Notes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle

Size: px
Start display at page:

Download "Notes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle"

Transcription

1 McMaster University Advanced Otimization Laboratory Title: Notes on duality in second order and -order cone otimization Author: Erling D. Andersen, Cornelis Roos and Tamás Terlaky AdvOl-Reort No. 000/8 May 000, Hamilton, Ontario, Canada

2 Notes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-called second order cone otimization roblem has received much attention, because the roblem has many alications and the roblem can at least in theory be solved efficiently by interior-oint methods. In this note we treat duality for second order cone otimization roblems and in articular whether a nonzero duality ga can be introduced when casting a convex quadratically constrained otimization roblem as a second order cone otimization roblem. Furthermore, we also discuss the -order cone otimization roblem which isanatural generalization of the second order case. Secifically, we suggest a new self-concordant barrier for the -order cone otimization roblem. Introdution The second order cone otimization roblem can be stated as (SOC) minimize f T x jja i x b i jj» c i: x d i ; i =;:::;k; Hx = h: where A i R (mi ) n and H R l n and all the other quantities have conforming dimensions. c i: denotes the ith row of C R k n. k k denotes the Euclidean norm. Clearly, the roblem (SOC) is a convex but non-smooth roblem because the norm is not differentiable at zero. We will not survey the numerous alications for this otimization model here, but rather refer the reader to [4]. However, it can be observed that linear, convex quadratic, and convex quadratically constrained otimization roblems all can be stated as second order cone otimization roblems. For examle if m i = for all i's, then (SOC) reduces to an ordinary linear otimization roblem. The outline of the aer is as follows. We first discuss duality for second-order cone otimization roblems and resent two examles which demonstrate that nonzero duality ga can occur. Next we show that if a convex quadratically constrained otimization roblem is formulated as a second order cone otimization roblem then a ositive duality ga cannot occur. Finally, we discuss the -order generalization of the second order cone case. Λ TU Delft, Mekelweg 4, 68 CD Delft, The Netherlands, e.d.andersen@mosek.com. y TU Delft, Mekelweg 4, 68 CD Delft, The Netherlands, c.roos@its.tudelft.nl. z McMaster University, Deartment of Comuting and Software, Hamilton, Ontario, Canada. L8S 4L7. terlaky@cas.mcmaster.ca. art of this research was done while the author was emloyed at TU Delft.

3 Duality The dual roblem corresonding to (SOC) is (SOCD) maximize b T z + d T w + h T v A T z + C T w + H T v = f; jjz i jj» w i ; i =;:::;k; where z i R m i and w R k and we use the notation that A := 6 4 A. A k The following duality theorem is well-known. and z := Theorem. Let ν SOC denote the otimal objective value of (SOC) where minimize is relaced by inf. Similarly, let ν SOCD denote the otimal objective value of (SOCD) where maximize is relaced by su. Then the following holds:. Weak duality: If both (SOC) and (SOCD) are feasible, then ν SOC ν SOCD.. Strong duality: If either (SOC) or (SOCD) is Slater regular, then ν SOC = ν SOCD. Moreover, If both the rimal and dual roblem are Slater regular, then both roblems have an otimal solution and ν SOC = ν SOCD. (We use the convention ν SOC = if (SOC) is infeasible. Similarly, ν SOCD = if (SOCD) is infeasible.) roof: [] Subsequently, we will resent some examles that demonstrates that strong duality in general requires the Slater regularity condition, because otherwise there might be a ositive duality ga between the rimal and dual roblem.. Infinite duality ga The first examle is 6 4 z. z k : minimize x q x + x x» 0; which has f(x ;x ): x 0; x =0g as the set of feasible solutions. From here it is obvious that the otimal objective value ν SOC is zero and the roblem is not Slater regular. The dual roblem corresonding to () is maximize 0 z + w = 0; q z = ; z + z» w : () () The constraints of () can be reduced to q w +» w which imlies () is infeasible thus ν SOCD =. Hence, in this case the duality ga is infinity.

4 . Finite but nonzero duality ga Next consider the examle minimize x q x +(x )» x ; q ( x + x )» x : (3) The first constraint clearly imlies that x follows from the second constraint that = in any feasible solution. Given that fact it» x : Hence, the feasible set consists of f(x ;x ): x ; x =g and the otimal objective value is. The dual roblem corresonding to (3) is maximize z z + w z 3 + w = 0; q z + z 3 = ; z + z» w ; z3» w : (4) Since, it follows from the two last constraints that then Using the first constraint this imlies Now using the second constraint we have that Therefore, (4) is equivalent to w jz j and w jz 3 j; w + z 0andw z 3 0: w = z and w = z 3 : z = z 3 = w : maximize q w w +( w )» w ; (5) qw» w which has the feasible set f(w ;w ): w 0; w =g and the otimal objective value is zero. Hence, we have constructed an examle where both the rimal roblem () and dual roblem (4) has an otimal solution, but nevertheless the duality ga is nonzero. The reader can verify that if (x ) is relaced by (x ff) in the roblem definition (3), then for any ff>0therewill be a ositive duality ga of size ff. 3

5 .3 Non-attainment The examle minimize x " x x #» x (6) shows that the otimal objectivevalue is not always attained. The reason is that the constraint imlies +x» x x : (7) This shows that the otimal objective value is zero but cannot be attained..4 From quadratically constrained otimization to second order cone otimization According to [4] then one of the advantages of second order cone otimization is that convex quadratically constrained otimization can be cast as a second order cone otimization. However, an issue not addressed in [4] is whether recasting a quadratically constrained otimization roblem as a second order cone otimization roblem can introduce ositive duality ga. As demonstrated in the revious section a ositive dualtity ga might occur. This would be very bad because it has already been demonstrated in [8, 9, 0] that there exist a dual roblem corresonding to any convex quadratically constrained otimization roblem which has zero duality ga. We will therefore address the issue whether a convex quadratically constrained otimization roblem recast as a second order cone otimization roblem has worse duality roerties than the originally roblem. Any convex quadratically constrained otimization roblem can be stated on the form minimize c T x jj(qi ) T xjj a i: x + b i» 0; i =;:::;m; where Q i R n l i and A Rm n. The remaining quantities are assumed to have conforming dimensions. The ordinary Lagrange dual corresonding to (8) is identical to maximize b T y m y ijj(q i ) T xjj c + m y i Q i (Q i ) T x A T y = 0; (9) y 0: (8) Now using the definition we obtain the alternative dual roblem maximize z i := y i (Q i ) T x b T y m jjz i jj y i c + m Q i z i A T y = 0; y 0; (0) which aears in [0]. The reader can easily verify that (9) and (0) are equivalent. Observe that the dual roblem does not contain any rimal variables and has linear constraints only. 4

6 Using the duality theory develoed for ` rogramming resented in [8, 9, 0] we obtain the roosition: roosition. Given that both (8) and (0) has a feasible solution, then the duality ga between those roblems are zero and (8) attains its otimum value. Moreover, the duality ga between (8) and (9) is zero as well. roof: Given (8) and (0) both has a feasible solution then it follows from [0] that the duality gabetween (8) and (0) is zero and (8) attains its otimum value. Hence, we have that (0) has a feasible solution (^y; ^z i )having bounded objective value i.e. Obviously if the system b T ^y mx mx jj^z i jj > : () ^y i ^y i Q i (Q i ) T x = mx Q i^z i () has a solution, then (9) also has a solution. Assume the contrary is the case i.e. () does not have solution. This imlies there exists a u such that u T m X ^y i Q i (Q i ) T =0 (3) and u T m X Q i^z i 6=0: (4) Now multily both sides of (3) from the left by u and is obtained. Therefore, u T m X ^y i Q i (Q i ) T u = (Q ^y i i ) T u mx (Q ^y i i ) T u =0; 8i =0 holds and hence (Q i ) T u =0if ^y i > 0. On the other hand if ^y i =0,then () imlies ^z i =0. The combination of these two facts imlies u T Q i^z i =0; 8i which is a contradiction to (4). Therefore, we conclude if (0) is feasible, then (9) is feasible. Now let ^x be any solution to (), then 0» m = m = m = m k^y i (Q i ) T ^x ^z i k ^y i k^y i (Q i ) T ^xk +k^z i k ^y i (^z i ) T (Q i ) T ^x ψ i k^z k ^y i ψ k^z i k ^y i ^y i (Qi! +^y i ) T ^x (Qi! ^y i ) T ^x m (^y i Q i (Q i ) T ^x) T ^x (5) 5

7 and it follows mx (Q ^y i i ) T ^x» mx k^z i k ^y i : (6) Clearly, (^x; ^y) is a feasible solution to (9) and (6) shows that this solution has the same or a better objective value than the feasible solution (^y; ^z) to the roblem (0). In summary we have roved for any feasible solution to (0) with a bounded objective value, then there exists a feasible solution to (9) having the same or a better objective value. This imlies that the duality ga between (8) and (9) is zero. It has been roved in [3] that roblem (8) and roblem (0) satisfies the self-concordant condition and thus both roblems can be solved efficiently. Alternatively roblem (8) can be recast as a second order cone otimization roblem and solved as such. One way to erform the reformulation of (8) is as follows. First introduce two additional variables t and u to obtain minimize c T x jj(q i ) T xjj» u i t i ; i =;:::;m; u t = Ax b; u + t = e: (7) e is the vector of all ones. Note that this formulation imlicitly contains the constraints u t =(u i + t i )(u i t i ) 0 and u i + t i 0 which imlies that u i 0 in all feasible solutions. roblem (7) is equivalent to minimize c T x (Qi ) T x t i» u i ; i =;:::;m; u = e + (Ax b) ; t = e (Ax b) which after elimination of the variables u and t leads to the second order cone otimization roblem minimize c T x (Q i ) T x (a i:x b i )» + (a i:x b i ) (9) ; i =;:::;m: The dual roblem corresonding to (9) is (8) maximize (b +e)t μz + (b e)t w k (Q i )z i AT w A T μz = c; zi» w i ; ;:::;m: μz i (0) Now our question can be stated as if there is a ositive duality ga between the rimal roblem (9) and the dual roblem (0)? The answer is given in the subsequent roosition. roosition. Given both (8) and (9) have a feasible solution, then both roblem (9) and roblem (0) has a feasible solution. Moreover, the duality ga is zero. 6

8 roof: It should be obvious that any feasible solution to (8) essentially defines a feasible solution to (9) as well having the same objective value for both roblems. Moreover, given the assumtions then (9) has a feasible solution (^x; ^y). Next let z i = ^y i (Q i ) T ^x; i =;:::;m; w = ^y i ψ k(q i ) T ^xk μz = w ^y: 4 +! ; i =;:::;m; which we claim is a feasible solution of (0). Clearly w 0 and if these values are substituted into (0) and the resulting roblem is simlified, then we obtain the roblem minimize b T ^y m ^y i (Q i ) T ^x c + m ^y i (Q i )(Q i ) T x A T ^y = 0; ^y 0: Obviously, (9) and () are identical. Hence, we have demonstrated that any feasible solution to (9) can easily be converted to a feasible solution to (). Moreover, this leaves the objective value of the solution unchanged. In conclusion given the duality ga between (8) and (9) is zero, then the duality ga between the roblems (9) and (0) is zero as well. Hence, nothing is lost (duality wise) by reformulating a quadratically constrained otimization roblem as a second order cone otimization roblem. Finally, observe that the dual roblem (0) is equivalent to the following second order cone otimization roblem maximize b T y m t i c + m Q i z i A T y = 0; jjz i jj» y i t i ; y 0 involving the so-called rotated quadratic cone. One obvious question is which of the many formulations of the convex quadratically constrained otimization can be solved most efficiently. The answer is that an f-otimal solution can be obtained in O( m ) Newton stes for the roblems (8), (9), and (0) using an f interior-oint algorithm. This is roved in [5], [7], and [3] Therefore, from a comlexity oint of view all three formulations of the quadratically constrained otimization roblem is equally difficult to solve. However, only the second order cone otimization formulation has the secial roerty that the roblem is self-dual (see next section) and the cone is homogeneous [7]. This imlies that efficient rimal-dual algorithms exist for this class of roblems and not for the other formulations [7]. Hence, casting a convex quadratically otimization roblem as second order cone otimization roblem and solving it using a rimal-dual algorithm might be the most efficient way. However, this still has to be verified in ractice. () () 7

9 3 -order cone otimization A generalization of the second order otimization model is the -order cone otimization roblem which can be exressed as follows where A R m n. Moreover, let x i R n i In this case we use the definition Given i > and (OC) minimize c T x Ax = b; x i K i ; i =;:::;k; K i := then the dual cone corresonding to K i is K Λ i := and x := 6 4 x x. x k : 8 0 >< X >: xi R n i : n i i + q i = j= 8 0 >< X >: si R n i : n i j= jx i jj i js i jj q i 9 i > = A 9 q i > = A >; : >; : (3) The second order case is when = and in that case the rimal and dual cone is identical i.e. self-dual. The dual roblem corresonding to (OC)is (DOC) maximize b T y A T y + s = c; s i K Λ i ; i =;:::;k; where s i and s is constructed as x i and x. This has been shown in []. Solution of the -order cone roblem has already been studied by Xue and Ye []. Indeed they develo several olynomial time algorithm using different self-concordant barriers for the cone. Subsequently, we resent a new self-concordant barrier for the -order cone which has a better barrier arameter than the one suggested by Xue and Ye []. Moreover, we will demonstrate that both (OC) and (DOC) can be reformulated as ordinary smooth convex rograms. This has the advantage that the roblems can be solved using existing otimization software. Although it might not be as efficient as using secial urose algorithms. By definition the constraint (r;x) K where K has the form (3) is equivalent to kxk» r (4) 8

10 where we assume that x R l and r R. Although this constraint exresses a convex set then it is nonsmooth, because the norm is not differentiable at zero. However, it is easy to verify that constraint (4) can be relaced by the constraints which in turn is equivalent to the constraints 0» r; kxk r» 0; (5) 0» r; kxk r» 0: (6) r Note in articular for the second order case i.e. =,thenthe function kxk is a smooth convex function on its domain f(r;x):r>0g. Moreover, it can be roven that r ln(r r kxk ) ln(r) =ln(r kxk ) is a -self-concordant barrier for the constraint (6). This imlies in the second order case, that the cone constraints can be relaced by ordinary" convex constraints and the resulting rogram can be solved in olynomial time using a standard interior-oint algorithm. On the other hand if is odd and larger than, then the constraint (6) is not a smooth convex constraint. However, the constraints (6) be relaced by which is identical to l t i» r; jx i j r» t i ; i =;:::;l; r;t i 0; i =;:::;l; l t i» r; jx i j» t i r ; i =;:::;l; r;t i 0; i =;:::;l: Using the usual trick by introducing some additional constraints, then we can get rid of the absolute sign as follows l r i» t; x i t i r» 0; i =;:::;l; x i t i r» 0; i =;:::;l; r;t i 0; i =;:::;l: Clearly, l new constraints and variables has been introduced into the roblem. Moreover, we have the following roosition (7) roosition 3. The set 8 >< (x i ;r i ;t): >: x i t i r» 0; x i t i r» 0; t i ;r >= >;

11 is a convex set and the function ln(t i r x i ) ln(t i r + x i ) ln(t) ln(r i ) is a 4-self-concordant barrier for this set. roof: See Lemma 6 in [3]. We are now ready to state the main theorem Theorem 3. The function ln(r lx t i ) lx ( ln(t i r x i ) ln(t i r + x i ) ln(t) ln(r i )) is a (+4l)-self-concordant barrier for the set given by (7). roof: It follows directly from roosition 3. and the barrier calculus outlined in [6,. 9]. The best barrier resented in Xue and Ye [] for the -order cone where is arbirary large has the arameter 00l. Xue and Ye also resents another barrier, but it deends on. Hence, the new barrier function is better. Although indeendent of the barrier then a short-ste interior-oint algorithm will solve the roblem in O( n ln(=f)) Newton stes. 4 Conclusion In this aer we have shown that when a convex quadratically constrained otimization roblem is cast as a second order cone otimization roblem using the method outlined in Section.4 then the resulting rimal and dual second order cone otimization roblem has zero duality ga. Finally,we discuss the -order cone otimization roblem and suggest a new self-concordant barrier function for the roblem which has a better arameter than the one suggested in []. References [] I. Adler and F. Alizadeh. rimal-dual interior oint algorithms for convex quadratically constrained and semidefinite otimization roblems. Technical Reort RRR--95, RUTCOR, Rutgers Center for Oerations Research,.O. Box 506, New Brunswick, New Jersey, 995. [] A. Ben-Tal and A Nemirovski. Convex otimization in engineering: Modeling, analysis, algorithms [3] D. den Hertog, F. Jarre, C. Roos, and T. Terlaky. A sufficient conditions for selfconcordance, with alication to some classes of structured convex rogramming roblems. Math. rogramming, 69():75 88,

12 [4] M.S. Lobo, L. Vandenberghe, S. Boyd, and H. Lebret. Second-order cone rogramming. Technical reort, ISL, Electrical Engineering Deartment, Stanford University, Stanford, CA, 997. Submitted to Linear Algebra and Alications. [5] Y. Nesterov and A. Nemirovskii. Interior-oint olynomial Algorithms in Convex rogramming. SIAM, hiladelhia, A, edition, 994. [6] Yu. Nesterov. Interior-oint methods: An old and new aroach to nonlinear rogramming. Math. rogramming, 79:85 97, 998. [7] Yu. Nesterov and J.-h. Vial. Homogeneous analytic center cutting lane methods for convex roblems and variational inequalities. Technical Reort 997.4, Logilab, HEC Geneva, Section of Management Studies, University of Geneva, jul 997. [8] E. L. eterson and J. G. Ecker. Geometric rogramming: Duality in quadratic rogramming and ` aroximation ii. J. on Al. Math., 3:37 340, 967. [9] E. L. eterson and J. G. Ecker. Geometric rogramming: Duality in quadratic rogramming and ` aroximation iii. J. Math. Anal. Al., 9: , 970. [0] T. Terlaky. On ` rogramming. Euroean J. Oer. Res., :70 00, 985. [] G. Xue and Y. Ye. An Efficient Algorithm for Minimizing a Sum of -Norms. Technical reort, Deartment of Comuter Science and Electrical Engineering, The University of Vermont, Setember 997. [] G. Xue and Y. Ye. An efficient algorithm for minimizing a sum of euclidean norms with allications. SIAM J. on Otim., 7(4):07 036, 997.

Some results of convex programming complexity

Some results of convex programming complexity 2012c12 $ Ê Æ Æ 116ò 14Ï Dec., 2012 Oerations Research Transactions Vol.16 No.4 Some results of convex rogramming comlexity LOU Ye 1,2 GAO Yuetian 1 Abstract Recently a number of aers were written that

More information

On the Chvatál-Complexity of Knapsack Problems

On the Chvatál-Complexity of Knapsack Problems R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew

More information

The Algebraic Structure of the p-order Cone

The Algebraic Structure of the p-order Cone The Algebraic Structure of the -Order Cone Baha Alzalg Abstract We study and analyze the algebraic structure of the -order cones We show that, unlike oularly erceived, the -order cone is self-dual for

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

Efficient algorithms for the smallest enclosing ball problem

Efficient algorithms for the smallest enclosing ball problem Efficient algorithms for the smallest enclosing ball roblem Guanglu Zhou, Kim-Chuan Toh, Jie Sun November 27, 2002; Revised August 4, 2003 Abstract. Consider the roblem of comuting the smallest enclosing

More information

A numerical implementation of a predictor-corrector algorithm for sufcient linear complementarity problem

A numerical implementation of a predictor-corrector algorithm for sufcient linear complementarity problem A numerical imlementation of a redictor-corrector algorithm for sufcient linear comlementarity roblem BENTERKI DJAMEL University Ferhat Abbas of Setif-1 Faculty of science Laboratory of fundamental and

More information

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS #A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS #A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS Ramy F. Taki ElDin Physics and Engineering Mathematics Deartment, Faculty of Engineering, Ain Shams University, Cairo, Egyt

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

E-companion to A risk- and ambiguity-averse extension of the max-min newsvendor order formula

E-companion to A risk- and ambiguity-averse extension of the max-min newsvendor order formula e-comanion to Han Du and Zuluaga: Etension of Scarf s ma-min order formula ec E-comanion to A risk- and ambiguity-averse etension of the ma-min newsvendor order formula Qiaoming Han School of Mathematics

More information

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

Location of solutions for quasi-linear elliptic equations with general gradient dependence

Location of solutions for quasi-linear elliptic equations with general gradient dependence Electronic Journal of Qualitative Theory of Differential Equations 217, No. 87, 1 1; htts://doi.org/1.14232/ejqtde.217.1.87 www.math.u-szeged.hu/ejqtde/ Location of solutions for quasi-linear ellitic equations

More information

MATH 361: NUMBER THEORY EIGHTH LECTURE

MATH 361: NUMBER THEORY EIGHTH LECTURE MATH 361: NUMBER THEORY EIGHTH LECTURE 1. Quadratic Recirocity: Introduction Quadratic recirocity is the first result of modern number theory. Lagrange conjectured it in the late 1700 s, but it was first

More information

On the minimax inequality and its application to existence of three solutions for elliptic equations with Dirichlet boundary condition

On the minimax inequality and its application to existence of three solutions for elliptic equations with Dirichlet boundary condition ISSN 1 746-7233 England UK World Journal of Modelling and Simulation Vol. 3 (2007) No. 2. 83-89 On the minimax inequality and its alication to existence of three solutions for ellitic equations with Dirichlet

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various

More information

On a class of Rellich inequalities

On a class of Rellich inequalities On a class of Rellich inequalities G. Barbatis A. Tertikas Dedicated to Professor E.B. Davies on the occasion of his 60th birthday Abstract We rove Rellich and imroved Rellich inequalities that involve

More information

On the irreducibility of a polynomial associated with the Strong Factorial Conjecture

On the irreducibility of a polynomial associated with the Strong Factorial Conjecture On the irreducibility of a olynomial associated with the Strong Factorial Conecture Michael Filaseta Mathematics Deartment University of South Carolina Columbia, SC 29208 USA E-mail: filaseta@math.sc.edu

More information

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces Abstract and Alied Analysis Volume 2012, Article ID 264103, 11 ages doi:10.1155/2012/264103 Research Article An iterative Algorithm for Hemicontractive Maings in Banach Saces Youli Yu, 1 Zhitao Wu, 2 and

More information

SOME TRACE INEQUALITIES FOR OPERATORS IN HILBERT SPACES

SOME TRACE INEQUALITIES FOR OPERATORS IN HILBERT SPACES Kragujevac Journal of Mathematics Volume 411) 017), Pages 33 55. SOME TRACE INEQUALITIES FOR OPERATORS IN HILBERT SPACES SILVESTRU SEVER DRAGOMIR 1, Abstract. Some new trace ineualities for oerators in

More information

4TE3/6TE3. Algorithms for. Continuous Optimization

4TE3/6TE3. Algorithms for. Continuous Optimization 4TE3/6TE3 Algorithms for Continuous Optimization (Duality in Nonlinear Optimization ) Tamás TERLAKY Computing and Software McMaster University Hamilton, January 2004 terlaky@mcmaster.ca Tel: 27780 Optimality

More information

Tibor Illes, Jiming Peng 2, Kees Roos, Tamas Terlaky Faculty of Information Technology and Systems Subfaculty of Technical Mathematics and Informatics

Tibor Illes, Jiming Peng 2, Kees Roos, Tamas Terlaky Faculty of Information Technology and Systems Subfaculty of Technical Mathematics and Informatics DELFT UNIVERSITY OF TECHNOLOGY REPORT 98{5 A Strongly Polynomial Rounding Procedure Yielding A Maximally Comlementary Solution for P () Linear Comlementarity Problems T. Illes, J. Peng, C. Roos, T. Terlaky

More information

Figure : An 8 bridge design grid. (a) Run this model using LOQO. What is the otimal comliance? What is the running time?

Figure : An 8 bridge design grid. (a) Run this model using LOQO. What is the otimal comliance? What is the running time? 5.094/SMA53 Systems Otimization: Models and Comutation Assignment 5 (00 o i n ts) Due Aril 7, 004 Some Convex Analysis (0 o i n ts) (a) Given ositive scalars L and E, consider the following set in three-dimensional

More information

ON THE SET a x + b g x (mod p) 1 Introduction

ON THE SET a x + b g x (mod p) 1 Introduction PORTUGALIAE MATHEMATICA Vol 59 Fasc 00 Nova Série ON THE SET a x + b g x (mod ) Cristian Cobeli, Marian Vâjâitu and Alexandru Zaharescu Abstract: Given nonzero integers a, b we rove an asymtotic result

More information

Additive results for the generalized Drazin inverse in a Banach algebra

Additive results for the generalized Drazin inverse in a Banach algebra Additive results for the generalized Drazin inverse in a Banach algebra Dragana S. Cvetković-Ilić Dragan S. Djordjević and Yimin Wei* Abstract In this aer we investigate additive roerties of the generalized

More information

arxiv: v2 [math.na] 6 Apr 2016

arxiv: v2 [math.na] 6 Apr 2016 Existence and otimality of strong stability reserving linear multiste methods: a duality-based aroach arxiv:504.03930v [math.na] 6 Ar 06 Adrián Németh January 9, 08 Abstract David I. Ketcheson We rove

More information

1 Extremum Estimators

1 Extremum Estimators FINC 9311-21 Financial Econometrics Handout Jialin Yu 1 Extremum Estimators Let θ 0 be a vector of k 1 unknown arameters. Extremum estimators: estimators obtained by maximizing or minimizing some objective

More information

Advanced Calculus I. Part A, for both Section 200 and Section 501

Advanced Calculus I. Part A, for both Section 200 and Section 501 Sring 2 Instructions Please write your solutions on your own aer. These roblems should be treated as essay questions. A roblem that says give an examle requires a suorting exlanation. In all roblems, you

More information

4TE3/6TE3. Algorithms for. Continuous Optimization

4TE3/6TE3. Algorithms for. Continuous Optimization 4TE3/6TE3 Algorithms for Continuous Optimization (Algorithms for Constrained Nonlinear Optimization Problems) Tamás TERLAKY Computing and Software McMaster University Hamilton, November 2005 terlaky@mcmaster.ca

More information

Preconditioning techniques for Newton s method for the incompressible Navier Stokes equations

Preconditioning techniques for Newton s method for the incompressible Navier Stokes equations Preconditioning techniques for Newton s method for the incomressible Navier Stokes equations H. C. ELMAN 1, D. LOGHIN 2 and A. J. WATHEN 3 1 Deartment of Comuter Science, University of Maryland, College

More information

Convexification of Generalized Network Flow Problem with Application to Power Systems

Convexification of Generalized Network Flow Problem with Application to Power Systems 1 Convexification of Generalized Network Flow Problem with Alication to Power Systems Somayeh Sojoudi and Javad Lavaei + Deartment of Comuting and Mathematical Sciences, California Institute of Technology

More information

Optimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment

Optimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment Neutrosohic Sets and Systems Vol 14 016 93 University of New Mexico Otimal Design of Truss Structures Using a Neutrosohic Number Otimization Model under an Indeterminate Environment Wenzhong Jiang & Jun

More information

A Note on the Positive Nonoscillatory Solutions of the Difference Equation

A Note on the Positive Nonoscillatory Solutions of the Difference Equation Int. Journal of Math. Analysis, Vol. 4, 1, no. 36, 1787-1798 A Note on the Positive Nonoscillatory Solutions of the Difference Equation x n+1 = α c ix n i + x n k c ix n i ) Vu Van Khuong 1 and Mai Nam

More information

Approximation of the Euclidean Distance by Chamfer Distances

Approximation of the Euclidean Distance by Chamfer Distances Acta Cybernetica 0 (0 399 47. Aroximation of the Euclidean Distance by Chamfer Distances András Hajdu, Lajos Hajdu, and Robert Tijdeman Abstract Chamfer distances lay an imortant role in the theory of

More information

Lecture 6: Conic Optimization September 8

Lecture 6: Conic Optimization September 8 IE 598: Big Data Optimization Fall 2016 Lecture 6: Conic Optimization September 8 Lecturer: Niao He Scriber: Juan Xu Overview In this lecture, we finish up our previous discussion on optimality conditions

More information

NONLINEAR OPTIMIZATION WITH CONVEX CONSTRAINTS. The Goldstein-Levitin-Polyak algorithm

NONLINEAR OPTIMIZATION WITH CONVEX CONSTRAINTS. The Goldstein-Levitin-Polyak algorithm - (23) NLP - NONLINEAR OPTIMIZATION WITH CONVEX CONSTRAINTS The Goldstein-Levitin-Polya algorithm We consider an algorithm for solving the otimization roblem under convex constraints. Although the convexity

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

p-adic Measures and Bernoulli Numbers

p-adic Measures and Bernoulli Numbers -Adic Measures and Bernoulli Numbers Adam Bowers Introduction The constants B k in the Taylor series exansion t e t = t k B k k! k=0 are known as the Bernoulli numbers. The first few are,, 6, 0, 30, 0,

More information

On the minimax inequality for a special class of functionals

On the minimax inequality for a special class of functionals ISSN 1 746-7233, Engl, UK World Journal of Modelling Simulation Vol. 3 (2007) No. 3,. 220-224 On the minimax inequality for a secial class of functionals G. A. Afrouzi, S. Heidarkhani, S. H. Rasouli Deartment

More information

A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract

A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS CASEY BRUCK 1. Abstract The goal of this aer is to rovide a concise way for undergraduate mathematics students to learn about how rime numbers behave

More information

Asymptotically Optimal Simulation Allocation under Dependent Sampling

Asymptotically Optimal Simulation Allocation under Dependent Sampling Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee

More information

Journal of Mathematical Analysis and Applications

Journal of Mathematical Analysis and Applications J. Math. Anal. Al. 44 (3) 3 38 Contents lists available at SciVerse ScienceDirect Journal of Mathematical Analysis and Alications journal homeage: www.elsevier.com/locate/jmaa Maximal surface area of a

More information

Generalized Coiflets: A New Family of Orthonormal Wavelets

Generalized Coiflets: A New Family of Orthonormal Wavelets Generalized Coiflets A New Family of Orthonormal Wavelets Dong Wei, Alan C Bovik, and Brian L Evans Laboratory for Image and Video Engineering Deartment of Electrical and Comuter Engineering The University

More information

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables Imroved Bounds on Bell Numbers and on Moments of Sums of Random Variables Daniel Berend Tamir Tassa Abstract We rovide bounds for moments of sums of sequences of indeendent random variables. Concentrating

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

Best approximation by linear combinations of characteristic functions of half-spaces

Best approximation by linear combinations of characteristic functions of half-spaces Best aroximation by linear combinations of characteristic functions of half-saces Paul C. Kainen Deartment of Mathematics Georgetown University Washington, D.C. 20057-1233, USA Věra Kůrková Institute of

More information

Second Order Symmetric and Maxmin Symmetric Duality with Cone Constraints

Second Order Symmetric and Maxmin Symmetric Duality with Cone Constraints International Journal of Oerations Research International Journal of Oerations Research Vol. 4, No. 4, 99 5 7) Second Order Smmetric Mamin Smmetric Dualit with Cone Constraints I. Husain,, Abha Goel, M.

More information

Numerical Linear Algebra

Numerical Linear Algebra Numerical Linear Algebra Numerous alications in statistics, articularly in the fitting of linear models. Notation and conventions: Elements of a matrix A are denoted by a ij, where i indexes the rows and

More information

Solvability and Number of Roots of Bi-Quadratic Equations over p adic Fields

Solvability and Number of Roots of Bi-Quadratic Equations over p adic Fields Malaysian Journal of Mathematical Sciences 10(S February: 15-35 (016 Secial Issue: The 3 rd International Conference on Mathematical Alications in Engineering 014 (ICMAE 14 MALAYSIAN JOURNAL OF MATHEMATICAL

More information

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1)

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1) CERTAIN CLASSES OF FINITE SUMS THAT INVOLVE GENERALIZED FIBONACCI AND LUCAS NUMBERS The beautiful identity R.S. Melham Deartment of Mathematical Sciences, University of Technology, Sydney PO Box 23, Broadway,

More information

Factorability in the ring Z[ 5]

Factorability in the ring Z[ 5] University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Dissertations, Theses, and Student Research Paers in Mathematics Mathematics, Deartment of 4-2004 Factorability in the ring

More information

Interior Point Methods: Second-Order Cone Programming and Semidefinite Programming

Interior Point Methods: Second-Order Cone Programming and Semidefinite Programming School of Mathematics T H E U N I V E R S I T Y O H F E D I N B U R G Interior Point Methods: Second-Order Cone Programming and Semidefinite Programming Jacek Gondzio Email: J.Gondzio@ed.ac.uk URL: http://www.maths.ed.ac.uk/~gondzio

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

An Estimate For Heilbronn s Exponential Sum

An Estimate For Heilbronn s Exponential Sum An Estimate For Heilbronn s Exonential Sum D.R. Heath-Brown Magdalen College, Oxford For Heini Halberstam, on his retirement Let be a rime, and set e(x) = ex(2πix). Heilbronn s exonential sum is defined

More information

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th 18.415/6.854 Advanced Algorithms ovember 7, 1996 Euclidean TSP (art I) Lecturer: Michel X. Goemans MIT These notes are based on scribe notes by Marios Paaefthymiou and Mike Klugerman. 1 Euclidean TSP Consider

More information

Largest dual ellipsoids inscribed in dual cones

Largest dual ellipsoids inscribed in dual cones Largest dual ellipsoids inscribed in dual cones M. J. Todd June 23, 2005 Abstract Suppose x and s lie in the interiors of a cone K and its dual K respectively. We seek dual ellipsoidal norms such that

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information

Applicable Analysis and Discrete Mathematics available online at HENSEL CODES OF SQUARE ROOTS OF P-ADIC NUMBERS

Applicable Analysis and Discrete Mathematics available online at   HENSEL CODES OF SQUARE ROOTS OF P-ADIC NUMBERS Alicable Analysis and Discrete Mathematics available online at htt://efmath.etf.rs Al. Anal. Discrete Math. 4 (010), 3 44. doi:10.98/aadm1000009m HENSEL CODES OF SQUARE ROOTS OF P-ADIC NUMBERS Zerzaihi

More information

Multiplicative group law on the folium of Descartes

Multiplicative group law on the folium of Descartes Multilicative grou law on the folium of Descartes Steluţa Pricoie and Constantin Udrişte Abstract. The folium of Descartes is still studied and understood today. Not only did it rovide for the roof of

More information

Existence and nonexistence of positive solutions for quasilinear elliptic systems

Existence and nonexistence of positive solutions for quasilinear elliptic systems ISSN 1746-7233, England, UK World Journal of Modelling and Simulation Vol. 4 (2008) No. 1,. 44-48 Existence and nonexistence of ositive solutions for uasilinear ellitic systems G. A. Afrouzi, H. Ghorbani

More information

Sums of independent random variables

Sums of independent random variables 3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where

More information

Sharp gradient estimate and spectral rigidity for p-laplacian

Sharp gradient estimate and spectral rigidity for p-laplacian Shar gradient estimate and sectral rigidity for -Lalacian Chiung-Jue Anna Sung and Jiaing Wang To aear in ath. Research Letters. Abstract We derive a shar gradient estimate for ositive eigenfunctions of

More information

Why Proofs? Proof Techniques. Theorems. Other True Things. Proper Proof Technique. How To Construct A Proof. By Chuck Cusack

Why Proofs? Proof Techniques. Theorems. Other True Things. Proper Proof Technique. How To Construct A Proof. By Chuck Cusack Proof Techniques By Chuck Cusack Why Proofs? Writing roofs is not most student s favorite activity. To make matters worse, most students do not understand why it is imortant to rove things. Here are just

More information

A new primal-dual path-following method for convex quadratic programming

A new primal-dual path-following method for convex quadratic programming Volume 5, N., pp. 97 0, 006 Copyright 006 SBMAC ISSN 00-805 www.scielo.br/cam A new primal-dual path-following method for convex quadratic programming MOHAMED ACHACHE Département de Mathématiques, Faculté

More information

where x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H:

where x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H: Mehryar Mohri Foundations of Machine Learning Courant Institute of Mathematical Sciences Homework assignment 2 October 25, 2017 Due: November 08, 2017 A. Growth function Growth function of stum functions.

More information

On a Markov Game with Incomplete Information

On a Markov Game with Incomplete Information On a Markov Game with Incomlete Information Johannes Hörner, Dinah Rosenberg y, Eilon Solan z and Nicolas Vieille x{ January 24, 26 Abstract We consider an examle of a Markov game with lack of information

More information

Monopolist s mark-up and the elasticity of substitution

Monopolist s mark-up and the elasticity of substitution Croatian Oerational Research Review 377 CRORR 8(7), 377 39 Monoolist s mark-u and the elasticity of substitution Ilko Vrankić, Mira Kran, and Tomislav Herceg Deartment of Economic Theory, Faculty of Economics

More information

ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM

ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM JOHN BINDER Abstract. In this aer, we rove Dirichlet s theorem that, given any air h, k with h, k) =, there are infinitely many rime numbers congruent to

More information

IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES

IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES OHAD GILADI AND ASSAF NAOR Abstract. It is shown that if (, ) is a Banach sace with Rademacher tye 1 then for every n N there exists

More information

LEIBNIZ SEMINORMS IN PROBABILITY SPACES

LEIBNIZ SEMINORMS IN PROBABILITY SPACES LEIBNIZ SEMINORMS IN PROBABILITY SPACES ÁDÁM BESENYEI AND ZOLTÁN LÉKA Abstract. In this aer we study the (strong) Leibniz roerty of centered moments of bounded random variables. We shall answer a question

More information

Multi-Operation Multi-Machine Scheduling

Multi-Operation Multi-Machine Scheduling Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job

More information

New stopping criteria for detecting infeasibility in conic optimization

New stopping criteria for detecting infeasibility in conic optimization Optimization Letters manuscript No. (will be inserted by the editor) New stopping criteria for detecting infeasibility in conic optimization Imre Pólik Tamás Terlaky Received: March 21, 2008/ Accepted:

More information

An efficient method for generalized linear multiplicative programming problem with multiplicative constraints

An efficient method for generalized linear multiplicative programming problem with multiplicative constraints DOI 0.86/s40064-06-2984-9 RESEARCH An efficient method for generalized linear multilicative rogramming roblem with multilicative constraints Yingfeng Zhao,2* and Sanyang Liu Oen Access *Corresondence:

More information

Linear diophantine equations for discrete tomography

Linear diophantine equations for discrete tomography Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES

TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES Khayyam J. Math. DOI:10.22034/kjm.2019.84207 TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES ISMAEL GARCÍA-BAYONA Communicated by A.M. Peralta Abstract. In this aer, we define two new Schur and

More information

Barrier Method. Javier Peña Convex Optimization /36-725

Barrier Method. Javier Peña Convex Optimization /36-725 Barrier Method Javier Peña Convex Optimization 10-725/36-725 1 Last time: Newton s method For root-finding F (x) = 0 x + = x F (x) 1 F (x) For optimization x f(x) x + = x 2 f(x) 1 f(x) Assume f strongly

More information

The Fekete Szegő theorem with splitting conditions: Part I

The Fekete Szegő theorem with splitting conditions: Part I ACTA ARITHMETICA XCIII.2 (2000) The Fekete Szegő theorem with slitting conditions: Part I by Robert Rumely (Athens, GA) A classical theorem of Fekete and Szegő [4] says that if E is a comact set in the

More information

Department of Mathematics

Department of Mathematics Deartment of Mathematics Ma 3/03 KC Border Introduction to Probability and Statistics Winter 209 Sulement : Series fun, or some sums Comuting the mean and variance of discrete distributions often involves

More information

We collect some results that might be covered in a first course in algebraic number theory.

We collect some results that might be covered in a first course in algebraic number theory. 1 Aendices We collect some results that might be covered in a first course in algebraic number theory. A. uadratic Recirocity Via Gauss Sums A1. Introduction In this aendix, is an odd rime unless otherwise

More information

Existence Results for Quasilinear Degenerated Equations Via Strong Convergence of Truncations

Existence Results for Quasilinear Degenerated Equations Via Strong Convergence of Truncations Existence Results for Quasilinear Degenerated Equations Via Strong Convergence of Truncations Youssef AKDIM, Elhoussine AZROUL, and Abdelmoujib BENKIRANE Déartement de Mathématiques et Informatique, Faculté

More information

Intrinsic Approximation on Cantor-like Sets, a Problem of Mahler

Intrinsic Approximation on Cantor-like Sets, a Problem of Mahler Intrinsic Aroximation on Cantor-like Sets, a Problem of Mahler Ryan Broderick, Lior Fishman, Asaf Reich and Barak Weiss July 200 Abstract In 984, Kurt Mahler osed the following fundamental question: How

More information

SYMPLECTIC STRUCTURES: AT THE INTERFACE OF ANALYSIS, GEOMETRY, AND TOPOLOGY

SYMPLECTIC STRUCTURES: AT THE INTERFACE OF ANALYSIS, GEOMETRY, AND TOPOLOGY SYMPLECTIC STRUCTURES: AT THE INTERFACE OF ANALYSIS, GEOMETRY, AND TOPOLOGY FEDERICA PASQUOTTO 1. Descrition of the roosed research 1.1. Introduction. Symlectic structures made their first aearance in

More information

Positive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Application

Positive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Application BULGARIA ACADEMY OF SCIECES CYBEREICS AD IFORMAIO ECHOLOGIES Volume 9 o 3 Sofia 009 Positive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Alication Svetoslav Savov Institute of Information

More information

On the Field of a Stationary Charged Spherical Source

On the Field of a Stationary Charged Spherical Source Volume PRORESS IN PHYSICS Aril, 009 On the Field of a Stationary Charged Sherical Source Nikias Stavroulakis Solomou 35, 533 Chalandri, reece E-mail: nikias.stavroulakis@yahoo.fr The equations of gravitation

More information

12. Interior-point methods

12. Interior-point methods 12. Interior-point methods Convex Optimization Boyd & Vandenberghe inequality constrained minimization logarithmic barrier function and central path barrier method feasibility and phase I methods complexity

More information

Math 104B: Number Theory II (Winter 2012)

Math 104B: Number Theory II (Winter 2012) Math 104B: Number Theory II (Winter 01) Alina Bucur Contents 1 Review 11 Prime numbers 1 Euclidean algorithm 13 Multilicative functions 14 Linear diohantine equations 3 15 Congruences 3 Primes as sums

More information

k- price auctions and Combination-auctions

k- price auctions and Combination-auctions k- rice auctions and Combination-auctions Martin Mihelich Yan Shu Walnut Algorithms March 6, 219 arxiv:181.3494v3 [q-fin.mf] 5 Mar 219 Abstract We rovide for the first time an exact analytical solution

More information

The Knuth-Yao Quadrangle-Inequality Speedup is a Consequence of Total-Monotonicity

The Knuth-Yao Quadrangle-Inequality Speedup is a Consequence of Total-Monotonicity The Knuth-Yao Quadrangle-Ineuality Seedu is a Conseuence of Total-Monotonicity Wolfgang W. Bein Mordecai J. Golin Lawrence L. Larmore Yan Zhang Abstract There exist several general techniues in the literature

More information

A Closed-Form Solution to the Minimum V 2

A Closed-Form Solution to the Minimum V 2 Celestial Mechanics and Dynamical Astronomy manuscrit No. (will be inserted by the editor) Martín Avendaño Daniele Mortari A Closed-Form Solution to the Minimum V tot Lambert s Problem Received: Month

More information

A Note on Guaranteed Sparse Recovery via l 1 -Minimization

A Note on Guaranteed Sparse Recovery via l 1 -Minimization A Note on Guaranteed Sarse Recovery via l -Minimization Simon Foucart, Université Pierre et Marie Curie Abstract It is roved that every s-sarse vector x C N can be recovered from the measurement vector

More information

Bent Functions of maximal degree

Bent Functions of maximal degree IEEE TRANSACTIONS ON INFORMATION THEORY 1 Bent Functions of maximal degree Ayça Çeşmelioğlu and Wilfried Meidl Abstract In this article a technique for constructing -ary bent functions from lateaued functions

More information

The inverse Goldbach problem

The inverse Goldbach problem 1 The inverse Goldbach roblem by Christian Elsholtz Submission Setember 7, 2000 (this version includes galley corrections). Aeared in Mathematika 2001. Abstract We imrove the uer and lower bounds of the

More information

Advances in Convex Optimization: Theory, Algorithms, and Applications

Advances in Convex Optimization: Theory, Algorithms, and Applications Advances in Convex Optimization: Theory, Algorithms, and Applications Stephen Boyd Electrical Engineering Department Stanford University (joint work with Lieven Vandenberghe, UCLA) ISIT 02 ISIT 02 Lausanne

More information

ON UNIFORM BOUNDEDNESS OF DYADIC AVERAGING OPERATORS IN SPACES OF HARDY-SOBOLEV TYPE. 1. Introduction

ON UNIFORM BOUNDEDNESS OF DYADIC AVERAGING OPERATORS IN SPACES OF HARDY-SOBOLEV TYPE. 1. Introduction ON UNIFORM BOUNDEDNESS OF DYADIC AVERAGING OPERATORS IN SPACES OF HARDY-SOBOLEV TYPE GUSTAVO GARRIGÓS ANDREAS SEEGER TINO ULLRICH Abstract We give an alternative roof and a wavelet analog of recent results

More information

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., DECEMBER 4 336 Some Unitary Sace Time Codes From Shere Packing Theory With Otimal Diversity Product of Code Size Haiquan Wang, Genyuan Wang, and Xiang-Gen

More information

Solution sheet ξi ξ < ξ i+1 0 otherwise ξ ξ i N i,p 1 (ξ) + where 0 0

Solution sheet ξi ξ < ξ i+1 0 otherwise ξ ξ i N i,p 1 (ξ) + where 0 0 Advanced Finite Elements MA5337 - WS7/8 Solution sheet This exercise sheets deals with B-slines and NURBS, which are the basis of isogeometric analysis as they will later relace the olynomial ansatz-functions

More information