-
Quasi-determinant and right eigenvalues of dual quaternion matrices
Authors:
Chen Ling,
Liqun Qi
Abstract:
Dual quaternion/complex matrices have important applications in brain science and multi-agent formation control. In this paper, we first study some basic properties of determinants of dual complex matrices, including Sturm theorem and Bloomfield-Watson inequality for dual complex matrices. Then, we show that every eigenvalue of a dual complex matrix must be the root of the characteristic polynomia…
▽ More
Dual quaternion/complex matrices have important applications in brain science and multi-agent formation control. In this paper, we first study some basic properties of determinants of dual complex matrices, including Sturm theorem and Bloomfield-Watson inequality for dual complex matrices. Then, we show that every eigenvalue of a dual complex matrix must be the root of the characteristic polynomial of this matrix. With the help of the determinants of dual complex matrices, we introduce the concept of quasi-determinants of dual quaternion matrices, and show that every right eigenvalue of a dual quaternion matrix must be the root of the quasi-characteristic polynomial of this matrix, as well as the quasi-determinant of a dual quaternion Hermitian matrix is equivalent to the product of the square of the magnitudes of all eigenvalues. Our results are helpful for the further study of dual quaternion matrix theory, and their applications.
△ Less
Submitted 30 April, 2024;
originally announced April 2024.
-
Tail Asymptotic of Heavy-Tail Risks with Elliptical Copula
Authors:
Kai Wang,
Chengxiu Ling
Abstract:
We consider a family of multivariate distributions with heavy-tailed margins and the type I elliptical dependence structure. This class of risks is common in finance, insurance, environmental and biostatistic applications. We obtain the asymptotic tail risk probabilities and characterize the multivariate regular variation property. The results demonstrate how the rate of decay of probabilities on…
▽ More
We consider a family of multivariate distributions with heavy-tailed margins and the type I elliptical dependence structure. This class of risks is common in finance, insurance, environmental and biostatistic applications. We obtain the asymptotic tail risk probabilities and characterize the multivariate regular variation property. The results demonstrate how the rate of decay of probabilities on tail sets varies in tail sets and the covariance matrix of the elliptical copula. The theoretical results are well illustrated by typical examples and numerical simulations. A real data application shows its advantages in a more flexible dependence structure to characterize joint insurance losses.
△ Less
Submitted 29 April, 2024;
originally announced April 2024.
-
MIM-Reasoner: Learning with Theoretical Guarantees for Multiplex Influence Maximization
Authors:
Nguyen Do,
Tanmoy Chowdhury,
Chen Ling,
Liang Zhao,
My T. Thai
Abstract:
Multiplex influence maximization (MIM) asks us to identify a set of seed users such as to maximize the expected number of influenced users in a multiplex network. MIM has been one of central research topics, especially in nowadays social networking landscape where users participate in multiple online social networks (OSNs) and their influences can propagate among several OSNs simultaneously. Altho…
▽ More
Multiplex influence maximization (MIM) asks us to identify a set of seed users such as to maximize the expected number of influenced users in a multiplex network. MIM has been one of central research topics, especially in nowadays social networking landscape where users participate in multiple online social networks (OSNs) and their influences can propagate among several OSNs simultaneously. Although there exist a couple combinatorial algorithms to MIM, learning-based solutions have been desired due to its generalization ability to heterogeneous networks and their diversified propagation characteristics. In this paper, we introduce MIM-Reasoner, coupling reinforcement learning with probabilistic graphical model, which effectively captures the complex propagation process within and between layers of a given multiplex network, thereby tackling the most challenging problem in MIM. We establish a theoretical guarantee for MIM-Reasoner as well as conduct extensive analyses on both synthetic and real-world datasets to validate our MIM-Reasoner's performance.
△ Less
Submitted 10 March, 2024; v1 submitted 23 February, 2024;
originally announced February 2024.
-
Unit Reducible Cyclotomic Fields
Authors:
Christian Porter,
Piero Sarti,
Cong Ling,
Alar Leibak
Abstract:
In this paper, we continue the study of unit reducible fields as introduced in \cite{LPL23} for the special case of cyclotomic fields. Specifically, we deduce that the cyclotomic fields of conductors $2,3,5,7,8,9,12,15$ are all unit reducible, and show that any cyclotomic field of conductor $N$ is not unit reducible if $2^4, 3^3, 5^2, 7^2, 11^2$ or any prime $p \geq 13$ divide $N$, meaning the uni…
▽ More
In this paper, we continue the study of unit reducible fields as introduced in \cite{LPL23} for the special case of cyclotomic fields. Specifically, we deduce that the cyclotomic fields of conductors $2,3,5,7,8,9,12,15$ are all unit reducible, and show that any cyclotomic field of conductor $N$ is not unit reducible if $2^4, 3^3, 5^2, 7^2, 11^2$ or any prime $p \geq 13$ divide $N$, meaning the unit reducible cyclotomic fields are finite in number. Finally, if $a$ is a totally positive element of a cyclotomic field, we show that for all equivalent $a^\prime$, the discrepancy between $\trace_{K/\mathbb{Q}}(a^\prime)$ and the shortest nonzero element of the quadratic form $\trace_{K/\mathbb{Q}}(axx^*)$ where $x$ is taken from the ring of integers tends to infinity as the conductor $N$ goes to infinity.
△ Less
Submitted 28 November, 2023;
originally announced November 2023.
-
Generic stability of linear algebraic groups over $\mathbb{C}[[t]]$
Authors:
Chen Ling,
Ningyuan Yao
Abstract:
Let $K$ be a henselian valued field with ${\cal O}_K$ its valuation ring, $Γ$ its value group, and $\boldsymbol{k}$ its residue field. We study the definable subsets of ${\cal O}_K$ and algebraic groups definable over ${\cal O}_K$ in the case where $\boldsymbol{k}$ is algebraically closed and $Γ$ is a $\mathbb Z$-group.
We first describe the definable subsets of ${\cal O}_K$, showing that every…
▽ More
Let $K$ be a henselian valued field with ${\cal O}_K$ its valuation ring, $Γ$ its value group, and $\boldsymbol{k}$ its residue field. We study the definable subsets of ${\cal O}_K$ and algebraic groups definable over ${\cal O}_K$ in the case where $\boldsymbol{k}$ is algebraically closed and $Γ$ is a $\mathbb Z$-group.
We first describe the definable subsets of ${\cal O}_K$, showing that every definable subset of ${\cal O}_K$ is either res-finite or res-cofinite (see Definition \ref{def-res-finite-cofinite}). Applying this result, we show that $\mathrm{GL}(n,{\cal O}_K)$ (the invertible $n$ by $n$ matrices over ${\cal O}_K$) are generically stable for each $n$, generalizing Y. Halevi's result, where $K$ is an algebraically closed valued field \cite{Y.Halevi}.
△ Less
Submitted 9 July, 2023;
originally announced July 2023.
-
The Milstein scheme for singular SDEs with Hölder continuous drift
Authors:
Máté Gerencsér,
Gerald Lampl,
Chengcheng Ling
Abstract:
We study the $L^p$ rate of convergence of the Milstein scheme for SDEs when the drift coefficients possess only Hölder regularity. If the diffusion is elliptic and sufficiently regular, we obtain rates consistent with the additive case. The proof relies on regularisation by noise techniques, particularly stochastic sewing, which in turn requires (at least asymptotically) sharp estimates on the law…
▽ More
We study the $L^p$ rate of convergence of the Milstein scheme for SDEs when the drift coefficients possess only Hölder regularity. If the diffusion is elliptic and sufficiently regular, we obtain rates consistent with the additive case. The proof relies on regularisation by noise techniques, particularly stochastic sewing, which in turn requires (at least asymptotically) sharp estimates on the law of the Milstein scheme, which may be of independent interest.
△ Less
Submitted 25 May, 2023;
originally announced May 2023.
-
Extreme Limit Theory of Competing Risks under Power Normalization
Authors:
Kaihao Hu,
Kai Wang,
Corina Constantinescu,
Zhengjun Zhang,
Chengxiu Ling
Abstract:
Advanced science and technology provide a wealth of big data from different sources for extreme value analysis. Classical extreme value theory was extended to obtain an accelerated max-stable distribution family for modelling competing risk-based extreme data in Cao and Zhang (2021). In this paper, we establish probability models for power normalized maxima and minima from competing risks. The lim…
▽ More
Advanced science and technology provide a wealth of big data from different sources for extreme value analysis. Classical extreme value theory was extended to obtain an accelerated max-stable distribution family for modelling competing risk-based extreme data in Cao and Zhang (2021). In this paper, we establish probability models for power normalized maxima and minima from competing risks. The limit distributions consist of an extensional new accelerated max-stable and min-stable distribution family (termed as the accelerated p-max/p-min stable distribution), and its left-truncated version. The consistency and asymptotic normality are obtained for the maximum likelihood estimation of the parameters involved in the accelerated p-max and p-min stable distributions when it exists. The limit types of distributions are determined principally by the sample generating process and the interplay among the competing risks, which are illustrated by common examples. Further, the statistical inference concerning the maximum likelihood estimation and model diagnosis of this model was investigated. Numerical studies show first the efficient approximation of all limit scenarios as well as its comparable convergence rate in contrast with those under linear normalization, and then present the maximum likelihood estimation and diagnosis of accelerated p-max/p-min stable models for simulated data sets. Finally, two real datasets concerning annual maximum of ground level ozone and survival times of Stanford heart plant demonstrate the performance of our accelerated p-max and accelerated p-min stable models.
△ Less
Submitted 24 June, 2024; v1 submitted 4 May, 2023;
originally announced May 2023.
-
Path-by-path uniqueness for stochastic differential equations under Krylov-Röckner condition
Authors:
Lukas Anzeletti,
Khoa Lê,
Chengcheng Ling
Abstract:
We show that any stochastic differential equation (SDE) driven by Brownian motion with drift satisfying the Krylov-Röckner condition has exactly one solution in an ordinary sense for almost every trajectory of the Brownian motion. Additionally, we show that such SDE is strongly complete, i.e. for almost every trajectory of the Brownian motion, the family of solutions with different initial data fo…
▽ More
We show that any stochastic differential equation (SDE) driven by Brownian motion with drift satisfying the Krylov-Röckner condition has exactly one solution in an ordinary sense for almost every trajectory of the Brownian motion. Additionally, we show that such SDE is strongly complete, i.e. for almost every trajectory of the Brownian motion, the family of solutions with different initial data forms a continuous semiflow for all nonnegative times.
△ Less
Submitted 13 April, 2023;
originally announced April 2023.
-
Expansion and attraction of RDS: long time behavior of the solution to singular SDE
Authors:
Chengcheng Ling,
Michael Scheutzow
Abstract:
We provide a framework for studying the expansion rate of the image of a bounded set under a flow in Euclidean space and apply it to stochastic differential equations (SDEs for short) with singular coefficients. If the singular drift of the SDE can be split into two terms, one of which is singular and the radial component of the other term has a radial component of sufficient strength in the direc…
▽ More
We provide a framework for studying the expansion rate of the image of a bounded set under a flow in Euclidean space and apply it to stochastic differential equations (SDEs for short) with singular coefficients. If the singular drift of the SDE can be split into two terms, one of which is singular and the radial component of the other term has a radial component of sufficient strength in the direction of the origin, then the random dynamical system generated by the SDE admits a pullback attractor.
△ Less
Submitted 25 November, 2022;
originally announced November 2022.
-
A regularization-patching dual quaternion optimization method for solving the hand-eye calibration problem
Authors:
Zhongming Chen,
Chen Ling,
Liqun Qi,
Hong Yan
Abstract:
The hand-eye calibration problem is an important application problem in robot research. Based on the 2-norm of dual quaternion vectors, we propose a new dual quaternion optimization method for the hand-eye calibration problem. The dual quaternion optimization problem is decomposed to two quaternion optimization subproblems. The first quaternion optimization subproblem governs the rotation of the r…
▽ More
The hand-eye calibration problem is an important application problem in robot research. Based on the 2-norm of dual quaternion vectors, we propose a new dual quaternion optimization method for the hand-eye calibration problem. The dual quaternion optimization problem is decomposed to two quaternion optimization subproblems. The first quaternion optimization subproblem governs the rotation of the robot hand. It can be solved efficiently by the eigenvalue decomposition or singular value decomposition. If the optimal value of the first quaternion optimization subproblem is zero, then the system is rotationwise noiseless, i.e., there exists a ``perfect'' robot hand motion which meets all the testing poses rotationwise exactly. In this case, we apply the regularization technique for solving the second subproblem to minimize the distance of the translation. Otherwise we apply the patching technique to solve the second quaternion optimization subproblem. Then solving the second quaternion optimization subproblem turns out to be solving a quadratically constrained quadratic program. In this way, we give a complete description for the solution set of hand-eye calibration problems. This is new in the hand-eye calibration literature. The numerical results are also presented to show the efficiency of the proposed method.
△ Less
Submitted 16 September, 2022;
originally announced September 2022.
-
A New Bound for the Orthogonality Defect of HKZ Reduced Lattices
Authors:
Christian Porter,
Edmund Dable-Heath,
Cong Ling
Abstract:
In this work, we determine a sharp upper bound on the orthogonality defect of HKZ reduced bases up to dimension $3$. Using this result, we determine a general upper bound for the orthogonality defect of HKZ reduced bases of arbitrary rank. This upper bound seems to be sharper than existing bounds in literature, such as the one determined by Lagarias, Lenstra and Schnorr.
In this work, we determine a sharp upper bound on the orthogonality defect of HKZ reduced bases up to dimension $3$. Using this result, we determine a general upper bound for the orthogonality defect of HKZ reduced bases of arbitrary rank. This upper bound seems to be sharper than existing bounds in literature, such as the one determined by Lagarias, Lenstra and Schnorr.
△ Less
Submitted 11 August, 2022;
originally announced August 2022.
-
Wang Algebra: From Theory to Practice
Authors:
Bob Ross,
Cong Ling
Abstract:
Wang algebra was initiated by Ki-Tung Wang as a short-cut method for the analysis of electrical networks. It was later popularized by Duffin and has since found numerous applications in electrical engineering and graph theory. This is a semi-tutorial paper on Wang algebra, its history, and modern applications. We expand Duffin's historic notes on Wang algebra to give a full account of Ki-Tung Wang…
▽ More
Wang algebra was initiated by Ki-Tung Wang as a short-cut method for the analysis of electrical networks. It was later popularized by Duffin and has since found numerous applications in electrical engineering and graph theory. This is a semi-tutorial paper on Wang algebra, its history, and modern applications. We expand Duffin's historic notes on Wang algebra to give a full account of Ki-Tung Wang's life. A short proof of Wang algebra using group theory is presented. We exemplify the usefulness of Wang algebra in the design of T-coils. Bridged T-coils give a significant advantage in bandwidth, and were widely adopted in Tektronix oscilloscopes, but design details were guarded as a trade secret. The derivation presented in this paper, based on Wang algebra, is more general and simpler than those reported in literature. This novel derivation has not been shared with the public before.
△ Less
Submitted 20 August, 2022;
originally announced August 2022.
-
Stability estimates for singular SDEs and applications
Authors:
Lucio Galeati,
Chengcheng Ling
Abstract:
We consider multidimensional SDEs with singular drift $b$ and Sobolev diffusion coefficients $σ$, satisfying Krylov--Röckner type assumptions. We prove several stability estimates, comparing solutions driven by different $(b^i,σ^i)$, both for Itô and Stratonovich SDEs, possibly depending on negative Sobolev norms of the difference $b^1-b^2$. We then discuss several applications of these results to…
▽ More
We consider multidimensional SDEs with singular drift $b$ and Sobolev diffusion coefficients $σ$, satisfying Krylov--Röckner type assumptions. We prove several stability estimates, comparing solutions driven by different $(b^i,σ^i)$, both for Itô and Stratonovich SDEs, possibly depending on negative Sobolev norms of the difference $b^1-b^2$. We then discuss several applications of these results to McKean--Vlasov SDEs, criteria for strong compactness of solutions and Wong--Zakai type theorems.
△ Less
Submitted 7 August, 2022;
originally announced August 2022.
-
Unit Reducible Fields and Perfect Unary Forms
Authors:
Alar Leibak,
Christian Porter,
Cong Ling
Abstract:
In this paper, we introduce the notion of unit reducibility for number fields, that is, number fields in which all positive unary forms attain their nonzero minimum at a unit. Furthermore, we investigate the link between unit reducibility and the number of homothety classes of perfect unary forms for a given number field, and prove an open conjecture about the number of classes of perfect unary fo…
▽ More
In this paper, we introduce the notion of unit reducibility for number fields, that is, number fields in which all positive unary forms attain their nonzero minimum at a unit. Furthermore, we investigate the link between unit reducibility and the number of homothety classes of perfect unary forms for a given number field, and prove an open conjecture about the number of classes of perfect unary forms in real quadratic fields, stated by D. Yasaki.
△ Less
Submitted 1 August, 2022; v1 submitted 13 July, 2022;
originally announced July 2022.
-
von Neumann type trace inequality for dual quaternion matrices
Authors:
Chen Ling,
Hong** He,
Liqun Qi,
Tingting Feng
Abstract:
Dual quaternion matrices have important applications in multi-agent formation control. In this paper, we first address the concept of spectral norm of dual quaternion matrices. Then, we introduce a von Neumann type trace inequality and a Hoffman-Wielandt type inequality for general dual quaternion matrices, where the latter characterizes a simultaneous perturbation bound on all singular values of…
▽ More
Dual quaternion matrices have important applications in multi-agent formation control. In this paper, we first address the concept of spectral norm of dual quaternion matrices. Then, we introduce a von Neumann type trace inequality and a Hoffman-Wielandt type inequality for general dual quaternion matrices, where the latter characterizes a simultaneous perturbation bound on all singular values of a dual quaternion matrix. In particular, we also present two variants of the above two inequalities expressed by eigenvalues of dual quaternion Hermitian matrices. Our results are helpful for the further study of dual quaternion matrix theory, algorithmic design, and applications.
△ Less
Submitted 12 April, 2023; v1 submitted 20 April, 2022;
originally announced April 2022.
-
Minimax principle for right eigenvalues of dual quaternion matrices and their generalized inverses
Authors:
Chen Ling,
Liqun Qi,
Hong Yan
Abstract:
Dual quaternions can represent rigid body motion in 3D spaces, and have found wide applications in robotics, 3D motion modelling and control, and computer graphics. In this paper, we introduce three different right linear independency for a set of dual quaternion vectors, and study some related basic properties for the set of dual quaternion vectors and dual quaternion matrices. We present a minim…
▽ More
Dual quaternions can represent rigid body motion in 3D spaces, and have found wide applications in robotics, 3D motion modelling and control, and computer graphics. In this paper, we introduce three different right linear independency for a set of dual quaternion vectors, and study some related basic properties for the set of dual quaternion vectors and dual quaternion matrices. We present a minimax principle for right eigenvalues of dual quaternion Hermitian matrices. Based upon a newly established Cauchy-Schwarz inequality for dual quaternion vectors and singular value decomposition of dual quaternion matrices, we propose an important inequality for singular values of dual quaternion matrices. We finally introduce the concept of generalized inverse of dual quaternion matrices, and present the necessary and sufficient conditions for a dual quaternion matrix to be one of four types of generalized inverses of another dual quaternion matrix.
△ Less
Submitted 4 May, 2023; v1 submitted 7 March, 2022;
originally announced March 2022.
-
Low Rank Approximation of Dual Complex Matrices
Authors:
Liqun Qi,
David M. Alexander,
Zhongming Chen,
Chen Ling,
Ziyan Luo
Abstract:
Dual complex numbers can represent rigid body motion in 2D spaces. Dual complex matrices are linked with screw theory, and have potential applications in various areas. In this paper, we study low rank approximation of dual complex matrices. We define $2$-norm for dual complex vectors, and Frobenius norm for dual complex matrices. These norms are nonnegative dual numbers. We establish the unitary…
▽ More
Dual complex numbers can represent rigid body motion in 2D spaces. Dual complex matrices are linked with screw theory, and have potential applications in various areas. In this paper, we study low rank approximation of dual complex matrices. We define $2$-norm for dual complex vectors, and Frobenius norm for dual complex matrices. These norms are nonnegative dual numbers. We establish the unitary invariance property of dual complex matrices. We study eigenvalues of square dual complex matrices, and show that an $n \times n$ dual complex Hermitian matrix has exactly $n$ eigenvalues, which are dual numbers. We present a singular value decomposition (SVD) theorem for dual complex matrices, define ranks and appreciable ranks for dual complex matrices, and study their properties. We establish an Eckart-Young like theorem for dual complex matrices, and present an algorithm framework for low rank approximation of dual complex matrices via truncated SVD. The SVD of dual complex matrices also provides a basic tool for Principal Component Analysis (PCA) via these matrices. Numerical experiments are reported.
△ Less
Submitted 30 January, 2022;
originally announced January 2022.
-
Reduction Theory of Algebraic Modules and their Successive Minima
Authors:
Christian Porter,
Cong Ling
Abstract:
Lattices defined as modules over algebraic rings or orders have garnered interest recently, particularly in the fields of cryptography and coding theory. Whilst there exist many attempts to generalise the conditions for LLL reduction to such lattices, there do not seem to be any attempts so far to generalise stronger notions of reduction such as Minkowski, HKZ and BKZ reduction. Moreover, most lat…
▽ More
Lattices defined as modules over algebraic rings or orders have garnered interest recently, particularly in the fields of cryptography and coding theory. Whilst there exist many attempts to generalise the conditions for LLL reduction to such lattices, there do not seem to be any attempts so far to generalise stronger notions of reduction such as Minkowski, HKZ and BKZ reduction. Moreover, most lattice reduction methods for modules over algebraic rings involve applying traditional techniques to the embedding of the module into real space, which distorts the structure of the algebra. In this paper, we generalise some classical notions of reduction theory to that of free modules defined over an order. Moreover, we extend the definitions of Minkowski, HKZ and BKZ reduction to that of such modules and show that bases reduced in this manner have vector lengths that can be bounded above by the successive minima of the lattice multiplied by a constant that depends on the algebra and the dimension of the module. In particular, we show that HKZ reduced bases are polynomially close to the successive minima of the lattice in terms of the module dimension. None of our definitions require the module to be embedded and thus preserve the structure of the module.
△ Less
Submitted 12 November, 2021;
originally announced November 2021.
-
Dual Quaternions and Dual Quaternion Vectors
Authors:
Liqun Qi,
Chen Ling,
Hong Yan
Abstract:
We introduce a total order and the absolute value function for dual numbers. The absolute value function of dual numbers are with dual number values, and have properties similar to the properties of the absolute value function of real numbers. We define the magnitude of a dual quaternion, as a dual number. Based upon these, we extended $1$-norm, $\infty$-norm and $2$-norm to dual quaternion vector…
▽ More
We introduce a total order and the absolute value function for dual numbers. The absolute value function of dual numbers are with dual number values, and have properties similar to the properties of the absolute value function of real numbers. We define the magnitude of a dual quaternion, as a dual number. Based upon these, we extended $1$-norm, $\infty$-norm and $2$-norm to dual quaternion vectors.
△ Less
Submitted 23 November, 2021; v1 submitted 8 November, 2021;
originally announced November 2021.
-
"Sparse + Low-Rank'' Tensor Completion Approach for Recovering Images and Videos
Authors:
Chenjian Pan,
Chen Ling,
Hong** He,
Liqun Qi,
Yanwei Xu
Abstract:
Recovering color images and videos from highly undersampled data is a fundamental and challenging task in face recognition and computer vision. By the multi-dimensional nature of color images and videos, in this paper, we propose a novel tensor completion approach, which is able to efficiently explore the sparsity of tensor data under the discrete cosine transform (DCT). Specifically, we introduce…
▽ More
Recovering color images and videos from highly undersampled data is a fundamental and challenging task in face recognition and computer vision. By the multi-dimensional nature of color images and videos, in this paper, we propose a novel tensor completion approach, which is able to efficiently explore the sparsity of tensor data under the discrete cosine transform (DCT). Specifically, we introduce two ``sparse + low-rank'' tensor completion models as well as two implementable algorithms for finding their solutions. The first one is a DCT-based sparse plus weighted nuclear norm induced low-rank minimization model. The second one is a DCT-based sparse plus $p$-shrinking map** induced low-rank optimization model. Moreover, we accordingly propose two implementable augmented Lagrangian-based algorithms for solving the underlying optimization models. A series of numerical experiments including color image inpainting and video data recovery demonstrate that our proposed approach performs better than many existing state-of-the-art tensor completion methods, especially for the case when the ratio of missing data is high.
△ Less
Submitted 19 August, 2022; v1 submitted 18 October, 2021;
originally announced October 2021.
-
Taming singular stochastic differential equations: A numerical method
Authors:
Khoa Lê,
Chengcheng Ling
Abstract:
We consider a generic and explicit tamed Euler--Maruyama scheme for multidimensional time-inhomogeneous stochastic differential equations with multiplicative Brownian noise. The diffusion coefficient is uniformly elliptic, Hölder continuous and weakly differentiable in the spatial variables while the drift satisfies the Ladyzhenskaya--Prodi--Serrin condition, as considered by Krylov and Röckner (2…
▽ More
We consider a generic and explicit tamed Euler--Maruyama scheme for multidimensional time-inhomogeneous stochastic differential equations with multiplicative Brownian noise. The diffusion coefficient is uniformly elliptic, Hölder continuous and weakly differentiable in the spatial variables while the drift satisfies the Ladyzhenskaya--Prodi--Serrin condition, as considered by Krylov and Röckner (2005). In the discrete scheme, the drift is tamed by replacing it by an approximation. A strong rate of convergence of the scheme is provided in terms of the approximation error of the drift in a suitable and possibly very weak topology. A few examples of approximating drifts are discussed in detail. The parameters of the approximating drifts can vary and be fine-tuned to achieve the standard 1/2-strong convergence rate with a logarithmic factor. The result is then applied to provide numerical solutions for stochastic transport equations with singular vector fields satisfying the aforementioned condition.
△ Less
Submitted 14 June, 2022; v1 submitted 4 October, 2021;
originally announced October 2021.
-
A Wong-Zakai theorem for SDEs with singular drift
Authors:
Chengcheng Ling,
Sebastian Riedel,
Michael Scheutzow
Abstract:
We study stochastic differential equations (SDEs) with multiplicative Stratonovich-type noise of the form $ dX_t = b(X_t) dt + σ(X_t)\circ d W_t, X_0=x_0\in\mathbb{R}^d, t\geq0,$ with a possibly singular drift $b\in L^{p}(\mathbb{R}^d)$, $p>d$ and $p\geq 2$, and show that such SDEs can be approximated by random ordinary differential equations by smoothing the noise and the singular drift at the sa…
▽ More
We study stochastic differential equations (SDEs) with multiplicative Stratonovich-type noise of the form $ dX_t = b(X_t) dt + σ(X_t)\circ d W_t, X_0=x_0\in\mathbb{R}^d, t\geq0,$ with a possibly singular drift $b\in L^{p}(\mathbb{R}^d)$, $p>d$ and $p\geq 2$, and show that such SDEs can be approximated by random ordinary differential equations by smoothing the noise and the singular drift at the same time. We further prove a support theorem for this class of SDEs in a rather simple way using the Girsanov theorem.
△ Less
Submitted 24 September, 2021;
originally announced September 2021.
-
The perfection of local semi-flows and local random dynamical systems with applications to SDEs
Authors:
Chengcheng Ling,
Michael Scheutzow,
Isabell Vorkastner
Abstract:
We provide a rather general perfection result for crude local semi-flows taking values in a Polish space showing that a crude semi-flow has a modification which is a (perfect) local semi-flow which is invariant under a suitable metric dynamical system. Such a (local) semi-flow induces a (local) random dynamical system. Then we show that this result can be applied to several classes of stochastic d…
▽ More
We provide a rather general perfection result for crude local semi-flows taking values in a Polish space showing that a crude semi-flow has a modification which is a (perfect) local semi-flow which is invariant under a suitable metric dynamical system. Such a (local) semi-flow induces a (local) random dynamical system. Then we show that this result can be applied to several classes of stochastic differential equations driven by semimartingales with stationary increments such as equations with locally monotone coefficients and equations with singular drift. For these examples it was previously unknown whether they generate a (local) random dynamical system or not.
△ Less
Submitted 1 September, 2021;
originally announced September 2021.
-
Subfield Algorithms for Ideal- and Module-SVP Based on the Decomposition Group
Authors:
Christian Porter,
Andrew Mendelsohn,
Cong Ling
Abstract:
Whilst lattice-based cryptosystems are believed to be resistant to quantum attack, they are often forced to pay for that security with inefficiencies in implementation. This problem is overcome by ring- and module-based schemes such as Ring-LWE or Module-LWE, whose keysize can be reduced by exploiting its algebraic structure, allowing for faster computations. Many rings may be chosen to define suc…
▽ More
Whilst lattice-based cryptosystems are believed to be resistant to quantum attack, they are often forced to pay for that security with inefficiencies in implementation. This problem is overcome by ring- and module-based schemes such as Ring-LWE or Module-LWE, whose keysize can be reduced by exploiting its algebraic structure, allowing for faster computations. Many rings may be chosen to define such cryptoschemes, but cyclotomic rings, due to their cyclic nature allowing for easy multiplication, are the community standard. However, there is still much uncertainty as to whether this structure may be exploited to an adversary's benefit. In this paper, we show that the decomposition group of a cyclotomic ring of arbitrary conductor can be utilised to significantly decrease the dimension of the ideal (or module) lattice required to solve a given instance of SVP. Moreover, we show that there exist a large number of rational primes for which, if the prime ideal factors of an ideal lie over primes of this form, give rise to an "easy" instance of SVP. It is important to note that the work on ideal SVP does not break Ring-LWE, since its security reduction is from worst case ideal SVP to average case Ring-LWE, and is one way.
△ Less
Submitted 9 June, 2022; v1 submitted 7 May, 2021;
originally announced May 2021.
-
ST-SVD Factorization and s-Diagonal Tensors
Authors:
Chen Ling,
**jie Liu,
Chen Ouyang,
Liqun Qi
Abstract:
A third order real tensor is mapped to a special f-diagonal tensor by going through Discrete Fourier Transform (DFT), standard matrix SVD and inverse DFT. We call such an f-diagonal tensor an s-diagonal tensor. An f-diagonal tensor is an s-diagonal tensor if and only if it is mapped to itself in the above process. The third order tensor space is partitioned to orthogonal equivalence classes. Each…
▽ More
A third order real tensor is mapped to a special f-diagonal tensor by going through Discrete Fourier Transform (DFT), standard matrix SVD and inverse DFT. We call such an f-diagonal tensor an s-diagonal tensor. An f-diagonal tensor is an s-diagonal tensor if and only if it is mapped to itself in the above process. The third order tensor space is partitioned to orthogonal equivalence classes. Each orthogonal equivalence class has a unique s-diagonal tensor. Two s-diagonal tensors are equal if they are orthogonally equivalent. Third order tensors in an orthogonal equivalence class have the same tensor tubal rank and T-singular values. Four meaningful necessary conditions for s-diagonal tensors are presented. Then we present a set of sufficient and necessary conditions for s-diagonal tensors. Such conditions involve a special complex number. In the cases that the dimension of the third mode of the considered tensor is $2, 3$ and $4$, we present direct sufficient and necessary conditions which do not involve such a complex number.
△ Less
Submitted 9 August, 2021; v1 submitted 12 April, 2021;
originally announced April 2021.
-
An Orthogonal Equivalence Theorem for Third Order Tensors
Authors:
Liqun Qi,
Chen Ling,
**ejie Liu,
Chen Ouyang
Abstract:
In 2011, Kilmer and Martin proposed tensor singular value decomposition (T-SVD) for third order tensors. Since then, T-SVD has applications in low rank tensor approximation, tensor recovery, multi-view clustering, multi-view feature extraction, tensor sketching, etc. By going through the Discrete Fourier Transform (DFT), matrix SVD and inverse DFT, a third order tensor is mapped to an f-diagonal t…
▽ More
In 2011, Kilmer and Martin proposed tensor singular value decomposition (T-SVD) for third order tensors. Since then, T-SVD has applications in low rank tensor approximation, tensor recovery, multi-view clustering, multi-view feature extraction, tensor sketching, etc. By going through the Discrete Fourier Transform (DFT), matrix SVD and inverse DFT, a third order tensor is mapped to an f-diagonal third order tensor. We call this a Kilmer-Martin map**. We show that the Kilmer-Martin map** of a third order tensor is invariant if that third order tensor is taking T-product with some orthogonal tensors. We define singular values and T-rank of that third order tensor based upon its Kilmer-Martin map**. Thus, tensor tubal rank, T-rank, singular values and T-singular values of a third order tensor are invariant when it is taking T-product with some orthogonal tensors. Some properties of singular values, T-rank and best T-rank one approximation are discussed.
△ Less
Submitted 10 August, 2021; v1 submitted 29 March, 2021;
originally announced March 2021.
-
Low-Rank and Sparse Enhanced Tucker Decomposition for Tensor Completion
Authors:
Chenjian Pan,
Chen Ling,
Hong** He,
Liqun Qi,
Yanwei Xu
Abstract:
Tensor completion refers to the task of estimating the missing data from an incomplete measurement or observation, which is a core problem frequently arising from the areas of big data analysis, computer vision, and network engineering. Due to the multidimensional nature of high-order tensors, the matrix approaches, e.g., matrix factorization and direct matricization of tensors, are often not idea…
▽ More
Tensor completion refers to the task of estimating the missing data from an incomplete measurement or observation, which is a core problem frequently arising from the areas of big data analysis, computer vision, and network engineering. Due to the multidimensional nature of high-order tensors, the matrix approaches, e.g., matrix factorization and direct matricization of tensors, are often not ideal for tensor completion and recovery. In this paper, we introduce a unified low-rank and sparse enhanced Tucker decomposition model for tensor completion. Our model possesses a sparse regularization term to promote a sparse core tensor of the Tucker decomposition, which is beneficial for tensor data compression. Moreover, we enforce low-rank regularization terms on factor matrices of the Tucker decomposition for inducing the low-rankness of the tensor with a cheap computational cost. Numerically, we propose a customized ADMM with enough easy subproblems to solve the underlying model. It is remarkable that our model is able to deal with different types of real-world data sets, since it exploits the potential periodicity and inherent correlation properties appeared in tensors. A series of computational experiments on real-world data sets, including internet traffic data sets, color images, and face recognition, demonstrate that our model performs better than many existing state-of-the-art matricization and tensorization approaches in terms of achieving higher recovery accuracy.
△ Less
Submitted 19 May, 2021; v1 submitted 1 October, 2020;
originally announced October 2020.
-
Non-Commutative Ring Learning With Errors From Cyclic Algebras
Authors:
Charles Grover,
Cong Ling,
Roope Vehkalahti
Abstract:
The Learning with Errors (LWE) problem is the fundamental backbone of modern lattice based cryptography, allowing one to establish cryptography on the hardness of well-studied computational problems. However, schemes based on LWE are often impractical, so Ring LWE was introduced as a form of `structured' LWE, trading off a hard to quantify loss of security for an increase in efficiency by working…
▽ More
The Learning with Errors (LWE) problem is the fundamental backbone of modern lattice based cryptography, allowing one to establish cryptography on the hardness of well-studied computational problems. However, schemes based on LWE are often impractical, so Ring LWE was introduced as a form of `structured' LWE, trading off a hard to quantify loss of security for an increase in efficiency by working over a well chosen ring. Another popular variant, Module LWE, generalizes this exchange by implementing a module structure over a ring. In this work, we introduce a novel variant of LWE over cyclic algebras (CLWE) to replicate the addition of the ring structure taking LWE to Ring LWE by adding cyclic structure to Module LWE. The proposed construction is both more efficient than Module LWE and conjecturally more secure than Ring LWE, the best of both worlds. We show that the security reductions expected for an LWE problem hold, namely a reduction from certain structured lattice problems to the hardness of the decision variant of the CLWE problem. As a contribution of theoretic interest, we view CLWE as the first variant of Ring LWE which supports non-commutative multiplication operations. This ring structure compares favorably with Module LWE, and naturally allows a larger message space for error correction coding.
△ Less
Submitted 4 August, 2020;
originally announced August 2020.
-
Regularity of Local times associated to Volterra-Lévy processes and path-wise regularization of stochastic differential equations
Authors:
Fabian A. Harang,
Chengcheng Ling
Abstract:
We investigate the space-time regularity of the local time associated to Volterra-Lévy processes, including Volterra processes driven by $α$-stable processes for $α\in(0,2]$. We show that the spatial regularity of the local time for Volterra-Lévy process is $P$-a.s. inverse proportionally to the singularity of the associated Volterra kernel. We apply our results to the investigation of path-wise r…
▽ More
We investigate the space-time regularity of the local time associated to Volterra-Lévy processes, including Volterra processes driven by $α$-stable processes for $α\in(0,2]$. We show that the spatial regularity of the local time for Volterra-Lévy process is $P$-a.s. inverse proportionally to the singularity of the associated Volterra kernel. We apply our results to the investigation of path-wise regularizing effects obtained by perturba\Ption of ODEs by a Volterra-Lévy process which has sufficiently regular local time. Following along the lines of [15], we show existence, uniqueness and differentiablility of the flow associated to such equations.
△ Less
Submitted 6 April, 2021; v1 submitted 2 July, 2020;
originally announced July 2020.
-
A Parallelizable Method for Missing Internet Traffic Tensor Data
Authors:
Chen Ling,
Gaohang Yu,
Liqun Qi,
Yanwei Xu
Abstract:
Recovery of internet network traffic data from incomplete observed data is an important issue in internet network engineering and management. In this paper, by fully combining the temporal stability and periodicity features in internet traffic data, a new separable optimization model for internet data recovery is proposed, which is based upon the t-product and the rapid discrete Fourier transform…
▽ More
Recovery of internet network traffic data from incomplete observed data is an important issue in internet network engineering and management. In this paper, by fully combining the temporal stability and periodicity features in internet traffic data, a new separable optimization model for internet data recovery is proposed, which is based upon the t-product and the rapid discrete Fourier transform of tensors. Moreover, by using generalized inverse matrices, an easy-to-operate and effective algorithm is proposed. In theory, we prove that under suitable conditions, every accumulation point of the sequence generated by the proposed algorithm is a stationary point of the established model. Numerical simulation results carried on the widely used real-world internet network datasets, show good performance of the proposed method. In the case of moderate sampling rates, the proposed method works very well, its effect is better than that of some existing internet traffic data recovery methods in the literature. The separable structural features presented in the optimization model provide the possibility to design more efficient parallel algorithms.
△ Less
Submitted 22 May, 2020; v1 submitted 19 May, 2020;
originally announced May 2020.
-
Strong solutions of stochastic differential equations with coefficients in mixed-norm spaces
Authors:
Chengcheng Ling,
Longjie Xie
Abstract:
By studying parabolic equations in mixed-norm spaces, we prove the existence and uniqueness of strong solutions to stochastic differential equations driven by Brownian motion with coefficients in spaces with mixed-norm, which extends Krylov and Röckner's result in [11] and Zhang's result in [18].
By studying parabolic equations in mixed-norm spaces, we prove the existence and uniqueness of strong solutions to stochastic differential equations driven by Brownian motion with coefficients in spaces with mixed-norm, which extends Krylov and Röckner's result in [11] and Zhang's result in [18].
△ Less
Submitted 20 February, 2020; v1 submitted 17 February, 2020;
originally announced February 2020.
-
Efficient Regret Minimization Algorithm for Extensive-Form Correlated Equilibrium
Authors:
Gabriele Farina,
Chun Kai Ling,
Fei Fang,
Tuomas Sandholm
Abstract:
Self-play methods based on regret minimization have become the state of the art for computing Nash equilibria in large two-players zero-sum extensive-form games. These methods fundamentally rely on the hierarchical structure of the players' sequential strategy spaces to construct a regret minimizer that recursively minimizes regret at each decision point in the game tree. In this paper, we introdu…
▽ More
Self-play methods based on regret minimization have become the state of the art for computing Nash equilibria in large two-players zero-sum extensive-form games. These methods fundamentally rely on the hierarchical structure of the players' sequential strategy spaces to construct a regret minimizer that recursively minimizes regret at each decision point in the game tree. In this paper, we introduce the first efficient regret minimization algorithm for computing extensive-form correlated equilibria in large two-player general-sum games with no chance moves. Designing such an algorithm is significantly more challenging than designing one for the Nash equilibrium counterpart, as the constraints that define the space of correlation plans lack the hierarchical structure and might even form cycles. We show that some of the constraints are redundant and can be excluded from consideration, and present an efficient algorithm that generates the space of extensive-form correlation plans incrementally from the remaining constraints. This structural decomposition is achieved via a special convexity-preserving operation that we coin scaled extension. We show that a regret minimizer can be designed for a scaled extension of any two convex sets, and that from the decomposition we then obtain a global regret minimizer. Our algorithm produces feasible iterates. Experiments show that it significantly outperforms prior approaches and for larger problems it is the only viable option.
△ Less
Submitted 28 October, 2019;
originally announced October 2019.
-
SDEs with singular drifts and multiplicative noise on general space-time domains
Authors:
Chengcheng Ling,
Michael Röckner,
Xiangchan Zhu
Abstract:
In this paper, we prove the existence and uniqueness of maximally defined strong solutions to SDEs driven by multiplicative noise on general space-time domains $Q\subset\mathbb{R}_+\times\mathbb{R}^d$, which have continuous paths on the one-point compactification $Q\cup\partial$ of $Q$ where $\partial \notin Q$ and $Q\cup\partial$ is equipped with the Alexandrov topology. If the SDE is of gradient…
▽ More
In this paper, we prove the existence and uniqueness of maximally defined strong solutions to SDEs driven by multiplicative noise on general space-time domains $Q\subset\mathbb{R}_+\times\mathbb{R}^d$, which have continuous paths on the one-point compactification $Q\cup\partial$ of $Q$ where $\partial \notin Q$ and $Q\cup\partial$ is equipped with the Alexandrov topology. If the SDE is of gradient type (see (2.5) below) we prove that under suitable Lyapunov type conditions the life time of the solution is infinite and its distribution has sub-Gaussian tails. This generalizes earlier work \cite{KR} by Krylov and one of the authors to the case where the noise is multiplicative.
△ Less
Submitted 9 October, 2019;
originally announced October 2019.
-
Nonlocal elliptic equation in Hölder space and the martingale problem
Authors:
Chengcheng Ling,
Guohuan Zhao
Abstract:
The well-posedness of nonlocal elliptic equation with singular drift is investigated in Besov-Hölder spaces. As an application, we show the existence and uniqueness for corresponding martingale problem. Moreover, we prove that the one dimensional distribution of the martingale solution has a density in some Besov space.
The well-posedness of nonlocal elliptic equation with singular drift is investigated in Besov-Hölder spaces. As an application, we show the existence and uniqueness for corresponding martingale problem. Moreover, we prove that the one dimensional distribution of the martingale solution has a density in some Besov space.
△ Less
Submitted 12 October, 2019; v1 submitted 1 July, 2019;
originally announced July 2019.
-
Access Balancing in Storage Systems by Labeling Partial Steiner Systems
Authors:
Yeow Meng Chee,
Charles J. Colbourn,
Hoang Dau,
Ryan Gabrys,
Alan C. H. Ling,
Dylan Lusi,
Olgica Milenkovic
Abstract:
Storage architectures ranging from minimum bandwidth regenerating encoded distributed storage systems to declustered-parity RAIDs can be designed using dense partial Steiner systems in order to support fast reads, writes, and recovery of failed storage units. In order to ensure good performance, popularities of the data items should be taken into account and the frequencies of accesses to the stor…
▽ More
Storage architectures ranging from minimum bandwidth regenerating encoded distributed storage systems to declustered-parity RAIDs can be designed using dense partial Steiner systems in order to support fast reads, writes, and recovery of failed storage units. In order to ensure good performance, popularities of the data items should be taken into account and the frequencies of accesses to the storage units made as uniform as possible. A proposed combinatorial model ranks items by popularity and assigns data items to elements in a dense partial Steiner system so that the sums of ranks of the elements in each block are as equal as possible. By develo** necessary conditions in terms of independent sets, we demonstrate that certain Steiner systems must have a much larger difference between the largest and smallest block sums than is dictated by an elementary lower bound. In contrast, we also show that certain dense partial $S(t, t+1, v)$ designs can be labeled to realize the elementary lower bound. Furthermore, we prove that for every admissible order $v$, there is a Steiner triple system $(S(2, 3, v))$ whose largest difference in block sums is within an additive constant of the lower bound.
△ Less
Submitted 28 June, 2019;
originally announced June 2019.
-
On generalized Piterbarg-Berman function
Authors:
Chengxiu Ling,
Hong Zhang,
Long Bai
Abstract:
This paper aims to evaluate the Piterbarg-Berman function given by $$\mathcal{P\!B}_α^h(x, E) = \int_\mathbb{R}e^z\mathbb{P} \left\{{\int_E \mathbb{I}\left(\sqrt2B_α(t) - |t|^α- h(t) - z>0 \right) {\text{d}} t > x} \right\} {\text{d}} z,\quad x\in[0, {mes}(E)],$$ with $h$ a drift function and $B_α$ a fractional Brownian motion (fBm) with Hurst index $α/2\in(0,1]$, i.e., a mean zero Gaussian proces…
▽ More
This paper aims to evaluate the Piterbarg-Berman function given by $$\mathcal{P\!B}_α^h(x, E) = \int_\mathbb{R}e^z\mathbb{P} \left\{{\int_E \mathbb{I}\left(\sqrt2B_α(t) - |t|^α- h(t) - z>0 \right) {\text{d}} t > x} \right\} {\text{d}} z,\quad x\in[0, {mes}(E)],$$ with $h$ a drift function and $B_α$ a fractional Brownian motion (fBm) with Hurst index $α/2\in(0,1]$, i.e., a mean zero Gaussian process with continuous sample paths and covariance function \begin{align*} {\mathrm{Cov}}(B_α(s), B_α(t)) = \frac12 (|s|^α+ |t|^α- |s-t|^α). \end{align*} This note specifies its explicit expression for the fBms with $α=1$ and $2$ when the drift function $h(t)=ct^α, c>0$ and $E=\mathbb{R}_+\cup\{0\}$. For the Gaussian distribution $B_2$, we investigate $\mathcal{P\!B}_2^h(x, E)$ with general drift functions $h(t)$ such that $h(t)+t^2$ being convex or concave, and finite interval $E=[a,b]$. Typical examples of $\mathcal{P\!B}_2^h(x, E)$ with $h(t)=c|t|^λ-t^2$ and several bounds of $\mathcal{P\!B}_α^h(x, E)$ are discussed. Numerical studies are carried out to illustrate all the findings.
Keywords: Piterbarg-Berman function; sojourn time; fractional Brownian motion; drift function
△ Less
Submitted 23 May, 2019;
originally announced May 2019.
-
Properties of the solution set of generalized polynomial complementarity problems
Authors:
Liyun Ling,
Chen Ling,
Hong** He
Abstract:
In this paper, we consider the {\it generalized polynomial complementarity problem} (GPCP), which covers the recently introduced {\it polynomial complementarity problem} (PCP) and the well studied {\it tensor complementarity problem} (TCP) as special cases. By exploiting the structure of tensors, we first show that the solution set of GPCPs is nonempty and compact when a pair of leading tensors is…
▽ More
In this paper, we consider the {\it generalized polynomial complementarity problem} (GPCP), which covers the recently introduced {\it polynomial complementarity problem} (PCP) and the well studied {\it tensor complementarity problem} (TCP) as special cases. By exploiting the structure of tensors, we first show that the solution set of GPCPs is nonempty and compact when a pair of leading tensors is cone {\bf ER}. Then, we study some topological properties of the solution set of GPCPs under the condition that the leading tensor pair is cone ${\bf R}_0$. Finally, we study a notable global Lipschitzian error bound of the solution set of GPCPs, which is better than the results obtained in the current PCPs and TCPs literature. Moreover, such an error bound is potentially helpful for finding and analyzing numerical solutions to the problem under consideration.
△ Less
Submitted 2 May, 2019;
originally announced May 2019.
-
On the Optimality of Gauss's Algorithm over Euclidean Imaginary Quadratic Fields
Authors:
Christian Porter,
Shanxiang Lyu,
Cong Ling
Abstract:
In this paper, we continue our previous work on the reduction of algebraic lattices over imaginary quadratic fields for the special case when the lattice is spanned over a two dimensional basis. In particular, we show that the algebraicvariant of Gauss algorithm returns a basis that corresponds to the successive minima of the lattice in polynomial time if the chosen ring is Euclidean.
In this paper, we continue our previous work on the reduction of algebraic lattices over imaginary quadratic fields for the special case when the lattice is spanned over a two dimensional basis. In particular, we show that the algebraicvariant of Gauss algorithm returns a basis that corresponds to the successive minima of the lattice in polynomial time if the chosen ring is Euclidean.
△ Less
Submitted 10 April, 2019;
originally announced April 2019.
-
A nonnegativity preserving algorithm for multilinear systems with nonsingular M-tensors
Authors:
Xueli Bai,
Hong** He,
Chen Ling,
Guanglu Zhou
Abstract:
This paper addresses multilinear systems of equations which arise in various applications such as data mining and numerical partial differential equations. When the multilinear system under consideration involves a nonsingular $\mathcal{M}$-tensor and a nonnegative right-hand side vector, it may have multiple nonnegative solutions. In this paper, we propose an algorithm which can always preserve t…
▽ More
This paper addresses multilinear systems of equations which arise in various applications such as data mining and numerical partial differential equations. When the multilinear system under consideration involves a nonsingular $\mathcal{M}$-tensor and a nonnegative right-hand side vector, it may have multiple nonnegative solutions. In this paper, we propose an algorithm which can always preserve the nonnegativity of solutions. Theoretically, we show that the sequence generated by the proposed algorithm is a nonnegative decreasing sequence and converges to a nonnegative solution of the system. Numerical results further support the novelty of the proposed method. Particularly, when some elements of the right-hand side vector are zeros, the proposed algorithm works well while existing state-of-the-art solvers may not produce a nonnegative solution.
△ Less
Submitted 13 May, 2019; v1 submitted 24 November, 2018;
originally announced November 2018.
-
Further study on tensor absolute value equations
Authors:
Chen Ling,
Weijie Yan,
Hong** He,
Liqun Qi
Abstract:
In this paper, we consider the {\it tensor absolute value equations} (TAVEs), which is a newly introduced problem in the context of multilinear systems. Although the system of TAVEs is an interesting generalization of matrix {\it absolute value equations} (AVEs), the well-developed theory and algorithms for AVEs are not directly applicable to TAVEs due to the nonlinearity (or multilinearity) of th…
▽ More
In this paper, we consider the {\it tensor absolute value equations} (TAVEs), which is a newly introduced problem in the context of multilinear systems. Although the system of TAVEs is an interesting generalization of matrix {\it absolute value equations} (AVEs), the well-developed theory and algorithms for AVEs are not directly applicable to TAVEs due to the nonlinearity (or multilinearity) of the problem under consideration. Therefore, we first study the solutions existence of some classes of TAVEs with the help of degree theory, in addition to showing, by fixed point theory, that the system of TAVEs has at least one solution under some checkable conditions. Then, we give a bound of solutions of TAVEs for some special cases. To find a solution to TAVEs, we employ the generalized Newton method and report some preliminary results.
△ Less
Submitted 13 October, 2018;
originally announced October 2018.
-
Generalized tensor equations with leading structured tensors
Authors:
Weijie Yan,
Chen Ling,
Liyun Ling,
Hong** He
Abstract:
The system of tensor equations (TEs) has received much considerable attention in the recent literature. In this paper, we consider a class of generalized tensor equations (GTEs). An important difference between GTEs and TEs is that GTEs can be regarded as a system of non-homogenous polynomial equations, whereas TEs is a homogenous one. Such a difference usually makes the theoretical and algorithmi…
▽ More
The system of tensor equations (TEs) has received much considerable attention in the recent literature. In this paper, we consider a class of generalized tensor equations (GTEs). An important difference between GTEs and TEs is that GTEs can be regarded as a system of non-homogenous polynomial equations, whereas TEs is a homogenous one. Such a difference usually makes the theoretical and algorithmic results tailored for TEs not necessarily applicable to GTEs. To study properties of the solution set of GTEs, we first introduce a new class of so-named ${\rm Z}^+$-tensor, which includes the set of all P-tensors as its proper subset. With the help of degree theory, we prove that the system of GTEs with a leading coefficient ${\rm Z}^+$-tensor has at least one solution for any right-hand side vector. Moreover, we study the local error bounds under some appropriate conditions. Finally, we employ a Levenberg-Marquardt algorithm to find a solution to GTEs and report some preliminary numerical results.
△ Less
Submitted 13 October, 2018;
originally announced October 2018.
-
Robust estimations for the tail index of Weibull-type distribution
Authors:
Cheng** Gong,
Chengxiu Ling
Abstract:
Based on suitable left-truncated or censored data, two flexible classes of $M$-estimations of Weibull tail coefficient are proposed with two additional parameters bounding the impact of extreme contamination. Asymptotic normality with $\sqrt {n}$-rate of convergence is obtained. Its robustness is discussed via its asymptotic relative efficiency and influence function. It is further demonstrated by…
▽ More
Based on suitable left-truncated or censored data, two flexible classes of $M$-estimations of Weibull tail coefficient are proposed with two additional parameters bounding the impact of extreme contamination. Asymptotic normality with $\sqrt {n}$-rate of convergence is obtained. Its robustness is discussed via its asymptotic relative efficiency and influence function. It is further demonstrated by a small scale of simulations and an empirical study on CRIX.
△ Less
Submitted 17 October, 2018; v1 submitted 5 September, 2018;
originally announced September 2018.
-
Almost universal codes for MIMO wiretap channels
Authors:
Laura Luzzi,
Roope Vehkalahti,
Cong Ling
Abstract:
Despite several works on secrecy coding for fading and MIMO wiretap channels from an error probability perspective, the construction of information-theoretically secure codes over such channels remains an open problem. In this paper, we consider a fading wiretap channel model where the transmitter has only partial statistical channel state information. Our channel model includes static channels, i…
▽ More
Despite several works on secrecy coding for fading and MIMO wiretap channels from an error probability perspective, the construction of information-theoretically secure codes over such channels remains an open problem. In this paper, we consider a fading wiretap channel model where the transmitter has only partial statistical channel state information. Our channel model includes static channels, i.i.d. block fading channels, and ergodic stationary fading with fast decay of large deviations for the eavesdropper's channel.
We extend the flatness factor criterion from the Gaussian wiretap channel to fading and MIMO wiretap channels, and establish a simple design criterion where the normalized product distance / minimum determinant of the lattice and its dual should be maximized simultaneously.
Moreover, we propose concrete lattice codes satisfying this design criterion, which are built from algebraic number fields with constant root discriminant in the single-antenna case, and from division algebras centered at such number fields in the multiple-antenna case. The proposed lattice codes achieve strong secrecy and semantic security for all rates $R<C_b-C_e-κ$, where $C_b$ and $C_e$ are Bob and Eve's channel capacities respectively, and $κ$ is an explicit constant gap. Furthermore, these codes are almost universal in the sense that a fixed code is good for secrecy for a wide range of fading models.
Finally, we consider a compound wiretap model with a more restricted uncertainty set, and show that rates $R<\bar{C}_b-\bar{C}_e-κ$ are achievable, where $\bar{C}_b$ is a lower bound for Bob's capacity and $\bar{C}_e$ is an upper bound for Eve's capacity for all the channels in the set.
△ Less
Submitted 26 June, 2018; v1 submitted 4 November, 2016;
originally announced November 2016.
-
On the properties of tensor complementarity problems
Authors:
Wen Yu,
Chen Ling,
Hong** He
Abstract:
Properties of solutions of the tensor complementarity problem (TCP) for structured tensors have been investigated in recent literature. In this paper, we make further contributions on this problem. Specifically, we first derive solution existence theorems for TCPs on general cones from the results studied in the nonlinear complementarity problem literature. An interesting byproduct is that conditi…
▽ More
Properties of solutions of the tensor complementarity problem (TCP) for structured tensors have been investigated in recent literature. In this paper, we make further contributions on this problem. Specifically, we first derive solution existence theorems for TCPs on general cones from the results studied in the nonlinear complementarity problem literature. An interesting byproduct is that conditions (e.g., strict copositivity) of solution existence results for TCPs on the nonnegative cone can be reduced to copositivity, which, to the best of our knowledge, is the weakest requirement in the current TCP literature. Moreover, we study the topological properties of the solution set and stability of the TCP at a given solution, which are not discussed before and further enrich the theory of TCPs.
△ Less
Submitted 22 July, 2018; v1 submitted 4 August, 2016;
originally announced August 2016.
-
A class of second-order cone eigenvalue complementarity problems for higher-order tensors
Authors:
Jiaojiao Hou,
Chen Ling,
Hong** He
Abstract:
In this paper, we consider the second-order cone tensor eigenvalue complementarity problem (SOCTEiCP) and present three different reformulations to the model under consideration. Specifically, for the general SOCTEiCP, we first show its equivalence to a particular variational inequality under reasonable conditions. A notable benefit is that such a reformulation possibly provides an efficient way f…
▽ More
In this paper, we consider the second-order cone tensor eigenvalue complementarity problem (SOCTEiCP) and present three different reformulations to the model under consideration. Specifically, for the general SOCTEiCP, we first show its equivalence to a particular variational inequality under reasonable conditions. A notable benefit is that such a reformulation possibly provides an efficient way for the study of properties of the problem. Then, for the symmetric and sub-symmetric SOCTEiCPs, we reformulate them as appropriate nonlinear programming problems, which are extremely beneficial for designing reliable solvers to find solutions of the considered problem. Finally, we report some preliminary numerical results to verify our theoretical results.
△ Less
Submitted 24 July, 2016; v1 submitted 21 March, 2016;
originally announced March 2016.
-
Almost universal codes for fading wiretap channels
Authors:
Laura Luzzi,
Cong Ling,
Roope Vehkalahti
Abstract:
We consider a fading wiretap channel model where the transmitter has only statistical channel state information, and the legitimate receiver and eavesdropper have perfect channel state information. We propose a sequence of non-random lattice codes which achieve strong secrecy and semantic security over ergodic fading channels. The construction is almost universal in the sense that it achieves the…
▽ More
We consider a fading wiretap channel model where the transmitter has only statistical channel state information, and the legitimate receiver and eavesdropper have perfect channel state information. We propose a sequence of non-random lattice codes which achieve strong secrecy and semantic security over ergodic fading channels. The construction is almost universal in the sense that it achieves the same constant gap to secrecy capacity over Gaussian and ergodic fading models.
△ Less
Submitted 11 January, 2016;
originally announced January 2016.
-
Higher-order expansions of powered extremes of normal samples
Authors:
Wei Zhou,
Chengxiu Ling
Abstract:
In this paper, higher-order expansions for distributions and densities of powered extremes of standard normal random sequences are established under an optimal choice of normalized constants. Our findings refine the related results in Hall (1980). Furthermore, it is shown that the rate of convergence of distributions/densities of normalized extremes depends in principle on the power index.
In this paper, higher-order expansions for distributions and densities of powered extremes of standard normal random sequences are established under an optimal choice of normalized constants. Our findings refine the related results in Hall (1980). Furthermore, it is shown that the rate of convergence of distributions/densities of normalized extremes depends in principle on the power index.
△ Less
Submitted 1 January, 2016; v1 submitted 30 December, 2015;
originally announced December 2015.
-
Extremes and Limit Theorems for Difference of Chi-type processes
Authors:
P. Albin,
E. Hashorva,
L. Ji,
C. Ling
Abstract:
Let $\{ζ_{m,k}^{(κ)}(t), t \ge0\}, κ>0$ be random processes defined as the differences of two independent stationary chi-type processes with $m$ and $k$ degrees of freedom. In applications such as physical sciences and engineering dealing with structure reliability, of interest is the approximation of the probability that the random process $ζ_{m,k}^{(κ)}$ stays in some safety region up to a fixed…
▽ More
Let $\{ζ_{m,k}^{(κ)}(t), t \ge0\}, κ>0$ be random processes defined as the differences of two independent stationary chi-type processes with $m$ and $k$ degrees of freedom. In applications such as physical sciences and engineering dealing with structure reliability, of interest is the approximation of the probability that the random process $ζ_{m,k}^{(κ)}$ stays in some safety region up to a fixed time $T$. In this paper we derive the asymptotics of $\mathbb{P}\{\sup_{t\in[0, T]}ζ_{m,k}^{(κ)}(t)> u\}, {u\to\infty}$ under some assumptions on the covariance structures of the underlying Gaussian processes. Further, we establish a Berman sojourn limit theorem and a Gumbel limit result.
△ Less
Submitted 15 July, 2016; v1 submitted 11 August, 2015;
originally announced August 2015.
-
Higher-degree eigenvalue complementarity problems for tensors
Authors:
Chen Ling,
Hong** He,
Liqun Qi
Abstract:
In this paper, we introduce a unified framework of Tensor Higher-Degree Eigenvalue Complementarity Problem (THDEiCP), which goes beyond the framework of the typical Quadratic Eigenvalue Complementarity Problem (QEiCP) for matrices. First, we study some topological properties of higher-degree cone eigenvalues of tensors. Based upon the symmetry assumptions on the underlying tensors, we then reformu…
▽ More
In this paper, we introduce a unified framework of Tensor Higher-Degree Eigenvalue Complementarity Problem (THDEiCP), which goes beyond the framework of the typical Quadratic Eigenvalue Complementarity Problem (QEiCP) for matrices. First, we study some topological properties of higher-degree cone eigenvalues of tensors. Based upon the symmetry assumptions on the underlying tensors, we then reformulate THDEiCP as a weakly coupled homogeneous polynomial optimization problem, which might be greatly helpful for designing implementable algorithms to solve the problem under consideration numerically. As more general theoretical results, we present the results concerning existence of solutions of THDEiCP without symmetry conditions. Finally, we propose an easily implementable algorithm to solve THDEiCP, and report some computational results.
△ Less
Submitted 14 July, 2015; v1 submitted 13 July, 2015;
originally announced July 2015.
-
On maxima of chi-processes over threshold dependent grids
Authors:
Chengxiu Ling,
Zhongquan Tan
Abstract:
In this paper, with motivation from [30] by Piterbarg (Extremes 7:161--177, 2004) and the considerable interest in stationary chi-processes, we derive asymptotic joint distributions of maxima of stationary strongly dependent chi-processes on a continuous time and an uniform grid on the real axis. Our findings extend those for Gaussian cases and give three involved dependence structures via the str…
▽ More
In this paper, with motivation from [30] by Piterbarg (Extremes 7:161--177, 2004) and the considerable interest in stationary chi-processes, we derive asymptotic joint distributions of maxima of stationary strongly dependent chi-processes on a continuous time and an uniform grid on the real axis. Our findings extend those for Gaussian cases and give three involved dependence structures via the strongly dependence condition and the sparse, Pickands and dense grids.
△ Less
Submitted 13 April, 2015;
originally announced April 2015.