Discrete Signal Reconstruction by Sum of Absolute Values
|
|
- Charlotte Parks
- 5 years ago
- Views:
Transcription
1 JOURNAL OF L A TEX CLASS FILES, VOL., NO. 4, DECEMBER 22 Discrete Signal Reconstruction by Sum of Absolute Values Masaaki Nagahara, Senior Member, IEEE, arxiv: v [cs.it] 8 Mar 25 Abstract In this letter, we consider a roblem of reconstructing an unknown discrete signal taking values in a finite alhabet from incomlete linear measurements. The difficulty of this roblem is that the comutational comlexity of the reconstruction is exonential as it is. To overcome this difficulty, we extend the idea of comressed sensing, and roose to solve the roblem by minimizing the sum of weighted absolute values. We assume that the robability distribution defined on an alhabet is known, and formulate the reconstruction roblem as linear rogramming. Examles are shown to illustrate that the roosed method is effective. Index Terms Discrete signal reconstruction, sum of absolute values, digital signals, comressed sensing, sarse otimization. I. INTRODUCTION Signal reconstruction is a fundamental roblem in signal rocessing. Recently, a aradigm called comressed sensing [], [2], [3] has been roosed for signal reconstruction from incomlete measurements. The idea of comressed sensing is to utilize the roerty of sarsity in the original signal; if the original signal is sufficiently sarse, ractical algorithms such as the basis ursuit [4], the orthogonal matching ursuit [5], etc, may give exact recovery under an assumtion on the measurement matrix (see e.g. [3]). On the other hand, it is also imortant to reconstruct discrete signals whose elements are generated from a finite alhabet with a known robability distribution. This tye of reconstruction, called discrete signal reconstruction, arises in black-and-white or grayscale sarse image reconstruction [6], [7], blind estimation in digital communications [8], machinetye multi-user communications [9], discrete control signal design [], to name a few. The difficulty of discrete signal reconstruction is that the reconstruction has a combinatorial nature and the comutational time becomes exonential. For examle, 2-dimensional signal reconstruction with two symbols (i.e. binary signal reconstruction) needs at worst about.5 36 years with a comuter of 34 eta FLOPS (see Section II below), which cannot be executed, obviously. To overcome this difficulty, we borrow the idea of comressed sensing based on l otimization as used in the basis ursuit [4]. Our idea is that if the original discrete signal, say x, includes L symbols r,r 2,...,r L, then each vector x r i is sarse. For examle, a binary vector x on alhabet {, } includes a number ofand, and hence bothx andx+ are sarse. To recover such a discrete signal, we roose to minimize the sum of weighted absolute values of the elements in x r i. The weights are determined by the robability distribution on the alhabet. The roblem is reduced to a standard linear rogramming roblem, and effectively solved by numerical softwares such as cvx in MATLAB [], [2]. For discrete signal reconstruction, there have been researches based on comressed sensing, called integer comressed sensing: [3] has roosed a Bayesian-based method, which works only for binary sarse signals (i.e., - valued signals that contain many s). [9] considers arbitrary finite alhabet that contains. More recently, motivated by decision feedback equalization, [4] rooses to use l otimization for discrete signal estimation under the assumtion of sarsity. [5], [6], [7] also roose methods based on the finiteness of the measurement matrix (i.e., the elements of the measurement matrix are also in a finite alhabet). As mentioned in [5], this tye of integer comressed sensing is connected with error correcting coding. Comared with these researches, the roosed method in this aer considers arbitrary finite alhabet that does not necessarily contain. The remainder of this letter is organized as follows: Section II formulates the roblem of discrete signal reconstruction and discusses the difficulty of the roblem. Section III rooses to use the sum of weighted absolute values for discrete signal reconstruction, and show a sufficient and necessary condition for exact recovery by extending the notion of the null sace roerty [7]. Examles of one-dimensional signals and twodimensional images are included in Section IV. Section V draws conclusions. Notation For a vector x = [x,x 2,...,x N ] R N, we define the l and l 2 norms resectively as x N x n, x 2 x x, where denotes the transose. For a vector x and a scalar r, we define x r [x r,x 2 r,...,x N r]. Coyright (c) 25 IEEE. Personal use of this material is ermitted. However, ermission to use this material for any other uroses must be obtained from the IEEE by sending a request to ubs-ermissions@ieee.org. M. Nagahara is with Graduate School of Informatics, Kyoto University, Kyoto, 66-85, Jaan; nagahara@ieee.org (corresonding author) For a matrix Φ C M N, kerφ is the kernel (or the null sace) of Φ, that is, kerφ {x C N : Φx = }.
2 2 JOURNAL OF L A TEX CLASS FILES, VOL., NO. 4, DECEMBER 22 I n is the n-dimensional identity matrix, and k is a k- dimensional vector whose elements are all, that is, k [,,...,] R k. For two matrices A R M N and B R K L, A B denotes the Kronecker roduct, that is, A B A 2 B... A N B A B R MK NL, A M B A M2 B... A MN B where A ij is the ij-th element of A. For two real-valued vectors x and y of the same size, x y denotes the elementwise inequality, that is, x y means x i y i for all i. II. PROBLEM FORMULATION Assume that the original signal x is an N-dimensional vector whose elements are discrete. That is, x [x,x 2,...,x N ] X N, X {r,r 2,...,r L }, where r i R and we assume r < r 2 < < r L. () If a symbol, say r, is a comlex number, then taking r j Re(r) and r k Im(r) gives a real-valued alhabet, and hence the assumtion () is not restrictive. We here assume that the values of r i are known and the robability distribution of them is given by P(r i ) = i, i =,2,...,L, (2) where we assume i >, L =. (3) Then we consider a linear measurement rocess modelled by y = Φx C M, (4) where Φ C M N. Note that we consider a comlex-valued matrix Φ since Φ can be constructed from e.g. a comlexvalued DFT (Discrete Fourier Transform) matrix; see the image rocessing examle in Section IV. We assume incomlete measurements, that is, M < N. The objective here is to reconstruct x X N from the measurement vector y C M in (4). First of all, we discuss the uniqueness of the solution of the discrete signal reconstruction. We have the following roosition: Proosition : Given Φ C M N, the following roerties are equivalent: (A) If Φx = Φx 2 and both x and x 2 are in X N, then x = x 2. (B) Define the difference set of X as Then X {r i r j : i,j =,2,...,L}. kerφ X N = {}. (5) (C) The matrix Φ is injective as a ma from X N to C M. Proof: (A) (B): Assume (A) holds. Take any v kerφ X N. Since v X N, there exist x,x 2 X N such that v = x x 2. Then we have Φv = Φx Φx 2 = since v kerφ. Then from (A), we have x = x 2. It follows that v =. (B) (C): Assume (B) holds. Take any v X N and assume Φv =. Then from (B), we have v =. This roves Φ is an injective ma from X N to C M. (C) (A): Assume that (C) holds. Take any x,x 2 X N such that Φx = Φx 2. Since x x 2 X N and Φ is injective on X N, we have x x 2 =, or x = x 2. Throughout the letter, we assume the uniqueness of the solution, that is, the air (X,Φ) is chosen to satisfy (5). If the uniqueness assumtion holds, we can find the exact solution in a finite number of stes via an exhaustive comutation as follows. The set X N is a finite set, and we can write X N = {x,x 2,...,x µ }. For each x i, we comute y i = Φx i and check if y i = y. Thanks to the uniqueness assumtion, we can find the exact solution in a finite time. The roblem is that the size of X N is µ = L N, and hence the comutational comlexity is exonential. For examle, if L = 2 (two symbols) and N = 2, then µ = , which takes at worst about.5 36 years (much longer than the lifetime of the universe) by the current fastest comuter with 34 eta FLOPS. To overcome this, we adot a relaxation technique based on the sum of absolute values in the next section. III. SOLUTION VIA SUM OF ABSOLUTE VALUES We here roose a relaxation method for discrete signal reconstruction. By borrowing the idea of comressed sensing, we can assume that each vector x r i, i =,2,...,L, is sarse (if the robability i given in (2) is not so small), and the sarsity is roortional to the robability i. Hence, we consider the following minimization roblem: minimize z F(z) i z r i subject to y = Φz, (6) where we use the l norm for the measure of sarsity as in comressed sensing. By the definition of the l norm, we rewrite the cost function F(z) as F(z) = N i z n r i = N L(z n ), (7) where L(t) is the sum of weighted absolute values L(t) i t r i. An examle of this function is shown in Fig.. As is shown in this figure, the function L(t) is continuous, convex, and iecewise linear. In fact, we have the following roosition:
3 SHELL et al.: BARE DEMO OF IEEETRAN.CLS FOR JOURNALS 3 L(t) r r 2 r 3 Fig.. Piecewise linear function L(t) in the cost function (7). Proosition 2: The function L(t) is continuous and convex on R and is a iecewise linear function given by t+r, if t (,r ] L(t) = a i t+b i, if t (r i,r i+ ], i =,2,...,L t r, if t [r L, ). where a i i j r i r i, j, b i i j r j + t j r j. Proof: Since each function t r i in L(t) is continuous and convex on R, the function L(t), which is the convex combination of t r i, i =,2,...,L, is also continuous and convex on R. Suose t r. From the inequality (), we have t r i for i =,2,...,L, and hence L(t) = i (t r i ) = t+r, where we used (3). Next, suose r i < t r i+ (i =,2,...,L ). The inequality () gives t r j > for j =,2,...,i and t r j for j = i +,i + 2,...,L. It follows that i L(t) = j (t r j ) j (t r j ) = a i t+b i. Finally, if t r L, then t r i for i =,2,...,L due to (), and hence L(t) = i (t r i ) = t r. Note that the function L(t) is rewritten as L(t) = max i=,,...,l {a it+b i }, where a =, b = r, a L =, and b L = r. It follows that the otimization (6) is equivalently described as minimize θ R N subject to N θ y = Φz, Az +b Eθ, (8) where θ R N is an auxiliary variable, and A I N a R N(L+) N,a [a,a,...,a L ] R L+, b N b R N(L+),b [b,b,...,b L ] R L+, E I N L+ R N(L+) N. This is a standard linear rogramming roblem and can be efficiently solved by numerical otimization softwares, such as cvx in MATLAB [], [2]. Now, we discuss the validity of the relaxation otimization given in (6) or (8). To see this, we extend the notion of the null sace roerty [7] in comressed sensing to our roblem: Definition : A matrix Φ C M N is said to satisfy the null sace roerty for an alhabet X if F(x) < F(x v), (9) for any x X N and any v kerφ\{}. Then we have the following theorem: Theorem : Let Φ C M N. Every x X N is uniquely recovered from the l otimization (6) with y = Φx if and only if Φ satisfies the null sace roerty for X. Proof: ( ): Take any v ker Φ\{} and x X N. Put z x v. Since v kerφ, we have Φv = Φ(v x+x) =, or Φx = Φz. This means that z is in the feasible set of the otimization roblem (6) with y = Φx. Also, we have x z since v. Now, by assumtion, x is the unique solution of (6) with y = Φx, and hence we have F(x) < F(z) = F(x v). ( ): Take any x X N and z C N such that x z and Φx = Φz. Putv x z. Then we havev kerφ\{}. From the null sace roerty for X, we have F(x) < F(x v) = F(z). It follows that x is the unique solution of (6). IV. EXAMPLES In this section, we show two examles to illustrate the effectiveness of the roosed method. The first examle is one-dimensional signal reconstruction with multile symbols. Let the original signal x be a 2- dimensional vector (i.e. N = 2) and the elements are drawn from the following alhabets with robability distributions: X 2 {,} : P() =, P() =, X 3 {,,}: P() =, P() = P( ) = 2, () X 5 { 2,,,,2}: P() =, P( 2) = P( ) = P() = P(2) = 4, where [,]. We assume the measurement vector y is a -dimensional vector (i.e. M = ), and the measurement matrix Φ is generated such that each element is indeendently drawn from the Gaussian distribution with a mean of and a standard deviation of by using a MATLAB command, randn(,2). The original vector x is also generated such that each element is indeendently drawn from the distribution () with varying arameter [, ]. Fig. 2 shows the grahs of the (noise-to-signal ratio) x ˆx 2 / x 2 for X 2,X 3,X 5 in (), where ˆx is the reconstructed signal, with 2 trials of random Φ and x for
4 4 JOURNAL OF L A TEX CLASS FILES, VOL., NO. 4, DECEMBER 22.5 binary symbols symbols Fig. 3. Original image (left) and disturbed image by random noise (right) Fig. 2. Averaged NSR x ˆx 2 / x 2 vs robability for X 2 (to), X 3 (middle), X 5 (bottom), by the roosed (solid) and the basis ursuit (dash) each [,]. If is large (i.e., ), then the original vector x is sarse, and we also reconstruct the original signal by the basis ursuit min z R N z subject to y = Φz, and then round off the values by the basis ursuit to the nearest integer. The error grahs by the basis ursuit are also shown in Fig. 2. For the binary alhabetx 2 = {,}, one may exchange the roles of and before erforming the basis ursuit, and the error curve below =.5 is essimistic. However, such a simle strategy cannot be alied to X 3 and X 5 for the basis ursuit, while the roosed method works well for small. This is because the basis ursuit does not fully utilize the information of the alhabet (i.e., the basis ursuit only uses the information of the value through the sarsity). We also note that the basis ursuit can be used only when the alhabet includes, while the roosed method works as well when is not an element of the alhabet. Fig. 2 also imlies a conjecture that the erformance of the roosed method converges that of the basis ursuit as the size of the alhabet goes to infinity. Next, we see an examle from image rocessing. Let us consider a binary (or black-and-white) image shown in Fig. 3 (left), which is a ixel binary-valued image. We add random Gaussian noise with a mean of and a standard deviation of. to each ixel to obtain a disturbed image as shown in Fig. 3 (right). We reresent this disturbed image as a real-valued matrix X R Then we aly the discrete Fourier transform (DFT) to X to obtain ˆX = WXW () where W is the DFT matrix defined by... ω ω 2... ω K W , ω K ω 2(K )... ω (K )(K ) Fig. 4. Reconstructed images by the basis ursuit (left) and by the roosed method (right) where K = 37 and ω ex( j2π/k). The relation can be equivalently reresented by vec( ˆX) = (W W)vec(X) C 369. We then randomly down-samle the vector vec(ˆx) to obtain a half-sized vectory C 685. The measurement matrixφis then a matrix generated by randomly down-samling row vectors from W W. Fig. 4 shows the reconstructed images by the basis ursuit with rounding off (left) and by the roosed method (right). For the roosed method, we assumed P() = P() = /2. The results clearly show the effectiveness of our method also for image reconstruction. V. CONCLUSION In this letter, we have roosed a reconstruction method for discrete signals based on the sum of absolute values (or the weighted l norm). The reconstruction algorithm is described as linear rogramming, which can be solved effectively by numerical otimization softwares. Examles have been shown that the roosed method is much more effective than the basis ursuit which only uses the information of sarsity. Future work includes an accessible condition that ensures the null sace roerty, as the restricted isometry roerty in comressed sensing. ACKNOWLEDGMENT This research is suorted in art by the JSPS Grant-in-Aid for Scientific Research (C) No , Grant-in-Aid for Scientific Research on Innovative Areas No , and an Okawa Foundation Research Grant.
5 SHELL et al.: BARE DEMO OF IEEETRAN.CLS FOR JOURNALS 5 REFERENCES [] D. L. Donoho, Comressed sensing, IEEE Trans. Inf. Theory, vol. 52, no. 4, , Ar. 26. [2] Y. C. Eldar and G. Kutyniok, Comressed Sensing: Theory and Alications. Cambridge University Press, 22. [3] K. Hayashi, M. Nagahara, and T. Tanaka, A user s guide to comressed sensing for communications systems, IEICE Trans. on Communications, vol. E96-B, no. 3, , Mar. 23. [4] S. S. Chen, D. L. Donoho, and M. A. Saunders, Atomic decomosition by basis ursuit, SIAM J. Sci. Comut., vol. 2, no.,. 33 6, Aug [5] Y. C. Pati, R. Rezaiifar, and P. S. Krishnarasad, Orthogonal matching ursuit: Recursive function aroximation with alications to wavelet decomosition, in Proc. the 27th Annual Asilomar Conf. on Signals, Systems and Comuters, Nov. 993, [6] M. Duarte, M. Davenort, D. Takhar, J. Laska, T. Sun, K. Kelly, and R. Baraniuk, Single-ixel imaging via comressive samling, IEEE Signal Process. Mag., vol. 25, no. 2,. 83 9, Mar. 28. [7] V. Bioglio, G. Coluccia, and E. Magli, Sarse image recovery using comressed sensing over finite alhabets, in Proc. IEEE International Conference on Image Processing (ICIP), Oct. 24. [8] A.-J. van der Veen, S. Talwar, and A. Paulraj, Blind estimation of multile digital signals transmitted over FIR channels, Signal Processing Letters, IEEE, vol. 2, no. 5,. 99 2, May 995. [9] B. Knoo, F. Monsees, C. Bockelmann, D. Peters-Drolshagen, S. Paul, and A. Dekorsy, Comressed sensing K-best detection for sarse multi-user communications, in Proc. 22nd Euroean Signal Processing Conference (EUSIPCO), Se. 24. [] A. Bemorad and M. Morari, Control of systems integrating logic, dynamics, and constraints, Automatica, vol. 35, no. 3, , 999. [] M. Grant and S. Boyd, CVX: Matlab software for discilined convex rogramming, version 2., htt://cvxr.com/cvx, Mar. 24. [2], Grah imlementations for nonsmooth convex rograms, in Recent Advances in Learning and Control, ser. Lecture Notes in Control and Information Sciences, V. Blondel, S. Boyd, and H. Kimura, Eds. Sringer, 28, vol. 37,. 95. [3] Z. Tian, G. Leus, and V. Lottici, Detection of sarse signals under finitealhabet constraints, in Proc. IEEE Int. Conf. Acoust. Seech Signal Process (ICASSP), Ar. 29, [4] J. Ilic and T. Strohmer, Sarsity enhanced decision feedback equalization, IEEE Trans. Signal Process., vol. 6, no. 5, , May 22. [5] S. Sarvotham, D. Baron, and R. G. Baraniuk, Comressed sensing reconstruction via belief roagation, 26. [6] A. K. Das and S. Vishwanath, On finite alhabet comressive sensing, in Proc. IEEE Int. Conf. Acoust. Seech Signal Process (ICASSP), May 23, [7] A. Cohen, W. Dahmen, and R. DeVore, Comressed sensing and best k-term aroximation, J. Amer. Math. Soc., no. 22,. 2 23, 29.
Beyond Worst-Case Reconstruction in Deterministic Compressed Sensing
Beyond Worst-Case Reconstruction in Deterministic Comressed Sensing Sina Jafarour, ember, IEEE, arco F Duarte, ember, IEEE, and Robert Calderbank, Fellow, IEEE Abstract The role of random measurement in
More informationSums of independent random variables
3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where
More informationAKRON: An Algorithm for Approximating Sparse Kernel Reconstruction
: An Algorithm for Aroximating Sarse Kernel Reconstruction Gregory Ditzler Det. of Electrical and Comuter Engineering The University of Arizona Tucson, AZ 8572 USA ditzler@email.arizona.edu Nidhal Carla
More informationCompressed Sensing Based Video Multicast
Comressed Sensing Based Video Multicast Markus B. Schenkel a,b, Chong Luo a, Pascal Frossard b and Feng Wu a a Microsoft Research Asia, Beijing, China b Signal Processing Laboratory (LTS4), EPFL, Lausanne,
More informationTensor-Based Sparsity Order Estimation for Big Data Applications
Tensor-Based Sarsity Order Estimation for Big Data Alications Kefei Liu, Florian Roemer, João Paulo C. L. da Costa, Jie Xiong, Yi-Sheng Yan, Wen-Qin Wang and Giovanni Del Galdo Indiana University School
More informationA Recursive Block Incomplete Factorization. Preconditioner for Adaptive Filtering Problem
Alied Mathematical Sciences, Vol. 7, 03, no. 63, 3-3 HIKARI Ltd, www.m-hiari.com A Recursive Bloc Incomlete Factorization Preconditioner for Adative Filtering Problem Shazia Javed School of Mathematical
More informationON OPTIMIZATION OF THE MEASUREMENT MATRIX FOR COMPRESSIVE SENSING
8th Euroean Signal Processing Conference (EUSIPCO-2) Aalborg, Denmark, August 23-27, 2 ON OPTIMIZATION OF THE MEASUREMENT MATRIX FOR COMPRESSIVE SENSING Vahid Abolghasemi, Saideh Ferdowsi, Bahador Makkiabadi,2,
More informationECE 534 Information Theory - Midterm 2
ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You
More informationA Note on Guaranteed Sparse Recovery via l 1 -Minimization
A Note on Guaranteed Sarse Recovery via l -Minimization Simon Foucart, Université Pierre et Marie Curie Abstract It is roved that every s-sarse vector x C N can be recovered from the measurement vector
More informationElementary Analysis in Q p
Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some
More informationEstimation of the large covariance matrix with two-step monotone missing data
Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo
More informationAnalysis of M/M/n/K Queue with Multiple Priorities
Analysis of M/M/n/K Queue with Multile Priorities Coyright, Sanjay K. Bose For a P-riority system, class P of highest riority Indeendent, Poisson arrival rocesses for each class with i as average arrival
More informationMODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL
Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management
More informationApproximating min-max k-clustering
Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost
More informationDistributed Rule-Based Inference in the Presence of Redundant Information
istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced
More informationAnalysis of some entrance probabilities for killed birth-death processes
Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction
More informationWAVELETS, PROPERTIES OF THE SCALAR FUNCTIONS
U.P.B. Sci. Bull. Series A, Vol. 68, No. 4, 006 WAVELETS, PROPERTIES OF THE SCALAR FUNCTIONS C. PANĂ * Pentru a contrui o undină convenabilă Ψ este necesară şi suficientă o analiză multirezoluţie. Analiza
More information4. Score normalization technical details We now discuss the technical details of the score normalization method.
SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules
More informationOnline homotopy algorithm for a generalization of the LASSO
This article has been acceted for ublication in a future issue of this journal, but has not been fully edited. Content may change rior to final ublication. Online homotoy algorithm for a generalization
More informationCombining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)
Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment
More informationTopic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar
15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider
More informationPARTIAL FACE RECOGNITION: A SPARSE REPRESENTATION-BASED APPROACH. Luoluo Liu, Trac D. Tran, and Sang Peter Chin
PARTIAL FACE RECOGNITION: A SPARSE REPRESENTATION-BASED APPROACH Luoluo Liu, Trac D. Tran, and Sang Peter Chin Det. of Electrical and Comuter Engineering, Johns Hokins Univ., Baltimore, MD 21218, USA {lliu69,trac,schin11}@jhu.edu
More informationMinimax Design of Nonnegative Finite Impulse Response Filters
Minimax Design of Nonnegative Finite Imulse Resonse Filters Xiaoing Lai, Anke Xue Institute of Information and Control Hangzhou Dianzi University Hangzhou, 3118 China e-mail: laix@hdu.edu.cn; akxue@hdu.edu.cn
More informationIntroduction to Probability and Statistics
Introduction to Probability and Statistics Chater 8 Ammar M. Sarhan, asarhan@mathstat.dal.ca Deartment of Mathematics and Statistics, Dalhousie University Fall Semester 28 Chater 8 Tests of Hyotheses Based
More informationOptimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment
Neutrosohic Sets and Systems Vol 14 016 93 University of New Mexico Otimal Design of Truss Structures Using a Neutrosohic Number Otimization Model under an Indeterminate Environment Wenzhong Jiang & Jun
More informationRecursive Estimation of the Preisach Density function for a Smart Actuator
Recursive Estimation of the Preisach Density function for a Smart Actuator Ram V. Iyer Deartment of Mathematics and Statistics, Texas Tech University, Lubbock, TX 7949-142. ABSTRACT The Preisach oerator
More information1 Probability Spaces and Random Variables
1 Probability Saces and Random Variables 1.1 Probability saces Ω: samle sace consisting of elementary events (or samle oints). F : the set of events P: robability 1.2 Kolmogorov s axioms Definition 1.2.1
More informationAn Investigation on the Numerical Ill-conditioning of Hybrid State Estimators
An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical
More informationGeneral Linear Model Introduction, Classes of Linear models and Estimation
Stat 740 General Linear Model Introduction, Classes of Linear models and Estimation An aim of scientific enquiry: To describe or to discover relationshis among events (variables) in the controlled (laboratory)
More informationBest approximation by linear combinations of characteristic functions of half-spaces
Best aroximation by linear combinations of characteristic functions of half-saces Paul C. Kainen Deartment of Mathematics Georgetown University Washington, D.C. 20057-1233, USA Věra Kůrková Institute of
More informationA MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION
O P E R A T I O N S R E S E A R C H A N D D E C I S I O N S No. 27 DOI:.5277/ord73 Nasrullah KHAN Muhammad ASLAM 2 Kyung-Jun KIM 3 Chi-Hyuck JUN 4 A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST
More informationVarious Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems
Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various
More informationAdditive results for the generalized Drazin inverse in a Banach algebra
Additive results for the generalized Drazin inverse in a Banach algebra Dragana S. Cvetković-Ilić Dragan S. Djordjević and Yimin Wei* Abstract In this aer we investigate additive roerties of the generalized
More informationLinear diophantine equations for discrete tomography
Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,
More informationSome Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., DECEMBER 4 336 Some Unitary Sace Time Codes From Shere Packing Theory With Otimal Diversity Product of Code Size Haiquan Wang, Genyuan Wang, and Xiang-Gen
More informationInteractive Hypothesis Testing Against Independence
013 IEEE International Symosium on Information Theory Interactive Hyothesis Testing Against Indeendence Yu Xiang and Young-Han Kim Deartment of Electrical and Comuter Engineering University of California,
More informationTowards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK
Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)
More informationKhinchine inequality for slightly dependent random variables
arxiv:170808095v1 [mathpr] 7 Aug 017 Khinchine inequality for slightly deendent random variables Susanna Sektor Abstract We rove a Khintchine tye inequality under the assumtion that the sum of Rademacher
More informationSampling and Distortion Tradeoffs for Bandlimited Periodic Signals
Samling and Distortion radeoffs for Bandlimited Periodic Signals Elaheh ohammadi and Farokh arvasti Advanced Communications Research Institute ACRI Deartment of Electrical Engineering Sharif University
More informationSTABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS
STABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS Massimo Vaccarini Sauro Longhi M. Reza Katebi D.I.I.G.A., Università Politecnica delle Marche, Ancona, Italy
More informationA Public-Key Cryptosystem Based on Lucas Sequences
Palestine Journal of Mathematics Vol. 1(2) (2012), 148 152 Palestine Polytechnic University-PPU 2012 A Public-Key Crytosystem Based on Lucas Sequences Lhoussain El Fadil Communicated by Ayman Badawi MSC2010
More informationConvex Optimization methods for Computing Channel Capacity
Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem
More informationCorrespondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R.
1 Corresondence Between Fractal-Wavelet Transforms and Iterated Function Systems With Grey Level Mas F. Mendivil and E.R. Vrscay Deartment of Alied Mathematics Faculty of Mathematics University of Waterloo
More informationDistributed K-means over Compressed Binary Data
1 Distributed K-means over Comressed Binary Data Elsa DUPRAZ Telecom Bretagne; UMR CNRS 6285 Lab-STICC, Brest, France arxiv:1701.03403v1 [cs.it] 12 Jan 2017 Abstract We consider a networ of binary-valued
More informationAsymptotically Optimal Simulation Allocation under Dependent Sampling
Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee
More informationResearch Article An Improved Proportionate Normalized Least-Mean-Square Algorithm for Broadband Multipath Channel Estimation
e Scientific World Journal, Article ID 72969, 9 ages htt://dx.doi.org/1.11/214/72969 Research Article An Imroved Proortionate Normalized Least-Mean-Square Algorithm for Broadband Multiath Channel Estimation
More informationGeneralized Coiflets: A New Family of Orthonormal Wavelets
Generalized Coiflets A New Family of Orthonormal Wavelets Dong Wei, Alan C Bovik, and Brian L Evans Laboratory for Image and Video Engineering Deartment of Electrical and Comuter Engineering The University
More informationA Unified Framework for GLRT-Based Spectrum Sensing of Signals with Covariance Matrices with Known Eigenvalue Multiplicities
A Unified Framework for GLRT-Based Sectrum Sensing of Signals with Covariance Matrices with Known Eigenvalue Multilicities Erik Axell and Erik G. Larsson Linköing University Post Print N.B.: When citing
More informationCHAPTER 5 STATISTICAL INFERENCE. 1.0 Hypothesis Testing. 2.0 Decision Errors. 3.0 How a Hypothesis is Tested. 4.0 Test for Goodness of Fit
Chater 5 Statistical Inference 69 CHAPTER 5 STATISTICAL INFERENCE.0 Hyothesis Testing.0 Decision Errors 3.0 How a Hyothesis is Tested 4.0 Test for Goodness of Fit 5.0 Inferences about Two Means It ain't
More informationAmin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE)
KAUST Reository Outage erformance of cognitive radio systems with Imroer Gaussian signaling Item tye Authors Erint version DOI Publisher Journal Rights Conference Paer Amin Osama; Abediseid Walid; Alouini
More informationExtremal Polynomials with Varying Measures
International Mathematical Forum, 2, 2007, no. 39, 1927-1934 Extremal Polynomials with Varying Measures Rabah Khaldi Deartment of Mathematics, Annaba University B.P. 12, 23000 Annaba, Algeria rkhadi@yahoo.fr
More informationImprovement on the Decay of Crossing Numbers
Grahs and Combinatorics 2013) 29:365 371 DOI 10.1007/s00373-012-1137-3 ORIGINAL PAPER Imrovement on the Decay of Crossing Numbers Jakub Černý Jan Kynčl Géza Tóth Received: 24 Aril 2007 / Revised: 1 November
More informationUniform Law on the Unit Sphere of a Banach Space
Uniform Law on the Unit Shere of a Banach Sace by Bernard Beauzamy Société de Calcul Mathématique SA Faubourg Saint Honoré 75008 Paris France Setember 008 Abstract We investigate the construction of a
More informationNotes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle
McMaster University Advanced Otimization Laboratory Title: Notes on duality in second order and -order cone otimization Author: Erling D. Andersen, Cornelis Roos and Tamás Terlaky AdvOl-Reort No. 000/8
More informationInequalities for the L 1 Deviation of the Empirical Distribution
Inequalities for the L 1 Deviation of the Emirical Distribution Tsachy Weissman, Erik Ordentlich, Gadiel Seroussi, Sergio Verdu, Marcelo J. Weinberger June 13, 2003 Abstract We derive bounds on the robability
More informationIMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES
IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES OHAD GILADI AND ASSAF NAOR Abstract. It is shown that if (, ) is a Banach sace with Rademacher tye 1 then for every n N there exists
More informationRobust Beamforming via Matrix Completion
Robust Beamforming via Matrix Comletion Shunqiao Sun and Athina P. Petroulu Deartment of Electrical and Comuter Engineering Rutgers, the State University of Ne Jersey Piscataay, Ne Jersey 8854-858 Email:
More informationq-ary Symmetric Channel for Large q
List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu
More informationNovel Algorithm for Sparse Solutions to Linear Inverse. Problems with Multiple Measurements
Novel Algorithm for Sarse Solutions to Linear Inverse Problems with Multile Measurements Lianlin Li, Fang Li Institute of Electronics, Chinese Acaemy of Sciences, Beijing, China Lianlinli1980@gmail.com
More informationFinding a sparse vector in a subspace: linear sparsity using alternating directions
IEEE TRANSACTION ON INFORMATION THEORY VOL XX NO XX 06 Finding a sarse vector in a subsace: linear sarsity using alternating directions Qing Qu Student Member IEEE Ju Sun Student Member IEEE and John Wright
More informationOn the capacity of the general trapdoor channel with feedback
On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:
More informationFeedback-error control
Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller
More informationRobust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System
Vol.7, No.7 (4),.37-38 htt://dx.doi.org/.457/ica.4.7.7.3 Robust Predictive Control of Inut Constraints and Interference Suression for Semi-Trailer System Zhao, Yang Electronic and Information Technology
More informationThe inverse Goldbach problem
1 The inverse Goldbach roblem by Christian Elsholtz Submission Setember 7, 2000 (this version includes galley corrections). Aeared in Mathematika 2001. Abstract We imrove the uer and lower bounds of the
More informationarxiv: v1 [physics.data-an] 26 Oct 2012
Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch
More informationAN ALGORITHM FOR MATRIX EXTENSION AND WAVELET CONSTRUCTION W. LAWTON, S. L. LEE AND ZUOWEI SHEN Abstract. This paper gives a practical method of exten
AN ALGORITHM FOR MATRIX EXTENSION AND WAVELET ONSTRUTION W. LAWTON, S. L. LEE AND ZUOWEI SHEN Abstract. This aer gives a ractical method of extending an nr matrix P (z), r n, with Laurent olynomial entries
More informationOutline. Markov Chains and Markov Models. Outline. Markov Chains. Markov Chains Definitions Huizhen Yu
and Markov Models Huizhen Yu janey.yu@cs.helsinki.fi Det. Comuter Science, Univ. of Helsinki Some Proerties of Probabilistic Models, Sring, 200 Huizhen Yu (U.H.) and Markov Models Jan. 2 / 32 Huizhen Yu
More informationResearch Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces
Abstract and Alied Analysis Volume 2012, Article ID 264103, 11 ages doi:10.1155/2012/264103 Research Article An iterative Algorithm for Hemicontractive Maings in Banach Saces Youli Yu, 1 Zhitao Wu, 2 and
More informationResearch Article An Iterative Algorithm for the Reflexive Solution of the General Coupled Matrix Equations
he Scientific World Journal Volume 013 Article ID 95974 15 ages htt://dxdoiorg/101155/013/95974 Research Article An Iterative Algorithm for the Reflexive Solution of the General Couled Matrix Euations
More informationElements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley
Elements of Asymtotic Theory James L. Powell Deartment of Economics University of California, Berkeley Objectives of Asymtotic Theory While exact results are available for, say, the distribution of the
More informationAnalyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems
Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Hsiao-Lan Chiang, Tobias Kadur, and Gerhard Fettweis Vodafone Chair for Mobile Communications Technische Universität
More informationOn Z p -norms of random vectors
On Z -norms of random vectors Rafa l Lata la Abstract To any n-dimensional random vector X we may associate its L -centroid body Z X and the corresonding norm. We formulate a conjecture concerning the
More informationSupplementary Materials for Robust Estimation of the False Discovery Rate
Sulementary Materials for Robust Estimation of the False Discovery Rate Stan Pounds and Cheng Cheng This sulemental contains roofs regarding theoretical roerties of the roosed method (Section S1), rovides
More informationETNA Kent State University
Electronic Transactions on Numerical Analysis. Volume 9,. 29-36, 25. Coyright 25,. ISSN 68-963. ETNA ASYMPTOTICS FOR EXTREMAL POLYNOMIALS WITH VARYING MEASURES M. BELLO HERNÁNDEZ AND J. MíNGUEZ CENICEROS
More informationSCHUR m-power CONVEXITY OF GEOMETRIC BONFERRONI MEAN
ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS N. 38 207 (769 776 769 SCHUR m-power CONVEXITY OF GEOMETRIC BONFERRONI MEAN Huan-Nan Shi Deartment of Mathematics Longyan University Longyan Fujian 36402
More informationThe analysis and representation of random signals
The analysis and reresentation of random signals Bruno TOÉSNI Bruno.Torresani@cmi.univ-mrs.fr B. Torrésani LTP Université de Provence.1/30 Outline 1. andom signals Introduction The Karhunen-Loève Basis
More informationThe Arm Prime Factors Decomposition
The Arm Prime Factors Decomosition Arm Boris Nima arm.boris@gmail.com Abstract We introduce the Arm rime factors decomosition which is the equivalent of the Taylor formula for decomosition of integers
More informationNear Ideal Behavior of a Modified Elastic Net Algorithm in Compressed Sensing
Near Ideal Behavior of a Modified Elastic Net Algorithm in Compressed Sensing M. Vidyasagar Cecil & Ida Green Chair The University of Texas at Dallas M.Vidyasagar@utdallas.edu www.utdallas.edu/ m.vidyasagar
More informationGreediness of higher rank Haar wavelet bases in L p w(r) spaces
Stud. Univ. Babeş-Bolyai Math. 59(2014), No. 2, 213 219 Greediness of higher rank Haar avelet bases in L (R) saces Ekaterine Kaanadze Abstract. We rove that higher rank Haar avelet systems are greedy in
More informationFor q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i
Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:
More informationE-companion to A risk- and ambiguity-averse extension of the max-min newsvendor order formula
e-comanion to Han Du and Zuluaga: Etension of Scarf s ma-min order formula ec E-comanion to A risk- and ambiguity-averse etension of the ma-min newsvendor order formula Qiaoming Han School of Mathematics
More informationCOMMUNICATION BETWEEN SHAREHOLDERS 1
COMMUNICATION BTWN SHARHOLDRS 1 A B. O A : A D Lemma B.1. U to µ Z r 2 σ2 Z + σ2 X 2r ω 2 an additive constant that does not deend on a or θ, the agents ayoffs can be written as: 2r rθa ω2 + θ µ Y rcov
More informationChater Matrix Norms and Singular Value Decomosition Introduction In this lecture, we introduce the notion of a norm for matrices The singular value de
Lectures on Dynamic Systems and Control Mohammed Dahleh Munther A Dahleh George Verghese Deartment of Electrical Engineering and Comuter Science Massachuasetts Institute of Technology c Chater Matrix Norms
More informationKeywords: Vocal Tract; Lattice model; Reflection coefficients; Linear Prediction; Levinson algorithm.
Volume 3, Issue 6, June 213 ISSN: 2277 128X International Journal of Advanced Research in Comuter Science and Software Engineering Research Paer Available online at: www.ijarcsse.com Lattice Filter Model
More informationAn Analysis of Reliable Classifiers through ROC Isometrics
An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit
More informationON UNIFORM BOUNDEDNESS OF DYADIC AVERAGING OPERATORS IN SPACES OF HARDY-SOBOLEV TYPE. 1. Introduction
ON UNIFORM BOUNDEDNESS OF DYADIC AVERAGING OPERATORS IN SPACES OF HARDY-SOBOLEV TYPE GUSTAVO GARRIGÓS ANDREAS SEEGER TINO ULLRICH Abstract We give an alternative roof and a wavelet analog of recent results
More informationInformation collection on a graph
Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements
More informationSolved Problems. (a) (b) (c) Figure P4.1 Simple Classification Problems First we draw a line between each set of dark and light data points.
Solved Problems Solved Problems P Solve the three simle classification roblems shown in Figure P by drawing a decision boundary Find weight and bias values that result in single-neuron ercetrons with the
More informationOn Isoperimetric Functions of Probability Measures Having Log-Concave Densities with Respect to the Standard Normal Law
On Isoerimetric Functions of Probability Measures Having Log-Concave Densities with Resect to the Standard Normal Law Sergey G. Bobkov Abstract Isoerimetric inequalities are discussed for one-dimensional
More informationALTERNATIVE SOLUTION TO THE QUARTIC EQUATION by Farid A. Chouery 1, P.E. 2006, All rights reserved
ALTERNATIVE SOLUTION TO THE QUARTIC EQUATION b Farid A. Chouer, P.E. 006, All rights reserved Abstract A new method to obtain a closed form solution of the fourth order olnomial equation is roosed in this
More information1 Riesz Potential and Enbeddings Theorems
Riesz Potential and Enbeddings Theorems Given 0 < < and a function u L loc R, the Riesz otential of u is defined by u y I u x := R x y dy, x R We begin by finding an exonent such that I u L R c u L R for
More informationModel checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle]
Chater 5 Model checking, verification of CTL One must verify or exel... doubts, and convert them into the certainty of YES or NO. [Thomas Carlyle] 5. The verification setting Page 66 We introduce linear
More informations v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4
Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work
More informationSome Results on the Generalized Gaussian Distribution
Some Results on the Generalized Gaussian Distribution Alex Dytso, Ronit Bustin, H. Vincent Poor, Daniela Tuninetti 3, Natasha Devroye 3, and Shlomo Shamai (Shitz) Abstract The aer considers information-theoretic
More informationThe Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule
The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca
More informationLecture 6. 2 Recurrence/transience, harmonic functions and martingales
Lecture 6 Classification of states We have shown that all states of an irreducible countable state Markov chain must of the same tye. This gives rise to the following classification. Definition. [Classification
More informationOn the Chvatál-Complexity of Knapsack Problems
R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew
More informationarxiv: v1 [math.nt] 4 Nov 2015
Wall s Conjecture and the ABC Conjecture George Grell, Wayne Peng August 0, 018 arxiv:1511.0110v1 [math.nt] 4 Nov 015 Abstract We show that the abc conjecture of Masser-Oesterlé-Sziro for number fields
More informationc Copyright by Helen J. Elwood December, 2011
c Coyright by Helen J. Elwood December, 2011 CONSTRUCTING COMPLEX EQUIANGULAR PARSEVAL FRAMES A Dissertation Presented to the Faculty of the Deartment of Mathematics University of Houston In Partial Fulfillment
More information1-way quantum finite automata: strengths, weaknesses and generalizations
1-way quantum finite automata: strengths, weaknesses and generalizations arxiv:quant-h/9802062v3 30 Se 1998 Andris Ambainis UC Berkeley Abstract Rūsiņš Freivalds University of Latvia We study 1-way quantum
More information