All Seminars

Title: Using Mathematics to Aid in the Evaluation of Robotic Systems
Evans Hall Lecture: Mathematics/Robotic Systems
Speaker: Mili Shah, PhD of Associate Professor, Department of Mathematics, The Cooper Union
Contact: Kristen Schroeder, kfschro@emory.edu
Date: 2019-04-25 at 4:00PM
Venue: MSC: E208
Download Flyer
Abstract:
Robotic systems use a variety of sensors to perform tasks that are assigned to them. In order to use data collected from these sensors, they must be registered with respect to a common coordinate frame. This talk will begin with an overview of the mathematical tools needed to tackle a registration problem and will conclude with current research and open problems related to the mathematics of evaluating robotic systems.
Title: Large girth approximate Steiner triple systems
Seminar: Combinatorics
Speaker: Lutz Warnke of The Georgia Institute of Technology
Contact: Dwight Duffus, dwightduffus@emory.edu
Date: 2019-04-24 at 4:00PM
Venue: MSC W301
Download Flyer
Abstract:
One can define the girth of a graph to be the minimum g such that there is a set of g vertices that spans at least g edges. This definition can be extended to the setting of Steiner triple systems by defining the girth to be the smallest g at least 4 for which there is a set of g vertices that spans at least g - 2 triples. In this talk we discuss a natural randomized algorithm that produces an approximate Steiner triple system of arbitrarily large girth, i.e., with (1/6-o(1)) n^2 triples, answering a question of Erdos from 1973 (that was independently also asked by Lefmann, Phelps, and Rodl in 1993, and Ellis and Linial in 2013). Joint work with Tom Bohman: https://arxiv.org/abs/1808.01065
Title: Monstrous moonshine, elliptic curves and vertex algebras
Defense: Dissertation
Speaker: Victor Manuel Aricheta of Emory University
Contact: Victor Aricheta, victormanuel.aricheta@emory.edu
Date: 2019-04-16 at 10:00AM
Venue: MSC E408
Download Flyer
Abstract:
In mathematics, moonshine refers to the unexpected connection between group theory and number theory. Monstrous moonshine is the first and best understood example of moonshine. It links the monster sporadic group to the modular j-function, a fact that we now know is explained by the presence of a certain algebraic structure called the moonshine module. Our comprehension of monstrous moonshine remains incomplete however, and in this talk we discuss several aspects of it that remain mysterious.\\ \\ First we investigate a theorem and an observation of Ogg in 1975 that foreshadowed monstrous moonshine. In particular we generalize his theorem on supersingular j-invariants to supersingular elliptic curves with level structure. Ogg observed—which we now know is partly explained by monstrous moonshine—that the level one case yields a characterization of the primes dividing the order of the monster. Here we show that the corresponding analyses for higher levels give analogous characterizations of the primes dividing the orders of other sporadic simple groups (e.g. baby monster, Fischer's largest group). More generally we characterize, in terms of supersingular elliptic curves with level, the primes arising as orders of Fricke elements in centralizer subgroups of the monster. This situates Ogg's theorem and observation in a broader setting.\\ \\ Second we build on the study of Duncan, Griffin and Ono concerning the moonshine module. They studied its homogeneous subspaces, and discovered in particular that the moonshine module exhibits a curious property: its homogeneous subspaces tend to a multiple of the regular representation of the monster. We prove that an analogous result holds for any vertex operator algebra satisfying certain hypotheses, for which the moonshine module is the first natural example.
Title: Constructing Picard curves with complex multiplication using the Chinese Remainder Theorem
Seminar: Algebra
Speaker: Sonny Arora of Emory University
Contact: David Zureick-Brown, dzb@mathcs.emory.edu
Date: 2019-04-16 at 4:00PM
Venue: MSC W201
Download Flyer
Abstract:
For cryptographic protocols whose security relies on the di?culty of the discrete log problem of the underlying group, one often wants to ?nd a group whose order is divisible by a large prime. One option for the group is the group of points of an elliptic curve over a ?nite ?eld, or more generally, the group of points on the Jacobian of a curve over a ?nite ?eld. To find curves over a finite field whose Jacobian has number of points divisible by a large prime, it suffices to construct curves whose Jacobian is ordinary and has complex multiplication (CM) by a given field K. Working with higher genus curves allows one to work over smaller fields than the elliptic curve case. I will present a new algorithm to construct a particular class of genus 3 curves, called Picard curves, whose Jacobian is ordinary with CM by a given field CM field K. This is joint work with Kirsten Eisentraeger.
Title: Computational challenges in ice sheet modeling
Seminar: Numerical Analysis and Scientific Computing
Speaker: Mauro Perego of Sandia National Laboratories, NM
Contact: Sofia Guzzetti, sofia.guzzetti@emory.edu
Date: 2019-04-12 at 2:00PM
Venue: MSC W301
Download Flyer
Abstract:
Title: a-Numbers of curves in Artin–Schreier covers
Seminar: Algebra
Speaker: Jeremy Booher of University of Arizona
Contact: David Zureick-Brown, dzb@mathcs.emory.edu
Date: 2019-04-09 at 4:00PM
Venue: MSC W201
Download Flyer
Abstract:
Let f : Y -> X be a branched Z/pZ-cover of smooth, projective, geometrically connected curves over a perfect field of characteristic p>0. We investigate the relationship between the a-numbers of Y and X and the ramification of the map f. This is analogous to the relationship between the genus (respectively p-rank) of Y and X given the Riemann-Hurwitz (respectively Deuring--Shafarevich) formula. Except in special situations, the a-number of Y is not determined by the a-number of X and the ramification of the cover, so we instead give bounds on the a-number of Y. We provide examples showing our bounds are sharp. The bounds come from a detailed analysis of the kernel of the Cartier operator. This is joint work with Bryden Cais.
Title: On an Eigenvector-Dependent Nonlinear Eigenvalue Problem
Seminar: Numerical Analysis and Scientific Computing
Speaker: Ren-Cang Li of University of Texas at Arlington
Contact: Yuanzhe Xi, yxi26@emory.edu
Date: 2019-04-05 at 2:00PM
Venue: MSC W301
Download Flyer
Abstract:
We first establish existence and uniqueness conditions for the solvability of an algebraic eigenvalue problem with eigenvector nonlinearity. We then present a local and global convergence analysis for a self-consistent field (SCF) iteration for solving the problem. The well-known sin? theorem in the perturbation theory of Hermitian matrices plays a central role. The near-optimality of the local convergence rate of the SCF iteration is demonstrated by examples from the discrete Kohn-Sham eigenvalue problem in electronic structure calculations and the maximization of the trace ratio in the linear discriminant analysis for dimension reduction. This is a joint work with Yunfeng Cai (Peking University), Lei-Hong Zhang (Shanghai University of Finance and Economics), Zhaojun Bai (University of California at Davis).
Title: Jacobians of Graphs and Arithmetical Structures
Seminar: Algebra
Speaker: Darren Glass of Gettysburg College
Contact: David Zureick-Brown, dzb@mathcs.emory.edu
Date: 2019-04-02 at 4:00PM
Venue: MSC W201
Download Flyer
Abstract:
In analogy to the Jacobian variety associated to a curve, one can define a finite abelian group associated to a graph which we also call the Jacobian of the graph. Several theorems in algebraic geometry translate nicely to the graph theory setting while others do not. In this talk, we will look at this definition and consider further generalizations that were originally motivated by arithmetic geometry but which turn out to have a definition in terms of elementary number theory as well as a number of interesting combinatorial properties.
Title: Identifying Differential Equations with Numerical Time evolution
Seminar: Numerical Analysis and Scientific Computing
Speaker: Sung Ha Kang of Georgia Institute of Technology
Contact: Lars Ruthotto, lruthotto@emory.edu
Date: 2019-03-29 at 2:00PM
Venue: MSC W301
Download Flyer
Abstract:
Identifying unknown differential equations from given discrete time dependent data is a challenging problem. A small amount of noise can make the recovery unstable, and nonlinearity and differential equations with varying coefficients add complexity to the problem. We propose a new direction based on the fundamental idea of convergence analysis of numerical partial differential equation schemes. We utilize L1 minimization for efficiency, and a performance guarantee is established based on an incoherence property. The main contribution is to validate and correct the results by Time Evolution Error and Base Element Expansion. The propose method is explored for data with non-periodic boundary conditions, noisy data and PDE with varying coefficient for nonlinear PDE identification.
Title: Matrix Computations and Optimization for Spectral Computed Tomography
Defense: Dissertation
Speaker: Yunyi Hu of Emory University
Contact: Yunyi Hu, yunyi.hu@emory.edu
Date: 2019-03-29 at 3:00PM
Venue: MSC W201
Download Flyer
Abstract:
In the area of image science, the emergence of spectral computed tomography (CT) detectors highlights the concept of quantitative imaging, in which not only reconstructed images are offered, but also weights of different materials that compose the object are provided. For distinct types of detectors and noise, various models and techniques are produced to capture different features. In this thesis, we focus on optimization, preconditioning and model development of spectral CT. For simple energy discriminating detectors, a nonlinear optimization framework is built on a Poisson likelihood estimator and bound constraints. A nonlinear interior-point trust region method is implemented to compute the solution. For energy-windowed spectral CT, a nonlinear least squares approach is proposed to describe the problem and under bound constraints, a two-step method using the projected line search and the trust region approach, incorporated with a stepwise preconditioner, is used to solve the problem. In addition, a weighted least squares formulation is derived from the Gaussian noise assumption and another preconditioner that is based on rank-1 approximation is inserted to obtain robust reconstruction. The Fast Iterative Shrinkage-Thresholding Algorithm (FISTA), along with a projection step, is used to calculate the solution iteratively. Compared with a direct solver, a two-step model is developed using an ancillary variable. With this two-step model, a row-wise computational method is proposed, which further reduces memory requirements and improves solution accuracy. Numerous numerical experiments are conducted to indicate the strength of methods and real-life examples are presented to show possible applications.