arxiv: v1 [math.na] 9 Mar 2015

Size: px
Start display at page:

Download "arxiv: v1 [math.na] 9 Mar 2015"

Transcription

1 APPROXIMATION OF FUNCTIONS OF LARGE MATRICES WITH KRONECKER STRUCTURE MICHELE BENZI AND VALERIA SIMONCINI arxiv:53.265v [ath.na] 9 Mar 25 Abstract. We consider the nuerical approxiation of f(a)b where b R N and A is the su of Kronecker products, that is A = M 2 I + I M R N N. Here f is a regular function such that f(a) is well defined. We derive a coputational strategy that significantly lowers the eory requireents and coputational efforts of the standard approxiations, with special ephasis on the exponential function, for which the new procedure becoes particularly advantageous. Our findings are illustrated by nuerical experients with typical functions used in applications. Key words. atrix functions, sparse atrices, Krylov ethods, Kronecker structure. Introduction. We consider the proble of approxiating f(a)b (.) where f is a sufficiently regular function defined on the spectru of A (see [2]), and A = M 2 I +I M R N N (.2) is the su of Kroneckerproducts with M R n n, M 2 R n2 n2 so that N = n n 2, b = vec(b) with B a atrix of low rank with diensions copatible with that of b. The Kronecker (or tensor) product of two atrices X and Y of size n x x and n y y, respectively, is defined as x Y x 2 Y x x Y x 2 Y x 22 Y x 2x Y X Y = ; Rnxny xy x nxy a nx2y x nx x Y the vec operator stacks the coluns of a atrix X = [x,...,x ] R n one after the other as vec(x) = x. x R n. The proble of approxiating (.) for general A is very iportant in several applications and has long attracted considerable attention; we refer the reader to [2] and to [3] for coprehensive treatents of the proble and for any ways of nuerically approxiating its solution. For the case when A has large diensions, new effective approaches have been devised, aking the use of atrix function evaluations an iportant tool for solving large scale (three-diensional) scientific and engineering probles involving discretized partial differential equations; see, e.g., [4, 22, 23]. In Departent of Matheatics and Coputer Science, Eory University, Atlanta, Georgia 3322, USA (benzi@athcs.eory.edu). The work of this author was supported by National Science Foundation grants DMS-5692 and DMS Dipartiento di Mateatica, Università di Bologna, Piazza di Porta S. Donato 5, I-427 Bologna, Italy (valeria.sioncini@unibo.it). The work of this author was partially supported by the FARB2SIMO grant of the Università di Bologna.

2 2 M. Benzi and V. Sioncini particular, the Kronecker structure above arises whenever the doain is a rectangle or a parallelepiped and finite difference or certain low-order finite eleent ethods are eployed to discretize differential equations with separable coefficients; see, e.g., [7, 9] and references therein. Other applications leading to atrices with Kronecker su structure include iage processing [9], queueing theory [3, Chapter 9], graph analysis [, Chapter 3.4], and network design [36]. A significant body of literature is now available on efficient nuerical ethods for approxiately evaluating the product of f(a) ties a vector b, using particular spectral properties of A and under certain regularity conditions on f. To the best of our knowledge, the coputational advantages of exploiting, for a general function f, the possible Kronecker structure of A have not been addressed in the context of Krylov subspace ethods for large-scale probles of the for (.). By taking into account this structure, and also the possible low rank of B, the coputational setting changes significantly. We will show that the eory requireents can be drastically reduced: in fact, we show that by preserving the structure of the proble, faster convergence and significantly lower eory requireents can be achieved. More precisely, we acknowledge that the approxiation to functions of A is the coposition of distinct approxiations in ters of M and M 2, which are uch saller atrices. Siilar considerations can be ade for other properties of functions of atrices that are Kronecker sus, as is the case for their sparsity and decay patterns; see [6] for a recent analysis. Our results strongly rely on the low rank of the atrix B. In fact, but without loss of generality, we shall assue that B has rank equal to one, so that we can write B = b b T 2, b R n, b 2 R n2. For larger rank l in{n,n 2 }, we could still write B = B B2 T and proceed in a siilar anner. Our results also apply when B is nuerically low rank, that is, only a few singular values of B are above achine precision, or soe other sall tolerance. In this case, we could write b = b+b ǫ where b = vec( B) with B of low rank, and bǫ. If f(a) is not too large, f(a)b = f(a) b+f(a)b ǫ f(a) b. An outline of the paper is as follows. In section 2 we review soe standard techniquesforapproxiating(.)whenaislarge,andsetupthenotationfortherest of the paper. In section 3 we derive the structure-exploiting approxiation for general functions f such that f(a) is well defined. In section 4 we focus on the exponential function, for which the new procedure becoes particularly advantageous. Another iportant special case, the atrix inverse, is briefly discussed in section 5, and ore general atrix functions in section 6. Conclusions are given in section 7. Our findings are illustrated by nuerical experients with typical functions used in applications. 2. General approxiation by projection. A coon procedure for large A constructs an approxiation space, and a atrix V whose orthonoral coluns span that space, and obtain f(a)b Vf(H)e, H = V T AV, e = V T b. (2.) Depending on the spectral properties of the atrix A and on the vector b, the approxiation space diension ay need to be very large to obtain a good approxiation. Unfortunately, the whole atrix V ay need to be stored, liiting the applicability of the approach. This is the otivation behind the recently introduced restarted ethods, which try to cope with the growing space diensions by restarting the

3 Functions of atrices with Kronecker structure 3 approxiation process as soon as a fixed axiu subspace diension is reached [, 3]. A classical choice as approxiation space is given by the (standard) Krylov subspace K (A,b) = span{b,ab,...,a b}. An orthonoral basis {v,...,v } can be constructed sequentially via the Arnoldi recurrence, which can be written in short as AV = V H +hv + e T, V = [v,...,v ]; here e is the th vector of the canonical basis of R, H = V TAV (as stated earlier), and h = Av i= [H ] i v i. The past few years have seen a rapid increase in the use of richer approxiation spaces than standard Krylov subspaces. More precisely, rational Krylov subspaces, naely K (A,b,σ ) = span{b,(a σ I) b,..., (A σ i I) b}, (2.2) have been shown to be particularly well suited for atrix function approxiations; we refer the reader to [6] for a recent survey on various issues related to rational Krylov subspace approxiations of atrix functions. A special case is given by the extended Krylov subspace, which alternates powers of A with powers of A [7, 26]. 3. Exploiting the Kronecker structure. Assue that A has the for in(.2) and that, for siplicity, B has rank one, that is B = b b T 2. We generate distinct approxiations for the atrices M and M 2 ; in the case of the classical Krylov subspace these are given as and i= K (M,b ), M Q = Q T +q + t () e T K (M 2,b 2 ), M 2 P = P T 2 +p + t (2) e T. Note that the two spaces could have different diensions; we will use the sae diension for siplicity of presentation. The atrices Q and P have orthonoral coluns, and have a uch saller nuber of rows than V (the square root of it, if n = n 2 ). We thus consider the following quantity to define the approxiation: so that V = P Q AV = A(P Q ) = M 2 P Q +P M Q = (P T 2 Q +P Q T )+p + t (2) e T Q +P q + t () e T = (P Q )(T 2 I +I T )+low rank. Following the general setting in (2.), and defining T = T 2 I +I T we thus consider the approxiation f(a)b x := (P Q )z, z = f(t )(P Q ) T b. (3.) In case b is a atrix, the definition of a block Krylov subspace is copletely analogous, that is K (A,b) = range([b,ab,...,a b]).

4 4 M. Benzi and V. Sioncini WestressthattheatrixP Q doesnotneedtobeexplicitlycoputedandstored. Indeed, letting Z R be such that z = vec(z), it holds that x = vec(q ZP T ); oreover, (P Q ) T b = vec((q T b )(b T 2 P )). The following proposition provides a cheaper coputation in case both T and T 2 are diagonalizable, as is the case for instance when they are both syetric. Proposition 3.. Assue that the atrices T,T 2 are diagonalizable, and let T = XΛX, T 2 = YΘY be their eigendecopositions. Let g = f(θ I +I Λ)vec(X Q T b b T 2 P Y T ) R 2. With the notation and assuptions above, for G such that g = vec(g) it holds that x = vec(q XGY T P T ). Proof. Using the properties of the Kronecker product (see, e.g., [24, Corollary 4.2. and Theore 4.4.5]), the eigendecoposition of T = T 2 I +I T is given by T 2 I +I T = (Y X)(Θ I +I Λ)(Y X ), so that f(t ) = (Y X)f(Θ I +I Λ)(Y X ), where f(θ I +I Λ) is a diagonal atrix. The result follows fro explicitly writing down the eigenvector atrices associated with each Kronecker product; note that f(θ I +I Λ) can be coputed cheaply as both Θ and Λ are diagonal. In addition to providing a coputational procedure for deterining x, Proposition 3. reveals that, in exact arithetic, the true vector x = f(a)b can be obtained using inforation fro spaces of diension at ost = ax{n,n 2 }, whereas the standard approxiation x ay require a uch larger diension space. This fact is due to both the Kroneckerfor of A and the coposition of b, as b corresponds to the vectorization of the rank-one atrix b b T 2. The following exaples illustrate this property, while ore explicit forulas can be obtained for the exponential function, as we will describe in section 4. Exaple 3.2. We consider f(x) = x and M = M 2 = tridiag(, 2,) R n n, n = 5, each corresponding to the (scaled) centered three-point discretization oftheone-diensionalnegativelaplaceoperatorin(,). Wefirstconsiderb equalto the vector of all ones, and b 2 a vector of rando values uniforly distributed in (,); the results are shown in Table 3.. We observe that convergence is faster, in ters of space diension, for x. Moreover, once subspaces of diension = n = 5 are reached, a rather accurate approxiation is obtained with the structure-preserving approach, as the full eigenspace of M is generated. We next consider the case of b 2 = b (the vector of all ones) and report the nuerical experients in Table 3.2. Convergence is even faster in the structure preserving ethod, as apparently convergence is faster with b than with the original b 2. No ajor difference is observed in the standard procedure. Exaple 3.3. Data for this exaple are taken fro [3]. We consider the function f(z) = (e s z )/z with s = 3, and A = M I + I M, where M is the n n tridiagonal atrix of the finite difference discretization of the onediensional Laplace operator; b := b = b 2 is the vector of all ones. Table 3.

5 Functions of atrices with Kronecker structure 5 f(a)b x f(a)b x 5.446e e e- 2.75e e e e e e e e e e e e e e e e e-3 Fig. 3.. Exaple 3.2 for f(x) = x. b 2 b. f(a)b x f(a)b x 5.937e+.593e e e e-.3538e e e e-2.79e e-2.34e e e e-3.86e e e e e-2 Fig Exaple 3.2 for f(x) = x. b 2 = b. x x,old f(a)b x f(a)b x x x,old x x e e-.e+.e e- 2.25e- 2.27e e e-.365e-.366e-.297e e e e e e-2.76e e e e e e-2.935e e e e e e e e-3.366e e e-2.754e e e e e e e e e e e e e e-3 Table 3. Exaple 3.3. For f(x) = (e s z )/z with s = 3. Here n = 5. shows the approxiation history of the standard ethod and of the new approach for n = 5. Because of the sall size, we could copute and onitor the true error. In the last two coluns, however, we also report the relative difference between the last two approxiation iterates, which ay be considered as a siple-inded stopping criterion for larger n; see, e.g., [26] or [2] for ore sophisticated criteria. The results are as those of the previous exaples. In Table 3.2 we report the runs for n =, for which we could not copute the exact solution, so that only the error estiates are reported. The results are very siilar to the saller case. In this case, eory requireents of the structured approxiation becoe significantly lower than for the standard approach. 4. The case of the atrix exponential. The evaluation of (.) with f(a) = exp(a) presents special interest owing to its iportance in the nuerical solution of tie-dependent ODEs and PDEs [2, 22, 23]. The proble also arises in network science, when evaluating the total counicability of a network [5, ]. The exponential function provides a particularly favorable setting in the case of a atrix having Kronecker for. Indeed, due to the property (see, e.g., [2, Theore

6 6 M. Benzi and V. Sioncini x x,old x x x,old x 4.e+.e e e- 2.5e-.6289e- 6.76e-.966e e e e e e e e e e e e e e e e e e e e-3.354e e e-3 Table 3.2 Exaple 3.3. For f(x) = (e s z )/z with s = 3 and b 2 = b. Here n =..9]) exp(t 2 I +I T ) = exp(t 2 ) exp(t ), (4.) forula (3.) siplifies even further. Indeed, we obtain x = (P Q )exp(t 2 I +I T )(P Q ) T b = (P Q )(exp(t 2 ) exp(t ))(P Q ) T b = vec(q exp(t )Q T b b T 2P exp(t 2 ) T P T ) = vec(x () (x(2) )T ), (4.2) with x () = Q exp(t )Q T b and x (2) = P exp(t 2 )(P T b 2). We observe that the final approxiation x is the siple cobination of the two separate approxiations of exp(m )b and exp(m 2 )b 2. Indeed, the sae approxiation could be obtained by first writing exp(a)b = exp(m 2 ) exp(m )b = vec((exp(m )b )(b T 2 exp(m 2 ) T ), (4.3) and then using the standard approxiations exp(m )b Q exp(t )Q T b and exp(m 2 )b 2 P exp(t 2 )P T b 2. In the following we illustrate the behavior of the approxiation to the atrix exponential with a few nuerical exaples. Here the standard Krylov subspace is used in all instances for approxiating the corresponding vector. We stress that becauseofthe decreasedeoryallocationstogeneratek (M i,b i ), the coputation of x can afford significantly larger values of, than when building K (A,b). Exaple 4.. We consider the approxiation of exp(a)b with A as in (.2) and M = tridiag(, 2,) and M 2 = tridiag(2, 3,2), both of size n = n 2 = 7. Therefore, A has diension 49. Moreover, we take b = [,...,] T and b 2 a vector with rando values uniforly distributed in (, ). Thanks to the proble size, the

7 Functions of atrices with Kronecker structure 7 2 X X X X 2 X X error nor x () x () x (2) x (2) error nor X X x () () x x (2) x (2) space diension space diension Fig. 4.. Convergence history to exp(a)b. Left: Exaple 4.. Right: Exaple 4.2. vector exp(a)b could be coputed explicitly. Figure 4.(left) reports the convergence history as the space diension increases when using two different approaches: the first one uses K (A,b) as approxiation space, so that x = V exp(h )(Vb) T with H = VAV T ; the second one uses x in (4.2). We observe that the convergence of x is faster than that of x ; this fact will be explored in section 4.. The plot also reports the error nor in the approxiation of x () and x (2) : the error nor for x is ainly driven by that of the ost slowly converging approxiation between x () and x (2). Exaple 4.2. We odify Exaple 4. by setting M 2 = tridiag(, 2,), while M to be equal to the discretization by finite differences of the one-diensional nonselfadjoint operator L(u) = u xx u x on the interval [,]. Hence, M (and therefore A) is nonsyetric. The atrix diensions and the vectors b,b 2 are as in the previous exaple. The convergence history is reported in the right plot of Figure 4.. Siilar coents as for Exaple 4. can be deduced. Exaple 4.3. The next exaple arises in graph and network analysis. Given two graphs G = (V,E ) and G 2 = (V 2,E 2 ), we consider the Cartesian product G = G G 2 of the two given graphs, defined as follows. The vertex set of G is just the Cartesian product V V 2, and there is an edge between two vertices (u,u 2 ) and (v,v 2 ) of G if either u = v and (u 2,v 2 ) E 2, or u 2 = v 2 and (u,v ) E. The adjacency atrix of G is then the Kronecker su of the adjacency atrices of G and G 2 [, page 37]; see also [36] for definitions (and applications) in the case of directed graphs. A useful notion in the analysis of coplex networks is the total counicability, which is defined as the rowsu ofthe exponentialof the adjacencyatrix, see [5]. The entries of this vector provide a easure of the iportance of the nodes in the network, and can be coputed as exp(a)b where now b is the vector of all ones (note that the corresponding atrix B has rank one). We consider five Cartesian product graphs of the for G i = G i G i, with each G i being a Barabasi Albert graph constructed using the preferential attachent odel. The coand pref in the Matlab toolbox contest [34] was used (with the default choice of paraeters) to generate five graphs on n nodes, where n =,2,...,5. Thus, the adjacency atrices of the corresponding Cartesian product graphs G i have diension ranging between

8 8 M. Benzi and V. Sioncini estiate of error nor X X X X estiate of error nor 5 A A2 A3 A4 A space diension space diension Fig Exaple 4.3. Convergence history to exp(a)b. Left: Exaple 4.3, case n =. Right: Exaple 4.3, convergence history for all five cases. one and twenty-five illions. All the resulting atrices are syetric indefinite. Table 4. reports the CPU tie required to copute a basis for the Krylov subspace of diension = 3 as the graph atrix size increases (all runs were perfored with Matlab R2b [29] on a laptop with Intel Core i7-3687u CPU running at 2.Ghz with 7.7GiB eory). The last colun reports the tie when A is used, so that V exp(h )e b is coputed; the iddle colun refers to the case when M is used, sothat x in (4.2) is coputed. As expected, the CPUtie for K (M,b ) is several orders of agnitude saller than for K (A,b). In the latter case, tiings becae prohibitive for n = 3,, since the generation of the basis for the space entails the orthogonalization of vectors in R n2. The coputational costs reain extreely low when coputing a basis for K (M,b ). The left plot of Figure 4.2 shows the convergence history of the two approaches, in ters of space diensions, when the sallest atrix in the set is used. Convergence is onitored by easuring the difference between the last two iterates, as done in the previous exaples. Once again, convergence is faster when the Kronecker for is exploited. The right plot of Figure 4.2 reports the convergence history of x for all atrices in the set. All spectra are roughly contained in the interval [ 5, 5], therefore the expected convergence rate is approxiately the sae for all atrices. n CPU Tie CPU Tie K (M,b ) K (A,b) Table 4. Exaple 4.3. CPU Tie for the construction of the Krylov approxiation space of diension = 3 when using either M R n n (syetric) or A = M I + I M R n2 n 2. Only results for the sallest graph atrices A are reported when building K (A,b).

9 Functions of atrices with Kronecker structure 9 Reark 4.4. Besides the exponential, the atrix sine and cosine are also wellbehaved with respect to the Kronecker su structure. Indeed, the following identities hold [2, Theore 2.2]: and sin(m M 2 ) = sin(m ) cos(m 2 )+cos(m ) sin(m 2 ) (4.4) cos(m M 2 ) = cos(m ) cos(m 2 ) sin(m ) sin(m 2 ). (4.5) These identities can be exploited to greatly reduce the coputational cost and storage requireents for the evaluation of f(a)b when f is either the sine or cosine or a cobination of these functions. 4.. Convergence considerations. An expression for the error can be deduced by using the for in (4.3). Indeed, letting x () = exp(m )b and x (2) = exp(m 2 )b 2, and also X = x () (x (2) ) T and X = x() (x (2) ) T, it holds exp(a)b x = X X F = x () (x (2) x (2) ) T +(x () x () )(x (2) ) T F x () x (2) x (2) + x() x () x(2). (4.6) Therefore, the error nor in the approxiation to exp(a)b is bounded by the errors of the two separate approxiations with M and M 2. The relation (4.6) can also be used for deriving a priori convergence bounds for exp(a)b in ters of the bounds for M and M 2. We will give such bounds in the case M and M 2 are Heritian and positive definite. The following result was proved in [2]. Theore 4.5. Let M be a Heritian positive seidefinite atrix with eigenvalues in the interval [,4ρ]. Then the error in the Arnoldi approxiation of exp(τm)v with v =, naely, ε := exp( τm)v V exp( τt )e, is bounded in the following ways: i) ε exp( 2 /(5ρτ)), for ρτ and 4ρτ τ; ii) ε (ρτ) exp( ρτ) ( ) eρτ for τ. We next show how Theore 4.5 can be used to copare the difference in convergence rates between x and x. To siplify the presentation, we assue that M = M = M 2, and that b = b 2, with b =. We refer the reader to [4, 25] for estiates siilar to those of Theore 4.5. It can be shown that if λ i, i =,...,n are the eigenvalues of M (in decreasing order), then the n 2 eigenvalues of A are given by λ i +λ j, i,j {,...,n}; see, e.g., [24, Theore 4.4.5]. Therefore in particular, the largest and sallest eigenvalues of A equal 2λ and 2λ n, respectively. If we apply Theore 4.5 to M λ n I for τ =, then we obtain that for large enough the error is bounded as ε (M) exp( ρ) ρ ( eρ ), λ λ n ρ =. 4 On the other hand, Theore 4.5 applied to A 2λ n I yields ε (A) exp( ρ) ρ ( ) e ρ, ρ = 2λ 2λ n =. 4

10 M. Benzi and V. Sioncini The ratio between the two bounds is given by exp ( ) ρ 2 2, which is in favor of the coputation with M for sall ρ. In case ρ is very large, both ethods becoe very slow. 5. The case of the atrix inverse. Also very iportant in applications is the case of the inverse, f(a) = A where A has Kronecker su structure. The solution of linear systes of the for Ax = b arises in any applications (PDEs, iaging, Markov chains, networks, etc.) and Krylov subspace ethods are widely used, typically together with preconditioning, to solve such systes. The Kronecker structure can be readily exploited if b is the result of the vectorization of a low rank atrix. For siplicity, let us assue that b = vec(b b T 2). Then the syste Ax = b is equivalent to the following Sylvester equation (see, e.g., [24, Sec. 4.4]): M X +XM T 2 = b b T 2, x = vec(x). (5.) Nuerical ethods that exploit the sall size of M,M 2 can be used to solve the linear atrix equation in (5.). If n and n 2 are of order up to a few thousands, then the Bartels Stewart algorith can be used [2]. Otherwise, X can be approxiated by using different approaches, depending on the relative size of n and n 2 ; we refer the reader to [32] for detailed discussion of the available ethods and the related references. Here we briefly describe the idea of approxiate solution by projection onto an appropriate subspace, which will be used in section 6.2. For siplicity of exposition we assue M 2 = M and b 2 = b ; if this is not the case, straightforward odifications can be included; see [32]. If the orthonoral coluns of P (= Q ) are a basis for the considered subspace of R n of diension, then an approxiation to X is sought as X X = P Y P, T where Y R is deterined by iposing additional conditions. A coon strategy consists of iposing that the residual R := M X + X M T b b T be orthogonal to the generated subspace, that is, (P P ) T vec(r ) =, or, in atrix ters, PR T P =, where a zero atrix appears on the right-hand side. Substituting in this last equation the definition of R and X, gives P T M P Y P T P +P T P Y P T M T P P T b b T P =. Recalling that P T P = I and that P T M P = T, we obtain the sall scale linear equation whose solution yields Y. In particular, T Y +Y T T b b =, b = P T b, x x = X P Y P T F, (5.2) where F denotesthe Frobeniusnor. While wereferto [32]foradetailedanalysis, here we notice that the approxiate solution x = vec(x ) to f(a)b = A b can be written in the ore failiar for x = vec(p Y P T ) = (P P )vec(y ) = (P P )(T I +I T ) (P P ) T b. (5.3) This for will be used in section 6.2 to express the approxiation error of Cauchy- Stieltjes functions.

11 Functions of atrices with Kronecker structure 6. Copletely onotonic functions. Both the atrix exponential (in the for f(a) = exp( A)) and the inverse are special cases of an iportant class of analytic functions, naely, the copletely onotonic functions [35]. We recall the following definitions. Definition 6.. Let f be defined in the interval (a,b) where a < b +. Then, f is said to be copletely onotonic in (a,b) if ( ) k f (k) (x) for all a < x < b and all k =,,2,... Moreover, f is said to be strictly copletely onotonic in (a,b) if ( ) k f (k) (x) > for all a < x < b and all k =,,2,... Here f (k) denotes the kth derivative of f, with f () f. An iportant theore of Bernstein states that a function f is copletely onotonic in (, ) if and only if f is the Laplace Stieltjes transfor of α(τ); f(x) = e τx dα(τ), (6.) where α(τ) is nondecreasing and the integral in (6.) converges for all x >. See [35, Chapter 4]. For this reason, copletely onotonic functions on (, ) are also referred to as Laplace Stieltjes functions. Iportant exaples of Laplace Stieltjes functions include:. f (x) = /x = e xτ dα (τ) for x >, where α (τ) = τ for τ. 2. f 2 (x) = e x = e xτ dα 2 (τ) for x >, where α 2 (τ) = for τ < and α 2 (τ) = for τ. 3. f 3 (x) = ( e x )/x = e xτ dα 3 (τ) for x >, where α 3 (τ) = τ for τ, and α 3 (τ) = for τ. Also, the functions x σ (for any σ > ), log(+/x) and exp(/x), are all strictly copletely onotonic on(, ). Moreover, products and positive linear cobinations of strictly copletely onotonic functions are strictly copletely onotonic. Forula (6.) suggests the use of quadrature rules to approxiate f(a)b when A is a Kronecker su and f is strictly copletely onotonic on (, ): f(a)b = exp( τa)bdα(τ) q w k exp( τ k A)b, (6.2) where τ,...,τ k (, ) are suitably chosen quadrature nodes and w,...,w k R are the quadrature weights; see, for exaple, [7, Sec. 5]. As shown in the previous section, the Kronecker su structure can be exploited in the coputation of the individual ters exp( τ k A)b. Also note that each contribution to the quadrature can be coputed independently of the others, which could be useful in a parallel setting. This approach could be especially useful in cases where convergence of the Krylov subspace approxiation is slow. In the case of interpolatory quadrature and Heritian atrices, the absolute error f(a)b q k= w kexp( τ k A)b (in the 2-nor) is easily seen to be bounded by ε b, where ε is defined as ε = ax i,j exp( τ(λ i +µ j ))dα(τ) k= q w k exp( τ k (λ i +µ j )) k=

12 2 M. Benzi and V. Sioncini and λ i,µ j range over the spectra of M, M 2, where A = M 2 I + I M. In the case M = M 2 = M = M, the error can be bounded by q ε ax exp( τ(λ+µ))dα(τ) w k exp( τ k (λ+µ)) λ,µ [λ in,λ ax], where λ in,λ ax are the extree eigenvalues of M. For additional discussion of error bounds associated with the use of quadrature rules of the for (6.2), see [7, Sec. 5.7]. Analogous considerations apply to ore general types of functions. For a function f analytic inside a contour Γ C containing the eigenvalues of A in its interior and continuous on Γ we can write f(a) = 2πi Γ k= f(z)(a zi) dz. Quadrature rules can be used to obtain approxiations of the for f(a)b = f(z)(a zi) bdz 2πi Γ q w k (A z k I) b, requiring the solution of the q linear systes (A z k I)x = b, possibly in parallel for k =,...,q. We refer to [8] for details on how to apply this technique efficiently. Again, the Kronecker su structure of A, if present, can be exploited to greatly reduce the coputational cost and storagerequireents. In particular, if b = vec(b b T 2 ), then according to section 5, each syste (A z k I)x = b is equivalent to solving the linear atrix equation (M z k I)X +XM2 T = b b T 2, with x = vec(x). Another iportant class of functions is given by the Cauchy Stieltjes (or Markovtype) functions, which can be written as f(z) = Γ k= dγ(ω) z ω, z C\Γ, where γ is a (coplex) easure supported on a closed set Γ C and the integral is absolutely convergent. This class is closely related to, but distinct fro, the class of Laplace Stieltjes functions; see [35, Chapter VIII] for a general treatent. In this paper we are especially interested in the particular case Γ = (,] so that f(x) = dγ(ω), x C\(,], (6.3) x ω where γ is now a (possibly signed) real easure. Iportant exaples of Cauchy Stieltjes function that are frequently encountered in applications (see [6]) include z 2 = e t z z log(+z) z z ω π ω dω, = = z ω z ω sin(t ω) dω, πω ( ω) dω.

13 Functions of atrices with Kronecker structure Convergence analysis for Laplace Stieltjes functions. For Laplace Stieltjes functions and syetric positive definite atrices, in this section we analyze the convergence rate of the approxiation obtained by exploiting the Kronecker for. Moreover, we copare this rate with that of the standard approxiation with A, and that of the approxiation of M. We will ainly deal with standard Krylov approxiations, as error estiates for the exponential are available. A few coents are also included for rational Krylov subspaces Analysis of Krylov subspace approxiation. In this section we show that the convergence rate of the approxiation when using x is saller than that with x = V f(h )Vb. T Moreover, it is also saller than the convergence rate of the approxiation x () to f(m )b. For siplicity of exposition we assue that M = M 2 and b = b 2, with b =. Proposition 6.2. Let f be a Laplace Stieltjes function, and x = (P P )f(t )(P P ) T b be the Kronecker approxiation to f(a)b. Moreover, let x () = exp( τm )b and x () = P exp( τt )P Tb. We also define the scaled quantity x () := e λinτ x () = e (M+λinI)τ b ; analogously for x (). Then f(a)b x 2 x () x () dα(τ). Proof. Recalling the notation of (4.2) and (4.3) leading to (4.6), we have f(a)b x = = 2 = 2 (e τa b (P P )e τt (P P ) T b)dα(τ) ( x () + x () ) x() x () dα(τ) 2e λinτ x () x () dα(τ) e τ(m+λini) b P e τ(t+λini) P T b dα(τ) x () x () dα(τ), where in the last inequality we have used λ in (M ) λ in (T ), so that x () e λin(t)τ e λin(m)τ. We reark that the extra shift in the atrix M is what akes the solution x converge faster than x (). In light of Proposition 6.2, bounds for the error nor can be found by estiating the error nor in the approxiation of the exponential function under the easure dα. Depending on the function α(τ), different approxiation strategies need to be devised. Here we analyze the case dα(τ) = τ dτ for soe γ ; for instance, the γ function f(x) = / x falls in this setting with γ = 3/2. Then f(a)v x 2 τ γ x() x () dτ.

14 4 M. Benzi and V. Sioncini The case γ = is special. Since τ γ =, the integral on the right-hand side can be bounded as in [33, proof of (3.)], so that it holds ) κ+ ( κ f(a)v x 2, λ in κ κ+ where κ = (λ ax +λ in )/(λ in +λ in ). We focus next on the case γ >. We split the integral as 2 τ γ x() x () 4ρ dτ = τ γ x() x () dτ + 2 τ γ x() x () dτ 4ρ =: I +I 2. (6.4) Lea 6.3. With the previous notation, for γ > it holds ( ) ) γ 4ρ κ+ ( κ I 2 2, λ in κ κ+ where κ = (λ ax +λ in )/(λ in +λ in ). Proof. We note that in the given interval τ γ I 2 ( ) γ 4ρ 2 2 4ρ ( 2 4ρ ) γ, so that ( ) γ 4ρ x () x () dτ 2 x () x () dτ. Following [33, Prop.3.], an explicit bound for the last integral can be obtained, fro which the bound follows. The derivation of an upper bound for I in (6.4) is a little ore involved. Lea 6.4. With the previous notation, for γ > it holds ( ( ( ) eρ γ I γ( γ, ρ ) 2λ ) ( ) in +ρ γ ( 2 π + 2λ in +ρ 2λ in ) 2λ 2 2 in e 5ρ where γ is the lower incoplete Gaa function. Proof. We observe that the quantity x () x () in I can be bounded by using Theore 4.5 (see [2]), hence we further split I as I = τ γ x() x () dτ + 2 4ρ τ γ x() x () dτ. (6.5) Theore 4.5 can be applied to positive seidefinite atrices. Therefore we write e (M+λinI)τ = e 2λinτ e (M λini)τ, with M λ in I positive seidefinite. For the first integral in (6.5) we thus have (see Theore 4.5(ii)) τ γ x() x () dτ = e 2λinτ τ γ e (2λin+ρ)τ e (M λini)τ b (P P )e (T λini)τ b dτ ρτ γ+ = ( eρ ρ ) = ( ( eρ ρ ) 2λ in +ρ ( eρτ ) dτ τ γ e (2λin+ρ)τ dτ ) γ γ( γ, 2λ ) in +ρ.,

15 Functions of atrices with Kronecker structure 5 For the second integral in (6.5), after the sae spectral transforation and also using τ γ (/()) for τ [ γ, 2 4ρ ], we obtain 2 4ρ τ γ x() x () 2 dτ 4ρ e 2λinτ τ γ ( ) γ /2 2 4ρ ( ) γ /2 e 2 5ρτ dτ τ 2 τ 2 2 2λinτ e 5ρτ dτ 2 2λinτ e 5ρτ dτ. We then use [5, forula ], naely x 2e βx β 2 x dx = π β e 2 β β 2, to finally write ( ) γ /2 τ 2 ( ) γ /2 2 2λinτ e 5ρτ π dτ = e 2 2λ in 2 5ρ. 2λ in By collecting all bounds we can prove a final upper bound for the error, and give its asyptotic convergence rate. To this end, we first need the following technical lea, whose proof is given in the appendix. Lea 6.5. For < x αn with < α < it holds that γ(n,x) x n α n e x. Theore 6.6. For γ > and with the notation above, it holds that f(a)v x 2(I +I 2 ) ( ( eρ ) ( 2 ρ ( + ( ) γ 4ρ κ+ +2 = O 2λ in +ρ ) γ /2 π 2λ in e 2 2 λ in κ ( ( exp κ 2 )) ) γ γ( ) 2λin 5ρ ) ( κ κ+ γ, 2λ in +ρ for and κ large enough. (6.6) ) Proof. We ( only ( need )) to show that the ter involving γ is asyptotically bounded abovebyo exp κ 2 forand κlarge. Siple calculationsshowthatthe second arguent of γ satisfies (2λ in + ρ)/() α with α < for λ ax /λ in > 9; the larger this eigenvalue ratio, the saller α, so that for a large ratio, the bound (2λ in + ρ)/() α( γ) also holds. Hence, we can use Lea 6.5 to write

16 6 M. Benzi and V. Sioncini γ(n,x) e xxn n. Therefore2, ρ ( ( ) eρ γ γ( γ, ) 2λ ) in +ρ 2λ in +ρ ( ( ) eρ γ ( ) γ 2λin +ρ ρ ) 2λ in +ρ γ e 2 γ ρ γ ( e ) e = 2λ in +ρ γ 2 γ ρ γ = ( γ) 2 γ ( γ) e 2λ in +ρ 2λ in +(ln4 )ρ. Writing down ρ = 4 (λ ax λ in ), and after a few algebraic calculations we obtain 2λ in +(ln4 )ρ = (ln4 )λ ax +(8 (ln4 ))λ in = ( ) 4 2 λ ax λ in 2 κ +(ln4 ) κ 2, where the last inequality holds for κ large enough (naely for κ ). The theore above states that the convergence rate of the approxiation depends on the condition nuber of the shifted atrix. Reark 6.7. If f(a)b is approxiated in the Krylov subspace K (A,b), then the error nor can be written as f(a)b x e τa b V e τh V T b dα. Therefore, all the previous steps can be replicated, leading to an estiate of the type ( f(a)b x exp 2 ) κ where now κ = λ ax /λ in. The iproveent in the convergence rate when exploiting the Kronecker for thus becoes readily apparent, with the shift acting as an accelerator. It is also iportant to realize that the error nor f(m )b x () is also driven by the sae quantity κ, since the condition nuber of M and A is the sae. Therefore, it is really by using the Kronecker for that convergence becoes faster. We next illustrate our findings with a siple exaple. A diagonal atrix is considered so as to be able to copute exact quantities, while capturing the linear convergence of the approxiation. Exaple. We consider f(x) = / x (so that γ = 3/2) and a diagonal atrix M of size n = 5 with logarithically distributed eigenvalues in [, 3 ], giving ρ 247; b is the vector of all ones, noralized to have unit nor. We wish to approxiate f(a)b, with b = vec(b b T ). We copare the convergence curves of the usual approxiation x = V f(h )e (solid thin line), with that of x = (Q Q )f(t ) b (dashed thick line). As expected, the convergence rate of the latter is better (saller) than for the standard ethod. The estiate in (6.6) is reported as thick crosses, and it well approxiates the correct convergence slope. For copleteness we also report the error nor f(m )b Q f(t )Q T b, which behaves like that of the standard ethod, as noticed in the previous reark. 2 We assue here that γ is a positive integer, otherwise we can take the Gaa function associated with the closest integer larger than γ.

17 Functions of atrices with Kronecker structure 7 error nor and estiate f(a)b x f(a)b x () f(m )b x Estiate space diension Fig. 6.. Convergence curves for various approxiation ethods, and estiate in (6.6) Rational Krylov subspace approxiation. Convergence bounds of Laplace-Stieltjes functions are harder to obtain when rational Krylov subspaces are used, for few results on error bounds for the exponential functions are available. In thissectionwediscusssoeofthe resultsthatcanbeobtained. However,wewillshow that additional results can be derived for the subclass of Cauchy-Stieltjes functions, since they involve inverses in place of exponential functions. If the approxiation space is the extended Krylov subspace, which can be defined as K (M,b )+K (M,M b ), error bounds are difficult to obtain for Laplace Stieltjes functions, unless dα =dτ (that is, γ = ). Indeed, for γ =, we have ( ( ) f(a)b x = vec exp( τm )b b T exp( τm ) P exp( τt ) b bt exp( τt )P T dτ The integral coincides with the error atrix in the approxiation of the nuerical solution to the Lyapunov equation in the space Range(P ). This connection was already used in Lea 6.3 to establish an upper bound for the Krylov subspace approxiation. Here, we just ention that an asyptotic bound can be obtained by using results in [27, 28, 3], giving (( 4 ) ) κ f(a)b x O 4, κ+ where κ = λ ax (A)/λ in (A) = λ ax (M )/λ in (M ). Note that while there is no beneficial shifted atrix in this bound, the fourth root of κ appears, ensuring significantly faster convergence rate than for standard Krylov subspaces. For γ >, lack of explicit error bounds for the exponential function leaves the derivation of bounds for our setting an open proble. Nonetheless, experiental evidence sees to suggest a convergence rate siilar to the one for γ =. Upper bounds for the exponential function when rational Krylov subspaces (2.2) are eployed are usually asyptotic and specialized to optial values of the paraeters σ,...,σ. We refer the reader to [6, sec.4.2] for ore details Convergence analysis for Cauchy Stieltjes functions. Functions belonging to the Cauchy Stieltjes class provide a ore favorable setting, as they are ).

18 8 M. Benzi and V. Sioncini based on the resolvent function. Assue then that f is a Cauchy-Stieltjes function. Using the definition in (6.3) and assuing that b = vec(b b T ), we can write f(a)b x = f(a)b (P P )f(t )(P P ) T b = = (A ωi) bdγ(ω) (P P ) (T ωi) (P P ) T bdγ(ω) ( (A ωi) b (P P )(T ωi) (P P ) T b ) dγ(ω). Let M(ω) = M ω 2I, so that for any v and V such that v = vec(v) we can write (T ωi)v = vec(m(ω)v + VM(ω) T ). Then, recalling the derivation in (5.3), we obtain f(a)b x = vec(x(ω) X (ω))dγ(ω), where X(ω) and X (ω) are the exact and approxiate solutions to the linear atrix equation M(ω)X +XM(ω) T = b b T when the space K (M ω 2 I,b ) is used. Note that this space is invariant under shift, that is K (M,b ) = K (M ωi,b ), so that the coluns of P are still a basis for this space. An upper bound for the error can then be obtained as f(a)b x X(ω) X (ω) F dγ(ω). Available convergence bounds for the approxiation of X(ω) onto standard and rational Krylov subspaces can be eployed as a first step towards an upper bound for the error nor above. Final bounds will then be obtained for specific choices of f, which yield specific functions γ(ω). For standard Krylov subspaces, we can once again use [33, Proposition 3.] to get κω f(a)b x + ( κω 2 (λ in 2 ω) κ dγ(ω), ω κω +) where κ ω = (λ ax +λ in 2 ω)/(λ in+λ in 2ω). For consistency with the previous notation, we shall use κ = κ. Therefore, where f(a)b x 2 ( κ κ+ ) κω + (λ in 2 ω) κ ω dγ(ω), (6.7) ( κ κ+ ) exp( 2/ κ) for κ large. The final upper bound can be obtained once the easure dγ(ω) is ade ore explicit, and this ay influence the integration interval as well. For instance, for f(x) = x 2, κω + κω + (λ in 2 ω) κ dγ(ω) = ω (λ in 2 ω) κ dω ω ω 2 = 2 (λ in 2 ω) ω dω (λ in 2 ω) ω dω +2 dω +2 ( ω) ω λ in (λ in 2 ω) dω ω ω dω = 2+ 4 λ in.

19 Functions of atrices with Kronecker structure 9 Since the inverse square root is both a Laplace-Stieltjes function and a Cauchy- Stieltjes function, it is not surprising that we get a siilar convergence rate. The setting of this section allows one to deterine a sipler expression for the bound. Following siilar steps as for the inverse square root, for f(x) = ln(+x)/x we have (note the change in the integration interval) κω + (λ in 2 ω) κ dγ(ω) = ω 2 κω + (λ in 2 ω) κ ω ω dω (λ in 2 ω) dω 2 2 = 4. ( ω) In both cases, the integral appearing in (6.7) is bounded by a constant of odest size, unless λ in is tiny in the inverse square root. Suarizing, when using standard Krylov subspace ( approxiation, ) f(a)b x is bounded by a quantity whose asyptotic ter is κ κ+ as grows. When using the extended Krylov ( subspace for an Heritian positive definite 4 ) M, this quantity is replaced by κ, 4 κ+ where is the subspace diension and κ = λ ax /λ in (see, e.g., [26],[28]), as conjectured in the case of Laplace-Stieltjes functions. Here, an explicit upper bound can actually be obtained. Rational Krylov subspaces can also be used, and the ter X X F can be estiated using, e.g., [8, Theore 4.9]. 7. Conclusions. In this paper we have shown how to take advantage of the Kronecker su structure in A when using Krylov subspace ethods to evaluate expressions of the for f(a)b. Special attention has been devoted to the iportant case of the atrix exponential. Nuerical experients deonstrate that considerable savings can be obtained when the Kronecker su structure is exploited. A detailed analysis of the convergence rate of the new approxiation for syetric (or Heritian) and positive definite atrices was also proposed. Finally, while we have liited our presentation to the case where A is the Kronecker su of two atrices, the sae observations and techniques apply to the ore general case where A is the Kroneckersu of three or ore suands, since this can be reduced to the Kronecker su of two atrices. For instance, if we can write A = M M 2 M 3 := M I I +I M 2 I +I I M 3, A = M (I I)+I (M 2 I +I M 3 ) =: M I +I M, and apply the techniques in this paper in a recursive fashion. Acknowledgeent. The authors would like to thank Paola Boito for her careful reading of the anuscript and helpful coents. Appendix. In this appendix we prove Lea 6.5. Lea 6.5. For < x αn with < α < it holds that γ(n,x) x n α n e x.

20 2 M. Benzi and V. Sioncini Proof. We have n γ(n,x) = (n )!e (e x x k= ) ( x k = (n )!e x k! k=n = (n )!e xxn x + j n! (n+) (n+j) j= e xxn + α j n j n (n+) (n+j) j= e xxn α j = e xxn n n α. j= ) x k k! REFERENCES [] R. B. Bapat, Graphs and Matrices, Universitext, Springer, London; Hindustan Book Agency, New Dehli, 2. [2] R. H. Bartels and G. W. Stewart, Algorith 432: Solution of the Matrix Equation AX + XB = C, Co. ACM, 5(9) (972), pp [3] B. Beckerann, An error analysis for rational Galerkin projection applied to the Sylvester equation, SIAM J. Nuer. Anal., 49(6) (2), pp [4] B. Beckerann and L. Reichel, Error estiation and evaluation of atrix functions via the Faber transfor, SIAM J. Nuer. Anal., 47(5) (29), pp [5] M. Benzi and C. Klyko, Total counicability as a centrality easure, J. Coplex Networks, (2) (23), pp [6] M. Benzi and V. Sioncini, Decay bounds for functions of atrices with banded or Kronecker structure, arxiv: (25), pp. 2. [7] V. Druskin and L. Knizhneran, Extended Krylov subspaces: approxiation of the atrix square root and related functions, SIAM J. Matrix Anal. Appl., 9 (998), pp [8] V. Druskin, L. Knizhneran, and V. Sioncini, Analysis of the rational Krylov subspace and ADI ethods for solving the Lyapunov equation, SIAM J. Nuer. Anal., 49 (2), pp [9] V. Druskin, L. Knizhneran, and M. Zaslavsky, Solution of large scale evolutionary probles using rational Krylov subspaces with optiized shifts, SIAM J. Sci. Coput., 3 (29), pp [] M. Eierann and O. Ernst, A restarted Krylov subspace ethod for the evaluation of atrix functions, SIAM J. Nuer. Anal., 44 (26), pp [] E. Estrada, N. Hatano,and M. Benzi, The physics of counicability in coplex networks, Phys. Rep., 54 (22), pp [2] A. Froer, S. Güttel, and M. Schweitzer, Convergence of restarted Krylov subspace ethods for Stieltjes functions of atrices, SIAM J. Matrix Anal. Appl, 35 (24). pp [3], Efficient and stable Arnoldi restarts for atrix functions based on quadrature, SIAM J. Matrix Anal. Appl., 35 (24), pp [4] A. Froer and V. Sioncini, Matrix functions, in Model Order Reduction: Theory, Research Aspects and Applications, W. H. A. Schilders, H. A. van der Vorst, and J. Roes, eds., Matheatics in Industry, Springer, Heidelberg, 28. [5] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products, Seventh Edition, Acadeic Press, New York, 27. [6] S. Güttel, Rational Krylov approxiation of atrix functions: Nuerical ethods and optial pole selection, GAMM Mitt., 36 (23), pp [7] W. Hackbusch, Nuerical tensor calculus, Acta Nuerica 24, pp [8] N. Hale, N. J. Higha, and L. N. Trefethen, Coputing A α, log(a), and related atrix functions by contour integrals, SIAM J. Nuer. Anal., 46 (28), pp [9] P. C. Hansen, J. G. Nagy, and D. P. O Leary, Deblurring Iages. Matrices, Spectra, and Filtering, Society for Industrial and Applied Matheatics, Philadelphia, 26.

21 Functions of atrices with Kronecker structure 2 [2] N. J. Higha, Matrix Functions Theory and Applications, SIAM, Philadelphia, USA, 28. [2] M. Hochbruck and C. Lubich, On Krylov subspace approxiations to the atrix exponential operator, SIAM J. Nuer. Anal., 34 (997), pp [22] M. Hochbruck and C. Lubich, Exponential integrators for quantu-classical olecular dynaics, BIT, Nuerical Matheatics, 39 (999), pp [23] M. Hochbruck and A. Osterann, Exponential integrators, Acta Nuerica, 9 (2), pp [24] R. A. Horn and C. R. Johnson, Topics in Matrix Analysis, Cabridge University Press, Cabridge, 99. [25] L. Knizhneran, Calculus of functions of unsyetric atrices using Arnoldi s ethod, Coput. Math. Math. Phys., 3 (99), pp. 9. [26] L. Knizhneran and V. Sioncini, A new investigation of the extended Krylov subspace ethod for atrix function evaluations, Nuer. Linear Algebra Appl., 7 (2), pp [27] L. Knizhneran and V. Sioncini, Convergence analysis of the Extended Krylov Subspace Method for the Lyapunov equation, Nuer. Math., 8(3) (2), pp [28] D. Kressner and C. Tobler, Krylov subspace ethods for linear systes with tensor product structure, SIAM J. Matrix Anal. Appl., 3(4) (2), pp [29] The MathWorks, Inc. MATLAB 7, Septeber 24. [3] C. Moler and C. Van Loan, Nineteen dubious ways to copute the exponential of a atrix, twenty-five years later, SIAM Rev., 45 (23), pp [3] M. K. Ng, Iterative Methods for Toeplitz Systes, Oxford University Press, Oxford, 24. [32] V. Sioncini, Coputational Methods for Linear Matrix Equations, Technical report, Ala Mater Studioru - Università di Bologna, 23. [33] V. Sioncini and V. Druskin, Convergence analysis of projection ethods for the nuerical solution of large Lyapunov equations, SIAM J. Nuer. Anal., 47(2) (29), pp [34] A. Taylor and D. J. Higha, CONTEST: A Controllable Test Matrix Toolbox for MATLAB, ACM Trans. Math. Software, 35 (29), pp. 26: 26:7. [35] D. V. Widder, The Laplace Transfor, Princeton University Press, 946. [36] C. Yang and J.-M. Xu, Reliability of interconnection networks odeled by Cartesian product digraphs, Networks, 52 (28), pp

RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS

RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS BIT Nuerical Matheatics 43: 459 466, 2003. 2003 Kluwer Acadeic Publishers. Printed in The Netherlands 459 RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS V. SIMONCINI Dipartiento di

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

A new type of lower bound for the largest eigenvalue of a symmetric matrix

A new type of lower bound for the largest eigenvalue of a symmetric matrix Linear Algebra and its Applications 47 7 9 9 www.elsevier.co/locate/laa A new type of lower bound for the largest eigenvalue of a syetric atrix Piet Van Mieghe Delft University of Technology, P.O. Box

More information

Generalized AOR Method for Solving System of Linear Equations. Davod Khojasteh Salkuyeh. Department of Mathematics, University of Mohaghegh Ardabili,

Generalized AOR Method for Solving System of Linear Equations. Davod Khojasteh Salkuyeh. Department of Mathematics, University of Mohaghegh Ardabili, Australian Journal of Basic and Applied Sciences, 5(3): 35-358, 20 ISSN 99-878 Generalized AOR Method for Solving Syste of Linear Equations Davod Khojasteh Salkuyeh Departent of Matheatics, University

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

A note on the realignment criterion

A note on the realignment criterion A note on the realignent criterion Chi-Kwong Li 1, Yiu-Tung Poon and Nung-Sing Sze 3 1 Departent of Matheatics, College of Willia & Mary, Williasburg, VA 3185, USA Departent of Matheatics, Iowa State University,

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Matheatical Sciences 04,, p. 7 5 ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD M a t h e a t i c s Yu. A. HAKOPIAN, R. Z. HOVHANNISYAN

More information

Dedicated to Richard S. Varga on the occasion of his 80th birthday.

Dedicated to Richard S. Varga on the occasion of his 80th birthday. MATRICES, MOMENTS, AND RATIONAL QUADRATURE G. LÓPEZ LAGOMASINO, L. REICHEL, AND L. WUNDERLICH Dedicated to Richard S. Varga on the occasion of his 80th birthday. Abstract. Many probles in science and engineering

More information

Physics 215 Winter The Density Matrix

Physics 215 Winter The Density Matrix Physics 215 Winter 2018 The Density Matrix The quantu space of states is a Hilbert space H. Any state vector ψ H is a pure state. Since any linear cobination of eleents of H are also an eleent of H, it

More information

RECOVERY OF A DENSITY FROM THE EIGENVALUES OF A NONHOMOGENEOUS MEMBRANE

RECOVERY OF A DENSITY FROM THE EIGENVALUES OF A NONHOMOGENEOUS MEMBRANE Proceedings of ICIPE rd International Conference on Inverse Probles in Engineering: Theory and Practice June -8, 999, Port Ludlow, Washington, USA : RECOVERY OF A DENSITY FROM THE EIGENVALUES OF A NONHOMOGENEOUS

More information

Bulletin of the. Iranian Mathematical Society

Bulletin of the. Iranian Mathematical Society ISSN: 1017-060X (Print) ISSN: 1735-8515 (Online) Bulletin of the Iranian Matheatical Society Vol. 41 (2015), No. 4, pp. 981 1001. Title: Convergence analysis of the global FOM and GMRES ethods for solving

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

arxiv: v1 [cs.ds] 29 Jan 2012

arxiv: v1 [cs.ds] 29 Jan 2012 A parallel approxiation algorith for ixed packing covering seidefinite progras arxiv:1201.6090v1 [cs.ds] 29 Jan 2012 Rahul Jain National U. Singapore January 28, 2012 Abstract Penghui Yao National U. Singapore

More information

Finding Rightmost Eigenvalues of Large Sparse. Non-symmetric Parameterized Eigenvalue Problems. Abstract. Introduction

Finding Rightmost Eigenvalues of Large Sparse. Non-symmetric Parameterized Eigenvalue Problems. Abstract. Introduction Finding Rightost Eigenvalues of Large Sparse Non-syetric Paraeterized Eigenvalue Probles Applied Matheatics and Scientific Coputation Progra Departent of Matheatics University of Maryland, College Par,

More information

Explicit solution of the polynomial least-squares approximation problem on Chebyshev extrema nodes

Explicit solution of the polynomial least-squares approximation problem on Chebyshev extrema nodes Explicit solution of the polynoial least-squares approxiation proble on Chebyshev extrea nodes Alfredo Eisinberg, Giuseppe Fedele Dipartiento di Elettronica Inforatica e Sisteistica, Università degli Studi

More information

2 Q 10. Likewise, in case of multiple particles, the corresponding density in 2 must be averaged over all

2 Q 10. Likewise, in case of multiple particles, the corresponding density in 2 must be averaged over all Lecture 6 Introduction to kinetic theory of plasa waves Introduction to kinetic theory So far we have been odeling plasa dynaics using fluid equations. The assuption has been that the pressure can be either

More information

COS 424: Interacting with Data. Written Exercises

COS 424: Interacting with Data. Written Exercises COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well

More information

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving

More information

A remark on a success rate model for DPA and CPA

A remark on a success rate model for DPA and CPA A reark on a success rate odel for DPA and CPA A. Wieers, BSI Version 0.5 andreas.wieers@bsi.bund.de Septeber 5, 2018 Abstract The success rate is the ost coon evaluation etric for easuring the perforance

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

A RESTARTED KRYLOV SUBSPACE METHOD FOR THE EVALUATION OF MATRIX FUNCTIONS. 1. Introduction. The evaluation of. f(a)b, where A C n n, b C n (1.

A RESTARTED KRYLOV SUBSPACE METHOD FOR THE EVALUATION OF MATRIX FUNCTIONS. 1. Introduction. The evaluation of. f(a)b, where A C n n, b C n (1. A RESTARTED KRYLOV SUBSPACE METHOD FOR THE EVALUATION OF MATRIX FUNCTIONS MICHAEL EIERMANN AND OLIVER G. ERNST Abstract. We show how the Arnoldi algorith for approxiating a function of a atrix ties a vector

More information

The Hilbert Schmidt version of the commutator theorem for zero trace matrices

The Hilbert Schmidt version of the commutator theorem for zero trace matrices The Hilbert Schidt version of the coutator theore for zero trace atrices Oer Angel Gideon Schechtan March 205 Abstract Let A be a coplex atrix with zero trace. Then there are atrices B and C such that

More information

Generalized eigenfunctions and a Borel Theorem on the Sierpinski Gasket.

Generalized eigenfunctions and a Borel Theorem on the Sierpinski Gasket. Generalized eigenfunctions and a Borel Theore on the Sierpinski Gasket. Kasso A. Okoudjou, Luke G. Rogers, and Robert S. Strichartz May 26, 2006 1 Introduction There is a well developed theory (see [5,

More information

Supplementary Material for Fast and Provable Algorithms for Spectrally Sparse Signal Reconstruction via Low-Rank Hankel Matrix Completion

Supplementary Material for Fast and Provable Algorithms for Spectrally Sparse Signal Reconstruction via Low-Rank Hankel Matrix Completion Suppleentary Material for Fast and Provable Algoriths for Spectrally Sparse Signal Reconstruction via Low-Ran Hanel Matrix Copletion Jian-Feng Cai Tianing Wang Ke Wei March 1, 017 Abstract We establish

More information

NORMAL MATRIX POLYNOMIALS WITH NONSINGULAR LEADING COEFFICIENTS

NORMAL MATRIX POLYNOMIALS WITH NONSINGULAR LEADING COEFFICIENTS NORMAL MATRIX POLYNOMIALS WITH NONSINGULAR LEADING COEFFICIENTS NIKOLAOS PAPATHANASIOU AND PANAYIOTIS PSARRAKOS Abstract. In this paper, we introduce the notions of weakly noral and noral atrix polynoials,

More information

Sharp Time Data Tradeoffs for Linear Inverse Problems

Sharp Time Data Tradeoffs for Linear Inverse Problems Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

Partial traces and entropy inequalities

Partial traces and entropy inequalities Linear Algebra and its Applications 370 (2003) 125 132 www.elsevier.co/locate/laa Partial traces and entropy inequalities Rajendra Bhatia Indian Statistical Institute, 7, S.J.S. Sansanwal Marg, New Delhi

More information

Ch 12: Variations on Backpropagation

Ch 12: Variations on Backpropagation Ch 2: Variations on Backpropagation The basic backpropagation algorith is too slow for ost practical applications. It ay take days or weeks of coputer tie. We deonstrate why the backpropagation algorith

More information

3.3 Variational Characterization of Singular Values

3.3 Variational Characterization of Singular Values 3.3. Variational Characterization of Singular Values 61 3.3 Variational Characterization of Singular Values Since the singular values are square roots of the eigenvalues of the Heritian atrices A A and

More information

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe PROPERTIES OF MULTIVARIATE HOMOGENEOUS ORTHOGONAL POLYNOMIALS Brahi Benouahane y Annie Cuyt? Keywords Abstract It is well-known that the denoinators of Pade approxiants can be considered as orthogonal

More information

FAST DYNAMO ON THE REAL LINE

FAST DYNAMO ON THE REAL LINE FAST DYAMO O THE REAL LIE O. KOZLOVSKI & P. VYTOVA Abstract. In this paper we show that a piecewise expanding ap on the interval, extended to the real line by a non-expanding ap satisfying soe ild hypthesis

More information

ma x = -bv x + F rod.

ma x = -bv x + F rod. Notes on Dynaical Systes Dynaics is the study of change. The priary ingredients of a dynaical syste are its state and its rule of change (also soeties called the dynaic). Dynaical systes can be continuous

More information

ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE

ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE CHRISTOPHER J. HILLAR Abstract. A long-standing conjecture asserts that the polynoial p(t = Tr(A + tb ] has nonnegative coefficients whenever is

More information

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words) 1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu

More information

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy Storage Capacity and Dynaics of Nononotonic Networks Bruno Crespi a and Ignazio Lazzizzera b a. IRST, I-38050 Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I-38050 Povo (Trento) Italy INFN Gruppo

More information

EE5900 Spring Lecture 4 IC interconnect modeling methods Zhuo Feng

EE5900 Spring Lecture 4 IC interconnect modeling methods Zhuo Feng EE59 Spring Parallel LSI AD Algoriths Lecture I interconnect odeling ethods Zhuo Feng. Z. Feng MTU EE59 So far we ve considered only tie doain analyses We ll soon see that it is soeties preferable to odel

More information

Lower Bounds for Quantized Matrix Completion

Lower Bounds for Quantized Matrix Completion Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &

More information

Solutions of some selected problems of Homework 4

Solutions of some selected problems of Homework 4 Solutions of soe selected probles of Hoework 4 Sangchul Lee May 7, 2018 Proble 1 Let there be light A professor has two light bulbs in his garage. When both are burned out, they are replaced, and the next

More information

Lecture 13 Eigenvalue Problems

Lecture 13 Eigenvalue Problems Lecture 13 Eigenvalue Probles MIT 18.335J / 6.337J Introduction to Nuerical Methods Per-Olof Persson October 24, 2006 1 The Eigenvalue Decoposition Eigenvalue proble for atrix A: Ax = λx with eigenvalues

More information

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product.

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product. Coding Theory Massoud Malek Reed-Muller Codes An iportant class of linear block codes rich in algebraic and geoetric structure is the class of Reed-Muller codes, which includes the Extended Haing code.

More information

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate The Siplex Method is Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010 Abstract In this note we prove that the classic siplex ethod with the ost-negativereduced-cost

More information

CONTROL SYSTEMS, ROBOTICS, AND AUTOMATION Vol. IX Uncertainty Models For Robustness Analysis - A. Garulli, A. Tesi and A. Vicino

CONTROL SYSTEMS, ROBOTICS, AND AUTOMATION Vol. IX Uncertainty Models For Robustness Analysis - A. Garulli, A. Tesi and A. Vicino UNCERTAINTY MODELS FOR ROBUSTNESS ANALYSIS A. Garulli Dipartiento di Ingegneria dell Inforazione, Università di Siena, Italy A. Tesi Dipartiento di Sistei e Inforatica, Università di Firenze, Italy A.

More information

Distributed Subgradient Methods for Multi-agent Optimization

Distributed Subgradient Methods for Multi-agent Optimization 1 Distributed Subgradient Methods for Multi-agent Optiization Angelia Nedić and Asuan Ozdaglar October 29, 2007 Abstract We study a distributed coputation odel for optiizing a su of convex objective functions

More information

Supplementary Information for Design of Bending Multi-Layer Electroactive Polymer Actuators

Supplementary Information for Design of Bending Multi-Layer Electroactive Polymer Actuators Suppleentary Inforation for Design of Bending Multi-Layer Electroactive Polyer Actuators Bavani Balakrisnan, Alek Nacev, and Elisabeth Sela University of Maryland, College Park, Maryland 074 1 Analytical

More information

Ph 20.3 Numerical Solution of Ordinary Differential Equations

Ph 20.3 Numerical Solution of Ordinary Differential Equations Ph 20.3 Nuerical Solution of Ordinary Differential Equations Due: Week 5 -v20170314- This Assignent So far, your assignents have tried to failiarize you with the hardware and software in the Physics Coputing

More information

An l 1 Regularized Method for Numerical Differentiation Using Empirical Eigenfunctions

An l 1 Regularized Method for Numerical Differentiation Using Empirical Eigenfunctions Journal of Matheatical Research with Applications Jul., 207, Vol. 37, No. 4, pp. 496 504 DOI:0.3770/j.issn:2095-265.207.04.0 Http://jre.dlut.edu.cn An l Regularized Method for Nuerical Differentiation

More information

Iterative Linear Solvers and Jacobian-free Newton-Krylov Methods

Iterative Linear Solvers and Jacobian-free Newton-Krylov Methods Eric de Sturler Iterative Linear Solvers and Jacobian-free Newton-Krylov Methods Eric de Sturler Departent of Matheatics, Virginia Tech www.ath.vt.edu/people/sturler/index.htl sturler@vt.edu Efficient

More information

A Note on the Applied Use of MDL Approximations

A Note on the Applied Use of MDL Approximations A Note on the Applied Use of MDL Approxiations Daniel J. Navarro Departent of Psychology Ohio State University Abstract An applied proble is discussed in which two nested psychological odels of retention

More information

Hybrid System Identification: An SDP Approach

Hybrid System Identification: An SDP Approach 49th IEEE Conference on Decision and Control Deceber 15-17, 2010 Hilton Atlanta Hotel, Atlanta, GA, USA Hybrid Syste Identification: An SDP Approach C Feng, C M Lagoa, N Ozay and M Sznaier Abstract The

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

3.8 Three Types of Convergence

3.8 Three Types of Convergence 3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to

More information

A Bernstein-Markov Theorem for Normed Spaces

A Bernstein-Markov Theorem for Normed Spaces A Bernstein-Markov Theore for Nored Spaces Lawrence A. Harris Departent of Matheatics, University of Kentucky Lexington, Kentucky 40506-0027 Abstract Let X and Y be real nored linear spaces and let φ :

More information

Chaotic Coupled Map Lattices

Chaotic Coupled Map Lattices Chaotic Coupled Map Lattices Author: Dustin Keys Advisors: Dr. Robert Indik, Dr. Kevin Lin 1 Introduction When a syste of chaotic aps is coupled in a way that allows the to share inforation about each

More information

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES S. E. Ahed, R. J. Tokins and A. I. Volodin Departent of Matheatics and Statistics University of Regina Regina,

More information

Lecture 21. Interior Point Methods Setup and Algorithm

Lecture 21. Interior Point Methods Setup and Algorithm Lecture 21 Interior Point Methods In 1984, Kararkar introduced a new weakly polynoial tie algorith for solving LPs [Kar84a], [Kar84b]. His algorith was theoretically faster than the ellipsoid ethod and

More information

Least Squares Fitting of Data

Least Squares Fitting of Data Least Squares Fitting of Data David Eberly, Geoetric Tools, Redond WA 98052 https://www.geoetrictools.co/ This work is licensed under the Creative Coons Attribution 4.0 International License. To view a

More information

Support recovery in compressed sensing: An estimation theoretic approach

Support recovery in compressed sensing: An estimation theoretic approach Support recovery in copressed sensing: An estiation theoretic approach Ain Karbasi, Ali Horati, Soheil Mohajer, Martin Vetterli School of Coputer and Counication Sciences École Polytechnique Fédérale de

More information

Lecture 9 November 23, 2015

Lecture 9 November 23, 2015 CSC244: Discrepancy Theory in Coputer Science Fall 25 Aleksandar Nikolov Lecture 9 Noveber 23, 25 Scribe: Nick Spooner Properties of γ 2 Recall that γ 2 (A) is defined for A R n as follows: γ 2 (A) = in{r(u)

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

Multi-Dimensional Hegselmann-Krause Dynamics

Multi-Dimensional Hegselmann-Krause Dynamics Multi-Diensional Hegselann-Krause Dynaics A. Nedić Industrial and Enterprise Systes Engineering Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu B. Touri Coordinated Science Laboratory

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

An Approximate Model for the Theoretical Prediction of the Velocity Increase in the Intermediate Ballistics Period

An Approximate Model for the Theoretical Prediction of the Velocity Increase in the Intermediate Ballistics Period An Approxiate Model for the Theoretical Prediction of the Velocity... 77 Central European Journal of Energetic Materials, 205, 2(), 77-88 ISSN 2353-843 An Approxiate Model for the Theoretical Prediction

More information

Hermite s Rule Surpasses Simpson s: in Mathematics Curricula Simpson s Rule. Should be Replaced by Hermite s

Hermite s Rule Surpasses Simpson s: in Mathematics Curricula Simpson s Rule. Should be Replaced by Hermite s International Matheatical Foru, 4, 9, no. 34, 663-686 Herite s Rule Surpasses Sipson s: in Matheatics Curricula Sipson s Rule Should be Replaced by Herite s Vito Lapret University of Lublana Faculty of

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

A BLOCK MONOTONE DOMAIN DECOMPOSITION ALGORITHM FOR A NONLINEAR SINGULARLY PERTURBED PARABOLIC PROBLEM

A BLOCK MONOTONE DOMAIN DECOMPOSITION ALGORITHM FOR A NONLINEAR SINGULARLY PERTURBED PARABOLIC PROBLEM INTERNATIONAL JOURNAL OF NUMERICAL ANALYSIS AND MODELING Volue 3, Nuber 2, Pages 211 231 c 2006 Institute for Scientific Coputing and Inforation A BLOCK MONOTONE DOMAIN DECOMPOSITION ALGORITHM FOR A NONLINEAR

More information

The proofs of Theorem 1-3 are along the lines of Wied and Galeano (2013).

The proofs of Theorem 1-3 are along the lines of Wied and Galeano (2013). A Appendix: Proofs The proofs of Theore 1-3 are along the lines of Wied and Galeano (2013) Proof of Theore 1 Let D[d 1, d 2 ] be the space of càdlàg functions on the interval [d 1, d 2 ] equipped with

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna

More information

Physics 139B Solutions to Homework Set 3 Fall 2009

Physics 139B Solutions to Homework Set 3 Fall 2009 Physics 139B Solutions to Hoework Set 3 Fall 009 1. Consider a particle of ass attached to a rigid assless rod of fixed length R whose other end is fixed at the origin. The rod is free to rotate about

More information

Numerical Studies of a Nonlinear Heat Equation with Square Root Reaction Term

Numerical Studies of a Nonlinear Heat Equation with Square Root Reaction Term Nuerical Studies of a Nonlinear Heat Equation with Square Root Reaction Ter Ron Bucire, 1 Karl McMurtry, 1 Ronald E. Micens 2 1 Matheatics Departent, Occidental College, Los Angeles, California 90041 2

More information

Supporting Information for Supression of Auger Processes in Confined Structures

Supporting Information for Supression of Auger Processes in Confined Structures Supporting Inforation for Supression of Auger Processes in Confined Structures George E. Cragg and Alexander. Efros Naval Research aboratory, Washington, DC 20375, USA 1 Solution of the Coupled, Two-band

More information

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians Using EM To Estiate A Probablity Density With A Mixture Of Gaussians Aaron A. D Souza adsouza@usc.edu Introduction The proble we are trying to address in this note is siple. Given a set of data points

More information

M ath. Res. Lett. 15 (2008), no. 2, c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS. Van H. Vu. 1.

M ath. Res. Lett. 15 (2008), no. 2, c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS. Van H. Vu. 1. M ath. Res. Lett. 15 (2008), no. 2, 375 388 c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS Van H. Vu Abstract. Let F q be a finite field of order q and P be a polynoial in F q[x

More information

Using a De-Convolution Window for Operating Modal Analysis

Using a De-Convolution Window for Operating Modal Analysis Using a De-Convolution Window for Operating Modal Analysis Brian Schwarz Vibrant Technology, Inc. Scotts Valley, CA Mark Richardson Vibrant Technology, Inc. Scotts Valley, CA Abstract Operating Modal Analysis

More information

Ştefan ŞTEFĂNESCU * is the minimum global value for the function h (x)

Ştefan ŞTEFĂNESCU * is the minimum global value for the function h (x) 7Applying Nelder Mead s Optiization Algorith APPLYING NELDER MEAD S OPTIMIZATION ALGORITHM FOR MULTIPLE GLOBAL MINIMA Abstract Ştefan ŞTEFĂNESCU * The iterative deterinistic optiization ethod could not

More information

Lecture 21 Nov 18, 2015

Lecture 21 Nov 18, 2015 CS 388R: Randoized Algoriths Fall 05 Prof. Eric Price Lecture Nov 8, 05 Scribe: Chad Voegele, Arun Sai Overview In the last class, we defined the ters cut sparsifier and spectral sparsifier and introduced

More information

}, (n 0) be a finite irreducible, discrete time MC. Let S = {1, 2,, m} be its state space. Let P = [p ij. ] be the transition matrix of the MC.

}, (n 0) be a finite irreducible, discrete time MC. Let S = {1, 2,, m} be its state space. Let P = [p ij. ] be the transition matrix of the MC. Abstract Questions are posed regarding the influence that the colun sus of the transition probabilities of a stochastic atrix (with row sus all one) have on the stationary distribution, the ean first passage

More information

The linear sampling method and the MUSIC algorithm

The linear sampling method and the MUSIC algorithm INSTITUTE OF PHYSICS PUBLISHING INVERSE PROBLEMS Inverse Probles 17 (2001) 591 595 www.iop.org/journals/ip PII: S0266-5611(01)16989-3 The linear sapling ethod and the MUSIC algorith Margaret Cheney Departent

More information

Nonuniqueness of canonical ensemble theory. arising from microcanonical basis

Nonuniqueness of canonical ensemble theory. arising from microcanonical basis onuniueness of canonical enseble theory arising fro icrocanonical basis arxiv:uant-ph/99097 v2 25 Oct 2000 Suiyoshi Abe and A. K. Rajagopal 2 College of Science and Technology, ihon University, Funabashi,

More information

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas

More information

Synchronization in large directed networks of coupled phase oscillators

Synchronization in large directed networks of coupled phase oscillators CHAOS 16, 015107 2005 Synchronization in large directed networks of coupled phase oscillators Juan G. Restrepo a Institute for Research in Electronics and Applied Physics, University of Maryland, College

More information

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13 CSE55: Randoied Algoriths and obabilistic Analysis May 6, Lecture Lecturer: Anna Karlin Scribe: Noah Siegel, Jonathan Shi Rando walks and Markov chains This lecture discusses Markov chains, which capture

More information

Comparison of Stability of Selected Numerical Methods for Solving Stiff Semi- Linear Differential Equations

Comparison of Stability of Selected Numerical Methods for Solving Stiff Semi- Linear Differential Equations International Journal of Applied Science and Technology Vol. 7, No. 3, Septeber 217 Coparison of Stability of Selected Nuerical Methods for Solving Stiff Sei- Linear Differential Equations Kwaku Darkwah

More information

lecture 36: Linear Multistep Mehods: Zero Stability

lecture 36: Linear Multistep Mehods: Zero Stability 95 lecture 36: Linear Multistep Mehods: Zero Stability 5.6 Linear ultistep ethods: zero stability Does consistency iply convergence for linear ultistep ethods? This is always the case for one-step ethods,

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography Tight Bounds for axial Identifiability of Failure Nodes in Boolean Network Toography Nicola Galesi Sapienza Università di Roa nicola.galesi@uniroa1.it Fariba Ranjbar Sapienza Università di Roa fariba.ranjbar@uniroa1.it

More information

The Distribution of the Covariance Matrix for a Subset of Elliptical Distributions with Extension to Two Kurtosis Parameters

The Distribution of the Covariance Matrix for a Subset of Elliptical Distributions with Extension to Two Kurtosis Parameters journal of ultivariate analysis 58, 96106 (1996) article no. 0041 The Distribution of the Covariance Matrix for a Subset of Elliptical Distributions with Extension to Two Kurtosis Paraeters H. S. Steyn

More information

New upper bound for the B-spline basis condition number II. K. Scherer. Institut fur Angewandte Mathematik, Universitat Bonn, Bonn, Germany.

New upper bound for the B-spline basis condition number II. K. Scherer. Institut fur Angewandte Mathematik, Universitat Bonn, Bonn, Germany. New upper bound for the B-spline basis condition nuber II. A proof of de Boor's 2 -conjecture K. Scherer Institut fur Angewandte Matheati, Universitat Bonn, 535 Bonn, Gerany and A. Yu. Shadrin Coputing

More information

Computational and Statistical Learning Theory

Computational and Statistical Learning Theory Coputational and Statistical Learning Theory Proble sets 5 and 6 Due: Noveber th Please send your solutions to learning-subissions@ttic.edu Notations/Definitions Recall the definition of saple based Radeacher

More information

lecture 37: Linear Multistep Methods: Absolute Stability, Part I lecture 38: Linear Multistep Methods: Absolute Stability, Part II

lecture 37: Linear Multistep Methods: Absolute Stability, Part I lecture 38: Linear Multistep Methods: Absolute Stability, Part II lecture 37: Linear Multistep Methods: Absolute Stability, Part I lecture 3: Linear Multistep Methods: Absolute Stability, Part II 5.7 Linear ultistep ethods: absolute stability At this point, it ay well

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information

Numerical issues in the implementation of high order polynomial multidomain penalty spectral Galerkin methods for hyperbolic conservation laws

Numerical issues in the implementation of high order polynomial multidomain penalty spectral Galerkin methods for hyperbolic conservation laws Nuerical issues in the ipleentation of high order polynoial ultidoain penalty spectral Galerkin ethods for hyperbolic conservation laws Sigal Gottlieb 1 and Jae-Hun Jung 1, 1 Departent of Matheatics, University

More information