Gradient Based Iterative Algorithms for Solving a Class of Matrix Equations

Size: px
Start display at page:

Download "Gradient Based Iterative Algorithms for Solving a Class of Matrix Equations"

Transcription

1 1216 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 50, NO. 8, AUGUST 2005 Exanding (A3)gives M 0 8 T +1 T +18 =( T ) F = I (A4) g = 0F 8 T +1 =( T ) f = T T +18 F 8 T +1 =( T ) 2 : (A5) (A6) Now, using the well-nown matrix result [A + BCD] 01 = A 01 0 A 01 B[DA 01 B + C 01 ] 01 DA 01 [10], F in (A4)can be comuted as F = M 0 8 T +1 T +18 =( T ) = M 01 M T +1 T +18 M 01 T T +18 M 01 8 T : (A7) +1 According to the definition of R in (16), it is obvious that Finally, substituting for M that R = I 0 8 M R +1 = I M T +1: (A8) from (A2) and (A5) (A7), and noting 8 T, roduces the required result R +1 = R 0 R +1 T +1R T T +1R +1 R 0 = I; =0; 1;...;n0 1 : (A9) REFERENCES [1] R. Haber and H. Unbehauen, Structure identification of nonlinear dynamic systems A survey on inut/outut aroaches, Automatica, vol. 26, , [2] S. Chen, S. A. Billings, and W. Luo, Orthogonal least squares methods and their alication to nonlinear system identification, Int. J. Control, vol. 50, , [3] S. Chen, C. F. N. Cowan, and P. M. Grant, Orthogonal least squares learning algorithm for radial basis function networs, IEEE Trans. Neural Networs, vol. 2, no. 2, , Mar [4] C. Drioli and D. Rocchesso, Orthogonal least squares algorithm for the aroximation of a ma and its derivatives with a RBF networ, Signal Process., vol. 83, , [5] D. S. Huang and W. Zhao, Determining the centers of radial basis robabilities neural networs by recursive orthogonal least square algorithms, Al. Math. Comut., vol. 162, , [6] S. Chen and J. Wigger, Fast orthogonal least squares algorithm for efficient subset model selection, IEEE Trans. Signal Process., vol. 43, no. 7, , Jul [7] Q. M. Zhu and S. A. Billings, Fast orthogonal identification of nonlinear stochastic models and radial basis function neural networs, Int. J. Control, vol. 64, , [8] K. Z. Mao, Fast orthogonal forward selection algorithm for feature subset selection, IEEE Trans. Neural Networs, vol. 13, no. 5, , Se [9] L. Lawson and R. J. Hanson, Solving Least Squares Problem. Englewood Cliffs, NJ: Prentice-Hall, [10] L. Ljung, System Identification: Theory for the User. Englewood Cliffs, N.J.: Prentice-Hall, B. Proof of Proosition 2 a)equation (18)follows directly from the definition of R. b)setting = j in (19), and using roerty (18), the result is obvious. Now, setting = j +1in (19)and using (17), it follows that R = R j+1 = R j 0 R j j+1 T j+1r T j T j+1 R j j+1 : (A10) If both sides of (A10)are now multilied by R j, then R R j = R j+1r j = R jr j 0 R j j+1 T j+1r T j T j+1 R j j+1 R j (A11) which, from (17)and (18), gives R j+1 R j = R j+1 : (A12) Similarly, it can be roved that R j R j+1 = R j+1. This rocess can be reeated for all i>jto confirm the results in (19). c)in (20), setting = i and substituting from (17)and (18), it follows that R i i = R i01 i 0 R i01 i T i R T i01 i T i R i01 i = R i01 i 0 R i01 i =0: (A13) Reeating this for i +1and using (A13)gives R i+1 i = R i i 0 R i i+1 T i+1r T i i T i+1r i i+1 = 0R i i+1 T i+1r i i T i+1r i i+1 =0: (A14) This rocess can be continued for all >ito confirm that (20)is indeed true. Gradient Based Iterative Algorithms for Solving a Class of Matrix Equations Feng Ding and Tongwen Chen Abstract In this note, we aly a hierarchical identification rincile to study solving the Sylvester and Lyaunov matrix equations. In our aroach, we regard the unnown matrix to be solved as system arameters to be identified, and resent a gradient iterative algorithm for solving the equations by minimizing certain criterion functions. We rove that the iterative solution consistently converges to the true solution for any initial value, and illustrate that the rate of convergence of the iterative solution can be enhanced by choosing the convergence factor (or ste-size) aroriately. Furthermore, the iterative method is extended to solve general linear matrix equations. The algorithms roosed require less storage caacity than the existing numerical ones. Finally, the algorithms are tested on comuter and the results verify the theoretical findings. Index Terms Gauss Seidel iteration, gradient search, hierarchical identification rincile, identification, Jacobi iteration, Lyaunov matrix equation, arameter estimation, Sylvester matrix equation. Manuscrit received July 11, 2003; revised Aril 24, Recommended by Associate Editor S.-I. Niculescu. This wor was suorted by the Natural Sciences and Engineering Research Council of Canada. F. Ding is with the Control Science and Engineering Research Center, Southern Yangtze University, Wuxi , China, and also with the University of Alberta, Edmonton, AB T6G 2V4, Canada ( fding@sytu.edu.cn; fding@ece.ualberta.ca). T. Chen is with the Deartment of Electrical and Comuter Engineering, University of Alberta, Edmonton, AB T6G 2V4, Canada ( tchen@ece.ualberta.ca). Digital Object Identifier /TAC /$ IEEE

2 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 50, NO. 8, AUGUST I. INTRODUCTION Consider linear matrix equations, nown as Sylvester equations, of the form AX + XB = C and AXB + X = C where X 2 m2n is an unnown matrix, A; B, and C are constant (coefficient)matrices of aroriate dimensions. Such equations arise in many alications in systems and control, e.g., when B = A T, the equations reduce to the so-called Lyaunov equations, which are often encountered in continuous- and discrete-time stability analysis. Traditional methods convert such equations into an equivalent one of the form: Ax = b. Here, the vector x has mn unnowns consisting of elements of X; A is an mn 2 mn matrix in the Kronecer roduct form [2]. However, the dimensions of the associated matrix (A) are high when m and n are large, e.g., if m = n = 100, the dimension of A is Such a dimensionality roblem leads to comutational difficulty in that excessive comuter memory is required for comutation and inversion of large matrices. Alternative ways exist which transform the matrix equations into forms for which solutions may be readily comuted. Some numerical methods to solve the matrix equations are based on the reliminary matrix transformations to Jordan canonical form [11], comanion-tye form [3], Hessenberg Schur form [9]. However, these methods require first comuting the desired matrix transformation; moreover, they are not suitable for a general matrix equation of the form A1XB1 + A2XB A XB = C (1) which will also be studied in this note. In the field of linear algebra, iterative algorithms for sets of linear equations, such as Jacobi and Gauss Seidel iterations [10], have received secial attention [4], [8], [10], [16]. For examle, Stare and Niethammer studied an iterative bloc successive overrelaxation (SOR) method for the solution of the Sylvester matrix equation [17]. Recently, Jonsson and Kågström roosed recursive bloc algorithms for solving generalized Sylvester and Lyaunov matrix equations [12], [13]; Styel discussed numerical solution for generalized Lyaunov equations [18]. Also, Benner and Quintana Ortí resented an iterative algorithm for solving stable generalized Lyaunov equations using matrix sign functions; but the main drawbac is that their algorithm requires comuting matrix inversion at each iteration [1]. Recently, the authors derived the iterative least squares solutions of couled matrix equations [5]. To the best of our nowledge, iterative algorithms for Sylvester and Lyaunov matrix equations have not been fully investigated, esecially the iterative solutions of general matrix equations of the form in (1)and the convergence of the iterative solutions involved, which are the focus of this wor. Our methods will generate solutions to the matrix equations which are arbitrarily close to the exact solutions. Although exact solutions are imortant, for many alications such as stability analysis, it is often not necessary to comute exact solutions and aroximate solutions are sufficient. Also, if the arameters in the system matrices are uncertain, it is not ossible to obtain the exact solution for robust stability results [8], [14] [16]. In this note, the roblem will be tacled in a new way by alying the so-called hierarchical identification rincile [6], [7]. We decomose a system into some subsystems, and then the unnown arameters of each subsystem are identified successively. Here, we regard the unnown matrix X as the arameters (arameter matrix)of a system to be identified, and roose ways of decomosing the system equations, leading to gradient based iterative algorithms for solutions of the matrix equations involved. This note is organized as follows. In Sections II IV, we derive iterative algorithms for the matrix equations, AX+XB = C; AXB+X = C and (1), resectively, and study convergence roerties of the algorithms. In Section V, we resent three examles to illustrate the effectiveness of the algorithms roosed in this wor. Finally, we offer some concluding remars in Section VI. II. EQUATION AX + XB = C In this section, we aly the hierarchical identification rincile to solve the Sylvester matrix equation AX + XB = C (2) where A 2 m2m ;B 2 n2n, and C 2 m2n are given constant matrices, X 2 m2n is the unnown matrix to be solved. For a square matrix M; i[m ] reresents the ith eigenvalue of M. The notation I n is the identity matrix of n 2 n. For two matrices M and N; M N is their Kronecer roduct. For an m 2 n, matrix X =[x1 x2 111 x n ] 2 m2n col[x] is an mn-dimensional vector formed by columns of X, i.e., col[x] =[x T 1 x T 2... x T n ] T. The following result is well nown. Lemma 1: Equation (2)has a unique solution if and only if i[a]+ j [B] 6= 0for any i and j; in this case, the unique solution is given by col[x] =[(I n A) +(B T I m )] 01 col[c] (3) and the corresonding homogeneous equation AX + XB = 0 has a unique solution X =0. In articular, if B = A T, (2)reduces to the continuous-time Lyaunov matrix equation; and the necessary and sufficient condition for the existence of a unique solution is that i [A] + j [A] 6= 0for any i and j. According to the hierarchical identification rincile, the system in (2)is decomosed into two subsystems, and then based on least squares otimization, the arameters of each subsystems are identified, resectively. In this way we obtain the iterative algorithm. The details are as follows. Define two matrices b1 := C 0 XB and b2 := C 0 AX: (4) Then, from (2), we obtain two fictitious subsystems AX = b1 and XB = b2: (5) For these two subsystems in (5), we form two criterion functions J1(X) :=AX 0 b1 2 and J2(X) :=XB 0 b2 2 where the norm of the matrix X is defined by X 2 =tr[xx T ]. Let X1() and X2() be the estimates or iterative solutions of X at iteration, associated with the subsystems in (5), resectively. Minimizing J1(X) and J2(X) or using Lemma 1 in [5] leads to the following recursive equations: X1() =X1( 0 1) + A T [b1 0 AX1( 0 1)] (6) X2() =X2( 0 1) + [b2 0 X2( 0 1)B]B T : (7)

3 1218 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 50, NO. 8, AUGUST 2005 Here, is called the iterative ste-size or convergence factor, which can be simly taen to be = f max[aa T ]+ max[b T B]g 01 (8) where max indicates the maximum eigenvalue. Substituting (4)into (6)and (7)gives X 1() =X 1( 0 1) + A T [C 0 AX 1( 0 1) 0 XB] (9) X 2 () =X 2 ( 0 1) + [C 0 AX 0 X 2 ( 0 1)B]B T : (10) Here, a difficulty arises in that the exressions on the right-hand sides of (9)and (10)contain the unnown matrix X; so it is imossible to realize the algorithm in (9)and (10). Our solution is based on the hierarchical identification rincile: The unnown variable X in (9)and (10)is relaced with its estimate at time ( 0 1). Hence, we have X 1 () =X 1 ( 0 1) + A T [C 0 AX 1 ( 0 1) 0 X 1 ( 0 1)B] (11) X 2 () =X 2 ( 0 1) + [C 0 AX 2 ( 0 1) 0 X 2 ( 0 1)B]B T : (12) In fact, we need only an iterative solution X() rather than two solutions X 1 () and X 2 (). Taing the average of X 1 () and X 2 (),we obtain a gradient iterative (GI)algorithm X() =[X 1 ()+X 2 ()]=2 (13) X 1() =X( 0 1) + A T [C 0 AX( 0 1) 0 X( 0 1)B] (14) X 2 () =X( 0 1) + [C 0 AX( 0 1) 0 X( 0 1)B]B T : (15) To initialize the algorithm, we tae X(0) = 0 or some small real matrix, e.g., X(0) = m2n with 1 m2n being an m 2 n matrix whose elements are 1. If the aroach in [2] is used to solve (2), the number of storage elements required is mn(mn +1), which is much larger than (m + n) 2 +1, the number of storage elements required by the GI algorithm in (13) (15); e.g., when m = n = 100, the two numbers are and 401, resectively. A comarable iterative algorithm is the Benner and Quintana Ortí (B Q)algorithm, which requires comuting matrix inversion at each iteration [1]. However, the GI algorithm does not involve matrix inversion and thus has less comutational burden than the B Q algorithm; see Examle 3. Theorem 1: If the Sylvester equation in (2)has a unique solution X, then the iterative solution X() given by the algorithm in (13) (15) converges to X, i.e., lim!1 X() = X; or, the error X() 0 X converges to zero for any initial value X(0). Proof: Define the error matrices and ~X 1() :=X 1() 0 X X ~ 2() :=X 2() 0 X ~X() :=X() 0 X: (16) () :=A ~ X( 0 1) () := ~ X( 0 1)B: (17) Using (2) and (13) (15), it is not difficult to get ~X 1 () = X( ~ 0 1) + A T [0A X( ~ 0 1) 0 X( ~ 0 1)B] = X( ~ 0 1) + A T [0() 0 ()] (18) ~X 2 () = X( ~ 0 1) + [0A X( ~ 0 1) 0 X( ~ 0 1)B]B T = ~ X( 0 1) + [0() 0 ()]B T : (19) Taing the norm of both sides of (18)and (19), and using (17)give X ~ 1 () 2 = X( ~ 0 1) 2 +2trf X ~ T ( 0 1)A T [0() 0 ()]g + 2 A T [0() 0 ()] 2 X( ~ 0 1) 2 +2trf T ()[0() 0 ()]g + 2 max [AA T ]() +() 2 (20) X ~ 2() 2 X( ~ 0 1) 2 +2trf[0() 0 ()] T ()g + 2 max [B T B]() +() 2 : (21) Hence, from (16)and using (20)and (21), we have X() ~ 2 =[ X ~ 1 ()+ X ~ 2 () 2 ]=4 [ X ~ 1 () 2 + X ~ 2 () 2 ]=2 X( ~ 0 1) 2 0 () +() f max[aa T ] + max [B T B]g() +() 2 = ~ X( 0 1) f2 0 ( max[aa T ] + max [B T B])g() +() 2 ~ X(0) f2 0 ( max[aa T ] + max [B T B])g i=1 If the convergence factor is chosen to satisfy then we have (i) +(i) 2 : 0 <<2f max [AA T ]+ max [B T B]g 01 1 =1 ()+() 2 < 1: This imlies that as!1;() +()! 0, ora ~ X( 0 1) + ~X( 0 1)B! 0. According to Lemma 1, ~ X( 0 1)! 0 as!1. This roves Theorem 1. The algorithm (11)or (12)is nown as the single-side iteration, which can not guarantee that X i () converges to X; and (13) (15) give the balanced iterative algorithm, which can simly be written as X() =X( 0 1) + A T [C 0 AX( 0 1) 0 X( 0 1)B]=2 + [C 0 AX( 0 1) 0 X( 0 1)B]B T =2 (22) = f max [AA T ]+ max [B T B]g 01 or = fa 2 + B 2 g 01 (23) whose convergence is guaranteed. Of course, it is easier to comute the trace than the maximum eigenvalue. Even the convergence factor in (23)may not be the best and may be conservative. In fact, there exists a best such that the fast convergence rate of X() to X may be obtained; see Examle 1. Next, we show that the convergence rate of the iterative algorithm in (22) (23) deends on the condition number of the associated system, just lie the Jacobi and Gauss-Seidel iterations for linear systems of the form Ax = b [10]. From (18), (19), and (16), we may get an error equation col[ X()] ~ = [I mn 0 8]col[ X( ~ 0 1)] 8:=I n (A T A)+B T A T + B A +(BB T ) I m : From here, the closer the eigenvalues of 8 are to 1, the closer the eigenvalues of I mn 0 8 tend to zero, and hence, the faster the error

4 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 50, NO. 8, AUGUST col[ ~ X()] or ~ X() converges to zero. In other words, the algorithm in (22)and (23)has a fast convergence rate for small condition numbers of 8; see Examle 2. TABLE I ITERATIVE SOLUTION ( =1 5) III. EQUATION AXB + X = C In this section, we study the solution to the following matrix equation: AXB + X = C (24) where A m2m 2 ;B 2 n2n and C 2 m2n are given constant matrices, X 2 m2n is the unnown matrix to be solved. In articular, if A = B T, (24)is the discrete-time Lyaunov matrix equation. Moreover, if B in (24)is nonsingular, ost-multilying (24)by B 01 yields an equation of the form in (2). Unfortunately, a simle iterative algorithm X() =C 0 AX( 0 1)B cannot guarantee that X() converges to X. Lemma 2: The equation in (24)has a unique solution if and only if i [A] j [B] 6= 01 for any i and j; in this case the unique solution is given by col[x] =[(B T A) +I mn ] 01 col[c] and the corresonding homogeneous equation AXB + X = 0 also has a unique solution X =0. For the equation in (24), we resent the gradient iterative algorithm to comute the solution X X() =[X 1()+X 2()]=2 (25) X 1 () =X( 0 1) + A T [C 0 AX( 0 1)B 0 X( 0 1)]B T (26) X 2 () =X( 0 1) + [C 0 AX( 0 1)B 0 X( 0 1)] (27) = f max [AA T ] max [B T B]+1g 01 or =[A 2 B 2 +1] 01 : (28) The following result discuss the convergence of this algorithm. Theorem 2: If the matrix equation in (24)has a unique solution X, then the iterative solution X() given by the algorithm in (25) (28) converges to the solution X, i.e., lim!1 X() =X. A similar derivation as in Theorem 1 will lead to the result of Theorem 2, hence, it is omitted here. IV. EQUATION A j XB j = C In this section, we will extend the iterative method to solution of a more general matrix equation A 1XB 1 + A 2XB A XB = C (29) where A j 2 m2m ;B j 2 n2n, and C 2 m2n are given constant matrices, X 2 m2n is the unnown matrix to be solved. Lemma 3: The equation in (29)has a unique solution if and only if the matrix (BT j A j ) is nonsingular; in this case the solution is col[x] = B T j A j 01 col[c]; and if C =0, the matrix equation in (29)has a unique solution X =0. For (29), we roose the following gradient iterative algorithm to comute the solution X: X() =[X 1 ()+X 2 ()+111+ X d ()]= (30) X i() =X( 0 1) + A T i C 0 A j X( 0 1)B j Bi T (31) 1 = 1 = max A j A T j max B T j B j or A j 2 Bj 2 : (32) Theorem 3: If the matrix equation in (29)has a unique solution X, then the iterative solution X() given by the algorithm in (30) (32) converges to the solution X. The roof is similar and hence omitted. V. EXAMPLES This section gives three examles to illustrate the erformance of the roosed algorithms. Examle 1: Suose that AX + XB = C, where A = C = : Then, the solution of X from (3)is B = X = x 11 x 12 x 21 x 22 = : Taing X(0) = , we aly the algorithm in (22) (23) to comute X(). The iterative solution of X is shown in Table I with the relative error := X() 0 X=X. From Table I, it is clear that is becoming smaller and goes to zero as increases. This indicates that the roosed algorithm is effective. The effect of changing

5 1220 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 50, NO. 8, AUGUST 2005 Fig. 1. Relative error versus (dots and stars). the convergence factor is illustrated in Fig. 1. We see that the larger the convergence factor is, the faster the convergence the algorithm (or the smaller the estimation error). However, if is too large, the algorithm may diverge. How to choose a best convergence factor is still a roject to be studied. Examle 2: Suose that AX + XB = C, where A; B, and C are matrices (m = n =10)and roduced randomly in Matlab, with the simulation rogram given here. Fig. 2. Relative error versus (dots). TABLE II CONDITION NUMBERS OF 8 WITH DIFFERENT ; TABLE III ITERATIVE ERRORS % end This rogram contains a variable. For different values ( = 0:1; 0:5; 1:0; 5:0), the iterative errors versus are shown in Fig. 2 and the corresonding condition numbers of 8 are in Table II, where min[8] reresents the smallest eigenvalue of 8 and cond[8] denotes the condition number of 8. From Fig. 2 and Table II, increasing leads to small iterative errors, i.e., the convergence rate becomes faster as the condition number of 8 is decreasing. Note that too large a condition number imlies an ill-conditioned 8 [10]. Examle 3: Suose that AX + XB = C, where A; B, and C are matrices and generated similarly in Matlab: Here, we set B = A 0 in order to comare with the B-Q algorithm in which B = A 0 is required. This system has a condition number cond[8] = 1: Use the direct Kronecer roduct aroach in Lemma 1 to solve this high-dimensional equation, the comutational time is s on a Pentium 4 (1.8-GHz)comuter; use the B Q algorithm in [1] and the GI algorithm in (13) (15), the comutational times are 0.75 and 0.41 s, resectively, for ten iterations, and the iterative errors are shown in Table III. From here, we can see that the roosed algorithm and the B-Q algorithm have comarable comutational times, but the latter is only suitable for solving AX + XB = C with B = A 0, and also requires comuting matrix inversion at each iteration. From Table III, after ten iterations, the two algorithms give errors samller than 10 06, but the GI algorithm roosed in this note has faster initial convergence than the B-Q algorithm in the beginning eriod. In simulation, the Pentium 4 comuter fails to solve matrix equations of size greater than by using the direct Kronecer method, without introducing secial oerations, but our iterative method succeeds. VI. CONCLUSION The GI algorithms of solving general matrix equations are studied by using the hierarchical identification rincile. The analysis indicates that the algorithms roosed has good convergence roerties for

6 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 50, NO. 8, AUGUST any initial value, and do not require that the coefficient matrices are of the same size, are stable, have common characteristic roots. Although the algorithms are resented for linear matrix equations, the method adoted can be easily extended to study iterative solutions of nonlinear matrix equations, e.g., the Riccati equations. ACKNOWLEDGMENT The authors are grateful to the anonymous reviewers for their helful comments and suggestions. REFERENCES [1] P. Benner and E. S. Quintana-Ortí, Solving stable generalized Lyaunov equations with the matrix sign function, Numer. Algorithms, vol. 20, no. 1, , [2] R. Bitmead, Exlicit solutions of the discrete-time Lyaunov matrix equation and Kalman Yaubovich equations, IEEE Trans. Autom. Control, vol. AC-26, no. 6, , Dec [3] R. Bitmead and H. Weiss, On the solution of the discrete-time Lyaunov matrix equation in controllable canonical form, IEEE Trans. Autom. Control, vol. AC-24, no. 3, , Jun [4] E. Davison and F. Man, The numerical solution of + =, IEEE Trans. Autom. Control, vol. AC-13, no. 4, , Aug [5] F. Ding and T. Chen, Iterative least squares solutions of couled Sylvester matrix equations, Syst. Control Lett., vol. 54, no. 2, , [6], Hierarchical gradient-based identification of multivariable discrete-time systems, Automatica, vol. 41, no. 2, , [7], Hierarchical least squares identification methods for multivariable systems, IEEE Trans. Autom. Control, vol. 50, no. 3, , Mar [8] Y. Fang, K. A. Loaro, and X. Feng, New estimates for solutions of Lyaunov equations, IEEE Trans. Autom. Control, vol. 42, no. 3, , Mar [9] G. H. Golub, S. Nash, and C. F. Van Loan, A Hessenberg-Schur method for the matrix roblem + =, IEEE Trans. Autom. Control, vol. AC-24, no. 6, , Dec [10] G. H. Golub and C. F. Van Loan, Matrix Comutations, 3rd ed. Baltimore, MD: Johns Hoins Univ. Press, [11] J. Heinen, A technique for solving the extended discrete Lyaunov matrix equation, IEEE Trans. Autom. Control, vol. AC-17, no. 1, , Feb [12] I. Jonsson and B. Kågström, Recursive bloced algorithms for solving triangular systems Part I: One-sided and couled Sylvester-tye matrix equations, ACM Trans. Math. Software, vol. 28, no. 4, , [13], Recursive bloced algorithms for solving triangular systems Part II: Two-sided and generalized Sylvester and Lyaunov matrix equations, ACM Trans. Math. Software, vol. 28, no. 4, , [14] W. H. Kwon, Y. S. Moon, and S. C. Ahn, Bounds in algebraic Riccati and Lyaunov equations: A survey and some new results, Int. J. Control, vol. 64, , [15] T. Mori and A. Derese, A brief summary of the bounds on the solution of the algebraic matrix equations in control theory, Int. J. Control, vol. 39, , [16] H. Muaidani, H. Xu, and K. Mizuami, New iterative algorithm for algebraic Riccati equation related to control roblem of singularly erturbed systems, IEEE Trans. Autom. Control, vol. 46, no. 10, , Oct [17] G. Stare and W. Niethammer, SOR for =, Linear Alg. Al., vol. 154, , [18] T. Styel, Numerical solution and erturbation theory for generalized Lyaunov equations, Linear Alg. Al., vol. 349, no. 1, , An Imroved Lower Matrix Bound of the Solution of the Unified Couled Riccati Equation Chien-Hua Lee Abstract A new lower matrix bound of the solution for the unified couled algebraic Riccati equation (UCARE) is roosed. This bound imroves the drawbac of the results resented in a revious aer. Index Terms Continuous couled algebraic Riccati equation (CCARE), discrete couled algebraic Riccati equation (DCARE), lower matrix bound, unified couled algebraic Riccati equation (UCARE). I. INTRODUCTION It is nown that the so-called couled algebraic Riccati equations arose and layed an imortant role in the jum linear-quadratic control roblem [2], [6], [8], [9] and in many other imortant engineering roblems [3]. Recently, by maing use of the delta oerator develoed by [7], Czorni and Swiernia roosed in [4] a unified couled algebraic Riccati equation (UCARE)and resented several eigenvalue bounds of its solution. By utilizing these eigenvalue bounds, they then derived a lower matrix bound for the UCARE. However, for the roosed matrix bound, its form is very comlicated and a condition must be satisfied. In ractice, matrix bounds of the UCARE can give rough estimates before actually solving it and can chec whether the solution techniques for the UCARE actually yielded valid solutions. Besides, matrix bounds are the most general findings among all the solution bounds of the UCARE. Therefore, we then study the matrix bound of the solution of the UCARE in order to imrove the drawbac of the arallel result of [4]. By extending Lee s method [5], a new matrix bound of the solution of the UCARE is derived. Comarisons show that the obtained result does not need any condition and is more concise. The following symbol conventions are used in this note. A>()B means matrix A 0 B is ositive (semi)definite; i(a) and i (A), resectively, denote the ith eigenvalue and the ith singular value of a symmetric n 2 n matrix A for i = 1; 2;...;n, whereas i(a) and i(a), resectively, are arranged in the nonincreasing order (i.e., 1(A) 2(A) 111 n (A) and 1(A) 2(A) 111 n(a)). Furthermore, scalar function f (a; b; c) is defined as f (a; b; c) (c=a +(a 2 + bc) 1=2 ). II. MAIN RESULTS In recent years, [3] has roosed the UCARE F i A i + A T i F i +1A T i F i A i 0 1A T i + I F i B i I +1B T i F i B i 01 B T i F i (1A i + I) + ij P j = 0Q i (1) j6=i where A i 2< n2n ;B i 2< n2m, matrix Q i 2< n2n is symmetric and ositive semidefinite, P i 2< n2n denotes the ositive semidefinite solution, ij; 1 2 [0; 1);i2 S; S = f1; 2;...;sg is a finite set, and F i = P i +1 j6=i ijpj : (2) Manuscrit received October 10, 2003; revised March 23, 2004, October 11, 2004, and March 31, Recommended by Associate Editor M. Kothare. This wor was suorted by Cheng-Shiu University under Grant CS The author is with the Deartment of Electrical Engineering, Cheng-Shiu University, Kaohsiung 833, Taiwan, R.O.C. ( chienhua@csu.edu.tw). Digital Object Identifier /TAC /$ IEEE

2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S.

2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S. -D Analysis for Iterative Learning Controller for Discrete-ime Systems With Variable Initial Conditions Yong FANG, and ommy W. S. Chow Abstract In this aer, an iterative learning controller alying to linear

More information

Numerical Linear Algebra

Numerical Linear Algebra Numerical Linear Algebra Numerous alications in statistics, articularly in the fitting of linear models. Notation and conventions: Elements of a matrix A are denoted by a ij, where i indexes the rows and

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

Improving AOR Method for a Class of Two-by-Two Linear Systems

Improving AOR Method for a Class of Two-by-Two Linear Systems Alied Mathematics 2 2 236-24 doi:4236/am22226 Published Online February 2 (htt://scirporg/journal/am) Imroving AOR Method for a Class of To-by-To Linear Systems Abstract Cuixia Li Shiliang Wu 2 College

More information

216 S. Chandrasearan and I.C.F. Isen Our results dier from those of Sun [14] in two asects: we assume that comuted eigenvalues or singular values are

216 S. Chandrasearan and I.C.F. Isen Our results dier from those of Sun [14] in two asects: we assume that comuted eigenvalues or singular values are Numer. Math. 68: 215{223 (1994) Numerische Mathemati c Sringer-Verlag 1994 Electronic Edition Bacward errors for eigenvalue and singular value decomositions? S. Chandrasearan??, I.C.F. Isen??? Deartment

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

Generation of Linear Models using Simulation Results

Generation of Linear Models using Simulation Results 4. IMACS-Symosium MATHMOD, Wien, 5..003,. 436-443 Generation of Linear Models using Simulation Results Georg Otte, Sven Reitz, Joachim Haase Fraunhofer Institute for Integrated Circuits, Branch Lab Design

More information

Research Article An Iterative Algorithm for the Reflexive Solution of the General Coupled Matrix Equations

Research Article An Iterative Algorithm for the Reflexive Solution of the General Coupled Matrix Equations he Scientific World Journal Volume 013 Article ID 95974 15 ages htt://dxdoiorg/101155/013/95974 Research Article An Iterative Algorithm for the Reflexive Solution of the General Couled Matrix Euations

More information

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System Vol.7, No.7 (4),.37-38 htt://dx.doi.org/.457/ica.4.7.7.3 Robust Predictive Control of Inut Constraints and Interference Suression for Semi-Trailer System Zhao, Yang Electronic and Information Technology

More information

Research Article Controllability of Linear Discrete-Time Systems with Both Delayed States and Delayed Inputs

Research Article Controllability of Linear Discrete-Time Systems with Both Delayed States and Delayed Inputs Abstract and Alied Analysis Volume 203 Article ID 97546 5 ages htt://dxdoiorg/055/203/97546 Research Article Controllability of Linear Discrete-Time Systems with Both Delayed States and Delayed Inuts Hong

More information

Specialized and hybrid Newton schemes for the matrix pth root

Specialized and hybrid Newton schemes for the matrix pth root Secialized and hybrid Newton schemes for the matrix th root Braulio De Abreu Marlliny Monsalve Marcos Raydan June 15, 2006 Abstract We discuss different variants of Newton s method for comuting the th

More information

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various

More information

Optimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment

Optimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment Neutrosohic Sets and Systems Vol 14 016 93 University of New Mexico Otimal Design of Truss Structures Using a Neutrosohic Number Otimization Model under an Indeterminate Environment Wenzhong Jiang & Jun

More information

State Estimation with ARMarkov Models

State Estimation with ARMarkov Models Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,

More information

Linear diophantine equations for discrete tomography

Linear diophantine equations for discrete tomography Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,

More information

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS #A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,

More information

A Recursive Block Incomplete Factorization. Preconditioner for Adaptive Filtering Problem

A Recursive Block Incomplete Factorization. Preconditioner for Adaptive Filtering Problem Alied Mathematical Sciences, Vol. 7, 03, no. 63, 3-3 HIKARI Ltd, www.m-hiari.com A Recursive Bloc Incomlete Factorization Preconditioner for Adative Filtering Problem Shazia Javed School of Mathematical

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

Applicable Analysis and Discrete Mathematics available online at HENSEL CODES OF SQUARE ROOTS OF P-ADIC NUMBERS

Applicable Analysis and Discrete Mathematics available online at   HENSEL CODES OF SQUARE ROOTS OF P-ADIC NUMBERS Alicable Analysis and Discrete Mathematics available online at htt://efmath.etf.rs Al. Anal. Discrete Math. 4 (010), 3 44. doi:10.98/aadm1000009m HENSEL CODES OF SQUARE ROOTS OF P-ADIC NUMBERS Zerzaihi

More information

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces Abstract and Alied Analysis Volume 2012, Article ID 264103, 11 ages doi:10.1155/2012/264103 Research Article An iterative Algorithm for Hemicontractive Maings in Banach Saces Youli Yu, 1 Zhitao Wu, 2 and

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS #A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS Ramy F. Taki ElDin Physics and Engineering Mathematics Deartment, Faculty of Engineering, Ain Shams University, Cairo, Egyt

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

Probability Estimates for Multi-class Classification by Pairwise Coupling

Probability Estimates for Multi-class Classification by Pairwise Coupling Probability Estimates for Multi-class Classification by Pairwise Couling Ting-Fan Wu Chih-Jen Lin Deartment of Comuter Science National Taiwan University Taiei 06, Taiwan Ruby C. Weng Deartment of Statistics

More information

Additive results for the generalized Drazin inverse in a Banach algebra

Additive results for the generalized Drazin inverse in a Banach algebra Additive results for the generalized Drazin inverse in a Banach algebra Dragana S. Cvetković-Ilić Dragan S. Djordjević and Yimin Wei* Abstract In this aer we investigate additive roerties of the generalized

More information

Uniform Sample Generations from Contractive Block Toeplitz Matrices

Uniform Sample Generations from Contractive Block Toeplitz Matrices IEEE TRASACTIOS O AUTOMATIC COTROL, VOL 5, O 9, SEPTEMBER 6 559 Uniform Samle Generations from Contractive Bloc Toelitz Matrices Tong Zhou and Chao Feng Abstract This note deals with generating a series

More information

Chater Matrix Norms and Singular Value Decomosition Introduction In this lecture, we introduce the notion of a norm for matrices The singular value de

Chater Matrix Norms and Singular Value Decomosition Introduction In this lecture, we introduce the notion of a norm for matrices The singular value de Lectures on Dynamic Systems and Control Mohammed Dahleh Munther A Dahleh George Verghese Deartment of Electrical Engineering and Comuter Science Massachuasetts Institute of Technology c Chater Matrix Norms

More information

Lilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3

Lilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3 Pesquisa Oeracional (2013) 33(1): 123-132 2013 Brazilian Oerations Research Society Printed version ISSN 0101-7438 / Online version ISSN 1678-5142 www.scielo.br/oe SOME RESULTS ABOUT THE CONNECTIVITY OF

More information

A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract

A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS CASEY BRUCK 1. Abstract The goal of this aer is to rovide a concise way for undergraduate mathematics students to learn about how rime numbers behave

More information

CSC165H, Mathematical expression and reasoning for computer science week 12

CSC165H, Mathematical expression and reasoning for computer science week 12 CSC165H, Mathematical exression and reasoning for comuter science week 1 nd December 005 Gary Baumgartner and Danny Hea hea@cs.toronto.edu SF4306A 416-978-5899 htt//www.cs.toronto.edu/~hea/165/s005/index.shtml

More information

Radial Basis Function Networks: Algorithms

Radial Basis Function Networks: Algorithms Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

LINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL

LINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL LINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL Mohammad Bozorg Deatment of Mechanical Engineering University of Yazd P. O. Box 89195-741 Yazd Iran Fax: +98-351-750110

More information

Node-voltage method using virtual current sources technique for special cases

Node-voltage method using virtual current sources technique for special cases Node-oltage method using irtual current sources technique for secial cases George E. Chatzarakis and Marina D. Tortoreli Electrical and Electronics Engineering Deartments, School of Pedagogical and Technological

More information

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

Uniformly best wavenumber approximations by spatial central difference operators: An initial investigation

Uniformly best wavenumber approximations by spatial central difference operators: An initial investigation Uniformly best wavenumber aroximations by satial central difference oerators: An initial investigation Vitor Linders and Jan Nordström Abstract A characterisation theorem for best uniform wavenumber aroximations

More information

Positive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Application

Positive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Application BULGARIA ACADEMY OF SCIECES CYBEREICS AD IFORMAIO ECHOLOGIES Volume 9 o 3 Sofia 009 Positive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Alication Svetoslav Savov Institute of Information

More information

TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES

TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES Khayyam J. Math. DOI:10.22034/kjm.2019.84207 TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES ISMAEL GARCÍA-BAYONA Communicated by A.M. Peralta Abstract. In this aer, we define two new Schur and

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

arxiv: v1 [quant-ph] 20 Jun 2017

arxiv: v1 [quant-ph] 20 Jun 2017 A Direct Couling Coherent Quantum Observer for an Oscillatory Quantum Plant Ian R Petersen arxiv:76648v quant-h Jun 7 Abstract A direct couling coherent observer is constructed for a linear quantum lant

More information

Sums of independent random variables

Sums of independent random variables 3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where

More information

Applied Mathematics and Computation

Applied Mathematics and Computation Alied Mathematics and Comutation 217 (2010) 1887 1895 Contents lists available at ScienceDirect Alied Mathematics and Comutation journal homeage: www.elsevier.com/locate/amc Derivative free two-oint methods

More information

Multiplicative group law on the folium of Descartes

Multiplicative group law on the folium of Descartes Multilicative grou law on the folium of Descartes Steluţa Pricoie and Constantin Udrişte Abstract. The folium of Descartes is still studied and understood today. Not only did it rovide for the roof of

More information

Participation Factors. However, it does not give the influence of each state on the mode.

Participation Factors. However, it does not give the influence of each state on the mode. Particiation Factors he mode shae, as indicated by the right eigenvector, gives the relative hase of each state in a articular mode. However, it does not give the influence of each state on the mode. We

More information

Multi-Operation Multi-Machine Scheduling

Multi-Operation Multi-Machine Scheduling Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job

More information

An Inverse Problem for Two Spectra of Complex Finite Jacobi Matrices

An Inverse Problem for Two Spectra of Complex Finite Jacobi Matrices Coyright 202 Tech Science Press CMES, vol.86, no.4,.30-39, 202 An Inverse Problem for Two Sectra of Comlex Finite Jacobi Matrices Gusein Sh. Guseinov Abstract: This aer deals with the inverse sectral roblem

More information

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., DECEMBER 4 336 Some Unitary Sace Time Codes From Shere Packing Theory With Otimal Diversity Product of Code Size Haiquan Wang, Genyuan Wang, and Xiang-Gen

More information

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

An Estimate For Heilbronn s Exponential Sum

An Estimate For Heilbronn s Exponential Sum An Estimate For Heilbronn s Exonential Sum D.R. Heath-Brown Magdalen College, Oxford For Heini Halberstam, on his retirement Let be a rime, and set e(x) = ex(2πix). Heilbronn s exonential sum is defined

More information

Coding Along Hermite Polynomials for Gaussian Noise Channels

Coding Along Hermite Polynomials for Gaussian Noise Channels Coding Along Hermite olynomials for Gaussian Noise Channels Emmanuel A. Abbe IG, EFL Lausanne, 1015 CH Email: emmanuel.abbe@efl.ch Lizhong Zheng LIDS, MIT Cambridge, MA 0139 Email: lizhong@mit.edu Abstract

More information

Almost 4000 years ago, Babylonians had discovered the following approximation to. x 2 dy 2 =1, (5.0.2)

Almost 4000 years ago, Babylonians had discovered the following approximation to. x 2 dy 2 =1, (5.0.2) Chater 5 Pell s Equation One of the earliest issues graled with in number theory is the fact that geometric quantities are often not rational. For instance, if we take a right triangle with two side lengths

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

Mobius Functions, Legendre Symbols, and Discriminants

Mobius Functions, Legendre Symbols, and Discriminants Mobius Functions, Legendre Symbols, and Discriminants 1 Introduction Zev Chonoles, Erick Knight, Tim Kunisky Over the integers, there are two key number-theoretic functions that take on values of 1, 1,

More information

2 K. ENTACHER 2 Generalized Haar function systems In the following we x an arbitrary integer base b 2. For the notations and denitions of generalized

2 K. ENTACHER 2 Generalized Haar function systems In the following we x an arbitrary integer base b 2. For the notations and denitions of generalized BIT 38 :2 (998), 283{292. QUASI-MONTE CARLO METHODS FOR NUMERICAL INTEGRATION OF MULTIVARIATE HAAR SERIES II KARL ENTACHER y Deartment of Mathematics, University of Salzburg, Hellbrunnerstr. 34 A-52 Salzburg,

More information

Iteration with Stepsize Parameter and Condition Numbers for a Nonlinear Matrix Equation

Iteration with Stepsize Parameter and Condition Numbers for a Nonlinear Matrix Equation Electronic Journal of Linear Algebra Volume 34 Volume 34 2018) Article 16 2018 Iteration with Stesize Parameter and Condition Numbers for a Nonlinear Matrix Equation Syed M Raza Shah Naqvi Pusan National

More information

Minimax Design of Nonnegative Finite Impulse Response Filters

Minimax Design of Nonnegative Finite Impulse Response Filters Minimax Design of Nonnegative Finite Imulse Resonse Filters Xiaoing Lai, Anke Xue Institute of Information and Control Hangzhou Dianzi University Hangzhou, 3118 China e-mail: laix@hdu.edu.cn; akxue@hdu.edu.cn

More information

Research Article A New Method to Study Analytic Inequalities

Research Article A New Method to Study Analytic Inequalities Hindawi Publishing Cororation Journal of Inequalities and Alications Volume 200, Article ID 69802, 3 ages doi:0.55/200/69802 Research Article A New Method to Study Analytic Inequalities Xiao-Ming Zhang

More information

Verifying Two Conjectures on Generalized Elite Primes

Verifying Two Conjectures on Generalized Elite Primes 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 12 (2009), Article 09.4.7 Verifying Two Conjectures on Generalized Elite Primes Xiaoqin Li 1 Mathematics Deartment Anhui Normal University Wuhu 241000,

More information

Math 104B: Number Theory II (Winter 2012)

Math 104B: Number Theory II (Winter 2012) Math 104B: Number Theory II (Winter 01) Alina Bucur Contents 1 Review 11 Prime numbers 1 Euclidean algorithm 13 Multilicative functions 14 Linear diohantine equations 3 15 Congruences 3 Primes as sums

More information

Solution sheet ξi ξ < ξ i+1 0 otherwise ξ ξ i N i,p 1 (ξ) + where 0 0

Solution sheet ξi ξ < ξ i+1 0 otherwise ξ ξ i N i,p 1 (ξ) + where 0 0 Advanced Finite Elements MA5337 - WS7/8 Solution sheet This exercise sheets deals with B-slines and NURBS, which are the basis of isogeometric analysis as they will later relace the olynomial ansatz-functions

More information

Observer/Kalman Filter Time Varying System Identification

Observer/Kalman Filter Time Varying System Identification Observer/Kalman Filter Time Varying System Identification Manoranjan Majji Texas A&M University, College Station, Texas, USA Jer-Nan Juang 2 National Cheng Kung University, Tainan, Taiwan and John L. Junins

More information

arxiv: v1 [physics.data-an] 26 Oct 2012

arxiv: v1 [physics.data-an] 26 Oct 2012 Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information

NONLINEAR OPTIMIZATION WITH CONVEX CONSTRAINTS. The Goldstein-Levitin-Polyak algorithm

NONLINEAR OPTIMIZATION WITH CONVEX CONSTRAINTS. The Goldstein-Levitin-Polyak algorithm - (23) NLP - NONLINEAR OPTIMIZATION WITH CONVEX CONSTRAINTS The Goldstein-Levitin-Polya algorithm We consider an algorithm for solving the otimization roblem under convex constraints. Although the convexity

More information

COMPARISON OF VARIOUS OPTIMIZATION TECHNIQUES FOR DESIGN FIR DIGITAL FILTERS

COMPARISON OF VARIOUS OPTIMIZATION TECHNIQUES FOR DESIGN FIR DIGITAL FILTERS NCCI 1 -National Conference on Comutational Instrumentation CSIO Chandigarh, INDIA, 19- March 1 COMPARISON OF VARIOUS OPIMIZAION ECHNIQUES FOR DESIGN FIR DIGIAL FILERS Amanjeet Panghal 1, Nitin Mittal,Devender

More information

Approximation of the Euclidean Distance by Chamfer Distances

Approximation of the Euclidean Distance by Chamfer Distances Acta Cybernetica 0 (0 399 47. Aroximation of the Euclidean Distance by Chamfer Distances András Hajdu, Lajos Hajdu, and Robert Tijdeman Abstract Chamfer distances lay an imortant role in the theory of

More information

Generalized Coiflets: A New Family of Orthonormal Wavelets

Generalized Coiflets: A New Family of Orthonormal Wavelets Generalized Coiflets A New Family of Orthonormal Wavelets Dong Wei, Alan C Bovik, and Brian L Evans Laboratory for Image and Video Engineering Deartment of Electrical and Comuter Engineering The University

More information

MA3H1 TOPICS IN NUMBER THEORY PART III

MA3H1 TOPICS IN NUMBER THEORY PART III MA3H1 TOPICS IN NUMBER THEORY PART III SAMIR SIKSEK 1. Congruences Modulo m In quadratic recirocity we studied congruences of the form x 2 a (mod ). We now turn our attention to situations where is relaced

More information

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Journal of Modern Alied Statistical Methods Volume Issue Article 7 --03 A Comarison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Ghadban Khalaf King Khalid University, Saudi

More information

MULTI-CHANNEL PARAMETRIC ESTIMATOR FAST BLOCK MATRIX INVERSES

MULTI-CHANNEL PARAMETRIC ESTIMATOR FAST BLOCK MATRIX INVERSES MULTI-CANNEL ARAMETRIC ESTIMATOR FAST BLOCK MATRIX INVERSES S Lawrence Marle Jr School of Electrical Engineering and Comuter Science Oregon State University Corvallis, OR 97331 Marle@eecsoregonstateedu

More information

Feedback-Based Iterative Learning Control for MIMO LTI Systems

Feedback-Based Iterative Learning Control for MIMO LTI Systems International Journal of Control, Feedback-Based Automation, Iterative and Systems, Learning vol. Control 6, no., for. MIMO 69-77, LTI Systems Aril 8 69 Feedback-Based Iterative Learning Control for MIMO

More information

Rotations in Curved Trajectories for Unconstrained Minimization

Rotations in Curved Trajectories for Unconstrained Minimization Rotations in Curved rajectories for Unconstrained Minimization Alberto J Jimenez Mathematics Deartment, California Polytechnic University, San Luis Obiso, CA, USA 9407 Abstract Curved rajectories Algorithm

More information

E( x ) [b(n) - a(n, m)x(m) ]

E( x ) [b(n) - a(n, m)x(m) ] Homework #, EE5353. An XOR network has two inuts, one hidden unit, and one outut. It is fully connected. Gie the network's weights if the outut unit has a ste actiation and the hidden unit actiation is

More information

Elliptic Curves Spring 2015 Problem Set #1 Due: 02/13/2015

Elliptic Curves Spring 2015 Problem Set #1 Due: 02/13/2015 18.783 Ellitic Curves Sring 2015 Problem Set #1 Due: 02/13/2015 Descrition These roblems are related to the material covered in Lectures 1-2. Some of them require the use of Sage, and you will need to

More information

STABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS

STABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS STABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS Massimo Vaccarini Sauro Longhi M. Reza Katebi D.I.I.G.A., Università Politecnica delle Marche, Ancona, Italy

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

Notes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle

Notes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle McMaster University Advanced Otimization Laboratory Title: Notes on duality in second order and -order cone otimization Author: Erling D. Andersen, Cornelis Roos and Tamás Terlaky AdvOl-Reort No. 000/8

More information

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)

More information

A numerical implementation of a predictor-corrector algorithm for sufcient linear complementarity problem

A numerical implementation of a predictor-corrector algorithm for sufcient linear complementarity problem A numerical imlementation of a redictor-corrector algorithm for sufcient linear comlementarity roblem BENTERKI DJAMEL University Ferhat Abbas of Setif-1 Faculty of science Laboratory of fundamental and

More information

The Fekete Szegő theorem with splitting conditions: Part I

The Fekete Szegő theorem with splitting conditions: Part I ACTA ARITHMETICA XCIII.2 (2000) The Fekete Szegő theorem with slitting conditions: Part I by Robert Rumely (Athens, GA) A classical theorem of Fekete and Szegő [4] says that if E is a comact set in the

More information

Session 5: Review of Classical Astrodynamics

Session 5: Review of Classical Astrodynamics Session 5: Review of Classical Astrodynamics In revious lectures we described in detail the rocess to find the otimal secific imulse for a articular situation. Among the mission requirements that serve

More information

Developing A Deterioration Probabilistic Model for Rail Wear

Developing A Deterioration Probabilistic Model for Rail Wear International Journal of Traffic and Transortation Engineering 2012, 1(2): 13-18 DOI: 10.5923/j.ijtte.20120102.02 Develoing A Deterioration Probabilistic Model for Rail Wear Jabbar-Ali Zakeri *, Shahrbanoo

More information

p-adic Measures and Bernoulli Numbers

p-adic Measures and Bernoulli Numbers -Adic Measures and Bernoulli Numbers Adam Bowers Introduction The constants B k in the Taylor series exansion t e t = t k B k k! k=0 are known as the Bernoulli numbers. The first few are,, 6, 0, 30, 0,

More information

The Algebraic Structure of the p-order Cone

The Algebraic Structure of the p-order Cone The Algebraic Structure of the -Order Cone Baha Alzalg Abstract We study and analyze the algebraic structure of the -order cones We show that, unlike oularly erceived, the -order cone is self-dual for

More information

A Note on the Positive Nonoscillatory Solutions of the Difference Equation

A Note on the Positive Nonoscillatory Solutions of the Difference Equation Int. Journal of Math. Analysis, Vol. 4, 1, no. 36, 1787-1798 A Note on the Positive Nonoscillatory Solutions of the Difference Equation x n+1 = α c ix n i + x n k c ix n i ) Vu Van Khuong 1 and Mai Nam

More information

ESTIMATION OF THE OUTPUT DEVIATION NORM FOR UNCERTAIN, DISCRETE-TIME NONLINEAR SYSTEMS IN A STATE DEPENDENT FORM

ESTIMATION OF THE OUTPUT DEVIATION NORM FOR UNCERTAIN, DISCRETE-TIME NONLINEAR SYSTEMS IN A STATE DEPENDENT FORM Int. J. Al. Math. Comut. Sci. 2007 Vol. 17 No. 4 505 513 DOI: 10.2478/v10006-007-0042-z ESTIMATION OF THE OUTPUT DEVIATION NORM FOR UNCERTAIN DISCRETE-TIME NONLINEAR SYSTEMS IN A STATE DEPENDENT FORM PRZEMYSŁAW

More information

The Recursive Fitting of Multivariate. Complex Subset ARX Models

The Recursive Fitting of Multivariate. Complex Subset ARX Models lied Mathematical Sciences, Vol. 1, 2007, no. 23, 1129-1143 The Recursive Fitting of Multivariate Comlex Subset RX Models Jack Penm School of Finance and lied Statistics NU College of Business & conomics

More information

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment

More information

Topic 7: Using identity types

Topic 7: Using identity types Toic 7: Using identity tyes June 10, 2014 Now we would like to learn how to use identity tyes and how to do some actual mathematics with them. By now we have essentially introduced all inference rules

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

Supplementary Materials for Robust Estimation of the False Discovery Rate

Supplementary Materials for Robust Estimation of the False Discovery Rate Sulementary Materials for Robust Estimation of the False Discovery Rate Stan Pounds and Cheng Cheng This sulemental contains roofs regarding theoretical roerties of the roosed method (Section S1), rovides

More information

Efficient algorithms for the smallest enclosing ball problem

Efficient algorithms for the smallest enclosing ball problem Efficient algorithms for the smallest enclosing ball roblem Guanglu Zhou, Kim-Chuan Toh, Jie Sun November 27, 2002; Revised August 4, 2003 Abstract. Consider the roblem of comuting the smallest enclosing

More information

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION O P E R A T I O N S R E S E A R C H A N D D E C I S I O N S No. 27 DOI:.5277/ord73 Nasrullah KHAN Muhammad ASLAM 2 Kyung-Jun KIM 3 Chi-Hyuck JUN 4 A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST

More information

A sharp generalization on cone b-metric space over Banach algebra

A sharp generalization on cone b-metric space over Banach algebra Available online at www.isr-ublications.com/jnsa J. Nonlinear Sci. Al., 10 2017), 429 435 Research Article Journal Homeage: www.tjnsa.com - www.isr-ublications.com/jnsa A shar generalization on cone b-metric

More information

Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process

Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process P. Mantalos a1, K. Mattheou b, A. Karagrigoriou b a.deartment of Statistics University of Lund

More information

THE DIOPHANTINE EQUATION x 4 +1=Dy 2

THE DIOPHANTINE EQUATION x 4 +1=Dy 2 MATHEMATICS OF COMPUTATION Volume 66, Number 9, July 997, Pages 347 35 S 005-57897)0085-X THE DIOPHANTINE EQUATION x 4 +=Dy J. H. E. COHN Abstract. An effective method is derived for solving the equation

More information

Chapter 7 Sampling and Sampling Distributions. Introduction. Selecting a Sample. Introduction. Sampling from a Finite Population

Chapter 7 Sampling and Sampling Distributions. Introduction. Selecting a Sample. Introduction. Sampling from a Finite Population Chater 7 and s Selecting a Samle Point Estimation Introduction to s of Proerties of Point Estimators Other Methods Introduction An element is the entity on which data are collected. A oulation is a collection

More information