-
On Rayleigh Quotient Iteration for Dual Quaternion Hermitian Eigenvalue Problem
Authors:
Shan-Qi Duan,
Qing-Wen Wang,
Xue-Feng Duan
Abstract:
The application of eigenvalue theory to dual quaternion Hermitian matrices holds significance in the realm of multi-agent formation control. In this paper, we study the Rayleigh quotient iteration (RQI) for solving the right eigenpairs of dual quaternion Hermitian matrices. Combined with dual representation, the RQI algorithm can effectively compute the extreme eigenvalue along with the associated…
▽ More
The application of eigenvalue theory to dual quaternion Hermitian matrices holds significance in the realm of multi-agent formation control. In this paper, we study the Rayleigh quotient iteration (RQI) for solving the right eigenpairs of dual quaternion Hermitian matrices. Combined with dual representation, the RQI algorithm can effectively compute the extreme eigenvalue along with the associated eigenvector of the large dual quaternion Hermitian matrices. Furthermore, a convergence analysis of the Rayleigh quotient iteration is derived, demonstrating a local convergence rate of at least cubic, which is faster than the linear convergence rate of the power method. Numerical examples are provided to illustrate the high accuracy and low CPU time cost of the proposed Rayleigh quotient iteration compared with the power method for solving the dual quaternion Hermitian eigenvalue problem.
△ Less
Submitted 6 March, 2024; v1 submitted 31 October, 2023;
originally announced October 2023.
-
A Stochastic Surveillance Stackelberg Game: Co-Optimizing Defense Placement and Patrol Strategy
Authors:
Yohan John,
Gilberto Diaz-Garcia,
Xiaoming Duan,
Jason R. Marden,
Francesco Bullo
Abstract:
Stochastic patrol routing is known to be advantageous in adversarial settings; however, the optimal choice of stochastic routing strategy is dependent on a model of the adversary. We adopt a worst-case omniscient adversary model from the literature and extend the formulation to accommodate heterogeneous defenses at the various nodes of the graph. Introducing this heterogeneity leads to interesting…
▽ More
Stochastic patrol routing is known to be advantageous in adversarial settings; however, the optimal choice of stochastic routing strategy is dependent on a model of the adversary. We adopt a worst-case omniscient adversary model from the literature and extend the formulation to accommodate heterogeneous defenses at the various nodes of the graph. Introducing this heterogeneity leads to interesting new patrol strategies. We identify efficient methods for computing these strategies in certain classes of graphs. We assess the effectiveness of these strategies via comparison to an upper bound on the value of the game. Finally, we leverage the heterogeneous defense formulation to develop novel defense placement algorithms that complement the patrol strategies.
△ Less
Submitted 20 February, 2024; v1 submitted 28 August, 2023;
originally announced August 2023.
-
Embedding Theory of Reservoir Computing and Reducing Reservoir Network Using Time Delays
Authors:
Xing-Yue Duan,
Xiong Ying,
Si-Yang Leng,
Jürgen Kurths,
Wei Lin,
Huan-Fei Ma
Abstract:
Reservoir computing (RC), a particular form of recurrent neural network, is under explosive development due to its exceptional efficacy and high performance in reconstruction or/and prediction of complex physical systems. However, the mechanism triggering such effective applications of RC is still unclear, awaiting deep and systematic exploration. Here, combining the delayed embedding theory with…
▽ More
Reservoir computing (RC), a particular form of recurrent neural network, is under explosive development due to its exceptional efficacy and high performance in reconstruction or/and prediction of complex physical systems. However, the mechanism triggering such effective applications of RC is still unclear, awaiting deep and systematic exploration. Here, combining the delayed embedding theory with the generalized embedding theory, we rigorously prove that RC is essentially a high dimensional embedding of the original input nonlinear dynamical system. Thus, using this embedding property, we unify into a universal framework the standard RC and the time-delayed RC where we novelly introduce time delays only into the network's output layer, and we further find a trade-off relation between the time delays and the number of neurons in RC. Based on this finding, we significantly reduce the network size of RC for reconstructing and predicting some representative physical systems, and, more surprisingly, only using a single neuron reservoir with time delays is sometimes sufficient for achieving those tasks.
△ Less
Submitted 8 May, 2023; v1 submitted 15 March, 2023;
originally announced March 2023.
-
Parameter identification from single trajectory data: from linear to nonlinear
Authors:
Xiaoyu Duan,
Jonathan E Rubin,
David Swigon
Abstract:
Our recent work lays out a general framework for inferring information about the parameters and associated dynamics of a differential equation model from a discrete set of data points collected from the system being modeled. Rigorous mathematical results have justified this approach and have identified some common features that arise for certain classes of integrable models. In this work we presen…
▽ More
Our recent work lays out a general framework for inferring information about the parameters and associated dynamics of a differential equation model from a discrete set of data points collected from the system being modeled. Rigorous mathematical results have justified this approach and have identified some common features that arise for certain classes of integrable models. In this work we present a thorough numerical investigation that shows that several of these core features extend to a paradigmatic linear-in-parameters model, the Lotka-Volterra (LV) system, which we consider in the conservative case as well as under the addition of terms that perturb the system away from this regime. A central construct for this analysis is a concise representation of parameter features in the data space that we call the $P_n$-diagram, which is particularly useful for visualization of results for low-dimensional (small $n$) systems. Our work also exposes some new properties related to non-uniqueness that arise for these LV systems, with non-uniqueness manifesting as a multi-layered structure in the associated $P_2$-diagrams.
△ Less
Submitted 28 September, 2022;
originally announced September 2022.
-
A Less Uncertain Sampling-Based Method of Batch Bayesian Optimization
Authors:
Kai Jia,
Xiaojun Duan,
Zhengming Wang,
Liang Yan
Abstract:
This paper presents a method called sampling-computation-optimization (SCO) to design batch Bayesian optimization. SCO does not construct new high-dimensional acquisition functions but samples from the existing one-site acquisition function to obtain several candidate samples. To reduce the uncertainty of the sampling, the general discrepancy is computed to compare these samples. Finally, the gene…
▽ More
This paper presents a method called sampling-computation-optimization (SCO) to design batch Bayesian optimization. SCO does not construct new high-dimensional acquisition functions but samples from the existing one-site acquisition function to obtain several candidate samples. To reduce the uncertainty of the sampling, the general discrepancy is computed to compare these samples. Finally, the genetic algorithm and switch algorithm are used to optimize the design. Several strategies are used to reduce the computational burden in the SCO. From the numerical results, the SCO designs were less uncertain than those of other sampling-based methods. As for application in batch Bayesian optimization, SCO can find a better solution when compared with other batch methods in the same dimension and batch size. In addition, it is also flexible and can be adapted to different one-site methods. Finally, a complex experimental case is given to illustrate the application value and scenario of SCO method.
△ Less
Submitted 21 February, 2022;
originally announced February 2022.
-
On the Detection of Markov Decision Processes
Authors:
Xiaoming Duan,
Yagiz Savas,
Rui Yan,
Zhe Xu,
Ufuk Topcu
Abstract:
We study the detection problem for a finite set of Markov decision processes (MDPs) where the MDPs have the same state and action spaces but possibly different probabilistic transition functions. Any one of these MDPs could be the model for some underlying controlled stochastic process, but it is unknown a priori which MDP is the ground truth. We investigate whether it is possible to asymptoticall…
▽ More
We study the detection problem for a finite set of Markov decision processes (MDPs) where the MDPs have the same state and action spaces but possibly different probabilistic transition functions. Any one of these MDPs could be the model for some underlying controlled stochastic process, but it is unknown a priori which MDP is the ground truth. We investigate whether it is possible to asymptotically detect the ground truth MDP model perfectly based on a single observed history (state-action sequence). Since the generation of histories depends on the policy adopted to control the MDPs, we discuss the existence and synthesis of policies that allow for perfect detection. We start with the case of two MDPs and establish a necessary and sufficient condition for the existence of policies that lead to perfect detection. Based on this condition, we then develop an algorithm that efficiently (in time polynomial in the size of the MDPs) determines the existence of policies and synthesizes one when they exist. We further extend the results to the more general case where there are more than two MDPs in the candidate set, and we develop a policy synthesis algorithm based on the breadth-first search and recursion. We demonstrate the effectiveness of our algorithms through numerical examples.
△ Less
Submitted 22 December, 2021;
originally announced December 2021.
-
Privacy-Utility Trade-Offs Against Limited Adversaries
Authors:
Xiaoming Duan,
Zhe Xu,
Rui Yan,
Ufuk Topcu
Abstract:
We study privacy-utility trade-offs where users share privacy-correlated useful information with a service provider to obtain some utility. The service provider is adversarial in the sense that it can infer the users' private information based on the shared useful information. To minimize the privacy leakage while maintaining a desired level of utility, the users carefully perturb the useful infor…
▽ More
We study privacy-utility trade-offs where users share privacy-correlated useful information with a service provider to obtain some utility. The service provider is adversarial in the sense that it can infer the users' private information based on the shared useful information. To minimize the privacy leakage while maintaining a desired level of utility, the users carefully perturb the useful information via a probabilistic privacy map** before sharing it. We focus on the setting in which the adversary attempting an inference attack on the users' privacy has potentially biased information about the statistical correlation between the private and useful variables. This information asymmetry between the users and the limited adversary leads to better privacy guarantees than the case of the omniscient adversary under the same utility requirement. We first identify assumptions on the adversary's information so that the inference costs are well-defined and finite. Then, we characterize the impact of the information asymmetry and show that it increases the inference costs for the adversary. We further formulate the design of the privacy map** against a limited adversary using a difference of convex functions program and solve it via the concave-convex procedure. When the adversary's information is not precisely available, we adopt a Bayesian view and represent the adversary's information by a probability distribution. In this case, the expected cost for the adversary does not admit a closed-form expression, and we establish and maximize a lower bound of the expected cost. We provide a numerical example regarding a census data set to illustrate the theoretical results.
△ Less
Submitted 18 June, 2021;
originally announced June 2021.
-
Better understanding of the multivariate hypergeometric distribution with implications in design-based survey sampling
Authors:
X. G. Duan
Abstract:
Multivariate hypergeometric distribution arises frequently in elementary statistics and probability courses, for simultaneously studying the occurence law of specified events, when sampling without replacement from a finite population with fixed number of classification. Covariance matrix of this distribution is well known to be identical to its multinomial counterpart multiplied by 1-(n-1)/(N-1),…
▽ More
Multivariate hypergeometric distribution arises frequently in elementary statistics and probability courses, for simultaneously studying the occurence law of specified events, when sampling without replacement from a finite population with fixed number of classification. Covariance matrix of this distribution is well known to be identical to its multinomial counterpart multiplied by 1-(n-1)/(N-1), with N and n being population and sample sizes, respectively. It appears to however, have been less discussed in the literature about the meaning of this relationship, especially regarding the specific form of the multiplier. Based on an augmenting argument together with probabilistic symmetry, we present a more transparent understanding for the covariance structure of the multivariate hypergeometric distribution. We discuss implications of these combined techniques and provide a unified description about the relative efficiency for estimating population mean based on simple random sampling, probability proportional-to-size sampling and adaptive cluster sampling, with versus without replacement. We also provide insight into the classic random group method for variance estimation.
△ Less
Submitted 2 January, 2021;
originally announced January 2021.
-
A Fast Numerical solution of the quark's Dyson-Schwinger equation with Ball-Chiu vertex
Authors:
**g-Hui Huang,
Xue-Ying Duan,
Xiang-Yun Hu,
Huan Chen
Abstract:
In this paper, we present two feasible and efficient methods to numerically solve the quark's Dyson-Schwinger (qDSE), the qDSE is mathematical systems of nonlinear integral equations of the second kind with high degrees of freedom. It is difficult to analytically solve the qDSE due to its non-linearity and the singularity. Normally we discrete the singular integral equation by Gauss Legendre integ…
▽ More
In this paper, we present two feasible and efficient methods to numerically solve the quark's Dyson-Schwinger (qDSE), the qDSE is mathematical systems of nonlinear integral equations of the second kind with high degrees of freedom. It is difficult to analytically solve the qDSE due to its non-linearity and the singularity. Normally we discrete the singular integral equation by Gauss Legendre integral integration formula, then the approximate solutions of integral equation are obtained by iterative method. The main difficulty in the progress is the unknown function, which is the quark's propagator at vacuum and at finite chemical potential, occurs inside and outside the integral sign. Because of the singularity, the unknown function inside the integral sign need to be interpolate with high precision. Normally traditional numerical examples show the interpolation will cost a lot of CPU time. In this case, we provide two effective and efficient methods to optimize the numerical calculation, one is we put forward a modified interpolation method to replace the traditional method. Besides, the technique of OpenMP and automatic parallelization in GCC is another method which has widely used in modern scientific computation. Finally, we compare CPU time with different algorithm and our numerical results show the efficiency of the proposed methods.
△ Less
Submitted 2 December, 2020;
originally announced December 2020.
-
Stochastic Strategies for Robotic Surveillance as Stackelberg Games
Authors:
Xiaoming Duan,
Dario Paccagnan,
Francesco Bullo
Abstract:
This paper studies a stochastic robotic surveillance problem where a mobile robot moves randomly on a graph to capture a potential intruder that strategically attacks a location on the graph. The intruder is assumed to be omniscient: it knows the current location of the mobile agent and can learn the surveillance strategy. The goal for the mobile robot is to design a stochastic strategy so as to m…
▽ More
This paper studies a stochastic robotic surveillance problem where a mobile robot moves randomly on a graph to capture a potential intruder that strategically attacks a location on the graph. The intruder is assumed to be omniscient: it knows the current location of the mobile agent and can learn the surveillance strategy. The goal for the mobile robot is to design a stochastic strategy so as to maximize the probability of capturing the intruder. We model the strategic interactions between the surveillance robot and the intruder as a Stackelberg game, and optimal and suboptimal Markov chain based surveillance strategies in star, complete and line graphs are studied. We first derive a universal upper bound on the capture probability, i.e., the performance limit for the surveillance agent. We show that this upper bound is tight in the complete graph and further provide suboptimality guarantees for a natural design. For the star and line graphs, we first characterize dominant strategies for the surveillance agent and the intruder. Then, we rigorously prove the optimal strategy for the surveillance agent.
△ Less
Submitted 15 November, 2020;
originally announced November 2020.
-
Markov Chain-Based Stochastic Strategies for Robotic Surveillance
Authors:
Xiaoming Duan,
Francesco Bullo
Abstract:
This article surveys recent advancements of strategy designs for persistent robotic surveillance tasks with the focus on stochastic approaches. The problem describes how mobile robots stochastically patrol a graph in an efficient way where the efficiency is defined with respect to relevant underlying performance metrics. We first start by reviewing the basics of Markov chains, which is the primary…
▽ More
This article surveys recent advancements of strategy designs for persistent robotic surveillance tasks with the focus on stochastic approaches. The problem describes how mobile robots stochastically patrol a graph in an efficient way where the efficiency is defined with respect to relevant underlying performance metrics. We first start by reviewing the basics of Markov chains, which is the primary motion model for stochastic robotic surveillance. Then two main criteria regarding the speed and unpredictability of surveillance strategies are discussed. The central objects that appear throughout the treatment is the hitting times of Markov chains, their distributions and expectations. We formulate various optimization problems based on the concerned metrics in different scenarios and establish their respective properties.
△ Less
Submitted 20 August, 2020;
originally announced August 2020.
-
Robotic Surveillance Based on the Meeting Time of Random Walks
Authors:
Xiaoming Duan,
Mishel George,
Rushabh Patel,
Francesco Bullo
Abstract:
This paper analyzes the meeting time between a pair of pursuer and evader performing random walks on digraphs. The existing bounds on the meeting time usually work only for certain classes of walks and cannot be used to formulate optimization problems and design robotic strategies. First, by analyzing multiple random walks on a common graph as a single random walk on the Kronecker product graph, w…
▽ More
This paper analyzes the meeting time between a pair of pursuer and evader performing random walks on digraphs. The existing bounds on the meeting time usually work only for certain classes of walks and cannot be used to formulate optimization problems and design robotic strategies. First, by analyzing multiple random walks on a common graph as a single random walk on the Kronecker product graph, we provide the first closed-form expression for the expected meeting time in terms of the transition matrices of the moving agents. This novel expression leads to necessary and sufficient conditions for the meeting time to be finite and to insightful graph-theoretic interpretations. Second, based on the closed-form expression, we setup and study the minimization problem for the expected capture time for a pursuer/evader pair. We report theoretical and numerical results on basic case studies to show the effectiveness of the design.
△ Less
Submitted 3 December, 2019;
originally announced December 2019.
-
Matching-Based Capture Strategies for 3D Heterogeneous Multiplayer Reach-Avoid Differential Games
Authors:
Rui Yan,
Xiaoming Duan,
Zongying Shi,
Yisheng Zhong,
Francesco Bullo
Abstract:
This paper studies a 3D multiplayer reach-avoid differential game with a goal region and a play region. Multiple pursuers defend the goal region by consecutively capturing multiple evaders in the play region. The players have heterogeneous moving speeds and the pursuers have heterogeneous capture radii. Since this game is hard to analyze directly, we decompose the whole game as many subgames which…
▽ More
This paper studies a 3D multiplayer reach-avoid differential game with a goal region and a play region. Multiple pursuers defend the goal region by consecutively capturing multiple evaders in the play region. The players have heterogeneous moving speeds and the pursuers have heterogeneous capture radii. Since this game is hard to analyze directly, we decompose the whole game as many subgames which involve multiple pursuers and only one evader. Then, these subgames are used as a building block for the pursuer-evader matching. First, for multiple pursuers and one evader, we introduce an evasion space (ES) method characterized by a potential function to construct a guaranteed pursuer winning strategy. Then, based on this strategy, we develop conditions to determine whether a pursuit team can guard the goal region against one evader. It is shown that in 3D, if a pursuit team is able to defend the goal region against an evader, then at most three pursuers in the team are necessarily needed. We also compute the value function of the Hamilton-Jacobi-Isaacs (HJI) equation for a special subgame of degree. To capture the maximum number of evaders in the open-loop sense, we formulate a maximum bipartite matching problem with conflict graph (MBMC). We show that the MBMC is NP-hard and design a polynomial-time constant-factor approximation algorithm to solve it. Finally, we propose a receding horizon strategy for the pursuit team where in each horizon an MBMC is solved and the strategies of the pursuers are given. We also extend our results to the case of a bounded convex play region where the evaders escape through an exit. Two numerical examples are provided to demonstrate the obtained results.
△ Less
Submitted 13 February, 2020; v1 submitted 26 September, 2019;
originally announced September 2019.
-
Graph-Theoretic Stability Conditions for Metzler Matrices and Monotone Systems
Authors:
Xiaoming Duan,
Saber Jafarpour,
Francesco Bullo
Abstract:
This paper studies the graph-theoretic conditions for stability of positive monotone systems. Using concepts from input-to-state stability and network small-gain theory, we first establish necessary and sufficient conditions for the stability of linear positive systems described by Metzler matrices. Specifically, we derive two sets of stability conditions based on two forms of input-to-state stabi…
▽ More
This paper studies the graph-theoretic conditions for stability of positive monotone systems. Using concepts from input-to-state stability and network small-gain theory, we first establish necessary and sufficient conditions for the stability of linear positive systems described by Metzler matrices. Specifically, we derive two sets of stability conditions based on two forms of input-to-state stability gains for Metzler systems, namely max-interconnection gains and sum-interconnection gains. Based on the max-interconnection gains, we show that the cyclic small-gain theorem becomes necessary and sufficient for the stability of Metzler systems; based on the sum-interconnection gains, we obtain novel graph-theoretic conditions for the stability of Metzler systems. All these conditions highlight the role of cycles in the interconnection graph and unveil how the structural properties of the graph affect stability. Finally, we extend our results to the nonlinear monotone system and obtain similar sufficient conditions for global asymptotic stability.
△ Less
Submitted 22 May, 2020; v1 submitted 14 May, 2019;
originally announced May 2019.
-
Sliced Latin hypercube designs with arbitrary run sizes
Authors:
** Xu,
Xu He,
Xiaojun Duan,
Zhengming Wang
Abstract:
Latin hypercube designs achieve optimal univariate stratifications and are useful for computer experiments. Sliced Latin hypercube designs are Latin hypercube designs that can be partitioned into smaller Latin hypercube designs. In this work, we give, to the best of our knowledge, the first construction of sliced Latin hypercube designs that allow arbitrarily chosen run sizes for the slices. We al…
▽ More
Latin hypercube designs achieve optimal univariate stratifications and are useful for computer experiments. Sliced Latin hypercube designs are Latin hypercube designs that can be partitioned into smaller Latin hypercube designs. In this work, we give, to the best of our knowledge, the first construction of sliced Latin hypercube designs that allow arbitrarily chosen run sizes for the slices. We also provide an algorithm to reduce correlations of our proposed designs.
△ Less
Submitted 7 May, 2019;
originally announced May 2019.
-
Sharp Decay Estimates for the Vlasov-Poisson and Vlasov-Yukawa Systems with Small Data
Authors:
Xianglong Duan
Abstract:
In this paper, we present sharp decay estimates for small data solutions of the following two systems: the Vlasov-Poisson (V-P) system in dimension 3 or higher and the Vlasov-Yukawa (V-Y) system in dimension 2 or higher. We rely on a modification of the vector field method for transport equation as developed by Smulevici in 2016 for the Vlasov-Poisson system. Using the Green's function in particul…
▽ More
In this paper, we present sharp decay estimates for small data solutions of the following two systems: the Vlasov-Poisson (V-P) system in dimension 3 or higher and the Vlasov-Yukawa (V-Y) system in dimension 2 or higher. We rely on a modification of the vector field method for transport equation as developed by Smulevici in 2016 for the Vlasov-Poisson system. Using the Green's function in particular to estimate bilinear terms, we improve Smulevici's result by requiring only $L^1_{x,v}$ bounds for the initial data and its derivatives. We also extend the result to the Vlasov-Yukawa system.
△ Less
Submitted 12 April, 2019;
originally announced April 2019.
-
Application of gradient descent algorithms based on geodesic distances
Authors:
Xiaomin Duan,
Huafei Sun,
Linyu Peng
Abstract:
In this paper, the Riemannian gradient algorithm and the natural gradient algorithm are applied to solve descent direction problems on the manifold of positive definite Hermitian matrices, where the geodesic distance is considered as the cost function. The first proposed problem is control for positive definite Hermitian matrix systems whose outputs only depend on their inputs. The geodesic distan…
▽ More
In this paper, the Riemannian gradient algorithm and the natural gradient algorithm are applied to solve descent direction problems on the manifold of positive definite Hermitian matrices, where the geodesic distance is considered as the cost function. The first proposed problem is control for positive definite Hermitian matrix systems whose outputs only depend on their inputs. The geodesic distance is adopted as the difference of the output matrix and the target matrix. The controller to adjust the input is obtained such that the output matrix is as close as possible to the target matrix. We show the trajectory of the control input on the manifold using the Riemannian gradient algorithm. The second application is to compute the Karcher mean of a finite set of given Toeplitz positive definite Hermitian matrices, which is defined as the minimizer of the sum of geodesic distances. To obtain more efficient iterative algorithm compared with traditional ones, a natural gradient algorithm is proposed to compute the Karcher mean. Illustrative simulations are provided to show the computational behavior of the proposed algorithms.
△ Less
Submitted 4 April, 2019;
originally announced April 2019.
-
The maximum number of triangles in graphs without large linear forests
Authors:
Xiuzhuan Duan,
Jian Wang,
Weihua Yang
Abstract:
Let $G$ be a graph on $n$ vertices. A linear forest is a graph consisting of vertex-disjoint paths and isolated vertices. A maximum linear forest of $G$ is a subgraph of $G$ with maximum number of edges, which is a linear forest. We denote by $l(G)$ this maximum number. Let $t=\left\lfloor (k-1)/2\right \rfloor$. Recently, Ning and Wang \cite{boning} proved that if $l(G)=k-1$, then for any $k<n$ \…
▽ More
Let $G$ be a graph on $n$ vertices. A linear forest is a graph consisting of vertex-disjoint paths and isolated vertices. A maximum linear forest of $G$ is a subgraph of $G$ with maximum number of edges, which is a linear forest. We denote by $l(G)$ this maximum number. Let $t=\left\lfloor (k-1)/2\right \rfloor$. Recently, Ning and Wang \cite{boning} proved that if $l(G)=k-1$, then for any $k<n$ \[ e(G) \leq \max \left\{\binom{k}{2},\binom{t}{2}+t (n - t)+ c \right\}, \] where $c=0$ if $k$ is odd and $c=1$ otherwise, and the inequality is tight. In this paper, we prove that if $l(G)=k-1$ and $δ(G)=δ$ ($δ<\lfloor k/2 \rfloor$), then for any $k<n$ \[ e(G) \leq \max \left\{\binom{k-δ}{2}+δ(n-k+δ),\binom{t}{2}+t\left(n-t\right)+c \right\}. \] When $δ=0$, it reduces to Ning and Wang's result. Moreover, let $r_3(G)$ be the number of triangles in $G$. We prove that if $l(G)=k-1$ and $δ(G)= δ$, then for any $k<n$ \[ r_3(G)\leq \max \left\{\binom{k-δ}{3}+\binomδ{2}(n-k+δ),\binom{t}{3}+\binom{t}{2}\left(n-t\right)+d \right\}. \] where $d=0$ if $k$ is odd and $d=t$ otherwise.
△ Less
Submitted 24 December, 2018; v1 submitted 21 December, 2018;
originally announced December 2018.
-
On the generalized low rank approximation of the correlation matrices arising in the asset portfolio
Authors:
Xuefeng Duan,
Jianchao Bai,
Maojun Zhang,
Xinjun Zhang
Abstract:
In this paper, we consider the generalized low rank approximation of the correlation matrices problem which arises in the asset portfolio. We first characterize the feasible set by using the Gramian representation together with a special trigonometric function transform, and then transform the generalized low rank approximation of the correlation matrices problem into an unconstrained optimization…
▽ More
In this paper, we consider the generalized low rank approximation of the correlation matrices problem which arises in the asset portfolio. We first characterize the feasible set by using the Gramian representation together with a special trigonometric function transform, and then transform the generalized low rank approximation of the correlation matrices problem into an unconstrained optimization problem. Finally, we use the conjugate gradient algorithm with the strong Wolfe line search to solve the unconstrained optimization problem. Numerical examples show that our new method is feasible and effective.
△ Less
Submitted 11 December, 2018;
originally announced December 2018.
-
Markov Chains with Maximum Return Time Entropy for Robotic Surveillance
Authors:
Xiaoming Duan,
Mishel George,
Francesco Bullo
Abstract:
Motivated by robotic surveillance applications, this paper studies the novel problem of maximizing the return time entropy of a Markov chain, subject to a graph topology with travel times and stationary distribution. The return time entropy is the weighted average, over all graph nodes, of the entropy of the first return times of the Markov chain; this objective function is a function series that…
▽ More
Motivated by robotic surveillance applications, this paper studies the novel problem of maximizing the return time entropy of a Markov chain, subject to a graph topology with travel times and stationary distribution. The return time entropy is the weighted average, over all graph nodes, of the entropy of the first return times of the Markov chain; this objective function is a function series that does not admit in general a closed form.
The paper features theoretical and computational contributions. First, we obtain a discrete-time delayed linear system for the return time probability distribution and establish its convergence properties. We show that the objective function is continuous over a compact set and therefore admits a global maximum; a unique globally-optimal solution is known only for complete graphs with unitary travel times. We then establish upper and lower bounds between the return time entropy and the well-known entropy rate of the Markov chain. To compute the optimal Markov chain numerically, we establish the asymptotic equality between entropy, conditional entropy and truncated entropy, and propose an iteration to compute the gradient of the truncated entropy. Finally, we apply these results to the robotic surveillance problem. Our numerical results show that, for a model of rational intruder over prototypical graph topologies and test cases, the maximum return time entropy chain performs better than several existing Markov chains.
△ Less
Submitted 25 May, 2018; v1 submitted 20 March, 2018;
originally announced March 2018.
-
Linear Stochastic Approximation Algorithms and Group Consensus over Random Signed Networks: A Technical Report with All Proofs
Authors:
Ge Chen,
Xiaoming Duan,
Wenjun Mei,
Francesco Bullo
Abstract:
This paper studies linear stochastic approximation (SA) algorithms and their application to multi-agent systems in engineering and sociology. As main contribution, we provide necessary and sufficient conditions for convergence of linear SA algorithms to a deterministic or random final vector. We also characterize the system convergence rate, when the system is convergent. Moreover, differing from…
▽ More
This paper studies linear stochastic approximation (SA) algorithms and their application to multi-agent systems in engineering and sociology. As main contribution, we provide necessary and sufficient conditions for convergence of linear SA algorithms to a deterministic or random final vector. We also characterize the system convergence rate, when the system is convergent. Moreover, differing from non-negative gain functions in traditional SA algorithms, this paper considers also the case when the gain functions are allowed to take arbitrary real numbers. Using our general treatment, we provide necessary and sufficient conditions to reach consensus and group consensus for first-order discrete-time multi-agent system over random signed networks and with state-dependent noise. Finally, we extend our results to the setting of multi-dimensional linear SA algorithms and characterize the behavior of the multi-dimensional Friedkin-Johnsen model over random interaction networks.
△ Less
Submitted 6 September, 2018; v1 submitted 22 August, 2017;
originally announced August 2017.
-
Hyperbolicity of the time-like extremal surfaces in minkowski spaces
Authors:
Xianglong Duan
Abstract:
In this paper, it is established, in the case of graphs, that time-like extremal surfaces of dimension $1+n$ in the Minkowski space of dimension $1+n+m$ can be described by a symmetric hyperbolic system of PDEs with the very simple structure (reminiscent of the inviscid Burgers equation)…
▽ More
In this paper, it is established, in the case of graphs, that time-like extremal surfaces of dimension $1+n$ in the Minkowski space of dimension $1+n+m$ can be described by a symmetric hyperbolic system of PDEs with the very simple structure (reminiscent of the inviscid Burgers equation)$$ \partial\_t W + \sum\_{j=1}^n A\_j(W)\partial\_{x\_j} W =0,\;\;\;W:\;(t,x)\in\mathbb{R}^{1+n}\rightarrow W(t,x)\in\mathbb{R}^{n+m+\binom{m+n}{n}},$$where each $A\_j(W)$ is just a $\big(n+m+\binom{m+n}{n}\big)\times\big(n+m+\binom{m+n}{n}\big)$ symmetric matrix dependinglinearly on $W$.
△ Less
Submitted 15 June, 2017;
originally announced June 2017.
-
Magnetohydrodynamic regime of the born-infeld electromagnetism
Authors:
Xianglong Duan
Abstract:
The Born-Infeld (BI) model is a nonlinear correction of Maxwell's equations. By adding the energy and Poynting vector as additional variables, it can be augmented as a 10$\times$10 system of hyperbolic conservation laws, called the augmented BI (ABI) equations. The author found that, through a quadratic change of the time variable, the ABI system gives a simple energy dissipation model that combin…
▽ More
The Born-Infeld (BI) model is a nonlinear correction of Maxwell's equations. By adding the energy and Poynting vector as additional variables, it can be augmented as a 10$\times$10 system of hyperbolic conservation laws, called the augmented BI (ABI) equations. The author found that, through a quadratic change of the time variable, the ABI system gives a simple energy dissipation model that combines Darcy's law and magnetohydrodynamics (MHD). Using the concept of "relative entropy" (or "modulated energy"), borrowed from the theory of hyperbolic systems of conservation laws, we introduce a notion of generalized solutions, that we call dissipative solutions. For given initial conditions, the set of generalized solutions is not empty, convex, and compact. Smooth solutions to the dissipative system are always unique in this setting.
△ Less
Submitted 6 June, 2017;
originally announced June 2017.
-
An integrable example of gradient flows based on optimal transport of differential forms
Authors:
Yann Brenier,
Xianglong Duan
Abstract:
Optimal transport theory has been a powerful tool for the analysis of parabolic equationsviewed as gradient flows of volume forms according to suitable transportation metrics.In this paper, we present an example of gradient flows for closed (d-1)-forms in theEuclidean space R^d. In spite of its apparent complexity, the resulting verydegenerate parabolic system is fully integrable and can be viewed…
▽ More
Optimal transport theory has been a powerful tool for the analysis of parabolic equationsviewed as gradient flows of volume forms according to suitable transportation metrics.In this paper, we present an example of gradient flows for closed (d-1)-forms in theEuclidean space R^d. In spite of its apparent complexity, the resulting verydegenerate parabolic system is fully integrable and can be viewed as the Eulerianversion of the heat equation for curves in the Euclidean space.We analyze this system in terms of "relative entropy" and "dissipative solutions" and provide global existence and weak-strong uniqueness results.
△ Less
Submitted 30 March, 2017;
originally announced April 2017.
-
From conservative to dissipative systemsthrough quadratic change of time, with application to the curve-shortening flow
Authors:
Yann Brenier,
Xianglong Duan
Abstract:
We provide several examples of dissipative systems that can be obtained from conservative ones through a simple, quadratic,change of time. A typical example is the curve-shortening flow in R^d, which is a particular case ofmean-curvature flow with co-dimension higher than one (except in the case d=2).Through such a change of time, this flow can be formally derived from the conservative model of vi…
▽ More
We provide several examples of dissipative systems that can be obtained from conservative ones through a simple, quadratic,change of time. A typical example is the curve-shortening flow in R^d, which is a particular case ofmean-curvature flow with co-dimension higher than one (except in the case d=2).Through such a change of time, this flow can be formally derived from the conservative model of vibrating strings obtainedfrom the Nambu-Goto action. Using the concept of "relative entropy" (or "modulated energy"), borrowed from the theoryof hyperbolic systems of conservation laws, we introduce a notion of generalized solutions,that we call dissipative solutions, for the curve-shortening flow. For given initial conditions, the set of generalized solutionsis convex, compact, if not empty. Smooth solutions to the curve-shortening flow are always unique in this setting.
△ Less
Submitted 9 March, 2017;
originally announced March 2017.