for which ↔⋆R
contains exactly the equations {E, fi fi−1 = e, fi−1 fi = e}, then R solves the
word problem for the group G = {fi }, E. Note that R also solves the word
problem for the monoid associated with G, i.e. the monoid obtained when
the inverses of the generators are added to the set of generators and the fact
that the generators and inverses are in fact inverses (fi fi−1 = e, fi−1 fi = e)
added to the set of equations.
54
Patrick D. Bangert
Termination It is, in general, undecidable whether a TRS terminates or not
[107]. Since any Turing machine can be modeled using a TRS this is essentially due to the undecidability of whether a Turing machine will stop, the
Turing Halting Problem [196]. It is however decidable for a TRS without any
variables [66]. Thus, in general, a termination proof is specific to a particular
TRS and must be given for it. A common strategy for proving termination
is to use a reduction order on the symbols involved in the TRS. We define
a reduction order <o as a strict order over the alphabet and variables of the
TRS which satisfies:
1. compatibility: For all terms u, v for which u <o v, we have xuy <o xvy
for any terms x and y.
2. closure: For all terms u, v for which u <o v and all substitutions σ, we
have σu <o σv.
3. basis: <o is well-founded, i.e. there exists a simplest term under <o .
If one can show that every possible rewriting operation simplifies any term
with respect to such an ordering, then the TRS terminates [65]. Furthermore,
a TRS R terminates if and only if there exists a reduction order <o which
satisfies ri <o li for every rule li → ri ∈ R [19]. This is true because every step
of the rewriting process simplifies the term and there exists a simplest term.
Another useful result is that a TRS terminates if and only if it terminates
for all instances of its redexes [67]. Some conditions under which the union
of two terminating TRSs is terminating are analyzed in [67].
Confluence Like termination, confluence is, in general, undecidable [19].
However, for terminating systems there exists a mechanizable method for
deciding confluence [105] that rests on Newman’s Lemma which states that
a terminating TRS is confluent if and only if it is locally confluent [163] (we
shall prove a generalization of this in lemma 4.13). Local confluence can be
decided by a systematic method which searches for critical pairs in the TRS.
The concept of critical pairs is difficult to trace in history; for an attempt at
a historical survey see [45] and for a good technical treatment see [105].
Given a TRS R = {(li , ri )}, an overlap is a word w = abc such that
ab = ρli and bc = ηlj for some words a, b and c, two (possibly equal) integers
i and j and substitutions ρ and η. Clearly the overlap abc may be rewritten
to both ρri c and aηrj . An overlap is non-critical if the reducts are joinable,
ρri c ↔⋆R aηrj and critical otherwise. A critical pair is the (unordered) pair
(ρri c, aηrj ) which arises from a critical overlap. It is obvious that if R contains
critical pairs, it can not be confluent. The fact that the non-existence of
critical pairs is both a necessary and sufficient condition for local confluence
is called the Critical Pair Lemma [113]. Later we shall prove lemma 4.14
which contains the Critical Pair Lemma.
Completeness If we can find a reduction order for a TRS R, thereby prove
termination and find that there are no critical pairs, R is complete and thus
Braids, Knots and Applications
55
solves the word problem for ↔⋆R . A general procedure for what to do when
we can not do this is called Knuth-Bendix completion from their seminal
paper [124]. Again a historical account of this procedure is tangled and [45]
is an attempt to unravel it. We shall follow the common practice to call it
Knuth-Bendix completion even though, by their own admittion, the initial
idea was not theirs.
Suppose we have a set of equations E on an alphabet A and a total order
<A (this is a reduction order) on A. Construct a TRS R from E by creating
a rule li → ri in R from the equation li = ri in E for all equations in E such
that the rules are ordered such that li >A ri . Now ↔⋆R is equivalent to E
and each rule represents a simplification in terms of <A . Clearly there exists
a simplest word, the empty word, and so R terminates.
If there are no critical pairs, R is locally confluent and thus complete.
If there are critical pairs, order them with respect to <A and append them
to R as new rules. Termination still holds and so we continue this process.
We may delete duplicate or redundant rules from R between the steps of
this method to obtain a smaller TRS. If this method terminates, we have a
complete system [124] [106]. If it does not terminate, a complete system may
still exist which contains an infinite number of rules. It is possible to collect an
infinite number of rules into a finite number of rules by introducing variables.
The Knuth-Bendix algorithm has been implemented by several people and
can be used to determine, in some cases, whether a complete system exists.
The CiME implementation was used for this thesis [138]. Producing rules
with variables and proving the non-existence of critical pairs is, at present,
beyond the computer implementations and must be done manually.
The process described here is simplified; there are more pitfalls, in general,
and the method has been considerably extended to take into account many
other features (many relevant references are in [45]). The method as described
is enough for our purposes here however and is generally enough for a word
problem in a finitely presented group.
Having reviewed TRS’s, we are now in a position to find a TRS for the
word problem in Bn . The braid group Bn is defined formally as
Bn = {σ1 , σ2 , · · · , σn−1 } : σi σi+1 σi = σi+1 σi σi+1 ;
σi σj = σj σi for |i − j| > 1
(83)
Given a finitely presented
group G = X,%E, we can define an associated
$
monoid M (G) = X ∪ X −1 , E ∪ aa−1 = 1 for any a ∈ X. It is clear that
the equivalence and conjugacy classes of the group G and the monoid M (G)
are identical. In order to solve the word problem for Bn , we augment the
monoid M (Bn ) with the generator of the center of Bn , ∆2n to form the
monoid
56
Patrick D. Bangert
±1
±2
±2
, ∆±2
M + (Bn ) = {σ1±1 , σ2±1 , · · · , σn−1
n } : ∆n σi = σi ∆n ;
±1 ∓1
∓2
∆±2
= e;
n ∆n = σi σi
±1/∓1
σi±1 σj
±1/∓1 ±1
σi for |i
±1 ±1 ±1
σi+1 σi σi+1
= σj
±1 ±1
σi±1 σi+1
σi =
− j| > 1;
(84)
It is obvious from the definition of the monoid M + (Bn ) that a solution of its
word and conjugacy problems provides a solution for the word and conjugacy
problemsiword problemiconjugacy problem in the group Bn .
We will use Knuth-Bendix completioniKnuth-Bendix completion upon the
oriented rules of M + (Bn ) under the reduction order <b
−1
−1
−1
∆2n <b ∆−2
n <b σ1 <b σ2 <b · · · <b σn−1 <b σ1 <b σ2 <b · · · <b σn−1
(85)
In practice, this process is laborious and would occupy prodigious space if
described in detail. For this reason, we will simply state the result and prove
it to be correct.
For what follows, we shall represent a braid of the form ∆2k
n P as the pair
(k, P ). The reason for this is to effectively remove from the braid, in the
process of rewriting, any subbraid which lies in the center of the braid group
Bn . The reason for this will become apparent when we extend our solution to
the conjugacy problem. Removing any ∆2k
n from any part of a braid can be
done without loss of information because ∆2k
n is the generator of the center of
Bn and thus its position is irrelevant. By Knuth-Bendix completioniKnuthBendix completion and the necessary manual labor, we obtain the following
rewriting system.
Wn = { (1) σi−1 →
i−1
[dj,1 a1,j ] di,1 a1,i−1
j=1
n−1
j=i+1
(2) σi σj → σj σi for j < i − 1;
[dj,1 a1,j ] & k → k − 1;
(3) σi σi−1 P σi → σi−1 σi σi−1 P ;
(4) σi σi−1 Qσi−1 Rdi,j → σi−1 σi σi−1 Qdi−1,j σi R+ for j < i;
(5)
n−1
i=1
di,1 a1,i Si →
n−1
i=1
Si & k → k + 1 }
(86)
The variables P , Q, R and Si are (possibly empty) words in the generators
σk (and not their inverses σk−1 ) subject to the restriction that the highest
generator index k is i − 2, i − 2, i − 1 and i respectively and the lowest
generator index in R is j, where i and j refer to the values of the generator
indices of the respective rules. The word R+ is obtained from R by increasing all generator indices in R by one. Note that rules 1 and 5 require two
replacements to be made simultaneously. A similar, unpublished TRS was
Braids, Knots and Applications
57
also found using Knuth-Bendix completion by Yoder [220]. Rules 1 and 5 are
simple to understand; the other rules are illustrated in figure 29.
Rule 2:
Rule 3:
Rule 4:
Fig. 29. Rules 2, 3 and 4 of TRS Wn illustrated.
Theorem 4.5. Wn is complete and solves the word problemiword problem
for Bn .
Proof. It can be checked easily but laboriously that the system terminates,
there are no critical pairs and that its symmetric-transitive closure is the
monoid we began with which proves the theorem.
58
Patrick D. Bangert
The rules of a TRS are to be applied in a non-deterministic way and a
complete TRS always reaches the unique normal form no matter what strategy of rule application is chosen [19]. Since Wn is complete and all strategies
are equivalent, we will choose the following strategy.
Algorithm 4.6 Input: A word w ∈ Bn . Output: A word w′ ∈ Bn which is
the unique representative of the equivalence class of w.
1. Apply rule 1 of Wn as many times as possible.
2. Apply rules 2, 3, 4 and 5 of Wn as many times as possible in order
proceeding to the next rule only if the current can no longer be applied.
3. Loop step 2 until no rule may be applied to the word at all. In this case
w′ has been found.
It is clear that algorithm 4.6 solves the word problem from the completeness of Wn and the fact that once rule 1 is applied as many times as possible,
it can not be applied again no matter what other rewrite steps follow as
there will be no more inverse generators. From this algorithm, we are able to
deduce the computational complexityicomplexity of this word problemiword
problem solution.
Theorem 4.7. Wn solves the word problemiword
problem for any word w ∈
Bn of word length l with complexity O l2 n4 .
Proof. This can be checked easily by counting how many times the rules are
used.
4.3 The Conjugacy Problem I: Garside’s Solution
Extending the word problem solution of Garside to the conjugacy case is not
hard. First we define two new terms.
Definition 4.8. If a positive word b = if for two braid words i and f such
that 1 ≤ L(i) ≤ L(b), then i is called an initial route of b and f an associated
final route. Note that the definition requires exact equality (=) and not group
theoretic equivalence (≈).
We begin by constructing all possible initial routes of ∆n . This is easily
done using D(∆n ). Replace all of these routes by the base of their diagrams
and delete duplicates. This is the set of initial routes of ∆n and denoted by
I (∆n ).
Exercise 4.9. Compute the set of initial routes of ∆3 . Solution:
{σ1 , σ2 , σ1 σ2 , σ2 σ1 , σ1 σ2 σ1 }
(87)
Braids, Knots and Applications
59
We will now form a set S(β) for a braid word β called the summit set of
the braid. This set is the analogue of the Cayley diagram, which we used for
the word problem, for the conjugacy problem. We construct the summit set
as follows. First construct the Garside normal form of β, i.e. βG , and note its
exponent. The set S1 (β) is then constructed by conjugating βG by each word
of I (∆n ), computing the Garside normal form of the result and deleting all
those words of lower exponent than βG . Iteratively, the set Si (β) is obtained
from the set Si−1 (β) by conjugating each element of Si−1 (β) by each word
of I (∆n ), computing the Garside normal form of the result and deleting all
those words of lower exponent than βG .
Suppose the Garside exponent of βG is m and its exponent sum is s.
Every word in any Si (β) has exponent sum s and Garside exponent p ≥ m
by definition. The Garside remainder of βG is βG and so we have
s = L βG − mL (∆n )
(88)
L βG − s
(89)
m=
L (∆n )
s − L βG
p≤
(90)
L (∆n )
but we also have p ≥ m and so there are only finitely many p that satisfy the
requirements. Hence there are only finitely many distinct words with Garside
exponent p and exponent sum s. Thus the process of constructing the sets
Si (β) terminates, i.e. there exists a finite integer j such that Sj (β) = Sj+1 (β).
Definition 4.10. We define the summit set S(β) to consist of all the elements of Sj (β) which have maximal Garside exponent. The summit exponent
t is the Garside exponent of all these braid words and the summit remainder
is the Garside remainder βS of the unique element in S(β) with smallest tail.
The summit form of β is then βS = ∆tn βS .
We state, without proof, the main result of Garside.
Theorem 4.11 (Garside’s Conjugacy Theorem [94]). Two braid words
β1 , β2 ∈ Bn are conjugate if and only if their summit forms are identical.
Proof. For a proof, see [94, 30].
Like the word problem, the conjugacy problem is very important for braid
and knot theory and so has received much attention. The first solution was
produced by Garside [94] and the best algorithms are given in [31, 84]. We
should remark that Jacquemard [108] has used his extraction algorithm to
obtain good practical results for small n. All these algorithms still require
an exponential amount of computation time as a function of n and L. The
important question of whether conjugacy is solvable in polynomial time is
solved positively in the next section.
60
Patrick D. Bangert
4.4 The Conjugacy Problem II: Rewriting Systems
Conjugacy in Free Groups Suppose that G = Fn the free group of rank
n. This group is generated by n elements {fi } for 1 ≤ i ≤ n and no relations
[110]. A general word w ∈ Fn takes the form
w = fsp11 fsp22 · · · fspmm ,
1 ≤ sk ≤ n
(91)
Since there are no relations in Fn , the word w is unique over its equivalence
class if and only if si = si+1 for all i. This condition is trivially obtained from
any word w ∈ Fn by applying the (obviously) complete rewriting system
Rw (Fn ) = {fsp fsq → fsp+q , ∀1 ≤ s ≤ n}
(92)
Thus Rw (Fn ) solves the word problem in any free group Fn . Moreover, it
does so in a time proportional to the length of the word w.
Consider now the conjugacy problem in Fn . We define the ith cyclic permutation C i (w) of a word w in the general form of equation (91) by
p′
p′′
m−1 pm p1 p2
C i (w) = fsjj · · · fspm−1
fsm fs1 fs2 · · · fsjj
such that
p′j +
m
(93)
pk = i
(94)
k=j+1
Intuitively, the ith cyclic permutation is obtained by taking the last i generators in the word w and moving them to the front of the word w one by one.
We shall say that two words w and w′ are cyclicly permutable (denoted ≈cp )
if and only if there exist an i such that C i (w) ≈ w′ . It is obvious that cyclic
permutability forms an equivalence relation for any group G.
Proposition 4.12. For any group G, the equivalence relation of cyclic permutability (≈cp ) is identical to that of conjugacy (≈c ).
Proof. Any group G has a presentation which may be obtained from some
free group Fn of rank n by adding relations [62]. Moreover, if the conjugacy
problem is solvable in one representation, it is solvable in all [147]. Suppose
w ≈cp w′ , then there exists an i for which
p′′
p′
m−1 pm p1 p2
w′ ≈ C i (w) = fsjj · · · fspm−1
fsm fs1 fs2 · · · fsjj
where
p′j +
m
pk = i
(95)
(96)
k=j+1
Let
p′′
γ = fsp11 fsp22 · · · fsjj
(97)
Braids, Knots and Applications
61
Then
p′
m−1 pm
w′ ≈ fsjj · · · fspm−1
fsm γ
≈
p′
γ −1 γfsjj
≈γ
−1
wγ
m−1 pm
· · · fspm−1
fsm γ
(98)
(99)
(100)
Thus we have w ≈c w′ . Now suppose w ≈c w′ , then there exists a γ such that
w′ ≈ γ −1 wγ
(101)
If the word length of γ is L(γ), then we have
C L(γ) (w′ ) ≈ γγ −1 w ≈ w
Thus w ≈cp w′ .
(102)
✷
Fig. 30. The word w given in equation (91) bent into a circle. While the circularity
removes the notions of beginning and end of a word, it preserves the directionality
of it.
We will refer to the set of words which contains the word w and all its
cyclic permutations as the cyclic word c(w). If L(w) = m, then this set
contains |c(w)| = m elements. Given two cyclic words c(w) and c(w′ ) we test
their equivalence by attempting to construct an isomorphism ι : c(w) → c(w′ )
such that ι(a) = a for all a ∈ c(w). Clearly |c(w)| = |c(w′ )| is a necessary
condition for the existence of ι. If and only if ι exists, the cyclic words are
considered equal, c(w) = c(w′ ). If and only if c(w) = c(w′ ), we have w ≈c w′
by proposition 4.12. The set c(w) may be visualized as the word w ”made
circular” as in figure 30.
The existence of ι may be established by testing the members of c(w)
for equality with the members of c(w′ ) pairwise in the following manner:
Select from c(w) an arbitrary member, a say. Check a for equivalence with
62
Patrick D. Bangert
all members of c(w′ ). Clearly, if and only if there exists a b ∈ c(w′ ) such
that a = b, an ι exists. Since every word has length m and there are m
words in c(w′ ), this comparison will take a time proportional to m2 . Thus
it is possible to test
the equivalence of two cyclic words of length m with
complexity O m2 .
Rewriting Systems for Cyclic Words We shall call a TRS cyclicly terminating, cyclicly confluent and cyclicly locally confluent if it is respectively
terminating, confluent and locally confluent under application to all cyclic
words over the alphabet of the TRS. It is obvious from the above discussion
that a cyclicly complete TRS solves the conjugacy problem. For this reason
it is important to develop results about cyclic completeness along the lines
of the results for linear words in order to obtain a conjugacy solution.
Termination in Cyclic Rewriting Systems We have seen that a TRS R
terminates if and only if a reduction order exists [19]. In what follows, we shall
assume that this reduction order is a total order; note that this is a stricter
requirement than that of a reduction order. Suppose that the alphabet of R
is A = {fi } for 1 ≤ i ≤ p. By assumption, p is finite. Consider the total
order <R defined by fi <R fi+1 for all i. This can be done without loss of
generality as a mapping from A to itself can change the order. Recall that R
terminates if and only if ri <R li for every rule li → ri ∈ R.
We introduce an integer valued weight metric function g(w) and an integer
valued length metric function L(w) on the set of words w written on the
alphabet A. The metrics satisfy
g (fa1 fa2 · · · fam ) = g (fa1 ) + g (fa2 ) + · · · + g (fam )
L (fa1 fa2 · · · fam ) = L (fa1 ) + L (fa2 ) + · · · + L (fam )
L (fi ) = 1
g (fi ) < g (fi+1 )
(103)
(104)
(105)
(106)
We shall call a rule length reducing if L(ri ) < L(li ) and weight reducing if
g(ri ) < g(li ). Any rule is a c-obstruction (for commutation-obstruction) if
and only if it keeps constant both length and weight. That is, it is a rule
which changes the position of the letters only.
A c-obstruction obstructs cyclic termination as there exist cyclic words
which would give rise to an infinite rewriting chain due the changing of relative position of subwords by the c-obstruction. An example is the cyclic
word c(αβαβ) under the TRS R = {αβ → βα}. The rewriting chain will
loop between the two states c(αβαβ) and c(βααβ); the period of the loop
may, in general, be arbitrarily large. Such looping may be dealt with in two
ways. Firstly, one may compare each new cyclic word with the entirety of
the rewrite chain so far enumerated. If equality is found, looping has been
detected and one may stop. Secondly, one may determine if a subword of the
current word commutes with the rest of the word. If this can be determined
Braids, Knots and Applications
63
and such a subword is found, the subword may be extracted from the word
and the two words should then be rewritten separately. The first method is
computationally expensive and does not produce a unique normal form as we
would have to consider the entire loop at the end of the rewrite chain as the
identifying set of the word. The second method is not necessarily applicable
but if it is, it will terminate in a set of subwords which uniquely identify the
word. The advantage of the second method over the first is that the number
of elements in the set has an upper bound.
The braid groups, as we have seen, have non-trivial center. In fact the
generator of the center contains every generator. This fact makes it possible
to rewrite any inverse generator in terms of inverses of the generator of the
center multiplied by generators. As in the word problem case, we shall remove
the generators of the center from the word and thus this replacement rewrites
the entire braid word with which we shall work in terms of generators only.
For the splitting of words to get rid of c-obstructions to fail we need to be
in a situation in which we have a word abc such that abc ≈ cab, ab ≈ ba,
ac ≈ ca, bc ≈ cb. This can only occur if there is cancellation between a and
b in the word ab but this can not happen if there are no inverse generators.
This proves that in groups in which inverse generators may be replaced by
inverses of elements of the center and generators, this method of overcoming
c-obstructions is valid.
We conjecture that a TRS R cyclicly terminates if and only if it terminates
and contains no c-obstructions or contains c-obstructions that can be removed
in the above way.
Confluence in Cyclic Rewriting Systems Newman’s Lemma [163] extends easily to the cyclic case as we show below.
Lemma 4.13. A cyclicly terminating TRS R is cyclicly confluent if and
only if it is cyclicly locally confluent.
Proof. The proof is similar to the standard proof (see [105]) and follows
immediately from figure 31.
The Critical Pair Lemma states that a TRS is locally confluent if and only
if it has no critical pairs. Recall that a critical pair arises from an overlap
of two redexes in a word which gives rise to a local divergence of rewriting
paths which do not meet again. Given a TRS R = {(li , ri )}, a cyclic overlap
is a cyclic word c(w) = c(abcd) such that abc = ρli and cda = ηlj for some
words a, b, c and d, two (possibly equal) integers i and j and substitutions ρ
and η. The cyclic overlap c(abcd) is rewritten to both c(ρri d) and c(bηrj ). A
cyclic overlap is non-critical if the reducts are joinable, c(ρri d) ↔⋆R c(bηrj )
and critical otherwise. A cyclic critical pair is the (unordered) pair of cyclic
words (c(ρri d), c(bηrj )) which arises from a cyclic critical overlap. It is obvious
that if R contains cyclic critical pairs, it can not be cyclicly confluent.
64
Patrick D. Bangert
Fig. 31. The proof of Newman’s Lemma (lemma 4.13) in diagrammatic form. We
begin at the top with a local divergence which is rectifiable by assumption and
thus by induction any global divergence is also rectifiable. It is because of this
diagrammatic proof that Newman’s Lemma is also known as the Diamond Lemma.
For example, consider the rewrite system R = {abxba → cxc} over the alphabet A = {a, b, c} and some variables x and y. Clearly R contains the cyclic
critical overlap abxbabyb which is to be rewritten into bxbcyc and cxcbyb. This
cyclic critical pair may be resolved by noting that if the variable contained
between the c letters is less than the other, it is that cyclic word which is
to be prefered under the lexicographic order c < b < a. That is, we have to
add a conditional rule depending on the relative value of the variables. This
global rule must be applied, if applicable, with preference over the ordinary
local rule. In this way we have extended Knuth-Bendix completion to the
cyclic case; note that all rules added in this procedure are global whereas the
usual rules of normal TRS’s are local. We shall now prove the extention of
the Critical Pair Lemma for the cyclic case.
Lemma 4.14. A TRS R = {(li , ri )} is cyclicly locally confluent if and only
if it contains neither critical nor cyclicly critical pairs.
Proof. This can easily be checked by going through all possible types of
overlap.
It should be emphasized that the proof lemma 4.14 does not make any
assumptions about the termination of R. So we have a definite method for
attempting to find a conjugacy problem solution in terms of rewriting. We
shall use the braid groups to give an example of this completion process.
The Conjugacy Problem in Bn Consider the TRS Wn of equation 86.
We have already shown that Wn is complete and solves the word problem for
Bn . We shall find that it is neither cyclicly terminating nor cyclicly locally
confluent. By a Knuth-Bendix-like completion process, we are able to obtain
Braids, Knots and Applications
65
a system which is cyclicly locally confluent. This system will be cyclicly terminating if all c-obstructions are removed, which is possible. The result will
be a cyclicly complete system which thus solves the conjugacy problem in
Bn . We find four cyclic critical overlaps and make four rules out of these.
Furthermore, the augmented system is found to contain no critical pairs.
Consider the TRS Gn below which is understood to contain only global
rules for cyclic words, i.e. the entire word has to be matched to redexes in Gn .
The restrictions on the variables are identical to those of Wn . The ordering
<s is the standard shortlex ordering, i.e. words are sorted lengthwise first
and then lexicographically using <b .
Gn = { (1)
n−1
i=1
(di,1 a1,i Si ) →
n−1
Si ;
i=1
(2) σi σi−1 P σi σi−1 P ′ → σi−1 σi σi−1 P σi−1 P ′ if P <b P ′
or σi−1 σi σi−1 P ′ σi−1 P if P ′ ≤b P ;
(3) σi σi−1 Qσi−1 Rσi σi−1 P → σi−1 Qσi−1 Rσi−1 σi σi−1 P ;
(4) σi σi−1 Q1 σi−1 R1 σi σi−1 Q2 σi−1 R2 →
(107)
σi−1 σi σi−1 Q1 di−1,j σi R1+ Q′2 σi−1 R2 if R1 <s R2
or σi−1 σi σi−1 Q2 di−1,j σi R2+ Q′1 σi−1 R1 if R2 ≤s R1 }
As described in the solution to the word problem, we will regard a cyclic
word c(w) as a pair c(w) = (k, c(ws )). The first entry is an even integer
counting the number of copies of d2n in c(w). The second entry is the rest
of the word written in the σi . We shall now present an algorithm for the
conjugacy problem in terms of Wn and Gn . We prove, in a set of lemmas,
that this algorithm solves the conjugacy problem in Bn .
Algorithm 4.15 Input: A cyclic braid word c(w). Output: A set of cyclic
braid words which collectively are a unique representative of the conjugacy
class of w.
1. Apply rule 1 of Wn as many times as possible.
2. Test if w is splittable, i.e. if it is in the form w = w1 w2 where w1 commutes
with w2 . If it is, separate w1 and w2 and treat them separately from now
on. If not, do nothing. Note that we are testing the linear word w and
not c(w).
3. If applicable, apply any rule in Gn and proceed with step 5. If not continue
with the next step.
4. Apply any of rules 2 to 4, in that order of priority, of Wn exactly once to
each of the separated cyclic braid words, if possible.
5. Go back to step 2 of the algorithm and continue until there is not braid
word which may be split further and no braid word to which any of the
rules in Wn and Gn are applicable.
66
Patrick D. Bangert
6. The number k and the set of split braid words are now collectively the
unique representative required.
We note that because of the restrictions on the variable Sn−1 , rule 5 of
Wn and rule 1 of Gn are identical. It is obvious from the algorithm that if
it cyclicly terminates and Wn ∪ Gn is cyclicly confluent, then the conjugacy
problem in Bn is solved by it. Note that the splitting is valid as we have
made the replacement of every inverse generator by inverses of elements of
the center and generators in step 1, this replacement is the content of rule 1
of Wn .
Lemma 4.16. Algorithm 4.15 cyclicly terminates in a time O l5 n11 , where
l is the initial word length.
Proof. Easily done by checking the necessary number of times all the rules
need to be applied.
Lemma 4.17. Algorithm 4.15 is cyclicly confluent.
Proof. Follows from the above discussions.
As the algorithm terminates and is confluent,
the conjugacy
it solves
problem in Bn with computational complexity O l5 n11 .
Conclusion The method to solve the conjugacy problem in the braid groups
can be extended to other groups. As we have seen above, these groups must
satisfy the following properties:
1. Finitely presented
2. Solvable conjugacy problem
3. Non-trivial center such that each inverse generator may be replaced by
inverses of elements of the center and generators.
4. After the initial rules have been constructed according to the methods
described, the extended Knuth-Bendix completion must terminate.
The fist three requirements may be determined using known methods.
The fourth requirement is operational for this method and could possibly be
widened. We can not say, before executing the completion process, whether
it will terminate.
For the braid groups we have seen that a polynomial time conjugacy
algorithm is obtained by our new methods, this is important for braid and
knot theory as such an algorithm has been sought for some time and solves
the first half of the Markov problem.
4.5 Markov’s Theorem
Recall that Markov’s theorem says
Braids, Knots and Applications
67
Theorem 4.18 (Markov). Two braids α ∈ Bn and β ∈ Bm have isotopic
closures if and only if α can be transformed into β by a finite number of
applications of conjugacy and stabilization moves.
Corollary 4.19. The closure of the braid α ∈ Bn is isotopic to the unlink
of k components if and only if α can be transformed into the trivial braid in
Bk by using conjugacy and stabilization moves.
A
B
A-1
Fig. 32. Both conjugacy and stabilization are displayed here. We begin with braid
B. Conjugation surrounds B with A and A−1 on opposite sides which clearly cancel
due to the closure. Stabilization introduces a simple loop at the bottom right of the
braid, adds a new string to the braid and thus increases the braid group index by
one.
Conjugacy was discussed at length already. Stabilization is the move α ↔
ασn with α ∈ Bn (see figure 32). While the conjugacy move is a move within
a particular braid group, the stabilization move connects two adjacent braid
groups. Therefore the question of detecting closed braid equivalence turns
into a combinatorial question about the infinite family of braid groups.
Given a knot, we may produce an equivalent knot by taking any segment
and twisting it about an axis in the projection plane by π while keeping
the rest of the knot stationary. This procedure corresponds to the zeroth
Reidemeister move and adds one crossing to the diagram. Any crossing of
this type is called nugatory. If we represent a knot by a closed braid by virtue
of Alexander’s theoremiAlexander’s theorem, we may also add such nugatory
crossings via a combinatorial move, called the Markov or stabilization move.
Stabilizing a braid α ∈ Bn corresponds to the operation α → ασn±1 or its
inverse. Clearly stabilization increases or decreases the number of strings in
the braid and so represents a move in the family of braid groups as opposed
to the conjugacyiconjugacy move and equivalence movesiequivalence move
which are contained in a single braid group.
MarkoviMarkov stated in 1935 [142] that two closed braids are topologically equivalent if and only if they differ by stabilization and conjugacy
68
Patrick D. Bangert
moves (recall that conjugacy contains equivalence). This statement became
known as Markov’s theorem and was first proven in [30]. In its original form,
Markov’s theorem assumes that the closed braid is embedded in S 3 or R3 , this
can however, be generalized to an arbitrary 3-manifold [129]. Markov’s theorem transforms the link isotopy problem to a combinatorial question about
braids. If two braids α ∈ Bn and β ∈ Bm (with n and m possibly different)
are related by stabilization and conjugacy, they are called Markov equivalent
which is denoted by ≈M . The decision problem of whether α ≈M β is called
the Markov problem or the algebraic link problem. It is possible to find a single move of which both stabilization and conjugacy are special cases and to
formulate, in this way, Markov equivalence in terms of this so called L-move
[130]. While this L-moveiL-move is intuitive, it is not obvious whether the
problem has been simplified by this reformulation.
The first question which arises is whether there exist non-conjugate
Markov equivalentiMarkov equivalence braid words in the same braid group,
that is whether a solution to the conjugacy problem will solve the Markov
problemiMarkov problem. This is negatively resolved by showing that the two
4-braids α = σ1m σ2n σ1p and β = σ1m σ2p σ1n with m, n, p different, odd and at
least three in absolute value are not conjugate but Markov equivalent [159].
It might be thought that it should be possible to reduce the number of strings
in a closed braid equivalent of the unknot to one. This is true as all equivalent closed braids can be reached from each other via Markov’s theorem but
the transition involves, in general, increasing the number of strings before
they may be reduced to a single string. In other words, a greedy reduction of
strings does not reach the minimum string number, also known as the braid
index (not even for the unknot representatives) [156].
It is a practical observation that finding a series of moves to demonstrate
the Markov equivalence of two closed braids is very difficult. The difficulty
of finding such a sequence has lead Birman to believe that it may be simpler
to solve Markov equivalence for two braids representing prime knots. While
this may be true, it is not, in general, easy to decide whether a braid represents a prime knot. Schubert [178] proved that the factorization sequence
of a composite knot is unique and has found an algorithm [179] which finds
it. This algorithm, consequently, is able to decide whether a knot is prime.
However, the execution of the algorithm rests on Hemion’s algorithm since
it must identify the prime factors of the knot, thus no longer necessitating
a solution of the Markov problemiMarkov problem since it already solves
the link isotopy problem (albeit impractically so). This also shows that this
method of deciding primality is not practical. Birman conjectures that a braid
represents a prime knot if and only if it is not conjugate to a split braid.
Furthermore, if Birman’s conjecture is true and we were to find an algorithm to decide whether a braid was conjugate to a split braid, we would have
to solve the Markov problem for this restricted class of braids. If this could
be done, we would have a solution to the Markov problemiMarkov problem
Braids, Knots and Applications
69
since every braid could be decomposed into its split components and pairwise tested for non-split Markov equivalence. This would not only resolve
isotopy but also give the unique prime knot factorization of the knots. Birman’s conjecture is unproven and there exists no algorithm to test whether a
braid is conjugate to a split braid. It is possible, however, to solve the Markov
problem for certain quotient groups of the braid groups [39].
Since the wordiword problem and conjugacy problemsiconjugacy problem are contained in the Markov problem, solutions for these are desirable
and have been given numerous times as mentioned before. The stabilization
moveiMarkov move represents the final hurdle before link isotopy is algorithmically decidable and thus it would be interesting to know when a braid
α ∈ Bn+1 is conjugate to a braid γσn±1 where γ contains only the generators
σi for 1 ≤ i ≤ n − 1, for then one could reduce α to γ using the Markov
move. While this has been done [143], the algorithm depends on Garside’s
conjugacy algorithm [94] which has exponential complexity. Moreover, if two
braids were reduced in this way to the minimum string numberiminimum
string number, they are not, in general, conjugate in this final braid group if
they are Markov equivalentiMarkov equivalence and thus this decision procedure does not solve the Markov problem either.
We have defined the exponent sum exp(α) of a braid α as the sum of
the exponents of the Artin generators of α. It is obvious that the exponent
sum is a conjugacy class invariant but not a Markov class invariant because
of stabilization. Thus it is possible for two braids to be Markov equivalent
and have different exponent sums. In getting from one braid to the other,
the exponent sum must be made equal somewhere in the chain of moves;
this can clearly only be accomplished using stabilization. Stabilization can
increase or decrease the exponent sum depending whether we add σn or σn−1
or remove either of these. It also changes the number of strings. We may think
that starting from a positive braid, we should be able to reach any Markov
equivalent positive braid by going through a pure positive sequence of braids;
that is, we may think that positive Markov equal braids are positively Markov
equal. We note that this would only be possible if the difference in exponent
sum between the two braids was precisely their difference in number of strings.
We conjecture that positive Markov equal braids are not positively Markov
equal.
Much work was done by Birman and Menasco on various properties of
links which could be determined from their closed braid representatives (this
work was published in the six-paper series [32], [33], [34], [35], [36] and [37]).
They prove that there exists a complete numerical invariant for knots but
find this invariant only for knots which are closed 3-braids. The invariant
for closed 3-braids is described extensively and can be used to determine
the braid index and whether the knot is split, composite, amphicheiral or
invertible. They also define a new type of move on braids, the exchange
70
Patrick D. Bangert
moveiexchange move, and prove a Markov-like theoremiMarkov’s theorem
for it. See [38] for a summary of this work.
4.6 The Minimal Word Problem
A well-known problem of combinatorial braid theory is the minimization
problem: Given a braid A ∈ Bn find a braid Am such that A ≈ Am and
L(Am ) ≤ L(A∗ ) for any braid A∗ ≈ A where L(A) denotes the word length
of the braid A.
In the Artin representation of Bn , the number of generators required to
write down a braid word, its length, is equal to the crossing number of the
topological braid. In practice, we find that by moving a few of the strings
of the topological braid, its crossing number may be reduced, making the
braid simpler. It would be especially useful to possess a general method to
compute an equivalent braid of minimum crossing number. Apart from many
applications, this problem is well-known in combinatorial braid theory and
is of independent mathematical interest.
Given a braid A ∈ Bn in the Artin generators, the question whether there
exists an equivalent braid A′ ∈ Bn of shorter length has been shown to be
NP-CompleteiNP-complete by Paterson and Razborov [168]. Not only does
this mean that this question is computationally equivalent to all other NPComplete problems, it also means that (unless P = NP) any algorithm which
answers the question would execute in exponential-time in n. Since Paterson
and Razborov’s result refers to the minimization problem for general n, we
ask whether it is also an NP-complete question for particular n. This question
is explicitly asked as open question 9.5.6 on page 209 of [84] and it seems to
have been negatively answered in an unpublished preprint by Tatsuoka five
years earlier but we were unable to obtain it [191].
In proving the NP-Completeness of the problem, Paterson and Razborov
showed that the problem can be reduced to a known NP-Complete problem.
This does not however provide a usable algorithm. For 3-braids, a linear
complexity algorithm has been found [27] but no general algorithm for n > 3
exists. A minimization algorithm in the band-generator presentation of the
braids groups has been found for n = 3, 4 but the length of the braid in this
presentation is not equal to the crossing number [218] [114]. It is untypical
of a group for which the word problem is solvable that no unique normal
form of minimal length in some naturally arising presentation exists for the
braid groups. A unique normal form of minimal length in certain natural
presentations of free groups, HNN-extensions and free products exists, for
example.
After a little experimentation, it is clear that a braid must, in general, be
increased in length before it may be reduced to minimum length algebraically.
We show that a certain readily obtained braid provides an upper bound for
this necessary increase in length and prove several properties of this braid.
We explicitly construct a set of words which must be searched for a certain
Braids, Knots and Applications
71
property in order to obtain a minimal length representative of any braid.
This constitutes an algorithm to solve the minimization problem. Since the
set of words which must be searched is, in the worst case, exponential in size,
the algorithm takes an exponential amount of time to complete.
Exercise 4.20. Find a braid which is non-minimal in length and which must
be increased in length (by introducing pairs like σi σi−1 ) before it can be shortened to minimal length. An example is the braid σ2 σ1−2 σ2−2 σ1 σ2−1 σ1 σ22 σ1 σ2 .
Denote by Am any braid which satisfies Am ≈ A and L(Am ) ≤ L(A∗ )
for all braids A∗ ≈ A. We now prove a basic lemma which connects Amax
−s(A) ′
and Am . Recall that Amax = ∆n
A where s(A) is the number of inverse
′
generators in A and A is positive.
Theorem 4.21. For any braid A, it is possible to obtain Am from Amax by
operations which monotonically decrease or keep constant the length of the
braid.
Proof. By construction Am ≈ Amax ≈ A and Amax and A are at least as long
Am . Exponent sum is an equivalence class invariant so that s(Am ) ≤ s(A).
Replace each inverse generator in Am with the braid given in proposition 4.1
and then use equation σi ∆n = ∆n σn−i to bring all the fundamental braids
to the front to obtain the braid
Ammax = ∆n−s(Am ) A′m
≈
≈
−s(A)
But Amax = ∆n
we have that
m )−s(A)
∆n−s(Am ) ∆s(A
∆ns(A)−s(Am ) A′m
n
∆−s(A)
∆ns(A)−s(Am ) A′m
n
(108)
(109)
(110)
A′ and since the braid groups are left-cancelative [94],
∆ns(A)−s(Am ) A′m ≈ A′
(111)
with both words positive. Since positive words are positively equal [94],
there exists a sequence of braids Bi for 0 ≤ i ≤ q with B0 = A′ ,
s(A)−s(Am ) ′
Bq = ∆n
Am , Bj and Bj+1 different by a single application of the
braid group’s defining relations and Bi positive for all i. Since exponent sum
is an equivalence class invariant, L(Bi ) = L(A′ ) for all i.
From Amax we may thus reach the form of Ammax in equation (110)
keeping the length of the braid constant. From this form, we may reach Am
by operations which monotonically decrease or keep constant the length of
the braid. Thus there exists a sequence of braids Wi for 1 ≤ i ≤ p with
W0 = Amax , Wp = Am , Wj and Wj+1 different by a single application of
the braid group’s defining relations and L(Wj+1 ) ≤ L(Wj ), which proves the
lemma.
✷
Theorem 4.21 basically establishes that we may reach a minimum length
representative from Amax by rearranging and cancelling generators only; it
72
Patrick D. Bangert
thus, in principle, removes the difficulty we pointed out in the introduction
of occasionally having to increase the length before being able to decrease it
to an absolute minimum.
We present an extension to the Cayley diagram construction which draws
the diagram of any braid word (as opposed to positive braid words only).
The diagram is a list of all those braid words which may be obtained from
the given word by rearranging only.
Algorithm 4.22 Input: A braid word A. Output: A list D(A) of all braid
words B which may be obtained from A by rearranging of generators only.
1. Define the diagramiCayley diagram of zeroth order as the set D0 (A) =
{A}.
2. The set Di (A) is obtained from the set Di−1 (A) by the following procedure:
a) Fix attention on a particular member α of Di−1 (A). We read α from
left to right and decide at each position whether we may apply any
of the moves in equations (112) to (115).
σi σj ↔ σj σi for |i − j| > 1
σi σi+1 σi ↔ σi+1 σi σi+1
σi σi−1 ↔ σi−1 σi
σi σi−1 σj ↔ σj σi σi−1
(112)
(113)
(114)
(115)
b) If we may, we apply it and store the resultant braid word β in Di (A)
if and only if β is not already contained in Dj (A) for 0 ≤ j ≤ i.
c) We continue to read across α until we have considered all braid words
which may be reached from α by a single application of the moves in
equations (112) to (115).
d) Apply steps (a) through (c) for every braid in Di−1 (A). If Di (A) = ∅,
then the algorithm is done.
3. The diagramiCayley diagram D(A) of A is the union of all the Di (A),
&
&
&
D(A) = D0 (A) D1 (A) · · · Dm (A)
(116)
We show the correctness and termination of this algorithm.
Lemma 4.23. Algorithm 4.22 terminates for every A and succeeds in listing
all braid words B which may be obtained from A by rearranging of generators
only, that is using the braid group relations without introducing or removing
any generators.
Proof. D0 (A) is, by definition, finite. It is obvious that for any braid word
of finite length, the moves in equations (112) to (115) may be applied a finite
number of times. Thus, by induction, every Di (A) is finite. The number of
distinct braid words of a given finite length is finite and since the Di (A)
Braids, Knots and Applications
73
are, by construction, non-overlapping, their union must be finite. Thus there
exists an m such that Dm+k (A) = ∅ for every k > 0. Thus the algorithm
terminates for every A.
The moves listed in equations (112) to (115) exhaust all possibilities allowed in the braid group under the stipulation that no generators must be
removed from or introduced into the word. Thus each word which may be
reached from A by rearrangement of generators will eventually be reached by
algorithm 4.22 and so the algorithm succeeds in listing all the required braid
words.
✷
Theorem 4.21 gives the following corollary.
Corollary 4.24. D(Amax ) contains a braid of the form EAm for E ≈ e, the
identity in Bn .
Proof. By construction D(Amax ) contains all braid words equivalent to
Amax by rearranging only. By lemma 4.21, Am can be obtained by a sequence of operations which keeps the length constant or decreases it. Each
operation which decreases the length does so by eliminating a sub-word like
ei = σi σi−1 ≈ σi−1 σi .
Since for all i ei ≈ e, the identity in Bn , we have
ei σj±1 ≈ σj±1 ei ,
ei ej ≈ ej ei
(117)
for any i and j.
Let us now agree to construct the aforementioned sequence of words without eliminating the sub-words ei but using equation (117) to bring them all to
the left of the word. At the end, we will obtain a word of the form A∗ = EAm
where E ≈ e is a braid consisting of all these sub-words ei . The most general
form of E is
qn−1
(118)
E = eq11 eq22 · · · en−1
with qi ≥ 0 for all i. So if we could extract E from Amax , we would, in the
process, obtain Am . Since the form EAm is obtained
'n−1by rearrangements only,
✷
L(E) ≤ L(A∗ ) = L(Amax ). This indicates that i=1 2qi ≤ L(Amax ).
Given a braid A, we thus find Am by constructing the diagram D(Amax )
and selecting the word with the largest number of cancellation pairs such as
σi σi−1 . Clearly there will be more than one braid word for the same number
of cancellation pairs. We may agree to choose the least braid word lexicographically for definiteness. It is obvious from the construction that this will
be a unique form of minimal length for the braid A. We thus have an algorithm to find Am for any A. It is regrettable that the diagram D(Amax ) is,
by construction, very large. Two questions are left to ask: Can we make the
result stronger and how large is a typical diagram?
In theorem 4.21 we achieved an upper bound for the necessary increase in
length of a braid before it may be reduced to a minimum length. One would
74
Patrick D. Bangert
like to simplify the result somewhat but we shall show in this section that
the two straightforward attempts to simplify or strengthen theorem 4.21 are
doomed to failure. First we show that we may not, in general, shorten Amax
to the Garside normal form.
Lemma 4.25. It is not, in general, possible to obtain Am from G(A), the
Garside normal form of A, by operations which monotonically decrease or
keep constant the length of the braid.
3
Proof. Consider the braid α = ∆−2
3 ∆3 σ1 . The Garside normal form of α is
−1 3
G(α) = ∆3 σ1 and the shortest braid which can be obtained from G(α) by
rearranging and cancelling only is α′ = σ1−1 σ2−1 σ12 . The original form of α is
the same as αmax and we make the following moves on it
3
α = ∆−2
3 ∆3 σ1
≈ σ2−1 σ1−1 σ2−1 σ1−1 σ2−1 σ2−1 σ2 σ2 ∆3 σ1
−2 2
≈ σ2−1 ∆−1
3 σ2 σ2 ∆3 σ1
≈ σ2−1 σ1
(119)
(120)
(121)
(122)
which is shorter than α′ and is in fact the minimal length of this 3-braid. This
provides an example for which the minimal length is not obtainable from the
Garside normal form of the braid by rearranging and cancelling only and thus
proves the lemma.
✷
One may think that it would be sufficient to list the diagram of the negative and positive sub-braids of Amax and search for a maximal length subbraid which is common to the end of the first and the beginning of the second
diagram but this is not true as the following lemma shows.
Lemma 4.26. There does not exist an Am in the form A1 A2 with A1 negative and A2 positive for every A.
Proof. Consider the braid A = σ1−1 σ2 σ1−1 , the Garside normal form of which
is G(A) = ∆3−2 σ2 σ1 σ1 σ1 σ2 . In fact, A is already minimal as can be seen by
Berger’s algorithmiBerger’s algorithm [27] or by using the above procedures.
We wish to show that there does not exist another braid equivalent to A
of length three in the form A1 A2 with A1 negative and A2 positive. Since
exponent sum is a conjugacy class invariant, we need only check eight cases.
Below we list the eight 3-braids of length three and exponent sum -1 in the
required form and their Garside normal forms.
Braids, Knots and Applications
σ1−1 σ1−1 σ1 → ∆−1
3 σ1 σ2
−1 −1
−2
σ1 σ1 σ2 → ∆3 σ2 σ1 σ1 σ2 σ2
σ1−1 σ2−1 σ1 → ∆−1
3 σ1 σ1
−1
−1 −1
σ1 σ2 σ2 → ∆3 σ1 σ2
σ2−1 σ1−1 σ1 → ∆−1
3 σ2 σ1
σ2−1 σ1−1 σ2 → ∆−1
3 σ2 σ2
σ2−1 σ2−1 σ1 → ∆−2
3 σ1 σ2 σ2 σ1 σ1
σ2−1 σ2−1 σ2 → ∆−1
3 σ2 σ1
75
(123)
(124)
(125)
(126)
(127)
(128)
(129)
(130)
Since the Garside normal form solves the word problem and none of the above
Garside normal forms are identical to G(A), the braid A does not possess a
minimal length representative in the required form.
✷
Let a be a n-braid of length L with diagram D(a). Consider the braid
a′ = aσi σi−1 for some 1 ≤ i < n. We are concerned with the size of D(a′ )
in terms of the size of D(a). For each member of D(a), the cancellation pair
σi σi−1 may appear in any place in both possible orders (σi σi−1 and σi−1 σi ), so
in 2(L+1) positions. There may be further moves possible by use of the braid
group relations but the number of these are clearly bounded by a function
linear in L. So the diagram of a word will increase in size by a factor linear in
its length for each possible cancellation pair. Given a random positive n-braid
a of length L, how many members will D(a) have, on average? We conjecture
that:
Conjecture 4.27. For any braid a ∈ Bn of length L, we have that |D(a)| ≤
|D(∆pn )| with p = ⌈2L/(n(n − 1))⌉.
Conjecture 4.27 would provide an upper bound for the size of the diagram
of any word in terms of the diagrams of the diagrams of ∆pn which topologically are a series of p half-twists of the braid strings about the vertical axis.
In extensive computer simulations, the conjecture was checked and seems to
hold. What it seems to indicate is that the half-twist has the most topological freedom for its length and number of strings under the constraint that
the crossing number must be kept constant. This is quite intuitive, yet the
conjecture seems to be difficult to prove.
We have investigated the diagrams of several ∆pn for their size and for the
distribution of braids over the sub-diagrams at each stage of the construction
in algorithm 4.22. In table 1 we list the size of the diagram and maximal
sub-diagram index for p half-twists on n strings.
We conclude that the diagram of a typical braid word grows exponentially with its length and braid index and thus our method of finding the
minimal length braid word equivalent to a given braid has exponential complexity. This is not surprising as the problem is NP-Complete. We shall give
a heuristic algorithm and other methods later. The properties of the braid
76
Patrick D. Bangert
Table 1. The Size of Diagrams of Fundamental Words
n
3
3
3
3
3
3
3
4
4
5
p |D (∆pn )| max. i
1
2
1
2
8
2
3
38
5
4 196
8
5 1062
13
6 5948
18
7 34120
25
1
16
7
2 1654
15
1 768
25
groups that made the above solution possible are: (i) It is possible to write
all inverse generators as products of the generator of the center and a positive word, (ii) the defining relations relate positive words only and (iii) the
braid groups are right and left-cancellative. It is likely that any group which
has these properties, has an analog of the Garside normal form and has a
solution to the minimum word problemiminimum word problem similar to
the one above.
Solving the problem exactly is an expensive endeavor and so we ask for
approximate methods. It turns out that magnetic relaxation is an important
application of this problem and gives rise to good methods to solve it. We shall
delay the discussion of these to section 5.3. It is possible to solve the problem
heuristically using a purely algebraic algorithm which we now present.
Recall that the braid group Bn is defined by
Bn = {σi } : 1 ≤ i < n;
σi σj = σj σi |i − j| > 1; σi σi+1 σi = σi+1 σi σi+1 .
(131)
(132)
An n-braid A of c crossings is a word in Bn of word-length c, so the general
form of A is
A = σaǫ11 σaǫ22 · · · σaǫcc
ǫk = ±1, 1 ≤ ak < n, ∀k : 1 ≤ k ≤ c.
(133)
Consider an n-braid A of the form given in equation 133. Suppose we
wish to find the n-braid Am equivalent to A such that the length L(Am )
of Am is minimal over the equivalence class of A. It has been shown [168]
that this question is NP-completeiNP-complete and hence computationally
difficult (if P = NP, it is intractable). The following presents a heuristic
algorithmiheuristic algorithm for getting close to Am . We begin with the
leftmost generator of A and attempt to move it to the right using both braid
group operations. If we can cancel it along the way, we do and if we can not,
we move it back to where it started. In this way, we proceed to move all
the generators as far to the right as possible. Then we begin at the end and
Braids, Knots and Applications
77
move each generator as far to the left as possible in the same manner. This
algorithm will always produce an equivalent braid A′ such that L(A′ ) ≤ L(A).
We consider L(A) generators and move them
O(L(A)) moves to the right and
left. Thus this algorithm takes O L(A)2 time and constant memory. In fact
we move a particular generator at most L(A) generators and this is only for
the case when all the other generators commute with it, thus the average case
complexity is likely to be close to linear in L(A).
This algorithm will not produce a minimum length representative in all
cases because it can not unravel complex crossings. To get to the minimum
length would require more subtle transformations than just movements to
the right or left, which topologically correspond to pulling the strings apart
from underneath the crossing. However, as computer experiments show, it
does do quite well.
Let us calculate an upper bound to the reduction ratioireduction ratio
obtained by this method as a function of n and c. To calculate these, consider
the likelihood that a particular generator will be followed by its inverse, which
is just Q0 = 1/2(n − 1). The probability Qj that a generator and its inverse
are separated by j generators through which either can be moved is the
corresponding probability for j = 1 to the power j. We require the number of
braids of length 1 which may be generated so as not to contain the generator
interfering with the movement of generator σi . If i = 1 or n−1, this is 2(n−3)
and 2(n − 4) otherwise. Thus
Qj =
=
*
2(n − 4)
(
2(n−1)−2
2(n−1)
n2 − 5n + 5
(n − 1)2
)
+ 2(n − 3)
2(n − 1)
+j
(
2
2(n−1)
) j
Q0
Q0
(134)
(135)
The final factor of Q0 is present because the generator after the sequence
of j generators is required to be inverse of the original generator, an event
with probability Q0 . To get the total probability Q of being able to cancel a generator σi with its inverse by simple exchange movements over the
length j = 0, 1, · · · , we must sum these probabilities in order weighted by the
probability that their predecessors did not happen. Thus
Q = Q0 + (1 − Q0 )Q1 + · · · +
j−1
(1 − Qk )Qj + . . .
(136)
k=0
Note that since the exchange move is not allowed for n = 3, Q = Q0 for
n = 3. The reduction ratioireduction ratio R which occurs as a consequence
of this probability is R = 1 − 2Q since each time that the event happens two
generators may be canceled. Note that in this calculation we have considered
the probability that a generator can be moved next to its inverse in the word
78
Patrick D. Bangert
using only the far commutation relationifar commutation that σi σj = σj σi
for |i−j| > 1 in a long braid. The heuristic algorithm however uses both braid
group moves to attempt to move generators next to their inverses. Thus R is
an upper bound for the reduction ratio achieved by the heuristic algorithm
as the braid becomes long.
In §6 we present the results of the algebraic reduction of a large number of
braids but a few comments about the efficiency of the algorithm are in order.
The only exact algorithm to minimize braidiBerger’s algorithm is valid only
for n ≤ 3 [27] and by comparing this heuristic to this exact algorithm, we
find that the heuristic finds a braid the length of which is within five percent
of the length found by the exact algorithm and that it reaches the actual
minimum in 0.005 of all cases. This shows that the heuristic is quite effective
for n = 3 (note that reduction for n = 1, 2 is trivial since B1 , B2 are free
groups).
5 Applications of Braid Theory
In the discussion of figure 4 in section 1, we observed that the braid under
discussion was simpler than the geometry of the dynamical system that gave
rise to it. It is frequently possible to gain understanding of some physical
mechanism by ignoring the details and focusing on topological structures. In
this section, we will give some examples of systems in which this approach has
been useful. For reasons of space, we have made no attempt to be exhaustive.
The number and depth of the applications of braid theory go far beyond the
treatment here.
5.1 Topology as a Conserved Quantity in Classical Dynamics
Physics, to a large degree, is a search for conserved quantities. The fact
that the total energy of a physical system remains constant over time can
explain a plethora of phenomena. The conservation of angular momentum is
essential to our understanding of quantum physics and the atomic and subatomic worlds. The details of a system are in constant state of change but
there are certain properties that remain the same. It is these that improve
our understanding on the fundamental level. When we look at a system, we
observe sizes, lengths, locations and so on all of which will change very shortly.
It is frequently something unobserved that stays constant and many times it
is the shape of the overall system or the shape of some abstraction of system
properties (for example a phase space trajectory) that is unchanged. Such
information is topological in nature and we may use the theory of topology
to classify the possibilities.
Consider, for example, the dynamical system of n particles moving in a
a
2
with c a constant, rij
= |xi − xj | the
plane relative to potential V = crij
distance between particle i and j and a the parameter of the system. We will
Braids, Knots and Applications
79
trace the evolution of the system in three dimensions with the vertical being
time. As such, the n particles will build an n-braid over time. If the particles
do not move (c = 0), the braid is the identity braid e ∈ Bn . Consider an
n-braid embedded into R3 . The question is whether there exists a periodic
orbit of the dynamical system of n particles moving under the potential V .
It can be shown that if a ≤ −2 all braid types have periodic orbits but as
a increases above -2, some no longer have periodic orbits and when a has
increased to a = 2, only the braids ∆2n are left over. It is interesting that it is
the braids in the center of the braid group that should survive until the end.
The investigation of which braid types are and are not possible for a given a
was carried out but will not be covered here in detail [151].
For n point masses arranged on a circle and moving under the potential
V , the orbit is periodic and gives rise to the topology ∆2n in the obvious
way. It is also stable for a > −2 and unstable otherwise [13]. The circle is
the simplest knot possible. To obtain more complex knots, we must move to
three dimensions and there the braid classification does not work any longer
(any knot can be untied in four dimensions). The question that does arise is
whether the orbit of n point masses arranged along a knot in three dimensions
is stable or not. It is claimed that this is asymptotically stable (as n tends to
infinity) for any knot type in which the masses move under the gravitational
potential (a = −1) [46]. These configurations are thus new solutions to the
n-body problem. However for a finite number of masses, this configuration
will, in general, be destroyed after some time. No simulation efforts have
gone into this problem and it remains an important open problem to decide
whether these orbits are stable enough to occur in nature [176]. Numerical
experiments similar to the kind suggested have been done in two-dimensions
[183].
So far the particles have just moved according to a very simple dynamical
equation (Newton’s law with a central potential V ). If we generalize this
dynamics to that of a parabolic partial differential equation, the trajectories
may still be classified using braid theoretic methods along the above lines
[96].
Ordinarily, topological invariants are calculated for a particular given
topological object. We have seen, for example, how to calculate the Alexander and Jones polynomials for a closed braid. Reversing the process is highly
non-trivial, i.e. given a polynomial construct a closed braid whose Alexander
(or Jones) polynomial is equal to that given one. This reverse construction
is particularly difficult for many invariants defined in terms of projections
of the knot into the plane. If we had genuinely three dimensional definitions of these invariants, perhaps an inversion would be easier. The theory
of Vassiliev invariants calculated via Kontsevich integrals which we shall not
review and Witten integrals which we will briefly discuss below gives a three
dimensional integral definition of the classical knot invariants [197, 127, 213].
Using these integrals, it is then possible to construct a dynamical system of
80
Patrick D. Bangert
particles moving in the plane which (if the time dimension is the upward
direction) generates a braid whose closure has the given invariant [28]. The
inverse problem can thus be solved.
5.2 Knot Theory in Fluid Dynamics
As mentioned in section 2.2, knot theory was created from the idea that
atoms could be knotted vortices in the ether, which was thought to act like a
fluid. The relationship between knot theory and fluid dynamics therefore goes
back to the conception of knots as a mathematical discipline. The practical
science of knot tying on the other hand was, for the most part, invented by
sailors who can lay claim to more than 90 percent of knots actually used.
Fluid dynamics is an important old field of science. Air and water are just
two examples of fluids we encounter every day. Improving our understanding
of the dynamics of fluids has given us aeroplanes, modern ships and many
other types of hydrodynamical technologies all the way to alternative power
resources in the oceans, rivers and wind. The basic question of fluid dynamics
is what the flow of the fluid, initially prescribed, will look like after it has
flowed down some path which possibly contains obstacles. There are a set of
differential equations known as the Navier-Stokes equations which describe
how the flow profile changes. Unfortunately fluids are very complex and the
Navier-Stokes equations are rarely soluble. So complicated are these equations that the Clay Mathematics Institute has offered a millennium prize of
one million dollars to the person who proves certain statements about the
existence of solutions to these equations, nevermind actually finding them!
In view of the lack of analytical solutions, people have adopted several
alternative avenues for progress. Some try to solve the equations numerically.
Some follow a random selection of fluid molecules down the path in a so
called Monte-Carlo simulation. Some try to isolate the idealized cases where
an analytic solution does exist. Others hunt for properties that will remain
constant over the evolution of the fluid, properties that we call invariants.
Many invariants are structural or global in nature and this is where topology
is useful.
To describe actual invariants we must get more specific about the physical
situation we are concerned with. Here, we will give an example which will be
of interest in both solar magnetohydrodynamics and DNA recombination. To
be specific we will adopt the language of magnetodydrodynamics. Suppose
we are faced with a magnetic field B with compact support in ℜ3 (B = 0
outside some compact domain D ⊆ ℜ3 , the domain D is called the support
of B.). A magnetic field can be represented as the curl of a vector function
called the vector potential A, B = ▽ × A.
Definition 5.1. We define the helicity H of the field by
,
H=
A · BdV
D
(137)
Braids, Knots and Applications
81
where the integral is over the support D of B.
The helicity is an invariant of the field if the field is “frozen” which means
that the field obeys a restricted form of field equations than the full magnetodydrodynamic field equations [214, 215]. While such a restriction is significant mathematically, it is still a realistic model for a variety of physical
phenomena. Consider a particular field line K. No field line may have free
ends (Maxwell’s equations – no magnetic monopoles) and so K must be closed
and as a closed curve in ℜ3 , it is isotopic to some knot including the unknot.
Consider the field in a tubular neighborhood T around K. It can be shown
[150] that if Φ is the flux of B across perpendicular cross-sections of T , we
have
(138)
H = hΦ2
where h is a number which we shall call the winding number. It is a remarkable
result by Cǎlugǎreanu that h is the sum of two geometric properties of K
called the writhe W and twist T .
Definition 5.2. The writhe W of a knotted field line K is defined by the
double integral
- (dx × dx′ ) · (x − x′ )
1
W (K) =
(139)
4π K K
|x − x′ |3
W (K) varies continuously with deformations of K but tends to the topological
definition of the writhe of a knot as K is deformed to lie very nearly in a
plane (see the discussion of exercise 2.2).
Definition 5.3. The twist T of a knotted field line K is defined by the integral
1
(N′ × N) · tds
(140)
T (K) =
2π K
where s is arc length along K, N(s) is a unit normal from K to some given
field line and t is a unit tangent vector to K. The twist is the twist of a ribbon
with K and the field line as boundaries.
Almost all of the twist arises from the linking of K with the field line.
The linking number lk(a, b), which measures the linking between two curves
a and b, is defined as the sum of the characteristics ǫ of each crossing between
a and b. If the crossing is right-handed ǫ = 1 and if it is left-handed ǫ = −1.
These are the same characteristics used in the definition of writhe for a knot,
see the discussion after exercise 2.2. We thus have
h=T +W
(141)
The winding number h is an invariant of a frozen-in field but twist and
writhe are not. Thus we may convert twist into writhe and vice-versa. The
82
Patrick D. Bangert
physical mechanism by which such a conversion might take place has been
investigated [136] but may be visualized easily. Take a rubber band and cut
it so that you have two ends. While holding one end still, twist the other
around its axis many times and tie the ends of the band together again.
What you have is an unknot without writhe which is heavily twisted. When
you let go of the rubber band, it will partially untwist by folding back on
itself globally, that is it will convert some twist into writhe. If you keep track
of the appropriate numbers, you may see that the conservation law holds.
Equation 141 is known as Calugareanu’s theorem and is very important not
only in fluid dynamics but also in DNA research [49, 50, 51].
The example of the rubber band is quite instructive and so we encourage
the reader to actually try it. It illustrates a further point. While twisting
the band, you have injected energy into the band which it is forced to store
as you are still holding it in place. When you let it go, the elastic potential
energy converts partially into kinetic energy. The band moves into an energetically more favorable configuration which involves converting some twist
into writhe. This process is called relaxation. The main questions about relaxation are: (1) What will the final configuration look like? (2) How much
energy will the system loose in relaxing? We will investigate these questions
using an example in the next section.
5.3 Braid Relaxation
Suppose we have some braid structure b. The total geometrical string length
over the whole braid will be called its energy. Initially the braid has energy E
and we want to know whether there exists a continuous deformation of b into
some configuration b′ isotopic to b with energy E ′ < E. A physically realistic
deformation is an elastic relaxation. From this point of view, we regard each
string of the braid as an elastic string. As the endpoints are fixed, the lowest
energy state is one in which all strings are straight lines. The only way in
which all strings can be straight is if b is isotopic to the trivial braid. We
thus have a positive lower bound on the energy of a braid and we know that
the lower bound can only be reached from exactly one topology, namely the
trivial one.
If the braid contains σi σi−1 as a subbraid, we may delete it. This deletion
reduces the number of crossings by two and also reduces the energy of the
braid as both strings can be made shorter. This and similar considerations
may lead one to believe that crossing number is a very similar measure of
complexity as energy. Topologically an equivalent braid with less crossings
is simpler and this elementary observation gave rise to the minimal word
problem (see definition 2.31). We are thus lead to ask whether the search
for a minimal energy configuration is essentially the same as the search for a
minimal crossing number? The unexpected answer is that they are different.
In this section, we investigate several different approaches to obtain minimal configurations: we employ three different relaxation techniques and com-
Braids, Knots and Applications
83
pare these with each other and with an algebraic heuristic algorithm, in terms
of minimization (of energy and crossing number) and time efficiency. By energy we mean total string length of the braid. It is found that more than
half of the crossings of a sufficiently large braid (in terms of crossing number
and number of strings) are redundant. We analyze the different methods and
say in what circumstances which method is to be favored and conclude that
minimum braid energy and minimum braid crossing number are substantially
different measures of topological complexity for braids.
Topological constraints appear in many complex systems. In biology the
amount of twisting and knotting of DNAiDNA molecules can affect molecular
interactions and dynamics [115]. In polymer physics the degree of entanglement of the polymer filaments helps to determine the elastic properties of
the polymeripolymer [15]. In astrophysics, applications involve the behavior
of magnetic fieldsimagnetic field (such as those found in stars and accretion
disks) with complex topologies [166, 26, 27, 44, 167]. In dynamical systems
theory, the time history of the system can be represented by a set of braided
particle orbits; the topology of the braid reflects qualitative aspects of the
dynamics [57, 43, 144, 151]. In turbulence theory the degree of entanglement
of the vortex linesivortex lines provides a statistical measure of flow properties; this measure is distinguished from most others used in turbulence by
being based on the flow in real space rather than on the spectral transform
of the flow in Fourier space. In statistical mechanics, braid and knot theory
has significantly contributed to exactly solvable models via knot polynomialsipolynomials, for example [199]. Random knottingirandom knot, as opposed
to the random braidingirandom braid discussed here, has also been investigated [181].
All these applications involve a set of curves (e.g. long molecules, magnetic
or vortex lines) which are knotted, linked, or braided. Knot theorists have
devoted great effort to classifying such objects. One important part of this
effort concerns finding measures of complexity. This idea goes back at least
as far as TaitiTait, who first set out tables of different knot types [190]. Tait
organized the knot tables according to a simple complexity measure, the
minimum crossing number Cmin . This number gives the minimum number
of crossings of a knot as seen in any two dimensional projection.
There are two types of topological invariants. The first, sometimes called
isotopic invariants, involve quantities that remain constant if we deform the
set of curves. Examples include the Gauss linking integral, helicity integrals,
and knot polynomials. The second type involves quantities which do change
when the curves deform, but have a lower bound. This second type of invariant can be regarded as a measure of topological complexity [186] of which
both crossing number and energy are examples.
This chapter investigates the crossing number and energy for random
braidsirandom braid. Braids consist of a set of curves stretching between two
parallel planes. The endpoints of the curves are fixed but, between the two
84
Patrick D. Bangert
planes, the curves are free to move so long as they do not cross through
each other. Braids are important in knot theory because (unlike knots) they
can be readily classified using group theory [31]. They are also important in
solar physicsisolar physics, as the field lines within a coronal magnetic loop
are braided. (In fact, a coronal loop forms an arch with both ends in the
photosphere. But a simple geometrical transformation straightens out the
arch into a cylinder with ends on two parallel planes.)
Energy, of course, has the most immediate physical significance. For example, a solar magnetic loop usually stays close to the energy minimum
(equilibriumiequilibrium) state consistent with the field topology. Sometimes
this equilibrium becomes unstable; a rapid reconnection event changes the
topology and energy is released in a flareisolar flare. Crossing number, on the
other hand, relates more directly to the geometry of the field lines. The state
of minimum crossing number may not be exactly the minimum energy state,
but one may conjecture that they will be close. We can, in fact, find strict
lower bounds for the energy of a magnetic field given its crossing number.
This has been done for fields in a spherical geometry with closed field lines
[91] and in a cylindrical geometry with braided field lines [26].
We can also consider continuous fields rather than knotted or linked
curves, e.g. knotted fluid flows and magnetic configurations [148, 149, 91,
55, 26]. Crossing number can be defined for a continuous field by averaging
the crossing number of all pairs of field lines [91, 26]. This average crossing
number will have some positive minimum amongst all fields with the same
field line topology. Minimum crossing number and minimum field energy will
then both measure the topological complexity of the field. For example, a
closed, knotted tube of magnetic flux will have a magnetic energy which generally increases with the Cmin of the knot (and with internal twist of field
lines inside the tube).
There has recently been a major effort to find the ideal shapes of knots.
While the definition of ”ideal” varies, the ideal shape is mostly obtained by
minimizing some form of knot energy. Various energy functionals have been
suggested for knotted curves [91, 115, 187]. These energy functionals have a
positive minimum depending on the knot type analogous to minimum crossing number. Some theoretical questions arise from this work. For example, are
the energy minima found using these approaches local or global minima? One
would like an energy such that the minimum is global for any initial configuration. This does not seem to be possible, however [63]. Another important
question is whether an energy minimum corresponds to the minimum of a
more traditional measure of complexity, for example the crossing number. As
mentioned above, it has been implicitly assumed in the literature that this is
true, however we argue here on the basis of statistical results that this is not
true. As mentioned above, energy can be defined in many ways and different
energies behave differently. We consider energy to be the length of the strings
in the braid.
Braids, Knots and Applications
85
We look for a force that will minimize the crossing number of a braid. It
can be shown [23] that this force is
Fi (z) = −λǫ2
[(2r′ r′ − rr′′ ) · (ẑ × r)] (rẑ × r)
)3/2
(
2
j=i
(r′ · ẑ × r) + r4 ǫ2
(142)
√
where r = rij (z), r = r · r, r′ = (r′ · r)/r and ẑ is the unit vector in the z
direction.
What we observe in practice is that this force causes the strings of the
braids to move apart from each other and prevents equilibrium from being
reached. Thus we apply the additional constraint that
xi (z) · xi (z) ≤ R
(143)
i
where R is a parameter of the model. After imposing this we can agree to
have reached equilibrium if and only if the maximum distance moved by a
point on the braid at any time step is less than another parameter η.
Two energy minimizing approaches were tested with respect to minimizing crossing number. Both minimize elastic energy but they differ essentially
in the way the elastic force is implemented: a nearest neighbor approximation
(the constrained elastic force) versus a tension force depending on the curvature (the curvature elastic force). As these forces treat the strings as elastic,
they pull the strings closer together and would cause them to intersect and
thereby change topology. In order to prevent this, we shall introduce a repul(r)
(e)
sive force Fi (z, t) to the elastic force Fi (z, t) to make up the total force
which we use to simulate the braids,
(e)
(r)
Fi (z, t) = Fi (z, t) + Fi (z, t).
(144)
For the purposes of the repulsive force, we imagine the strings to be of circular
cross-section with diameter d. We define this repulsive force by
.
0
for |xi − xk | > d
(r)
Fi =
(145)
xi − xk (d − |x − x |)
otherwise.
i
k
|xi − xk |
k=i
Since the repulsive force is non-zero in only a limited number of cases, computing it is relatively fast as opposed to using a potential function.
If we imagine the points of the geometric braid to be beads of mass m
connected by springs of spring constant k and zero natural length, the elastic
force on the j th bead due to the two springs attached to it is (considering
only nearest neighbor interactions)
j
j
j+1
j−1
(e)
, t = −k 2xi
, t − xi
, t − xi
,t
. (146)
Fi
bc
bc
bc
bc
86
Patrick D. Bangert
This is the constrained elastic force. As given in equation 146 the constrained
elastic force is a finite difference scheme for the differential equation
(e)
Fi (z, t) =
k d2 xi (z, t)
.
dz 2
b2 c2
(147)
Once the total force is known, we apply it to the beads
xi (z, t + δt ) = xi (z, t) −
Fi (z, t)
2
(δt ) .
2m
(148)
We have neglected the fact that beads should acquire a velocity after the force
is first applied. Ignoring this velocity serves to heavily damp the system,
which is desirable for the simulation. A proof that this is acceptable on a
fundamental level is given in [24] and references therein. The force is applied
for a duration of δt after which the beads will have moved a certain distance.
The maximum distance moved by any bead in the whole braid during any step
r(t) decreases monotonically to zero since the system is heavily damped due
to the neglection of the velocity and that fact that the springs have natural
length zero. If no bead moves more than a minimum distance of η, we may
terminate the simulation because in all subsequent steps of the simulation
no bead will move further than η. Thus the end of the simulation is reached
when r(t) ≤ η.
A given braid will determine n and c but we have endowed the model
with a number of parameters: The string diameter d, the number of beads
per crossing b, the mass of a bead m, the spring constant k, the separation
of the strings δx , the duration of the force δt and the equilibrium distance η.
Based on computer experiments we make choices for some of these
d=
δx
,
6
0.1 ≤ k < 0.5,
δt2 = 2m,
10 ≤ b ≤ 50,
δx
,
105
1
.
δx =
n−1
η=
(149)
(150)
These values have been found to give good results. With increasing k, fewer
steps are required to reach equilibrium but k < 0.5 must be observed because
otherwise the repulsive force will not be very successful. Accuracy increases
with b but so does the computation time. Setting b < 10 will fail because
the distances between beads are large enough for the repulsive force not to
guarantee isotopy, however b > 50 is unnecessarily expensive in terms of time.
The other way of dealing with elastic relaxation is to treat each string in
the braid as a bungee cord, subject to a tension force which aims to reduce
any curvature and bring back the string to a straight configuration (given
the constraint on the end points). Indeed, as already remarked above, a repulsive force among the strings is needed to counteract the tension in order
to maintain the topology unchanged. We obtain a new elastic force from a
Lagrangian action minimizing the length of the braid [23]. The result is the
horizontal force
Braids, Knots and Applications
87
d 2 xi
d2 z dxi
.
(151)
− 2
2
ds
ds dz
This is the curvature elastic force. This force moves the curve as the full
curvature force would; the second term gives an extra horizontal displacement
to the string which compensates for the effect of the missing vertical force.
Once its value is known in each point of the braid and cumulated with the
repulsive term, advancing in time is achieved according to the same scheme
as above (148).
The actual evaluation of the curvature elastic force involves the computation of second and first order spatial derivatives. In this case, then, we found
it convenient to use a grid of N evenly spaced points along the z axis and
ordinary centered difference. Stopping criteria for the numerical simulation
of energy relaxation were defined as explained in the previous section. We
kept N = 200 in all the cases presented in the following, while the choice of
the other parameters was
(e)
Fi
=
d = δx ,
δx
η = 5,
10
δt2 = 2m,
δx =
1
20
.
(152)
(153)
Extensive numerical calculations were made in order to compare the above
methods of finding the minimum crossing number of a braid. A large selection
of random braidsirandom braid were generated as discussed in §2 and then
simulated using all four different methods described above.
We have investigated, by means of computer simulation, different methods
to reduce the crossing number of a braid over its equivalence class. As a group
theoretical question, this problem is difficult (if the minimum is to be found
[168]) but can be profitably approached using a heuristic algorithm presented
above. A braid can also be regarded as a topological object divested of this
algebraic approach. Here the strings may move (except the endpoints) in the
embedding manifold without crossing each other. For algorithmic purposes a
systematic way to move the strings must be found based on certain principles.
Two of our approaches center on a physical model of the strings as elastic
strings made of flexible material. Elasticity may be modelled using a nearest
neighbor or curvature approach, both of which were investigated. Another
way to systematically move the strings is to construct a force not based
on a physical idea but by using the crossing numbericrossing number (as
an integral) as a potential in a LagrangianiLagrangian. This last approach
has proved to be the most successful in terms of finding the shortest braid,
on average. It is however the most time consuming method. The algebraic
approachialgebraic algorithm, while only third (out of the four methods) in
reduction efficacy, is the fastest by far.
In many applications, the braid is already an embedded topological object
and not an element of the braid group. Here the two energy methods find
their application as they are the only physically relevant methods. In solar
88
Patrick D. Bangert
physicsisolar physics, for example, the magnetic field lines may be modelled
as braids. These seem to behave as elastic configurations over time. It must
be mentioned that the endpoints of these braids do move but in a random
fashionirandom braid. Research about this added complication is in progress.
In physical applications, we are most concerned about the energy of a braided
configuration and the elastic model seems to be the most realistic for a variety
of applications. While the constrained approach is more successful in terms
of crossing number, the curvature fares better in an energetic sense.
What has clearly emerged from the discussion above is that minimum
energy and minimum crossing number for braids are different things. While
reducing energy does also reduce crossing number, reducing crossing number
does not necessarily reduce energy and crossing number may be reduced much
further after the minimum energy configuration has been reached. Thus, it is
clear that the elastic approaches terminate in a local minimum as far as the
equivalence class of the initial braid is concerned. From the point of view of
ideal knot theory, this result is significant because it has often been suggested
that by reducing some form of knot energy, one may find a knot which is particularly simple over its equivalence class. Whether this measure of simplicity
coincides with minimum crossing number over all possible projections (the
traditional measure of simplicity used by knot tabulators such as Tait) has
given rise to some debate for which our result provides additional fuel.
We conclude our investigation by saying that the algebraicialgebraic algorithm method provides a useful minimization approach for purely group
theoretical work, the crossing force is the best approach when one wishes to
find an especially short braid (and is not bound to a purely group theoretical
framework) and the curvature elastic energy is the best scheme to minimize
elastic braid energy, i.e. total string length.
5.4 Feynman Path Integrals
In classical physics, one writes down the Lagrangian of the system which is
the kinetic energy minus the potential energy of all the parts of the system.
The action S is the integral over time of the Lagrangian and one uses the
“principle of least action” to say that nature will acts so as to minimize
the action. By the calculus of variations, one arrives at the Euler-Lagrange
equations in terms of the kinetic and potential energy expressions and these
are the equations of motion of the system. When we integrate over time from
some initial time t1 to some final time t2 , the initial conditions together with
the equations of motion prescribe one definite path of all particles from their
initial to their final states.
In quantum mechanics however, the particles do not travel along a welldefined path as their positions and momenta are not simultaneously absolutely certain (according to the von Neumann and Copenhagen interpretations). Usually, this illustrates that the concept of a path is not useful in
quantum mechanics. It was through a hint of Dirac that Feynman had the
Braids, Knots and Applications
89
idea of turning this limitation around. If we are not certain of the path, we
should integrate over all possible paths [76, 77, 87, 88, 89]. However not all
paths are equally likely. Feynman’s idea is that each path should obtain a
weight of exp(iS/) where S is the action for that path and is Planck’s
constant divided by 2π.
We recall that a quantum mechanical probability is obtained by taking
the absolute value squared of the wave-function. How then is this weighting
of any use as | exp(iS/)|2 = 1? The answer is that all these paths must
be added “coherently,” i.e. inside the absolute value sign. The paths act like
waves which interfere with each other and there will be constructive and destructive interference in various places. The classical path is that path which
extremizes the action and so there will be heavy constructive interference in
its neighborhood. In this way, the classical path is reproduced in the classical
limit.
From a strict mathematical point of view, the path integral to be done
is not well-defined as no measure theory exists which makes it precise [123].
Nevertheless it can be evaluated and is of particular use in numerical work
as it does not involve operators but merely classical functions. In fact, the
search for a formulation of quantum mechanics amenable to numerical calculation leads to this approach [6]. Because of the difficulties involved, many
mathematicians study the path integral from a formal basis with a view to
make it rigorous [95, 162] and have had some success in the semi-classical
expansion of the integral in powers of [152, 153, 154, 155, 69, 70]. For more
background and comprehensive introduction to path integration see [123].
Path integrals are very useful in polymer physics. Several polymers may
entangle giving rise to links or self-entangle giving rise to knots. One may
make a computer simulation of polymers from this approach and discover that
the probability p of a self-entangled polymer being topologically equivalent
to the unknot or unlink is
p ≈ 1.2325 × 0.9949N
(154)
where N is the number of segments of the polymer (for example base pairs
in DNA) [145, 146, 207, 212, 126]. In other words, the probability of an
unlinked self-entangled polymer decreases exponentially with the length of
the polymer.
Via path integration we can approach DNA recombination (from the
Calugareanu theorem), the Chern-Simons theory which gave rise the Witten invariants of topology and anyons (including the fractional quantum Hall
effect) [123], all of which will be discussed in the following sections. Path
integrals provide a natural way to use topological invariants defined as integrals in physical systems described by a path integral. It is conceivable that
much new topology and physics could be derived from combining the Feynman approach with the integral formulation of knot theoretic invariants by
Kontsevich [127].
90
Patrick D. Bangert
5.5 Braids and Particle Physics: Anyons
It is the common wisdom of the Copenhagen interpretation of quantum mechanics that the world’s building blocks act sometimes as waves and sometimes as particles. For lack of a better word, these entities are usually referred
to as “particles” and they come in two varieties: bosons and fermions. Any
particle or aggregate of particles is described by a complex valued function.
What matters physically is the absolute value of this function and so multiplying by a factor, known as a “phase,” of exp iθ for some phase angle θ is
immaterial in the sense of causing no different physical behavior of the system. Given a collection of identical particles, swapping any two of them should
give the identical physics. The only thing which may conceivably change is
the phase of the function. We call particles bosons if exp iθ = 1 and fermions
if exp iθ = −1. This distinction is very fundamental and gives rise to a host
of other differences which are felt physically. For example, only fermions obey
an exclusion principle in which two identical particles may not be in the same
state. This gives rise to the electronic structure of atoms and thus chemistry.
Curiously, all particles which may be thought of as matter are fermions; such
as electrons and quarks (note that we are talking of fundamental particles so
that protons and neutrons do not figure). Correspondingly all particles which
are thought of as force carriers, the result of the quantization of the field, are
bosons; such as the photon, gluon, W and Z and the mysterious graviton.
The mathematical reason for this distinction and that there are only two
possibilities is the following. As the particles are identical, we can swap them
by merely relabelling them. Thus we have a representation of the symmetric group on the space of all possible configurations such that it maps any
permutation to a scalar multiple of the identity. There are clearly only two
such representations: The trivial one which does nothing and the one which
switches sign (bosons and fermions respectively). All particles observed in
nature appear to be of one type of the other. This is rather curious as there
is no fundamental reason to request a representation of the symmetric group.
It seems natural based on some sort of Diracian beauty principle but it is restrictive. Only a projective representation is required by quantum mechanics
and in this case we get the full spectrum of phases. The particles for which
exp iθ = ±1 are referred to as “anyons.”
If they exist, why are they not observed? In relativistic quantum field
theory we may prove a so called spin-statistics theorem which shows that
anyonic behavior can be arrived at by combining fermions and bosons so
that there really are no anyons. This acts as Occam’s razor until we note
that the theorem only holds for space-times of dimension greater than three.
As we live in one of these, we are done. Except that space-times of smaller
dimensionality may be simulated in the laboratory; for example in a very
thin slab of some material which is then a three dimensional space-time (two
space, one time dimension).
Braids, Knots and Applications
91
An experimental observation known as the fractional quantum Hall effect
may prove to be the vindication of the anyonic hypothesis. The Hall effect
is the observation that a magnetic field applied perpendicularly to a current
in a wire forces the electrons to one side. One sees this from the electric
field which, for a good conductor, increases like a step function and hence
is quantized. The catch is that the size of the steps is sometimes less than
what one expects and this is called the fractional quantum Hall effect. The
most convincing theory of this effect which explains the observed data makes
integral use of anyons. The details of all this are beyond the scope of this
section. What remains is to make clear what all this has to do with braids.
Before, we merely switched the labels of the particles (as they were identical) and got a different state function. Imagine actually physically moving
two particles and switching their positions. Again, we can arrange the phase
difference to be anything and thus get anyons. If we draw world-lines of the
switching process, we get a braid. Thus we have exchanged the symmetric
group representation which gave us bosons and fermions with a braid group
representation which gives us anyons (which contain bosons and fermions as
a special case). Anyons can be constructed in several ways.
When a system includes many particles (a gas for example) the statistical
behavior of the particles becomes important. The concept of particle statistics
can be visualized by an example from the history of war. At the battle of
Waterloo the English fought against the French. The French generals lined
their troops up in several rows. The reason was that when the first row had
shot, they would bend down while reloading and the second row could shoot.
In this way, the French could fire more rapidly than the English who lined
their troops up in one long row. The English fired once and obliterated the
enemy. On average, the number of shots per minute could be the same but
shooting all at once at the beginning means that many of the next rows of the
French troops could no longer shoot and were thus defeated. The English act
like bosons and the French like fermions in this example. Bosons are allowed
to be in the same state as other bosons whereas fermions have to have at
least one different quantum number (Pauli exclusion principle) and are thus
schematically arranged in several rows.
One would like to know if there is some method to interpolate such behavior. Anyons can have “any” statistics between bosons and fermions. The
statistics arises from a symmetry of the wave-function describing the particles; symmetric bosons and anti-symmetric fermions. One first wants to get a
clear understanding of what is meant by the interchange of two particles. By
means of the path integral formulation of quantum theory, an interchange
is thought of as a real physical moving of the two particles [128, 68]. It is
found that the phase factors gained from different interchange paths generate the fundamental group of the configuration space of the system [161].
The fundamental group of the configuration space (R2(N −1) /SN with N particles and SN the symmetric group of N particles.) of identical particles in
92
Patrick D. Bangert
the plane is the braid group [86, 90]. The Feynman path integral one must
compute for this sort of theory is over all closed paths in the configuration
space, in other words, the closures of the braid paths. Close connections to
braid and knot theory can be established on this basis. One can also consider
the problem in more complex spaces (see the references in [160]). Another
route to anyonic behavior is via Schrödinger quantization of many-valued
wave-functions in dimension two or in mathematical language vector bundles
[205, 75, 161, 189, 137, 216, 217, 133, 22]. Further weight is given to this by
noting that in a multiply connected space, a complex valued wave-function
may become multi-valued [160].
It is remarkable that one can meaningfully do physics in one or two dimensions seeing as we are living in a world of obviously more dimensions.
The reason that this is possible is that on the one hand, it is possible to
manufacture very thin (virtually one or two dimensional) materials and on
the other hand because of the second law of thermodynamics degrees of freedom are frozen out as the temperature of a system approaches absolute zero.
If one makes a connection between observations of fractionally charge particles and fractional statistics (still under debate), then one may say that
anyons have been directly observed in the fractional quantum Hall effect
mentioned earlier [56, 182, 53, 119, 99, 177, 71, 120]. The theory of the fractional quantum Hall effect is fascinating and is a substantial field of research
[102, 14, 131, 101, 121, 122].
An interesting connection is that anyons can be thought of as carrying
magnetic flux as well as electric charge and then the interchange phase would
give rise to an Aharonov-Bohm effect [209, 210, 80, 4, 5]. This lead to the
name “anyon.”
One of the concrete prediction of distinct behavior of anyons to other
particles is that their ground state energy of the multiple anyon harmonic
oscillator increases as √
N 2 with the number of anyons N whereas the fermion
energy increases as N N [160].
The ideal gas law states that P V = RT where P is the pressure, V the
volume, R the molar gas constant (8.314 JK −1 mol−1 ) and T the temperature
of the gas. This being for ideal gases, a real gas has
P V = RT +
∞
An+1 P n
(155)
n=1
where the An are known as the virial coefficients (A2 is known as the second
virial coefficient and so on) and the equation 155 as the virial expansion
(called so because of its relation to the virial theorem [203]). Computing the
virial expansion for the first few terms is a serious challenge for the anyon
gas. Only the second virial coefficient can be obtained exactly in some cases
and all others must be calculated from a Monte Carlo approach. See [160] a
references therein for a good review of this effort. A curious implication is
Braids, Knots and Applications
93
that a gas of charged anyons will develop spontaneous magnetization also in
the absence of an external magnetic field [160].
5.6 Statistical Mechanics: The Yang-Baxter Equation
Mechanics is study of motion of individual objects, usually under the influence
of a central conservative force such as gravity. As we know, the two-body
problem can be analytically solved but already the three-body problem raises
insurmountable difficulties for exact solution. If we wish to study a gas, we
need to take into account a great number of individual atoms and molecules
making an exact analysis impossible. The idea of statistical mechanics is that
while the description of the individual particles may be difficult, describing
the global properties of their collective may not be so hard. After all, it
is these global properties such as temperature and pressure that physics is
interested in knowing. In short, the modelling paradigm is to sacrifice the
details in favor of the large picture.
Statistical mechanics is a huge topic which intersects many practical concerns of technology. We shall study a small sliver of this subject here to
illustrate one of its encounters with topology via the theory of braids. A few
physical concepts will have to be reviewed for this to develop its full impact.
According to quantum theory, an atom is allowed to exist in one of many
discrete energy levels. Suppose that our gas has Ni atoms in energy level Ei
for 1 ≤ i ≤ m. We wish to know the distribution of these energies so that
we may calculate the energy of the whole gas. According to the MaxwellBoltzmann distribution law (which lies at the foundations of the subject and
is experimentally verified to a high degree of accuracy), this is
Ei
gi exp − kT
Ni
= '
(156)
m
E
N
i
gi exp − kT
i=1
where N is the total number of atoms present, k = 1.3807 × 10−23 is Boltzmann’s constant (in units of Joules per Kelvin), T is the temperature of the
whole gas and gi is the statistical weight of the energy level Ei (i.e. the number of distinct quantum mechanical states of a atom of the gas with the same
energy). The denominator as a whole is known as the partition function, Z,
m
Ei
gi exp −
Z=
kT
i=1
(157)
If we have a large number of such gasses, then the average energy of such a
gas can be determined to be
E = kT 2
∂ ln Z
∂T
(158)
94
Patrick D. Bangert
Likewise, the other global properties can be obtained directly from the partition function. Knowledge of the partition function thus gives knowledge of
the global properties of the system at hand. It is thus the goal of statistical
mechanics to aid us in finding Z for any system we might encounter. Naturally, for any system actually encountered in nature, this is impossible in
an exact sense. There exist, however, several simple models of systems for
which an exact evaluation of Z is possible. Such models are known as exactly
solvable models. A classical example of such a situation is in the model of
real gasses in which one obtains the van der Waals equation of state from the
partition function. More information about statistical physics is available in
the literature [140].
The connection with topology comes through this partition function. We
will learn that the topology of the interaction of two atoms in particular
models yields an invariant closely related to the Jones polynomial (in fact a
generalization of the Jones polynomial).
Imagine a point interaction. Two particles a and b impact at a point,
interact in some way and depart, possibly in a changed state, as particles c and
d. For our purposes here, let a, b, c and d be the spins of the particles involved.
In general, our system allows for many spin values and so the transition
ab
amplitude of this interaction is a tensor indexed by the four spin values, Rcd
where we have made the convention that the “inputs” are top indices and
“outputs” bottom indices. If we have several interaction vertices, then we
must multiply the amplitudes and sum over all possible spin values of the
internal vertices. To complete the picture, we need to decide what to do with
a line segment (i.e. evolution without interaction). Suppose the two ends are
particles a and b, we represent this by δba which the Kronecker delta (valued
at 1 if a = b and 0 if a = b). Change without interactions is not allowed (thus
giving rise to the zero) and no change is represented by the one. Now we are
ready to code braid diagrams in this way.
ab
where a and b are the inputs,
For a positive crossing (like σ)i) write Rcd
i.e. the bottom two line segments, and c and d the outputs or the top two
ab
line segments. For a negative crossing write Rcd . In a braid group, we have
two relations that these amplitudes need to satisfy. We simply rewrite them
σi σj ≈ σj σi (|i − j| > 1)
σi σi+1 σi ≈ σi+1 σi σi+1
⇒
⇒
ef
ab
Ref
Rcd = δca δdb
ab lc
km
Rkl
Rmf Rde
=
(159)
bc ak
ml
Rkl
Rdm Ref
(160)
where we have made use of the usual Einstein summation convention (if the
same index appears once in the top and once in the bottom slot, sum over all
values for that index). Equation 159 means that RR = I, i.e. that R is the
inverse of R. Thus the inverse crossing gets the inverse scattering amplitude.
Lastly we add the physical principle of spin conservation, which says that the
ab
we further have
total spin in any interaction is conserved so that for any Rcd
that a + b = c + d.
Braids, Knots and Applications
95
Equation 160 is called the Yang-Baxter equation in statistical mechanics. It seems that since the Yang-Baxter equation is simply a translation of
topological relations that solutions to it will yield topological invariants. This
is indeed what we shall find. It is curious that in statistical mechanics the
Yang-Baxter equation is a sufficient condition for a model to be exactly solvable. This immediately gives us a connection between topological invariants
and exactly solvable models for physical systems.
Before we go on, here is a slightly different way of constructing the connection: We note without proof that adding the relations σi2 = e will transform
Bn into Sn , the symmetric group on n elements. Thus the braid group is
the most natural generalization of permutations in which permuting makes
real changes (cf. anyons). Now consider a vector space V and a representation of Bn on V n , the nth tensor product of V and consider the linear maps
ηi : V n → V n defined by
v1 ⊗ v2 ⊗ · · · ⊗ vn → v1 ⊗ · · · T (vi ⊗ vi+1 ) ⊗ · · · vn
(161)
where T is an invertible linear transformation of V 2 . We get the representation we want by now mapping σi → ηi . Naturally this only works if
(T ⊗ I)(I ⊗ T )(T ⊗ I) = (I ⊗ T )(T ⊗ I)(I ⊗ T )
(162)
where I is the identity on V . This equation is known as the Yang-Baxter
equation. Recall that one of braid group relations was the bridge relation,
σi σi+1 σi = σi+1 σi σi+1
(163)
The similarity of the Yang-Baxter equation and the bridge relation is
striking especially as we constructed the Yang-Baxter equation from braids.
It was first discovered by R. J. Baxter in the context of exactly solved models in statistical mechanics [25]. Yang arrived at it by trying to find twodimensional quantum field theories for which the scattering matrix could be
exactly calculated. The equation thus provides a fundamental requirement
for exact solubility in a variety of areas of physics and a significant effort was
started to find solutions to it.
Now we shall construct the partition function for a closed braid. Recall
first of all that any knot can be transformed into a closed braid and furthermore a closed braid with upward orientation (if the knot was oriented which
we shall assume here). Given the braid β ∈ Bn we label all the arcs coming
in and going out of any crossing and associate to each a transition tensor.
We also need to take care of the boundary conditions due to closure and we
need to multiply be a factor to take it into account. The partition function
is then,
ab
Z=
R±1 cd t−(a1 +a2 +···+an )
(164)
S
C
where the sum is over all the spin states S contained in the model, the
product is over all crossings C and the power of t is the boundary condition.
96
Patrick D. Bangert
The variables (a1 , a2 , cdots, an ) are the state variables gives to the top parts
of the closure strings of the braid β.
If we work with single fermions, we have the possibility that spin is ±1 (in
units of /2) and this simple situation will allow us to work out a partition
function. We shall let the transition amplitude be
1 0
0√ 0
0 0 − t 0
√
R=
(165)
0 − t 1 − t 0
0 0
0 1
Exercise 5.4. Calculate the partition function for β = σ1 ∈ B2 . The solution follows.
−1,−1
−1,1
1,1
There are only three contributing states: R−1,−1
, R−1,1
and R1,1
. Finally
−1
doing the sums and products we obtain Z = 1 + t .
The partition function is not an invariant yet but one can show that
Jβ (t) =
t
exp(β)+1
2
1+t
Zβ
(166)
is the Jones polynomial [158]. Note that exp(β) is the exponent sum of the
braid β. By changing the model slightly, we can achieve a generalization of
the Jones polynomials also [200].
What this shows is that knots and braids can be viewed as interaction
models in statistical mechanics and that the conditions that guarantee and
solution for the physical case also guarantee topological invariance. It becomes apparent that topologically invariant processes are, in some sense, the
simplest processes available in nature. This has given rise to a plethora of
research into the connections of statistical mechanics and knot invariants.
The construction that we have outlined here can generalized by the use of
quantum groups as was first done in [79] and extended in [195]. We may get
the original Jones polynomials [111] as outlined but also the two-variable generalizations (for example the Homfly [93] and Kauffman polynomials [116]).
A number of other invariants can be obtained from the Yang-Baxter equation [7, 8, 9, 10, 64]. The original construction of the connections between
topological invariants and statistical mechanics was done via quantum groups
[79] (for background on quantum groups see [141]). There are a number of
further connections between the two subjects and that of Lie algebras which
are investigated in [20, 25, 85, 109, 125]. The Ising and Potts models in statistical mechanics have been shown to yield a knot invariant known as the
Arf invariant [112]. A good review of the connections between link invariants
and statistical mechanics is [195]. We illustrate a further exiting connection
by means of an algebra.
The Temperley-Lieb algebra first appeared in 1971 in connection with the
Potts model in statistical mechanics and again when the Jones polynomial
Braids, Knots and Applications
97
was invented [111]. The algebra Tn is generated by ti for 1 ≤ i < n and
contains the relations
ti ti±1 ti = ti
(167)
t2i
= uti
ti tj = tj ti ;
|i − j| > 1
(168)
(169)
where u is a constant. If we can set up a topological interpretation of this
algebra, we would have another connection between topology and statistical
physics. Let us first construct a purely
formal
connection. Consider the al
gebra as a module over the ring Z a, a−1 and set u = −a2 − a−2 . Further
consider the mapping ρ : Bn → Tn defined by
ρ (σi ) = a + a−1 ti
−1
= a−1 + ati
ρ σi
(170)
(171)
(172)
The Temperley-Lieb algebra will be a representation of the braid group if the
mapping satisfies the braid group relations,
(173)
ρ (σi ) ρ σi−1 = 1
ρ (σi σi+1 σi ) = ρ (σi+1 σi σi+1 )
ρ (σi σj ) = ρ (σj σi )
|i − j| > 1
(174)
(175)
Exercise 5.5. Verify that the relations 173, 174 and 175 hold. You will have
proven that the Temperley-Lieb algebra is a representation of the braid group.
For the topological interpretation, take ti to be in the shape of the elementary tangle 0 (see figure 34) with the bottom left string being string i.
Just in the same way, we built braids as stacks of crossings by writing them
as words in σi , we can now write words of ti and thus obtain stacks of zero
tangles. Naturally t2i is the same as ti plus an unknot. This gives us the interpretation of u, it denotes an unknot. The other relations of the algebra
have clear topological correspondence.
Exercise 5.6. Draw all three relations of the Temperley-Lieb algebra with
the above interpretation in mind. Observe that they hold topologically.
Knot polynomials may be calculated using this algebra and what is known
as the state model of knot polynomials [116]. Much is known about this
algebra and its connections with both knot theory and statistical physics and
we shall refer the reader to the literature for further details [135].
5.7 Anyons to TQFT’s via the Hopf Invariant
Consider a two-dimensional magnet. Each atom has a spin which we consider
to be a unit vector, a point on the sphere S 2 . The distribution of spins will
98
Patrick D. Bangert
give us some measure of the state of the magnet. By adding a point at infinity,
our model is thus a map from S 2 (position of the atom in the magnet plus
the point at infinity) to S 2 (spin vector of the atom). Of course this model is
simplistic beyond belief but it will get the point across. Now the whole point
of topology is to observe that not all maps with identical source and target
spaces are created equal. The differences between them are enumerated under
the heading of “homotopy.” Imagine a donut-like structure with n holes.
Given two of them with n and m holes respectively, they are homotopic if
and only if n = m. A sphere may be mapped to itself by wrapping it over
itself, a kind of turning inside out. These induced twists are called topological
solitons and the number of times the sphere is wrapped is counted by the
soliton number or winding number. As always in things quantum we can
temporarily create a pair of anti-particles and then annihilate them. So let
there be a soliton-antisoliton pair. We will draw their short lives as a three
dimensional history and we will get a knot. Most notably, we will get the
Hopf link in two possible varieties. The Hopf link is the canonical closure of
the braid σ12 or σ1−2 . The two cases can be distinguished by the Hopf invariant
which is also known as the linking number. From the knot diagram, we see
that the first variety (σi in a braid representation) has a linking number of 1
and the second (σi−1 in a braid representation) -1 (the sign is a convention and
thus subject to redefinition). The linking number of two knot components is
equal to one-half of the sum of these crossing contributions. In this way, the
Hopf link has linking number 1 or -1, depending on the orientations chosen.
The Hopf invariant may be calculated in more esoteric ways which will
illustrate a few surprising connections. Gauss wrote down an integral which
gives the linking number of two curves l1 and l2 .
- |(x1 − x2 ) · dx1 × dx2 |
1
(176)
lk (l1 , l2 ) =
3
4π
|x1 − x2 |
l1 l2
We will find that we may rewrite this in another form using differential geometry. This will eventually lead us to writing another integral which will yield
other knot invariant, in particular the Jones polynomial. However, before we
can continue, we must explain some concepts from differential geometry. For
a general introduction to the subject see [100].
Imagine that you have two manifolds M and N and you have a function
φ : M → N from M to N . Given some real valued function f on the manifold
N , f : N → R, we are asked to construct a real valued function g on M ,
g : M → R. This is most easily done by composing the function φ with f ,
g = φ⋆ f = f ◦ φ.
(177)
We then call g the pullback of f by φ.
Having gotten pullbacks, we need forms. Recall the gradient ∇f of a
function f defined on Rn . If n = 3, we have
Braids, Knots and Applications
∇f (x, y, z) =
∂f (x, y, z)
∂f (x, y, z)
∂f (x, y, z)
î +
ĵ +
k̂
∂x
∂y
∂z
99
(178)
We would like to generalize this concept to an arbitrary manifold M . When
we have done this, we will denote it by df and call it a differential 1-form.
To evaluate the directional derivative in a direction v we must take the dot
product ∇f · v and this necessarily invokes the metric of the space, i.e. the
function that measures distance between points. We will find it more convenient to work without a particular coordinate system (and without a particular metric) and so we would like to be able to formulate this df such that it
is independent of the metric, it can therefore not be a vector field. Note that
the directional derivative takes in a vector field v and returns a function, the
directional derivative of f in the direction v. What we are really after is a
map that accomplishes this. The essential property of this map is that it is
linear, i.e.
∇f · (v + w) = ∇f · v + ∇f · w
(179)
So we define a 1-form to be a map from the set of all vector fields in M to
the set of all infinitely differentiable functions on M that is linear over this
last set. So a 1-form ω satisfies two equations
ω(v + w) = ω(v) + ω(w),
ω(gv) = gω(v)
(180)
for two vector fields v and w and an infinitely differentiable real valued function on Rn . We can multiply two 1-forms together using a so-called wedge
product which is denoted by ∧. This is essentially a glorified vector cross
product which we will not explain in further detail. We construct a p-form
by taking a linear combination of products of p 1-forms.
Finally, recall that one can get the “volume” of an interval [a, b] in R by
the integral
,b
(181)
l = dx
a
This dx is a simple example of a volume form.
We are now ready to translate equation 176 into our new language. It
can be rewritten in terms of the volume form on S 2 pulled back to S 3 . This
closed 2-form on S 3 can be written as dA of some 1-form. Now integrating
A × dA over S 2 and dividing by 4π gives the desired result,
,
1
lk =
A ∧ dA
(182)
4π
S2
For details of why this rewriting process works and is equivalent to Gauss’s
original integral see [21] and for a general background on differential geometry
in relation to algebraic topology see [42]. Actually the choice of A is arbitrary,
100
Patrick D. Bangert
this is called “gauge freedom” in physics. After this rigmarole, we arrive at
the same linking numbers as above.
Coming back to the situation where a soliton-antisoliton pair was created, we could create it in two ways: A Hopf link of linking number 1 and
-1. Classically, the two possibilities produce the same physics but quantum
mechanically they do not as we must sum over all possible histories in the
Feynman path integral approach and they are fundamentally distinct (topologically distinct) histories. To be exact, they differ in a phase. The associated
phase is exp(lkiθ) where lk is the linking number. In this way, they act like
anyons. This is an example of a theory in which the punch line lies in phase
effects just like in the Aharonov-Bohm effect (in which a applied magnetic
field causes phase effects to manifest in a quantum mechanical double slit experiment) [4]. Quantum mechanically, phase differences are not supposed to
play a role because when probabilities are evaluated, phases disappear. Suppose the wave-function Ψ → Ψ eiφ , then the probability |Ψ |2 → |Ψ eiφ |2 = |Ψ |2
remains invariant. After the conceptual revolution that the Aharonov-Bohm
effect cause in quantum mechanics and much philosophical discussion, the
existence of these phase effects was experimentally verified [204, 180]. This
shows that topologically different histories may cause different physical events
and thus the study of topological invariants has a real practical impact.
To go further, we remind ourselves that the modern approach to get equations in physics is to write down some function called a Lagrangian and then
to construct an integral of this function over the space. This integral is called
the action. We look for the Lagrangian that makes this action minimal and
using the calculus of variations, this gives rise to a number of differential
equations that are the state equations of our physics. Much physics can be
done by investigating this action integral. A quantum field theory is a theory
constructed in this way that makes the predictions observed in the laboratory. Generally this is heavily dependent on the metric of the space-time it
assumes. In general relativity we have learned that we may not assume a
space-time as a priori given but that space-time evolves together with the
matter in that space-time. Thus we look for a quantum field theory that is
largely independent of the metric of that space (i.e. an action integral in which
the metric does not appear). Such theories are called topological quantum field
theories.
From elementary geometry we have learned that matrices can be thought
of as transformations (i.e. a vector can be rotated by matrix multiplication).
If a transformation leaves a system of points invariant, it is called a symmetry.
For example, any rotation of the unit circle (center at the origin) leaves the
circle unchanged and is thus a symmetry of the circle. Such symmetries may
form a group and then a system is said to possess a symmetry group. Much
modern quantum field theory begins with assuming a certain symmetry group
and metric independent action integral (for background on this see [208, 206]).
Braids, Knots and Applications
101
A matrix U is unitary if its adjoint U ⋆ and inverse U −1 are the same,
U = U −1 . The symmetry group of all n × n unitary matrices is called U (n).
If we add the restriction that the determinant is to be equal to one, then the
matrix is special unitary and the symmetry group is called SU (n). A matrix
is orthogonal if U T = U −1 where U T is the transpose of the matrix. If its
determinant is equal to one also, then it is special orthogonal. The symmetry
groups based on these matrices are known as O(n) and SO(n) respectively.
The topological quantum field theory started by Chern and Simons took
the group U (1) as the symmetry group under consideration. They construct
the action SCS (A) as a function of the 1-form A,
,
k
2
(183)
SCS (A) =
tr A ∧ dA + A ∧ A ∧ A
4π
3
⋆
S
where S is a compact oriented 3-manifold and k is an integer called the level
(it is invariant under gauge transformations). In particular, we may consider
the 1-form A as the vector potential of electrodynamics, i.e. dA = B the
magnetic field. The action is important in quantum mechanics because the
Feynman integral is an integral over exp(iA) where A is the action. In this
way, we may obtain the partition function of our theory,
,
(184)
Z(S) = exp (iSCS (A)) DA
A
where DA is a Lebesgue measure and A is a complicated space that depends
on the manifold S and on the symmetry group chosen. Actually evaluating
this integral is very difficult. On formal mathematical grounds, it has not yet
been proven that such integrals even exist as no measure theory has been developed to cope with them. This does not worry the practical people however
and they have achieved many things based on the Feynman approach. Consider that one may move along several closed curves in the space S denoted
by γ1 , γ2 , · · · , γn and consider the weighted partition function
,
Zw (S) = W (γ1 , A) W (γ2 , A) · · · W (γn , A) exp (iSCS (A)) DA
(185)
A
where W (γi , A) is called the Wilson loop and is equal to the trace of the
holonomy around γi of the connection having vector potential A. A holonomy is a map of one vector bundle to another one that has been parallel
transported along a given path. To give an adequate explanation of the concepts of holonomy and connection would go beyond the limits of this section.
Suffice it to say that the Wilson loop can be calculated and is a function of
the 1-form A and the loop γ1 and that it measures the self-interference of a
particle. In the case of a U (1) theory, it is equal to the phase change as it
moves around the loop and then gives rise to the Aharonov-Bohm effect.
102
Patrick D. Bangert
Now we can play with different symmetry groups. If we choose U (1) we
obtain the writhe of the knot L given by the loops γ1 , γ2 , · · · , γn . On the
other hand, SU (n) gets us the Homfly polynomial which is a generalization
of the Jones polynomial and finally SO(n) gives the Kauffman polynomial.
It has been a thorn in the eye of knot theorists for a long time that
many knot invariants (especially the polynomial invariants) have been defined through two-dimensional projections of knots and that no genuinely
three-dimensional definitions of them were available. This result remedies
this situation. It is however clear that if one wishes to obtain the Jones polynomial of a particular knot, one should stick with the old methods and not
try to compute this integral. For the original discovery of these integrals see
[213] and for a more pedagogical discussion see [21].
5.8 Tangles and DNA
We consider the notion of a tangleitangle and analyze the operations which
are possible on it. We use tangles in constructing a new notation for knots
based on Conway’s knot notation. This new notation has several advantages
over existing notations. All the basic properties of the notation and algorithms
to retrieve simple knot information are discussed. Procedures for putting a
knot into our notation are also given. Finally, polynomial-time algorithms,
which do not rely on topological deformation, are described which produce
a plaitiplait and a closed braid which are isotopic to any knot given in our
notation.
First, we review the notion of tangles and investigate their classification.
We shall then introduce the new notation, prove that all knots may be represented by it, give an algorithm to place a given knot into this notation
and present a traversal algorithm which will calculate certain features of the
knot. An algorithm is then given to obtain a plaitiplait and a braidibraid,
the closures of which are a given knot in the new notation.
Definition and Partition Consider the 3-balli3-ball B 3 and choose 2n
points on its surface, which is the 2-sphere S 2 , and call the set of these
points P . Attach n polygonal curves to the 2n points such that: (i) each curve
intersects S 2 in exactly 2 points in P , which are its endpoints, (ii) exactly one
curve may begin or end at any one point in P and (iii) no curve may
intersect
another. If the set of these curves is T , then we will call the set B 3 , T an
n-tangle. In particular, we will focus on 2-tangles and so whenever we skip
the n, it will be understood that we mean n = 2. Note that our requirement
that the curves be polygonal excludes any wild tangles, where wild is to be
understood in the usual knot theory sense. Two tangles are called equal if
they are isotopic without moving the points in P .
A tangle can be visualized readily by choosing the four points (named
according to the cardinal points of the compass)
Braids, Knots and Applications
NW
z
•
OO
/
&
•
$
103
NE
"
^
`
\ Z Xy
b
fd
O
O
o
//
O X
Z \x ^_ ` b d f o
"
$
&
•
•
SW
SE
/
_
Fig. 33. The 3-ball and the four points on its surface which form the endpoints of
the two polygonal curves necessary to define a tangle.
1
1
N E = 0, √ , √
,
2
2
1
1
SE = 0, √ , − √
,
2
2
1
1
0, − √ , √
2
2
1
1
SW = 0, − √ , − √
2
2
NW =
(186)
(187)
on the unit sphere, which will be our canonical B 3 , see figure 33. Even though
tangles are, by definition, three dimensional objects, we will work with their
projection onto the two dimensional plane as if the projection is the tangle.
The fact that a projection in which there are at worst double points always
exists for a tangle follows from the corresponding theorem about knots.
•
•
0
•
•
•
•
∞
•
•
•
•
1
•
•
•
•
•
•
−1
Fig. 34. The elementary tangles.
We shall find it convenient to partition the set of all possible tangles into
a few categories: elementary, integral, fractional, rational and irrational. The
simplest are the elementary tangles, of which there are four. These are best
introduced by displaying them in figure 34. Note that we have not drawn B 3 ,
it should however be understood to be present. The reason for naming them
as they have been will become apparent later on. Note that the literature
disagrees on which of the two tangles ±1 is to have the minus sign, this
is a matter of convention and has no serious consequences (we follow the
convention introduced by Conway).
The other types of tangles can be most readily defined in terms of combining the elementary ones in some way. To do this, we shall define two ways
104
Patrick D. Bangert
??
?
?
??
A
??
A+B ≡
,
??
??
A⊕B ≡
??
??
A
B
B
Fig. 35. Tangle addition.
of adding tangles. Following Conway, we denote a general tangle by an ”L”
shaped symbol within the 3-ball and we also sketch the ends of the two curves
by which tangles may be attached to one another. In this way, we define the
horizontal sum + and the vertical sum ⊕ in figure 35.
In what follows, we shall use a superscript to denote of which type a
particular tangle t is; for example an elementary tangle t would be denoted
by t(e) . An integral tangle t(i) and a fractional tangle t(f ) will be defined in
terms of the elementary tangles ±1 by
t(i) = 1 + 1 + · · · + 1
t factors
t(f ) = 1 ⊕ 1 ⊕ · · · ⊕ 1
t factors
(188)
t(r) = a(i) ⊕ b(f ) + c(i) ⊕ d(f ) + · · · + z (i)
j odd
(190)
(189)
The negative versions are, of course, the sums of −1 tangles instead of 1
tangles. A rational tangle t(r) can then be defined in terms of a sum of integral
and fractional tangles. The definition of the sum differs if the number of
tangles j in the sum is even or odd, this is because the definition requires
an alternate sum between integral and fractional (and the two methods of
addition) which always ends in an integral tangle being added. This is because
the set of rational tangles may be classified if this restriction is imposed; the
classification scheme is outlined in the next section. The integral tangles,
including the last, may be zero and the fractional tangles may be infinite. If
any component tangles are 0 or ∞ though, they may be removed from the
sum and the terms immediately preceding and following the removed term
may be added together to shorten the sum, while preserving isotopy.
t(r) = a(f ) + b(i) ⊕ c(f ) + d(i) ⊕ · · · + z (i)
j even
(191)
Note that the set of elementary tangles is a subset of both the integral and
fractional tangle sets which are subsets of the rational tangle set. We shall
call any tangle which is not rational, irrational.
Braids, Knots and Applications
105
Classification of Tangles We may denote a rational tangle by giving its
integral and fractional factors in order. Thus a sequence of integers t(r) =
(a1 , a2 , . . . , ai ) defines any rational tangle. Note again that the identity of
the tangle factors is decided by requiring the last in the sequence to be
integral. Given a rational tangle t(r) = (a1 , a2 , · · · , ai ), we may associate
with it an extended rational number E(t(r) ) = α/β, where α and β are
integers including zero. We say an extended rational number because this
allows for 1/0
= ∞, the inclusion of which extends the rational numbers. We
calculate E t(r) by the continued fractionicontinued fraction (the + signs
are arithmetic additions and not tangle additions)
( )
1
E t(r) = ai +
(192)
1
ai−1 +
1
ai−2 · · · +
a1
Conway [61] was able to deduce that two rational tangles are equal if and
only if the associated extended rational numbers were equal, this is called
Conway’s Basic Theorem. The first published proof may be found in [48]
but a more intuitive proof was given by Goldman and Kauffman [98]. Thus
Conway’s Basic Theorem classifies rational tangles in a simple algorithmic
manner.
In particular, the fractions associated with the elementary tangles are
their numerical names: 0, ±1 and ∞. The fraction for an integral tangle t(i)
is t(i) and for a fractional tangle t(f ) is 1/t(f ) . It is clear now why these
tangles were named as they were. This concludes our review of previous work
on tangles and the rest of the chapter is new work.
By equation 192 is easy to calculate the fraction associated with a given
rational tangle. Given a fraction, it is also possible to decompose it into
appropriate factors, thereby constructing the rational tangle associated with
it. Euclid’s algorithm will accomplish this.
Connection to DNA DNA is a well known molecule which can be regarded
to be the code for the generation of a human being or an animal. It is in the
form of double helix. Two strands of molecules are connected to each other
and wind about a common axis (this looks like figure 2 (b)). This double
helix has ends which may or may not connect thus forming a knot. There
also exist enzymes which break this knot locally, make some changes and
glue the cut back again. In the laboratory it is possible to make pictures of
knots and links of DNA. In particular it is possible to make pictures of a knot
before and after such an enzyme has acted upon it. The goal for topology is
to describe what changes are possible and thus to create a topological model
for site-specific recombination, i.e. the cutting and gluing operations of such
enzymes at a particular location.
We recall that molecules with the same chemistry but different structure are isomers. Two DNA molecules with the same base pair assignment
106
Patrick D. Bangert
are isomers but may have different linking numbers due to enzyme action,
they may thus be topologically distinct and are thus called topoisomers. An
enzyme may cut a single stand of DNA, pass the other strand through it
and glue the cut back again. This is the enzyme topoisomerase I. The other
possibility is that the enzyme cuts two strands of DNA, passes two strands
through and glues the cut back again. This is the enzyme topoisomerase II. In
−1 −1 2
2
braid terms, this is making σi into σi−1 and making (σi+1 σi ) into σi+1
σi
respectively. Both moves change topology locally.
Empirical evidence tells us that almost all the products of these sitespecific recombinations are rational knots (if one starts with the unknot) and
that the part of the DNA molecule which is acted upon by the enzyme is the
(2, 2)-tangle. Let us call the tangle that is the DNA molecule outside of the
recombination site S and the recombination site before the enzyme action E
and after R. We observe that the whole DNA molecule is knot K1 before the
event and K2 after the event. Then we have
N (S + E) = K1 ;
N (S + R) = K2
(193)
Knowing K1 and K2 from observations, it is our task to find S, E and R. This
is of course not possible using just two equations. Here, another empirical
observation comes to our aid: The change an enzyme makes depends only
upon the enzyme, not the DNA molecule. Thus if the enzyme make several
changes, they are all the same. Thus if we have another observation of a knot
K3 after a second change, we have
N (S + R + R) = K3
(194)
In the experiments actually carried out, the following was found
N (S + E) = Unknot
N (S + R) = Hopf Link
N (S + R + R) = Trefoil
N (S + R + R + R) = Whitehead Link
N (S + R + R + R + R) = 62
(195)
(196)
(197)
(198)
(199)
(200)
As the knot 62 is chiral (it is not isotopic to its mirror image), we must
be careful to specify it properly. Rolfsen [175] and Murasugi [158] show the
mirror images of each other in their respective tables. We shall follow the
original publication of the empirical result [81] in which they give the tangle
(1, 1, 1, 2, 1) which is isotopic to the knot 62 as given by Rolfsen and as shown
in this text in figure 8.
Given this information, it is possible to find solutions for S, R and E. We
shall merely give the results as the proofs are quite lengthy (see [81]). S turns
out to be the tangle (−3, 0) which is, of course, the unknot under numerator
Braids, Knots and Applications
107
closure. R is the tangle (1). The tangle E can not be uniquely determined
using these equations, it is (2x, 3, 0) for any integer x. Important biological
information can be extracted from this. For example, the Whitehead link can
not be obtained using just a single recombination event.
This investigation gives rise to much stimulating mathematics which we
do not have the space to present. The theory of solving tangle equations
(to which the above is mere special case) is not fully developed yet [82, 83].
Nothing has been done on solving tangle equations for larger than (2, 2)tangles.
5.9 Ideal Knots
Recently there has been a great effort to study “ideal knots.” There is considerable disagreement on what “ideal” is to mean and of what use the endeavor
is. We shall give a brief introduction to the problems involved here. For the
topologist, a knot is a topological object which does not change under continuous transformations. For the geometer or physicist such a transformation
is real. What one would like is a canonical representative of each topological
knot type; a definite embedding for each knot type which is going to serve as
an ambassador for the type. This ambassador should have the following properties: (1) There should be exactly one for each knot type, (2) there should be
an (efficient) algorithmic prescription to find it for any knot type (i.e. an algorithm is started with a knot and evolves it until it has reached this canonical
type) and (3) this prescription should always find this one configuration no
matter with which initial embedding the algorithm begins. Note that if one is
successful in finding such a prescription, one has solved the knot classification
problem. Needless to say, these properties are only approximated by the currently known approaches. A further desire is that the canonical type should
be (4) simple and (5) aesthetically pleasing. If the knot has symmetries, the
canonical embedding should make these apparent. A particular knot embedding which may serve as such an ambassador for its type is called ideal. As
no known algorithm exists that satisfies all five desiderata, one must prefer
one point over another and this is where the different meanings of “ideal”
have their origin. The historical start of the discussion can be well-defined:
It happened in a conference talk given by Jonathan Simon in Nov. 1991 in
Bielefeld in which he called a number of knot conformations produced earlier
“ideal” [184].
The most common approach is to begin with a definite embedding of a
knot and to evolve it using a physical model for it. This typically proceeds
by first writing down an expression that will be called the energy of the
knot; typically an integral over the knot of some quantity. This “energy”
is to be minimized just like classical physics and so we use the calculus of
variations and obtain some equations that will allow us to construct an energy
reducing transformation. Having reached the minimum energy state, we ask
whether it is a local minimum or the global minimum. We ask if a definite
108
Patrick D. Bangert
global minimum exists. We ask if we can reach this global minimum from all
points in state space (all initial embeddings) using the algorithm obtained. In
general, the answer to these questions can not be fully given. Various energies
have been investigated and have been observed (by numerical experiments)
to have some advantages and disadvantages.
A very simple way to define idealness is to look at the largest radius that
the knot tube can have without overlapping with itself divided by its total
length. This can obviously be formulated via a minimum principle by taking
the “energy” of the knot to be its length (the knot being made of a rope
with some finite thickness). This is a very interesting energy as it correlates
with the speed with which knotted DNA polymers move through a gel. It is
an experimental observation that knotted DNA polymers move faster than
unknotted ones and the minimum rope length measure of a knot type is
linearly proportional to the gel velocity of a DNA knot of that type [188].
However the gel velocity varies with the conditions under which the knots
move through the gel and so the coefficient of the linear relation is a function
of the conditions and the knot type [134].
After the energy approach was invented [164], many energies were tried
[149, 47, 92, 185, 165] but it was found that energies are actually difficult
to define given that they have to obey some basic laws such as approaching
infinity when the knot approaches a self-intersection [72, 73, 74].
Other methods to obtain ideal knots also exist. Simulated annealing is a
popular way to find minima numerically and investigations to determine its
usefulness for knots are under way [132]. A very sophisticated knot tightening
algorithm called Shrink-On-No-Overlaps (SONO) which was invented while
studying braids can currently be called the best ideal knot algorithm [170].
It is too complex and technical to present here; let it just be said that the
method is not elegant but the results are even though the algorithm gets stuck
in local minima [169]. An experimental vindication of the SONO method was
performed and confirms its results [74].
An alternative way to view idealness is by a a functional representation.
It can be shown that every knot is harmonic, i.e. every knot can be represented by three functions (giving the three coordinates of its points) of an arc
length parameter t which are all finite trigonometric polynomials [193, 194].
For example the unknot is given by (sin(t), cos(t), 1). These methods can be
slightly changed and a Fourier series representation derived instead [117].
The endeavor to find an “ideal” geometrical representative for each knot
type has proven to be a difficult problem indeed. It is worth studying from
a physical point of view and also from a classification point of view. It is
an issue of practicality if one wishes to distinguish two particular knots to
compute invariants or to see if one can show by diagrammatic means whether
the two are equivalent. Algorithms like SONO may help the mathematician
by sparing lots of invariant computing by simply showing that the knots are
Braids, Knots and Applications
109
equivalent by producing a continuous transformation between them. This is a
vibrant area, much work is being done and the last word is far from spoken.
References
1. Adams, C., Hildebrand, M., Weeks, J. (1991): Hyperbolic Invariants of Knots
and Links. Trans. Amer. Math. Soc., 326, 1–56.
2. Adian, S. I. (1957): The unsolvability of certain algorithmic problems in the
theory of groups. Trudy Moskov. Mat. Obsc., 6, 231–298.
3. Adian, S. I. (1957): Finitely Presented Group and Algorithms. Dokl. Akad.
Nauk SSSR, 117, 9–12.
4. Aharonov, Y., Bohm, D. (1959): Significance of Electromagnetic Potentials in
the Quantum Theory. Phys. Rev. (Ser. 2), 115, 485–491.
5. Aharonov, Y., Bohm, D. (1963): Further discussion of the role of electromagnetic
potentials in the quantum theory. Phys. Rev. 130 1625–1632.
6. Aitchison, I.J.R., Hey, A.J.G. (1989): Gauge Theories in Particle Physics. Second Edition (IOP Pub., Bristol)
7. Akutsu, Y., Wadati, M. (1987): Knot invariants and critical statistical systems.
J. Phys. Soc. Japan, 56, 839–842.
8. Akutsu, Y., Wadati, M. (1987): Exactly solvable models and new link polynomials I. N-State vertex models. J. Phys. Soc. Japan, 56, 3039–3051.
9. Akutsu, Y., Deguchi, T., Wadati, M. (1987): Exactly solvable models and new
link polynomials II. Link polynomials for closed 3-braids. J. Phys. Soc. Japan,
56, 3464–3479.
10. Akutsu, Y., Wadati, M. (1988): Knots, links, braids and exactly solvable models
in statistical mechanics. Comm. Math. Phys., 117, 243–259.
11. Alexander, J. W. (1923): A lemma on systems of knotted curves. Proc. Nat.
Acad. Sci. USA, 9, 93–95.
12. Appel, K. I. and Schupp, P. E. (1972): The Conjugacy Problem for the Group of
any Tame Alternating Knot is Solvable. Proc. Amer. Math. Soc., 33, 329–336.
13. Arnol’d, V.I. (1978): Mathematical Methods of Classical Mechanics. (Springer
Verlag, Berlin).
14. Arovas, D., Schrieffer, J.R., Wilczek, F. (1984): Fractional statistics and the
quantum Hall effect. Phys. Rev. Lett., 53, 722–723.
15. Arteca, G. A. (1999): Path-integral calculation of the mean number of overcrossings in an entangled polymer network. J. Chemical Information & Computer
Sci., 39, 550–557.
16. Artin, E. (1925): Theorie der Zöpfe. (in German) Abh. Math. Sem. Univ. Hamburg, 4, 47–72.
17. Artin, E. (1947): Theory of braids. Ann. Math., 48, 101–126.
18. Ashley, C.W. (1993): The Ashley Book of Knots. Doubleday.
19. Baader, F., Nipkow, T. (1998): Term Rewriting and All That. (Cambridge
University Press, Cambridge).
20. Babelon, O. (1988): Jimbo’s q-analogues and current algebras. Lett. Math.
Phys., 15, 111–117.
21. Baez, J., Muniain, J.P. (1994): Gauge Fields, Knots and Gravity. (World Scientific, Singapore)
110
Patrick D. Bangert
22. Balachandran, A.P., Marmo, G., Skagerstam, B.S., Stern, A. (1991): Classical
Topology and Quantum States. (World Scientific, Singapore)
23. Bangert, P. D., Berger, M. A., Prandi, R. (2002): In Search of Minimal Random
Braid Configurations. J. Phys. A., 35, 43–59.
24. Barnes, C. W. and Sturrock, P. A. (1972): Force-free Magnetic-field Structures
and their Role in Solar Activity. Astrophys. J., 174, 659–670.
25. Baxter, R. J. (1982): Exactly Solved Models in Statistical Mechanics. (Academic Press, New York)
26. Berger, M. A. (1993): Energy-crossing number relations for braided magnetic
fields. Phys. Rev. Lett., 70, 705–708.
27. Berger, M. A. (1994): Minimum crossing numbers for 3-braids. J. Phys. A, 27,
6205–6213.
28. Berger, M.A. (2000): Hamiltonian dynamics generated by Vassiliev invariants.
J. Phys. A., 34, 1363–1374.
29. Bigelow, S. (1999): The Burau representation is not faithful for n = 5. Geometry
and Topology, 3, 397–404.
30. Birman, J. S. (1974): Braids, Links and Mapping Class Groups. Ann. of Math.
Studies 82 (Princeton Univ. Press, Princeton).
31. Birman, J. S., Ko, K. H., Lee, S. J. (1998): A New Approach to the Word and
Conjugacy Problems in the Braid Groups. Ad. Math., 139, 322–353.
32. Birman, J. S., Menasco, W. (1992): Studying Links Via Closed Braids I: A
Finiteness Theorem. Pacific J. Math., 154, 17–36.
33. Birman, J. S., Menasco, W. (1991): Studying Links Via Closed Braids II: On
a Theorem of Bennequin. Topology and Its Applications, 40, 71–82.
34. Birman, J. S., Menasco, W. (1993): Studying Links Via Closed Braids III:
Classifying Links which are Closed 3-braids. Pacific J. Math., 161, 25–113.
35. Birman, J. S., Menasco, W. (1990): Studying Links Via Closed Braids IV:
Closed Braid Representatives of Split and Composite Links. Invent. Math., 102,
115–139.
36. Birman, J. S., Menasco, W. (1992): Studying Links Via Closed Braids V: Closed
Braid Representatives of the Unlink. Trans. AMS, 329, 585–606.
37. Birman, J. S., Menasco, W. (1992): Studying Links Via Closed Braids VI: A
Non-Finiteness Theorem. Pacific J. Math., 156, 265–285.
38. Birman, J. S., Menasco, W. (1992): A calculus on links in the 3-sphere. in
Kawauchi, A. Knots 90 (Walter de Gruyter, Berlin), 625–631.
39. Birman, J. S., Wajnryb, B. (1986): Markov Classes in Certain Finite Quotients
of Artin’s Braid Group. Israel J. Math., 56, 160–178.
40. Birkhoff, G. (1935): On the structure of abstract algebras. Proc. Camb. Phil.
Soc., 31, 433–454.
41. Bohnenblust, F. (1947): The Algebraical Braid Group. Ann. Math., 46, 127–136
42. Bott, R., Tu, L.W. (1982): Differential Forms in Algebraic Topology. Springer
GTM no. 82.
43. Boyland, P. L., Aref, H., Stremler, M. A. (2000): Topological fluid mechanics
of stirring. J. Fluid Mech., 403, 277–304.
44. Brown, M. R., Canfield, R. C., Pevtsov, A. A. ed. by (1999): Magnetic Helicity
in Space and Laboratory Plasmas. AGU Geophysical Monograph Series 111
(American Geophysical Union, Washington).
45. Buchberger, B. (1987): History and Basic Features of the CriticalPair/Completion Procedure. J. Sym. Comp. 3, 3–38. Printed in Rewriting Techniques and Applications ed. by Jouannaud, J.-P. (Academic Press, London),
3–38.
Braids, Knots and Applications
111
46. Buck, G. (1998): Most smooth closed space curves contain approximate solutions of the n-body problem. Nature 395 51–53.
47. Buck, G.R., Orloff, J. (1990): Computing canonical conformations for knots.
Topology Appl. 51 246–253.
48. Burde, G., Zieschang, H. (1985): Knots. (Walter de Gruyter, Berlin)
49. Calugareanu, G. (1959): L’integrale de Gauss et l’Analyse des noeuds tridimensionnels. Rev. Math. Pure Appl. 4 5–20.
50. Calugareanu, G. (1961): Sur les classes d’isotopie des noeuds tridimensionnels
et leurs invariants. Czech. Math. J. 11 588–625.
51. Calugareanu, G. (1961): Sur les enlacements tridimensionnels des courbes fermees. Comm. Acad. R. P. Romine 11 829–832.
52. Chan, T. (2000): HOMFLY polynomials of some generalized Hopf links. J. Knot
Th. Rami., 9, 865–883.
53. Chang, A.M., Cunningham, J.E. (1989): Transmission and reflection probabilities between ν = 1 and ν = 2/3 quantum Hall effects and between ν = 2/3 and
ν = 1/3 effects. Solid State Commun. 72 651–655.
54. Chow, W.L. (1948): On the algebraic braid group. An. Math., 49, 654–658.
55. Chui, A.Y.K., Moffatt, H.K. (1995): The energy and helicity of knotted magnetic flux tubes. Proc. R. Soc. London A, 451, 609–629.
56. Clark, R.G., Mallett, J.R., Haynes, S.R., Harris, J.J., Foxon, C.T. (1988): Experimental determination of fractional charge e/q for quasiparticle excitations
in the fractional quantum Hall effect. Phys. Rev. Lett. 60 1747–1750.
57. Clausen, S., Helgesen, G., Skjeltorp, A. T. (1998): Braid description of collective
fluctuations in a few-body system. Physical Review E, 58, 4229–4237.
58. Clifford, A.H., Preston, G. B. (1961): Algebraic theory of Semi-Groups Volume
1. Amer. Math. Soc. Survey no. 7. Amer. Math. Soc., Providence
59. Cohen, D.E. (1987): Computability and Logic. (Ellis Horwood, Chichester).
60. Collins, D.J. (1972): Representation of Turing reducibility by word and conjugacy problems in finitely presented groups. Act. Math., 128, 73–90.
61. Conway, J.H. (1970): An Enumeration of Knot and Links, and Some of their
Algebraic Properties. in Leech, J. (1970): Computational Problems in Abstract
Algebra. (Pergamon, Oxford)
62. Coxeter, H.S.M., Moser, W.O.J. (1957): Generators and Relations for Discrete
Groups. (Springer, Berlin)
63. Dai, X., Diao, Y. (2000): The Minimum of Knot Energy Functions. J. Knot
Th. Rami., 9, 713–724.
64. Deguchi, T., Akutsu, Y., Wadati, M. (1988): Exactly solvable models and new
link polynomials III. Two-variable polynomial invariants. J. Phys. Soc. Japan
57 757–776.
65. Dershowitz, N. (1979): A note on simplification orderings. Inform. Proc. Let.,
9, 212–215.
66. Dershowitz, N. (1981): Termination of linear rewriting systems. in Automata,
Languages and Programming ed. by Even, S. and Kariv, O., Lecture Notes in
Computer Science Volume 115 (Springer, Heidelberg), 448–458.
67. Dershowitz, N. (1987): Termination of Rewriting. J. Sym. Comp., 3, 69–116.
Printed in Rewriting Techniques and Applications ed. by Jouannaud, J.-P. (Academic Press, London), 69–116.
68. deWitt, C.M. (1972): Feynman’s path integral. Definition without limiting procedure. Comm. Math. Phys. 28 47–67.
112
Patrick D. Bangert
69. DeWitt-Morette, C. (1974): Feynman Path Integrals: I. Linear and Affine Technique. II. The Feynman Green Function. Comm. Math. Phys. 37 63–81.
70. DeWitt-Morette, C., Maheswari, A., Nelson, B. (1979): Path Integration in
Non-Relativistic Quantum Mechanics. Phys. Rep. 50 255–372.
71. de Picciotto, R., Reznikov, M., Heiblum, M., Umansky, V., Bunin, G., Mahalu,
D. (1997): Direct observation of a fractional charge. Nature 389 162–164.
72. Diao, Y., Ernst, C., van Rensburg, E.J. (1998): Properties of Knot Energies. in
Whittington, S.G., Sumners, D.W., Lodge, T. (1998): Topology and Geometry
of Polymers. (IMA Volumes in Mathematics and its Applications) 37–48.
73. Diao, Y., Ernst, C., van Rensburg, E.J. (1997): In Search of a Good Polygonal
Knot Energy. J. Knot Th. Rami. 6 633–657.
74. Diao, Y., Ernst, C., van Rensburg, E.J. (1998): Knots with Minimal Energies.
in Stasiak, A., Katritch, V. and Kauffman, L. H. (editors) 1998 Ideal Knots
(Vol. 19 Series on Knots and Everything, World Scientific, Singapore) 52–69.
75. Dirac, P.A.M. (1931): Quantised singularities in the electromagnetic field. Proc.
Roy. Soc. London (A), 133, 60–72.
76. Dirac, P.A.M. (1981): The Principles of Quantum Mechanics. (Oxford Uni.
Press, Oxford)
77. Dirac, P.A.M. (1933): The Lagrangian in Quantum Mechanics. Phys. Zeitschr.
Sow. 3 64–72. Reprinted in Schwinger, J.S. (1958): Selected Papers on Quantum
Electrodynamics. (Dover, New York) 312–.
78. Dowker, C. H. and Thistlethwaite, M. B. (1983): Classification of Knot Projections. Top. Appl., 16, 19–31.
79. Drinfel’d, V.G. (1986): Quantum Groups. Proc. Intl. Congress Math., Berkeley
798–820.
80. Ehrenberg, W., Siday, R.E. (1949): The refractive index in electron optics and
the principles of dynamics. Proc. Phys. Soc. London B, 62, 8–21.
81. Ernst, C., Sumners, D. W. (1990): A Calculus for Rational Tangles: Applications to DNA Recombination. Math. Proc. Camb. Phil. Soc., 108, 489–515.
82. Ernst, C. (1996): Tangle Equations. J. Knot Th. Rami., 5, 145–159.
83. Ernst, C. (1997): Tangle Equations II. J. Knot Th. Rami., 6, 1–11.
84. Epstein, D.B.A., Cannon, J.W., Holt, D.F., Levy, S.V.F., Paterson, M.S.,
Thurston, W.P. (1992): Word Processing in Groups. (Jones and Bartlett,
Boston).
85. Faddeev, L.D., Reshetikhin, N.Yu., Takhtajan, L.A. (1989): Quantization of
Lie groups and Lie algebras. Algebra Anal., 1, 178–206.
86. Fadell, E., Neuwirth, L. (1962): Configuration spaces. Math. Scand. 10 111–
118.
87. Feynman, R.P. (1942): The Principle of Least Action in Quantum Mechanics.
(Princeton University Ph.D. Thesis)
88. Feynman, R.P. (1948): Space-Time Approach to Non-Relativistic Quantum Mechanics. Rev. Mod. Phys., 20, 367–387.
89. Feynman, R.P., Hibbs, A. (1965): Quantum Mechanics and Path Integrals.
(McGraw Hill, New York)
90. Fox, R., Neuwirth, L. (1962): The braid groups. Math. Scand. 10 119–126.
91. Freedman, M.H., He, Z.X. (1991): Divergence-free fields – energy and asymptotic crossing number. Ann. Math., 134, 189–229.
92. Freedman, M.H., He, Z.X., Wang, Z. (1994): Möbius Energy of Knots and
Unknots. Ann. Math., 139, 1–50.
Braids, Knots and Applications
113
93. Freyd, P., Yetter, D., Hoste, J., Lickorish, W.B.R., Millet, K.C., Ocneanu, A.
(1985): A new polynomial invariant of knots and links. Bull. Amer. Math. Soc.,
12, 239–246.
94. Garside, F.A. (1969): The braid group and other groups. Quart. J. Math. Oxford, 20, 235–254.
95. Gelfand, I.M., Jaglom, A.M. (1957): Die Integration in Funktionenräumen und
ihre Anwendung in der Quantentheorie. Fortsch. Phys., 5, 517–. (1960): Integration in Functional Spaces and its Applications in Quantum Physics. J. Math.
Phys., 1, 48–69.
96. Ghrist, R., Vandervorst, R. (2002): Braids and Parabolic Dynamics. to appear
in Proceedings of New Directions in Dynamics Systems: Kyoto 2002.
97. Gilbert, N.D., Porter, T. (1994): Knots and Surfaces. (Oxford University Press,
Oxford).
98. Goldman, J.R., Kauffman, L.H. (1997): Rational Tangles. Adv. Appl. Math.,
18, 300–332.
99. Goldman, V.J., Su, B. (1995): Resonant tunneling in the quantum Hall regime:
Measurement of fractional charge. Science 267 1010–1012.
100. Guggenheimer, H.W. (1977): Differential Geometry. (Dover, New York)
101. Haldane, F.D.M. (1983): Fractional quantization of the Hall effect: A hierarchy
of incompressible quantum fluid states. Phys. Rev. Lett. 51 605–608.
102. Halperin, B.I. (1984): Statistics of quasiparticles and the hierarchy of fractional quantized Hall states. Phys. Rev. Lett. 52 1583–1586. Erratum 52 2390–
2390.
103. Hemion, G. (1992): The Classification of Knots and 3-dimensional Spaces.
(Oxford Univ. Press, Oxford).
104. Hempel, J. (1976): 3-manifolds. Ann. of Math. Studies Volume 86 (Princeton
Uni. Press, Princeton).
105. Huet, G. (1980): Confluent reductions: Abstract properties and applications
to term rewriting systems. J. Assoc. Comput. Mach., 27, 797–821.
106. Huet, G. (1981): A Complete Proof of the Knuth-Bendix Completion Algorithm. J. Comp. Syst. Sci., 23, 11–21.
107. Huet, G., Lankford, D.S. (1978): On the uniform halting problem for term
rewriting systems. Rapport laboria 283, Institut de Recherche en Informatique
et en Automatique, Le Chesnay, France.
108. Jacquemard, A. (1990): About the effective classification of conjugacy classes
of braids. J. Pure Appl. Al., 63, 161–169.
109. Jimbo, M. (1985): A q-difference analogue of U(q) and the Yang-Baxter equation. Lect. Math. Phys., 10, 63–69.
110. Johnson, D.L. (1980): Topics in the Theory of Group Presentations. Lon.
Math. Soc. Lec. Notes Vol. 42 (Cambridge Uni. Press, Cambridge).
111. Jones, V.F.R. (1985): A polynomial invariant for links via von Neumann algebras. Bull. Amer. Math. Soc., 12, 103–112.
112. Jones, V.F.R. (1989): On Knot Invariants Related to some Statistical Mechanical Models. Pac. J. Math., 137, 311–334.
113. Jouannoud, J.P., Kirchner, H. (1986): Completion of a set of rules modulo a
set of equations, SIAM. J. Comp., 15, 1155–1194.
114. Kang, E. S. et. al. (1997): Band-generator presentation for the 4-braid group.
Top. Appl., 78, 39–60.
115. Katritch, V., Bednar, J., Michoud, D., Scharein, R. G., Dubochet, J., Stasiak,
A. (1996): Geometry and physics of knots. Nature, 384, 142–145.
114
Patrick D. Bangert
116. Kauffman, L. (1993): Knots and Physics. Series on Knots and Everything Vol.
1. World Scientific, Singapore.
117. Kauffman, L.H. (1998): Fourier Knots. in Stasiak, A., Katritch, V. and Kauffman, L. H. (editors) 1998 Ideal Knots (Vol. 19 Series on Knots and Everything,
World Scientific, Singapore) 364–373.
118. Kawauchi, A. (1996): A Survey of Knot Theory. (Birkhäuser Verlag, Basel)
119. Khurana, A. (1990): Experiments provide evidence for the fractional charge
of quasiparticles. Phys. Today 43 17–20.
120. Kivelson, S., Rocek, M. (1985): Consequences of gauge invariance for fractionally charged quasiparticles. Phys. Lett. B 156 85–98.
121. Kjonsberg, H., Leinaas, J.M. (1997): On the anyon description of the Laughlin
hole states. Int. J. Mod. Phys. A 12 1975–2001.
122. Kjonsberg, H., Myrheim, J. (1999): Numerical study of charge and statistics
of Laughlin quasi-particles. Int. J. Mod. Phys. A 14 537–557.
123. Kleinert, H. (1995): Path Integrals in Quantum Mechanics, Statistics and
Polymer Physics. Second Edition. (World Scientific, Singapore)
124. Knuth, D.E., Bendix, P.B. (1970): Simple word problems in universal algebras. in Computational Problems in Abstract Algebra ed. by Leech, J. (Pergamon Press, Oxford), 263–297. Reprinted in 1983 in Automation of Reasoning 2
(Springer, Berlin), 342–376.
125. Kohno, T. (1987): Monodromy representations of braid groups and YangBaxter equations. Ann. Inst. Fourier, Grenoble, 37, 139–160.
126. Kholodenko, A.L. (1991): Topological theory of reptation. Phys. Lett. A, 159,
437–441.
127. Kontsevich, M. (1993): Vassiliev’s knot invariants. Adv. Sov. Math., 16, 137–
150.
128. Laidlaw, M.G.G., deWitt, C.M. (1971): Feynman functional integrals for systems of indistinguishable particles. Phys. Rev. D 3 1375–1378.
129. Lambropoulou, S.S.F. (1993): A Study of Braid in 3-manifolds. unpublished
PhD thesis (Univ. of Warwick).
130. Lambropoulou, S.S.F., Rourke, C.P. (1997): Markov’s Theorem in 3-manifolds.
Top. Appl., 78, 95–22.
131. Laughlin, R.B. (1983): Anomalous quantum Hall effect: An incompressible
quantum fluid with fractionally charged excitations. Phys. Rev. Lett. 50 1395–
1398.
132. Laurie, B. (1998): Annealing Ideal Knots and Links: Methods and Pitfalls. in
Stasiak, A., Katritch, V. and Kauffman, L. H. (editors) 1998 Ideal Knots (Vol.
19 Series on Knots and Everything, World Scientific, Singapore) 42–51.
133. Leinaas, J.M. (1980): Topological charges in gauge theories. Fortschr. d. Phys.
28 579–.
134. Levene, S.D., Tsen, H. (1996): Analysis of DNA knots and catenanes by
agarose-gel electrophoresis. in Bjornsti, M. and Osheroff, N. (ed. by): Protocols in DNA Topology and Topoisomerases, Vol. I. (Humana Press, )
135. Lickorish, W.B.R. (1991): Three-Manifolds and the Temperley-Lieb Algebra.
Math. Ann. 290 657–670.
136. Longcope, D. W., Klapper, I. (1997): Dynamics of a thin twisted flux tube.
Ap. J., 488, 443–453.
137. Lubkin, E. (1963): Geometric definition of gauge invariance. Ann. Phys. (N.Y.)
23 233–283.
Braids, Knots and Applications
115
138. The CiME system is available from http://cime.lri.fr.
139. Magnus, W., Peluso, A. (1967): On Knot Groups. Comm. Pure Appl. Math.,
20, 749–770.
140. Mandl, F. (1988): Statistical Physics. (John Wiley).
141. Manin, Yu.I. (1988): Quantum Groups and Non-commutative Geometry. Lec.
Notes, Montreal.
142. Markov, A.A. (1935): Über die freie Äquivalenz geschlossener Zöpfe (in German), Recueil Mathematique Moscou, 1, 73–78. [Mat. Sb. 43 1936.]
143. McCool, J. (1980): On Reducible Braids. in Word Problems II ed. by Adian,
S. I., Boone, W. W. and Higman, G. (North-Holland, Amsterdam), 261–295.
144. McRobie, F.A., Thompson, J.M.T. (1993): Braids and knots in driven oscillators. Int. J. Bifurcation Chaos, 3, 1343–1362.
145. Michels, J.P.J., Wiegel, F.W. (1982): Probability of knots in a polymer ring.
Phys. Lett. A 90 381–384.
146. Michels, J.P.J., Wiegel, F.W. (1986): On the topology of a polymer ring. Proc.
Roy. Soc. A 403 269–284.
147. Miller, C.F. III (1992): Decision Problems for Groups - Survey and Reflections.
in Algorithms and Classification in Combinatorial Group Theory ed. by Baumslag, G. and Miller, C. F. III, Math. Sci. Re. Inst. Pub. Volume 23 (Springer,
New York), 1–59.
148. Moffatt, H. K. (1985): Magnetostatic Equilibria and analogous Euler flows of
arbitrarily complex topology. 1. Fundamentals. J. Fluid Mech., 150, 359–378.
149. Moffatt, H. K. (1990): The energy spectrum of knots and links. Nature, 347,
367–369.
150. Moffatt, H. K., Ricca, R. L. (): Helicity and the Cǎlugǎreanu invariant. Proc.
Roy. Soc. Lond. A, 439, 411–429
151. Moore, C. (1993): Braids in classical dynamics. Phys. Rev. Lett., 70, 3675–
3679. Stud. Logic Found. Math. Volume 95 (North-Holland, Amsterdam), 261–
295.
152. Morette, C. (1951): On the Definition and Approximation of Feynman’s Path
Integrals. Phys. Rev., 81, 848–852.
153. Morette-DeWitt, C. (1972): Feynman’s Path Integral: Definition Without
Limiting Procedure. Comm. Math. Phys., 28, 47–55.
154. Morette-DeWitt, C. (1976): The Semiclassical Expansion. Ann. Phys. (N.Y.),
97, 367–399.
155. Morette-DeWitt, C., Elworthy, K.D. (1981): New Stochastic Methods in
Physics. Phys. Rep., 77, 125–168.
156. Morton, H.R. (1983): An irreducible 4-string braid with unknotted closure.
Math. Proc. Camb. Phil. Soc., 93, 259–261.
157. Morton, H.R. (1986): Threading Knot Diagrams. Math. Proc. Camb. Phil.
Soc., 99, 247–260.
158. Murasugi, K. (1996): Knot Theory And Its Applications. (Birkhäuser,
Boston).
159. Murasugi, K., Thomas, R.S.D. (1972): Isotopic closed nonconjugate braids.
Proc. Am. Math. Soc., 33, 137–139.
160. Myrheim, J. (1999): Anyons. in Comtet, A., Jolicoeur, T., Ouvry, S., David,
F. (1999): Topological Aspects of Low-Dimensional Systems. (Springer: Les
Houches LXIX) 269–413.
161. Nakahara, M. (1990): Geometry, Topology and Physics. (IOP Pub. Ltd., Bristol).
116
Patrick D. Bangert
162. Nelson, E. (1964): Feynman Integrals and the Schrödinger Equation. J. Math.
Phys., 5, 332–343.
163. Newman, M.H.A. (1942): On theories with a combinatorial definition of ’equivalence’. Ann. Math., 43, 223–243.
164. O’Hara, J. (1991): Energy of a Knot. Topology 30 241–247.
165. O’Hara, J. (1998): Energy of Knots. in Stasiak, A., Katritch, V. and Kauffman,
L. H. (editors) 1998 Ideal Knots (Vol. 19 Series on Knots and Everything, World
Scientific, Singapore) 288–314.
166. Parker, E.N. (1983): Magnetic neutral sheets in evolving fields. II - Formation
of the solar corona. Astroph. J., 264, 642–647.
167. Parnell, C.E., Jupp, P.E. (2000): Statistical analysis of the energy distribution
of nanoflares in the quiet Sun. Ap. J., 529, 554–569.
168. Paterson, M.S., Razborov, A.A. (1991): The set of minimal braids is co-NPcomplete. J. Algorithms, 12, 393–408.
169. Pieranski, P. (1998): In Search of Ideal Knots. in Stasiak, A., Katritch, V.
and Kauffman, L. H. (editors) 1998 Ideal Knots (Vol. 19 Series on Knots and
Everything, World Scientific, Singapore) 20–41.
170. Pieranski, P., Clausen, S., Helgesen, G., Skjeltorp, A.T. (1996): Braids Plaited
by Magnetic Holes. Phys. Rev. Lett., 77, 1620–1623.
171. Pieranski, P., Kasas, S., Dietler, G., Dubochet, J., Stasiak, A. (2001): Localization of breakage points in knotted strings. New J. Phys., 3, 10.1–10.13.
172. Rabin, M.O. (1958): Recursive Unsolvability of Group Theoretic Problems.
Ann. Math., 67, 172–194.
173. Reidemeister, K. (1983): Knot Theory. BCS Associates, Moscow, Idaho. Originally published as Reidemeister, K. (1932): Knotentheorie. Springer, Berlin
174. Ricca, R.L. (1998): Applications of Knot Theory in Fluid Mechanics. in Jones,
V.F.R. et. al., ed. by Knot Theory Banach Center Pub. Vol. 42 (Inst. of Math.,
Polish Acad. Sci., Warszawa), 321–346.
175. Rolfsen, D. (1976): Knots and Links. (Publish or Perish, Berkeley).
176. Saari, D.G. (1998): Orbits of all sorts. Nature, 395, 19–20.
177. Saminadayar, L., Glattli, D.C., Jin, Y., Etienne, B. (1997): Observation of
the e/3 fractionally charged Laughlin quasiparticle. Phys. Rev. Lett., 79, 2526–
2529.
178. Schubert, H. (1948): Die Eindeutige Zerlegbarkeit eines Knotens in Primknoten. (in German), Sitz. Heidelberger Akad. Wiss., math.-nat. Kl., 55–104.
179. Schubert, H. (1961): Bestimmung der Primfaktorzerlegung von Verkettungen.
(in German), Math. Zeitschr., 76, 116–148.
180. Schwarzschild, B. (1986): Currents in Normal-Metal Rings Exhibit AharonovBohm Effect. Phys. Today, 39, 17–20.
181. Shimamura, M.K., Deguchi, T. (2000): Characteristic Length of Random
Knotting for Cylindrical Self-Avoiding Polygons. Phys. Lett., A274, 184–191.
182. Simmons, J.A., Wei, H.P., Engel, L.W., Tsui, D.C., Shayagan, M. (1989): Resistance fluctuations in narros AlGaAs/GaAs heterostructures: Direct evidence
of fractional charge in the fractional quantum Hall effect. Phys. Rev. Lett., 63,
1731–1734.
183. Simo, C. (2000): New Families of Solutions in N -body Problems. Barcelona
UB-UPC Dynamical Systems Preprint.
184. Simon, J. (1998): Preface to Energy functions for knots: beginning to predict
physical behavior. in Stasiak, A., Katritch, V. and Kauffman, L. H. (editors)
Braids, Knots and Applications
117
1998 Ideal Knots (Vol. 19 Series on Knots and Everything, World Scientific,
Singapore) 151–155.
185. Simon, J. (1994): Energy Functions for Polygonal Knots. J. Knot Th. Rami.,
3, 299–320.
186. Soteros, C.E., Sumners, D.W., Whittington, S.G. (1992): Entanglement complexity of graphs in Z 3 . Math. Proc. Camb. Phil. Soc., 111, 75–91.
187. Stasiak, A., Katritch, V., Kauffman, L.H. (editors) (1998): Ideal Knots. (Vol.
19 Series on Knots and Everything, World Scientific, Singapore)
188. Stasiak, A., Katritch, V., Bednar, J., Michoud, D., Dubochet, J. (1996): Electrophoretic mobility of DNA knots. Nature, 384, 122–.
189. Steenrod, N. (1975): The Topology of Fiber Bundles. (Princeton Uni. Pr.,
Princeton)
190. Tait, P.G. (1877): On Knots I. Trans. Roy. Soc. Edinburgh, 28, 145–190. Also
in Scientific Papers Vol. 1 (Cambridge Uni. Press, London, 1898), 273–317.
191. Tatsuoka, K. (1987): Geodesics in the braid group. preprint, Dept. of Mathematics, University of Texas at Austin.
192. Tourlakis, G.J. (1984): Computability. (Reston, Reston).
193. Trautwein, A.K. (1995): Harmonic Knots. (University of Iowa Ph.D. Thesis)
194. Trautwein, A.K. (1998): An Introduction to Harmonic Knots. in Stasiak, A.,
Katritch, V. and Kauffman, L. H. (editors) 1998 Ideal Knots (Vol. 19 Series on
Knots and Everything, World Scientific, Singapore) 353–363.
195. Turaev, V.G. (1988): The Yang-Baxter equation and invariants of links. Invent. Math., 92, 527–553.
196. Turing, A.M. (1937): On Computable Numbers, with an Application to the
Entscheidungsproblem. Proc. London Math. Soc. Ser. 2, 42, 230–265.
197. Vassiliev, V.A. (1990): Cohomology of knot spaces. Adv. Sov. Math. 1 23–70.
198. Vogel, P. (1990): Representation of links by braids: A new algorithm. Comment. Math. Helvetici, 65, 104–113.
199. Wadati, M., Deguchi, T., Akutsu, Y. (1989): . Phys. Rep., 180, 247–332.
200. Wadati, M., Akutsu, Y., Deguchi, T. (1990): Knot Theory based on solvable
models at criticality. in Jimbo, M. (ed. by) Integrable systems in quantum field
theory and statistical mechanics (Academic Press) 193–285.
201. Waldhausen, F. (1968): On Irreducible 3-manifolds which are Sufficiently
Large. Ann. Math., 87, 56–88.
202. Waldhausen, F. (1968): The Word Problem in Fundamental Groups of Sufficiently Large Irreducible 3-manifolds. Ann. Math., 88, 272–280.
203. Wannier, G.H. (1987): Statistical Physics. (Dover, New York)
204. Webb, R.A., Washburn, S., Umbach, C.P., Laibowitz, R.B. (1985): Observation of h/e Aharonov-Bohm oscillations in Normal Metal Rings. Phys. Rev.
Lett., 54, 2696–2699.
205. Weyl, H. (1929): Elektron und Gravitation, I. Zeitsch. f. Phys. 56 330–352.
206. Weyl, H. (1950): The Theory of Groups and Quantum Mechanics. (Dover,
New York)
207. Wiegel, F.W. (1986): Introduction to Path-Integral Methods in Physics and
Polymer Science. (World Scientific, Singapore)
208. Wigner, E.P. (1959): Group Theory. Academic Press.
209. Wilczek, F. (1982): Magnetic flux, angular momentum, and statistics. Phys.
Rev. Lett. 48 1144–1146.
210. Wilczek, F. (1982): Quantum mechanics of fractional-spin particles. Phys.
Rev. Lett. 49 957–959.
118
Patrick D. Bangert
211. Williams, R.F. (1988): The Braid Index of an Algebraic Link. In: Birman, J.
S., Libgober, A. (ed) Braids. Amer. Math. Soc., Providence.
212. Windwer, S. (1990): On the topology of loop-erased self-avoiding random
walks. J. Chem. Phys., 93, 765–766.
213. Witten, E. (1989): Quantum Field Theory and Jones Polynomial. Comm.
Math. Phys., 121, 351–399.
214. Woltjer, L. (1958): A Theorem on Force-Free Magnetic Fields. Proc. Natl.
Acad. Sci., 44, 489–491.
215. Woltjer, L. (1958): On Hydromagnetic Equilibrium. Proc. Natl. Acad. Sci.,
44, 833–841.
216. Wu, T.T., Yang, C.N. (1975): Concept of nonintegrable phase factors and
global formulation of gauge fields. Phys. Rev. D 12 3845–3857.
217. Wu, T.T., Yang, C.N. (1976): Dirac monopole without strings: Monopole harmonics. Nucl. Phys. B 107 365–380.
218. Xu, P.J. (1992): The genus of closed 3-braids. J. Knot Theory Ramifications,
1, 303–326.
219. Yamada, S. (1987): The minimal number of Seifert circles equals the braid
index of a link. Invent. Math., 89, 347–356.
220. Yoder, M.A. (1995): String Rewriting Applied to Problems in the Braid
Groups. unpublished Ph.D. thesis (Uni. South Florida).