Beyond Worst-Case Reconstruction in Deterministic Compressed Sensing

Size: px
Start display at page:

Download "Beyond Worst-Case Reconstruction in Deterministic Compressed Sensing"

Transcription

1 Beyond Worst-Case Reconstruction in Deterministic Comressed Sensing Sina Jafarour, ember, IEEE, arco F Duarte, ember, IEEE, and Robert Calderbank, Fellow, IEEE Abstract The role of random measurement in comressive sensing is analogous to the role of random codes in coding theory In coding theory, decoders that can correct beyond the minimum distance of a code allow random codes to achieve the Shannon limit In comressed sensing, the counterart of minimum distance is the sark of the measurement matrix, ie, the size of the smallest set of linearly deendent columns This aer constructs a family of measurement matrices where the columns are formed by exonentiating codewords from a classical binary error-correcting code of block length The columns can be artitioned into mutually unbiased bases, and the sark of the corresonding measurement matrix is shown to be O( ) by identifying a configuration of columns that lays a role similar to that of the Dirac comb in classical Fourier analysis Further, an exlicit basis for the null sace of these measurement matrices is given in terms of indicator functions of binary self-dual codes Reliable reconstruction of k-sarse inuts is shown for k of order /log() which is best ossible and far beyond the worst case lower bound rovided by the sark I INTRODUCTION The central goal of comressed sensing (CS) is to cature a signal using very few measurements In most work to date, this broader objective is exemlified by the imortant secial case in which the measurement data constitute a vector f = +e where is an N matrix called the sensing matrix, R N is a k-sarse signal, and e R is the additive noise There are two distinct CS frameworks with different objectives Worst-case CS [], []: In the worst-case CS framework, the goal is to recover every k-sarse vector from the corresonding measurement vector f It is known that certain robabilistic rocesses generate sensing matrices that suort worst-case CS [3] However, the random sensing framework suffers from storage and comutation limitations As a result, there has been a significant amount of research on designing alternative deterministic matrices for worst-case CS framework over the last few years [4] ost such constructions rely on the coherence between the columns of the matrix When the coherence follows the Welch Bound µ = O, the Gerschgorin Circle Theorem guarantees reconstruction of any k-sarse signal with k = O( ) Average-case CS [4] [6]: In many ractical alications, including wireless communications and radar, it is not nec- SJ is with the ultimedia Research Grou, Yahoo! Research, sinaj@yahoo-inccom D is with the Deartment of Electrical and Comuter Engineering, University of assachusetts-amherst, mduarte@ecsumassedu RC is with the Deartment of Comuter Science, Duke University, robertcalderbank@dukeedu The work is suorted in art by ONR under grant N and by AFOSR under grant FA essary to reconstruct every sarse vector [7] The goal of average-case CS is to recover most (in contrast to all) k-sarse vectors Here, the sarse vector is often modeled to have a uniformly random suort and random sign for the k nonzero entries The average-case CS framework relies on the coherence and the sectral norm of the deterministic sensing matrix The ideal case is when coherence follows the Welch bound [8], and different measurements are orthogonal Then, as long as k = O (/log N), with high robability a k- sarse vector has a unique sarse reresentation, and can be efficiently recovered from the comressive measurements [6] In this aer, we construct an exlicit basis for the null sace of a large family of deterministic sensing matrices designed for the average-case CS framework (see [5] and the references therein) using the indicator vectors of binary selfdual codes Characterizing the null sace of these matrices makes it ossible to investigate and analyze the geometric roerties of these matrices more recisely ore secifically, we introduce a family of deterministic sensing matrices called the extended Delsarte-Goethals frames (EDGFs) that hold the following three roerties simultaneously: (i) as long as k ale c it is ossible to recover every k-sarse vector from the measurement vector ; (ii) there exists a k-sarse vector with k = c such that no reconstruction algorithm can uniquely recover from ; and (iii) it is ossible to recover most k-sarse vectors from the measurement vector as long as k ale c 3 log N (which can be much larger than c ), where c, c, and c 3 are fixed constants The EDGFs meet the coherence-based lower bound on worst-case reconstruction and the order-otimal uer bound on average-case reconstruction The rest of the aer is organized as follows Section II reviews Delsarte-Goethals frames (DGFs) Section III exlains the roerties of the self-dual codes used in this aer Sections IV and V characterize the null sace of the DGFs and the EDGFs The exeriments are rovided in Section VI Section VII concludes the aer II BACKGROUND AND NOTATION A Worst-case vs Average-case Comressed Sensing A vector is k-sarse if it has at most k non-zero entries The suort of a k-sarse vector indicates the ositions of its non-zero entries Let be an N matrix Then is a tightframe with redundancy if = I N N, where denotes the conjugate transose of The sark of the measurement matrix, denoted as sark( ), is the size of the smallest set

2 of linearly deendent columns of Let ' i denote the i th column of The coherence between the columns of is defined as the maximum inner roduct between two distinct columns of : µ = max i6=j ' i ' j k' i k k' j k In this aer, we simlify the analysis by focusing on the noiseless CS roblem, and note that it is straightforward to generalize the analysis to include noise The following two theorems relate the maximum sarsity level k to the arameters of the sensing matrix, so that it is ossible to efficiently recover all (resectively most) k-sarse vectors from Theorem (Worst-case CS [9]): Let be a an N sensing matrix with worst-case coherence µ Then as long as k = O(µ ), it is ossible to efficiently recover every k-sarse vector from the measurement vector In contrast, when sark( ) k, there exist multile k-sarse vectors that are maed to the same measurement vector, rendering recovery imossible Theorem (Average-case CS [6], [0]): Let be a an N tight-frame with redundancy = n N/ and with µ o worst-case coherence µ If k = O min log N, log N, then with robability /N, it is ossible to efficiently recover a k-sarse vector with uniformly random suort and uniformly random sign from the measurement vector Throughout this aer, m denotes an integer and = m Given a vector v with binary entries, we let v(x) denote the entry of v indexed by x The inner roduct of two binary vectors u, v is denoted by u > v B Delsarte-Goethals Frames The Delsarte-Goethals frames (DGFs) are a class of CS matrices that have been recently introduced by Calderbank, Howard, and Jafarour [5] Secifically, let m be an odd ositive integer, and r to be an integer smaller than m Next, let DG(m, r) denote the Delsarte-Goethals set of binary symmetric matrices, as described in [] Then, given = m and N = r+, the N DGF is constructed from DG(m, r) in the following way Index the rows of by binary vectors x F m and index the columns of by airs (P, b), where P ranges over all (r+)m binary symmetric matrices DG(m, r) and b ranges over all members of F m The entries of are given by ' (P,b) (x) = i x> Px+b >x, where i = It is easy to see from this descrition that (i) DGFs are unions of orthonormal bases and (ii) each DGF can be reresented as = [D R H,, D H, H], () where R = N = r+, H is the Hadamard matrix, and each D i is a diagonal matrix whose (x, x) entry is i x> P ix where P i is a binary symmetric matrix from the Delsarte-Goethals set DG(m, r) A DGF is a tight-frame with redundancy r+ and worst-case coherence µ = r [5] As a result, it follows from Theorems and that as long as k = O( / r ), it is ossible to recover every k- sarse vector from using the `-minimization method; moreover, even if k = O r log N it is still ossible to recover most k-sarse vectors from using the same techniques III BINARY SELF-DUAL CODES We start by defining a binary self-dual code and exlaining some of its roerties Definition 3 (Binary Self-Dual Code): A binary code C is self-dual if C? = u : u > w =08 w C = C, () Let C be a self-dual code of length m, and let b be a binary m-tule vector in the finite field F m Throughout the aer, by b C we mean {b c : c C} Definition 3: Let C be a binary self-dual code of length m The binary vector v of length = m with entries v(x) = if x C and v(x) =0if x/ C is called the indicator of C A direct calculation, catured in the following lemma, shows that the indicator of a self-dual code can be viewed as the binary counterart of the Dirac comb in Fourier analysis Lemma 3: Let C be a binary self-dual linear code of length m, and let v {0, } be the indicator of C Let H be the Hadamard matrix Then Hv = C v Next, we use the vector v to construct h ai sarse vector in the null sace of the matrix 0 = I, H h i Theorem 3: Let 0 = I, H be an matrix generated from concatenating the identity matrix and the normalized Hadamard matrix Let C be a binary linear selfdual code with indicator v Define v =[ v, v] > Then I 0 is a tight frame with redundancy II v is a -sarse vector in the null sace of 0 Therefore sark( 0 ) ale Proof: We rove each art searately: I 0 is a union of two orthonormal bases, therefore = I II Every self-dual code of length m has dimension m, and hence exactly different codewords Therefore, v is -sarse, and by construction, v has exactly non-zero entries oreover, it follows from Lemma 3 that Hv = h i Iv or equivalently I, H [ v, v] > = 0 Corollary 3: Let D be an diagonal matrix, and let = [DH, H] be an matrix generated from concatenating the modulated Hadamard h (DH) matrix and the i Hadamard (H) matrix Define v N = H D v ; v Then v N is in the null sace of

3 Proof: Theorem 3 guarantees that H v I v =0 On the other hand, since the Hadamard matrix has orthogonal binary-valued rows, we have H = H, and therefore H v DH HD v =Hv DH (DH) v =0 Finally, we consider the sarsity degree of v N Since v is -sarse, only of the second entries of vn are nonzero Now we analyze the first entries of v N Let denote the diagonal of D, let =D v, and denote =H Here we focus on a secial but imortant case where there exists an m m binary symmetric matrix P such that (x) =i x> Px for every x F m This is the case for a large class of CS matrices, including the DGFs For every binary m-tule x we have (x) if x C (x) = 0 otherwise, and (x) = ( ) x>y (y) = ( ) x> y yc yf m (y) = yc( ) x>y i y> Py Note that the calculation y > Py+x > y is now over Z 4 and not Z Let (x) denote the comlex conjugate of (x) Observe that (x) is zero if and only if (x) is zero Therefore, it is sufficient to analyze (x) Theorem 3: Let P be an m m binary symmetric matrix, and let E be the null sace of P Define (x) = yc i y> Py+x >y, where x F m Let d P denote the diagonal of P and assume that d P C This assumtion is easily satisfied if we only consider zero-diagonal matrices in the construction of the DGFs Define C 0 = {z C :Pz C} (3) Then (x) 6= 0for at most t values of x, where t = m dim(c 0 ) Proof: We have (x) = i y> Py+y 0> Py 0 +x > (y+y 0 ) y,y 0 C = y,y 0 C i (y+y0 ) > P(y+y 0 )+y > Py 0 +x > (y+y 0) Changing variables to z = y + y 0 and y gives (x) = zc = zc i z> Pz+x > z yc ( ) (z+y)> Py i z> Pz+x > z yc( ) (dp+pz)>y The inner sum is zero if (d P +Pz) / C Otherwise the inner sum is C, and we have (x) = C zc 0 i z> Pz+x >z (4) Now observe that for any z,z C 0, (z + z ) > P(z + z )+x > (z + z ) = z > Pz > +x > z + z > Pz +x > z +z > Pz (5) = z > Pz > +x > z + z > Pz +x > z (mod 4), where the second equality follows from the fact that both Pz and z are codewords of C If this linear ma is the zero ma on x, then (x) = C C 0, and otherwise (x) =0 As a result, (x) vanishes for all but t values of x, where t = m dim(c 0 ) IV THE NULL SPACE OF DELSARTE-GOETHALS FRAES In this section, we construct a basis for the null sace of matrices of the form of Equation () To do this, we first rovide h an orthogonal i basis for the null sace of the matrix 0 = I, H, Let a be a binary m-dimensional vector The time-shift matrix A a is a circulant matrix so that every row x of A a has only one at the corresonding column indexed at x a and zeros elsewhere Similarly, the frequency-shift matrix B a is a diagonal matrix with diagonal entries ( ) xa>, where the m-dimensional binary vector x ranges over all = m rows A direct calculation reveals that HA a = B a H, and HB a = A a H Lemma 4: Let 0 and v be as above, and let a and b be any two binary m-dimensional offsets Then the vector w = [A a B b v; B a A b v] is in the null sace of 0 Proof: We have 0w = A a B b v HB a A b v = A a B b v A a B b Hv (6) = A a B b alei, H [v; v] =0 Lemma 4: Let W = {w : w =[A a B b v; B a A b v],a,b F m } Then W is an orthogonal basis forming the null sace of 0 Proof: Since v is the indicator of a self dual code, it is -sarse oreover, there are exactly offsets a that roduce distinct shifts of v The reason is that since C is linear, if c is any codeword of C, then both A a v and A a c v rovide the same vector whose non-zero entries corresond to indices of the form z a where z ranges over all codewords That is A a v = A a c v Similarly, since C is self-dual, for every air of codewords z and c we have ( ) b>z =( ) (b c)>z This imlies that there are distinct choices b for the frequency shift of the vector v Now we show that these vectors are orthogonal To see this, let (a, b) and (a 0,b 0 ) be two distinct airs of time and frequency shift offsets Let = B a A b v and = BaA 0 0 b v Then, it is sufficient to show that if and are distinct, then > =0 Since v is the indicator vector of a linear self-dual code, then if Su( ) \ Su( ) contains some element y, then

4 the set y C is also in the intersection of the two suorts This set has elements, and since both suorts also have elements, we must have Su( )=Su( ) As a result, if A b v 6= A 0 b v then Su( ) \ Su( )=Ø, and therefore B a A b v and BaA 0 0 bv are orthogonal On the other hand, if A b v = A 0 b v, then and are two distinct Walsh tones restricted to the set b C Now let c be an element in C such that c > (a a 0 )= Then ( ) c> (a a 0 ) = bc bc ( ) x> (a a 0 ) ( ) (x c)> (a a 0 )!! = bc ( ) x> (a a 0) Therefore, we must have P bc ( (a a 0 ) )x> = 0, which roves that and are orthogonal A similar argument can be used to show that if = A a B b v and = A 0 abb 0v, then, if and are distinct, then > =0 As a result, we have distinct linearly indeendent vectors of the form w =[A a B b v; B a A b v] which are all in the null sace of 0 On the other hand, since 0 is, its null sace has dimension, and therefore the null sace vectors above form a basis for the null sace of 0 Next we show that the same argument can be used to form an orthogonal basis for the null sace of matrices of form = [DH, H], where D is a diagonal matrix with h diagonal entries i xpx>i, x F m Theorem 4: Let = [DH, H], where D=[i xpx> ], and where P is a zero-diagonal binary symmetric matrix Let C be a self-dual code such that for any codeword c, Pc is also a codeword in C Let v denote the indicator vector of the codewords of C Let W = w : w = (7) ale HD A a B b v; B a A b v,a,b F m Then W forms an orthonormal basis for the null sace of the matrix ; moreover, every element of W is -sarse Proof: Let w be any vector in W We have w = ale HD [DH, H] A a B b v; B a A b v (8) =[A a B b v HB a A b v]=0 Now we show that any vector w W is -sarse First, note that since v is the indicator of a self-dual code, and the oerators A b and B a do not change the sarsity level, B a A b v is -sarse Hence, we need to show that! = HD A a B b v is also -sarse We have The zero-diagonal assumtion is only for simlifying the calculations, and is easy satisfied by using the Gray ma []!(x) = ( ) b>y i (y a)> P (y a) ( ) (y a)> x yc = i a> Pa ( ) a> x yc i (b+x+pa)> y+y > Py Since C is self-dual and y and Py are both codewords in C, the maing y! (b + x + ap ) > y + y > Py is a linear ma from C to Z 4 Theorem 3 now guarantees that w(x) is non-zero only for choices of x Remark 4: So far we have shown how to generate a basis for the null sace of a matrix of the form [DH, H] This construction can be generalized to matrices of form [D R H,, D H, H] in a straightforward manner by first zeroadding each null sace vector, so that it becomes (R + )dimensional, and then collecting all these R vectors For instance, a basis for the null sace of a 3 matrix [D H, D H, H] has the form 4 0 V 0 V 0 0 V V 3 (9) 5, (0) where [V; 0 V ] is a basis for the null sace of [D H, H], and [V; 0 V ] is a basis for the null sace of [D H, H] V ETENDED DELSARTE-GOETHALS FRAES In this section, we use the results of the revious sections and design an N sensing matrix with N for which there exists constants c, c, and c 3, such that (i) it is ossible to uniquely recover every k-sarse vectors as long as k ale c ; (ii) there exists a k-sarse vector with k = c such that no reconstruction algorithm is able to uniquely recover it from the measurement vector f = ; and (iii) it is ossible to uniquely recover most k-sarse vectors as long as k ale c 3 /log N The extended Delsarte-Goethals frame (EDGF) is constructed by concatenating the identity matrix to a DGF Theorem 5: Let r be a constant integer, and let m>r+ be an integer Then: I The EDGF has = m rows, and N = r+ + columns II The EDGF is a tight frame with redundancy r+ +, and coherence r Proof: The roof of Part I follows from the construction of the EDGF To rove Part II observe that the EDGF is a union of orthonormal bases, and therefore it is a tight-frame with redundancy N The coherence bound follows from the fact that the inner roduct between two distinct columns of a DGF is bounded by a column of a DGF, and a column of the identity matrix is bounded by r, and that the inner roduct between Since the matrix 0 = [I, H] is a submatrix of any EDGF, it follows from Theorem 3 that the sark of any

5 =56, N=5, self dual submatrix dimension (56*80) with rank 76 # <=$"(>6?="#$!>6,857!@A56,A4B/096@0B8C,03C6D$"(E%$F6G0H6/CI6%# 6 09!&+ 08!&* robability of exact recovery / :6/8:3;8/!&)!&(!&"!&'!&% 0!&$ 0 Self dual Uniform sarsity!&# J857!@A5 KC073/B! 6! " #! #" $! $" %! %",-/,0 Fig : Probability of exact recovery of the Basis Pursuit algorithm in recovering sarse vectors using a 56 5 submatrix of the DG(8, 0) frame The matrix has a rank-deficient submatrix with rank 76 Fig : Probability of exact recovery of the Basis Pursuit algorithm in recovering sarse vectors using a submatrix of the extended DG(8, 0) frame The matrix has a 56 3 rank-deficient submatrix with rank 3 EDGF is at most As a result, there can be two distinct -sarse vectors maed to the same low-dimemsional measurement vector On the other hand, Theorem states that it is ossible touniquely recover every k-sarse vector with sarsity k ale c In contrast, it follows from Theorem that if is a k-sarse vector with uniformly random suort and random sign, then as long as k ale c 3 /log N (which can be much larger than c ), is uniquely recoverable from f = with overwhelming robability VI EPERIENTAL RESULTS The exeriments of this section comare the erformance of the Basis Pursuit algorithm [6] in recovering sarse vectors with uniformly random suorts versus recovering sarse vectors suorted on a rank-deficient submatrix obtained using a self-dual code We rovide the comarisons for the DGFs (Fig ), as well as for the EDGFs (Fig ) In Fig we used a 56 5 matrix of the form = [H, D H], where D is a diagonal matrix with d D (x) = i x> Px, and P is the 8 8 zero-diagonal binary symmetric matrix obtained from alying the Gray ma [] to a 7 7 binary DG(7, 0) matrix We also used the self-dual Hamming code C of length 8 in order to find a rank-deficient submatrix of A simle calculation reveals that only 4 codewords are in C 0 (defined by eq (3)) Therefore, dim(c 0 )=, and Theorem 3 redicts that HD v must have 56/4 = 64 non-zero entries A direct calculation reveals that HD v indeed has 64 nonzero entries Therefore, the null sace of [H, D H] has a 80-sarse element That is, there exists, a submatrix of that is rank-deficient As illustrated in Fig, the Basis Pursuit Algorithm fails to recover some k-sarse vectors with sarsity level k > 40 which are suorted on this rankdeficient submatrix However, it is still ossible to recover most k-sarse vectors with uniformly random suort over the 5 columns, even for sarsity level k = 80 Fig shows the result of the same exeriment using an EDGF VII CONCLUSION We have determined a natural basis for the null sace of an extended Delsarte-Goethals frame and shown that this null sace contains a vector that is -sarse We have demonstrated that this family of measurement matrices meets the lower bound of k = O( ) on worst-case CS as well as the order otimal uer bound of k = O(/log(N)) REFERENCES [] E Candès, J Romberg, and T Tao Stable signal recovery from incomlete and inaccurate measurements Communications on Pure and Alied athematics, Vol 59 (8), 07-3, 006 [] D Donoho Comressed Sensing IEEE Transactions on Information Theory, Vol 5 (4), , Aril 006 [3] R Baraniuk, Davenort, R DeVore, and Wakin A simle roof of the restricted isometry roerty for random matrices Constructive Aroximation, Vol 8 (3), 53-63, December 008 [4] W Bajwa, R Calderbank, and S Jafarour odel Selection: Two fundamental measures of coherence and their algorithmic significance Proceedings of IEEE Symosium on Information Theory (ISIT), 00 [5] R Calderbank, S Howard, and S Jafarour Construction of a large class of matrices satisfying a statistical isometry roerty IEEE Journal of Selected Toics in Signal Processing, Secial Issue on Comressive Sensing, Vol 4(), , 00 [6] E Candès and J Plan Near-ideal model selection by ` minimization Annals of Statistics, Vol 37, 45-77, 009 [7] L Alebaum, S Howard, S Searle, and R Calderbank Chir sensing codes: Deterministic comressed sensing measurements for fast recovery Alied and Comutational Harmonic Analysis, Vol 6 (), 83-90, arch 009 [8] W Bajwa, J Haut, G Raz, S Wright, and R Nowak Toelitzstructured comressed sensing matrices Statistical Signal Processing IEEE/SP 4th Worksho on, ages 94 98, August 007 [9] D L Donoho and Elad Otimally sarse reresentation in general (nonorthogonal) dictionaries via ` minimization Proc Nat Acad Sci, 00(5):97 0, 003 [0] J Tro On The Conditioning of Random Subdictionaries Alied and Comutational Harmonic Analysis, Vol 5, 4, 008 [] R Calderbank and S Jafarour Reed-uller sensing matrices and the LASSO International Conference on Sequences and their Alications (SETA), , 00 [] AR Calderbank, PJ Cameron, W Kantor, and JJ Seidel Z 4 Kerdock Codes, orthogonal sreads and extremal euclidean line sets Proceedings of London ath Society, vol 75, , 997

ON OPTIMIZATION OF THE MEASUREMENT MATRIX FOR COMPRESSIVE SENSING

ON OPTIMIZATION OF THE MEASUREMENT MATRIX FOR COMPRESSIVE SENSING 8th Euroean Signal Processing Conference (EUSIPCO-2) Aalborg, Denmark, August 23-27, 2 ON OPTIMIZATION OF THE MEASUREMENT MATRIX FOR COMPRESSIVE SENSING Vahid Abolghasemi, Saideh Ferdowsi, Bahador Makkiabadi,2,

More information

A Note on Guaranteed Sparse Recovery via l 1 -Minimization

A Note on Guaranteed Sparse Recovery via l 1 -Minimization A Note on Guaranteed Sarse Recovery via l -Minimization Simon Foucart, Université Pierre et Marie Curie Abstract It is roved that every s-sarse vector x C N can be recovered from the measurement vector

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

SPARSE NEAR-EQUIANGULAR TIGHT FRAMES WITH APPLICATIONS IN FULL DUPLEX WIRELESS COMMUNICATION

SPARSE NEAR-EQUIANGULAR TIGHT FRAMES WITH APPLICATIONS IN FULL DUPLEX WIRELESS COMMUNICATION SPARSE NEAR-EQUIANGULAR TIGHT FRAMES WITH APPLICATIONS IN FULL DUPLEX WIRELESS COMMUNICATION A. Thompson Mathematical Institute University of Oxford Oxford, United Kingdom R. Calderbank Department of ECE

More information

Discrete Signal Reconstruction by Sum of Absolute Values

Discrete Signal Reconstruction by Sum of Absolute Values JOURNAL OF L A TEX CLASS FILES, VOL., NO. 4, DECEMBER 22 Discrete Signal Reconstruction by Sum of Absolute Values Masaaki Nagahara, Senior Member, IEEE, arxiv:53.5299v [cs.it] 8 Mar 25 Abstract In this

More information

A Recursive Block Incomplete Factorization. Preconditioner for Adaptive Filtering Problem

A Recursive Block Incomplete Factorization. Preconditioner for Adaptive Filtering Problem Alied Mathematical Sciences, Vol. 7, 03, no. 63, 3-3 HIKARI Ltd, www.m-hiari.com A Recursive Bloc Incomlete Factorization Preconditioner for Adative Filtering Problem Shazia Javed School of Mathematical

More information

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., DECEMBER 4 336 Some Unitary Sace Time Codes From Shere Packing Theory With Otimal Diversity Product of Code Size Haiquan Wang, Genyuan Wang, and Xiang-Gen

More information

AKRON: An Algorithm for Approximating Sparse Kernel Reconstruction

AKRON: An Algorithm for Approximating Sparse Kernel Reconstruction : An Algorithm for Aroximating Sarse Kernel Reconstruction Gregory Ditzler Det. of Electrical and Comuter Engineering The University of Arizona Tucson, AZ 8572 USA ditzler@email.arizona.edu Nidhal Carla

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

Compressed Sensing Based Video Multicast

Compressed Sensing Based Video Multicast Comressed Sensing Based Video Multicast Markus B. Schenkel a,b, Chong Luo a, Pascal Frossard b and Feng Wu a a Microsoft Research Asia, Beijing, China b Signal Processing Laboratory (LTS4), EPFL, Lausanne,

More information

PARTIAL FACE RECOGNITION: A SPARSE REPRESENTATION-BASED APPROACH. Luoluo Liu, Trac D. Tran, and Sang Peter Chin

PARTIAL FACE RECOGNITION: A SPARSE REPRESENTATION-BASED APPROACH. Luoluo Liu, Trac D. Tran, and Sang Peter Chin PARTIAL FACE RECOGNITION: A SPARSE REPRESENTATION-BASED APPROACH Luoluo Liu, Trac D. Tran, and Sang Peter Chin Det. of Electrical and Comuter Engineering, Johns Hokins Univ., Baltimore, MD 21218, USA {lliu69,trac,schin11}@jhu.edu

More information

1-way quantum finite automata: strengths, weaknesses and generalizations

1-way quantum finite automata: strengths, weaknesses and generalizations 1-way quantum finite automata: strengths, weaknesses and generalizations arxiv:quant-h/9802062v3 30 Se 1998 Andris Ambainis UC Berkeley Abstract Rūsiņš Freivalds University of Latvia We study 1-way quantum

More information

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in

More information

c Copyright by Helen J. Elwood December, 2011

c Copyright by Helen J. Elwood December, 2011 c Coyright by Helen J. Elwood December, 2011 CONSTRUCTING COMPLEX EQUIANGULAR PARSEVAL FRAMES A Dissertation Presented to the Faculty of the Deartment of Mathematics University of Houston In Partial Fulfillment

More information

Chater Matrix Norms and Singular Value Decomosition Introduction In this lecture, we introduce the notion of a norm for matrices The singular value de

Chater Matrix Norms and Singular Value Decomosition Introduction In this lecture, we introduce the notion of a norm for matrices The singular value de Lectures on Dynamic Systems and Control Mohammed Dahleh Munther A Dahleh George Verghese Deartment of Electrical Engineering and Comuter Science Massachuasetts Institute of Technology c Chater Matrix Norms

More information

Universal Finite Memory Coding of Binary Sequences

Universal Finite Memory Coding of Binary Sequences Deartment of Electrical Engineering Systems Universal Finite Memory Coding of Binary Sequences Thesis submitted towards the degree of Master of Science in Electrical and Electronic Engineering in Tel-Aviv

More information

Use of Transformations and the Repeated Statement in PROC GLM in SAS Ed Stanek

Use of Transformations and the Repeated Statement in PROC GLM in SAS Ed Stanek Use of Transformations and the Reeated Statement in PROC GLM in SAS Ed Stanek Introduction We describe how the Reeated Statement in PROC GLM in SAS transforms the data to rovide tests of hyotheses of interest.

More information

Convex Analysis and Economic Theory Winter 2018

Convex Analysis and Economic Theory Winter 2018 Division of the Humanities and Social Sciences Ec 181 KC Border Conve Analysis and Economic Theory Winter 2018 Toic 16: Fenchel conjugates 16.1 Conjugate functions Recall from Proosition 14.1.1 that is

More information

Introduction to Group Theory Note 1

Introduction to Group Theory Note 1 Introduction to Grou Theory Note July 7, 009 Contents INTRODUCTION. Examles OF Symmetry Grous in Physics................................. ELEMENT OF GROUP THEORY. De nition of Grou................................................

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

Numerical Linear Algebra

Numerical Linear Algebra Numerical Linear Algebra Numerous alications in statistics, articularly in the fitting of linear models. Notation and conventions: Elements of a matrix A are denoted by a ij, where i indexes the rows and

More information

Combinatorics of topmost discs of multi-peg Tower of Hanoi problem

Combinatorics of topmost discs of multi-peg Tower of Hanoi problem Combinatorics of tomost discs of multi-eg Tower of Hanoi roblem Sandi Klavžar Deartment of Mathematics, PEF, Unversity of Maribor Koroška cesta 160, 000 Maribor, Slovenia Uroš Milutinović Deartment of

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various

More information

A Structured Construction of Optimal Measurement Matrix for Noiseless Compressed Sensing via Polarization of Analog Transmission

A Structured Construction of Optimal Measurement Matrix for Noiseless Compressed Sensing via Polarization of Analog Transmission Li and Kang: A Structured Construction of Optimal Measurement Matrix for Noiseless Compressed Sensing 1 A Structured Construction of Optimal Measurement Matrix for Noiseless Compressed Sensing via Polarization

More information

Online homotopy algorithm for a generalization of the LASSO

Online homotopy algorithm for a generalization of the LASSO This article has been acceted for ublication in a future issue of this journal, but has not been fully edited. Content may change rior to final ublication. Online homotoy algorithm for a generalization

More information

Finding a sparse vector in a subspace: linear sparsity using alternating directions

Finding a sparse vector in a subspace: linear sparsity using alternating directions IEEE TRANSACTION ON INFORMATION THEORY VOL XX NO XX 06 Finding a sarse vector in a subsace: linear sarsity using alternating directions Qing Qu Student Member IEEE Ju Sun Student Member IEEE and John Wright

More information

Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems

Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Hsiao-Lan Chiang, Tobias Kadur, and Gerhard Fettweis Vodafone Chair for Mobile Communications Technische Universität

More information

On Code Design for Simultaneous Energy and Information Transfer

On Code Design for Simultaneous Energy and Information Transfer On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter

More information

arxiv: v1 [stat.ml] 10 Mar 2016

arxiv: v1 [stat.ml] 10 Mar 2016 Global and Local Uncertainty Princiles for Signals on Grahs Nathanael Perraudin, Benjamin Ricaud, David I Shuman, and Pierre Vandergheynst March, 206 arxiv:603.03030v [stat.ml] 0 Mar 206 Abstract Uncertainty

More information

Sampling and Distortion Tradeoffs for Bandlimited Periodic Signals

Sampling and Distortion Tradeoffs for Bandlimited Periodic Signals Samling and Distortion radeoffs for Bandlimited Periodic Signals Elaheh ohammadi and Farokh arvasti Advanced Communications Research Institute ACRI Deartment of Electrical Engineering Sharif University

More information

Tensor-Based Sparsity Order Estimation for Big Data Applications

Tensor-Based Sparsity Order Estimation for Big Data Applications Tensor-Based Sarsity Order Estimation for Big Data Alications Kefei Liu, Florian Roemer, João Paulo C. L. da Costa, Jie Xiong, Yi-Sheng Yan, Wen-Qin Wang and Giovanni Del Galdo Indiana University School

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

Sums of independent random variables

Sums of independent random variables 3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where

More information

arxiv: v4 [math.nt] 11 Oct 2017

arxiv: v4 [math.nt] 11 Oct 2017 POPULAR DIFFERENCES AND GENERALIZED SIDON SETS WENQIANG XU arxiv:1706.05969v4 [math.nt] 11 Oct 2017 Abstract. For a subset A [N], we define the reresentation function r A A(d := #{(a,a A A : d = a a }

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

Frame Coherence and Sparse Signal Processing

Frame Coherence and Sparse Signal Processing Frame Coherence and Sparse Signal Processing Dustin G ixon Waheed U Bajwa Robert Calderbank Program in Applied and Computational athematics Princeton University Princeton ew Jersey 08544 Department of

More information

AN ALGORITHM FOR MATRIX EXTENSION AND WAVELET CONSTRUCTION W. LAWTON, S. L. LEE AND ZUOWEI SHEN Abstract. This paper gives a practical method of exten

AN ALGORITHM FOR MATRIX EXTENSION AND WAVELET CONSTRUCTION W. LAWTON, S. L. LEE AND ZUOWEI SHEN Abstract. This paper gives a practical method of exten AN ALGORITHM FOR MATRIX EXTENSION AND WAVELET ONSTRUTION W. LAWTON, S. L. LEE AND ZUOWEI SHEN Abstract. This aer gives a ractical method of extending an nr matrix P (z), r n, with Laurent olynomial entries

More information

Hidden Predictors: A Factor Analysis Primer

Hidden Predictors: A Factor Analysis Primer Hidden Predictors: A Factor Analysis Primer Ryan C Sanchez Western Washington University Factor Analysis is a owerful statistical method in the modern research sychologist s toolbag When used roerly, factor

More information

NUMERICAL AND THEORETICAL INVESTIGATIONS ON DETONATION- INERT CONFINEMENT INTERACTIONS

NUMERICAL AND THEORETICAL INVESTIGATIONS ON DETONATION- INERT CONFINEMENT INTERACTIONS NUMERICAL AND THEORETICAL INVESTIGATIONS ON DETONATION- INERT CONFINEMENT INTERACTIONS Tariq D. Aslam and John B. Bdzil Los Alamos National Laboratory Los Alamos, NM 87545 hone: 1-55-667-1367, fax: 1-55-667-6372

More information

New Coherence and RIP Analysis for Weak. Orthogonal Matching Pursuit

New Coherence and RIP Analysis for Weak. Orthogonal Matching Pursuit New Coherence and RIP Analysis for Wea 1 Orthogonal Matching Pursuit Mingrui Yang, Member, IEEE, and Fran de Hoog arxiv:1405.3354v1 [cs.it] 14 May 2014 Abstract In this paper we define a new coherence

More information

Distributed K-means over Compressed Binary Data

Distributed K-means over Compressed Binary Data 1 Distributed K-means over Comressed Binary Data Elsa DUPRAZ Telecom Bretagne; UMR CNRS 6285 Lab-STICC, Brest, France arxiv:1701.03403v1 [cs.it] 12 Jan 2017 Abstract We consider a networ of binary-valued

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

Generalized Coiflets: A New Family of Orthonormal Wavelets

Generalized Coiflets: A New Family of Orthonormal Wavelets Generalized Coiflets A New Family of Orthonormal Wavelets Dong Wei, Alan C Bovik, and Brian L Evans Laboratory for Image and Video Engineering Deartment of Electrical and Comuter Engineering The University

More information

Some Results on the Generalized Gaussian Distribution

Some Results on the Generalized Gaussian Distribution Some Results on the Generalized Gaussian Distribution Alex Dytso, Ronit Bustin, H. Vincent Poor, Daniela Tuninetti 3, Natasha Devroye 3, and Shlomo Shamai (Shitz) Abstract The aer considers information-theoretic

More information

Sharp gradient estimate and spectral rigidity for p-laplacian

Sharp gradient estimate and spectral rigidity for p-laplacian Shar gradient estimate and sectral rigidity for -Lalacian Chiung-Jue Anna Sung and Jiaing Wang To aear in ath. Research Letters. Abstract We derive a shar gradient estimate for ositive eigenfunctions of

More information

Uniqueness Conditions for A Class of l 0 -Minimization Problems

Uniqueness Conditions for A Class of l 0 -Minimization Problems Uniqueness Conditions for A Class of l 0 -Minimization Problems Chunlei Xu and Yun-Bin Zhao October, 03, Revised January 04 Abstract. We consider a class of l 0 -minimization problems, which is to search

More information

Cryptanalysis of Pseudorandom Generators

Cryptanalysis of Pseudorandom Generators CSE 206A: Lattice Algorithms and Alications Fall 2017 Crytanalysis of Pseudorandom Generators Instructor: Daniele Micciancio UCSD CSE As a motivating alication for the study of lattice in crytograhy we

More information

Uniformly best wavenumber approximations by spatial central difference operators: An initial investigation

Uniformly best wavenumber approximations by spatial central difference operators: An initial investigation Uniformly best wavenumber aroximations by satial central difference oerators: An initial investigation Vitor Linders and Jan Nordström Abstract A characterisation theorem for best uniform wavenumber aroximations

More information

Decoding Linear Block Codes Using a Priority-First Search: Performance Analysis and Suboptimal Version

Decoding Linear Block Codes Using a Priority-First Search: Performance Analysis and Suboptimal Version IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 3, MAY 1998 133 Decoding Linear Block Codes Using a Priority-First Search Performance Analysis Subotimal Version Yunghsiang S. Han, Member, IEEE, Carlos

More information

2 Asymptotic density and Dirichlet density

2 Asymptotic density and Dirichlet density 8.785: Analytic Number Theory, MIT, sring 2007 (K.S. Kedlaya) Primes in arithmetic rogressions In this unit, we first rove Dirichlet s theorem on rimes in arithmetic rogressions. We then rove the rime

More information

It is well-known that a complex m m matrix A is a commutator

It is well-known that a complex m m matrix A is a commutator A quantitative version of the commutator theorem for zero trace matrices William B. Johnson a, Narutaka Ozawa b, and Gideon Schechtman c, a Deartment of Mathematics, Texas A&M University, College Station,

More information

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment

More information

A New Perspective on Learning Linear Separators with Large L q L p Margins

A New Perspective on Learning Linear Separators with Large L q L p Margins A New Persective on Learning Linear Searators with Large L q L Margins Maria-Florina Balcan Georgia Institute of Technology Christoher Berlind Georgia Institute of Technology Abstract We give theoretical

More information

2 Asymptotic density and Dirichlet density

2 Asymptotic density and Dirichlet density 8.785: Analytic Number Theory, MIT, sring 2007 (K.S. Kedlaya) Primes in arithmetic rogressions In this unit, we first rove Dirichlet s theorem on rimes in arithmetic rogressions. We then rove the rime

More information

p-adic Measures and Bernoulli Numbers

p-adic Measures and Bernoulli Numbers -Adic Measures and Bernoulli Numbers Adam Bowers Introduction The constants B k in the Taylor series exansion t e t = t k B k k! k=0 are known as the Bernoulli numbers. The first few are,, 6, 0, 30, 0,

More information

arxiv: v5 [math.nt] 22 Aug 2013

arxiv: v5 [math.nt] 22 Aug 2013 Prerint, arxiv:1308900 ON SOME DETERMINANTS WITH LEGENDRE SYMBOL ENTRIES arxiv:1308900v5 [mathnt] Aug 013 Zhi-Wei Sun Deartment of Mathematics, Nanjing University Nanjing 10093, Peole s Reublic of China

More information

where x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H:

where x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H: Mehryar Mohri Foundations of Machine Learning Courant Institute of Mathematical Sciences Homework assignment 2 October 25, 2017 Due: November 08, 2017 A. Growth function Growth function of stum functions.

More information

Sparse near-equiangular tight frames with applications in full duplex wireless communication

Sparse near-equiangular tight frames with applications in full duplex wireless communication Sparse near-equiangular tight frames with applications in full duplex wireless communication Andrew Thompson (University of Oxford) with Robert Calderbank (Duke University) Global Conference on Signal

More information

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding Homework Set # Rates definitions, Channel Coding, Source-Channel coding. Rates (a) Channels coding Rate: Assuming you are sending 4 different messages using usages of a channel. What is the rate (in bits

More information

DISCRIMINANTS IN TOWERS

DISCRIMINANTS IN TOWERS DISCRIMINANTS IN TOWERS JOSEPH RABINOFF Let A be a Dedekind domain with fraction field F, let K/F be a finite searable extension field, and let B be the integral closure of A in K. In this note, we will

More information

Chapter 1: PROBABILITY BASICS

Chapter 1: PROBABILITY BASICS Charles Boncelet, obability, Statistics, and Random Signals," Oxford University ess, 0. ISBN: 978-0-9-0005-0 Chater : PROBABILITY BASICS Sections. What Is obability?. Exeriments, Outcomes, and Events.

More information

arxiv: v2 [cs.it] 10 Aug 2009

arxiv: v2 [cs.it] 10 Aug 2009 Sarse recovery by non-convex otimization instance otimality Rayan Saab arxiv:89.745v2 [cs.it] 1 Aug 29 Deartment of Electrical and Comuter Engineering, University of British Columbia, Vancouver, B.C. Canada

More information

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca

More information

Approximation of the Euclidean Distance by Chamfer Distances

Approximation of the Euclidean Distance by Chamfer Distances Acta Cybernetica 0 (0 399 47. Aroximation of the Euclidean Distance by Chamfer Distances András Hajdu, Lajos Hajdu, and Robert Tijdeman Abstract Chamfer distances lay an imortant role in the theory of

More information

Uniform Law on the Unit Sphere of a Banach Space

Uniform Law on the Unit Sphere of a Banach Space Uniform Law on the Unit Shere of a Banach Sace by Bernard Beauzamy Société de Calcul Mathématique SA Faubourg Saint Honoré 75008 Paris France Setember 008 Abstract We investigate the construction of a

More information

Almost All Palindromes Are Composite

Almost All Palindromes Are Composite Almost All Palindromes Are Comosite William D Banks Det of Mathematics, University of Missouri Columbia, MO 65211, USA bbanks@mathmissouriedu Derrick N Hart Det of Mathematics, University of Missouri Columbia,

More information

The analysis and representation of random signals

The analysis and representation of random signals The analysis and reresentation of random signals Bruno TOÉSNI Bruno.Torresani@cmi.univ-mrs.fr B. Torrésani LTP Université de Provence.1/30 Outline 1. andom signals Introduction The Karhunen-Loève Basis

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

Fast Reconstruction Algorithms for Deterministic Sensing Matrices and Applications

Fast Reconstruction Algorithms for Deterministic Sensing Matrices and Applications Fast Reconstruction Algorithms for Deterministic Sensing Matrices and Applications Program in Applied and Computational Mathematics Princeton University NJ 08544, USA. Introduction What is Compressive

More information

Additive results for the generalized Drazin inverse in a Banach algebra

Additive results for the generalized Drazin inverse in a Banach algebra Additive results for the generalized Drazin inverse in a Banach algebra Dragana S. Cvetković-Ilić Dragan S. Djordjević and Yimin Wei* Abstract In this aer we investigate additive roerties of the generalized

More information

State Estimation with ARMarkov Models

State Estimation with ARMarkov Models Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

POINTS ON CONICS MODULO p

POINTS ON CONICS MODULO p POINTS ON CONICS MODULO TEAM 2: JONGMIN BAEK, ANAND DEOPURKAR, AND KATHERINE REDFIELD Abstract. We comute the number of integer oints on conics modulo, where is an odd rime. We extend our results to conics

More information

Topic 7: Using identity types

Topic 7: Using identity types Toic 7: Using identity tyes June 10, 2014 Now we would like to learn how to use identity tyes and how to do some actual mathematics with them. By now we have essentially introduced all inference rules

More information

MATH 6210: SOLUTIONS TO PROBLEM SET #3

MATH 6210: SOLUTIONS TO PROBLEM SET #3 MATH 6210: SOLUTIONS TO PROBLEM SET #3 Rudin, Chater 4, Problem #3. The sace L (T) is searable since the trigonometric olynomials with comlex coefficients whose real and imaginary arts are rational form

More information

IEEE SIGNAL PROCESSING LETTERS, VOL. 22, NO. 9, SEPTEMBER

IEEE SIGNAL PROCESSING LETTERS, VOL. 22, NO. 9, SEPTEMBER IEEE SIGNAL PROCESSING LETTERS, VOL. 22, NO. 9, SEPTEMBER 2015 1239 Preconditioning for Underdetermined Linear Systems with Sparse Solutions Evaggelia Tsiligianni, StudentMember,IEEE, Lisimachos P. Kondi,

More information

New Wavelet Coefficient Raster Scannings for Deterministic Compressive Imaging

New Wavelet Coefficient Raster Scannings for Deterministic Compressive Imaging New Wavelet Coefficient Raster Scannings for Deterministic Compressive Imaging Marco F. Duarte Joint work with Sina Jafarpour and Robert Calderbank Compressive Imaging Architectures Φ f linear measurements

More information

L p -CONVERGENCE OF THE LAPLACE BELTRAMI EIGENFUNCTION EXPANSIONS

L p -CONVERGENCE OF THE LAPLACE BELTRAMI EIGENFUNCTION EXPANSIONS L -CONVERGENCE OF THE LAPLACE BELTRAI EIGENFUNCTION EXPANSIONS ATSUSHI KANAZAWA Abstract. We rovide a simle sufficient condition for the L - convergence of the Lalace Beltrami eigenfunction exansions of

More information

Radial Basis Function Networks: Algorithms

Radial Basis Function Networks: Algorithms Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.

More information

Unsupervised Hyperspectral Image Analysis Using Independent Component Analysis (ICA)

Unsupervised Hyperspectral Image Analysis Using Independent Component Analysis (ICA) Unsuervised Hyersectral Image Analysis Using Indeendent Comonent Analysis (ICA) Shao-Shan Chiang Chein-I Chang Irving W. Ginsberg Remote Sensing Signal and Image Processing Laboratory Deartment of Comuter

More information

STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS. A Dissertation JAMES ROBERT FISHER

STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS. A Dissertation JAMES ROBERT FISHER STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS A Dissertation by JAMES ROBERT FISHER Submitted to the Office of Graduate Studies of Texas A&M University in artial fulfillment

More information

Robustness of classifiers to uniform l p and Gaussian noise Supplementary material

Robustness of classifiers to uniform l p and Gaussian noise Supplementary material Robustness of classifiers to uniform l and Gaussian noise Sulementary material Jean-Yves Franceschi Ecole Normale Suérieure de Lyon LIP UMR 5668 Omar Fawzi Ecole Normale Suérieure de Lyon LIP UMR 5668

More information

KEY ISSUES IN THE ANALYSIS OF PILES IN LIQUEFYING SOILS

KEY ISSUES IN THE ANALYSIS OF PILES IN LIQUEFYING SOILS 4 th International Conference on Earthquake Geotechnical Engineering June 2-28, 27 KEY ISSUES IN THE ANALYSIS OF PILES IN LIQUEFYING SOILS Misko CUBRINOVSKI 1, Hayden BOWEN 1 ABSTRACT Two methods for analysis

More information

On a Markov Game with Incomplete Information

On a Markov Game with Incomplete Information On a Markov Game with Incomlete Information Johannes Hörner, Dinah Rosenberg y, Eilon Solan z and Nicolas Vieille x{ January 24, 26 Abstract We consider an examle of a Markov game with lack of information

More information

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables Imroved Bounds on Bell Numbers and on Moments of Sums of Random Variables Daniel Berend Tamir Tassa Abstract We rovide bounds for moments of sums of sequences of indeendent random variables. Concentrating

More information

Correspondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R.

Correspondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R. 1 Corresondence Between Fractal-Wavelet Transforms and Iterated Function Systems With Grey Level Mas F. Mendivil and E.R. Vrscay Deartment of Alied Mathematics Faculty of Mathematics University of Waterloo

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

Linear diophantine equations for discrete tomography

Linear diophantine equations for discrete tomography Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,

More information

On split sample and randomized confidence intervals for binomial proportions

On split sample and randomized confidence intervals for binomial proportions On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have

More information

q-ary Symmetric Channel for Large q

q-ary Symmetric Channel for Large q List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu

More information

Solvability and Number of Roots of Bi-Quadratic Equations over p adic Fields

Solvability and Number of Roots of Bi-Quadratic Equations over p adic Fields Malaysian Journal of Mathematical Sciences 10(S February: 15-35 (016 Secial Issue: The 3 rd International Conference on Mathematical Alications in Engineering 014 (ICMAE 14 MALAYSIAN JOURNAL OF MATHEMATICAL

More information

Improvement on the Decay of Crossing Numbers

Improvement on the Decay of Crossing Numbers Grahs and Combinatorics 2013) 29:365 371 DOI 10.1007/s00373-012-1137-3 ORIGINAL PAPER Imrovement on the Decay of Crossing Numbers Jakub Černý Jan Kynčl Géza Tóth Received: 24 Aril 2007 / Revised: 1 November

More information

TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES

TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES Khayyam J. Math. DOI:10.22034/kjm.2019.84207 TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES ISMAEL GARCÍA-BAYONA Communicated by A.M. Peralta Abstract. In this aer, we define two new Schur and

More information

Research of power plant parameter based on the Principal Component Analysis method

Research of power plant parameter based on the Principal Component Analysis method Research of ower lant arameter based on the Princial Comonent Analysis method Yang Yang *a, Di Zhang b a b School of Engineering, Bohai University, Liaoning Jinzhou, 3; Liaoning Datang international Jinzhou

More information