Entanglement Entropy of a One-Dimensional Scalar Field

Total Page:16

File Type:pdf, Size:1020Kb

Entanglement Entropy of a One-Dimensional Scalar Field Master's thesis Entanglement entropy of a one-dimensional scalar field Author: Supervisor: K.R. de Ruiter BSc. Prof. dr. ir. H.T.C. Stoof Theoretical Physics Utrecht University June 2020 ii Abstract In this thesis, we study the entanglement entropy of a chain of coupled harmonic oscillators, which is used to model a one-dimensional bosonic scalar field. Initially, a model for a massless scalar field is discussed. When calculating the entanglement entropy from the reduced density matrix we run into a problem due to the presence of a zero mode, and we are only able to compute the entanglement entropy of one particular case. These difficulties are avoided when we consider a massive scalar field instead, which we accomplish by adding a mass term to the dispersion relation. We numerically study the entanglement entropy of the massive scalar field model as a function of the number of coordinates and the mass parameter and compare with analytical results. By fitting our numerical data we construct a single cross-over function, which describes the entanglement entropy as a function of both the number of coordinates and the mass parameter. The cross-over function agrees well with the numerical data, especially for small values of the mass parameter. Taking then the massless limit, the entanglement entropy of a massless scalar field can nevertheless be determined and reproduces the prediction of conformal field theory. Title page image taken from: https://www.symmetrymagazine.org/article/gravitys-waterfall iii Contents 1 Introduction 1 1.1 Motivation . .3 2 Physical background 7 2.1 Entropy . .7 2.2 Density matrix . .8 2.3 Entanglement entropy . .9 3 Massless scalar field 11 3.1 Three coupled harmonic oscillators . 11 3.1.1 Ground state wave function . 11 3.1.2 Density matrix of the ground state . 15 3.1.3 Reduced density matrix with two coordinates integrated out . 16 ′ 3.1.4 Entanglement entropy of reduced density matrix ρred x1; x1 .... 17 3.1.5 Reduced density matrix with one coordinate integrated out . 18 ( ′ ) ′ 3.1.6 Entanglement entropy of reduced density matrix ρred q1; q1; q2; q2 . 21 3.2 Chain of N harmonic oscillators . 22 ( ) 3.2.1 Ground state wave function . 22 3.2.2 Density matrix of the ground state . 23 3.2.3 Reduced density matrix . 23 3.2.4 Numerical results for the entanglement entropy . 28 4 Massive scalar field 31 4.1 Ground state wave function and density matrix . 31 4.2 Rewriting the reduced density matrix . 32 4.3 Numerical results for the entanglement entropy . 33 4.4 Dimensional analysis . 36 4.5 Determining a cross-over function . 38 4.5.1 First order fit . 41 4.5.2 Pad´efit . 41 4.6 Testing the cross-over function . 43 4.7 The massless limit . 44 5 Discussion and outlook 45 iv 5.1 Discussion . 45 5.2 Outlook . 47 A Proof of dispersion relation product 51 1 Chapter 1 Introduction In 1915, Einstein published his theory of general relativity in which he unified the theory of special relativity and gravity in terms of the curvature of spacetime. One year later, Schwarzschild found an exact solution to Einstein's field equations of general relativity, which contained a coordinate singularity. At that time, Schwarzschild did not understand the physical meaning of this singularity. Nowadays, we know that it describes a black hole. Black holes have an extremely high mass and density, resulting in a very strong curvature of the spacetime around them. The gravitational pull of a black hole is so strong that nothing can escape from it. Not even light particles, photons, can escape, which are the fastest moving particles according to Einstein's relativity theory. The strong gravitational field of a black hole marks a surface beyond which nothing can escape, known as the event horizon of the black hole. This horizon effectively seals off the interior of the black hole from the rest of the universe, making it impossible to observe. Hawking proved that the surface area of a black hole can never decrease as a function of time [1]. Bekenstein noted a strong analogy to the thermodynamical entropy, which also is a quantity that can never decrease in time, according to the second law of thermodynamics. In 1973, this inspired Bekenstein to write a paper in which he tried to unify thermodynam- ics with black hole dynamics [2]. Thermodynamical systems are typically characterised by a handful of macroscopic quantities, such as its temperature, pressure, and volume. The entropy of a system is a measure of the number of different possible internal states, called microstates, that correspond to the same macrostate. Analogously, there exists a theorem for black holes called the no-hair theorem, which states that any black hole that is a solu- tion of the Einstein-Maxwell equations can be fully characterised by only three externally observable quantities: mass, charge, and angular momentum. This would imply, however, that information about the internal states of the black hole is lost. For example, it would be impossible to distinguish between a black hole that formed from collapsing matter or one that formed from collapsing antimatter, if their mass, charge, and angular momentum are equal. This means there is a lack of information about the internal configuration of black holes. Bekenstein noted the analogy to thermodynamical entropy and argued that 2 Chapter 1. Introduction there must be a black-hole entropy related to the lack of information about the interior of a black hole. With the theorem of the black-hole surface area of Hawking in mind, Bekenstein suggested that the black-hole entropy should be proportional to the surface area of the black hole. Previously, physicists had struggled to explain the apparent loss of information of an object with some entropy falling into a black hole. It seemed that the information of the infalling object was lost behind the event horizon, thus violating the second law of thermodynamics, which states that the entropy of an isolated system (the universe) can never decrease. The notion of black-hole entropy provided a solution to this problem, as the entropy of the infalling object is added to the entropy of the black hole. This led to the formulation of the generalised second law, which states that the entropy of the exterior of the black hole plus the entropy of the black hole itself never decreases [3]. One year later, in 1974, Stephen Hawking proved that black holes emit thermal radiation, and thus have a temperature [4]. This confirmed the earlier ideas of Bekenstein, and this quickly led to the famous Bekenstein-Hawking entropy of a black hole, c3k A S B : (1.1) BH 4Gh The fact that the entropy of a black hole indeed= ̵ scales with its area was a striking result because from thermodynamics entropy was known to be an extensive quantity, thus scaling with the volume of the system. This suggests that all the information of the interior of the black hole is somehow encoded on its surface, the event horizon. This insight is what inspired the formulation of the holographic principle, which states that a description of an n 1 -dimensional curved spacetime can be understood as an n-dimensional theory living on its boundary [5]. ( + ) Physicists have been trying to understand the area law behaviour of black-hole entropy ever since it was discovered. A promising candidate to explain the area law of black holes is entanglement entropy, which is a measure of the degree of entanglement in a system. To calculate the entanglement entropy of a system, one first needs to effectively remove a part of the system, which is done by taking the partial trace over a number of the degrees of freedom, thus essentially dividing the system into two subsystems. Tracing out coordinates results in a loss of information, and therefore the leftover state is a mixed state. The mixed state has some entropy associated with it, which is known as the entanglement entropy. To understand why entanglement entropy might help to explain the area law, let us consider an example of a black hole. In the case of a black hole formed by gravitational collapse, the degrees of freedom of the quantum field in the exterior and the interior of the black hole are entangled with each other [6]. Since an observer exterior to the black hole cannot access the interior, the interesting state for an external observer of a black hole is the state where the internal states are removed. Mathematically this can be done by tracing over the degrees of freedom of the interior of the black hole, resulting in a mixed state with some associated entropy. Entanglement entropy is defined as the entropy associated with a mixed state that describes a subsystem that is part of a larger system. Due to the analogy between the state of interest for an external observer of a black hole and the definition of entanglement entropy, it is thought that entanglement entropy might be a 1.1. Motivation 3 good candidate to try to explain the area law of black-hole entropy. In 1986, Bombelli et al. showed that the entanglement entropy of a system of coupled oscillators, which is used to model quantum fields, is indeed proportional to the area of the inaccessible traced out region [7]. Later, in 1993, Srednicki separately found similar results, showing that the entanglement entropy of a quantum field obeys an area law [8]. Bombelli and Srednicki argue that the entanglement of a massless free scalar field might be related to the entropy of a black hole and that entanglement entropy might, therefore, help us to better understand the area law of black-hole entropy.
Recommended publications
  • Lecture Notes in One File
    Phys 6124 zipped! World Wide Quest to Tame Math Methods Predrag Cvitanovic´ January 2, 2020 Overview The career of a young theoretical physicist consists of treating the harmonic oscillator in ever-increasing levels of abstraction. — Sidney Coleman I am leaving the course notes here, not so much for the notes themselves –they cannot be understood on their own, without the (unrecorded) live lectures– but for the hyperlinks to various source texts you might find useful later on in your research. We change the topics covered year to year, in hope that they reflect better what a graduate student needs to know. This year’s experiment are the two weeks dedicated to data analysis. Let me know whether you would have preferred the more traditional math methods fare, like Bessels and such. If you have taken this course live, you might have noticed a pattern: Every week we start with something obvious that you already know, let mathematics lead us on, and then suddenly end up someplace surprising and highly non-intuitive. And indeed, in the last lecture (that never took place), we turn Coleman on his head, and abandon harmonic potential for the inverted harmonic potential, “spatiotemporal cats” and chaos, arXiv:1912.02940. Contents 1 Linear algebra7 HomeworkHW1 ................................ 7 1.1 Literature ................................ 8 1.2 Matrix-valued functions ......................... 9 1.3 A linear diversion ............................ 12 1.4 Eigenvalues and eigenvectors ...................... 14 1.4.1 Yes, but how do you really do it? . 18 References ................................... 19 exercises 20 2 Eigenvalue problems 23 HomeworkHW2 ................................ 23 2.1 Normal modes .............................. 24 2.2 Stable/unstable manifolds .......................
    [Show full text]
  • Introduction to Quantum Field Theory
    Utrecht Lecture Notes Masters Program Theoretical Physics September 2006 INTRODUCTION TO QUANTUM FIELD THEORY by B. de Wit Institute for Theoretical Physics Utrecht University Contents 1 Introduction 4 2 Path integrals and quantum mechanics 5 3 The classical limit 10 4 Continuous systems 18 5 Field theory 23 6 Correlation functions 36 6.1 Harmonic oscillator correlation functions; operators . 37 6.2 Harmonic oscillator correlation functions; path integrals . 39 6.2.1 Evaluating G0 ............................... 41 6.2.2 The integral over qn ............................ 42 6.2.3 The integrals over q1 and q2 ....................... 43 6.3 Conclusion . 44 7 Euclidean Theory 46 8 Tunneling and instantons 55 8.1 The double-well potential . 57 8.2 The periodic potential . 66 9 Perturbation theory 71 10 More on Feynman diagrams 80 11 Fermionic harmonic oscillator states 87 12 Anticommuting c-numbers 90 13 Phase space with commuting and anticommuting coordinates and quanti- zation 96 14 Path integrals for fermions 108 15 Feynman diagrams for fermions 114 2 16 Regularization and renormalization 117 17 Further reading 127 3 1 Introduction Physical systems that involve an infinite number of degrees of freedom are usually described by some sort of field theory. Almost all systems in nature involve an extremely large number of degrees of freedom. A droplet of water contains of the order of 1026 molecules and while each water molecule can in many applications be described as a point particle, each molecule has itself a complicated structure which reveals itself at molecular length scales. To deal with this large number of degrees of freedom, which for all practical purposes is infinite, we often regard a system as continuous, in spite of the fact that, at certain distance scales, it is discrete.
    [Show full text]
  • Journal of Computational and Applied Mathematics Exponentials of Skew
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Elsevier - Publisher Connector Journal of Computational and Applied Mathematics 233 (2010) 2867–2875 Contents lists available at ScienceDirect Journal of Computational and Applied Mathematics journal homepage: www.elsevier.com/locate/cam Exponentials of skew-symmetric matrices and logarithms of orthogonal matrices João R. Cardoso a,b,∗, F. Silva Leite c,b a Institute of Engineering of Coimbra, Rua Pedro Nunes, 3030-199 Coimbra, Portugal b Institute of Systems and Robotics, University of Coimbra, Pólo II, 3030-290 Coimbra, Portugal c Department of Mathematics, University of Coimbra, 3001-454 Coimbra, Portugal article info a b s t r a c t Article history: Two widely used methods for computing matrix exponentials and matrix logarithms are, Received 11 July 2008 respectively, the scaling and squaring and the inverse scaling and squaring. Both methods become effective when combined with Padé approximation. This paper deals with the MSC: computation of exponentials of skew-symmetric matrices and logarithms of orthogonal 65Fxx matrices. Our main goal is to improve these two methods by exploiting the special structure Keywords: of skew-symmetric and orthogonal matrices. Geometric features of the matrix exponential Skew-symmetric matrix and logarithm and extensions to the special Euclidean group of rigid motions are also Orthogonal matrix addressed. Matrix exponential ' 2009 Elsevier B.V. All rights reserved. Matrix logarithm Scaling and squaring Inverse scaling and squaring Padé approximants 1. Introduction n×n Given a square matrix X 2 R , the exponential of X is given by the absolute convergent power series 1 X X k eX D : kW kD0 n×n X Reciprocally, given a nonsingular matrix A 2 R , any solution of the matrix equation e D A is called a logarithm of A.
    [Show full text]
  • The Exponential Map for the Group of Similarity Transformations and Applications to Motion Interpolation
    The exponential map for the group of similarity transformations and applications to motion interpolation Spyridon Leonardos1, Christine Allen–Blanchette2 and Jean Gallier3 Abstract— In this paper, we explore the exponential map The problem of motion interpolation has been studied and its inverse, the logarithm map, for the group SIM(n) of extensively both in the robotics and computer graphics n similarity transformations in R which are the composition communities. Since rotations can be represented by quater- of a rotation, a translation and a uniform scaling. We give a formula for the exponential map and we prove that it is nions, the problem of quaternion interpolation has been surjective. We give an explicit formula for the case of n = 3 investigated, an approach initiated by Shoemake [21], [22], and show how to efficiently compute the logarithmic map. As who extended the de Casteljau algorithm to the 3-sphere. an application, we use these algorithms to perform motion Related work was done by Barr et al. [2]. Moreover, Kim interpolation. Given a sequence of similarity transformations, et al. [13], [14] corrected bugs in Shoemake and introduced we compute a sequence of logarithms, then fit a cubic spline 4 that interpolates the logarithms and finally, we compute the various kinds of splines on the 3-sphere in R , using the interpolating curve in SIM(3). exponential map. Motion interpolation and rational motions have been investigated by Juttler¨ [9], [10], Juttler¨ and Wagner I. INTRODUCTION [11], [12], Horsch and Juttler¨ [8], and Roschel¨ [20]. Park and Ravani [18], [19] also investigated Bezier´ curves on The exponential map is ubiquitous in engineering appli- Riemannian manifolds and Lie groups and in particular, the cations ranging from dynamical systems and robotics to group of rotations.
    [Show full text]
  • Linear Algebra Review
    Appendix A Linear Algebra Review In this appendix, we review results from linear algebra that are used in the text. The results quoted here are mostly standard, and the proofs are mostly omitted. For more information, the reader is encouraged to consult such standard linear algebra textbooks as [HK]or[Axl]. Throughout this appendix, we let Mn.C/ denote the space of n n matrices with entries in C: A.1 Eigenvectors and Eigenvalues n For any A 2 Mn.C/; a nonzero vector v in C is called an eigenvector for A if there is some complex number such that Av D v: An eigenvalue for A is a complex number for which there exists a nonzero v 2 Cn with Av D v: Thus, is an eigenvalue for A if the equation Av D v or, equivalently, the equation .A I /v D 0; has a nonzero solution v: This happens precisely when A I fails to be invertible, which is precisely when det.A I / D 0: For any A 2 Mn.C/; the characteristic polynomial p of A is given by A previous version of this book was inadvertently published without the middle initial of the author’s name as “Brian Hall”. For this reason an erratum has been published, correcting the mistake in the previous version and showing the correct name as Brian C. Hall (see DOI http:// dx.doi.org/10.1007/978-3-319-13467-3_14). The version readers currently see is the corrected version. The Publisher would like to apologize for the earlier mistake.
    [Show full text]
  • Arxiv:2004.07192V2 [Quant-Ph] 14 May 2021
    Two-way covert quantum communication in the microwave regime R. Di Candia,1, ∗ H. Yi˘gitler,1 G. S. Paraoanu,2 and R. J¨antti1 1Department of Communications and Networking, Aalto University, Espoo, 02150 Finland 2QTF Centre of Excellence, Department of Applied Physics, Aalto University School of Science, FI-00076 AALTO, Finland Quantum communication addresses the problem of exchanging information across macroscopic distances by employing encryption techniques based on quantum mechanical laws. Here, we ad- vance a new paradigm for secure quantum communication by combining backscattering concepts with covert communication in the microwave regime. Our protocol allows communication between Alice, who uses only discrete phase modulations, and Bob, who has access to cryogenic microwave technology. Using notions of quantum channel discrimination and quantum metrology, we find the ultimate bounds for the receiver performance, proving that quantum correlations can enhance the signal-to-noise ratio by up to 6 dB. These bounds rule out any quantum illumination advantage when the source is strongly amplified, and shows that a relevant gain is possible only in the low photon-number regime. We show how the protocol can be used for covert communication, where the carrier signal is indistinguishable from the thermal noise in the environment. We complement our information-theoretic results with a feasible experimental proposal in a circuit QED platform. This work makes a decisive step toward implementing secure quantum communication concepts in the previously uncharted 1 − 10 GHz frequency range, in the scenario when the disposable power of one party is severely constrained. I. INTRODUCTION range. For instance, QKD security proofs require level of noises which at room temperature are reachable only by frequencies at least in the Terahertz band [8].
    [Show full text]
  • Randomized Linear Algebra Approaches to Estimate the Von Neumann Entropy of Density Matrices
    Randomized Linear Algebra Approaches to Estimate the Von Neumann Entropy of Density Matrices Eugenia-Maria Kontopoulou Ananth Grama Wojciech Szpankowski Petros Drineas Purdue University Purdue University Purdue University Purdue University Computer Science Computer Science Computer Science Computer Science West Lafayette, IN, USA West Lafayette, IN, USA West Lafayette, IN, USA West Lafayette, IN, USA Email: [email protected] Email: [email protected] Email: [email protected] Email: [email protected] Abstract—The von Neumann entropy, named after John von Motivated by the above discussion, we seek numerical Neumann, is the extension of classical entropy concepts to the algorithms that approximate the von Neumann entropy of large field of quantum mechanics and, from a numerical perspective, density matrices, e.g., symmetric positive definite matrices can be computed simply by computing all the eigenvalues of a 3 density matrix, an operation that could be prohibitively expensive with unit trace, faster than the trivial O(n ) approach. Our for large-scale density matrices. We present and analyze two algorithms build upon recent developments in the field of randomized algorithms to approximate the von Neumann entropy Randomized Numerical Linear Algebra (RandNLA), an in- of density matrices: our algorithms leverage recent developments terdisciplinary research area that exploits randomization as a in the Randomized Numerical Linear Algebra (RandNLA) liter- computational resource to develop improved algorithms for ature, such as randomized trace
    [Show full text]
  • Computing Real Square Roots of a Real Matrix* LINEAR ALGEBRA
    Computing Real Square Roots of a Real Matrix* Nicholas J. Higham Department of Mathematics University of Manchester Manchester Ml3 9PL, England In memory of James H. WiIkinson Submitted by Hans Schneider ABSTRACT Bjiirck and Hammarling [l] describe a fast, stable Schur method for computing a square root X of a matrix A (X2 = A).We present an extension of their method which enables real arithmetic to be used throughout when computing a real square root of a real matrix. For a nonsingular real matrix A conditions are given for the existence of a real square root, and for the existence of a real square root which is a polynomial in A; thenumber of square roots of the latter type is determined. The conditioning of matrix square roots is investigated, and an algorithm is given for the computation of a well-conditioned square root. 1. INTRODUCTION Given a matrix A, a matrix X for which X2 = A is called a square root of A. Several authors have considered the computation of matrix square roots [3, 4, 9, 10, 15, 161. A particularly attractive method which utilizes the Schur decomposition is described by Bjiirck and Hammarling [l]; in general it requires complex arithmetic. Our main purpose is to show how the method can be extended so as to compute a real square root of a real matrix, if one exists, in real arithmetic. The theory behind the existence of matrix square roots is nontrivial, as can be seen by noting that while the n x n identity matrix has infinitely many square roots for n > 2 (any involutary matrix such as a Householder transformation is a square root), a nonsingular Jordan block has precisely two square roots (this is proved in Corollary 1).
    [Show full text]
  • Floquet Theory for Time Scales and Putzer Representations of Matrix Logarithms
    Taylor & Francis Journal of Difference Equations and Applications, Ta@rhFrancir tmup 2003 VOL.9 (1). pp. 77-92 Floquet Theory for Time Scales and Putzer Representations of Matrix Logarithms CALVIN D. AHLBRANDP,* and JERRY RIDENHOURb" aDepartment of Mathematics, University of Missouri, Columbia, MO 6521 1, USA; bDepartment of Mathematics and Statistics, Utah State University, Logan, UT 84322-3900, USA (Received 14 September 2001; Revised 9 October 2001; In final form 9 October 2001) Dedicated to Allan Peterson on the occasion of his 60th birthday. A Floquet theory is presented that generalizes known results for differential equations and for difference equations to the setting of dynamic equations on time scales. Since logarithms of matrices play a key role in Floquet theory, considerable effort is expended in producing case-free exact representations of the principal branch of the matrix logarithm. Such representations were fmt produced by Putzer as representations of matrix exponentials. Some representations depend on knowledge of the eigenvalues while others depend only on the coefficients of the characteristic polynomial. Logarithms of special forms of matrices are also considered. In particular, it is shown that the square of a nonsingular matrix with real entries has a logarithm with real entries. Keywords: Floquet theory; Matrix logarithm; Principal branch; Putzer representation 2000 AMS Subject ClassiJication: 39A10 1. INTRODUCTION The theory of dynamic equations on time scales (or, more generally, measure chains) was introduced in Stefan Hilger's PhD thesis in 1988. The theory presents a structure where, once a result is established for general time scales, special cases include a result for differential equations (obtained by taking the time scale to be the real numbers) and a result for difference equations (obtained by taking the time scale to be the integers).
    [Show full text]
  • Fast Computation of Von Neumann Entropy for Large-Scale Graphs Via Quadratic Approximations
    Linear Algebra and its Applications 585 (2020) 127–146 Contents lists available at ScienceDirect Linear Algebra and its Applications www.elsevier.com/locate/laa Fast computation of von Neumann entropy for large-scale graphs via quadratic approximations Hayoung Choi a,∗, Jinglian He b, Hang Hu b, Yuanming Shi b a Research Institute of Mathematics, Seoul National University, Republic of Korea b School of Information Science and Technology, ShanghaiTech University, China a r t i c l e i n f o a b s t r a c t Article history: The von Neumann graph entropy (VNGE) can be used as Received 21 November 2018 a measure of graph complexity, which can be the measure Accepted 24 September 2019 of information divergence and distance between graphs. Available online 1 October 2019 However, computing VNGE is extensively demanding for a Submitted by M. Benzi large-scale graph. We propose novel quadratic approximations MSC: for fast computing VNGE. Various inequalities for error 05C12 between the quadratic approximations and the exact VNGE 05C50 are found. Our methods reduce the cubic complexity of VNGE 05C80 to linear complexity. Computational simulations on random 05C90 graph models and various real network datasets demonstrate 81P45 superior performance. 81P68 © 2019 Elsevier Inc. All rights reserved. Keywords: Von Neumann entropy Von Neumann graph entropy Graph dissimilarity Density matrix 1. Introduction Graph is one of the most common representations of complex data. It has the sophis- ticated capability of representing and summarizing irregular structural features. Today, * Corresponding author. E-mail addresses: [email protected] (H. Choi), [email protected] (J.
    [Show full text]
  • Logarithms and Square Roots of Real Matrices Existence, Uniqueness, and Applications in Medical Imaging
    Logarithms and Square Roots of Real Matrices Existence, Uniqueness, and Applications in Medical Imaging Jean Gallier Department of Computer and Information Science University of Pennsylvania Philadelphia, PA 19104, USA [email protected] September 2, 2019 Abstract. The need for computing logarithms or square roots of real matrices arises in a number of applied problems. A significant class of problems comes from medical imag- ing. One of these problems is to interpolate and to perform statistics on data represented by certain kinds of matrices (such as symmetric positive definite matrices in DTI). Another important and difficult problem is the registration of medical images. For both of these prob- lems, the ability to compute logarithms of real matrices turns out to be crucial. However, not all real matrices have a real logarithm and thus, it is important to have sufficient conditions for the existence (and possibly the uniqueness) of a real logarithm for a real matrix. Such conditions (involving the eigenvalues of a matrix) are known, both for the logarithm and the square root. As far as I know, with the exception of Higham's recent book [18], proofs of the results involving these conditions are scattered in the literature and it is not easy to locate them. Moreover, Higham's excellent book assumes a certain level of background in linear algebra that readers interested in applications to medical imaging may not possess so we feel that a more elementary presentation might be a valuable supplement to Higham [18]. In this paper, I present a unified exposition of these results, including a proof of the existence of the Real Jordan Form, and give more direct proofs of some of these results using the Real Jordan Form.
    [Show full text]
  • Bayesian Inference of Log Determinants
    Bayesian Inference of Log Determinants Jack Fitzsimons1 Kurt Cutajar2 Michael Osborne1 Stephen Roberts1 Maurizio Filippone2 1 Information Engineering, University of Oxford, UK 2 Department of Data Science, EURECOM, France Abstract The standard approach for evaluating the log- determinant of a positive definite matrix involves The log-determinant of a kernel matrix ap- the use of Cholesky decomposition (Golub & Van Loan, pears in a variety of machine learning prob- 1996), which is employed in various applications of lems, ranging from determinantal point pro- statistical models such as kernel machines. However, cesses and generalized Markov random fields, the use of Cholesky decomposition for general dense 3 through to the training of Gaussian processes. matrices requires O(n ) operations, whilst also entail- 2 Exact calculation of this term is often in- ing memory requirements of O(n ). In view of this tractable when the size of the kernel matrix ex- computational bottleneck, various models requiring ceeds a few thousands. In the spirit of proba- the log-determinant for inference bypass the need to bilistic numerics, we reinterpret the problem of compute it altogether (Anitescu et al., 2012; Stein et al., computing the log-determinant as a Bayesian 2013; Cutajar et al., 2016; Filippone & Engler, 2015). inference problem. In particular, we com- Alternatively, several methods exploit sparsity and struc- bine prior knowledge in the form of bounds ture within the matrix itself to accelerate computations. from matrix theory and evidence derived from For example, sparsity in Gaussian Markov Random stochastic trace estimation to obtain proba- fields (GMRFs) arises from encoding conditional inde- bilistic estimates for the log-determinant and pendence assumptions that are readily available when its associated uncertainty within a given com- considering low-dimensional problems.
    [Show full text]