Beyond Worst-Case Reconstruction in Deterministic Compressed Sensing
|
|
- Derick McKinney
- 6 years ago
- Views:
Transcription
1 Beyond Worst-Case Reconstruction in Deterministic Comressed Sensing Sina Jafarour, ember, IEEE, arco F Duarte, ember, IEEE, and Robert Calderbank, Fellow, IEEE Abstract The role of random measurement in comressive sensing is analogous to the role of random codes in coding theory In coding theory, decoders that can correct beyond the minimum distance of a code allow random codes to achieve the Shannon limit In comressed sensing, the counterart of minimum distance is the sark of the measurement matrix, ie, the size of the smallest set of linearly deendent columns This aer constructs a family of measurement matrices where the columns are formed by exonentiating codewords from a classical binary error-correcting code of block length The columns can be artitioned into mutually unbiased bases, and the sark of the corresonding measurement matrix is shown to be O( ) by identifying a configuration of columns that lays a role similar to that of the Dirac comb in classical Fourier analysis Further, an exlicit basis for the null sace of these measurement matrices is given in terms of indicator functions of binary self-dual codes Reliable reconstruction of k-sarse inuts is shown for k of order /log() which is best ossible and far beyond the worst case lower bound rovided by the sark I INTRODUCTION The central goal of comressed sensing (CS) is to cature a signal using very few measurements In most work to date, this broader objective is exemlified by the imortant secial case in which the measurement data constitute a vector f = +e where is an N matrix called the sensing matrix, R N is a k-sarse signal, and e R is the additive noise There are two distinct CS frameworks with different objectives Worst-case CS [], []: In the worst-case CS framework, the goal is to recover every k-sarse vector from the corresonding measurement vector f It is known that certain robabilistic rocesses generate sensing matrices that suort worst-case CS [3] However, the random sensing framework suffers from storage and comutation limitations As a result, there has been a significant amount of research on designing alternative deterministic matrices for worst-case CS framework over the last few years [4] ost such constructions rely on the coherence between the columns of the matrix When the coherence follows the Welch Bound µ = O, the Gerschgorin Circle Theorem guarantees reconstruction of any k-sarse signal with k = O( ) Average-case CS [4] [6]: In many ractical alications, including wireless communications and radar, it is not nec- SJ is with the ultimedia Research Grou, Yahoo! Research, sinaj@yahoo-inccom D is with the Deartment of Electrical and Comuter Engineering, University of assachusetts-amherst, mduarte@ecsumassedu RC is with the Deartment of Comuter Science, Duke University, robertcalderbank@dukeedu The work is suorted in art by ONR under grant N and by AFOSR under grant FA essary to reconstruct every sarse vector [7] The goal of average-case CS is to recover most (in contrast to all) k-sarse vectors Here, the sarse vector is often modeled to have a uniformly random suort and random sign for the k nonzero entries The average-case CS framework relies on the coherence and the sectral norm of the deterministic sensing matrix The ideal case is when coherence follows the Welch bound [8], and different measurements are orthogonal Then, as long as k = O (/log N), with high robability a k- sarse vector has a unique sarse reresentation, and can be efficiently recovered from the comressive measurements [6] In this aer, we construct an exlicit basis for the null sace of a large family of deterministic sensing matrices designed for the average-case CS framework (see [5] and the references therein) using the indicator vectors of binary selfdual codes Characterizing the null sace of these matrices makes it ossible to investigate and analyze the geometric roerties of these matrices more recisely ore secifically, we introduce a family of deterministic sensing matrices called the extended Delsarte-Goethals frames (EDGFs) that hold the following three roerties simultaneously: (i) as long as k ale c it is ossible to recover every k-sarse vector from the measurement vector ; (ii) there exists a k-sarse vector with k = c such that no reconstruction algorithm can uniquely recover from ; and (iii) it is ossible to recover most k-sarse vectors from the measurement vector as long as k ale c 3 log N (which can be much larger than c ), where c, c, and c 3 are fixed constants The EDGFs meet the coherence-based lower bound on worst-case reconstruction and the order-otimal uer bound on average-case reconstruction The rest of the aer is organized as follows Section II reviews Delsarte-Goethals frames (DGFs) Section III exlains the roerties of the self-dual codes used in this aer Sections IV and V characterize the null sace of the DGFs and the EDGFs The exeriments are rovided in Section VI Section VII concludes the aer II BACKGROUND AND NOTATION A Worst-case vs Average-case Comressed Sensing A vector is k-sarse if it has at most k non-zero entries The suort of a k-sarse vector indicates the ositions of its non-zero entries Let be an N matrix Then is a tightframe with redundancy if = I N N, where denotes the conjugate transose of The sark of the measurement matrix, denoted as sark( ), is the size of the smallest set
2 of linearly deendent columns of Let ' i denote the i th column of The coherence between the columns of is defined as the maximum inner roduct between two distinct columns of : µ = max i6=j ' i ' j k' i k k' j k In this aer, we simlify the analysis by focusing on the noiseless CS roblem, and note that it is straightforward to generalize the analysis to include noise The following two theorems relate the maximum sarsity level k to the arameters of the sensing matrix, so that it is ossible to efficiently recover all (resectively most) k-sarse vectors from Theorem (Worst-case CS [9]): Let be a an N sensing matrix with worst-case coherence µ Then as long as k = O(µ ), it is ossible to efficiently recover every k-sarse vector from the measurement vector In contrast, when sark( ) k, there exist multile k-sarse vectors that are maed to the same measurement vector, rendering recovery imossible Theorem (Average-case CS [6], [0]): Let be a an N tight-frame with redundancy = n N/ and with µ o worst-case coherence µ If k = O min log N, log N, then with robability /N, it is ossible to efficiently recover a k-sarse vector with uniformly random suort and uniformly random sign from the measurement vector Throughout this aer, m denotes an integer and = m Given a vector v with binary entries, we let v(x) denote the entry of v indexed by x The inner roduct of two binary vectors u, v is denoted by u > v B Delsarte-Goethals Frames The Delsarte-Goethals frames (DGFs) are a class of CS matrices that have been recently introduced by Calderbank, Howard, and Jafarour [5] Secifically, let m be an odd ositive integer, and r to be an integer smaller than m Next, let DG(m, r) denote the Delsarte-Goethals set of binary symmetric matrices, as described in [] Then, given = m and N = r+, the N DGF is constructed from DG(m, r) in the following way Index the rows of by binary vectors x F m and index the columns of by airs (P, b), where P ranges over all (r+)m binary symmetric matrices DG(m, r) and b ranges over all members of F m The entries of are given by ' (P,b) (x) = i x> Px+b >x, where i = It is easy to see from this descrition that (i) DGFs are unions of orthonormal bases and (ii) each DGF can be reresented as = [D R H,, D H, H], () where R = N = r+, H is the Hadamard matrix, and each D i is a diagonal matrix whose (x, x) entry is i x> P ix where P i is a binary symmetric matrix from the Delsarte-Goethals set DG(m, r) A DGF is a tight-frame with redundancy r+ and worst-case coherence µ = r [5] As a result, it follows from Theorems and that as long as k = O( / r ), it is ossible to recover every k- sarse vector from using the `-minimization method; moreover, even if k = O r log N it is still ossible to recover most k-sarse vectors from using the same techniques III BINARY SELF-DUAL CODES We start by defining a binary self-dual code and exlaining some of its roerties Definition 3 (Binary Self-Dual Code): A binary code C is self-dual if C? = u : u > w =08 w C = C, () Let C be a self-dual code of length m, and let b be a binary m-tule vector in the finite field F m Throughout the aer, by b C we mean {b c : c C} Definition 3: Let C be a binary self-dual code of length m The binary vector v of length = m with entries v(x) = if x C and v(x) =0if x/ C is called the indicator of C A direct calculation, catured in the following lemma, shows that the indicator of a self-dual code can be viewed as the binary counterart of the Dirac comb in Fourier analysis Lemma 3: Let C be a binary self-dual linear code of length m, and let v {0, } be the indicator of C Let H be the Hadamard matrix Then Hv = C v Next, we use the vector v to construct h ai sarse vector in the null sace of the matrix 0 = I, H h i Theorem 3: Let 0 = I, H be an matrix generated from concatenating the identity matrix and the normalized Hadamard matrix Let C be a binary linear selfdual code with indicator v Define v =[ v, v] > Then I 0 is a tight frame with redundancy II v is a -sarse vector in the null sace of 0 Therefore sark( 0 ) ale Proof: We rove each art searately: I 0 is a union of two orthonormal bases, therefore = I II Every self-dual code of length m has dimension m, and hence exactly different codewords Therefore, v is -sarse, and by construction, v has exactly non-zero entries oreover, it follows from Lemma 3 that Hv = h i Iv or equivalently I, H [ v, v] > = 0 Corollary 3: Let D be an diagonal matrix, and let = [DH, H] be an matrix generated from concatenating the modulated Hadamard h (DH) matrix and the i Hadamard (H) matrix Define v N = H D v ; v Then v N is in the null sace of
3 Proof: Theorem 3 guarantees that H v I v =0 On the other hand, since the Hadamard matrix has orthogonal binary-valued rows, we have H = H, and therefore H v DH HD v =Hv DH (DH) v =0 Finally, we consider the sarsity degree of v N Since v is -sarse, only of the second entries of vn are nonzero Now we analyze the first entries of v N Let denote the diagonal of D, let =D v, and denote =H Here we focus on a secial but imortant case where there exists an m m binary symmetric matrix P such that (x) =i x> Px for every x F m This is the case for a large class of CS matrices, including the DGFs For every binary m-tule x we have (x) if x C (x) = 0 otherwise, and (x) = ( ) x>y (y) = ( ) x> y yc yf m (y) = yc( ) x>y i y> Py Note that the calculation y > Py+x > y is now over Z 4 and not Z Let (x) denote the comlex conjugate of (x) Observe that (x) is zero if and only if (x) is zero Therefore, it is sufficient to analyze (x) Theorem 3: Let P be an m m binary symmetric matrix, and let E be the null sace of P Define (x) = yc i y> Py+x >y, where x F m Let d P denote the diagonal of P and assume that d P C This assumtion is easily satisfied if we only consider zero-diagonal matrices in the construction of the DGFs Define C 0 = {z C :Pz C} (3) Then (x) 6= 0for at most t values of x, where t = m dim(c 0 ) Proof: We have (x) = i y> Py+y 0> Py 0 +x > (y+y 0 ) y,y 0 C = y,y 0 C i (y+y0 ) > P(y+y 0 )+y > Py 0 +x > (y+y 0) Changing variables to z = y + y 0 and y gives (x) = zc = zc i z> Pz+x > z yc ( ) (z+y)> Py i z> Pz+x > z yc( ) (dp+pz)>y The inner sum is zero if (d P +Pz) / C Otherwise the inner sum is C, and we have (x) = C zc 0 i z> Pz+x >z (4) Now observe that for any z,z C 0, (z + z ) > P(z + z )+x > (z + z ) = z > Pz > +x > z + z > Pz +x > z +z > Pz (5) = z > Pz > +x > z + z > Pz +x > z (mod 4), where the second equality follows from the fact that both Pz and z are codewords of C If this linear ma is the zero ma on x, then (x) = C C 0, and otherwise (x) =0 As a result, (x) vanishes for all but t values of x, where t = m dim(c 0 ) IV THE NULL SPACE OF DELSARTE-GOETHALS FRAES In this section, we construct a basis for the null sace of matrices of the form of Equation () To do this, we first rovide h an orthogonal i basis for the null sace of the matrix 0 = I, H, Let a be a binary m-dimensional vector The time-shift matrix A a is a circulant matrix so that every row x of A a has only one at the corresonding column indexed at x a and zeros elsewhere Similarly, the frequency-shift matrix B a is a diagonal matrix with diagonal entries ( ) xa>, where the m-dimensional binary vector x ranges over all = m rows A direct calculation reveals that HA a = B a H, and HB a = A a H Lemma 4: Let 0 and v be as above, and let a and b be any two binary m-dimensional offsets Then the vector w = [A a B b v; B a A b v] is in the null sace of 0 Proof: We have 0w = A a B b v HB a A b v = A a B b v A a B b Hv (6) = A a B b alei, H [v; v] =0 Lemma 4: Let W = {w : w =[A a B b v; B a A b v],a,b F m } Then W is an orthogonal basis forming the null sace of 0 Proof: Since v is the indicator of a self dual code, it is -sarse oreover, there are exactly offsets a that roduce distinct shifts of v The reason is that since C is linear, if c is any codeword of C, then both A a v and A a c v rovide the same vector whose non-zero entries corresond to indices of the form z a where z ranges over all codewords That is A a v = A a c v Similarly, since C is self-dual, for every air of codewords z and c we have ( ) b>z =( ) (b c)>z This imlies that there are distinct choices b for the frequency shift of the vector v Now we show that these vectors are orthogonal To see this, let (a, b) and (a 0,b 0 ) be two distinct airs of time and frequency shift offsets Let = B a A b v and = BaA 0 0 b v Then, it is sufficient to show that if and are distinct, then > =0 Since v is the indicator vector of a linear self-dual code, then if Su( ) \ Su( ) contains some element y, then
4 the set y C is also in the intersection of the two suorts This set has elements, and since both suorts also have elements, we must have Su( )=Su( ) As a result, if A b v 6= A 0 b v then Su( ) \ Su( )=Ø, and therefore B a A b v and BaA 0 0 bv are orthogonal On the other hand, if A b v = A 0 b v, then and are two distinct Walsh tones restricted to the set b C Now let c be an element in C such that c > (a a 0 )= Then ( ) c> (a a 0 ) = bc bc ( ) x> (a a 0 ) ( ) (x c)> (a a 0 )!! = bc ( ) x> (a a 0) Therefore, we must have P bc ( (a a 0 ) )x> = 0, which roves that and are orthogonal A similar argument can be used to show that if = A a B b v and = A 0 abb 0v, then, if and are distinct, then > =0 As a result, we have distinct linearly indeendent vectors of the form w =[A a B b v; B a A b v] which are all in the null sace of 0 On the other hand, since 0 is, its null sace has dimension, and therefore the null sace vectors above form a basis for the null sace of 0 Next we show that the same argument can be used to form an orthogonal basis for the null sace of matrices of form = [DH, H], where D is a diagonal matrix with h diagonal entries i xpx>i, x F m Theorem 4: Let = [DH, H], where D=[i xpx> ], and where P is a zero-diagonal binary symmetric matrix Let C be a self-dual code such that for any codeword c, Pc is also a codeword in C Let v denote the indicator vector of the codewords of C Let W = w : w = (7) ale HD A a B b v; B a A b v,a,b F m Then W forms an orthonormal basis for the null sace of the matrix ; moreover, every element of W is -sarse Proof: Let w be any vector in W We have w = ale HD [DH, H] A a B b v; B a A b v (8) =[A a B b v HB a A b v]=0 Now we show that any vector w W is -sarse First, note that since v is the indicator of a self-dual code, and the oerators A b and B a do not change the sarsity level, B a A b v is -sarse Hence, we need to show that! = HD A a B b v is also -sarse We have The zero-diagonal assumtion is only for simlifying the calculations, and is easy satisfied by using the Gray ma []!(x) = ( ) b>y i (y a)> P (y a) ( ) (y a)> x yc = i a> Pa ( ) a> x yc i (b+x+pa)> y+y > Py Since C is self-dual and y and Py are both codewords in C, the maing y! (b + x + ap ) > y + y > Py is a linear ma from C to Z 4 Theorem 3 now guarantees that w(x) is non-zero only for choices of x Remark 4: So far we have shown how to generate a basis for the null sace of a matrix of the form [DH, H] This construction can be generalized to matrices of form [D R H,, D H, H] in a straightforward manner by first zeroadding each null sace vector, so that it becomes (R + )dimensional, and then collecting all these R vectors For instance, a basis for the null sace of a 3 matrix [D H, D H, H] has the form 4 0 V 0 V 0 0 V V 3 (9) 5, (0) where [V; 0 V ] is a basis for the null sace of [D H, H], and [V; 0 V ] is a basis for the null sace of [D H, H] V ETENDED DELSARTE-GOETHALS FRAES In this section, we use the results of the revious sections and design an N sensing matrix with N for which there exists constants c, c, and c 3, such that (i) it is ossible to uniquely recover every k-sarse vectors as long as k ale c ; (ii) there exists a k-sarse vector with k = c such that no reconstruction algorithm is able to uniquely recover it from the measurement vector f = ; and (iii) it is ossible to uniquely recover most k-sarse vectors as long as k ale c 3 /log N The extended Delsarte-Goethals frame (EDGF) is constructed by concatenating the identity matrix to a DGF Theorem 5: Let r be a constant integer, and let m>r+ be an integer Then: I The EDGF has = m rows, and N = r+ + columns II The EDGF is a tight frame with redundancy r+ +, and coherence r Proof: The roof of Part I follows from the construction of the EDGF To rove Part II observe that the EDGF is a union of orthonormal bases, and therefore it is a tight-frame with redundancy N The coherence bound follows from the fact that the inner roduct between two distinct columns of a DGF is bounded by a column of a DGF, and a column of the identity matrix is bounded by r, and that the inner roduct between Since the matrix 0 = [I, H] is a submatrix of any EDGF, it follows from Theorem 3 that the sark of any
5 =56, N=5, self dual submatrix dimension (56*80) with rank 76 # <=$"(>6?="#$!>6,857!@A56,A4B/096@0B8C,03C6D$"(E%$F6G0H6/CI6%# 6 09!&+ 08!&* robability of exact recovery / :6/8:3;8/!&)!&(!&"!&'!&% 0!&$ 0 Self dual Uniform sarsity!&# J857!@A5 KC073/B! 6! " #! #" $! $" %! %",-/,0 Fig : Probability of exact recovery of the Basis Pursuit algorithm in recovering sarse vectors using a 56 5 submatrix of the DG(8, 0) frame The matrix has a rank-deficient submatrix with rank 76 Fig : Probability of exact recovery of the Basis Pursuit algorithm in recovering sarse vectors using a submatrix of the extended DG(8, 0) frame The matrix has a 56 3 rank-deficient submatrix with rank 3 EDGF is at most As a result, there can be two distinct -sarse vectors maed to the same low-dimemsional measurement vector On the other hand, Theorem states that it is ossible touniquely recover every k-sarse vector with sarsity k ale c In contrast, it follows from Theorem that if is a k-sarse vector with uniformly random suort and random sign, then as long as k ale c 3 /log N (which can be much larger than c ), is uniquely recoverable from f = with overwhelming robability VI EPERIENTAL RESULTS The exeriments of this section comare the erformance of the Basis Pursuit algorithm [6] in recovering sarse vectors with uniformly random suorts versus recovering sarse vectors suorted on a rank-deficient submatrix obtained using a self-dual code We rovide the comarisons for the DGFs (Fig ), as well as for the EDGFs (Fig ) In Fig we used a 56 5 matrix of the form = [H, D H], where D is a diagonal matrix with d D (x) = i x> Px, and P is the 8 8 zero-diagonal binary symmetric matrix obtained from alying the Gray ma [] to a 7 7 binary DG(7, 0) matrix We also used the self-dual Hamming code C of length 8 in order to find a rank-deficient submatrix of A simle calculation reveals that only 4 codewords are in C 0 (defined by eq (3)) Therefore, dim(c 0 )=, and Theorem 3 redicts that HD v must have 56/4 = 64 non-zero entries A direct calculation reveals that HD v indeed has 64 nonzero entries Therefore, the null sace of [H, D H] has a 80-sarse element That is, there exists, a submatrix of that is rank-deficient As illustrated in Fig, the Basis Pursuit Algorithm fails to recover some k-sarse vectors with sarsity level k > 40 which are suorted on this rankdeficient submatrix However, it is still ossible to recover most k-sarse vectors with uniformly random suort over the 5 columns, even for sarsity level k = 80 Fig shows the result of the same exeriment using an EDGF VII CONCLUSION We have determined a natural basis for the null sace of an extended Delsarte-Goethals frame and shown that this null sace contains a vector that is -sarse We have demonstrated that this family of measurement matrices meets the lower bound of k = O( ) on worst-case CS as well as the order otimal uer bound of k = O(/log(N)) REFERENCES [] E Candès, J Romberg, and T Tao Stable signal recovery from incomlete and inaccurate measurements Communications on Pure and Alied athematics, Vol 59 (8), 07-3, 006 [] D Donoho Comressed Sensing IEEE Transactions on Information Theory, Vol 5 (4), , Aril 006 [3] R Baraniuk, Davenort, R DeVore, and Wakin A simle roof of the restricted isometry roerty for random matrices Constructive Aroximation, Vol 8 (3), 53-63, December 008 [4] W Bajwa, R Calderbank, and S Jafarour odel Selection: Two fundamental measures of coherence and their algorithmic significance Proceedings of IEEE Symosium on Information Theory (ISIT), 00 [5] R Calderbank, S Howard, and S Jafarour Construction of a large class of matrices satisfying a statistical isometry roerty IEEE Journal of Selected Toics in Signal Processing, Secial Issue on Comressive Sensing, Vol 4(), , 00 [6] E Candès and J Plan Near-ideal model selection by ` minimization Annals of Statistics, Vol 37, 45-77, 009 [7] L Alebaum, S Howard, S Searle, and R Calderbank Chir sensing codes: Deterministic comressed sensing measurements for fast recovery Alied and Comutational Harmonic Analysis, Vol 6 (), 83-90, arch 009 [8] W Bajwa, J Haut, G Raz, S Wright, and R Nowak Toelitzstructured comressed sensing matrices Statistical Signal Processing IEEE/SP 4th Worksho on, ages 94 98, August 007 [9] D L Donoho and Elad Otimally sarse reresentation in general (nonorthogonal) dictionaries via ` minimization Proc Nat Acad Sci, 00(5):97 0, 003 [0] J Tro On The Conditioning of Random Subdictionaries Alied and Comutational Harmonic Analysis, Vol 5, 4, 008 [] R Calderbank and S Jafarour Reed-uller sensing matrices and the LASSO International Conference on Sequences and their Alications (SETA), , 00 [] AR Calderbank, PJ Cameron, W Kantor, and JJ Seidel Z 4 Kerdock Codes, orthogonal sreads and extremal euclidean line sets Proceedings of London ath Society, vol 75, , 997
ON OPTIMIZATION OF THE MEASUREMENT MATRIX FOR COMPRESSIVE SENSING
8th Euroean Signal Processing Conference (EUSIPCO-2) Aalborg, Denmark, August 23-27, 2 ON OPTIMIZATION OF THE MEASUREMENT MATRIX FOR COMPRESSIVE SENSING Vahid Abolghasemi, Saideh Ferdowsi, Bahador Makkiabadi,2,
More informationA Note on Guaranteed Sparse Recovery via l 1 -Minimization
A Note on Guaranteed Sarse Recovery via l -Minimization Simon Foucart, Université Pierre et Marie Curie Abstract It is roved that every s-sarse vector x C N can be recovered from the measurement vector
More informationMODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL
Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management
More informationFor q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i
Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:
More informationApproximating min-max k-clustering
Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost
More informationSPARSE NEAR-EQUIANGULAR TIGHT FRAMES WITH APPLICATIONS IN FULL DUPLEX WIRELESS COMMUNICATION
SPARSE NEAR-EQUIANGULAR TIGHT FRAMES WITH APPLICATIONS IN FULL DUPLEX WIRELESS COMMUNICATION A. Thompson Mathematical Institute University of Oxford Oxford, United Kingdom R. Calderbank Department of ECE
More informationDiscrete Signal Reconstruction by Sum of Absolute Values
JOURNAL OF L A TEX CLASS FILES, VOL., NO. 4, DECEMBER 22 Discrete Signal Reconstruction by Sum of Absolute Values Masaaki Nagahara, Senior Member, IEEE, arxiv:53.5299v [cs.it] 8 Mar 25 Abstract In this
More informationA Recursive Block Incomplete Factorization. Preconditioner for Adaptive Filtering Problem
Alied Mathematical Sciences, Vol. 7, 03, no. 63, 3-3 HIKARI Ltd, www.m-hiari.com A Recursive Bloc Incomlete Factorization Preconditioner for Adative Filtering Problem Shazia Javed School of Mathematical
More informationSome Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., DECEMBER 4 336 Some Unitary Sace Time Codes From Shere Packing Theory With Otimal Diversity Product of Code Size Haiquan Wang, Genyuan Wang, and Xiang-Gen
More informationAKRON: An Algorithm for Approximating Sparse Kernel Reconstruction
: An Algorithm for Aroximating Sarse Kernel Reconstruction Gregory Ditzler Det. of Electrical and Comuter Engineering The University of Arizona Tucson, AZ 8572 USA ditzler@email.arizona.edu Nidhal Carla
More informationImproved Capacity Bounds for the Binary Energy Harvesting Channel
Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,
More informationConvex Optimization methods for Computing Channel Capacity
Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem
More informationCompressed Sensing Based Video Multicast
Comressed Sensing Based Video Multicast Markus B. Schenkel a,b, Chong Luo a, Pascal Frossard b and Feng Wu a a Microsoft Research Asia, Beijing, China b Signal Processing Laboratory (LTS4), EPFL, Lausanne,
More informationPARTIAL FACE RECOGNITION: A SPARSE REPRESENTATION-BASED APPROACH. Luoluo Liu, Trac D. Tran, and Sang Peter Chin
PARTIAL FACE RECOGNITION: A SPARSE REPRESENTATION-BASED APPROACH Luoluo Liu, Trac D. Tran, and Sang Peter Chin Det. of Electrical and Comuter Engineering, Johns Hokins Univ., Baltimore, MD 21218, USA {lliu69,trac,schin11}@jhu.edu
More information1-way quantum finite automata: strengths, weaknesses and generalizations
1-way quantum finite automata: strengths, weaknesses and generalizations arxiv:quant-h/9802062v3 30 Se 1998 Andris Ambainis UC Berkeley Abstract Rūsiņš Freivalds University of Latvia We study 1-way quantum
More informationOn the capacity of the general trapdoor channel with feedback
On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:
More informationPositive decomposition of transfer functions with multiple poles
Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.
More informationGOOD MODELS FOR CUBIC SURFACES. 1. Introduction
GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in
More informationc Copyright by Helen J. Elwood December, 2011
c Coyright by Helen J. Elwood December, 2011 CONSTRUCTING COMPLEX EQUIANGULAR PARSEVAL FRAMES A Dissertation Presented to the Faculty of the Deartment of Mathematics University of Houston In Partial Fulfillment
More informationChater Matrix Norms and Singular Value Decomosition Introduction In this lecture, we introduce the notion of a norm for matrices The singular value de
Lectures on Dynamic Systems and Control Mohammed Dahleh Munther A Dahleh George Verghese Deartment of Electrical Engineering and Comuter Science Massachuasetts Institute of Technology c Chater Matrix Norms
More informationUniversal Finite Memory Coding of Binary Sequences
Deartment of Electrical Engineering Systems Universal Finite Memory Coding of Binary Sequences Thesis submitted towards the degree of Master of Science in Electrical and Electronic Engineering in Tel-Aviv
More informationUse of Transformations and the Repeated Statement in PROC GLM in SAS Ed Stanek
Use of Transformations and the Reeated Statement in PROC GLM in SAS Ed Stanek Introduction We describe how the Reeated Statement in PROC GLM in SAS transforms the data to rovide tests of hyotheses of interest.
More informationConvex Analysis and Economic Theory Winter 2018
Division of the Humanities and Social Sciences Ec 181 KC Border Conve Analysis and Economic Theory Winter 2018 Toic 16: Fenchel conjugates 16.1 Conjugate functions Recall from Proosition 14.1.1 that is
More informationIntroduction to Group Theory Note 1
Introduction to Grou Theory Note July 7, 009 Contents INTRODUCTION. Examles OF Symmetry Grous in Physics................................. ELEMENT OF GROUP THEORY. De nition of Grou................................................
More informationElementary Analysis in Q p
Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some
More informationNumerical Linear Algebra
Numerical Linear Algebra Numerous alications in statistics, articularly in the fitting of linear models. Notation and conventions: Elements of a matrix A are denoted by a ij, where i indexes the rows and
More informationCombinatorics of topmost discs of multi-peg Tower of Hanoi problem
Combinatorics of tomost discs of multi-eg Tower of Hanoi roblem Sandi Klavžar Deartment of Mathematics, PEF, Unversity of Maribor Koroška cesta 160, 000 Maribor, Slovenia Uroš Milutinović Deartment of
More informationCombining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)
Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment
More informationVarious Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems
Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various
More informationA Structured Construction of Optimal Measurement Matrix for Noiseless Compressed Sensing via Polarization of Analog Transmission
Li and Kang: A Structured Construction of Optimal Measurement Matrix for Noiseless Compressed Sensing 1 A Structured Construction of Optimal Measurement Matrix for Noiseless Compressed Sensing via Polarization
More informationOnline homotopy algorithm for a generalization of the LASSO
This article has been acceted for ublication in a future issue of this journal, but has not been fully edited. Content may change rior to final ublication. Online homotoy algorithm for a generalization
More informationFinding a sparse vector in a subspace: linear sparsity using alternating directions
IEEE TRANSACTION ON INFORMATION THEORY VOL XX NO XX 06 Finding a sarse vector in a subsace: linear sarsity using alternating directions Qing Qu Student Member IEEE Ju Sun Student Member IEEE and John Wright
More informationAnalyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems
Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Hsiao-Lan Chiang, Tobias Kadur, and Gerhard Fettweis Vodafone Chair for Mobile Communications Technische Universität
More informationOn Code Design for Simultaneous Energy and Information Transfer
On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter
More informationarxiv: v1 [stat.ml] 10 Mar 2016
Global and Local Uncertainty Princiles for Signals on Grahs Nathanael Perraudin, Benjamin Ricaud, David I Shuman, and Pierre Vandergheynst March, 206 arxiv:603.03030v [stat.ml] 0 Mar 206 Abstract Uncertainty
More informationSampling and Distortion Tradeoffs for Bandlimited Periodic Signals
Samling and Distortion radeoffs for Bandlimited Periodic Signals Elaheh ohammadi and Farokh arvasti Advanced Communications Research Institute ACRI Deartment of Electrical Engineering Sharif University
More informationTensor-Based Sparsity Order Estimation for Big Data Applications
Tensor-Based Sarsity Order Estimation for Big Data Alications Kefei Liu, Florian Roemer, João Paulo C. L. da Costa, Jie Xiong, Yi-Sheng Yan, Wen-Qin Wang and Giovanni Del Galdo Indiana University School
More informationAn Analysis of Reliable Classifiers through ROC Isometrics
An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit
More informationSums of independent random variables
3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where
More informationarxiv: v4 [math.nt] 11 Oct 2017
POPULAR DIFFERENCES AND GENERALIZED SIDON SETS WENQIANG XU arxiv:1706.05969v4 [math.nt] 11 Oct 2017 Abstract. For a subset A [N], we define the reresentation function r A A(d := #{(a,a A A : d = a a }
More informationTopic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar
15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider
More informationFrame Coherence and Sparse Signal Processing
Frame Coherence and Sparse Signal Processing Dustin G ixon Waheed U Bajwa Robert Calderbank Program in Applied and Computational athematics Princeton University Princeton ew Jersey 08544 Department of
More informationAN ALGORITHM FOR MATRIX EXTENSION AND WAVELET CONSTRUCTION W. LAWTON, S. L. LEE AND ZUOWEI SHEN Abstract. This paper gives a practical method of exten
AN ALGORITHM FOR MATRIX EXTENSION AND WAVELET ONSTRUTION W. LAWTON, S. L. LEE AND ZUOWEI SHEN Abstract. This aer gives a ractical method of extending an nr matrix P (z), r n, with Laurent olynomial entries
More informationHidden Predictors: A Factor Analysis Primer
Hidden Predictors: A Factor Analysis Primer Ryan C Sanchez Western Washington University Factor Analysis is a owerful statistical method in the modern research sychologist s toolbag When used roerly, factor
More informationNUMERICAL AND THEORETICAL INVESTIGATIONS ON DETONATION- INERT CONFINEMENT INTERACTIONS
NUMERICAL AND THEORETICAL INVESTIGATIONS ON DETONATION- INERT CONFINEMENT INTERACTIONS Tariq D. Aslam and John B. Bdzil Los Alamos National Laboratory Los Alamos, NM 87545 hone: 1-55-667-1367, fax: 1-55-667-6372
More informationNew Coherence and RIP Analysis for Weak. Orthogonal Matching Pursuit
New Coherence and RIP Analysis for Wea 1 Orthogonal Matching Pursuit Mingrui Yang, Member, IEEE, and Fran de Hoog arxiv:1405.3354v1 [cs.it] 14 May 2014 Abstract In this paper we define a new coherence
More informationDistributed K-means over Compressed Binary Data
1 Distributed K-means over Comressed Binary Data Elsa DUPRAZ Telecom Bretagne; UMR CNRS 6285 Lab-STICC, Brest, France arxiv:1701.03403v1 [cs.it] 12 Jan 2017 Abstract We consider a networ of binary-valued
More informationEstimation of the large covariance matrix with two-step monotone missing data
Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo
More informationGeneralized Coiflets: A New Family of Orthonormal Wavelets
Generalized Coiflets A New Family of Orthonormal Wavelets Dong Wei, Alan C Bovik, and Brian L Evans Laboratory for Image and Video Engineering Deartment of Electrical and Comuter Engineering The University
More informationSome Results on the Generalized Gaussian Distribution
Some Results on the Generalized Gaussian Distribution Alex Dytso, Ronit Bustin, H. Vincent Poor, Daniela Tuninetti 3, Natasha Devroye 3, and Shlomo Shamai (Shitz) Abstract The aer considers information-theoretic
More informationSharp gradient estimate and spectral rigidity for p-laplacian
Shar gradient estimate and sectral rigidity for -Lalacian Chiung-Jue Anna Sung and Jiaing Wang To aear in ath. Research Letters. Abstract We derive a shar gradient estimate for ositive eigenfunctions of
More informationUniqueness Conditions for A Class of l 0 -Minimization Problems
Uniqueness Conditions for A Class of l 0 -Minimization Problems Chunlei Xu and Yun-Bin Zhao October, 03, Revised January 04 Abstract. We consider a class of l 0 -minimization problems, which is to search
More informationCryptanalysis of Pseudorandom Generators
CSE 206A: Lattice Algorithms and Alications Fall 2017 Crytanalysis of Pseudorandom Generators Instructor: Daniele Micciancio UCSD CSE As a motivating alication for the study of lattice in crytograhy we
More informationUniformly best wavenumber approximations by spatial central difference operators: An initial investigation
Uniformly best wavenumber aroximations by satial central difference oerators: An initial investigation Vitor Linders and Jan Nordström Abstract A characterisation theorem for best uniform wavenumber aroximations
More informationDecoding Linear Block Codes Using a Priority-First Search: Performance Analysis and Suboptimal Version
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 3, MAY 1998 133 Decoding Linear Block Codes Using a Priority-First Search Performance Analysis Subotimal Version Yunghsiang S. Han, Member, IEEE, Carlos
More information2 Asymptotic density and Dirichlet density
8.785: Analytic Number Theory, MIT, sring 2007 (K.S. Kedlaya) Primes in arithmetic rogressions In this unit, we first rove Dirichlet s theorem on rimes in arithmetic rogressions. We then rove the rime
More informationIt is well-known that a complex m m matrix A is a commutator
A quantitative version of the commutator theorem for zero trace matrices William B. Johnson a, Narutaka Ozawa b, and Gideon Schechtman c, a Deartment of Mathematics, Texas A&M University, College Station,
More informationUncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning
TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment
More informationA New Perspective on Learning Linear Separators with Large L q L p Margins
A New Persective on Learning Linear Searators with Large L q L Margins Maria-Florina Balcan Georgia Institute of Technology Christoher Berlind Georgia Institute of Technology Abstract We give theoretical
More information2 Asymptotic density and Dirichlet density
8.785: Analytic Number Theory, MIT, sring 2007 (K.S. Kedlaya) Primes in arithmetic rogressions In this unit, we first rove Dirichlet s theorem on rimes in arithmetic rogressions. We then rove the rime
More informationp-adic Measures and Bernoulli Numbers
-Adic Measures and Bernoulli Numbers Adam Bowers Introduction The constants B k in the Taylor series exansion t e t = t k B k k! k=0 are known as the Bernoulli numbers. The first few are,, 6, 0, 30, 0,
More informationarxiv: v5 [math.nt] 22 Aug 2013
Prerint, arxiv:1308900 ON SOME DETERMINANTS WITH LEGENDRE SYMBOL ENTRIES arxiv:1308900v5 [mathnt] Aug 013 Zhi-Wei Sun Deartment of Mathematics, Nanjing University Nanjing 10093, Peole s Reublic of China
More informationwhere x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H:
Mehryar Mohri Foundations of Machine Learning Courant Institute of Mathematical Sciences Homework assignment 2 October 25, 2017 Due: November 08, 2017 A. Growth function Growth function of stum functions.
More informationSparse near-equiangular tight frames with applications in full duplex wireless communication
Sparse near-equiangular tight frames with applications in full duplex wireless communication Andrew Thompson (University of Oxford) with Robert Calderbank (Duke University) Global Conference on Signal
More informationHomework Set #3 Rates definitions, Channel Coding, Source-Channel coding
Homework Set # Rates definitions, Channel Coding, Source-Channel coding. Rates (a) Channels coding Rate: Assuming you are sending 4 different messages using usages of a channel. What is the rate (in bits
More informationDISCRIMINANTS IN TOWERS
DISCRIMINANTS IN TOWERS JOSEPH RABINOFF Let A be a Dedekind domain with fraction field F, let K/F be a finite searable extension field, and let B be the integral closure of A in K. In this note, we will
More informationChapter 1: PROBABILITY BASICS
Charles Boncelet, obability, Statistics, and Random Signals," Oxford University ess, 0. ISBN: 978-0-9-0005-0 Chater : PROBABILITY BASICS Sections. What Is obability?. Exeriments, Outcomes, and Events.
More informationarxiv: v2 [cs.it] 10 Aug 2009
Sarse recovery by non-convex otimization instance otimality Rayan Saab arxiv:89.745v2 [cs.it] 1 Aug 29 Deartment of Electrical and Comuter Engineering, University of British Columbia, Vancouver, B.C. Canada
More informationThe Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule
The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca
More informationApproximation of the Euclidean Distance by Chamfer Distances
Acta Cybernetica 0 (0 399 47. Aroximation of the Euclidean Distance by Chamfer Distances András Hajdu, Lajos Hajdu, and Robert Tijdeman Abstract Chamfer distances lay an imortant role in the theory of
More informationUniform Law on the Unit Sphere of a Banach Space
Uniform Law on the Unit Shere of a Banach Sace by Bernard Beauzamy Société de Calcul Mathématique SA Faubourg Saint Honoré 75008 Paris France Setember 008 Abstract We investigate the construction of a
More informationAlmost All Palindromes Are Composite
Almost All Palindromes Are Comosite William D Banks Det of Mathematics, University of Missouri Columbia, MO 65211, USA bbanks@mathmissouriedu Derrick N Hart Det of Mathematics, University of Missouri Columbia,
More informationThe analysis and representation of random signals
The analysis and reresentation of random signals Bruno TOÉSNI Bruno.Torresani@cmi.univ-mrs.fr B. Torrésani LTP Université de Provence.1/30 Outline 1. andom signals Introduction The Karhunen-Loève Basis
More informationDistributed Rule-Based Inference in the Presence of Redundant Information
istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced
More informationFast Reconstruction Algorithms for Deterministic Sensing Matrices and Applications
Fast Reconstruction Algorithms for Deterministic Sensing Matrices and Applications Program in Applied and Computational Mathematics Princeton University NJ 08544, USA. Introduction What is Compressive
More informationAdditive results for the generalized Drazin inverse in a Banach algebra
Additive results for the generalized Drazin inverse in a Banach algebra Dragana S. Cvetković-Ilić Dragan S. Djordjević and Yimin Wei* Abstract In this aer we investigate additive roerties of the generalized
More informationState Estimation with ARMarkov Models
Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,
More informationSystem Reliability Estimation and Confidence Regions from Subsystem and Full System Tests
009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract
More informationPOINTS ON CONICS MODULO p
POINTS ON CONICS MODULO TEAM 2: JONGMIN BAEK, ANAND DEOPURKAR, AND KATHERINE REDFIELD Abstract. We comute the number of integer oints on conics modulo, where is an odd rime. We extend our results to conics
More informationTopic 7: Using identity types
Toic 7: Using identity tyes June 10, 2014 Now we would like to learn how to use identity tyes and how to do some actual mathematics with them. By now we have essentially introduced all inference rules
More informationMATH 6210: SOLUTIONS TO PROBLEM SET #3
MATH 6210: SOLUTIONS TO PROBLEM SET #3 Rudin, Chater 4, Problem #3. The sace L (T) is searable since the trigonometric olynomials with comlex coefficients whose real and imaginary arts are rational form
More informationIEEE SIGNAL PROCESSING LETTERS, VOL. 22, NO. 9, SEPTEMBER
IEEE SIGNAL PROCESSING LETTERS, VOL. 22, NO. 9, SEPTEMBER 2015 1239 Preconditioning for Underdetermined Linear Systems with Sparse Solutions Evaggelia Tsiligianni, StudentMember,IEEE, Lisimachos P. Kondi,
More informationNew Wavelet Coefficient Raster Scannings for Deterministic Compressive Imaging
New Wavelet Coefficient Raster Scannings for Deterministic Compressive Imaging Marco F. Duarte Joint work with Sina Jafarpour and Robert Calderbank Compressive Imaging Architectures Φ f linear measurements
More informationL p -CONVERGENCE OF THE LAPLACE BELTRAMI EIGENFUNCTION EXPANSIONS
L -CONVERGENCE OF THE LAPLACE BELTRAI EIGENFUNCTION EXPANSIONS ATSUSHI KANAZAWA Abstract. We rovide a simle sufficient condition for the L - convergence of the Lalace Beltrami eigenfunction exansions of
More informationRadial Basis Function Networks: Algorithms
Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.
More informationUnsupervised Hyperspectral Image Analysis Using Independent Component Analysis (ICA)
Unsuervised Hyersectral Image Analysis Using Indeendent Comonent Analysis (ICA) Shao-Shan Chiang Chein-I Chang Irving W. Ginsberg Remote Sensing Signal and Image Processing Laboratory Deartment of Comuter
More informationSTABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS. A Dissertation JAMES ROBERT FISHER
STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS A Dissertation by JAMES ROBERT FISHER Submitted to the Office of Graduate Studies of Texas A&M University in artial fulfillment
More informationRobustness of classifiers to uniform l p and Gaussian noise Supplementary material
Robustness of classifiers to uniform l and Gaussian noise Sulementary material Jean-Yves Franceschi Ecole Normale Suérieure de Lyon LIP UMR 5668 Omar Fawzi Ecole Normale Suérieure de Lyon LIP UMR 5668
More informationKEY ISSUES IN THE ANALYSIS OF PILES IN LIQUEFYING SOILS
4 th International Conference on Earthquake Geotechnical Engineering June 2-28, 27 KEY ISSUES IN THE ANALYSIS OF PILES IN LIQUEFYING SOILS Misko CUBRINOVSKI 1, Hayden BOWEN 1 ABSTRACT Two methods for analysis
More informationOn a Markov Game with Incomplete Information
On a Markov Game with Incomlete Information Johannes Hörner, Dinah Rosenberg y, Eilon Solan z and Nicolas Vieille x{ January 24, 26 Abstract We consider an examle of a Markov game with lack of information
More informationImproved Bounds on Bell Numbers and on Moments of Sums of Random Variables
Imroved Bounds on Bell Numbers and on Moments of Sums of Random Variables Daniel Berend Tamir Tassa Abstract We rovide bounds for moments of sums of sequences of indeendent random variables. Concentrating
More informationCorrespondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R.
1 Corresondence Between Fractal-Wavelet Transforms and Iterated Function Systems With Grey Level Mas F. Mendivil and E.R. Vrscay Deartment of Alied Mathematics Faculty of Mathematics University of Waterloo
More informationMATH 2710: NOTES FOR ANALYSIS
MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite
More informationLinear diophantine equations for discrete tomography
Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,
More informationOn split sample and randomized confidence intervals for binomial proportions
On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have
More informationq-ary Symmetric Channel for Large q
List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu
More informationSolvability and Number of Roots of Bi-Quadratic Equations over p adic Fields
Malaysian Journal of Mathematical Sciences 10(S February: 15-35 (016 Secial Issue: The 3 rd International Conference on Mathematical Alications in Engineering 014 (ICMAE 14 MALAYSIAN JOURNAL OF MATHEMATICAL
More informationImprovement on the Decay of Crossing Numbers
Grahs and Combinatorics 2013) 29:365 371 DOI 10.1007/s00373-012-1137-3 ORIGINAL PAPER Imrovement on the Decay of Crossing Numbers Jakub Černý Jan Kynčl Géza Tóth Received: 24 Aril 2007 / Revised: 1 November
More informationTRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES
Khayyam J. Math. DOI:10.22034/kjm.2019.84207 TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES ISMAEL GARCÍA-BAYONA Communicated by A.M. Peralta Abstract. In this aer, we define two new Schur and
More informationResearch of power plant parameter based on the Principal Component Analysis method
Research of ower lant arameter based on the Princial Comonent Analysis method Yang Yang *a, Di Zhang b a b School of Engineering, Bohai University, Liaoning Jinzhou, 3; Liaoning Datang international Jinzhou
More information