Use of Statistically Leinert Sets to Calculate Return Probabilities of Random Walks in
1. Abstract
Hastings first presented bounds on the second largest eigenvalue for matrices in a Hermitian complete positive map in 2007. In this work we extend his work to tighten these bounds. To do this, we introduce the idea of Statistically Leinert Sets to modify the generating functions presented in Woess in 1986 and recompute the radii of convergence in his paper in 1986. We primarily use techniques from combinatorics and calculate norms using the ideas presented by Akemann and Ostrang in their paper in 1976.
2. Introduction
2.1. Literature Review

Random walks have been studied extensively, but some interesting properties arise when restricting to trees. A tree in graph theory is defined as a finite graph which is undirected and connected, lacks cycles, and stems from a root. As we are considering an unbiased walk, so in terms of the elements of the string, they are equally likely to appear. In the graph sense, the movement in any direction is equally likely. In Figure 1, a sample random walk generated by a, b is shown. Random walks in which we consider here in this paper can be thought of as a product of one dimension walks. As dimensions increase, the walk can become more complex. An intuitive question then arises: what is the return probability of the walk to the origin? It has been established that random paths on mathematical trees with a number n generators can be expressed using matrices. These paths can either return to the origin or diverge with no way back. This divergence behavior can be understood by studying the radius of convergence.
In 1976, Akemann and Ostrang [1] introduced norms of operators on the Hilbert space: , where elements can be written as generally infinite linear combinations acting on the space by left multiplication. In 1986, Woess [4] presented work on calculating Norms of Free Convolution Operators, using generating functions to represent return probabilities of random walks on a homogeneous tree of degree 2s. In 2007, M.B. Hastings [2] first presented bounds on Haar Random Matrices. His work analyzed random walks on a Cayley Tree and specifically considered it for the Hermitian Case. A Cayley Tree [3] is an interesting case of trees in graphs, where each non-leaf vertex (i.e. a vertex with no children vertices) has a constant number of vertices stemming from it. For example, a 2-Cayley tree will have 2 vertices stemming from each leaf vertex. This work by Hastings provided the main motivation for the paper presented here.
2.2. Approach
For the purposes of this paper the walks are unbiased. In this paper these paths were represented using ”words”, i.e. strings generated from an n number of generators. The set of all possible words can be represented as a set S which forms an algebraic group: the free group: F. We modified a key property, known as the Leinert property, to be imposed on this group. We instead applied a Statistically Leinert Property.
3. Product of Free Groups
Definition 3.1.
Given a subset of a group , a string of elements (or inverses of elements) from is valid if it is of the form
where for all and .
A string is reduced if it is of the form ( and )
and for we have either or .
A string is bad if it is valid or reduced and reduces to , where is the identity element in .
Definition 3.2.
A subset is a statistically Leinert set if the probability of a valid string of length being bad approaches 0 as . An equivalent condition is that if is the number of bad valid strings of length , then
where . In particular the growth rate of bad strings is:
This equivalent condition comes from the fact that the total number of valid strings is , so the frequency of bad strings is divided by this.
Definition 3.3.
A subset is a statistically free set if the probability of a reduced string of length being bad approaches 0 as . An equivalent condition is that if is the number of bad reduced strings of length , then
A Leinert set is statistically Leinert as well. The same follows for free sets.
Proposition 3.4.
A subset is statistically free iff and is statistically Leinert.
Proof.
Suppose is statistically free. If , then we can consider any string ∎
Now a question: How do we show that satisfies the limit above? If we can show that it has an exponential growth rate slower than (which is the exponential growth rate of the total number of valid strings), then we are done.
4. Counting Bad Strings
Definition 4.1.
If is a valid string of the form
then define the conjugate string to be
In general, if is any string of letters, then the conjugate string is given by replacing each letter with its inverse.
We will think about how to count bad strings by considering substrings of larger strings:
Definition 4.2.
A substring is a subset of the letters of the string given by removing all the letters to the left of the lowest index letter and all the letters to the right of the highest index letter. A bad substring is a kernel substring if it has no bad substrings.
Before talking about bad strings, it is worth considering a couple counting problems. For example, what is the number of different random walks on the free group such that we start and end at the identity? First let’s count the different ways to add natural numbers up to , considering ordering as well. This is different to the partition number, which doesn’t care about ordering. Note that the total number of ways to satisfy the identity , where , is . If we add to each side and let , then we get , which is the sum of natural numbers to equal is . Now we sum over each combination, and we get
Now we count the number of random walks similarly; a walk of length can be partitioned into mini-walks back to the identity, where the lengths of all the walks add up to . Each walk has even length, so we partition the walk length into . The number of different walks from the identity to the identity of length where the walk never touches the identity is , so we have
Similarly, we can sum over the number of times we return to the identity for the bad strings.
4.1. Lattice Group
Here we consider , with the set of generators for the group. Note that the smallest bad string has length 6, with an example given by
-
•
For , we simply consider every possible arrangement of strings of the above kind. This is just the total number of permutations of a set of three elements, so total bad strings.
-
•
For , we cannot have kernel substrings of length 8, so the only possibility is to conjugate by an element to get a string . is determined by the ends of , leaving only one option per string. So again, there are exactly bad strings of length 8.
-
•
For , we expect that there are 42 bad strings in total. We can construct these in a few ways. First, we take any bad string of length 8 and append a letter to both sides, yielding 12 options. The rest are given by considering
Here is an attempt to create an upper bound. Every string is represented with three walks on each axis of the lattice. For the positive steps, we have a total of steps to travel. We pick where these go, giving a factor. For the remaining spots, we have to decide where the other factors go.
4.2. Product of Groups
Here we consider , with . Note that the smallest bad string has length 8, with an example given by
-
•
For , the total number of bad strings is as we can pick anything for and , with and constrained such that they are not and respectively. We can also invert the string, providing the factor of 2.
-
•
For , we can use every single string from before and append elements to the end that cancel each other out. Using the kernel form for (string of length 8), we can let , where and or . So we have choices for . There are no other strings of this size that we can consider.
-
•
A general strategy for counting the total number of bad strings of a given length is to sum over the size of the smallest bad substring.
5. Woess’ argument
Here are some attempts to write down similar equations for Woess’ bounds. The original set of equations are
Almost all of these identities still hold if we consider the group . We denote the set of generators for as
Additionally, we let , where is the identity for . We write the following definitions:
We also write the generating functions
where we write and . Once again, if is odd, which means the conclusion presented in the Woess paper still holds. The first four identities may be interpreted as
For each of these identities, we sum over the index of first return to the identity. The last identity is a bit harder to work with since is nonzero if is not Leinert:
This implies that
Using the results of Woess, we get the relations
Therefore we have
Here, is a power series with coefficients vanishing as . More specifically, suppose that for large . Then we have , and so the radius of convergence is root of the decay rate of the frequency of bad strings, where .
5.1. Special Case (Cubic Equation Derivation)
Consider the case where are all the same, say , for the group . In addition, by symmetry we can argue that the functions are all the same. Then we have that is given by the equation
where is to denote replacing with , since . Therefore . Moving terms to the other side and squaring gives us
This yields a quadratic equation in , namely , where
Therefore , and as a power series returns real values for all values of , so we can solve for the radius of convergence as :
(1) |
Expanded out, the equation is
(2) |
This equation in yields the radius of convergence for , assuming that . Here is an example plot comparing the curves and , where satisfy the cubic equation above:
![[Uncaptioned image]](https://cdn.awesomepapers.org/papers/233c9489-41bf-491b-ae07-c9503f75b040/image.png)
The purple points in the plot show numerically computed radii of convergence using the following method. Let and be Haar randomly sampled unitary matrices. Then the dots are given by computing the quantity , with the 2-norm. Here each point is given by averaging over 4 computations, , and .
More generally, if we had some unknown function , then we can use the quadratic formula once more to find the relation for :
The sign is indeterminate as cannot be determined. If , then we get as expected.
Note that in the above equation, it is quadratic in , which we can solve as
5.2. Proof for product of free groups
Let denote the number of bad strings of length for a set , and let be the frequency of bad strings of length . Say that , with the generator set. We have an upper bound on that goes to 0 as , therefore so does . Recall from the definition of that only bad strings contribute to a nonzero quantity, so we can say that , where is the asymptotic exponential rate of encountering these strings. Therefore , where is the exponential rate of encountering any kind of bad string. Since , so does , and therefore as we increase . More conveniently, given some fixed uniform constant for all of the coefficients of , we expect that the radius of convergence for will be .
Take for example . The norm for with all coefficients set to 1 is . I expect that the frequency of bad strings does not vanish as we increase , and in fact we have some nice asymptotic relation.
5.3. Small Idea about Radius of Convergence
In the Woess paper, they show that , or , where
Another approach is to state that since , the radius of convergence is bounded by having a finite derivative, and so if the graph of has a vertical slope for a finite value, then that could also be the radius of convergence. Suppose that , then the derivative is given by
Letting , we must have that
Note that the first term simplifies to
One option here is to just explicitly solve for the curve for where we can. If all the constants are and we do not have the identity, then this simplifies a lot:
5.4. Existence of bad strings
Here are some examples of bad strings, to show that they exist for groups of the form , where for all . If , then the set of generators for is a Leinert set, as they have no nontrivial algebraic relations. If , then we run into problems.
-
(1)
Consider , which has the generator set . Here in this group the ’s commute with the ’s. If and are greater than 1, then we can let be the string
-
(2)
Consider , then for this group we can consider the string
where , , and are generators associated with three different copies of a free group in the total group .
There are some cases that do provide Leinert sets.
-
(1)
If , then the generator set is Leinert, as the only way for is if for all odd and , and vice versa.
-
(2)
Similarly to before, is also Leinert.
5.5. Creating upper bounds
A primary method of showing that is statistically Leinert is to construct an upper bound on . Here is one way to count the number of bad sets, possibly construct upper bounds for in the case :
-
(1)
Consider the string from the previous subsection,
We consider all strings of this length and form that equal the identity. We have to pick two different generators each (and we can swap the ’s and ’s in their role), which leads to a total of different strings of that form. Let’s call this form the kernel string.
-
(2)
An alternative upper bound is the following, which is a very loose bound. The total number of walks of length on the free group of generators from the identity to the identity is bounded by .
Consider . This does not form a Leinert set due to the arguments from before,
6. Numerical Algorithms
6.1. Some numerics
For some numerics on the number of bad strings in various cases, consider the group from before. For strings of length , there are no bad strings. Here are some computations on the exact number of bad strings, or at least tight lower bounds. For notation purposes, if is a valid string of the form
then define the conjugate string to be
-
•
For , we established that .
-
•
For , we can use every single string from before and append elements to the end that cancel each other out. Using the kernel form for (string of length 8), we can let , where and or . So we have choices for . We can also consider strings of the form
-
•
For , we can use any string from or use strings of the following form:
Given a kernel string , we can look at strings of the form , where we choose and . has options, so has options. For strings of the form , we have times the number of options for and , which is hard to determine.
-
–
If , then has options. If , then has options.
-
–
Otherwise, has options from not equaling and has options as well.
We multiply by 2 again since we can also place the ’s between the ’s instead, so we have
-
–
-
•
In general, given , we have two options:
-
(1)
We can take a bad string and conjugate by a letter , giving strings.
-
(2)
We can produce a bad string that has no bad substrings. The number of these is hard to find.
-
(1)
6.2. Growth of Bad Strings
For the purposes of testing strings, a few tests were run. The numerical algorithm randomized a string of length 2m, using n generators.
Here we shall consider five distinct cases:
-
(1)
2 generators, 100 samples/length, length 1 to 40
-
(2)
2 generators, 1000 samples/length, length 1 to 40
Three tests were applied:
-
(1)
Parity Test: The strings were then tested via a parity test to determine whether a necessary but not sufficient condition was met: there were an equal number of generators and their corresponding inverse elements.
-
(2)
Adjacent Repeating Element Test: In this test adjacent elements in a string were checked to see if there were any repetitions, i.e. ’aa’ or ’xx’ etc.
-
(3)
Reduction and Reordering Test: After the first two tests were completed, the strings were reordered cyclically and then reduced by checking whether adjacent elements were inverses of each other, in which case they were replaced by the identity element.
In the first cycle of sample runs (not including the Adjacent Repeating Element Test), the following decay rate was observed.
![[Uncaptioned image]](https://cdn.awesomepapers.org/papers/233c9489-41bf-491b-ae07-c9503f75b040/nz_2s.jpg)
In the second cycle of sample runs (including the Adjacent Repeating Element Test), the following decay rate was observed.
A Monte Carlo simulation was then applied to reduce computation time. The algorithm is presented in the appendix.
7. Result and Numerical Verification
When studying the radius of convergence of product of free groups, a specific instance of almost Leinert set. We found a function Q(z, G(z)) that incorporates the number of bad strings in the set such that:
(3) |
Here
(4) |
and
(5) |
In our numerical calculations with increasing dimensions in the group formed by the product of two free groups with two generators, the lower bound on radius of convergence for G(z) differed from the upper bound by 3.
![[Uncaptioned image]](https://cdn.awesomepapers.org/papers/233c9489-41bf-491b-ae07-c9503f75b040/relative_error.png)
8. Conclusion and Future Works
The results seem to be following our intuition created by past studies. This new function has been successful in tightly bounding the radius of convergence of almost Leinert Sets with the radius of convergence found by Woess for Leinert Sets.
Future works should consider analytically exploring a tighter bound on the ”irreducible” strings as the size of the string exponentially decrease in proportion to valid strings. For the purposes of this project, only bad strings up to length sixteen were found, and the minimum length of the string found was length 8. As the length increases and bad strings are added in, the number of bad strings are seen to exponentially increase in proportion to valid strings.
9. Acknowledgements
Special acknowledgements to Dr. Thomas J. Sinclair, Purdue University Faculty, for mentoring this project. This work was partially funded by NSF grant DMS-2055155.
10. Appendix: Algorithm
The algorithm mentioned in section 6.2 is presented here:
References
- Akemann and Ostrand [1976] Charles A. Akemann and Phillip A. Ostrand. Computing norms in group c*-algebras. American Journal of Mathematics, 98(4):1015–1047, 1976. ISSN 00029327, 10806377. URL http://www.jstor.org/stable/2374039.
- Hastings [2007] M. B. Hastings. Random unitaries give quantum expanders. Phys. Rev. A, 76:032315, Sep 2007. doi: 10.1103/PhysRevA.76.032315. URL https://link.aps.org/doi/10.1103/PhysRevA.76.032315.
- Mathworld [2023] Wolfram Mathworld. Cayley tree, 2023. URL https://mathworld.wolfram.com/CayleyTree.html. Accessed on May 18, 2023.
- Woess [1986] Wolfgang Woess. A short computation of the norms of free convolution operators. Proceedings of the American Mathematical Society, 96(1):167–170, 1986.
- Zummo [2022] J. Zummo. An introduction to geometric group theory. University of Chicago REU, Aug 2022. URL http://math.uchicago.edu/ may/REU2022/REUPapers/Zummo.pdf.