Optimal CDMA Signatures: A Finite-Step Approach

Size: px
Start display at page:

Download "Optimal CDMA Signatures: A Finite-Step Approach"

Transcription

1 Optimal CDMA Signatures: A Finite-Step Approach Joel A. Tropp Inst. for Comp. Engr. an Sci. (ICES) 1 University Station C000 Austin, TX 7871 jtropp@ices.utexas.eu Inerjit. S. Dhillon Dept. of Comp. Sci. 1 University Station C0500 Austin, TX 7871 inerjit@cs.utexas.eu Robert W. Heath Jr. Dept. of Elect. an Comp. Engr. 1 University Station C0803 Austin, TX USA rheath@ece.utexas.eu Abstract A escription of optimal sequences for irect-sprea coe ivision multiple access is a byprouct of recent characterizations of the sum capacity. This papers restates the sequence esign problem as an inverse singular value problem an shows that it can be solve with finite-step algorithms from matrix analysis. Relevant algorithms are reviewe an a new one-sie construction is propose that obtains the sequences irectly instea of computing the Gram matrix of the optimal signatures. I. INTRODUCTION The problem of sequence sequences to maximize the sum capacity of symbol-synchronous irect-sprea coe ivision multiple access system (henceforth S-CDMA) has receive significant attention in the information theory community over the last ecae, e.g. [1] [7]. Despite this work, the algorithms propose to fin optimal signatures have not exploite the observation that the signature esign problem can be characterize as an inverse singular value problem [8]. Thus researchers have been unable to exploit the wealth of algorithms evelope in the matrix theory community uring the past two ecaes [9], [10]. In this paper we present the signature esign problem from a new perspective: as the solution to an inverse singular value problem. In short, optimal sequences are intimately connecte to matrices that satisfy certain conitions on their column norms an singular spectrum; these constraints are etermine by the user power requirements an the noise covariance. This matrix analysis point-of-view allows us to leverage existing algorithms for solving inverse singular value problems to evelop numerically stable, finite algorithms for solving the sequence esign problem. Unlike iterative algorithms, e.g. [4], [7], [11], convergence is not an issue for finite-step algorithms since they are guarantee to solve the state problem. The specific contributions of this paper are two-fol. First we present a summary of relevant finite-step algorithms from matrix analysis that will be useful for researchers working in sequence esign. We focus on the algorithms by Benel- Mickey [9], Chan-Li [10] an Davies-Higham [1]. Secon, we present a new one-sie, finite algorithm that prouces the signature sequences irectly instea of computing their Gram matrix. This metho has very moest time an space requirements in comparison with the other techniques we iscuss. Throughout we focus on the case of complex signatures exclusively because it subsumes the real case without any aitional ifficulty of argument. II. BACKGROUND A. Synchronous DS-CDMA Consier the uplink of an S-CDMA system with N users an a processing gain of. Assume that N>, since the analysis of the other case is straightforwar. Define a N matrix whose columns are the signatures: S ef = s 1 s... s N. Let S to enote the (conjugate) transpose of S. Note that (S S) nn =1for each n =1,...,N. Assume that user n has an average power w n an collect them in the iagonal matrix W ef =iag(w 1,w,...,w N ). It is often more convenient to absorb the power constraints into the signatures, so we also efine the weighte signature matrix X ef = SW 1/. Denote the n-th column of X as x n. For each n, one has the relationship (X X ) nn = x n = w n. (1) Finally, let Σ enote the covariance matrix of the noise. Viswanath an Anantharam have proven in [5] that, for real signatures, the sum capacity of the S-CDMA channel per egree of freeom is given by the expression (in the complex case, the sum capacity iffers by a constant factor) C sum = 1 max log et(i + Σ 1 SWS ). () S The basic sequence esign problem is to prouce a signature matrix S that solves the optimization problem (). Various specializations have been consiere with equal user powers, white noise, unequal user powers, an colore noise. We will show how each of these cases results in an inverse singular value problem. B. A Sum Capacity Boun In [1], Rupf an Massey prouce an upper boun on the sum capacity uner white noise with variance σ : ( C sum 1 log 1+ Tr W ) σ (3) where Tr ( ) inicates the trace operator. They also establishe a necessary an sufficient conition on the signatures for equality to be attaine in the boun (3): XX = SWS = Tr W I. (4) A matrix X that satisfies (4) is known as a tight frame [13] or a general Welch-Boun-Equality sequence (gwbe) []. A

2 conition equivalent to (4) is that X X = Tr W P (5) where the matrix P represents an orthogonal projector from C N onto a subspace of imension. Recall that an orthogonal projector is an iempotent, Hermitian matrix. That is, P = P an P = P. An orthogonal projector is also characterize as a Hermitian matrix whose nonzero eigenvalues are ientically equal to one. In light of equation (1), the problem of constructing optimal signature sequences in the present setting is closely relate to the problem of constructing an orthogonal projector with a specifie iagonal. C. White Noise, Equal Powers Consier the case where the power constraints are equal, viz. W = w I N for some positive number w. Then conition (4) for equality to hol in (3) becomes w 1 XX = SS = N I. (6) A matrix S which satisfies (6) is known as a unit-norm tight frame (UNTF) [13] or a Welch-Boun-Equality sequence (WBE) [1]. In fact, there always exist signature matrices that satisfy conition (6), an so the upper boun on the sum capacity can always be attaine when the users power constraints are equal [1]. The equation (6) can also be interprete as a restriction on the singular values of the signature matrix. Uner the assumptions of white noise an equal power constraints, a matrix S yiels optimal signatures if an only if 1) each column of S has unit-norm an ) the nonzero singular values of S are ientically equal to N/. Therefore, this sequence esign problem falls into the category of structure inverse singular value problems. Note that conition 1) must hol irrespective of the type of noise. D. Majorization The boun (3) cannot be met for an arbitrary set of power constraints. The explanation requires some backgroun in majorization [14]. Essentially, majorization efines a partial orering that allows two vectors of equal norm to be compare. A vector w majorizes λ (written w λ ) if all the partial sums of the entries of w are greater than or equal to the partial sums of λ. It turns out that majorization efines the precise relationship between the iagonal entries of a Hermitian matrix an its spectrum (see [14], [15] for etails). Theorem 1 (Schur-Horn [15]): The iagonal entries of a Hermitian matrix majorize its eigenvalues. Conversely, if w λ, there exists a Hermitian matrix with iagonal elements liste by w an eigenvalues liste by λ. E. White Noise, Unequal Powers The Schur-Horn Theorem forbis the construction of an orthogonal projector with arbitrary iagonal entries. For this reason, (5) cannot always hol, an the upper boun (3) cannot always be attaine. The key result of [] is a complete characterization of the sum capacity of the S-CDMA channel uner white noise. Viswanath an Anantharam emonstrate that oversize users those whose power constraints are too large relative to the others for the majorization conition to hol must receive their own orthogonal channels to maximize the sum capacity of the system, an they provie a simple metho of etermining which users are oversize. The other users share the remaining imensions equitably. Suppose that there are m < oversize users, whose signatures form the columns of S 0. Let the columns of S 1 list the signatures of the (N m) remaining users, an let the iagonal matrix W 1 list their power constraints. The conitions for achieving sum capacity follow. 1) The m oversize users receive orthogonal signatures: S 0 S 0 = I m. ) The remaining (N m) signatures are also orthogonal to the oversize users signatures: S 0 S 1 = 0. 3) The remaining users signatures satisfy S 1 W 1 S1 = Tr W 1 m I m. Repeat the foregoing arguments to see that the sequence esign problem still amounts to constructing a matrix with given column norms an singular spectrum. It is therefore an inverse singular value problem. F. Colore Noise, Unequal Powers When the noise is colore, the situation is somewhat more complicate. Nevertheless, optimal sequence esign still boils own to constructing a matrix with given column norms an singular spectrum. Viswanath an Anantharam show that the following proceure will solve the problem [5]. 1) Compute an eigenvalue ecomposition of the noise covariance matrix, Σ = QDQ, where D =iagσ for some non-negative vector σ. ) Use Algorithm A of [5] to etermine µ, the Schurminimal element of the set of possible eigenvalues of SWS + Σ. 3) Form the vector λ ef = µ σ. 4) Compute an auxiliary signature matrix T with unit-norm columns so that TWT =iagλ. 5) The optimal signature matrix is S ef = QT. The computation in step (4) is equivalent to proucing a N matrix X ef = TW 1/. The columns of X must have square norms liste by the iagonal of W. The vector λ must list the nonzero square singular values of X. This is another inverse singular value problem. III. CONSTRUCTING CORRELATION MATRICES A positive semi-efinite Hermitian matrix with a unit iagonal is known as a correlation matrix [1]. The Gram matrix A ef = S S of an optimal signature matrix S is always a correlation matrix. Every correlation matrix with the appropriate spectrum can be factore to prouce optimal signature matrices [1]. Therefore, we begin with a technique for constructing correlation matrices with a preassigne spectrum.

3 A. The Benel-Mickey Algorithm In 1978, Benel an Mickey presente an algorithm that uses a finite sequence of rotations to convert an arbitrary N N Hermitian matrix with trace N into a unit-iagonal matrix that has the same spectrum [9]. We follow the superb exposition of Davies an Higham [1]. Brief iscussions appear on page 76 of Horn an Johnson [15] an in Problems an 8.4. of Golub an van Loan [16]. Suppose that A M N is a Hermitian matrix with Tr A = N. (Let M N enote the set of complex N N matrices an M,N to enote the set of complex N matrices.) If A oes not have a unit iagonal, one can locate two iagonal elements so that a jj < 1 <a kk ; otherwise, the trace conition woul be violate. It is then possible to construct a real plane rotation Q in the jk-plane so that (Q AQ) jj =1. The transformation A Q AQ preserves the conjugate symmetry an the spectrum of A but reuces the number of non-unit iagonal entries by at least one. Thus, at most (N 1) rotations are require before the resulting matrix has a unit iagonal. The appropriate form of the rotation is easy to iscover, but the following erivation is essential to ensure numerical stability. Recall that a two-imensional plane rotation is an orthogonal matrix of the form c s Q = s c where c + s =1[16]. The corresponing plane rotation in the jk-plane is the N-imensional ientity matrix with its jj, jk, kj an kk entries replace by the entries of the twoimensional rotation. Let j<kbe inices so that a jj < 1 <a kk or a kk < 1 <a jj. The esire plane rotation yiels the matrix equation c s ajj a jk c s 1 ãjk s c a = jk a kk s c ã jk ã kk where c + s =1. The equality of the upper-left entries can be state as c a jj sc Re a jk + s a kk =1. This equation is quaratic in t = s/c: whence (a kk 1) t t Re a jk +(a jj 1) = 0 t = Re a jk ± (Re a jk ) (a jj 1)(a kk 1). (7) a kk 1 Notice that the choice of j an k guarantees a positive iscriminant. As is stanar in numerical analysis, the ± sign in (7) must be taken to avoi cancelations. If necessary, one can extract the other root using the fact that the prouct of the roots equals (a jj 1)/(a kk 1). Finally, 1 1+t an s = ct. (8) Floating-point arithmetic is inexact, so the rotation may not yiel a jj =1. A better implementation sets a jj =1explicitly. Davies an Higham prove that the Benel-Mickey algorithm is backwar stable, so long as it is implemente the way we have escribe [1]. We restate the algorithm. Algorithm 1 (Benel-Mickey): Given Hermitian A M N with Tr A = N, this algorithm yiels a correlation matrix whose eigenvalues are ientical with those of A. 1) While some iagonal entry a jj 1, repeat Steps 4. ) Fin an inex k (without loss of generality j<k) for which a jj < 1 <a kk or a kk < 1 <a jj. 3) Determine a plane rotation Q in the jk-plane using equations (7) an (8). 4) Replace A by Q AQ. Set a jj =1. Since the loop executes no more than (N 1) times, the total cost of the algorithm is no more 1N real floating-point operations, to highest orer, if conjugate symmetry is exploite. The plane rotations never nee to be generate explicitly, an all the intermeiate matrices are Hermitian. Therefore, the algorithm must store only N(N +1)/ complex floatingpoint numbers. MATLAB 6 contains a version of Algorithm 1 that starts with a ranom matrix of specifie spectrum. The comman is gallery( rancorr,...). It shoul be clear that a similar algorithm can be applie to any Hermitian matrix A to prouce another Hermitian matrix with the same spectrum but whose iagonal entries are ientically equal to Tr A/N. The columns of S must form an orthogonal basis for the column space of A ef = S S accoring to (6). Therefore, one can use a rank-revealing QR factorization to extract a signature sequence S from the output A of Algorithm 1 [16]. B. The Davies-Higham Algorithm The methos of the last section can be moifie to compute the signature sequence irectly without recourse to an aitional QR factorization. Any correlation matrix A M N can be expresse as the prouct S S where S M r,n has columns of unit norm an imension r rank A. With this factorization, the two-sie transformation A Q AQ is equivalent to a one-sie transformation S SQ. In consequence, the machinery of the Benel-Mickey algorithm requires little ajustment to prouce these factors. We refer to the one-sie version as the Davies-Higham algorithm in view of [1]. We have observe that it can also be use to fin the factors of an N-imensional correlation matrix with rank r<n, in which case S may take imensions N for any r. Algorithm (Davies-Higham): Given S M,N for which Tr S S = N, this proceure yiels a N matrix with the same singular values as S but with unit-norm columns. 1) Calculate an store the column norms of S. ) While some column has norm s j 1, repeat Steps ) Fin inices j<kfor which s j < 1 < s k or s k < 1 < s j.

4 4) Form the quantities a jj = s j, a jk = s k, s j an a kk = s k. 5) Determine a rotation Q in the jk-plane using equations (7) an (8). 6) Replace S by SQ. 7) Upate the two column norms that have change. Step (1) requires 4N real floating-point operations, an the remaining steps require 1N real floating-point operations to highest orer. The algorithm requires the storage of N complex floating-point numbers an N real numbers for the current column norms. Davies an Higham remark that the algorithm is numerically stable [1]. IV. CHAN-LI ANDITS VARIANTS Now we iscuss a simple technique for constructing a limite selection of Hermitian matrices with prescribe iagonal an spectrum. This is the core problem for the unequal power case with white or colore noise because every optimal weighte signature sequence has a Gram matrix A ef = X X with fixe iagonal an spectrum (an conversely). The algorithm begins with a iagonal matrix of eigenvalues an applies a sequence of rotations to impose the power constraints. A similar technique can be use to buil optimal weighte signature sequences X irectly. A. The Chan-Li Algorithm Chan an Li present a beautiful, constructive proof of converse part of the Schur-Horn Theorem [10]. Suppose that w an λ are N-imensional, real vectors for which w λ. Using inuction on the imension, we show how to construct a Hermitian matrix with iagonal w an spectrum λ. In the sequel, assume without loss of generality that the entries of w an λ have been sorte in ascening orer. Therefore, w (k) = w k an λ (k) = λ k for each k. Suppose that N =. The majorization relation implies λ 1 w 1 w λ. Let A ef =iagλ. We can explicitly construct a plane rotation Q so that the iagonal of Q AQ equals w: [ ] 1 Q ef λ w = 1 w1 λ 1 λ λ 1. (9) w 1 λ 1 λ w 1 Since Q is orthogonal, Q AQ retains spectrum λ but gains iagonal entries w. Suppose that, whenever w λ for vectors of length N 1, we can construct an orthogonal transformation Q so that Q (iag λ)q has iagonal entries w. Consier N-imensional vectors for which w λ. Let A ef = iag λ. The majorization conition implies that λ 1 w 1 w N λ N, so it is always possible to select a least integer j > 1 so that λ j 1 w 1 λ j. Let P 1 be a permutation matrix for which P 1 AP 1 =iag(λ 1,λ j,λ,...,λ j 1,λ j+1,...,λ N ). Observe that λ 1 w 1 λ j an λ 1 λ 1 + λ j w 1 λ j. Thus we may use equation (9), replacing λ with λ j, to construct a plane rotation Q that sets the first entry of Q (iag (λ 1,λ j ))Q to w 1. If we efine the rotation ef Q 0 P = 0 I N then P P1 w1 v AP 1 P = v A N 1 where v is an appropriate vector an A N 1 = iag (λ 1 + λ j w 1,λ,...,λ j 1,λ j+1,...,λ N ). To apply the inuction hypothesis, it remains to check that the vector (w,w 3,...,w N ) majorizes the iagonal of A N 1. We accomplish this in three steps. First, recall that λ k w 1 for k =,...,j 1. Therefore, w k (m 1) w 1 λ k for each m =,...,j 1. The sum on the right-han sie obviously excees the sum of the smallest (m 1) entries of iag A N 1, so the first (j ) majorization inequalities are in force. Secon, use the fact that w λ to calculate that w k = w k w 1 λ k w 1 k=1 k=1 j 1 =(λ 1 + λ j w 1 )+ λ k + λ k k=j+1 for m = j,...,n. Once again, observe that the sum on the right-han sie excees the sum of the smallest (m 1) entries of iag A N 1, so the remaining majorization inequalities are in force. Finally, rearranging the relation N k=1 w k = N k=1 λ k yiels N w k =TrA N 1. In consequence, the inuction furnishes a rotation Q N 1 which sets the iagonal entries of A N 1 equal to the numbers (w,...,w N ). Define ef P 3 = Q N 1 Conjugating A by the orthogonal matrix P = P 1 P P 3 transforms the iagonal entries of A to w while retaining the spectrum λ. The proof yiels the following algorithm. Algorithm 3 (Chan-Li): Let w an λ be vectors with ascening entries an such that w λ. The following proceure computes a real, symmetric matrix with iagonal entries w an eigenvalues λ. 1) Initialize A =iagλ, an put n =1. ) Fin the least j>nso that a j 1,j 1 w n a jj. 3) Use a symmetric permutation to set a n+1,n+1 equal to a jj while shifting iagonal entries n +1,...,j 1 one place own the iagonal. 4) Define a rotation Q in the (n, n +1)-plane with a n+1,n+1 w n a n+1,n+1 a nn, s = 5) Replace A by Q AQ. w n a nn a n+1,n+1 a nn.

5 6) Use a symmetric permutation to re-sort the iagonal entries of A in ascening orer. 7) Increment n, an repeat Steps 7 while n<n. This algorithm requires about 6N real floating-point operations. It requires the storage of about N(N +1)/ real floating-point numbers, incluing the vector w. It is conceptually simpler to perform the permutations escribe in the algorithm, but it can be implemente without them. We have observe that the algorithm given by Viswanath an Anantharam [] for constructing gwbes is similar to the Chan-Li algorithm. Nevertheless, we feel that the simplicity of Chan an Li s presentation merits repetition. B. One-Sie Chan-Li The Chan-Li algorithm only prouces a Gram matrix, which must be factore to obtain the weighte signature matrix. Referring back to the ieas of Davies an Higham, we propose a one-sie version of the Chan-Li algorithm. The benefits are several. It requires less storage an less computation than the Chan-Li algorithm. At the same time, it constructs the factors explicitly. This algorithm has not been publishe before. Algorithm 4 (One-Sie Chan-Li): Suppose that w an λ are non-negative vectors of length N with ascening entries. Assume, moreover, that the first (N ) components of λ are zero an that w λ. The following algorithm prouces a N matrix X whose column norms are liste by w an whose square singular values are liste by λ. 1) Initialize n =1, an set λn +1 X = λn ) Fin the least j>nso that x j 1 w n x j. 3) Move the j-th column of X to the (n +1)-st column, shifting the isplace columns to the right. 4) Define a rotation Q in the (n, n +1)-plane with x n+1 w n w n x n x n+1 x n, s = x n+1 x n. 5) Replace X by XQ. 6) Sort columns (n+1),...,n in orer of increasing norm. 7) Increment n, an repeat Steps 7 while n<n. The algorithm requires 3N real floating-point operations an storage of N( +) real floating-point numbersm incluing the esire column norms an the current column norms. The proceure can be implemente without permutations. V. DISCUSION We have iscusse a group of four algorithms that can be use to prouce sum-capacity-optimal S-CDMA sequences in a wie variety of circumstances. The first algorithm, Benel- Mickey, constructs a Hermitian matrix with a constant iagonal an a prescribe spectrum. This matrix can be factore to yiel an optimal signature sequence for the case of equal user powers, i.e. a unit-norm tight frame. Alternately, the Davies- Higham algorithm can be use to prouce the factors irectly. The thir algorithm, Chan-Li, constructs a Hermitian matrix with an arbitrary iagonal an prescribe spectrum, subject to the majorization conition. The resulting matrix can be factore to obtain an optimal signature sequence for the case of unequal receive powers, i.e. a tight frame. We have also introuce a new variant, the one-sie Chan-Li algorithm, that can calculate the factors irectly. The Benel-Mickey an Davies-Higham algorithms can potentially calculate every correlation matrix an its factors. If they are initialize with ranom matrices, one may interpret the output as a ranom correlation matrix. The factors can be interprete as ranom unit-norm signature sequences. On the other han, the output of the Chan-Li an one-sie Chan-Li algorithms is not encyclopeic. They can construct only a few matrices for each pair (w, λ). These matrices are also likely to have many zero entries, which is unesirable for some applications. In aition, these algorithms only buil real matrices, whereas complex matrices are often of more interest. REFERENCES [1] M. Rupf an J. L. Massey, Optimum sequence multisets for synchronous coe-ivision multiple-access channels, IEEE Trans. Inform. Theory, vol. 40, no. 4, pp , July [] P. Viswanath an V. Anantharam, Optimal sequences an sum capacity of synchronous CDMA systems, IEEE Trans. Inform. Th., vol. 45, no. 6, pp , Sept [3] S. Ulukus an R. D. Yates, Iterative construction of optimum signature sequence sets in synchronous CDMA systems, IEEE Trans. Inform. Theory, vol. 47, no. 5, pp , 001. [4] C. Rose, CDMA coewor optimization: Interference avoiance an convergence via class warfare, IEEE Trans. IT, vol. 47, no. 6, pp , 001. [5] P. Viswanath an A. Anantharam, Optimal sequences for CDMA uner colore noise: A Schur-sale function property, IEEE Trans. IT, vol. 48, no. 6, pp , June 00. [6] P. Anigstein an V. Anantharam, Ensuring convergence of the MMSE iteration for interference avoiance to the global optimum, IEEE Trans. IT, vol. 49, no. 4, pp , April 003. [7] J. A. Tropp, R. W. Heath Jr., an T. Strohmer, Optimal CDMA signature sequences, inverse eigenvalue problems an alternating projection, in Proceeings of the 003 IEEE International Symposium on Information Theory, Yokohama, July 003, p [8] M. T. Chu an G. H. Golub, Structure inverse eigenvalue problems, Acta Numerica, 001. [9] R. B. Benel an M. R. Mickey, Population correlation matrices for sampling experiments, Commun. Statist. Simul. Comp., vol. B7, no., pp , [10] N. N. Chan an K.-H. Li, Diagonal elements an eigenvalues of a real symmetric matrix, J. Math. Anal. Appl., vol. 91, pp , [11] S. Ulukus an R. D. Yates, Iterative construction of optimum signature sequence sets in synchronous CDMA systems, IEEE Trans. IT, vol. 47, no. 5, pp , 001. [1] P. I. Davies an N. J. Higham, Numerically stable generation of correlation matrices an their factors, BIT, vol. 40, no. 4, pp , 000. [13] P. Casazza an J. Kovačević, Equal-norm tight frames with erasures, Av. Comp. Math., 00. [14] A. W. Marshall an I. Olkin, Inequalities: Theory of Majorization an its Applications. Acaemic Press, [15] R. A. Horn an C. R. Johnson, Matrix Analysis. Cambrige University Press, [16] G. H. Golub an C. F. Van Loan, Matrix Computations, 3r e. Johns Hopkins University Press, 1996.

Construction of Equiangular Signatures for Synchronous CDMA Systems

Construction of Equiangular Signatures for Synchronous CDMA Systems Construction of Equiangular Signatures for Synchronous CDMA Systems Robert W Heath Jr Dept of Elect an Comp Engr 1 University Station C0803 Austin, TX 78712-1084 USA rheath@eceutexaseu Joel A Tropp Inst

More information

GENERALIZED FINITE ALGORITHMS FOR CONSTRUCTING HERMITIAN MATRICES WITH PRESCRIBED DIAGONAL AND SPECTRUM

GENERALIZED FINITE ALGORITHMS FOR CONSTRUCTING HERMITIAN MATRICES WITH PRESCRIBED DIAGONAL AND SPECTRUM SIAM J. MATRIX ANAL. APPL. Vol. 27, No. 1, pp. 61 71 c 2005 Society for Industrial and Applied Mathematics GENERALIZED FINITE ALGORITHMS FOR CONSTRUCTING HERMITIAN MATRICES WITH PRESCRIBED DIAGONAL AND

More information

Inverse Eigenvalue Problems in Wireless Communications

Inverse Eigenvalue Problems in Wireless Communications Inverse Eigenvalue Problems in Wireless Communications Inderjit S. Dhillon Robert W. Heath Jr. Mátyás Sustik Joel A. Tropp The University of Texas at Austin Thomas Strohmer The University of California

More information

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k A Proof of Lemma 2 B Proof of Lemma 3 Proof: Since the support of LL istributions is R, two such istributions are equivalent absolutely continuous with respect to each other an the ivergence is well-efine

More information

Linear First-Order Equations

Linear First-Order Equations 5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)

More information

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION The Annals of Statistics 1997, Vol. 25, No. 6, 2313 2327 LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION By Eva Riccomagno, 1 Rainer Schwabe 2 an Henry P. Wynn 1 University of Warwick, Technische

More information

All s Well That Ends Well: Supplementary Proofs

All s Well That Ends Well: Supplementary Proofs All s Well That Ens Well: Guarantee Resolution of Simultaneous Rigi Boy Impact 1:1 All s Well That Ens Well: Supplementary Proofs This ocument complements the paper All s Well That Ens Well: Guarantee

More information

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control 19 Eigenvalues, Eigenvectors, Orinary Differential Equations, an Control This section introuces eigenvalues an eigenvectors of a matrix, an iscusses the role of the eigenvalues in etermining the behavior

More information

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013 Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

Euler equations for multiple integrals

Euler equations for multiple integrals Euler equations for multiple integrals January 22, 2013 Contents 1 Reminer of multivariable calculus 2 1.1 Vector ifferentiation......................... 2 1.2 Matrix ifferentiation........................

More information

Rank, Trace, Determinant, Transpose an Inverse of a Matrix Let A be an n n square matrix: A = a11 a1 a1n a1 a an a n1 a n a nn nn where is the jth col

Rank, Trace, Determinant, Transpose an Inverse of a Matrix Let A be an n n square matrix: A = a11 a1 a1n a1 a an a n1 a n a nn nn where is the jth col Review of Linear Algebra { E18 Hanout Vectors an Their Inner Proucts Let X an Y be two vectors: an Their inner prouct is ene as X =[x1; ;x n ] T Y =[y1; ;y n ] T (X; Y ) = X T Y = x k y k k=1 where T an

More information

Table of Common Derivatives By David Abraham

Table of Common Derivatives By David Abraham Prouct an Quotient Rules: Table of Common Derivatives By Davi Abraham [ f ( g( ] = [ f ( ] g( + f ( [ g( ] f ( = g( [ f ( ] g( g( f ( [ g( ] Trigonometric Functions: sin( = cos( cos( = sin( tan( = sec

More information

SYNCHRONOUS SEQUENTIAL CIRCUITS

SYNCHRONOUS SEQUENTIAL CIRCUITS CHAPTER SYNCHRONOUS SEUENTIAL CIRCUITS Registers an counters, two very common synchronous sequential circuits, are introuce in this chapter. Register is a igital circuit for storing information. Contents

More information

Conservation Laws. Chapter Conservation of Energy

Conservation Laws. Chapter Conservation of Energy 20 Chapter 3 Conservation Laws In orer to check the physical consistency of the above set of equations governing Maxwell-Lorentz electroynamics [(2.10) an (2.12) or (1.65) an (1.68)], we examine the action

More information

Capacity Analysis of MIMO Systems with Unknown Channel State Information

Capacity Analysis of MIMO Systems with Unknown Channel State Information Capacity Analysis of MIMO Systems with Unknown Channel State Information Jun Zheng an Bhaskar D. Rao Dept. of Electrical an Computer Engineering University of California at San Diego e-mail: juzheng@ucs.eu,

More information

Agmon Kolmogorov Inequalities on l 2 (Z d )

Agmon Kolmogorov Inequalities on l 2 (Z d ) Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,

More information

Applications of the Wronskian to ordinary linear differential equations

Applications of the Wronskian to ordinary linear differential equations Physics 116C Fall 2011 Applications of the Wronskian to orinary linear ifferential equations Consier a of n continuous functions y i (x) [i = 1,2,3,...,n], each of which is ifferentiable at least n times.

More information

Optimal Variable-Structure Control Tracking of Spacecraft Maneuvers

Optimal Variable-Structure Control Tracking of Spacecraft Maneuvers Optimal Variable-Structure Control racking of Spacecraft Maneuvers John L. Crassiis 1 Srinivas R. Vaali F. Lanis Markley 3 Introuction In recent years, much effort has been evote to the close-loop esign

More information

Qubit channels that achieve capacity with two states

Qubit channels that achieve capacity with two states Qubit channels that achieve capacity with two states Dominic W. Berry Department of Physics, The University of Queenslan, Brisbane, Queenslan 4072, Australia Receive 22 December 2004; publishe 22 March

More information

Acute sets in Euclidean spaces

Acute sets in Euclidean spaces Acute sets in Eucliean spaces Viktor Harangi April, 011 Abstract A finite set H in R is calle an acute set if any angle etermine by three points of H is acute. We examine the maximal carinality α() of

More information

Pure Further Mathematics 1. Revision Notes

Pure Further Mathematics 1. Revision Notes Pure Further Mathematics Revision Notes June 20 2 FP JUNE 20 SDB Further Pure Complex Numbers... 3 Definitions an arithmetical operations... 3 Complex conjugate... 3 Properties... 3 Complex number plane,

More information

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS MARK SCHACHNER Abstract. When consiere as an algebraic space, the set of arithmetic functions equippe with the operations of pointwise aition an

More information

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments 2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor

More information

Space-time Linear Dispersion Using Coordinate Interleaving

Space-time Linear Dispersion Using Coordinate Interleaving Space-time Linear Dispersion Using Coorinate Interleaving Jinsong Wu an Steven D Blostein Department of Electrical an Computer Engineering Queen s University, Kingston, Ontario, Canaa, K7L3N6 Email: wujs@ieeeorg

More information

Two formulas for the Euler ϕ-function

Two formulas for the Euler ϕ-function Two formulas for the Euler ϕ-function Robert Frieman A multiplication formula for ϕ(n) The first formula we want to prove is the following: Theorem 1. If n 1 an n 2 are relatively prime positive integers,

More information

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21 Large amping in a structural material may be either esirable or unesirable, epening on the engineering application at han. For example, amping is a esirable property to the esigner concerne with limiting

More information

arxiv: v1 [cs.lg] 22 Mar 2014

arxiv: v1 [cs.lg] 22 Mar 2014 CUR lgorithm with Incomplete Matrix Observation Rong Jin an Shenghuo Zhu Dept. of Computer Science an Engineering, Michigan State University, rongjin@msu.eu NEC Laboratories merica, Inc., zsh@nec-labs.com

More information

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012 CS-6 Theory Gems November 8, 0 Lecture Lecturer: Alesaner Mąry Scribes: Alhussein Fawzi, Dorina Thanou Introuction Toay, we will briefly iscuss an important technique in probability theory measure concentration

More information

EVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION OF UNIVARIATE TAYLOR SERIES

EVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION OF UNIVARIATE TAYLOR SERIES MATHEMATICS OF COMPUTATION Volume 69, Number 231, Pages 1117 1130 S 0025-5718(00)01120-0 Article electronically publishe on February 17, 2000 EVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION

More information

On the enumeration of partitions with summands in arithmetic progression

On the enumeration of partitions with summands in arithmetic progression AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 8 (003), Pages 149 159 On the enumeration of partitions with summans in arithmetic progression M. A. Nyblom C. Evans Department of Mathematics an Statistics

More information

Laplacian Cooperative Attitude Control of Multiple Rigid Bodies

Laplacian Cooperative Attitude Control of Multiple Rigid Bodies Laplacian Cooperative Attitue Control of Multiple Rigi Boies Dimos V. Dimarogonas, Panagiotis Tsiotras an Kostas J. Kyriakopoulos Abstract Motivate by the fact that linear controllers can stabilize the

More information

u!i = a T u = 0. Then S satisfies

u!i = a T u = 0. Then S satisfies Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace

More information

This module is part of the. Memobust Handbook. on Methodology of Modern Business Statistics

This module is part of the. Memobust Handbook. on Methodology of Modern Business Statistics This moule is part of the Memobust Hanbook on Methoology of Moern Business Statistics 26 March 2014 Metho: Balance Sampling for Multi-Way Stratification Contents General section... 3 1. Summary... 3 2.

More information

A Note on Exact Solutions to Linear Differential Equations by the Matrix Exponential

A Note on Exact Solutions to Linear Differential Equations by the Matrix Exponential Avances in Applie Mathematics an Mechanics Av. Appl. Math. Mech. Vol. 1 No. 4 pp. 573-580 DOI: 10.4208/aamm.09-m0946 August 2009 A Note on Exact Solutions to Linear Differential Equations by the Matrix

More information

SYSTEMS OF DIFFERENTIAL EQUATIONS, EULER S FORMULA. where L is some constant, usually called the Lipschitz constant. An example is

SYSTEMS OF DIFFERENTIAL EQUATIONS, EULER S FORMULA. where L is some constant, usually called the Lipschitz constant. An example is SYSTEMS OF DIFFERENTIAL EQUATIONS, EULER S FORMULA. Uniqueness for solutions of ifferential equations. We consier the system of ifferential equations given by x = v( x), () t with a given initial conition

More information

Multi-View Clustering via Canonical Correlation Analysis

Multi-View Clustering via Canonical Correlation Analysis Technical Report TTI-TR-2008-5 Multi-View Clustering via Canonical Correlation Analysis Kamalika Chauhuri UC San Diego Sham M. Kakae Toyota Technological Institute at Chicago ABSTRACT Clustering ata in

More information

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy,

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy, NOTES ON EULER-BOOLE SUMMATION JONATHAN M BORWEIN, NEIL J CALKIN, AND DANTE MANNA Abstract We stuy a connection between Euler-MacLaurin Summation an Boole Summation suggeste in an AMM note from 196, which

More information

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Ashish Goel Michael Kapralov Sanjeev Khanna Abstract We consier the well-stuie problem of fining a perfect matching in -regular bipartite

More information

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes Leaving Ranomness to Nature: -Dimensional Prouct Coes through the lens of Generalize-LDPC coes Tavor Baharav, Kannan Ramchanran Dept. of Electrical Engineering an Computer Sciences, U.C. Berkeley {tavorb,

More information

Linear Algebra- Review And Beyond. Lecture 3

Linear Algebra- Review And Beyond. Lecture 3 Linear Algebra- Review An Beyon Lecture 3 This lecture gives a wie range of materials relate to matrix. Matrix is the core of linear algebra, an it s useful in many other fiels. 1 Matrix Matrix is the

More information

Physics 251 Results for Matrix Exponentials Spring 2017

Physics 251 Results for Matrix Exponentials Spring 2017 Physics 25 Results for Matrix Exponentials Spring 27. Properties of the Matrix Exponential Let A be a real or complex n n matrix. The exponential of A is efine via its Taylor series, e A A n = I + n!,

More information

Technion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels.

Technion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels. Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Constraine Coes for Two-Dimensional Channels Keren Censor Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Technion

More information

Free rotation of a rigid body 1 D. E. Soper 2 University of Oregon Physics 611, Theoretical Mechanics 5 November 2012

Free rotation of a rigid body 1 D. E. Soper 2 University of Oregon Physics 611, Theoretical Mechanics 5 November 2012 Free rotation of a rigi boy 1 D. E. Soper 2 University of Oregon Physics 611, Theoretical Mechanics 5 November 2012 1 Introuction In this section, we escribe the motion of a rigi boy that is free to rotate

More information

7.1 Support Vector Machine

7.1 Support Vector Machine 67577 Intro. to Machine Learning Fall semester, 006/7 Lecture 7: Support Vector Machines an Kernel Functions II Lecturer: Amnon Shashua Scribe: Amnon Shashua 7. Support Vector Machine We return now to

More information

SYMMETRIC KRONECKER PRODUCTS AND SEMICLASSICAL WAVE PACKETS

SYMMETRIC KRONECKER PRODUCTS AND SEMICLASSICAL WAVE PACKETS SYMMETRIC KRONECKER PRODUCTS AND SEMICLASSICAL WAVE PACKETS GEORGE A HAGEDORN AND CAROLINE LASSER Abstract We investigate the iterate Kronecker prouct of a square matrix with itself an prove an invariance

More information

Optimization of Geometries by Energy Minimization

Optimization of Geometries by Energy Minimization Optimization of Geometries by Energy Minimization by Tracy P. Hamilton Department of Chemistry University of Alabama at Birmingham Birmingham, AL 3594-140 hamilton@uab.eu Copyright Tracy P. Hamilton, 1997.

More information

1 Math 285 Homework Problem List for S2016

1 Math 285 Homework Problem List for S2016 1 Math 85 Homework Problem List for S016 Note: solutions to Lawler Problems will appear after all of the Lecture Note Solutions. 1.1 Homework 1. Due Friay, April 8, 016 Look at from lecture note exercises:

More information

Homework 3 - Solutions

Homework 3 - Solutions Homework 3 - Solutions The Transpose an Partial Transpose. 1 Let { 1, 2,, } be an orthonormal basis for C. The transpose map efine with respect to this basis is a superoperator Γ that acts on an operator

More information

Robustness and Perturbations of Minimal Bases

Robustness and Perturbations of Minimal Bases Robustness an Perturbations of Minimal Bases Paul Van Dooren an Froilán M Dopico December 9, 2016 Abstract Polynomial minimal bases of rational vector subspaces are a classical concept that plays an important

More information

One-dimensional I test and direction vector I test with array references by induction variable

One-dimensional I test and direction vector I test with array references by induction variable Int. J. High Performance Computing an Networking, Vol. 3, No. 4, 2005 219 One-imensional I test an irection vector I test with array references by inuction variable Minyi Guo School of Computer Science

More information

ON THE OPTIMALITY SYSTEM FOR A 1 D EULER FLOW PROBLEM

ON THE OPTIMALITY SYSTEM FOR A 1 D EULER FLOW PROBLEM ON THE OPTIMALITY SYSTEM FOR A D EULER FLOW PROBLEM Eugene M. Cliff Matthias Heinkenschloss y Ajit R. Shenoy z Interisciplinary Center for Applie Mathematics Virginia Tech Blacksburg, Virginia 46 Abstract

More information

The Exact Form and General Integrating Factors

The Exact Form and General Integrating Factors 7 The Exact Form an General Integrating Factors In the previous chapters, we ve seen how separable an linear ifferential equations can be solve using methos for converting them to forms that can be easily

More information

Unit vectors with non-negative inner products

Unit vectors with non-negative inner products Unit vectors with non-negative inner proucts Bos, A.; Seiel, J.J. Publishe: 01/01/1980 Document Version Publisher s PDF, also known as Version of Recor (inclues final page, issue an volume numbers) Please

More information

A simple model for the small-strain behaviour of soils

A simple model for the small-strain behaviour of soils A simple moel for the small-strain behaviour of soils José Jorge Naer Department of Structural an Geotechnical ngineering, Polytechnic School, University of São Paulo 05508-900, São Paulo, Brazil, e-mail:

More information

Improving Estimation Accuracy in Nonrandomized Response Questioning Methods by Multiple Answers

Improving Estimation Accuracy in Nonrandomized Response Questioning Methods by Multiple Answers International Journal of Statistics an Probability; Vol 6, No 5; September 207 ISSN 927-7032 E-ISSN 927-7040 Publishe by Canaian Center of Science an Eucation Improving Estimation Accuracy in Nonranomize

More information

Implicit Differentiation

Implicit Differentiation Implicit Differentiation Thus far, the functions we have been concerne with have been efine explicitly. A function is efine explicitly if the output is given irectly in terms of the input. For instance,

More information

Lower Bounds for the Smoothed Number of Pareto optimal Solutions

Lower Bounds for the Smoothed Number of Pareto optimal Solutions Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.

More information

Introduction to Markov Processes

Introduction to Markov Processes Introuction to Markov Processes Connexions moule m44014 Zzis law Gustav) Meglicki, Jr Office of the VP for Information Technology Iniana University RCS: Section-2.tex,v 1.24 2012/12/21 18:03:08 gustav

More information

LeChatelier Dynamics

LeChatelier Dynamics LeChatelier Dynamics Robert Gilmore Physics Department, Drexel University, Philaelphia, Pennsylvania 1914, USA (Date: June 12, 28, Levine Birthay Party: To be submitte.) Dynamics of the relaxation of a

More information

arxiv:hep-th/ v1 3 Feb 1993

arxiv:hep-th/ v1 3 Feb 1993 NBI-HE-9-89 PAR LPTHE 9-49 FTUAM 9-44 November 99 Matrix moel calculations beyon the spherical limit arxiv:hep-th/93004v 3 Feb 993 J. Ambjørn The Niels Bohr Institute Blegamsvej 7, DK-00 Copenhagen Ø,

More information

Chapter 6: Energy-Momentum Tensors

Chapter 6: Energy-Momentum Tensors 49 Chapter 6: Energy-Momentum Tensors This chapter outlines the general theory of energy an momentum conservation in terms of energy-momentum tensors, then applies these ieas to the case of Bohm's moel.

More information

Optimal Sequences and Sum Capacity of Synchronous CDMA Systems

Optimal Sequences and Sum Capacity of Synchronous CDMA Systems Optimal Sequences and Sum Capacity of Synchronous CDMA Systems Pramod Viswanath and Venkat Anantharam {pvi, ananth}@eecs.berkeley.edu EECS Department, U C Berkeley CA 9470 Abstract The sum capacity of

More information

Hyperbolic Moment Equations Using Quadrature-Based Projection Methods

Hyperbolic Moment Equations Using Quadrature-Based Projection Methods Hyperbolic Moment Equations Using Quarature-Base Projection Methos J. Koellermeier an M. Torrilhon Department of Mathematics, RWTH Aachen University, Aachen, Germany Abstract. Kinetic equations like the

More information

inflow outflow Part I. Regular tasks for MAE598/494 Task 1

inflow outflow Part I. Regular tasks for MAE598/494 Task 1 MAE 494/598, Fall 2016 Project #1 (Regular tasks = 20 points) Har copy of report is ue at the start of class on the ue ate. The rules on collaboration will be release separately. Please always follow the

More information

Schrödinger s equation.

Schrödinger s equation. Physics 342 Lecture 5 Schröinger s Equation Lecture 5 Physics 342 Quantum Mechanics I Wenesay, February 3r, 2010 Toay we iscuss Schröinger s equation an show that it supports the basic interpretation of

More information

Stable and compact finite difference schemes

Stable and compact finite difference schemes Center for Turbulence Research Annual Research Briefs 2006 2 Stable an compact finite ifference schemes By K. Mattsson, M. Svär AND M. Shoeybi. Motivation an objectives Compact secon erivatives have long

More information

Introduction to the Vlasov-Poisson system

Introduction to the Vlasov-Poisson system Introuction to the Vlasov-Poisson system Simone Calogero 1 The Vlasov equation Consier a particle with mass m > 0. Let x(t) R 3 enote the position of the particle at time t R an v(t) = ẋ(t) = x(t)/t its

More information

PDE Notes, Lecture #11

PDE Notes, Lecture #11 PDE Notes, Lecture # from Professor Jalal Shatah s Lectures Febuary 9th, 2009 Sobolev Spaces Recall that for u L loc we can efine the weak erivative Du by Du, φ := udφ φ C0 If v L loc such that Du, φ =

More information

Calculus in the AP Physics C Course The Derivative

Calculus in the AP Physics C Course The Derivative Limits an Derivatives Calculus in the AP Physics C Course The Derivative In physics, the ieas of the rate change of a quantity (along with the slope of a tangent line) an the area uner a curve are essential.

More information

Calculus of Variations

Calculus of Variations 16.323 Lecture 5 Calculus of Variations Calculus of Variations Most books cover this material well, but Kirk Chapter 4 oes a particularly nice job. x(t) x* x*+ αδx (1) x*- αδx (1) αδx (1) αδx (1) t f t

More information

TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH

TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH English NUMERICAL MATHEMATICS Vol14, No1 Series A Journal of Chinese Universities Feb 2005 TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH He Ming( Λ) Michael K Ng(Ξ ) Abstract We

More information

Necessary and Sufficient Conditions for Sketched Subspace Clustering

Necessary and Sufficient Conditions for Sketched Subspace Clustering Necessary an Sufficient Conitions for Sketche Subspace Clustering Daniel Pimentel-Alarcón, Laura Balzano 2, Robert Nowak University of Wisconsin-Maison, 2 University of Michigan-Ann Arbor Abstract This

More information

Interpretation of the Multi-Stage Nested Wiener Filter in the Krylov Subspace Framework

Interpretation of the Multi-Stage Nested Wiener Filter in the Krylov Subspace Framework Interpretation of the Multi-Stage Neste Wiener Filter in the Krylov Subspace Framework M. Joham an M. D. Zoltowski School of Electrical Engineering, Purue University, West Lafayette, IN 47907-285 e-mail:

More information

LECTURE NOTES ON DVORETZKY S THEOREM

LECTURE NOTES ON DVORETZKY S THEOREM LECTURE NOTES ON DVORETZKY S THEOREM STEVEN HEILMAN Abstract. We present the first half of the paper [S]. In particular, the results below, unless otherwise state, shoul be attribute to G. Schechtman.

More information

Parameter estimation: A new approach to weighting a priori information

Parameter estimation: A new approach to weighting a priori information Parameter estimation: A new approach to weighting a priori information J.L. Mea Department of Mathematics, Boise State University, Boise, ID 83725-555 E-mail: jmea@boisestate.eu Abstract. We propose a

More information

On the Aloha throughput-fairness tradeoff

On the Aloha throughput-fairness tradeoff On the Aloha throughput-fairness traeoff 1 Nan Xie, Member, IEEE, an Steven Weber, Senior Member, IEEE Abstract arxiv:1605.01557v1 [cs.it] 5 May 2016 A well-known inner boun of the stability region of

More information

State observers and recursive filters in classical feedback control theory

State observers and recursive filters in classical feedback control theory State observers an recursive filters in classical feeback control theory State-feeback control example: secon-orer system Consier the riven secon-orer system q q q u x q x q x x x x Here u coul represent

More information

Topic 7: Convergence of Random Variables

Topic 7: Convergence of Random Variables Topic 7: Convergence of Ranom Variables Course 003, 2016 Page 0 The Inference Problem So far, our starting point has been a given probability space (S, F, P). We now look at how to generate information

More information

d dx But have you ever seen a derivation of these results? We ll prove the first result below. cos h 1

d dx But have you ever seen a derivation of these results? We ll prove the first result below. cos h 1 Lecture 5 Some ifferentiation rules Trigonometric functions (Relevant section from Stewart, Seventh Eition: Section 3.3) You all know that sin = cos cos = sin. () But have you ever seen a erivation of

More information

Proof of SPNs as Mixture of Trees

Proof of SPNs as Mixture of Trees A Proof of SPNs as Mixture of Trees Theorem 1. If T is an inuce SPN from a complete an ecomposable SPN S, then T is a tree that is complete an ecomposable. Proof. Argue by contraiction that T is not a

More information

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs Lectures - Week 10 Introuction to Orinary Differential Equations (ODES) First Orer Linear ODEs When stuying ODEs we are consiering functions of one inepenent variable, e.g., f(x), where x is the inepenent

More information

Math 774 Homework 3. Austin Mohr. October 11, Let µ be the usual Möbius function, namely 0, if n has a repeated prime factor; µ(d) = 0,

Math 774 Homework 3. Austin Mohr. October 11, Let µ be the usual Möbius function, namely 0, if n has a repeated prime factor; µ(d) = 0, Math 774 Homework 3 Austin Mohr October 11, 010 Problem 1 Let µ be the usual Möbius function, namely 0, if n has a repeate prime factor; µ(n = 1, if n = 1; ( 1 k, if n is a prouct of k istinct primes.

More information

Diagonalization of Matrices Dr. E. Jacobs

Diagonalization of Matrices Dr. E. Jacobs Diagonalization of Matrices Dr. E. Jacobs One of the very interesting lessons in this course is how certain algebraic techniques can be use to solve ifferential equations. The purpose of these notes is

More information

Sliding mode approach to congestion control in connection-oriented communication networks

Sliding mode approach to congestion control in connection-oriented communication networks JOURNAL OF APPLIED COMPUTER SCIENCE Vol. xx. No xx (200x), pp. xx-xx Sliing moe approach to congestion control in connection-oriente communication networks Anrzej Bartoszewicz, Justyna Żuk Technical University

More information

Characterizing Real-Valued Multivariate Complex Polynomials and Their Symmetric Tensor Representations

Characterizing Real-Valued Multivariate Complex Polynomials and Their Symmetric Tensor Representations Characterizing Real-Value Multivariate Complex Polynomials an Their Symmetric Tensor Representations Bo JIANG Zhening LI Shuzhong ZHANG December 31, 2014 Abstract In this paper we stuy multivariate polynomial

More information

Lower bounds on Locality Sensitive Hashing

Lower bounds on Locality Sensitive Hashing Lower bouns on Locality Sensitive Hashing Rajeev Motwani Assaf Naor Rina Panigrahy Abstract Given a metric space (X, X ), c 1, r > 0, an p, q [0, 1], a istribution over mappings H : X N is calle a (r,

More information

Many problems in physics, engineering, and chemistry fall in a general class of equations of the form. d dx. d dx

Many problems in physics, engineering, and chemistry fall in a general class of equations of the form. d dx. d dx Math 53 Notes on turm-liouville equations Many problems in physics, engineering, an chemistry fall in a general class of equations of the form w(x)p(x) u ] + (q(x) λ) u = w(x) on an interval a, b], plus

More information

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5

More information

VIRTUAL STRUCTURE BASED SPACECRAFT FORMATION CONTROL WITH FORMATION FEEDBACK

VIRTUAL STRUCTURE BASED SPACECRAFT FORMATION CONTROL WITH FORMATION FEEDBACK AIAA Guiance, Navigation, an Control Conference an Exhibit 5-8 August, Monterey, California AIAA -9 VIRTUAL STRUCTURE BASED SPACECRAT ORMATION CONTROL WITH ORMATION EEDBACK Wei Ren Ranal W. Bear Department

More information

arxiv: v1 [math.mg] 10 Apr 2018

arxiv: v1 [math.mg] 10 Apr 2018 ON THE VOLUME BOUND IN THE DVORETZKY ROGERS LEMMA FERENC FODOR, MÁRTON NASZÓDI, AND TAMÁS ZARNÓCZ arxiv:1804.03444v1 [math.mg] 10 Apr 2018 Abstract. The classical Dvoretzky Rogers lemma provies a eterministic

More information

Problem Sheet 2: Eigenvalues and eigenvectors and their use in solving linear ODEs

Problem Sheet 2: Eigenvalues and eigenvectors and their use in solving linear ODEs Problem Sheet 2: Eigenvalues an eigenvectors an their use in solving linear ODEs If you fin any typos/errors in this problem sheet please email jk28@icacuk The material in this problem sheet is not examinable

More information

ensembles When working with density operators, we can use this connection to define a generalized Bloch vector: v x Tr x, v y Tr y

ensembles When working with density operators, we can use this connection to define a generalized Bloch vector: v x Tr x, v y Tr y Ph195a lecture notes, 1/3/01 Density operators for spin- 1 ensembles So far in our iscussion of spin- 1 systems, we have restricte our attention to the case of pure states an Hamiltonian evolution. Toay

More information

A Path Planning Method Using Cubic Spiral with Curvature Constraint

A Path Planning Method Using Cubic Spiral with Curvature Constraint A Path Planning Metho Using Cubic Spiral with Curvature Constraint Tzu-Chen Liang an Jing-Sin Liu Institute of Information Science 0, Acaemia Sinica, Nankang, Taipei 5, Taiwan, R.O.C., Email: hartree@iis.sinica.eu.tw

More information

Error Floors in LDPC Codes: Fast Simulation, Bounds and Hardware Emulation

Error Floors in LDPC Codes: Fast Simulation, Bounds and Hardware Emulation Error Floors in LDPC Coes: Fast Simulation, Bouns an Harware Emulation Pamela Lee, Lara Dolecek, Zhengya Zhang, Venkat Anantharam, Borivoje Nikolic, an Martin J. Wainwright EECS Department University of

More information

MEASURES WITH ZEROS IN THE INVERSE OF THEIR MOMENT MATRIX

MEASURES WITH ZEROS IN THE INVERSE OF THEIR MOMENT MATRIX MEASURES WITH ZEROS IN THE INVERSE OF THEIR MOMENT MATRIX J. WILLIAM HELTON, JEAN B. LASSERRE, AND MIHAI PUTINAR Abstract. We investigate an iscuss when the inverse of a multivariate truncate moment matrix

More information

Function Spaces. 1 Hilbert Spaces

Function Spaces. 1 Hilbert Spaces Function Spaces A function space is a set of functions F that has some structure. Often a nonparametric regression function or classifier is chosen to lie in some function space, where the assume structure

More information

The derivative of a function f(x) is another function, defined in terms of a limiting expression: f(x + δx) f(x)

The derivative of a function f(x) is another function, defined in terms of a limiting expression: f(x + δx) f(x) Y. D. Chong (2016) MH2801: Complex Methos for the Sciences 1. Derivatives The erivative of a function f(x) is another function, efine in terms of a limiting expression: f (x) f (x) lim x δx 0 f(x + δx)

More information

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS Yannick DEVILLE Université Paul Sabatier Laboratoire Acoustique, Métrologie, Instrumentation Bât. 3RB2, 8 Route e Narbonne,

More information

Tractability results for weighted Banach spaces of smooth functions

Tractability results for weighted Banach spaces of smooth functions Tractability results for weighte Banach spaces of smooth functions Markus Weimar Mathematisches Institut, Universität Jena Ernst-Abbe-Platz 2, 07740 Jena, Germany email: markus.weimar@uni-jena.e March

More information