• 검색 결과가 없습니다.

Forbidden Detour Number on Virtual Knot

N/A
N/A
Protected

Academic year: 2021

Share "Forbidden Detour Number on Virtual Knot"

Copied!
8
0
0

로드 중.... (전체 텍스트 보기)

전체 글

(1)

pISSN 1225-6951 eISSN 0454-8124 c

Kyungpook Mathematical Journal

Forbidden Detour Number on Virtual Knot

Shun Yoshiike

Nihon University Buzan Junior & Senior High School, 5-40-10 Otsuka, Bunkyo-ku, Tokyo 112-0012, Japan

e-mail : s6115m15@math.chs.nihon-u.ac.jp Kazuhiro Ichihara∗

College of Humanities and Sciences, Nihon University, 3-25-40 Sakurajosui, Setagaya-ku, Tokyo 156-8550, Japan

e-mail : ichihara.kazuhiro@nihon-u.ac.jp

Abstract. We show that the forbidden detour move, essentially introduced by Kanenobu and Nelson, is an unknotting operation for virtual knots. Then we define the forbidden detour number of a virtual knot to be the minimal number of forbidden detour moves necessary to transform a diagram of the virtual knot into the trivial knot diagram. Some upper and lower bounds on the forbidden detour number are given in terms of the minimal number of real crossings or the coefficients of the affine index polynomial of the virtual knot.

1. Introduction

As a generalization of (classical) knots in 3-space, Kauffman introduced virtual knots in [4]. Since then various studies on virtual knots have been done. For ex-ample, relations of virtual knots and Gauss diagrams were studied by Goussarov, Polyak, and Viro in [2]. In their research [2], a kind of local move on virtual knots was introduced, where they call it the forbidden move. See Figure 1 (left). Then it was shown by Kanenobu [3] and Nelson [8] independently that the forbidden move is an unknotting operation for virtual knots. That is, for any diagram D of a vir-tual knot, there exists a finite sequence of Reidemeister moves, virvir-tual Reidemeister moves and forbidden moves that takes D to the trivial knot diagram.

In the studies of forbidden moves in [3], Kanenobu introduced and used several moves for virtual knot diagrams. Two of them, called F2-move and F20-move, which are essentially equivalent, played a key role in his arguments. Actually, they were

* Corresponding Author.

Received August 30, 2019; revised June 2, 2020; accepted June 4, 2020. 2010 Mathematics Subject Classification: 57M25.

Key words and phrases: virtual knot, forbidden move, forbidden number.

(2)

also considered and used by Nelson in [8]. Later, the F20-move is treated by Crans, Ganzell, and Mellor in [1], where they call it the forbidden detour move. See Figure 1 (right). In this paper, we use the notation Fd for the forbidden detour move, which was denoted by F D in [1].

F F

F

d

Figure 1: Forbidden moves F and forbidden detour move F

d

In this paper, we study this move, and obtain the following.

Theorem 1.1. Let D be a virtual knot diagram of a virtual knot. Then, D can be transformed to the trivial knot diagram by using Reidemeister moves, virtual Rei-demeister moves, and forbidden detour moves. Moreover, if D has c real crossings, then the number of the forbidden detour moves is at most (c − 1)(2c2+ 11c − 3)/24 if c is odd and c(2c2+ 9c − 14)/24 if c is even.

Remark 1.2. We note that the F2-move in [3] (depicted in Figure 2), which is equivalent to the forbidden detour move, can be regarded as a variation of the delta move on (classical) knots, which was introduced by Matveev in [6] and by Murakami and Nakanishi in [7], independently. They showed that the delta move is an unknotting operation for classical knots, but it is known that it is not an unknotting operation for virtual knots. See [10, Theorem 1.6] for example.

Figure 2: F

2

move

In virtue of the theorem above, we can introduce the following notion.

Definition 1.3. Let K be a virtual knot. The forbidden detour number Fd(K) of K is defined as the minimal number of forbidden detour moves necessary to transform a virtual knot diagram of K into the trivial knot diagram.

We next consider lower bounds on the forbidden detour numbers of virtual knots. To obtain lower bounds, the variation of an invariant, called the affine index polynomial, under a forbidden detour move, plays a key role. In fact, we have the following.

(3)

Theorem 1.4. Let K be a virtual knot, and PK denote the affine index polynomial of K. Suppose that PK is expressed as (t−1)Pn∈Zantn. Then, the following holds.

Fd(K) ≥ P

n∈Z|an| 2

In the following, our terminology about virtual knot and Gauss diagram follows from those in [1].

2. Forbidden Detour Number

A virtual knot is defined as an equivalent class of virtual knot diagrams under the (classical) Reidemeister moves and the virtual Reidemeister moves. Also, virtual knots correspond bijectively to the equivalence classes of Gauss diagrams under the moves corresponding to Reidemeister moves. That is, Reidemeister moves can modify the virtual knot diagrams, but do not change the virtual knot represented by the diagrams.

On the other hand, forbidden moves and forbidden detour moves can change virtual knots by modifying Gauss diagrams. In fact, as claimed in [1, Section 2], the forbidden detour move gives the effect on Gauss diagrams of switching the head of one arrow with the tail of an adjacent arrow. See Figure 3.

F

d

Figure 3: The effect of an F

d

-move on Gauss diagrams

In the following, we call the move on Gauss diagrams corresponding to a for-bidden detour move also a forfor-bidden detour move on Gauss diagrams.

Proof of Theorem 1.1. Let D be a virtual knot diagram with c real crossings of a virtual knot, and G the Gauss diagram associated to D. We consider an arrow A of G, and assume that a arrow-heads and b arrow-tails exist on one of the arcs, say α, bounded by the endpoints of A. Then we can suppose that a + b is smaller than or equal to c − 1.

Let us remove A by using forbidden detour moves as follows. We first consider the first arrow head encountered as we travel from the tail of A to its head on the arc α. For the first such arrowhead, we need at most b + 1 forbidden detour moves to move it outside of α. Similarly for the next arrow head and hence each of the arrow heads, we need at most b + 1 moves to sweep them to outside of α. We repeat this procedure a times until no arrow-heads exist on α. See Figure 4.

(4)

Now we can remove A by using forbidden detour moves b times, and a single R1 -move. It follows that the number of forbidden detour moves to remove A is at most a(b + 1) + b = a + b + ab.

F

d moves b+1 times

F

d moves b+1 times

F

d moves

Figure 4: Sequences of forbidden detour moves (F

d

-moves)

Here, since a ≥ 0 and b ≥ 0, we see that 2√ab ≤ a + b ≤ c − 1, and so 4ab ≤ (c − 1)2. Then, we get

a + b + ab ≤ (c − 1) +(c − 1) 2

4 .

Let ac= b (c−1)2

4 c. When n = 2` with some ` ∈ N, we have the following. n X c=1 ac= ` X s=1 (a2s−1+ a2s) = ` X s=1  b(2s − 2) 2 4 c + b (2s − 1)2 4 c  = ` X s=1 (2s2− 3s + 1) = 1 6`(4` + 1)(` − 1). Then, since ` = n/2, we get the following.

n X c=1  (c − 1) + b(c − 1) 2 4 c  = 1 24n(2n 2+ 9n − 14).

(5)

On the other hand, when n = 2` − 1 with some ` ∈ N, we have the following. n X c=1 ac= 2` X c=1 ac− a2` = 1 6`(4` + 1)(` − 1) − (` 2− `) = 1 6`(` − 1)(4` − 5). Then, since ` = (n + 1)/2, we have the following.

n X c=1 {(c − 1) + b(c − 1) 2 4 c} = 1 24(n + 1)(n − 1)(2n − 3) + 1 2n(n + 1) − n = 1 24(n − 1)(2n 2+ 11n − 3).

Consequently, D can be transformed to the trivial knot diagram by using Rei-demeister moves, virtual ReiRei-demeister moves, forbidden detour moves, and if D has c real crossings, the number of necessary forbidden detour moves is at most (c − 1)(2c2+ 11c − 3)/24 if c is odd and c(2c2+ 9c − 14)/24 if c is even. 2 3. Lower Bound of Forbidden Detour Number

In this section, we consider the lower bound for the forbidden detour number of a virtual knot. Our argument bases on the following result of Sakurai given in [9] for the forbidden move. Let K and K0 be two virtual knots which can be transformed into each other by a single forbidden move. Then

PK− PK0 = (t − 1)(±t`± tm)

holds for some integers ` and m. Here PK denotes affine index polynomial, which we will define later. By imitating the argument in [9], we have the following. Theorem 3.1. Let K and K0 be two virtual knots which can be transformed into each other by a single forbidden detour move. Then we have

PK− PK0 = (t − 1)(±t`∓ tm)

for some integers ` and m, where PK denotes affine index polynomial.

To prove this, we recall some definitions about the affine index polynomial used in [9].

First, we define virtual knot invariants by indexes of arrows for a Gauss diagram. Let G be a Gauss diagram of a virtual knot K, and γ =−P Q an arrow oriented from−→

(6)

P to Q with sign ε(γ) in G. We give the signs to the endpoints P and Q, denoted by ε(P ) and ε(Q), respectively, such that ε(P ) = −ε(γ) and ε(Q) = ε(γ). For an arrow γ = −P Q in a Gauss diagram G, the specified arc of γ is the arc β in the−→ outer circle S1 with endpoints P and Q oriented from P to Q with respect to the orientation of S1. The index of γ is the sum of the signs of all the endpoints of arrows on β other than P and Q, and denoted by i(γ).

Then the n-writhe Jn(K) of a virtual knot K is defined as Jn(K) =

X

i(γ)=n ε(γ)

and, we define the affine index polynomial PK of K as PK =

X

n∈Z

Jn(K)(t−n− 1) .

We remark that this is different from the original definition by Kauffman in [5]. However Sakurai showed in [9, Proposition 3.2] that this gives an alternative definition of the affine index polynomial.

Proof of Theorem 3.1. Suppose that virtual knots K and K0 are represented by Gauss diagrams G and G0respectively, and that G is transformed into G0by a single forbidden detour move. Then there are two cases, Cases (I) and (II) of Figure 5, for the orientations of the arcs in G and G0, where the forbidden detour move is applied. We here only consider Case (I) since the other case can be treated similarly.

Let γi and γi0 (i = 1, 2) be the two arrows of G and G0, respectively, where the forbidden detour move is applied. For arrows γi and γi0, by Figure 5, we have

i(γ10) = i(γ1) + ε(γ2), i(γ20) = i(γ2) − ε(γ1),

and ε(γi) = ε(γi0) for i = 1, 2. Also note that this moves preserves the indexes and the signs of all the other arrows.

Therefore, we obtain the following.

PK− PK0 = ε(γ1)(t−i(γ1)− 1) + ε(γ2)(t−i(γ2)− 1) − ε(γ0 1)(t−i(γ 0 1)− 1) − ε(γ0 2)(t−i(γ 0 2)− 1)

= ε(γ1)t−i(γ1)+ ε(γ2)t−i(γ2)− ε(γ01)t−i(γ

0 1)− ε(γ0 2)t−i(γ 0 2) − ε(γ1) − ε(γ2) + ε(γ10) + ε(γ 0 2)

= ε(γ1)t−i(γ1)+ ε(γ2)t−i(γ2)− ε(γ1)t−i(γ1)−ε(γ2)− ε(γ2)t−i(γ2)+ε(γ1) = ε(γ1)t−i(γ1)(1 − t−ε(γ2)) + ε(γ2)t−i(γ2)(1 − tε(γ1)) =        (t − 1)(t−i(γ1)−1− t−i(γ2)) if ε(γ i) = 1, (t − 1)(−t−i(γ1)+ t−i(γ2)) if ε(γ 1) = 1, ε(γ2) = −1, (t − 1)(−t−i(γ1)−1+ t−i(γ2)−1) if ε(γ 1) = −1, ε(γ2) = 1, (t − 1)(t−i(γ1)− t−i(γ2)−1) if ε(γ i) = −1.

(7)

ɤ

ε(ɤ)

ɤ

1 2 1 -ε(ɤ)1 ε(ɤ)2 -ε(ɤ)2

F

d

ɤ'

ε(ɤ')

ɤ'

1 2 1 -ε(ɤ')1 ε(ɤ')2 -ε(ɤ')2

(I)

'

( ')

'

1 2 1 - ( ') 1 ( ') 2 - ( ') 2

F

d

ɤ'

ε(ɤ')

ɤ'

1 2 1 -ε(ɤ') 1 ε(ɤ') 2 -ε(ɤ') 2

(II)

Figure 5:

It concludes that PK− PK0 = (t − 1)(±t`∓ tm)

holds for some integers ` and m. 2

Proof of Theorem 1.4. Let K be a virtual knot with a virtual knot diagram D which can be transformed into the trivial knot diagram O by using forbidden detour moves s times. That is, we suppose that there exists a sequence of virtual knot diagrams D0, D1, · · · , Ds such that D = D0, Di is obtained from Di−1 by a single forbidden detour move together with Reidemeister moves (1 ≤ i ≤ s), and Ds= O. We denote by Kithe virtual knot represented by Di (1 ≤ i ≤ s). Suppose that the affine index polynomial of Ki is expressed as Pt(Ki) = (t − 1)Pn∈Zaintn for 1 ≤ i ≤ s.

Then, for each i with 1 ≤ i ≤ s, by Theorem 3.1, there exist some integers `i, mi such that Pt(Ki) = Pt(Ki−1) + (t − 1)(±t`i∓ tmi) = (t − 1)X n∈Z ai−1n tn+ (t − 1)(±t`i∓ tmi) = (t − 1) · (· · · + (ai−1` i ± 1)t `i+ · · · + (ai−1 mi ∓ 1)t mi+ · · · ).

(8)

It follows that the coefficients ai`, ai−1` , aim, ai−1m satisfy the the following conditions. |ai`i| = |a i−1 `i ± 1| ≥ |a i−1 `i | − 1, |a i mi| = |a i−1 mi ± 1| ≥ |a i−1 mi | − 1.

Thus, for 1 ≤ i ≤ s, we obtain X n∈Z |ai n| ≥ X n∈Z |ai−1 n | ! − 2. It concludes that s ≥ P n∈Z|a 0 n| 2 ,

which completes the proof. 2

References

[1] A. S. Crans, B. Mellor and S. Ganzell, The forbidden number of a knot, Kyungpook Math. J., 55(2)(2015), 485–506.

[2] M. Goussarov, M. Polyak and O. Viro, Finite-type invariants of classical and virtual knots, Topology, 39(5)(2000), 1045–1068.

[3] T. Kanenobu, Forbidden moves unknot a virtual knot, J. Knot Theory Ramifications, 10(1)(2001), 89–96.

[4] L. H. Kauffman, Virtual knot theory, European J. Combin., 20(7)(1999), 663–690. [5] L. H. Kauffman, An affine index polynomial invariant of virtual knots, J. Knot Theory

Ramifications, 22(4)(2013), 1340007, 30 pp.

[6] S. V. Matveev, Generalized surgeries of three-dimensional manifolds and representa-tions of homology spheres, Mat. Zametki, 42(2)(1987), 268–278.

[7] H. Murakami and Y. Nakanishi, On a certain move generating link-homology, Math. Ann., 284(1)(1989), 75–89.

[8] S. Nelson, Unknotting virtual knots with Gauss diagram forbidden moves, J. Knot Theory Ramifications, 10(6)(2001), 931–935.

[9] M. Sakurai, An affine index polynomial invariant and the forbidden move of virtual knots, J. Knot Theory Ramifications, 25(7)(2016), 1650040, 13 pp.

[10] S. Satoh and K. Taniguchi, The writhes of a virtual knot, Fund. Math., 225(1)(2014), 327–342.

수치

Figure 1: Forbidden moves F and forbidden detour move F d
Figure 3: The effect of an F d -move on Gauss diagrams
Figure 4: Sequences of forbidden detour moves (F d -moves)

참조

관련 문서

1 John Owen, Justification by Faith Alone, in The Works of John Owen, ed. John Bolt, trans. Scott Clark, "Do This and Live: Christ's Active Obedience as the

A virtual displacement of a generalized coordinate in physical space ~ A combination of virtual displacements subjected to the constraints of... Generally, the

The dimension of a convex set is defined to be the the maximum number of its affinely independent vectors minus

In chemistry, Gibbs' phase rule describes the possible number of degrees of freedom (F) in a closed system at equilibrium, in terms of the number of separate phases (P) and

→ f depends on the number of nucleation sites and the growth rate.. (c) All of the parent phase is consumed by the

Plots of discharge capacity versus cycle number for LOBs with CNT-only and MOF-C/CNT electrodes.. Schematic diagram illustrating the synthesis process

Note that the number of adjacent cells is the same as the number of input variables since it is equal to the number of bits... If we don’t use DC terms, the logic function f

• • The efficiency of energy transfer (fraction of transfers per donor lifetime ~ k ET /k D ) by the dipole mechanism depends mainly on the oscillator strength of the A