Inverse Problem for Dynamical Systems with Uncertain and Scarce Data DAVID SWIGON UNIVERSITY OF PITTSBURGH
|
|
- Wendy Lloyd
- 6 years ago
- Views:
Transcription
1 Inverse Problem for Dynamical Systems with Uncertain and Scarce Data DAVID SWIGON UNIVERSITY OF PITTSBURGH
2 Immune response to IAV infection: Experimental design Intranasal infection of Balb/c mice by Influenza virus A/PR/8/34 (H1N1) 5 pfu (lethal) or 5 pfu (sub-lethal) in PBS Flow Cytometry B-cells: CD19 (B-cell marker), CD69 (early activation marker), CD138 (plasma cells) T-cells: CD3, CD4 and CD8, CD69 Innate Cells: Granulocytes (Gr-1 (Ly-6G)high, CD11b high), Lung Macrophages (Gr-1 med, CD11b+, CD11c-, F4/8-), Common DC (cdc) (CD11b+, CD11c+), Plasmacytoid DC (pdcs) (CD11c+, CD11b-, Gr-1+, B22+, F4/8-) Luminex Analysis of cytokine profiles (IL-1a, IL-1b, IFN-γ, TNF-α, IL-1, IL-12, IL-6, IL-9, IL-13, KC, MIP- 1b, RANTES, MCP-1) Data measured on days, 1, 2, 3, 5, 7, (9, 11) Each data point is measured from a different mouse (>1 mice used in total). [Toapanta & Ross, Resp. Res., 29]
3 Antibodies Chemokines Effector cells (CD8) B-cells Type I IFN Virus NK cells Plasma cells Neutrophils Macrophages IL-12 Type II IFN IL-1 TNF-α Th cells (CD4) 5 pfu/ml 5 pfu/ml Why are the mice dying?
4 Immunology [Tamura & Kurata, JJID, 24]
5 Model Neutr tissue NO Healthy Infected IFNα Neutr blood Virus Ab B-cell IL-1 TNFα Σ 2 Dead CD8 P-cell IL-12 Mac Σ 1 CD4 NK IFNγ Chemo Inflammatory response Immune response [Price, Mochan, DS, Ermentrout, Lukens, Toapanta, Ross & Clermont, JTB, 215]
6 2 variables, 97 parameters Σ= at 11 ad 12 a 22 + V hc bmcc M ' = µ ( ) hc hc M M bm a + C mc bm t Σ T' = µ lt gl 1 + g2 kl 1 + k2 Σ+ ( Σ+ )( ) L+ d L+ d V ' = g gvv (1 R) I g HV g AV µ V 1+ av hx gixix I ' = ghvvh b (1 ) hx hx ikrik bierie µ i R I a + X F ' = b (1 R) I + b P g IF µ F R = F / ( a vi vh va v v ix fi fp fi f rf + F) hk bc kc K ' = bk + g hk hk kirik µ kk a + C kc bgow + ggo bgkw + ggk G' = O+ K µ gg a + W a + W go 2 2 av 2 1 bm l Σ L' = µ l ( Lblh (1 R) H) gl 1 + g2 Σ+ L+ d bm c Σ C ' = µ cc gl 1 + g2 Σ+ L+ d gk ˆ ˆ bt nt rncnc N ' = µ ˆ Nˆ N a + a L+ T a + C r ˆ ncnc N ' = µ nn a + C bxnn X ' = gxhhx gxiix µ x X a + N g H ' = b (1 R) H D ( H θ ) g VH a hx ghxhx DH ' = b (1 ) ( ) hx hx h R H DH H θ a + X nt nl nc nc xn hx h hv hx hx hx H = H + I + DH + DI P h HX + X b bp max b x h x g V a G = P( + g D )( g + ) µ Pb ) pv p1 ' pd I p p( p apv + V a p2 + G b E ' = h a ho bopp O' = µ ho ho oo a + P bwoo W ' = bw + Pµ ww a + O B' = b ep op ep e P h e + P wo h e b RIE µ E + bwp( B B) µ B A' = b + b B g AV µ A a ab av a [Price, Mochan, DS, Ermentrout, Lukens, Toapanta, Ross & Clermont, JTB, 215] ei Key Ʃ Inflammatory Signal D Damage (dead cells) M Macrophages T Pro-inflammatory (TNFα) L Anti-inflammatory (IL1) C Chemokines Ñ Neutrophils (blood) N Neutrophils (tissue) X Toxin (NO) H Healthy Cells DH Cells killed by toxins V Influenza A Virus I Infected Cells F Type I Interferon (IFNα,β) K Natural Killer Cells G Type II Interferon (IFNγ) R Resistance A Antibodies P Antigen-presenting Cells (cdc) E CTLs (CD8) O T Helper Cells (CD4) W IL-12 B B-Cells A Antibodies (IgM) e DATA
7 Trajectory quantification (sublethal dosage) Sample size: 1 7 Running time: 1-2 weeks
8 Trajectory quantification (lethal dosage)
9 Survival quantification
10 Biological systems Model complexity Large number of variables and parameters Connectivity of interaction graph Data scarcity Insufficient number of variables observed Insufficient time resolution Quality Data inhomogeneity Multiple subjects combined in one data set Inadequate prior characterization Inclusion of dynamical expectations Noninformative priors Quantity Homogeneity
11 New (old?) directions Inverse problem for dynamical systems Identifiability from a single trajectory Existence and uniqueness of inverse Maximal permissible uncertainty Parameter estimation for ensemble models Transformation of measure Accurate prediction from scarce data Prediction uncertainty Noninformative and behavioral priors Parameter inference under L1 norm
12 Problems Initial value problem for ODEs Solution xx = ff xx, xx = bb R nn xx tt; bb CC 1 R nn FORWARD PROBLEM ff. xx(. ) INVERSE PROBLEM Existence & uniqueness Robustness Identifiability (uniqueness over a set of problems) Uncertainty of inverse and predictions for noisy data Answers depend on how much information is known about xx. and ff.
13 Identifiability from a single trajectory System xx = ff(xx; AA) is identifiable from trajectory with xx = bb iff there exists no BB R nn mm with AA BB such that xx ; AA, bb = xx( ; BB, bb). Not every trajectory can identify a system Some systems cannot be identified from any single trajectory
14 Linear-in-parameter systems Initial value problem for ODEs Solution xx = AAAA xx, xx = bb R nn xx tt; AA, bb CC 1 R nn AA R nn mm gg(xx) CC kk (R mm, R nn ) is assumed to be known (AA, bb) FORWARD PROBLEM INVERSE PROBLEM xx(. ; AA, bb)
15 = y xy x y x b = 1 1 Solution obeys xx tt = yy(tt) and hence it is confined to a proper subspace. System with the same trajectory: ) ( ) ( y x y x = + = y xy x y x β β α α Theorem (identifiability): For the linear-in-parameters model there exists no BB R nn mm with AA BB such that xx ; AA, bb = xx( ; BB, bb) iff gg(xx tt; AA, bb ) is not confined to a proper subspace of R mm. Example [Stanhope, Rubin, & DS, SIADS, 214]
16 Linear systems xx = AAAA, xx = bb R nn Theorem (identifiability): There exists no BB R nn nn with AA BB such that xx( ; AA, bb) xx( ; BB, bb) iff xx(tt; AA, bb) is not confined to a proper subspace of R nn. Theorem (non-confinement): xx(tt; AA, bb) is not confined to a proper subspace of R nn iff (a) bb is not confined to a proper AA-invariant subspace of R nn. (b) there is no left eigenvector of AA orthogonal to bb. Theorem (potential for identifiability): There exists bb R nn such that xx(tt; AA, bb) is not confined to a proper subspace of R nn if and only if AA has only one Jordan block for each of its eigenvalues. [Stanhope, Rubin, & DS, SIADS, 214]
17 = A = A = A Examples No single trajectory will identify this system
18 Identification from discrete data on a single trajectory Discrete data: dd = xx, xx 1,, xx nn, xx ii = xx(tt ii ; AA, bb) One can partition the data space into domains in which the system is identifiable from data the system is robustly identifiable (on an open neighborhood) the system is identifiable to within countable number of alternatives the system has a continuous family of compatible parameters there is no parameter set corresponding to the data the system has a specific dynamical behavior (stable, saddle, )
19 Linear models Discrete data (uniformly spaced): dd = (xx, xx 1,, xx nn ) Solution map: xx kk = ee AAAA bb 1 Step 1: Get Φ = XX 1 XX XX kk = [xx kk xx kk+1 xx nn+kk1 ] Step 2: Solve ee AA = Φ Conditions for existence and uniqueness of real matrix logarithm were characterized by Culver.
20 Robust identification Theorem: There exists an open set UU R nn nn containing Φ such that for any Ψ UU the equation Ψ = ee AA aa ssssssssssssssss has aa uuuuuuuuuuuu ssssssssssssssss nnnn ssssssssssssssss AA R nn nn iff (a) {xx, xx 1,, xx nn1 } are linearly independent and only positive real or complex eigenvalues. (b) Φ has n distinct positive real eigenvalues. at least one negative eigenvalue of odd multiplicity. [Stanhope, Rubin, & DS, JUQ, 217]
21 Region of unique inverses Let Eigenvalues of Φ are determined by Conditions on y that guarantee positive real eigenvalues have been worked out for arbitrary dimension [Gantmacher; Yang] ˆ X X X X = Φ Φ = Φ = y n y y y 1 1 ˆ x n X y 1 = Example in 2D (regions of data which give unique inverse)
22 Regions of special properties T = tr Φ, D = det Φ xx xx 1
23 Uncertainty in identification from discrete trajectory Uncertain data: dd = ( xx, xx 1,, xx nn ) Bounds on uncertainty: CC dd, εε = { dd: max ii,jj Δxx ii,jj < εε} Neighborhood CC dd, εε is called permissible for property P iff P is shared by all systems corresponding to the data dd CC dd, εε. Value εε PP > is maximal permissible uncertainty for property P iff CC dd, εε is permissible for P for all < ε < εε PP, and CC dd, εε is not permissible for P for any εε > εε PP P can be Existence of inverse (unique or nonunique) Unique inverse Unique stable inverse
24 Inverse problem solution can be very sensitive to small changes in data. xx 5 =.4 xx 5 =.12 xx 5 =.13
25 Theorem (lower bound on uniqueness uncertainty): Let d be such that Φ has n distinct positive eigenvalues λλ 1, λλ 2,, λλ nn. Let mm 1 = 1 min λλ 2 ii λλ jj, mm 1 = min λλ ii, and ii<jj ii δδ UU = min{mm 1, mm 2 }. If < εε εε UU where δδ UU εε UU = nn(δδ UU Λ ) SS 1 XX 1 SS with Φ = SSΛSS 1, then for any dd CC(dd, εε), Φ has n distinct positive eigenvalues. Proof uses a bound for perturbation of eigenvalues of Φ [Bauer and Fike]: λλ ii λλ ii SSSSSS 1 and the following estimate for EE = Φ Φ: SSSSSS 1 SS1 XX (1 + Λ ) XX 1 SS 1 SS 1 XX XX 1 SS [Stanhope, Rubin, & DS, JUQ, 217]
26 Theorem (upper bound on uniqueness uncertainty): Let d be such that Φ has n distinct positive eigenvalues λλ 1, λλ 2,, λλ nn, and let y be the last column vector of the companion matrix form Φ of Φ. The smallest neighborhood CC(dd, εε) that contains data dd for which companion matrix Φ has last column yy has εε = εε UU where εε UU = XX (yy yy) yy Proof: For any perturbed data dd with companion matrix Φ, XX yy = xx nn XX yy + XX yy yy = xx nn εε UU is the solution of the linear programming problem of minimizing εε such that ww ii = nn1 jj= Δxx jj,ii yy jj+1 Δxx nn,ii, ii = 1,, nn where ww = XX yy yy. εε Δxx ii,jj εε, ii = 1,, nn, jj =,, nn A tight upper bound on εε UU is found by optimizing εε UU over all yy for which Φ does not have n distinctive positive eigenvalues. [Stanhope, Rubin, & DS, JUQ, 217]
27 Example: Comparisons of uncertainty estimates by different methods. d ,, x = 2
28 = , , 2 1 d Example: Different properties for the same data set give different uncertainties. = , , 2 1 ~ d
29 = 5.6 5, , 2 1 d Example: Different properties for the same data set give different uncertainties. = , , 2 1 ~ d
30 Ensemble model Initial value problem Solution map (discrete data) xx = ff xx, aa, xx = bb R nn yy = FF aa invertible on Ω Parameter distribution: ρρ(aa) Data distribution: ηη yy aa Ω yy FF(Ω) ρρ aa = ηη FF aa JJ(aa) JJ aa = det DD aa FF aa Inverse problem: Reconstruct ρρ(aa) from the knowledge of ηη yy and FF aa.
31 Parameter inference Common technique for inference of ρρ(aa): 1. Approximate ηη yy with multivariate Gaussian ηη yy obtained from data sample YY = yy 1, yy 2, yy NN 2. Estimate ρρ(aa) as a Bayesian posterior σσ aa YY with likelihood LL aa YY = ηη(ff aa ) and some noninformative prior ππ(aa) Compare: σσ aa YY ηη(ff aa )ππ(aa) (Bayes formula) ρρ aa = ηη FF aa JJ(aa) (Ensemble model) Observation: Asymptotically accurate estimate of ρρ aa can be obtained using Bayes formula only if The data distribution ηη yy is accurately represented Jacobian prior is used: ππ aa = JJ(aa) [DS, Stanhope, Rubin, 217]
32 Examples Method 1 Method 2 Prior choices Uniform, Jeffreys (1 aa), Jacobian JJ aa [DS, Stanhope, Rubin, 217]
33 Method 1, linear dynamical system, uniform data distribution U ( x ij ε, x + ε ) ij x = Λx d =,, ε = Λ = a = ( λ11, λ12, λ21, λ22) MM Jeff MM Jac AA MM Unif
34 1 5 4 d =,, ε U = Λ = MM Jac MM Jeff AA MM Unif Jeffreys works well d =,, ε U = Λ = MM Jeff Uniform works well
35 Method 2, linear dynamical system, Gaussian parameter distribution, KDE used for smoothing the data distribution. 1 Λ = σ =.25 xx 11 xx 12 xx 21 xx 22 MM Jac MM Jeff AA MM Unif
36 Method 1, influenza dynamics, uniform data distribution U (( 1σ ) x ij,(1 + σ ) xij ) V = ri cv H = βhv I = βhv δi σ =.1 t = {1, 2} AA MM Jac 8 a = ( V, H, β, r, c, δ ) = (.93, 4 1, ,.12, 3., 4.) MM Jeff MM Unif Uniform works well
37 Method 1, influenza dynamics, uniform data distribution U 1σ ) x ij,(1 + σ ) x ) V = ri cv H = βhv I = βhv δi (( ij σ =.1 t = {2, 3} AA MM Jac 8 a = ( V, H, β, r, c, δ ) = (.93, 4 1, ,.12, 3., 4.) MM Jeff MM Unif Jacobian works well
38 Method 2, influenza dynamics, Gaussian parameter distribution, KDE used for smoothing the data distribution. V = ri cv H = βhv I = βhv δi t = {1, 2} AA 8 a = ( V, H, β, r, c, δ ) = (.93, 4 1, σ = (.1,.5,.1,.5,.2,.1) 5,.12, 3., 4.) MM Jac MM Jeff MM Unif
39 V = ri cv H = βhv I = βhv δi t = {2, 3} AA 8 a = ( V, H, β, r, c, δ ) = (.93, 4 1, σ = (.1,.2,.1,.1,.2,.1) 5,.12, 3., 4.) MM Jac MM Jeff MM Unif
40 Computational aspect Accurate representation of ηη yy requires large amount of data. KDE method can be used but introduces errors. Jacobian is expensive to compute, but still less expensive than direct inverse of FF aa. Methods Exact formula (available for linear models) Numerical integration of the first variational equation (sensitivity coefficients) Numerical differentiation Broyden s method (rank-1 update) [DS, Stanhope, Rubin, 217]
41 Summary Challenges with poorly supported models require rethinking of the model parametrization and inference procedures Inverse problem techniques should be explored and developed, bound estimates complement probabilistic approaches Parameter estimation of ensemble models requires the computation of Jacobian Priors should take into account dynamical features of modeled systems
42 Credits Inverse problems Jon Rubin Shelby Stanhope Influenza modeling Gilles Clermont Bard Ermentrout Baris Hancioglu Ian Price Ericka Mochan Funding NIGMS NSF-RTG
7.3 The Jacobi and Gauss-Seidel Iterative Methods
7.3 The Jacobi and Gauss-Seidel Iterative Methods 1 The Jacobi Method Two assumptions made on Jacobi Method: 1.The system given by aa 11 xx 1 + aa 12 xx 2 + aa 1nn xx nn = bb 1 aa 21 xx 1 + aa 22 xx 2
More informationSupplementary material
1 Supplementary material Supplement 1: Supplementary Figure legends Supplementary Figure 1. Interquartile ranges of the complete ensemble given an initial viral aliquot of 5 pfu (sublethal) for all variables
More informationSecondary 3H Unit = 1 = 7. Lesson 3.3 Worksheet. Simplify: Lesson 3.6 Worksheet
Secondary H Unit Lesson Worksheet Simplify: mm + 2 mm 2 4 mm+6 mm + 2 mm 2 mm 20 mm+4 5 2 9+20 2 0+25 4 +2 2 + 2 8 2 6 5. 2 yy 2 + yy 6. +2 + 5 2 2 2 0 Lesson 6 Worksheet List all asymptotes, holes and
More informationActinobacteria Relative abundance (%) Co-housed CD300f WT. CD300f KO. Colon length (cm) Day 9. Microscopic inflammation score
y groups y individuals 9 Actinobacteria Relative abundance (%) acteroidetes Cyanobacteria Deferribacteres Firmicutes Proteobacteria TM Tenericutes Unclassified CDf CDf Co-housed CDf Co-housed CDf CDf CDf
More informationSECTION 5: POWER FLOW. ESE 470 Energy Distribution Systems
SECTION 5: POWER FLOW ESE 470 Energy Distribution Systems 2 Introduction Nodal Analysis 3 Consider the following circuit Three voltage sources VV sss, VV sss, VV sss Generic branch impedances Could be
More informationApproximate Second Order Algorithms. Seo Taek Kong, Nithin Tangellamudi, Zhikai Guo
Approximate Second Order Algorithms Seo Taek Kong, Nithin Tangellamudi, Zhikai Guo Why Second Order Algorithms? Invariant under affine transformations e.g. stretching a function preserves the convergence
More informationEstimate by the L 2 Norm of a Parameter Poisson Intensity Discontinuous
Research Journal of Mathematics and Statistics 6: -5, 24 ISSN: 242-224, e-issn: 24-755 Maxwell Scientific Organization, 24 Submied: September 8, 23 Accepted: November 23, 23 Published: February 25, 24
More informationMath 171 Spring 2017 Final Exam. Problem Worth
Math 171 Spring 2017 Final Exam Problem 1 2 3 4 5 6 7 8 9 10 11 Worth 9 6 6 5 9 8 5 8 8 8 10 12 13 14 15 16 17 18 19 20 21 22 Total 8 5 5 6 6 8 6 6 6 6 6 150 Last Name: First Name: Student ID: Section:
More informationLecture 3. STAT161/261 Introduction to Pattern Recognition and Machine Learning Spring 2018 Prof. Allie Fletcher
Lecture 3 STAT161/261 Introduction to Pattern Recognition and Machine Learning Spring 2018 Prof. Allie Fletcher Previous lectures What is machine learning? Objectives of machine learning Supervised and
More informationTime Domain Analysis of Linear Systems Ch2. University of Central Oklahoma Dr. Mohamed Bingabr
Time Domain Analysis of Linear Systems Ch2 University of Central Oklahoma Dr. Mohamed Bingabr Outline Zero-input Response Impulse Response h(t) Convolution Zero-State Response System Stability System Response
More informationProperty Testing and Affine Invariance Part I Madhu Sudan Harvard University
Property Testing and Affine Invariance Part I Madhu Sudan Harvard University December 29-30, 2015 IITB: Property Testing & Affine Invariance 1 of 31 Goals of these talks Part I Introduce Property Testing
More informationVariations. ECE 6540, Lecture 02 Multivariate Random Variables & Linear Algebra
Variations ECE 6540, Lecture 02 Multivariate Random Variables & Linear Algebra Last Time Probability Density Functions Normal Distribution Expectation / Expectation of a function Independence Uncorrelated
More informationA Posteriori Error Estimates For Discontinuous Galerkin Methods Using Non-polynomial Basis Functions
Lin Lin A Posteriori DG using Non-Polynomial Basis 1 A Posteriori Error Estimates For Discontinuous Galerkin Methods Using Non-polynomial Basis Functions Lin Lin Department of Mathematics, UC Berkeley;
More informationLecture 3. Linear Regression
Lecture 3. Linear Regression COMP90051 Statistical Machine Learning Semester 2, 2017 Lecturer: Andrey Kan Copyright: University of Melbourne Weeks 2 to 8 inclusive Lecturer: Andrey Kan MS: Moscow, PhD:
More informationPhysics 403. Segev BenZvi. Parameter Estimation, Correlations, and Error Bars. Department of Physics and Astronomy University of Rochester
Physics 403 Parameter Estimation, Correlations, and Error Bars Segev BenZvi Department of Physics and Astronomy University of Rochester Table of Contents 1 Review of Last Class Best Estimates and Reliability
More informationData Preprocessing. Jilles Vreeken IRDM 15/ Oct 2015
Data Preprocessing Jilles Vreeken 22 Oct 2015 So, how do you pronounce Jilles Yill-less Vreeken Fray-can Okay, now we can talk. Questions of the day How do we preprocess data before we can extract anything
More informationSupport Vector Machines. CSE 4309 Machine Learning Vassilis Athitsos Computer Science and Engineering Department University of Texas at Arlington
Support Vector Machines CSE 4309 Machine Learning Vassilis Athitsos Computer Science and Engineering Department University of Texas at Arlington 1 A Linearly Separable Problem Consider the binary classification
More informationECE 6540, Lecture 06 Sufficient Statistics & Complete Statistics Variations
ECE 6540, Lecture 06 Sufficient Statistics & Complete Statistics Variations Last Time Minimum Variance Unbiased Estimators Sufficient Statistics Proving t = T(x) is sufficient Neyman-Fischer Factorization
More informationGrover s algorithm. We want to find aa. Search in an unordered database. QC oracle (as usual) Usual trick
Grover s algorithm Search in an unordered database Example: phonebook, need to find a person from a phone number Actually, something else, like hard (e.g., NP-complete) problem 0, xx aa Black box ff xx
More informationAlgebraic Codes and Invariance
Algebraic Codes and Invariance Madhu Sudan Harvard April 30, 2016 AAD3: Algebraic Codes and Invariance 1 of 29 Disclaimer Very little new work in this talk! Mainly: Ex- Coding theorist s perspective on
More informationOn The Cauchy Problem For Some Parabolic Fractional Partial Differential Equations With Time Delays
Journal of Mathematics and System Science 6 (216) 194-199 doi: 1.17265/2159-5291/216.5.3 D DAVID PUBLISHING On The Cauchy Problem For Some Parabolic Fractional Partial Differential Equations With Time
More informationWorksheets for GCSE Mathematics. Quadratics. mr-mathematics.com Maths Resources for Teachers. Algebra
Worksheets for GCSE Mathematics Quadratics mr-mathematics.com Maths Resources for Teachers Algebra Quadratics Worksheets Contents Differentiated Independent Learning Worksheets Solving x + bx + c by factorisation
More informationMath 4263 Homework Set 1
Homework Set 1 1. Solve the following PDE/BVP 2. Solve the following PDE/BVP 2u t + 3u x = 0 u (x, 0) = sin (x) u x + e x u y = 0 u (0, y) = y 2 3. (a) Find the curves γ : t (x (t), y (t)) such that that
More informationClassical RSA algorithm
Classical RSA algorithm We need to discuss some mathematics (number theory) first Modulo-NN arithmetic (modular arithmetic, clock arithmetic) 9 (mod 7) 4 3 5 (mod 7) congruent (I will also use = instead
More informationInferring the origin of an epidemic with a dynamic message-passing algorithm
Inferring the origin of an epidemic with a dynamic message-passing algorithm HARSH GUPTA (Based on the original work done by Andrey Y. Lokhov, Marc Mézard, Hiroki Ohta, and Lenka Zdeborová) Paper Andrey
More informationLogarithmic Functions
Name Student ID Number Group Name Group Members Logarithmic Functions 1. Solve the equations below. xx = xx = 5. Were you able solve both equations above? If so, was one of the equations easier to solve
More informationLocality in Coding Theory
Locality in Coding Theory Madhu Sudan Harvard April 9, 2016 Skoltech: Locality in Coding Theory 1 Error-Correcting Codes (Linear) Code CC FF qq nn. FF qq : Finite field with qq elements. nn block length
More informationControl of Mobile Robots
Control of Mobile Robots Regulation and trajectory tracking Prof. Luca Bascetta (luca.bascetta@polimi.it) Politecnico di Milano Dipartimento di Elettronica, Informazione e Bioingegneria Organization and
More informationSolving Fuzzy Nonlinear Equations by a General Iterative Method
2062062062062060 Journal of Uncertain Systems Vol.4, No.3, pp.206-25, 200 Online at: www.jus.org.uk Solving Fuzzy Nonlinear Equations by a General Iterative Method Anjeli Garg, S.R. Singh * Department
More informationAdvanced data analysis
Advanced data analysis Akisato Kimura ( 木村昭悟 ) NTT Communication Science Laboratories E-mail: akisato@ieee.org Advanced data analysis 1. Introduction (Aug 20) 2. Dimensionality reduction (Aug 20,21) PCA,
More informationGeneral Strong Polarization
General Strong Polarization Madhu Sudan Harvard University Joint work with Jaroslaw Blasiok (Harvard), Venkatesan Gurswami (CMU), Preetum Nakkiran (Harvard) and Atri Rudra (Buffalo) December 4, 2017 IAS:
More informationOn one Application of Newton s Method to Stability Problem
Journal of Multidciplinary Engineering Science Technology (JMEST) ISSN: 359-0040 Vol. Issue 5, December - 204 On one Application of Newton s Method to Stability Problem Şerife Yılmaz Department of Mathematics,
More informationA new procedure for sensitivity testing with two stress factors
A new procedure for sensitivity testing with two stress factors C.F. Jeff Wu Georgia Institute of Technology Sensitivity testing : problem formulation. Review of the 3pod (3-phase optimal design) procedure
More informationIndependent Component Analysis and FastICA. Copyright Changwei Xiong June last update: July 7, 2016
Independent Component Analysis and FastICA Copyright Changwei Xiong 016 June 016 last update: July 7, 016 TABLE OF CONTENTS Table of Contents...1 1. Introduction.... Independence by Non-gaussianity....1.
More informationLecture 6. Notes on Linear Algebra. Perceptron
Lecture 6. Notes on Linear Algebra. Perceptron COMP90051 Statistical Machine Learning Semester 2, 2017 Lecturer: Andrey Kan Copyright: University of Melbourne This lecture Notes on linear algebra Vectors
More informationExtreme value statistics: from one dimension to many. Lecture 1: one dimension Lecture 2: many dimensions
Extreme value statistics: from one dimension to many Lecture 1: one dimension Lecture 2: many dimensions The challenge for extreme value statistics right now: to go from 1 or 2 dimensions to 50 or more
More informationLINEAR ALGEBRA BOOT CAMP WEEK 4: THE SPECTRAL THEOREM
LINEAR ALGEBRA BOOT CAMP WEEK 4: THE SPECTRAL THEOREM Unless otherwise stated, all vector spaces in this worksheet are finite dimensional and the scalar field F is R or C. Definition 1. A linear operator
More informationCS Lecture 8 & 9. Lagrange Multipliers & Varitional Bounds
CS 6347 Lecture 8 & 9 Lagrange Multipliers & Varitional Bounds General Optimization subject to: min ff 0() R nn ff ii 0, h ii = 0, ii = 1,, mm ii = 1,, pp 2 General Optimization subject to: min ff 0()
More informationReview of Linear Algebra
Review of Linear Algebra Definitions An m n (read "m by n") matrix, is a rectangular array of entries, where m is the number of rows and n the number of columns. 2 Definitions (Con t) A is square if m=
More informationUncertain Compression & Graph Coloring. Madhu Sudan Harvard
Uncertain Compression & Graph Coloring Madhu Sudan Harvard Based on joint works with: (1) Adam Kalai (MSR), Sanjeev Khanna (U.Penn), Brendan Juba (WUStL) (2) Elad Haramaty (Harvard) (3) Badih Ghazi (MIT),
More informationMath Homework 8 (selected problems)
Math 102 - Homework 8 (selected problems) David Lipshutz Problem 1. (Strang, 5.5: #14) In the list below, which classes of matrices contain A and which contain B? 1 1 1 1 A 0 0 1 0 0 0 0 1 and B 1 1 1
More informationPredicting Winners of Competitive Events with Topological Data Analysis
Predicting Winners of Competitive Events with Topological Data Analysis Conrad D Souza Ruben Sanchez-Garcia R.Sanchez-Garcia@soton.ac.uk Tiejun Ma tiejun.ma@soton.ac.uk Johnnie Johnson J.E.Johnson@soton.ac.uk
More informationCHAPTER 5 Wave Properties of Matter and Quantum Mechanics I
CHAPTER 5 Wave Properties of Matter and Quantum Mechanics I 1 5.1 X-Ray Scattering 5.2 De Broglie Waves 5.3 Electron Scattering 5.4 Wave Motion 5.5 Waves or Particles 5.6 Uncertainty Principle Topics 5.7
More informationEE 341 A Few Review Problems Fall 2018
EE 341 A Few Review Problems Fall 2018 1. A linear, time-invariant system with input, xx(tt), and output, yy(tt), has the unit-step response, cc(tt), shown below. a. Find, and accurately sketch, the system
More informationAPPENDIX: MATHEMATICAL INDUCTION AND OTHER FORMS OF PROOF
ELEMENTARY LINEAR ALGEBRA WORKBOOK/FOR USE WITH RON LARSON S TEXTBOOK ELEMENTARY LINEAR ALGEBRA CREATED BY SHANNON MARTIN MYERS APPENDIX: MATHEMATICAL INDUCTION AND OTHER FORMS OF PROOF When you are done
More information(Extended) Kalman Filter
(Extended) Kalman Filter Brian Hunt 7 June 2013 Goals of Data Assimilation (DA) Estimate the state of a system based on both current and all past observations of the system, using a model for the system
More informationReview for Exam Hyunse Yoon, Ph.D. Assistant Research Scientist IIHR-Hydroscience & Engineering University of Iowa
57:020 Fluids Mechanics Fall2013 1 Review for Exam3 12. 11. 2013 Hyunse Yoon, Ph.D. Assistant Research Scientist IIHR-Hydroscience & Engineering University of Iowa 57:020 Fluids Mechanics Fall2013 2 Chapter
More information1. The graph of a function f is given above. Answer the question: a. Find the value(s) of x where f is not differentiable. Ans: x = 4, x = 3, x = 2,
1. The graph of a function f is given above. Answer the question: a. Find the value(s) of x where f is not differentiable. x = 4, x = 3, x = 2, x = 1, x = 1, x = 2, x = 3, x = 4, x = 5 b. Find the value(s)
More informationA mathematical and computational model of necrotizing enterocolitis
A mathematical and computational model of necrotizing enterocolitis Ivan Yotov Department of Mathematics, University of Pittsburgh McGowan Institute Scientific Retreat March 10-12, 2008 Acknowledgment:
More informationRadial Basis Function (RBF) Networks
CSE 5526: Introduction to Neural Networks Radial Basis Function (RBF) Networks 1 Function approximation We have been using MLPs as pattern classifiers But in general, they are function approximators Depending
More informationLecture No. 1 Introduction to Method of Weighted Residuals. Solve the differential equation L (u) = p(x) in V where L is a differential operator
Lecture No. 1 Introduction to Method of Weighted Residuals Solve the differential equation L (u) = p(x) in V where L is a differential operator with boundary conditions S(u) = g(x) on Γ where S is a differential
More informationReview for Exam Hyunse Yoon, Ph.D. Adjunct Assistant Professor Department of Mechanical Engineering, University of Iowa
Review for Exam3 12. 9. 2015 Hyunse Yoon, Ph.D. Adjunct Assistant Professor Department of Mechanical Engineering, University of Iowa Assistant Research Scientist IIHR-Hydroscience & Engineering, University
More informationConstitutive Relations of Stress and Strain in Stochastic Finite Element Method
American Journal of Computational and Applied Mathematics 15, 5(6): 164-173 DOI: 1.593/j.ajcam.1556. Constitutive Relations of Stress and Strain in Stochastic Finite Element Method Drakos Stefanos International
More informationCOMPRESSION FOR QUANTUM POPULATION CODING
COMPRESSION FOR QUANTUM POPULATION CODING Ge Bai, The University of Hong Kong Collaborative work with: Yuxiang Yang, Giulio Chiribella, Masahito Hayashi INTRODUCTION Population: A group of identical states
More informationMultivariable Calculus
2 Multivariable Calculus 2.1 Limits and Continuity Problem 2.1.1 (Fa94) Let the function f : R n R n satisfy the following two conditions: (i) f (K ) is compact whenever K is a compact subset of R n. (ii)
More informationFactor Analysis and Kalman Filtering (11/2/04)
CS281A/Stat241A: Statistical Learning Theory Factor Analysis and Kalman Filtering (11/2/04) Lecturer: Michael I. Jordan Scribes: Byung-Gon Chun and Sunghoon Kim 1 Factor Analysis Factor analysis is used
More informationPHL424: Nuclear Shell Model. Indian Institute of Technology Ropar
PHL424: Nuclear Shell Model Themes and challenges in modern science Complexity out of simplicity Microscopic How the world, with all its apparent complexity and diversity can be constructed out of a few
More informationMATH 423 Linear Algebra II Lecture 33: Diagonalization of normal operators.
MATH 423 Linear Algebra II Lecture 33: Diagonalization of normal operators. Adjoint operator and adjoint matrix Given a linear operator L on an inner product space V, the adjoint of L is a transformation
More informationLarge Scale Data Analysis Using Deep Learning
Large Scale Data Analysis Using Deep Learning Linear Algebra U Kang Seoul National University U Kang 1 In This Lecture Overview of linear algebra (but, not a comprehensive survey) Focused on the subset
More informationTerms of Use. Copyright Embark on the Journey
Terms of Use All rights reserved. No part of this packet may be reproduced, stored in a retrieval system, or transmitted in any form by any means - electronic, mechanical, photo-copies, recording, or otherwise
More informationPower of Adiabatic Quantum Computation
Power of Adiabatic Quantum Computation Itay Hen Information Sciences Institute, USC Physics Colloquium, USC February 10, 2014 arxiv preprints: 1207.1712, 1301.4956, 1307.6538, 1401.5172 Motivation in what
More informationInternational Journal of Mathematical Archive-5(12), 2014, Available online through ISSN
International Journal of Mathematical Archive-5(12), 2014, 75-79 Available online through www.ijma.info ISSN 2229 5046 ABOUT WEAK ALMOST LIMITED OPERATORS A. Retbi* and B. El Wahbi Université Ibn Tofail,
More informationCS145: INTRODUCTION TO DATA MINING
CS145: INTRODUCTION TO DATA MINING 2: Vector Data: Prediction Instructor: Yizhou Sun yzsun@cs.ucla.edu October 8, 2018 TA Office Hour Time Change Junheng Hao: Tuesday 1-3pm Yunsheng Bai: Thursday 1-3pm
More informationYang-Hwan Ahn Based on arxiv:
Yang-Hwan Ahn (CTPU@IBS) Based on arxiv: 1611.08359 1 Introduction Now that the Higgs boson has been discovered at 126 GeV, assuming that it is indeed exactly the one predicted by the SM, there are several
More informationWiener Filter for Deterministic Blur Model
Wiener Filter for Deterministic Blur Model Based on Ch. 5 of Gonzalez & Woods, Digital Image Processing, nd Ed., Addison-Wesley, 00 One common application of the Wiener filter has been in the area of simultaneous
More informationAngular Momentum, Electromagnetic Waves
Angular Momentum, Electromagnetic Waves Lecture33: Electromagnetic Theory Professor D. K. Ghosh, Physics Department, I.I.T., Bombay As before, we keep in view the four Maxwell s equations for all our discussions.
More informationA brief summary of the chapters and sections that we cover in Math 141. Chapter 2 Matrices
A brief summary of the chapters and sections that we cover in Math 141 Chapter 2 Matrices Section 1 Systems of Linear Equations with Unique Solutions 1. A system of linear equations is simply a collection
More informationProf. Dr.-Ing. Armin Dekorsy Department of Communications Engineering. Stochastic Processes and Linear Algebra Recap Slides
Prof. Dr.-Ing. Armin Dekorsy Department of Communications Engineering Stochastic Processes and Linear Algebra Recap Slides Stochastic processes and variables XX tt 0 = XX xx nn (tt) xx 2 (tt) XX tt XX
More informationAPPROXIMATING A COMMON SOLUTION OF A FINITE FAMILY OF GENERALIZED EQUILIBRIUM AND FIXED POINT PROBLEMS
SINET: Ethiop. J. Sci., 38():7 28, 205 ISSN: 0379 2897 (Print) College of Natural Sciences, Addis Ababa University, 205 2520 7997 (Online) APPROXIMATING A COMMON SOLUTION OF A FINITE FAMILY OF GENERALIZED
More informationTwo Decades of Property Testing Madhu Sudan Harvard
Two Decades of Property Testing Madhu Sudan Harvard April 8, 2016 Two Decades of Property Testing 1 of 29 Kepler s Big Data Problem Tycho Brahe (~1550-1600): Wished to measure planetary motion accurately.
More information2.4 Error Analysis for Iterative Methods
2.4 Error Analysis for Iterative Methods 1 Definition 2.7. Order of Convergence Suppose {pp nn } nn=0 is a sequence that converges to pp with pp nn pp for all nn. If positive constants λλ and αα exist
More informationM.5 Modeling the Effect of Functional Responses
M.5 Modeling the Effect of Functional Responses The functional response is referred to the predation rate as a function of the number of prey per predator. It is recognized that as the number of prey increases,
More informationMath, Stats, and Mathstats Review ECONOMETRICS (ECON 360) BEN VAN KAMMEN, PHD
Math, Stats, and Mathstats Review ECONOMETRICS (ECON 360) BEN VAN KAMMEN, PHD Outline These preliminaries serve to signal to students what tools they need to know to succeed in ECON 360 and refresh their
More informationLINEAR SYSTEMS, MATRICES, AND VECTORS
ELEMENTARY LINEAR ALGEBRA WORKBOOK CREATED BY SHANNON MARTIN MYERS LINEAR SYSTEMS, MATRICES, AND VECTORS Now that I ve been teaching Linear Algebra for a few years, I thought it would be great to integrate
More informationGeneral Strong Polarization
General Strong Polarization Madhu Sudan Harvard University Joint work with Jaroslaw Blasiok (Harvard), Venkatesan Gurswami (CMU), Preetum Nakkiran (Harvard) and Atri Rudra (Buffalo) May 1, 018 G.Tech:
More informationLecture 11. Kernel Methods
Lecture 11. Kernel Methods COMP90051 Statistical Machine Learning Semester 2, 2017 Lecturer: Andrey Kan Copyright: University of Melbourne This lecture The kernel trick Efficient computation of a dot product
More information(1) Introduction: a new basis set
() Introduction: a new basis set In scattering, we are solving the S eq. for arbitrary VV in integral form We look for solutions to unbound states: certain boundary conditions (EE > 0, plane and spherical
More informationFinal Exam - Take Home Portion Math 211, Summer 2017
Final Exam - Take Home Portion Math 2, Summer 207 Name: Directions: Complete a total of 5 problems. Problem must be completed. The remaining problems are categorized in four groups. Select one problem
More informationME5286 Robotics Spring 2017 Quiz 2
Page 1 of 5 ME5286 Robotics Spring 2017 Quiz 2 Total Points: 30 You are responsible for following these instructions. Please take a minute and read them completely. 1. Put your name on this page, any other
More informationStatistical Learning with the Lasso, spring The Lasso
Statistical Learning with the Lasso, spring 2017 1 Yeast: understanding basic life functions p=11,904 gene values n number of experiments ~ 10 Blomberg et al. 2003, 2010 The Lasso fmri brain scans function
More informationSVARs & identification + Intro to continuous time stochastic processes. Tom Holden PhD Macroeconomics, Semester 2
SVARs & identification + Intro to continuous time stochastic processes Tom Holden http://www.tholden.org/ PhD Macroeconomics, Semester 2 Outline of today s talk SVARs. Identification methods. Continuous
More informationCDS 101/110: Lecture 3.1 Linear Systems
CDS /: Lecture 3. Linear Systems Goals for Today: Revist and motivate linear time-invariant system models: Summarize properties, examples, and tools Convolution equation describing solution in response
More informationBayesian Decision and Bayesian Learning
Bayesian Decision and Bayesian Learning Ying Wu Electrical Engineering and Computer Science Northwestern University Evanston, IL 60208 http://www.eecs.northwestern.edu/~yingwu 1 / 30 Bayes Rule p(x ω i
More information10.4 Controller synthesis using discrete-time model Example: comparison of various controllers
10. Digital 10.1 Basic principle of digital control 10.2 Digital PID controllers 10.2.1 A 2DOF continuous-time PID controller 10.2.2 Discretisation of PID controllers 10.2.3 Implementation and tuning 10.3
More informationNon-Parametric Weighted Tests for Change in Distribution Function
American Journal of Mathematics Statistics 03, 3(3: 57-65 DOI: 0.593/j.ajms.030303.09 Non-Parametric Weighted Tests for Change in Distribution Function Abd-Elnaser S. Abd-Rabou *, Ahmed M. Gad Statistics
More informationProbabilistic & Unsupervised Learning
Probabilistic & Unsupervised Learning Week 2: Latent Variable Models Maneesh Sahani maneesh@gatsby.ucl.ac.uk Gatsby Computational Neuroscience Unit, and MSc ML/CSML, Dept Computer Science University College
More informationSingular Value Decomposition and Principal Component Analysis (PCA) I
Singular Value Decomposition and Principal Component Analysis (PCA) I Prof Ned Wingreen MOL 40/50 Microarray review Data per array: 0000 genes, I (green) i,i (red) i 000 000+ data points! The expression
More informationCS 4495 Computer Vision Principle Component Analysis
CS 4495 Computer Vision Principle Component Analysis (and it s use in Computer Vision) Aaron Bobick School of Interactive Computing Administrivia PS6 is out. Due *** Sunday, Nov 24th at 11:55pm *** PS7
More informationLinear Algebra Practice Problems
Linear Algebra Practice Problems Page of 7 Linear Algebra Practice Problems These problems cover Chapters 4, 5, 6, and 7 of Elementary Linear Algebra, 6th ed, by Ron Larson and David Falvo (ISBN-3 = 978--68-78376-2,
More informationAnalysis of Survival Data Using Cox Model (Continuous Type)
Australian Journal of Basic and Alied Sciences, 7(0): 60-607, 03 ISSN 99-878 Analysis of Survival Data Using Cox Model (Continuous Type) Khawla Mustafa Sadiq Department of Mathematics, Education College,
More informationKinetic Model Parameter Estimation for Product Stability: Non-uniform Finite Elements and Convexity Analysis
Kinetic Model Parameter Estimation for Product Stability: Non-uniform Finite Elements and Convexity Analysis Mark Daichendt, Lorenz Biegler Carnegie Mellon University Pittsburgh, PA 15217 Ben Weinstein,
More informationKalman Filters for Mapping and Localization
Kalman Filters for Mapping and Localization Sensors If you can t model the world, then sensors are the robot s link to the external world (obsession with depth) Laser Kinect IR rangefinder sonar rangefinder
More informationIntroduction to time series econometrics and VARs. Tom Holden PhD Macroeconomics, Semester 2
Introduction to time series econometrics and VARs Tom Holden http://www.tholden.org/ PhD Macroeconomics, Semester 2 Outline of today s talk Discussion of the structure of the course. Some basics: Vector
More information1 Inner Product and Orthogonality
CSCI 4/Fall 6/Vora/GWU/Orthogonality and Norms Inner Product and Orthogonality Definition : The inner product of two vectors x and y, x x x =.., y =. x n y y... y n is denoted x, y : Note that n x, y =
More informationCDS 101/110: Lecture 3.1 Linear Systems
CDS /: Lecture 3. Linear Systems Goals for Today: Describe and motivate linear system models: Summarize properties, examples, and tools Joel Burdick (substituting for Richard Murray) jwb@robotics.caltech.edu,
More informationHaar Basis Wavelets and Morlet Wavelets
Haar Basis Wavelets and Morlet Wavelets September 9 th, 05 Professor Davi Geiger. The Haar transform, which is one of the earliest transform functions proposed, was proposed in 90 by a Hungarian mathematician
More informationMatrix Algebra for Engineers Jeffrey R. Chasnov
Matrix Algebra for Engineers Jeffrey R. Chasnov The Hong Kong University of Science and Technology The Hong Kong University of Science and Technology Department of Mathematics Clear Water Bay, Kowloon
More informationChapter 4 Euclid Space
Chapter 4 Euclid Space Inner Product Spaces Definition.. Let V be a real vector space over IR. A real inner product on V is a real valued function on V V, denoted by (, ), which satisfies () (x, y) = (y,
More informationData Analysis and Manifold Learning Lecture 6: Probabilistic PCA and Factor Analysis
Data Analysis and Manifold Learning Lecture 6: Probabilistic PCA and Factor Analysis Radu Horaud INRIA Grenoble Rhone-Alpes, France Radu.Horaud@inrialpes.fr http://perception.inrialpes.fr/ Outline of Lecture
More informationCompressed representation of Kohn-Sham orbitals via selected columns of the density matrix
Lin Lin Compressed Kohn-Sham Orbitals 1 Compressed representation of Kohn-Sham orbitals via selected columns of the density matrix Lin Lin Department of Mathematics, UC Berkeley; Computational Research
More information