Gradient Based Iterative Algorithms for Solving a Class of Matrix Equations
|
|
- Tyrone Norton
- 5 years ago
- Views:
Transcription
1 1216 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 50, NO. 8, AUGUST 2005 Exanding (A3)gives M 0 8 T +1 T +18 =( T ) F = I (A4) g = 0F 8 T +1 =( T ) f = T T +18 F 8 T +1 =( T ) 2 : (A5) (A6) Now, using the well-nown matrix result [A + BCD] 01 = A 01 0 A 01 B[DA 01 B + C 01 ] 01 DA 01 [10], F in (A4)can be comuted as F = M 0 8 T +1 T +18 =( T ) = M 01 M T +1 T +18 M 01 T T +18 M 01 8 T : (A7) +1 According to the definition of R in (16), it is obvious that Finally, substituting for M that R = I 0 8 M R +1 = I M T +1: (A8) from (A2) and (A5) (A7), and noting 8 T, roduces the required result R +1 = R 0 R +1 T +1R T T +1R +1 R 0 = I; =0; 1;...;n0 1 : (A9) REFERENCES [1] R. Haber and H. Unbehauen, Structure identification of nonlinear dynamic systems A survey on inut/outut aroaches, Automatica, vol. 26, , [2] S. Chen, S. A. Billings, and W. Luo, Orthogonal least squares methods and their alication to nonlinear system identification, Int. J. Control, vol. 50, , [3] S. Chen, C. F. N. Cowan, and P. M. Grant, Orthogonal least squares learning algorithm for radial basis function networs, IEEE Trans. Neural Networs, vol. 2, no. 2, , Mar [4] C. Drioli and D. Rocchesso, Orthogonal least squares algorithm for the aroximation of a ma and its derivatives with a RBF networ, Signal Process., vol. 83, , [5] D. S. Huang and W. Zhao, Determining the centers of radial basis robabilities neural networs by recursive orthogonal least square algorithms, Al. Math. Comut., vol. 162, , [6] S. Chen and J. Wigger, Fast orthogonal least squares algorithm for efficient subset model selection, IEEE Trans. Signal Process., vol. 43, no. 7, , Jul [7] Q. M. Zhu and S. A. Billings, Fast orthogonal identification of nonlinear stochastic models and radial basis function neural networs, Int. J. Control, vol. 64, , [8] K. Z. Mao, Fast orthogonal forward selection algorithm for feature subset selection, IEEE Trans. Neural Networs, vol. 13, no. 5, , Se [9] L. Lawson and R. J. Hanson, Solving Least Squares Problem. Englewood Cliffs, NJ: Prentice-Hall, [10] L. Ljung, System Identification: Theory for the User. Englewood Cliffs, N.J.: Prentice-Hall, B. Proof of Proosition 2 a)equation (18)follows directly from the definition of R. b)setting = j in (19), and using roerty (18), the result is obvious. Now, setting = j +1in (19)and using (17), it follows that R = R j+1 = R j 0 R j j+1 T j+1r T j T j+1 R j j+1 : (A10) If both sides of (A10)are now multilied by R j, then R R j = R j+1r j = R jr j 0 R j j+1 T j+1r T j T j+1 R j j+1 R j (A11) which, from (17)and (18), gives R j+1 R j = R j+1 : (A12) Similarly, it can be roved that R j R j+1 = R j+1. This rocess can be reeated for all i>jto confirm the results in (19). c)in (20), setting = i and substituting from (17)and (18), it follows that R i i = R i01 i 0 R i01 i T i R T i01 i T i R i01 i = R i01 i 0 R i01 i =0: (A13) Reeating this for i +1and using (A13)gives R i+1 i = R i i 0 R i i+1 T i+1r T i i T i+1r i i+1 = 0R i i+1 T i+1r i i T i+1r i i+1 =0: (A14) This rocess can be continued for all >ito confirm that (20)is indeed true. Gradient Based Iterative Algorithms for Solving a Class of Matrix Equations Feng Ding and Tongwen Chen Abstract In this note, we aly a hierarchical identification rincile to study solving the Sylvester and Lyaunov matrix equations. In our aroach, we regard the unnown matrix to be solved as system arameters to be identified, and resent a gradient iterative algorithm for solving the equations by minimizing certain criterion functions. We rove that the iterative solution consistently converges to the true solution for any initial value, and illustrate that the rate of convergence of the iterative solution can be enhanced by choosing the convergence factor (or ste-size) aroriately. Furthermore, the iterative method is extended to solve general linear matrix equations. The algorithms roosed require less storage caacity than the existing numerical ones. Finally, the algorithms are tested on comuter and the results verify the theoretical findings. Index Terms Gauss Seidel iteration, gradient search, hierarchical identification rincile, identification, Jacobi iteration, Lyaunov matrix equation, arameter estimation, Sylvester matrix equation. Manuscrit received July 11, 2003; revised Aril 24, Recommended by Associate Editor S.-I. Niculescu. This wor was suorted by the Natural Sciences and Engineering Research Council of Canada. F. Ding is with the Control Science and Engineering Research Center, Southern Yangtze University, Wuxi , China, and also with the University of Alberta, Edmonton, AB T6G 2V4, Canada ( fding@sytu.edu.cn; fding@ece.ualberta.ca). T. Chen is with the Deartment of Electrical and Comuter Engineering, University of Alberta, Edmonton, AB T6G 2V4, Canada ( tchen@ece.ualberta.ca). Digital Object Identifier /TAC /$ IEEE
2 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 50, NO. 8, AUGUST I. INTRODUCTION Consider linear matrix equations, nown as Sylvester equations, of the form AX + XB = C and AXB + X = C where X 2 m2n is an unnown matrix, A; B, and C are constant (coefficient)matrices of aroriate dimensions. Such equations arise in many alications in systems and control, e.g., when B = A T, the equations reduce to the so-called Lyaunov equations, which are often encountered in continuous- and discrete-time stability analysis. Traditional methods convert such equations into an equivalent one of the form: Ax = b. Here, the vector x has mn unnowns consisting of elements of X; A is an mn 2 mn matrix in the Kronecer roduct form [2]. However, the dimensions of the associated matrix (A) are high when m and n are large, e.g., if m = n = 100, the dimension of A is Such a dimensionality roblem leads to comutational difficulty in that excessive comuter memory is required for comutation and inversion of large matrices. Alternative ways exist which transform the matrix equations into forms for which solutions may be readily comuted. Some numerical methods to solve the matrix equations are based on the reliminary matrix transformations to Jordan canonical form [11], comanion-tye form [3], Hessenberg Schur form [9]. However, these methods require first comuting the desired matrix transformation; moreover, they are not suitable for a general matrix equation of the form A1XB1 + A2XB A XB = C (1) which will also be studied in this note. In the field of linear algebra, iterative algorithms for sets of linear equations, such as Jacobi and Gauss Seidel iterations [10], have received secial attention [4], [8], [10], [16]. For examle, Stare and Niethammer studied an iterative bloc successive overrelaxation (SOR) method for the solution of the Sylvester matrix equation [17]. Recently, Jonsson and Kågström roosed recursive bloc algorithms for solving generalized Sylvester and Lyaunov matrix equations [12], [13]; Styel discussed numerical solution for generalized Lyaunov equations [18]. Also, Benner and Quintana Ortí resented an iterative algorithm for solving stable generalized Lyaunov equations using matrix sign functions; but the main drawbac is that their algorithm requires comuting matrix inversion at each iteration [1]. Recently, the authors derived the iterative least squares solutions of couled matrix equations [5]. To the best of our nowledge, iterative algorithms for Sylvester and Lyaunov matrix equations have not been fully investigated, esecially the iterative solutions of general matrix equations of the form in (1)and the convergence of the iterative solutions involved, which are the focus of this wor. Our methods will generate solutions to the matrix equations which are arbitrarily close to the exact solutions. Although exact solutions are imortant, for many alications such as stability analysis, it is often not necessary to comute exact solutions and aroximate solutions are sufficient. Also, if the arameters in the system matrices are uncertain, it is not ossible to obtain the exact solution for robust stability results [8], [14] [16]. In this note, the roblem will be tacled in a new way by alying the so-called hierarchical identification rincile [6], [7]. We decomose a system into some subsystems, and then the unnown arameters of each subsystem are identified successively. Here, we regard the unnown matrix X as the arameters (arameter matrix)of a system to be identified, and roose ways of decomosing the system equations, leading to gradient based iterative algorithms for solutions of the matrix equations involved. This note is organized as follows. In Sections II IV, we derive iterative algorithms for the matrix equations, AX+XB = C; AXB+X = C and (1), resectively, and study convergence roerties of the algorithms. In Section V, we resent three examles to illustrate the effectiveness of the algorithms roosed in this wor. Finally, we offer some concluding remars in Section VI. II. EQUATION AX + XB = C In this section, we aly the hierarchical identification rincile to solve the Sylvester matrix equation AX + XB = C (2) where A 2 m2m ;B 2 n2n, and C 2 m2n are given constant matrices, X 2 m2n is the unnown matrix to be solved. For a square matrix M; i[m ] reresents the ith eigenvalue of M. The notation I n is the identity matrix of n 2 n. For two matrices M and N; M N is their Kronecer roduct. For an m 2 n, matrix X =[x1 x2 111 x n ] 2 m2n col[x] is an mn-dimensional vector formed by columns of X, i.e., col[x] =[x T 1 x T 2... x T n ] T. The following result is well nown. Lemma 1: Equation (2)has a unique solution if and only if i[a]+ j [B] 6= 0for any i and j; in this case, the unique solution is given by col[x] =[(I n A) +(B T I m )] 01 col[c] (3) and the corresonding homogeneous equation AX + XB = 0 has a unique solution X =0. In articular, if B = A T, (2)reduces to the continuous-time Lyaunov matrix equation; and the necessary and sufficient condition for the existence of a unique solution is that i [A] + j [A] 6= 0for any i and j. According to the hierarchical identification rincile, the system in (2)is decomosed into two subsystems, and then based on least squares otimization, the arameters of each subsystems are identified, resectively. In this way we obtain the iterative algorithm. The details are as follows. Define two matrices b1 := C 0 XB and b2 := C 0 AX: (4) Then, from (2), we obtain two fictitious subsystems AX = b1 and XB = b2: (5) For these two subsystems in (5), we form two criterion functions J1(X) :=AX 0 b1 2 and J2(X) :=XB 0 b2 2 where the norm of the matrix X is defined by X 2 =tr[xx T ]. Let X1() and X2() be the estimates or iterative solutions of X at iteration, associated with the subsystems in (5), resectively. Minimizing J1(X) and J2(X) or using Lemma 1 in [5] leads to the following recursive equations: X1() =X1( 0 1) + A T [b1 0 AX1( 0 1)] (6) X2() =X2( 0 1) + [b2 0 X2( 0 1)B]B T : (7)
3 1218 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 50, NO. 8, AUGUST 2005 Here, is called the iterative ste-size or convergence factor, which can be simly taen to be = f max[aa T ]+ max[b T B]g 01 (8) where max indicates the maximum eigenvalue. Substituting (4)into (6)and (7)gives X 1() =X 1( 0 1) + A T [C 0 AX 1( 0 1) 0 XB] (9) X 2 () =X 2 ( 0 1) + [C 0 AX 0 X 2 ( 0 1)B]B T : (10) Here, a difficulty arises in that the exressions on the right-hand sides of (9)and (10)contain the unnown matrix X; so it is imossible to realize the algorithm in (9)and (10). Our solution is based on the hierarchical identification rincile: The unnown variable X in (9)and (10)is relaced with its estimate at time ( 0 1). Hence, we have X 1 () =X 1 ( 0 1) + A T [C 0 AX 1 ( 0 1) 0 X 1 ( 0 1)B] (11) X 2 () =X 2 ( 0 1) + [C 0 AX 2 ( 0 1) 0 X 2 ( 0 1)B]B T : (12) In fact, we need only an iterative solution X() rather than two solutions X 1 () and X 2 (). Taing the average of X 1 () and X 2 (),we obtain a gradient iterative (GI)algorithm X() =[X 1 ()+X 2 ()]=2 (13) X 1() =X( 0 1) + A T [C 0 AX( 0 1) 0 X( 0 1)B] (14) X 2 () =X( 0 1) + [C 0 AX( 0 1) 0 X( 0 1)B]B T : (15) To initialize the algorithm, we tae X(0) = 0 or some small real matrix, e.g., X(0) = m2n with 1 m2n being an m 2 n matrix whose elements are 1. If the aroach in [2] is used to solve (2), the number of storage elements required is mn(mn +1), which is much larger than (m + n) 2 +1, the number of storage elements required by the GI algorithm in (13) (15); e.g., when m = n = 100, the two numbers are and 401, resectively. A comarable iterative algorithm is the Benner and Quintana Ortí (B Q)algorithm, which requires comuting matrix inversion at each iteration [1]. However, the GI algorithm does not involve matrix inversion and thus has less comutational burden than the B Q algorithm; see Examle 3. Theorem 1: If the Sylvester equation in (2)has a unique solution X, then the iterative solution X() given by the algorithm in (13) (15) converges to X, i.e., lim!1 X() = X; or, the error X() 0 X converges to zero for any initial value X(0). Proof: Define the error matrices and ~X 1() :=X 1() 0 X X ~ 2() :=X 2() 0 X ~X() :=X() 0 X: (16) () :=A ~ X( 0 1) () := ~ X( 0 1)B: (17) Using (2) and (13) (15), it is not difficult to get ~X 1 () = X( ~ 0 1) + A T [0A X( ~ 0 1) 0 X( ~ 0 1)B] = X( ~ 0 1) + A T [0() 0 ()] (18) ~X 2 () = X( ~ 0 1) + [0A X( ~ 0 1) 0 X( ~ 0 1)B]B T = ~ X( 0 1) + [0() 0 ()]B T : (19) Taing the norm of both sides of (18)and (19), and using (17)give X ~ 1 () 2 = X( ~ 0 1) 2 +2trf X ~ T ( 0 1)A T [0() 0 ()]g + 2 A T [0() 0 ()] 2 X( ~ 0 1) 2 +2trf T ()[0() 0 ()]g + 2 max [AA T ]() +() 2 (20) X ~ 2() 2 X( ~ 0 1) 2 +2trf[0() 0 ()] T ()g + 2 max [B T B]() +() 2 : (21) Hence, from (16)and using (20)and (21), we have X() ~ 2 =[ X ~ 1 ()+ X ~ 2 () 2 ]=4 [ X ~ 1 () 2 + X ~ 2 () 2 ]=2 X( ~ 0 1) 2 0 () +() f max[aa T ] + max [B T B]g() +() 2 = ~ X( 0 1) f2 0 ( max[aa T ] + max [B T B])g() +() 2 ~ X(0) f2 0 ( max[aa T ] + max [B T B])g i=1 If the convergence factor is chosen to satisfy then we have (i) +(i) 2 : 0 <<2f max [AA T ]+ max [B T B]g 01 1 =1 ()+() 2 < 1: This imlies that as!1;() +()! 0, ora ~ X( 0 1) + ~X( 0 1)B! 0. According to Lemma 1, ~ X( 0 1)! 0 as!1. This roves Theorem 1. The algorithm (11)or (12)is nown as the single-side iteration, which can not guarantee that X i () converges to X; and (13) (15) give the balanced iterative algorithm, which can simly be written as X() =X( 0 1) + A T [C 0 AX( 0 1) 0 X( 0 1)B]=2 + [C 0 AX( 0 1) 0 X( 0 1)B]B T =2 (22) = f max [AA T ]+ max [B T B]g 01 or = fa 2 + B 2 g 01 (23) whose convergence is guaranteed. Of course, it is easier to comute the trace than the maximum eigenvalue. Even the convergence factor in (23)may not be the best and may be conservative. In fact, there exists a best such that the fast convergence rate of X() to X may be obtained; see Examle 1. Next, we show that the convergence rate of the iterative algorithm in (22) (23) deends on the condition number of the associated system, just lie the Jacobi and Gauss-Seidel iterations for linear systems of the form Ax = b [10]. From (18), (19), and (16), we may get an error equation col[ X()] ~ = [I mn 0 8]col[ X( ~ 0 1)] 8:=I n (A T A)+B T A T + B A +(BB T ) I m : From here, the closer the eigenvalues of 8 are to 1, the closer the eigenvalues of I mn 0 8 tend to zero, and hence, the faster the error
4 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 50, NO. 8, AUGUST col[ ~ X()] or ~ X() converges to zero. In other words, the algorithm in (22)and (23)has a fast convergence rate for small condition numbers of 8; see Examle 2. TABLE I ITERATIVE SOLUTION ( =1 5) III. EQUATION AXB + X = C In this section, we study the solution to the following matrix equation: AXB + X = C (24) where A m2m 2 ;B 2 n2n and C 2 m2n are given constant matrices, X 2 m2n is the unnown matrix to be solved. In articular, if A = B T, (24)is the discrete-time Lyaunov matrix equation. Moreover, if B in (24)is nonsingular, ost-multilying (24)by B 01 yields an equation of the form in (2). Unfortunately, a simle iterative algorithm X() =C 0 AX( 0 1)B cannot guarantee that X() converges to X. Lemma 2: The equation in (24)has a unique solution if and only if i [A] j [B] 6= 01 for any i and j; in this case the unique solution is given by col[x] =[(B T A) +I mn ] 01 col[c] and the corresonding homogeneous equation AXB + X = 0 also has a unique solution X =0. For the equation in (24), we resent the gradient iterative algorithm to comute the solution X X() =[X 1()+X 2()]=2 (25) X 1 () =X( 0 1) + A T [C 0 AX( 0 1)B 0 X( 0 1)]B T (26) X 2 () =X( 0 1) + [C 0 AX( 0 1)B 0 X( 0 1)] (27) = f max [AA T ] max [B T B]+1g 01 or =[A 2 B 2 +1] 01 : (28) The following result discuss the convergence of this algorithm. Theorem 2: If the matrix equation in (24)has a unique solution X, then the iterative solution X() given by the algorithm in (25) (28) converges to the solution X, i.e., lim!1 X() =X. A similar derivation as in Theorem 1 will lead to the result of Theorem 2, hence, it is omitted here. IV. EQUATION A j XB j = C In this section, we will extend the iterative method to solution of a more general matrix equation A 1XB 1 + A 2XB A XB = C (29) where A j 2 m2m ;B j 2 n2n, and C 2 m2n are given constant matrices, X 2 m2n is the unnown matrix to be solved. Lemma 3: The equation in (29)has a unique solution if and only if the matrix (BT j A j ) is nonsingular; in this case the solution is col[x] = B T j A j 01 col[c]; and if C =0, the matrix equation in (29)has a unique solution X =0. For (29), we roose the following gradient iterative algorithm to comute the solution X: X() =[X 1 ()+X 2 ()+111+ X d ()]= (30) X i() =X( 0 1) + A T i C 0 A j X( 0 1)B j Bi T (31) 1 = 1 = max A j A T j max B T j B j or A j 2 Bj 2 : (32) Theorem 3: If the matrix equation in (29)has a unique solution X, then the iterative solution X() given by the algorithm in (30) (32) converges to the solution X. The roof is similar and hence omitted. V. EXAMPLES This section gives three examles to illustrate the erformance of the roosed algorithms. Examle 1: Suose that AX + XB = C, where A = C = : Then, the solution of X from (3)is B = X = x 11 x 12 x 21 x 22 = : Taing X(0) = , we aly the algorithm in (22) (23) to comute X(). The iterative solution of X is shown in Table I with the relative error := X() 0 X=X. From Table I, it is clear that is becoming smaller and goes to zero as increases. This indicates that the roosed algorithm is effective. The effect of changing
5 1220 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 50, NO. 8, AUGUST 2005 Fig. 1. Relative error versus (dots and stars). the convergence factor is illustrated in Fig. 1. We see that the larger the convergence factor is, the faster the convergence the algorithm (or the smaller the estimation error). However, if is too large, the algorithm may diverge. How to choose a best convergence factor is still a roject to be studied. Examle 2: Suose that AX + XB = C, where A; B, and C are matrices (m = n =10)and roduced randomly in Matlab, with the simulation rogram given here. Fig. 2. Relative error versus (dots). TABLE II CONDITION NUMBERS OF 8 WITH DIFFERENT ; TABLE III ITERATIVE ERRORS % end This rogram contains a variable. For different values ( = 0:1; 0:5; 1:0; 5:0), the iterative errors versus are shown in Fig. 2 and the corresonding condition numbers of 8 are in Table II, where min[8] reresents the smallest eigenvalue of 8 and cond[8] denotes the condition number of 8. From Fig. 2 and Table II, increasing leads to small iterative errors, i.e., the convergence rate becomes faster as the condition number of 8 is decreasing. Note that too large a condition number imlies an ill-conditioned 8 [10]. Examle 3: Suose that AX + XB = C, where A; B, and C are matrices and generated similarly in Matlab: Here, we set B = A 0 in order to comare with the B-Q algorithm in which B = A 0 is required. This system has a condition number cond[8] = 1: Use the direct Kronecer roduct aroach in Lemma 1 to solve this high-dimensional equation, the comutational time is s on a Pentium 4 (1.8-GHz)comuter; use the B Q algorithm in [1] and the GI algorithm in (13) (15), the comutational times are 0.75 and 0.41 s, resectively, for ten iterations, and the iterative errors are shown in Table III. From here, we can see that the roosed algorithm and the B-Q algorithm have comarable comutational times, but the latter is only suitable for solving AX + XB = C with B = A 0, and also requires comuting matrix inversion at each iteration. From Table III, after ten iterations, the two algorithms give errors samller than 10 06, but the GI algorithm roosed in this note has faster initial convergence than the B-Q algorithm in the beginning eriod. In simulation, the Pentium 4 comuter fails to solve matrix equations of size greater than by using the direct Kronecer method, without introducing secial oerations, but our iterative method succeeds. VI. CONCLUSION The GI algorithms of solving general matrix equations are studied by using the hierarchical identification rincile. The analysis indicates that the algorithms roosed has good convergence roerties for
6 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 50, NO. 8, AUGUST any initial value, and do not require that the coefficient matrices are of the same size, are stable, have common characteristic roots. Although the algorithms are resented for linear matrix equations, the method adoted can be easily extended to study iterative solutions of nonlinear matrix equations, e.g., the Riccati equations. ACKNOWLEDGMENT The authors are grateful to the anonymous reviewers for their helful comments and suggestions. REFERENCES [1] P. Benner and E. S. Quintana-Ortí, Solving stable generalized Lyaunov equations with the matrix sign function, Numer. Algorithms, vol. 20, no. 1, , [2] R. Bitmead, Exlicit solutions of the discrete-time Lyaunov matrix equation and Kalman Yaubovich equations, IEEE Trans. Autom. Control, vol. AC-26, no. 6, , Dec [3] R. Bitmead and H. Weiss, On the solution of the discrete-time Lyaunov matrix equation in controllable canonical form, IEEE Trans. Autom. Control, vol. AC-24, no. 3, , Jun [4] E. Davison and F. Man, The numerical solution of + =, IEEE Trans. Autom. Control, vol. AC-13, no. 4, , Aug [5] F. Ding and T. Chen, Iterative least squares solutions of couled Sylvester matrix equations, Syst. Control Lett., vol. 54, no. 2, , [6], Hierarchical gradient-based identification of multivariable discrete-time systems, Automatica, vol. 41, no. 2, , [7], Hierarchical least squares identification methods for multivariable systems, IEEE Trans. Autom. Control, vol. 50, no. 3, , Mar [8] Y. Fang, K. A. Loaro, and X. Feng, New estimates for solutions of Lyaunov equations, IEEE Trans. Autom. Control, vol. 42, no. 3, , Mar [9] G. H. Golub, S. Nash, and C. F. Van Loan, A Hessenberg-Schur method for the matrix roblem + =, IEEE Trans. Autom. Control, vol. AC-24, no. 6, , Dec [10] G. H. Golub and C. F. Van Loan, Matrix Comutations, 3rd ed. Baltimore, MD: Johns Hoins Univ. Press, [11] J. Heinen, A technique for solving the extended discrete Lyaunov matrix equation, IEEE Trans. Autom. Control, vol. AC-17, no. 1, , Feb [12] I. Jonsson and B. Kågström, Recursive bloced algorithms for solving triangular systems Part I: One-sided and couled Sylvester-tye matrix equations, ACM Trans. Math. Software, vol. 28, no. 4, , [13], Recursive bloced algorithms for solving triangular systems Part II: Two-sided and generalized Sylvester and Lyaunov matrix equations, ACM Trans. Math. Software, vol. 28, no. 4, , [14] W. H. Kwon, Y. S. Moon, and S. C. Ahn, Bounds in algebraic Riccati and Lyaunov equations: A survey and some new results, Int. J. Control, vol. 64, , [15] T. Mori and A. Derese, A brief summary of the bounds on the solution of the algebraic matrix equations in control theory, Int. J. Control, vol. 39, , [16] H. Muaidani, H. Xu, and K. Mizuami, New iterative algorithm for algebraic Riccati equation related to control roblem of singularly erturbed systems, IEEE Trans. Autom. Control, vol. 46, no. 10, , Oct [17] G. Stare and W. Niethammer, SOR for =, Linear Alg. Al., vol. 154, , [18] T. Styel, Numerical solution and erturbation theory for generalized Lyaunov equations, Linear Alg. Al., vol. 349, no. 1, , An Imroved Lower Matrix Bound of the Solution of the Unified Couled Riccati Equation Chien-Hua Lee Abstract A new lower matrix bound of the solution for the unified couled algebraic Riccati equation (UCARE) is roosed. This bound imroves the drawbac of the results resented in a revious aer. Index Terms Continuous couled algebraic Riccati equation (CCARE), discrete couled algebraic Riccati equation (DCARE), lower matrix bound, unified couled algebraic Riccati equation (UCARE). I. INTRODUCTION It is nown that the so-called couled algebraic Riccati equations arose and layed an imortant role in the jum linear-quadratic control roblem [2], [6], [8], [9] and in many other imortant engineering roblems [3]. Recently, by maing use of the delta oerator develoed by [7], Czorni and Swiernia roosed in [4] a unified couled algebraic Riccati equation (UCARE)and resented several eigenvalue bounds of its solution. By utilizing these eigenvalue bounds, they then derived a lower matrix bound for the UCARE. However, for the roosed matrix bound, its form is very comlicated and a condition must be satisfied. In ractice, matrix bounds of the UCARE can give rough estimates before actually solving it and can chec whether the solution techniques for the UCARE actually yielded valid solutions. Besides, matrix bounds are the most general findings among all the solution bounds of the UCARE. Therefore, we then study the matrix bound of the solution of the UCARE in order to imrove the drawbac of the arallel result of [4]. By extending Lee s method [5], a new matrix bound of the solution of the UCARE is derived. Comarisons show that the obtained result does not need any condition and is more concise. The following symbol conventions are used in this note. A>()B means matrix A 0 B is ositive (semi)definite; i(a) and i (A), resectively, denote the ith eigenvalue and the ith singular value of a symmetric n 2 n matrix A for i = 1; 2;...;n, whereas i(a) and i(a), resectively, are arranged in the nonincreasing order (i.e., 1(A) 2(A) 111 n (A) and 1(A) 2(A) 111 n(a)). Furthermore, scalar function f (a; b; c) is defined as f (a; b; c) (c=a +(a 2 + bc) 1=2 ). II. MAIN RESULTS In recent years, [3] has roosed the UCARE F i A i + A T i F i +1A T i F i A i 0 1A T i + I F i B i I +1B T i F i B i 01 B T i F i (1A i + I) + ij P j = 0Q i (1) j6=i where A i 2< n2n ;B i 2< n2m, matrix Q i 2< n2n is symmetric and ositive semidefinite, P i 2< n2n denotes the ositive semidefinite solution, ij; 1 2 [0; 1);i2 S; S = f1; 2;...;sg is a finite set, and F i = P i +1 j6=i ijpj : (2) Manuscrit received October 10, 2003; revised March 23, 2004, October 11, 2004, and March 31, Recommended by Associate Editor M. Kothare. This wor was suorted by Cheng-Shiu University under Grant CS The author is with the Deartment of Electrical Engineering, Cheng-Shiu University, Kaohsiung 833, Taiwan, R.O.C. ( chienhua@csu.edu.tw). Digital Object Identifier /TAC /$ IEEE
2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S.
-D Analysis for Iterative Learning Controller for Discrete-ime Systems With Variable Initial Conditions Yong FANG, and ommy W. S. Chow Abstract In this aer, an iterative learning controller alying to linear
More informationNumerical Linear Algebra
Numerical Linear Algebra Numerous alications in statistics, articularly in the fitting of linear models. Notation and conventions: Elements of a matrix A are denoted by a ij, where i indexes the rows and
More informationPositive decomposition of transfer functions with multiple poles
Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.
More informationImproving AOR Method for a Class of Two-by-Two Linear Systems
Alied Mathematics 2 2 236-24 doi:4236/am22226 Published Online February 2 (htt://scirporg/journal/am) Imroving AOR Method for a Class of To-by-To Linear Systems Abstract Cuixia Li Shiliang Wu 2 College
More information216 S. Chandrasearan and I.C.F. Isen Our results dier from those of Sun [14] in two asects: we assume that comuted eigenvalues or singular values are
Numer. Math. 68: 215{223 (1994) Numerische Mathemati c Sringer-Verlag 1994 Electronic Edition Bacward errors for eigenvalue and singular value decomositions? S. Chandrasearan??, I.C.F. Isen??? Deartment
More information4. Score normalization technical details We now discuss the technical details of the score normalization method.
SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules
More informationEstimation of the large covariance matrix with two-step monotone missing data
Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo
More informationGeneration of Linear Models using Simulation Results
4. IMACS-Symosium MATHMOD, Wien, 5..003,. 436-443 Generation of Linear Models using Simulation Results Georg Otte, Sven Reitz, Joachim Haase Fraunhofer Institute for Integrated Circuits, Branch Lab Design
More informationResearch Article An Iterative Algorithm for the Reflexive Solution of the General Coupled Matrix Equations
he Scientific World Journal Volume 013 Article ID 95974 15 ages htt://dxdoiorg/101155/013/95974 Research Article An Iterative Algorithm for the Reflexive Solution of the General Couled Matrix Euations
More informationRobust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System
Vol.7, No.7 (4),.37-38 htt://dx.doi.org/.457/ica.4.7.7.3 Robust Predictive Control of Inut Constraints and Interference Suression for Semi-Trailer System Zhao, Yang Electronic and Information Technology
More informationResearch Article Controllability of Linear Discrete-Time Systems with Both Delayed States and Delayed Inputs
Abstract and Alied Analysis Volume 203 Article ID 97546 5 ages htt://dxdoiorg/055/203/97546 Research Article Controllability of Linear Discrete-Time Systems with Both Delayed States and Delayed Inuts Hong
More informationSpecialized and hybrid Newton schemes for the matrix pth root
Secialized and hybrid Newton schemes for the matrix th root Braulio De Abreu Marlliny Monsalve Marcos Raydan June 15, 2006 Abstract We discuss different variants of Newton s method for comuting the th
More informationVarious Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems
Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various
More informationOptimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment
Neutrosohic Sets and Systems Vol 14 016 93 University of New Mexico Otimal Design of Truss Structures Using a Neutrosohic Number Otimization Model under an Indeterminate Environment Wenzhong Jiang & Jun
More informationState Estimation with ARMarkov Models
Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,
More informationLinear diophantine equations for discrete tomography
Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,
More informationON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS
#A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,
More informationA Recursive Block Incomplete Factorization. Preconditioner for Adaptive Filtering Problem
Alied Mathematical Sciences, Vol. 7, 03, no. 63, 3-3 HIKARI Ltd, www.m-hiari.com A Recursive Bloc Incomlete Factorization Preconditioner for Adative Filtering Problem Shazia Javed School of Mathematical
More informationCombining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)
Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment
More informationApplicable Analysis and Discrete Mathematics available online at HENSEL CODES OF SQUARE ROOTS OF P-ADIC NUMBERS
Alicable Analysis and Discrete Mathematics available online at htt://efmath.etf.rs Al. Anal. Discrete Math. 4 (010), 3 44. doi:10.98/aadm1000009m HENSEL CODES OF SQUARE ROOTS OF P-ADIC NUMBERS Zerzaihi
More informationResearch Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces
Abstract and Alied Analysis Volume 2012, Article ID 264103, 11 ages doi:10.1155/2012/264103 Research Article An iterative Algorithm for Hemicontractive Maings in Banach Saces Youli Yu, 1 Zhitao Wu, 2 and
More informationConvex Optimization methods for Computing Channel Capacity
Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem
More information#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS
#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS Ramy F. Taki ElDin Physics and Engineering Mathematics Deartment, Faculty of Engineering, Ain Shams University, Cairo, Egyt
More informationSystem Reliability Estimation and Confidence Regions from Subsystem and Full System Tests
009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract
More informationProbability Estimates for Multi-class Classification by Pairwise Coupling
Probability Estimates for Multi-class Classification by Pairwise Couling Ting-Fan Wu Chih-Jen Lin Deartment of Comuter Science National Taiwan University Taiei 06, Taiwan Ruby C. Weng Deartment of Statistics
More informationAdditive results for the generalized Drazin inverse in a Banach algebra
Additive results for the generalized Drazin inverse in a Banach algebra Dragana S. Cvetković-Ilić Dragan S. Djordjević and Yimin Wei* Abstract In this aer we investigate additive roerties of the generalized
More informationUniform Sample Generations from Contractive Block Toeplitz Matrices
IEEE TRASACTIOS O AUTOMATIC COTROL, VOL 5, O 9, SEPTEMBER 6 559 Uniform Samle Generations from Contractive Bloc Toelitz Matrices Tong Zhou and Chao Feng Abstract This note deals with generating a series
More informationChater Matrix Norms and Singular Value Decomosition Introduction In this lecture, we introduce the notion of a norm for matrices The singular value de
Lectures on Dynamic Systems and Control Mohammed Dahleh Munther A Dahleh George Verghese Deartment of Electrical Engineering and Comuter Science Massachuasetts Institute of Technology c Chater Matrix Norms
More informationLilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3
Pesquisa Oeracional (2013) 33(1): 123-132 2013 Brazilian Oerations Research Society Printed version ISSN 0101-7438 / Online version ISSN 1678-5142 www.scielo.br/oe SOME RESULTS ABOUT THE CONNECTIVITY OF
More informationA CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract
A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS CASEY BRUCK 1. Abstract The goal of this aer is to rovide a concise way for undergraduate mathematics students to learn about how rime numbers behave
More informationCSC165H, Mathematical expression and reasoning for computer science week 12
CSC165H, Mathematical exression and reasoning for comuter science week 1 nd December 005 Gary Baumgartner and Danny Hea hea@cs.toronto.edu SF4306A 416-978-5899 htt//www.cs.toronto.edu/~hea/165/s005/index.shtml
More informationRadial Basis Function Networks: Algorithms
Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.
More informationMATH 2710: NOTES FOR ANALYSIS
MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite
More informationLINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL
LINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL Mohammad Bozorg Deatment of Mechanical Engineering University of Yazd P. O. Box 89195-741 Yazd Iran Fax: +98-351-750110
More informationNode-voltage method using virtual current sources technique for special cases
Node-oltage method using irtual current sources technique for secial cases George E. Chatzarakis and Marina D. Tortoreli Electrical and Electronics Engineering Deartments, School of Pedagogical and Technological
More informationAn Investigation on the Numerical Ill-conditioning of Hybrid State Estimators
An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical
More informationApproximating min-max k-clustering
Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost
More informationUniformly best wavenumber approximations by spatial central difference operators: An initial investigation
Uniformly best wavenumber aroximations by satial central difference oerators: An initial investigation Vitor Linders and Jan Nordström Abstract A characterisation theorem for best uniform wavenumber aroximations
More informationPositive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Application
BULGARIA ACADEMY OF SCIECES CYBEREICS AD IFORMAIO ECHOLOGIES Volume 9 o 3 Sofia 009 Positive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Alication Svetoslav Savov Institute of Information
More informationTRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES
Khayyam J. Math. DOI:10.22034/kjm.2019.84207 TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES ISMAEL GARCÍA-BAYONA Communicated by A.M. Peralta Abstract. In this aer, we define two new Schur and
More informationMODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL
Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management
More informationMATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK
Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment
More informationarxiv: v1 [quant-ph] 20 Jun 2017
A Direct Couling Coherent Quantum Observer for an Oscillatory Quantum Plant Ian R Petersen arxiv:76648v quant-h Jun 7 Abstract A direct couling coherent observer is constructed for a linear quantum lant
More informationSums of independent random variables
3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where
More informationApplied Mathematics and Computation
Alied Mathematics and Comutation 217 (2010) 1887 1895 Contents lists available at ScienceDirect Alied Mathematics and Comutation journal homeage: www.elsevier.com/locate/amc Derivative free two-oint methods
More informationMultiplicative group law on the folium of Descartes
Multilicative grou law on the folium of Descartes Steluţa Pricoie and Constantin Udrişte Abstract. The folium of Descartes is still studied and understood today. Not only did it rovide for the roof of
More informationParticipation Factors. However, it does not give the influence of each state on the mode.
Particiation Factors he mode shae, as indicated by the right eigenvector, gives the relative hase of each state in a articular mode. However, it does not give the influence of each state on the mode. We
More informationMulti-Operation Multi-Machine Scheduling
Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job
More informationAn Inverse Problem for Two Spectra of Complex Finite Jacobi Matrices
Coyright 202 Tech Science Press CMES, vol.86, no.4,.30-39, 202 An Inverse Problem for Two Sectra of Comlex Finite Jacobi Matrices Gusein Sh. Guseinov Abstract: This aer deals with the inverse sectral roblem
More informationSome Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., DECEMBER 4 336 Some Unitary Sace Time Codes From Shere Packing Theory With Otimal Diversity Product of Code Size Haiquan Wang, Genyuan Wang, and Xiang-Gen
More informationOn the capacity of the general trapdoor channel with feedback
On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:
More informationAn Estimate For Heilbronn s Exponential Sum
An Estimate For Heilbronn s Exonential Sum D.R. Heath-Brown Magdalen College, Oxford For Heini Halberstam, on his retirement Let be a rime, and set e(x) = ex(2πix). Heilbronn s exonential sum is defined
More informationCoding Along Hermite Polynomials for Gaussian Noise Channels
Coding Along Hermite olynomials for Gaussian Noise Channels Emmanuel A. Abbe IG, EFL Lausanne, 1015 CH Email: emmanuel.abbe@efl.ch Lizhong Zheng LIDS, MIT Cambridge, MA 0139 Email: lizhong@mit.edu Abstract
More informationAlmost 4000 years ago, Babylonians had discovered the following approximation to. x 2 dy 2 =1, (5.0.2)
Chater 5 Pell s Equation One of the earliest issues graled with in number theory is the fact that geometric quantities are often not rational. For instance, if we take a right triangle with two side lengths
More informationTopic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar
15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider
More informationMobius Functions, Legendre Symbols, and Discriminants
Mobius Functions, Legendre Symbols, and Discriminants 1 Introduction Zev Chonoles, Erick Knight, Tim Kunisky Over the integers, there are two key number-theoretic functions that take on values of 1, 1,
More information2 K. ENTACHER 2 Generalized Haar function systems In the following we x an arbitrary integer base b 2. For the notations and denitions of generalized
BIT 38 :2 (998), 283{292. QUASI-MONTE CARLO METHODS FOR NUMERICAL INTEGRATION OF MULTIVARIATE HAAR SERIES II KARL ENTACHER y Deartment of Mathematics, University of Salzburg, Hellbrunnerstr. 34 A-52 Salzburg,
More informationIteration with Stepsize Parameter and Condition Numbers for a Nonlinear Matrix Equation
Electronic Journal of Linear Algebra Volume 34 Volume 34 2018) Article 16 2018 Iteration with Stesize Parameter and Condition Numbers for a Nonlinear Matrix Equation Syed M Raza Shah Naqvi Pusan National
More informationMinimax Design of Nonnegative Finite Impulse Response Filters
Minimax Design of Nonnegative Finite Imulse Resonse Filters Xiaoing Lai, Anke Xue Institute of Information and Control Hangzhou Dianzi University Hangzhou, 3118 China e-mail: laix@hdu.edu.cn; akxue@hdu.edu.cn
More informationResearch Article A New Method to Study Analytic Inequalities
Hindawi Publishing Cororation Journal of Inequalities and Alications Volume 200, Article ID 69802, 3 ages doi:0.55/200/69802 Research Article A New Method to Study Analytic Inequalities Xiao-Ming Zhang
More informationVerifying Two Conjectures on Generalized Elite Primes
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 12 (2009), Article 09.4.7 Verifying Two Conjectures on Generalized Elite Primes Xiaoqin Li 1 Mathematics Deartment Anhui Normal University Wuhu 241000,
More informationMath 104B: Number Theory II (Winter 2012)
Math 104B: Number Theory II (Winter 01) Alina Bucur Contents 1 Review 11 Prime numbers 1 Euclidean algorithm 13 Multilicative functions 14 Linear diohantine equations 3 15 Congruences 3 Primes as sums
More informationSolution sheet ξi ξ < ξ i+1 0 otherwise ξ ξ i N i,p 1 (ξ) + where 0 0
Advanced Finite Elements MA5337 - WS7/8 Solution sheet This exercise sheets deals with B-slines and NURBS, which are the basis of isogeometric analysis as they will later relace the olynomial ansatz-functions
More informationObserver/Kalman Filter Time Varying System Identification
Observer/Kalman Filter Time Varying System Identification Manoranjan Majji Texas A&M University, College Station, Texas, USA Jer-Nan Juang 2 National Cheng Kung University, Tainan, Taiwan and John L. Junins
More informationarxiv: v1 [physics.data-an] 26 Oct 2012
Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch
More informationFor q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i
Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:
More informationNONLINEAR OPTIMIZATION WITH CONVEX CONSTRAINTS. The Goldstein-Levitin-Polyak algorithm
- (23) NLP - NONLINEAR OPTIMIZATION WITH CONVEX CONSTRAINTS The Goldstein-Levitin-Polya algorithm We consider an algorithm for solving the otimization roblem under convex constraints. Although the convexity
More informationCOMPARISON OF VARIOUS OPTIMIZATION TECHNIQUES FOR DESIGN FIR DIGITAL FILTERS
NCCI 1 -National Conference on Comutational Instrumentation CSIO Chandigarh, INDIA, 19- March 1 COMPARISON OF VARIOUS OPIMIZAION ECHNIQUES FOR DESIGN FIR DIGIAL FILERS Amanjeet Panghal 1, Nitin Mittal,Devender
More informationApproximation of the Euclidean Distance by Chamfer Distances
Acta Cybernetica 0 (0 399 47. Aroximation of the Euclidean Distance by Chamfer Distances András Hajdu, Lajos Hajdu, and Robert Tijdeman Abstract Chamfer distances lay an imortant role in the theory of
More informationGeneralized Coiflets: A New Family of Orthonormal Wavelets
Generalized Coiflets A New Family of Orthonormal Wavelets Dong Wei, Alan C Bovik, and Brian L Evans Laboratory for Image and Video Engineering Deartment of Electrical and Comuter Engineering The University
More informationMA3H1 TOPICS IN NUMBER THEORY PART III
MA3H1 TOPICS IN NUMBER THEORY PART III SAMIR SIKSEK 1. Congruences Modulo m In quadratic recirocity we studied congruences of the form x 2 a (mod ). We now turn our attention to situations where is relaced
More informationA Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression
Journal of Modern Alied Statistical Methods Volume Issue Article 7 --03 A Comarison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Ghadban Khalaf King Khalid University, Saudi
More informationMULTI-CHANNEL PARAMETRIC ESTIMATOR FAST BLOCK MATRIX INVERSES
MULTI-CANNEL ARAMETRIC ESTIMATOR FAST BLOCK MATRIX INVERSES S Lawrence Marle Jr School of Electrical Engineering and Comuter Science Oregon State University Corvallis, OR 97331 Marle@eecsoregonstateedu
More informationFeedback-Based Iterative Learning Control for MIMO LTI Systems
International Journal of Control, Feedback-Based Automation, Iterative and Systems, Learning vol. Control 6, no., for. MIMO 69-77, LTI Systems Aril 8 69 Feedback-Based Iterative Learning Control for MIMO
More informationRotations in Curved Trajectories for Unconstrained Minimization
Rotations in Curved rajectories for Unconstrained Minimization Alberto J Jimenez Mathematics Deartment, California Polytechnic University, San Luis Obiso, CA, USA 9407 Abstract Curved rajectories Algorithm
More informationE( x ) [b(n) - a(n, m)x(m) ]
Homework #, EE5353. An XOR network has two inuts, one hidden unit, and one outut. It is fully connected. Gie the network's weights if the outut unit has a ste actiation and the hidden unit actiation is
More informationElliptic Curves Spring 2015 Problem Set #1 Due: 02/13/2015
18.783 Ellitic Curves Sring 2015 Problem Set #1 Due: 02/13/2015 Descrition These roblems are related to the material covered in Lectures 1-2. Some of them require the use of Sage, and you will need to
More informationSTABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS
STABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS Massimo Vaccarini Sauro Longhi M. Reza Katebi D.I.I.G.A., Università Politecnica delle Marche, Ancona, Italy
More informationDistributed Rule-Based Inference in the Presence of Redundant Information
istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced
More informationNotes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle
McMaster University Advanced Otimization Laboratory Title: Notes on duality in second order and -order cone otimization Author: Erling D. Andersen, Cornelis Roos and Tamás Terlaky AdvOl-Reort No. 000/8
More informationTowards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK
Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)
More informationA numerical implementation of a predictor-corrector algorithm for sufcient linear complementarity problem
A numerical imlementation of a redictor-corrector algorithm for sufcient linear comlementarity roblem BENTERKI DJAMEL University Ferhat Abbas of Setif-1 Faculty of science Laboratory of fundamental and
More informationThe Fekete Szegő theorem with splitting conditions: Part I
ACTA ARITHMETICA XCIII.2 (2000) The Fekete Szegő theorem with slitting conditions: Part I by Robert Rumely (Athens, GA) A classical theorem of Fekete and Szegő [4] says that if E is a comact set in the
More informationSession 5: Review of Classical Astrodynamics
Session 5: Review of Classical Astrodynamics In revious lectures we described in detail the rocess to find the otimal secific imulse for a articular situation. Among the mission requirements that serve
More informationDeveloping A Deterioration Probabilistic Model for Rail Wear
International Journal of Traffic and Transortation Engineering 2012, 1(2): 13-18 DOI: 10.5923/j.ijtte.20120102.02 Develoing A Deterioration Probabilistic Model for Rail Wear Jabbar-Ali Zakeri *, Shahrbanoo
More informationp-adic Measures and Bernoulli Numbers
-Adic Measures and Bernoulli Numbers Adam Bowers Introduction The constants B k in the Taylor series exansion t e t = t k B k k! k=0 are known as the Bernoulli numbers. The first few are,, 6, 0, 30, 0,
More informationThe Algebraic Structure of the p-order Cone
The Algebraic Structure of the -Order Cone Baha Alzalg Abstract We study and analyze the algebraic structure of the -order cones We show that, unlike oularly erceived, the -order cone is self-dual for
More informationA Note on the Positive Nonoscillatory Solutions of the Difference Equation
Int. Journal of Math. Analysis, Vol. 4, 1, no. 36, 1787-1798 A Note on the Positive Nonoscillatory Solutions of the Difference Equation x n+1 = α c ix n i + x n k c ix n i ) Vu Van Khuong 1 and Mai Nam
More informationESTIMATION OF THE OUTPUT DEVIATION NORM FOR UNCERTAIN, DISCRETE-TIME NONLINEAR SYSTEMS IN A STATE DEPENDENT FORM
Int. J. Al. Math. Comut. Sci. 2007 Vol. 17 No. 4 505 513 DOI: 10.2478/v10006-007-0042-z ESTIMATION OF THE OUTPUT DEVIATION NORM FOR UNCERTAIN DISCRETE-TIME NONLINEAR SYSTEMS IN A STATE DEPENDENT FORM PRZEMYSŁAW
More informationThe Recursive Fitting of Multivariate. Complex Subset ARX Models
lied Mathematical Sciences, Vol. 1, 2007, no. 23, 1129-1143 The Recursive Fitting of Multivariate Comlex Subset RX Models Jack Penm School of Finance and lied Statistics NU College of Business & conomics
More informationUncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning
TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment
More informationTopic 7: Using identity types
Toic 7: Using identity tyes June 10, 2014 Now we would like to learn how to use identity tyes and how to do some actual mathematics with them. By now we have essentially introduced all inference rules
More informationImproved Capacity Bounds for the Binary Energy Harvesting Channel
Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,
More informationSupplementary Materials for Robust Estimation of the False Discovery Rate
Sulementary Materials for Robust Estimation of the False Discovery Rate Stan Pounds and Cheng Cheng This sulemental contains roofs regarding theoretical roerties of the roosed method (Section S1), rovides
More informationEfficient algorithms for the smallest enclosing ball problem
Efficient algorithms for the smallest enclosing ball roblem Guanglu Zhou, Kim-Chuan Toh, Jie Sun November 27, 2002; Revised August 4, 2003 Abstract. Consider the roblem of comuting the smallest enclosing
More informationA MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION
O P E R A T I O N S R E S E A R C H A N D D E C I S I O N S No. 27 DOI:.5277/ord73 Nasrullah KHAN Muhammad ASLAM 2 Kyung-Jun KIM 3 Chi-Hyuck JUN 4 A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST
More informationA sharp generalization on cone b-metric space over Banach algebra
Available online at www.isr-ublications.com/jnsa J. Nonlinear Sci. Al., 10 2017), 429 435 Research Article Journal Homeage: www.tjnsa.com - www.isr-ublications.com/jnsa A shar generalization on cone b-metric
More informationUsing the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process
Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process P. Mantalos a1, K. Mattheou b, A. Karagrigoriou b a.deartment of Statistics University of Lund
More informationTHE DIOPHANTINE EQUATION x 4 +1=Dy 2
MATHEMATICS OF COMPUTATION Volume 66, Number 9, July 997, Pages 347 35 S 005-57897)0085-X THE DIOPHANTINE EQUATION x 4 +=Dy J. H. E. COHN Abstract. An effective method is derived for solving the equation
More informationChapter 7 Sampling and Sampling Distributions. Introduction. Selecting a Sample. Introduction. Sampling from a Finite Population
Chater 7 and s Selecting a Samle Point Estimation Introduction to s of Proerties of Point Estimators Other Methods Introduction An element is the entity on which data are collected. A oulation is a collection
More information