-
Particle production in HRG with thermodynamically consistent EoS and partially deformable hadrons
Authors:
Sameer Ahmad Mir,
Iqbal Mohi Ud Din,
Nasir Ahmad Rather,
Saeed Uddin,
M. Farooq Mir
Abstract:
In the present work, we analyze several strange as well as non-strange relative hadronic yields obtained in the ultra-relativistic heavy-ion collisions (URHIC) experiments over a wide range of centre-of-mass collision energy ($\sqrt{s_{NN}}$). We invoke the formation of a hot and dense hadronic resonance gas (HRG) in the final stage following the URHIC. We use an earlier proposed thermodynamically…
▽ More
In the present work, we analyze several strange as well as non-strange relative hadronic yields obtained in the ultra-relativistic heavy-ion collisions (URHIC) experiments over a wide range of centre-of-mass collision energy ($\sqrt{s_{NN}}$). We invoke the formation of a hot and dense hadronic resonance gas (HRG) in the final stage following the URHIC. We use an earlier proposed thermodynamically consistent approach for obtaining the equation of state (EoS) of a hadronic resonance gas (HRG). It takes into account an important aspect of the hadronic interaction, viz., the hadronic hard-core repulsion, by assigning hard-core volumes to the hadrons, leading to an excluded volume (EV) type effect. We have invoked the bag model approach to assign hard-core volumes to baryons (antibaryons) while treating mesons to be point particles. We employ ansatz to obtain the dependence of the temperature and baryon chemical potential of the HRG system on the centre-of-mass energy in the URHIC. We also find strong evidence of double freeze-out scenario, corresponding to baryons (antibaryons) and mesons, respectively. Strangeness (anti-strangeness) imbalance factor is also seen to play an important role in explaining the ratio of strange hadrons to the non-strange ones. The HRG model can explain the experimental data on various relative hadronic multiplicities quite satisfactorily over a wide range of $\sqrt{s_{NN}}$, ranging from the lowest RHIC energies to the highest LHC energies for the set of the model parameters obtaining the best theoretical fit to the experimental data by minimizing the $χ^{2}$/dof value.
△ Less
Submitted 17 June, 2024;
originally announced June 2024.
-
Object Manipulation in Marine Environments using Reinforcement Learning
Authors:
Ahmed Nader,
Muhayy Ud Din,
Mughni Irfan,
Irfan Hussain
Abstract:
Performing intervention tasks in the maritime domain is crucial for safety and operational efficiency. The unpredictable and dynamic marine environment makes the intervention tasks such as object manipulation extremely challenging. This study proposes a robust solution for object manipulation from a dock in the presence of disturbances caused by sea waves. To tackle this challenging problem, we ap…
▽ More
Performing intervention tasks in the maritime domain is crucial for safety and operational efficiency. The unpredictable and dynamic marine environment makes the intervention tasks such as object manipulation extremely challenging. This study proposes a robust solution for object manipulation from a dock in the presence of disturbances caused by sea waves. To tackle this challenging problem, we apply a deep reinforcement learning (DRL) based algorithm called Soft. Actor-Critic (SAC). SAC employs an actor-critic framework; the actors learn a policy that minimizes an objective function while the critic evaluates the learned policy and provides feedback to guide the actor-learning process. We trained the agent using the PyBullet dynamic simulator and tested it in a realistic simulation environment called MBZIRC maritime simulator. This simulator allows the simulation of different wave conditions according to the World Meteorological Organization (WMO) sea state code. Simulation results demonstrate a high success rate in retrieving the objects from the dock. The trained agent achieved an 80 percent success rate when applied in the simulation environment in the presence of waves characterized by sea state 2, according to the WMO sea state code
△ Less
Submitted 5 June, 2024;
originally announced June 2024.
-
Conditional Variational Auto Encoder Based Dynamic Motion for Multi-task Imitation Learning
Authors:
Binzhao Xu,
Muhayy Ud Din,
Irfan Hussain
Abstract:
The dynamic motion primitive-based (DMP) method is an effective method of learning from demonstrations. However, most of the current DMP-based methods focus on learning one task with one module. Although, some deep learning-based frameworks can learn to multi-task at the same time. However, those methods require a large number of training data and have limited generalization of the learned behavio…
▽ More
The dynamic motion primitive-based (DMP) method is an effective method of learning from demonstrations. However, most of the current DMP-based methods focus on learning one task with one module. Although, some deep learning-based frameworks can learn to multi-task at the same time. However, those methods require a large number of training data and have limited generalization of the learned behavior to the untrained state. In this paper, we propose a framework that combines the advantages of the traditional DMP-based method and conditional variational auto-encoder (CVAE). The encoder and decoder are made of a dynamic system and deep neural network. Deep neural networks are used to generate torque conditioned on the task ID. Then, this torque is used to create the desired trajectory in the dynamic system based on the final state. In this way, the generated tractory can adjust to the new goal position. We also propose a finetune method to guarantee the via-point constraint. Our model is trained on the handwriting number dataset and can be used to solve robotic tasks -- reaching and pushing directly. The proposed model is validated in the simulation environment. The results show that after training on the handwriting number dataset, it achieves a 100\% success rate on pushing and reaching tasks.
△ Less
Submitted 24 May, 2024;
originally announced May 2024.
-
Artificial intelligence for abnormality detection in high volume neuroimaging: a systematic review and meta-analysis
Authors:
Siddharth Agarwal,
David A. Wood,
Mariusz Grzeda,
Chandhini Suresh,
Munaib Din,
James Cole,
Marc Modat,
Thomas C Booth
Abstract:
Purpose: Most studies evaluating artificial intelligence (AI) models that detect abnormalities in neuroimaging are either tested on unrepresentative patient cohorts or are insufficiently well-validated, leading to poor generalisability to real-world tasks. The aim was to determine the diagnostic test accuracy and summarise the evidence supporting the use of AI models performing first-line, high-vo…
▽ More
Purpose: Most studies evaluating artificial intelligence (AI) models that detect abnormalities in neuroimaging are either tested on unrepresentative patient cohorts or are insufficiently well-validated, leading to poor generalisability to real-world tasks. The aim was to determine the diagnostic test accuracy and summarise the evidence supporting the use of AI models performing first-line, high-volume neuroimaging tasks.
Methods: Medline, Embase, Cochrane library and Web of Science were searched until September 2021 for studies that temporally or externally validated AI capable of detecting abnormalities in first-line CT or MR neuroimaging. A bivariate random-effects model was used for meta-analysis where appropriate. PROSPERO: CRD42021269563.
Results: Only 16 studies were eligible for inclusion. Included studies were not compromised by unrepresentative datasets or inadequate validation methodology. Direct comparison with radiologists was available in 4/16 studies. 15/16 had a high risk of bias. Meta-analysis was only suitable for intracranial haemorrhage detection in CT imaging (10/16 studies), where AI systems had a pooled sensitivity and specificity 0.90 (95% CI 0.85 - 0.94) and 0.90 (95% CI 0.83 - 0.95) respectively. Other AI studies using CT and MRI detected target conditions other than haemorrhage (2/16), or multiple target conditions (4/16). Only 3/16 studies implemented AI in clinical pathways, either for pre-read triage or as post-read discrepancy identifiers.
Conclusion: The paucity of eligible studies reflects that most abnormality detection AI studies were not adequately validated in representative clinical cohorts. The few studies describing how abnormality detection AI could impact patients and clinicians did not explore the full ramifications of clinical implementation.
△ Less
Submitted 9 May, 2024;
originally announced May 2024.
-
Algebraic Proofs of Path Disconnectedness using Time-Dependent Barrier Functions
Authors:
Didier Henrion,
Jared Miller,
Mohab Safey El Din
Abstract:
Two subsets of a given set are path-disconnected if they lie in different connected components of the larger set. Verification of path-disconnectedness is essential in proving the infeasibility of motion planning and trajectory optimization algorithms. We formulate path-disconnectedness as the infeasibility of a single-integrator control task to move between an initial set and a target set in a su…
▽ More
Two subsets of a given set are path-disconnected if they lie in different connected components of the larger set. Verification of path-disconnectedness is essential in proving the infeasibility of motion planning and trajectory optimization algorithms. We formulate path-disconnectedness as the infeasibility of a single-integrator control task to move between an initial set and a target set in a sufficiently long time horizon. This control-infeasibility task is certified through the generation of a time-dependent barrier function that separates the initial and final sets. The existence of a time-dependent barrier function is a necessary and sufficient condition for path-disconnectedness under compactness conditions. Numerically, the search for a polynomial barrier function is formulated using the moment-sum-of-squares hierarchy of semidefinite programs. The barrier function proves path-disconnectedness at a sufficiently large polynomial degree. The computational complexity of these semidefinite programs can be reduced by elimination of the control variables. Disconnectedness proofs are synthesized for example systems.
△ Less
Submitted 10 April, 2024;
originally announced April 2024.
-
Solving parameter-dependent semi-algebraic systems
Authors:
Louis Gaillard,
Mohab Safey El Din
Abstract:
We consider systems of polynomial equations and inequalities in $\mathbb{Q}[\boldsymbol{y}][\boldsymbol{x}]$ where $\boldsymbol{x} = (x_1, \ldots, x_n)$ and $\boldsymbol{y} = (y_1, \ldots,y_t)$. The $\boldsymbol{y}$ indeterminates are considered as parameters and we assume that when specialising them generically, the set of common complex solutions, to the obtained equations, is finite. We conside…
▽ More
We consider systems of polynomial equations and inequalities in $\mathbb{Q}[\boldsymbol{y}][\boldsymbol{x}]$ where $\boldsymbol{x} = (x_1, \ldots, x_n)$ and $\boldsymbol{y} = (y_1, \ldots,y_t)$. The $\boldsymbol{y}$ indeterminates are considered as parameters and we assume that when specialising them generically, the set of common complex solutions, to the obtained equations, is finite. We consider the problem of real root classification for such parameter-dependent problems, i.e. identifying the possible number of real solutions depending on the values of the parameters and computing a description of the regions of the space of parameters over which the number of real roots remains invariant.
We design an algorithm for solving this problem. The formulas it outputs enjoy a determinantal structure. Under genericity assumptions, we show that its arithmetic complexity is polynomial in both the maximum degree $d$ and the number $s$ of the input inequalities and exponential in $nt+t^2$. The output formulas consist of polynomials of degree bounded by $(2s+n)d^{n+1}$. This is the first algorithm with such a singly exponential complexity. We report on practical experiments showing that a first implementation of this algorithm can tackle examples which were previously out of reach.
△ Less
Submitted 12 February, 2024;
originally announced February 2024.
-
Optimized Gröbner basis algorithms for maximal determinantal ideals and critical point computations
Authors:
Sriram Gopalakrishnan,
Vincent Neiger,
Mohab Safey El Din
Abstract:
Given polynomials $g$ and $f_1,\dots,f_p$, all in $\Bbbk[x_1,\dots,x_n]$ for some field $\Bbbk$, we consider the problem of computing the critical points of the restriction of $g$ to the variety defined by $f_1=\cdots=f_p=0$. These are defined by the simultaneous vanishing of the $f_i$'s and all maximal minors of the Jacobian matrix associated to $(g,f_1, \ldots, f_p)$. We use the Eagon-Northcott…
▽ More
Given polynomials $g$ and $f_1,\dots,f_p$, all in $\Bbbk[x_1,\dots,x_n]$ for some field $\Bbbk$, we consider the problem of computing the critical points of the restriction of $g$ to the variety defined by $f_1=\cdots=f_p=0$. These are defined by the simultaneous vanishing of the $f_i$'s and all maximal minors of the Jacobian matrix associated to $(g,f_1, \ldots, f_p)$. We use the Eagon-Northcott complex associated to the ideal generated by these maximal minors to gain insight into the syzygy module of the system defining these critical points. We devise new $F_5$-type criteria to predict and avoid more reductions to zero when computing a Gröbner basis for the defining system of this critical locus. We give a bound for the arithmetic complexity of this enhanced $F_5$ algorithm and compare it to the best previously known bound for computing critical points using Gröbner bases.
△ Less
Submitted 11 February, 2024;
originally announced February 2024.
-
Computing roadmaps in unbounded smooth real algebraic sets II: algorithm and complexity
Authors:
Rémi Prébet,
Mohab Safey El Din,
Éric Schost
Abstract:
A roadmap for an algebraic set $V$ defined by polynomials with coefficients in some real field, say $\mathbb{R}$, is an algebraic curve contained in $V$ whose intersection with all connected components of $V\cap\mathbb{R}^{n}$ is connected. These objects, introduced by Canny, can be used to answer connectivity queries over $V\cap \mathbb{R}^{n}$ provided that they are required to contain the finit…
▽ More
A roadmap for an algebraic set $V$ defined by polynomials with coefficients in some real field, say $\mathbb{R}$, is an algebraic curve contained in $V$ whose intersection with all connected components of $V\cap\mathbb{R}^{n}$ is connected. These objects, introduced by Canny, can be used to answer connectivity queries over $V\cap \mathbb{R}^{n}$ provided that they are required to contain the finite set of query points $\mathcal{P}\subset V$; in this case,we say that the roadmap is associated to $(V, \mathcal{P})$.
In this paper, we make effective a connectivity result we previously proved, to design a Monte Carlo algorithm which, on input (i) a finite sequence of polynomials defining $V$ (and satisfying some regularity assumptions) and (ii) an algebraic representation of finitely many query points $\mathcal{P}$ in $V$, computes a roadmap for $(V, \mathcal{P})$. This algorithm generalizes the nearly optimal one introduced by the last two authors by drop** a boundedness assumption on the real trace of $V$.
The output size and running times of our algorithm are both polynomial in $(nD)^{n\log d}$, where $D$ is the maximal degree of the input equations and $d$ is the dimension of $V$. As far as we know, the best previously known algorithm dealing with such sets has an output size and running time polynomial in $(nD)^{n\log^2 n}$.
△ Less
Submitted 5 February, 2024;
originally announced February 2024.
-
MuLA-GAN: Multi-Level Attention GAN for Enhanced Underwater Visibility
Authors:
Ahsan Baidar Bakht,
Zikai Jia,
Muhayy ud Din,
Waseem Akram,
Lyes Saad Soud,
Lakmal Seneviratne,
Defu Lin,
Shaoming He,
Irfan Hussain
Abstract:
The underwater environment presents unique challenges, including color distortions, reduced contrast, and blurriness, hindering accurate analysis. In this work, we introduce MuLA-GAN, a novel approach that leverages the synergistic power of Generative Adversarial Networks (GANs) and Multi-Level Attention mechanisms for comprehensive underwater image enhancement. The integration of Multi-Level Atte…
▽ More
The underwater environment presents unique challenges, including color distortions, reduced contrast, and blurriness, hindering accurate analysis. In this work, we introduce MuLA-GAN, a novel approach that leverages the synergistic power of Generative Adversarial Networks (GANs) and Multi-Level Attention mechanisms for comprehensive underwater image enhancement. The integration of Multi-Level Attention within the GAN architecture significantly enhances the model's capacity to learn discriminative features crucial for precise image restoration. By selectively focusing on relevant spatial and multi-level features, our model excels in capturing and preserving intricate details in underwater imagery, essential for various applications. Extensive qualitative and quantitative analyses on diverse datasets, including UIEB test dataset, UIEB challenge dataset, U45, and UCCS dataset, highlight the superior performance of MuLA-GAN compared to existing state-of-the-art methods. Experimental evaluations on a specialized dataset tailored for bio-fouling and aquaculture applications demonstrate the model's robustness in challenging environmental conditions. On the UIEB test dataset, MuLA-GAN achieves exceptional PSNR (25.59) and SSIM (0.893) scores, surpassing Water-Net, the second-best model, with scores of 24.36 and 0.885, respectively. This work not only addresses a significant research gap in underwater image enhancement but also underscores the pivotal role of Multi-Level Attention in enhancing GANs, providing a novel and comprehensive framework for restoring underwater image quality.
△ Less
Submitted 25 December, 2023;
originally announced December 2023.
-
Hadron Production in Ultra-relativistic Nuclear Collisions and Finite Baryon-Size Effects
Authors:
Sameer Ahmad Mir,
Nasir Ahmad Rather,
Iqbal Mohi Ud Din,
Saeed Uddin
Abstract:
We investigate relative hadron production of various like and unlike mass particles in ultra-relativistic heavy ion collisions by employing a statistical thermal model with finite-sized baryons (antibaryons) to imitate the hard-core repulsive interactions leading to the excluded volume type effect. A strong evidence of strangeness suppression relative to the non-strange ones, mainly pions, particu…
▽ More
We investigate relative hadron production of various like and unlike mass particles in ultra-relativistic heavy ion collisions by employing a statistical thermal model with finite-sized baryons (antibaryons) to imitate the hard-core repulsive interactions leading to the excluded volume type effect. A strong evidence of strangeness suppression relative to the non-strange ones, mainly pions, particularly at higher energies is also observed. This study also indicates that at chemical freeze-out the particle ratios and strangeness suppression in the system obtained theoretically are sensitive to baryonic (antibaryonic) hard-core radius ($r_B$). A comparison with earlier analysis involving the strangeness suppression effect is made where baryons and antibaryons were treated as point-like particles. The available experimental data showing energy dependence of various particle ratios are well described throughout the range of the centre-of-mass energy ($\sqrt{s_{NN}}$). The value of hard-core radius between 0.76 to 0.79 fm is found to fit the data quite well using $χ^{2}$ minimization technique. Two different chemical freeze-out stages are found where the earlier one belongs to baryonic (hyperonic), antibaryonic (antihyperonic) states and the later one to mesonic degrees of freedom.
△ Less
Submitted 4 March, 2024; v1 submitted 20 December, 2023;
originally announced December 2023.
-
Marine$\mathcal{X}$: Design and Implementation of Unmanned Surface Vessel for Vision Guided Navigation
Authors:
Muhayy Ud Din,
Ahmed Humais,
Waseem Akram,
Mohamed Alblooshi,
Lyes Saad Saoud,
Abdelrahman Alblooshi,
Lakmal Seneviratne,
Irfan Hussain
Abstract:
Marine robots, particularly Unmanned Surface Vessels (USVs), have gained considerable attention for their diverse applications in maritime tasks, including search and rescue, environmental monitoring, and maritime security. This paper presents the design and implementation of a USV named marine$\mathcal{X}$. The hardware components of marine$\mathcal{X}$ are meticulously developed to ensure robust…
▽ More
Marine robots, particularly Unmanned Surface Vessels (USVs), have gained considerable attention for their diverse applications in maritime tasks, including search and rescue, environmental monitoring, and maritime security. This paper presents the design and implementation of a USV named marine$\mathcal{X}$. The hardware components of marine$\mathcal{X}$ are meticulously developed to ensure robustness, efficiency, and adaptability to varying environmental conditions. Furthermore, the integration of a vision-based object tracking algorithm empowers marine$\mathcal{X}$ to autonomously track and monitor specific objects on the water surface. The control system utilizes PID control, enabling precise navigation of marine$\mathcal{X}$ while maintaining a desired course and distance to the target object. To assess the performance of marine$\mathcal{X}$, comprehensive testing is conducted, encompassing simulation, trials in the marine pool, and real-world tests in the open sea. The successful outcomes of these tests demonstrate the USV's capabilities in achieving real-time object tracking, showcasing its potential for various applications in maritime operations.
△ Less
Submitted 28 November, 2023;
originally announced November 2023.
-
Faster real root decision algorithm for symmetric polynomials
Authors:
George Labahn,
Cordian Riener,
Mohab Safey El Din,
Éric Schost,
Thi Xuan Vu
Abstract:
In this paper, we consider the problem of deciding the existence of real solutions to a system of polynomial equations having real coefficients, and which are invariant under the action of the symmetric group. We construct and analyze a Monte Carlo probabilistic algorithm which solves this problem, under some regularity assumptions on the input, by taking advantage of the symmetry invariance prope…
▽ More
In this paper, we consider the problem of deciding the existence of real solutions to a system of polynomial equations having real coefficients, and which are invariant under the action of the symmetric group. We construct and analyze a Monte Carlo probabilistic algorithm which solves this problem, under some regularity assumptions on the input, by taking advantage of the symmetry invariance property. The complexity of our algorithm is polynomial in $d^s, {{n+d} \choose d}$, and ${{n} \choose {s+1}}$, where $n$ is the number of variables and $d$ is the maximal degree of $s$ input polynomials defining the real algebraic set under study. In particular, this complexity is polynomial in $n$ when $d$ and $s$ are fixed and is equal to $n^{O(1)}2^n$ when $d=n$.
△ Less
Submitted 6 June, 2023;
originally announced June 2023.
-
A Direttissimo Algorithm for Equidimensional Decomposition
Authors:
Christian Eder,
Pierre Lairez,
Rafael Mohr,
Mohab Safey El Din
Abstract:
We describe a recursive algorithm that decomposes an algebraic set into locally closed equidimensional sets, i.e. sets which each have irreducible components of the same dimension. At the core of this algorithm, we combine ideas from the theory of triangular sets, a.k.a. regular chains, with Gröbner bases to encode and work with locally closed algebraic sets. Equipped with this, our algorithm avoi…
▽ More
We describe a recursive algorithm that decomposes an algebraic set into locally closed equidimensional sets, i.e. sets which each have irreducible components of the same dimension. At the core of this algorithm, we combine ideas from the theory of triangular sets, a.k.a. regular chains, with Gröbner bases to encode and work with locally closed algebraic sets. Equipped with this, our algorithm avoids projections of the algebraic sets that are decomposed and certain genericity assumptions frequently made when decomposing polynomial systems, such as assumptions about Noether position. This makes it produce fine decompositions on more structured systems where ensuring genericity assumptions often destroys the structure of the system at hand. Practical experiments demonstrate its efficiency compared to state-of-the-art implementations.
△ Less
Submitted 9 June, 2023; v1 submitted 16 February, 2023;
originally announced February 2023.
-
Algebraic certificates for the truncated moment problem
Authors:
Didier Henrion,
Simone Naldi,
Mohab Safey El Din
Abstract:
The truncated moment problem consists of determining whether a given finitedimensional vector of real numbers y is obtained by integrating a basis of the vector space of polynomials of bounded degree with respect to a non-negative measure on a given set K of a finite-dimensional Euclidean space. This problem has plenty of applications e.g. in optimization, control theory and statistics. When K is…
▽ More
The truncated moment problem consists of determining whether a given finitedimensional vector of real numbers y is obtained by integrating a basis of the vector space of polynomials of bounded degree with respect to a non-negative measure on a given set K of a finite-dimensional Euclidean space. This problem has plenty of applications e.g. in optimization, control theory and statistics. When K is a compact semialgebraic set, the duality between the cone of moments of non-negative measures on K and the cone of non-negative polynomials on K yields an alternative: either y is a moment vector, or y is not a moment vector, in which case there exists a polynomial strictly positive on K making a linear functional depending on y vanish. Such a polynomial is an algebraic certificate of moment unrepresentability. We study the complexity of computing such a certificate using computer algebra algorithms.
△ Less
Submitted 14 February, 2023;
originally announced February 2023.
-
Fast Algorithms for Discrete Differential Equations
Authors:
Alin Bostan,
Hadrien Notarantonio,
Mohab Safey El Din
Abstract:
Discrete Differential Equations (DDEs) are functional equations that relate polynomially a power series $F(t,u)$ in $t$ with polynomial coefficients in a "catalytic" variable $u$ and the specializations, say at $u=1$, of $F(t,u)$ and of some of its partial derivatives in $u$. DDEs occur frequently in combinatorics, especially in map enumeration. If a DDE is of fixed-point type then its solution…
▽ More
Discrete Differential Equations (DDEs) are functional equations that relate polynomially a power series $F(t,u)$ in $t$ with polynomial coefficients in a "catalytic" variable $u$ and the specializations, say at $u=1$, of $F(t,u)$ and of some of its partial derivatives in $u$. DDEs occur frequently in combinatorics, especially in map enumeration. If a DDE is of fixed-point type then its solution $F(t,u)$ is unique, and a general result by Popescu (1986) implies that $F(t,u)$ is an algebraic power series. Constructive proofs of algebraicity for solutions of fixed-point type DDEs were proposed by Bousquet-Mélou and Jehanne (2006). Bostan et. al (2022) initiated a systematic algorithmic study of such DDEs of order 1.
We generalize this study to DDEs of arbitrary order. First, we propose nontrivial extensions of algorithms based on polynomial elimination and on the guess-and-prove paradigm. Second, we design two brand-new algorithms that exploit the special structure of the underlying polynomial systems. Last, but not least, we report on implementations that are able to solve highly challenging DDEs with a combinatorial origin.
△ Less
Submitted 28 April, 2023; v1 submitted 13 February, 2023;
originally announced February 2023.
-
Refined $F_5$ Algorithms for Ideals of Minors of Square Matrices
Authors:
Sriram Gopalakrishnan,
Vincent Neiger,
Mohab Safey El Din
Abstract:
We consider the problem of computing a grevlex Gröbner basis for the set $F_r(M)$ of minors of size $r$ of an $n\times n$ matrix $M$ of generic linear forms over a field of characteristic zero or large enough. Such sets are not regular sequences; in fact, the ideal $\langle F_r(M) \rangle$ cannot be generated by a regular sequence. As such, when using the general-purpose algorithm $F_5$ to find th…
▽ More
We consider the problem of computing a grevlex Gröbner basis for the set $F_r(M)$ of minors of size $r$ of an $n\times n$ matrix $M$ of generic linear forms over a field of characteristic zero or large enough. Such sets are not regular sequences; in fact, the ideal $\langle F_r(M) \rangle$ cannot be generated by a regular sequence. As such, when using the general-purpose algorithm $F_5$ to find the sought Gröbner basis, some computing time is wasted on reductions to zero. We use known results about the first syzygy module of $F_r(M)$ to refine the $F_5$ algorithm in order to detect more reductions to zero. In practice, our approach avoids a significant number of reductions to zero. In particular, in the case $r=n-2$, we prove that our new algorithm avoids all reductions to zero, and we provide a corresponding complexity analysis which improves upon the previously known estimates.
△ Less
Submitted 14 June, 2023; v1 submitted 10 February, 2023;
originally announced February 2023.
-
On the degree of varieties of sum of squares
Authors:
Andrew Ferguson,
Giorgio Ottaviani,
Mohab Safey El Din,
Ettore Teixeira Turatti
Abstract:
We study the problem of how many different sums of squares decompositions a general polynomial $f$ with SOS-rank $k$ admits. We show that there is a link between the variety $\mathrm{SOS}_k(f)$ of all SOS-decompositions of $f$ and the orthogonal group $\mathrm{O}(k)$. We exploit this connection to obtain the dimension of $\mathrm{SOS}_k(f)$ and show that its degree is bounded from below by the deg…
▽ More
We study the problem of how many different sums of squares decompositions a general polynomial $f$ with SOS-rank $k$ admits. We show that there is a link between the variety $\mathrm{SOS}_k(f)$ of all SOS-decompositions of $f$ and the orthogonal group $\mathrm{O}(k)$. We exploit this connection to obtain the dimension of $\mathrm{SOS}_k(f)$ and show that its degree is bounded from below by the degree of $\mathrm{O}(k)$. In particular, for $k=2$ we show that $\mathrm{SOS}_2(f)$ is isomorphic to $\mathrm{O}(2)$ and hence the degree bound becomes an equality. Moreover, we compute the dimension of the space of polynomials of SOS-rank $k$ and obtain the degree in the special case $k=2$.
△ Less
Submitted 23 February, 2024; v1 submitted 15 June, 2022;
originally announced June 2022.
-
Gröbner bases and critical values: The asymptotic combinatorics of determinantal systems
Authors:
Alin Bostan,
Jérémy Berthomieu,
Andrew Ferguson,
Mohab Safey El Din
Abstract:
We consider ideals involving the maximal minors of a polynomial matrix. For example, those arising in the computation of the critical values of a polynomial restricted to a variety for polynomial optimisation. Gröbner bases are a classical tool for solving polynomial systems. For practical computations, this consists of two stages. First, a Gröbner basis is computed with respect to a DRL (degree r…
▽ More
We consider ideals involving the maximal minors of a polynomial matrix. For example, those arising in the computation of the critical values of a polynomial restricted to a variety for polynomial optimisation. Gröbner bases are a classical tool for solving polynomial systems. For practical computations, this consists of two stages. First, a Gröbner basis is computed with respect to a DRL (degree reverse lexicographic) ordering. Then, a change of ordering algorithm, such as \textsf{Sparse-FGLM}, designed by Faugère and Mou, is used to find a Gröbner basis of the same ideal but with respect to a lexicographic ordering. The complexity of this latter step, in terms of arithmetic operations, is $O(mD^2)$, where $D$ is the degree of the ideal and $m$ is the number of non-trivial columns of a certain $D \times D$ matrix. While asymptotic estimates are known for $m$ for generic polynomial systems, thus far, the complexity of \textsf{Sparse-FGLM} was unknown for determinantal systems.
By assuming Fröberg's conjecture we expand the work of Moreno-Socías by detailing the structure of the DRL staircase in the determinantal setting. Then we study the asymptotics of the quantity $m$ by relating it to the coefficients of these Hilbert series. Consequently, we arrive at a new bound on the complexity of the \textsf{Sparse-FGLM} algorithm for generic determinantal systems and for generic critical point systems. We consider the ideal in the polynomial ring $\mathbb{K}[x_1, \dots, x_n]$, where $\mathbb{K}$ is some infinite field, generated by $p$ generic polynomials of degree $d$ and the maximal minors of a $p \times (n-1)$ polynomial matrix with generic entries of degree $d-1$. Then for the case $d=2$ and for $n \gg p$ we give an exact formula for $m$ in terms of $n$ and $p$. Moreover, for $d \geq 3$, we give an asymptotic formula, as $n \to \infty$, for $m$ in terms of $n,p$ and $d$.
△ Less
Submitted 18 March, 2022;
originally announced March 2022.
-
Deciding Cuspidality of Manipulators through Computer Algebra and Algorithms in Real Algebraic Geometry
Authors:
Damien Chablat,
Rémi Prébet,
Mohab Safey El Din,
Durgesh Salunkhe,
Philippe Wenger
Abstract:
Cuspidal robots are robots with at least two inverse kinematic solutions that can be connected by a singularity-free path. Deciding the cuspidality of generic 3R robots has been studied in the past, but extending the study to six-degree-of-freedom robots can be a challenging problem. Many robots can be modeled as a polynomial map together with a real algebraic set so that the notion of cuspidality…
▽ More
Cuspidal robots are robots with at least two inverse kinematic solutions that can be connected by a singularity-free path. Deciding the cuspidality of generic 3R robots has been studied in the past, but extending the study to six-degree-of-freedom robots can be a challenging problem. Many robots can be modeled as a polynomial map together with a real algebraic set so that the notion of cuspidality can be extended to these data. In this paper we design an algorithm that, on input a polynomial map in $n$ indeterminates, and $s$ polynomials in the same indeterminates describing a real algebraic set of dimension $d$, decides the cuspidality of the restriction of the map to the real algebraic set under consideration. Moreover, if $D$ and $τ$ are, respectively the maximum degree and the bound on the bit size of the coefficients of the input polynomials, this algorithm runs in time log-linear in $τ$ and polynomial in $((s+d)D)^{O(n^2)}$. It relies on many high-level algorithms in computer algebra which use advanced methods on real algebraic sets and critical loci of polynomial maps. As far as we know, this is the first algorithm that tackles the cuspidality problem from a general point of view.
△ Less
Submitted 25 July, 2022; v1 submitted 9 March, 2022;
originally announced March 2022.
-
Computing roadmaps in unbounded smooth real algebraic sets I: connectivity results
Authors:
Rémi Prébet,
Mohab Safey El Din,
Éric Schost
Abstract:
Answering connectivity queries in real algebraic sets is a fundamental problem in effective real algebraic geometry that finds many applications in e.g. robotics where motion planning issues are topical. This computational problem is tackled through the computation of so-called roadmaps which are real algebraic subsets of the set V under study, of dimension at most one, and which have a connected…
▽ More
Answering connectivity queries in real algebraic sets is a fundamental problem in effective real algebraic geometry that finds many applications in e.g. robotics where motion planning issues are topical. This computational problem is tackled through the computation of so-called roadmaps which are real algebraic subsets of the set V under study, of dimension at most one, and which have a connected intersection with all semi-algebraically connected components of V. Algorithms for computing roadmaps rely on statements establishing connectivity properties of some well-chosen subsets of V , assuming that V is bounded.
In this paper, we extend such connectivity statements by drop** the boundedness assumption on V. This exploits properties of so-called generalized polar varieties, which are critical loci of V for some well-chosen polynomial maps.
△ Less
Submitted 7 June, 2023; v1 submitted 8 March, 2022;
originally announced March 2022.
-
A Signature-based Algorithm for Computing the Nondegenerate Locus of a Polynomial System
Authors:
Christian Eder,
Pierre Lairez,
Rafael Mohr,
Mohab Safey El Din
Abstract:
Polynomial system solving arises in many application areas to model non-linear geometric properties. In such settings, polynomial systems may come with degeneration which the end-user wants to exclude from the solution set. The nondegenerate locus of a polynomial system is the set of points where the codimension of the solution set matches the number of equations. Computing the nondegenerate locus…
▽ More
Polynomial system solving arises in many application areas to model non-linear geometric properties. In such settings, polynomial systems may come with degeneration which the end-user wants to exclude from the solution set. The nondegenerate locus of a polynomial system is the set of points where the codimension of the solution set matches the number of equations. Computing the nondegenerate locus is classically done through ideal-theoretic operations in commutative algebra such as saturation ideals or equidimensional decompositions to extract the component of maximal codimension. By exploiting the algebraic features of signature-based Gröbner basis algorithms we design an algorithm which computes a Gröbner basis of the equations describing the closure of the nondegenerate locus of a polynomial system, without computing first a Gröbner basis for the whole polynomial system.
△ Less
Submitted 22 July, 2022; v1 submitted 28 February, 2022;
originally announced February 2022.
-
New efficient algorithms for computing Gröbner bases of saturation ideals (F4SAT) and colon ideals (Sparse-FGLM-colon)
Authors:
Jérémy Berthomieu,
Christian Eder,
Mohab Safey El Din
Abstract:
This paper is concerned with linear algebra based methods for solving exactly polynomial systems through so-called Gröbner bases, which allow one to compute modulo the polynomial ideal generated by the input equations. This is a topical issue in non-linear algebra and more broadly in computational mathematics because of its numerous applications in engineering and computing sciences. Such applicat…
▽ More
This paper is concerned with linear algebra based methods for solving exactly polynomial systems through so-called Gröbner bases, which allow one to compute modulo the polynomial ideal generated by the input equations. This is a topical issue in non-linear algebra and more broadly in computational mathematics because of its numerous applications in engineering and computing sciences. Such applications often require geometric computing features such as representing the closure of the set difference of two solution sets to given polynomial systems. Algebraically, this boils down to computing Gröbner bases of colon and/or saturation polynomial ideals. In this paper, we describe and analyze new Gröbner bases algorithms for this task and present implementations which are more efficient by several orders of magnitude than the state-of-the-art software.
△ Less
Submitted 27 July, 2023; v1 submitted 27 February, 2022;
originally announced February 2022.
-
Faster change of order algorithm for Gröbner bases under shape and stability assumptions
Authors:
Jérémy Berthomieu,
Vincent Neiger,
Mohab Safey El Din
Abstract:
Solving zero-dimensional polynomial systems using Gröbner bases is usually done by, first, computing a Gröbner basis for the degree reverse lexicographic order, and next computing the lexicographic Gröbner basis with a change of order algorithm. Currently, the change of order now takes a significant part of the whole solving time for many generic instances.
Like the fastest known change of order…
▽ More
Solving zero-dimensional polynomial systems using Gröbner bases is usually done by, first, computing a Gröbner basis for the degree reverse lexicographic order, and next computing the lexicographic Gröbner basis with a change of order algorithm. Currently, the change of order now takes a significant part of the whole solving time for many generic instances.
Like the fastest known change of order algorithms, this work focuses on the situation where the ideal defined by the system satisfies natural properties which can be recovered in generic coordinates. First, the ideal has a \emph{shape} lexicographic Gröbner basis. Second, the set of leading terms with respect to the degree reverse lexicographic order has a \emph{stability} property; in particular, the multiplication matrix can be read on the input Gröbner basis.
The current fastest algorithms rely on the sparsity of this matrix. Actually, this sparsity is a consequence of an algebraic structure, which can be exploited to represent the matrix concisely as a univariate polynomial matrix. We show that the Hermite normal form of that matrix yields the sought lexicographic Gröbner basis, under assumptions which cover the shape position case. Under some mild assumption implying $n \le t$, the arithmetic complexity of our algorithm is $O\tilde{~}(t^{ω-1}D)$, where $n$ is the number of variables, $t$ is a sparsity indicator of the aforementioned matrix, $D$ is the degree of the zero-dimensional ideal under consideration, and $ω$ is the exponent of matrix multiplication. This improves upon both state-of-the-art complexity bounds $O\tilde{~}(tD^2)$ and $O\tilde{~}(D^ω)$, since $ω< 3$ and $t\le D$. Practical experiments, based on the libraries msolve and PML, confirm the high practical benefit.
△ Less
Submitted 15 May, 2022; v1 submitted 18 February, 2022;
originally announced February 2022.
-
Exact SOHS decompositions of trigonometric univariate polynomials with Gaussian coefficients
Authors:
Victor Magron,
Mohab Safey El Din,
Markus Schweighofer,
Trung Hieu Vu
Abstract:
Certifying the positivity of trigonometric polynomials is of first importance for design problems in discrete-time signal processing. It is well known from the Riesz-Fejéz spectral factorization theorem that any trigonometric univariate polynomial positive on the unit circle can be decomposed as a Hermitian square with complex coefficients. Here we focus on the case of polynomials with Gaussian in…
▽ More
Certifying the positivity of trigonometric polynomials is of first importance for design problems in discrete-time signal processing. It is well known from the Riesz-Fejéz spectral factorization theorem that any trigonometric univariate polynomial positive on the unit circle can be decomposed as a Hermitian square with complex coefficients. Here we focus on the case of polynomials with Gaussian integer coefficients, i.e., with real and imaginary parts being integers. We design, analyze and compare, theoretically and practically,three hybrid numeric-symbolic algorithms computing weighted sums of Hermitian squares decompositions for trigonometric univariate polynomials positive on the unit circle with Gaussian coefficients. The numerical steps the first and second algorithm rely on are complex root isolation and semidefinite programming, respectively. An exact sum of Hermitian squares decomposition is obtained thanks to compensation techniques. The third algorithm, also based on complex semidefinite programming, is an adaptation of the rounding and projection algorithm by Peyrl and Parrilo. For all three algorithms, we prove bit complexity and output size estimates that are polynomial in the degree of the input and linear in the maximum bitsize of its coefficients. We compare their performance on randomly chosen benchmarks, and further design a certified finite impulse filter.
△ Less
Submitted 4 October, 2023; v1 submitted 14 February, 2022;
originally announced February 2022.
-
Sum of Squares Decompositions of Polynomials over their Gradient Ideals with Rational Coefficients
Authors:
Victor Magron,
Mohab Safey El Din,
Trung-Hieu Vu
Abstract:
Assessing non-negativity of multivariate polynomials over the reals, through the computation of {\em certificates of non-negativity}, is a topical issue in polynomial optimization. This is usually tackled through the computation of {\em sums-of-squares decompositions} which rely on efficient numerical solvers for semi-definite programming. This method faces two difficulties. The first one is that…
▽ More
Assessing non-negativity of multivariate polynomials over the reals, through the computation of {\em certificates of non-negativity}, is a topical issue in polynomial optimization. This is usually tackled through the computation of {\em sums-of-squares decompositions} which rely on efficient numerical solvers for semi-definite programming. This method faces two difficulties. The first one is that the certificates obtained this way are {\em approximate} and then non-exact. The second one is due to the fact that not all non-negative polynomials are sums-of-squares. In this paper, we build on previous works by Parrilo, Nie, Demmel and Sturmfels who introduced certificates of non-negativity modulo {\em gradient ideals}. We prove that, actually, such certificates can be obtained {\em exactly}, over the rationals if the polynomial under consideration has rational coefficients and we provide {\em exact} algorithms to compute them. We analyze the bit complexity of these algorithms and deduce bit size bounds of such certificates.
△ Less
Submitted 25 July, 2021;
originally announced July 2021.
-
Computing the dimension of real algebraic sets
Authors:
Piere Lairez,
Mohab Safey El Din
Abstract:
Let $V$ be the set of real common solutions to $F = (f_1, \ldots, f_s)$ in $\mathbb{R}[x_1, \ldots, x_n]$ and $D$ be the maximum total degree of the $f_i$'s. We design an algorithm which on input $F$ computes the dimension of $V$. Letting $L$ be the evaluation complexity of $F$ and $s=1$, it runs using $O^\sim \big (L D^{n(d+3)+1}\big )$ arithmetic operations in $\mathbb{Q}$ and at most…
▽ More
Let $V$ be the set of real common solutions to $F = (f_1, \ldots, f_s)$ in $\mathbb{R}[x_1, \ldots, x_n]$ and $D$ be the maximum total degree of the $f_i$'s. We design an algorithm which on input $F$ computes the dimension of $V$. Letting $L$ be the evaluation complexity of $F$ and $s=1$, it runs using $O^\sim \big (L D^{n(d+3)+1}\big )$ arithmetic operations in $\mathbb{Q}$ and at most $D^{n(d+1)}$ isolations of real roots of polynomials of degree at most $D^n$. Our algorithm depends on the real geometry of $V$; its practical behavior is more governed by the number of topology changes in the fibers of some well-chosen maps. Hence, the above worst-case bounds are rarely reached in practice, the factor $D^{nd}$ being in general much lower on practical examples. We report on an implementation showing its ability to solve problems which were out of reach of the state-of-the-art implementations.
△ Less
Submitted 13 June, 2021; v1 submitted 21 May, 2021;
originally announced May 2021.
-
msolve: A Library for Solving Polynomial Systems
Authors:
Jérémy Berthomieu,
Christian Eder,
Mohab Safey El Din
Abstract:
We present a new open source C library \texttt{msolve} dedicated to solving multivariate polynomial systems of dimension zero through computer algebra methods. The core algorithmic framework of \texttt{msolve} relies on Gr\''obner bases and linear algebra based algorithms for polynomial system solving. It relies on Gr\''obner basis computation w.r.t.\ the degree reverse lexicographical orde…
▽ More
We present a new open source C library \texttt{msolve} dedicated to solving multivariate polynomial systems of dimension zero through computer algebra methods. The core algorithmic framework of \texttt{msolve} relies on Gr\''obner bases and linear algebra based algorithms for polynomial system solving. It relies on Gr\''obner basis computation w.r.t.\ the degree reverse lexicographical order, Gr\''obner conversion to a lexicographical Gr\''obner basis and real solving of univariate polynomials. We explain in detail how these three main steps of the solving process are implemented, how we exploit \texttt{AVX2} instruction processors and the more general implementation ideas we put into practice to better exploit the computational capabilities of this algorithmic framework. We compare the practical performances of \texttt{msolve} with leading computer algebra systems such as \textsc{Magma}, \textsc{Maple}, \textsc{Singular} on a wide range of systems with finitely many complex solutions, showing that \texttt{msolve} can tackle systems which were out of reach by the computer algebra software state-of-the-art.
△ Less
Submitted 19 May, 2021; v1 submitted 8 April, 2021;
originally announced April 2021.
-
On the computation of asymptotic critical values of polynomial maps and applications
Authors:
Jérémy Berthomieu,
Andrew Ferguson,
Mohab Safey El Din
Abstract:
Let $\mathbf{f} = \left(f_1, \dots, f_p\right) $ be a polynomial tuple in $\mathbb{Q}[z_1, \dots, z_n]$ and let $d = \max_{1 \leq i \leq p} °f_i$. We consider the problem of computing the set of asymptotic critical values of the polynomial map**, with the assumption that this map** is dominant, $\mathbf{f}: z \in \mathbb{K}^n \to (f\_1(z), \dots, f\_p(z)) \in \mathbb{K}^p$ where $\mathbb{K}$ i…
▽ More
Let $\mathbf{f} = \left(f_1, \dots, f_p\right) $ be a polynomial tuple in $\mathbb{Q}[z_1, \dots, z_n]$ and let $d = \max_{1 \leq i \leq p} °f_i$. We consider the problem of computing the set of asymptotic critical values of the polynomial map**, with the assumption that this map** is dominant, $\mathbf{f}: z \in \mathbb{K}^n \to (f\_1(z), \dots, f\_p(z)) \in \mathbb{K}^p$ where $\mathbb{K}$ is either $\mathbb{R}$ or $\mathbb{C}$. This is the set of values $c$ in the target space of $\mathbf{f}$ such that there exists a sequence of points $(\mathbf{x}_i)_{i\in \mathbb{N}}$ for which $\mathbf{f}(\mathbf{x}_i)$ tends to $c$ and $\|\mathbf{x}_i\| κ{\rm d} \mathbf{f}(\mathbf{x}_i))$ tends to $0$ when $i$ tends to infinity where ${\rm d} \mathbf{f}$ is the differential of $\mathbf{f}$ and $κ$ is a function measuring the distance of a linear operator to the set of singular linear operators from $\mathbb{K}^n$ to $\mathbb{K}^p$. Computing the union of the classical and asymptotic critical values allows one to put into practice generalisations of Ehresmann's fibration theorem. This leads to natural and efficient applications in polynomial optimisation and computational real algebraic geometry. Going back to previous works by Kurdyka, Orro and Simon, we design new algorithms to compute asymptotic critical values. Through randomisation, we introduce new geometric characterisations of asymptotic critical values. This allows us to dramatically reduce the complexity of computing such values to a cost that is essentially $O(d^{2n(p+1)})$ arithmetic operations in $\mathbb{Q}$. We also obtain tighter degree bounds on a hypersurface containing the asymptotic critical values, showing that the degree is at most $p^{n-p+1}(d-1)^{n-p}(d+1)^{p}$. Next, we show how to apply these algorithms to unconstrained polynomial optimisation problems and the problem of computing sample points per connected component of a semi-algebraic set defined by a single inequality/inequation. We report on the practical capabilities of our implementation of this algorithm. It shows how the practical efficiency surpasses the current state-of-the-art algorithms for computing asymptotic critical values by tackling examples that were previously out of reach.
△ Less
Submitted 2 April, 2021;
originally announced April 2021.
-
Faster One Block Quantifier Elimination for Regular Polynomial Systems of Equations
Authors:
Huu Phuoc Le,
Mohab Safey El Din
Abstract:
Quantifier elimination over the reals is a central problem in computational real algebraic geometry, polynomial system solving and symbolic computation. Given a semi-algebraic formula (whose atoms are polynomial constraints) with quantifiers on some variables, it consists in computing a logically equivalent formula involving only unquantified variables. When there is no alternation of quantifiers,…
▽ More
Quantifier elimination over the reals is a central problem in computational real algebraic geometry, polynomial system solving and symbolic computation. Given a semi-algebraic formula (whose atoms are polynomial constraints) with quantifiers on some variables, it consists in computing a logically equivalent formula involving only unquantified variables. When there is no alternation of quantifiers, one has a one block quantifier elimination problem.
This paper studies a variant of the one block quantifier elimination in which we compute an almost equivalent formula of the input. We design a new probabilistic efficient algorithm for solving this variant when the input is a system of polynomial equations satisfying some regularity assumptions. When the input is generic, involves $s$ polynomials of degree bounded by $D$ with $n$ quantified variables and $t$ unquantified ones, we prove that this algorithm outputs semi-algebraic formulas of degree bounded by $\mathcal{D}$ using $O\ {\widetilde{~}}\left ((n-s+1)\ 8^{t}\ \mathcal{D}^{3t+2} \binom{t+\mathcal{D}}{t} \right )$ arithmetic operations in the ground field where $\mathcal{D} = 2(n+s)\ D^s(D-1)^{n-s+1}\ \binom{n}{s}$. In practice, it allows us to solve quantifier elimination problems which are out of reach of the state-of-the-art (up to $8$ variables).
△ Less
Submitted 24 May, 2021; v1 submitted 25 March, 2021;
originally announced March 2021.
-
Solving parametric systems of polynomial equations over the reals through Hermite matrices
Authors:
Huu Phuoc Le,
Mohab Safey El Din
Abstract:
We design a new algorithm for solving parametric systems having finitely many complex solutions for generic values of the parameters. More precisely, let $f = (f_1, \ldots, f_m)\subset \mathbb{Q}[y][x]$ with $y = (y_1, \ldots, y_t)$ and $x = (x_1, \ldots, x_n)$, $V\subset \mathbb{C}^{t+n}$ be the algebraic set defined by $f$ and $π$ be the projection $(y, x) \to y$. Under the assumptions that $f$…
▽ More
We design a new algorithm for solving parametric systems having finitely many complex solutions for generic values of the parameters. More precisely, let $f = (f_1, \ldots, f_m)\subset \mathbb{Q}[y][x]$ with $y = (y_1, \ldots, y_t)$ and $x = (x_1, \ldots, x_n)$, $V\subset \mathbb{C}^{t+n}$ be the algebraic set defined by $f$ and $π$ be the projection $(y, x) \to y$. Under the assumptions that $f$ admits finitely many complex roots for generic values of $y$ and that the ideal generated by $f$ is radical, we solve the following problem. On input $f$, we compute semi-algebraic formulas defining semi-algebraic subsets $S_1, \ldots, S_l$ of the $y$-space such that $\cup_{i=1}^l S_i$ is dense in $\mathbb{R}^t$ and the number of real points in $V\cap π^{-1}(η)$ is invariant when $η$ varies over each $S_i$.
This algorithm exploits properties of some well chosen monomial bases in the algebra $\mathbb{Q}(y)[x]/I$ where $I$ is the ideal generated by $f$ in $\mathbb{Q}(y)[x]$ and the specialization property of the so-called Hermite matrices. This allows us to obtain compact representations of the sets $S_i$ by means of semi-algebraic formulas encoding the signature of a symmetric matrix. When $f$ satisfies extra genericity assumptions, we derive complexity bounds on the number of arithmetic operations in $\mathbb{Q}$ and the degree of the output polynomials. Let $d$ be the maximal degree of the $f_i$'s and $D = n(d-1)d^n$, we prove that, on a generic $f=(f_1,\ldots,f_n)$, one can compute those semi-algebraic formulas with $O^~( \binom{t+D}{t}2^{3t}n^{2t+1} d^{3nt+2(n+t)+1})$ operations in $\mathbb{Q}$ and that the polynomials involved have degree bounded by $D$.
We report on practical experiments which illustrate the efficiency of our algorithm on generic systems and systems from applications. It allows us to solve problems which are out of reach of the state-of-the-art.
△ Less
Submitted 16 December, 2021; v1 submitted 28 November, 2020;
originally announced November 2020.
-
Connectivity in Semi-Algebraic Sets I
Authors:
Hoon Hong,
James Rohal,
Mohab Safey El Din,
Eric Schost
Abstract:
A semi-algebraic set is a subset of the real space defined by polynomial equations and inequalities having real coefficients and is a union of finitely many maximally connected components. We consider the problem of deciding whether two given points in a semi-algebraic set are connected; that is, whether the two points lie in the same connected component. In particular, we consider the semi-algebr…
▽ More
A semi-algebraic set is a subset of the real space defined by polynomial equations and inequalities having real coefficients and is a union of finitely many maximally connected components. We consider the problem of deciding whether two given points in a semi-algebraic set are connected; that is, whether the two points lie in the same connected component. In particular, we consider the semi-algebraic set defined by f <> 0 where f is a given polynomial with integer coefficients. The motivation comes from the observation that many important or non-trivial problems in science and engineering can be often reduced to that of connectivity. Due to its importance, there has been intense research effort on the problem. We will describe a symbolic-numeric method based on gradient ascent. The method will be described in two papers. The first paper (the present one) will describe the symbolic part and the forthcoming second paper will describe the numeric part. In the present paper, we give proofs of correctness and termination for the symbolic part and illustrate the efficacy of the method using several non-trivial examples.
△ Less
Submitted 12 November, 2020; v1 submitted 4 November, 2020;
originally announced November 2020.
-
A Review of Vegetation Encroachment Detection in Power Transmission Lines using Optical Sensing Satellite Imagery
Authors:
Fathi Mahdi Elsiddig Haroun,
Siti Noratiqah Mohamad Deros,
Norashidah Md Din
Abstract:
Vegetation encroachment in power transmission lines can cause outages, which may result in severe impact on economic of power utilities companies as well as the consumer. Vegetation detection and monitoring along the power line corridor right-of-way (ROW) are implemented to protect power transmission lines from vegetation penetration. There were various methods used to monitor the vegetation penet…
▽ More
Vegetation encroachment in power transmission lines can cause outages, which may result in severe impact on economic of power utilities companies as well as the consumer. Vegetation detection and monitoring along the power line corridor right-of-way (ROW) are implemented to protect power transmission lines from vegetation penetration. There were various methods used to monitor the vegetation penetration, however, most of them were too expensive and time consuming. Satellite images can play a major role in vegetation monitoring, because it can cover high spatial area with relatively low cost. In this paper, the current techniques used to detect the vegetation encroachment using satellite images are reviewed and categorized into four sectors; Vegetation Index based method, object-based detection method, stereo matching based and other current techniques. However, the current methods depend usually on setting manually serval threshold values and parameters which make the detection process very static. Machine Learning (ML) and deep learning (DL) algorithms can provide a very high accuracy with flexibility in the detection process. Hence, in addition to review the current technique of vegetation penetration monitoring in power transmission, the potential of using Machine Learning based algorithms are also included.
△ Less
Submitted 4 October, 2020;
originally announced October 2020.
-
Guessing Gr{ö}bner Bases of Structured Ideals of Relations of Sequences
Authors:
Jérémy Berthomieu,
Mohab Safey El Din
Abstract:
Assuming sufficiently many terms of a n-dimensional table defined over a field are given, we aim at guessing the linear recurrence relations with either constant or polynomial coefficients they satisfy. In many applications, the table terms come along with a structure: for instance, they may be zero outside of a cone, they may be built from a Gr{ö}bner basis of an ideal invariant under the action…
▽ More
Assuming sufficiently many terms of a n-dimensional table defined over a field are given, we aim at guessing the linear recurrence relations with either constant or polynomial coefficients they satisfy. In many applications, the table terms come along with a structure: for instance, they may be zero outside of a cone, they may be built from a Gr{ö}bner basis of an ideal invariant under the action of a finite group. Thus, we show how to take advantage of this structure to both reduce the number of table queries and the number of operations in the base field to recover the ideal of relations of the table. In applications like in combinatorics, where all these zero terms make us guess many fake relations, this allows us to drastically reduce these wrong guesses. These algorithms have been implemented and, experimentally, they let us handle examples that we could not manage otherwise. Furthermore, we show which kind of cone and lattice structures are preserved by skew polynomial multiplication. This allows us to speed up the guessing of linear recurrence relations with polynomial coefficients by computing sparse Gr{ö}bner bases or Gr{ö}bner bases of an ideal invariant under the action of a finite group in a ring of skew polynomials.
△ Less
Submitted 18 November, 2021; v1 submitted 11 September, 2020;
originally announced September 2020.
-
Computing critical points for invariant algebraic systems
Authors:
Jean-Charles Faugère,
George Labahn,
Mohab Safey El Din,
Éric Schost,
Thi Xuan Vu
Abstract:
Let $\mathbf{K}$ be a field and $φ$, $\mathbf{f} = (f_1, \ldots, f_s)$ in $\mathbf{K}[x_1, \dots, x_n]$ be multivariate polynomials (with $s < n$) invariant under the action of $\mathcal{S}_n$, the group of permutations of $\{1, \dots, n\}$. We consider the problem of computing the points at which $\mathbf{f}$ vanish and the Jacobian matrix associated to $\mathbf{f}, φ$ is rank deficient provided…
▽ More
Let $\mathbf{K}$ be a field and $φ$, $\mathbf{f} = (f_1, \ldots, f_s)$ in $\mathbf{K}[x_1, \dots, x_n]$ be multivariate polynomials (with $s < n$) invariant under the action of $\mathcal{S}_n$, the group of permutations of $\{1, \dots, n\}$. We consider the problem of computing the points at which $\mathbf{f}$ vanish and the Jacobian matrix associated to $\mathbf{f}, φ$ is rank deficient provided that this set is finite. We exploit the invariance properties of the input to split the solution space according to the orbits of $\mathcal{S}_n$. This allows us to design an algorithm which gives a triangular description of the solution space and which runs in time polynomial in $d^s$, ${{n+d}\choose{d}}$ and $\binom{n}{s+1}$ where $d$ is the maximum degree of the input polynomials. When $d,s$ are fixed, this is polynomial in $n$ while when $s$ is fixed and $d \simeq n$ this yields an exponential speed-up with respect to the usual polynomial system solving algorithms.
△ Less
Submitted 2 September, 2020;
originally announced September 2020.
-
Homotopy techniques for solving sparse column support determinantal polynomial systems
Authors:
George Labahn,
Mohab Safey El Din,
Éric Schost,
Thi Xuan Vu
Abstract:
Let $\mathbf{K}$ be a field of characteristic zero with $\overline{\mathbf{K}}$ its algebraic closure. Given a sequence of polynomials $\mathbf{g} = (g_1, \ldots, g_s) \in \mathbf{K}[x_1, \ldots , x_n]^s$ and a polynomial matrix $\mathbf{F} = [f_{i,j}] \in \mathbf{K}[x_1, \ldots, x_n]^{p \times q}$, with $p \leq q$, we are interested in determining the isolated points of…
▽ More
Let $\mathbf{K}$ be a field of characteristic zero with $\overline{\mathbf{K}}$ its algebraic closure. Given a sequence of polynomials $\mathbf{g} = (g_1, \ldots, g_s) \in \mathbf{K}[x_1, \ldots , x_n]^s$ and a polynomial matrix $\mathbf{F} = [f_{i,j}] \in \mathbf{K}[x_1, \ldots, x_n]^{p \times q}$, with $p \leq q$, we are interested in determining the isolated points of $V_p(\mathbf{F},\mathbf{g})$, the algebraic set of points in $\overline{\mathbf{K}}$ at which all polynomials in $\mathbf{g}$ and all $p$-minors of $\mathbf{F}$ vanish, under the assumption $n = q - p + s + 1$. Such polynomial systems arise in a variety of applications including for example polynomial optimization and computational geometry. We design a randomized sparse homotopy algorithm for computing the isolated points in $V_p(\mathbf{F},\mathbf{g})$ which takes advantage of the determinantal structure of the system defining $V_p(\mathbf{F}, \mathbf{g})$. Its complexity is polynomial in the maximum number of isolated solutions to such systems sharing the same sparsity pattern and in some combinatorial quantities attached to the structure of such systems. It is the first algorithm which takes advantage both on the determinantal structure and sparsity of input polynomials. We also derive complexity bounds for the particular but important case where $\mathbf{g}$ and the columns of $\mathbf{F}$ satisfy weighted degree constraints. Such systems arise naturally in the computation of critical points of maps restricted to algebraic sets when both are invariant by the action of the symmetric group.
△ Less
Submitted 2 September, 2020;
originally announced September 2020.
-
Robots, computer algebra and eight connected components
Authors:
Jose Capco,
Mohab Safey El Din,
Josef Schicho
Abstract:
Answering connectivity queries in semi-algebraic sets is a long-standing and challenging computational issue with applications in robotics, in particular for the analysis of kinematic singularities. One task there is to compute the number of connected components of the complementary of the singularities of the kinematic map. Another task is to design a continuous path joining two given points…
▽ More
Answering connectivity queries in semi-algebraic sets is a long-standing and challenging computational issue with applications in robotics, in particular for the analysis of kinematic singularities. One task there is to compute the number of connected components of the complementary of the singularities of the kinematic map. Another task is to design a continuous path joining two given points lying in the same connected component of such a set. In this paper, we push forward the current capabilities of computer algebra to obtain computer-aided proofs of the analysis of the kinematic singularities of various robots used in industry. We first show how to combine mathematical reasoning with easy symbolic computations to study the kinematic singularities of an infinite family (depending on paramaters) modelled by the UR-series produced by the company ``Universal Robots''. Next, we compute roadmaps (which are curves used to answer connectivity queries) for this family of robots. We design an algorithm for ``solving'' positive dimensional polynomial system depending on parameters. The meaning of solving here means partitioning the parameter's space into semi-algebraic components over which the number of connected components of the semi-algebraic set defined by the input system is invariant. Practical experiments confirm our computer-aided proof and show that such an algorithm can already be used to analyze the kinematic singularities of the UR-series family. The number of connected components of the complementary of the kinematic singularities of generic robots in this family is $8$.
△ Less
Submitted 31 August, 2020;
originally announced August 2020.
-
Computing the Real Isolated Points of an Algebraic Hypersurface
Authors:
Huu Phuoc Le,
Mohab Safey El Din,
Timo de Wolff
Abstract:
Let $\mathbb{R}$ be the field of real numbers. We consider the problem of computing the real isolated points of a real algebraic set in $\mathbb{R}^n$ given as the vanishing set of a polynomial system. This problem plays an important role for studying rigidity properties of mechanism in material designs. In this paper, we design an algorithm which solves this problem. It is based on the computatio…
▽ More
Let $\mathbb{R}$ be the field of real numbers. We consider the problem of computing the real isolated points of a real algebraic set in $\mathbb{R}^n$ given as the vanishing set of a polynomial system. This problem plays an important role for studying rigidity properties of mechanism in material designs. In this paper, we design an algorithm which solves this problem. It is based on the computations of critical points as well as roadmaps for answering connectivity queries in real algebraic sets. This leads to a probabilistic algorithm of complexity $(nd)^{O(n\log(n))}$ for computing the real isolated points of real algebraic hypersurfaces of degree $d$. It allows us to solve in practice instances which are out of reach of the state-of-the-art.
△ Less
Submitted 24 August, 2020;
originally announced August 2020.
-
Urdu-English Machine Transliteration using Neural Networks
Authors:
Usman Mohy ud Din
Abstract:
Machine translation has gained much attention in recent years. It is a sub-field of computational linguistic which focus on translating text from one language to other language. Among different translation techniques, neural network currently leading the domain with its capabilities of providing a single large neural network with attention mechanism, sequence-to-sequence and long-short term modell…
▽ More
Machine translation has gained much attention in recent years. It is a sub-field of computational linguistic which focus on translating text from one language to other language. Among different translation techniques, neural network currently leading the domain with its capabilities of providing a single large neural network with attention mechanism, sequence-to-sequence and long-short term modelling. Despite significant progress in domain of machine translation, translation of out-of-vocabulary words(OOV) which include technical terms, named-entities, foreign words are still a challenge for current state-of-art translation systems, and this situation becomes even worse while translating between low resource languages or languages having different structures. Due to morphological richness of a language, a word may have different meninges in different context. In such scenarios, translation of word is not only enough in order provide the correct/quality translation. Transliteration is a way to consider the context of word/sentence during translation. For low resource language like Urdu, it is very difficult to have/find parallel corpus for transliteration which is large enough to train the system. In this work, we presented transliteration technique based on Expectation Maximization (EM) which is un-supervised and language independent. Systems learns the pattern and out-of-vocabulary (OOV) words from parallel corpus and there is no need to train it on transliteration corpus explicitly. This approach is tested on three models of statistical machine translation (SMT) which include phrasebased, hierarchical phrase-based and factor based models and two models of neural machine translation which include LSTM and transformer model.
△ Less
Submitted 12 January, 2020;
originally announced January 2020.
-
A Model for Spatial Outlier Detection Based on Weighted Neighborhood Relationship
Authors:
Ayman Taha,
Hoda M. Onsi,
Mohammed Nour El din,
Osman M. Hegazy
Abstract:
Spatial outliers are used to discover inconsistent objects producing implicit, hidden, and interesting knowledge, which has an effective role in decision-making process. In this paper, we propose a model to redefine the spatial neighborhood relationship by considering weights of the most effective parameters of neighboring objects in a given spatial data set. The spatial parameters, which are take…
▽ More
Spatial outliers are used to discover inconsistent objects producing implicit, hidden, and interesting knowledge, which has an effective role in decision-making process. In this paper, we propose a model to redefine the spatial neighborhood relationship by considering weights of the most effective parameters of neighboring objects in a given spatial data set. The spatial parameters, which are taken into our consideration, are distance, cost, and number of direct connections between neighboring objects. This model is adaptable to be applied on polygonal objects. The proposed model is applied to a GIS system supporting literacy project in Fayoum governorate.
△ Less
Submitted 4 November, 2019;
originally announced November 2019.
-
Frameworks for Querying Databases Using Natural Language: A Literature Review
Authors:
Hafsa Shareef Dar,
M. Ikramullah Lali,
Moin Ul Din,
Khalid Mahmood Malik,
Syed Ahmad Chan Bukhari
Abstract:
A Natural Language Interface (NLI) facilitates users to pose queries to retrieve information from a database without using any artificial language such as the Structured Query Language (SQL). Several applications in various domains including healthcare, customer support and search engines, require elaborating structured data having information on text. Moreover, many issues have been explored incl…
▽ More
A Natural Language Interface (NLI) facilitates users to pose queries to retrieve information from a database without using any artificial language such as the Structured Query Language (SQL). Several applications in various domains including healthcare, customer support and search engines, require elaborating structured data having information on text. Moreover, many issues have been explored including configuration complexity, processing of intensive algorithms, and popularity of relational databases, due to which translating natural language to database query has become a secondary area of investigation. The emerging trend of querying systems and speech-enabled interfaces revived natural language to database queries research area., The last survey published on this topic was six years ago in 2013. To best of our knowledge, there is no recent study found which discusses the current state of the art translations frameworks for natural language for structured and non-structured query languages. In this paper, we have reviewed 47 frameworks from 2008 to 2018. Out of 47, 35 were closely relevant to our work. SQL based frameworks have been categorized as statistical, symbolic and connectionist approaches. Whereas, NoSQL based frameworks have been categorized as semantic matching and pattern matching. These frameworks are then reviewed based on their supporting language, scheme of their heuristic rule, interoperability support, dataset scope and their overall performance score. The findings stated that 70% of the work in natural language to database querying has been carried out for SQL, and NoSQL share 15%, 10% and 5% of languages like SPAROL, CYPHER and GREMLIN respectively. It has also been observed that most of the frameworks support English language only.
△ Less
Submitted 3 September, 2019;
originally announced September 2019.
-
Cooperativity, Absolute Interaction, and Algebraic Optimization
Authors:
Nidhi Kaihnsa,
Yue Ren,
Mohab Safey El Din,
Johannes W. R. Martini
Abstract:
We consider a measure of cooperativity based on the minimal absolute interaction required to generate an observed titration behavior. We describe the corresponding algebraic optimization problem and show how it can be solved using the nonlinear algebra tool \texttt{SCIP}. Moreover, we compute the minimal absolute interactions for various binding polynomials that describe the oxygen binding of vari…
▽ More
We consider a measure of cooperativity based on the minimal absolute interaction required to generate an observed titration behavior. We describe the corresponding algebraic optimization problem and show how it can be solved using the nonlinear algebra tool \texttt{SCIP}. Moreover, we compute the minimal absolute interactions for various binding polynomials that describe the oxygen binding of various hemoglobins under different conditions. While calculated minimal absolute interactions are consistent with the expected outcome of the chemical modifications, it ranks the cooperativity of the molecules differently than the maximal Hill slope.
△ Less
Submitted 24 June, 2019;
originally announced June 2019.
-
Computing the volume of compact semi-algebraic sets
Authors:
Pierre Lairez,
Marc Mezzarobba,
Mohab Safey El Din
Abstract:
Let $S\subset R^n$ be a compact basic semi-algebraic set defined as the real solution set of multivariate polynomial inequalities with rational coefficients. We design an algorithm which takes as input a polynomial system defining $S$ and an integer $p\geq 0$ and returns the $n$-dimensional volume of $S$ at absolute precision $2^{-p}$.Our algorithm relies on the relationship between volumes of sem…
▽ More
Let $S\subset R^n$ be a compact basic semi-algebraic set defined as the real solution set of multivariate polynomial inequalities with rational coefficients. We design an algorithm which takes as input a polynomial system defining $S$ and an integer $p\geq 0$ and returns the $n$-dimensional volume of $S$ at absolute precision $2^{-p}$.Our algorithm relies on the relationship between volumes of semi-algebraic sets and periods of rational integrals. It makes use of algorithms computing the Picard-Fuchs differential equation of appropriate periods, properties of critical points, and high-precision numerical integration of differential equations.The algorithm runs in essentially linear time with respect to~$p$. This improves upon the previous exponential bounds obtained by Monte-Carlo or moment-based methods. Assuming a conjecture of Dimca, the arithmetic cost of the algebraic subroutines for computing Picard-Fuchs equations and critical points is singly exponential in $n$ and polynomial in the maximum degree of the input.
△ Less
Submitted 26 April, 2019;
originally announced April 2019.
-
On Exact Reznick, Hilbert-Artin and Putinar's Representations
Authors:
Victor Magron,
Mohab Safey El Din
Abstract:
We consider the problem of computing exact sums of squares (SOS) decompositions for certain classes of non-negative multivariate polynomials, relying on semidefinite programming (SDP) solvers.
We provide a hybrid numeric-symbolic algorithm computing exact rational SOS decompositions with rational coefficients for polynomials lying in the interior of the SOS cone. The first step of this algorithm…
▽ More
We consider the problem of computing exact sums of squares (SOS) decompositions for certain classes of non-negative multivariate polynomials, relying on semidefinite programming (SDP) solvers.
We provide a hybrid numeric-symbolic algorithm computing exact rational SOS decompositions with rational coefficients for polynomials lying in the interior of the SOS cone. The first step of this algorithm computes an approximate SOS decomposition for a perturbation of the input polynomial with an arbitrary-precision SDP solver. Next, an exact SOS decomposition is obtained thanks to the perturbation terms and a compensation phenomenon. We prove that bit complexity estimates on output size and runtime are both singly exponential in the cardinality of the Newton polytope (or doubly exponential in the number of variables). Next, we apply this algorithm to compute exact Reznick, Hilbert-Artin's representation and Putinar's representations respectively for positive definite forms and positive polynomials over basic compact semi-algebraic sets. We also report on practical experiments done with the implementation of these algorithms and existing alternatives such as the critical point method and cylindrical algebraic decomposition.
△ Less
Submitted 4 September, 2021; v1 submitted 25 November, 2018;
originally announced November 2018.
-
Real root finding for equivariant semi-algebraic systems
Authors:
Cordian Riener,
Mohab Safey El Din
Abstract:
Let $R$ be a real closed field. We consider basic semi-algebraic sets defined by $n$-variate equations/inequalities of $s$ symmetric polynomials and an equivariant family of polynomials, all of them of degree bounded by $2d < n$. Such a semi-algebraic set is invariant by the action of the symmetric group. We show that such a set is either empty or it contains a point with at most $2d-1$ distinct c…
▽ More
Let $R$ be a real closed field. We consider basic semi-algebraic sets defined by $n$-variate equations/inequalities of $s$ symmetric polynomials and an equivariant family of polynomials, all of them of degree bounded by $2d < n$. Such a semi-algebraic set is invariant by the action of the symmetric group. We show that such a set is either empty or it contains a point with at most $2d-1$ distinct coordinates. Combining this geometric result with efficient algorithms for real root finding (based on the critical point method), one can decide the emptiness of basic semi-algebraic sets defined by $s$ polynomials of degree $d$ in time $(sn)^{O(d)}$. This improves the state-of-the-art which is exponential in $n$. When the variables $x_1, \ldots, x_n$ are quantified and the coefficients of the input system depend on parameters $y_1, \ldots, y_t$, one also demonstrates that the corresponding one-block quantifier elimination problem can be solved in time $(sn)^{O(dt)}$.
△ Less
Submitted 21 June, 2018;
originally announced June 2018.
-
RealCertify: a Maple package for certifying non-negativity
Authors:
Victor Magron,
Mohab Safey El Din
Abstract:
Let $\mathbb{Q}$ (resp. $\mathbb{R}$) be the field of rational (resp. real) numbers and $X = (X_1, \ldots, X_n)$ be variables. Deciding the non-negativity of polynomials in $\mathbb{Q}[X]$ over $\mathbb{R}^n$ or over semi-algebraic domains defined by polynomial constraints in $\mathbb{Q}[X]$ is a classical algorithmic problem for symbolic computation.
The Maple package \textsc{RealCertify} tackl…
▽ More
Let $\mathbb{Q}$ (resp. $\mathbb{R}$) be the field of rational (resp. real) numbers and $X = (X_1, \ldots, X_n)$ be variables. Deciding the non-negativity of polynomials in $\mathbb{Q}[X]$ over $\mathbb{R}^n$ or over semi-algebraic domains defined by polynomial constraints in $\mathbb{Q}[X]$ is a classical algorithmic problem for symbolic computation.
The Maple package \textsc{RealCertify} tackles this decision problem by computing sum of squares certificates of non-negativity for inputs where such certificates hold over the rational numbers. It can be applied to numerous problems coming from engineering sciences, program verification and cyber-physical systems. It is based on hybrid symbolic-numeric algorithms based on semi-definite programming.
△ Less
Submitted 6 May, 2018;
originally announced May 2018.
-
Solving determinantal systems using homotopy techniques
Authors:
Jonathan D. Hauenstein,
Mohab Safey El Din,
Éric Schost,
Thi Xuan Vu
Abstract:
Let $\K$ be a field of characteristic zero and $\Kbar$ be an algebraic closure of $\K$. Consider a sequence of polynomials$G=(g\_1,\dots,g\_s)$ in $\K[X\_1,\dots,X\_n]$, a polynomial matrix $\F=[f\_{i,j}] \in \K[X\_1,\dots,X\_n]^{p \times q}$, with $p \leq q$,and the algebraic set $V\_p(F, G)$ of points in $\KKbar$ at which all polynomials in $\G$ and all $p$-minors of $\F$vanish. Such polynomia…
▽ More
Let $\K$ be a field of characteristic zero and $\Kbar$ be an algebraic closure of $\K$. Consider a sequence of polynomials$G=(g\_1,\dots,g\_s)$ in $\K[X\_1,\dots,X\_n]$, a polynomial matrix $\F=[f\_{i,j}] \in \K[X\_1,\dots,X\_n]^{p \times q}$, with $p \leq q$,and the algebraic set $V\_p(F, G)$ of points in $\KKbar$ at which all polynomials in $\G$ and all $p$-minors of $\F$vanish. Such polynomial systems appear naturally in e.g. polynomial optimization, computational geometry.We provide bounds on the number of isolated points in $V\_p(F, G)$ depending on the maxima of the degrees in rows (resp. columns) of $\F$. Next, we design homotopy algorithms for computing those points. These algorithms take advantage of the determinantal structure of the system defining $V\_p(F, G)$. In particular, the algorithms run in time that is polynomial in the bound on the number of isolated points.
△ Less
Submitted 28 February, 2018;
originally announced February 2018.
-
On Exact Polya and Putinar's Representations
Authors:
Victor Magron,
Mohab Safey El Din
Abstract:
We consider the problem of finding exact sums of squares (SOS) decompositions for certain classes of non-negative multivariate polynomials, relying on semidefinite programming (SDP) solvers.
We start by providing a hybrid numeric-symbolic algorithm computing exact rational SOS decompositions for polynomials lying in the interior of the SOS cone. It computes an approximate SOS decomposition for a…
▽ More
We consider the problem of finding exact sums of squares (SOS) decompositions for certain classes of non-negative multivariate polynomials, relying on semidefinite programming (SDP) solvers.
We start by providing a hybrid numeric-symbolic algorithm computing exact rational SOS decompositions for polynomials lying in the interior of the SOS cone. It computes an approximate SOS decomposition for a perturbation of the input polynomial with an arbitrary-precision SDP solver. An exact SOS decomposition is obtained thanks to the perturbation terms. We prove that bit complexity estimates on output size and runtime are both polynomial in the degree of the input polynomial and simply exponential in the number of variables. Next, we apply this algorithm to compute exact Polya and Putinar's representations respectively for positive definite forms and positive polynomials over basic compact semi-algebraic sets. We also compare the implementation of our algorithms with existing methods in computer algebra including cylindrical algebraic decomposition and critical point method.
△ Less
Submitted 28 February, 2018;
originally announced February 2018.
-
Exact algorithms for semidefinite programs with degenerate feasible set
Authors:
Didier Henrion,
Simone Naldi,
Mohab Safey El Din
Abstract:
Given symmetric matrices $A_0, A_1, \ldots, A_n$ of size $m$ with rational entries, the set of real vectors $x = (x_1, \ldots, x_n)$ such that the matrix $A_0 + x_1 A_1 + \cdots + x_n A_n$ has non-negative eigenvalues is called a spectrahedron. Minimization of linear functions over spectrahedra is called semidefinite programming. Such problems appear frequently in control theory and real algebra,…
▽ More
Given symmetric matrices $A_0, A_1, \ldots, A_n$ of size $m$ with rational entries, the set of real vectors $x = (x_1, \ldots, x_n)$ such that the matrix $A_0 + x_1 A_1 + \cdots + x_n A_n$ has non-negative eigenvalues is called a spectrahedron. Minimization of linear functions over spectrahedra is called semidefinite programming. Such problems appear frequently in control theory and real algebra, especially in the context of nonnegativity certificates for multivariate polynomials based on sums of squares. Numerical software for semidefinite programming are mostly based on interior point methods, assuming non-degeneracy properties such as the existence of an interior point in the spectrahedron. In this paper, we design an exact algorithm based on symbolic homotopy for solving semidefinite programs without assumptions on the feasible set, and we analyze its complexity. Because of the exactness of the output, it cannot compete with numerical routines in practice. However, we prove that solving such problems can be done in polynomial time if either $n$ or $m$ is fixed.
△ Less
Submitted 10 June, 2020; v1 submitted 8 February, 2018;
originally announced February 2018.
-
Strangeness chemical potential from the baryons relative to the kaons particle ratios
Authors:
Abdel Nasser Tawfik,
Magda Abdel Wahab,
Hayam Yassin,
Eman R. Abo Elyazeed,
Hadeer M. Nasr El Din
Abstract:
From a systematic analysis of the energy-dependence of four antibaryon-to-baryon ratios relative to the antikaon-to-kaon ratio, we propose an alternative approach determining the strange-quark chemical potential ($μ_{\mathrm{s}}$). It is found that $μ_{\mathrm{s}}$ generically genuinely equals one-fifth the baryon chemical potential ($μ_{\mathrm{b}}$). An additional quantity depending on…
▽ More
From a systematic analysis of the energy-dependence of four antibaryon-to-baryon ratios relative to the antikaon-to-kaon ratio, we propose an alternative approach determining the strange-quark chemical potential ($μ_{\mathrm{s}}$). It is found that $μ_{\mathrm{s}}$ generically genuinely equals one-fifth the baryon chemical potential ($μ_{\mathrm{b}}$). An additional quantity depending on $μ_{\mathrm{b}}$ and the freezeout temperature ($T$) should be added in order to assure averaged strangeness conversation. This quantity gives a genuine estimation for the possible strangeness enhancement with the increase in the collision energy. At the chemical freezeout conditioned to constant entropy density normalized to temperature cubed, various particle ratios calculated at $T$ and $μ_{\mathrm{b}}$ and the resultant $μ_{\mathrm{s}}$ excellently agree with the statistical-thermal calculations.
△ Less
Submitted 23 June, 2017;
originally announced June 2017.
-
Algorithms for Weighted Sums of Squares Decomposition of Non-negative Univariate Polynomials
Authors:
Victor Magron,
Mohab Safey El Din,
Markus Schweighofer
Abstract:
It is well-known that every non-negative univariate real polynomial can be written as the sum of two polynomial squares with real coefficients. When one allows a weighted sum of finitely many squares instead of a sum of two squares, then one can choose all coefficients in the representation to lie in the field generated by the coefficients of the polynomial.
In this article, we describe, analyze…
▽ More
It is well-known that every non-negative univariate real polynomial can be written as the sum of two polynomial squares with real coefficients. When one allows a weighted sum of finitely many squares instead of a sum of two squares, then one can choose all coefficients in the representation to lie in the field generated by the coefficients of the polynomial.
In this article, we describe, analyze and compare both from the theoretical and practical points of view, two algorithms computing such a weighted sums of squares decomposition for univariate polynomials with rational coefficients.
The first algorithm, due to the third author relies on real root isolation, quadratic approximations of positive polynomials and square-free decomposition but its complexity was not analyzed. We provide bit complexity estimates, both on runtime and output size of this algorithm. They are exponential in the degree of the input univariate polynomial and linear in the maximum bitsize of its complexity. This analysis is obtained using quantifier elimination and root isolation bounds.
The second algorithm, due to Chevillard, Harrison, Joldes and Lauter, relies on complex root isolation and square-free decomposition and has been introduced for certifying positiveness of polynomials in the context of computer arithmetics. Again, its complexity was not analyzed. We provide bit complexity estimates, both on runtime and output size of this algorithm, which are polynomial in the degree of the input polynomial and linear in the maximum bitsize of its complexity. This analysis is obtained using Vieta's formula and root isolation bounds.
Finally, we report on our implementations of both algorithms. While the second algorithm is, as expected from the complexity result, more efficient on most of examples, we exhibit families of non-negative polynomials for which the first algorithm is better.
△ Less
Submitted 13 June, 2017;
originally announced June 2017.