-
Infinite-horizon Fuk-Nagaev inequalities
Authors:
A. J. E. M. Janssen,
B. Zwart
Abstract:
We develop explicit bounds for the tail of the distribution for the all-time supremum of a random walk with negative drift, where the increments have a truncated heavy-tailed distribution. As an application, we consider a ruin problem in the presence of re-insurance.
We develop explicit bounds for the tail of the distribution for the all-time supremum of a random walk with negative drift, where the increments have a truncated heavy-tailed distribution. As an application, we consider a ruin problem in the presence of re-insurance.
△ Less
Submitted 6 March, 2024;
originally announced March 2024.
-
Bounding Taylor approximation errors for the exponential function in the presence of a power weight function
Authors:
A. J. E. M. Janssen
Abstract:
Motivated by the needs in the theory of large deviations and in the theory of Lundberg's equation with heavy-tailed distribution functions, we study for $n=0,1,...$ the maximization of
$S:~\Bigl(1-e^{-s}\Bigl(1+\frac{s^1}{1!}+...+\frac{s^n}{n!}\Bigr)\Bigr)/s^δ = E_{n,δ}(s)$ over $s\geq0$, with $δ\in(0,n+1)$,…
▽ More
Motivated by the needs in the theory of large deviations and in the theory of Lundberg's equation with heavy-tailed distribution functions, we study for $n=0,1,...$ the maximization of
$S:~\Bigl(1-e^{-s}\Bigl(1+\frac{s^1}{1!}+...+\frac{s^n}{n!}\Bigr)\Bigr)/s^δ = E_{n,δ}(s)$ over $s\geq0$, with $δ\in(0,n+1)$,
$U:~({-}1)^{n+1}\Bigl(e^{-u}-\Bigl(1-\frac{u^1}{1!}+...+({-}1)^n\,\frac{u^n}{n!} \Bigr)\Bigr)/u^δ=G_{n,δ}(u)$ over $u\geq0$ with $δ\in(n,n+1)$.
We show that $E_{n,δ}(s)$ and $G_{n,δ}(u)$ have a unique maximizer $s=s_n(δ)>0$ and $u=u_n(δ)>0$ that decrease strictly from $+\infty$ at $δ=0$ and $δ=n$, respectively, to 0 at $δ=n+1$. We use Taylor's formula for truncated series with remainder in integral form to develop a criterion to decide whether a particular smooth function $S(δ)$, $δ\in(0,n+1)$, or $U(δ)$, $δ\in(n,n+1)$, respectively, is a lower/upper bound for $s_n(δ)$ and $u_n(δ)$, respectively. This criterion allows us to find lower and upper bounds for $s_n$ and $u_n$ that are reasonably tight and simple at the same time. Furthermore, as a consequence of the identities $\frac{d}{dδ}\,[{\rm ln}\,ME_{n,δ}] ={-}{\rm ln}\,s_n(δ)$ and $\frac{d}{dδ}\,[{\rm ln}\,MG_{n,δ}]={-}{\rm ln}\,u_n(δ)$, we show that $ME_{n,δ}$ and $MG_{n,δ}$ are log-convex functions of $δ\in(0,n+1)$ and $δ\in(n+1,n)$, respectively, with limiting values 1 ($δ\downarrow0$) and $1/(n+1)!$ ($δ\uparrow n+1$) for $E$, and $1/n!\,(δ\downarrow n)$ and $1/(n+1)!\,(δ\uparrow n+1)$ for $G$. The minimal values $\hat{E}_n$ and $\hat{G}_n$ of $ME_{n,δ}$ and $MG_{n,δ}$, respectively, as a function of $δ$, as well as the minimum locations $δ_{n,E}$ and $δ_{n,G}$ are determined in closed form.
△ Less
Submitted 4 March, 2024;
originally announced March 2024.
-
Asymptotic analysis of Emden-Fowler type equation with an application to power flow models
Authors:
M. H. M. Christianen,
A. J. E. M. Janssen,
M. Vlasiou,
B. Zwart
Abstract:
Emden-Fowler type equations are nonlinear differential equations that appear in many fields such as mathematical physics, astrophysics and chemistry. In this paper, we perform an asymptotic analysis of a specific Emden-Fowler type equation that emerges in a queuing theory context as an approximation of voltages under a well-known power flow model. Thus, we place Emden-Fowler type equations in the…
▽ More
Emden-Fowler type equations are nonlinear differential equations that appear in many fields such as mathematical physics, astrophysics and chemistry. In this paper, we perform an asymptotic analysis of a specific Emden-Fowler type equation that emerges in a queuing theory context as an approximation of voltages under a well-known power flow model. Thus, we place Emden-Fowler type equations in the context of electrical engineering. We derive properties of the continuous solution of this specific Emden-Fowler type equation and study the asymptotic behavior of its discrete analog. We conclude that the discrete analog has the same asymptotic behavior as the classical continuous Emden-Fowler type equation that we consider.
△ Less
Submitted 29 June, 2022;
originally announced June 2022.
-
Heavy-traffic single-server queues and the transform method
Authors:
M. A. A. Boon,
A. J. E. M. Janssen,
J. S. H. van Leeuwaarden
Abstract:
Heavy-traffic limit theory deals with queues that operate close to criticality and face severe queueing times. Let $W$ denote the steady-state waiting time in the ${\rm GI}/{\rm G}/1$ queue. Kingman (1961) showed that $W$, when appropriately scaled, converges in distribution to an exponential random variable as the system's load approaches 1. The original proof of this famous result uses the trans…
▽ More
Heavy-traffic limit theory deals with queues that operate close to criticality and face severe queueing times. Let $W$ denote the steady-state waiting time in the ${\rm GI}/{\rm G}/1$ queue. Kingman (1961) showed that $W$, when appropriately scaled, converges in distribution to an exponential random variable as the system's load approaches 1. The original proof of this famous result uses the transform method. Starting from the Laplace transform of the pdf of $W$ (Pollaczek's contour integral representation), Kingman showed convergence of transforms and hence weak convergence of the involved random variables. We apply and extend this transform method to obtain convergence of moments with error assessment. We also demonstrate how the transform method can be applied to so-called nearly deterministic queues in a Kingman-type and a Gaussian heavy-traffic regime. We demonstrate numerically the accuracy of the various heavy-traffic approximations.
△ Less
Submitted 20 June, 2022;
originally announced June 2022.
-
Comparison of stability regions for a line distribution network with stochastic load demands
Authors:
M. H. M. Christianen,
J. Cruise,
A. J. E. M. Janssen,
S. Shneer,
M. Vlasiou,
B. Zwart
Abstract:
We compare stability regions for different power flow models in the process of charging electric vehicles (EVs) by considering their random arrivals, their stochastic demand for energy at charging stations, and the characteristics of the electricity distribution network. We assume the distribution network is a line with charging stations located on it. We consider the Distflow and the Linearized D…
▽ More
We compare stability regions for different power flow models in the process of charging electric vehicles (EVs) by considering their random arrivals, their stochastic demand for energy at charging stations, and the characteristics of the electricity distribution network. We assume the distribution network is a line with charging stations located on it. We consider the Distflow and the Linearized Distflow models and we assume that EVs have an exponential charging requirement, that voltage drops on the distribution network stay under control and that the number of charging stations $N$ goes to infinity. We investigate the stability of utility-optimizing power allocations in large distribution networks for both power flow models by controlling the arrival rate of EVs to charging stations. For both power flow models, we show that to obtain stability, the maximum feasible arrival rate, i.e. stability region of vehicles is decaying as $1/N^2$, and the difference between those arrival rates is up to constants, which we compare explicitly.
△ Less
Submitted 17 January, 2022;
originally announced January 2022.
-
Sharp bound on the radial derivatives of the Zernike circle polynomials (disk polynomials)
Authors:
A. J. E. M. Janssen
Abstract:
We sharpen the bound $n^{2k}$ on the maximum modulus of the $k^{\rm th}$ radial derivative of the Zernike circle polynomials (disk polynomials) of degree $n$ to $n^2(n^2-1^2)\cdot ... \cdot(n^2-(k-1)^2)/2^k(1/2)_k$. This bound is obtained from a result of Koornwinder on the non-negativity of connection coefficients of the radial parts of the circle polynomials when expanded into a series of Chebys…
▽ More
We sharpen the bound $n^{2k}$ on the maximum modulus of the $k^{\rm th}$ radial derivative of the Zernike circle polynomials (disk polynomials) of degree $n$ to $n^2(n^2-1^2)\cdot ... \cdot(n^2-(k-1)^2)/2^k(1/2)_k$. This bound is obtained from a result of Koornwinder on the non-negativity of connection coefficients of the radial parts of the circle polynomials when expanded into a series of Chebyshev polynomials of the first kind. The new bound is shown to be sharp for, for instance, Zernike circle polynomials of degree $n$ and azimuthal order $m$ when $m=O(\sqrt{n})$ by using an explicit expression for the connection coefficients in terms of squares of Jacobi polynomials evaluated at 0.
Keywords: Zernike circle polynomial, disk polynomial, radial derivative, Chebyshev polynomial, connection coefficient, Gegenbauer polynomial.
△ Less
Submitted 16 October, 2019;
originally announced October 2019.
-
Counting cliques and cycles in scale-free inhomogeneous random graphs
Authors:
A. J. E. M. Janssen,
Johan S. H. van Leeuwaarden,
Seva Shneer
Abstract:
Scale-free networks contain many small cliques and cycles. We model such networks as inhomogeneous random graphs with regularly varying infinite-variance weights. For these models, the number of cliques and cycles have exact integral expressions amenable to asymptotic analysis. We obtain various asymptotic descriptions for how the average number of cliques and cycles, of any size, grow with the ne…
▽ More
Scale-free networks contain many small cliques and cycles. We model such networks as inhomogeneous random graphs with regularly varying infinite-variance weights. For these models, the number of cliques and cycles have exact integral expressions amenable to asymptotic analysis. We obtain various asymptotic descriptions for how the average number of cliques and cycles, of any size, grow with the network size. For the cycle asymptotics we invoke the theory of circulant matrices.
△ Less
Submitted 11 December, 2018;
originally announced December 2018.
-
Implementation and benchmarking of a crosstalk-free method for wavefront Zernike coefficients reconstruction using Shack-Hartmann sensor data
Authors:
R. S. Beisheuvel,
A. J. E. M. Janssen,
P. Pozzi,
S. F. Pereira
Abstract:
In wavefront characterization, often the combination of a Shack-Hartmann sensor and a reconstruction method utilizing the Cartesian derivatives of Zernike circle polynomials (the least-squares method, to be called here Method A) is used, which is known to introduce crosstalk. In \citep{janssen2014zernike} a crosstalk-free analytic expression of the LMS estimator of the wavefront Zernike coefficien…
▽ More
In wavefront characterization, often the combination of a Shack-Hartmann sensor and a reconstruction method utilizing the Cartesian derivatives of Zernike circle polynomials (the least-squares method, to be called here Method A) is used, which is known to introduce crosstalk. In \citep{janssen2014zernike} a crosstalk-free analytic expression of the LMS estimator of the wavefront Zernike coefficients is given in terms of wavefront partial derivatives (leading to what we call Method B). Here, we show an implementation of this analytic result where the derivative data are obtained using the Shack-Hartmann sensor and compare it with the conventional least-squares method.
△ Less
Submitted 9 July, 2018;
originally announced July 2018.
-
Spitzer's identity for discrete random walks
Authors:
A. J. E. M. Janssen,
Johan S. H. van Leeuwaarden
Abstract:
Spitzer's identity describes the position of a reflected random walk over time in terms of a bivariate transform. Among its many applications in probability theory are congestion levels in queues and random walkers in physics. We present a new derivation of Spitzer's identity under the assumption that the increments of the random walk have bounded jumps to the left. This mild assumption facilitate…
▽ More
Spitzer's identity describes the position of a reflected random walk over time in terms of a bivariate transform. Among its many applications in probability theory are congestion levels in queues and random walkers in physics. We present a new derivation of Spitzer's identity under the assumption that the increments of the random walk have bounded jumps to the left. This mild assumption facilitates a proof of Spitzer's identity that only uses basic properties of analytic functions and contour integration. The main novelty, believed to be of broader interest, is a reversed approach that recognizes a factored polynomial expression as the outcome of Cauchy's formula.
△ Less
Submitted 26 October, 2017;
originally announced October 2017.
-
Design and Processing of Invertible Orientation Scores of 3D Images for Enhancement of Complex Vasculature
Authors:
M. H. J. Janssen,
A. J. E. M. Janssen,
E. J. Bekkers,
J. Olivan Bescos,
R. Duits
Abstract:
The enhancement and detection of elongated structures in noisy image data is relevant for many biomedical imaging applications. To handle complex crossing structures in 2D images, 2D orientation scores $U: \mathbb{R} ^ 2\times S ^ 1 \rightarrow \mathbb{C}$ were introduced, which already showed their use in a variety of applications. Here we extend this work to 3D orientation scores…
▽ More
The enhancement and detection of elongated structures in noisy image data is relevant for many biomedical imaging applications. To handle complex crossing structures in 2D images, 2D orientation scores $U: \mathbb{R} ^ 2\times S ^ 1 \rightarrow \mathbb{C}$ were introduced, which already showed their use in a variety of applications. Here we extend this work to 3D orientation scores $U: \mathbb{R} ^ 3 \times S ^ 2\rightarrow \mathbb{C}$. First, we construct the orientation score from a given dataset, which is achieved by an invertible coherent state type of transform. For this transformation we introduce 3D versions of the 2D cake-wavelets, which are complex wavelets that can simultaneously detect oriented structures and oriented edges. Here we introduce two types of cake-wavelets, the first uses a discrete Fourier transform, the second is designed in the 3D generalized Zernike basis, allowing us to calculate analytical expressions for the spatial filters. Finally, we show two applications of the orientation score transformation. In the first application we propose an extension of crossing-preserving coherence enhancing diffusion via our invertible orientation scores of 3D images which we apply to real medical image data. In the second one we develop a new tubularity measure using 3D orientation scores and apply the tubularity measure to both artificial and real medical data.
△ Less
Submitted 27 November, 2017; v1 submitted 7 July, 2017;
originally announced July 2017.
-
Clustering Spectrum of scale-free networks
Authors:
Clara Stegehuis,
Remco van der Hofstad,
Johan S. H. van Leeuwaarden,
A. J. E. M Janssen
Abstract:
Real-world networks often have power-law degrees and scale-free properties such as ultra-small distances and ultra-fast information spreading. In this paper, we study a third universal property: three-point correlations that suppress the creation of triangles and signal the presence of hierarchy. We quantify this property in terms of $\bar c(k)$, the probability that two neighbors of a degree-$k$…
▽ More
Real-world networks often have power-law degrees and scale-free properties such as ultra-small distances and ultra-fast information spreading. In this paper, we study a third universal property: three-point correlations that suppress the creation of triangles and signal the presence of hierarchy. We quantify this property in terms of $\bar c(k)$, the probability that two neighbors of a degree-$k$ node are neighbors themselves. We investigate how the clustering spectrum $k\mapsto\bar c(k)$ scales with $k$ in the hidden variable model and show that $c(k)$ follows a {\it universal curve} that consists of three $k$-ranges where $\bar c(k)$ remains flat, starts declining, and eventually settles on a power law $\bar c(k)\sim k^{-α}$ with $α$ depending on the power law of the degree distribution. We test these results against ten contemporary real-world networks and explain analytically why the universal curve properties only reveal themselves in large networks.
△ Less
Submitted 5 October, 2017; v1 submitted 6 June, 2017;
originally announced June 2017.
-
Pollaczek contour integrals for the fixed-cycle traffic-light queue
Authors:
Marko Boon,
A. J. E. M. Janssen,
Johan S. H. van Leeuwaarden,
Rik W. Timmerman
Abstract:
The fixed-cycle traffic-light (FCTL) queue is the standard model for intersections with static signaling, where vehicles arrive, form a queue and depart during cycles controlled by a traffic light. Classical analysis of the FCTL queue based on transform methods requires a computationally challenging step of finding the complex-valued roots of some characteristic equation. Building on the recent wo…
▽ More
The fixed-cycle traffic-light (FCTL) queue is the standard model for intersections with static signaling, where vehicles arrive, form a queue and depart during cycles controlled by a traffic light. Classical analysis of the FCTL queue based on transform methods requires a computationally challenging step of finding the complex-valued roots of some characteristic equation. Building on the recent work of Oblakova et al. (Exact expected delay and distribution for the fixed-cycle traffic-light model and similar systems in explicit form, 2016), we obtain a contour-integral expression, reminiscent of Pollaczek integrals for bulk-service queues, for the probability generating function of the steady-state FCTL queue. We also show that similar contour integrals arise for generalizations of the FCTL queue introduced in Oblakova et al. (2016) that relax some of the classical assumptions. Our results allow to compute the queue-length distribution and all its moments using algorithms that rely on contour integrals and avoid root-finding procedures.
△ Less
Submitted 30 November, 2018; v1 submitted 11 January, 2017;
originally announced January 2017.
-
Local clustering in scale-free networks with hidden variables
Authors:
Remco van der Hofstad,
A. J. E. M. Janssen,
Johan S. H. van Leeuwaarden,
Clara Stegehuis
Abstract:
We investigate the presence of triangles in a class of correlated random graphs in which hidden variables determine the pairwise connections between vertices. The class rules out self-loops and multiple edges and allows for negative degree correlations (disassortative mixing) due to infinite-variance degrees controlled by a structural cutoff $h_s$ and natural cutoff $h_c$. We show that local clust…
▽ More
We investigate the presence of triangles in a class of correlated random graphs in which hidden variables determine the pairwise connections between vertices. The class rules out self-loops and multiple edges and allows for negative degree correlations (disassortative mixing) due to infinite-variance degrees controlled by a structural cutoff $h_s$ and natural cutoff $h_c$. We show that local clustering decreases with the hidden variable (or degree). We also determine how the average clustering coefficient $C$ scales with the network size $N$, as a function of $h_s$ and $h_c$. For scale-free networks with exponent $2<τ<3$ and the default choices $h_s\sim N^{1/2}$ and $h_c\sim N^{1/(τ-1)}$ this gives $C\sim N^{2-τ}\ln N$ for the universality class at hand. We characterize the extremely slow decay of $C$ when $τ\approx 2$ and show that for $τ=2.1$, say, clustering only starts to vanish for networks as large as $N=10^{11}$.
△ Less
Submitted 18 November, 2016; v1 submitted 9 November, 2016;
originally announced November 2016.
-
Robust heavy-traffic approximations for service systems facing overdispersed demand
Authors:
Britt W. J. Mathijsen,
A. J. E. M. Janssen,
Johan S. H. van Leeuwaarden,
Bert Zwart
Abstract:
Arrival processes to service systems often display fluctuations that are larger than anticipated under the Poisson assumption, a phenomenon that is referred to as overdispersion. Motivated by this, we analyze a class of discrete stochastic models for which we derive heavy-traffic approximations that are scalable in the system size. Subsequently, we show how this leads to novel capacity sizing rule…
▽ More
Arrival processes to service systems often display fluctuations that are larger than anticipated under the Poisson assumption, a phenomenon that is referred to as overdispersion. Motivated by this, we analyze a class of discrete stochastic models for which we derive heavy-traffic approximations that are scalable in the system size. Subsequently, we show how this leads to novel capacity sizing rules that acknowledge the presence of overdispersion. This, in turn, leads to robust approximations for performance characteristics of systems that are of moderate size and/or may not operate in heavy traffic.
△ Less
Submitted 15 February, 2017; v1 submitted 17 December, 2015;
originally announced December 2015.
-
Dominant poles and tail asymptotics in the critical Gaussian many-sources regime
Authors:
A. J. E. M. Janssen,
Johan S. H. van Leeuwaarden
Abstract:
The dominant pole approximation (DPA) is a classical analytic method to obtain from a generating function asymptotic estimates for its underlying coefficients. We apply DPA to a discrete queue in a critical many-sources regime, in order to obtain tail asymptotics for the stationary queue length. As it turns out, this regime leads to a clustering of the poles of the generating function, which rende…
▽ More
The dominant pole approximation (DPA) is a classical analytic method to obtain from a generating function asymptotic estimates for its underlying coefficients. We apply DPA to a discrete queue in a critical many-sources regime, in order to obtain tail asymptotics for the stationary queue length. As it turns out, this regime leads to a clustering of the poles of the generating function, which renders the classical DPA useless, since the dominant pole is not sufficiently dominant. To resolve this, we design a new DPA method, which might also find application in other areas of mathematics, like combinatorics, particularly when Gaussian scalings related to the central limit theorem are involved.
△ Less
Submitted 17 December, 2015;
originally announced December 2015.
-
Giant component sizes in scale-free networks with power-law degrees and cutoffs
Authors:
A. J. E. M. Janssen,
Johan S. H. van Leeuwaarden
Abstract:
Scale-free networks arise from power-law degree distributions. Due to the finite size of real-world networks, the power law inevitably has a cutoff at some maximum degree $Δ$. We investigate the relative size of the giant component $S$ in the large-network limit. We show that $S$ as a function of $Δ$ increases fast when $Δ$ is just large enough for the giant component to exist, but increases ever…
▽ More
Scale-free networks arise from power-law degree distributions. Due to the finite size of real-world networks, the power law inevitably has a cutoff at some maximum degree $Δ$. We investigate the relative size of the giant component $S$ in the large-network limit. We show that $S$ as a function of $Δ$ increases fast when $Δ$ is just large enough for the giant component to exist, but increases ever more slowly when $Δ$ increases further. This makes that while the degree distribution converges to a pure power law when $Δ\to\infty$, $S$ approaches its limiting value at a slow pace. The convergence rate also depends on the power-law exponent $τ$ of the degree distribution. The worst rate of convergence is found to be for the case $τ\approx2$, which concerns many of the real-world networks reported in the literature.
△ Less
Submitted 30 November, 2015;
originally announced November 2015.
-
Optimality gaps in asymptotic dimensioning of many-server systems
Authors:
Jaron Sanders,
S. C. Borst,
A. J. E. M. Janssen,
J. S. H. van Leeuwaarden
Abstract:
The Quality-and-Efficiency-Driven (QED) regime provides a basis for solving asymptotic dimensioning problems that trade off revenue, costs and service quality. We derive bounds for the optimality gaps that capture the differences between the true optimum and the asymptotic optimum based on the QED approximations. Our bounds generalize earlier results for classical many-server systems. We also appl…
▽ More
The Quality-and-Efficiency-Driven (QED) regime provides a basis for solving asymptotic dimensioning problems that trade off revenue, costs and service quality. We derive bounds for the optimality gaps that capture the differences between the true optimum and the asymptotic optimum based on the QED approximations. Our bounds generalize earlier results for classical many-server systems. We also apply our bounds to a many-server system with threshold control.
△ Less
Submitted 5 November, 2015;
originally announced November 2015.
-
A queueing/inventory and an insurance risk model
Authors:
Onno Boxma,
Rim Essifi,
Augustus J. E. M. Janssen
Abstract:
We study an M/G/1-type queueing model with the following additional feature. The server works continuously, at fixed speed, even if there are no service requirements. In the latter case, it is building up inventory, which can be interpreted as negative workload. At random times, with an intensity ω(x) when the inventory is at level x > 0, the present inventory is removed, instantaneously reducing…
▽ More
We study an M/G/1-type queueing model with the following additional feature. The server works continuously, at fixed speed, even if there are no service requirements. In the latter case, it is building up inventory, which can be interpreted as negative workload. At random times, with an intensity ω(x) when the inventory is at level x > 0, the present inventory is removed, instantaneously reducing the inventory to zero. We study the steady-state distribution of the (positive and negative) workload levels for the cases ω(x) is constant and ω(x) = ax. The key tool is the Wiener-Hopf factorisation technique. When ω(x) is constant, no specific assumptions will be made on the service requirement distribution. However, in the linear case, we need some algebraic hypotheses concerning the Laplace-Stieltjes transform of the service requirement distribution. Throughout the paper, we also study a closely related model coming from insurance risk theory. Keywords: M/G/1 queue, Cramer-Lundberg insurance risk model, workload, inventory, ruin probability, Wiener-Hopf technique. 2010 Mathematics Subject Classification: 60K25, 90B22, 91B30, 47A68.
△ Less
Submitted 26 October, 2015;
originally announced October 2015.
-
Generalized 3D Zernike functions for analytic construction of band-limited line-detecting wavelets
Authors:
Augustus J. E. M. Janssen
Abstract:
We consider 3D versions of the Zernike polynomials that are commonly used in 2D in optics and lithography. We generalize the 3D Zernike polynomials to functions that vanish to a prescribed degree $α\geq0$ at the rim of their supporting ball $ρ\leq1$. The analytic theory of the 3D generalized Zernike functions is developed, with attention for computational results for their Fourier transform, Funk…
▽ More
We consider 3D versions of the Zernike polynomials that are commonly used in 2D in optics and lithography. We generalize the 3D Zernike polynomials to functions that vanish to a prescribed degree $α\geq0$ at the rim of their supporting ball $ρ\leq1$. The analytic theory of the 3D generalized Zernike functions is developed, with attention for computational results for their Fourier transform, Funk and Radon transform, and scaling operations. The Fourier transform of generalized 3D Zernike functions shows less oscillatory behaviour and more rapid decay at infinity, compared to the standard case $α=0$, when the smoothness parameter $α$ is increased beyond 0. The 3D generalized Zernike functions can be used to expand smooth functions, supported by the unit ball and vanishing at the rim and the origin of the unit ball, whose radial and angular dependence is separated. Particular instances of the latter functions (prewavelets) yield, via the Funk transform and the Fourier transform, an anisotropic function that can be used for a band-limited line-detecting wavelet transform, appropriate for analysis of 3D medical data containing elongated structures. We present instances of prewavelets, with relevant radial functions, that allow analytic computation of Funk and Fourier transform. A key step here is to identify the special form that is assumed by the expansion coefficients of a separable function on the unit ball with respect to generalized 3D Zernike functions. A further issue is how to scale a function on the unit ball while maintaining its supporting set, and this issue is solved in a particular form.
△ Less
Submitted 16 October, 2015;
originally announced October 2015.
-
Novel heavy-traffic regimes for large-scale service systems
Authors:
A. J. E. M. Janssen,
Johan S. H. van Leeuwaarden,
Britt W. J. Mathijsen
Abstract:
We introduce a family of heavy-traffic regimes for large scale service systems, presenting a range of scalings that include both moderate and extreme heavy traffic, as compared to classical heavy traffic. The heavy-traffic regimes can be translated into capacity sizing rules that lead to Economies-of-Scales, so that the system utilization approaches 100% while congestion remains limited. We obtain…
▽ More
We introduce a family of heavy-traffic regimes for large scale service systems, presenting a range of scalings that include both moderate and extreme heavy traffic, as compared to classical heavy traffic. The heavy-traffic regimes can be translated into capacity sizing rules that lead to Economies-of-Scales, so that the system utilization approaches 100% while congestion remains limited. We obtain heavy-traffic approximations for stationary performance measures in terms of asymptotic expansions, using a non-standard saddle point method, tailored to the specific form of integral expressions for the performance measures, in combination with the heavy-traffic regimes.
△ Less
Submitted 19 November, 2014;
originally announced November 2014.
-
Optimal Admission Control for Many-Server Systems with QED-Driven Revenues
Authors:
Jaron Sanders,
S. C. Borst,
A. J. E. M. Janssen,
J. S. H. van Leeuwaarden
Abstract:
We consider Markovian many-server systems with admission control operating in a QED regime, where the relative utilization approaches unity while the number of servers grows large, providing natural Economies-of-Scale. In order to determine the optimal admission control policy, we adopt a revenue maximization framework, and suppose that the revenue rate attains a maximum when no customers are wait…
▽ More
We consider Markovian many-server systems with admission control operating in a QED regime, where the relative utilization approaches unity while the number of servers grows large, providing natural Economies-of-Scale. In order to determine the optimal admission control policy, we adopt a revenue maximization framework, and suppose that the revenue rate attains a maximum when no customers are waiting and no servers are idling. When the revenue function scales properly with the system size, we show that a nondegenerate optimization problem arises in the limit. Detailed analysis demonstrates that the revenue is maximized by nontrivial policies that bar customers from entering when the queue length exceeds a certain threshold of the order of the typical square-root level variation in the system occupancy. We identify a fundamental equation characterizing the optimal threshold, which we extensively leverage to provide broadly applicable upper/lower bounds for the optimal threshold, establish its monotonicity, and examine its asymptotic behavior, all for general revenue structures. For linear and exponential revenue structures, we present explicit expressions for the optimal threshold.
△ Less
Submitted 11 November, 2014;
originally announced November 2014.
-
Truncation strategy for the series expressions in the advanced ENZ-theory of diffraction integrals
Authors:
Sven van Haver,
Augustus J. E. M. Janssen
Abstract:
The advanced ENZ-theory of diffraction integrals, as published recently in J. Europ. Opt. Soc. Rap. Public. 8, 13044 (2013), presents the diffraction integrals per Zernike term in the form of doubly infinite series. These double series involve, aside from an overall azimuthal factor, the products of **c functions for the radial dependence and structural quantities $c_t$ that depend on the optical…
▽ More
The advanced ENZ-theory of diffraction integrals, as published recently in J. Europ. Opt. Soc. Rap. Public. 8, 13044 (2013), presents the diffraction integrals per Zernike term in the form of doubly infinite series. These double series involve, aside from an overall azimuthal factor, the products of **c functions for the radial dependence and structural quantities $c_t$ that depend on the optical parameters of the optical system (such as NA and refractive indices) and the defocus value. The products in the double series have coefficients that are related to Clebsch-Gordan coefficients and that depend on the order of the **c function and the index $t$ of the structural quantity, as well as on the azimuthal order and degree of the involved Zernike term. In addition, the structural quantities themselves are also given in the form of doubly infinite series. In this paper, we give truncation rules for the various infinite series depending on specified required accuracy.
△ Less
Submitted 26 August, 2016; v1 submitted 24 July, 2014;
originally announced July 2014.
-
Zernike expansions of derivatives and Laplacians of the Zernike circle polynomials
Authors:
Augustus J. E. M Janssen
Abstract:
The partial derivatives and Laplacians of the Zernike circle polynomials occur in various places in the literature on computational optics. In a number of cases, the expansion of these derivatives and Laplacians in the circle polynomials are required. For the first-order partial derivatives, analytic results are scattered in the literature, starting as early as 1942 in Nijboer's thesis and continu…
▽ More
The partial derivatives and Laplacians of the Zernike circle polynomials occur in various places in the literature on computational optics. In a number of cases, the expansion of these derivatives and Laplacians in the circle polynomials are required. For the first-order partial derivatives, analytic results are scattered in the literature, starting as early as 1942 in Nijboer's thesis and continuing until present day, with some emphasis on recursive computation schemes. A brief historic account of these results is given in the present paper. By choosing the unnormalized version of the circle polynomials, with exponential rather than trigonometric azimuthal dependence, and by a proper combination of the two partial derivatives, a concise form of the series expressions emerges. This form is appropriate for the formulation and solution of a model wave-front sensing problem of reconstructing a wave-front on the level of its expansion coefficients from (measurements of the expansion coefficients of) the partial derivatives. It turns out that the least-squares estimation problem arising here decouples per azimuthal order $m$, and per $m$ the generalized inverse solution assumes a concise analytic form, thereby avoiding SVD-decompositions. The preferred version of the circle polynomials, with proper combination of the partial derivatives, also leads to a concise analytic result for the Zernike expansion of the Laplacian of the circle polynomials. From these expansions, the properties of the Laplacian as a map** from the space of circle polynomials of maximal degree $N$, as required in the study of the Neumann problem associated with the Transport-of-Intensity equation, can be read off within a single glance. Furthermore, the inverse of the Laplacian on this space is shown to have a concise analytic form.
△ Less
Submitted 7 April, 2014;
originally announced April 2014.
-
Scaled control in the QED regime
Authors:
A. J. E. M. Janssen,
J. S. H. van Leeuwaarden,
Jaron Sanders
Abstract:
We develop many-server asymptotics in the QED regime for models with admission control. The admission control, designed to reduce the incoming traffic in periods of congestion, scales with the size of the system. For a class of Markovian models with this scaled control, we identify the QED limits for two stationary performance measures. We also derive corrected QED approximations, generalizing ear…
▽ More
We develop many-server asymptotics in the QED regime for models with admission control. The admission control, designed to reduce the incoming traffic in periods of congestion, scales with the size of the system. For a class of Markovian models with this scaled control, we identify the QED limits for two stationary performance measures. We also derive corrected QED approximations, generalizing earlier results for the Erlang B, C and A models. These results are useful for the dimensioning of large systems equipped with an active control policy. In particular, the corrected approximations can be leveraged to establish the optimality gaps related to square-root staffing and asymptotic dimensioning with admission control.
△ Less
Submitted 4 July, 2013;
originally announced July 2013.
-
Asymptotics of the maximum of Brownian motion under Erlangian sampling
Authors:
A. J. E. M. Janssen,
J. S. H. van Leeuwaarden
Abstract:
Consider the all-time maximum of a Brownian motion with negative drift. Assume that this process is sampled at certain points in time, where the time between two consecutive points is rendered by an Erlang distribution with mean $1/ω$. The family of Erlang distributions covers the range between deterministic and exponential distributions. We show that the average convergence rate as $ω\to\infty$ f…
▽ More
Consider the all-time maximum of a Brownian motion with negative drift. Assume that this process is sampled at certain points in time, where the time between two consecutive points is rendered by an Erlang distribution with mean $1/ω$. The family of Erlang distributions covers the range between deterministic and exponential distributions. We show that the average convergence rate as $ω\to\infty$ for all such Erlangian sampled Brownian motions is $O(ω^{-1/2})$, and that the constant involved in $O$ ranges from $-ζ(1/2)/\sqrt{2π}$ for deterministic sampling to $1/\sqrt{2}$ for exponential sampling. The basic ingredients of our analysis are a finite-series expression for the expected maximum, an asymptotic expansion of $\sum_{j=1}^{k-1}(1-\exp(2πi j/k))^{-s}$, $s\in\mathbb{R}$, as $k\to\infty$ using Euler-Maclaurin summation, and Fourier sampling of functions analytic in an open set containing the closed unit disk.
△ Less
Submitted 15 March, 2013;
originally announced March 2013.
-
Staffing many-server systems with admission control and retrials
Authors:
A. J. E. M. Janssen,
Johan S. H. van Leeuwaarden
Abstract:
In many-server systems it is crucial to staff the right number of servers so that targeted service levels are met. These staffing problems typically lead to constraint satisfaction problems that are hard to solve. During the last decade, a powerful many-server asymptotic theory has been developed to solve such problems and optimal staffing rules are known to obey the square-root staffing principle…
▽ More
In many-server systems it is crucial to staff the right number of servers so that targeted service levels are met. These staffing problems typically lead to constraint satisfaction problems that are hard to solve. During the last decade, a powerful many-server asymptotic theory has been developed to solve such problems and optimal staffing rules are known to obey the square-root staffing principle. This paper develops many-server asymptotics in the so-called QED regime, and presents refinements to many-server asymptotics and square-root staffing for a Markovian queueing model with admission control and retrials.
△ Less
Submitted 29 January, 2014; v1 submitted 13 February, 2013;
originally announced February 2013.
-
Digital in-line holography with an elliptical, astigmatic Gaussian beam : wide-angle reconstruction
Authors:
Nicolas Verrier,
Sébastien Coëtmellec,
Marc Brunel,
Denis Lebrun,
Augustus. J. E. M. Janssen
Abstract:
We demonstrate in this paper that the effect of object shift in an elliptical, astigmatic Gaussian beam does not affect the optimal fractional orders used to reconstruct the holographic image of a particle or another opaque object in the field. Simulations and experimental results are presented.
We demonstrate in this paper that the effect of object shift in an elliptical, astigmatic Gaussian beam does not affect the optimal fractional orders used to reconstruct the holographic image of a particle or another opaque object in the field. Simulations and experimental results are presented.
△ Less
Submitted 20 December, 2012;
originally announced December 2012.
-
Zernike circle polynomials and infinite integrals involving the product of Bessel functions
Authors:
A. J. E. M. Janssen
Abstract:
Several quantities related to the Zernike circle polynomials admit an expression as an infinite integral involving the product of two or three Bessel functions. In this paper these integrals are identified and evaluated explicitly for the cases of (a) the expansion coefficients of scaled-and-shifted circle polynomials, (b) the expansion coefficients of the correlation of two circle polynomials, (c…
▽ More
Several quantities related to the Zernike circle polynomials admit an expression as an infinite integral involving the product of two or three Bessel functions. In this paper these integrals are identified and evaluated explicitly for the cases of (a) the expansion coefficients of scaled-and-shifted circle polynomials, (b) the expansion coefficients of the correlation of two circle polynomials, (c) the Fourier coefficients occurring in the cosine representation of the circle polynomials, (d) the transient response of a baffled-piston acoustical radiator due to a non-uniform velocity profile on the piston.
△ Less
Submitted 5 July, 2010;
originally announced July 2010.
-
Optimal Tradeoff Between Exposed and Hidden Nodes in Large Wireless Networks
Authors:
P. M. van de Ven,
A. J. E. M. Janssen,
J. S. H. van Leeuwaarden
Abstract:
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For a given interference range we investigate the tradeoff between collisions (hidden nodes) and unused capacity (exposed nodes). We show that the sensing range that maximizes throughput critically depends on the activation rate of nodes. For infinite line networks, we prove the existence of a threshol…
▽ More
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For a given interference range we investigate the tradeoff between collisions (hidden nodes) and unused capacity (exposed nodes). We show that the sensing range that maximizes throughput critically depends on the activation rate of nodes. For infinite line networks, we prove the existence of a threshold: When the activation rate is below this threshold the optimal sensing range is small (to maximize spatial reuse). When the activation rate is above the threshold the optimal sensing range is just large enough to preclude all collisions. Simulations suggest that this threshold policy extends to more complex linear and non-linear topologies.
△ Less
Submitted 7 April, 2010;
originally announced April 2010.
-
Spatial fairness in linear wireless multi-access networks
Authors:
P. M. van de Ven,
J. S. H. van Leeuwaarden,
D. Denteneer,
A. J. E. M. Janssen
Abstract:
Multi-access networks may exhibit severe unfairness in throughput. Recent studies show that this unfairness is due to local differences in the neighborhood structure: Nodes with less neighbors receive better access. We study the unfairness in saturated linear networks, and adapt the multi-access CSMA protocol to remove the unfairness completely, by choosing the activation rates of nodes appropriat…
▽ More
Multi-access networks may exhibit severe unfairness in throughput. Recent studies show that this unfairness is due to local differences in the neighborhood structure: Nodes with less neighbors receive better access. We study the unfairness in saturated linear networks, and adapt the multi-access CSMA protocol to remove the unfairness completely, by choosing the activation rates of nodes appropriately as a function of the number of neighbors. We then investigate the consequences of this choice of activation rates on the network-average saturated throughput, and we show that these rates perform well in a non-saturated setting.
△ Less
Submitted 7 April, 2010;
originally announced April 2010.
-
On Lerch's transcendent and the Gaussian random walk
Authors:
A. J. E. M. Janssen,
J. S. H. van Leeuwaarden
Abstract:
Let $X_1,X_2,...$ be independent variables, each having a normal distribution with negative mean $-β<0$ and variance 1. We consider the partial sums $S_n=X_1+...+X_n$, with $S_0=0$, and refer to the process $\{S_n:n\geq0\}$ as the Gaussian random walk. We present explicit expressions for the mean and variance of the maximum $M=\max\{S_n:n\geq0\}.$ These expressions are in terms of Taylor series…
▽ More
Let $X_1,X_2,...$ be independent variables, each having a normal distribution with negative mean $-β<0$ and variance 1. We consider the partial sums $S_n=X_1+...+X_n$, with $S_0=0$, and refer to the process $\{S_n:n\geq0\}$ as the Gaussian random walk. We present explicit expressions for the mean and variance of the maximum $M=\max\{S_n:n\geq0\}.$ These expressions are in terms of Taylor series about $β=0$ with coefficients that involve the Riemann zeta function. Our results extend Kingman's first-order approximation [Proc. Symp. on Congestion Theory (1965) 137--169] of the mean for $β\downarrow0$. We build upon the work of Chang and Peres [Ann. Probab. 25 (1997) 787--802], and use Bateman's formulas on Lerch's transcendent and Euler--Maclaurin summation as key ingredients.
△ Less
Submitted 30 March, 2007;
originally announced March 2007.
-
Iterative algorithms to approximate canonical Gabor windows: Computational aspects
Authors:
A. J. E. M. Janssen,
Peter L. Soendergaard
Abstract:
In this paper we investigate the computational aspects of some recently proposed iterative methods for approximating the canonical tight and canonical dual window of a Gabor frame (g,a,b). The iterations start with the window g while the iteration steps comprise the window g, the k^{th} iterand γ_{k}, the frame operators S and S_{k} corresponding to (g,a,b) and (γ_{k},a,b), respectively, and a n…
▽ More
In this paper we investigate the computational aspects of some recently proposed iterative methods for approximating the canonical tight and canonical dual window of a Gabor frame (g,a,b). The iterations start with the window g while the iteration steps comprise the window g, the k^{th} iterand γ_{k}, the frame operators S and S_{k} corresponding to (g,a,b) and (γ_{k},a,b), respectively, and a number of scalars. The structure of the iteration step of the method is determined by the envisaged convergence order m of the method. We consider two strategies for scaling the terms in the iteration step: norm scaling, where in each step the windows are normalized, and initial scaling where we only scale in the very beginning. Norm scaling leads to fast, but conditionally convergent methods, while initial scaling leads to unconditionally convergent methods, but with possibly suboptimal convergence constants. The iterations, initially formulated for time-continuous Gabor systems, are considered and tested in a discrete setting in which one passes to the appropriately sampled-and-periodized windows and frame operators. Furthermore, they are compared with respect to accuracy and efficiency with other methods to approximate canonical windows associated with Gabor frames.
△ Less
Submitted 5 January, 2006;
originally announced January 2006.
-
Hyperbolic secants yield Gabor frames
Authors:
A. J. E. M. Janssen,
Thomas Strohmer
Abstract:
We show that $(g_2,a,b)$ is a Gabor frame when $a>0, b>0, ab<1$ and $g_2(t)=({1/2}πγ)^{1/2} (\cosh πγt)^{-1}$ is a hyperbolic secant with scaling parameter $γ>0$. This is accomplished by expressing the Zak transform of $g_2$ in terms of the Zak transform of the Gaussian $g_1(t)=(2γ)^{1/4} \exp (-πγt^2)$, together with an appropriate use of the Ron-Shen criterion for being a Gabor frame. As a sid…
▽ More
We show that $(g_2,a,b)$ is a Gabor frame when $a>0, b>0, ab<1$ and $g_2(t)=({1/2}πγ)^{1/2} (\cosh πγt)^{-1}$ is a hyperbolic secant with scaling parameter $γ>0$. This is accomplished by expressing the Zak transform of $g_2$ in terms of the Zak transform of the Gaussian $g_1(t)=(2γ)^{1/4} \exp (-πγt^2)$, together with an appropriate use of the Ron-Shen criterion for being a Gabor frame. As a side result it follows that the windows, generating tight Gabor frames, that are canonically associated to $g_2$ and $g_1$ are the same at critical density $a=b=1$. Also, we display the ``singular'' dual function corresponding to the hyperbolic secant at critical density.
△ Less
Submitted 13 January, 2003;
originally announced January 2003.
-
Characterization and computation of canonical tight windows for Gabor frames
Authors:
A. J. E. M Janssen,
Thomas Strohmer
Abstract:
Let $(g_{nm})_{n,m\in Z}$ be a Gabor frame for $L_2(R)$ for given window $g$. We show that the window $h^0=S^{-1/2} g$ that generates the canonically associated tight Gabor frame minimizes $\|g-h\|$ among all windows $h$ generating a normalized tight Gabor frame. We present and prove versions of this result in the time domain, the frequency domain, the time-frequency domain, and the Zak transfor…
▽ More
Let $(g_{nm})_{n,m\in Z}$ be a Gabor frame for $L_2(R)$ for given window $g$. We show that the window $h^0=S^{-1/2} g$ that generates the canonically associated tight Gabor frame minimizes $\|g-h\|$ among all windows $h$ generating a normalized tight Gabor frame. We present and prove versions of this result in the time domain, the frequency domain, the time-frequency domain, and the Zak transform domain, where in each domain the canonical $h^0$ is expressed using functional calculus for Gabor frame operators. Furthermore, we derive a Wiener-Levy type theorem for rationally oversampled Gabor frames. Finally, a Newton-type method for a fast numerical calculation of $\ho$ is presented. We analyze the convergence behavior of this method and demonstrate the efficiency of the proposed algorithm by some numerical examples.
△ Less
Submitted 25 October, 2000;
originally announced October 2000.
-
Weyl-Heisenberg Frames, Translation Invariant Systems and the Walnut Representation
Authors:
Peter G. Casazza,
Ole Christensen,
A. J. E. M. Janssen
Abstract:
We present a comprehensive analysis of the convergence properties of the frame operators of Weyl-Heisenberg systems and shift-invariant systems, and relate these to the convergence of the Walnut representation. We give a deep analysis of necessary conditions and sufficient conditions for convergence of the frame operator. We show that symmetric, norm and unconditional convergence of the Walnut s…
▽ More
We present a comprehensive analysis of the convergence properties of the frame operators of Weyl-Heisenberg systems and shift-invariant systems, and relate these to the convergence of the Walnut representation. We give a deep analysis of necessary conditions and sufficient conditions for convergence of the frame operator. We show that symmetric, norm and unconditional convergence of the Walnut series are all different, but that weak and norm convergence are the same, while there are WH-systems for which the Walnut representation has none of these convergence properties. We make a detailed study of the CC-Condition (a sufficient condition for WH-systems to have finite upper frame bounds), and show that (for ab rational) a uniform version of this passes to the Wexler-Raz dual. We also show that a condition of Tolimieri and Orr implies the uniform CC-Condition. We obtain stronger results in the case when (g,a,b) is a WH-system and ab is rational. For example, if ab is rational, then the CC-Condition becomes equivalent to the unconditional convergence of the Walnut representation - even in a more general setting. Many of the results are generalized to shift-invariant systems. We give classifications for numerous important classes of WH-systems including: (1) The WH-systems for which the frame operator extends to a bounded operator on L^p(R), 1\leq p; (2) The WH-systems for which the frame operator extends to a bounded operator on the Wiener amalgam space; (3) The families of frames which have the same frame operator.
△ Less
Submitted 29 October, 1999;
originally announced October 1999.