-
The second order Caffarelli-Kohn-Nirenberg identities and inequalities
Authors:
Xiao-** Chen,
Chun-Lei Tang
Abstract:
This paper focuses on optimal constants and optimizers of the second order Caffarelli-Kohn-Nirenberg inequalities. Firstly, we aim to study optimal constants and optimizers for the following second order Caffarelli-Kohn-Nirenberg inequality in radial space: let $N\ge1$, $t\ge p>1$, \begin{equation}\label{0.1} \left(\int_{\mathbb{R}^N} \frac{|Δu|^p}{|x|^{pα}} \mathrm{d}x\right)^{\frac{1}{p}} \left[…
▽ More
This paper focuses on optimal constants and optimizers of the second order Caffarelli-Kohn-Nirenberg inequalities. Firstly, we aim to study optimal constants and optimizers for the following second order Caffarelli-Kohn-Nirenberg inequality in radial space: let $N\ge1$, $t\ge p>1$, \begin{equation}\label{0.1} \left(\int_{\mathbb{R}^N} \frac{|Δu|^p}{|x|^{pα}} \mathrm{d}x\right)^{\frac{1}{p}} \left[\int_{\mathbb{R}^N} \frac{\left|\nabla u\right|^{\frac{p(t-1)}{p-1}}} {|x|^{\frac{p(t-1)}{p-1}β}} \mathrm{d}x\right]^{\frac{p-1}{p}} \ge C(N,p,t,α,β) \int_{\mathbb{R}^N} \frac{\left|\nabla u\right|^t}{|x|^{tγ}} \mathrm{d}x. \end{equation} Secondly, we establish second order $L^p$-Caffarelli-Kohn-Nirenberg identities, and obtain optimal constants and optimizers of the second order $L^p$-Caffarelli-Kohn-Nirenberg inequalities (i.e., $p=t$ in \eqref{0.1}) in general space. Lastly, under some more general assumptions, we consider the optimal weighted second order Heisenberg Uncertainty Principles, which complements the recent work [``The sharp second order Caffareli-Kohn-Nirenberg inequality and stability estimates for the sharp second order uncertainty principle'', 2022, arXiv:2102.01425].
This paper's main novelty lies in the fact that we research the optimal versions of the second order Caffarelli-Kohn-Nirenberg inequalities \eqref{0.1} in radial space or in general space, and also establish the second order $L^p$-Caffarelli-Kohn-Nirenberg identities.
△ Less
Submitted 10 May, 2024;
originally announced May 2024.
-
Simplex slicing: an asymptotically-sharp lower bound
Authors:
Colin Tang
Abstract:
We show that for the regular n-simplex, the 1-codimensional central slice that's parallel to a facet will achieve the minimum area (up to a 1-o(1) factor) among all 1-codimensional central slices, thus improving the previous best known lower bound (Brzezinski 2013) by a factor of $\frac{2\sqrt{3}}{e} \approx 1.27$. In addition to the standard technique of interpreting geometric problems as problem…
▽ More
We show that for the regular n-simplex, the 1-codimensional central slice that's parallel to a facet will achieve the minimum area (up to a 1-o(1) factor) among all 1-codimensional central slices, thus improving the previous best known lower bound (Brzezinski 2013) by a factor of $\frac{2\sqrt{3}}{e} \approx 1.27$. In addition to the standard technique of interpreting geometric problems as problems about probability distributions and standard Fourier-analytic techniques, we rely on a new idea, mainly \emph{changing the contour of integration} of a meromorphic function.
△ Less
Submitted 21 June, 2024; v1 submitted 19 March, 2024;
originally announced March 2024.
-
Stability of simplex slicing
Authors:
Serhii Myroshnychenko,
Colin Tang,
Kateryna Tatarko,
Tomasz Tkocz
Abstract:
We establish dimension-free stability of Webb's sharp simplex slicing (1996). Incidentally, we investigate Lipschitzness of volume of hyperplane central sections of arbitrary convex bodies.
We establish dimension-free stability of Webb's sharp simplex slicing (1996). Incidentally, we investigate Lipschitzness of volume of hyperplane central sections of arbitrary convex bodies.
△ Less
Submitted 17 April, 2024; v1 submitted 18 March, 2024;
originally announced March 2024.
-
A restricted memory quasi-Newton bundle method for nonsmooth optimization on Riemannian manifolds
Authors:
Chunming Tang,
Shajie Xing,
Wen Huang,
**bao Jian
Abstract:
In this paper, a restricted memory quasi-Newton bundle method for minimizing a locally Lipschitz function over a Riemannian manifold is proposed, which extends the classical one in Euclidean spaces to the manifold setting. The curvature information of the objective function is approximated by applying the Riemannian version of the quasi-Newton updating formulas. The subgradient aggregation techniq…
▽ More
In this paper, a restricted memory quasi-Newton bundle method for minimizing a locally Lipschitz function over a Riemannian manifold is proposed, which extends the classical one in Euclidean spaces to the manifold setting. The curvature information of the objective function is approximated by applying the Riemannian version of the quasi-Newton updating formulas. The subgradient aggregation technique is used to avoid solving the time-consuming quadratic programming subproblem when calculating the candidate descent direction. Moreover, a new Riemannian line search procedure is proposed to generate the stepsizes, and the process is finitely terminated under a new version of the Riemannian semismooth assumption. Global convergence of the proposed method is established: if the serious iteration steps are finite, then the last serious iterate is stationary; otherwise, every accumulation point of the serious iteration sequence is stationary. Finally, some preliminary numerical results show that the proposed method is efficient.
△ Less
Submitted 28 February, 2024;
originally announced February 2024.
-
New Quantum LDPC Codes Based on Euclidean Geometry
Authors:
Ya'nan Feng,
Chuchen Tang,
Chenming Bai
Abstract:
With the development of quantum error correction techniques, quantum low density parity check (QLDPC) codes become a promising area in quantum error correction codes. In this paper, the requirements of QLDPC codes based on points except the origin and lines not passing through the origin of Euclidean geometry are given. QLDPC codes based on all the lines and parallel classes are obtained respectiv…
▽ More
With the development of quantum error correction techniques, quantum low density parity check (QLDPC) codes become a promising area in quantum error correction codes. In this paper, the requirements of QLDPC codes based on points except the origin and lines not passing through the origin of Euclidean geometry are given. QLDPC codes based on all the lines and parallel classes are obtained respectively.
△ Less
Submitted 7 September, 2023;
originally announced October 2023.
-
A Partially Feasible Distributed SQO Method for Two-block General Linearly Constrained Smooth Optimization
Authors:
**bao jian,
Wenrui Chen,
Chunming Tang,
Jianghua Yin
Abstract:
This paper discusses a class of two-block smooth large-scale optimization problems with both linear equality and linear inequality constraints, which have a wide range of applications, such as economic power dispatch, data mining, signal processing, etc.Our goal is to develop a novel partially feasible distributed (PFD) sequential quadratic optimization (SQO) method (PFD-SQO method) for this kind…
▽ More
This paper discusses a class of two-block smooth large-scale optimization problems with both linear equality and linear inequality constraints, which have a wide range of applications, such as economic power dispatch, data mining, signal processing, etc.Our goal is to develop a novel partially feasible distributed (PFD) sequential quadratic optimization (SQO) method (PFD-SQO method) for this kind of problems. The design of the method is based on the ideas of SQO method and augmented Lagrangian Jacobian splitting scheme as well as feasible direction method,which decomposes the quadratic optimization (QO) subproblem into two small-scale QOs that can be solved independently and parallelly. A novel disturbance contraction term that can be suitably adjusted is introduced into the inequality constraints so that the feasible step size along the search direction can be increased to 1. The new iteration points are generated by the Armijo line search and the partially augmented Lagrangian function that only contains equality constraints as the merit function. The iteration points always satisfy all the inequality constraints of the problem. The theoretical properties, such as global convergence, iterative complexity, superlinear and quadratic rates of convergence of the proposed PFD-SQO method are analyzed under appropriate assumptions, respectively. Finally, the numerical effectiveness of the method is tested on a class of academic examples and an economic power dispatch problem, which shows that the proposed method is quite promising.
△ Less
Submitted 26 September, 2023;
originally announced September 2023.
-
Prescribed mass standing waves for Schrödinger-Maxwell equations with combined nonlinearities
Authors:
**-Cai Kang,
Yong-Yong Li,
Chun-Lei Tang
Abstract:
In the present paper, we study the following Schrödinger-Maxwell equation with combined nonlinearities
\begin{align*}
\displaystyle - Δu+λu+ \left(|x|^{-1}\ast |u|^2\right)u
=|u|^{p-2}u +μ|u|^{q-2}u\quad \text{in} \
\mathbb{ R}^3 \quad \quad \text{and}\quad \quad
\int_{\mathbb{R}^3}|u|^2dx=a^2,
\end{align*} where $a>0$, $μ\in \mathbb{R}$, $2<q\leq \frac{10}{3}\leq p<6$ with $q\neq p$,…
▽ More
In the present paper, we study the following Schrödinger-Maxwell equation with combined nonlinearities
\begin{align*}
\displaystyle - Δu+λu+ \left(|x|^{-1}\ast |u|^2\right)u
=|u|^{p-2}u +μ|u|^{q-2}u\quad \text{in} \
\mathbb{ R}^3 \quad \quad \text{and}\quad \quad
\int_{\mathbb{R}^3}|u|^2dx=a^2,
\end{align*} where $a>0$, $μ\in \mathbb{R}$, $2<q\leq \frac{10}{3}\leq p<6$ with $q\neq p$, $\ast$ denotes the convolution and $λ\in \mathbb{R}$ appears as a Lagrange multiplier. Under some mild assumptions on $a$ and $μ$, we prove some existence, nonexistence and multiplicity of normalized solution to the above equation. Moreover, the asymptotic behavior of normalized solutions is verified as $μ\rightarrow 0$ and $q\rightarrow \frac{10}{3}$, and the stability/instability of the corresponding standing waves to the related time-dependent problem is also discussed.
△ Less
Submitted 18 September, 2023;
originally announced September 2023.
-
Proof-of-Prospect-Theory: A Novel Game-based Consensus Mechanism for Blockchain
Authors:
Yuqi Xie,
Changbing Tang,
Feilong Lin,
Guanrong Chen,
Zhao Zhang,
Zhonglong Zheng
Abstract:
Blockchain technology is a breakthrough in changing the ways of business and organization operations, in which the consensus problem is challenging with practical constraints, such as computational power and consensus standard. In this paper, a novel consensus mechanism named Proof-of-Prospect-Theory (PoPT) is designed from the view of game theory, where the game prospect value is considered as an…
▽ More
Blockchain technology is a breakthrough in changing the ways of business and organization operations, in which the consensus problem is challenging with practical constraints, such as computational power and consensus standard. In this paper, a novel consensus mechanism named Proof-of-Prospect-Theory (PoPT) is designed from the view of game theory, where the game prospect value is considered as an important election criterion of the block-recorder. PoPT portrays the popularity of a node in the network as an attribute, which is constituted by the subjective sensibilities of nodes. Furthermore, the performances of the PoPT and the willingness of ordinary nodes to participate in the consensus are analyzed, exploring fairness, decentralization, credibility, and the motivating ability of the consensus mechanism. Finally, numerical simulations with optimization of the PoPT consensus mechanism are demonstrated in the scenario of a smart grid system to illustrate the effectiveness of the PoPT.
△ Less
Submitted 18 September, 2023;
originally announced September 2023.
-
A descent method for nonsmooth multiobjective optimization problems on Riemannian manifolds
Authors:
Chunming Tang,
Hao He,
**bao Jian,
Miantao Chao
Abstract:
In this paper, a descent method for nonsmooth multiobjective optimization problems on complete Riemannian manifolds is proposed. The objective functions are only assumed to be locally Lipschitz continuous instead of convexity used in existing methods. A necessary condition for Pareto optimality in Euclidean space is generalized to the Riemannian setting. At every iteration, an acceptable descent d…
▽ More
In this paper, a descent method for nonsmooth multiobjective optimization problems on complete Riemannian manifolds is proposed. The objective functions are only assumed to be locally Lipschitz continuous instead of convexity used in existing methods. A necessary condition for Pareto optimality in Euclidean space is generalized to the Riemannian setting. At every iteration, an acceptable descent direction is obtained by constructing a convex hull of some Riemannian $\varepsilon$-subgradients. And then a Riemannian Armijo-type line search is executed to produce the next iterate. The convergence result is established in the sense that a point satisfying the necessary condition for Pareto optimality can be generated by the algorithm in a finite number of iterations. Finally, some preliminary numerical results are reported, which show that the proposed method is efficient.
△ Less
Submitted 24 April, 2023;
originally announced April 2023.
-
Adjoints of Matroids
Authors:
Houshan Fu,
Chunming Tang,
Suijie Wang
Abstract:
We show that an adjoint of a loopless matroid is connected if and only if it itself is connected. Our first goal is to study the adjoint of modular matroids. We prove that a modular matroid has only one adjoint (up to isomorphism) which can be given by its opposite lattice, and proceed to present some alternative characterizations of modular matroids associated to adjoints and opposite lattices. T…
▽ More
We show that an adjoint of a loopless matroid is connected if and only if it itself is connected. Our first goal is to study the adjoint of modular matroids. We prove that a modular matroid has only one adjoint (up to isomorphism) which can be given by its opposite lattice, and proceed to present some alternative characterizations of modular matroids associated to adjoints and opposite lattices. The other purpose is to investigate the adjoint sequence $ad^0M,adM,ad^2M,\ldots$ of a connected matroid $M$. We classify such adjoint sequences into three types: finite, cyclic and convergent. For the first two types, the adjoint sequences eventually stabilize at the finite projective geometries except for free matroids. For the last type, the infinite non-repeating adjoint sequences are convergent to the infinite projective geometries.
△ Less
Submitted 17 April, 2023;
originally announced April 2023.
-
On Constructions and Enumeration of Vectorial Hyper-bent Functions in the $\cP\cS_{ap}^{\#}$ Class
Authors:
**gkun Zhou,
Chunming Tang,
Fengrong Zhang
Abstract:
The purpose of this paper is to give explicit constructions of vectorial hyper-bent functions in the $\cP\cS_{ap}^{\#}$ class. It seems that the explicit constructions were so far known only for very special cases. To this end, we present a sufficient and necessary condition of this family of vectorial functions to be hyper-bent. The conditions are expressed in terms of group ring. Using this char…
▽ More
The purpose of this paper is to give explicit constructions of vectorial hyper-bent functions in the $\cP\cS_{ap}^{\#}$ class. It seems that the explicit constructions were so far known only for very special cases. To this end, we present a sufficient and necessary condition of this family of vectorial functions to be hyper-bent. The conditions are expressed in terms of group ring. Using this characterization, explicit constructions of vectorial hyper-bent functions of the $\cP\cS_{ap}^{\#}$ class via balanced functions are proposed. Furthermore, exact number of vectorial hyper-bent functions in the $\cP\cS_{ap}^{\#}$ class is found.
The results improve some previous work. Moreover, we solve a problem of counting vectorial hyper-bent functions left by Muratović-Ribić, Pasalic and Ribić in [{\em IEEE Trans. Inform. Theory}, 60 (2014), pp. 4408-4413].
△ Less
Submitted 2 March, 2023;
originally announced March 2023.
-
Efficiently handling constraints with Metropolis-adjusted Langevin algorithm
Authors:
**yuan Chang,
Cheng Yong Tang,
Yuanzheng Zhu
Abstract:
In this study, we investigate the performance of the Metropolis-adjusted Langevin algorithm in a setting with constraints on the support of the target distribution. We provide a rigorous analysis of the resulting Markov chain, establishing its convergence and deriving an upper bound for its mixing time. Our results demonstrate that the Metropolis-adjusted Langevin algorithm is highly effective in…
▽ More
In this study, we investigate the performance of the Metropolis-adjusted Langevin algorithm in a setting with constraints on the support of the target distribution. We provide a rigorous analysis of the resulting Markov chain, establishing its convergence and deriving an upper bound for its mixing time. Our results demonstrate that the Metropolis-adjusted Langevin algorithm is highly effective in handling this challenging situation: the mixing time bound we obtain is superior to the best known bounds for competing algorithms without an accept-reject step. Our numerical experiments support these theoretical findings, indicating that the Metropolis-adjusted Langevin algorithm shows promising performance when dealing with constraints on the support of the target distribution.
△ Less
Submitted 14 May, 2023; v1 submitted 23 February, 2023;
originally announced February 2023.
-
Hinged-rulers fold in $2-Θ(\frac{1}{2^{n/4}})$
Authors:
Colin Tang
Abstract:
A hinged-ruler is a sequence of line segments in the plane joined end-to-end with hinges, so each hinge joins exactly two segments, the first segment and last segment are adjacent to only one hinge each, and all other segments are adjacent to exactly two hinges. Hopcroft, Joseph, and Whitesides first posed the hinged-ruler-folding problem in their 1985 paper "On the Movement of Robot Arms in 2-Dim…
▽ More
A hinged-ruler is a sequence of line segments in the plane joined end-to-end with hinges, so each hinge joins exactly two segments, the first segment and last segment are adjacent to only one hinge each, and all other segments are adjacent to exactly two hinges. Hopcroft, Joseph, and Whitesides first posed the hinged-ruler-folding problem in their 1985 paper "On the Movement of Robot Arms in 2-Dimensional Bounded Regions": given a hinged-ruler and a real number $K$, can the hinged-ruler be folded so as to fit within a one-dimensional interval of length $K$? We show that if the segment lengths are constrained to be real numbers in the interval $[0,1]$, then we can always fold the hinged-ruler so as to fit within a one-dimensional interval of length $2-Ω(\frac{1}{2^{n/4}})$. On the other hand, we give a construction for a hinged-ruler which cannot be folded into some one-dimensional interval of length $2-O(\frac{1}{2^{n/4}})$.
△ Less
Submitted 22 August, 2023; v1 submitted 20 January, 2023;
originally announced January 2023.
-
Normalized solutions for the nonlinear Schrodinger equation with potential and combined nonlinearities
Authors:
**-Cai Kang,
Chun-Lei Tang
Abstract:
In present paper, we study the following nonlinear Schrödinger equation with combined power nonlinearities
\begin{align*}
- Δu+V(x)u+λu=|u|^{2^*-2}u+μ|u|^{q-2}u \quad \quad \text{in} \ \mathbb{ R}^N, \ N\geq 3
\end{align*}
having prescribed mass
\begin{align*}
\int_{ \mathbb{ R}^N}u^2dx=a^2,
\end{align*} where $μ, a>0$, $q\in(2, 2^*)$, $2^*=\frac{2N}{N-2}$ is the critical Sobolev exp…
▽ More
In present paper, we study the following nonlinear Schrödinger equation with combined power nonlinearities
\begin{align*}
- Δu+V(x)u+λu=|u|^{2^*-2}u+μ|u|^{q-2}u \quad \quad \text{in} \ \mathbb{ R}^N, \ N\geq 3
\end{align*}
having prescribed mass
\begin{align*}
\int_{ \mathbb{ R}^N}u^2dx=a^2,
\end{align*} where $μ, a>0$, $q\in(2, 2^*)$, $2^*=\frac{2N}{N-2}$ is the critical Sobolev exponent, $V$ is an external potential vanishing at infinity, and the parameter $λ\in \mathbb{R}$ appears as a Lagrange multiplier. Under some mild assumptions on $V$, for the $L^2$-subcritical perturbation $q\in(2, 2+\frac{4}{N})$, we prove that there exists $a_0>0$ such that the normalized solution with negative energy to the above problem with $μ>0$ can be obtained for $a\in (0, a_0)$; for the $L^2$-critical perturbation $q=2+\frac{4}{N}$, by limiting the range of $μ$, the positive ground state normalized solution to the above problem for any $a>0$ is also found with the aid of the Pohožaev constraint; moreover, for the $L^2$-supercritical perturbation $q\in( 2+\frac{4}{N}, 2^*)$, we get a positive ground state normalized solution for the above problem with $a>0$ and $μ>0$ by using the Pohožaev constraint.
At the same time, the exponential decay property of the positive normalized solution is established, which is important for the instability analysis of the standing waves. Furthermore, we give a description of the ground state set and obtain the strong instability of the standing waves for $q\in[2+\frac{4}{N}, 2^*)$. This paper can be regarded as a generalization of Soave [J. Funct. Anal. (2020)] in a sense.
△ Less
Submitted 30 November, 2022; v1 submitted 28 November, 2022;
originally announced November 2022.
-
Existence and asymptotic behavior of least energy sign-changing solutions for Schrodinger-Poisson systems with doubly critical exponents
Authors:
Xiao-** Chen,
Chun-Lei Tang
Abstract:
In this paper, we are concerned with the following Schrödinger-Poisson system with critical nonlinearity and critical nonlocal term due to the Hardy-Littlewood-Sobolev inequality \begin{equation}\begin{cases}
-Δu+u+λφ|u|^3u =|u|^4u+ |u|^{q-2}u,\ \ &\ x \in
\mathbb{R}^{3},\\[2mm]
-Δφ=|u|^5, \ \ &\ x \in \mathbb{R}^{3}, \end{cases} \end{equation} where $λ\in \mathbb{R}$ is a parameter and…
▽ More
In this paper, we are concerned with the following Schrödinger-Poisson system with critical nonlinearity and critical nonlocal term due to the Hardy-Littlewood-Sobolev inequality \begin{equation}\begin{cases}
-Δu+u+λφ|u|^3u =|u|^4u+ |u|^{q-2}u,\ \ &\ x \in
\mathbb{R}^{3},\\[2mm]
-Δφ=|u|^5, \ \ &\ x \in \mathbb{R}^{3}, \end{cases} \end{equation} where $λ\in \mathbb{R}$ is a parameter and $q\in(2,6)$. If $λ\ge (\frac{q+2}{8})^2$ and $q\in(2,6)$, the above system has no nontrivial solution. If $λ\in (λ^*,0)$ for some $λ^*<0$, we obtain a least energy radial sign-changing solution $u_λ$ to the above system. Furthermore, we consider $λ$ as a parameter and analyze the asymptotic behavior of $u_λ$ as $λ\to 0^-$.
△ Less
Submitted 28 November, 2022;
originally announced November 2022.
-
Nonparametric Likelihood Ratio Test for Univariate Shape-constrained Densities
Authors:
Kwun Chuen Gary Chan,
Hok Kan Ling,
Chuan-Fa Tang,
Sheung Chi Phillip Yam
Abstract:
We provide a comprehensive study of a nonparametric likelihood ratio test on whether a random sample follows a distribution in a prespecified class of shape-constrained densities. While the conventional definition of likelihood ratio is not well-defined for general nonparametric problems, we consider a working sub-class of alternative densities that leads to test statistics with desirable properti…
▽ More
We provide a comprehensive study of a nonparametric likelihood ratio test on whether a random sample follows a distribution in a prespecified class of shape-constrained densities. While the conventional definition of likelihood ratio is not well-defined for general nonparametric problems, we consider a working sub-class of alternative densities that leads to test statistics with desirable properties. Under the null, a scaled and centered version of the test statistic is asymptotic normal and distribution-free, which comes from the fact that the asymptotic dominant term under the null depends only on a function of spacings of transformed outcomes that are uniform distributed. The nonparametric maximum likelihood estimator (NPMLE) under the hypothesis class appears only in an average log-density ratio which often converges to zero at a faster rate than the asymptotic normal term under the null, while diverges in general test so that the test is consistent. The main technicality is to show these results for log-density ratio which requires a case-by-case analysis, including new results for k-monotone densities with unbounded support and completely monotone densities that are of independent interest. A bootstrap method by simulating from the NPMLE is shown to have the same limiting distribution as the test statistic.
△ Less
Submitted 23 November, 2022;
originally announced November 2022.
-
Harmonic Tutte polynomials of matroids II
Authors:
Thomas Britz,
Himadri Shekhar Chakraborty,
Reina Ishikawa,
Tsuyoshi Miezaki,
Hopein Christofen Tang
Abstract:
In this work, we introduce the harmonic generalization of the $m$-tuple weight enumerators of codes over finite Frobenius rings. A harmonic version of the MacWilliams-type identity for $m$-tuple weight enumerators of codes over finite Frobenius ring is also given. Moreover, we define the demi-matroid analogue of well-known polynomials from matroid theory, namely Tutte polynomials and coboundary po…
▽ More
In this work, we introduce the harmonic generalization of the $m$-tuple weight enumerators of codes over finite Frobenius rings. A harmonic version of the MacWilliams-type identity for $m$-tuple weight enumerators of codes over finite Frobenius ring is also given. Moreover, we define the demi-matroid analogue of well-known polynomials from matroid theory, namely Tutte polynomials and coboundary polynomials, and associate them with a harmonic function. We also prove the Greene-type identity relating these polynomials to the harmonic $m$-tuple weight enumerators of codes over finite Frobenius rings. As an application of this Greene-type identity, we provide a simple combinatorial proof of the MacWilliams-type identity for harmonic $m$-tuple weight enumerators over finite Frobenius rings. Finally, we provide the structure of the relative invariant spaces containing the harmonic $m$-tuple weight enumerators of self-dual codes over finite fields.
△ Less
Submitted 18 November, 2023; v1 submitted 29 October, 2022;
originally announced October 2022.
-
A general family of Plotkin-optimal two-weight codes over $\mathbb{Z}_4$
Authors:
Hopein Christofen Tang,
Djoko Suprijanto
Abstract:
We obtain all possible parameters of Plotkin-optimal two-Lee weight projective codes over $\mathbb{Z}_4,$ together with their weight distributions. We show the existence of codes with these parameters as well as their weight distributions by constructing an infinite family of two-weight codes. Previously known codes constructed by Shi et al. (\emph{Des Codes Cryptogr.} {\bf 88}(3):1-13, 2020) can…
▽ More
We obtain all possible parameters of Plotkin-optimal two-Lee weight projective codes over $\mathbb{Z}_4,$ together with their weight distributions. We show the existence of codes with these parameters as well as their weight distributions by constructing an infinite family of two-weight codes. Previously known codes constructed by Shi et al. (\emph{Des Codes Cryptogr.} {\bf 88}(3):1-13, 2020) can be derived as a special case of our results. We also prove that the Gray image of any Plotkin-optimal two-Lee weight projective codes over $\mathbb{Z}_4$ has the same parameters and weight distribution as some two-weight binary projective codes of type SU1 in the sense of Calderbank and Kantor (\emph{Bull. Lond. Math. Soc.} {\bf 18}:97-122, 1986).
△ Less
Submitted 24 January, 2024; v1 submitted 30 July, 2022;
originally announced August 2022.
-
Bounds on the closeness centrality of a graph
Authors:
Thomas Britz,
Xin Hu,
Abdellah Islam,
Hopein Christofen Tang
Abstract:
We present new values and bounds on the (normalised) closeness centrality $\bar{\mathsf{C}}_C$ of connected graphs and on its product $\bar{l}\bar{\mathsf{C}}_C$ with the mean distance $\bar{l}$ of these graphs. Our main result presents the fundamental bounds $1\leq \bar{l}\bar{\mathsf{C}}_C<2$. The lower bound is tight and the upper bound is asymptotically tight. Combining the lower bound with kn…
▽ More
We present new values and bounds on the (normalised) closeness centrality $\bar{\mathsf{C}}_C$ of connected graphs and on its product $\bar{l}\bar{\mathsf{C}}_C$ with the mean distance $\bar{l}$ of these graphs. Our main result presents the fundamental bounds $1\leq \bar{l}\bar{\mathsf{C}}_C<2$. The lower bound is tight and the upper bound is asymptotically tight. Combining the lower bound with known upper bounds on the mean distance, we find ten new lower bounds for the closeness centrality of graphs. We also present explicit expressions for $\bar{\mathsf{C}}_C$ and $\bar{l}\bar{\mathsf{C}}_C$ for specific families of graphs. Elegantly and perhaps surprisingly, the asymptotic values $n\bar{\mathsf{C}}_C\big(P_n\big)$ and of $n\bar{\mathsf{C}}_C\big(L_n\big)$ both equal $π$, and the asymptotic limits of $\bar{l}\bar{\mathsf{C}}_C$ for these families of graphs are both equal to $π/3$. We conjecture that the set of values $\bar{l}\bar{\mathsf{C}}_C$ for all connected graphs is dense in the interval $[1,2)$.
△ Less
Submitted 17 July, 2023; v1 submitted 24 April, 2022;
originally announced April 2022.
-
Multijoints and Factorisation
Authors:
Michael Chi Yung Tang
Abstract:
We solve the dual multijoint problem and prove the existence of so-called "factorisations" for arbitrary fields and multijoints of $k_j$-planes. More generally, we deduce a discrete analogue of a theorem due in essence to Bourgain and Guth. Our result is a universal statement which describes a property of the discrete wedge product without any explicit reference to multijoints and is stated as fol…
▽ More
We solve the dual multijoint problem and prove the existence of so-called "factorisations" for arbitrary fields and multijoints of $k_j$-planes. More generally, we deduce a discrete analogue of a theorem due in essence to Bourgain and Guth. Our result is a universal statement which describes a property of the discrete wedge product without any explicit reference to multijoints and is stated as follows: Suppose that $k_1 + \ldots + k_d = n$. There is a constant $C=C(n)$ so that for any field $\mathbb{F}$ and for any finitely supported function $S : \mathbb{F}^n \rightarrow \mathbb{R}_{\geq 0}$, there are factorising functions $s_{k_j} : \mathbb{F}^n\times \mathrm{Gr}(k_j, \mathbb{F}^n)\rightarrow \mathbb{R}_{\geq 0}$ such that $$(V_1 \wedge\cdots\wedge V_d)S(p)^d \leq C\prod_{j=1}^d s_{k_j}(p, V_j),$$ for every $p\in \mathbb{F}^n$ and every tuple of planes $V_j\in \mathrm{Gr}(k_j, \mathbb{F}^n)$, and $$\sum_{p\in π_j} s(p, e(π_j)) =||S||_d$$ for every $k_j$-plane $π_j\subset \mathbb{F}^n$, where $e(π_j)\in \mathrm{Gr}(k_j,\mathbb{F}^n)$ denotes the translate of $π_j$ that contains the origin and $\wedge$ denotes the discrete wedge product.
△ Less
Submitted 8 April, 2022; v1 submitted 4 March, 2022;
originally announced March 2022.
-
Non-Transversal Multilinear Duality and Joints
Authors:
Anthony Carbery,
Michael Chi Yung Tang
Abstract:
We develop a framework for a duality theory for general multilinear operators which extends that for transversal multilinear operators which has been established in arXiv:1809.02449. We apply it to the setting of joints and multijoints, and obtain a "factorisation" theorem which provides an analogue in the discrete setting of results of Bourgain and Guth (arXiv:0811.2251 and arXiv:1012.3760) from…
▽ More
We develop a framework for a duality theory for general multilinear operators which extends that for transversal multilinear operators which has been established in arXiv:1809.02449. We apply it to the setting of joints and multijoints, and obtain a "factorisation" theorem which provides an analogue in the discrete setting of results of Bourgain and Guth (arXiv:0811.2251 and arXiv:1012.3760) from the Euclidean setting.
△ Less
Submitted 8 April, 2022; v1 submitted 4 March, 2022;
originally announced March 2022.
-
Note on the Turán number of the $3$-linear hypergraph $C_{13}$
Authors:
Chaoliang Tang,
Hehui Wu,
Shengtong Zhang,
Zeyu Zheng
Abstract:
Let the crown $C_{13}$ be the linear $3$-graph on $9$ vertices $\{a,b,c,d,e,f,g,h,i\}$ with edges $$E = \{\{a,b,c\}, \{a, d,e\}, \{b, f, g\}, \{c, h,i\}\}.$$ Proving a conjecture of Gyárfás et. al., we show that for any crown-free linear $3$-graph $G$ on $n$ vertices, its number of edges satisfy $$\lvert E(G) \rvert \leq \frac{3(n - s)}{2}$$ where $s$ is the number of vertices in $G$ with degree a…
▽ More
Let the crown $C_{13}$ be the linear $3$-graph on $9$ vertices $\{a,b,c,d,e,f,g,h,i\}$ with edges $$E = \{\{a,b,c\}, \{a, d,e\}, \{b, f, g\}, \{c, h,i\}\}.$$ Proving a conjecture of Gyárfás et. al., we show that for any crown-free linear $3$-graph $G$ on $n$ vertices, its number of edges satisfy $$\lvert E(G) \rvert \leq \frac{3(n - s)}{2}$$ where $s$ is the number of vertices in $G$ with degree at least $6$. This result, combined with previous work, essentially completes the determination of linear Turán number for linear $3$-graphs with at most $4$ edges.
△ Less
Submitted 5 October, 2021; v1 submitted 22 September, 2021;
originally announced September 2021.
-
Existence and multiplicity of sign-changing solutions for quasilinear Schrödinger equations with sub-cubic nonlinearity
Authors:
Hui Zhang,
Zhisu liu,
Chun-Lei Tang,
Jianjun Zhang
Abstract:
In this paper, we consider the quasilinear Schrödinger equation \begin{equation*} -Δu+V(x)u-uΔ(u^2)=g(u),\ \ x\in \mathbb{R}^{3}, \end{equation*} where $V$ and $g$ are continuous functions. Without the coercive condition on $V$ or the monotonicity condition on $g$, we show that the problem above has a least energy sign-changing solution and infinitely many sign-changing solutions. Our results espe…
▽ More
In this paper, we consider the quasilinear Schrödinger equation \begin{equation*} -Δu+V(x)u-uΔ(u^2)=g(u),\ \ x\in \mathbb{R}^{3}, \end{equation*} where $V$ and $g$ are continuous functions. Without the coercive condition on $V$ or the monotonicity condition on $g$, we show that the problem above has a least energy sign-changing solution and infinitely many sign-changing solutions. Our results especially solve the problem above in the case where $g(u)=|u|^{p-2}u$ ($2<p<4$) and complete some recent related works on sign-changing solutions, in the sense that, in the literature only the case $g(u)=|u|^{p-2}u$ ($p\geq4$) was considered. The main results in the present paper are obtained by a new perturbation approach and the method of invariant sets of descending flow. In addition, in some cases where the functional merely satisfies the Cerami condition, a deformation lemma under the Cerami condition is developed.
△ Less
Submitted 17 September, 2021;
originally announced September 2021.
-
Pre-processing with Orthogonal Decompositions for High-dimensional Explanatory Variables
Authors:
Xu Han,
Ethan X Fang,
Cheng Yong Tang
Abstract:
Strong correlations between explanatory variables are problematic for high-dimensional regularized regression methods. Due to the violation of the Irrepresentable Condition, the popular LASSO method may suffer from false inclusions of inactive variables. In this paper, we propose pre-processing with orthogonal decompositions (PROD) for the explanatory variables in high-dimensional regressions. The…
▽ More
Strong correlations between explanatory variables are problematic for high-dimensional regularized regression methods. Due to the violation of the Irrepresentable Condition, the popular LASSO method may suffer from false inclusions of inactive variables. In this paper, we propose pre-processing with orthogonal decompositions (PROD) for the explanatory variables in high-dimensional regressions. The PROD procedure is constructed based upon a generic orthogonal decomposition of the design matrix. We demonstrate by two concrete cases that the PROD approach can be effectively constructed for improving the performance of high-dimensional penalized regression. Our theoretical analysis reveals their properties and benefits for high-dimensional penalized linear regression with LASSO. Extensive numerical studies with simulations and data analysis show the promising performance of the PROD.
△ Less
Submitted 16 June, 2021;
originally announced June 2021.
-
The subfield codes and subfield subcodes of a family of MDS codes
Authors:
Chunming Tang,
Qi Wang,
Cunsheng Ding
Abstract:
Maximum distance separable (MDS) codes are very important in both theory and practice. There is a classical construction of a family of $[2^m+1, 2u-1, 2^m-2u+3]$ MDS codes for $1 \leq u \leq 2^{m-1}$, which are cyclic, reversible and BCH codes over $\mathrm{GF}(2^m)$. The objective of this paper is to study the quaternary subfield subcodes and quaternary subfield codes of a subfamily of the MDS co…
▽ More
Maximum distance separable (MDS) codes are very important in both theory and practice. There is a classical construction of a family of $[2^m+1, 2u-1, 2^m-2u+3]$ MDS codes for $1 \leq u \leq 2^{m-1}$, which are cyclic, reversible and BCH codes over $\mathrm{GF}(2^m)$. The objective of this paper is to study the quaternary subfield subcodes and quaternary subfield codes of a subfamily of the MDS codes for even $m$. A family of quaternary cyclic codes is obtained. These quaternary codes are distance-optimal in some cases and very good in general. Furthermore, infinite families of $3$-designs from these quaternary codes are presented.
△ Less
Submitted 14 June, 2021;
originally announced June 2021.
-
Permutation-generated maps between Dyck paths
Authors:
Kevin Limanta,
Hopein Christofen Tang,
Yozef Tjandra
Abstract:
In 2003, Deutsch and Elizalde defined a family of bijective maps between the set of Dyck paths to itself which is induced by some particular permutations. In this paper, we extend the construction of the maps by allowing the permutation to be arbitrary. We characterise the permutations which generate the same map and find all permutations generating a bijection among Dyck paths. Consequently, we g…
▽ More
In 2003, Deutsch and Elizalde defined a family of bijective maps between the set of Dyck paths to itself which is induced by some particular permutations. In this paper, we extend the construction of the maps by allowing the permutation to be arbitrary. We characterise the permutations which generate the same map and find all permutations generating a bijection among Dyck paths. Consequently, we give a new combinatorial interpretation of the quantity $(2n-1)!!$ as well as some new statistics of Dyck paths which are equidistributed to some known height statistics via our generalised maps.
△ Less
Submitted 29 December, 2022; v1 submitted 30 May, 2021;
originally announced May 2021.
-
Contingent Penalty and Contingent Renewal Supply Contracts in High-Tech Industry
Authors:
Mirjam S Meijer,
Willem van Jaarsveld,
Ton de Kok,
Christopher S Tang
Abstract:
Unlike consumer goods industry, a high-tech manufacturer (OEM) often amortizes new product development costs over multiple generations, where demand for each generation is based on advance orders and additional uncertain demand. Also, due to economic reasons and regulations, high-tech OEMs usually source from a single supplier. Relative to the high retail price, the wholesale price for a supplier…
▽ More
Unlike consumer goods industry, a high-tech manufacturer (OEM) often amortizes new product development costs over multiple generations, where demand for each generation is based on advance orders and additional uncertain demand. Also, due to economic reasons and regulations, high-tech OEMs usually source from a single supplier. Relative to the high retail price, the wholesale price for a supplier to produce high-tech components is low. Consequently, incentives are misaligned: the OEM faces relatively high under-stock costs and the supplier faces high over-stock costs. In this paper, we examine supply contracts that are intended to align the incentives between a high-tech OEM and a supplier so that the supplier will invest adequate and yet non-verifiable capacity to meet the OEM's uncertain demand. When focusing on a single generation, the manufacturer can coordinate a decentralized supply chain and extract all surplus by augmenting a traditional wholesale price contract with a "contingent penalty" should the supplier fail to fulfill the OEM's demand. When the resulting penalty is too high to be enforceable, we consider a new class of "contingent renewal" wholesale price contracts with a stipulation: the OEM will renew the contract with the incumbent supplier for the next generation only when the supplier can fulfill the demand for the current generation. By using non-renewal as an implicit penalty, we show that the contingent renewal contract can coordinate the supply chain. While the OEM can capture the bulk of the supply chain profit, this innovative contract cannot enable the OEM to extract the entire surplus.
△ Less
Submitted 19 May, 2021;
originally announced May 2021.
-
Carathéodory balls and proper holomorphic maps on multiply-connected planar domains
Authors:
Tuen Wai Ng,
Chiu Chak Tang,
Jonathan Tsai
Abstract:
In this paper, we will establish the inequivalence of closed balls and the closure of open balls under the Carathéodory metric in some planar domains of finite connectivity greater than $2$, and hence resolve a problem posed by Jarnicki, Pflug and Vigué in 1992. We also establish a corresponding result for some pseudoconvex domains in $\mathbb{C}^n$ for $n \ge 2$.
This result will follow from an…
▽ More
In this paper, we will establish the inequivalence of closed balls and the closure of open balls under the Carathéodory metric in some planar domains of finite connectivity greater than $2$, and hence resolve a problem posed by Jarnicki, Pflug and Vigué in 1992. We also establish a corresponding result for some pseudoconvex domains in $\mathbb{C}^n$ for $n \ge 2$.
This result will follow from an explicit characterization (up to biholomorphisms) of proper holomorphic maps from a non-degenerate finitely-connected planar domain, $Ω$, onto the standard unit disk $\mathbb{D}$ which answers a question posed by Schmieder in 2005. Similar to Bell and Kaleem's characterization of proper holomorphic maps in terms of Grunsky maps (2008), our characterization of proper holomorphic maps from $Ω$ onto $\mathbb{D}$ is an analogous result to Fatou's famous result that proper holomorphic maps of the unit disk onto itself are finite Blashcke products.
Our approach uses a harmonic measure condition of Wang and Yin (2017) on the existence of a proper holomorphic map with prescribed zeros. We will see that certain functions $η(\cdot,p)$ play an analogous role to the Möbius transformations that fix $\mathbb{D}$ in finite Blaschke products. These functions $η(\cdot,p)$ map $Ω$ conformally onto the unit disk with circular arcs (centered at 0) removed and map $p$ to $0$ and can be given in terms of the Schottky-Klein prime function. We also extend a result of Grunsky (1941) and hence introduce a parameter space for proper holomorphic maps from $Ω$ onto $\mathbb{D}$.
△ Less
Submitted 7 May, 2021;
originally announced May 2021.
-
Fridman Function, Injectivity Radius Function and Squeezing Function
Authors:
Tuen-Wai Ng,
Chiu Chak Tang,
Jonathan Tsai
Abstract:
Very recently, the Fridman function of a complex manifold $X$ has been identified as a dual of the squeezing function of $X$. In this paper, we prove that the Fridman function for certain hyperbolic complex manifold $X$ is bounded above by the injectivity radius function of $X$. This result also suggests us to use the Fridman function to extend the definition of uniform thickness to higher-dimensi…
▽ More
Very recently, the Fridman function of a complex manifold $X$ has been identified as a dual of the squeezing function of $X$. In this paper, we prove that the Fridman function for certain hyperbolic complex manifold $X$ is bounded above by the injectivity radius function of $X$. This result also suggests us to use the Fridman function to extend the definition of uniform thickness to higher-dimensional hyperbolic complex manifolds. We also establish an expression for the Fridman function (with respect to the Kobayashi metric) when $X = \mathbb{D} \diagup Γ$ and $Γ$ is a torsion-free discrete subgroup of isometries on the standard open unit disk $\mathbb{D}$. Hence, explicit formulae of the Fridman functions for the annulus $A_r$ and the punctured disk $\mathbb{D}^*$ are derived. These are the first explicit non-constant Fridman functions. Finally, we explore the boundary behaviour of the Fridman functions (with respect to the Kobayashi metric) and the squeezing functions for regular type hyperbolic Riemann surfaces and planar domains respectively.
△ Less
Submitted 17 February, 2021; v1 submitted 24 December, 2020;
originally announced December 2020.
-
The squeezing function on doubly-connected domains via the Loewner differential equation
Authors:
Tuen Wai Ng,
Chiu Chak Tang,
Jonathan Tsai
Abstract:
For any bounded domains $Ω$ in $\mathbb{C}^{n}$, Deng, Guan and Zhang introduced the squeezing function $S_Ω(z)$ which is a biholomorphic invariant of bounded domains. We show that for $n=1$, the squeezing function on an annulus $A_r = \lbrace z \in \mathbb{C} : r <|z| <1 \rbrace$ is given by $S_{A_r}(z)= \max \left\lbrace |z| ,\frac{r}{|z|} \right\rbrace$ for all $0<r<1$. This disproves the conje…
▽ More
For any bounded domains $Ω$ in $\mathbb{C}^{n}$, Deng, Guan and Zhang introduced the squeezing function $S_Ω(z)$ which is a biholomorphic invariant of bounded domains. We show that for $n=1$, the squeezing function on an annulus $A_r = \lbrace z \in \mathbb{C} : r <|z| <1 \rbrace$ is given by $S_{A_r}(z)= \max \left\lbrace |z| ,\frac{r}{|z|} \right\rbrace$ for all $0<r<1$. This disproves the conjectured formula for the squeezing function proposed by Deng, Guan and Zhang and establishes (up to biholomorphisms) the squeezing function for all doubly-connected domains in $\mathbb{C}$ other than the punctured plane. It provides the first non-trivial formula for the squeezing function for a wide class of plane domains and answers a question of Wold. Our main tools used to prove this result are the Schottky-Klein prime function (following the work of Crowdy) and a version of the Loewner differential equation on annuli due to Komatu. We also show that these results can be used to obtain lower bounds on the squeezing function for certain product domains in $\mathbb{C}^{n}$.
△ Less
Submitted 20 July, 2020;
originally announced July 2020.
-
An infinite family of linear codes supporting 4-designs
Authors:
Chunming Tang,
Cunsheng Ding
Abstract:
The first linear code supporting a $4$-design was the $[11, 6, 5]$ ternary Golay code discovered in 1949 by Golay. In the past 71 years, sporadic linear codes holding $4$-designs or $5$-designs were discovered and many infinite families of linear codes supporting $3$-designs were constructed. However, the question as to whether there is an infinite family of linear codes holding an infinite family…
▽ More
The first linear code supporting a $4$-design was the $[11, 6, 5]$ ternary Golay code discovered in 1949 by Golay. In the past 71 years, sporadic linear codes holding $4$-designs or $5$-designs were discovered and many infinite families of linear codes supporting $3$-designs were constructed. However, the question as to whether there is an infinite family of linear codes holding an infinite family of $t$-designs for $t\geq 4$ remains open for 71 years. This paper settles this long-standing problem by presenting an infinite family of BCH codes of length $2^{2m+1}+1$ over $\mathrm{GF}(2^{2m+1})$ holding an infinite family of $4$-$(2^{2m+1}+1, 6, 2^{2m}-4)$ designs. Moreover, an infinite family of linear codes holding the spherical design $S(3, 5, 4^m+1)$ is presented.
△ Less
Submitted 1 January, 2020;
originally announced January 2020.
-
Full Characterization of Minimal Linear Codes as Cutting Blocking Sets
Authors:
Chunming Tang,
Yan Qiu,
Qunying Liao,
Zhengchun Zhou
Abstract:
In this paper, we first study in detail the relationship between minimal linear codes and cutting blocking sets, which were recently introduced by Bonini and Borello, and then completely characterize minimal linear codes as cutting blocking sets. As a direct result, minimal projective codes of dimension $3$ and $t$-fold blocking sets with $t\ge 2$ in projective planes are identical objects. Some b…
▽ More
In this paper, we first study in detail the relationship between minimal linear codes and cutting blocking sets, which were recently introduced by Bonini and Borello, and then completely characterize minimal linear codes as cutting blocking sets. As a direct result, minimal projective codes of dimension $3$ and $t$-fold blocking sets with $t\ge 2$ in projective planes are identical objects. Some bounds on the parameters of minimal codes are derived from this characterization. This confirms a recent conjecture by Alfarano, Borello and Neri in [a geometric characterization of minimal codes and their asymptotic performance, arXiv:1911.11738, 2019] about a lower bound of the minimum distance of a minimal code. Using this new link between minimal codes and blocking sets, we also present new general primary and secondary constructions of minimal linear codes. As a result, infinite families of minimal linear codes not satisfying the Aschikhmin-Barg's condition are obtained. In addition to this, the weight distributions of two subfamilies of the proposed minimal linear codes are established. Open problems are also presented.
△ Less
Submitted 25 April, 2020; v1 submitted 22 November, 2019;
originally announced November 2019.
-
A Center-Point Algorithm for Unit Commitment with Carbon Emission Trading
Authors:
Linfeng Yang,
Wei Li,
Guo Chen,
Beihua Fang,
Chunming Tang,
Zhaoyang Dong
Abstract:
This paper proposes a global optimization method for it ensures finding good solutions while solving the unit commitment (UC) problem with carbon emission trading (CET). This method con-sists of two parts. In the first part, a sequence of linear inte-ger-relaxed subproblems are first solved to rapidly generate a tight linear relaxation of the original mixed integer nonlinear pro-gramming problem (…
▽ More
This paper proposes a global optimization method for it ensures finding good solutions while solving the unit commitment (UC) problem with carbon emission trading (CET). This method con-sists of two parts. In the first part, a sequence of linear inte-ger-relaxed subproblems are first solved to rapidly generate a tight linear relaxation of the original mixed integer nonlinear pro-gramming problem (MINLP) model. In the second part, the algo-rithm introduces the idea of center-cut so that it can quickly find good solutions. The approach tested on 10 test instances with units ranging from 35 to 1560 over a scheduling period of 24h, and compared with state-of-the-art solver CPLEX. The results show that the proposed algorithm can find better solutions than CPLEX in a short time. And it is more suitable to solve large scale UC problem than CPLEX.
△ Less
Submitted 26 August, 2019; v1 submitted 30 July, 2019;
originally announced July 2019.
-
Infinite families of $2$-designs from two classes of binary cyclic codes with three nonzeros
Authors:
Xiaoni Du,
Rong Wang,
Chunming Tang,
Qi Wang
Abstract:
Combinatorial $t$-designs have been an interesting topic in combinatorics for decades. It is a basic fact that the codewords of a fixed weight in a code may hold a $t$-design. Till now only a small amount of work on constructing $t$-designs from codes has been done. In this paper, we determine the weight distributions of two classes of cyclic codes: one related to the triple-error correcting binar…
▽ More
Combinatorial $t$-designs have been an interesting topic in combinatorics for decades. It is a basic fact that the codewords of a fixed weight in a code may hold a $t$-design. Till now only a small amount of work on constructing $t$-designs from codes has been done. In this paper, we determine the weight distributions of two classes of cyclic codes: one related to the triple-error correcting binary BCH codes, and the other related to the cyclic codes with parameters satisfying the generalized Kasami case, respectively. We then obtain infinite families of $2$-designs from these codes by proving that they are both affine-invariant codes, and explicitly determine their parameters. In particular, the codes derived from the dual of binary BCH codes hold five $3$-designs when $m=4$.
△ Less
Submitted 19 March, 2019;
originally announced March 2019.
-
Infinite families of $2$-designs from two classes of linear codes
Authors:
Xiaoni Du,
Rong Wang,
Chunming Tang,
Qi Wang
Abstract:
The interplay between coding theory and $t$-designs has attracted a lot of attention for both directions. It is well known that the supports of all codewords with a fixed weight in a code may hold a $t$-design. In this paper, by determining the weight distributions of two classes of linear codes, we derive infinite families of $2$-designs from the supports of codewords with a fixed weight in these…
▽ More
The interplay between coding theory and $t$-designs has attracted a lot of attention for both directions. It is well known that the supports of all codewords with a fixed weight in a code may hold a $t$-design. In this paper, by determining the weight distributions of two classes of linear codes, we derive infinite families of $2$-designs from the supports of codewords with a fixed weight in these codes, and explicitly obtain their parameters.
△ Less
Submitted 18 March, 2019;
originally announced March 2019.
-
Combinatorial $t$-designs from special polynomials
Authors:
Cunsheng Ding,
Chunming Tang
Abstract:
Combinatorial $t$-designs have nice applications in coding theory, finite geometries and several engineering areas. There are two major methods of constructing $t$-designs. One of them is via group actions of certain permutation groups which are $t$-transitive or $t$-homogeneous on some point set. The other is a coding-theoretical one. The objectives of this paper are to introduce two construction…
▽ More
Combinatorial $t$-designs have nice applications in coding theory, finite geometries and several engineering areas. There are two major methods of constructing $t$-designs. One of them is via group actions of certain permutation groups which are $t$-transitive or $t$-homogeneous on some point set. The other is a coding-theoretical one. The objectives of this paper are to introduce two constructions of $t$-designs with special polynomials over finite fields GF$(q)$, and obtain $2$-designs and $3$-designs with interesting parameters. A type of d-polynomials is defined and used to construct $2$-designs. Under the framework of the first construction, it is shown that every o-polynomial over GF$(2^m)$ gives a $2$-design, and every o-monomial over GF$(2^m)$ yields a $3$-design. Under the second construction, every $o$-polynomial gives a $3$-design. Some open problems and conjectures are also presented in this paper.
△ Less
Submitted 18 March, 2019;
originally announced March 2019.
-
Steiner systems $S(2, 4, \frac{3^m-1}{2})$ and $2$-designs from ternary linear codes of length $\frac{3^m-1}{2}$
Authors:
Chunming Tang,
Cunsheng Ding,
Maosheng Xiong
Abstract:
Coding theory and $t$-designs have close connections and interesting interplay. In this paper, we first introduce a class of ternary linear codes and study their parameters. We then focus on their three-weight subcodes with a special weight distribution. We determine the weight distributions of some shortened codes and punctured codes of these three-weight subcodes. These shortened and punctured c…
▽ More
Coding theory and $t$-designs have close connections and interesting interplay. In this paper, we first introduce a class of ternary linear codes and study their parameters. We then focus on their three-weight subcodes with a special weight distribution. We determine the weight distributions of some shortened codes and punctured codes of these three-weight subcodes. These shortened and punctured codes contain some codes that have the same parameters as the best ternary linear codes known in the database maintained by Markus Grassl at http://www.codetables.de/. These three-weight subcodes with a special weight distribution do not satisfy the conditions of the Assmus-Mattson theorem and do not admit $2$-transitive or $2$-homogeneous automorphism groups in general. By employing the theory of projective geometries and projective generalized Reed-Muller codes, we prove that they still hold $2$-designs. We also determine the parameters of these $2$-designs. This paper mainly confirms some recent conjectures of Ding and Li regarding Steiner systems and $2$-designs from a special type of ternary projective codes.
△ Less
Submitted 6 February, 2019; v1 submitted 26 January, 2019;
originally announced January 2019.
-
Analysis and Control of a Continuous-Time Bi-Virus Model
Authors:
Ji Liu,
Philip E. Pare,
Angelia Nedich,
Choon Yik Tang,
Carolyn L. Beck,
Tamer Basar
Abstract:
This paper studies a distributed continuous-time bi-virus model in which two competing viruses spread over a network consisting of multiple groups of individuals. Limiting behaviors of the network are characterized by analyzing the equilibria of the system and their stability. Specifically, when the two viruses spread over possibly different directed infection graphs, the system may have (1) a uni…
▽ More
This paper studies a distributed continuous-time bi-virus model in which two competing viruses spread over a network consisting of multiple groups of individuals. Limiting behaviors of the network are characterized by analyzing the equilibria of the system and their stability. Specifically, when the two viruses spread over possibly different directed infection graphs, the system may have (1) a unique equilibrium, the healthy state, which is globally stable, implying that both viruses will eventually be eradicated, (2) two equilibria including the healthy state and a dominant virus state, which is almost globally stable, implying that one virus will pervade the entire network causing a single-virus epidemic while the other virus will be eradicated, or (3) at least three equilibria including the healthy state and two dominant virus states, depending on certain conditions on the healing and infection rates. When the two viruses spread over the same directed infection graph, the system may have zero or infinitely many coexisting epidemic equilibria, which represents the pervasion of the two viruses. Sensitivity properties of some nontrivial equilibria are investigated in the context of a decentralized control technique, and an impossibility result is given for a certain type of distributed feedback controller.
△ Less
Submitted 1 January, 2019;
originally announced January 2019.
-
Optimal covariance matrix estimation for high-dimensional noise in high-frequency data
Authors:
**yuan Chang,
Qiao Hu,
Cheng Liu,
Cheng Yong Tang
Abstract:
We consider high-dimensional measurement errors with high-frequency data. Our objective is on recovering the high-dimensional cross-sectional covariance matrix of the random errors with optimality. In this problem, not all components of the random vector are observed at the same time and the measurement errors are latent variables, leading to major challenges besides high data dimensionality. We p…
▽ More
We consider high-dimensional measurement errors with high-frequency data. Our objective is on recovering the high-dimensional cross-sectional covariance matrix of the random errors with optimality. In this problem, not all components of the random vector are observed at the same time and the measurement errors are latent variables, leading to major challenges besides high data dimensionality. We propose a new covariance matrix estimator in this context with appropriate localization and thresholding, and then conduct a series of comprehensive theoretical investigations of the proposed estimator. By develo** a new technical device integrating the high-frequency data feature with the conventional notion of $α$-mixing, our analysis successfully accommodates the challenging serial dependence in the measurement errors. Our theoretical analysis establishes the minimax optimal convergence rates associated with two commonly used loss functions; and we demonstrate with concrete cases when the proposed localized estimator with thresholding achieves the minimax optimal convergence rates. Considering that the variances and covariances can be small in reality, we conduct a second-order theoretical analysis that further disentangles the dominating bias in the estimator. A bias-corrected estimator is then proposed to ensure its practical finite sample performance. We also extensively analyze our estimator in the setting with jumps, and show that its performance is reasonably robust. We illustrate the promising empirical performance of the proposed estimator with extensive simulation studies and a real data analysis.
△ Less
Submitted 10 September, 2022; v1 submitted 19 December, 2018;
originally announced December 2018.
-
A frequency domain analysis of the error distribution from noisy high-frequency data
Authors:
**yuan Chang,
Aurore Delaigle,
Peter Hall,
Cheng Yong Tang
Abstract:
Data observed at high sampling frequency are typically assumed to be an additive composite of a relatively slow-varying continuous-time component, a latent stochastic process or a smooth random function, and measurement error. Supposing that the latent component is an Itô diffusion process, we propose to estimate the measurement error density function by applying a deconvolution technique with app…
▽ More
Data observed at high sampling frequency are typically assumed to be an additive composite of a relatively slow-varying continuous-time component, a latent stochastic process or a smooth random function, and measurement error. Supposing that the latent component is an Itô diffusion process, we propose to estimate the measurement error density function by applying a deconvolution technique with appropriate localization. Our estimator, which does not require equally-spaced observed times, is consistent and minimax rate optimal. We also investigate estimators of the moments of the error distribution and their properties, propose a frequency domain estimator for the integrated volatility of the underlying stochastic process, and show that it achieves the optimal convergence rate. Simulations and a real data analysis validate our analysis.
△ Less
Submitted 20 January, 2018;
originally announced January 2018.
-
Conflict-driven Hybrid Observer-based Anomaly Detection
Authors:
Zheng Wang,
Farshad Harirchi,
Dhananjay Anand,
CheeYee Tang,
James Moyne,
Dawn Tilbury
Abstract:
This paper presents an anomaly detection method using a hybrid observer -- which consists of a discrete state observer and a continuous state observer. We focus our attention on anomalies caused by intelligent attacks, which may bypass existing anomaly detection methods because neither the event sequence nor the observed residuals appear to be anomalous. Based on the relation between the continuou…
▽ More
This paper presents an anomaly detection method using a hybrid observer -- which consists of a discrete state observer and a continuous state observer. We focus our attention on anomalies caused by intelligent attacks, which may bypass existing anomaly detection methods because neither the event sequence nor the observed residuals appear to be anomalous. Based on the relation between the continuous and discrete variables, we define three conflict types and give the conditions under which the detection of the anomalies is guaranteed. We call this method conflict-driven anomaly detection. The effectiveness of this method is demonstrated mathematically and illustrated on a Train-Gate (TG) system.
△ Less
Submitted 6 December, 2017;
originally announced December 2017.
-
Economic Dispatch Considering Spatial and Temporal Correlations of Multiple Renewable Power Plants
Authors:
Chenghui Tang,
Yishen Wang,
Jian Xu,
Yuanzhang Sun,
Baosen Zhang
Abstract:
The correlations of multiple renewable power plants (RPPs) should be fully considered in the power system with very high penetration renewable power integration. This paper models the uncertainties, spatial correlation of multiple RPPs based on Copula theory and actual probability historical histograms by one-dimension distributions for economic dispatch (ED) problem. An efficient dynamic renewabl…
▽ More
The correlations of multiple renewable power plants (RPPs) should be fully considered in the power system with very high penetration renewable power integration. This paper models the uncertainties, spatial correlation of multiple RPPs based on Copula theory and actual probability historical histograms by one-dimension distributions for economic dispatch (ED) problem. An efficient dynamic renewable power scenario generation method based on Gibbs sampling is proposed to generate renewable power scenarios considering the uncertainties, spatial correlation and variability (temporal correlation) of multiple RPPs, in which the sampling space complexity do not increase with the number of RPPs. Distribution-based and scenario-based methods are proposed and compared to solve the real-time ED problem with multiple RPPs. Results show that the proposed dynamic scenario generation method is much more consist with the actual renewable power. The proposed ED methods show better understanding for the uncertainties, spatial and temporal correlations of renewable power and more economical compared with the traditional ones.
△ Less
Submitted 2 July, 2017;
originally announced July 2017.
-
Stochastic Dynamic Optimal Power Flow in Distribution Network with Distributed Renewable Energy and Battery Energy Storage
Authors:
Chenghui Tang,
Jian Xu,
Yuanzhang Sun,
Siyang Liao,
De** Ke,
Xiong Li
Abstract:
The penetration of distributed renewable energy (DRE) greatly raises the risk of distribution network operation such as peak shaving and voltage stability. Battery energy storage (BES) has been widely accepted as the most potential application to cope with the challenge of high penetration of DRE. To cope with the uncertainties and variability of DRE, a stochastic day-ahead dynamic optimal power f…
▽ More
The penetration of distributed renewable energy (DRE) greatly raises the risk of distribution network operation such as peak shaving and voltage stability. Battery energy storage (BES) has been widely accepted as the most potential application to cope with the challenge of high penetration of DRE. To cope with the uncertainties and variability of DRE, a stochastic day-ahead dynamic optimal power flow (DOPF) and its algorithm are proposed. The overall economy is achieved by fully considering the DRE, BES, electricity purchasing and active power losses. The rainflow algorithm-based cycle counting method of BES is incorporated in the DOPF model to capture the cell degradation, greatly extending the expected BES lifetime and achieving a better economy. DRE scenarios are generated to consider the uncertainties and correlations based on the Copula theory. To solve the DOPF model, we propose a Lagrange relaxation-based algorithm, which has a significantly reduced complexity with respect to the existing techniques. For this reason, the proposed algorithm enables much more scenarios incorporated in the DOPF model and better captures the DRE uncertainties and correlations. Finally, numerical studies for the day-ahead DOPF in the IEEE 123-node test feeder are presented to demonstrate the merits of the proposed method. Results show that the actual BES life expectancy of the proposed model has increased to 4.89 times compared with the traditional ones. The problems caused by DRE are greatly alleviated by fully capturing the uncertainties and correlations with the proposed method.
△ Less
Submitted 29 June, 2017;
originally announced June 2017.
-
A new scope of penalized empirical likelihood with high-dimensional estimating equations
Authors:
**yuan Chang,
Cheng Yong Tang,
Tong Tong Wu
Abstract:
Statistical methods with empirical likelihood (EL) are appealing and effective especially in conjunction with estimating equations through which useful data information can be adaptively and flexibly incorporated. It is also known in the literature that EL approaches encounter difficulties when dealing with problems having high-dimensional model parameters and estimating equations. To overcome the…
▽ More
Statistical methods with empirical likelihood (EL) are appealing and effective especially in conjunction with estimating equations through which useful data information can be adaptively and flexibly incorporated. It is also known in the literature that EL approaches encounter difficulties when dealing with problems having high-dimensional model parameters and estimating equations. To overcome the challenges, we begin our study with a careful investigation on high-dimensional EL from a new scope targeting at estimating a high-dimensional sparse model parameters. We show that the new scope provides an opportunity for relaxing the stringent requirement on the dimensionality of the model parameter. Motivated by the new scope, we then propose a new penalized EL by applying two penalty functions respectively regularizing the model parameters and the associated Lagrange multipliers in the optimizations of EL. By penalizing the Lagrange multiplier to encourage its sparsity, we show that drastic dimension reduction in the number of estimating equations can be effectively achieved without compromising the validity and consistency of the resulting estimators. Most attractively, such a reduction in dimensionality of estimating equations is actually equivalent to a selection among those high-dimensional estimating equations, resulting in a highly parsimonious and effective device for high-dimensional sparse model parameters. Allowing both the dimensionalities of model parameters and estimating equations growing exponentially with the sample size, our theory demonstrates that the estimator from our new penalized EL is sparse and consistent with asymptotically normally distributed nonzero components. Numerical simulations and a real data analysis show that the proposed penalized EL works promisingly.
△ Less
Submitted 27 May, 2017; v1 submitted 3 April, 2017;
originally announced April 2017.
-
On the Analysis of a Continuous-Time Bi-Virus Model
Authors:
Ji Liu,
Philip E. Paré,
Angelia Nedić,
Choon Yik Tang,
Carolyn L. Beck,
Tamer Başar
Abstract:
Motivated by the spread of opinions on different social networks, we study a distributed continuous-time bi-virus model for a system of groups of individuals. An in-depth stability analysis is performed for more general models than have been previously considered, for the healthy and epidemic states. In addition, we investigate sensitivity properties of some nontrivial equilibria and obtain an imp…
▽ More
Motivated by the spread of opinions on different social networks, we study a distributed continuous-time bi-virus model for a system of groups of individuals. An in-depth stability analysis is performed for more general models than have been previously considered, for the healthy and epidemic states. In addition, we investigate sensitivity properties of some nontrivial equilibria and obtain an impossibility result for distributed feedback control.
△ Less
Submitted 18 March, 2016; v1 submitted 13 March, 2016;
originally announced March 2016.
-
Optimising Spatial and Tonal Data for PDE-based Inpainting
Authors:
Laurent Hoeltgen,
Markus Mainberger,
Sebastian Hoffmann,
Joachim Weickert,
Ching Hoo Tang,
Simon Setzer,
Daniel Johannsen,
Frank Neumann,
Benjamin Doerr
Abstract:
Some recent methods for lossy signal and image compression store only a few selected pixels and fill in the missing structures by inpainting with a partial differential equation (PDE). Suitable operators include the Laplacian, the biharmonic operator, and edge-enhancing anisotropic diffusion (EED). The quality of such approaches depends substantially on the selection of the data that is kept. Opti…
▽ More
Some recent methods for lossy signal and image compression store only a few selected pixels and fill in the missing structures by inpainting with a partial differential equation (PDE). Suitable operators include the Laplacian, the biharmonic operator, and edge-enhancing anisotropic diffusion (EED). The quality of such approaches depends substantially on the selection of the data that is kept. Optimising this data in the domain and codomain gives rise to challenging mathematical problems that shall be addressed in our work.
In the 1D case, we prove results that provide insights into the difficulty of this problem, and we give evidence that a splitting into spatial and tonal (i.e. function value) optimisation does hardly deteriorate the results. In the 2D setting, we present generic algorithms that achieve a high reconstruction quality even if the specified data is very sparse. To optimise the spatial data, we use a probabilistic sparsification, followed by a nonlocal pixel exchange that avoids getting trapped in bad local optima. After this spatial optimisation we perform a tonal optimisation that modifies the function values in order to reduce the global reconstruction error. For homogeneous diffusion inpainting, this comes down to a least squares problem for which we prove that it has a unique solution. We demonstrate that it can be found efficiently with a gradient descent approach that is accelerated with fast explicit diffusion (FED) cycles. Our framework allows to specify the desired density of the inpainting mask a priori. Moreover, is more generic than other data optimisation approaches for the sparse inpainting problem, since it can also be extended to nonlinear inpainting operators such as EED. This is exploited to achieve reconstructions with state-of-the-art quality.
We also give an extensive literature survey on PDE-based image compression methods.
△ Less
Submitted 15 June, 2015;
originally announced June 2015.
-
Local independence feature screening for nonparametric and semiparametric models by marginal empirical likelihood
Authors:
**yuan Chang,
Cheng Yong Tang,
Yichao Wu
Abstract:
We consider an independence feature screening technique for identifying explanatory variables that locally contribute to the response variable in high-dimensional regression analysis. Without requiring a specific parametric form of the underlying data model, our approach accommodates a wide spectrum of nonparametric and semiparametric model families. To detect the local contributions of explanator…
▽ More
We consider an independence feature screening technique for identifying explanatory variables that locally contribute to the response variable in high-dimensional regression analysis. Without requiring a specific parametric form of the underlying data model, our approach accommodates a wide spectrum of nonparametric and semiparametric model families. To detect the local contributions of explanatory variables, our approach constructs empirical likelihood locally in conjunction with marginal nonparametric regressions. Since our approach actually requires no estimation, it is advantageous in scenarios such as the single-index models where even specification and identification of a marginal model is an issue. By automatically incorporating the level of variation of the nonparametric regression and directly assessing the strength of data evidence supporting local contribution from each explanatory variable, our approach provides a unique perspective for solving feature screening problems. Theoretical analysis shows that our approach can handle data dimensionality growing exponentially with the sample size. With extensive theoretical illustrations and numerical examples, we show that the local independence screening approach performs promisingly.
△ Less
Submitted 30 March, 2016; v1 submitted 25 February, 2015;
originally announced February 2015.
-
Marginal empirical likelihood and sure independence feature screening
Authors:
**yuan Chang,
Cheng Yong Tang,
Yichao Wu
Abstract:
We study a marginal empirical likelihood approach in scenarios when the number of variables grows exponentially with the sample size. The marginal empirical likelihood ratios as functions of the parameters of interest are systematically examined, and we find that the marginal empirical likelihood ratio evaluated at zero can be used to differentiate whether an explanatory variable is contributing t…
▽ More
We study a marginal empirical likelihood approach in scenarios when the number of variables grows exponentially with the sample size. The marginal empirical likelihood ratios as functions of the parameters of interest are systematically examined, and we find that the marginal empirical likelihood ratio evaluated at zero can be used to differentiate whether an explanatory variable is contributing to a response variable or not. Based on this finding, we propose a unified feature screening procedure for linear models and the generalized linear models. Different from most existing feature screening approaches that rely on the magnitudes of some marginal estimators to identify true signals, the proposed screening approach is capable of further incorporating the level of uncertainties of such estimators. Such a merit inherits the self-studentization property of the empirical likelihood approach, and extends the insights of existing feature screening methods. Moreover, we show that our screening approach is less restrictive to distributional assumptions, and can be conveniently adapted to be applied in a broad range of scenarios such as models specified using general moment conditions. Our theoretical results and extensive numerical examples by simulations and data analysis demonstrate the merits of the marginal empirical likelihood approach.
△ Less
Submitted 6 November, 2013; v1 submitted 18 June, 2013;
originally announced June 2013.
-
A New Superlinearly Convergent Algorithm of Combining QP Subproblem with System of Linear Equations for Nonlinear Optimization
Authors:
**-Bao Jian,
Chuan-Hao Guo,
Chun-Ming Tang,
Yan-Qin Bai
Abstract:
In this paper, a class of optimization problems with nonlinear inequality constraints is discussed. Based on the ideas of sequential quadratic programming algorithm and the method of strongly sub-feasible directions, a new superlinearly convergent algorithm is proposed. The initial iteration point can be chosen arbitrarily for the algorithm. At each iteration, the new algorithm solves one quadrati…
▽ More
In this paper, a class of optimization problems with nonlinear inequality constraints is discussed. Based on the ideas of sequential quadratic programming algorithm and the method of strongly sub-feasible directions, a new superlinearly convergent algorithm is proposed. The initial iteration point can be chosen arbitrarily for the algorithm. At each iteration, the new algorithm solves one quadratic programming subproblem which is always feasible, and one or two systems of linear equations with a common coefficient matrix. Moreover, the coefficient matrix is uniformly nonsingular. After finite iterations, the iteration points can always enter into the feasible set of the problem, and the search direction is obtained by solving one quadratic programming subproblem and only one system of linear equations. The new algorithm possesses global and superlinear convergence under some suitable assumptions without the strict complementarity. Finally, some preliminary numerical experiments are reported to show that the algorithm is promising.
△ Less
Submitted 27 June, 2012;
originally announced June 2012.
-
Zero-Gradient-Sum Algorithms for Distributed Convex Optimization: The Continuous-Time Case
Authors:
Jie Lu,
Choon Yik Tang
Abstract:
This paper presents a set of continuous-time distributed algorithms that solve unconstrained, separable, convex optimization problems over undirected networks with fixed topologies. The algorithms are developed using a Lyapunov function candidate that exploits convexity, and are called Zero-Gradient-Sum (ZGS) algorithms as they yield nonlinear networked dynamical systems that evolve invariantly on…
▽ More
This paper presents a set of continuous-time distributed algorithms that solve unconstrained, separable, convex optimization problems over undirected networks with fixed topologies. The algorithms are developed using a Lyapunov function candidate that exploits convexity, and are called Zero-Gradient-Sum (ZGS) algorithms as they yield nonlinear networked dynamical systems that evolve invariantly on a zero-gradient-sum manifold and converge asymptotically to the unknown optimizer. We also describe a systematic way to construct ZGS algorithms, show that a subset of them actually converge exponentially, and obtain lower and upper bounds on their convergence rates in terms of the network topologies, problem characteristics, and algorithm parameters, including the algebraic connectivity, Laplacian spectral radius, and function curvatures. The findings of this paper may be regarded as a natural generalization of several well-known algorithms and results for distributed consensus, to distributed convex optimization.
△ Less
Submitted 26 September, 2011; v1 submitted 28 April, 2011;
originally announced April 2011.