Construction of Equiangular Signatures for Synchronous CDMA Systems

Size: px
Start display at page:

Download "Construction of Equiangular Signatures for Synchronous CDMA Systems"

Transcription

1 Construction of Equiangular Signatures for Synchronous CDMA Systems Robert W Heath Jr Dept of Elect an Comp Engr 1 University Station C0803 Austin, TX USA rheath@eceutexaseu Joel A Tropp Inst for Comp Engr an Sci (ICES) 1 University Station C0200 Austin, TX jtropp@icesutexaseu Inerjit S Dhillon Dept of Comp Sci 1 University Station C0500 Austin, TX inerjit@csutexaseu Thomas Strohmer Dept of Mathematics University of California, Davis Davis, CA USA strohmer@mathucaviseu Abstract Welch boun equality (WBE) signature sequences maximize the uplink sum capacity in irect-sprea synchronous coe ivision multiple access (CDMA) systems WBE sequences have a nice interference invariance property that typically hols only when the system is fully loae an the signature set must be reesigne an reassigne as the number of active users changes to maintain this property An aitional equiangular constraint on the signature set, however, maintains interference invariance Fining such signatures requires imposing equiangular sie constraints on an inverse eigenvalue problem This paper presents an alternating projection algorithm that can esign WBE sequences that satisfy equiangular sie constraints The propose algorithm can be use to fin Grassmannian frames as well as equiangular tight frames Though one projection is onto a close but non convex set, it is shown that this algorithm converges to a fixe point, an these fixe points are partially characterize I INTRODUCTION Signature sequences that maximize the sum capacity in the uplink of irect-sprea synchronous coe ivision multiple access (CDMA) systems in Gaussian noise are known to satisfy Welch s boun on the total square correlation with equality [1] These sequences, known as Welch boun equality (WBE) signature sequences, are etermine by the number of users an the imensionality of the signature space They have the interesting interference invariance property in that each signature sees exactly the same interference power Thus the interference experience by a user is inepenent of the signature assigne to that user Unfortunately, when the number of active users changes, the signatures must generally be recompute an reassigne to maintain the interference invariance [2] Recently a class of signatures, known as Grassmannian signatures, were introuce that satisfy interference invariance even when subsets of the available users are active [3] This signature construction is intimately relate to the problem of sphere packing in the Grassmann manifol, in this case oneimensional subspaces (lines), an more specifically to the construction of Grassmannian tight frames [4] The interference invariance properties comes from the fact that because Grassmannian signatures satisfy Welch s lower boun on the maximum correlation with equality, they are equiangular (the correlation is the same for all istinct signature pairs) an maximally space with the smallest possible inner prouct The equiangular property provies interference invariance Unfortunately, signatures that are both equiangular an maximally space are quite rare Some explicit constructions are available in the articles [3], [4], [5] Signatures erive from goo packings in the Grassman manifol, even the best line packings tabulate by Sloane [6], o not generally satisfy the WBE property when they are not equiangular In cases where such signatures o not exist, we woul be satisfie with a WBE whose constituent signatures are close to equiangular Recently propose numerical algorithms for fining WBEs (eg, [7], [8], [9], [10]), however, o not easily incorporate equiangular sie constraints In this paper, we present an algorithm for fining Welch boun equality signature sequences that are exactly (or nearly) equiangular Our approach buils on our recently propose iterative algorithm for constructing CDMA signature sequences [11], which has also been use to fin signatures satisfying peak-to-average ratio constraints [12] The iea is to alternately solve two matrix nearness problems, one that fins the closest signature set satisfying Welch s boun with equality an the other that fins the nearest set of equiangular signatures This algorithm is relate to a metho use by Chu for solving an inverse eigenvalue problem [13] Our algorithm can also be use to fin Grassmannian frames as well as equiangular tight frames We argue that our algorithm converges to a fixe point, an we claim that the class of fixe points contains the esire sequences Detaile proofs of these results are eferre ue to space constraints [14] II SIGNATURE DESIGN PRELIMINARIES Consier the uplink of a single cell, short coe, synchronous CDMA system with N total signatures an a processing gain Let x k enote the 1 signature, coe, or sequence, of user k, normalize as x k =1for k =1,,N We assume that the maximum number of active users allowe in the system is N >1 If the signatures x k form an orthogonal set, the length etermines the allowable number of users It has been shown that nonorthogonal signature sets where N>musers may be necessary to achieve the full sum-capacity of the synchronous single-cell CDMA channel [1] These sequences are calle Welch boun equality sequences [15] since they satisfy the Welch boun on the total square correlation with equality

2 WBE signature sequences have a number of nice properties as summarize in [15], [16] Perhaps the most interesting property is that, using WBE sequences, the interference is uniform across all users [16] The sum total interference in the system is given by k l =k x k, x l 2 N 2 which for WBE sequences is simply N 2 N Using WBE sequences, the total interference power experience by user k is N I(k) = x k, x l 2 1 = N for k =1, 2,,N l=1 (1) an is the same for every user Thus the SINR performance for any user k is simply [ (σ ) 2 1 ( ) ] 1 1 SINR k = s + (2) N σ 2 v an the performance only epens on N an Unfortunately, interference invariance only occurs when the system is fully loae [2], [15], ie N users are active The reason is that a WBE set for N > users almost always ceases to be a WBE set if any M<sequences are remove from or ae to the set [3] Thus if N < N users are active, the whole signature set will nee to be recompute for (, N) an the signatures reassigne or aitional power control will have to compensate for interference inequality III EQUIANGULAR SIGNATURES FOR CDMA SYSTEMS An interesting subclass of WBE signature sequences, known as Grassmannian signatures, retains the interference invariance property even when a subset of signatures are active [3] Grassmannian signatures are constructe from optimal packings of lines on the Grassmann manifol These signature sequences satisfy two important properties: 1) They are equiangular, ie, x k, x l = c for all k, l with k l (3) for some constant c 0 2) They are maximally space, ie c in (3) is as small as possible The equiangular property means that every signature is equally far from every other signature This is the origin of the interference invariance property For example, if N is the set that inexes the active signatures, then the total interference experience by any user k =1, 2,,N is I(k) = x k, x l 2 = c ( N 1) (4) l N /k which only epens on the carinality of N The maximally space property implies that the signature sequence minimizes the maximum angle between the lines generate by x k an x l Let ρ(n,m) := max k,l,k =l x k, x l enote the maximum correlation Grassmannian signatures achieve the lower boun on the maximum correlation for a line packing given by (see [17] for example) ρ(n,) N (N 1) (5) Further, if equality hols in (5), then the signatures are equiangular, maximally space, an form a WBE signature sequence set [4] In general, it is torturous to fin signatures that satisfy (5) with equality Most of the current research has approache the esign problem with algebraic tools A notable triumph of this type is the construction of Kerock coes over Z 2 an Z 4 ue to Calerbank et al [5] Other explicit constructions are iscusse in the articles [4], [3] In the numerical realm, Sloane has use his Gosset software to prouce an stuy sphere packings in real Grassmannian spaces [6] Sloane s algorithms have been extene to complex Grassmannian spaces in [18] We are not aware of any other numerical methos Some examples of signatures that achieve the boun in (5) are available in [4] but generally they are har to fin The reason is that while goo line packings have been tabulate for various an N, these packings o not necessarily maintain the equiangular property On the other han, some equiangular signature sets o not achieve the maximally space property, eg, it is possible to fin five equiangular vectors in R 3 but they are not maximally space In both cases, the resulting packing may not satisfy the WBE property enjoye when equality is satisfie an thus may no longer be capacityoptimal When signature sequences are not available that satisfy (5) with equality, it is not possible to simultaneously obtain a signature sequence that is equiangular, maximally space, an satisfies Welch s boun on the total square correlation with equality Since the equiangular property provies interference invariance, it may be of practical interest to sacrifice the maximally space requirement but yet maintain the constraint that the signature sequence forms a WBE sequence to ensure sum-capacity maximization The objective of this paper is to present an algorithm for fining WBEs that are nearly equiangular Let X = [x 1, x 2,,x N ] be the signature matrix constructe from the signature set It can be shown that a necessary an sufficient conition for a signature sequence to satisfy the Welch boun with equality is that the positive singular values of S are ientical A matrix with this property is calle a tight frame Our goal, then, is to construct a signature matrix X with the following properties i The matrix is a tight frame: XX = α I ii Each column has the correct norm: x n =1 iii The columns are equiangular: x k, x m = c for all k m an some c In this paper we present an algorithm that tries to calculate such sequences that we call equiangular tight frames In the sequel, we summarize the metho an its theoretical behavior

3 IV ALTERNATING PROJECTION PRELIMINARIES Our technique is base on an alternating projection between Property (i) an Properties (ii) (iii) The algorithm attempts to compute a nearby matrix (in terms of the Frobenius norm) that satisfies Properties (i) (iii) Since the Gram matrix X X isplays all of the inner proucts, it is more natural to construct the Gram matrix of an equiangular tight frame than to construct the signature matrix irectly Therefore, our algorithm will alternate between the collection of Hermitian matrices that have the correct spectrum an the collection of Hermitian matrices that have sufficiently small off-iagonal entries Define a collection that contains the Gram matrices of all Nα-tight frames: ef G α = {G C N N : G = G an G has eigenvalues (α,,α, 0,,0)} (6) }{{} The set G α is essentially the Grassmannian manifol that consists of -imensional subspaces of C N [17] One may also ientify the matrices in G α as rank- orthogonal projectors, scale by α Theorem 1 shows how to fin a matrix in G α nearest to an arbitrary Hermitian matrix Theorem 1: Suppose that Z is an N N Hermitian matrix with a unitary factorization UΛU, where the entries of Λ are arrange in algebraically non-increasing orer Let U be the N matrix forme from the first columns of U Then α U U is a matrix in G α that is closest to Z with respect to the Frobenius norm This closest matrix is unique if an only if λ strictly excees λ +1 Proof: See [14] for etails Let H be a close collection of N N Hermitian matrices that satisfy the structural constraint set motivate by the equiangular property: ef H µ = {H C N N : H = H, iag H = m1 an max h mn µ} m =n It may seem more natural to require that the off-iagonal entries have moulus exactly equal to µ, but our experience inicates that the present formulation works better, perhaps because H µ is convex The following proposition shows how to prouce the nearest matrix in H µ Proposition 2: Let Z be an arbitrary matrix With respect to Frobenius norm, the unique matrix in H µ closest to Z has a unit iagonal an off-iagonal entries that satisfy { zmn if z h mn = mn µ an µ e iargzmn otherwise We use i to enote the imaginary unit Proof: The argument is straightforwar The objective of alternating minimization is to fin a solution to the following question Problem 1: Fin a matrix in G α that is minimally istant from H with respect to a given norm If the two sets intersect, any solution to this problem will lie in the intersection Otherwise, the problem requests a tight frame with unit norm columns whose Gram matrix is most nearly equiangular We o not mention the problem of proucing a matrix in H that is nearest to G α because it is not generally possible to factor a matrix in H to obtain a frame with imensions N V STATEMENT OF THE ALGORITHM Practically, implementing to propose alternating minimizing involves alternately enforcing the two aforementione constraint sets until reaching a suitable stopping criterion Convergence is an issue since the tight frame constraint set is non-convex Algorithm 1 (Alternating Projection): INPUT: An arbitrary matrix S 0 The number of iterations J OUTPUT: A signature matrix X J PROCEDURE: 1) Let j =1an H = S0 S 0 2) Fin G j, the Gram matrix nearest to H j 1 in Frobenius norm that has Property (i) 3) Fin H j, the nearest Gram matrix to G j in Frobenius norm that has Properties (ii) an (iii) 4) Increment j Repeat Steps 2 4 until j>j 5) Solve for X J by factoring G J using a finite-step metho such as [19] for example VI SUMMARY OF CONVERGENCE RESULTS The machinery of point-to-set maps is require to unerstan the convergence of this algorithm, so we must refer the reaer to [14] for etails In this section we shall summarize the convergence results A Basic Convergence Results It shoul be clear that alternating projection never increases the istance between successive iterates This oes not mean that it will locate a point of minimal istance between the constraint sets It can be shown, however, that it is globally convergent in a weak sense Define the istance between a point M an a set Y via ist(m, Y )= inf Y Y Y M F Theorem 3 (Global Convergence of Algorithm): Let Y an Z be close sets, one of which is boune Suppose that alternating projection generates a sequence of iterates {(Y j, Z j )} This sequence has at least one accumulation point Every accumulation point lies in Y Z

4 Every accumulation point (Y, Z) satisfies Y Z F = lim j Y j Z j F Every accumulation point (Y, Z) satisfies Y Z F =ist(y, Z )=ist(z, Y ) For a proof of Theorem 3, see the Appenix in [14] The convergence of the propose algorithm is geometric at best [20], [21], [22], [23] This is the major shortfall of alternating projection methos Note that the sequence of iterates may have many accumulation points Moreover, the last conition oes not imply that the accumulation point (Y, Z) is a fixe point of the alternating projection So what are the potential accumulation points of a sequence of iterates? Since the algorithm never increases the istance between successive iterates, the set of accumulation points inclues every pair of matrices in Y Z that lie at minimal istance from each other B Convergence Results Besies the general convergence result, Theorem 3, we also obtain a local convergence result Theorem 4: Assume that the alternating projection between G α an H µ generates a sequence of iterates {(G j, H j )}, an suppose that there is an iteration J uring which G J H J F <N/( 2) The sequence of iterates possesses at least one accumulation point, say (G, H) The accumulation point lies in G α H µ The pair (G, H) is a fixe point of the alternating projection In other wors, if we applie the algorithm to G or to H, every iterate woul equal (G, H) The accumulation point satisfies G HF = lim G j H j j F The component sequences are asymptotically regular, ie G j+1 G j F 0 an H j+1 H j F 0 Either the component sequences both converge in norm, G j G F 0 an H j H F 0, or the set of accumulation points forms a continuum Proof: See the Appenix in [14] A Example Construction VII NUMERICAL EXPERIMENTS First, let us illustrate just how significant a ifference there is between vanilla signature matrices an equiangular signature matrices Here is the Gram matrix of a six-vector, unit-norm tight frame for R 3 : N R R 4 C R R 5 R R 6 R R R 7 C C R 8 C 9 C C 10 R 11 C C 12 C 13 C C R TABLE I N C C C C EQUIANGULAR WBE SIGNATURE SETS The notations R an C respectively inicate that alternating projection was able to compute a real, or complex, equiangular tight frame Note that every real, equiangular tight frame is automatically a complex, equiangular tight frame One perio () means that no real, equiangular tight frame exists, an two perios () mean that no equiangular tight frame exists at all Notice that the inner-proucts between vectors are quite isparate, ranging in magnitue between an These inner proucts correspon to acute angles of 762 an 509 In fact, this tight frame is pretty tame; the largest inner proucts in a unit-norm tight frame can be arbitrarily close to one 1 The Gram matrix of a six-vector, equiangular tight frame for R 3 looks quite ifferent: Every pair of vectors meets at an acute angle of 634 The vectors in this frame can be interprete as the iagonals of an icosaheron [17] B Summary of Basic Constructions We have use alternating projection to compute equiangular tight frames, both real an complex, in imensions two through six The algorithm performe poorly when initialize with ranom vectors, which le us to aopt a more sophisticate approach We begin with many ranom vectors an winnow this collection own by repeately removing whatever vector has the largest inner prouct against another vector It is fast an easy to esign starting points in this manner, yet the results are impressive These calculations are summarize in Table I Alternating projection can locate every real, equiangular tight frame signature matrix in imensions two through six; algebraic consierations eliminate all the 1 To see this, consier a tight frame that contains two copies of an orthonormal basis, where one copy is rotate away from the other by an arbitrarily small angle

5 N Minimum Cor Average Cor St Dev Cor Max Cor Max Cor Packing Max Cor Boun TABLE II NEAR-EQUIANGULAR WBE SIGNATURE SETS Summary of the correlation behavior of specific WBE sequences resulting from the propose algorithm The last three lines compare the maximum correlation of the caniate near-equiangular WBE with the maximum correlation of the best line packing foun for (, N) without the tight frame constraint an the lower boun on the maximum correlation (5) remaining values of N [4] In the complex case, the algorithm was able to compute every equiangular tight frame that we know of Unfortunately, no one has yet evelope necessary conitions on the existence of complex, equiangular tight frames asie from the upper boun, N 2, an so we have been unable to rule out the existence of other ensembles C Overloae System Example We have also constructe some WBEs in imensions of = 2 k for k = 2, 3,,6 an an overloa factor of ten percent The results of this construction are illustrate in Table II Constructions (4, 5) an (8, 9) are exact equiangular tight frames (corresponing to the simplex) In the other cases, the WBEs are only nearly equiangular Because of the tight frame constraint, the maximum correlation is somewhat higher than that of the best line packing for those combinations (without the tight frame constraint), an is larger than the lower boun The stanar eviation of the correlation between two signatures provies a measure of equiangularity Lower values inicate the signatures are more equiangular In the propose examples, there is some variability especially for larger imensions This is because N is not much bigger than thus there are fewer egrees of freeom to enforce the equiangular property For =64an N = 128, though, a construction exists that is equiangular an maximally space [3] VIII CONCLUSION We have propose an alternating minimization that is capable of fining optimal CDMA signature sequences that satisfy equiangular sie constraints an iscusse convergence of the algorithm This algorithm can also be use to solve for unconstraine optimal CDMA signature sequences, sequences with peak-to-average power ratio sie constraints [12], an spectrum constraints A major issue with the propose algorithm is that the resulting sequences are generally complex value an this may lea to implementation challenges Incorporating binary or finite alphabet constraints on the signatures is an interesting topic for future research REFERENCES [1] M Rupf an J L Massey, Optimum sequence multisets for synchronous coe-ivision multiple-access channels, IEEE Trans Inform Theory, vol 40, no 4, pp , July 1994 [2] V Kravcenko, H Boche, F Fitzek, an A Wolisz, No nee for signaling: Investigation of capacity an quality of service for multi-coe CDMA systems usign the wbe ++ approach, in Proc 4th Int Workshop on Mob an Wireless Commun Networks, 2002, pp [3] R W Heath Jr, T Strohmer, an A J Paulraj, Grassmanian signatures for CDMA systems, in Proc of IEEE Global Telecommunications Conf, San Francisco, CA, Dec 2003 [4] T Strohmer an R W Heath Jr, Grassmannian frames with applications to coing an communication, Appl Comp Harmonic Anal, vol 14, no 3, pp , May 2003 [5] A R Calerbank, P J Cameron, W M Kantor, an J J Seiel, Z 4 - Kerock coes, orthogonal spreas an extremal Eucliean line sets, Proc Lonon Math Soc, vol 75, no 2, pp , 1997 [6] N J A Sloane, Packing planes in four imensions an other mysteries, in Proceeings of the Conference on Algebraic Combinatorics an Relate Topics, Yamagata, Japan, Nov 1997 [7] C Rose, CDMA coewor optimization: interference avoiance an class warfare, IEEE Trans Inform Theory, vol 47, no 6, pp , Sept 2001 [8] S Ulukus an R D Yates, Iterative construction of optimum signature sequence sets in synchronous CDMA systems, IEEE Trans Inform Theory, vol 47, no 5, pp , 2001 [9] C Rose, S Ulukus, an R D Yates, Wireless systems an interference avoiance, IEEE Trans Wireless Comm, vol 1, no 3, pp , Jul 2002 [10] P Anigstein an V Anantharam, Ensuring convergence of the MMSE iteration for interference avoiance to the global optimum, IEEE Trans Inform Th, vol 49, no 4, pp , Apr 2003 [11] J A Tropp, R W Heath Jr, an T Strohmer, Optimal CDMA signature sequences, inverse eigenvalue problems an alternating projection, in Proceeings of the 2003 IEEE International Symposium on Information Theory, Yokohama, July 2003, p 407 [12] J A Tropp, I S Dhillon, R W Heath Jr, an T Strohmer, CDMA signature sequences with low peak-to-average-power ratio via alternating projection, in Proceeings of the 37th Annual Asilomar Conference on Signals, Systems an Computers, Monterrey, Nov 2003 [13] M T Chu, Constructing a Hermitian matrix from its iagonal entries an eigenvalues, SIAM J Matrix Anal Appl, vol 16, no 1, pp , Jan 1995 [14] J A Tropp, I Dhillon, R W Heath Jr, an T Strohmer, Designing structure tight frames via an alternating projection metho, Dec 2003, the University of Texas at Austin, ICES Report 03-50, December 2003, also submitte to the IEEE Trans Inform Theory [15] D V Sarwate, Meeting the Welch Boun with equality, in Sequences an their Applications Lonon: Springer, 1998, pp [16] J L Massey an T Mittelholzer, Welch s boun an sequence sets for coe ivision multiple-access systems, in Sequences II: Methos in Communication, Security, an Computer Science New York: Springer- Verlag, 1993, pp [17] J H Conway, R H Harin, an N J A Sloane, Packing lines, planes, etc: Packings in Grassmannian spaces, Experimental Math, vol 5, no 2, pp , 1996 [18] D Agrawal, T J Richarson, an R L Urbanke, Multiple-antenna signal constellations for faing channels, IEEE Trans Inform Theory, vol 47, no 6, pp , Sept 2001 [19] N N Chan an K-H Li, Diagonal elements an eigenvalues of a real symmetric matrix, J Math Anal Appl, vol 91, pp , 1983 [20] N Aronszajn, Introuction to the Theory of Hilbert Spaces, Vol I Stillwater, OK: Research Founation of Oklahoma A & M College, 1950 [21] S Kayalar an H Weinert, Error bouns for the metho of alternating projections, Math Control Signal Systems, pp 43 59, 1988 [22] J e Leeuw, Information Systems an Data Analysis Berlin: Springer, 1994, ch Block relaxation algorithms in statistics, pp [23] F Deutsch, Best Approximation in Inner-Prouct Spaces New York: Springer-Verlag, 2001

Optimal CDMA Signatures: A Finite-Step Approach

Optimal CDMA Signatures: A Finite-Step Approach Optimal CDMA Signatures: A Finite-Step Approach Joel A. Tropp Inst. for Comp. Engr. an Sci. (ICES) 1 University Station C000 Austin, TX 7871 jtropp@ices.utexas.eu Inerjit. S. Dhillon Dept. of Comp. Sci.

More information

Inverse Eigenvalue Problems in Wireless Communications

Inverse Eigenvalue Problems in Wireless Communications Inverse Eigenvalue Problems in Wireless Communications Inderjit S. Dhillon Robert W. Heath Jr. Mátyás Sustik Joel A. Tropp The University of Texas at Austin Thomas Strohmer The University of California

More information

Designing Structured Tight Frames via an Alternating Projection Method

Designing Structured Tight Frames via an Alternating Projection Method 1 Designing Structured Tight Frames via an Alternating Projection Method Joel A Tropp, Student Member, IEEE, Inderjit S Dhillon, Member, IEEE, Robert W Heath Jr, Member, IEEE and Thomas Strohmer Abstract

More information

188 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 1, JANUARY 2005

188 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 1, JANUARY 2005 188 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 1, JANUARY 2005 Designing Structured Tight Frames Via an Alternating Projection Method Joel A. Tropp, Student Member, IEEE, Inderjit S. Dhillon,

More information

Capacity Analysis of MIMO Systems with Unknown Channel State Information

Capacity Analysis of MIMO Systems with Unknown Channel State Information Capacity Analysis of MIMO Systems with Unknown Channel State Information Jun Zheng an Bhaskar D. Rao Dept. of Electrical an Computer Engineering University of California at San Diego e-mail: juzheng@ucs.eu,

More information

Lower bounds on Locality Sensitive Hashing

Lower bounds on Locality Sensitive Hashing Lower bouns on Locality Sensitive Hashing Rajeev Motwani Assaf Naor Rina Panigrahy Abstract Given a metric space (X, X ), c 1, r > 0, an p, q [0, 1], a istribution over mappings H : X N is calle a (r,

More information

Acute sets in Euclidean spaces

Acute sets in Euclidean spaces Acute sets in Eucliean spaces Viktor Harangi April, 011 Abstract A finite set H in R is calle an acute set if any angle etermine by three points of H is acute. We examine the maximal carinality α() of

More information

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION The Annals of Statistics 1997, Vol. 25, No. 6, 2313 2327 LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION By Eva Riccomagno, 1 Rainer Schwabe 2 an Henry P. Wynn 1 University of Warwick, Technische

More information

Qubit channels that achieve capacity with two states

Qubit channels that achieve capacity with two states Qubit channels that achieve capacity with two states Dominic W. Berry Department of Physics, The University of Queenslan, Brisbane, Queenslan 4072, Australia Receive 22 December 2004; publishe 22 March

More information

Permanent vs. Determinant

Permanent vs. Determinant Permanent vs. Determinant Frank Ban Introuction A major problem in theoretical computer science is the Permanent vs. Determinant problem. It asks: given an n by n matrix of ineterminates A = (a i,j ) an

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments 2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor

More information

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012 CS-6 Theory Gems November 8, 0 Lecture Lecturer: Alesaner Mąry Scribes: Alhussein Fawzi, Dorina Thanou Introuction Toay, we will briefly iscuss an important technique in probability theory measure concentration

More information

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control 19 Eigenvalues, Eigenvectors, Orinary Differential Equations, an Control This section introuces eigenvalues an eigenvectors of a matrix, an iscusses the role of the eigenvalues in etermining the behavior

More information

Space-time Linear Dispersion Using Coordinate Interleaving

Space-time Linear Dispersion Using Coordinate Interleaving Space-time Linear Dispersion Using Coorinate Interleaving Jinsong Wu an Steven D Blostein Department of Electrical an Computer Engineering Queen s University, Kingston, Ontario, Canaa, K7L3N6 Email: wujs@ieeeorg

More information

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013 Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing

More information

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors Math 18.02 Notes on ifferentials, the Chain Rule, graients, irectional erivative, an normal vectors Tangent plane an linear approximation We efine the partial erivatives of f( xy, ) as follows: f f( x+

More information

On the Equivalence Between Real Mutually Unbiased Bases and a Certain Class of Association Schemes

On the Equivalence Between Real Mutually Unbiased Bases and a Certain Class of Association Schemes Worcester Polytechnic Institute DigitalCommons@WPI Mathematical Sciences Faculty Publications Department of Mathematical Sciences 010 On the Equivalence Between Real Mutually Unbiase Bases an a Certain

More information

LECTURE NOTES ON DVORETZKY S THEOREM

LECTURE NOTES ON DVORETZKY S THEOREM LECTURE NOTES ON DVORETZKY S THEOREM STEVEN HEILMAN Abstract. We present the first half of the paper [S]. In particular, the results below, unless otherwise state, shoul be attribute to G. Schechtman.

More information

Multi-View Clustering via Canonical Correlation Analysis

Multi-View Clustering via Canonical Correlation Analysis Technical Report TTI-TR-2008-5 Multi-View Clustering via Canonical Correlation Analysis Kamalika Chauhuri UC San Diego Sham M. Kakae Toyota Technological Institute at Chicago ABSTRACT Clustering ata in

More information

ensembles When working with density operators, we can use this connection to define a generalized Bloch vector: v x Tr x, v y Tr y

ensembles When working with density operators, we can use this connection to define a generalized Bloch vector: v x Tr x, v y Tr y Ph195a lecture notes, 1/3/01 Density operators for spin- 1 ensembles So far in our iscussion of spin- 1 systems, we have restricte our attention to the case of pure states an Hamiltonian evolution. Toay

More information

u!i = a T u = 0. Then S satisfies

u!i = a T u = 0. Then S satisfies Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace

More information

Calculus and optimization

Calculus and optimization Calculus an optimization These notes essentially correspon to mathematical appenix 2 in the text. 1 Functions of a single variable Now that we have e ne functions we turn our attention to calculus. A function

More information

6 General properties of an autonomous system of two first order ODE

6 General properties of an autonomous system of two first order ODE 6 General properties of an autonomous system of two first orer ODE Here we embark on stuying the autonomous system of two first orer ifferential equations of the form ẋ 1 = f 1 (, x 2 ), ẋ 2 = f 2 (, x

More information

Discrete Mathematics

Discrete Mathematics Discrete Mathematics 309 (009) 86 869 Contents lists available at ScienceDirect Discrete Mathematics journal homepage: wwwelseviercom/locate/isc Profile vectors in the lattice of subspaces Dániel Gerbner

More information

The chromatic number of graph powers

The chromatic number of graph powers Combinatorics, Probability an Computing (19XX) 00, 000 000. c 19XX Cambrige University Press Printe in the Unite Kingom The chromatic number of graph powers N O G A A L O N 1 an B O J A N M O H A R 1 Department

More information

Linear First-Order Equations

Linear First-Order Equations 5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)

More information

Chromatic number for a generalization of Cartesian product graphs

Chromatic number for a generalization of Cartesian product graphs Chromatic number for a generalization of Cartesian prouct graphs Daniel Král Douglas B. West Abstract Let G be a class of graphs. The -fol gri over G, enote G, is the family of graphs obtaine from -imensional

More information

Unit vectors with non-negative inner products

Unit vectors with non-negative inner products Unit vectors with non-negative inner proucts Bos, A.; Seiel, J.J. Publishe: 01/01/1980 Document Version Publisher s PDF, also known as Version of Recor (inclues final page, issue an volume numbers) Please

More information

Iterated Point-Line Configurations Grow Doubly-Exponentially

Iterated Point-Line Configurations Grow Doubly-Exponentially Iterate Point-Line Configurations Grow Doubly-Exponentially Joshua Cooper an Mark Walters July 9, 008 Abstract Begin with a set of four points in the real plane in general position. A to this collection

More information

Robustness and Perturbations of Minimal Bases

Robustness and Perturbations of Minimal Bases Robustness an Perturbations of Minimal Bases Paul Van Dooren an Froilán M Dopico December 9, 2016 Abstract Polynomial minimal bases of rational vector subspaces are a classical concept that plays an important

More information

Lower Bounds for the Smoothed Number of Pareto optimal Solutions

Lower Bounds for the Smoothed Number of Pareto optimal Solutions Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.

More information

Optimal Variable-Structure Control Tracking of Spacecraft Maneuvers

Optimal Variable-Structure Control Tracking of Spacecraft Maneuvers Optimal Variable-Structure Control racking of Spacecraft Maneuvers John L. Crassiis 1 Srinivas R. Vaali F. Lanis Markley 3 Introuction In recent years, much effort has been evote to the close-loop esign

More information

Real Equiangular Frames

Real Equiangular Frames Peter G Casazza Department of Mathematics The University of Missouri Columbia Missouri 65 400 Email: pete@mathmissouriedu Real Equiangular Frames (Invited Paper) Dan Redmond Department of Mathematics The

More information

Agmon Kolmogorov Inequalities on l 2 (Z d )

Agmon Kolmogorov Inequalities on l 2 (Z d ) Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,

More information

Rank, Trace, Determinant, Transpose an Inverse of a Matrix Let A be an n n square matrix: A = a11 a1 a1n a1 a an a n1 a n a nn nn where is the jth col

Rank, Trace, Determinant, Transpose an Inverse of a Matrix Let A be an n n square matrix: A = a11 a1 a1n a1 a an a n1 a n a nn nn where is the jth col Review of Linear Algebra { E18 Hanout Vectors an Their Inner Proucts Let X an Y be two vectors: an Their inner prouct is ene as X =[x1; ;x n ] T Y =[y1; ;y n ] T (X; Y ) = X T Y = x k y k k=1 where T an

More information

Optimal Sequences and Sum Capacity of Synchronous CDMA Systems

Optimal Sequences and Sum Capacity of Synchronous CDMA Systems Optimal Sequences and Sum Capacity of Synchronous CDMA Systems Pramod Viswanath and Venkat Anantharam {pvi, ananth}@eecs.berkeley.edu EECS Department, U C Berkeley CA 9470 Abstract The sum capacity of

More information

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes Leaving Ranomness to Nature: -Dimensional Prouct Coes through the lens of Generalize-LDPC coes Tavor Baharav, Kannan Ramchanran Dept. of Electrical Engineering an Computer Sciences, U.C. Berkeley {tavorb,

More information

Optimization of Geometries by Energy Minimization

Optimization of Geometries by Energy Minimization Optimization of Geometries by Energy Minimization by Tracy P. Hamilton Department of Chemistry University of Alabama at Birmingham Birmingham, AL 3594-140 hamilton@uab.eu Copyright Tracy P. Hamilton, 1997.

More information

Hyperbolic Moment Equations Using Quadrature-Based Projection Methods

Hyperbolic Moment Equations Using Quadrature-Based Projection Methods Hyperbolic Moment Equations Using Quarature-Base Projection Methos J. Koellermeier an M. Torrilhon Department of Mathematics, RWTH Aachen University, Aachen, Germany Abstract. Kinetic equations like the

More information

Analytic Scaling Formulas for Crossed Laser Acceleration in Vacuum

Analytic Scaling Formulas for Crossed Laser Acceleration in Vacuum October 6, 4 ARDB Note Analytic Scaling Formulas for Crosse Laser Acceleration in Vacuum Robert J. Noble Stanfor Linear Accelerator Center, Stanfor University 575 San Hill Roa, Menlo Park, California 945

More information

FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS. 1. Introduction

FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS. 1. Introduction FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS ALINA BUCUR, CHANTAL DAVID, BROOKE FEIGON, MATILDE LALÍN 1 Introuction In this note, we stuy the fluctuations in the number

More information

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5

More information

Database-friendly Random Projections

Database-friendly Random Projections Database-frienly Ranom Projections Dimitris Achlioptas Microsoft ABSTRACT A classic result of Johnson an Linenstrauss asserts that any set of n points in -imensional Eucliean space can be embee into k-imensional

More information

A Note on Exact Solutions to Linear Differential Equations by the Matrix Exponential

A Note on Exact Solutions to Linear Differential Equations by the Matrix Exponential Avances in Applie Mathematics an Mechanics Av. Appl. Math. Mech. Vol. 1 No. 4 pp. 573-580 DOI: 10.4208/aamm.09-m0946 August 2009 A Note on Exact Solutions to Linear Differential Equations by the Matrix

More information

1 dx. where is a large constant, i.e., 1, (7.6) and Px is of the order of unity. Indeed, if px is given by (7.5), the inequality (7.

1 dx. where is a large constant, i.e., 1, (7.6) and Px is of the order of unity. Indeed, if px is given by (7.5), the inequality (7. Lectures Nine an Ten The WKB Approximation The WKB metho is a powerful tool to obtain solutions for many physical problems It is generally applicable to problems of wave propagation in which the frequency

More information

UNDERSTANDING INTEGRATION

UNDERSTANDING INTEGRATION UNDERSTANDING INTEGRATION Dear Reaer The concept of Integration, mathematically speaking, is the "Inverse" of the concept of result, the integration of, woul give us back the function f(). This, in a way,

More information

SYMMETRIC KRONECKER PRODUCTS AND SEMICLASSICAL WAVE PACKETS

SYMMETRIC KRONECKER PRODUCTS AND SEMICLASSICAL WAVE PACKETS SYMMETRIC KRONECKER PRODUCTS AND SEMICLASSICAL WAVE PACKETS GEORGE A HAGEDORN AND CAROLINE LASSER Abstract We investigate the iterate Kronecker prouct of a square matrix with itself an prove an invariance

More information

Survival exponents for fractional Brownian motion with multivariate time

Survival exponents for fractional Brownian motion with multivariate time Survival exponents for fractional Brownian motion with multivariate time G Molchan Institute of Earthquae Preiction heory an Mathematical Geophysics Russian Acaemy of Science 84/3 Profsoyuznaya st 7997

More information

Two formulas for the Euler ϕ-function

Two formulas for the Euler ϕ-function Two formulas for the Euler ϕ-function Robert Frieman A multiplication formula for ϕ(n) The first formula we want to prove is the following: Theorem 1. If n 1 an n 2 are relatively prime positive integers,

More information

On the Aloha throughput-fairness tradeoff

On the Aloha throughput-fairness tradeoff On the Aloha throughput-fairness traeoff 1 Nan Xie, Member, IEEE, an Steven Weber, Senior Member, IEEE Abstract arxiv:1605.01557v1 [cs.it] 5 May 2016 A well-known inner boun of the stability region of

More information

Ramsey numbers of some bipartite graphs versus complete graphs

Ramsey numbers of some bipartite graphs versus complete graphs Ramsey numbers of some bipartite graphs versus complete graphs Tao Jiang, Michael Salerno Miami University, Oxfor, OH 45056, USA Abstract. The Ramsey number r(h, K n ) is the smallest positive integer

More information

On Characterizing the Delay-Performance of Wireless Scheduling Algorithms

On Characterizing the Delay-Performance of Wireless Scheduling Algorithms On Characterizing the Delay-Performance of Wireless Scheuling Algorithms Xiaojun Lin Center for Wireless Systems an Applications School of Electrical an Computer Engineering, Purue University West Lafayette,

More information

Schrödinger s equation.

Schrödinger s equation. Physics 342 Lecture 5 Schröinger s Equation Lecture 5 Physics 342 Quantum Mechanics I Wenesay, February 3r, 2010 Toay we iscuss Schröinger s equation an show that it supports the basic interpretation of

More information

CHAPTER 1 : DIFFERENTIABLE MANIFOLDS. 1.1 The definition of a differentiable manifold

CHAPTER 1 : DIFFERENTIABLE MANIFOLDS. 1.1 The definition of a differentiable manifold CHAPTER 1 : DIFFERENTIABLE MANIFOLDS 1.1 The efinition of a ifferentiable manifol Let M be a topological space. This means that we have a family Ω of open sets efine on M. These satisfy (1), M Ω (2) the

More information

Notes on Lie Groups, Lie algebras, and the Exponentiation Map Mitchell Faulk

Notes on Lie Groups, Lie algebras, and the Exponentiation Map Mitchell Faulk Notes on Lie Groups, Lie algebras, an the Exponentiation Map Mitchell Faulk 1. Preliminaries. In these notes, we concern ourselves with special objects calle matrix Lie groups an their corresponing Lie

More information

arxiv: v1 [math.mg] 10 Apr 2018

arxiv: v1 [math.mg] 10 Apr 2018 ON THE VOLUME BOUND IN THE DVORETZKY ROGERS LEMMA FERENC FODOR, MÁRTON NASZÓDI, AND TAMÁS ZARNÓCZ arxiv:1804.03444v1 [math.mg] 10 Apr 2018 Abstract. The classical Dvoretzky Rogers lemma provies a eterministic

More information

arxiv: v4 [math.pr] 27 Jul 2016

arxiv: v4 [math.pr] 27 Jul 2016 The Asymptotic Distribution of the Determinant of a Ranom Correlation Matrix arxiv:309768v4 mathpr] 7 Jul 06 AM Hanea a, & GF Nane b a Centre of xcellence for Biosecurity Risk Analysis, University of Melbourne,

More information

TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH

TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH English NUMERICAL MATHEMATICS Vol14, No1 Series A Journal of Chinese Universities Feb 2005 TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH He Ming( Λ) Michael K Ng(Ξ ) Abstract We

More information

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k A Proof of Lemma 2 B Proof of Lemma 3 Proof: Since the support of LL istributions is R, two such istributions are equivalent absolutely continuous with respect to each other an the ivergence is well-efine

More information

TIME-DELAY ESTIMATION USING FARROW-BASED FRACTIONAL-DELAY FIR FILTERS: FILTER APPROXIMATION VS. ESTIMATION ERRORS

TIME-DELAY ESTIMATION USING FARROW-BASED FRACTIONAL-DELAY FIR FILTERS: FILTER APPROXIMATION VS. ESTIMATION ERRORS TIME-DEAY ESTIMATION USING FARROW-BASED FRACTIONA-DEAY FIR FITERS: FITER APPROXIMATION VS. ESTIMATION ERRORS Mattias Olsson, Håkan Johansson, an Per öwenborg Div. of Electronic Systems, Dept. of Electrical

More information

Error Floors in LDPC Codes: Fast Simulation, Bounds and Hardware Emulation

Error Floors in LDPC Codes: Fast Simulation, Bounds and Hardware Emulation Error Floors in LDPC Coes: Fast Simulation, Bouns an Harware Emulation Pamela Lee, Lara Dolecek, Zhengya Zhang, Venkat Anantharam, Borivoje Nikolic, an Martin J. Wainwright EECS Department University of

More information

Interpretation of the Multi-Stage Nested Wiener Filter in the Krylov Subspace Framework

Interpretation of the Multi-Stage Nested Wiener Filter in the Krylov Subspace Framework Interpretation of the Multi-Stage Neste Wiener Filter in the Krylov Subspace Framework M. Joham an M. D. Zoltowski School of Electrical Engineering, Purue University, West Lafayette, IN 47907-285 e-mail:

More information

Topic 7: Convergence of Random Variables

Topic 7: Convergence of Random Variables Topic 7: Convergence of Ranom Variables Course 003, 2016 Page 0 The Inference Problem So far, our starting point has been a given probability space (S, F, P). We now look at how to generate information

More information

Parameter estimation: A new approach to weighting a priori information

Parameter estimation: A new approach to weighting a priori information Parameter estimation: A new approach to weighting a priori information J.L. Mea Department of Mathematics, Boise State University, Boise, ID 83725-555 E-mail: jmea@boisestate.eu Abstract. We propose a

More information

Large Triangles in the d-dimensional Unit-Cube (Extended Abstract)

Large Triangles in the d-dimensional Unit-Cube (Extended Abstract) Large Triangles in the -Dimensional Unit-Cube Extene Abstract) Hanno Lefmann Fakultät für Informatik, TU Chemnitz, D-0907 Chemnitz, Germany lefmann@informatik.tu-chemnitz.e Abstract. We consier a variant

More information

Table of Common Derivatives By David Abraham

Table of Common Derivatives By David Abraham Prouct an Quotient Rules: Table of Common Derivatives By Davi Abraham [ f ( g( ] = [ f ( ] g( + f ( [ g( ] f ( = g( [ f ( ] g( g( f ( [ g( ] Trigonometric Functions: sin( = cos( cos( = sin( tan( = sec

More information

Quantum mechanical approaches to the virial

Quantum mechanical approaches to the virial Quantum mechanical approaches to the virial S.LeBohec Department of Physics an Astronomy, University of Utah, Salt Lae City, UT 84112, USA Date: June 30 th 2015 In this note, we approach the virial from

More information

SPARSE NEAR-EQUIANGULAR TIGHT FRAMES WITH APPLICATIONS IN FULL DUPLEX WIRELESS COMMUNICATION

SPARSE NEAR-EQUIANGULAR TIGHT FRAMES WITH APPLICATIONS IN FULL DUPLEX WIRELESS COMMUNICATION SPARSE NEAR-EQUIANGULAR TIGHT FRAMES WITH APPLICATIONS IN FULL DUPLEX WIRELESS COMMUNICATION A. Thompson Mathematical Institute University of Oxford Oxford, United Kingdom R. Calderbank Department of ECE

More information

On combinatorial approaches to compressed sensing

On combinatorial approaches to compressed sensing On combinatorial approaches to compresse sensing Abolreza Abolhosseini Moghaam an Hayer Raha Department of Electrical an Computer Engineering, Michigan State University, East Lansing, MI, U.S. Emails:{abolhos,raha}@msu.eu

More information

Accelerate Implementation of Forwaring Control Laws using Composition Methos Yves Moreau an Roolphe Sepulchre June 1997 Abstract We use a metho of int

Accelerate Implementation of Forwaring Control Laws using Composition Methos Yves Moreau an Roolphe Sepulchre June 1997 Abstract We use a metho of int Katholieke Universiteit Leuven Departement Elektrotechniek ESAT-SISTA/TR 1997-11 Accelerate Implementation of Forwaring Control Laws using Composition Methos 1 Yves Moreau, Roolphe Sepulchre, Joos Vanewalle

More information

A simple model for the small-strain behaviour of soils

A simple model for the small-strain behaviour of soils A simple moel for the small-strain behaviour of soils José Jorge Naer Department of Structural an Geotechnical ngineering, Polytechnic School, University of São Paulo 05508-900, São Paulo, Brazil, e-mail:

More information

SYNCHRONOUS SEQUENTIAL CIRCUITS

SYNCHRONOUS SEQUENTIAL CIRCUITS CHAPTER SYNCHRONOUS SEUENTIAL CIRCUITS Registers an counters, two very common synchronous sequential circuits, are introuce in this chapter. Register is a igital circuit for storing information. Contents

More information

Laplacian Cooperative Attitude Control of Multiple Rigid Bodies

Laplacian Cooperative Attitude Control of Multiple Rigid Bodies Laplacian Cooperative Attitue Control of Multiple Rigi Boies Dimos V. Dimarogonas, Panagiotis Tsiotras an Kostas J. Kyriakopoulos Abstract Motivate by the fact that linear controllers can stabilize the

More information

Research Article When Inflation Causes No Increase in Claim Amounts

Research Article When Inflation Causes No Increase in Claim Amounts Probability an Statistics Volume 2009, Article ID 943926, 10 pages oi:10.1155/2009/943926 Research Article When Inflation Causes No Increase in Claim Amounts Vytaras Brazauskas, 1 Bruce L. Jones, 2 an

More information

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations Diophantine Approximations: Examining the Farey Process an its Metho on Proucing Best Approximations Kelly Bowen Introuction When a person hears the phrase irrational number, one oes not think of anything

More information

Tractability results for weighted Banach spaces of smooth functions

Tractability results for weighted Banach spaces of smooth functions Tractability results for weighte Banach spaces of smooth functions Markus Weimar Mathematisches Institut, Universität Jena Ernst-Abbe-Platz 2, 07740 Jena, Germany email: markus.weimar@uni-jena.e March

More information

7.1 Support Vector Machine

7.1 Support Vector Machine 67577 Intro. to Machine Learning Fall semester, 006/7 Lecture 7: Support Vector Machines an Kernel Functions II Lecturer: Amnon Shashua Scribe: Amnon Shashua 7. Support Vector Machine We return now to

More information

Characterizing Real-Valued Multivariate Complex Polynomials and Their Symmetric Tensor Representations

Characterizing Real-Valued Multivariate Complex Polynomials and Their Symmetric Tensor Representations Characterizing Real-Value Multivariate Complex Polynomials an Their Symmetric Tensor Representations Bo JIANG Zhening LI Shuzhong ZHANG December 31, 2014 Abstract In this paper we stuy multivariate polynomial

More information

JUST THE MATHS UNIT NUMBER DIFFERENTIATION 2 (Rates of change) A.J.Hobson

JUST THE MATHS UNIT NUMBER DIFFERENTIATION 2 (Rates of change) A.J.Hobson JUST THE MATHS UNIT NUMBER 10.2 DIFFERENTIATION 2 (Rates of change) by A.J.Hobson 10.2.1 Introuction 10.2.2 Average rates of change 10.2.3 Instantaneous rates of change 10.2.4 Derivatives 10.2.5 Exercises

More information

Necessary and Sufficient Conditions for Sketched Subspace Clustering

Necessary and Sufficient Conditions for Sketched Subspace Clustering Necessary an Sufficient Conitions for Sketche Subspace Clustering Daniel Pimentel-Alarcón, Laura Balzano 2, Robert Nowak University of Wisconsin-Maison, 2 University of Michigan-Ann Arbor Abstract This

More information

Pure Further Mathematics 1. Revision Notes

Pure Further Mathematics 1. Revision Notes Pure Further Mathematics Revision Notes June 20 2 FP JUNE 20 SDB Further Pure Complex Numbers... 3 Definitions an arithmetical operations... 3 Complex conjugate... 3 Properties... 3 Complex number plane,

More information

Sharp Thresholds. Zachary Hamaker. March 15, 2010

Sharp Thresholds. Zachary Hamaker. March 15, 2010 Sharp Threshols Zachary Hamaker March 15, 2010 Abstract The Kolmogorov Zero-One law states that for tail events on infinite-imensional probability spaces, the probability must be either zero or one. Behavior

More information

A Novel Decoupled Iterative Method for Deep-Submicron MOSFET RF Circuit Simulation

A Novel Decoupled Iterative Method for Deep-Submicron MOSFET RF Circuit Simulation A Novel ecouple Iterative Metho for eep-submicron MOSFET RF Circuit Simulation CHUAN-SHENG WANG an YIMING LI epartment of Mathematics, National Tsing Hua University, National Nano evice Laboratories, an

More information

A new proof of the sharpness of the phase transition for Bernoulli percolation on Z d

A new proof of the sharpness of the phase transition for Bernoulli percolation on Z d A new proof of the sharpness of the phase transition for Bernoulli percolation on Z Hugo Duminil-Copin an Vincent Tassion October 8, 205 Abstract We provie a new proof of the sharpness of the phase transition

More information

Problem Sheet 2: Eigenvalues and eigenvectors and their use in solving linear ODEs

Problem Sheet 2: Eigenvalues and eigenvectors and their use in solving linear ODEs Problem Sheet 2: Eigenvalues an eigenvectors an their use in solving linear ODEs If you fin any typos/errors in this problem sheet please email jk28@icacuk The material in this problem sheet is not examinable

More information

Implicit Differentiation

Implicit Differentiation Implicit Differentiation Thus far, the functions we have been concerne with have been efine explicitly. A function is efine explicitly if the output is given irectly in terms of the input. For instance,

More information

ELECTRON DIFFRACTION

ELECTRON DIFFRACTION ELECTRON DIFFRACTION Electrons : wave or quanta? Measurement of wavelength an momentum of electrons. Introuction Electrons isplay both wave an particle properties. What is the relationship between the

More information

Lecture 6 : Dimensionality Reduction

Lecture 6 : Dimensionality Reduction CPS290: Algorithmic Founations of Data Science February 3, 207 Lecture 6 : Dimensionality Reuction Lecturer: Kamesh Munagala Scribe: Kamesh Munagala In this lecture, we will consier the roblem of maing

More information

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS Yannick DEVILLE Université Paul Sabatier Laboratoire Acoustique, Métrologie, Instrumentation Bât. 3RB2, 8 Route e Narbonne,

More information

2Algebraic ONLINE PAGE PROOFS. foundations

2Algebraic ONLINE PAGE PROOFS. foundations Algebraic founations. Kick off with CAS. Algebraic skills.3 Pascal s triangle an binomial expansions.4 The binomial theorem.5 Sets of real numbers.6 Surs.7 Review . Kick off with CAS Playing lotto Using

More information

On colour-blind distinguishing colour pallets in regular graphs

On colour-blind distinguishing colour pallets in regular graphs J Comb Optim (2014 28:348 357 DOI 10.1007/s10878-012-9556-x On colour-blin istinguishing colour pallets in regular graphs Jakub Przybyło Publishe online: 25 October 2012 The Author(s 2012. This article

More information

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs Lectures - Week 10 Introuction to Orinary Differential Equations (ODES) First Orer Linear ODEs When stuying ODEs we are consiering functions of one inepenent variable, e.g., f(x), where x is the inepenent

More information

Quantum Search on the Spatial Grid

Quantum Search on the Spatial Grid Quantum Search on the Spatial Gri Matthew D. Falk MIT 2012, 550 Memorial Drive, Cambrige, MA 02139 (Date: December 11, 2012) This paper explores Quantum Search on the two imensional spatial gri. Recent

More information

Lecture 12: November 6, 2013

Lecture 12: November 6, 2013 Information an Coing Theory Autumn 204 Lecturer: Mahur Tulsiani Lecture 2: November 6, 203 Scribe: Davi Kim Recall: We were looking at coes of the form C : F k q F n q, where q is prime, k is the message

More information

Concentration of Measure Inequalities for Compressive Toeplitz Matrices with Applications to Detection and System Identification

Concentration of Measure Inequalities for Compressive Toeplitz Matrices with Applications to Detection and System Identification Concentration of Measure Inequalities for Compressive Toeplitz Matrices with Applications to Detection an System Ientification Borhan M Sananaji, Tyrone L Vincent, an Michael B Wakin Abstract In this paper,

More information

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Ashish Goel Michael Kapralov Sanjeev Khanna Abstract We consier the well-stuie problem of fining a perfect matching in -regular bipartite

More information

Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Codes

Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Codes Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Coes Kaiann Fu an Achilleas Anastasopoulos Electrical Engineering an Computer Science Dept. University of Michigan, Ann Arbor, MI

More information

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS MARK SCHACHNER Abstract. When consiere as an algebraic space, the set of arithmetic functions equippe with the operations of pointwise aition an

More information

. Using a multinomial model gives us the following equation for P d. , with respect to same length term sequences.

. Using a multinomial model gives us the following equation for P d. , with respect to same length term sequences. S 63 Lecture 8 2/2/26 Lecturer Lillian Lee Scribes Peter Babinski, Davi Lin Basic Language Moeling Approach I. Special ase of LM-base Approach a. Recap of Formulas an Terms b. Fixing θ? c. About that Multinomial

More information