Optimal CDMA Signatures: A Finite-Step Approach
|
|
- Agatha Evans
- 5 years ago
- Views:
Transcription
1 Optimal CDMA Signatures: A Finite-Step Approach Joel A. Tropp Inst. for Comp. Engr. an Sci. (ICES) 1 University Station C000 Austin, TX 7871 jtropp@ices.utexas.eu Inerjit. S. Dhillon Dept. of Comp. Sci. 1 University Station C0500 Austin, TX 7871 inerjit@cs.utexas.eu Robert W. Heath Jr. Dept. of Elect. an Comp. Engr. 1 University Station C0803 Austin, TX USA rheath@ece.utexas.eu Abstract A escription of optimal sequences for irect-sprea coe ivision multiple access is a byprouct of recent characterizations of the sum capacity. This papers restates the sequence esign problem as an inverse singular value problem an shows that it can be solve with finite-step algorithms from matrix analysis. Relevant algorithms are reviewe an a new one-sie construction is propose that obtains the sequences irectly instea of computing the Gram matrix of the optimal signatures. I. INTRODUCTION The problem of sequence sequences to maximize the sum capacity of symbol-synchronous irect-sprea coe ivision multiple access system (henceforth S-CDMA) has receive significant attention in the information theory community over the last ecae, e.g. [1] [7]. Despite this work, the algorithms propose to fin optimal signatures have not exploite the observation that the signature esign problem can be characterize as an inverse singular value problem [8]. Thus researchers have been unable to exploit the wealth of algorithms evelope in the matrix theory community uring the past two ecaes [9], [10]. In this paper we present the signature esign problem from a new perspective: as the solution to an inverse singular value problem. In short, optimal sequences are intimately connecte to matrices that satisfy certain conitions on their column norms an singular spectrum; these constraints are etermine by the user power requirements an the noise covariance. This matrix analysis point-of-view allows us to leverage existing algorithms for solving inverse singular value problems to evelop numerically stable, finite algorithms for solving the sequence esign problem. Unlike iterative algorithms, e.g. [4], [7], [11], convergence is not an issue for finite-step algorithms since they are guarantee to solve the state problem. The specific contributions of this paper are two-fol. First we present a summary of relevant finite-step algorithms from matrix analysis that will be useful for researchers working in sequence esign. We focus on the algorithms by Benel- Mickey [9], Chan-Li [10] an Davies-Higham [1]. Secon, we present a new one-sie, finite algorithm that prouces the signature sequences irectly instea of computing their Gram matrix. This metho has very moest time an space requirements in comparison with the other techniques we iscuss. Throughout we focus on the case of complex signatures exclusively because it subsumes the real case without any aitional ifficulty of argument. II. BACKGROUND A. Synchronous DS-CDMA Consier the uplink of an S-CDMA system with N users an a processing gain of. Assume that N>, since the analysis of the other case is straightforwar. Define a N matrix whose columns are the signatures: S ef = s 1 s... s N. Let S to enote the (conjugate) transpose of S. Note that (S S) nn =1for each n =1,...,N. Assume that user n has an average power w n an collect them in the iagonal matrix W ef =iag(w 1,w,...,w N ). It is often more convenient to absorb the power constraints into the signatures, so we also efine the weighte signature matrix X ef = SW 1/. Denote the n-th column of X as x n. For each n, one has the relationship (X X ) nn = x n = w n. (1) Finally, let Σ enote the covariance matrix of the noise. Viswanath an Anantharam have proven in [5] that, for real signatures, the sum capacity of the S-CDMA channel per egree of freeom is given by the expression (in the complex case, the sum capacity iffers by a constant factor) C sum = 1 max log et(i + Σ 1 SWS ). () S The basic sequence esign problem is to prouce a signature matrix S that solves the optimization problem (). Various specializations have been consiere with equal user powers, white noise, unequal user powers, an colore noise. We will show how each of these cases results in an inverse singular value problem. B. A Sum Capacity Boun In [1], Rupf an Massey prouce an upper boun on the sum capacity uner white noise with variance σ : ( C sum 1 log 1+ Tr W ) σ (3) where Tr ( ) inicates the trace operator. They also establishe a necessary an sufficient conition on the signatures for equality to be attaine in the boun (3): XX = SWS = Tr W I. (4) A matrix X that satisfies (4) is known as a tight frame [13] or a general Welch-Boun-Equality sequence (gwbe) []. A
2 conition equivalent to (4) is that X X = Tr W P (5) where the matrix P represents an orthogonal projector from C N onto a subspace of imension. Recall that an orthogonal projector is an iempotent, Hermitian matrix. That is, P = P an P = P. An orthogonal projector is also characterize as a Hermitian matrix whose nonzero eigenvalues are ientically equal to one. In light of equation (1), the problem of constructing optimal signature sequences in the present setting is closely relate to the problem of constructing an orthogonal projector with a specifie iagonal. C. White Noise, Equal Powers Consier the case where the power constraints are equal, viz. W = w I N for some positive number w. Then conition (4) for equality to hol in (3) becomes w 1 XX = SS = N I. (6) A matrix S which satisfies (6) is known as a unit-norm tight frame (UNTF) [13] or a Welch-Boun-Equality sequence (WBE) [1]. In fact, there always exist signature matrices that satisfy conition (6), an so the upper boun on the sum capacity can always be attaine when the users power constraints are equal [1]. The equation (6) can also be interprete as a restriction on the singular values of the signature matrix. Uner the assumptions of white noise an equal power constraints, a matrix S yiels optimal signatures if an only if 1) each column of S has unit-norm an ) the nonzero singular values of S are ientically equal to N/. Therefore, this sequence esign problem falls into the category of structure inverse singular value problems. Note that conition 1) must hol irrespective of the type of noise. D. Majorization The boun (3) cannot be met for an arbitrary set of power constraints. The explanation requires some backgroun in majorization [14]. Essentially, majorization efines a partial orering that allows two vectors of equal norm to be compare. A vector w majorizes λ (written w λ ) if all the partial sums of the entries of w are greater than or equal to the partial sums of λ. It turns out that majorization efines the precise relationship between the iagonal entries of a Hermitian matrix an its spectrum (see [14], [15] for etails). Theorem 1 (Schur-Horn [15]): The iagonal entries of a Hermitian matrix majorize its eigenvalues. Conversely, if w λ, there exists a Hermitian matrix with iagonal elements liste by w an eigenvalues liste by λ. E. White Noise, Unequal Powers The Schur-Horn Theorem forbis the construction of an orthogonal projector with arbitrary iagonal entries. For this reason, (5) cannot always hol, an the upper boun (3) cannot always be attaine. The key result of [] is a complete characterization of the sum capacity of the S-CDMA channel uner white noise. Viswanath an Anantharam emonstrate that oversize users those whose power constraints are too large relative to the others for the majorization conition to hol must receive their own orthogonal channels to maximize the sum capacity of the system, an they provie a simple metho of etermining which users are oversize. The other users share the remaining imensions equitably. Suppose that there are m < oversize users, whose signatures form the columns of S 0. Let the columns of S 1 list the signatures of the (N m) remaining users, an let the iagonal matrix W 1 list their power constraints. The conitions for achieving sum capacity follow. 1) The m oversize users receive orthogonal signatures: S 0 S 0 = I m. ) The remaining (N m) signatures are also orthogonal to the oversize users signatures: S 0 S 1 = 0. 3) The remaining users signatures satisfy S 1 W 1 S1 = Tr W 1 m I m. Repeat the foregoing arguments to see that the sequence esign problem still amounts to constructing a matrix with given column norms an singular spectrum. It is therefore an inverse singular value problem. F. Colore Noise, Unequal Powers When the noise is colore, the situation is somewhat more complicate. Nevertheless, optimal sequence esign still boils own to constructing a matrix with given column norms an singular spectrum. Viswanath an Anantharam show that the following proceure will solve the problem [5]. 1) Compute an eigenvalue ecomposition of the noise covariance matrix, Σ = QDQ, where D =iagσ for some non-negative vector σ. ) Use Algorithm A of [5] to etermine µ, the Schurminimal element of the set of possible eigenvalues of SWS + Σ. 3) Form the vector λ ef = µ σ. 4) Compute an auxiliary signature matrix T with unit-norm columns so that TWT =iagλ. 5) The optimal signature matrix is S ef = QT. The computation in step (4) is equivalent to proucing a N matrix X ef = TW 1/. The columns of X must have square norms liste by the iagonal of W. The vector λ must list the nonzero square singular values of X. This is another inverse singular value problem. III. CONSTRUCTING CORRELATION MATRICES A positive semi-efinite Hermitian matrix with a unit iagonal is known as a correlation matrix [1]. The Gram matrix A ef = S S of an optimal signature matrix S is always a correlation matrix. Every correlation matrix with the appropriate spectrum can be factore to prouce optimal signature matrices [1]. Therefore, we begin with a technique for constructing correlation matrices with a preassigne spectrum.
3 A. The Benel-Mickey Algorithm In 1978, Benel an Mickey presente an algorithm that uses a finite sequence of rotations to convert an arbitrary N N Hermitian matrix with trace N into a unit-iagonal matrix that has the same spectrum [9]. We follow the superb exposition of Davies an Higham [1]. Brief iscussions appear on page 76 of Horn an Johnson [15] an in Problems an 8.4. of Golub an van Loan [16]. Suppose that A M N is a Hermitian matrix with Tr A = N. (Let M N enote the set of complex N N matrices an M,N to enote the set of complex N matrices.) If A oes not have a unit iagonal, one can locate two iagonal elements so that a jj < 1 <a kk ; otherwise, the trace conition woul be violate. It is then possible to construct a real plane rotation Q in the jk-plane so that (Q AQ) jj =1. The transformation A Q AQ preserves the conjugate symmetry an the spectrum of A but reuces the number of non-unit iagonal entries by at least one. Thus, at most (N 1) rotations are require before the resulting matrix has a unit iagonal. The appropriate form of the rotation is easy to iscover, but the following erivation is essential to ensure numerical stability. Recall that a two-imensional plane rotation is an orthogonal matrix of the form c s Q = s c where c + s =1[16]. The corresponing plane rotation in the jk-plane is the N-imensional ientity matrix with its jj, jk, kj an kk entries replace by the entries of the twoimensional rotation. Let j<kbe inices so that a jj < 1 <a kk or a kk < 1 <a jj. The esire plane rotation yiels the matrix equation c s ajj a jk c s 1 ãjk s c a = jk a kk s c ã jk ã kk where c + s =1. The equality of the upper-left entries can be state as c a jj sc Re a jk + s a kk =1. This equation is quaratic in t = s/c: whence (a kk 1) t t Re a jk +(a jj 1) = 0 t = Re a jk ± (Re a jk ) (a jj 1)(a kk 1). (7) a kk 1 Notice that the choice of j an k guarantees a positive iscriminant. As is stanar in numerical analysis, the ± sign in (7) must be taken to avoi cancelations. If necessary, one can extract the other root using the fact that the prouct of the roots equals (a jj 1)/(a kk 1). Finally, 1 1+t an s = ct. (8) Floating-point arithmetic is inexact, so the rotation may not yiel a jj =1. A better implementation sets a jj =1explicitly. Davies an Higham prove that the Benel-Mickey algorithm is backwar stable, so long as it is implemente the way we have escribe [1]. We restate the algorithm. Algorithm 1 (Benel-Mickey): Given Hermitian A M N with Tr A = N, this algorithm yiels a correlation matrix whose eigenvalues are ientical with those of A. 1) While some iagonal entry a jj 1, repeat Steps 4. ) Fin an inex k (without loss of generality j<k) for which a jj < 1 <a kk or a kk < 1 <a jj. 3) Determine a plane rotation Q in the jk-plane using equations (7) an (8). 4) Replace A by Q AQ. Set a jj =1. Since the loop executes no more than (N 1) times, the total cost of the algorithm is no more 1N real floating-point operations, to highest orer, if conjugate symmetry is exploite. The plane rotations never nee to be generate explicitly, an all the intermeiate matrices are Hermitian. Therefore, the algorithm must store only N(N +1)/ complex floatingpoint numbers. MATLAB 6 contains a version of Algorithm 1 that starts with a ranom matrix of specifie spectrum. The comman is gallery( rancorr,...). It shoul be clear that a similar algorithm can be applie to any Hermitian matrix A to prouce another Hermitian matrix with the same spectrum but whose iagonal entries are ientically equal to Tr A/N. The columns of S must form an orthogonal basis for the column space of A ef = S S accoring to (6). Therefore, one can use a rank-revealing QR factorization to extract a signature sequence S from the output A of Algorithm 1 [16]. B. The Davies-Higham Algorithm The methos of the last section can be moifie to compute the signature sequence irectly without recourse to an aitional QR factorization. Any correlation matrix A M N can be expresse as the prouct S S where S M r,n has columns of unit norm an imension r rank A. With this factorization, the two-sie transformation A Q AQ is equivalent to a one-sie transformation S SQ. In consequence, the machinery of the Benel-Mickey algorithm requires little ajustment to prouce these factors. We refer to the one-sie version as the Davies-Higham algorithm in view of [1]. We have observe that it can also be use to fin the factors of an N-imensional correlation matrix with rank r<n, in which case S may take imensions N for any r. Algorithm (Davies-Higham): Given S M,N for which Tr S S = N, this proceure yiels a N matrix with the same singular values as S but with unit-norm columns. 1) Calculate an store the column norms of S. ) While some column has norm s j 1, repeat Steps ) Fin inices j<kfor which s j < 1 < s k or s k < 1 < s j.
4 4) Form the quantities a jj = s j, a jk = s k, s j an a kk = s k. 5) Determine a rotation Q in the jk-plane using equations (7) an (8). 6) Replace S by SQ. 7) Upate the two column norms that have change. Step (1) requires 4N real floating-point operations, an the remaining steps require 1N real floating-point operations to highest orer. The algorithm requires the storage of N complex floating-point numbers an N real numbers for the current column norms. Davies an Higham remark that the algorithm is numerically stable [1]. IV. CHAN-LI ANDITS VARIANTS Now we iscuss a simple technique for constructing a limite selection of Hermitian matrices with prescribe iagonal an spectrum. This is the core problem for the unequal power case with white or colore noise because every optimal weighte signature sequence has a Gram matrix A ef = X X with fixe iagonal an spectrum (an conversely). The algorithm begins with a iagonal matrix of eigenvalues an applies a sequence of rotations to impose the power constraints. A similar technique can be use to buil optimal weighte signature sequences X irectly. A. The Chan-Li Algorithm Chan an Li present a beautiful, constructive proof of converse part of the Schur-Horn Theorem [10]. Suppose that w an λ are N-imensional, real vectors for which w λ. Using inuction on the imension, we show how to construct a Hermitian matrix with iagonal w an spectrum λ. In the sequel, assume without loss of generality that the entries of w an λ have been sorte in ascening orer. Therefore, w (k) = w k an λ (k) = λ k for each k. Suppose that N =. The majorization relation implies λ 1 w 1 w λ. Let A ef =iagλ. We can explicitly construct a plane rotation Q so that the iagonal of Q AQ equals w: [ ] 1 Q ef λ w = 1 w1 λ 1 λ λ 1. (9) w 1 λ 1 λ w 1 Since Q is orthogonal, Q AQ retains spectrum λ but gains iagonal entries w. Suppose that, whenever w λ for vectors of length N 1, we can construct an orthogonal transformation Q so that Q (iag λ)q has iagonal entries w. Consier N-imensional vectors for which w λ. Let A ef = iag λ. The majorization conition implies that λ 1 w 1 w N λ N, so it is always possible to select a least integer j > 1 so that λ j 1 w 1 λ j. Let P 1 be a permutation matrix for which P 1 AP 1 =iag(λ 1,λ j,λ,...,λ j 1,λ j+1,...,λ N ). Observe that λ 1 w 1 λ j an λ 1 λ 1 + λ j w 1 λ j. Thus we may use equation (9), replacing λ with λ j, to construct a plane rotation Q that sets the first entry of Q (iag (λ 1,λ j ))Q to w 1. If we efine the rotation ef Q 0 P = 0 I N then P P1 w1 v AP 1 P = v A N 1 where v is an appropriate vector an A N 1 = iag (λ 1 + λ j w 1,λ,...,λ j 1,λ j+1,...,λ N ). To apply the inuction hypothesis, it remains to check that the vector (w,w 3,...,w N ) majorizes the iagonal of A N 1. We accomplish this in three steps. First, recall that λ k w 1 for k =,...,j 1. Therefore, w k (m 1) w 1 λ k for each m =,...,j 1. The sum on the right-han sie obviously excees the sum of the smallest (m 1) entries of iag A N 1, so the first (j ) majorization inequalities are in force. Secon, use the fact that w λ to calculate that w k = w k w 1 λ k w 1 k=1 k=1 j 1 =(λ 1 + λ j w 1 )+ λ k + λ k k=j+1 for m = j,...,n. Once again, observe that the sum on the right-han sie excees the sum of the smallest (m 1) entries of iag A N 1, so the remaining majorization inequalities are in force. Finally, rearranging the relation N k=1 w k = N k=1 λ k yiels N w k =TrA N 1. In consequence, the inuction furnishes a rotation Q N 1 which sets the iagonal entries of A N 1 equal to the numbers (w,...,w N ). Define ef P 3 = Q N 1 Conjugating A by the orthogonal matrix P = P 1 P P 3 transforms the iagonal entries of A to w while retaining the spectrum λ. The proof yiels the following algorithm. Algorithm 3 (Chan-Li): Let w an λ be vectors with ascening entries an such that w λ. The following proceure computes a real, symmetric matrix with iagonal entries w an eigenvalues λ. 1) Initialize A =iagλ, an put n =1. ) Fin the least j>nso that a j 1,j 1 w n a jj. 3) Use a symmetric permutation to set a n+1,n+1 equal to a jj while shifting iagonal entries n +1,...,j 1 one place own the iagonal. 4) Define a rotation Q in the (n, n +1)-plane with a n+1,n+1 w n a n+1,n+1 a nn, s = 5) Replace A by Q AQ. w n a nn a n+1,n+1 a nn.
5 6) Use a symmetric permutation to re-sort the iagonal entries of A in ascening orer. 7) Increment n, an repeat Steps 7 while n<n. This algorithm requires about 6N real floating-point operations. It requires the storage of about N(N +1)/ real floating-point numbers, incluing the vector w. It is conceptually simpler to perform the permutations escribe in the algorithm, but it can be implemente without them. We have observe that the algorithm given by Viswanath an Anantharam [] for constructing gwbes is similar to the Chan-Li algorithm. Nevertheless, we feel that the simplicity of Chan an Li s presentation merits repetition. B. One-Sie Chan-Li The Chan-Li algorithm only prouces a Gram matrix, which must be factore to obtain the weighte signature matrix. Referring back to the ieas of Davies an Higham, we propose a one-sie version of the Chan-Li algorithm. The benefits are several. It requires less storage an less computation than the Chan-Li algorithm. At the same time, it constructs the factors explicitly. This algorithm has not been publishe before. Algorithm 4 (One-Sie Chan-Li): Suppose that w an λ are non-negative vectors of length N with ascening entries. Assume, moreover, that the first (N ) components of λ are zero an that w λ. The following algorithm prouces a N matrix X whose column norms are liste by w an whose square singular values are liste by λ. 1) Initialize n =1, an set λn +1 X = λn ) Fin the least j>nso that x j 1 w n x j. 3) Move the j-th column of X to the (n +1)-st column, shifting the isplace columns to the right. 4) Define a rotation Q in the (n, n +1)-plane with x n+1 w n w n x n x n+1 x n, s = x n+1 x n. 5) Replace X by XQ. 6) Sort columns (n+1),...,n in orer of increasing norm. 7) Increment n, an repeat Steps 7 while n<n. The algorithm requires 3N real floating-point operations an storage of N( +) real floating-point numbersm incluing the esire column norms an the current column norms. The proceure can be implemente without permutations. V. DISCUSION We have iscusse a group of four algorithms that can be use to prouce sum-capacity-optimal S-CDMA sequences in a wie variety of circumstances. The first algorithm, Benel- Mickey, constructs a Hermitian matrix with a constant iagonal an a prescribe spectrum. This matrix can be factore to yiel an optimal signature sequence for the case of equal user powers, i.e. a unit-norm tight frame. Alternately, the Davies- Higham algorithm can be use to prouce the factors irectly. The thir algorithm, Chan-Li, constructs a Hermitian matrix with an arbitrary iagonal an prescribe spectrum, subject to the majorization conition. The resulting matrix can be factore to obtain an optimal signature sequence for the case of unequal receive powers, i.e. a tight frame. We have also introuce a new variant, the one-sie Chan-Li algorithm, that can calculate the factors irectly. The Benel-Mickey an Davies-Higham algorithms can potentially calculate every correlation matrix an its factors. If they are initialize with ranom matrices, one may interpret the output as a ranom correlation matrix. The factors can be interprete as ranom unit-norm signature sequences. On the other han, the output of the Chan-Li an one-sie Chan-Li algorithms is not encyclopeic. They can construct only a few matrices for each pair (w, λ). These matrices are also likely to have many zero entries, which is unesirable for some applications. In aition, these algorithms only buil real matrices, whereas complex matrices are often of more interest. REFERENCES [1] M. Rupf an J. L. Massey, Optimum sequence multisets for synchronous coe-ivision multiple-access channels, IEEE Trans. Inform. Theory, vol. 40, no. 4, pp , July [] P. Viswanath an V. Anantharam, Optimal sequences an sum capacity of synchronous CDMA systems, IEEE Trans. Inform. Th., vol. 45, no. 6, pp , Sept [3] S. Ulukus an R. D. Yates, Iterative construction of optimum signature sequence sets in synchronous CDMA systems, IEEE Trans. Inform. Theory, vol. 47, no. 5, pp , 001. [4] C. Rose, CDMA coewor optimization: Interference avoiance an convergence via class warfare, IEEE Trans. IT, vol. 47, no. 6, pp , 001. [5] P. Viswanath an A. Anantharam, Optimal sequences for CDMA uner colore noise: A Schur-sale function property, IEEE Trans. IT, vol. 48, no. 6, pp , June 00. [6] P. Anigstein an V. Anantharam, Ensuring convergence of the MMSE iteration for interference avoiance to the global optimum, IEEE Trans. IT, vol. 49, no. 4, pp , April 003. [7] J. A. Tropp, R. W. Heath Jr., an T. Strohmer, Optimal CDMA signature sequences, inverse eigenvalue problems an alternating projection, in Proceeings of the 003 IEEE International Symposium on Information Theory, Yokohama, July 003, p [8] M. T. Chu an G. H. Golub, Structure inverse eigenvalue problems, Acta Numerica, 001. [9] R. B. Benel an M. R. Mickey, Population correlation matrices for sampling experiments, Commun. Statist. Simul. Comp., vol. B7, no., pp , [10] N. N. Chan an K.-H. Li, Diagonal elements an eigenvalues of a real symmetric matrix, J. Math. Anal. Appl., vol. 91, pp , [11] S. Ulukus an R. D. Yates, Iterative construction of optimum signature sequence sets in synchronous CDMA systems, IEEE Trans. IT, vol. 47, no. 5, pp , 001. [1] P. I. Davies an N. J. Higham, Numerically stable generation of correlation matrices an their factors, BIT, vol. 40, no. 4, pp , 000. [13] P. Casazza an J. Kovačević, Equal-norm tight frames with erasures, Av. Comp. Math., 00. [14] A. W. Marshall an I. Olkin, Inequalities: Theory of Majorization an its Applications. Acaemic Press, [15] R. A. Horn an C. R. Johnson, Matrix Analysis. Cambrige University Press, [16] G. H. Golub an C. F. Van Loan, Matrix Computations, 3r e. Johns Hopkins University Press, 1996.
Construction of Equiangular Signatures for Synchronous CDMA Systems
Construction of Equiangular Signatures for Synchronous CDMA Systems Robert W Heath Jr Dept of Elect an Comp Engr 1 University Station C0803 Austin, TX 78712-1084 USA rheath@eceutexaseu Joel A Tropp Inst
More informationGENERALIZED FINITE ALGORITHMS FOR CONSTRUCTING HERMITIAN MATRICES WITH PRESCRIBED DIAGONAL AND SPECTRUM
SIAM J. MATRIX ANAL. APPL. Vol. 27, No. 1, pp. 61 71 c 2005 Society for Industrial and Applied Mathematics GENERALIZED FINITE ALGORITHMS FOR CONSTRUCTING HERMITIAN MATRICES WITH PRESCRIBED DIAGONAL AND
More informationInverse Eigenvalue Problems in Wireless Communications
Inverse Eigenvalue Problems in Wireless Communications Inderjit S. Dhillon Robert W. Heath Jr. Mátyás Sustik Joel A. Tropp The University of Texas at Austin Thomas Strohmer The University of California
More informationRobust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k
A Proof of Lemma 2 B Proof of Lemma 3 Proof: Since the support of LL istributions is R, two such istributions are equivalent absolutely continuous with respect to each other an the ivergence is well-efine
More informationLinear First-Order Equations
5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)
More informationLATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION
The Annals of Statistics 1997, Vol. 25, No. 6, 2313 2327 LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION By Eva Riccomagno, 1 Rainer Schwabe 2 an Henry P. Wynn 1 University of Warwick, Technische
More informationAll s Well That Ends Well: Supplementary Proofs
All s Well That Ens Well: Guarantee Resolution of Simultaneous Rigi Boy Impact 1:1 All s Well That Ens Well: Supplementary Proofs This ocument complements the paper All s Well That Ens Well: Guarantee
More information19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control
19 Eigenvalues, Eigenvectors, Orinary Differential Equations, an Control This section introuces eigenvalues an eigenvectors of a matrix, an iscusses the role of the eigenvalues in etermining the behavior
More informationSurvey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013
Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing
More informationLeast-Squares Regression on Sparse Spaces
Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction
More informationEuler equations for multiple integrals
Euler equations for multiple integrals January 22, 2013 Contents 1 Reminer of multivariable calculus 2 1.1 Vector ifferentiation......................... 2 1.2 Matrix ifferentiation........................
More informationRank, Trace, Determinant, Transpose an Inverse of a Matrix Let A be an n n square matrix: A = a11 a1 a1n a1 a an a n1 a n a nn nn where is the jth col
Review of Linear Algebra { E18 Hanout Vectors an Their Inner Proucts Let X an Y be two vectors: an Their inner prouct is ene as X =[x1; ;x n ] T Y =[y1; ;y n ] T (X; Y ) = X T Y = x k y k k=1 where T an
More informationTable of Common Derivatives By David Abraham
Prouct an Quotient Rules: Table of Common Derivatives By Davi Abraham [ f ( g( ] = [ f ( ] g( + f ( [ g( ] f ( = g( [ f ( ] g( g( f ( [ g( ] Trigonometric Functions: sin( = cos( cos( = sin( tan( = sec
More informationSYNCHRONOUS SEQUENTIAL CIRCUITS
CHAPTER SYNCHRONOUS SEUENTIAL CIRCUITS Registers an counters, two very common synchronous sequential circuits, are introuce in this chapter. Register is a igital circuit for storing information. Contents
More informationConservation Laws. Chapter Conservation of Energy
20 Chapter 3 Conservation Laws In orer to check the physical consistency of the above set of equations governing Maxwell-Lorentz electroynamics [(2.10) an (2.12) or (1.65) an (1.68)], we examine the action
More informationCapacity Analysis of MIMO Systems with Unknown Channel State Information
Capacity Analysis of MIMO Systems with Unknown Channel State Information Jun Zheng an Bhaskar D. Rao Dept. of Electrical an Computer Engineering University of California at San Diego e-mail: juzheng@ucs.eu,
More informationAgmon Kolmogorov Inequalities on l 2 (Z d )
Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,
More informationApplications of the Wronskian to ordinary linear differential equations
Physics 116C Fall 2011 Applications of the Wronskian to orinary linear ifferential equations Consier a of n continuous functions y i (x) [i = 1,2,3,...,n], each of which is ifferentiable at least n times.
More informationOptimal Variable-Structure Control Tracking of Spacecraft Maneuvers
Optimal Variable-Structure Control racking of Spacecraft Maneuvers John L. Crassiis 1 Srinivas R. Vaali F. Lanis Markley 3 Introuction In recent years, much effort has been evote to the close-loop esign
More informationQubit channels that achieve capacity with two states
Qubit channels that achieve capacity with two states Dominic W. Berry Department of Physics, The University of Queenslan, Brisbane, Queenslan 4072, Australia Receive 22 December 2004; publishe 22 March
More informationAcute sets in Euclidean spaces
Acute sets in Eucliean spaces Viktor Harangi April, 011 Abstract A finite set H in R is calle an acute set if any angle etermine by three points of H is acute. We examine the maximal carinality α() of
More informationPure Further Mathematics 1. Revision Notes
Pure Further Mathematics Revision Notes June 20 2 FP JUNE 20 SDB Further Pure Complex Numbers... 3 Definitions an arithmetical operations... 3 Complex conjugate... 3 Properties... 3 Complex number plane,
More informationALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS
ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS MARK SCHACHNER Abstract. When consiere as an algebraic space, the set of arithmetic functions equippe with the operations of pointwise aition an
More informationTime-of-Arrival Estimation in Non-Line-Of-Sight Environments
2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor
More informationSpace-time Linear Dispersion Using Coordinate Interleaving
Space-time Linear Dispersion Using Coorinate Interleaving Jinsong Wu an Steven D Blostein Department of Electrical an Computer Engineering Queen s University, Kingston, Ontario, Canaa, K7L3N6 Email: wujs@ieeeorg
More informationTwo formulas for the Euler ϕ-function
Two formulas for the Euler ϕ-function Robert Frieman A multiplication formula for ϕ(n) The first formula we want to prove is the following: Theorem 1. If n 1 an n 2 are relatively prime positive integers,
More information'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21
Large amping in a structural material may be either esirable or unesirable, epening on the engineering application at han. For example, amping is a esirable property to the esigner concerne with limiting
More informationarxiv: v1 [cs.lg] 22 Mar 2014
CUR lgorithm with Incomplete Matrix Observation Rong Jin an Shenghuo Zhu Dept. of Computer Science an Engineering, Michigan State University, rongjin@msu.eu NEC Laboratories merica, Inc., zsh@nec-labs.com
More informationLecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012
CS-6 Theory Gems November 8, 0 Lecture Lecturer: Alesaner Mąry Scribes: Alhussein Fawzi, Dorina Thanou Introuction Toay, we will briefly iscuss an important technique in probability theory measure concentration
More informationEVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION OF UNIVARIATE TAYLOR SERIES
MATHEMATICS OF COMPUTATION Volume 69, Number 231, Pages 1117 1130 S 0025-5718(00)01120-0 Article electronically publishe on February 17, 2000 EVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION
More informationOn the enumeration of partitions with summands in arithmetic progression
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 8 (003), Pages 149 159 On the enumeration of partitions with summans in arithmetic progression M. A. Nyblom C. Evans Department of Mathematics an Statistics
More informationLaplacian Cooperative Attitude Control of Multiple Rigid Bodies
Laplacian Cooperative Attitue Control of Multiple Rigi Boies Dimos V. Dimarogonas, Panagiotis Tsiotras an Kostas J. Kyriakopoulos Abstract Motivate by the fact that linear controllers can stabilize the
More informationu!i = a T u = 0. Then S satisfies
Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace
More informationThis module is part of the. Memobust Handbook. on Methodology of Modern Business Statistics
This moule is part of the Memobust Hanbook on Methoology of Moern Business Statistics 26 March 2014 Metho: Balance Sampling for Multi-Way Stratification Contents General section... 3 1. Summary... 3 2.
More informationA Note on Exact Solutions to Linear Differential Equations by the Matrix Exponential
Avances in Applie Mathematics an Mechanics Av. Appl. Math. Mech. Vol. 1 No. 4 pp. 573-580 DOI: 10.4208/aamm.09-m0946 August 2009 A Note on Exact Solutions to Linear Differential Equations by the Matrix
More informationSYSTEMS OF DIFFERENTIAL EQUATIONS, EULER S FORMULA. where L is some constant, usually called the Lipschitz constant. An example is
SYSTEMS OF DIFFERENTIAL EQUATIONS, EULER S FORMULA. Uniqueness for solutions of ifferential equations. We consier the system of ifferential equations given by x = v( x), () t with a given initial conition
More informationMulti-View Clustering via Canonical Correlation Analysis
Technical Report TTI-TR-2008-5 Multi-View Clustering via Canonical Correlation Analysis Kamalika Chauhuri UC San Diego Sham M. Kakae Toyota Technological Institute at Chicago ABSTRACT Clustering ata in
More informationNOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy,
NOTES ON EULER-BOOLE SUMMATION JONATHAN M BORWEIN, NEIL J CALKIN, AND DANTE MANNA Abstract We stuy a connection between Euler-MacLaurin Summation an Boole Summation suggeste in an AMM note from 196, which
More informationPerfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs
Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Ashish Goel Michael Kapralov Sanjeev Khanna Abstract We consier the well-stuie problem of fining a perfect matching in -regular bipartite
More informationLeaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes
Leaving Ranomness to Nature: -Dimensional Prouct Coes through the lens of Generalize-LDPC coes Tavor Baharav, Kannan Ramchanran Dept. of Electrical Engineering an Computer Sciences, U.C. Berkeley {tavorb,
More informationLinear Algebra- Review And Beyond. Lecture 3
Linear Algebra- Review An Beyon Lecture 3 This lecture gives a wie range of materials relate to matrix. Matrix is the core of linear algebra, an it s useful in many other fiels. 1 Matrix Matrix is the
More informationPhysics 251 Results for Matrix Exponentials Spring 2017
Physics 25 Results for Matrix Exponentials Spring 27. Properties of the Matrix Exponential Let A be a real or complex n n matrix. The exponential of A is efine via its Taylor series, e A A n = I + n!,
More informationTechnion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels.
Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Constraine Coes for Two-Dimensional Channels Keren Censor Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Technion
More informationFree rotation of a rigid body 1 D. E. Soper 2 University of Oregon Physics 611, Theoretical Mechanics 5 November 2012
Free rotation of a rigi boy 1 D. E. Soper 2 University of Oregon Physics 611, Theoretical Mechanics 5 November 2012 1 Introuction In this section, we escribe the motion of a rigi boy that is free to rotate
More information7.1 Support Vector Machine
67577 Intro. to Machine Learning Fall semester, 006/7 Lecture 7: Support Vector Machines an Kernel Functions II Lecturer: Amnon Shashua Scribe: Amnon Shashua 7. Support Vector Machine We return now to
More informationSYMMETRIC KRONECKER PRODUCTS AND SEMICLASSICAL WAVE PACKETS
SYMMETRIC KRONECKER PRODUCTS AND SEMICLASSICAL WAVE PACKETS GEORGE A HAGEDORN AND CAROLINE LASSER Abstract We investigate the iterate Kronecker prouct of a square matrix with itself an prove an invariance
More informationOptimization of Geometries by Energy Minimization
Optimization of Geometries by Energy Minimization by Tracy P. Hamilton Department of Chemistry University of Alabama at Birmingham Birmingham, AL 3594-140 hamilton@uab.eu Copyright Tracy P. Hamilton, 1997.
More information1 Math 285 Homework Problem List for S2016
1 Math 85 Homework Problem List for S016 Note: solutions to Lawler Problems will appear after all of the Lecture Note Solutions. 1.1 Homework 1. Due Friay, April 8, 016 Look at from lecture note exercises:
More informationHomework 3 - Solutions
Homework 3 - Solutions The Transpose an Partial Transpose. 1 Let { 1, 2,, } be an orthonormal basis for C. The transpose map efine with respect to this basis is a superoperator Γ that acts on an operator
More informationRobustness and Perturbations of Minimal Bases
Robustness an Perturbations of Minimal Bases Paul Van Dooren an Froilán M Dopico December 9, 2016 Abstract Polynomial minimal bases of rational vector subspaces are a classical concept that plays an important
More informationOne-dimensional I test and direction vector I test with array references by induction variable
Int. J. High Performance Computing an Networking, Vol. 3, No. 4, 2005 219 One-imensional I test an irection vector I test with array references by inuction variable Minyi Guo School of Computer Science
More informationON THE OPTIMALITY SYSTEM FOR A 1 D EULER FLOW PROBLEM
ON THE OPTIMALITY SYSTEM FOR A D EULER FLOW PROBLEM Eugene M. Cliff Matthias Heinkenschloss y Ajit R. Shenoy z Interisciplinary Center for Applie Mathematics Virginia Tech Blacksburg, Virginia 46 Abstract
More informationThe Exact Form and General Integrating Factors
7 The Exact Form an General Integrating Factors In the previous chapters, we ve seen how separable an linear ifferential equations can be solve using methos for converting them to forms that can be easily
More informationUnit vectors with non-negative inner products
Unit vectors with non-negative inner proucts Bos, A.; Seiel, J.J. Publishe: 01/01/1980 Document Version Publisher s PDF, also known as Version of Recor (inclues final page, issue an volume numbers) Please
More informationA simple model for the small-strain behaviour of soils
A simple moel for the small-strain behaviour of soils José Jorge Naer Department of Structural an Geotechnical ngineering, Polytechnic School, University of São Paulo 05508-900, São Paulo, Brazil, e-mail:
More informationImproving Estimation Accuracy in Nonrandomized Response Questioning Methods by Multiple Answers
International Journal of Statistics an Probability; Vol 6, No 5; September 207 ISSN 927-7032 E-ISSN 927-7040 Publishe by Canaian Center of Science an Eucation Improving Estimation Accuracy in Nonranomize
More informationImplicit Differentiation
Implicit Differentiation Thus far, the functions we have been concerne with have been efine explicitly. A function is efine explicitly if the output is given irectly in terms of the input. For instance,
More informationLower Bounds for the Smoothed Number of Pareto optimal Solutions
Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.
More informationIntroduction to Markov Processes
Introuction to Markov Processes Connexions moule m44014 Zzis law Gustav) Meglicki, Jr Office of the VP for Information Technology Iniana University RCS: Section-2.tex,v 1.24 2012/12/21 18:03:08 gustav
More informationLeChatelier Dynamics
LeChatelier Dynamics Robert Gilmore Physics Department, Drexel University, Philaelphia, Pennsylvania 1914, USA (Date: June 12, 28, Levine Birthay Party: To be submitte.) Dynamics of the relaxation of a
More informationarxiv:hep-th/ v1 3 Feb 1993
NBI-HE-9-89 PAR LPTHE 9-49 FTUAM 9-44 November 99 Matrix moel calculations beyon the spherical limit arxiv:hep-th/93004v 3 Feb 993 J. Ambjørn The Niels Bohr Institute Blegamsvej 7, DK-00 Copenhagen Ø,
More informationChapter 6: Energy-Momentum Tensors
49 Chapter 6: Energy-Momentum Tensors This chapter outlines the general theory of energy an momentum conservation in terms of energy-momentum tensors, then applies these ieas to the case of Bohm's moel.
More informationOptimal Sequences and Sum Capacity of Synchronous CDMA Systems
Optimal Sequences and Sum Capacity of Synchronous CDMA Systems Pramod Viswanath and Venkat Anantharam {pvi, ananth}@eecs.berkeley.edu EECS Department, U C Berkeley CA 9470 Abstract The sum capacity of
More informationHyperbolic Moment Equations Using Quadrature-Based Projection Methods
Hyperbolic Moment Equations Using Quarature-Base Projection Methos J. Koellermeier an M. Torrilhon Department of Mathematics, RWTH Aachen University, Aachen, Germany Abstract. Kinetic equations like the
More informationinflow outflow Part I. Regular tasks for MAE598/494 Task 1
MAE 494/598, Fall 2016 Project #1 (Regular tasks = 20 points) Har copy of report is ue at the start of class on the ue ate. The rules on collaboration will be release separately. Please always follow the
More informationSchrödinger s equation.
Physics 342 Lecture 5 Schröinger s Equation Lecture 5 Physics 342 Quantum Mechanics I Wenesay, February 3r, 2010 Toay we iscuss Schröinger s equation an show that it supports the basic interpretation of
More informationStable and compact finite difference schemes
Center for Turbulence Research Annual Research Briefs 2006 2 Stable an compact finite ifference schemes By K. Mattsson, M. Svär AND M. Shoeybi. Motivation an objectives Compact secon erivatives have long
More informationIntroduction to the Vlasov-Poisson system
Introuction to the Vlasov-Poisson system Simone Calogero 1 The Vlasov equation Consier a particle with mass m > 0. Let x(t) R 3 enote the position of the particle at time t R an v(t) = ẋ(t) = x(t)/t its
More informationPDE Notes, Lecture #11
PDE Notes, Lecture # from Professor Jalal Shatah s Lectures Febuary 9th, 2009 Sobolev Spaces Recall that for u L loc we can efine the weak erivative Du by Du, φ := udφ φ C0 If v L loc such that Du, φ =
More informationCalculus in the AP Physics C Course The Derivative
Limits an Derivatives Calculus in the AP Physics C Course The Derivative In physics, the ieas of the rate change of a quantity (along with the slope of a tangent line) an the area uner a curve are essential.
More informationCalculus of Variations
16.323 Lecture 5 Calculus of Variations Calculus of Variations Most books cover this material well, but Kirk Chapter 4 oes a particularly nice job. x(t) x* x*+ αδx (1) x*- αδx (1) αδx (1) αδx (1) t f t
More informationTOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH
English NUMERICAL MATHEMATICS Vol14, No1 Series A Journal of Chinese Universities Feb 2005 TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH He Ming( Λ) Michael K Ng(Ξ ) Abstract We
More informationNecessary and Sufficient Conditions for Sketched Subspace Clustering
Necessary an Sufficient Conitions for Sketche Subspace Clustering Daniel Pimentel-Alarcón, Laura Balzano 2, Robert Nowak University of Wisconsin-Maison, 2 University of Michigan-Ann Arbor Abstract This
More informationInterpretation of the Multi-Stage Nested Wiener Filter in the Krylov Subspace Framework
Interpretation of the Multi-Stage Neste Wiener Filter in the Krylov Subspace Framework M. Joham an M. D. Zoltowski School of Electrical Engineering, Purue University, West Lafayette, IN 47907-285 e-mail:
More informationLECTURE NOTES ON DVORETZKY S THEOREM
LECTURE NOTES ON DVORETZKY S THEOREM STEVEN HEILMAN Abstract. We present the first half of the paper [S]. In particular, the results below, unless otherwise state, shoul be attribute to G. Schechtman.
More informationParameter estimation: A new approach to weighting a priori information
Parameter estimation: A new approach to weighting a priori information J.L. Mea Department of Mathematics, Boise State University, Boise, ID 83725-555 E-mail: jmea@boisestate.eu Abstract. We propose a
More informationOn the Aloha throughput-fairness tradeoff
On the Aloha throughput-fairness traeoff 1 Nan Xie, Member, IEEE, an Steven Weber, Senior Member, IEEE Abstract arxiv:1605.01557v1 [cs.it] 5 May 2016 A well-known inner boun of the stability region of
More informationState observers and recursive filters in classical feedback control theory
State observers an recursive filters in classical feeback control theory State-feeback control example: secon-orer system Consier the riven secon-orer system q q q u x q x q x x x x Here u coul represent
More informationTopic 7: Convergence of Random Variables
Topic 7: Convergence of Ranom Variables Course 003, 2016 Page 0 The Inference Problem So far, our starting point has been a given probability space (S, F, P). We now look at how to generate information
More informationd dx But have you ever seen a derivation of these results? We ll prove the first result below. cos h 1
Lecture 5 Some ifferentiation rules Trigonometric functions (Relevant section from Stewart, Seventh Eition: Section 3.3) You all know that sin = cos cos = sin. () But have you ever seen a erivation of
More informationProof of SPNs as Mixture of Trees
A Proof of SPNs as Mixture of Trees Theorem 1. If T is an inuce SPN from a complete an ecomposable SPN S, then T is a tree that is complete an ecomposable. Proof. Argue by contraiction that T is not a
More informationLectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs
Lectures - Week 10 Introuction to Orinary Differential Equations (ODES) First Orer Linear ODEs When stuying ODEs we are consiering functions of one inepenent variable, e.g., f(x), where x is the inepenent
More informationMath 774 Homework 3. Austin Mohr. October 11, Let µ be the usual Möbius function, namely 0, if n has a repeated prime factor; µ(d) = 0,
Math 774 Homework 3 Austin Mohr October 11, 010 Problem 1 Let µ be the usual Möbius function, namely 0, if n has a repeate prime factor; µ(n = 1, if n = 1; ( 1 k, if n is a prouct of k istinct primes.
More informationDiagonalization of Matrices Dr. E. Jacobs
Diagonalization of Matrices Dr. E. Jacobs One of the very interesting lessons in this course is how certain algebraic techniques can be use to solve ifferential equations. The purpose of these notes is
More informationSliding mode approach to congestion control in connection-oriented communication networks
JOURNAL OF APPLIED COMPUTER SCIENCE Vol. xx. No xx (200x), pp. xx-xx Sliing moe approach to congestion control in connection-oriente communication networks Anrzej Bartoszewicz, Justyna Żuk Technical University
More informationCharacterizing Real-Valued Multivariate Complex Polynomials and Their Symmetric Tensor Representations
Characterizing Real-Value Multivariate Complex Polynomials an Their Symmetric Tensor Representations Bo JIANG Zhening LI Shuzhong ZHANG December 31, 2014 Abstract In this paper we stuy multivariate polynomial
More informationLower bounds on Locality Sensitive Hashing
Lower bouns on Locality Sensitive Hashing Rajeev Motwani Assaf Naor Rina Panigrahy Abstract Given a metric space (X, X ), c 1, r > 0, an p, q [0, 1], a istribution over mappings H : X N is calle a (r,
More informationMany problems in physics, engineering, and chemistry fall in a general class of equations of the form. d dx. d dx
Math 53 Notes on turm-liouville equations Many problems in physics, engineering, an chemistry fall in a general class of equations of the form w(x)p(x) u ] + (q(x) λ) u = w(x) on an interval a, b], plus
More informationComputing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions
Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5
More informationVIRTUAL STRUCTURE BASED SPACECRAFT FORMATION CONTROL WITH FORMATION FEEDBACK
AIAA Guiance, Navigation, an Control Conference an Exhibit 5-8 August, Monterey, California AIAA -9 VIRTUAL STRUCTURE BASED SPACECRAT ORMATION CONTROL WITH ORMATION EEDBACK Wei Ren Ranal W. Bear Department
More informationarxiv: v1 [math.mg] 10 Apr 2018
ON THE VOLUME BOUND IN THE DVORETZKY ROGERS LEMMA FERENC FODOR, MÁRTON NASZÓDI, AND TAMÁS ZARNÓCZ arxiv:1804.03444v1 [math.mg] 10 Apr 2018 Abstract. The classical Dvoretzky Rogers lemma provies a eterministic
More informationProblem Sheet 2: Eigenvalues and eigenvectors and their use in solving linear ODEs
Problem Sheet 2: Eigenvalues an eigenvectors an their use in solving linear ODEs If you fin any typos/errors in this problem sheet please email jk28@icacuk The material in this problem sheet is not examinable
More informationensembles When working with density operators, we can use this connection to define a generalized Bloch vector: v x Tr x, v y Tr y
Ph195a lecture notes, 1/3/01 Density operators for spin- 1 ensembles So far in our iscussion of spin- 1 systems, we have restricte our attention to the case of pure states an Hamiltonian evolution. Toay
More informationA Path Planning Method Using Cubic Spiral with Curvature Constraint
A Path Planning Metho Using Cubic Spiral with Curvature Constraint Tzu-Chen Liang an Jing-Sin Liu Institute of Information Science 0, Acaemia Sinica, Nankang, Taipei 5, Taiwan, R.O.C., Email: hartree@iis.sinica.eu.tw
More informationError Floors in LDPC Codes: Fast Simulation, Bounds and Hardware Emulation
Error Floors in LDPC Coes: Fast Simulation, Bouns an Harware Emulation Pamela Lee, Lara Dolecek, Zhengya Zhang, Venkat Anantharam, Borivoje Nikolic, an Martin J. Wainwright EECS Department University of
More informationMEASURES WITH ZEROS IN THE INVERSE OF THEIR MOMENT MATRIX
MEASURES WITH ZEROS IN THE INVERSE OF THEIR MOMENT MATRIX J. WILLIAM HELTON, JEAN B. LASSERRE, AND MIHAI PUTINAR Abstract. We investigate an iscuss when the inverse of a multivariate truncate moment matrix
More informationFunction Spaces. 1 Hilbert Spaces
Function Spaces A function space is a set of functions F that has some structure. Often a nonparametric regression function or classifier is chosen to lie in some function space, where the assume structure
More informationThe derivative of a function f(x) is another function, defined in terms of a limiting expression: f(x + δx) f(x)
Y. D. Chong (2016) MH2801: Complex Methos for the Sciences 1. Derivatives The erivative of a function f(x) is another function, efine in terms of a limiting expression: f (x) f (x) lim x δx 0 f(x + δx)
More informationTEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE
TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS Yannick DEVILLE Université Paul Sabatier Laboratoire Acoustique, Métrologie, Instrumentation Bât. 3RB2, 8 Route e Narbonne,
More informationTractability results for weighted Banach spaces of smooth functions
Tractability results for weighte Banach spaces of smooth functions Markus Weimar Mathematisches Institut, Universität Jena Ernst-Abbe-Platz 2, 07740 Jena, Germany email: markus.weimar@uni-jena.e March
More information