Efficiently Decodable Non-Adaptive Threshold Group Testing

Size: px
Start display at page:

Download "Efficiently Decodable Non-Adaptive Threshold Group Testing"

Transcription

1 Efficiently Decoable Non-Aaptive Threshol Group Testing arxiv:72759v3 [csit] 3 Jan 28 Thach V Bui, Minoru Kuribayashi, Mahi Cheraghchi, an Isao Echizen SOKENDAI The Grauate University for Avance Stuies), Hayama, Kanagawa, Japan bvthach@niiacjp Grauate School of Natural Science an Technology, Okayama University, Okayama, Japan kminoru@okayama-uacjp Abstract Department of Computing, Imperial College Lonon, UK mcheraghchi@imperialacuk National Institute of Informatics, Tokyo, Japan iechizen@niiacjp We consier non-aaptive threshol group testing for ientification of up to efective items in a set of N items, where a test is positive if it contains at least 2 ) u efective items, an negative otherwise The efective items can be ientifie using t = O 2 e u) uulog ) 2 u 2 u u +log ǫ) 2 logn tests with probability ) u ) at least ǫ for any ǫ > or t = O 2 e u) 2 u 2 u log N +ulog u) 2 logn tests with probability t The ecoing time is O 2 logn) poly2 logn) This result significantly improves the best known results for ecoing non-aaptive threshol group testing: ON logn+n log ǫ ) for probabilistic ecoing, where ǫ >, an ON u logn) for eterministic ecoing I INTRODUCTION The goal of combinatorial group testing is to ientify at most efective items among a population of N items usually is much smaller than N) This problem ates back to the work of Dorfman [], who propose using a pooling strategy to ientify efectives in a collection of bloo samples In each test, a group of items are poole, an the combination is teste The result is positive if at least one item in the group is efective an is otherwise negative Damaschke [2] introuce a generalization of classical group testing known as threshol group testing In this variation, the result is positive if the corresponing group contains at least u efective items, where u is a parameter, is negative if the group contains no more than l efective items, where l < u, an is arbitrary otherwise When u = an l =, threshol group testing reuces to classical group testing We note that l is always smaller than the number of efective items Otherwise, every test yiels a negative outcome, then no information is enhance from tests There are two approaches for the esign of tests The first is aaptive group testing in which there are several testing stages, an the esign of each stage epens on the outcomes of the previous stages The secon is non-aaptive group testing NAGT) in which all tests are esigne in avance, an the tests are performe in parallel NAGT is appealing to researchers in most application areas, such as computational an molecular biology [3], multiple access communications [4] an ata steaming [5] cf [6]) The focus of this work is on NAGT In both threshol an classical group testing, it is esirable to minimize the number of tests an, to efficiently ientify the set of efective items ie, have an efficient ecoing algorithm) For both testings, one nees Ω log N) tests to ientify all efective items [6], [7], [8] using aaptive schemes In aaptive schemes, the ecoing algorithm is usually implicit in the test esign The number of tests an the ecoing time are significantly ifferent between classical non-aaptive CNAGT) an non-aaptive threshol group testing NATGT)

2 In CNAGT, Porat an Rothschil [9] first propose explicit nonaaptive constructions using O 2 logn) tests However, there is no efficient sublinear-time) ecoing algorithm associate with their schemes For exact ientification, there are explicit schemes allowing efective items be ientifie using poly, log N) tests in time poly,logn) [], [] the number of tests can be as low as O +o) logn) if false positives are allowe in the reconstruction) To achieve a nearly optimal number of tests in aaptive group testing an with low ecoing complexity, Cai et al [2] propose using probabilistic schemes that nee Olog logn) tests to fin the efective items in time OlogN +log 2 )) N ) threshol group testing, Damaschke [2] showe that the set of positive items can be ientifie with uin tests with up to g false positives an g false negatives, where g = u l is the gap parameter Cheraghchi [3] showe that it is possible to fin the efective items with O g+2 log logn/)) tests, an that this trae-off is essentially optimal Recently, De Marco et al [4] improve this boun to O 3/2 logn/)) tests uner the extra assumption that the number of efective items is exactly, which is rather restrictive in application Although the number of tests has been extensively stuie, there have been few reports that focus on the ecoing algorithm as well Chen an Fu [5] propose schemes base ) u on CNAGT for when g = that can fin the efective items using O ) ) ulog N tests in u u time ON u logn) Chan et al [6] presente a ranomize algorithm with O log ulogn ) tests to ǫ fin the efective items in time ON logn +N log ) given that g = an u = o) The cost of these ǫ ecoing schemes increases with N Our objective is to fin an efficient ecoing scheme to ientify at most efective items in NATGT when g = Contributions: In this paper, we consier the case where g =, ie, l = u u 2), an call this moel u-natgt We first propose an efficient scheme for ientifying at most efective items in t NATGT in time O 2 logn) poly2 logn), where t is the number of tests Our main iea is to create at least a specifie number of rows in the test matrix such that the corresponing test in each row contains exactly u efective items an such that the efective items in the rows are the efective items to be ientifie We map these rows using a special matrix constructe from a isjunct matrix efine later) an its complementary matrix, thereby converting the outcome in NATGT to the outcome in CNAGT The efective items in each row can then be efficiently ientifie Although Cheraghchi [3] an De Marco et al [4] propose nearly optimal bouns on the number of tests, there are no ecoing algorithms associate with their schemes On the other han, the scheme of Chen et al [5] requires an exponential number of tests, which are much larger than the number of tests in our scheme Moreover, the ecoing complexity of their scheme is exponential in the number of items N, which is impractical Chan et al [6] propose a probabilistic approach to achieve a small number of tests, which combinatorially can be better than our scheme However, their scheme is only applicable when threshol u is much smaller than u = o)) an the ecoing complexity remains high, namely ON logn +N log ), where ǫ > is the precision parameter ǫ We present a ivie an conquer scheme which we then instantiate via eterministic an ranomize ecoing Deterministic ecoing is a eterministic scheme in which all efective items can be foun with probability Ranomize ecoing reuces the number of tests; all efective items can be foun t with probability at least ǫ for any ǫ > The ecoing complexity is O 2 logn) poly2 logn) A comparison with existing work is given in Table I II PRELIMINARIES For consistency, we use capital calligraphic letters for matrices, non-capital letters for scalars, an bol letters for vectors All matrix an vector entries are binary Here are some of the notations use: ) N,,x = x,,x N ) T : number of items, maximum number of efective items, an binary representation of N items 2) S = {j,j 2,,j S }: the set of efective items; carinality of S is S 2

3 TABLE I COMPARISON WITH EXISTING WORK Number of tests t) Decoing complexity Decoing type Cheraghchi [3] O 2 log log N ) ) De Marco et al [4] O 2 u u ) ) ) u ulog N Chen et al [5] O ON u logn) Deterministic u u Chan et al [6] O log ulogn ) ) ON logn +N log ) Ranom ǫ ǫ Deterministic ecoing O 2 u ) e u) 2 u 2 u log N +ulog u) 2 t logn O 2 logn) poly2 logn) Deterministic ) Ranomize ecoing O 2 e u) u ) 2 u 2 u ulog +log u ǫ) 2 t logn O 2 logn) poly2 logn) Ranom 3), : operation relate to u-natgt an CNAGT, to be efine later 4) T : t N measurement matrix use to ientify at most efective items in u-natgt, where integer t is the number of tests 5) G = g ij ): h N matrix, where h 6) M = m ij ): a k N +)-isjunct matrix use to ientify at most u efective items in u-natgt an +) efective items in CNAGT, where integer k is the number of tests 7) M = m ij ): the k N complementary matrix of M; m ij = m ij 8) T i,,g i,,m i,,m j : row i of matrix T, row i of matrix G, row i of matrix M, an column j of matrix M, respectively 9) x i = x i,,x in ) T,S i : binary representation of items an set of inices of efective items in row G i, ) iagg i, ) = iagg i,,g in ): iagonal matrix constructe by input vector G i, A Problem efinition We inex the population of N items from to N Let [N] = {,2,,N} an S be the efective set, where S A test is efine by a subset of items P [N],u,N)-NATGT is a problem in which there are at most efective items among N items A test consisting of a subset of N items is positive if there are at least u efective items in the test, an each test is esigne in avance Formally, the test outcome is positive if P S u an negative if P S < u We can moel,u,n)-natgt as follows: At N binary matrixt = t ij ) is efine as a measurement matrix, where N is the number of items an t is the number of tests x = x,,x N ) T is the binary representation vector of N items, where x x j = inicates that item j is efective, an x j = inicates otherwise The jth item correspons to the jth column of the matrix An entry t ij = naturally means that item j belongs to test i, an t ij = means otherwise The outcome of all tests is y = y,,y t ) T, where y i = if test i is positive an y i = otherwise The proceure to get the outcome vector y is calle the encoing proceure The proceure use to ientify efective items from y is calle the ecoing proceure Outcome vector y is y = T x = ef T, x T t, x ef = y ) y t where is a notation for the test operation in u-natgt; namely, y i = T i, x = if N j= x jt ij u, an y i = T i, x = if N j= x jt ij < u for i =,,t Our objective is to fin an efficient ecoing scheme to ientify at most efective items in,u,n)-natgt 3

4 B Disjunct matrices When u =, u-natgt reuces to CNAGT To istinguish CNAGT an u-natgt, we change notation to an use a k N measurement matrix M instea of the t N matrix T The outcome vector y in )) is equal to N M, x j= y = M x = ef = ef x j m j N y ef = M j = 2) M k, x N j= x j=,x j m j = kj y k where is the Boolean operator for vector multiplication in which multiplication is replace with the AND ) operator an aition is replace with the OR ) operator, an y i = M i, x = N j= x j m ij = N j=,x j = m ij for i =,,k The union of r columns of M is efine as follows: r i= M j i = r i= m j i,, r i= m tj i ) T A column is sai to not be inclue in another column if there exists a row such that the entry in the first column is an the entry in the secon column is If M is a + )-isjunct matrix satisfying the property that the union of at most +) columns oes not inclue any remaining column, x can always be recovere from y We nee M to be a + )-isjunct matrix that can be efficiently ecoe, as in [], [], to ientify at most efective items in u-natgt A k N strongly explicit matrix is a matrix in which the entries can be compute in time polyk) We can now state the following theorem: Theorem [, Theorem 6] Let N There exists a strongly explicit k N +)-isjunct matrix with k = O 2 logn) such that for any k input vector, the ecoing proceure returns the set of efective items if the input vector is the union of at most + columns of the matrix in polyk) time C Completely separating matrix We now introuce the notion of completely separating matrices which are use to get efficient ecoing algorithms for, u, N)-NATGT A u, w)-completely separating matrix is efine as follows: Definition An h N matrix G = g ij ) i h, j N is calle a u,w)-completely separating matrix if for any pair of subsets I,J [N] such that I = u, J = w, an I J =, there exists row l such that g lr = for any r I an g ls = for any s J Row l is calle a singular row to subsets I an J When u =, G is calle a w-isjunct matrix This efinition is slightly ifferent from the one escribe by Lebeev [7] It is easy to verify that, if a matrix is a u, w)-completely separating matrix, it is also a u, v)-completely separating matrix for any v w Below we present the existence of such matrices Theorem 2 Given integers u,w < N, there exists a u,w)-completely separating matrix of size h N, where h = u+w)log en ) eu+w) u+w) 2 ew ) u +ulog + u+w u u2u+w) u an e is base of the natural logarithm Proof: An h N matrix G = g ij ) i h, j N is generate ranomly in which each entry g ij is assigne to with probability of p an to with probability of p For any pair of subsets I,J [N] such that I = u, J = w, the probability of a row is not singular is: p u p) w 3) 4

5 Then, the probability that there is no singular row to subsets I an J is: fp) = p u p) w ) h 4) Using union boun, the probability that any pair of subsets I,J [N] such that I = u, J = w oes not have a singular row, ie, the probability that G is not a u,w)-separating matrix, is: ) ) ) ) N u+w N u+w gp,h,u,w,n) = fp) = p u p) w ) h 5) u+w u u+w u To ensure that there exists G which is a u,w)-separating matrix, one nees to fin p an h such that gp,h,u,w,n) < Choose p = u, we have: u+w u u fp) = p u p) w ) h = w) u ) ) u+w h 6) u+w u u exp h w) u ) ) u+w, where expx) = e x 7) u+w u ) )) u exp h e u u 2 u ) ) u w2u+w) = exp h 8) w u+w) 2 ew u+w) 2 We get 7) because x e x for any x > an 8) because ) + n) x n e x x2 for n >, n x n Then we have: ) ) ) u+w ) u N u+w en eu+w) gp,h,u,w,n) = fp) fp) 9) u+w u u+w u ) u+w ) u en eu+w) u ) ) u w2u+w) exp h ) u+w u ew u+w) 2 < ) ) u+w ) u en eu+w) u ) ) u w2u+w) < exp h 2) u+w u ew u+w) 2 h > u+w)log en ) eu+w) u+w) 2 ew ) u +ulog 3) u+w u w2u+w) u We got 9) because n k) en ) k an ) by using 8) From 3), if we choose k h = u+w)log en ) eu+w) u+w) 2 ew ) u +ulog + 4) u+w u w2u+w) u then gp,h,u,w,n) <, ie, there exists a u,w)-completely separating matrix of size h N Suppose that G is an h N u,w)-completely separating matrix If w is set to u, then every h submatrix, which is constructe by its columns, is a u, u)-completely separating matrix This property is strict an makes the number of rows in G is high To reuce the number of rows, we relax this property as follows: each h submatrix, which is constructe by columns of G, is a u, u)-completely separating matrix with high probability The following corollary escribes this iea in etails 5

6 Corollary Let u,,n be any given positive integers such that u < < N For any ǫ >, there exists an h N matrix such that each h submatrix, which is constructe by its columns, is a u, u)-completely separating matrix with probability at least ǫ, where h = 2 2 u 2 an e is base of the natural logarithm e u) u ) u ulog e u +log ǫ Proof: An h N matrix G = g ij ) i h, j N is generate ranomly in which each entry g ij is assigne to with probability of u an to with probability of u Our task is now to prove that each h matrix G, which is constructe by columns of G, is a u, u)-completely separating ) matrix with probability at least ǫ for any ǫ > Specifically, we prove that h = 2 e u) u 2 u 2 u ulog e +log ) u ǫ is sufficient to achieve such G Similar to the proof in Theorem 2, the probability that G is not a u, u)-completely separating matrix at most ǫ is ) u u u ) u ) u h ) u e u u exp h ) u ) u ) ) u 5) ) u ) u ) e u u)+u) exp h 6) u e u) 2 ǫ 7) ) u ) u ) e u exp 2 u 2 h 8) ǫ u e u) ) 2 u h 2 e u) ulog e 2 u 2 u u +log ) 9) ǫ We get 5) because x e x for any x > an n k) en ) k k 6) is erive because + x n ) n) e x x2 for n >, x n This completes our proof n III PROPOSED SCHEME The basic iea of our scheme, which uses a ivie an conquer strategy, is to create at least κ rows, eg, i,i 2,,i κ such that S i = = S iκ = u an S i S iκ = S Then we map these rows by using a special matrix that enables us to convert the outcome in NATGT to the outcome in CNAGT The efective items in each row can then be efficiently ientifie We present a particular matrix that achieves efficient ecoing for each row in the following section A When the number of efective items equals the threshol In this section, we consier a special case in which the number of efective items equals the threshol, ie, x = u Given a measurement matrix M an a representation vector of u efective items x x = u), what we observe is y = ef M x = ef y,,y k ) T Our objective is to recover y = ef M x = ef y,,y k )T from y Then x can be recovere if we choose M as a +)-isjunct matrix escribe in Theorem To achieve this goal, we create a measurement matrix: [ ] M A = ef 2) M where M = m ij ) is a k N + )-isjunct matrix as escribe in Theorem an M = m ij ) is the complement matrix of M, m ij = m ij for i =,,k an j =,,N We note that M can ) 6

7 be ecoe in time polyk) = poly 2 logn) because k = O 2 logn) Let us assume that the outcome vector is z Then we have: [ ] [ M x z = ef A x = ef ef y = 2) M x y] where y = M x = y,,y k ) T an y = M x = y,,y k ) T The following lemma shows that y = M x is always obtaine from z; ie, x can always be recovere Lemma Given integers 2 u < N, there exists a strongly explicit 2k N matrix such that if there are exactly u efective items among N items in u-natgt, the u efective items can be ientifie in time polyk), where k = O 2 logn) Proof: We construct the measurement matrix A in 2) an assume that z is the observe vector as in 2) Our task is to create vector y = M x from z One can get it using the following rules, where l =,2,,k: ) If y l =, then y l = 2) If y l = an y l =, then y l = 3) If y l = an y l =, then y l = We now prove the correctness of the above rules Because y l =, there are at least u efective items in row M l, Then, the first rule is implie If y l =, there are less than u efective items in row M l, Because x = u, y l =, an the threshol is u, there must be u efective items in row M l, Moreover, since M l, is the complement of M l,, there must be no efective item in test l of M Therefore, y l =, an the secon rule is implie If y l =, there are less than u efective items in row M l, Similarly, if y l =, there are less than u efective items in row M l, Because M l, is the complement of M l,, the number of efective items in row M l, or M l, cannot be equal to zero, since either y l woul equal or y l woul equal Since the number of efective items in row M l, is not equal to zero, the test outcome is positive, ie, y l = The thir rule is thus implie Since we get y = M x, M is a +)-isjunct matrix an u, u efective items can be ientifie in time polyk) by Theorem Example: We emonstrate Lemma by setting u = = 2, k = 9, an N = 2 an efining a isjunct matrix M with the first two columns as follows: M =,y =,y =,y = Assume that the efective items are an 2, ie, x = [,,,,,,,,] T ; then the observe vector is z = [y T y T ] T Using the three rules in the proof of Lemma, we obtain vector y We note that y = M M2 = M x Using a ecoing algorithm which is omitte in this example), we can ientify items an 2 as efective items from y 22) 7

8 B Encoing proceure To implement the ivie an conquer strategy, we nee to ivie the set of efective items into small subsets such that efective items in those subsets can be effectively ientifie We efine κ = S u as an integer, an create a h N matrix G containing κ rows, enote as i,i 2,,i κ, with probability at least ǫ such that i) S i = = S iκ = u an ii) S i S iκ = S for any ǫ where S i is the set of inices of efective items in row G i, For example, if N = 6, the efective items are, 2, an 3, an G, =,,,,,), then S = {,3} These conitions guarantee that all efective items will be inclue in the ecoe set To achieve such a G, for any S, a pruning matrix G of size h after removing N columns G x for x [N]\S must be a u, u)-completely separating matrix with high probability From Definition, G is also a u, S u)-completely separating matrix Then, the κ rows are chosen as follows We choose a collection of sets of efective items: P l = {j l )u+,,j lu } for l =,,κ P is a set satisfying P κ l= P l an P = κu S Then we pick the last set as follows: P κ = S \ κ l= P l) P From Definition, for any P l, there exists a row, enote i l, such that g il x = for x P l an g il y = for y S \ P l, where l =,,κ Then, S il = P l an row i l is singular to sets S il an S \ S il for l =,,κ Conition i) thus hols Conition ii) also hols because κ l= S i l = κ l= P l = S The matrix G is specifie in section IV After creating the matrix G, we generate matrix A as in 2) Then the final measurement matrix T of size 2k +)h N is create as follows: G, G, M iagg, ) A iagg, ) M iagg, ) T = G h, A iagg h, ) = G h, M iagg h, ) M iagg h, ) The vector observe using u-natgt after performing the tests given by the measurement matrix T is G, G, x A iagg, ) A x y = T x = G x = h, G h, x A iagg h, ) A x h G, x y M x y y M x y z = = = 24) G h, x y h y h M x h y h z h M x h y h ef where x i = iagg i, ) x, y i = G i, x, y i = M x i = y i,,y ik ) T ef, y i = M x i = y i,,y ik ) T, an z i = [yi T y T i ]T for i =,2,,h We note that x i is the vector representing the efective items corresponing to row G i, If x i = x i,x i2,,x in ) T, S i = {l x il =,l [N]} We thus have S i = x i Moreover, y i = if an only if x i u 8 23)

9 C The ecoing proceure The ecoing proceure is summarize as Algorithm, where y i = y i,,y ik )T is presume to be M x i The proceure is briefly explaine as follows: Line 2 enumerates the h rows of G Line 3 checks if there are at least u efective items in row G i, Lines 4 to 4 calculate y i, an Line 6 checks if all items in G i are truly efective an as them into S Algorithm Decoing proceure for u-natgt Input: Outcome vector y, M,M,T Output: The set of efective items S : S = 2: for i = to h o 3: if y i = then 4: for l = to k o 5: if y il = then 6: y il = 7: en if 8: if y il = an y il = then 9: y il = : en if : if y il = an y il = then 2: y il = 3: en if 4: en for 5: Decoe y i using M to get the efective set G i 6: if G i = u an j G i M j y i then 7: S = S G i 8: en if 9: en if 2: en for 2: Return S D Correctness of the ecoing proceure Our objective is to recover x i from y i an z i for i =,2,,h Line 2 enumerates the h rows of G We have that y i is the inicator that whether there are at least u efective items in row G i, If y i =, it implies that there are less than u efective items in row G i, Since we only focus on row G i, which has exactly u efective items, z i is not consiere if y i = Lines 3 oes this task When y i =, it implies that there are at least u efective items in row G i, If there are exactly u efective items in this row, they are always ientifie as escribe in Lemma Our task now is to prevent accusing false efective items by ecoing y i Lines 4 to 4 calculates y i from z i We o not know that y i is the union of many columns in M, ie, how many efective items are in row G i, Therefore, our task is to ecoe y i using matrix M to get the efective set G i, then valiate whether all items in G i are efective There exists at least κ rows of G such that there are exactly u efective items in each row An all efective items in these rows are the efective items we nee to ientify Therefore, we only consier the case when the number of efective items obtaine from ecoing y i equals to u, ie, G i = u Our task is now to prevent ientifying false efective items, which is escribe in Line 6 There are two sets of 9

10 efective items corresponing to z i : the first one is the true set, which is S i an unknown, an the secon one is G i, which is expecte to be S i but not sure) an G i = u If G i S i, we can always ientify u efective items an the conition in line 6 always hols because of Lemma We nee to consier the case G i S i, ie, there are more than u efective items in row G i, We classify this case into two categories: ) G i \ S i = : in this case, all elements in G i are efective items We o not nee to consier whether j G i M j y i If this conition hols, we receive the true efective items If it oes not hol, we o not take G i into the efective item set 2) G i \S i : in this case, we prove that j G i M j y i oes not hol, ie, none of elements in G i is ae to the efective item set Let pick j G i \S i an j 2 G i \{j } Since S i an M is a +)-isjunct matrix, there exists a row, enote τ, such that m τj =,m τj2 =, an m τx = for x S i In the other han, because G i = u an S i, there is less than u efective items in row τ, ie, y iτ = Because u S i, y iτ = That implies y iτ = However, x G i m τx = ) x Gi\{j} m miτ ) τx = x Gi\{j} m τx = = y iτ Therefore, j G i M j y i Thus, line 6 eliminates all false efective items Line 2 just returns the efective item set S E The ecoing complexity Because T is constructe using G an M, the probability of successful ecoing of y epens on these choices Given an input vector y i, we get the set of efective items from ecoing of M The probability of successful ecoing of y thus epens only on G Since G has κ rows satisfying i) an ii) with probability at least ǫ, all S efective items can be ientifie in h polyk) time using t = h2k+) tests with probability of at least ǫ for any ǫ We summarize the ivie an conquer strategy in the following theorem: Theorem 3 Let 2 u < N be integers an S be the efective set Suppose that an h N matrix G contains κ rows, enote as i,,i κ, such that i) S i = = S iκ = u an ii) S i S iκ = S, where S il is the inex set of efective items in row G il, An suppose that an k N matrix M is a +)-isjunct matrix that can be ecoe in time A Then a 2k+)h N measurement matrix T, as efine in 23), can be use to ientify at most efective items in u-natgt in time Oh A) The probability of successful ecoing epens only on the event that G has κ rows satisfying i) an ii) Specifically, if that event happens with probability at least ǫ, the probability of successful ecoing is also at least ǫ for any ǫ IV COMPLEXITY OF PROPOSED SCHEME We specify the matrix G in Theorem 3 to get the esire number of tests an ecoing complexity for ientifying at most efective items Specifying G leas to two approaches on ecoing: eterministic an ranomize Deterministic ecoing is a eterministic scheme in which all efective items can be foun with probability It is achievable when every its h submatrices, which are constructe by its columns, are u, u)-completely separating matrices Ranomize ecoing reuces the number of tests; all efective items can be foun with probability at least ǫ for any ǫ > It is achievable when each its h submatrix, which is constructe by its columns, is u, u)-completely separating matrix with probability at least ǫ A Deterministic ecoing The following theorem states that there exists a eterministic algorithm for ientifying all efective items by choosing G of size h N to be a u, u)-completely separating matrix in Theorem 2

11 Theorem 4 Let 2 u N There exists a t N matrix such that at most efective items in t u-natgt can be ientifie in time O 2 logn) poly2 logn), where ) 2 u e u) t = O log N 2 u 2 u +ulog ) ) 2 logn u Proof: On the basis of Theorem 3, a t N measurement matrix T is generate as follows: ) Choose an h N )u, u)-completely separating matrix G as in Theorem 2, where u h = 2 e u) 2 u 2 u log en +ulog ) e u + 2) Choose a k N + )-isjunct matrix M as in Theorem, where k = O 2 logn) an the ecoing time of M is polyk) 3) T is efine as in 23) Since G is a h u, u)-completely separating matrix, for any S, an h pruning matrix G, which is create by removing N columns G x for x [N] \ S, is also a u, u)-completely separating matrix with probability From Definition, G is also a u, S u)-completely separating matrix Then, there exists κ rows satisfying i) an ii) as escribe in section III-B From Theorem 3, efective items can be recovere using t = h O 2 logn) tests with probability at least, ie, the probability, in time h polyk) B Ranomize ecoing For ranomize ecoing, G is chosen such that the pruning matrix G of size h create by removing N columns G x of G for x [N]\S is a u, u)-completely separating matrix with probability at least ǫ for any ǫ > This results is an improve number of tests an ecoing time compare to Theorem 4: Theorem 5 Let 2 u N For any ǫ >, at most efective items in u-natgt can be ientifie using ) 2 u e u) t = O ulog 2 u 2 u u +log ) ) 2 logn ǫ tests with probability at least ǫ The ecoing time is t O 2 logn) poly2 logn) Proof: On the basis of Theorem 3, a t N measurement matrix T is generate ) as follows: u ulog e +log u ǫ) ) Choose an h N matrix G as in Corollary, where h = 2 e u) 2 u 2 u 2) Generate a k N + )-isjunct matrix M using Theorem, where k = O 2 logn) an the ecoing time of M is polyk) 3) Define T as 23) Let G be an h N matrix as escribe in Corollary Then for any S, an h pruning matrix G, which is create by removing N columns G x for x [N]\S, is a u, u)-completely separating matrix with probability at least ǫ From Definition, G is also a u, S u)-completely separating matrix Then, there exists κ rows satisfying i) an ii) as escribe in section III-B with probability at least ǫ From Theorem 3, S efective items can be recovere using t = h O 2 logn) tests with probability at least ǫ in time h polyk) V CONCLUSION We introuce an efficient scheme for ientifying efective items in NATGT However, the algorithm works only for g = Extening the results to g > is left for future work Moreover, it woul be interesting to consier noisy NATGT as well, in which erroneous tests are present in the test outcomes

12 VI ACKNOWLEDGEMENT The first author thanks to SOKENDAI for supporting him via The Short-Stay Abroa Program 27 REFERENCES [] R Dorfman, The etection of efective members of large populations, The Annals of Mathematical Statistics, vol 4, no 4, pp , 943 [2] P Damaschke, Threshol group testing, in General theory of information transfer an combinatorics, pp 77 78, Springer, 26 [3] M Farach, S Kannan, E Knill, an S Muthukrishnan, Group testing problems with sequences in experimental molecular biology, in Compression an Complexity of Sequences 997 Proceeings, pp , IEEE, 997 [4] J Wolf, Born again group testing: Multiaccess communications, IEEE Transactions on Information Theory, vol 3, no 2, pp 85 9, 985 [5] G Cormoe an S Muthukrishnan, What s hot an what s not: tracking most frequent items ynamically, ACM Transactions on Database Systems TODS), vol 3, no, pp , 25 [6] D Du an F Hwang, Combinatorial group testing an its applications, vol 2 Worl Scientific, 2 [7] H-B Chen an A De Bonis, An almost optimal algorithm for generalize threshol group testing with inhibitors, Journal of Computational Biology, vol 8, no 6, pp , 2 [8] H Chang, H-B Chen, H-L Fu, an C-H Shi, Reconstruction of hien graphs an threshol group testing, Journal of combinatorial optimization, vol 22, no 2, pp 27 28, 2 [9] E Porat an A Rothschil, Explicit non-aaptive combinatorial group testing schemes, Automata, languages an programming, pp , 28 [] H Q Ngo, E Porat, an A Rura, Efficiently ecoable error-correcting list isjunct matrices an applications, in International Colloquium on Automata, Languages, an Programming, pp , Springer, 2 [] M Cheraghchi, Noise-resilient group testing: Limitations an constructions, Discrete Applie Mathematics, vol 6, no, pp 8 95, 23 [2] S Cai, M Jahangoshahi, M Bakshi, an S Jaggi, Grotesque: noisy group testing quick an efficient), in Communication, Control, an Computing Allerton), 23 5st Annual Allerton Conference on, pp , IEEE, 23 [3] M Cheraghchi, Improve constructions for non-aaptive threshol group testing, Algorithmica, vol 67, no 3, pp , 23 [4] G De Marco, T Jurziński, M Różański, an G Stachowiak, Subquaratic non-aaptive threshol group testing, in International Symposium on Funamentals of Computation Theory, pp 77 89, Springer, 27 [5] H-B Chen an H-L Fu, Nonaaptive algorithms for threshol group testing, Discrete Applie Mathematics, vol 57, no 7, pp , 29 [6] C L Chan, S Cai, M Bakshi, S Jaggi, an V Saligrama, Stochastic threshol group testing, in Information Theory Workshop ITW), 23 IEEE, pp 5, IEEE, 23 [7] V S Lebeev, Separating coes an a new combinatorial search moel, Problems of Information Transmission, vol 46, no, pp 6, 2 2

Efficient (nonrandom) construction and decoding for non-adaptive group testing

Efficient (nonrandom) construction and decoding for non-adaptive group testing Efficient nonranom construction an ecoing for non-aaptive group testing arxiv:1804.03819v4 [cs.it] 8 Oct 2018 Thach V. Bui, Minoru Kuribayashi, Tetsuya Kojima, Roghayyeh Haghvirinezha, an Isao Echizen

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

u!i = a T u = 0. Then S satisfies

u!i = a T u = 0. Then S satisfies Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace

More information

Lower Bounds for the Smoothed Number of Pareto optimal Solutions

Lower Bounds for the Smoothed Number of Pareto optimal Solutions Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.

More information

Computing the Longest Common Subsequence of Multiple RLE Strings

Computing the Longest Common Subsequence of Multiple RLE Strings The 29th Workshop on Combinatorial Mathematics an Computation Theory Computing the Longest Common Subsequence of Multiple RLE Strings Ling-Chih Yao an Kuan-Yu Chen Grauate Institute of Networking an Multimeia

More information

Robustness and Perturbations of Minimal Bases

Robustness and Perturbations of Minimal Bases Robustness an Perturbations of Minimal Bases Paul Van Dooren an Froilán M Dopico December 9, 2016 Abstract Polynomial minimal bases of rational vector subspaces are a classical concept that plays an important

More information

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION The Annals of Statistics 1997, Vol. 25, No. 6, 2313 2327 LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION By Eva Riccomagno, 1 Rainer Schwabe 2 an Henry P. Wynn 1 University of Warwick, Technische

More information

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes Leaving Ranomness to Nature: -Dimensional Prouct Coes through the lens of Generalize-LDPC coes Tavor Baharav, Kannan Ramchanran Dept. of Electrical Engineering an Computer Sciences, U.C. Berkeley {tavorb,

More information

Concentration of Measure Inequalities for Compressive Toeplitz Matrices with Applications to Detection and System Identification

Concentration of Measure Inequalities for Compressive Toeplitz Matrices with Applications to Detection and System Identification Concentration of Measure Inequalities for Compressive Toeplitz Matrices with Applications to Detection an System Ientification Borhan M Sananaji, Tyrone L Vincent, an Michael B Wakin Abstract In this paper,

More information

On combinatorial approaches to compressed sensing

On combinatorial approaches to compressed sensing On combinatorial approaches to compresse sensing Abolreza Abolhosseini Moghaam an Hayer Raha Department of Electrical an Computer Engineering, Michigan State University, East Lansing, MI, U.S. Emails:{abolhos,raha}@msu.eu

More information

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy,

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy, NOTES ON EULER-BOOLE SUMMATION JONATHAN M BORWEIN, NEIL J CALKIN, AND DANTE MANNA Abstract We stuy a connection between Euler-MacLaurin Summation an Boole Summation suggeste in an AMM note from 196, which

More information

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Ashish Goel Michael Kapralov Sanjeev Khanna Abstract We consier the well-stuie problem of fining a perfect matching in -regular bipartite

More information

A new proof of the sharpness of the phase transition for Bernoulli percolation on Z d

A new proof of the sharpness of the phase transition for Bernoulli percolation on Z d A new proof of the sharpness of the phase transition for Bernoulli percolation on Z Hugo Duminil-Copin an Vincent Tassion October 8, 205 Abstract We provie a new proof of the sharpness of the phase transition

More information

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control 19 Eigenvalues, Eigenvectors, Orinary Differential Equations, an Control This section introuces eigenvalues an eigenvectors of a matrix, an iscusses the role of the eigenvalues in etermining the behavior

More information

An Analytical Expression of the Probability of Error for Relaying with Decode-and-forward

An Analytical Expression of the Probability of Error for Relaying with Decode-and-forward An Analytical Expression of the Probability of Error for Relaying with Decoe-an-forwar Alexanre Graell i Amat an Ingmar Lan Department of Electronics, Institut TELECOM-TELECOM Bretagne, Brest, France Email:

More information

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5

More information

This module is part of the. Memobust Handbook. on Methodology of Modern Business Statistics

This module is part of the. Memobust Handbook. on Methodology of Modern Business Statistics This moule is part of the Memobust Hanbook on Methoology of Moern Business Statistics 26 March 2014 Metho: Balance Sampling for Multi-Way Stratification Contents General section... 3 1. Summary... 3 2.

More information

Ramsey numbers of some bipartite graphs versus complete graphs

Ramsey numbers of some bipartite graphs versus complete graphs Ramsey numbers of some bipartite graphs versus complete graphs Tao Jiang, Michael Salerno Miami University, Oxfor, OH 45056, USA Abstract. The Ramsey number r(h, K n ) is the smallest positive integer

More information

Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Codes

Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Codes Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Coes Kaiann Fu an Achilleas Anastasopoulos Electrical Engineering an Computer Science Dept. University of Michigan, Ann Arbor, MI

More information

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012 CS-6 Theory Gems November 8, 0 Lecture Lecturer: Alesaner Mąry Scribes: Alhussein Fawzi, Dorina Thanou Introuction Toay, we will briefly iscuss an important technique in probability theory measure concentration

More information

Conservation Laws. Chapter Conservation of Energy

Conservation Laws. Chapter Conservation of Energy 20 Chapter 3 Conservation Laws In orer to check the physical consistency of the above set of equations governing Maxwell-Lorentz electroynamics [(2.10) an (2.12) or (1.65) an (1.68)], we examine the action

More information

Linear First-Order Equations

Linear First-Order Equations 5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)

More information

Diagonalization of Matrices Dr. E. Jacobs

Diagonalization of Matrices Dr. E. Jacobs Diagonalization of Matrices Dr. E. Jacobs One of the very interesting lessons in this course is how certain algebraic techniques can be use to solve ifferential equations. The purpose of these notes is

More information

6 General properties of an autonomous system of two first order ODE

6 General properties of an autonomous system of two first order ODE 6 General properties of an autonomous system of two first orer ODE Here we embark on stuying the autonomous system of two first orer ifferential equations of the form ẋ 1 = f 1 (, x 2 ), ẋ 2 = f 2 (, x

More information

arxiv: v1 [cs.ds] 31 May 2017

arxiv: v1 [cs.ds] 31 May 2017 Succinct Partial Sums an Fenwick Trees Philip Bille, Aners Roy Christiansen, Nicola Prezza, an Freerik Rye Skjoljensen arxiv:1705.10987v1 [cs.ds] 31 May 2017 Technical University of Denmark, DTU Compute,

More information

Lecture 5. Symmetric Shearer s Lemma

Lecture 5. Symmetric Shearer s Lemma Stanfor University Spring 208 Math 233: Non-constructive methos in combinatorics Instructor: Jan Vonrák Lecture ate: January 23, 208 Original scribe: Erik Bates Lecture 5 Symmetric Shearer s Lemma Here

More information

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments 2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor

More information

Agmon Kolmogorov Inequalities on l 2 (Z d )

Agmon Kolmogorov Inequalities on l 2 (Z d ) Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,

More information

Chapter 6: Energy-Momentum Tensors

Chapter 6: Energy-Momentum Tensors 49 Chapter 6: Energy-Momentum Tensors This chapter outlines the general theory of energy an momentum conservation in terms of energy-momentum tensors, then applies these ieas to the case of Bohm's moel.

More information

arxiv: v1 [physics.flu-dyn] 8 May 2014

arxiv: v1 [physics.flu-dyn] 8 May 2014 Energetics of a flui uner the Boussinesq approximation arxiv:1405.1921v1 [physics.flu-yn] 8 May 2014 Kiyoshi Maruyama Department of Earth an Ocean Sciences, National Defense Acaemy, Yokosuka, Kanagawa

More information

Systems & Control Letters

Systems & Control Letters Systems & ontrol Letters ( ) ontents lists available at ScienceDirect Systems & ontrol Letters journal homepage: www.elsevier.com/locate/sysconle A converse to the eterministic separation principle Jochen

More information

Discrete Mathematics

Discrete Mathematics Discrete Mathematics 309 (009) 86 869 Contents lists available at ScienceDirect Discrete Mathematics journal homepage: wwwelseviercom/locate/isc Profile vectors in the lattice of subspaces Dániel Gerbner

More information

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS MARK SCHACHNER Abstract. When consiere as an algebraic space, the set of arithmetic functions equippe with the operations of pointwise aition an

More information

Implicit Differentiation

Implicit Differentiation Implicit Differentiation Thus far, the functions we have been concerne with have been efine explicitly. A function is efine explicitly if the output is given irectly in terms of the input. For instance,

More information

Integration Review. May 11, 2013

Integration Review. May 11, 2013 Integration Review May 11, 2013 Goals: Review the funamental theorem of calculus. Review u-substitution. Review integration by parts. Do lots of integration eamples. 1 Funamental Theorem of Calculus In

More information

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k A Proof of Lemma 2 B Proof of Lemma 3 Proof: Since the support of LL istributions is R, two such istributions are equivalent absolutely continuous with respect to each other an the ivergence is well-efine

More information

Acute sets in Euclidean spaces

Acute sets in Euclidean spaces Acute sets in Eucliean spaces Viktor Harangi April, 011 Abstract A finite set H in R is calle an acute set if any angle etermine by three points of H is acute. We examine the maximal carinality α() of

More information

On the Complexity of Inductive Definitions

On the Complexity of Inductive Definitions Uner consieration for publication in Math. Struct. in Comp. Science On the Complexity of Inuctive Definitions D O U G L A S C E N Z E R 1 an J E F F R E Y B. R E M M E L 2 1 Department of Mathematics,

More information

Minimum-time constrained velocity planning

Minimum-time constrained velocity planning 7th Meiterranean Conference on Control & Automation Makeonia Palace, Thessaloniki, Greece June 4-6, 9 Minimum-time constraine velocity planning Gabriele Lini, Luca Consolini, Aurelio Piazzi Università

More information

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013 Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing

More information

Lower Bounds for Local Monotonicity Reconstruction from Transitive-Closure Spanners

Lower Bounds for Local Monotonicity Reconstruction from Transitive-Closure Spanners Lower Bouns for Local Monotonicity Reconstruction from Transitive-Closure Spanners Arnab Bhattacharyya Elena Grigorescu Mahav Jha Kyomin Jung Sofya Raskhonikova Davi P. Wooruff Abstract Given a irecte

More information

arxiv: v4 [cs.ds] 7 Mar 2014

arxiv: v4 [cs.ds] 7 Mar 2014 Analysis of Agglomerative Clustering Marcel R. Ackermann Johannes Blömer Daniel Kuntze Christian Sohler arxiv:101.697v [cs.ds] 7 Mar 01 Abstract The iameter k-clustering problem is the problem of partitioning

More information

Regular tree languages definable in FO and in FO mod

Regular tree languages definable in FO and in FO mod Regular tree languages efinable in FO an in FO mo Michael Beneikt Luc Segoufin Abstract We consier regular languages of labele trees. We give an effective characterization of the regular languages over

More information

Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets

Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Proceeings of the 4th East-European Conference on Avances in Databases an Information Systems ADBIS) 200 Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Eleftherios Tiakas, Apostolos.

More information

Quantum mechanical approaches to the virial

Quantum mechanical approaches to the virial Quantum mechanical approaches to the virial S.LeBohec Department of Physics an Astronomy, University of Utah, Salt Lae City, UT 84112, USA Date: June 30 th 2015 In this note, we approach the virial from

More information

Schrödinger s equation.

Schrödinger s equation. Physics 342 Lecture 5 Schröinger s Equation Lecture 5 Physics 342 Quantum Mechanics I Wenesay, February 3r, 2010 Toay we iscuss Schröinger s equation an show that it supports the basic interpretation of

More information

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21 Large amping in a structural material may be either esirable or unesirable, epening on the engineering application at han. For example, amping is a esirable property to the esigner concerne with limiting

More information

Euler equations for multiple integrals

Euler equations for multiple integrals Euler equations for multiple integrals January 22, 2013 Contents 1 Reminer of multivariable calculus 2 1.1 Vector ifferentiation......................... 2 1.2 Matrix ifferentiation........................

More information

Lower bounds on Locality Sensitive Hashing

Lower bounds on Locality Sensitive Hashing Lower bouns on Locality Sensitive Hashing Rajeev Motwani Assaf Naor Rina Panigrahy Abstract Given a metric space (X, X ), c 1, r > 0, an p, q [0, 1], a istribution over mappings H : X N is calle a (r,

More information

Proof of SPNs as Mixture of Trees

Proof of SPNs as Mixture of Trees A Proof of SPNs as Mixture of Trees Theorem 1. If T is an inuce SPN from a complete an ecomposable SPN S, then T is a tree that is complete an ecomposable. Proof. Argue by contraiction that T is not a

More information

What s in an Attribute? Consequences for the Least Common Subsumer

What s in an Attribute? Consequences for the Least Common Subsumer What s in an Attribute? Consequences for the Least Common Subsumer Ralf Küsters LuFG Theoretical Computer Science RWTH Aachen Ahornstraße 55 52074 Aachen Germany kuesters@informatik.rwth-aachen.e Alex

More information

Closed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device

Closed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device Close an Open Loop Optimal Control of Buffer an Energy of a Wireless Device V. S. Borkar School of Technology an Computer Science TIFR, umbai, Inia. borkar@tifr.res.in A. A. Kherani B. J. Prabhu INRIA

More information

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs Lectures - Week 10 Introuction to Orinary Differential Equations (ODES) First Orer Linear ODEs When stuying ODEs we are consiering functions of one inepenent variable, e.g., f(x), where x is the inepenent

More information

Estimating Causal Direction and Confounding Of Two Discrete Variables

Estimating Causal Direction and Confounding Of Two Discrete Variables Estimating Causal Direction an Confouning Of Two Discrete Variables This inspire further work on the so calle aitive noise moels. Hoyer et al. (2009) extene Shimizu s ientifiaarxiv:1611.01504v1 [stat.ml]

More information

Necessary and Sufficient Conditions for Sketched Subspace Clustering

Necessary and Sufficient Conditions for Sketched Subspace Clustering Necessary an Sufficient Conitions for Sketche Subspace Clustering Daniel Pimentel-Alarcón, Laura Balzano 2, Robert Nowak University of Wisconsin-Maison, 2 University of Michigan-Ann Arbor Abstract This

More information

On the minimum distance of elliptic curve codes

On the minimum distance of elliptic curve codes On the minimum istance of elliptic curve coes Jiyou Li Department of Mathematics Shanghai Jiao Tong University Shanghai PRChina Email: lijiyou@sjtueucn Daqing Wan Department of Mathematics University of

More information

θ x = f ( x,t) could be written as

θ x = f ( x,t) could be written as 9. Higher orer PDEs as systems of first-orer PDEs. Hyperbolic systems. For PDEs, as for ODEs, we may reuce the orer by efining new epenent variables. For example, in the case of the wave equation, (1)

More information

New Bounds for Distributed Storage Systems with Secure Repair

New Bounds for Distributed Storage Systems with Secure Repair New Bouns for Distribute Storage Systems with Secure Repair Ravi Tanon 1 an Soheil Mohajer 1 Discovery Analytics Center & Department of Computer Science, Virginia Tech, Blacksburg, VA Department of Electrical

More information

TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH

TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH English NUMERICAL MATHEMATICS Vol14, No1 Series A Journal of Chinese Universities Feb 2005 TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH He Ming( Λ) Michael K Ng(Ξ ) Abstract We

More information

Witt#5: Around the integrality criterion 9.93 [version 1.1 (21 April 2013), not completed, not proofread]

Witt#5: Around the integrality criterion 9.93 [version 1.1 (21 April 2013), not completed, not proofread] Witt vectors. Part 1 Michiel Hazewinkel Sienotes by Darij Grinberg Witt#5: Aroun the integrality criterion 9.93 [version 1.1 21 April 2013, not complete, not proofrea In [1, section 9.93, Hazewinkel states

More information

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS Yannick DEVILLE Université Paul Sabatier Laboratoire Acoustique, Métrologie, Instrumentation Bât. 3RB2, 8 Route e Narbonne,

More information

Notes on Lie Groups, Lie algebras, and the Exponentiation Map Mitchell Faulk

Notes on Lie Groups, Lie algebras, and the Exponentiation Map Mitchell Faulk Notes on Lie Groups, Lie algebras, an the Exponentiation Map Mitchell Faulk 1. Preliminaries. In these notes, we concern ourselves with special objects calle matrix Lie groups an their corresponing Lie

More information

On the enumeration of partitions with summands in arithmetic progression

On the enumeration of partitions with summands in arithmetic progression AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 8 (003), Pages 149 159 On the enumeration of partitions with summans in arithmetic progression M. A. Nyblom C. Evans Department of Mathematics an Statistics

More information

Relative Entropy and Score Function: New Information Estimation Relationships through Arbitrary Additive Perturbation

Relative Entropy and Score Function: New Information Estimation Relationships through Arbitrary Additive Perturbation Relative Entropy an Score Function: New Information Estimation Relationships through Arbitrary Aitive Perturbation Dongning Guo Department of Electrical Engineering & Computer Science Northwestern University

More information

Final Exam Study Guide and Practice Problems Solutions

Final Exam Study Guide and Practice Problems Solutions Final Exam Stuy Guie an Practice Problems Solutions Note: These problems are just some of the types of problems that might appear on the exam. However, to fully prepare for the exam, in aition to making

More information

Laplacian Cooperative Attitude Control of Multiple Rigid Bodies

Laplacian Cooperative Attitude Control of Multiple Rigid Bodies Laplacian Cooperative Attitue Control of Multiple Rigi Boies Dimos V. Dimarogonas, Panagiotis Tsiotras an Kostas J. Kyriakopoulos Abstract Motivate by the fact that linear controllers can stabilize the

More information

The derivative of a function f(x) is another function, defined in terms of a limiting expression: f(x + δx) f(x)

The derivative of a function f(x) is another function, defined in terms of a limiting expression: f(x + δx) f(x) Y. D. Chong (2016) MH2801: Complex Methos for the Sciences 1. Derivatives The erivative of a function f(x) is another function, efine in terms of a limiting expression: f (x) f (x) lim x δx 0 f(x + δx)

More information

arxiv: v1 [cs.lg] 22 Mar 2014

arxiv: v1 [cs.lg] 22 Mar 2014 CUR lgorithm with Incomplete Matrix Observation Rong Jin an Shenghuo Zhu Dept. of Computer Science an Engineering, Michigan State University, rongjin@msu.eu NEC Laboratories merica, Inc., zsh@nec-labs.com

More information

Generalizing Kronecker Graphs in order to Model Searchable Networks

Generalizing Kronecker Graphs in order to Model Searchable Networks Generalizing Kronecker Graphs in orer to Moel Searchable Networks Elizabeth Boine, Babak Hassibi, Aam Wierman California Institute of Technology Pasaena, CA 925 Email: {eaboine, hassibi, aamw}@caltecheu

More information

Markov Chains in Continuous Time

Markov Chains in Continuous Time Chapter 23 Markov Chains in Continuous Time Previously we looke at Markov chains, where the transitions betweenstatesoccurreatspecifietime- steps. That it, we mae time (a continuous variable) avance in

More information

Sparse Reconstruction of Systems of Ordinary Differential Equations

Sparse Reconstruction of Systems of Ordinary Differential Equations Sparse Reconstruction of Systems of Orinary Differential Equations Manuel Mai a, Mark D. Shattuck b,c, Corey S. O Hern c,a,,e, a Department of Physics, Yale University, New Haven, Connecticut 06520, USA

More information

II. First variation of functionals

II. First variation of functionals II. First variation of functionals The erivative of a function being zero is a necessary conition for the etremum of that function in orinary calculus. Let us now tackle the question of the equivalent

More information

On Characterizing the Delay-Performance of Wireless Scheduling Algorithms

On Characterizing the Delay-Performance of Wireless Scheduling Algorithms On Characterizing the Delay-Performance of Wireless Scheuling Algorithms Xiaojun Lin Center for Wireless Systems an Applications School of Electrical an Computer Engineering, Purue University West Lafayette,

More information

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations Diophantine Approximations: Examining the Farey Process an its Metho on Proucing Best Approximations Kelly Bowen Introuction When a person hears the phrase irrational number, one oes not think of anything

More information

arxiv: v1 [math.co] 3 Apr 2019

arxiv: v1 [math.co] 3 Apr 2019 Reconstructin phyloenetic tree from multipartite quartet system Hiroshi Hirai Yuni Iwamasa April 4, 2019 arxiv:1904.01914v1 [math.co] 3 Apr 2019 Abstract A phyloenetic tree is a raphical representation

More information

All s Well That Ends Well: Supplementary Proofs

All s Well That Ends Well: Supplementary Proofs All s Well That Ens Well: Guarantee Resolution of Simultaneous Rigi Boy Impact 1:1 All s Well That Ens Well: Supplementary Proofs This ocument complements the paper All s Well That Ens Well: Guarantee

More information

The canonical controllers and regular interconnection

The canonical controllers and regular interconnection Systems & Control Letters ( www.elsevier.com/locate/sysconle The canonical controllers an regular interconnection A.A. Julius a,, J.C. Willems b, M.N. Belur c, H.L. Trentelman a Department of Applie Mathematics,

More information

Optimal CDMA Signatures: A Finite-Step Approach

Optimal CDMA Signatures: A Finite-Step Approach Optimal CDMA Signatures: A Finite-Step Approach Joel A. Tropp Inst. for Comp. Engr. an Sci. (ICES) 1 University Station C000 Austin, TX 7871 jtropp@ices.utexas.eu Inerjit. S. Dhillon Dept. of Comp. Sci.

More information

A Sketch of Menshikov s Theorem

A Sketch of Menshikov s Theorem A Sketch of Menshikov s Theorem Thomas Bao March 14, 2010 Abstract Let Λ be an infinite, locally finite oriente multi-graph with C Λ finite an strongly connecte, an let p

More information

Applications of the Wronskian to ordinary linear differential equations

Applications of the Wronskian to ordinary linear differential equations Physics 116C Fall 2011 Applications of the Wronskian to orinary linear ifferential equations Consier a of n continuous functions y i (x) [i = 1,2,3,...,n], each of which is ifferentiable at least n times.

More information

Capacity Analysis of MIMO Systems with Unknown Channel State Information

Capacity Analysis of MIMO Systems with Unknown Channel State Information Capacity Analysis of MIMO Systems with Unknown Channel State Information Jun Zheng an Bhaskar D. Rao Dept. of Electrical an Computer Engineering University of California at San Diego e-mail: juzheng@ucs.eu,

More information

REAL ANALYSIS I HOMEWORK 5

REAL ANALYSIS I HOMEWORK 5 REAL ANALYSIS I HOMEWORK 5 CİHAN BAHRAN The questions are from Stein an Shakarchi s text, Chapter 3. 1. Suppose ϕ is an integrable function on R with R ϕ(x)x = 1. Let K δ(x) = δ ϕ(x/δ), δ > 0. (a) Prove

More information

PDE Notes, Lecture #11

PDE Notes, Lecture #11 PDE Notes, Lecture # from Professor Jalal Shatah s Lectures Febuary 9th, 2009 Sobolev Spaces Recall that for u L loc we can efine the weak erivative Du by Du, φ := udφ φ C0 If v L loc such that Du, φ =

More information

The Exact Form and General Integrating Factors

The Exact Form and General Integrating Factors 7 The Exact Form an General Integrating Factors In the previous chapters, we ve seen how separable an linear ifferential equations can be solve using methos for converting them to forms that can be easily

More information

Axiometrics: Axioms of Information Retrieval Effectiveness Metrics

Axiometrics: Axioms of Information Retrieval Effectiveness Metrics Axiometrics: Axioms of Information Retrieval Effectiveness Metrics ABSTRACT Ey Maalena Department of Maths Computer Science University of Uine Uine, Italy ey.maalena@uniu.it There are literally ozens most

More information

Introduction to Markov Processes

Introduction to Markov Processes Introuction to Markov Processes Connexions moule m44014 Zzis law Gustav) Meglicki, Jr Office of the VP for Information Technology Iniana University RCS: Section-2.tex,v 1.24 2012/12/21 18:03:08 gustav

More information

A note on asymptotic formulae for one-dimensional network flow problems Carlos F. Daganzo and Karen R. Smilowitz

A note on asymptotic formulae for one-dimensional network flow problems Carlos F. Daganzo and Karen R. Smilowitz A note on asymptotic formulae for one-imensional network flow problems Carlos F. Daganzo an Karen R. Smilowitz (to appear in Annals of Operations Research) Abstract This note evelops asymptotic formulae

More information

Stable and compact finite difference schemes

Stable and compact finite difference schemes Center for Turbulence Research Annual Research Briefs 2006 2 Stable an compact finite ifference schemes By K. Mattsson, M. Svär AND M. Shoeybi. Motivation an objectives Compact secon erivatives have long

More information

Some properties of random staircase tableaux

Some properties of random staircase tableaux Some properties of ranom staircase tableaux Sanrine Dasse Hartaut Pawe l Hitczenko Downloae /4/7 to 744940 Reistribution subject to SIAM license or copyright; see http://wwwsiamorg/journals/ojsaphp Abstract

More information

Switching Time Optimization in Discretized Hybrid Dynamical Systems

Switching Time Optimization in Discretized Hybrid Dynamical Systems Switching Time Optimization in Discretize Hybri Dynamical Systems Kathrin Flaßkamp, To Murphey, an Sina Ober-Blöbaum Abstract Switching time optimization (STO) arises in systems that have a finite set

More information

IPA Derivatives for Make-to-Stock Production-Inventory Systems With Backorders Under the (R,r) Policy

IPA Derivatives for Make-to-Stock Production-Inventory Systems With Backorders Under the (R,r) Policy IPA Derivatives for Make-to-Stock Prouction-Inventory Systems With Backorers Uner the (Rr) Policy Yihong Fan a Benamin Melame b Yao Zhao c Yorai Wari Abstract This paper aresses Infinitesimal Perturbation

More information

arxiv: v1 [math.co] 15 Sep 2015

arxiv: v1 [math.co] 15 Sep 2015 Circular coloring of signe graphs Yingli Kang, Eckhar Steffen arxiv:1509.04488v1 [math.co] 15 Sep 015 Abstract Let k, ( k) be two positive integers. We generalize the well stuie notions of (k, )-colorings

More information

ON THE OPTIMALITY SYSTEM FOR A 1 D EULER FLOW PROBLEM

ON THE OPTIMALITY SYSTEM FOR A 1 D EULER FLOW PROBLEM ON THE OPTIMALITY SYSTEM FOR A D EULER FLOW PROBLEM Eugene M. Cliff Matthias Heinkenschloss y Ajit R. Shenoy z Interisciplinary Center for Applie Mathematics Virginia Tech Blacksburg, Virginia 46 Abstract

More information

BEYOND THE CONSTRUCTION OF OPTIMAL SWITCHING SURFACES FOR AUTONOMOUS HYBRID SYSTEMS. Mauro Boccadoro Magnus Egerstedt Paolo Valigi Yorai Wardi

BEYOND THE CONSTRUCTION OF OPTIMAL SWITCHING SURFACES FOR AUTONOMOUS HYBRID SYSTEMS. Mauro Boccadoro Magnus Egerstedt Paolo Valigi Yorai Wardi BEYOND THE CONSTRUCTION OF OPTIMAL SWITCHING SURFACES FOR AUTONOMOUS HYBRID SYSTEMS Mauro Boccaoro Magnus Egerstet Paolo Valigi Yorai Wari {boccaoro,valigi}@iei.unipg.it Dipartimento i Ingegneria Elettronica

More information

Influence of weight initialization on multilayer perceptron performance

Influence of weight initialization on multilayer perceptron performance Influence of weight initialization on multilayer perceptron performance M. Karouia (1,2) T. Denœux (1) R. Lengellé (1) (1) Université e Compiègne U.R.A. CNRS 817 Heuiasyc BP 649 - F-66 Compiègne ceex -

More information

SYNCHRONOUS SEQUENTIAL CIRCUITS

SYNCHRONOUS SEQUENTIAL CIRCUITS CHAPTER SYNCHRONOUS SEUENTIAL CIRCUITS Registers an counters, two very common synchronous sequential circuits, are introuce in this chapter. Register is a igital circuit for storing information. Contents

More information

Calculus of Variations

Calculus of Variations 16.323 Lecture 5 Calculus of Variations Calculus of Variations Most books cover this material well, but Kirk Chapter 4 oes a particularly nice job. x(t) x* x*+ αδx (1) x*- αδx (1) αδx (1) αδx (1) t f t

More information

The Principle of Least Action

The Principle of Least Action Chapter 7. The Principle of Least Action 7.1 Force Methos vs. Energy Methos We have so far stuie two istinct ways of analyzing physics problems: force methos, basically consisting of the application of

More information

2Algebraic ONLINE PAGE PROOFS. foundations

2Algebraic ONLINE PAGE PROOFS. foundations Algebraic founations. Kick off with CAS. Algebraic skills.3 Pascal s triangle an binomial expansions.4 The binomial theorem.5 Sets of real numbers.6 Surs.7 Review . Kick off with CAS Playing lotto Using

More information

Permanent vs. Determinant

Permanent vs. Determinant Permanent vs. Determinant Frank Ban Introuction A major problem in theoretical computer science is the Permanent vs. Determinant problem. It asks: given an n by n matrix of ineterminates A = (a i,j ) an

More information