52,887 results on '"ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION"'
Search Results
2. Low-Memory Krylov Subspace Methods for Optimal Rational Matrix Function Approximation
- Author
-
Tyler Chen, Anne Greenbaum, Cameron Musco, and Christopher Musco
- Subjects
ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,FOS: Mathematics ,MathematicsofComputing_NUMERICALANALYSIS ,Computer Science::Mathematical Software ,Numerical Analysis (math.NA) ,Mathematics - Numerical Analysis ,Computer Science::Numerical Analysis ,Analysis ,Mathematics::Numerical Analysis - Abstract
We describe a Lanczos-based algorithm for approximating the product of a rational matrix function with a vector. This algorithm, which we call the Lanczos method for optimal rational matrix function approximation (Lanczos-OR), returns the optimal approximation from a given Krylov subspace in a norm depending on the rational function's denominator, and can be computed using the information from a slightly larger Krylov subspace. We also provide a low-memory implementation which only requires storing a number of vectors proportional to the denominator degree of the rational function. Finally, we show that Lanczos-OR can be used to derive algorithms for computing other matrix functions, including the matrix sign function and quadrature based rational function approximations. In many cases, it improves on the approximation quality of prior approaches, including the standard Lanczos method, with little additional computational overhead.
- Published
- 2023
3. A fast algorithm for computing the Smith normal form with multipliers for a nonsingular integer matrix
- Author
-
Stavros Birmpilis, George Labahn, and Arne Storjohann
- Subjects
FOS: Computer and information sciences ,Computer Science - Symbolic Computation ,Computational Mathematics ,Algebra and Number Theory ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,68W30 ,Symbolic Computation (cs.SC) ,Hardware_ARITHMETICANDLOGICSTRUCTURES - Abstract
A Las Vegas randomized algorithm is given to compute the Smith multipliers for a nonsingular integer matrix $A$, that is, unimodular matrices $U$ and $V$ such that $AV=US$, with $S$ the Smith normal form of $A$. The expected running time of the algorithm is about the same as required to multiply together two matrices of the same dimension and size of entries as $A$. Explicit bounds are given for the size of the entries in both unimodular multipliers. The main tool used by the algorithm is the Smith massager, a relaxed version of $V$, the unimodular matrix specifying the column operations of the Smith computation. From the perspective of efficiency, the main tools used are fast linear solving and partial linearization of integer matrices. As an application of the Smith with multipliers algorithm, a fast algorithm is given to find the fractional part of the inverse of the input matrix., 41 pages
- Published
- 2023
4. On the equivalence of two post-quantum cryptographic families
- Author
-
Alessio Meneghetti, Alex Pellegrini, Massimiliano Sala, and Coding Theory and Cryptology
- Subjects
FOS: Computer and information sciences ,Discrete Mathematics (cs.DM) ,Polynomial-time reductions ,Applied Mathematics ,Maximum likelihood decoding ,Quadratic multivariate systems ,Multivariate-based cryptography ,Computational Complexity (cs.CC) ,Code-based cryptography ,Computer Science - Computational Complexity ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Computer Science::Information Theory ,Computer Science - Discrete Mathematics - Abstract
The Maximum Likelihood Decoding Problem (MLD) is known to be NP-hard and its complexity is strictly related to the security of some post-quantum cryptosystems, that is, the so-called code-based primitives. Analogously, the Multivariate Quadratic System Problem (MQ) is NP-hard and its complexity is necessary for the security of the so-called multivariate-based primitives. In this paper we present a closed formula for a polynomial-time reduction from any instance of MLD to an instance of MQ, and viceversa. We also show a polynomial-time isomorphism between MQ and MLD, thus demonstrating the direct link between the two post-quantum cryptographic families., Accepted for publication in Annali di Matematica Pura ed Applicata (1923 -)
- Published
- 2023
5. Symmetrically Colored Gaussian Graphical Models with Toric Vanishing Ideals
- Author
-
Jane Ivy Coons, Aida Maraj, Pratik Misra, and Miruna-Stefana Sorea
- Subjects
Algebra and Number Theory ,Applied Mathematics ,Mathematics - Statistics Theory ,Statistics Theory (math.ST) ,Mathematics - Algebraic Geometry ,62R01 ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,FOS: Mathematics ,Mathematics - Combinatorics ,Combinatorics (math.CO) ,Geometry and Topology ,Algebraic Geometry (math.AG) ,ComputingMethodologies_COMPUTERGRAPHICS ,MathematicsofComputing_DISCRETEMATHEMATICS - Abstract
A colored Gaussian graphical model is a linear concentration model in which equalities among the concentrations are specified by a coloring of an underlying graph. The model is called RCOP if this coloring is given by the edge and vertex orbits of a subgroup of the automorphism group of the graph. We show that RCOP Gaussian graphical models on block graphs are toric in the space of covariance matrices and we describe Markov bases for them. To this end, we learn more about the combinatorial structure of these models and their connection with Jordan algebras., Comments are very welcome!
- Published
- 2023
6. Symmetry in multivariate ideal interpolation
- Author
-
Rodriguez Bazan, Erick, Hubert, Evelyne, AlgebRe, geOmetrie, Modelisation et AlgoriTHmes (AROMATH), Inria Sophia Antipolis - Méditerranée (CRISAM), and Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-National and Kapodistrian University of Athens (NKUA)
- Subjects
[INFO.INFO-SC]Computer Science [cs]/Symbolic Computation [cs.SC] ,Algebra and Number Theory ,Mathematics::Commutative Algebra ,Representation Theory ,[MATH.MATH-RA]Mathematics [math]/Rings and Algebras [math.RA] ,MathematicsofComputing_NUMERICALANALYSIS ,[INFO.INFO-NA]Computer Science [cs]/Numerical Analysis [cs.NA] ,[MATH.MATH-GR]Mathematics [math]/Group Theory [math.GR] ,Interpolation ,Symmetry ,Macaulay matrix ,Computational Mathematics ,Vandermonde matrix ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,H-basis - Abstract
International audience; An interpolation problem is defined by a set of linear forms on the (multivariate) polynomial ring and values to be achieved by an interpolant. For Lagrange interpolation the linear forms consist of evaluations at some nodes,while Hermite interpolation also considers the values of successive derivatives. Both are examples of ideal interpolation in that the kernels of the linear forms intersect into an ideal. For an ideal interpolation problem with symmetry, we address the simultaneous computation of a symmetry adapted basis of the least interpolation space and the symmetry adapted H-basis of the ideal. Beside its manifest presence in the output, symmetry is exploited computationally at all stages of the algorithm. For an ideal invariant, under a group action, defined by a Groebner basis, the algorithm allows to obtain a symmetry adapted basis of the quotient and of the generators. We shall also note how it applies surprisingly but straightforwardly to compute fundamental invariants and equivariants of a reflection group.
- Published
- 2023
7. Hyperexponential and Fixed-Time Stability of Time-Delay Systems: Lyapunov–Razumikhin Method
- Author
-
Artem N. Nekhoroshikh, Denis Efimov, Andrey Polyakov, Wilfrid Perruquetti, Igor B. Furtat, National Research University of Information Technologies, Mechanics and Optics [St. Petersburg] (ITMO), Finite-time control and estimation for distributed systems (VALSE), Inria Lille - Nord Europe, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 (CRIStAL), Centrale Lille-Université de Lille-Centre National de la Recherche Scientifique (CNRS)-Centrale Lille-Université de Lille-Centre National de la Recherche Scientifique (CNRS), Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 (CRIStAL), Centrale Lille-Université de Lille-Centre National de la Recherche Scientifique (CNRS), Institute of Mechanical Engineering Problems [St. Petersburg] (IPME), Russian Academy of Sciences [Moscow] (RAS), and The results of Section IV are supported by the Russian Science Foundation under grant no. 18-79-10104 (https://rscf.ru/en/project/18-79-10104/) at IPME RAS. The results of Section V are supported by the Russian Science Foundation under grant no. 21-71-10032 at ITMO University.
- Subjects
implicit theorem ,Lyapunov-Razumikhin theorem ,Control and Systems Engineering ,Fixed-time and hyperexponential stability ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Electrical and Electronic Engineering ,linear matrix inequalities ,time-delay systems ,[SPI.AUTO]Engineering Sciences [physics]/Automatic ,Computer Science Applications - Abstract
International audience; Razumikhin-like theorems on hyperexponential and fixed-time stability of time-delay systems are proposed for both explicitly and implicitly defined Lyapunov functions. While the former method is useful for stability analysis, the latter approach is more suitable for control synthesis. Examples of systems that can be stabilized hyperexponentially and in fixed time are given. The control parameters tuning algorithm is presented in the form of linear matrix inequalities. The numerical simulations illustrate the theoretical results.
- Published
- 2023
8. Mapping stacks and categorical notions of properness
- Author
-
Halpern-Leistner, Daniel and Preygel, Anatoly
- Subjects
Mathematics - Algebraic Geometry ,14A20, 18-XX, 14F05 ,Algebra and Number Theory ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,FOS: Mathematics ,Algebraic Geometry (math.AG) - Abstract
One fundamental consequence of a scheme $X$ being proper is that the functor classifying maps from $X$ to any other suitably nice scheme or algebraic stack is representable by an algebraic stack. This result has been generalized by replacing $X$ with a proper algebraic stack. We show, however, that it also holds when $X$ is replaced by many examples of algebraic stacks which are not proper, including many global quotient stacks. This leads us to revisit the definition of properness for stacks. We introduce the notion of a formally proper morphism of stacks and study its properties. We develop methods for establishing formal properness in a large class of examples. Along the way, we prove strong h-descent results which hold in the setting of derived algebraic geometry but not in classical algebraic geometry. Our main applications are algebraicity results for mapping stacks and the stack of coherent sheaves on a flat and formally proper stack., Comment: 47 pages, complete re-write of first version: definitions simplified; section on PGE removed; strengthened results on reductive group schemes; added comparison between formal properness and other notions of properness
- Published
- 2023
9. SONC optimization and exact nonnegativity certificates via second-order cone programming
- Author
-
Magron, Victor, Wang, Jie, Institut de Mathématiques de Toulouse UMR5219 (IMT), Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)-Université de Toulouse (UT)-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Université de Toulouse (UT)-Institut National des Sciences Appliquées (INSA)-Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS), Équipe Méthodes et Algorithmes en Commande (LAAS-MAC), Laboratoire d'analyse et d'architecture des systèmes (LAAS), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université de Toulouse (UT)-Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT), ANR-18-ERC2-0004,COPS,Optimisation garantie pour la vérification des systèmes cyber-physiques(2018), ANR-19-P3IA-0004,ANITI,Artificial and Natural Intelligence Toulouse Institute(2019), European Project: 813211,H2020-EU.1.3. - EXCELLENT SCIENCE - Marie Skłodowska-Curie Actions (Main Programme), H2020-EU.1.3.1. - Fostering new skills by means of excellent initial training of researchers ,10.3030/813211,POEMA(2019), Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS), Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées, and European Project: 813211,H2020,POEMA(2019)
- Subjects
FOS: Computer and information sciences ,Computer Science - Symbolic Computation ,Algebra and Number Theory ,MathematicsofComputing_NUMERICALANALYSIS ,Symbolic Computation (cs.SC) ,sum of binomial squares ,exact nonnegativity certificate ,Mathematics - Algebraic Geometry ,Computational Mathematics ,rounding-projection algorithm ,Optimization and Control (math.OC) ,sum of nonnegative circuit polynomials ,second-order cone programming ,polynomial optimization ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,FOS: Mathematics ,second-order conerepresentation ,[MATH.MATH-OC]Mathematics [math]/Optimization and Control [math.OC] ,Algebraic Geometry (math.AG) ,Mathematics - Optimization and Control - Abstract
The second-order cone (SOC) is a class of simple convex cones and optimizing over them can be done more efficiently than with semidefinite programming. It is interesting both in theory and in practice to investigate which convex cones admit a representation using SOCs, given that they have a strong expressive ability. In this paper, we prove constructively that the cone of sums of nonnegative circuits (SONC) admits a SOC representation. Based on this, we give a new algorithm for unconstrained polynomial optimization via SOC programming. We also provide a hybrid numeric-symbolic scheme which combines the numerical procedure with a rounding-projection algorithm to obtain exact nonnegativity certificates. Numerical experiments demonstrate the efficiency of our algorithm for polynomials with fairly large degree and number of variables., 29 pages, 7 tables, 6 figures, extended version of the article published in the proceedings of ISSAC 2020. arXiv admin note: text overlap with arXiv:1906.06179
- Published
- 2023
10. Rank-Adaptive Time Integration of Tree Tensor Networks
- Author
-
Ceruti, Gianluca, Lubich, Christian, and Sulz, Dominik
- Subjects
tensor differential equation ,Numerical Analysis ,Computational Mathematics ,tree tensor network ,rank adaptivity ,Applied Mathematics ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,MathematicsofComputing_NUMERICALANALYSIS ,FOS: Mathematics ,Mathematics - Numerical Analysis ,Numerical Analysis (math.NA) ,dynamical low-rank approximation - Abstract
A rank-adaptive integrator for the approximate solution of high-order tensor differential equations by tree tensor networks is proposed and analyzed. In a recursion from the leaves to the root, the integrator updates bases and then evolves connection tensors by a Galerkin method in the augmented subspace spanned by the new and old bases. This is followed by rank truncation within a specified error tolerance. The memory requirements are linear in the order of the tensor and linear in the maximal mode dimension. The integrator is robust to small singular values of matricizations of the connection tensors. Up to the rank truncation error, which is controlled by the given error tolerance, the integrator preserves norm and energy for Schro"\dinger equations, and it dissipates the energy in gradient systems. Numerical experiments with a basic quantum spin system illustrate the behavior of the proposed algorithm.
- Published
- 2023
11. Block Factor-Width-Two Matrices and Their Applications to Semidefinite and Sum-of-Squares Optimization
- Author
-
Yang Zheng, Aivar Sootla, and Antonis Papachristodoulou
- Subjects
Optimization and Control (math.OC) ,Control and Systems Engineering ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,FOS: Mathematics ,FOS: Electrical engineering, electronic engineering, information engineering ,MathematicsofComputing_NUMERICALANALYSIS ,Systems and Control (eess.SY) ,Electrical and Electronic Engineering ,Mathematics - Optimization and Control ,Electrical Engineering and Systems Science - Systems and Control ,Computer Science Applications - Abstract
Semidefinite and sum-of-squares (SOS) optimization are fundamental computational tools in many areas, including linear and nonlinear systems theory. However, the scale of problems that can be addressed reliably and efficiently is still limited. In this paper, we introduce a new notion of block factor-width-two matrices and build a new hierarchy of inner and outer approximations of the cone of positive semidefinite (PSD) matrices. This notion is a block extension of the standard factor-width-two matrices, and allows for an improved inner-approximation of the PSD cone. In the context of SOS optimization, this leads to a block extension of the scaled diagonally dominant sum-of-squares (SDSOS) polynomials. By varying a matrix partition, the notion of block factor-width-two matrices can balance a trade-off between the computation scalability and solution quality for solving semidefinite and SOS optimization problems. Numerical experiments on a range of large-scale instances confirm our theoretical findings., Accepted for publication as a regular paper at IEEE TAC. Code is available through https://github.com/zhengy09/SDPfw
- Published
- 2023
12. A PDE-ODE model for traffic control with autonomous vehicles
- Author
-
Liard, Thibault, Stern, Raphael, Delle Monache, Maria Laura, Universidad de Deusto [Bilbao] (DEUSTO), Universidad de Deusto (DEUSTO), Department of Civil and Environmental Engineering [Urbana], University of Illinois at Urbana-Champaign [Urbana], and University of Illinois System-University of Illinois System
- Subjects
Statistics and Probability ,Traffic control ,Applied Mathematics ,MathematicsofComputing_NUMERICALANALYSIS ,Autonomous vehicles ,General Engineering ,Computer Science Applications ,Computer Science::Robotics ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,[MATH.MATH-AP]Mathematics [math]/Analysis of PDEs [math.AP] ,[MATH.MATH-OC]Mathematics [math]/Optimization and Control [math.OC] ,PDE-ODE systems ,[MATH]Mathematics [math] ,[MATH.MATH-NA]Mathematics [math]/Numerical Analysis [math.NA] - Abstract
We consider a partial differential equation - ordinary differential equation system to describe the dynamics of traffic flow with autonomous vehicles. In the model, the bulk flow of human drivers is represented by a scalar conservation law, while each autonomous vehicle is described by an ordinary differential equation. The coupled PDE-ODE model is introduced, and existence of solutions for this model is shown, along with a proposed algorithm to construct approximate solutions. Next, we propose a control strategy for the speeds of the autonomous vehicles to minimize the average fuel consumption of the entire traffic flow. Existence of solutions for the optimal control problem is proved, and we numerically show that a reduction in average fuel consumption is possible with an AV acting as a moving bottleneck.
- Published
- 2023
13. Graph complexes and Feynman rules
- Author
-
Berghoff, Marko and Kreimer, Dirk
- Subjects
High Energy Physics - Theory ,Algebra and Number Theory ,High Energy Physics - Theory (hep-th) ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,FOS: Physical sciences ,General Physics and Astronomy ,Mathematical Physics (math-ph) ,Mathematical Physics ,MathematicsofComputing_DISCRETEMATHEMATICS ,81T15, 81Q30, 18G85, 57T05, 14D21 - Abstract
We investigate Feynman graphs and their Feynman rules from the viewpoint of graph complexes. We focus on graph homology and on the appearance of cubical complexes when either reducing internal edges or when removing them by putting them on the massshell., 48 p, 15 Figures, as to appear in CNTP
- Published
- 2023
14. Embeddings between Partial Combinatory Algebras
- Author
-
Golov, A. and Terwijn, Sebastiaan A.
- Subjects
FOS: Computer and information sciences ,Computer Science - Logic in Computer Science ,TheoryofComputation_COMPUTATIONBYABSTRACTDEVICES ,Logic ,Mathematics - Logic ,Logic in Computer Science (cs.LO) ,Mathematics::Logic ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,Computer Science::Logic in Computer Science ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,FOS: Mathematics ,Logic (math.LO) ,Mathematics ,Computer Science::Formal Languages and Automata Theory - Abstract
Partial combinatory algebras are algebraic structures that serve as generalized models of computation. In this paper, we study embeddings of pcas. In particular, we systematize the embeddings between relativizations of Kleene's models, of van Oosten's sequential computation model, and of Scott's graph model, showing that an embedding between two relativized models exists if and only if there exists a particular reduction between the oracles. We obtain a similar result for the lambda calculus, showing in particular that it cannot be embedded in Kleene's first model., Comment: 31 pages
- Published
- 2023
15. RationalMaps, a package for Macaulay2
- Author
-
Bott, C. J., Hassanzadeh, S. Hamid, Schwede, Karl, and Smolkin, Daniel
- Subjects
Mathematics - Algebraic Geometry ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,FOS: Mathematics ,Computer Science::Mathematical Software ,Commutative Algebra (math.AC) ,Mathematics - Commutative Algebra ,Algebraic Geometry (math.AG) ,14E05, 14E07, 13P99, 13A30 - Abstract
This paper describes the RationalMaps package for Macaulay2. This package provides functionality for computing several aspects of rational maps such as whether a map is birational, or a closed embedding., Comment: 9 pages. The current version of the package (and other necessary files, such as the latest version of FastMinors.m2) can be accessed at https://github.com/Macaulay2/Workshop-2016-Utah/tree/master/RationalMaps
- Published
- 2022
16. The Diophantine problem for rings of exponential polynomials
- Author
-
Hector Pasten, Xavier Vidaux, Natalia Garcia-Fritz, Dimitra Chompitaki, and Thanases Pheidas
- Subjects
Pure mathematics ,Transcendence (philosophy) ,Mathematics - Number Theory ,Diophantine equation ,Mathematics - Logic ,Exponential polynomial ,Theoretical Computer Science ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Mathematics (miscellaneous) ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,FOS: Mathematics ,11U05, 03B25, 11J81 (Primary) 30D15 (Secondary) ,Number Theory (math.NT) ,Logic (math.LO) ,Mathematics - Abstract
One of the main open problems regarding decidability of the existential theory of rings is the analogue of Hilbert's Tenth Problem (HTP) for the ring of entire holomorphic functions in one variable. In the direction of a negative solution, we prove unsolvability of HTP for rings of exponential polynomials. This provides the first known case of HTP for a ring of entire holomorphic functions in one variable strictly containing the polynomials. The technique of proof consists of an interaction between Arithmetic, Analysis, Logic, and Functional Transcendence.
- Published
- 2022
17. The Cost of Symmetry in Connected Graphs
- Author
-
Terekhov, M. S.
- Subjects
Astrophysics::High Energy Astrophysical Phenomena ,General Mathematics ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,FOS: Mathematics ,Mathematics - Combinatorics ,Combinatorics (math.CO) ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,MathematicsofComputing_DISCRETEMATHEMATICS - Abstract
The paper answers the question posed in a joint paper by A. A. Klyachko and N. M. Luneva about the optimality of the estimate for the cost of symmetry in graphs. The original estimate says that if n vertices can be removed from a connected graph so that there is no connected subgraph of isomorphic $\Gamma$ left in it, then at most $n|V(\Gamma)|$ vertices that form a set invariant under all automorphisms of the graph so that the graph does not contain a subgraph isomorphic to $\Gamma$. We will prove that there exists a graph $\Gamma$ for which this estimate is not optimal., Comment: in Russian language
- Published
- 2022
18. Signature Gröbner bases, bases of syzygies and cofactor reconstruction in the free algebra
- Author
-
Clemens Hofstadler and Thibaut Verron
- Subjects
Computer Science - Symbolic Computation ,FOS: Computer and information sciences ,Computational Mathematics ,Algebra and Number Theory ,Mathematics::Commutative Algebra ,Rings and Algebras (math.RA) ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,FOS: Mathematics ,Computer Science::Symbolic Computation ,Mathematics - Rings and Algebras ,Symbolic Computation (cs.SC) - Abstract
Signature-based algorithms have become a standard approach for computing Gr\"obner bases in commutative polynomial rings. However, so far, it was not clear how to extend this concept to the setting of noncommutative polynomials in the free algebra. In this paper, we present a signature-based algorithm for computing Gr\"obner bases in precisely this setting. The algorithm is an adaptation of Buchberger's algorithm including signatures. We prove that our algorithm correctly enumerates a signature Gr\"obner basis as well as a Gr\"obner basis of the module generated by the leading terms of the generators' syzygies, and that it terminates whenever the ideal admits a finite signature Gr\"obner basis. Additionally, we adapt well-known signature-based criteria eliminating redundant reductions, such as the syzygy criterion, the F5 criterion and the singular criterion, to the case of noncommutative polynomials. We also generalize reconstruction methods from the commutative setting that allow to recover, from partial information about signatures, the coordinates of elements of a Gr\"obner basis in terms of the input polynomials, as well as a basis of the syzygy module of the generators. We have written a toy implementation of all the algorithms in the Mathematica package OperatorGB and we compare our signature-based algorithm to the classical Buchberger algorithm for noncommutative polynomials., Comment: 31 pages, 2 pages appendix, 1 figure
- Published
- 2022
19. Power operations in the Stolz–Teichner program
- Author
-
Barthel, Tobias, Berwick-Evans, Daniel, and Stapleton, Nathaniel
- Subjects
Mathematics::K-Theory and Homology ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,FOS: Mathematics ,55N34, 81T60, 55S25 ,Algebraic Topology (math.AT) ,Mathematics - Algebraic Topology ,Geometry and Topology ,Mathematics::Algebraic Topology - Abstract
The Stolz--Teichner program proposes a deep connection between geometric field theories and certain cohomology theories. In this paper, we extend this connection by developing a theory of geometric power operations for geometric field theories restricted to closed bordisms. These operations satisfy relations analogous to the ones exhibited by their homotopical counterparts. We also provide computational tools to identify the geometrically defined operations with the usual power operations on complexified equivariant $K$-theory. Further, we use the geometric approach to construct power operations for complexified equivariant elliptic cohomology., 49 pages. Small fixes
- Published
- 2022
20. kStatistics: Unbiased Estimates of Joint Cumulant Products from the Multivariate Faà Di Bruno's Formula
- Author
-
Di Nardo, Elvira and Guarino, Giuseppe
- Subjects
FOS: Computer and information sciences ,Statistics and Probability ,Numerical Analysis ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,FOS: Mathematics ,Mathematics - Statistics Theory ,Statistics Theory (math.ST) ,Statistics, Probability and Uncertainty ,Statistics - Computation ,Computation (stat.CO) - Abstract
kStatistics is a package in R that serves as a unified framework for estimating univariate and multivariate cumulants as well as products of univariate and multivariate cumulants of a random sample, using unbiased estimators with minimum variance. The main computational machinery of kStatistics is an algorithm for computing multi-index partitions. The same algorithm underlies the general-purpose multivariate Fa\`a di Bruno's formula, which has been therefore included in the last release of the package. This formula gives the coefficients of formal power series compositions as well as the partial derivatives of multivariable function compositions. One of the most significant applications of this formula is the possibility to generate many well-known polynomial families as special cases. So, in the package, there are special functions for generating very popular polynomial families, such as the Bell polynomials. However further families can be obtained, for suitable choices of the formal power series involved in the composition or when suitable symbolic strategies are employed. In both cases, we give examples on how to modify the R codes of the package to accomplish this task. Future developments are addressed at the end of the paper., Comment: In press
- Published
- 2022
21. Dual Certificates and Efficient Rational Sum-of-Squares Decompositions for Polynomial Optimization over Compact Sets
- Author
-
Maria M. Davis and Dávid Papp
- Subjects
Mathematics - Algebraic Geometry ,ComputingMilieux_THECOMPUTINGPROFESSION ,Optimization and Control (math.OC) ,90C23, 14Q30, 90C51 ,Applied Mathematics ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,FOS: Mathematics ,Computer Science::Symbolic Computation ,Mathematics - Optimization and Control ,Algebraic Geometry (math.AG) ,Software ,Theoretical Computer Science - Abstract
We study the problem of computing weighted sum-of-squares (WSOS) certificates for positive polynomials over a compact semialgebraic set. Building on the theory of interior-point methods for convex optimization, we introduce the concept of dual cone certificates, which allows us to interpret vectors from the dual of the sum-of-squares cone as rigorous nonnegativity certificates of a WSOS polynomial. Whereas conventional WSOS certificates are alternative representations of the polynomials they certify, dual certificates are distinct from the certified polynomials; moreover, each dual certificate certifies a full-dimensional convex cone of WSOS polynomials. As a result, rational WSOS certificates can be constructed from numerically computed dual certificates at little additional cost, without any rounding or projection steps applied to the numerical certificates. As an additional algorithmic application, we present an almost entirely numerical hybrid algorithm for computing the optimal WSOS lower bound of a given polynomial along with a rational dual certificate, with a polynomial-time computational cost per iteration and linear rate of convergence., Comment: Preprint accepted in SIAM Journal on Optimization. Major revision compared to v1
- Published
- 2022
22. Mechanics Analysis of Functional Origamis Applicable in Biomedical Robots
- Author
-
Hongying Zhang
- Subjects
Computer science ,Payload ,business.industry ,Hinge ,Reconfigurability ,Truss ,Mechanics ,Folding (DSP implementation) ,Computer Science Applications ,Control and Systems Engineering ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Robot ,System integration ,Electrical and Electronic Engineering ,business ,Actuator - Abstract
The origami principle of folding planar sheets into functional three-dimensional devices promises a future with increased compactness and reconfigurability of biomedical robots. To inspire new origami-based biomedical robots, we highlight two categories of origami patterns that are applicable to build compact actuators, deployable stents, and minimally invasive surgery devices. Due to the requirements in system integration, biocompatibility, and payload capability, the conventional paper-based origamis are converted to physical robots by replacing the zero-thickness facets and zero-width folds with thick panels and flexible hinges, respectively. Therefore, the physical origami-based robots become inhomogeneous, making it more complex and challenging to analyze their mechanics. So far, no such model can analyze the mechanics of any physical origami robot. Herein, we propose a computational model that discretizes the continuous structures into truss and spring elements to fulfill this goal. Based on the model, we simulate the identified origami structures under various boundary conditions to investigate their application in biomedical scenarios. This article is expected to accelerate the design iteration of new functional biomedical origami robots.
- Published
- 2022
23. The new soliton solutions for long and short-wave interaction system
- Author
-
Mohammad Bagher Ghaemi, Javad Vahidi, Sayyed Masood Zekavatmand, Hadi Rezazadeh, and Mühendislik ve Doğa Bilimleri Fakültesi
- Subjects
Maple software ,Environmental Engineering ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Applied mathematics ,Ocean Engineering ,Extended Rational Sine-Cosine Method ,Soliton ,Type (model theory) ,Oceanography ,System of linear equations ,Extended Rational Sinh-Cosh Method ,Mathematics - Abstract
The goal of this paper is to discover modern soliton solutions to long and short-wave interaction system by procedures called extended rational sine-cosine and rational sinh-cosh methods. We assume that the equation has a hypothetical soliton solutions. By reorganizing the resulting equations, we obtain a system of equations. Using Maple software, we get unknown coefficients in the system and writing them in the original equation, we obtain new solition solutions of the equation. The results show that the soliton solutions generated by the method for the long and short-wave interaction system are bright, kink type, bright periodic and dark solutions. We provided 3-D figures to illustrate the solutions. Computational results indicate that the method employed in this paper is superior than some other methods used in the literature to solve the same system equations.
- Published
- 2022
24. The Wiener index of the zero-divisor graph of Zn
- Author
-
T. Asir and V. Rabikka
- Subjects
Ring (mathematics) ,Mathematics::Number Theory ,Applied Mathematics ,Modulo ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,0211 other engineering and technologies ,021107 urban & regional planning ,0102 computer and information sciences ,02 engineering and technology ,Wiener index ,01 natural sciences ,Combinatorics ,Mathematics::Algebraic Geometry ,Mathematics::Probability ,Integer ,010201 computation theory & mathematics ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Discrete Mathematics and Combinatorics ,Graph (abstract data type) ,Zero divisor ,Mathematics - Abstract
The main objective of this article is to study the Wiener index of zero-divisor graph of the ring of integer modulo n . We present a constructed method to calculate the Wiener index of zero-divisor graph of Z n for any positive integer n .
- Published
- 2022
25. Solution of Simultaneous Higher Order Equations Based on DNA Strand Displacement Circuit
- Author
-
Tongtong Mao, Junwei Sun, and Yanfeng Wang
- Subjects
Quantitative Biology::Biomolecules ,Artificial neural network ,Analogue electronics ,Logic ,Computer science ,Computation ,Biomedical Engineering ,Pharmaceutical Science ,Medicine (miscellaneous) ,Binary number ,Bioengineering ,DNA ,Catalysis ,Computer Science Applications ,Computers, Molecular ,Quadratic equation ,Simultaneous equations ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Applied mathematics ,Electrical and Electronic Engineering ,Software verification ,Biotechnology ,Dna strand displacement - Abstract
Currently, DNA strand displacement is often used to build neural networks or solve logical problems. While there are few studies on the use of DNA strand displacement to solve the higher order equations. In this paper, the catalysis, degradation, annihilation and adjusted reaction modules are built through DNA strand displacement. The chemical reaction networks of the corresponding higher order equations and simultaneous equations are established through these modules, and these chemical reaction networks can be used to build analog circuits to solve binary primary simultaneous equations and binary quadratic simultaneous equations. Finally, through Visual DSD software verification, this design can realize the solution of binary primary simultaneous equations and binary quadratic simultaneous equations, which provides a reference for DNA computation in the future.
- Published
- 2022
26. On the solution of monotone nested variational inequalities
- Author
-
Lorenzo Lampariello, Gianluca Priori, and Simone Sagratella
- Subjects
Optimization and Control (math.OC) ,General Mathematics ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,MathematicsofComputing_NUMERICALANALYSIS ,FOS: Mathematics ,Management Science and Operations Research ,Mathematics - Optimization and Control ,Software - Abstract
We study nested variational inequalities, which are variational inequalities whose feasible set is the solution set of another variational inequality. We present a projected averaging Tikhonov algorithm requiring the weakest conditions in the literature to guarantee the convergence to solutions of the nested variational inequality. Specifically, we only need monotonicity of the upper- and the lower-level variational inequalities. Also, we provide the first complexity analysis for nested variational inequalities considering optimality of both the upper- and lower-level.
- Published
- 2022
27. Almost strongly fuzzy bounded operators with applications to fuzzy spectral theory
- Author
-
T. Bînzar
- Subjects
Pure mathematics ,Spectral theory ,Mathematics::General Mathematics ,Logic ,Characterization (mathematics) ,Fuzzy logic ,ComputingMethodologies_PATTERNRECOGNITION ,Artificial Intelligence ,Bounded function ,Completeness (order theory) ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,ComputingMethodologies_GENERAL ,Algebra over a field ,Mathematics - Abstract
In this paper we introduce and study the algebra of almost strongly fuzzy bounded operators on fuzzy normed linear spaces. Some connections with the algebra of strongly fuzzy bounded operators are presented. The completeness of these algebras is also established. A characterization of bounded elements of the algebra of almost strongly fuzzy bounded operators is given. We also introduce two fuzzy spectral radii for almost strongly fuzzy bounded operators. For bounded elements of the considered algebra the equality between these fuzzy spectral radii is proved.
- Published
- 2022
28. Quantum Cryptanalysis on a Multivariate Cryptosystem Based on Clipped Hopfield Neural Network
- Author
-
Songsong Dai
- Subjects
Theoretical computer science ,Computer Networks and Communications ,Computer science ,business.industry ,TheoryofComputation_GENERAL ,Cryptography ,Computer Science Applications ,law.invention ,Finite field ,Artificial Intelligence ,Discrete logarithm ,law ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Cryptosystem ,Quantum algorithm ,Computational problem ,Cryptanalysis ,business ,Quantum ,Software ,Multivariate cryptography ,Computer Science::Cryptography and Security ,Quantum computer - Abstract
Shor's quantum algorithm and other efficient quantum algorithms can break many public-key cryptographic schemes in polynomial time on a quantum computer. In response, researchers proposed postquantum cryptography to resist quantum computers. The multivariate cryptosystem (MVC) is one of a few options of postquantum cryptography. It is based on the NP-hardness of the computational problem to solve nonlinear equations over a finite field. Recently, Wang et al. (2018) proposed a MVC based on extended clipped hopfield neural networks (eCHNN). Its main security assumption is backed by the discrete logarithm (DL) problem over Matrics. In this brief, we present quantum cryptanalysis of Wang et al. 's eCHNN-based MVC. We first show that Shor's quantum algorithm can be modified to solve the DL problem over Matrics. Then we show that Wang et al. 's construction of eCHNN-based MVC is not secure against quantum computers; this against the original intention of that multivariate cryptography is one of a few options of postquantum cryptography.
- Published
- 2022
29. Private and Online Learnability Are Equivalent
- Author
-
Noga Alon, Mark Bun, Roi Livni, Maryanthe Malliaris, and Shay Moran
- Subjects
TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Artificial Intelligence ,Hardware and Architecture ,Control and Systems Engineering ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,Software ,Information Systems - Abstract
Let H be a binary-labeled concept class. We prove that H can be PAC learned by an (approximate) differentially private algorithm if and only if it has a finite Littlestone dimension. This implies a qualitative equivalence between online learnability and private PAC learnability.
- Published
- 2022
30. Extended-Dissipativity-Based Adaptive Event-Triggered Control for Stochastic Polynomial Fuzzy Singular Systems
- Author
-
Yang Yang, Hak-Keung Lam, and Zhiguang Feng
- Subjects
Polynomial ,Lemma (mathematics) ,Computer science ,Applied Mathematics ,Fuzzy logic ,Polynomial matrix ,Weighting ,Computational Theory and Mathematics ,Artificial Intelligence ,Control and Systems Engineering ,Control theory ,Simple (abstract algebra) ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Dissipative system - Abstract
This paper deals with the extended-dissipativity-based adaptive event-triggered (AET) control problem for stochastic polynomial fuzzy singular systems (SPFSSs). The purpose of this work is to design a state-feedback controller through the AET mechanism,which not only makes the closed-loop system admissible and extended dissipative,but also saves the network resources. Firstly,with a suitable Lyapunov-Krasovskii functional and an integral inequality in stochastic setting,an AET control criterion of SPFSSs considering asynchronous premise is established to ensure the mean square admissibility and extended dissipativity of the close-loop singular system. Additionally,a simple lemma is employed to approximate the non-convex sum-of-squares (SOS) conditions with the convex SOS conditions due to the difficulty in solving the non-convex SOS design conditions. Then both the desired feedback controller gain and event-triggered weighting polynomial matrix are co-designed based on the derived criterion. Finally,simulation examples are provided to illustrate the effectiveness of the proposed approaches.
- Published
- 2022
31. Numerical solution of one- and two-dimensional time-fractional Burgers equation via Lucas polynomials coupled with Finite difference method
- Author
-
Saud Fahad Aldosary, Sirajul Haq, Ihteram Ali, Kottakkaran Sooppy Nisar, and Faraz Ahmad
- Subjects
Finite differences ,Polynomial ,Caputo fractional derivative ,Partial differential equation ,General Engineering ,Finite difference method ,Engineering (General). Civil engineering (General) ,Burgers' equation ,Nonlinear system ,Algebraic equation ,Lucas polynomials ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Fibonacci polynomials ,Convergence (routing) ,Applied mathematics ,Burgers equations ,TA1-2040 ,Mathematics - Abstract
In this article, a numerical technique based on polynomials is proposed for the solution of one and two-dimensional time-fractional Burgers equation. First, the given problem is reduced to time discrete form using θ -weighted scheme. Then, with the help of Lucas and Fibonacci polynomials the given PDEs transformed to system of algebraic equations which is easy to solve. The proposed algorithm is validated by solving some numerical examples. Despite this, convergence analysis of the scheme is briefly discussed and verified numerically. The main objective of this paper is to show that polynomial based method is convenient for 1D and 2D nonlinear time-fractional partial differential equations (TFPDEs). Efficiency and performance of the proposed technique are examined by calculating L 2 and L ∞ error norms. Obtained accurate results confirm applicability and efficiency of the method.
- Published
- 2022
32. Fully computable a posteriori error bounds for eigenfunctions
- Author
-
Liu, Xuefeng and Vejchodský, Tomáš
- Subjects
Computational Mathematics ,Applied Mathematics ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,MathematicsofComputing_NUMERICALANALYSIS ,FOS: Mathematics ,Numerical Analysis (math.NA) ,Mathematics - Numerical Analysis ,Mathematics::Spectral Theory ,65N25, 65N30 - Abstract
For compact self-adjoint operators in Hilbert spaces, two algorithms are proposed to provide fully computable a posteriori error estimate for eigenfunction approximation. Both algorithms apply well to the case of tight clusters and multiple eigenvalues, under the settings of target eigenvalue problems. Algorithm I is based on the Rayleigh quotient and the min-max principle that characterizes the eigenvalue problems. The formula for the error estimate provided by Algorithm I is easy to compute and applies to problems with limited information of Rayleigh quotients. Algorithm II, as an extension of the Davis--Kahan method, takes advantage of the dual formulation of differential operators along with the Prager--Synge technique and provides greatly improved accuracy of the estimate, especially for the finite element approximations of eigenfunctions. Numerical examples of eigenvalue problems of matrices and the Laplace operators over convex and non-convex domains illustrate the efficiency of the proposed algorithms., 39 pages, 12 tables, 9 figures
- Published
- 2022
33. Convergence of a Constrained Vector Extrapolation Scheme
- Author
-
Mathieu Barré, Adrien Taylor, Alexandre d'Aspremont, Statistical Machine Learning and Parsimony (SIERRA), Département d'informatique - ENS Paris (DI-ENS), École normale supérieure - Paris (ENS-PSL), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure - Paris (ENS-PSL), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Centre National de la Recherche Scientifique (CNRS)-Inria de Paris, Institut National de Recherche en Informatique et en Automatique (Inria), Université Paris sciences et lettres (PSL), MB acknowledges support from an AMX fellowship. AT acknowledges support from the European ResearchCouncil (grant SEQUOIA 724063. AA would like to acknowledge support from the ML and Optimisation joint research initiative with the fonds AXA pour la recherche and , a Google focused award, as well as funding by the French government under management of Agence Nationale de la Recherche as part of the 'Investissements d’avenir' program, reference ANR-19-P3IA-0001 (PRAIRIE 3IA Institute)., ANR-19-P3IA-0001,PRAIRIE,PaRis Artificial Intelligence Research InstitutE(2019), and European Project: 724063,ERC-2016-COG,SEQUOIA(2017)
- Subjects
ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,[MATH.MATH-OC]Mathematics [math]/Optimization and Control [math.OC] - Abstract
International audience; Among extrapolation methods, Anderson acceleration (AA) is a popular technique for speeding up convergence of iterative processes toward their limit points. AA proceeds by extrapolating a better approximation of the limit using a weighted combination of previous iterates. Whereas AA was originally developed in the context of nonlinear integral equations, or to accelerate the convergence of iterative methods for solving linear systems, it is also used to extrapolate the solution of nonlinear systems. Simple additional stabilization strategies can be used in this context to control conditioning issues. In this work, we study a constrained vector extrapolation scheme based on an offline version of AA with fixed window size, for solving nonlinear systems arising in optimization problems, where the stabilization strategy consists in bounding the magnitude of the extrapolation weights. We provide explicit convergence bounds for this method and, as a by-product, upper bounds on a constrained version of the Chebyshev problem on polynomials.
- Published
- 2022
34. Direction-of-Arrival Estimation Method for Principal Singular Vectors Based on Multiple Toeplitz Matrices
- Author
-
Yaofeng Tang, Kuangang Fan, Shuang Lei, and Junfeng Cui
- Subjects
Article Subject ,Computer Networks and Communications ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,MathematicsofComputing_NUMERICALANALYSIS ,Electrical and Electronic Engineering ,Information Systems - Abstract
A principal singular vector based on multiple Toeplitz matrices is proposed to solve the accuracy problem of direction-of-arrival (DOA) estimation for coherent signals. First, the data matrix received by uniform linear array (ULA) is transformed into a Toeplitz matrix. An equivalent covariance matrix is obtained by square weighted summation method using the Toeplitz matrix. Then, a polynomial containing DOA information is constructed because the signal space and the steering matrix have the same column space; the Toeplitz matrix is built using polynomial coefficients. The problem is transformed into solving linear equations by establishing the relationship between the Toeplitz matrix and the signal subspace. Furthermore, the weighted least square method is used to obtain multiple candidates for linear equations. Finally, the maximum likelihood (ML) rule is used to select source signal candidates from multiple candidates. In comparison with currently known algorithm, the proposed algorithm has the characteristics of high estimation accuracy, low-complexity, and strong anti-interference ability and resolution. Even when the signal-to-noise ratio (SNR) is low, the snapshot number is small, and multiple signals exist; this method can still provide good estimation performance and resolution, which is more than 90% in most cases. Simulation experiments verify the superiority of the algorithm.
- Published
- 2022
35. A Q-Learning Algorithm for Discrete-Time Linear-Quadratic Control with Random Parameters of Unknown Distribution: Convergence and Stabilization
- Author
-
Kai Du, Qingxin Meng, and Fu Zhang
- Subjects
Control and Optimization ,Optimization and Control (math.OC) ,Applied Mathematics ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Probability (math.PR) ,FOS: Mathematics ,49N10, 93E35, 93D15 ,Mathematics - Optimization and Control ,Mathematics - Probability - Abstract
This paper studies an infinite horizon optimal control problem for discrete-time linear systems and quadratic criteria, both with random parameters which are independent and identically distributed with respect to time. A classical approach is to solve an algebraic Riccati equation that involves mathematical expectations and requires certain statistical information of the parameters. In this paper, we propose an online iterative algorithm in the spirit of Q-learning for the situation where only one random sample of parameters emerges at each time step. The first theorem proves the equivalence of three properties: the convergence of the learning sequence, the well-posedness of the control problem, and the solvability of the algebraic Riccati equation. The second theorem shows that the adaptive feedback control in terms of the learning sequence stabilizes the system as long as the control problem is well-posed. Numerical examples are presented to illustrate our results., Comment: 24 pages, 3 figures
- Published
- 2022
36. Sampled-Data-Based Event-Triggered Fuzzy Control for PDE Systems Under Cyberattacks
- Author
-
Shuai Song, Xiaona Song, Choon Ki Ahn, and Qiyuan Zhang
- Subjects
Pointwise ,Partial differential equation ,Computer science ,Applied Mathematics ,MathematicsofComputing_NUMERICALANALYSIS ,Fuzzy control system ,Fuzzy logic ,Nonlinear system ,Computational Theory and Mathematics ,Exponential stability ,Artificial Intelligence ,Control and Systems Engineering ,Control theory ,Control system ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION - Abstract
This paper presents a new sampled-data-based event-triggered pointwise security controller by pointwise measurements for partial differential equation (PDE) systems under stochastic cyber-attacks. First, according to the Takagi--Sugeno fuzzy model, the considered nonlinear system is reconstructed and an event-triggered pointwise fuzzy controller is proposed with pointwise measurements. Moreover, networked control systems (NCSs) are introduced to improve the transmission convenience; however, two deception cyber-attacks with different characteristics are brought into PDE systems for the first time. In addition, based on novel Lyapunov-Krasovskii functionals (LKFs), some relaxed conditions to assure system's exponential stability are established. Finally, the effectiveness and practicability of the designed controller are demonstrated by numerical and application examples.
- Published
- 2022
37. On the number of solutions of systems of certain diagonal equations over finite fields
- Author
-
Mariana Pérez and Melina Privitelli
- Subjects
Pure mathematics ,Algebra and Number Theory ,Finite field ,Distribution (number theory) ,Generalization ,Mathematics::Number Theory ,Modulo ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Diagonal ,Prime number ,Congruence relation ,Mathematics - Abstract
In this paper we obtain explicit estimates and existence results on the number of F q -rational solutions of certain systems defined by families of diagonal equations over finite fields. Our approach relies on the study of the geometric properties of the varieties defined by the systems involved. We apply these results to a generalization of Waring's problem and the distribution of solutions of congruences modulo a prime number.
- Published
- 2022
38. A Hybrid Interpolation Method for Fractional PDEs and Its Applications to Fractional Diffusion and Buckmaster Equations
- Author
-
Ihtisham Ul Haq, Nigar Ali, Shabir Ahmad, and Tayyaba Akram
- Subjects
Article Subject ,General Mathematics ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,MathematicsofComputing_NUMERICALANALYSIS ,General Engineering - Abstract
This study presents a novel numerical method to solve PDEs with the fractional Caputo operator. In this method, we apply the Newton interpolation numerical scheme in Laplace space, and then, the solution is returned to real space through the inverse Laplace transform. The Newton polynomial provides good results as compared to the Lagrangian polynomial, which is used to construct the Adams–Bashforth method. This procedure is used to solve fractional Buckmaster and diffusion equations. Finally, a few numerical simulations are presented, ensuring that this strategy is highly stable and quickly converges to an exact solution.
- Published
- 2022
39. Truncated Differential Attacks on Contracting Feistel Ciphers
- Author
-
Tim Beyne and Yunwen Liu
- Subjects
REDUCED-ROUND VERSIONS ,Technology ,Science & Technology ,Applied Mathematics ,SCHEMES ,Contracting Feistel ciphers ,GMiMC ,Computer Science, Software Engineering ,SMS4 BLOCK CIPHER ,Computer Science Applications ,CRYPTANALYSIS ,Computational Mathematics ,SM-4 ,Computer Science, Theory & Methods ,SMT ,Computer Science ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Truncated differentials ,Software - Abstract
We improve truncated differential attacks on t-branch contracting Feistel ciphers with a domain size of Nt. Based on new truncated differentials, a generic distinguisher for t2 + t − 2 rounds using O(Nt−1) data and time is obtained. In addition, we obtain a key-recovery attack on t2 + 1 rounds with Õ(Nt−2) data and Õ(Nt−1) time. Compared to previous results by Guo et al. (ToSC 2016), our attacks cover more rounds with a lower data-complexity. Applications of the generic truncated differential to concrete ciphers include full-round attacks on some instances of GMiMC-crf, and the best-known key-recovery attack on 17 rounds of the Chinese block cipher standard SM4. In addition, we propose an automated search method for truncated differentials using SMT, which is effective even for trails with probability below the probability of the truncated differential for a random permutation.
- Published
- 2022
40. Finite-Time Fuzzy Control for Nonlinear Singularly Perturbed Systems With Input Constraints
- Author
-
Wei Xing Zheng, Shengyuan Xu, and Feng Li
- Subjects
Van der Pol oscillator ,Applied Mathematics ,MathematicsofComputing_NUMERICALANALYSIS ,Fuzzy control system ,Interval (mathematics) ,Fuzzy logic ,Nonlinear system ,Matrix (mathematics) ,Computational Theory and Mathematics ,Artificial Intelligence ,Control and Systems Engineering ,Control theory ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Applied mathematics ,Finite time ,Mathematics - Abstract
Singularly perturbed systems have found widespread applications in practice. The existing results on singularly perturbed systems mainly focused on the Lyapunov asymptotic stability, which are unable to deal with the cases that the system states cannot exceed a given threshold during a fixed time interval. This paper addresses the finite-time fuzzy control issue for discrete-time nonlinear singularly perturbed systems with input constraints. The aim is to guarantee the boundedness of the states of singularly perturbed systems during a finite-time interval. Based on the matrix inequality technique, some conditions are established to guarantee the finite-time boundedness of the fuzzy singularly perturbed systems, where the singularly perturbed parameter is independent so as to avoid the ill-conditioned problem caused by the small singularly perturbed parameter. The gains of the finite-time fuzzy controller can be obtained by solving some singularly perturbed parameter independent linear matrix inequalities. Finally, the proposed finite-time fuzzy controller design approach for nonlinear singularly perturbed systems is illustrated via the Van der Pol circuit.
- Published
- 2022
41. FPS in action
- Author
-
Tabuguia, Bertrand Teguia and Koepf, Wolfram
- Subjects
FOS: Computer and information sciences ,Computer Science - Symbolic Computation ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,FOS: Mathematics ,Mathematics - Combinatorics ,Combinatorics (math.CO) ,General Medicine ,Symbolic Computation (cs.SC) - Abstract
Linear recurrence equations with constant coefficients define the power series coefficients of rational functions. However, one usually prefers to have an explicit formula for the sequence of coefficients, provided that such a formula is "simple" enough. Simplicity is related to the compactness of the formula due to the presence of algebraic numbers: "the smaller, the simpler". This poster showcases the capacity of recent updates on the Formal Power Series (FPS) algorithm, implemented in Maxima and Maple (convert/FormalPowerSeries), to find simple formulas for sequences like those from https://oeis.org/A307717, https://oeis.org/A226782, or https://oeis.org/A226784 by computing power series representations of their correctly guessed generating functions. We designed the algorithm for the more general context of univariate $P$-recursive sequences. Our implementations are available at http://www.mathematik.uni-kassel.de/~bteguia/FPS_webpage/FPS.htm, 5 pages, 15 references, ISSAC'22 poster presentation
- Published
- 2022
42. A new difference method for the singularly perturbed Volterra-Fredholm integro-differential equations on a Shishkin mesh
- Author
-
Musa ÇAKIR and Baransel GÜNEŞ
- Subjects
Statistics and Probability ,Matematik ,Algebra and Number Theory ,difference scheme,error estimate,Fredholm integro-differential equation,singular perturbation,Shishkin mesh,Volterra integro-differential equation ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,MathematicsofComputing_NUMERICALANALYSIS ,Geometry and Topology ,Mathematics ,Analysis ,Mathematics::Numerical Analysis - Abstract
In this research, the finite difference method is used to solve the initial value problem of linear first order Volterra-Fredholm integro-differential equations with singularity. By using implicit difference rules and composite numerical quadrature rules, the difference scheme is established on a Shishkin mesh. The stability and convergence of the proposed scheme are analyzed and two examples are solved to display the advantages of the presented technique.
- Published
- 2022
43. Computational solutions for Eikonal equation by differential quadrature method
- Author
-
Mehrullah Mehr and Davood Rostamy
- Subjects
Eikonal equation ,General Engineering ,Engineering (General). Civil engineering (General) ,Grid ,Stability (probability) ,Fourier differential quadrature ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Convergence (routing) ,Nyström method ,Applied mathematics ,Wave Propagation ,TA1-2040 ,Polynomial differential quadrature ,Differential (mathematics) ,Mathematics - Abstract
This article presents an efficient method to solve of Eikonal equation by the new differential quadrature method. The purpose of this article is to obtain the accuracy and performance method for the Eikonal equation. We introduce a novel grid points to reduce errors and compared them on different issues to accelerate convergence. The accuracy and stability of numerical results for two and three-dimensional of the Eikonal equation are presented. In these numerical examples, we investigate the stability of the proposed method by adding random noises. The new differential quadrature method is a capable method for the some numerical examples and we evaluate the accuracy and performance of our proposed method.
- Published
- 2022
44. Geometric orbital integrals and the center of the enveloping algebra
- Author
-
Bismut, Jean-Michel, Shen, Shu, Laboratoire de Mathématiques d'Orsay (LM-Orsay), Université Paris-Sud - Paris 11 (UP11)-Centre National de la Recherche Scientifique (CNRS), Institut de Mathématiques de Jussieu - Paris Rive Gauche (IMJ-PRG), Centre National de la Recherche Scientifique (CNRS)-Université Paris Diderot - Paris 7 (UPD7)-Université Pierre et Marie Curie - Paris 6 (UPMC), and Université Pierre et Marie Curie - Paris 6 (UPMC)-Université Paris Diderot - Paris 7 (UPD7)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Mathematics - Differential Geometry ,Algebra and Number Theory ,[MATH.MATH-RT]Mathematics [math]/Representation Theory [math.RT] ,Differential Geometry (math.DG) ,[MATH.MATH-DG]Mathematics [math]/Differential Geometry [math.DG] ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,FOS: Mathematics ,Group Theory (math.GR) ,Representation Theory (math.RT) ,Mathematics - Group Theory ,Mathematics - Representation Theory ,[MATH.MATH-GR]Mathematics [math]/Group Theory [math.GR] - Abstract
The purpose of this paper is to extend the explicit geometric evaluation of semisimple orbital integrals for smooth kernels for the Casimir operator obtained by the first author to the case of kernels for arbitrary elements in the center of the enveloping algebra.
- Published
- 2022
45. A General Method for Computer-Assisted Proofs of Periodic Solutions in Delay Differential Problems
- Author
-
Jan Bouwe van den Berg, Jean-Philippe Lessard, Chris Groothedde, and Mathematics
- Subjects
Polynomial ,Delay differential equations ,Mackey–Glass equation ,Partial differential equation ,Periodic solutions ,010102 general mathematics ,Delay differential equation ,Fixed point ,Mathematical proof ,01 natural sciences ,Contraction mapping ,Fourier series ,010101 applied mathematics ,Ordinary differential equation ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Computer–assisted proofs ,Applied mathematics ,0101 mathematics ,Analysis ,Differential (mathematics) ,Mathematics - Abstract
In this paper we develop a general computer-assisted proof method for periodic solutions to delay differential equations. The class of problems considered includes systems of delay differential equations with an arbitrary number of (forward and backward) delays. When the nonlinearities include nonpolynomial terms we introduce auxiliary variables to first rewrite the problem into an equivalent polynomial one. We then apply a flexible fixed point technique in a space of geometrically decaying Fourier coefficients. We showcase the efficacy of this method by proving periodic solutions in the well-known Mackey–Glass delay differential equation for the classical parameter values.
- Published
- 2022
46. Recursion Formulas for Integrated Products of Jacobi Polynomials
- Author
-
Sven Beuchler, Tim Haubold, and Veronika Pillwein
- Subjects
Computer Science - Symbolic Computation ,FOS: Computer and information sciences ,33C45, 33C70, 65N30 ,Computational Mathematics ,General Mathematics ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,FOS: Mathematics ,Mathematics - Numerical Analysis ,Numerical Analysis (math.NA) ,Symbolic Computation (cs.SC) ,Analysis - Abstract
From the literature it is known that orthogonal polynomials as the Jacobi polynomials can be expressed by hypergeometric series. In this paper, the authors derive several contiguous relations for terminating multivariate hypergeometric series. With these contiguous relations one can prove several recursion formulas of those series. This theoretical result allows to compute integrals over products of Jacobi polynomials in a very efficient recursive way. Moreover, the authors present an application to numerical analysis where it can be used in algorithms which compute the approximate solution of boundary value problem of partial differential equations by means of the finite elements method. With the aid of the contiguous relations, the approximate solution can be computed much faster than using numerical integration. A numerical example illustrates this effect.
- Published
- 2023
47. Grover search inspired alternating operator ansatz of quantum approximate optimization algorithm for search problems
- Author
-
Chen-Fu Chiang and Paul M. Alsing
- Subjects
Quantum Physics ,TheoryofComputation_COMPUTATIONBYABSTRACTDEVICES ,Modeling and Simulation ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Signal Processing ,FOS: Physical sciences ,Statistical and Nonlinear Physics ,Electrical and Electronic Engineering ,Quantum Physics (quant-ph) ,Theoretical Computer Science ,Electronic, Optical and Magnetic Materials - Abstract
We use the mapping between two computation frameworks , Adiabatic Grover Search (AGS) and Adiabatic Quantum Computing (AQC), to translate the Grover search algorithm into the AQC regime. We then apply Trotterization on the schedule-dependent Hamiltonian of AGS to obtain the values of variational parameters in the Quantum Approximate Optimization Algorithm (QAOA) framework. The goal is to carry the optimal behavior of Grover search algorithm into the QAOA framework without the iterative machine learning processes., Comment: 5 pages, 2 figures, 1 table. arXiv admin note: substantial text overlap with arXiv:2204.09830
- Published
- 2023
48. Isotropy groups of the action of orthogonal similarity on symmetric matrices
- Author
-
Starčič, Tadej
- Subjects
Mathematics - Differential Geometry ,ortogonalne matrike ,Toeplitzove matrike ,Algebra and Number Theory ,isotropy groups ,MathematicsofComputing_NUMERICALANALYSIS ,izotropne grupe ,matrix equations ,Differential Geometry (math.DG) ,udc:512.643:517.55 ,symmetric matrices ,orthogonal matrices ,Toeplitz matrices ,matrične enačbe ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,FOS: Mathematics ,simetrične matrike - Abstract
We find an algorithmic procedure that enables the computation and description of the structure of the isotropy subgroups of the group of complex orthogonal matrices with respect to the action of similarity on complex symmetric matrices. A key step in our proof is to solve a certain rectangular block upper triangular Toeplitz matrix equation.
- Published
- 2023
49. Sparse trace tests
- Author
-
Brysiewicz, Taylor and Burr, Michael
- Subjects
FOS: Computer and information sciences ,Computer Science - Symbolic Computation ,Mathematics - Algebraic Geometry ,Computational Mathematics ,Algebra and Number Theory ,Applied Mathematics ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,FOS: Mathematics ,Symbolic Computation (cs.SC) ,65H14, 14Q65, 14M25, 68W30 ,Algebraic Geometry (math.AG) - Abstract
We establish how the coefficients of a sparse polynomial system influence the sum (or the trace) of its zeros. As an application, we develop numerical tests for verifying whether a set of solutions to a sparse system is complete. These algorithms extend the classical trace test in numerical algebraic geometry. Our results rely on both the analysis of the structure of sparse resultants as well as an extension of Esterov’s results on monodromy groups of sparse systems.
- Published
- 2023
50. Supervised machine learning to estimate instabilities in chaotic systems: Estimation of local Lyapunov exponents
- Author
-
Daniel Ayers, Jack Lau, Javier Amezcua, Alberto Carrassi, Varun Ojha, Daniel Ayer, Jack Lau, Javier Amezcua, Alberto Carrassi, and Varun Ojha
- Subjects
Atmospheric Science ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,numerical modelling ,FOS: Physical sciences ,supervised machine learning ,Computational Physics (physics.comp-ph) ,Chaotic Dynamics (nlin.CD) ,chao ,local Lyapunov exponent ,Nonlinear Sciences - Chaotic Dynamics ,Physics - Computational Physics - Abstract
In chaotic dynamical systems such as the weather, prediction errors grow faster in some situations than in others. Real-time knowledge about the error growth could enable strategies to adjust the modelling and forecasting infrastructure on-the-fly to increase accuracy or reduce computation time. One could, e.g., change the ensemble size, or the distribution and type of target observations. Local Lyapunov exponents are known indicators of the rate at which very small prediction errors grow over a finite time interval. However, their computation is very expensive: it requires maintaining and evolving a tangent linear model, orthogonalisation algorithms and storing large matrices. In this feasibility study, we investigate the accuracy of supervised machine learning in estimating the current local Lyapunov exponents, from input of current and recent time steps of the system trajectory, as an alternative to the classical method. Thus machine learning is not used here to emulate a physical model or some of its components, but non intrusively as a complementary tool. We test four popular supervised learning algorithms: regression trees, multilayer perceptrons, convolutional neural networks and long short-term memory networks. Experiments are conducted on two low-dimensional chaotic systems of ordinary differential equations, the R\"ossler and the Lorenz 63 models. We find that on average the machine learning algorithms predict the stable local Lyapunov exponent accurately, the unstable exponent reasonably accurately, and the neutral exponent only somewhat accurately. We show that greater prediction accuracy is associated with local homogeneity of the local Lyapunov exponents on the system attractor. Importantly, the situations in which (forecast) errors grow fastest are not necessarily the same as those where it is more difficult to predict local Lyapunov exponents with machine learning., Comment: 37 pages, 10 Figures
- Published
- 2023
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.