This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Use of Statistically Leinert Sets to Calculate Return Probabilities of Random Walks in 𝔽s1×𝔽s2\mathbb{F}_{s_{1}}\times\mathbb{F}_{s_{2}}

Colton Griffin, Sanchita Chakraborty
(Date: June 2021)

1. Abstract

Hastings first presented bounds on the second largest eigenvalue for matrices in a Hermitian complete positive map in 2007. In this work we extend his work to tighten these bounds. To do this, we introduce the idea of Statistically Leinert Sets to modify the generating functions presented in Woess in 1986 and recompute the radii of convergence in his paper in 1986. We primarily use techniques from combinatorics and calculate norms using the ideas presented by Akemann and Ostrang in their paper in 1976.

2. Introduction

2.1. Literature Review

Refer to caption
Figure 1. Random Walk with 2 Generators

Random walks have been studied extensively, but some interesting properties arise when restricting to trees. A tree in graph theory is defined as a finite graph which is undirected and connected, lacks cycles, and stems from a root. As we are considering an unbiased walk, so in terms of the elements of the string, they are equally likely to appear. In the graph sense, the movement in any direction is equally likely. In Figure 1, a sample random walk generated by a, b is shown. Random walks in 𝔽s1×𝔽s2\mathbb{F}_{s_{1}}\times\mathbb{F}_{s_{2}} which we consider here in this paper can be thought of as a product of one dimension walks. As dimensions increase, the walk can become more complex. An intuitive question then arises: what is the return probability of the walk to the origin? It has been established that random paths on mathematical trees with a number n generators can be expressed using matrices. These paths can either return to the origin or diverge with no way back. This divergence behavior can be understood by studying the radius of convergence.

In 1976, Akemann and Ostrang [1] introduced norms of operators on the Hilbert space: L2(G)L^{2}(G), where elements can be written as generally infinite linear combinations acting on the space by left multiplication. In 1986, Woess [4] presented work on calculating Norms of Free Convolution Operators, using generating functions to represent return probabilities of random walks on a homogeneous tree of degree 2s. In 2007, M.B. Hastings [2] first presented bounds on Haar Random Matrices. His work analyzed random walks on a Cayley Tree and specifically considered it for the Hermitian Case. A Cayley Tree [3] is an interesting case of trees in graphs, where each non-leaf vertex (i.e. a vertex with no children vertices) has a constant number of vertices stemming from it. For example, a 2-Cayley tree will have 2 vertices stemming from each leaf vertex. This work by Hastings provided the main motivation for the paper presented here.

2.2. Approach

For the purposes of this paper the walks are unbiased. In this paper these paths were represented using ”words”, i.e. strings generated from an n number of generators. The set of all possible words can be represented as a set S which forms an algebraic group: the free group: F. We modified a key property, known as the Leinert property, to be imposed on this group. We instead applied a Statistically Leinert Property.

3. Product of Free Groups

Definition 3.1.

Given a subset XX of a group GG, a string SS of elements (or inverses of elements) from XX is valid if it is of the form

S=x11x2x2n11x2n,S=x_{1}^{-1}x_{2}\ldots x_{2n-1}^{-1}x_{2n},

where xiXx_{i}\in X for all ii and xixi+1x_{i}\neq x_{i+1}.

A string SS is reduced if it is of the form (xiXx_{i}\in X and εi{1,1}\varepsilon_{i}\in\{-1,1\})

S=x1ε1x2ε2xkεk,S=x_{1}^{\varepsilon_{1}}x_{2}^{\varepsilon_{2}}\ldots x_{k}^{\varepsilon_{k}},

and for 1i<k1\leq i<k we have either xixi+1x_{i}\neq x_{i+1} or εi=εi+1\varepsilon_{i}=\varepsilon_{i+1}.

A string SS is bad if it is valid or reduced and reduces to S=eS=e, where ee is the identity element in GG.

Definition 3.2.

A subset XGX\subset G is a statistically Leinert set if the probability of a valid string SS of length 2n2n being bad approaches 0 as nn\to\infty. An equivalent condition is that if b2nb_{2n} is the number of bad valid strings of length 2n2n, then

limnb2ns(s1)2n1=0,\lim_{n\to\infty}\frac{b_{2n}}{s(s-1)^{2n-1}}=0,

where s=|X|s=|X|. In particular the growth rate of bad strings is: limnsup(b2ns(s1)2n1)1/n=1lim_{n\rightarrow\infty}sup(\frac{b_{2n}}{s(s-1)^{2n-1}})^{1/n}=1

This equivalent condition comes from the fact that the total number of valid strings is s(s1)2n1s(s-1)^{2n-1}, so the frequency of bad strings is b2nb_{2n} divided by this.

Definition 3.3.

A subset XGX\subset G is a statistically free set if the probability of a reduced string SS of length kk being bad approaches 0 as kk\to\infty. An equivalent condition is that if bnb_{n} is the number of bad reduced strings of length nn, then

limnbn2s(2s1)n1=0,\lim_{n\to\infty}\frac{b_{n}}{2s(2s-1)^{n-1}}=0,

A Leinert set is statistically Leinert as well. The same follows for free sets.

Proposition 3.4.

A subset XGX\subset G is statistically free iff eXe\notin X and X{e}X\cup\{e\} is statistically Leinert.

Proof.

Suppose XX is statistically free. If eXe\in X, then we can consider any string ∎

Now a question: How do we show that b2nb_{2n} satisfies the limit above? If we can show that it has an exponential growth rate slower than (s1)2(s-1)^{2} (which is the exponential growth rate of the total number of valid strings), then we are done.

4. Counting Bad Strings

Definition 4.1.

If SS is a valid string of the form

S=x11x2x2n11x2n,S=x_{1}^{-1}x_{2}\ldots x_{2n-1}^{-1}x_{2n},

then define the conjugate string S¯\bar{S} to be

S~=x1x21x2n1x2n1.\tilde{S}=x_{1}x_{2}^{-1}\ldots x_{2n-1}x_{2n}^{-1}.

In general, if SS is any string of letters, then the conjugate string is given by replacing each letter with its inverse.

We will think about how to count bad strings by considering substrings of larger strings:

Definition 4.2.

A substring RSR\leq S is a subset of the letters of the string SS given by removing all the letters to the left of the lowest index letter and all the letters to the right of the highest index letter. A bad substring RSR\leq S is a kernel substring if it has no bad substrings.

Before talking about bad strings, it is worth considering a couple counting problems. For example, what is the number of different random walks on the free group 𝐅s\mathbf{F}_{s} such that we start and end at the identity? First let’s count the different ways to add natural numbers up to NN, considering ordering as well. This is different to the partition number, which doesn’t care about ordering. Note that the total number of ways to satisfy the identity 1++k=n\ell_{1}+\ldots+\ell_{k}=n, where i0\ell_{i}\geq 0, is (n+k1k1)\binom{n+k-1}{k-1}. If we add kk to each side and let li=i+1l_{i}=\ell_{i}+1, then we get l1++lk=n+k=Nl_{1}+\ldots+l_{k}=n+k=N, which is the sum of natural numbers to equal NN is (N1k1)\binom{N-1}{k-1}. Now we sum over each combination, and we get

kl1++lk=Ni1=k=1N(N1k1)=2N1.\sum_{k}\sum_{\begin{subarray}{c}l_{1}+\ldots+l_{k}=N\\ \ell_{i}\geq 1\end{subarray}}=\sum_{k=1}^{N}\binom{N-1}{k-1}=2^{N-1}.

Now we count the number of random walks similarly; a walk of length 2n2n can be partitioned into mini-walks back to the identity, where the lengths of all the walks add up to 2n2n. Each walk has even length, so we partition the walk length into 2l1++2lk=2n2l_{1}+\ldots+2l_{k}=2n. The number of different walks from the identity to the identity of length 2l2l where the walk never touches the identity is 2s(2s1)l12s(2s-1)^{l-1}, so we have

# of walks=k=1Nl1++lk=Ni1i=1k2s(2s1)li1=k=1Nl1++lk=Ni1(2s2s1)k(2s1)N\text{\# of walks}=\sum_{k=1}^{N}\sum_{\begin{subarray}{c}l_{1}+\ldots+l_{k}=N\\ \ell_{i}\geq 1\end{subarray}}\prod_{i=1}^{k}2s(2s-1)^{l_{i}-1}=\sum_{k=1}^{N}\sum_{\begin{subarray}{c}l_{1}+\ldots+l_{k}=N\\ \ell_{i}\geq 1\end{subarray}}\left(\frac{2s}{2s-1}\right)^{k}(2s-1)^{N}
=(2s1)Nk=1N(N1k1)(2s2s1)k=(2s1)N2s4s1(4s12s1)N=2s(4s1)N1.=(2s-1)^{N}\sum_{k=1}^{N}\binom{N-1}{k-1}\left(\frac{2s}{2s-1}\right)^{k}=(2s-1)^{N}\frac{2s}{4s-1}\left(\frac{4s-1}{2s-1}\right)^{N}=2s(4s-1)^{N-1}.

Similarly, we can sum over the number of times we return to the identity for the bad strings.

4.1. Lattice Group

Here we consider G=𝐅1×𝐅1×𝐅1=3G=\mathbf{F}_{1}\times\mathbf{F}_{1}\times\mathbf{F}_{1}=\mathbb{Z}^{3}, with X={x,y,z}X=\{x,y,z\} the set of generators for the group. Note that the smallest bad string has length 6, with an example given by

S=x1yz1xy1z.S=x^{-1}yz^{-1}xy^{-1}z.
  • For 2n=62n=6, we simply consider every possible arrangement of strings of the above kind. This is just the total number of permutations of a set of three elements, so b6=3!=6b_{6}=3!=6 total bad strings.

  • For 2n=82n=8, we cannot have kernel substrings of length 8, so the only possibility is to conjugate by an element to get a string S10=w1S~8wS_{10}=w^{-1}\tilde{S}_{8}w. ww is determined by the ends of S8S_{8}, leaving only one option per string. So again, there are exactly b8=6b_{8}=6 bad strings of length 8.

  • For 2n=102n=10, we expect that there are 42 bad strings in total. We can construct these in a few ways. First, we take any bad string of length 8 and append a letter to both sides, yielding 12 options. The rest are given by considering

Here is an attempt to create an upper bound. Every string is represented with three walks on each axis of the lattice. For the positive steps, we have a total of n=nx+ny+nzn=n_{x}+n_{y}+n_{z} steps to travel. We pick where these go, giving a (nnx,ny,nz)\binom{n}{n_{x},n_{y},n_{z}} factor. For the remaining spots, we have to decide where the other factors go.

4.2. Product of Groups

Here we consider G=𝐅s1×𝐅s2G=\mathbf{F}_{s_{1}}\times\mathbf{F}_{s_{2}}, with X={x1,,}X=\{x_{1},\ldots,\}. Note that the smallest bad string has length 8, with an example given by

S=x11x2y11y2x21x1y21y1.S=x_{1}^{-1}x_{2}y_{1}^{-1}y_{2}x_{2}^{-1}x_{1}y_{2}^{-1}y_{1}.
  • For 2n=82n=8, the total number of bad strings is b8=2s1(s11)s2(s21),\boxed{b_{8}=2s_{1}(s_{1}-1)s_{2}(s_{2}-1),} as we can pick anything for x1x_{1} and y1y_{1}, with x2x_{2} and y2y_{2} constrained such that they are not x1x_{1} and y1y_{1} respectively. We can also invert the string, providing the factor of 2.

  • For 2n=102n=10, we can use every single string from before and append elements to the end that cancel each other out. Using the kernel form for S8S_{8} (string of length 8), we can let S¯=z11S8z1\bar{S}=z_{1}^{-1}S_{8}z_{1}, where z1Xz_{1}\in X and z1x1z_{1}\neq x_{1} or y2y_{2}. So we have s2s-2 choices for z1z_{1}. There are no other strings of this size that we can consider.

  • A general strategy for counting the total number of bad strings of a given length is to sum over the size of the smallest bad substring.

5. Woess’ argument

Here are some attempts to write down similar equations for Woess’ bounds. The original set of equations are

μ(n)(e)\displaystyle\mu^{(n)}(e) =k=0nf(2k)μ(nk)(e)+α0p(2n1),\displaystyle=\sum_{k=0}^{n}f^{(2k)}\mu^{(n-k)}(e)+\alpha_{0}p^{(2n-1)},
p(2n1)\displaystyle p^{(2n-1)} =k=0n1f(2k)p(2n2k1)+α0μ(n1)(e),\displaystyle=\sum_{k=0}^{n-1}f^{(2k)}p^{(2n-2k-1)}+\alpha_{0}\mu^{(n-1)}(e),
ai(2n)\displaystyle a^{(2n)}_{i} =k=0n(f(2k)fi(2k))ai(2n2k)+α0bi(2n1),\displaystyle=\sum_{k=0}^{n}\left(f^{(2k)}-f^{(2k)}_{i}\right)a^{(2n-2k)}_{i}+\alpha_{0}b^{(2n-1)}_{i},
bi(2n1)\displaystyle b^{(2n-1)}_{i} =k=0n1f(2k)bi(2n2k1)+α0ai(2n2),\displaystyle=\sum_{k=0}^{n-1}f^{(2k)}b^{(2n-2k-1)}_{i}+\alpha_{0}a^{(2n-2)}_{i},
fi(2n)\displaystyle f^{(2n)}_{i} =αi2ai(2n2).\displaystyle=\alpha_{i}^{2}a^{(2n-2)}_{i}.

Almost all of these identities still hold if we consider the group G=𝐅s1××𝐅sNG=\mathbf{F}_{s_{1}}\times\ldots\times\mathbf{F}_{s_{N}}. We denote the set of generators YY for GG as

Y={xi,j:i=1,,N;j=1,,si}.Y=\{x_{i,j}:i=1,\ldots,N;\,j=1,\ldots,s_{i}\}.

Additionally, we let X=Y{e}X=Y\cup\{e\}, where ee is the identity for GG. We write the following definitions:

μ(n)(e)\displaystyle\mu^{(n)}(e) =Pr[X2n=e:X0=e],\displaystyle=\operatorname{Pr}[X_{2n}=e:X_{0}=e],
p(2n1)\displaystyle p^{(2n-1)} =Pr[X2n=e:X1=e],\displaystyle=\operatorname{Pr}[X_{2n}=e:X_{1}=e],
fi,j(n)\displaystyle f_{i,j}^{(n)} =Pr[Xn=e;Xme for m=1,n1;X1=xi,j1:X0=e],\displaystyle=\operatorname{Pr}[X_{n}=e;\,X_{m}\neq e\text{ for }m=1,\ldots n-1;\,X_{1}=x_{i,j}^{-1}:X_{0}=e],
ai,j(2n)\displaystyle a_{i,j}^{(2n)} =Pr[X2n+1=e;Xmxi,j for m=2,2n:X1=e],\displaystyle=\operatorname{Pr}[X_{2n+1}=e;\,X_{m}\neq x_{i,j}\text{ for }m=2,\ldots 2n:X_{1}=e],
bi,j(2n1)\displaystyle b_{i,j}^{(2n-1)} =Pr[X2n1=e;Xmxi,j for m=1,2n2:X0=e],\displaystyle=\operatorname{Pr}[X_{2n-1}=e;X_{m}\neq x_{i,j}\text{ for }m=1,\ldots 2n-2:X_{0}=e],
di,j(n)\displaystyle d_{i,j}^{(n)} =Pr[Xn=e;Xn1xi,j1;Xme for m=1,n1;X1=xi,j1:X0=e].\displaystyle=\operatorname{Pr}[X_{n}=e;\,X_{n-1}\neq x_{i,j}^{-1};\,X_{m}\neq e\text{ for }m=1,\ldots n-1;\,X_{1}=x_{i,j}^{-1}:X_{0}=e].

We also write the generating functions

G(z)=n=0μ(n)(e)z2n,H(z)=n=1p(2n1)z2n1,Fi,j(z)=n=0fi,j(2n)z2n,\displaystyle G(z)=\sum_{n=0}^{\infty}\mu^{(n)}(e)z^{2n},\quad H(z)=\sum_{n=1}^{\infty}p^{(2n-1)}z^{2n-1},\quad F_{i,j}(z)=\sum_{n=0}^{\infty}f_{i,j}^{(2n)}z^{2n},
Ai,j(z)=n=0ai,j(2n)z2n,Bi,j(z)=n=1bi,j(2n1)z2n1,Di,j(z)=n=0di,j(2n)z2n,\displaystyle A_{i,j}(z)=\sum_{n=0}^{\infty}a_{i,j}^{(2n)}z^{2n},\quad B_{i,j}(z)=\sum_{n=1}^{\infty}b_{i,j}^{(2n-1)}z^{2n-1},\quad D_{i,j}(z)=\sum_{n=0}^{\infty}d_{i,j}^{(2n)}z^{2n},

where we write f(n)=i,jfi,j(n)f^{(n)}=\sum_{i,j}f_{i,j}^{(n)} and F(z)=i,jFi,j(z)F(z)=\sum_{i,j}F_{i,j}(z). Once again, fj,i(n)=0f^{(n)}_{j,i}=0 if nn is odd, which means the conclusion presented in the Woess paper still holds. The first four identities may be interpreted as

μ(n)(e)\displaystyle\mu^{(n)}(e) =k=0nf(2k)μ(nk)(e)+α0p(2n1),\displaystyle=\sum_{k=0}^{n}f^{(2k)}\mu^{(n-k)}(e)+\alpha_{0}p^{(2n-1)},
p(2n1)\displaystyle p^{(2n-1)} =k=0n1f(2k)p(2n2k1)+α0μ(n1)(e),\displaystyle=\sum_{k=0}^{n-1}f^{(2k)}p^{(2n-2k-1)}+\alpha_{0}\mu^{(n-1)}(e),
ai,j(2n)\displaystyle a^{(2n)}_{i,j} =k=0n(f(2k)fi,j(2k))ai,j(2n2k)+α0bi,j(2n1),\displaystyle=\sum_{k=0}^{n}\left(f^{(2k)}-f^{(2k)}_{i,j}\right)a^{(2n-2k)}_{i,j}+\alpha_{0}b^{(2n-1)}_{i,j},
bi(2n1)\displaystyle b^{(2n-1)}_{i} =k=0n1f(2k)bi,j(2n2k1)+α0ai,j(2n2).\displaystyle=\sum_{k=0}^{n-1}f^{(2k)}b^{(2n-2k-1)}_{i,j}+\alpha_{0}a^{(2n-2)}_{i,j}.

For each of these identities, we sum over the index of first return to the identity. The last identity is a bit harder to work with since di,j(n)d_{i,j}^{(n)} is nonzero if XX is not Leinert:

fi,j(2n)=αi,j2ai,j(2n2)+di,j(2n).f_{i,j}^{(2n)}=\alpha_{i,j}^{2}a_{i,j}^{(2n-2)}+d_{i,j}^{(2n)}.

This implies that

Fi,j(z)=αi,j2z2Ai,j(z)+Di,j(z).F_{i,j}(z)=\alpha_{i,j}^{2}z^{2}A_{i,j}(z)+D_{i,j}(z).

Using the results of Woess, we get the relations

G(z)=11F(z)F0(z),Fi,j(z)=αi,j2z2Fi,j(z)+1/G(z)+Di,j(z)G(z)=\frac{1}{1-F(z)-F_{0}(z)},\quad F_{i,j}(z)=\frac{\alpha_{i,j}^{2}z^{2}}{F_{i,j}(z)+1/G(z)}+D_{i,j}(z)
Fi,j(z)=(1+Di,j(z)G(z))2+4αi,j2z2G(z)2+Di,j(z)G(z)12G(z).\implies F_{i,j}(z)=\frac{\sqrt{(1+D_{i,j}(z)G(z))^{2}+4\alpha_{i,j}^{2}z^{2}G(z)^{2}}+D_{i,j}(z)G(z)-1}{2G(z)}.

Therefore we have

G(z)\displaystyle G(z) =1+12(1+4α02z2G(z)21)\displaystyle=1+\frac{1}{2}\left(\sqrt{1+4\alpha_{0}^{2}z^{2}G(z)^{2}}-1\right)
+12i,j((1+Di,j(z)G(z))2+4αi,j2z2G(z)2+Di,j(z)G(z)1).\displaystyle+\frac{1}{2}\sum_{i,j}\left(\sqrt{(1+D_{i,j}(z)G(z))^{2}+4\alpha_{i,j}^{2}z^{2}G(z)^{2}}+D_{i,j}(z)G(z)-1\right).
Q(t,z)=1+12i,j((1+zt2c2t2)2+4αi,j2z2t2+zt2c2t21)Q\left(t,z\right)=1+\frac{1}{2}\sum_{i,j}\left(\sqrt{\left(1+\frac{zt^{2}}{c^{2}-t^{2}}\right)^{2}+4\alpha_{i,j}^{2}z^{2}t^{2}}+\frac{zt^{2}}{c^{2}-t^{2}}-1\right)

Here, Di,jD_{i,j} is a power series with coefficients vanishing as nn\to\infty. More specifically, suppose that di,j(2n)βnd_{i,j}^{(2n)}\sim\beta^{-n} for large nn. Then we have R1=limn(di,j(2n))1/2n=β1/2R^{-1}=\lim_{n\to\infty}(d_{i,j}^{(2n)})^{1/2n}=\beta^{-1/2}, and so the radius of convergence is root of the decay rate β\sqrt{\beta} of the frequency of bad strings, where β<(2s1)2\beta<(2s-1)^{2}.

5.1. Special Case (Cubic Equation Derivation)

Consider the case where αij=a\alpha_{ij}=a are all the same, say a=12sa=\frac{1}{2s}, for the group G=𝐅s×𝐅sG=\mathbf{F}_{s}\times\mathbf{F}_{s}. In addition, by symmetry we can argue that the functions Dij=DD_{ij}=D are all the same. Then we have that G(z)=QR(z,G(z))G(z)=Q_{R}(z,G(z)) is given by the equation

G(z)=1+s((1+D(z)G(z))2+4a2z2G(z)2+D(z)G(z)1),G(z)=1+s\left(\sqrt{(1+D(z)G(z))^{2}+4a^{2}z^{2}G(z)^{2}}+D(z)G(z)-1\right),

where QRQ_{R} is to denote replacing D(z)D(z) with z2R2z2\frac{z^{2}}{R^{2}-z^{2}}, since D(z)z2R2z2D(z)\leq\frac{z^{2}}{R^{2}-z^{2}}. Therefore Q(z,t)QR(z,t)Q(z,t)\leq Q_{R}(z,t). Moving terms to the other side and squaring gives us

[(G1)s(DG1)]2=(G1)2+s2(DG1)22s(DG1)(G1)=s2[(1+DG)2+4a2z2G2]\iff[(G-1)-s(DG-1)]^{2}=(G-1)^{2}+s^{2}(DG-1)^{2}-2s(DG-1)(G-1)=s^{2}[(1+DG)^{2}+4a^{2}z^{2}G^{2}]
(G1)22s(DG1)(G1)s2[4DG+4a2z2G2]=0.\iff(G-1)^{2}-2s(DG-1)(G-1)-s^{2}[4DG+4a^{2}z^{2}G^{2}]=0.

This yields a quadratic equation in GG, namely AG2+BG+C=0AG^{2}+BG+C=0, where

A=12sD4a2z2s2,B=4s2D+2sD+2s2,C=12s.A=1-2sD-4a^{2}z^{2}s^{2},\quad B=-4s^{2}D+2sD+2s-2,\quad C=1-2s.

Therefore G=12A(B±B24AC)G=\frac{1}{2A}(-B\pm\sqrt{B^{2}-4AC}), and as a power series GG returns real values for all values of zz, so we can solve for the radius of convergence as B24AC=0B^{2}-4AC=0:

(4s2D2sD2s+2)24(4a2z2s2+2sD1)(2s1)=0\left(4s^{2}D-2sD-2s+2\right)^{2}-4\left(4a^{2}z^{2}s^{2}+2sD-1\right)\left(2s-1\right)=0
(1) (4s2z22sz2(2s2)(R2z2))24(2sz2+(4a2z2s21)(R2z2))(R2z2)(2s1)=0.\iff\left(4s^{2}z^{2}-2sz^{2}-\left(2s-2\right)\left(R^{2}-z^{2}\right)\right)^{2}-4\left(2sz^{2}+\left(4a^{2}z^{2}s^{2}-1\right)\left(R^{2}-z^{2}\right)\right)\left(R^{2}-z^{2}\right)\left(2s-1\right)=0.

Expanded out, the equation is

(2) 32a2s3z6+16a2s2z6+64a2R2s3z432a2R2s2z4+16s4z432a2R4s3z2+16a2R4s2z216R2s3z2+4R4s2=0.-32a^{2}s^{3}z^{6}+16a^{2}s^{2}z^{6}+64a^{2}R^{2}s^{3}z^{4}-32a^{2}R^{2}s^{2}z^{4}+16s^{4}z^{4}-32a^{2}R^{4}s^{3}z^{2}+16a^{2}R^{4}s^{2}z^{2}-16R^{2}s^{3}z^{2}+4R^{4}s^{2}=0.

This equation in zz yields the radius of convergence for GG, assuming that z<Rz<R. Here is an example plot comparing the curves y=(22x1)1y=\left(2\sqrt{2x-1}\right)^{-1} and (x,y)=(s,z)(x,y)=(s,z), where (x,y)(x,y) satisfy the cubic equation above:

[Uncaptioned image]

The purple points in the plot show numerically computed radii of convergence using the following method. Let (U1,,Us)U(N)(U_{1},\ldots,U_{s})\in\operatorname{U}(N) and (V1,,Vs)U(N)(V_{1},\ldots,V_{s})\in\operatorname{U}(N) be Haar randomly sampled unitary matrices. Then the dots are given by computing the quantity z1=aiUiI+IViz^{-1}=\|a\sum_{i}U_{i}\otimes I+I\otimes V_{i}\|, with .\|.\| the 2-norm. Here each point is given by averaging over 4 computations, a=1a=1, and N=75N=75.

More generally, if we had some unknown function DD, then we can use the quadratic formula once more to find the relation for DD:

(4s2D2sD2s+2)24(4a2z2s2+2sD1)(2s1)=0\left(4s^{2}D-2sD-2s+2\right)^{2}-4\left(4a^{2}z^{2}s^{2}+2sD-1\right)\left(2s-1\right)=0
4a2(12s)z2+((2s1)D1)2=0D(z)=1±2az2s1(2s1)\iff 4a^{2}(1-2s)z^{2}+((2s-1)D-1)^{2}=0\iff D(z)=\frac{1\pm 2az\sqrt{2s-1}}{(2s-1)}
z=±12a2s1(1(2s1)D(z)).\iff z=\frac{\pm 1}{2a\sqrt{2s-1}}\left(1-(2s-1)D(z)\right).

The sign is indeterminate as DD cannot be determined. If D=0D=0, then we get z1=2a2s1z^{-1}=2a\sqrt{2s-1} as expected.

Note that in the above equation, it is quadratic in R2R^{2}, which we can solve as

R2=2a2(2s1)3z6+4a2(2s1)z42sz24a2(2s1)z21=2az3(2s1)3/2+4a2(2s1)z42sz24a2(2s1)z21R^{2}=\frac{2\sqrt{a^{2}\left(2s-1\right)^{3}z^{6}}+4a^{2}(2s-1)z^{4}-2sz^{2}}{4a^{2}\left(2s-1\right)z^{2}-1}=\frac{2az^{3}\left(2s-1\right)^{3/2}+4a^{2}(2s-1)z^{4}-2sz^{2}}{4a^{2}\left(2s-1\right)z^{2}-1}

5.2. Proof for product of free groups

Let β(2n)\beta^{(2n)} denote the number of bad strings of length 2n2n for a set XGX\subset G, and let (2n)=β(2n)s(s1)2n\mathcal{B}^{(2n)}=\frac{\beta^{(2n)}}{s(s-1)^{2n}} be the frequency of bad strings of length 2n2n. Say that G=𝐅s×𝐅sG=\mathbf{F}_{s}\times\mathbf{F}_{s}, with XX the generator set. We have an upper bound on β(2n)\beta^{(2n)} that goes to 0 as ss\to\infty, therefore so does β(2n)\beta^{(2n)}. Recall from the definition of dij(2n)d_{ij}^{(2n)} that only bad strings contribute to a nonzero quantity, so we can say that Dij(z)=c2z21c2z2D_{ij}(z)=\frac{c^{2}z^{2}}{1-c^{2}z^{2}}, where cc is the asymptotic exponential rate of encountering these strings. Therefore c<cmaxc<c_{\text{max}}, where cmaxc_{\text{max}} is the exponential rate of encountering any kind of bad string. Since cmax0c_{\text{max}}\to 0, so does cc, and therefore Dij(z)0D_{ij}(z)\to 0 as we increase ss. More conveniently, given some fixed uniform constant for all of the coefficients of α\alpha, we expect that the radius of convergence for G(z)G(z) will be r12a2s1r^{-1}\sim 2a\sqrt{2s-1}.

Take for example G=sG=\mathbb{Z}^{s}. The norm for α\alpha with all coefficients set to 1 is α=s\|\alpha\|=s. I expect that the frequency of bad strings does not vanish as we increase ss, and in fact we have some nice asymptotic relation.

5.3. Small Idea about Radius of Convergence

In the Woess paper, they show that r1=P(θ)/θ=min{P(t)/t:t0}r^{-1}=P(\theta)/\theta=\min\{P(t)/t:t\geq 0\}, or r=max{t/P(t):t0}r=\max\{t/P(t):t\geq 0\}, where

P(t)=1+12xX(1+4|α(x)|2t21),P(t)=12xX[1+4|α(x)|2t211+4|α(x)|2t2]P(t)=1+\frac{1}{2}\sum_{x\in X}\left(\sqrt{1+4|\alpha(x)|^{2}t^{2}}-1\right),\quad P^{\prime}(t)=\frac{1}{2}\sum_{x\in X}\left[\sqrt{1+4|\alpha(x)|^{2}t^{2}}-\frac{1}{\sqrt{1+4|\alpha(x)|^{2}t^{2}}}\right]

Another approach is to state that since G(z)=P(zG(z))G(z)=P(zG(z)), the radius of convergence is bounded by G(z)G(z) having a finite derivative, and so if the graph of G(z)G(z) has a vertical slope for a finite G(z)G(z) value, then that could also be the radius of convergence. Suppose that y=P(xy)y=P(xy), then the derivative is given by

y=(y+xy)P(xy)=(y+xy)12xX4|α(x)|2x2y21+4|α(x)|2x2y2.y^{\prime}=(y+xy^{\prime})P^{\prime}(xy)=(y+xy^{\prime})\frac{1}{2}\sum_{x\in X}\frac{4|\alpha(x)|^{2}x^{2}y^{2}}{\sqrt{1+4|\alpha(x)|^{2}x^{2}y^{2}}}.

Letting yy^{\prime}\to\infty, we must have that

yy+xy1x=12xX[1+4|α(x)|2x2y211+4|α(x)|2x2y2].\frac{y^{\prime}}{y+xy^{\prime}}\to\frac{1}{x}=\frac{1}{2}\sum_{x\in X}\left[\sqrt{1+4|\alpha(x)|^{2}x^{2}y^{2}}-\frac{1}{\sqrt{1+4|\alpha(x)|^{2}x^{2}y^{2}}}\right].

Note that the first term simplifies to

yy+xy1x=y1+12xX[111+4|α(x)|2x2y2].\frac{y^{\prime}}{y+xy^{\prime}}\to\frac{1}{x}=y-1+\frac{1}{2}\sum_{x\in X}\left[1-\frac{1}{\sqrt{1+4|\alpha(x)|^{2}x^{2}y^{2}}}\right].

One option here is to just explicitly solve for the curve for G(z)G(z) where we can. If all the constants are αi,j\alpha_{i,j} and we do not have the identity, then this simplifies a lot:

G(z)=Q(z,G(z))=1+12i,j((1+G(z)z2c2z2)2+4αi,j2G(z)2z2+G(z)z2c2z21)G(z)=Q(z,G(z))=1+\frac{1}{2}\sum_{i,j}(\sqrt{(1+\frac{G(z)z^{2}}{c^{2}-z^{2}})^{2}+4\alpha_{i,j}^{2}G(z)^{2}z^{2}+\frac{G(z)z^{2}}{c^{2}-z^{2}}-1)}

5.4. Existence of bad strings

Here are some examples of bad strings, to show that they exist for groups of the form G=𝐅s1××𝐅smG=\mathbf{F}_{s_{1}}\times\ldots\times\mathbf{F}_{s_{m}}, where sis_{i}\in\mathbb{N} for all ii. If m=1m=1, then the set XX of generators for GG is a Leinert set, as they have no nontrivial algebraic relations. If m2m\geq 2, then we run into problems.

  1. (1)

    Consider G=𝐅s1×𝐅s2G=\mathbf{F}_{s_{1}}\times\mathbf{F}_{s_{2}}, which has the generator set X={x1,,xs1,y1,,ys2}X=\{x_{1},\ldots,x_{s_{1}},y_{1},\ldots,y_{s_{2}}\}. Here in this group the xx’s commute with the yy’s. If s1s_{1} and s2s_{2} are greater than 1, then we can let SS be the string

    S=x11x2y11y2x21x1y21y1=e.S=x_{1}^{-1}x_{2}y_{1}^{-1}y_{2}x_{2}^{-1}x_{1}y_{2}^{-1}y_{1}=e.
  2. (2)

    Consider m3m\geq 3, then for this group we can consider the string

    S=x11y1z11x1y11z1=e,S=x_{1}^{-1}y_{1}z_{1}^{-1}x_{1}y_{1}^{-1}z_{1}=e,

    where x1x_{1}, y1y_{1}, and z1z_{1} are generators associated with three different copies of a free group in the total group GG.

There are some cases that do provide Leinert sets.

  1. (1)

    If G=𝐅1×𝐅1G=\mathbf{F}_{1}\times\mathbf{F}_{1}, then the generator set X={x,y}X=\{x,y\} is Leinert, as the only way for xixi+1x_{i}\neq x_{i+1} is if xi=xx_{i}=x for all odd ii and xi+1=yx_{i+1}=y, and vice versa.

  2. (2)

    Similarly to before, G=𝐅1×𝐅2G=\mathbf{F}_{1}\times\mathbf{F}_{2} is also Leinert.

5.5. Creating upper bounds

A primary method of showing that XX is statistically Leinert is to construct an upper bound on b2nb_{2n}. Here is one way to count the number of bad sets, possibly construct upper bounds for b2nb_{2n} in the case G=𝐅s1×𝐅s2G=\mathbf{F}_{s_{1}}\times\mathbf{F}_{s_{2}}:

  1. (1)

    Consider the string from the previous subsection,

    S=x11x2y11y2x21x1y21y1=e.S=x_{1}^{-1}x_{2}y_{1}^{-1}y_{2}x_{2}^{-1}x_{1}y_{2}^{-1}y_{1}=e.

    We consider all strings of this length and form that equal the identity. We have to pick two different generators each (and we can swap the xx’s and yy’s in their role), which leads to a total of 2s1(s11)s2(s21)2s_{1}(s_{1}-1)s_{2}(s_{2}-1) different strings of that form. Let’s call this form the kernel string.

  2. (2)

    An alternative upper bound is the following, which is a very loose bound. The total number of walks of length 2n2n on the free group of ss generators from the identity to the identity is bounded by (2s1)n(2nn)(2s-1)^{n}\binom{2n}{n}.

Consider s1=s2=2s_{1}=s_{2}=2. This does not form a Leinert set due to the arguments from before,

6. Numerical Algorithms

6.1. Some numerics

For some numerics on the number of bad strings in various cases, consider the group GG from before. For strings of length 2n<82n<8, there are no bad strings. Here are some computations on the exact number of bad strings, or at least tight lower bounds. For notation purposes, if SS is a valid string of the form

S=x11x2x2n11x2n,S=x_{1}^{-1}x_{2}\ldots x_{2n-1}^{-1}x_{2n},

then define the conjugate string S~\tilde{S} to be

S~=x1x21x2n1x2n1.\tilde{S}=x_{1}x_{2}^{-1}\ldots x_{2n-1}x_{2n}^{-1}.
  • For 2n=82n=8, we established that b8=2s1(s11)s2(s21)b_{8}=2s_{1}(s_{1}-1)s_{2}(s_{2}-1).

  • For 2n=102n=10, we can use every single string from before and append elements to the end that cancel each other out. Using the kernel form for S8S_{8} (string of length 8), we can let S~=z11S8z1\tilde{S}=z_{1}^{-1}S_{8}z_{1}, where z1Xz_{1}\in X and z1x1z_{1}\neq x_{1} or y2y_{2}. So we have s2s-2 choices for z1z_{1}. We can also consider strings of the form

    S10=x11w2x41y1y21x4w21x1y21y1=e.S_{10}=x_{1}^{-1}w_{2}x_{4}^{-1}y_{1}y_{2}^{-1}x_{4}w_{2}^{-1}x_{1}y_{2}^{-1}y_{1}=e.
  • For 2n=122n=12, we can use any string from b10b_{10} or use strings of the following form:

    S12=x11w2w31x4y11y2x41w3w21x1y21y1=e.S_{12}=x_{1}^{-1}w_{2}w_{3}^{-1}x_{4}y_{1}^{-1}y_{2}x_{4}^{-1}w_{3}w_{2}^{-1}x_{1}y_{2}^{-1}y_{1}=e.

    Given a kernel string S8S_{8}, we can look at strings of the form z11z2S8z21z1z_{1}^{-1}z_{2}S_{8}z_{2}^{-1}z_{1}, where we choose z1z_{1} and z2z_{2}. z2z_{2} has s2s-2 options, so z1z_{1} has s3s-3 options. For strings of the form S10S_{10}, we have b8b_{8} times the number of options for w2w_{2} and w3w_{3}, which is hard to determine.

    • If w2=x4w_{2}=x_{4}, then w3w_{3} has s1s-1 options. If w3=x1w_{3}=x_{1}, then w2w_{2} has s1s-1 options.

    • Otherwise, w2w_{2} has s2s-2 options from not equaling x4x_{4} and w3w_{3} has s2s-2 options as well.

    We multiply by 2 again since we can also place the ww’s between the yy’s instead, so we have

    b12=b8[(s2)(s3)+4(s1)+2(s2)2]b_{12}=b_{8}[(s-2)(s-3)+4(s-1)+2(s-2)^{2}]
  • In general, given b2nb_{2n}, we have two options:

    1. (1)

      We can take a bad string S2n2S_{2n-2} and conjugate by a letter zz, giving (s2)(s-2) strings.

    2. (2)

      We can produce a bad string that has no bad substrings. The number of these is hard to find.

6.2. Growth of Bad Strings

For the purposes of testing strings, a few tests were run. The numerical algorithm randomized a string of length 2m, using n generators.

Here we shall consider five distinct cases:

  1. (1)

    2 generators, 100 samples/length, length 1 to 40

  2. (2)

    2 generators, 1000 samples/length, length 1 to 40

Three tests were applied:

  1. (1)

    Parity Test: The strings were then tested via a parity test to determine whether a necessary but not sufficient condition was met: there were an equal number of generators and their corresponding inverse elements.

  2. (2)

    Adjacent Repeating Element Test: In this test adjacent elements in a string were checked to see if there were any repetitions, i.e. ’aa’ or ’xx’ etc.

  3. (3)

    Reduction and Reordering Test: After the first two tests were completed, the strings were reordered cyclically and then reduced by checking whether adjacent elements were inverses of each other, in which case they were replaced by the identity element.

In the first cycle of sample runs (not including the Adjacent Repeating Element Test), the following decay rate was observed.

[Uncaptioned image]

In the second cycle of sample runs (including the Adjacent Repeating Element Test), the following decay rate was observed.

A Monte Carlo simulation was then applied to reduce computation time. The algorithm is presented in the appendix.

7. Result and Numerical Verification

When studying the radius of convergence of product of free groups, a specific instance of almost Leinert set. We found a function Q(z, G(z)) that incorporates the number of bad strings in the set such that:

(3) P(zG(z))G(z)Q(z,G(z))P(zG(z))\leq G(z)\leq Q(z,G(z))

Here

(4) P(t)=1+12xX(1+4|α(x)|2t21)P(t)=1+\frac{1}{2}\sum_{x\in X}(\sqrt{1+4|\alpha(x)|^{2}t^{2}}-1)

and

(5) Q(t,z)=1+12i,j((1+zt2c2t2)2+4αi,j2z2t2+zt2c2t21)Q(t,z)=1+\frac{1}{2}\sum_{i,j}(\sqrt{(1+\frac{zt^{2}}{c^{2}-t^{2}})^{2}+4\alpha_{i,j}^{2}z^{2}t^{2}}+\frac{zt^{2}}{c^{2}-t^{2}}-1)

In our numerical calculations with increasing dimensions in the group formed by the product of two free groups with two generators, the lower bound on radius of convergence for G(z) differed from the upper bound by  3.

[Uncaptioned image]

8. Conclusion and Future Works

The results seem to be following our intuition created by past studies. This new function has been successful in tightly bounding the radius of convergence of almost Leinert Sets with the radius of convergence found by Woess for Leinert Sets.

Future works should consider analytically exploring a tighter bound on the ”irreducible” strings as the size of the string exponentially decrease in proportion to valid strings. For the purposes of this project, only bad strings up to length sixteen were found, and the minimum length of the string found was length 8. As the length increases and bad strings are added in, the number of bad strings are seen to exponentially increase in proportion to valid strings.

9. Acknowledgements

Special acknowledgements to Dr. Thomas J. Sinclair, Purdue University Faculty, for mentoring this project. This work was partially funded by NSF grant DMS-2055155.

10. Appendix: Algorithm

The algorithm mentioned in section 6.2 is presented here:

Algorithm: badStringCalculator
Define alpha be generator set
Define the length of each word length_word
Define the number of words num_words
Define iter_words as a vector
Define num_reduced as a matrix 1 by iter_words
Define num_bad as a matrix 1 by iter_words
Instantiate the counter number of reduced words num_red_words and the counter for the number of bad strings num_bad_strings
Define inst
for i in [1, length(iter_words)] do
     for j in [1:iter_words(i)] do
         Code to reduce and reorder each word by verifying consecutive letters are inverses of each other
         word split
         Define word as reducing placeholder red_word, and character place holder temp_char, and a steps counter steps
         Define matrix to compare consecutive letters parity_mat
         new_word = word;
         insert
         for k in range [1, length(word)] do
              Work by case each possible letter case to fill the parity matrix, x is a +1 in the first column while y (its inverse) is -1 in the first column. Similarly, a and b are +1 and -1, respectively, in the second column.
              if word(k) == ”a” then parity_mat(1) = parity_mat(1)+1;
              else if word(k) == ”b” then parity_mat(1) = parity_mat(1)-1;
              else if word(k) == ”x” then parity_mat(2) = parity_mat(2)+1;
              else if word(k) == ”y” then parity_mat(2) = parity_mat(2)-1;
              end if
         end for
         Define nn as an empty string
         Define vector of zeros the same length as word called nn1
         for k = 1:length(word) do
              Create a copy of word as nn and use nn1 to turn word into an array of letters, essentially splitting the string.
              if word(k) == ”a” then nn = append(nn,”a”); nn1(k) = ’a’;
              else if word(k) == ”b” then nn = append(nn,”b”); nn1(k) = ’b’;
              else if word(k) == ”x” then nn = append(nn,”x”); nn1(k) = ’x’;
              else if word(k) == ”y” then nn = append(nn,”y”); nn1(k) = ’y’;
              end if
         end for
         Create reduced word to be a copy of nn. This copy will be parsed to reduce if inverses are adjacent to one another.
         Define steps to be an integer which counts how many reductions have been done.
         Define num_red_word to be an empty array.
         Define num_bad to be an empty array.
         if parity_mat == zeros(size(parity_mat)) then
              while red_word  = ”” && steps ¡= 10 do
                  if contains(red_word,’ab’) then red_word = replace(red_word,’ab’,’ ’) inst = count(red_word,’ ’); red_word = strrep(red_word, ’ ’, ”); steps = steps+1;
                  end if
                  if contains(red_word,’ba’) then red_word = replace(red_word,’ba’,’ ’) inst = count(red_word,’ ’); red_word = strrep(red_word, ’ ’, ”); steps = steps+1;
                  end if
                  if contains(red_word,’xy’) then red_word = replace(red_word,’xy’,’ ’) inst = count(red_word,’ ’); red_word = strrep(red_word, ’ ’, ”); steps = steps+1;
                  end if
                  if contains(red_word,’yx’) then red_word = replace(red_word,’yx’,’ ’) inst = count(red_word,’ ’); red_word = strrep(red_word, ’ ’, ”); steps = steps+1;
                  end if
              end while
         else if parity_mat  = zeros(size(parity_mat)) then num_bad_strings = num_bad_strings+1;
         end ifnum_reduced(i) = num_red_word; num_bad(i) = num_bad_strings
     end for
end for
Define samples to be run. Instantiated to 1000.
Define length as an int variable for string.
Now we need to define the distribution to sample from for the Monte-Carlo sampling process.
Define mu to be 0.23 as the mean of the normal distribution.
Define sigma to be 0.25 as the standard deviation of the normal distribution.
Define L to be the length of iter_words
Define Rmat to be a matrix of NaN values of size L x samples.
Define pdfNormalCd to be the normal probability distribution function of the normal distribution with mean mu and standard deviation sigma, evaluated at the values in iter_words.
for i = 1:samples do R=normrnd(mu,sigma,[L,1]); Rmat(:,i)=R;
end for
Plot iter_words vs num_reduced and Plot iter_words vs num_bad on the same plot

References

  • Akemann and Ostrand [1976] Charles A. Akemann and Phillip A. Ostrand. Computing norms in group c*-algebras. American Journal of Mathematics, 98(4):1015–1047, 1976. ISSN 00029327, 10806377. URL http://www.jstor.org/stable/2374039.
  • Hastings [2007] M. B. Hastings. Random unitaries give quantum expanders. Phys. Rev. A, 76:032315, Sep 2007. doi: 10.1103/PhysRevA.76.032315. URL https://link.aps.org/doi/10.1103/PhysRevA.76.032315.
  • Mathworld [2023] Wolfram Mathworld. Cayley tree, 2023. URL https://mathworld.wolfram.com/CayleyTree.html. Accessed on May 18, 2023.
  • Woess [1986] Wolfgang Woess. A short computation of the norms of free convolution operators. Proceedings of the American Mathematical Society, 96(1):167–170, 1986.
  • Zummo [2022] J. Zummo. An introduction to geometric group theory. University of Chicago REU, Aug 2022. URL http://math.uchicago.edu/ may/REU2022/REUPapers/Zummo.pdf.