A Toeplitz Algorithm for Polynomial J-Spectral Factorization 1

Total Page:16

File Type:pdf, Size:1020Kb

A Toeplitz Algorithm for Polynomial J-Spectral Factorization 1 A Toeplitz algorithm for polynomial J-spectral factorization 1 Juan Carlos Z´u~niga a Didier Henrion a;b;2 aLAAS-CNRS 7 Avenue du Colonel Roche, 31077 Toulouse, France bDepartment of Control Engineering, Faculty of Electrical Engineering, Czech Technical University in Prague Technick´a2, 16627 Prague, Czech Republic Abstract A block Toeplitz algorithm is proposed to perform the J-spectral factorization of a para-Hermitian polynomial matrix. The input matrix can be singular or indefinite, and it can have zeros along the imaginary axis. The key assumption is that the finite zeros of the input polynomial matrix are given as input data. The algorithm is based on numerically reliable operations only, namely computation of the null-spaces of related block Toeplitz matrices, polynomial matrix factor extraction and linear polynomial matrix equations solving. Key words: Polynomial matrices, spectral factorization, numerical algorithms, computer-aided control system design. 1 Introduction The J-spectral factorization of para-Hermitian polyno- mial matrices has important applications in control and 1.1 Polynomial J-spectral factorization systems theory, as described first in [Wiener, 1949]. See e.g. [Kwakernaak and Sebek,ˇ 1994] and [Grimble and Kuˇcera,1996] for comprehensive descriptions of appli- In this paper we are interested in solving the following cations in multivariable Wiener filtering, LQG control J-spectral factorization (JSF) problem for polynomial and H optimization. matrices: 1 d Let A(s) = A0 + A1s + + Ads be an n-by-n poly- nomial matrix with real coefficients··· and degree d in the 1.1.1 Factorization of singular matrices complex indeterminate s. Assume that A(s) is para- T Hermitian, i.e. A(s) = A ( s) where T denotes the In its most general form, the JSF problem applies to − transpose. We want to find an n-by-n polynomial matrix singular matrices. In this paragraph, we show that the P (s) and a constant matrix J such that problem of factorizing a singular matrix can be converted into the problem of factorizing a non-singular matrix. T Alternatively, we can also seek a non-square spectral A(s) = P ( s)JP (s);J = diag In+ ; In ; 0n0 : (1) − f − − g factor P (s). P (s) is non-singular and its spectrum 3 lies within the T left half-plane. J = J is a signature matrix with +1, 1 If A(s) has rank r < n, then n +n = r in the signature − + and 0 along the diagonal, and such that n++n +n0 = n. matrix J. The null-space of A(s) is− symmetric, namely if − the columns of Z(s) form a basis of the right null-space 1 A preliminary version of this paper was presented at the of A(s), i.e. A(s)Z(s) = 0, then ZT ( s)A(s) = 0. As IFAC Symposium on System, Structure and Control, Oax- pointed out in [Sebek,ˇ 1990], the factorization− of A(s) aca, Mexico, December 8-10, 2004. could start with the extraction of its null-space. There 2 Corresponding author. Tel: (+33) 561 33 63 08. Fax: (+33) always exists an unimodular matrix 561 33 69 69. e-mail: [email protected] 3 The set of all the zeros (eigenvalues) of a polynomial ma- 1 trix [Gohberg et al., 1982b]. U − (s) = [B(s) Z(s)] Preprint submitted to Automatica 30 November 2005 such that of the scope of this paper. Some other works giving nec- essary and sufficient conditions for the existence of the T 1 U − ( s)A(s)U − (s) = diag A¯(s); 0 (2) JSF are [Meinsma, 1995] and [Ran, 2003]. There, the − f g conditions are related to the existence of an stabilizing where the r r matrix A¯(s) is non-singular. Now, if A¯(s) solution of an associated Riccati equation. A deeper dis- is factorized× as A¯(s) = P¯T ( s)J¯P¯(s), then the JSF of cussion of all the related results on the literature would A(s) is given by: − be very extensive and also out of our objectives. J = diag J;¯ 0 ;P (s) = diag P¯(s);In r U(s): 1.2.1 Canonical factorizations f g f − g Equivalently, if we accept P (s) to be non-square, then we It is easy to see that if A(s) is para-Hermitian, then the can eliminate the zero columns and rows in factorization degrees δi for i = 1; 2; : : : ; n of the n diagonal entries of (1) and obtain A(s) are even numbers. We define the diagonal leading matrix of A(s) as A(s) = P T ( s)JP (s);J = diag I ; I (3) n+ n T 1 − f − − g = lim = D− ( s)A(s)D− (s) (4) A s − where P (s) has size r n. The different properties of j j!1 × factorizations (1) and (3) are discussed later in section δ1 δn 3.4. where D(s) = diag s 2 ; : : : ; s 2 . We say that A(s) is diagonally reducedf if existsg and is non- A What is important to notice here is that any singular fac- singular. The JSF (3) can be defined for both di- agonally or non-diagonally reduced matrices. From torization can be reduced to a non-singular one. There- ˇ fore, the theory of non-singular factorizations can be [Kwakernaak and Sebek, 1994] we say that the JSF naturally extended to the singular case. of a diagonally reduced matrix A(s) is canonical if P (s) is column reduced 4 with column degrees equal to half the diagonal degrees of A(s), see also 1.2 Existence conditions [Gohberg and Kaashoek, 1986]. Suppose that the full rank n-by-n matrix A(s) admits In this paper we extend the concept of canonical factor- a factorization A(s) = P T ( s)JP (s) where constant ization to matrices with no assumption on its diagonally matrix J T = J has dimension− m. Let σ[A(s)] be the reducedness (see section 3.3) or even singular matrices spectrum of A(s), then (see section 3.4). m m0 = max +[A(z)] + max [A(z)] 1.3 Current algorithms and contributions ≥ z iR/σ[A(s)] V z iR/σ[A(s)] V− 2 2 The interest in numerical algorithms for polynomial JSF where + and are, respectively, the number of posi- tive andV negativeV− eigenvalues of A(s) [Ran and Rodman, has increased in the last years. Several different algo- 1994] rithms are now available. As for many problems related to polynomial matrices, these algorithms can be classi- fied in two major approaches: the state-space approach If A(s) has no constant signature on the imaginary axis, and the polynomial approach. i.e. the difference +[A(z)] [A(z)] is not constant V − V− for all z iR/σ[A(z)], then n < m0 2n, see the proof of Theorem2 3.1 in [Ran and Rodman,≤ 1994]. The state-space methods usually relate the problem of JSF to the stabilizing solution of an algebraic Riccati equation. One of the first contributions was [Tuel, 1968], On the other hand, if A(s) has constant signature, then where an algorithm for the standard sign-definite case m = m = n, and matrix J can be chosen as the unique 0 (J = I) is presented. The evolution of this kind of square matrix given in (3). In [Ran and Rodman, 1994] methods is resumed in [Stefanovski, 2003] and ref- it is shown that any para-Hermitian matrix A(s) with erences inside. This paper, based on the results of constant signature admits a JSF. So, constant signature [Trentelman and Rapisarda, 1999], describes and algo- of A(s) is the basic existence condition for JSF that we rithm that can handle indefinite para-hermitian ma- will assume in this work. trices (with constant signature) with zeros along the imaginary axis. The case of singular matrices is tackled In [Ran and Zizler, 1997] the authors give necessary in [Stefanovski, 2004] only for the discrete case. and sufficient conditions for a self-adjoint polyno- mial matrix to have constant signature, see also 4 Let q be the degree of the determinant of polynomial ma- [Gohberg et al., 1982a]. These results can be extended trix P (s) and ki the maximum degree of the entries of the ith n to para-Hermitian polynomial matrices but this is out column of P (s). Then P (s) is column reduced if q = ki. Pi=1 2 The popularity of the state-space methods is related with 2.1 Eigenstructure of polynomial matrices its good numerical properties. There exist several numer- ical reliable algorithms to solve the Riccati equation, see The eigenstructure of a polynomial matrix A(s) contains for example [Bittanti et al. (Eds.), 1991]. On the nega- the finite structure, the infinite structure and the null- tive side, sometimes the reformulation of the polyno- space structure. mial problem in terms of the state-space requires elab- orated preliminary steps [Kwakernaak and Sebek,ˇ 1994] 2.1.1 Finite structure and some concepts and particularities of the polynomial problem are difficult to recover from the new represen- A finite zero of a non-singular polynomial matrix A(s) tation. On the other hand, the advantage of polynomial is a complex number z such that there exists a non-zero methods is their conceptual simplicity and straightfor- complex vector v satisfying A(z)v = 0. Vector v is called ward application to the polynomial matrix, resulting, in characteristic vector or eigenvector associated to z. general, in faster algorithms. On the negative side, the polynomial methods are often related with elementary operations over the ring of polynomials, and it is well If z is a finite zero of A(s) with algebraic multiplicity known that these operations are numerically unstable.
Recommended publications
  • Package 'Igraphmatch'
    Package ‘iGraphMatch’ January 27, 2021 Type Package Title Tools Graph Matching Version 1.0.1 Description Graph matching methods and analysis. The package works for both 'igraph' objects and matrix objects. You provide the adjacency matrices of two graphs and some other information you might know, choose the graph matching method, and it returns the graph matching results. 'iGraphMatch' also provides a bunch of useful functions you might need related to graph matching. Depends R (>= 3.3.1) Imports clue (>= 0.3-54), Matrix (>= 1.2-11), igraph (>= 1.1.2), irlba, methods, Rcpp Suggests dplyr (>= 0.5.0), testthat (>= 2.0.0), knitr, rmarkdown VignetteBuilder knitr License GPL (>= 2) LazyData TRUE RoxygenNote 7.1.1 Language en-US Encoding UTF-8 LinkingTo Rcpp NeedsCompilation yes Author Daniel Sussman [aut, cre], Zihuan Qiao [aut], Joshua Agterberg [ctb], Lujia Wang [ctb], Vince Lyzinski [ctb] Maintainer Daniel Sussman <[email protected]> Repository CRAN Date/Publication 2021-01-27 16:00:02 UTC 1 2 bari_start R topics documented: bari_start . .2 best_matches . .4 C.Elegans . .5 center_graph . .6 check_seeds . .7 do_lap . .8 Enron . .9 get_perm . .9 graph_match_convex . 10 graph_match_ExpandWhenStuck . 12 graph_match_IsoRank . 13 graph_match_Umeyama . 15 init_start . 16 innerproduct . 17 lapjv . 18 lapmod . 18 largest_common_cc . 19 matched_adjs . 20 match_plot_igraph . 20 match_report . 22 pad.............................................. 23 row_cor . 24 rperm . 25 sample_correlated_gnp_pair . 25 sample_correlated_ieg_pair . 26 sample_correlated_sbm_pair . 28 split_igraph . 29 splrMatrix-class . 30 splr_sparse_plus_constant . 31 splr_to_sparse . 31 Index 32 bari_start Start matrix initialization Description initialize the start matrix for graph matching iteration. bari_start 3 Usage bari_start(nns, ns = 0, soft_seeds = NULL) rds_sinkhorn_start(nns, ns = 0, soft_seeds = NULL, distribution = "runif") rds_perm_bari_start(nns, ns = 0, soft_seeds = NULL, g = 1, is_splr = TRUE) rds_from_sim_start(nns, ns = 0, soft_seeds = NULL, sim) Arguments nns An integer.
    [Show full text]
  • On Reciprocal Systems and Controllability
    On reciprocal systems and controllability Timothy H. Hughes a aDepartment of Mathematics, University of Exeter, Penryn Campus, Penryn, Cornwall, TR10 9EZ, UK Abstract In this paper, we extend classical results on (i) signature symmetric realizations, and (ii) signature symmetric and passive realizations, to systems which need not be controllable. These results are motivated in part by the existence of important electrical networks, such as the famous Bott-Duffin networks, which possess signature symmetric and passive realizations that are uncontrollable. In this regard, we provide necessary and sufficient algebraic conditions for a behavior to be realized as the driving-point behavior of an electrical network comprising resistors, inductors, capacitors and transformers. Key words: Reciprocity; Passive system; Linear system; Controllability; Observability; Behaviors; Electrical networks. 1 Introduction Practical motivation for developing a theory of reci- procity that does not assume controllability arises from This paper is concerned with reciprocal systems (see, electrical networks. Notably, the driving-point behavior e.g., Casimir, 1963; Willems, 1972; Anderson and Vong- of an electrical network comprising resistors, inductors, panitlerd, 2006; Newcomb, 1966; van der Schaft, 2011). capacitors and transformers (an RLCT network) is nec- Reciprocity is an important form of symmetry in physi- essarily reciprocal, and also passive, 2 but it need not be cal systems which arises in acoustics (Rayleigh-Carson controllable (see C¸amlibel et al., 2003; Willems, 2004; reciprocity); elasticity (the Maxwell-Betti reciprocal Hughes, 2017d). Indeed, as noted by C¸amlibel et al. work theorem); electrostatics (Green's reciprocity); and (2003), it is not known what (uncontrollable) behav- electromagnetics (Lorentz reciprocity), where it follows iors can be realized as the driving-point behavior of an as a result of Maxwell's laws (Newcomb, 1966, p.
    [Show full text]
  • Emergent Spacetimes
    Emergent spacetimes Silke Christine Edith Weinfurtner Department of Mathematics, Statistics and Computer Science — Te Kura Tatau arXiv:0711.4416v1 [gr-qc] 28 Nov 2007 Thesis submitted for the degree of Doctor of Philosophy at the Victoria University of Wellington. In Memory of Johann Weinfurtner Abstract In this thesis we discuss the possibility that spacetime geometry may be an emergent phenomenon. This idea has been motivated by the Analogue Gravity programme. An “effective gravitational field” dominates the kinematics of small perturbations in an Analogue Model. In these models there is no obvious connection between the “gravitational” field tensor and the Einstein equations, as the emergent spacetime geometry arises as a consequence of linearising around some classical field. After a brief survey of the most relevant literature on this topic, we present our contributions to the field. First, we show that the spacetime geometry on the equatorial slice through a rotating Kerr black hole is formally equivalent to the geometry felt by phonons entrained in a rotating fluid vortex. The most general acoustic geometry is compatible with the fluid dynamic equations in a collapsing/ ex- panding perfect-fluid line vortex. We demonstrate that there is a suitable choice of coordinates on the equatorial slice through a Kerr black hole that puts it into this vortex form; though it is not possible to put the entire Kerr spacetime into perfect-fluid “acoustic” form. We then discuss an analogue spacetime based on the propagation of excitations in a 2-component Bose–Einstein condensate. This analogue spacetime has a very rich and complex structure, which permits us to provide a mass-generating mechanism for the quasi-particle excitations.
    [Show full text]
  • The Number of Equivalence Classes of Symmetric Sign Patterns
    The number of equivalence classes of symmetric sign patterns Peter J. Cameron a;1 Charles R. Johnson b aSchool of Mathematical Sciences, Queen Mary, University of London, London E1 4NS, U.K. bDepartment of Mathematics, College of William and Mary, Williamsburg, VA, USA Abstract This paper shows that the number of sign patterns of totally non-zero symmetric n-by-n matrices, up to conjugation by monomial matrices and negation, is equal to the number of unlabelled graphs on n vertices. Key words: symmetric matrix, sign pattern, enumeration, duality 1 Introduction By a (totally non-zero) sign pattern, we mean an n-by-n array S = (sij) of + and signs. With S, we associate the set off all real n-by-n matrices − S such that A = (aij) if and only if aij > 0 whenever sij = + and aij < 0 2 S whenever sij = . Many questions about which properties P are required (all elements of enjoy− P ) or allowed (some element of has P ) by a particular sign patternSS have been studied [3,4]. S One may also consider properties of pairs of sign patterns S1 and S2. For example, one such property of recent interest is commutativity of symmetric sign patterns [1]. We say that S1 and S2 allow commutativity (\commute", for short) if there exist symmetric matrices A1 1 and A2 2 such that 2 S 2 S A1A2 = A2A1. For a given n, a complete answer to the above question might be succinctly described by an undirected graph G, whose vertices are the sign patterns, with an edge between two distinct sign patterns if and only if they 1 Corresponding author; email: [email protected].
    [Show full text]
  • Solving an Inverse Eigenvalue Problem Subject to Triple Constraints
    SOLVING AN INVERSE EIGENVALUE PROBLEM WITH TRIPLE CONSTRAINTS ON EIGENVALUES, SINGULAR VALUES, AND DIAGONAL ELEMENTS SHENG-JHIH WU∗ AND MOODY T. CHU† Abstract. An inverse eigenvalue problem usually entails two constraints, one conditioned upon the spectrum and the other on the structure. This paper investigates the problem where triple constraints of eigenvalues, singular values, and diagonal entries are imposed simultaneously. An approach combining an eclectic mix of skills from differential geometry, optimization theory, and analytic gradient flow is employed to prove the solvability of such a problem. The result generalizes the classical Mirsky, Sing-Thompson, and Weyl-Horn theorems concerning the respective majorization relationships between any two of the arrays of main diagonal entries, eigenvalues, and singular values. The existence theory fills a gap in the classical matrix theory. The problem might find applications in wireless communication and quantum information science. The technique employed can be implemented as a first-step numerical method for constructing the matrix. With slight modification, the approach might be used to explore similar types of inverse problems where the prescribed entries are at general locations. Key words. inverse eigenvalue problem, majorization relationships, projected gradient, projected Hessian, analytic gradient dynamics, AMS subject classifications. 65F18, 90C52, 15A29, 15A45, 1. Introduction. Thefocusof this paperis on the existenceof a solution to a new type of inverse eigenvalue problem (IEP) where triple constraints of eigenvalues, singular values, and diagonal entries must be satisfied simultaneously. Before we present our results and explore some possible applications of this particular type of IEP,it might be fitting to givea brief recounton the generalscope of IEPs and why they are interesting, important, and challenging.
    [Show full text]
  • Signature Matrices: the Eigenvalue Problem
    University of Texas at El Paso DigitalCommons@UTEP Open Access Theses & Dissertations 2010-01-01 Signature Matrices: The iE genvalue Problem Valeria Aguirre Holguin University of Texas at El Paso, [email protected] Follow this and additional works at: https://digitalcommons.utep.edu/open_etd Part of the Mathematics Commons Recommended Citation Aguirre Holguin, Valeria, "Signature Matrices: The iE genvalue Problem" (2010). Open Access Theses & Dissertations. 2623. https://digitalcommons.utep.edu/open_etd/2623 This is brought to you for free and open access by DigitalCommons@UTEP. It has been accepted for inclusion in Open Access Theses & Dissertations by an authorized administrator of DigitalCommons@UTEP. For more information, please contact [email protected]. SIGNATURE MATRICES: THE EIGENVALUE PROBLEM VALERIA AGUIRRE HOLGUIN Department of Mathematical Sciences APPROVED: Piotr Wojciechowski, Ph.D. Emil Schwab, Ph.D. Vladik Kreinovich, Ph.D. Patricia D. Witherspoon, Ph.D. Dean of the Graduate School c Copyright by Valeria Aguirre Holgu´ın 2010 SIGNATURE MATRICES: THE EIGENVALUE PROBLEM by VALERIA AGUIRRE HOLGUIN THESIS Presented to the Faculty of the Graduate School of The University of Texas at El Paso in Partial Fulfillment of the Requirements for the Degree of MASTER OF SCIENCE Department of Mathematical Sciences THE UNIVERSITY OF TEXAS AT EL PASO May 2010 Abstract Dealing with matrices can give us a hard time, especially when their dimension is too big, but we also well know how valuable information a matrix may carry, and that is why we study them. When a matrix has a significant number of zeroes we realize how much easier all calculations are.
    [Show full text]
  • Functional Diagnosability and Detectability of Nonlinear Models Based on Analytical Redundancy Relations Nathalie Verdière, Carine Jauberthie, Louise Travé-Massuyès
    Functional diagnosability and detectability of nonlinear models based on analytical redundancy relations Nathalie Verdière, Carine Jauberthie, Louise Travé-Massuyès To cite this version: Nathalie Verdière, Carine Jauberthie, Louise Travé-Massuyès. Functional diagnosability and de- tectability of nonlinear models based on analytical redundancy relations. Journal of Process Control, Elsevier, 2015, 35, pp.1-10. 10.1016/j.jprocont.2015.08.001. hal-01198408 HAL Id: hal-01198408 https://hal.archives-ouvertes.fr/hal-01198408 Submitted on 15 Sep 2015 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Functional diagnosability and detectability of nonlinear models based on analytical redundancy relations Nathalie Verdière1 , Carine Jauberthie2;3 , Louise Travé-Massuyès2;4 1 Normandie Univ, France; ULH, LMAH, F-76600 Le Havre; FR CNRS 3335, ISCN, 25 rue Philippe Lebon 76600 Le Havre, France 2 CNRS, LAAS, 7 avenue du Colonel Roche, F-31400 Toulouse, France 3 Université de Toulouse, UPS, LAAS, F-31400 Toulouse, France 4 Université de Toulouse, LAAS, F-31400 Toulouse, France (Corresponding author: [email protected]). Abstract This paper introduces an original definition of diagnosability for nonlinear dynamical models called functional di- agnosability. Fault diagnosability characterizes the faults that can be discriminated using the available sensors in a system.
    [Show full text]
  • Blazing Signature Filter: a Library for Fast Pairwise Similarity Comparisons Joon-Yong Lee1, Grant M
    Lee et al. BMC Bioinformatics (2018) 19:221 https://doi.org/10.1186/s12859-018-2210-6 SOFTWARE Open Access Blazing Signature Filter: a library for fast pairwise similarity comparisons Joon-Yong Lee1, Grant M. Fujimoto1,RyanWilson1, H. Steven Wiley2 and Samuel H. Payne1* Abstract Background: Identifying similarities between datasets is a fundamental task in data mining and has become an integral part of modern scientific investigation. Whether the task is to identify co-expressed genes in large-scale expression surveys or to predict combinations of gene knockouts which would elicit a similar phenotype, the underlying computational task is often a multi-dimensional similarity test. As datasets continue to grow, improvements to the efficiency, sensitivity or specificity of such computation will have broad impacts as it allows scientists to more completely explore the wealth of scientific data. Results: The Blazing Signature Filter (BSF) is a highly efficient pairwise similarity algorithm which enables extensive data mining within a reasonable amount of time. The algorithm transforms datasets into binary metrics, allowing it to utilize the computationally efficient bit operators and provide a coarse measure of similarity. We demonstrate the utility of our algorithm using two common bioinformatics tasks: identifying data sets with similar gene expression profiles, and comparing annotated genomes. Conclusions: The BSF is a highly efficient pairwise similarity algorithm that can scale to billions of comparisons without the need for specialized hardware. Keywords: Pairwise similarity comparison, Filtering, Large-scale data mining Background library of integrated network-based cellular signatures Data mining is frequently used in scientific research for (LINCS) program has generated over one million gene hypothesis generation, mechanistic insight, or validation.
    [Show full text]
  • Characterization of Multivariate Stationary Gaussian Reciprocal Diffusions*
    Journal of Multivariate Analysis MV1678 journal of multivariate analysis 62, 7499 (1997) article no. MV971678 Characterization of Multivariate Stationary Gaussian Reciprocal Diffusions* Bernard C. Levy- University of California, Davis Jamison's classification of scalar stationary Gaussian reciprocal processes is extended to multivariate Gaussian reciprocal diffusions (GRDs). The second-order self-adjoint differential equation satisfied by the covariance of a GRD specifies a Hamiltonian matrix whose eigenstructure is employed to parametrize the covariance of stationary GRDs. Characterizations of the conservation matrix and of View metadata,the covariance citation and matrix similar of thepapers end at point core.ac.uk values of a stationary GRD are also brought to you by CORE provided. 1997 Academic Press provided by Elsevier - Publisher Connector 1. INTRODUCTION Reciprocal processes were introduced in 1932 by Bernstein [2], who was influenced by an attempt of Schrodinger [3, 4] at developing a stochastic interpretation of quantum mechanics in terms of a class of Markov pro- cesses for which boundary conditions are imposed at both ends of the inter- val of definition. A stochastic process x(t)onI=[0, T] taking values in Rn is called reciprocal if for any two times t0<t1 of I, the process interior to [t0 , t1] is conditionally independent of the process exterior to [t0 , t1], given x(t0) and x(t1). Reciprocal processes contain Markov processes as a subclass. Also, Markov random fields in the sense of Levy [5] reduce for the case of a single parameter to reciprocal, rather than Markov, processes. The properties of reciprocal processes have been examined in detail by a number of authors, and in particular Jamison [1, 6], who obtained, among other results, a classification of all stationary scalar Gaussian reciprocal Received July 11, 1995.
    [Show full text]
  • Graphs and Matrices
    Universitext For other titles published in this series, go to www.springer.com/series/223 R.B. Bapat Graphs and Matrices ABC R.B. Bapat Indian Statistical Institute New Delhi 110016 India [email protected] Editorial board: Sheldon Axler, San Francisco State University Vincenzo Capasso, Università degli Studi di Milano Carles Casacuberta, Universitat de Barcelona Angus MacIntyre, Queen Mary, University of London Kenneth Ribet, University of California, Berkeley Claude Sabbah, CNRS, École Polytechnique Endre Süli, University of Oxford Wojbor Woyczynski,´ Case Western Reserve University A co-publication with the Hindustan Book Agency, New Delhi, licensed for sale in all countries outside of India. Sold and distributed within India by the Hindustan Book Agency, P 19 Green Park Extn., New Delhi 110 016, India ISBN 978-1-84882-980-0 e-ISBN 978-1-84882-981-7 DOI 10.1007/978-1-84882-981-7 Springer London Dordrecht Heidelberg New York British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library Library of Congress Control Number: 2010927407 Mathematics Subject Classification (2010): 05C05, 05C12, 05C20, 05C38, 05C50, 05C57, 05C81, 15A09, 15A15, 15A18, 15B48 °c Hindustan Book Agency (India) Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be repro- duced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms of licenses issued by the Copyright Licensing Agency.
    [Show full text]
  • Arxiv:1804.08325V3 [Math.PR] 15 Jan 2019 a Path Is a Continuous Map X : [0, 1] → Rd
    Forum of Mathematics, Sigma (2019), vol. , e1, 52 pages 1 doi: VARIETIES OF SIGNATURE TENSORS CARLOS AMENDOLA´ 1, PETER FRIZ2 and BERND STURMFELS3 1Technische Universit¨atM¨unchen; [email protected] 2Technische Universit¨atBerlin and WIAS Berlin; [email protected] 2MPI for Mathematics in the Sciences, Leipzig and UC Berkeley; [email protected] Received 23 April 2018 Abstract The signature of a parametric curve is a sequence of tensors whose entries are iterated integrals. This construction is central to the theory of rough paths in stochastic analysis. It is here examined through the lens of algebraic geometry. We introduce varieties of signature tensors for both deterministic paths and random paths. For the former, we focus on piecewise linear paths, on polynomial paths, and on varieties derived from free nilpotent Lie groups. For the latter, we focus on Brownian motion and its mixtures. 2010 Mathematics Subject Classification: 14Q15, 60H99 1. Introduction arXiv:1804.08325v3 [math.PR] 15 Jan 2019 A path is a continuous map X : [0; 1] ! Rd. Unless otherwise stated, we assume that the coordinate functions X1; X2;:::; Xd are (piecewise) continuously 0 differentiable functions. In particular, their differentials dXi(t) = Xi (t)dt obey the usual rules of calculus. The kth signature tensor of X has order k and format (k) k d×d× · · · ×d. This tensor is denoted by σ (X). Its d entries σi1i2···ik are real numbers. These are computed as iterated integrals: Z 1 Z tk Z t3 Z t2 σi1i2···ik = ··· dXi1 (t1) dXi2 (t2) ··· dXik−1 (tk−1) dXik (tk): (1) 0 0 0 0 We also write dX(t) = (dX1(t); dX2(t);:::; dXd(t)) for the differential of the path X.
    [Show full text]
  • Efficient Algorithm for Minimal-Rank Matrix Approximations
    Efficient Algorithm for Minimal-Rank Matrix Approximations Alle-Jan van der Veen Abstract For a given matrix H which has d singular values larger than ε, an expression for all rank-d approximants Hˆ such that (H−Hˆ ) has 2-norm less than ε is derived. These approximants have minimal rank, and the set includes the usual ‘truncated SVD’ low-rank approximation. The main step in the procedure is a generalized Schur algorithm, which requires only O(1/2 m 2n) operations (for an m × n matrix H). The column span of the approximant is computed in this step, and updating and downdating of this space is straightforward. The algorithm is amenable to parallel implementation. 1 Introduction Let H be a given m × n matrix, having d singular values larger than 1 and none equal to 1. Denote by ⋅ the matrix 2-norm. In this paper, we describe an algorithm to compute all possible matrices Hˆ such that (a) H − Hˆ ≤ 1 , (b) rank(Hˆ ) = d . Such a matrix Hˆ is a low-rank approximation of H in 2-norm. The problem can be generalized trivially by scaling H, in which case we compute Hˆ such that H − Hˆ ≤ ε and such that the rank of Hˆ is equal to the number of singular values of H larger than ε. One way to obtain an Hˆ which satisfies (a) and (b) is by computing a singular value decomposition (SVD) of H, and setting all singular values that are smaller than 1 equal to zero. This ‘truncated SVD’ approximant actually minimizes the approximation error: H − Hˆ = σd+1 < 1, and is optimal in Frobenius norm as well.
    [Show full text]