On Reciprocal Systems and Controllability

Total Page:16

File Type:pdf, Size:1020Kb

On Reciprocal Systems and Controllability On reciprocal systems and controllability Timothy H. Hughes a aDepartment of Mathematics, University of Exeter, Penryn Campus, Penryn, Cornwall, TR10 9EZ, UK Abstract In this paper, we extend classical results on (i) signature symmetric realizations, and (ii) signature symmetric and passive realizations, to systems which need not be controllable. These results are motivated in part by the existence of important electrical networks, such as the famous Bott-Duffin networks, which possess signature symmetric and passive realizations that are uncontrollable. In this regard, we provide necessary and sufficient algebraic conditions for a behavior to be realized as the driving-point behavior of an electrical network comprising resistors, inductors, capacitors and transformers. Key words: Reciprocity; Passive system; Linear system; Controllability; Observability; Behaviors; Electrical networks. 1 Introduction Practical motivation for developing a theory of reci- procity that does not assume controllability arises from This paper is concerned with reciprocal systems (see, electrical networks. Notably, the driving-point behavior e.g., Casimir, 1963; Willems, 1972; Anderson and Vong- of an electrical network comprising resistors, inductors, panitlerd, 2006; Newcomb, 1966; van der Schaft, 2011). capacitors and transformers (an RLCT network) is nec- Reciprocity is an important form of symmetry in physi- essarily reciprocal, and also passive, 2 but it need not be cal systems which arises in acoustics (Rayleigh-Carson controllable (see C¸amlibel et al., 2003; Willems, 2004; reciprocity); elasticity (the Maxwell-Betti reciprocal Hughes, 2017d). Indeed, as noted by C¸amlibel et al. work theorem); electrostatics (Green's reciprocity); and (2003), it is not known what (uncontrollable) behav- electromagnetics (Lorentz reciprocity), where it follows iors can be realized as the driving-point behavior of an as a result of Maxwell's laws (Newcomb, 1966, p. 43). RLCT network. In addition, an RLCT network need not Special cases of reciprocal systems include reversible possess an impedance function, so the conventional def- systems, as arise in thermodynamics; and relaxation inition of a reciprocal system as one with a symmetric systems, such as viscoelastic materials (Willems, 1972). transfer function is inappropriate for such networks. In addition, reciprocity is a property of important classes of electrical, mechanical and structural systems, The purpose of this paper is to address the aforemen- such as lightly damped flexible structures (Ferrante and tioned limitations with the theory of reciprocity. The Ntogramatzidis, 2013). Our focus in this paper is on paper is structured as follows. In Section 3, we review linear reciprocal systems. In contemporary systems and the classical theory of reciprocal systems in more detail, arXiv:1712.09436v2 [cs.SY] 4 Apr 2018 control theory, a linear reciprocal system is typically with a particular focus on passive and reciprocal sys- defined as a system with a symmetric transfer function. tems, to highlight the limitations of the existing theory A fundamental result in systems and control theory and the contributions of this paper. In Sections 4 and states that if the transfer function is also proper, then 5, we proceed to develop a theory of reciprocal systems the system possesses a so-called signature symmetric which addresses these limitations. Sections 6 and 7 are realization (see Willems, 1972; Anderson and Vongpan- then concerned with systems that are both reciprocal itlerd, 2006; Fuhrmann, 1983; Youla and Tissi, 1966). and passive, such as RLCT networks. The main results However, this result is subject to one notable caveat: are summarised in the following two paragraphs. the system is assumed to be controllable. In Section 4, we provide a formal definition of reci- procity (Definition 5), which was first proposed by Newcomb (1966). The main advantage of this definition Email address: [email protected] (Timothy H. Hughes). 1 c 2018. This manuscript is made available under the 2 A system is passive if the net energy that can be extracted CC-BY-NC-ND 4.0 license http://creativecommons.org/ from the system into the future is bounded above (this bound licenses/by-nc-nd/4.0/ depending only on the past trajectory of the system). Preprint submitted to Automatica 17 July 2018 is that it does not assume the existence of a symmetric then spec(M) := fλ 2 C j det(λI−M) = 0g; and if, in transfer function. This is particularly fitting in the con- addition, M is symmetric, then M > 0 (M ≥ 0) indi- text of electrical networks as these need not possess an cates that M is positive (non-negative) definite. A ma- impedance function. We then provide a 2-part theorem trix Σ 2 Rn×n is called a signature matrix if it is diagonal which we call the reciprocal behavior theorem. In part 1 and all of its entries are either 1 or −1. A V 2 Rn×n[ξ] (Theorem 7), we provide necessary and sufficient con- is called unimodular if det (V ) is a non-zero constant ditions for a system to be reciprocal in terms of the dif- (equivalently, V is nonsingular with V −1 2 Rn×n[ξ]). If ferential equations describing the system. We also prove H 2 Rn×n(ξ), then H is called positive-real if H is ana- ¯ T that, for any given reciprocal system, it is possible to lytic in C+ and H(λ) + H(λ) ≥ 0 for all λ 2 C+. permute the system's variables to obtain a system with The (k-vector-valued) locally integrable functions a proper symmetric transfer function. Part 2 (Theorem loc k 9) then proves the existence of a signature symmetric re- are denoted L1 R; R (Polderman and Willems, alization for any given system with a proper symmetric 1998, Defns. 2.3.3, 2.3.4), and we equate any two lo- transfer function (irrespective of controllability). cally integrable functions that differ only on a set of measure zero. The (k-vector-valued) infinitely dif- Section 6 contains another 2-part theorem: the passive ferentiable functions with bounded support on the and reciprocal behavior theorem. Part 1 (Theorem 17) left (resp., bounded support on the right, bounded provides necessary and sufficient algebraic conditions for k k support) are denoted D+ R; R (resp., D− R; R , a system to be passive and reciprocal in terms of the dif- k D R; R ). The convolution operator is denoted by ferential equations describing the system. This theorem k also answers the first open problem posed in C¸amlibel ?; i.e., if w1; w2 2 D+ R; R , then (w1 ? w2)(t) = R 1 T et al. (2003) in the more general setting of multi-port −∞ w1(τ) w2(t − τ)dτ. networks: it is shown that a behavior B is realizable as A main contribution of this paper is to develop a theory the driving-point behavior of an RLCT network if and of reciprocal systems which doesn't assume controllabil- only if B is passive and reciprocal. Part 2 (Theorem 18) ity, observability, or the existence of a transfer function. then proves the existence of a passive and signature sym- This is relevant to electric networks which can possess metric realization for any given passive system with a uncontrollable and unobservable internal modes, and proper symmetric transfer function. The results in this whose driving-point currents and voltages need not ad- section build on earlier results in (Hughes, 2017c,a) on here to the conventional system theoretic input-output systems which are passive but not necessarily reciprocal. view. The natural framework to formalise these issues The extension to consider passive and reciprocal systems is the behavioral approach (Polderman and Willems, is by no means trivial, and depends on a number of sup- 1998). Accordingly, the remainder of this section con- plementary lemmas that are provided in Section 7 and tains relevant definitions and results on behaviors. Appendix B. Finally, the proofs in the paper, together with existing results in the literature, provide an algo- We consider behaviors (systems) defined as the set of rithm for constructing an RLCT network realization of weak solutions (see Polderman and Willems, 1998, Sec- an arbitrary given reciprocal and passive behavior. This tion 2.3.2) to a differential equation: is illustrated by two examples in Section 8. loc q d p×q B = fw 2 L1 (R; R ) j R( dt )w=0g;R 2 R [s]: (2.1) 2 Notation and Preliminaries The behavior B is called controllable if, for any two tra- jectories w ; w 2 B and t 2 , there exists w 2 B We denote the real and complex numbers by R and C, 1 2 0 R and t ≥ t such that w(t) = w (t) for all t ≤ t and and the open and closed right-half plane by C+ and C+. 1 0 1 0 w(t) = w (t) for all t ≥ t (Polderman and Willems, If λ 2 C, then λ¯ denotes its complex conjugate. The poly- 2 1 nomials, rational functions, and proper (i.e., bounded at 1998, Definition 5.2.2). From (Polderman and Willems, infinity) rational functions in the indeterminate ξ with 1998, Theorem 5.2.10), B in (2.1) is controllable if and only if rank(R(λ)) is the same for all λ 2 . real coefficients are denoted R[ξ]; R(ξ), and Rp(ξ). The C m×n matrices with entries from R (resp., R[ξ], R(ξ), We pay particular attention to state-space systems: m×n m×n m×n Rp(ξ)) are denoted R (resp., R [ξ], R (ξ), m×n(ξ)), and n is omitted if n = 1. We denote the loc n loc n loc d Rp Bs = f(u; y; x)2L1 (R; R ) ×L1 (R; R ) ×L1 R; R j block column and block diagonal matrices with entries dx = Ax + Bu and y = Cx + Dug; H1;:::;Hn by col(H1 ··· Hn) and diag(H1 ··· Hn); dt d×d d×n n×d n×n and we will use horizontal and vertical lines to indicate A 2 R ;B 2 R ;C 2 R and D 2 R : (2.2) the partition in block matrix equations (e.g., see (B.5)).
Recommended publications
  • Package 'Igraphmatch'
    Package ‘iGraphMatch’ January 27, 2021 Type Package Title Tools Graph Matching Version 1.0.1 Description Graph matching methods and analysis. The package works for both 'igraph' objects and matrix objects. You provide the adjacency matrices of two graphs and some other information you might know, choose the graph matching method, and it returns the graph matching results. 'iGraphMatch' also provides a bunch of useful functions you might need related to graph matching. Depends R (>= 3.3.1) Imports clue (>= 0.3-54), Matrix (>= 1.2-11), igraph (>= 1.1.2), irlba, methods, Rcpp Suggests dplyr (>= 0.5.0), testthat (>= 2.0.0), knitr, rmarkdown VignetteBuilder knitr License GPL (>= 2) LazyData TRUE RoxygenNote 7.1.1 Language en-US Encoding UTF-8 LinkingTo Rcpp NeedsCompilation yes Author Daniel Sussman [aut, cre], Zihuan Qiao [aut], Joshua Agterberg [ctb], Lujia Wang [ctb], Vince Lyzinski [ctb] Maintainer Daniel Sussman <[email protected]> Repository CRAN Date/Publication 2021-01-27 16:00:02 UTC 1 2 bari_start R topics documented: bari_start . .2 best_matches . .4 C.Elegans . .5 center_graph . .6 check_seeds . .7 do_lap . .8 Enron . .9 get_perm . .9 graph_match_convex . 10 graph_match_ExpandWhenStuck . 12 graph_match_IsoRank . 13 graph_match_Umeyama . 15 init_start . 16 innerproduct . 17 lapjv . 18 lapmod . 18 largest_common_cc . 19 matched_adjs . 20 match_plot_igraph . 20 match_report . 22 pad.............................................. 23 row_cor . 24 rperm . 25 sample_correlated_gnp_pair . 25 sample_correlated_ieg_pair . 26 sample_correlated_sbm_pair . 28 split_igraph . 29 splrMatrix-class . 30 splr_sparse_plus_constant . 31 splr_to_sparse . 31 Index 32 bari_start Start matrix initialization Description initialize the start matrix for graph matching iteration. bari_start 3 Usage bari_start(nns, ns = 0, soft_seeds = NULL) rds_sinkhorn_start(nns, ns = 0, soft_seeds = NULL, distribution = "runif") rds_perm_bari_start(nns, ns = 0, soft_seeds = NULL, g = 1, is_splr = TRUE) rds_from_sim_start(nns, ns = 0, soft_seeds = NULL, sim) Arguments nns An integer.
    [Show full text]
  • Emergent Spacetimes
    Emergent spacetimes Silke Christine Edith Weinfurtner Department of Mathematics, Statistics and Computer Science — Te Kura Tatau arXiv:0711.4416v1 [gr-qc] 28 Nov 2007 Thesis submitted for the degree of Doctor of Philosophy at the Victoria University of Wellington. In Memory of Johann Weinfurtner Abstract In this thesis we discuss the possibility that spacetime geometry may be an emergent phenomenon. This idea has been motivated by the Analogue Gravity programme. An “effective gravitational field” dominates the kinematics of small perturbations in an Analogue Model. In these models there is no obvious connection between the “gravitational” field tensor and the Einstein equations, as the emergent spacetime geometry arises as a consequence of linearising around some classical field. After a brief survey of the most relevant literature on this topic, we present our contributions to the field. First, we show that the spacetime geometry on the equatorial slice through a rotating Kerr black hole is formally equivalent to the geometry felt by phonons entrained in a rotating fluid vortex. The most general acoustic geometry is compatible with the fluid dynamic equations in a collapsing/ ex- panding perfect-fluid line vortex. We demonstrate that there is a suitable choice of coordinates on the equatorial slice through a Kerr black hole that puts it into this vortex form; though it is not possible to put the entire Kerr spacetime into perfect-fluid “acoustic” form. We then discuss an analogue spacetime based on the propagation of excitations in a 2-component Bose–Einstein condensate. This analogue spacetime has a very rich and complex structure, which permits us to provide a mass-generating mechanism for the quasi-particle excitations.
    [Show full text]
  • The Number of Equivalence Classes of Symmetric Sign Patterns
    The number of equivalence classes of symmetric sign patterns Peter J. Cameron a;1 Charles R. Johnson b aSchool of Mathematical Sciences, Queen Mary, University of London, London E1 4NS, U.K. bDepartment of Mathematics, College of William and Mary, Williamsburg, VA, USA Abstract This paper shows that the number of sign patterns of totally non-zero symmetric n-by-n matrices, up to conjugation by monomial matrices and negation, is equal to the number of unlabelled graphs on n vertices. Key words: symmetric matrix, sign pattern, enumeration, duality 1 Introduction By a (totally non-zero) sign pattern, we mean an n-by-n array S = (sij) of + and signs. With S, we associate the set off all real n-by-n matrices − S such that A = (aij) if and only if aij > 0 whenever sij = + and aij < 0 2 S whenever sij = . Many questions about which properties P are required (all elements of enjoy− P ) or allowed (some element of has P ) by a particular sign patternSS have been studied [3,4]. S One may also consider properties of pairs of sign patterns S1 and S2. For example, one such property of recent interest is commutativity of symmetric sign patterns [1]. We say that S1 and S2 allow commutativity (\commute", for short) if there exist symmetric matrices A1 1 and A2 2 such that 2 S 2 S A1A2 = A2A1. For a given n, a complete answer to the above question might be succinctly described by an undirected graph G, whose vertices are the sign patterns, with an edge between two distinct sign patterns if and only if they 1 Corresponding author; email: [email protected].
    [Show full text]
  • Solving an Inverse Eigenvalue Problem Subject to Triple Constraints
    SOLVING AN INVERSE EIGENVALUE PROBLEM WITH TRIPLE CONSTRAINTS ON EIGENVALUES, SINGULAR VALUES, AND DIAGONAL ELEMENTS SHENG-JHIH WU∗ AND MOODY T. CHU† Abstract. An inverse eigenvalue problem usually entails two constraints, one conditioned upon the spectrum and the other on the structure. This paper investigates the problem where triple constraints of eigenvalues, singular values, and diagonal entries are imposed simultaneously. An approach combining an eclectic mix of skills from differential geometry, optimization theory, and analytic gradient flow is employed to prove the solvability of such a problem. The result generalizes the classical Mirsky, Sing-Thompson, and Weyl-Horn theorems concerning the respective majorization relationships between any two of the arrays of main diagonal entries, eigenvalues, and singular values. The existence theory fills a gap in the classical matrix theory. The problem might find applications in wireless communication and quantum information science. The technique employed can be implemented as a first-step numerical method for constructing the matrix. With slight modification, the approach might be used to explore similar types of inverse problems where the prescribed entries are at general locations. Key words. inverse eigenvalue problem, majorization relationships, projected gradient, projected Hessian, analytic gradient dynamics, AMS subject classifications. 65F18, 90C52, 15A29, 15A45, 1. Introduction. Thefocusof this paperis on the existenceof a solution to a new type of inverse eigenvalue problem (IEP) where triple constraints of eigenvalues, singular values, and diagonal entries must be satisfied simultaneously. Before we present our results and explore some possible applications of this particular type of IEP,it might be fitting to givea brief recounton the generalscope of IEPs and why they are interesting, important, and challenging.
    [Show full text]
  • Signature Matrices: the Eigenvalue Problem
    University of Texas at El Paso DigitalCommons@UTEP Open Access Theses & Dissertations 2010-01-01 Signature Matrices: The iE genvalue Problem Valeria Aguirre Holguin University of Texas at El Paso, [email protected] Follow this and additional works at: https://digitalcommons.utep.edu/open_etd Part of the Mathematics Commons Recommended Citation Aguirre Holguin, Valeria, "Signature Matrices: The iE genvalue Problem" (2010). Open Access Theses & Dissertations. 2623. https://digitalcommons.utep.edu/open_etd/2623 This is brought to you for free and open access by DigitalCommons@UTEP. It has been accepted for inclusion in Open Access Theses & Dissertations by an authorized administrator of DigitalCommons@UTEP. For more information, please contact [email protected]. SIGNATURE MATRICES: THE EIGENVALUE PROBLEM VALERIA AGUIRRE HOLGUIN Department of Mathematical Sciences APPROVED: Piotr Wojciechowski, Ph.D. Emil Schwab, Ph.D. Vladik Kreinovich, Ph.D. Patricia D. Witherspoon, Ph.D. Dean of the Graduate School c Copyright by Valeria Aguirre Holgu´ın 2010 SIGNATURE MATRICES: THE EIGENVALUE PROBLEM by VALERIA AGUIRRE HOLGUIN THESIS Presented to the Faculty of the Graduate School of The University of Texas at El Paso in Partial Fulfillment of the Requirements for the Degree of MASTER OF SCIENCE Department of Mathematical Sciences THE UNIVERSITY OF TEXAS AT EL PASO May 2010 Abstract Dealing with matrices can give us a hard time, especially when their dimension is too big, but we also well know how valuable information a matrix may carry, and that is why we study them. When a matrix has a significant number of zeroes we realize how much easier all calculations are.
    [Show full text]
  • Functional Diagnosability and Detectability of Nonlinear Models Based on Analytical Redundancy Relations Nathalie Verdière, Carine Jauberthie, Louise Travé-Massuyès
    Functional diagnosability and detectability of nonlinear models based on analytical redundancy relations Nathalie Verdière, Carine Jauberthie, Louise Travé-Massuyès To cite this version: Nathalie Verdière, Carine Jauberthie, Louise Travé-Massuyès. Functional diagnosability and de- tectability of nonlinear models based on analytical redundancy relations. Journal of Process Control, Elsevier, 2015, 35, pp.1-10. 10.1016/j.jprocont.2015.08.001. hal-01198408 HAL Id: hal-01198408 https://hal.archives-ouvertes.fr/hal-01198408 Submitted on 15 Sep 2015 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Functional diagnosability and detectability of nonlinear models based on analytical redundancy relations Nathalie Verdière1 , Carine Jauberthie2;3 , Louise Travé-Massuyès2;4 1 Normandie Univ, France; ULH, LMAH, F-76600 Le Havre; FR CNRS 3335, ISCN, 25 rue Philippe Lebon 76600 Le Havre, France 2 CNRS, LAAS, 7 avenue du Colonel Roche, F-31400 Toulouse, France 3 Université de Toulouse, UPS, LAAS, F-31400 Toulouse, France 4 Université de Toulouse, LAAS, F-31400 Toulouse, France (Corresponding author: [email protected]). Abstract This paper introduces an original definition of diagnosability for nonlinear dynamical models called functional di- agnosability. Fault diagnosability characterizes the faults that can be discriminated using the available sensors in a system.
    [Show full text]
  • Blazing Signature Filter: a Library for Fast Pairwise Similarity Comparisons Joon-Yong Lee1, Grant M
    Lee et al. BMC Bioinformatics (2018) 19:221 https://doi.org/10.1186/s12859-018-2210-6 SOFTWARE Open Access Blazing Signature Filter: a library for fast pairwise similarity comparisons Joon-Yong Lee1, Grant M. Fujimoto1,RyanWilson1, H. Steven Wiley2 and Samuel H. Payne1* Abstract Background: Identifying similarities between datasets is a fundamental task in data mining and has become an integral part of modern scientific investigation. Whether the task is to identify co-expressed genes in large-scale expression surveys or to predict combinations of gene knockouts which would elicit a similar phenotype, the underlying computational task is often a multi-dimensional similarity test. As datasets continue to grow, improvements to the efficiency, sensitivity or specificity of such computation will have broad impacts as it allows scientists to more completely explore the wealth of scientific data. Results: The Blazing Signature Filter (BSF) is a highly efficient pairwise similarity algorithm which enables extensive data mining within a reasonable amount of time. The algorithm transforms datasets into binary metrics, allowing it to utilize the computationally efficient bit operators and provide a coarse measure of similarity. We demonstrate the utility of our algorithm using two common bioinformatics tasks: identifying data sets with similar gene expression profiles, and comparing annotated genomes. Conclusions: The BSF is a highly efficient pairwise similarity algorithm that can scale to billions of comparisons without the need for specialized hardware. Keywords: Pairwise similarity comparison, Filtering, Large-scale data mining Background library of integrated network-based cellular signatures Data mining is frequently used in scientific research for (LINCS) program has generated over one million gene hypothesis generation, mechanistic insight, or validation.
    [Show full text]
  • Characterization of Multivariate Stationary Gaussian Reciprocal Diffusions*
    Journal of Multivariate Analysis MV1678 journal of multivariate analysis 62, 7499 (1997) article no. MV971678 Characterization of Multivariate Stationary Gaussian Reciprocal Diffusions* Bernard C. Levy- University of California, Davis Jamison's classification of scalar stationary Gaussian reciprocal processes is extended to multivariate Gaussian reciprocal diffusions (GRDs). The second-order self-adjoint differential equation satisfied by the covariance of a GRD specifies a Hamiltonian matrix whose eigenstructure is employed to parametrize the covariance of stationary GRDs. Characterizations of the conservation matrix and of View metadata,the covariance citation and matrix similar of thepapers end at point core.ac.uk values of a stationary GRD are also brought to you by CORE provided. 1997 Academic Press provided by Elsevier - Publisher Connector 1. INTRODUCTION Reciprocal processes were introduced in 1932 by Bernstein [2], who was influenced by an attempt of Schrodinger [3, 4] at developing a stochastic interpretation of quantum mechanics in terms of a class of Markov pro- cesses for which boundary conditions are imposed at both ends of the inter- val of definition. A stochastic process x(t)onI=[0, T] taking values in Rn is called reciprocal if for any two times t0<t1 of I, the process interior to [t0 , t1] is conditionally independent of the process exterior to [t0 , t1], given x(t0) and x(t1). Reciprocal processes contain Markov processes as a subclass. Also, Markov random fields in the sense of Levy [5] reduce for the case of a single parameter to reciprocal, rather than Markov, processes. The properties of reciprocal processes have been examined in detail by a number of authors, and in particular Jamison [1, 6], who obtained, among other results, a classification of all stationary scalar Gaussian reciprocal Received July 11, 1995.
    [Show full text]
  • Graphs and Matrices
    Universitext For other titles published in this series, go to www.springer.com/series/223 R.B. Bapat Graphs and Matrices ABC R.B. Bapat Indian Statistical Institute New Delhi 110016 India [email protected] Editorial board: Sheldon Axler, San Francisco State University Vincenzo Capasso, Università degli Studi di Milano Carles Casacuberta, Universitat de Barcelona Angus MacIntyre, Queen Mary, University of London Kenneth Ribet, University of California, Berkeley Claude Sabbah, CNRS, École Polytechnique Endre Süli, University of Oxford Wojbor Woyczynski,´ Case Western Reserve University A co-publication with the Hindustan Book Agency, New Delhi, licensed for sale in all countries outside of India. Sold and distributed within India by the Hindustan Book Agency, P 19 Green Park Extn., New Delhi 110 016, India ISBN 978-1-84882-980-0 e-ISBN 978-1-84882-981-7 DOI 10.1007/978-1-84882-981-7 Springer London Dordrecht Heidelberg New York British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library Library of Congress Control Number: 2010927407 Mathematics Subject Classification (2010): 05C05, 05C12, 05C20, 05C38, 05C50, 05C57, 05C81, 15A09, 15A15, 15A18, 15B48 °c Hindustan Book Agency (India) Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be repro- duced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms of licenses issued by the Copyright Licensing Agency.
    [Show full text]
  • Arxiv:1804.08325V3 [Math.PR] 15 Jan 2019 a Path Is a Continuous Map X : [0, 1] → Rd
    Forum of Mathematics, Sigma (2019), vol. , e1, 52 pages 1 doi: VARIETIES OF SIGNATURE TENSORS CARLOS AMENDOLA´ 1, PETER FRIZ2 and BERND STURMFELS3 1Technische Universit¨atM¨unchen; [email protected] 2Technische Universit¨atBerlin and WIAS Berlin; [email protected] 2MPI for Mathematics in the Sciences, Leipzig and UC Berkeley; [email protected] Received 23 April 2018 Abstract The signature of a parametric curve is a sequence of tensors whose entries are iterated integrals. This construction is central to the theory of rough paths in stochastic analysis. It is here examined through the lens of algebraic geometry. We introduce varieties of signature tensors for both deterministic paths and random paths. For the former, we focus on piecewise linear paths, on polynomial paths, and on varieties derived from free nilpotent Lie groups. For the latter, we focus on Brownian motion and its mixtures. 2010 Mathematics Subject Classification: 14Q15, 60H99 1. Introduction arXiv:1804.08325v3 [math.PR] 15 Jan 2019 A path is a continuous map X : [0; 1] ! Rd. Unless otherwise stated, we assume that the coordinate functions X1; X2;:::; Xd are (piecewise) continuously 0 differentiable functions. In particular, their differentials dXi(t) = Xi (t)dt obey the usual rules of calculus. The kth signature tensor of X has order k and format (k) k d×d× · · · ×d. This tensor is denoted by σ (X). Its d entries σi1i2···ik are real numbers. These are computed as iterated integrals: Z 1 Z tk Z t3 Z t2 σi1i2···ik = ··· dXi1 (t1) dXi2 (t2) ··· dXik−1 (tk−1) dXik (tk): (1) 0 0 0 0 We also write dX(t) = (dX1(t); dX2(t);:::; dXd(t)) for the differential of the path X.
    [Show full text]
  • Efficient Algorithm for Minimal-Rank Matrix Approximations
    Efficient Algorithm for Minimal-Rank Matrix Approximations Alle-Jan van der Veen Abstract For a given matrix H which has d singular values larger than ε, an expression for all rank-d approximants Hˆ such that (H−Hˆ ) has 2-norm less than ε is derived. These approximants have minimal rank, and the set includes the usual ‘truncated SVD’ low-rank approximation. The main step in the procedure is a generalized Schur algorithm, which requires only O(1/2 m 2n) operations (for an m × n matrix H). The column span of the approximant is computed in this step, and updating and downdating of this space is straightforward. The algorithm is amenable to parallel implementation. 1 Introduction Let H be a given m × n matrix, having d singular values larger than 1 and none equal to 1. Denote by ⋅ the matrix 2-norm. In this paper, we describe an algorithm to compute all possible matrices Hˆ such that (a) H − Hˆ ≤ 1 , (b) rank(Hˆ ) = d . Such a matrix Hˆ is a low-rank approximation of H in 2-norm. The problem can be generalized trivially by scaling H, in which case we compute Hˆ such that H − Hˆ ≤ ε and such that the rank of Hˆ is equal to the number of singular values of H larger than ε. One way to obtain an Hˆ which satisfies (a) and (b) is by computing a singular value decomposition (SVD) of H, and setting all singular values that are smaller than 1 equal to zero. This ‘truncated SVD’ approximant actually minimizes the approximation error: H − Hˆ = σd+1 < 1, and is optimal in Frobenius norm as well.
    [Show full text]
  • Tridiagonal-Diagonal Reduction of Symmetric Indefinite Pairs∗
    TRIDIAGONAL-DIAGONAL REDUCTION OF SYMMETRIC INDEFINITE PAIRS¤ FRANC» OISE TISSEURy Abstract. We consider the reduction of a symmetric inde¯nite matrix pair (A; B), with B non- singular, to tridiagonal-diagonal form by congruence transformations. This is an important reduction in solving polynomial eigenvalue problems with symmetric coe±cient matrices and in frequency re- sponse computations. First the pair is reduced to symmetric-diagonal form. Then we describe three methods reducing the symmetric-diagonal pair to tridiagonal-diagonal form. Two of them employ more stable versions of Brebner and Grad's pseudosymmetric Givens and pseudosymmetric House- holder reductions, while the third is new and based on a combination of Householder reflectors and hyperbolic rotations. We prove an optimality condition for the transformations used in the third reduction. We present numerical experiments that compare the di®erent approaches and show improvements over Brebner and Grad's reductions. Key words. symmetric inde¯nite generalized eigenvalue problem, tridiagonalization, hyperbolic rotation, uni¯ed rotation, hyperbolic Householder reflector. AMS subject classi¯cations. 65F15 1. Introduction. Motivation for this work comes from the symmetric polyno- mial eigenvalue problem (PEP) m m¡1 (1.1) (¸ A + ¸ A 1 + + A0)u = 0; m m¡ ¢ ¢ ¢ where the Ai, i = 0: m, are n n symmetric matrices. ¸ is called an eigenvalue and u = 0 is the corresponding righ£t eigenvector. The standard way of dealing with the PEP6 in practice is to reformulate it as a generalized eigenvalue problem (GEP) (1.2) Ax = ¸Bx; of size mn. This process is called linearization, as the GEP is linear in ¸. Symmetry in the problem is maintained with an appropriate choice of linearization.
    [Show full text]